IEEE C802.16h-07/017. IEEE Broadband Wireless Access Working Group <

Similar documents
Simulating coexistence between y and h systems in the 3.65 GHz band An amendment for e

IEEE C802.16e-05/192r1. IEEE Broadband Wireless Access Working Group <

IEEE C802.16e-05/196r1. IEEE Broadband Wireless Access Working Group <

IEEE C802.16a-02/14

IEEE Broadband Wireless Access Working Group <

IEEE C802.16d-03/45. IEEE Broadband Wireless Access Working Group <

IEEE Broadband Wireless Access Working Group < Procedures for inter-system communication over the air

Round Trip Delay Optimization

A General Frame Structure for IEEE802.16j Relaying Transmission

IEEE Broadband Wireless Access Working Group <

Relay Support for Distributed Scheduling and its Bandwidth Request/Allocation Mechanism

IEEE Broadband Wireless Access Working Group < IEEE Working Group Letter Ballot #24, on P802.

A response to a Call for Technical Proposal, 06_027.pdf

IEEE Broadband Wireless Access Working Group < MSS s buffer capability negotiation for DL H-ARQ operation

IEEE /15. IEEE Broadband Wireless Access Working Group < Title Interpretation of IEEE Standard 802.

IEEE C802.16e-04/195r1. IEEE Broadband Wireless Access Working Group <

IEEE Broadband Wireless Access Working Group < WirelessMAN coexistence function primitives consolidation

Initial PHY Layer System Proposal for Sub 11 GHz BWA

IEEE Broadband Wireless Access Working Group <

IEEE802.16maint-04/71r3

IEEE Broadband Wireless Access Working Group <

IEEE Broadband Wireless Access Working Group <

MMR network data forwarding and QoS schema

message reported by SSs and share DB updating for ND

Message definition to support MS network entry in centralized allocation model

doc.: IEEE /0928r2

IEEE Broadband Wireless Access Working Group < Early transmission of higher layer packets in the idle mode

IEEE Broadband Wireless Access Working Group < Changes in Definition of Data Delivery Services

IEEE abc-01/19. IEEE Broadband Wireless Access Working Group <

IEEE C802.16h-06/063r1. IEEE Broadband Wireless Access Working Group <

IEEE C802.16e-04/472. IEEE Broadband Wireless Access Working Group <

Evaluation Procedure for MAC Protocols

IEEE Presentation Submission Template (Rev. 8.3)

IEEE C802.16maint-06/055. IEEE Broadband Wireless Access Working Group <

IEEE Broadband Wireless Access Working Group <

IEEE C802.16h-06/114r3. IEEE Broadband Wireless Access Working Group <

IEEE Broadband Wireless Access Working Group < The document contains ARQ Proposal for /4 MAC

IEEE C802.16j-07/209r3. IEEE Broadband Wireless Access Working Group <

IEEE C802.16e-04/446r2. IEEE Broadband Wireless Access Working Group <

IEEE C802.16e-318. IEEE Broadband Wireless Access Working Group <

IEEE Broadband Wireless Access Working Group < Fix for Sleep Mode Add/Remove CIDs from Power Saving Class ID

IEEE C802.16maint-05/091r1. IEEE Broadband Wireless Access Working Group <

Nokia Fax:

IEEE Broadband Wireless Access Working Group < MIB II Integration and MIB II Table

IEEE Broadband Wireless Access Working Group <

CSC344 Wireless and Mobile Computing. Department of Computer Science COMSATS Institute of Information Technology

Wireless Local Area Networks (WLANs) Part I

MMR Network centralized tunnel connection management

An Efficient Scheduling Scheme for High Speed IEEE WLANs

IEEE Broadband Wireless Access Working Group < message reported by SSs and share DB updating for neighbor discovery

IEEE Broadband Wireless Access Working Group <

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols

IEEE Broadband Wireless Access Working Group <

IEEE C802.16e-05/401r2

IEEE C802.16e-04/67r1. IEEE Broadband Wireless Access Working Group <

IEEE Broadband Wireless Access Working Group < Proposal for MAC protocol modification for

MMR Network distributed tunnel connection management

IEEE Broadband Wireless Access Working Group <

IEEE C802.16e-05/401r3

[Mobility Management for Mobile Multi-hop Relay Networks]

Topics for Today. More on Ethernet. Wireless LANs Readings. Topology and Wiring Switched Ethernet Fast Ethernet Gigabit Ethernet. 4.3 to 4.

IEEE Broadband Wireless Access Working Group < Increasing Link Robustness in TG3 Systems

IEEE C802.16a-02/86. IEEE Broadband Wireless Access Working Group <

IEEE abc-01/18r1. IEEE Broadband Wireless Access Working Group <

IEEE Broadband Wireless Access Working Group < Fix broken message flow in HO decision & initiation

Architecture clarification and Coexistence Protocol Chi-Chen Lee, Hung-Lin Chou Computer & Communications Research Labs, ITRI, Taiwan

IEEE C802.16i-06/014r3

IEEE C802.16maint-05/091. IEEE Broadband Wireless Access Working Group <

Chapter 6 Wireless and Mobile Networks. Csci 4211 David H.C. Du

IEEE PHY Overview

EVALUATION OF EDCF MECHANISM FOR QoS IN IEEE WIRELESS NETWORKS

ECE442 Communications Lecture 3. Wireless Local Area Networks

IEEE C802.16h-07/043r1. IEEE Broadband Wireless Access Working Group <

IEEE Broadband Wireless Access Working Group < Evaluation Procedure for MAC Protocols

Mohammad Hossein Manshaei 1393

Page 1 of 1 16-Jan-01

4.3 IEEE Physical Layer IEEE IEEE b IEEE a IEEE g IEEE n IEEE 802.

Mohamed Khedr.

IEEE C802.16e-04/201. Project. IEEE Broadband Wireless Access Working Group <

Advanced Computer Networks WLAN

IEEE Broadband Wireless Access Working Group <

IEEE C802.16d-04/34. IEEE Broadband Wireless Access Working Group <

IEEE C802.16e-04/151r3 Project. IEEE Broadband Wireless Access Working Group <

IEEE MAC Sublayer (Based on IEEE )

Data Integrity in MAC IEEE Presentation Submission Template (Rev. 8)

Expanding the use of CTS-to-Self mechanism to improving broadcasting on IEEE networks

IEEE Broadband Wireless Access Working Group < Handoff SDL charts proposal

Data Submitted Voice: Fax: SungCheol Chang Chulsik Yoon,

802.22b NICT Proposal

IEEE Broadband Wireless Access Working Group < Applicability of IEEE and HIPERLAN/2 for WirelessHUMAN Systems

standard. Acknowledgement: Slides borrowed from Richard Y. Yale

IEEE Broadband Wireless Access Working Group < Ensuring the readability and correctness of the draft IEEE P802.16h/D3.

Data and Computer Communications. Chapter 13 Wireless LANs

Wireless Communications

Impact of IEEE n Operation on IEEE Operation

Wireless LANs. ITS 413 Internet Technologies and Applications

3.1. Introduction to WLAN IEEE

IEEE C802.16j- 07/309. IEEE Broadband Wireless Access Working Group <

IEEE C802.16e-05/242r1. IEEE Broadband Wireless Access Working Group <

ICE 1332/0715 Mobile Computing (Summer, 2008)

Transcription:

Project Title Date Submitted IEEE 82.16 Broadband Wireless Access Working Group <http://ieee82.org/16> Simulation of IEEE 82.16h and IEEE Coexistence (Preliminary Report) 7-1-12 Source(s) John Sydor, Amir Ghasemi Communications Research Centre 371 Carling Avenue Ottawa, Ontario Voice: 613-998-2388 Fax: 613-99-8369 john.sydor@crc.ca Re: Coexistence between IEEE and 82.16h systems Abstract Simulation results on average throughput and packet delay of IEEE and 82.16h systems under various coexistence mechanisms Purpose Notice Release Patent Policy and Procedures To help resolve the coexistence issues between IEEE and 82.16h systems This document has been prepared to assist IEEE 82.16. It is offered as a basis for discussion and is not binding on the contributing individual(s) or organization(s). The material in this document is subject to change in form and content after further study. The contributor(s) reserve(s) the right to add, amend or withdraw material contained herein. The contributor grants a free, irrevocable license to the IEEE to incorporate material contained in this contribution, and any modifications thereof, in the creation of an IEEE Standards publication; to copyright in the IEEE s name any IEEE Standards publication even though it may include portions of this contribution; and at the IEEE s sole discretion to permit others to reproduce in whole or in part the resulting IEEE Standards publication. The contributor also acknowledges and accepts that this contribution may be made public by IEEE 82.16. The contributor is familiar with the IEEE 82.16 Patent Policy and Procedures <http://ieee82.org/16/ipr/patents/policy.html>, including the statement "IEEE standards may include the known use of patent(s), including patent applications, provided the IEEE receives assurance from the patent holder or applicant with respect to patents essential for compliance with both mandatory and optional portions of the standard." Early disclosure to the Working Group of patent information that might be relevant to the standard is essential to reduce the possibility for delays in the development process and increase the likelihood that the draft publication will be approved for publication. Please notify the Chair <mailto:chair@wirelessman.org> as early as possible, in written or electronic form, if patented technology (or technology under patent application) might be incorporated into a draft standard being developed within the IEEE 82.16 Working Group. The Chair will disclose this notification via the IEEE 82.16 web site <http://ieee82.org/16/ipr/patents/notices>. 1

Simulation of IEEE 82.16h and IEEE Coexistence (Preliminary Report) John Sydor and Amir Ghasemi Communications Research Centre Introduction The coexistence of IEEE and IEEE 82.16h systems is of considerable interest to a number of organizations. There is a large likelihood for example, that such systems will have to work on a co-channel basis in the lightly licensed 3.65-3.7 GHz band in the US. Objective The purpose of this simulation is to examine possible coexistence approaches between co-channel and co-located generic IEEE 82.16h and systems; the former system incorporates a TDD/TDMA multiple access control while the latter uses a CSMA/CA approach. The interference scenario will be simplified to lower the complexity of the simulations. We will consider a scenario in which the 82.16h base station and 82.11Y access point are in close proximity to each other and can thus interfere with each other. This includes these station s subscriber terminals. In essence, if either the 82.16h Base Station and its associated subscriber stations and the Access point and its associated subscriber stations transmit at the same time, interference is deemed to occur. All overlaps of simultaneous transmission times are construed as lost transmissions. Coexistence is attempted only by modification of the 82.16h system and different scenarios are investigated, which are detailed in Annex B. The simulation will embody the following general attributes: 1. Both systems will be compared for the same amount of Total Offered Traffic. Uplink traffic will be a fraction (N) of the downlink (specified in Table 3 of Annex A), and this fraction will be fixed for any series of offered traffic. Total Offered Traffic will be the sum of the uplink and downlink offered traffic. 2. Offered traffic will have arrival statistics typical of IP. 3. Of interest to the simulation is the average throughput and delay exhibited by each system as a function of the offered traffic. All systems will be assumed to operate at the same channel bandwidth and modulation as specified in Annex A. IEEE Model The simulation will use a generic model of an IEEE 82.11 CSMA/CA (carrier sense multiple access with collision avoidance) basic access system, where an access point (AP) wishing to transmit data on an idle channel transmits a data burst and then waits for a positive acknowledgement (ACK) burst from the destination. Before an station is to transmit it shall sense the medium to determine if another station is transmitting. The access point shall have a monitoring (clear channel assessment) period to determine channel occupancy. If the medium is determined to be idle, the transmission may proceed. The CSMA/CA basic access scheme mandates that a gap of a minimum specified duration exist between contiguous burst sequences. At the end of a transmission the access point waits a fixed period of time called a Distributed Interframe Space (DIFS) and appends an additional backoff (BO) period. The protocol adopts an exponential backoff scheme (called the Distributed Coordination Function-DCF). At the end of each burst transmission (and DIFS), and prior to the next, the backoff time is uniformly chosen in the range (, cw-1). The value cw is called contention window, and depends on the number of transmissions failed for the burst. At the first transmission attempt, cw is set equal to a value Cwmin called the minimum contention window. After each unsuccessful transmission, cw is doubled, up to a maximum value CWmax. If a retransmission succeeds, cw is reset to CWmin. 2

All the relevant parameters along with their default values used in the simulation may be found in Table 1 of Annex A. IEEE 82.16h Model IEEE 82.16h system employs OFDM PHY whose parameters are listed in Table 2 of Annex A. The initial simulation uses 5ms frames with a 3ms/2ms split for DL and UL sub-frames, respectively. To achieve coexistence between IEEE 82.16h and operating in a co-channel manner, the 82.16h system may implement different coexistence mechanisms. These mechanisms are categorized into different coexistence scenarios as described in Annex B and will be compared through simulations. Traffic Model The two systems are assumed to have the same offered traffic statistics. Moreover, the uplink traffic will be simulated having the same statistics as the downlink traffic, except mean offered traffic on the uplink will be some fraction, N, of the downlink. Packet sizes are assumed to be uniformly distributed in the range [.1xMaxPacketSize,.9xMaxPacketSize] with MaxPacketSize defined in Table 3 of Annex A. The packet inter-arrival time follows exponential distribution with its mean determined by the mean packet size and the average bit-rate of the traffic source. Simulation Setup A packet-level simulation of different scenarios described in Annex B has been implemented. Average throughput and delay for each scenario are obtained through multiple independent iterations of the simulation under that particular scenario. Each iteration of the simulation runs for 1s with a 2s warm-up period to allow systems reach steady state (i.e. data collected during the first 2s is discarded). For each scenario, the offered load is varied in 1kbps increments and each network s throughput and packet delay are recorded. Finally, these values are averaged over multiple independent iterations and the result is plotted versus the offered load. 3

Simulation Results Scenario 1: Baseline Baseline Throughput 5 15 Figure 1. Baseline throughput vs. offered load Baseline Delay 5 15 Figure 2. Baseline delay vs. offered load 4

Scenario 2: LBT LBT Throughput 5 15 Figure 3. LBT throughput vs. offered load LBT Delay 5 15 Figure 4. LBT delay vs. offered load 5

Scenario 3: EQP In order to study the performance of EQP mechanism, simulations were performed under different EQP periods (1/3/6/1/2 frames) while the EQP duration was fixed at 3 frames (15ms). Note that the EQP duration was chosen according to the minimum EQP duration requirement for a 5MHz channel as specified in Table h1 of [2]. Throughput analysis for different EQP periods: EQP Throughput (EQPperiod = 1, EQPduration = 3) 5 15 Figure 5. EQP throughput vs. offered load (EQPperiod = 1, EQPduration = 3) 6

EQP Throughput (EQPperiod = 3, EQPduration = 3) 5 15 Figure 6. EQP throughput vs. offered load (EQPperiod = 3, EQPduration = 3) EQP Throughput (EQPperiod = 6, EQPduration = 3) 5 15 Figure 7. EQP throughput vs. offered load (EQPperiod = 6, EQPduration = 3) 7

EQP Throughput (EQPperiod = 1, EQPduration = 3) 5 15 Figure 8. EQP throughput vs. offered load (EQPperiod = 1, EQPduration = 3) EQP Throughput (EQPperiod = 2, EQPduration = 3) 5 15 Figure 9. EQP throughput vs. offered load (EQPperiod = 2, EQPduration = 3) 8

Delay analysis for different EQP periods: EQP Delay (EQPperiod = 1, EQPduration = 3) 5 15 Figure 1. EQP delay vs. offered load (EQPperiod = 1, EQPduration = 3) EQP Delay (EQPperiod = 3, EQPduration = 3) 5 15 Figure 11. EQP delay vs. offered load (EQPperiod = 3, EQPduration = 3) 9

EQP Delay (EQPperiod = 6, EQPduration = 3) 5 15 Figure 12. EQP delay vs. offered load (EQPperiod = 6, EQPduration = 3) EQP Delay (EQPperiod = 1, EQPduration = 3) 5 15 Figure 13. EQP delay vs. offered load (EQPperiod = 1, EQPduration = 3) 1

EQP Delay (EQPperiod = 2, EQPduration = 3) 5 15 Figure 14. EQP delay vs. offered load (EQPperiod = 2, EQPduration = 3) 11

Scenario 4: LBT + EQP As in the case of EQP, simulations of this scenario were performed under different EQP periods (1/3/6/1/2 frames) while EQP duration was fixed at 3 frames (15ms). Throughput analysis for different EQP periods: LBT + EQP Throughput (EQPperiod = 1, EQPduration = 3) 5 15 Figure 15. LBT + EQP throughput vs. offered load (EQPperiod = 1, EQPduration = 3) 12

LBT + EQP Throughput (EQPperiod = 3, EQPduration = 3) 5 15 Figure 16. LBT + EQP throughput vs. offered load (EQPperiod = 3, EQPduration = 3) LBT + EQP Throughput (EQPperiod = 6, EQPduration = 3) 5 15 Figure 17. LBT + EQP throughput vs. offered load (EQPperiod = 6, EQPduration = 3) 13

LBT + EQP Throughput (EQPperiod = 1, EQPduration = 3) 5 15 Figure 18. LBT + EQP throughput vs. offered load (EQPperiod = 1, EQPduration = 3) LBT + EQP Throughput (EQPperiod = 2, EQPduration = 3) 5 15 Figure 19. LBT + EQP throughput vs. offered load (EQPperiod = 2, EQPduration = 3) 14

Delay analysis for different EQP periods: LBT + EQP Delay (EQPperiod = 1, EQPduration = 3) 5 15 Figure 2. LBT + EQP delay vs. offered load (EQPperiod = 1, EQPduration = 3) LBT + EQP Delay (EQPperiod = 3, EQPduration = 3) 5 15 Figure 21. LBT + EQP delay vs. offered load (EQPperiod = 3, EQPduration = 3) 15

LBT + EQP Delay (EQPperiod = 6, EQPduration = 3) 5 15 Figure 22. LBT + EQP delay vs. offered load (EQPperiod = 6, EQPduration = 3) LBT + EQP Delay (EQPperiod = 1, EQPduration = 3) 5 15 Figure 23. LBT + EQP delay vs. offered load (EQPperiod = 1, EQPduration = 3) 16

LBT + EQP Delay (EQPperiod = 2, EQPduration = 3) 5 15 Figure 24. LBT + EQP delay vs. offered load (EQPperiod = 2, EQPduration = 3) Scenario 5: EQPv2 This scenario is currently being coded and simulation results will be added as soon as they become available. 17

Annex A: Simulation parameters The parameters used for configuration of the and 82.16h systems have been summarized in Tables 1 and 2, respectively. parameters are in line with those specified in [1] for a 5 MHz channel. 82.16h system employs OFDM PHY with 5ms frames (3ms DL, 2ms UL). MAC Protocol CSMA/CA Channel Bandwidth 5 MHz N FFT 64 OFDM Sub-carriers 52 Data Sub-carriers 48 OFDM Symbol Duration 16 µs (T FFT + T GI) Raw Bit-rate 3. Mbps (QPSK 1/2) Basic Rate 1.5 Mbps (BPSK 1/2) Slot Time 21 µs SIFS 64 µs Preamble Length 64 µs CWmin 15 CWmax 123 RTS/CTS Disabled Table 1. parameters MAC Protocol TDMA TDD Channel Bandwidth 5 MHz n: Oversampling Factor 144/125 N FFT 256 OFDM Sub-carriers Data Sub-carriers 192 Cyclic Prefix 1/4 OFDM Symbol Duration 55.5 µs (T FFT + T CP) Raw Bit-rate 3.3 Mbps (QPSK 1/2) Frame Duration 5 ms DL Sub-frame Duration 3 ms UL Sub-frame Duration 2 ms EQP Duration 3 frames (15 ms) EQP Period Varied from 1 to 2 frames TTG 1 PS RTG 1 PS Table 2. 82.16h parameters Transport Protocol UDP 18

Offered Load DL/UL Load Ratio 6/4 Varied from 1 kbps (lightly loaded) to 2. Mbps (overloaded) Packet Inter-arrival Time MaxPacketSize PktSizeLowerBound PktSizeUpperBound Packet Size Exponentially distributed 15 Bytes.1 * MaxPacketSize.9 * MaxPacketSize Uniformly distributed between PktSizeLowerBound and PktSizeUpperBound Table 3. Traffic parameters Annex B: Simulation scenarios for 82.16h and coexistence This is a summary of various scenarios implemented in the first round of simulations. In all simulations we assume that systems are collocated therefore, any interference results in collision. Each network s parameters, as well as the traffic model are as described in 19

the Annex A. Scenario 1: Baseline This scenario assumes generic 82.11 and 82.16 systems without implementing any additional coexistence mechanisms and will serve as a benchmark against which other mechanisms will be evaluated. Scenario 2: LBT In this scenario, 82.16h system employs Listen-Before-Talk as detailed in Clause 6.4.3.5 of [2] by undertaking clear channel assessment before embarking on any transmission. Data that is deferred from transmission because of channel activity is buffered for the next transmission. Otherwise the system behaves in the same manner as normal 82.16h system. Note that LBT is applied independently to both DL and UL sub-frames as shown in the revised Figure h7 of [2]. The uplink monitoring period takes place in a regular manner at the Transmit/Receive gap of the 82.16h TTD cycle. Scenario 3: EQP This is the implementation of Extended-Quiet-Period concept for the 82.16h system, as described in Clause 6.4.3.3 of [2]. The EQPduration (integer number of quiet.16 frames) and the EQPperiod (integer number of active.16 frames before going into quiet period again) will be varied to quantify their effect on the average throughput and delay of each network. Scenario 4: LBT + EQP This is a combination of Scenarios 2 and 3 where EQP is performed periodically as in Scenario 3 with LBT being applied to active (non-quiet) frames of 82.16h system. Scenario 5: EQPv2 This is a variation on the EQP concept of Scenario 3 where there is 16ms of continuous activity (3x5ms.16 frames + 1ms) from 82.16h side followed by a quiet 4ms period for the system. The first 16ms are fully populated using filling bytes to prevent s transmission. References [1] P82.11-REVma/D8., Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) specifications, (Draft Revision of IEEE Std 82.11), Sept. 6. [2] P. Piggin, C82.16h-6/125r1, Consolidation of UCP Uncoordinated Coexistence Protocol. 2