Channel-Aware Scheduling - Semantic Scholar

7 downloads 0 Views 762KB Size Report
wireless multimedia networks is a challenging issue. This is due to the ...... packet extensions (E)GPRS to GSM-TDMA systems offer various coding schemes to ...
CHANNEL-STATE DEPENDENT SCHEDULING OF DELAYBOUNDED TRAFFIC IN BEYOND 3G WIRELESS MULTIMEDIA NETWORKS

By Ahmed Khattab Fathi Khattab B.Sc. in Electronics and Communications Engineering – Cairo University

A Thesis Submitted to the Faculty of Engineering at Cairo University in Partial Fulfillment of the Requirements for the Degree of Master of Science in Electronics and Electrical Communications Engineering

Supervised by Dr. Khaled Mohamed Fouad Elsayed Professor, Faculty of Engineering, Cairo University

Faculty of Engineering, Cairo University Giza, Egypt 2004

TABLE OF CONTENTS TABLE OF CONTENTS ...………………………………………………….....

II

LIST OF TABLES …………………………………………………………...

IV

LIST OF FIGURES …………………………………………………………...

V

LIST OF SYMBOLS ………………………………………………………....

VIII

LIST OF ABBREVIATIONS …………………………………………………..

IX

ACKNOWLEDGEMENTS ………………………………………………….....

X

ABSTRACT ……………………………………………………………….....

XII

Chapter 1: Introduction ………………………………………………....

1

1.1. Thesis Organization ………………………………………….

5

Chapter 2: Scheduling in Wireless Networks …………………………..

7

2.1. Wireless Network Challenges ………………………………..

8

2.1.1. Wireless Link Variability ………………………….....

8

2.1.2. Fairness ……………………………………………....

9

2.1.3. Scarcity of Resources ………………………………...

10

2.2. Multiuser Diversity in Wireless Systems ………………….....

10

2.3. Cross Layer Designs ………………………………………....

13

2.4. Thesis Motivation …………………………………………....

17

Chapter 3: Channel-Aware Scheduling Disciplines for Delay Bounded Traffic in TDM-Based Wireless Networks ……..

19

3.1. Network Model ………………………………………………

20

3.2. Previous Work ………………………………………………..

23

3.3. The Proposed Scheduling Schemes ………………………….

27

3.3.1. Channel Dependent Earliest Due Date (CD-EDD) Scheduling Discipline ………………………………..

29

3.3.2. A Set of Violation Fair Rules ………………………..

31

ii

Chapter 4: Simulation Results and Discussions of the TDM-Based Scheduling Disciplines ……………………………………...

35

4.1. Simulation Setup ……………………………………………..

35

4.2. Performance Metrics …………………………………………

37

4.3. Results and Discussions ……………………………………...

39

Chapter 5: Channel-Aware Scheduling for Delay-Bounded Traffic in OFDMA-Based Wireless Networks ………………………..

63

5.1. Network Model ………………………………………………

65

5.2. Scheduling in OFDMA Networks ……………………………

68

5.2.1. Static Subcarrier Management …………………….....

68

5.2.2. Dynamic Subcarrier Management …………………...

69

5.3. Problem Formulation ………………………………………...

72

5.4. Subcarrier Allocation Algorithm …………………………….

75

5.5. Subcarrier Assignment Algorithm …………………………...

80

Chapter 6: Simulation Results and Discussions of the OFDMA-Based Scheduling …………………………………………………...

83

6.1. Simulation Setup ……………………………………………..

83

6.2. Results and Discussions ……………………………………...

87

Chapter 7: Conclusions and Future Research …………………………

101

7.1. Conclusions …………………………………………………..

101

7.2. Future Research Directions …………………………………..

103

REFERENCES …………………………………………………………….....

105

APPENDIX A: CODE SAMPLES ……………………………………………..

111

iii

LIST OF TABLES Table 4.1

The system capacity of HDR cell achieved by different disciplines

Table 4.2

Fading levels and its corresponding capacities used in simulations

Table 4.3

Simulation results summary

Table 6.1

Summary of simulation parameters

iv

LIST OF F IGURES Figure 2.1

Throughput region for a simple channel model

Figure 3.1

Channel state dependent downlink scheduling architecture for multiple users sharing a wireless TDMA channel

Figure 4.1

The average throughput per user for 20 m sec delay bound

Figure 4.2

The average throughput per user for 60 m sec delay bound

Figure 4.3

The average throughput per user for 100 m sec delay bound

Figure 4.4

The average throughput per user for 200 m sec delay bound

Figure 4.5

The average throughput per user for 300 m sec delay bound

Figure 4.6

The average throughput per user for 400 m sec delay bound

Figure 4.7

Delay distributions of user 1 and user 14 for 20 m sec delay bound

Figure 4.8

Delay distributions of user 1 and user 14 for 60 m sec delay bound

Figure 4.9

Delay distributions of user 1 and user 14 for 100 m sec delay bound

Figure 4.10

Delay distributions of user 1 and user 14 for 200 m sec delay bound

Figure 4.11

Delay distributions of user 1 and user 14 for 300 m sec delay bound

Figure 4.12

Delay distributions of user 1 and user 14 for 400 m sec delay bound

Figure 4.13

The maximum and the minimum 95-percentile delays

Figure 4.14

The maximum and the minimum percentage of lost packets

Figure 4.15

Delay distributions of user 1 and user 14 for 20 m sec delay bound (VF rules) Delay distributions of user 1 and user 14 for 60 m sec delay bound (VF rules)

Figure 4.16

v

Figure 4.17

Delay distributions of user 1 and user 14 for 100 m sec delay bound (VF rules)

Figure 4.18

Delay distributions of user 1 and user 14 for 200 m sec delay bound (VF rules)

Figure 4.19

Delay distributions of user 1 and user 14 for 300 m sec delay bound (VF rules)

Figure 4.20

Delay distributions of user 1 and user 14 for 400 m sec delay bound (VF rules)

Figure 4.21

The maximum and the minimum 95-percentile delays (VF rules)

Figure 4.22

The maximum and the minimum percentage of lost packets (VF rules)

Figure 4.23

The throughput behavior at 20 m sec delay bound

Figure 4.24

The throughput behavior at 60 m sec delay bound

Figure 4.25

The throughput behavior at 100 m sec delay bound

Figure 4.26

The throughput behavior at 200 m sec delay bound

Figure 4.27

The throughput behavior at 300 m sec delay bound

Figure 4.28

The throughput behavior at 400 m sec delay bound

Figure 5.1

Orthogonal Frequency Division Multiple Access (OFDMA) transceiver

Figure 5.2

An example of channel gain variations taken from [26]

Figure 5.3

Subcarrier Allocation Algorithm

Figure 5.4

Subcarrier Assignment Algorithm

Figure 6.1

The power-delay profile environment.

Figure 6.2

Throughput performance for a 20 msec delay bound.

Figure 6.3

Throughput performance for a 50 msec delay bound.

vi

of

the

B

Model pedestrian

Figure 6.4

Throughput performance for a 100 msec delay bound.

Figure 6.5

Throughput fairness indices of both the dynamic algorithm and the static algorithm for different delay bounds.

Figure 6.6

Deadline violation fairness for different delay bounds.

Figure 6.7

Delay tails of the best and worst channel users (N = 42 users).

Figure 6.8

Delay tails of the best and worst channel users (1.5% and 2.3% of the best and the worst users packets were lost) (N = 120 users, T = 20 msec).

Figure 6.9

Delay tails of the best and worst channel users (0.07% and 1.4% of the best and the worst users packets were lost) (N = 165 users, T = 50 msec).

Figure 6.10

Delay tails of the best and worst channel users (6.7% and 16.9% of the best and the worst users packets were lost) (N = 170 users, T = 100 msec).

vii

LIST OF SYMBOLS ai

Delay weighted constant

B

Channel of bandwidth

C(t)

The instantaneous Shannon channel capacity

di(t)

Time to expire of user i HoL packet at time t

δi

Deadline violation probability

δij(t)

Indicator that subcarrier j is to be assigned to user i at time t

|h(t)|

The normalized gain (or fading level) of the wireless channel at the time t

μi(t)

The actual rate that could be used for transmission by the ith user at time t in TDM-based networks

µi

The mean rate supported or previously offered to the ith user in TDM-based networks

μji(t)

The actual rate that could be used for transmission by the ith user over the jth subcarrier at time t in OFDMA-based networks

µi ( t )

The average subcarrier capacity of the ith user

N

Number of users in the system

Nt

Number of active users at time t in the system

NVi(t)

The number of deadline due date violations encountered in the flow of the ith user up to time t.

NV (t )

The average of the number of violations in all N queues

ni(t)

The number of subcarriers to be assigned to the ith user at the slot starting at time t

RT(t)

The total instantaneous system throughput

ri

The average rate of user i video stream

S

Total number of subcarriers

S'

Number of remaining subcarriers

t

Time index

Ti

Delay Bound of user i

Wi(t)

Waiting time of user i HoL packet at time t

viii

LIST OF ABBREVIATIONS

CD-EDD

Channel Dependent – Earliest Deadline Due

CDMA

Code Division Multiple Access

EDD

Earliest Deadline Due

EDGE

Enhanced Data rates for GSM Evolution

FDMA

Frequency Division Multiple Access

GPRS

General Packet Radio Services

HDR

High Data Rate

HoL

Head of Line

LWDF

Largest Weighted Delay First

MBWA

Mobile Broadband Wireless Access

M-LWDF

Modified – Largest Weighted Delay First

OFDM

Orthogonal Frequency Division Multiplexing

OFDMA

Orthogonal Frequency Division Multiple Access

PDA

Personal Digital Assistant

QoS

Quality of Service

RTT

Radio Transmission Technology

SISO

Single Input Single Output

SNR

Signal to Noise Ratio

TCP

Transmission Control Protocol

TDMA

Time Division Multiple Access

UMTS

Universal Mobile Telecommunications System

UTRA

UMTS Terrestrial Radio Access

VF

Violation Fair

WWW

World Wide Web

ix

ACKNOWLEDGEMENTS I have the pleasure and honor to express heart-felt gratitude to my thesis supervisor Dr. Khaled M. Fouad Elsayed for encouragement and unfailing guidance which enabled achieving the research goals. Grateful thanks are also due to Dr. Mohammed Khairy for providing valuable advice and needed information. The role of engineer Islam Sherif is also gratefully acknowledged. Last, but not least, a special expression of gratitude and appreciation goes to my family for their patience and generous support.

x

xi

ABSTRACT Providing delay guarantees to time-sensitive traffic in beyond 3G wireless multimedia networks is a challenging issue. This is due to the timevarying link capacities and the variety of real-time applications expected to be handled by such networks. Multiuser diversity schemes exploiting variation in users' channel conditions have been shown to offer orders of magnitude increase in the performance of wireless systems. In this thesis, we address the problem of channel-aware scheduling of delay bounded traffic for two different wireless network models. First, we consider this problem in a Time Division Multiple Access (TDMA) based wireless networks. We propose two channel-aware scheduling disciplines that are capable of providing such delay guarantees in wireless networks. Namely, the Channel Dependent Earliest-Due-Date (CD-EDD) discipline, which attempts to guarantee the targeted delay bounds, and the Violation Fair (VF) scheduling, which attempts to provide fairness in both bandwidth sharing as well as the targeted delay bounds delivered to the different users. The second system considered is multiuser scheduling in Orthogonal Frequency Division Multiple Access (OFDMA) based broadband wireless networks. In ODFMA, the scheduling problem is further complicated by the existence of multiple subcarriers. We propose heuristic algorithms for both subcarrier allocation and assignment in such a network. These dynamic algorithms utilize multiuser diversity to increase the system efficiency by attempting to guarantee the required delay bounds while providing fairness in throughput sharing among different users. A unique feature of our work is the possibility of explicit provisioning of statistical QoS as well as enhancing fairness in data rate, delay bound, and delay bound violation. We provide extensive simulation results to show the different performance aspects of the proposed schemes.

xii

Chapter 1 Introduction

Future wireless networks are designed to support wideband data communications as well as voice communications. Such networks will be the basis for a wireless information society where access to information and information services is available anytime, anywhere, and to anybody. This objective has been encouraged by the tremendous growth of the wireless industry over the few past decades. Internet is another branch of the telecommunication industry which has enjoyed similar dramatic growth which has resulted in the ever growing range of services available through the World Wide Web (WWW). Thus, the introduction of mobile Internet brought about by the convergence of these two technologies is the future objective of the telecommunication industry.

Multiple enhancements have being implemented in both the currently deployed cellular mobile systems and the Internet networking. The progressive introduction of the General Packet Radio Services (GPRS), Enhanced Data rates for GSM Evolution (EDGE), the High Data Rate (HDR/CDMA) and the third generation Universal Mobile Telecommunications System (UMTS) clearly illustrates this evolution. At the same time, several wireless technologies have been designed in order to include arrangements for accessing Internet services such as IEEE 802.11, 802.16 and HIPERLAN2. Each of these technologies has been optimized for operation over a particular range of service bit rate versus user speed of mobility. Moreover, several technologies have been upgraded to enable ad-hoc networking. In this hybrid environment, the need to provide ubiquitous connectivity for slow and fast moving users with different rate requirements arises. Beyond 3G and 4G networks are being developed towards achieving this objective. Such networks could be implemented based on a common Internet Protocol (IP) core network internetworking with multiple

1

access

networks

for

broadcast,

wide

area

cellular

and

short

range

communications. Thus, beyond 3G and 4G wireless networks should enable the "person to machine" and "machine to machine" networking parallel to the "person to person" communication concept of cellular wireless for ubiquitous connectivity to the Internet services.

Because wireless frequency is a scarce resource, efficient frequency utilization is becoming increasingly important. Resource allocation schemes and scheduling policies are critical to achieving these goals. In wireline networks, resource allocation schemes and scheduling policies play important roles in providing service performance guarantees, such as throughput, delay, delay-jitter, fairness, and loss rate [1]. However, resource allocation and scheduling schemes from the wireline domain do not carry over to wireless systems because wireless channels have unique characteristics not found in wireline channels, such as limited bandwidth, time-varying and location-dependent channel conditions, and channel-condition-dependent throughput.

In wireless networks, the channel conditions of mobile users are timevarying. Radio propagation can be roughly characterized by three nearly independent phenomena: path-loss variation with distance, slow log-normal shadowing, and fast multipath-fading. Path losses vary with the movement of mobile stations. Slow log-normal shadowing and fast multipath-fading are timevarying with different time scales. Thus, users perceive time-varying service quality and/or quantity because channel conditions are time-varying. For voice users, better channel conditions may result in better voice quality. For packet data service, better channel conditions (or larger signal to interference plus noise ratio (SINR)) can be used to provide higher data rates by reducing coding or spreading and/or increasing the constellation density. Previous research showed that cellular spectral efficiency (in terms of b/s/Hz/sector) can be increased by a factor of two or more if users with better links are served at higher data rates. Procedures to exploit this are already in place for all the major cellular standards: adaptive modulation and coding schemes are implemented in the 3G TDMA

2

standards, and variable spreading and coding are implemented in the 3G CDMA standards. In general, a user is served with better quality and/or at a higher bit rate when the channel condition is better.

On one hand, good scheduling schemes should be able to exploit the time-varying channel conditions of users to achieve higher utilization of wireless resources. On the other hand, the potential to exploit higher data throughputs in an opportunistic way, when channel conditions permit, introduces the tradeoff problem between wireless resource efficiency and fairness among users. Because wireless spectrum is a scarce resource, improving the efficiency of spectrum utilization is important, especially to provide high-rate-data services. Hence, we cannot expect the same throughput for all users because the users in general can have very different channel conditions. However, a scheme designed only to maximize the overall throughput could be very unfair among users, especially users with widely disparate distances from the base station. For example, allowing only users close to the base station to transmit with high transmission power may result in very high throughput, but is unfair to other users. This basic dilemma motivates our work: to improve wireless resource efficiency by exploiting time-varying channel conditions, and at the same time satisfy the delay quality of service (QoS) for multiple multimedia users sharing a fading channel, and enhancing the level of fairness among users.

In this thesis, we address this problem in two wireless network models based on different multiple access methods. We develop simple and efficient scheduling schemes, which can yield substantial capacity gain. The efficiency is achieved by virtue of multiuser diversity. Multiuser diversity refers to a type of diversity present across different users in a fading environment. This diversity can be exploited by scheduling transmissions so that users transmit when their channel conditions are favorable. Using such an approach leads to a system capacity that increases with the number of users. In order to realize this mechanism, the scheduler should be equipped with a scheme to estimate the channel state of every user in the system, with this information, the scheduler can

3

exploit multiuser diversity. However, making the scheduling decision only dependent on the users' channel conditions will cause severe degradation of the service offered to the users with long period of bad channel states. The proposed solutions employ mechanisms to compensate such users in order to serve their packets before expiry. A unique feature of our work is explicit provisioning of statistical QoS, which is the capability characterized by a data rate, delay bound, and delay-bound violation probability triplet.

First, we consider a time-slotted system in which time is the resource to be shared among the users. Such a network is called Time Division Multiple Access (TDMA) networks. The scheduler function is to select only one user for transmission in each time slot. We propose two scheduling disciplines applicable in such a network.

In the second part of the thesis, we address scheduling in OFDMA-based broadband wireless networks. Orthogonal Frequency Division Multiple Access (OFDMA) is a multiple access scheme used in such networks to support high speed communication over fading channels. The channel is subdivided into a set of subcarriers as in Orthogonal Frequency Division Multiplexing (OFDM). This set of subcarriers is the common system resource to be shared among users. The scheduling problem is how to distribute this set of subcarriers among users present in the system. Such a kind of problem is computationally complex. So, our methodology is to subdivide it into a couple of lower complexity problems, namely, subcarrier allocation problem and subcarrier assignment problem. We propose novel practical opportunistic algorithms for these two problems in this thesis. The objective of these algorithms is also to fairly provide the requested quality of service to real-time traffic users, and in the meantime, increase the system efficiency by utilizing multiuser diversity.

4

1.1

Thesis Organization

The remainder of this thesis is organized as follows. In chapter 2, we highlight the basic characteristics of wireless systems which make scheduling multiple users a challenging issue. Then we discuss multiuser diversity and the recently introduced concept of cross-layer optimization in wireless systems. Multiuser diversity is our key technique to increase the system efficiency in resource utilization. The motivation of the thesis is then identified.

In chapter 3, we consider the channel-aware scheduling problem in TDMbased wireless networks for multiple delay-sensitive users. First, we describe the network model. Then, we present a comprehensive study of the literature in this area. From this study, we identify the main characteristic of the solution of such a problem. We propose two channel-aware scheduling schemes that are capable of providing delay guarantees for time-sensitive traffic in wireless networks. The first proposed scheme, the Channel-Dependent Earliest-Due-Date (CD-EDD) discipline, attempts to guarantee the targeted delay bounds in addition to exploiting multiuser diversity to make best utilization of the variable capacity of the channel. In the second scheme, the Violation Fair (VF) scheduling, we attempt to ensure that the number of packets dropped due to deadline violation is fairly disturbed among users. This provides fairness in both bandwidth sharing as well as the quality of service delivered to different users.

In chapter 4, we provide extensive simulation results to show the different performance aspects of the proposed schemes. In particular, we show that it can simultaneously guarantee a delay upper bound while providing fairness in these guarantees among all users, as well as providing fairness in the throughput sharing among different users in fading wireless channel networks.

5

In chapter 5, we tackle the problem of channel-aware scheduling of multimedia users in OFDMA-based wireless networks. After describing such wireless networks, we discuss the scheduling problem and briefly describe the different scheduling schemes proposed so far in the literature. We present a mathematical formulation of the scheduling problem. Then we propose efficient opportunistic subcarrier allocation and assignment algorithms that utilize multiuser diversity to achieve a performance gain while yet satisfying the QoS constraints of multimedia traffic.

In chapter 6, we explore the various characteristics of the subcarrier allocation and assignment algorithms proposed in chapter 5 through a set a simulation tests. In order to qualify the achievements of our dynamic algorithms, we compare them with the best known static algorithm.

Finally, in chapter 7, we summarize the thesis and conclude the main findings of this research. Then we point out some future research directions advised from this study.

6

Chapter 2 Scheduling in Wireless Networks

The rapid growth of wireless technology, when coupled with the explosive growth of the Internet, has increased the demand for wireless data services. Traffic on beyond 3G wireless networks is expected to be a mix of realtime traffic such as voice, multimedia teleconferencing, games; and data-traffic such as WWW browsing, messaging and file transfers. These applications will require diverse quality of service (QoS) guarantees. Various scheduling disciplines have been developed in order to guarantee certain required QoS over wireline networks. However, these service disciplines, such as Weighted Fair Queuing (WFQ), virtual clock, and Earliest-Due-Date First (EDD) [1], are not directly applicable in wireless networks because they do not consider the characteristics of wireless channel. These characteristics include high error rate, bursty errors, location-dependent and time-varying wireless link capacity, scarce bandwidth, user mobility, and power limitation of the mobile hosts. All of the above characteristics cause the development of efficient and effective scheduling algorithms for wireless networks to be very challenging.

In this chapter, we first highlight the wireless network peculiarities that made the design of efficient scheduling disciplines a very challenging issue. We then briefly introduce a new kind of diversity inherently present in a wireless network with a multiple of users. This type of diversity is called multiuser diversity which exploits variation in channel states of the users in a wireless system. This issue has been recently considered as cross-layer optimization technique in wireless networks; and have been shown to offer orders of magnitude increase in the capacity and the performance of wireless systems.

7

2.1

Wireless Networks Challenges

2.1.1 Wireless Link Variability

The biggest difference between a wireless network and a wireline network is the transmission link variability. Due to the high quality of the wired transmission media such as fiber and copper, packet transmissions on wireline networks enjoy very low error rate. However, wireless channels are more errorprone and suffer from interference, fading, and shadowing. As a result, the capacity of a wireless link has very high variability. Specifically, there are two types of wireless link variations [2]:

(i)

Small-scale channel variations This is the rapid fluctuations of the signal's strength over a small

travel distance or small time interval. Such fast changes may be caused by either the multipath propagation of radio signals or the mobility of the user terminals as well as the surrounding environment. Thus, this phenomenon is usually called multipath fading or shadowing. Fast channel variations due to fading are such that thee states of different channels can asynchronously switch from “good” to “bad” within a few milliseconds and vice-versa. This causes bursts of errors to occur during which packets cannot be efficiently transmitted on the link.

(ii)

Large-scale channel variations Unlike the fast channel variations caused by fading, there is

another type of variations occurring on a much greater space – time scale. Large-scale channel variations means that the average channel state conditions (signal strength) changes according to the relative distance between the transmitter and the receiver. For example, in a cellular wireless system, the same wireless link capacity may be seen having different value depending on relative location to the base station.

8

Thus, due to small-scale and large-scale changes in the channel, some users may inherently demand more resources (e.g. channel access time or bandwidth) than others based on their location or mobility pattern, even if their data rate requirement is the same as or even less than other users. Such link variations require the scheduling algorithms to be equipped with certain dynamic mechanisms that can deal with these time-dependent and location-dependent changes.

2.1.2 Fairness

Since wireline media may be considered error-free, the service rate allocated is indeed the amount of service share that is received by a particular flow. Providing fairness in resource sharing in wireline networks is usually guaranteed by dedicating a certain service rate to a flow, and the scheduling algorithm prevents different flows from interfering with each other. However, the fairness issue in wireless networks is more complicated because of the wireless link peculiarities discussed above. It may happen that a packet is scheduled for transmission on a wireless link according to a certain service discipline or fairness guideline, which is independent of link state, and the link is actually in a high-error state. If the packet is transmitted, it will be corrupted and the transmission will waste transmission resources. In this case, deferring transmission of this packet till the link recovers from the high-error state is clearly a reasonable choice. The affected flow, hence, temporarily loses its share of the transmission bandwidth. To ensure fairness, the flow should be compensated for this loss later when the link recovers. But determining how to compensate for it is not an easy task. An alternative view of fairness arises in wireless networks. In particular, the system should provide fair temporal access to the transmission medium rather than fair throughput, i.e. ensure that each user is able to access the medium for a (weighted) fair share of time. Also, fairness guarantees may be required on a long-term basis or short-term basis.

9

2.1.3 Scarcity of Resources

The most precious resource in wireless networks is the bandwidth. A very challenging issue in wireless networks designs is the efficient utilization of the wireless channels. This can be achieved by maximizing the effective service delivered, and at the same time, minimizing the unproductive transmissions on low quality links.

Usually, mobile terminal in wireless networks are operated with limited amount of power. This imposes another constraint in wireless designs. For example, a scheduling algorithm that needs to use every uplink packet’s arrival time to compute scheduling order is not a good choice. This is because it demands a large amount of power from mobile hosts for transmitting the information of arrival times to the base station.

Another important issue that characterizes wireless networks is that realtime services such as voice and multimedia applications should be provided efficiently. Thus, the complexity of different algorithms deployed in wireless networks, such as admission control and scheduling algorithms, should not be too high. So that it can be executed at high speed to serve real-time multimedia traffic with stringent timing requirements.

2.2

Multiuser Diversity in Wireless Systems

An effective way to increase the capacity of a time-varying channel is the use of diversity. The idea of diversity is to create multiple independent signal paths between the transmitter and the receiver so that higher channel capacity can be achieved. Diversity can be implemented over time, space, and frequency. These traditional diversity methods are essentially applicable to a single-user

10

link. The basic idea is to improve performance by having several independent signal paths between the transmitter and the receiver.

Recently, however, Knopp and Humblet [3] introduced another kind of diversity, which is inherent in a wireless network with multiple users sharing a time-varying channel. This diversity, termed multiuser diversity [4,5], comes from the fact that different users usually have independent channel gains for the same shared medium. With multiuser diversity, the strategy of maximizing the total Shannon (ergodic) capacity is to allow at any time slot only the user with the best channel to transmit. This strategy is called Knopp and Humblet’s scheduling.

This multiuser diversity is best motivated by an information theoretic result of Knopp and Humblet [3]. They focused on the power control uplink in the single cell, with multiple users communicating to the base station via timevarying channels. To maximize the total information theoretic capacity, they showed that the optimal strategy is to schedule at any one time only the user with the best channel to transmit to the base station. This means that the only user who is allowed to transmit is the one with the largest instantaneous power (received at the base station), and the others must remain quite until one of them becomes the strongest. Diversity gain arises from the fact that in a system with many users, there is likely to be a user with a very good channel at any time instant. Overall system throughput is maximized by allocating at any time the common channel resource to the user that can best exploit it.

This is completely in opposite sense to conventional power control. Conventional power control is used to equalize the powers received from different users at the base station. In wireless networks, the average received power of a given user is related to his distance from the base station, and correspondingly there is a certain loss in signal strength or path loss. The instantaneous power, on the other hand, is usually time-varying due to multipath fading. Power control is usually done in two ways, namely, open-loop or closed-

11

loop manners. The former refers to the case where the uplink and downlink channels are assumed to be strongly correlated and estimation of the received power at the base station is based on the signal received by the user. In the later, estimation is performed in the base station which then instructs the users, via the downlink channel, to transmit at a certain power. Provided that the received powers don't vary too quickly, the power controller simply attempts to keep all the received powers at some nominal level by inverting both the path loss and fading effects of the channel.

Results in [3] have shown that Knopp and Humblet scheduling can increase the total (ergodic) capacity dramatically, in the absence of delay constraints, as compared to the traditionally used (weighted) round robin (RR) scheduling where each user is a priori allocated fixed time slots. However, under this scheme, a user in a fade of an arbitrarily long period will not be allowed to transmit during this period (for example when a user is far from the base station and its mobility is low may never have the opportunity to transmit it data), resulting in an arbitrarily long delay; therefore, this scheme provides no delay guarantees and thus is not suitable for delay-sensitive applications, such as voice or video.

Another problem of such greedy scheduling is the unfairness in resource sharing. This is due the absence of a way to compensate users in fade for relatively long periods. In [6] and [7], the authors present a scheduling scheme for the Qualcomm/HDR system which satisfies the following fairness property: if another scheduling algorithm is used to increase the throughput of a specific user by x% over what that user receives under the HDR scheduling algorithm, the sum of all the percentage decreases suffered by the throughputs of all the other users under the new algorithm will be more than x% [7]. The scheduler at the base station determines the next terminal to be served based not only on the instantaneous channel gain of the users but also on the amount of data that has already been transmitted to each terminal. Therefore, when a user is prevented from transmission for relatively long period its data transmission rate decreases

12

significantly. This make the scheduler give this user the advantage to transmit over all other users even though there channel qualities may be much better that this one's. This property is known as proportional fairness.

The authors of [8 – 14] have studied opportunistic wireless scheduling. Opportunistic transmission scheduling polices are those who exploits the time varying channel conditions and maximizes the system performance stochastically under a certain resource allocation fairness constraint. They extend scheduling policies for wireline networks to wireless networks which provide various degrees of performance guarantees, including short-term and long-term fairness, as well as short-term and long-term throughput bounds. For example, the authors in [8] presented a wireless credit-based fair queuing, a scheduler for wireless packet networks with provable short- and long-term transmission rate fairness guarantees. A framework for opportunistic scheduling over multiple wireless channels was developed in [9]. In [10, 11, 14], the authors summarize various opportunistic scheduling schemes and discuss the advantages and costs associated with opportunistic scheduling. The authors of [12] generalized the opportunistic scheduling problem to include multiple interface systems in which several users can be served simultaneously. An efficiency-based scheduling scheme that gives flexibility in adjusting the way resources are allocated among multiple interactive best-effort data users was proposed in [13].

2.3

Cross Layer Designs

Recently there has been increased interest in protocols for wireless networks which rely on intelligent interactions between various layers of the network protocol stack. Generically termed cross layer design, many of these proposals are aimed at achieving performance improvements [15]. In this section, we provide an overview of the cross-layer paradigm shift that is beginning to

13

take place as wireless communications evolves from a circuit-switched infrastructure to a packet-based infrastructure.

Cross-layer networking can be easily demonstrated when the knowledge of the physical and MAC layers is shared with higher layers in order to provide efficient methods for allocating network resources to different users and applications. In essence, future networks will need to provide "impedance matching" of the instantaneous radio channel conditions of layer 1 and layer2 with the traffic and congestion conditions for layers 3 and above. Further, such matching will need to be coordinated with a wide range of particular applications, making the topic of cross-layer networking an increasingly important one for the evolving wireless build-out. The advantages of cross-layer networking appear to be real, and will be increasingly important as capacities offered through the wireless LAN interface approach the level of capacity that can be handled over the Internet backbone. For example, network layer throughput performance can be significantly improved if the physical layer information (channel conditions) is used at the network layer and transport layer for controlling TCP traffic over wireless links. Energy-based routing algorithms [16-18], currently developed for ad-hoc wireless networks, are another example of how different layer information can be shared to improve wireless networks performance. Also, channel state dependent scheduling (a cross-layer method) of multiple users sharing a wireless link, can be used to increase the overall system throughput. This last example of cross-layer designs will be the main focus of this thesis.

In order to get insight of how significant gains can be achieved by crosslayer networking, let us consider the following simple example [15], in which the idea of the throughput region of a multi-user wireless network is illustrated. Consider a wireless network with two users. Suppose that packets arriving from the wireline network to the base-station are temporarily buffered, before they are forwarded to the mobile users. Let us denote the rate at which data arrives for mobile users 1 and 2 (from the wireline network) by λ1 and λ2 packets/slot,

14

respectively. A natural question one should ask is “what are the pairs of (λ1, λ2) that the wireless system can support without the queues at the base-station overflowing?” Assuming a very simple wireless channel model as follows: In the first channel state, if user 1 is scheduled, the data rate achieved by User 1 is ’a’ packets/slot, while if user 2 is scheduled, the data rate achieved by User 2 is ’b’ packets/slot. Similarly, in the second channel state, if user 1 is scheduled, the achieved rate (for User 1) is ’c’ packets/slot, while if user 2 is scheduled, the achieved rate (for User 2) is ’d’ packets/slot.

In Figure 2.1, we have illustrated the rates described above. The left-most panel illustrates the first channel state. The x-axis indicates the rate allocated to user 1 in channel state 1, and the y-axis indicates the rate allocated to user 2. Suppose that whenever the wireless channel is in state 1, the base-station scheduler decides to transmit to user 1 half the time, and for the other half of the time, user 2 is scheduled. Then, the average rate allocated to user 1 in state 1 would be a/2 packets/slot, and the average rate allocated to user 2 would be b/2 packets/slot. Similarly, we can choose various splitting rules for channel state 1 (for example, 1/5 of the time send to user 1, 3/5 of the time send to user 2, and do nothing for 1/5 of the time). The shaded region in the left-most panel in Figure 2.1 is the collection of average rates to users 1 and 2 over all such splitting rules. Similarly, the middle panel illustrates the corresponding achievable region in channel state 2.

µ2

µ2

π 1 = 0.5 b

d

µ2

π2 = 0.5

b+d 2

R2

R1 a

Channel state 1

µ1

c

µ1

Channel state 2

achievable rates

a+c 2 Stability region

µ1: User 1 rate µ2: User 2 rate

µ1

Figure 2.1 Throughput region for a simple channel model taken from [15].

15

Now, choose any vectors νi Є Ri, i = 1, 2 where R1, R2 are the achievable regions in states 1 and 2, respectively. Then, the throughput region is defined as V = { ν : ν = π 1ν1 + π 2ν2 }, where π1, π2 are the steady-state probabilities of being in channel-states 1 and 2, respectively. Observe that V is merely the convex combination of the achievable regions in each state. This is illustrated in the right panel in Figure 2.1. Thus, if the packet arrival rates (λ1, λ2) lie within the throughput region, we can be guaranteed that the queue lengths will not become unbounded.

It can be shown that if the channel state was not used for packet scheduling, the throughput region would be that to the left of the dotted line in the right panel of Figure 2.1 (sub-optimal use of network resources). The significant gains due to channel state dependent scheduling algorithms can be illustrated by means of a simple example. Consider a wireless system consisting of three users in a TDM-based network. The access time is slotted, and the channels to be constant over a time-slot. We assume that the channels are either ON or OFF, equally likely, and the channels being independent of each user. Thus, in this system, there are eight possible (instantaneous) channel states for the three independent users, ranging from (ON,ON,ON) to (OFF,OFF,OFF). When a user’s channel is ON, one packet can be transmitted successfully to the mobile user during the time-slot. The associated scheduling problem is to decide which user is allowed access to the channel during each particular time-slot.

A naive scheduling rule would be to employ the round-robin mechanism. In such a scheme, the users periodically are given access to the channel, with each user getting 1/3 of the slots over time. As the channel of each user is equally likely to be ON or OFF in each time-slot, it follows that over time, on average, each user will get a data rate of 1/6 packets/slot.

On the other hand, suppose that the base-station uses knowledge of the instantaneous channel state. Then, a simple policy would be to schedule and transmit to a user whose channel is in the ON state. If more than one user’s

16

channel is in the ON state, then the scheduler could pick a user randomly (equally likely) among those users whose channel are ON, and send data to the selected user. This simple example assumes that all the users have identical traffic demands. For the case where some users have greater needs than others, such users would be assigned channel access with greater likelihood. We observe that this policy ensures that no data is sent by the base-station if and only if all users’ channels are OFF (which occurs on average, only 1/8 of the time). Thus, the total data rate achieved by this state dependent rule is 1 – 1/8 = 7/8 packets/slot. As this rule is symmetric across users, it follows that on average, the data rate per user is 7/24 packets/slot, which is almost twice the throughput as the round-robin scheme which provided 1/6 packets/slot. In addition, the base station does not radiate power during bad channel conditions, thereby decreasing interference levels in the wireless network. Moreover, it is obvious that the larger the variation in the channel, the larger will be the gain due to state-dependent scheduling. This gain achieved due to channel-state dependent scheduling is the multi-user diversity gain discussed in section 2.2.

The above example illustrates the significance of multi-user diversity gain in network scheduling. However, a central question is how to design on-line algorithms which achieve this gain, while also supporting diverse quality of service requirements for various users.

2.4

Thesis Motivation

The previous sections illustrate the challenges imposed on the scheduling problem by the wireless nature. The gains that can be accrued based on crosslayer methods, such as multiuser diversity schemes, were clarified. However, these schemes provide no delay guarantees and thus are not suitable for delaysensitive applications. Besides, greedy schemes such as Knopp and Humblet scheduling don't provide farness in system resource management.

17

Now, we

formulate the objective of our research. In this thesis, we are trying to find answers to the following questions:

(i)

How can multiple real-time data users be supported simultaneously with good quality of service (QoS), namely, with packet delays not exceeding given thresholds with high probability?

(ii)

How can system resources be fairly allocated among various users (keeping in mind that some users may demand more system resources than others, even if their QoS requirements are the same or even less, due to the difference in their wireless channel quality)?

Though these questions have not been answered fully, there has been extensive research on various aspects of the above problems. In the rest of this thesis, we are attempting to find practical answers in different wireless networks. Specifically, we are considering two different popular multiplexing schemes that are candidates for systems beyond 3G, namely TDMA and OFDMA.

18

Chapter 3 Channel-Aware Scheduling Disciplines for DelayBounded Traffic in TDM-Based Wireless Networks

Providing delay guarantees to time-sensitive traffic in future wireless multimedia networks is a challenging issue. This is due to the time-varying link capacities and the variety of real-time applications expected to be handled by such networks. Multiuser diversity schemes exploiting variation in channel states of users in a wireless system have been shown to offer orders of magnitude increase in the performance of wireless systems. In this chapter we propose and evaluate the performance of two channel-aware scheduling schemes that are capable of providing such delay guarantees in wireless networks. In the first proposed

scheme,

the

Channel-Dependent

Earliest-Due-Date

(CD-EDD)

discipline, the expiration time of the head of line packets of users' queues is taken into consideration in conjunction with the current channel states of users in the scheduling decision. This policy attempts to guarantee the targeted delay bounds in addition to exploiting multiuser diversity to make best utilization of the variable capacity of the channel. In the second scheme we attempt to ensure that the number of packets dropped due to deadline violation are fairly disturbed among users. This provides fairness in both bandwidth sharing as well as the quality of service delivered to different users. A unique feature of our work is explicit provisioning of statistical QoS as well as ensuring fairness in data rate, delay bound, and delay bound violation.

In the next chapter, we provide extensive simulation results to show the different performance aspects of the proposed schemes. In particular, we show that it can simultaneously guarantee a delay upper bound while providing fairness among all users with different channels, as well as providing fairness of throughput sharing among different users in fading wireless channel networks.

19

3.1

Network Model We first describe the cellular wireless network model used, and more

specifically the downlink of such a network, where a base station transmits data to N mobile terminal users, each of which requires certain QoS guarantees. In cell-structured wireless networks, the service area is divided into cells, and each is served via a base station. A single cell is considered in which a centralized scheduler at the base station controls the downlink scheduling, and uplink scheduling uses an additional mechanism such as polling to collect transmission requests from mobile terminals [8], [9]. We assume that downlink and uplink transmission don't interfere with each other. We consider a time slotted system, where time is the resource to be shared among users. A time-slotted cellular system can have more than one channel (frequency band), but at any given time, only one user can occupy a given channel within a cell. Here, we focus on the scheduling problem for a single channel over which a number of users could be time-division multiplexed. Time division multiple access (TDMA) systems divides the time into time slots of length Ts, during which data transmission of a single user, the scheduled user, is carried out using all resources available to the base station at that time instant. For downlink scheduling, packets destined to different users are put in separate queues, one corresponding to a user's data flow.

As described in the previous chapter, The time varying channel conditions of wireless links are related to three basic phenomena: fast fading on the order of milliseconds, shadow fading on the order of tens to hundreds of milliseconds, and finally, longtime-scale variations due to user mobility. The channel fading processes of the users are assumed to be stationary, ergodic and independent of each other, and we also assume that the channel gains are constants over one time slot's duration. Since our algorithm will exploit the users’ channel conditions in making the scheduling decision, we consider wireless systems with mechanisms to make predicted channel conditions available to the base station as is commonly the case with technologies such as

20

HDR [6], UMTS-HS-DPA [19], (E)GPRS [20], etc. The particular mechanism employed by a system depends on the communication standard. For example, in HDR and UMTS-HS-DPA, the underlying physical channel uses explicit channel notification so that the scheduler has the best possible knowledge about the channel conditions. In UMTS-DCH, there is a logical control channel assigned with every user that allows a coarse estimation of the channel condition. The packet extensions (E)GPRS to GSM-TDMA systems offer various coding schemes to support data transmission over a wide range of channel conditions. These are typically switched on a slower timescale, e.g., based on experienced frame error rates. Regardless, the recently selected coding scheme that determines the ‘throughput per RLC-block’ can serve as a coarse indicator of the channel condition for the scheduler. In general, the faster and more precisely the channel quality can be predicted, the better the scheduler can incorporate this information into its decision as to which user to schedule next [8]. Thus, we will assume that base station has the current (or delayed) channel state information of each user.

Figure 3.1 shows the architecture for channel state aware scheduling of multiuser traffic over a fading time slotted wireless channel. The scheduler makes a decision to serve a particular queue at the beginning of every time slot. This decision could depend on HoL packet delay information, such as its waiting time and its time to expire, as well as channel states. Once a decision has been made, the chosen queue is serviced in that slot at the maximum possible rate corresponding to the state of its channel.

A very important and challenging problem in the design of high speed communications networks is that of providing Quality of Service (QoS) guarantees, usually specified in terms of rate guarantees, loss probabilities or delays of packets in the network. The control of delays is often of crucial importance, especially for real time applications like audio and video streaming. Real-time traffic class have been modeled as a stream of packets, with each packet having an expiry time beyond which the packet is of no use to the end

21

user. The objective of the scheduler is to transmit each packet before its expiry, and if this is not possible, to minimize the number of lost packets due to deadline expiry. Expiry occurs when a packet have been waiting in the base station queue time greater than its deadline and have not been served. Such a packet is dropped by the system.

Such QoS requirements can be specified in terms of deadline Ti (deterministic QoS requirements) or accompanied with allowed violation probability δi (opportunistic QoS) for each user traffic flow. In this thesis, we will use the following model in defining QoS: for every user out of the N users in the system, let Wi to be the delay encountered by user i packets, then the scheduling rule should also satisfy the QoS constraints given in the form P (Wi > Ti ) ≤ δ i

(3.1)

for i = 1, 2, …. , N. The problem is to minimize the violation occurrences.

Base Station User 1

1

User 2

2

Wireless channel

Scheduler User N Link Status Monitoring

N Mobile Terminals

Figure 3.1. Channel state dependent downlink scheduling architecture for multiple users sharing a wireless TDMA channel.

22

In what follows in this chapter, all scheduling disciplines, either the proposed ones or the existing ones, are introduced and discussed in systems functioning according to the model presented in this section, unless other models are stated.

3.2

Previous Work In this section, we present a survey of existing scheduling disciplines

applicable in wireless networks with delay-sensitive users' traffic. In [21], the authors proposed to apply the wireline EDD discipline scheduling in wireless networks. They called it Feasible Earliest Due Date (FEDD) scheduling. They assumed a simple channel state model in which the channel can be either "good" or "bad". Thus, FEDD scheduling chooses to schedule the packet which has the earliest time to expiry from the set of queues whose channels are marked good only. So that, such a scheduler is similar to the wireline one. Wireline EDD was proved to be optimal for i.i.d. Bernoulli arrival processes. This algorithm showed unfairness in throughput sharing, since the user suffering from long periods of bad state will not be compensated by any mechanism, thus the authors suggested to use a rate-proportional scheduler which provides guaranteed minimum bandwidth to each connection and distributes the residual bandwidth using the FEDD criterion.

The authors in [22] proposed a modification to the Largest Weighted Delay First (LWDF) scheduling discipline that take the time varying characteristics of wireless channels. The LWDF [23] discipline is a parameterized version of the first-input first-output (FIFO) that works as follows: at the beginning of the time slot starting at time t, serve at the maximal possible rate the queue of user j, where j = arg max{aW i i (t )} i

23

(3.2)

where Wi(t) is the waiting time of the ith user head of line (HoL) packet (i.e. the maximum waiting time of any packet of the ith queue) at the time slot starting at time t, and ai > 0, i = 1,2, …., N, are a fixed set of constants. If the delay QoS requirements for all users is in the form of the deadline due violation probability as in equation (3.1). It was proved in [23] that the choice of weights ai that makes LWDF discipline nearly throughput optimal (note however that this choice of the weights is valid only for large values of the delay bound Ti and very small values of δi) is :

ai = − log

δi Ti

(3.3)

The proposed modification of [22] was to use multiuser diversity in order to increase the efficiency of channel utilization (and hence the system throughput) and also compensate delayed users. The proposed Modified Largest Weighted Delay First (M-LWDF) discipline schedules the jth user, where j = arg max{γ i µi (t )Wi (t )} i

(3.4)

where μi(t) is the state of the channel of user i at time t, i.e. the actual rate supported by the channel. This rate is assumed to be constant over one slot. It had been proven in [22] that choosing γ i =

ai , where ai is chosen as in (3.3) µi

and µ i is the mean rate supported over the ith channel that corresponds to the average fading level of the channel, makes the M-LWDF discipline throughput optimal. In practice, the mean rate can be measured over a certain, but relatively long, time window [7] by averaging the rate actually given to that user in that window. The M-LWDF scheduling rule could be rewritten as schedule the jth user, where

24

j = arg max{ai i

µ i (t ) Wi (t )} µi

(3.5)

The scheme provides good QoS for delay sensitive users only with properly chosen parameters and can be easily implemented. It was shown in [22] that MLWDF rule is optimal in the sense that it can handle all the offered traffic and renders the stability of all queues if this is feasible to any other rule, such a rule is called a throughput optimal one. The authors in [22] also showed how M-LWDF can be used to achieve alternative QoS defined in terms of a predefined minimum long-term throughput for each user. Unfortunately, M-LWDF scheduling was found to be highly dependent on the value of the parameters ai, and its performance change significantly with the QoS requirements of users' flows.

In order to reduce the dependency of the M-LWDF rule on the settings of the parameters ai, the authors in [22] also proposed a new scheduling discipline, which was further investigated and implemented in [24] for CDMA/HDR system and modified in [25]. The proposed scheme was called the exponential rule scheduling discipline. This scheme schedules the jth user at the time slot starting at time t for transmission, where aiWi ( t ) − aW

j = arg max{γ i µi (t )e

b + aW

i

}

(3.6)

and aW =

1 N

N

∑ a W (t ) i =1

i

i

(3.7)

and b > 0 is an arbitrary constant, and γi > 0, i = 1,2, … ,N, were set as in the MLWDF in the form γ i =

ai µi

to represent the tradeoff between the QoS

requirements and being proportionally fair discipline. For b =1, the exponential rule will be in the form [22]

25

µ (t ) j = arg max{ai i e i µi

aiWi ( t ) − aW 1+ aW

}

(3.8)

This policy attempts to equalize the weighted delays aiWi(t) of all the queues when their differences are large. If one of the queues would have larger (weighted) delay than the others by more than order

aW , then the exponent

term becomes very large and overrides the channel considerations (as long as its channel can support a non-zero rate), hence leading to that queue getting priority. (It can be easily noticed that the aW term in the exponent can be dropped without changing the rule as it is common for all queues. This term is present only to emphasis the motivation of the rule). On the other hand, for small weighted delay differences (i.e. less than order

aW ), the exponential term is

close to unity, and the policy behaves as the proportionally fair rule. Hence, the exponential rule policy gracefully adapts from a proportionally fair one to one which balances delays [22], [24]. The choice of b = 1 in [24] is simply to prevent the exponent from blowing up when the weighted delays are small.

It was proven in [26] that the exponential rule is a throughput optimal policy for a quit general assumptions on the channel and arrival processes. Moreover, simulation results in [24] showed that the exponential rule scheduling exhibits better delay tails compared to any other scheduling policy in the sense that the delays of all users are about the same and are all reasonably small but for large values of Ti and very small values of δi, which is not desired practically. Besides, like the M-LWDF discipline, the exponential rule scheduling was found to be highly dependent on parameter settings. Therefore, It was advised that for future research identifying good scheduling rules which are less dependent on the "proper" parameter setting would be desirable [22].

26

3.3

The Proposed Scheduling Schemes The goal of this thesis is to find good performing disciplines for delay

sensitive traffic, that could be used to schedule users with time-varying link conditions. From the above study of such a problem, we mean by the word "good performing" that such a discipline should have attempt to achieve the following objectives: §

Maximize the overall system throughput

This could be easily achieved if the scheduling discipline utilizes the multiuser diversity, inherently existing in systems under consideration. Multiuser diversity efficiently utilize the channel capacity by giving higher priority to the user with the best channel conditions at a certain time instant, which means that this user can transmit with the highest possible rate, and thus increase the system throughput. §

Graceful compensation of large delays

For real-time traffic packet, it is necessary that the delivery of such a packet be done within a certain time period, usually defined by a deadline, otherwise, the information contained in this packet will be irrelevant for the receiver. So that the system drops such a packet and may ask the transmitter to resend it, which reduce the system efficiency. Thus, a good scheduling discipline should have a mechanism to compensate queues whose packets are experiencing long delays in the system. This case may be encountered by users far from the base station, which yields that their channels are suffering from long periods of bad conditions. Such a mechanism will :

i.

Guarantee the QoS requirements if defined as delay bound or packet loss ratio.

27

ii.

Minimize the number of packets dropped due to deadline violation, which in turn increase the system throughput.

§

Fairness in resource sharing

Fairness is an intuitively desirable property of scheduling disciplines. A fair scheduling discipline should distribute the resources available to the system, such as capacity and time, fairly among different users. Fairness may be accomplished in

i.

Delay distributions A scheduling algorithm that keeps all the delays close to each other at a relatively small value is much better one that keeps one user's (or some users') delay very small while other users experience much larger delays

ii.

Service rate On the long term, the difference between any two users in the rate by which their queue are served should be as small as possible. This could be achieved by means of proportionally fair rate assignment.

iii.

Number of packets lost This also will increase the fairness in throughput sharing.

§

Weak dependency on the parameters setting

As advised for future research in [22], it is desirable to identify good scheduling disciplines which are less dependent on the proper parameter setting, i.e. their performance does not change significantly for wide

28

range of QoS requirements, and thus could be employed in different systems serving wide range of applications.

3.3.1 Channel Dependent Earliest Due Date (CD-EDD) Scheduling Discipline In classical wireline earliest due date scheduling, each packet is assigned a deadline, and the scheduler serves packets in order of their deadlines. The queue with the smallest deadline will be served first by the maximum available rate. If the scheduler is overcommitted, then some packets miss their deadlines. Thus with EDD, scheduled packets are experiencing delays lower than the assigned deadlines, so it can be used to provide QoS requirement of delay sensitive applications. This policy was shown to be optimal in the wireline case (for independent identically distributed Bernoulli arrival and channel processes). EDD can not be employed in wireless networks since it does not consider the time varying characteristics of wireless links. It was not reported in the literature the existence of a scheduling discipline that combines the EDD scheduling concept with a mechanism to adapt with the characteristics of wireless networks. (with the exception of the attempt in [21] which dos not actually adapt with the time varying nature of wireless channel, since it assumed the very ideal channel model of good or bad).

We propose a new scheduling discipline, which we call the channel dependent earliest due date first (CD-EDD) policy. This is basically a channel state-dependent EDD policy where the scheduler chooses to schedule the queue whose HoL packet has the earliest time to expire and the best channel conditions, and consequently the highest transmission rate, among all queues. The proposed CD-EDD scheduling policy is as follows:

29

At the time slot starting at time t, schedule with the maximum possible rate the queue of the jth user, where

j = arg max{ai i

µ i (t ) Wi (t ) } µ i di (t )

(3.9)

where ai is the weighting parameter reflecting the statistical QoS requirements of the ith user. μi(t) is the actual rate that could be used for transmission by the ith user at time t, which reflects the current channel state of the user's channel. µ i is the mean rate supported or previously offered to the ith user.

Wi(t) is the delay experienced by the HoL packet since its entrance to the ith user queue in the base station. di(t) is the time to expire of the ith user HoL packet, which is the difference between the deadline, Ti, and the delay experienced till time t, Wi(t), i.e.

di (t ) = Ti − Wi (t )

(3.10)

The behavior of the CD-EDD policy can be described as follows: when certain queue have its HoL packet waiting in the system for a relatively long period (but have not expired yet), its time to expire will decrease significantly. So that, the term

Wi (t ) 1 will grow significantly due to the contribution of d i (t ) d i (t )

until it overcomes other terms in the policy which represent the cause of such a large delay, namely the bad channel conditions of that user. This also reduces the number of packets that could be lost due to deadline due violation. On the other hand, if the delay characteristics of all users are about the same, i.e. their time to

30

expire and waiting times are close, the term

Wi (t ) will be common to all users, d i (t )

and the policy then reduces to a proportionally fair one that exploit multiuser diversity to efficiently utilize the channel bandwidth of multiuser systems in a quite fair manner. It is worth mentioning that weights ai doesn't contribute significantly in the decision. A rule of thumb for choosing ai which works in practice is the one given in (3.1) since this rule is suggested by large deviations of optimality results.

In other words, the CD-EDD is a scheduling discipline that can be used to provide QoS guarantees, defined in terms of delay bounds, for real-time traffic in wireless networks. This is achieved by increasing the priority of delayed users to get access to the medium over time. An important feature of the CD-EDD policy is its weak dependency on the value of QoS required, and thus can be used for a wide variety of QoS requirements.

3.3.2 A Set of Violation Fair Rules

Another new idea than can be applied in conjunction with any scheduling discipline in order to enhance the fairness characteristics of these policies is proposed here, which is based on the number of deadline violations occurring to packets of different queues. This requires that each queue in the base station to be accompanied with a counter that counts the number of packets lost in this queue's flow. This may be implemented practically be means of sliding windows basis. Let us define

NVi(t) to be the number of deadline due date violations encountered in the flow of the ith user up to time t. NV (t ) to be the average of the number of violations in all N queues, i.e.

31

NV (t ) =

1 N

N

∑ NV (t ) i =1

(3.11)

i

The scheduler may use these numbers of deadline violations and find a way to compensate users suffering from unfairness in the number of packets recently lost. For example the scheduler could give more credit or increase the priority level so that such a user could access the system resources. This could be achieved be a scheduling discipline that includes a term like

NVi (t ) NV (t )

, such a

scheduling discipline we will call a violation fair (VF) discipline.

Initially, we considered this idea directly to the proportionally fair [7] scheduling discipline, yielding the violation fair-proportionally fair policy. So, in each time slot the scheduler chooses the jth user, where

j = arg max{ i

µ i (t ) NVi (t ) } µ i NV (t )

(3.12)

This will reduce the number of packets lost for users of bad channel conditions which enhances the fairness characteristics of the proportionally fair policy. On the other hand, it still lacks a mechanism for provisioning QoS guarantees for delay sensitive traffic.

Applying the proposed idea to both the M-LWDF and the exponential rule policy, resulting in the violation fair modified largest weighted delay first (VF-M-LWDF) discipline

j = arg max{ai i

µi (t ) NVi (t ) Wi (t )} µi NV (t )

and the violation fair exponential (VF-EXP) discipline

32

(3.13)

µ (t ) NVi (t ) j = arg max{ai i e i µi NV (t )

aiWi ( t ) − aW 1+ aW

}

(3.14)

enhances their performance in the sense that the addition of the violation fair term will ensure fairness in both the delay times and throughput. This could be explained since both the M-LWDF and the exponential minimize the packet delay and when the number of lost packets is fairly distributed among users, the long term service rate will be equal for all users. Another very important gain of these two disciplines, which appeared in simulation results, is that their performance is not much dependent on the parameter setting as was the case in the original rules.

Finally, if the proposed violation fairness technique is applied with the previously proposed CD-EDD, we can get a scheduling discipline applicable in wireless network that explicitly provide QoS to delay sensitive traffic, with a unique fairness characteristic in data rate, delay bound, and delay bound violation triplet. The violation fair-channel dependent-earliest deadline due date (VF-CD-EDD) scheduler chooses, at the time slot starting at time t, the jth user for transmission, where j = arg max{ai i

µi (t ) Wi (t ) NVi (t ) } µi d i (t ) NV (t )

(3.15)

In chapter 4, we provide an extensive set of simulation that explore the characteristics our proposed CD-EDD discipline compared with the M-LWDF and the exponential rule disciplines as a reference. We also show the advantages achieved by their violation fair versions, namely the VF-CD-EDD, the VF-MLWDF, and the VF-exponential scheduling discipline.

33

34

Chapter 4 Simulation Results and Discussions of the TDM-Based Scheduling Disciplines

4.1

Simulation Setup First, we describe the system model used in simulating the wireless cell-

structured channel-aware scheduler described in section 3.1. We chose the High Data Rate (HDR) CDMA system model. HDR technology has recently been proposed as a TDM-based overlay to CDMA as a means of providing packet data services to mobile users. HDR is a downlink packet data service which occupies a single data carrier of a CDMA system, where users share the channel in a time division multiple access, i.e. at each time slot Ts only one user can transmit its data at the full power available to the base station. A very attractive feature of HDR enabling the use of efficient scheduling algorithms since it provides a mechanism for link status monitoring as in chapter 3.

The cell serves N mobile users each receiving a data flow. The base station contains N queues, one corresponding to a different data flow and an associated scheduler. The scheduler makes a decision every 1.667 millisecond based on the current information available at the start of the time slot. As we are mainly interested in scheduling users with time sensitive traffic, we model the packet arrival processes to each of the N user's queues as a Bernoulli processes with a mean rate of 28.8 Kbps. This rate corresponds to the typical rate required for streaming audio over the Internet. Real time users, like streaming audio, will indeed generate a smooth traffic, and hence, a Bernoulli model seems reasonable for such traffic. Like the original EDD, the CD-EDD is expected to be throughput optimal for such traffic model. The HDR packet size is 128 bytes.

35

The QoS requirements of each user are expressed in the form of the probability that the waiting time encountered by a typical packet of the ith user stream exceeds the deadline Ti is less than or equal to δi . We assume for simplicity that all users require the same service quality, i.e. they all have the same Ti and δi.

Even thought all users share a common channel, the channel capacity, of that channel seen by different users is different. This is due to the wireless link characteristics described above. The instantaneous capacity of a wireless can be given by

C (t ) = B log 2 (1 + h (t ) SNR ) 2

(4.1)

where C(t) is the channel capacity or the data rate (in bits per second) that can be transmitted on a channel of bandwidth B (Hertz). The bandwidth of HDR/CDMA channel is 1.25 MHz. While |h(t)| is the normalized gain (or fading level) of the wireless channel at the time t, and SNR is the required signal to noise ratio at the receiver antenna (13 dB for HDR/CDMA system). For simulation purpose, we use the typical HDR and cell parameters given in [6]. The average fade level distribution of a typical mobile in HDR cell can be easily found. The fading process of each user's channel can be represented by a Rayliegh process. So, in order to simulate N channels, we pick N fading levels according to the above distribution, and generate N Rayleigh processes with means equal to these fading levels after being normalized. A sample of such a process represents the normalized channel gain of a certain channel at time t with a probability

r2

r − 2 p R (r ) = 2 e 2 σ , σ

r≥0

where σ is related to the mean normalized fading level h according to

36

(4.2)

h =σ

π 2

(4.3)

Accordingly, the mean data rate µi that can be supported on the a channel of mean fading level hi is

2

µi = B log 2 (1 + hi SNR )

(4.4)

It is worth mentioning that HDR doesn't not support arbitrary transmission rates, i.e. the scheduled user can not transmit with the rate computed above rather than the maximum possible rate from a set of discrete rates. HDR user can transmit data at a rate of 9.6 * 2i Kbps, i = 0, 1,…, with a maximum rate of 2 Mbps. Thus the state of channel µi (t ) at the start of the time slot at time t will be the actual rate that the channel can support, rather than the channel capacity at that time instant. We have assumed that the channel conditions do not change significantly within a time slot duration. Finally, all simulations will be carried out for a duration of 10 minutes.

4.2

Performance Metrics Here, we discuss the performance metrics we used to evaluate the

performance of various scheduling algorithms. These are the delay, throughput, and loss criteria. We briefly outline them in turn. §

Delay performance measures:

For real-time traffic, a good measure of performance is the delays packets incur at the base station. A good scheduling algorithm should keep all delays below the delay bound Ti with high probability. So that, the delay distribution

37

curves can be used to illustrate the delay behavior of the scheduling disciplines under consideration. As remarked earlier, scheduling algorithms which keep the delays of all the users about the same and keep them all reasonably small are superior to those which may have better delay tails for one of the users but have very bad delays for other users. (We remind that we have assumed for simplicity that all users needs the same QoS).

Some parameters of the delay distribution, such as the worst-case delay, the mea delay, or the 95-percentile delay, could be used to evaluate the QoS received by a user. We will consider the 95-percetile delay as our measure of the delay guarantees offered by a scheduling discipline. The 95-percentile delay is defined as the delay which ninety-five of the packets of a user's queue have suffered delays smaller than it. §

Throughput measure:

Unlike non-real-time users, which may have their QoS requirements in the form of a guaranteed minimum rate, real-time users do not need the scheduler to preserve certain bandwidth for their packets' transmission. So that, we will only take the total throughput achieved be the system as a measure of the throughput performance of the scheduling disciplines at hand. The fairness of bandwidth sharing between users is also a good indication of the efficiency of any scheduling discipline. §

Loss measure:

The fraction of packets lost, due to deadline violation, for a user can be used to evaluate the loss performance of a scheduling discipline. This fraction is required to be as small as possible in order to say that the scheduler is suitable for scheduling real-time traffic. From fairness point of view, it is better to equalize the fraction of packets lost in different queues.

38

4.3

Results and Discussions First, we estimate the number of users, with traffic like the one described

above, that can be supported by a single HDR cell under each of the previously mentioned scheduling policies. In this experiment, we simulate N users, uniformly distributed throughout the cell, and monitor the average service rate received by a single user for different values of N. Starting with only two users in the system, as we increase N, and as long as the channel capacity can support such a number of users, it is expected that the service rate received by each user will be similar to its arrival rate. Any further increase of the number of user, while keeping the channel capacity unchanged, will make the scheduler unable to serve such users in the appropriate time so more packets will be discarded and thus the average throughput share of each user will decrease. So, we will take the number of users beyond which the average service rate received by any user in the system start to decrease as the maximum number of user that can be supported our network, or the system capacity.

Figures 4.1 through 4.6 show the average service rate per user versus the number of users in the cell for different delay bounds, more specifically, 20, 60, 100, 200, 300, 400 milliseconds, respectively, and for a violation probability (δi)of 95%. These delay-bounds are encountered practically in multimedia streams. It is clear that the higher the delay bound, the higher the number of users supported by the system because, for higher bounds, it takes relatively long time before a packet expires so the scheduler can serve more users in that times. Table 4.1 summarizes the results of this experiment.

Delay bound (m sec)

20

60

100

200

300

400

CD-EDD

4

12

16

16

16

16

M-LWDF

4

10

12

16

16

16

EXP

4

8

12

16

16

16

Table 4.1. The system capacity of HDR cell achieved by different disciplines.

39

Figure 4.1. The average throughput per user for 20 m sec delay bound.

Figure 4.2. The average throughput per user for 60 m sec delay bound.

40

Figure 4.3. The average throughput per user for 100 m sec delay bound.

Figure 4.4. The average throughput per user for 200 m sec delay bound.

41

Figure 4.5. The average throughput per user for 300 m sec delay bound.

Figure 4.6. The average throughput per user for 400 m sec delay bound. Note that the decreasing tendency of the previous figures is clear even though some unexpected increases appear due to the random nature of generating different simulation runs.

42

In our second experiment, we investigate the delay performance of various scheduling disciplines. We begin with a comparison of the proposed CDEDD scheduling disciplines versus to both the M-LWDF and the exponential rule scheduling disciplines reported as the most suitable policies for scheduling delay sensitive traffic in the literature. In order to be able to evaluate the performance of the scheduling techniques, the system should be loaded with its maximum capacity. Based on the results of the first experiment in Table 4.1, we will assume that the cell is serving 14 mobile terminals, i.e. N =14, and generate 14 i.i.d. Bernoulli processes each with a men rate of 28.8 Kbps to represent their packet arrival processes. Using the procedure described before, we also generate 14 Rayleigh-faded channels with mean channel gains and the corresponding channel capacities listed in Table 4.2.

User Number

Mean Normalized Channel Gain

Mean Rate (Kbps)

1

0.1102083

400.72

2

0.1096598

397.14

3

0.1087368

391.14

4

0.1077732

384.91

5

0.1040045

360.88

6

0.1009808

342.00

7

0.0898876

276.01

8

0.0836667

241.43

9

0.0819434

232.18

10

0.0798461

220.60

11

0.0739499

191.24

12

0.0660818

154.27

13

0.0652852

150.72

14

0.0623138

137.80

Table 4.2. Fading levels and its corresponding capacities used in simulations.

43

In Figures 4.7 through 4.12, we plot the delay distribution tails for both user 1 (with the best channel conditions) and user 14 (with the worst channel conditions) for the M-LWDF, exponential rule, and the proposed CD-EDD scheduling disciplines for the values of the delay bound given above. It is obvious that all policies will have the same performance for very small bounds, e.g. 20 milliseconds, with such a scare resources the networks can not serve such a number of users with this high QoS. We observe that for moderate delay bounds, e.g. 60 and 100 milliseconds, the performance of the exponential rule scheduling slightly outperforms both the M-LWDF and CD-EDD disciplines. In this case, all delays are kept at small value and about the same for all users. While for higher bounds, e.g. 200, 300,and 400 milliseconds, we find that the delay performance of the CD-EDD scheduler don't change significantly, while the performance of both the M-LWDF and the exponential rule schedulers degrades severely as the gab between the tails of the best user and the worst user gets wider. This severe degrading in performance is caused by the dependency of both rules on the quality of service required, which affects the value of the weights {ai} that controls the performance of these rules. (Keep in mind that the goal of the M-LWDF is to minimize the weighted delays while the exponential rule scheduling tries to keep all the delays around the average of these weighted delays ( aW ),they both do not target a certain bound to serve as much packet as possible before this bound is violated.) On the other hand, the CD-EDD policy does not suffer from such a dependency on the QoS, and consequently the weight values, since the philosophy of this rule is mainly to serve more packets before their deadlines expire. This may cause the packets of the best channel users to experience relatively higher delays than in the case of other rules, but still lower than the worst user. This occurs on the expense of preventing more packets from being dropped due to deadline violation.

This can be further demonstrated when we plot the maximum and the minimum 95 percentile delay and percentage of packets lost due to deadline violations versus the delay bounds as shown in Figure 4.13 and 4.14,

44

respectively. It is clear that it is not desirable to keep one or some users' delays below a value much smaller than the required bound while leaving one or some users suffering from dropping a large percentage of their packets as the case with both the M-LWDF and exponential rule schedulers. While in CD-EDD discipline, the maximum and the minimum 95 percentile delay are about the same and so close to the delay bound, besides the packet loss ratios are very small and very close to each other. So, the base stations can guarantee strong delay bounds for all delay sensitive users in a fair manner by using the CDEDD scheduling discipline, regardless of the value of those bounds.

When the same experiment was carried out for the violation fair versions of the above disciplines, it was found that the performance of all the violation fair policies is not much dependent on the QoS required (including the disciplines which was originally suffering from that dependency). Figures 4.15 through 4.20 show their delay distribution tails of the best user and the worst user for different delay bounds. It is observed that the tails became much more closer for the violation fair CD-EDD, but a little bit higher delays, than those of either the violation fair M-LWDF or violation fair exponential policies.

As shown in Figures 4.21 and 4.22, where the maximum and the minimum 95 percentile delay and percentage of packets lost due to deadline violations are plotted versus the delay bounds of the violation fair policies, the service offered to different user, in terms of 95% delay, is about the same. Furthermore, the amount of packets dropped in the system due to deadline violations becomes very small. Moreover, this amount is distributed among all users in a fair manner. Like the CD-EDD, the VF-CD-EDD have the superiority since t achieves the smallest number of packets lost due to deadline violations.

45

Figure 4.7. Delay distributions of user 1 and user 14 for 20 m sec delay bound.

Figure 4.8. Delay distributions of user 1 and user 14 for 60 m sec delay bound.

46

Figure 4.9. Delay distributions of user 1 and user 14 for 100 m sec delay bound.

Figure 4.10. Delay distributions of user 1 and user 14 for 200 m sec delay bound.

47

Figure 4.11. Delay distributions of user 1 and user 14 for 300 m sec delay bound.

Figure 4.12. Delay distributions of user 1 and user 14 for 400 m sec delay bound.

48

Figure 4.13. The maximum and the minimum 95-percentile delays.

Figure 4.14. The maximum and the minimum percentage of lost packets.

49

Figure 4.15. Delay distributions of user 1 and user 14 for 20 m sec delay bound (VF rules).

Figure 4.16. Delay distributions of user 1 and user 14 for 60 m sec delay bound (VF rules).

50

Figure 4.17. Delay distributions of user 1 and user 14 for 100 m sec delay bound (VF rules).

Figure 4.18. Delay distributions of user 1 and user 14 for 200 m sec delay bound (VF rules).

51

Figure 4.19. Delay distributions of user 1 and user 14 for 300 m sec delay bound (VF rules).

Figure 4.20. Delay distributions of user 1 and user 14 for 400 m sec delay bound (VF rules).

52

Figure 4.21. The maximum and the minimum 95-percentile delays (VF rules).

Figure 4.22. The maximum and the minimum percentage of lost packets (VF rules).

53

Finally, we study the throughput characteristics of the aforementioned scheduling disciplines. Here we are interested in studying the overall throughput of the system as well as how the throughput is divided among users with different channel conditions, i.e. fairness in throughput sharing. The results of this experiment is illustrated in Figures 4.23 through 4.28. In part (a) of these figures plot the overall throughput of the system versus the number of users using the simulation setup of the first experiment. When the system is operating with number of users less than the system capacity, the total throughput of the system equal the sum of the arrival rate. When the system is serving more users than the system capacity, we observe that, regardless of the delay bound: §

The total throughput achieved using the CD-EDD is higher than any other rule because this policy causes the smallest number of packet to be lost due to deadline expiry.

§

The total throughput achieved using any violation fair discipline is less than the throughput achieved with the non-violation fair counterpart. This is because in order to achieve fairness in the ratio of packets lost among different user, the violation fair polices may prevent users with good channel conditions from transmitting their data for the sake of users with bad channel conditions (such channels support low transmission rates only). So the overall throughput achieved by the system will be lower than the case where the scheduling policy do not intend to make users with good channel condition drop some packet for the purpose of fairness.

In part (b) of Figures 4.23 through 4.28, we compare the average throughput share of a single user against the actual throughput shares of both the best channel user and the worst channel user for different delay bounds for both the original disciplines and their violation fair counterparts. In this experiment, we use the same simulation model used in the previous experiment where the base station serves the 14 user listed in Table 4.2. As seen in these figures, the

54

CD-EDD discipline achieves the greatest average throughput per user, besides, it keeps the actual throughput share as close as possible to that average. Note that the throughput shares of the best channel user and worst channel user are always close to each other for various delay bounds for CD-EDD scheduling. This means that the CD-EDD discipline is the most throughput fair policy that can guarantee delay bounds for real-time users. On the other hand, even though the violation fair disciplines leads to a slightly lower throughput per user as previously discussed, they ensure fairness in throughput sharing among all users regardless the delay bound. This is because in such disciplines, the number of packets dropped due to deadline expiry is almost equal for all users. We summarize the main results of our simulation experiments in Table 4.3.

Delay bound guarantee

CD-

M-

EDD

LWDF



X



Highest

VF-CD-

VF-M-

EDD

LWDF

X







X

X







Moderate

Lowest

EXP

VF-EXP

Independency of QoS requirement Total system throughput Delay fairness Throughput fairness



Less than original counterparts

Depend on QoS







Best

Good

Worst









Bad

Worst







Delay bound violation fairness

Table 4.3. Simulation results summary.

55

a) The total throughput achieved.

b) Throughput fairness. Figure 4.23. The throughput behavior at 20 m sec delay bound.

56

a) The total throughput achieved.

b) Throughput fairness. Figure 4.24. The throughput behavior at 60 m sec delay bound.

57

a) The total throughput achieved.

b) Throughput fairness. Figure 4.25. The throughput behavior at 100 m sec delay bound.

58

a) The total throughput achieved.

b) Throughput fairness. Figure 4.26. The throughput behavior at 200 m sec delay bound.

59

a) The total throughput achieved.

b) Throughput fairness. Figure 4.27. The throughput behavior at 300 m sec delay bound.

60

a) The total throughput achieved.

b) Throughput fairness. Figure 4.28. The throughput behavior at 400 m sec delay bound.

61

62

Chapter 5 Channel-Aware Scheduling for Delay-Bounded Traffic in OFDMA-Based Wireless Networks The proliferation of cheap, small and powerful notebook computers, Personal Digital Assistants (PDAs) and other high speed mobile data terminals has fueled the persisting demand for a mobile alternative to the wireline access techniques, such as DSL and cable modems. Mobile Broadband Wireless Access (MBWA) is an appealing system for providing flexible and easy deployment solution to high speed mobile communications. The IEEE 802.20 (MBWA) working group was formed to develop a standard which sets the specification of physical and medium access control layers of an air interface for interoperable mobile broadband wireless access systems, operating in licensed bands below 3.5 GHz, optimized for IP-data transport, with peak data rates per user in excess of 1 Mbps. It supports various vehicular mobility classes up to 250 Km/h in a MAN environment and targets spectral efficiencies, sustained user data rates and numbers of active users that are all significantly higher than achieved by existing mobile systems [27].

Operating in the Giga-Hertz bands, channel impairments, multipath fading and path loss become more significant with the increase in the number of subscribers. Improved and flexible multiple access methods are needed to cope with these impairments. Orthogonal Frequency Division Multiple Access (OFDMA) is a promising multiple access scheme that has attracted interest. OFDMA is based on Orthogonal Frequency Division Multiplexing (OFDM) and inherits OFDM immunity to inter-symbol interference and frequency selective fading. OFDM is a special case of multicarrier transmission, where a single high speed data stream is transmitted over a number of lower rate subcarriers [28]. In a single carrier system a single fade can cause the entire link to fail, but in multcarrier systems, only a small percentage of the subcarriers will be affected.

63

So, multiuser OFDM is identified as a promising interface solution for broadband wireless networks.

The scheduling problem in OFDMA-based networks is completely different from the scheduling problem in other systems, and a much more complicated one. Here, the scheduler is responsible for deciding how the available subcarriers will be distributed among different users. Static subcarrier assignment is an inefficient utilization of scarce radio resource. This is due to the time-varying channel conditions, and the diverse quality of service requirements of multimedia users. Recently, multiuser diversity [3] was introduced as a key approach to enhance the resource utilization efficiency of wireless networks. Dynamic resource management of OFDMA-based networks has attracted enormous research interest. In this chapter, we consider the subcarrier management problem in the downlink of OFDMA wireless multimedia networks. This complex problem is subdivided into a couple of simpler ones: the subcarrier allocation problem and subcarrier assignment problem. We propose an opportunistic subcarrier allocation algorithm that uses the channel state information and the delay information of different users to calculate the number of subcarriers to be assigned to each active user in the system, while attempting to guarantee the QoS required by these users. We also propose another opportunistic algorithm for subcarrier assignment problem. The proposed algorithm monitors the deadline violations in all queues, then progresses to ensure fairness among different users in their service rates. This is achieved by distributing the violation occurrences among all users evenly.

In this chapter, we first provide an overview of OFDMA-based networks and the characteristics of the wireless channels in such networks. Then, we describe the multiuser scheduling problem in such networks. A briefing survey of the solution of this problem in the literature is included. Finally, the proposed subcarrier allocation and subcarrier assignment algorithm are introduced. In the next chapter, we provide an extensive set of simulation results that illustrates the performance gains achieved by our opportunistic algorithms.

64

5.1 OFDMA Network Model

We consider a cell-structured OFDMA system model that consists of a base station communicating simultaneously with N mobile user terminals using S OFDM subcarriers. Although the presented study is applicable both to the uplink and the downlink, for the sake of simplicity we concentrate here on the downlink only, which is shown in Figure 5.1. As mentioned before, an OFDMA system is a special case of OFDM systems. The only difference between them is that OFDM is a transmission scheme that splits a single high data-rate stream into a lower rate streams that are transmitted over a number of subcarriers. However, OFDMA is a multiple access scheme that is used to coordinate the transmission of multiple data streams (which belong to different users) over a number of subcarriers. Thus, OFDMA transmitter employs a subcarrier allocation and assignment function instead of the serial to parallel conversion used in OFDM systems as a first step. Different modulation schemes could be used to transmit data efficiently over subcarriers with different gains. The rest of OFDMA system is the same as an OFDM system as seen in Figure 5.1. Inverse Fourier Transform (or any practical implantation) can be used to generate the orthogonal carriers required for OFDM signal. The OFDMA symbol is then converted to the serial form. Intersymbol interference is eliminated almost completely by introducing a guard time in every OFDMA symbol. Like OFDM, the OFDMA symbol is cyclically extended to avoid intercarrier interference.

At the receiver of a certain user, the guard interval is firstly removed from the received OFDMA symbol. The OFDMA symbol is fed to a serial to parallel converter. Then Fourier Transform is used to retrieve the data from the subcarriers. The base station is responsible for informing each user terminal which subcarriers are assigned to it via the control subcarriers. Therefore, the data sent to this user could be easily received by demodulating only those subcarriers with the appropriate demodulation technique.

65

User 1

User i

User N

Subcarrier Allocation and Assignment with Different Modulation

Adaptive Modulation Adaptive Modulation Adaptive Modulation

IFFT

:

P/S

Guard Insertion

Adaptive Modulation

Channel Information from user i i = 1, 2, ….N

Wireless Channel

Adaptive Demodulation

Adaptive Demodulation

Subcarrier Extraction for User i

FFT

S/P

Guard Removal

Adaptive Demodulation

User i Receiver

Figure 5.1. Orthogonal Frequency Division Multiple Access (OFDMA) transceiver.

An OFDMA symbol is generally made of two types of subcarrier: data subcarriers for data transmission, and pilot (control) subcarriers for other control and various estimation purposes.

Wireless channels operating at high frequencies, like those used in OFDMA-base networks, are characterized by their time-varying, frequencyselective fading nature. Channel gains vary from subcarrier to subcarrier for a single wireless terminal due to multipath propagation. Besides, channel gains of each subcarrier vary over time, for the same user terminal, due to the movement of the terminal and other objects within the surrounding area. So that, at a given time, some frequency intervals (subcarriers) suffers severe fading, while others

66

have a good response. In this case, if the channel information is available, subcarriers that have a good response could be selected for transmission. Thus, higher transmission rate could be used to transmit data on that subcarrier. Furthermore, Channel gains of a specific subcarrier vary from wireless terminal to wireless terminal due to statistical independence. This implies that certain subcarriers that are in deep fade for some users are not necessarily bad for others since the user channel fading characteristics are not the same for different users. Hence, selection of good sub-carriers for one user may not necessarily block other users from accessing their good sub-carriers. Figure 5.2 illustrates an example of such channel gain variations [29]. This gives the general motivation to develop the resource allocation algorithm that exploits multiuser diversity to assigns an active user its best subcarriers, and hence increase the efficiency of channel utilization. Another important question that arises here is how to select the number of sub-carriers to be allocated for each user.

Figure 5.2. An example of channel gain variations taken from [29].

67

5.2 Scheduling in OFDMA Networks

In OFDMA networks, where a single channel (divided into a set of subcarriers) is shared by multiple users, the scheduling problem becomes a resource management one. The scheduler will be responsible for dividing the set of subcarrier available to the base station into a number of mutually disjoint subsets of subcarriers. Each subset is assigned to a certain user for a certain period of time (scheduling interval). Recently, there has been some research on subcarrier and bit allocation in multiuser OFDM systems. Those algorithms can be categorized as static and dynamic allocation algorithms.

5.2.1 Static Subcarrier Management

Static subcarrier management schemes result from the use of the traditional multiple access schemes, such as Time Division Multiple Access (TDMA) and Frequency Division Multiple Access (FDMA), as a mechanism for distributing the subcarriers in multiuser OFDM networks. In OFDM-TDMA, one of the users (the scheduled one) is assigned all the subcarriers for a certain time interval (the scheduling time slot). Due to the variation of the subcarrier channel gains for this terminal, channel gains for some subcarriers might be quite low, while they are quite high for other subcarriers. Due to the channel gain variations regarding one subcarrier for different terminals, the subcarriers with a low channel gain for the one terminal might experience a high channel gain for some other terminal. TDMA, however, does not provide the flexibility to adapt fully to these channel gain variations. Alternatively, in OFDM-FDMA, each user is assigned one or several predetermined subcarriers. This scheme ignores the channel gain variations of a certain subcarrier for the same user caused by the mobility of the user. Thus, statically assigning certain subcarriers to terminals without adapting to the channel gain variations would not exploit the performance enhancement provided by multiuser diversity. As a consequence, any fixed assignment of subcarriers to terminals will waste either power or bit rate [30, 31].

68

5.2.2 Dynamic Subcarrier Management Recently, dynamic (real-time) radio resource management that considers the users' instantaneous channel conditions has attracted enormous research interest. This is due to the significant overall system efficiency increase obtained when variations in channel gains among users (multiuser diversity) is exploited. Many schemes known as bit loading algorithms [29 – 32] have been suggested which adapt transmission power or bit rates optimally to the channel gains of different subcarriers, where either a feasible overall bit rate or a maximum available transmit power is given. They are based on a result from information theory describing how to distribute transmission power over a set of subcarriers with different channel gains in order to maximize the channel’s capacity. This is known as the water filling principle first discussed by Shannon.

Wong et al [31] addressed the problem of minimizing the transmitted power at a given bit rate per terminal. Subcarrier and bit allocation was done dynamically through the use of nonlinear optimization with integer variables. An extremely computationally complex iteration is required to find the two Lagrangian multipliers used in the nonlinear optimization. A simple modification to Wong's algorithm was proposed in [29]. The proposed extension allows each user to specify its individual QoS requirements, defined in terms of bit rate and bit error rate, and thus distributes subcarriers and transmit power among multiple users according to their QoS traffic requirements.

An alternative problem of maximizing the overall bit rate of multiple wireless terminals while the transmit power is upper bounded have been considered in [32] by Yin and Liu. Such a problem can be decomposed into two tasks: first determining the number of subcarriers each terminal is assigned and then choosing the concrete subcarriers to be assigned. Yin and Liu suggested a scheme where first the number of subcarriers assigned to each terminal is determined by considering each terminal’s average channel gains and its required bit rate. Then, the assignment of subcarriers to terminals is done. However,

69

assigning subcarriers to wireless terminals is not a trivial operation, even if the number of subcarriers to be assigned to each terminal is already determined. Yin and Liu suggested to solve this problem by using a graph algorithm solving the maximum weight perfect matching problem. While this algorithm computes the optimal assignment of subcarriers to terminals, it is still fairly computationally expensive.

Due to the high complexity of the optimization techniques, the question of heuristic approximations to such a kind of optimization problems became relevant. Many suboptimal heuristic algorithms have been proposed recently [33 – 37]. The computational complexity of the heuristics is considerably smaller than that of the optimum solution. On the other hand, their results are usually close to the optimum solutions.

An iterative solution of the total transmit power minimization problem was proposed in [33]. The problem is decomposed into two procedures: A subcarrier allocation with fixed modulation, and then by using bit loading scheme, the number of bits is incremented. The authors have also introduced a possible resource allocation scheme when the objective is to maximize capacity, based on proportional fair scheduling algorithm for point-to-point communication.

In [34], the authors presented two related heuristic algorithms for the problem of assigning subcarriers to terminals, assuming that the number of subcarriers allocated to each terminal is fixed. These algorithms assigned each user the current best subcarriers in a prioritized manner.

Another dynamic subcarrier and bit allocation algorithm, which takes advantage of the knowledge of instantaneous channel gain properly in subcarrier and bit allocation, is presented in [35]. Initially, the greedy single user waterfilling approach is used to allocate subcarriers and bits as if all the subcarriers in the system could be used exclusively by this user. In case that a subcarrier is

70

desired by more than one user, the algorithm will arbitrate the subcarrier to one user appropriately so that total transmit power is minimized.

The authors in [36] introduced a different approach aiming to minimize the number of subcarriers based on the rate requirements first, and then adjust the minimum required transmitted power accordingly. In addition, interference learning techniques were used in conjunction with the proposed scheme to enhance the system performance for voice services.

When other types of QoS requirements, such as the delay requirements of real-time traffic, are to be considered, the problem at hand becomes much more complicated. This is pursued in [37, 38]. The authors in [37] presented a new subcarrier allocation method that finds the number of subcarriers to be assigned to each user in the start of every time slot. The method is based on allocating subcarriers for terminals depending on the actual queue size of each terminal relative to the overall data queued at the access point. In contrast to other methods described above, channel gain information as well as any stream specific knowledge is not included in the allocation of subcarriers. Although this method is very simple, it responds intuitively to changes in the transmission situation regarding wireless channel qualities or queue sizes. In the case of a severe quality degradation of most channels for one terminal, its queue simply increases, leading to a higher number of subcarriers allocated to this terminal for the next downlink phases. Similarly, a burst of data arriving at the access point for one terminal will lead to a higher number of subcarriers allocated to this terminal for the next downlink phases. As a consequence the proposed variable subcarrier allocation method can take advantage of the statistical variations in data streams without explicitly provided information of the streams at the access point.

The proposed adaptive resource allocation algorithm in [38] is based not only on the channel conditions and power limitation observed in the physical layer, but also the queue status, packet arrival, QoS requirements, service

71

discipline, and user fairness observed at the data link layer. The objective of the authors was to minimize the overall transmission power while maintaining the channel errors at a sufficiently low level, so that the assumption of error-free channel in the scheduling part is generally valid. With error-free links, the system can fairly guarantee various QoS requirements to all the users from the physicallayer’s point of view.

5.3 Problem Formulation

In this chapter, we introduce a new approach to subcarrier management in OFDMA-based wireless multimedia networks. The idea behind this approach is that the subcarrier allocation and assignment is not only dependent on the instantaneous channel conditions of different users, but also on the QoS requirements and fairness among users. The QoS requirement of real-time traffic users are generally defined in terms of a delay bound. A packet should be delivered to the receiver before that deadline, otherwise, the information contained in this packet will be of no use to the receiver. Before we formulate our problem let us define the following parameters:

N Nt

: The number of users in the system. : The number of active users (i.e. its queue have at least one valid

packet) at time t. S ni(t)

: The total number of data subcarriers. : The number of subcarriers to be assigned to the ith user at the slot

starting at time t. ri μij(t)

: The average rate of the traffic of ith user. : The channel capacity (the maximum possible data transmission

rate) of the subcarrier number j if allocated to the ith user. µ i ( t ) : The average "potential" subcarrier capacity of the ith user (if it

was allocated all the subcarriers).

72

µi ( t ) =

di(t)

1 S ∑ µij ( t ) S j =1

(4.5)

: The time to expire of the ith user HoL packet, which is the

difference between the deadline, Ti, and the delay experienced by its HoL packet up till time t, Wi(t), i.e di (t ) = Ti − Wi (t )

(4.6)

We assume that the channel information is known at both the transmitter and the receiver. The channel is assumed to be reciprocal. Mobile terminals may be equipped with mechanisms to measure the rate at which they have been served. This data may be reported back to the base station, so that it can estimate the channel of all mobile channels based on that data as long as the channel variation is slow. As a result, the resource allocation should be done within the coherence time of the channel.

With the channel information, our objective of the resource allocation problem can be defined as maximizing the total system throughput subject to a constraint regarding the user’s QoS requirements. As we clarify further, the QoS required by real-time users is assumed to be in the from of guaranteeing a delay bound before which packets must be serviced, otherwise the system drops it. Let’s define δij(t) as the indicator of allocating the subcarrier j to the user i in the time slot starting at time t. Thus 1 δ ij ( t ) =  0

if subcarrier j is assigned to user i otherwise

(4.7)

and the total instantaneous system throughput RT(t) is N

S

RT ( t ) = ∑∑ δ ij ( t )µ ij ( t ) i =1 j =1

73

(4.8)

So that we formulate our subcarrier allocation/assignment problem as max RT ( t )

for δ ij ( t ) ∈ {0,1}

δ ij ( t )

(4.9)

subject to

N

S

∑∑ δ ( t ) = S i =1 j =1

ij

(4.10)

and Wi ( t ) < Ti

i = 1,2,..., N

(4.11)

Note that, even though the second constraint in (4.11) don't explicitly reflect the subcarrier assignments in the current time slot, however, it represent the history of the previous assignments. This can be explained as follows: when the previous assignments of a certain user(s) do not satisfy its delay requirement, its waiting time approaches its deadline. The role of this constraint comes into play by forcing the current assignments to compensate such user(s) by either allocating more subcarriers or assigning better quality subcarriers in order to prevent its (their) packets from expiry. However, a mathematical expression that formulate the relationship between the waiting time of the HoL packet of a certain queue and the subcarriers assigned to it (either in the current assignments or the previous assignments) can not be driven explicitly. Thus, the optimal solution of the above problem can not be obtained mathematically.

If this relationship between subcarrier assignments and HoL packets delays could be found, the above problem can be solved with Integer Programming. We refer to this approach as the optimal solution to our resource allocation problem. Although the optimal solution gives the exact results, from an implementation

74

point of view, it is not preferred since in a time varying channel. In order to allocate the subcarriers within the coherence time, the allocation algorithm should be fast and the Integer Programming complexity increases exponentially with the number of constraints. This real-time implementation requirement leads to the quest for suboptimal solutions that are fast and close to the optimal solution.

In what follows we propose a heuristic suboptimal solution of the above problem. We decouple this NP-hard problem into two steps [32]: 1) Subcarrier Allocation: This step decides how many subcarriers to be assigned to each user (i.e. determines ni(t)). 2) Subcarrier Assignment: This step determines which subcarriers to be assigned to each terminal (i.e. the vectors δij(t) are calculated).

5.4 Subcarrier Allocation Algorithm

In our attempt to solve the above problem, we first determine the number of subcarriers ni(t) to be assigned to every user in the set of active users Nt at that time instant. Our allocation is based on three factors: the instantaneous subcarrier channel gains of active users, users' average rates, and the delay information of the HoL packets of these users. We not only exploit the statistical variations of the users' channels, but also we use the statistical variations of users' queues in order to increase the efficiency of channel throughput utilization.

The first step of our proposed dynamic subcarrier allocation algorithm is to initially allocate to every active user in the system a number of subcarriers ni' ( t ) given by:

75

    µi ( t ) ri  ni ( t ) =   rj µ j (t )  ∑  N t j∑  N ∈N t j∈N  

(4.12)

'

1

1

t

t

First, lets us assume that the weighting factor ri /

1 Nt

∑ r is equal for all j∈N t

j

users and have a unity value. Then, a user with a relatively good channel conditions in a certain video class, i.e. its average subcarrier capacity µ i ( t ) , at the time instant t, is greater than the mean of the average subcarrier capacities of all the active users at that time instant, will be assigned initially two subcarriers. On the other hand, a user with a relatively bad channel conditions in the same class, i.e. its average subcarrier capacity µ j ( t ) is less than or equal to the mean of the average subcarrier capacities of all the active users at any time instant t, will be assigned initially only one subcarrier. In this step, we exploit multiuser diversity in order to efficiently utilize the scarce bandwidth of wireless channels. However, video streams could be classified according to their average traffic rates ri /

1 Nt

{ri}

∑r j∈N t

(which j

reflects

the

video

quality).

The

weighting

factor

reflects the class of the ith user stream. If the average rate of the of a

certain user is greater than the mean of the average rates of all active users, then number of subcarriers initially assigned to this user is increase due to its weight, and vice versa.

At the end of this step, if all the available data subcarriers are assigned to the set of users currently seeking service from the system, the allocation algorithm terminates. However, if some subcarriers remain unused after this step, the unused subcarriers are allocated to some of the active users. Let us denote the number of the remaining unused subcarriers by S', where S ′ = S − ∑ ni' ( t ) Nt

76

(4.13)

The role of the second step is to distribute any remaining subcarriers not allocated by the first step among the active users. In this step of the algorithm, as well as in the next step, the main goal is to use the remaining subcarriers efficiently to prevent as many packets from expiry, and thus being dropped by the system. In order to achieve this goal, the subcarrier allocation algorithm should allocate the biggest share of the remaining subcarriers S' to the user with the smallest time to expire di(t), and vice versa. Since the value of

1

di (t )

increases significantly as the time to expire di(t) decreases, our proposed algorithm will distribute the remaining set of subcarriers S' among the active users according to the ratios of

1

di (t )

. When deadline due violations start to

occur (when the system is heavily loaded with users), the allocation algorithm adapts to this situation by considering the number of violations NVi(t) in calculating the share of additional subcarriers. Using NVi ( t ) /d i ( t ) as the distributing ratio, users recently suffering from more violations (than the average of all users) will be compensated by allocating them more subcarriers. The number of violations reflects the history of the previous assignments. However, due to practical implementation it is computed in a certain time window (not the entire history). Note that, this enhances causes fairness in distributing the violations occurrences among all users. At this point, the number of subcarriers to be assigned to the ith active user is now    ' ni ( t ) = ni ( t ) +  S ′   

  di ( t )  max {1, NV j (t )}    d j (t ) 

max {1, NVi (t )}



j∈N t

(4.14)

It is clear that the second component of the equation (4.14) may lead to

∑ n (t ) ≥ S . j∈N t

j

If the total number of allocated subcarriers equals the available

77

number, the algorithm terminates, and then moves to the subcarrier assignment algorithm. In the next step of our proposed resource allocation algorithm, we ensure that the number of subcarriers allocated is exactly equal to those available in the system.

The last step in our subcarrier allocation procedure is only used when the subcarrier allocation done in the first two steps exceeds the total number of data subcarriers available to the system. Its function is to decrease the number of subcarriers allocated to some users, so that the total allocated subcarriers equals S. Our criteria in choosing these users, whose number of allocated subcarriers are to be decreased, is the time to expire of their HoL packets and their violation occurrences similar to what was done in the previous step of the algorithm. First, we arrange the set of active users in a descending order according to their time to expire. Then, the scheduler iterates over users in that order. In every iteration, the scheduler decreases the number of subcarriers allocated to the user in turn by one. Then checks whether the total subcarrier allocated equal to S or not. If it was not yet equal, the algorithm continues one more iteration.

It is easily noticed that in the final step of the algorithm, users whose packets' time to expire is small are allowed to keep their number of allocated subcarriers in the first two steps. On the other hand, users whose number of allocated subcarriers is most probably decreased are those whose packets' time to expire are relatively large. Such a procedure for selecting users to degrade their allocated resources is suitable for scheduling the delay-sensitive packets of multimedia traffic. Figure 5.3 summarizes the subcarrier allocation algorithm.

The computational complexity of this algorithm is given by O (Nt log(Nt)): The algorithm sorts the active users in the system according to their time to expire once in every scheduling interval. Sorting a set of x elements requires an algorithmic complexity of O(x log(x)).

78

Initially allocate every active user     µi ( t ) ri  ni ( t ) =   rj µ j (t )  ∑  Nt ∑  N t j∈N j∈N   '

1

1

t

Yes

t

Decrease the number of subcarriers allocated to the user with the largest time to expire (in turn)

∑ n (t ) = S i

Nt

No Go to Subcarrier Assignment Algorithm

∑ n (t ) < S

No

i

Nt

Arrange the active users in descending order according to their time to expire

Yes Distribute the remaining subcarriers S ′ = S − ∑ ni' ( t ) Nt

among users according to their time to expire    ' ni ( t ) = ni ( t ) +  S ′   

max {1, NVi (t )}   di (t )  max {1, NV j (t )}   ∑  d t ( ) j∈N t j 

Figure 5.3. Subcarrier Allocation Algorithm

79

5.5 Subcarrier Assignment Algorithm

Once we have determined the number of subcarriers ni(t) allocated to the th

i user, the remaining part of the scheduling problem is to find out the exact subcarrier assignment that maximize the total rate. This objective can be achieved if multiuser diversity is used to assign every active user its best ni(t) subcarriers. Such an assignment problem is equivalent to the maximum weighted perfect matching problem in bipartite graphs [34]. An optimal solution can be generated by the Hungarian algorithm [39], which has the complexity of O(S3), where S is the number of subcarriers.

With the objective of enhancing the fairness characteristics of the scheduling algorithm while maximizing the total rate, we propose a new low complexity dynamic subcarrier assignment algorithm. The proposed algorithm is a priority based algorithm. At some time instant (the start of a time window), the algorithm assigns initially a unity priority to all users. Whenever a deadline due violation occurs in a packet in a certain user's queue, its priority is incremented by one. In every scheduling interval, the subcarrier assignment algorithm sorts the active users in the system in a descending order according to their priorities. The user with the highest priority starts to pick the best allocated subcarriers from the set of all subcarrier. After assigning those subcarriers to that user, the algorithm removes them from the set of available subcarriers. Then the algorithm allows the user with the next higher priority to choose from this set of remaining subcarriers, and so on. Clearly such an algorithm assigns the wireless terminal with the highest priority (maximum number of recent deadline violations) subcarriers with a better quality than it assigns the wireless terminal with the lowest priority. Thus enhances the fairness performance of the scheduler. If more than one user shares the same priority level, ties are broken by giving priority to the user with the best channel quality (averaged over all subcarriers) to pick up

80

its allocated subcarriers first. This helps in maximizing the overall rate of the system.

This case of equal priorities eventually occurs when the system supports relatively small number of users (less than the maximum system capacity). In this case no violations occur owing to the efficiency of our proposed subcarrier allocation algorithm (as will be demonstrated by the simulation results). Hence, the proposed subcarrier assignment algorithm reduces to an algorithm that utilizes multiuser diversity in assigning the available subcarriers to the active user in the system (by letting the user with the best channel conditions at ant time instant to pick up its allocated subcarriers before the next better channel user, and so on). Figure 5.4 summarizes the proposed subcarrier assignment algoritm.

The algorithm assigns S subcarriers to Nt wireless terminals. Each user picks up its allocated subcarriers from a sorted list, which has to be regenerated for each user (due to removal of some subcarriers assigned to the previous user). Thus, the worst-case computational complexity of this assignment procedure is given by O (Nt S log(S)). Even when added to the complexity of sorting the active users according to their priorities (O (Nt log(Nt))), the computational complexity of complete subcarrier assignment algorithm is much lower than that of the optimal (Hungarian) algorithm.

In the next chapter, we carry out an extensive set of simulation experiments in order to gain insight of the different performance aspects of the proposed subcarrier allocation and assignment algorithms. Specifically, we are interested in evaluating the delay, throughput, and fairness characteristics of the algorithms. Without loss of generality, we assume that all users belong to the same video quality class.

81

At the beginning of a time window: Reset the priorities of all users to 1

For every user If a packet is dropped due to deadline expiry à Increase the priority of this user by 1

Arrange the active users in a descending order according to their priorities Note that: In case of equal priorities, priority is to the user with the better channel conditions

Allow the user with the highest priority (in turn) to select the best nj(t) subcarriers from the set of the available subcarriers.

Remove the selected nj(t) subcarriers from the set of the available subcarriers

Figure 5.4. Subcarrier Assignment Algorithm

82

Chapter 6 Simulation Results and Discussions of the OFDMABased Scheduling

6.1 Simulation Setup We first describe the simulation environment used in evaluating the performance of the proposed subcarrier allocation and assignment algorithms. As mentioned in chapter 5, we will consider the IEEE 802.20 Mobile Broadband Wireless Access (MBWA) system model. The Mobile Broadband Wireless Access (MBWA) systems being discussed in IEEE 802.20 standards group are designed to provide a broadband, IP-oriented connection to a wireless user that is comparable to wired broadband connections that are in use today. It is expected that there will be a mixture of user applications similar to that of such wired systems [40]. MBWA system shall support peak per-user data rates in excess of 1 Mbps on the downlink and in excess of 300 kbps on the uplink. These peak data rate targets are independent of channel conditions, traffic loading, and system architecture. The peak per user data rate targets are less than the peak aggregate per cell data rate to allow for design and operational choices. Average user data rates in a loaded system shall be in excess of 512Kbps downlink and 128Kbps uplink. This shall be true for 90% of the cell coverage or greater [41].

Mobile broadband radio channel is a challenging environment, in which the high mobility causes rapid variations across the time-dimension, multi-path delay spread causes severe frequency-selective fading, and angular spread causes significant variations in the spatial channel responses. For best performance, the receiver and the transmitter algorithms must accurately track all dimensions of the channel responses [42]. The proposed algorithms utilize these variations in increasing the system capacity.

83

Among the different channel bandwidths suggested in [41, 43], we use a channel of 5 MHz bandwidth. We assume that the number of data subcarriers S is equal to 128 subcarriers. Data is transmitted on each subcarrier with an adaptive modulation scheme, where five modulation types are available (BPSK, QPSK, 16-QAM, 64-QAM and 256-QAM). The modulation types are chosen such that the highest possible rate can be transmitted in every scheduling interval.

For simulation purpose, the IEEE 802.20 working group adopted the test environments and associated Single Input Single Output (SISO) channel models put forth for UMTS Terrestrial Radio Access (UTRA). This is because the deployment and propagation scenarios for which the UTRA models were developed are so similar to those currently envisioned for IEEE 802.20 MBWA. The working group defines three broad deployment/propagation scenarios [42], referred to therein as "Test Environments", in which the performance of candidate UTRA radio transmission technologies (RTTs) are to be evaluated. These test environments are labeled Indoor Office, Pedestrian, and Vehicular. Each test environment broadly defines a particular wireless propagation scenario, and each scenario in turn has an associated channel model.

Moreover, each test environment is combined with a pair of representative tapped delay line impulse response specifications, labeled A and B, which characterize delay spread. The A model represents a frequently occurring low delay spread situation, and the B model a frequently occurring high delay spread situation within that test environment. In this work, we only consider the B Model Pedestrian test environment. This model is valid for nonline-of-sight case only. The tapped-delay line impulse response parameters for the B Model Pedestrian test environment is shown in Figure 6.1. This model has 6 rays, an RMS delay spread of 750 ns. The Doppler velocity distribution model is specified Jakes’. The user mobility rates of this environment range from 3 Km/hr up to 120 Km/hr [44]. According to these velocities, the maximum Doppler frequency shift equals to 211 Hz for a carrier frequency of 1.9 GHz. Thus, the coherence time of such a channel is about 4.7 milliseconds.

84

Figure 6.1. The power-delay profile of the B Model pedestrian environment.

Our approach in generating streams of packets that need to be transmitted over the system is based on an actual video trace file. The file basically has output from a 30 frames/sec MPEG-4 encoder targeted for an average rate of 256 Kbps and a peak rate of 2.3 Mpbs [45]. Each user receives the same video stream, however they are randomly time-shifted at the beginning so that different parts of the video stream arrive at different times at the access point for different users. Each frame is decomposed into 50 bytes packets to be transmitted. A packet is assigned a deadline before which it should be delivered to its destination. We consider three values of this deadline, specifically, 20, 50, and 100 milliseconds. Such values are much less than the end-to-end delay allowed for transmitting video streams (about 400 milliseconds). (In essence, we relax the delay requirements of the core network). Video quality degradation is caused receiving outdated packets or when not receiving these packets at all (if such a packet is dropped by the scheduler).

85

At the base station, a centralized scheduler is responsible for multiplexing multiple users sharing the previously described common channel. As discussed above, this channel varies from one user to another due to the location-dependent path loss, as well as the channel of a certain user varies over time due to the user mobility. However, the channel gains do not change significantly within the channel coherence time (which is 4.7 milliseconds in our case). Thus, setting the scheduling interval (over which subcarrier allocation and assignment is performed) to 1.667 milliseconds is a good choice. This is because in such a case the scheduling decision can be based on a one-slot delayed version of the channel information. This gives the scheduler/base station enough time to collect the subcarrier channel gain information for all active users.

In the next section, we will provide an extensive set of simulation experiments of the proposed scheduling scheme in the MBWA system. These experiments will explore the various characteristics of the proposed opportunistic subcarrier allocation and assignment algorithms including the overall system capacity, fairness in both rate and delay requirements, and the control of violation occurrences. The simulation period is three minutes.

Carrier frequency

1.9 GHz

Channel bandwidth

5 MHz

Number of data subcarriers (S)

128

User mobility speeds

3 – 120 Km/hr

Doppler frequency

211 Hz

Doppler spectrum

Jakes' (6 rays)

Scheduling interval

1.667 msec Real trace file of MPEG-4 encoder

Traffic model

Frame rate: 30 frames/sec

Traffic average rate / peak rate

256 Kbps / 2.3 Mbps

Packet size

50 bytes

Table 6.1. Summary of simulation parameters.

86

6.2 Results and Discussions In this section we present numerical results of the introduced opportunistic subcarrier allocation and assignment algorithms. For comparison reasons we always include also the results of the static OFDM-FDMA subcarrier assignment. As discussed in chapter 5, OFDM-FDMA has been identified as the best static subcarrier assignment. Thus we use it as a bench mark for illustrating the performance gains achieved by our opportunistic subcarrier allocation and assignment.

In the first experiment, we study the throughput performance of our proposed scheduling algorithm via admitting users to the network while monitoring the average throughput per user as well as the maximum and the minimum throughput achieved. Figures 6.2-a, 6.3-a 6.4-a show the average user throughput versus the number of admitted users for a 20, 50, and 100 milliseconds delay bounds, respectively. The aim of this experiment is to determine the system capacity (the number of supportable terminals) for the proposed opportunistic algorithm. The maximum number of users to be admitted to the network if OFDM-FDMA assignment is used is 42 users only. This is because for our model of user's traffic, 3 subcarriers per user are fairly enough to support this traffic. Thus, a new user is admitted in this case only if there exist at least 3 unused subcarriers. Defining the system capacity as the number of users beyond which the average throughput per user falls to 99% of the average arrival rate; we find that when the opportunistic allocation/assignment is used the system can support 120, 165, and 165 users for a 20, 50, and 100 milliseconds delay bound, respectively. While using static assignment, even though the system can admit up to 42 users, the system can only support 15 users for 50 milliseconds delay bound and less than 10 users for 20 milliseconds delay bound without degrading their service rates significantly. This is because with such strong delay requirements, three low-quality subcarriers can not support the required service rate.

87

It worth mentioning here that: the MBWA systems are required to support more than 100 simultaneous active users per carrier [41]. An active user is a terminal that that is registered with a cell and is using or seeking to use air link resources to receive and/or transmit data within a short time interval. Thus, the proposed subcarrier allocation and assignment algorithm is suitable for application in future MBWA systems.

The explanation of the significant difference in system capacity of our opportunistic algorithms is as follows: a user is not allocated/assigned any subcarriers unless its queue contains at least one packet ready for transmission. In addition to the capacity gain obtained from utilizing multiuser diversity in the allocation/assignment processes. Thus our algorithms don't only take advantage of the statistical variation of users' channels but also the statistical variation in their queue states.

In order to qualify the fairness characteristics of the proposed opportunistic subcarrier allocation and assignment algorithms, we plot the maximum and the minimum achieved throughput for the above experiments in Figures 6.2-b, 6.3-b 6.4-b. As show in these figures, when using the opportunistic algorithm, the difference between the maximum and the minimum achieved throughput is insignificant when the system is serving a number of users less than or equal to the system capacity. Even when serving more than the system capacity the difference is still acceptable. However, for the static OFDM-FDMA assignment, that difference is highly noticed, especially for 20 and 50 milliseconds delay bounds. This is because even though 3 high-quality subcarriers are enough to handle user's traffic, 3 low-quality channels can not handle that traffic. As a consequence, the throughput share of users with lowquality channels is much lower than their traffic arrival rates. Thus, low-quality users play the major role in degrading the performance (the system capacity) of the static algorithm. We define the throughput fairness index as the ratio of the difference between the maximum and the minimum achieved throughput (λmax and λmin , respectively) to the average throughput per user (λavg), i.e.

88

a) The average throughput per user.

b) The maximum and the minimum achieved throughput. Figure 6.2. Throughput performance for a 20 msec delay bound.

89

a) The average throughput per user.

c) The maximum and the minimum achieved throughput. Figure 6.3. Throughput performance for a 50 msec delay bound.

90

a) The average throughput per user.

d) The maximum and the minimum achieved throughput. Figure 6.4. Throughput performance for a 100 msec delay bound.

91

Throughput Fairness Index =

λmax − λmin λavg

(6.1)

Using this index as a formal indicator of the fairness performance of the scheduling algorithm, we gain more insight of the performance advantage of the proposed opportunistic algorithms. The throughput fairness indices of both the opportunistic algorithm and the static algorithm for different delay bounds are plotted in Figure 6.5. The perfect fairness of the opportunistic algorithm when the system is operating with a number of users less than its capacity (fairness index approaches 0) can be easily noticed. The favor of this super fairness performance is owed to the main objective of the proposed algorithm of preventing all users from losing any of their packets (by being dropped due to deadline expiry) by allocating them more subcarriers. Even when the system is operated with users more than its capacity (users starts to lose their packets), the fairness of distributing these lost packets among all users is achieved via the subcarrier assignment algorithm. This is demonstrated by the next experiments.

Figure 6.5. Throughput fairness indices of both the opportunistic algorithm and the static algorithm for different delay bounds.

92

Now, we study the deadline due violations behavior of the proposed opportunistic algorithms. Figure 6.6 shows the maximum and the minimum number of violation occurrences experienced by users in the same simulation setup of the previous experiment. Again, it is clear that the subcarrier allocation algorithm succeeded in saving users' packets from being dropped due to deadline expiry regardless the channel-quality of different users. (Since no deadline violations occurs for all users packets until the system is operating near its capacity). Moreover, when the number of users in the system exceeds the system capacity, the subcarrier assignment algorithm cooperates with the allocation algorithm to ensure that the number of dropped packets in the system is fairly distributed among all users in the network. This can be seen in Figure 6.6 where the maximum percentage of packets lost (most probably in the queue of a lowquality channel user) is close to the minimum percentage of packets lost (most probably in the queue of a high-quality channel user). A remarkable result is that this fairness behavior is independent of the value of the value of the delay bound. On the other hand, the static subcarrier assignment lacks such characteristics.

a) Delay bound = 20 msec.

93

b) Delay bound = 50 msec.

c) Delay bound = 100 msec. Figure 6.6. Deadline violation fairness for different delay bounds.

94

In our last experiment, we consider the delay performance of the proposed subcarrier allocation and assignment algorithms. This can be achieved through studying the distribution of the delays that users' packets incur at the base station. A good scheduling algorithm should keep all delays below the delay bound with high probability, which is achieved roughly when the delays are kept close for all users. Due the large number of users the system can support, we focus only on the delay distribution of the user with the best channel quality and the user with the worst channel quality. The delay distributions of these particular couple of users are sufficient to evaluate the delay performance of the scheduling algorithm since they represent the opposite extremes of the channel qualities.

First, we consider the system is serving only 42 users (the maximum supportable number of users using the OFDM-FDMA static assignment). The delay tail of both the static and the opportunistic scheduling algorithms for different delay bounds are shown in Figure 6.7. A couple of observations can be easily noticed: The first observation is that the delay performance of the opportunistic algorithm (the delay distributions and the maximum delays of the best and the worst channel users) is similar regardless the value of the delay bound. The other observation is that the opportunistic algorithm keeps the delay of all users far below the deadline and also close to each other. On the other hand, the delay performance of the static algorithm is dependent on the value of the delay bound and has a very poor performance compared to the opportunistic algorithm. For example, when the delay bound is 100 msec (Figure 6.7-c), there is a big gap between the delays incurred by the best channel user and those of the worst channel user. While when the delay bound is 20 msec (Figure 6.7-a) the gap is smaller but with packet delays close to the delay bound. Actually, some packets incurred delays greater than the delay bound and thus dropped by the system (the best channel user has lost 5% of its packets while the worst channel user has lost 50% of its packets). Thus the small performance difference in Figure 6.7-a is somehow misleading.

95

The good delay performance of the opportunistic algorithm comes from the mechanism of compensation of low-quality users employed in the algorithm. When a certain user (or group of users) is suffering from a long period of bad channel conditions, the delay of its (their) HoL packet increases (increase), so that the allocation algorithm allocates more subcarriers to this (these) user (even on the expense of taking a part or all of the subcarrier initially assigned to other higher-quality users). Preventing high-quality users from their subcarrier shares increases their HoL packets delay. Thus in the next scheduling interval the algorithm allocates them more subcarriers, and so on. Thus the delays of all users are always kept small and below the deadline. It is worth mentioning that this mechanism is not affected by the value of the delay bound since it is only concerned by the difference in HoL delays of different users.

In order to have a fair comparison with the static assignment, we also studied the delay performance of our opportunistic algorithm the system is supporting its full capacity. The delay distributions of the best and the worst channel users for a 20 milliseconds (and 120 users), a 50 milliseconds (and 165 users), and a 100 milliseconds (and 170 users) is shown in Figures 6.8, 6.9, and 6.10, respectively. As shown in these figures, even with such high user population, our opportunistic subcarrier assignment and allocation algorithms managed to keep the delays of users with different channel conditions very close. These results emphasizes the efficiency of our algorithms to control the delay performance independently of other factor such as the value of the delay bound and user population.

Finally, the results presented in this chapter can be concluded as follows: though

rather

a

computationally

inexpensive

algorithm,

the

proposed

opportunistic scheduling algorithm can be used to provide statistical delay guarantees for time-sensitive traffic in OFDMA-based wireless networks. The algorithm exhibits a unique fairness behavior in the services (packet delays and throughput) delivered to different users. Moreover, multiuser diversity used in the algorithm offers orders of magnitude increase in the system capacity.

96

a) Delay bound = 20 msec (5.3% and 48.5% of the best and the worst users packets were lost).

b) Delay bound = 50 msec (18.3% of the worst user packets was lost).

97

c) Delay bound = 100 msec (2.9% of the worst user packets was lost).

Figure 6.7. Delay tails of the best and worst channel users (N = 42 users).

Figure 6.8. Delay tails of the best and worst channel users (1.5% and 2.3% of the best and the worst users packets were lost) (N = 120 users, T = 20 msec).

98

Figure 6.9. Delay tails of the best and worst channel users (0.07% and 1.4% of the best and the worst users packets were lost) (N = 165 users, T = 50 msec).

Figure 6.10. Delay tails of the best and worst channel users (6.7% and 16.9% of the best and the worst users packets were lost) (N = 170 users, T = 100 msec).

99

100

Chapter 7 Conclusions and Future Research 7.1 Conclusions This thesis addresses the problem of opportunistic scheduling of multiple time-sensitive users sharing a common resource in wireless multimedia networks. Opportunistic scheduling means that the scheduling decision is based on the instantaneous user information, e.g. in our case, the channel state information of different users and their delay information. We considered this problem in two different models of wireless networks that are candidates of beyond 3G networks. First, we studied TDM-based networks (in which time is the resource to be shared among users). Then we tackled on OFDMA-based mobile broadband wireless networks (in which the scheduler function is to distribute the available subcarriers "the common resource" over different users).

Our approach was to exploit multiuser diversity inherently existing in wireless systems. Multiuser diversity scheduling offers orders of magnitude increase in the overall system performance. However, multiuser diversity scheduling is unfair in resource sharing among different users cause it always gives higher priority to high channel-quality users. As a consequence, low channel-quality users will be prevented from accessing the wireless link, and thus not obtain their required QoS (delay-bound guarantees in this case). In order to remedy this situation, we introduced mechanisms to compensate such users and that statistically guarantee their QoS requirements as well as achieving fairness in resource sharing among all users in the system.

Regarding the problem of scheduling real-time users over TDM-based wireless multimedia networks, we introduced the Channel Dependent EarliestDue-Date first (CD-EDD) scheduling discipline, a discipline that provides

101

statistical delay bound guarantees for time-sensitive traffic in networks with time-varying channels. Gains in throughput and realized delay are achieved by exploiting multi-user diversity techniques in which the scheduling decision takes into account the current channel state for each user in the system. By considering the packet loss due to deadline violation, we also presented a set of scheduling policies that achieve fairness in delays, throughput, and packet loss ratios among different users regardless of the value of the delay bound.

The proposed

disciplines outperforms other existing polices in the sense that the services received by different real-time users, namely, delays, rates, and loss ratios, are fairly achieved for a wide of applications. The proposed policies have low computational complexity and are suitable for application in future broadband fixed or mobile wireless systems such as 802.16a and 802.20.

Also, we presented new opportunistic subcarrier allocation and assignment mechanisms for parallel transmission of data streams to different terminals in OFDMA-based broadband wireless systems. The subcarrier allocation algorithm instantaneously determines the number of subcarriers each terminal should receive by a dynamic assignment algorithm for the next downlink scheduling interval. Our subcarrier allocation method is based on allocating subcarriers for terminals depending on the knowledge of the channel gain information of different users as well as other stream specific delay information (the time to expire of the HoL packet) and the number of recent deadline violations.

Initially, we utilize multiuser diversity in allocation

subcarriers to active users. In the case of a severe channel-quality degradation of one (or some) user channel, its (their) HoL packet time to expire approaches zero, leading to a higher number of subcarriers allocated to this terminal for the next downlink intervals. Similarly, any increase in the number of violations experienced by a certain user over the average number of violations will lead to a higher number of subcarriers allocated to this terminal for the next downlink intervals. The allocated numbers of subcarriers are assigned to terminals dynamically in a manner that ensure fairness in the deadline violation occurrences among different users. The proposed algorithms have low

102

computational complexity and are suitable for application in 4G mobile broadband wireless access systems such as the IEEE 802.20 standard.

7.2 Future Research Directions During conducting this research, some interesting related ideas that may be addressed relaying on the findings of this thesis came into picture. Among these research ideas: •

How to further modify the proposed scheduling schemes in order to be able to simultaneously provide different kinds of QoS (e.g. rate guarantees for non-real-time users and delay guarantees for real-time users). Supporting real-time flows with delay requirements and nonreal-time flows with throughput constraints simultaneously is an important challenge for future wireless networks. Indeed, providing differentiated quality-of-service levels increases a system’s total utility when applications have diverse performance requirements, e.g., some preferring low delay, others high throughput, and others merely best effort service. Consequently, both medium access control and network-layer scheduling algorithms must select and transmit packets in accordance with their QoS requirements.



The application of the channel-aware scheduling with QoS guarantees in other future wireless networks such as multi-hop and ad-hoc networks. However, due to the distributed nature of these networks, nodes may not be able to determine the next packet that would be transmitted in a (hypothetical) centralized and ideal dynamic priority scheduler. But this difficult problem becomes easier in hybrid networks

(where

the

network

interoperating with distributed nodes).

103

combines

a

centralized

core



Performing Mathematical analysis of the proposed CD-EDD scheduling discipline in order to proof its throughput optimality.

104

REFERENCES [1]

S. Kashave, An Engineering Approach to Computer Networking: ATM Networks, the Internet, and the telephone Network. Addison

Wesley,

1997.

[2]

T. Rappaport, Wireless Communications: Principles and Practice. Upper Saddle River, NJ: Prentice Hall, 2002.

[3]

R. Knopp and P. A. Humblet, “Information capacity and power control in single-cell multiuser communications,” in Proc. IEEE International Conference on Communications (ICC’95), Seattle, USA, June 1995.

[4]

M. Grossglauser and D. Tse, “Mobility increases the capacity of wireless ad-hoc networks,” in Proc. IEEE INFOCOM’01, April 2001.

[5]

D. Wu and R. Negi "Utilizing multiuser diversity for efficient support of quality of service over a fading channel," Proc. IEEE ICC'03, Anchorage, Alaska, USA, May 11-15, 2003.

[6]

P. Bender, P. Black, M. Grob, R. Padovani, N. Sindhushayana, and A. Viterbi, “CDMA/HDR: a bandwidth efficient high speed wireless data service for nomadic users,” IEEE Communications Magazine, vol. 38, no. 7, pp. 70–77, July 2000.

[7]

A. Jalali, R. Padovani, R. Pankaj "Data throughput of CDMA-HDR a high efficiency-high data rate personal communication wireless system," in Proc. of Vehicular Technology Conference 2000-spring, vol. 3.

[8]

Y. Liu, S. Gruhl, and E. Knightly. "WCFQ: An opportunistic wireless scheduler with statistical fairness bounds," IEEE Transactions on Wireless Communication, September 2003.

105

[9]

Y. Liu and E. Knightly. "Opportunistic fair scheduling over multiple wireless channels," in Proc. of IEEE INFOCOM, 2003.

[10]

X. Liu, E. K. P. Chong, and N. B. Shroff "Transmission scheduling for efficient wireless utilization," in Proc. of IEEE INFOCOM, 2000.

[11]

X. Liu, E. K. P. Chong, and N. B. Shroff "Optimal opportunistic scheduling in wireless networks," in Proc. of IEEE INFOCOM, 2000.

[12]

S. S. Kulkarni and C. Rosenberg "Opportunistic scheduling policies for wireless systems with short term fairness constraints," in Proc. of IEEE GLOBECOM, December 2003.

[13]

Z. Jiang and N. Shankaranarayana, "Channel quality dependent scheduling for flexible wireless resource management," AT&T Labs.

[14]

Y. Cao, and V. Li, “Scheduling algorithms in broad-band wireless Networks,” IEEE Proc. of the IEEE, no. 1, January 2001.

[15]

S. Shakkottai, T. Rappaport, and P. Karlsson, “Cross-layer design for wireless networks,” IEEE Communications magazine, October, 2003.

[16]

D. Johnson, D. Maltz, and J. Broch, “DSR: The dynamic source routing protocol for multi-hop wireless ad hoc networks,” in Ad Hoc Networking, edited by C. E. Perkins, pp. 139–172, Addison-Wesley, 2001.

[17]

D. Braginsky and D. Estrin, “Rumor routing algorithm for sensor networks,” 2001. Available at http://lecs.cs.ucla.edu/estrin/.

106

[18]

A. Safwat, H. Hassanein, and H. Mouftah, “Optimal Cross-Layer Designs for Energy-Efficient Wireless Ad hoc and Sensor Networks,” IEEE International Performance, Computing and Communications Conference (IPCCC) 2003.

[19]

3rd Generation Partnership Project; Technical Specification Group Radio Access Network, “Physical layer aspects of utra high speed downlink packet access (release 4) tr25.848 v4.0.0,” http://www.3gpp.org, Mar. 2001.

[20]

3rd Generation Partnership Project; Technical Specification Group Radio Access Network, “Services provided by the physical layer (release 4) ts 25.302 v4.1.0,” http://www.3gpp.org, June 2001.

[21]

S. Shakkottai and R. Srikant, "Scheduling real-time traffic with deadlines over a wireless channel," in Proc. of ACM Workshop on Wireless and Mobile Multimedia, Seatle, WA, August 1999.

[22]

M. Andrews, K. Kumaran, K. Ramanan, A. L. Stolyar, R. Vijayakumar, P. Whiting "CDMA data QoS scheduling on the forward link with variable channel conditions," Bell Laboratories Technical Report, April, 2000.

[23]

A.L. Stolyar and K. Ramanan, "Largest Weighted Delay First Scheduling: Large Deviations and Optimality," Annals of Applied Probability, 2001, Vol.11, No.1, pp. 1-48.

[24]

S. Shakkottai and A.L. Stolyar, "Scheduling Algorithms for a Mixture of Real-Time and Non-Real-Time Data in HDR," Proc. of the 17th International Teletraffic Congress - ITC-17, Salvador da Bahia, Brazil, 24-28 September, 2001, pp. 793-804.

107

[25]

K. Chang and Y. Han, "QoS-based adaptive scheduling for a mixed service in HDR system," PIMRC 2002.

[26]

S. Shakkottai and A. L. Stolyar, "Scheduling for Multiple Flows Sharing a Time-Varying Channel: The Exponential Rule," Analytic Methods in Applied Probability. In Memory of Fridrih Karpelevich. Yu. M. Suhov, Editor. American Mathematical Society Translations, Series 2, Volume 207, pp. 185-202. American Mathematical Society, Providence, RI, 2002.

[27]

M. Klerer, , “Introduction to IEEE 802.20: technical and procedural orientation,” IEEE802.20 PD-04, March 2003.

[28]

R.

Nee,

and

R.

Prasad,

"OFDM

for

wireless

multimedia

communications," Artech House universal personal communications library, 2000.

[29]

S. Pietrzyk and G. J. M. Janssen, “Multiuser subcarrier allocation for QoS provision in the OFDMA systems,” in Proc. VTC 2002, vol. 2, 2002, pp. 1077–1081.

[30]

W. Rhee and J. Cioffi, “Increase in capacity of multiuser OFDM system using dynamic subchannel allocation,” in Proc. Vehicular Technology Conference (VTC), 2000, pp. 1085 – 1089.

[31]

C. Wong, R. Cheng, K. Letaief, and R. Murch, “Multiuser OFDM with adaptive subcarrier, bit and power allocation,” IEEE Journal on Selected Areas of Communications, vol. 17, no. 10, pp. 1747–1758,

October

1999.

[32]

H. Yin and H. Liu, “An efficient multiuser loading algorithm for ofdmbased broadband wireless systems,” in Proc. IEEE Globecom, 2000.

108

[33]

M. Ergen, S. Coleri, and P. Varraiya, “QoS aware adaptive resource allocation techniques for fair scheduling in OFDMA based broadband wireless access systems,” IEEE Transactions on Broadcasting, vol. 49, no. 4, December 2003.

[34]

J. Gross, H. Karl, F. Fitzek, and A. Wolisz, “Comparison of heuristic and optimal subcarrier assignment algorithms,” in Proc. of Intl. Conf. on Wireless Networks (ICWN), June 2003.

[35]

G. Zhang, “Subcarrier and bit allocation for real-time services in multiuser OFDM systems,” in Proc. of Intl. Conf. on Communications (ICC), June 2004.

[36]

N. Damji, and T. Le-Ngoc, “Adaptive downlink multi-carrier resource allocation for real-time multimedia traffic in cellular systems,” in Proc. of Intl. Conf. on Communications (ICC), June 2004.

[37]

J. Gross, J. Klaue, H. Karl, and A. Wolisz, “Subcarrier allocation for variable bit rate video streams in wireless OFDM systems,” in Proc. of Vehicular Technology Conference (VTC), 2000

[38]

Y. Zhang, and K. Letaief, “Adaptive resource allocation and scheduling for multiuser packet-based OFDM networks,” in Proc. of Intl. Conf. on Communications (ICC), June 2004.

[39]

H. Kuhn, “The hungarian method for the assignment problem,” Naval Research Logistics Quarterly, , no. 2, pp. 83–97, 1955.

[40]

IEEE C802.20-03/80 “Traffic models for IEEE 802.20 MBWA system simulations v.1,” September 2003.

109

[41]

IEEE C802.20-03/81 “802.20 Requirements Document,” August 2003.

[42]

IEEE C802.20-03/70 “Channel models for IEEE 802.20 MBWA system simulation,” July 2003.

[43]

IEEE P802.20-04/08 “802.20 SRD: data rates, spectral efficiency and frequency assignments,” Jan 2004.

[44]

IEEE C802.20-04/30 “Channel models for IEEE 802.20 MBWA system simulation - Rev 04,” March 2004.

[45]

Arizona

State

University

"Jurassc_Park_One".

Trace

Avialble

at

Website,

Video

Library:

http://trace.eas.asu.edu/cgi-

bin/display.cgi?name=Jurassic_Park_One&format=qcif&encs=simple&g ops=gopone&raco=rc&qlev=5&lyif=bpe&stuff=zero&type=frame

110

Appendix A Code Samples Throughout the thesis, all simulation scenarios have been implemented using C++ programs with the aid of IT++ library. IT++ is a C++ library of mathematical, signal processing, speech processing, and communications classes and functions. It has been developed by researchers in these areas. The itbase library is the core of IT++ and it contains classes and functions for mathematics with scalars, vectors, and matrices. This library is mainly built using a flexible template of vector and matrix classes and lots of functions for vectors and matrices. These functions are similar to the Matlab functions. Moreover, the IT++ file format ".it" can be read using Matlab. This enabled us to use Matlab to plot all figures in the thesis. The IT++ library originates from the former department of Information Theory at Chalmers University of Technology, Gothenburg, Sweden. Since the library is coded in C++ thus comes the name of the library IT++.

Our simulation setup for different scenarios was carried out in two separated steps. The first step was to simulate the channels of all users (according to the intended channel model). These channels are then stored on disk. The second step was to apply the scheduling algorithm over these users. This step included the generation of users' traffic. The output of this step is the final output to be passed to Matlab to be plotted.

As a sample of the channel simulation program, the code for simulating the Jakes model of the 6-ray Rayliegh faded channel of the IEEE 802.20 Pedestrian-B environment used in testing the OFDMA algorithms is listed in section A.1. Then in section A.2, we include the code of the proposed heuristic subcarrier allocation and assignment as a sample of the scheduling programs.

111

A.1 Sample Program 1: Channel Simulation // This program simulates the 6-ray Rayliegh faded channels using Jakes Model. #include "itbase.h" #include "itcomm.h" using std::cout; using std::endl; void jakes (int K, double Jmax, int points, double p, cvec &h); int main() { int np = 6; // The number of paths per channel int N = 46; // Number of users int S = 128; // The number of subchannels double sim_period = 180.0; // The simulation period (in sec) double Ts = 5.0 * 0.001 / 3.0; // Ts is seconds double B = 5.0 * 1024.0 * 1024.0; // The channel BW = 5 MHz double EbNo = 2.0; // The signal to noise ratio in absolute units (3dB = 2) double Fd = (120000.0/(60.0*60.0)) * 1.9e9 / 3e8; // Doppler freq = Vmax*fc/C; double J = 1.0 / (2.0 * Ts * Fd); // The Jmax variable passed to jakes function int ns = ceil_i(sim_period / Ts); // Simperiod / Ts char file_name[128]; vec a(N); vec p(np); cvec h1(ns),h2(ns),h3(ns),h4(ns),h5(ns),h6(ns); cvec currentchan(np); cvec currentsubchan(S); imat user(ns,S); Uniform_RNG A;

// Holds the gains of different users // The relative power of the different paths // The 6 paths // Holds the states of the 6 paths at time t // Holds the states of subcarriers of a user at time t

// Initialization of some parameters p = "0 -0.9 -4.9 -8 -7.8 -23.9"; p = pow(10.0, p/10.0); // Generation of different users' gains RNG_randomize(); A.setup(1.0,2.0); a = A(N); sort(a); // Simulation of users' channels for (int u = N-1; u >= 0; u--) { jakes(0,J,ns,p(0),h1); jakes(0,J,ns,p(1),h2); jakes(0,J,ns,p(2),h3); jakes(0,J,ns,p(3),h4); jakes(0,J,ns,p(4),h5); jakes(0,J,ns,p(5),h6); for (int t = 0; t < ns; t++) { currentchan(0) = h1(t); currentchan(1) = h2(t); currentchan(2) = h3(t);

112

currentchan(3) = h4(t); currentchan(4) = h5(t); currentchan(5) = h6(t); currentsubchan = fft(currentchan, S); for (int sc = 0; sc < S; sc++) { user(t,sc) = floor_i(logb(2.0, ((B * logb(2.0,(1+sqr(abs(currentsubchan(sc)))*a(u)*EbNo/sum(p))) / S)/(9.6*1024)))); if (user(t,sc) < 0) user(t,sc) = 0; } } sprintf(file_name, "user%d%s", N-1-u, ".it" ); ofstream pf(file_name); if(!pf.is_open()) cout = user[j].elem_len_arriv(user[j].HOL) && user[j].HOL < user[j].len) { // if this packet hasn't expired yet if (current_time - user[j].elem_len_arriv(user[j].HOL) =1) vc(j)++; // = ceil_i((0.2 * user[j].violation_count) + (0.8 * vc(j))); }

} else

// No new packets in the jth user queue so go to the next user {

116

x = false; } } }

// Subcarrer Allocation Algorithm if (Nt > 0) { w_mean = w_mean / Nt; m_mean = m_mean / Nt; scheduled_users.set_size(Nt,true); for (int y = 0; y < Nt; y++) z(scheduled_users(y)) = ceil_i(m(scheduled_users(y)) / m_mean); while (sum(z) != S) { if (sum(z) < S) { St = S - sum(z); if (!w_mean) for (int f = 0; f < Nt; f++) z(scheduled_users(f)) = z(scheduled_users(f)) + ceil_i( (double) St / Nt ); else for (int h = 0; h < Nt; h++) z(scheduled_users(h)) = z(scheduled_users(h)) + ceil_i(St * w(scheduled_users(h)) / (w_mean*Nt)); } else { w_sorting = sort_index(w); int r = 0; do { if (w(w_sorting(r)) >= 0) z(w_sorting(r))--; r++; if (r == N) r = 0; } while (S < sum(z)); } } }

// Subcarrier Assignment Algorithm p.set_size(Nt,false); q.set_size(Nt,false); for (int t = 0; t < Nt; t++) p(t) = vc(scheduled_users(t)); for (int qq = 0; qq < Nt; qq++) { q(qq) = scheduled_users(max_index(p)); p(max_index(p)) = -1; } for (int e = 0; e < Nt; e++) { total_rate = 0; for (int sss = 0; sss < S; sss++)

117

subchan(sss) = 9.6 * 1024 * pow2(chan_state(q(e),sss)); int z_count = 0; while (z_count < z(q(e))) { if (s(max_index(subchan))) { if (max(subchan) >= 0) { s(max_index(subchan)) = 0; z_count++; total_rate = total_rate + max(subchan); subchan(max_index(subchan)) = -1; } } else subchan(max_index(subchan)) = -1; } do { if (user[q(e)].HOL_pkt_len