faculty.kfupm.edu.sa/...


QoS Design for 3G Networks




King Fahad University of Petroleum & Minerals

Computer Engineering Department


COE-543 Mobile and Wireless Networks

Dr. Ashraf Sharif Hasan Mahmoud





Final Report

QoS Design for 3G Networks







Name: Abdullah Hamad Al-Subhi


ID # 913659


Date: May 20, 2003










Table of Content




1. Introduction ………………………….…………………………. 2


2. QoS in 3G Networks …………………………….……...…….. 5

2.1 UMTS ……………………………………………………. 5

2.2 CDMA2000………………………………………………. 8


3. 3G QoS Techniques ……………………………….…………. 10

3.1 Traffic shaping and policing ………………………...... 10

3.2 Traffic Scheduling Algorithm …………………………. 14

3.3 DIFFSERV based QoS Architecture ……………... 16


4. QoS Issues in the Converged 3G and Wired Networks 18


5. Conclusion …………………………….………………………. 21


References































Introduction



The goal of third generation (3G) mobile communication systems is the delivery of multimedia services to the user in the mobile domain. This requires the provision of user data rates that are substantially higher than those provided by today’s second generation (2G) networks. In 2G, only data rates of 9.6 kbit/s are currently supported. In 3G users will be provided with data rates of up to 144 kbit/s in macrocellular environments, up to 384 kbit/s in microcellular environments and up to 2 Mbit/s in indoor or picocellular environments. These requirements address the limitations of 2G, which, despite its enormous world-wide success was designed primarily for mobile digital telephony with only a limited data capability.


3G Network enables provides high-speed wireless Internet access to mobile users. The same network can be used to make voice calls using conventional mobile phones. Moreover 3G networks are seen as the enabler of multimedia services like videoconferencing, streaming audio and video etc. These Networks must provide services to many different types of applications without letting data from one application affect the services provided to other types of applications. In other words, 3G Networks must provide Support for Quality of Service.


In 3G wireless Internet, controlling QoS is not about throwing bandwidth at the ‘hot spots’; as a matter of fact, the hottest spot in the network is the radio access portion, the most expensive part of the network. It is about making the best use of available network resources to deliver QoS as required and subscribed by the services and users. Applying policies to QoS control will help to differentiate users and services, as well as to protect higher-tier users and network resources.


The ability to control QoS offers operators ways to differentiate themselves from other competitors by being able to launch new revenue-generating services faster and to bundle service packages for different user segments. Absence of this ability remains prevalent with most fixed and wireless ISPs today, making them resort to “first come first served ”or “all you can use”’ service models.


What is Quality of Service?


Quality of Service carries different connotations for different people. It is the end users who pay for the service, and whose perspectives matter most. From an end user’s perspective, QoS defines the characteristics of service delivery that impact most critically his/her perception of the service. The three main characteristics of a network delivering QoS to an end user are as follows:





Availability of the service: the service is immediately available or reasonably delayed depending on user’s subscription status. The service availability is faster for a higher-tier subscriber than that for a lower-tier subscriber.


Quality of information: the information is received uncorrupted and usable without errors, as required by the type of the service.


Consistent delivery: The information is delivered throughout the session at a perceivably consistent speed and quality, guaranteeing that the perception of the user remains the same throughout.


At a technical level, QoS is characterized by a set of measurable parameters such as:

Service availability

Delay

Delay variation (jitter)

Throughput

Packet loss rate


Service availability can be further broken down into percentage of blocked and dropped calls, as well as the duration of service outages. QoS enables a network to deliver classes of service (CoS), i.e. different prioritized treatments to different services or to different groups of users. QoS allocates network capacity by type of traffic required by certain type of service, while CoS provides preferred allocation of the network without guaranteeing any measurable amount. CoS is implied in a QoS policy associated with a subscriber. It is used by the network to provide differential QoS treatments to different services subscribed by different users, that is, service and user differentiation.


















2. QoS in 3G Networks


2.1 UMTS


2.1.2 UMTS QoS Architecture


In order to have QoS functionality, it should be configured from the source up to the destination. The traffic moves from Terminal Equipment (TE) to another TE through all network services. The UMTS bearer services consist of two parts: Radio Access Bearer (RAB) and Core Network Bearer (CNB) services. These two services used to optimize the UMTS bearer service in a network topology taking into consideration mobility and mobility subscriber profiles [S1:1187].


The RAB service provides a secured transport of signaling and user data between MT and CN edge with QoS adequate to negotiated UMTS bearer service and with the default QoS for signaling. The RAB is based on the radio interface behavior and maintained for moving MT [S1:1188].


UTRAN and MT have the ability to segment/resemble the user flow into different sub-flow requested by the RAB service. The segmentation/resemble is provided by the Service Data Unit play load format singled at the RAB establishment. The radio bearer service handle the part of the user flow belonging to one sub-flow based on sub-flow reliability requirements. [S1:1188].

The CNB role is to efficiently control and use backbone network to provide the contracted UMTS bearer service. The UMTS packet CN support different backbone bearer services for different QoS [S1:1188].


The CN nearer service uses a generic network service. The backbone network service covers the layer 1 and layer 2 functionality and is selected according to operator’s choice to satisfy the QoS requirements of the CN bearer service [S1:1188].





Figure 1. UMTS QoS Architecture




2.1.3 UMTS QoS Classes.


UMTS network should take care of different obstacles in providing good services in the air and consider all limitations on that aspect. Some real time application can’t afford much delay of packet data being transmitted to have good quality services provided by such an operator. UMTS QoS defines some classes which take care of limitations of the air interface. UMTS define four different classes:


  1. Conversational class.

  2. Streaming class.

  3. Interactive class.

  4. Background.


The conversational and streaming classes are used to carry real-time data or services. Delay is what distinguishes between them in how are they sensitive to it. Conversational class is treated to be the most critical service amonth them because it carry the voice and vido telephony [S1:1189].


The interactive and background classes are mainly used for traditional services like email and FTP. These kinds of services do not need to be delivered on time. They are less sensitive to delay where it accepts reasonably long delay like telnet and some very long delay like email [S1:1189].



Traffic class

Conversational class


Real Time

Streaming class


Real Time

Interactive class


Best Effort

Background class


Best Effort

Fundamental characteristics

- Preserve time relation (variation) between information entities of the stream

- Conversational pattern (stringent and low delay )

- Preserve time relation (variation) between information entities of the stream

- Request response pattern


-Preserve payload content

-Destination is not expecting the data within a certain time

-Preserve payload content

Example of the application

  voice

  streaming video

web browsing

  telemetry, emails



Table 1 UMTS QoS Classes





2.1.3 QoS Management


The control plane QoS management functions include: [S1:1189].



User Plane QoS management function maintains the signaling and user data traffic within certain limits defined by the QoS attributes. It includes: [S1:1189].



















2.2 CDMA2000


2.2.1 QoS implementation


The architecture for provisioning QoS should take into account the need for application and subscriber differentiation. The wireless network should be able to handle various types of applications with vary QoS objectives while optimizing the utilization of system resources. Applications are classified into two types, the real-time and non-real-time application [S2:45].


CDMA2000 define two modes of QoS:





      1. QoS architecture


The end-to end QoS architecture is designed such that the objective specifying by the QoS profile of an application is implemented by utilizing the following services:




Call Admission Control: It is to admit and deny R-P connection. It is based on the following criteria:

QoS Transport in R-P interface: The QoS requirements are specified for each service instant independently. A single PPP session is established between MS and PDSN for each R-P session where each PPP/R-P session supports communication flows for multiple IP addresses belong to the same MS [S2:49].





Figure 2 CDMA2000 QoS Architecture




2. QoS Techniques used in 3G Network


2.1 Traffic shaping and policing


2.1.1 Definition

Traffic conditioning provides conformance of input traffic to the specifications agreed with the bearer service provider. A traffic conditioner may achieve this by traffic shaping or/and traffic policing. The traffic conditioner may be embodied both in a User Equipment (UE) and in the gateway nodes [S3:139].


Two main traffic shaping algorithms are exist , namely Leaky Bucket Algorithm defined by ATM Forum and Token Bucket (TB) Algorithm defined by IETF respectively. TB has been adopted as a reference algorithm for traffic conditioner in UMTS by 3GPP [S3:139].

2.1.2 System Model


A traffic conditioning-enabled Radio Network Subsystem (RNS), which is composed of a RNC and one or more Node Bs is depicted in Fig. 1 as the system model. The UEs are distributed within each cell with an omnidirectional base station at the cell center. Each UE is expected to use any one of the considered traffic classes. A traffic shaper is employed for uplink traffic on each UE. The packets received at the Node Bs are forwarded to the RNC where the traffic policing function is performed [S3:139].



Figure 3. System Model: Traffic Shaping and Policing in UMTS

Token Bucket Algorithm:


The token bucket algorithm regulates the bursty traffic in such a way that over a long time period the average allowed rate approaches the desired token rate r asymptotically and over a short time interval the burst size of the traffic is upper bounded by bucket size b. The TB algorithm implementation is illustrated in Fig. 4, where Token Bucket Counter (TBC) is an internal variable used to record the number of the remaining tokens at any time. With this implementation, three corresponding measures may be taken when a new packet arrives [S3:140].



Figure 4. Token Bucket Algorithm


Case 1: conformed at arrival. The size of the incoming packet is smaller than the TBC value in the bucket when the packet arrives. The packet is compliant at arrival and is marked as a compliant packet [S3:140].


Case 2: non-conformed. A packet is deemed as noncompliant if its length is larger than the bucket size. This type of packet is tagged as not-compliant and will not be dropped at the UE, but left for preferential discarding at the traffic policing point in case of channel congestion [S3:140].


Case 3: shaped to be conformed. The size of packet is not larger than the bucket size, but larger than the TBC value at arriving instant. In this case, the packet will be enforced to wait by the traffic shaper until there are enough tokens in the bucket. This type of packet is shaped to be conformed and marked as compliant after shaping [S3:140].



2.1.3 Traffic conditioning scheme in UMTS


Traffic conditioner provides conformance between the negotiated

QoS and the data unit traffic [S3:140].





Traffic Shaping at the UE


The traffic shaping scenario at the UE is shown in Fig. 5. The TB shaper verifies the conformance of a packet according to corresponding token bucket parameters, shaping the traffic when necessary. As a result, the regulated traffic after shaping will be categorized into two types, either compliant or noncompliant. They are left for further policing at the RNC [S3:140].


The scenario will introduce traffic shaping delay which consumes part of the total end-to-end delay budget of a service, but the regulated flow is expected to have a lower packet loss ratio instead.

Figure 5. Traffic Shaping at the UE


Traffic Policing at the RNC


The traffic policing function compares the conformance of the user data traffic with the QoS attributes. Within the capacity of the Bearer Service (BS) manager, policy control is a logical policy decision element which is optional to the UEs and required to the gateways. Traffic policing policy in practice is a network operator choice. As depicted in Fig. 6, the policing function consists of traffic classification and policing functionality and is embodied at the RNC[S3:140].


The classification function checks the header of every received packet and forwards the corresponding information for further policing, according to its traffic class as well as conformance status [S3:140].



The policing element at the RNC will perform corresponding policies on each individual packet. For non-compliant data packets, they will be acknowledged only if the channel is not congested, i.e., the total interference level by summing of all connections does not exceed the threshold. Otherwise they will simply be discarded. For non-compliant data packets, the load calculation will take into account both compliant and non-compliant packets at first, if the load exceeds the threshold, the non-compliant packets will be dropped preferentially. A conformed packet could also be discarded if there are too many concurrent compliant packets on the channel [S3:141].




Figure 6. Traffic Policing at the RNC













2.2 Traffic Scheduling Algorithm.


2.2.1 Definition


In packet radio communication several issues of random nature make this task especially difficult to achieve: packet generation from many sources hat must be multiplexed within a limit set of share resources plus variable propagation characteristics. The policy followed by the scheduling algorithm should lead to a system behavior as close as possible to the desired one. The soft-QoS requirement for delay sensitive services can be established in terms of certain desired delay and threshold boundaries [S4:1082].



2.2.2 Scheduling Strategy


The Radio Resource Management (RRM) strategy can be split into there different steps:


  1. Prioritization


All user want to send data must be classified based on type of service (1st priority level). If it is the same service then it is classified based on QoS profile. QoS is defined here by the mean of amount of data to be send and the time remaining to keep the delay below the desire one. The smaller the deadline the higher position in the queue will be. RRM based on this queue decide on which traffic to send first [S4:1083].


This expression assign higher priority to those users with either much data to send or much time already waiting for permission.





Li Packet length remaining to be sent.

TOi Time left until packet deadline for the consider service.




  1. Capacity requirement


This step is performed by user from heist to lowest priority. In order to satisfy the current user QoS requirement some system capacity should be considered to this user as well as certain transmission rate should be reserved for this user. It should be handled smartly by the scheduler so that the overall system behaviors were as optimum as possible [S4:1083].


For WWW-link services, there are many to be factors to consider before a design about of capacity to be assigned to the user can be taken. For example, making consistent the priority level to the radio link quality required for data transmission, then a higher priority indicates urgency to transmit that data. In this case a low Frame Error Rate (FER) should be guaranteed to avoid as much as possible retransmission which lead to more delay. The higher the higher the priority level the lower the FER at the receiver side should be. FER requirement should be limited otherwise one user could demand the whole capacity of the system [S4:1083].



  1. Availability check


Once the capacity requirement for the current user has been decided, the scheduler must check that a feasible solution do exists to satisfy at the same time both the current user requirement and those other users with higher priority that have already been accepted for transmission [S4:1084].


The scheduler should take the interference model into account in order to devise the expected (E/N) for all users. For the uplink , the scheduler evaluates the following equalities:


For the downlink, the scheduler evaluates the following equalities:


Pk Kth user.

SFk Kth user spread factor.

No Thermal noise spectral density.

X Inter-cell interference.

P Orthogonal factor

Tc Chip duration

(Eb/No)k,SFk Kth user requirment

PT-max Max transimted power

PR total recive power

dk distance from Kth user to BS



    1. DIFFSERV based QoS Architecture.


Having as less as possible Delay-jitter is the main concern of streaming services in #G network. Two approaches to achieve of this goal. First, Streaming Proxy Agent should be used at the edge of 3G core Network to smoothen the incoming traffic. This will make it independent of service model used in the Internet. Second, a Probing based approach is used to select minimum delay-jitter delivery path through the DiffServ cloud. Key components of the proposed Architecture: [S5:1898].


    1. Multicast Model [S5:1900].

IPIM-SM multicast routing scheme is proposed to model mobility in the architecture. The mobile host assigned a temporary multicast address within the domain. Since at a given time there is only one receiver and one sender for a given session in mobile environment. PIM-SM needs additional message to disable forwarding of packets in passive branches. Messages in the PIM-SM protocol:

It can be easily implemented by associating an active/passive flag with multicasting forwarding entry at intermediate routers

    1. Mobile Proxy Agent [S5:1900].

It acts as a proxy for the mobile host to make sure that data is delivered to the mobile host through the best possible path. It performs the following functions:

    1. Streaming Proxy server agent [S5:1900].

It resides at an entry-level border router of the 3G Network. It performs the following functions:



    1. Seamless QoS using probing-based approach [S5:1901].


When the mobile moves to a new cell, a new data path is established between SPS and the client. The new path may have different delay characteristic for a giver service class. When a streaming session is initialized in a cell, the Mobile Proxy Agent of the current cell issues PIM Active Join to the multicast tree and the mobile proxy agent in the immediate neighbor cell issues PIM Passive Join message toward the multicast tree.










































4. QoS Issues in the Converged 3G and Wired Networks


    1. Introduction


The wired networks have been developed long time ago and so many design efforts has been spent to become with reliable and scalable designs such that meet most of the required services which concern on QoS. The wireless domain doesn’t have that much effort spend on and it is very hot area. The QoS procedures are slightly different from wired network because the air interface in case of wireless network play a major role of signal degradation caused by different aspect like delay and jitter where these can of aspects are not there in the case of wired network[S6:44].


    1. The RCL Architecture

The resource control layer (RCL), Figure 7, which is based on the bandwidth broker (BB) concept. RCL is designed as a hierarchical and distributed BB to overcome potential scalability problems. The three key components of RCL are the resource control agent (RCA), the admission control agent (ACA), and the end-user application toolkit (EAT) [S6:46].




Figure 7. The RCL architecture and main components.


    1. Network Services and Traffic classes


In the RCL architecture five traffic classes have been defined: premium constant bit rate (PCBR), premium variable bit rate (PVBR), premium multimedia (PMM), premium mission critical (PMC) and best effort (BE). Applications with similar requirements on the network in order to perform effectively can be grouped into this relatively small number of classes. The scheduling mechanism actually implemented is a combination of Priority Queuing (PQ) and Weighted-Fair Queuing (WFQ), called PQWFQ. A queue is dedicated to PCBR, which has strict priority over the others, while the other traffic classes are scheduled with WFQ. A WFQ weight is assigned to each traffic class, and each queue is managed by different queuing strategy: Drop-Tail, Random Early Detection (RED), or Weighted RED (WRED). A specific traffic profile is determined for each traffic class that best characterizes the data source [S6:46].


    1. Mapping QoS Traffic Classes


Table 1 contains the proposed mapping. Its justification is confirmed by examining the characteristics and traffic attributes for these classes.

The conversational and streaming classes are associated one-to-one to PCBR and PVBR, respectively. The main discrepancy stemming from the table deals with the maximum bit rate and packet size, due to the strict limits defined in RCL [S6:47].



Table 2. Mapping of UMTS QoS classes to RCL network services.

Table 3 proposes a possible transformation, although for some attributes such transformation may not be necessary or possible. Attributes like transfer delay and packet loss are redundant, because they are used only for the selection of the appropriate traffic class. Moreover, there are attributes of the UMTS BS that deal only with UMTS aspects, such as the source statistics descriptor, which is used for calculating a statistical multiplex gain for use in admission control. Such attributes are not used in the transformation process [S6:48].




Table 3. Transformation of QoS service attributes.




    1. Control and User Plane Internetworking


in order to establish and maintain the end-to-end service, the QoS management functions of both networks at the control plane must be able to interoperate. Typically, there are two general ways to accomplish that, directly or indirectly [S6:49].




5. Conclusion


UMTS classified traffics according to their sensitivity from delay and jitter-delay in case of real time services. Four such classes are defined to distinguish between different types of traffic in order to treat them according to their importance. QoS management also proposed to manage shared resources among all users according to each user QoS profile preferences. QoS define certain attributes to each class.


Two QoS modes are defined in CDMA2000 to handle classification of traffic in the network for QoS purposes. A non-assured mode, which characterized by packet delivery by mean of best effort scheduler. The second mode is assured mode, which specify acceptable transfer packet delay and data rate. Each part of the CDMA2000 network components has its role in QoS to ensure QoS task effectively. It is handled in Radio Access Network, the Core Network and External Network as well.


Some issues try to target some enhancement techniques to handle QoS in 3G warless network. Some existence techniques are modified to meet the complexity of on the air services which doesn’t to be there for wire network services. One of such technique is traffic shaping and policing which address traffic conditioning by applying different proposed algorithms. In 3G network (UMTS) the traffic shaping done at the User Equipment and the traffic policing done at the Radio Network Control.


Another technique address QoS in 3G Networks is scheduling algorithm for soft-QoS. It is split into three main steps to guarantee soft-QoS. It prioritizes the service traffics. Then it tries to carry out user by user from highest to lowest priority according to the capacity requirements. Lastly, it checks for resources availability for the user being processed.


Another technique also tries to differentiate between services and treat critical application like streaming application accordingly. The main purpose here to minimize jitter-delay delivery path to get better streaming service in the network. The idea of streaming proxy server is proposed to handle jitter-delay and provide smooth incoming streaming traffic.

















References




  1. Integrated QoS support in 3G UMTS networks, Garg, V.K.; Yu, O.T.W.;Wireless Communications and Networking Conference, 2000. WCNC. 2000 IEEE , Volume: 3 , 2000 Page(s): 1187 -1192 vol.3


  1. QoS implementation in CDMA2000,Rao Yallapragada; Personal Wireless Communications, 2002 IEEE International Conference on , 2002 Page(s): 45 -50


  1. QoS provisioning using traffic shaping and policing in 3rd-generation wireless networks,Frank Yong Li; Stol, N.; Wireless Communications and Networking Conference, 2002. WCNC2002. 2002 IEEE , Volume: 1 , 17-21 Mar 2002 Page(s): 139 -143 vol.1


  1. A scheduling algorithm for soft-QoS guarantee in 3G systems Sallent, O.; Perez-Romero, J.; Agusti, R.; Casadevall, F.; Vehicular Technology Conference, 2001. VTC 2001 Spring. IEEE VTS 53rd , Volume: 2 , 2001 Page(s): 1082 -1086 vol.2


  1. Diffserv based QoS architecture to support streaming applications in 3G mobile networks Venna, S.; Barnes, R.; Personal, Indoor and Mobile Radio Communications, 2002. The 13th IEEE International Symposium on , Volume: 4 , 2002 Page(s): 1898 -1903


  1. QoS issues in the converged 3G wireless and wired networks Maniatis, S.I.; Nikolouzou, E.G.; Venieris, I.S.; IEEE Communications Magazine , Volume: 40 Issue: 8 , Aug 2002 Page(s): 44 -53







23

23