Analysis of IEEE Mesh Mode Scheduler Performance

Slides:



Advertisements
Similar presentations
A Centralized Scheduling Algorithm based on Multi-path Routing in WiMax Mesh Network Yang Cao, Zhimin Liu and Yi Yang International Conference on Wireless.
Advertisements

Detecting MAC Layer Back-off Timer Violations in Mobile Ad Hoc Networks Venkata Nishanth Lolla, Lap Kong Law, Srikanth V. Krishnamurthy, Chinya Ravishankar,
Bidding Protocols for Deploying Mobile Sensors Reporter: Po-Chung Shih Computer Science and Information Engineering Department Fu-Jen Catholic University.
Delay and Throughput in Random Access Wireless Mesh Networks Nabhendra Bisnik, Alhussein Abouzeid ECSE Department Rensselaer Polytechnic Institute (RPI)
DYNAMIC POWER ALLOCATION AND ROUTING FOR TIME-VARYING WIRELESS NETWORKS Michael J. Neely, Eytan Modiano and Charles E.Rohrs Presented by Ruogu Li Department.
Dynamic Tuning of the IEEE Protocol to Achieve a Theoretical Throughput Limit Frederico Calì, Marco Conti, and Enrico Gregori IEEE/ACM TRANSACTIONS.
Muhammad Mahmudul Islam Ronald Pose Carlo Kopp School of Computer Science & Software Engineering Monash University, Australia.
NCKU CSIE CIAL1 Principles and Protocols for Power Control in Wireless Ad Hoc Networks Authors: Vikas Kawadia and P. R. Kumar Publisher: IEEE JOURNAL ON.
CS401 presentation1 Effective Replica Allocation in Ad Hoc Networks for Improving Data Accessibility Takahiro Hara Presented by Mingsheng Peng (Proc. IEEE.
Yanyan Yang, Yunhuai Liu, and Lionel M. Ni Department of Computer Science and Engineering, Hong Kong University of Science and Technology IEEE MASS 2009.
Medium Access Control Protocols Using Directional Antennas in Ad Hoc Networks CIS 888 Prof. Anish Arora The Ohio State University.
A Distributed Scheduling Algorithm for Real-time (D-SAR) Industrial Wireless Sensor and Actuator Networks By Kiana Karimpour.
A Simple and Effective Cross Layer Networking System for Mobile Ad Hoc Networks Wing Ho Yuen, Heung-no Lee and Timothy Andersen.
Improving Capacity and Flexibility of Wireless Mesh Networks by Interface Switching Yunxia Feng, Minglu Li and Min-You Wu Presented by: Yunxia Feng Dept.
ACN: RED paper1 Random Early Detection Gateways for Congestion Avoidance Sally Floyd and Van Jacobson, IEEE Transactions on Networking, Vol.1, No. 4, (Aug.
Copyright: S.Krishnamurthy, UCR Power Controlled Medium Access Control in Wireless Networks – The story continues.
Salah A. Aly,Moustafa Youssef, Hager S. Darwish,Mahmoud Zidan Distributed Flooding-based Storage Algorithms for Large-Scale Wireless Sensor Networks Communications,
Load-Balancing Routing in Multichannel Hybrid Wireless Networks With Single Network Interface So, J.; Vaidya, N. H.; Vehicular Technology, IEEE Transactions.
Performance Analysis of OFDM Systems with Adaptive Sub Carrier Bandwidth Suvra S. Das, Student Member, IEEE, Elisabeth De Carvalho, Member, IEEE, and Ramjee.
On Reducing Broadcast Redundancy in Wireless Ad Hoc Network Author: Wei Lou, Student Member, IEEE, and Jie Wu, Senior Member, IEEE From IEEE transactions.
Converge-Cast: On the Capacity and Delay Tradeoffs Xinbing Wang Luoyi Fu Xiaohua Tian Qiuyu Peng Xiaoying Gan Hui Yu Jing Liu Department of Electronic.
TOPOLOGY MANAGEMENT IN COGMESH: A CLUSTER-BASED COGNITIVE RADIO MESH NETWORK Tao Chen; Honggang Zhang; Maggio, G.M.; Chlamtac, I.; Communications, 2007.
A Reservation-based TDMA Protocol Using Directional Antennas (RTDMA-DA) For Wireless Mesh Networks Amitabha Das and Tingliang Zhu, Nanyang Technological.
A Multicast Mechanism in WiMax Mesh Network Jianfeng Chen, Wenhua Jiao, Pin Jiang, Qian Guo Asia-Pacific Conference on Communications, (APCC '06)
An Energy Efficient MAC Protocol for Wireless LANs, E.-S. Jung and N.H. Vaidya, INFOCOM 2002, June 2002 吳豐州.
Efficient Resource Allocation for Wireless Multicast De-Nian Yang, Member, IEEE Ming-Syan Chen, Fellow, IEEE IEEE Transactions on Mobile Computing, April.
Localized Low-Power Topology Control Algorithms in IEEE based Sensor Networks Jian Ma *, Min Gao *, Qian Zhang +, L. M. Ni *, and Wenwu Zhu +
A Multicast Routing Algorithm Using Movement Prediction for Mobile Ad Hoc Networks Huei-Wen Ferng, Ph.D. Assistant Professor Department of Computer Science.
1 Low Latency Multimedia Broadcast in Multi-Rate Wireless Meshes Chun Tung Chou, Archan Misra Proc. 1st IEEE Workshop on Wireless Mesh Networks (WIMESH),
SERENA: SchEduling RoutEr Nodes Activity in wireless ad hoc and sensor networks Pascale Minet and Saoucene Mahfoudh INRIA, Rocquencourt Le Chesnay.
A Low Interference Channel Assignment Algorithm for Wireless Mesh Networks Can Que 1,2, Xinming Zhang 1, and Shifang Dai 1 1.Department of Computer Science.
Mobile Networks and Applications (January 2007) Presented by J.H. Su ( 蘇至浩 ) 2016/3/21 OPLab, IM, NTU 1 Joint Design of Routing and Medium Access Control.
LA-MAC: A Load Adaptive MAC Protocol for MANETs IEEE Global Telecommunications Conference(GLOBECOM )2009. Presented by Qiang YE Smart Grid Subgroup Meeting.
Virtual University of Pakistan
2010 IEEE Global Telecommunications Conference (GLOBECOM 2010)
Authors: Jiang Xie, Ian F. Akyildiz
Group Multicast Capacity in Large Scale Wireless Networks
Pastry Scalable, decentralized object locations and routing for large p2p systems.
Adaptive Resonance Theory (ART)
IEEE Protocol: Design and Performance Evaluation of An Adaptive Backoff Mechanism JSAC, vol.18, No.9, Sept Authors: F. Cali, M. Conti and.
Computing and Compressive Sensing in Wireless Sensor Networks
SOUTHERN TAIWAN UNIVERSITY ELECTRICAL ENGINEERING DEPARTMENT
SENSYS Presented by Cheolki Lee
Copyright © Cengage Learning. All rights reserved.
Lei Chen and Wendi B. Heinzelman , University of Rochester
任課教授:陳朝鈞 教授 學生:王志嘉、馬敏修
Mobile and Wireless Networking
Scheduling Mechanism in IEEE e
Analysis and Evaluation of a New MAC Protocol
Dusit Niyato, Student Member, IEEE Ekram Hossain, Senior Member, IEEE
Hidden Markov Models Part 2: Algorithms
INFOCOM 2013 – Torino, Italy Content-centric wireless networks with limited buffers: when mobility hurts Giusi Alfano, Politecnico di Torino, Italy Michele.
Presented by Jason L.Y. Lin
He Xiaoben Further study of multi-hop communications - modeling the hidden terminal problem He Xiaoben
Effective Replica Allocation
Speaker: Po-Hung Chen Advisor: Dr. Ho-Ting Wu 2016/10/12
Qingwen Liu, Student Member, IEEE Xin Wang, Member, IEEE,
The Fundamental Role of Hop Distance in IEEE 80
Javad Ghaderi, Tianxiong Ji and R. Srikant
Spectrum Sharing in Cognitive Radio Networks
Dhruv Gupta EEC 273 class project Prof. Chen-Nee Chuah
Subject Name: Adhoc Networks Subject Code: 10CS841
<month year> <doc.: IEEE doc> January 2013
Presented By Riaz (STD ID: )
8. One Function of Two Random Variables
9. Two Functions of Two Random Variables
Lecture 4a Mobile IP 1.
8. One Function of Two Random Variables
Chrysostomos Koutsimanis and G´abor Fodor
Presentation transcript:

Analysis of IEEE 802.16 Mesh Mode Scheduler Performance IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 6, NO. 4, APRIL 2007 Min Cao, Wenchao Ma, Member , IEEE, Qian Zhang, Senior Member , IEEE, and Xiaodong Wang, Senior Member , IEEE Presentd by Chan Chih-Yuan (詹志元) DYNAMIC RESOURCE ALLOCATIONIN OFDMA W IRELESS METROPOLITAN AREA NETWORKS 2007/03/26 OPLAB, NTUIM

Author (1/4) Min Cao Currently he is a Ph.D. candidate in the Department of Electrical and Computer Engineering, University of Illinois at Urbana-Champaign. His research interest include mobile computing and distributed systems, performance analysis and wireless networks. 2007/03/26 OPLAB, NTUIM

Author (2/4) Wenchao Ma Received the Ph.D. degree from the University of Florida, Gainesville, in 2003. He also worked with Microsoft Research Asia before 2005 as an associate researcher and currently works with Lenovo Corporate Research and Development as researcher staff. His research interests include wireless multimedia networks, mobility management, mobile computing, mobile IP, P2P technology and broadband wireless access. 2007/03/26 OPLAB, NTUIM

Author (3/4) Qian Zhang Received Ph.D. degrees from Wuhan University, China. Dr. Zhang joined the Hong Kong University of Science and Technology in Sept. 2005 as an Associate Professor. Her current research interests are in the areas of wireless communications, IP networking, multimedia, P2P overlay, and wireless security. Dr. Zhang is an Associate Editor for the IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, the IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY,and Computer Networks. 2007/03/26 OPLAB, NTUIM

Author (4/4) Xiaodong Wang received the Ph.D degree from Princeton University, all in Electrical Engineering. Since January 2002, he has been with the Department of Electrical Engineering, Columbia University His current research interests include wireless communications, statistical signal processing, and genomic signal processing. He currently serves as an Associate Editor for the IEEE TRANSACTIONS ON COMMUNICATIONS, the IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, the IEEE TRANSACTIONS ON SIGNAL PROCESSING, the IEEE TRANSACTIONS ON INFORMATION THEORY. 2007/03/26 OPLAB, NTUIM

Outline Introduction IEEE 802.16 Distributed Scheduling Performance Analysis Evaluation Conclusion 2007/03/26 OPLAB, NTUIM

Introduction (1/4) In order to improve network coverage and scalability, mesh mode is supported in Wireless MAN. In the mesh mode, the nodes are organized in an ad-hoc fashion, and all nodes are peers can act as routers to relay packets for their neighbors. A node can choose the links with the best quality to transfer; and with an intelligent routing protocol, the traffic can be routed to avoid the congested area. 2007/03/26 OPLAB, NTUIM

Introduction (2/4) Although the mesh mode exhibits better flexibility and scalability, the distributed channel access control is more complex because every node compute its transmission time without global information. In distributed scheduling, every node competes for channel access using a pseudo-random election algorithm based on the scheduling information of the two-hop neighbors, and data subframes are allocated through a request-grant-confirrm three-way handshaking procedure. 2007/03/26 OPLAB, NTUIM

Introduction (3/4) It is necessary to understand the distributed scheduler behavior thoroughly to optimize the network throughput and delay performance. In this paper, we focus on the performance of the distributed scheduling algorithm. The IEEE 802.11 DCF (distributed coordination function) also supports ad hoc mode. However, these performance analysis approaches for the IEEE 802.11 cannot be applied to the IEEE 802.16 mesh mode because the two protocols differ in many fundamental aspects. IEEE802.16,thecontrolanddatasubframesareseparated; apseudo-randomdistributedschedulingalgorithmisusedto providecollision-freetransmissionsinthecontrolchannel; 2007/03/26 OPLAB, NTUIM

Introduction (4/4) Particularly, we develop a stochastic model to analyze the control channel performance. This model considers the important parameters that could affect the system performance like the total node number, holdoff exponent value, and topology. With this model, the channel contention situation and connection setup time variance can be evaluated clearly under different parameters. The control message defined for distributed scheduling is called MSH-DSCH (Mesh Mode Distributed Scheduling) in the standard. The MSH-DSCH message of each node contains the schedule and data subframe allocation information of its one-hop neighbors as well as its own. By broadcasting the MSH-DSCH message, each node can have the scheduling information of its two-hop neighbors. The next transmission time for every node can be computed based on such information. 2007/03/26 OPLAB, NTUIM

IEEE 802.16 Distributed Scheduling The transmission opportunity and minislot are the basic unit for resource allocation in the control and data subframes respectively. In order that each node can have the chance to access the control subframe, the mac protocol requires every node to hold off some time before selecting the next transmission slot. 7 OFDM symbols 2007/03/26 OPLAB, NTUIM

In IEEE 802.16 mesh mode, the channel access in the control subframe is coordinated in a distributed manner mong two-hop neighbors, and the data subframe slot allocation is performed through the control message exchange so that there is no contention in the data subframe. Each node competes for transmission opportunities in the control subframe based on its neighbors’ scheduling information such that in a two-hop neighborhood, only one node can broadcast its control message at any time. 2007/03/26 OPLAB, NTUIM

Once a node wins the control channel, a range of consecutive transmission opportunities are allocated to this node, which is called an eligible interval and the node can transmit in any slot in the interval. Every node needs to determine its next eligible interval during the current one. A pseudo-random function based distributed election algorithm defined in the standard is used to decide whether the node wins a candidate transportation opportunity. If it wins, the reservation information is broadcast to the neighbors, otherwise the next slot is selected as a candidate and the procedure repeats until the node wins. 2007/03/26 OPLAB, NTUIM

By broadcasting the MSH-DSCH (Mesh Mode Distributed Scheduling) messages, each node can have the scheduling information of its two-hop neighbors. In the MSH-DSCH message, two parameters are included for control channel scheduling - Next_Xmt_Mx and Xmt_Holdooff_Exponent. The first parameter indicates the sequence number of the first slot in the eligible interval and the eligible length is L = 2Xmt_Holdoff_Exponent transmission opportunities. The holdoff exponent value can decide a node channel contention frequency and affect all the nodes in two-hop neighborhood. In order that each node can have the chance to access the control subframe, the MAC protocol requires every node to hold off some time before selecting the next transmission slot. 2007/03/26 OPLAB, NTUIM

In order to solve the contention, the standard defines a pseudo-random function with the slot sequence number and all IDs of the competing nodes as inputs. The output values are called mixing values. If the current node ID and the slot number generate the largest mixing value, it wins this slot and broadcasts the new schedule to the neighbors. If the node fails, the next transmission opportunity is set to be the temporary transmission slot and the above competing procedure is repeated until it wins in a slot. 2007/03/26 OPLAB, NTUIM

實線box代表interval正被corresponding節點佔有而dashed代表為潛在的競爭者for slot。 3 types of nodes會產生競爭情形 (1)nodes whose the eligibility interval includes the temporary transmission slot (Node B) (2)nodes whose earliest future transmission time is the same as or before the temporary slot (3)nodes whose schedules are unknown (Node D). temporary transmission slot 2007/03/26 OPLAB, NTUIM

2007/03/26 OPLAB, NTUIM set up connections with neighbors. The requester sends a Request message in the MSH-DSCH packet along with the data subframe availability information. After Receiving the Request, the receiver response with a Grant message indicating all or a subset of the suggested data subframe. When the requester receives the Grant message, it transmits a Confirm message to the receiver containing a copy of the granted subframe. With this mechanism, the neighbors of both the requester and the receiver can have the up-to-date data subframe allcation information. determined by the total number of competing nodes, and number of competing nodes is related with the number of neighbor nodes and their topologies 在section3and4會再介紹 2007/03/26 OPLAB, NTUIM

Outline Introduction IEEE 802.16 Distributed Scheduling Performance Analysis Evaluation Conclusion 2007/03/26 OPLAB, NTUIM

PERFORMANCE ANALYSIS A. Model and Approach The control subframe is independent of the data subframe. We consider the modeling and analysis of the control subchannel, which is characterized by the distributed election algorithm. Assume that the number of nodes in the network is N. Let denote the set of 2-hops neighbor nodes of node k, denote the set of nodes whose the schedules are unknown in the neighbor nodes set . 2007/03/26 OPLAB, NTUIM

Let denote the holdoff exponent of node k, then is the holdoff time of node k. is the eligibility interval of node k. Let denote the number of slots that node k fails before it wins the first slot with the pseudo-random competition, which is a random variable, then the interval between successive transmission opportunities is . Let denote the number of transmission times of node k up to slot t, then is a counting process with interevent time . Our goal is to determine the distributions or mean values of π by modelling and analyzing the distributed scheduling algorithm, based on which the throughput and delay performance metrics can be derived. 2007/03/26 OPLAB, NTUIM

To simplify the analysis, we make the following assumptions: (1)the counting process of each node eventually reaches its steady state and the intervals are i.i.d., that is, , forms a stationary and ergodic renewal process. (2)the renewal processes of different nodes are mutually independent at their steady states. 2007/03/26 OPLAB, NTUIM

Our analysis is based on the above assumptions. Note that the distribution of the renewal intervals of each node depends on the number of competing nodes in its neighborhood and their holdoff exponent. Our analysis is based on the above assumptions. 2007/03/26 OPLAB, NTUIM

So the probability mass function of is Suppose that the expected number of competing nodes in slot s for the node k is . As a result of the pseudo-random election algorithm, the probability that this node wins the slot is So the probability mass function of is 2007/03/26 OPLAB, NTUIM

To get the distribution of , we need to find To get the distribution of , we need to find . But depends on the distributions of since all the nodes in the neighborhood of node k are candidates to compete with node k. the following approach to solve this problem: derive in terms of by modelling the distributed election algorithm, and then by using the relation we obtain a set of close form equations for to solve them 2007/03/26 OPLAB, NTUIM

B. Collocated Scenario 1) Identical Holdoff Exponents: we first assume equal holdoff exponents, i.e., . Hence when the nodes are collocated, the transmission interval has the same distribution, Let be a renewal process ant t be any chosen time slot, the spread, is the renewal interval in which t lies. all nodes are one-hop neighbors of each other => there is no unknown node 2007/03/26 OPLAB, NTUIM

Let renewal process and t be any chosen times lot, the spread, is the renewal interval in which t lies, as shown in Fig. 4. The age of the renewal process a(t), is the time since the last renewal process before t; the excess (or residuual life time) of the renewal process, e(t), is the time to the next renewal after t. 2007/03/26 OPLAB, NTUIM

Renewal Process A renewal process is a generalisation of the Poisson process. In the same informal spirit, we may define a renewal process to be the same thing, except that the holding times take on a more general distribution. In essence, the Poisson process is a continuous-time Markov process on the positive integers (usually starting at zero) which has independent identically distributed holding times at each integer i (exponentially distributed) before advancing (with probability 1) to the next integer:i + 1. 2007/03/26 OPLAB, NTUIM

The limiting distribution of excess time is established by the following lemma, which is a corollary of the Renewal Reward Theorem. The proof is similar to that for the continuous-time version of the lemma in [20] The limiting distribution of the excess time is for fixed where and is an indicator function. 2007/03/26 OPLAB, NTUIM

The distribution of τ is given in terms of {p(s)} as where By the stationary and ergodic assumption, we can take the limiting distribution of excess time as its stationary distribution The distribution of τ is given in terms of {p(s)} as where 2007/03/26 OPLAB, NTUIM

2007/03/26 OPLAB, NTUIM

Since the renewal process of node k and node j are assumed to be statistically independent, at the current transmit time t of node k, the time from t to the next transmit time of node j is simply the excess time of node j. By the assumption that the renewal process is stationary and that the distributions of are identical, we can simply denote as e. 2007/03/26 OPLAB, NTUIM

2007/03/26 OPLAB, NTUIM

2007/03/26 OPLAB, NTUIM

By the assumption of statistical independence When the holdoff exponents of all the nodes are identical this probabilities is the same for any two nodes k and j. By the assumption of statistical independence Hence the expected number of nodes competing with node k in slot s is and the competing nodes in slot s for node k is Substituting (9) into (1) we get By the assumption of statistical indepedence, N^k_compete(s) is binomial distributed. 2007/03/26 OPLAB, NTUIM

2007/03/26 OPLAB, NTUIM

Combining (8) and (10), we get a set of equations by which we can solve for p(s), s=1,2,.... Typically, as , so we can truncate the tail and consider only p(s), s=1,2,…,L for some large L, and then solve the fixed point equations by using standard iterative method. By observing the histograms of our simulation, we find that the distribution of S can be approximated by a geometric distribution. So we make a further approximation that 2007/03/26 OPLAB, NTUIM

Then we have similar to (4) and (5) we can derive the distribution of as follows and the distribution of as 2007/03/26 OPLAB, NTUIM

Then the probability that another node j will compete with node k in the given slot is 2007/03/26 OPLAB, NTUIM

Using (14) and (15) and after some manipulations, we get For the geometric distribution, for all s, hence for all s, which implies that the number of competing nodes in each slot s should be the same. Here we approximate M as the expectation of as Using (14) and (15) and after some manipulations, we get 2007/03/26 OPLAB, NTUIM

By observing the histograms of our simulation data, we find that the distribution of S can be approximated by a geometric distribution. So we make a further approximation that Then we have . Similar to (4) and (5) we can derive the distribution of τ as follows 2007/03/26 OPLAB, NTUIM

The distribution of as Then the probability that another node will compete with node k in the given slot is 2007/03/26 OPLAB, NTUIM

A fixed point iteration can be used to obtain E[S] from (18). Substitute , and into (17), we express the above equation in terms of as A fixed point iteration can be used to obtain E[S] from (18). 2007/03/26 OPLAB, NTUIM

2) Nonidentical Holdoff Exponents: Now we consider the case where holdoff exponents is not identical. 2007/03/26 OPLAB, NTUIM

2007/03/26 OPLAB, NTUIM

Again, by the assumption of statistical independence, Denote as the probability that node j will compete with node k in the given slot , which is given by (21), where . Again, by the assumption of statistical independence, 2007/03/26 OPLAB, NTUIM

Hence the distribution of is Similarly we can find the distributions of by the fixed point iterations. We further assume that are geometrical distributed as before, that is, assume Hence the distribution of is 2007/03/26 OPLAB, NTUIM

2007/03/26 OPLAB, NTUIM

2007/03/26 OPLAB, NTUIM

To estimate , we proceed as follows Derive from (21), (23) and (25). Here we directly give the approximation result as 2007/03/26 OPLAB, NTUIM

Note that combining (26) and (27), we have Again we can solve for using fixed point iteration. 2007/03/26 OPLAB, NTUIM

3) General Topology Scenario: (1)the neighborhood node sets of different nodes may be different (2)there exist unknown nodes, hence besides the competing cases 1 and 2, there are unknown competing nodes. Since unknown nodes are always regarded as competing nodes in each slot by the distributed election algorithm, we have minor modification 2007/03/26 OPLAB, NTUIM

Taking unknown nodes into account Again we can solve for using fixed point iteration. 2007/03/26 OPLAB, NTUIM

D. Performance Metrics Estimation: Let denotes the time node A needs to accomplish a three-way handshaking with node B. Now we can derive given the distributions of of all nodes is the time interval between node A sending a Request to B and B replying a Grant to A. is the time interval between B sending the Grant and A replying with a Confirm. 2007/03/26 OPLAB, NTUIM

By the independence assumption, and further assuming that the renewal processes of node A and B have run for a long time so that we can assume that follows a limiting distribution as the excess time However, may not follow the same distribution as since it is dependent on , thus the limiting distribution does not hold. It is very complicated to find the exact distribution of since the renewal interval is not geometrical distributed. 2007/03/26 OPLAB, NTUIM

Note that when , the renewal process of node A can be considered to run for a long time after sending Request, so in this case we can assume that In this case, On the other hand, when , since the portion of excess time is negligible, and 2007/03/26 OPLAB, NTUIM

Empirically, estimated as Based on the simulation data, we find for the identical holdoff exponents case and for the nonidentical exponents case. Compromising factor 2007/03/26 OPLAB, NTUIM

Once is known, from (25) we can calculate Employing the results of from previous subsections, we can determine for any two neighbor nodes handshake A and B by using (32) and (33). 2007/03/26 OPLAB, NTUIM

Outline Introduction IEEE 802.16 Distributed Scheduling Performance Analysis Evaluation Conclusion 2007/03/26 OPLAB, NTUIM

Evaluation A. Simulation Methodology 1) Collocated Scenario: The total transmission opportunities in control channel becomes 256 when the exponent value is 4. Varying the total node number from 10 to 128 to study the scheduler performance This study investigate two types of network topologies In the collocated scenario, all nodes are within the radio transmission range of each other so that every node can obtain the up-to-date schedule information of all the neighbors. 2007/03/26 OPLAB, NTUIM

2) General Topology: The scheduling information of some neighbors beyond one hop may become stale. The reason is that some one-hop neighbors could not update the schedule information in time for some specific transmission order. A neighbor node becomes unknown node once is schedule information is stale and always be treated as potential competitor. During the transmission time, a node can tell if a neighbo's schedule information is stale or not by comparing the node's schedules with the current time. 2007/03/26 OPLAB, NTUIM

In our simulation, the node placement of general topology is shown in Fig. 7. There are totally 30 nodes and the one-hop neighbors are connected by lines. The exponent values for the nodes are not identical and are also assigned arbitrarily from set {0,1,2,3,4}. 2007/03/26 OPLAB, NTUIM

B. Numerical Results (1) Transmission Interval: In the identical case: The node transmission intervals increase with the total node number and exponent values. When N becomes larger, the contention becomes more intensive so that a node has to compete more times before wins. When N becomes larger, the contention becomes more intensive so that a node has to compete more times before wins. Nonidentical we divide the N nodes into five groups of equal size. The nodes in each group takes the same exponent value from the set {0,1,2,3,4}. The analytical and simulation results are also compared. 2007/03/26 OPLAB, NTUIM

Figure8. shows the expected node consecutive transmission intervals H+E[S] obtained from (18) and simulations under various node numbers and exponent value, where N is the total node number and x is the exponent values. 2007/03/26 OPLAB, NTUIM

In the nonidentical exponent case: Divding the N nodes into five group of equal size. The nodes in each group takes the same exponent value from the set {0,1,2,3,4}. The analytical and simulation results are also compared. The system behaves similarly as in the identical exponent scenario with longer transmission intervals. 2007/03/26 OPLAB, NTUIM

Holdoff Time Dominates (2) Three-Way Handshaking Time: (1/2) Holdoff Time Dominates When N is large enough, the three-way handshaking time decreases first with the increase with the increase of exponent value and then goes up again. The reason is that the increase of x can reduce the channel competition to some extent when N is large. This phenomenon verifies our conclusion on the transmission interval. 2007/03/26 OPLAB, NTUIM

(2) Three-Way Handshaking Time: (2/2) the connection setup time for the nonidentical case is related to the requester and grantor order besides the exponent values. If the node with smaller exponent value is the requester, the requester node has more chance to send confirmation message during the grantor's holdoff time after it's reply. So the connection setup time is shorter. If the requestor exponent value is larger, => connection setup time becomes longer => connection setup time decided by requestor’s holdoff time 2007/03/26 OPLAB, NTUIM

(3) General Topology Scenario: interval and setup time are similar to those in collocated scenario. they can also be competing nodes in the collocated topology. The small variance of the total competing node number will not affect the system performance significantly.. 2007/03/26 OPLAB, NTUIM

Outline Introduction IEEE 802.16 Distributed Scheduling Performance Analysis Evaluation Conclusion 2007/03/26 OPLAB, NTUIM

CONCLUSIONS (1/2) In the mesh mode, every node competes for the channel access in a distributed manner and tries to broadcast its scheduling information periodically. This model assumes that the transmit time sequences of all the nodes in the control subframe form statically independent renewal processes. Based on this assumption, we have developed methods for estimating the distributions of the node transmission interval and connection setup delay 2007/03/26 OPLAB, NTUIM

CONCLUSIONS (2/2) A good reservation scheme should guarantee the bandwidth allocation fairness and improve the channel utilization at the same time. Such a reservation scheme needs the information such as the connection setup time and contention success probability provided by this model. Our future work is to propose such a reservation scheme taking into account the tradeoff between system resource utilization and the connection QoS requirement. 2007/03/26 OPLAB, NTUIM

In our study, we assumes the transmit time sequences of all the nodes in the control subframe form statistically independent renewal processes. Based on this assumption, we develop a stochastic model to estimate the control channel performance. 2007/03/26 OPLAB, NTUIM