Based on the introduction of the WiMAX standards, relevant technologies and applications, three essential factors for WiMAX networking are analyzed. They are the frequency plan, Authentication Authorization Accounting...Based on the introduction of the WiMAX standards, relevant technologies and applications, three essential factors for WiMAX networking are analyzed. They are the frequency plan, Authentication Authorization Accounting (AAA) and the mobility management. Networking solutions for the fixed and mobile applications are presented respectively. It is noted that the evolution of wireless WiMAX networking will go through four phases: the outdoor access phase, the indoor access phase, the seamed roaming phase and the seamless mobility phase. It is predicted that WiMAX will eventually converge with the NGN and the mobile cellular networks.展开更多
Wireless networks are playing an imperative role in our daily existence;in current scenario, the users want wireless connectivity for all location with all types of service. One of the major challenges for wireless ne...Wireless networks are playing an imperative role in our daily existence;in current scenario, the users want wireless connectivity for all location with all types of service. One of the major challenges for wireless network is security issue. First and foremost task is to detect the security attacks in the network and the second task is to prevent from an authorized attacks. In our view, a lot of researches are going on and somehow we have succeeded in the first case but the second task is very tough due to wireless channel. Our research is based on how to avoid network attack i.e. misbehavior node attack in the WiMAX system. In this paper we have proposed an algorithm for WiMAX network and our algorithm are able to prevent fixed as well as mobile misbehavior node attacks. As we know, misbehavior node misbehaves in the sense that the node does not esteem its MAC protocols and avariciously sends its packets without any restriction (Flooding of packets) because it doesn't follow any protocol. Our proposed work based on the standard time required for communication for valid user with some threshold time for valid delay and some unwanted delay with network conditions. Our approach can control continuous flooding of packets and continuously transmits Constant Bit Rate (CBR) packets by misbehavior node, which introduces noise in the network and upset the performance of the network. In the mean while the valid user communicate in a trouble-free approach.展开更多
This article analyzes the characteristics of PON and WiMAX convergence network planning.Based on user coverage ratio,WiMAX channel allocation,cell radius,carrier-to-noise ratio threshold,and bandwidth constraint,we pr...This article analyzes the characteristics of PON and WiMAX convergence network planning.Based on user coverage ratio,WiMAX channel allocation,cell radius,carrier-to-noise ratio threshold,and bandwidth constraint,we propose a mixed integer programming model solved by a Branch-Band and Heuristic Search method.Finally,the simulation result is given and analyzed.The planning method based on a mixed integer programming model can save 20 percentage of the overall planning cost,compared with the greedy algorithm.The relationship between the convergence network planning cost and frequency usage is also analyzed.The optimized planning result with the lowest cost can be acquired through the best frequency usage.展开更多
It is a difficult problem to improve network performance and resource utilization efficiency in wireless communications. As a standard of broadband wireless access systems, IEEE 802.16 adopts Orthogonal Frequency Divi...It is a difficult problem to improve network performance and resource utilization efficiency in wireless communications. As a standard of broadband wireless access systems, IEEE 802.16 adopts Orthogonal Frequency Division Multiplexing (OFDM) and multi-modulation/coding techniques at the physical layer, combines contend and pre-contract mechanisms at the Medium Access Control (MAC) layer. Based on the QoS-related concepts such as connection and service flow, IEEE 802.16 optimizes network entry and initialization, and frame format in order to improve network throughput, reduce network delay, and increase the flexibility of network configuration. Based on IEEE 802.16, WiMAX adopts Point-to-Multipoint (PMP) network topology to realize flexible networking. It is a typical application technology of broadband wireless access systems.展开更多
移动IP是移动WiMAX核心网络中的关键技术。本文分别从Client Mobile IP(CMIP)和Proxy Mobile IP(PMIP)两种方式阐述移动IP在移动WiMAX网络中的实现原理,并对这两种方式进行了比较分析,最后从移动WiMAX网络运营的角度,对移动IP的具体实...移动IP是移动WiMAX核心网络中的关键技术。本文分别从Client Mobile IP(CMIP)和Proxy Mobile IP(PMIP)两种方式阐述移动IP在移动WiMAX网络中的实现原理,并对这两种方式进行了比较分析,最后从移动WiMAX网络运营的角度,对移动IP的具体实现进行了探讨并提出建议。展开更多
文摘Based on the introduction of the WiMAX standards, relevant technologies and applications, three essential factors for WiMAX networking are analyzed. They are the frequency plan, Authentication Authorization Accounting (AAA) and the mobility management. Networking solutions for the fixed and mobile applications are presented respectively. It is noted that the evolution of wireless WiMAX networking will go through four phases: the outdoor access phase, the indoor access phase, the seamed roaming phase and the seamless mobility phase. It is predicted that WiMAX will eventually converge with the NGN and the mobile cellular networks.
文摘Wireless networks are playing an imperative role in our daily existence;in current scenario, the users want wireless connectivity for all location with all types of service. One of the major challenges for wireless network is security issue. First and foremost task is to detect the security attacks in the network and the second task is to prevent from an authorized attacks. In our view, a lot of researches are going on and somehow we have succeeded in the first case but the second task is very tough due to wireless channel. Our research is based on how to avoid network attack i.e. misbehavior node attack in the WiMAX system. In this paper we have proposed an algorithm for WiMAX network and our algorithm are able to prevent fixed as well as mobile misbehavior node attacks. As we know, misbehavior node misbehaves in the sense that the node does not esteem its MAC protocols and avariciously sends its packets without any restriction (Flooding of packets) because it doesn't follow any protocol. Our proposed work based on the standard time required for communication for valid user with some threshold time for valid delay and some unwanted delay with network conditions. Our approach can control continuous flooding of packets and continuously transmits Constant Bit Rate (CBR) packets by misbehavior node, which introduces noise in the network and upset the performance of the network. In the mean while the valid user communicate in a trouble-free approach.
基金supported by National High Technical Research and Development Program of China(863 program)under Grant No.2009AA01A345Fundamental Research Funds for the Central Universities under Grant No.BUPT2009RC0402
文摘This article analyzes the characteristics of PON and WiMAX convergence network planning.Based on user coverage ratio,WiMAX channel allocation,cell radius,carrier-to-noise ratio threshold,and bandwidth constraint,we propose a mixed integer programming model solved by a Branch-Band and Heuristic Search method.Finally,the simulation result is given and analyzed.The planning method based on a mixed integer programming model can save 20 percentage of the overall planning cost,compared with the greedy algorithm.The relationship between the convergence network planning cost and frequency usage is also analyzed.The optimized planning result with the lowest cost can be acquired through the best frequency usage.
文摘It is a difficult problem to improve network performance and resource utilization efficiency in wireless communications. As a standard of broadband wireless access systems, IEEE 802.16 adopts Orthogonal Frequency Division Multiplexing (OFDM) and multi-modulation/coding techniques at the physical layer, combines contend and pre-contract mechanisms at the Medium Access Control (MAC) layer. Based on the QoS-related concepts such as connection and service flow, IEEE 802.16 optimizes network entry and initialization, and frame format in order to improve network throughput, reduce network delay, and increase the flexibility of network configuration. Based on IEEE 802.16, WiMAX adopts Point-to-Multipoint (PMP) network topology to realize flexible networking. It is a typical application technology of broadband wireless access systems.
文摘移动IP是移动WiMAX核心网络中的关键技术。本文分别从Client Mobile IP(CMIP)和Proxy Mobile IP(PMIP)两种方式阐述移动IP在移动WiMAX网络中的实现原理,并对这两种方式进行了比较分析,最后从移动WiMAX网络运营的角度,对移动IP的具体实现进行了探讨并提出建议。