Adviser : 吳和庭教授 Speaker : 尹培華 1 適用於 EPON 和 WIMAX 802.16...
Preview:
Citation preview
- Slide 1
- Adviser : Speaker : 1 EPON WIMAX 802.16 QOS Dynamic Bandwidth
Allocation
- Slide 2
- Outline 2 Motivation Architecture Research Method Challenge
Issues Future Work Q&A
- Slide 3
- 3 Motivation
- Slide 4
- 4 EPON WIMAX WIMAX EPON : EPON WIMAX QOS
- Slide 5
- 5 Architecture
- Slide 6
- WIMAX & EPONs integrated architectures 6
- Slide 7
- Comparison 7
- Slide 8
- Combined ONU-BSs functional modules 8
- Slide 9
- Hybrid ONU-BSs functional modules 9
- Slide 10
- Logical operation 10
- Slide 11
- Virtual ONU-BS 11
- Slide 12
- 12 Research Method
- Slide 13
- 13 EPON-Side
- Slide 14
- Background Review 14 Architecture Upstream data transmit
mechanism: TDMA Downstream data transmit mechanism: Broadcast
- Slide 15
- Background Review 15 MPCP protocol MPCP OLT ONU : (1) ONU (2)
Auto Discovery (3) time slot ONU MPCP
- Slide 16
- Background Review 16 GATE message & REPORT message
formant
- Slide 17
- Background Review 17 LLID(Logic link identification) EPON QOS
(1)EF (2)AF (3)BE
- Slide 18
- Background Review 18 DBA scheme IPACT IPACT example
- Slide 19
- Background Review 19 Transmission window size to notify how
many data that ONU can send to OLT in a cycle Max Transmission
window size : W [i] MAX how the OLT should determine the granted
window size if the requested window size W [i]
- Predictive Credit Mechanism 32 Note (1)predictive credit based
DBA mechanism is suitable for the traffic which has smaller packet
size and stable arrival rate but delay sensitive. (2) In the
non-credit DBA mechanism R i is always >=0 and B i =R i
- Slide 33
- 33 WIMAX-Side
- Slide 34
- Background Review 34 Architecture BS->SS data transmit
mechanism : Broadcast SS->BS data transmit mechanism : TDD
- Slide 35
- Background Review 35 TDD frame structure divide in two part
(1)downlink subframe (2)uplink subframe
- Slide 36
- Background Review 36 Downlink subframe &Uplink subframe
structure
- Slide 37
- Background Review 37 Downlink Subframe Preamble Broadcast
Control TDM data TTG Uplink Subframe Initial Ranging Opportunities
Request Contention Opportunities Scheduled Data
- Slide 38
- Background Review 38 CID(Connection Identification ) BS SS CID
CID CID WIMAX QOS (1) Unsolicited Grant Service(UGS) (2) Extended
Real-time Polling Service(ertPS) (3) real-time Polling
Service(rtPS) (4) Non-real-time Polling Service(nrtPS) (5)Best
Effort(BE)
- Slide 39
- Modified leaky bucket algorithm 39 Modified leaky bucket
algorithm 1. under WIMAX network deal with packet fragmentation is
too complicated so this mechanism is use to solve problem that when
we decide not to do the packet fragmentation 2. let data transmit
in different cycle time
- Slide 40
- Background Review 40 DBA scheme Grant Per Connection Grant per
SS Schedule mechanism Earliest Deadline First(EDF) Weighted Fair
Queue(WFQ)
- Slide 41
- Background Review 41 Earliest Deadline First(EDF)
priority-driven preemptive Job with earliest (absolute) deadline
has highest priority does not require knowledge of execution times
Execution profile of two periodic tasks Process A Arrives02040
Execution Time101010 End by204060 Process B Arrives050100 Execution
Time252525 End by50100150
- Slide 42
- Background Review 42 Weighted Fair Queue scheduling(WFQ) Packet
by Packet GPS(General Processor Sharing) GPS(General Processor
Sharing) concept Each flow i has a weight i and receives at least
r* i / ( k ) bits/s capacity of the outgoing link of capacity r
[bits/s]
- Slide 43
- Leaky bucket algorithm 43 Leaky bucket algorithm 1. often use
in ATM network 2. a traffic control mechanism 3. packets are
discarded when bucket overflows 4. output rate is a constant rate.
Leaky bucket algorithm parameters L : packet leak rate B : Bucket
Size(bytes) B/L : maximum latency at transmission
- Slide 44
- Leaky bucket algorithm 44 Note Leaky bucket is used in ATM,
where B and L be specified in units of cells and cells per
second
- Slide 45
- Token bucket algorithm 45 Token bucket algorithm 1. often use
in ATM network 2. a traffic control mechanism 3. Each packet
requires abstract tokento be sent Token bucket algorithm parameters
b : bucket size r : token input rate p : peak rate
- Slide 46
- Token bucket algorithm 46
- Slide 47
- Token bucket algorithm example 47 parameters: MaxTokens=5
r=3
- Slide 48
- Modified leaky bucket algorithm 48 Modified leaky bucket
algorithm : : / : frame Concept frames packet fragmentation frame
different cycle time data
- Slide 49
- Modified leaky bucket algorithm 49 Divide in two step (1) (2) A
B (1) (2) ( frame )
- Slide 50
- Modified leaky bucket algorithm 50 Parameters : GRANT : CAC
THIS_FRAME_GRANT : frame Buffer : Max_Packet_Size : accumulate
:
- Slide 51
- Modified leaky bucket algorithm 51 flow chart
- Slide 52
- Modified leaky bucket algorithm 52 (1) WIMAX network MS Divide
in to branch A B
- Slide 53
- Modified leaky bucket algorithm 53 A B NOTE B ( bucket
limit)
- Slide 54
- 54 Challenge Issues
- Slide 55
- 55 QOS mapping WIMAX EPON QOS mapping EPON class mapping WIMAX
class EPON ONU queue WIMAX class mapping
- Slide 56
- Challenge Issues 56 service class starvation QOS EPON WIMAX
queue priority base DBA service class starvation QOS service class
starvation
- Slide 57
- 57 Future Work
- Slide 58
- Future work 58 Simulation Solve challenge issues
- Slide 59
- 59 Q&A
- Slide 60
- Reference 60 [1] IEEE Std 802.3ah-2004, IEEE Standard for
Information technology- Telecommunications and information exchange
between systems-Local and metropolitan area networks-Specific
requirement-Part 3: Carrier Sense Multiple Access with Collision
Detection (CSMA/CD) Access Method and Physical Layer
Specifications, September 2004. [2 ] IEEE Std 802.16-2004, IEEE
Standard for Local and metropolitan area networks-Part 16: Air
Interface for Fixed Broadband Wireless Access Systems,October 2004
[3] Gangxiang Shen, Rodney S. Tucker, and Chang-joon Chae, "Fixed
and Mobile Convergence Architectures for Broadband Access:
Integration of EPON and WiMAX, IEEE Commun. Mag., Aug. 2007. [4] G.
Kramer, B. Mukherjee, and G. Pesavento, "IPACT: A Dynamic Protocol
for an Ethernet PON (EPON)," IEEE Commun. Mag., vol. 40, issue 2,
pp.74-80, Feb. 2002 [5] Kun Yang, Shumao Ou, Ken Guild, and
Hsiao-Hwa Chen,"Convergence of Ethernet PON and IEEE 802.16
Broadband Access Networks and its QoS-Aware Dynamic Bandwidth
Allocation Scheme," IEEE JSAC, vol. 27, issue 2, Feb. 2009
- Slide 61