SlideShare uma empresa Scribd logo
1 de 13
WiMAX
Santosh Ban
Electronics and Communication Engineer
Introduction

 WiMAX stands for Worldwide Interoperability for Microwave Access.
 WiMAX is the trade name of “IEEE 802.16 standard”.
 Radio spectrum from 10-66 GHz and 2-11 GHz for unlicensed and licensed bands
 Range up to 31 miles (50km)
 Speed up to 70 Megabits
 It is going to be an emerging technology for the future
 It is featured with Voice, Video, Real time video conferencing and other services
 It is next generation of wifi technology which allows us to connect to the internet with
  higher speed and in wider range.
Introduction continue…

 Modulation method in the download and uplink are BPSK (Binary Phase Shift Keying), QPSK
  (Quaternary Phase Shift Keying), 16-QAM, 64-QAM
 Supports two types of transmission duplexing: Time Division Duplexing (TDD) and Frequency
  Division Duplexing (FDD) and supports both half and full duplex method.
 TDD- both the uplink and downlink share the same frequency but are separated on time
 FDD- both uplink and downlink communication take place at the same time but on
  different frequency
 WiMAX uses OFDM (Orthogonal Frequency Division Multiplexing) technology.
A WIMAX system consists of



 WiMAX Tower:
    similar to the concept of cell-phone tower. Single tower can provide coverage up to 3,000 square
     miles.
 WiMAX Receiver:
    it may be the small box like devices as modem and they could be build into the laptop
How it Works

 A subscriber sends the wireless traffic at the speed 2M-155Mbps from fixed antenna
 The base station receives the traffic signal from multiple sites and sends to the switching
  center through wired or wireless using 802.16 protocol.
 The switching center sends the traffic to the ISP or PSTN (Public Switched Telephone
  Network)



                                                                                 Switching
                                                                                  Center
                                         Base
                                        Station

                                                                                  ISP
       Subscriber
Modes of Operation



 Non- Line of Sight (Data is transmitted from tower to subscriber)
      Use a lower frequency range (2-11GHz)

   Line of Sight (Data is transmitted from one tower to another tower)
      Use a higher frequency range (66GHz)
Benefits of WiMAX


 Speed
    Faster than broadband services

 Wireless
    Not having to lay cable reduces cost
    Easier to extend to rural and urban areas

 Broad coverage
    Much wider range of coverage area than wifi
THREAT ANALYSYS


o Critical threats are
  o eavesdropping of management messages,
  o BS or MS masquerading,
  o management message modification and DoS attack.
Eavesdropping


 Management messages (not encrypted) can provide valuable
  information (credit card no)to an attacker.
 From the user perspective, eavesdropping of management
  messages may result in limited financial loss.
Masquerading means

 IP spoofing: send packet with false source address.
 Instead of sending packet to server, client send it to Hacker.
 record-and-playback: take out sensitive info (e.g., password), and
  use later               C                    Hacker
                                               takes
       A                         hacker        identity of
                                                  server.
server



                                              B    client
What is a DoS Attack?

o The act of denying a computer user of a particular
  service.( user or client not able to connect to server or
  internet.)


o It involves flooding a host until it cannot respond to
  legitimate traffic
Other Major Threats are



Jamming
   Block WiMAX by sending the radio wave of same frequency used by WiMAX which
    cause enough interference

Data Traffic Modification
Security Technique



Authentication
Data Key Exchange
Data Encryption

Mais conteúdo relacionado

Mais procurados

Ec8004 wireless networks unit 1 ieee 802.11a and ieee 802.11b
Ec8004 wireless networks unit 1 ieee 802.11a and ieee 802.11bEc8004 wireless networks unit 1 ieee 802.11a and ieee 802.11b
Ec8004 wireless networks unit 1 ieee 802.11a and ieee 802.11bHemalathaR31
 
WIRELESS ATM BY SAIKIRAN PANJALA
WIRELESS ATM BY SAIKIRAN PANJALAWIRELESS ATM BY SAIKIRAN PANJALA
WIRELESS ATM BY SAIKIRAN PANJALASaikiran Panjala
 
IRDA Infrared Data Association (IrDA)
IRDA Infrared Data Association (IrDA)IRDA Infrared Data Association (IrDA)
IRDA Infrared Data Association (IrDA)Sushant Kushwaha
 
Wide-Area Wireless Networks (WANS) – GSM Evolution
Wide-Area Wireless Networks (WANS) – GSM EvolutionWide-Area Wireless Networks (WANS) – GSM Evolution
Wide-Area Wireless Networks (WANS) – GSM EvolutionDon Norwood
 
Telecommunications: Introduction to Wireless Networks
Telecommunications: Introduction to Wireless NetworksTelecommunications: Introduction to Wireless Networks
Telecommunications: Introduction to Wireless NetworksNapier University
 
IEEE WLAN standards
IEEE WLAN standardsIEEE WLAN standards
IEEE WLAN standardslyndyv
 
Wireless Personal Area Networks
Wireless Personal Area NetworksWireless Personal Area Networks
Wireless Personal Area NetworksDilum Bandara
 
Bluetooth Technology & Security
Bluetooth Technology & SecurityBluetooth Technology & Security
Bluetooth Technology & SecurityHimangshu Hazra
 
Effects of Shadowing on LoRa LPWAN Radio Links
Effects of Shadowing on LoRa LPWAN Radio Links  Effects of Shadowing on LoRa LPWAN Radio Links
Effects of Shadowing on LoRa LPWAN Radio Links IJECEIAES
 
Spread spectrum seminar
Spread spectrum seminarSpread spectrum seminar
Spread spectrum seminarDeepika Patil
 

Mais procurados (20)

Ec8004 wireless networks unit 1 ieee 802.11a and ieee 802.11b
Ec8004 wireless networks unit 1 ieee 802.11a and ieee 802.11bEc8004 wireless networks unit 1 ieee 802.11a and ieee 802.11b
Ec8004 wireless networks unit 1 ieee 802.11a and ieee 802.11b
 
Lecture 14
Lecture 14Lecture 14
Lecture 14
 
Wireless Local Loop
Wireless Local LoopWireless Local Loop
Wireless Local Loop
 
Hiperlan
HiperlanHiperlan
Hiperlan
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
WIRELESS ATM BY SAIKIRAN PANJALA
WIRELESS ATM BY SAIKIRAN PANJALAWIRELESS ATM BY SAIKIRAN PANJALA
WIRELESS ATM BY SAIKIRAN PANJALA
 
IRDA Infrared Data Association (IrDA)
IRDA Infrared Data Association (IrDA)IRDA Infrared Data Association (IrDA)
IRDA Infrared Data Association (IrDA)
 
Wide-Area Wireless Networks (WANS) – GSM Evolution
Wide-Area Wireless Networks (WANS) – GSM EvolutionWide-Area Wireless Networks (WANS) – GSM Evolution
Wide-Area Wireless Networks (WANS) – GSM Evolution
 
Telecommunications: Introduction to Wireless Networks
Telecommunications: Introduction to Wireless NetworksTelecommunications: Introduction to Wireless Networks
Telecommunications: Introduction to Wireless Networks
 
Bluetooth technology
Bluetooth  technologyBluetooth  technology
Bluetooth technology
 
Bluetooth technology
Bluetooth  technologyBluetooth  technology
Bluetooth technology
 
IEEE WLAN standards
IEEE WLAN standardsIEEE WLAN standards
IEEE WLAN standards
 
Presentation
PresentationPresentation
Presentation
 
Satellite
SatelliteSatellite
Satellite
 
BLUETOOTH _TECHNOLOGY
BLUETOOTH _TECHNOLOGYBLUETOOTH _TECHNOLOGY
BLUETOOTH _TECHNOLOGY
 
Wireless Personal Area Networks
Wireless Personal Area NetworksWireless Personal Area Networks
Wireless Personal Area Networks
 
Bluetooth Technology & Security
Bluetooth Technology & SecurityBluetooth Technology & Security
Bluetooth Technology & Security
 
Effects of Shadowing on LoRa LPWAN Radio Links
Effects of Shadowing on LoRa LPWAN Radio Links  Effects of Shadowing on LoRa LPWAN Radio Links
Effects of Shadowing on LoRa LPWAN Radio Links
 
Spread spectrum seminar
Spread spectrum seminarSpread spectrum seminar
Spread spectrum seminar
 
zigbee full ppt
zigbee full pptzigbee full ppt
zigbee full ppt
 

Destaque

Destaque (8)

An efficient denoising architecture for removing impulse noise
An efficient denoising architecture for removing impulse noiseAn efficient denoising architecture for removing impulse noise
An efficient denoising architecture for removing impulse noise
 
Isp in-nepal-ntc-services
Isp in-nepal-ntc-servicesIsp in-nepal-ntc-services
Isp in-nepal-ntc-services
 
Asean
AseanAsean
Asean
 
Osi layer
Osi layerOsi layer
Osi layer
 
International MBA
International MBAInternational MBA
International MBA
 
Blind sepreration
Blind seprerationBlind sepreration
Blind sepreration
 
International mba
International mbaInternational mba
International mba
 
Ph.D Dissertation Defense Slides on Efficient VLSI Architectures for Image En...
Ph.D Dissertation Defense Slides on Efficient VLSI Architectures for Image En...Ph.D Dissertation Defense Slides on Efficient VLSI Architectures for Image En...
Ph.D Dissertation Defense Slides on Efficient VLSI Architectures for Image En...
 

Semelhante a WiMAX

Broadband Wireless 802.16
Broadband Wireless 802.16Broadband Wireless 802.16
Broadband Wireless 802.16coolbp
 
Wireless communication and networking
Wireless communication and networkingWireless communication and networking
Wireless communication and networkingM Sabir Saeed
 
Implementation of Vertical Handoff Algorithm between IEEE 802.11 WLAN & CDMA ...
Implementation of Vertical Handoff Algorithm between IEEE 802.11 WLAN & CDMA ...Implementation of Vertical Handoff Algorithm between IEEE 802.11 WLAN & CDMA ...
Implementation of Vertical Handoff Algorithm between IEEE 802.11 WLAN & CDMA ...IOSR Journals
 
Implementation of Vertical Handoff Algorithm between IEEE 802.11 WLAN & CDMA ...
Implementation of Vertical Handoff Algorithm between IEEE 802.11 WLAN & CDMA ...Implementation of Vertical Handoff Algorithm between IEEE 802.11 WLAN & CDMA ...
Implementation of Vertical Handoff Algorithm between IEEE 802.11 WLAN & CDMA ...IOSR Journals
 
Recent Trends in Wireless communication
Recent Trends in Wireless communicationRecent Trends in Wireless communication
Recent Trends in Wireless communicationJigsAshley
 
Presentation of-wimax
Presentation of-wimaxPresentation of-wimax
Presentation of-wimaxRubab Fatima
 
Paper id 2720146
Paper id 2720146Paper id 2720146
Paper id 2720146IJRAT
 
wifi-technology
 wifi-technology wifi-technology
wifi-technologytardeep
 
Wireless networksppt
Wireless networkspptWireless networksppt
Wireless networkspptpmuthumca51
 
Wireless networksppt
Wireless networkspptWireless networksppt
Wireless networkspptdxmuthu
 
Data Transmission Analysis using MW-5000 at 5.8 GHz Frequency
Data Transmission Analysis using MW-5000  at 5.8 GHz Frequency Data Transmission Analysis using MW-5000  at 5.8 GHz Frequency
Data Transmission Analysis using MW-5000 at 5.8 GHz Frequency IJECEIAES
 
Wireless network Project Class 12
Wireless network Project Class 12Wireless network Project Class 12
Wireless network Project Class 12Rishabh-Rawat
 

Semelhante a WiMAX (20)

Broadband Wireless 802.16
Broadband Wireless 802.16Broadband Wireless 802.16
Broadband Wireless 802.16
 
Wireless communication and networking
Wireless communication and networkingWireless communication and networking
Wireless communication and networking
 
Implementation of Vertical Handoff Algorithm between IEEE 802.11 WLAN & CDMA ...
Implementation of Vertical Handoff Algorithm between IEEE 802.11 WLAN & CDMA ...Implementation of Vertical Handoff Algorithm between IEEE 802.11 WLAN & CDMA ...
Implementation of Vertical Handoff Algorithm between IEEE 802.11 WLAN & CDMA ...
 
Implementation of Vertical Handoff Algorithm between IEEE 802.11 WLAN & CDMA ...
Implementation of Vertical Handoff Algorithm between IEEE 802.11 WLAN & CDMA ...Implementation of Vertical Handoff Algorithm between IEEE 802.11 WLAN & CDMA ...
Implementation of Vertical Handoff Algorithm between IEEE 802.11 WLAN & CDMA ...
 
Wimax / ieee 802.16
Wimax / ieee 802.16Wimax / ieee 802.16
Wimax / ieee 802.16
 
Wifi & 802.11 Standards
Wifi & 802.11 StandardsWifi & 802.11 Standards
Wifi & 802.11 Standards
 
Recent Trends in Wireless communication
Recent Trends in Wireless communicationRecent Trends in Wireless communication
Recent Trends in Wireless communication
 
Presentation of-wimax
Presentation of-wimaxPresentation of-wimax
Presentation of-wimax
 
Paper id 2720146
Paper id 2720146Paper id 2720146
Paper id 2720146
 
Wireless Networks-ASH-NEW
Wireless Networks-ASH-NEWWireless Networks-ASH-NEW
Wireless Networks-ASH-NEW
 
IEEE 802.11
IEEE 802.11IEEE 802.11
IEEE 802.11
 
Wimax Technology
Wimax TechnologyWimax Technology
Wimax Technology
 
Lecture 13
Lecture 13Lecture 13
Lecture 13
 
wifi-technology
 wifi-technology wifi-technology
wifi-technology
 
Wireless networksppt
Wireless networkspptWireless networksppt
Wireless networksppt
 
Wireless networksppt
Wireless networkspptWireless networksppt
Wireless networksppt
 
Data Transmission Analysis using MW-5000 at 5.8 GHz Frequency
Data Transmission Analysis using MW-5000  at 5.8 GHz Frequency Data Transmission Analysis using MW-5000  at 5.8 GHz Frequency
Data Transmission Analysis using MW-5000 at 5.8 GHz Frequency
 
Darsh
DarshDarsh
Darsh
 
Wireless network Project Class 12
Wireless network Project Class 12Wireless network Project Class 12
Wireless network Project Class 12
 
Wi max by yogijicreations
Wi max by yogijicreationsWi max by yogijicreations
Wi max by yogijicreations
 

WiMAX

  • 1. WiMAX Santosh Ban Electronics and Communication Engineer
  • 2. Introduction  WiMAX stands for Worldwide Interoperability for Microwave Access.  WiMAX is the trade name of “IEEE 802.16 standard”.  Radio spectrum from 10-66 GHz and 2-11 GHz for unlicensed and licensed bands  Range up to 31 miles (50km)  Speed up to 70 Megabits  It is going to be an emerging technology for the future  It is featured with Voice, Video, Real time video conferencing and other services  It is next generation of wifi technology which allows us to connect to the internet with higher speed and in wider range.
  • 3. Introduction continue…  Modulation method in the download and uplink are BPSK (Binary Phase Shift Keying), QPSK (Quaternary Phase Shift Keying), 16-QAM, 64-QAM  Supports two types of transmission duplexing: Time Division Duplexing (TDD) and Frequency Division Duplexing (FDD) and supports both half and full duplex method.  TDD- both the uplink and downlink share the same frequency but are separated on time  FDD- both uplink and downlink communication take place at the same time but on different frequency  WiMAX uses OFDM (Orthogonal Frequency Division Multiplexing) technology.
  • 4. A WIMAX system consists of  WiMAX Tower:  similar to the concept of cell-phone tower. Single tower can provide coverage up to 3,000 square miles.  WiMAX Receiver:  it may be the small box like devices as modem and they could be build into the laptop
  • 5. How it Works  A subscriber sends the wireless traffic at the speed 2M-155Mbps from fixed antenna  The base station receives the traffic signal from multiple sites and sends to the switching center through wired or wireless using 802.16 protocol.  The switching center sends the traffic to the ISP or PSTN (Public Switched Telephone Network) Switching Center Base Station ISP Subscriber
  • 6. Modes of Operation  Non- Line of Sight (Data is transmitted from tower to subscriber)  Use a lower frequency range (2-11GHz)  Line of Sight (Data is transmitted from one tower to another tower)  Use a higher frequency range (66GHz)
  • 7. Benefits of WiMAX  Speed  Faster than broadband services  Wireless  Not having to lay cable reduces cost  Easier to extend to rural and urban areas  Broad coverage  Much wider range of coverage area than wifi
  • 8. THREAT ANALYSYS o Critical threats are o eavesdropping of management messages, o BS or MS masquerading, o management message modification and DoS attack.
  • 9. Eavesdropping  Management messages (not encrypted) can provide valuable information (credit card no)to an attacker.  From the user perspective, eavesdropping of management messages may result in limited financial loss.
  • 10. Masquerading means  IP spoofing: send packet with false source address.  Instead of sending packet to server, client send it to Hacker.  record-and-playback: take out sensitive info (e.g., password), and use later C Hacker takes A hacker identity of server. server B client
  • 11. What is a DoS Attack? o The act of denying a computer user of a particular service.( user or client not able to connect to server or internet.) o It involves flooding a host until it cannot respond to legitimate traffic
  • 12. Other Major Threats are Jamming  Block WiMAX by sending the radio wave of same frequency used by WiMAX which cause enough interference Data Traffic Modification