a novel bandwidth allocation algorithm for ieee 802.16 tdd mode wireless access networks

Upload: ali-hasan-khan

Post on 04-Jun-2018

217 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/13/2019 A Novel Bandwidth Allocation Algorithm for IEEE 802.16 TDD Mode Wireless Access Networks

    1/24

    Wireless Pers Commun (2012) 67:665688DOI 10.1007/s11277-011-0403-7

    A Novel Bandwidth Allocation Algorithm for IEEE

    802.16 TDD Mode Wireless Access Networks

    Chia-Chuan Liang Jung-Shyr Wu

    Published online: 13 October 2011 Springer Science+Business Media, LLC. 2011

    Abstract In this paper, we propose a novel bandwidth allocation algorithm for a two-tier

    hierarchy in IEEE 802.16 time division duplex mode wireless access networks under sym-

    metric and/or asymmetric uplink and downlink traffic input. We demonstrate the performance

    of the new bandwidth allocation algorithm in terms of accumulated throughput (cumulative

    bandwidth) and fairness in both infinite and finite buffer cases compared with others by

    simulations. The simulation results show that the proposed algorithm not only can provide

    much better fairness and maintain satisfactory QoS support and high cumulative bandwidthbut also in the case of finite buffer depth is less buffer-consuming than the others, meaning

    that the hardware cost can be reduced by employing the proposed algorithm.

    Keywords Bandwidth allocation algorithm BWA Fairness IEEE 802.16 WiMAX

    1 Introduction

    Undoubtedly, the technologies specified in IEEE 802.16 standards[1,2] have been the most

    promising solutions in the broadband wireless access (BWA) networks. Among these stan-

    dards, the well-known worldwide interoperability for microwave access (WiMAX) networks

    has selected the technology of the point to multipoint (PMP) architecture as the common

    specification. In the PMP mode, the network at least consists of one base station (BS) and a

    number of subscriber stations (SSs) playing the role of last-mile access to the internet [3,4].

    C.-C. Liang

    Department of Electrical Engineering, National Central University, No. 300, Jhongda Rd.,Jhongli City 32001, Taoyuan County, Taiwan, ROC

    e-mail: [email protected]

    J.-S. Wu (B)

    Department of Communication Engineering, National Central University, No. 300, Jhongda Rd.,

    Jhongli City 32001, Taoyuan County, Taiwan, ROC

    e-mail: [email protected]

    1 3

  • 8/13/2019 A Novel Bandwidth Allocation Algorithm for IEEE 802.16 TDD Mode Wireless Access Networks

    2/24

    666 C.-C. Liang, J.-S. Wu

    Having defined four types of service[1], IEEE 802.16 standard still left the implemen-

    tation of resource allocation supporting the four different qualities of service (QoS) classes

    as an open issue. Several studies have devoted themselves in this area [514]. In [5], Chen

    proposed a scheduling algorithm called deficit fair priority queue (DFPQ) to obtain both the

    high accumulated throughput and better fairness under the asymmetric uplink and downlinktraffic. By utilizing the nature of unbalanced traffic as the dynamic bandwidth allocation

    mechanism, DFPQ could obtain better performance than strict priority queue (PQ) algo-

    rithm [6]. In these studies, some of them focus primarily on the QoS support [ 610] and

    others specifically concentrate on the bandwidth allocation [11,12]. While in[13,14], the

    authors propose a bandwidth allocation algorithm employing the queue state information and

    utilizing utility functions to distinguish the level of user satisfaction.

    As illustrated in [5], the time division duplex (TDD) mode can offer larger benefits than

    the frequency division duplex (FDD) mode in respect of dynamic and flexible resource allo-

    cation; besides, the two-tier scheduler can both control more efficiently all service flows

    and provide more organized QoS than one-tier one can[15]; hence, the authors investigate

    the bandwidth allocation problem specifically in IEEE 802.16 TDD mode wireless access

    networks. In this paper, we follow the same issue and propose a dynamic bandwidth allo-

    cation algorithm with a two-tier hierarchy that could obtain better performance in terms of

    cumulative bandwidth and fairness in both infinite and finite buffer cases than the DFPQ

    algorithm for IEEE 802.16 TDD mode wireless access networks under the symmetric and/or

    asymmetric uplink and downlink traffic input. This paper is a revision and expansion of the

    earlier research [16]; however, the major differences between the previous literature and the

    current one may be considered under the following heads: (1) the proposed algorithm has

    been revised to obtain the faster rate of converging to the steady state and the better fairness;(2) the performance evaluation in the finite buffer depth case has been included and the results

    show that the revised algorithm could save the buffer size in hardware at the expense of a more

    complicated resource and buffer control processing. Moreover, in regard to the second tier of

    the two-tier hierarchy, the proposed algorithm possessing long-term average throughput con-

    trol and short-term non-urgent bandwidth fine-tuning for each connection contrasts starkly

    with DFPQ with a variable DeficitCounterdetermined according to 1.2 times the value of

    the specified request for rtPS and nrtPS, 0.8 times the value of the specified request for BE

    and the size of the packets to maintain the maximum allowable bandwidth for each service

    class.

    The rest of the paper is organized as follows. In Sect. 2, we briefly introduce the QoSframework of IEEE 802.16 TDD mode wireless access networks. We elaborate the proposed

    bandwidth allocation algorithm by illustrating its flowchart and expound it in detail by an

    example in Sect.3.In Sect.4,we demonstrate the performance of the proposed algorithm

    by simulations. Finally, we conclude the paper in Sect. 5.

    2 The QoS Framework of IEEE 802.16 TDD Mode Wireless Access Networks

    The IEEE 802.16 standard[1] defines a connection-oriented MAC protocol, and a mecha-

    nism of QoS differentiation for four different types of services. In IEEE 802.16 TDD BWA

    networks, the QoS management mechanism located at BS consists of a module of admission

    control, a connection classifier, a bandwidth allocation scheduler, and a MAP generator, as

    depicted in Fig.1. The module of admission control is used to confine the number of flows

    entering the network to avoid overflow and starvation of the services. Among them, real-

    time constant bit rate (CBR) applications such as VoIP without silence suppression and time

    1 3

  • 8/13/2019 A Novel Bandwidth Allocation Algorithm for IEEE 802.16 TDD Mode Wireless Access Networks

    3/24

    A Novel Bandwidth Allocation Algorithm 667

    Fig. 1 The QoS framework of BS and SS

    division multiplexing (TDM) services are classified into UGS types; services of real-time

    variable bit rate such as MPEG streams or VoIP with silence suppression are categorized

    into rtPS types; non-real-time applications such as file transferring are grouped under nrtPStypes; services not subject to any QoS support such as those using HTTP are sorted out to

    BE types. Correspondingly, the specified arrival rates (such as users to apply for the bit rate)

    of the aforementioned types are denoted asUGS, rtPS, nrtPS, andBE, respectively.

    As shown in Fig.1,these service flows can be created, changed, or deleted through the

    messages, Dynamic Service Addition (DSA), Dynamic Service Change (DSC), and Dynamic

    Service Deletion (DSD)[1,2]. Each of the above actions can be initiated by either SS and/or

    BS. For example, a new service flow initiated by SS is built as follows: When SS detects

    the occurrence of a new service request, it will calculate the available resources to determine

    whether a DSA request will be sent or not. Upon the reception of the DSA request, BS ver-

    ifies if this request can be supported, and then sends a DSA response back to SS. Finally,according to the DSA response, the SS sends a DSA acknowledgement to BS and enables

    the new service flow.

    Because the IEEE 802.16 MAC protocol is designed to provide connection-oriented ser-

    vices, the SSs must first establish the connection with the BS to request the associated

    service flows (UGS, rtPS, nrtPS, and/or BE). Connections between SS and BS are identified

    by assigning a unique connection identifier (CID) to each uplink (from SS to BS) and/or

    downlink (from BS to SS) transmission.

    Once a connection is created, the connection classifier will look up its request and classify

    it into one of the UGS,

    rtPS,

    nrtPS, and BE service flows. Thereafter, the SSs will send thebandwidth request (BW-REQ) message to the BS. Each packet from the traffic is tagged

    with its own CID and service flow ID (SFID), and is classified by the connection classifier

    according to its CID and SFID, and then is forwarded to the corresponding scheduling list

    waiting to be served. The bandwidth allocation scheduler then retrieves the requests from

    the scheduling lists and the MAP generator generates a UL-MAP and/or DL-MAP message

    following the bandwidth allocation results accordingly.

    1 3

  • 8/13/2019 A Novel Bandwidth Allocation Algorithm for IEEE 802.16 TDD Mode Wireless Access Networks

    4/24

    668 C.-C. Liang, J.-S. Wu

    Fig. 2 Proposed two-tier scheduler structure

    3 Proposed Bandwidth Allocation Algorithm

    3.1 Two-Tier Bandwidth Allocation Hierarchy

    The proposed bandwidth allocation algorithm adopts a two-tier hierarchy to manipulate the

    dynamic bandwidth allocation, as illustrated in Fig.2.In order to handle the dynamic bandwidth allocation under the balanced and unbalanced

    traffic input, the transmission of uplink and downlink direction is considered simultaneously.

    The notation of the service types with prefix of UL represents the service flows in the uplink

    direction. The notation of the service types with prefix of DL represents the service flows in

    the downlink direction. Following[5], the BW-REQ of the connection served in the wait-

    ing scheduling list represents the number of requested packets in the uplink direction. After

    classified by the connection classifier, all packets are forwarded to the first tier schedul-

    ers composed of the schedulers of service flows UGS (including DL_UGS and UL_UGS),

    rtPS (including DL_rtPS and UL_rtPS), nrtPS (including DL_nrtPS and UL_nrtPS), and BE(including DL_BE and UL_BE) accordingly, as depicted in Fig. 2.In the first tier sched-

    ulers, the packet of each service flow is scheduled by the corresponding packet scheduling

    algorithms. Since the UGS service flow has a fixed bandwidth in transmission, it is allocated

    directly in each output frame without scheduling. Following the similar philosophy proposed

    in[5,6], the rtPS service flow is handled by means of the Earlier Deadline First (EDF) algo-

    rithm[17], i.e., the packets with the earliest deadline will be scheduled first. The deadline

    1 3

  • 8/13/2019 A Novel Bandwidth Allocation Algorithm for IEEE 802.16 TDD Mode Wireless Access Networks

    5/24

    A Novel Bandwidth Allocation Algorithm 669

    of the rtPS packet is calculated by its arrival time plus the maximum delay constraint of

    connection. The nrtPS service flow is scheduled according to the Weighted Fair Queuing

    (WFQ) algorithm [18] and the BE service flow is served following the Round Robin (RR)

    algorithm [19].

    On the other hand, the bandwidth allocation scheduler of the second tier is a kind of inter-class scheduling mechanism allocating bandwidth to each packet from the different service

    flows. Different from the ones investigated in [5,6], all the packets of connections coming

    from the first tier schedulers are re-scheduled into a temporary scheduling list according

    to their assigned priority by the proposed algorithm, Later Deadline First (LDF), until the

    transmission bandwidth of each frame is fully occupied. Eventually, the output traffic of the

    temporary scheduling list is combined with that of UGS to form the final re-ordered output

    frame. The priority of the different service flows managed by the proposed algorithm is

    assigned first according to its service type and then by its transmission direction. For various

    service flows, the priority is given as follows. Differentiated by the service type, the priority

    of rtPS service flow is greater than that of nrtPS service flow and the priority of nrtPS ser-

    vice flow is greater than that of BE service flow. In respect of transmission directions, the

    priority of the downlink direction is greater than that of uplink direction, with the exception

    of the rtPS service flow whose priority is further sorted out by its deadline regardless of the

    transmission direction.

    3.2 The Later Deadline First Algorithm

    As mentioned in the above section, we propose a novel bandwidth allocation algorithm called

    Later Deadline First, LDF, as the second tier scheduler to handle the different service flows

    and demands in IEEE 802.16 TDD wireless access networks. The name of LDF comes after

    the fact that the non-urgent rtPS packets with the latest deadline existing in the temporary

    scheduling list could be fine-tuned first by non-real-time packets (such as nrtPS or BE)

    according to the rules explained below.

    In order to obtain the benefits of LDF, we first categorize real-time packets (such as UGS

    or rtPS) into urgent ones and non-urgent ones according to their deadline constraints. The

    urgent real-time packets are real-time packets that must be served before the frame ends;

    otherwise, they will be dropped due to exceeding the deadline constraints. Therefore, the

    urgent rtPS packets own the highest priority than the other packets. A real-time packet issued

    at the j th frame is called an urgent real-time packet if its deadline constraint satisfies thefollowing criterion,

    0< ai,j + di t f, (1)

    where ai,j is the arrival time of the packet of the i th connection issued at the j th frame;direpresents the specified maximum delay constraint of thei th connection,tmeans the current

    time, and f is equal to the time duration of one frame. The other rtPS packets not meeting

    the above criterion are categorized into the non-urgent rtPS packets. Before the operation of

    LDF is formally introduced, we first define several items that are going to be used in the LDF

    operation as follows:

    ThNi : the accumulated throughput (cumulative bandwidth) of the connection

    C I Di over N frames[5]:

    ThNi =

    N

    j=0

    ma pi,j , (2)

    1 3

  • 8/13/2019 A Novel Bandwidth Allocation Algorithm for IEEE 802.16 TDD Mode Wireless Access Networks

    6/24

    670 C.-C. Liang, J.-S. Wu

    where ma pi,j is the bandwidth of the served packet of the connection

    C I Di at the j th frame.

    L f r am e: the total bandwidth of a frame.

    L total : the remaining bandwidth of a frame subtracting UGS fromL f r am e.

    La : the current available bandwidth of the frame.Counter[rtPS]: a counter recording the allocated bandwidth of rtPS connections in the

    current frame.

    Counter[BE]: a counter recording the allocated bandwidth of BE connections in the

    current frame.

    Counter[mapi]: a counter recording the accumulated bandwidth of the served packet of

    the connectionC I Di . The value stored in Counter[mapi]over N frames

    is equal toThNi .

    When LDF is initiated, all counters defined above are set to zero. Assume that the current

    frame is the Nth frame and there are totally k C I Ds with indices 1, . . . , n for UGS serviceflow,n + 1, . . . , mfor rtPS service flow,m + 1, . . . , lfor nrtPS service flow, and l + 1, . . . , k

    for BE service flow. We then illustrate the flowchart depicting LDF operation in Fig.3.

    According to Fig. 3, the operation principle of LDF can be explained in detail in the

    following steps:

    Step 1: At the beginning of each frame, all counters are initialized to zero except

    Counter[mapi] which is continuously accumulated at each frame, and L a =

    L f r a me UGSCounter[rtPS]Counter[BE] = L f r a me UGS00= L total .

    Step 2: Schedule the order of packets of DL_rtPS and UL_rtPS connections coming from

    the EDF algorithm of the first tier schedulers in a ascending way according totheir deadline. In this manner, the order of DL_rtPS and UL_rtPS packets may be

    changed at the beginning of every frame since the deadline of the packet of later

    arrivals may be earlier than that of the packet of previous ones. If the deadlines of

    two packets are the same, schedule the two packets following First-Come-First-

    Served (FCFS) service discipline. After that, schedule the ordered packets into

    a temporary scheduling list and record the allocated bandwidth in the counter

    Counter[rtPS]. Designate packets of connections that meet(1) as urgent real-time

    packets and label the others as non-urgent real-time packets.

    Step 3: Serve the packet waiting in the scheduling list and then record the bandwidth of theserved packet of the connection C I Di into the counter Counter[mapi]. Calculate

    the new value ofLa by computing L a = L total Counter[rtPS] Counter[BE].

    IfLa =0, go toStep 4. Otherwise, go toStep 5.

    Step 4: Check if there are other packets waiting to be served in the lower priority sched-

    uling lists. If there are, the first scheduling round has not ended yet. Under this

    condition, if the next packet to be served is in other lower priority scheduling lists,

    go toStep 4.1. Otherwise, go toStep 4.2. On the other hand, if the first scheduling

    round has ended, then go toStep 10.

    Step 4.1: Switch to the lower priority scheduling lists and then go to

    Step 4.2.Step 4.2: Check if the current serving packet is a non-real-time packet; if it is

    not, go back to Step 3; otherwise, check if the average throughput,

    ThN1i /N, of the connectionC I Di in the scheduling list indexed with

    i is less than its specified arrival rate i (specified arrival rate equals

    average data rate requirement based on traffic contract of the connec-

    tion), i.e., check ifThN1i /N =N1

    j =0 ma pi,j /N, i {m + 1, m +

    1 3

  • 8/13/2019 A Novel Bandwidth Allocation Algorithm for IEEE 802.16 TDD Mode Wireless Access Networks

    7/24

    A Novel Bandwidth Allocation Algorithm 671

    N-1

    N

    N N

    N

    N

    N

    N

    N

    Fig. 3 The flowchart of the LDF scheduling algorithm

    1 3

  • 8/13/2019 A Novel Bandwidth Allocation Algorithm for IEEE 802.16 TDD Mode Wireless Access Networks

    8/24

    672 C.-C. Liang, J.-S. Wu

    2, . . . , k} < i , whereN1

    j=0 mapi,j is the current stored value of

    Counter[mapi]. If this average throughput of the connection is less

    than its specified arrival rate, go back to Step 3; otherwise, go back to

    Step 4.

    Step 5: If the bandwidth of the frame in the temporary scheduling list is fully allocated

    to the rtPS packets, calculate the average throughput of the DL_nrtPS connection

    with the highest priority in the DL_nrtPS scheduling list by computing ThNi /N =Nj =0m api,j /N, i {m +1, m +2, . . . , l}, where

    Nj =0mapi,j is the current

    updated value stored in Counter[mapi], and then go to Step 7. Otherwise, go to

    Step 6.

    Step 6: Check if the current serving non-real-time packet is fragmented (i.e., the allocated

    bandwidth of the current frame is full while the current non-real-time packet is

    served). If it is fragmented, calculate its average throughput, ThNi /N, of the connec-

    tion with the fragmented packet in the scheduling list indexed withi by computingThNi /N =

    Nj=0mapi,j /N, i {m + 1, m + 2, . . . , k}, where

    Nj =0mapi,j is

    the current updated value (the stored value + the newly served fragmented part)

    stored in Counter[mapi], and then go to Step 7. Otherwise, calculate the average

    throughput of the connection of the next packet in the scheduling list indexed with

    r by computing ThNr /N =N

    j=0mapr,j /N, r {i +1, i +2, . . . , k}, whereNj =0m apr,j is the current updated value (the stored value + the newly served

    one) stored in Counter[mapr], and then go toStep 7.

    Step 7: Check if the average throughput of the connection computed in the previous step is

    less than its specified arrival rate. If it is less, go toStep 8. Otherwise, go toStep 9.Step 8: Calculate the average throughput of the connection of each packet tagged as non-

    urgent rtPS packets by computing ThNi /N, i {n + 1, n + 2, . . . , m}, where

    ThNi equals the value updated in the counter Counter[mapi]. Check if the average

    throughput of each non-urgent rtPS packet is greater than its specified arrival rate.

    If there is no such packet existing, go to Step 13. If there is more than one such

    packet, these packets are non-urgent rtPS packets that could be fine-tuned by non-

    real-time packets. The fine-tuning bandwidth, Fi , from non-urgent rtPS packets of

    the connectioni is calculated as follows:

    Fi =ThNi,nu i,nuN, i {n +1, n +2, . . . , m}, (3)

    whereThNi,nu is accumulated throughput of each non-urgent rtPS packet accommo-

    dated in the temporary scheduling list, that meets the condition of fine-tuning and

    i,nu is its specified arrival rate. Consequently, the total fine-tuning bandwidth can

    be calculated as

    i

    Fi =

    i

    (ThNi,nu i,nuN). (4)

    The available bandwidth,L

    a , now becomes

    i F

    i . Re-update the value stored inCounter[mapi] by subtracting the amount of fine-tuned bandwidth from the cur-

    rent value for each connection of non-urgent rtPS packets. Check if the average

    throughput of each non-urgent rtPS packet is equal to its specified arrival rate or

    the total fine-tuning bandwidth has been exhausted after the fine-tuning process.

    Note that the fine-tuning process will not cease until one of the above conditions

    is satisfied. If the fine-tuning process stops, go toStep 13. Otherwise, go toStep 9.

    1 3

  • 8/13/2019 A Novel Bandwidth Allocation Algorithm for IEEE 802.16 TDD Mode Wireless Access Networks

    9/24

    A Novel Bandwidth Allocation Algorithm 673

    Step 9: Check if there is no more packet from other lower priority scheduling lists. If it is

    so, go toStep 13. Otherwise, go toStep 9.1.

    Step 9.1: Check if the next packet is from other lower priority scheduling lists.

    If it is, switch to the lower priority scheduling lists and then calculate

    the average throughput,ThNi /N, of the connection of the packet in the

    lower priority scheduling list indexed withi by computingThNi /N =Nj =0mapi,j /N, i {m + 1, m +2, . . . , k}, and then go back to

    Step 7. Otherwise, calculate the average throughput of the connection

    of the next packet in the scheduling list indexed with rby computing

    ThNr /N =N

    j =0mapr,j /N, r {i +1, i +2, . . . , k}, and then go

    back toStep 7.

    Step 10: Check if all scheduling lists are empty. If it is true, go toStep 13. Otherwise, go to

    Step 11.

    Step 11: Begin the second scheduling round. Serve packets in the non-empty scheduling

    lists by the Weighted Round Robin (WRR) algorithm[20]. Determine the number

    of the packet, L i = f i x(L a Wi ), waiting to be served, where Wi is the weight

    (the ratio of the specified arrival rate of the connection coming from the non-empty

    scheduling list to sum of specified arrival rates of these connections waiting to be

    served from the non-empty scheduling lists),i is the index of the connection, and

    the function f i x(A)rounds the elements of A toward zero. Thereafter, check the

    new value ofLa . IfLa =0, go toStep 13. Otherwise, go toStep 12.

    Step 12: Begin the third scheduling round. The remaining bandwidth is allocated to the cor-

    responding packets from the scheduling lists according to the given priority andthen go toStep 13.

    Step 13: The generator sends theMAP message of the current frame and then the algorithm

    goes back toStep 1to process the next frame.

    For the highlighting of the key features of the LDF operation, the major steps of the LDF

    operation by a much further account of the rationale can be explicated below:

    InStep 2, the major purpose of DL_rtPS and UL_rtPS packets rearranged according to

    their deadline and FCFS service discipline is to serve urgent rtPS packets and to fine-tune

    the bandwidth of non-urgent rtPS packets.

    Steps 34.2make it plain that LDF schedules in turn rtPS packets rearranged accordingtoStep 2and non-real-time packets determined according to the average throughput of

    their connection being less than its specified arrival rate into a temporary scheduling

    list until the bandwidth of the current frame is fully allocated. In Step 4.2, the average

    throughput of the connection is less than its specified arrival rate equaling average data

    rate requirement based on traffic contract of the connection, meaning that the bandwidth

    of the connection has not yet been sufficed. The physical meaning for this is that LDF

    calculates average throughput of the connection before non-real-time packets are sched-

    uled into a temporary scheduling list. This aim is to maintain average throughput of the

    connection. The average throughput of the connection is equal to its specified arrival rate,indicating that the bandwidth of the connection has been sufficed and that its specified

    requirements are met; the average throughput of the connection is greater to its specified

    arrival rate, implying that the bandwidth of the connection has been excessively sufficed.

    In Step 5, the main goal of calculating the average throughput of the DL_nrtPS connection

    with the highest priority in the DL_nrtPS scheduling list is to fine-tune the bandwidth of

    non-urgent rtPS packets.

    1 3

  • 8/13/2019 A Novel Bandwidth Allocation Algorithm for IEEE 802.16 TDD Mode Wireless Access Networks

    10/24

    674 C.-C. Liang, J.-S. Wu

    Similarly, calculating average throughput of the connection of non-real-time packets in

    Step 6andStep 9.1is primarily concerned with fine-tuning the bandwidth of non-urgent

    rtPS packets.

    Step 8explains that non-real-time packets could fine-tune the total fine-tuning bandwidth

    calculated from the average throughput of the connection of non-urgent rtPS packetsbeing greater than its specified arrival rate when the average throughput of their connec-

    tion is less than its specified arrival rate.

    To fairly allocate the bandwidth unallocated in first scheduling round to each connection,

    the unallocated bandwidth left after first scheduling round end can be served by means

    of the WRR algorithm presented particularly inStep 11.

    InStep 12, Utilizing the function f i x(A)in the second scheduling round could lead to

    remaining some bandwidth in third scheduling round; as a result, the remaining band-

    width left after the second scheduling round end is allocated to the corresponding packets

    from the scheduling lists according to the given priority.

    Having expounded the LDF operation principle, we subsequently turn to the LDF test

    case by an example in the next subsection.

    3.3 The Example Test-Case of the LDF Algorithm

    In order to clarify the LDF operation principle clearly, we demonstrate the LDF operation

    by an elaborate example in Fig.4. In this example, we first assume

    The total transmission capacity of the link,Ctotal

    , equals 0.3 Mbps.

    The duration of one frame, f, is 10 ms; therefore, L f r a me=3,000 bits.

    The UGS service flow is set to 500 bits/frame; hence,L total =2,500 bits.

    There are only two types of service, rtPS and BE.

    There are 4 connections of rtPS service flow denoted as C I D1, C I D2, C I D3, and C I D4each with the specified arrival rate 1 = 600 bits/frame, 2 = 250 bits/frame, 3 = 300

    bits/frame, and 4 = 150 bits/frame, respectively. The maximum delay constraint for

    each CID isd1 =10 ms,d2 =30 ms,d3 =40 ms, andd4 =50 ms, respectively.

    There are 3 connections of BE service flow denoted asC I D5, C I D6, andC I D7 each

    with the specified arrival rate5 = 400 bits/frame,6 =400 bits/frame, and7 =400

    bits/frame, respectively.

    Secondly, because of the fine-tuning process, some of the packets of the rtPS connection

    issued in the previous frame may be reserved to be served at the current frame. For the sake

    of easiness of understanding the fine-tuning process, we introduce two notations, pkti,j and

    di,j , for the example, in which pkti,j is the packet of the i th connection issued at the j th

    frame and di,j = ai,j +di is the deadline of pk ti,j . Again, the accumulated throughput,

    ThNi =N

    j =0mapi,j , is equal to the accumulated bandwidth of the served packet of the

    connectionC I Di storing in Counter[mapi]over Nframes. Hereafter, the calculation of the

    average throughput will recall the value from Counter[map

    i]

    directly.AsshowninFig. 4a,atthebeginningofFrame1,currenttimet= 0sec,N= 1,pkt1,1 = 600

    bits, pkt2,1 = 300 bits, pkt3,1 = 400 bits, pkt4,1 = 200 bits, pk t5,1 = 800 bits, pkt6,1 = 450

    bits, andpkt7,1 = 100 bits. The arrival time of these packets issued at Frame 1, a1,1, . . . , a7,1,

    is equal to 0 sec. The deadline of each rtPS packet, pk t1,1,pkt2,1,pkt3,1, and pkt4,1,

    is d1,1 = a1,1 + d1 = 10 ms, d2,1 = a2,1 + d2 = 30 ms, d3,1 = a3,1 + d3 = 40 ms, and

    d4,1 = a4,1 + d4 = 50 ms, respectively. Initially, in accordance with Step 1, all counters are

    1 3

  • 8/13/2019 A Novel Bandwidth Allocation Algorithm for IEEE 802.16 TDD Mode Wireless Access Networks

    11/24

    A Novel Bandwidth Allocation Algorithm 675

    (a)

    (b)

    Fig. 4 An example demonstrating the LDF algorithm:athe fine-tuning process of the first scheduling round;

    bthe weighted bandwidth allocation in the second scheduling round

    1 3

  • 8/13/2019 A Novel Bandwidth Allocation Algorithm for IEEE 802.16 TDD Mode Wireless Access Networks

    12/24

    676 C.-C. Liang, J.-S. Wu

    reset to 0, andL a = L f r am e U G S Counter[rtPS] Counter[BE] = 3, 000 500 0

    0 = 2, 500 =L total . Since the rtPS service flow own the higher priority, its packet is allocated

    first.

    At the service point 1-1, the scheduled order of these packets is pkt1,1,pkt2,1,pkt3,1,

    and finally pk t4,1 by the EDF algorithm. Following the operation principle in Step 2, sincethere is no reserved packet left due to the fine-tuning in the previous frame, the original

    scheduled order is preserved in the temporary scheduling list. Among these packets, since

    0 < a1,1 + d1 t f,pkt1,1 meets (1). Therefore, pkt1,1 is tagged as a urgent real-time

    packet. The rest of the rtPS packets, pkt2,1,pkt3,1, and pkt4,1, are labeled as non-urgent

    real-time packets. Next, by Step 3, serve pk t1,1 600 bits in the rtPS scheduling list first.

    At this moment, the bandwidth of rtPS connections recorded in Counter[rtPS] is equal to

    600 and the bandwidth of the served packet recorded in Counter[map1]is also equal to 600

    resulting inL a = L total Counter[rtPS] Counter[BE] =2, 500 600 0= 1,900. Since

    L a =0, identify if the first scheduling round has ended or not following the criteria depicted

    in Step 4. As the next packet waiting to be served in the rtPS scheduling list ispkt2,1, the first

    scheduling round has not ended yet. Also, because pk t2,1 is not in the other lower priority

    scheduling list, the algorithm jumps toStep 4.2to examine whether the packet is a non-real-

    time packet or not. Since pkt2,1 is not a non-real-time packet, the algorithm goes back to

    Step 3and schedules pkt2,1into the temporary scheduling list. Now, Counter[rtPS] becomes

    pk t1,1+ pk t2,1 =600 + 300= 900 and Counter[map2] equals pkt2,1 =300, which leads

    to La = L total Counter[rtPS] Counter[BE]= 2,500900 0=1,600. The remaining

    packets in rtPS scheduling list are served following the same operation principle until the

    rtPS scheduling list is empty completely. At this moment, the scheduled order of rtPS packets

    into the temporary scheduling list is pkt1,1,pkt2,1,pkt3,1, and finally pkt4,1, as depictedin Fig.4a. Now, Counter[rtPS] becomes pkt1,1 + pkt2,1 + pk t3,1 + pkt4,1 =600 + 300 +

    400 + 200= 1500, Counter[map3] = pkt3,1 = 400, Counter[map4] = pk t4,1 = 200, and

    L a = L total Counter[rtPS] Counter[BE] = 2,5001500 0 = 1,000, meaning that there

    are still 1,000 bits bandwidth available to serve BE packets. Because L a =0, the algorithm

    moves to evaluate the condition ofStep 4 thereon. The next packet waiting to be served is

    pk t5,1listed in the BE scheduling list with lower priority; therefore, the algorithm moves to

    Step 4.1to examine the current serving packet from the lower priority BE scheduling list.

    At the service point 1-2, sincepkt5,1is a non-real-time packet coming out of the BE sched-

    uling list, the condition ofStep 4.2is sufficed. Beforepkt5,1is scheduled into the temporary

    scheduling list, the current average throughput ofC I D5 is Counter[map5]/1=0/1 =0 4, Counter[map3]/1 = 400/1 = 400 > 3, and

    Counter[map2]/1 = 300/1 = 300> 2, respectively. Consequently, the bandwidth allocated

    to pk t4,1 can be fine-tuned by (3), which is equal to F4 = Th14 4N= Counter[map4]

    (1501) = 200150 = 50. Similarly, the bandwidthallocated topkt3,1 andpkt2,1 also meets

    the fine-tuning criteria. The fine-tuned bandwidth ofpk t3,1and pkt2,1is F3 = Th13 3N=

    Counter[map3] (300 1) = 400 300 = 100 and F2 = Th12 2N= Counter[map2]

    (250 1) = 300 250 = 50, respectively. The fine-tuning process results in the reduction of

    the bandwidth allocation of pk t4,1,pkt3,1, and pkt2,1in the temporary scheduling list. The

    final bandwidth allocated to pkt4,1,pkt3,1, and pkt2,1 now reduces to pkt4,1 F4 = 150

    bits, pk t3,1 F3 = 300 bits, and pkt2,1 F2 = 250 bits, respectively. The algorithm then

    updates the final allocated bandwidth to Counter[map4], Counter[map3], and Counter[map2]

    respectively. Accordingly, following (4), La now equals

    i Fi = F4+ F3+ F2 = 200.At the service point 14, due to the fine-tuning process, the current available bandwidth

    L a is allocated to the fragmented part ofC I D6. After fine-tuning, there ar still 50 bits of

    pk t6,1 and 100 bits of pk t7,1 in the waiting scheduling list of BE waiting to be served. The

    algorithm then updates Counter[map6] to pk t6,1 + pk t6,1 = 200+200 = 400. At this

    instant, the total fine-tuning bandwidth is exhausted; hence, followingStep 13, the algorithm

    triggers theMAP generator to send out theMAP message of Frame 1 and then goes back to

    Step 1to process Frame 2.

    As depicted in Fig. 4b, at the beginning of Frame 2, the current time t= 10 ms,

    N= 2, there are still 50 bits of pk t2,1 with the deadline d2,1 = a2,1 + d2 = 30 ms,

    100 bits of pk t3,1 with the deadline d3,1 = a3,1 + d3 = 40 msec, 50 bits of pkt4,1with the deadline d4,1 = a4,1 + d4 = 50 ms, 50 bits of pk t6,1, and 100 bits of pk t7,1left in corresponding waiting scheduling lists, while new packets, pkt1,2 = 700 bits,

    pk t2,2 = 250 bits, pkt3,2 = 350 bits, pk t4,2 = 150 bits, pk t5,2 = 600 bits, pkt6,2 = 300 bits,

    and pk t7,2 = 350 bits, each with arrival time 10 ms (i.e., a1,2 = a2,2 = . . . = a7,2 = 10 ms)

    arrive. The deadline of each new rtPS packet is d1,2 = a1,2 + d1 = 20 ms, d2,2 = a2,2 +

    d2 = 40 ms, d3,2 = a3,2 + d3 = 50 ms, and d4,2 = a4,2 + d4 = 60 ms. At this instant,

    Counter[map1] = 600, Counter[map2] = 250, Counter[map3] = 300, Counter[map4] = 150,

    Counter[map5] = 800, Counter[map6] = 400, and Counter[map7] = 0 while Counter[rtPS]

    and Counter[BE] are initialized to 0.At the service point 21, following Step 2, sort out the new scheduled order for the old

    and the new rtPS packets according to its deadline and FCFS service discipline in a sequence

    of pkt1,2 = 700 bits with the deadline 20 ms, pk t2,1 = 50 bits with the deadline 30 ms,

    pk t3,1 = 100 bits with the deadline 40 ms, pk t2,2 = 250 bits with the deadline 40 ms,

    pk t4,1 = 50 bits with the deadline 50 ms, pk t3,2 = 350 bits with the deadline 50 ms, and

    1 3

  • 8/13/2019 A Novel Bandwidth Allocation Algorithm for IEEE 802.16 TDD Mode Wireless Access Networks

    14/24

    678 C.-C. Liang, J.-S. Wu

    pk t4,2 =150 bits with the deadline 60 ms. Among these packets, onlypk t1,2meets (1) since

    0< a1,2 +d1 10=10 10. Therefore,pkt1,2is tagged as an urgent real-time packet. Since

    the service discipline of BE connections is always FCFS and RR, the scheduled order of the

    BE packets is in a sequence ofpkt6,1,pkt7,1,pkt5,2, pkt6,2, and pkt7,2. The algorithm then

    goes to Step 3 and then schedules the 700 bits ofpkt1,2into the temporary scheduling list. Atthis moment, Counter[rtPS] is set to 700, and Counter[map1] is updated to 600+700=1,300,

    makingL a =2,5007000= 1,800. Theother packets listed in the rtPS waiting scheduling

    list will be processed following the similar steps depicted in service point 1-1 repeatedly until

    the whole rtPS scheduling list is empty. Consequently, the order of the rest of the rtPS packets

    into the temporary scheduling list ispkt2,1,pkt3,1,pkt2,2,pkt4,1,pkt3,2, and finallypkt4,2.

    Now, Counter[rtPS] is set to 700+50+100+250+50+350+150= 1,650, Counter[map3]

    is updated to 300 + 100 + 350=750, Counter[map4] is updated to 150 + 50 + 150=350

    resulting inL a =2,500 1,650 0=850, which indicates that there are 850 bits available

    to serve BE packets. Seeing that L a =0 and the first scheduling round has not ended since

    pk t6,1 is in the lower priority BE scheduling list, the service point moves to serve pk t6,1 in

    the lower priority BE scheduling list.

    At the service point 22, the packets listed in the BE waiting scheduling list are served

    adhering to the steps illustrated in service point 12 until the BE scheduling list is empty

    except 600 bits of pk t5,2 since only its average throughput ofC I D5 has reached the spec-

    ified arrival rate 5. Then 600 bits of pkt5,1 are held back in the BE waiting scheduling

    list. Accordingly, the order of BE packets scheduled into the temporary scheduling list is

    pk t6,1,pkt7,1,pkt6,2, and finally pkt7,2making Counter[BE] =50 + 100 + 300 + 350=

    800, Counter[map6] =400 + 50 + 300=750, Counter[map7] =0 + 100 + 350= 450, and

    L a = L total Counter[rtPS] Counter[BE] =2,500 1,650 800= 50. Since La =0,the algorithm goes to Step 4again, and finds out that there is no more other service request

    waiting to be served; hence, the algorithm identifies the first round is completed. Thereafter,

    the algorithm moves to Step 10to check if all scheduling lists are empty. Since the BE waiting

    scheduling list is not empty and there is still bandwidth available to be allocated in the current

    output frame, the algorithm goes to Step 11to proceed the second scheduling round.

    At the service point 23, since pkt5,2 is still listed in the BE waiting scheduling list, the

    algorithm then determines the weightW5by computingW5 = 5/(1 5+0 6+0 7)=

    5/5 =1. It then calculates L i byL i = f i x(La W5)= f i x(50 1)= 50. This means

    that only 50 bits of pk t5,2 is allowed to be served, leaving 600 50 =550 bits listed in the

    BE waiting scheduling list. Next, the algorithm updates Counter[BE] to 800 + 50= 850 andCounter[map5] to 800+ 50 = 850 leading to L a = 2,500 1,650850 = 0. Now, since

    L a = 0, the algorithm goes to Step 13; the generator sends the MAP message of Frame 2.

    The algorithm then goes back toStep 1to process Frame 3.

    From the elaboration of the operation principle of the proposed algorithm, it is easy to

    observe that the proposed bandwidth allocation algorithm, LDF, possesses two important

    characteristics, long-term average throughput control and short-term non-urgent bandwidth

    fine-tuning. Intuitively, we infer that LDF can not only guarantee the QoS requirements but

    also provide better fairness in both the infinite and the finite buffer case. We validate this

    inference by simulations in the next section.

    4 Performance Analysis: Simulation Results

    The simulation assumptions are sixfold: (1) the total capacity of the link, Ctotal , is equal to

    10 Mbps and the duration of one frame, f, equals 10 ms; therefore,L f r a me =100 Kbits. (2)

    1 3

  • 8/13/2019 A Novel Bandwidth Allocation Algorithm for IEEE 802.16 TDD Mode Wireless Access Networks

    15/24

    A Novel Bandwidth Allocation Algorithm 679

    Table 1 Simulation parametersCID Type Maximum delay

    constraint (ms)

    1 DL_rtPS 10 60

    2 DL_rtPS 10 40

    3 DL_rtPS 10 20

    4 UL_rtPS 7 70

    5 UL_rtPS 7 50

    6 UL_rtPS 6 30

    7 DL_nrtPS 6

    8 DL_nrtPS 6

    9 DL_nrtPS 6

    10 UL_nrtPS 4

    11 UL_nrtPS 4

    12 UL_nrtPS 4

    13 DL_BE 2

    14 DL_BE 2

    15 DL_BE 2

    16 UL_BE 2

    17 UL_BE 1

    18 UL_BE 1

    The total bandwidth of the UGS service flow in each frame is 10 Kbits. (3) Each service flow

    has three connections; for easiness, the connections of the UGS service flow are not given

    anyC I D, and hence the total number ofC I Ds is 18. (4) The packets are assumed to arrive

    at the beginning of each frame following the Poisson distribution with the specified arrival

    rate,i , i {1, 2, . . . , 18}, for each connection. (5) The traffic ratio between the downlink

    and the uplink direction is set to 3 : 2 to reflect the impact of the asymmetric uplink and

    downlink traffic input. (6) The corresponding QoS parameters (both the specified arrival rate

    which equals average data rate requirement and the maximum delay constraint form traffic

    contract of the connection for rtPS; and further, the specified arrival rate for nrtPS and BE)

    specified for each service connection are given in Table1.The simulation output following

    the Arrival-Service curve concept [6]: (1) the (generated) arrival curve describing the arrival

    pattern of the traffic input; (2) the service curve presenting the service pattern provided by

    the bandwidth allocation scheduler. For notational convenience, letGenNi denote cumulative

    bandwidth of the generated arrival of the connection C I Di over Nframes. The cumulative

    bandwidth of the generated arrival can be calculated by:

    GenNi =

    N

    j =0

    poi ssr nd(i,j ), (5)

    where poissrnd(i,j ) is the generated arrival of the connection C I Di following Poisson dis-

    tribution with specified arrival rate i at the j th frame. We then investigate the performance

    of the LDF algorithm in the cases of the infinite and finite buffer depth, respectively.

    1 3

  • 8/13/2019 A Novel Bandwidth Allocation Algorithm for IEEE 802.16 TDD Mode Wireless Access Networks

    16/24

    680 C.-C. Liang, J.-S. Wu

    4.1 Infinite Buffer Depth Case

    To gain insight into the advantage of the LDF algorithm in serving packets, the notation,

    X, is introduced to represent the deviation of the cumulative bandwidth from the specified

    requirements for both the simulated (generated) arrival and the accumulated throughput. Xof the cumulative bandwidth is defined as follows:

    X =(ThNi or GenNi ) iN, i =1, 2, . . . , 18, (6)

    where the accumulated throughput ThNi and cumulative bandwidth of the generated arrival

    GenNi of the connection C I Di follow(2) and(5), respectively, i is its specified arrival

    rate, Nis the total number of scheduled frames currently, and iNis the cumulative band-

    width of the specified arrival. Obviously, X = 0 means that the cumulative bandwidth

    of the generated arrival or the accumulated throughput is equal to that of the specified one;

    X >0 indicates that the cumulative bandwidth of the generated arrival or the accumulated

    throughput is greater than that of the specified one. Figure5depictsXof each connection

    at N = 1 108. From Fig. 5, it is observed that the generated cumulative bandwidth of

    the connectionsC I D2, C I D7, C I D8, C I D10, C I D14, C I D16, andC I D17 is greater than

    the specified one while the generated cumulative bandwidth of the other connections is

    less than or equal to the specified one. The generated cumulative bandwidth of the connec-

    tionsC I D1, . . . , C I D9, C I D11, . . . , C I D13, andC I D15 is all served by LDF and DFPQ,

    whether the generated arrival are greater than the specified one or not. The uplink nrtPS

    connections and the QoS requirements, specified arrival rate and maximum delay constraints

    given in Table1, of all the rtPS connections are sufficed by deploying LDF and DFPQ. Thegenerated cumulative bandwidth of the uplink nrtPS connection, C I D10, and the downlink

    BE connection, C I D14, could be all served by using DFPQ and could not be all served

    by employing LDF. However, it is also observed that the cumulative bandwidth ofC I D10employing LDF is already greater than the specified one and the cumulative bandwidth of

    C I D14 is exactly equal to the specified one. This means that the less bandwidth has been

    allocated to these connections by using LDF since these connections have already obtained

    enough bandwidth, i.e., the specified cumulative bandwidth requirements of these connec-

    tions are already sufficed. The sufficed bandwidth that is allocated to the connections C I D10and C I D14 by using DFPQ is used to serve the uplink BE connections C I D16, C I D17,

    andC I D18 when adopting LDF making the accumulated throughput ofC I D16and C I D17equals its specified cumulative bandwidth and letting the accumulated throughput ofC I D18equals its generated cumulative bandwidth. Therefore, LDF achieves significantly better per-

    formance than DFPQ. Consequently, the service curve of the uplink BE connections is greatly

    improved and its specified requirements are met. In addition, the reason that the accumu-

    lated throughput of the connections, C I D7, C I D8, andC I D10, is greater than its specified

    cumulative bandwidth is that all the generated cumulative bandwidth of these connections

    is served except the one of C I D10 and that its accumulated throughput has sufficed the

    specified requirements. Therefore, the remaining capacity of the link could be allocated to

    the connections with accumulated throughput equaling their specified requirements by thegiven priorities. In Fig.5, since the QoS requirements of all the rtPS connections are sufficed

    and served completely, the three nrtPS connections,C I D7, C I D8, andC I D10, have higher

    priority than the rest of the connections, and the extra bandwidth could be allocated to them

    resulting in the cumulative bandwidth being greater than the specified one.

    Figures6,7, and8illustrate the comparisons of the arrival and service curves in terms of

    the cumulative bandwidth following (2) and(5)between LDF and DFPQ at N = 1 108

    1 3

  • 8/13/2019 A Novel Bandwidth Allocation Algorithm for IEEE 802.16 TDD Mode Wireless Access Networks

    17/24

    A Novel Bandwidth Allocation Algorithm 681

    Fig. 5 The comparison of

    deviation of the cumulative

    bandwidth of the generated

    arrival and the accumulated

    throughput from the specified

    requirements of each connection

    between LDF and DFPQ at

    N =1 108

    with infinite buffer depth for rtPS, nrtPS, and BE service flows, respectively; additionally,

    the result of each figure is composed of three connections presented in Table 1 for each

    service flow. For a more detailed understanding of this relationship of Figs. 5,6,7, and8,

    the close look at the downlink rtPS connections (C I D1, C I D2, and C I D3), uplink rtPS

    connections (C I D4, C I D5, and C I D6), downlink nrtPS connections (C I D7, C I D8, and

    C I D9), uplink nrtPS connections (C I D10, C I D11, andC I D12), downlink BE connections

    (C I D13, C I D14, andC I D15), and uplink BE connections (C I D16, C I D17, andC I D18) of

    Fig.5is reflected in Figs.6,7, and8,respectively. As Fig.5indicates, the generated cumu-

    lative bandwidth of the connectionsC I D1, . . . , C I D9is all served well by LDF and DFPQ,whether the generated cumulative bandwidth is greater than the specified one or not. These

    results combined their own three connections are reflected in Figs. 6a, b, and 7a, respectively;

    it is apparent that these service curves adapt and follow these arrival curves. The reason why

    rtPS can be served very well by LDF is that the order of the rtPS packets is arranged in order

    of its deadline and the urgent real-time packets must be served before the frame ends. By

    contrast, the reason that rtPS can be served very well by DFPQ is that DFPQ allows serving

    the amount of bandwidth determined according to both the size of the packets and 1.2 times

    the value of the specified request for rtPS and nrtPS to maintain the maximum allowable

    bandwidth. For these reasons given above, there is no packet discarded in rtPS using LDF

    and DFPQ. As a result, it is quite obvious that both the LDF and DFPQ algorithm can assurethe QoS requirements of the rtPS service flow. Likewise, in Fig. 5,it is easy to perceive that

    since not only the cumulative bandwidth ofC I D10andC I D14utilizing LDF is slightly less

    than its generated one but also the cumulative bandwidth ofC I D11, C I D12, C I D13, and

    C I D15 is equal to generated one, the service curves of both uplink nrtPS and downlink BE

    exploiting LDF are slightly less than its generated cumulative bandwidth revealed in Figs.7b

    and8a, respectively; besides, these service curves employing LDF are slightly worse than

    those using DFPQ. Nevertheless, this is actually an advantage rather than a shortage, since

    these service flows have already met their specified cumulative bandwidth requirements, i.e.,

    the circle in Fig.5designates the accumulated throughput equaling the specified cumulativebandwidth whenX =0. Therefore, it is not necessary to allocate more bandwidth to these

    connections. Similarly, Figs. 5and8b appear to be highly related in the sense that as the

    cumulative bandwidth of both C I D16 and C I D17 applying LDF is equal to its specified

    one and the cumulative bandwidth ofC I D18 using LDF is equal to the generated one, the

    service curve of the uplink BE service flow is also significantly enhanced. The main reason

    is that the bandwidth unallocated to the connectionsC I D10andC I D14can be used to serve

    1 3

  • 8/13/2019 A Novel Bandwidth Allocation Algorithm for IEEE 802.16 TDD Mode Wireless Access Networks

    18/24

    682 C.-C. Liang, J.-S. Wu

    Fig. 6 The arrival and service

    curves of the rtPS service flow at

    N =1 108 with infinite buffer

    depth:adownlink;buplink

    9.999 9.9992 9.9994 9.9996 9.9998 10

    x 108

    2,999,700,000

    2,999,750,000

    2,999,800,000

    2,999,850,000

    2,999,900,000

    2,999,950,000

    3,000,000,000

    Time (msec)

    (a)

    (b)

    CumulativeBandwidth(kbits)

    GeneratedArrival

    Service-LDF

    Service-DFPQ

    9.999 9.9992 9.9994 9.9996 9.9998 10

    x 108

    1,999,760,000

    1,999,800,000

    1,999,840,000

    1,999,880,000

    1,999,920,000

    1,999,960,000

    Time (msec)

    CumulativeBandwidth(kbits)

    GeneratedArrivalService-LDF

    Service-DFPQ

    more uplink BE requests; consequently, the service curve of the uplink BE service flow not

    only is greatly improved and can conform to the specified requirements but also reveals the

    superiority of LDF over DFPQ.

    Following the same scenario, we then investigate the performance of fairness by means

    of the coefficient of variation. The coefficient of variation (CV) is defined as

    C V =Standard Deviation

    Mean=

    1n1

    nk=1(xk )

    2

    , (7)

    where kis the index of the connection, nis the number of connections, the mean, , ofxkcan

    be expressed as 1n

    nk=1xk, andxkis the ratio of the kth connection accumulated throughput

    to its optimal one. Thekth connection optimal accumulated throughput is equal to the cumu-

    lative bandwidth of its specified arrival. From the definition of the coefficient of variation, it

    is obvious that the closer thexk, k =1, 2, . . . , n, is to each other, the closer the coefficient of

    variation is to 0, denoting better fairness in bandwidth allocation. Stated another way, lowervalues (down to zero) of this metric imply greater fairness. Figure 9 illustrates the fairness

    comparison in the coefficient of variation between LDF and DFPQ, where the unit of time is

    in ms and is equal to the number of frames Ntimes one frame duration 10 ms. From Fig.9,

    it is easy to observe that as time goes by the coefficient of variation becomes closer and

    closer to 0 and finally achieves its steady state. From Fig.9,it is clear that LDF converges

    to its steady state in a monotonic way with a faster speed than DFPQ. This indicates that

    1 3

  • 8/13/2019 A Novel Bandwidth Allocation Algorithm for IEEE 802.16 TDD Mode Wireless Access Networks

    19/24

    A Novel Bandwidth Allocation Algorithm 683

    Fig. 7 The arrival and service

    curves of the nrtPS service flow at

    N =1 108 with infinite buffer

    depth:adownlink;buplink

    9.999 9.9992 9.9994 9.9996 9.9998 10

    x 108

    1,799,860,000

    1,799,900,000

    1,799,940,000

    1,799,980,000

    1,800,020,000

    Time (msec)

    (a)

    (b)

    CumulativeBandwidth(kbits)

    GeneratedArrival

    Service-LDF

    Service-DFPQ

    9.999 9.9992 9.9994 9.9996 9.9998 10

    x 108

    1,199,880,000

    1,199,900,000

    1,199,920,000

    1,199,940,000

    1,199,960,000

    1,199,980,000

    1,200,000,000

    Time (msec)

    CumulativeBandwidth(kbits)

    GeneratedArrivalService-LDF

    Service-DFPQ

    LDF could indeed provide better fairness in bandwidth allocation regardless of the bursty

    characteristics of traffic in time. From the above results, we can validate our inference that

    LDF can not only guarantee the QoS requirements but also provide better fairness due to

    possessing characteristics of long-term average throughput control and short-term non-urgent

    bandwidth fine-tuning.

    4.2 Finite Buffer Depth Case

    In the case of infinite buffer depth, only the real-time rtPS packets will be dropped due to

    over the maximum delay constraints. In the case of finite buffer depth, not only the real-time

    packets but also the non-real-time ones will be dropped due to over the finite buffer depth. In

    order to investigate the effectiveness of LDF running over finite buffer condition, the packets

    drop ratio ( P D R) is introduced to evaluate the performance. P D R is defined as follows:

    P D R =Cumulative Dropped packets

    Cumulative Generated packets

    , (8)

    where Cumulative Dropped packets represents the total number of dropped packets and

    Cumulative Generated packetsdenotes the total number of generated packets.

    Figure10depicts the comparison between LDF and DFPQ in P D Ragainst buffer length

    of downlink and uplink rtPS, nrtPS, and BE service flows at N = 1 108. It is observed

    that both LDF and DFPQ can ensure the QoS requirements since there is no packet dropped

    1 3

  • 8/13/2019 A Novel Bandwidth Allocation Algorithm for IEEE 802.16 TDD Mode Wireless Access Networks

    20/24

    684 C.-C. Liang, J.-S. Wu

    Fig. 8 The arrival and service

    curves of the BE service flow at

    N =1 108 with infinite buffer

    depth:adownlink;buplink

    9.999 9.9991 9.9992 9.9993 9.9994 9.9995 9.9996 9.9997 9.99989.9999 10

    x 108

    599,920,000

    599,940,000

    599,960,000

    599,980,000

    600,000,000

    Time (msec)

    (a)

    (b)

    CumulativeBandwidth(kbits)

    GeneratedArrival

    Service-LDF

    Service-DFPQ

    9.999 9.9991 9.9992 9.9993 9.9994 9.9995 9.9996 9.9997 9.99989.9999 10

    x 108

    399,920,000

    399,940,000

    399,960,000

    399,980,000

    Time (msec)

    CumulativeBandwidth(kbits)

    GeneratedArrivalService-LDF

    Service-DFPQ

    Fig. 9 The fairness comparison

    in the coefficient of variation

    between LDF and DFPQ

    1 2 3 4 5 6 7 8 9 10

    x 108

    0.5

    1

    1.5

    2

    2.5

    3

    3.5

    4x 10

    -4

    Time (msec)

    CoefficientofV

    ariation

    LDF

    DFPQ

    in the rtPS, uplink nrtPS and downlink BE service flows. However, in Fig.10a, the packets

    of connections of the downlink nrtPS service flow adopting LDF begins to be dropped when

    the buffer length is less than 3.3 104 kbits while there is still no packet dropped for the

    same service flow employing DFPQ. The reason is that some excessive packets arrive while

    LDF sustains the specified value of the request by its long-term average throughput control,

    1 3

  • 8/13/2019 A Novel Bandwidth Allocation Algorithm for IEEE 802.16 TDD Mode Wireless Access Networks

    21/24

    A Novel Bandwidth Allocation Algorithm 685

    (a) (b)

    Fig. 10 The comparison between LDF and DFPQ in P D R against buffer length of rtPS, nrtPS, and BE

    service flows at N =1 108:adownlink;buplink

    and hence some packets are dropped. DFPQ, on the other hand, allows serving 1.2 times

    the value of the specified request for the rtPS and nrtPS service flows; therefore, there is

    no packet dropped. In other words, since DFPQ serves too many packets of connections of

    the rtPS and nrtPS service flows, it results in a lot of uplink BE packets being dropped as

    illustrated in Fig.10b.

    In order to understand the comparison of the overall performance between LDF and DFPQ

    when the buffer depth is finite, we first compute the cumulative dropped packets in kbits in

    Fig.11when the buffer length is 3.1 104

    kbits. It is easy to find out that the total numberof dropped packets using LDF is far less than that of using DFPQ. Therefore, it is obvious

    that even LDF leads to downlink nrtPS packets being dropped at the buffer length equaling

    3.1 104 kbits and the fairness of LDF could still be better than that of DFPQ. Moreover,

    with a practically large enough buffer length, e.g., 3.3 104 kbits for each scheduling list,

    LDF is able to handle all packets without dropping them and provides excellent fairness

    performance.

    Accordingly, we then compare the cumulative bandwidth of the arrival and service curves

    for the uplink BE service flow when the buffer length is equal to 3.3 104 kbits in Fig.12.

    The reason that only the uplink BE service flow is investigated in Fig. 12is that the other

    service flows exhibit the similar performance as illustrated in Figs. 6,7, and8a. By com-paring Figs.8b and12,it is obvious that how much LDF could improve when the buffer

    length is finite and limited. This reflects that LDF could not only provide much better fair-

    ness and maintain satisfactory QoS requirements but also save the buffer size in hardware at

    the expense of a more complicated resource and buffer control processing.

    On the contrary, Fig.13illustrates the fairness comparisons between LDF and DFPQ at

    two buffer length cases, i.e., the case of buffer length equaling to 3.1 104 kbits and the

    case of buffer length equaling to 3.3 104 kbits, respectively. By comparing the results in

    Fig.9with the ones in Fig. 13,it is quite evident that the fairness of DFPQ degrades in the

    case of finite buffer length due to the excessive loss of uplink BE packets. On the other hand,LDF is almost not changed, indicating that the fairness of LDF is indeed more stable and

    less sensitive to the variation of the buffer behaviors in traffic and system characteristics; fur-

    thermore, as expected, LDF possessing the characteristics of long-term average throughput

    control and short-term non-urgent bandwidth fine-tuning indeed obtains better fairness and

    maintains satisfactory QoS requirements and saves buffer sizes in hardware at the expense

    of a more complicated resource and buffer control processing.

    1 3

  • 8/13/2019 A Novel Bandwidth Allocation Algorithm for IEEE 802.16 TDD Mode Wireless Access Networks

    22/24

    686 C.-C. Liang, J.-S. Wu

    Fig. 11 Comparison of the

    cumulative dropped packets when

    the buffer length is 3.1 104

    kbits for each scheduling list

    Fig. 12 The arrival and service

    curves of uplink BE service flow

    at the buffer length equaling

    3.3 104 kbits for each

    scheduling list

    9.999 9.9991 9.9992 9.9993 9.9994 9.9995 9.9996 9.9997 9.99989.9999 10

    x 108

    399,880,000

    399,900,000

    399,920,000

    399,940,000

    399,960,000

    399,980,000

    400,000,000

    Time (msec)

    CumulativeBandwidth(kbits)

    GeneratedArrival

    Service-LDF

    Service-DFPQ

    Fig. 13 The comparison

    between LDF and DFPQ in the

    coefficient of variation when thebuffer length equals 3.1 104

    kbits and 3.3 104 kbits,

    respectively

    1 2 3 4 5 6 7 8 9 10

    x 108

    0.5

    1

    1.5

    2

    2.5

    3

    3.5

    4 x 10

    -4

    Time (msec)

    CoefficientofVariation

    LDF- Buffer Length 3.1x104kbits

    LDF- Buffer Length 3.3x104

    kbitsDFPQ- Buffer Length 3.1x10

    4kbits

    DFPQ- Buffer Length 3.3x104kbits

    1 3

  • 8/13/2019 A Novel Bandwidth Allocation Algorithm for IEEE 802.16 TDD Mode Wireless Access Networks

    23/24

    A Novel Bandwidth Allocation Algorithm 687

    5 Conclusions

    In this paper, a novel bandwidth allocation algorithm of a two-tier hierarchy for IEEE 802.16

    TDD mode wireless access networks under symmetric and/or asymmetric uplink and down-

    link traffic input is proposed. We introduce and expound the newly proposed algorithm, LDF,in detail by the step-by-step operation principles and an elaborated example. From the elabo-

    ration of the LDF algorithm and the simulation results, it is obvious that LDF possessing two

    important characteristics, long-term average throughput control and short-term non-urgent

    bandwidth fine-tuning, can provide better fairness and maintain satisfactory QoS require-

    ments and save buffer sizes in hardware at the expense of a more complicated resource and

    buffer control processing.

    References

    1. IEEE Std 802.162004. (2004). IEEE Standard for Local and Metropolitan Area NetworksPart 16:

    Air Interface for Fixed Broadband Wireless Access Systems, IEEE Standard 802.16-2004.

    2. IEEE Std 802.16e2005. (2006). IEEE Standard for Local and Metropolitan Area NetworksPart 16:

    Air Interface for Fixed and Mobile Broadband Wireless Access Systems, IEEE Standard 802.16e-2005.

    3. Eklund, C., Marks, R. B., Stanwood, K. L., & Wang, S. (2002). IEEE Standard 802.16: A technical

    overview of the Wireless MANTM air interface for broadband wireless access. IEEE Communications

    Magazine, 40(6), 98107.

    4. Ghosh, A., Wolter, D. R., Andrews, J. G., & Chen, R. (2005). Broadband wireless access with

    WiMax/802.16: Current performance benchmarks and future potential.IEEE Communications Magazine,

    43(2), 129136.

    5. Chen, J., Jiao, W., & Wang, H. (2005). A service flow management strategy for IEEE 802.16

    broadband wireless access systems in TDD mode, In Proceedings of IEEE International Conference

    on Communications (ICC) (pp. 34223426).

    6. Wongthavarawat, K., & Ganz, A. (2003). Packet scheduling for QoS support in IEEE 802.16 broadband

    wireless access Systems. International Journal of Communications Systems, 16(1), 8196.

    7. Chu, G., Wang, D., & Mei, S. (2002). A QoS architecture for the MAC protocol of IEEE 802.16

    BWA system, In Proceedings of International Conference on Communications, Circuits and Systems

    and West Sino Expositions (pp. 435439).

    8. Liu, Q., Wang, X., & Giannakis, G. B. (2006). A cross-layer scheduling algorithm with QoS support

    in wireless networks. IEEE Transactions Vehicular Technology, 55(3), 839847.

    9. Cicconetti, C., Lenzini, L., Mingozzi, E., & Eklund, C. (2006). Quality of service support in IEEE

    802.16 networks. IEEE Network, 20(2), 5055.

    10. Cicconetti, C., Erta, A., Lenzini, L., & Mingozzi, E. (2007). Performance evaluation of the IEE 802.16MAC for QoS support. IEEE Transactions on Mobile Computing, 6(1), 2638.

    11. Xergias, S. A., Passas, N., & Merakos, L. (2005). Flexible resource allocation in IEEE 802.16 wireless

    metropolitan area networks, In Proceedings of IEEE Workshop on Local and Metropolitan Area

    Networks (LANMAN).

    12. Cho, D. H., Song, J. H., Kim, M. S., & Han, K. J. (2005). Performance analysis of the IEEE

    802.16 wireless metropolitan area network, In Proceedings of the First International Conference on

    Distributed Frameworks for Multimedia Applications (DFMA)(pp. 130136).

    13. Niyato, D., & Hossain, E. (2006). Queue-aware uplink bandwidth allocation and rate control for

    polling service in IEEE 802.16 broadband wireless networks. IEEE Transactions on Mobile Comput-

    ing, 5(6), 668679.

    14. Niyato, D., & Hossain, E. (2006). A queuing-theoretic and optimization-based model for radio

    resource management in IEEE 802.16 broadband wireless networks. IEEE Transactions on Computers,55(11), 14731488.

    15. Kim, W. J., Break, J. Y., Lee, S. D., Suh, Y. J., Kim, Y. S., & Kim, J. A. (2005). Efficient uplink

    scheduler architecture of subscriber station in IEEE 802.16 system, Lecture Notes in Computer Science

    (pp. 734743).

    16. Liang, C. C., Shao, S. K., Yu, J. C., & Wu, J. S. (2008). A newly proposed bandwidth allocation

    algorithm for IEEE 802.16 wireless access systems, In Proceedings of International Symposium on

    Communications and Information Technologies (ISCIT) (pp. 3338).

    1 3

  • 8/13/2019 A Novel Bandwidth Allocation Algorithm for IEEE 802.16 TDD Mode Wireless Access Networks

    24/24

    688 C.-C. Liang, J.-S. Wu

    17. Georgiadis, L., Guerin, R., & Parekh, A. (1997). Optimal Multiplexing on a single link: Delay and

    buffer requirements. IEEE Transactions on Information Theory, 43(5), 15181535.

    18. Demers, A., Keshav, S., & Shenker, S. (1989). Analysis and simulation of a fair queuing algorithm,

    In Proceedings ACM SIGCOMM.

    19. Hahne, E. L., & Gallager, R. G. (1986). Round robin scheduling for fair flow control in data com-

    munication networks, In Proceedings of IEEE International Conference on Communications (ICC)(pp. 103107).

    20. Katevenis, M., Sidiropoulos, S., & Courcoubetis, C. (1991). Weighted round-robin cell multiplexing in a

    general-purpose ATM switch chip.IEEE Journal Selected Areas in Communications, 9(8), 12651279.

    Author Biographies

    Chia-Chuan Liang received the B.S. and M.S. degree from National

    Yunlin University of Science and Technology, Yunlin, Taiwan, in 1996

    and 1998, respectively. Currently, he is working towards the Ph.D.

    degree in Electrical Engineering at National Central University. Hisresearch interests include mobile communication and radio resource

    management of wireless networks.

    Jung-Shyr Wu received the B.S. and M.S. degrees in electrical engi-

    neering from National Chiao Tung University, Hsinchu, Taiwan, in

    1979 and 1981, respectively, and Ph.D. degrees in electrical engineer-

    ing University of Calgary, Calgary, Canada, in 1988. Currently, He

    is a Professor in the Communication Engineering at National Central

    University, Jhung-Li, Taiwan. His research interests include computer

    communication, queue model, and mobile communication.