Добавил:
Опубликованный материал нарушает ваши авторские права? Сообщите нам.
Вуз: Предмет: Файл:

Advanced Wireless Networks - 4G Technologies

.pdf
Скачиваний:
47
Добавлен:
17.08.2013
Размер:
21.94 Mб
Скачать

818 QUALITY-OF-SERVICE MANAGEMENT

 

Watermarked

 

 

data

 

 

 

 

Watermark

Watermark

 

Key

 

embedding

 

 

 

procedure

 

 

 

 

 

 

Data

Figure 21.1 Watermark embedding process.

 

 

Channel

 

 

Coder

Decoder

 

PN

 

 

 

generator

 

 

 

Mod-2 adder

Watermark

Matched

 

embedding

filter

Watermark

 

Tracing

 

 

extraction

watermarking

 

 

PN

 

 

 

generator

 

Video sequence

 

 

 

 

QoS

 

 

 

assessment

 

Figure 21.2 Principle scheme of tracing watermarking for coder-channel quality assessment in multimedia communications.

data onto a channel, the mark undergoes the same alterations as suffered by the data. At the receiving side, the watermark is estimated and compared with the original. Since the alterations endured by the watermark are also likely to be suffered by the entire data, as they follow the same communication link, the watermark degradation can be used to estimate the overall alterations endured by the data.

The tracing watermarking procedure for coder-channel quality assessment is given in Figure 21.2. The watermark embedding is performed by resorting to the spread-spectrum technique proposed in Cox et al. [17] for still images and applied to video sequences in Hartung and Girod [18]. The watermark is a narrowband low-energy signal. It is then spread so that it has a larger bandwidth. Consequently, the watermark energy contribution for each host frequency bin is negligible, which makes the watermark imperceptible.

In the application addressed here, a system embedded into the data stream that is able to trace the degradations introduced by the transmission system composed by the coderchannel cascade and not perceptually affecting the data themselves is described.

BLIND QoS ASSESSMENT SYSTEM

819

A set of uncorrelated pseudorandom noise (PN) matrices is multiplied by the reference watermark. Both the PN matrices and the embedded watermark are known at the receiving side. The watermark is the same for each video sequence frame, whereas the PN matrices are different for each frame. This insures that the spatial localization of the mark is different frame-by-frame so that the watermark visual persistency is negligible.

After the randomization of the watermark by the PN matrices, the embedding of the tracing marks is performed in the DCT domain. The watermark is embedded in the DCT middle-band frequencies of the whole image. After the inverse DCT (IDCT) has been performed on each frame, the whole sequence is coded by a video coder and, finally, transmitted.

At the receiving side, the video is first decoded; then, from the DCT of each received frame of the sequence, a matched filter extracts the spread watermark, which is finally despread using the known PN matrices. After having extracted the received watermark, it is matched to the reference one, which is known at the receiving side, and the mean-square error (MSE), between the original mark and the received one, is used as an index of the degradation affecting the received watermark.

21.1.1 System modeling

A two-dimensional video sequence will be represented as { fi [n1, n2], i = 1, 2, . . . M}. The sequence is composed of M frames fi [n1, n2] of N1 × N2 pixels. Let ω[k1, k2] be the employed watermark, having dimensions K1 × K2 and { pi [k1, k2], i = 1, 2, . . . M} the M PN matrices of dimensions K1 × K2. The watermark ω[k1, k2] is a visual pattern, like a logo, consisting of binary pixels.

The PN matrices { pi [k1, k2], i = 1, 2, . . . M} are employed to spread a narrowband signal (watermark) over a much larger bandwidth signal (host frame) in such a way that

the watermark energy is undetectable in any single frequency of the host image. This can be expressed as follows: ωi(s)[k1, k2] = ω[k1, k2] · pi [k1, k2], i = 1, 2, . . . , M, where

ωi(s)[k1, k2] is the spread version of the watermark to be embedded in the ith frame. Let Fi [k1, k2] = DCT{ fi [n1, n2]} be the DCT transform of the ith frame fi [n1, n2]. The spread watermark is embedded, in the DCT domain, in the middle-high frequency region S of

Fi [k1, k2].

The embedding is performed in the DCT domain according to the following rule:

F(ω)

[k1, k2]

=

F[k1, k2] + αωi(s)[k1, k2],

(k1, k2) S

(21.1)

i

 

F[k1, k2],

(k1

, k2) / S

 

 

 

 

 

 

 

 

where Fi(ω)[k1, k2] represents the DCT of the ith watermarked frame fi [n1, n2], and α is a scaling factor that determines the watermark strength. Parameter α must be chosen in such a way as to compromise between not degrading the picture on one side and being detectable by the tracing algorithm on another.

The ith watermarked frame is then obtained by performing the IDCT transform

fi(ω)[n1, n2] = IDCT {Fi(ω)[k1, k2(]ω}). Finally, the whole sequence is coded and then transmit-

ted through a noisy channel. If

 

ˆ

 

 

1, 2, . . .

M} is the

received video sequence

{

f

 

 

 

 

i

[n1, n2], i =(ω)

 

ˆ

(ω)

 

 

 

 

 

ˆ

 

 

 

 

[n1, n2]}.

then the DCT transform in the receiver gives Fi

 

[k1, k2] = DCT{ fi

820 QUALITY-OF-SERVICE MANAGEMENT

The middle–high frequency region of embedding S is selected. Then, the corresponding

ˆ (ω)

[k1, k2] is multiplied by the watermark ω[k1, k2], which is known at the

portion of Fi

receiving side, giving an estimation ωˆ (s)

[k1, k2] of the spread version of the watermark em-

 

 

(s)

 

 

 

 

 

i

ˆ (ω)

 

 

 

 

 

 

 

 

bedded in the ith frame, ωˆ

[k

 

, k

 

]

 

[k1

, k2

]

 

ω[k1, k2]. The dispreading operation,

 

1

2

=

F

 

·

 

 

i

 

 

 

i

 

 

(s)

 

 

 

 

for the generic ith frame gives ωˆ i [k1, k2] =

ωˆ i

 

[k1, k2] · pi [k1, k2]. Finally, the watermark

is estimated by averaging the dispread watermark over the M transmitted frames

 

 

 

 

 

 

 

 

 

 

 

1

 

M

 

 

 

 

 

 

 

ωˆ [k1, k2] =

 

 

 

ωˆ i [k1, k2]

(21.2)

 

 

 

 

 

 

 

 

M i=1

The QoS is evaluated by comparing the extracted watermark with the original one. Formally this can be represented as

 

1

 

K1

K2

(ωi [k1, k2] ωˆ i [k1, k2])2

 

MSEi =

 

 

 

 

(21.3)

 

 

 

 

K1 K2

K1=1 k2=1

 

 

 

 

 

 

and

 

 

 

 

 

 

 

 

 

 

 

 

1

M

 

 

 

 

MSE =

 

MSE i

(21.4)

 

 

 

 

 

 

 

 

M i=1

In experiments presented in References [26, 28], the dimensions of the video sequences employed have been properly chosen in order to simulate a multimedia service in a UMTS scenario. Therefore, QCIF (144 × 176) video sequences, which well match the limited dimensions of a mobile terminal’s display, have been employed. Sample results are shown in Figures 21.3 and 21.4. As shown in the figures, the quality degradation of the watermark embedded into the host video has the same behavior as the one affecting the video.

MSE

0.8

0.6

0.4

0.2

 

Watermark

 

 

Sequence

0.0

1× 104

1× 103

1× 105

BER

Figure 21.3 Watermark MSE and video sequence MSE (normalized to 1) vs the BER for the sequence ‘Akiyo’ MPEG-2 coded at 600 kb/s.

QoS PROVISIONING IN WLAN

821

MSE

0.8

0.6

0.4

0.2

 

Watermark

 

 

Sequence

0.0

1 × 104

1 × 103

1 × 105

BER

Figure 21.4 Watermark MSE and video sequence MSE (normalized to 1) vs the BER for the sequence ‘Akiyo’ MPEG-2 coded at 200 kb/s.

21.2 QoS PROVISIONING IN WLAN

As an example system, the 802.11 WLAN consists of basic service sets (BSS), each of which is composed of wireless stations (STA). The WLAN can be configured as an ad hoc network (an independent BSS) or an infrastructure network (composed of an access point and the associated STAs).

The channel access for the STAs in a BSS is under the control of a coordination function. The 802.11 MAC protocol provides two coordination functions: distributed coordination function (DCF) and point coordination function (PCF). The DFC is a contention-based access scheme using carrier sense multiple access with collision avoidance (CSMA/CA).

Priority levels for access to the channel are provided through the use of interframe spaces such as short interframe space (SIFS) and distributed interframe space (DIFS). The backoff procedure is used for collision avoidance, where each STA waits for a backoff time (a random time interval in units of slot times) before each frame transmission. The PCF provides contention-free frame transmission in an infrastructure network using the point coordinator (PC), operating at the access point (AP), to determine which STA currently gets the channel access. The DCF and the PCF can coexist by alternating the contention period (CP), during which the DCF is performed, and the contention-free period (CFP), during which the PCF is performed. A CFP and a CP are together referred to as a repetition interval or a superframe. Different aspects of 802.11 WLAN are discussed in References [29–40]. The performance analysis of the DCF was studied in References [29, 30, 35]. The performance of DCF degrades in high traffic loads due to serious collisions. The CSMA/CA is not suitable for data traffic at higher channel speeds [29] due to the large waste on the backoff time. The influence of various sizes of the backoff time on the channel throughput and the optimal setting of the backoff time was studied in Cali et al. [31]. A common technique is to adjust the backoff time according to the traffic priority. The PCF based on a polling scheme is suitable for time-bounded real-time traffic. The simple polling schedules for voice traffic and video traffic are presented in Crow et al. [35]. Some complex polling schedules are proposed in References [32–34, 36, 39].

822 QUALITY-OF-SERVICE MANAGEMENT

To expand support for applications with QoS requirements, the IEEE 802.11E task group [37] is proceeding to build the QoS enhancements of the 802.11 MAC. The techniques for providing prioritized and parameterized QoS data deliveries have been discussed in the task group. An enhanced DCF was proposed, where each traffic flow is assigned with a different backoff time whose value decreases with increasing traffic priority, to achieve the prioritized QoS data delivery. To guarantee the bounded delay requirements in the parameterized QoS data delivery, the hybrid coordination function (HCF) was proposed [42]. In the HCF, an STA can be guaranteed to issue the frame transmission even during the CP using the contention-free burst (CFB). The CFB can be considered a temporary CFP during which the transmissions of STAs are coordinated by the polling scheme as the PCF. Moreover, a multipolling mechanism (called contention-free multipoll, CF-multipoll) was proposed [41] to reduce the polling overhead that the traditional PCF suffers from. In the multipoll, the PC can poll more than one STA simultaneously using a single polling frame.

In this section, we consider how to efficiently serve real-time traffic in the IEEE 802.11 WLAN by using the multipolling mechanism. The multipolling mechanism can increase the channel utilization and is robust in mobile and error-prone environments. The mechanism can be used in the PCF and the HCF. Moreover, a polling schedule is provided to guarantee the bounded delay requirements of real-time flows.

21.2.1 Contention-based multipolling

In the PCF or the HCF, each STA in the polling list takes a polling frame when polled. This polling scheme is called SinglePoll. The number of polling frames for a polling list can be reduced if a multipolling mechanism is used. Here, we discuss an efficient multipolling mechanism that has the advantages of high channel utilization and low implementation overhead. This multipolling mechanism, referred to as contention period multipoll (CPMultipoll), incorporates the DCF access scheme into the polling scheme.

In the DCF, any contending STA for the channel will select a backoff time in units of slot times and execute the backoff procedure as follows: if the channel is sensed idle for a DIFS period, an STA starts the transmission immediately. Otherwise, an STA should defer until the channel becomes idle for a DIFS period and then the backoff time is decreased. If the channel is idle for a slot time, an STA decreases the backoff time by one or else freezes the backoff time. When the backoff time becomes zero, an STA begins the frame transmission. If a collision occurs, the STA duplicates the backoff time used in the last transmission and executes the backoff procedure again. In the DCF, the virtual carrier sensing using the Network Allocation Vector (NAV) is performed at the MAC sublayer. The information on the duration of a frame exchange sequence for one STA is included in the frame header (duration field) and is announced to other STAs. Other contending STAs will wait for the completion of the current frame exchange by updating their NAVs according to the announced duration information. For a communication the RTS (request to send) and CTS (clear to send) frames are exchanged before the data frame transmission. Other STAs defer their channel access by setting their NAVs according to the duration field in the RTS, the RTS, or the data frame. The exchange of RTS/CTS frames can also avoid the hidden terminal problem [35].

The basic idea of CP-Multipoll is to transform the polling order into the contending order which indicates the order of winning the channel contention. Different backoff

QoS PROVISIONING IN WLAN

823

time values are assigned to the flows in the polling group and the corresponding STAs execute the backoff procedures after receiving the CP-Multipoll frame. The contending order of these STAs is the same as the ascending order of the assigned backoff time values. Therefore, to maintain the polling order in a polling group, we can assign the backoff time value incrementally according to the expected polling order.

The CP-Multipoll has the following advantages: a polled STA can hold the channel access flexibly depending on the size of local buffered data, so it becomes easy to deal with the data burst; if a polled STA makes no response to the CP-Multipoll, other STAs in the same polling group will detect the channel idle right away and advance the starting of channel contention. Therefore, the CP-Multipoll can decrease the waste of channel space and can afford any polling error.

21.2.2 Polling efficiency

We consider the environment with overlapping BSSs. In the overlapping BSS, we distinguish the STAs associated with one BSS from the STAs associated with neighboring BSSs by using the terms ‘internal STAs’ and ‘external STAs’, respectively. Moreover, a STA that will cause an internal collision is called a nonbehaved STA; otherwise, the STA is called a behaved one.

The following terminology is used in the performance analysis:

frame num, maximum number of data frames allowed to be transmitted in a TXOP (transmission opportunity);

lt ype, number of bits in a ‘type’ frame;

ttype, transmission time on the channel for a ‘type’ frame;

single-poll, the single polling frame in the single poll (i.e. CF-Poll frame);

n, poll size (i.e. the number of poll records in a multipolling frame);

n-poll, the multipolling frame with n poll records;

ERRtype, probability that a ‘type’ frame is dropped due to bit errors;

α, probability that an STA has no data to send when polled;

β, probability that an STA becomes a nonbehaved STA;

h, number of PCs operating in the overlapping space;

InitBT, initial backoff time;

E, polling efficiency.

The following assumptions will be used in the analysis:

(1)The PC (point coordinator) always performs the initial backoff before sending any polling frame.

(2)The data frame is transmitted without any acknowledgment. When an STA is polled, the STA either sends a half of frame num data frames on average or sends a null data frame if there is no data to send.

824

QUALITY-OF-SERVICE MANAGEMENT

 

 

 

 

 

P

Pn, m-1

 

 

 

 

 

 

n, m

 

 

 

 

Multipolling

m:

m-1: ...

2:

1:

0:

 

frame

fail

fail

fail

fail

fail

 

 

 

 

Pn, 2

Pn, 1

Pn, 0

Figure 21.5 The state diagram of the multipolling mechanism. (Reproduced by permission of IEEE [43].)

(3)There is an equal probability BER for a bit error to occur due to the channel noise

(interference, fading or multipath). Hence, ERRtype can be expressed as 1 (1

BER)ltype .

(4)An STA becomes a nonbehaved one if the STA fails to receive the CTS frame from the PC. That is, β = ERRCTS.

If AvgD and AvgT denote the total number of bits in the data frames successfully sent from the polled STAs and the average complete time in time units for a poll, respectively, then the polling efficiency is defined as E = AvgD/AvgT. This represents the average uplink data rate during a poll.

In the single poll, a polled STA contributes data frames if the STA successfully receives a CF-Poll frame and has pending data frames to be successfully transmitted. The polled STA may suffer frame error due to interference from external STAs. Therefore,

AvgD = (1 α) · frame num/2 · ldataframe

(1 ERRdataframe) · (1 ERRsingle poll)

(21.5)

The polled STA will give a response to the PC after an SIFS period for a successful CF-Poll. If a polled STA does not respond to the PC after a PIFS period for a failed CF-Poll, the PC takes over the channel control and may send the next CF-Poll frame. In the HCF, the RTS/CTS frames should be exchanged before the data transmission to prevent the interference from other STAs. Since the HCF is being substituted for the PCF in the 802.11E, we consider the single poll of the HCF in our analysis. Therefore,

AvgT = InitBT + (tsingle-poll + PIFS) · ERRsingle-poll + [tsingle-poll + SIFS

+ tRTS + tCTS + 2SIFS + (1 α) frame num/2 · (tdata frame + SIFS) (21.6)

+α(tnull frame + SIFS)] · (1 ERRsingle-poll)

Next, we use a state diagram to represent the situation after sending a multipolling frame with poll size n. In Figure 21.5, the state m : fail(0 m n) represents the event that there are m STAs in the polling group which failed to receive the multipolling frame. Let Pn,m denote the probability of the state m : fail. Let Dn,m and Tn,m denote the amount of uplink data frames in bits and the total time duration in time units under the state m : fail, respectively. Generally, we have the following values:

Pn,m =

n

· (ERRnpoll)m · (1 ERRnpoll)nm

m

 

QoS PROVISIONING IN WLAN

825

AvgD =

n

 

Pn,m · Dn,m

(21.7)

 

m=0

 

 

n

 

AvgT = InitBT +

Pn,m · Tn,m

 

m=0

For the CF-Multipoll, the external STAs in the overlapping BSS will have their TXOPs overlap the ones allocated to the internal STAs. We assume that the interference from external STAs has been included in the parameter BER. Hence,

Dn,m = (n m) · (1 α) · frame num/2 · ldata frame · (1 ERRdata frame)

Also, each successive TXOP starts an SIFS period after the predecessor’s TXOP limit expires in the CF-Multipoll. Note that the time spent by a polled STA is fixed regardless of the number of pending data frames. Hence,

Tn,m = tnpoll + n · SIFS + n · frame num · (tdata frame + SIFS)

(21.8)

In the CP-Multipoll, there are two processing phases: one is for the normal multipoll and the other is for the error recovery. In the normal phase, there are (n m) STAs successfully receiving the multipolling frame under the state m : fail. Among these STAs, (1 β)(n m) STAs are behaved STAs and β(n m) STAs are nonbehaved ones. Each nonbehaved STA is assumed to destroy one data frame transmitted by a behaved one. In the recovery phase, m STAs failed to receive the multipolling frame and (n m) nonbehaved STAs will be served individually using the CP-Multipoll with poll size one. The analysis of this phase is similar to the one in the single poll. Hence, Dn,m has the following value:

Dn,m = Dnnormal,m + Dnrecovery,m

 

Dnnormal,m

= [(1 β) · (n m) · frame num/2 β(n m)]

 

Dnrecovery,m

(1 α) · ldata frame · (1 ERRdata frame)

(21.9)

= [m + β(n m)] · (1 α) · frame num/2

 

 

ldataframe · (1 ERRdata frame) · (1 ERR1poll)

 

The length of the time of the normal phase is dominated by the transmission time of those (1 β)(n m) behaved STAs. The total backoff time consumed in the normal phase is h × n + 1, regardless of the value m. Hence,

Tn,m = Tnnormal,m + Tnrecovery,m

 

Tnnormal,m = tnpoll + (h · n + 1) · Slot + (1 β) · (n m)

(21.10)

(tRTS + tCTS + 2 SIFS + (1 α) · frame num/2 · (tdata frame + SIFS)

 

+α · tnull frame)Tnrecovery,m = [m + β(n m)] · [(t1poll

+2 Slot) · ERR1poll + (t1poll + 2 Slot + tRTS + tCTS + 2 SIFS + (1 α)

frame num/2 · (tdata frame + SIFS) + α · tnull frame)

(1 ERR1poll)].

The superpoll can poll a group of STAs together as the CF-Multipoll and the CP-Multipoll. In the superpoll, the polled STA will attach the poll records of those polled ones whose polling orders are after it to its current transmitted data frame. This scheme can be considered

826 QUALITY-OF-SERVICE MANAGEMENT

Table 21.1 System and poll-related parameters. (Reproduced by permission of IEEE [43])

Parameter

Value

 

 

 

Channel rate

11

Mbs

PHYheader

192 b

MAC header

272 b

Slot

20

μs

SIFS

10

μs

DIFS

50

μs

PIFS

30

μs

Superframe

25

μs

CFP Max Duration

20

μs

frame num

3

 

ldata frame(octets)

200(default), 400, 600, 800

lnull frame(octets)

34

 

lsingle poll(octets)

34

 

ln poll(octets)

16 + 8n

n

1–20

BER

103, 104, 105(default), 106

α

0.2 (default), 0.4, 0.6, 0.8

h, the number of PCs operating in the

 

 

overlapping space

1, 2 (default), 3, 4

InitBT(μs)

90(default), 110, 130, 150

 

 

 

as one with replicated poll records. To keep the correct polling order, each polled STA in the polling group should monitor the channel and check whether the previous STA has finished sending a data frame. If a polled STA fails to receive its poll record, the next following STA in the polling group will wait for a timeout before its own frame transmission. However, the situation where some STAs cannot listen to other STAs’ channel activities is not considered. This may cause inconsistent setting of timers among polled STAs and may cause internal collisions.

21.2.2.1 Performance example

The parameter settings related to system and the polling schemes are listed in Table 21.1 [43]. The performance improvement of CP-Multipoll in percentage over other schemes is shown in Figure 21.6.

21.3 DYNAMIC SCHEDULING ON RLC/MAC LAYER

In wireless networks, the fading characteristics of the wireless physical channel may introduce location-dependent channel errors. A scheduling algorithm, referred to as channelcondition independent packet fair queueing (CIF-Q), is presented in Ng et al. [44] to solve the problem of location-dependent channel errors in wireless networks by suspending

DYNAMIC SCHEDULING ON RLC/MAC LAYER

827

Improvement (%)

Improvement (%)

28

 

 

 

 

 

 

 

 

 

24

 

 

 

 

 

 

 

 

 

20

 

 

 

 

 

 

 

 

 

16

 

 

 

 

 

 

 

 

 

12

 

 

 

 

 

 

 

 

 

8

 

 

 

 

 

 

 

 

 

4

 

 

 

 

 

BER = 10 × 10–3

 

0

 

 

 

 

 

BER = 10 × 10–4

 

 

 

 

 

 

 

BER = 10 × 10–5

 

–4

 

 

 

 

 

BER = 10 × 10–6

 

–8

4

6

8

10

12

14

16

18

20

2

 

 

 

 

n (poll size)

 

 

 

 

44

 

 

 

 

 

 

 

 

 

40

 

 

 

 

 

 

 

 

 

36

 

 

 

 

 

 

 

 

 

32

 

 

 

 

 

 

 

 

 

28

 

 

 

 

 

 

 

 

 

24

 

 

 

 

 

 

 

 

 

20

 

 

 

 

 

 

 

 

 

16

 

 

 

 

 

 

 

 

 

12

 

 

 

 

 

 

InitBT = 90

 

 

 

 

 

 

 

InitBT = 110

8

 

 

 

 

 

 

 

 

 

 

 

 

InitBT = 130

4

 

 

 

 

 

 

InitBT = 150

 

 

 

 

 

 

 

 

 

0

4

6

8

10

12

14

16

18

20

2

n (poll size)

Figure 21.6 Comparison between single poll and CP-Multipoll.

transmission service of a connection of a mobile station (MS) when the MS is in a high BER region. To compensate for the service loss of the MS in a high BER region, the CIF-Q scheduling algorithm increases the service priority after the MS returns to a low BER region to fulfill its QoS specification. However, this suspension may cause long delays for the connection of the MS, because the duration that an MS resides within a high interference region may be unpredictably long. In many services, such as video transmissions, minor errors are acceptable to the receiver-side applications, but a long delay is not.

In Yars et al. [45], a scheduling scheme at the RLC/ MAC layer is proposed, referred to as a dynamic scheduling mechanism for mobile communication (DSMC). The scheme is discussed in the context of GPRS applications. DSMC is a dynamic scheduling architecture that can conform to a variety of QoS requirements in the networks without changing the coding rate on RLC layer. The DSMC scheduling scheme, which is based on the self-clocked fair queuing (SCFQ) algorithm [46], can dynamically adjust the service rate (weight) for a