Title: IEEE 802'16
1IEEE 802.16
D. Miorandi, CREATE-NET
2What is WiMax
- WiMax (Worldwide Interoperability for microwave
access) - A technology based on an evolving standard for
point-to-multipoint wireless networking - The commercialization of IEEE 802.16 standard
- Solution for Wireless Metropolitan Area Network
- BWA (Broadband Wireless Access) Solution
- Comply with European BWA standard
- European Telecommunications Standards Institute's
High-performance radio metropolitan area network
(HiperMAN) standard
3IEEE 802 Standard
- 802.3 CSMA/CD (Ehernet)
- 802.4 Token Bus
- 802.5 Token Ring
- 802.6 MAN
- 802.11 Wireless LAN
- 802.12 Gigabit LAN
- 802.16 Fixed Broadband Wireless Access
System
4802.2 Logical Link
Data Link Layer
802.1 Bridging
802.3 Medium Access 802.3 Physical
802.4 Medium Access 802.4 Physical
802.5 Medium Access 802.5 Physical
802.6 Medium Access 802.6 Physical
802.11 Medium Access 802.11 Physical
802.12 Medium Access 802.12 Physical
802.16 Medium Access 802.16 Physical
Physical Layer
The relationship between the standard and other
members of the family
5IEEE 802.16
- 802.16 consists of the access point, BS(Base
Station) and SSs(Subscriber Stations) - All data traffic goes through the BS, and the BS
can control the allocation of bandwidth on the
radio channel. - 802.16 is a Bandwidth on Demand system.
6SS
SS
BS
SS
Wireless Access Network
7IEEE 802.16
- Scope
- Specifies the air interface, MAC (Medium Access
Control), PHY(Physical layer) - Purpose
- to enable rapid worldwide deployment of
cost-effective broadband wireless access products - to facilitate competition in broadband access by
providing alternatives to wireline broadband
access - Main advantage
- fast deployment, dynamic sharing of radio
resources and low cost
8IEEE 802.16
- IEEE 802.16 was completed on Oct, 2004
- Point-to-Multipoint (PMP) broadband wireless
access standard for systems in the frequency
ranges 10 66 GHz and sub 11 GHz.
9IEEE 802.16 Extension
- 802.16a
- use the licensed and license-exempt frequencies
from 2 to 11Ghz - Support Mesh-Network
- 802.16b
- Increase spectrum to 5 and 6GHz
- Provide QoS (for real-time voice and video
service) - 802.16c
- Represents a 10 to 66GHz system profile
- 802.16d
- Improvement and fixes for 802.16a
- 802.16e
- Addresses on Mobile
- Enable high-speed signal handoffs necessary for
communications with users moving at vehicular
speeds
10The family of 802.16 standard
11The family of 802.16 standard
12Architecture
13PHY Considerations that Affect the MAC
- Broadband Channels
- Wide channels (20, 25, or 28 MHz)
- High capacity Downlink AND Uplink
- Multiple Access
- TDM/TDMA
- High rate burst modems
- Adaptive Burst Profiles on Uplink and Downlink
- Duplex scheme
- Time-Division Duplex (TDD)
- Frequency-Division Duplex (FDD) including Burst
FDD - Support for Half-Duplex Terminals
14Protocol Architecture
Service specific convergence sublayer
MAC Common Part sublayer
Security (privacy, authentication)
TC (transmission convergence sublayer)
PHY
15Physical Layer
- In the design of the PHY specification for 1066
GHz, line-of-sight propagation was deemed a
practical necessity. - Because of the point-to-multipoint architecture,
the BS basically transmits a TDM signal, with
individual subscriber stations allocated time
slots serially. - The PHY specification defined for 1066 GHz uses
burst single-carrier modulation with adaptive
burst profiling inĀ which transmission
parameters, including the modulation and coding
schemes, may be adjusted individually to each
subscriber station (SS) on a frame-by-frame
basis. Both TDD and burst FDD variants are
defined. - Channel bandwidths of 20 or 25 MHz (typical U.S.
allocation) or 28 MHz (typical European
allocation) are specified, along with Nyquist
square-root raised-cosine pulse shaping with a
roll off factor of 0.25. - NLOS operations in lower frequency bands (lt11
GHz) are made possible by the adoption of an OFDM
modulation scheme.
16Transmission Convergence sublayer
- This layer performs the transformation of
variable length MAC protocol data units (PDUs)
into the fixed length FEC blocks (plus possibly a
shortened block at the end) of each burst. The TC
layer has a PDU sized to fit in the FEC block
currently being filled. It starts with a pointer
indicating where the next MAC PDU header starts
within the FEC block. The TC PDU format allows
resynchronization to the next MAC PDU in the
event that the previous FEC block had
irrecoverable errors.
17Medium Access Control
- The 802.16 medium access control (MAC) layer
supports many different physical layer
specifications, both licensed and unlicensed. - The 802.16 MAC is connection-oriented (!!!)
18Service Specific Convergence Sublayer
- Supports ATM-based and IP-based networking on top
of IEEE 802.16 - It classifies service data units (SDUs) to the
proper MAC connection, enables QoS support,
enable BW allocation - May (optionally) perform header
suppression/compression
19Adaptive PHY
- Burst profile
- Modulation and FEC
- Dynamically assigned according to link
conditions - Burst by burst, per subscriber station
- Trade-off capacity vs. robustness in real time
20Duplex Scheme Support
- On downlink, SS is associated with a specific
burst - On uplink, SS is allotted a variable length time
slot for their transmissions - Time-Division Duplex (TDD)
- Downlink Uplink time share the same RF channel
- Dynamic asymmetry
- SS does not transmit receive simultaneously
(low cost) - Frequency-Division Duplex (FDD)
- Downlink Uplink on separate RF channels
- Static asymmetry
- Half-duplex SSs supported
- SS does not transmit receive simultaneously
(low cost)
21Baud Rates Channel Size (10-66 GHz)
- Flexible plan
- allows equipment manufactures to choose according
to spectrum requirements
QPSK 16-QAM
64-QAM
22802.16 Frame Structure
- The FCH specifies the burst profile and the
length of one or more DL bursts that immediately
follow the FCH. - A Downlink Channel Descriptor (DCD) is
transmitted by the BS at a periodic interval to
define the characteristics of a downlink physical
channel. - A Uplink Channel Descriptor (UCD) is transmitted
by the BS at a periodic interval to define the
characteristics of an uplink physical channel. - Ranging Backoff Start/End
- Request Backoff Start/End
- Uplink MAP Message (UL-MAP) defines usage of the
uplink - contains Information Element (IE) which include
the transmission opportunities, i.e. the time
slots in which the SS can transmit during the
uplink subframe - Dowlink MAP Message (DL-MAP) defines usage of
the downlink and contains carrier-specific data
23Addressing and Connections
- Each SS has universal 48bit MAC address
- Connections identified by 16-bit CID
- used to distinguish between multiple uplink
channels associated with the same downlink
channel - many higher-layer sessions may share same CID
(with same service parameters) - 3 management connections in each direction
established automatically
24MAC Data Frame
- The Generic MAC header has fixed format
- One or more MAC sub-headers may be part of the
payload - The presence of sub-headers is indicated by a
Type field in the Generic MAC header - The maximum length of the MAC PDU is 2048 bytes,
including header, payload, and Cyclic Redundancy
Check (CRC)
- Five types of sub-headers may be present.
- Fragmentation
- Grant Management
- Packing
- Mesh
- FAST-FEEDBACK allocation
25Features
- Payload can be encrypted
- BS responsible for refreshing keying material
periodically - Use of CRC depends on connection ID
- CRC calculated after encryption on header
payload - Multiple frames may be concatenated into single
transmission - may join all types user data, bandwidth request
frames and management messages - One frame may be fragmented into several frames
- efficient use of bandwidth relative to QoS
- sequence numbers
- uses fragmentation subheader
26More Features (Packing)
- The process of combining multiple MAC SDUs (or
fragments thereof) into a single MAC PDU - On connections with variable length MAC SDUs
- Packed PDU contains a sub-header for each packed
SDU (or fragment thereof) -
- On connections with fixed length MAC SDUs
- No packing sub-header needed
- Packing and fragmentation can be combined
- Can, in certain situations, save up to 10 of
system bandwidth
27MAC Management Messages
- Handle ranging, registration, privacy and
describing downlink and uplink - link describing
- BS transmits channel uplink and downlink
descriptor messages (UCD and DCD) at periodic
intervals - UCD and DCD contain burst profile info on
modulation, error-correction, preamble length,
etc. - uplink and downlink map messages (UL-MAP, DL-MAP)
define burst start times and allocate access to
corresponding link channel - ranging subscriber stations transmit ranging
requests at initialization and then periodically - determines power and burst profile changes
(starts with lowest power level and then moves
up)
28Management Connections
- 3 management connections correspond to 3
different QoS levels of management traffic - basic connection short delay
- primary management connection longer, more
delaytolerant messages - secondary management connection delay-tolerant,
standards-based messages (DHCP, SNMP etc.)
29QoS Principles
- Packets are associated with a service flow, which
is the central concept of the MAC protocol - Service flow an unidirectional flow of packets
with a particular QoS - Service flow has parameters like bandwidth,
latency, jitter and other QoS-related variables - When data comes to mac layer, the convergence
sublayer gives it an connection ID (CID) - The service flow is mapped to this ID CID,SFID
30QoS Architecture of IEEE 802.16
- The BS determines through UL-MAP which minislots
are subject to collision - The BS uplink-scheduling module determines the
IEs using bandwidth request PDU (BW-request) sent
from SSs to BS. - Two modes of transmitting the BW-Request
- Contention mode
- Contention-free mode (polling, piggybacking)
31QoS Architecture of IEEE 802.16 (contd)
- In contention mode, SSs send BW-Request during
the contention period. Contention is risolved
using back-off - In contention-free mode, BS polls each SS and SSs
reply by sending BW-request. - Due to the predictable signaling delay of the
polling scheme, contention-free mode is suitable
for real time applications. - Uplink Bandwidth Allocation scheduling resides in
the BS to control all the uplink packet
transmissions.
32QoS Architecture of IEEE 802.16 (contd)
- All packets from the application layer in the SS
are classified by the Packet Classifier based on
CID and are forwarded to the appropriate queue. - At the SS, the scheduler will retrieve the
packets from the queues and transmit them to the
network in the appropriate time slots as defined
by the UL-MAP sent by the BS. - The UL-MAP is determined by the Uplink Bandwidth
Allocation Scheduling based on the BW-Request
messages that report the current queue size of
each connection in SS. - For UGS, BW-Request is not required.
- For rtPS, nrtPS and BE, the current queue size
is included in the BW-request to represent the
current bandwidth demand - In summary, IEEE 802.16 defines
- The signaling mechanism for information exchange
between BS and SS such as the connection setup,
BW-Request, and UL-MAP - The Uplink Scheduling for UGS service flow
- IEEE 802.16 does not define
- The Uplink scheduling for rtPS, nrtPS, BE service
flow - The Admission Control and Traffic Policing
process
33QoS Architecture of IEEE 802.16 (contd)
34Table 1 End-user Performance Expectations
Conversational/Real-time Services
35Table 2 End-user Performance Expectations
Interactive Services
36Table 3 End-user Performance Expectations
Streaming Services
37Binary Exponential Backoff (BEB)
- The BS schedules one RIE per uplink frame
through a UL-MAP message - Each RIE consist of a number of Contention
Opportinities (CO) for contention based random
access - BS-controlled BEB with a minimum backoff window
(BW) and a maximum BW - BW values are power-of-two and are specified as
part of UCD message (a value of 3 indicates a
window between 0 and 7) - When an SS has bandwidth request and wants to
access the channel, it sets its internal BW to
BWmin defined in the UCD message of UL-MAP
message currently in effect. Then the SS shall
randomly select a number within its BW. - This random value indicates the number of COs
that the SS shall defer befor trasmitting
38QoS Provisioning
39Request/Grant Scheme
- Increasing (or decreasing) bandwidth requirements
is necessary for all services except
incompressible constant bit rate UGS connections. - The needs of incompressible UGS connections do
not change between connection establishment and
termination. - The requirements of compressible UGS connections,
such as channelized T1, may increase or decrease
depending on traffic. - 802.16 emplys a self-correcting mechanism for BW
request/grant - No acknowledgements
- All errors are handled in the same way, i.e.,
periodical aggregate requests - The period may be a function of the QoS of a
particular service and of the link quality - Bandwidth Requests are always per Connection
- Grants are either per Connection (GPC) or per
Subscriber Station (GPSS) - Grants (given as durations) are carried in the
UL-MAP messages - SS needs to convert the time to amount of data
using information about the UIUC
40Bandwidth Request Header
- Bandwidth is always requested on a CID basis and
bandwidth is allocated on a SS basis - The Bandwidth Request PDU consist of bandwidth
request header alone and not contain a payload. - Come from the Connection
- Several kinds of requests
- Implicit requests (UGS)
- No actual messages, negotiated at connection
setup - BW request messages
- Uses the special BW request header
- Requests up to 32 KB with a single message
- Incremental or aggregate, as indicated by MAC
header - Piggybacked request (for non-UGS services only)
- Presented in GM sub-header and always incremental
- Up to 32 KB per request for the CID
- Poll-Me bit (for UGS services only)
- Used by the SS to request a bandwidth poll for
non-UGS services
41GPSS vs. GPCC
- Two basic approaches on the way to grant BW
- Bandwidth Grant per Subscriber Station (GPSS)
- Base station grants bandwidth to the subscriber
station - Subscriber station may re-distribute bandwidth
among its connections, maintaining QoS and
service-level connections agreements - Suitable for many connections per terminal
off-loading base stations work - Allows more sophisticated reaction to QoS needs
- Low overhead but requires intelligent subscriber
station - Mandatory for P802.16 10-66 GHz PHY
- Bandwidth Grant per Connection (GPC)
- Base station grants bandwidth to a connection
- Mostly suitable for few users per subscriber
station - Higher overhead, but allows simpler subscriber
42Maintaining QoS in GPSS
- Semi-distributed approach
- BS sees the requests for each connection based
on this, grants bandwidth (BW) to the SSs
(maintaining QoS and fairness) - SS scheduler maintains QoS among its connections
and is responsible to share the BW among the
connections (maintaining QoS and fairness) - Algorithm in BS and SS can be very different SS
may use BW in a way unforeseen by the BS
43Network Entry
- In order to communicate on the network an SS
needs to successfully complete the network entry
process with the desired BS. - The network entry process is divided into
- DL channel synchronization
- Initial ranging
- Capabilities negotiation
- Authentication message exchange
- Registration
- IP connectivity
- The network entry state machine moves to reset
if it fails to succeed from a state. - Upon completion of the network entry process,
the SS creates one or more service flows to send
data to the BS.
44Downlink Channel Synchronization
- When an SS wishes to enter the network, it scans
for a channel in the defined frequency list. - Normally an SS is configured to use a specific BS
with a given set of operational parameters, when
operating in a licensed band. -
- If the SS finds a DL channel and is able to
synchronize at the PHY level (it detects the
periodic frame preamble) - The MAC layer looks for DCD and UCD to get
information on modulation and other DL and UL
parameters.
45Initial Ranging
- When an SS has synchronized with the DL channel
and received the DL and UL MAP for a frame, it
begins the initial ranging process by sending a
ranging request MAC message on the initial
ranging interval using the minimum transmission
power. - If it does not receive a response
- The SS sends the ranging request again in a
subsequent frame, using higher transmission
power. - Eventually the SS receives a ranging response.
- The response either indicates power and timing
corrections that the SS must make or indicates
success. - If the response indicates corrections,
- the SS makes these corrections and sends another
ranging request. - If the response indicates success,
- the SS is ready to send data on the UL.
46Negotiation Capabilities
- After successful completion of initial ranging,
the SS sends a capability request message to the
BS describing its capabilities in terms of the
supported modulation levels, coding schemes and
rates, and duplexing methods. - The BS accepts or denies the SS, based on its
capabilities.
Authentication
- After capability negotiation, the BS
authenticates the SS and provides key material to
enable the ciphering of data. - The SS sends the X.509 certificate of the SS
manufacturer and a description of the supported
cryptographic algorithms to its BS. - The BS validates the identity of the SS,
determines the cipher algorithm and protocol that
should be used, and sends an authentication
response to the SS. - The response contains the key material to be used
by the SS. - The SS is required to periodically perform the
authentication and key exchange procedures to
refresh its key material.
47Registration
- After successful completion of authentication the
SS registers with the network. - The SS sends a registration request message to
the BS, and the BS sends a registration response
to the SS. - The registration exchange includes
- IP version support
- SS managed or non-managed support
- ARQ parameters support
- Classification option support
- CRC support
- Flow Control
IP Connectivity
- The SS then starts DHCP (IETF RFC 2131) to get
the IP address and other parameters to establish
IP connectivity - The BS and SS maintain the current date and time
using the time of the day protocol (IETF RFC868).
The SS then downloads operational parameters
using TFTP (IETF RFC 1350).
48Transport Connection Creation
- After completion of registration and the transfer
of operational parameters, transport connections
are created. - For preprovisioned service flows, the connection
creation process is initiated by the BS. - The BS sends a dynamic service flow addition
request message to the SS and the SS sends a
response to confirm the creation of the
connection. - Connection creation for non-preprovisioned
service flows is initiated by the SS by sending a
dynamic service flow addition request message to
the BS. - The BS responds with a confirmation.
49Acknowledgments
- A special thank to N. Scalabrino for having
provided some (?) base material
50Downlink/Uplink Scheduling
- Radio resources have to be scheduled according to
the QoS(Quality of Service) parameters - Downlink scheduling
- the flows are simply multiplexed
- the standard scheduling algorithms can be used
- WRR(Weighted Round Robin)
- VT(Virtual Time)
- WFQ(Weighted Fair Queueing)
- WFFQ(Worst-case Fair weighted Fair Queueing)
- DRR(Deficit Round Robin)
- DDRR(Distributed Deficit Round Robin)
51WRR
- It is an extention of round robin scheduling
based on the static weight.
Counter Reset Cycle
1
1
1
VCC 1 (Source 1)
2
1
1
2
3
1
1
1
2
3
3
3
3
3
2
2
VCC 2 (Source 2)
3
WRR scheduler
3
3
3
VCC 3 (Source 3)
3
3
52VT
- VT aims to emulate the TDM(Time Division
Multiplexing) system - connection 1 reserves 50 of the link bandwidth
- connection 2, 3 reserves 20 of the link
bandwidth -
Connection 1 Average
inter-arrival 2 units
Connection 1 Average
inter-arrival 2 units
Connection 2 Average
inter-arrival 5 units
Connection 3 Average
inter-arrival 5 units
First-Come-First-Served service order
Virtual times
Virtual Clock service order
53FFQ
- FFQ(Fluid Fair Queue) head-of-the line
processor sharing service discipline - guaranteed rate to connection i
- C the link speed
- the set of non-empty queue
- The service rate for a non-empty queue i
54WFQ and WFFQ
- WFQ picks the first packet that would complete
service in the corresponding FFQ system - WFFQ picks the first packet that would complete
service among the set of packets that have
started service in the corresponding FFQ system
55VT and WFQ
- All packets are fixed size and require exactly
one second to service - Starting at time zero, 1000 packets from
connection 1 arrive at a rate of 1 packet/second - Starting at time 900, 450 packets from connection
2 arrive at a rate of 1 packet/second - The completion times of the 901, 902, 903,
packets of connection 1 in FFQ system are 1802,
1904, 1806, - The completion times of the 1, 2, 3, packets of
connection 2 in FFQ system are 901, 902, 903,
56Connection 1
Connection 1
Connection 2
Virtual Clock Service Order
898
900
902
904
WFQ Service Order
898
900
902
904
Figure 7. WFQ and Virtual Clock
57Deficit Round Robin
- Each connection is assigned a state variable
called the DC(Deficit Counter). - At the start of each round, DCi of queue i is
incremented by a specific service share(quantum) - If the length of the head of the line packet, Li,
is less than or equal to DCi,, the scheduler
allows the ith queue to send a packet. - Once the transmission is completed DCi is
decremented by Li.
58- Deficit Round Robin Scheme
Qi
3500
initializing
(1st round)
DCi
3500
2800
7800
2000
serviced
1500
2800
7800
2000
Not serviced
(2nd round)
5000
2800
7800
2000
serviced
(3rd round)
700
2800
7800
2000
serviced
(4th round)
1400
2800
7800
2000
59Distributed Deficit Round Robin
- Each connection is assigned a state variable
called the DC(Deficit Counter) - If the value of the DCi is positive then the
scheduler allows the ith queue to send a packet. - Once the transmission is completed DCi is
decremented by Li, the length of the transmitted
packet . - At the start of the subsequent rounds, DCi is
incremented by a specific service share(quantum)
60- Distributed Deficit Round Robin Scheme
Qi
3500
initializing
(1st round)
DCi
3500
2800
7800
2000
serviced
1500
2800
7800
2000
serviced
-6300
2800
7800
2000
Not serviced
(2nd round)
-2800
2800
7800
2000
Not serviced
700
2800
7800
2000
(3rd round)
serviced
-2100
2800
7800
2000
61Downlink/Uplink Scheduling
- Uplink scheduling
- Responsible for the efficient and fair allocation
of the resources(time slots) in the uplink
direction - Uplink carrier
- Reserved slots
- contention slots(random access slots)
- The standard scheduling algorithms can be used