Presentation is loading. Please wait.

Presentation is loading. Please wait.

1 Routing and Admission Control in IEEE 802.16 Distributed Mesh Networks Tzu-Chieh Tsai Dept. of Computer Science National Chengchi University Taipei,

Similar presentations


Presentation on theme: "1 Routing and Admission Control in IEEE 802.16 Distributed Mesh Networks Tzu-Chieh Tsai Dept. of Computer Science National Chengchi University Taipei,"— Presentation transcript:

1 1 Routing and Admission Control in IEEE 802.16 Distributed Mesh Networks Tzu-Chieh Tsai Dept. of Computer Science National Chengchi University Taipei, Taiwan

2 2 Outline Introduction Problems Related Work Our Routing and CAC Algorithm Simulations Conclusion

3 3 Outline Introduction Wireless Mesh Networks IEEE 802.16 Mesh Mode Problems Related Work Our Routing and CAC Algorithm Simulations Conclusion

4 4 Introduction— Wireless Mesh Networks

5 5 Ad-hoc network basis Self organization Fault tolerance Scalability Lower infrastructure cost Wider coverage Standard activities 802.11s (in progress) 802.15.5 (in progress, mainly in PHY) 802.16 Mesh mode is already included in standards.

6 6 IEEE 802.16 mesh mode

7 7 Terminology Mesh Base Station (MBS or BS) Mesh Subscriber Station (MSS or SS) Extended neighborhood (2-hop neighbors) Defers from PMP mode (Point to Multi-Point) Traffic can occur directly between SSs Only TDD is supported in Mesh Frame format Not compatible A frame is composed with Control subframe Network control subframe Schedule control subframe Data subframe

8 8 IEEE 802.16 Mesh Mode Frame Formats

9 9 IEEE 802.16 Mesh Mode Scheduling mechanism: Centralized Using MSH-CSCH, MSH-CSCF msgs. Distributed Coordinated Uncoordinated –Both using MSH-DSCH msgs. –Mesh Distributed Scheduling messages

10 10 IEEE 802.16 Mesh Mode In distributed coordinated mesh mode, each node periodically broadcasts : MSH-NCFG Mesh-Network Config Exchanges the basic parameters between SSs –ID of BS, hop count to BS, number of neighbors, … MSH-DSCH msgs. Mesh-Distributed Scheduling Both using Mesh election algorithm to determined next transmission time.

11 11 IEEE 802.16 Mesh Mode The information elements (IEs) of MSH-DSCH msgs. Scheduling IE: Determines the next transmission time of MSH-DSCH msgs. To avoid collision of MSH-DSCH msgs. Request IE: Convey the resources over a link Availability IE: Carry the information of the available resources Grant IE: Convey the confirm information of the resources

12 12 IEEE 802.16 Mesh Mode— 3-way Handshake MSH-DSCH: Request Src. sends to dest. along with MSH-DSCH: Availibilities Indicate the empty timeslots of src. Node MSH-DSCH: Grant Dest. Chooses a range of empty timeslots according to MSH-DSCH:request, and, Dest. replies with this msg. MSH-DSCH: Grant Src. Copies the received grant and sends it back to destination node

13 13 IEEE 802.16 QoS Classes Four QoS classes Unsolicited Grant Service (UGS) Real-time Polling Service (rtPS) Non-real-time Polling Service (nrtPS) Best Effort (BE)

14 14 IEEE 802.16 Mesh Mode – QoS Mesh mode uses CID (Connection ID) to define the service parameters Reliability To re-transmit or not Priority The priority of the connection Drop Precedence When congestion occurs, the likelihood of dropping the packets

15 15 Outline Introduction Problems Related Work Our Routing and CAC Algorithm Simulations Conclusion

16 16 Problems QoS provisioning for each class, we need: A Routing Method suitable in 802.16 distributed mesh mode A way to do admission control The above 2 things are not specified in the standard Our solutions: SWEB (Shortest-Widest Efficient Bandwidth) metrics for routing TAC (Token-bucket based Admission Control)

17 17 Outline Introduction Problems Related Work Our Routing and CAC Algorithm Simulations Conclusion

18 18 Related Work In [3], a token-based call admission control and a math model is proposed under IEEE 802.16 PMP mode The bandwidth of a flow is estimated as

19 19 Related Work - Token Bucket Mechanism Token bucket parameters Token rate r Bucket size b In time duration t, the output volume of data would be:, at most.

20 20 Related Work In [7], routing metrics “ETX” is proposed Expected Transmission Count Under 802.11 ad-hoc networks Forwarding delivery ratio:,reverse delivery ratio: Determined by sending probe packets ETX is calculated as:

21 21 Outline Introduction Problems Related Work Our Routing and CAC Algorithm Routing Modified 3-way handshake TAC algorithm Simulations Conclusion

22 22 Routing and CAC algorithms Static Routing is suitable in IEEE 802.16 mesh networks: Stations do not move or have the minimum mobility Topology and channel conditions do not change severely IEEE 802.16d standard does not support mobility Providing QoS of one flow over multiple routes can be in-efficient and difficult

23 23 Routing To minimize delay and achieve good throughput P i,j : packet error rate of link (i,j) C i,j : Capacity of link (i,j) A bandwidth of a link is Node 1Node 2Node 3Node 4

24 24 Routing Capacity of all links = C Effective bandwidth Path1 =C*min((1-0.1),(1-0.2),(1-0.1))/2 =0.4*C Path2=0.25C Path3=0.4C Path 3 is preferable. divided by hopCount Path1=0.4C/3 Path3=0.4C/2 S D 0.1 0.2 0.1 0.5 0.2 Path1 Path2 Path3

25 25 SWEB Routing Routing is done off-line. Path metric= h: hop count SWEB (Shortest-Widest Efficient Bandwidth) Metrics Node 1Node 2Node 3Node 4

26 26 Outline Introduction Problems Related Work Our Routing and CAC Algorithm Routing Modified 3-way handshake TAC algorithm Simulations Conclusion

27 27 Modified 3-way handshake To shorten the call setup time, we modified the 3- way handshake Original 3-way handshake:

28 28 Modified 3-way handshake Original 3-way handshake in a multi-hop environment

29 29 Modified 3-way handshake

30 30 Outline Introduction Problems Related Work Our Routing and CAC Algorithm Routing Modified 3-way handshake TAC algorithm Simulations Conclusion

31 31 Bandwidth Estimation Assume that each flow is controlled by the token bucket mechanism. Each flow reports the parameters when it is initiated: r: token rate b: bucket size d :Delay requirement (for real-time traffics) Using token bucket, the required bandwidth is: Over-estimated.

32 32 Bandwidth Estimation tt+7f r i *fr i r i t+4f tt+7f r i *fr i r i t+4f S D

33 33 Bandwidth Estimation t+6f r i *fr i r i r i t+12f t+5f b i r i *fr i r i r i r i t+9ft+6f r i *fr i r i r i t+12f t+5f b i r i *fr i r i r i r i t+9f S D

34 34 Bandwidth Estimation t+6f r i *fr i r i r i t+12f t+5f r i *fr i r i r i r i t+9f b i/ m i -1 b m i -1 t+6f r i *fr i r i r i t+12f t+5f r i *fr i r i r i r i t+9f S D

35 35 Bandwidth Estimation We estimate the Max. volume transmitted by a real- time flow in a frame as:,where

36 36 TAC (Token-bucket Based Admission Control) algorithm Goal: Guarantee delay requirements for real-time flows Avoid starvation To guarantee delay Use the above-mentioned bandwidth estimation. To avoid starvations Set minimum usage of each class: CBR_min, VBR_min, and BE_min.

37 37 TAC algorithm Concept:

38 38 TAC algorithm Fields in CID (connection ID) are used to identify QoS levels Priority (3 bits) Reliability (1 bit) Drop Precedence (2 bits) CBR700 CBR_DG401 VBR600 VBR_DG302 BE510 BE_DG213

39 39 Outline Introduction Problems Related Work Our Routing and CAC Algorithm Simulations Routing TAC Conclusion

40 40 Simulations Parameters Parameters Frame length = 8 ms Slot capacity = 144 bytes Data timeslots =165 QPSK coding rate =3/4 676 OFDM symbols per frame For CTRL subframe=16 For DATA subframe=660 4 OFDM symbols per slot

41 41 Simulations Routing Topology 16 nodes 4 km * 4km Radio range = 1.5 km Node 16 is the MBS.

42 42 Simulations Routing Packet error rate over links: ( in 1/100 )

43 43 Simulations Routing ETX

44 44 Simulations Routing Shortest Path

45 45 Simulations Routing Proposed Routing metrics

46 46 Simulations Routing Since we primarily focus on VBR traffics, VBR traffics are compared across 3 routing trees. Throughput Delay Jitter The number of each class traffic flow is ranging from 5 to 25.

47 47 Simulations Routing

48 48 Simulations Routing

49 49 Simulations Routing

50 50 Outline Introduction Problems Related Work Our Routing and CAC Algorithm Simulations Routing TAC Conclusion

51 51 Simulations parameters Minimum usage: CBR 10 timeslots VBR 40 timeslots BE 75 timeslots Token rate (bps) Bucket size (bits) Delay requirement CBR9606440 ms VBR2000k400080 ms BE750k2000--

52 52 Simulations CAC

53 53 Simulations CAC WiMaxTAC is added

54 54 Simulations CAC WiMax TAC is added

55 55 Outline Introduction Problems Related Work Our Routing and CAC Algorithm Simulations Conclusion

56 56 Conclusion We proposes a CAC (called TAC) mechanism that guarantee the delay requirements of real-time traffic flows, and Avoid starvations A simple routing metric SWEB that is suitable for IEEE 802.16 mesh networks A modified 3-way handshake that Reduces call setup time

57 57 Reference [1]IEEE, “IEEE Standard for Local and metropolitan area networks Part 16: Air Interface for Fixed Broadband Wireless Access Systems”, IEEE standard, October 2004. [2] Harish Shetiya and Vinod Sharma, "Algorithms for routing and centralized scheduling to provide QoS in IEEE 802.16 mesh networks", Proceedings of the 1st ACM workshop on Wireless multimedia networking and performance modeling,WMuNeP '05. Pages: 140-149. [3] Tzu-Chieh Tsai, Chi-Hong Jiang, and Chuang-Yin Wang, "CAC and Packet Scheduling Using Token Bucket for IEEE 802.16 Networks", in Journal of Communications (JCM, ISSN 1796-2021), Volume : 1 Issue : 2, 2006. Page(s):30-37. Academy Publisher.

58 58 Reference [4] Fuqiang LIU, Zhihui ZENG, Jian TAO, Qing LI, and Zhangxi LIN, "Achieving QoS for IEEE 802.16 in Mesh Mode",8th International Conference on Computer Science and Informatics, Salt Lake City, USA [5] Hung-Yu Wei, Samrat Ganguly, Rauf Izmailov, and Zygmunt J. Haas, "Interference-Aware IEEE 802.16 WiMax Mesh Networks", in Proceedings of 61st IEEE Vehicular Technology Conference (VTC 2005 Spring). [6] Min Cao, Qian Zhang, Xiaodong Wang, and Wenwu Zhu, "Modelling and Performance Analysis of the Distributed Scheduler in IEEE 802.16 Mesh Mode", Proceedings of the 6th ACM international symposium on Mobile ad hoc networking and computing

59 59 Reference [7] Douglas S. J. De Couto, Daniel Aguayo, John Bicket, and Robert Morris, “A High-Throughput Path Metric for Multi-Hop Wireless Routing”, ACM MobiCom ’03.


Download ppt "1 Routing and Admission Control in IEEE 802.16 Distributed Mesh Networks Tzu-Chieh Tsai Dept. of Computer Science National Chengchi University Taipei,"

Similar presentations


Ads by Google