SlideShare uma empresa Scribd logo
1 de 9
Baixar para ler offline
Computer Engineering and Intelligent Systems                                           www.iiste.org
ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online)
Vol 2, No.3

  Relay Technologies in IEEE 802.16j Mobile Multi-hop Relay (MMR)
                              Networks
                                           D.Satish Kumar (Corresponding author)
              Department of Electrical and Electronics Engineering, Kalignar Karunanidhi Institute of Technology
                                            Coimbatore-641402, Tamilnadu, India.
                                 Tel: +919843723396, Email: satishcoimbatore@yahoo.co.in
                                                       Dr.N.Nagarajan
         Department of Computer Science and Engineering, Coimbatore Institute of Engineering and Technology
                                            Coimbatore-641109, Tamilnadu, India
                                                Email: swekalnag@gmail.com
Abstract
IEEE 802.16 standard is created to compete with cable access networks. In the beginning end users are immobile and have
a line of sight with base station, now it moved to mobile non line of sight (NLOS) with the new standard IEEE 802.16e
and IEEE 802.16j. The new IEEE 802.16j standard which is an amendment to IEEE 802.16e is mobile multi hop relay
(MMR) specification for wireless networks.
This paper discusses relay modes, relay transmission schemes and relay pairing schemes of IEEE 802.16j. Relay
technologies such as transparent relay modes, non transparent relay mode, relay pairing schemes such as centralized relay
pairing schemes, distributed relay pairing scheme, characterises of relay based networks such as throughput enhancement,
capacity increase, cost reduction , relay techniques such as time domain frequency domain relay techniques and relay
placement are also discussed in this paper. The paper also discusses about integration of IEEE 802.16j with IEEE 802.11.
Keywords: IEEE 802.16j, Relay pairing schemes, relay techniques, Relay modes, WIMAX, NCTUns, etc
Contents
    1.   Introduction-Wireless Groups.
    2.   IEEE 802.16j Standard
    3.   WiMAX Forum.
    4.   Relay Modes.
         a)     Transparent Mode
         b) Non Transparent Mode
    5.   Relay Transmission Schemes.
         a)     Amplify and Forward
         b) Selective Decode and Forward.
         c)     Demodulation and Forward.
    6.   Relay Pairing Schemes.
         a)     Centralized Relay Pairing Schemes.
         b) Distributed Relay Pairing Schemes
    7.   Relay Placement.
    8.   Characteristics of Relay based Networks.
    9.   Relaying Techniques.
    10. Multiple-Input Multiple-Output (MIMO) communication for IEEE 802.16j
    11. IEEE 802.16j Protocol Layering.
         a)     Data/Control Plane.


                                                            105
b) Management Plane.
    12.   IEEE 802.16j [WIMAX] Integration with IEEE 802.11n [Wi-Fi]
    13.   Conclusion And Future Works
    14.   References
1. Introduction-Wireless Groups
Wireless systems for achieving high speed mobile wireless access services can be divided into two groups. The first group
is International Mobile telecommunications-2000 [IMT-2000] which include wideband code division multiple access(W-
CDMA), high speed downlink packet access (HSDPA), high speed uplink packet access (HSUPA), High speed packet
access plus (HSUPA+), LTE/LTE-Advanced specified by 3GPP (3rd generation Partnership project ) , CDMA2000 1x and
Ultra Mobile Broadband (UMB) specified by 3GPP2. The second group consists of IEEE 802.16e, IEEE 802.16j [1], and
IEEE 802.16m [1] standard specified by IEEE 802.16 committee.
The second group is also called as Worldwide interoperability for Microwave access (WiMAX) standard is one of the 4G
(4th generation ) telecommunication technologies that supplies wireless communication of data through different
transmission links like point to multi point. Two groups which play role in the development of IEEE 802.16j standard is,
IEEE 802.16 working group on Broadband wireless Access standard which develop standards and recommended practices
to support the development of broadband Wireless metropolitan area networks and WiMAX forum which certify and
promotes broadband wireless product based on IEEE 802.16 standard.
2. IEEE 802.16J Standard
The new task group IEEE 802.16j-2009 standard [1][2] of IEEE 802.16 Air interface for Broadband Wireless Access was
officially established in March 2006, in order to support mobile multi-hop relay (MMR) specification, mesh mode is
removed in the IEEE 802.16 -2009 standard.. The specification is shown in table 2, it is an amendment of IEEE 802.16e
[3][4][5][6] standard for enhancing coverage throughput as shown in fig 1 and system capacity. It provides multi hop
wireless connectivity where traffic between a base station (BS) and a subscriber station (SS) can be relayed through a relay
station. This system enables mobile stations to communicate with a base station through intermediate relay station.
Multihop relay station (M-RS) is an optional deployment that may be used to provide additional coverage or performance
advantage in an access network. The RS may be fixed in location or, in the case of an access RS, it may be mobile access
RS. Most of the time the RS will act as a BS and should have its own physical cell identifier, and also it should be able to
transmit its own synchronization channels and control information. There should be no difference between cell control in
RS and BS.
The radio link originating or terminating at an MS is named as the access link, but the link between BS and RS or between
pair of RSs is called relay link. Theses access link and relay link can be used for uplink and downlink data transmission.
This standard [7][8][9]defines the physical and the MAC layer specifications for MMR networks. The MAC layer
supports functions such as network entry, bandwidth request, forwarding of PDUs, connection management and Hand
over. The PHY layer adopts orthogonal frequency division multiple access (OFDMA) [1][2][3] as the primary channel
access mechanism for non-line of sight (NLOS) communications in the frequency band below 11 GHz. Where multiple
users are allocated separate set of slots, so that they can communicate in parallel. It supports point to multipoint (PMP)
network topology where resource allocation is performed by BS on a per connection basis and the SSs are treated equally.
MIMO [2] techniques have ability to exploit NLOS channels and increase spectral efficiency compared to single input
single output (SISO) systems. It is able to provide high capacity and data rate without increasing bandwidth. The gain of
MIMO is multiplexing gains, diversity gains and array gains.




                                Fig 1: IEEE 802.16j Mobile multi hop relay (MMR) network.
The aim of this paper, to the best of our knowledge the first of its kind, is to give an overview of the relay technologies in
IEEE 802.16j along with the different proposed and probable research solutions, starting right from the advent of IEEE

                                                            106
802.16e technology until today, thus identifying the research directions related to the existing and future technologies of
WiMAX.. In this article, we focus on the mobile WiMAX , IEEE 802.16j mobile multi hop relay (MMR) technology and
will use the acronym ’ “IEEE 802.16j’ instead of Mobile WiMAX IEEE 802.16j mobile multi hop relay (MMR) in the rest
of the paper. The rest of the article is organized as follows. In section I, we briefly recapitulate the different relay modes,
relay transmission schemes, and relay pairing schemes, techniques in IEEE 802.16j’ . In section II we brief discussed
about the different technical issues in Physical layer of IEEE 802.16j’ and present a comparative study of the advantages
of the different Physical layer technical issues. This is followed in section III by a brief discussion about the different
technical issues in MAC-CPS layer of the IEEE 802.16j technology and their relevancy. This is followed in section IV by
a brief discussion about the different technical issues in MAC-Security layer of the IEEE 802.16j technology. Section IV
presents a brief comparative study between IEEE 802.16j and LTE technologies. Conclusions are drawn in Section V.
3. WiMAX Forum
The WiMAX forum [3] was established in 2003 to promote deployment of WiMAX as a broadband wireless access
technology. It initiated several technical specifications and allows certification of WiMAX products. The network
specification involve interaction with other standard organization include IETF, 3GPP, 3GPP2, DSL forum, and OMA.
4. RELAY MODES
Two different relay modes [1] are defined in this standard, transparent mode and Non- transparent mode.
a. Transparent Mode
The transparent relay mode [1] increases the throughput which facilities capacity increases within the Bs coverage area. It
has no support to coverage extension because it does not forward framing information to BS. It is operated in two hop
network topology and supports centralized scheduling only as scheduling is done only in BS. It uses CID based forwarding
scheme and supports embedded and explicit mode of path management.




                                      Fig 2: Non-tranparent mode channel parameters
b. Non transparent relay mode
The Non transparent relay mode [1] as in fig 3 is to increase the coverage extension of BS, here RS generate its own
framing information and forward it to SSs. It operates is 2 or more hops and uses centralized or distributed scheduling
mode, as scheduling is done in BS and RSs. It used CID and Tunnel based forwarding scheme and supports embedded and
explicit mode of path management. The channel parameters are shown in fig 2




                                          Fig 3: Non-tranparent mode of operation.
The transparent relay station does not transmit control message, permeable, FCH (frame control header, and DL/UL-MAP,
as it only increases system throughput. The non transparent relay station transmit control message, permeable, FCH (frame



                                                             107
control header, and DL/UL-MAP, as it increases system throughput and increases cell coverage. Table 1 shows the
difference between transparent and non transparent mode of operation.
5. Relay Transmission Schemes
There are many relay transmission schemes [24[26] proposed, they are Amplify and forward, selective Decode and
forward, Demodulation and forward.
a. Amplify And Forward
Here the relay receives signal from the BS or SSs in the first phase it amplify this signal and forwards it to the SSs or BS
in second phase. This is very simple and short delay relay transmission scheme.
b. Selective Decode and Forward.
Here also the relay receives signal from the BS or SSs in the first phase it decodes the signal and the decoded data is
checked for cyclic redundancy check (CRC) then the decoded data is coded and forwards it to the SSs or BS in second
phase. This scheme avoids error propagation through the channel.
c. Demodulation and Forward.
Here also the relay receives signal from the BS or SSs in the first phase it demodulate the signal without decoding and then
it modulates and forwards it to the SSs or BS in second phase.
                                                           TABLE-1
                       S.No            Transparent Mode                 Non Transparent Mode
                                                                     Supports Centralized or
                                 Supports Centralized
                                                                     Distributed scheduling- as
                         1.      scheduling - as scheduling
                                                                     scheduling done in base and
                                 done only in base station
                                                                     relay station
                                 Use CID based forwarding            Use Tunnel based or CID based
                         2.
                                 scheme                              forwarding scheme
                         3.      Use only 2 hops                     Use 2 or more Hops
                                 Does not provide coverage
                         4.                                          Provides BS coverage extension.
                                 extension
                         5.      Low Relay station cost.             High Relay station cost.


6. Relay Pairing Schemes
 Pairing scheme [24] is developed for having collaboration between RSs and BS in data transmission. This will improve
the coverage and throughput of the mobile multi hop relay (MMR) networks. There are two pairing schemes proposed,
Centralized pairing scheme and distributed pairing scheme. The other Relay pairing schemes are Random Relay Pairing
Schemes and Opportunistic Relay Pairing Schemes
a. Centralized Relay Pairing Schemes
In this scheme the BS will act as a control node and collects the channel and location information from all the RSs and SSs
and then make the pairing decision. This information must be formed as a service set and periodically updated in the local
BS to capture dynamic changes of SSs This scheme requires more signaling over head, and can achieve better performance
gains.
b. Distributed Relay Pairing Schemes
In this scheme, RS collects the channel and location information from all the nearby SSs and then makes the pairing
decision. First each RS identify its service set of neighborhood SSs and also the channel conditions between its BS as well
as its SS, those RS with single service set each randomly selects a time slot from the N- slots in the pairing scheme. If
multiple RS choose the same time slot then collusion occurs and those RS will be trying again in the next pairing scheme.
7. Relay Placement
By deploying relay stations [26] in lower SINR cell boundary area the system capacity, throughput per user, and the
system reliability can be enhanced. The Relay placement is formulated as an optimization problem and solved by and
iterative algorithm, under the assumption that MS distribution is uniform. In some cases large geographic area under non



                                                            108
uniformly distributed traffic demand is considered. The locations of BS are determined in the first stage network
deployment. An RS location algorithm is designed to locate RSs.
8. Characteristics of Relay Based Networks.
Relay based networks[15][16][17][18] has small form factor, low cost relays associated with Base stations. Three main
benefits provided from relay based architecture over single {hop architecture are throughput enhancement, coverage
increase and deployment cost.
a. Throughput Enhancement:
It is expected to increase system capacity by deploying RSs in a manner that enables more aggressive spatial reuse.
b. Coverage Enhancement/Extension:
The relay technology is expected to improve the coverage reliability in geographic areas that are severely shadowed from
the BS and/or to extend the range of a BS.
c. Cost Reduction:
 Relay based systems have the potential to deliver cost gains over traditional single {hop wireless access systems. Using
RSs, an operator could deploy a network with wide coverage at a lower cost than using only (more) expensive BSs to
provide good coverage and system capacity.
9. Relaying Techniques:
The Relaying techniques[15][16][17][18] [26] include the conventional techniques (i) time domain relaying, (ii) frequency
domain relaying and (iii) hybrid time/frequency domain relaying and the current technique that is interest among the
research community is (iv) co-operative technique.
a. Time Domain Relaying:
In this scheme relays access the Medium in time multiplex. The resources are further divided in time in either the DL or
UL to allow the relay station to receive and transmit data.
b. Frequency Domain Relaying:
Relays are operating on different frequency channels. The main advantage of this scheme is that relays can transmit
and receive data simultaneously.
c. Hybrid Time/Frequency Domain Relaying:
Relays are operating periodically on different frequency channels to forward data. The idea here is to switch between two
frequencies in order to allow the BS to transmit to its client while the relay is forwarding data on another frequency.
d. Cooperative Relaying Techniques:
Such techniques can significantly enhance the performance of relay based systems by multiple RSs cooperatively
transmitting the same data to a SS or the BS, i.e. in the DL or UL. This leads to similar benefits than in MIMO systems
with transmit/receive diversity and spatial multiplexing.
10. Multiple-Input Multiple-Output (MIMO) Communication for IEEE 802.16j.
MIMO- Multiple-Input Multiple-Output techniques have been used in IEEE 802.16d/e/j to improve cell coverage and
increase average user with in the cell. MIMO transmission [26][11[12] is used to increase the data rate of the
communication between a given transmitter-receiver pair and/or improve the reliability of the link. Use of multiple
antennas can improve the achievable rates of users in the network with given frequency. As MIMO technology matures it
is expected that MIMO will be widely used for wireless communication. For Next Generation WiMAX a system is to
support at least up to 8 transmit antennas at the base station, 4 streams and Space-Time Coding. MIMO futures such as
closed-loop MIMO will be included in future WiMAX More specifically, it has been already decided to support closed-
loop MIMO using Channel Quality Information, Precoding Matrix Index and rank feedback in future systems.
The MIMO techniques [32][33] are Single User MIMO ( SU-MOMO) , Multi User MIMO (MU-MIMO) and cooperative
MIMO. The adoption of MIMO techniques often requires a tight design integration of PHY, medium access control
(MAC), and higher layers of IEEE 802.16j. The key MIMO techniques are ; Open-loop transmit diversity in DL, Open-
loop spatial multiplexing in DL, Open-loop transmit diversity in UL, Open-loop spatial multiplexing in UL, Collaborative
spatial multiplexing in UL (UL MU-MIMO), Adaptive beam forming including DL SDMA (DL MU-MIMO), Closed-
loop antenna grouping/selection, Closed-loop codebook-based pre-coding. These above features are included in Release
1.0 and 1.5 of WiMAX forum.
a. Single User MIMO ( SU-MOMO)

                                                           109
In SU-MOMO [32] the transmitter and receiver are equipped with M and N antennas. The channel is Rayleigh or Rician
fading channel. Based on the full or partial availability of Channel State Information (CSI) to receiver and transmitter SU-
MOMO is classified in to open loop SU-MOMO and closed loop MIMO.
b. Open loop SU-MOMO
Open-loop MIMO systems[32] are more desirable in mobility applications because they do not require CSI as 802.16e
support mobility of up to 120 km/h. 802.16e adopts space-time coding (STC) as the main open-loop MIMO scheme. STC
is supported for both the uplink and downlink, for up to four transmit antennas, and for a multiplexing rate up to 4. STC
option allows low complexity decoding, while others are optimized for high complexity decoding. Cyclic delay diversity
(CDD) is another open-loop scheme. Too much CDD delay may reduce the receiver’s channel estimation accuracy due to
the augmented frequency fluctuation.
c. Closed- loop SU-MOMO
Closed-loop systems[33] can achieve better performance than open-loop systems by exploiting CSIT.
d. Multi User MIMO (MU-MIMO)
MU-MIMO [32] allows multiple SSs to spatially share the same time-frequency resource for the improvement of both the
cell spectral efficiency and average user experience.
e. Distributed MIMO and Relay in IEEE 802.16j.
Among BS, RS(s), and SS, a distributed MIMO system is formed with all the transmit antennas of BS and RS on one side
and the receive antennas of the destination SS on the other side.
New MOMO techniques [33] are open-loop multiuser MIMO, and collaborative multicell MIMO. In the multicell MIMO
multiple BSs collaborate to serve multiple SSs in the edge region of the BSs’ cell. A precoding entity in the network
backhaul will decide the precoding vectors used for all SSs in all the BSs. The multicell MIMO system has the potential to
eliminate dominant intercell interferences, while offering multiplexing rate and diversity gain.
11. IEEE 802.16j Protocol Layering
IEEE 802.16j protocol layering[13][14][15][26] consists of Data/Control Plane and Management plane. The Data/Control
Plane defines PHY and MAC layers. The Management plane defines respective management entity of PHY and MAC
layers.




                                   Fig 4: IEEE 802.16j MAC –CPS and SSCS sublayers




                                                           110
Fig 5: IEEE 802.16j protocol layering.
a. Data /Control Plane
The IEEE 802.16j data /control plane as in fig 5 includes the Physical layer (PHY), MAC common part sub layer (MAC-
CPS) and MAC convergence sub layer (MAC-CS). The MAC common part sub layer as in fig 4 includes connection
admission control, Link management, ARQ, scheduler Downlink/uplink burst processing. The MAC convergence sub
layer Network management, configuration management, uplink packet reassembly and downlink packet classifier.
b. Management Plane:
The management plane as in fig 5 includes the corresponding Management entity of Physical layer (PHY), MAC common
part sub layer (MAC-CPS) and MAC convergence sub layer (MAC-CS).
12. IEEE 802.16j [WIMAX] Integration with IEEE 802.11n [Wi-Fi]
WiFi also called as WLAN or IEEE 802.11 provide wireless connectivity to local networks in unlicensed frequency band
and offers low or free of cost internet connectivity, but WiMAX designed for point to multi point (PMP) operates in
licensed and unlicensed band provides broad band internet connectivity to last mile access. In WiFI subscriber stations are
connected through access points (AP), but WiMAX subscriber stations are connected to base station (BS). The IEEE
802.16j standard provides PMP mode for SS outside the BS coverage area and use dedicated relay stations (RS) to support
mobile nodes.
For integration of Wi-Fi with WiMAX different scenarios are considered such as single mode client scenario, Dual mode
client scenario, Backhaul scenario, multi hop heterogeneous scenario, Dual gate way single mode client scenario, Dual
gate way Dual mode client scenario, Mobile / moving Networks scenario.
In single mode client scenario SSs are connected to either BS1 or AP1 that is SS1 to BS1 if it is within the coverage area
of BS1 and SS2 to AP1 if it is within the coverage area of AP1.
In backhaul Scenario the SS1 are connected to internet through point to point backhaul connection (BSi-BSj). In dual
mode SS1 is connected to both WiMAX BS and Wi-Fi AP. In dual gate way mode, a dual gateway will connect to SS and
BS, that is provides coverage area of BS. In multi hop mode an RS can provide coverage extension to SS for both BS and
also AP. In mobile network scenario a mobile gateway can be used by external clients outside the coverage area of Wi-Fi /
WiMAX.
13. Conclusion and Future Works
The new IEEE 802.16j standard which is an amendment to IEEE 802.16e is multi hop relay specification for wireless
networks. Relay technologies such as transparent relay modes, non transparent relay mode, relay pairing schemes such as
centralized relay pairing schemes, distributed relay pairing scheme, characterises of relay based networks such as
throughput enhancement,capacity increase, cost reduction , relay techniques such as time domain frequency domain relay
techniques and relay placement are also discussed in this paper. In future we are planning to solve some of the technical
issues such as Network planning, Relay placement, scheduling services, bandwidth allocation etc.
14. References
“IEEE Standard for Local and Metropolitan Area Networks: Part 16: Air Interface for Broadband Wireless Access
Systems, IEEE Std 802.16- 2009”, May 2009, 2094 pp.
C. So-In, R. Jain, and A. Al-Tamimi, “Scheduling in IEEE 802.16e WiMAX Networks: Key issues and a survey,”

                                                           111
IEEE J. Select. Areas Commun., vol. 27, no. 2, pp. 156–171, Feb. 2009.
C. So-In, R. Jain, and A. Al-Tamimi, “Capacity evaluation for IEEE 802.16e MobileWiMAX,” J. Comput. Syst.,
Networks, and Commun., vol. 2010, Apr. 2010.
K.Wongthavarawat and A. Ganz, “IEEE 802.16 based last mile broadband wireless military networks with quality of
service support,” in Proc. Military Communications Conf., 2003, vol. 2, pp. 779–784.
A. Sayenko, O. Alanen, and T. Hamalainen, “Scheduling solution for the IEEE 802.16 base station,” Int. J. Comp.
and Telecommun. Netw., vol. 52, pp. 96–115, Jan. 2008.
R. Jain, C. So-In, and A. Al-Tamimi, “System level modeling of IEEE 802.16e Mobile WiMAX networks: Key
issues,” IEEE Wireless Comm. Mag., vol. 15, no. 5, pp. 73–79, Oct. 2008.
A. Ghosh et al., “Broadband Wireless Access with WiMAX /802.16: Current Performance Benchmarks and Future
Potential,” IEEE Commun. Mag., vol. 43, Feb. 2005, pp. 129–36.
IEEE 802.16-2004, “Local and Metropolitan Networks — Part 16: Air Interface for Fixed Broadband Wireless
Access Systems,” 2004.
IEEE 802.16e-2005, “Local and Metropolitan Networks — Part 16: Air Interface for Fixed and Mobile Broadband
Wireless Access Systems, Amendment 2: Physical and Medium Access Control Layers for Combined Fixed and
Mobile Operation in Licensed Bands and Corrigendum 1,” 2006.
Q. Liu, X. Wang and G. B. Giannakis, “A Cross-Layer Scheduling Algorithm with QoS Support in Wireless
Networks,” IEEE Trans. Vehic. Tech., vol. 55, no. 3, May 2006, pp. 839–46.
 J. He, K. Guild, K. Yang, and H. Chen, “Modeling contention based bandwidth request scheme for IEEE 802.16
networks,” IEEE Commun. Lett., vol. 11, no. 8, pp. 698–700, Aug. 2007.
H. L. Vu, S. Chan, and L. L. H. Andrew, “Performance analysis of best-effort service in saturated IEEE 802.16
networks,” IEEE Trans. Veh. Technol., vol. 59, no. 1, pp. 460–472, Jan. 2010.
Y. P. Fallah, F. Agharebparast, M. R. Minhas, H. M. Alnuweiri, and C. M. Leung, “Analytical modeling of
contention-based bandwidth request mechanism in IEEE 802.16 wireless networks,” IEEE Trans. Veh. Technol., vol.
57, no. 5, pp. 3094–3107, Sep. 2008.
C. Cicconetti, A. Erta, L. Lenzini, and E. Mingozzi, “Performance evaluation of the IEEE 802.16MAC for QoS
support,” IEEE Trans. Mobile Comput., vol. 6, no. 1, pp. 26–38, Jan. 2007.
Q. Ni et al., “Investigation of bandwidth request mechanisms under point-to-multipoint mode of WiMAX networks,”
IEEE Commun. Mag., vol. 45, no. 5, pp. 132–138, May 2007.
C. Mohanram, S. Bhashyam, “Joint subcarrier and power allocation in channel-aware queue-aware scheduling for
multiuser ofdm”, IEEE Transactions on Wireless Communications 6 (9) (2007) 3208– 3213.
G. Kulkarni, S. Adlakha, M. Srivastava, “Subcarrier allocation and bit loading algorithms for OFDMA based
wireless networks”, IEEE Transactions on Mobile Computing 4 (6) (2005) 652–662.
 K.D. Lee, V.C.M. Leung, “Fair allocation of subcarrier and power in an OFDMA wireless mesh network”, IEEE
Journal on Selected Areas in Communications 24 (11) (2006) 2051–2060.
P. Thulasiraman, X. Shen, “Interference aware subcarrier assignment for throughput maximization in OFDMA
wireless relay mesh networks”, in: Proceedings of IEEE ICC, 2009, pp. 1–6.
P. Li, M. Rong, Y. Xue, E. Schulz, “Reuse one frequency planning for two-hop cellular system with fixed relay
nodes”, in: Proc. IEEE WCNC’07, Hong Kong, China, March 2007.
IEEE 802.16j-06/015, “Harmonized contribution on 802.16j (mobile multihop relay) usage models”, 2006.
Sik Choi, Gyung-Ho Hwang, Taesoo Kwon, Ae-Ri Lim, andDong-Ho Cho, “Fast Handover Scheme for Real-Time
DownlinkServices in IEEE 802.16e BWA System”, Vehicular Technology Conference (2005 IEEE 61st), June 2005,
Volume 3, pp. 2028-2032.
I. Akyildz, J. Xie, and S. Mohanty, “A Survey of Mobility Management in Next Generation All IP Based Wireless
Systems,” IEEE Wireless Commun., vol. 11, no. 4, 2004,pp. 16–27.
R. Pabst et al., “Relay-based deployment concepts for wireless and mobile broadband radio”, IEEE Commun. Mag.
42 (9) (2004) 80–89.
 J. Cai, X. Shen, J.W. Mark, A.S. Alfa, “Semi-distributed user relaying algorithm for amplify-and-forward wireless
relay networks”, IEEE Trans. Wireless Commun. 7 (4) (2008) 1348–1357.

                                                       112
Genc V., Murphy S., Yu Y. and Murphy J., “IEEE 802.16J relay-based wireless access networks: an overview
[recent advances and evolution of WLAN and WMAN standards],” IEEE Wireless Communications, Vol. 15, Issue
5, pp. 56 – 63, Oct. 2008.
C. Cicconetti, L. Lenzini, E. Mingozzi and C. Eklund, “Quality of service support in IEEE 802.16 networks,” IEEE
Network, Vol. 20, pp. 50 – 55, Mar. 2006.
IEEE 802.16j, “Baseline Document for Draft Standard for Local and Metropolitan Area Networks Part 16: Air
Interface for Fixed and Mobile Broadband Wireless Access Systems,” pp. 1-314, Jun. 2007.
J. Kim, T. Lee and C. S. Hwang, “A dynamic channel assignment scheme with two thresholds for load balancing in
cellular networks”, IEEE Radio and Wireless Conference, pages 141-145, 1999.
 Y.-T. Wang and J.-P. Sheu , “Adaptive Channel Borrowing for Quality of Service in Wireless Cellular Networks”,
International Journal of Communication Systems (IJCS). Vol. 19, pages 205-224, March, 2006.
Berezdivin R, Breinig R, Topp R. “Next-generation wireless communications concepts and technologies”. IEEE
Communications Magazine 2002; 40(3): 108–116.
Q. Li et al., “Differential Feedback Scheme for Closed- Loop Beam forming,” IEEE 802.16m-09/0910927r5, May
2009.
H. Huang et al., “Network MIMO for Inter-cell Interference Mitigation,” IEEE 802.16m-08/044r1, Jan. 2008.




Authors
                 D.SatishKumar received his B.E., degree in Electrical and Electronics Engineering from Bharathiar
                 University and M.E. degree in Computer Science and Engineering from Manonmaniam Sundharnar
                 University respectively. He is currently working towards the PhD degree in Computer Science and
                 Engineering in Anna University of Technology Coimbatore, Tamil Nadu INDIA. His research interests
                 accumulate in the area of IEEE 802.16j Multi hop Mobile networks, Routing, WIMAX networks,
                 Network management in wired Networks and Wireless Networks.
                 Email: - satishcoimbatore@yahoo.co.in
                 Dr.N.Nagarajan received his B.Tech and M.E. degrees in Electronics Engineering at M.I.T Chennai.
                 He received his PhD in Faculty of information and communication engineering from Anna University,
                 Chennai. He is currently working as Principal, Coimbatore Institute of Engineering and Technology,
                 Coimbatore. He is member of board of study of faculty of information Technology at Anna University
                 of technology, Coimbatore. His specialization includes optical, wireless Adhoc and sensor networks.
                 He is guiding assorted research scholars in optical networks and wireless networks.
                 Email: - swekalnag@rediffmail.com




                                                         113

Mais conteúdo relacionado

Mais procurados

CCN -UNIT 1 PDF Notes for 7th EC
CCN -UNIT 1 PDF Notes for 7th ECCCN -UNIT 1 PDF Notes for 7th EC
CCN -UNIT 1 PDF Notes for 7th ECSURESHA V
 
SURVEYING BEST SUITABLE SCHEDULING ALGORITHM FOR WIMAX- WI-FI INTEGRATED HETE...
SURVEYING BEST SUITABLE SCHEDULING ALGORITHM FOR WIMAX- WI-FI INTEGRATED HETE...SURVEYING BEST SUITABLE SCHEDULING ALGORITHM FOR WIMAX- WI-FI INTEGRATED HETE...
SURVEYING BEST SUITABLE SCHEDULING ALGORITHM FOR WIMAX- WI-FI INTEGRATED HETE...cscpconf
 
WiMAX Features, Characteristics and Application in Wireless Technology Computing
WiMAX Features, Characteristics and Application in Wireless Technology ComputingWiMAX Features, Characteristics and Application in Wireless Technology Computing
WiMAX Features, Characteristics and Application in Wireless Technology Computingijtsrd
 
An Efficient Wireless Backhaul Utilizing MIMO Transmission and IPT Forwarding
An Efficient Wireless Backhaul Utilizing MIMO Transmission and IPT ForwardingAn Efficient Wireless Backhaul Utilizing MIMO Transmission and IPT Forwarding
An Efficient Wireless Backhaul Utilizing MIMO Transmission and IPT ForwardingCSCJournals
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
Handover Behaviour of Transparent Relay in WiMAX Networks
Handover Behaviour of Transparent Relay in WiMAX NetworksHandover Behaviour of Transparent Relay in WiMAX Networks
Handover Behaviour of Transparent Relay in WiMAX NetworksIDES Editor
 
Osi model detail description
Osi model  detail descriptionOsi model  detail description
Osi model detail descriptionBathshebaparimala
 
Module 3 wlan,bluetooth vlan
Module 3 wlan,bluetooth vlanModule 3 wlan,bluetooth vlan
Module 3 wlan,bluetooth vlanDeepak John
 
Ethernet Technology
Ethernet Technology Ethernet Technology
Ethernet Technology Ali Usman
 
IEEE 802.11n Based Wireless Backhaul Enabled by Dual Channel IPT (DCH-IPT) Fo...
IEEE 802.11n Based Wireless Backhaul Enabled by Dual Channel IPT (DCH-IPT) Fo...IEEE 802.11n Based Wireless Backhaul Enabled by Dual Channel IPT (DCH-IPT) Fo...
IEEE 802.11n Based Wireless Backhaul Enabled by Dual Channel IPT (DCH-IPT) Fo...CSCJournals
 
Optical ethernet krunal
Optical ethernet krunalOptical ethernet krunal
Optical ethernet krunalKrunal Jabade
 
Illuminating Optical Ethernet Networks!
Illuminating Optical Ethernet Networks!Illuminating Optical Ethernet Networks!
Illuminating Optical Ethernet Networks!Vishal Sharma, Ph.D.
 

Mais procurados (20)

CCN -UNIT 1 PDF Notes for 7th EC
CCN -UNIT 1 PDF Notes for 7th ECCCN -UNIT 1 PDF Notes for 7th EC
CCN -UNIT 1 PDF Notes for 7th EC
 
SURVEYING BEST SUITABLE SCHEDULING ALGORITHM FOR WIMAX- WI-FI INTEGRATED HETE...
SURVEYING BEST SUITABLE SCHEDULING ALGORITHM FOR WIMAX- WI-FI INTEGRATED HETE...SURVEYING BEST SUITABLE SCHEDULING ALGORITHM FOR WIMAX- WI-FI INTEGRATED HETE...
SURVEYING BEST SUITABLE SCHEDULING ALGORITHM FOR WIMAX- WI-FI INTEGRATED HETE...
 
WiMAX Features, Characteristics and Application in Wireless Technology Computing
WiMAX Features, Characteristics and Application in Wireless Technology ComputingWiMAX Features, Characteristics and Application in Wireless Technology Computing
WiMAX Features, Characteristics and Application in Wireless Technology Computing
 
An Efficient Wireless Backhaul Utilizing MIMO Transmission and IPT Forwarding
An Efficient Wireless Backhaul Utilizing MIMO Transmission and IPT ForwardingAn Efficient Wireless Backhaul Utilizing MIMO Transmission and IPT Forwarding
An Efficient Wireless Backhaul Utilizing MIMO Transmission and IPT Forwarding
 
A secure and service oriented
A secure and service orientedA secure and service oriented
A secure and service oriented
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
J010216776
J010216776J010216776
J010216776
 
Ccna day1
Ccna day1Ccna day1
Ccna day1
 
Ccna day1
Ccna day1Ccna day1
Ccna day1
 
Handover Behaviour of Transparent Relay in WiMAX Networks
Handover Behaviour of Transparent Relay in WiMAX NetworksHandover Behaviour of Transparent Relay in WiMAX Networks
Handover Behaviour of Transparent Relay in WiMAX Networks
 
Osi model detail description
Osi model  detail descriptionOsi model  detail description
Osi model detail description
 
Module 3 wlan,bluetooth vlan
Module 3 wlan,bluetooth vlanModule 3 wlan,bluetooth vlan
Module 3 wlan,bluetooth vlan
 
Ethernet Technology
Ethernet Technology Ethernet Technology
Ethernet Technology
 
27 122-1-pb
27 122-1-pb27 122-1-pb
27 122-1-pb
 
IEEE 802.11n Based Wireless Backhaul Enabled by Dual Channel IPT (DCH-IPT) Fo...
IEEE 802.11n Based Wireless Backhaul Enabled by Dual Channel IPT (DCH-IPT) Fo...IEEE 802.11n Based Wireless Backhaul Enabled by Dual Channel IPT (DCH-IPT) Fo...
IEEE 802.11n Based Wireless Backhaul Enabled by Dual Channel IPT (DCH-IPT) Fo...
 
Optical ethernet krunal
Optical ethernet krunalOptical ethernet krunal
Optical ethernet krunal
 
Ccna day1
Ccna day1Ccna day1
Ccna day1
 
Ccna day1
Ccna day1Ccna day1
Ccna day1
 
Illuminating Optical Ethernet Networks!
Illuminating Optical Ethernet Networks!Illuminating Optical Ethernet Networks!
Illuminating Optical Ethernet Networks!
 
Ccna day1
Ccna day1Ccna day1
Ccna day1
 

Destaque

White paper transparent electronics
White paper transparent electronicsWhite paper transparent electronics
White paper transparent electronicsn-tech Research
 
Transparent electronics
Transparent electronicsTransparent electronics
Transparent electronicsAKSHAY K
 
IEEE BASE paper on artifical retina using TTF technology
IEEE BASE paper on artifical retina using TTF technologyIEEE BASE paper on artifical retina using TTF technology
IEEE BASE paper on artifical retina using TTF technologyAnu Antony
 
Transparent electronics
Transparent electronicsTransparent electronics
Transparent electronicsAakash Varma
 
transparent electronics ppt
transparent electronics ppttransparent electronics ppt
transparent electronics pptArya Viswanath
 
Artificial retina using thin film transistor report
Artificial retina  using thin film transistor reportArtificial retina  using thin film transistor report
Artificial retina using thin film transistor reportRam B
 

Destaque (8)

White paper transparent electronics
White paper transparent electronicsWhite paper transparent electronics
White paper transparent electronics
 
Transparent electronics
Transparent electronicsTransparent electronics
Transparent electronics
 
IEEE BASE paper on artifical retina using TTF technology
IEEE BASE paper on artifical retina using TTF technologyIEEE BASE paper on artifical retina using TTF technology
IEEE BASE paper on artifical retina using TTF technology
 
Tony
TonyTony
Tony
 
Transparent electronics
Transparent electronicsTransparent electronics
Transparent electronics
 
transparent electronics
transparent electronicstransparent electronics
transparent electronics
 
transparent electronics ppt
transparent electronics ppttransparent electronics ppt
transparent electronics ppt
 
Artificial retina using thin film transistor report
Artificial retina  using thin film transistor reportArtificial retina  using thin film transistor report
Artificial retina using thin film transistor report
 

Semelhante a 10 satishkumar final_paper--105--113

Seamless ho within wifi wimax
Seamless ho within wifi wimaxSeamless ho within wifi wimax
Seamless ho within wifi wimaxWily Langit
 
Analysis of WiMAX Physical Layer Using Spatial Multiplexing Under Different F...
Analysis of WiMAX Physical Layer Using Spatial Multiplexing Under Different F...Analysis of WiMAX Physical Layer Using Spatial Multiplexing Under Different F...
Analysis of WiMAX Physical Layer Using Spatial Multiplexing Under Different F...CSCJournals
 
Performance Analysis of Different Combination of Mimo Antenna System using Di...
Performance Analysis of Different Combination of Mimo Antenna System using Di...Performance Analysis of Different Combination of Mimo Antenna System using Di...
Performance Analysis of Different Combination of Mimo Antenna System using Di...ijtsrd
 
Wireless Mesh Networks Based on MBPSO Algorithm to Improvement Throughput
Wireless Mesh Networks Based on MBPSO Algorithm to Improvement Throughput Wireless Mesh Networks Based on MBPSO Algorithm to Improvement Throughput
Wireless Mesh Networks Based on MBPSO Algorithm to Improvement Throughput IJECEIAES
 
IEEE 802 Standard Network’s Comparison under Grid and Random Node Arrangement...
IEEE 802 Standard Network’s Comparison under Grid and Random Node Arrangement...IEEE 802 Standard Network’s Comparison under Grid and Random Node Arrangement...
IEEE 802 Standard Network’s Comparison under Grid and Random Node Arrangement...Eswar Publications
 
Performance evaluation of qos in
Performance evaluation of qos inPerformance evaluation of qos in
Performance evaluation of qos incaijjournal
 
Opnet based simulation and investigation of wimax network using different qo s
Opnet based simulation and investigation of wimax network using different qo sOpnet based simulation and investigation of wimax network using different qo s
Opnet based simulation and investigation of wimax network using different qo seSAT Publishing House
 
BER PERFORMANCE ANALYSIS FOR WIMAX PHY LAYER UNDER DIFFERENT CHANNEL CONDITIONS
BER PERFORMANCE ANALYSIS FOR WIMAX PHY LAYER UNDER DIFFERENT CHANNEL CONDITIONSBER PERFORMANCE ANALYSIS FOR WIMAX PHY LAYER UNDER DIFFERENT CHANNEL CONDITIONS
BER PERFORMANCE ANALYSIS FOR WIMAX PHY LAYER UNDER DIFFERENT CHANNEL CONDITIONSijistjournal
 
Ct3210321037
Ct3210321037Ct3210321037
Ct3210321037IJMER
 
What Is Routing Overhead Of The Network
What Is Routing Overhead Of The NetworkWhat Is Routing Overhead Of The Network
What Is Routing Overhead Of The NetworkPatricia Viljoen
 
Performance analysis of IEEE 802.11ac based WLAN in wireless communication sy...
Performance analysis of IEEE 802.11ac based WLAN in wireless communication sy...Performance analysis of IEEE 802.11ac based WLAN in wireless communication sy...
Performance analysis of IEEE 802.11ac based WLAN in wireless communication sy...IJECEIAES
 
Data Transmission Analysis using MW-5000 at 5.8 GHz Frequency
Data Transmission Analysis using MW-5000  at 5.8 GHz Frequency Data Transmission Analysis using MW-5000  at 5.8 GHz Frequency
Data Transmission Analysis using MW-5000 at 5.8 GHz Frequency IJECEIAES
 
A MODIFIED IEEE 802.15.6 MAC SCHEME TO ENHANCE PERFORMANCE OF WIRELESS BODY A...
A MODIFIED IEEE 802.15.6 MAC SCHEME TO ENHANCE PERFORMANCE OF WIRELESS BODY A...A MODIFIED IEEE 802.15.6 MAC SCHEME TO ENHANCE PERFORMANCE OF WIRELESS BODY A...
A MODIFIED IEEE 802.15.6 MAC SCHEME TO ENHANCE PERFORMANCE OF WIRELESS BODY A...ijwmn
 
A MODIFIED IEEE 802.15.6 MAC SCHEME TO ENHANCE PERFORMANCE OF WIRELESS BODY A...
A MODIFIED IEEE 802.15.6 MAC SCHEME TO ENHANCE PERFORMANCE OF WIRELESS BODY A...A MODIFIED IEEE 802.15.6 MAC SCHEME TO ENHANCE PERFORMANCE OF WIRELESS BODY A...
A MODIFIED IEEE 802.15.6 MAC SCHEME TO ENHANCE PERFORMANCE OF WIRELESS BODY A...ijwmn
 

Semelhante a 10 satishkumar final_paper--105--113 (20)

Thesis on Wimax
Thesis on WimaxThesis on Wimax
Thesis on Wimax
 
Seamless ho within wifi wimax
Seamless ho within wifi wimaxSeamless ho within wifi wimax
Seamless ho within wifi wimax
 
Analysis of WiMAX Physical Layer Using Spatial Multiplexing Under Different F...
Analysis of WiMAX Physical Layer Using Spatial Multiplexing Under Different F...Analysis of WiMAX Physical Layer Using Spatial Multiplexing Under Different F...
Analysis of WiMAX Physical Layer Using Spatial Multiplexing Under Different F...
 
comparsion of LTE and wimax
comparsion of LTE and wimaxcomparsion of LTE and wimax
comparsion of LTE and wimax
 
Bn4201429438
Bn4201429438Bn4201429438
Bn4201429438
 
Performance Analysis of Different Combination of Mimo Antenna System using Di...
Performance Analysis of Different Combination of Mimo Antenna System using Di...Performance Analysis of Different Combination of Mimo Antenna System using Di...
Performance Analysis of Different Combination of Mimo Antenna System using Di...
 
Wireless Mesh Networks Based on MBPSO Algorithm to Improvement Throughput
Wireless Mesh Networks Based on MBPSO Algorithm to Improvement Throughput Wireless Mesh Networks Based on MBPSO Algorithm to Improvement Throughput
Wireless Mesh Networks Based on MBPSO Algorithm to Improvement Throughput
 
IEEE 802 Standard Network’s Comparison under Grid and Random Node Arrangement...
IEEE 802 Standard Network’s Comparison under Grid and Random Node Arrangement...IEEE 802 Standard Network’s Comparison under Grid and Random Node Arrangement...
IEEE 802 Standard Network’s Comparison under Grid and Random Node Arrangement...
 
Performance evaluation of qos in
Performance evaluation of qos inPerformance evaluation of qos in
Performance evaluation of qos in
 
Opnet based simulation and investigation of wimax network using different qo s
Opnet based simulation and investigation of wimax network using different qo sOpnet based simulation and investigation of wimax network using different qo s
Opnet based simulation and investigation of wimax network using different qo s
 
Gu3311901196
Gu3311901196Gu3311901196
Gu3311901196
 
BER PERFORMANCE ANALYSIS FOR WIMAX PHY LAYER UNDER DIFFERENT CHANNEL CONDITIONS
BER PERFORMANCE ANALYSIS FOR WIMAX PHY LAYER UNDER DIFFERENT CHANNEL CONDITIONSBER PERFORMANCE ANALYSIS FOR WIMAX PHY LAYER UNDER DIFFERENT CHANNEL CONDITIONS
BER PERFORMANCE ANALYSIS FOR WIMAX PHY LAYER UNDER DIFFERENT CHANNEL CONDITIONS
 
N010328691
N010328691N010328691
N010328691
 
Ct3210321037
Ct3210321037Ct3210321037
Ct3210321037
 
What Is Routing Overhead Of The Network
What Is Routing Overhead Of The NetworkWhat Is Routing Overhead Of The Network
What Is Routing Overhead Of The Network
 
Performance analysis of IEEE 802.11ac based WLAN in wireless communication sy...
Performance analysis of IEEE 802.11ac based WLAN in wireless communication sy...Performance analysis of IEEE 802.11ac based WLAN in wireless communication sy...
Performance analysis of IEEE 802.11ac based WLAN in wireless communication sy...
 
Data Transmission Analysis using MW-5000 at 5.8 GHz Frequency
Data Transmission Analysis using MW-5000  at 5.8 GHz Frequency Data Transmission Analysis using MW-5000  at 5.8 GHz Frequency
Data Transmission Analysis using MW-5000 at 5.8 GHz Frequency
 
IEEE802.16-Anoverview
IEEE802.16-AnoverviewIEEE802.16-Anoverview
IEEE802.16-Anoverview
 
A MODIFIED IEEE 802.15.6 MAC SCHEME TO ENHANCE PERFORMANCE OF WIRELESS BODY A...
A MODIFIED IEEE 802.15.6 MAC SCHEME TO ENHANCE PERFORMANCE OF WIRELESS BODY A...A MODIFIED IEEE 802.15.6 MAC SCHEME TO ENHANCE PERFORMANCE OF WIRELESS BODY A...
A MODIFIED IEEE 802.15.6 MAC SCHEME TO ENHANCE PERFORMANCE OF WIRELESS BODY A...
 
A MODIFIED IEEE 802.15.6 MAC SCHEME TO ENHANCE PERFORMANCE OF WIRELESS BODY A...
A MODIFIED IEEE 802.15.6 MAC SCHEME TO ENHANCE PERFORMANCE OF WIRELESS BODY A...A MODIFIED IEEE 802.15.6 MAC SCHEME TO ENHANCE PERFORMANCE OF WIRELESS BODY A...
A MODIFIED IEEE 802.15.6 MAC SCHEME TO ENHANCE PERFORMANCE OF WIRELESS BODY A...
 

Mais de Alexander Decker

Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...Alexander Decker
 
A validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale inA validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale inAlexander Decker
 
A usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websitesA usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websitesAlexander Decker
 
A universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banksA universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banksAlexander Decker
 
A unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized dA unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized dAlexander Decker
 
A trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistanceA trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistanceAlexander Decker
 
A transformational generative approach towards understanding al-istifham
A transformational  generative approach towards understanding al-istifhamA transformational  generative approach towards understanding al-istifham
A transformational generative approach towards understanding al-istifhamAlexander Decker
 
A time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibiaA time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibiaAlexander Decker
 
A therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school childrenA therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school childrenAlexander Decker
 
A theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banksA theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banksAlexander Decker
 
A systematic evaluation of link budget for
A systematic evaluation of link budget forA systematic evaluation of link budget for
A systematic evaluation of link budget forAlexander Decker
 
A synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjabA synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjabAlexander Decker
 
A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...Alexander Decker
 
A survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incrementalA survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incrementalAlexander Decker
 
A survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniquesA survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniquesAlexander Decker
 
A survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo dbA survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo dbAlexander Decker
 
A survey on challenges to the media cloud
A survey on challenges to the media cloudA survey on challenges to the media cloud
A survey on challenges to the media cloudAlexander Decker
 
A survey of provenance leveraged
A survey of provenance leveragedA survey of provenance leveraged
A survey of provenance leveragedAlexander Decker
 
A survey of private equity investments in kenya
A survey of private equity investments in kenyaA survey of private equity investments in kenya
A survey of private equity investments in kenyaAlexander Decker
 
A study to measures the financial health of
A study to measures the financial health ofA study to measures the financial health of
A study to measures the financial health ofAlexander Decker
 

Mais de Alexander Decker (20)

Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...
 
A validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale inA validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale in
 
A usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websitesA usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websites
 
A universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banksA universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banks
 
A unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized dA unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized d
 
A trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistanceA trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistance
 
A transformational generative approach towards understanding al-istifham
A transformational  generative approach towards understanding al-istifhamA transformational  generative approach towards understanding al-istifham
A transformational generative approach towards understanding al-istifham
 
A time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibiaA time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibia
 
A therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school childrenA therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school children
 
A theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banksA theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banks
 
A systematic evaluation of link budget for
A systematic evaluation of link budget forA systematic evaluation of link budget for
A systematic evaluation of link budget for
 
A synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjabA synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjab
 
A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...
 
A survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incrementalA survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incremental
 
A survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniquesA survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniques
 
A survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo dbA survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo db
 
A survey on challenges to the media cloud
A survey on challenges to the media cloudA survey on challenges to the media cloud
A survey on challenges to the media cloud
 
A survey of provenance leveraged
A survey of provenance leveragedA survey of provenance leveraged
A survey of provenance leveraged
 
A survey of private equity investments in kenya
A survey of private equity investments in kenyaA survey of private equity investments in kenya
A survey of private equity investments in kenya
 
A study to measures the financial health of
A study to measures the financial health ofA study to measures the financial health of
A study to measures the financial health of
 

Último

Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 

Último (20)

Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 

10 satishkumar final_paper--105--113

  • 1. Computer Engineering and Intelligent Systems www.iiste.org ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online) Vol 2, No.3 Relay Technologies in IEEE 802.16j Mobile Multi-hop Relay (MMR) Networks D.Satish Kumar (Corresponding author) Department of Electrical and Electronics Engineering, Kalignar Karunanidhi Institute of Technology Coimbatore-641402, Tamilnadu, India. Tel: +919843723396, Email: satishcoimbatore@yahoo.co.in Dr.N.Nagarajan Department of Computer Science and Engineering, Coimbatore Institute of Engineering and Technology Coimbatore-641109, Tamilnadu, India Email: swekalnag@gmail.com Abstract IEEE 802.16 standard is created to compete with cable access networks. In the beginning end users are immobile and have a line of sight with base station, now it moved to mobile non line of sight (NLOS) with the new standard IEEE 802.16e and IEEE 802.16j. The new IEEE 802.16j standard which is an amendment to IEEE 802.16e is mobile multi hop relay (MMR) specification for wireless networks. This paper discusses relay modes, relay transmission schemes and relay pairing schemes of IEEE 802.16j. Relay technologies such as transparent relay modes, non transparent relay mode, relay pairing schemes such as centralized relay pairing schemes, distributed relay pairing scheme, characterises of relay based networks such as throughput enhancement, capacity increase, cost reduction , relay techniques such as time domain frequency domain relay techniques and relay placement are also discussed in this paper. The paper also discusses about integration of IEEE 802.16j with IEEE 802.11. Keywords: IEEE 802.16j, Relay pairing schemes, relay techniques, Relay modes, WIMAX, NCTUns, etc Contents 1. Introduction-Wireless Groups. 2. IEEE 802.16j Standard 3. WiMAX Forum. 4. Relay Modes. a) Transparent Mode b) Non Transparent Mode 5. Relay Transmission Schemes. a) Amplify and Forward b) Selective Decode and Forward. c) Demodulation and Forward. 6. Relay Pairing Schemes. a) Centralized Relay Pairing Schemes. b) Distributed Relay Pairing Schemes 7. Relay Placement. 8. Characteristics of Relay based Networks. 9. Relaying Techniques. 10. Multiple-Input Multiple-Output (MIMO) communication for IEEE 802.16j 11. IEEE 802.16j Protocol Layering. a) Data/Control Plane. 105
  • 2. b) Management Plane. 12. IEEE 802.16j [WIMAX] Integration with IEEE 802.11n [Wi-Fi] 13. Conclusion And Future Works 14. References 1. Introduction-Wireless Groups Wireless systems for achieving high speed mobile wireless access services can be divided into two groups. The first group is International Mobile telecommunications-2000 [IMT-2000] which include wideband code division multiple access(W- CDMA), high speed downlink packet access (HSDPA), high speed uplink packet access (HSUPA), High speed packet access plus (HSUPA+), LTE/LTE-Advanced specified by 3GPP (3rd generation Partnership project ) , CDMA2000 1x and Ultra Mobile Broadband (UMB) specified by 3GPP2. The second group consists of IEEE 802.16e, IEEE 802.16j [1], and IEEE 802.16m [1] standard specified by IEEE 802.16 committee. The second group is also called as Worldwide interoperability for Microwave access (WiMAX) standard is one of the 4G (4th generation ) telecommunication technologies that supplies wireless communication of data through different transmission links like point to multi point. Two groups which play role in the development of IEEE 802.16j standard is, IEEE 802.16 working group on Broadband wireless Access standard which develop standards and recommended practices to support the development of broadband Wireless metropolitan area networks and WiMAX forum which certify and promotes broadband wireless product based on IEEE 802.16 standard. 2. IEEE 802.16J Standard The new task group IEEE 802.16j-2009 standard [1][2] of IEEE 802.16 Air interface for Broadband Wireless Access was officially established in March 2006, in order to support mobile multi-hop relay (MMR) specification, mesh mode is removed in the IEEE 802.16 -2009 standard.. The specification is shown in table 2, it is an amendment of IEEE 802.16e [3][4][5][6] standard for enhancing coverage throughput as shown in fig 1 and system capacity. It provides multi hop wireless connectivity where traffic between a base station (BS) and a subscriber station (SS) can be relayed through a relay station. This system enables mobile stations to communicate with a base station through intermediate relay station. Multihop relay station (M-RS) is an optional deployment that may be used to provide additional coverage or performance advantage in an access network. The RS may be fixed in location or, in the case of an access RS, it may be mobile access RS. Most of the time the RS will act as a BS and should have its own physical cell identifier, and also it should be able to transmit its own synchronization channels and control information. There should be no difference between cell control in RS and BS. The radio link originating or terminating at an MS is named as the access link, but the link between BS and RS or between pair of RSs is called relay link. Theses access link and relay link can be used for uplink and downlink data transmission. This standard [7][8][9]defines the physical and the MAC layer specifications for MMR networks. The MAC layer supports functions such as network entry, bandwidth request, forwarding of PDUs, connection management and Hand over. The PHY layer adopts orthogonal frequency division multiple access (OFDMA) [1][2][3] as the primary channel access mechanism for non-line of sight (NLOS) communications in the frequency band below 11 GHz. Where multiple users are allocated separate set of slots, so that they can communicate in parallel. It supports point to multipoint (PMP) network topology where resource allocation is performed by BS on a per connection basis and the SSs are treated equally. MIMO [2] techniques have ability to exploit NLOS channels and increase spectral efficiency compared to single input single output (SISO) systems. It is able to provide high capacity and data rate without increasing bandwidth. The gain of MIMO is multiplexing gains, diversity gains and array gains. Fig 1: IEEE 802.16j Mobile multi hop relay (MMR) network. The aim of this paper, to the best of our knowledge the first of its kind, is to give an overview of the relay technologies in IEEE 802.16j along with the different proposed and probable research solutions, starting right from the advent of IEEE 106
  • 3. 802.16e technology until today, thus identifying the research directions related to the existing and future technologies of WiMAX.. In this article, we focus on the mobile WiMAX , IEEE 802.16j mobile multi hop relay (MMR) technology and will use the acronym ’ “IEEE 802.16j’ instead of Mobile WiMAX IEEE 802.16j mobile multi hop relay (MMR) in the rest of the paper. The rest of the article is organized as follows. In section I, we briefly recapitulate the different relay modes, relay transmission schemes, and relay pairing schemes, techniques in IEEE 802.16j’ . In section II we brief discussed about the different technical issues in Physical layer of IEEE 802.16j’ and present a comparative study of the advantages of the different Physical layer technical issues. This is followed in section III by a brief discussion about the different technical issues in MAC-CPS layer of the IEEE 802.16j technology and their relevancy. This is followed in section IV by a brief discussion about the different technical issues in MAC-Security layer of the IEEE 802.16j technology. Section IV presents a brief comparative study between IEEE 802.16j and LTE technologies. Conclusions are drawn in Section V. 3. WiMAX Forum The WiMAX forum [3] was established in 2003 to promote deployment of WiMAX as a broadband wireless access technology. It initiated several technical specifications and allows certification of WiMAX products. The network specification involve interaction with other standard organization include IETF, 3GPP, 3GPP2, DSL forum, and OMA. 4. RELAY MODES Two different relay modes [1] are defined in this standard, transparent mode and Non- transparent mode. a. Transparent Mode The transparent relay mode [1] increases the throughput which facilities capacity increases within the Bs coverage area. It has no support to coverage extension because it does not forward framing information to BS. It is operated in two hop network topology and supports centralized scheduling only as scheduling is done only in BS. It uses CID based forwarding scheme and supports embedded and explicit mode of path management. Fig 2: Non-tranparent mode channel parameters b. Non transparent relay mode The Non transparent relay mode [1] as in fig 3 is to increase the coverage extension of BS, here RS generate its own framing information and forward it to SSs. It operates is 2 or more hops and uses centralized or distributed scheduling mode, as scheduling is done in BS and RSs. It used CID and Tunnel based forwarding scheme and supports embedded and explicit mode of path management. The channel parameters are shown in fig 2 Fig 3: Non-tranparent mode of operation. The transparent relay station does not transmit control message, permeable, FCH (frame control header, and DL/UL-MAP, as it only increases system throughput. The non transparent relay station transmit control message, permeable, FCH (frame 107
  • 4. control header, and DL/UL-MAP, as it increases system throughput and increases cell coverage. Table 1 shows the difference between transparent and non transparent mode of operation. 5. Relay Transmission Schemes There are many relay transmission schemes [24[26] proposed, they are Amplify and forward, selective Decode and forward, Demodulation and forward. a. Amplify And Forward Here the relay receives signal from the BS or SSs in the first phase it amplify this signal and forwards it to the SSs or BS in second phase. This is very simple and short delay relay transmission scheme. b. Selective Decode and Forward. Here also the relay receives signal from the BS or SSs in the first phase it decodes the signal and the decoded data is checked for cyclic redundancy check (CRC) then the decoded data is coded and forwards it to the SSs or BS in second phase. This scheme avoids error propagation through the channel. c. Demodulation and Forward. Here also the relay receives signal from the BS or SSs in the first phase it demodulate the signal without decoding and then it modulates and forwards it to the SSs or BS in second phase. TABLE-1 S.No Transparent Mode Non Transparent Mode Supports Centralized or Supports Centralized Distributed scheduling- as 1. scheduling - as scheduling scheduling done in base and done only in base station relay station Use CID based forwarding Use Tunnel based or CID based 2. scheme forwarding scheme 3. Use only 2 hops Use 2 or more Hops Does not provide coverage 4. Provides BS coverage extension. extension 5. Low Relay station cost. High Relay station cost. 6. Relay Pairing Schemes Pairing scheme [24] is developed for having collaboration between RSs and BS in data transmission. This will improve the coverage and throughput of the mobile multi hop relay (MMR) networks. There are two pairing schemes proposed, Centralized pairing scheme and distributed pairing scheme. The other Relay pairing schemes are Random Relay Pairing Schemes and Opportunistic Relay Pairing Schemes a. Centralized Relay Pairing Schemes In this scheme the BS will act as a control node and collects the channel and location information from all the RSs and SSs and then make the pairing decision. This information must be formed as a service set and periodically updated in the local BS to capture dynamic changes of SSs This scheme requires more signaling over head, and can achieve better performance gains. b. Distributed Relay Pairing Schemes In this scheme, RS collects the channel and location information from all the nearby SSs and then makes the pairing decision. First each RS identify its service set of neighborhood SSs and also the channel conditions between its BS as well as its SS, those RS with single service set each randomly selects a time slot from the N- slots in the pairing scheme. If multiple RS choose the same time slot then collusion occurs and those RS will be trying again in the next pairing scheme. 7. Relay Placement By deploying relay stations [26] in lower SINR cell boundary area the system capacity, throughput per user, and the system reliability can be enhanced. The Relay placement is formulated as an optimization problem and solved by and iterative algorithm, under the assumption that MS distribution is uniform. In some cases large geographic area under non 108
  • 5. uniformly distributed traffic demand is considered. The locations of BS are determined in the first stage network deployment. An RS location algorithm is designed to locate RSs. 8. Characteristics of Relay Based Networks. Relay based networks[15][16][17][18] has small form factor, low cost relays associated with Base stations. Three main benefits provided from relay based architecture over single {hop architecture are throughput enhancement, coverage increase and deployment cost. a. Throughput Enhancement: It is expected to increase system capacity by deploying RSs in a manner that enables more aggressive spatial reuse. b. Coverage Enhancement/Extension: The relay technology is expected to improve the coverage reliability in geographic areas that are severely shadowed from the BS and/or to extend the range of a BS. c. Cost Reduction: Relay based systems have the potential to deliver cost gains over traditional single {hop wireless access systems. Using RSs, an operator could deploy a network with wide coverage at a lower cost than using only (more) expensive BSs to provide good coverage and system capacity. 9. Relaying Techniques: The Relaying techniques[15][16][17][18] [26] include the conventional techniques (i) time domain relaying, (ii) frequency domain relaying and (iii) hybrid time/frequency domain relaying and the current technique that is interest among the research community is (iv) co-operative technique. a. Time Domain Relaying: In this scheme relays access the Medium in time multiplex. The resources are further divided in time in either the DL or UL to allow the relay station to receive and transmit data. b. Frequency Domain Relaying: Relays are operating on different frequency channels. The main advantage of this scheme is that relays can transmit and receive data simultaneously. c. Hybrid Time/Frequency Domain Relaying: Relays are operating periodically on different frequency channels to forward data. The idea here is to switch between two frequencies in order to allow the BS to transmit to its client while the relay is forwarding data on another frequency. d. Cooperative Relaying Techniques: Such techniques can significantly enhance the performance of relay based systems by multiple RSs cooperatively transmitting the same data to a SS or the BS, i.e. in the DL or UL. This leads to similar benefits than in MIMO systems with transmit/receive diversity and spatial multiplexing. 10. Multiple-Input Multiple-Output (MIMO) Communication for IEEE 802.16j. MIMO- Multiple-Input Multiple-Output techniques have been used in IEEE 802.16d/e/j to improve cell coverage and increase average user with in the cell. MIMO transmission [26][11[12] is used to increase the data rate of the communication between a given transmitter-receiver pair and/or improve the reliability of the link. Use of multiple antennas can improve the achievable rates of users in the network with given frequency. As MIMO technology matures it is expected that MIMO will be widely used for wireless communication. For Next Generation WiMAX a system is to support at least up to 8 transmit antennas at the base station, 4 streams and Space-Time Coding. MIMO futures such as closed-loop MIMO will be included in future WiMAX More specifically, it has been already decided to support closed- loop MIMO using Channel Quality Information, Precoding Matrix Index and rank feedback in future systems. The MIMO techniques [32][33] are Single User MIMO ( SU-MOMO) , Multi User MIMO (MU-MIMO) and cooperative MIMO. The adoption of MIMO techniques often requires a tight design integration of PHY, medium access control (MAC), and higher layers of IEEE 802.16j. The key MIMO techniques are ; Open-loop transmit diversity in DL, Open- loop spatial multiplexing in DL, Open-loop transmit diversity in UL, Open-loop spatial multiplexing in UL, Collaborative spatial multiplexing in UL (UL MU-MIMO), Adaptive beam forming including DL SDMA (DL MU-MIMO), Closed- loop antenna grouping/selection, Closed-loop codebook-based pre-coding. These above features are included in Release 1.0 and 1.5 of WiMAX forum. a. Single User MIMO ( SU-MOMO) 109
  • 6. In SU-MOMO [32] the transmitter and receiver are equipped with M and N antennas. The channel is Rayleigh or Rician fading channel. Based on the full or partial availability of Channel State Information (CSI) to receiver and transmitter SU- MOMO is classified in to open loop SU-MOMO and closed loop MIMO. b. Open loop SU-MOMO Open-loop MIMO systems[32] are more desirable in mobility applications because they do not require CSI as 802.16e support mobility of up to 120 km/h. 802.16e adopts space-time coding (STC) as the main open-loop MIMO scheme. STC is supported for both the uplink and downlink, for up to four transmit antennas, and for a multiplexing rate up to 4. STC option allows low complexity decoding, while others are optimized for high complexity decoding. Cyclic delay diversity (CDD) is another open-loop scheme. Too much CDD delay may reduce the receiver’s channel estimation accuracy due to the augmented frequency fluctuation. c. Closed- loop SU-MOMO Closed-loop systems[33] can achieve better performance than open-loop systems by exploiting CSIT. d. Multi User MIMO (MU-MIMO) MU-MIMO [32] allows multiple SSs to spatially share the same time-frequency resource for the improvement of both the cell spectral efficiency and average user experience. e. Distributed MIMO and Relay in IEEE 802.16j. Among BS, RS(s), and SS, a distributed MIMO system is formed with all the transmit antennas of BS and RS on one side and the receive antennas of the destination SS on the other side. New MOMO techniques [33] are open-loop multiuser MIMO, and collaborative multicell MIMO. In the multicell MIMO multiple BSs collaborate to serve multiple SSs in the edge region of the BSs’ cell. A precoding entity in the network backhaul will decide the precoding vectors used for all SSs in all the BSs. The multicell MIMO system has the potential to eliminate dominant intercell interferences, while offering multiplexing rate and diversity gain. 11. IEEE 802.16j Protocol Layering IEEE 802.16j protocol layering[13][14][15][26] consists of Data/Control Plane and Management plane. The Data/Control Plane defines PHY and MAC layers. The Management plane defines respective management entity of PHY and MAC layers. Fig 4: IEEE 802.16j MAC –CPS and SSCS sublayers 110
  • 7. Fig 5: IEEE 802.16j protocol layering. a. Data /Control Plane The IEEE 802.16j data /control plane as in fig 5 includes the Physical layer (PHY), MAC common part sub layer (MAC- CPS) and MAC convergence sub layer (MAC-CS). The MAC common part sub layer as in fig 4 includes connection admission control, Link management, ARQ, scheduler Downlink/uplink burst processing. The MAC convergence sub layer Network management, configuration management, uplink packet reassembly and downlink packet classifier. b. Management Plane: The management plane as in fig 5 includes the corresponding Management entity of Physical layer (PHY), MAC common part sub layer (MAC-CPS) and MAC convergence sub layer (MAC-CS). 12. IEEE 802.16j [WIMAX] Integration with IEEE 802.11n [Wi-Fi] WiFi also called as WLAN or IEEE 802.11 provide wireless connectivity to local networks in unlicensed frequency band and offers low or free of cost internet connectivity, but WiMAX designed for point to multi point (PMP) operates in licensed and unlicensed band provides broad band internet connectivity to last mile access. In WiFI subscriber stations are connected through access points (AP), but WiMAX subscriber stations are connected to base station (BS). The IEEE 802.16j standard provides PMP mode for SS outside the BS coverage area and use dedicated relay stations (RS) to support mobile nodes. For integration of Wi-Fi with WiMAX different scenarios are considered such as single mode client scenario, Dual mode client scenario, Backhaul scenario, multi hop heterogeneous scenario, Dual gate way single mode client scenario, Dual gate way Dual mode client scenario, Mobile / moving Networks scenario. In single mode client scenario SSs are connected to either BS1 or AP1 that is SS1 to BS1 if it is within the coverage area of BS1 and SS2 to AP1 if it is within the coverage area of AP1. In backhaul Scenario the SS1 are connected to internet through point to point backhaul connection (BSi-BSj). In dual mode SS1 is connected to both WiMAX BS and Wi-Fi AP. In dual gate way mode, a dual gateway will connect to SS and BS, that is provides coverage area of BS. In multi hop mode an RS can provide coverage extension to SS for both BS and also AP. In mobile network scenario a mobile gateway can be used by external clients outside the coverage area of Wi-Fi / WiMAX. 13. Conclusion and Future Works The new IEEE 802.16j standard which is an amendment to IEEE 802.16e is multi hop relay specification for wireless networks. Relay technologies such as transparent relay modes, non transparent relay mode, relay pairing schemes such as centralized relay pairing schemes, distributed relay pairing scheme, characterises of relay based networks such as throughput enhancement,capacity increase, cost reduction , relay techniques such as time domain frequency domain relay techniques and relay placement are also discussed in this paper. In future we are planning to solve some of the technical issues such as Network planning, Relay placement, scheduling services, bandwidth allocation etc. 14. References “IEEE Standard for Local and Metropolitan Area Networks: Part 16: Air Interface for Broadband Wireless Access Systems, IEEE Std 802.16- 2009”, May 2009, 2094 pp. C. So-In, R. Jain, and A. Al-Tamimi, “Scheduling in IEEE 802.16e WiMAX Networks: Key issues and a survey,” 111
  • 8. IEEE J. Select. Areas Commun., vol. 27, no. 2, pp. 156–171, Feb. 2009. C. So-In, R. Jain, and A. Al-Tamimi, “Capacity evaluation for IEEE 802.16e MobileWiMAX,” J. Comput. Syst., Networks, and Commun., vol. 2010, Apr. 2010. K.Wongthavarawat and A. Ganz, “IEEE 802.16 based last mile broadband wireless military networks with quality of service support,” in Proc. Military Communications Conf., 2003, vol. 2, pp. 779–784. A. Sayenko, O. Alanen, and T. Hamalainen, “Scheduling solution for the IEEE 802.16 base station,” Int. J. Comp. and Telecommun. Netw., vol. 52, pp. 96–115, Jan. 2008. R. Jain, C. So-In, and A. Al-Tamimi, “System level modeling of IEEE 802.16e Mobile WiMAX networks: Key issues,” IEEE Wireless Comm. Mag., vol. 15, no. 5, pp. 73–79, Oct. 2008. A. Ghosh et al., “Broadband Wireless Access with WiMAX /802.16: Current Performance Benchmarks and Future Potential,” IEEE Commun. Mag., vol. 43, Feb. 2005, pp. 129–36. IEEE 802.16-2004, “Local and Metropolitan Networks — Part 16: Air Interface for Fixed Broadband Wireless Access Systems,” 2004. IEEE 802.16e-2005, “Local and Metropolitan Networks — Part 16: Air Interface for Fixed and Mobile Broadband Wireless Access Systems, Amendment 2: Physical and Medium Access Control Layers for Combined Fixed and Mobile Operation in Licensed Bands and Corrigendum 1,” 2006. Q. Liu, X. Wang and G. B. Giannakis, “A Cross-Layer Scheduling Algorithm with QoS Support in Wireless Networks,” IEEE Trans. Vehic. Tech., vol. 55, no. 3, May 2006, pp. 839–46. J. He, K. Guild, K. Yang, and H. Chen, “Modeling contention based bandwidth request scheme for IEEE 802.16 networks,” IEEE Commun. Lett., vol. 11, no. 8, pp. 698–700, Aug. 2007. H. L. Vu, S. Chan, and L. L. H. Andrew, “Performance analysis of best-effort service in saturated IEEE 802.16 networks,” IEEE Trans. Veh. Technol., vol. 59, no. 1, pp. 460–472, Jan. 2010. Y. P. Fallah, F. Agharebparast, M. R. Minhas, H. M. Alnuweiri, and C. M. Leung, “Analytical modeling of contention-based bandwidth request mechanism in IEEE 802.16 wireless networks,” IEEE Trans. Veh. Technol., vol. 57, no. 5, pp. 3094–3107, Sep. 2008. C. Cicconetti, A. Erta, L. Lenzini, and E. Mingozzi, “Performance evaluation of the IEEE 802.16MAC for QoS support,” IEEE Trans. Mobile Comput., vol. 6, no. 1, pp. 26–38, Jan. 2007. Q. Ni et al., “Investigation of bandwidth request mechanisms under point-to-multipoint mode of WiMAX networks,” IEEE Commun. Mag., vol. 45, no. 5, pp. 132–138, May 2007. C. Mohanram, S. Bhashyam, “Joint subcarrier and power allocation in channel-aware queue-aware scheduling for multiuser ofdm”, IEEE Transactions on Wireless Communications 6 (9) (2007) 3208– 3213. G. Kulkarni, S. Adlakha, M. Srivastava, “Subcarrier allocation and bit loading algorithms for OFDMA based wireless networks”, IEEE Transactions on Mobile Computing 4 (6) (2005) 652–662. K.D. Lee, V.C.M. Leung, “Fair allocation of subcarrier and power in an OFDMA wireless mesh network”, IEEE Journal on Selected Areas in Communications 24 (11) (2006) 2051–2060. P. Thulasiraman, X. Shen, “Interference aware subcarrier assignment for throughput maximization in OFDMA wireless relay mesh networks”, in: Proceedings of IEEE ICC, 2009, pp. 1–6. P. Li, M. Rong, Y. Xue, E. Schulz, “Reuse one frequency planning for two-hop cellular system with fixed relay nodes”, in: Proc. IEEE WCNC’07, Hong Kong, China, March 2007. IEEE 802.16j-06/015, “Harmonized contribution on 802.16j (mobile multihop relay) usage models”, 2006. Sik Choi, Gyung-Ho Hwang, Taesoo Kwon, Ae-Ri Lim, andDong-Ho Cho, “Fast Handover Scheme for Real-Time DownlinkServices in IEEE 802.16e BWA System”, Vehicular Technology Conference (2005 IEEE 61st), June 2005, Volume 3, pp. 2028-2032. I. Akyildz, J. Xie, and S. Mohanty, “A Survey of Mobility Management in Next Generation All IP Based Wireless Systems,” IEEE Wireless Commun., vol. 11, no. 4, 2004,pp. 16–27. R. Pabst et al., “Relay-based deployment concepts for wireless and mobile broadband radio”, IEEE Commun. Mag. 42 (9) (2004) 80–89. J. Cai, X. Shen, J.W. Mark, A.S. Alfa, “Semi-distributed user relaying algorithm for amplify-and-forward wireless relay networks”, IEEE Trans. Wireless Commun. 7 (4) (2008) 1348–1357. 112
  • 9. Genc V., Murphy S., Yu Y. and Murphy J., “IEEE 802.16J relay-based wireless access networks: an overview [recent advances and evolution of WLAN and WMAN standards],” IEEE Wireless Communications, Vol. 15, Issue 5, pp. 56 – 63, Oct. 2008. C. Cicconetti, L. Lenzini, E. Mingozzi and C. Eklund, “Quality of service support in IEEE 802.16 networks,” IEEE Network, Vol. 20, pp. 50 – 55, Mar. 2006. IEEE 802.16j, “Baseline Document for Draft Standard for Local and Metropolitan Area Networks Part 16: Air Interface for Fixed and Mobile Broadband Wireless Access Systems,” pp. 1-314, Jun. 2007. J. Kim, T. Lee and C. S. Hwang, “A dynamic channel assignment scheme with two thresholds for load balancing in cellular networks”, IEEE Radio and Wireless Conference, pages 141-145, 1999. Y.-T. Wang and J.-P. Sheu , “Adaptive Channel Borrowing for Quality of Service in Wireless Cellular Networks”, International Journal of Communication Systems (IJCS). Vol. 19, pages 205-224, March, 2006. Berezdivin R, Breinig R, Topp R. “Next-generation wireless communications concepts and technologies”. IEEE Communications Magazine 2002; 40(3): 108–116. Q. Li et al., “Differential Feedback Scheme for Closed- Loop Beam forming,” IEEE 802.16m-09/0910927r5, May 2009. H. Huang et al., “Network MIMO for Inter-cell Interference Mitigation,” IEEE 802.16m-08/044r1, Jan. 2008. Authors D.SatishKumar received his B.E., degree in Electrical and Electronics Engineering from Bharathiar University and M.E. degree in Computer Science and Engineering from Manonmaniam Sundharnar University respectively. He is currently working towards the PhD degree in Computer Science and Engineering in Anna University of Technology Coimbatore, Tamil Nadu INDIA. His research interests accumulate in the area of IEEE 802.16j Multi hop Mobile networks, Routing, WIMAX networks, Network management in wired Networks and Wireless Networks. Email: - satishcoimbatore@yahoo.co.in Dr.N.Nagarajan received his B.Tech and M.E. degrees in Electronics Engineering at M.I.T Chennai. He received his PhD in Faculty of information and communication engineering from Anna University, Chennai. He is currently working as Principal, Coimbatore Institute of Engineering and Technology, Coimbatore. He is member of board of study of faculty of information Technology at Anna University of technology, Coimbatore. His specialization includes optical, wireless Adhoc and sensor networks. He is guiding assorted research scholars in optical networks and wireless networks. Email: - swekalnag@rediffmail.com 113