158
On Improving Multi-Channel Wireless Networks through Network Coding and Dynamic Resource Allocation by Jin Jin A thesis submitted in conformity with the requirements for the degree of Doctor of Philosophy Graduate Department of Department of Electrical and Computer Engineering University of Toronto Copyright c 2011 by Jin Jin

On Improving Multi-Channel Wireless Networks through ... · PDF fileAbstract On Improving Multi-Channel Wireless Networks through Network Coding and Dynamic Resource Allocation Jin

Embed Size (px)

Citation preview

On Improving Multi-Channel Wireless Networks throughNetwork Coding and Dynamic Resource Allocation

by

Jin Jin

A thesis submitted in conformity with the requirementsfor the degree of Doctor of Philosophy

Graduate Department of Department of Electrical and ComputerEngineering

University of Toronto

Copyright c© 2011 by Jin Jin

Abstract

On Improving Multi-Channel Wireless Networks through Network Coding and

Dynamic Resource Allocation

Jin Jin

Doctor of Philosophy

Graduate Department of Department of Electrical and Computer Engineering

University of Toronto

2011

Multi-channel wireless networks represent a direction that future state-of-the-art fourth

generation (4G) wireless communication standards evolve towards. The IEEE 802.16

family of standards, or referred to as WiMAX, has emerged as one of the most important

4G networks to provide high speed data communication in metropolitan areas. There will

be huge challenges in designing the networking protocols to allow WiMAX to provide high

quality of services. How to effectively control the errors in the wireless channels and how

to efficiently manage the scarce spectrum and power resources in different communication

scenarios are crucial for network performance. This thesis aims to solve these challenges

to improve the performance of multi-channel wireless networks, using WiMAX as a rep-

resentative, through a number of techniques. First, we take advantage of the favorable

properties of network coding, and design the adaptive MAC-layer and symbol-level net-

work coding protocols. They tightly integrate with WiMAX physical and MAC layers,

effectively perform error control, and efficiently utilize scarce wireless spectrum. Second,

we investigate multicast services and the femto-cell architecture in WiMAX, and offer

a cooperative multicast scheduling protocol as well as a cognitive WiMAX architecture

with femto cells. They implement dynamic resource allocation in the networks through

techniques of cooperative communication and dynamic optimization. Evaluated with

rigorous analysis and extensive simulations, our proposed protocols are able to achieve

ii

substantial performance improvement over traditional protocols in the literature.

iii

To my parents

To my fiance, Amber

To praise God for His Love

iv

Acknowledgments

I started my journey of pursuing Ph.D. degree in 2006, and spent 4 years towards this

achievement, full of joy and pains. Throughout this important and precious period of

time, I received tremendous support from a lot of people, with which I am able to keep

the pace and finish the thesis smoothly.

First, I would like to express my sincere appreciation to my thesis advisor, Professor

Baochun Li, for his strong support and insightful guidance for my thesis. He lead my

research from the scratch and always encouraged me to pursue the excellence. He shared

not only his vision and dedication on research, but also the experience of intellectual

curiosity, life attitude, as well as career development, all of which have benefited me

enormously. I also thank to all the professors helping to review my thesis. They are

Professor Ben Liang, Professor Raviraj Adve, Professor Shahrokh Valaee, and Professor

Prasun Sinha. Their valuable comments and suggestions helped greatly improve the

quality of the thesis.

I owe my thanks to all the group members in iQua, who provided generous help on my

thesis. Moreover, we shared joyful and gloom time in graduate studies, and have become

life-time friends. Many thanks to Xinyu. His dedication on research and the spirit of

pursuing best have greatly encouraged me. Chen, I alway remember the delighted time

when we were roommates. We came to Canada at the same time and shared the exciting

experiences of culture shock. I greatly appreciate Henry, my “truly ally,” for his strong

support on my research with countless discussion. I feel we are alway walking side by side.

Yunfeng, I wish to express my gratitude to your kindly help and encouragement during

the time of our job hunting. Many of you, Zimu, Di, Hassan, Elias, Jiahua, Junqi, Yuan,

Professor Wang, and Mea, gave me inspiration on my thesis. Their positive attitude

and enthusiasm have opened my mind. I also wish to give my thanks to the excellent

engineers from LG Electronics Inc., especially Ronny and Taegon who visited iQua during

my Ph.D. program, when we had pleasant collaboration on research. I learned a lot from

v

them on the research methodologies, and we keep long-term collaboration even after they

left Toronto.

I also met many great friends during my Ph.D. endeavor within or outside University

of Toronto who gave me great support, including Lei Duan, Lei Hua, Lei Zhou, Chen

Chen, Haifeng, Dongying, Jiang, Guoli, Raza, Weiwei, Zhengwei, Xiaojun, Fei Wei, Xiang

Cao, Fangming, Hui, and Vivia. I discussed problems, did sports, and hang out together

with them, which made the life colorful and fruitful.

I wish to send my deep love to my fiance and soul mate, Amber, for her love and

support during my journey. Her company, encouragement, understanding and commit-

ment gave me power, joy, direction, and motivation. Most importantly, I wish to express

my greatest appreciation and love to my parents in Beijing. Without their unconditional

love and continuous encouragement, I will never achieve this far. Sincerest thanks to

them from the bottom of my heart. To them this thesis is dedicated to.

Finally and importantly, I thank God for His deep love. Without His guide, I would

be like the lost lamb. I praise the Lord, and glory His name.

vi

Contents

1 Introduction 1

1.1 Background . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1

1.2 Contributions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4

1.2.1 Is Random Network Coding Helpful in WiMAX? . . . . . . . . . 5

1.2.2 Cooperative Resource Management in WiMAX . . . . . . . . . . 7

1.3 Thesis Structure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9

2 Background Overview and Related Work 11

2.1 Introduction to WiMAX . . . . . . . . . . . . . . . . . . . . . . . . . . . 11

2.2 Network Coding in Wireless Networks . . . . . . . . . . . . . . . . . . . . 13

2.2.1 Introduction to Random Linear Codes . . . . . . . . . . . . . . . 14

2.2.2 Random Network Coding in Wireless Networks . . . . . . . . . . 16

2.2.3 Our Work with the Use of Random Network Coding . . . . . . . 18

2.3 Resource Management in WiMAX services . . . . . . . . . . . . . . . . . 19

2.3.1 Multicast Scheduling . . . . . . . . . . . . . . . . . . . . . . . . . 19

2.3.2 Cognitive WiMAX . . . . . . . . . . . . . . . . . . . . . . . . . . 21

3 Adaptive Random Network Coding in WiMAX 23

3.1 How Can Network Coding be Used in WiMAX? . . . . . . . . . . . . . . 25

3.1.1 Single-hop Transmission . . . . . . . . . . . . . . . . . . . . . . . 27

3.1.2 Handover . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28

vii

3.1.3 Multi-hop Transmission . . . . . . . . . . . . . . . . . . . . . . . 29

3.2 MRNC with Adaptive Algorithms . . . . . . . . . . . . . . . . . . . . . . 31

3.2.1 Adaptive Block Size . . . . . . . . . . . . . . . . . . . . . . . . . 32

3.2.2 Adaptive Upstream Node . . . . . . . . . . . . . . . . . . . . . . 34

3.3 Performance Evaluation . . . . . . . . . . . . . . . . . . . . . . . . . . . 36

3.3.1 Single-hop transmission . . . . . . . . . . . . . . . . . . . . . . . 37

3.3.2 Handover . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38

3.3.3 Multi-hop Transmission . . . . . . . . . . . . . . . . . . . . . . . 40

3.4 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42

4 Drizzle: Cooperative Symbol-Level Network Coding in WiMAX 44

4.1 The Design of Drizzle . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45

4.1.1 Basic Operations . . . . . . . . . . . . . . . . . . . . . . . . . . . 46

4.1.2 Adaptive Retransmission . . . . . . . . . . . . . . . . . . . . . . . 48

4.1.3 Cooperative Transmission . . . . . . . . . . . . . . . . . . . . . . 51

4.1.4 Differences from MIXIT . . . . . . . . . . . . . . . . . . . . . . . 57

4.2 Impact of Soft Decision Values . . . . . . . . . . . . . . . . . . . . . . . . 58

4.2.1 Are Soft Values Accurate? . . . . . . . . . . . . . . . . . . . . . . 58

4.2.2 How to Use Soft Values for Error Detection? . . . . . . . . . . . . 60

4.2.3 How Do Soft Values Work in Cooperative Transmission? . . . . . 64

4.3 Implementation Issues . . . . . . . . . . . . . . . . . . . . . . . . . . . . 66

4.3.1 Choosing the Size for Coded Blocks . . . . . . . . . . . . . . . . . 66

4.3.2 Reducing the Overhead of Carrying Coefficients . . . . . . . . . . 67

4.3.3 Computational Complexity and Protocol Overhead . . . . . . . . 69

4.4 Performance Evaluation . . . . . . . . . . . . . . . . . . . . . . . . . . . 70

4.4.1 Simulation Settings . . . . . . . . . . . . . . . . . . . . . . . . . . 71

4.4.2 Single-link Transmission . . . . . . . . . . . . . . . . . . . . . . . 71

4.4.3 Handover . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 74

viii

4.4.4 Multi-hop Transmission . . . . . . . . . . . . . . . . . . . . . . . 76

4.5 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 78

5 Cooperative Multicast Scheduling with Network Coding in WiMAX 80

5.1 Problem Formulation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 81

5.2 Multicast Scheduling Framework . . . . . . . . . . . . . . . . . . . . . . 84

5.2.1 Optimizing Multicast Scheduling . . . . . . . . . . . . . . . . . . 85

5.2.2 Protocol Design . . . . . . . . . . . . . . . . . . . . . . . . . . . . 87

5.2.3 Are Cooperative Communication and Random Network Coding

Helpful? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 88

5.3 Cooperative Multicast Scheduling with Channel Allocation . . . . . . . . 90

5.3.1 Optimizing Performance with Limited Bandwidth . . . . . . . . . 91

5.3.2 Channel Allocation with Channel Reuse . . . . . . . . . . . . . . 94

5.3.3 How efficient are the channels allocated? . . . . . . . . . . . . . . 99

5.4 Cooperative Multicast Scheduling with Power Allocation . . . . . . . . . 100

5.4.1 Maximizing Throughput with Limited Power . . . . . . . . . . . . 100

5.4.2 What’s the Impact of Power? . . . . . . . . . . . . . . . . . . . . 102

5.5 Overhead Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 103

5.6 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 104

6 Resource Management in Cognitive WiMAX with Femto Cells 106

6.1 Network Architecture . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 107

6.2 System Models . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 110

6.2.1 Framework Formulation . . . . . . . . . . . . . . . . . . . . . . . 110

6.2.2 Models of Resource Management . . . . . . . . . . . . . . . . . . 111

6.2.3 Impact of Resource Management and Problem Hardness . . . . . 115

6.3 Resource Management With Stochastic Lyapunov Optimization . . . . . 116

6.3.1 Stochastic Network Model . . . . . . . . . . . . . . . . . . . . . . 117

ix

6.3.2 Resource Management Policies . . . . . . . . . . . . . . . . . . . . 118

6.3.3 Performance Analysis . . . . . . . . . . . . . . . . . . . . . . . . . 120

6.4 Optimization Solution . . . . . . . . . . . . . . . . . . . . . . . . . . . . 125

6.4.1 Generalized EM Algorithm . . . . . . . . . . . . . . . . . . . . . . 125

6.4.2 Complexity Analysis . . . . . . . . . . . . . . . . . . . . . . . . . 127

6.5 Performance Evaluation . . . . . . . . . . . . . . . . . . . . . . . . . . . 127

6.6 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 131

7 Concluding Remarks 132

Bibliography 134

x

List of Tables

3.1 Adaptive Block Size Algorithm. . . . . . . . . . . . . . . . . . . . . . . . 34

3.2 Adaptive Upstream Node Algorithm. . . . . . . . . . . . . . . . . . . . . 37

4.1 Simulation parameters for evaluating Drizzle. . . . . . . . . . . . . . . . 72

6.1 Evaluation of Generalized EM algorithm. . . . . . . . . . . . . . . . . . . 127

6.2 Simulation parameters for evaluating cognitive WiMAX. . . . . . . . . . 128

xi

List of Figures

2.1 WiMAX works in a point-to-multipoint topology. . . . . . . . . . . . . . 12

3.1 The advantage of random network coding in a WiMAX two-way handover

procedure. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30

3.2 A two-hop transmission scenario in WiMAX. . . . . . . . . . . . . . . . . 30

3.3 The advantage of random network coding in WiMAX multi-hop transmis-

sion. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31

3.4 The scenario being used for simulating a WiMAX handover event. . . . . 38

3.5 MRNC vs. HARQ: throughput in a realistic handover case. . . . . . . . . 39

3.6 MRNC vs. HARQ in a large-scale handover scenario: (a) CDF of through-

put. (b) CDF of variance. . . . . . . . . . . . . . . . . . . . . . . . . . . 40

3.7 Practical setting of the multi-hop scenario. . . . . . . . . . . . . . . . . . 41

3.8 MRNC vs. HARQ: throughput in a realistic multi-hop scenario. . . . . . 41

3.9 MRNC vs. HARQ in a large-scale multi-hop scenario. (a) CDF of through-

put. (b) CDF of variance. . . . . . . . . . . . . . . . . . . . . . . . . . . 42

4.1 A simplified block diagram showing the design of Drizzle. . . . . . . . . . 46

4.2 16-QAM (24-QAM) constellation with Gray coding and an example of

detected symbol, 1001. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48

4.3 In Drizzle, only “dirty” blocks are retransmitted to the receiver over a

single wireless link with errors. . . . . . . . . . . . . . . . . . . . . . . . . 49

xii

4.4 The average number of bits retransmitted in a single-link transmission,

when Drizzle is compared with HARQ and SOFT (Woo et al. [74]). Simu-

lations are performed with the environment and settings provided in Sec. 4.4. 51

4.5 Cooperative transmission of coded blocks is possible when the opportunity

of multi-path transmission arises in both handover and multi-hop modes

of WiMAX. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53

4.6 Simulating a WiMAX handover event when an MS moves across the han-

dover region with a constant speed. . . . . . . . . . . . . . . . . . . . . . 56

4.7 The throughput performance of Drizzle over time (80 seconds) in the han-

dover scenario, as a mobile station is moving around in the handover region

randomly. Simulations are performed with the settings provided in Sec. 4.4. 56

4.8 The distribution of soft decision values under BPSK modulation, which is

obtained by transmitting 200,000 bits over Rayleigh fading channel with

a speed of 30km/h. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59

4.9 The selection of SV-thresholds affects the performance of Drizzle. The per-

formance of Drizzle under 4 different SV-thresholds, 77.5%, 52.5%, 27.5%,

and 2.5%, is evaluated to show the importance of SV-threshold selection.

Values in dB are the gains that the best case outperforms the worst case

in the simulation. Simulations are performed with the settings provided

in Sec. 4.4. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62

4.10 The level-threshold affects the delay and throughput performance in Driz-

zle. A higher level-threshold is helpful to achieve higher throughput, but

with a larger delay. On the contrary, a lower level-threshold leads to lower

throughput, but with smaller delays. Simulations are performed with the

settings provided in Sec. 4.4. . . . . . . . . . . . . . . . . . . . . . . . . . 63

xiii

4.11 A comparison of Drizzle’s performance with and without SV normaliza-

tion and adaptation in a cooperative transmission scenario. Two nodes are

sending coded blocks to one receiver using different modulation schemes

(QPSK and 16QAM are used on each sender respectively). The transmis-

sion is under different channel qualities (SNRs), which are generated by

varying the target BERs in a certain range. Simulations are performed

with the settings provided in Sec. 4.4. . . . . . . . . . . . . . . . . . . . . 65

4.12 The selection of block sizes impacts the performance of Drizzle. (a) The

performance of block error rates under 3 different block sizes: 4 bits, 8 bits

and 16 bits. (b) The performance of packet delivery rates (K = 2n) under

a Rayleigh fading channel. Simulations are performed with the settings

provided in Sec. 4.4. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68

4.13 Packet Delivery Rate and Throughput with a range of BERs. . . . . . . . 73

4.14 Throughput in a single, time-varying wireless link with mobility. . . . . . 74

4.15 Throughput comparison in the WiMAX handover scenario. . . . . . . . . 75

4.16 Throughput performance in a large-scale handover scenario. . . . . . . . 76

4.17 Throughput in a realistic multi-hop case. . . . . . . . . . . . . . . . . . . 77

4.18 Throughput performance in a large-scale multi-hop scenario. . . . . . . . 78

5.1 Illustrative examples to show the advantages of cooperative multicast

scheduling with random network coding in WiMAX. The number on each

link in (b) indicates the packet delivery rate from the BS to the MS. . . . 83

5.2 Throughput performance of four multicast scheduling protocols in a realis-

tic WiMAX MBS scenario. Cooperative multicast scheduling with random

network coding is able to achieve substantial throughput improvement by

effectively utilizing the scarce wireless bandwidth. . . . . . . . . . . . . . 90

5.3 Solving the channel allocation problem using maximum weighted bipartite

matching algorithm. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 94

xiv

5.4 The performance of cooperative multicast scheduling with random net-

work coding when the number of cooperative sub-channels is limited. The

protocols with and without channel reuse algorithm are both evaluated. . 100

5.5 The performance of multicast scheduling with our power allocation algo-

rithm in a power-constrained MBS. . . . . . . . . . . . . . . . . . . . . . 103

6.1 An illustrative example of cognitive WiMAX with femto cells. . . . . . . 108

6.2 Average throughput performance of all protocols. . . . . . . . . . . . . . 129

6.3 CDF of throughput variance, which indicates fairness performance. . . . 129

6.4 Performance on the channel utilization improvement. . . . . . . . . . . . 130

6.5 Performance on the buffer backlog. . . . . . . . . . . . . . . . . . . . . . 130

xv

Chapter 1

Introduction

1.1 Background

The Internet has revolutionized the computer and communication world. The research

on packet switching and ARPANET [1] opened the Internet history during 1960s. Since

then, the Internet has experienced dramatic growth. With the proliferation of computer

devices and fast development of Internet applications, such as electronic mail (Email),

World Wide web (WWW), and digital audio/video, the demand on Internet speed grows

rapidly.

Nowadays, most traditional communication media, such as telephone and television

services, are reshaped or redefined using the technologies over Internet, giving rise to

the services such as Voice over Internet Protocol (VoIP) and Internet Protocol television

(IPTV). High speed Internet access is in high demand to support these applications.

Digital Subscriber Line (DSL) is a good solution by providing high speed digital data

transmission normally over a telephone line. Most of the Internet Service Providers (ISPs)

in North America provide DSL services with data throughput ranging from 384 KB/s

to 20 MB/s, depending on the line conditions and service level implementation. Similar

Internet access services can also be provided through television cables. However, such

1

Chapter 1. Introduction 2

technologies rely on the deployment of wired network infrastructure, which significantly

increases the deployment cost. In rural areas and developing countries, this is a huge

barrier to the availability of high speed Internet.

Intuitively, wireless Internet access is a solution by providing data transmission to a

mobile. WiFi, based on the IEEE 802.11 family of standards [7], was invented to provide

high speed wireless Internet access. A Wi-Fi enabled device can connect to the Internet

through an access point (AP) which normally connects to the Internet backhaul using a

wired line. In the last hop, WiFi uses shared wireless spectrum, and the speed can reach

up to 50 MB/s within the range of 100 meters in the latest standard [7]. Although this

rate is quite satisfactory, it can not fully meet the growing requirements. First, WiFi

transmission range is quite limited. The access point is normally deployed at offices, or

particular commercial areas, such as airports and cafeterias. Therefore, it is difficult to

provide ubiquitous connectivities and is not able to fully support mobility. Second, WiFi

still requires the deployment of wired backhaul networks to provide connections to the

access points. Essentially, it does not solve the problems in DSL.

How to provide high speed wireless Internet connection in a large area with full support

of mobility? The intuition is to provide Internet services via cellular networks, referred

to as mobile Internet. Mobile Internet had its beginnings around 1998 with the intro-

duction of WAP [3], then grew rapidly. Early in 2000, the wireless world caught fire with

the launch of the Internet on a mobile phone, as the traditional second generation (2G)

Global System for Mobile Communications (GSM) networks evolved to General packet

radio service (GPRS) and Enhanced Data rates for GSM Evolution (EDGE) [2]. They

are implemented in packet switch domain built on top of cellular telecom networks with

the peak data rate up to a few hundreds kilobytes per second. Starting in 2006, the

communication industry is officially in the evolution to the third generation (3G) wire-

less network technology. There are several competing 3G technologies across the world,

including CDMA2000 1xEV-DO [11], TD-SCDMA [5], HSPA [6], etc. These systems can

Chapter 1. Introduction 3

provide a minimum data rate of 2 MB/s for stationary or walking users, and 384 KB/s

in a moving vehicle. With such access rate, a large number of attractive applications

are developed, such as iPhone Apps, and a large amount of profit is generated in the

industry.

Is this good enough? Currently, the 3G networks still suffer from the low connection

rate with much smaller throughput compared with WiFi networks. The last hop data

rate of current mobile networks is becoming the bottleneck of the applications, such as

VoIP and IPTV on mobile devices which require data rates in megabytes per second.

The next generation (4G) wireless communication technology is proposed to replace

3G technology to provide ultra-broadband mobile Internet access. WiMAX, based on

the IEEE 802.16 family of standards [9], is one of the most important and promising

technologies for future 4G networks, aiming to provide high-rate data transmission in

the metropolitan areas by serving a large number of users. WiMAX heralds the entry of

broadband wireless access as a major new tool in the effort to link homes and businesses

to core telecommunication networks worldwide [15]. Such broadband wireless networks

represent the direction that future state-of-the-art wireless communication standards

evolve.

WiMAX essentially works in a point-to-multipoint fashion, with one base station serv-

ing a number of mobile stations in a certain area. As opposed to previous generations of

wireless Internet technologies, communication between the base station and the mobile

stations is based on the principle of orthogonal frequency division multiplexing/multiple

access (OFDM/OFDMA) [27], a digital multi-carrier modulation scheme using a large

number of closely-spaced orthogonal subcarriers. Multiple access is achieved in OFDMA

by assigning subsets of subcarriers to individual users [15]. This allows simultaneous

low data rate transmissions from several users without generating interference and col-

lision. In the meantime, it also brings lots of other benefits, such as pulsed carrier can

be avoided, shorter delay, and contention based multiple access (collision avoidance) is

Chapter 1. Introduction 4

simplified. Most 4G wireless communication networks adopt OFDMA which essentially

can be considered as multi-channel wireless networks. With these technologies, WiMAX

has great potentials to provide higher quality of services.

This thesis focuses on the study of multi-channel wireless communication networks,

using WiMAX as a representative. We believe the research findings on WiMAX will hold

when applied to other next generation multi-channel broadband wireless networks based

on OFDM/OFDMA, such as 3GPP Long Term Evolution (LTE) [10].

1.2 Contributions

WiMAX is a step towards achieving ultra-broadband mobile Internet in metropolitan

areas. Some desired features in the future WiMAX deployment are: high data rate

(100 MB/s mobile and 1 GB/s fixed), wide range (maximum serving range of 50 km for

each base station), resilience, and robustness [9]. There will be a number of challenges in

WiMAX designs in order to provide such performance. How to fully utilize wireless band-

width and effectively allocate the resources will be very crucial. In this thesis, we focus on

designing new algorithms and protocols to improve the performance of WiMAX systems.

In order to achieve this objective, we adopt network coding, cooperative communica-

tion, and dynamic optimization techniques to perform effective error control, resource

allocation, and communication scheduling. The highlights of the contributions in the

thesis are two folds: first on the research of the fundamental communication scenarios

and protocols by applying network coding techniques; then on the investigation of the

most important services and architectures in WiMAX. The development of these studies

constitutes the flow of the presentation in the following chapters in the thesis, reaching

a complete study on improving the performance of multi-channel wireless networks. The

research findings are summarized as follows:

Chapter 1. Introduction 5

1.2.1 Is Random Network Coding Helpful in WiMAX?

It is common knowledge that errors are inherently present in unreliable wireless channels.

With fixed bandwidth resource, the important challenge to maximize achievable through-

put in WiMAX is to control errors and efficiently utilize the scarce wireless spectrum in

various transmission scenarios, even when unpredictable and time-varying errors exist.

In WiMAX, Hybrid Automatic Retransmission reQuest (HARQ) has been used to pro-

vide reliable data transmission [24]. However, the built-in reliability in HARQ sacrifices

some degree of resilience and efficiency in realistic channels with varying qualities over

time. In addition, in handover and multi-hop transmission modes in WiMAX, a mobile

station is able to establish connections with two or more uplink nodes through different

sub-channels. In these cases, HARQ may not be able to fully utilize the wireless medium,

as it is designed for a point-to-point channel.

With respect to the objective of maximizing throughput and error control, network

coding has been originally proposed in information theory [12], and has since emerged

as one of the most promising information theoretical approaches to improve network

performance. It has been shown that random linear codes using a Galois field of a

limited size are sufficient to implement network coding in a practical network setting

[34]. Network coding has been successfully applied in multi-hop wireless networks to

opportunistically take advantage of multiple routes from the sender to the receiver in

unicast flows [18, 45], and soft decision values from the physical layer are utilized to

perform partial packet recovery when packets are broadcast in a shared IEEE 802.11-

based wireless channel [44]. While the benefits of network coding in 802.11-based wireless

networks are encouraging, would network coding still be helpful in WiMAX?

Unfortunately, in IEEE 802.16 WiMAX — with OFDMA at the physical layer — the

convenience of a shared wireless broadcast channel to perform opportunistic listening no

longer exists. How do we design an efficient error control protocol which tightly integrates

with WiMAX in order to fully utilize the spectrum? In this thesis, we seek to answer

Chapter 1. Introduction 6

these questions by proposing two protocols in WiMAX: MRNC — an adaptive MAC

layer random network coding protocol [39,42], and Drizzle — a cooperative symbol-level

network coding protocol [46].

In the study of MRNC [39,42], we investigate the benefits of random network coding

in three typical WiMAX communication scenarios: single-hop transmission, handover,

and multi-hop transmission. We observe that random network coding, with the favorable

rateless properties, fits WiMAX naturally and is able to improve the system performance

significantly. Thereafter, according to this observation, we have detailed designs on

MRNC with a random network coding algorithm as the cornerstone to optimize the per-

formance. We further tune the protocol with adaptive algorithms in order to achieve

maximum benefits. First, the network coding block size can change adaptively by tun-

ing the tradeoff between block error rate and protocol overhead. The dynamic manner

in which the block sizes are changed to match the channel conditions helps to improve

throughput over unreliable and fluctuating wireless channel conditions. Second, in han-

dover and multi-hop transmission scenarios, we design an “early brake” algorithm in order

to prematurely stop the transmissions of a subset of upstream nodes who serve the single

downstream node. By adapting the number of upstream nodes, we could reduce the over-

head, and therefore fully utilize scarce wireless bandwidth. With these well-developed

designs, we show that the performance of WiMAX can be improved enormously with

MRNC in terms of the throughput and resilience.

Although MRNC is able to provide satisfactory performance, it still suffers from low

throughput under poor channel conditions due to transient errors. In order to have

further improvement, in the next step, we extend the vision by exploring the use of

network coding in the symbol level in WiMAX and exploit the benefits of cooperative

diversity [46]. Drizzle divides each single packet into a number of physical symbols and

performs network coding across the symbols within one packet. With the rateless and

resilience properties of random network coding, Drizzle allows the sender to retransmit

Chapter 1. Introduction 7

a barely sufficient number of symbols that have not been successfully received at the

receiver, and the receiver is able to hold a “bucket” until it is full of correct symbols.

We take advantage of soft decision values at the physical layer to perform effective error

check. Even better, the receiver can receive these symbols from multiple senders, with

their perfect collaboration across, as multi-channel wireless networks create opportunities

of multi-path transmissions. As the size of these symbols is sufficiently small, there would

be minimal waste of wireless bandwidth provided by the physical layer. The error control

can be achieved in a finer granularity. Furthermore, with multiple senders serving a single

user via multiple channels, cooperative diversity can be exploited. The design of Drizzle

incorporates all the benefits above.

With the extensive simulation evaluation, there is no surprise in our intuition: Drizzle

is able to outperform HARQ and related work in the literature by a substantial margin.

We note MRNC and Drizzle can be readily employed in WiMAX system, and we are

able to enable MRNC and Drizzle according to the channel and networking conditions.

This study may lead to the future deployment of random network coding at the MAC

and physical layers of real WiMAX systems.

1.2.2 Cooperative Resource Management in WiMAX

In the second half of this thesis, we study important services and architectures in WiMAX

in order to facilitate WiMAX to provide high quality of services in various working

scenarios. In order to achieve this goal, we utilize dynamic optimization as well as

network coding to perform cooperative resource allocation effectively.

First, we focus on Multicast and Broadcast Service (MBS) system, which has emerged

as the most important wireless infrastructure to broadcast data or digital video in

WiMAX. With the current mandate of MBS, the Base Station (BS) broadcasts or mul-

ticasts data in the downlink using robust modulation and coding schemes to provide

reliable transmissions for all the users, as individual feedback (such as ARQ and HARQ)

Chapter 1. Introduction 8

is not supported in MBS. Such a dependence on using the most robust modulation and

coding schemes to counter the most adverse channel quality among all users leads to the

under-utilization of scarce wireless bandwidth: users with good channel conditions would

not enjoy flow rates that are commensurate with their conditions, as the “least common

denominator” is used to cater to users with poor channel conditions.

In this thesis, we offer a solution of cooperative multicast scheduling by considering

the use of multiple OFDMA channels, multiple hops, and multiple paths simultaneously

[40]. Participating users in the multicast sessions are dynamically enabled as relays and

concurrently communicate with others to supply more data. During the transmission,

random network coding is adopted, which helps to significantly reduce the overhead. We

design practical scheduling protocols by jointly studying the problems of channel and

power allocation on relays. Protocols that are theoretically and practically feasible are

provided to optimize multicast rates and to efficiently allocate resources in the network.

With simulation studies, we evaluate the proposed protocols to highlight the effectiveness

of cooperative communication and random network coding in multicast scheduling with

respect to improving performance.

Second, we investigate the WiMAX architecture with femto cells and study resource

management accordingly. In WiMAX, femto cells are an important cost-effective means

of providing ubiquitous connectivity and critical for WiMAX performance. Users that

reside in femto cells experience increased throughput due to the shorter ranges. However,

traditional WiMAX architectures lack dynamic utilization of spectrum and have inherent

weakness in overlooking the special network characteristics and hence missing the bulk

of channel reuse opportunities. These problems cause the underutilization of the scarce

wireless spectrum. Therefore, there is a compelling need to re-design the resource man-

agement scheme in WiMAX with femto cells in order to achieve satisfactory performance

in WiMAX.

Cognitive radio (CR) [23] has emerged as an important technology to exploit high-

Chapter 1. Introduction 9

degree spectrum reuse, by allowing spectrum sensing and dynamical spectrum access.

Such a technique brings much flexibility and potentially generates benefits if employed

in WiMAX femto cell networks, especially with the proliferation of powerful cognitive

wireless devices as well as the surge of demand on service varieties and qualities in

WiMAX.

In this last part of the thesis, we propose a cognitive WiMAX architecture with femto

cells [41], where the base station and users are equipped with CRs and intelligently ad-

justs power, channel, and other resources to accommodate the entire network ecosystem.

In this new design, we develop an optimization framework for dynamic resource manage-

ment, by jointly employing multi-hop cooperative communication, power control, channel

assignment, primary user protection, buffer management, and fairness, and incorporating

user, channel, and cooperative diversities. To achieve optimality, it is designed based on

stochastic Lyapunov optimization, aiming to take advantage of the radio flexibility and

fully utilize the spectrum. Evaluated by the rigorous analysis and extensive simulations,

the proposed resource management protocol is near-optimal with closed-form bounds,

with which cognitive WiMAX achieves substantial performance improvement.

1.3 Thesis Structure

The reminder of the thesis is structured as follows. In Chapter 2, we present related

work. In Chapter 3, we examine the benefits of network coding in WiMAX and present

the design of MRNC, the adaptive MAC-layer random network coding protocol. In Chap-

ter 4, we further exploit the use of network coding, and describe Drizzle, the cooperative

symbol-level network coding protocol, to further improve the performance of WiMAX.

In Chapter 5, we study the broadcast multicast services in WiMAX, and design practical

scheduling protocols with both theoretical analysis and practical evaluation. In Chap-

ter 6, we introduce the cognitive WiMAX architecture with femto cells and develop an

Chapter 1. Introduction 10

optimization framework to efficiently manage the resources. Finally, we summarize the

thesis and discuss future directions in Chapter 7.

Chapter 2

Background Overview and Related

Work

In this chapter, we introduce the techniques adopted in multi-channel wireless networks

with WiMAX as the representative. We further review the related work on network

coding in wireless networks and resource management techniques in WiMAX. These

techniques serve as the cornerstones in the studies within this thesis. In the meantime,

we describe our study in brief in the context of literature.

2.1 Introduction to WiMAX

WiMAX, based on the IEEE 802.16 family of standards, aims to provide high-rate wireless

communication over wide areas to a large number of users. It not only provides the

traditional cellular network services, but also supports IP-based data communication.

WiMAX works in a point-to-multipoint fashion, where one base station (BS) serves a

number of mobile stations (MS) in a certain area. The topology is shown in Fig. 2.1.

The IEEE 802.16 standard [9] defines the air interface (physical layer) and medium

access control (MAC layer) protocols for a wireless metropolitan area network, intending

to provide high-bandwidth wireless voice and data for residential and enterprise use. In

11

Chapter 2. Background Overview and Related Work 12

Internet

Backhaul Connection

BS

MS

Femto-cell user station MS

MS

Figure 2.1: WiMAX works in a point-to-multipoint topology.

the physical layer, WiMAX is designed to work in the 2-11 GHz range. The asymmet-

rical link structure in WiMAX will enable the subscriber stations to have a handheld

form factor for PDAs, phones, or laptops. The WiMAX physical layer is based on the

OFDM/OFDMA, which is a suitable modulation/access technique for non-line-of-sight

conditions with high data rates. In practice, OFDM signals are generated and detected

using the Fast Fourier Transform (FFT). Multiple access is achieved in OFDMA by as-

signing subsets of subcarriers to individual users [15]. This allows simultaneous low data

rate transmission from several users without interference and collision.

Another important technique in the WiMAX physical layer is Adaptive Modulation

and Coding (AMC) [26]. It is the matching of the modulation, coding and other signal and

protocol parameters to the conditions on the wireless links. Intuitively, the systems turn

Chapter 2. Background Overview and Related Work 13

to use robust modulation and coding schemes when the channel quality is low. On the

other hand, aggressive modulation and coding schemes will be applied when the channel

is in relatively good condition. WiMAX defines seven combinations of modulation and

coding rates that can be used to achieve various trade-offs of data rates and robustness,

depending on channel and interference conditions.

The MAC layer of WiMAX is responsible for supporting Point-to-Multipoint (PMP)

broadband wireless access applications in the scheduling. It is designed to meet the

requirements of very-high-data rate applications with a variety of quality of service (QoS)

requirements. The signaling and bandwidth allocation algorithms in MAC layer have

been designed to accommodate hundreds of terminals per channel. MAC layer protocol

uses a scheduling service to deliver and handle different QoS requirements with different

bandwidth and latency, and thus is flexible and efficient over a vast range of different

data traffic models [15].

Currently, there are two main versions of the standards regarding WiMAX (IEEE

802.16). The early standard is 802.16-2004, which is also known as 802.16d. It refers

to the working party that has developed that standard. It is sometimes referred to as

“Fixed WiMAX,” since it has no support for mobility. The later version is 802.16e-2005,

often abbreviated to 802.16e. It is an amendment to 802.16-2004. It introduced support

for mobility and is therefore also known as “Mobile WiMAX.” Our work mainly focus

on IEEE 802.16e and later standards, which full consideration of the scenarios of user

mobility, handover, and multi-hop.

2.2 Network Coding in Wireless Networks

Ahlswede et al. originally introduced Network coding in [12], and attracted much atten-

tion in both academia and industry [47]. Network coding has become an important and

popular technique in order to improve network performance. The intuition underlying

Chapter 2. Background Overview and Related Work 14

network coding is usually illustrated using the famous butterfly example [12]. The basic

idea inside is that network coding, allowing the routers to mix the bits in forwarded

messages, can increase network throughput. Specifically, [12] showed that having the

routers mix information in different messages allows the communication to achieve mul-

ticast capacity. In recent studies on network coding that are rapidly expanding, it is

well known that random linear codes using a Galois field of a limited size are sufficient

to implement network coding in a practical network setting [34,71]. It has recently been

shown that random network coding is able to significantly improve end-to-end unicast

throughput in multi-hop wireless networks, when implemented above the MAC layer of

IEEE 802.11 [18,45].

2.2.1 Introduction to Random Linear Codes

In random linear codes [22], a data segment (also referred to as a generation or a group

in the literature) is divided into n blocks, denoted as [b1, b2, · · · , bn], each of which has a

fixed number of bytes, referred to as the block size. If the segment size is pre-determined,

the block size k can be directly computed from n. When a segment p is to be transmitted,

the sender randomly chooses a set of coding coefficients [c1, c2, · · · , cn] in the Galois field

(normally in GF(28)), and then produces one coded block x of k bytes: x =∑n

i=1 cibi.

Thus, each coded block is a linear combination of all or a subset of the original

data blocks. The n coding coefficients used to encode original blocks to x are typically

embedded in the header of the coded block [22]. If GF(28) is used, the size of each

coefficient is one byte, thus leading to a total overhead of n bytes per coded block. If the

encoder has the entire original segment when producing coded blocks, we just need to

embed the random seed used to produce the series of coefficients with a known pseudo-

random number generator. This effectively reduces the overhead to just 4 bytes for the

random seed, regardless of the number and the size of the coded block.

Such an encoding process for a coded block essentially constructs a linear equation

Chapter 2. Background Overview and Related Work 15

where the unknown variables are the source blocks, given the coding coefficients ci and

the coded block xi are known. The decoding process of random linear codes on m coded

blocks solves the m linear equations constructed by the encoding process. Clearly, m

should be larger than or equal to n in order to obtain all n source blocks. Decoding fails

if there is linear dependence among the n coded blocks used in decoding.

We also could perform a progressive decoding process using Gauss-Jordan elimina-

tion [65]. Progressive decoding has the favorable property that decoding occurs as coded

blocks are being received, which implies that the decoding time overlaps with the time

required to receive the blocks, and is hidden from the tally of overhead caused by the de-

coding complexity. Gauss-Jordan elimination is also able to immediately discard linearly

dependent blocks that are not useful for decoding, as linearly dependent blocks will lead

to a row of all zeros. Immediately after n independent coded blocks have been received

for a segment, the receiver is able to recover the entire original segment, and sends the

ACK packet back to the sender. With random network coding, the sender could virtually

produce infinite number of coded blocks, which can be referred as a “rateless” property,

which brings resilience.

Independently, there are a number of studies on rateless codes, with LT codes [53] as

a representative, to address the constraints of traditional erasure codes [55,56]. Although

the rateless properties of random network coding are utilized in the related work, it is

different from traditional rateless codes. Network coding mainly conducts recoding in

the intermediate nodes while rateless codes can not used for recoding. By relaxing the

field of operation to a larger finite field, as opposed to LT codes (where a binary field is

used for exclusive-or operations), random linear codes can generate fresh coded packets

even with a subset of data without any constraints on special degree distributions. Thus,

network coding is largely applied to complicated network scenarios, and rateless codes

are mainly used in one-hop communication, such as satellite communication. Further,

rateless codes generate more overhead compared with random linear codes.

Chapter 2. Background Overview and Related Work 16

2.2.2 Random Network Coding in Wireless Networks

The work of Li et al. [50] has shown that random linear codes are sufficient to achieve

the maximum capacity bounds for multicast traffic. Subsequently, the study of random

network coding in wireless networks has been explored in some pioneering papers [25,60].

Most of the literature exploited the benefits by applying random network coding in mul-

ticast traffic of wireless networks, and it has been shown that random network coding

could improve the throughput and minimize the communication cost in the multicast

scenarios. The benefits are mainly due to the broadcast property of the wireless chan-

nel, meaning that a transmission from a node can potentially be intercepted by all its

neighbors. Further, a few papers studied specific unicast topologies showing that random

network coding results in better throughput than pure forwarding [33,51]. These studies

of wireless network coding are mainly based on theoretical analysis.

Aiming to bridge the gap between the theory and practical network design, Katti et

al. proposed COPE [45], a forwarding architecture for wireless mesh networks by insert-

ing random network coding in a practical fashion. In addition to forwarding packets,

routers mix packets from different sources to increase the information content of each

transmission. COPE incorporates three main designs: opportunistic listening; oppor-

tunistic coding; learning neighbor state. Facilitated by these designs, COPE is able to

improve the network performance significantly.

Later on, the research interests shifted to applying network coding to opportunistic

routing in wireless networks. Opportunistic routing is a technique that achieves high

throughput in the face of lossy wireless links, and it allows any node that overhears

the transmission and the nodes which are closer to the destination to forward the re-

ceived data. The major challenge is that multiple nodes may hear a packet broadcast

and unnecessarily forward the same packet. Traditional opportunistic routing protocols,

such as ExOR [16], impose a strict schedule on routers’ access to the medium. Such

a highly structured approach does not allow spatial reuse of bandwidth. Chachulski et

Chapter 2. Background Overview and Related Work 17

al. addressed this problem by applying network coding. They proposed MORE [18], a

MAC-independent opportunistic routing protocol using random network coding running

directly on top of 802.11 without a special scheduler. The routers in MORE randomly

mix the received packets by random network coding, and then forwarded them to the

next hop. This randomness ensures that routers that hear the same transmissions do not

forward the same packets. It is the first implementation of wireless intra-flow random

network coding, demonstrating the practical benefits of mixing packets in a single flow.

With this design, random network coding is widely applied not only to traditional IEEE

802.11, but also to multi-channel wireless networks with some preliminary studies [42,75].

The network coding is mainly applied in MAC layer in these work.

Opportunistic routing capitalizes on sporadic receptions over long links. But long

links are inherently less reliable due to errors and interference, which cause the drop of

most packets in the transmission. Instead of working in the upper layers, it is envisioned

that network coding could reduce interference in wireless networks when applied in the

physical layer. Physical-layer network coding was originally proposed in [77] by Zhang et

al. In contrast to traditional network coding which performs coding on digital bit streams,

physical-layer network coding makes use of the additive nature of simultaneously arriving

electromagnetic waves for an equivalent coding operation. With physical-layer network

coding, signal scrambling due to interference which causes packet collisions in the MAC

layer protocol can be eliminated.

However, the algorithm in [77] assumes symbol-level synchronization, carrier-frequency

synchronization, and carrier-phase synchronization. In practice, it is unlikely that two

signals arrive at the exact same time at the router and incur the same distortion over

the wireless medium. In [43], Katti et al. proposes analog network coding without the

requirement of synchronization. It provides an elegant solution for physical-layer network

coding. Further, Katti et al. continue the study on physical-layer network coding, and

propose MIXIT [44], a protocol for cooperative packet recovery by performing oppor-

Chapter 2. Background Overview and Related Work 18

tunistic routing on groups of correctly received symbols in a packet. It takes advantage

of the broadcast nature of 802.11-based wireless networks and performs random network

coding across correct symbols in different packets.

As random network coding has shown its salient advantages in both physical layer

and upper layers in wireless networks, cross-layer architectures are promising to further

improve the system performance. Woo et al. proposed SOFT [74], a cross-layer design

for recovering faulty packets in WLAN. SOFT works by combining confidence values

across multiple faulty receptions to recover a clean packet using random network coding.

It is shown that SOFT is able to significantly improve the data delivery rate in 802.11-

based networks, in static wireless environments. However, the realistic channel conditions

should be time-varying and bursty. The performance of SOFT under such conditions is

unclear.

2.2.3 Our Work with the Use of Random Network Coding

There is great potential to gain benefits when applying network coding to WiMAX with

multi-channel communication. In this thesis, we seek to investigate the use of random

network coding in WiMAX. In the previous work, the network coding is basically de-

ployed in IEEE 802.11-based networks to take advantage of multiple routes and wireless

broadcast properties. Unfortunately, in multi-channel wireless networks — such as IEEE

802.16 WiMAX with OFDMA at the physical layer — the convenience of a shared wire-

less broadcast channel to perform opportunistic listening no longer exists, and Hybrid

Automatic Repeat reQuest (HARQ) is the predominant error control protocol at the

physical layer [24], rather than plain Automatic Repeat reQuest (ARQ) in IEEE 802.11

MAC. In WiMAX, with OFDMA adopted, there are abundant opportunities for concur-

rent and multi-path transmissions, such as in handover and multi-hop scenarios. The

current protocols do not fit in these scenarios and can not fully utilize the wireless spec-

trum. It is challenging to design efficient protocols to exploit the benefits of network

Chapter 2. Background Overview and Related Work 19

coding in WiMAX.

Different from previous works, in our study, we seek to solve the challenges and spe-

cially design random network coding protocols to tightly integrate with the WiMAX

architecture, by considering its communication characteristics. Specifically, we propose

and design both MAC-layer network coding and symbol-level network coding, named

MRNC and Drizzle respectively. Not only take advantage of the favorable properties

of network coding, they also enable cooperative communication to cater the multi-path

multi-channel transmission opportunities in WiMAX. They fully utilize the scarce wire-

less spectrum and are designed to adapt in realistic channel conditions with time-varying

and bursty errors. With the realistic evaluation and rigorous analysis, we show that our

proposed protocols has indeed offered important performance improvement compared

with previous work in different typical cases within the context of WiMAX.

2.3 Resource Management in WiMAX services

As stated in Chapter 1, we seek to improve WiMAX performance on its key services and

applications. In this thesis, we achieve the performance improvement through the design

of dynamic resource management in WiMAX services. Our studies mainly include the

following two parts.

2.3.1 Multicast Scheduling

IEEE 802.16 WiMAX [9] has employed the Multicast and Broadcast Service (MBS)

system/infrastructure to perform multicasting/broadcasting data or digital video. To

achieve reliability in multicast service, traditional systems in the literature enable the

Base Station (BS) broadcasts or multicasts data in the downlink using robust modulation

and coding schemes without supporting individual feedback (such as ARQ and HARQ).

The CDMA2000 1xEV-DO networks [11] adopt this multicast scheduling scheme. Ap-

Chapter 2. Background Overview and Related Work 20

parently, such a scheme under-utilizes wireless resources as the peers with higher channel

qualities do not enjoy the flow rates that commensurate with their conditions.

As a potential remedial solution, in [32], multicast members are divided into two

groups with different levels of channel qualities. The sender transmits the same copy

of each packet to two groups in two different time slots using different rates which best

fit the channel quality in each group. It has been shown to improve the throughput

performance. However, it is too conservative, especially when the number of users in

poor channel conditions is very small. The sender still has to consume more time for

multicasting the data to them. In [48], Kozat has investigated the optimal multicast rate

by focusing each transmission onto a proper subset of multicast users, rather than trying

to serve all the users at each channel use. It still works on the single-hop shared-channel

scenario, and does not exploit the cooperative diversity in the broadcasting channels.

In [38], Hou et al. attempted to utilize relays to help the users with poor channel

conditions, and the protocol is based on a two-phrase scheduling. It still suffers the same

problems in [32] and does not exploit channel and cooperative diversity in multicast

channels.

In this thesis, we study the multicast scheduling problem in WiMAX from a new

perspective of considering multiple hops, multiple paths, and multiple channels at the

same time, rather than the system models with a single shared channel. This work differs

from the literature in a number of important aspects. First, the proposed protocols rely

on concurrent cooperative transmissions among multicast users via orthogonal OFDMA

sub-channels and hence work in a substantially different system. Second, we propose to

apply random network coding to effectively reduce the overhead and perform coopera-

tive communication. Third, we design our protocols by solving optimization problems

formulated to maximize the throughput performance. Finally, we specifically study the

resource allocation problems in cooperative multicast scheduling, which are critical in

practical systems.

Chapter 2. Background Overview and Related Work 21

2.3.2 Cognitive WiMAX

Current wireless networks are governed by a fixed spectrum assignment policy. Such

an allocation is often provisioned on a long term basis and leads to under-utilization of

spectrum resources. Measurements show that only about 10 − 15% of the spectrum is

utilized in the US [4]. In contrast to the sporadic spectrum usage in licensed bands, the

recent years have witnessed a proliferation of wireless devices crowding into the unlicensed

spectrum regime. They interfere with each other and degrade the overall performance

significantly. To address this inefficiency, major efforts are undertaken to allow unlicensed

devices to operate on licensed bands that are not being used by licensed users, referred

to as “white spaces.”

Cognitive radio networks (CRNs) [23] have emerged in recent research to efficiently use

white spaces by unlicensed devices [14]. It is a revolution in radio technology to efficiently

utilize the wireless spectrum. With cognitive radio, either a network or a wireless node

can change its transmission or reception parameters to communicate efficiently avoiding

interference with licensed or unlicensed users. This alteration on the parameters is based

on the active monitoring of several factors in the external and internal radio environment,

such as radio frequency spectrum, user behavior, and network states. Such dynamic

spectrum access (DSA) technology [78] is the key function in cognitive radio. With

such convenience, the wireless nodes can dynamically adjust the frequency, power, range,

and other variables to accommodate the entire wireless ecosystem, in order to efficiently

utilize the wireless spectrum.

As we stated in Chapter 1, WiMAX is an popular technology to facilitate broadband

wireless mobile access in metropolitan area [26]. As the proliferation of WiMAX mobile

devices as well as the surge of demand of bandwidths, it is crucial to dynamically utilize

the “white spaces” in order to improve the service quality. In WiMAX, femto cells

are a cost-effective means of providing ubiquitous connectivity. At the same time, this

structure provides abundant opportunities for channel reuse. Thus, it is potential to

Chapter 2. Background Overview and Related Work 22

take advantage of the favorable properties of both WiMAX and CR techniques. In our

thesis, we investigate the benefits of their collaboration, and propose a cognitive WiMAX

architecture with femto cells as well as an optimized resource management protocol.

The related research is barely explored in the literature. The only literature we

can find is [49] which introduces the concept of Cognitive WiMAX. However, our work

radically differs from it in a number of aspects. First, we study cognitive WiMAX

with femto cells employed, which provide potential for spectrum reuse and represent

the direction that WiMAX evolves to [26]. [49] only studies regular WiMAX scenarios.

Second, we advocate cooperative and multi-path multi-channel communication, which is

more efficient and hence works in a substantially different architecture. Third, we propose

a location-aware resource management protocol with cross-layer designs, while [49] just

uses CRs to perform channel sensing without DSA. Last but not least, we specifically

provide a rigorous analysis on network performance, which is not discussed in [49].

Chapter 3

Adaptive Random Network Coding

in WiMAX

As we stated in Chapter 1 and 2, errors are inherently present in the wireless channels,

especially when unpredictable and time-varying errors exist in WiMAX. It is important

to perform error control in order to effectively maximize achievable throughput and

efficiently utilize the wireless spectrum.

In WiMAX, Hybrid Automatic Retransmission reQuest (HARQ) has been used to

provide reliable data transmission [24] with error control. It is a variation of the ARQ

error control protocol, and combines ARQ and Forward Error Correction (FEC). Its

performance, especially in the context of WiMAX, has been thoroughly investigated in

an information-theoretic fashion [20, 70]. In Type-II HARQ, its performance can be

further improved by packet soft combining, including Chase Combining (CC) [19] and

Incremental Redundancy (IR) [66], both of which help to increase the probability of

successful decoding.

Without a doubt, HARQ incurs some overhead in terms of the redundant traffic,

with its retransmissions and ACK/NACK packets. The build-in reliability in HARQ

sacrifices some degree of resilience in realistic channels with varying qualities over time.

23

Chapter 3. Adaptive Random Network Coding in WiMAX 24

Most existing literature on the performance of HARQ [17, 30, 59] has not taken such an

issue into consideration. In addition, in handover and multi-hop transmission modes in

WiMAX, a mobile station is able to establish connections with two or more uplink nodes

through different sub-channels. In these cases, HARQ may not be able to fully utilize the

wireless medium, as it is designed for a point-to-point channel. As HARQ is performed

on all the links, it may incur additional overhead and delays.

On the other hand, as we stated in Chapter 2, network coding has emerged as one of

the most promising information theoretic approaches to improve network performance,

especially in IEEE 802.11 based wireless networks. Is random network coding beneficial

in WiMAX as WiMAX works in a totally different architecture? As the first step in

the thesis, in this chapter, we investigate the deployment of random network coding

in WiMAX MAC layer. In the first half of this chapter, we evaluate the benefits of

random network coding by introducing a MAC-layer protocol, referred to as MRNC,

as compared to traditional HARQ. We show that random network coding has indeed

helped to improve the performance significantly in three typical communication scenarios

in WiMAX: single-hop transmission, handover, and multi-hop transmission.

With this observation, in the second part of this chapter, we tune the design of MRNC

by introducing two adaptive algorithms to further improve the performance. First, we

exploit the flexibility present at the MAC layer for construction and transmission of

the MAC layer packet, which is also the basic transmission unit in random network

coding, referred to as block or coded block. We seek to change the block size adaptively

by tuning the tradeoff between block error rate and protocol overhead. A heuristic

feedback-based approach is employed in the algorithm by estimating the channel quality

using average block error rate as the metric. The dynamic manner in which the block

sizes are changed to match the channel conditions helps to improve throughput over

unreliable and fluctuating wireless channel conditions.

Second, we study how to further utilize the bandwidth with network coding in han-

Chapter 3. Adaptive Random Network Coding in WiMAX 25

dover and multi-hop scenarios, where the mobile station is able to communicate with two

or more upstream nodes simultaneously. When the mobile station completely receives a

data segment, it will send the feedback to all upstream nodes to stop the current trans-

mission and invoke the transmission of the next segment. However, the upstream nodes

push redundant blocks to the receiver due to the delay of feedback transmission. We

design an algorithm for the mobile station to send the feedback even before it has com-

pletely received the segment, in order to prematurely stop the transmissions of a subset of

upstream nodes for this segment. By adapting the number of upstream nodes, we could

reduce the amount of overhead, and therefore fully utilize scarce wireless bandwidth.

With well-tuned designs, we show our proposed protocol tightly integrates with

WiMAX and offers salient performance improvement as evidenced in our simulation

evaluation.

3.1 How Can Network Coding be Used in WiMAX?

In order to observe how helpful random network coding can be in WiMAX, we first design

a protocol framework to employ random network coding in the MAC layer of WiMAX.

Such a MAC-layer Random Network Coding protocol, henceforth referred to as MRNC

for brevity, is designed to fairly evaluate the usefulness of random network coding in

WiMAX.

In random network coding [22], a data segment p (also referred to as a generation

or a group in the literature) is divided into n equal blocks, denoted as [bp1, b

p2, · · · , bp

n],

each of which has a fixed number of bytes, referred to as the block size. If the segment

size is pre-determined, the block size k can be directly computed from n. In MRNC,

the basic data segment can be a MAC packet (i.e., the MAC-layer Protocol Data Unit

(MPDU) in WiMAX), if the block size is sufficiently small to be accommodated. When

the segment p is to be transmitted, the sender randomly chooses a set of coding coefficients

Chapter 3. Adaptive Random Network Coding in WiMAX 26

[cp1, c

p2, · · · , cp

n] in the Galois field GF(28), and then produces one coded block x of k bytes:

x =∑n

i=1 cpi b

pi .

Thus, each coded block is a linear combination of all or a subset of the original

data blocks. The n coding coefficients used to encode original blocks to x are typically

embedded in the header of the coded block [22], leading to a total overhead of n bytes

per coded block. In MRNC, however, since the sender has the entire original segment

when producing coded blocks, we just need to embed the random seed used to produce

the series of coefficients with a known pseudo-random number generator. This effectively

reduces the overhead to just 4 bytes for the random seed. In MRNC, the sender keeps

transmitting coded blocks from the current segment, until an ACK is received from the

receiver. Upon receiving the ACK, the sender proceeds to process the next segment. In

WiMAX downlink communication, for example, the base station (BS) or relay station

(RS) serves as the sender.

For each packet it receives, the receiver uses a progressive decoding process using

Gauss-Jordan elimination [65], as we stated in Chapter 2. It helps to make the decoding

time invisible at the receiver side, and effectively check the linear dependency of all the

received blocks. Immediately after n coded blocks have been received for a segment, the

receiver is able to recover the entire original segment, and sends the ACK packet back to

the sender. In WiMAX downlink communication, for example, the receiver is typically

the mobile station (MS) or the relay station (RS).

Random network coding serves as the cornerstone in the design of MRNC, and is

instrumental towards most of its advantages over HARQ. In this section, we present

intuitive justifications with respect to how network coding is used in MRNC. We show

that random network coding is indeed helpful, as compared with HARQ in practical

WiMAX systems, in the context of three different scenarios: single-hop transmission,

handover, and multi-hop transmission.

Chapter 3. Adaptive Random Network Coding in WiMAX 27

3.1.1 Single-hop Transmission

In HARQ IR, information is first coded and punctured according to a specified punc-

turing scheme. The sender transmits only the systematic bits at first, and transmits

one redundancy packet when it receives negative feedback from the receiver. Packet soft

combining is performed upon receiving redundancy packets at the receiver side. This

procedure is continued until the packet is correctly decoded or the maximum number of

retransmissions is reached.

As described above, HARQ incurs some overhead in terms of the redundant traffic,

with its retransmissions and ACK/NACK packets. In WiMAX systems, the MS may have

high degree of mobility, leading to a fluctuating channel quality over time. ACK/NACK

packets may also incur errors and delay due to poor channel conditions. Such errors and

losses in ACK/NACK packets may lead to additional redundant packet transmissions

that may be unnecessary, triggered by the ARQ timeout. In addition to the overhead,

the build-in reliability in HARQ sacrifices some degree of resilience in realistic channels

with varying qualities over time. It may also cause the problem of transmission continuity

due to packet loss (after several retransmissions, the receiver will give up on the packet

that still could not be decoded).

In contrast, random network coding offers an elegant and simple solution to these

challenges. With the rateless property of random linear codes, MRNC is able to adapt

the rate of data transmission to coincide with the available bandwidth in time-varying

wireless channel conditions. With MRNC, the sender keeps on transmitting coded blocks,

and the receiver only needs to “hold a bucket” to “collect” sufficient number of linearly

independent blocks, such that it is able to recover the original data segment. It is not

necessary for the receiver to transmit ACK/NACK packets with each individual coded

block, and for the sender to transmit redundant packets when errors occur. Intuitively,

MRNC is able to offer resilient transmissions due to the inherent resilience to errors with

random linear codes. Should a particular coded block be lost, subsequent coded blocks

Chapter 3. Adaptive Random Network Coding in WiMAX 28

received are equally innovative and useful.

3.1.2 Handover

Handover is an essential functionality in WiMAX for dealing with user mobility, which

is a process where a mobile station migrates from the air-interface of one base station

to the air-interface provided by another base station. Recently, IEEE P802.16e/D4 [26]

adopted soft handover schemes, such as Macro Diversity Handover (MDHO).

For mobile stations that support MDHO, they maintain an active set of base stations

that are involved in MDHO. When the signal strength from a certain base station is

above a particular threshold (H Add), this base station will be added into the active set

of the mobile station. On the other hand, a base station will be removed from the active

set if the power is below the drop threshold (H Delete). With this mechanism, a mobile

station updates the active set periodically using the signal strength as the metric. In the

handover region, the mobile station associates to all base stations in the active set, and

establishes downlink connections with these base stations through separate downlink sub-

channels. Uplink communications are established through the same uplink sub-channel

to all base stations that are associated to the mobile station. Such uplink data from the

mobile station will simultaneously be relayed by the base stations to an access gateway

(AG), which connects to all base stations as a cross router.

In the traditional approach with HARQ, in the downlink, the transmission should

be synchronized by having two or more base stations sending the same MAC PDUs to

the mobile station in the same time epoch. Otherwise, diversity combining could not

be performed. Thus, the base stations that are newly involved in the active set have to

negotiate with existing base stations, with respect to which packets should be transmitted

next. To achieve this synchronization, if some packets to be sent are already in the buffer

of existing base stations, they should be shared by newly added base stations through

AG, or the new base stations have to wait until they are sent. It will delay the data

Chapter 3. Adaptive Random Network Coding in WiMAX 29

transmission from the newly involved base stations. Moreover, the requirement that

the same packets are to be transmitted by all base stations through different downlink

sub-channels will underutilize the wireless medium.

Intuitively, random network coding is helpful to take full advantage of the available

bandwidth from each base station, and to improve downlink transmission rates. With

random network coding, the synchronization efforts can be avoided, since all coded blocks

are considered equally innovative. In this mode, each sub-channel can be used separately

for transmitting different coded blocks simultaneously without collision. In this case,

all sub-channel resources can be fully utilized, which coincides with the advantage of

network coding in typical cases of multi-path communication.

We show the intuition behind the advantage of random network coding in a two-way

handover procedure with an example, shown in Fig. 3.1. After the mobile station enters

the handover region, it connects to both base stations, each through a unique sub-channel

scheduled by each base station. Encoding is implemented at AG, and different linearly

independent coded blocks are issued to the two base stations simultaneously. The base

stations then relay these coded blocks to the mobile station concurrently. The mobile

station collects these coded blocks from both base stations, and responds with an ACK

through the common uplink channel once it has received a sufficient number of linearly

independent coded blocks. In this fashion, random network coding helps to fully utilize

the downlink channels from both base stations.

3.1.3 Multi-hop Transmission

In the scope of the IEEE 802.16j standard of WiMAX, the concept of a relay station (RS)

is introduced, with a mandatory two-hop transmission mode and an optional multi-hop

mode. Fig. 3.2 shows an example of a simple two-hop relay system. When the MS moves

into the overlap region of both BS and RS, the MS is able to communicate directly with

BS, indirectly with BS via RS, or with both.

Chapter 3. Adaptive Random Network Coding in WiMAX 30

BS1 BS2MS

R1 R2 R3 R4

Access Gateway

Figure 3.1: The advantage of random network coding in a WiMAX two-way handover

procedure.

In a HARQ scheme that is proposed specifically for the multi-hop mode in WiMAX,

RS performs as an assisted relaying node, by monitoring the HARQ burst transmitted

by BS to MS. If the RS can decode the HARQ burst correctly and the MS fails to receive

the HARQ burst, the RS retransmits it to MS. The BS receives ACK/NACK packets

from RS and MS separately. If the BS receives an NACK packet from both RS and MS,

it will transmit the HARQ burst to both RS and MS again. If the BS receives an ACK

from RS and an NACK from MS, it will ask RS to retransmit the HARQ burst to MS.

In this procedure, HARQ will be performed in the transmission links between BS and

RS, BS and MS, and RS and MS, respectively.

RS

MS

BS

Figure 3.2: A two-hop transmission scenario in WiMAX.

Chapter 3. Adaptive Random Network Coding in WiMAX 31

From this description, we may observe that the retransmissions in HARQ are per-

formed on all the links among the BS, RS, and MS, which may cause additional overhead.

Similar to the case of handover, the available resources in these channels are not fully

utilized. In comparison, the multi-path advantage of random network coding is also

beneficial in this scenario. Extended from the handover case, all base stations and relay

stations with a signal strength above H Add are maintained in the active set of the mobile

station, with weaker stations eliminated from the set periodically. With random network

coding, the MS is able to receive coded blocks from different paths establishing connec-

tions with all base and relay stations with acceptable signal strengths, through which

different coded blocks are transmitted concurrently. All transmission sub-channels can

be fully utilized to increase the throughput, as all received coded blocks are equally use-

ful. Neither synchronizations nor retransmissions are required. The examples shown in

Fig. 3.2 and Fig. 3.3 explains the intuition behind such an advantage of random network

coding.

BS/RS

RS1 RS2 RS3

MS1 MS2 MS3

Figure 3.3: The advantage of random network coding in WiMAX multi-hop transmission.

3.2 MRNC with Adaptive Algorithms

The design of MRNC should take full advantage of network coding and tightly integrate

with WiMAX architecture and working scenarios. Equipped with random network cod-

Chapter 3. Adaptive Random Network Coding in WiMAX 32

ing at the core of MRNC, there are some challenges in the design, including what is an

appropriate size of a coded block as we perform network coding in the MAC layer? and

How to schedule the upstream nodes cooperatively serve the downstream nodes simulta-

neous in multi-path transmission scenarios? The solutions are critical to the protocol

efficiency. In this section, we seek to answers these questions above by tuning the design

of MRNC. We propose two adaptive algorithms — adaptive block size and adaptive up-

stream node to further improve the performance. They are based on heuristic study with

simulation analysis.

3.2.1 Adaptive Block Size

First, we study the selection of packet size, which plays a crucial role in WiMAX through-

put performance. At the MAC layer, the packet is considered as a MAC layer Protocol

Data Unit, which is also the basic transmission unit in MRNC, referred to as block or

coded block. We can simply represent the throughput under MRNC as R(1−Pe), where R

is the channel rate, and Pe denotes the block error rate, since blocks are often corrupted

during transmission in error prone wireless channels. It is noted that under the same bit

error rate, a decreasing block size would decrease the block error rate as well. Similarly,

it can be argued that if the block size increases, the resulting block error rate increases

as well.

Based on the intuition above, we can see that a smaller block is helpful to achieve

a lower block error rate. Of course, the flip side of the coin is the lower transmission

efficiency due to a lower payload to protocol overhead ratio. On the other hand, a larger

block size achieves better efficiency, but leads to a higher block error rate. Thus, we

observe that both large and small block sizes have their advantages and disadvantages

in MRNC.

The natural question that arises is: how do we adjust the block size to obtain better

performance? We propose an algorithm, referred to as adaptive block size, to dynamically

Chapter 3. Adaptive Random Network Coding in WiMAX 33

construct and transmit the blocks in MRNC. Throughout the chapter, we focus on the

throughput with only the useful bits transmitted per unit of time, excluding the protocol

overhead, which captures the throughput performance more precisely and is helpful to

show the benefits of our proposed algorithms.

Intuitively, we are able to adaptively tune the block size in response to the channel

conditions in order to improve the actual throughput. Study on dynamic block size in

sensor networks has been performed [31]. At the MAC layer, WiMAX is capable of

performing aggregation and fragmentation of MAC layer data units [26], with which we

could vary the block size in MRNC. Heuristically, when the channel quality becomes

high, we increase the block size. The larger the block size is, the less overhead the MAC

header achieves while maintaining that very few redundant coded blocks are sent. On

the other hand, we could manage to raise the throughput by decreasing the block size

under poor channel conditions. The smaller block size could help to obtain a lower block

error rate, thus fewer redundant coded blocks are required to transmit.

We design a feedback-based scheme to achieve such block size adaption. In MRNC,

after the receiver completely receives the entire segment, it will send feedback to the

sender to stop the current transmission, and invoke the transmission of the next segment.

With this feedback, the receiver could explicitly report the channel state information

based on the transmission of the coded blocks of the entire segment. We use the average

block error rate achieved in the transmission as the metric. With such knowledge, the

sender is able to dynamically adjust the block size and construct coded blocks for the

transmission of the subsequent segment.

A heuristic approach is adopted for this adaptive algorithm in our design. First, we

establish a finely tuned feedback granularity to represent different channel states which

indicate different levels of average block error rates. We propose six types of feedback,

shown in Table 3.1, each of which identifies one of the states of the transmission quality.

Upon receiving feedback from the receiver, the sender could tune the block size ac-

Chapter 3. Adaptive Random Network Coding in WiMAX 34

Table 3.1: Adaptive Block Size Algorithm.

Feedback type Block error rate Block size change

1 < 5% +75 bytes

2 < 10% & > 5% +50 bytes

3 < 20% & > 10% -25 bytes

4 < 40% & > 20% -50 bytes

5 < 90% & > 40% -75 bytes

6 > 90% -100 bytes

cording to the type of the feedback. The changes in block size accordingly are shown in

third column in Table 3.1, where for instance, “+50” implies the algorithm will increase

the block size by 50 bytes, and “-25” implies to decrease the size by 25 bytes. With this

adaptive block size algorithm, we are able to dynamically change the block size to adapt

to the fluctuating channel conditions, which will lead to higher throughput.

3.2.2 Adaptive Upstream Node

In WiMAX handover and multi-hop modes, the mobile station (MS) could build con-

nections with two or more upstream nodes through different sub-channels to enjoy the

multi-path transmission. In MRNC, random network coding is helpful to make full use

of the available bandwidth from each upstream node, and thus to improve the downlink

throughput. During the transmission, upon receiving a sufficient number of coded blocks,

MS could decode the original segment immediately, and send feedback to all upstream

nodes to stop their current transmission, and ask them to proceed to the next segment.

The problem in the current design is that the delay of feedback transmission will

cause more redundant coded blocks to be pushed to the receiver. We define the feedback

delay as the time difference between the time the last bit of the last coded block (after

receiving this block, the entire segment could be decoded correctly by the receiver) is

Chapter 3. Adaptive Random Network Coding in WiMAX 35

transmitted and the time a feedback packet is received by the senders.

Assume that at time t, the last bit of the final innovative coded block is received.

The segment could therefore be decoded at time t and all upstream nodes receive the

feedback at time t + D, with D equal to feedback delay. Without explicit knowledge,

during the time period from t to t + D, all upstream nodes continue their transmission

of the coded blocks of the segment that has already been correctly received by MS. In

the best case, the transmission of the next block is in progress while the feedback arrives.

Upon receiving it, the upstream nodes could only switch to the transmission of the next

segment after finishing the redundant transmission of the current block. We can do a

back-of-an-envelope calculation. If the block size is 256 bytes, and there are 4 upstream

nodes communicating with the MS concurrently. Thus, totally 256×4 = 1K bytes in total

will be dropped. If we further consider a large-scale WiMAX network with high speed

data transmission and with a large number of mobile nodes being served concurrently, it

becomes obvious that the scarce wireless bandwidth is under-utilized due to the deficiency

of the protocol. Moreover, the situation will be even worse when a larger feedback delay

is unavoidable. As such, mitigating the effect of feedback delay and fully utilizing the

wireless bandwidth should be critical design objectives.

To solve the above problem, we propose an algorithm by adapting the number of up-

stream nodes, referred to as adaptive upstream node, to effectively utilize the bandwidth.

This algorithm enables the MS to send feedback before it has completely received all the

coded blocks for decoding the segment. Therefore, the upstream nodes are able to pre-

maturely stop when segment downloading is almost completed. This adaptive upstream

node algorithm is designed to favor upstream nodes with better bandwidth to complete

the download, and stop the upstream nodes with lower data rates. It will gradually stop

more nodes based on the completion timing estimation in the transmission process, in

order to avoid the transmission of redundant packets.

We design a heuristic approach for such an algorithm. When 3/4 coded blocks from

Chapter 3. Adaptive Random Network Coding in WiMAX 36

a segment are successfully received, the MS could stop the upstream nodes with the

lowest throughput. The number of upstream nodes to be prevented is one half of the

nodes associated to the MS. Upon receiving the feedback, these nodes will stop the

transmission of the current segment, but start to transmit the coded blocks of the next

segment. If the entire data transmission is completed, the connections will be released,

and the bandwidth may be reallocated. Meanwhile, the remaining upstream nodes with

higher throughput shall keep transmitting the coded blocks from the current segment.

After finishing the transmission for 7/8 coded blocks, the MS will only maintain 1/4 of

the connections with the highest throughput.

We tune the design of the algorithm to further improve bandwidth utilization. At the

same time that MS sends feedback to a certain set of upstream nodes when 7/8 coded

blocks are received, the feedback is also sent to the remaining 1/4 upstream nodes to

inform them that the transmission for the current segment is almost done. Upon receiving

this signal, they take turns to transmit the coded blocks from the current segment and

from the next segment. Consider the scenario when the last coded block from the current

segment is transmitted, the following data block to be sent should be the block for the

next segment. Normally when feedback arrives after feedback delay, the transmission of

blocks from the next segment has already been started, which is useful. Thus, the wasted

bandwidth is reduced. The entire heuristic algorithm is summarized in Table 3.2.

3.3 Performance Evaluation

We are now ready to resort to extensive simulations to study the performance of MRNC

in WiMAX, as compared to HARQ. For this purpose, we implement our protocol designs

stated above in this chapter in the MAC layer of the WiMAX module, which is part

of a specific ns-2 simulator released by the WiMAX forum and is the only simulator

for WiMAX that is available to be used in both academia and industry. We have used

Chapter 3. Adaptive Random Network Coding in WiMAX 37

Table 3.2: Adaptive Upstream Node Algorithm.

Conditions Actions

received 3/4 coded blocks stop 1/2 of upstream nodes with the lowest throughput, and

ask them to transmit blocks from the next segment

received 7/8 coded blocks stop another 1/4 of upstream nodes with the lowest through-

put, and ask them to transmit blocks from the next segment

received 7/8 coded blocks the remaining 1/4 of upstream nodes take turns to transmit

blocks from two segments

received all coded blocks all upstream nodes transmit the blocks of the next segment

convolutional turbo codes (CTC), which have been employed in WiMAX. The packet

error rates in the additive white Gaussian noise (AWGN) model are obtained through

extensive simulations based on the technical specification document [26]. With respect

to parameter settings in our simulations, the ARQ retransmission timeout period is set

to be 0.05 milliseconds. In HARQ, we set the maximum number of retransmissions to be

4, and the corresponding optimal size of redundancy packets based on the results in [21].

3.3.1 Single-hop transmission

We first focus on the throughput performance in single-hop transmission. Both protocols

are used to transfer a large file in downlink over 1000 seconds between the same sender

and receiver pair. For the sake of a fair comparison, the transmission rate is set to be 25

Mbps for both MRNC and HARQ. As a starting point, we first carry out our experiments

under stable channel conditions. From the results, we observe that MRNC has managed

to achieve a higher average throughput than HARQ with margin of 18% in average.

Although the observed throughput improvement of MRNC over HARQ is quite en-

couraging under stable channel conditions, we believe that realistic channel conditions

vary over time, sometimes quite significantly. In such time-varying channel conditions, a

Chapter 3. Adaptive Random Network Coding in WiMAX 38

superior protocol needs to be resilient to channel condition fluctuations, and deliver not

only a high average throughput, but also small variance in throughput over time (referred

to as variance). To evaluate MRNC and HARQ in time-varying channel conditions, we

utilize Jakes channel files with a velocity of 40 km/h so that the received per-packet

SNR values may vary over time. We perform the simulation over 1000 seconds. The re-

sults have clearly shown that MRNC delivers 50% less variance in throughput over time

than HARQ, which is desirable in WiMAX with realistic channel conditions. We have

also calculated the average throughput, with the verdict that MRNC enjoys a 10% gain

over HARQ. These results verify the advantages of random network coding in single-hop

transmission.

3.3.2 Handover

We next try to identify the performance gain offered by random network coding in the

handover case in WiMAX, as compared to HARQ. Our evaluation is performed under

the following realistic scenarios. A total of 19 BSs are deployed in the service area. The

cell sites are layout as shown in Fig. 3.4. A constant downlink channel rate (25 Mbps) is

allocated to the MS for each sub-channel from the BSs it attaches.

A

No handover region

Handover region

B

Figure 3.4: The scenario being used for simulating a WiMAX handover event.

In the simulation, the MS is allowed to move around in the service area. Its initial

Chapter 3. Adaptive Random Network Coding in WiMAX 39

speed (in km/h) and direction (in degrees) are generated with a uniform distribution

of U [10, 50] and U [0, 360], respectively. The MS changes its speed and direction after a

certain amount of time with an exponential distribution, with a mean value of 1 minute.

The new speed is uniformly generated with U [10, 50] if the current speed is below 10

km/h; otherwise, it is obtained using U [v − 10, v + 10], where v is the current speed.

The new direction is obtained from a Gaussian distribution with the mean as the current

direction, and a standard deviation of 40 degrees. The initial location of the mobile

station is randomly chosen in the handover region.

0 500 1000 1500 20000

5

10

15

20

25

30

time (second)

thro

ughput (M

bps)

MRNC

HARQ

Figure 3.5: MRNC vs. HARQ: throughput in a realistic handover case.

Fig. 3.5 shows the downlink throughput of both protocols on the MS through a 2000-

second simulation. The improvement of the average throughput with MRNC is proxi-

mately 65%. MRNC also outperforms HARQ with respect to the throughput variance

over time with 67% gain. These improvements are more substantial than those in the

single-hop case, which coincides with our intuition that network coding fits naturally in

the handover case.

With the objective of becoming even more realistic, we seek to extend our performance

evaluation to a large scale scenario. In the cellular system described previously, we set

a large number of MSs active in the service region concurrently. The arrival process of

new MS connections in each cell is assumed to be a Poisson process with a mean of 5

Chapter 3. Adaptive Random Network Coding in WiMAX 40

connections/cell/second. The MS active time duration is exponentially distributed with

a mean of 100 seconds. Every active MS is moving around the service area using the

same way as the previous simulation. We run the simulation for 1000 seconds, and the

downlink throughput at the MS is examined. From the results, there are a total of 94880

MSs that have ever been active in the service area during the simulation time, with

450 MSs active simultaneously in each cell on average. Fig. 3.6 plots the CDF of the

average throughput and its variance, considering all active MSs in the simulation. Not

surprisingly, MRNC outperforms HARQ by 40% with respect to both average throughput

and variance, due to its effective use of bandwidth and the inherent resilience of random

network coding.

0 100 200 3000

0.2

0.4

0.6

0.8

1

Throughput (Kbps)

Cum

ulat

ive F

ract

ion

of M

Ss

MRNCHARQ

(a)

0 50 100 1500

0.2

0.4

0.6

0.8

1

Variance (Kbps)

Cum

ulat

ive F

ract

ion

of M

Ss

MRNCHARQ

(b)

Figure 3.6: MRNC vs. HARQ in a large-scale handover scenario: (a) CDF of throughput.

(b) CDF of variance.

3.3.3 Multi-hop Transmission

Finally, we illustrate the synergy between network coding and the WiMAX multi-hop

mode. We evaluate the performance in a practical setting of the multi-hop case, by

considering the benefit of multi-path transmission. Our simulation scenario is shown in

Fig. 3.7. In order to extend the coverage area of the cell, the RSs are placed within the

border of the radio ranges of BSs.

Chapter 3. Adaptive Random Network Coding in WiMAX 41

BS

RS

Figure 3.7: Practical setting of the multi-hop scenario.

The MS in the simulation receives downlink data either directly from RS or BS, or

from both. A similar evaluation is performed with the same setting as our simulation in

the first handover case. We observe from the results that MRNC gains a 36% throughput

improvement and a 70% variance improvement, as shown in Fig. 3.8. This coincides with

our intuition and is not a surprise: it shows the ability of random network coding to fully

utilize available wireless spectrum in the multi-hop case.

0 500 1000 1500 20005

10

15

20

25

time (second)

thro

ug

hp

ut

(Mb

ps)

HARQ

MRNC

Figure 3.8: MRNC vs. HARQ: throughput in a realistic multi-hop scenario.

Finally, we consider the case of a large-scale multi-hop network, with the same sim-

ulation setup as in the large-scale handover scenario. Fig. 3.9 presents the CDF of the

throughput and variance from a 1000-second simulation. As expected, MRNC outper-

forms HARQ in both average throughput and variance. In particular, MRNC achieves a

60% higher throughput on average, as well as a 40% gain with respect to variance over

Chapter 3. Adaptive Random Network Coding in WiMAX 42

HARQ. This confirms and highlights the benefits achieved by MRNC in the WiMAX

multi-hop mode.

0 100 200 3000

0.2

0.4

0.6

0.8

1

Throughput (Kbps)

Cum

ulat

ive F

ract

ion

of M

Ss

MRNCHARQ

(a)

0 50 100 1500

0.2

0.4

0.6

0.8

1

Variance (Kbps)

Cum

ulat

ive F

ract

ion

of M

Ss

MRNCHARQ

(b)

Figure 3.9: MRNC vs. HARQ in a large-scale multi-hop scenario. (a) CDF of throughput.

(b) CDF of variance.

In closing, we would like to study the overhead of MRNC. As neither BSs nor RSs have

constraints with respect to memory and computational power, we are only concerned with

the overhead at MSs. With respect to the overhead caused by coding, we have already

employed Gauss-Jordan elimination to perform progressive decoding in MRNC, which

maximizes the timing overlap between coding and network transmission. With respect

to the overhead from packet headers, as compared to HARQ, MRNC only adds 4 bytes

to carry the random seed.

3.4 Summary

WiMAX employs a state-of-the-art design using HARQ Incremental Redundancy. In

comparison, the recent advances in the literature on network coding have clearly shown

the advantages that simple random linear codes may be able to bring to wireless net-

works. Is random network coding helpful at the MAC layer of WiMAX, when used

instead of traditional HARQ? In this chapter, we have designed a protocol, referred to

Chapter 3. Adaptive Random Network Coding in WiMAX 43

as MRNC, with the intention of taking full advantage of the rateless property of ran-

dom linear codes in WiMAX. We further well tune the design of MRNC by designing

two adaptive algorithms: adaptive block size and adaptive upstream node. The adaptive

block size algorithm aims to provide a more flexible scheme for data transmission by

dynamically adjusting the block size in response to the channel conditions. Meanwhile,

the adaptive upstream node algorithm could help to efficiently utilize the scarce wireless

bandwidth, particularly in multi-path transmission scenarios. With extensive studies, we

have observed that our proposed protocol based on random network coding has indeed

offered salient advantages over HARQ, especially in cases where the channel condition

varies over time, during the handover procedure, and in the multi-hop mode of WiMAX.

Chapter 4

Drizzle: Cooperative Symbol-Level

Network Coding in WiMAX

In Chapter 3, we proposed a MAC-layer random network coding protocol, MRNC, to

improve error control in WiMAX. With random network coding at the MAC layer, the

throughput performance of WiMAX improves significantly and the scope of network-

ing in WiMAX has been largely extended. However, wireless channels are inherently

unreliable, and errors occur when the signal to noise ratio (SNR) is not high enough

to decode information correctly. Since the wireless channel conditions are time-varying

and location-dependent, especially in multi-channel WiMAX, they are completely unpre-

dictable. The transient medium errors cause significant packet loss under poor channel

conditions. However, not all the bits in the packet share the same fate when packet

error occurs. Most likely, only a few bits are in error, while the rest are correct, but

lead to the drop of the entire packet in the transmission. Scarce bandwidth is wasted by

dropping the entire packet due to a few corrupted bits. Therefore, even with HARQ and

MRNC at the MAC layer, it is sometimes not sufficient to fully recover bit errors in the

unpredictable error-prone wireless channels.

44

Chapter 4. Drizzle: Cooperative Symbol-Level Network Coding in WiMAX45

Is random network coding scheme still helpful under poor channel conditions in WiMAX?

How to design finer-granularity error control protocol that tightly integrates with WiMAX?

In this chapter, we seek to answer these questions and pursue more after MRNC, by pre-

senting Drizzle, a solution at the physical layer that uses random network coding across

symbols (one symbol contains a small sequence of bits in the physical layer), rather than

using network coding at the packet level (as MRNC and previous work in IEEE 802.11

networks). It is very challenging to design such a protocol by shrinking the network

coding block to symbol level, as the extremely small size of coded blocks will generate

large amount of overhead. In order to achieve all the benefits provided symbol level net-

work coding with error control in finer granularity without generating much overhead,

we have a number of designs in Drizzle presented in this chapter. With analysis and eval-

uation, we show that Drizzle is able to fully embrace the characteristics of multi-channel

WiMAX and exploit both time and cooperative diversity, to adapt to time-varying and

bursty channel errors and thus efficiently improve throughput performance in WiMAX.

4.1 The Design of Drizzle

Drizzle is designed specifically to explore the benefits of using network coding at the

symbol level in the physical layer of WiMAX. The symbol level design of Drizzle allows

flexible and efficient operations, as compared to the rigid design of previously proposed

physical layer network coding in [43, 77]. A symbol described in this chapter refers to a

unit of data that is defined by the modulation scheme in the physical layer. For example,

one symbol represents two bits if Quadrature Phase Shift Keying (QPSK) is used, and

four bits if 16 Quadrature Amplitude Modulation (16-QAM) is used. In this section, we

first describe the basic system design of Drizzle. Then, we present two salient advantages

when Drizzle operates in the physical layer of WiMAX.

Chapter 4. Drizzle: Cooperative Symbol-Level Network Coding in WiMAX46

Binary Input Data Modulation

Binary Output Data De-

Modulation

Modulated Symbol

Detected Modulated Symbol

Noisy WirelessChannel

Fading

Drizzle Encoding

Drizzle Decoding

Drizzle Coded Binary Data

ACK/NACK

Generate packets(segment+CRC)

CRC Check

AWGN

x= [x1,x2,…,xn] y = [y1,y2,…,yn,…] s = [s1,s2,…,sv,…]

sr = [sr1,sr

2,…,srv,…]yr = [yr

1,yr2,…,yr

n,…]

Soft Decision Values

xr= [xr1,xr

2,…,xrn]

Figure 4.1: A simplified block diagram showing the design of Drizzle.

4.1.1 Basic Operations

In order to provide a good understanding of Drizzle, a simplified block diagram is shown

in Fig. 4.1. The transmitter divides the input bit stream into segments and adds a cyclic

redundancy check (CRC), which is used for error detection at the receiver. A CRC

appended segment is referred to as a packet. Each packet is then divided into blocks with

fixed size, each containing a certain number of physical layer symbols. We can easily

compute the number of blocks in one packet if the packet size is pre-determined, and

we denote this quantity as the batch size in network coding. Unlike MIXIT [44], Drizzle

performs random network coding upon blocks within the same packet. Let n be the

batch size, and let xi (i = 1, 2, · · · , n) be the blocks in the packet, cji (i = 1, 2, · · · , n)

be the set of random coefficients generated in a given Galois field, the size of which is

determined by the number of bits in a block (e.g., for a block with 8 bits, GF(28) would

be used). A coded block yj can then be produced as yj =n∑

i=1

cji·xi. Each generated

coded block can be mapped to one or several modulation symbols. The required number

of symbols for one coded block depends on the size of the coded block and the selected

modulation scheme. For example, a coded block with a block size of 8 bits is mapped

to four symbols for QPSK and two symbols for 16QAM. The encoder is able to generate

a virtually unlimited number of coded blocks yj (j = 1, 2, · · · ) using different sets of

coefficients, and any n of these coded blocks can be used to decode by inverting a matrix

of coding coefficients.

Chapter 4. Drizzle: Cooperative Symbol-Level Network Coding in WiMAX47

Demodulation in the physical layer on the receiver makes its best decision on the

received signals. Due to noise and channel fading, the demodulator may make incorrect

decisions, leading to errors. The Drizzle decoder tries to decode the received coded

blocks using “hints” from demodulation, which are referred to as soft decision values.

Soft decision values are estimates of coded bit log likelihood ratios (LLRs) [72]. In the

case of perfect channel knowledge, the estimation of code bit LLR under 2F -QAM can

be obtained by the following equation [72]:

Λ (bf ) = ln∑

s+∈{s:bf=+1}exp

(−|ys − αs+|2

σ2

)− ln

∑s−∈{s:bf=−1}

exp

(−|ys − αs−|2

σ2

)(4.1)

where f is the bit order of used 2F -QAM symbol; ys is the received QAM symbol; α

is the channel gain; s (s ∈ {s1, s2, · · · , s2F }, s = b1b2 · · · bF ) is the transmitted QAM

symbol; σ2 is the variance of noise, which is a complex Gaussian random variable with

zero mean.

Fig. 4.2 shows 16-QAM constellation with Gray coding and an example of the detected

symbol of ys (s = b1b2b3b4 = 1001). The first bit decides whether the detected symbol is

placed in the first quadrant or fourth quadrant. For the first bit of a symbol (b1 = 1),

Eq. (4.1) will return a positive value because the detected symbol is placed in the fourth

quadrant. The fourth quadrant is further divided into two spaces in the x-axis. If the

detected symbol is placed in the left half of the divided space, LLR is a negative value,

otherwise, LLR is a positive value. Through a similar approach, the third and fourth

bits can be decided. From Eq. (4.1), it is clear that the shorter the Euclidean distance

between the detected symbol and its closest constellation points is, the larger absolute

LLR value obtained.

Essentially, soft decision values represent how much confidence the demodulator has in

making the 0-1 decision on each bit. In Drizzle, the confidence level is used to estimate the

correctness of each received block using these soft decision values from the demodulation

Chapter 4. Drizzle: Cooperative Symbol-Level Network Coding in WiMAX48

11

10

00

01

0001 1110

b2b1

b4b3

Detected symbol

Figure 4.2: 16-QAM (24-QAM) constellation with Gray coding and an example of de-

tected symbol, 1001.

process. We will present an adaptive error detection algorithm using the confidence level

with a detailed discussion in Sec. 4.2. With such estimates, Drizzle gives priorities to

blocks with high confidence that they are correct, or “clean.” It is important to have a

sufficient number of “clean” blocks (with high probability), at least as many as the batch

size n, before decoding begins, as “dirty” blocks will lead to decoding failures, which can

be verified by checking the CRC. When an error occurs, the receiver asks the sender(s)

to retransmit additional coded blocks, until the entire packet is correctly decoded, or a

maximum number of retransmissions is reached. When the packet can not be correctly

recovered without a sufficient number of “clean” blocks until a maximum number of

retransmission is reached, the packet is discarded at the physical layer. This strategy is

employed for HARQ in various air interface standards including IEEE 802.16 WiMAX

and 3GPP LTE.

4.1.2 Adaptive Retransmission

One of the key designs in Drizzle is adaptive retransmission. The intuition is shown in an

illustrative example in Fig. 4.3. The sender first divides each single packet into a number

of small blocks, each of which contains one or a small number of physical layer symbols

Chapter 4. Drizzle: Cooperative Symbol-Level Network Coding in WiMAX49

A1 A2 A3 A4 A5

A1 A2 A3 A4 A5

A6 A7

A1 A2 A3A4 A5A6 A7B1 B2 B3 B4 B5

NACK

ACK

"clean" block "dirty" block

Figure 4.3: In Drizzle, only “dirty” blocks are retransmitted to the receiver over a single

wireless link with errors.

used in modulation. All blocks are encoded using random network coding [35,36], and the

sender sends the packet by transmitting n of them (n is the batch size; in the example,

5 blocks are transmitted: A1, A2, · · · , A5) to the receiver. At the receiver side, each

received packet is inspected and evaluated using confidence level as we stated above.

The blocks with lower confidence levels have lower priorities in the decoding process,

because the receiver has the lower confidence on the correctness of these blocks. The

receiver constructs a set of blocks to decode, which always includes top n blocks with the

highest confidence levels.

If decoding fails for the initial transmission, the receiver computes the number of

“dirty” blocks. This number is determined using the level-threshold, which will be dis-

cussed and elaborated in Sec 4.2. If the confidence level values of a block is below the

level-threshold, the block is marked as “dirty.” Normally, not all the bits within the

packet share the same error rate. Very often, only a small number of bits are in error;

the rest are correct. In the example, block A3 and A5 are in error, while A1, A2 and A4

are “clean.”

With this knowledge, the receiver only tries to exclude “dirty” blocks, and requests

Chapter 4. Drizzle: Cooperative Symbol-Level Network Coding in WiMAX50

the sender to transmit additional coded blocks (same number as the “dirty” blocks) via

NACK. In the example, the sender just needs to send two more coded blocks (A6 and

A7) to the receiver, which can then be used towards correct decoding of the packet on

the receiver. After receiving additional blocks from the sender, the receiver again tries to

decode the packet with the n (out of all the received blocks received so far) blocks with

the highest confidence levels. In the example, decoding can be successfully performed

with a total of 5 “clean” blocks (A1, A2, A4, A5, A7).

This process is referred to as adaptive retransmission, since the sender is only called

upon to retransmit a sufficient number of additional blocks for the receiver to decode,

and if blocks are sufficiently small, the available wireless bandwidth is effectively used, as

in the analogy where fine “rain drops” fill up a “bucket.” Error control in Drizzle can be

performed in fine granularity, which can be more efficient in terms of resource utilization

than traditional packet-level error control protocols and blind-push based end-to-end

error correction in [44]. In addition, thanks again to the rateless property of random

network coding, the receiver does not have to specify which blocks have errors in the

packet, and only needs to ask for an additional number of blocks. Should a particular

coded block be lost, subsequent correctly received ones are equally innovative and useful

to recover the original packet. As such, Drizzle is resilient to time-varying and bursty

channel errors, by dynamically adapting to fluctuating channel conditions in realistic

networks such as WiMAX, especially when mobility is present.

Adaptive retransmission is always performed as Drizzle is employed. How effective is

this design to saturate available wireless bandwidth from the physical layer (after demod-

ulation)? In one of our simulations, we have used a Rayleigh fading channel to simulate

time-varying channel conditions between a sender and a receiver. With this channel, we

simulated Drizzle, HARQ and SOFT [74] with WiMAX physical layer characteristics.

Fig. 4.4 shows the number of bits retransmitted for correctly recovering the error packet

over a period of time (100 seconds). We are able to observe that Drizzle consistently

Chapter 4. Drizzle: Cooperative Symbol-Level Network Coding in WiMAX51

0 10 20 30 40 50 60 70 80 90 100200

400

600

800

1000

1200

Time (Second)

Num

ber o

f bits

retra

nsm

itted

Drizzle HARQ SOFT

Figure 4.4: The average number of bits retransmitted in a single-link transmission, when

Drizzle is compared with HARQ and SOFT (Woo et al. [74]). Simulations are performed

with the environment and settings provided in Sec. 4.4.

uses a significantly smaller number of bits in its retransmissions (on average 403 bits for

Drizzle, 632 bits for HARQ, 835 bits for SOFT) which result in substantial throughput

enhancement, and outperforms both HARQ and SOFT by 36% and 52%, respectively.

The intuition is that, Drizzle allows the sender to retransmit a barely sufficient number

of symbols, rather than blindly retransmitting the redundancy.

In terms of delay performance, Drizzle can achieve a shorter packet delivery time

than HARQ and SOFT, since it transmits significantly smaller number of bits in its re-

transmissions, with shorter transmission delays. However, in the WiMAX Time Division

Multiplexing (TDD) mode, the only deployed mode at the time of writing this chapter,

since the receiver has to wait for an uplink transmission opportunity to send ACK/NACK

feedback to the transmitter, the gain on the transmission delay time reduction is negli-

gible. Therefore, we mainly focus on the evaluation of throughput performance in this

chapter. We will further evaluate the performance of adaptive retransmission in Drizzle

in evaluation section with more details.

4.1.3 Cooperative Transmission

Cooperative transmission is an especially effective application of Drizzle to realize the

Chapter 4. Drizzle: Cooperative Symbol-Level Network Coding in WiMAX52

potential benefits in multi-path transmission. Drizzle employs a typical wireless network

architecture, as shown in Fig. 4.5(a), in order to provide an efficient and cost-effective

cooperative transmission mechanism. An illustrative example of handover is shown in

Fig. 4.5(b), where a mobile node is in the handover region and connected to two upstream

nodes (base station 1 and 2). By assigning separate sub-channels on each connection

(channel 1 and 2), the receiver could communicate with all the upstream nodes con-

currently with little interference, as sub-channels are orthogonal to each other by using

OFDMA. As an opportunity for multi-path transmission is created in such scenarios,

multiple senders are able to cooperatively transmit coded blocks to a receiver.

We use the example shown in Fig. 4.5(b) to show how cooperative transmission per-

forms. In the figure, the access gateway mediates two base stations as a cross router

and serves as the sender. It generates different coded blocks and send them to the base

stations — A1, · · · , A5 to base station 1, A6, · · · , A10 to base station 2 (the batch size is

set to be 5 in the example). The base stations forward the coded blocks and the mobile

node receives them concurrently via different channels. The mobile node is able to “col-

lect” different coded blocks from all the connections simultaneously. All the correctly

received coded blocks are equally useful, due to the rateless property of random linear

codes. However, as channels are not reliable, the mobile node only receives 3 (A4, A6

and A7) “clean” blocks (the dark blocks are “dirty” blocks, and the white blocks are

“clean” ones), and thus fails to decode. It asks for retransmission, and the sender pushes

more redundancy (A11 and A12). By correctly receiving the required number of correct

blocks, the mobile node is able to successfully decode and recover the original packet.

Such cooperative transmission could also be performed at the uplink, where the mobile

node is responsible to generate distinct coded blocks, and the access gateway performs

the decoding process.

Maximum-performance cooperative transmission can be employed for the downlink,

as power is not a problem for relays and BSs. On the other hand, power-efficient co-

Chapter 4. Drizzle: Cooperative Symbol-Level Network Coding in WiMAX53

Mobile Node 2

Mobile Node1

Mobile Node 3

Access Gateway

Base Station 2

Base Station 1

Relay 3

Base Station 3

Relay 1

Relay 2

(a) System architecture.

Mobile NodeBase Station 1

A4 A6 A9

original packet

combining

A11

A12

A6 A9 A10A8A7A4A1 A2 A5A3

retransmission

A4 A6 A11A9 A

12

Access Gateway

channel 1 channel 2

Base Station 2

(b) Handover.

!"!" !# !$!%

&'()

*+'+,-./-0,1)

2-3)

!# !" !$!% !&

'()*)+,-./,0123

4-50,.,.6

3)4-3,.6

!% !$ !&!7!

"8

!% !$ !&!

45!7

49'..)1:"

49'..)1:#

49'..)1:%

;)1'<

(c) Two hops.

!"!" !# !$!%

&'()*+,',-./

0.1-2)*3.4)

!# !" !$!% !&

!% !$ !' !&!

()

56'//)2*"

56'//)2*#

56'//)2*%

!% !$ !&!

()!7

!% !$ !&!

()!7

56'//)2*8

9)2':*"

9)2':*#

*+,-,./012/3456

5.;1-/-/<

4)5.4-/<

(d) Three hops.

Figure 4.5: Cooperative transmission of coded blocks is possible when the opportunity

of multi-path transmission arises in both handover and multi-hop modes of WiMAX.

Chapter 4. Drizzle: Cooperative Symbol-Level Network Coding in WiMAX54

operative transmission should be employed for the uplink due to mobile node’s limited

battery power. In the downlink, each upstream node uses different coefficient matrix

to generate coded blocks and transmits generated coded blocks with different radio re-

sources. However, in the uplink, the mobile node multicasts coded blocks to different

upstream nodes. Due to different position and fading environment of different upstream

nodes, the received data experience different fading.

In addition, cooperative transmission also works well in the multi-hop mode of WiMAX

when relays are enabled. When the mobile node moves into an overlapped region covered

by both an upstream node and a relay, the sender, receiver and relay are connected to

one another via different sub-channels, where transmissions suffer little from interference.

Having more than one single wireless hop, the multi-hop mode also creates an opportunity

for multi-path transmission. The intuition is shown in Fig. 4.5(c), where the base station

serves as the sender by issuing A1, · · · , A5 directly to the mobile node and A6, · · · , A10

to the relay, which will forward the data to the mobile node. By collecting the data from

both paths concurrently, the mobile node tries to recover the original packet by decoding

the “clean” coded blocks it receives. Moreover, cooperative transmission can be easily

applied to more complicated topologies as shown in Fig. 4.5(d). Drizzle aims to take

advantage of both random network coding and the convenience of multiple channels, and

exploit the benefits of cooperation in multi-path transmission, that leads to the efficient

use of available channel bandwidth.

In the overlap serving area in the multi-path transmission scenarios shown in Fig. 4.5,

one mobile station can have multiple connections with upstream nodes. Concurrent trans-

missions can be applied and will help to increase the throughput performance, as there

are always data in the backlog for transmission. Thus, one issue we may be concerned

with is the amount of data each sender pushes to the receiver. We observe that different

channels experience different qualities, and sometimes the difference is quite significant.

Drizzle takes advantage of such channel diversity and efficiently transmits the data. At

Chapter 4. Drizzle: Cooperative Symbol-Level Network Coding in WiMAX55

the same time, Drizzle should provide fairness in resource allocation among users. Asking

only one sender with the best channel quality to transmit all the required data may cause

the problem of starvation of some other users due to limited resources.

With the multi-path transmission, we propose the following scheme to determine

the amount of data each sender transmits. Drizzle adopts a modified proportional rate

constraint algorithm [62,63,73]. Assume that the channel Signal to Noise Ratio (SNR) is

perfectly estimated. Denote the channel qualities of q channels, serving the same receiver,

as SNR1, · · · , SNRq. The number of coded blocks that need to be transmitted is denoted

as NR. The total number of coded blocks transmitted by each sender is denoted by Ni

(i ∈ {1, · · · , q}), i.e., Ni = dN ′ie where N ′

i is computed as follows:

N ′1

β1

=N ′

2

β2

= · · · =N ′

q

βq

NR =

q∑i=1

N ′i βk =

SNRkq∑

m=1

SNRm

q∑j=1

βj = 1.

We round up N ′i into integer values if N ′

i are fractional numbers. Though this al-

gorithm might require transmitting a few more blocks, Drizzle uses substantially less

wireless resources for error correction as compared to HARQ and SOFT. The trans-

mission of each sender is coordinated by either the access gateway or the base station,

depending on the transmission scenarios (single link transmission, handover, or multi-hop

transmission).

To show the benefits of Drizzle in cooperative transmission, we evaluate Drizzle using

simulations in the handover scenario of WiMAX, against both HARQ and SOFT [74].

A mobile node moves across the handover region, from point A to point B in Fig. 4.6,

with a constant speed. We measured the throughput on both downlink and uplink

in our simulations. The results are shown in Fig. 4.7, where it is evident that Drizzle

outperforms both HARQ and SOFT. On the downlink, Drizzle has an average throughput

gain over HARQ and SOFT of 52% and 154%, respectively. On the uplink, this margin

Chapter 4. Drizzle: Cooperative Symbol-Level Network Coding in WiMAX56

A

B

Region where handover is not needed

Handover region

Figure 4.6: Simulating a WiMAX handover event when an MS moves across the handover

region with a constant speed.

0 10 20 30 40 50 60 70 800

200

400

600

Time (second)

Thro

ughp

ut (K

bps)

Drizzle HARQ SOFT

(a) Downlink throughput

0 10 20 30 40 50 60 70 800

100

200

300

Time (second)

Thro

ughp

ut (K

bps)

Drizzle HARQ SOFT

(b) Uplink throughput

Figure 4.7: The throughput performance of Drizzle over time (80 seconds) in the han-

dover scenario, as a mobile station is moving around in the handover region randomly.

Simulations are performed with the settings provided in Sec. 4.4.

Chapter 4. Drizzle: Cooperative Symbol-Level Network Coding in WiMAX57

of improvement could reach 26% and 82%. Such substantial improvements coincide

with our intuition that cooperative transmission in Drizzle naturally takes advantage of

cooperative diversity in multi-path transmissions. We will examine the benefits of Drizzle

in more practical multi-path transmission scenarios in Sec. 4.4.

4.1.4 Differences from MIXIT

Specifically, we would like to state the differences between Drizzle and MIXIT [44] which

is also a protocol that performs random network coding across correct symbols in different

packets in the physical layer, with a brief description in Sec. 2.2.2. Our work is inspired

by MIXIT, but differs from it in a number of aspects.

First, MIXIT heavily relies on opportunistic listening and routing properties in multi-

hop 802.11 networks, and can not be effectively applied to multi-channel wireless net-

works. While, Drizzle is tightly designed for practical multi-channel wireless networks

(e.g., OFDMA based WiMAX), while providing flexibility to be applicable to other types

of wireless networks. With the design of Drizzle, we provide the answer to the question

on whether network coding would provide additional improvements in WiMAX, which is

particularly interesting since MRNC is proposed to effectively work at the MAC layer of

WiMAX and HARQ is readily used in these physical layer protocols. Second, we jointly

employ random network coding and soft decision values in Drizzle. With such a proposed

mechanism, random network coding is performed across the symbols within one packet

rather than over different packets as performed in MIXIT. Thus, the fine error control

granularity of soft decision values and the favorable rateless property of random network

coding can be both fully exploited, and are helpful to improve the performance signifi-

cantly in WiMAX. Third, MIXIT generates a large amount of overhead and is not able

to provide flexibility on feedback based on-demand retransmission due to the bounded

MRD code rates. Drizzle can be implemented with low communication costs. It employs

new techniques including inner-packet coding, pre-generated coefficient matrix, and dy-

Chapter 4. Drizzle: Cooperative Symbol-Level Network Coding in WiMAX58

namic retransmission, with which signaling overhead and unnecessary redundant data

transmission can be largely mitigated. According to our estimate, Drizzle is akin to a

“free lunch” with respect to the computation and communication overhead with currently

available technologies. We will elaborate the overhead analysis with the comparison of

Drizzle and MIXIT in Sec. 4.3.3.

4.2 Impact of Soft Decision Values

Soft decision values conveyed from the demodulation process in the physical layer (im-

plemented in physical chips in the real systems [28]) are used in Drizzle to detect errors

in coded blocks. As described in Sec. 4.1, we use confidence level of each coded block on

the receiver to detect errors. Is the confidence level able to fully capture the correctness

of the block? Why do we use normalized soft decision values to calculate the confidence

levels? How to take full advantage of these soft decision values in Drizzle? In this section,

we present the design and the use of soft values, serving as important cornerstones in

Drizzle.

4.2.1 Are Soft Values Accurate?

Current modulation schemes in the physical layer compute the soft decision values (SVs)

of all bits, which show the confidence of demodulation in order to make 0-1 decisions. A

bit with a negative SV is translated into 1, whereas a bit with a positive SV is translated

into 0. A larger absolute value in the SVs indicates a higher level of confidence on the

decision being made.

Unfortunately, the distribution of SVs varies depending on modulation schemes and

channel conditions. To further understand this point, we carried out a simulation. In

the simulation, a packet of 25K bytes is transmitted over Rayleigh fading channels with

a 30 km/h moving speed, and under different channel conditions. SV distributions of all

Chapter 4. Drizzle: Cooperative Symbol-Level Network Coding in WiMAX59

−20 −10 0 10 200

0.002

0.004

0.006

0.008

0.01

0.012

Soft Decision Value

PDF

0dB20dB

(a) SV distribution of all bits

−20 −10 0 10 200

0.05

0.1

0.15

0.2

0.25

Soft Decision Value

PDF

0dB20dB

(b) SV distribution of bad bits

Figure 4.8: The distribution of soft decision values under BPSK modulation, which

is obtained by transmitting 200,000 bits over Rayleigh fading channel with a speed of

30km/h.

received bits and error bits are shown in Fig. 4.8. As the figure shows, the SV distribution

is different as the channel quality changes. For example, if we receive a bit with SV

of -5 under the SNR of 0dB, there is still some probability that this bit is erroneous

according to the SV distribution for error bits. However, the bit with SV of -5 is 100%

“clean” under the SNR of 20dB. Also, different modulation schemes generate different

SV distributions. Thus, it is not accurate to quantitatively measure the confidence levels

without considering the impact of channel conditions and modulation schemes.

Intuitively, normalizing the soft decision values by considering different signal qualities

and modulation schemes is a good solution to this problem. In Drizzle, soft decision values

are normalized with the following formula:

NSV (s, SNR, M) =s

|s|

∫ |s|

−|s|d(s, SNR, M)ds (4.2)

where NSV denotes the normalized SV, d(s, SNR, M) denotes the probability density

function (PDF) for SV under a certain SNR and modulation (M), and s denotes the

SV variable. For example, NSV (−10, 0dB, BPSK) = −96.3%. The normalized SVs

are essentially a cumulative fraction of the absolute SV, since the SV distribution is

Chapter 4. Drizzle: Cooperative Symbol-Level Network Coding in WiMAX60

symmetric with respect to 0. After normalization, the range of SV resides in [−1, 1].

It is straightforward that larger absolute values of the normalized SVs indicate higher

confidence levels on the correctness of demodulation.

SV distributions under different channel qualities and modulation schemes are ob-

tained from a large number of simulations. Normalized SVs are able to reflect relative

characteristics of SVs, as they are tightly integrated with fluctuating channels and the

adaptive modulation scheme adopted in the physical layer of WiMAX. SVs in the re-

mainder of the chapter are normalized values if not noted otherwise.

4.2.2 How to Use Soft Values for Error Detection?

In Drizzle, soft decision values have two main functions. First, they are used to construct

the set of coded blocks used for decoding. To determine the confidence level of a coded

block, Drizzle uses the absolute value of the normalized SV of each bit, and then computes

the average of all bits in the coded block. A smaller average represents a lower confidence

level that the block is correct, whereas a larger average shows a higher confidence level.

As we have shown, blocks with higher confidence levels will be given higher priorities to

be included in the set of blocks for decoding.

Unfortunately, confidence levels of coded blocks directly computed from the average

may not be sufficiently accurate, since very often there exists a large variance on the

absolute SVs of bits within one block (a block contains a small number of bits). A few

bits with low absolute SVs may not effectively reduce the confidence level of the entire

block, provided that there are much higher absolute SVs on some of the bits in the

block. As such, it is necessary to penalize the blocks with one or a few “dirty” bits with

low absolute SVs. The existence of even one block that is not correctly received will

contaminate the entire decoding process.

In Drizzle, we check the SVs for all bits in a block. If any of the bits has an absolute

SV that is below a certain threshold, we will set the confidence level of the entire block

Chapter 4. Drizzle: Cooperative Symbol-Level Network Coding in WiMAX61

to the absolute SV with the lowest value. In this way, priorities of blocks with just a

few error bits will be reduced, which provides a more accurate measure with respect to

the confidence level of each coded block. It is important to set such a threshold in order

to rule out the blocks with a small number of “bad” bits. We refer this threshold as

SV-threshold.

It is non-trivial to make the selection of SV-threshold value. If a SV-threshold is se-

lected too aggressively (overly high), the priorities of “clean” blocks would be incorrectly

reduced. On the other hand, if it is set to be too low, it would not be sufficiently powerful

to detect blocks that are received in error. In order to study the optimal SV-threshold

that achieves maximized throughput performance, we evaluate the impact of the selec-

tion of SV-threshold via simulations. Fig. 4.9 shows the performance of Drizzle with

different SV-thresholds under different bit error rates of the wireless channel. We use 4

different SV-thresholds to check how SV-threshold selection affects the performance. As

shown in the figure, choosing a threshold as 27.5% gives the best performance among

the four choices we have simulated. When higher thresholds are used (such as 52.5%, or

77.5%), the throughput is reduced, which indicates that overly aggressive screening may

incorrectly reduce the priorities of “clean” blocks. On the other hand, we observe that a

threshold that is too low (such as 2.5%) also negatively affects throughput performance,

as “dirty” blocks remain in the set used for decoding. This observation shows that we

should carefully tune the SV-threshold. Heuristically, 22% is used in Drizzle based on a

large number of simulations that we have performed.

The second function of soft decision values in Drizzle is to count the number of “dirty”

blocks in the set used for decoding. When the decoding fails after each transmission, the

receiver will count the number of “dirty” blocks in the decoding set, and ask the sender

to transmit the same number of additional coded blocks. This number will determine

the number of blocks retransmitted, and will directly affect the performance of Drizzle.

As such, a threshold must be set in Drizzle (referred to as level-threshold), so that blocks

Chapter 4. Drizzle: Cooperative Symbol-Level Network Coding in WiMAX62

0.02 0.04 0.06 0.08 0.1 0.12 0.140

200

400

600

Bit Error Rate

Thro

ughp

ut (K

bps)

77.5% 52.5% 27.5% 2.5%0.76dB

1.50dB2.81dB

2.02dB

Figure 4.9: The selection of SV-thresholds affects the performance of Drizzle. The per-

formance of Drizzle under 4 different SV-thresholds, 77.5%, 52.5%, 27.5%, and 2.5%,

is evaluated to show the importance of SV-threshold selection. Values in dB are the

gains that the best case outperforms the worst case in the simulation. Simulations are

performed with the settings provided in Sec. 4.4.

with confidence levels lower than this threshold will be counted as “dirty” ones.

It is a tradeoff to set the value of level-threshold. If a high level-threshold is selected,

correctly received blocks could be counted as error blocks and extra retransmissions will

be requested, which will consume more bandwidth. Since more redundant retransmission

blocks are transmitted, it is with a higher possibility to correctly recover the packet in

the receiver at the next retransmission (a small number of retransmissions). On the

other hand, if a low level-threshold is selected, error blocks could not be detected. It will

also cause extra retransmission for error correction after the failure of network decoding

(large number of retransmissions). In this case, whereas barely required blocks are re-

transmitted, more retransmission requests are required, which cause delays.

Drizzle is designed to be able to adjust the level-threshold depending on specific

requirements of the applications. If the application is delay sensitive (such as voice), the

level-threshold should be set to be high in order to conservatively request more coded

blocks at the following transmission. Otherwise, if the application requires a higher

Chapter 4. Drizzle: Cooperative Symbol-Level Network Coding in WiMAX63

0.07 0.08 0.09 0.1 0.11 0.12 0.13 0.1450

100

150

200

250

300

Bit Error Rate

Thro

ughp

ut (K

bps)

12% Level Threshold75% Level Threshold

(a) Throughput

0.07 0.08 0.09 0.1 0.11 0.12 0.13 0.148

10

12

14

16

Bit Error Rate

Dela

y (m

sec)

12% Level Threshold75% Level Threshold

(b) Delay

Figure 4.10: The level-threshold affects the delay and throughput performance in Drizzle.

A higher level-threshold is helpful to achieve higher throughput, but with a larger delay.

On the contrary, a lower level-threshold leads to lower throughput, but with smaller

delays. Simulations are performed with the settings provided in Sec. 4.4.

Chapter 4. Drizzle: Cooperative Symbol-Level Network Coding in WiMAX64

throughput, the level-threshold could be set to be lower, to request a barely sufficient

number of additional coded blocks, so that available bandwidth can be most efficiently

used. Fig. 4.10 shows the delay and throughput tradeoff of two different level-thresholds,

with the values of 12% and 75% are used in this simulation. A level-threshold of 12%

shows 14% higher throughput on average, whereas a level-threshold of 75% is 39% better

with respect to delays on average.

Theoretically, SV-threshold and level-threshold can be dynamically adjusted to adapt

to the network environment, including channel quality, mobility, and the transmission

mode. Another potential solution for threshold selection can be obtained by historical

data learning. In our future work, we will further study the optimal thresholds for Drizzle

using learning techniques.

4.2.3 How Do Soft Values Work in Cooperative Transmission?

By applying normalized SV and adaptive threshold described above, Drizzle is able to

check the correctness of each coded block it collects, no matter where the block comes

from and which modulation scheme is used on it. Normalized SV and adaptive threshold

techniques in Drizzle are essentially a way to perform link adaptation by tightly inte-

grating with the adaptive modulation scheme adopted in the physical layer of WiMAX.

They are especially helpful to achieve cooperative transmission in Drizzle as described in

Sec. 4.1.3. Although, in the multi-path transmissions, different senders may use different

modulation schemes to transmit coded blocks to the same receiver, as channel conditions

are different on each path (adaptive modulation is applied), the receiver could check the

correctness of all the blocks effectively by applying normalized SV and adaptive threshold.

Drizzle makes it possible for the receivers to correctly select clean blocks and decode the

original packets successfully.

We perform simulations to examine the effectiveness of Drizzle in such a multi-path

transmission scenario. In the simulation, two upstream nodes serve as senders and trans-

Chapter 4. Drizzle: Cooperative Symbol-Level Network Coding in WiMAX65

mit data to the same receiver via two separate sub-channels, and QPSK and 16QAM

are used on each path respectively. By applying adaptive modulation, the modulation

schemes are determined to meet the target Bit Error Rate (BER) based on the estimated

SNR. For example, if the target BER is 10−3, 16QAM is used at a SNR of 8dB and

64QAM is used at a SNR of 12dB. Now, we set the modulation schemes as QPSK and

16QAM in the simulation. Then, we calculate the SNRs on each channel according to

the target BERs (by adopting the solution in [28]). By varying the target BERs, we

examined the downlink throughput at the receiver under different channel conditions

(with different SNRs). Fig. 4.11 shows the simulation results, where a 3.24dB gain can

be achieved on average by applying normalized SV and adaptive threshold. This shows a

significant benefit when link adaptation in Drizzle is applied.

10−5 10−4 10−3 10−20

100

200

300

400

500

Bit Error Rate

Thro

ughp

ut(K

bps)

with SV normalizationand adaptationwithout SV normalizationand adaptation

Figure 4.11: A comparison of Drizzle’s performance with and without SV normalization

and adaptation in a cooperative transmission scenario. Two nodes are sending coded

blocks to one receiver using different modulation schemes (QPSK and 16QAM are used on

each sender respectively). The transmission is under different channel qualities (SNRs),

which are generated by varying the target BERs in a certain range. Simulations are

performed with the settings provided in Sec. 4.4.

Chapter 4. Drizzle: Cooperative Symbol-Level Network Coding in WiMAX66

4.3 Implementation Issues

As Drizzle uses network coding at its core, we are aware of a few implementation issues

that, if not appropriately addressed, may affect the performance.

4.3.1 Choosing the Size for Coded Blocks

As we have shown, each packet is divided into a number of blocks, on which random

network coding is performed. At a glance, it may appear that a smaller block is always

preferable, as a smaller block lead to less overhead when retransmissions are made, and

more accurate confidence levels as the normalized SVs of bits are averaged.

Unfortunately, a block that is too small will lead to an inherent problem that is hard

to address. A block with m bits has to use at least GF(2m) to perform random network

coding, and a smaller number of bits in a block leads to a smaller size of the Galois

Field with a smaller degree of freedom when coefficient vectors are randomly chosen.

This leads to a higher probability of producing linearly dependent blocks with random

network coding.

It is therefore important to choose an appropriate size for coded blocks, so that a block

is sufficiently small, but supports a sufficient degree of freedom to generate randomized

coefficient vectors that are linearly independent of one another.

In order to show the effect of different block sizes to the packet delivery rate, we

consider a packet with a size of 512 bits which is divided into 128, 64, 32 blocks for

m = 4, 8, 16, respectively. Block error rates and packet delivery rates are shown in

Fig. 4.12. We can clearly see that as the block size increases, the block error rate also

increases. However, due to the high decoding error probability with small block sizes, its

packet delivery rate, which is a ratio of the number of error-free packets over the total

transmitted packets, suffers from poor performance.

Considering the tradeoff between the block error rate and the decoding error proba-

Chapter 4. Drizzle: Cooperative Symbol-Level Network Coding in WiMAX67

bility generated by blocks with different sizes, we select 8 bits as the best tradeoff. Thus,

we adopt GF(28) to perform random network coding. In this case, a block may contain

multiple symbols when a symbol is smaller than 8 bits. For example, a block contains 4

symbols with QPSK modulation, where a symbol has 2 bits. In 16QAM modulation, a

block includes 2 symbols. Our simulation results shown in Sec. 4.4 have further verified

the effectiveness of our choice of the block size.

4.3.2 Reducing the Overhead of Carrying Coefficients

In Drizzle, it is important to reduce the overhead of communicating random coefficients

from the sender to the receiver for each coded block. Since the size of the block is

small, the number of blocks in a packet will be large (64 blocks in a 512-bit packet, for

example) with a large number of corresponding coefficients. Regardless of how we carry

these coefficients, the overhead over wireless channels will be prohibitive.

Our solution is to avoid the communication of coefficients between the receivers and

senders. In Drizzle, the random coefficient matrix is pre-generated and kept at both

the senders and the receivers. In WiMAX, each sender-receiver pair needs to negotiate

parameters such as modulation, coding, and transmission power, before the actual data

transmission. In Drizzle, the sender transmits the index of the pre-generated random

coefficients matrix that is used for encoding to the receiver, as a part of the session control

information (in HARQ, the session number is also communicated as a part of the session

control information). In order to reduce the overhead of storing different coefficient

matrices for different batch sizes and different maximum number of retransmission blocks,

only one coefficient matrix with a minimum sufficient size is stored and used for encoding

and decoding. Let us denote the maximum batch size as N , the maximum number of

retransmission blocks as D, and the maximum number of cooperating upstream nodes

as C. Then the dimension of the stored matrix is N ×M , where M = N + D × C. To

guarantee successful decoding, any N ×N sub-matrix is produced to be nonsingular.

Chapter 4. Drizzle: Cooperative Symbol-Level Network Coding in WiMAX68

0 1 2 3 4 50

0.2

0.4

0.6

0.8

1

SNR (dB)

Bloc

k Er

ror R

ate

4 bits8 bits16 bits

(a) Block Error Rate

0.02 0.04 0.06 0.08 0.1 0.12 0.14 0.160

0.2

0.4

0.6

0.8

1

Bit Error Rate

Pack

et D

elive

ry R

ate

4 bits 8 bits16 bits4.5dB

3.6dB

3.4dB

(b) Packet Delivery Rate

Figure 4.12: The selection of block sizes impacts the performance of Drizzle. (a) The

performance of block error rates under 3 different block sizes: 4 bits, 8 bits and 16 bits.

(b) The performance of packet delivery rates (K = 2n) under a Rayleigh fading channel.

Simulations are performed with the settings provided in Sec. 4.4.

Chapter 4. Drizzle: Cooperative Symbol-Level Network Coding in WiMAX69

How can the reliability of index negotiation be ensured? Wireless systems like WiMAX

and 3GPP employ a reliable management/control message transmission mechanism. Ses-

sion control information is conveyed using management/control messages, which are pro-

tected by the modulation and coding scheme (MCS) level, which is more robust than

regular data burst transmission, or reliable error control schemes using HARQ or MAC

level ARQ. The Multiple-input and multiple-output (MIMO) antenna scheme and low

density parity check (LDPC) codes use the same concept to transmit the index for pre-

coding matrix and matrix H, respectively, which are pre-generated and kept in the trans-

mitters and receivers. Therefore, the coefficient index can be effectively protected and

guaranteed to be successfully distributed to both receivers and senders.

Upon receiving such an index, the receiver has full knowledge of all coefficient vectors

used in future coded blocks from the sender, by looking up the pre-generated matrix. It

is also possible to use a seed of a pseudo-random number generator instead of the index

to specify a future sequence of coefficient vectors to be used by the sender.

4.3.3 Computational Complexity and Protocol Overhead

As neither base stations nor relay stations have constraints with respect to the energy

and computational power, we are only concerned with the computation overhead at

mobile stations. Modern mobile devices, such as smartphones, have abundant memory

and computational power. According to the results in [65], random network coding is

almost “free” with modern mobile processors. The coding speed could reach 1248 Mbps

for 16 blocks of 32 KB each and 348 Mbps for 64 blocks of 32 KB each. As our block

size is as small as a few bits, encoding and decoding are even much faster. Although

it indeed incurs additional computation to some extent, it keeps the overhead within

practical limits.

Specifically, Drizzle has a much smaller overhead compared with MIXIT [44]. In

MIXIT, blocks are coded across packets and only on the correct symbols. Thus, the

Chapter 4. Drizzle: Cooperative Symbol-Level Network Coding in WiMAX70

header has to include several runs of random coefficients, which generates a large amount

of overhead. Assume that the packet size is 1500 bytes (a typical size in IEEE 802.11

networks) and the batch size is 32 (typical number), with 4 runs. For each coded block, a

8.5% overhead is incurred, which is rather substantial. Usually, with 400 symbols, there

are dozens of runs at the least, regardless of dynamic programming schemes used in

MIXIT. Assume that there are 20 runs, leading to a completely unacceptable overhead

of 42%. Moreover, if the header is not correctly received, the decoding can not be

performed (with most of the packets discarded). In contrast, Drizzle adopts a totally

different approach by using a pre-defined codebook, which is only transmitted to the

receivers once. There is no header overhead when coded blocks are transmitted.

Another problem in MIXIT is that the feedback (ACK/NACK) has to be reported to

the sender via multiple hops through a shared channel, which may generate large delays,

especially when the number of hops is large and the batch size is small. In Drizzle, the

feedback information are transmitted via separate channels (control channels). Thus, the

feedback messages are transmitted in parallel with the data, which do not generate any

delay at all.

4.4 Performance Evaluation

We are now ready to resort to extensive simulations to study Drizzle’s performance.

For this purpose, we take advantage of the latest communication toolbox in MATLAB

for simulation implementation. MATLAB is efficient for evaluating the performance

of physical-layer protocols, and it is well designed to simulate physical layer designs in

multi-channel wireless networks with fading channel characteristics, modulation, and soft

decision values. To be realistic, we evaluate Drizzle’s performance in WiMAX networks,

where the practical settings of a real-world WiMAX network configuration are adopted.

Chapter 4. Drizzle: Cooperative Symbol-Level Network Coding in WiMAX71

4.4.1 Simulation Settings

Similar to the simulation evaluation in Chapter 3, in this chapter, WiMAX networks

are simulated according to typical parameters defined in the IEEE 802.16 standard [9]

and WiMAX system evaluation methodology released by WiMAX forum [8]. The sim-

ulation parameter settings according to these two documents are listed in Table 4.4.1.

In particular, we have used mobility patterns that reflect realistic parameter settings

in a practical wireless environment. To evaluate the performance, we compare Drizzle

with HARQ, and SOFT from previous work [74] proposed in the setting of IEEE 802.11

networks. With respect to HARQ, we adopt the type-II HARQ which performs Packet

Soft Combining in transmissions and employs Viterbi Soft Decision Decoding using soft

decision values. In the multi-path transmission scenarios, maximal ratio combining is

performed in HARQ. With respect to SOFT, we have simulated the protocol to the best

of our knowledge according to all the available details presented in [74]. We focus on

three typical communication scenarios of WiMAX: single-link transmissions, handovers

and multi-hop transmissions on both uplink and downlink.

4.4.2 Single-link Transmission

As a starting point, we first evaluate the performance of Drizzle in a basic, single-link

transmission scenario. We perform the simulation that all three protocols are used to

transfer a large file between a base station (BS) and a mobile station (MS) in the down-

link. In this experiment, we are interested in two performance metrics: the packet

delivery rate (calculated as the fraction of transmitted packets that are correctly deliv-

ered to the receiver), and the throughput. Fig. 4.13 shows a performance comparison

among Drizzle, HARQ and SOFT under various BERs. The performance with respect to

packet delivery rates is shown in Fig. 4.13(a), and Fig. 4.13(b) shows the corresponding

throughput for all three protocols. From the results, we could easily observe that Driz-

Chapter 4. Drizzle: Cooperative Symbol-Level Network Coding in WiMAX72

Table 4.1: Simulation parameters for evaluating Drizzle.

Channel Type Rayleigh fading channel and AWGN

Path loss Model COST-HATA-231a

Sampling time 0.1 second

Transmitter Power (Base Station) 25 dBm

Transmitter Power (Mobile Station) 20 dBm

Noise Power -129.5 dBW

Packet Size 512 bits

Number of Blocks in a segment 64

Adaptive Modulation used

OFDMA used

aThe extended HATA model to 2GHz by the European Cooperative for Scientific and Technical

(COST) research.

zle’s packet delivery rate (average: 0.99) is higher than both HARQ (average: 0.97) and

SOFT (average: 0.91) by 1.89% and 9.14% respectively. The performance gain becomes

more substantial when throughput is considered. Drizzle outperforms HARQ and SOFT

by 33.6% and 55.8%, respectively. This is because Drizzle is designed to tightly integrate

with the WiMAX physical layer for efficient bandwidth utilization. Due to the fact that

Drizzle utilizes scarce bandwidth very efficiently by transmitting a barely sufficient num-

ber of symbols to recover the error packet, as discussed in Sec. 4.1.2, a small performance

gain in packet delivery rate can result in a large throughput performance gain. These

improvements are supported by the efficient use of available wireless bandwidth, due to

adaptive retransmissions in Drizzle.

Although the observed performance improvement is quite encouraging under stable

channel conditions, we focus more on the performance under realistic wireless environ-

ments with fluctuating channel conditions. To evaluate the performance of all three

Chapter 4. Drizzle: Cooperative Symbol-Level Network Coding in WiMAX73

0.03 0.035 0.04 0.045 0.05 0.055 0.06 0.0650.75

0.8

0.85

0.9

0.95

1

Bit Error RatePa

cket

Del

ivery

Rat

e

Drizzle HARQ SOFT

(a) Packet Delivery Rate

0.03 0.035 0.04 0.045 0.05 0.055 0.06 0.065100

200

300

400

500

Bit Error Rate

Thro

ughp

ut (K

bps)

Drizzle HARQ SOFT

(b) Throughput

Figure 4.13: Packet Delivery Rate and Throughput with a range of BERs.

protocols, we run the simulation under the same mobility simulation scenarios as in

Sec. 3.3. One MS moves around the service area of a cell randomly. Its initial speed (in

km/h) and direction (in degrees) are generated with a uniform distribution of U [10, 80]

and U [0, 360], respectively. The MS will change its speed and direction after a certain

amount of time with an exponential distribution, with a mean value of 10 seconds. The

new speed is uniformly generated with U [10, 80] if the current speed is below 10 km/h;

otherwise, it is obtained using U [v − 10, v + 10], where v is the current speed. The new

direction is obtained from a Gaussian distribution with the mean as the current direction,

and a standard deviation of 40 degrees. The initial location of MS is randomly chosen

in the service region. The design of this simulation scenario aims to provide realistic

time-varying channel conditions. Moreover, we apply multi-path Rayleigh fading in the

transmission, since the MS keeps on moving.

Chapter 4. Drizzle: Cooperative Symbol-Level Network Coding in WiMAX74

0 10 20 30 40 50 60 70 80 90 100200

300

400

500

600

Time (Second)

Thro

ughp

ut (K

bps)

Drizzle HARQ SOFT

Figure 4.14: Throughput in a single, time-varying wireless link with mobility.

Fig. 4.14 shows the downlink throughput performance of all three protocols. We

observe from the results that Drizzle’s throughput (average: 485.95 Kbps) performs

substantially better than both HARQ (average: 381.27 Kbps) and SOFT (average: 336.95

Kbps). This observation coincides with our intuition and is not a surprise: it shows

Drizzle’s ability to adaptively match its transmissions to the available bandwidth in

time-varying channels, which helps in maintaining higher throughput.

4.4.3 Handover

We next try to identify the potential performance gain offered by cooperative transmis-

sions in Drizzle in the WiMAX handover scenario, as compared to HARQ and SOFT.

Our evaluation is performed under the same scenarios as in Sec. 3.3. A total of 19

BSs are deployed in the service area. The cell sites are laid out as shown in Fig. 3.4,

in which the MS is allowed to move around in the service area as the same fashion in

the single-link case. At the handover region, the MS is able to enjoy the multi-path

communication and perform cooperative transmission. Fig. 4.15 shows both uplink and

downlink throughput at the destination for all protocols from 1000-second simulations.

The average throughput results are: 505 Kbps (downlink) and 352 Kbps (uplink) for

Drizzle, 351 Kbps (downlink) and 303 Kbps (uplink) for HARQ, 259 Kbps (downlink)

and 237 Kbps (uplink) for SOFT. In this scenario, the improvement with Drizzle reaches

Chapter 4. Drizzle: Cooperative Symbol-Level Network Coding in WiMAX75

0 100 200 300 400 500 600 700 800 900 10000

200

400

600

800

Time (second)

Thro

ughp

ut (K

bps)

Drizzle HARQ SOFT

(a) Downlink throughput

0 100 200 300 400 500 600 700 800 900 1000100

200

300

400

500

Time (second)

Thro

ughp

ut (K

bps)

Drizzle HARQ SOFT

(b) Uplink throughput

Figure 4.15: Throughput comparison in the WiMAX handover scenario.

44% and 95% over HARQ and SOFT, respectively, on downlink transmissions. At the

same time, Drizzle outperforms HARQ and SOFT by 38% and 50% on the uplink. Such

a throughput advantage should be considered substantial by any standard.

With the objective of becoming even more realistic, we seek to extend our performance

evaluation to a large scale scenario. In the cellular system described previously, we set

a large number of MSs active in the service region concurrently. The arrival process of

new MS connections in each cell is assumed to be a Poisson process with a mean of 5

connections/cell/second. The MS active time duration is exponentially distributed with

a mean of 100 seconds. Every active MS is moving around the service area using the

same way as the previous simulation. We run the simulation for 1000 seconds, and the

downlink throughput at the MSs is examined. From the results, there are a total of

95,010 MSs that have ever been active in the service area during the simulation time,

Chapter 4. Drizzle: Cooperative Symbol-Level Network Coding in WiMAX76

0 20 40 600

0.2

0.4

0.6

0.8

1

Throughput (Kbps)

Cumu

lative

Fra

ction

of M

Ss

DrizzleHARQSOFT

(a) Downlink

0 10 20 30 400

0.2

0.4

0.6

0.8

1

Throughput (Kbps)

Cum

ulat

ive F

ract

ion

of M

Ss

DrizzleHARQSOFT

(b) Uplink

Figure 4.16: Throughput performance in a large-scale handover scenario.

with 460 MSs active simultaneously in each cell on average. Fig. 4.16 plots the CDF

of the average throughput for both uplink and downlink transmissions, considering all

active MSs in the simulation. Not surprisingly, Drizzle outperforms HARQ and SOFT

by 50% and 100% respectively on the downlink with respect to the average throughput,

due to its effective use of bandwidth and the advantages of random network coding in

cooperative transmission. Further, Drizzle beats HARQ and SOFT by 56% and 62%

respectively on uplink transmissions.

4.4.4 Multi-hop Transmission

Finally, we illustrate the performance advantage of Drizzle, generated by both adaptive

retransmission and cooperative transmission, in a WiMAX multi-hop transmission sce-

nario. In order to extend the coverage area of a cell, relay stations (RSs) are placed

within the border of the radio ranges of BSs. The simulation scenario is the same as

in Sec. 3.3 and shown in Fig. 3.7, where a relatively large multi-hop network is con-

sidered. A similar evaluation is performed with the same setting as our simulation in

the first handover case, where an MS randomly moves around and performs adaptive

retransmission and cooperative transmission as long as such opportunities are explored.

Chapter 4. Drizzle: Cooperative Symbol-Level Network Coding in WiMAX77

0 100 200 300 400 500 600 700 800 900 10000

200

400

600

Time (second)

Thro

ughp

ut (K

bps)

Drizzle HARQ SOFT

(a) Downlink throughput

0 100 200 300 400 500 600 700 800 900 10000

100

200

300

400

500

Time (second)

Thro

ughp

ut (K

bps)

Drizzle HARQ SOFT

(b) Uplink throughput

Figure 4.17: Throughput in a realistic multi-hop case.

As shown in Fig. 4.17, we observe from the results that Drizzle obtains 32% and 77%

average throughput improvement over HARQ and SOFT respectively on the downlink.

The performance gains reach to 56% and 85% on the uplink. This demonstrates the

ability of Drizzle to fully utilize available wireless spectrum in the multi-hop case.

Finally, we consider the case of a large-scale multi-hop network, with the same sim-

ulation setup as in the large-scale handover scenario. The maximum number of hops is

limited to be 3. Fig. 4.18 presents the CDF of the throughput from 1000-second simula-

tions. As expected, Drizzle outperforms HARQ and SOFT, and again by a substantial

margin. In particular, Drizzle achieves a 80% higher throughput on average over HARQ,

as well as a 1.8x gain over SOFT in the downlink. Further, Drizzle performs better than

HARQ and SOFT by 62% and 100%, respectively, in uplink transmissions. This confirms

and highlights the benefits achieved by Drizzle in the multi-hop scenario, which is one of

Chapter 4. Drizzle: Cooperative Symbol-Level Network Coding in WiMAX78

0 20 40 600

0.2

0.4

0.6

0.8

1

Throughput (Kbps)

Cum

ulat

ive F

ract

ion

of M

Ss

DrizzleHARQSOFT

(a) Downlink

0 20 40 60 800

0.2

0.4

0.6

0.8

1

Throughput (Kbps)

Cum

ulat

ive F

ract

ion

of M

Ss

DrizzleHARQSOFT

(b) Uplink

Figure 4.18: Throughput performance in a large-scale multi-hop scenario.

its design objectives.

4.5 Summary

In this chapter, we have explored the use of network coding in the physical layer of

multi-channel WiMAX, where it is challenging to effectively perform error control with

transient bit errors. The highlight of this chapter is our conclusion that, when network

coding is used at the symbol level, Drizzle is able to provide high and resilient throughput

in WiMAX by outperforming HARQ (not to mention existing work in 802.11-based

networks) and other state-of-the-art protocols in the literature.

The intuition that Drizzle improves WiMAX performance is quite simple to narrate:

as its name implies, Drizzle allows the sender to retransmit a barely sufficient number

of symbols that have not been successfully received at the receiver, and the receiver is

able to hold the “bucket” until it is full of coded blocks, as if they are very fine “rain

drops.” Even better, the receiver can receive these blocks from more than one sender, with

perfect collaboration across different senders, as multi-channel wireless networks create a

large number of opportunities on multi-path transmissions. Since these “rain drops” are

sufficiently small, there would be minimal waste of wireless bandwidth provided by the

Chapter 4. Drizzle: Cooperative Symbol-Level Network Coding in WiMAX79

physical layer. As our extensive simulation results have shown, there is no surprise in our

intuition: Drizzle is able to outperform both HARQ and related work in the literature

by a substantial margin.

Chapter 5

Cooperative Multicast Scheduling

with Network Coding in WiMAX

In this chapter, we shifted our study from the fundamental communication protocols to

the networking services in WiMAX, and first investigate multicast scheduling which is

important to the quality of services in WiMAX. Data and video multicasting has become

an extremely important service/application in WiMAX through Multicast and Broadcast

Service (MBS) system. With the current mandate of MBS, the Base Station broadcasts or

multicasts data in the downlink using robust modulation and coding schemes to provide

reliable transmissions for all the users, as individual feedback (such as ARQ and HARQ) is

not supported in MBS. However, such a dependence on using the most robust modulation

apparently under-utilizes the scarce wireless bandwidth. The main difficulty of multicast

scheduling is caused by the diverse channel conditions of users in the multicast session.

How to properly select a multicast rate in WiMAX MBS? Our research on multicast

scheduling is from a perspective by considering the use of multiple ODFMA channels,

multiple hops, multiple paths, and random network coding simultaneously. The highlight

of our contributions is a multicast scheduling framework that exploits potential benefits

made possible by cooperative communication in the realistic context of MBS in WiMAX.

80

Chapter 5. Cooperative Multicast Scheduling with Network Coding in WiMAX81

The framework is formulated as a set of optimization problems, by jointly considering

relay assignment, channel allocation and power control, which are very critical for efficient

cooperative communication. Both theoretical and practical solutions are provided, and

then evaluated in extensive simulations. Corroborating our intuition, our protocols are

able to improve multicast throughput substantially. With the support of effective MBS,

WiMAX improves its performance.

5.1 Problem Formulation

In the network, the Base Station (BS) multicasts data and Mobile Stations (MSs) collect

the data in the downlink. According to the conventional multicast scheduling as shown

in Fig. 5.1(a), the BS has to multicast data using robust modulation and coding schemes

to ensure the reliable transmissions to all MSs. In the example in Fig. 5.1(a), we assume

the multicast rate is 5 packets per second. Thus, the total throughput at MS1 and MS2

is 10 packets per second. However, this reliability under-utilizes the wireless bandwidth,

as the MSs in good channel conditions (MS2 in this example) get data in a conservative

low rate.

For a given multicast session, different downlink users actually experience different

channel conditions, and the same channel experiences different gains on different trans-

mission links, especially when user mobility is considered. This diversity may become

a positive factor in multicast sessions, if we exploit its potential advantages by allowing

users to cooperatively contribute to each other as relays. Such cooperative communication

has been shown to improve throughput of multiple unicast sessions by simultaneously

exploring the broadcast nature of a shared wireless channel and the cooperation among

multiple users [54], but not fully explored and employed in multicast scheduling yet,

especially in WiMAX MBS.

As we stated in Chapter 3 and Chapter 4, the adoption of OFDMA in WiMAX

Chapter 5. Cooperative Multicast Scheduling with Network Coding in WiMAX82

makes the use of multiple orthogonal sub-channels realistic, which allows for the ad-

ditional convenience of supporting concurrent transmissions via different sub-channels

without interference. However, multicast protocols that are currently proposed in MBS

are primitive in nature, as they fail to embrace this unique advantages of WiMAX, and

to take advantage of both channel and cooperative diversity to improve the multicast

performance.

In order to take advantage of all the benefits stated above and improve the per-

formance in MBS of WiMAX, we study multicast scheduling problem by considering

multiple hops, multiple paths, and multiple channels at the same time, rather than the

system models with a single shared channel. The potential protocols are able to dy-

namically assign multicast users as relays, and ask them to cooperatively transmit data

to other peers. The basic idea, explained intuitively, is that users with good channel

conditions can forward the received data to the remaining users who need help.

In this case, the Base Station may use a much higher rate to multicast data to all

users, leading to more efficient use of bandwidth. As shown in Fig. 5.1(b), the BS

multicasts data with 10 packets per second, with much higher rate than the conventional

multicast scheduling in Fig. 5.1(a). Under this rate, MS2 still reliably receives all the

packets due to its good channel condition, while MS1 only receives 70% as it is farther

from the BS. Taking advantage of relays which are enabled in WiMAX, we ask MS2

who is close to MS1 to cooperatively transmit data to it through a separate sub-channel,

aiming to compensate its loss. Via different paths, MS1 receives data simultaneously

from both BS and MS2 and is able to collect 10 packets per second. Benefited from

this cooperative communication, the total throughput on MS1 and MS2 dramatically

increases to 20 packets per second. To get more gains, the BS even can use higher

multicast rate. Although none of MSs is able to correctly receive all the data reliably

(In the example, MS5, MS6 and MS7 get data directly from BS by 90%, 50% and 80%

respectively), they could contribute to each other to achieve reliable transmissions with

Chapter 5. Cooperative Multicast Scheduling with Network Coding in WiMAX83

MS1 MS2

MS3

MS5 MS6

MS7

BS

MS4

(a) Conventional multicast scheme

0.8

0.5

1

0.9

1

10.7

1

MS1

MS2

MS5

MS6MS7

MS4

MS3

BS

1

1

(b) Cooperative multicast scheme

Figure 5.1: Illustrative examples to show the advantages of cooperative multicast schedul-

ing with random network coding in WiMAX. The number on each link in (b) indicates

the packet delivery rate from the BS to the MS.

higher throughput, as shown in Fig. 5.1(b).

The bad news, however, is that it is challenging to schedule transmissions in a coop-

erative fashion. Relays do not have sufficient knowledge on which packets their neighbors

need. Blindly “pushing” packets that are not needed to other peers will incur a substan-

tial degree of overhead. To address this challenge, we again may take advantage of the

favorable rateless properties of random network coding. With random network coding, all

packets are encoded with random linear codes, and all coded data blocks could be consid-

ered equally useful and innovative. With the data fully mixed, relays can freely “push”

innovative blocks to their downlink multicast members. Without dictating which packet

is from which source, receivers only need to “hold” a “bucket” and collect a sufficient

amount of data from their upstream nodes. With the help of random network coding,

the overhead can be substantially mitigated in cooperative communication. The Base

Station only needs to multicast coded blocks in a rateless fashion, until all users are able

to reconstruct the original data by receiving a sufficient number of linearly independent

Chapter 5. Cooperative Multicast Scheduling with Network Coding in WiMAX84

coded blocks, regardless of their channel conditions.

The design objective of multicast scheduling with cooperative communication and

random network coding in WiMAX is to realize all the potential benefits described in

these intuitive examples. To achieve such an objective, there are a number of practical

challenges:

B How to dynamically assign multicast users as relays and apply random network

coding in cooperative communication to tightly fit in the design of WiMAX MBS?

B How to optimally allocate channels for cooperative communication to obtain max-

imum benefits on multicast performance even with limited amount of bandwidth?

B How to efficiently allocate power for cooperative communication when the energy

on relays is highly constrained?

Our responses to these challenges constitute the flow of presentation in this chapter.

5.2 Multicast Scheduling Framework

We concentrate on the multicast scheduling in the time-slotted WiMAX MBS, where

the Base Station (BS) serves as the multicast sender and keeps on broadcasting a big

file, and the Mobile Stations (MSs) (also referred to as nodes) are the participating

users in multicast sessions. Throughout the chapter, we assume quasi-stationary channel

conditions: any node’s channel condition remains the same during a given time slot, and

it varies independently from one time slot to another. The channel quality information on

each link can be effectively estimated [61] and fully captured by the BS through Channel

State Information (CSI) messages exchanged between the BS and each MS periodically

in WiMAX [9]. The objective is to find the optimal multicast rate, as well as the most

efficient cooperative communication schedule, to maximize the aggregate throughput on

all users under a proportional fairness criteria which is able to strike a good balance

Chapter 5. Cooperative Multicast Scheduling with Network Coding in WiMAX85

between utilization and fairness and its robustness with respect to changes in topology

and power constraints [67]. We perform scheduling at each time slot, thus the overall

performance will be optimized in the long term [67].

5.2.1 Optimizing Multicast Scheduling

The objective of the multicast scheduling can be stated as,

maxR(t)

∑i∈ζ

Ui(t)

ri(t)(5.1)

where R(t) denotes the multicast rate at time slot t. If modulation and coding scheme m

(index) is used, R(t) = Rm(t), where m ∈ {1, 2, · · · , 6}, as there are mainly six schemes

according to IEEE 802.16 standard [9]. ri(t) denotes the average throughput at node

i over time horizon [1, t], which is kept track at each node and reported to the BS. It

shows the consideration of proportional fairness on multicast users. ζ is the set of nodes

in MBS, and the total number is G.

Ui(t) is the throughput on node i at time slot t in Eq. (5.1), taking account for

the transmissions both from BS directly, and from cooperative communication. At the

starting point, we assume there is a channel pool with sufficient number of sub-channels,

and each link can be assigned one sub-channel for cooperative communication if there

exists such opportunities. We will study more complicated and realistic cases on channel

and power allocation for cooperative communication in the following sections. All nodes

work in the full-duplex mode and are equipped with multiple radios which support con-

current communication with multiple nodes in both downlink and uplink via separate

sub-channels. Random network coding is applied in the transmissions, with which all the

packets are considered to be fully random and linearly independent with high probability.

Thus, we calculate Ui(t) by,

Ui(t) = Sm,i(t)Rm(t) +∑g∈ζ

Rgi(t) (5.2)

Chapter 5. Cooperative Multicast Scheduling with Network Coding in WiMAX86

Sm,i(t) ∈ [0, 1] is the packet deliver rate from the BS to node i when modulation and

coding scheme m is used at time slot t. Exact closed-form packet deliver rate under coded

modulations is not available, and we calculate it by using an accurate approximation for

packet error rate in [52]. Note we specifically denote the multicast rate at time slot t as

Rm(t) (m ∈ {1, · · · , 6}) to indicate that Sm,i(t) depends on the multicast rate selection.

Rgi(t) (∀g, i ∈ ζ) is the maximum transmission rate that can be achieved on the link

from node g to node i under certain channel conditions. It is subject to the following

constraints:

0 ≤ Rgi(t) ≤ Cgi(t) (5.3)

Rgi(t) ≤ max{0, Bg(t)−Bi(t)

T} (5.4)

(5.3) shows that the cooperative transmission rate is bounded by the capacity on the

link (denoted as Cgi(t)). At the same time, this rate is limited by the amount of innovative

data that node g is able to contribute to node i. As random network coding is employed,

a packet is innovative (or referred to as useful or new) if it is linearly independent from

the other packets from the same segment. Checking for independence can be done using

simple Gaussian Elimination. As we assume the packets are fully random and linearly

independent with high probability, we can use (5.4) to describe this constraint, where

Bg(t) denotes the amount of innovative data buffered at node g at time slot t, and Bi(t)

indicates the same information at node i. T is the duration of one time slot. It is easy

to get from this constraint: Rgi(t) = 0, if g = i.

Now we can see from Eq. (5.2) that Sm,i(t)Rm(t) represents the throughput from BS,

and∑

g∈ζ Rgi(t) describes the cooperative throughput. The total throughput Ui(t) is also

constrained as the total data that each node receives can not exceed the amount the BS

Chapter 5. Cooperative Multicast Scheduling with Network Coding in WiMAX87

is able to provide,

Ui(t) ≤t∑

h=1

R(h)− Bi(t)

T⇒

∑g∈ζ

Rgi(t) ≤t−1∑h=1

R(h)− Bi(t)

T+ (1− Sm,i(t))Rm(t) (5.5)

Overall, the multicast scheduling can be formulated as the optimization problem with

the objective of (5.1), subject to (5.2) - (5.5). As there are six modulation and coding

schemes, we can solve it using exhaustive search for all six possible schemes to get the

optimal solution.

5.2.2 Protocol Design

We design the multicast scheduling protocol based on the optimization above and by

applying random network coding in the transmission. The BS holds all the original data,

and separates the data into segments. Random network coding is performed within the

segment as the same fashion of MRNC presented in Chapter 3. The BS multicasts the

coded blocks in a rateless fashion, using the rate determined by solving the optimization

problem we formulated above at each time slot. When a node receives a packet (coded

block), it checks whether it contains new information, and ignores non-innovative packets.

When performing cooperative communication, the node produces new coded blocks by

creating random linear combinations of the coded blocks it has correctly received from

the same segment and transmits them to its neighbors (the nodes within the sender’s

transmission range). Note the recoded blocks are still the linear combination of the

original data blocks.

All the nodes collect the data and perform decoding, with which the node is able to

recover the entire original segment immediately after sufficient number of independent

coded blocks have been received for a segment, and sends the ACK back to the BS. When

the BS receives the ACKs from all the nodes, it first multicasts a message to inform all

Chapter 5. Cooperative Multicast Scheduling with Network Coding in WiMAX88

nodes that the transmission for current segment is finished, and then starts to proceed

the next segment. Upon receiving such message, all nodes flush the buffer and reset the

time slot index t = 0, and also start the cooperative transmission for the next segment

instead of the transmissions for the current segment.

5.2.3 Are Cooperative Communication and Random Network

Coding Helpful?

We now resort to extensive simulations to evaluate the usefulness of cooperative commu-

nication and random network coding. To be realistic, the simulations are performed by

emulating WiMAX MBS with typical parameters according to IEEE 802.16 standard [9]

and WiMAX system evaluation methodology released by WiMAX forum. The evaluation

is performed under the following scenario. The BS multicasts a large file to all MSs. To

provide realistic time-varying channel conditions, each MS is allowed to move randomly

in the service area of the BS, and its initial location is randomly chosen in the service

region. We apply multi-path Rayleigh fading in the transmission, since the MS keeps on

moving.

To evaluate the performance, we compare four multicast scheduling protocols: co-

operative multicast scheduling with random network coding (denoted as “COOP-NC”),

cooperative multicast scheduling without random network coding (denoted as “COOP”),

optimal multicast scheduling (denoted as “OPT”), and optimal multicast scheduling

with cooperative bandwidth (denoted as “OPT-M”). “COOP-NC” is performed under

the design described in this section. “COOP” also follows this design, but without ran-

dom network coding. MSs just randomly send the data in the buffer to their neighbors.

“OPT” is the optimal scheduling protocol without applying cooperative communication

and random network coding. We adopt the protocol in [48] and have simulated it to

the best of our knowledge according to all the available details presented in the chapter.

“OPT-M” is also based on “OPT”, but the BS uses more bandwidth by applying all the

Chapter 5. Cooperative Multicast Scheduling with Network Coding in WiMAX89

sub-channels assigned for cooperative communication in “COOP-NC” in multicasting.

Thus, “COOP-NC” and “OPT-M” consume the same amount of bandwidth, with which

the comparison is more fair.

Fig. 5.2(a) shows the performance on average throughput over time (1000-second

simulation) of all protocols as a function of increasing number of MSs active in MBS.

We observe from the results that “COOP-NC” performs best. Compared with “OPT”,

a 72% gain is achieved. For more fair comparison, “COOP-NC” shows its advantages by

outperforming “OPT-M” with a margin of 58%. Such a throughput advantage should

be considered substantial by any standard. It coincides with our intuition that multicast

scheduling with cooperative communication and random network coding naturally fits in

the design of WiMAX MBS and is able to achieve significant throughput improvement due

to its effective use of wireless spectrum. Specifically, we examine the usefulness of random

network coding. Evident from the results, “COOP-NC” outperforms “COOP” by 20%

as random network coding effectively reduces the overhead. Another interesting result

we get is the margin that “COOP-NC” and “COOP” outperform “OPT-M” and “OPT”

becomes more substantial with increasing number of MSs. This observation indicates

more MSs create higher degree of cooperation which is able to benefit more on throughput

performance.

To further explore the advantages of cooperative communication and random network

coding in multicast scheduling, we examine the performance on average multicast rate at

the BS with the results shown in Fig. 5.2(b). When the number of MSs increases, the BS

gradually uses higher multicast rates to transmit data when cooperative communication

and random network coding are applied, which exactly shows the multicast bandwidth

at the BS is more efficiently utilized. This result verifies and confirms — from a different

aspect — the advantages of our protocol in WiMAX MBS.

Chapter 5. Cooperative Multicast Scheduling with Network Coding in WiMAX90

0 10 20 30 40 50150

200

250

300

350

Number of MSs

Aver

age T

hrou

ghpu

ts (K

bps)

COOP-NCCOOPOPT-MOPT

(a) Throughput vs. Number of MSs

0 10 20 30 40 50200

250

300

350

400

Number of MSs

Mult

icast

Rate

(Kbp

s)

COOP-NCOPT-MOPT

(b) Multicast rate vs. Number of MSs

Figure 5.2: Throughput performance of four multicast scheduling protocols in a realistic

WiMAX MBS scenario. Cooperative multicast scheduling with random network coding

is able to achieve substantial throughput improvement by effectively utilizing the scarce

wireless bandwidth.

5.3 Cooperative Multicast Scheduling with Channel

Allocation

In practical systems like WiMAX, the OFDM channels are scarce resources and the

number of channels to support cooperative communication is limited. Thus, it is very

critical to efficiently allocate the channels for cooperative communication in the schedul-

ing. Moreover, there are potential channel diversity gains in the networks, as sub-channel

experiencing gain could vary from one link to another, allowing for the cooperate links to

be assigned their best channels. In this section, we study the optimal multicast scheduling

with constrained bandwidth resources, exploiting all the benefits provided by multi-user,

multi-channel and cooperative diversity.

Chapter 5. Cooperative Multicast Scheduling with Network Coding in WiMAX91

5.3.1 Optimizing Performance with Limited Bandwidth

Under limited resources, the scheduling turns to be a joint optimization problem (denoted

as COOP-CA-NC), whose objective is to find not only the optimal multicast rate Rm but

also efficient centralized channel allocation scheme to maximize overall throughput under

the fairness criteria. To study it, we set a binary function K(n)gi ∈ {0, 1} to capture the

assignment of sub-channel n to the cooperative transmission link from node g to node

i, where n ∈ χ and χ denotes the set of sub-channels that are available for cooperative

communication. The set of feasible assignments is denoted as K. To avoid interference

in the cooperative communication, we set one sub-channel only can be assigned to one

link,

∑g∈ζ

∑i∈ζ

K(n)gi ≤ 1 ∀n ∈ χ (5.6)

By considering the channel allocation, the throughput on each user (Eq. (5.2)) should

be updated as follows,

Ui = Sm,iRm +∑g∈ζ

∑n∈χ

K(n)gi R

(n)gi (5.7)

where R(n)gi is the maximum rate that can be achieved when sub-channel n is assigned to

the link from node g to node i.

Now we are ready to state the optimization objective as,

maxR,K

∑i∈ζ

Ui

ri

=∑i∈ζ

Sm,iRm

ri

+∑i,g∈ζ

∑n∈χ

K(n)gi

R(n)gi

ri

(5.8)

As studied in the previous section, we use exhaustive search to get the optimal mul-

ticast rate. When we fix Rm in the search each time, Sm,i can be determined. ri is

pre-determined since it is the average throughput before time slot t. Thus, the joint

optimization problem can be decomposed, and the scheduling is reduced to the channel

allocation problem for each search as stated in the following (denoted as CA-NC),

maxK

∑i,g∈ζ

∑n∈χ

K(n)gi ω

(n)gi (5.9)

Chapter 5. Cooperative Multicast Scheduling with Network Coding in WiMAX92

where

ω(n)gi =

R(n)gi

ri

(5.10)

subject to (5.6), and following constraints (updating (5.3) - (5.5)):

0 ≤ ω(n)gi ≤

C(n)gi

ri

∀g, i ∈ ζ, n ∈ χ (5.11)∑n∈χ

K(n)gi ω

(n)gi ≤ max{0, Bg −Bi

Tri

} ∀g, i ∈ ζ (5.12)

∑g∈ζ

∑n∈χ

K(n)gi ω

(n)gi ≤

t−1∑h=1

R(h)

ri

− Bi

Tri

+(1− Sm,i)Rm

ri

(5.13)

Overall, we can get the optimal solution of joint optimization problem by exhaustive

search and solving channel allocation problem. The procedure is stated in Algorithm 1.

However, the main problem of Algorithm 1 is the difficulty of solving channel alloca-

tion problem CA-NC. It is a mixture integer program (MIP) which is NP hard in general.

We formulate it to a maximum weighted bipartite matching (WBM) problem which is

equivalent to the original problem and can be solved optimally with polynomial time

complexity in terms of the number of MSs. Construct a bipartite graph A = (Φ× χ, E).

The vertices in Φ denote all the possible cooperative links (e.g. (1, 2) indicates the trans-

mission link from node 1 to node 2. Note it is different from (2, 1) which represents

the transmission link from node 2 to node 1). The set of sub-channels for cooperative

transmissions is denoted by the vertex set χ.

The edge set E corresponds to |Φ|×|χ| edges connecting all possible pairs. The weight

of each edge carries ω(n)gi as we defined in Eq. (5.10), which represents the maximum

cooperative transmission rate that can be achieved if sub-channel n is assigned to link

(g, i) subject to the proportional fairness criteria. In WBM, we initially set ω(n)gi =

1ri

min{R(n)gi , max{0, Bg−Bi

T}}. We exclude all links from Φ whenever ω

(n)gi = 0. |Φ| may

be not equal to |χ|. Thus we patch void vertices to χ or Φ to make |Φ| = |χ|. If a edge

connects any void node, its weight is also set to be zero.

Chapter 5. Cooperative Multicast Scheduling with Network Coding in WiMAX93

Algorithm 1 Multicast scheduling with channel allocation1. Set Q = 0.

2. for m = 1 to 6 do

3. Set QMR =∑

i∈ζSm,iRm

ri.

4. Solve CA-NC. The optimal objective value is denoted as QCA and the optimal

channel allocation is KCA.

5. if QMR + QCA > Q then

6. Q = QMR + QCA.

7. ROPT = Rm.

8. KOPT = KCA.

9. end if

10. end for

11. ROPT is the optimal multicast rate and KOPT is the optimal scheme for channel

allocation.

Given the above graphical setup, channel allocation problem can be solved by solving

a WBM problem. The intuition is shown in Fig. 5.3. If vertex (g, i) in Φ and vertex n

in χ are matched, we assign sub-channel n to link (g, i) and set K(n)gi = 1. The WBM

problem can be solved using existing network flow algorithms such as the cost scaling

algorithm [13].

Solving the WBM problem above may violate a few constraints. First, we consider

constraint (5.12). The violation may happen when more than one sub-channels are

assigned to one cooperative link, and the link capacity via multiple sub-channels may be

over large. To solve this problem, we assign sub-channels by performing WBM in rounds.

In each round, we remove the sub-channels that are already assigned in the previous round

from set χ. Particularly, we update the weight on each edge by considering the constraint

(5.12). Then, we solve the WBM problem in a new round.

Another constraint may be violated is (5.13). To solve this problem, we check whether

Chapter 5. Cooperative Multicast Scheduling with Network Coding in WiMAX94

(1,2)

(2,1)

(1,3)

... ...

1

2

3

... ...

! !

"(n)gi = 0"(n)

gi

Void Vertices

Regular Vertices

Figure 5.3: Solving the channel allocation problem using maximum weighted bipartite

matching algorithm.

the throughput of cooperative communication on each node i exceeds the upper limit

at each round. If so, we favor the cooperative links with highest rates where efficient

transmissions can be achieved. We assign sub-channels to those links and release the

sub-channels assigned to other links. It is easy to find the solution by a simple search.

After that, we have to omit all the links from Φ which cooperatively contribute to node i,

since the maximum throughput on this node has already been reached. We can not assign

any more sub-channels to these links in the following rounds. Overall, the approach is

summarized in Algorithm 2.

5.3.2 Channel Allocation with Channel Reuse

To fully utilize the available resources, we further exploit the advantages provided by the

spatial reuse in the cooperative communication. It is straightforward that two links which

do not include each other in the interference region could use the same sub-channels for

communication without interference. The interference information in the network can be

collected in a distributed fashion. If two nodes could correctly overhear the frequently

exchanged handshake messages with each other (the transmission power is assumed to

Chapter 5. Cooperative Multicast Scheduling with Network Coding in WiMAX95

Algorithm 2 Channel allocation algorithm using maximum weighted bipartite matching

1. Initiate K(n)gi = 0, ∀(g, i) ∈ Φ,∀n ∈ χ.

2. Define Bgi := max{0, Bg−Bi

Tri},∀(g, i) ∈ Φ.

3. repeat

4. Construct the bipartite graph, and patch the void nodes to make |Φ| = |χ|.

5. Solve the WBM problem, and get the solutions as K(n)gi .

6. for each i ∈ ζ do

7. if (5.13) is violated then

8. Define Tg :=∑

n∈χ K(n)gi ω

(n)gi ,∀g ∈ ζ.

9. Define D1, D2, · · · , DG to be the sorted array of Tg (∀g ∈ ζ) in descending

order.

10. for v = 1 to G do

11. if∑

g′≤v Dg′ ≥

∑t−1h=1

R(h)ri

− Bi

Tri− (1−Sm,i)Rm

rithen

12. Define ξ := {g|∃g′> v, st. Tg = Dg

′}.

13. Release channel assignment on (g, i),∀g ∈ ξ.

14. Exclude links (g, i) ∀g ∈ ζ from Φ .

15. break

16. end if

17. end for

18. end if

19. end for

20. for each (g, i) ∈ Φ do

21. Bgi = Bgi −∑

n∈χ K(n)gi ω

(n)gi .

22. for each n ∈ χ do

23. ω(n)gi = min{R

(n)gi

ri, Bgi}.

24. end for

25. end for

26. Exclude the assigned channels in χ.

27. until All channels or all links are excluded

Chapter 5. Cooperative Multicast Scheduling with Network Coding in WiMAX96

be equal for all nodes), we mark out that they are within each other’s interference zone.

An “interference table” I is defined as follows,

Iki =

1 If node i is in interference zone of node k

0 Otherwise

where k, i ∈ ζ. Nodes will periodically update this table and send interference information

to the BS. To prevent collision, channel reuse is not allowed in the interference zone. Thus,

the channel assignment should follow the following constraints,

∑i∈ζ,i6=k

Iki

∑g∈ζ

K(n)gi ≤ 1 ∀n ∈ χ, ∀k ∈ ζ (5.14)∑

g∈ζ

K(n)gi ≤ 1 ∀n ∈ χ, ∀i ∈ ζ (5.15)

Thus, the channel allocation problem should be updated with the consideration of

channel reuse, which can be stated as (denoted as CA-NC-reuse),

maxK

∑i∈ζ

ai (5.16)

where

ai =∑n∈χ

∑g∈ζ

K(n)gi ω

(n)gi (5.17)

subject to (5.11) - (5.15)

It is also a MIP, and we use the randomized rounding procedure (Algorithm 3) to

solve it with polynomial time complexity in terms of the number of MSs.

As designed in Algorithm 3, the rounding procedure ensures that all constraints are

satisfied. We note (5.12), (5.13) and (5.14) are satisfied with high probability in practice,

since the rate of cooperative communication is relatively much lower than the multicast

rate and the transmission range of MSs is relatively much smaller than the serving area

of the BS due to the power and bandwidth constraints. Thus, we can ignore them in the

Chapter 5. Cooperative Multicast Scheduling with Network Coding in WiMAX97

Algorithm 3 Randomized rounding algorithm for channel allocation with channel reuse

1. Solve its relaxation (convex) with K(n)gi being relaxed to [0,1]. Let the optimal frac-

tional solutions be K∗(n)gi (∀g, i ∈ ζ, ∀n ∈ χ).

2. Initiate K(n)gi = 0 (∀g, i ∈ ζ, ∀n ∈ χ).

3. for each g, i ∈ ζ, n ∈ χ do

4. Round K(n)gi = 1 with probability K

∗(n)gi .

5. if K(n)gi = 1 then

6. if (5.12) or (5.13) or (5.14) is violated then

7. Set K(n)gi = 0.

8. else

9. Set K(n)ji = 0, ∀j 6= g.

10. end if

11. end if

12. end for

13. The optimal rounding solutions are K(n)gi .

Chapter 5. Cooperative Multicast Scheduling with Network Coding in WiMAX98

rounding procedure (line 6 in Algorithm 3). Now, we give the approximation factor for

this randomized rounding algorithm under this assumption.

Lemma 5.1 f1jY1 +f2j(1−Y1)Y2 + · · ·+flj(∏l−1

i=1(1−Yi))Yl ≥ (1− (1− 1l)l)∑

1≤i≤l fijYi

whenever Yi ≥ 0 for all i and∑

i Yi ≤ 1 and f1j ≥ f2j ≥ · · · ≥ flj ≥ 0.

Proof: refer to [29]. ut

Theorem 5.1 Algorithm 3 provides an approximation guarantee of at least (1−(1− 1G)G),

where G is the number of multicast users.

Proof: Without loss of generality, for each i ∈ ζ, n ∈ χ, assume that the sorted users

are 1, 2, · · · , G with ω(n)1i ≥ ω

(n)2i ≥ · · · ≥ ω

(n)Gi ≥ 0. The probability that sub-channel n

is assigned to the link (u, i) in randomized rounding algorithm is∏u−1

j=1 (1−K∗(n)ji )K

∗(n)ui ,

∀u ∈ ζ. Thus, the expected throughput contribution on node i to the objective function

(5.16) can be stated as,G∑

u=1

(u−1∏j=1

(1−K∗(n)ji )K

∗(n)ui )ω

(n)ui

Using Lemma 5.1, we have,

∑n∈χ

G∑u=1

(u−1∏j=1

(1−K∗(n)ji )K

∗(n)ui )ω

(n)ui ≥

∑n∈χ

(1− (1− 1

G)G)∑j∈ζ

K∗(n)ji ω

(n)ji =

(1− (1− 1

G)G)∑n∈χ

∑j∈ζ

K∗(n)ji ω

(n)ji =

(1− (1− 1

G)G)a∗i ∀i ∈ ζ

a∗i is the throughput contribution of node i to the objective function (5.16) in the

optimal fractional solution. Thus, we have the expected contribution of node i to the

objective function in the rounding solution E[ai] as:

E[ai] ≥ (1− (1− 1

G)G)a∗i

Chapter 5. Cooperative Multicast Scheduling with Network Coding in WiMAX99

Thus, we have, ∑i∈ζ

E[ai] ≥ (1− (1− 1

G)G)∑i∈ζ

a∗i

ut

5.3.3 How efficient are the channels allocated?

To study the impact of the channel allocation and identify the performance gains offered

by cooperative communication and random network coding with limited bandwidth re-

sources, we perform a set of simulations under the same scenario in the previous section.

Fig. 5.4(a) shows the average throughput over time (1000 seconds) as the function of

increasing number of active MSs when the number of sub-channels is limited as 100.

“COOP-CA-NC” which performs the multicast scheduling protocol with channel allo-

cation as we designed in this section beats the same protocol without random network

coding (“COOP-CA”) by 19%, and outperforms “OPT-M” and “OPT,” by delivering

65% and 94% improvement respectively. It demonstrates: by efficiently allocating sub-

channels, cooperative communication with random network coding is helpful to achieve

significant throughput improvement with very limited amount of bandwidth resources. Fur-

ther, we perform the simulations with fixed number of MSs, but with increasing number

of sub-channels. Shown in Fig. 5.4(b), “COOP-CA-NC” outperforms others by a sub-

stantial margin. This improvement becomes more salient as the number of sub-channels

increases. The intuition is: more bandwidth resources for cooperative communication will

benefit more on multicast performance.

To evaluate the performance gains provided by channel reuse, we specifically con-

duct simulations by performing multicast scheduling with the design of channel reuse.

From Fig. 5.4, we observe that multicast scheduling with channel reuse under randomized

rounding algorithm (denoted as “Reuse-rounding”) performs close to the optimum (de-

noted as “Reuse-optimal”) within 95%. Moreover, “Reuse-rounding” further improves

the throughput by 8% in average compared with “COOP-CA-NC” which already pro-

Chapter 5. Cooperative Multicast Scheduling with Network Coding in WiMAX100

10 20 30 40 50100

150

200

250

300

350

400

Number of MSs

Aver

age T

hrou

ghpu

ts (K

bps)

Reuse-optimalReuse-roundingCOOP-CA-NCCOOP-CA

OPT-MOPT

(a) Throughput vs. No. of MSs

20 40 60 80 100100

150

200

250

300

350

400

Number of Sub!channels

Aver

age T

hrou

ghpu

ts (K

bps)

Reuse-optimalReuse-roundingCOOP-CA-NCCOOP-CA

OPT-M

OPT

(b) Throughput vs. No. of channels

Figure 5.4: The performance of cooperative multicast scheduling with random network

coding when the number of cooperative sub-channels is limited. The protocols with and

without channel reuse algorithm are both evaluated.

vides very satisfactory performance as we evaluated above. These results highlight the

benefits achieved by our proposed protocols.

5.4 Cooperative Multicast Scheduling with Power

Allocation

One of the most critical problems in the practical systems is that the MS is very energy-

constrained. Thus, the cooperative communication may not be fully performed with

limited power on relays. In this section, we study the multicast scheduling from a different

aspect, aiming to maximize the throughput by effectively allocating power on relays.

5.4.1 Maximizing Throughput with Limited Power

Let S(n)gi denote the power that node g transmits data to node i if channel n is assigned

on this link. S denotes the set of feasible power allocation schemes. As we note, the

Chapter 5. Cooperative Multicast Scheduling with Network Coding in WiMAX101

power for cooperative communication on each node is limited,

∑n∈χ

∑i∈ζ

S(n)gi ≤ Pg ∀g ∈ ζ (5.18)

where Pg is the power limit on each node.

Under the power constraint, we update constraint (5.11):

0 ≤ ω(n)gi ≤ C

(n)gi = BW/ri · log2(1 + S

(n)gi /σ

(n)gi ) (5.19)

where BW denotes the channel bandwidth (the sub-channels are with equal bandwidth)

and σ(n)gi is the noise on the link.

Instead of only considering channel allocation in multicast scheduling as we designed

in the previous section (CA-NC and CA-NC-reuse), we aim to optimize the performance

by jointly accounting for both channel and power allocation. We state this new problem

(denoted as CA-PA) as follows,

maxK,S

∑g,i∈ζ

∑n∈χ K

(n)gi ω

(n)gi (5.20)

subject to (5.12) - (5.15), (5.18) and (5.19)

We take dual problem by introducing a set of dual variables λg ≥ 0, g ∈ ζ. Thus, the

objective (5.20) can be rewritten as,

maxK,S

∑g,i∈ζ

∑n∈χ K

(n)gi ω

(n)gi +

∑g∈ζ λg(Pg −

∑n∈χ

∑i∈ζ S

(n)gi ) (5.21)

subject to (5.12) - (5.15), and (5.19)

As proved in [76], the original optimization problem (5.20) can be solved by solving

its dual (5.21) with nearly zero duality gap when G is sufficiently large. We use the dual

update method to solve the problem as shown in Algorithm 4.

The hard part is to solve CA-PA even under fixed λ which is obviously nonconvex

(MIP). Here, we adopt a heuristic approach with polynomial time complexity in terms

of the number of MSs as given in Algorithm 5. This algorithm gives a good solution

and λ always can be converged in various set-ups we tested.

Chapter 5. Cooperative Multicast Scheduling with Network Coding in WiMAX102

Algorithm 4 Dual update method to solve joint channel and power allocation problem

Initialize λ (vector of the dual variables).

repeat

Solve CA-PA with fixed λ.

Update λ using the ellipsoid method [76].

until λ is converged.

Algorithm 5 Heuristic algorithm to solve joint channel and power allocation problem

under fixed λ

Step 1: For the fixed λ, solve its relaxation (convex) with K(n)gi being relaxed to [0,1].

Let the optimal channel allocation solutions be K∗(n)gi (∀g, i ∈ ζ, ∀n ∈ χ).

Step 2: Round K(n)gi = 1 with probability K

∗(n)gi (∀g, i ∈ ζ, ∀n ∈ χ). If K

(n)gi = 1, check

whether all constraints are satisfied. Set K(n)gi = 0 if not.

Step 3: Solve the convex optimization problem with fixed K(n)gi , by taking S

(n)gi (∀g, i ∈

ζ, ∀n ∈ χ) as the variables. Let the optimal power allocation solutions be S∗(n)gi .

5.4.2 What’s the Impact of Power?

Finally, we evaluate the performance of our protocol with power allocation. The sim-

ulations are performed under increasing power limit at MSs, and Fig. 5.5(a) shows the

average throughput across time and 50 MSs with same power limit. “COOP-CA-PA-

NC” represents our cooperative multicast scheduling with random network coding, and

especially applies both channel and power allocation algorithms as we designed in this

section. It is not a surprise that “COOP-CA-PA-NC” outperforms all other protocols

(“COOP-CA-PA” is the protocol with the same design as “COOP-CA-PA-NC” but with-

out random network coding) with substantial gains. By efficient power allocation, coop-

erative communication with random network coding could be well performed and achieve

significant performance improvement, even with highly limited power on relays. We ob-

serve from the results that the throughput increases dramatically as the transmission

Chapter 5. Cooperative Multicast Scheduling with Network Coding in WiMAX103

power rises up, which shows more power the MSs use for cooperative communication

could achieve more gains.

0 5 10 15 20 25150

200

250

300

350

Transmission Power (dBm)

Aver

age T

hrou

ghpu

ts (K

bps)

COOP-CA-PA-NCCOOP-CA-PAOPT-MOPT

(a) Throughput vs. Power Limit

2 4 6 8 10160

180

200

220

240

260

280

Power Variance (dBm)

Aver

age T

hrou

ghpu

ts (K

bps)

COOP-CA-PA-NCCOOP-CA-PAOPT-MOPT

(b) Throughput vs. Standard Variance of

Power Limit

Figure 5.5: The performance of multicast scheduling with our power allocation algorithm

in a power-constrained MBS.

Another set of simulations specifically study the impact of power on multicasting.

We examine the throughput under increasing standard variances of power used for co-

operative communication across different MSs. Fig. 5.5(b) shows that the throughput

decreases as the variance increases. We can intuitively conclude from this observation:

maximum throughput performance gains can be obtained if each node performs coopera-

tive communication by equally using its maximum power. In our future work, we may

study how to motivate MSs to make contributions to the networks for multicasting.

5.5 Overhead Analysis

In closing, we study the protocol overhead. Base stations in the real systems can be

considered as server-level computers, thus have no power and computation constraints.

Nowadays, the mobile devices, like a cell phone, normally have sufficient memory cache

and strong computing ability. The new generation iPhones are equipped with micropro-

Chapter 5. Cooperative Multicast Scheduling with Network Coding in WiMAX104

cessors and can even run 3-D computer games smoothly. Although our protocol may

consume some computation power and memory if deployed in the mobile devices, the

generated delay should be sufficiently small that can be neglected. Verified by our sim-

ulations, our protocols have an average running time of less than 5 ms (over Intel Core

Duo machine running at 1.83 GHz and a memory of 2 GB), and are therefore suitable

for typical WiMAX with scheduling durations of 5–10 ms. With respect to the commu-

nication overhead, the protocols require MSs to report the channel quality information

(normally 5 bits per message) to the BS. This communication can be performed over the

fast feedback channel in WiMAX and this channel state reporting is originally required

in WiMAX standards [9]. Overall, our proposed protocols generate little communication

overhead within practical limits.

5.6 Summary

In this chapter, we have studied the multicast scheduling service problem, which is one of

the most important issues in WiMAX regarding the quality of services. Previous schedul-

ing protocols in the literature — almost without an exception — has solved the problem

based on a shared-channel single-hop transmission model, which ignores the advantages

provided by both channel and cooperative diversity in WiMAX where multiple chan-

nels are used. In contrast, we consider multicast scheduling with multi-hop multi-path

transmissions over multiple OFDMA channels to fully exploit the advantages provided

by cooperative communication and random network coding. The intuition is that co-

operative communication with random network coding could favor the users with good

channel conditions to enjoy high multicast flow rates from the source and cooperatively

help others with poor channel conditions simultaneously with little overhead. We design

multicast scheduling protocols which are tightly integrated with the design of WiMAX

MBS, and study the critical problems of channel and power allocation for cooperative

Chapter 5. Cooperative Multicast Scheduling with Network Coding in WiMAX105

communication. Theoretical and practical solutions based on optimization are provided

and further evaluated in extensive simulations. The highlight of this chapter is our con-

clusion: multicast performance can be significantly improved by applying cooperative

communication and random network coding with effective use of wireless spectrum.

Chapter 6

Resource Management in Cognitive

WiMAX with Femto Cells

In the last chapter of technical part in this thesis, we extend our study to the communi-

cation architecture level in WiMAX and seek to improve its performance in the scenario

of femto cells. Femto cells are an important cost-effective architecture in WiMAX. With

the proliferation of wireless devices and the surge of demand of various applications sup-

ported in WiMAX, the requirement of bandwidth increases dramatically. Therefore, it

is important to fully utilize the wireless spectrum with femto cells in the networks.

However, traditional WiMAX architectures lack dynamic utilization of spectrum and

have inherent weakness on overlooking the special network characteristics and hence

missing the bulk of channel reuse opportunities. On the other hand, cognitive radio (CR)

[23] has emerged as an important technology to exploit high-degree spectrum reuse, by

allowing spectrum sensing and dynamical spectrum access. Such a technique brings much

flexibility and potentially generates benefits if employed in WiMAX femto cell networks.

However, the collaboration of WiMAX, femto cells, and CRs is barely investigated in the

literature.

In this chapter, we specifically propose a cognitive WiMAX architecture with femto

106

Chapter 6. Resource Management in Cognitive WiMAX with Femto Cells107

cells, where the base station and users are equipped with CRs and intelligently adjusts

power, channel, and other resources to accommodate the entire network ecosystem. In

this design, we develop an optimization framework for location-aware cooperative resource

management, by jointly employing multi-hop cooperative communication, power control,

and fairness, and incorporating user, channel, and cooperative diversities. Evaluated

by the rigorous analysis and extensive simulations, our protocol is near-optimal with

closed-form bounds, achieving substantial performance improvement.

6.1 Network Architecture

WiMAX network architecture with femto cells can be illustrated using the example shown

in Fig. 6.1, where a typical WiMAX network consisting of one macro base station (BS)

and six femto cells, serving two classes of users: primary user (PU) and secondary user

(SU). PUs are fixed inside a certain femto cell and communicate with the corresponding

femto BSs with dedicated channels, enjoying guaranteed quality of services (QoS). SUs

are highly dynamic (can move randomly in the entire area) and communicate directly

with macro BS with best effort services.

As the power used by femto BSs is an order of magnitude less than macro BS, the

serving area of each femto cell is quite limited (shown by shadow circle areas). The smaller

size of femto cells creates abundant opportunities for spatial reuse: the transmissions

outside the femto cells are able to be executed over the same channels used inside femto

cells. Thus, they work in a completely distributed fashion, and the channel availability

in the network is location-dependent and dynamic for SUs due to the bursty channel use

by PUs and SU mobility.

However, traditional WiMAX architectures and MAC-layer protocols are hobbled by

the holdover from cellular networks: they lack dynamic utilization of spectrum holes

and are essentially based on single-hop transmissions, requiring globally available channel

Chapter 6. Resource Management in Cognitive WiMAX with Femto Cells108

resources. The existing state-of-the-art resource management protocols have to carefully

coordinate the transmissions of macro and femto cells in a time-sharing mode [68], which

have inherent weakness on overlooking the special network characteristics and hence

missing the bulk of channel reuse opportunities. For example shown in Fig. 6.1, channel

1 is used by PU 1. Macro BS then can not use this channel to transmit data to SU 2 in

order to avoid interference to PU 1, although SU 2 resides outside the interference region

of PU 1. This is due to the single-hop transmission schedule with a fixed power, leading

to resource under-utilization.

C2

C1

C2C3

C3

C2

Femto Cell 1

Femto Cell 3

Femto Cell 2

Femto Cell 6

1

2

4

5

4

3

2

1

Macro BS

Femto Cell 4

Femto Cell 5

9

7

Femto BS

X

Primary User

Y

Secondary User

8

10

C1

C3

C2

C3

C1

C1

C2

Figure 6.1: An illustrative example of cognitive WiMAX with femto cells.

To solve the problem above, cognitive radio technique can be applied in WiMAX

to form a novel architecture of cognitive WiMAX with femto cells in order to further

improve the performance of WiMAX, with the important and promising femto cell de-

ployment. Different from traditional architectures, wireless devices in cognitive WiMAX

are equipped with frequency-agile CRs that bring convenience for spectrum sensing and

Chapter 6. Resource Management in Cognitive WiMAX with Femto Cells109

adjusting the frequency, power, range, and other variables to accommodate the entire

wireless ecosystem accordingly. With such a flexible radio, rather than confining to a

single-hop transmission, we are able to perform multi-hop cooperative communication,

aiming to fully exploit the spectrum holes. The key observation is that, the set of accessi-

ble channels for different users are different depending on their locations. The requirement

for globally available channels is relaxed, and users use locally accessible channels within

one hop to perform communication, providing abundant transmission opportunities with

channel reuse, and thus substantially improving the channel utilization.

The intuition is shown in Fig. 6.1, where the transmission from macro BS to SU 2 is

not feasible if all channels are occupied in femto cells. With CRs, the macro BS carefully

adjusts its transmission power. In the consequentially tuned transmission range (the

inner circle from macro BS in Fig. 6.1), the macro BS sends data to SU 1 via channel

2 without generating interference to PUs. In tandem, SU 1 relays data to SU 2 using

cooperative transmissions performed on channel 3 which is commonly available for both

the sender and receiver. Similarly, the original infeasible communication from the macro

BS to SU 4 can be performed in two-hop transmission with SU 3 as the relay. Essentially,

we take advantage of the location-dependent characteristics of WiMAX femto cell, and

data issued from BS are propagated via multiple paths and hops over spectrum holes

supported by CRs. Intuitively, wireless channels are effectively utilized by incorporating

user, channel, and cooperative diversities. Such an architecture naturally fits WiMAX

femto cell networks: PUs can use dedicated resources to enjoy guaranteed QoS, while

SUs opportunistically take advantage of spectrum holes to get best effort services without

generating interference to PUs.

In cognitive WiMAX, it is critical to design a efficient resource management frame-

work to accommodate this new designed architecture. Further, it is desirable to im-

plement all the benefits stated above in the resource management protocol by jointly

considering power control, flow routing, cooperative scheduling, interference avoidance,

Chapter 6. Resource Management in Cognitive WiMAX with Femto Cells110

and buffer management. To achieve this objective, we have the following designs:

B We advocate a cognitive WiMAX architecture with femto cells, and provide the

corresponding system models.

B We design a location-aware cooperative resource management protocol, including

flow control policy, buffer management strategy, and channel and power alloca-

tion scheme. It is based on stochastic Lyapunov optimization with performance

guarantees.

B We apply generalized expectation maximization algorithm to efficiently solve the

optimization problems required in the resource management protocol, by fully ex-

ploiting the unique problem structure and network characteristics.

The development of these designs constitutes the flow of presentation in this chapter.

6.2 System Models

6.2.1 Framework Formulation

In cognitive WiMAX with femto cells, both macro BS and SUs are equipped with ultra-

sensitive cognitive radios to perform spectrum sensing and power and frequency adjust-

ment. The network consists of one macro BS and F femto cells with A PUs and N SUs,

sharing C orthogonal channels supported by OFDMA. Each PU resides in a dedicated

femto cell and communicates with the corresponding femto BS over one pre-allocated

channel to support guaranteed QoS. SUs are fully mobile and served opportunistically

by the macro BS without generating interference to PUs. The entire network operates

in a time-slotted fashion, where channel conditions and user actions remain the same

during a given time slot, and vary independently from one time slot to another. Without

loss of generality, we set the time slot duration as 1.

Chapter 6. Resource Management in Cognitive WiMAX with Femto Cells111

Let S(t) = {Sca(t)}A×C represent the channel states on each time slot t. Sc

a(t) = 0

means PU a is using channel c. Otherwise, Sca(t) = 1. We assume the channel availability

state process evolves according to a finite state ergodic Markov chain. Within a time slot,

a SU can access a subset of the channels, potentially depending on its current location

and channel state S(t). This channel accessibility information is concisely represented

by H(t) = {hcn(t)}N×C . hc

n(t) = 1 if SU n can access channel c. Otherwise, hcn(t) = 0.

Macro BS obtains the channel availability information in the entire network via chan-

nel sensing with CRs, and the channel state information can be expressed by a probability

vector Y(t) = {Y ca (t)}A×C according to the sensing results. Each element captures the

probability that channel c is not occupied by PU a at time slot t. Intuitively, the closer

Y(t) is to S(t) (better sensing techniques employed), the smaller interference that can

be potentially generated to PUs.

CRs make it possible for the macro BS and SUs to adaptively use network resources.

We denote the macro BS’s transmission power on each channel as PBS(t) = {P cBS(t)}C .

UBS(t) = {µcn(t)}N×C represents the channel allocation to SUs in a macro cell, where

µn(t) is the binary variable capturing the assignment of channel c to SU n for the trans-

mission from macro BS. We denote SU power allocation using PSU(t) = {P cn(t)}N×C ,

where P cn(t) is the amount of power that SU n uses on channel c. The cooperative trans-

mission scheduling is described by USU(t) = {µcmn(t)}NN×C , each element of which is

a 0 − 1 variable to capture the allocation of channel c to the cooperative transmission

from SU m to SU n. We assume the location of PUs are fixed while the SUs are mobile.

SUs can self-locate themselves using popular techniques applied in mobile phones, such

as GPS.

6.2.2 Models of Resource Management

Spectrum and power resources can be finely tuned and dynamically allocated to macro

and cooperative transmissions, in order to fully utilize the spectrum and take advantage

Chapter 6. Resource Management in Cognitive WiMAX with Femto Cells112

of channel reuse and diversity. According to the network model given above, we have the

following four groups of constraints for resource management.

Power Constraints:

C∑c=1

P cBS(t) ≤ Pmax (6.1)

C∑c=1

P cn(t) ≤ Pmax

n ∀n (6.2)

P cBS(t) · gc

a · Sca(t) ≤ β ∀a, c (6.3)

Inequality (6.1) shows that the total transmission power of the macro BS has an upper

bound Pmax. The power constraints on SUs are represented by (6.2). To avoid interfer-

ence to PUs, the power received by PUs on each channel should not exceed the tolerable

level β, if the corresponding channel is being used. Inequality (6.3) describes this set of

constraints, where gca is the propagation gain from macro BS to PU a at channel c and

it can be calculated by gca = d−j

a . da ≥ 1 is the distance between BS and PU a, where j

is the path loss index [64].

Channel Constraints:

0 ≤N∑

n=1

µcn(t) ≤ 1 ∀c (6.4)

µcmn(t) ≤ hc

m(t), µcmn(t) ≤ hc

n(t) ∀m, n, c (6.5)

µcmn(t) ≤ lcm(t), µc

mn(t) ≤ lcn(t) ∀m, n, c (6.6)

Inequality (6.4) indicates that the macro BS can not use the same channel to transmit

data to multiple SUs. (6.5) shows that cooperative communication is constrained by the

channel accessibility represented by H(t) with the dynamic spectrum access technique.

(6.6) shows the constraint imposed by the channel availability on each SU with regards

to the transmission from macro BS to SUs. Similar to H(t), we use L(t) = {lcn(t)}N×C

to capture this information:

lcn(t) =

1 If P c

BS(t) · gcn(t) ≤ γ

0 Otherwise

(6.7)

Chapter 6. Resource Management in Cognitive WiMAX with Femto Cells113

The definition of L(t) indicates whenever the multicast power received by a SU exceeds

the threshold γ on a channel, this channel should be considered to be unavailable, and

can not be assigned for cooperative transmission. gcn(t) in (6.7) is the propagation gain

from BS to SU n on channel c at time t.

Cooperative Constraints:

0 ≤N∑

m=1

µcmn(t) ≤ 1 ∀c, n (6.8)

0 ≤ µcn(t) +

N∑m=1

µcnm(t) ≤ 1 ∀c, n (6.9)

0 ≤C∑

c=1

µcmn(t) +

N∑m′=1

µcnm′ (t) ≤ 1 ∀n, m (6.10)

Inequality (6.8) shows that one SU can not be helped by multiple SUs via the same

channel. (6.9) indicates the incoming and outgoing transmissions on each SU can not be

performed on the same channel. With respect to the multi-hop mode of transmission, we

constrain it in two hops described by (6.10). Cooperative communication is performed

concurrently via multiple channels, which is supported by multiple radios equipped on

SUs. Only a small number of radios are requires which is practically feasible, as the

distribution of SUs is sparse and dynamic, and the probability that multiple SUs are

within the interference region of each other is very low.

Flow Constraints:

With relays enabled, we perform multi-path transmission with perfect flow splitting

at the relays, due to its ability for load balancing and flexibility. Denote f cn[m](t) as the

flow rate that the macro BS transmits to SU n over channel c with the data destined for

SU m in time slot t, which means SU n should relay the data to SU m. If m = n, SU n

gets its own data. Similarly, let f cmn(t) be the flow rate of the cooperative transmission

from SU m to SU n at channel c in time period t. Thus, we have the throughput on each

SU as:

Un(t) =C∑

c=1

µcn(t)f c

n[n](t) +C∑

c=1

N∑m=1

µcmn(t)f c

mn(t) (6.11)

Chapter 6. Resource Management in Cognitive WiMAX with Femto Cells114

U = (U1, · · · , UN) denotes the throughput vector.

The flow routing is subject to the following constraints:

C∑c=1

µcnm(t)f c

nm(t) =C∑

c=1

µcn(t)f c

n[m](t) ∀m 6= n (6.12)

N∑m=1

f cn[m](t) ≤ µc

n(t)ωcn(t) ∀n (6.13)

f cnm(t) ≤ ωc

nm(t) ∀n, m, c (6.14)

Eq. (6.12) shows the flow balance requirement. The flow rate should be scheduled

and optimized at the macro BS, and be guaranteed to be feasible. (6.13) and (6.14)

indicates that the aggregate flow rate on each link can not exceed the link capacity.

ωcn(t) and ωc

nm(t) denote the capacities of macro transmission link (macro BS to SU n)

and cooperative transmission link (SU n to SU m) on channel c, respectively:

ωcn(t) = B · log2(1 +

P cBS(t)gc

n(t)

N0

) ∀n, c (6.15)

ωcnm(t) = B · log2(1 +

P cn(t)gc

nm(t)

N0

) ∀n, m, c (6.16)

where gcnm(t) is the propagation gain from SU n to SU m and B is the channel bandwidth.

We denote the upper bound of the channel capacity as ωmax due to the power constraint

and noise (denoted as N0).

It is easy to prove that the capacity of each channel is achieved for macro transmis-

sions. Otherwise, the macro BS can transmit more data to SUs to increase the aggregate

throughput. Thus, the inequality in (6.13) can be turned to equality. In the network,

the relays fully utilize the cooperative links if channel resources are allocated, and the

cooperative link capacity is much smaller than the transmission link from the macro BS

due to highly constrained power on SUs. Hence, the capacities of cooperative links are

achieved as well in (6.14).

Chapter 6. Resource Management in Cognitive WiMAX with Femto Cells115

6.2.3 Impact of Resource Management and Problem Hardness

The resource management protocol should be tightly integrated with the architecture of

cognitive WiMAX with femto cells. The objective is to maximize the aggregate through-

put on all SUs under a fairness criteria while keeping the interference to PUs within a

tolerable level. Three design factors are taken into consideration as follows.

Power Control. Essentially, the power control scheme is to tune the transmission

and interference ranges, making high-degree spatial reuse and spectrum hole utilization

in the location-dependent WiMAX femto cells. In the absence of adjustable power,

there is hardly much we can do once we encounter an infeasible transmission scenario in

scheduling. In our network, we seek the optimal power allocation for both the macro BS

and SUs that can be continually tuned.

Multi-hop Channel Allocation. Multi-hop transmission significantly reduces the

transmission requirement on global spectrum availability, making resource allocation fea-

sible with locally available channel resources when direct single-hop transmission is infea-

sible. In tandem, cooperative communication [54] exploits user, channel, and cooperative

diversities that benefit the network performance.

Flow Routing. Multi-path transmission makes the problem more challenging as the

transmitter has to schedule which packet is sent to which node via which relay. The

allocation of data flows should not cause channel overflow and packet loss, and at the

same time fully consider the efficiency of resource utilization.

To achieve an optimal resource management, we first consider a greedy centralized

optimization framework to maximize the aggregate throughput utilities at each time

slot:

maxPBS(t),PSU(t),UBS(t),USU(t)

N∑n=1

θnUn(t)

subject to: (6.1)− (6.16).

where θn > 0 describes the SU priority (fairness).

Chapter 6. Resource Management in Cognitive WiMAX with Femto Cells116

Derived from (6.13), we have the following fact:

N∑m=1

f cn[m](t) = µc

n(t)ωcn(t) ⇒

C∑c=1

N∑m=1

µcn(t)f c

n[m](t) =C∑

c=1

µcn(t)ωc

n(t) ⇒

∑c,m

µcnm(t)f c

nm(t) =C∑

c=1

µcn(t)ωc

n(t)−C∑

c=1

µcn(t)f c

n[n](t) ⇒

N∑n=1

Un =N∑

n=1

C∑c=1

ωcn(t)µc

n(t) (6.17)

Thus, the greedy optimization can be rewritten to be:

maxPBS(t),PSU(t),UBS(t),USU(t)

N∑n=1

θnUn(t)

subject to: (6.17) and U ∈ Λ

where Λ represents the achievable throughput region of SUs. It is easy to solve the

optimization problem if the set Λ is known in advance. However, in practice, this region

is unknown. Blindly transmitting data will lead to channel overflow or under-utilization,

and flow routing for each SU will be out of control. Moreover, greedy optimization can

not guarantee the optimality in the long term. To address these challenges, we next

present our online resource management protocol.

6.3 Resource Management With Stochastic Lyapunov

Optimization

In this section, we propose an online location-aware cooperative resource management

protocol, based on stochastic Lyapunov optimization without the requirement of the

knowledge on SU throughput region. With rigorous proof, we show that it is able to

achieve near-optimal throughput performance over time. We also provide deterministic

worst case bounds of the interference to PUs and the maximum data buffer backlog.

Chapter 6. Resource Management in Cognitive WiMAX with Femto Cells117

6.3.1 Stochastic Network Model

The macro BS maintains a data buffer for each SU, and Bn(t) denotes the buffer backlog.

In each time slot, new packets are admitted into the buffer with a rate of Rn(t) and the

macro BS transmits the data buffered to the corresponding SU (directly or via relay) as

long as channel resources are allocated. Essentially, Rn(t) reflects the throughput per-

formance if we carefully tune this rate and manage resources to make the buffer backlog

bounded and stable. Rmax is the achievable maximum rate due to the computation and

bandwidth limit of SUs. Then, we have the following data buffer dynamics:

Bn(t + 1) = max{Bn(t)− Un(t), 0}+ Rn(t) (6.18)

Let rn denote the time average rate of SU n. We have,

rn = limt→∞

1

t

t−1∑τ=0

Rn(τ) (6.19)

r = (r1, · · · , rN) denotes the rate vector on all SUs.

In cooperative communication, relays may generate interference to PUs due to sensing

errors. If one cooperative transmission link causes interference to a PU, we count it as

one collision of the PU. We use Eca(t) to capture the total number of such collisions for

PUs as defined:

Eca(t) =

N∑m=1

N∑n=1

µcmn(t)Ia

m(t)

(1− Sc

a(t)

)(6.20)

where Iam(t) is the binary variable indicating whether the cooperative communication

issued by SU m possibly generate interference to PU a. This information can be captured

according to location information (if PU a is in the transmission range of SU m, then

Iam(t) = 1). It is intuitive that the more interference incurred, the more severely PUs

would suffer from the packet losses. Let eca denote the time average rate of collisions:

eca = lim

t→∞

1

t

t−1∑τ=0

Eca(τ) (6.21)

In the network, this interference information of each PU can be tracked using an

interference buffer, and all SUs are aware of it. The buffer backlog, denoted as Xca(t),

Chapter 6. Resource Management in Cognitive WiMAX with Femto Cells118

reflects the interference level, which can not exceed a time average tolerable rate ρca.

Thus, we have the following interference buffer dynamics:

Xca(t + 1) = max{Xc

a(t)− ρca, 0}+ Ec

a(t) (6.22)

Overall, we aim to maximize the aggregate throughput of SUs under the fairness

criteria (consistent with the centralized greedy optimization problem):

maxN∑

n=1

θnrn

subject to: (6.1)− (6.22). (6.23)

6.3.2 Resource Management Policies

We design the online resource management protocol based on stochastic optimization to

solve the problem (6.23). It includes three policies stated as follows:

(i) Flow Control: At each time slot t, the macro BS controls the data rate admitted

to the data buffer of each SU as the solution to the following problem:

min Rn(t)

(Bn(t)− V θn

)subject to: 0 ≤ Rn(t) ≤ Rmax (6.24)

where V ≥ 0 is a constant parameter, which can be tuned according to the system

requirement. The above problem has the threshold-based solution:

Rn(t) =

0, if Bn(t) > V θn,

Rmax, otherwise.

(ii) Macro Allocation: At each time slot t, the power and channel allocation for the

macro transmissions issued by the macro BS to SUs should follow the policy by solving

the following problem:

Chapter 6. Resource Management in Cognitive WiMAX with Femto Cells119

maxN∑

n=1

C∑c=1

Bn(t)ωcn(t)µc

n(t)

subject to: (6.1), (6.3), (6.4), (6.15) (6.25)

This allocation policy reflects two intuitive designs: (a) The link with a higher capacity

has a higher priority to get channel resources, which is helpful to achieve higher aggregate

throughput (represented by ωcn(t)). (b) Resource allocation favors SUs with a large data

buffer backlog (represented by Bn(t)). More data in the buffer implies higher urgency

to transmit the data to avoid buffer overflow. From the fairness point of view, a larger

backlog also indicates the SUs have obtained a smaller share of channel resources to

transmit data in the previous time slots. Thus, they should be given a higher priority to

obtain channel resources in the current time slot.

(iii) Cooperative Allocation: At each time slot t, the power and channel allocation

for cooperative communication should follow the policy by solving the following problem:

max∑

a,m,n,c

µcmn(t)

{(Bn(t)−Bm(t)

)ωc

mn(t)−Xca(t)I

am(t)

(1− Y c

a (t)

)}subject to: (6.2), (6.5)− (6.7), (6.16) (6.26)

Three factors are taken into account for cooperative allocation. (a) Buffer backlog.

More buffered data of SU n than SU m implied higher urgency to transmit the data

of SU n than m, leading to a higher priority that SU m helps SU n via cooperative

communication (represented by Bn(t) − Bm(t)). (b) Channel rate. The higher rate a

cooperative link is able to achieve (represented by ωcmn(t)), the higher chance channel

resources are allocated on the link. (c) Interference level. The channel allocation favors

cooperative transmissions that will not potentially generate interference to PUs (repre-

sented by Iam(t)(1−Y c

a (t))), especially the ones who already have high interference levels

(represented by Xca(t)). Note that cooperative allocation is performed after the macro

allocation with a fixed power and channel allocation for macro transmissions.

Chapter 6. Resource Management in Cognitive WiMAX with Femto Cells120

6.3.3 Performance Analysis

We now characterize the performance of our scheduling policies with the following bounds.

(i) Backlog Performance. Initialize Bn(0) = 0. The data buffer backlogs are

bounded as:

Bn(t) ≤ Bmax , V θmax + Rmax ∀n, t (6.27)

Proof: Bn(0) = 0 < Bmax. Now, suppose that Bn(t) ≤ Bmax. We show the same holds

for Bn(t+1). We have two cases. (a) Bn(t) ≤ Bmax−Rmax. Obviously, Bn(t+1) ≤ Bmax

according to Eq. (6.18). (b) Bn(t) > Bmax − Rmax, then Bn(t) > V θn − Rmax + Rmax =

V θn. Thus, we will choose Rn(t) = 0 according to our macro allocation policy, so that

Bn(t + 1) ≤ Bn(t) ≤ Bmax. Overall, (6.27) is proved. ut

(ii) Interference Performance. Initialize Xca(0) = 0. ∀t > 0, if Y c

a (t) < 1, set

0 < ε < 1 and Y ca (t) ≤ 1− ε. Then the worst case of the interference buffer backlogs for

all PUs is upper bounded by:

Xca(t) ≤ Xmax ,

Bmaxωmax

ε+ bN

2c ∀c, a, t (6.28)

Proof: Xca(0) = 0 < Xmax. Now, suppose that Xc

a(t) ≤ Xmax. We show the same holds for

Xca(t+1). First, suppose Y c

a (t) = 1. Then, there will be no interference to PU a as it does

not occupy channel c. Thus, we get Xca(t+1) ≤ Xmax according to (6.22) with Ec

a(t) = 0.

Next, suppose Y ca (t) < 1, and we have two cases. (a) Xc

a(t) ≤ Xmax − bN2c. Note that

bN2c represents the maximum number of cooperative transmission links (SU pairs) in the

network, which is also the maximum value of Eca(t). Obviously, Xc

a(t + 1) ≤ Xmax under

this case. (b) Xca(t) > Xmax − bN

2c = Bmaxωmax

ε. Then, Xc

a(t)ε > Bmaxωmax. Thus, we

have Xca(t)(1− Y c

a (t)) > (Bn(t)− Bm(t))ωcmn. If Ia

m(t) = 1, according to our cooperative

allocation policy, choose µcmn(t) = 0, which means there is no cooperative communication

on channel c. If Iam(t) = 0, the transmissions issued by all SUs can not reach PU a. Thus,

Xca(t + 1) ≤ Xc

a(t) ≤ Xmax. Overall, (6.28) is proved. ut

(iii) Utility performance. Initialize Bn(0) = 0, Xca(t) = 0. The time average

Chapter 6. Resource Management in Cognitive WiMAX with Femto Cells121

throughput utility achieved by our protocol is within B/V of the optimal value:

limt→∞

inf1

t

t−1∑τ=0

N∑n=1

θnE{

Rn(τ)

}≥

N∑n=1

θnr∗n −

B

V(6.29)

where r∗n is the optimal achievable rates of problem (6.23), and V, B > 0 are constants.

We use the technique of Stochastic Lyapunov Optimization to prove it. Let Q(t) =

(Q1(t), · · · , QK(t)) be a vector of queue lengths for a discrete time stochastic queueing

network. Let W (Q) be any non-negative scalar valued function of the queue lengths,

called a Lyapunov function. Define the Lyapunov drift ∆(t) as follows:

∆(t) , E{

W (Q(t + 1))−W (Q(t))

}(6.30)

The network accumulates utility every time slot with bounded value. We have the

stochastic process f(t) to represent the utility earning with over-time optimum f ∗.

Theorem 6.1 Suppose there exist V > 0, B > 0, d > 0, and a non-negative function

W (Q) such that E{W (Q(d))} < ∞. For t > d, if the Lyapunov drift satisfies:

∆(t)− V E{f(t)} ≤ B − V f ∗ (6.31)

then we have:

limt→∞

inf1

t

t−1∑τ=0

E{

f(τ)

}≥ f ∗ − B

V(6.32)

Proof: Refer to [69]. ut

In our resource management problem, we set:

Q(t) = (B1(t), · · · , BN(t), X11 (t), · · · , XC

1 (t), · · · , X1A(1), · · · , XC

A (t)) (6.33)

Define f(t) ,∑N

n=1 θnRn(t) as the aggregated throughput utility earning at each time

slot according to (6.23), and thus f ∗ ,∑N

n=1 θnr∗n as the over-time optimal utility ac-

cordingly. We further define the Lyapunov function as follows:

W (Q(t)) ,1

2

A∑a=1

(N∑

n=1

(Bn(t))2 +C∑

c=1

(Xca(t))

2

)

Chapter 6. Resource Management in Cognitive WiMAX with Femto Cells122

Now, we calculate the Lyapunov drift as follows:

∆(t) ≤ B − E

{A∑

a=1

N∑n=1

{Bn(t)

(Un(t)−Rn(t)

)}}− E

{A∑

a=1

C∑c=1

Xca(t)

(ρc

a − Eca(t)

)}(6.34)

where B , 12

(A ·N · (Bmax)

2 +∑A

a=1

∑Cc=1(ρ

ca)

2 + A · C)

.

Now we subtract V E{∑N

n=1 θnRn(t)} from both sides of the drift inequality (6.34)

and substitute (6.20) into (6.34). We have:

∆(t)− V E

{N∑

n=1

θnRn(t)

}≤ B −

A∑a=1

C∑c=1

ρcaE

{Xc

a(t)

}+ A · E

{N∑

n=1

Rn(t)

(Bn(t)− V θ

)}

−E

{A∑

a=1

N∑n=1

Bn(t)Un(t)−A∑

a=1

C∑c=1

Xca(t)E

ca(t)

}(6.35)

We then derive the following equation by substituting (6.11), (6.13), and (6.20) into

the last term of (6.35).

E

{A∑

a=1

N∑n=1

Bn(t)Un(t)−A∑

a=1

C∑c=1

Xca(t)E

ca(t)

}= E

{∑a,n,c

Bn(t)f cn[n](t)µc

n(t)

}+

E

{ ∑a,n,m,c

µcmn(t)Bn(t)ωc

mn

}− E

{ ∑a,n,m,c

µcmn(t)Xc

a(t)Iam(t)(1− Sc

a(t))

}(6.36)

Further, we have the following fact (derived from Eq. (6.13)):

N∑m=1,m6=n

f cn[m](t) + f c

n[n](t) = ωcn(t)µc

n(t) ⇒

f cn[n](t)µc

n(t) = ωcn(t)µc

n(t)−N∑

m=1,m6=n

f cn[m](t)µc

n(t) (6.37)

Using (6.37) and (6.12), we have:

E

{∑a,n,c

Bn(t)f cn[n](t)µc

n(t)

}= E

{∑a,n,c

Bn(t)ωcn(t)µc

n(t) +∑

a,n,m,c

Bn(t)µcnm(t)ωc

nm(t)

}(6.38)

Chapter 6. Resource Management in Cognitive WiMAX with Femto Cells123

Substitute (6.38) into (6.36) and put (6.36) into (6.35). We have:

∆(t)− V E

{N∑

n=1

θnRn(t)

}≤ B −

A∑a=1

C∑c=1

ρcaE

{Xc

a(t)

}

+A · E

{N∑

n=1

Rn(t)

(Bn(t)− V θ

)}− A · E

{N∑

n=1

C∑c=1

Bn(t)ωcn(t)µc

n(t)

}

−E

{ ∑a,m,n,c

µcmn(t)

{(Bn(t)−Bm(t)

)ωc

mn(t)−Xca(t)I

am(t)

(1− Sc

a(t)

)}}(6.39)

The last three terms in the right side of (6.39) are exactly our resource management

policies (replace Sc(t) as Yc(t) by considering the sensing errors on the macro BS). Note

that the macro transmission is dominant in the aggregate throughput on SUs according to

(6.17). Thus, we can optimize the last two terms separately although they have common

constraints (6.7) and (6.9). Then, it is clear to see that our management policies minimize

the right side of (6.39) over all alternate feasible scheduling policies at each time slot.

We now define the stationary, randomized policy SR, that chooses a feasible resource

allocation at every time slot as a function of only the channel state information S(t) and

P(t), which will yield the following steady state values [58]:

E{RSRn (t)} = r∗n (6.40)

ec,SRa , lim

t→∞

t−1∑τ=0

E{Ec,SRa (τ)} ≤ ρc

a (6.41)

Note that our policies minimize the right side of (6.39) including the SR policy [58].

Thus, we can show (from (6.34)):

∆(t)− V E{f(t)} ≤ B − E

{A∑

a=1

C∑c=1

Xca(t)

(ρc

a − Ec,SRa (t)

)}

−A · E

{N∑

n=1

{Bn(t)

(Un(t)−RSR

n (t)

)}− V f ∗ (6.42)

Now, we aim to prove of inequality (6.31) from (6.42), by getting the constant lower

bounds of the second and third last terms in (6.42). First, as Bn(t) ≥ 0 and Un(t) ≥ 0,

we have E{∑N

n=1 Bn(t)Un(t)

}≥ 0. Further, 0 ≤ Bn(t) ≤ Bmax and 0 ≤ RSR

n ≤ Rmax.

Chapter 6. Resource Management in Cognitive WiMAX with Femto Cells124

Thus, (6.42) turns to be:

∆(t)− V E{f(t)} ≤ B + A ·N ·BmaxRmax − V f ∗ − E

{A∑

a=1

C∑c=1

Xca(t)

(ρc

a − Ec,SRa (t)

)}(6.43)

We then use “delayed” queue backlogs to formulate it. Clearly, for t > d, we have:

Xca(t− d) + d · bN

2c ≥ Xc

a(t) ≥ Xca(t− d)− dρc

a (6.44)

Now, we substitute Xca(t) in (6.42) with (6.44):

∆(t)− V E{f(t)} ≤ B + A ·N ·BmaxRmax + Z − V f ∗

−E{∑A

a=1

∑Cc=1 Xc

a(t− d)(ρc − Ec,SRa (t))

}(6.45)

where Z , d∑A

a=1

∑Cc=1

(bN

2c+ (ρc

a)2

).

Using iterative expectations, we have the following:

E{ C∑

c=1

Xca(t− d)Ec,SR

a (t)

}= E

{ C∑c=1

Xca(t− d) · E{Ec,SR

a (t)|T(t− d)}}

(6.46)

T represents the system state at time slot t on the primary channel availability H(t)

and Y(t), which can be considered as a Markov process. By the property of Markov

processes, any functions of these states H(t) and Y(t) converge exponentially fast to

their steady state values. Recall that the stationary, randomized policy is only based

on the system states. Thus, there exists α > 0, 0 < σ < 1 such that (using (6.40) and

(6.41)):

E{

Ec,SRa (t)|T(t− d)

}≤ ec,SR

a + ασd ≤ ρca + ασd (6.47)

Now, substitute (6.47) into (6.45), then (6.42) finally can be expressed as follows,

which fits to the form of (6.31):

∆(t)− V E{f(t)} ≤ B − V f ∗

B = B + A ·N ·BmaxRmax + Z + A · C ·Xmaxασd.

Thus, by applying Theorem 6.1, we are able to prove (6.29).

Chapter 6. Resource Management in Cognitive WiMAX with Femto Cells125

6.4 Optimization Solution

It is noted Lyapunov optimization stands and thus we can generate the favorable per-

formance studied above as long as we can optimally solved the optimization problems

stated in our three resource allocation policies. However, we observe Macro and coopera-

tive allocation policies in Sec. 6.3.2 require us to solve optimization problems (6.25) and

(6.26), which are non-linear integer programming (NIP) and thus without polynomial-

time solution. We can use traditional branch-and-bound algorithm to solve these prob-

lems optimally. However, it does not exploit the special structure of these optimization

problems, and has a high complexity due to LP relaxation and inefficient search. In

this section, we propose to apply the Generalized Expectation Maximization (EM)

algorithm [57] to our problems, which specifically exploits special problem structures

and cognitive WiMAX network characteristics, and reduces the complexity. We note, in

practice, the approximation would help to achieve good tradeoff between complexity and

optimality.

6.4.1 Generalized EM Algorithm

Generalized EM is an iterative method to optimize two sets of variables (λ, θ). We obtain

the optimal solutions by iteratively updating the variables via two steps:

E step: θ(k+1) = arg maxθ F(θ, λ(k))

M step: λ(k+1) = arg maxλF(θ(k+1), λ(k))

Successive application of generalized EM maximizes the lower bound of F , i.e.,

F(θ(k+1), λ(k)) ≥ F(θ(k), λ(k))

F(θ(k+1), λ(k+1)) ≥ F(θ(k+1), λ(k))

Accordingly, in the macro allocation problem (6.25), we divide the variables into two

sets: PBS(t) and UBS(t). We iteratively solve the problem with two steps. First, take

Chapter 6. Resource Management in Cognitive WiMAX with Femto Cells126

PBS(t) as the variable and UBS(t) as a fixed value (referred to as the BS Power Opti-

mization step). Then, take UBS(t) as the variable but UBS(t) as a fixed value (referred

to as the Macro Channel Assignment step). The optimal solution can be obtained by

repeating these two steps until convergence.

Surprisingly, by separating the problem into two steps, the complexity of the opti-

mization problem is largely reduced due to the special problem structure. With a fixed

channel allocation, the BS Power Optimization step is actually a LP. The macro Chan-

nel Assignment step, with a fixed power allocation, can be considered as a maximum

weighted bipartite matching (WBM) problem, which can be solved optimally with poly-

nomial time complexity in terms of the number of users. Construct a bipartite graph

A = (Φ × χ, E). The vertices in Φ denote all SUs, and the vertices in χ denote all

channels. The edge set E corresponds to |Φ| × |χ| edges connecting all possible pairs,

with weight Bn(t)ωcn(t). Run the WBM algorithm to obtain the matched pairs, providing

corresponding channel assignment. The WBM problem can be solved in a centralized

fashion using network flow algorithms such as the cost scaling algorithm [13], and can

also be solved in distributed approximation algorithms [37].

In the cooperative allocation problem (6.26), we can also divide the variables into two

sets: PSU(t) and USU(t). Then, the problem is separated into two steps: the SU Power

Allocation step and the Cooperative Channel Allocation step. The SU Power Allocation

step is a LP. The Cooperative Channel Allocation step can be formulated into a similar

WBM, where Φ includes all cooperative links 1 and χ contains all available channels,

excluding the ones that can not be used according to the constraints. The weight of each

edge in E carries

(Bn(t) − Bm(t)

)ωc

mn(t) − Xca(t)I

am(t)

(1 − Y c

a (t)

). With this graph

setup, the problem can be solved optimally.

1For example, (1, 2) indicates the transmission link from SU 1 to SU 2. Note that it is different from(2, 1) representing the link from SU 2 to SU 1.

Chapter 6. Resource Management in Cognitive WiMAX with Femto Cells127

Table 6.1: Evaluation of Generalized EM algorithm.

Algorithm Ave. Throughput Ave. running time

generalized EM 1.74 Mbps 1 ms

branch-and-bound 1.75 Mbps 6 ms

6.4.2 Complexity Analysis

The Generalized EM algorithm converges to a local maximum of the original optimiza-

tion problem [57]. We can carefully select the initial conditions, resulting in the global

maximum. One efficient approach to set the initial values is to solve the LP relaxation

of the original problem, and get the feasible solution by randomized rounding. Running

the algorithm several times with different initial conditions is also helpful.

We perform a set of simulations to evaluate the Generalized EM algorithm in our

problems by comparing with the traditional branch-and-bound algorithm, running over

Intel Core Duo machine at 1.83 GHz and a memory of 2 GB. The results are listed

in Table 6.1. With respect to the performance of average throughput over SUs, the

Generalized EM algorithm performs very close to the branch-and-bound algorithm, within

a 1% difference on average. Further, we observe that the Generalized EM algorithm is

able to converge within 1 ms on average which is much faster than the branch-and-bound

algorithm. Thus, it is suitable for practical WiMAX systems.

6.5 Performance Evaluation

We are now ready to resort to extensive simulations to study the performance of cognitive

WiMAX with femto cells. To be realistic, the simulations are conducted over a long term,

where practical settings of WiMAX and CR configuration are adopted according to [23].

In our simulations, there are a total of 20 PUs located across 8 femto cells sharing 12

channels. Around the service region, a number of SUs are randomly moving with random

Chapter 6. Resource Management in Cognitive WiMAX with Femto Cells128

Table 6.2: Simulation parameters for evaluating cognitive WiMAX.

Channel Type Rayleigh fading and AWGN

Path loss Model COST-HATA-231

Transmitter Power (macro BS) 25 dBm

Transmitter Power (SU) 5 dBm

Noise Power -129.5 dBW

Adaptive Modulation used

initial locations. The channel availability state evolves according to a Markov chain with

symmetric transition probabilities between the ON and OFF states given by 0.5. The

simulation parameters are listed in Table 6.2.

We simulate our proposed protocol with different numbers of active SUs, denoted as

“Coop-X” (“X” represents the number of SUs). For comparison, we simulate the tradi-

tional resource management protocol in cognitive WiMAX with power control in a coarse

granularity, by simply using the maximum feasible power for macro transmission (follow

the constraint (6.3)) without cooperative communication and flow control, referred to as

“NOCoop.” Further, to specifically examine the advantages of the cognitive WiMAX

architecture, we simulate the resource management protocol in traditional WiMAX net-

works without the CR technique, referred to as “Trad,” where the transmission is only

performed when feasible channels exist across the entire macro area and is provisioned

under maximum power.

We first examine the throughput performance. Fig. 6.2 shows the results on average

throughput over SUs via a 15000-second simulation. We observe that “Trad” performs

worst, indicating the advantage of the new architecture by applying CR technique. Even

“NOCoop” outperforms “Trad” with a substantial gain (21%) by exploiting spectrum

reuse in a higher degree. Further, “Coop-30,” “Coop-40,” and “Coop-50” defeat “NO-

Coop” by 36%, 50%, and 63% respectively, and of course outperform “Trad” with much

Chapter 6. Resource Management in Cognitive WiMAX with Femto Cells129

0 100 200 300 400 5000.8

1

1.2

1.4

1.6

1.8

Time (rounds)

Aver

age

Thro

ughp

ut (M

bps)

Coop!30Coop!40

Coop!50NOCoop Trad

Figure 6.2: Average throughput perfor-

mance of all protocols.

0.1 0.2 0.3 0.40

0.2

0.4

0.6

0.8

1

Throughput Variance

F(x)

Coop!30Coop!40Coop!50NOCoop

Figure 6.3: CDF of throughput variance,

which indicates fairness performance.

higher margins. It coincides with our intuition that resource management with coopera-

tive communication, power control, flow routing, and other important cross-layer designs

naturally fits in the design of cognitive WiMAX with femto cells, and is able to achieve

significant throughput improvement due to its effective use of the wireless spectrum. An-

other trend to notice is that the margin that “Coop” outperforms “NOCoop” and “Trad”

becomes more substantial with an increasing number of SUs. This observation indicates

that a larger number of SUs create a higher degree of cooperation, which is beneficial for

throughput performance.

Regarding the fairness performance, we capture the variance on the average through-

put over SUs. At each time slot t, we calculate, for each SU, the average throughput over

time horizon [1, t], and then compute the throughput variance as the ratio between the

standard deviation of the average throughput over time and the time average throughput

itself. Fig. 6.3 plots the CDF of this throughput variance for all protocols. Not surpris-

ingly, “Coop”s outperform “NOCoop,” which shows the improvement of our protocol on

fairness performance.

To obtain a deeper understanding of the advantages of our proposed protocol, we in-

vestigate the channel utilization performance, which is calculated as the sum throughput

Chapter 6. Resource Management in Cognitive WiMAX with Femto Cells130

0 100 200 300 400 50015

20

25

30

Time (rounds)

Utiliz

ation

Impr

ovem

ent (

%)

Coop!40Coop!60Coop!80

Figure 6.4: Performance on the channel

utilization improvement.

0 100 200 300 400 5000.05

0.1

0.15

0.2

0.25

0.3

Time (rounds)

Norm

alize

d Bu

ffer B

acklo

g

datacollision

Figure 6.5: Performance on the buffer

backlog.

of all SUs over the aggregate throughput in the network including both SUs and PUs.

This value accurately reflects the improvement on the spectrum utilization. Evident

from the results shown in Fig. 6.4, the increase of the channel utilization reaches 30%

in the best case (“Coop-60”). It demonstrates that the spectrum can be more efficiently

utilized with our protocol. Another observation from the results is that the performance

will degrade when the number of SUs is overly large (“Coop-80”), since the interference

effect begins to dominate. A sweet spot may exist with respect to the number of SUs in

cognitive WiMAX. We will further study it in our future work.

We further track the buffer backlogs of both data and collision queues. The results

are shown in Fig. 6.5, and the curves capture the normalized buffer backlog, calculated

by the ratio between the backlogs and the bounds (obtained in (6.27) and (6.28)). The

results show that the buffer remains bounded over the long term, which is desirable in

the system design.

Regarding protocol overhead, all the protocol control messages are transmitted over

wired lines and shared by all BSs (including Macro and Femto BSs). These messages can

be exchanged periodically and each message is within the size of a few hundred bytes.

The, this message overhead is substantially small.

Chapter 6. Resource Management in Cognitive WiMAX with Femto Cells131

6.6 Summary

In this chapter, we propose cognitive WiMAX with femto cells and study the resource

management problem in the network. Tightly integrated with the novel cognitive WiMAX

architecture, our cross-layer resource management protocol is designed to apply power

control, multi-hop cooperative communication and flow management techniques, achiev-

ing near-optimal performance. It is based on a sound theoretical foundation using

stochastic Lyapunov optimization, but not without careful considerations of the prac-

ticality, feasibility, and efficiency of implementing these solutions. With this chapter, we

are convinced that it is a win-win approach by applying the CR technique to WiMAX

with the employment of our resource management protocol by fully exploiting spectrum

reuse and incorporating user, channel, and cooperative diversities.

Chapter 7

Concluding Remarks

Readers do not need to be reminded about the importance of studying WiMAX like

multi-channel wireless networks: they represent the future generation of high-bandwidth

wireless access technologies and it is challenging and important to effectively utilize the

scarce wireless spectrum in order to provide high quality of services. The objective

of this thesis is to have research on multi-channel wireless networks with WiMAX as

the representative, and optimize the performance, which are not fully studied in both

academia and industry.

This thesis presents our research findings in two main arms including four parts

towards this objective, step by step further and deeper on the exploration. First, we

investigate the use of network coding when applied in the MAC-layer of WiMAX. We have

observation that random network coding indeed provides salient improvement in terms

of throughput and transmission resilience in WiMAX. With this finding, we proposed

a MAC-layer random network coding protocol, MRNC in short, which is designed to

take full advantage of the favorable properties of random network coding and tightly

integrate with the multi-channel communication structure in WiMAX. Especially, we

have two adaptive algorithms embedded in MRNC with well-tuned designs which are

able to facilitate MRNC to achieve even larger benefits.

132

Chapter 7. Concluding Remarks 133

Admittedly, MRNC provides quite satisfactory performance in the regular cases.

However, in the conditions of low channel qualities, transient unpredictable bit errors

would corrupt the entire packet which would waste scarce wireless spectrum. In the sec-

ond step, built on top of MAC-layer random network coding scheme, we seek to further

improve the performance through effective error control in the physical layer especially

under the poor channel conditions. We introduced, designed, and evaluated a cooper-

ative symbol-level random network coding protocol in WiMAX, named Drizzle, which

further exploit the power of random network coding. Tightly integrated with WiMAX

physical layer, Drizzle provides error control in fine granularity and minimizes the waste

of bandwidth in various multi-channel communication scenarios in WiMAX. Through

our extensive simulation evaluation, we show both MAC-layer and symbol-level network

coding protocols, with our fine-tuned designs, are able to provide significant improvement

on system performance.

Clearly, the ultimate goal of the protocol optimization and standardization in WiMAX

with IEEE 802.16 is to provide high quality of services/applications and attract users to

evolve in the networks. After solving the challenges in the fundamental communication

in WiMAX with the research in the first two steps, we study the important services in

WiMAX and seek to provide specific designs regarding these services which are crucial

for practical WiMAX systems. First, we focus on multicast broadcast services (MBS)

in WiMAX. We propose a novel multicast scheduling with multi-hop multi-path trans-

missions over multiple OFDMA channels to fully exploit the advantages provided by

cooperative communication and random network coding. This design provides a solution

to solve the problems in traditional multicast scheduling, and this study creates a new

paradigm of multi-hop cooperative communication in WiMAX.

Within such paradigm, in the last step, we focus on femto cell architecture which

is a cost-effective means of providing ubiquitous connectivity in WiMAX. Recently, a

number of large ISPs start to deploy femto cells in the real systems. We propose a cog-

Chapter 7. Concluding Remarks 134

nitive WiMAX architecture with femto cells, by exploring the benefits of collaboration

of popular cognitive radio technique, multi-hop paradigm, as well as femto cell struc-

ture. Such design provides flexibility for resource management, and an efficient resource

management framework is generated and provided accordingly in our study. We provide

both rigorous theoretical analysis and realistic simulation evaluation for both multicast

scheduling protocol and cognitive resource management in WiMAX, which show near-

optimal performance.

With our complete cycle of study on WiMAX protocols and the research findings

across, we believe our proposals have great potentials to be implemented in the practical

WiMAX systems, and smoothly applied to other next generation wireless communication

networks. In the future work, we will extend our understanding and study on other

emerging attractive applications by applying advanced technologies.

Bibliography

[1] DARPA home page.

[2] GSM Association.

[3] OMA: The WAP 2.0 conformance release.

[4] Shared Spectrum Company. http://www.sharedspectrum.com.

[5] White Paper: TD-SCDMA: the Solution for TDD Bands.

[6] White Paper: Technology of High Speed Packet Access (HSPA).

[7] IEEE 802.11: Wireless LAN Medium Access Control (MAC) and Physical Layer

(PHY) Specifications. IEEE Std 802.11-2007, 2007.

[8] WiMAX ForumTM WiMAX System Evaluation Methodology, Version 2.0, December

2007.

[9] IEEE Standard for Local and metropolitan area networks Part 16: Air Interface for

Broadband Wireless Access Systems. IEEE Std 802.16-2009 (Revision of IEEE Std

802.16-2004), pages C1–2004, 29 2009.

[10] 3GPP. UTRA-UTRAN Long Term Evolution (LTE) and 3GPP System Architecture

Evolution (SAE).

135

Bibliography 136

[11] P. Agashe, R. Rezaiifar, and O. Bender. CDMA2000 High Rate Broadcast Packet

Data Air Interface Design. IEEE Communications Magzine, 42:83 – 89, February

2004.

[12] R. Ahlswede, N. Cai, S. R. Li, and R. W. Yeung. Network Information Flow. IEEE

Transactions on Information Theory, 46(4):1204–1216, July 2000.

[13] R. K. Ahuja, T. L. Magnati, and J. B. Orlin. Network Flows: Theory, Algorithms,

and Applications. Prentice Hall, February 1993.

[14] I. Akyildiz, W.-Y. Lee, M. Vuran, and S. Mohanty. Next Generation/Dynamic

Spectrum Access/Cognitive Radio Wireless Networks: A Survey. Elsevier Computer

Networks Journal, 50:2127–2159, September 2006.

[15] J. G. Andrews, A. Ghosh, and R. Muhamed. Fundamentals of WiMAX : Under-

standing Broadband Wireless Networking. Prentice Hall, 2007.

[16] S. Biswas and R. Morris. Opportunistic Routing in Multi-hop Wireless Networks.

In Proc. of ACM SIGCOMM, 2005.

[17] G. Caire and D. Tuninetti. The Throughput of Hybrid-ARQ Protocols for the

Gaussian Collision Channel. IEEE Transactions on Information Theory, 47(5):1971

– 1988, 2001.

[18] S. Chachulski, M. Jennings, S. Katti, and D. Katabi. Trading Structure for Ran-

domness in Wireless Opportunistic Routing. In Proc. of ACM SIGCOMM, 2007.

[19] D. Chase. A Combined Coding and Modulation Approach for Communications Over

Dispersive Channels. IEEE Transactions on Communications, 21:159– 174, March

1973.

Bibliography 137

[20] D.-H. Cho, J.-H. Song, M.-S. Kim, and K.-J. Han. Performance Analysis of The

IEEE 802.16 Wireless Metropolitan Area Network. In Proc. of the 1st International

Conference on Distributed Frameworks for Multimedia Applications (DFMA), 2005.

[21] J. W. Cho, Y. Chang, Y. Kim, and J. Chon. Analytic Optimization of Hybrid ARQ

Performance in Wireless Packet Data Systems. In Proc. of IEEE GLOBECOM,

2006.

[22] P. Chou, Y. Wu, and K. Jain. Practical Network Coding. In Proc. of Allerton

Conference on Communication, Control and Computing, October 2003.

[23] C. Cordeiro, K. Challapali, D. Birru, and N. S. Shankar. IEEE 802.22: The First

Worldwide Wireless Standard Based on Cognitive Radios. In Proc. of the 1st IEEE

International Symposium on New Frontiers in Dynamic Spectrum Access Networks

(DySPAN 05), 2005.

[24] D. J. Costello, J. Hagenauer, H. Imai, and S. B. Wicker. Application of Error-Control

Coding. IEEE Transactions on Information Theory, 44(2):2531–2560, 1998.

[25] S. Deb, M. Effros, T. Ho, D. R. Karger, R. Koetter, D. S. Lun, M. Medard, and

N. Ratnakar. Network Coding for Wireless Applications: A Brief Tutorial. In Proc.

of International Workshop on Wireless Ad-hoc Networks (IWWAN), 2005.

[26] C. Eklund, R. B. Marks, K. L. Stanwood, and S. Wang. IEEE Standard 802.16: A

Technical Overview of The WirelessMANTM Air Interface for Broadband Wireless

Access. IEEE Communications Magzine, 40(6):98 – 107, 2002.

[27] S. E. Elayoubi, B. Fourestie, and X. Auffret. On The Capacity of OFDMA 802.16

Systems. In Proc. of IEEE International Conference on Communications (ICC),

June 2006.

Bibliography 138

[28] M. P. Fitz and J. P. Seymour. On the bit error probability of QAM modulation .

In International Journal of Wireless Information Networks, 1994.

[29] L. Fleischer, M. Goemans, V. Mirrokni, and M. Sviridenko. Tight Approximation

Algorithms for Maximum General Assignment Problems. In Proc. of ACM Sympo-

sium on Discrete Algorithms (SODA), 2006.

[30] F. Frederiksen and T. E. Kolding. Performance and Modeling of WCDMA/HSDPA

Transmission/H-ARQ Schemes. In Proc. of IEEE Vehicular Technology Conference

(VTC), 2002.

[31] R. K. Ganti, P. Jayachandran, H. Luo, and T. F. Abdelzaher. Datalink Streaming

in Wireless Sensor Networks. In Proc. of ACM SenSys, 2006.

[32] P. K. Gopala and H. E. Gamal. On the Throughput-delay Tradeoff in Cellular Mul-

ticast. In Proc. of International Conference on Wireless Networks, Communications

and Mobile Computing, June 2005.

[33] T. Ho and R. Koetter. Online Incremental Network Coding for Multiple Unicasts.

In DIMACS Working Group on Network Coding, 2005.

[34] T. Ho, R. Koetter, M. Medard, D. Karger, and M. Effros. The Benefits of Coding

Over Routing in a Randomized Setting. In Proc. of International Symposium on

Information Theory (ISIT), 2003.

[35] T. Ho, R. Koetter, M. Medard, D. Karger, and M. Effros. The Benefits of Coding

Over Routing in a Randomized Setting. In Proc. of IEEE International Symposium

on Information Theory, 2003.

[36] T. Ho, M. Medard, R. Koetter, D. Karger, M. Effros, J. Shi, and B. Leong. A

Random Linear Network Coding Approach to Multicast. IEEE Transactions on

Information Theory, 52(10):4413–4430, Oct. 2006.

Bibliography 139

[37] J. Hoepman. Simple Distributed Weighted Matchings. Available at

http://arxiv.org/abs/cs/0410047.

[38] F. Hou, L. X. Cai, P.-H. Ho, X. Shen, and J. Zhang. Cooperative Multicast Schedul-

ing Scheme for IPTV Service over IEEE 802.16 Networks. In Proc. of IEEE Inter-

national Conference on Communications (ICC), 2008.

[39] J. Jin and B. Li. Adaptive Random Network Coding in WiMAX. In Proc. of IEEE

International Conference on Communications (ICC), 2008.

[40] J. Jin and B. Li. Cooperative Multicast Scheduling with Random Network Coding in

WiMAX. In Proc. of IEEE International Workshop on Quality of Service (IWQoS),

2009.

[41] J. Jin and B. Li. Cooperative Resource Management in Cognitive WiMAX with

Femto Cells. In Proc. of IEEE INFOCOM, 2010.

[42] J. Jin, B. Li, and T. Kong. Is Random Network Coding Helpful in WiMAX? In

Proc. of IEEE INFOCOM, 2008.

[43] S. Katti, S. Gollakota, and D. Katabi. Embracing Wireless Interference: Analog

Network Coding. In Proc. of ACM SIGCOMM, 2007.

[44] S. Katti and D. Katabi. MIXIT: The Network Meets The Wireless Channel. In the

Workshop on Hot Topics in Networks (HotNets), 2007.

[45] S. Katti, H. Rahul, W. Hu, D. Katabi, M. Medard, and J. Crowcroft. XORs in The

Air: Practical Wireless Network Coding. In Proc. of ACM SIGCOMM, 2006.

[46] R. Kim, J. Jin, and B. Li. Drizzle: Cooperative Symbol-Level Network Coding in

WiMAX. IEEE Transactions on Vehicular Technology, 59(3):1415–1432, 2010.

[47] R. Koetter and M. Medard. An Algebraic Approach to Network Coding. IEEE/ACM

Transactions on Networking, 11(5):782–795, October 2003.

Bibliography 140

[48] U. C. Kozat. On the Throughput Capacity of Opportunistic Multicasting with

Erasure Codes. In Proc. of IEEE INFOCOM, 2008.

[49] A. E. Leu, B. L. Mark, and M. A. McHenry. A Framework for Cognitive WiMAX

with Frequency Agility. Proceedings of the IEEE, 2009.

[50] S. Y. R. Li, R. W. Yeung, and N. Cai. Linear Network Coding. IEEE Transactions

on Information Theory, 49:371, 2003.

[51] Z. Li and B. Li. Network Coding: The Case for Multiple Unicast Sessions. In Proc.

of the 42nd Annual Allerton Conference on Communication Control and Computing,

2004.

[52] Q. Liu, S. Zhou, and G. B. Giannakis. Cross-Layer Combining of Adaptive Modu-

lation and Coding With Truncated ARQ Over Wireless Links. IEEE Transactions

on Wireless Communications, 3:1746 – 1755, 2004.

[53] M. Luby. LT Codes. In Proc. of 43th of IEEE Symposium on Foundations of

Computer Science (FOCS), 2002.

[54] V. Mahinthan, L. Cai, L. W. Mark, and X. Shen. Maximizing Cooperative Diversity

Energy Gain for Wireless Networks. IEEE Transactions on Wireless Communica-

tions, 6(7):2530–2539, 2007.

[55] P. Maymounkov and D. Mazieres. Rateless Codes and Big Downloads. In Proc. of

IPTPS, 2003.

[56] M. Mitzenmacher and E. Upfal. Probability and Computing: Randomized Algorithms

and Probabilistic Analysis. Cambridge University Press, 2005.

[57] J. R. Movellan. Tutorial on Generalized Expectation Maximization. Available at

http://mplab.ucsd.edu/tutorials/EM.pdf.

Bibliography 141

[58] M. J. Neely, E. Modiano, and C. Li. Dynamic Power Allocation and Routing for Time

Varying Wireless Networks. IEEE Journal on Selected Areas in Communications,

23:89 – 103, 2005.

[59] X. Peng, F. P. S. Chin, Y.-C. Liang, and M. Motani. Performance of Hybrid ARQ

Techniques Based on Turbo Codes for High-speed Packet Transmission. In Proc. of

the 7th IEEE International Symposium on Spread Spectrum Techniques and Appli-

cation (ISSSTA), 2002.

[60] A. Ramamoorthy, J. Shi, and R. Wesel. On The Capacity of Network Coding for

Wireless Networks. In Proc. of the 41st Annual Allerton Conference on Communi-

cation Control and Computing, 2003.

[61] Y. Shen and E. F. Martinez. WiMAX Channel Estimation: Algorithms and Imple-

mentations. Notes, Freescale Semiconductor Inc., 2007.

[62] Z. Shen, J. Andrews, and B. Evans. Optimal power allocation in multiuser OFDM

systems. In Proc. of IEEE GLOBECOM, 2003.

[63] Z. Shen, J. Andrews, and B. Evans. Adaptive resource allocation in multiuser OFDM

systems with proportional rate constraints. IEEE Transactions on Wireless Com-

munications, 4(6):2726–2737, Nov. 2005.

[64] Y. Shi and Y. T. Hou. Optimal Power Control for Multi-hop Software Defined Radio

Networks. In Proc. of IEEE INFOCOM, 2007.

[65] H. Shojania and B. Li. Parallelized Progressive Network Coding With Hardware

Acceleration. In Proc. of the 15th IEEE International Workshop on Quality of

Service (IWQoS), 2007.

[66] E. Soljanin, N. Varnica, and P. Whiting. Incremental Redundancy Hybrid ARQ

with LDPC and Raptor Codes. IEEE Transactions on Information Theory, 2005.

Bibliography 142

[67] G. Song and Y. G. Li. Cross-layer Optimization for OFDM Wireless Network - Part

I and Part II. IEEE Transactions on Wireless Communications, 4(2):614 – 634,

March 2005.

[68] K. Sundaresan and S. Rangarajan. Efficient Resource Management in OFDMA

Femto Cells. In Proc. of ACM Mobihoc, 2009.

[69] R. Urgaonkar and M. J. Neely. Opportunistic Scheduling with Reliabilitty Guaran-

tees in Cognitive Radio Networks. In Proc. of IEEE INFOCOM, 2008.

[70] F. Wang, A. Ghosh, R. Love, K. Stewart, R. Ratasuk, R. Bachu, Y. Sun, and

Q. Zhao. IEEE 802.16e System Performance: Analysis and Simulations. In Proc. of

the 16th IEEE International Symposium on Personal, Indoor and Mobile Radio

Communications (PIMRC), 2005.

[71] M. Wang and B. Li. How Practical is Network Coding? In Proc. of the 14th IEEE

International Workshop on Quality of Service (IWQoS), June 2006.

[72] M. M. Wang, W. Xiao, and T. Brown. Soft Decision Metric Generation for

QAM With Channel Estimation Error. IEEE Transactions on Communications,

50(7):1058–1061, July 2002.

[73] I. Wong, Z. Shen, B. Evans, and J. Andrews. A low complexity algorithm for

proportional resource allocation in OFDMA systems. In Proc. of IEEE Workshop

on Signal Processing Systems (SIPS), Oct. 2004.

[74] G. R. Woo, P. Kheradpour, and D. Katabi. Beyond The Bits: Cooperative Packet

Recovery Using Physical Layer Information. In Proc. of ACM MobiCom, 2007.

[75] A. A. Yazdi, S. Sorour, S. Valaee, and R. Y. Kim. Optimum Network Coding for

Delay Sensitive Applications in WiMAX Unicast. In Proc. of IEEE INFOCOM,

2009.

Bibliography 143

[76] W. Yu and R. Lui. Dual Methods for Nonconvex Spectrum Optimization of Multi-

carrier Systems. IEEE Transactions on Communications, 54(7):1310 – 1322, 2006.

[77] S. Zhang, S. C. Liew, and P. P. Lam. Physical-Layer Network Coding. In Proc. of

ACM MobiCom, 2006.

[78] Q. Zhao, S. Geirhofer, L. Tong, and B. Sadler. Opportunistic Spectrum Access via

Periodic Channel Sensing. IEEE Transactions on Signal Processing, 2008.