adviser : 吳和庭教授 speaker : 尹培華 1 適用於 epon 和 wimax 802.16...

62
Adviser : 吳吳吳吳吳 Speaker : 吳吳吳 1 適適適 EPON 適 WIMAX 802.16 適適適適適適適適適 QOS 適 Dynamic Bandwidth Allocation

Post on 19-Dec-2015

310 views

Category:

Documents


1 download

TRANSCRIPT

  • Slide 1
  • Adviser : Speaker : 1 EPON WIMAX 802.16 QOS Dynamic Bandwidth Allocation
  • Slide 2
  • Outline 2 Motivation Architecture Research Method Challenge Issues Future Work Q&A
  • Slide 3
  • 3 Motivation
  • Slide 4
  • 4 EPON WIMAX WIMAX EPON : EPON WIMAX QOS
  • Slide 5
  • 5 Architecture
  • Slide 6
  • WIMAX & EPONs integrated architectures 6
  • Slide 7
  • Comparison 7
  • Slide 8
  • Combined ONU-BSs functional modules 8
  • Slide 9
  • Hybrid ONU-BSs functional modules 9
  • Slide 10
  • Logical operation 10
  • Slide 11
  • Virtual ONU-BS 11
  • Slide 12
  • 12 Research Method
  • Slide 13
  • 13 EPON-Side
  • Slide 14
  • Background Review 14 Architecture Upstream data transmit mechanism: TDMA Downstream data transmit mechanism: Broadcast
  • Slide 15
  • Background Review 15 MPCP protocol MPCP OLT ONU : (1) ONU (2) Auto Discovery (3) time slot ONU MPCP
  • Slide 16
  • Background Review 16 GATE message & REPORT message formant
  • Slide 17
  • Background Review 17 LLID(Logic link identification) EPON QOS (1)EF (2)AF (3)BE
  • Slide 18
  • Background Review 18 DBA scheme IPACT IPACT example
  • Slide 19
  • Background Review 19 Transmission window size to notify how many data that ONU can send to OLT in a cycle Max Transmission window size : W [i] MAX how the OLT should determine the granted window size if the requested window size W [i]
  • Predictive Credit Mechanism 32 Note (1)predictive credit based DBA mechanism is suitable for the traffic which has smaller packet size and stable arrival rate but delay sensitive. (2) In the non-credit DBA mechanism R i is always >=0 and B i =R i
  • Slide 33
  • 33 WIMAX-Side
  • Slide 34
  • Background Review 34 Architecture BS->SS data transmit mechanism : Broadcast SS->BS data transmit mechanism : TDD
  • Slide 35
  • Background Review 35 TDD frame structure divide in two part (1)downlink subframe (2)uplink subframe
  • Slide 36
  • Background Review 36 Downlink subframe &Uplink subframe structure
  • Slide 37
  • Background Review 37 Downlink Subframe Preamble Broadcast Control TDM data TTG Uplink Subframe Initial Ranging Opportunities Request Contention Opportunities Scheduled Data
  • Slide 38
  • Background Review 38 CID(Connection Identification ) BS SS CID CID CID WIMAX QOS (1) Unsolicited Grant Service(UGS) (2) Extended Real-time Polling Service(ertPS) (3) real-time Polling Service(rtPS) (4) Non-real-time Polling Service(nrtPS) (5)Best Effort(BE)
  • Slide 39
  • Modified leaky bucket algorithm 39 Modified leaky bucket algorithm 1. under WIMAX network deal with packet fragmentation is too complicated so this mechanism is use to solve problem that when we decide not to do the packet fragmentation 2. let data transmit in different cycle time
  • Slide 40
  • Background Review 40 DBA scheme Grant Per Connection Grant per SS Schedule mechanism Earliest Deadline First(EDF) Weighted Fair Queue(WFQ)
  • Slide 41
  • Background Review 41 Earliest Deadline First(EDF) priority-driven preemptive Job with earliest (absolute) deadline has highest priority does not require knowledge of execution times Execution profile of two periodic tasks Process A Arrives02040 Execution Time101010 End by204060 Process B Arrives050100 Execution Time252525 End by50100150
  • Slide 42
  • Background Review 42 Weighted Fair Queue scheduling(WFQ) Packet by Packet GPS(General Processor Sharing) GPS(General Processor Sharing) concept Each flow i has a weight i and receives at least r* i / ( k ) bits/s capacity of the outgoing link of capacity r [bits/s]
  • Slide 43
  • Leaky bucket algorithm 43 Leaky bucket algorithm 1. often use in ATM network 2. a traffic control mechanism 3. packets are discarded when bucket overflows 4. output rate is a constant rate. Leaky bucket algorithm parameters L : packet leak rate B : Bucket Size(bytes) B/L : maximum latency at transmission
  • Slide 44
  • Leaky bucket algorithm 44 Note Leaky bucket is used in ATM, where B and L be specified in units of cells and cells per second
  • Slide 45
  • Token bucket algorithm 45 Token bucket algorithm 1. often use in ATM network 2. a traffic control mechanism 3. Each packet requires abstract tokento be sent Token bucket algorithm parameters b : bucket size r : token input rate p : peak rate
  • Slide 46
  • Token bucket algorithm 46
  • Slide 47
  • Token bucket algorithm example 47 parameters: MaxTokens=5 r=3
  • Slide 48
  • Modified leaky bucket algorithm 48 Modified leaky bucket algorithm : : / : frame Concept frames packet fragmentation frame different cycle time data
  • Slide 49
  • Modified leaky bucket algorithm 49 Divide in two step (1) (2) A B (1) (2) ( frame )
  • Slide 50
  • Modified leaky bucket algorithm 50 Parameters : GRANT : CAC THIS_FRAME_GRANT : frame Buffer : Max_Packet_Size : accumulate :
  • Slide 51
  • Modified leaky bucket algorithm 51 flow chart
  • Slide 52
  • Modified leaky bucket algorithm 52 (1) WIMAX network MS Divide in to branch A B
  • Slide 53
  • Modified leaky bucket algorithm 53 A B NOTE B ( bucket limit)
  • Slide 54
  • 54 Challenge Issues
  • Slide 55
  • 55 QOS mapping WIMAX EPON QOS mapping EPON class mapping WIMAX class EPON ONU queue WIMAX class mapping
  • Slide 56
  • Challenge Issues 56 service class starvation QOS EPON WIMAX queue priority base DBA service class starvation QOS service class starvation
  • Slide 57
  • 57 Future Work
  • Slide 58
  • Future work 58 Simulation Solve challenge issues
  • Slide 59
  • 59 Q&A
  • Slide 60
  • Reference 60 [1] IEEE Std 802.3ah-2004, IEEE Standard for Information technology- Telecommunications and information exchange between systems-Local and metropolitan area networks-Specific requirement-Part 3: Carrier Sense Multiple Access with Collision Detection (CSMA/CD) Access Method and Physical Layer Specifications, September 2004. [2 ] IEEE Std 802.16-2004, IEEE Standard for Local and metropolitan area networks-Part 16: Air Interface for Fixed Broadband Wireless Access Systems,October 2004 [3] Gangxiang Shen, Rodney S. Tucker, and Chang-joon Chae, "Fixed and Mobile Convergence Architectures for Broadband Access: Integration of EPON and WiMAX, IEEE Commun. Mag., Aug. 2007. [4] G. Kramer, B. Mukherjee, and G. Pesavento, "IPACT: A Dynamic Protocol for an Ethernet PON (EPON)," IEEE Commun. Mag., vol. 40, issue 2, pp.74-80, Feb. 2002 [5] Kun Yang, Shumao Ou, Ken Guild, and Hsiao-Hwa Chen,"Convergence of Ethernet PON and IEEE 802.16 Broadband Access Networks and its QoS-Aware Dynamic Bandwidth Allocation Scheme," IEEE JSAC, vol. 27, issue 2, Feb. 2009
  • Slide 61