A Scheduling Technique for Bandwidth Allocation in Wireless Personal Communication Networks Nikos Passas, Nikos Loukas, and Lazaros Merakos Future generation.

Slides:



Advertisements
Similar presentations
Switching Techniques In large networks there might be multiple paths linking sender and receiver. Information may be switched as it travels through various.
Advertisements

A Centralized Scheduling Algorithm based on Multi-path Routing in WiMax Mesh Network Yang Cao, Zhimin Liu and Yi Yang International Conference on Wireless.
1 CONGESTION CONTROL. 2 Congestion Control When one part of the subnet (e.g. one or more routers in an area) becomes overloaded, congestion results. Because.
William Stallings Data and Computer Communications 7 th Edition Chapter 13 Congestion in Data Networks.
Channel Allocation Protocols. Dynamic Channel Allocation Parameters Station Model. –N independent stations, each acting as a Poisson Process for the purpose.
1.  Congestion Control Congestion Control  Factors that Cause Congestion Factors that Cause Congestion  Congestion Control vs Flow Control Congestion.
Engineering Internet QoS
1 “Multiplexing Live Video Streams & Voice with Data over a High Capacity Packet Switched Wireless Network” Spyros Psychis, Polychronis Koutsakis and Michael.
Presented By: Pariya Raoufi. Motivations Future applications require: higher bandwidth, generate a heterogeneous mix of network traffic, low latency.
A serve flow management strategy for IEEE BWA system in TDD mode Hsin-Hsien Liu
CS 5253 Workshop 1 MAC Protocol and Traffic Model.
Ncue-csie1 A QoS Guaranteed Multipolling Scheme for Voice Traffic in IEEE Wireless LANs Der-Jiunn Deng 、 Chong-Shuo Fan 、 Chao-Yang Lin Speaker:
1 EE 400 Asynchronous Transfer Mode (ATM) Abdullah AL-Harthi.
1 Token Bucket Based CAC and Packet Scheduling for IEEE Broadband Wireless Access Networks Chi-Hung Chiang
In-Band Flow Establishment for End-to-End QoS in RDRN Saravanan Radhakrishnan.
7C Cimini-9/97 RANDOM ACCESS TECHNIQUES ALOHA Efficiency Reservation Protocols Voice and Data Techniques - PRMA - Variable rate CDMA.
1 Two-Stage Dynamic Uplink Channel and Slot Assignment for GPRS Author: Ying-Dar Lin, Yu-Ching Hsu, Mei-Yan Chiang Reporter: Chen-Nien Tsai.
CDMA X RTT Overview. Global 3G Evolution.
Two Media Access Control Protocols (MAC) for Wireless Networks.
Χήρας Θεόδωρος- Special Topics in Communication Networks 1 Design and performance evaluation of an RRA scheme for voice-data channel access in outdoor.
“On the Integration of MPEG-4 streams Pulled Out of High Performance Mobile Devices and Data Traffic over a Wireless Network” Spyros Psychis, Polychronis.
CS 5253 Workshop 1 MAC Protocol and Traffic Model.
Data Communications and Networks Chapter 2 - Network Technologies - Circuit and Packet Switching Data Communications and Network.
Switching Techniques Student: Blidaru Catalina Elena.
Chap 4 Multiaccess Communication (Part 1)
1 Real-Time Traffic over the IEEE Medium Access Control Layer Tian He J. Sobrinho and A. krishnakumar.
A Distributed Scheduling Algorithm for Real-time (D-SAR) Industrial Wireless Sensor and Actuator Networks By Kiana Karimpour.
CHAPTER 4: THE MEDIUM ACCESS SUBLAYER 4.1: The Channel Allocation Problem 4.2: Multiple Access Protocols.
جلسه دهم شبکه های کامپیوتری به نــــــــــــام خدا.
KARTIK DABBIRU Roll # EE
Univ. of TehranAdv. topics in Computer Network1 Advanced topics in Computer Networks University of Tehran Dept. of EE and Computer Engineering By: Dr.
Fen Hou and Pin-Han Ho Department of Electrical and Computer Engineering, University of Waterloo, Waterloo, Ontario Wireless Communications and Mobile.
Switching breaks up large collision domains into smaller ones Collision domain is a network segment with two or more devices sharing the same Introduction.
Computer Networks with Internet Technology William Stallings
November 4, 2003APOC 2003 Wuhan, China 1/14 Demand Based Bandwidth Assignment MAC Protocol for Wireless LANs Presented by Ruibiao Qiu Department of Computer.
Demand Based Bandwidth Assignment MAC Protocol for Wireless LANs K.Murugan, B.Dushyanth, E.Gunasekaran S.Arivuthokai, RS.Bhuvaneswaran, S.Shanmugavel.
Voice-Data Channel Access Integration in Third Generation Microcellular Wireless Network : Design and Performance Evaluation Allan C. Cleary Chapter 2.
Multimedia Wireless Networks: Technologies, Standards, and QoS Chapter 3. QoS Mechanisms TTM8100 Slides edited by Steinar Andresen.
ATM Technologies. Asynchronous Transfer Mode (ATM) Designed by phone companies Single technology meant to handle –Voice –Video –Data Intended as LAN or.
Data and Computer Communications Chapter 11 – Asynchronous Transfer Mode.
A Medium Access Protocol for Interconnecting ATM and Wireless Networks Time division multiple access/frequency division duplex. Voice mobiles require real-time.
An Energy Efficient MAC Protocol for Wireless LANs, E.-S. Jung and N.H. Vaidya, INFOCOM 2002, June 2002 吳豐州.
Unit III Bandwidth Utilization: Multiplexing and Spectrum Spreading In practical life the bandwidth available of links is limited. The proper utilization.
Quality of Service Schemes for IEEE Wireless LANs-An Evaluation 主講人 : 黃政偉.
Fair and Efficient multihop Scheduling Algorithm for IEEE BWA Systems Daehyon Kim and Aura Ganz International Conference on Broadband Networks 2005.
SERENA: SchEduling RoutEr Nodes Activity in wireless ad hoc and sensor networks Pascale Minet and Saoucene Mahfoudh INRIA, Rocquencourt Le Chesnay.
Switching. Circuit switching Message switching Packet Switching – Datagrams – Virtual circuit – source routing Cell Switching – Cells, – Segmentation.
Providing QoS in IP Networks
Discovering Sensor Networks: Applications in Structural Health Monitoring Summary Lecture Wireless Communications.
THE MEDIUM ACCESS CONTROL SUBLAYER 4.1 THE CHANNEL ALLOCATION PROBLEM 4.2 MULTIPLE ACCESS PROTOCOLS.
QoS Guaranteed Provisioning over GPRS Wireless Mobile Links Benjamin ESHUN MSc CCN INT France.
Chapter 30 Quality of Service Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
COMPUTER NETWORKS Data-link Layer (The Medium Access Control Sublayer) MAC Sublayer.
2. Data Link Layer: Medium Access Control. Scheduling.
4.1 THE CHANNEL ALLOCATION PROBLEM THE CHANNEL ALLOCATION PROBLEM : how to allocate a single broadcast channel among competing users. The channel might.
Packet Switching Networks & Frame Relay
QoS & Queuing Theory CS352.
MEDIUM ACCESS CONTROL PROTOCOL
Topics discussed in this section:
Multi-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver Jungmin So and Nitin Vaidya Modified and Presented.
Channel Allocation (MAC)
Switching Techniques In large networks there might be multiple paths linking sender and receiver. Information may be switched as it travels through various.
CONGESTION CONTROL.
Switching Techniques In large networks there might be multiple paths linking sender and receiver. Information may be switched as it travels through various.
Scheduling Algorithms in Broad-Band Wireless Networks
Switching Techniques.
Channel Allocation Problem/Multiple Access Protocols Group 3
Channel Allocation Problem/Multiple Access Protocols Group 3
Qingwen Liu, Student Member, IEEE Xin Wang, Member, IEEE,
Satellite Packet Communications A UNIT -V Satellite Packet Communications.
Presentation transcript:

A Scheduling Technique for Bandwidth Allocation in Wireless Personal Communication Networks Nikos Passas, Nikos Loukas, and Lazaros Merakos Future generation wireless personal communication networks (PCN) are expected to provide multimedia capable wireless extensions of fixed ATM/B-ISDN.

Paper presents · A method for transmission scheduling in PCN (similar to the technique of “virtual leaky bucket “ developed for fixed ATM networks) · Introduces two alternative priority mechanisms for the sharing of the available bandwidth Goals Fair and efficient treatment of various types of traffic on the air interface Supporting two kinds of sources :  Constant - bit - rate (CBR) voice and  Variable - bit - rate (VBR) video [ensuring that bandwidth allocation is consistent with their declarations at connection setup] with different traffic characteristics and service requirements

The PCN terminal of the future  will be able to integrate voice, video and data services  will have to coexist with fixed ATM / B-ISDN Design objectives  flexible multiservice capability (voice, data and multimedia)  good QoS for many service types  compatibility with future ATM/B-ISDN networks  low terminal cost/complexity/power consumption and  efficient, scalable and moderate cost network architecture An important system design issue in PCN is the selection of a suitable bandwidth sharing technique

Advanced techniques must be employed including  Call Admission Control (CAC) (PCN user requirements and available resources are of the same nature as in fixed ATM)  Bandwidth enforcement and sharing mechanisms (must be incorporated in the medium access control (MAC) protocol of the wireless environment) Limitation of the radio medium make efficiency and fairness of such techniques more critical than in fixed ATM To avoid inconsistencies and provide a common platform to users, regardless of their connection point, it is essential to consider compatibility with future fixed ATM networks

Cellular environment :  each cell consists of one BS and a number of MSs  the number of MSs in cell changes dynamically as they move from one cell to another Sources :  voice sources transmitting at constant rate when they are active, and  video sources transmitting at variable rate MSs can be thought of as advanced mobile telephones (e.g., videophones) equipped with micro-cameras and mini displays, capable for voice-video applications

Operate onUplink channel  from MSs to the BS of their cell different bands { Downlink channel  from BS to MSs Uplink channel multiple access control protocol used in conjunction with the scheduling technique Downlink channel is not a multiple access channel The access control protocol used for controlling transmissions on the uplink channel not only has to enable MSs to share it efficiently with high statistical multiplexing gain, but also to provide MSs with QoS guarantees similar to those in fixed ATM networks.

QoS guarantees are accomplished through the combined use of  an appropriate connection admission control (CAC) scheme, which ensures that no new MS connections are admitted if by doing so the QoS of already existing connections cannot be guaranteed, and  A “scheduler”, located at the BS, which is responsible for allocating the uplink channel to the MSs in accordance with the QoS agreed upon admission.

Framework of the uplink access control protocol within which the scheduler will operate Uplink channel is organized as a TDMA-based system Each cell is a “hub-based” system since all communications between MSs are done through their BS (the hub) Channel time is subdivided into fixed length TDMA slot frames. Slots in each frame are dynamically allocated by the BS to the MSs on the basis of transmission requests received from active MSs during the previous frame, and the QoS agreed upon at connection setup.  Each TDMA frame is subdivided into N r request slots and N d data slots (N r, N d assumed constant - in general they may vary depending on the number and the kind of active sources)  The length of the data slots is selected to be equal to an ATM “cell” (48 bytes data, 5 bytes header), plus an additional radio - specific header, which depends on the specific physical and MAC layer protocols used on the radio interface

Request slots in one uplink frame  are used by the MS sources to inform the BS about the data slots they need in the next uplink frame  are expected to be short, compared to data slots, since the only information they have to include is the source’s ID and the number of the requestsed data slots  N r request slots per frame are shared by the active MSs, in accordance with a random access protocol (e.g., the slotted ALOHA protocol, or the stack protocol)  N r can be chosen large enough so that the probability of an allocation request being transmitted successfully on its first attempt is close to unity, without substantial overhead

Requests and allocation of data slots :  A source transmits its allocation request for the next frame to the BS in a request slot, and waits for an acknowledgement on the downlink before the beginning of the next frame  If a collision occurs, the source will not receive the acknowledgement and, if its request does not correspond to a packet that has already expired, it will attempt to retransmit it in the next frame  After receiving all the request slots of a frame, the BS must decide on how to allocate the N d data slots of the next uplink frame  Before the beginning of the next frame, BS sends an allocation acknowledgement to all sources, notifying them about the slots that they have been assigned

Voice data traffic is considered CBR and is given priority over VBR video traffic  Requests from voice sources are satisfied first without competition from video traffic requests  For requests that come from video sources a mechanism similar to the leaky bucket and the virtual leaky bucket is used.  In order to enter a fixed ATM network, an ATM cell must first obtain a token from a token pool.  A token pool for each video source is located at the BS.  If there are no available tokens, in the leaky bucket, the cell must wait until a new token is generated.  Tokens are generated at a fixed rate equal to the mean cell rate of the source  The size of the token pool depends on the burstiness of the source  The state of each pool gives an indication about how much of the declared bandwidth, the corresponding source has consumed at any instance of time

Difference between the leaky bucket and the virtual leaky bucket In the virtual leaky bucket when the pool is empty, an arriving cell, rather than waiting (as in the leaky bucket) is permitted to enter the network with violation tag in its header. Violating cells are the first to be discarded if they later arrive at a congested network node. A major difference between the leaky bucket and the mechanism of this paper when each source has its own connection line with the network,  is that in TDMA system the traffic from all sources is multiplexed in a common radio channel  all requesting packets cannot enter the network, at least not immediately. The acceptance rate of video sources in the channel is limited to the number of slots per frame minus those slots dedicated to the voice sources.  A priority mechanism must be introduced, to decide how the available channel capacity will be allocated to the competing requests from different video sources.  The unaccepted requests will have to wait until their priority becomes higher or until they become expired.

The paper introduces two mechanisms, which are based on the state of the token pools and the current requests from all sources. The main objectives of these mechanisms are :  to guarantee fair treatment of all sources under heavy traffic conditions, based on declarations at connection setup, and  to permit sources to transmit over their negotiated throughput, when capacity is available Priority Mechanism A  is based on the philosophy that the source which has more tokens compared to its requests has higher priority, since it is below its declarations, and therefore the system should try to satisfy its requests as soon as possible. S i  source P i  the state that the token pool of S i will be in, if all of its requests are satisfied T i  the number of tokens in the pool of S i at the time a request slot from source S i arrives R i  the number of requests declared in that slot P i = T i - R i

Let assume that M sources have requested slots for the next frame, with priorities P 1, P 2, …., P M and let P 1  P 2  ….  P M The mechanism will first try to allocate slots in the next frame for all requests of source S 1, since it has the highest priority. When all requests of source S 1 are satisfied and if there are still available slots in the next frame, source S 2 will be selected, then S 3 and so on, until the requests of all sources are satisfied, or until all the available slots of the next frame have been allocated. In case the priorities of some sources are equal, the source with the most requests is serviced first. Example If for source S k and S l, P k = P l and R k >R l the mechanism will first allocate slots for all requests of source S k and then for all requests of source S l. In the special case where P k = P l and R k = R l (leading to T k =T l ), the mechanism randomly chooses one source to service first.

Priority Mechanism A, seems reasonable since it is based on both negotiations made at connection setup, expressed by the token pools, and current needs, expressed by the request slots of each source. A possible weakness is that, when a source becomes active after a long idle period, it will probably take all the slots it requests, since its token pool is almost full, resulting in many temporary denials for other sources. Priority Mechanism B Tries to solve the abovementioned problem of Priority Mechanism A, by gradually allocating slots, based on the state of the token pool of each source. The available slots of the frame are spread to more sources avoiding abrupt denials, which can affect the QoS offered to the end user. Let S 1, S 2, …. S M be the sources requesting slots in one frame and T 1  T 2  ….  T M the corresponding tokens. The mechanism starts by gradually allocating T 1 - T 2 slots to source S 1 (with the assumption that there are that many requests and available slots). If T 1 = T 2 no slots are allocated at this state. Then, it allocates T 2 - T 3 slots to source S 1, and T 2 - T 3 slots to source S 2 (allocating one slot at a time to sources S 1 and S 2 in a round robin fashion), T 3 - T 4 slots to source S 1, S 2 and S 3 and so on, until all requests are satisfied, or until all the available slots of the next frame have been allocated. …continue

For every slot allocated to a source, the corresponding token variable is decremented by one  ensures the fair treatment of all sources since, even if a source is assigned many slots in one frame, it will have lower priority in the following ones. Results In both mechanisms no request is blocked if slots are available. Even if a source ’s priority (mechanism A) or token variable (mechanism B) is negative, available slots are allocated to the source, according to mechanisms A and B. The proposed technique is more similar to the virtual leaky bucket method, than of the leaky bucket. Simulation Model Channel speed C = 1,92 Mb/sec Frame length L = 12 msec Data slot size = 53 bytes (48 bytes payload)  to fit an ATM cell A frame can contain

The length of request slots was set to 12 bits,  6 bits for the source’s ID, and  6 bits for the number of requests There are two kind of sources :  CBR voice sources, producing 32 Kb/sec (1 slot/frame) on active state  VBR video sources, with mean rate μ =128 Kb/sec, peak rate = 512 Kb/sec, deviation = 64 Kb/sec and autocovariance C( T ) = 2 e -a T (a=3.9 sec -1 ) To model the traffic from video sources independent discrete-time batch Markov arrival process (D-BMAP) was used. Time-of-expiry  for both voice and video packets was chosen to be between 2 and 3 frames In all examples :  the number of voice sources was equal to the number of video sources, since we have to do with MSs as videophones, each having one voice and one video source.

P loss is:  long term average fraction of packets lost (due to time-of-expiry violation) from all sources combined The two mechanisms induce the same P loss since the total number of slots allocated per frame is the same (in both), and packets are lost if the corresponding requests are not granted in the next frame. Equivalent bandwidth is :  a unified metric representing the effective bandwidth of a connection based on its parameters declared at connection setup For Example With P loss =10 -3 and the previous mentioned parameters Equivalent bandwidth = Kb/sec or slots/frame For 5 active sources (CBR)  53-5 = 48 slots 48/10.92 = 4,39 video sources (VBR)

The utilization of the available bandwidth was found identical for both mechanisms, because  no request blocking is performed when slots are available How lost packets are spread in time ? The variance of denials of source S i is considered as the variance in time of the number of requests that are denied. D i,k  the number of slots requested by S i to be allocated in frame k but denied by the scheduler due to slot unavailability D i (n)  the mean variance of D i,k V D i (n)  the sample variance of D i,k

Priority Mechanism B results in milder variations of denials compared to those of Priority Mechanism A. This is because Mechanism B tries to spread the slots of a frame to more sources than Mechanism A. Smaller denials can more easily absorbed by the end user. Large denials of Mechanism A can result in temporary degradation in quality, which can be rather annoying to the end user A promising idea towards combining the two mechanisms is a method that gradually allocates slots for each source as in mechanism B and uses the priorities in Mechanism A.