230 likes | 700 Views
WiMAX. CS441 Dr. Kemal Akkaya 12/8/2011. By: Chun-Cheng Chuang. Contents. What is WiMax Why WiMax WiFi vs. WiMax WiMax PHY/MAC layer Challenges Conclusion. What is WiMAX. Worldwide Interoperability for Microwave Access Wireless MAN ( Wireless Metropolitan Access Network )
E N D
WiMAX CS441 Dr. KemalAkkaya 12/8/2011 By: Chun-Cheng Chuang
Contents What is WiMax Why WiMax WiFi vs. WiMax WiMaxPHY/MAC layer Challenges Conclusion
What is WiMAX • Worldwide Interoperability for Microwave Access • Wireless MAN (Wireless Metropolitan Access Network) • Broadband wireless networks • based on the IEEE 802.16 standard.
What is WiMAX • Offers data transfer rates of up to 75 Mbit/s • A range of up to 30 miles to make broadband network access widely available • Without wires • Last Mile access
Why WiMax • End-user are used to high bandwidth from fixed sources • Speed • higher range and speeds compared to 802.11 • Wireless • Easier to extend to suburban and rural areas • Broad Coverage • Much wider coverage that WiFi
WiMax PHY layer OFDM (orthogonal frequency division multiplex) More advanced: MIMO (multiple-input and multiple-output)
WiMax MAC layer • Connection-oriented • A fundamental premise of the MAC architecture is quality of service (QoS) • QoS provided via service flows • Applies to both downlink (DL) and uplink (UL)
Service Specific Convergence Sublayer MAC Common Part Sublayer Privacy Sublayer WiMaxMAC layer Interface to higher layer protocols, classifies incoming data, etc. Core MAC functions (i.e., scheduling, connection maintenance,fragmentation), QoS control Encryption, authentication, secure key exchange
Applyciation Metro Area Networks High-Speed Internet Clustered wifi hotspot Wireless VoIP Video-on-demand, video surveillance Education(rural schools & government orgs.)
Source :http://files.shareholder.com/downloads/INTC/1557442122x0x195859/40AB6084-0A42-4E87-9AD3-B08BADAA987F/wimax_and_wifi_together.pdf
Challenges • Security issues • Eavesdrop • Masquerade • Instead of sending packet to server, client send it to Hacker. • (Hacker takes identity of server.)
Challenges • Denial of Service • Attackers make resources (server, bandwidth) unavailable to client by overwhelming resource. • Jamming • Block the service by sending out radio waves along the same frequencies that WiMaxuse.
Conclusions WiMax may becomes the dominant standard for Wireless MAN in the realistic market. WiMaxconnect you faster and from much longer ranges An intrusion detection system approach and firewall can be used to address some of the threats. More research is needed.
References http://www.wimaxforum.org/ http://www.scribd.com/doc/59582733/WiMax-Final-Ppt http://media.techtarget.com/searchMobileComputing/downloads/Finneran.pdf