WiMAX Possible ResearchAxis in Radio ResourceManagement … Research Axis... · Possible...

86
WiMAX Possible Research Axis in Radio Resource Management Loutfi Nuaymi TELECOM Bretagne, Rennes (ex: ENST Bretagne) Lisbon, Feb 19, 2008

Transcript of WiMAX Possible ResearchAxis in Radio ResourceManagement … Research Axis... · Possible...

WiMAXPossible Research Axis in Radio Resource Management

Loutfi Nuaymi TELECOM Bretagne, Rennes (ex: ENST Bretagne)

Lisbon, Feb 19, 2008

L. Nuaymi (c), Telecom Bretagne, NSM (RSM) Dept - v2.1 - 2008 2

Presentation Plan

• WiMAX Framework

• Possible research in radio resource management

• Conclusions and Future works

• Discussion

L. Nuaymi (c), Telecom Bretagne, NSM (RSM) Dept - v2.1 - 2008 3

1- The context:

� WiMAX technology, based on IEEE 802.16 standard ([802.16-2004] and [802.16e]), has a very rich set of features.

A technical introduction to WiMAX is proposed in �

[802.16-2004] IEEE 802.16-2004, IEEE Standard for local and metropolitan area networks, Air Interface for Fixed Broadband Wireless Access Systems, Oct 2004.

[802.16e]IEEE 802.16e, IEEE Standard for local and metropolitan area networks, Air Interface for Fixed Broadband WirelessAccess Systems, Amendment 2: Physical and Medium Access Control Layers for Combined Fixed and Mobile Operation inLicensed Bands and Corrigendum 1, Feb 2006 (Approved: 7dec 2005).

L. Nuaymi (c), Telecom Bretagne, NSM (RSM) Dept - v2.1 - 2008 4

1- The context:

� WiMAX is:

- OFDM Transmission;

- Sophisticated MAC Layer: efficient use of the frequency AND QoS Management;

� The (expected?) result is:

- High Data rates (order: 1, 5, 10, 20, … Mb/s).

- Different types of transmission services: voice, video, games, real-time, Best Effort, …

L. Nuaymi (c), Telecom Bretagne, NSM (RSM) Dept - v2.1 - 2008 5

1- The context:… and mobility was added

Initially ‘wireless DSL’,

… WiMAX expected evolution is to be a complement or a competitor for cellular systems (such as UMTS and LTE)

mobility (only up to 120 km/h?)

Other possible use of WiMAX: telemetering� Reporting of electricity, gas, water and other measurements

L. Nuaymi (c), Telecom Bretagne, NSM (RSM) Dept - v2.1 - 2008 6

1- The context:

� Pre-WiMAX products: many companies had wireless broadband equipment using proprietary technology since the nineties and even before.Evidently these products were not interoperable.

� 2001:The first version of IEEE 802.16 standard.

� 2004: IEEE 802.16-2004 : revises and consolidates previous 802.16 Standards � Fixed WiMAX

� dec 2005: approval of IEEE 802.16e amendment which (mainly) adds mobility � Mobile WiMAX

� Other 802.16 standards : 802.16f (MIB, SNMP), 802.16g (QoSmanagement, radio resource management procedures, MIH), 802.16h (License-Exempt Operation), 802.16j (Mesh networks)and … mainly: 802.16m: Higher data rates (> 100 Mb/s) for mobiles users (approval expected by 2009). Other (possible) names : WiMAX2 , WiMagic , …?

L. Nuaymi (c), Telecom Bretagne, NSM (RSM) Dept - v2.1 - 2008 7

1- The context:Korean flavor of WiMAX: WiBro

� WiBro (Wireless Broadband): BWA System proposed in Korea by Samsung, KT (Korea Telecom) and other leading players.Standard approved in june 2004, by TTA (Telecommunications Technology Association) under the name TTA PG302.

� Agreement in the second half of 2004 to integrate WiBro in Mobile WiMAX(802.16e)

� 3 WiBro licences assigned in Korea in january 2005.

Commercial offers (Mobile WiMAX) since june 2006.

L. Nuaymi (c), Telecom Bretagne, NSM (RSM) Dept - v2.1 - 2008 8

1- The context:Evolution of BWA subscribers number

Source: Accumulated WiMAX and proprietary subscribers, from: "WiMAX and Broadband Wireless (Sub-11GHz) Worldwide Market Analysis and Trends 2006-2012", Maravedis Report, Sept 2006

L. Nuaymi (c), Telecom Bretagne, NSM (RSM) Dept - v2.1 - 2008 9

1- The context:

United States:The US operator Sprint-Nextel announced (august 2006) a wide scaledeployment of Mobile WiMAX.

First commercial services expected before end 2007.

Update � Joint network between Sprint and Clearwire announced in July 07.

Abandoned since! Delays expected: 2009?

… many other expected Mobile WiMAX deployments

L. Nuaymi (c), Telecom Bretagne, NSM (RSM) Dept - v2.1 - 2008 10

1- The context:

•WiMAX: a «swiss knife» technology !

• Oct 2007: Mobile WiMAX has been selected as a new IMT-2000 (3G) radio interface. Name: IMT-2000 OFDMA TDD WMAN

Until then, only five IMT-2000 interfaces were defined.

L. Nuaymi (c), Telecom Bretagne, NSM (RSM) Dept - v2.1 - 2008 11

2- WiMAX Standard basics:

Two topologies (modes) can be used:PMP andMesh

�PMP (Infrastrucure)Point-to-MultiPoint

wireless terminal

PMP topology: the BScovers its SSs. All

transmissions end orstart at the BS

PDA

OtherWiMAX SS

L. Nuaymi (c), Telecom Bretagne, NSM (RSM) Dept - v2.1 - 2008 12

(Mesh) optional mode� Traffic can be routed through other SSs until the BS. Also can take place only between SSs.

2- WiMAX Standard basics:

Base station (BS)

SS3

SS1

SS2

L. Nuaymi (c), Telecom Bretagne, NSM (RSM) Dept - v2.1 - 2008 13

2- WiMAX Standard basics:

PossiblePHYsical layers

of WiMAX

Service-SpecificConvergenceSublayer (CS)

MAC CommonPart Sublayer

(CPS)

Security Sublayer

OFDM PHY Layer

[Section 8.3 ofthe standard]

OFDMA PHY Layer

[Section 8.4 ofthe standard]

WiMAX(common)MAC Layer

L. Nuaymi (c), Telecom Bretagne, NSM (RSM) Dept - v2.1 - 2008 14

The Service-Specific Convergence Sublayer(CS) is in charge ofmapping of data coming from an external network: IPv4, IPv6, Ethernet, ATM,... Received at the CS service access point (SAP)

CS sublayer tasks include:- classificationof SDUs;- association of each SDUsto the appropriate MAC SFID (service flow identifier) and CID(connection identifier);- (optional) PHS, Payload Header Suppression: suppression of repetitive header parts.

2- WiMAX Standard basics:Convergence Sublayer (CS)

Service-SpecificConvergenceSublayer (CS)

CS SAP

MAC SAP

MAC CommonPart Sublayer

(CPS)

External Network.Example: IP ou ATM

MSDU

L. Nuaymi (c), Telecom Bretagne, NSM (RSM) Dept - v2.1 - 2008 15

2- WiMAX Standard basics:Convergence Sublayer (CS)

(Packet) CS Classification � MAC SDU are mapped on convenient CIDs … beforetransmission between corresponding MAC entities. Figure: downlink

Figure source: standard

Upper Layer Entity (e.g., bridge, router, host)

SDU

SAP

Classifier

CID #1

CID #2

CID #...

CID #n {SDU, CID …}

802.16 MAC CPS

SAP

{SDU, CID …}

SAP

Reconstitution (e.g., undo PHS)

SDU

Upper Layer Entity (e.g., bridge, router, host)

802.16 MAC CPS

SAP

L. Nuaymi (c), Telecom Bretagne, NSM (RSM) Dept - v2.1 - 2008 16

2- WiMAX Standard basics:QoS Parameters

Each connection is associated with a single data service.

Each data service is associated with a set of QoS parameters* that quantify aspects of its behavior.

WiMAX QoS parameters include: Traffic priority, QoSClass (Scheduling Service Type), minimum rate, maximim latency, etc.

The QoS parameters are managed using the DSA (Dynamic Service Addition) and DSC (Dynamic Service Change)message dialogs.

MAC Management Messages: DSA-REQ, DSA-RSP, …

* Detail of QoS parameters : Section 11.13 of the standard.

L. Nuaymi (c), Telecom Bretagne, NSM (RSM) Dept - v2.1 - 2008 17

2- WiMAXStandard basics:

ARQ

All flavors of ARQ included.

Figure: Cumulative ARQ process (use of a sliding window)

Transmitter Receiver

Frame #1

Cumulative ACK

Frame #2

Cumulative NACK

....

Frame #k

Acknowledgment for the previous block frames

Frame #k+1

....

Frame #k+k

No Acknowledgment for the previous block frames

Frame #k+1

....

Frame #k+k

Cumulative ACK

Acknowledgment for the previous block frames

Sliding Window = K

L. Nuaymi (c), Telecom Bretagne, NSM (RSM) Dept - v2.1 - 2008 18

2- WiMAX Standard basics:HARQ

HARQ (Hybrid ARQ): can be used only with OFDMA PHYsicalLayer

The main difference between ARQ and HARQ is that in HARQ,subsequent retransmissions are combined with the previous erroneously-received transmissions in order to improve reliability.

The two main variants of HARQ are supported:

- Chase Combining, for all coding schemes;

- Incremental Redundancy (IR), for CTC and CC. Each subpacket is uniquely identified by a SubPacket IDentifier (SPID).

L. Nuaymi (c), Telecom Bretagne, NSM (RSM) Dept - v2.1 - 2008 19

2- WiMAX Standard basics:(OFDMA) Channel Quality Information CHannel

For OFDMA PHY, the SS may send CINR (Carrier-to-Interference-and-Noise Ratio) reports using one of these methods:

- REP-RSPMAC Management message (Type = 37);

- the fast-feedback channel (CQICH ), see OFDMA f rame.

- MAC Header (MAC header format without payload), see below.

L. Nuaymi (c), Telecom Bretagne, NSM (RSM) Dept - v2.1 - 2008 20

2- WiMAX Standard basics:AAS, beamforming and smart antenna

Smart antennas guarantee better performances: capacity(throughput) and range.

Figure Source : Schwarz, John,

WiMAX Summit 06

user

omni/sectorreference

co-channel user

coherent gain

passive mitigation

active mitigation

L. Nuaymi (c), Telecom Bretagne, NSM (RSM) Dept - v2.1 - 2008 21

2- WiMAX Standard basics:MIMO

MIMO: Multiple Input, Multiple Output

The MIMO technique expected to be used in WiMAX isSTC, Space-Time Coding.

STC: redundant transmission of data, in time and space (antennes). Use of Alamouti Algorithm.

The basic version, without MIMO, is sometimes known as SISO Figure: J. Andrews, Univ. of Texas at Austin

L. Nuaymi (c), Telecom Bretagne, NSM (RSM) Dept - v2.1 - 2008 22

2- WiMAX Standard basics: MIMO

MIMO-STC performance

- Link adaptation included

- This type of figures is strongly dependent on the simulation

environment (channel

model, etc.)

Figure: J. Andrews,

Univ. of Texas at Austin

L. Nuaymi (c), Telecom Bretagne, NSM (RSM) Dept - v2.1 - 2008 23

2- WiMAX Standard basics: MIMO

SM, Spatial Multiplexing• During a symbol interval, different information is sent in parallel

on different antennas � greater capacity.• No diversity. Yet …

‘intelligent’ flow allocations allow better performances (see space-time precoding theory);

• SM not included in present versions of WIMAX

Figure: J. Andrews, Univ. of Texas at Austin

L. Nuaymi (c), Telecom Bretagne, NSM (RSM) Dept - v2.1 - 2008 24

2- WiMAX Standard basics:Architecture

IEEE 802.16 standard defines only the PHY and MAC layers of a BWA System.

The architecture of WiMAX System is defined by the WiMAX Forum, specifically by theNWG (Network Group) of the WiMAX Forum.

� Network Reference Model

Source: (Draft du NWG) WiMAX Forum, « WiMAX End-to-End Network Systems Architecture, (Stage 2: Architecture Tenets, Reference Model and Reference Points) », Draft, March 2006

NAP

R1 R3 R5

SS/MS

R2

ASN CSN CSN

ASP Network ORInternet

ASP Network ORInternet

R4

Another ASN

R2Visited NSP Home NSP

L. Nuaymi (c), Telecom Bretagne, NSM (RSM) Dept - v2.1 - 2008 25

2- WiMAX Standard basics:Handover

In 802.16e, the 2 types of handover are defined:- hard handover: break-before-make;

- soft handover (make-before-break): 2 types of soft handover are defined:

- MDHO (Macro Diversity HandOver) : transmissions are between the MS and more than one BS; - FBSS (Fast BS Switching): a state where the MS may rapidly switch from one BS to another.

Only the Hard Handover is mandatory

L. Nuaymi (c), Telecom Bretagne, NSM (RSM) Dept - v2.1 - 2008 26

2- WiMAX Standard basics:Power-Save Modes

Active Mode : the normal mode that exists in 802.16-2004.

IEEE 802.16e defines two new modes: Sleep Modeand Idle Modein order to have:- power-efficient MS operation,- a more efficient handover.

L. Nuaymi (c), Telecom Bretagne, NSM (RSM) Dept - v2.1 - 2008 27

2- WiMAX Standard basics:Ranging

The ranging process is defined in 802.16 standard as the process which allows the SSs to:

- acquire the correct timing offset of the network.

- request power adjustments and/or downlink burst profile change. The SS can then be received within the appropriate reception thresholds.

Two types of Ranging processes:

- initial ranging : a loop between the SS and the BS until power and timing are ok ;

- periodical ranging (see Power Control).

power and timing is ok

L. Nuaymi (c), Telecom Bretagne, NSM (RSM) Dept - v2.1 - 2008 28

2- WiMAX Standard basics:Mobile WiMAX (System) Profiles

• Release 1of 16e profiles is divided in two waves:

Wave 1: minimal set. Subset of Release 1:- TDD, 5 ms frame, CP=1/8, …- Channel Coding modes (CC, CTC, H-ARQ-CC)- Mobility- Power Save modes (Sleep, Idle)- SISO- 2.3 GHz

Wave 2: MIMO, AAS, MBS (Broadcast Service)

• (expected) Release 2: bandwidthes of 15 and 20 MHz. More ambitiousservices.

L. Nuaymi (c), Telecom Bretagne, NSM (RSM) Dept - v2.1 - 2008 29

2- WiMAX Standard basics:Mobile WiMAX (System) Profiles!! Delays !! Update!!

Source: WiMAX forum, white paper, Jan 07

L. Nuaymi (c), Telecom Bretagne, NSM (RSM) Dept - v2.1 - 2008 30

2- WiMAX Standard basics:The frequencies:

� Two types of frequency bands are defined: (< 11 GHz) :- Licensed bands;- License-Exempt bands.

License-exempt bands have some drawbacks: more interference andmore important power limits …and an advantage: they are free !

• The license-exempt bands should have the same type of use as WiFi(limited coverage, associations, etc.).

• Operator revenues should be mainly from licensed-frequencies use, where the service can be guaranteed.

• Agnostic licences ?

� For licensed bands, the initial trend was : 3.5 GHz in Europe and 2.5 GHz in the US

L. Nuaymi (c), Telecom Bretagne, NSM (RSM) Dept - v2.1 - 2008 31

2- WiMAX Standard basics:Frequency reuse

Example :� Cluster Size: 1 ou 3 � Tri-sectorisation

Fig Source : Dean Chung, Aperto Networks, WIMAX Summit, Feb 06

L. Nuaymi (c), Telecom Bretagne, NSM (RSM) Dept - v2.1 - 2008 32

3- Multiple Access and SchedulingScheduling and link adaptation

Objectives of schedulingand link adaptation :

The purpose of scheduling is to allow every user, if possible, to havethe (minimum?) QoS required for his application. This includes:- scheduling of uplink communications, between the SSs;- scheduling of individual packets for each SS and BS.

For both uplink and downlink, the modulation and coding scheme can change for each burst � flexible scheduling

The link adaptation allows a fair performing for the differentapplications and a good optimization of using the radio resources (= frequency bandwidth), realizing the QoS required for thetransmission of the data stream.

L. Nuaymi (c), Telecom Bretagne, NSM (RSM) Dept - v2.1 - 2008 33

The MSDUs (MAC SDU) are:

- received by theMAC CPS;

- placed in MPDU(s);

- transmitted on theradio interface.

3- Multiple Access and SchedulingTransmission of MAC PDU (MPDU)

OSI Layer 1:PHYsical layer

MAClayer

Service-SpecificConvergenceSublayer (CS)

CS SAP

MAC SAP

MAC CommonPart Sublayer

(CPS)

Security Sublayer

PHY SAP

PHYsical Layer

IEEE802.16

Standardscope

External Network.Example: IP or ATM

MSDU

MPDU(s)

OSI Layer 2:data link

layer

L. Nuaymi (c), Telecom Bretagne, NSM (RSM) Dept - v2.1 - 2008 34

3- Multiple Access and SchedulingGeneral principles

� Duplexing: FDD (and H-FDD, Half-duplex FDD) and TDD are in the standard

� Simultaneous access (both uplink and downlink) is: very flexible TDMA

� Resource allocation is centralised.

� Contention-based Grant- Request can be used.

� WiMAX is also a DAMA (Demand-Assigned Multiple Access).

� 5 classes of service(of QoS) are defined.

L. Nuaymi (c), Telecom Bretagne, NSM (RSM) Dept - v2.1 - 2008 35

3- Multiple Access and SchedulingTDD and Frame durations

Figure from the standard (16-2004)

� Possible frame durations(TDD or FDD): (OFDM PHY) 2.5; 4; 5; 8; 10; 12.5 and 20 ms … in addition for OFDMA: 2 ms� For FDD, the frame duration is the same in uplink and downlink.

L. Nuaymi (c), Telecom Bretagne, NSM (RSM) Dept - v2.1 - 2008 36

3- Multiple Accessand SchedulingThe BS decides for resource allocation

Source Fig:Nair et al., Intel Journal Aug 2004

L. Nuaymi (c), Telecom Bretagne, NSM (RSM) Dept - v2.1 - 2008 37

3- Multiple Access and Scheduling

� The frame structure is transmitted by the BS to the SSs for both ways:- downlink: throughDL-MAP MAC Management message; for the currentframe;

- uplink: throughUL-MAP MAC Management message ; for the current frame or the following one (cf figure).

Fig. from the standard

Frame n-1 Frame n Frame n+1 Frame n+2

DL-MAP n-1 UL-MAP n

DL-MAP n UL-MAP n+1

DL-MAP n+1 DL-MAP n+2 UL-MAP n+2 UL-MAP n+3

Frame control

Downlink subframe

Uplink subframe

L. Nuaymi (c), Telecom Bretagne, NSM (RSM) Dept - v2.1 - 2008 38

3- Multiple Access and SchedulingDownlink

The scheduler determines theappropriate burst profile for thecommunication with each SS. Burst profile: modulation and coding scheme and OFDM parameters (see below)

The scheduler determines the bandwidth requirements of each SS based on:- connexions’ service class;- the observation of queues and required traffic.

L. Nuaymi (c), Telecom Bretagne, NSM (RSM) Dept - v2.1 - 2008 39

3- Multiple Access and SchedulingUplink bandwidth reservation

Uplink access and bandwidth allocation are realized using one of the following methods:

- unsolicited bandwidth grants;- piggyback bandwidth request;

- unicast polling, sometimes simply referred to as polling;

- contention-based procedures, including broadcast or multicast polling; contention-based bandwidth request procedures have variants depending of the PHYsical layer used: OFDM (Focused Contention) or OFDMA (CDMA-Request).

L. Nuaymi (c), Telecom Bretagne, NSM (RSM) Dept - v2.1 - 2008 40

3- Multiple Access and SchedulingUplink: Contention-based group polling

The three SSsshown are group (multicast or broadcast) polled.

They all have bandwidth request.

SS #1

BS SS #2

SS #3

Request for Bandwidth from SS #1

Request for Bandwidth from SS #2

Request for Bandwidth from

SS #3

BS allocate Bandwidth for the SS that wins

the contention e.g. SS #2

L. Nuaymi (c), Telecom Bretagne, NSM (RSM) Dept - v2.1 - 2008 41

3- Multiple Access and SchedulingDownlink frame structure (same for TDD and FDD)

(OFDM PHY)Downlink

multiple

access

TDM

Figure

From the

standard

Length(es) andprofile(s) of the first

burst(s)

DL PHY PDU (DL Subframe)

One or more bursts is (are) transmitted in a DL PHY PDU.Each burst has its modulation and coding scheme. Thebursts are sorted in decreasing robustness order.

DL frame (or subframe) duration

DL burst #mDL burst #2DL burst #1Preamble FCH

DLFPRegular MAC

PDUsBroadcastMessages

PaddingRegular MAC

PDUsPadding

MACPayload

MACHeader

CRC(Optional)

(Possibly)DL-MAP, UL-MAP,DCD, UCD, ...

L. Nuaymi (c), Telecom Bretagne, NSM (RSM) Dept - v2.1 - 2008 42

3- Multiple Access and SchedulingUplink frame structure

Uplink :

TDMAmultiple

access

Figure

from

the standard

UL PHY PDUcoming from SS#j

UL subframe duration

Preamble UL burst

Each uplink PHY PDU has its burstprofile. It is then transmitted with amodulation and coding schemespecific to a given SS at a giveninstant

Padding

MAC Payload(Optionnel)

MACHeader (6

Bytes)

CRC(Optionnel)

UL PHY PDUcoming from SS#i

Contention Slot forInitial Ranging

Contention Slot forBandWidth (BW)

Requests

MAC Msg 1(MAC PDU 1)

MAC Msg n(MAC PDU n)

L. Nuaymi (c), Telecom Bretagne, NSM (RSM) Dept - v2.1 - 2008 43

3- Multiple Access and SchedulingFig. from the standard

Full

structure

of a TDD

MAC

frame

(OFDM

PHY)

L. Nuaymi (c), Telecom Bretagne, NSM (RSM) Dept - v2.1 - 2008 44

3- Multiple Access and Scheduling

Fig. from the standard

Full structure of a TDD MAC frame (OFDMA PHY )

L. Nuaymi (c), Telecom Bretagne, NSM (RSM) Dept - v2.1 - 2008 45

3- Multiple Access and SchedulingScheduling

� The scheduling algorithm is not given by the standard. Only the scheduling framework is defined.

� The MAC layer differentiates the QoS depending on the application type.

� Main QoS parameter QoS handling mechanism: the QoS class. Also called (in the stadard): Scheduling service or Service flow scheduling type

L. Nuaymi (c), Telecom Bretagne, NSM (RSM) Dept - v2.1 - 2008 46

3- Multiple Access and SchedulingFour QoS defined in 802.16-2004

Four Classes of QoS (Scheduling Services) were defined in 802.16-2004 :

UGS Unsolicited Grant Services.Designed to support real-time data streams. Fixed-size data packets are issued at periodic Intervals

rtPS Real-Time Polling Services.designed to support real-time data streams consisting of variable-sized data packets that are issued at periodic intervals.

nrtPS Non-Real-Time Polling Services.In the nrtPS Scheduling Service, the BS provides unicast uplink request polls on a ‘regular’ basis, which guarantees that the service flow receives request opportunities even duringnetwork congestion.

BE Best Effort. No minimum service guarantees are required.

L. Nuaymi (c), Telecom Bretagne, NSM (RSM) Dept - v2.1 - 2008 47

3- Multiple Access and Scheduling16e update: a fifth QoS class

• 802.16e added a fifth scheduling service:ertPS, Extended real-time Polling Service.

• ertPS is suitable for variable rate real-time applications that have data rateand delay requirements. Builds on the efficiency of both UGS and rtPS.Example: Voice over IP with silence suppression.

L. Nuaymi (c), Telecom Bretagne, NSM (RSM) Dept - v2.1 - 2008 48

3- Multiple Access and Scheduling

rtPS Scheduling Service uplink grants allocation and request mechanism

The rtPS is designed to support real-time data streams consisting of variable-sized data packets that are issued at periodic intervals. Ex: MPEG (moving pictures experts group) video transmission.

In this service, the BS provides periodic unicast (uplink) request opportunities, which meet the flow’s real-time needs and allow the SS to specify the size of the desired grant.

Constant (Periodic) Time Intervals

Variable packet size

Transmitted packets

Time

Periodic uplink request opportunities

L. Nuaymi (c), Telecom Bretagne, NSM (RSM) Dept - v2.1 - 2008 49

4- The physical layerOFDM PHY Transmission Chain

� The Transmission chain of OFDMA is very close

� Randomization introduces protection through information-theoretic uncertainty, avoiding long sequences of consecutive ones or consecutive zeros.

� Interleaving is used to protect the transmission against long sequences of consecutive errors, which are very difficult to correct.

� Channel Coding, Modulation and Cyclic Prefix

PHYsical PDU to be transmitted

Rando-mization

FEC

encoder (CC, Turbo

Code or other)

Interleaving

Modulation

To OFDM Part: IFFT, CP, etc

L. Nuaymi (c), Telecom Bretagne, NSM (RSM) Dept - v2.1 - 2008 50

4- The physical layerChannel Coding

� For WiMAX FEC, the following coding rate are defined : 1/2, 2/3, 3/4 et 5/6.

�Puncturing patterns defined in the standard can be used torealize the following different code rates: 2/3, 3/4 and 5/6.

L. Nuaymi (c), Telecom Bretagne, NSM (RSM) Dept - v2.1 - 2008 51

4- The physical layerThe digital modulation used

� Four modulations are supported by the IEEE 802.16 standard:

BPSK (mainly for signalling messages)

QPSK16-QAM : 16 states (= 4bits/symbole)

64-QAM (= 6 bits/symbol). Optional in some cases.

� Many modulations � Link Adaptation

The link adaptation

algorithm is not

defined in the standard

Figure source: WirelessMAN.org

L. Nuaymi (c), Telecom Bretagne, NSM (RSM) Dept - v2.1 - 2008 52

4- The physicallayer

Adaptive PHY

Each burst profile has two definedthresholds:

- mandatory exitthreshold

- minimum entry threshold

These thresholds are indicated in the DCD and UCD messages

Figure source : 802.16-2004

BS SS

DL Data at DIUC n

C/(N+I) too low

for DIUC n

Yes

Continue monitoring DL data through

DIUC n

Send DL data at DIUC k

RNG_REQ or DBPC_REQ Change to DIUC k

DL Data at DIUC k

RNG_RSP or DBPC_RSP

Monitor DL only data through DIUC k

DL Data at DIUC k

NO

L. Nuaymi (c), Telecom Bretagne, NSM (RSM) Dept - v2.1 - 2008 53

4- The physical layerOFDM transmission technique :

OFDM is a very powerful transmission technique. It is based on the principle of transmitting simultaneously many narrow-band orthogonal frequencies, often also called OFDM subcarriers or also subcarriers.

source: WiMAX forum, white paper

L. Nuaymi (c), Telecom Bretagne, NSM (RSM) Dept - v2.1 - 2008 54

4- The physical layerModulation and coding schemes of WiMAX

What is there in an OFDM Symbol?� Four digital modulations and many channel coding possibilities (2 coding rates)

are provided in WiMAX which gives way for many Modulation and Coding Schemes (MCS), shown in this table:

Table (Columns 1, 2 and 3) from [802.16].

24.4

22.7

18.2

16.4

11.2

9.4

6.4

Receiver SNR (dB)

192 x 6 x 3/4� 864

192 x 6 x 2/3� 768

192 x 4 x 3/4 � 576

192 x 4 x 1/2 � 384

192 x 2 x 3/4 � 288

192 x 2 x 1/2 � 192

192 x 1 x 1/2 � 96

Number of Useful Bits per OFDM Symbol

3/464-QAM

2/364-QAM

3/416-QAM

1/216-QAM

3/4QPSK

1/2QPSK

1/2BPSK

Coding rateModulation

L. Nuaymi (c), Telecom Bretagne, NSM (RSM) Dept - v2.1 - 2008 55

4- The physical layerData rates

PHY data rate in for different MCS (Modulation and coding scheme)

Channel bandwidth: 7 MHz; OFDM PHY Interface

Sampling factorn=8/7;

G Ratio

BPSK 1/2

QPSK 1/2

QPSK 3/4

16-QAM 1/2

16-QAM 3/4

64-QAM 2/3

64-QAM 3/4

1/32 2.92 5.82 8.73 11.64 17.45 23.27 26.18

1/16 2.82 5.65 8.47 11.29 16.94 22.59 25.41

1/8 2.67 5.33 8.00 10.67 16.00 21.33 24.00 1/4 2.40 4.80 7.20 9.60 14.40 19.20 21.60

L. Nuaymi (c), Telecom Bretagne, NSM (RSM) Dept - v2.1 - 2008 56

4- The physical layerScalable OFDMA, SOFDMA

� Scalable OFDMA (SOFDMA): the scalability is due to the possibility of changing the FFT size and then the number of subcarriers.

� Supported FFT sizes (IFFT orders) are : 128, 512, 1024 and 2048

Note: Only 1024 and 512 are (presently) mandatory for Mobile WiMAX Profiles.

L. Nuaymi (c), Telecom Bretagne, NSM (RSM) Dept - v2.1 - 2008 57

4- The physical layerDifferent types of subcarriers (or tones)

All the subcarriers of an OFDM symbol do not carry useful data. There are four subcarrier types:

-Data subcarriers: useful data transmission;

-Pilot subcarriers: mainly for channel estimation and synchronisation; For OFDM PHY, there are 8 pilot subcarriers.

-Null subcarriers : no transmission; these are frequency guard bands.

-Another Null subcarrier is the DC (Direct Current) subcarrier. Fig Source : [WiMAX Forum White Paper, 2006]

L. Nuaymi (c), Telecom Bretagne, NSM (RSM) Dept - v2.1 - 2008 58

4- The physical layerSubcarrier permutations

� For both uplink and downlink, the pilot subcarriersand data subcarriers are allocated according to one or another of the defined OFDMA permutation modes.

� A slot in the OFDMA PHY has both a time and subchannel dimension. A slotis the minimum possible data allocation unit in 802.16 standard.

Fig Source: 802.16-2004

L. Nuaymi (c), Telecom Bretagne, NSM (RSM) Dept - v2.1 - 2008 59

4- The physical layerSubcarrier permutations

• Two families of distribution modes can be distinguished :

� Diversity (or distributed) permutations: the subcarriers are distributed pseudo-randomly. This family includes: - FUSC (downlink only)- PUSC

Main advantages (of distributed permutations): frequency diversity and intercell interference averaging

� Contiguous (or adjacent) permutations: considers a group of adjacent subcarriers. This family includes :- AMC (also called Band AMC)

Choice of the best-conditions part of the bandwidth. Channel estimation is easier as the subcarriers are adjacent.

L. Nuaymi (c), Telecom Bretagne, NSM (RSM) Dept - v2.1 - 2008 60

Possible research in radio resource management:

(Global questions)� Performance evaluation:simulation, queuing theory, experiments

� Proposals in the standard framework: scheduling algorithms, admission control, size of contention windows, header suppression mechanisms and much others are needed. Also needed: algorithms related to algorithms of WiMAX: pricing, vertical handover, network consideration, …

� Beat the standard!Propose a polling scheme, subchannel allocation, ranging … that do better than the ones proposed in the standard

… but first: define your WiMAX system model = may be some restrictions will have to be considered

L. Nuaymi (c), Telecom Bretagne, NSM (RSM) Dept - v2.1 - 2008 61

5- Link adaptation, power control

�Power control algorithm is mandatory for the uplink channel.

�Power control must include:- initial calibration (or ranging) � initial transmitted power choice;- periodic adjustment procedure

Backup:� (802.16-2004) FPC: the BS may adjust the power levels of multiple subscribers simultaneously with the Fast Power Control (FPC) MAC Management message.

�The decision of the change of the power control mode (open loop or closed loop) is done at BS. The decision is indicated by the PMC_RSP MAC message. PMC_REQ can be used to request to change the power control mode.

L. Nuaymi (c), Telecom Bretagne, NSM (RSM) Dept - v2.1 - 2008 62

5- Link adaptation, power control

� Possible question: power control or rate control?

(example) Economic consideration: increase power? You have to pay more!

L. Nuaymi (c), Telecom Bretagne, NSM (RSM) Dept - v2.1 - 2008 63

5- Link adaptation, power control Link adaptation

Link adaptation is the possibility to change modulation and coding scheme according to the radio link quality in order to have a high global efficiency.

This procedure is not limited to WiMAX. For example, it is included in GSM/EDGE, WiFi, …

Throughput of a 3.5 MHz WiMAX Channel

Figure form Ball, VTC2005Spring

L. Nuaymi (c), Telecom Bretagne, NSM (RSM) Dept - v2.1 - 2008 64

5a- DFS: Dynamic Frequency Selection

DFS: Dynamic Frequency Selection. Mandatory Procedure in ETSI zone when unlicensed frequencies are used.

The IEEE 802.16 standard requires DFS to facilitate the detection and avoidance of interference and the prevention of harmful interference into other users, including specific spectrum users identified by regulations* as priority users.

Other advantage: interference decrease.

* Recommendation ITU-R M.1652, Dynamic frequency selection (DFS) in wireless access systems including radio local area networks for the purpose of protecting the radio determination service in the 5 GHz band, 2003.

L. Nuaymi (c), Telecom Bretagne, NSM (RSM) Dept - v2.1 - 2008 65

6- Bit loading, subchannel allocation

• OFDMA subchannels allocation and MCS (Modulation and Coding Scheme) Choice is another interesting optimization problem.

• Example of research result:

(From: Lengoumbi et al., “Subchan-nelization Performance for the Downlink of a Multi-CellOFDMA System,” WiMob 2007)

• bDA: Basic Dynamic Assignment• RPO: Rate Profit Optimization Alg • ASS: Adjacent subcarriers subchannelization

L. Nuaymi (c), Telecom Bretagne, NSM (RSM) Dept - v2.1 - 2008 66

7- Network deployment

• Now-well (relatively) known design principles inherited from GSM/EDGE/UMTS have to be redefined for WiMAX:

- OFDM or OFDMA- Higher frequencies- Specific WiMAX MAC considerations- Service-oriented?

… in order to compute: BS positions, reuse factors and many other radio parameters

The goal is still: push always higher the b/s/Hz number

L. Nuaymi (c), Telecom Bretagne, NSM (RSM) Dept - v2.1 - 2008 67

7- Network deployment

Results Example:

(From: K. Ntagkounakis, “Cost-efficient WiMAX network deployment: the hybrid outdoor/indoor dual-layer coverage approach,”, PIMRC 2007 )

L. Nuaymi (c), Telecom Bretagne, NSM (RSM) Dept - v2.1 - 2008 68

8- Multihop and mesh

• Mesh for WiMAX is still rather unclear: 802.16j amendment should eliminate some of the confusion. The first draft, D1, dates from Aug 2007.

• Proposals must be (are) done for multi-hop routing and (WiMAX mesh specific-) scheduling

• Energy and cost considerations (see ad hoc networks research)

L. Nuaymi (c), Telecom Bretagne, NSM (RSM) Dept - v2.1 - 2008 69

9- Admission Control

� Only the admission control framework and tools are defined in the standard.

� Admission control decision algorithms are left to the manufacturers.

� Admission Control could be studied along with the pricing strategy (see below)Also: scheduling considerations must be taken account at least for capacity expected values.

L. Nuaymi (c), Telecom Bretagne, NSM (RSM) Dept - v2.1 - 2008 70

10- Scheduling

• (OFDM PHY) Number of useful bits / OFDM symbol … for each MCS

• (OFDMA PHY) Number of useful bits / OFDMA subchannel … for each MCS

• Bandwidth requests

• Network occupation or congestion

• QoS classes

Scheduling algorithm ?

L. Nuaymi (c), Telecom Bretagne, NSM (RSM) Dept - v2.1 - 2008 71

10- SchedulingScheduling algorithms: well-known algorithms used for WiMAX

(example)

• Deficit Round Robin (DRR):

Q1=350

Q2=300

Q3=250

a1 200

a2 750

a3 280

b1 500

b2 300

b3 280

c1 100

c2 900

c3 300

Increment the deficit counter (Di) by the fixedquantum (Qi)

D1= 150

D3= 150

D1= 350

D2= 300

D3= 250

Compare between Qi and the length of the packet (Li)

a1 200

c1 100

If Di > Li � send pkt + decrement Di by Li

L. Nuaymi (c), Telecom Bretagne, NSM (RSM) Dept - v2.1 - 2008 72

10- SchedulingOther Scheduling algorithms proposed for WiMAX

• [4] Q. Liu, X. Wang, G. B. Giannakis, “A Cross-Layer Scheduling Algorithm With

QoS Support in Wireless Networks”

• [5] T. Tsai, C. Jiang, C. Wang, “CAC and Packet scheduling Using Token Bucket

for IEEE 802.16 Networks”

• [6] K. Vinay, N. Sreenivasulu, D. Jayaram, D. Das, “PerformanceEvaluation of

End-to-end Delay by Hybrid Scheduling Algorithm for QoS in IEEE 802.16

Network”

• [7] S. A. Xergias, N. Passas, L. Marekos, “Flexible Resource Allocation inIEEE

802.16 Wireless Metropolitan Area Networks”

• ….

L. Nuaymi (c), Telecom Bretagne, NSM (RSM) Dept - v2.1 - 2008 73

11- Header suppression PHS, Payload Header Suppression

If PHS is enabled at MAC connection, each MAC SDU is prefixed with a PHSI (Payload Header Suppression Index), which references the PHSF(Payload Header Suppression Field).

The classifier (located at the sending entity) uniquely maps packets to its associated PHS Rule. The receiving entity uses the CID and the PHSI to restore the PHSF.

Payload header

Payload

Payload

PHSI

Useful portion

Useful portion

PHSF

L. Nuaymi (c), Telecom Bretagne, NSM (RSM) Dept - v2.1 - 2008 74

11- Header suppression

802.16e amendment added these two Header Compression algorithms:

- ROHC, RObust Header Compression, RFC 3095; Note: ROHC is mandatory in WiMAX Mobile profiles.

- ECRTP, Enhanced Compressed RTP, RFC 3545

L. Nuaymi (c), Telecom Bretagne, NSM (RSM) Dept - v2.1 - 2008 75

11- Header suppression

(research example)• Our WiMAX hypothesis:*

– OFDM PHY Layer;– PMP topology;– no MPDU packing or fragmentation;– frame duration values considered: 5 ms and 10 ms;– bandwidth: 3.5 MHz and 7 MHz.

* Nuaymi et al., “Headers Overhead Estimation, Header Suppression and Header Compression in WiMAX,” WiMOB 07

L. Nuaymi (c), Telecom Bretagne, NSM (RSM) Dept - v2.1 - 2008 76

11- Header suppressionComputation of MAC and PHY overhead

• Using the two previous relations, we can compute the downlink MAC and PHY headers overhead.

• Downlink figures for some frame durations defined in the IEEE 802.16 standard.

• The same type fo computation is done for uplink taking into account the initial ranging contention slot and BW request contention slots

L. Nuaymi (c), Telecom Bretagne, NSM (RSM) Dept - v2.1 - 2008 77

11- Header suppressionHeader Suppression for VoIP over WiMAX

• We now consider the specific case of the transmission of Voice over IP (VoIP) over WiMAX.

– The protocols used in addition to WiMAX are RTP, UDP and IPv6

Voice Payload

Application Layer

L. Nuaymi (c), Telecom Bretagne, NSM (RSM) Dept - v2.1 - 2008 78

11- Header suppressionHeader Suppression for VoIP over WiMAX

• Header sizes of each of these layers:

– between 12 and 72 bytes for RTP;

– 8 bytes for UDP;

– 40 bytes for IP (IPv6 is used).

… the total length of RTP/UDP/IPv6 header is between 60 and 120 bytes.

• PHS suppresses repetitive (redundant) parts due to the higher layers in the payload header of the MAC SDU.

The receiving entity restores the suppressed parts.

• It is the responsibility of the higher-layer service entity to generate a PHS Rule that uniquely identifies the (repetitive) suppressed header within the service flow.

L. Nuaymi (c), Telecom Bretagne, NSM (RSM) Dept - v2.1 - 2008 79

11- Header suppressionHeader Suppression for VoIP over WiMAX

• A Payload Header Suppression Index (PHSI), an 8-bit field which references the Payload Header Suppression Field (PHSF) that has been used for header suppression.

– The PHS rule has also a Payload Header Suppression Mask (PHSM) option to allow the choice of bytes of PHSF that cannot be suppressed.

Packet Transmission

Packet Header Reconstruction (using PHSI and CID)

L. Nuaymi (c), Telecom Bretagne, NSM (RSM) Dept - v2.1 - 2008 80

11- Header suppressionHeader Suppression for VoIP over WiMAX

• Suppressed fields: IPv6, UDP and RTP headers (gray fields)

Version (v6), 4 bits

Traffic Class (8 bits)

Flow Label (20 bits)

Payload Length (16 bits)Next Header (8

bits)Hop Limit (8

bits)

Source Address (128 bits)

Destination Address (128 bits)

Version Pad Ext.Contributing Source Count

MarkPayload

Type

Sequence Number

Time Stamp

Synchronization Source (SSRC) Identifier

(Optional) Contributing Source (CSRC) Identifiers

bits 0 - 15 bits 16 - 31

UDP Source Port UDP Destination Port

UDP Message Length Checksum

L. Nuaymi (c), Telecom Bretagne, NSM (RSM) Dept - v2.1 - 2008 81

11- Header suppressionHeader Suppression for VoIP over WiMAX

• Number of suppressed bytes per header:

– IPv6: 37 bytes

– UDP: 4 bytes

– RTP: 4 bytes

• The RTP/UDP/IPv6 Header drops from 60 bytes to 15 bytes(45 Header bytes are suppressed).

• We also make the computations for an average PHS that reduces the RTP/UDP/IPv6 header from 60 bytes to 30 bytes

L. Nuaymi (c), Telecom Bretagne, NSM (RSM) Dept - v2.1 - 2008 82

11- Header suppressionProposed Header Suppression for VoIP over WiMAX

application layer data rates :

• PHS has an important effect on data rates. – The same physical data rate provides a very different data rate for the

voice (source) coder of VoIP.

L. Nuaymi (c), Telecom Bretagne, NSM (RSM) Dept - v2.1 - 2008 83

11- Header suppressionHeader compression for VoIP over WiMAX

• We also compute the application layer data rates for ROHC

L. Nuaymi (c), Telecom Bretagne, NSM (RSM) Dept - v2.1 - 2008 84

12- Vertical Handover

WiMAX has a very open architecture, different ASNs (access networks) radio coexistence problems

Optimization of vertical handover

Media Independent Handover is treated in 802.16g

L. Nuaymi (c), Telecom Bretagne, NSM (RSM) Dept - v2.1 - 2008 85

13- Pricing policies • Until now, the economic implications of the introduction of WiMAX

technology have received little attention.

• Pricing mechanisms (main) constraints:- handle the network congestion- manage the QoS of the different services- maximize the operator revenue� Pricing cannot (should not?) be separated from Radio Resource Management

• Specific WiMAX model and pricing parameters (utility functions and other) have to be defined.

• (As expected) pricing proposals for WiMAX including game theory are (and will be) proposed.

L. Nuaymi (c), Telecom Bretagne, NSM (RSM) Dept - v2.1 - 2008 86

Final Words

• WiMAX research and UMTS/LTE research: many common points but also … some new questions