MAC Overview NCHU CSE WMAN - 1
|
|
- Benedict Wiggins
- 6 years ago
- Views:
Transcription
1 MAC Overview NCHU CSE WMAN - 1
2 MAC Overview Connection-oriented Supports difficult user environments High bandwidth, hundreds of users per channel For variable Continuous and Burst traffic Very efficient use of spectrum Protocol-Independent core (ATM, IP, Ethernet, ) Balances between stability of contentionless and efficiency of contention-based operation Negotiate the burst profile between sender and receiver Flexible QoS offerings CBR, rt-vbr, nrt-vbr, BE, ERT-VR(16e and 16m) Supports multiple PHYs Handover NCHU CSE WMAN - 2
3 Protocol Stack Packet convergence Sublayer (PCS) ATM Packet SSCS (security sublayer ) NCHU CSE WMAN - 3
4 Fixed + Mobile Standard NCHU CSE WMAN - 4
5 Features NCHU CSE WMAN - 5
6 Brief Functions Convergence Sublayer (CS) Mapping external network data into MAC SDU» Classifying external network SDU» Associating to MAC connection ID» Payload header suppression (PHS) Common Part Sublayer (CPS) Core MAC functionality» System access» Bandwidth allocation» Connection establishment» Connection maintenance» Handover and Power management Security Sublayer PHY» Authentication (RSA X.509/EAP)» Security key exchange (3DES)» Encryption (AES) Multiple sections NCHU CSE WMAN - 6
7 Service Specific Convergence Sublayer (SSCS) The CS performs the following functions: accepting higher-layer PDUs from the higher layer performing classification of higher-layer PDUs processing (if required) the higher-layer PDUs based on the classification delivering CS PDUs to the appropriate MAC SAP receiving CS PDUs from the peer entity Currently, two CS specifications are provided Asyncronous Transfer Mode (ATM) CS Packet CS» Such as IP, PPP, Ethernet, etc., Other CSs may be specified in the future. NCHU CSE WMAN - 7
8 Packet Convergence Sublayer (PCS) Packet convergence sublayer (PCS) The packet CS resides on top of the Common Part Sublayer (CPS) The PCS performs the following functions, utilizing the services of the MAC sublayer: a) Classification of the higher-layer protocol PDU into the appropriate connection b) Suppression of payload header information (optional) c) Delivery of the resulting CS PDU to the MAC SAP associated with the service flow for transport to the peer MAC SAP d) Receipt of the CS PDU from the peer MAC SAP e) Rebuilding of any suppressed payload header information (optional) NCHU CSE WMAN - 8
9 Packet Packet Process Procedure A classifier is a set of matching criteria applied to each packet It consists of some protocol-specific packet matching criteria (destination IP address, for example), a classifier priority, and a reference to a CID. The service flow characteristics of the connection provide the QoS for that packet Several classifiers may each refer to the same service flow. (many to one) Downlink classifiers are applied by the BS to packets and uplink classifiers are applied at the SS. A packet fails to match the set of defined classifiers. CS/SS shall discard the packet. Classifier(s) CID CID/SFID PHSI mapper SFID SFID/QoS mapper SFID/PHSI (sender) CID/PHSI (receiver) PHS ruler QoS Parameters (used in scheduler) NCHU CSE WMAN - 9
10 Object model Each object has a number of attributes the attribute names that uniquely identify it are underlined. Optional attributes are denoted with brackets. NCHU CSE WMAN - 10
11 Classifications A MAC SDU is mapped onto a particular connection for transmission between MAC peers According to protocol-specific packet matching criteria (e.g. destination IP address), classifier priority and a reference to a CID (connection ID)» creates an association with the service flow ID (SFID) 32 bits service flow ID (SFID) (32 bits) Conn. ID (CID) (16 bits) PHS CID+PHSI PHS NCHU CSE WMAN - 11
12 Classifications PHS service flow ID (SFID) Conn. ID (CID) NCHU CSE WMAN - 12
13 Classifications A MAC SDU is mapped onto a particular connection for transmission between MAC peers according to protocol-specific packet matching criteria (e.g. IP address), classifier priority and a reference to a CID. SS and BS use multiple classifiers. Each classifier contains a priority field which determines the search order for the classifier. Searching algorithm is similar to policy-based search algorithm (e.g. Firewall) Classifiers can be added by dynamic signaling. Simple Network Management Protocol (SNMP)- based operations can only view Classifiers, no add/delete NCHU CSE WMAN - 13
14 Common Part Sublayer (CPS) The MAC CPS provides the core MAC functionality of system access, bandwidth allocation, connection establishment, and connection maintenance: a) System Access b) Bandwidth Request/Allocation c) Connection Establishment/Maintenance e) Quality of Service (QoS) NCHU CSE WMAN - 14
15 Security Sublayer The security sublayer providing a) authentication, b) secure key exchange c) Encryption Two component protocols Encapsulation protocol» Cryptographic suites Privacy and Key management protocol (PKMv1/v2)» Create and exchange Traffic Encryption Key (TEK) PKM Identifier (one byte)» SS uses the identifier to match a BS response to the SS requests.» In PKMv1, only SS keeps track of the identifier. (w/o mobility)» In PKMv2, both SS and BS keep track of the identifier. (w/ mobility) NCHU CSE WMAN - 15
16 Payload Header Suppression (PHS) For some payload protocols, each payload consists of an 8-bit payload header suppression index (PHSI) followed by the actual payload. A value of zero in the PHSI indicates no payload header suppression has been applied to the PDU. Otherwise, the value in the index identifies the rules for suppression. MAC header 8-bit PHSI denotes the payload header suppression field (PHSF) NCHU CSE WMAN - 16
17 Payload Header Suppression (PHS) If PHS is enabled at MAC connection, each MAC SDU is prefixed with a PHSI, which references the Payload Header Suppression Field (PHSF). The classifier uniquely maps packets to its associated PHS Rule. The receiving entity uses the CID and the PHSI to restore the PHSF. (CID+PHSI PHSF/PHSM/PHSS) When a classifier is deleted, any associated PHS rule shall also be deleted. NCHU CSE WMAN - 17
18 PHS operation NCHU CSE WMAN - 18
19 Payload Header Suppression (PHS) Rule Payload header suppression valid (PHSV) : option to verify or not verify the payload header before suppressing it Payload header suppression mask (PHSM) option to allow select bytes not to be suppressed. Such as IP sequence numbers should not be supressed Payload header suppression size (PHSS) Payload header suppression field (PHSF) Payload header suppression index (PHSI) Service flow ID (SFID). PHS rules are indexed by the combination of (SFID, PHSI) Preconfigured header format or higher-level signaling protocols are outside the scope of specification NCHU CSE WMAN - 19
20 PHS with masking A,C,E are compressed Only sends B and E NCHU CSE WMAN - 20
21 PHS Rules The BS shall define the PHSI when the PHS Rule is created The SS or BS may define the PHSS and PHSF. To change the value of a PHSF on a service flow, a new PHS rule shall be defined It is possible to partially specify a PHS rule (in particular the size of the rule) at the time a service flow is created Values of some fields [for example: IP addresses, User Datagram Protocol (UDP) port numbers, etc.] may be unknown and would be provided in a subsequent DSC as part of the activation of the service flow using the Set PHS Rule DSC Action Dynamic Service Change NCHU CSE WMAN - 21
22 PHS Signaling PHS requires the creation of the following three objects: a) Dynamic Service Flow (DSA/DSC/DSD) Addition/Change/Deletion b) Classifier c) PHS rule (PHSI is assigned by BS) NCHU CSE WMAN - 22
23 Connection ID (CID) A unidirectional mapping between BS and SS MAC peers for the purpose of transporting a service flow s traffic Connections are identified by a connection identifier (CID) All traffic is carried on a connection, even for service flows that implement connectionless protocols CID maps to a service flow identifier (SFID), which defines the Quality of Service (QoS) parameters of the service flow associated with that connection. Security associations (SAs) also exist between keying material and CIDs. NCHU CSE WMAN - 23
24 Connection ID (CID) Connections are identified by a 16-bit CID At SS initialization, three management connections in each direction (uplink and downlink) shall be established between the SS and the BS. The basic connection is used for exchanging short, timeurgent management messages.» such as DBPC-REQ/RSP : Downlink Burst Profile Change Req/Rsp, RNG-REQ/RSP : Ranging Req/Rsp The primary management connection is used for exchanging longer, more delay tolerant MAC management messages.» Such as DSA/DSC/DSD_REQ/RSP/ACK, REG_REQ/RSP The Secondary Management Connection is used for transferring delay tolerant, standards based DHCP, TFTP, SNMP, etc., management messages. (IP-based packets) NCHU CSE WMAN - 24
25 Connection ID (CID) BS returns Basic CID and Primary CID to SS via RNG-RSP messages. BS returns Secondary CID to SS via REG-RSP messages (optional). The same CID value is assigned to both members (uplink and downlink) of each connection pair. Many higher-layer sessions may operate over the same wireless CID. NCHU CSE WMAN - 25
26 Connection ID (CID) NCHU CSE WMAN - 26
27 CIDs e NCHU CSE WMAN - 27
28 Multicast and Broadcast Connections Any available traffic CID value may be used for the service SSs do not know its is multicast/broadcast Connections (MBS only from the BS view) ARQ is not applicable to multicast connections. If a downlink multicast connection is to be encrypted, each SS participating in the connection shall have an additional security association (SA) Issue : MBS in e NCHU CSE WMAN - 28
29 Envelopes Setup by BS authorized envelope provisioned authorization model dynamic authorization model NCU MWNL WMAN Service Flow - 29
30 Service Flow Addition 3-way handshaking SS-initiated DSA DSX-RVD (DSx Received) BS-initiated DSA NCHU CSE WMAN - 30
31 Service Flow Change provisioned SS-initiated DSC BS-initiated DSC NCHU CSE WMAN - 31
32 QoS (16e-2005) Global service flows Global service class names and associated AuthorizedQoSParamSets Global service class names are employed as a baseline convention for communicating AuthorizedQoSParamSet or AdmittedQoSParamSet Different from service class name (in ) 1. may not be modified by BS 2. remain consistent among all BS 3. rules-based naming system whereby the global service class name itself contains referential QoS Parameter codes. composite name parsed in nine information fields of format ISBRLSPTR (ISTBRLSPR), elements reference extensible lookup tables. NCHU CSE WMAN - 32
33 Global service flow class name (2005) NCHU CSE WMAN - 33
34 Global service flow class name (2005) parameters Uplink/Downlink indicator Maximum sustained traffic rate» peak information rate» does not include transport, protocol, or network overhead» specifies only a bound, not a guarantee that the rate is available.» The algorithm for policing this parameter is left to vendor differentiation and is outside the scope of the standard. Traffic Indication Preference Maximum traffic burst Minimum reserved traffic rate Maximum latency SDU indicator» fixed-length or variable-length Paging Preference NCHU CSE WMAN - 34
35 Rate NCHU CSE WMAN - 35
36 Delay NCHU CSE WMAN - 36
37 MAC Protocol NCHU CSE WMAN - 37
38 MAC overview Subscriber stations share the uplink to the BS on a demand basis. Four different types of uplink scheduling mechanisms Unsolicited bandwidth grants (CBR) Polling (unicast polling)» guarantees applications receive service on a deterministic basis (delay tolerant services) Contention procedures» contention may be used to avoid individual polling of SSs that have been inactive for a long period (multicast/broadcast polling) Bandwidth stealing» a portion of the bandwidth allocated in response to a bandwidth request for a connection to send another bandwidth request rather than sending data Piggyback (via grant subheader ; w/o scheduling) NCHU CSE WMAN - 38
39 MAC overview Service flows provide a mechanism for uplink and downlink QoS management. In particular, they are integral to the bandwidth allocation process. An SS requests uplink bandwidth on a per connection basis (implicitly identifying the service flow). Bandwidth is granted by the BS to an SS as an aggregate of grants in response to per connection requests from the SS. NCHU CSE WMAN - 39
40 Scheduling services Each connection is associated with a single data service. Each data service is associated with a set of QoS parameters. Managed using the DSA and DSC message dialogs. Four services are supported in Unsolicited Grant Service (UGS), Real-time Polling Service (rtps), Non-real-time Polling Service (nrtps), and Best Effort (BE). Five services are supported in e-2005 UGS (Unsolicited Grant Service) RT-VR (Real-Time - Variable Rate Service) NRT-VR (Non-Real Time - Variable Rate service) BE (Best Efforts) ERT-VR (Extended Real-Time Variable Rate) NCHU CSE WMAN - 40
41 IEEE m Service classes Real-time constant bit-rate (e.g., VoIP without silence suppression) Extended real-time variable bit-rate (e.g., VoIP with silence suppression) Real-time variable bit-rate (e.g., MPEG video) Non-real time variable bit-rate (e.g., FTP, HTTP) Best effort (e.g., ) RT-CBR ERT-VR RT-VR NRT-VR BE Data generated interval Periodic Periodic Periodic Dynamic Dynamic Packet size Fixed Fixed/ dynamic Dynamic Dynamic Dynamic Delay sensitivity High High High Middle Low NCHU CSE WMAN - 41
42 Unsolicited Grant Service (UGS) support real-time data streams consisting of fixed-size data packets issued at periodic intervals Such as T1/E1 and Voice over IP without silence suppression mandatory QoS service flow parameters Maximum Sustained Traffic Rate Maximum Latency Tolerated Jitter Request/Transmission Policy (option) Minimum Reserved Traffic Rate parameter» If present, equals to Maximum Sustained Traffic Rate parameter. In e, UGS is able to support variable length PDUs. Maximum Sustained Traffic Rate is removed Add Unsolicited Grant Interval and SDU size (if fixed) NCHU CSE WMAN - 42
43 Unsolicited Grant Service (UGS) The BS shall provide Data Grant Burst IEs to the SS at periodic intervals based upon the Maximum Sustained Traffic Rate of the service flow. The Grant Management subheader is used to pass status information from the SS to the BS regarding the state of the UGS service flow. Slip Indicator (SI) bit : set when service flow has exceeded its transmit queue depth Poll-me (PM) bit : is used to request to be polled for a different, non-ugs connection. Request : contention-free access NCHU CSE WMAN - 43
44 Real-time Polling Service (rtps) support real-time data streams consisting of variable-sized data packets that are issued at periodic intervals Such as moving pictures experts group (MPEG) video. mandatory QoS service flow parameters Minimum Reserved Traffic Rate Maximum Sustained Traffic Rate Maximum Latency Request/Transmission Policy In e,» SS uses only unicast poll request opportunities in order to obtain uplink transmission opportunities» use unsolicited Data Grant Burst Types for uplink transmission as well» contention-free manner Add Traffic priority and Unsolicited Polling Interval NCHU CSE WMAN - 44
45 Non-real-time Polling Service (nrtps) support delay-tolerant data streams consisting of variable-sized data packets for which a minimum data rate is required such as FTP mandatory QoS service flow parameters Minimum Reserved Traffic Rate Maximum Sustained Traffic Rate Traffic Priority Request/Transmission Policy» unicast poll : BS typically polls nrtps CIDs on an interval on the order of one second or less» timely unicast request opportunities : contention access» unsolicited Data Grant Burst Types NCHU CSE WMAN - 45
46 Best Effort (BE) support data streams for which no minimum service level is required and therefore may be handled on a space-available basis. mandatory QoS service flow parameters Maximum Sustained Traffic Rate Traffic Priority Request/Transmission Policy» contention request opportunities» Piggyback» Bandwidth steal» Polling NCHU CSE WMAN - 46
47 Extended Real-Time Variable Rate (ERT-VR) service support real-time applications with variable datarates, which require guaranteed data and delay, for example VoIP with silence suppression. QoS parameters (combines UGS and RT-VR) Maximum Latency Tolerated Jitter Minimum Reserved Traffic Rate Maximum Sustained Traffic Rate Traffic Priority Request/Transmission Policy Unsolicited Grant Interval NCHU CSE WMAN - 47
48 Outbound transmission scheduling is performed by BS for downlink, SS for uplink the following items are taken into account for each active service flow: The scheduling service specified for the service flow. The values assigned to the service flow s QoS parameters. The availability of data for transmission. The capacity of the granted bandwidth NCHU CSE WMAN - 48
49 QoS Scheduler NCHU CSE WMAN - 49
50 Outbound Transmission Scheduling NCHU CSE WMAN - 50
MAC layer: structure and QoS support. PhD student: Le Minh Duong
802.16 MAC layer: structure and QoS support PhD student: Le Minh Duong Content 1. Introduction 2. 802.16 MAC layer 2.1. MAC Service-Specific Convergence Sublayer 2.2. Common Part Sublayer 3. QoS support
More informationInstitute of Electrical and Electronics Engineers (IEEE)
2006-03-08 IEEE L802.16-06/004 INTERNATIONAL TELECOMMUNICATION UNION RADIOCOMMUNICATION STUDY GROUPS Document 8A/IEEE-2-E Document 8F/IEEE-1-E 8 March 2006 English only Received: TECHNOLOGY Subject: Question
More informationIEEE Broadband Wireless Access Working Group <
IEEE C802.16maint-08/063r4 Project Title IEEE 802.16 Broadband Wireless Access Working Group ROHC Classification Changes Date Submitted Source(s) 2008-01-24 Muthaiah Venkatachalam
More informationIEEE Broadband Wireless Access Working Group <
Project Title Date Submitted IEEE 802.16 Broadband Wireless Access Working Group Procedures Clarifications and Improvement for MBS Logical Channel support in 802.16REV2 2008-04-20
More informationIEEE MAC and PHY Specifications for Broadband WMAN
IEEE 802.16 MAC and PHY Specifications for Broadband WMAN 中央大學通訊系許獻聰 E-mail: stsheu@ce.ncu. edu.tw TKU HSNL WMAN - 1 Resources Part Source : Roger B. Marks, National Institute of Standards and Technology
More informationWireless Communication. IEEE Wireless Metropolitan Area Network (wman)
1 IEEE 802.16 Wireless Metropolitan Area Network (wman) 2 Existing Data Network Hierarchy Level Typical Connections Wired Technologies Wireless Technologies Personal Area (PAN) Peripherals and personal
More informationSS Initialization Overview
SS Initialization Overview Downlink Sync Auth. Key Xchange Get Uplink Parameters Setup Time Ranging Register Download Configuration File Capability Negotiation DHCP Setup connection and service flow (provisioned
More informationNokia Fax:
2002-09-11 IEEE C802.16c-02/09 Project Title Date Submitted 2002-09-11 IEEE 802.16 Broadband Wireless Access Working Group Editorial instructions pertaining to comments submitted
More informationProtocol Implementation Conformance Statement for IEEE Standard
00-0- IEEE C..-0/0 Protocol Implementation Conformance Statement for IEEE Standard 0.-00 00-0- WiMAX PICS v... 0 Contents Foreword... Introduction.... Scope.... References.... Definitions and Abbreviations....
More informationPerformance Evaluation of WiFiRe using OPNET
Performance Evaluation of WiFiRe using OPNET Under the guidance of: Prof. Sridhar Iyer and Prof. Varsha Apte Dept. of CSE (KReSIT) July 16, 2007 Goal Goal Building. Finding minimum slot length to support
More informationMedia Access Control Protocol Based on DOCSIS 1.1
Document Number: IEEE 802.16mp-99/16 Title: Media Access Control Protocol Based on DOCSIS 1.1 Date Submitted: 1999-11-08 Source: Karl Stambaugh Voice: 480-441-7842 Motorola Inc. Fax: 480-675-2116 8220
More informationEvaluating VoIP using Network Simulator-2
Athens University of Economic and Business Evaluating VoIP using Network Simulator-2 June 2007 Author: Papantonakos Manos Supervisor Prof.: George Xylomenos Co-Supervisor Prof: George Polyzos About WiMax
More informationIEEE C802.16e-04/67r1. IEEE Broadband Wireless Access Working Group <
2004-05-172004-05-17 IEEE C802.16e-04/67r1 Project Title Date Submitted IEEE 802.16 Broadband Wireless Access Working Group Enhancement of 802.16e to Support Secure EAP PKM messages
More informationDocument Number: IEEE mp-00/01 Title: Media Access Control Protocol Based on DOCSIS 1.1 Date Submitted: Source: Glen Sater Voice:
Document Number: IEEE 802.16.1mp-00/01 Title: Media Access Control Protocol Based on DOCSIS 1.1 Date Submitted: 1999-12-23 Source: Glen Sater Voice: 480-441-8893 Motorola Inc. Fax: 480-675-2116 8220 E.
More informationA QoS Oriented Analysis of ertps and UGS flows in voice application over WIMAX
A QoS Oriented Analysis of ertps and UGS flows in voice application over WIMAX Abdalla A\ Alrahman Mohamed Abdalla 1, Dr. Amin Babiker A\ Nabi 2, Dr. Ashraf A. Osman 3 1,2,3 Department of communication,
More informationNovel MIME Type and Extension Based Packet Classification Algorithm in WiMAX
Novel MIME Type and Extension Based Packet Classification Algorithm in WiMAX Siddu P. Algur Departmentof Computer Science Rani Chennamma University Belgaum, India Niharika Kumar Department of Information
More informationMAC Protocol Proposal for Fixed BWA Networks Based on DOCSIS. Re: Medium Access Control Task Group Call for Contributions Session #4
Project Title Date Submitted IEEE 802.16 Broadband Wireless Access Working Group MAC Protocol Proposal for Fixed BWA Networks Based on DOCSIS 1999-10-29 Source Phil Guillemette SpaceBridge Networks Corporation
More informationIEEE Broadband Wireless Access Working Group < Changes in Definition of Data Delivery Services
Project Title Date Submitted IEEE 802.16 Broadband Wireless Access Working Group Changes in Definition of Data Delivery Services 25-June-2004 Source(s) Re: Vladimir Yanover et al
More informationIEEE m Reference Model
CHAPTER IEEE 802.16m Reference Model 3 and Protocol Structure INTRODUCTION The IEEE 802.16-2009 standard defines a generic reference model where major functional blocks (i.e., physical layer, security
More informationMulticast and broadcast support in AeroMACS
EUROCONTROL AeroMACS Technical Support Version: Working draft Multicast and broadcast support in AeroMACS Note Identifier: Author Elaboration date: AT4_ECTL_TN#18 AT4 wireless (under contract with EUROCONTROL)
More informationIEEE C802.16maint-08/064r3
Project Title IEEE 802.16 Broadband Wireless Access Working Group Clarification and Fixes in the MBS definitions and procedures Date Submitted Source(s) 2008-03-10 Kamran Etemad
More information7/27/2010 LTE-WIMAX BLOG HARISHVADADA.WORDPRESS.COM. QOS over 4G networks Harish Vadada
7/27/2010 HARISHVADADA.WORDPRESS.COM LTE-WIMAX BLOG QOS over 4G networks Harish Vadada Cellular network operators across the world have seen an explosive growth of mobile broadband usage. Traffic volume
More informationEfficient Uplink Scheduler Architecture of Subscriber Station in IEEE System
Efficient Uplink Scheduler Architecture of Subscriber Station in IEEE 82.16 System Woo-Jae Kim 1, Joo-Young Baek 1, Sun-Don Lee 1, Young-Joo Suh 1, Yun-Sung Kim 2, and Jin-A Kim 2 1 Department of Computer
More informationIEEE C802.16maint-08/064r4
Project Title Date Submitted IEEE 802.16 Broadband Wireless Access Working Group Clarifications and Improvement in the MBS definitions and procedures in 802.16REV2 2008-03-17 Source(s)
More informationAbstract of the Book
Book Keywords IEEE 802.16, IEEE 802.16m, mobile WiMAX, 4G, IMT-Advanced, 3GPP LTE, 3GPP LTE-Advanced, Broadband Wireless, Wireless Communications, Cellular Systems, Network Architecture Abstract of the
More informationMulticast and Quality of Service. Internet Technologies and Applications
Multicast and Quality of Service Internet Technologies and Applications Aims and Contents Aims Introduce the multicast and the benefits it offers Explain quality of service and basic techniques for delivering
More informationQuality of Service (QoS) Provisioning in Interconnected Packed-based Networks
ITU Regional Standardization Forum for Africa Livingstone, Zambia 16-18 March 2016 Quality of Service (QoS) Provisioning in Interconnected Packed-based Networks Yvonne Umutoni, Quality of Service Development
More informationPreliminary Performance Evaluation of QoS in DOCSIS 1.1
The University of Kansas Technical Report Preliminary Performance Evaluation of QoS in DOCSIS 1.1 Gayathri Chandrasekaran, Mohammed Hawa and David W. Petr ITTC-FY2003-TR-22736-01 January 2003 Sponsor:
More informationModule objectives. Integrated services. Support for real-time applications. Real-time flows and the current Internet protocols
Integrated services Reading: S. Keshav, An Engineering Approach to Computer Networking, chapters 6, 9 and 4 Module objectives Learn and understand about: Support for real-time applications: network-layer
More informationQoS Policy Parameters
CHAPTER 6 This chapter describes the parameters, both required and optional, for QoS provisioning using the ISC user interface. Service level QoS parameters include all entry fields in the VoIP, Management,
More informationWiMAX Vs Wi-Fi. 3G Evolution (source: Nokia) Wireless Systems. WiMAX
3G Evolution (source: Nokia) WiMAX Vs Wi-Fi ผศ.ดร.ส ร นทร ก ตต ธรก ล ภาคว ชาว ศวกรรมคอมพ วเตอร คณะว ศวกรรมศาสตร สถาบ นเทคโนโลย พระจอมเกล าเจ าค ณทหารลาดกระบ ง 2 Wireless Systems WiMAX Worldwide Interoperability
More informationPart 5: Link Layer Technologies. CSE 3461: Introduction to Computer Networking Reading: Chapter 5, Kurose and Ross
Part 5: Link Layer Technologies CSE 3461: Introduction to Computer Networking Reading: Chapter 5, Kurose and Ross 1 Outline PPP ATM X.25 Frame Relay 2 Point to Point Data Link Control One sender, one receiver,
More informationL2VPN Support on Cable
The Layer 2 VPN (L2VPN) Support over Cable feature on the Cisco CMTS provides point-to-point Transparent LAN Service (TLS) in support of the Business Services over DOCSIS (BSOD) Cable Labs specification.
More informationETSI TS V2.4.1 ( ) Technical Specification
TS 102 385-2 V2.4.1 (2007-10) Technical Specification Broadband Radio Access Networks (BRAN); HiperMAN; Conformance Testing for WiMAX/HiperMAN 1.2.1; Part 2: Test Suite Structure and Test Purposes (TSS&TP)
More informationATM Logical Connections: VCC. ATM Logical Connections: VPC
ATM Logical Connections: VCC Logical Connections in ATM are referred to as virtual channel connections (VCCs). Virtual channel (VC) is a generic term used to describe unidirectional transport of ATM cells
More informationOn Performance Evaluation of Different QoS Mechanisms and AMC scheme for an IEEE based WiMAX Network
On Performance Evaluation of Different QoS Mechanisms and AMC scheme for an IEEE 802.16 based WiMAX Network Vinit Grewal Department of Electronics and Communication Engineering National Institute of Technology
More informationDelay Analysis of IEEE Wireless Metropolitan Area Network
Delay Analysis of IEEE 802.16 Wireless Metropolitan Area Network Zsolt Saffer Technical University of Budapest 1521 Budapest Hungary safferzs@hit.bme.hu Sergey Andreev State University of Aerospace Instrumentation
More informationIEEE /15. IEEE Broadband Wireless Access Working Group < Title Interpretation of IEEE Standard 802.
Project IEEE 802.16 Broadband Wireless Access Working Group Title Interpretation of IEEE Standard 802.16 Date Submitted 2002-03-15 Source(s) Roger Marks Voice: +1 303 497 3037 mailto:r.b.marks@ieee.org
More informationIEEE Broadband Wireless Access Working Group <http://ieee802.org/16>
Project Title Date Submitted IEEE 802.16 Broadband Wireless Access Working Group A new method to enhance the network entry and re-entry procedures in PMP mode 2004-11-02 Source(s)
More informationProtocol Architecture (diag) Computer Networks. ATM Connection Relationships. ATM Logical Connections
168 430 Computer Networks Chapter 11 Asynchronous Transfer Mode Protocol Architecture Similarities between ATM and packet switching Transfer of data in discrete chunks Multiple logical connections over
More informationTCP/IP Networking. Training Details. About Training. About Training. What You'll Learn. Training Time : 9 Hours. Capacity : 12
TCP/IP Networking Training Details Training Time : 9 Hours Capacity : 12 Prerequisites : There are no prerequisites for this course. About Training About Training TCP/IP is the globally accepted group
More informationIEEE C802.16e-04/201. Project. IEEE Broadband Wireless Access Working Group <
IEEE C802.16e-04/201 Project IEEE 802.16 Broadband Wireless Access Working Group Title Enhanced Broadcast/Multicast Capabilities of 802.16e Date Submitted 2004-06-25 Source(s) Yong
More informationPREFACE. The average Ph.D. thesis is nothing but a transference of bones from one graveyard to another. J. Frank Dobie ( )
PREFACE The average Ph.D. thesis is nothing but a transference of bones from one graveyard to another. J. Frank Dobie (1888-1964) The recent standard IEEE 802.16 for fixed Broadband Wireless Access (BWA)
More informationCisco CMTS Router Quality of Service Features Configuration Guide
First Published: 2008-02-14 Last Modified: 2015-02-15 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387)
More informationWilliam Stallings Data and Computer Communications 7 th Edition. Chapter 11 Asynchronous Transfer Mode
William Stallings Data and Computer Communications 7 th Edition Chapter 11 Asynchronous Transfer Mode Protocol Architecture Similarities between ATM and packet switching Transfer of data in discrete chunks
More informationSolutions to Performance Problems in VoIP Over a Wireless LAN
Solutions to Performance Problems in VoIP Over a 802.11 Wireless LAN Wei Wang, Soung C. Liew, and VOK Li, Solutions to Performance Problems in VoIP over a 802.11 Wireless LAN, IEEE Transactions On Vehicular
More informationSujesh P. Lal VIT University, TN, INDIA
VoIP TRAFFIC SCHEDULING IN Sujesh P. Lal VIT University, TN, INDIA Introduction Popularity of Voice over IP (VoIP) applications such as Skype, Google Talk, and MSN Messenger along with emerging deployment
More informationComparative Assessments for Different WiMAX Scheduling Algorithms
Proceedings of the World Congress on Engineering and Computer Science 9 Vol I WCECS 9, October -, 9, San Francisco, USA Comparative Assessments for Different WiMAX Scheduling Algorithms Ahmed H. Rashwan,
More informationRelay Support for Distributed Scheduling and its Bandwidth Request/Allocation Mechanism
2007-01-15 IEEE C802.16j-07/034r1 Project Title Date Submitted IEEE 802.16 Broadband Wireless Access Working Group Relay Support for Distributed Scheduling and its Bandwidth Request/Allocation
More informationQoS in a SOHO Virtual Private Network for IP Telephony
CHAPTER 5 QoS in a SOHO Virtual Private Network for Telephony This chapter provides information about implementing QoS in an AVVID-enabled Small Office Home Office (SOHO) Virtual Private Network (VPN)
More informationQuality of Service Commands policy-map. This command has no default behavior or values.
Quality of Service Commands policy-map policy-map To create or modify a policy map that can be attached to one or more interfaces to specify a service policy, use the policy-map global configuration command.
More informationKeywords- IEEE , WiMAX, QoS, CBR, Mobility.
Volume 3, Issue 7, July 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A QoS Oriented
More informationETSI TS V2.2.1 ( )
TS 102 385-2 V2.2.1 (2006-06) Technical Specification Broadband Radio Access Networks (BRAN); HiperMAN/WiMAX; Conformance testing for the Data Link Control Layer (DLC); Part 2: Test Suite Structure and
More informationMobile WiMAX EPL 657. Panayiotis Kolios
Mobile WiMAX EPL 657 Panayiotis Kolios 1 WiMAX Based on the 802.16 suite of protocols Air interface OFDMA defined under 802.16-2004 Mobility enhancements made under 802.16e include multi-path performance
More informationFlexible Resource Allocation in IEEE Wireless Metropolitan Area Networks
Flexible Resource Allocation in IEEE 802.16 Wireless Metropolitan Area Networks Spyros A. Xergias, Nikos Passas and Lazaros Merakos Communication Networks Laboratory Department of Informatics & Telecommunications
More informationQos Analysis Of Wimax Network
Qos Analysis Of Wimax Network 802.16 Gurpal Singh Sidhu 1, Sandeep Kaushal 2, Dr. Vijay Kumar Banga 3 1 M-Tech scholar, Department of Electronics and Communication Engineering, Amritsar College of Engineering
More informationBROADBAND AND HIGH SPEED NETWORKS
BROADBAND AND HIGH SPEED NETWORKS ATM SERVICE CATEGORIES Service Categories : represent particular combinations of traffic parameters and QoS parameters. These parameters are determined by users for a
More informationACL Rule Configuration on the WAP371
Article ID: 5089 ACL Rule Configuration on the WAP371 Objective A network access control list (ACL) is an optional layer of security that acts as a firewall for controlling traffic in and out of a subnet.
More informationOSI Layer OSI Name Units Implementation Description 7 Application Data PCs Network services such as file, print,
ANNEX B - Communications Protocol Overheads The OSI Model is a conceptual model that standardizes the functions of a telecommunication or computing system without regard of their underlying internal structure
More informationATM. Asynchronous Transfer Mode. (and some SDH) (Synchronous Digital Hierarchy)
ATM Asynchronous Transfer Mode (and some SDH) (Synchronous Digital Hierarchy) Why use ATM? Circuit switched connections: After initial setup no processing in network nodes Fixed bit rates, fixed time delay
More informationNCTUns Simulation Tool for WiMAX Modeling
NCTUns Simulation Tool for WiMAX Modeling (Invited Paper) Shiang-Ming Huang smhuang@csnctuedutw Ya-Chin Sung ycsung@csienctuedutw Yi-Bing Lin liny@linycsienctuedutw Shie-Yuan Wang shieyuan@csienctuedutw
More informationFragmenting and Interleaving Real-Time and Nonreal-Time Packets
CHAPTER 16 Fragmenting and Interleaving Real-Time and Nonreal-Time Packets Integrating delay-sensitive real-time traffic with nonreal-time data packets on low-speed links can cause the real-time packets
More informationChapter 7. Local Area Network Communications Protocols
Chapter 7 Local Area Network Communications Protocols The Network Layer The third layer of the OSI Model is the network layer. The network layer is concerned with providing a means for hosts to communicate
More informationDESIGN AND IMPLEMENTATION OF IEEE MAC LAYER SIMULATOR
DESIGN AND IMPLEMENTATION OF IEEE 802.16 MAC LAYER SIMULATOR H. M. Shamitha 1, H. M. Guruprasad 1, Kishore. M 2, Ramesh. K 3 Department of Electronics and Communication 1 Proudadhevaraya Institute of Technology,
More informationImplementation and Evaluation of a MAC Scheduling Architecture for IEEE WirelessMANs
Implementation and Evaluation of a MAC Scheduling Architecture for IEEE 802.16 WirelessMANs by Abhishek Maheshwari Department of Computer Science and Engineering Indian Institute of Technology Kanpur May
More informationOverview of WiMAX (Chapter 2) ENE 490 MON 13:30-16:30 Asst. Prof. Suwat Pattaramalai
(Chapter 2) ENE 490 MON 13:30-16:30 Asst. Prof. Suwat Pattaramalai Background on IEEE 802.16 and WiMAX (Table 2.1 and Table 2.2) Salient Features of WiMAX OFDM-based physical layer: good resistance to
More informationA Study On Broadband Wireless Access-Wimax
A Study On Broadband Wireless Access-Wimax Pankaj Chouhan & S. R. Mansore Department of Electronics & Communication, Ujjain Engineering College, Ujjain Abstract- The IEEE 802.16 standard, commonly known
More informationIEEE Broadband Wireless Access Working Group < Accept the proposed specification changes on IEEE P802.
Project Title IEEE 802.6 Broadband Wireless Access Working Group TEK generation and update for Handover Date Submitted Source(s) Re: 2008-03-7 Kyeong-Tae Do Eun-Sun Jung Geunhwi
More informationip rsvp reservation-host
Quality of Service Commands ip rsvp reservation-host ip rsvp reservation-host To enable a router to simulate a host generating Resource Reservation Protocol (RSVP) RESV messages, use the ip rsvp reservation-host
More informationUpstream Scheduler Mode Configuration for the Cisco ubr CMTS
Upstream Scheduler Mode Configuration for the Cisco ubr CMTS Document ID: 69704 Contents Introduction Prerequisites Requirements Components Used Conventions Background Information Upstream Scheduling in
More informationReview of Important Networking Concepts
Review of Important Networking Concepts Review: ed communication architecture The TCP/IP protocol suite 1 Networking Concepts Protocol Architecture Protocol s Encapsulation Network Abstractions 2 1 Sending
More informationChapter 2 - Part 1. The TCP/IP Protocol: The Language of the Internet
Chapter 2 - Part 1 The TCP/IP Protocol: The Language of the Internet Protocols A protocol is a language or set of rules that two or more computers use to communicate 2 Protocol Analogy: Phone Call Parties
More informationIEEE Broadband Wireless Access Working Group < Huawei LB26b, Working Group Letter Ballot on P802.
Project Title Date Submitted Source(s) Re: IEEE 802.16 Broadband Wireless Access Working Group Group DSx TLV March 9, 2008 Phillip Barber Huawei E-mail: LB26b, Working Group Letter
More informationA Comprehensive Survey on WiMAX Scheduling Approaches
2 A Comprehensive Survey on WiMAX Scheduling Approaches Lamia Chaari, Ahlem Saddoud, Rihab Maaloul and Lotfi Kamoun Electronics and Information Technology Laboratory, National School of Engineering of
More informationComputer Networks. More on Standards & Protocols Quality of Service. Week 10. College of Information Science and Engineering Ritsumeikan University
Computer Networks More on Standards & Protocols Quality of Service Week 10 College of Information Science and Engineering Ritsumeikan University Introduction to Protocols l A protocol is a set of rules
More informationNeed For Protocol Architecture
Chapter 2 CS420/520 Axel Krings Page 1 Need For Protocol Architecture E.g. File transfer Source must activate communications path or inform network of destination Source must check destination is prepared
More informationConcept Questions Demonstrate your knowledge of these concepts by answering the following questions in the space provided.
113 Chapter 9 TCP/IP Transport and Application Layer Services that are located in the transport layer enable users to segment several upper-layer applications onto the same transport layer data stream.
More informationBasics (cont.) Characteristics of data communication technologies OSI-Model
48 Basics (cont.) Characteristics of data communication technologies OSI-Model Topologies Packet switching / Circuit switching Medium Access Control (MAC) mechanisms Coding Quality of Service (QoS) 49
More information! Cell streams relating to different media types are multiplexed together on a statistical basis for transmission and switching.
Asynchronous Transfer Mode (ATM) Networks! All source media is first broken down into a stream of fixed sized units known as cells.! Cell streams relating to different media types are multiplexed together
More informationCisco ubr7200 QoS/MAC Enhancements for Voice and Fax Calls: DOCSIS 1.0+
Cisco ubr7200 QoS/MAC Enhancements for Voice and Fax Calls: DOCSIS 1.0+ Document ID: 12215 Contents Introduction Prerequisites Requirements Components Used Conventions Brief Theory Summary What Happens
More informationAnalysis of QOS in WiMAX Networks
Analysis of QOS in WiMAX Networks S. Srivisshudhanan Periyar University Abstract QoS is a key metric for transmission capacity requesting applications in WiMAX (IEEE 802.16 standard) systems. It is accomplished
More informationMultimedia in the Internet
Protocols for multimedia in the Internet Andrea Bianco Telecommunication Network Group firstname.lastname@polito.it http://www.telematica.polito.it/ > 4 4 3 < 2 Applications and protocol stack DNS Telnet
More informationWiMAX: MAC Layer Performance Assessments
WiMAX: MAC Layer Performance Assessments A. Bestetti,G.Giambene, S. Hadzic Alcatel-Lucent, Via Trento, 30, I-20059 Vimercate, Milano, Italy University of Siena, Via Roma, 56, I-53100 Siena, Italy Abstract
More informationOSI Transport Layer. objectives
LECTURE 5 OSI Transport Layer objectives 1. Roles of the Transport Layer 1. segmentation of data 2. error detection 3. Multiplexing of upper layer application using port numbers 2. The TCP protocol Communicating
More informationIEEE Broadband Wireless Access Working Group <
Project Title IEEE 802.16 Broadband Wireless Access Working Group HO Latency Reduction Date Submitted Source(s) Re: Abstract 2008-01-22 Sungjin Lee, Geunhwi Lim, Brian Shim Samsung
More informationGOPALAN COLLEGE OF ENGINEERING AND MANAGEMENT Department of Computer Science and Engineering COURSE PLAN
Appendix - C GOPALAN COLLEGE OF ENGINEERING AND MANAGEMENT Department of Computer Science and Engineering Academic Year: 2016-17 Semester: EVEN COURSE PLAN Semester: VI Subject Code& Name: 10CS64 & Computer
More informationModeling a MAC Scheduler: Experiences with a DOCSIS Cable
Modeling a MAC Scheduler: Experiences with a DOCSIS Cable Network Simulation Model Jim Martin Department of Computer Science Clemson University jim.martin@cs.clemson.edu Phone: 864 656 4529 Fax: 864 656
More informationIEEE 802 Executive Committee Study Group on Mobile Broadband Wireless Access <http://ieee802.org/20> Implication of End-user.
Project Title Date Submitted IEEE 802 Executive Committee Study Group on Mobile Broadband Wireless Access Implication of End-user QoS requirements on PHY & MAC 2003-11 11-1010 C802.2-03/106
More informationUBR Congestion controlled Video Transmission over ATM Eltayeb Omer Eltayeb, Saudi Telecom Company
UBR Congestion controlled Video Transmission over ATM Eltayeb Omer Eltayeb, Saudi Telecom Company ABSTRACT The ATM unspecified bit rate (UBR) class of service some times referred to as best effort service-
More informationWiMAX Forum Test Procedures
WiMAX Forum Mobile Inter-Operability Test (MIOT) WiMAX Forum Approved (2010-09-07) WiMAX Forum Proprietary Copyright 2010 WiMAX Forum. All Rights Reserved. 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18
More informationIEEE C802.16e-03/20r1. IEEE Broadband Wireless Access Working Group <
Project Title Date Submitted IEEE 802.16 Broadband Wireless Access Working Group IEEE 802.16e Handoff Draft 2003-03-13 Source(s) Itzik Kitroser IEEE802.16e Handoff ad-hoc chair
More informationETSI TS V1.2.1 ( ) Technical Specification
TS 102 545-2 V1.2.1 (2009-03) Technical Specification Broadband Radio Access Networks (BRAN); HiperMAN; Conformance Testing for WiMAX/HiperMAN 1.3.1; Part 2: Test Suite Structure and Test Purposes (TSS&TP)
More informationIEEE /WIMAX- Overview. E.Borcoci
IEEE /WIMAX- Overview E.Borcoci Contents 1 IEEE Wireless MAN overview...1 1.1 Introduction...2 1.1.1 IEEE 802 standards...2 1.1.2 IEEE Summary...2 1.1.3 WiMAX summary...4 1.1.4 WiMAX Forum...5 1.1.5 Other
More informationNeed For Protocol Architecture
Chapter 2 CS420/520 Axel Krings Page 1 Need For Protocol Architecture E.g. File transfer Source must activate communications path or inform network of destination Source must check destination is prepared
More informationPriority Based Uplink Scheduling Scheme for WiMAX Service Classes
I.J. Information Technology and Computer Science, 213, 8, 66-74 Published Online July 213 in MECS (http://www.mecs-press.org/) DOI: 1.5815/ijitcs.213.8.7 Priority Based Uplink Scheduling Scheme for WiMAX
More informationMultimedia Networking
CMPT765/408 08-1 Multimedia Networking 1 Overview Multimedia Networking The note is mainly based on Chapter 7, Computer Networking, A Top-Down Approach Featuring the Internet (4th edition), by J.F. Kurose
More informationRSVP Support for ATM and PVCs
RSVP Support for ATM and PVCs Last Updated: January 15, 2013 This document describes Cisco Resource Reservation Protocol (RSVP) support for the Asynchronous Transfer Mode/permanent virtual circuits (ATM/PVCs)
More informationAsynchronous Transfer Mode
ATM Asynchronous Transfer Mode CS420/520 Axel Krings Page 1 Protocol Architecture (diag) CS420/520 Axel Krings Page 2 1 Reference Model Planes User plane Provides for user information transfer Control
More informationCisco Broadband Wireless Gateway 2.3 Command Reference, IOS Release 12.4(24)YG3
Cisco Broadband Wireless Gateway 2.3 Command Reference, IOS 12.4(24)YG3 July 15, 2010 aaa accounting, page -5 aaa accounting (wimax agw user group-list submode), page -11 aaa accounting start wait-response,
More informationConfiguring RTP Header Compression
Header compression is a mechanism that compresses the IP header in a packet before the packet is transmitted. Header compression reduces network overhead and speeds up the transmission of either Real-Time
More information