IEEE Broadband Wireless Access Working Group <http://ieee802.org/16>

Similar documents
IEEE C802.16maint-06/055. IEEE Broadband Wireless Access Working Group <

Message definition to support MS network entry in centralized allocation model

[Mobility Management for Mobile Multi-hop Relay Networks]

Nokia Fax:

IEEE C802.16e-04/446r2. IEEE Broadband Wireless Access Working Group <

IEEE C802.16e-318. IEEE Broadband Wireless Access Working Group <

IEEE Broadband Wireless Access Working Group < MSS s buffer capability negotiation for DL H-ARQ operation

IEEE Broadband Wireless Access Working Group <

Round Trip Delay Optimization

Architecture clarification and Coexistence Protocol Chi-Chen Lee, Hung-Lin Chou Computer & Communications Research Labs, ITRI, Taiwan

IEEE Broadband Wireless Access Working Group < HO consideration in PKMv2 security. Voice: Seokheon Cho

IEEE C802.16e-04/195r1. IEEE Broadband Wireless Access Working Group <

IEEE Broadband Wireless Access Working Group < HO consideration in PKMv2 security

IEEE C802.16e-05/196r1. IEEE Broadband Wireless Access Working Group <

IEEE Broadband Wireless Access Working Group < Fix for Sleep Mode Add/Remove CIDs from Power Saving Class ID

IEEE C802.16e-04/151r3 Project. IEEE Broadband Wireless Access Working Group <

IEEE Broadband Wireless Access Working Group <

IEEE C802.16e-04/472. IEEE Broadband Wireless Access Working Group <

IEEE Broadband Wireless Access Working Group <

IEEE Broadband Wireless Access Working Group <

IEEE C802.16e-05/401r3

IEEE Broadband Wireless Access Working Group <

IEEE C802.16e-05/401r2

IEEE C802.16e-05/192r1. IEEE Broadband Wireless Access Working Group <

IEEE802.16maint-04/71r3

IEEE C802.16e-04/10. IEEE Broadband Wireless Access Working Group <

IEEE C802.16e-04/67r1. IEEE Broadband Wireless Access Working Group <

Relay Support for Distributed Scheduling and its Bandwidth Request/Allocation Mechanism

IEEE C802.16e-04/201. Project. IEEE Broadband Wireless Access Working Group <

IEEE Broadband Wireless Access Working Group <

Sleep Mode and Idle Mode Operations for IEEE j

IEEE Broadband Wireless Access Working Group <

IEEE C802.16a-02/14

IEEE Broadband Wireless Access Working Group < WirelessMAN coexistence function primitives consolidation

IEEE C802.16d-03/45. IEEE Broadband Wireless Access Working Group <

A General Frame Structure for IEEE802.16j Relaying Transmission

IEEE Broadband Wireless Access Working Group < Early transmission of higher layer packets in the idle mode

IEEE /15. IEEE Broadband Wireless Access Working Group < Title Interpretation of IEEE Standard 802.

IEEE C802.16h-06/063r1. IEEE Broadband Wireless Access Working Group <

IEEE Broadband Wireless Access Working Group < To prevent the loss of the PDUs at the serving BS during MAC hand-over.

IEEE Broadband Wireless Access Working Group < Procedures for inter-system communication over the air

IEEE C802.16e-05/242r1. IEEE Broadband Wireless Access Working Group <

SS Initialization Overview

IEEE Broadband Wireless Access Working Group < Corrections for the 3 Way SA-TEK Exchange

message reported by SSs and share DB updating for ND

A response to a Call for Technical Proposal, 06_027.pdf

IEEE C802.16j-07/209r3. IEEE Broadband Wireless Access Working Group <

IEEE Broadband Wireless Access Working Group < Changes in Definition of Data Delivery Services

IEEE Broadband Wireless Access Working Group < message reported by SSs and share DB updating for neighbor discovery

IEEE Broadband Wireless Access Working Group < The document contains ARQ Proposal for /4 MAC

Data Submitted Voice: Fax: SungCheol Chang Chulsik Yoon,

IEEE Broadband Wireless Access Working Group < MIB II Integration and MIB II Table

IEEE Broadband Wireless Access Working Group < Fix broken message flow in HO decision & initiation

IEEE Broadband Wireless Access Working Group < Handoff SDL charts proposal

corrected PDF IEEE C802.16g-06/011r2

IEEE C802.16h-07/017. IEEE Broadband Wireless Access Working Group <

IEEE Broadband Wireless Access Working Group < IEEE Working Group Letter Ballot #24, on P802.

IEEE C802.16h-06/114r3. IEEE Broadband Wireless Access Working Group <

IEEE Broadband Wireless Access Working Group <

IEEE C802.16e-03/20r1. IEEE Broadband Wireless Access Working Group <

IEEE C802.16maint-08/064r4

IEEE C802.16i-06/014r3

IEEE Broadband Wireless Access Working Group < Accept the proposed specification changes on IEEE P802.

IEEE Broadband Wireless Access Working Group < Proposal for MAC protocol modification for

IEEE C802.16j- 07/309. IEEE Broadband Wireless Access Working Group <

IEEE Broadband Wireless Access Working Group <

IEEE C802.16maint-08/064r3

Page 1 of 1 16-Jan-01

MMR Network distributed tunnel connection management

IEEE Broadband Wireless Access Working Group <

IEEE Broadband Wireless Access Working Group <

IEEE Presentation Submission Template (Rev. 8.3)

IEEE Broadband Wireless Access Working Group <

IEEE C802.16e-05/115r1. IEEE Broadband Wireless Access Working Group <

MMR Network centralized tunnel connection management

IEEE C802.16maint-05/091r1. IEEE Broadband Wireless Access Working Group <

IEEE Broadband Wireless Access Working Group < MBRA (Multicast & Broadcast Rekeying Algorithm) for PKMv2

IEEE C802.16e-03/71r2. IEEE Broadband Wireless Access Working Group <

IEEE C802.16maint-06/083r3. IEEE e Broadband Wireless Access Working Group <

IEEE Broadband Wireless Access Working Group < Increasing Link Robustness in TG3 Systems

Data Integrity in MAC IEEE Presentation Submission Template (Rev. 8)

Initial PHY Layer System Proposal for Sub 11 GHz BWA

IEEE C802.16h-05/021r2

IEEE C802.16h-07/043r1. IEEE Broadband Wireless Access Working Group <

Considerations for UL MAP Overhead Reduction

Simulating coexistence between y and h systems in the 3.65 GHz band An amendment for e

IEEE Broadband Wireless Access Working Group < Privacy key management for BSs and BSISs in LE Systems

IEEE Broadband Wireless Access Working Group <

IEEE C802.16maint-05/091. IEEE Broadband Wireless Access Working Group <

IEEE Broadband Wireless Access Working Group < Enhancement of the MBRA for Adaptation to the PKMv2

IEEE Broadband Wireless Access Working Group < Storage of identification information and Coexistence Protocol

IEEE abc-01/19. IEEE Broadband Wireless Access Working Group <

IEEE Broadband Wireless Access Working Group < Fixing mappings between primitive functions and NCMS services

IEEE abc-01/18r1. IEEE Broadband Wireless Access Working Group <

C802.16maint-06/018

IEEE c-00/11. IEEE Broadband Wireless Access Working Group <

IEEE Broadband Wireless Access Working Group < Evaluation Procedure for MAC Protocols

Evaluation Procedure for MAC Protocols

IEEE Broadband Wireless Access Working Group < Huawei LB26b, Working Group Letter Ballot on P802.

BW-REQ channel design recommendations for IEEE m

Transcription:

Project Title Date Submitted IEEE 802.16 Broadband Wireless Access Working Group <http://ieee802.org/16> A new method to enhance the network entry and re-entry procedures in PMP mode 2004-11-02 Source(s) Chi-Chen Lee Tzu- Ming Lin Yu-Ren Yang Industrial Technology Research Institute, Computer and Communications Research Labs, Taiwan Bldg. 11, 195 Sec. 4, Chung Hsing Rd. Chutung, HsinChu, Taiwan 310, R.O.C. Voice: 886-3-5914579 Fax: 886-3-5829733 mailto: jjlee@itri.org.tw mailto: TMLin@itri.org.tw mailto: yryang@itri.org.tw Re: Abstract Purpose Notice Release Patent Policy and Procedures IEEE P802.16e/D5-2004 This contribution proposes a new method to enhance the network entry and re-entry procedures in PMP mode. The purpose of this document is to enhance the network entry and re-entry procedures. This document has been prepared to assist IEEE 802.16. It is offered as a basis for discussion and is not binding on the contributing individual(s) or organization(s). The material in this document is subject to change in form and content after further study. The contributor(s) reserve(s) the right to add, amend or withdraw material contained herein. The contributor grants a free, irrevocable license to the IEEE to incorporate material contained in this contribution, and any modifications thereof, in the creation of an IEEE Standards publication; to copyright in the IEEE s name any IEEE Standards publication even though it may include portions of this contribution; and at the IEEE s sole discretion to permit others to reproduce in whole or in part the resulting IEEE Standards publication. The contributor also acknowledges and accepts that this contribution may be made public by IEEE 802.16. The contributor is familiar with the IEEE 802.16 Patent Policy and Procedures <http://ieee802.org/16/ipr/patents/policy.html>, including the statement "IEEE standards may include the known use of patent(s), including patent applications, provided the IEEE receives assurance from the patent holder or applicant with respect to patents essential for compliance with both mandatory and optional portions of the standard." Early disclosure to the Working Group of patent information that might be relevant to the standard is essential to reduce the possibility for delays in the development process and increase the likelihood that the draft publication will be approved for publication. Please notify the Chair <mailto:chair@wirelessman.org> as early as possible, in written or electronic form, if patented technology (or technology under patent application) might be incorporated into a draft standard being developed within the IEEE 802.16 Working Group. The Chair will disclose this notification via the IEEE 802.16 web site <http://ieee802.org/16/ipr/patents/notices>. 0

A new method to enhance the network entry and re-entry procedures in PMP mode Chi-Chen Lee, Tzu-Ming Lin, Yu-Ren Yang ITRI Motivation This document proposes a new method to enhance the network entry and re-entry procedures in PMP mode. Background The initial network entry and network re-entry procedures are divided into several phases. Each phase can be treated as an independent signaling procedure and consists of exchange of MAC management messages between the SS and the BS. Due to the BS has no idea when the SS will transmit the requests and how much bandwidth these requests will take up, the BS will passively wait for the requests, e.g. SBC-REQ, from the SS during the network entry procedures. The SS, therefore, will send a bandwidth request in the contention period to make the bandwidth request before transmitting any management message, e.g. SBC-REQ. The SS sends the request after a successful contention, otherwise it retries again if no data grant has been given within T16. This design is simple but not efficient in terms of radio resource usage and power consumption, especially when the network is in a high load condition. When the network load is high, the contention procedures will introduce significant delay and power consumption because of high collision probability prior to transmission of MAC management messages in each phase. The possible management message handshaking flows of the entire network entry procedures are depicted in Figure 1. The corresponding phases of each group of management message handshaking, which are defined in section 6.3.9, are denoted from [a] to [j]. In this scenario, the SS will produce bandwidth request at least fourteen times (Some messages, e.g. RNG-REQ, may be issued more than once). One DSA-REQ can only create one service flow, and therefore there are two DSA-REQs in procedure [j]. The contention process may take time due to the SS will defer a number of TOs before transmitting the BW request in the mandatory method of the contention resolution. If the initial backoff window is large and the collision probability is high the contention process may introduce significant delay. Figure 2 and Figure 3 demonstrate the simulation results of the average total contention delay during entire network entry phases under different scenarios in OFDM PHY. The definition of contention delay (see Figure 4) is the number of frames used for contention process and transmission of UL data. In Figure 4, the contention backoff procedure is only applied to the non-ofdma PHY since there is no backoff in OFDMA BW request. Note that the total contention delay during entire network entry only takes into consideration of the time spent on contention process and does not consider those processing time of the each phase, e.g. the processing time of SS s basic capability negotiation procedure. The item Provisioned (13,4) in Figure 2 and Figure 3 means the last phase Set up connections of network entry is to set up a provisioned service which shall be started by the BS. The number 13 is the total number of request messages shall be sent by the SS and 4 is the value of initial backoff window. Similarly, The item Dynamic (13,4) in Figure 2 and Figure 3 means the last phase Set up connections of network entry is to set up a dynamic service which shall be started by the SS. Note that we do not count the request number during the ranging procedure in our simulation since it is not a constant value. In other words, we only count the request messages issued by the SS from [d] to [j] in Figure 1. Table 1 1

[ a, b ] [ c ] SS BS DHCP Server [RFC 2131] Time Server [RFC 868] DL-MAP, DCD, UCD UL-MAP RNG-REQ RNG-RSP 1 <Contention> (1) random backoff (2) transmit BW request (3) wait for BW allocation TFTP Server [RFC 783] [ d ] SBC-REQ SBC-RSP PKM-REQ [Auth Info] 2 3 Request interval [ e ] [ f ] PKM-REQ [Auth Req] PKM-RSP [Auth Reply] PKM-REQ [Key Req] PKM-RSP [Key Reply] REG-REQ REG-RSP 4 5 6 a) Scan for DL channel and establish synchronization with the BS b) Obtain transmit parameters (from UCD message) c) Perform ranging d) Negotiate basic capabilities e) Authorize SS and perform key exchange f) Perform registration g) Establish IP connectivity h) Establish time of day i) Transfer operational parameters j) Set up connections (g)-(i): for managed SS only DHCP discover 7 DHCP offer [ g ] DHCP request 8 DHCP response [ h ] Time of day request (IP) 9 Time of day reponse (IP) 10 TFTP Configuration File read request (IP) [ i ] Configuration File data (IP) ACK 11 TFT-CPLT 12 TFT-RSP [ j ] DSA-REQ (UL) 13 DSA-RSP DSA-ACK DSA-REQ (DL) DSA RSP 14 2 < Figure 1 >

Average total contention delay in frames (in 10ms) Average Total Contention Delay during network entry in OFDM 500 400 300 200 100 0 10% 20% 30% 40% Provisioned (1 Provisioned (1 Dynamic (15,4 Dynamic (15,5 collosion probability <Figure 2 Average total contention latency during network entry (not include the ranging procedure) using REQ Region Full with 5% of UL OFDM symbols for contention, 10ms frame duration> Average total contention delay in frames (in 10ms) Average Total Contention Delay during network entry in OFDM 300 250 200 150 100 50 0 10% 20% 30% 40% Provisioned (1 Provisioned (1 Dynamic (15,4 Dynamic (15,5 collosion probability <Figure 3 Average total contention latency during network entry (not include the ranging procedure) using REQ Region Full with 10% of UL OFDM symbols for contention, 10ms frame duration> summarizes the assumptions of the simulation which is based on [1] and [2]. For the simplicity, we use the fixed collision probability to represent the network load during the contention process. The simulation is mainly to 3

demonstrate the additional delay that is introduced by the contention process during the network entry. As show in Figure 2 and Figure 3, the average total contention delay accumulated in the network entry procedures increases as the collision probability or the initial backoff window increases. The worst case in Figure 1 indicates that the SS may spend more than four seconds on contention process during the network entry procedure. This additional delay may not be acceptable for the user under the mobile operation. Moreover, the simulation does not consider the impact of the contention on the existing traffic. Successful: Contention Delay (T CD) DL UL DL UL DL UL DL UL DL UL DL UL DL UL Backoff interval (TB) Send BW request after T?? n Tdeferring? 1? k TTOs? CD B R Response interval = n frames (TR)? 1?? 1?, n? num of collosions Send data Collision: T CD? TB R? 1? T? 1 Contention Delay (T CD) DL UL DL UL DL UL DL UL DL UL DL UL DL UL Backoff interval Send BW request after deferring k TOs Response interval = n frames No allocation Backoff interval Send BW request after deferred k TOs <Figure 4> Assumptions value UL channel bandwidth 3 MHz FFT 256-pint FFT Frame duration 10ms Response interval 20ms OFDM symbols per UL subframe 120 Subchannelization No subchannelization Contention method REQ Region-Full Number of OFDM symbols per 2 contention slot <Table 1 Simulation assumptions> In cellular network, the BS provides a power efficient scheme and assigns a dedicated channel to the MS for sending signaling data so that the MS can avoid contention during the network entry. However, the contention scheme in IEEE 802.16 may introduce significant delay and power consumption. Thus, we propose a new method to ease off the problem. For comparison, we will refer to the proposed method as invited network entry/re-entry. 4

Invited network entry/re-entry In IEEE P802.16e/D5, the Invited Initial Ranging (defined in 6.3.9.5) and the non-contention based MSS Initial Ranging opportunity (defined in 6.3.20.4) are designed for the MSS to use the unsolicited bandwidth allocation to send the RNG-REQ. This mechanism can only apply on the ranging procedures because the size of RNG-REQ can be predicted by the BS during initial ranging. For other management messages such as SBC-REQ are variablelength, the BS cannot predict the actual bandwidth of each management message. Furthermore, the BS cannot predict when the SS are prepared to send the next management message. Invited Network Entry TLV To solve the problems described above, we propose a new type of TLV named Invited Network Entry TLV which is two-byte long and described as follows: (1) Invited Network Entry Interval: The first byte of this TLV is named Invited Network Entry Interval which is in units of frames and indicates the interval in frames between the two successive allocations of unsolicited bandwidth request opportunity. (2) Invited BW Request Opportunity Count: The second byte of this TLV is named Invited BW Request Opportunity Count which is in units of BW request transmission opportunities (TOs) and indicates the expected total number of the unsolicited TOs for bandwidth request during the network entry or re-entry. This TLV can be included in RNG-REQ/RNG-RSP, SBC-REQ/RSP or REG-REQ/REG-RSP. The SS includes this TLV to indicate the expected interval, which is calculated by the SS, between the two successive unsolicited BW request opportunities. This interval may be the longest interval among the request intervals indicated in Figure 1. During the request interval, the SS may send a management message, receive a response, process the response message and prepare the next management message to be sent. The BS can reject the request from the MSS by setting all bits to zeros, or it can modify the values based on its policy by including this TLV in the response message. In the case of RNG-REQ, this TLV should be included in the RNG-REQ which is transmitted in the invited initial ranging interval since the size of TO for RNG-REQ may be fixed. Invited network entry/re-entry also makes no difference of the procedure between OFDMA PHY and other PHYs. The BS should start to issue the invited BW request opportunities according to the Invited Network Entry TLV after the last RNG-RSP. The BS will stop to issue the invited BW request opportunities once the Invited BW request opportunity retries exhaust. Once the invited BW request opportunities are exhausted and the network entry or re-entry is not finished yet, the SS should send BW request in the contention period. For example, if the SS finds out that the longest request interval is located between the PKM-REQ (5) and REG- REQ (6) (see Figure 1) and its value is 200ms, it will set the Invited Network Entry Interval as 0x14 in the case of 10ms frame duration. Additionally, the SS will estimate how many phases it will perform during the network entry or re-entry and, therefore, can obtain the minimum value of invited BW request opportunities to complete the network entry or re-entry. For example, the SS may set the Invited BW Request Opportunity Count as 0x10 for the scenario described in Figure 1. The additional two bandwidth opportunities can make up for the lost of the invited BW request opportunities. New UL_Extended_IE Invited_Network_Entry_IE() for SCa, OFDM and OFDMA Due to the Invited BW Request Opportunities which are only for transmitting BW requests, it is not bandwidth efficient if the BS creates a separate UL-MAP_IE for allocating each BW Request Opportunity. Thus, for bandwidth efficiency, we suggest that the BS shall collect those Invited BW Request Opportunities scheduled in the same frame together and place those request opportunities in an UL_Extended_IE (UIUC = 15) named Invited_Network_Entry_IE() with broadcast CID 0xFFFF. At last we provide the comparison between the current method and the proposed method. As depicted in Figure 5, the proposed network entry procedure is simple and more energy efficiency. The BS schedules the invited BW request opportunities according to the Invited Network Entry TLVs. And the SS just waits for the invited BW request opportunities from the BS. The impact of the network entry on the existing traffic is also diminished since the MSS will not send the BW request in the contention period. Moreover, the Invited Network Entry Interval makes the entire network entry procedure predictable. It is possible that the proposed invited network entry spends 5

less time than the current network process by adjusting the Invited Network Entry Interval smaller than the maximum request interval if the maximum request interval is much large than the rest of the request intervals. We provide a simple estimation of the total network entry processing time. The current network entry procedure after ranging consists of contention latency and processing time (see Figure 5). According to Figure 1, there are 14 times of processing time and 13 times of contention latency. Thus, if we assume that the average processing time is 150ms and the total contention latency is 1.5 seconds (from Figure 2), the total network entry processing time excluding ranging procedure is 3.6 (14*0.15+1.5) seconds. The proposed network entry procedure comprises several Invited Network Entry Intervals (see Figure 5). According to Figure 1, there are 13 times of Invited Network Entry Interval and if the value of the interval is the maximum value of the interval, say, 300ms, the total network entry processing time excluding ranging procedure is 3.9 (13*0.3) seconds. However, if the SS finds that only two intervals are longer than 200ms and the rest of the intervals are smaller than 200ms, it can choose 200ms as the value of Invited Network Entry Interval. Therefore, the result will be 3 (11*0.2+2*0.4) seconds which is even less than the current method. <Current network entry procedure> BS MSS RNG-REQ (Invited) RNG-RSP BW Req. or BW code BW allocation SBC-REQ SBC-RSP BW Req. or BW code BW allocation PKM-REQ Processing Ttime INE Contention latency T INE <Proposed network entry procedure> Processing time BS RNG -REQ (Invited Network Entry TLV) MSS RNG-RSP (Invited Network Entry TLV) Unicast BW request opportunity BW allocation T INE SBC-REQ BW Req. Unicast BW request opportunity SBC-RSP BW allocation BW Req. PKM-REQ Unicast BW request opportunity BW Req. BW allocation = Invited Network Entry Interval T INE <Figure 5> Proposed Text changes 6.3.20.4 Network entry/re-entry [Add the following text under section 6.3.20.4:] 6

6.3.20.4.1 Invited network entry/re-entry Invited network entry/re-entry allows the MSS to issue non-contention BW request for sending management messages, e.g. SBC-REQ, in each phase of the network entry/re-entry by allocating the MSS the invited unicast BW request opportunity periodically. For the MSS that support invited network entry/re-entry may include the Invited Network Entry TLV (see 11.1.8) in the RNG-REQ, SBC-REQ and REG-REQ to ask for the unsolicited BW request opportunities during the network entry/re-entry. In the Invited Network Entry TLV, the MSS needs to specify the Invited Network Entry Interval, in units of frames, and Invited BW Request Opportunity Count, in units of BW request transmission opportunities (TOs) (see 11.1.8). The BS may reject the requested value by setting all this bits to zeros, or it can modify the values based on its policy. For network re-entry, the Target BS may place the Invited Network Entry TLV and HO Process Optimization TLV in the RNG-RSP message, so that the MSS can utilize the invited BW request opportunities to perform the not omitted re-entry procedures. If the values in Invited Network Entry TLV returned from the BS are not set to zeros, the MSS should wait the invited BW request opportunities and make BW requests for transmitting the management messages during the network entry until the Invited BW Request Opportunity Count is exhausted. The SS should send BW request in the contention period if the invited BW request opportunities are exhausted and the network entry or re-entry is not completed. The BS should start to issue the invited BW request opportunities according to the invited network entry TLV after transmitting the last RNG-RSP with success status or after transmitting other response management message. For bandwidth efficiency the BS shall collect those invited BW request opportunities scheduled in the same frame together and places those request opportunities in an PHY specific UL_Extended_IE (UIUC = 15) named Invited_Network_Entry_IE() (see 8.2.1.9.3.7, 8.3.6.3.10 and 8.4.5.4.9). The MSS should not issue contention BW requests unless the Invited BW Request Opportunity Count is exhausted. The BS should schedule the invited BW request opportunity on time. The BS may stop to schedule the Invited BW request opportunity if the invited retries count exhausted. (see Figure 130j, Figure 130k and Figure 130l). The ability of invited network entry is optional for the MSS and mandatory for the BS. 7

Wait for invited network entry/re-entry request invited network entry TLV Yes Reject MSS's request? No Set invited network entry TLV to zeros and send it back to the MSS Modify invited network entry TLV and send it back to the MSS Add MSS to poll list for future maps Wait for invited network entry/re-entry request Wait for invited network entry/re-entry request Figure 130j Invited Network Entry BS 8

Polled Invited Network Entry Poll issued BW request received in contention slot BW request not received in allocated slot BW request received in allocated slot Stop Increment Invited Network Entry Retries Clear Invited Network Entry Retries Yes Invited Network Entry Retries exhausted? N o Increment the Invited BW Request Opportunity Count Yes Invited BW Request Opportunity Count exhausted? N o Stop Stop Polled Invited Network Entry Figure 130k Invited Network Entry, Polled Phase BS 9

*T30: its length should equal to Invited Network Entry Interval of the MSS Wait for Invited BW Request Opportunity Timeout T30 Invited BW Request Opportunity Increment Invited Network Entry Retries Clear Invited Network Entry Retries Yes Invited Network Entry Retries exhausted? N o Increment the Invited BW Request Opportunity Count Stop Wait for Invited BW Request Opportunity Yes Invited BW Request Opportunity Count exhausted? N o Stop Wait for Invited BW Request Opportunity Figure 130l Invited Network Entry, Polled Phase MSS 8.2.1.9.3 UL-MAP IE formats [Add the following text under section 8.2.1.9.3:] 8.2.1.9.3.7 Invited network entry Information Element An invited network entry IE may be place in a UL_MAP message by a BS to provide a group of MSSs with contentionless BW request opportunities. The value of the subcode assigned to this function is 5. The CID value in the UL-MAP_IE() shall be set to 0xFFFF. The CID value in the extended IE should be the Basic CID of the MSS. The format of the extended IE is presented in Table 207a. Table 207a invited network entry IE format Syntax Size Notes Invited_Network_Entry_IE(){ Subcode 4 bits Invited_network_entry = 0x05 Length 4 bits Number of CIDs carried in this extended IE 10

For(i=0;i<Length;i++){ CID(i) 16 bits Basic CID of MSS } 8.3.6.3 UL-MAP IE format [Add the following text under section 8.3.6.3:] 8.3.6.3.10 Invited network entry Information Element An invited network entry IE may be place in a UL_MAP message by a BS to provide a group of MSSs with contentionless BW request opportunities. The value of the extended UIUC assigned to this function is 4. The CID value in the UL-MAP_IE() shall be set to 0xFFFF. The CID value in the extended IE should be the Basic CID of the MSS. The format of the extended IE is presented in Table 253a. Table 253a invited network entry IE format Syntax Size Notes Invited_Network_Entry_IE(){ Extended UIUC 4 bits Invited_network_entry = 0x04 Length 4 bits Number of CIDs carried in this extended IE For(i=0;i<Length;i++){ CID(i) 16 bits Basic CID of MSS } 8.4.5.4 UL-MAP IE format [Insert the following text under section 8.4.5.4 and modify the numbers of relative sections:] 8.4.5.4.9 Invited network entry Information Element An invited network entry IE may be place in a UL_MAP message by a BS to provide a group of MSSs with contentionless BW request opportunities. The value of the extended UIUC assigned to this function is 4. The CID value in the UL-MAP_IE() shall be set to 0xFFFF. The CID value in the extended IE should be the Basic CID of the MSS. The format of the extended IE is presented in Table 253a. 11

Table 295a invited network entry IE format Syntax Size Notes Invited_Network_Entry_IE(){ Extended UIUC 4 bits Invited_network_entry = 0x04 Length 4 bits Number of CIDs carried in this extended IE For(i=0;i<Length;i++){ CID(i) 16 bits Basic CID of MSS } 11.1 Common encodings [Change the contents of Table 346 as indicated:] Table 346 Type values for common TLV encodings Type Name 149 HMAC tuple 148 MAC version encoding 147 Current transmit power 146 Downlink service flow 145 Uplink service flow 173 Invited Network Entry 144 Vendor ID encoding 143 Vendor-specific information [Insert the following section after 11.1.7 MOB-NBR-ADV Message Encodings:] 11.1.8 Invited Network Entry Encodings This field defines the parameters for the invited network entry or re-entry procedures. This TLV can be included in RNG-REQ/RNG-RSP, SBC-REQ/RSP or REG-REQ/REG-RSP. The SS includes this TLV to indicate the expected interval, which is calculated by the MSS, between the two successive unsolicited BW request opportunities. Additionally, the SS will estimate how many phases it will perform during the network entry or reentry and, therefore, can obtain the minimum value of invited BW request opportunity count to complete the network entry or re-entry. The BS may reject the request from the MSS by setting all bits to zeros, or it can modify the values based on its policy by including this TLV in the response message. In the case of RNG-REQ, this TLV should be included in the RNG-REQ which is transmitted in the invited initial ranging interval since the size of TO for RNG-REQ is fixed. 12

Type Length Value Scope 173 2 Bit #0 - #7: Invited Network Entry Interval, in units of frames Bit #8 - #15: Invited BW Request Opportunity Count, in units of BW request transmission opportunities (TOs) RNG-REQ, RNG-RSP, SBC-REQ, SBC-RSP, REQ-REQ, REG-RSP References [1] Jerry Krinock et al., Contention Schemes For OFDM Mode A L, IEEE C802.16a-02/12, Jan., 2002. [2] Jerry Krinock et al., Supplement to Contention Schemes For OFDM Mode A L, IEEE C802.16a-02/14, Jan., 2002. 13