World Applied Sciences Journal 15 (4): 525-531, 2011
ISSN 1818-4952
© IDOSI Publications, 2011
Bandwidth Allocation in Wimax Networks Using Reinforcement Learning
1
Saeid M. Jafari, 2Majid Taghipour and 3M.R. Meybodi
1
Department of Computer and IT Engineering, Qazvin, Iran
University of Applied Science and Technology, Urmia, Iran
3
Department of Electrical and Computer Engineering, Amirkabir, Tehran, Iran
2
Abstract: An important problem for the WiMAX networks is how to provide a guaranteed quality of service
for applications. A key aspect of this problem is how base stations should share bandwidth capacity between
different classes of traffic. The decision needs to be made for each incoming packet and is known as the packet
scheduling problem. A major challenge in packet scheduling is that the behavior of each traffic class may not
be known in advance and can vary dynamically. this paper has described how the packet scheduling problem
has been modeled as an application for reinforcement learning. We have demonstrated how our reinforcement
learning approach could learn scheduling policies that satisfy the quality of service requirements of multiple
traffic classes under a variety of conditions. The proposed solution has been designed to have an ability to
accommodate integrated traffic in the networks with effective scheduling schemes. A series of simulation
experiments have been carried out to evaluate the performance of the proposed scheduling algorithm. Results
revealed that the proposed solution performs effectively to the integrated traffic composed of messages with
or without time constraints and achieves proportional fairness among different types of traffic.
Key words: WiMAX %Scheduling Algorithms %Channel assignment %Learning Automata %Quality of Service
INTRODUCTION
deliver broadband service in the fixed point-to-point (PTP)
or point-to-multipoint (PMP) topologies and it has
proposed a framework for the QoS services for four types
of traffic. Unsolicited Grant Service (UGS), real-time
Polling Service (rtPS), non real-time Polling Service
(nrtPS) and Best Effort (BE) QoS classes [5].
UGS supports real-time service flows that have
fixed-size data packets on a periodic basis. RtPS supports
real-time service flows that generate variable data packets
size on a periodic basis. The BS provides unicast grants
in an unsolicited manner like UGS where as the UGS
allocations are fixed in size. NrtPS is designed to support
non real-time service flows that require variable size
bursts on a regular basis. BE is used for best effort traffic
where no throughput or delay guarantees are provided.
Those service classes are defined in order to satisfy
different types of Quality of Service (QoS) requirements.
However, the IEEE 802.16 standard does not specify
the scheduling algorithm to be used [7]. Vendors and
operators have to choose the scheduling algorithm(s) to
be used. Three types of schedulers must be defined; an
uplink and a downlink scheduler both in the Base Station
(BS) and just an uplink scheduler for the Subscriber
Station (SS) between the different simultaneous
connections of the SS.
WiMAX technology based on the IEEE 802.16
standard [1] has a very rich set of features [2]. Indeed,
it is a very promising Broadband Wireless Access (BWA)
technology. The major attractions of WiMAX systems
come from their ability to provide broadband wireless
access and potential ability to compete with existing wired
systems such as fiber optic links, coaxial systems using
cable modems and digital subscriber line (DSL) links with
much scalability [3]. The WiMAX networks have the
capacity to provide flexibility and efficiency to allow
coexistence of different types of traffic, such as real-time
and multimedia traffic.
The IEEE 802.16 standard provides specification for
the medium access control (MAC) and physical (PHY)
layers for the air interface. The standard includes details
about the various flavors of PHY layers supported and
characteristics of the MAC layer such as bandwidth
request mechanisms and the scheduling services
supported [6].
One important issue in the WiMAX networks design
is to support QoS services to different types of traffic.
IEEE802.16d standard [1] ratified in June 2004, has
specified all the techniques of the WiMAX systems to
Corresponding Author: Saeid M. Jafari, Department of Computer and IT Engineering, Qazvin, Iran.
525
World Appl. Sci. J., 15 (4): 525-531, 2011
This paper has presented a system for packet
scheduling that is based on Learning Automaton. In our
approach, Learning Automaton is used to learn a
scheduling policy in response to feedback from the
network about the delay experienced by each traffic class.
Key advantages of our approach are that our system does
not require prior knowledge of the statistics of each traffic
flow and can adapt to changing traffic requirements and
loads. In practice, this helps network providers to deliver
a guaranteed QoS to customers, while maximizing network
utilization and minimizing the need for manual
intervention.
We make three key contributions in this paper: (1) we
present a model for using RL to address the problem of
packet scheduling in Base Station with QoS requirements;
(2) we demonstrate the advantages of RL in terms of
convergence time in comparison to other scheduling
schemes; and (3) we provide an insight into the relative
merits of two alternative RL algorithms in the context of
this application. We begin by describing the application
of packet scheduling. We then describe our solution
based on LA and demonstrate its effectiveness in a range
of simulated traffic conditions.
The Temporary Removal Scheduler (TRS) scheduler
[8] involves identifying the packet call power, depending
on radio conditions and then temporarily removing them
from a scheduling list for a certain adjustable time period
TR. The scheduling list contains all the SSs that can be
served at the next frame. When TR expires, the temporarily
removed packet is checked again. If an improvement is
observed in the radio channel, the packet could be topped
up in the scheduling list again, otherwise the process
is repeated for another TR duration. In poor radio
conditions, the whole process could be repeated up to
L times at the end of which, the removed packed is added
to the scheduling list, independently of the current radio
channel condition.
The Opportunistic Deficit Round Robin (O-DRR)
scheduler [9] is used in the uplink direction. The BS polls
subscribers periodically. After each period, the BS
determines the set of subscribers that are eligible to
transmit and their bandwidth requirements. This set is
defined as the eligible set. A number of conditions must
be verified by an SS to be in this set: (1) the queue is not
empty. (2) The received SIR is above a minimum
threshold denoted SIRth. Once these conditions are
satisfied, the subscriber is eligible to transmit
during a given frame of the current scheduling epoch.
The scheduled set changes dynamically depending
on the wireless link state of subscribers. At the
beginning of each scheduling epoch, the BS resets the
eligible and scheduled sets and repeats the above
mentioned process.
The temporary TRS can be combined with the RR
scheduler [7]. The combined scheduler is called TRS+RR.
For example, if there are k packet calls and only one of
them is temporary removed, each packet call has a portion,
equal to 1/(k - 1), of the whole channel resources.
The TRS can be combined with the mSIR
scheduler. The combined scheduler is called TRS+mSIR
[10]. This scheduler assigns the whole channel resources
to the packet call that has the maximum value of the Signal
to Noise Ration (SNR). The station to be served has to
belong to the scheduling list.
Previous Work: In this section, we present some
schedulers. The simplest scheduling algorithm is the
Round Robin (RR) scheduler. It distributes equal
channel resources to all the SSs without any priority.
The RR scheduler is simple and easy to implement.
However, this technique is not suitable for systems with
different levels of priority and systems with strongly
varying sizes of traffic. There is an extension of the
RR scheduler, the Weighted Round Robin (WRR)
scheduler, based on static weights. In the same context,
we present the Deficit Round Robin (DRR) scheduler.
The DRR scheduler associates a fixed quantum (Q i) and
a deficit counter (DC i) with each flow i. At the start of
each round and for each flow i, DC I is incremented by
Q i. The head of the queue i is eligible to be queued if
DC i is greater than the length of the packet waiting to be
sent (L i). In this case, DC i is decremented by L i. At each
round, one packet at most can be sent (and then queued)
for each flow. Maximum signal to interference ratio (mSIR)
Scheduler is based on the allocation of radio resources
to subscriber stations which have the highest Signal
to-Interference Ratio (SIR). This scheduler allows a highly
efficient utilization of radio resources. However, with the
mSIR scheduler, the users with a SIR that is always small
may never be served.
Problem Definition: This study is based on the model of
packet scheduling in cellular network described by Hall
and Mars [11]. The RL algorithm has been presented by
Taghipoor firstly. But it had high overload because of
use of probability matrix, then was not a real automata.
Nevertheless in new proposed algorithm use same
efficacy.
526
World Appl. Sci. J., 15 (4): 525-531, 2011
The aim of this study is to schedule N classes of
traffic, where each traffic class has its own queue qi; i = 1:
N. Let qN denote the queue for best-effort traffic, which
has no predefined delay requirements. For each remaining
queue qi; i = 1:::N - 1, there is a mean delay requirement
Ri, which is the maximum acceptable mean queuing delay
per packet for the traffic class assigned to qi. Let Mi
denote the measured mean queuing delay of packets in qi
over the last P packets. The aim is to learn a scheduling
policy that minimizes MN while ensuring that Mi _ Ri for
i = 1: N - 1. In other words, we want to satisfy the QoS
constraints for queues qi; i = 1: N-1 while maximizing the
available bandwidth to the best-effort queue qN.
In keeping with the model of Hall and Mars [11],
all packets in our system have a constant fixed length.
This is typical of the internal queues in routers that use a
cell switching fabric. We can model this traffic using a
discrete-time arrival process, where a fixed length timeslot
is required to transmit a packet and at most one packet
can be serviced at each timeslot. The arrival of packets is
described by a Bernoulli process, where the mean arrival
rate li for qi is represented by the probability of a packet
arriving for qi in any timeslot. The role of the scheduler is
to decide which queue should be serviced at each timeslot
(Figure 1). At each timeslot, the scheduler must select an
action a g {a1: aN}, where ai is the action of choosing to
service the packet at the head of queue qi. The scheduler
makes this selection by using a scheduling policy A,
which is a function that maps the current state of the
system s onto an action a. If the set of possible actions is
denoted by A and the set of possible system states is
denoted by S, then A: S6A.
The second component of the scheduler is a reward
function r: S ×A6R. When an action a , A is executed in
state s g S, the scheduler receives a reward r(s; a) from the
system. This reward provides feedback about the
immediate value of executing the action a.
The goal is to learn an optimal scheduling by
iteratively refining an initial probability vector. Each time
we use our current probability vector to select a
scheduling action a, we observe the immediate reward
R (a) and use this reward as feedback to update our
current probability vector (p). This approach is known as
reinforcement learning, which has been applied to a
variety of scheduling and control tasks. In the next
section, we describe our method for using learning
automata to optimize the scheduling policy of our queue
management system.
Fig. 1: Packet scheduling for multiple traffic classes
Our Learning Automaton Approach: There are three key
components to our application of using Learning
Automaton to learn scheduling policies for queue
management. First, we require a representation of the state
s of our system, which reflects the state of the traffic in
our queues. Second, we require a suitable reward
function: S×A6R, which reflects the immediate value of
our scheduling actions. Finally, we require a learning
algorithm to refine our policy function A(s) based on the
feedback provided by our reward function. Let us now
describe our solution for each of these components of
our system.
State Representation: The reason for introducing
the system state into the policy function is so that
the scheduler can learn how to act in different situations.
This is in contrast to the approach of using a SLA, which
uses a single state in its policy function, i.e., the
scheduling policy does not depend on the state of the
queues. By introducing a more sophisticated state
representation we can potentially gain greater control,
albeit at the risk of greater complexity. However, we need
to ensure that the state representation is not too complex;
otherwise there may be too many parameters to be tuned,
which may slow the convergence rate of the algorithm.
The aim of scheduling is to use different scheduling
policies depending on which queues are not meeting their
delay requirements. We represent the state of the system
by a set of N -1 binary variables {s1: s-1}, where each
variable si indicates whether traffic in the corresponding
queue qi is meeting its mean delay requirement Ri,
0
Si =
1
M i ≤ Ri
M i > Ri
Note that there is no variable corresponding to
the best-effort queue qN, since there is no mean
delay requirement for that queue. For example, the state
{0; 0;::: ; 0} represents that all queues have satisfied
527
World Appl. Sci. J., 15 (4): 525-531, 2011
their mean delay constraint, while (1; 0;::: ; 0} represents
that the mean delay requirements are being satisfied for all
queues except q1. Thus, if there are N queues in
the system including one best-effort queue, then there are
2N-1 possible states. In practice, the number of traffic
classes is normally small, e.g., four classes in Cisco
routers with priority queuing, in which case the number of
states is acceptable.
rtime , i =
N −1
∑ wi rtime,i
i =1
Where the weights wi depend on which queue was
serviced by the last scheduling action. In practice,
we have found that suitable weights are wi = 0:3 if qi
was the queue serviced by the last action, otherwise
wi = 1:0. These weights discourage the scheduler from
servicing queues with satisfactory performance if
there are other queues experiencing unsatisfactory
performance. Although the choice of weight values is
not critical, we found that we can significantly
improve the convergence rate of our system by using a
non-zero weight for queues that were not serviced by
the last action.
The state reward is positive if a scheduling action
causes the system to move to a better state —compared to
the previous state s. State —is considered to be better
than s if it has more queues whose mean delay
requirements are being met, e.g., —= {0; 0;::: ; 0} is better
than s = {1; 0;::: ; 0}. Thus
Reward Function: The role of the reward function is to
provide feedback to the Learning Automaton algorithm
about the effect of a scheduling action. Based on this
feedback, the learning algorithm can decide how to update
the current scheduling policy. The aim of reward function
is to provide a positive reward when packets are serviced
within their delay requirement and a negative reward when
they are late. We also want to provide a positive reward
when the system moves to a better state, i.e., when the
measured mean delay for a queue falls below the required
mean delay. Thus our reward function r comprises a time
reward component rtime and a state reward component
rstate, where r = rtime + rstate.
Every time a scheduling action is executed, the time
reward rtime;i for each queue qi is calculated in terms of
the mean delay requirement Ri and the measured mean
delay Mi.
C1 M1
if
M i < Ri
Ri
rtime , i = C1
if
M i = Ri
−C
if
M i > Ri
2
C
tstate = 3
O
if S' Is better than S
Else
Learning Algorithm: The updating algorithm
(function) is used to enable the automaton to learn
the state of the random environment based on
the obtained feedback and choose the best possible
action at any point of stage.
For a multi-action system, the updating algorithm
writes as follows:
When a positive response is obtained for an
action, its probability is increased
and the
probabilities of all other actions are decreased. If a
negative feedback is received for an action,
the probability of that action is decreased and that of
others is increased.
The time reward is positive when Mi = Ri and
negative when Mi 6 Ri. It is maximized when the mean
delay requirement is just satisfied. (Figure 2) There is a
diminishi0ng reward as Mi approaches zero, since any
reduction in Mi below Ri is wasting bandwidth that could
be allocated to other queues. In general, it is possible to
change the form of the reward function depending on
the type of QoS requirements that need to be satisfied.
The total time reward is a weighted sum of the rewards for
each queue.
Pi(n + 1) = pi(n) + a(ri)
Pi(n + 1) = pi(n) – ((1 – ri)/3), j
i
When a negative feedback is obtained for action i,
the automaton updates its action probability set based
below Eq.
Pi(n + 1) = pi(n) – a(ri)
Pi(n + 1) = pi(n) + " ((ri)/3), j
i
In all our simulations, we assume a = 5 and we refer to
this as learning parameter.
Fig. 2: Time reward function
528
World Appl. Sci. J., 15 (4): 525-531, 2011
Table 1: Slot size for OFDM PH
UGS
Modulation
Channel Coding
Slot Size(byte)
64 –QAM
64-QAM
QPSK
QPSK
3/4
2/3
3/4
1/2
108
96
36
24
Latency (ms)
2000
1500
1000
Table 2: WiMAX parameter
Parameter
Value
PHY
Bandwidth
Frame per Second
Duplexing mode
ARQ/CRC
OFDM
7MHz
400
TDD
OFF
500
0 500 1000 1500 2000 2500 3000 3500
UGS Traffic load (Kbps)
Fig. 3: Latency versus traffic
UGS
Table 3: The scenario used in our simulation
Data rate (Kbps)
Scenario
UGS
rtps
nrtps
BE
1
3
3
3
1
4000
3500
3000
2500
2000
1500
1000
500
0
Evaluation: This section presents the simulation results
for the proposed scheduling solution. For testing
performance of proposed mechanism, the introduced
RL is implemented in the Network Simulator (NS-2) [13]
and WiMAX module [7] that is based on the WiMAX
NIST module [10]. The MAC implementation contains
the main features of the 802.16 standard, such as
downlink and uplink transmission. We have also
implemented the most important MAC signaling
messages, such as UL-MAP and DL-MAP, authentication
(PKM), capabilities (SBC), registration (REG), dynamic
service addition (DSA) and dynamic service change
(DSC). The implemented PHY is OFDM.
The current implementation also supports different
MCSs. Table 1 shows presents slot size for different
modulations and channel coding types.
We present a simulation scenario to study
thoroughly
the
proposed
scheduling solution.
The scenario will present a multi-service case, in which
a provider has to support connections with different
802.16 classes and traffic characteristics. The purpose of
this scenario is to ensure that the scheduler at the BS
takes the service class into account and allocates
slots based on the QoS requirements and the request
sizes sent by SSs. Another purpose is to test that the
scheduler at the BS takes the MAC overhead into
account. Table 1 presents information about which
applications are active at scenario.
Regardless of the simulation scenario, the general
parameters of the 802.16 network are the same (Table 2).
There is one BS that controls the traffic of the 802.16
network. The physical layer is OFDM. The BS uses
the dynamic uplink/downlink slot assignment for
0 500 1000 1500 2000 2500 3000 3500
UGS Traffic Load (Kbps)
Fig. 4: Throughput versus traffic
Fig. 5: Latency versus simulation time
the TDD mode. Both the BS and all Sss use packing
and fragmentation in all simulation scenarios.
The MAC level uses the largest possible PDU size.
ARQ is turned off; neither the BS nor SSs use the CRC
field while sending packets.
Table 3 presents information number applications are
active at different times.
529
World Appl. Sci. J., 15 (4): 525-531, 2011
Fig. 7 shows all the three queues decrease
significantly that is due to delay satisfaction. Then rtps
value gently ascends until rtps and nrtps numbers tend to
a fixed numbers.
CONCLUSION
In this article, the behavior of some scheduling
algorithms and the proposed algorithm based on the delay
parameters and simulation were compared. Algorithm
proposed algorithms and Maximum signal to interference
ratio hvea the best results. RL schemes are able to satisfy
QoS requirements. For multiple traffic classes, without
starving resources from best-effort traffic. Furthermore,
our RL schemes can adapt to changing traffic statistics
and QoS requirements. Simulation results show that the
proposed Scheduler Find the best solution for nrtPS and
rtPS traffic.
For future work, we will use our proposed
method to build up a flexible and intelligent system
based on mSIR scheduler. In this system we will train
network with minimize packet latency and signal noise
ratio for improving QoS and increasing system
performance.
Fig. 6: Latency versus simulation time
Fig. 7: Automaton Vector variation
REFERENCES
In this section, we compare five scheduling
algorithms: the NIST_RR, mSIR, RR, TRS+RR and
TRS+mSIR schedulers with the proposed method.
Fig. 3 shows latency packets as a function of the
traffic load submitted to the network. The data packets
are generated by a streaming multimedia application.
UGS scheduling algorithms considered in the round
except the standard Rubin worked diagram is linear and its
graph throughput is linear with a slope (Figure 4).
Because of this the following are the algorithms
mentioned above, the traffic request is not the highest
priority if package is available in this type of traffic speed
data services and will be sent.
Figures 5 and 6 show that the RL has a very good
behavior in packets mean latency, because this scheduler
controls rtPS and nrtps classes latency in both inter and
intra-class mechanism by considering latency values of
subscribers.
TRS+mSIR has good behavior than the RR scheduler
because the channel quality of different SSs is not taken
into consideration in RR.
RR has low efficiency because this scheduler
allocates all the symbols to SS even if it has not data
to send.
1.
2.
3.
4.
5.
6.
530
IEEE 802.16-2004, IEEE Standard for local and
metropolitan area Networks, Air Interface for Fixed
Broadband Wireless Access Systems, Oct 2004.
Borin, J.F. and N.L.S. Da Fonseca, 2008. Simulator for
WiMAX networks. Elsevier journal, Simulation
Modelling Practice and Theory, 15(7): 817-833.
Ball, C.F., E. Humburg, K. Ivanov and F. Treml, 2005.
Comparison of IEEE802.16 WiMAX Scenarios with
Fixed and Mobile Subscribers in Tight Reuse, the
14th IST Mobile & Wireless Communication Summit,
Dresden, 19-23 June 2005.
Borin, J.F. and N.L.S. Da Fonseca, 2008. Simulator for
WiMAX networks. Elsevier journal, Simulation
Modelling Practice and Theory, 15(7): 817-833.
IEEE 802.16e-2005. 2006. IEEE Standard for local and
metropolitan area networks, Air Interface for Fixed
Broadband Wireless Access Systems Amendment 2:
Physical and Medium Access Control Layers for
combined Fixed and Mobile Operation in Licensed
Bands and Corrigendum. February 2006.
Tsai, T., C. Jiang and C. Wang, 2006. CAC and Packet
scheduling Using Token Bucket for IEEE 802.16
Networks. J. Communications, 1(2).
World Appl. Sci. J., 15 (4): 525-531, 2011
7.
8.
9.
Belghith, A. and L. Nuaymi, 2008. Design and
Implementation of a QoS-included WiMAX Module
for NS-2 Simulator. First International Conference on
Simulation
Tools
and
Techniques
for
Communications Networks and Systems, SIMUTools
2008, Marseille, France, March 3-7,2008.
Ball, C.F., F. Treml, X. Gaube and A. Klein, 2005.
Performance Analysis of Temporary Removal
Scheduling applied to mobile WiMAX Scenarios in
Tight Frequency Reuse”, the 16th Annual IEEE
International Symposium On Personal Indoor and
Mobile Radio Communications, PIMRC’ 2005, Berlin,
11-14 September 2005.
Rath, H.K., A. Bhorkar and V. Sharma, 2006.
An Opportunistic DRR (O-DRR) Uplink Scheduling
Scheme for IEEE 802.16-based Broadband Wireless
Networks, IETE, International Conference on Next
Generation Networks (ICNGN), Mumbai.
10. Vinay, K., N. Sreenivasulu, D. Jayaram and D. Das,
2006. Performance Evaluation of End-to-end Delay
by Hybrid Scheduling Algorithm for QoS in IEEE
802.16
Network,
Wireless
and
Optical
Communications Networks, 2006 IFIP International
Conference.
11. Hall, J. and P. Mars, 1998. Satisfying QoS with a
Learning Based Scheduling Algorithm. School of
Engineering, University of Durham.
12. Meybodi, M.R. and S. Lakshmivarahn, 1983.
A Learning Approach to Priority Assignment in
aTwo Class M/M/1 Queuing System with Unknown
Parameters, Proceedings of the Third Yale Workshop
on Applications of Adaptive Systems Theory,
Center for Systems Science, Yale University, Yale,
USA, pp: 106-109.
13. The network simulator ns-2. http:// www.isi.edu/
nsnam/ ns/, September 2007.
531
IJCSI International Journal of Computer Science Issues, Vol. 9, Issue 1, No 1, January 2012
ISSN (Online): 1694-0814
www.IJCSI.org
109
A Novel Algorithm for Manets using Ant Colony
Javad Pashae Barbin `1, Majid Taghipoor2 and Vahid Hosseini 3
1
Islamic Azad University, Naghadeh Branch
Uromieh; Iran
2
University of Applied Science Technology
Uromieh; Iran
3
Islamic Azad University, Shabestar Branch
Uromieh; Iran
Abstract
Mobile Ad-hoc Networks have recently attracted a lot of
attention in the research community as well as the industry.
Quality of Service support for MANETs is an exigent task due to
dynamic topology and limited resource. Routing, the act of
moving information across network from a source to a
destination. Conventional routing algorithms are difficult to be
applied to a dynamic network topology, therefore modeling and
design an efficient routing protocol in such dynamic networks is
an important issue. It is important that MANETs should provide
QoS support routing, such as acceptable delay, jitter and energy
in the case of multimedia and real time applications. One of the
meta-heuristic algorithms which are inspired by the behavior of
real ants is called Ant Colony Optimization algorithm. In this
paper we propose a new on demand QoS routing algorithm “Ant
Routing for Mobile Ad Hoc Networks” based on ant colony. The
proposed algorithm will be highly adaptive, efficient and scalable
and mainly reduces end-to-end delay in high mobility cases.
Keywords: MANET, Quality of Service (QoS), Ant Colony,
Routing Protocol.
1. Introduction
Mobile Ad hoc Networks (MANET) is a communication
network of a set of mobile nodes, placed together in an ad
hoc manner, without any fixed infrastructure that
communicate with one another via wireless links. The
devices used to form an Ad Hoc Network possess limited
transmission range; therefore, the routes between a source
and a destination are often multi hop. As there are no
separate routers, nodes that are part of the network need to
cooperate with each other for relaying packets of one
another towards their ultimate destinations as they do not
have central administration, it is easy to deploy and
expand. This kind of network is very flexible and suitable
for applications such as temporary information sharing in
conferences, military actions and disaster rescues.
However, multi-hop routing, random movement of mobile
nodes and other features unique to MANETs lead to
enormous overheads for route discovery and maintenance.
Furthermore, compared with the traditional networks,
MANETs suffer from the resource constraints in energy,
computational capacities and bandwidth. [1]
With the increasing needs of QoS provisioning for
evolving applications such as real-time audio/video, it is
desirable to support these services in ad hoc networking
environments. The network is expected to guarantee a set
of measurable specified service attributes to the user in
terms of end to-end delay, bandwidth, probability of
packet loss, energy and delay variance (jitter). The role of
a QoS routing strategy is to compute paths that are suitable
for different type of traffic generated by various
applications while maximizing the utilizations of network
resources. [3] The major objectives of QoS routing are: [2]
1. To find a path from source to destination satisfying
user’s requirements
2. To optimize network resource usage and
3. To degrade the network performance when unwanted
things like congestion, path breaks appear in the network.
The main problem to be solved by QoS routing algorithm
is the Multi-Constraint Path problem. Algorithms to solve
this family of problems are known to be heuristics which
can reduce the complexity of the path computation. [2, 4]
The path computation algorithm is at the core of QoS
routing strategies. Instead of using a shortest path
algorithm based on statically configured metrics, as in
traditional routing protocols, the algorithm must select
several alternative paths that are able to satisfy a set of
constraints regarding, for instance, end-to-end delay
bounds and bandwidth requirements. However, the
algorithms to solve such a problem have been shown to
have, in general, high computational complexity. [3]
Several approaches have been proposed to address the
complexity of multi-constrained path computation
problem. The paths that satisfy these multiple constraints
Copyright (c) 2012 International Journal of Computer Science Issues. All Rights Reserved.
IJCSI International Journal of Computer Science Issues, Vol. 9, Issue 1, No 1, January 2012
ISSN (Online): 1694-0814
www.IJCSI.org
are called as feasible paths. The solution of this kind of
multi constrained problem requires a path computation
algorithm that finds paths satisfying all the constraints.
Since the optimal solution of this type of problems with
multiple additive and independent metrics is NP-complete,
usually heuristics or approximation algorithms can be used
to solve such kind of problems. [1] In this paper, I will
present a new approach for an ad hoc routing algorithm,
which is based on Ant Colony Optimization (ACO)
algorithm. We show that for a wide range of different
environments and performance metrics, ACO performs
better than AODV, AOMDV.
The rest of the paper is organized as; section 2 discusses
related ant based routing protocol. Section 3 describes the
new proposed routing protocol. Section 4 discusses
performance evaluation parameters and results of routing
protocol followed by conclusions in section 5.
2. Ant colony optimization (ACO) algorithm
ACO algorithms have been inspired by the behavior of a
real ant colony. The algorithm can find the optimum
solution by generating artificial ants. Just as real ants
search for food in their environment, the artificial ants
search the solution space. The probabilistic movement of
ants in the system allows the ants to explore new paths and
to re-explore the paths visited earlier. The strength of the
pheromone deposit directs the artificial ants toward the
best paths and pheromone evaporation allows the system
to forget old information and avoid quick convergence to
suboptimal solutions. The probabilistic selection of paths
allows the artificial ants to search for a large number of
solutions. ACO has been applied successfully to discrete
optimization problems such as the traveling salesman
problem and routing [5, 6]. A number of proofs for the
convergence to the optimum path of the ACO can be
found in [8, 9].
2.1. Basic and Background
The basic idea of the ant colony optimization metaheuristic is taken from the food searching behavior of real
ants. When ants are on the way to search for food, they
start from their nest and walk toward the food. When an
ant reaches an intersection, it has to decide which branch
to take next. While walking, ants deposit pheromone1,
which marks the route taken. The concentration of
pheromone on a certain path is an indication of its usage.
With time the concentration of pheromone decreases due
to diffusion effects. This property is important because it is
integrating dynamic into the path searching process. [7]
110
Fig. 1 All ants take the shortest path after an initial searching time. [7]
Figure 1 shows a scenario with two routes from the nest to
the food place. At the intersection, the first ants randomly
select the next branch. Since the below route is shorter
than the upper one, the ants which take this path will reach
the food place first. On their way back to the nest, the ants
again have to select a path. After a short time the
pheromone concentration on the shorter path will be
higher than on the longer path, because the ants using the
shorter path will increase the pheromone concentration
faster. The shortest path will thus be identified and
eventually all ants will only use this one.
This behavior of the ants can be used to find the shortest
path in networks. Especially, the dynamic component of
this method allows a high adaptation to changes in mobile
ad-hoc network topology, since in these networks the
existence of links are not guaranteed and link changes
occur very often.[7]
2.2. Solving Network Routing Using ACO
Mobile ad hoc network routing is a difficult problem
because network characteristics such as traffic load and
network topology may vary stochastically and in a time
varying nature. The distributed nature of network routing
is well matched by the multi agent nature of ACO
algorithms.[8] The given network can be represented as a
construction graph where the vertices correspond to set of
routers and the links correspond to the connectivity among
routers in that network. Now network route finding
problem is just finding a set of minimum cost path
between nodes present in the corresponding graph
representation which can be done easily by the ant
algorithms.
3. Proposed Algorithm
This paper proposes an on demand QoS routing algorithm.
Since the requirements for various applications may vary
time to time, the approach for QoS routing may not be
proactive. The proposed approach has two phases namely
route discovery phase and route maintenance phase. When
a source node has to pass data to a destination node with
QoS requirements it starts with the route discovery phase.
Once the route is found, the data transfer will take place.
While data transmission is going on, it is also required to
maintain the path to the destination. This is very much
desirable and required in mobile ad hoc networks and
Copyright (c) 2012 International Journal of Computer Science Issues. All Rights Reserved.
IJCSI International Journal of Computer Science Issues, Vol. 9, Issue 1, No 1, January 2012
ISSN (Online): 1694-0814
www.IJCSI.org
hence is done in the route maintenance phase. The
proposed algorithm differs from other similar algorithms
because routing from destination to source is done.
3.1. Route Discovery Phase
The outline of this phase is as follows:
Step 1: Let the source node S has data to send to a
destination D with QoS requirements delay, energy,
bandwidth and hop count. Each node has a routing table.
Step 2: D initiates a ForwardAnt to source S through all its
neighbors which it has learned from periodic hello
messages.
Step 3: While traveling to the source the ForwardAnt
collects transmission delay of each link, processing delay
at each node, the available capacity of each link, the
number of hops visited and stores in routing table each
node.
Step 4: When the ForwardAnt reaches the source, it will be
converted as BackwardAnt and forwarded towards the
original destination. The BackwardAnt will take the same
path of the corresponding ForwardAnt but in reverse
direction.
Step 5: For every BackwardAnt reaching an intermediate
node or destination node, the node can find the delay,
bandwidth, hop count from the received ant to the
respective destination. Now the node can calculate the path
preference probability to reach the source.
Step 6: If calculated path preference probability value is
better than the requirements, the path is accepted and
stored in memory.
Step 7: The path with higher path preference probability
will be considered as the best path and data transmission
can be started along that path.
111
Send one ForwardAnt to neighbors
end if
for each message m in D’s buffer do
if (m→type = ForwardAnt) then
send m to NextHop
if NextHop = S then
m →type = Backward
end if
else if m→type = BackwardAnt then
find NextHop in C’s BackRouting table
send m to NextHop
IncreasePheromone(NextHop,m)
if NextHop = D or NextHop = Intemediate node then
update averages of packet delays and remaining energy
drop m
end if
end if
end for
Evaporate()
/*calculate higher path preference probability will be
considered as the best path and data transmission can be
started along that path*/
end for
3.2. Route maintenance phase
As mentioned before, the values of pheromone trails are
stored in a table at each node. Suppose that a data is
currently residing in node N and this node has k neighbors
H1, H2... Hk and φi is the amount of pheromone assigned
to ei and di. The data will select Hi as the next node with a
probability pi (ed) which is calculated using the equation 3.
P
e
∑e
P
⁄d
∑ ⁄d
P
P
∑P
In similar algorithms, Route discovery is achieved by
flooding forward ants to the destination then the backward
will take the same path of the corresponding forward but in
reverse direction. Finally, the data packets sent from source to
destination. While the proposed algorithm, the algorithm
starts from the destination node and the data packet is sent
with the backward.
pi (e) measure of energy consumption at node i is
compared with the total energy consumption.
The above stochastic strategy, described in Algorithm 1,
establishes multiple paths between the source and
destination. As a result, in contrast to regular position
based routing algorithms which usually find a single route
to the destination, proposed algorithm is a multipath
routing algorithm (i.e. like other ACO routing algorithms).
pi (d) measure of routing delay at node i is compared with
the total routing delay.
Algorithm 1 routing algorithm
{S is the source node, D is the destination node and
C is the current node}
for each clock time do
if C = S then
Send one BackwardAnt from reverse direction
else
P
P
Where:
ei: energy level of node i.
di: latency of node i.
θ : Constant value θ
Copyright (c) 2012 International Journal of Computer Science Issues. All Rights Reserved.
IJCSI International Journal of Computer Science Issues, Vol. 9, Issue 1, No 1, January 2012
ISSN (Online): 1694-0814
www.IJCSI.org
Each node scans pi(ed) and selects the node with the
highest preference and forwards the data packet
(BackwardAnt) to this node. This process is repeated until
the destination node is reached. The ants move from one
node to another and carry table 1.
Node
X
Table 1: route information
Energy Time Estimated Waiting
Ex
t
t
4. Simulation and Performance analysis
VC++ 6.0 program is used to realize the simulation of the
algorithm. For our results we assumed 50 mobile nodes
communicating via IEEE 802.11. The nodes move inside a
simulation area of 1500m*300m. The simulation time is
900 seconds. The nodes move with a maximal velocity of
10 m/s and according to the random waypoint mobility
model.
Figure 4 depicts the needed number of packets to perform
the routing job for all three routing algorithms. In the cases
with high mobility it is obvious that MPAC and AOMDV
create the least overhead. Especially MPAC shows here a
better performance than AOMDV in high dynamic. With
less, the overhead of MPAC and AODV are very close.
AOMDV shows here again their poor performance by
creating large numbers of routing packets.
Figure 5 show average remaining energy for all three
routing algorithms. Remaining energy of MPAC is high
than AODV and AODV. That is because optimum tour is
established by the way of flooding, costing more time in
MPAC, and lead to increasing consumption energy of
network.
The number of delivered packets
Algorithm 2 Select Next Hop
Input: node N
for i = 1 to the number of N’s neighbors do
P
P
P
∑ P
P
Return neighbor i with probability pi
end for
112
A
MPAC
AODV
AOMDV
0
200
600
800
1000
Fig. 2 Delivery rate
overload of routing
4.1. Simulation and Performance analysis
A new routing algorithm should show its performance in
comparison with existing and known algorithms. The
simulated traffic is Constant Bit Rate (CBR). We compare
our protocol with AODV and AOMDV. We evaluate
mainly the performance according to the metrics packet
delay, overload and packet delivery.
Our proposed algorithms are named MPAC (Multi Path
Ant Colony). We will first discuss the robustness of the
routing protocols. Figure 2 shows the delivery rate, i.e., the
part of packets a certain routing protocol was able to
deliver properly. This value is important, since it describes
the performance which transport protocols will see, i.e.,
the throughput is restricted by this value.
In situations with very high dynamics MPAC shows the
best performance. With less dynamic, down to 300
seconds of pause time, AODV has best performance.
Because AODV uses particular route, over time this will
destroy the path and find a new path will lead to delay. But
in the proposed protocol does not caused a problem
because use of different routes.
Figure 3 shows the overhead of MPAC. All results are
very close through all simulation scenarios. This shows
that MPAC creates much less routing overhead for all
considered mobility scenarios.
400
simulation time(ms)
AMPAC
AODV
AOMDV
0
200
400
600
800
simulation time(ms)
Fig. 3 Overhead
Copyright (c) 2012 International Journal of Computer Science Issues. All Rights Reserved.
1000
IJCSI International Journal of Computer Science Issues, Vol. 9, Issue 1, No 1, January 2012
ISSN (Online): 1694-0814
www.IJCSI.org
113
The number of delivered packets
Information Networking and Applications, AINA 2005 1:
426-431, 2005
MPAC
A
AODV
AOMDV
0
200
400
600
800
[3] Dr. Shuchita Upadhayaya and Charu Gandhi,” QUALITY OF
SERVICE ROUTING IN MOBILE AD HOC NETWORKS
USING LOCATION AND ENERGY PARAMETERS”,
International Journal of Wireless & Mobile Networks
(IJWMN), Vol 1, No 2, November 2009.
[4] Frederick Ducatelle, ``Adaptive Routing in Ad Hoc Wireless
Multi-hop Networks'', Ph.D Thesis, Universitμa della
Svizzera italiana Faculty of Informatics.
1000
simulatin time(ms)
Fig. 4 Comparison of three protocols by the number of needed routing
packets
Average remain energy
AMPAC
AODV
[5] A. Sabari, K Duraiswamy, ``Ant Based Adaptive Multicast
Routing Protocol (AAMRP) for Mobile Ad Hoc Networks''
International Journal of Computer Science and Information
Security Vol 6, No 2, 2009.
[6] FJ Arbona Bernat, ``Simulation of Ant Routing Protocol for
Ad-hoc networks in NS-2'', Faculty of Electrical Engineering,
Mathematics and Computer Science Network Architectures
and Services Group.
[7] Claudia Lorenz,Patrizia Mottl ``Ant Algorithm - Phd thesis'',
Swiss Federal Institute of Technology, Zurick
AOMDV
[8] P.Deepalakshmi1 , Dr.S.Radhakrishnan2, “Ant Colony Based
QoS Routing Algorithm For Mobile Ad Hoc Networks”, in
proc International Journal of Recent Trends in Engineering,
Vol. 1, No. 1, May 2009.
0
200
400
600
800
1000
simulation time(ms)
Fig. 5 Average remaining energy
5. Conclusion
In this paper, we have proposed an ant based routing
protocol for mobile ad hoc networks. ACO based
algorithms have specialized to provide adaptive and
efficient solutions to network routing. AMPC provides
multiple paths with comparatively less overhead in the
network. The simulation results indicate that proposed
scheme can perform better than AODV and AOMDV
under high mobility because of alternate route
maintenance scheme. In future, we have planned to
investigate the performance of the algorithm for real-time
multimedia data using various mobility models.
[9] Chunxue Wu, Fengna Zhang, Hongming Yang,” A Novel
QoS Multipath Path Routing in MANET”,International
Journal of Digital Content Technology and its Applications
Volume 4, Number 3, June 2010.
[10] Jafari, Saeid. M., Taghipour, M. and Meybodi, M. R.
"Bandwidth Allocation in Wimax Networks Using
Reinforcement Learning", World Applied Sciences Journal
Vol. 15, No. 4, pp. 525-531, 2011.
Javad Pashaei received B.E. degree from Shabestar Azad
University in 2006. He received M.S. degree from Shabestar Azad
University in 2010. His research interests include network
management as well as WiMAX and ad hoc networks.
Majid Taghipoor teaches in university of applied science
technology. His research interests include network management
as well as WiMAX, ad hoc, Manet networks and NOC.
Vahid Hosseini received M.S. degree from Shabestar Azad
University in 2010.
6. Reference
[1] Chlamtac, M. Conti, and J. Liu, “Mobile ad hoc networking:
imperatives and challenges”, Ad Hoc Networks, No. 1, 2003.
[2] Z.Liu , M. Z. Kwiatkowska and C. Constantinou , 9 A
biologically inspired QoS routing algorithm for ad hoc
network : , International Conference on Advanced
Copyright (c) 2012 International Journal of Computer Science Issues. All Rights Reserved.
World Applied Sciences Journal 15 (4): 576-583, 2011
ISSN 1818-4952
© IDOSI Publications, 2011
Bandwidth Allocation in WiMAX Networks Using Learning Automaton
1
Saeid M. Jafari, 2Majid Taghipour and 3M.R. Meybodi
1
Department of Computer and IT Engineering Qazvin, Iran
University of Applied Science and Technology Urmia, Iran
3
Department of Electrical and Computer Engineering Amirkabir Tehran, Iran
2
Abstract: Recent developments on the wireless communication technology have brought much innovativeness
to make wireless access networks, e.g. WiMAX systems, to be able to compete with the wired access networks
with much more bandwidth. QoS service provisioning is an important issue for deploying such networks. The
IEEE 802.16d standard has specified the services should be provided at the medium access control (MAC) layer
in WiMAX networks. However, it has left a wide space for research to develop and implement those specified
services. In this paper, the issue of differentiated service provisioning will be addressed with the non-real-time
polling service in WiMAX systems. The proposed solution has been designed to have an ability to
accommodate integrated traffic in the networks with effective scheduling schemes. A series of simulation
experiments have been carried out to evaluate the performance of the proposed scheduling algorithm. In our
algorithm we introduce a two-phase Learning Automaton queuing (2PLAQ) algorithm tailored for uplink
scheduling in the WiMAX network. It aims to strike the balance between delay requirement and fair bandwidth
allocation. The results reveal that the proposed solution performs effectively to the integrated traffic composed
of messages with or without time constraints and achieves proportional fairness among different types of traffic.
Key words: WiMAX %Scheduling %Learning Automaton %Bandwidth Allocation
INTRODUCTION
fixed point-to-point (PTP) or point-to-multipoint (PMP)
topologies. And it has proposed a framework for the QoS
services for four types of traffic. Unsolicited Grant Service
(UGS), real time Polling Service (rtPS), non real-time
Polling Service (nrtPS) and Best Effort (BE) QoS classes.
UGS supports real-time service flows that have fixed-size
data packets on a periodic basis. rtPS supports real-time
service flows that generate variable data packets size on
a periodic basis. The BS provides unicast grants in an
unsolicited manner like UGS. Whereas the UGS
allocations are fixed in size. nrtPS is designed to support
non real-time service flows that require variable size
bursts on a regular basis. BE is used for best effort traffic
where no throughput or delay guarantees are provided.
Those service classes are defined in order to satisfy
different types of Quality of Service (QoS) requirements.
However, the IEEE 802.16 standard does not specify the
scheduling algorithm to be used. Vendors and operators
have to choose the scheduling algorithm(s) to be used.
Three types of schedulers must be defined; an uplink and
a downlink scheduler both in the Base Station (BS) and
just an uplink scheduler for the Subscriber Station (SS)
between the different simultaneous connections of the SS.
WiMAX technology based on the IEEE 802.16
standard [1,2] has a very rich set of features. Indeed, it is
a very promising Broadband Wireless Access (BWA)
technology. The major attractions of WiMAX systems
come from their ability to provide broadband wireless
access and potential ability to compete with existing wired
systems such as fiber optic links, coaxial systems using
cable modems and digital subscriber line (DSL) links with
much scalability. The major attractions of WiMAX
systems come from their ability to provide broadband
wireless access and potential ability to compete with
existing wired systems such as fiber optic links, coaxial
systems using cable modems and digital subscriber line
(DSL) links with much scalability. The WiMAX networks
have the capacity to provide flexibility and efficiency to
allow coexistence of different types of traffic, such as
real-time and multimedia traffic. One important issue in the
WiMAX networks design is to support QoS services to
different types of traffic. IEEE802.16d standard [1, 2],
ratified in June 2004, has specified all the techniques of
the WiMAX systems to deliver broadband service in the
Corresponding Author: Saeid M. Jafari, Department of Computer and IT Engineering Qazvin, Iran.
576
World Appl. Sci. J., 15 (4): 576-583, 2011
In this paper we present a system for packet
scheduling that is based on Reinforcement Learning [16].
In our approach, Reinforcement Learning (RL) is used
to learn a scheduling policy in response to feedback from
the network about the delay experienced by each traffic
class and fairness. In our algorithm we introduce a twophase Learning Automaton Queuing (2PLAQ) algorithm
tailored for uplink scheduling in the WiMAX network. It
aims to strike the balance between delay requirement and
fair bandwidth allocation.
In simulations, we consider both popular Poisson
traffic and practical burst traffic that is modeled by the
Markov Modulated Poisson Process (MMPP). The
simulation results verify the correctness of our analytical
models and compare 2PLAQ with other scheduling
schemes. It achieves a low drop rate and high throughput
while maintaining fairness among different connections at
the same time. The paper is organized as follows. In
Section II we briefly introduce the Related Scheduling
Algorithms. In Section III we present the proposed
2PLAQ algorithm. In section IV we analyze and simulate
the Two-phase LAQ Scheduling Algorithm. Finally we
invest conclusions in Section V.
DRR to guarantee the bandwidth allocation of each of the
four queues, thus preventing queues with higher priorities
from depleting the bandwidth and causing starvation of
queues with lower priorities. Analysis model is an
important part of the research in scheduling algorithms. In
[3], mean delay bound is derived by using the M/G/FQ
queuing model, but it is based on WFQ algorithm and
does not consider QoS parameters other than MRR. QoS
parameters are not considered in [6], where an MMPP
model is employed to derive the packet drop rate and
characterize uplink rtps and nrtps traffic that share a
single First-Come-First-Serve (FCFS) queue. For other
scheduling algorithms [4,5,7-12], their performance and
effectiveness are demonstrated and compared via
simulations only, without in-depth theoretical analysis.
Two-Phase Learning Automaton Queuing (2PLAQ)
Scheduling Algorithm: In this section, we first present a
two-phase Learning Automaton Queuing (2PLAQ)
algorithm that addresses the delay and bandwidth
requirements while balancing the fairness and efficiency
among different connections. Then, an elegant queuing
model is established to derive in theory its performance in
terms of packet drop rate and throughput.
Related Scheduling Algorithms
In this Section, We Present Some Schedulers: Several
WiMAX scheduling solutions have been proposed. WFQ
is proposed and analyzed by an M/G/FQ queuing model
in [3]. Although WFQ can guarantee the minimum data
rate of the connections, it does not take into
consideration the delay constraint. Besides, the time
complexity of WFQ scheduling algorithm is high and thus
becomes a potential problem for its implementation in the
WiMAX network. A two-tier hierarchical architecture is
proposed in [4] for WiMAX uplink scheduling. In the
higher hierarchy, strict prioritization is used to direct the
traffic into the four queues, according to its type. Then,
each queue is scheduled according to a particular
algorithm, i.e. fixed allocation for UGS, EDF for rtps,
WFQ for nrtps and equal division of remaining
bandwidth for BE. Although EDF takes care of the delay
requirement of the rtps, grouping multiple rtps
connections into one queue fails to guarantee the
minimum bandwidth requirement of each individual rtps
connection. For example, one rtps connection with tight
delay budget may dominate the bandwidth allocation,
resulting in starvation of other rtps connections. A similar
approach is proposed in [7] and it replaces the strict
priority algorithm in the higher hierarchy with Deficit Fair
Priority Queue (DFPQ). The basic idea of DFPQ is to use
Overview of the Two-phase Laq Scheduling Algorithm:
The scheduling algorithm aims to meet the QoS
requirements of all types of connections. For UGS, the
scheduling is straightforward, because a fixed amount of
bandwidth is always allocated to each UGS connection
during each grant interval, which is determined according
to the requested data rate. BE connection has no specific
QoS requirement, thus it is not the interest of the study.
BE’s scheduling can be done via a simple scheme like
equal division of the remaining bandwidth among all BE
connections. In the following discussion, we focus on
rtps and nrtps traffic that has specific QoS requirements
on delay and bandwidth. To strike the balance between
delay and bandwidth requirements, the proposed
scheduling algorithm decouples them and addresses them
separately in two phases. In our discussion so far of LAQ,
the bandwidth allocation in Phase 1 is based on MRR.
More specifically, each connection is allocated a
bandwidth that equals its MRR, unless its total request is
lower than its MRR. The remaining bandwidth is then
used in Phase 2. Apparently, this is not the only option.
In theory, we can make any bandwidth allocation to the
two phases. To study the impact of bandwidth allocation
between two phases, we introduce a parameter ) , with
0#) #1 and allocate ) i-MRRi to Connection i in Phase 1.
577
World Appl. Sci. J., 15 (4): 576-583, 2011
There is ) for any connection to can provide its
requirements. For each connection ) should be
determined such that to be able to meet these needs.
Therefore, we’ll have a vector of ) . The ) have to be
trained using Learning Automaton for each connection so
that determining ) as a selective action, indicates delay
and bandwidth of the system. The more we concern about
selective action, the less packet loss we’ll have and the
more fairness we’ll get. So, we are going to have both
delay and fairness issues handled. If ) is small, then ) of
the reserved bandwidth of each flow is allocated at phase
1 and rest of the bandwidth will remain for next phase.
Therefore, small ) allocates less bandwidth to first phase
results in an increase in packet loss and also falters
fairness, on the other hand large amount of ) , allocates
more bandwidth to first phase which leads to reduction in
packet loss as well as fairness. At the beginning
probability vector contains initial values which are equals.
So, chance of selecting any action is equal. After
executing ai, it will immediately receive reward and based
on that probability vector will be updated.
Fig 1: Analytical Model for the Two-phase LAQ
Algorithm
Unknown Input for Phase 2: The input for Phase 2 is the
data not served in Phase 1, which is an unknown
parameter to be derived in analysis.
In this work, an elegant queuing model as shown in
Fig. 1 is constructed to describe the two-phase LAQ
algorithm. Our key idea is to creatively use the M/D/1+D
(for Markov arrival, deterministic service time, one server,
plus deterministic delay budget) queuing model with
FCFS and EDF queuing disciplines. We consider a general
scenario, where n rtps and/or nrtps connections are
established. Connection i has an arrival rate of 8i a delay
budget of Ji and a minimum reserved bandwidth of MRRi.
For the sake of analytic tractability, we assume that the
data arrival forms a Poisson process and all queues have
infinite size. Other types of traffic (such as the more
practical burst traffic) are studied through simulations.
Following the LAQ scheduling algorithm, the
queuing model also consists of two phases. In Phase 1,
since the connections are served with their reserved
bandwidth (i.e. MRRi), each of them can be modeled as a
separate and independent queue. Assuming the data
packet size is fixed, the service rate is a constant. More
specifically, the service rate of Queue i (for Connection i)
is µ = MRRi (1). Where L denotes the length of the data
L
packet. Clearly, the service rate of Queue i is proportional
to the MRR of Connection i. Note that, data packets that
cannot be served in Phase 1 due to the limited MRR will
all be passed to Phase 2. Therefore, we artificially set a
delay bound of T (which is the period of one frame) for
the queues in Phase I, in order to track the “dropped” data
packets of Phase 1, which will be the inputs for Phase 2.
Based on the above discussion, we arrive at an
M/D/1+D queue for each connection in Phase 1, with an
arrival rate of ¸i, a service rate of ¹i and a delay budget of
pt +1,i = pt + α * ( M i − Ri )
In general, there is a trade-off between the drop rate
and fairness when ) varies from 0 to 1. For example, a
small ) indicates more bandwidth allocated to Phase 2,
which results in a smaller drop rate but higher unfairness.
Analysis of the Two-Phase LAQ Scheduling Algorithm:
In this subsection, we analyze the performance of the
proposed LAQ algorithm, in order to gain insight into it
and to demonstrate in theory its performance. Similar to
our earlier discussions, we focus on the QoS performance
of rtps and nrtps connections only in our analysis. Note
that, we do not explicitly distinguish rtps and nrtps
connections, because they only differ in the amount of
delay budget. As to be discussed next, our analytic model
is generally applicable to any rtps or nrtps connections
with given arrival rates, MRR and delay bound.
Different Queuing Principles: LAQ involves two phases
with different queuing principles, i.e. FCFS in Phase 1 and
EDF in Phase 2.
Delay Constraint: Each data packet in the queue is
associated with a specific delay bound. A data packet is
dropped if its waiting time is longer than its delay budget.
The delay constraint dramatically increases the analytic
complexity.
578
World Appl. Sci. J., 15 (4): 576-583, 2011
(
T. The M/D/1+D queue under FCFS queuing discipline
has been well studied. According to [14], the packet drop
rate of Queue i is:
( λiτ − ρ ) e− ρ
Accordingly, the overall service rate in Phase 2 is
i
Pid = 1 −
1
+ [ ρi + ρi2eλit
ρi
∑j
r
= 0 ( −1) j
i
j!
j
i
]−1
(2)
µ′ =
T and r is the integer satisfying ( µiτ − 1) < r < µiτ
The packets “dropped” from Phase 1 become the
input of Phase 2. Because such “packet dropping” is
random, the “dropped” packets of Queue i also form a
Poisson process, with mean arrival rate of λ × P d
i
As shown in Fig. 1 the input of the queue is the
aggregation of the “dropped” packets from all queues in
Phase 1. Since the “dropped” packets from each queue are
Poisson, the aggregation of them is also Poisson, with a
n
mean arrival rate of λ ′ =
(3)
Pd × λ
∑ i =1 i
The bandwidth that is reserved but not actually
utilized in full by some connections.
t
=
i
1
µi
(
)
= λ 1 − Pid ×
1
µi
i
(6)
(7)
∑ i =1λi
n
i
Where xi is the normalized throughput of connection i and
n is the total number of connections. Here we use the
normalized throughput of a connection, i.e. X i = Th i ,
MRR i
(4)
with Thi and MRRi stand for the connection i’s actual
data rate and reserved data rate, respectively. The Jain’s
Fairness Index ranges between 0 and 1. The higher the
index, the better the fairness. If Thi = MRRi for all i, or in
other words, every connection obtains its reserved data
rate, then xi = 1 for all i and Jain’s Fairness Index equals
1. All simulations and analytic calculations are done using
NS2 (2.34) simulator.
Where t denotes any given time interval and tbusy
represents the busy period within t. In the above
equation, λ 1 − P d × t is the actual number of arrivals in
(
λ′
∑
∑ i =1
When a connection is idle, its reserved bandwidth is
not used and thus contributing to the bandwidth of
Phase 2.
For Queue i in Phase 1, the fraction of time when
packets are served is:
)
n
Simulations and Discussion: We have carried out
extensive simulations to verify the correctness of the
proposed analytical model for the LAQ algorithm and to
compare its performance with other scheduling
algorithms, under a broad set of simulation parameters. In
particular, we consider several comparable scheduling
algorithms, including WRR, EDF and DFPQ [7] (which is
a representative WiMAX scheduling algorithm and has
been patented and well received).
Besides packet drop rate and throughput that have
been studied in analysis, we are also interested in the
fairness performance, which is measured by Jain’s
Fairness Index [15] defined as follows:
2
n Xi
i =1
f ( X1, X1,.... X n ) =
n
(8)
n
X2
∑ i =1
(
∑ i =1 Pi0µi
And the throughput is 1-Pd
bandwidth. Thus the remaining bandwidth comes from:
~ the bandwidth that is not reserved by any connections,
n
i.e. W −
MRRi and
λ 1 − Pid × t ×
n
i
∑ i =1
tbusy
∑ i =1 MRRi +
Pd = Pd′
The service rate in Phase 2 denoted by µ i is estimated
as follows. The amount of bandwidth available for Phase
2 is what has been left after Phase 1.
We assume that CAC ensures the total reserved
bandwidth never greater the total available bandwidth, i.e.
n
MRRi ≤ W , where W denotes the total available
C
W−
1
Actually, Equation (4) is a form of Little’s theorem
[13] and 1-P0 is also known as the utilization factor. We
model Phase 2 as an M/D/1+D queue, with an arrival rate
of 8´ and a service rate of µ´. In addition, each packet in
the queue is associated with a delay budget, e.g. Ji for the
packet from Connection i. The packet drop rate P′
d
obtained above is with respect to the input of Phase 2, i.e.
the arrivals with a mean rate of 8´ . As shown in Fig 1, the
actual inputs of the entire system are the arrivals with
means of 81,82,....8n in Phase 1. Therefore, the overall
dropping probability is:
Where Di equals λi ,τ is the delay bound which is set to
µi
i
)
denoted by P0 , is Pi0 = 1 − λi 1 − Pid × 1 (5)
i
µi
)
t (excluding those being dropped) and 1 is the service
µi
time for each packet. Thus the fraction of idle time,
579
World Appl. Sci. J., 15 (4): 576-583, 2011
Table 1: Raw Data Rate.
SS ID
SS1
SS2
SS3
SS4
Modulation type
BPSK
QPSK
16QAM
64QAM
Inner code rate
2-Jan
3-Feb
4-Mar
6-May
Bits / symbol
1
2
4
6
Raw data rate Rb(Mbps)
3.716
9.9094
22.2962
37.1603
Bytes / mini slot
1.875
4.999
11.247
18.745
For DFPQ approach in [7], the results are obtained via
simulation only.The analysis and simulations are
compared in Fig. 2, where X-axis indicates the traffic load
of rtps3 (where Dequals arrival rate over MRRi=l) and Yaxis shows the overall packet drop rate of all connections.
The simulation result of DFPQ algorithm is also depicted
in Fig. 2. We observe that EDF, LAQ and DFPQ have
similar packet drop rate, while the drop rate of WRR is
much higher, because WRR does not consider the delay
budget and is more likely to drop real time data packets.
Note that, with the increase of the traffic load of rtps3, the
total traffic load becomes significantly higher than the
total available bandwidth. Therefore, all four algorithms
exhibit high drop rate. Simulation results of the Jain’s
Fairness Index are shown in Fig. 3. As we can see, the
fairness index of EDF drops dramatically when the traffic
load of rtps3 becomes higher than its MRR, because the
additional real time traffic (with tight delay budget)
aggressively takes bandwidth from the nrtps connections
under the EDF algorithm and thus leading to low
throughput and unfairness to non-real time traffic. When
D of connection rtps3 is greater than 1, the fairness index
of both LAQ and DFPQ drops, but DFPQ’s fairness index
drops more rapidly, exhibiting worse fairness performance
than LAQ. The reason can be two-folded. First, DFPQ
always gives real time traffic higher priority than non-real
time traffic, resulting in unfairness. The other reason is
that DFPQ does not guarantee the minimum reserved rate
of each real time connection since EDF is deployed within
all the real time connections. Among the four scheduling
algorithms, WRR’s fairness index is the stablest when the
input traffic varies. In summary, the fairness index of LAQ
is better than that of DFPQ and EDF and comparable to
WRR.
Table 2: MRR and Delay Budget of Different connections.
rtps
rtps1
rtps2
rtps3
MRR (kbps)
19.2
64
384
rtps4
1024
Delay (ms)
10
30
20
40
nrtps
nrtps1
nrtps2
nrtps3
nrtps4
MRR (kbps)
24
48
256
768
Delay (ms)
100
130
170
200
Table 3: Distribution of the 8 Connections in 4 SS.
SS ID
SS1
rtps1+ nrtps1
s
rtps2 + nrtps2
s
rtps3 + nrtps3
rtps4 + nrtps4
SS2
SS3
s
s
s
s
SS4
s
s
The simulation parameters are bring in following
tables:
Each SS establishes a number of connections to the
BS in our simulation. We consider four rtps connections,
named rtps1, rtps2, rtps3 and rtps4 and four nrtps
connections, named nrtps1, nrtps2, nrtps3 and nrtps4. As
shown in Table 2, each type of connection is associated
with an MRR and a delay budget.
Every SS has four connections as shown in
Table 3. For example, SS1 has these four
connections: rtps1, nrtps1, rtps2 and nrtps2.
As a result, there are 16 connections, which request
a total MRR of 537 mini slots. We consider two
types of traffic in our simulations, i.e. the popular Poisson
traffic and the burst traffic generated by the Markov
Modulated Poisson Process (MMPP) model, as discussed
below.
Burst Traffic: To study the performances of the four
scheduling algorithms under burst traffic, we use Markov
Modulated Poisson Process (MMPP) model to generate
data packets.
λmax .
The burstiness of the traffic is defined as
b=
λavg
The higher the value of b, the more bursty the traffic
is. When b equals to 1, the MMPP model is equivalent to
the Poisson model.
To focus on the impact of burst traffic, we vary b and
fix the arrival rate of all connections, i.e. let 8i= 1/5MRRi/L
for rtps3 connections and 8i= MRRi/L for other
connection. The packet drop rates of the four scheduling
algorithms under burst traffic are shown in Fig. 4. As can
be seen, WRR is rather vulnerable to the burst traffic.
Poisson Traffic: First, we use Poisson traffic, with packet
size of l = 800 bytes. The arrival rates of all connections
except rtps3 are fixed and match their reserved data rates.
For example, the packet arrival rate of Connection i equals
MRRi=l. Meanwhile, we vary the arrival rate of rtps3, in
order to study the influence on the scheduling results.
We have obtained analytic and simulation results for
LAQ, as well as the simple WRR and EDF schemes.
580
World Appl. Sci. J., 15 (4): 576-583, 2011
Fig. 2: Drop Rate under Poisson Traffic.
Fig. 4: Drop rate under Burst Traffic.
Fig. 3: Fairness under Poisson Traffic
Fig. 5: Fairness under Burst Traffic.
With the increase of b, its drop rate increases
dramatically. On the other hand, EDF, LAQ and
DFPQ can maintain a reasonably low packet drop rate
even when b is large. The fairness of the scheduling
algorithms under burst traffic is shown in Fig.4. As we can
see, LAQ always maintains a high fairness index, while the
fairness of EDF algorithm is the worst among the four
algorithms.
Notice that when b increases, the fairness
index of EDF becomes higher. This is due to
the fact that some real time packets of rtps3
connection are dropped under high burstiness
and thus the throughput of rtps3 decreases to a
value more closer to its reserved throughput.
Accordingly, the normalized throughput of rtps3 becomes
close to 1, which appears more fair. On the contrary, the
fairness of WRR drops with the increase of traffic
burstiness.
Fig. 6: Drop rate-Impact of Bandwidth Allocation
between Two Phases () ).
581
World Appl. Sci. J., 15 (4): 576-583, 2011
Queue (DFPQ). Both analytic and simulation results have
clearly shown that LAQ algorithm effectively achieves
low packet drop rate and high throughput while
maintaining the fairness among different connections.
REFERENCES
1.
Fig. 7: Fairness-Impact of Bandwidth Allocation between
Two Phases () ).
In general, there is a trade-off between the drop rate
and fairness when ) varies from 0 to 1. For example, a
small ) indicates more bandwidth allocated to Phase 2,
which results in a smaller drop rate but higher unfairness.
However, our simulation results show that the algorithm
Achieves higher overall performance under larger) . As
can be seen in Fig. 6 and 7, when ) increases from 0 to 1,
the drop rate increases only marginally by about 0.1%,
while the Jain’s Fairness Index increases from around 0.93
to 0.98, which is close to the perfect fairness. This result
justifies our choice of letting ) = 1 in LAQ.
CONCLUSION
In this article, we have presented a two-phase
Learning Automaton Queuing (LAQ) algorithm for uplink
scheduling in the WiMAX network. It aims to strike the
balance between fair bandwidth allocation and delay
requirement. In order to gain deep understanding of and
insights into LAQ algorithm, we have established an
elegant queuing model to derive in theory the
performance metrics in terms of packet drop rate and
throughput. The analytic model has been verified by
extensive simulations, carried out on the basis of a broad
set of parameters according to WiMAX physical layer
standards. In simulations, we have considered both
popular Poisson traffic and practical burst traffic that is
modeled by the Markov Modulated Poisson Process
(MMPP). The simulation results have verified the
correctness of our analytical models. We have also
compared LAQ with WRR, EDF and Deficit Fair Priority
582
IEEE 802.16-2004, 2004. IEEE Standard for local and
metropolitan area Networks, Air Interface for Fixed
Broadband Wireless Access Systems,
2. "IEEE 802.16e, 2004. IEEE Standard for local and
metropolitan area networks, Air Interface for Fixed
Broadband Wireless Access System, Amendment",
3. Hawa, M., 2003. “Stochastic Evaluation of Fair
Scheduling with Applications to Quality-of-Service
in Broadband Wireless Access Networks”, Ph.D.
dissertation, University of Kansas.
4. Wongthavarawat, K. and A. Ganz, 2003. “IEEE 802.16
Based Last Mile Broadband Wireless Military
Networks with Quality of Service Support” in Proc.
Mil. Commun. Conf, pp: 779-784.
5. Liu, Q., X. Wang and G. Giannakis, 2006. “A
Cross-Layer Scheduling Algorithm with QoS Support
in Wireless Networks,” IEEE Trans. Veh. Tech.,
55(3): 839-847.
6. Niyato, D. and E. Hossain, 2006. “Queue-aware
Uplink Banwidth Allocation and Rate Control for
Polling Service in IEEE 802.16 Broadband Wireless
Networks,” IEEE Trans. Mobile Comp., 5(8): 668-679.
7. Chen, J., W. Jiao and H. Wang, 2005. “A Service Flow
Management Strategy for 802.16 Broadband Wireless
Access System in TDD Mode,” in Proc. IEEE ICC, pp:
3422-3426.
8. Raghu, K.R., S.K. Bose and M. Ma, 2007. “Queue
Based Scheduling for IEEE 802.16 Wireless
Broadband,” in Proc. 6th IEEE Int. Conf. ICICS,
pp: 1-5. 2007.
9. Sharma, V. and N. Vamaney, 2007. “The UniformlyFair Deficit Round-Robin (UF-DRR) Scheduler for
Improved QoS Guarantees in IEEE 802.16 WiMAX
Networks,” in Proc. Mil. Commun. Conf, pp: 1-7.
10. Shejwal, A. and A. Parhar, 2007. “Service Criticality
Based Scheduling for IEEE 802.16 WirelessMAN,” in
Proc. 2nd IEEE Int. Conf. AusWireless, pp: 12-18.
11. Salodjar, N. and A. Karandikar, 2008. “An Indexing
Scheduler for Delay Constrained Scheduling with
Applications to IEEE 802.16,” in Proc. IEEE WCNC,
pp: 1471-1476.
World Appl. Sci. J., 15 (4): 576-583, 2011
12. Bai, X., A. Shami and Y. Ye, 2008. “Robust QoS
Control for Single Carrier PMP Mode IEEE 802.16
Systems,” IEEE Trans. Mobile Comp., 7(4): 416-429.
13. Kleinrock, L., 1979. Queueing Systems, Volume 1:
Theory. Hoboken, NJ: John Wiley and Sons,
14. Kok, A.G.D. and H.C. Tijms, 1985. “A Queueing
System with Impatient Customers,” J. Appl. Prob.,
22(3): 688-696.
583
15. Jain, D.M.C.R. and W. Hawe, 1984. “A Quantitative
Measure of Fairness and Discrimination for Resource
Allocation in Shared Systems”, dEC Research Report,
TR-301.
16. Hall, J. and P. Mars, 1998. Satisfying QoS with
Learning Based Scheduling Algorithm. In 6th
International Workshop on Quality of Service,
pp: 171-176.
4
Scheduling Algorithm and
Bandwidth Allocation in WiMAX
Majid Taghipoor1, Saeid MJafari2 and Vahid Hosseini3
1University
of Applied Science and Technology Uromieh,
of Computer and IT Engineering,
Islamic Azad University of Qazvin, Qazvin,
3Department of Computer and IT Engineering,
Computer Engineering Deptt., Urmia University,
Iran
2Department
1. Introduction
The traditional solution to provide high-speed broadband access is to use wired access
technologies, such as cable modem, DSL (Digital Subscriber Line), Ethernet, and fiber optic.
However, it is too difficult and expensive for carriers to build and maintain wired networks,
especially in remote areas. BWA (Broadband Wireless Access) technology is a flexible,
efficient, and cost-effective solution to overcome the problems [1]. WiMAX is one of the
most popular BWA technologies today, which aims to provide high speed broadband
wireless access for WMANs (Wireless Metropolitan Area Network). [2]
WiMAX provides an affordable alternative for wireless broadband access supporting a
variety of applications of different types including video conferencing, non-real-time large
volume data transfer, traditional voice/data traffic throughput E1/T1 connection, and web
browsing.[1]
Each traffic flow requires different treatment from the network in terms of allocated
bandwidth, maximum delay, and jitter and packet loss [3], [5]. Traffic differentiation is thus
a crucial feature to provide network-level QoS (Quality of Service). The standard leaves QoS
support features specified for WiMAX networks (e.g., traffic policing and shaping,
connection admission control and packet scheduling). One of the most critical issues is the
design of a very efficient scheduling algorithm which coordinates all other QoS-related
functional entities.
The key components in WiMAX QoS guarantee are the admission control and the
bandwidth allocation in BS. WiMAX standard defines adequate signalling schemes to
support admission control and bandwidth allocation, but does not define the algorithms for
them. This absence of definition allows more flexibility in the implementation of admission
control and bandwidth allocation.
In this study, we focus on evaluating scheduling algorithms for the uplink traffic in
WiMAX. We evaluate a number of WiMAX uplink scheduling algorithms in a single-hop
network, which is referred to as PMP (Point Multi Point) mode of WiMAX.
www.intechopen.com
86
Quality of Service and Resource Allocation in WiMAX
2. Overview of WIMAX
In this section, we discuss the WiMAX, the uniqueness of WiMAX uplink scheduling.
2.1 WiMAX standard
BWA technology promises a large coverage and high throughput. Theoretically, the
coverage range can reach 30 miles and the throughput can achieve 75 Mbit/s [1]. Yet, in
practice the maximum coverage range observed is about 20 km and the data throughput can
reach 9 Mbit/s using UDP (User Datagram Protocol) and 5 Mbit/s using FTP (File Transfer
Protocol) over TCP (Transmission Control Protocol)[2].
WiMAX standard has two main variations: one is for fixed wireless applications (covered
by IEEE 802.16-2004 standard) and another is for mobile wireless services (covered by
IEEE 802.16e standard). The 802.16 standards only specify the PHY (Physical) layer and
the MAC (Media Access Control) layer of the air interface while the upper layers are not
considered.
The IEEE 802.16 standard specifies a system comprising two core components [6]: the SS
(Subscribe Station) or CPE (customer premises equipment) and the BS (Base Station). A BS
and one or more SS can form a cell with a P2MP structure. Note that the WiMAX standard
also can be used in a P2P (Point to Point) or mesh topology. BS acts as a central entity to
transfer all the data from MSs (Mobile Station) in a PMP mode. Transmissions take place
through two independent channels: downlink channel (from BS to MS) and uplink channel
(from MS to BS). Uplink Channel is shared between all MSs while downlink channels is
used only by BS.
To support the two-way communication, either FDD (Frequency Division Duplex) or TDD
(Time Division Duplex) can be adopted. In the following discussion, we focus on the
popular TDD.
The IEEE 802.16 is connection oriented. Each packet has to be associated with a connection
at MAC level. This provides a way for bandwidth request, association of QoS and other
traffic parameters and data transfer. All data transmissions are connection-oriented and the
connections are classified into four types, namely, UGS (Unsolicited Grant Service), also
known as CBR (Constant Bit Rate), rtVR (real-time Variable Bit Rate), nrtVR(non real-time
Variable Bit Rate), and BE (Best Effort). Each service related to type of QoS class can has
different constraints such as the traffic rate, maximum latency and tolerated jitter. In section
4 we will focus more on QoS the WiMAX technologies.
UGS supports real-time service flows that have fixed-size data packets on a periodic basis.
RtVR supports real-time service flows that generate variable data packets size on a periodic
basis. The BS provides unicast grants in an unsolicited manner like UGS. Whereas the UGS
allocations are fixed in size. NrtVR is designed to support non real-time service flows that
require variable size bursts on a regular basis. BE is used for best effort traffic where no
throughput or delay guarantees are provided. Those service classes are defined in order to
satisfy different types of QoS requirements. However, the IEEE 802.16 standard does not
specify the scheduling algorithm to be used. Vendors and operators have to choose the
scheduling algorithm(s) to be used.
www.intechopen.com
Scheduling Algorithm and Bandwidth Allocation in WiMAX
87
2.2 WiMAX MAC layer
The 802.16 MAC protocol supports transport protocols such as ATM, Ethernet, and IP, and
can accommodate future developments using the specific convergence layer. The MAC also
accommodates very high data throughput through the physical layer while delivering
ATM-compatible QoS, such as UGS, rtVR, nrtVR, and BE. The 802.16 frame structure
enables terminals to be dynamically assigned uplink and downlink burst profiles according
to the link conditions. This allows for a tradeoff to occur – in real time – between capacity
and robustness. It also provides, on average, a 2x increase in capacity when compared to
non-adaptive systems.
Fig. 1. Wireless MAC protocol classification [25]
According to the architecture topology, there are two main wireless MAC protocols:
1.
2.
Distributed MAC Protocols: these protocols are founded on principles of CS and CA,
excluding the distributed ALOHA protocol.
Centralized MAC Protocols: these protocols are based on communicating with a central
entity – in case of cellular mobile communications: the base station. Thus all
communications is organized and supervised according to the BS MAC management
protocol. [25]
There are three types of wireless MAC protocol types:
1.
2.
Random Access Protocols: according to this access protocol, for a node to be able to
access the network it should contend for the medium.
Guaranteed Access Protocols: unlike the random access protocols, the communication
between nodes is made on some predefined rules. This may be either in the form
polling the nodes one by one, or by token exchanging.
www.intechopen.com
88
3.
Quality of Service and Resource Allocation in WiMAX
Hybrid Protocols: these type of protocols are more superior to the previously
mentioned other two protocols, since they are made out of the top properties of random
access protocols and guaranteed access protocols. [25].
Hybrid protocols can be further subdivided into two categories:
a.
b.
Random Reservation Access protocol: these are the protocols by the MAC where a
periodic reservation of the bandwidth is granted on the reception of a successful
request from nodes supported by the central node.
Demand Assignment protocol: The MAC allocated bandwidth according to the need of
application of the node.
The hierarchy of the wireless MAC protocols classification could be illustrated as it is shown
in figure 1.
Therefore, mobile WiMAX MAC protocol could be classified as the demand assignment
protocol; knowing that the mobile WiMAX MAC is designed to support QoS and according
to the only MAC protocol that guarantees resources is the DA protocol. [25]
Fig. 2. The 802.16 protocol stack [6]
WiMAX MAC is subdivided into three sub layers with different functionalities. Figure 2 is a
basic illustration of the tasks and services that the MAC sub layers are responsible for.
www.intechopen.com
Scheduling Algorithm and Bandwidth Allocation in WiMAX
89
The upper MAC layer is the CS (Convergence Sub layer). This sub layer is responsible
mainly for classification and header suppression of the incoming packets from the network
layer. The classification is done according to the QoS parameters of the packet. Then each
service flow is assigned a service flow identifier number.
The inner layer is called the MAC CSP (common part sub layer) and it is considered the
main sub layer of the MAC layer. Finally, the lower MAC layer is called the MAC security
sub layer. Functions like support for privacy, user/device authentication are the
responsibility of this sub layer.
Figure 3 illustrates the PHY layer with the three sub layers of the MAC layer. The Figure
shows the data/control plane only and it regarded as the scope of the standard.
Fig. 3. WiMAX MAC and PHY layers – data/control plane [25]
www.intechopen.com
90
Quality of Service and Resource Allocation in WiMAX
The 802.16 MAC uses a variable-length PDU (Protocol Data Unit) and other innovative
concepts to greatly increase efficiency. Multiple MAC PDUs, for example, may be
concatenated into a single burst to save PHY overhead. Multiple SDUs (Service Data Unit)
may also be concatenated into a single MAC PDU, saving on MAC header overhead.
Fragmentation allows very large SDUs to be sent across frame boundaries to guarantee the
QoS. Payload header suppression can be used to reduce the overhead caused by the
redundancy within the SDU headers. The 802.16 MAC uses a self-correcting bandwidth
request/grant scheme that eliminates any delay in acknowledgements, while allowing
better QoS handling than traditional acknowledgement schemes. Depending on the QoS and
traffic parameters of their services, terminals have a variety of options available to them for
requesting bandwidth. SAP (Service Access Point) is entities located in between the sub
layers in order to convert the SDU to PDU. Basically, when PDUs of an upper layer are
passed through the SAP to a lower layer, they are considered as SDU for that particular
lower layer.
In TDD mode, a WiMAX MAC frame consists of two sub frames, DL-sub frame for
downlink transmission and UL-sub frame for uplink transmission, as shown in figure 4. The
DL-sub frame comprises a BP (Burst Preamble) and a FCH (Frame Control Header),
followed by DL-MAP, UL-MAP, and a number of downlink payload bursts (DL-PL1, ….,
DL-PLn). As will be discussed later, the UL-MAP contains the uplink scheduling results, i.e.,
the uplink bandwidth granted to each SS. The UL-sub frame starts with initial ranging
contention slots and bandwidth request contention slots, followed by a number of uplink
payload bursts (UL-PL1, …, UL-PLn)(Figure 4). The uplink and downlink bursts are not
necessarily equal and their length can be adjusted dynamically in order to adapt to the
traffic variation. [29]
Fig. 4. WiMAX MAC frame structure [29]
3. Problem statement
A WiMAX network is designed to incorporate different types of data streams, and it aims at
providing QoS guarantee for all the data streams being served by WiMAX. The WiMAX
protocol covers physical layer and MAC layer, and there are several challenges for QoS
guarantee in WiMAX.
www.intechopen.com
Scheduling Algorithm and Bandwidth Allocation in WiMAX
91
The IEEE 802.16 standard provides specification for the MAC and PHY layers for WiMAX
and there are several challenges for QoS guarantee in WiMAX.
In the physical layer, one challenge is the uncertainty of the wireless channel, which makes
the guarantee of broadband wireless data service difficult and renders the static resource
allocation scheme unsuitable. In the MAC layer, one challenge is the diversified service
types, which requires the WiMAX scheduling scheme to be adaptive to the various QoS
parameters of different service types. There have been some studies of the WiMAX MAC
scheduling problem [3], [4], [5], and [6].
The key components in WiMAX QoS guarantee are the admission control and the
bandwidth allocation in BS. WiMAX standard defines adequate signalling schemes to
support admission control and bandwidth allocation, but does not define the algorithms for
them. This absence of definition allows more flexibility in the implementation of admission
control and bandwidth allocation.
The research problem being investigated here is, after connections are admitted into the
WiMAX network, how to allocate bandwidth resources and perform scheduling services, so
that the QoS requirements of the connections can be satisfied.
3.1 What is QoS?
QoS refers to the ability of a network to provide improved service to selected network traffic
over various underlying technologies including wired-based technologies (Frame Relay,
ATM, Ethernet and 802.1 networks, SONET, and IP-routed networks) and wireless-based
technologies (802.11, 802.15, 802.16, 802.20, 3G, IMS, etc). In particular, QoS features provide
improved and more predictable network service by providing the following services:
Supporting dedicated bandwidth
Improving loss characteristics
Avoiding and managing network congestion
Shaping network traffic
Setting traffic priorities across the network
Due to the differences in the wired-based and wireless-based access technologies, the
detailed QoS implementations for both tend to be different, however they share common
roots. What follows next are the common elements shared between wired-based and
wireless-based access methods.
3.2 QoS and scheduling in WiMAX
A high level of QoS and scheduling support is one of the interesting features of the WiMAX
standard. These service-provider features are especially valuable because of their ability to
maximize air-link utilization and system throughput, as well as ensuring that SLAs (ServiceLevel Agreements) are met (Figure 5). The infrastructure to support various classes of
services comes from the MAC implementation. QoS is enabled by the bandwidth request
and grant mechanism between various subscriber stations and base stations. Primarily there
are four buckets for the QoS (UGS, rtVR, nrtVR, and BE) to provide the service-class
classification for video, audio, and data services, as they all require various levels of QoS
www.intechopen.com
92
Quality of Service and Resource Allocation in WiMAX
requirements. The packet scheduler provides scheduling for different classes of services for
a single user. This would mean meeting SLA requirements at the user level. Users can be
classified into various priority levels, such as standard and premium.
Fig. 5. Packet scheduling, as specified by 802.16 [6]
3.3 Scheduling algorithm and their characteristic
In some cases, separate scheduling algorithms are implemented for the uplink and
downlink traffic. Typically, a CAC (Call Admission Control) procedure is also implemented
at the BS that ensures the load supplied by the SSs can be handled by the network. A CAC
algorithm will admit a SS into the network if it can ensure that the minimum QoS
requirements of the SS can be satisfied and the QoS of existing SSs will not deteriorate. The
performance of the scheduling algorithm for the uplink traffic strongly depends on the CAC
algorithm.
Scheduling has also been studied intensively in many disciplines, such as CPU task
scheduling in operating systems, service scheduling in a client-server model, and events
scheduling in communication and computer networks. Thus a lot of scheduling algorithms
have been developed. However, compared with the traditional scheduling problems, the
WiMAX MAC layer scheduling problem is unique and worth study for the following
reasons.
First, the total bandwidth in a WiMAX network is adaptive since AMC (Adaptive Modelling
and Coding) is deployed in the physical layer and the number of bytes each time slot can
carry depends on the coding and modulation scheme. Second, multiple service types have
been defined and their QoS requirements need to be satisfied at the same time. How to
satisfy various QoS requirements of different service types simultaneously has not been
addressed by any other wireless access standard before. Third, the time complexity of the
WiMAX scheduling algorithm must be simple since real-time service demands a fast
response from the central controller in BS.
www.intechopen.com
Scheduling Algorithm and Bandwidth Allocation in WiMAX
93
Fourth, the frame boundary in the WiMAX MAC layer also serves as the scheduling
boundary, which makes the WiMAX scheduling problem different from the continuous time
scheduling problem. The above four characteristics make the resource allocation in the
WiMAX MAC layer a challenging problem.
While some similarities to the wired world can be drawn, there are certain characteristics of
the wireless environment that make scheduling particularly challenging. Five major issues
in wireless scheduling are identified in [9]:
Wireless link variability: Due to characteristics of the channel as well as location of the
mobile subscribers.
Fairness: Refers to optimizing the channel capacity by giving preference to spectrally
efficient modulations while still allowing transmissions with more robust modulations
(and hence, consuming a major amount of spectrum) to get their traffic through.
QoS: Particularly for WiMAX, QoS support should be built into the scheduling
algorithm to guarantee that QoS commitments are meet under normal conditions as
well as under network degradation scenarios.
Data throughput and channel utilization: Refers to optimizing the channel utilization
while at the same time avoiding waste of bandwidth by transmitting over high loss
links.
Power constrain and simplicity: Be considerate of the terminals’ battery capacity as well
as computational limitations both at the BS and MS.
3.4 Classification scheduling algorithms
Packet scheduling algorithms are implemented at both the BS and SSs. A scheduling
algorithm at the SS is required to distribute the bandwidth allocation from the BS among its
connections.
The scheduling algorithm at the SS needs to decide on the allocation of bandwidth among
its connections. The scheduling algorithm implemented at the SS can be different than that
at the BS.
The focus of our work is on scheduling algorithms executed at the BS for the uplink traffic in
WiMAX i.e. traffic from the SSs to the BS. A scheduling algorithm for the uplink traffic is
faced with challenges not faced by an algorithm for the downlink traffic. An uplink
scheduling algorithm does not have all the information about the SSs such as the queue size.
An uplink algorithm at the BS has to coordinate its decision with all the SSs where as a
downlink algorithm is only concerned in communicating the decision locally to the BS.
In general, the scheduling algorithms can be classified as frame-based scheduling and
sorted-based scheduling. Frame-based scheduling algorithms include WRR (Weighted
Round Robin)[7], DRR (Deficit Round Robin)[8], etc. Sorted-based scheduling algorithms
include WFQ (Weighted Fair Queue)[9], also known as PGPS (Packet-based Generalized
Processor Sharing)[10], and a number of variations of WFQ such as WF2Q (Worst Case Fair
Queuing)[11], SCFQ (Self-Clock Faire Queuing)[12].
The advantage of frame-based scheduling algorithms is their low computing complexity,
while the disadvantage is the significant worst case delay. On the contrary, scheduling
www.intechopen.com
94
Quality of Service and Resource Allocation in WiMAX
algorithm in the WFQ family has better performance in worst case delay, but the algorithm
complexity is much higher than that of the frame-based scheduling algorithms.
3.5 Uplink scheduling algorithms
In the coming subsections the fundamental scheduling algorithms will be briefly described
3.5.1 Round Robin
Round Robin as a scheduling algorithm is the most basic and least complex scheduling
algorithm. It has a complexity value of O (1) [13].
Basically the algorithm services the backlogged queues in a round robin fashion. Each time
the scheduler pointer stop at a particular queue, one packet is dequeued from that queue
and then the scheduler pointer goes to the next queue. This is shown in Figure 6.
Fig. 6. RR Scheduler
It distributes channel resources to all the SSs without any priority. The RR scheduler is
simple and easy to implement. However, this technique is not suitable for systems with
different levels of priority and systems with strongly varying sizes of traffic.
3.5.2 Weighted Round Robin
An extension of the RR scheduler, the WRR scheduler, based on static weights.WRR [14]
was designed to differentiate flows or queues to enable various service rates. It operates on
the same bases of RR scheduling. However, unlike RR, WRR assigns a weight to each queue.
The weight of an individual queue is equal to the relative share of the available system
bandwidth. This means that, the number of packets dequeued from a queue varies
according to the weight assigned to that queue. Consequently, this differentiation enables
prioritization among the queues, and thus the SSes. [15]
www.intechopen.com
Scheduling Algorithm and Bandwidth Allocation in WiMAX
95
3.5.3 Earliest deadline first
It is a work conserving algorithm originally proposed for real-time applications in wide area
networks. The algorithm assigns deadline to each packet and allocates bandwidth to the SS
that has the packet with the earliest deadline. Deadlines can be assigned to packets of a SS
based on the SS’s maximum delay requirement. The EDF algorithm is suitable for SSs
belonging to the UGS and rtVR scheduling services, since SSs in this class have stringent
delay requirements. Since SSs belonging to the nrtVR service do not have a delay
requirement, the EDF algorithm will schedule packets from these SSs only if there are no
packets from SSs of UGS or rtVR class. [16]
3.5.4 Weighted fair queue
It is a packet-based approximation of the Generalized Processor Sharing (GPS) algorithm.
GPS is an idealized algorithm that assumes a packet can be divided into bits and each bit
can be scheduled separately. The WFQ algorithm results in superior performance compared
to the WRR algorithm in the presence of variable size packets. The finish time of a packet is
essentially the time the packet would have finished service under the GPS algorithm. The
disadvantage of the WFQ algorithm is that it will service packets even if they wouldn’t have
started service under the GPS algorithm. This is because the WFQ algorithm does not
consider the start time of a packet.
3.5.5 Temporary removed packet
The TRS (Temporary Removal Scheduler) involves identifying the packet call power,
depending on radio conditions, and then temporarily removing them from a scheduling list
for a certain adjustable time period TR. The scheduling list contains all the SSs that can be
served at the next frame. When TR expires, the temporarily removed packet is checked
again. If an improvement is observed in the radio channel, the packet can be topped up in
the scheduling list again, otherwise the process is repeated for TR duration. In poor radio
conditions, the whole process can be repeated up to L times at the end of which, the
removed packed is added to the scheduling list, independently of the current radio channel
condition [18].
The temporary TRS can be combined with the RR scheduler.
The combined scheduler is called TRS+RR. For example, if there are k packet calls and only
one of them is temporary removed, each packet call has a portion, equal to
1
, of the
k 1
whole channel resources.
3.5.6 Maximum Signal to Interference Ration
The scheduler mSIR (Maximum Signal to Interference Ration) is based on the allocation of
radio resources to subscriber stations which have the highest SIR. This scheduler allows a
highly efficient utilization of radio resources. However, with the mSIR scheduler, the users
with a SIR (Signal to Interference Ratio) that is always small may never be served.[18]
www.intechopen.com
96
Quality of Service and Resource Allocation in WiMAX
The TRS can be combined with the mSIR scheduler. The combined scheduler is called TRS +
mSIR. This scheduler assigns the whole channel resources to the packet call that has the
maximum value of the SNR (Signal to Noise Ratio). The station to be served has to belong to
the scheduling list.
3.5.7 Reinforcement Learning
The scheduler RL (Reinforcement Learning) is based on the model of packet scheduling
described by Hall and Mars [23]. The aim is to use different scheduling policies depending
on which queues are not meeting their delay requirements. The state of the system
represented by a set of N -1 binary variables {s1: sn-1}, where each variable si indicates
whether traffic in the corresponding queue qi [24].
There is not variable corresponding to the best-effort queue qN, since there is no mean delay
requirement for that queue. For example, the state {0; 0; : : : ; 0} represents that all queues
have satisfied their mean delay constraint, while (1; 0; : : : ; 0} represents that the mean delay
requirements are being satisfied for all queues except q1. Thus, if there are N queues in the
system including one best-effort queue, then there are 2N-1 possible states. In practice, the
number of traffic classes is normally small, e.g., four classes in Cisco routers with priority
queuing, in which case the number of states is acceptable.
At each timeslot, the scheduler must select an action a є {a1: aN}, where ai is the action of
choosing to service the packet at the head of queue qi . The scheduler makes this selection by
using a scheduling policy Π, which is a function that maps the current state of the system s
onto an action a. If the set of possible actions is denoted by A, and the set of possible system
states is denoted by S, then Π: S→A.
3.5.8 Hierarchical/hybrid algorithms
Hierarchical/hybrid algorithms build on the fact that scheduling services have different and
sometimes conflicting requirements. UGS services must always have their delay and
bandwidth commitment met, so simply reserving enough bandwidth for those services and
controlling for oversubscription would be enough; rtVR services have little tolerance for
delay and jitter, so an algorithm guaranteeing delay commitments would be more suitable;
and finally, BE and nrtVR will always be hungry for bandwidth with no considerations for
delay, so a throughput maximizing algorithm might be preferred.
While hierarchical refers to two or more levels of decisions to determine what packets to be
scheduled, hybrid refers to the combination of several scheduling techniques (EDF for delay
sensitive scheduling services such as rtVR and UGS, and WRR for nrtVR and BE for
example). There could be hierarchical solutions that are not necessarily hybrid, but hybrid
algorithms usually distribute the resources among different service classes, and then
different scheduling techniques are used to schedule packets within each scheduling service,
making them hierarchical in nature.
A two-tier hierarchical architecture is proposed in [24] for WiMAX uplink scheduling. In the
higher hierarchy, strict prioritization is used to direct the traffic into the four queues,
according to its type. Then, each queue is scheduled according to a particular algorithm, i.e.,
www.intechopen.com
97
Scheduling Algorithm and Bandwidth Allocation in WiMAX
fixed allocation for UGS, EDF for rtVR, WFQ for nrtVR, and equal division of remaining
bandwidth for BE. Although EDF takes care of the delay requirement of the rtVR, grouping
multiple rtVR connections into one queue fails to guarantee the minimum bandwidth
requirement of each individual rtVR connection. For example, one rtVR connection with
tight delay budget may dominate the bandwidth allocation, resulting in starvation of other
rtVR connections.
In [27], the authors use a first level of strict priority to allocate bandwidth to UGS, rtVR,
nrtVR and BE services in that order; and then on a second level in the hierarchy, different
scheduling techniques are used depending on the scheduling service: UGS, as the highest
priority, has pre-allocated bandwidth, EDF is used for rtVR, WFQ for nrtVR, and FIFO for
BE. Similarly, explains an algorithm that uses EDF for nrtVR and rtVR classes, and WFQ for
nrtVR and BE classes.
In [27], the authors implement a two-level hierarchical scheme for the downlink in which an
ARA (Aggregate Resource Allocation) component first estimates the amount of bandwidth
required per scheduler class (rtVR, nrtVR, BE and UGS) and distributes it accordingly.
In [28], a SC (Service Criticality) based scheduling is proposed for the WiMAX network,
where an SC index is calculated in every SS for each connection and then sent to BS, and BS
sorts the SC of all the connections and assigns bandwidth according to the descending order
of SC. SC is derived according to the buffer occupancy and waiting time of each connection.
If a malicious connection always reports a high SC, or a connection is generating excessive
traffic to occupy its sending buffer, this connection will dominate the available bandwidth
and affect other connections.
4. Evaluation
This section presents the simulation results for the algorithms scheduling. For testing
performance of algorithms, the introduced algorithms are implemented in the NS-2
(Network Simulator) [20] and WiMAX module [21] that is based on the WiMAX NIST
module [20].The MAC implementation contains the main features of the 802.16 standard,
such as downlink and uplink transmission. We have also implemented the most important
MAC signalling messages, such as UL-MAP and DL-MAP, authentication (PKM),
capabilities (SBC), REG (Registration), DSA (Dynamic Service Addition), and DSC (Dynamic
Service Change). The implemented PHY is OFDM.
Lot size(byte)
108
96
36
24
Channel coding
3/4
2/3
3/4
1/2
modulation
64-QAM
64-QAM
QPSK
QPSK
Table 1. Slot size for OFDM PHY
The current implementation also supports differencing MCSs (Moulding Code Scheme).
Table 1 shows present slot size for different modulations and channel coding types.
www.intechopen.com
98
Quality of Service and Resource Allocation in WiMAX
We present a simulation scenario to study thoroughly the proposed scheduling solution.
The scenario will present a multi-service case, in which a provider has to support
connections with different 802.16 classes and traffic characteristics.
The purpose of this scenario is to ensure that the scheduler at the BS takes the service class
into account and allocates slots based on the QoS requirements and the request sizes sent by
SSs. Another purpose is to test that the scheduler at the BS takes the MAC overhead into
account. Table 1 presents information about which applications are active at scenario.
Regardless of the simulation scenario, the general parameters of the 802.16 network are the
same (see Table 2). There is one BS that controls the traffic of the 802.16 network. The
physical layer is OFDM. The BS uses the dynamic uplink/downlink slot assignment for the
TDD mode. Both the BS and all SSs use packing and fragmentation in all simulation
scenarios. The MAC level uses the largest possible PDU size. ARQ is turned off; neither the
BS nor SSs use the CRC field while sending packets.
Value
OFDM
7MHz
400
TDD
OFF
Parameter
PHY
Bandwidth
Frame per Second
Duplexing mode
ARQ/CRC
Table 2. WiMAX parameter
We consider a general scenario, where n rtVR and/or nrtVR connections are established.
Connection i has an arrival rate of ¸i, a delay budget of i, and a minimum reserved
bandwidth of MRRi. For the sake of analytic tractability, we assume that the data arrival
forms a Poisson process and all queues have infinite size. Other types of traffic (such as the
more practical bursty traffic) are studied through simulations.
The main parameters of the simulation are represented in Table 3. Effects of these
parameters are similar over results of all scheduling algorithms. Moreover, producers of this
WiMAX module have used these values for testing performance of their simulator.
Parameter
Frequency band
Propagation model
Value
5 MHz
Two Ray Ground
Antenna model
Antenna height
Transmit power
Receive power threshold
Frame duration
Cyclic prefix (CP)
Simulation duration
Omni antenna
1.5 m
0.25
205e-12
20 ms
0.25
100 s
Table 3. Main parameters of the simulation
www.intechopen.com
99
Scheduling Algorithm and Bandwidth Allocation in WiMAX
In particular, we consider several comparable scheduling algorithms, including WRR, EDF,
and TRS which is a representative WiMAX scheduling algorithm and has been patented and
well received).
Besides packet drop rate and throughput that have been studied in analysis, we are also
interested in the fairness performance, which is measured by Jain’s Fairness Index [22]
defined as follows:
( x i )2
n
f ( x1 , x2 ,...xn )
i 1
n
n xi
i 1
(1)
2
Where xi is the normalized throughput of connection i, and n is the total number of
connections. Each SS establishes a number of connections to the BS in our simulation. We
consider ten rtVR connections and ten nrtVR connections. Each type of connection is
associated with an MRR and a delay budget.
Xi
THi
MRi
(2)
ie, with Thi and MRRi stand for the connection i’s actual data rate and reserved data rate,
respectively. The Jain’s Fairness Index ranges between 0 and 1. The higher the index, the
better the fairness. If Thi = MRRi for all i, or in other words, every connection obtains its
reserved data rate, then xi = 1 for all i, and Jain’s Fairness Index equals 1. All simulations
and analytic calculations are done using NS2 simulator.
UGS
1
Latency
0.8
0.6
0.4
0.2
0
1
2
3
Traffic load
4
5
Fig. 7. Latency versus traffic
Figures 7, 8 show delay packets as a function of the traffic load submitted to the network.
The data packets are generated by a streaming multimedia application. The diagram of UGS
scheduling algorithm by considering delay is linear where its throughput is increasing. As
mentioned above, the UGS traffic request is the highest priority. If a packet is available in
this type of traffic it will be sent in no time. For accurate performance evaluation, we adopt
the WiMAX physical layer standard OFDM_BPSK_1_2 in our simulations. [24]
www.intechopen.com
100
Quality of Service and Resource Allocation in WiMAX
UGS
3500
3000
Throughput
2500
2000
1500
1000
500
0
300
800
1400
1900
2400
2900
3400
Traffic Load
Fig. 8. Throughput versus traffic
The fairness of the scheduling algorithms under bursty traffic is shown in figure 9. As we
can see, WRR always maintains almost high fairness, while the fairness of EDF algorithm is
the worst among the four algorithms. This is due to the fact that some real time packets rtVR
connections are dropped under high burstiness, and thus the throughput of rtVR decreases.
[30], [31]
rtVR
1.02
1
0.98
0.96
Fairness
0.94
EDF
0.92
WRR
0.9
TRS+mSIR
0.88
10
30
50
Simulation Time
Fig. 9. Fairness versus Simulation Time
www.intechopen.com
70
90
Scheduling Algorithm and Bandwidth Allocation in WiMAX
101
Figure 10 shows the latency as a function of rtVR+nrtVR traffic load. We verify that the TRS
scheduler provides a decrease in the latency.
Fig. 10. Latency versus Simulation Time
Figure 11 shows the latency as a function of rtVR traffic load. We verify that the mSIR
scheduler provides a decrease in the latency.
Fig. 11. Latency versus Simulation Time
In figure 12, the protocols have been compared on the base of throughput. As you see,
TRS+RR throughput is greater than all.
www.intechopen.com
102
Quality of Service and Resource Allocation in WiMAX
NIST_TRS TRS
0.31
Throughput
RR
0.6
0.7
0.8
0.7
0.6
0.5
0.4
10
0.3
EDF
WRR
LTRS
0.2
0.1
30
1
0.998
0.998
0.998
0.99
0.99
0
NIST_TRS
TRS
RR
RR+mSIR
Fig. 12. Throughput
5. References
[1] IEEE Standard for Local and Metropolitan Area Networks—Part 16: Air Interface for
Fixed Broadband Wireless Access Systems, 2004, IEEE802.16. Available from :
http://www.ieeefor 802.org/16/.
[2] IEEE Standard for Local and Metropolitan Area Networks—Part 16: Air Interface for
Fixed Broadband Wireless Access Systems—Amendment 2: Physical and Medium
Access Control Layers for Combined Fixed and Mobile Operation in Licensed
Bands, 2005, IEEE802.16e.. Available from: http://www.ieee802.org/16/.
[3] Aura Ganz, Zvi Ganz, Kitti Wongthavarawat(18 September 2003). Multimedia Wireless
Networks: Technologies, Standards, and QoS, Prentice Hall Publisher.
[4] Overcoming Barriers to High-Quality Voice over IP Deployments (2003), Intel
Whitepaper.
[5] DiffServ-The Scalable End-to-End Quality of Service Model (August 2005), Cisco
Whitepaper.
[6] WiMAX – Delivering on the Promise of Wireless Broadband (Second Quarter 2006), Xcell
Journal - Issue 57.
[7] M. Katavenis, S. Sidiropoulos, and C. Courcoubetis. Weighted Round-Robin Cell
Multiplexing in A General-Purpose ATM Switch Chip, IEEE J. Sel. Areas Commun.,
vol. 9, no. 8, pp. 1265–1279, Jan. 1991.
[8] M. Shreedhar and G. Varghese (1995), Efficient Fair Queueing Using Deficit Round Robin, in
Proc. IEEE SIGCOMM, pp. 231–242. 135.
[9] A. Demeres, S. Keshav, and S. Shenker(1989). Analysis and Simulation of A Fair Queueing
Algorithm, in Proc. IEEE SIGCOMM, pp. 1–12.
www.intechopen.com
Scheduling Algorithm and Bandwidth Allocation in WiMAX
103
[10] A. Parekh and R. Gallager(1992). A Qeneralized Processor Sharing Approach to Flow
Control: The Single Node Case, in Proc. IEEE INFOCOM , pp. 915–924.
[11] J. Bennet and H. Zhang(1996). WF2Q: Worst-Case Fair Weighted Fair Queueing, Procceding
of IEEE INFOCOM, 1996, pp. 120–128.
[12] S. Golestani (1994). A Self-Clocked Fair Queueing Scheme for Broadband Applications,
Procceding of IEEE INFOCOM, pp. 636–646.
[13] R. Jain, lecture notes ( 2007), A Survey of Scheduling Methods, University of Ohio.
[14] M. Katevenis, S. Sidiropoulos and C. Courcoubetis(1991). Weighted round robin cell
multiplexing in a general purpose ATM switch chip, Selected Areas in
Communications, IEEE Journal on 9(8), pp. 1265_1279.
[15] S. Belenki (2000). Traffic management in QoS networks: Overview and suggested
improvements, Tech. Rep.
[16] M.Shreedhar and G.Varghese(June 1996). Efficient Fair Queuing using Deficit Round R
bin, IEEE/ACM Transactions on Networking, vol. 1, pp. 375‐385.
[17] T. Al_Khasib, H. Alnuweiri, H. Fattah and V. C. M. Leung(2005). Mini round robin:
enhanced frame_based scheduling algorithm for multimedia networks, IEEE
Cmmunications, IEEE International Conference on ICC, pp. 363_368 Vol. 1.
[18] Nortel Networks,Introduction to quality of service (QoS)(September 2008), Nortel
NetworksWebsite, 2003. [Online]. Accessed on 1st of September 2008.
[19] C.F. Ball, F. Treml, X. Gaube, and A. Klein(September 2005). Performance Analysis of
Temporary Removal Scheduling applied to mobile WiMAX Scenarios in Tight
Frequency Reuse, the 16th Annual IEEE International Symposium On Personal
Indoor and Mobile Radio Communications, PIMRC 2005, Berlin, 11 – 14.
[20] QoS-included WiMAX Module for NS-2 Simulator. First International Conference on
Simulation Tools and Techniques for Communications Networks and Systems,
SIMUTools 2008, Marseille,France, March 3-7,2008.
[21] The network simulator ns-2(September 2007). Available from :
http://www.isi.edu/nsnam/ns/.
[22] D. M. C. R. Jain andW. Hawe(1984). A Quantitative Measure of Fairness and
Discriminationfor Resource Allocation in Shared Systems, dEC Research Report,
TR-301.
[23] J. Hall , P. Mars(December 1998). Satisfying QoS with a Learning Based Scheduling
Algorithm, School of Engineering, University of Durham,.
[24] M.Taghipoor,G Tavassoli and V.Hosseini(April 2010). Gurantee QoS in WiMAX
Networks with learning automata, ITNG 2010 Las Vegas, Nevada, USA. 12-14
[25] Ajay Chandra V. Gummalla, John o. Limb.Wireless Medium Access Control Protocols,
IEEE Communications Surveys, 2000.
[26] Q. Liu, X. Wang, and G. Giannakis(May 2006). A Cross-Layer Scheduling Algorithm
with QoS Support in Wireless Networks, IEEE Trans. Veh. Tech., vol. 55, no. 3, pp.
839–847.
[27] D. Niyato and E. Hossain ( Dec. 2006). Queue-aware Uplink Banwidth Allocation and
Rate Control for Polling Service in IEEE 802.16 Broadband Wireless Networks,
IEEE Trans. Mobile Comp., vol. 5, no. 8, pp. 668–679.
[28] A. Shejwal and A. Parhar(2007). Service Criticality Based Scheduling for IEEE 802.16
WirelessMAN, in Proc. 2nd IEEE Int. Conf. AusWreless, , pp. 12–18.
www.intechopen.com
104
Quality of Service and Resource Allocation in WiMAX
[29] H. Chen, thesis (spring 2008). Scheduling and Resource Optimization in Next
Generation Hetergeneous Wireless Networks, University of Luoisiana.
[30] Jafari, Saeid. M., Taghipour, M. and Meybodi, M. R.(2011). Bandwidth Allocation in
Wimax Networks Using Reinforcement Learning, World Applied Sciences Journal
Vol. 15, No. 4, pp. 525-531.
[31] Jafari, Saeid. M., Taghipour, M. and Meybodi, M. R. (2011).Bandwidth Allocation in
Wimax Networks Using Learning Automata, World Applied Sciences Journal Vol.
15, No. 4, pp. 576-583.
www.intechopen.com
Quality of Service and Resource Allocation in WiMAX
Edited by Dr. Roberto Hincapie
ISBN 978-953-307-956-1
Hard cover, 376 pages
Publisher InTech
Published online 03, February, 2012
Published in print edition February, 2012
This book has been prepared to present state of the art on WiMAX Technology. It has been constructed with
the support of many researchers around the world, working on resource allocation, quality of service and
WiMAX applications. Such many different works on WiMAX, show the great worldwide importance of WiMAX as
a wireless broadband access technology. This book is intended for readers interested in resource allocation
and quality of service in wireless environments, which is known to be a complex problem. All chapters include
both theoretical and technical information, which provides an in depth review of the most recent advances in
the field for engineers and researchers, and other readers interested in WiMAX.
How to reference
In order to correctly reference this scholarly work, feel free to copy and paste the following:
Majid Taghipoor, Saeid MJafari and Vahid Hosseini (2012). Scheduling Algorithm and Bandwidth Allocation in
WiMAX, Quality of Service and Resource Allocation in WiMAX, Dr. Roberto Hincapie (Ed.), ISBN: 978-953-307956-1, InTech, Available from: http://www.intechopen.com/books/quality-of-service-and-resource-allocation-inwimax/scheduling-algorithm-and-bandwidth-allocation-in-wimax
InTech Europe
University Campus STeP Ri
Slavka Krautzeka 83/A
51000 Rijeka, Croatia
Phone: +385 (51) 770 447
Fax: +385 (51) 686 166
www.intechopen.com
InTech China
Unit 405, Office Block, Hotel Equatorial Shanghai
No.65, Yan An Road (West), Shanghai, 200040, China
Phone: +86-21-62489820
Fax: +86-21-62489821