Sunteți pe pagina 1din 5

A Bandwidth Allocation Model with High Concurrence Rate in

IEEE802.16 Mesh Mode


Jianfeng Chen, Caixia Chi, Qian Guo

Bell Laboratories, Lucent Technologies
E-mails: chenjf,chic @lucent.com
Abstract- In this paper, a bandwidth allocation model is suitable for Mesh mode because they all deal with centralized
proposed for multi-hop Wireless Mesh Network (WMN) scheduling in one hop range; and the algorithms deployed in
with a goal of achieving high traffic throughput in minimal ad-hoc network [8][9] are applied in distributed network, which
scheduling time slots. Scheduling scheme based on the op- lack of the central control .
timization model serves the centralized scheduling first and In this paper, we explore the problem of bandwidth alloca-
compresses the scheduling time to minimum by enhancing tion in WMN. An optimization model is proposed to analyze
concurrence rate among links, thus more time slots can be the lower bound of the centralized scheduling in Mesh mode.
saved for distributed scheduling. Simulation results show Traffic for centralized transmission are processed at first and
that this model has higher concurrence rate and reduces multiple links in the network can send and receive data concur-
nearly 50% centralized time slots than FIFO serving mode. rently such that the transmission delay for centralized schedul-
ing can be compressed to the least. Then the remaining free
frame slot can be saved for distributed scheduling through a
I Introduction three-way handshake.
This paper is organized as follows. Section 2 describes the
Multi-hop wireless mesh network is a promising wireless net- physical layer assumption in this work. Definitions and math-
work to provide ubiquitous high-speed wireless access to cus- ematical model based on these assumptions are presented in
tomers, such as broadband home networking, community and Section 3. Section 4 gives the experiment results and the paper
neighborhood networks, enterprise networking [1]. Original concludes in Section 5.
IEEE 802.16 standard addressed applications in licensed bands
in the 10 to 66 GHz frequency range under point-to-multipoint
(PMP) mode [2]. Subsequent amendments have extended the
802.16 air interface standard to cover non-line of sight (NLOS)
II Preliminaries
applications in licensed and unlicensed bands in the sub 11
In this paper we focus on the scenario in which only one Mesh
GHz range and added the Mesh mode [3]. Comparing with
BS is in the network to provide the function of centralized
the bandwidth scheduling in point to multipoint(PMP) mode,
scheduling and connect the sub network to the back haul links.
the mesh mode has its characters including:1) Traffic can occur
SSs communicate with BS via wireless links to send or receive
directly between subscriber stations (SSs). 2)Traffic may be re-
data from the Internet.
layed by internal node (both uplink and downlink), so the band-
width allocation may cover more than one frame time slot. 3) To simplify the scheduling and routing over mesh network,
we assume that the mesh topology broadcasted in Mesh Cen-
The topology of mesh network may change more dynamically
tralized Schedule Configuration (MSH-CSCF) message has
than that in PMP mode.
been partitioned into a tree, where the tree is rooted at BS. In
Some research results have shown that throughput ca-
this tree, typically there will be traffic in the downlink direction
pacity can be increased by deploying relaying nodes [4]
from the BS to the SS, as well as traffic in the uplink direction
[5], and the biggest challenge in building a WMN is how
from the SS to the BS. Our centralized algorithm only consid-
to design scheduling schemes to achieve guaranteed perfor-
ers these two kinds of traffic, while the direct data exchange
mance(throughput and delay). Centralized scheduling, coor-
between SSs is transmitted during the frame slots that remains
dinated and non-coordinated distributed scheduling are men-
for distributed scheduling. The additional problem of schedul-
tioned in IEEE802.16-2004, but no detailed definitions are de-
ing over multiple access trees is beyond the scope of this paper.
scribed. Algorithms deployed in PMP mode [6][7] are not
 Current affiliation: Xidian University, Shan Xi, China.
However, if we assume that different access trees operate in
separated frequency bands, or disjoint time slots, the problem
Intern of Bell Labs Research China can be reduced to scheduling over each access tree separately.

1
II-A Physical layer E E
45 45
degrees degrees
As mentioned in IEEE 802.16-2004 Standard, only time divi-
sion mode (TDD) is supported in Mesh mode. Furthermore, Link A Link A
the MAC layer is assumed to schedule data to multiple access G
d*0.1 G d*0.1
(TDMA) through single carrier channel. Thus, as long as the
bandwidth allocation result is calculated, the frame in each link F
can be built following this result in a simple way of mapping.
Link B Link B
We have the following rules defined in this paper: Rule 1:
A node can’t transmit and receive at the same time. Rule 2: (a) (b)
H H
The relaying data traffic received by one SS can’t be trans-
ferred immediately to its neighbor in the same frame slot. That
is because the SS usually has performance constrain in buffer Figure 1: Region of Interference
writing and reading. Rule 3: Nodes within the transmission
range of an active node are blocked to avoid the interference.
Rule 4: Any two traffic that are not interfering with each other III Mathematical Model
can potentially transmit data packets over the physical channel
Centralized scheduler provides bandwidth allocation scheme
simultaneously.
for each node such that traffic can reach its destination in the
It is believed that interference between concurrent transmis- scheduling period. Usually, the longer scheduling period the
sions from neighboring nodes is one of the most significant lower bandwidth efficiency, so minimizing the scheduling pe-
factors that limit the system throughput and scalability of wire- riod becomes an important object in scheduling algorithm de-
less multi-hop network. Directional antennae at the transmit- sign. In the following, we build an optimization model to study
ters as well as the receivers to minimize transmission range of the minimal scheduling period that can be provided by an cen-
the nodes. According to the Rule 4 the throughput of the mesh tralized scheduler with specified topology and traffic distribu-


 
work can be improved. tion.


Given an access tree where the nodes are ac-
As mentioned above, all nodes share a wireless channel and
 
cess points, and the links are bidirectional wireless links be-
communicate on that shared channel. Each node is assumed to

tween neighboring pairs of access points, . All nodes
be equipped with multiple directional antennas[10]. A direc-
    
in are labelled with an integer and the root node is labelled
tional antenna can transmit (receive) over a small angle (e.g.,
!" #
with . The root node is BS, and the other nodes
45 degrees), centered on the receiver (transmitter), and several are SS. Each node has a specified capacity which is
directional antennas may be used together to cover all direc-
tions. We also assume that there is no interference at angles
$&% '$ % (  *)+,,)- ./01 2
the data rate it can support.

 
, is the neighboring parent nodes of

 $ % 34
beyond this beam width, or at distances beyond 10% of the node . With being an access tree, each node has at most one
transmitter receiver link length (see Fig.1).
% 5*)+67*
)89: ;
neighboring parent node, that is, .

)<= % >/ %>?@4-A,AB  %  % C >7D.E
be the neighboring children of node .
Directional transmissions over two different links will in-
 FC
Each is given a label , and is the

HI%C
terfere at the two receiving access points if the access points
>GD.E 
neighboring child of node . and all its children form the

J G/ represents all the children of node  , and J 7KL M N'P OKM HS%C .
are located within the beam of other link, and transmissions
branch of node which is denoted as .
by two or more links will interfere at the same receive node
even if different directional antennas at the node receive these
transmissions. This assumption is justified, for instance, in the
V-ET% 7Kis isthetheuplink
number of hops from root U to node X
V *
W %  . C,Q&R
traffic request of node  and
case where signals received by all antennas are combined be-

traffic from root  to node  .


fore sending to the receiving circuitry. We also assume that is the downlink
simultaneous transmissions by the same node to different di-

cide the uplink and downlink traffic of node  in frame Y . Set


rections are not allowed. With all the inputs to the scheduling problem, we need to de-
Z %7[ \ be the uplink traffic of node  at frame Y , and ]%GC [ \ the
downlink traffic of node  to branch > at frame Y . Fig.2 gives
In Fig.1(a), the dotted region denotes the transmission range.
It shows when H transmits to G, G will see interference if it
were to receive from E. In the figure the highlighted arrow an example access tree, and the explanation of above notions is

^
shows the interference. The Fig.1(b) also shows a condition shown in the figure.
where node G can safely transmit to node H, since it will not Let represent the number of frame slots to carry all the
interfere with node E’s communication to F. requests to its destination, and the scheduling problem, is to

2
Z Ws[ \ €~ xYˆ143 srtrsrp u^ (9)

7^ l 4mˆET7KuKD.E
BS


Constraint (2) represents that the uplink traffic via node to
Fi
E&G/
root node must be transmitted out before the


yFl i , k frame such that these traffic can reach root node after hops.

 
xi , k The uplink traffic via node includes both the traffic originated
i

at node and the traffic originated by children of and relayed
xN1 ,k yi1,k
N
yi , ik by to root node.

  ^
i
yi2, k xNNi i,k Equation (3) means that the downlink traffic from root node
xN 2 , k
1
i

Ni
to node should reach node inside the scheduling period .
N Ni
 # 
i
...... Constraint (4) requires that the total traffic to and from node
N i2 can not exceed the total capacity of node .
......
 Y+ Y‰Š4- trtrsrt ^
Constraint (5) means that the uplink traffic sent by node
during frame slots should not be more
Figure 2: Access Tree and its Notions
Y
than what it has received from its neighboring children and


its own originated traffic during the frames. And constraint
^
find a scheme to minimize . This problem can be formulated
Y+ Y=‹43 trsrtrp ^
(6) requires that the downlink traffic sent by node during
frames should not be more than what it has
in a linear programme problem as follows:
Z Ws[ \
received from its neighboring parent node.

_;`,a ^ Œ~ *Yy54- trtrsrp u^


For root node , it has no uplink traffic and it also has no

 
Ž 
(1) parent node. So . For any SS node
b A DA ced
, there is no downlink traffic unless the SS node has
%ji ^ l ƒET7K
received some traffic from its parent nodes, and all uplink traf-
k Rf+g3h Z %7[ \  V %ml k V n .'143 srtrtrt uA fic should be sent before frame to guarantee the

\ npo3q h %ji (2) traffic to reach root node before frame K.

Q&R c
k V W*%ml k V W n
III-A Scheduling Algorithm
\ ] vC O [ \ fwR  npo3q h %ji The linear programme problem can be solved by many com-
Q&R Z %G[ \
mercial tools and solution to the mathematical model can pro-
]%GC [ \ 
'143 srtrsrp uAxy v C O u>z14 rtrsrs  v O 6A vide uplink traffic
Yw Y‘’43 trsrtrp ^
and downlink traffic of node in
M N'O/M M N'O/M
(3)
#
each frame . The solution does not specify
Z %G[ \{l k ] %7C [ \ l ] vC O [ \ l k Z NeO | [ \I} # 7
% [ \ M “N'O/M %G[ \
that during the mini-slots for each frame slot, how to arrange
Z
C,Q&R C6Q&R ]XC downlink traffic such that no
,
C &
Q R
the uplink traffic and

xy~ srtrsrp u '€ &>T43 trsrtrp   % 6Av C O (4) interference occurs. In the following, we propose an algorithm
 %7to[ \ its mini-slots based on
\ \
k Z %G[   k fwR kM N&O/M Z N‚O | [  } V % above principle. In the algorithm, ”  represents the DKD.E mini-
to allocate the traffic of each node

slot of node  at frame slot Y . ”


%7[ \ €–•!—˜— means that  node 
is free in min-slot D in Y frame slot. ”
%G[ \ €™,)8 represents
Q'R Q&R C6Q&R node  sends traffic to node ) in mini-slot Y , and ”
G
% [ \ b that
 ,)8
Y2€ƒ srtrsrp u^F &'143 srtrsrp uA represents that node  receives traffic from node ) in mini-slot

\ \
(5)
Y.
k kM N'O/M ] %7C [  } k fwR ] vC O [  7
% [ \ 7
% [ \  Algorithm
Input: š1
  ,
Algorithm 1: Time Slot
Z u] u#‚ u%7˜[ \  *Y;43 srtrtrs u^
Allocation
Q'R C6Q&R Q&R Output: Mini slots assignment ” .D 143 trsrtrp # for each  *Y .
Y;ƒ srtrtrt u^ u43 trsrtrp  .x€ v C O (6)
 %G[ \ %7[ \
1. For each Yw Y24- trtrsrt ^ , get Z u]8C
begin

] %7C [ \ ~ *Y } ET7/ L%  '>T%G[ \ 43 srtrsrp „  % ›Aœ” %7[ \ –•—L—{ K+D } #‚A
x4- trtrsrp uA{>T43 srtrsrp „  %   sDt ” W yž•—˜—Ÿ .D43 srtrtrt u#ˆ
2. L ¡~ *  ›‘ >w143A
Z %G[ \ €~ Y9…"^ l ƒ†‡ET7/ '4- trsrtrp A
(7)
(8) /*Begin from BS node.*/

3
0

BS

1 2 0<−−−>1

0<−−−>2

3 4 5
1<−−−>3

2<−−−>4
6 7

Link
2<−−−>5 downlink traffic
uplink traffic
8
3<−−−>6

3<−−−>7
Figure 3: Simulation Topology


7<−−−>8

Select D?9  , if ] C
% %7[ \S¢
%” G[ \  b £% C  , ]8%7C [ \ y]8%7C [ \ , ¤4- . %  ¡€ % =„D* ,
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18
Frame

3.

)I%7[ \ % C¢ , ” n [ \ €™G/ u n € n ¤sD* .l¤l Figure 4: Bandwidth Allocation

If ]8C
if >
}   %   ,, gogo toto step
step 3, otherwise >
3. 
,
%
For )ˆ€C u>z143 srtrtrt „   , D?¥
% %m¦  n
4.
if Z n
[ \ ¢  , ” n [ \  b 7Kp œ” %7[ \ y™,)8p Z n [ \  Z n [ \ ¤4-
 nW y n ¤sD*- u % §W  % ¤sD* , go to step 4. W 0<−−−>1

5.
$ % Ž ¡‘ :W , set
=„ . If Ž –•—˜— , select L0 , and
>z14 , go to step 3.
0<−−−>2

1<−−−>3

end
2<−−−>4
uplink traffic
Link

downlink traffic
2<−−−>5

IV Experiment Result 3<−−−>6

3<−−−>7
In this section, we use the network shown as Fig.3 as an exam-
ple to compare the scheduling scheme based on the proposed 7<−−−>8

model with FIFO queue. FIFO queue serves the request ac- 12 12.1 12.2 12.3 12.4 12.5 12.6
Minslot of the 13th Frame
12.7 12.8 12.9 13

cording to the sequence of each node defined in Mesh Central-


ized Schedule (MSH-CSCH) message. We add some optimiza- Figure 5: Sample of Mini-Slot Allocation
tion in FIFO mode, that is, if an active node’s Uplink/Downlink
traffic is less than 1 unit, the remaining bandwidth can be al-
located to its neighbor father node. The bandwidth for data
subframe in each frame slot is taken as 1 unit. We compare the
performance of our scheduling model with FIFO queue from 50
Proposed Mode
the aspect of number of frame slots, concurrence rate and de- 45
FIFO Mode

lay boundary in the centralized scheduling. 40

Fig.4 shows the bandwidth allocation method get from the 35

optimization model when BS has the same downlink traffic as 30


Frame Slots

the total uplink traffic generated by SSs. Total traffic is 8 units 25

in each direction on the network shown in Fig.3. 20

White blocks in Fig.4 represent uplink traffic through the


15
link, and black blocks represent downlink traffic. Total
10
scheduling frame slots is 18, which means that all data traffic
5
can be transmitted to its destination inside 18 frame slots. Gen-
erally speaking, the delay upper bound in each direction is 18 0
1:9 4:6 1:1 6:4
Proportion of uplink traffic to downlink traffic
9:1

frame slots. While in FIFO serving mode, 36 frame slots are


needed for the data transmission of 8 units in each direction. Figure 6: Frame Slots v.s. Traffic Proportion
And if the uplink data is transmitted first, the delay boundary
for downlink data will be enlarged to 36 frame slots (Refer to

4
80
Proposed Mode der centralized scheduling in minimal time slots and saves time
FIFO Mode
70 zone for distributed scheduling as much as possible. Compar-
ing with FIFO serving mode, the scheduling scheme based on
60
our proposed model can save half of the time slots under differ-
50
ent traffic load and Concurrence Rate is 3 times better. Simu-
Frame Slots

40
lation results also show that our model has better compatibility
for various traffic distributions.
30
Priority difference between the traffic generated by each
20 node is not considered in this paper. Though Best Effort is
the only service type supported by Mesh Mode defined in pro-
10
tocol, it is still possible to classify different service priorities
0
0.5 1.0 1.5 2.0
in priority/class field in the Mesh Connection Identifier (CID)
Traffic(Unit)
construction. Enhancement of the optimization model to sup-
port multi-priority traffic and local scheduling policy of SSs is
Figure 7: Frame Slots v.s. Traffic Load
our future work.

1:1 column in Fig.6). Fig.4 shows that many links are active si-
multaneously in the same frame slot. But in FIFO mode, only References
one link is active in most of the scheduling time for it serves [1] WiMAX Forum. Business case models for fixed broadband wire-
each node in sequence. In the following, we define the con- less access based on WiMAX technology and the 802.16 stan-
cept of Concurrence Rate, such that the concurrency degree of dard. Whitepaper, October 2004. http://www.wimaxforum.org.

Y+ *Y¨©43 trsrtrp ^ ª \
different scheduling schemes can be measured.
Given a frame slot , is the number [2] IEEE 802.16 Standard-Local and Metropolitan Area Networks-

c
of links that are active for downlink or uplink traffic. Then Part 16. IEEE Draft P802.16/D3-2001

\ “ ª \-« 7^" 9 A


the Concurrence Rate for a scheduling scheme is defined as: [3] IEEE Standard for Local and metropolitan area networks Part 16:
Air Interface for Fixed Broadband Wireless Access Systems, Oc-
Q&Based
R on the definition, the average Concurrence Rate in tober 2004.

Fig.4 is ¬X­X® . Use frame slot 13 as an example, the frame struc- [4] P. Gupta, P.R. Kumar, The capacity of wireless networks, IEEE
ture of each link is shown in Fig. 5. Totally, 7 links(¯;°
Transactions on Information Theory 46 (2) (2000) 388-404.
43 ¥¯;°±ƒ s4;¯;°²­~ *ƒ9¯;°³¬ *ƒ9¯;°±´ ­¥¯;°¶µ8 µ¯;°²· ) [5] Pabst, Walke, et al, “Relay-Based Deployment Concepts for

the concurrence rate of FIFO mode is only around 4„ƒA¡´-® .


are simultaneously active and collision-free in this slot. While Wireless and Mobile Broadband Radio”, In IEEE Communica-
tions Magazine, p.p. 80-89, New York, US, 09/2004.
We also compare the performance of frame slots in various
[6] K. Wongthavarawat, and A. Ganz, “Packet Scheduling for QoS
´ˆ X´ .¬; X¸ s4 3¹ ¹; 4
traffic proportion. Five different traffic proportion of uplink and
Support in IEEE 802.16 Broadband Wireless Access Systems”,
downlink are considered: , 6:4 and . Fig.7 International Journal of Communication Systems, Vol. 16, p81-
shows that scheduling method based on our model only need 96, 2003.
half of the centralized scheduling time needed by FIFO mode.
Moreover, the number of scheduling time slots does not change [7] Jianfeng Chen, Wenhua Jiao, Hongxi Wang, “A Fair Scheduling
for IEEE 802.16 Broadband Wireless Access Systems”, to appear
´ž '´ ¬‡ '¸ ¸< &¬
when traffic proportion varies. However, in FIFO mode, when
in May. ICC2005.
4 w¹ ¹– '4
proportion changes from to or , 7 more time
slots are needed and when the proportion is or , 11 [8] Y.B.Ko,V.Shankarkumar,and N.H.Vaidya, “Medium access con-
more time slots are needed. trol protocols using directional antennas in ad hoc networks”, In
The final comparison we do is scheduling time variety when Proceedings of IEEE INFOCOM’2000, Mar.2000.
traffic grows from 0.5 unit per node to 1.5 unit per node. Fig.6
[9] LI J., BLAKE C., DE COUTO D.,LEE H., AND MORRIS R.,
´3X®
shows both modes need more scheduling time when traffic in-
“Capacity of ad hoc wireless networks”, In Proceedings of the
creasing. Our model always need nearly of time slots what
2001 ACM Mobile Computing and Networking Conference (Mo-
are required by FIFO mode. bicom’01) (July 2001), pp. 61-69.

[10] Lichun Bao and J. J. Garcia-Luna-Aceves, “Transmission


V Conclusion Scheduling in Ad Hoc Networks with Directional Antennas”. In
Proceedings ACM MobiCom, pages 48-58, New York, Septem-
We have presented a scheduling model in IEEE802.16 Mesh ber 2002.
mode, which provides high concurrence transmission rate un-

S-ar putea să vă placă și