SlideShare uma empresa Scribd logo
1 de 32
Baixar para ler offline
WMAN, part 2

                                     Contents

   Part 1:        IEEE 802.16 family of standards
                  Protocol layering
                  TDD frame structure
                  MAC PDU structure

   Part 2:        Dynamic QoS management
                  OFDM PHY layer




S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks        1
WMAN, part 2

                         Four service classes

The IEEE 802.16 MAC layer defines four service classes:

•   Unsolicited Grant Service (UGS)
•   Real-time Polling Service (rtPS)
                                                                QoS increases
                                                                QoS increases
•   Non-real-time Polling Service (nrtPS)
•   Best Effort (BE) service

The scheduling algorithms needed for implementing the
three first types of services are implemented in the BS
(while allocating uplink bandwidth to each SS) and are not
defined in the 802.16 standard. Each SS negotiates its
service policies with the BS at the connection setup time.



S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks        2
WMAN, part 2

              Unsolicited grant service (UGS)


UGS          UGS offers fixed size grants on a real-time periodic
 UGS
             basis, which eliminates the overhead and latency of
rtPS
 rtPS        SS requests and assures that grants are available to
nrtPS
 nrtPS       meet the flow’s real-time needs. The BS provides
             fixed size bursts in the uplink at periodic intervals for
  BE
  BE         the service flow. The burst size and other parameters
             are negotiated at connection setup.

             Typical UGS applications: E1/T1 links (containing e.g.
             delay-sensitive speech signals), VoIP (without silence
             suppression).



 S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks        3
WMAN, part 2

              Real-time Polling Service (rtPS)


UGS          The Real-time Polling Service (rtPS) is designed to
 UGS
             support real-time service flows that generate variable
rtPS
 rtPS        size data packets on a periodic basis, such as VoIP
nrtPS
 nrtPS       (with silence suppression) or streaming video.
  BE
  BE         This service offers real-time, periodic, unicast request
             opportunities, which meet the flow’s real-time needs
             and allow the SS to specify the size of the desired
             uplink transmission burst. This service requires more
             request overhead than UGS, but supports variable
             grant sizes for optimum data transport efficiency.



 S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks        4
WMAN, part 2

         Non-real-time Polling Service (nrtPS)


UGS          The Non-real-time Polling Service (nrtPS) is designed
 UGS
             to support non-real-time service flows that require
rtPS
 rtPS        variable size bursts in the uplink on a regular (but not
nrtPS
 nrtPS       strictly periodic) basis.
  BE
  BE         Subscriber stations contend for bandwidth (for uplink
             transmission) during contention request opportunities.
             The availability of such opportunities is guaranteed at
             regular intervals (on the order of one second or less)
             irrespective of network load.




 S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks        5
WMAN, part 2

                      Best Effort (BE) service


UGS          The Best Effort service is intended to be used for best
 UGS
             effort traffic where no throughput or delay guarantees
rtPS
 rtPS        are provided.
nrtPS
 nrtPS
             Subscriber stations contend for bandwidth (for uplink
  BE
  BE         transmission) during contention request opportunities.
             The availability of such opportunities depends on
             network load and is not guaranteed (in contrast to
             nrtPS).




 S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks        6
WMAN, part 2

           Radio Link Control in IEEE 802.16

The main task of Radio Link Control (RLC) in IEEE 802.16
systems is to provide dynamic changing of UL and DL burst
profiles on a per-connection and per-frame basis, depending
on radio channel characteristics and QoS requirements.

As an example, RLC provides signaling for initial access
(ranging) and bandwidth allocation in the downlink direction:

     •   Ranging request (RNG-REQ) from SS to BS
     •   Ranging response (RNG-RSP) from BS to SS
     •   Bandwidth requests (DBPC-REQ) from SS to BS
     •   Bandwidth confirmation (DBPC-RSP) from BS to SS



S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks        7
WMAN, part 2

                 Initial access (initial ranging)

RNG-REQ              During initial access, the SS sends a ranging
RNG-RSP              request message in the contention slot reserved
DBPC-REQ             for this purpose, among others indicating which
DBPC-RSP             kind of DL burst profile should be used.
                     Note: There is the possibility of collision since
                     other subscriber stations also send ranging
                     request messages in this contention slot.



 …    Contention Contention UL PHY
      Contention Contention UL PHY                         UL PHY
                                                           UL PHY           …   UL traffic
        slot A
        slot A     slot B
                   slot B   burst 1
                            burst 1                        burst 2
                                                           burst 2



 S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks                8
WMAN, part 2

                 Initial access (initial ranging)

RNG-REQ              In response to the RNG-REQ message, the BS
RNG-RSP              returns a ranging response message in a DL
DBPC-REQ             burst with a sufficiently robust burst profile.
DBPC-RSP
                     This message includes the timing advance value
                     for correct alignment of bursts in UL, as well as
                     UL power control information.
 DL PHY
 DL PHY
  burst
  burst


Preamble
Preamble          FCS
                  FCS        DL burst 1 … DL burst k … DL burst n
                             DL burst 1   DL burst k   DL burst n


 S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks        9
WMAN, part 2

                      DL burst profile change

RNG-REQ              The SS continuously measures the radio channel
RNG-RSP              quality. If there is a need for change in DL burst
DBPC-REQ             profile, the SS sends a DL burst profile change
DBPC-RSP             request message in the contention slot reserved
                     for this purpose, indicating the desired new DL
                     burst profile.




 …    Contention Contention UL PHY
      Contention Contention UL PHY                         UL PHY
                                                           UL PHY           …   UL traffic
        slot A
        slot A     slot B
                   slot B   burst 1
                            burst 1                        burst 2
                                                           burst 2



 S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks               10
WMAN, part 2

                      DL burst profile change

RNG-REQ              In response to the DBPC-REQ message, the BS
RNG-RSP              returns a DL burst profile change response
DBPC-REQ             message confirming the new burst profile.
DBPC-RSP
                     This is done in a DL burst with the old burst
                     profile (when changing to a less robust DL burst
                     profile) or using the new burst profile (when
 DL PHY
 DL PHY              changing to a more robust DL burst profile).
  burst
  burst


Preamble
Preamble          FCS
                  FCS        DL burst 1 … DL burst k … DL burst n
                             DL burst 1   DL burst k   DL burst n


 S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks    11
WMAN, part 2

         Transition to a new DL burst profile

BS                                                        SS

          Channel measurement indicates that                         DL burst profile n
                                                                     DL burst profile n
        different DL burst profile should be used                         is used
                                                                           is used

                        DBPC-REQ
                        DBPC-REQ

                         DBPC-RSP
                         DBPC-RSP

DL data is sent using                                                DL burst profile k
                                                                     DL burst profile k
 new burst profile k                                                      is used
                                                                           is used




S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks             12
WMAN, part 2

                       UL burst profile change

RNG-REQ              The BS measures the UL signal quality and may
RNG-RSP              request a change in UL burst profile as indicated
DBPC-REQ             in the downlink channel descriptor (DCD) within
DBPC-RSP             the first DL burst of the DL PHY burst.
DCD

                                               SS: Read DCD and change
                                               SS: Read DCD and change
 DL PHY
 DL PHY
                                               UL burst profile accordingly
                                               UL burst profile accordingly
  burst
  burst


Preamble
Preamble          FCS
                  FCS        DL burst 1 … DL burst k … DL burst n
                             DL burst 1   DL burst k   DL burst n


 S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks     13
WMAN, part 2

      Dynamic QoS management in practice

The request-response mechanism described on the previous
slides is designed to be scalable, efficient, and self-correcting.
While extensive bandwidth allocation and QoS mechanisms
are specified in the IEEE 802.16 standard, the details of
scheduling and reservation management have not been
standardized and thus provide an important mechanism for
vendors to differentiate their equipment.
(There is a similar situation regarding standardization of a
transmission system in general: the transmitted signal is
standardized in detail, whereas receivers can process the
received signal as they like, using innovative technology.)



S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks    14
WMAN, part 2

    Three types of management connections

When a subscriber station acesses the network, three types of
management connections are established between the SS and
the BS (before transport connections can be established):

     Basic management connection for exchange of short,
     delay-critical MAC management messages
     Primary management connection for exchange of longer,
     more delay tolerant MAC management messages
     Secondary management connection for exchange of delay
     tolerant IP-based messages, such as used during DHCP
     transactions.



S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks    15
WMAN, part 2

               Connection establishment (1)

Channel acquisition:

     The MAC protocol includes an initialization procedure
     designed to eliminate the need for manual configuration.
     Upon installation, the SS scans for a suitable BS downlink
     signal. The SS synchronizes to this signal and reads the
     downlink channel descriptor (DCD) and uplink channel
     descriptor (UCD) information in the first DL burst of the
     DL PHY PDU, in order to learn the modulation and coding
     schemes used on the carrier.




S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks    16
WMAN, part 2

               Connection establishment (2)

Initial ranging and negotiation of SS capabilities (1):

     Upon learning what parameters to use for its initial
     ranging signal in UL, the SS looks for initial ranging
     opportunities by scanning the UL-MAP information present
     in every frame.
     After a random backoff time, the SS sends the ranging
     request message (RNG-REQ) to the BS.
     The BS calculates the timing advance value that the SS
     must use in UL from now on, and sends this information
     to the SS in the RNG-RSP message.



S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks    17
WMAN, part 2

               Connection establishment (3)

Initial ranging and negotiation of SS capabilities (2):

     The BS also sends power control information, as well as
     the CID for the basic management connection and the
     primary management connection to the SS.
     Using the primary management connection, the SS
     reports its PHY capabilities, including the modulation and
     coding schemes it supports and whether, in an FDD
     system, it is half-duplex or full-duplex. The BS, in its
     response, can deny the use of any capability reported by
     the SS.



S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks    18
WMAN, part 2

               Connection establishment (4)

SS authentication (using privacy sublayer):

     Each SS contains both a manufacturer-issued factory-
     installed X.509 digital certificate and the certificate of the
     manufacturer. After sending these certificates (and the
     public key of the SS) to the BS, the BS can authenticate
     the SS. If authentication is successful, the BS sends the
     Authorization Key (AK), encrypted with the public key of
     the SS, to the SS.
     The AK is used both by SS and BS for securing further
     information flow.



S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks    19
WMAN, part 2

               Connection establishment (5)

SS registration:

     Upon successful authentication, the SS registers with the
     network. The response from the BS contains the CID for a
     secondary management connection. Contrary to the basic
     and primary management connection, this secondary
     management connection is secured.
     At this point, the capabilities related to connection setup
     and MAC operation, as well as the IP version used, are
     determined. (Remember that the secondary management
     connection is IP-based.)



S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks    20
WMAN, part 2

               Connection establishment (6)

IP connectivity:

     After registration, using the secondary management
     connection, the SS is allocated an IP address via DHCP
     and establishes the time of the day via the Internet Time
     Protocol.
     The DHCP server also provides the address of the TFTP
     server from which the SS can request a configuration file.
     This file provides a standard interface for providing
     vendor-specific configuration information.




S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks    21
WMAN, part 2

               Connection establishment (7)

Connection setup:

     Finally, the secondary management connection is also
     used for setting up one or more transport connections.
     These transport connections carry the actual user data
     (IP traffic, VoIP traffic, etc.) between BS and SS.
     IEEE 802.16 uses the concept of service flows to define
     unidirectional transport of packets on either downlink or
     uplink. Service flows are characterized by a certain set of
     QoS parameters, and are established using a three-way
     handshaking establishment procedure.



S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks    22
WMAN, part 2

      Summary: Dynamic QoS management

In summary, IEEE 802.16 offers the following mechanisms
for dynamically managing QoS and bandwidth:

In the PHY layer by adjusting the DL and UL burst profiles
(modulation and coding combination) on a per-frame basis.

In the MAC layer through fragmentation and packing (both
can be done at the same time).

At higher protocol layers by using scheduling algorithms in
the base station. These algorithms are not specified in the
IEEE 802.16 standard.



S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks    23
WMAN, part 2

                     WirelessMAN-OFDM PHY




WirelessMAN-OFDM is based on 256 subcarriers, of which
200 subcarriers are used: 192 data subcarriers + 8 pilot
subcarriers. There are 56 ”nulls” (center carrier, 28 lower
frequency and 27 higher frequency guard carriers).



S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks    24
WMAN, part 2

 Modulation and coding affect user data rate

The 192 data subcarriers carry 192 data symbols in parallel
(= transmitted at the same time). Each symbol carries 1 bit
(BPSK), 2 bits (QPSK), 4 bits (16-QAM), or 6 bits (64-QAM) of
channel information (corresponding to the channel bit rate
after channel coding, not to be confused with the user bit rate
before channel coding).
The inner convolutional coding reduces the usable number of
bits to 1/2, 2/3, or 3/4 of the channel information.
The outer Reed-Solomon block coding furthermore reduces
the usable number of bits about 10 %.




S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks    25
WMAN, part 2

        Subcarrier signal in time domain (1)

Guard time for preventing                   In the receiver, FFT is calculated
intersymbol interference                    only during this time
               Tg                      Tb


                                                          Next symbol

                                                                            Time
                               Ts

IEEE 802.16 offers four values for G = Tg/Tb: G = 1/4, 1/8,
1/16 or 1/32. (802.11a/g offers only one value: G = 1/4)



 S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks          26
WMAN, part 2

        Subcarrier signal in time domain (2)

               Tg                      Tb


                                                          Next symbol

                                                                            Time


IEEE 802.16 offers various bandwidth choices. The bandwidth is
typically an integer multiple of 1.25, 1.5 or 1.75 MHz.
(802.11a/g offers only a fixed channel bandwidth: 16.25 MHz)
Since the number of subcarriers is fixed, a certain bandwidth is
translated into a certain subcarrier spacing ∆f = 1/Tb.



 S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks          27
WMAN, part 2

                   Four primitive parameters

WirelessMAN-OFDM defines four "primitive parameters" that
characterize the OFDM symbol:
     The nominal channel bandwidth BW
     The number of used subcarriers Nused = 200
     The sampling factor n. This parameter depends on the
     bandwidth. For instance, when the bandwith is a multiple
     of 1.25, 1.5 or 1.75 MHz, n = 144/125, 86/75 or 8/7,
     respectively.
     The guard time to useful symbol time ratio G.




S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks    28
WMAN, part 2

                         Derived parameters

Using the four primitive parameters shown on the previous
slide, the following additional parameters can be derived:
     NFFT (the smallest power of two greater than Nused) = 256
     Sampling frequency fs = floor(n.BW/8000)x8000
     Subcarrier spacing ∆f = fs/NFFT
     Useful symbol time Tb = 1/∆f
     Guard time Tg = G.Tb
     OFDM symbol time Ts = Tg + Tb.




S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks    29
WMAN, part 2

                                    Example

For BW = 5 MHz, BPSK, G = 1/32, calculate peak bit rate:
     fs = floor(144/125 x 5 MHz / 8000) x 8000 = 5.76 MHz
     ∆f = fs/NFFT = 5.76 MHz / 256 = 22.5 kHz
     Tb = 1/∆f = 44.44 µs
     Tg = G.Tb = 1.39 µs                        86.4 info bits / OFDM symbol
     Ts = Tg + Tb = 45.83 µs
     Peak bit rate = (192 bits x 0.5 x 0.9) / 45.83 µs
                   = 1.89 Mb/s




S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks    30
WMAN, part 2

        Modulation and coding combinations

Modulation          Coding        Info bits /         Info bits /           Peak data
                     rate         subcarrier           symbol              rate (Mbit/s)

  BPSK                1/2               0.5                88                 1.89
  QPSK                1/2                1                 184                3.95
  QPSK                3/4               1.5                280                6.00
 16-QAM               1/2                2                 376                8.06
 16-QAM               3/4                3                 568                12.18
 64-QAM               2/3                4                 760                16.30
 64-QAM               3/4               4.5                856                18.36

              Depends on chosen bandwidth (here 5 MHz is assumed)



S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks               31
WMAN, part 2

                             Example (cont.)

The peak bit rate does not take into account the MAC layer
overhead (MAC PDU header and trailer) and PHY layer
overhead (contention slots and burst preamble in UL, DL PHY
PDU preamble and header in DL).
Consequently, the user data rate is substantially smaller
(even if the SS is the only user of the WMAN).




S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks    32

Mais conteúdo relacionado

Mais procurados

Habibullah cdmabased
Habibullah cdmabasedHabibullah cdmabased
Habibullah cdmabasedhinalala
 
09 spread spectrum
09 spread spectrum09 spread spectrum
09 spread spectrumKashif Amjad
 
Spread spectrum techniques
Spread spectrum techniquesSpread spectrum techniques
Spread spectrum techniquesFaisal Ch
 
Lecture intro to_wcdma
Lecture intro to_wcdmaLecture intro to_wcdma
Lecture intro to_wcdmaGurpreet Singh
 
Gsm interview question answer
Gsm interview question  answerGsm interview question  answer
Gsm interview question answerEdward Kamara
 
LTE TDD Technology Overview
LTE TDD Technology OverviewLTE TDD Technology Overview
LTE TDD Technology OverviewGoing LTE
 
B.Tech Final Project
B.Tech Final ProjectB.Tech Final Project
B.Tech Final Projectsonix022
 
GSM RF Interview Q&A
GSM RF Interview Q&AGSM RF Interview Q&A
GSM RF Interview Q&AYayvo.com
 
Exact Outage Performance Analysis of Amplify-and-forward-aware Cooperative NOMA
Exact Outage Performance Analysis of Amplify-and-forward-aware Cooperative NOMAExact Outage Performance Analysis of Amplify-and-forward-aware Cooperative NOMA
Exact Outage Performance Analysis of Amplify-and-forward-aware Cooperative NOMATELKOMNIKA JOURNAL
 
Qpsk modulation for dsss cdma transmitter and receiver using fpga
Qpsk modulation for dsss cdma transmitter and receiver using fpgaQpsk modulation for dsss cdma transmitter and receiver using fpga
Qpsk modulation for dsss cdma transmitter and receiver using fpgaIAEME Publication
 
LTE Physical layer aspects
LTE Physical layer aspectsLTE Physical layer aspects
LTE Physical layer aspectsBP Tiwari
 

Mais procurados (18)

Habibullah cdmabased
Habibullah cdmabasedHabibullah cdmabased
Habibullah cdmabased
 
09 spread spectrum
09 spread spectrum09 spread spectrum
09 spread spectrum
 
Spread spectrum techniques
Spread spectrum techniquesSpread spectrum techniques
Spread spectrum techniques
 
Cdma and 3 g
Cdma and 3 gCdma and 3 g
Cdma and 3 g
 
Lecture intro to_wcdma
Lecture intro to_wcdmaLecture intro to_wcdma
Lecture intro to_wcdma
 
Gsm interview question answer
Gsm interview question  answerGsm interview question  answer
Gsm interview question answer
 
Ip2415101517
Ip2415101517Ip2415101517
Ip2415101517
 
LTE TDD Technology Overview
LTE TDD Technology OverviewLTE TDD Technology Overview
LTE TDD Technology Overview
 
3 G Interview
3 G Interview3 G Interview
3 G Interview
 
B.Tech Final Project
B.Tech Final ProjectB.Tech Final Project
B.Tech Final Project
 
Spread spectrum modulation
Spread spectrum modulationSpread spectrum modulation
Spread spectrum modulation
 
GSM RF Interview Q&A
GSM RF Interview Q&AGSM RF Interview Q&A
GSM RF Interview Q&A
 
Cdma 101
Cdma 101Cdma 101
Cdma 101
 
Exact Outage Performance Analysis of Amplify-and-forward-aware Cooperative NOMA
Exact Outage Performance Analysis of Amplify-and-forward-aware Cooperative NOMAExact Outage Performance Analysis of Amplify-and-forward-aware Cooperative NOMA
Exact Outage Performance Analysis of Amplify-and-forward-aware Cooperative NOMA
 
Qpsk modulation for dsss cdma transmitter and receiver using fpga
Qpsk modulation for dsss cdma transmitter and receiver using fpgaQpsk modulation for dsss cdma transmitter and receiver using fpga
Qpsk modulation for dsss cdma transmitter and receiver using fpga
 
LTE Physical layer aspects
LTE Physical layer aspectsLTE Physical layer aspects
LTE Physical layer aspects
 
Wcdma p&o-c-en-basic theory-1-51
Wcdma p&o-c-en-basic theory-1-51Wcdma p&o-c-en-basic theory-1-51
Wcdma p&o-c-en-basic theory-1-51
 
Handoff
HandoffHandoff
Handoff
 

Semelhante a 10 wman2[1]

Semelhante a 10 wman2[1] (20)

2_wpan.ppt
2_wpan.ppt2_wpan.ppt
2_wpan.ppt
 
IEEE 802.16j Multi-hop Relay
IEEE 802.16j Multi-hop RelayIEEE 802.16j Multi-hop Relay
IEEE 802.16j Multi-hop Relay
 
Wi-max
Wi-maxWi-max
Wi-max
 
Gsm signaling
Gsm signalingGsm signaling
Gsm signaling
 
UCL
UCLUCL
UCL
 
wimaxME.ppt
wimaxME.pptwimaxME.ppt
wimaxME.ppt
 
Wi Max
Wi MaxWi Max
Wi Max
 
9 16 05 Karim Hassib Wi Max
9 16 05 Karim Hassib   Wi Max9 16 05 Karim Hassib   Wi Max
9 16 05 Karim Hassib Wi Max
 
Sit training cr
Sit training crSit training cr
Sit training cr
 
Physical layer aspects (Matthew Baker: RAN WG1 Chair, Alcatel-Lucent)
Physical layer aspects (Matthew Baker: RAN WG1 Chair, Alcatel-Lucent) Physical layer aspects (Matthew Baker: RAN WG1 Chair, Alcatel-Lucent)
Physical layer aspects (Matthew Baker: RAN WG1 Chair, Alcatel-Lucent)
 
Rev 090003 R1
Rev 090003 R1Rev 090003 R1
Rev 090003 R1
 
Rev 090003 R1
Rev 090003 R1Rev 090003 R1
Rev 090003 R1
 
Wireless networking
Wireless networkingWireless networking
Wireless networking
 
L2 MAC LTE PROCEDURES revC
L2 MAC LTE PROCEDURES revCL2 MAC LTE PROCEDURES revC
L2 MAC LTE PROCEDURES revC
 
Chap08 gb 03_kh
Chap08 gb 03_khChap08 gb 03_kh
Chap08 gb 03_kh
 
Multi protocol label switching (mpls)
Multi protocol label switching (mpls)Multi protocol label switching (mpls)
Multi protocol label switching (mpls)
 
Frame2
Frame2Frame2
Frame2
 
LTE-Advanced Physical Layer
LTE-Advanced Physical LayerLTE-Advanced Physical Layer
LTE-Advanced Physical Layer
 
Bits and bandwidth
Bits and bandwidthBits and bandwidth
Bits and bandwidth
 
Wimax for Broadband Wireless access
Wimax for Broadband Wireless accessWimax for Broadband Wireless access
Wimax for Broadband Wireless access
 

10 wman2[1]

  • 1. WMAN, part 2 Contents Part 1: IEEE 802.16 family of standards Protocol layering TDD frame structure MAC PDU structure Part 2: Dynamic QoS management OFDM PHY layer S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 1
  • 2. WMAN, part 2 Four service classes The IEEE 802.16 MAC layer defines four service classes: • Unsolicited Grant Service (UGS) • Real-time Polling Service (rtPS) QoS increases QoS increases • Non-real-time Polling Service (nrtPS) • Best Effort (BE) service The scheduling algorithms needed for implementing the three first types of services are implemented in the BS (while allocating uplink bandwidth to each SS) and are not defined in the 802.16 standard. Each SS negotiates its service policies with the BS at the connection setup time. S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 2
  • 3. WMAN, part 2 Unsolicited grant service (UGS) UGS UGS offers fixed size grants on a real-time periodic UGS basis, which eliminates the overhead and latency of rtPS rtPS SS requests and assures that grants are available to nrtPS nrtPS meet the flow’s real-time needs. The BS provides fixed size bursts in the uplink at periodic intervals for BE BE the service flow. The burst size and other parameters are negotiated at connection setup. Typical UGS applications: E1/T1 links (containing e.g. delay-sensitive speech signals), VoIP (without silence suppression). S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 3
  • 4. WMAN, part 2 Real-time Polling Service (rtPS) UGS The Real-time Polling Service (rtPS) is designed to UGS support real-time service flows that generate variable rtPS rtPS size data packets on a periodic basis, such as VoIP nrtPS nrtPS (with silence suppression) or streaming video. BE BE This service offers real-time, periodic, unicast request opportunities, which meet the flow’s real-time needs and allow the SS to specify the size of the desired uplink transmission burst. This service requires more request overhead than UGS, but supports variable grant sizes for optimum data transport efficiency. S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 4
  • 5. WMAN, part 2 Non-real-time Polling Service (nrtPS) UGS The Non-real-time Polling Service (nrtPS) is designed UGS to support non-real-time service flows that require rtPS rtPS variable size bursts in the uplink on a regular (but not nrtPS nrtPS strictly periodic) basis. BE BE Subscriber stations contend for bandwidth (for uplink transmission) during contention request opportunities. The availability of such opportunities is guaranteed at regular intervals (on the order of one second or less) irrespective of network load. S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 5
  • 6. WMAN, part 2 Best Effort (BE) service UGS The Best Effort service is intended to be used for best UGS effort traffic where no throughput or delay guarantees rtPS rtPS are provided. nrtPS nrtPS Subscriber stations contend for bandwidth (for uplink BE BE transmission) during contention request opportunities. The availability of such opportunities depends on network load and is not guaranteed (in contrast to nrtPS). S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 6
  • 7. WMAN, part 2 Radio Link Control in IEEE 802.16 The main task of Radio Link Control (RLC) in IEEE 802.16 systems is to provide dynamic changing of UL and DL burst profiles on a per-connection and per-frame basis, depending on radio channel characteristics and QoS requirements. As an example, RLC provides signaling for initial access (ranging) and bandwidth allocation in the downlink direction: • Ranging request (RNG-REQ) from SS to BS • Ranging response (RNG-RSP) from BS to SS • Bandwidth requests (DBPC-REQ) from SS to BS • Bandwidth confirmation (DBPC-RSP) from BS to SS S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 7
  • 8. WMAN, part 2 Initial access (initial ranging) RNG-REQ During initial access, the SS sends a ranging RNG-RSP request message in the contention slot reserved DBPC-REQ for this purpose, among others indicating which DBPC-RSP kind of DL burst profile should be used. Note: There is the possibility of collision since other subscriber stations also send ranging request messages in this contention slot. … Contention Contention UL PHY Contention Contention UL PHY UL PHY UL PHY … UL traffic slot A slot A slot B slot B burst 1 burst 1 burst 2 burst 2 S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 8
  • 9. WMAN, part 2 Initial access (initial ranging) RNG-REQ In response to the RNG-REQ message, the BS RNG-RSP returns a ranging response message in a DL DBPC-REQ burst with a sufficiently robust burst profile. DBPC-RSP This message includes the timing advance value for correct alignment of bursts in UL, as well as UL power control information. DL PHY DL PHY burst burst Preamble Preamble FCS FCS DL burst 1 … DL burst k … DL burst n DL burst 1 DL burst k DL burst n S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 9
  • 10. WMAN, part 2 DL burst profile change RNG-REQ The SS continuously measures the radio channel RNG-RSP quality. If there is a need for change in DL burst DBPC-REQ profile, the SS sends a DL burst profile change DBPC-RSP request message in the contention slot reserved for this purpose, indicating the desired new DL burst profile. … Contention Contention UL PHY Contention Contention UL PHY UL PHY UL PHY … UL traffic slot A slot A slot B slot B burst 1 burst 1 burst 2 burst 2 S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 10
  • 11. WMAN, part 2 DL burst profile change RNG-REQ In response to the DBPC-REQ message, the BS RNG-RSP returns a DL burst profile change response DBPC-REQ message confirming the new burst profile. DBPC-RSP This is done in a DL burst with the old burst profile (when changing to a less robust DL burst profile) or using the new burst profile (when DL PHY DL PHY changing to a more robust DL burst profile). burst burst Preamble Preamble FCS FCS DL burst 1 … DL burst k … DL burst n DL burst 1 DL burst k DL burst n S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 11
  • 12. WMAN, part 2 Transition to a new DL burst profile BS SS Channel measurement indicates that DL burst profile n DL burst profile n different DL burst profile should be used is used is used DBPC-REQ DBPC-REQ DBPC-RSP DBPC-RSP DL data is sent using DL burst profile k DL burst profile k new burst profile k is used is used S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 12
  • 13. WMAN, part 2 UL burst profile change RNG-REQ The BS measures the UL signal quality and may RNG-RSP request a change in UL burst profile as indicated DBPC-REQ in the downlink channel descriptor (DCD) within DBPC-RSP the first DL burst of the DL PHY burst. DCD SS: Read DCD and change SS: Read DCD and change DL PHY DL PHY UL burst profile accordingly UL burst profile accordingly burst burst Preamble Preamble FCS FCS DL burst 1 … DL burst k … DL burst n DL burst 1 DL burst k DL burst n S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 13
  • 14. WMAN, part 2 Dynamic QoS management in practice The request-response mechanism described on the previous slides is designed to be scalable, efficient, and self-correcting. While extensive bandwidth allocation and QoS mechanisms are specified in the IEEE 802.16 standard, the details of scheduling and reservation management have not been standardized and thus provide an important mechanism for vendors to differentiate their equipment. (There is a similar situation regarding standardization of a transmission system in general: the transmitted signal is standardized in detail, whereas receivers can process the received signal as they like, using innovative technology.) S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 14
  • 15. WMAN, part 2 Three types of management connections When a subscriber station acesses the network, three types of management connections are established between the SS and the BS (before transport connections can be established): Basic management connection for exchange of short, delay-critical MAC management messages Primary management connection for exchange of longer, more delay tolerant MAC management messages Secondary management connection for exchange of delay tolerant IP-based messages, such as used during DHCP transactions. S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 15
  • 16. WMAN, part 2 Connection establishment (1) Channel acquisition: The MAC protocol includes an initialization procedure designed to eliminate the need for manual configuration. Upon installation, the SS scans for a suitable BS downlink signal. The SS synchronizes to this signal and reads the downlink channel descriptor (DCD) and uplink channel descriptor (UCD) information in the first DL burst of the DL PHY PDU, in order to learn the modulation and coding schemes used on the carrier. S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 16
  • 17. WMAN, part 2 Connection establishment (2) Initial ranging and negotiation of SS capabilities (1): Upon learning what parameters to use for its initial ranging signal in UL, the SS looks for initial ranging opportunities by scanning the UL-MAP information present in every frame. After a random backoff time, the SS sends the ranging request message (RNG-REQ) to the BS. The BS calculates the timing advance value that the SS must use in UL from now on, and sends this information to the SS in the RNG-RSP message. S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 17
  • 18. WMAN, part 2 Connection establishment (3) Initial ranging and negotiation of SS capabilities (2): The BS also sends power control information, as well as the CID for the basic management connection and the primary management connection to the SS. Using the primary management connection, the SS reports its PHY capabilities, including the modulation and coding schemes it supports and whether, in an FDD system, it is half-duplex or full-duplex. The BS, in its response, can deny the use of any capability reported by the SS. S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 18
  • 19. WMAN, part 2 Connection establishment (4) SS authentication (using privacy sublayer): Each SS contains both a manufacturer-issued factory- installed X.509 digital certificate and the certificate of the manufacturer. After sending these certificates (and the public key of the SS) to the BS, the BS can authenticate the SS. If authentication is successful, the BS sends the Authorization Key (AK), encrypted with the public key of the SS, to the SS. The AK is used both by SS and BS for securing further information flow. S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 19
  • 20. WMAN, part 2 Connection establishment (5) SS registration: Upon successful authentication, the SS registers with the network. The response from the BS contains the CID for a secondary management connection. Contrary to the basic and primary management connection, this secondary management connection is secured. At this point, the capabilities related to connection setup and MAC operation, as well as the IP version used, are determined. (Remember that the secondary management connection is IP-based.) S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 20
  • 21. WMAN, part 2 Connection establishment (6) IP connectivity: After registration, using the secondary management connection, the SS is allocated an IP address via DHCP and establishes the time of the day via the Internet Time Protocol. The DHCP server also provides the address of the TFTP server from which the SS can request a configuration file. This file provides a standard interface for providing vendor-specific configuration information. S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 21
  • 22. WMAN, part 2 Connection establishment (7) Connection setup: Finally, the secondary management connection is also used for setting up one or more transport connections. These transport connections carry the actual user data (IP traffic, VoIP traffic, etc.) between BS and SS. IEEE 802.16 uses the concept of service flows to define unidirectional transport of packets on either downlink or uplink. Service flows are characterized by a certain set of QoS parameters, and are established using a three-way handshaking establishment procedure. S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 22
  • 23. WMAN, part 2 Summary: Dynamic QoS management In summary, IEEE 802.16 offers the following mechanisms for dynamically managing QoS and bandwidth: In the PHY layer by adjusting the DL and UL burst profiles (modulation and coding combination) on a per-frame basis. In the MAC layer through fragmentation and packing (both can be done at the same time). At higher protocol layers by using scheduling algorithms in the base station. These algorithms are not specified in the IEEE 802.16 standard. S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 23
  • 24. WMAN, part 2 WirelessMAN-OFDM PHY WirelessMAN-OFDM is based on 256 subcarriers, of which 200 subcarriers are used: 192 data subcarriers + 8 pilot subcarriers. There are 56 ”nulls” (center carrier, 28 lower frequency and 27 higher frequency guard carriers). S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 24
  • 25. WMAN, part 2 Modulation and coding affect user data rate The 192 data subcarriers carry 192 data symbols in parallel (= transmitted at the same time). Each symbol carries 1 bit (BPSK), 2 bits (QPSK), 4 bits (16-QAM), or 6 bits (64-QAM) of channel information (corresponding to the channel bit rate after channel coding, not to be confused with the user bit rate before channel coding). The inner convolutional coding reduces the usable number of bits to 1/2, 2/3, or 3/4 of the channel information. The outer Reed-Solomon block coding furthermore reduces the usable number of bits about 10 %. S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 25
  • 26. WMAN, part 2 Subcarrier signal in time domain (1) Guard time for preventing In the receiver, FFT is calculated intersymbol interference only during this time Tg Tb Next symbol Time Ts IEEE 802.16 offers four values for G = Tg/Tb: G = 1/4, 1/8, 1/16 or 1/32. (802.11a/g offers only one value: G = 1/4) S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 26
  • 27. WMAN, part 2 Subcarrier signal in time domain (2) Tg Tb Next symbol Time IEEE 802.16 offers various bandwidth choices. The bandwidth is typically an integer multiple of 1.25, 1.5 or 1.75 MHz. (802.11a/g offers only a fixed channel bandwidth: 16.25 MHz) Since the number of subcarriers is fixed, a certain bandwidth is translated into a certain subcarrier spacing ∆f = 1/Tb. S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 27
  • 28. WMAN, part 2 Four primitive parameters WirelessMAN-OFDM defines four "primitive parameters" that characterize the OFDM symbol: The nominal channel bandwidth BW The number of used subcarriers Nused = 200 The sampling factor n. This parameter depends on the bandwidth. For instance, when the bandwith is a multiple of 1.25, 1.5 or 1.75 MHz, n = 144/125, 86/75 or 8/7, respectively. The guard time to useful symbol time ratio G. S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 28
  • 29. WMAN, part 2 Derived parameters Using the four primitive parameters shown on the previous slide, the following additional parameters can be derived: NFFT (the smallest power of two greater than Nused) = 256 Sampling frequency fs = floor(n.BW/8000)x8000 Subcarrier spacing ∆f = fs/NFFT Useful symbol time Tb = 1/∆f Guard time Tg = G.Tb OFDM symbol time Ts = Tg + Tb. S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 29
  • 30. WMAN, part 2 Example For BW = 5 MHz, BPSK, G = 1/32, calculate peak bit rate: fs = floor(144/125 x 5 MHz / 8000) x 8000 = 5.76 MHz ∆f = fs/NFFT = 5.76 MHz / 256 = 22.5 kHz Tb = 1/∆f = 44.44 µs Tg = G.Tb = 1.39 µs 86.4 info bits / OFDM symbol Ts = Tg + Tb = 45.83 µs Peak bit rate = (192 bits x 0.5 x 0.9) / 45.83 µs = 1.89 Mb/s S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 30
  • 31. WMAN, part 2 Modulation and coding combinations Modulation Coding Info bits / Info bits / Peak data rate subcarrier symbol rate (Mbit/s) BPSK 1/2 0.5 88 1.89 QPSK 1/2 1 184 3.95 QPSK 3/4 1.5 280 6.00 16-QAM 1/2 2 376 8.06 16-QAM 3/4 3 568 12.18 64-QAM 2/3 4 760 16.30 64-QAM 3/4 4.5 856 18.36 Depends on chosen bandwidth (here 5 MHz is assumed) S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 31
  • 32. WMAN, part 2 Example (cont.) The peak bit rate does not take into account the MAC layer overhead (MAC PDU header and trailer) and PHY layer overhead (contention slots and burst preamble in UL, DL PHY PDU preamble and header in DL). Consequently, the user data rate is substantially smaller (even if the SS is the only user of the WMAN). S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 32