2nd International ICST Conference on Simulation Tools and Techniques

Research Article

WINSE: WiMAX NS-2 extension

Download320 downloads
  • @INPROCEEDINGS{10.4108/ICST.SIMUTOOLS2009.5599,
        author={A. Sayenko and O. Alanen and H. Martikainen and V. Tykhomyrov and O.  Puchko and T.  H\aa{}m\aa{}l\aa{}inen},
        title={WINSE: WiMAX NS-2 extension},
        proceedings={2nd International ICST Conference on Simulation Tools and Techniques},
        publisher={ICST},
        proceedings_a={SIMUTOOLS},
        year={2010},
        month={5},
        keywords={IEEE 802.16 WiMAX NS-2},
        doi={10.4108/ICST.SIMUTOOLS2009.5599}
    }
    
  • A. Sayenko
    O. Alanen
    H. Martikainen
    V. Tykhomyrov
    O. Puchko
    T. Hämäläinen
    Year: 2010
    WINSE: WiMAX NS-2 extension
    SIMUTOOLS
    ICST
    DOI: 10.4108/ICST.SIMUTOOLS2009.5599
A. Sayenko1,*, O. Alanen2,*, H. Martikainen2,*, V. Tykhomyrov2,*, O. Puchko2,*, T. Hämäläinen2,*
  • 1: Research & Technology Platforms, Nokia Siemens Networks, Espoo, Finland.
  • 2: Telecommunication laboratory, MIT department, University of Jyväskylä, Finland.
*Contact email: alexander.sayenko@nsn.com, olli.alanen@jyu.fi, henrik.martikainen@jyu.fi, vitykhom@jyu.fi, olpuehko@jyu.fi, timoh@jyu.fi

Abstract

IEEE 802.16 standard defines the wireless broadband technology called WiMAX. When compared to other wireless technologies, it introduces many interesting advantages at PHY, MAC, and QoS layers. Heavy simulations are needed to study IEEE 802.16 performance and propose further enhancements to this standard. Link level simulations are not always sufficient, while system level simulators are not always accurate to capture MAC and transport protocol details. We implemented a 802.16 extension for the NS-2 network simulator. It includes upper PHY modeling, almost all the features of the 802.16 MAC layer, as well as the QoS framework. This article describes the implemented features, simulation methodology, and shares our experience that can be used with other NS-2 modules. An overview of research papers, where this implementation was used, is given.