Upload
cmapt
View
215
Download
0
Embed Size (px)
Citation preview
8/13/2019 12-Specific System WiMax
1/25
#12 1
Victor S. FrostDan F. Servey Distinguished Professor
Electrical Engineering and Computer ScienceUniversity of Kansas2335 Irving Hill Dr.
Lawrence, Kansas 66045Phone: (785) 864-4833 FAX:(785) 864-7789
e-mail: [email protected]://www.ittc.ku.edu/
Specific Systems
Wi-MaxIEEE 802.16
#12
All material copyright 2006
Victor S. Frost, All Rights Reserved
#12 2
Outline
Motivation for IEEE 802.16 Applications Services and QoS Architecture Initialization Phy Layer MAC
Packet formats Access protocol QoS support
Evolution Focus on fixed wireless no mobility IEEE 802.16e
has mobility
8/13/2019 12-Specific System WiMax
2/25
#12 3
Motivation for IEEE 802.16
Provide all aspect of a wireless MAN Alternative access technology in competition with,
cable, fiber and DSL Higher carrier frequencies (up to 66 GHz) to
support higher data rates RF bandwidth, e.g., 20 MHz Expectations
Higher UE data rates Cost
Lower installation cost Higher equipment cost
Reduced deployment time Ubiquitous coverage
#12 4
Overview of IEEE 802.16
Point-to-Multipoint Metropolitan Area Network Connection-oriented Burst based architecture Supports difficult user environments
High bandwidth, hundreds of users per channel Continuous and burst traffic Efficient use of spectrum
Balances between stability of contentionless andefficiency of contention-based operation
Flexible QoS offerings Supports multiple 802.16 PHYs Protocol-Independent core (ATM, IP, Ethernet, )
From: R. Marks, The 802.16 WirelessMAN WirelessMAN MAC: MAC:Its Done, but What Is It? www.ieee802.org/16/docs/01/80216-01_58r1.pdf
8/13/2019 12-Specific System WiMax
3/25
#12 5
IEEE 206.16 Protocol Architecture
Protocol-Independent core
Modified from: W. Stallings Wireless Communications and Networks,Prentice Hall, Second Edition
Convergence layer:
-Maps upper layer packetsinto MAC frames
-May fragment to gain efficiency
#12 6From: R. Marks, The 802.16 WirelessMAN WirelessMAN MAC: MAC:
Its Done, but What Is It? www.ieee802.org/16/docs/01/80216-01_58r1.pdf
8/13/2019 12-Specific System WiMax
4/25
#12 7
WiMAX-OFDM
From: IEEE 802 Wireless Systems, B. Walke, S. Mangold, and L. Berlemann, Wiley, 2006
#12 8
Services
Support multiple services, e.g., TDM Voice VoIP Digital TV IP
Bridged LAN Backhaul: Cell tower to switch replacingcostly land lines
8/13/2019 12-Specific System WiMax
5/25
#12 9
QoS Requirements
From: W. Stallings Wireless Communications and Networks,Prentice Hall, Second Edition
#12 10
IEEE 802.16 System Reference Points
Assumptions The subscriber stations (SS) are fixed (later version
may allow mobility, i.e., IEEE 802.16e)
Base stations are fixed
High data rates in BOTH upstream and downstreamdirections
Base station maybe heavily loaded
Needs to be spectral efficient
* From: W. Stallings Wireless Communications and Networks,Prentice Hall, Second Edition
*
8/13/2019 12-Specific System WiMax
6/25
#12 11
Connections
IEEE 802.16 MAC is connection-oriented. Provides Each service mapped to a connection A mechanism for requesting bandwidth, associating
QoS and traffic parameters, transporting information Routing data to the appropriate convergence sublayer, Other actions associated with the contractual terms
of the service.
Connection ID (CID)16 bit field Like virtual circuits
Each SS has a standard 48 bit MAC
address Equipment ID
#12 12
Initialization
Channel Acquisition SS scans its frequency list to find an operating
channel (may be configured with a specific BSID to look for)
The SS synchronizes to the downstreamtransmission by detecting the periodic framepreamble
The downstream periodically transmits itsmodulation and FEC schemes using
Downlink Channel Descriptor (DCD) and Uplink Channel Descriptor (UCD) messages
DCD and UDC are transmitted most robust(least efficient burst profile)
8/13/2019 12-Specific System WiMax
7/25
#12 13
Initialization Ranging
MAP messages are used to define the usage of channel DL-MAP downlink MAP UL-MAP uplink MAP
SS scans the UL-MAP for opportunities to send a ranging messages SS selects a ranging time slot using a truncated exponential
backoff algorithm (like in DOCSIS) Send ranging message (RNG-REQ message) with minimum power If no response increase power and tx again Success of the ranging message at the BS allows for the BS to
send the SS Time synchronization information Power adjustment information Basic Channel ID (CID) Primary Management CID
SS reports to BS PHY capabilities and BS can accept or deny any
capability The above process is repeated to maintain the radio link(Radio link control-RLC)
#12 14
Initialization
SS Authentication and Registration Determine if SS can join the network
If authorized then SS registers withthe network
IP connectivity Uses DHCP to get IP address
And address of TFTP server to to obtainconfiguration files.
8/13/2019 12-Specific System WiMax
8/25
#12 15
Initialization
Connection set up Service flows define unidirectional transport Each service flow is mapped to a CID on a specific MAC
address Service flows usually are set up by the BS during
initialization, like permanent virtual circuits (PVCs) CID can be setup on demand, like a switched virtual
circuit (SVCs) using a signaling protocol. Initially each SS sets up three management connections
in each direction (each on own CID) Basic for short time critical MAC and RLC messages Primary for larger delay insensitive messages, eg., for
authentication
Secondary for management, SNMP, TFTP, and DHCP Privacy and Security Associations
#12 16
Summary Initialization
From: Govindan Nair, et. al., IEEE 802.16 Medium AccessControl and Service Provisioning, Intel Technology Journal, Volume 08 Issue 03,
August 20, 2004 ISSN 1535-864X
8/13/2019 12-Specific System WiMax
9/25
#12 17
RLC Adaptation
As part of the MAC the RLC continues toadapt the uplink and downlink burstprofiles to trade: Robustness Efficiency
BS controls all burst profiles Control of uplink burst profile
BS receives uplink messages BS can measure uplink quality
BS specifies burst profile when granting access
#12 18
RLC Adaptation
Control of downlink burst profile SS receives downlink transmissions
SS measures downlink quality
Problem: SS must communicate appropriateburst profile to BS
Note SS is required to receive more robustsegments of the downlink transmission in
addition to the negotiated burst profile Change messages must get through andacknowledged
8/13/2019 12-Specific System WiMax
10/25
#12 19
RLC Adaptation
Uplink Interval Usage Code (UIUC) Defines the burst profiles used by the each SS on the
uplink BS is in control of changed in UL burst profiles BS specifies the UIUC when granting the SS permission
to send on the uplink
Downlink Interval Usage Code (DIUC) Defines the burst profiles for the downlink Each SS can have a different burst profile in the
downlink In the downlink it is the SS that knows the CSI
The BS is still the entity to execute changes in the DIUC Thus a protocol is needed to exchange the information.
#12 20
RLC Adaptation
Transition to a less robust burst profile.Transition to a more robust burst profile.
From: Carl Eklund,, et., al., IEEE Standard 802.16:A Technical Overview of theWirelessMAN Air Interface for Broadband Wireless Access,IEEE Communications Magazine June 2002
DLBC= DL Burst Change
8/13/2019 12-Specific System WiMax
11/25
#12 21
Physical Layer Summary
TDD, FDDBasic, (ARQ),(STC), (AAS)
2-11 GHz Licensed
TDDBasic, (ARQ),(STC), (DFS),(MSH), (AAS)
2-11 GHz License-exempt
WirelessMAN-OFDMA
TDDBasic, (ARQ),(STC), (DFS),(MSH), (AAS)
2-11 GHz License-exempt
TDD, FDDBasic, (ARQ),(STC), (AAS)
2-11 GHz Licensed
WirelessMAN-OFDM
TDD, FDDBasic, (ARQ),(STC), (AAS)
2-11 GHz LicensedWirelessMAN-SC
TDD, FDD, HFDDBasic10-66 GHz LicensedWirelessMAN-SC
DuplexingMACApplicabilityDesignation
AAS= Adpative Antenna SystemSTC= Space time codingMSH= MeshDFS = Dynamic Frequency Selection
#12 22
Physical Layer
Burst based architecture Upstream transmission
TDD UL/DL share same channel; do not simultaneous transmit FDD UL/DL on separate chaanel can transmit simultaneously Demand Assignment Multiple Access
Downstream TDD or FDD Continuous mode Burst mode
Capability to dynamically change modulation and FEC
Channel Bandwidth 20 or 25 MHz (US)
28 MHz (Europe) Frames 0.5, 1 or 2 ms Adaptive burst profile; changing
Modulation FEC
8/13/2019 12-Specific System WiMax
12/25
#12 23
Burst based architecture
Broadcast phase : The information aboutuplink and downlink structure is announced. DL-MAP(Downlink Map)
DL-MAP defines the access to the downlinkinformation
Modulation
FEC
UL-MAP(Uplink Map) UL-MAP message allocates access to the uplink
channel
#12 24
General Downlink Frame Structure
Downlink Interval Usage Code (DIUC)indicates burst profile
* From: Carl Eklund,, et., al., IEEE Standard 802.16:A Technical Overview of theWirelessMAN Air Interface for Broadband Wireless Access,IEEE Communications Magazine June 2002
DL MAP contains thechanges in burst profile, i.e.,modulation and FEC
Downlink data is transmittedto each SS according to anegotiated burst profile
Data is transmitted in theTDM part in order ofdecreasing robustness
There maybe a mixture ofburst profiles that varyframe-to-frame
SS listen to all parts of thedownlink frame they arecapable or receiving
*
8/13/2019 12-Specific System WiMax
13/25
#12 25
Downlink transmissions
Two kinds of bursts: TDM and TDMA All bursts are identified by a DIUC
Downlink Interval Usage Code
TDMA bursts have resync preamble allows formore flexible scheduling
Each terminal listens to all bursts at itsoperational IUC, or at a more robust one, exceptwhen told to transmit
Each burst may contain data for several terminals SS must recognize the PDUs with known CIDs
DL-MAP message signals downlink usage
From: R. Marks, The 802.16 WirelessMAN WirelessMAN MAC: MAC:Its Done, but What Is It? www.ieee802.org/16/docs/01/80216-01_58r1.pdf
#12 26
Downlink Channel Descriptor
Used for advertising downlink burstprofiles
Burst profile of DL broadcast channel iswell known
All others are acquired Burst profiles can be changed on the fly
without interrupting the service Not intended as 'super-adaptive'
modulation Establishes association between DIUC and
actual PHY parameters
From: R. Marks, The 802.16 WirelessMAN WirelessMAN MAC: MAC:Its Done, but What Is It? www.ieee802.org/16/docs/01/80216-01_58r1.pdf
8/13/2019 12-Specific System WiMax
14/25
#12 27
General Uplink Frame Structure
Uplink Interval Usage Code(UIUC) indicates burst profile
* From: Carl Eklund,, et., al., IEEE Standard 802.16:A Technical Overview of theWirelessMAN Air Interface for Broadband Wireless Access,IEEE Communications Magazine June 2002
UL-MAP grants BW tospecific SS
SS transmit bursts asdefined in the UIUC
SS tx their assignedallocations in the UIUC
Uplink subframe usesDOCSIS like contention fortransmission in contentionslots
Burst profiles can be changeddynamically, frame-to-frame
SS transition gap are guardtimes
*
#12 28
Uplink Transmissions Invited transmissions Transmissions in contention slots
Bandwidth requests Contention resolved using truncated exponential backoff
Transmissions in initial ranging slots RNG-REQ Contention resolved using truncated exponential backoff
Bursts defined by UIUCs Transmissions allocated by the UL-MAP message
All transmissions have synchronization preamble Ideally, all data from a single SS is concatenatedinto a single PHY burst
From: R. Marks, The 802.16 WirelessMAN WirelessMAN MAC: MAC:Its Done, but What Is It? www.ieee802.org/16/docs/01/80216-01_58r1.pdf
8/13/2019 12-Specific System WiMax
15/25
#12 29
Uplink Channel Descriptor
Defines uplink burst profiles Sent regularly All Uplink Burst profiles are acquired Burst profiles can be changed on the
fly Establishes association between
UIUC and actual PHY parameters
From: R. Marks, The 802.16 WirelessMAN WirelessMAN MAC: MAC:Its Done, but What Is It? www.ieee802.org/16/docs/01/80216-01_58r1.pdf
#12 30
Uplink MAP Message
UL-MAP message defines usage of theuplink
Contains the "grants"
Grants addressed to the SS
Time given in mini-slots unit of uplink bandwidth allocation
2m
physical slots in 10-66 GHz PHY, Time is referenced to arrival time at BS
From: R. Marks, The 802.16 WirelessMAN WirelessMAN MAC: MAC:Its Done, but What Is It? www.ieee802.org/16/docs/01/80216-01_58r1.pdf
8/13/2019 12-Specific System WiMax
16/25
#12 31
Uplink scheduling
Uplink direction uses a schedule toallocate uplink capacity
Uses a request-grant mechanism
Specification of scheduling service isestablished at connection set up time.
Scheduling services are based onDOCSIS
#12 32
Class of uplink services
Unsolicited Grant Service
Real time Polling Service
Non real time Polling Service
Best Effort
Like DOCSIS
More later.
8/13/2019 12-Specific System WiMax
17/25
#12 33
PHY Frame-TDD example
DLFP=Downlink Frame PrefixFCH=Frame Control Header
#12 34
MAC overview
Uses Demand Assigned Multiple Access (DAMA)TDMA
BS controls allocations of uplink bandwidth Unit of allocation is a mini-slot SS requests transmission opportunities on the
uplink for a specific number of minislots on acontention basis
Collisions on request messages are resolved usingtruncated binary exponential backoff algorithm
BS collects requests and sends schedules on thedownlink via an allocation map
8/13/2019 12-Specific System WiMax
18/25
#12 35
MAC PDU Transmission
MAC PDUs are transmitted in PHY bursts A single PHY burst can contain multiple
Concatenated Concatenated MAC MAC The PHY burst can contain multiple FEC
blocks MAC PDUs may span FEC block boundaries The convergence layer between the MAC
and the PHY allows for capturing the start of the
next MAC PDU in case of erroneous FECblocks
From: R. Marks, The 802.16 WirelessMAN WirelessMAN MAC: MAC:Its Done, but What Is It? www.ieee802.org/16/docs/01/80216-01_58r1.pdf
#12 36
MAC PDU Transmission
From: R. Marks, The 802.16 WirelessMAN WirelessMAN MAC: MAC:Its Done, but What Is It? www.ieee802.org/16/docs/01/80216-01_58r1.pdf
PDU = Data exchanged between peer entitiesSDU = Data exchanged between adjunct layers
8/13/2019 12-Specific System WiMax
19/25
#12 37
MAC Frame Format
* From: W. Stallings Wireless Communications and Networks,Prentice Hall, Second Edition
Three MAC header formats Generic downlink
Generic uplink
Bandwidth request
Header format drives functionality
Caution: details of fields may havechanged
*
3 types
#12 38
Generic downlink header
EC-Encryption control EKS-Encryption control
sequence, vector of key HT-Header type generic or
bw req ARQ-indictor for link ARQ.
IF ARQ the 2 bytes atstart of frame use forARQ process
FC-Fragment control
FSN- Fragment seq # HCS-Header check
sequence. Only coversheader
*
* From: W. Stallings Wireless Communications and Networks,Prentice Hall, Second Edition
8/13/2019 12-Specific System WiMax
20/25
#12 39
Generic uplink header Added 8 bit grant management
field- three types USG (Unsolicited Grant Service) SI-Slip indicator, reports to BS
that SSs queue is backlogged soBS can take action to resolve
PM-Poll me Grants per interval # grants
required by connection Piggy-pack request number of
bytes requested USG with activity detection
Can switch to USG when there isactivity
Suited for VoIP with speechdetection
UGS-AD starts as rtPS flow Detects VoIP do BW req to go
to UGS Upon end of VoIP use BW req
with 0 Bytes to go back to rtPSflow
Piggyback request (because notuse separate bw requestmessage)
* From: W. Stallings Wireless Communications and Networks,Prentice Hall, Second Edition
#12 40
Bandwidth request header
15 bits used torequesttransmissions of anumber of bytes
*
* From: W. Stallings Wireless Communications and Networks,Prentice Hall, Second Edition
8/13/2019 12-Specific System WiMax
21/25
#12 41
Services
Unsolicited grant service (UGS) Transport fixed data periodically No explicit BW requests Limit on jitter = one frame time Provides guarantees on
throughput, latency, jitter
Not allowed to use random access opportunities Targeted for
T1/E1 over ATM ATM CBR
Buffer build up Not expected for CBR, but Grants may be lost Clock skew between the 802.16 net and the backbone may
Result backlog at SS To recover use the poll-me and slip indicators
#12 42
Services
Real-time polling service-rtPS Target services that are bursty but offers periodic
dedicated request opportunities to meet real-timerequirements.
Does not use contention process to request bandwidth,used explicit MAC message
Variable packet size Requests imply increased latency and overhead Suitable for
VoIP with silence detection MPEG Video
This is like rt-VBR ATM Provides guarantee on throughput Little less focus on latency.
8/13/2019 12-Specific System WiMax
22/25
#12 43
Services
Non-real-time Polling Services (nrtPS) Provides guarantee on throughput, Suitable for non real time services that have variable
data size, e. g., e-mail. Like rt-polling except but polls are less frequently Allowed to use contention requests May use Grant Management sub-header to request BW New request can be piggybacked with each new request
can be piggybacked with each transmitted PDU
Best Effort Provides no guarantees
Can request bandwidth using contention or explicitprocesses
#12 44
Classes of SS
An SS can have one for more connections
Grant per connection (GPC) class Bandwidth is granted explicitly for each
connection
SS needs to track each connection thus morecomplex
Less flexible
Less scaleable, more state to track Less efficient, because not as much sharing
8/13/2019 12-Specific System WiMax
23/25
#12 45
Classes of SS
Grant per SS (GPSS)
Grants given to all connections on anSS as an aggregate
GPSS SS needs to manage all thetraffic thus the QoS for differentapplications
Can react more quickly to changes
#12 46
Protocols for grants
Grants can be lost because: Errors cause the BS not to receive request
Errors cause the grant involved in collision
Errors cause the SS not to receive grant
Bandwidth not provided because: Not enough available downstream bandwidth
GPSS stole the bandwidth for other purpose
8/13/2019 12-Specific System WiMax
24/25
#12 47
Protocols for grants
How to deal with lost grants or unsatisfied grants? ARQ like protocol not used because takes too muchtime
A self correcting protocol is used.
Note requests are usually incremental that is achange from current allocation.
Set timer suitable for QoS If timer fires, SS requests again But the perception of current allocated BW at the
BS may not track right because an incrementalrequest is lost
Solution: Occasionally send aggregate bandwidthrequirement of SS, resets perception of currentallocated BW to SS
#12 48
802.16 Standards History
802.16a(Jan 2003)
Extension for 2-11 GHz: Targeted for non-line-of-sight, Point-to-Multi-Point applications likelast mile broadband access
802.16(Dec 2001)
Original fixed wireless broadband air Interfacefor 10 66 GHz: Line-of-sight only, Point-to-Multi-Point applications
802.16c(2002)
802.16 AmendmentWiMAX System Profiles
10 - 66 GHz
802.16REVd(802.16-2004)
(Oct 2004)
Adds WiMAX System Profiles and Errata for 2-
11 GHz
802.16e(802.16-2005)
(Dec 2005)
MAC/PHY Enhancements to support subscribersmoving at vehicular speeds
First standard based on proprietary implementations of DOCSIS/HFCarchitecture in wireless domain
8/13/2019 12-Specific System WiMax
25/25
#12 49
IEEE 802.16-Summary
Commonalities with DOCSIS
DOCSIS Not adaptive
Focus on support of IP
Adaptive burst transmissionarchitecture
Targeted for muliprotocol & services
#12 50
References
Eklund, C., et al., IEEE standard 802.16: a technical overviewof the WirelessMAN air interface for broadband wirelessaccess. Communications Magazine, IEEE, 2002. 40(6): p. 98-107.
Ghosh, A., et al., Broadband wireless access withWiMax/802.16: current performance benchmarks and futurepotential. Communications Magazine, IEEE, 2005. 43(2): p.129-136.
Nair, G., et al., IEEE 802.16 Medium Access Control andService Provisioning. Intel Technology Journal, 2004.08(03): p. 213-228.
Ramachandran, S., C.W. Bostian, and S.F. Midkiff,Performance evaluation of IEEE 802.16 for broadband
wireless access. R. Marks, The 802.16 WirelessMAN WirelessMAN MAC:MAC: Its Done, but What Is It?www.ieee802.org/16/docs/01/80216-01_58r1.pdf
W. Stallings Wireless Communications and Networks,Prentice Hall, Second Edition, 2005