12-Specific System WiMax
12-Specific System WiMax
16
#12
Victor S. Frost Dan F. Servey Distinguished Professor Electrical Engineering and Computer Science University of Kansas 2335 Irving Hill Dr. Lawrence, Kansas 66045 Phone: (785) 864-4833 FAX:(785) 864-7789 e-mail: [email protected] http://www.ittc.ku.edu/
All material copyright 2006 Victor S. Frost, All Rights Reserved
#12 1
Outline
Motivation for IEEE 802.16 Applications Services and QoS Architecture Initialization Phy Layer MAC
Packet formats Access protocol QoS support
#12 2
#12 3
Balances between stability of contentionless and efficiency of contention-based operation Flexible QoS offerings Supports multiple 802.16 PHYs Protocol-Independent core (ATM, IP, Ethernet, )
From: R. Marks, The 802.16 WirelessMAN WirelessMAN MAC: MAC: Its Done, but What Is It? www.ieee802.org/16/docs/01/80216-01_58r1.pdf
High bandwidth, hundreds of users per channel Continuous and burst traffic Efficient use of spectrum
#12 4
Convergence layer: -Maps upper layer packets into MAC frames -May fragment to gain efficiency
Protocol-Independent core
Modified from: W. Stallings Wireless Communications and Networks, Prentice Hall, Second Edition #12 5
From: R. Marks, The 802.16 WirelessMAN WirelessMAN MAC: MAC: Its Done, but What Is It? www.ieee802.org/16/docs/01/80216-01_58r1.pdf
#12 6
WiMAX-OFDM
From: IEEE 802 Wireless Systems, B. Walke, S. Mangold, and L. Berlemann, Wiley, 2006
#12 7
Services
Support multiple services, e.g.,
TDM Voice VoIP Digital TV IP Bridged LAN Backhaul: Cell tower to switch replacing costly land lines
#12 8
QoS Requirements
From: W. Stallings Wireless Communications and Networks, Prentice Hall, Second Edition
#12 9
Assumptions
The subscriber stations (SS) are fixed (later version may allow mobility, i.e., IEEE 802.16e) Base stations are fixed High data rates in BOTH upstream and downstream directions Base station maybe heavily loaded Needs to be spectral efficient
* From: W. Stallings Wireless Communications and Networks, Prentice Hall, Second Edition #12 10
Connections
IEEE 802.16 MAC is connection-oriented.
Provides
Each service mapped to a connection A mechanism for requesting bandwidth, associating QoS and traffic parameters, transporting information Routing data to the appropriate convergence sublayer, Other actions associated with the contractual terms of the service.
#12 11
Initialization
Channel Acquisition
SS scans its frequency list to find an operating channel (may be configured with a specific BS ID to look for) The SS synchronizes to the downstream transmission by detecting the periodic frame preamble The downstream periodically transmits its modulation and FEC schemes using DCD and UDC are transmitted most robust (least efficient burst profile)
Downlink Channel Descriptor (DCD) and Uplink Channel Descriptor (UCD) messages
#12 12
Initialization
Ranging
MAP messages are used to define the usage of channel
DL-MAP downlink MAP UL-MAP uplink MAP
SS scans the UL-MAP for opportunities to send a ranging messages SS selects a ranging time slot using a truncated exponential backoff algorithm (like in DOCSIS) Send ranging message (RNG-REQ message) with minimum power If no response increase power and tx again Success of the ranging message at the BS allows for the BS to send the SS
Time synchronization information Power adjustment information Basic Channel ID (CID) Primary Management CID
SS reports to BS PHY capabilities and BS can accept or deny any capability The above process is repeated to maintain the radio link (Radio link control-RLC)
#12 13
Initialization
SS Authentication and Registration
Determine if SS can join the network If authorized then SS registers with the network
IP connectivity
Uses DHCP to get IP address And address of TFTP server to to obtain configuration files.
#12 14
Initialization
Connection set up
Service flows define unidirectional transport Each service flow is mapped to a CID on a specific MAC address Service flows usually are set up by the BS during initialization, like permanent virtual circuits (PVCs) CID can be setup on demand, like a switched virtual circuit (SVCs) using a signaling protocol. Initially each SS sets up three management connections in each direction (each on own CID)
Basic for short time critical MAC and RLC messages Primary for larger delay insensitive messages, eg., for authentication Secondary for management, SNMP, TFTP, and DHCP
#12 15
Summary Initialization
From: Govindan Nair, et. al., IEEE 802.16 Medium Access Control and Service Provisioning, Intel Technology Journal, Volume 08 Issue 03, August 20, 2004 ISSN 1535-864X
#12 16
RLC Adaptation
As part of the MAC the RLC continues to adapt the uplink and downlink burst profiles to trade: BS controls all burst profiles Control of uplink burst profile
Robustness Efficiency
BS receives uplink messages BS can measure uplink quality BS specifies burst profile when granting access
#12 17
RLC Adaptation
Control of downlink burst profile
SS receives downlink transmissions SS measures downlink quality Problem: SS must communicate appropriate burst profile to BS Note SS is required to receive more robust segments of the downlink transmission in addition to the negotiated burst profile Change messages must get through and acknowledged
#12 18
RLC Adaptation
Uplink Interval Usage Code (UIUC)
Defines the burst profiles used by the each SS on the uplink BS is in control of changed in UL burst profiles BS specifies the UIUC when granting the SS permission to send on the uplink Defines the burst profiles for the downlink Each SS can have a different burst profile in the downlink In the downlink it is the SS that knows the CSI The BS is still the entity to execute changes in the DIUC Thus a protocol is needed to exchange the information.
#12 19
RLC Adaptation
From: Carl Eklund,, et., al., IEEE Standard 802.16:A Technical Overview of the WirelessMAN Air Interface for Broadband Wireless Access, IEEE Communications Magazine June 2002
#12 20
AAS= Adpative Antenna System STC= Space time coding MSH= Mesh DFS = Dynamic Frequency Selection
#12 21
Physical Layer
Burst based architecture Upstream transmission
TDD UL/DL share same channel; do not simultaneous transmit FDD UL/DL on separate chaanel can transmit simultaneously Demand Assignment Multiple Access TDD or FDD Continuous mode Burst mode
Downstream
Channel Bandwidth
#12 22
UL-MAP(Uplink Map)
UL-MAP message allocates access to the uplink channel
#12 23
* From: Carl Eklund,, et., al., IEEE Standard 802.16:A Technical Overview of the WirelessMAN Air Interface for Broadband Wireless Access, IEEE Communications Magazine June 2002
#12 24
Downlink transmissions
Two kinds of bursts: TDM and TDMA All bursts are identified by a DIUC TDMA bursts have resync preamble allows for more flexible scheduling Each terminal listens to all bursts at its operational IUC, or at a more robust one, except when told to transmit Each burst may contain data for several terminals SS must recognize the PDUs with known CIDs DL-MAP message signals downlink usage
From: R. Marks, The 802.16 WirelessMAN WirelessMAN MAC: MAC: Its Done, but What Is It? www.ieee802.org/16/docs/01/80216-01_58r1.pdf
#12 25
* From: Carl Eklund,, et., al., IEEE Standard 802.16:A Technical Overview of the WirelessMAN Air Interface for Broadband Wireless Access, IEEE Communications Magazine June 2002
#12 27
Uplink Transmissions
Invited transmissions Transmissions in contention slots
Bandwidth requests Contention resolved using truncated exponential backoff RNG-REQ Contention resolved using truncated exponential backoff
Bursts defined by UIUCs Transmissions allocated by the UL-MAP message All transmissions have synchronization preamble Ideally, all data from a single SS is concatenated into a single PHY burst
From: R. Marks, The 802.16 WirelessMAN WirelessMAN MAC: MAC: Its Done, but What Is It? www.ieee802.org/16/docs/01/80216-01_58r1.pdf
#12 28
From: R. Marks, The 802.16 WirelessMAN WirelessMAN MAC: MAC: Its Done, but What Is It? www.ieee802.org/16/docs/01/80216-01_58r1.pdf
#12 29
From: R. Marks, The 802.16 WirelessMAN WirelessMAN MAC: MAC: Its Done, but What Is It? www.ieee802.org/16/docs/01/80216-01_58r1.pdf
#12 30
Uplink scheduling
Uplink direction uses a schedule to allocate uplink capacity Uses a request-grant mechanism Specification of scheduling service is established at connection set up time. Scheduling services are based on DOCSIS
#12 31
More later.
#12 32
#12 33
MAC overview
Uses Demand Assigned Multiple Access (DAMA) TDMA BS controls allocations of uplink bandwidth Unit of allocation is a mini-slot SS requests transmission opportunities on the uplink for a specific number of minislots on a contention basis Collisions on request messages are resolved using truncated binary exponential backoff algorithm BS collects requests and sends schedules on the downlink via an allocation map
#12 34
PDU = Data exchanged between peer entities SDU = Data exchanged between adjunct layers
From: R. Marks, The 802.16 WirelessMAN WirelessMAN MAC: MAC: Its Done, but What Is It? www.ieee802.org/16/docs/01/80216-01_58r1.pdf #12 36
Header format drives functionality Caution: details of fields may have changed
* From: W. Stallings Wireless Communications and Networks, Prentice Hall, Second Edition #12 37
#12 38
* From: W. Stallings Wireless Communications and Networks, Prentice Hall, Second Edition
#12 39
* From: W. Stallings Wireless Communications and Networks, Prentice Hall, Second Edition
#12 40
Services
Unsolicited grant service (UGS)
Transport fixed data periodically No explicit BW requests Limit on jitter = one frame time Provides guarantees on
throughput, latency, jitter
Not allowed to use random access opportunities Targeted for Buffer build up
T1/E1 over ATM ATM CBR
Not expected for CBR, but Grants may be lost Clock skew between the 802.16 net and the backbone may Result backlog at SS To recover use the poll-me and slip indicators
#12 41
Services
Real-time polling service-rtPS
Target services that are bursty but offers periodic dedicated request opportunities to meet real-time requirements. Does not use contention process to request bandwidth, used explicit MAC message Variable packet size Requests imply increased latency and overhead Suitable for This is like rt-VBR ATM Provides guarantee on throughput Little less focus on latency.
VoIP with silence detection MPEG Video
#12 42
Services
Non-real-time Polling Services (nrtPS)
Provides guarantee on throughput, Suitable for non real time services that have variable data size, e. g., e-mail. Like rt-polling except but polls are less frequently Allowed to use contention requests May use Grant Management sub-header to request BW New request can be piggybacked with each new request can be piggybacked with each transmitted PDU Provides no guarantees Can request bandwidth using contention or explicit processes
Best Effort
#12 43
Classes of SS
An SS can have one for more connections Grant per connection (GPC) class
Bandwidth is granted explicitly for each connection SS needs to track each connection thus more complex Less flexible Less scaleable, more state to track Less efficient, because not as much sharing
#12 44
Classes of SS
Grant per SS (GPSS) Grants given to all connections on an SS as an aggregate GPSS SS needs to manage all the traffic thus the QoS for different applications Can react more quickly to changes
#12 45
#12 46
Note requests are usually incremental that is a change from current allocation. Set timer suitable for QoS If timer fires, SS requests again But the perception of current allocated BW at the BS may not track right because an incremental request is lost Solution: Occasionally send aggregate bandwidth requirement of SS, resets perception of current allocated BW to SS
#12 47
802.16
Original fixed wireless broadband air Interface for 10 66 GHz: Line-of-sight only, Point-toMulti-Point applications
802.16c
(2002)
802.16 Amendment WiMAX System Profiles 10 - 66 GHz
(Jan 2003)
802.16a
Extension for 2-11 GHz: Targeted for non-lineof-sight, Point-to-Multi-Point applications like last mile broadband access
802.16e
IEEE 802.16-Summary
Commonalities with DOCSIS DOCSIS
Not adaptive Focus on support of IP
#12 49
References
Eklund, C., et al., IEEE standard 802.16: a technical overview 107. Ghosh, A., et al., Broadband wireless access with
of the WirelessMAN air interface for broadband wireless access. Communications Magazine, IEEE, 2002. 40(6): p. 98-
129-136. Nair, G., et al., IEEE 802.16 Medium Access Control and Service Provisioning. Intel Technology Journal, 2004. 08(03): p. 213-228. Ramachandran, S., C.W. Bostian, and S.F. Midkiff,
WiMax/802.16: current performance benchmarks and future potential. Communications Magazine, IEEE, 2005. 43(2): p.
R. Marks, The 802.16 WirelessMAN WirelessMAN MAC: MAC: Its Done, but What Is It? www.ieee802.org/16/docs/01/80216-01_58r1.pdf W. Stallings Wireless Communications and Networks, Prentice Hall, Second Edition, 2005
#12 50