Evaluation Procedure for 802.16 MAC Protocols -...

Post on 17-May-2018

212 views 0 download

transcript

Evaluation Procedure for 802.16 MAC Protocols

IEEE 802.16 Presentation Submission Template (Rev. 8)Document Number: IEEE 802.16.1mp-00/16Date Submitted: 2000-04-25Source:

Hoon Choi , Nader Moayeri Voice:301-975-{8429 , 3767}National Institute of Standards and Technology Fax: 301-590-0932100 Bureau Drive Stop 8920 E-mail: {hchoi , moayeri}@nist.govGaithersburg, MD 20899-8920

Venue:IEEE 802.16 Session #7, 1-5 May 2000, Gaithersburg, Maryland, USA

Base Document:IEEE 802.16.1mc-00/16 <http://grouper.ieee.org/groups/802/16/mac/contrib/802161mc-00_16.pdf>

Purpose:To jumpstart a debate within IEEE 802.16 on how the current set of 802.16.1 MAC proposals should be evaluated.

Notice:This document has been prepared to assist IEEE 802.16. It is offered as a basis for discussion and is not binding on the contributing individual(s) or organization(s).The material in this document is subject to change in form and content after further study. The contributor(s) reserve(s) the right to add, amend or withdraw materialcontained herein.

Release:The contributor grants a free, irrevocable license to the IEEE to incorporate text contained in this contribution, and any modifications thereof, in the creation of anIEEE Standards publication; to copyright in the IEEE’s name any IEEE Standards publication even though it may include portions of this contribution; and at theIEEE’s sole discretion to permit others to reproduce in whole or in part the resulting IEEE Standards publication. The contributor also acknowledges and acceptsthat this contribution may be made public by IEEE 802.16.

IEEE 802.16 Patent Policy:The contributor is familiar with the IEEE 802.16 Patent Policy and Procedures (Version 1.0) <http://ieee802.org/16/ipr/patents/policy.html>, including the statement“IEEE standards may include the known use of patent(s), including patent applications, if there is technical justification in the opinion of the standards-developingcommittee and provided the IEEE receives assurance from the patent holder that it will license applicants under reasonable terms and conditions for the purpose ofimplementing the standard.”

Early disclosure to the Working Group of patent information that might be relevant to the standard is essential to reduce the possibility for delays in thedevelopment process and increase the likelihood that the draft publication will be approved for publication. Please notify the Chair <mailto:r.b.marks@ieee.org> asearly as possible, in written or electronic form, of any patents (granted or under application) that may cover technology that is under consideration by or has beenapproved by IEEE 802.16. The Chair will disclose this notification via the IEEE 802.16 web site<http://ieee802.org/16/ipr/patents/letters>.

2

Evaluation Procedure for 802.16 MAC Protocols

Contents

1. Introduction

2. Comparison of the two MAC Proposals

3. System Model 3.1 Model Topology

3.2 Input Traffic Model

4. Measures and Evaluation Procedure4.1 Delivered Bandwidth

4.2 Delay

4.3 Flexible Asymmetry

4.4 Fairness

3

Introduction

� This is in response to the Call for Contributions on MAC-Layer Modeling(IEEE 802.16.1m-00/02) and the Call for Evaluations, Improvements, andMergers (IEEE 802.16-00/11).

� Purpose of this document� To define a general process for modeling, simulation, and evaluation of the

current set of 802.16.1 MAC proposals (Documents IEEE 802.16.1mc-00/09 andIEEE 802.16.1mc-00/10)

� To jumpstart a debate on how the current set of the MAC proposals should beevaluated.

� This document includes :� A brief overview of differences between two proposals

� An evaluation model

� A range of parameter values and traffic models for simulations

� A procedure for performance evaluation.

4

Comparison of the Two Proposals

� Two proposals for the LMDS MAC protocol :

IEEE 802.16.1mc-00/09 and IEEE 802.16.1mc-00/10

� A brief description of the two proposals w.r.t.� Framing and formatting

� Initialization/registration procedure

� Bandwidth request/allocation procedure

� Contention resolution scheme

� QoS support and data unit handling capabilities

� The two proposals share a number of similar concepts.

5

System Models

� Evaluation of the LMDS MAC protocols in a wireless access network(a cell)

� Logical topology of the stations

BS

user station

Boundaryof the cellBS

US 1 US 2 US 3 US 4 US 5 … US N

6

� Definition of Service Access Points (SAP)

PHY

MAC

SAP(0,MAC,C) SAP(0,

MAC,Dn)

SAP(0,PHY,C)

SAP(0,PHY,Dn)

SAP(0,MAC,D1)

PHY

MAC

SAP(1,MAC,C)

SAP(1,MAC,Dn)

SAP(1,PHY,C)

SAP(1,PHY,Dn)

PHY

MAC

SAP(N,MAC,C)

SAP(N,MAC,Dn)

SAP(N,PHY,C)

SAP(N,PHY,Dn)

SAP(1,MAC,D1)

shared radio link

Base Station User Station 1 User Station N

SAP(0,MAC,C) : SAP for Control information at MAC layer in the Base Station

SAP(k,MAC,Dn) : SAP for Data connection n at MAC layer in the User Station k

SAP(k,PHY,D1) : SAP for Data connection 1 to PHY layer in the User Station k

7

Simulation Parameters

� Some of the simulation parameters

5 % of the simulation timeLength of the run prior to gathering statistics

Depends on the statistical confidence of outputLength of simulation run, T

15 (window size = 32K)Maximum back-off parameter

1 (window size = 2)Initial back-off parameter

10E-4, 10E-6, 10E-9Bit error ratio

3.3 µsec/kmPropagation delay

2 Mbps, 9 Mbps, 45 Mbps, 155 MbpsAggregated upstream data transmission rate

2 Mbps, 9 Mbps, 45 Mbps, 155 MbpsDownstream data transmission rate

30, 60, 90, 120, 150Number of user stations in a sector

10% ~ 50% ~ 70%Ratio of uplink slots to downlink’s in TDD

TDD, FDDDuplexing schemes

1Number of channels in a sector

1, 3, 6Number of sectors in a cell

0.5 km, 1 km, 1.5 km, 2 kmCell radius, r

ValuesSimulation Parameters

8

Input Traffic Model

� 5 Traffic types

� For bursty traffic source� Class A : bursty traffic (e.g. Internet telnet service data or E-mail type data)

� Class B : bursty and bulky traffic (e.g. Web browsing, file transfer type data)

� Class C : sporadic data traffic (e.g. Web traffic on the upstream link)

� For smooth traffic source� Class D : constant data rate traffic (e.g. CBR data, circuit simulation)

� Class E : variable data rate traffic (e.g. compressed voice/video)

9

� Definition of session for bursty data traffic

� Packet call in the session represents a collection of IP packets, such as packetsfrom a web page.

Session

Packet call interval

Packet call…

10

� Class A� Poisson arrivals of sessions (arrival rate λA)� Geometrically distributed number of packet calls per session with mean 114� Geometrically distributed interval time between packet calls with mean 1 second� One packet per packet call� Geometrically distributed packet sizes with mean 90 bytes

� Class B� Poisson arrivals of sessions (arrival rate λB)� Geometrically distributed number of packet calls per session with mean 5� Geometrically distributed interval time between packet calls with mean 120 seconds� Geometrically distributed inter-arrival time between packets with mean 0.01 second� Pareto distributed number of packets per packet call with parameters α=1.1, k =2.27

(mean=25), where Pareto distribution with parameters α and k is given as

� Fixed packet sizes of 480 bytes

��

���

<

>?−=kx

kxxk

xFn whe0

,0 when )(1)(α

11

� Class C� Poisson arrivals of sessions (arrival rate λB)

� Geometrically distributed number of packet calls per session with mean 5

� Geometrically distributed interval time between packet calls with mean 120 seconds

� Geometrically distributed inter-arrival time between packets with mean 0.01 second� Pareto distributed number of packets per packet call with parameters α=1.1, k =2.27

(mean=25)

� Fixed packet sizes of 90 bytes

� Class D� Deterministic arrival of packet. Rate is dependent on an application

� Fixed packet sizes of 53 bytes

� Class E� Arrivals of packets by Markov Modulated Poisson Process (arrival rates λE1 and λE2)

� Geometrically distributed packet sizes with mean 180 bytes

12

Measures and Evaluation Procedures

� Delivered Bandwidth

� Initial Registration Delay

� Bandwidth Request Delay

�MAC Transit Delay

� Access Network Transit Delay

� Delays with respect to the Number of Stations

� Flexible Asymmetry

� Fairness

� Needs a simulation model of the PHY layer.

13

Bandwidth Request Delay

� Both explicit and implicit (piggybacking, poll me bit, bandwidth stealing)bandwidth request mechanism should be implemented.

� The FIFO scheduling policy is assumed for servicing registration orbandwidth requests in the BS.

� Evaluation Procedure 1. Choose 7 user stations that belong to the same sector and are located at i*r/7 km from

the BS.

Boundaryof the cellBS

US 1 US 2 US 3 US 4 US 5 US 6 US 7

14

2. Associate Class A service to connection D1 at SAP(k, MAC, D1) which is assumed tomap to SAP(k, PHY, D1). Likewise associate Class C, Class D, and Class E serviceto connection D2, D3 and D4, respectively, as shown below.

SAP(k,PHY,D1) SAP(k,PHY,D2)

SAP(k,PHY,D3)

SAP(k,PHY,D4)

SAP(k,MAC,D1)SAP(k,MAC,D2)

SAP(k,MAC,D3) SAP(k,MAC,D4)

Class A Class C Class D Class E

MAC

15

3. All user stations in the cell generate Classes A, C, D, and E traffic according to theparameters of the traffic classes.

4. Generate a bandwidth request each time a new session of Class A or C arrives.

5. Measure the time difference between the instance at which the request is made atSAP(k, PHY, C) and the instance at which the grant is received at SAP(k, PHY, C).Count the number of collisions, if any.

MAC

SAP(0,MAC,C)

SAP(0,PHY,C)

PHY

MAC

SAP(k,MAC,C)

SAP(k,PHY,C)

… …

BS US k

16

6. Repeat steps 4~5 for a simulation of duration T seconds and compute the mean.

7. Repeat steps 4~6 for each of the other 6 user stations.

8. Plot a graph of the mean registration delay for each of the 7 user stations along withthe average of the 7 values.

9. Plot a graph of the number of collisions for each of the 7 user stations along with theaverage of the 7 values.

10. Let the registration request rate increase at all user stations and repeat steps 4~6.

11. Plot a line graph of the mean delay vs. the offered load, that is, the sum of bandwidthrequests by all the user stations.

MeanDelay

msec

Offered load (Mbps)

MeanDelay

msec

Average

US 1

US 7

US 3

17

Access Network Transit Delay

� Definition of the access network transit delay� The time difference between the instance at which the first bit of a service data

unit crosses SAP(k, MAC, D*) and the instance at which the last bit of the sameservice data unit crosses SAP(0, MAC, D*).

� This time includes the bandwidth request delay, contention resolution delay (ifnecessary), the messaging delay including fragmentation/concatenation, and thepropagation delay.

� We assume a constant amount of time is needed to frame a single message,regardless of the message type.

MAC

SAP(0,MAC,Dn)

PHY

MAC

SAP(k,MAC,Dn)

… …

Base Station User Station k

18

� Evaluation Procedure

1. Choose 7 user stations as before.

2. Associate Class A service to connection D1 at SAP(k, MAC, D1), and Class C, D, andE service to connections D2, D3, and D4 at SAP(k, MAC, D2), SAP(k, MAC, D3),and SAP(k, MAC, D4), respectively.

Boundaryof the cellBS

US 1 US 2 US 3 US 4 US 5 US 6 US 7

SAP(k,PHY,D1) SAP(k,PHY,D2)

SAP(k,PHY,D3)

SAP(k,PHY,D4)

SAP(k,MAC,D1)SAP(k,MAC,D2)

SAP(k,MAC,D3) SAP(k,MAC,D4)

Class A Class C Class D Class E

MAC

19

3. All user stations in the cell generate Classes A, C, D, and E traffic according to theparameters of the traffic classes.

4. Measure the time difference between the instance at which the first bit of a servicedata unit crosses SAP(k, MAC, D*) and the instance at which the last bit of the samedata crosses SAP(0, MAC, D*) for each connection.

5. Repeat steps 3~4 for a simulation of duration T seconds and compute the mean andthe variation of delay for each connection.

6. Repeat steps 3~5 for each of the other 6 user stations.

MAC

SAP(0,MAC,Dn)

PHY

MAC

SAP(k,MAC,Dn)

… …

Base Station User Station k

20

7. Plot a graph of the mean transit delay for each of the 7 user stations along with theaverage of the 7 values.

8. Plot a graph that shows the coefficient of variation of the MAC transit delay for ClassD vs. station number.

9. Let the registration request rate increase at all user stations and repeat steps 3~5.

10. Plot a line graph of the mean delay vs. the offered load, that is, the sum of bandwidthrequests by all the user stations.

MeanDelay

msec

Average

US 7

US 3

Class E

Class D

Class C

Class A

MeanDelay

msec

Offered load (Mbps)

21

Delivered Bandwidth

� According to the functional requirement document, the 802.16 protocol shallbe optimized to provide the peak capacity from 2 to 155 Mbps to a userstation “sufficiently” close to the base station.

�Measurement of the delivered data rate

PHY

MAC

SAP(0,MAC,C)

SAP(0,MAC,D1)

PHY

MAC

SAP(k,MAC,C)

SAP(k,MAC,D1)

… …

Base Station User Station k

Class D

22

� Experiment A:1. Choose a user station k that is away from the base station by about 1/3 of the

cell radius.

2. Feed Class D traffic at SAP(k, MAC, D1). Increase the data rate from 0 Mbpsto 155 Mbps while other user stations do not generate a traffic.

3. Measure the amount of received data at SAP(0, MAC, D1), and measure theelapsed time.

4. Plot the received (delivered) bandwidth vs. generated traffic.

� Experiment B:1. User station k keeps generating data at the rate of 155 Mbps and the aggregated

traffic volume from the remaining user stations increases from 0 Mbps in 2Mbps increments.

2. Measure the amount of received data at SAP(0, MAC, D1) from user station k,and measure the elapsed time.

3. Plot the received bandwidth vs. the offered load, that is, the total traffic from allthe user stations.

23

Flexible Asymmetry

� The MAC protocol shall support for flexibility between delivered upstreamand downstream bandwidth.

� Repeat the experiments so far as the ratio of aggregated upstream bandwidthto downstream varies 3:7, 4:6, 5:5, 6:4, 7:3, etc..

�Measure and plot the bandwidth of downstream when the aggregatedupstream bandwidth varies from 2 Mbps to 155 Mbps. Check which protocolgives higher downstream bandwidth and smooth change.

24

Fairness

� The graphs of delays at 7 stations show the performance variation of theMAC protocols with respect to distance. The preferred protocol should givesmaller difference in the amount of various delay times regardless of thedistance of the user station from the base station.

Boundaryof the cell

BS

US 1 US 2 US 3 US 4 US 5 US 6 US 7

MeanDelay

msec

Average

US 1

US 7

US 3