Resource Management in Satellite Networks
Resource Management in Satellite Networks
Resource Management in Satellite Networks
Editor
Resource
Management in
Satellite Networks
Optimization and Cross-Layer Design
Resource Management in Satellite
Networks
Optimization and Cross-Layer Design
Resource Management in Satellite
Networks
Optimization and Cross-Layer Design
Giovanni Giambene
Universit degli Studi di Siena
13
Giovanni Giambene
Dipartimento di Ingegneria DellInformazione
Universit degli Studi di Siena
Via Roma, 56
53100 Siena
ITALY
9 8 7 6 5 4 3 2 1
springer.com
Acknowledgements
Nowadays, satellites are used for a variety of purposes, including sensors and
data collection, weather, maritime navigation and timing, Earth observation,
and communications. In particular, satellite transmissions have an important
role in telephone communications, television broadcasting, computer commu-
nications as well as navigation.
The use of satellites for communications was a brilliant idea of Arthur C.
Clarke who wrote a famous article in October 1945 in the Wireless World jour-
nal, entitled Extra Terrestrial Relays - Can Rocket Stations Give Worldwide
Coverage? that described the use of manned satellites in orbits at 35,800
km altitude, thus having synchronous motion with respect to a point on the
Earth. This article was the basis for the use of GEOstationary (GEO) satel-
lites for telecommunications. Subsequently, he also proved the usefulness of
satellites as compared to transatlantic telephone cables.
Satellite communications deserve the special merit to allow connecting
people at great distances by using the same (homogeneous) communication
system and technology. Other very signicant advantages of the satellite ap-
proach are: (i ) easy fruition of both broadcast and multicast high bit-rate
multimedia services; (ii ) provision of backup communication services for users
on a global scale (this feature is very important for emergency scenarios and
disaster relief activities); (iii ) provision of services in areas that could not be
reached by terrestrial infrastructures; (iv ) support of high-mobility users.
Three broad areas where satellites can be employed are: xed satellite
service, broadcast satellite service, and mobile satellite service. Particularly
relevant is the signicant global success of broadcast satellite services for both
analogue and digital audio/TV by exploiting the inherent wide coverage area
of GEO satellites. At the beginning of the 21st century more than 70 million
European homes watch TV programs through direct satellite reception or
through cable distribution systems.
New satellite system architectures are being envisaged to be fully IP-based
and support digital video broadcasting and return channel protocols, such as
DVB-S, DVB-S2 and DVB-RCS. Trends in telecommunications indicate that
viii Preface
four growing market areas are messaging and navigation services, mobility ser-
vices, video delivery services, and interactive multimedia services. In addition
to this, interesting areas for investigation with big potential markets are: the
extension of the DVB-S2/-RCS standard for mobile usage, satellite IP net-
works interconnected with terrestrial wireless systems, and the convergence
of satellite communications and remote sensing for Earth observation.
Satellite resources (i.e., radio spectrum and transmission power) are costly
and satellite communications impose special constraints with respect to ter-
restrial systems in terms of path loss, propagation delay, fading, etc. These
are critical factors for supporting user service level agreements and Quality of
Service (QoS).
The ISO/OSI reference model and the Internet protocol suite are based
on a layered protocol stack. Protocols are designed such that a higher-layer
protocol only makes use of the services provided by the lower layer and is
not concerned with the details of how the service is being provided; proto-
cols at the dierent layers are independently designed. However, there is tight
interdependence between layers in IP-based next-generation satellite commu-
nication systems. For instance, transport layer protocols need to take into
account large propagation delays, link impairments, and bandwidth asymme-
try. In addition to this, error correction schemes are implemented at physical,
link and (in some cases) transport layers, thus entailing some ineciencies and
redundancies. Hence, strict modularity and layer independence of the layered
protocol model may lead to a non-optimal performance.
Satellite resources are costly and must be eciently utilized in order to
provide suitable revenue to operators. Users, however, do not care about the
platform technology adopted and employed resource management scheme, but
need QoS provision. Unfortunately, resource utilization eciency and QoS
support are conicting needs: typically, the best utilization is achieved in the
presence of a congested system, where QoS can diculty be guaranteed. A
new possible approach addressing both these issues is represented by the cross-
layer design of the air interface, where the interdependency of protocols at
dierent layers is exploited with the aim to perform a joint optimization or a
dynamic adaptation. The innovation of this approach relies on the fact that
it introduces direct interactions event between non-adjacent protocol layers
with the aim to improve system performance.
The main aim of this book is to address the novel research area of cross-
layer air interface design for satellite systems and provide a complete de-
scription of available methods, showing the possible eciency improvements.
A particular interest has been addressed here to the protocol stack dened
by the ETSI TC-SES/BSM (Satellite Earth Stations and Systems / Broad-
band Satellite Multimedia) working group for IP-based satellite networks. In
this framework, a protocol stack architecture has been identied, where lower
layers depend on satellite system implementation (satellite-dependent layers)
and higher layers are those typical of the Internet protocol stack (satellite-
independent layers). These two blocks of stacked protocols are interconnected
Preface ix
The main objective of ja2430 has been the study of novel radio resource
management schemes able to support multimedia trac with QoS guarantee
in future satellite communication systems. Our aim has been to propose mod-
ications to the ISO/OSI standard protocol stack by considering interactions
x Preface
and even new interfaces among non-adjacent protocol layers. Such approach
can be particularly important in order to optimize the performance (i.e., e-
ciency) of resource management protocols.
After more than one year of SatNEx ja2430 activities, it was decided in
September 2005 to organize the results obtained in a book. With the end of
SatNEx activities in March 2006, the work of this book continued in SatNEx
II (IST-027393, 20062009) in the two new sub-work-packages deriving from
ja2430, that is ja2330 (entitled: Radio Resource Allocation and Adaptation)
and ja2230 (entitled: Cross-Layer Protocol Design).
The activity carried out for this book has been a very good opportunity
for the SatNEx community to integrate the competencies of dierent partners
considering all the parts of the system design (i.e., propagation issues, resource
management techniques, link design, QoS, transport protocols, etc.) and es-
pecially because SatNEx is unique in that its expertise covers both broadband
(xed) and mobile satellite systems. This has been an ideal condition for the
study of mechanisms that involve interactions among several protocol layers.
Besides Part I of this book that is aimed to introduce satellite communica-
tions (Chapter 1), resource management techniques (Chapter 2), QoS issues
(Chapter 3) and cross-layer design methods (Chapter 4), the two following
parts are conceived according to the ETSI SES/BSM protocol stack, thus
distinguishing cross-layer issues involving satellite-dependent layers (Part II,
Chapters 5, 6 and 7) from those of satellite-independent layers (Part III,
Chapters 8, 9 and 10).
Before concluding this preface, I would like to say that I feel honored to
have coordinated this book work rst in the framework of ja2430 and then
in ja2230&ja2330. I take this opportunity to thank SatNEx for the econom-
ical support received and all the SatNEx Colleagues who have provided a
continuous support to this initiative. Finally, a very special thank is for my
Collaborator, Dr. Ing. Paolo Chini, for his signicant support in helping me
during these years of hard work on the book. Many thanks also to my Col-
laborator, Dr. Ing. Ivano Alocci, for his kind support.
Giovanni Giambene
CNIT - University of Siena
Via Roma, 56 - 53100 Siena, Italy
Phone: +39 0577 234603
Fax: +39 0577 233602
E-mail: giambene@unisi.it
Curriculum Vitae
Dr. Giovanni Giambene
Giovanni Giambene was born in Florence, Italy, in 1966. He received the Dr.
Ing. degree in Electronics from the University of Florence, Italy, in 1993 and
the Ph.D. degree in Telecommunications and Informatics from the University
of Florence, Italy, in 1997. From 1994 to 1997, he was with the Electronic En-
gineering Department of the University of Florence, Italy. He was Technical
External Secretary of the European Community COST 227 Action, entitled
Integrated Space/Terrestrial Mobile Networks. He also contributed to the
Resource Management activity of the Working Group 3000 within the RACE
Project, called Satellite Integration in the Future Mobile Network (SAINT,
RACE 2117). From 1997 to 1998, he was with OTE of the Marconi Group,
Florence, Italy, where he was involved in a GSM development program. In
the same period he also contributed to the COST 252 Action (Evolution of
Satellite Personal Communications from Second to Future Generation Sys-
tems) research activities by studying the performance of Packet Reservation
Multiple Access (PRMA) protocols suitable for supporting voice and data
transmissions in low earth orbit mobile satellite systems. In 1999 he joined
the Information Engineering Department of the University of Siena, Italy, rst
as research associate and then as assistant professor. He teaches the advanced
course of Telecommunication Networks at the University of Siena. From 1999
to 2003 he participated to the project Multimedialit` a , nanced by the Ital-
ian National Research Council (CNR). From 2000 to 2003, he contributed to
the activities of the Personalised Access to Local Information and services
for tOurists (PALIO) IST Project within the fth Research Framework of
the European Commission (www.palio.dii.unisi.it). At present, he is involved
in the SatNEx network of excellence of the FP6 programme in the satellite
eld, as work package leader of two groups on radio access techniques and
cross-layer air interface design (www.satnex.org). He is also vice-Chair of the
COST 290 Action (www.cost290.org), entitled Trac and QoS Management
in Wireless Multimedia Networks (Wi-QoST).
Contents
Acknowledgements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . v
Preface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . vii
Contents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xiii
1 INTRODUCTION TO SATELLITE
COMMUNICATIONS AND RESOURCE
MANAGEMENT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
1.1 Satellite communications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
1.2 Basic issues in the design of satellite communication systems . 10
1.3 Multiple access techniques . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
1.4 Radio interfaces considered and scenarios . . . . . . . . . . . . . . . . . . 15
1.4.1 S-UMTS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
1.4.2 DVB-S standard . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
1.4.3 DVB-RCS standard . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
1.4.4 DVB-S2 standard . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
1.4.5 Numerical details on the selected scenarios for
performance evaluations . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
1.5 Satellite networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
1.5.1 SI-SAP interface overview . . . . . . . . . . . . . . . . . . . . . . . . . 31
1.6 Novel approaches for satellite networks . . . . . . . . . . . . . . . . . . . . 34
1.6.1 Horizontal approach . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
xiv Contents
References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39
References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61
References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 93
Contents xv
References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 113
References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 173
References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 201
References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 237
References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 285
References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 309
References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 333
Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 335
List of Contributors
Kostantinos Avgeropoulos
AUTh - Aristotle University of Wei Koong Chai
Thessaloniki, Thessaloniki, UniS - University of Surrey, CCSR,
Panepistimioupolis, 54124, Greece Centre for Communication Systems
k.avgeropoulos@gmail.com Research, Guildford,
Surrey GU2 7XH, UK
Paolo Barsocchi W.Chai@surrey.ac.uk
CNR-ISTI - National Research
Council (CNR), ISTI
Institute, Via G. Moruzzi, 1, Paolo Chini
San Cataldo, 56124 Pisa, Italy CNIT - University of Siena
paolo.barsocchi@isti.cnr.it Research Unit, Via Roma, 56,
53100, Siena, Italy
Ulla Birnbacher chini7@unisi.it
TUG - Graz University of
Technology, Inst. Comm. Net. and
Satellite Comm., Ineldgasse 12, Antonio Cuevas
A-8010 Graz, Austria UC3M - Universidad Carlos III de
ulla.birnbacher@tugraz.at Madrid,
Avda. Universidad 30, 28911
Daniel Castro Garca Leganes, Spain
INFOGLOBAL, Spain acuevas@it.uc3m.es
xx List of Contributors
Petia Todorova
Mara Angeles Vazquez Castro
FhI - Fraunhofer Institute for Open UAB - Universitat Autonoma de
Communication Systems - FOKUS, Barcelona,
Kaiserin - Augusta - Alee 31, 10589 Dpt. Telecommunications and
Berlin, Germany Systems Engineering,
Petia.Todorova@ Engineering School,
fokus.fraunhofer.de Bellaterra 08193 - Barcelona, Spain
Orestis Tsigkas angeles.vazquez@uab.es
AUTh - Aristotle University of
Thessaloniki, Thessaloniki,
Panepistimioupolis, 54124, Greece Fausto Vieira
torestis@auth.gr UAB - Universitat Autonoma de
Alessandro Vanelli-Coralli Barcelona,
UoB - University of Bologna Dpt. Telecommunications and
DEIS/ARCES, Systems Engineering,
Viale Risorgimento, 2, Engineering School,
40136 - Bologna, Italy Bellaterra 08193 - Barcelona, Spain
avanelli@deis.unibo.it fvieira@sunaut.uab.es
List of Acronyms and Abbreviations
1
CNIT - University of Siena, Italy
Low Earth Orbit (LEO) satellites at a height between 500 and 2,000 km
of altitude, i.e., below the Van Allen radiation belts. The Earth rotation
period is about 100 minutes and the satellite visibility time is around 15
minutes. These orbits can be polar or inclined.
Medium Earth Orbit (MEO) may be circular or elliptical in shape at a
height between 8,000 and 12,000 km of altitude (between the two Van
Allen radiation belts). The rotation period is 5-12 hours and the satellite
visibility time is 2-4 hours.
Geosynchronous Earth Orbit (GEO) is on the Earths equatorial plane
at a height of about 35,780 km with a rotation period of 24 hours and
a satellite visibility time of 24 hours. Many GEO satellites are allocated
on distinct slots on the equatorial plane orbit. The GEO satellite altitude
and the equatorial orbit have been determined to allow that GEO satellites
rotate at the same speed of the Earth. Hence, a GEO satellite remains in
a stationary position in the sky with respect to a xed point on the Earth;
this is a desired feature for telecommunication purposes.
The balance between the gravity force versus the Earth and the centrifugal
one determines the satellite orbital speed. The three Keplers laws regulate
the satellite orbital motion.
A satellite communication system is formed by a number of satellites,
typically with the same orbit type (i.e., GEO, MEO or LEO) that cover a
Chapter 1: INTRODUCTION TO SATELLITE COMMUNICATIONS 5
size, since narrower surfaces are irradiated on the Earth, thus having a higher
power per surface unit).
Frequency bands (of interest for satellite communications) and related
designations are listed below [1],[3],[5]:
Fixed Satellite Service (FSS): 6/4 GHz (C band), 8/7 GHz (X band),
14/12-11 GHz (Ku band), 30/20 GHz (Ka band), 50/40 GHz (V band).
These services concern communications with xed terrestrial terminals;
moreover, they are often broadband (typically in the range of 1-200
Mbit/s) due to both the available Radio Frequency (RF) bandwidth and
suitable link performance by using terrestrial xed directional antennas.
Even if these services have been originally allocated to GEO satellites, also
non-GEO system allocations are possible.
Broadcasting Satellite Service (BSS): 2/2.2 GHz (S band), 12 GHz (Ku
band), 2.6/2.5 GHz (S band). These services deal with direct broadband
broadcast transmissions through public operators. In particular, the Ku
band segment of BSS has been reserved for orbit positioning and dedicated
channels for individual nations employment. This service has been mainly
allocated to GEO satellites, but, like in the FSS case, also non-GEO
satellites are possible.
Mobile Satellite Service: 1.6/1.5 GHz (L band), 30/20 GHz (Ka band).
These services are related to communications with mobile Earth stations
(e.g., ships, vehicles, aircrafts, and also persons). An example of mobile
satellite service is the Inmarsat system, operating in the L band with
GEO satellites for land-mobile services. These bands have been assigned
later also to non-GEO satellite networks.
RTD is the propagation delay along a link (back and forth). In the satellite
case, its value depends on the satellite orbit, the relative position of the user
on the Earth, and the type of satellite [1],[3],[5]. In particular, if the satellite
is regenerating, RTD involves a single hop from the Earth to the satellite and
back to the Earth; whereas, if the satellite is bent-pipe, RTD typically involves
a double hop (from Earth to satellite to Earth and back) since layer 2 control
functions are in the Earth station. In case of GEO regenerating satellites, RTD
varies in the range 239-280 ms. In particular, RTD is 239.6 ms for an Earth
station placed on the Earth equator in the point below the satellite; whereas,
RTD is about 280 ms for an Earth station placed at the edge of the satellite
coverage area (i.e., seeing the satellite with the minimum allowed elevation
angle). Note that RTD can be also referred to an end-to-end connection,
involving many links (the satellite type is not relevant for such RTD). In the
GEO case, this end-to-end RTD value (between a message transmission and
the reception of the relative reply) varies from 480 to 558 ms; this value can
increase due to processing, queuing and on-board switching operations.
The RTD values increase with the satellite orbit altitude and reduces
with the elevation angle. LEO and MEO satellites are situated at low
altitudes, so they allow lower RTD values than GEO. High RTD values
cause several problems for both interactive and real-time applications (e.g., an
evident and troublesome echo in phone calls); moreover, also reliable transport
layer protocols can experience problems since the end-to-end delay loop is
dominated by the propagation delay contribution due to the satellite segment.
The maximum RTD value (RT Dmax ) for a given satellite constellation also
depends on the minimum elevation angle (mask angle), i.e., the elevation angle
at the edge of coverage. The RT Dmax characteristics for LEO satellite systems
are described in Figure 1.3.
Atmospheric eects
Fig. 1.3: RT Dmax level curves in ms for LEO satellite constellations in the plane
Minimum elevation angle [in degrees] versus LEO satellite constellation altitude [in
km].
Channel losses
In satellite networks, Bit Error Rate (BER) is very high, due to the above-
mentioned atmospheric eects. The quality of the satellite link can be subject
to rapid degradation that can cause long sequences of erroneous bits. These
burst errors cause an on-o behavior for the channel. With the use of Forward
Error Correction (FEC) codes (e.g., Reed-Solomon codes, convolutional codes,
etc.), it is possible to reduce remarkably BER at the expenses of a lower
information bit-rate (i.e., part of the available capacity is spent in sending
redundancy bits).
Satellite lifetime
Satellites have an average life span due to the components ageing process, the
eect of radiations, the necessity of new components, etc. GEO satellites have
a lifetime in the range of 10-15 years. MEO satellites have an operational
period of 10-12 years. Finally, LEO satellites are ecient between 5 and 8
years, mainly due to radiation eects.
These dierent multiple access techniques are surveyed below. Note that
another form of multiple access is also allowed in the presence of a multi-
spot-beam antenna on the satellite. This technique is called Spatial Division
Multiple Access (SDMA) [11]. With a multi-spot-beam antenna, some beams
may re-use the same frequencies, provided that the cross-interference (due to
Chapter 1: INTRODUCTION TO SATELLITE COMMUNICATIONS 13
FDMA
TDMA
In TDMA, the total bandwidth is usually divided into time slots, organized
according to a periodic structure, called frame. Each slot is used to convey
one packet. Hence, TDMA is well suited for packet trac. In TDMA uplink
transmissions, Earth stations take turns sending bursts through a common
satellite transponder. As for TDMA downlink transmissions from a satellite,
only one carrier is used. Hence, TDMA provides a signicant advantage, since
it permits a transponders TWTA to operate at or near saturation, thus
maximizing downlink C/N. However, interference is not totally eliminated,
since it is present in the form of inter-symbol interference that must be
minimized by means of appropriate ltering. TDMA is easy to recongure
for changing trac demands, it is robust to noise and interference and allows
mixing multimedia trac ows.
While in TDM (Time Division Multiplexing) all data come from the same
transmitter and the clock and time frequencies do not change, in TDMA
each frame contains a number of independent transmissions. Each station has
to know when to transmit and must be able to recover the carrier and the
data synchronization for each received burst in time to sort out all desired
14 Giovanni Giambene
base-band channels. This task is not easy at low C/N values. A long preamble
is generally needed, which decreases system eciency.
A group of Earth stations, each at a dierent distance from the satellite,
must transmit individual bursts of data in such a way that bursts arrive
at the satellite in correspondence with the beginning of the assigned slots.
Stations must adjust their transmissions to compensate for variations in
satellite movements, and they must be able to enter and leave the network
without disrupting its operation. These goals are accomplished by exploiting
the TDMA organization in frames, which contain reference bursts that permit
establishing absolute time for the network.
Reference bursts are generated by a master station on the ground in
a centralized-control satellite network. Each burst starts with a preamble,
which provides synchronization and signaling information and identies the
transmitting station. Reference bursts and preambles constitute the frame
overhead. The smaller the overhead, the more ecient the TDMA system,
but the greater the diculty in acquiring and maintaining synchronism.
Time access to the satellite link can be managed either in centralized or in
distributed mode. Centralized control is generally more robust. On the other
hand, the distributed control is more responsive to trac variations, since it
allows an update in one RTD.
CDMA
Direct Sequence (DS), where the user binary signal is multiplied by the PN
code with bits (called chips) whose length is basically PG times smaller
that that of the original bits. This spreading scheme is well suited for
Binary Phase Shift Keying (BPSK) and Quadrature Phase Shift Keying
(QPSK) modulations.
Chapter 1: INTRODUCTION TO SATELLITE COMMUNICATIONS 15
The drawback of TDMA is the need to size Earth stations for the entire
system capacity (transponder bandwidth), even though the single terminal
uses a small portion of that. An interesting solution is given by the hybrid
combination of Multi-Frequency (MF) with TDMA systems, which takes some
advantages of both FDMA and TDMA [12]. In MF-TDMA the transponder
spectrum is divided into several carriers, thus allowing the sizing of the station
on a narrower bandwidth. Each carrier, in turn, is shared in TDMA mode.
The transmission of the trac occurs in time slots that may belong to dierent
carriers. When a single modulator is used, slots of a transmission need not to
overlap in time (i.e., simultaneous transmissions on dierent frequencies are
not allowed). The MF-TDMA technique eciently supports trac streaming,
while maintaining exibility in capacity allocation.
1.4.1 S-UMTS
DVB-S has been designed for primary and secondary distribution in the bands
of FSS and BSS [13]. Such systems should be able to provide direct-type
services (Direct-To-Home, DTH) both to the single consumer having an
integrated receiver-decoder, to systems with a collective antenna and to the
terminal stations of cable-TV. The frequency bands for feeder and user links
may occupy Ku/Ku, Ku/Ka and K/Ka bands.
Below the transport layer and the IP layer the Multi Protocol Encapsula-
tion (MPE) provides segmentation & reassembly functions for the generation
of Moving Picture Experts Group 2 - Transport Stream (MPEG2-TS) packets
of 188 bytes (xed length). A TCP header of 20 bytes, an IP header of
20 bytes and an MPE header + CRC trailer of 12 + 4 bytes are added
to packets from the application layer; the resulting blocks are fragmented
in payloads of MPEG2-TS packets. All the data ows transported in single
Chapter 1: INTRODUCTION TO SATELLITE COMMUNICATIONS 17
MPEG2-TS are of the TDM type. In the channel adaptation section, packets
are processed in several steps, such as: channel encoding (outer Reed-Solomon
coding, convolutional interleaver, inner convolutional encoding, puncturing),
base-band shaping of impulses, and QPSK modulation. The resulting DVB-S
transmissions via satellite are very robust, considering a minimum BER of
about 1011 . As an example, a typical data rate of about 38 Mbit/s is obtained
with modern satellite transponders that have a bandwidth of about 33 MHz
[13].
One of the reasons for the denition of a DVB standard with satellite
return channel (DVB - Return Channel via Satellite, DVB-RCS) has been
the increasing request of interactive applications and services with major
informative volumes (1 ) that could not be achieved with a DVB-S-based
system, where the return channel (realized through a terrestrial link via
modem) cannot permit an adequate bit-rate capacity (maximum 64 kbit/s).
The specications of DVB-RCS use and modify the DVB-S ones [14],[15];
moreover, they are independent of frequency, making easier to realize network
and security mechanisms with an ecient transport layer. The DVB-S channel
has been named Forward Channel, while the Return Channel is related to
the link from the end-user back to the content network (see Figure 1.4).
The return channel has a variable bit-rate up to a maximum of 2 Mbit/s
and can dynamically assign its time-frequency resources (according to an
MF-TDMA air interface) to the requesting terminals. The Return Channel
Satellite Terminal (RCST) transmission capacity is constrained. According to
the standardization, RCSTs can be single-user (144-384 kbit/s) or corporate
(2 Mbit/s).
The standard [14],[15] denes a reference model for the Interactive Satellite
Network (ISN) architecture, composed of a certain number of RCSTs, a GEO
bent-pipe satellite, and the following elements:
1
Recently, also other systems have been standardized for broadband satellite access
such as DOCSIS-S and IPoS [23].
18 Giovanni Giambene
multimedia transmissions.
The return link time and frequency organization of the air interface is
depicted in Figure 1.5. Each super-frame is characterized by a superframe id,
and can be assigned to a group of RCSTs. In turn, each super-frame is
divided in parts, characterized by a superframe counter that can be divided in
frames, identied by a frame number (F nb) or by a frame ID (F id). Frames
can have dierent duration, bandwidth and composition of timeslots. Each
frame is divided in timeslots characterized by a timeslot number (TS nb);
also timeslots can be organized in slot groups with similar characteristics.
default value is 2 super-frames, such expiry resulting in the RBDC being reset
to zero rate. CRA and RBDC could be used in combination, as previously
explained. A typical application for RBDC over a GEO satellite could be to
support the Available Bit Rate (ABR) trac class of ATM networks.
The Variable Rate - Real Time (VR-RT) class is for variable bit-rate jitter-
sensitive trac;
The Variable Rate - Jitter Tolerant (VR-JT) for variable bit-rate jitter-
tolerant trac (e.g., FTP application);
The Jitter Tolerant Priority trac class.
An RCST may queue all trac arriving from the user interface, using
separate queues for ows that are subject to dierent transmission priorities
(i.e., service classes) [15]. As an example, one layer 2 queue shall be provided
for each of the priorities (i.e., RT, VR-RT, VR-JT, JT); each queue should
be served with a capacity allocation method (or a combination of them). For
instance: CRA for RT, RBDC for VR, VBDC/AVBDC+FCA for JT.
Typically, at the IP level 4-16 queues can be managed according to specic
IP QoS classes; while at layer 2, typically 4 queues are envisaged [24],[25].
Hence, the IP QoS service classes (i.e., layer 3 queues) need to be adequately
mapped into equivalent MAC QoS classes (i.e., layer 2 queues).
Trac generated at the RCST is rst classied and packets are stored into
one of several layer 3 queues. From layer 3 we have MPE encapsulation (see
Figure 1.7) and the generation of layer 2 packets (e.g., MPEG2-TS) provided
to suitable queues, waiting for transmission.
In a connectionless network, the prioritization of voice packets in both
directions is crucial in order not to degrade the voice quality. Thus, the priority
element plays an important role in the BoD architecture and must be present
in all steps of the transmission.
After 10 years from the denition of DVB-S in 2003, the European DVB
consortium has developed a second-generation standard for satellite broadcast
transmissions, named DVB-S2 [16]. Such system employs the most recent
24 Giovanni Giambene
advances in channel coding (e.g., Low Density Parity Check, LDPC, described
below) combined with several modulation types (i.e., QPSK, 8PSK, 16APSK
and 32APSK).
Besides broadcasting services, DVB-S2 can be employed for interactive
point-to-point applications (e.g., Internet access) by using new modulation
schemes and new operation modes that permit to optimize the modulation and
coding schemes depending on channel conditions. In order to allow that DVB-
S continues to operate during the transition period, the DVB-S2 standard
also provides transmission means compatible with the satellite decoders of
rst-generation (Set-Top-Box, STB).
A DVB-S2 transmitter is composed by the following functional blocks
that are described below [16],[26]: mode adaptation, stream adaptation, FEC
encoding, modulation mapping, physical layer framing, base-band ltering
and quadrature modulation.
Mode adaptation
Broadcast Services are provided via DVB-S2 with the exibility of VCM.
There are also Backwards Compatible-Broadcast Services used for a joint
interoperability with DVB-S decoders, and optimized Non-Backwards
Compatible-Broadcast Services.
Interactive Services are designed to operate with existing DVB return
channel standards (e.g., RC-PSTN, RCS, etc.). DVB-S2 can use both CCM
and ACM.
Digital TV Contribution and Satellite News Gathering applications refer
to point-to-point, or point-to-multipoint communications of multiple or
single MPEG-TS, by means of CCM or ACM modes.
Professional Services/applications mainly consists of professional point-
to-point and point-to-multipoint applications (e.g., data content distribu-
tion); for these services, DVB-S2 uses CCM, VCM or ACM techniques.
Stream adaptation
FEC encoding
Depending on the application area, the FEC coded blocks have very large
lengths (64800 bits for delay-tolerant applications, or 16200 bits). In the VCM
and ACM cases, FEC and modulation mode can be varied in dierent frames,
but they are constant in a frame.
Finally, bit interleaving shall be applied to 8PSK, 16APSK and 32APSK
FEC coded bits.
Modulation mapping
QPSK and 8PSK are typically suggested for broadcast applications, since
they have a quasi-constant envelope so that they can operate inside the
non-linear region of satellite transponders (i.e., close to the saturation).
Gray mapping can be used for these modulations.
The 16APSK and 32APSK modes, mainly proposed for professional appli-
cations (these modulations could also be used for broadcasting), require a
higher level of available C/N and the adoption of advanced pre-distortion
methods to reduce the non-linearity eects in transponders.
This sub-system, synchronously with the FEC frames, generates the Physical
Layer Frame (PLFRAME), supporting also some tasks, such as: dummy
PLFRAME insertion, physical layer signaling, optional pilot symbols insertion
and physical layer scrambling for energy dispersion.
A DVB-S2 system can be used with two congurations: single carrier
per transponder and multi-carrier per transponder (the bandwidth of the
transponder is divided with Frequency Division Multiplexing, FDM, among
dierent carriers and related bands).
In case of ACM mode, the DVB-S2 air interface varies exibly coding
and modulation techniques to maximize performance and coverage. This is
achieved through the TDM transmission of a sequence of PLFRAMEs, where
the coding and modulation format can change for each new PLFRAME.
Fig. 1.8: The four possible DVB-S2 constellations before physical layer scrambling.
Scenario 2: DVB-S/DVB-RCS
GEO satellite
Single beam or multi-spot-beam satellite antenna
Bent-pipe satellite
Architecture involving an NCC and at least a GW
Fixed users
Direct return link for channel quality measurements; typically, Ka band is
used (maximum capacity 2 Mbit/s)
Forward link in K band
Channel model: only troposphere eects (rain scintillation and gas) have
to be considered. Basically an Additive White Gaussian Noise (AWGN)
model has been adopted with a given packet error rate (uncorrelated losses)
IP-based trac ows with MPE encapsulation and generation of packets
according to the MPEG2-TS format
Trac sources of the FTP type (elephant TCP connections).
Fig. 1.9: Examples for the use of satellite links in telecommunication networks.
The user requesting contents should access them feeling like as he/she was
directly connected to the source of the information, the Content Domain;
practically, many domains are traversed that are transparent to the user.
Let us now consider the BSM network functions from the protocol stack
standpoint (see Figure 1.10) that can involve dierent layers, as specied in
ETSI TR 101 985 [34]:
Very Small Aperture Terminal (VSAT) networks are a special case of BSM
networks where the user terminal employs a small antenna (i.e., VSAT) and
simplied equipment so as to reduce costs. This small satellite terminal can
be used for one way and/or interactive communications. VSATs can support
several applications, such as: satellite news gathering, supervisory control
and data acquisition, inquiry/response, TV and audio broadcasting, data
distribution. VSAT networks are based on GEO satellites (typically of the
bent-pipe type) according to a star topology: an Earth station acts as a hub
(= gateway to the terrestrial network and master control station), receiving
and transmitting all the data uxes from/to VSATs. The forward link (from
the hub to VSATs) is via GEO satellite. The return link (from VSAT to the
hub) is typically via a terrestrial Public Switched Telephone Network (PSTN)
link (to simplify the antenna design on the VSAT). Hence, forward and return
links have an asymmetrical capacity; anyway recent advances in this eld also
allow the return link via satellite. Referring to the network architecture in
Figure 1.10, the VSAT includes the client and the Earth station on the left;
whereas, the hub coincides with the Earth station on the right. Dierent
VSAT platforms use various technologies in order to access the satellite radio
space segment and to share it among multiple users. One of the problems
that VSAT networks have faced during their evolution has been the lack of
compliance to any specic standards. In the last years, standardization bodies
have established new standards to support satellite Internet [23]. The DVB
standard has been the rst one to be published, and ETSI adopted DVB-RCS
for satellite return link transmissions. Another standard is IPoS (Internet
Protocol over Satellite) developed by HNS (Hughes Network Systems) and
Chapter 1: INTRODUCTION TO SATELLITE COMMUNICATIONS 31
QIDs are abstract queues (SI-SAP level) that represent the layer 2 queues
in a general way to allow the mapping with layer 3 ones (note that
using a QoS support mechanism at layer 3, dierent queues are needed).
QIDs are a way to hide specic SD layer implementations (i.e., BSM
technology) from the IP layer. Each QID queue is characterized by
QoS-specic parameters (owspecs, path label or Dierentiated Service,
DiServ, marking) and is associated to lower layer transfer capabilities
(i.e., capacity allocation methods) and buer management policies [36].
The SD layers are responsible for assigning satellite capacity to these
abstract queues (e.g., in DVB-RCS we can consider the allocation methods
such as CRA, VBDC, etc., and combinations of them). The mapping of
IP queues to QIDs is exible: there is no strict constraint for a one-to-one
mapping, but we may also consider that more IP queues correspond to the
same QID (in this case, a scheduler should be used at layer 3 to determine
the service order of the dierent queues to be mapped to the same QID).
BSM networks use a suitable and general categorization of trac ows
in trac classes that can be mapped to classical IP QoS classes [25]. In
particular, 8 trac classes, i.e., service priority levels, are dened from 0
for emergency services to 7 for low priority broadcast/multicast trac.
Other functional blocks are involved in the management of the queues in
BSM protocol architecture; the interested reader may refer to [36].
All the BSM services (data transfer, address management, group adver-
Chapter 1: INTRODUCTION TO SATELLITE COMMUNICATIONS 33
tisement, etc.) use SI-SAP primitives [37]. These primitives are classied
into functional groups within the User plane (U), Control plane (C) and
Management plane (M). The primitives (exchanged between the upper layers
and the lower layers) are of the following four types:
The services provided at the SI-SAP level are divided into functional
groups for U-, C-, and M-plane, as described below [37]. Each service uses
one or more dierent types of the above-mentioned primitives.
U-plane services
Data Transfer : These services are used to send and receive user data
via the SI-SAP. Data transfer services can be used for both unicast and
multicast data transfer.
C-plane services
Address Resolution: A mechanism to associate a BSM ID address to a
given IPv4 unicast or multicast address. A successful address resolution
service returns the associated BSM ID. The BSM ID can be either a
Unicast ID for unicast services or a Group ID for multicast services.
Resource Reservation: These services are used to open, modify and
close SD layer queues (for both unicast and multicast ows) to be used
by SI layers. This function assigns the QID and denes or modies
the properties of the abstract queue that is associated with that QID.
Resource reservation is required only for sending data (not for receiving
data).
Group Receive/Send : They are mechanisms to activate and congure
the SD layers to receive/send a needed multicast service. These services
are used to associate a multicast group address (e.g., an IPv4 Class D
address, or an IPv6 multicast address) with a series of SD parameters.
Flow Control : These primitives allow activating and adjusting the SD
layers to provide SI-SAP ow control for a specic QID (i.e., on one or
more of the SD layer queues).
M-plane services
At present, no M-plane services are dened in the standard.
34 Giovanni Giambene
We expect that dierent wireless technologies (e.g., wireless local area net-
works, cellular systems, satellite networks) need to co-operate to allow the
best radio coverage to the users, depending on their locations, mobility
characteristics, applications, user prole, etc. This is in accordance with the
Always Best Connected (ABC) paradigm. Therefore, it is necessary that the
use of the resources in the dierent Radio Access Networks (RANs) be globally
coordinated by means of a resource brokerage function. Such intelligence is
centralized and allocates sessions to RANs or switches them from one to
another, when some conditions are meet.
The ISO/OSI reference model and the Internet protocol suite are based on
a layering paradigm. Each protocol solves a specic problem by using the
services provided by modules below it and gives a new service to upper layers.
The disadvantages of such approach can be detailed as follows:
The needs of a service provided by the communication system to its users
are dened at the top-level, but the hierarchy and the overall system
performance are built upon the bottom-level.
The bottom level does not communicate directly, but through intermediate
layers with the top-level. Information is lost during this layer-by-layer top-
down conversion.
Layers are independently optimized. However, in many cases, the close
interaction among them should be considered.
A strict modularity and layer independence may lead to non-optimal
performance in IP-based next-generation satellite communication systems.
Finally, since both radio and power resources are strongly constrained on the
satellite, a protocol optimization is mandatory. Such optimization requires a
vertical design of the air interface protocol stack. Such cross-layer approach
entails new interfaces across the layers, which exchange control information
beyond the standard ISO/OSI structure. Cross-layer interfaces can be between
or beyond adjacent protocol layers. Although interfaces between adjacent
layers are in general preferable, there can be the need for ecient and direct in-
teractions between non-adjacent layers [39]; in general, a layer should be aware
Chapter 1: INTRODUCTION TO SATELLITE COMMUNICATIONS 35
of the internal state of the other layers of the protocol stack. For instance,
OSI layer 3 (e.g., IP) and above often need direct interfaces to OSI layer 2,
e.g., for handover support. Another example concerns transmission parameters
(e.g., transmission mode, channel coding and persistency degree for link layer
retransmissions) that must be related to application characteristics (e.g., type
of information, source coding, etc.), network characteristics, user preferences
and context of use. Finally, lower layers (i.e., 1 and 2) should be aware of
higher layer (i.e., 3 and 4) behaviors in order to take appropriate decisions on
trac management.
Cross-layer methods can be classied into two broad groups as follows:
The BSM Protocol Manager (BPM) has been conceived in the BSM protocol
stack to maintain QoS and evaluate the BSM performance [44]. BPM resides
above the SI-SAP and denes how IP protocols and packet markings are
interpreted and transmitted through the BSM, which SI protocols are used
36 Giovanni Giambene
and how they in turn trigger the SD functions (see Figure 1.12). BPM
has interfaces at dierent levels of the BSM protocol stack. In particular,
BPM interacts with a specic middleware to establish transport level and
application level PEPs, communicates with bandwidth brokers and potentially
with service discovery and security/authentication functions. BPM directly
interacts with IP protocols, including Multiprotocol Label Switching (MPLS)
for route discovery and Integrated Service (IntServ) or Dierentiated Service
(DiServ) models (see Chapter 8, Section 8.2, for more details). For all these
reasons the BPM could represent a viable solution to implement the so-called
global coordinator (explicit cross-layer approach design). In such a case
suitable primitives should be designed to support cross-layer signaling through
the C-plane.
1.7 Conclusions
[12] J. Gilderson, J. Cherkaoui, Onboard Switching for ATM via Satellite, IEEE
Communications Magazine, Vol. 35, No. 7, pp. 66-70, July 1997.
[13] ETSI, Digital Video Broadcasting (DVB); Framing Structure, Channel Coding
and Modulation for 11/12 GHz Satellite Services, EN 300 421, V1.1.2, (1997).
[14] ETSI, Digital Video Broadcasting (DVB); Interaction Channel for Satellite
Distribution Systems, EN 301 790, V1.3.1 (2002-11).
[15] ETSI, Digital Video Broadcasting (DVB); Interaction Channel for Satellite
Distribution Systems; Guidelines for the use of EN 301 790, TR 101 790, V1.2.1,
(2003).
[16] ETSI, Digital Video Broadcasting (DVB); Second Generation Framing
Structure, Channel Coding and Modulation Systems for Broadcasting,
Interactive Services, News Gathering and other Broadband Satellite
Applications (DVB-S2), EN 302 307.
[17] ETSI, Satellite Earth Stations and Systems (SES); Satellite Component of
UMTS/IMT2000; G-family; Part 1: Physical Channels and Mapping of Transport
Channels into Physical Channels (S-UMTS-A 25.211), TS 101 851-1.
[18] ETSI, Satellite Earth Stations and Systems (SES); Satellite Component
of UMTS/IMT2000; G-family; Part 2: Multiplexing and Channel Coding
(S-UMTS-A 25.212), TS 101 851-2.
[19] ETSI, Satellite Earth Stations and Systems (SES); Satellite Component of
UMTS/IMT2000; G-family; Part 3: Spreading and Modulation (S-UMTS-A
25.213), TS 101 851-3.
[20] ETSI, Satellite Earth Stations and Systems (SES); Satellite Component of
UMTS/IMT2000; G-family; Part 4: Physical Layer Procedures (S-UMTS-A
25.214), TS 101 851-4.
[21] 3GPP, Technical Specication Group Services and System Aspects, Iu
Principles, 3G TR 23.930.
[22] P. Taaghol, B. G. Evans, E. Buracchini, R. De Gaudenzi, G. Gallinaro, J. Ho
Lee, C. Gu Kang, Satellite UMTS/IMT2000 W-CDMA Air Interfaces, IEEE
Communications Magazine, Vol. 37, No. 9, pp. 116-126, September 1999.
[23] H. Skinnemoen, A. Jahn, J. Kenyon, A. R. Noerpel, A Comparative Study of
DVB-RCS, IPOS and DOCSIS for Satellite, in Proc. of the 23rd AIAA&Ka
Band Joint Conference, Rome, September 25-28, 2005.
[24] M. Marchese, M. Mongelli, On-Line Bandwidth Control for Quality of
Service Mapping over Satellite Independent Service Access Points, Computer
Networks, Vol. 50, No. 12, pp. 1885-2126, August 2006.
[25] ETSI, Satellite Earth Stations and Systems (SES); Broadband Satellite
Multimedia; Services and Architectures; BSM Trac Classes, TS 102 295,
V1.1.1, February 2004.
[26] The special issue of the International Journal of Satellite Communications and
Networking on the DVB-S2 standard for broadband satellite systems, 2004.
[27] D. Breynaert, M. dOreye de Lantremange, Analysis of the Bandwidth
Eciency of DVB-S2 in a Typical Data Distribution Network, in Proc. of
CCBN2005, Beijing, March 21-23, 2005.
[28] A. Morello, V. Mignone, DVB-S2 - Ready for Lift o, EBU Technical Review,
October 2004.
[29] E. Lutz, D. Cygan, M. Dippold, F. Dolainsky, W. Papke, The Land Mobile
Satellite Communication and Recording, Statistics and Channel Model, IEEE
Transactions on Vehicular Technology, Vol. 40, No. 2, pp. 375-386, May 1991.
Chapter 1: INTRODUCTION TO SATELLITE COMMUNICATIONS 41
1
CNR-ISTI - Research Area of Pisa, Italy
2
CNIT - University of Genoa, Italy
3
FhI - Fraunhofer Institute - FOKUS, Berlin, Germany
2.1 Introduction
Fading
Delay spread
Doppler shift
Limited spectrum
Path loss and thermal noise.
An overview of the most recent research activities in the RRM eld follows.
Of course, the overview cannot be exhaustive, as new material is continuously
produced.
Papers [9] and [10] treat the RRM subject from the scheduling perspective.
Papers from [11] to [15] address the RRM problem from the transmission and
rate control point of view.
problem for a satellite network, where variations of fading conditions are added
to those of trac load. Two novel optimization approaches are addressed.
The rst one, considered in more detail in [13], is based on the minimization
over a discrete constraint set, by using an estimate of the gradient, obtained
through a relaxed continuous extension of the performance measure. The
computation of the gradient estimation relies on the innitesimal perturbation
analysis. The second approach adopts an open-loop feedback control strategy,
aimed at providing optimal reallocation strategies as functions of the state
of the network. A functional optimization problem is proposed, and a neural
network-based technique is used in order to approximate its solution.
In [14] and [15], the authors propose an adaptive global strategy, which
handles link congestion and channel conditions in multimedia satellite net-
works. The overall control system also includes CAC, an aspect mentioned
later in this Chapter. However, we include these papers in the present
group, in order to emphasize the presence of adaptive coding. In [15], in
particular, a performance comparison is presented for a xed admission
control strategy versus the new adaptive CAC scheme for a Direct Broadcast
Satellite (DBS) network with Return Channel System (DBS-RCS). The trac
considered includes both Available Bit Rate (ABR) trac and Variable Bit
Rate (VBR) trac. The dynamic channel conditions in the satellite link
consider time-varying error rates due to external eects, such as rain. In order
to maximize the resource utilization, for both xed and adaptive approaches,
assignments of the VBR services are determined based on the estimated
statistical multiplexing gain and other system attributes, namely, video source,
data transmission and channel coding rates.
Papers from [16] to [37] deal with the RRM topic from the bandwidth allocation
point of view.
In interactive satellite networks, the delay between a request and the recep-
tion of the reply is a key issue, due to the basic latency of the satellite link. The
solution oered in [16],[17] for GEO satellites comprises a prediction-based
resource-allocation policy and a scheduling time period as short as possible.
A resource-allocation problem is mathematically formulated as a non-linear
integer programming problem, considering uncertain future trac conditions,
and the author develops a real-time heuristic solution algorithm. Computa-
tional complexity analysis and extensive simulation results demonstrate the
very good performance of the proposed method in terms of computational
eciency and heuristic solution quality.
In [18],[19] the authors propose a scheme for Dynamic Bandwidth Alloca-
tion Capabilities (DBAC) that is not based on classical circuit-switching, but
allows changing the capacity of each connection dynamically without tearing
down and setting up the connection. The analysis of the proposed DBAC
scheme shows a signicant increase in the overall utilization of the capacity,
compared to a plain circuit-switching solution.
48 Erina Ferro
The work in reference [20] focuses on resource allocation and CAC issues
in broadband satellite networks; the authors propose a resource allocation
algorithm that integrates three classes of services at the MAC layer: Constant
Bit Rate (CBR), bursty data, and best eort services. They propose a Double-
Movable Boundary Strategy (DMBS) in order to establish a resource-sharing
policy among these service classes over the satellite uplink channel. DMBS is
a dynamically controlled boundary policy, which adapts the allocation deci-
sion to variable network loading conditions. CAC and bandwidth allocation
decisions are taken at the beginning of each control period, after monitoring
the lling level of the trac request queues. The authors dene a threshold
level for the bursty data request queue in order to regulate the CAC process.
The impact of the queue threshold value on the performance of the DMBS
allocation policy is evaluated. A dynamic variation of this metric is also
proposed to enhance the system response for interactive applications.
Reference [21] provides an overview of Broadband Satellite Access (BSA)
systems, with an emphasis on resource management and interworking tech-
niques to support IP-based multimedia services. Some key innovations are
described, including Combined Free/Demand Assignment Multiple Access
(CF/DAMA) for dynamic satellite bandwidth allocation, and an architecture
for DiServ provisioning over BSA systems. A CF/DAMA scheme for dynamic
satellite bandwidth allocation is also the subject of the work proposed in [22];
this scheme allows the return channel capacity to be eciently shared among
many user terminals.
In [23], the resource allocation problem that arises in the context of a
Medium Earth Orbit (MEO) satellite system with half-duplex communication
capabilities is addressed. MEO satellite systems are characterized by relatively
large propagation delays and intra-beam delay variations, which result in
resource consumption. The authors propose a channel classication scheme,
in which the available carriers are partitioned into classes and each class is
associated with a range of satellite propagation delays.
References [24] and [25] deal with the problem of QoS provisioning for
packet trac. In [24], the authors address the problem by considering a
resource allocation scheme that takes advantage of proper statistical trac
modeling to predict future bandwidth requests. This approach takes into
consideration DiServ-based trac management to guarantee QoS priority
among dierent users. Moreover, the satellite onboard switching problem is
also addressed by considering a suitable implementation of the DiServ policy
based on a cellular neural network.
In [25], the problem of providing guaranteed QoS connections over a
Multi Frequency - Time Division Multiple Access (MF-TDMA) system that
employs Dierential Phase Shift Keying (DPSK) is studied. The problem is
divided into two aspects: resource calculation and resource allocation. The
authors present algorithms for performing these two tasks and evaluate their
performance in the case of a Milstar Extremely High Frequency - Satellite
Communication (EHF-SATCOM) system.
Chapter 2: ACTIVITY IN SATELLITE RESOURCE MANAGEMENT 49
with ATM and IP QoS frameworks) and a multi-level service segregation into
a large number of users with diverse characteristics. WFBoD is also integrated
with the CAC process. Simulation results show that WFBoD can guarantee
QoS for both non-real-time and real-time VBR ows.
A consolidated approach for Voice over IP (VoIP) over satellite networks
based on the ETSI DVB-RCS standard is adopted in [36]. This paper
addresses the role of Bandwidth on Demand (BoD) in the optimization of
VoIP bandwidth allocation, and assesses the impact of BoD mechanisms on
voice quality. The tradeo between voice quality and bandwidth eciency
is investigated under dierent DVB-RCS-specic capacity request/allocation
strategies; it is demonstrated that DVB-RCS provides an ecient platform
for the integrated support of a variety of satellite VoIP applications.
Reference [37] compares BoD in an MF-TDMA environment and Single
Carrier Per Channel (SCPC) from a practical perspective and evaluates the
economical advantages of BoD.
Papers from [38] to [41] treat RRM from the power allocation and control
scheme perspective.
terminals at high rates. Since satellite transmitter resources are expensive and
there can be many spot-beam coverage cells within the satellite service area,
it is attractive to look for some form of agile-scanning beam system and to
time-share these precious resources. An optimized design of both the multi-
beam antenna pattern and the scheduling can further improve the eciency of
transmission and power management. The advantage of parallel multi-beams
in terms of spectral eciency and power gain is shown, and the issue of multi-
beam power allocation based on trac demands and channel conditions over
satellite downlinks with power and delay constraints is addressed. The study
indicates that the use of a parallel multi-beam scheme with optimum power
allocation can achieve a substantial power gain and a reasonable proportional
fairness. By coupling power allocation with multi-beam scheduling when there
are less active beams than cells, the authors show that a modest number of
active parallel beams suces to cover many cells eciently.
In [39], the author analyzes a power-sharing multiple-beam mobile satellite
system in the Ka band with high trac variations from one beam to another.
In order to cope with the multiple-beam varying trac problem, the author
proposes an oset reector antenna, fed through an equal phase-shift active
array. This active array consists of hundreds to thousands of equal phase-shift
elements.
A power allocation policy is developed in [40] for a multi-beam satellite
downlink, which transmits data to dierent ground locations over time-varying
channels. The packets destined to each ground location are stored in separate
queues and the server rate for each queue depends on the power allocated to
that server and the channel state, according to a concave rate-power curve.
A method for satellite network conguration is proposed in [41]. It controls
the transmitted power of multiple Earth stations, and establishes the received
power-dierences among them to generate the capture eect.
exist in requirements for bandwidth and oered load [46]. Obviously, once one
of such xed-structure policies has been selected, parametric optimization can
be adopted in order to choose the best values of parameters that minimize
a given cost function (or maximize a performance index).
As already mentioned, reference [15], besides considering adaptive coding,
also treats the RRM problem from the CAC point of view. This is also done
in [20] and [29],[30], among others. Reference [8] provides an account on CAC
in the more general wireless environment.
In [47], the authors combine CAC with the issue of optimal energy
allocation for communication satellites. The objective is to choose the requests
for transmission to serve so that the expected total reward is maximized. The
special case of a single energy-constrained satellite is considered. Rewards
and demands from users for transmission (energy) are random and known
only at request time. Using a dynamic programming approach, an optimal
policy is derived that is characterized in terms of thresholds. Furthermore,
in the special case where energy demand is unlimited, an optimal policy is
obtained in closed form.
In [48], a real-time trac handling strategy, including distributed CAC and
trac resource management schemes, is harmonized with an in-band signaling
technique for burst-based bandwidth requests and an eective policy for the
allocation of radio resources.
a particular number of beams S the call may handover into, in order to prevent
handover dropping during a call. The balance between new call blocking and
handover call blocking depends on the selection of predetermined threshold
parameters for new and handover calls.
In [51], a probabilistic resource reservation strategy for real-time services
was proposed, based on the concept of sliding windows to predict the necessary
amount of reserved bandwidth for a new call in future handover beams.
In [52], CAC and handover are based on user location. The system traces all
user locations in each beam and updates user handover-blocking parameters.
Reference [53] proposes an intra-satellite handover management scheme
for LEO satellites, called Q-WIN, specically tailored to the QoS needs of
multimedia applications. This scheme is based on priority queues, combined
with the sliding virtual window concept for call admission. Simulation results
conrm that, compared to the allocation schemes, Q-WIN oers low Call
Dropping Probability (CDP), thus providing for reliable handover of calls in
progress, acceptable Call Blocking Probability (CBP) for new calls and high
resource utilization.
In [54], a guaranteed handover scheme is proposed. According to this
method a new call is admitted in the network only if there is an available
channel in the current cell and, simultaneously, in the rst transit cell. When
the rst handover occurs, a channel-reservation request is issued to the next
candidate transit cell, and so on. If all channels are busy, the request is queued
in a FIFO list, until the next handover occurrence. The call is not forced
to terminate provided that an available channel has been reserved in the
meanwhile.
In [55], dierent queuing policies for handover requests are proposed. The
handover requests, queued up to a maximum time interval (which is a function
of the overlapping area of contiguous cells), are served according to a FIFO
or a Last Useful Instant (LUI) scheme (that is, a handover request is queued
ahead of any other requests already in the queue that have a longer residual
lifetime).
In [56], a novel inter-satellite handover management scheme tailored for
multimedia LEO satellite systems is proposed and evaluated. This scheme
relies on queuing handover requests of dierent service classes in separate
queues. The queue that stores handover requests of real-time services receives
higher priority.
and compared with common resource allocation processes. Within this class,
the bidirectional and possibly asymmetric nature of resource requests, the
existence of both booked (advance notication) and immediate resource
requests, the allowance of modications to resource requests and the multiple
resource constraints (e.g., bandwidth and power) present unique modeling
challenges. In particular, we can consider three fundamental components:
modeling the resource requests, modeling the fundamental resource allocation
algorithm and modeling the processing of individual resource requests.
In [58], the authors focus on modeling and evaluating the bandwidth
requirements of the next-generation of satellite communication technologies,
which will support future aeronautical applications. The authors interest is
on the real-time delivery of high-resolution weather maps to the cockpit as a
particularly demanding future application. In such scenario, the use of LEO
and GEO satellite networks for ecient data delivery is investigated. The
authors propose a joint uni-cast and broadcast communication technique that
oers bandwidth reduction.
In [59], a new analytical model for equal allocation of divisible computation
and communication load is developed. Equal load allocation is attractive in
multiple processor systems when real-time information on processor and link
capacity, which is necessary for optimal scheduling, is not available. This
model includes a detailed accounting of solution reporting time.
Reference [60] presents a generalized notation as well as graph algorithms
for resource management problems. Impairment graphs can be used for
frequency planning, whereas ow graphs are suitable for channel access
problems. To evaluate the performance of the resource management, service
criteria (such as blocking or Carrier-to-Interference ratio, C/I) or eciency
criteria (bandwidth requirements) are derived from the graphs. The resource
management techniques are applied to satellite networks with non-GEO orbits
that entail time-varying network topologies. As a simple example, the channel
assignment and capacity optimization of the EuroSkyWay system are shown.
For a deeper inspection, a comparison of Fixed, Dynamic and Hybrid Channel
Allocation schemes (FCA, DCA, HCA) for a typical MEO satellite scenario
is provided. The author also investigates satellite diversity and its impact on
bandwidth requirement and transmission quality.
http://www.satnex.org
https://newcom.ismb.it/public/index.jsp
http://www.ebanet.it/virtuous.htm
http://www.tesa.prd.fr/cost272/
This COST Action ended in the rst half of 2005 and was entirely
devoted to study aspects related to packet transmission via satellite. The
main objectives of COST Action 272 were the identication of key require-
ments, analysis, performance comparison, architectural design and protocol
specication of packet-oriented satellite communication systems, with a clear
focus on Internet-type system concepts, applications and protocols/techniques
across the various layers. This Action rstly assessed the interesting satellite-
specic market segments and came up with a clearly focused set of reference
scenarios (global/regional, GEO/non-GEO, broadcast/multicast/interactive,
QoS/best-eort, all-IP/hybrid, etc.) as a basis for further research and de-
velopment work, also providing some interesting technical solutions. COST
Action 272 was the continuation of COST Action 253 (Service Ecient
Network Interconnection via Satellite) [65] and the starting point for the
SatNEx Consortium, which elaborated the SatNEx NoE proposal.
http://www.isi-initiative.eu.org/
strategic relevance for Europe, and identies medium and long term strategic
objectives. Key research themes of ISI are cited in [66]; among them, RRM
research topics are addressed in various points of the ISI research vision.
In particular: (i ) cross-layer design of RRM techniques, with cross-layer
information coming from adaptive physical layer and QoS requirements from
upper layers, to achieve optimum performance of mobile broadband mul-
timedia satellite services, is one of the key research items; (ii ) advanced
RRM techniques can provide optimum use of the scarce spectrum resource
and contribute to lowering the level of electromagnetic radiation in the
hybrid terrestrial/satellite network environment; (iii ) novel RRM protocols
are considered, which include Medium Access Control (MAC) and Usage
Parameter Control (UPC) mechanisms for the QoS provision under fairness
constraints.
2.7 Conclusions
The goal of RRM is to optimize capacity utilization and QoS in satellite links,
in the presence of trac ows generated by services with dierent require-
ments. The best results are obtained with the cooperation of the protocols
operating at dierent architectural layers, i.e., through a cross-layer approach,
while maintaining the principle of layer separation. A possible grouping of
the RRM techniques in the literature can be: frequency/time/space resource
allocation schemes, power allocation and control schemes, and call admission
control and handover algorithms. For each of these groups, this Chapter
reviews the current results in the literature, even if the survey is far from
being exhaustive.
Some ongoing research projects in Europe that consider the RRM problem
are cited, and the reader is encouraged to visit their Web sites for further in-
formation. Among these projects, the SatNEx Network of Excellence deserves
special attention. It combines the research activities of 22 European institu-
tions, with proved excellence in satellite communications. The realization of
this book has been made possible due to the SatNEx support.
References
1
UC3M - Universidad Carlos III de Madrid, Spain
2
UVI - Universidad de Vigo, Spain
3
INFOGLOBAL, Spain
4
AUTh - Aristotle University of Thessaloniki, Greece
5
UToV - Universit`a degli Studi di Roma Tor Vergata, Italy
6
RWTH - Rheinisch -Westfalische Technische Hochschule Aachen, Germany
7
CNIT - University of Catania, Italy
3.1 Introduction
enabling this growing role of satellites in the Internet world. Satellite solutions
are being used for both broadcast/multicast applications and point-to-point
services. End-user access combines multicast and point-to-point services while
content distribution to the edge of the Internet (i.e., to service providers
points-of-presence serving access local loops) is a true multicast application.
Geostationary Earth Orbit (GEO) satellites and Low Earth Orbit (LEO)
constellations essentially play a complementary role, in order to provide this
complete range of services. Due to the large amount of capacity they provide
and their low-latency characteristics, LEO systems are very well suited for
point-to-point high-quality services while GEO solutions are very ecient for
both broadcast/multicast oerings and access services including a signicant
percentage of multicast data. To support the dierent services it is important
to consider their Quality of Service (QoS) requirements.
This Chapter mainly describes QoS requirements for multimedia services
based on international standards. Section 3.2 shows a classication of ap-
plications according to error and delay tolerance, as well as performance
characterization of traditional and multimedia applications. This work is
based on the ITU G.1010 [1] standard that has been adopted by other
standardization bodies like 3GPP. Section 3.3 presents main QoS support
models over IP networks, while Section 3.4 shows main concepts for the
transmission of multimedia and broadcast services over satellite networks.
Finally, Section 3.5 presents experimental results of application performance
over a real platform; the main interest here is to present QoS results on
classical and emerging applications.
ITU is in Recommendations Y.1541 [2], F.700 [3], and G.1010 [1]. Applications
have been classied in eight groups, according to the error tolerance and delay,
as summarized in Figure 3.1 [1],[4].
Fig. 3.1: End-user QoS categories mapping. This gure is reproduced with the kind
permission of ITU.
The ETSI Broadband Satellite Multimedia (BSM) [5] working group pro-
vides technical reports and standards establishing a framework to specify QoS
requirements for broadband satellite networks based on the Internet protocol
suite. These standards (following those developed in ETSI and other bodies)
identify how Internet quality-related standards can be adapted, translated or
made transparent to satellite transmission protocols and equipment. Some of
the results of this standardization work have been the denition of the protocol
stack architecture shown in Chapter 1 (Section 1.5), where lower layers depend
on satellite system implementation (satellite-dependent layers) and higher
layers are those typical of the Internet protocol stack (satellite-independent
layers).
70 Jose Ignacio Moreno Novella, Francisco Javier Gonz
alez Casta
no
Conversational voice
for one-way transmission delay (assuming that echo control has been applied)
[7]:
0 to 150 ms: preferred range (below 30 ms the user does not notice any
delay at all, whereas above 100 ms the user does not notice delay if echo
cancellation is provided and there are no distortions in the link)
150 to 400 ms: acceptable range (but with increasing degradation)
Above 400 ms: unacceptable range
We should remember here that there are three types of satellite systems:
LEO, MEO and GEO. Due to their dierent distance to Earths surface, the
propagation delay for the transmitted signal (from Earth to the satellite and
back to Earth) varies from 10 ms to 250 ms (see Section 1.2). This means
that for LEO and MEO satellite systems the preferred range described above
is achievable. However, a GEO system cannot achieve an end-to-end delay
below 250 ms. This means that, according to the satellite system used, the
network designer should be very careful when selecting operational modes.
Other classes have looser requirements and they may be supported by GEO
72 Jose Ignacio Moreno Novella, Francisco Javier Gonz
alez Casta
no
satellites.
The human ear is highly intolerant to short-term delay variation (jitter ),
so it should be kept really low. It has been suggested that 1 ms is an adequate
limit. However, the human ear is tolerant to moderate distortion of the speech
signal. An acceptable performance is typically obtained with FER up to 3%.
Finally, a connection for a conversation normally requires the allocation of
symmetrical communication resources.
Videophone
Videophone requires a full-duplex system, carrying both video and audio, and
it is intended for a conversational environment. Therefore, the same delay
requirements of conversational voice will apply, i.e., no echo and minimal
eect on conversational dynamics, with the added requirement that audio
and video must be synchronized within certain limits to provide lip-synch
(i.e., synchronization of the speakers lips with the words the end-user hears).
In fact, it will be dicult to meet these requirements, due to the long delays
incurred in video codecs. Human eye is tolerant to some information loss,
so that some degree of packet loss is acceptable. It is expected that high
performance video codecs will provide acceptable video quality with FER up
to about 1%. In satellite networks, the same considerations for conversational
voice hold in this case.
Interactive games
Interactive games are games that use the network to interact with other users
or systems. Requirements for interactive games are very dependent on the
specic game considered in terms of bandwidth and delay. Many interactive
games try to exchange high volumes of data, but demand very short delays,
and a delay of 250 ms is reasonable.
Telnet
Telnet (TELetype NETwork ) is a network protocol used on the Internet or
local area network connections. In this context, Telnet refers to the program
that provides the client part of the protocol. It allows a remote server access.
Due to the interactivity of the program, Telnet needs a low delay to allow
a user perception of interactivity. This application is included here with a
requirement for a low delay in order to provide back instantaneous character
echoes. By extension we could consider in the same service/application group
any remote access applications like rlogin (remote login) or ssh (secure shell ).
Web-browsing
The main performance factor is the visualization response time, after a Web
page has been requested. A value of 2-4 s per page is proposed. However, a
decrease up to a target of 0.5 s would be desirable.
74 Jose Ignacio Moreno Novella, Francisco Javier Gonz
alez Casta
no
Audio streaming
One-way video
Still image
Regarding still images, the human eye is tolerant to information loss. However,
single bit errors can cause large disturbances in still image formats. Therefore,
it is generally expected that there will be zero errors in the transmission of
still images. Delay requirements are low.
76 Jose Ignacio Moreno Novella, Francisco Javier Gonz
alez Casta
no
This service class applies when the end-user, typically a computer, sends and
receives data les in background. It is a classical data communication scheme
where the destination is not expecting data within a certain deadline. Hence,
the propagation delay (like that of satellite systems) is not that important
in this case. However, error control is very important, since errors should be
kept to very low levels (in the satellite scenario such feature calls for adequate
coding protection and retransmission schemes).
For background trac, the fundamental QoS characteristics are:
Fax
This table is reproduced from Radio Resource Management across Multiple Protocol Layers in
Satellite Networks: A Tutorial Overview, P. Barsocchi, N. Celandroni, F. Davoli, E. Ferro, G.
Giambene, F. Casta no, A. Gotta, J. I. Moreno, P. Todorova, International Journal of Satellite
Communications and Networking, Vol. 23, No. 5, pp. 265305, September/October 2005. ISSN:
15442-0973. 2005.
c Copyright John Wiley & Sons Limited. Reproduced with permission.
Best Eort (BE): to provide the service in the same way as in the current
Internet, where there are no QoS guarantees, IETF recommends that the
DSCP value should be 000000 (bin).
Assured Forwarding (AF): The AF group contains four independent classes,
each with three dierent drop precedence values in the queues. There is no
specied algorithm for each value, but the dropping probabilities must
be increasing and the packets must be marked with AF DSCP value and
must arrive to the destination in the proper order. In case of congestion,
the dropping probability depends on the drop precedence value.
Expedited Forwarding (EF): EF is designed as the best group. It should
provide very small drop probability, latency and jitter. That is the reason
why this service is sometimes regarded as a Virtual Leased Line (VLL).
This Per-Hop Behavior (PHB) is predestined to handle real-time applica-
tions like video streams. When EF packets enter a DiServ router, they
should be handled in very short queues and quickly serviced to maintain
lower latency, packet loss, and jitter. Throughput of the EF ow should
be limited to the value that can be handled by each node. It is necessary
to avoid the situation where the queue could overow and cause ow
degradation. IETF recommends that the EF class should be marked with
the DSCP value 101110 (bin).
Routers should allocate enough resources for the high priority DSCPs,
while the lower ones or the classical BE trac (DSCP 0) may use spare
resources. DiServ networks require access control in the edge routers, so that
only authorized users can inject packets with high priority DSCPs. Access
control is enforced by the shapers. Depending on the type of edge routers,
this access control can take place in dierent levels of detail. For instance, in
edge routers connecting the core network to the users (Access Routers, ARs)
this control follows a per-user and per-ow basis, since ARs will handle a
small trac load. However, for edge routers connecting the core network to
the Internet or other domains, this access control can only proceed at a very
rough level of detail.
Besides the QoS-enabled routers, another entity called QoS broker [13]
is used to control and to manage the network. This entity, for scalability
reasons, can be replicated in the network; moreover, the network can be
hierarchically divided into several areas, as proposed in [14]. In a simplied
way, the QoS broker manages and monitors the network resources in one
particular domain of operation. It also monitors the edges for incoming and
outgoing resource reservations/utilization. The information thereby acquired
is used in conjunction with the policy system information to take admission
control decisions and recongurations and to convey them to the routers. A
QoS broker is then an entity that takes Service Admission Control decisions
and performs network device conguration, according to a set of conditions
imposed by the network administration entities (e.g., Authentication, Autho-
rization and Accounting, AAA, System) with the goal of achieving end-to-end
80 Jose Ignacio Moreno Novella, Francisco Javier Gonz
alez Casta
no
QoS, also over dierent networks. The QoS broker may also be responsible for
managing inter-domain communications with neighbor QoS brokers, so that
QoS-enabled transport services are implemented in a coordinated way across
various domains.
Since IntServ requires resource reservation, it is the most evident scenario
to integrate a QoS broker. In IntServ a RSVP enabled router may consult the
QoS broker (using the Common Open Policy Service, COPS, protocol) about
the decision to take when receiving RSVP path or reservation messages. The
decision taken by the QoS broker is normally conveyed in a COPS message
and then enforced by the router. In DiServ, the edge routers need to perform
admission control and may also outsource the decision to the QoS broker. This
process can take place when the DiServ access router detects a new trac;
the level of detail to dene new trac may vary, as we just explained. QoS
brokers functionally can go beyond taking policing decisions; generally they
are also in charge of managing the network. The actual role of the QoS broker
may adapt to the dierent scenarios and business models. For instance in the
scenario described in Section 3.4.1, the recovery provider may consult a QoS
broker before gathering data from the content providers and sending it to the
satellite so that this broadcasts it.
Many existing approaches combine IntServ and DiServ: IntServ in the
access part of the network and DiServ in the core network. Of course,
solutions based on other paradigms also exist and are even complementary
to these ones. For example, [15] proposes new routing schemes over high
availability networks.
Tandberg [19], etc.). In general, they did not provide user terminals, due to
the deep dierences between professional and user markets in terms of quality
goals, sales support, etc. For this reason, many PC peripheral manufacturers
entered the competition with DVB-S boards and boxes (Adaptec, Terratec
[20], Technotrend, etc.).
MPE stimulated the entrance of satellite IP services into the mass market.
For applications requiring interactivity (bidirectionality), the services initially
relied on auxiliary terrestrial technologies for the return channel, wired
(POTS, ISDN or Frame Relay) or wireless ones (GSM, GPRS or similar).
There was a clear lack of a satellite technology to eliminate this terrestrial
dependence. In 1999, the DVB-RCS standard covered this gap. Despite of
some initial interoperation problems (usually leading to the election of the
same supplier for the whole communications chain), the standard has matured
in the last years. Several operators have selected it (Satlynx, Hispasat [21],
etc.).
In the last two years the new protocol DOCSIS for Satellite (or DOCSIS-S)
is emerging as an alternative to DVB-RCS, based on the well-known DOCSIS
standard for cable networks and mostly promoted by American vendors
and providers (Viasat [22] and WildBlue [23]). Compared with DVB-RCS,
DOCSIS-S exploits the economies of scale of silicon designs for cable infras-
tructure, and takes advantage of a huge selection of Operations and Business
Support Systems platforms from the cable market. However, DOCSIS-S is still
a vendor-promoted protocol, not a real standard; thus interoperability and
availability of suppliers are an issue.
These new protocols enable new multimedia application scenarios based
on multicast and broadcast distribution. One of these applications is distance
learning with or without interactivity. In it, a teacher provides a lesson to a
number of remote students using multicast video and audio streaming and
additional aids such as a digital blackboard, slides, etc. When interactivity
(return channel) is available, students may send questions to the teacher either
by chat or by their own microphone and webcam, so that the other students
may follow the question and the response. In this case, because of the delay
induced by the satellite itself (500 ms for a GEO system), the media access
protocol for the return channel (100 - 300 ms) and the video codecs (100 -
1000 ms), a voice handshake similar to a walkie-talkie must be implemented
in order for the teacher and the student not to interfere. Also, when there
is a large audience, the application must provide specic controls so that
the teacher may act as moderator, granting or denying participation to the
students. At present, distance learning systems (Centra [24]) and services
(Hughes [25], Gilat [16]) are commercially available and widely deployed.
Another common multicast application not requiring real-time operation
that largely benets from a return channel when available is massive content
distribution, where a central station delivers common multimedia contents to
a large population of remote clients (with a reception acknowledge mechanism
when interactivity is provided). The typical data losses and corruptions are
Chapter 3: QoS REQUIREMENTS FOR MULTIMEDIA SERVICES 83
The Content Providers are the primary sources for video applications,
i.e., they generate the real-time data. We can suppose that a content provider
is located just before the satellite hop or, more generally, that the Internet
spreads between them.
The Recovery Service Provider consists of a streaming proxy that has
access to satellite resources and manages the retransmission priority. In fact,
retransmission requests can be listed according to a priority that is related to
the time constraints of the recovery phase, but also to the type of service
and the customer class the service pertains to. It is worth noting that
Chapter 3: QoS REQUIREMENTS FOR MULTIMEDIA SERVICES 85
Every content provider sends a multimedia stream over the satellite link
using a guaranteed bandwidth. According to Figure 3.3, there are N content
providers and, therefore, N statically allocated channels. Data are sent to the
streaming application after a playout delay (e.g., D seconds). Each receiver
uses a local proxy buer to store at most D seconds of streaming data,
i.e., data to be played within D seconds. This elastic buer , that empties
at constant rate and lls at variable rate, permits to continue the playout
during the satellite channel outage, as long as sucient information has
been previously stored in the buer. When a channel outage happens, the
receiver (i.e., the proxy located at the receiver group) leaves a blank space
in the application buer and, when the channel is again available, sends a
retransmission request to a Recovery Service Provider (RSP), in order to ll
the hole in the elastic buer. All the retransmissions use a shared channel, e.g.,
the (N +1)-th channel. We propose that, in this recovery channel, content
providers retransmit the packets using a transport protocol with the Additive
Increase Multiplicative Decrease (AIMD) scheme [27],[28]. In particular, the
number of packets a sender can put on the network is limited by a congestion
window (cwnd ) that is managed as follows:
T, [t0 , t1 ] (3.1)
1
r(, ) = (3.3)
T D, + T O,
where:
2b(1 )
T D, = RT T p (3.4)
(1 + )
(1 2 )b
T O, = T0 min 1, 3 p p(1 + 32p2 ) . (3.5)
2
Thus, from the bandwidth value, the proxy calculates and parameters
of the AIMD transport scheme, which will be communicated to every content
provider that has to retransmit data.
Chapter 3: QoS REQUIREMENTS FOR MULTIMEDIA SERVICES 87
Here we modeled the link with a good-bad process with exponentially dis-
tributed permanence times for both good and bad states. Real-time broadcast
applications are always on, with a xed bandwidth usage. Also the bandwidth
available for retransmission is xed and guaranteed by the distribution sys-
tems, and the playout delay of each receiving application is the same for
all users. Furthermore, we represent each multicast group with a single user
that acts as the worst-case user, so that the good-bad process actually refers
to the time distribution of periods in which link failure occurs or not, for
an entire multicast group. This assumption simplies the simulative analysis
while preserving the correctness of results; in fact, in our system, overlapping
retransmission requests sum and turn into a single multicast retransmission.
Finally, no codec adaptation has been considered.
As for the transport protocol, we have tested UDP-like retransmissions
(the evaluation of TCP and AIMD-like protocols will be considered in a future
study). However, preliminary results obtained with UDP, justify the study of
connected transport protocols to enhance system performance.
As a reference, let us consider a scenario with N = 10 Content Providers
generating an aggregate of 20 Mbit/s (each Content Provider generates at a
xed, but dierent rate of about 2 Mbit/s, to avoid synchronization eects),
and a 6 Mbit/s bandwidth is guaranteed for recovery. The playout delay of
users is 20 seconds, and the transport protocol is UDP. The average duration
of the bad state of each link has been set to 5 s; we have obtained the results by
changing the average duration of the good state and by collecting simulation
results over 200000 seconds.
Figure 3.4 shows the aggregate amount of retransmitted data when the
adopted retransmission priority is proportional to the bandwidth of the
real-time stream. Curves are normalized to the aggregate number of bytes
requested by users. The lower curve in the Figure represents data retransmit-
ted for retransmissions that the system was able to complete. It is clear that
a great number of retransmissions is stopped due to lack of resources as soon
as the link error probability exceeds 0.2. Furthermore, for error probability
greater that 0.1, the number of unrecoverable bytes increases (due to outage
periods longer that the playout delay, which are now more frequent).
For the same scenario, Figure 3.5 depicts the aggregate delivered data
and the amount of data lost due to link failures during the retransmission
procedure. Lost data are normalized to retransmitted data and not to re-
quested data, to give a correct measure of the needs of a connected transport
protocol during the recovery procedure. Note that system performance is not
satisfactory even with values of the link failure probability as small as 0.1,
which is not so much for users.
88 Jose Ignacio Moreno Novella, Francisco Javier Gonz
alez Casta
no
Fig. 3.5: Delivered and lost retransmitted data using a retransmission priority
proportional to the required bandwidth.
Chapter 3: QoS REQUIREMENTS FOR MULTIMEDIA SERVICES 89
Many of the application QoS requirement studies have been done in current-
day Internet networks, for instance many of the considerations shown in
Section 3.2. The aim of this Section is to describe the work carried out in
a Next-Generation Network (NGN) prototype to characterize the application
QoS requirements in such a kind of network. Results refer to real experiments
on application behavior.
The test bed was an all IPv6 network; Figure 3.6 depicts the network
architecture. Two access technologies, one wired (Ethernet) and one wireless
(IEEE 802.11), where employed. This can represent a subset of all the access
technologies a future network operator may oer to its customers. Users,
employing the appropriate devices could connect to any of the two networks. In
the test bed, wireless connectivity is assured using commercial SMC WLAN
cards with prism driver. Satellite links were not available in our test bed due
to the complexity and high costs in using these links for experiments. We
however believe that the obtained results may provide good insights also for
general networks (including satellite links) in particular for what concerns
the characterization of application behavior in NGNs with features such as
mobility or QoS, using IP as convergence layer.
Our network was divided in 2 parts: (i ) an access part where the users
connect to via either Ethernet or WLAN (i.e., WiFi); (ii ) the core network.
The latter is connected to the 6 bone (IPv6 Internet) via an Edge Router
90 Jose Ignacio Moreno Novella, Francisco Javier Gonz
alez Casta
no
and to the access part and the users terminals via the Access Routers. The
core network hosts two servers supporting dierent functionalities of NGNs.
These functionalities include aspects that should be present in next-generation
commercial mobile networks, such as user authentication and accounting;
mobility and QoS management were also controlled by these servers. All the
nodes (including the routers) are general-purpose machines (Pentium III and
IV PCs). All run Red Hat 7.2 with Linux-2.4.16 kernels. More details about
the test bed can be found in [30].
QoS is based on DiServ with access control. This access control is
performed on the Access Routers on a per ow and per user basis. The Access
Router outsources the admission decision to the QoS broker, an entity located
in the core network able to take this decision and congure the routers with
appropriate parameters.
The test bed here described is composed of general-purposes machines and
it is just a mere representation of what a next network infrastructure may be,
but we believe that the results obtained in it can provide us early and valuable
hints about the applications specic QoS requirements when using NGNs.
We performed on-site real measurements of end-user performance percep-
tion and application characterization under dierent situations that can be
present in NGNs, as detailed in [30] and [31].
The tested applications correspond to conversational services and interac-
tive services. All of them were IPv6 applications. Conversational services were
provided by Robust Audio Tool (RAT) for conversational voice and Quake 2
and Tetrisnet for games. Again, for interactive services we employed RAT
(for audio streaming) and VideoLan for video streaming. Conversational and
interactive services characterization was already described in Section 3.2; the
added value of this Section is to show experimental studies obtained in an
NGN prototype and check the dierences.
Two kinds of tests were performed: the rst was intended to characterize
application behavior in terms of bandwidth needs (including burstiness); the
second one experimented with user tolerance to delay, jitter and packet loss.
We will show and analyze the results; the tests methodology is further detailed
in [30].
For the rst type of tests, ethereal [32], a network analyzer software,
was used to capture the packets and tcpstat was adopted to analyze the
application trac. Two parameters were evaluated: packet size and packets
per second. Mean, min, max, deviation and deviation/mean values were
calculated for those two parameters. First, the results are presented and then
some conclusions drawn. Audio stream has constant packet size and very small
variation in packet rate. For video stream we have a nearly constant packet
size and a small variation in packet rate. For conversational applications the
results are as follows:
The Tetrisnet game generated a very low trac, but with great variation
in packet size and rate.
Quake 2 generated more trac and also had remarkable variations in
packet size and a small variation in packet rate.
The obtained requirements are similar to those presented in Section 3.2 for
nowadays networks. The specic aspects of NGNs can be found mainly in the
fact that network QoS is priced and tailored for the users. As such, we found
that low prole users, paying less for the transport service where much more
tolerant with their requirements. Besides, for some users, more than having
better QoS, the important aspect was the unique NGN ability of supporting
all kinds of applications and having seamless inter-technology handovers with
the capability of taking the best prot from the available access technologies.
3.6 Conclusions
This Chapter stressed on the importance of providing QoS for data transport.
Some applications have stringent QoS requirements, mainly related to delay
and jitter. Satellite networks may suer from too high delays so QoS aspects
should be considered very carefully. On the other side, satellite networks
are very well suited for multicast and broadcast transmissions as well as
for DRT services. For about 6 years now, satellite networks are also a
commercial solution for completely dierent scenarios: unicast bidirectional
services like broadband Internet access. These scenarios, requiring strong QoS
requirements, need a careful analysis and the implementation of mechanisms
to support QoS as discussed in the next Chapters of this book.
References
Editor: Mara Angeles Vazquez Castro1
1
UAB - Universitat Autonoma de Barcelona, Spain
2
CNIT - University of Genoa, Italy
3
CNR-ISTI - Research Area of Pisa, Italy
4
CNIT - University of Siena, Italy
5
FhI - Fraunhofer Institute - FOKUS, Berlin, Germany
4.1 Introduction
The enormous advantages of physical layer adaptivity for adequate operation
of wireless systems over widely-varying channel conditions have been widely
proved. However, an optimal adaptation strategy for a given set of resource
constraints requires a joint optimization across layers. Such a cross-layer
optimization is becoming a new paradigm for wireless system design, which
can be extraordinarily complex as the number of optimization parameters and
layers grows.
In this Chapter, we present a comprehensive literature survey of existing
cross-layer design approaches for resource management optimization in order
to draw some preliminary conclusions on adaptive satellite systems.
96
Mara Angeles V
azquez Castro
In [3], the authors provide a cross-layer optimized design of the MAC layer
under Rayleigh fading, based on a Markov chain formulation. System in-
formation and physical layer measurements are jointly considered with the
intention of maximizing the overall throughput. In [4], a discussion on protocol
harmonization for MAC and physical layer for IEEE 802.11 is addressed.
The authors investigate the eects of packet length, transmit power and
bit-error rate. Their results show that minimum energy is consumed for an
optimal transmission power, which is proportional to the packet length. In
[5], the joint eects of nite length queuing at MAC layer and adaptive
coding and modulation are analyzed. The performance gain is quantied
when applying cross-layer design to maximize throughput. In [6], the authors
describe the ow of information between PHY and MAC layers in order to save
power and to improve overall performance via an adaptive distributed MAC
(uplink) protocol. Several authors propose link layer adaptation to reduce the
transmission errors based on current channel conditions. In [7], around 50%
improvement in goodput and 20% improvement in transmission range is shown
to be obtained by using the optimal Maximum Transfer Unit (MTU) for a
particular BER. In [8], it is shown that an 18-25% throughput gain may be
obtained by increasing the frame length, depending on radio conditions. In [9],
the authors focus on the cross-layer optimization of the scheduling policies to
assure queuing stability. In [10], the issue of jointly optimal energy allocation
and admission control for communication satellites in Earth orbit (LEO, MEO
98
Mara Angeles V
azquez Castro
In both PEP types, the goal is to shield high-latency or lossy satellite network
segments from the rest of the network, in a transparent way to applications.
A critical issue in PEP is the design of buers and related management
rules and sizes. Interesting proposals envisage the adoption of Active Queue
Management (AQM) at the MAC layer for improving the TCP performance.
In AQM, when the router determines that the bandwidth is fully utilized,
packets are dropped even when the queue is not full in order to reduce the
data injection rate of the TCP sender [35].
In [36], experimental quantitative performance metrics can be found; they
are obtained by using H.264 and UDP-Lite for the next-generation transport
of IP multimedia. A cross-layer technique is proposed that features partial
checksum coverage for the packet header allowing the application to signal
implicitly the link CRC coverage. The sending end-host implicitly signals (i.e.,
without explicit control messages) by using a modied transport header, such
as UDP-Lite. This work discusses the architectural implications for enhancing
performance of a wireless and/or satellite environment.
Concluding comments
From this literature review, some general conclusions can be drawn as follows:
The ISO/OSI reference model and the Internet protocol suite are based on a
layering paradigm. The target of the ISO/OSI reference model was to dene an
open system so that dierent network elements can interwork independently
of manufacturers. The OSI protocol stack entails 7 dierent abstraction levels,
addressing separately communication tasks. Each protocol solves a specic
problem by using the services provided by modules below it and giving a new
service to upper layers. The main interest here is on IP-based scenarios. The
Internet protocol stack is slightly modied with respect to the ISO/OSI one
and entails 4 layers, as depicted in Figure 4.1.
IP packets lost due to errors induced by the wireless channel are interpreted
as signals of congestion at the TCP level, thus lowering the bit-rate
(congestion window). A long time is needed to recover (in terms of TCP
goodput) after a loss event especially when multiple losses occur that cause
a TCP timeout.
Radio resources can be also allocated to mobile users that have bad channel
conditions.
104
Mara Angeles V
azquez Castro
Intra-system and inter-system hando procedures can take a too long time
that leads to connection interruption or higher layer protocol timeouts.
Fig. 4.2: (a) Possible cross-layer air interface based on a global coordinator; (b)
Possible MAC-centric cross-layer air interface.
4.5 Conclusions
1
CNIT - University of Siena, Italy
2
DLR - German Aerospace Center, Institute of Communications and Naviga-
tion, Wessling, Germany
3
UniS - Centre for Communication Systems Research, University of Surrey,
UK
4
AUTh - Aristotle University of Thessaloniki, Greece
5.1 Introduction
QoS are governed by MAC protocols that are used in the uplink case to
manage the transmissions of dispersed terminals to an Earth station through
the satellite and that are also employed in downlink to schedule the dierent
transmissions from the Earth station to the terminals. Hence, the two essential
components of the MAC layer are: access protocols and scheduling techniques.
These are also the main targets of this Chapter.
The studies carried out in this Chapter are related to Scenario 1 for what
concerns S-UMTS (see Chapter 1, Section 1.4); however, the last part of this
Chapter refers to a TDMA-like air interface.
Since early 1960s, satellite access protocols have attracted the attention
of various researchers. These protocols control the access of a station to
the transmission medium. For terrestrial networks, where the transmission
medium could be a coaxial cable or a twisted pair, several MAC protocols
such as Ethernet, Token Rings and Token Buses have matured. However, these
protocols are not suitable for satellite networks. Although the functionalities
required and the users QoS requirements are similar, the design of a satellite
access protocol is more complicated and restrictive due to its operating
environment. In brief, there are ve reasons why many access protocols
designed for terrestrial networks are not suitable for satellite ones [1]:
In the access protocol design phase, there are several factors to be taken
into account. One of them is the type of applications that would traverse
the satellite network. The trac pattern the satellite network is expected
to support is also a main input to the design process. As new network
technologies and applications emerge, access protocols also evolve accordingly.
Generically, there are ve main access protocol categories:
Free assignment.
Fixed assignment protocols were the initial access protocols being used in
commercial systems. However, because they were inecient, newer proposals
were demand-assignment protocols. The main application at that period was
telephony and thus, xed demand-assignment was proposed. Later, the need
to support packet-switched data network has led to the introduction of random
access protocols to satellite networks in early 1970s. Although improvements
for the protocols in this class have been proposed for satellite, their low
upper bound utilization has encouraged researchers to seek for alternatives.
The result is the use of variable demand-assignment protocols. Based on
the buer state, users compute and send resource requests. The requested
resource will be allocated for a nite period, usually in terms of a number
of frames. With the increasing need to support multimedia trac, the access
protocol has to be able to manage trac ows (i.e., trac classes) with distinct
QoS requirements. As a response, hybrid protocols have been proposed,
combining diverse resource allocation mechanisms for dierent trac types.
For instance, to support real-time inelastic trac, xed demand assignment
coupled with additional admission control could be used while for elastic data,
a combination of variable demand-assignment and free assignment (e.g., a sort
of round-robin allocation) could be the right choice.
In the following sub-Sections we examine random access protocols for
S-UMTS. We begin by describing the current proposals for random access
in S-UMTS and continue with an overview of PRMA-like schemes. Finally,
we examine how PRMA can be adopted by S-UMTS and which cross-layer
approach can be adopted to optimize the access protocol performance.
Physical Channels
DPDCH Dedicated Physical Data Channel
DPCCH Dedicated Physical Control Channel
PRACH Physical Random Access Channel
P-CPICH Primary Common Pilot Channel
S-CPICH Secondary Common Pilot Channel
P-CCPCH Primary Common Control Physical Channel
S-CCPCH Secondary Common Control Physical Channel
SCH Synchronization Channel
AICH Acquisition Indicator Channel
PICH Paging Indicator Channel
MICH MBMS Indicator Channel
Transport Channels
DCH Dedicated Channel
RACH Random Access Channel
BCH Broadcast Channel
FACH Forward Access Channel
PCH Paging Channel
Fig. 5.2: Structure of the RACH message part (slots are here shorter than the
access slots; in this case, a slot contains 2560 chips so that 15 slots correspond to 10
ms).
are 8 ASCs, numbered from 0 (highest access priority) to 7 (the lowest access
priority) [8]. ASC 0 shall be used for emergency calls. A PRACH sub-channel
denes a sub-set of the access slots. There are a total of 12 sub-channels.
Typically, every 8 frames the allocation pattern of the dierent access slots
to the dierent sub-channels repeats. The higher layers communicate to the
physical layer the available signatures and sub-channel groups for each ASC.
There are at most 16 PRACH channels per cell; each of them corresponds
to a dierent preamble scrambling code. On a given access slot of a PRACH,
up to 16 simultaneous transmissions are possible by using distinct (orthogonal)
signatures codes. A PRACH channel is dened by the following parameters:
preamble scrambling code, spreading factor for data part, available signatures
for each ASC, available sub-channels (i.e., slots) for each ASC and power
control information. Available sub-channels and signature codes are broadcast
through the BCH channel. When there is data to be transmitted, the UE
performs PRACH selection randomly. Then, MAC selects the appropriate
ASC for the trac type to be managed. Consequently, an access slot and a
signature are randomly selected among those available for the selected ASC.
In the PRACH access mechanism, the main dierence with respect to the
classical S-ALOHA system is that, besides the time of the transmission, the
UE also randomly chooses the signature and the scrambling code that will be
used to transmit the preamble.
Once the preamble is sent, the UE waits for an acquisition indication
(a sort of acknowledgment message) sent by the Node-B on the Acquisition
Indicator Channel (AICH), a downlink physical channel that is received in
the entire cell or part of the cell in case of sectorization. This transmission
Chapter 5: ACCESS SCHEMES AND PACKET SCHEDULING TECH. 125
may fail for various reasons (interference from other terminals, fading, etc.).
If an acquisition indication is not received by the time the UE response
timer expires (pa ), the UE schedules a new transmission attempt on the
ASC resources. Note that this timer must be set to a value greater than
the estimated round trip delay. In the GEO satellite scenario, this timer can
be set to either 280 or 560 ms (the actual selection is made by upper layer
procedures) depending on the fact that the satellite is regenerating or not [2].
The system can provide dynamic persistency by publishing a dynamic
persistency value through the Broadcast Channel (BCH). This value should
be determined on the basis of an estimate of the number of contending UEs.
The ow chart in Figure 5.3 describes the random access protocol on the
RACH channel. For further details the interested reader should refer to 3GPP
specications [5].
The message transmission is performed with a scrambling code that is
one-to-one mapped to the scrambling code used for the preamble.
The remainder of this sub-Section is devoted to the performance evalu-
ation of RACH in a GEO bent-pipe scenario. A C++ simulator has been
implemented with a slightly simplied access procedure with respect to that
in Figure 5.3 (i.e., no power ramping has been considered; only one PRACH
has been simulated). We refer to a GEO bent-pipe satellite scenario, where the
Node-B that manages the RACH protocol is on the Earth: the UE exchanges
messages with the Node-B via the GEO satellite. In this study the Earth
station provides a feedback to the UE about its transmission attempts. Hence,
there is a round-trip propagation delay of about 560 ms to know the outcome
of this transmission (pa timer has been set accounting for such propagation
delay).
In order to evaluate whether the access attempt has been successful or not,
we have to consider collision events and the uplink interference conditions
typical of CDMA transmissions. An access (i.e., preamble transmission) is
considered successful if the following conditions are fullled [9]:
1. No other UE selects the same access slot and the same signature code on
the same PRACH (otherwise there is a collision event; the capture eect
is not considered in this case).
2. The received Signal-to-Interference Ratio (SIR) at the satellite exceeds a
given threshold, SIRt .
The above SIR issues (point 2) can be taken into account in the access
phase by assuming a maximum number of transmissions (MaxUE) that can
be tolerated in the same access slot for interference reasons. Hence, when
there are n concurrent access attempts with n > MaxUE, there is a too high
interference level (i.e., SIR < SIRt ) so that all n transmission attempts (using
dierent signature codes) are unsuccessful. We can consider that MaxUE is
1
proportional to SIR t
.
The simulator numerical settings are detailed below:
126 Giovanni Giambene, Cristina P
arraga Niebla, Victor Y. H. Kueh
Fig. 5.3: Random access process on the PRACH channel (PRC, Power Ramping
Control, denotes a mechanism to increase the transmission power of the access burst
in subsequent attempts).
All the signature codes can be used by an ASC. While, dierent ASCs
are distinguished by a dierent set of used sub-channels. In particular, the
numbers of sub-channels distributed among the ASCs are as follows: ASC0
= 8, ASC1 = 3, and ASC2 = 1. Hence, the highest-priority ASC0 has a
greater number of resources (i.e., sub-channels), thus guaranteeing lower
collision and interference probabilities. Note that in this study, all the 12
sub-channels are used.
We refer here to a case with persistency probability equal to one: the trans-
mission of the preamble is soon attempted or reattempted by randomly
select the resources.
A source (i.e., UE) generating a message does not generate another
message until the previous one has been transmitted. Hence, a source can
be in the OFF state (waiting for the generation of a new message) or in
the ON state (waiting for message transmission).
There are 10 sources per ASC. The OFF state sojourn time is exponentially
distributed with mean message arrival rate denoted with . As soon as
the source leaves the OFF state, a procedure is started to transmit a 10
ms message.
After the successful transmission of the preamble, message transmission
requests are served according to the priority order of the related ASC. A
virtual message transmission queue corresponds to a PRACH (messages
from ASC0 are prioritized with respect to ASC1, etc.). These message
transmissions use a suitably shifted scrambling code with respect to the
scrambling code of the preamble transmission that also combines this
code with a signature code. We neglect interference between simultaneous
message and preamble transmissions related to the same PRACH. Hence,
preamble transmissions and message transmissions use separated resource
spaces. Of course the message part can be received at the Node-B with
errors according to a certain Frame Error Rate (FER) value.
Simulation runs have a duration of 500 s.
Fig. 5.4: PRACH performance in the presence of trac on three ASCs with
dierently allocated resources and two cases for MaxUE values.
Chapter 5: ACCESS SCHEMES AND PACKET SCHEDULING TECH. 129
quality.
As shown in [10], PRMA outperforms the classical S-ALOHA protocol in
terms of packet dropping probability and is therefore more preferable. It is
also exible enough to accommodate data and voice trac. Moreover, there
have been proposals where a UT can reserve more than one slot per frame
to accommodate more demanding real-time trac. There are certain issues
however that are critical for PRMA performance, some of them are even more
important in the case where it is used for satellite systems. These issues are:
Frame and slot duration, channel bandwidth and voice codecs. In our
discussion above, we mentioned that in order to transmit a talkspurt the
UT reserves one slot per frame. This assumes that the channel bandwidth,
the slot and frame durations and the codec used must be coordinated in
order to receive the required voice quality at the receiver. This means that
if the channel bit-rate is Rc and the codec voice bit-rate is Rs , then the
maximum number of slots per frame is
Tf R c
Nmax = (5.1)
Rs Tf + Lh
where Lh is the length of each packet header.
Scheduling retransmissions and resolving collisions. We can assume that
as soon as a talkspurt begins, the UT selects the next available slot to
transmit the random access burst in order to make a reservation as soon as
possible. If there is a collision and all UTs that participated in the collision
select another available slot in deterministic manner (e.g., they all select
the next available slot), then they will enter a collision deadlock since all of
them will select exactly the same slot to transmit. To avoid such deadlocks,
a probabilistic collision resolution mechanism must be employed. In the
simplest case, each UT may decide to transmit with a probability p, known
Chapter 5: ACCESS SCHEMES AND PACKET SCHEDULING TECH. 131
GEO systems cannot adopt PRMA since their long RTD (max 280 ms in
the case of a regenerating satellite; max 560 ms for a bent-pipe satellite)
132 Giovanni Giambene, Cristina P
arraga Niebla, Victor Y. H. Kueh
makes the state transition time from the contending to the active state to
exceed the limit posed by the codec (i.e., the voice packet deadline, typically
of few tens of ms). For these systems a simple reservation scheme may be
used where a reservation per call is made. In LEO systems, however, RTD is
much smaller (between 5 and 30 ms) and PRMA techniques are applicable.
A feasibility study for the adoption of PRMA in the LEO case is made in
[11]-[14], including the selection of the permission probability p and the frame
duration Tf .
It should be noted that there is a substantial dierence between the
S-UMTS air interface and the air interface assumed by classical PRMA.
PRMA relies solely on time division, whereas S-UMTS can be characterized
as a hybrid CDMA/TDMA system. Therefore, CDMA/TDMA variations of
PRMA must be considered such as the one proposed in [15], where UTs select
a code in addition to a time slot in order to transmit their access bursts in a
very similar fashion as we previously described.
The ow chart shown below in Figure 5.6 is an example of how S-UMTS
channels can be used in order to adopt a PRMA-based scheme. We assume
that a UT will require to use a Dedicated Channel (DCH) consisting of
one Dedicated Control Channel (DCCH) and one or more Dedicated Trac
Channels (DTCHs) (DCCH and DTCH are logical channels) depending on the
upper layer requirements. These requirements can be stated in the message
part of the RACH burst. If the burst is not received properly, the UT schedules
a retransmission using the permission probability p, which is announced by
the system using the BCH channel, as specied in [5]. Note also that by using
dierent channels for contention (RACH) and data transmission (DCH) we
keep the collision probability constant and independent of the already assigned
DCH channels. This separation of contention and data channels constitutes a
substantial dierence from classical PRMA schemes.
Note that in the presence of dierent trac classes sharing the same RACH
access channel, dierent permission probability values should be used to take
into account the trac urgency and other priority requirements.
As a conclusion, we may observe that S-UMTS as well as T-UMTS can
adopt PRMA-like schemes without dramatic alterations to the air interface,
since the already-available transport channels can be utilized by higher layers
to implement PRMA. Due to this, variations of PRMA, such as the PRMA-HS
mentioned earlier, can be also adopted in S-UMTS in order to improve the
overall system performance. Anyway, it should be reminded that PRMA may
only be used in LEO satellite systems.
guaranteed.
Applying the Wireless Fair Service scheduler, each ow i has a lead bound
of li,max and a lag bound of bi,max . Each leading ow relinquishes a portion of
its lead li /li,max for lagging ows. On the other hand, each lagging ow gets a
fraction
of the aggregated relinquished resources that is proportional to its lag:
bi / iS bi , where S is the set of backlogged ows [25]. In practice, the leading
ows free their resources in proportion to their lead and those resources are
fairly distributed among the lagging ows. This approach achieves fairness, as
well as delay and bandwidth guarantees.
The above scheduling techniques assume a simplied two-state channel
model representing an error state and an error-free state. A more realistic
model is to consider that each channel state is associated with a certain error
probability, which allows for more exibility in scheduling decisions. Based
on this assumption, several scheduling techniques have been proposed in the
literature, driven by the comparison of the channel quality level experienced
by the user terminals having backlogged packets. Detailed examples of these
techniques are reported below referring to the UMTS scenario.
In case of CDMA cellular systems, the resources are the bandwidth, the codes,
the RLC buers at the RNC node and the UE, and the transmit power.
In UMTS, the packet scheduler works in close-cooperation with the other
resource management functions, in particular the admission control and the
load (congestion) control entities [27]. Scheduling is part of the congestion
control function, namely it is a form of reactive resource management, as
opposed to the proactive characteristic of admission control. The packet
scheduler can decide the allocated bit-rates and the length of the allocation
among users. In W-CDMA, this can be done in several ways, in a code or time
division manner or power scheduling-based.
In the code division approach, a large number of users can have a low
bit-rate channel available simultaneously. When the number of users wanting
capacity increases, the bit-rate, which can be allocated to a single user,
decreases. In time division scheduling, the capacity is given to one user or
only to a few users at each time instant. A user can have a very high bit-rate,
but can use it only very briey. When the number of users increases in the time
division approach, each user has to wait longer for transmission. Power-based
scheduling may be employed in response to the condition of the radio link
between sender and receiver. If the power devoted to a code is kept xed, the
possible supported rate for a given transmission quality (interpreted in this
context in terms of Eb /I0 ) increases for GOOD and decreases for BAD channel
conditions. Likewise, if the information rate is kept constant, maintaining the
same transmission quality is obtained by employing two dierent levels of
transmit power (i.e., the concept of power control).
The most common packet schedulers for UMTS are described below. The
138 Giovanni Giambene, Cristina P
arraga Niebla, Victor Y. H. Kueh
HSDPA is a step beyond the W-CDMA air interface, in order to improve the
performance of downlink multimedia data trac according to the increasing
demand for high bit-rate data services. For that purpose, the main targets of
HSDPA are to increase user peak data rates, to guarantee QoS and to improve
spectral eciency for downlink asymmetrical and bursty packet data services,
supporting a mixture of applications with dierent QoS requirements [28].
The HSDPA concept is based on an evolution of the Downlink Shared
Channel (DSCH), denoted as High Speed-DSCH (HS-DSCH). DSCH time-
multiplexes the dierent users and is characterized by a fast channel recon-
guration time and a packet scheduling procedure, which is very ecient
for bursty and high data rate trac in comparison with DCH. HS-DSCH
introduces several adaptations and control mechanisms that enhance peak
data rates, and spectral eciency for bursty downlink trac.
The HS-DSCH structure is based on a Transmission Time Interval (TTI)
whose duration is selected on the basis of the type of trac and the amount
of users supported (in the order of 2 ms). In comparison with the typically
longer TTIs of W-CDMA (10, 20 or 40 ms), the shorter TTI in HSDPA allows
for lower delays between packets, multiple retransmissions, faster channel
adaptation and minimal wasted bandwidth.
Two fundamental CDMA features are disabled in HS-DSCH, i.e., fast
power control and Variable Spreading Factor (VSF), being replaced by other
features such as Adaptive Coding and Modulation (ACM), multi-code opera-
tion, Fast L1 hybrid ARQ (FL1-HARQ) and xed spreading factor equal to 16
[28]. The xed spreading factor allows the allocation of 15 codes in each TTI
(the 16th code is used for signaling purposes) that can be assigned to either
the same UE to enhance its peak data rate or several UEs code-multiplexed
in the same TTI.
Furthermore, in order to achieve low delays in the link control, the MAC
layer functionality corresponding to HS-DSCH (namely MAC-hs) is placed in
the Node-B (instead of the RNC, where the MAC layer functionality corre-
sponding to DSCH is typically located). This solution allows the scheduler to
work with the most recent channel information, so that it is able to adapt
the modulation scheme and coding rate to better match the current channel
conditions experienced by the UE. However, this solution introduces some
changes in the interface protocol architecture, as depicted in Figure 5.7 [32].
140 Giovanni Giambene, Cristina P
arraga Niebla, Victor Y. H. Kueh
is requested by the RNC to send periodically a specic CQI on the uplink High
Speed Dedicated Physical Control Channel (HS-DPCCH). The periodicity is
selected from the set {2, 4, 8, 10, 20, 40, 80, 160} ms. The CQI provides the
following information related to the currently experienced channel conditions
by the UE [7]:
TFRC mode (most ecient modulation scheme and coding rate that can
be used);
Maximum number of parallel codes that can be used by the UE;
Specication of a transport block size (i.e., the transport layer PDU) for
which the UE would be able to receive data with a guaranteed FER lower
than or equal to 10%, after rst transmission.
There are dierent CQI tables for several UE categories. Table 5.3 shows
an example [34]. If CQI indicates that the quality is degrading, the scheduler
can choose a less ambitious TFRC that will cope better with the poor channel
conditions.
The HSDPA concept and architecture have been designed for terrestrial
environments. In a satellite scenario, the allowed complexity on board of
the satellite, the selected constellation (LEO, MEO, GEO) and a dierent
propagation environment condition the applicability of the HSDPA concept
as it is dened and the feasibility of the promised peak data rates.
One of the major advantages of HSDPA with respect to the W-CDMA
interface is the location of the scheduling function at the Node-B, allowing
for shorter delays and better adaptability to time-varying channel conditions.
However, the location of the dierent network entities, such as Node-B or
RNC, is not uniquely determined in a satellite-based UMTS system. Depend-
ing on the available complexity on the satellite, part of the functionalities
typically located at the Node-B or at the RNC in a UMTS network can be
142 Giovanni Giambene, Cristina P
arraga Niebla, Victor Y. H. Kueh
Table 5.3: Example of CQI mapping in transport block size for TTI = 2 ms
(terrestrial standard); the highlighted CQIs are those considered for simulations
referring to a GOOD/BAD channel model.
executed on board or not. In the case of a bent-pipe satellite, all medium access
control mechanisms must be located at the Gateway station or the network
control center. In any case, the large distances involved in a satellite system
disable the HSDPA capabilities of fast retransmissions and quick adaptation to
physical channel variations, thus scaling the performance that link adaptation
mechanisms can achieve.
In GEO satellite systems, retransmissions take too long time. Therefore,
FER upper bounds should be adequately much lower in order to reduce
Chapter 5: ACCESS SCHEMES AND PACKET SCHEDULING TECH. 143
1
Depending on the CQI transmission timing with respect to the current state
transition (GOOD to BAD or vice versa), the delay to receive a packet with an
updated TFRC ranges from 560 to 600 ms.
Chapter 5: ACCESS SCHEMES AND PACKET SCHEDULING TECH. 145
where bcode = 960 bits for QPSK modes and bcode = 1920 bits for 16QAM
modes.
For the method adopted in HSDPA to pass from transport to physical
layer, the interested reader should refer to [36].
The availability of channel state information and the relation between
channel state and achievable throughput by a UE adds new dimensions
for optimization to the scheduling problem. Typically, a scheduler manages
the share of resources among ows accessing the media according to some
fairness or QoS criterion. However, in a system that supports ACM and
code-multiplexing on top of time-multiplexing (and multi-code operation),
the scheduler operation becomes even more complex. Several approaches
can be adopted in the design of scheduling techniques, depending on the
optimization goals. We consider here some of those schemes already introduced
in sub-Section 5.3.1.
A rst approach is to ignore the additional degrees of freedom of HSDPA
and to schedule the backlogged trac according to either a fairness criterion
or driven by QoS constraints. In this case, algorithms such as EDF can be
146 Giovanni Giambene, Cristina P
arraga Niebla, Victor Y. H. Kueh
applied. However, this approach does not exploit the exibility of HSDPA to
use eciently the available resources, since the channel state corresponding
to each ow is transparent to the scheduler.
A second approach is to maximize the transmission eciency by scheduling
the ows that can achieve the highest throughput in the current TTI, i.e.,
those ows that are associated to better channel conditions, which is the
strategy applied by the opportunistic scheduler [37]. However, this approach
does not guarantee QoS, since those UEs with worse channel conditions shall
be blocked for long periods, even if their channel state is good enough for
transmission.
A third approach is to schedule the ows according to a hybrid criterion
that combines fairness and transmission eciency maximization in a trade-o
manner. This concept has been proposed for scheduling in HSDPA in terres-
trial environments under the name of PF scheme [30],[31] (see sub-Section
5.3.1).
A scheduler has been considered to manage downlink transmissions (HS-
DSCH) that is in the Node-B (Earth Station) according to the architecture in
Figure 5.8. In particular, the scheduler is at MAC-hs level and it is assumed to
have dierent queues for the dierent UEs. Each queue (at IP level) contains
the multimedia trac corresponding to one UE. Suitable priority indexes are
considered to serve these queues; these indexes are related to either the EDF
scheduler or the PF scheme. In what follows, the performance achieved by
these schedulers are compared in the presence of video streaming and Web
trac [38],[39]. The assumptions previously made (see the previous part on
Implications of the satellite component in HSDPA) are considered for this
simulation study.
EDF scheduler
dk [n]
Pk [n] = k = 1, 2, ... , N (5.3)
Tdeadline
where N denotes the number of UEs per spot-beam.
The above priority index does not permit to prioritize the real-time video
trac with respect to the interactive Web trac. This approach could degrade
Chapter 5: ACCESS SCHEMES AND PACKET SCHEDULING TECH. 147
the video performance in the presence of signicant Web trac load. To cope
with this, a dierentiation in the priority index in equation (5.3) is needed.
In particular, equation (5.3) is used for video trac so that a video IP-packet
has an increasing priority up to (almost) 1 when the packet is close to its
deadline and risks to be dropped. Moreover, a modied priority index is used
for Web IP-packets that saturates to 0.9 when these packets are close to (or
exceed) their virtual deadline:
Dk [n]
Pk [n] = min 0.9, k = 1, 2, ... , N. (5.4)
Tdeadline
Hence, very urgent video packets will be served with highest priority than
any Web packet. In what follows, the scheme where the priority index (5.3) is
used for both video and Web trac ows will be denoted as EDF; whereas, the
name Prioritized-EDF (P-EDF) is applied to the scheme where the priority
index (5.3) is used for video ows and the priority index (5.4) is adopted for
Web trac ows.
PF scheduler
This strategy serves the UE with largest RCQI, which represents the ratio
between the maximum data rate currently supported by each UE (according
to its CQI and by using a look-up table like Table 5.3) and the average
service that the UE got in the past, according to a suitable sliding window.
On the basis of [30], the RCQI value corresponding to the k -th UE can be
computed as follows.
Rk [n]
RCQIk [n] = k = 1, 2, ... , N (5.5)
Tk [n]
where n is related to the time measured in TTI units, Rk [n] is the bit-rate
supported by the k -th UE in the n-th TTI interval (depending on its current
CQI) and Tk [n] represents the average throughput achieved by the k -th UE
up to the present TTI (according to a dened memory length).
Rk [n] and Tk [n] can be computed as follows [30]:
Bk [n]
Rk [n] = min CQIk [n], (5.6)
TTI
1 1
Tk [n] = 1 {Bk [n] > 0} Tk [n 1] + Rk [n 1] (5.7)
Nk Nk
148 Giovanni Giambene, Cristina P
arraga Niebla, Victor Y. H. Kueh
where CQIk [n] denotes the maximum bit-rate supported by the k -th UE
at the current time, calculated as the throughput that is allowed by the CQI
in the next TTI interval (according to a look-up table like Table 5.3). Bk [n]
represents the amount of data waiting for transmission in the Node-B buer
of the k -th UE at current time; {Bk [n] > 0} is either 1 or 0 depending on
whether the Boolean expression is right or not. Nk represents the memory
of the averaging lter (which has been set to 1000 TTI units), and Rk [n1]
denotes the bit-rate used for the transmission to the UE during the (n1)-th
scheduling interval. It is assumed that Tk [1] = CQIk [1].
According to the assumptions made on the GOOD/BAD channel (i.e.,
CQI = 15 for the BAD state and CQI = 25 for the GOOD state) and on the
basis of Table 5.3, we have the corresponding bit-rate capacities:
CQIk [n] = Rbad = 3319 bits/TTI 1.6 Mbit/s in the BAD state;
CQIk [n] = Rgood = 14411 bits/TTI 7.2 Mbit/s in the GOOD state.
2
Video packets exceeding the deadline are dropped; while, Web packets exceeding
their deadline are sent anyway since they are related to interactive trac.
150 Giovanni Giambene, Cristina P
arraga Niebla, Victor Y. H. Kueh
Fig. 5.11: Resource utilization comparison as a function of system load for P-EDF
and PF schemes.
Fig. 5.12: Ploss channel as a function of system load for P-EDF and PF schemes.
152 Giovanni Giambene, Cristina P
arraga Niebla, Victor Y. H. Kueh
Design requirements
Even though the broadcast and multicast delivery mode is able to give
many benets for certain application areas such as inherently non-interactive
applications, e.g., video/audio streaming and le downloading applications in
the presence of a high user density (stadiums, trade shows, etc.), there are
still many challenging issues to be solved such as the resource management
for providing the QoS constraints with the same conditions for all members
in the same group.
UMTS allows a user or an application to negotiate the characteristics of
the service at connection set-up. The network may check whether sucient
resources are available, and returns the results to the application, which can
Chapter 5: ACCESS SCHEMES AND PACKET SCHEDULING TECH. 153
Fig. 5.13: S-MBMS architecture and its interworking with a terrestrial network.
onto the FACH transport channel. At the physical level, the Secondary
Common Control Physical Channel (S-CCPCH) can carry one or more
FACH(s). The incoming service requests are ordered according to some
priority criterion. In selecting the respective criteria, the service attributes are
considered, which are normally mapped onto the trac handling priorities,
as dened by the UMTS QoS classes. Note that the prioritization can be
more or less dynamic; in a more dynamic prioritization, the relative priority
of the dierent channels may change in each resource allocation interval (this
is normally the TTI), depending for example on the maximum delay tolerated
by a service or the number of packets buered.
We rstly describe a semi-dynamic prioritization performed at two levels.
The rst prioritization is static: the scheduler orders the services according
to their QoS classes (streaming, background) and the type of service delivery
(streaming, hot download, cold download), i.e., streaming service MTCHs
have higher priority than hot download service MTCHs, while hot download
MTCHs have higher priority than cold download service MTCHs, with both
download type of services belonging to the background class. Essentially,
this means that an explicit cross-layer design approach has been adopted
herein, whereby the upper layer information regarding the service attributes
are signaled down to the packet scheduler. In fact, QoS attributes are regarded
as the parameters from the application layer, which are used in the scheduling
entity, so that QoS-based scheduling can be considered as a cross-layer
approach. The second level of prioritization is related to the treatment of
MTCHs featuring the same level of priority, i.e., when there are two or more
MTCHs services having the same priority level. This prioritization is more
dynamic and two alternatives can be envisaged:
The rst one is based on the rotation of the serving order of the MTCHs at
each one of the three groups (streaming, hot download, cold download)
determined from the rst prioritization level. Separate lists are maintained
for each of these groups, whereby MTCHs are served according to their
current order in the list: the MTCH at the top of the list is served rst,
Chapter 5: ACCESS SCHEMES AND PACKET SCHEDULING TECH. 157
then the second one, etc. When an MTCH is served, it is removed from
the head of the list and is placed at the end of it, i.e., in a round-robin
manner.
The second scheme is based on the Service Credit (SCr ) concept, which
extends the idea of tokens from the leaky bucket algorithm to CDMA
packet-switched mobile communication systems. The SCr of a service
accounts for the dierence between the actual oered bit-rate (by the
scheduler) and the requested bit-rate, i.e., the guaranteed bit-rate for this
service. Hence, a service obtaining a higher bit-rate than requested has
SCr < 0, while a service obtaining a lower bit-rate than requested has
SCr > 0. In each TTI, the SCr for a service is updated as follows:
where SCr [n] is the service credit at the current TTI, n, and is measured
in number of transport blocks per TTI; SCr [n-1] is the service credit in
the previous TTI; Guaranteed rate is the number of bits per TTI that
would be transmitted at the guaranteed bit-rate; TB size is the number
of bits in the Transport Block (TB) considered, and Transmitted TB [n-1]
is the number of successfully transmitted TBs in the previous TTI.
Obviously, this dynamic prioritization scheme is directly applicable to
streaming services, which feature a guaranteed rate attribute; however,
it may be expanded to download services even if they are not explicitly
characterized by the guaranteed bit-rate attribute (see Figure 5.14).
Rather than performing service prioritization in a semi-dynamic way,
a more ecient packet scheduling algorithm performs service prioritization
dynamically, depending on the waiting time/queuing delay experienced by
packets in each MTCH/FACH at the beginning of each TTI. Resource is
then allocated to respective physical channels (i.e., S-CCPCH) according
to the priority assigned to each MTCH/FACH ow as long as their power
and load condition can be satised. This scheduling scheme is named Delay
Dierentiation Queuing (DDQ) [43]. It is worth noticing that the packet
scheduling algorithm remains under the assumption of one-to-one mapping
from logical channels (MTCHs) to transport channels (FACHs).
DDQ is not a priority queue and is based on the Hybrid Proportional
Delay (HPD) scheduling scheme [44], which is widely used in the dierentiated
service networks. It assumes that there are QoS ratios between dierent QoS
priority classes. In each TTI, the serving indexes will be calculated for each
queue. These serving indexes are obtained based on the average waiting delay
for all the packets currently in the queue, the average queuing delay for all
the packets that have left the queue before this TTI, the packet arrival rate
and the QoS priority ratio index.
The mathematical formulation of DDQ can be expressed as follows. Let
i be QoS class factor, which is essentially a time-independent parameter
158 Giovanni Giambene, Cristina P
arraga Niebla, Victor Y. H. Kueh
designated for each queue i. Let i (n) be the average queuing/waiting delay at
current n-th allocation instant (i.e., n-th TTI) for each queue i. This measure
describes the delay states of all packets passing through the respective queue,
including both the packets which are currently in the queue and those packets
which have already left the queue. The delay index is calculated for each queue
i in each TTI as in equation (5.11):
Nq
q
Nd
d
Wi,j [n] + Wi,j [n]
j=0 j=0
i [n] = (5.11)
Nq + N d
q
where Wi,j [n] is the waiting delay for the j -th packet currently in queue i ;
d
Nq is the number of packets in the queue; Wi,j [n] is the queuing delay for the
j -th packet, which has left queue i before this TTI (i.e., current time slot n);
Nd is the number of packets that have been served and left the queue before
this TTI.
For the service ow of the FACH queue i at the current time slot (i.e.,
TTI for UMTS) n, the priority is dened as:
Consequently, the serving orders are calculated and assigned to each FACH
according to (5.12) at the beginning of each TTI.
With the above approaches of semi-dynamic and dynamic service priori-
tization in mind, the dynamically changing priorities of MTCHs indicate the
serving order of FACHs and S-CCPCHs for each TTI. It must also be noted
that it is generally assumed that only services with similar characteristics and
QoS requirements are multiplexed together to the same transport channel.
Resource allocation
Once all the services to be transmitted are prioritized, the next step is the
allocation of resources to them. This phase consists of bit-rate and transmit
power assignments within the specic resource allocation interval (i.e., TTI).
The data rate assignment consists in the selection of the Transport Format
Combinations (TFCs), which directly determine the per FACH transport
block size, namely how much data from each transport channel mapped to the
physical channel will be forwarded to the physical layer in TTI. For each active
physical channel (S-CCPCH), the exact TFC is selected from the Transport
Format Combination Set (TFCS), which is passed during the admission of a
new service as well as its mapping on a specic bearer. This TFC selection
step is of paramount importance since the capacity allocated to each service
is strongly related to the QoS perceived by the end-users, and, therefore,
the selection of the TFC has to take into consideration constraints in terms
Chapter 5: ACCESS SCHEMES AND PACKET SCHEDULING TECH. 159
For all S-CCPCHs, the packet scheduler tries to serve the MTCHs according
to the priorities dynamically allocated to them in the particular TTI. The
higher priority MTCH queues will be served ahead of the lower priority
MTCH queues. For those MTCH queues having the same priority class, the
queue with the longest packet queue will be served rst.
For each MTCH l, mapped on FACH j and on S-CCPCH i, the packet
scheduler scans the TFCS of the physical channel to nd all the dierent
TBS sizes that could be used. A sorted list of all candidate TBS sizes, in
decreasing order, is created.
The scheduler rst seeks to allocate the maximum TBS size to the rst
FACH. This is the case when the sum of data at the MTCHs queues is
greater than the maximum supported TBS size for this FACH in the
TFCS; the allocation of data (transport block) that each MTCH can
transmit is based on the priority of each MTCH mapped to this FACH,
with the highest priority channel assumed to be given the maximum
share.
Otherwise, if the sum of data from all the MTCHs queues is less than
the maximum supported TBS size for this FACH, the selected TBS
size is the minimum available in the TFCS that can serve this sum of
queued data.
For each S-CCPCH, the packet scheduler checks the power required on
the basis of the BLER requirement of the active service ow. These power
allocation decisions involve the search in lookup tables (BLER versus
Eb /Nt ) to determine the transmitted power for each S-CCPCH, satisfying
both power and load constraints.
The packet scheduler will then derive a reduced TFCS out of the initial
one for the S-CCPCH i, including only those TFCs that feature the selected
TBS size for FACH j. Further allocations in the same TTI for another
MTCH/FACH mapped on the same S-CCPCH will have to consider this
reduced TFCS. As for the power allocation, the power required to satisfy
the active service ow with the most demanding target BLER is selected, as
long as the total transmit power per beam is not exceeded; otherwise, this
service is not scheduled.
These procedures are repeated recursively until all the FACHs mapped to
each S-CCPCH are assigned.
Performance evaluation
scheme described in [42]. The main characteristics of MLPQ are that it always
processes packets starting from those non-empty queues having the highest
priority rst, with queues having the same priority served in a round-robin
fashion. As a result, packets in the lower-priority queues may suer from
a considerably longer queuing delay. Moreover, according to this scheduling
policy, there is no dierentiation made between queues with the same QoS
ranking. Therefore, this is not an ecient mechanism in dierentiated QoS
multimedia services provisioning with respect to both eciency and fairness.
Rather than prioritizing queues in a strict method, other essential QoS metrics
should also be considered in the scheduling discipline design.
The following typical scenario with 3 S-CCPCHs each of 384 kbit/s has
been simulated:
S-CCPCH 1 2 3
Bit-rate [kbit/s] 384 384 384
Streaming [kbit/s] 2561; 641 2561; 1281 -
Download [kbit/s] 641 - 3841
Fig. 5.16: Mean packet delay at RLC buers for dierent packet scheduling
algorithms.
streaming applications have been serviced, given that the detrimental aect
is not posing signicant degradation on the QoS target of streaming users.
Figure 5.17 shows the mean jitter experienced by each individual service
when employing MLPQ and DDQ packet scheduling. Obviously, DDQ features
much lower jitter for both streaming service and download service than
MLPQ, especially for lower-class and lower date rate users. Since the uni-
directional streaming service in S-MBMS is quite sensitive to delay-variation
(jitter), this result proves that DDQ packet scheduling provides a way to
balance all FACH queues in order to get the minimum delay variation for
streaming services.
Figure 5.18 shows the average S-CCPCH physical channel utilization for both
MLPQ and DDQ. Both schedulers managed to achieve throughput values
close to the optimum. For instance, the S-CCPCH channel utilization ratios
are 97.8%, 96.2%, 85.4% respectively under MPLQ scheduling; whilst they
achieve 98.4%, 96.2%, 86.4% respectively under DDQ scheduling. Therefore,
DDQ manages to obtain a slight channel utilization improvement on those
S-CCPCHs carrying background trac.
To summarize, the DDQ algorithm achieves the following advantages over
the MPLQ scheduling scheme:
Dynamic proportional delay-driven prioritization;
Chapter 5: ACCESS SCHEMES AND PACKET SCHEDULING TECH. 163
Fig. 5.17: Mean packet jitter at RLC buers for dierent packet scheduling
algorithms.
Prior to assigning the slot, which is the resource allocation step, the dierent
multicast services need to be prioritized. In our scheme, the prioritization is
performed at two levels. The rst prioritization is static: the scheduler orders
the services according to their QoS classes (streaming and best eort), i.e.,
streaming service is assigned higher priority than best eort. The second level
of prioritization is based upon the cross-layer information provided with CSI
for services featuring the same level of priority. This prioritization is more
dynamic and conned only for best-eort trac. The algorithm is described
as follows:
For all incoming multicast packets, the packet scheduler aims to serve the
packets according to priorities dynamically allocated to them. Streaming
trac packets have higher priority to access to time slots at all times.
For the remaining slots, if best eort trac packets arrive, the scheduler
scans the CSI intended for the multicast group. The acquisition of CSI will
be performed for each user in the intended multicast group. The update
of channel condition is acquired in every 20 ms, according to the slot and
166 Giovanni Giambene, Cristina P
arraga Niebla, Victor Y. H. Kueh
Performance evaluations
The following study assumes stationary users and slowly-varying channels in
satellite links where fade duration holds within one CSI update. The results are
here based on perfect channel predictions; we assume no channel estimation
loss occurs. This assumption might be impractical in a satellite environment
where the propagation delay is high, but the results with this assumption
permit to have a good indication of the eectiveness of this scheme to achieve
a high reliability multicast transmission.
In this study, two dierent scenarios have been examined. The rst one,
the single environment scenario, assumes that all users are subject to identical
channel conditions (the single environment model uses an elevation angle
= 80 and values for and calculated for urban areas with K factor of
7, where K represents the Ricean factor which is dened as the ratio of the
dominant component to the scatter contribution [45]). The proposed technique
aims at reducing the number of retransmissions that stem from bad channel
conditions. Figure 5.20 [46] exhibits some rather interesting results, where
parameter zeta is dened as follows: a packet is retransmitted only if the
percentage of users in the multicast group that experience Packet Loss Rate
(PLR) higher than a dened PLR threshold is greater than a percentage,
denoted by parameter zeta. It should be pointed out that PLR signicantly
diminishes, by endowing the multicast packet scheduler with CSI (cross-layer
approach). Moreover, PLR is hardly aected by an increase in the multicast
group size, whereas the greater the parameter zeta is, the lower PLR is.
Figure 5.21 [46] illustrates the probability that at least one user will
request retransmission versus the multicast group size. Apparently, as the
Chapter 5: ACCESS SCHEMES AND PACKET SCHEDULING TECH. 167
Fig. 5.20: Packet loss rate versus multicast group size. See reference [46]. Copyright
2005
c IEEE.
Fig. 5.22: Average packet delay versus target number of users (normalized) in good
channel condition.
and (t), which is the Eb /N0 value of the signal received from this user, is
greater than a given Eb /N0 threshold, T :
Figure 5.23 [46] depicts the probability that at least one user will re-
quest retransmission versus Eb /N0 threshold. Evidently, the retransmission
probability decreases as Eb /N0 threshold increases. It should also be noted
that the retransmission probability decreases as parameter zeta increases. As
far as the average packet delay is concerned, it becomes clear from Figure
5.24 that as Eb /N0 threshold increases, the mean delay increases since the
multicast packet scheduler refrains from transmitting packets to multicast
groups typically experiencing bad channel conditions [46].
This approach has been shown to reduce unnecessary transmission of
best-eort trac and hence reduces unnecessary bandwidth usage and retrans-
mission requests. However, in achieving relatively good channel utilization for
a multicast group, higher average packet delay is expected in the cross-layer
scheduler. The average packet delay can be regulated according to the power
threshold a user is estimated to receive at the downlink transmission. It is
also important to note that this approach consumes an amount of resources
in performing the channel prediction algorithm. The accuracy of the channel
quality is highly dependent on the channel model used.
Fig. 5.24: Average packet delay versus Eb /N0 threshold. See reference [46].
Copyright 2005
c IEEE.
5.4 Conclusions
Satellite communications have a potential market in providing high downlink
bit-rate services and in supporting multicast services on broad areas of the
Earth. These are the reasons why this Chapter has focused on HSDPA
and MBMS provision via a GEO bent-pipe satellite. In both cases suitable
network architectures and radio resource management techniques have been
investigated to support such services in an appropriate and ecient way.
For HSDPA, the results showed by the Proportional Fair scheduler are
sub-optimal for mixed trac classes, since it does not provide any QoS
dierentiation among diverse applications. The study of proposed enhance-
ments to the PF scheduler to support QoS dierentiation, such as the
Exponential Rule, should be addressed in the future for the satellite case.
Furthermore, the impact of the round trip time in the acquisition of channel
state information has been shown in the form of packet losses in intervals
of misalignments between current channel state and information available at
the Gateway. In particular, the simulation results in a simplied scenario
(using a GOOD/BAD channel model) show non-negligible losses due to the
use of outdated information in the selection of the best suited TFRC for
transmission. Hence, if it is desired to reduce the number of retransmissions,
delay compensation strategies or larger margins in the selection of TFRCs
should be adopted. Furthermore, a more complex channel model should be
Chapter 5: ACCESS SCHEMES AND PACKET SCHEDULING TECH. 171
considered in order to take into account the channel variation dynamics typical
of S Band (S-UMTS band).
For the provision of broadcast and multicast services, it has been shown
that packet scheduling is an important element within the RRM framework.
Aiming at a more ecient provision of heterogeneous QoS-dierentiated
MBMS services over S-UMTS, novel packet scheduling algorithms have been
proposed. These algorithms take into account the impact of important per-
formance factors reecting service QoS demands in order to provide trac
dierentiation and overall system performance optimization. To tackle the
deteriorating eect of changing propagation environments in multicast trans-
missions, channel estimation can ll the void whilst obtaining the current
channel state. Statistical channel models can be used to represent channel
variations to be exploited by packet scheduler for its decisions. For trac
with strict delay bound, a negotiation between delay and channel states can be
facilitated by a cost function where a trade-o between delay and throughput
is expected.
References
1
AUTh - Aristotle University of Thessaloniki, Greece
2
FhI - Fraunhofer Institute - FOKUS, Berlin, Germany
3
CNIT - University of Genoa, Italy
4
CNR-ISTI - Research Area of Pisa, Italy
are adequate network resources available to guarantee the QoS of both all
already-existing connections and the new requested one. Generally, the CAC
function results in the blocking of new calls or call dropping in the case of
ongoing calls when the bandwidth required for the connection exceeds the
available bandwidth. CAC, which turns out to be a crucial function to provide
high utilization of network resources, is network-specic and is generally
managed by the Network Control Center (NCC - recall that a description
of the NCC functions is given in Chapter 1, sub-Section 1.4.3). However, in
non-GEO satellite systems the CAC function has to be implemented on board
of the satellite as well. Nevertheless, it should be mentioned that this approach
requires satellites with on-board processing capabilities.
Fig. 6.1: A general protocol stack for the main elements of a satellite network.
As noted in [1], the public data network provides a resource that could
profoundly impact on high-priority activities of society, like defense and
disaster recovery operations. Under stress, however, the public network turns
out to be a virtually unusable resource, unless suitable trac prioritization
and CAC are applied to improve its performance. CAC has been extensively
studied in the past as a general resource allocation mechanism in various
networking contexts. Ross [2] is an excellent reference for CAC mechanisms
in general, whereas reference [3] contains a recent survey on this topic in the
context of wireless networks.
In the simplest case of resource allocation, a connection is admitted simply
if resources are available at the time the connection is requested. This policy
is commonly called Complete Sharing (CS), where the only constraint on the
system is the overall system capacity. In a CS policy, connections that request
fewer resource units are more likely to be admitted (e.g., a voice connection
will more likely be admitted compared to a video connection). A CS policy
does not consider the importance of a connection when resources are allocated.
At the other extreme, in a Complete Partitioning (CP) policy, every trac
class is allocated a set of resources that can only be used by that specic
class. Other solutions are represented by Trunk Reservation (TR), where class
i may use resources in a network as long as ri units remain available [4],
and Guaranteed Minimum (GM) [5],[6], which gives each class its own small
portion of resources; once used up, classes can then attempt to use resources
from a shared pool. An Upper Limit (UL) policy was adopted in [1], and
Virtual Partitioning (VP) was proposed in [7].
As far as satellite systems are concerned, the architecture of the new
satellite systems testies the interest in ATM, IP and DVB technologies. A
general architecture of a satellite system is illustrated in Figure 6.3. An Earth
station (Gateway) is in charge of mapping ATM/IP trac originated from
terrestrial terminals over satellite connections, while the NCC performs CAC
and DBA functions. The role of the aforementioned functions is to meet the
QoS requirements of dierent service classes, i.e., delay, jitter and packet loss.
A plethora of CAC algorithms were proposed in the literature for terrestrial
ATM-based networks. Some of them require an explicit trac model, while
some others require trac parameters such as peak and average rate. A
classication of these schemes is provided in [8] along with the description
of their salient features. Nevertheless, it should be noted that while some
parameters can be easily specied (for instance, the peak rate), the actual
average rate is dicult to estimate, since the source does not know it.
Then, the user can declare an upper bound, which, however, results in
low bandwidth eciency. To cope with this issue, measurement-based CAC
methods have been proposed. In [9], the authors present a taxonomy as well
as a detailed survey of measurement-based CAC techniques. In that study,
dierent measurement-based CAC methods were compared against each other
180 Stylianos Karapantazis, Petia Todorova
Fig. 6.5: The anatomy of an ATM switch with CAC/handover control module. See
reference [13]. Copyright 2004
c IEEE.
accepted, a handover reply message is sent to the mobile user. At this point
buering processes are needed to guarantee the minimum loss of cells. After
the uplink/downlink accesses are nished, buered cells will be transmitted
through new links.
As the Internet has become a ubiquitous communication infrastructure, IP
QoS provisioning is a strategic issue in any kind of network. A view that has
been gaining considerable interest in the scientic community considers that
the IP Integrated Services approach (IntServ - service dierentiation is focused
on individual packet ows) can be used in the wireless access networks (in
our case the satellite links) in order to admit or to reject the requests of ows
according to the availability of resources and the guarantees provided to other
ows. On the other hand, the IP Dierentiated Services approach (DiServ
- scalable service dierentiation, focused on the aggregate of ows) can be
employed to avoid complexity and maintenance of per-ow state information
in the core network [14],[15]. Both IntServ [15],[16] and DiServ [17] have
been studied for satellite networks; they are considered later in conjunction
with CAC schemes.
In general, CAC schemes can be classied into those that oer Determin-
istic QoS Guarantees and those that provide Statistical QoS Guarantees [8].
Deterministic QoS guarantees: a new connection is accepted, provided that
the worst-case scenarios requirements are met (for instance, the available
capacity is greater than the peak rate of the connection). Although this
approach represents the simplest solution for trac management, it tends
to over-commit resources, thus resulting in low link utilization.
Statistical QoS guarantees: in this case, the NCC maintains a statistical
allocation instead of guaranteeing a peak rate. Losses may occur, but
high channel utilization is accomplished. This approach is based on the
assumption that having all the connections transmitting at their peak
rates at the same time is beyond the realms of possibility, allowing in this
way the statistical multiplexing of ows. However, the diculty of this
approach lies in the trac characterization problem.
An ecient integration of the aforementioned approaches can make up for
the weaknesses of each other [18]. In particular, the technique proposed in
that study combines the good characteristics of the EDF (Earliest Deadline
First) scheduler in terms of QoS provisioning with the advantages that stem
from statistical multiplexing (a description of the EDF scheduler is provided
in sub-Section 5.3.1). Moreover, the mask of the Dual Leaky Bucket used for
trac shaping is such that takes into account the statistical variability of the
peak rate and the burst size. Note that a leaky bucket is simply a nite queue
and it can be viewed as a bucket with a small hole in the bottom: no matter
at what rate water enters the bucket, the outow is at a constant rate, when
there is any water in the bucket. In other words, a leaky bucket is used to
smooth out bursts and greatly reduces the chances of congestion. Simulation
results showed that the scheme described in [18] improves channel utilization,
184 Stylianos Karapantazis, Petia Todorova
time interval that those resources remain engaged, thereby diminishing the
number of bursts that are lost while waiting for the acknowledgement of the
assignment of new resources.
A CAC scheme for DVB-RCS systems is examined in [25]. The scheme
presented in that study is coupled with a capacity request scheduling technique
with the aim of meeting the QoS requirements of dierent service classes. In
particular, the CAC algorithm employs a preventive congestion control, based
on trac descriptor parameters (that is, peak bit-rate, burstiness, and service
category) and decides whether to accept or to reject a new call connection
according to the estimation of the excess demand probability. The latter sets
an upper bound on the burst loss probability.
The concept of excess demand probability is also used by the CAC scheme
presented in [26], where an integrated terrestrial-satellite system is considered.
The CAC scheme consists of two distinct phases: terrestrial admission control
and satellite admission control. The authors of that study also propose the
use of the IP IntServ architecture in the satellite network and the adoption of
a scalable IP DiServ-like architecture in the terrestrial network. Concerning
the satellite admission control, it accepts a given number of calls if the excess
demand probability is such that a target service quality can be guaranteed.
A CAC scheme geared towards multimedia GEO satellite networks with
on-board cross-connectivity, that is, connectivity between any pair of beams,
is presented in [27]. It is considered that there exists one Gateway Earth
Station associated with each beam. In addition to this, it is assumed that
any connection initiated by a user ends in the terrestrial network. Assuming
that the QoS requirements of a connection can be met in the home Gateway,
then the CAC criterion consists in opting for the destination Gateway that:
(i ) has enough bandwidth to support a connection request, and (ii ) results in
the shortest distance to the connections terrestrial destination. The amount
of resources statically allocated depends on the connection type (i.e., the
ATM-based classication of services), the trac descriptors, and the requested
QoS.
In [28], the employment of the IntServ model in a GEO satellite system
is examined. Specically, the authors of that paper study two main classes of
service, namely Guaranteed Services and Controlled Load Services. The former
is suited for real-time applications with stringent QoS requirements, whereas
the latter provides for adaptive-tolerant real-time trac (i.e., trac with loose
delay requirements). The satellite CAC supports the statistical multiplexing of
trac over the air interface. A new call is accepted if the network has sucient
bandwidth to satisfy the QoS constraints of the call without degrading the
QoS perceived by ongoing calls. Specically, the authors of that study adopt
a technique similar to the one described in [16]. Each ow is characterized by
specic parameters that are called token bucket parameters. These parameters
are the token bucket rate r, the token bucket size b, the peak data rate p and
the maximum packet size M. However, what is meant by token bucket?
Token bucket is an algorithm for trac shaping, like the leaky bucket algo-
Chapter 6: CALL ADMISSION CONTROL 187
rithm, used to regulate the average rate (and burstiness) of data transmission.
It simply counts tokens. However, in contrast to the leaky bucket algorithm,
which does not allow idle terminals to save up permissions to send large
bursts later, the token bucket algorithm does allow saving, thus permitting
some burstiness in the output stream and giving faster response to sudden
input bursts. In brief, a counter is increased by one (or a token is added in
the bucket) every 1/r seconds and decreased by one whenever a packet is
sent. When the counter hits zero, no packets can be sent. The token bucket
algorithm allows up to b tokens to be added in the bucket. All the token
bucket parameters are used by the CAC algorithm in order to estimate the
resources that are required for each new ow. Specically, the source terminal
sends a request for a new connection towards the destination. This request
serves the purpose of describing the characteristics of the ow in terms of
token bucket parameters. Each router (or, in general, each network element)
that receives this request computes how it will handle packets of this ow and
updates the request by adding this information to it. When the destination
receives the request, it can calculate the bandwidth that is required so that
the maximum end-to-end delay be below a given threshold by combining the
information that each router has added to the request.
Concerning Guaranteed Services, the destination (i.e., an edge device
located at the border between terrestrial and satellite segments) computes
for each ow the bandwidth R and the buer space B on board the satellite
that are required so that the QoS constraints be met. Then, these quantities
are sent to a designated Earth station, which decides on whether to accept
or reject this new ow. As regards Controlled Load Services, a similar CAC
procedure is applied. Nonetheless, in this case, the resources that are requested
do not guarantee that specic target values in terms of end-to-end delay and
packet loss will be met.
The performance of a CAC algorithm that is combined with a variant of
the Resource Reservation Protocol (RSVP) is assessed in [29]. In that study,
the trac carried by the satellite network is categorized into threes classes,
that is, data trac, multimedia trac, and control trac. A pool of channels
is available for all classes. However, if all these channels are reserved, the
remaining channels can be used only for the transmission of data and control
trac.
A CAC technique for DVB-S/DVB-RCS satellite systems is examined
in [18]. In particular, the CAC algorithm that is presented capitalizes on
the positive characteristics of the EDF scheduler in order to provide QoS
guarantees and attain high channel utilization. The proposed technique is
compared with two CAC schemes that are based on the Deterministic QoS
guarantees and the Statistical QoS guarantees approaches.
The authors of [30] study a CAC algorithm for DVB-RCS satellite net-
works, which is tailored for Moving Picture Experts Group (MPEG) trac
sources. MPEG represents a video compression standard for multimedia appli-
cations. In essence, MPEG subdivides the video in Group of Pictures (GOPs).
188 Stylianos Karapantazis, Petia Todorova
The GOP rate changes over time, therefore the CAC scheme described in that
study relies on the statistical multiplexing of this kind of trac. Specically,
the authors propose a statistical multiplexing scheme that is based on discrete
bandwidth levels of the GOP rate and compare it to another scheme that
relies on the Normal distribution of the aggregate GOP rate [31]. Concerning
the latter scheme, the MPEG trac generated by each source is modeled as
a Normal distribution of GOPs with mean rate and standard deviation .
Thereby, supposing that MPEG ows are independent of each other, according
to the central limit theorem the aggregate trac of a set of N multiplexed
connections can also be modeled as a Normal distribution.
Albeit that scheme takes some characteristics of the MPEG trac into
account, it cannot account for trac variations over time. A solution based
on a GEO satellite system equipped with on-board processing and on-board
switching is investigated in [32], where an integrated CAC and Bandwidth on
Demand (BoD) algorithm is proposed for a broadband satellite communica-
tion system of this kind, loaded with heterogeneous trac. This algorithm
is able to utilize eciently available bandwidth in order to attain high
throughput and maintain a good grade of service for all the trac types.
Last but not least, an issue of great importance for the designers of
satellite systems is the energy allocation. Power is a resource at a premium in
satellite systems, therefore a trade-o between consuming and saving energy
is always sought. At this point, it should be noted that higher levels of energy
consumption translate into higher throughput. Reference [33] derives an
optimal threshold policy for the joint problem of CAC and energy allocation,
by means of a dynamic programming approach. In particular, as usual in
dynamic programming, a value function Jk (ak , rk , dk ) is introduced which
aims to show how desirable is a satellite with available energy level ak at time
k, given that the current demand is dk and the current reward is rk . The term
rk represents the reward for consumption, namely the satellite receives rk
units of reward per unit of energy consumed. This amount of reward depends
on distances, atmospheric conditions and nancial considerations. The aim is,
then, to maximize the value function over a consumed energy ck .
adequate for processing at the receiver and the QoS requirements of ongoing
calls are met. Thereby, CDMA systems are interference-limited rather than
capacity-limited. Despite the vast literature on CAC algorithms for terrestrial
CDMA networks, only a handful of studies exists on CAC schemes for satellite
CDMA systems.
An interactive SIR-based algorithm for S-UMTS networks is delineated in
[35]. The described algorithm aims at nding out if a power equilibrium point
can be calculated so that the target SIR of all the ongoing calls and the target
SIR of the new call are met. This CAC scheme is applied to the admission of
bi-directional, high-demanding services.
The authors of [36] propose a CAC scheme that provides QoS guarantees to
integrated voice, videoconference, and data services. The essence of their goals
is to maximize the utilization of system resources. The air interface adopted
in that work is a combined CDMA/TDMA scheme. The highest priority is
given to videoconference calls.
maximum time interval that a user can dwell in a generic transit cell. Note
that index i from 0 to S 1 is used to denote the source cell (index m + i,
i = 0) and the next possible transit cells (index m + i, i = 1, ... , S 1). A
new call is admitted into the network only if there are at least Bk available
channels in the cell m where the user is located, and at the same time the
values of the mobility reservation status of this cell, the previous cell and the
next one are below a predened threshold, called Tnew . As far as handover
requests are concerned, a call is successfully handed over to a new cell provided
that the number of available channels in that cell is greater than Bk and its
mobility reservation status is below a predetermined threshold, called THO .
Apparently, THO is greater than Tnew in order to prioritize handover requests
over new call requests.
In [40], an adaptive dynamic channel allocation scheme is examined,
which relies on the well-known concept of guard channels, which are channels
exclusively used in each cell only to serve handover requests. In particular, the
number of guard channels is dynamically adapted based on the estimation of
future handover events. In more detail, upon the arrival of a new call request in
a cell, the algorithm, by capitalizing upon the deterministic network topology
of LEO satellite systems, computes the users dwell time in that cell. Then
it estimates the number of the potential handover requests within this time
interval as well as the expected number of channels that will be needed
to serve these requests. The request will be accepted only if the number of
available channels is greater than . As regards handover requests, a call is
successfully handed over to a new cell as long as there is at least one available
channel in that cell.
The study in [41] extends the aforementioned scheme and proposes a
geographical connection admission control algorithm that aims to guarantee
that the forced termination probability will always be below a predened
threshold. This CAC algorithm is based on the estimation of the future CDP
of both the new calls and the ongoing ones. Upon the arrival of a new call,
these two probabilities are estimated, and the call is admitted into the network
provided that these probabilities are below some predened thresholds.
The techniques presented in [37],[38],[42]-[46] rely on the queuing of
handover requests. According to this kind of handover schemes, a handover
request is queued for a specic time interval when no channel is available in
the next cell. In [37],[38],[42], the queuing time interval is dependent on the
overlapping area between contiguous cells.
In [43], a guaranteed handover service scheme was proposed. According
to that technique, a handover request can be queued up to a time interval
equal to the users sojourn time in the cell, that is, as soon as a handover
occurs, a handover request is sent to the next transit cell. As far as new calls
are concerned, a new call is admitted into the network as long as there exists
an available channel in both the current cell and the rst transit cell. That
scheme attains zero CDP at the expense, however, of a rather high CBP.
The authors of [44] propose a handover technique similar to the guaranteed
Chapter 6: CALL ADMISSION CONTROL 193
b(x)
h(x) = (6.2)
1 B(x)
where b(x ) is the call holding time probability density function and B (x )
is the call holding time cumulative distribution function. Note that h(x )dx
denotes the probability that the call will end in the next dx time unit given
that it has been in service for x time units. A holding time distribution is said
to be an IFR distribution if h(x ) is a non-decreasing function of x. Examples of
IFR distributions are uniform, exponential, half-Gaussian distributions, and
gamma-n with n 1. Moreover, the Admission Limit Curve for exponentially
distributed call holding times, which forms a boundary on the conditions under
which a CAC policy may accept an incoming call request, has been proved to
be able to serve as the basis for a CAC policy. The authors demonstrate how
these CAC policies and the Admission Limit Curve represent progressive steps
in developing optimal CAC policies for calls with exponentially distributed
holding times, and they extend this process to the more general case of calls
with increasing failure rate call holding times. The Admission Limit Curve
was also investigated in [51] along with the performance of a CAC policy
for increasing failure rate holding time distributions. However, in that study
stochastic capacity change time instants were assumed.
N
General GoS = ai GoSi (6.3)
i=1
where N is the number of the service classes supported by the system and
ai is a weighting factor which is equal to
Bmini i
ai = (6.4)
i
Chapter 6: CALL ADMISSION CONTROL 197
where Bmini denotes the minimum capacity that is required for calls of
the i -th service class, whereas i and i are the arrival and departure rates
of calls of this type of service, respectively. Concerning GoSi , it is a function
of CBP and CDP of the i -th service class and is dened as follows:
The terms W F1 and W F2 represent weighting factors, which are the same
for each service class. It should be emphasized that W F2 is much greater
than W F1 (almost tenfold greater) since the forced termination of a handover
call is generally considered more irksome than the blocking of a new call.
Now it is evident that ai aims at giving an added bonus to the schemes that
attain higher mean bit-rate since it reduces the eect of the corresponding
GoSi on the General GoS. Regarding the latter, the higher its value, the
poorer the performance of the scheme and the QoS provided to the users.
It becomes evident from Figure 6.8 that the FIFO policy performs similarly
to the LUI policy. Notwithstanding, the FIFO policy is more appealing on
account of its low complexity. Furthermore, the combination that employs
the Maximum capacity criterion for both new and handover calls achieves the
best performance. Moreover, we can note that the General GoS increases
commensurate with the percentage of overlapping area. Nonetheless, the
overlapping percentage can be benecial for some types of services, as it is
shown in [55].
This study was extended and another CAC and inter-satellite handover
scheme has been developed and assessed in [56]. The main mechanism behind
this second technique is based on dynamic bandwidth de-allocation. According
to the proposed mechanism, capacity reservation requests are countermanded
when the capacity that they strive to reserve is unlikely to be used. In
the handover schemes proposed in [52]-[55] the decision about the satellite
to which the call will be handed over is taken at the time instant of the
handover occurrence. This means that capacity is reserved, if possible, in all
the visible satellites, and this capacity is released if the call is handed over
to another satellite. On the contrary, in the scheme proposed in [56], when
the capacity required for a call is reserved in one of the visible satellites, the
capacity reservation requests are cast away from the queues of the other visible
satellites. Hence, that scheme does not waste the limited bandwidth of the
satellite channel. Simulations showed that this scheme can also capitalize upon
the satellite diversity that a system may provide in order to enhance network
performance. Figure 6.9 depicts General GoS versus overlapping percentage
referring to the scheme proposed in [56].
It does not make sense to use a satellite selection criterion for handover
calls in this scheme, since the decision is taken before the time instant of the
handover occurrence. Thus, the rst letter of the acronyms in the legend of
Figure 6.9 denotes the queuing policy that was employed, while the second
letter indicates the satellite selection criterion that was employed for new
calls. As shown in Figure 6.9, the FC and LC schemes exhibit the best
Chapter 6: CALL ADMISSION CONTROL 199
performance. Recall that in Figure 6.8, the best performance was achieved by
those schemes that relied upon the Maximum capacity criterion for new calls
as well. Moreover, it can be observed that there exist signicant performance
disparities among the schemes that are presented in Figure 6.9 and the ones in
Figure 6.8. It is apparent that the schemes presented in Figure 6.9 outperform
those in Figure 6.8. The mechanism behind the schemes that were presented in
[56] (i.e., those related to Figure 6.9), which allows them to attain an enhanced
performance, relies on the cancellation of capacity reservation requests when
the capacity that they strive to reserve is unlikely to be used. Moreover, it
is evident that this scheme can capitalize upon the partial or full diversity
that a LEO satellite system may provide in order to attain an improvement
in system performance.
This Section lists some rather interesting proposals for future research work
in the eld of CAC:
Due to the costly nature of the satellite channel, integrated CAC and
dynamic bandwidth allocation schemes are becoming a matter of some
concern to many network operators, being these integrated schemes able
to take into account both trac pattern variations and channel conditions.
In addition to this, the performance of transport layer protocols, such
as TCP, is often exacerbated by intense variations in the received signal
power and consequent high packet error rates. Consequently, the TCP
protocol perceives an indication of congestion in the network, thus reducing
the transmit information rate. In this context, a CAC algorithm able to
interact with the transport layer is considerably appealing, since it allows
estimating the amount of capacity that is currently in use, which is smaller
than the sum of the nominal capacity of every ongoing call. In particular,
the CAC algorithm should base its decisions on the goodput of the TCP
connections instead of the nominal bit-rate of each connection.
In hybrid architectures, namely integrated terrestrial-satellite networks or
multi-layered satellite networks, the role of CAC is twofold: (i ) to decide
which network is the most appropriate to serve a new call; (ii ) to decide
whether or not the call can be admitted to the network. A study of a CAC
algorithm able to regulate dynamically the admission of new connections in
an integrated network, according to their QoS requirements, user mobility,
and available resources, is of paramount importance.
An interesting scenario involves the integration of terrestrial and satellite
UMTS networks aiming at maximizing the number of connections that can
be actually admitted to the network. The decision of the CAC procedure
should be based on the terrestrial and satellite cell layout in the area where
the connection set-up attempt occurs, the surrounding area, the mobility
200 Stylianos Karapantazis, Petia Todorova
and the QoS requirements of the user, and the instantaneous trac load
in the terrestrial and satellite cells. Based on the aforementioned inputs,
the CAC algorithm should decide whether to admit or reject the call, the
QoS guarantees that will be granted to the call, and the segment as well
as the cell where it is more ecient to set-up the connection.
6.6 Conclusions
CAC constitutes an issue of paramount importance for any wireless or wired
network. It is performed at the connection set-up time and determines whether
or not sucient bandwidth is available to maintain required levels of QoS. In
this respect, CAC can be viewed as a preventive congestion control procedure.
With the advent of ATM networks, signicant research eorts have been
drawn towards CAC schemes. Typically, any CAC algorithm aims at taking
a decision based on two questions:
1
CNIT - University of Florence, Italy
2
CNR-ISTI - Research Area of Pisa, Italy
3
CNIT - University of Genoa, Italy
4
AUTh - Aristotle University of Thessaloniki, Greece
5
UAB - Universitat Autonoma de Barcelona, Spain
6
FhI - Fraunhofer Institute - FOKUS, Berlin, Germany
control channel and an ecient control protocol, which takes into account the
large communication delay. As a consequence, the available bandwidth may
be signicantly reduced by the signaling protocol.
It should be observed, however, that the bandwidth allocation problem is
somewhat dierent for dierent satellite network topologies. While the typical
focus for GEO satellites is the ecient bandwidth assignment among terres-
trial gateways, for LEO satellites handover and call prioritization procedures
become crucial aspects.
In a GEO satellite system the main limit is the time delay, in a LEO
satellite system this issue is mitigated, but the system complexity causes
several problems. In order to achieve a continuous satellite access, a large
network of LEO satellites is required with regular handovers among them.
Achieving ubiquitous coverage poses a signicant challenge, and the speed at
which the satellites ground track moves on the Earth generates rapidly chang-
ing communication channels, subject to severe Doppler spreading. Moreover,
if a constellation of LEO satellites is designed to provide global coverage,
then these satellites must be able to communicate one to another, either
by incorporating Inter-Satellite Links (ISLs) or a ground-based hub station
in each footprint. All these issues contribute in making DBA an essential
approach for providing the proper QoS but, at the same time, make its design
very dicult.
A less treated problem, moreover, could arise from satellite-based mesh
architectures. So far, the system model only considers the uplink part, relying
on the assumption that downlink is not a bottleneck. In a meshed architecture
with multiple, limited-bandwidth downlink spot-beams, the channel allocation
will have to take into account also this aspect in order to maintain the overall
QoS; this is particularly important in satellite-based switching systems [5].
Static algorithms
Adaptive algorithms
In the case of adaptive schemes, each satellite terminal can send requests to
the NCC in order to reserve or release channel capacity, based on its dynamic
210 Tommaso Pecorella, Giada Mennuti
to time t (e.g., with the queue lengths, the input ows and output ows);
such data are used to make a prediction at time t of the aggregated trac
in the interval [t, t + k ] (e.g., the trac within the next superframe, where
a superframe is the aggregation of k consecutive frames). Depending on the
number of simultaneous trac ows (i.e., TCP connections, application data
streams) and the QoS model in use (i.e., DiServ or IntServ), dierent trac
prediction techniques can be adopted. In a single-user per satellite terminal
scenario, an IntServ-based QoS model will be assumed, whereas for a large
aggregate of users per terminal, a DiServ model seems more appropriate.
When the number of data ows is very small, e.g., for a single-user per
satellite terminal, trac predictors may exploit the possibly known trac
patterns, like the TCP slow-start and the IntServ trac information, in order
to reserve the appropriate resources. If this is not viable, as in a DiServ
model approach, the trac predictions can resort to utilizing the statistical
properties of IP trac. Hence, the required bandwidth can be estimated.
In order to make adaptive predictions, i.e., capable of following changes in
the trac characteristics over time, the parameters of the predictor can be
regularly updated. The performance of these schemes heavily relies upon the
accurate prediction of future trac.
and the frequency that each RCST should use to transmit (see Figure 7.1
[9]).
In any case, the standard does not give strict constraints on the algorithms
to be used in the resource allocation process; hence, it is possible to develop
advanced techniques by using the standard request types. The only weakness
of the standard is related to the lack of information contained in the requests;
hence, two requests of the same type will have to be considered as equal,
even if the requesting RCSTs have to deliver dierent kinds of trac (e.g.,
volume-based requests for high priority and low priority trac).
The next improvements in DVB-RCS-based allocation strategies will be
focused on two topics, both related to a cross-layer approach. The rst one
will be to consider the eects of fading countermeasures; the second one
will be to dene a simple interface for upper layers, in order to develop a
cross-layer QoS manager, able to tune the allocation process to the actual
QoS requirements, possibly considering a pricing system, i.e., taking into
account the user willingness to pay. A possible protocol architecture to support
cross-layer interactions is proposed in sub-Section 1.6.2 referring to the BSM
standard.
Chapter 7: DYNAMIC BANDWIDTH ALLOCATION 213
One of the main issues with proactive DBA is the accurate prediction of
future trac. Trac predictors are usually aected by errors due to unex-
pected network behaviors (e.g., packet loss, network congestion, etc.), TCP
behavior and, more generally, uncertainty in the user interactions. Coupling
the trac predictors with appropriate control-theoretic techniques, however,
allows maintaining the required QoS with an acceptable computational eort.
In a DVB-RCS GEO satellite system, the NCC receives the bandwidth
requests of each RCST and decides whether to satisfy or not these requests
on the basis of a fair policy of resource sharing among all the RCSTs. In order
to meet the desired QoS, both the request algorithm and the NCC allocation
strategy are of paramount importance.
In [11]-[13] the authors compared some dierent allocation strategies based
on trac prediction, assuming that each RCST is used to transmit a heavy
aggregate of trac. Figure 7.2 shows the proposed system model. It can be
observed that the bandwidth controller must take into account the trac
predictions, the actual queue sizes and the packet scheduler behavior, to satisfy
the bandwidth requests. In the gure, the NCC is depicted as a simple delay
with a disturb, due to the possibility of denying a bandwidth request.
Some examples of cross-layer DBA schemes are here briey discussed, limiting
the description to recent works [19]-[25]. An overview of cross-layer approaches
Chapter 7: DYNAMIC BANDWIDTH ALLOCATION 215
Fig. 7.4: Call blocking and dropping (left) and cell loss (right) probabilities.
These graphs are reproduced from Adaptive Cross-layer Bandwidth Allocation in a Rain-faded
Satellite Environment, N. Celandroni, F. Davoli, E. Ferro, A. Gotta, International Journal of
Communication Systems, Vol. 19. No. 5, pp. 509530, June 2006. 2006.
c Copyright John Wiley
& Sons Limited. Reproduced with permission.
Fig. 7.5: IPA gradient descent allocation, under trac load and fade changes. See
reference [22]. Copyright 2006
c IEEE.
The merge strategy is the best choice between two alternative methods
(tradeo and range, respectively) that establish a balance between
goodput and fairness;
The proportionally fair technique maximizes the sum of the logarithms
of the individual goodputs, so as to attain a Nash Bargaining Solution
(NBS);
The BER threshold strategy simply adjusts the redundancy to keep
always BER below a given limit, and assigns the bandwidths proportion-
ally to the redundancy and the number of connections of each class (no
cross-layer action).
Fig. 7.6: Merge, Proportionally Fair and BER Threshold (thr = 106 ) strategies.
A class in fading (a); a class in clear sky (b). See reference [25]. Copyright 2006
c
IEEE.
220 Tommaso Pecorella, Giada Mennuti
each user will have allocated slots of a given xed length on the carrier type
corresponding to its Es /No,tot [29]. Trac demands are queued according
to the type of DVB-RCS capacity request, which can be CRA, RBDC, and
VBDC. Capacity requests are prioritized: CRA has the highest priority and
VBDC the lowest. CBR trac is assigned to CRA as a whole, whereas VBR
trac is assigned to CRA and RBDC. Similarly, BE trac is also divided
between RBDC and VBDC.
The number of carriers of each type is computed at every super-frame,
given priority to the users aected by rain. Assuming a given Es /No,tot for
the user and some given requests for the current super-frame, a closed-form
estimation of the number of carriers required per carrier type is computed in
terms of an estimation of the number of slots as follows:
C C
(rCBR +rV BR )Ts
nC C,CBR
ni (s) = nni (s) + nC,V
ni
BR
(s) = NnCi (s) i L(i ) ,
(7.1)
i = 1, 2, ... , N AC
(rVRBR +rBE
R
)Ts
nR
ni (s) = nR,V
ni
BR
(s) + nR,BE
ni (s) = NnRi (s) i L(i ) ,
(7.2)
AC
i = 1, 2, ... , N
V
V +rBE Ts
nVni (s) = nVniol (s) + nV,BE
ni (s) = NnVi (s) i L(i ) ,
(7.3)
i = 1, 2, ... , N AC
Proposed framework
1
Note that xing a timeslot duration common to all areas introduces some unused
bandwidth that depends on both the timeslot duration and the packet length
(ATM cell in our case). However, once a given RCST has been assigned to a certain
timeslot, it can change its transmission rate inside the timeslot without aecting
the transmission timing of the other RCSTs. This argumentation validates the
robustness of the solution proposed.
Chapter 7: DYNAMIC BANDWIDTH ALLOCATION 223
Fig. 7.7: Scheduling (bandwidth allocation) problem. See reference [9]. Copyright
2006
c IEEE.
procedure (after having known the number of timeslots per area): from left
to right and from top to bottom (according to the reading order). Regarding
signaling issues, this is translated into a simple FCT, since it indicates the
common timeslot type (which is described in the Time Composition Table,
TCT) and how many times it is repeated in the carrier. On the basis of the
area rate, one or more ATM cells can be transmitted in a single timeslot.
A possible timeslot and ATM cell assignment is shown in Figure 7.7, on
the right [9]. The problem of how to assign timeslots to areas and ATM cells to
RCSTs is discussed later, after introducing the scheduling hierarchy concept
[32].
Scheduling hierarchy
Allocate the resources to the users, depending only on their CRA requests
(highest priority).
Assign the remaining resources on the basis of the RBDC requests.
Assign the remaining resources on the basis of the VBDC requests.
N
max xi
x1 , ... ,xN
i=1
N
subject to xi P (7.4)
i=1
dmini xi dmaxi
1
, dmini 1 dmaxi
dmini
1
xi = dmini , (7.5)
dmaxi
1
dmaxi ,
N
where is a positive value that implies i=1 xi P .
It is possible to achieve the solution in a graphic way, by simply lling a
container (shaped accordingly with guaranteed resources and demands) with
an amount P of water (Figure 7.9 [9]).
Since (7.4) is solvable, the solution rstly assigns the minimum amounts
(namely, pale water) and then fairly distributes the rest (namely, strong
water). In this case, the solution is generally computed for a real-valued
226 Tommaso Pecorella, Giada Mennuti
Fig. 7.9: Fair resource distribution solution. See reference [9]. Copyright 2006
c
IEEE.
N
max Ni Ki (TT S , ti )
TT S ,N1 , ... ,NN
i=1
N
subject to Ni NT OT (C, TF , TT S ) (7.6)
i=1
0 Ni Ki (TT S , ti ) di
Tmin TT S Tmax
where ti is the time duration of an ATM cell transmitted at rate ri for the
i -th area, Ki is the number of ATM cells that t in a timeslot (depending on
both the ATM cell duration, ti , and TT S ) and NT OT is the total number of
timeslots (depending on the number of carriers, the frame duration and the
timeslot duration).
The input data di must be in principle considered as MAC layer informa-
tion. However, it may be interesting to think about cross-layer mechanisms to
enable some network inuence in di (this is the case, for example, when the
RCSTs send network layer information to the NCC or the requests made at the
RCSTs take into account that information). Moreover, the proposed technique
requires PHY cross-layer information (the area rates ri ) and it inuences both
the MAC and PHY layer of the RCSTs (the latter being done through TT S
adjustment).
It is possible
to solve
the problem xing TT S and then optimizing over
the Ni s. Let Ni1opt be the solution to this problem. Fixing these values,
optimization over TT S is a one-variable optimization problem. Imagine the
solution is TT1 Sopt . Iterations of this mechanism would drive into the optimal
joint solution if the problems were jointly convex, so it is mandatory to x
both problems.
Fixing TT S , the problem:
N
N
max Ni Ki (TT S , ti )
N1 , ... ,NN
i=1 i=1
N
subject to Ni NT OT (C, TF , TT S ) (7.7)
i=1
di
0 Ni
K (TT S , ti )
is convex, where the ceiling function () is necessary in the integer case
in order to avoid the situation of one area that requests some ATM cells, but
228 Tommaso Pecorella, Giada Mennuti
does not receive any timeslot. In this case, the problem in (7.7) is equivalent
to the integer version of (7.4) and, thus, the solution is known.
The following problem for the timeslot optimization (developing expres-
sions for the Ki s and NT OT ) is achieved xing the Ni s:
N
TT S
max Ni
TT S
i=1
ti
N
TF
subject to Ni C (7.8)
i=1
TT S
d
0 Ni
T
i
T S/t
i
Tmin TT S Tmax .
areas, coding rates and ATM cells duration is presented in Table 7.1 [9]. A
Quadrature Phase Shift Keying (QPSK) modulation is assumed, transmitted
through a raised cosine pulse with roll-o factor equal to 0.35. Consider that
the timeslot duration can be adjusted between Tmin = t1 and Tmax = 3t1 .
N
max Ni Ki (TT S , ti )
TT S ,N1 , ... ,NN
i=1
N
subject to Ni NT OT (C, TF , TT S ) (7.9)
i=1
0 Ni Ki (TT S , ti ) di
Tmin TT S Tmax .
7
i=1Ni t i
BO = . (7.10)
C TF
With the optimization of TT S , the occupation for both fair and oppor-
tunistic strategies is signicantly improved.
7
i=1 Ni Ki
TC = . (7.11)
ASDref
In Figure 7.11 [9], the sum of the assigned ATM cells in all areas normalized
by the reference ASD value (in fact it is a maximum transport capacity
value) is shown. With the optimization over TT S , the transported capacity
is signicantly improved: over 6% more capacity in the fair case and near 8%
increase in the opportunistic design. This result shows that the increase in BO,
due to TT S optimization (Figure 7.10) eectively implies a TC increase. The
opportunistic design could reach the maximum TC value as ASD increases
(independently of the requests distribution), whereas the fair algorithm will
generally saturate at a lower value (between 0.62 and 0.69 in the studied case).
NAT M1 NAT M
y1 = , ... , y7 = 7 (7.12)
NAT M1 NAT M7
232 Tommaso Pecorella, Giada Mennuti
2
7
yi
i=1
FI = (7.13)
7
7 yi2
i=1
where NAT Mi is the most fair solution obtained with the fair algorithm
with optimal TT S (the fair solution is dened in this way).
FI is obtained for the following 2 solutions (see the results in Figure 7.12
[9]):
Solution 1: the fair solution with TT S = t1 .
Solution 2: the opportunistic solution with optimal TT S .
It is important to note that whereas solution 1 exhibits good fairness
performance, solution 2 reduces it signicantly.
At the end of this sub-Section, the study of the occupation eciency for the
dierent signicant values of TT S (when only one area is requesting resources)
is addressed. Let us assume a very high demand to transmit, thus using the
maximum possible bandwidth in the proposed framework (see the results in
Table 7.2 [9]). Some TT S values achieve a better occupation eciency than
others, depending on which areas are considered as active. In particular, the
Chapter 7: DYNAMIC BANDWIDTH ALLOCATION 233
conguration TT S = 4t4 is the one that gives better results in the general case
(when all areas are active and the distribution p is totally unknown). This
conguration is the most robust choice in the max-min sense: knowing nothing
about the mapping of users to areas, the max-min robust design corresponds
to the one that gives the best (max) performance for the worst (min) possible
user distribution.
mean 0.84 0.73 0.78 0.83 0.74 0.77 0.79 0.83 0.76 0.91 0.83 0.85 0.75 0.84 0.90 0.77 0.79
Table 7.2: Bandwidth occupation study. See reference [9]. Copyright 2006
c IEEE.
In LEO and MEO satellite constellations, the handover problems can aect
the QoS of the connections. In [36], bandwidth for handover is dynamically
allocated, by calculating the possible handovers from neighboring beams, on
the basis of users location information. The reservation mechanism provides
a low handover blocking probability with respect to a xed guard channel
strategy. However, employing user location information seems not reasonable,
because updating locations would cause high processing load to the on-board
handover controller and increase the complexity of terminals. This method
seems only suitable for xed users.
In [37], the authors have introduced two dierent mobility models for
satellite networks. In the rst model, only the motion of satellites is taken
234 Tommaso Pecorella, Giada Mennuti
into account, whereas, in the second one, other motion components, like Earth
rotation and user movements, are considered. The key idea of the algorithm
is that, in order to prevent handover failure during a call, bandwidth will be
reserved in a particular number S of spot-beams that the call would handover
into.
In [38], a probabilistic resource reservation strategy for real-time services
was proposed. The sliding window concept is adopted to predict the nec-
essary amount of reserved bandwidth for a new call in its future handover
spot-beams. As for real-time services, a new call request is accepted if the
originated spot-beam has available bandwidth and resource reservation is
successful in future handover spot-beams. As for non real-time service, new
call requests are accepted if the originated spot-beam satises its maximum
required bandwidth.
In [6],[39], a selective look-ahead strategy is proposed where real-time
and non-real time service classes are dierently treated. Bandwidth allocation
only pertains to real-time connection handovers. To each accepted connection,
bandwidth allocation is performed in a look-ahead horizon of k cells along its
trajectory. This algorithm oers low call dropping probability, i.e., a reliable
management of call handovers of and acceptable call blocking probability for
new calls.
7.4 Conclusions
This Chapter has presented a set of dynamic bandwidth allocation techniques
and identied associated research topics. We can conclude this Chapter by
highlighting these two types of DBA problems and related techniques:
Handover-constrained techniques, mainly used for LEO satellites, where
the main problem is to acquire a resource among a number of dierent
satellites, since the communication lifetime is long enough to require a
number of handovers;
Bandwidth-constrained techniques, aecting mainly GEO systems, where
the main issue is to cope with the high delay-bandwidth product that
makes the reactive approaches unfeasible for delay-constrained trac
types.
The problem of multi-tier satellite systems, i.e., satellite systems using
a combination of multiple orbital systems, like GEO+LEO, has not been
considered, but it could be challenging, due to the multiple use of the
dierent techniques among the various tiers. This problem requires further
investigations as it involves also intra-tier and inter-tier routing schemes.
Most of the described DBA techniques are inherently satellite-dependent;
each satellite system should adapt or implement its own techniques in order
to maximize system eciency. A common theme is that optimizing eciency
does not always means maximizing the bandwidth occupancy, but it is
Chapter 7: DYNAMIC BANDWIDTH ALLOCATION 235
1
TUG - Graz University of Technology, Austria
2
UniS - Centre for Communication Systems Research, University of Surrey,
UK
3
CNR-ISTI - Research Area of Pisa, Italy
4
UC3M - Universidad Carlos III de Madrid, Spain
5
CNIT - University of Genoa, Italy
6
UToV - University of Rome Tor Vergata, Italy
7
AUTh - Aristotle University of Thessaloniki, Greece
8.1 Introduction
The Internet protocols have become the worldwide standard for network
and transport protocols and are increasingly used in satellite communication
244 Ulla Birnbacher, Wei Koong Chai
The Integrated Services (IntServ) model [1] requires resources, such as band-
width and buers, to be reserved a priori for a given trac ow to ensure
that the QoS requested by this trac ow is fullled. The IntServ model
includes additional components beyond those used in the best-eort model
Chapter 8: RESOURCE MANAGEMENT AND NETWORK LAYER 245
Fig. 8.1: Implementation reference model for routers with IntServ [2].
One of the primary motivations for Dierentiated Services (DiServ) [6] was
to devise alternative mechanisms for service dierentiation in the Internet that
mitigate the scalability issues encountered with the IntServ model. Scalable
mechanisms are deployed within the DiServ framework for the categorization
of trac ows into behavior aggregates, allowing each behavior aggregate to
be treated dierently, especially when there is shortage of resources such as
link bandwidth and buer space.
A DiServ eld in the IPv4 header has been dened. Such eld consists
of six bits of the part of the IP header, formerly known as TOS octet, and
it is used to indicate the forwarding treatment that a packet should receive
at a node. Within the DiServ framework, a number of Per-Hop Behavior
(PHB) groups have been also standardized. Using the PHBs, several classes
of services can be dened using dierent classication, policing, shaping, and
scheduling rules.
Conceptually, a DiServ domain consists of two types of routers, namely
core router and edge router. Core router resides within the domain and is
generally in charge of forwarding packets based on their respective DiServ
Code Point (DSCP). The edge router is located at the boundary of the network
domain which will either further connect to another domain (inter-domain)
or to end-users. It can be further categorized as ingress router which operates
on trac owing into the domain and egress router which operates on trac
exiting the domain.
In order for an end-user to receive DiServ from its Internet Service
Provider (ISP), it may be necessary for the user to have a Service Level
Agreement (SLA) with the ISP. An SLA may explicitly or implicitly specify a
Trac Conditioning Agreement (TCA), which denes classier rules, as well
as metering, marking, discarding, and shaping rules. Packets are classied,
and possibly policed and shaped at the ingress routers of a DiServ network
according to SLAs.
When a packet traverses the boundary between dierent DiServ domains,
the DiServ eld of the packet may be re-marked according to existing
agreements between the domains. DiServ allows only a nite number of
Chapter 8: RESOURCE MANAGEMENT AND NETWORK LAYER 247
Fig. 8.2: DiServ network; (top) DiServ domain illustration; (bottom) logical view
of DiServ packet classier and trac conditioner.
are three types of PHBs being used: namely Expedited Forwarding (EF),
Assured Forwarding (AF) and Best Eort (BE). EF PHB caters for low loss,
low delay and low jitter services. The AF PHB consists of four AF classes,
where each class is allocated with dierent amounts of buer and bandwidth.
Hence, each subscriber with a specic Subscribed Information Rate will receive
assured performance for trac within such rate while excess trac may be
lost depending on the current load of the AF class. Finally, the BE PHB is
the same as the original best eort IP paradigm.
For the DVB-RCS architecture, there are four transmission capacity
allocation schemes; namely Continuous Rate Assignment (CRA), Rate Based
Dynamic Capacity (RBDC), Volume Based Dynamic Capacity (VBDC) and
Free Capacity Assignment (FCA). For the description of these dierent
resource allocation schemes, please refer to Chapter 1, sub-Section 1.4.3.
Before mapping the DiServ PHBs to DVB-RCS resource allocation
schemes, it is vital to note that the entire DiServ domain is assumed to
be properly dimensioned. This is because there is no one mapping scheme
that can achieve high eciency in all types of trac mixture. A particular
scheme, which performs well in one scenario, may perform poorly in another.
The network management and dimensioning problem is not within the scope
of this study.
Usually, EF PHB is used to transport non-delay tolerant application
tracs such as VoIP and video conferencing. To achieve the stringent QoS
requirements of this class of applications, the use of CRA in the MAC layer
is a must. However, considering system eciency, a minimal use of RBDC
combined with CRA is plausible. The entire DiServ domain has to be
properly dimensioned as noted above. For example, if a very high trac
percentage is of the EF type, then the satellite bandwidth will be quickly
consumed with all the slots being reserved with CRA, thus causing high
blocking and drop rate. As for AF PHB, the combined use of RBDC and
VBDC is proposed with RBDC as the main resource provider. Under low load,
packets belonging to each class of AF will receive similar treatment. However,
to dierentiate between the AF classes, a dierent maximum RBDC value
(i.e., maximum bit-rate that can be allocated with RBDC) can be dened so
that the higher AF class will receive better treatment. If the request is higher
than the maximum RBDC, the users can still request for VBDC resources.
For BE trac, the use of VBDC and FCA is proposed.
i ri
= ; i, j {1 . . . N } . (8.1)
j rj
Fig. 8.3: Reference satellite system, resembling the DVB-RCS architecture. See
reference [10]. Copyright 2005
c IEEE.
Chapter 8: RESOURCE MANAGEMENT AND NETWORK LAYER 251
Time Division Multiple Access (TDMA) is used for the forward path
whereas on the return path, Multi Frequency - TDMA (MF-TDMA) is
assumed. In an MF-TDMA frame, the basic unit of the link capacity is the
Time Slot (TS) with multiple TSs grouped in TDMA frames along several
frequency carriers. In this Section, xed MF-TDMA frame is considered
whereby the bandwidth and duration of successive TSs is static. For more
details on MF-TDMA characteristics, please refer to Chapter 1.
The BoD scheme used in this Section is derived from [13]. It is a cyclic
procedure between two stages: the resource request estimation stage and the
resource allocation stage. It involves the BoD entity located at the ST and
BoD scheduler located onboard the satellite. The BoD entity handles all
packets of the same class which are stored in the same queue, i.e., there
will be x BoD entities in an ST if this ST supports x classes. In the resource
request estimation stage, the BoD entities (i.e., STs) periodically compute and
send Slot Requests (SRs) to the BoD scheduler, when there are new packet
arrivals at their queues. In the resource allocation stage, upon reception of
SRs, the BoD scheduler allocates TSs to each requesting BoD entity based on
a certain scheduling discipline and policies dened by the network operator. It
then constructs and broadcasts the Terminal Burst Time Plan (TBTP) that
contains all the resource allocation information to the BoD entities. Figure
8.4 [10] gives the BoD timing diagram, which also describes the basic tasks
involved.
Due to the unique characteristics of satellite networks, the realization of
such framework is very dierent from those solutions provided for terrestrial
and wireless systems. For terrestrial wired networks, the scheduler only needs
to schedule the departure of each contending packet locally within a router.
In wireless and satellite domain, the access to the transmission medium is
often controlled in a distributed manner by a MAC protocol. Hence, packets
from one node may contend with packets from other nodes. This leads to
the consideration of using layer 2 scheduling to realize the model instead of
purely depending on layer 3. Based on the layer 3 QoS classes, the MAC layer
scheduler will decide how best to schedule the packets in order to achieve the
QoS required.
Moreover, there are several fundamental architectural and environmental
dierences between terrestrial wireless networks and satellite networks sup-
porting dynamic bandwidth allocation mechanisms. Firstly, for a BoD-based
satellite architecture, resource has to be requested by the STs before they can
252 Ulla Birnbacher, Wei Koong Chai
Fig. 8.4: BoD timing diagram. See reference [10]. Copyright 2005
c IEEE.
make use of it, so that the scheduler ends up scheduling requests for resource
rather than packets. Secondly, there is a non-negligible propagation delay
between the STs and the scheduler that may, depending on the access control
algorithm, inate the waiting time of a packet in the ST queue. The impact
of this semi-constant delay has to be taken into account by the scheduler in
providing relative service dierentiation.
The Satellite Waiting Time Priority (SWTP) scheduler is a satellite
adaptation of the Waiting Time Priority scheduler [7], proposed by Kleinrock
in [14]. SWTP schedules SRs from BoD entities rather than individual packets.
SWTP has been shown to be able to provide proportional queuing delay to
several classes of MAC frames in the context of BoD environment. Its main
elements are as follow.
1. Resource request. Formally, if Qm i is the set of newly arrived packets at
the i -th queue of BoD entity m, i.e., packets that came within the last
resource allocation period, q the set cardinality, and j the arrival time
of packet j, 1j q, indexed in increasing order of arrival times, then the
BoD entity m computes at time t the SR timestamp tsm i , according to
the arrival time of the last packet that arrived in the queue during the
last resource allocation period, namely: tsmi = t q .
2. Resource allocation: the BoD scheduler computes the priority of each SR.
The priority Pim (k ), assigned to S Rim in the k -th resource allocation
period is
" #
Pim (k) = ri wiSR (k) + (8.2)
where accounts for the propagation delay of TBTP and the processing
delay of BoD entities, while wiSR (k) = t tsm m
i and tsi is the timestamp
information encoded in each SR. Finally, ri denotes here the Delay
Chapter 8: RESOURCE MANAGEMENT AND NETWORK LAYER 253
Fig. 8.5: Queuing delay of dierent service classes following the specied spacing
of the model. See reference [10]. Copyright 2005
c IEEE.
254 Ulla Birnbacher, Wei Koong Chai
Fig. 8.6: Delay ratios achieved that are close to the ideal delay ratios. See reference
[10]. Copyright 2005
c IEEE.
Fig. 8.7: SWTP emulating the PDS in dierent load distributions with all values
achieved close to the ideal value. See reference [10]. Copyright 2005
c IEEE.
Chapter 8: RESOURCE MANAGEMENT AND NETWORK LAYER 255
Fig. 8.8: SWTP with 3 sets of DDPs: all normalized delay ratios are close to the
ideal value. See reference [10]. Copyright 2005
c IEEE.
Fig. 8.9: Short time scale behavior of SWTP showing its predictability property.
See reference [10]. Copyright 2005
c IEEE.
network and the MAC layers, the problem is posed in the more general ETSI
BSM scenario mentioned above. In the presence of IP DiServ queues at the
higher layer, the problem consists in dynamically assigning the bandwidth
(service rate) to each SD queue, so that the performance required at the
IP layer is guaranteed. By considering a uid model and the loss volume as
the performance indicator of interest, the Innitesimal Perturbation Analysis
(IPA) technique of Cassandras et al. [24] (already mentioned in Chapter 7 in
a dierent scenario) is applied in order to maintain on-line the equalization
between the loss volumes at the two dierent layers (by assuming that the
resource allocation at the SI layer is capable of satisfying the requirements).
In doing so, both trac and fading variations are taken into account. Further
details on the application of the IPA technique are provided in sub-Section
8.4.2.
service queue exceeds a given threshold; we consider the constraint that this
probability must be kept below a specied value, beyond which the station is
considered in outage. The scheduling of the MAC queues must be such that
this constraint is fullled for the IP-level queues (i.e., those corresponding to
EF, AF and BE services within a given Earth station). No fading variations
are taken into account, but, as noted in [17], the eect of fade countermeasures
might be included as a reduction in the available uplink bandwidth. Note that
if the state of the sources can be assumed to change more slowly than the
DBA cycle time, within which the allocated bandwidth remains constant, the
queuing behavior in these intervals can be approximated by a much simpler
M/D/1 system.
The work done in [21]-[23] takes a dierent look at the QoS mapping and
support problem, by disregarding the use of models, but rather relying on
measurement-based optimization techniques. This framework is that of ETSI-
BSM [15],[16] (let us consider for example the RBDC scheme). In such a
context, two basic facts are taken into account: the change of information
unit (e.g., from IP to IP-over-DVB) and the heterogeneous trac aggregation,
since, for hardware implementation constraints, the number of available SD
queues can be lower than that of SI queues (see also Chapter 1, sub-Section
1.4.3). Figure 8.10, taken from [21], reports and example.
The problem is then how much bandwidth must be assigned to each
SD queue, so that the SI IP-based SLA (i.e., the performance expected)
is guaranteed. In doing this, the eect of fading on the satellite channel is
also taken into account. As in other works (see, e.g., [25]), when the fade
countermeasure in use is modulation and coding rate adaptation, the eect
of fading is modeled as a reduction in the bandwidth (i.e., the service rate)
eectively seen by a layer 2 trac buer.
IP Packet Loss Probability (PLP) is one of the SLA performance metrics
considered in [23] (the other being IP Packet Average Delay). However, we
concentrate here on PLP. The mathematical framework is based on Stochastic
Fluid Models (SFM) of the SI-SAP trac buers [24],[26]. N SI queues and,
without loss of generality, one single SD queue are considered for the analytical
formulation (Figure 8.11).
Let iSI (t) be the input process entering the i -th trac buer at the SI
layer at time t, i = 1, ... , N. After entering one single buer [with service
rate iSI (t)] at the SI layer, each iSI (t) process is conveyed to a single SD
buer$ [whose service% rate is SD (t)] at the SD layer after a format change.
i SI
LV iSI (t) , iSI (t) denotes the loss volume of the i -th IP buer according
to the bandwidth allocation iSI (t).
Let SD (t) be the input process of the buer at the SD layer at time
t. The SD (t) process derives from the output processes of the SI buers.
Chapter 8: RESOURCE MANAGEMENT AND NETWORK LAYER 259
Fig. 8.11: Stochastic processes and buer set for the envisaged SI-SAP queuing
model.
260 Ulla Birnbacher, Wei Koong Chai
The loss
$ volume of the i -th %trac class within the SD buer is indicated by
LV SD (t) , SD (t) (t) . It is a function of the following elements: the SD
i SD
input process SD (t), the fading process (t) and the SD bandwidth allocation
SD (t). It is remarkable that i LSD
V () cannot be obtained in closed-from.
The problem reveals to be the equalization of the QoS measured at the
dierent layers of the protocol stack (i.e., SI and SD):
Opt SD
(t) = arg min J(, SD (t)); J(, SD (t)) = E LV (, SD (t))
SD (t)
(8.3)
N
$ %2
LV (, SD (t)) = V (i (t), i (t)) LV ( (t), SD (t) (t)) .
i
LSI SI SI i SD SD
i=1
LV (, SD ) N
i LSD SD $ %
V ( ) i SD SD
SD
= 2 SD
LV ( ) i LSI SI
V (i ) . (8.5)
i=1
i LSD ( SD )
Using IPA (see, e.g., [24],[26] and references therein), each V
SD
component can be obtained in real-time only on the basis of some trac
samples acquired during the system evolution. Let [k, k +1] be the time interval
between two consecutive SD bandwidth reallocations. The interval of time in
which the buer is not empty are dened as busy periods. The derivative
estimation is computed at the end of the decision epoch [k, k +1] as follows:
where i LSD
k, (
SD
) is the -th contribution to the SD loss volume of the
i -th trac class for each busy period Bk within the decision interval [k, k +1];
k is the starting point of Bk ; k is the instant of time when the last loss
occurs during Bk ; Nki is the number of busy periods within the interval [k,
k +1] for service class i. It must be noted that SD (k ) represents the SD
bandwidth reduction due to fading within the time interval [k, k +1] (i.e.,
SD (k) = SD (k) (k), where (k ) represents the bandwidth reduction seen
at the SD layer, due to redundancy applied at the physical layer to counteract
channel degradation).
The proposed optimization algorithm is based on the gradient method,
whose descent step is ruled by (8.8):
" SD # ''
LV , '
SD (k + 1) = SD (k) k ' ; k = 1, 2, ... (8.8)
SD ' SD
(k)
In (8.8), k denotes the gradient step size and k the reallocation time in-
stant. This method is called Reference Chaser Bandwidth Controller (RCBC).
262 Ulla Birnbacher, Wei Koong Chai
These rate control mechanisms (i.e., RCBC and EqB) have been investigated
through simulations [21],[23]. An ad-hoc C++ simulator has been developed
for the SI-SAP environment described above, considering a general satellite
system. In what follows, for the sake of simplicity, only the trac aggregation
problem is faced by assuming no channel degradation over the satellite
channel.
The case considered is that of two SI trac buers. The rst one con-
veys the trac of 30 VoIP sources. Each VoIP source is modeled as an
exponentially-modulated on-o process, with mean on and o times equal
to 1.008 s and 1.587 s, respectively. All VoIP connections have peak rate of
64 kbit/s. The IP packet size is 80 bytes. The SI service rate for VoIP assures
an SLA target PLP below 102 (SI VoIP buer size is 30 IP packets). The
second buer is dedicated to a video service. Jurassic Park I video trace,
taken from the Web site referenced in [28], is used. The SI rate allocation for
video (also measured through simulations), is 350 kbit/s. It assures a PLP
= 103 , which is the target SLA for video (the SI video buer size is 10,500
bytes). Both outputs of the SI buers are conveyed towards a single queue at
the SD layer. DVB encapsulation (header 4 bytes, payload 184 bytes) of the
IP packets through the LLC/SNAP (overhead 8 bytes) is implemented in this
case. The SD buer size is 300 DVB cells.
In Figure 8.12 (rstly presented in [21]), the SD bandwidth provision
produced by RCBC is compared with EqB. The loss probability bound for
EqB is set to 103 , being the most stringent PLP constraint imposed at the SI
level. The time interval between two consecutive SD bandwidth reallocations
is denoted by TRCBC and TEqB , for RCBC and EqB respectively. Note that
in the following graphs, for the sake of simplicity, T denotes TRCBC (TEqB )
in the RCBC (EqB) case.
TRCBC is xed to 7 minutes, while TEqB is set to the following values:
Fig. 8.12: Aggregation of VoIP and Video. SD allocations. RCBC versus EqB. See
reference [21]. Copyright 2005
c IEEE.
Fig. 8.13: Aggregation of VoIP and Video. Video PLP. See reference [21]. Copyright
2005
c IEEE.
EqB only for frequent reallocations (TEqB = TRCBC 1/3 = 2.33 minutes). The
corresponding bandwidth allocations, averaged over the simulation duration,
are shown in Figure 8.14 (taken from [21]). RCBC not only allows saving
bandwidth compared to the SD layer EqB T = 2.33 min strategy, but oers
a performance comparable to the other EqB cases, whose oered PLP is far
from the SI threshold. In brief, RCBC nds the optimal operation point of
the system, namely, the minimum SD bandwidth provision needed to track
the SI QoS thresholds.
264 Ulla Birnbacher, Wei Koong Chai
Fig. 8.14: Aggregation of VoIP and Video. Average SD bandwidth provision. See
reference [21]. Copyright 2005
c IEEE.
When terminals support dual network access -satellite and terrestrial (WLAN,
UMTS, etc.) links- it is quite critical to select the appropriate network for
each application, depending on both the resources available and the kind
of application involved. In some instances (such as real-time tele-operation),
it is not only a matter of user satisfaction, but also of satisfying critical
service goals. For example, the QoS provision may be related to the deadline
fulllment: violating a deadline may cause a sea farm hitting the sea bottom
or a remote probe bump into a rock.
This Section provides an analysis on relevant technologies in this context
and focuses on QoS frameworks to support terminal mobility between satellite,
wireless, and terrestrial networks. In particular, we analyze the problem of the
multiple access to dierent networks (which includes satellite, wireless, and
terrestrial networks) in order to support more than one access network at the
same time. In such a context, the focus is on network selection based on QoS
parameters. We work on QoS parameter identication at layer 2 for selected
applications as well as IP-oriented solutions for network mobility and network
selection. Let us consider two specic topics:
Table 8.1: Packet loss and residual bandwidth after FZC encoding.
1
According to ITU-R Recommendation 500-5, MOS values are: imperceptible
(5), perceptible but not annoying (4), slightly annoying (3), annoying (2), very
annoying (1).
Chapter 8: RESOURCE MANAGEMENT AND NETWORK LAYER 267
Table 8.2: Maximum, mean and variance of delivery delay. See reference [31].
Copyright 2005
c IEEE.
Table 8.3: Acceptability of received video. See reference [31]. Copyright 2005
c
IEEE.
The second topic of our study on the interconnection of WLAN and satellite
networks deal with some mechanisms for error recovery when a Fast HandOver
(FHO) occurs between dierent IEEE 802.11b Access Points (APs). Fast
handover techniques using paradigms like make-before-break or bi-casting
reduce the L3 handover time to extremely short delays that are acceptable
for all the applications [37]. However, in layer 2 (L2), the handover time is
268 Ulla Birnbacher, Wei Koong Chai
very high for some technologies. So, when doing an intra-technology handover
(e.g., the interface changes its AP and/or channel), an unacceptable disruption
may occur. For instance, in IEEE 802.11b (WiFi) an FHO procedure can take
from about 500 ms in a standard mode, to less than 10 ms in an optimized
mode, where the number of frequencies, scanned in order to establish the new
communication, is sensibly reduced [38]. During such a time, all transmitted
information can be lost. In such a context, the adoption of robust FZC codes
can permit to recover totally the lost information. This procedure may cost
in terms of bandwidth utilization and computational complexity, due to the
generation of the redundant information. To minimize these facts we propose
to use FZC in the last hop, i.e., between the Mobile Node (MN) and its Access
Router (AR). In what follows, AP and AR terms are used interchangeably.
The Core Network (CN) will then not need extra computational power and
use more bandwidth in its access link.
During the L2 disruption, both the ARs and the MN can stop sending pack-
ets and buer them and send them when the connectivity is re-established.
Indeed, during an FHO, the MNs have means to predict that there is going
to be an L2 disruption. For instance, they may know the instant in which
the FHO takes place or nishes or its duration, but, perhaps, not with
accuracy or some parameters may be unknown. Buering by its own is not
a perfect solution; hence, we propose to complement it with FEC techniques
of the FZC type. Our solution consists in adding (or increasing) the FEC
used between MN and ARs during the predicted FHO duration. Table 8.4
permits to understand the advantage of FEC techniques with respect to
pure buering. This table depicts an FHO (beginning and end instants of
the L2 disruption are indicated) and also shows when the disruption actually
happens. If we use buering, the communication is cut between the disruption
indications and then the buered packets are sent. But using FEC, MN and
Chapter 8: RESOURCE MANAGEMENT AND NETWORK LAYER 269
ARs continue sending packets and the communication is cut only during the
actual disruption. When this disruption ends, lost packets may be recovered
by exploiting FEC capabilities. When L2 disruption end is indicated, FEC
can be stopped. Of course the advantage of FEC versus buering depends on
how big is the shift between disruption indication and actual disruption.
TIME
Communication Normal L2 L2 L2 L2 Normal
status (mobile Tx disruption disruption disruption disruption Tx
node) indication end
indication
Mobile node Buering Buering Buering Buering
behavior
Correspondent pkt Rx pkt Rx
node behavior
Mobile node FEC FEC FEC FEC
behavior using
FEC techniques
Correspondent pkt Rx pkt Rx pkt Rx pkt Rx
node behavior
when the MN
uses FEC during
handover
Table 8.4: Buering versus FEC techniques while the transmitter node undergoes
an FHO.
A rst problem to solve is how the MN will indicate its own software and
the AR that it is going to perform an FHO. That may depend on the actual L2
technology and even, in some technologies, the AR will be the one telling the
MN that it has to move. In WiFi, when the MN detects that the signal level
of its current AR decreases bellow a threshold, it initiates the FHO procedure
(scanning new channels in new ARs and then doing the FHO to the selected
channels). This issue can trigger two actions in the MN: it starts doing FEC
and tells the AR to do so as well.
The second issue to solve is to determine the ideal amount of redundancy
in the FEC technique. Hence, we must calculate the maximum number of
packets lost during L2 disruption (we must estimate the total disruption time
and the packet rate). This number of packets is the redundancy that must
be included in the FEC. In Table 8.5 this disruption time (shadowed parts)
corresponds to 3 packets and thus 3-packet redundancy is added (packets 3, 4
and 5). Note that information packets are labeled with a letter and redundancy
packets with a number.
Also the buering needed at the receiver (both MN side and the AR one,
270 Ulla Birnbacher, Wei Koong Chai
Time 5 6 7 8 9 0 1 2 34 5 6 7 8 9 0 1 2 3 4 56 7 8 9 0 12 3
Informat. A B C D E F G H I J
frames
Tx frames AB C12 D E F G 3 4 5 H I J 67
Rx frames AB C12 F G 3 4 5 H I J 67
Buer at Rx A B C D E F
Note that these aspects can also apply if the FEC technique is employed
between the CN and the MN, being the ARs transparent to that. However,
there are many advantages of employing the FEC technique in the MN-AR
link and at link level. First, in our proposed FHO scheme, the AR already must
have special functionality like bicasting, thus adding this FEC functionality
will not complicate too much the AR. Second, redundancy is only present
in the last hop, besides in this last hop, FEC techniques may already be
employed because the link (e.g., air link) may be prone to errors, so, perhaps
our solution can be implemented just modifying the parameters of the existing
FEC. Finally, in a multicast scenario, the source will send the data and the
ARs would be the ones to add the appropriate FEC redundancy.
while the switching approach has been adopted in the scope of single domain
networks with known topology, or single-provider-managed area networks
(LAN, WAN, MAN). LEO satellite can be classied as an extension of
LAN/MAN, in which the network topology changes over time in a regular
and predictable way, thus the switching approach can be a natural candidate
for network management issues. Furthermore, an Ethernet-like switching
solution (i.e., the one proposed by IEEE 802.1) addresses the problem of
the interoperation between network layer and the satellite-specic MAC. The
mechanism is known as Logical Link Control (LLC), and provides a useful
framework to deploy an IP-MAC mapping with QoS control.
IEEE 802.1 standards oer a set of facilities meant to build, operate and
manage a network comprising one or more transmission technologies and one
or more communication methods (i.e., physical and MAC layers). Bridging of
dierent technologies is obtained by using special devices (i.e., bridges) that
are able to translate, when needed, frames from a given MAC format to a
dierent one. In particular, IEEE 802 standards propose a special LLC layer
[39], located just above the MAC layer [40], that is common to all network
segments and whose frames can be transported in any kind of MAC frames.
LLC is the glue that allows the system to interconnect dierent physical and
MAC solutions of the IEEE 802 family.
Switches can be used in order to reduce the number of competitors to the
same shared medium in a network, by segmenting the overall network and
bounding the frame transmission in a limited range. In a switched-network,
users can receive and transmit at the same time by means of two separate
channels, the so-called Full Duplex Switched Ethernet facilities that can be
suitably used in Gigabit LANs.
Now, it is worth noting that:
LLC functionalities are analogous to protocol adaptation functions that
are used for the transportation of IP trac over satellite devices;
LEO payload with bridging/switching modules is envisioned for future
satellite networking;
Full-duplex techniques are consistent with satellite communication sys-
tems, where dierent channels are commonly adopted for uplink and
downlink.
Thus, we rstly questioned how much existing Ethernet-like solutions
could be reused to obtain a protocol harmonization for satellite and terres-
trial devices; secondly, we investigated how existing mechanisms should be
enhanced to mach with satellite-specic issues, and in particular with LEO
mobility problems.
Our research turns in the exploitation of a cross-layer design of layers
2 and 3. In fact, layer 2 switching is performed on the basis of end-to-end
connections to be established (known from the IP demand, which does not
involve all the LEO network at once, but only a set of sub-networks, possibly
separated), and by taking into account the knowledge of logical path changes
272 Ulla Birnbacher, Wei Koong Chai
if a link abruptly fails. These advanced features are oered by IEEE standards
for VLANs [41] that include LLC for switching and bridging, Spanning Tree
Protocol (STP) and its variants Rapid STP (RSTP) [42] and Multiple STP
(MSTP) [43], and VLAN tagging methods. IEEE VLAN and MSTP can be
suitably adopted in order to simplify the management of a huge number of
connections, even though adopting satellite switching implies the constitution
of very large WANs or MANs where IP routing is unnecessary. Important
advantages can be obtained, such as the possibility to exploit a particularly
broad connectivity, or the possibility to eliminate IP route discovery latency,
frequent inconsistencies in IP routing tables due to LEO topology changes,
and path elaboration delays.
Although spanning tree protocols are able to rearrange their conguration
after a link or a node fails, the satellite VLAN approach only works if
spanning trees and VLANs are proactively adjusted when the LEO logical
topology changes. Note that legacy reconguration procedures could take
several seconds (due to the huge network diameter) during which the network
graph results unconnected. However, the adoption of proactive mechanisms is
reasonable since: (i ) the LEO satellite eet is known a priori ; (ii ) the LEO
eet can be designed so that at lest one satellite is always visible in the target
coverage area, and at least two satellites are visible during a handover event.
Thus, the proactive management simply consists of setting up a new VLAN
with a new spanning tree before the handover is performed, thus forcing a
VLAN handover before the physical handover. Note that, as for the VLAN
handover procedure, it simply requires to change the tagging of frames at the
edge of the satellite path from the old VLAN tag to the new one.
Considering the service oered to end-users, the adoption of VLANs with
proactively managed multiple spanning trees allows avoiding: (i ) IP data-ow
discontinuities due to physical topology changes, (ii ) waste of large time
intervals in spanning tree recongurations, triggered by the failure of a link
or a node, and (iii ) waste of bandwidth due to possible ooding eects after
recongurations.
Multiple VLANs allow the network provider to hide network topology changes.
In fact, during a topology transition, a new path will be available before the
old path goes down. We include these dierent paths within dierent VLANs
(i.e., addressed by dierent VLAN tags in the frame header) and switch to
the new path during the topology transition. The VLAN manager knows the
topology transition and enforces a VLAN tag change (i.e., a VLAN handover)
at the edge of the network, so that each frame will follow a path in the VLAN
identied by its new tag. In practice, we use multiple VLANs as redundant
sub-networks.
Table 8.6 [44] reports what happens to frames generated in a message
exchange between two terrestrial users at the edge of a Teledesic-like LEO
274 Ulla Birnbacher, Wei Koong Chai
network, when UDP is used, comparing the case in which a VLAN handover is
adopted to a scenario without such a feature. We consider the case where only
two users are in the network and only one connection is active (2 ). Summariz-
ing, we can say that the absence of VLANs implies service discontinuities and
long ooding phases after recongurations (due to the unidirectional nature
of UDP exchange considered). Using VLANs, discontinuities of the service are
avoided: packets are not ltered and end-to-end connectivity is not broken.
The ooding after reconguration is bounded to the VLAN used after the
handover; whereas, an STP-based approach would ood the entire network
(STP uses a single tree for the entire network). Similar considerations can
be made when TCP is used, with the exception of the occurrence of short
ooding phases, due to frequent TCP ACKs.
UDP
Event Action (No VLAN) Action (two VLANs)
Service request Flooding Flooding in VLAN#1
from Client Switches learn Client VLAN#1 switches learn
address Client address
Service response Switching/no ooding Switching/no ooding
from Server Switches learn Server VLAN#1 switches learn
address Server address
Service data sent Switched/no ooding Switching/no ooding
Topology change Re-compute Spanning Tree Handover to VLAN#2
LAN temporarily Re-compute CIST and
disconnected VLAN#1 Spanning Tree
All frames discarded VLAN#1 temporarily
disconnected
VLAN#2 ooded, ltering
databases are empty
Downstream Network ooded by new VLAN#2 ooded by all
(Upstream) frames switches until an up- switches until an up- (down-)
after (down-) stream frame is stream frame is sent by Client
reconguration sent by Client (Server) (Server)
Table 8.6: How topology changes aect UDP connections. Note that each network
region that is managed by MSTP needs a Common Internal Spanning Tree (CIST)
to interconnect all nodes in that region. See reference [44]. Copyright 2005
c IEEE.
Table 8.7 [44] collects a set of actions performed by network entities at the
occurrence of specic TCP-related events. The advantage of using proactive
VLANs is clear from the comparison with the legacy behavior of switches,
2
This is the worst-case scenario, since switching devices need bidirectional ows
in order to learn the route towards a remote user, otherwise frames are ooded
in the VLAN.
Chapter 8: RESOURCE MANAGEMENT AND NETWORK LAYER 275
as described in the central column of the table, and the behavior of the
VLAN with support for o-line reconguration, as described in the rightmost
column: VLANs reduce ooding eects and o-line reconguration eliminates
service discontinuities. However, a ooding phase is still needed in order to ll
the ltering database (a layer-2 routing table built by bridges by monitoring
incoming frames - source address and incoming port - to discover the outgoing
port to be used to forward frames without the need of ooding) of the new
VLAN.
TCP
Event Action (No VLAN) Action (two VLANs)
Request from Flooding Flooding in VLAN#1
Client (TCP SYN) Switches learn Client VLAN#1 switches learn
address Client address
Response from Switching/no ooding Switching/no ooding
Server (TCP ACK) Switches learn Server VLAN#1 switches learn
address Server address
TCP SYN-ACK Switched/no ooding Switched/no ooding
Service data ow Switched/no ooding Switched/no ooding
Clients ACK Switched/no ooding Switched/no ooding
Topology changes Re-compute Spanning Tree Switch to VLAN#2
LAN temporarily Re-compute CIST and
disconnected VLAN#1 Spanning Tree
All frames discarded VLAN#1 temporarily
disconnected
Downstream Flooded by new switches Flooded in VLAN#2
(Upstream) frame until an up- (down-) switches until an up- (down-)
after stream frame is sent by stream frame is sent by Client
reconguration Client (Server) (Server)
Table 8.7: How topology changes aect TCP connections. See reference [44].
Copyright 2005
c IEEE.
Fig. 8.17: Possible network topology with two VLANs available. See reference [44].
Copyright 2005
c IEEE.
in Table 8.6 for UDP and the considerations about TCP in Table 8.7. Details
are provided below.
but several seconds, about 10 s, are still needed to recongure the large
switched-network. On the contrary, precongured VLANs allow a seamless
handover, without service discontinuities. In Figure 8.20, a VLAN handover
is enforced at t = 940 s, just a few seconds before the physical topology change.
Similar considerations could be made by considering bidirectional UDP ows,
where the trac is generated in each direction as in the unidirectional case.
Figures 8.21 and 8.22 depict the throughput of a TCP connection for
hosts requesting FTP les from a network server. In this case, trac ows
are bidirectional, due to the presence of ACK packets in the return channel,
even though the connection is strongly asymmetric. In these simulations,
a topology change occurred at t = 800 s. By using STP (Figure 8.21) or
RSTP, we can notice a service interruption with a duration similar to that
experienced in UDP simulations, but the eect is partially masked by the
build up of long queues at the last satellite-to-ground station link, especially
for the TCP Class III, which is allotted the minimum resources. It is worth
noting that after the network reconguration, each trac group aggregate
suers from high uctuation due to the synchronization of TCP ows after
the outage period. In particular, Class I experiences a very drastic uctuation,
while lower rate trac classes grow very slowly. Eventually, if we consider the
adoption of VLAN (Figure 8.22), with a handover operated at t = 790 s, no
signicant variation can be noted in the trac aggregate of each class. Again,
o-line congured VLANs allow ground stations to switch seamlessly between
VLANs, and avoid service discontinuities.
As for the ooding eects due to topology changes, rst we consider
unidirectional UDP ows in the network, from site T1 to site T2. Figures
Chapter 8: RESOURCE MANAGEMENT AND NETWORK LAYER 279
8.23 and 8.24 represent data ooded by switches when no appropriate entries
are found in the ltering database. Each ooded data frame is accounted for
only once, no matter if multiple switches will ow again the same frame. In
practice, a ooding phase starts after an automatic route change, performed
by RSTP (or STP, not showed here). This is the reason why Figure 8.23
shows ooded packets for multiple sources after the rst disrupted path is
recovered, which is not mandatory for the data path we are interested to.
280 Ulla Birnbacher, Wei Koong Chai
Thus, the ooding phase ends only after the network is fully recongured and
a new frame is sent in the reverse path for each user (i.e., after a new request
is sent per each UDP trac class, which is represented, in these simulations,
by a single user). Figure 8.24 shows that by adopting VLAN-based network
management, a simple VLAN handover is required a few seconds before the
original path goes down. However, VLAN handover requires a brief ooding
phase just after the handover, since the ltering database learning phase has
to be performed as well.
Chapter 8: RESOURCE MANAGEMENT AND NETWORK LAYER 281
8.7 Conclusions
Over the past decades, with the emergence of many multimedia Internet
applications and services, the research community has devoted a big eort
in an attempt to satisfy their stringent and varied QoS requirements. A clear
example of this eort is the initiative by IETF in proposing two IP QoS
frameworks. These frameworks are mainly designed with terrestrial networks
in mind. However, the problems of achieving QoS in networks with wireless
medium such as satellite networks are much more complicated since the link
is dependent on channel conditions. Hence, the resource management block is
vital in realizing the IP QoS frameworks.
Standard mechanisms which operate solely in the network layer most
often cannot guarantee the QoS when the end-to-end path involves satellite
or wireless networks as they disregard the variability of channel conditions.
This leads to the investigation of utilizing MAC layer resource management
schemes or protocols to improve this situation. More recently, the idea of using
cross-layer techniques further open up the potential of what can be achieved
in terms of QoS provision.
Being in adjacent layers in the protocol stack, resource management (layer
2) in satellite networks is always tightly coupled with the IP QoS frameworks
(layer 3). This Chapter has been dedicated to the cross-layer interactions and
issues between these two layers. A review of the current state of the IP QoS
frameworks in relation with the satellite network shows that DiServ is being
increasingly accepted and an example implementation of relative DiServ is
given as an illustration on how MAC layer scheduling can support the QoS
provisioning. The problem of mapping between the QoS mechanisms operating
at the two layers has been formulated and a measurement-based approach has
Chapter 8: RESOURCE MANAGEMENT AND NETWORK LAYER 283
been presented. The problem is also discussed in two other scenarios; namely
the dual network access and Switched Ethernet over LEO satellites.
From the discussions and results presented in this Chapter, it is clear
that achieving IP QoS in a satellite environment can certainly benet from
cross-layer mechanisms from layer 2. Nevertheless, caution must be observed
when designing such cross-layer schemes. Uncontrolled implementation of
cross-layer mechanisms may cause other problems that may not be apparent
in a short period of time. Cross-layer design aimed at improving a specic
performance metric may not have the entire system performance considered
while cross-layer design involving multiple layers may lead to spaghetti design
with high number of convoluted interactions. All these aspects will increase
system complexity and hence will pose problems for future innovations. Worse,
system update may require complete redesign. Another example of a negative
impact of uncontrolled cross-layer design is on network security issues: the
increased interactions among layers may increase the channels for security
attacks. In conclusion, designers must have the long-term eects in mind.
References
[15] ETSI, Satellite Earth Stations and Systems (SES). Broadband Satellite
Multimedia, Services and Architectures, ETSI Technical Report, TR 101 984
V1.1.1, November 2002.
[16] ETSI, Satellite Earth Stations and Systems (SES). Broadband Satellite
Multimedia, IP over Satellite, ETSI Technical Report, TR 101 985 V1.1.2,
November 2002.
[17] N. Iuoras, T. Le-Ngoc, Dynamic Capacity Allocation for Quality-Of-Service
Support in IP-Based Satellite Networks, IEEE Wireless Communications
Magazine, Vol. 12, No. 5, pp. 14-20, October 2005.
[18] N. Iuoras, T. Le-Ngoc, M. Ashour, T. Elshabrawy, An IP-Based Satellite
Communication System Architecture for Interactive Multimedia Services,
International Journal of Satellite Communications and Networking, Vol. 21,
No. 4-5, pp. 401-426, July-October 2003.
[19] T. Le-Ngoc, V. Leung, P. Takats, P. Garland, Interactive Multimedia Satellite
Access Communications, IEEE Communications Magazine, Vol. 41, No. 7, pp.
78-85, July 2003.
[20] S. Combes, L. Goegebeur, M. Fitch, G. Hernandez, A. Iuoras, S. Pirio,
Integrated Resources and QoS Management in DVB-RCS Networks, in Proc.
of the 22nd AIAA International Communications Satellite Systems Conference
& Exhibit 2004 (ICSSC), Monterey, CA, May 2004.
[21] M. Marchese, M. Mongelli, Rate Control Optimization for Bandwidth
Provision over Satellite Independent Service Access Points, in Proc. of IEEE
Globecom 2005, St. Louis, MO, USA, pp. 3237-3241, November 28 - December
2, 2005.
[22] M. Marchese, M. Mongelli, On-Line Bandwidth Control for Quality of
Service Mapping over Satellite Independent Service Access Points, Computer
Networks, Vol. 50, No. 12, pp. 1885-2126, August 2006.
[23] M. Marchese, M. Mongelli, Real-Time Bandwidth Control for QoS Mapping of
Loss and Delay Constraints over Satellite Independent Service Access Points,
submitted to IEEE Transactions on Wireless Communications.
[24] C. G. Cassandras, G. Sun, C. G. Panayiotou, Y. Wardi, Perturbation
Analysis and Control of Two-Class Stochastic Fluid Models for Communication
Networks, IEEE Transactions on Automatic Control, Vol. 48, No. 5, pp.
770-782, May 2003.
[25] N. Celandroni, F. Davoli, E. Ferro, Static and Dynamic Resource Allocation in
a Multiservice Satellite Network with Fading, International Journal of Satellite
Communications and Networking, Vol. 21, No. 4-5, pp. 469-487, July-October
2003.
[26] Y. Wardi, B. Melamed, C. G. Cassandras, C. G. Panayiotou, Online IPA
Gradient Estimators in Stochastic Continuous Fluid Models, Journal of
Optimization Theory and Applications, Vol. 115, No. 2, pp. 369-405, November
2002.
[27] R. Guerin, H. Ahmadi, M. Naghshineh, Equivalent Capacity and its
Application to Bandwidth Allocation in High-Speed Networks, IEEE Journal
on Selected Areas in Communications, Vol. 9, No. 7, pp. 968-981, September
1991.
[28] Web site with URL:
http://www-tkn.ee.tu-berlin.de/research/trace/trace.html.
Chapter 8: RESOURCE MANAGEMENT AND NETWORK LAYER 287
2
UToV - University of Rome Tor Vergata, Italy
3
CNR-ISTI - Research Area of Pisa, Italy
4
CNIT - University of Siena, Italy
9.1 Introduction
The main challenges to be faced by transport protocols using a satellite link
are the variability of the channel, due to weather conditions and the large
propagation delay. Adaptive network management and control algorithms are
therefore desirable to guarantee the Quality of Service (QoS) to data ows over
Additive White Gaussian Noise (AWGN) channels (a baseline assumption in
the following analysis).
Many popular Internet applications including email, le transfer, remote
access, and Web browsing require a reliable data delivery service. End-to-end
reliability for Internet trac is guaranteed by the Transmission Control
Protocol (TCP) at the transport layer. TCP specication covers a wide family
of implementations, some of them having traditionally very poor performance
over satellite links [1],[2]. Furthermore, TCP performance actually depends on
the adopted Radio Resource Management (RRM) techniques. The DVB-RCS
290 Gorry Fairhurst, Michele Luglio, Cesare Roseti
network (e.g., the transmission and propagation time of other links in the
terrestrial path, and queuing delays in gateways and routers). Hence, the
high RTD value entails a slow TCP congestion window (cwnd ) increase that
signicantly aects the end-to-end transfer rate [7].
Much research has been directed to improve the TCP mechanism eciency
over satellite links. This Section provides a complete survey of dierent
solutions proposed.
slow start time = RT T log2 (ssthresh)
(9.1)
congestion avoidance time = RT T (W ssthresh)
where W denotes a suitable cwnd value reached in the CA phase (the ideal
one corresponding to BDP).
Chapter 9: RESOURCE MANAGEMENT AND TRANSPORT LAYER 293
T CP receiver window
M ax throughput = (9.2)
RT T
where TCP receiver window indicates the maximum amount of data the re-
ceiver can store in its buer at every time. In many systems, this value is adver-
tised using a 16-bit eld in the TCP header (maximum TCP receiver window
= 65535 bytes).
Despite widespread support for much larger TCP receiver windows within
the current deployed protocol stacks, these are rarely enabled by default;
therefore, in GEO satellite links (with RTT about equal to 540 ms), the upper
bound for the throughput is around 1 Mbit/s.
Many solutions can be adopted to improve the TCP eciency over satellite
links; some of them are specically proposed for the satellite environment
while others for more general cases. Such solutions can be classied as follows:
Enhancements of the standard
Modied algorithms
Modied architecture
used; there is no standard PEP that satises all needs, and the most
appropriate method will depend upon the service requirements (whether
IPv6, mobility, IPsec, etc. are used), the link characteristics and the degree
of complexity that users can tolerate in a middlebox. One common PEP
method is to modify the end-to-end architecture at the transport protocol
level (i.e., splitting the path, terminating connections, acknowledging
packet receptions) by using one of the following approaches:
of thumb is to engineer the link so that PER due to link errors is negligible
with respect to the loss rate caused by congestion. However, this could not
be the appropriate choice; in [20] in fact, it is shown that a good rule of
thumb is to set the ratio between PER and congestion loss to a value equal
to the number of TCP connections. This nding opens the possibility for
dening adaptive algorithms that dynamically choose the optimal channel
parameters (e.g., modulation and coding) with the aim of maximizing the TCP
performance. Implementing such algorithms requires a cross-layer approach,
because physical layer parameters such as modulation and coding need to be
tuned depending on information available at the transport layer.
The following analysis of the TCP performance highlights the cross-layer
issues and interactions with the physical layer by relating PER with the TCP
throughput. In 1997, a simple and elegant formula, relating the steady-state
performance of TCP to its segment loss rate, was discovered [21]. This formula
connects the maximum throughput on an unlimited bandwidth channel with
the Maximum Segment Size (MSS), RTT, and the packet (segment) loss rate,
PER:
M SS
throughput = K f or P ER < 1% (9.3)
RT T P ER
where K is a constant equal to 1.31 in the case of random segment losses
without delayed ACKs.
Subsequently, (9.3) was modied to take into account the TCP behavior
in the presence of timeouts [22], thus allowing for a greater accuracy at higher
PER, resulting in:
M SS
throughput = ( ( (9.4)
2bq
RT T 3 + RT O min 1, 3 3bq
8 q (1 + 32q 2 )
and to exploit as much as possible the available radio spectrum. Most modern
transmission systems provide for variable bit-rates by changing the used FEC
redundancy, some of them for each individual packet. It is even possible to
seamlessly change the FEC, while maintaining bit time synchronization of the
data stream, by using rate-compatible punctured convolutional codes [25].
Concerning the modulation scheme, let us consider a satellite carrier modu-
lated at a rate of S symbols/s. We envisage widely diused M -ary modulations
such as Amplitude and Phase Shift Keying (APSK) or Quadrature Amplitude
Modulation (QAM) types. In these schemes, M is the number of points, in the
phase-amplitude space, relative to the constellation of the modulated symbols.
Typical values of M are 2, 4, 8, 16, 32, and 64; Binary Phase Shift Keying
(BPSK) and Quadrature Phase Shift Keying (QPSK) schemes correspond to
M values of 2 and 4, respectively.
FEC types come in a multitude of modes, often concatenated between
them. We dene the coding rate r as the inverse of the coding redundancy.
For example, in the case of a (255, 223) Reed-Solomon code concatenated
with a 1/2 convolutional code, the resulting r is 223/(255 2) = 0.437.
The IBR (i.e., the TCP bottleneck rate) is given by
Fig. 9.2: Goodput of a single TCP NewReno connection versus the available IBR
for dierent C/N0 values. Packet size = 1 kB, S = 1.024 Msymbol/s, bottleneck
buer size = BDP of a GEO link. Labels indicate modulation schemes and FEC
rates.
This gure is reproduced from Transport Layer Protocols and Architectures for Satellite
Networks, C. Caini, R. Firrincieli, M. Marchese, T. de Cola, M. Luglio, C. Roseti, N.
Celandroni, F. Potort`, International Journal of Satellite Communications and Networking,
Vol. 25, No. 1, pp. 126, January/February 2007. Published Online October 10, 2006
http://www3.interscience.wiley.com/cgi-bin/jissue/104548349. 2006.
c Copyright John Wiley &
Sons Limited. Reproduced with permission.
298 Gorry Fairhurst, Michele Luglio, Cesare Roseti
The above discussion leads to the conclusion that satellite systems could
benet from adaptive algorithms for choosing the transmission parameters by
means of cross-layer interactions between transport and physical layers. An
additional possibility is that MAC and physical layers interact by inserting
a link-layer erasure code [20],[27] just above MAC layer, which could be an
all-software solution, independent of the underlying hardware characteristics.
The recent DVB-S2 standard [28] considers very powerful error-correcting
codes. For ideal AWGN channel conditions, an optimization based on channel
coding would be useless because the curves that give PER versus Eb /N0 are
very steep [29], causing a sort of on-o behavior of the physical channel: either
PER is negligible, or it is so high that it collapses TCP performance. However,
optimizing channel parameters makes sense in non-ideal channel conditions,
and, in general, on the satellite return channel [3].
Consequently, the MAC layer can know the law according to which cwnd is
enlarged on an RTT basis and can predict with a very good accuracy the
necessary resource allocation needed by each TCP ow. In this way, it is
expected to reduce signicantly queuing delay, while also achieving an ecient
utilization of the satellite shared capacity. More details on this approach are
provided in the following sub-Sections.
) L1 *
q (k) ns a (k) ns j=1 r (k L + j) ns w (k)
r (k) = (9.7)
ns
where:
. denotes rounding to the upper positive integer;
q(k ) = amount of queued data;
ns = number of frames per super-frame;
ns a(k ) = capacity assigned in the k -th super-frame;
L = system response time expressed in super-frames (also indicated as
allocation period ); it represents the time elapsed from a capacity request
transmission
L1 to the actual assignment of the requested capacity;
ns j=1 r (k L + j) = resources requested in the previous super-frames,
but not yet assigned;
ns w (k ) = resources requested in the previous allocation periods and not
yet assigned.
Unfortunately, the VBDC allocation method leads to a huge increase in
the end-to-end delay perceived by the systems where TCP applications are
running. In fact, the above mentioned access delay involves in this case the
following contributions:
Reservation delay: since requests are sent at a xed rate in dedicated slots,
a time interval occurs between the arrival of data in the MAC buer and
the transmission of the corresponding capacity request;
RTD contribution: sum of the time to propagate the capacity request from
the RCST to the NCC and the time to deliver the Terminal Burst Time
Plan (TBTP) in the opposite direction;
300 Gorry Fairhurst, Michele Luglio, Cesare Roseti
2 ns " a (k) # Slow Start
Q (k) = . (9.8)
ns a (k) 1 + cwnd 1
Congestion Avoidance
r (k) = (9.9)
) L1 *
q (k) ns a (k) ns j=1 r (k L + j) ns w (k) Q (k)
= + .
ns ns
1
The value of RTT 3 RTD is due to the use, for the simulations, of an architecture
where NCC is separated from the Gateway.
2
This assumption is appropriate to current DVB-RCS systems when the TCP
ow is not encrypted, especially when PEP mechanisms are used at the satellite
Gateway to end TCP connections within the satellite segment.
Chapter 9: RESOURCE MANAGEMENT AND TRANSPORT LAYER 301
On the other side, the NCC serves all incoming requests by considering
two priority levels: a High priority level associated to requests with the TCP
phase ag set to 1, and a Low priority level associated to requests with the
TCP phase ag set to 0. Our aim is to prioritize connections in the SS phase
with respect to those operating in the CA one to favor both short transfers
and just started connections. In each queue (i.e., the queue for requests in the
SS phase and the queue for requests in the CA phase), requests are satised
according to Maximum Legal Increment (MLI) algorithm [34] to guarantee a
fair allocation among the dierent competing ows.
If the amount of needed resources exceeds those available in a super-frame,
the NCC creates a waiting list to assign the resources in the next super-
frames and stops the cwnd growth of all the connections coming from the
RCSTs that have not obtained the requested resources. In particular, the
proposed allocation scheme at the NCC performs the following two tasks:
Assure that resources are fairly shared among all the active TCP connec-
tions;
Provide a further cross-layer action that sets a new variable, named cwnd*,
in order to modify the current cwnd value used by the TCP source in the
RCST as follows: cwnd cwnd*. Note that the NCC (acting like a
PEP) sends back the cwnd* value by using a eld for TCP options (layer
4 ACKs) in the headers. The rationale of this modication on the TCP
protocols is to avoid internal congestion on the RCST side and, then, the
possibility of layer 2 buer overows.
Reduction of the access delay: since the request algorithm predicts also the
amount of data that will feed the RCST queue due to the TCP congestion
control mechanism, the access delay will be reduced of an RTD;
Avoidance of internal congestions at the RCSTs: the cross-layer interaction
between RRM and TCP layers permits to prevent layer 2 buer overows
due to satellite network congestion;
Ecient and dynamic resource allocation: resources are dynamically as-
signed on a super-frame basis according to explicit requests, thus allowing
a better utilization of the available capacity.
302 Gorry Fairhurst, Michele Luglio, Cesare Roseti
A simulator has been implemented using ns-2 (release 2.27) [35], in order to
evaluate the performance of the cross-layer allocation process and the resulting
performance. In particular, the ns-2 extensions that reproduce a traditional
GEO satellite network have been modied to simulate a centralized Multi
Frequency - Time Division Multiple Access (MF-TDMA) scheme and the NCC
functionalities.
The interaction between the TCP cwnd trend and the corresponding
allocation process has been analyzed by means of the average resources
assigned (in slots) as a function of time; such parameter has been monitored
for one or more TCP connections sharing the return link of a communication
network compliant to Scenario 2 described in Chapter 1, sub-Section 1.4.5.
The main simulation parameters are detailed in Table 9.1.
Physical parameters
Physical RTT (RTD) 515 ms
Return link bandwidth 2048 kbit/s
Maximum number of RCSTs 32
Frame parameters
Super-frame duration 96 ms
Number of slots per frame 32
Protocols
Transport Protocol TCP NewReno
Application Protocol FTP
TCP parameters
TCP packet size 1500 bytes
PER Variable, from 0 to 0.0001
Fig. 9.3: Comparison between allocated resources and cwnd trend versus time (1
TCP connection, PER = 104 ).
Referring to our TCP-driven RRM scheme, Figure 9.4 focuses on the fair
resource sharing between two TCP connections, when losses occur. At the
beginning, the capacity is saturated (i.e., the NCC stops the cwnd growth of
both the connections in order to prevent congestion and losses): the overall
capacity is perfectly divided between the two connections. When a connection
is aected by a transmission error (loss), with consequent cwnd reduction, the
NCC re-assigns temporarily the unused capacity to the other connection in
order to optimize the utilization of resources.
Performance evaluation
VBDC presents the higher delay equivalent to about three times the
physical RTD (see Chapter 1 for RTD characteristics) [33]: 1 RTD for
the capacity request (on the basis of new data in the layer 2 queue, RCST
side) and notication exchange; 1 RTD for the TCP segment and ACK
304 Gorry Fairhurst, Michele Luglio, Cesare Roseti
Fig. 9.4: Comparison among allocated resources in the RTT versus time (2 TCP
connections, PER = 104 ).
Fig. 9.5: Comparison among average RTT values obtained with the following
techniques: VBDC, CRA and cross-layer scheme.
Chapter 9: RESOURCE MANAGEMENT AND TRANSPORT LAYER 305
exchange; 1 RTD for the capacity allocation for the availability of the
channel for ACK transmissions (Gateway side).
In the CRA case, RTT is only aected by the physical delay RTD, since
the capacity is not negotiated, but permanently assigned in the set-up
phase of a connection;
The proposed TCP-driven RRM scheme (also simply called cross-layer
scheme in what follows) reduces the overall VBDC delay by almost 1
RTD, trying to predict the amount of data that will feed the RCST queue.
Fig. 9.6: Average le transfer time versus PER (20 FTP transfers starting at
instants spaced of 5 s).
Fig. 9.7: Cross-layer access scheme: utilization and percentage of the average
utilization increase with respect to the CRA scheme (5 FTP transfers starting at
instants spaced of 5 s, PER = 103 ).
Chapter 9: RESOURCE MANAGEMENT AND TRANSPORT LAYER 307
9.6 Conclusions
This Chapter provides an overview of the key issues that concern transport
protocol performance over paths that include a GEO satellite segment. In
particular, it gives a detailed survey of several approaches that permit a better
interaction of transport layer protocols with RRM and physical layers.
308 Gorry Fairhurst, Michele Luglio, Cesare Roseti
Editors: Gorry Fairhurst1 , Mara Angeles Vazquez Castro2 ,
3
Giovanni Giambene
1
UoA - University of Aberdeen, UK
2
UAB - Universitat Autonoma de Barcelona, Spain
3
CNIT - University of Siena, Italy
4
UoB - University of Bologna, Italy
10.1 Introduction
This Chapter describes a number of dierent techniques, approaches and
architectures for cross-layer design. It also seeks to position the work presented
throughout this book with respect to current and anticipated standards,
indicating opportunities for future standardization.
The challenge to be faced is the design of cross-layer mechanisms that
can optimize the overall end-to-end application performance over satellite
links, while minimizing the utilized radio resources. This optimization can also
require additional signaling between the protocol layers. This new area of work
is consistent with the end-to-end argument [1], provided that system-level
implications are understood [2]. Suitable methods are expected to improve
314 G. Fairhurst, M. A. V
azquez Castro, G. Giambene
There are many mechanisms that display these properties and which have
already been standardized, although these were not considered cross-layer
approaches, since the term was not then dened. One possible example
of cross-layer design is Random Early Detection (RED) that was initially
proposed in 1993 [3]. The on-going standardization of cross-layer design will
allow a better understanding of current schemes and cleaner approaches for
future systems.
Bottom-up approach
Top-down approach
are therefore unable to express their requirements in a way that maps easily
to the capabilities of specic lower-layers. Moreover, applications typically
operate over longer time-scales with coarser data granularities (multimedia
ows or blocks of data) than those used at lower layers (operating on bits
or frames). It is therefore non-trivial to perform adaptive source-channel
coding tradeos, given the time-varying channel conditions and the fact that
multimedia applications cannot be expected to adapt instantaneously their
behavior to achieve an optimal performance.
While lower layers can benet from notications of requirements (capacity
estimates, delay bounds, FEC/ARQ needs, priority, etc.) this does not provide
a complete solution. For example, it has limited benet for a satellite system
implementing ACM, since the upper layers may not be able to inuence
usefully the behavior of lower layers, rather, the channel dynamics require
upper layers to adapt themselves.
Hybrid approach
There are cases in which system level constraints are rened in a top-down
fashion, while the target architecture performance is abstracted in a bottom-
up fashion and a meet in the middle approach decides the nal optimization.
In this case, strategies are determined by exhaustively trying/combining all
the possible techniques of both the top-down type and the bottom-up one; the
aim is to achieve the best performance. This presents the highest exibility in
design choices.
However, this hybrid approach can have draw-backs. Constraints on the
design will often prevent an exhaustive analysis of all the possible strategies
(and their parameters) to choose an optimized composite strategy that
would lead to the best possible performance. When designing a cross-layer
methodology, general software architecture principles, such as information
hiding, modularization, and separation of concerns should be considered. A
hybrid approach also poses challenges to design.
Fig. 10.1: Signaling (a) based on packet headers, (b) based on ICMP, (c) based on
a network service, (d ) based on local proles.
In this scheme, channel and link states from the physical layer and link
layer are collected, abstracted and managed by third parties, i.e., distributed
servers (e.g., Wireless Channel Information, WCI, server, see Figure 10.1c).
Interested applications access the servers for their required parameters from
the lowest two layers. Even if there is not a cross-layer signaling scheme
within a terminal, this is a complementary solution to the two above pre-
sented schemes. Nevertheless, intensive use of this method could introduce
considerable signaling overhead and delay over a radio access network.
In this approach, local proles are used on end-hosts to store periodically up-
dating information: cross-layer information is abstracted from each necessary
layer and stored in separate proles. Other interested layer(s) can select the
prole(s) to obtain the desired information as shown in Figure 10.1d.
10.6.3 ETSI
Telecommunications.
Information and communication technology in co-ordination with the
European Committee for Standardization (CEN) and the European Com-
mittee for Electro-technical Standardization (CENELEC).
Areas common to telecommunications and broadcasting (especially audio-
visual and multi-media matters) in co-ordination with CEN, CENELEC
and the European Broadcasting Union (EBU).
The ETSI Technical Committee for Satellite Earth Stations and Systems
(TC-SES) is responsible for all types of satellite communication services
(including mobile and broadcasting) and for all types of Earth station equip-
ment (especially the radio frequency interfaces and network and/or user
interfaces). It maintains an internal liaison with the ETSI EMC and Radio
spectrum Matters (ERM) working group (for electromagnetic compatibility
issues and radio spectrum matters), with the ETSI Special Mobile Group,
SMG (for GSM and S-UMTS), and with the working group TM4 of the
ETSI Technical Committee Transmission & Multiplexing, TM (for xed radio
links). TC-SES also maintains external liaisons with other bodies, including:
ITU-R (SG4 on Fixed Satellite Services, JWP10-11S on satellite broadcasting,
WP 8 D on Mobile Satellite Services, TG8/1 on IMT-2000), CEPT-ERO and
the European Co-operation on Space Standardization (ECSS). Many of the
standards produced by the TC-SES are relevant to mobile satellite systems,
Chapter 10: CROSS-LAYER METHODS AND STANDARDIZATION 325
10.6.4 DVB
The DVB Project was initiated in 1992 [19] and has subsequently imple-
mented an approach of pre-competitive co-operation in the development
of open digital TV standards that can be freely adopted worldwide. The
motivation was to promote a common, standard, European platform for
digital TV broadcasting, and the idea was supported by all players (i.e.,
broadcasters, operators, standardization bodies, media groups and industry).
Today, DVB has 220 members from more than 30 countries worldwide. By
incorporating both commercial and technical bodies within the organization,
DVB has succeeded in delivering transmission standards for television systems
operating over a range of media, including DVB-S, DVB-C and DVB-T
standards. The advent of interactive networks stimulated the standardization
of Return Channels for Cable (i.e., DVB-RCC), Satellite (i.e., DVB-RCS),
Local Multipoint Distribution System, LMDS (i.e., DVB-Return Channel for
LMDS, DVB-RCL), and Terrestrial (i.e., DVB-RCT) systems.
The work in the DVB technical area is organized in ad hoc groups. Each of
them works on commercial requirement documents provided by the Commer-
cial Module. This is a set of user requirements that outline market parameters,
such as user functions, timescales and price range. A DVB specication is
developed in the Technical Module and its working groups, where technological
Chapter 10: CROSS-LAYER METHODS AND STANDARDIZATION 327
DVB-RCS
DVB-S2
The DVB-S2 [22] standard for satellite transmission supports ACM, which
enables high data-throughput eciency. ACM is applicable in networks where
a return channel allows transmission of information concerning the reception
quality from the satellite receiver to the satellite uplink station. The standard
denes the reception quality parameter and its binary coding. The transport
of this parameter back to the uplink station is not in the scope of the standard
and is specied separately for the dierent return channel systems. This has
been done already for satellite return channel in the current release of the
DVB-RCS standard [20].
Another potential application for ACM in DVB-S2 is hybrid satellite-
terrestrial networks for high-speed Internet access. In this kind of networks, a
user terminal receives data over satellite and transmits data over a terrestrial
dial-up connection. The more ecient use of satellite capacity could make
such hybrid networks more attractive and therefore enable a larger market for
DVB-S2 receiver chips with the interactive services prole implemented.
Applicability of DVB-S2-like ACM as a countermeasure to fading due to
terminal mobility is also a possibility. ACM does not help against the fast
fading that occurs in land mobile scenarios due to multipath and, further,
against typically short shadowing and blocking events. The adoption of ACM
in DVB-S2 is intended to counteract rain fading; therefore, it is important
to investigate how terminal mobility changes the time variability of rain fade
events and, hence, the eciency of ACM, e.g., when a car or a high-speed
train travel through a rain cell.
techniques, especially in the return link for terminals with small antennas.
The adoption of spectrum spreading is a possible solution to reduce the
EIRP, while preserving the required SNR, at the expenses of reduced
spectral eciency. In the forward link, the introduction of spreading
requires the design of a new DVB-S2 receiver. In the return link, each
terminal could in principle implement direct spreading within the assigned
time and frequency slot (MF-TDMA approach).
Fading countermeasures: the more challenging propagation conditions of
the non-LoS scenario can be mitigated by adopting advanced techniques
such as diversity and higher layer FEC schemes. Moreover, new synchro-
nization acquisition and maintenance procedures need to be employed to
cope better with frequent fades.
Resource management techniques: ecient RRM schemes need to be
adopted to account for mobility, such as: impact of spreading on the
MF-TDMA allocation process (DVB-RCS); support of handover requests
with suitable protocols; interworking with terrestrial networks in shadowed
areas (e.g., tunnels, cities, etc.) where gap llers can be used; adaptive
schedulin techniques for the forward link that are aware of the physical
layer behavior.
DVB-H
10.7 Conclusions
[13] ETSI, Satellite Earth Stations and Systems (SES); Satellite Component of
UMTS/IMT2000; G-family; Part 3: Spreading and modulation (S-UMTS-A
25.213), TS 101 851-3.
[14] ETSI, Satellite Earth Stations and Systems (SES); Satellite Component of
UMTS/IMT2000; G-family; Part 4: Physical layer procedures (S-UMTS-A
25.214), TS 101 851-4.
[15] ETSI, Satellite Earth Stations and Systems (SES); Satellite Component of
UMTS/IMT2000; G-family; Part 5: UE Radio Transmission and Reception (S-
UMTS-A 25.101), TS 101 851-5.
[16] ETSI, Satellite Earth Stations and Systems (SES); Satellite Component of
UMTS/IMT2000; G-family; Part 6: Space Segment Radio Transmission and
Reception (S-UMTS-A 25.104), TS 101 851-6.
[17] IST-MAESTRO project, Mobile Applications & sErvices based on Satellite &
Terrestrial inteRwOrking; Web site with URL: http://ist-maestro.dyndns.org,
2006.
[18] ETSI, Evaluation of the OFDM as a Satellite Radio Interface Satellite Earth
Stations and Systems (SES); Satellite Component of UMTS/IMT-2000, TR
102 433, 2006.
[19] Digital Video Broadcasting (DVB) Project; Web page with URL:
http://www.dvb.org.
[20] ETSI, Digital Video Broadcasting (DVB); Interaction channel for Satellite
Distribution Systems, EN 301 790.
[21] SatLabs ocial Web site with URL: http://www.satlabs.org/.
[22] ETSI, Digital Video Broadcasting (DVB); Second Generation Framing
Structure, Channel Coding and Modulation Systems for Broadcasting,
Interactive Services, News Gathering and other Broadband Satellite
Applications, EN 302 307.
[23] S. Scalise, G. E. Corazza, C. P
arraga Niebla, P. Chan, G. Giambene, F. Hu, A.
Vanelli-Coralli, M. A. V
azquez Castro, Towards the Revision of DVB-S2/RCS
Standard for the Full Support of Mobility, SSC Newsletter, Vol. 17, No. 2,
November 2006.
[24] SatNEx II Web site with URL: http://www.satnex.org.
Index
I R
Innitesimal perturbation analysis, 99, Radio resource management, 43, 54, 96,
216, 257 101, 119, 177, 289, 303, 318
IntServ, 36, 77, 107, 183, 244 Cross-layer approach, 45, 60, 96, 99,
101, 104, 214, 295, 303, 305
L Joint optimization, 95, 97100
LEO satellite systems, 4, 10, 54, 68, 71, MAC-centric approach, 105
132, 141, 189, 192, 195 Dynamic allocation, 20, 47, 49, 55,
99, 101, 110, 191, 198, 208, 211,
M 213, 214, 218, 233, 248, 251, 256,
299
MAC, 18, 97, 98, 105, 110, 119, 139,
248, 256, 298 Fairness, 44, 217, 232
MEO satellite systems, 4, 10, 48, 71, Reactive algorithms, 210
141 Receding horizon controller, 214
Modeling and simulation, 54 Resource allocation, 23, 46, 99, 121,
138, 158, 179, 184, 208, 225, 249,
299
N Frequency allocation, 46
NCC, 17, 178, 208, 298, 327 Space allocation, 46
Network layer, 243 Time allocation, 46
Node-B, 139
O S
S-UMTS, 15, 58, 108, 121, 131, 152, 325
OSI model, 34, 102 Satellite constellations/orbits, 4, 10, 275
Satellite digital multimedia
P broadcasting, 325
Packet scheduler, 134, 137, 140, 152, Satellite IP networks, 31, 69, 76, 109,
155, 164 248
Index 337