Monday, June 29, 2009

Conclusion

In this webblog, we outlined a high-level overview of WiMAX technology by presenting its explanation, standards, benefits, features, security, threats, future, enhancement, as well as its challenges.
WiMAX technology could be a significant growth market for the telecom industry.
Broadband wireless has had a checkered history, and the emergence of the WiMAX standard offers a significant new opportunity for success.
Broadband wireless systems can be used to deliver a variety of applications and services to both fixed and mobile users.
WiMAX could potentially be deployed in a variety of spectrum bands: 2.3GHz, 2.5GHz, 3.5GHz, and 5.8GHz.
WiMAX faces a number of competitive challenges from both fixed-line and third-generation mobile broadband alternatives.
The service requirements and special constraints of wireless broadband make the technical design of broadband wireless quite challenging.

WiMAX Technology at Home

Now let's have a close look to the WiMAX technology when we are using it at home.

Here's what would happen if you got WiMAX. An Internet service provider sets up a WiMAX base station 10 miles from your home. You would buy a WiMAX-enabled computer or upgrade your old computer to add WiMAX capability. You would receive a special encryption code that would give you access to the base station. The base station would beam data from the Internet to your computer (at speeds potentially higher than today's cable modems), for which you would pay the provider a monthly fee. The cost for this service could be much lower than current high-speed Internet-subscription fees because the provider never had to run cables.

If you have a home network, things wouldn't change much. The WiMAX base station would send data to a WiMAX-enabled router, which would then send the data to the different computers on your network. You could even combine WiFi with WiMAX by having the router send the data to the computers via WiFi.
WiMAX doesn't just pose a threat to providers of DSL and cable-modem service. The WiMAX protocol is designed to accommodate several different methods of data transmission, one of which is
Voice Over Internet Protocol (VoIP). VoIP allows people to make local, long-distance and even international calls through a broadband Internet connection, bypassing phone companies entirely. If WiMAX-compatible computers become very common, the use of VoIP could increase dramatically. Almost anyone with a laptop could make VoIP calls.

Sunday, June 28, 2009

WiMAX Cost

During this section we will try to answer the cost issue concerning the WiMAX technology. A citywide blanket coverage of wireless Internet access sounds great, but companies aren't going to go around setting up WiMAX base stations out of sheer kindness. Who's going to pay for WiMAX?
It depends how it will be used. There are two ways WiMAX can be implemented -- as a zone for wireless connections that single users go to when they want to connect to the Internet on a laptop (the non-line-of-sight "super WiFi" implementation), or as a line-of-sight hub used to connect hundreds of customers to a steady, always-on, high-speed wireless Internet connection.
Under the "super WiFi" plan, cities might pay to have WiMAX base stations set up in key areas for business and commerce and then allow people to use them for free. They already do this with WiFi, but instead of putting in a bunch of
WiFi hot spots that cover a few hundred square yards, a city could pay for one WiMAX base station and cover an entire financial district. This could provide a strong draw when city leaders try to attract businesses to their area.
Some companies might set up WiMAX transmitters and then make people pay for access. Again, this is similar to strategies used for WiFi, but a much wider area would be covered. Instead of hopping from one hot spot to another, WiMAX-enabled users could have Internet access anywhere within 30 miles of the WiMAX base station. These companies might offer unlimited access for a monthly fee or a "pay as you go" plan that charges on a per-minute or per-hour basis.
The high-speed wireless hub plan has the potential to be far more revolutionary. If you have high-speed Internet access now, it probably works something like this: The cable (or phone) company has a line that runs into your home. That line goes to a cable modem, and another line runs from the modem to your computer. If you have a
home network, first it goes to a router and then on to the other computers on the network. You pay the cable company a monthly fee, which reflects in part the expense of running cable lines to every single home in the neighborhood.

WiMAX Enhancement

After discussing the threats to WiMAX technology, during this section we will introduce the enhancements that can reduce these threats. These enhancements includes power control, error detection techniques, sub-channelization, transmission diversity, antennas for fixed WiMAX applications, and adaptive modulation.

Power Control

Algorithms of power control are applied to enhance the general performance of the system, it is deployed by the base station sending power control information to every Customer Premise Equipments (CPEs) to control the transmit power level so that the level inward bound at the base station is at a fixed level. In a dynamical changing fading environment this pre-determined performance level indicates that the CPE only broadcasts sufficient power to meet this constraint. The communication would be that the CPE broadcast level is supported on worst case circumstances. The power control decreases the general power consumption of the CPE and the possible interference with other base stations. For Line-of-Sight (LOS) the transmission power of the CPE is approximately comparative to its distance from the base station, for Non-Line-Of-Sight (NLOS) it is also closely dependant on the clearance and barriers.

Error Detection Techniques

WiMAX have built-in error detection techniques to reduce the system Signal to Noise Ratio (SNR) obligations. Convolutional Encoding, Strong Reed Solomon FEC, and interleaving algorithms are used to identify and correct errors to enhance throughput. These strong error correction techniques assist to recover corrupted frames that may have been missing due to frequency selective fading or burst errors. To remove the errors, Automatic Repeat Request (ARQ) is used that cannot be corrected by the FEC by resending the error-ed information again. This notably improves the Bit Error Rate (BER) performance for a similar maximum level.

Sub Channelization

Another option within WiMAX in the uplink is Sub Channelization. Without sub channelization, narrow restrictions and requirement for cost effective Customer Premise Equipments (CPEs), usually cause the link budget to be unbalanced, for that reason the system range to be up link is restricted. Sub channeling allows the link budget to be objective such that the system gains are parallel for both the up and down links. Sub channeling focuses the broadcasting power into fewer OFDM carriers; this is what boosts the system gain that can either be applied to widen the reach of the system, overcome the infrastructure penetration losses, and or lessen the power consumption of the CPE. The use of sub channeling is promoted expansion in Orthogonal Frequency Division Multiple Access (OFDMA) to permit a more flexible use of resources that can maintain roaming or mobile operation.

Transmission Diversity

Diversity formats are used for improvement of multi-path and reflections signals that arise in Non-Line-of-Sight (NLOS) environment. Diversity is an optional element in WiMAX. The diversity algorithms presented by WiMAX in both the transmitter and receiver significantly enhances the system accessibility. The WiMAX transmit diversity option uses space time coding to offer transmit source freedom; this decreases the weaken margin requirement and resist the interference with other devices. For receive diversity, a variety of joining techniques are present to increase the accessibility of the system. For example, Maximum Ratio Combining (MRC) takes benefit of two separate receive chains to prevent fading and decrease path loss. Diversity has verified to be a helpful tool for coping with the challenges of NLOS transmission.

Antennas For Fixed WiMAX Applications

Directional antennas enhance the fade margin by adding together extra gain. This increases the link accessibility comparisons between directional and omni-directional antennas. Delay spread is further reduced by directional antennas at both the Base Station and Customer Premise Equipment (CPE). The antenna pattern restrains any multi-path signals that appear in the sidelobes and backlobes. The efficiency of these methods has been verified and demonstrated in booming deployments, in which the service operates under considerable NLOS fading.

Adaptive Modulation

WiMAX system supports adaptive modulation to regulate the Signal Modulation Scheme (SMC) depending on the Signal to Noise Ratio (SNR) state of the radio link. When the radio link is soaring in quality, the peak modulation scheme is used, offering the system additional capacity. During a signal fade, the WiMAX system can move to a lower modulation scheme to keep the connection quality and link permanence. This element allows the system to overcome time-selective fading. The key element of adaptive modulation is that it enhances the range that a higher modulation scheme can be used over, because the system can bend to the actual fading circumstances, as opposed to having a fixed scheme that is planned for the worst case situations.

Wednesday, June 24, 2009

WiMAX Future

Public broadband access via wireless is not only a benefit to business travellers but is also an interesting business opportunities in itself. Broadband wireless internet access via hot spots in hotels, airports, convention centres, coffee shops, restaurants, etc. is a fast growing trend. Hot spots provide internet access for hire. Relatively economical to set up, all that is required to create a simple hot spot is a broadband connection and a wireless router. May hot spots use T1 for its high bandwidth, but DSL, cable and fixed wireless can also be used.

WiMAX can make high speed wireless internet services available to much larger areas than can typical Wi-Fi hot spots. WiMAX implementations can provide a wireless range of up to 30 miles or 50 kilometres, much greater than the physical distance limitations of Wi-Fi hot spots or DSL, WiMAX can also be used to interconnect existing Wi-Fi networks.

WiMAX promises many strategic opportunities, not just as a backhaul solution for Wi-Fi delivering additional bandwidth to hot spots, but potentially for 3G networks too. WiMAX initially may be deployed as a wireless backhaul solution, but will be upgraded to a mobility application, once the 802.16e standard is approved and WiMAX-capable client devices enter the market, marking a major increase in the anticipated market.

WiMAX can compliment existing and emerging 3G mobile and wired networks, and can play a significant role in helping service providers deliver converged services that can be accessed using a broad range of devices on a wide variety of networks.

At the technical level, 3G and WiMAX solutions fit well together by providing different capabilities while allowing for seamless integration. 3G technologies have evolved over many years to become highly spectrally efficient, allowing operators to take advantage of costly spectrum dedicated to mobile services. 3G CDMA technologies such as W-CDMA and CDMA 2000 1xEV-DO provide high through puts in low bandwidths as 5 MHz and 1.25 MHz, respectively

Threats to WiMAX

Most of the experts and professionals claiming that broadband data delivered over 3G cellular networks will choke the hope of the WiMAX industry for the standard to become worldwide significant. There are too many factors involved in weakening WiMax security, stability, Quality of service etc. In this chapter I am going to discuss the threats involved in WiMax deployment and in the infrastructure after that.

Since there are many threats to WiMAX, therefore we will restrict our discussion on the most important aspects, and those are the application layer threat, the physical layer threat, the sub-privacy layer threat and the data link layer.

Application Layer Threats to WiMAX

software based threat management and secure access solutions will be as essential as ever, with a typical security infrastructure comprising components such as firewalls, virtual private networking (VPN), Internet key exchange (IKE) tunnelling, and intrusion prevention systems (IPS), each of which reside at the application layer.

For example, in an WiMax mesh network installation where routers or gateways will operate as intermediaries, or hot spots linking client and base station, there is an increased potential of security vulnerabilities, as the intermediary routers that reside between base station and client are presentable and vulnerable to attacks. Popular application level services, such as voice over Internet protocol (VoIP), could be broken by hackers who can initiate the download of remote configuration settings and resynchronize clients’ CPE settings to their specifications. Hackers may also replicate, or spoof the address of the intermediary router or server and deceive other clients into believing their connection is secure, thus opening them up to malicious attack. These routers and gateways will require robust security measures to ensure that unprotected clients remain protected behind the intermediary access point.

The majority of existing routers will have their own firewall components that provide Application Layer Gateway (ALG) functionality for the signalling protocols that support and keep multiple sessions. Any deficiency in the ALG functionality could result in diminished QoS for low latency applications, such as VoIP and videoconferencing. OEMs must develop devices with ALGs that permit inward call requests to the devices only from the device registered with the server and endpoints, while dynamically allowing inward media packets only on call set up. These media sessions are to be disabled on termination of the connection.

Physical Layer Threats to WiMAX

Privacy Sub-layer resides on the top of Physical layer in IEEE 802.16 standard, therefore, WiMax networks are open to to physical layer attacks for example, blocking and rushing. Blocking is done by activating a source of strong noise to significantly lowering the capacity of the channel, therefore denying services (DoS) to all stations. However, blocking or jamming is detectable with radio analyzer devices. Rushing or scrambling is another type of jamming, but it takes place for a short interval of time aimed at particular frames. Control or management messages could be jumbled, but it is not possible with delay sensitive message i.e., scrambling Uplink slots are comparatively hard, because attacker has to interpret control information and to send noise during a particular interval.

Privacy Sub Layer Threats to WiMAX

Privacy Sub-layer’s main objective was to protect service providers against theft of service, rather than securing network users. It is obvious that the privacy layer only secures data at the data link layer, but it does not ensure complete encryption of user data. Furthermore, it does not protect physical layer from being interrupted. It is essential to include technologies to secure physical layer and higher layer security for a converged routable network and devices within the system.

Data Link Layer Threats to WiMAX

In a typical Wi-Fi mechanism, a digital subscriber line (DSL) feeds a packet-ized bit stream into a modem or access point, which in turn broadcasts a radio signal; often encrypted to Wi-Fi enabled clients that de-packet this data into information. In a WiMAX installation, a fixed wireless base station, similar in concept to a cell phone tower, serves an always-on radio signal directly accessible by WiMAX enabled clients, with no need for leased lines or an intermediate access point.

Like Wi-Fi, the WiMax Media Access Control (MAC) protocol, a sub layer of the data link layer, manage the consumer’s access to the physical layer. However, the scheduling algorithm within the WiMAX MAC protocol offers optimal prioritization of this traffic based on First-In First-Out (FIFO) scheduling, in which clients seeking access to the base station are allocated bandwidth upon time of initial access, instead of random queue assignment based on order of MAC address as in Wi-Fi. Furthermore, the WiMax MAC protocol ensures optimal quality of service (QoS) over its WiFi predecessor, allocating bandwidth effectively by balancing client’s needs instead of best effort service; that is, equal distribution of what remains after allocation to other consumers.

In addition, before encrypting the radio signal with Wired Equivalent Privacy (WEP), WPA/PSK, or any other existing Layer 2 security protocol, WiMax basic authentication architecture, by default, employs X.509-based public key infrastructure (PKI) certificate authorization, in which the base station authenticates the client’s digital certificate prior to granting access to the physical layer.

Tuesday, June 23, 2009

WiMAX Security

Wireless systems always make some people worried when speaking of security. After all, every wireless system broadcasts, by definition, everything you’re doing on the network to the world or at least the part of the world within range. Security is an important consideration in any communication system design but is particularly so in wireless communication systems. The fact that connection can be established in a loosen fashion makes it easier to intrude in an ordinary and undetectable manner than is the case for wired access. Further, the shared wireless medium is often perceived by the general public to be somewhat less secure than its wired counterpart. Therefore, a robust level of security must be built into the design of wireless systems.

From the point of view of an end user, the primary security concerns are privacy and data integrity. Users need assurance that no one can eavesdrop on their sessions and that the data sent across the communication link is not tampered. This is usually achieved through the use of encryption.

From the service provider’s point of view, an important security consideration is preventing unauthorized use of the network services. This is usually done using strong authentication and access control methods. Authentication and access control can be implemented at various levels of the network such as the physical layer, and the service layer. The service provider’s need to prevent fraud should be balanced against the inconvenience that it may impose on the user.
WiMAX systems were designed at the outset with robust security in mind. The standard includes state-of-the-art methods for ensuring user data privacy and preventing unauthorized access, with additional protocol optimization for mobility.
Security is handled by a privacy sublayer within the WiMAX MAC. The key aspects of WiMAX security are as follow:

Encryption In WiMAX

Encryption is the method used to protect the confidentiality of data flowing between a transmitter and a receiver. Encryption involves taking a stream or block of data to be protected, called plain text, and using another stream or block of data, called the encryption key, to perform a reversible mathematical operation to generate a ciphertext. The ciphertext is unintelligible and hence can be sent across the network without fear of being eavesdropped. The receiver does an operation called decryption to extract the plaintext from the ciphertext, using the same or different key. When the same key is used for encryption and decryption, the process is called symmetric keyencryption. This key is typically derived from a shared secret between the transmitter and the receiver and for strong encryption typically should be at least 64 bytes long. When different keys are used for encryption and decryption, the process is called asymmetrickeyencryption. Both symmetric and asymmetric key encryptions are typically used in broadband wireless communication systems, each serving different needs.

Device/user authentication

WiMAX provides a flexible means for authenticating subscriber stations and users to prevent unauthorized use. The authentication framework is based on the Internet Engineering Task Force (IETF) EAP, which supports a variety of credentials, such as username/password, digital certificates, and smart cards.
WiMAX terminal devices come with built-in X.509 digital certificates that contain their public key and MAC address. WiMAX operators can use the certificates for device authentication and use a username/password or smart card authentication on top of it for user authentication.

Flexible key-management protocol

The Privacy and Key Management Protocol Version 2 (PKMv2) is used for securely transferring keying material from the base station to the mobile station, periodically reauthorizing and refreshing the keys.

Protection of control messages

The integrity of over-the-air control messages is protected by using message digest schemes, such as AES-based CMAC or MD5-based HMAC.

Support for fast handover

To support fast handovers, WiMAX allows the MS to use preauthentication with a particular target BS to facilitate accelerated reentry.
A three-way handshake scheme is supported to optimize the reauthentication mechanisms for supporting fast handovers, while simultaneously preventing any man-in-the-middle attacks.

The WiMAX Enormous Features

WiMAX is a wireless broadband solution that offers a rich set of features with a lot of flexibility in terms of deployment options and potential service offerings. Some of the more salient features that deserve highlighting are as follows:

Two Type of Services:
WiMAX can provide two forms of wireless service:

Non-line-of-sight: service is a WiFi sort of service. Here a small antenna on your computer connects to the WiMAX tower. In this mode, WiMAX uses a lower frequency range -- 2 GHz to 11 GHz (similar to WiFi).

Line-of-sight: service, where a fixed dish antenna points straight at the WiMAX tower from a rooftop or pole. The line-of-sight connection is stronger and more stable, so it's able to send a lot of data with fewer errors. Line-of-sight transmissions use higher frequencies, with ranges reaching a possible 66 GHz.

OFDM-based physical layer
The WiMAX physical layer (PHY) is based on orthogonal frequency division multiplexing, a scheme that offers good resistance to multipath, and allows WiMAX to operate in NLOS conditions.

Very high peak data rates
WiMAX is capable of supporting very high peak data rates. In fact, the peak PHY data rate can be as high as 74Mbps when operating using a 20MHz wide spectrum. More typically, using a 10MHz spectrum operating using TDD scheme with a 3:1 downlink-to-uplink ratio, the peak PHY data rate is about 25Mbps and 6.7Mbps for the downlink and the uplink, respectively.

Scalable bandwidth and data rate support
WiMAX has a scalable physical-layer architecture that allows for the data rate to scale easily with available channel bandwidth. For example, a WiMAX system may use 128, 512, or 1,048-bit FFTs (fast fourier transforms) based on whether the channel bandwidth is 1.25MHz, 5MHz, or 10MHz, respectively. This scaling may be done dynamically to support user roaming across different networks that may have different bandwidth allocations.

Adaptive modulation and coding (AMC)
WiMAX supports a number of modulation and forward error correction (FEC) coding schemes and allows the scheme to be changed on a per user and per frame basis, based on channel conditions. AMC is an effective mechanism to maximize throughput in a time-varying channel.

Link-layer retransmissions
WiMAX supports automatic retransmission requests (ARQ) at the link layer for connections that require enhanced reliability. ARQ-enabled connections require each transmitted packet to be acknowledged by the receiver; unacknowledged packets are assumed to be lost and are retransmitted.

Support for TDD and FDD
IEEE 802.16-2004 and IEEE 802.16e-2005 supports both time division duplexing and frequency division duplexing, as well as a half-duplex FDD, which allows for a low-cost system implementation.

WiMAX uses OFDM
Mobile WiMAX uses Orthogonal frequency division multiple access (OFDM) as a multiple-access technique, whereby different users can be allocated different subsets of the OFDM tones.

Flexible and dynamic per user resource allocation
Both uplink and downlink resource allocation are controlled by a scheduler in the base station. Capacity is shared among multiple users on a demand basis, using a burst TDM scheme.

Support for advanced antenna techniques
The WiMAX solution has a number of hooks built into the physical-layer design, which allows for the use of multiple-antenna techniques, such as beamforming, space-time coding, and spatial multiplexing.

Quality-of-service support
The WiMAX MAC layer has a connection-oriented architecture that is designed to support a variety of applications, including voice and multimedia services. WiMAX system offers support for constant bit rate, variable bit rate, real-time, and non-real-time traffic flows, in addition to best-effort data traffic. WiMAX MAC is designed to support a large number of users, with multiple connections per terminal, each with its own QoS requirement.

Robust security
WiMAX supports strong encryption, using Advanced Encryption Standard (AES), and has a robust privacy and key-management protocol.

The system also offers a very flexible authentication architecture based on Extensible Authentication Protocol (EAP), which allows for a variety of user credentials, including username/password, digital certificates, and smart cards.

Support for mobility
The mobile WiMAX variant of the system has mechanisms to support secure seamless handovers for delay-tolerant full-mobility applications, such as VoIP.

IP-based architecture
The WiMAX Forum has defined a reference network architecture that is based on an all-IP platform. All end-to-end services are delivered over an IP architecture relying on IP-based protocols for end-to-end transport, QoS, session management, security, and mobility.

WiMAX benefits

This section reflects the benefits of the WiMAX technology to the component makers, the equipment makers, the operators and finlay to the customers.

Benefits to Component Makers:

  • Creates a volume opportunity for silicon suppliers.

Benefits to Equipment Makers

  • Innovate more rapidly because there exists a standards-based, stable platform upon which to rapidly add new capabilities.
  • No longer need to develop every piece of the end-to-end solution.

Benefits to Operators:

  • A common platform which drives down the cost of equipment and accelerates price/performance improvements unachievable with proprietary approaches.
  • Generate revenue by filling broadband access gaps.
  • Quickly provision T1 / E1 level and "on demand" high margin broadband services.
  • Reduce the dollar risk associated with deployment as equipment will be less expensive due to economies of scale.
  • No longer be locked into a single vendor since base stations will interoperate with multiple vendors' CPEs.

Benefits to Consumers:

  • More broadband access choices, especially in areas where there are gaps: worldwide urban centers where building access is difficult; in suburban areas where the subscriber is too far from the central office; and in rural and low population density areas where infrastructure is poor.
  • More choices for broadband access will create competition which will result in lower monthly subscription prices.

WiMAX Standards

During this section a detailed explanation about the WiMAX technology standards will be presented.
The IEEE 802.16 defines the wireless metropolitan area network (MAN) technology which is branded as WiMAX. The 802.16 includes two sets of standards, 802.16-2004 (802.16d) for fixed WiMAX and 802.16-2005(802.16e) for mobile WiMAX. The WiMAX wireless broadband access standard provides the missing link for the "last mile" connection in metropolitan area networks where DSL, Cable and other broadband access methods are not available or too expensive. WiMAX also offers an alternative to satellite Internet services for rural areas and allows mobility of the customer equipment.
IEEE 802.16 standards are concerned with the air interface between a subscriber's transceiver station and a base transceiver station. The fixed WiMax standard IEEE 802.16-2004 (also known as 802.16d) is approved by the IEEE in June 2004, which provides fixed, point-to-multi point broadband wireless access service and its product profile utilizes the OFDM 256-FFT (Fast Fourier Transform) system profile. The fixed WiMAX 802.16-2004 standard supports both time division duplex (TDD) and frequency division duplex (FDD) services - the latter of which delivers full duplex transmission on the same signal if desired. In Dec. 2005, IEEE approved the mobile WiMax standard, the 802.16-2005 (also known as 802.16e). IEEE 802.16e, based on the early WiMax standard 802.16a, adds mobility features to WiMAX in the 2 to 11 GHz licensed bands. 802.16e allows for fixed wireless and mobile Non Line of Sight (NLOS) applications primarily by enhancing the OFDMA (Orthogonal Frequency Division Multiple Access).
IEEE 802.16 and WiMAX are designed as a complimentary technology to Wi-Fi and Bluetooth. The following table provides a quick comparison of 802.16 with to 802.11(WLAN) and 802.15.1 (Bluetooth):

IEEE 802.16 Protocol Architecture has 4 layers: Convergence, MAC, Transmission and physical, which can be map to two OSI lowest layers: phusical and data link.


The WiMAX umbrella currently includes 802.16-2004 and 802.16e. 802.16-2004 utilizes OFDM to serve multiple users in a time division fashion in a sort of a round-robin technique, but done extremely quickly so that users have the perception that they are always transmitting/receiving. 802.16e utilizes OFDMA and can serve multiple users simultaneously by allocating sets of tones to each user.
Following is the chart of various IEEE 802.16 Standards related to WiMAX.


WiMAX OFDM basics
OFDM belongs to a family of transmission schemes called multicarrier modulation, which is based on the idea of dividing a given high-bit-rate data stream into several parallel lower bit-rate streams and modulating each stream on separate carriers.often called subcarriers, or tones.
Multicarrier modulation schemes eliminate or minimize intersymbol interference (ISI) by making the symbol time large enough so that the channel-induced delays.delay spread being a good measure of this in wireless channels . are an insignificant (typically, <>

Monday, June 22, 2009

Background Information about WiMAX Technology

Before discussing the details behind the WiMAX technology, it is favorable to start our discussion with the background information about the WiMAX technology before dealing with the details.
WiMAX is not projected to replace Wi-Fi, but to complement it by connecting Wi-Fi networks to each other or the Internet through high-speed wireless links. You can therefore use WiMAX technology to extend the power and range of Wi-Fi and cellular networks. However, in developing countries, WiMAX may become the only wireless technology because Wi-Fi and cellular have not penetrated areas that can be reached with WiMAX technology.

Range

The wide range of the WiMAX technology depends on the height of the antennas, if they are installed at the suitable position from where there is no barrier between the transmitter and receiver, and then we can get better range and service from it. Even though the frequency for operation of WiMax is not definite, the most likely band at 3.5GHz is higher in frequency than the 3G bands at around 2.1 GHz. Range will, as a result, be lower, perhaps somewhere between 50% and 75% of the range of 3G. WiMAX can therefore support 30 to 50 kilometres distance with Line-of-Sight (LOS) links. As far as Non-line-of-sight (NLOS) links in concerned WiMax can support the broad range from 3 to 10 kilometres using advanced modulation algorithm that can overcome many interfering objects that Wi-Fi systems cannot pass through.

Data Rates

The technology used for WiMax is Orthogonal Frequency Division Multiplexing (OFDM), it is not appreciably more supernaturally efficient than the technology commonly used for 3G that is Wideband Code Division Multiple Access (WCDMA). However OFDM is coupled with a high channel bandwidth, that allows greater data rates. So, on average, for an equivalent spectrum allocation, users will see similar data rates. In specific simulations, where there are few users, it is possible that WiMax will provide a higher data rate than 3G. However, in commercial systems, such simulations are likely rare.

Timing

It is normally believed that WiMax will enter into the market some five years after 3G is well established. This drawback in time is likely to be important since without a convincing advantage only a few service providers will choose to move from 3G to WiMAX. However, those yet to deploy a system may find the choice balanced between the two technologies.

Cost

The network costs of WiMax will be likely to be higher than for 3G because of the reduced range and hence the necessity to build more cells. The subscriber subsidy costs may be lower if WiMax is built into processor chips, although this may not apply if users wish to have WiMax handsets

Quality of Service (QoS)

Excellent Quality Of service management donates from variety of WiMax features. Just as on a Wi-Fi network, WiMAX users share a data pipe and QoS can degrade as more users are added to the network. Using the QoS features of WiMAX, service providers can guarantee certain users specific bandwidth amounts by limiting the bandwidth consumption of other users.

Grant request mechanism for accessing to network is the first aspect of Quality of Service. The WiMAX functioning of disagreement allocates only a fixed amount of time to be given to these grant requests. Disagreement refers to the act of competing for access to the network. Because of the limited amount of time available, bandwidth cannot be consumed by contention requests. When a disagreement request comes into the network, the system compares the request with a service level agreement for the user making the request, and they are granted, or denied, access accordingly.

Link by link modulation schemes is another benefit of WiMax Quality of Service. In other words, the base station can use different modulation schemes for different links. The modulation scheme used is related directly to the distance of the link. Rather than all users' links being downgraded by the user farthest away, link by link modulation enables closer users to use higher data-rate modulation schemes.