1 / 75

A Study of the Bandwidth Management Architecture over IEEE 802.16 WiMAX

A Study of the Bandwidth Management Architecture over IEEE 802.16 WiMAX. Student : Sih -Han Chen ( 陳思翰 ) Advisor : Ho-Ting Wu ( 吳和庭 ) Date : 2008.07.25. Outline. Background and Motivation Proposed QoS System Architecture Call Admission Control (CAC) Pairing CAC

abdalla
Download Presentation

A Study of the Bandwidth Management Architecture over IEEE 802.16 WiMAX

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. A Study of the Bandwidth Management Architecture over IEEE 802.16 WiMAX Student : Sih-Han Chen (陳思翰 ) Advisor:Ho-Ting Wu (吳和庭 ) Date : 2008.07.25

  2. Outline • Background and Motivation • Proposed QoS System Architecture • Call Admission Control (CAC) • Pairing CAC • Bandwidth Borrowing on CAC level • Two Stage Bandwidth Allocation • Performance Evaluation • Conclusion and Future Work 2008/07/25

  3. Background • Fixed WiMAX (Worldwide Interoperability for Microwave Access) • Specified by IEEE 802.16 d • Wireless MAN Network • High transmission rate and coverage (75Mbps ,50km) • Support QoS • Cost saving and easy to deploy • Replace last mile (like ADSL) 2008/07/25

  4. MAC Common Part Sublayer • Defines multiple-access mechanism • Functions : • Connection establishment • Connection maintenance • Call admission control • Bandwidth request • Bandwidth allocation • Packet scheduling MAC Common Part Sublayer (MAC CPS) 2008/07/25

  5. IEEE 802.16 TDD Frame Structure 2008/07/25

  6. Service Classes 2008/07/25

  7. Dynamic Service Establishment 2008/07/25

  8. Motivation • IEEE 802.16 only defined the basic QoS signaling architecture. • The detail internal algorithm was left as the responsibility of implementers. • Call admission control • Bandwidth allocation • Packet scheduling • Pairing connection property • Uplink and downlink connections must coexist for many network application. (e.g. VoIP, FTP, P2P…) Undefined!!! 2008/07/25

  9. Outline • Background and Motivation • Proposed QoS System Architecture • Call Admission Control (CAC) • Pairing CAC • Bandwidth Borrowing on CAC level • Two Stage Bandwidth Allocation • Performance Evaluation • Conclusion and Future Work 2008/07/25

  10. Proposed QoS Architecture Pair Call Admission Control Bandwidth Borrowing Agent SS Two Stage Bandwidth Allocation BS Connection Request Applications Core Network Connection Response Uplink Data Traffic Downlink Data Traffic Two Stage Bandwidth Allocation Up Stream (Bandwidth Request) Downlink Packet Scheduler Uplink Packet Scheduler Down Stream (DL/UL MAP) 2008/07/25

  11. Pairing Call Admission Control 2008/07/25

  12. Pairing Call Admission Control Each Pair Connection Request Bavailable>= Y Y Is UGS? Is rtPS? Is nrtPS? Is BE? Reject Call Accept Pair Call N Y N Enable Bandwidth Borrowing ? N Y Y Go Bandwidth Borrowing Agent N N Y 2008/07/25

  13. Range of Bandwidth Reservation 2008/07/25

  14. Bandwidth Borrowing on CAC Level 2008/07/25

  15. Operation of Bandwidth Borrowing • Calculate the bandwidth that are needed to be borrowed from system • In system, the bandwidth can be borrowed from rtPS, nrtPS and BE individually 2008/07/25

  16. Bandwidth Borrowing Flow Chart Pair Connection Request from CAC Module Success Success Success Failure Failure Y Borrow from existing BE Cons Borrow from existing BE Cons Borrow from existing nrtPS Cons Borrow from existing nrtPS Cons Borrow from existing rtPS Cons Borrow from existing rtPS Cons Is rtPS? Is nrtPS? Is UGS? Is BE? Failure N Success Success Success Accept Accept Failure Failure Y Failure Reject Reject Y N Y Reject 2008/07/25

  17. Example of Bandwidth Borrowing (BB) BS SS Pairing UGS DSA Total require 160Kbps(80x2) Now System available Bw= 0 Start to BB operations at BS. After Bandwidth Borrowing Operation 2008/07/25

  18. Example of Bandwidth Borrowing (BB) BS SS Pairing UGS DSA Total require 160Kbps(80x2) Now System available Bw= 0 Start to BB operations at BS. Borrow from exiting BE connections. 160 – 50 = 110 Kbps After Bandwidth Borrowing Operation 2008/07/25

  19. Example of Bandwidth Borrowing (BB) BS SS Pairing UGS DSA Total require 160Kbps(80x2) Now System available Bw= 0 Start to BB operations at BS. Borrow from exiting BE connections. 160 – 50 = 110 Kbps After Bandwidth Borrowing Operation (2) Borrow from exiting nrtPS connections. 110 – 50 = 60 Kbps 2008/07/25

  20. Example of Bandwidth Borrowing (BB) BS SS Pairing UGS DSA Total require 160Kbps(80x2) Now System available Bw= 0 Start to BB operations at BS. Borrow from exiting BE connections. 160 – 50 = 110 Kbps After Bandwidth Borrowing Operation (2) Borrow from exiting nrtPS connections. 110 – 50 = 60 Kbps (3) Borrow 45Kbps from CID3 Borrow 15Kbps from CID4 60 * 150/(150+50) = 45 60 * 50/(150+50) = 15 2008/07/25

  21. Example of Bandwidth Borrowing (BB) BS SS Pairing UGS DSA Total require 160Kbps(80x2) Now System available Bw= 0 Start to BB operations at BS. Borrow from exiting BE connections. 160 – 50 = 110 Kbps After Bandwidth Borrowing Operation (2) Borrow from exiting nrtPS connections. 110 – 50 = 60 Kbps (3) Borrow 45Kbps from CID3 Borrow 15Kbps from CID4 60 * 150/(150+50) = 45 60 * 50/(150+50) = 15 BB Success !!! Accept the Pairing UGS Call 2008/07/25

  22. Two Stage Bandwidth Allocation • Stage One: • Allocate the guaranteed reserved bandwidth for each existing connection at most. • Stage Two: Allocate the remaining bandwidth • First, satisfy all rtPS connections that require more BW. • Final, allocate the remaining BW to nrtPS and BE evenly. 2008/07/25

  23. Two Stage Bandwidth Allocation Two Stage Bandwidth Allocation 2008/07/25

  24. Outline • Background and Motivation • Proposed QoS System Architecture • Call Admission Control (CAC) • Pairing CAC • Bandwidth Borrowing on CAC level • Two Stage Bandwidth Allocation • Performance Evaluation • Conclusion and Future Work 2008/07/25

  25. Simulation Environment 2008/07/25

  26. Traffic Generation and Simulation Environment 2008/07/25

  27. Simulation Experiment 1 Pairing vsNonPairing Call Admission Control 2008/07/25

  28. Definition of NonPairing CACReject Call 2008/07/25

  29. Call Blocking Probability Pairing vsNonPairing I + II I + II rtPS UGS Pair II II I Pair I 2008/07/25

  30. Call Blocking Probability Pairing vsNonPairing I + II I + II nrtPS BE Pair I I I I Pair I I 2008/07/25

  31. Summary of Experiment 1 • Pairing CAC is better than NonPairing CAC • Pairing CAC really achieves higher performance than NonPairing CAC on call blocking probability. • What cause NonPairing CAC low performance? • The reply connection request is always rejected leading to high blocking probability of NonPairing Type II . • So the following next experiment will base on Pairing CAC scheme to study Bandwidth Borrowing scheme continually. 2008/07/25

  32. Simulation Experiment 2 Based on Pairing Call Admission Control Bandwidth Borrowing vs Non Bandwidth Borrowing 2008/07/25

  33. Call Blocking Probability Using Bandwidth Borrowing (BB) Pairing CAC without BB Pairing CAC with BB rtPS rtPS 2008/07/25

  34. Packet Drop Rate ─ Non BB vs BB rtPS nrtPS BE 2008/07/25

  35. Conclusion • Proposed a novel QoS architecture over WiMAX, including : • Pairing Call Admission Control (CAC) • Bandwidth Borrowing scheme on CAC level • Two Stage Bandwidth Allocation • Dynamic Downlink and Uplink bandwidth allocation. 2008/07/25

  36. Future work • Different traffic pattern (self-similar traffic) • Extent to IEEE 802.16e mobility issue (handover call, signal strength) • End to End QoS guarantee (ASN, CSN) • Heterogeneous Network (integrated with WiFi, 3G system, or EPON) 2008/07/25

  37. Q & A Thanks for Your Attention

  38. Worldwide Interoperability for Microwave Access ( WiMAX ) Bandwidth IEEE 802.15 IEEE 802.11 IEEE 802.16 3GPP 1 Gbps 802.15.3 High Speed Wireless PAN Wi-Fi 802.11n 100 Mbps WiMAX 802.16 (802.16-2004 & 802.16e) Wi-Fi 802.11a/b/g 10 Mbps 4G 3G 2.5G 1 Mbps 802.15.1 Bluetooth <1m 10m 100m Up to 50Km Up to 80Km PAN LAN MAN WAN PAN: Personal area networks MAN: Metropolitan area networks LAN: Local area networks Wide area networks 2008/07/25

  39. IEEE 802.16 Operation Mode 2008/07/25

  40. IEEE 802.16 d • Specify area • MAC layer • PHY layer • Topology of Operation Mode • PMP (Point to Multiple Point) • Mesh • Multiplex • TDD • FDD 2008/07/25

  41. Bandwidth Request • SSs may request bandwidth in 3 ways: • Contention-based bandwidth requests (Broadcast Polling or Multicast Group Pollng) • Contention-free bandwidth requests (Unicast Polling) • Piggyback a BW request message on a data packet 2008/07/25

  42. Bandwidth Allocation • BS grants/allocates bandwidth in one of two modes • Grant Per Subscriber Station (GPSS) • Grant Per Connection (GPC) • How much bandwidth to be granted based on - • RequestedBW • QoS parameters • Available resources • Grants are realized through the UL-MAP 2008/07/25

  43. Service Flow • The central concept of the MAC protocol • A service flow is a unidirectional flow of packets that is provided a particular QoS. • SS and BS provide this QoS according to the QoS parameter set. • Existing in both uplink and downlink and may exist without being activated. • Must have a 32bit SFID, besides admitted and active status also have a 16-bit CID 2008/07/25

  44. Definition of Pairing and Non Pairing CAC Pairing Non Pairing 2008/07/25

  45. Definition of NonPairing CAC Accept Call • Round Trip Time: • The duration time between admitting Uplink Connection Reqest and BS send out the Downlink Connection Request. 2008/07/25

  46. Operation of Bandwidth Borrowing (2) • If • the bandwidth borrowed from every exiting BE connection i is: • Else, try to borrow bandwidth from nrtPS after borrowing all bandwidth of 2008/07/25

  47. Operation of Bandwidth Borrowing (3) • If • the bandwidth borrowed from every exiting nrtPS connection i is: • Else, try to borrow bandwidth from rtPS after borrowing all bandwidth of 2008/07/25

  48. Operation of Bandwidth Borrowing (4) • If • the bandwidth borrowed from every exiting rtPS connectioniis: • Else, Bandwidth Borrowing Fail ! Reject the connection request. 2008/07/25

  49. Mandatory Packet Scheduling Algorithm 2008/07/25

  50. System Model of Simulation Experiment Note : We assume that only SS can send the connection request to BS actively 2008/07/25

More Related