A Study of A Study of WiMax QoS Mechanisms WiMax QoS Mechanisms - - PowerPoint PPT Presentation

a study of a study of wimax qos mechanisms wimax qos
SMART_READER_LITE
LIVE PREVIEW

A Study of A Study of WiMax QoS Mechanisms WiMax QoS Mechanisms - - PowerPoint PPT Presentation

A Study of A Study of WiMax QoS Mechanisms WiMax QoS Mechanisms Masood KHOSROSHAHY Vivien NGUYEN Masood KHOSROSHAHY Vivien NGUYEN RMOB Project RMOB Project April 2006 April 2006 Project supervisor: Project


slide-1
SLIDE 1

A Study of A Study of WiMax QoS Mechanisms WiMax QoS Mechanisms

Masood KHOSROSHAHY Vivien NGUYEN Masood KHOSROSHAHY Vivien NGUYEN RMOB Project RMOB Project April April 2006 2006 Project supervisor: Project supervisor:

  • Prof. Philippe Godlewski
  • Prof. Philippe Godlewski
slide-2
SLIDE 2

Properties of IEEE Standard Properties of IEEE Standard 802.16 802.16

  • Broad bandwidth

Broad bandwidth– –Up to 134 Up to 134 Mbit/ s Mbit/ s in 28 MHz channel in 28 MHz channel (in 10 (in 10-

  • 66 GHz air interface)

66 GHz air interface)

  • Supports multiple services simultaneously with full QoS

Supports multiple services simultaneously with full QoS– – Efficiently transport IPv4, IPv6, ATM, Ethernet, etc. Efficiently transport IPv4, IPv6, ATM, Ethernet, etc.

  • Bandwidth on demand (frame by frame)

Bandwidth on demand (frame by frame)

  • MAC designed for efficient use of spectrum

MAC designed for efficient use of spectrum

  • Comprehensive, modern, and extensible security

Comprehensive, modern, and extensible security

  • Supports multiple frequency allocations from 2

Supports multiple frequency allocations from 2-

  • 66 GHz

66 GHz– – OFDM and OFDMA for non OFDM and OFDMA for non-

  • line

line-

  • of
  • f-
  • sight applications

sight applications

  • TDD and FDD

TDD and FDD

  • Link adaptation: Adaptive modulation and coding

Link adaptation: Adaptive modulation and coding– – Subscriber by subscriber, burst by burst, uplink and Subscriber by subscriber, burst by burst, uplink and downlink downlink

  • Point

Point -

  • to

to-

  • multipoint topology, with mesh extensions

multipoint topology, with mesh extensions

  • Support for adaptive antennas and space

Support for adaptive antennas and space-

  • time coding

time coding

  • Extensions to mobility

Extensions to mobility

slide-3
SLIDE 3

802.16 MAC: Overview 802.16 MAC: Overview

  • Point

Point -

  • to

to-

  • Multipoint

Multipoint

  • Metropolitan Area Network

Metropolitan Area Network

  • Connection

Connection-

  • oriented
  • riented
  • Supports difficult user environments

Supports difficult user environments – – High bandwidth, hundreds of users per channel High bandwidth, hundreds of users per channel – – Continuous and burst traffic Continuous and burst traffic – – Very efficient use of spectrum Very efficient use of spectrum

  • Protocol

Protocol-

  • Independent core (ATM, IP, Ethernet,

Independent core (ATM, IP, Ethernet, … …) )

  • Balances between stability of contention

Balances between stability of contention-

  • less and

less and efficiency of contention efficiency of contention-

  • based operation

based operation

  • Flexible QoS offerings

Flexible QoS offerings– – CBR, CBR, rt rt -

  • VBR,

VBR, nrt nrt -

  • VBR, BE,

VBR, BE, with granularity within classes with granularity within classes

  • Supports multiple 802.16

Supports multiple 802.16 PHYs PHYs

slide-4
SLIDE 4

Subscriber Station (SS) Subscriber Station (SS) initialization has several steps: initialization has several steps:

  • The SS scans for downlink channel and establishes

The SS scans for downlink channel and establishes synchronization with the BS. synchronization with the BS.

  • It obtains transmit parameters.

It obtains transmit parameters.

  • It performs ranging and negotiating basic

It performs ranging and negotiating basic capabilities. capabilities.

  • It is authorized by the BS and performs key

It is authorized by the BS and performs key exchange. exchange.

  • It performs the registration and IP connectivity

It performs the registration and IP connectivity establishment. establishment.

  • Time of day establishment and the transfer of

Time of day establishment and the transfer of

  • perational parameters.
  • perational parameters.
  • It sets up the connections.

It sets up the connections.

slide-5
SLIDE 5

PHY LAYER PHY LAYER TECHNIQUES TECHNIQUES

OFDM OFDM OFDMA OFDMA

slide-6
SLIDE 6

OFDM OFDM

  • rthogonal frequency
  • rthogonal frequency-
  • division

division multiplexing multiplexing

  • eliminates

eliminates interference interference between between channels channels

  • no

no ISI ( ISI ( coherence coherence band band of

  • f channel

channel) )

  • higher spectral efficiency

higher spectral efficiency

  • high

high resistance resistance to to interference interference ( ( channel channel code) code)

  • adjustable

adjustable rate (adaptive modulation) rate (adaptive modulation)

slide-7
SLIDE 7

OFDM Encoder OFDM Encoder

slide-8
SLIDE 8

OFDMA OFDMA

  • multiple user access

multiple user access

  • OFDM needs TDD or FDD

OFDM needs TDD or FDD

  • inter symbol interference immunity

inter symbol interference immunity

  • frequency selective fading immunity

frequency selective fading immunity

slide-9
SLIDE 9

Studies Studies of

  • f 2

2 papers papers

  • Ian C. Wong,

Ian C. Wong, Zukang Zukang Shen Shen, Brian L. Evans, , Brian L. Evans, and Jeffrey G. Andrews , and Jeffrey G. Andrews , “ “ A Low Complexity A Low Complexity Algorithm for Proportional Resource Algorithm for Proportional Resource Allocation in OFDMA Systems Allocation in OFDMA Systems” ” , 2004. , 2004. [ WSEA [ WSEA-

  • 04]

04]

  • Mustafa

Mustafa Ergen Ergen, , Sinem Sinem Coleri Coleri, and , and Pravin Pravin Varaiya Varaiya “ “ QoS Aware Adaptive Resource QoS Aware Adaptive Resource Allocation Techniques for Fair Scheduling in Allocation Techniques for Fair Scheduling in OFDMA Based Broadband Wireless Access OFDMA Based Broadband Wireless Access Systems Systems” ” , IEEE Trans. Broadcast, vol. 49, , IEEE Trans. Broadcast, vol. 49,

  • no. 4, Dec. 2003.
  • no. 4, Dec. 2003.

[ ECV [ ECV-

  • 03]

03]

slide-10
SLIDE 10

1 1-

  • Study

Study of

  • f
  • Mustafa

Mustafa Ergen Ergen, , Sinem Sinem Coleri Coleri, and , and Pravin Pravin Varaiya Varaiya “ “ QoS Aware Adaptive Resource QoS Aware Adaptive Resource Allocation Techniques for Fair Scheduling in Allocation Techniques for Fair Scheduling in OFDMA Based Broadband Wireless Access OFDMA Based Broadband Wireless Access Systems Systems” ” , IEEE Trans. Broadcast, vol. 49, , IEEE Trans. Broadcast, vol. 49,

  • no. 4, Dec. 2003
  • no. 4, Dec. 2003

[ ECV [ ECV-

  • 03]

03]

slide-11
SLIDE 11

Resource allocation Resource allocation [ECV

[ECV-

  • 03]

03]

  • QoS

QoS fixed fixed by by the the application application

  • goal : achieving a specified data

goal : achieving a specified data transmission rate and transmission rate and BER for BER for each each user in user in each each transmission transmission

slide-12
SLIDE 12

OFDMA System OFDMA System [ECV

[ECV-

  • 03]

03]

slide-13
SLIDE 13

Solution Solution [ECV

[ECV-

  • 03]

03]

  • subcarriers are distributed

subcarriers are distributed among users among users

  • adaptive modulation in OFDMA

adaptive modulation in OFDMA systems systems

  • ptimal solution for
  • ptimal solution for ressouce

ressouce allocation allocation “ “ Integer Integer Programming Programming” ” -

  • data rate

data rate and and BER vs total BER vs total power power

slide-14
SLIDE 14

Control Control channels channels

  • channel estimation
  • ressouce allocation within coherence time
slide-15
SLIDE 15

OFDMA System OFDMA System [ECV

[ECV-

  • 03]

03]

slide-16
SLIDE 16

Solution Solution [ECV

[ECV-

  • 03]

03]

  • need

need of

  • f low

low complexity complexity algorithms algorithms

  • need

need of

  • f solutions

solutions closed closed to to the the

  • ptimal
  • ptimal one
  • ne
  • subcarrier

subcarrier allocation ( allocation ( linear linear programming programming, , hungarian hungarian algorithm algorithm ) )

  • adaptive modulation (bit

adaptive modulation (bit loading loading algorithm algorithm ) )

  • combination

combination and and improvements improvements algo algo. . ( ( fair fair scheduling scheduling, , greedy greedy realising realising, , horizontal horizontal and and vertical vertical swapping swapping) )

slide-17
SLIDE 17

2 2-

  • Study

Study of

  • f
  • Ian C. Wong,

Ian C. Wong, Zukang Zukang Shen Shen, Brian L. , Brian L. Evans, and Jeffrey G. Andrews , Evans, and Jeffrey G. Andrews , “ “ A Low A Low Complexity Algorithm for Proportional Complexity Algorithm for Proportional Resource Allocation in OFDMA Systems Resource Allocation in OFDMA Systems” ” , , 2004 2004 [ WSEA [ WSEA-

  • 04]

04]

slide-18
SLIDE 18

Resource allocation Resource allocation [WSEA

[WSEA-

  • 04]

04]

  • assigning subcarriers to SS

assigning subcarriers to SS

  • assigning power

assigning power

  • BER and data rate

BER and data rate contraints contraints

slide-19
SLIDE 19

Fixed Fixed data rate data rate and and BER BER [WSEA

[WSEA-

  • 04]

04]

  • fixed user data rates and BER

fixed user data rates and BER requirements requirements

  • goal: minimize the total transmitted

goal: minimize the total transmitted power power

  • problem : need of an adaptive

problem : need of an adaptive modulation system modulation system

slide-20
SLIDE 20

Rate Rate-

  • adaptive

adaptive [WSEA

[WSEA-

  • 04]

04]

  • maximize the total data rate

maximize the total data rate (capacity) over all users (capacity) over all users

  • power and BER constraints

power and BER constraints

  • use of

use of waterfilling waterfilling

  • problem : no fairness

problem : no fairness

  • goal: minimum user

goal: minimum user’ ’s data rate s data rate

slide-21
SLIDE 21

Resource allocation Resource allocation [WSEA

[WSEA-

  • 04]

04]

  • solution :

solution : maximization of the maximization of the the the total capacity subject to user rate total capacity subject to user rate constraints (fairness) constraints (fairness)

  • goal : low complexity algorithm

goal : low complexity algorithm

slide-22
SLIDE 22

OFDMA OFDMA system system [WSEA

[WSEA-

  • 04]

04]

slide-23
SLIDE 23

Solution Solution [WSEA

[WSEA-

  • 04]

04]

  • rate

rate-

  • adaptive resource allocation problem

adaptive resource allocation problem with with “ “ proportional rate constraints proportional rate constraints” ” for for OFDMA systems OFDMA systems

  • subcarrier

subcarrier allocation scheme that achieves allocation scheme that achieves “ “ approximate rate proportionality approximate rate proportionality” ” while while maximizing the total capacity maximizing the total capacity

  • direct algorithm with a much lower

direct algorithm with a much lower complexity versus an iterative algorithm complexity versus an iterative algorithm

  • higher

higher total total capacity capacity

slide-24
SLIDE 24

MAC LAYER QoS MAC LAYER QoS ARCHITECTURES ARCHITECTURES

“ “ Quality of Service Support in IEEE Quality of Service Support in IEEE 802.16 Networks 802.16 Networks” ” “ “ Providing integrated QoS control for Providing integrated QoS control for IEEE 802.16 broadband wireless IEEE 802.16 broadband wireless access systems access systems” ”

slide-25
SLIDE 25

“ “Quality of Service Support in IEEE Quality of Service Support in IEEE 802.16 Networks 802.16 Networks” ”

Analysis by simulating the performance of Analysis by simulating the performance of IEEE 802.16 in two application scenarios: IEEE 802.16 in two application scenarios:

  • residential subscribers

residential subscribers

  • SME (Small and Medium

SME (Small and Medium -

  • sized Enterprises)

sized Enterprises) subscribers subscribers Analysis aimed at showing the effectiveness Analysis aimed at showing the effectiveness

  • f the 802.16 MAC protocol in providing
  • f the 802.16 MAC protocol in providing

differentiated services to applications with differentiated services to applications with different QoS requirements, such as VoIP different QoS requirements, such as VoIP and Web. and Web.

slide-26
SLIDE 26

Blueprint of the functional entities Blueprint of the functional entities for QoS support for QoS support

slide-27
SLIDE 27
  • Each downlink connection has a packet queue at

Each downlink connection has a packet queue at the BS. the BS.

  • Uplink connection queues reside at

Uplink connection queues reside at SSs

  • SSs. Since the

. Since the BS controls the access to the medium in the BS controls the access to the medium in the uplink direction, bandwidth is granted to uplink direction, bandwidth is granted to SSs SSs on

  • n

demand. demand.

  • Bandwidth requests are used on the BS for

Bandwidth requests are used on the BS for estimating the residual backlog of uplink estimating the residual backlog of uplink connections. connections.

  • Allocates future uplink grants according to the

Allocates future uplink grants according to the respective set of QoS parameters and the virtual respective set of QoS parameters and the virtual status of the queues. status of the queues.

slide-28
SLIDE 28

Implemented Algorithms: Implemented Algorithms:

Since minimum reserved rate is the basic QoS parameter Since minimum reserved rate is the basic QoS parameter negotiated by a connection, so: negotiated by a connection, so: the class of the class of latency latency-

  • rate scheduling algorithms

rate scheduling algorithms

  • Deficit round robin (DRR) as the downlink scheduler at the BS:

Deficit round robin (DRR) as the downlink scheduler at the BS:

  • the

the ability of providing fair queuing in the presence of ability of providing fair queuing in the presence of variable length variable length packets packets

  • the

the simplicity of implementation. simplicity of implementation.

  • DRR assumes that the size of the head

DRR assumes that the size of the head-

  • of
  • f-
  • line packet is known

line packet is known at each packet queue: cannot be used by the BS to schedule at each packet queue: cannot be used by the BS to schedule transmissions in the uplink direction. transmissions in the uplink direction.

  • Weighted round robin (WRR) is selected as the uplink

Weighted round robin (WRR) is selected as the uplink

  • scheduler. Like DRR, WRR belongs to the class of rate
  • scheduler. Like DRR, WRR belongs to the class of rate-
  • latency scheduling algorithms.

latency scheduling algorithms.

  • DRR is implemented as the SS scheduler, because the SS

DRR is implemented as the SS scheduler, because the SS knows the sizes of the head knows the sizes of the head-

  • of
  • f-
  • line packets of its queues.

line packets of its queues.

slide-29
SLIDE 29

The performance of an IEEE The performance of an IEEE 802.16 system has been assessed 802.16 system has been assessed under two traffic scenarios: under two traffic scenarios:

The first one (residential scenario) dealt with data (non The first one (residential scenario) dealt with data (non-

  • QoS)

QoS) traffic only: BE scheduling service: traffic only: BE scheduling service:

  • The average delay of the uplink traffic is higher than that of

The average delay of the uplink traffic is higher than that of the downlink traffic. And the former increases more sharply the downlink traffic. And the former increases more sharply than the latter with the offered load. This behavior can be than the latter with the offered load. This behavior can be explained by means of both the bandwidth explained by means of both the bandwidth-

  • request

request mechanism and the overhead introduced by physical mechanism and the overhead introduced by physical preambles. preambles. The second scenario (SME scenario), they have shown the The second scenario (SME scenario), they have shown the service differentiation, in terms of delay, between data service differentiation, in terms of delay, between data (served via BE) and multimedia traffic (served via (served via BE) and multimedia traffic (served via rtPS rtPS). ). This is achieved because scheduling in 802.16 is controlled This is achieved because scheduling in 802.16 is controlled by the BS in both the downlink and uplink directions. by the BS in both the downlink and uplink directions. Therefore, it is possible to employ scheduling algorithms Therefore, it is possible to employ scheduling algorithms which are able to provide QoS guarantees. which are able to provide QoS guarantees.

slide-30
SLIDE 30

“ “Providing integrated QoS control Providing integrated QoS control for IEEE 802.16 broadband for IEEE 802.16 broadband wireless access systems wireless access systems” ”

  • In this study, the authors propose a new

In this study, the authors propose a new integrated QoS architecture for IEEE integrated QoS architecture for IEEE 802.16 Broadband Wireless MAN in TDD 802.16 Broadband Wireless MAN in TDD

  • mode. A mapping rule for providing
  • mode. A mapping rule for providing

DiffServ DiffServ between IP layer and MAC layer is between IP layer and MAC layer is given and a fast signaling given and a fast signaling mechanism(IntServ mechanism(IntServ) is designed to ) is designed to provide cross layer integrated QoS for provide cross layer integrated QoS for Point to Multi Point to Multi-

  • Point (PMP) mode.

Point (PMP) mode.

slide-31
SLIDE 31

IntServ IntServ: :

  • Applications requiring guaranteed service or

Applications requiring guaranteed service or controlled controlled-

  • load service must set up the paths and

load service must set up the paths and reserve resources before transmitting their data. reserve resources before transmitting their data.

  • The QoS provision procedure will consist of the

The QoS provision procedure will consist of the following two part: following two part:

  • The secondary management connection will be

The secondary management connection will be used for RSVP to provide the layer 3 QoS used for RSVP to provide the layer 3 QoS

  • The primary management connection will be

The primary management connection will be used for DSA/ DSC/ DSD to provide the layer 2 used for DSA/ DSC/ DSD to provide the layer 2 QoS. QoS.

  • Result> The whole QoS provision will be rather

Result> The whole QoS provision will be rather slow. slow.

slide-32
SLIDE 32

They propose an integrated QoS control architecture as They propose an integrated QoS control architecture as shown in the figure, which implements a cross layer traffic shown in the figure, which implements a cross layer traffic-

  • based prioritization mechanism in a comprehensive way.

based prioritization mechanism in a comprehensive way.

slide-33
SLIDE 33
  • Step 1 and 2, when a new service flow arrives in

Step 1 and 2, when a new service flow arrives in IP layer, it will be firstly parsed according to the IP layer, it will be firstly parsed according to the definition in PATH message (for definition in PATH message (for InteServ InteServ) or ) or Differentiated Services Code Point (DSCP for Differentiated Services Code Point (DSCP for DiffServ DiffServ); then classified and mapped into one of ); then classified and mapped into one of four types of services (UGS, four types of services (UGS, rtPS rtPS, , nrtPS nrtPS or BE).

  • r BE).
  • In step 3, the dynamic service model in SS will

In step 3, the dynamic service model in SS will send request message to the BS, then the send request message to the BS, then the admission control in BS will determine whether admission control in BS will determine whether this request will be approved or not. this request will be approved or not.

  • If not, the service module will inform upper layer

If not, the service module will inform upper layer to deny this service in step 4. to deny this service in step 4.

  • If yes, admission control will notify scheduling

If yes, admission control will notify scheduling module to make a provision in its basis module to make a provision in its basis scheduling parameter according to the value scheduling parameter according to the value shown in the request message and the accepted shown in the request message and the accepted service will transfer into traffic grooming module service will transfer into traffic grooming module in step 5. in step 5.

slide-34
SLIDE 34
  • In step 6, according to the traffic

In step 6, according to the traffic grooming result, SS will send Bandwidth grooming result, SS will send Bandwidth Request message to BS. Request message to BS.

  • The scheduling module in BS will retrieve

The scheduling module in BS will retrieve the requests (step 7) and generate UL the requests (step 7) and generate UL-

  • MAP and DL

MAP and DL-

  • MAP message (step 8)

MAP message (step 8) following the bandwidth allocation results. following the bandwidth allocation results.

  • In steps 9

In steps 9-

  • 10, the SS will package

10, the SS will package SDUs SDUs from IP layer into from IP layer into PDUs PDUs and upload them and upload them in its uplink slot to BS. in its uplink slot to BS.

slide-35
SLIDE 35

Admission Control and Scheduling Admission Control and Scheduling in BS in BS

slide-36
SLIDE 36
  • It will collect all the DSA/ DSC/ DSD requests and

It will collect all the DSA/ DSC/ DSD requests and update the estimated available bandwidth based update the estimated available bandwidth based

  • n bandwidth change. The hierarchical structure
  • n bandwidth change. The hierarchical structure
  • f the bandwidth allocation in BS is shown in the
  • f the bandwidth allocation in BS is shown in the

figure. figure.

  • Two

Two-

  • layer scheduling is deployed. Six queues are

layer scheduling is deployed. Six queues are defined according to their direction (uplink or defined according to their direction (uplink or downlink) and service classes ( downlink) and service classes ( rtPS rtPS, , nrtPS nrtPS and and BE). Since service of UGS will be allocated fixed BE). Since service of UGS will be allocated fixed bandwidth (or fixed time duration) in bandwidth (or fixed time duration) in transmission, these bandwidths will be cut transmission, these bandwidths will be cut directly before each scheduling. directly before each scheduling.

slide-37
SLIDE 37
  • The algorithm of the first layer scheduling

The algorithm of the first layer scheduling is called Deficit Fair Priority Queue (DFPQ) is called Deficit Fair Priority Queue (DFPQ) which is basically based on priority queue. which is basically based on priority queue.

  • In the second layer scheduling, three

In the second layer scheduling, three different algorithms are assigned to three different algorithms are assigned to three classes of service to match its classes of service to match its requirements: requirements:

  • Earliest deadline first (EDF) for

Earliest deadline first (EDF) for rtPS rtPS

  • Weight fair queue (WFQ) for

Weight fair queue (WFQ) for nrtPS nrtPS. .

  • BE connection by round robin (RR).

BE connection by round robin (RR).

slide-38
SLIDE 38

Comparison between two ways of Comparison between two ways of RSVP RSVP

  • The negotiation of QoS parameters for one traffic

The negotiation of QoS parameters for one traffic will be processed two times: will be processed two times:

  • For the first time, the parameters are carried in

For the first time, the parameters are carried in RSVP messages and transmitted through the RSVP messages and transmitted through the Secondary Management connection. Secondary Management connection.

  • For the second time, the same parameters are

For the second time, the same parameters are mapped in MAC message and transmitted mapped in MAC message and transmitted through the Primary Management Connection. through the Primary Management Connection.

  • With the utilization of the new mapping rule, the

With the utilization of the new mapping rule, the RSVP signaling messages are mapped directly RSVP signaling messages are mapped directly into the MAC messages, and then transmitted into the MAC messages, and then transmitted through the Primary Management Connection. In through the Primary Management Connection. In this way, the messages are transmitted only this way, the messages are transmitted only

  • nce, reducing the delay.
  • nce, reducing the delay.
slide-39
SLIDE 39

Other studies: Other studies:

“ A QoS Architecture for the MAC Protocol of IEEE A QoS Architecture for the MAC Protocol of IEEE 802.16 BWA System 802.16 BWA System ” ”

“ A Quality of Service Architecture for IEEE 802.16 A Quality of Service Architecture for IEEE 802.16 Standards Standards” ”

“ Quality of service scheduling in cable and Quality of service scheduling in cable and broadband wireless access systems broadband wireless access systems” ”

“ Exploiting MAC flexibility in WiMAX for media Exploiting MAC flexibility in WiMAX for media streaming streaming” ”

“ Algorithms for routing and centralized Algorithms for routing and centralized scheduling to provide QoS in IEEE 802.16 mesh scheduling to provide QoS in IEEE 802.16 mesh networks networks” ”

“ Modeling and performance analysis of the Modeling and performance analysis of the distributed scheduler in IEEE 802.16 mesh mode distributed scheduler in IEEE 802.16 mesh mode” ”

slide-40
SLIDE 40

Thank you for your attention Thank you for your attention … …