Monday, October 6, 2008

Network Entry and Initialization

When an MS acquires the network after being powered up a WiMAX network undergoes various steps. An overview of this process, also referred to as network entry, is shown in Figure

 

- Scan and Synchronize Downlink Channel:
When an MS is powered up, it first scans the allowed DL frequencies to determine whether it is presently within the coverage of a suitable WiMAX base station. Each MS stores a nonvolatile list of all operational parameters, such as the DL frequency used during the previous operational instance. The MS first attempts to synchronize with the stored DL frequency. If this fails, the MS it scans other frequencies in an attempt to synchronize with the DL of the most suitable BS.

During the DL synchronization, the MS listens for the DL frame preambles. When one is detected, the MS can synchronize itself with respect to the DL transmission of the BS. Once it obtains DL synchronization, the MS listens to the various control messages, such as FCH, DCD, UCD, DL-MAP, and UL-MAP, that follow the preamble to obtain the various PHY and MAC related parameters corresponding to the DL and UL transmissions.


- Obtain Uplink Parameters:
Based on the UL parameters decoded from the control messages, the MS decides whether the channel is suitable for its purpose. If the channel is not suitable, the MS goes back to scanning new channels until it finds one that is. If the channel is deemed usable, the MS listens to the UL MAP message to collect information about the ranging opportunities.


- Ranging:
At this stage, the MS performs initial ranging with the BS to obtain the relative timing and power-level adjustment required to maintain the UL connection with the BS. Once the a UL connection has been established, the MS should do periodic ranging to track timing and power-level fluctuations. These fluctuations can arise because of mobility, fast fading, shadow fading, or any combinations thereof. Since the MS does not have a connection established at this point, the initial ranging opportunity is contention based.

MS sends a RNG-REQ message with the CID set to initial ranging CID. If it does not receive any response from the BS within a certain time window,
then the MS considers the previous ranging attempt to be unsuccessful and enters the contention-resolution stage. Therein, the MS sends a new CDMA ranging code at the next ranging opportunity, after an appropriate back-off delay. If Ranging process is successful then, BS sends RNG-RSP message with basic CID(BCID) and Primary CID(PCID) allocated to perticular MS. From here on, the basic and primary management CID is used by the MS and the BS to send most of the MAC management messages


- Negotiate Basic Capabilities:
After initial ranging, the MS sends an SBC-REQ message informing the BS about its basic capability set, which includes various PHY and bandwidth-allocation-related parameters. On the reciept of this message, the BS responds with an SBC-RSP, providing the PHY and bandwidth-allocation parameters to be used for UL and DL transmissions.


- Register and Establish IP Connectivity:
After negotiating the basic capabilities and exchanging the encryption key, the MS registers itself with the network. In WiMAX, registration is the process by which the MS is allowed to enter the network and can receive secondary CIDs. The registration process starts when the MS sends a REG-REQ message to the BS. The message contains a hashed message uthentication code (HMAC), which the BS uses to validate the authenticity of this message. Once it determines that the request for registration is valid, the BS sends to the MS a REG-RSP message in which it provides the secondary management CID. In the REG-REQ message, the MS also indicates to the BS its secondary capabilities not covered under the basic capabilities, such as IP version supported, convergence sublayer supported, and ARQ support.

After receiving the REG-RSP message from the BS, the SS can use DHCP to obtain an IP address.


- Establish Service Flow:
The creation of service flows can be initiated by either the MS or the BS, based on whether initial traffic arrives in the uplink or the downlink.

When it an MS chooses to initiate the creation of a service flow, an MS sends a DSA-REQ message containing the required QoS set of the service flow. On receipt of the DSA-REQ message, the BS first checks the integrity of the message and sends a DSX-RVD message indicating whether the request for a new service flow was received with its integrity preserved. Then the BS checks whether the requested QoS set can be supported, creates a new SFID and sends an appropriate DSA-RSP indicating the admitted QoS set. MS completes the process by sending a DSA-ACK message.

1 comment:

IFA said...

Quality information any idea how to crac wimax password?

enlace wifi