MMR Network distributed tunnel connection management

Similar documents
MMR Network centralized tunnel connection management

MMR network data forwarding and QoS schema

IEEE C802.16j- 07/309. IEEE Broadband Wireless Access Working Group <

IEEE Broadband Wireless Access Working Group <

IEEE Broadband Wireless Access Working Group < Re: IEEE P802.16j/D1: IEEE j working group letter ballot #28

[Mobility Management for Mobile Multi-hop Relay Networks]

A response to a Call for Technical Proposal, 06_027.pdf

IEEE C802.16e-04/446r2. IEEE Broadband Wireless Access Working Group <

Message definition to support MS network entry in centralized allocation model

IEEE C802.16e-05/196r1. IEEE Broadband Wireless Access Working Group <

IEEE C802.16e-05/192r1. IEEE Broadband Wireless Access Working Group <

Relay Support for Distributed Scheduling and its Bandwidth Request/Allocation Mechanism

IEEE C802.16h-06/063r1. IEEE Broadband Wireless Access Working Group <

IEEE Broadband Wireless Access Working Group < Fix for Sleep Mode Add/Remove CIDs from Power Saving Class ID

IEEE C802.16maint-06/055. IEEE Broadband Wireless Access Working Group <

IEEE Broadband Wireless Access Working Group < Procedures for inter-system communication over the air

IEEE C802.16d-03/45. IEEE Broadband Wireless Access Working Group <

Round Trip Delay Optimization

IEEE C802.16e-04/195r1. IEEE Broadband Wireless Access Working Group <

A General Frame Structure for IEEE802.16j Relaying Transmission

IEEE C802.16j-07/209r3. IEEE Broadband Wireless Access Working Group <

IEEE Broadband Wireless Access Working Group <

IEEE Broadband Wireless Access Working Group <

IEEE Broadband Wireless Access Working Group <

IEEE Broadband Wireless Access Working Group < WirelessMAN coexistence function primitives consolidation

IEEE Broadband Wireless Access Working Group <

IEEE /15. IEEE Broadband Wireless Access Working Group < Title Interpretation of IEEE Standard 802.

IEEE Broadband Wireless Access Working Group < The document contains ARQ Proposal for /4 MAC

IEEE C802.16d-04/34. IEEE Broadband Wireless Access Working Group <

IEEE Broadband Wireless Access Working Group <

IEEE Broadband Wireless Access Working Group < Fix broken message flow in HO decision & initiation

IEEE Broadband Wireless Access Working Group <

IEEE Presentation Submission Template (Rev. 8.3)

IEEE Broadband Wireless Access Working Group < Early transmission of higher layer packets in the idle mode

IEEE C802.16e-04/472. IEEE Broadband Wireless Access Working Group <

message reported by SSs and share DB updating for ND

IEEE Broadband Wireless Access Working Group < IEEE Working Group Letter Ballot #24, on P802.

IEEE Broadband Wireless Access Working Group < Handoff SDL charts proposal

IEEE Broadband Wireless Access Working Group <

IEEE C802.16e-04/201. Project. IEEE Broadband Wireless Access Working Group <

IEEE C802.16e-04/151r3 Project. IEEE Broadband Wireless Access Working Group <

IEEE C802.16maint-05/091r1. IEEE Broadband Wireless Access Working Group <

IEEE C802.16i-06/014r3

IEEE Broadband Wireless Access Working Group < To prevent the loss of the PDUs at the serving BS during MAC hand-over.

IEEE Broadband Wireless Access Working Group < Proposal for MAC protocol modification for

Nokia Fax:

Sleep Mode and Idle Mode Operations for IEEE j

IEEE Broadband Wireless Access Working Group < MSS s buffer capability negotiation for DL H-ARQ operation

Architecture clarification and Coexistence Protocol Chi-Chen Lee, Hung-Lin Chou Computer & Communications Research Labs, ITRI, Taiwan

To reply to the call for comments on technical requirements regarding Cross-Communications

IEEE C802.16e-05/242r1. IEEE Broadband Wireless Access Working Group <

IEEE C802.16maint-05/091. IEEE Broadband Wireless Access Working Group <

IEEE Broadband Wireless Access Working Group <

IEEE C802.16a-02/14

corrected PDF IEEE C802.16g-06/011r2

IEEE C802.16e-04/67r1. IEEE Broadband Wireless Access Working Group <

IEEE C802.16e-318. IEEE Broadband Wireless Access Working Group <

IEEE C802.16h-06/114r3. IEEE Broadband Wireless Access Working Group <

IEEE Broadband Wireless Access Working Group < message reported by SSs and share DB updating for neighbor discovery

IEEE abc-01/19. IEEE Broadband Wireless Access Working Group <

IEEE Broadband Wireless Access Working Group <

IEEE C802.16h-07/017. IEEE Broadband Wireless Access Working Group <

IEEE Broadband Wireless Access Working Group < MIB II Integration and MIB II Table

IEEE c-00/11. IEEE Broadband Wireless Access Working Group <

IEEE Broadband Wireless Access Working Group < Increasing Link Robustness in TG3 Systems

Data Integrity in MAC IEEE Presentation Submission Template (Rev. 8)

IEEE Broadband Wireless Access Working Group < Changes in Definition of Data Delivery Services

IEEE Broadband Wireless Access Working Group < MBRA (Multicast & Broadcast Rekeying Algorithm) for PKMv2

IEEE802.16maint-04/71r3

IEEE Broadband Wireless Access Working Group < Fixing mappings between primitive functions and NCMS services

IEEE C802.16h-07/043r1. IEEE Broadband Wireless Access Working Group <

IEEE C802.16e-05/401r3

Simulating coexistence between y and h systems in the 3.65 GHz band An amendment for e

Data Submitted Voice: Fax: SungCheol Chang Chulsik Yoon,

IEEE Broadband Wireless Access Working Group < HO consideration in PKMv2 security. Voice: Seokheon Cho

IEEE C802.16e-05/401r2

IEEE Broadband Wireless Access Working Group < Huawei LB26b, Working Group Letter Ballot on P802.

IEEE C802.16a-02/86. IEEE Broadband Wireless Access Working Group <

IEEE Broadband Wireless Access Working Group < Corrections for the 3 Way SA-TEK Exchange

IEEE Broadband Wireless Access Working Group < HO consideration in PKMv2 security

IEEE e Security Review

Page 1 of 1 16-Jan-01

IEEE C802.16e-04/10. IEEE Broadband Wireless Access Working Group <

IEEE C802.16e-03/71r2. IEEE Broadband Wireless Access Working Group <

IEEE White Space Radio Potential Use Cases For TVWS

IEEE abc-01/18r1. IEEE Broadband Wireless Access Working Group <

Evaluation Procedure for MAC Protocols

IEEE Broadband Wireless Access Working Group <

IEEE Broadband Wireless Access Working Group <

IEEE Broadband Wireless Access Working Group <

IEEE Broadband Wireless Access Working Group <

IEEE Broadband Wireless Access Working Group < Detailed ARQ Proposal for a and b MAC

IEEE P WG Information Model

IEEE C802.16maint-08/064r3

IEEE Broadband Wireless Access Working Group < Enhancement of the MBRA for Adaptation to the PKMv2

IEEE Broadband Wireless Access Working Group < Ensuring the readability and correctness of the draft IEEE P802.16h/D3.

IEEE C802.16maint-08/064r4

IEEE C802.16e-05/115r1. IEEE Broadband Wireless Access Working Group <

Initial PHY Layer System Proposal for Sub 11 GHz BWA

A distributed spectrum monitoring system Authors:

Transcription:

Project Title Date Submitted IEEE 802.16 Broadband Wireless Access Working Group <http://ieee802.org/16> MMR Network distributed tunnel connection management 2007-03-05 Source(s) G.Q. Wang, Wen Tong, Peiying Zhu Hang Zhang, David Steer, Gamini Senarath, Derek Yu, Mo-Han Fong Nortel 3500 Carling Avenue Ottawa, Ontario K2H 8E9 Erwu Liu, Dongyao Wang, Gang Shen, Kaibin Zhang, Jimin Liu, Shan Jin Alcatel Lucent, R&I Shanghai, No.388, Ningqiao Road, Shanghai, P.R.C. Torsten Fahldieck Alcatel-Lucent R&I Holderaeckerstr.35, Stuttgart, Germany Voice: 1-613-763-1315 [mailto:wentong@nortel.com] [mailto:pyzhu@nortel.com] Voice: 86-21-50551240-8194 Fax: 96-21-50554554 {Erwu.liu, Dongyao.Wang, Gang.A.Shen, Kaibin.Zhang, Jimin.Liu, Shan.Jin} @alcatel-sbell.com.cn Voice: +4971182132163 Fax: +4971182132453 torsten.fahldieck@alcatel-lucent.de Re: Abstract A response to a Call for Technical Proposal, http://www.wirelessman.org/relay/docs/80216j- 07_007r2.pdf This document provides text descriptions for routing and connection management sections defined in ToC of IEEE 802.16j-06/026r2 0

Purpose Notice Release Patent Policy and Procedures To incorporate the proposed text into the P802.16j Baseline Document (IEEE 802.16j- 06/026r1) This document has been prepared to assist IEEE 802.16. It is offered as a basis for discussion and is not binding on the contributing individual(s) or organization(s). The material in this document is subject to change in form and content after further study. The contributor(s) reserve(s) the right to add, amend or withdraw material contained herein. The contributor grants a free, irrevocable license to the IEEE to incorporate material contained in this contribution, and any modifications thereof, in the creation of an IEEE Standards publication; to copyright in the IEEE s name any IEEE Standards publication even though it may include portions of this contribution; and at the IEEE s sole discretion to permit others to reproduce in whole or in part the resulting IEEE Standards publication. The contributor also acknowledges and accepts that this contribution may be made public by IEEE 802.16. The contributor is familiar with the IEEE 802.16 Patent Policy and Procedures <http://ieee802.org/16/ipr/patents/policy.html>, including the statement "IEEE standards may include the known use of patent(s), including patent applications, provided the IEEE receives assurance from the patent holder or applicant with respect to patents essential for compliance with both mandatory and optional portions of the standard." Early disclosure to the Working Group of patent information that might be relevant to the standard is essential to reduce the possibility for delays in the development process and increase the likelihood that the draft publication will be approved for publication. Please notify the Chair <mailto:chair@wirelessman.org> as early as possible, in written or electronic form, if patented technology (or technology under patent application) might be incorporated into a draft standard being developed within the IEEE 802.16 Working Group. The Chair will disclose this notification via the IEEE 802.16 web site <http://ieee802.org/16/ipr/patents/notices>. 1

MMR Network End-to-End Distributed Tunnel Connection Management G.Q. Wang, Wen Tong, Peiying Zhu, Hang Zhang, Gamini Senarath, David Steer, Derek Yu, Mo-Han Fong Nortel Erwu Liu, Torsten Fahldieck, Dongyao Wang, Shen Gang, Kaibin Zhang, Jimin Liu, Shan Jin Alcatel-Lucent 1 Introduction In IEEE 802.16j-06/014r1 it has defined the concepts of access link, relay link (R-link) and relay path to describe MMR network topology. These terminologies are used to support end-to-end connection management and data forwarding schema over MMR relay topology. The concept of tunnel has been discussed in many contributions for end-to-end data connections over R-link. This contribution focuses on how tunnel connections are handled in distributed MR cell control environment, and the tunnel connection processing related to routing path management. To enable backward compatibility and efficient multi-hop relay operations, this harmonized contribution describes the general specification for Section 6.1.1 (IEEE 802.16j-06/017-r2), Relaying extension to MAC Common part sublayer. The contribution covers the following text descriptions: End-to-end tunnel usage scenario with radio resource control in distributed topology schema, where the tunnel is sectionized in multiple routing domains Applying constraint-based routing to support sectionized tunnel to guarantee end-to-end connection integrity CID/Path binding operation and its application to relay data forwarding in distributed routing domains Path management related to MR-BS to RS connection, RS to RS connection, and RS to MS connection This contribution proposes a suit of common relay MAC sub-layer (R-MAC) functions for relay operations. Sectionized Tunnel in distributed routing domain 2

In distributed routing control schema, there exist multiple routing domains. In each routing domain, the routing controller either resides on MR BS, or the RS cell head. In distributed manner, the routing path within each cell is determined individually by the routing controller with their own radio resource allocation and localized topology knowledge. In this case, the tunnel CID within each domain only has local sense for connections scoped in that domain. In distributed routing control, the end-to-end connection from BS to the designated RS is represented by the concatenation of localized tunnel CIDs, along the given path. In this scenario, when a data burst travels across the boundary of the routing domains, it has to replace the original tunnel CID by a new tunnel CID. This operation is called tunnel CID swapping. The Figure 1 shows the usage of sectionized tunnel which is established across multiple routing domains. Sectionized Tunnel CID Sectionized Tunnel CID BS BS1 RS1 BS2 RS2 BS3 RS3 BS4 RS4 RS5 BS5 MS Figure 1. Sectionized Tunnel uasage in distributed routing domain Constraint-based Routing for sectionized tunnel Similar to globalize tunnel management, constraint-based routing is also used to support sectionized tunnel connections within distributed routing domains. In constraint-based routing, the explicit route and associated path ID are specified in signaling message such as DSx (x represents Add, Change or Delete) by BS. Different from globalize tunnel creation, in the initial explicit route, the BS only specifies its local topology, next cell routing domain boundary node and the destination node. For example, in Figure 1, BS only specifies BS RS1 RS2 RS3 RS5 in initial explicit route. These topological nodes are pre-known to BS, but RS4 is not visible to BS as it is a local topology information of RS3 (we assume RS3 is next RS cell head). In DSA message header, the initial tunnel-end-point RS CID is the next RS cell head and the transport tunnel CID is the one BS has allocated to the next RS cell head (i.e., RS3). Upon received DSA, the RS cell head should check 3

whether itself is the targeted destination node (by examining the explicit route), and if it should create a new sectionized tunnel for the rest of the relay path. If it needs, the RS cell head should replace the next tunnel-endpoint RS CID in generic MAC header, assign the new transport tunnel CID in DSA body, and update the explicit route in extended sub-header accordingly. RS cell head should also create a mapping relationship between the original transport tunnel CID and the newly assigned transport tunnel CID. This procedure will be repeated cell-by-cell until the destination access RS in the explicit route is reached. Figure 2 shows the working flow behavior at each RS which specifies how constraint-based routing is used to support end-to-end distribute connection management. Tunnel CID mapping between routing domains In sectionized tunnel connection setup, the operation of CID/Path binding is similar to globalize tunnel creation. But for the received DSA-Req message, each intermediate RS has to determine if it is the tunnel-end-point of the sectionized tunnel. If it is the tunnel-end-point, then RS should further check whether itself is the last node in the explicit route or not. If not, it implies a new sectionized tunnel needs to be created. In this case, the RS should create mapping relationship between the original tunnel CID and the newly allocation tunnel CID, and assign transport tunnel CID in DSA message. RS may also expand the local route in explicit route TLV (e.g., RS4 in Fig 1), and further forward DSA to the next hop. This operation should be done hop-by-hop until the last node in explicit route is reached. Forwarding by sectionized tunnel CID In this mode the tunnel CID may change from cell-by-cell (hop-by-hop) up to the final destination. The RS replaces the new CID value in the header and adapts further information fields in the header if necessary. The determination of the new CID and the type of forwarding action is done by a forwarding table lookup. As in transparent forwarding the assignment of the CID s and the binding to the per-service-flow CID has to be done in a manner that the tunnel end point can determine the mapping/aggregation between tunnel/basic CID and per-service-flow CID. Receive DSA-REQ No My RS-CID in generic header Yes 4 Update VBS routing table with VBS-ID, path list, T-CID Yes My RS-CID last hop in explicit route No forward DSA-REQ To next hop Assign new CID, T-CID, Path update in DSA-REQ

Figure 2. Constraint-based DSA signaling call flow for sectionized tunnel creation 5

2. Proposed text changes ++++++++++++ start text proposal ++++++++++++++++++++++++++++++++++ [Insert the followings after the end of section 6.3.24:] 6.3.25 Relay path management and routing Sectionized Tunnel in distributed routing domain In distributed routing control schema, there exist multiple routing domains. In each routing domain, the routing controller either resides on MR BS, or the RS cell head. In distributed manner, the routing path within each cell is determined individually by the routing controller with their own radio resource allocation and localized topology knowledge. In this case, the tunnel CID within each domain only has local sense for connections scoped in that domain. In distributed routing control, the end-to-end connection from BS to the designated RS is represented by the concatenation of localized tunnel CIDs, along the given path. In this scenario, when a data burst travels across the boundary of the routing domains, it has to replace the original tunnel CID by a new tunnel CID. This operation is called tunnel CID swapping. The Figure 1 shows the usage of sectionized tunnel which is established across multiple routing domains. Sectionized Tunnel CID Sectionized Tunnel CID BS BS1 RS1 BS2 RS2 BS3 RS3 BS4 RS4 RS5 BS5 MS 6

Figure 1. Sectionized Tunnel uasage in distributed routing domain Constraint-based Routing for sectionized tunnel Similar to globalize tunnel management, constraint-based routing is also used to support sectionized tunnel connections within distributed routing domains. In constraint-based routing, the explicit route and associated path ID are specified in signaling message such as DSx (x represents Add, Change or Delete) by BS. Different from globalize tunnel creation, in the initial explicit route, the BS only specifies its local topology, next cell routing domain boundary node and the destination node. For example, in Figure 1, BS only specifies BS RS1 RS2 RS3 RS5 in initial explicit route. These topological nodes are pre-known to BS, but RS4 is not visible to BS as it is a local topology information of RS3 (we assume RS3 is next RS cell head). In DSA message header, the initial tunnel-end-point RS CID is the next RS cell head and the transport tunnel CID is the one BS has allocated to the next RS cell head (i.e., RS3). Upon received DSA, the RS cell head should check whether itself is the targeted destination node (by examining the explicit route), and if it should create a new sectionized tunnel for the rest of the relay path. If it needs, the RS cell head should replace the next tunnel-endpoint RS CID in generic MAC header, assign the new transport tunnel CID in DSA body, and update the explicit route in extended sub-header accordingly. RS cell head should also create a mapping relationship between the original transport tunnel CID and the newly assigned transport tunnel CID. This procedure will be repeated cell-by-cell until the destination access RS in the explicit route is reached. Figure 2 shows the working flow behavior at each RS which specifies how constraint-based routing is used to support end-to-end distribute connection management. Tunnel CID mapping between routing domains In sectionized tunnel connection setup, the operation of CID/Path binding is similar to globalize tunnel creation. But for the received DSA-Req message, each intermediate RS has to determine if it is the tunnel-end-point of the sectionized tunnel. If it is the tunnel-end-point, then RS should further check whether itself is the last node in the explicit route or not. If not, it implies a new sectionized tunnel needs to be created. In this case, the RS should create mapping relationship between the original tunnel CID and the newly allocation tunnel CID, and assign transport tunnel CID in DSA message. RS may also expand the local route in explicit route TLV (e.g., RS4 in Fig 1), and further forward DSA to the next hop. This operation should be done hop-by-hop until the last node in explicit route is reached. Forwarding by sectionized tunnel CID 7

In this mode the tunnel CID may change from cell-by-cell (hop-by-hop) up to the final destination. The RS replaces the new CID value in the header and adapts further information fields in the header if necessary. The determination of the new CID and the type of forwarding action is done by a forwarding table lookup. As in transparent forwarding the assignment of the CID s and the binding to the per-service-flow CID has to be done in a manner that the tunnel end point can determine the mapping/aggregation between tunnel/basic CID and per-service-flow CID. Receive DSA-REQ No My RS-CID in generic header Yes Update VBS routing table with VBS-ID, path list, T-CID Yes My RS-CID last hop in explicit route No forward DSA-REQ To next hop Assign new CID, T-CID, Path update in DSA-REQ Update VBS routing table with VBS-ID, path list, T-CID Establish mapping between Original CID and new CID send DSA-RSP upstream Update VBS routing table with VBS-ID, path list, T-CID forward DSA-REQ To next hop 8

Figure 2. Constraint-based DSA signaling call flow for sectionized tunnel creation ++++++++++++++++++++ End of text proposal ++++++++++++++++++++++ 9