WMAN, part 2 S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks1 Contents IEEE 802.16 family of standards Protocol layering TDD frame.

Slides:



Advertisements
Similar presentations
New NS-2 model developed for the IEEE specifications is now publicly available. This model was developed as part of the Seamless and Secure Mobility.
Advertisements

QoS Scheduling in Cable and Broadband Wireless Networks
1 IEEE Wireless MAN (Wireless Metropolitan Network) A Technical Overview of the WirelessMAN TM Air Interface for Broadband Wireless Access, Carl.
Telecommunications and Multimedia Unit UTRA TDD Overview Agostinho Castro Rui Sarmento Castro
CCNA – Network Fundamentals
Proprietary of NTHU Communication SOC Lab, 2006 Beam Forming, Null Steering, and SDMA Selecting the weights correctly allows transmitter (receiver)
Overview of IEEE and MAC Layer September 25, 2009 SungHoon Seo
A serve flow management strategy for IEEE BWA system in TDD mode Hsin-Hsien Liu
1 Synchronization for OFDMA System Student: 劉耀鈞 Advisor: Prof. D. W. Lin Time: 2006/3/16.
Performance Analysis of the IEEE Wireless Metropolitan Area Network nmgmt.cs.nchu.edu.tw 系統暨網路管理實驗室 Systems & Network Management Lab Reporter :黃文帥.
Quality of Service Scheduling for Broadband Wireless Access Systems Sih-Han Chen Department of Computer Science and Information Engineering National.
The uplink subframe may also contain contention-based allocations for - initial system access and - broadcast or multicast bandwidth requests. The access.
IEEE Std Technique Overview nmgmt.cs.nchu.edu.tw 系統暨網路管理實驗室 Systems & Network Management Lab Reporter :黃文帥 2007/09/18.
1 A new QoS Architecture for IEEE and Spec. Instruction Speaker: Ming-Chia Hsieh Date:2005/05/03.
12006/11/28 Performance Analysis of Scheduling Algorithms for VoIP Services in IEEE e Systems Advisor: Dr. Kai-Wei Ke Speaker: Jaw-Woei Ma Date:11/28/2006.
Contents Physical layer for IEEE b Channel allocation
Usage of OFDM in a wideband fading channel OFDM signal structure Subcarrier modulation and coding Signals in frequency and time domain Inter-carrier interference.
WMAN, part 1 S Wireless Personal, Local, Metropolitan, and Wide Area Networks1 Contents IEEE family of standards Protocol layering TDD frame.
Glenn Research Center at Lewis Field 1 NEONet 2006 Investigating for Aeronautical Use Steven Bretmersky Cleveland State University March 1, 2006.
IEEE e/Mobile WiMAX Moise Effo.
WiMAX 簡介 Ming-Tsung Huang Fu Jen Catholic University Computer Science.
Vulnerabilities Prasad Narayana, Yao Zhao, Yan Chen, Judy Fu (Motorola Labs) Lab for Internet & Security Tech, Northwestern Univ.
1 IEEE Wireless MAN "Air Interface for Fixed Broadband Wireless Access Systems"
Doc.: IEEE /096 Submission May 2000 Gunnar Rydnell, Ericsson Slide 1 HIPERLAN type 2 – Data transport Date:May 8, 2000 Author:Gunnar Rydnell Ericsson.
1. WiMAX_NWG_Stage2 & Stage3. WiMAX Forum The WiMAX Forum is a nonprofit organization formed in 2001 to enhance the compatibility and interoperability.
Vehicular Networking An introduction
An Efficient QoS Scheduling Architecture for IEEE Wireless MANs Supriya Maheshwari Under the guidance of Prof. Sridhar Iyer and Prof. Krishna Paul.
The Medium Access Control Sublayer Chapter 4 10/1/2015www.noteshit.com1.
A Study of the Bandwidth Management Architecture over IEEE WiMAX Student :Sih-Han Chen Advisor : Ho-Ting Wu Date :
IEEE WirelessMAN For Broadband Wireless Metropolitan Area Networks.
Autumn2004 © University of Surrey SatComms A - part 4 - B G Evans 4.1 Satellite Communications A Part 4 Access Schemes in Satellite Networks -Professor.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Network Services Networking for Home and Small Businesses – Chapter 6.
AeroMACS QOS.
WiMAX: IEEE Wireless MANs. Sridhar IyerIIT Bombay2 Wireless networks  Wireless PANs (Bluetooth – IEEE ) –very low range –wireless connection.
Performance Analysis of an innovative scheduling algorithm for OFDMA based IEEE a systems E. Baccarelli, M.Biagi, C.Pelizzoni, N.Cordeschi This work.
2008/4/101 A DAPTIVE P OWER A LLOCATION AND C ALL A DMISSION C ONTROL IN M ULTISERVICE W IMAX A CCESS N ETWORKS IEEE Wireless Communications February 2007.
An Adaptive Deficit-based Scheduler for IEEE e Networks Nararat RUANGCHAIJATUPON and Yusheng JI The Graduate University for Advanced Studies National.
Fen Hou and Pin-Han Ho Department of Electrical and Computer Engineering, University of Waterloo, Waterloo, Ontario Wireless Communications and Mobile.
Wireless LAN Overview Sunggeun Jin Outline  IEEE MAC  IEEE MAC.
WiMAX: IEEE Wireless MANs Sridhar Iyer K R School of Information Technology IIT Bombay
Information Technology Laboratory, Advance Network Technologies Division Overview of NIST IEEE implementation in NS-2 High Speed Network Technology.
NS-2 NIST add-on IEEE model (MAC+PHY) Miray Kas 28 Jan 2008.
Robust QoS Control for Single Carrier PMP Mode IEEE Systems Authors: Xiaofeng Bai, Abdallah Shami, and Yinghua Ye Published: IEEE TMC April 2008.
Uplink Scheduling with Quality of Service in IEEE Networks Juliana Freitag and Nelson L. S. da Fonseca State University of Campinas, Sao Paulo,
Wireless Metropolitan Area Networks (WMANs) using WiMAX.
The Medium Access Control Sublayer Chapter 4 12/13/2015www.ishuchita.com1.
IEEE j Relay-Based Wireless Access Networks VASKEN GENC, SEAN MURPHY, YANG YU, AND JOHN MURPHY, UNIVERSITY COLLEGE DUBLIN SCHOOL OF COMPUTER SCIENCE.
Yuan-Cheng Lai and Yen-Hung Chen Department of Information Management National Taiwan University of Science and Technology AINA 2008 Accept rate: 2008.
1 A Cross-Layer Scheduling Algorithm With QoS Support in Wireless Networks Qingwen Liu, Student Member, IEEE, Xin Wang, Member, IEEE, and Georgios B. Giannakis,
The Medium Access Control Sublayer Chapter 4. The Channel Allocation Problem Static Channel Allocation in LANs and MANs Dynamic Channel Allocation in.
Doc.: IEEE /032 Submission March 2000 Jamshid Khun-Jush, Ericsson HiperLAN type 2: A System with QoS Support Jamshid Khun-Jush Chairman ETSI Project.
Performance Evaluation of the IEEE MAC for QoS Claudio Cicconetti, Alessandro Erta, Luciano Lenzini, and Enzo Mingozzi IEEE Transactions On Mobile.
Multicast Polling and Efficient VoIP Connections in IEEE Networks Olli Alanen Telecommunication Laboratory Department of Mathematical Information.
Ben-Gurion University of the Negev Department of Communication Systems Engineering.
The Medium Access Control Sublayer
IEEE Wireless LAN Standard
1 Wireless Networks Lecture 21 WCDMA (Part I) Dr. Ghalib A. Shah.
1 Wireless Networks Lecture 43 IEEE MAC/QoS Dr. Ghalib A. Shah.
Broadband Access Networks and Services Chapter 7 IEEE Standard Byeong Gi Lee Seoul National University EE Spring 2004.
Wireless Networks Spring 2007 WiMAX: Broadband Wireless Access.
WiMAX 1EEE Protocol Stack
WiMAX for Broadband Wireless Access
From IEEE Communications Magazine, June 2002 Presented by Hermes Liu
Analysis and Evaluation of a New MAC Protocol
WiMAX: IEEE Wireless MANs
WiMAX: Broadband Wireless Access
Wireless Mesh Networks
Strawmodel ac Specification Framework
Security in Wireless Metropolitan Area Networks (802.16)
Security in Wireless Metropolitan Area Networks (802.16)
Presentation transcript:

WMAN, part 2 S Wireless Personal, Local, Metropolitan, and Wide Area Networks1 Contents IEEE family of standards Protocol layering TDD frame structure MAC PDU structure Part 1: Part 2:Dynamic QoS management OFDM PHY layer

WMAN, part 2 S Wireless Personal, Local, Metropolitan, and Wide Area Networks2 Four service classes The IEEE MAC layer defines four service classes: Unsolicited Grant Service (UGS) Real-time Polling Service (rtPS) Non-real-time Polling Service (nrtPS) Best Effort (BE) service The scheduling algorithms needed for implementing the three first types of services are implemented in the BS (while allocating uplink bandwidth to each SS) and are not defined in the standard. Each SS negotiates its service policies with the BS at the connection setup time. QoS increases

WMAN, part 2 S Wireless Personal, Local, Metropolitan, and Wide Area Networks3 Unsolicited grant service (UGS) UGS offers fixed size grants on a real-time periodic basis, which eliminates the overhead and latency of SS requests and assures that grants are available to meet the flow’s real-time needs. The BS provides fixed size bursts in the uplink at periodic intervals for the service flow. The burst size and other parameters are negotiated at connection setup. Typical UGS applications: E1/T1 links (containing e.g. delay-sensitive speech signals), VoIP (without silence suppression). UGS rtPS nrtPS BE

WMAN, part 2 S Wireless Personal, Local, Metropolitan, and Wide Area Networks4 Real-time Polling Service (rtPS) The Real-time Polling Service (rtPS) is designed to support real-time service flows that generate variable size data packets on a periodic basis, such as VoIP (with silence suppression) or streaming video. This service offers real-time, periodic, unicast request opportunities, which meet the flow’s real-time needs and allow the SS to specify the size of the desired uplink transmission burst. This service requires more request overhead than UGS, but supports variable grant sizes for optimum data transport efficiency. UGS rtPS nrtPS BE

WMAN, part 2 S Wireless Personal, Local, Metropolitan, and Wide Area Networks5 Non-real-time Polling Service (nrtPS) The Non-real-time Polling Service (nrtPS) is designed to support non-real-time service flows that require variable size bursts in the uplink on a regular (but not strictly periodic) basis. Subscriber stations contend for bandwidth (for uplink transmission) during contention request opportunities. The availability of such opportunities is guaranteed at regular intervals (on the order of one second or less) irrespective of network load. UGS rtPS nrtPS BE

WMAN, part 2 S Wireless Personal, Local, Metropolitan, and Wide Area Networks6 Best Effort (BE) service The Best Effort service is intended to be used for best effort traffic where no throughput or delay guarantees are provided. Subscriber stations contend for bandwidth (for uplink transmission) during contention request opportunities. The availability of such opportunities depends on network load and is not guaranteed (in contrast to nrtPS). UGS rtPS nrtPS BE

WMAN, part 2 S Wireless Personal, Local, Metropolitan, and Wide Area Networks7 Radio Link Control in IEEE The main task of Radio Link Control (RLC) in IEEE systems is to provide dynamic changing of UL and DL burst profiles on a per-connection and per-frame basis, depending on radio channel characteristics and QoS requirements. As an example, RLC provides signaling for initial access (ranging) and bandwidth allocation in the downlink direction: Ranging request (RNG-REQ) from SS to BS Ranging response (RNG-RSP) from BS to SS Bandwidth requests (DBPC-REQ) from SS to BS Bandwidth confirmation (DBPC-RSP) from BS to SS

WMAN, part 2 S Wireless Personal, Local, Metropolitan, and Wide Area Networks8 Initial access (initial ranging) RNG-REQ RNG-RSP DBPC-REQ DBPC-RSP Contention slot A Contention slot A Contention slot B Contention slot B UL PHY burst 1 UL PHY burst 1 …… UL PHY burst 2 UL PHY burst 2 UL traffic During initial access, the SS sends a ranging request message in the contention slot reserved for this purpose, among others indicating which kind of DL burst profile should be used. Note: There is the possibility of collision since other subscriber stations also send ranging request messages in this contention slot.

WMAN, part 2 S Wireless Personal, Local, Metropolitan, and Wide Area Networks9 Initial access (initial ranging) RNG-REQ RNG-RSP DBPC-REQ DBPC-RSP In response to the RNG-REQ message, the BS returns a ranging response message in a DL burst with a sufficiently robust burst profile. This message includes the timing advance value for correct alignment of bursts in UL, as well as UL power control information. DL PHY burst DL PHY burst Preamble FCS DL burst 1 DL burst n … DL burst k …

WMAN, part 2 S Wireless Personal, Local, Metropolitan, and Wide Area Networks10 Contention slot A Contention slot A DL burst profile change RNG-REQ RNG-RSP DBPC-REQ DBPC-RSP Contention slot B Contention slot B UL PHY burst 1 UL PHY burst 1 …… UL PHY burst 2 UL PHY burst 2 UL traffic The SS continuously measures the radio channel quality. If there is a need for change in DL burst profile, the SS sends a DL burst profile change request message in the contention slot reserved for this purpose, indicating the desired new DL burst profile.

WMAN, part 2 S Wireless Personal, Local, Metropolitan, and Wide Area Networks11 DL burst profile change RNG-REQ RNG-RSP DBPC-REQ DBPC-RSP In response to the DBPC-REQ message, the BS returns a DL burst profile change response message confirming the new burst profile. This is done in a DL burst with the old burst profile (when changing to a less robust DL burst profile) or using the new burst profile (when changing to a more robust DL burst profile). DL PHY burst DL PHY burst Preamble FCS DL burst 1 DL burst n … DL burst k …

WMAN, part 2 S Wireless Personal, Local, Metropolitan, and Wide Area Networks12 Transition to a new DL burst profile BS DL burst profile n is used DL burst profile n is used DL data is sent using new burst profile k Channel measurement indicates that different DL burst profile should be used SS DBPC-REQ DBPC-RSP DL burst profile k is used DL burst profile k is used

WMAN, part 2 S Wireless Personal, Local, Metropolitan, and Wide Area Networks13 UL burst profile change RNG-REQ RNG-RSP DBPC-REQ DBPC-RSP DCD The BS measures the UL signal quality and may request a change in UL burst profile as indicated in the downlink channel descriptor (DCD) within the first DL burst of the DL PHY burst. DL PHY burst DL PHY burst Preamble FCS DL burst 1 DL burst n … DL burst k … SS: Read DCD and change UL burst profile accordingly SS: Read DCD and change UL burst profile accordingly

WMAN, part 2 S Wireless Personal, Local, Metropolitan, and Wide Area Networks14 Dynamic QoS management in practice The request-response mechanism described on the previous slides is designed to be scalable, efficient, and self-correcting. While extensive bandwidth allocation and QoS mechanisms are specified in the IEEE standard, the details of scheduling and reservation management have not been standardized and thus provide an important mechanism for vendors to differentiate their equipment. (There is a similar situation regarding standardization of a transmission system in general: the transmitted signal is standardized in detail, whereas receivers can process the received signal as they like, using innovative technology.)

WMAN, part 2 S Wireless Personal, Local, Metropolitan, and Wide Area Networks15 Three types of management connections When a subscriber station acesses the network, three types of management connections are established between the SS and the BS (before transport connections can be established): Basic management connection for exchange of short, delay-critical MAC management messages Primary management connection for exchange of longer, more delay tolerant MAC management messages Secondary management connection for exchange of delay tolerant IP-based messages, such as used during DHCP transactions.

WMAN, part 2 S Wireless Personal, Local, Metropolitan, and Wide Area Networks16 Connection establishment (1) Channel acquisition: The MAC protocol includes an initialization procedure designed to eliminate the need for manual configuration. Upon installation, the SS scans for a suitable BS downlink signal. The SS synchronizes to this signal and reads the downlink channel descriptor (DCD) and uplink channel descriptor (UCD) information in the first DL burst of the DL PHY PDU, in order to learn the modulation and coding schemes used on the carrier.

WMAN, part 2 S Wireless Personal, Local, Metropolitan, and Wide Area Networks17 Connection establishment (2) Initial ranging and negotiation of SS capabilities (1): Upon learning what parameters to use for its initial ranging signal in UL, the SS looks for initial ranging opportunities by scanning the UL-MAP information present in every frame. After a random backoff time, the SS sends the ranging request message (RNG-REQ) to the BS. The BS calculates the timing advance value that the SS must use in UL from now on, and sends this information to the SS in the RNG-RSP message.

WMAN, part 2 S Wireless Personal, Local, Metropolitan, and Wide Area Networks18 Connection establishment (3) Initial ranging and negotiation of SS capabilities (2): The BS also sends power control information, as well as the CID for the basic management connection and the primary management connection to the SS. Using the primary management connection, the SS reports its PHY capabilities, including the modulation and coding schemes it supports and whether, in an FDD system, it is half-duplex or full-duplex. The BS, in its response, can deny the use of any capability reported by the SS.

WMAN, part 2 S Wireless Personal, Local, Metropolitan, and Wide Area Networks19 Connection establishment (4) SS authentication (using privacy sublayer): Each SS contains both a manufacturer-issued factory- installed X.509 digital certificate and the certificate of the manufacturer. After sending these certificates (and the public key of the SS) to the BS, the BS can authenticate the SS. If authentication is successful, the BS sends the Authorization Key (AK), encrypted with the public key of the SS, to the SS. The AK is used both by SS and BS for securing further information flow.

WMAN, part 2 S Wireless Personal, Local, Metropolitan, and Wide Area Networks20 Connection establishment (5) SS registration: Upon successful authentication, the SS registers with the network. The response from the BS contains the CID for a secondary management connection. Contrary to the basic and primary management connection, this secondary management connection is secured. At this point, the capabilities related to connection setup and MAC operation, as well as the IP version used, are determined. (Remember that the secondary management connection is IP-based.)

WMAN, part 2 S Wireless Personal, Local, Metropolitan, and Wide Area Networks21 Connection establishment (6) IP connectivity: After registration, using the secondary management connection, the SS is allocated an IP address via DHCP and establishes the time of the day via the Internet Time Protocol. The DHCP server also provides the address of the TFTP server from which the SS can request a configuration file. This file provides a standard interface for providing vendor-specific configuration information.

WMAN, part 2 S Wireless Personal, Local, Metropolitan, and Wide Area Networks22 Connection establishment (7) Connection setup: Finally, the secondary management connection is also used for setting up one or more transport connections. These transport connections carry the actual user data (IP traffic, VoIP traffic, etc.) between BS and SS. IEEE uses the concept of service flows to define unidirectional transport of packets on either downlink or uplink. Service flows are characterized by a certain set of QoS parameters, and are established using a three-way handshaking establishment procedure.

WMAN, part 2 S Wireless Personal, Local, Metropolitan, and Wide Area Networks23 Summary: Dynamic QoS management In summary, IEEE offers the following mechanisms for dynamically managing QoS and bandwidth: In the PHY layer by adjusting the DL and UL burst profiles (modulation and coding combination) on a per-frame basis. In the MAC layer through fragmentation and packing (both can be done at the same time). At higher protocol layers by using scheduling algorithms in the base station. These algorithms are not specified in the IEEE standard.

WMAN, part 2 S Wireless Personal, Local, Metropolitan, and Wide Area Networks24 WirelessMAN-OFDM PHY WirelessMAN-OFDM is based on 256 subcarriers, of which 200 subcarriers are used: 192 data subcarriers + 8 pilot subcarriers. There are 56 ”nulls” (center carrier, 28 lower frequency and 27 higher frequency guard carriers).

WMAN, part 2 S Wireless Personal, Local, Metropolitan, and Wide Area Networks25 Modulation and coding affect user data rate The 192 data subcarriers carry 192 data symbols in parallel (= transmitted at the same time). Each symbol carries 1 bit (BPSK), 2 bits (QPSK), 4 bits (16-QAM), or 6 bits (64-QAM) of channel information (corresponding to the channel bit rate after channel coding, not to be confused with the user bit rate before channel coding). The inner convolutional coding reduces the usable number of bits to 1/2, 2/3, or 3/4 of the channel information. The outer Reed-Solomon block coding furthermore reduces the usable number of bits about 10 %.

WMAN, part 2 S Wireless Personal, Local, Metropolitan, and Wide Area Networks26 Subcarrier signal in time domain (1) Time Guard time for preventing intersymbol interference In the receiver, FFT is calculated only during this time Next symbol TbTb TgTg IEEE offers four values for G = T g /T b : G = 1/4, 1/8, 1/16 or 1/32. (802.11a/g offers only one value: G = 1/4) TsTs

WMAN, part 2 S Wireless Personal, Local, Metropolitan, and Wide Area Networks27 Subcarrier signal in time domain (2) IEEE offers various bandwidth choices. The bandwidth is typically an integer multiple of 1.25, 1.5 or 1.75 MHz. (802.11a/g offers only a fixed channel bandwidth: MHz) Since the number of subcarriers is fixed, a certain bandwidth is translated into a certain subcarrier spacing f = 1/T b. Time Next symbol TbTb TgTg

WMAN, part 2 S Wireless Personal, Local, Metropolitan, and Wide Area Networks28 Four primitive parameters WirelessMAN-OFDM defines four "primitive parameters" that characterize the OFDM symbol: The nominal channel bandwidth BW The number of used subcarriers N used = 200 The sampling factor n. This parameter depends on the bandwidth. For instance, when the bandwith is a multiple of 1.25, 1.5 or 1.75 MHz, n = 144/125, 86/75 or 8/7, respectively. The guard time to useful symbol time ratio G.

WMAN, part 2 S Wireless Personal, Local, Metropolitan, and Wide Area Networks29 Derived parameters Using the four primitive parameters shown on the previous slide, the following additional parameters can be derived: N FFT (the smallest power of two greater than N used ) = 256 Sampling frequency f s = floor(n. BW/8000)x8000 Subcarrier spacing f = f s /N FFT Useful symbol time T b = 1/f Guard time T g = G. T b OFDM symbol time T s = T g + T b.

WMAN, part 2 S Wireless Personal, Local, Metropolitan, and Wide Area Networks30 Example For BW = 5 MHz, BPSK, G = 1/32, calculate peak bit rate: f s = floor(144/125 x 5 MHz / 8000) x 8000 = 5.76 MHz f = f s /N FFT = 5.76 MHz / 256 = 22.5 kHz T b = 1/f = s T g = G. T b = 1.39 s T s = T g + T b = s Peak bit rate = (192 bits x 0.5 x 0.9) / s = 1.89 Mb/s 86.4 info bits / OFDM symbol

WMAN, part 2 S Wireless Personal, Local, Metropolitan, and Wide Area Networks31 Modulation BPSK QPSK 16-QAM 64-QAM Info bits / subcarrier Info bits / symbol Peak data rate (Mbit/s) Coding rate 1/2 3/4 1/2 3/4 2/3 3/4 Depends on chosen bandwidth (here 5 MHz is assumed) Modulation and coding combinations

WMAN, part 2 S Wireless Personal, Local, Metropolitan, and Wide Area Networks32 Example (cont.) The peak bit rate does not take into account the MAC layer overhead (MAC PDU header and trailer) and PHY layer overhead (contention slots and burst preamble in UL, DL PHY PDU preamble and header in DL). Consequently, the user data rate is substantially smaller (even if the SS is the only user of the WMAN).