throbber
f6]
`
`TRANSPERFECT
`
`City of New York, State of New York, County of New York
`
`1, Connie Wong, hereby certify that the following is, to the best of my
`knowledge and belief, within the given parameters, a true and accurate
`translation, of the following document “Diplomarbeit Hettich” from German
`into English.
`
`
`
`
`Connie Wong
`
`Sworn to bef e me this
`
`Thursday, December 08, 2011
`
`
`Signature, Notary P
`
`
`
`/?
`
`vb
`
`
`KEVIN M KELLEY JR
`-
`‘ Notary Public - State of New York
`'
`No. O1-KE-6229266
`Qualified in Queens Count:
`"’Enmmission Expires October
`
`
`tamp, Notary Public
`
`THREE PARK AVENUE, 39TH FLOOR, NEW YORK. NY 10016 T 212.639.5555
`
`F 212.689.1059 WWWIRANSPERFECTLOM
`
`BROADC'OM 1 0 0 7
`
`

`

`Department of Communication Networks
`Aachen Technical University (RWTH)
`Prof. Dr.-Ing. B. Walkc
`
`Diploma Paper
`
`Development and performance evaluation of a
`Selective Repeat-Automatic Repeat Request
`(SR-ARQ) protocol for transparent, mobile
`ATM Access
`
`by
`
`Andreas Hettich
`
`Student ID NO. 181475
`
`Aachen, April I7, 1996
`
`Mentors:
`
`Prof, Dr.-lng, B. Walke, Associate Professor
`DipI.-Ing. D. Petras
`
`This paper is for internal use only. All copyrights reserved by the mentoring department. We
`give no warranty for its content. Reproduction and publication of any kind are subject to the
`Department’s permission.
`
`

`

`I hereby confirm that I have conducted this work independently without the assistance from third
`parties — except for the official mentoring by the department. All literature used for this paper is
`listed completely in the Bibliography section.
`
`Aachen, April 17, 1996
`
`(Andreas Hettich)
`
`

`

`TABLE OF CONTENTS
`
`
`Introduction
`
`Broadband [SDN (B-ISDN)
`
`4
`
`6
`
`2.1
`
`Services in broadband ISDN ........................................................................... 6
`
`2.2
`
`Switching in B-ISDN:
`Asynchronous Transfer Mode (ATM) ............................................................ 6
`
`2.2.1
`
`Structure of an ATM cell .................................................................... 7
`
`2.2.2 ATM switching .................................................................................. 8
`
`2.2.3 ATM reference model ......................................................................... 9
`
`2.2.4 ATM service classes ......................................................................... 10
`
`Mobile broadband system
`
`11
`
`3.1 Overview ....................................................................................................... 11
`
`3.2 Bit transfer layer in an MBS ......................................................................... 14
`
`3.3 Cell structure of an M38 .............................................................................. 15
`
`Logical link control (LLC) in an MES
`
`17
`
`4.1
`
`Tasks and requirements................................................................................. 17
`
`4.1.1
`
`End-to—end error correction in an AAL ............................................ 17
`
`4.2 Requirements for an ARQ protocol .............................................................. 19
`
`4.3
`
`LLC and MAC layer interaction ...................................................................21
`
`4.4 Structure of the MAC layer........................................................................... 22
`
`4.5
`
`Structure of the LLC layer ............................................................................22
`
`Link access protocols
`
`25
`
`5.] Conventional ARQ protocols ........................................................................ 25
`
`5.1.1
`
`Stop-and-wait ARQ .......................................................................... 26
`
`5.1.2 Go back 1? (continuous) ARQ ........................................................... 27
`
`5.1.3
`
`Selective Repeat (SR) ARQ .............................................................. 28
`
`5.2 Adaptive Selective Repeat (ASR) ARQ protocol ........................................ 29
`
`5.2.1 Elements of ARQ in the ISO 8802-2 standard .................................. 30
`
`

`

`2
`
`Table ofComems
`
`5.2.2 The Ignore timer ............................................................................... 31
`
`5.2.3 Treatment of time-critical ATM cells ............................................... 34
`
`5.2.4 The Delay PDU................................................................................. 34
`
`5 .25
`
`Parallel ARQ instances ..................................................................... 36
`
`5.2.6 Acknowledge methods ...................................................................... 37
`
`6
`
`Implementation of the ASR ARQ protocol
`
`40
`
`6.1 The Connection Handler ............................................................................... 42
`
`6.2
`
`Send_Data .....................................................................................................43
`
`6.2. 1
`
`Send_Data_Obj ect ............................................................................44
`
`6.3 Receive_Data ................................................................................................47
`
`6 . 3. l Receive_Data_0bj ect .......................................................................48
`
`7 The SlMCOBH/MBS simulator
`
`50
`
`7.1 Overview ....................................................................................................... 50
`
`7.2 The stat_APP application layer..................................................................... 52
`
`7.3
`
`Sources .......................................................................................................... 54
`
`7.3.1
`
`Poisson source ................................................................................... 54
`
`7.3.2 LAN source ....................................................................................... 54
`
`7.3.3 Video source ..................................................................................... 55
`
`7.3.4 CBR source ....................................................................................... 56
`
`7.4 The MAC_Test_LCC MAC layer ................................................................ 57
`
`7.5 The .sim_defaults configuration file ............................................................. 58
`
`7.6 The graphic debugger ................................................................................... 59
`
`8 Simulation results
`
`62
`
`8.1
`
`Introduction ................................................................................................... 62
`
`8.1.1 Measured variables and performance parameters .............................62
`
`8.1.2
`
`Statistical power ................................................................................ 63
`
`8.1.3
`
`Simulation parameters of the ASR ARQ .......................................... 64
`
`8.2 Optimization of the ARQ Timer Delay and A ck_ Threshold parameters .......65
`
`8.2.1 ARQ Timer Delay .............................................................................65
`
`8.2.2 Ack_Threshold66
`
`8.3 Examining the causes for cell delays ............................................................ 68
`
`8.3.1
`
`Influence of the Ignore timer ............................................................ 68
`
`

`

`Table ofcomems
`
`8.3.2
`
`Influence of the error model ............................................................. 71
`
`8.4 Examining the effort required for discarding cells ....................................... 72
`
`8.5
`
`Separation of acknowledgments and user data ............................................. 74
`
`8.6 Asymmetric traffic ........................................................................................ 75
`
`9 Summary and outlook
`
`79
`
`A List of abbreviations ............................................................................................81
`
`List of figures ..............................................................................................................84
`
`List of tables ................................................................................................................85
`
`Bibliography ...............................................................................................................86
`
`

`

`CHAPTER 1
`
`
`Introduction
`
`The telecommunications industry has been able to increase its sales despite a recession in the
`past few years. In Germany, sales rose from DM 11 billion to DM 23 billion in the period from
`1990 to 1995 [25]. Another significant
`increase in sales is expected with the fall of the
`telecommunications monopolies in Europe in 1998. This illustrates the growing importance of
`telecommunications networks and services.
`
`Many additional new services in the field of telecommunications became possible due to digital
`telecommunications systems. ISBN (Integrated Services Digitai Network) deserves mentioning
`in this context. [SDN eliminates the variety of different network-user interfaces and offers all
`voice,
`text, and data services via a uniform network interface.
`In addition to digital fixed
`networks, new digital mobile networks became established based on the GSM (Gfobal System
`for Mobile Communication) and DCS 1800 (Digital Cellular System 1800) standards.
`In
`Germany, the DI network of Deutsche Telekom and the D2 network by Mannesmann Mobilfunk
`are based on the GSM standard. The E network by E-Plus was build according to the DCS
`standard.
`
`The fixed bandwidth assignment from 64 kbit/s in the ISDN network and 22.8 kbit/s (gross) in
`the GSM system is designed for narrowband voice transmission (cutoff frequency 4 kHz) and
`cannot provide the high variable data rates that future broadband services such as video
`communication, data transmission in computer networks, and multimedia will require in general.
`This is why the ATM transmission method (Asynchronous Transfer Mode) was developed that
`is used in broadband ISDN (B-ISDN) and can provide a variable bit rate of 622 Mbit/s and more.
`
`Since the need for higher data rates is beginning to show in mobile telephone networks,
`development of the UMTS system (Universal Mode Telecommunication System) was launched.
`It provides data rates of up to 2 Mbitt’s when service-specific protocols are used.
`
`An alternative approach is pursued under the M85 project (Mobile Broadband System). A
`system is to be designed that comes as close as possible to the functionality of broadband ISDN
`in landline networks. The targeted maximum gross data rate is 155 Mbitt’s.
`
`These very high data rates for a mobile telephone system can only be achieved by using
`accordingly high carrier frequencies in the ranges of 1?, 40, or 60 GHz. There are unutilized
`bandwidths in these ranges. New powerful signal processing components will have to be
`developed for this purpose. Silicon technology can be used for 17 and 40 GHz, while 60 GHz
`require the use of gallium arsenide which is much more expensive.
`
`A high subscriber density can be reached by small cell sizes with radii from 100 to 200 m. Small
`cell sizes can be achieved by using high carrier frequencies because there is additional resonance
`damping of the air in this range. This damping is around
`
`

`

`2.2 Switching technology in B-ISDN.‘ Asynchronous transfer mode (A I'M}
`
`5
`
`l4 dB/km and can increase by another 10 dB/km when it rains. This high damping ensures that
`the frequencies can be reused at a close distance-
`
`The data is transmitted service neutral, and only the 003 (quality of service) parameters as
`defined in the ATM standards and the defined ATM service classes are specified. CAC
`(Connection Admission Control) analyzes the (203 parameters and traffic characteristics prior to
`setting up the connection. A connection that has been set up has to be monitored for compliance
`with the traffic characteristics agreed during setup, otherwise the quality of other connections
`may be impaired.
`
`A physical channel in the MBS can carry 34 Mbitx’s as gross data rate. If a virtual channel has a
`data rate of more than 34 Mbit/s, it will have to be split up over multiple frequency channels
`(multi-link transfer).
`
`The protocols of the link layer have to meet special requirements; new concepts have to be
`implemented. A mobile ATM terminal is to be integrated into a landline ATM network while
`retaining the end-to—end relationship of the ATM adaptation layer. Poor transmission quality on
`the radio interface represents a special problem because does not allow the bit error rate required
`by ATM without additional measures. This can be remedied using forward error correction
`(FEC) in combination with a protocol for repeated transmission of ATM cells (Automatic Repeat
`ReQuest (ARQ)).
`
`It is the purpose of this paper to design a new link access protocol and to assess it using a
`simulation. The protocol
`is based on known ARQ protocols and is adjusted to the special
`requirements of MBS.
`
`the paper gives an overview of broadband ISBN (Chapter 2) and the Mobile
`At the outset,
`Broadband System (Chapter 3). Chapter 4 presents the logic link control (LLC) layer designed
`for mobile transparent ATM access and describes the special requirements of MBS. After an
`introduction to conventional ARQ protocols, Chapter 5 outlines the ASR ARQ protocol
`developed and implemented in this paper. Chapter 6 describes the implementation of the protocol
`in the system simulator. Chapter 7 presents the SIMCO3++KMBS simulator used for simulative
`performance assessment. Chapter 8 evaluates the capabilities of the protocol elements based on
`simulations. Chapter 9 concludes this paper with a summary and outlook.
`
`

`

`CHAPTER 2
`
`
`Broadband ISDN (B-ISDN)
`
`2.1
`
`Services in broadband ISDN
`
`The integration of new broadband applications into the Integrated Services Digital Network
`(ISDN) requires data rates of up to 155 Mbiti’s on the local loop. Some of these applications are
`services with a continuous data volume, others are cluster-type interactive services. The
`applications that generate continuous bit
`streams
`include voice transmission and video
`conferencing. Interactive services are characterized by varying bit rate requirements. A short
`query in a database, for example, can result in a reply with a very high data rate.
`
`0
`
`Interactive services
`
`0 Data communication
`
`— telephony
`— image telephony
`— broadband video conference
`
`:- Retrieval services
`— access to databases
`
`— radio, TV, HDTV, video on
`demand
`
`— electronic newspaper
`— video mail
`
`— LAN connections
`— file transfer
`— CAM connections
`
`— high-resolution image
`transmission
`
`The very diverse requirements of the broadband services can be met with difficulty only by using
`synchronous transmission methods (STDM). While over dimensioning the transmission capacity
`of synchronous channels reduces wait times, the capacity of the transmission medium is utilized
`poorly. The asynchronous transfer mode (ATM) can handle these requirements better.
`
`2.2
`
`Switching technology in B-ISDN:
`Asynchronous transfer mode (ATM)
`
`The asynchronous transfer mode is the connection-related packet switching mode of B-ISDN. It
`combines the advantages of connection- and packet-oriented switching. The data streams to be
`transmitted are divided into blocks of a fixed length, the so-called ATM cells. The cells of
`various connections are transmitted in a time-interleaved manner via a physical channel.
`Different amounts of transmission capacity are assigned dynamically depending on the data rates
`of these connections. The cells are transmitted in the order of their arrival.
`
`

`

`2.2 Switching technologz in B-ISDN.‘ Asynchronous transfer mode (A TM)
`
`7
`
`connection A
`
`
`
`
`
`
`conneclinn C
`
`l:lEl
`
`
`
`
`
`
`
`connection I]
`
`
`
`
`
`
`
`cell slrcam behind the multiplexer
`connection A
`connection 13
`connection L‘
`idle cell
`
`Figure 2.1: Statistical multiplex in the ATM method
`
`The ATM multiplexer inserts “idle cells” into the joint data stream if none of the connections
`needs transmission capacity. This method is called statistical multiplexing and is particularly
`well suited for adapting to the dynamic communication behavior of very different connections.
`
`2.2.1 Structure of an ATM cell
`
`An ATM cell includes 53 bytes and is composed of a 5—byte header and a 48-byte information
`field that contains payload data. The connection of the cells is connection-oriented. All cells of
`one virtual connection take the same transmission path that is determined during setup by
`defining virtual channels. The network controls the cells based on the routing information stored
`in their headers. The header field contains the following parameters:
`
`B-ISDN UNI
`
`B-ISDN NNI
`
`GFC
`Um
`
`UPI
`Wit
`
`
`1
`
`2
`
`3
`
`‘
`
`5
`
`Byte
`
`
`
`VCI
`
`PT
`
`(3 LP
`
`V61
`
`HEC
`
`HEC
`
`C LP
`GFC
`HEC
`NNI
`
`Cell loss priority
`Genetic flow control
`Header error GorIlI-Dl
`Nelwnrt-nnde Interface
`
`PT
`VCl
`VPl
`UNI
`
`Payload type
`Vltlual channel idenliller
`Vlllual path Identifier
`User-network meflace
`
`Figure 2.2: Header of an ATM cell
`
`VCI
`
`Virluaf Channel Identifier, 2 bytes
`Identification of the virtual channel is used to distinguish among different simultaneous
`connections and the assignment of cells to these connections. The virtual channel
`identifier is assigned to one connection section only.
`
`VPI
`
`Virruaf Path Identifier, S or [2 bits
`The VPI identifies a channel bundle. Multiple bundles can be distinguished that go in the
`same direction and each contain multiple virtual channels.
`
`

`

`2. Broadband ISDN (B-ISDN)
`
`The switching network will be able to identify and forward cells from channels of the
`same bundle faster.
`
`PT
`
`Payload Type, 3 bits
`This identification of the type of information field for distinguishing payload and
`signaling information. The latter may contain information needed to update the routing
`tables that are kept in the switches. A switch has to analyze both the header and the
`payload data field of an ATM cell. If payload data is transmitted in the information field
`of an ATM cell, its contents is ignored.
`HEC Header Error Control, 1 byte
`Since the header of an ATM cell contains data that is of particular significance for the
`transport of the cells, it is protected by a special check sequence. It is used for detecting
`and clearing errors.
`CLP Celt Loss Priority, 1 bit
`This parameter identifies low-priority cells that are discarded in the event of a queue
`overflow condition in the ATM switches.
`
`2.2.2 ATM switching
`
`VC swllch
`
`VCI 2
`
`
`
`VC' 4
`
`VC' 3
`YO! 1
`
`
`
`
`
`VCI 3
`VCI 4
`van 5
`VCI 6
`VC! 1
`W21 2
`
`VCI 1
`mm 2
`VCI 1
`VCI 2
`
`V6! 1
`vcn 2
`von 3
`we: a
`V6! 5
`VC' 6
`
`Figure 2.3: Virtual path switching and virtual channel switching
`
`Like other packet switching methods, ATM cells are switched based on the routing information
`contained in their headers. Only the complete origin and destination addresses are sent during
`connection setup to keep this information as concise as possible for increased throughput. Other
`identifications of logical channels (VCI, VPI) are assigned for the various sections of the
`connection. The ATM switches establish routing tables based on the incoming control
`information. These tables contain an origin and destination identifier (line + virtual channel
`identifier). The cells are switched based on these tables as follows: The switch extracts the
`virtual channel identifiers from the incoming cells. It then enters the identifier of the next link
`based on the information contained in its routing table and routes the cell to the respective output
`of the switching network.
`
`Figure 2.3 shows the switching elements used in the switches. There are VP and VC switches. A
`VP switch only analyzes the VPI values of the cells, which allows fast switching of the cells. The
`entries of the VCI fields remain unchanged. The VCI
`
`

`

`2.2 Switching technology in B-ISDN: Asynchronous transfer mode (AIM)
`
`9
`
`identifiers are changed by VC switches only.
`
`2.3.3 ATM reference model
`
`Based on the recommendations of the OSI reference model, a four-layer reference model can be
`defined for ATM. These include the physical layer, the ATM layer, the ATM adaptation layer
`(AAL), and a layer that represents the functions of higher-order layers. Three different planes are
`also defined: the user plane, the control plane, and the management plane. The management plan
`includes the functions for plane management and the functions for layer management. The plane
`management is responsible for managing the entire system while the layer management controls
`each layer.
`
`Management Plane
`
`
`
`
` Control Plane
`User Plane
`
`
`
`
`
`
`Higher Layers
`
`
`
`Higher Layers
`
`ATM Adaptation Layer
`
`Physical Layer
`
`Plane Management
`
`Layer Management
`
`l45
`
`
`
`
`
`
`ATM Layer
`
`
`
`Figure 2.4: ATM reference model
`
`The physical layer depends on the transmission medium and is to provide the functions for
`assembling and transmitting the cells via the physical medium. The tasks of the ATM layer
`include:
`
`Multiplexing and demultiplexing of cells from various connections
`Control of VCI- and VPl-oriented functions
`
`Generation and extraction of header information
`
`Generic flow control at the user-network interface (UNI) for setting up the connection.
`
`The ATM adaptation layer (AAL) is used by the higher-order layers for adapting to the ATM
`layer, It performs the required segmenting of data streams and ensures a secure transmission. The
`AAL layer is divided into two sub layers:
`
`1. The segmentation and reassembly (SAR) layer that maps the protocol data units of the
`higher-order layers to the ATM cells and vice versa.
`
`

`

`10
`
`2. Broadband ISDN (B-LS'DN)
`
`2, The Convergence Sub layer (CS) that corrects undesired effects through cell transfer
`delay variations of different services.
`
`For instance, the short data bursts generated during voice transfer are collected for a certain
`period of time in order to utilize the capacity of an ATM cell to the fullest. The receiver
`generates a continuous data stream again from the incoming ATM cells.
`
`Transfer delay variations of the cells through the network are corrected by the ATM adaptation
`layer at the receiver. This is achieved by adding a constant time delay.
`
`2.2.4 ATM classes of service
`
`In order to keep the number of the required protocols for the ATM layer at a minimum, the
`services are subdivided into four different classes according to the parameters “time reference
`between source and drain”, bit rate and connection type, and are shown in fig. 2.5.
`
`
`Class 4
`Class 3
`Class 2
`Class 1
`
`
`Time
`
`Real time
`
`Non-real time
`
`variable Connection
`
`reference
`
`
`Bit rate
`
`Constant
`
`Connecti on—oriented
`
`type
`
`Fig. 2.5: Classification of the services in ATM adaptation layer
`
`Control data is also added to the content information depending on the service class used. The
`control data are used for restoring content information that is distributed into multiple cells. The
`control data is generated by the SAR sub layer during the distribution of the data in the cells. In
`the receiver, the respective SAR sub layer must join the data together again in the right sequence
`based on the control data.
`
`I.
`
`In order to identify the individual cells, they are assigned sequence numbers. Based
`on this, it is possible for the receiver to detect any dropped cells. While the sequence
`number is present in all classes of service, additional back-up data and different
`segment types are only included in some classes. Due to the different proportions of
`control data,
`the resulting proportion of control data is 44-48 bytes
`[36].
`
`

`

`CHAPTER 3
`
`
`Mobile Broadband System
`
`3. I
`
`Overview
`
`The RACE 11 research program (Research and Technoiogy Development in Advanced
`Communications feelinologies in Europe) advanced the development of third generation mobile
`radio systems from 1992 to 1995, which was supposed to enable the merger of systems such as
`GSM, DECT (Digitai European Cordless Telecommunications) and trunked radio systems and
`their different areas of application, into a universal mobile radio system (Universai Mobiie
`Telecommunications System UMTS) with data rates of up to 2Mbitts. At the same time, they
`strived to develop uniform end devices and expand the service to broadband services with high
`data rates [8].
`
`
`
`fast
`
`User
`
`mobility
`
`medium
`
`movable
`
`fixed
`
`I
`Q 8
`km u’ 5
`
`I
`2
`
`
`
`
`
`I
`20
`
`Mbit a 5
`
`I
`155
`
`-—
`
`Available data rates
`
`Fig. 3.] : M88 and other data networks
`The MBS project that is being sponsored within the framework of RACE II deals with the
`connection of mobile users to stationary broadband networks (Integrated Broadband
`Communication Network
`iBCN) at data rates of up to 155 Mbitt’s. Apart from that, narrow band
`services still continue to be available. One of MBS’ goals in particular is the provision of
`broadband ISDN services for mobile users and ATM transfer support.
`
`Apart from the connection to broadband ISDN, MBS concept also includes possible
`collaboration with other systems such as UMTS. At the same time, the network type and the
`level of integration can vary
`
`

`

`12
`
`3. Mobile Broadband System
`
`from a privately-operated MBS system with low service integration and mobility to a public
`MBS system with high integration, wide-range mobility and large coverage area [3]. In Fig. 3.1,
`MBS is linked with other data networks. It is evident that through MBS, the broad service
`spectrum of broadband [SDN is combined with the mobility of the mobile radio networks.
`
`Due to the flexibility of M83 and the availability of B-ISDN services, a variety of different
`applications is possible. They are distinguished by the required data rates and the mobility of
`their users as shown graphically in Fig. 3.2.
`
`
`
`Smilance
`of property
`
`‘
`Access In
`331W 59"”?5
`
`(est mobile
`
`.
`5‘0" mobile
`
`5
`g
`g
`
`mable
`
`
`
`
`Interactive
`
`“quasi real time"
`
`
`Services
`
`Special needs
`GAD inter-comedian
`
`
`{2.9. health)
`
`Teleomsmh'ng
`
`
`
`required animate. Int-ii” 5
`
`Fig. 3.2.: MBS applications and services
`
`Specific conditions are required at the air interface during the integration of broadband services
`in mobile radio systems. They are a result of the mobility of the users and the utilization of a
`joint physical transfer medium- There are basically two different possibilities of implementation
`of mobile connection to fixed ATM network:
`
`1. Provision of service—specific protocols for communication via air interface, whereby ATM
`transfer takes place only between the base station and the fixed network.
`2. Transfer of ATM cells via the air interface whereby the mobile stations can transparently
`access the ATM network.
`
`

`

`3. I
`
`Overview
`
`13
`
`Mobile Station
`
`Base Station
`
` Mobile Station
`
`Physical layer
`Li"
`fibre link of
`ATM—Net
`
`lower layers
`
`_
`_
`.
`.
`air Interface
`
`Fig. 3.3: Service-specific ATM transfer
`
`The first process is used for example in UMTS and does not require any features for ATM
`transfer via the air interface. As a result, no channel access procedures that support the static
`multiplexes of the ATM are necessary and existing protocols can be adapted to the standards of
`different services. The disadvantages of this procedure are the need for different complex
`channel access procedures, lack of transparent ATM access and non—flexibility with regard to
`integration of new services (Fig. 3.3)
`
`
` BBS radio access
`
`fixed ATM
`new
`
`system
`
`AAL
`
`“cal Law:
`M—PHY MES
`ATM Adaptation Layer
`roadbanizl Tammation
`A.
`humus Transfer Mode Lay,er MBT
`Mobile
`alL'ui: Control Lrer
`UNI
`User to Netwmk Interface
`Access Comm]
`yer
`
`M—LLC
`M—MAC‘ MES
`
`Fig. 3.4: Transparent, mobile ATM access
`
`Transparent access means that the ATM adaptation layer must not be changed and can access the
`MBS-PHY layer like that of the ATM-PHY layer of a conventional ATM network. That is why
`the second approach only requires a service-independent MAC scheme (Medium Access Control)
`to transfer in asynchronous transfer mode. ATM services to be added in the future will also be
`supported by this universal solution. However, channel access procedures that support static
`multiplexes of the ATM are necessary. This procedure can provide the same functionality but not
`the same quality of service like in
`B-ISDN. This approach was selected in the MBS system (Fig. 3.4) [15].
`
`

`

`14
`
`3. Mobile Broadband System
`
`3.2
`
`Bit transfer layer in M33
`
`The bit transfer layer (Physical layer) represents the lowest layer in lSO-OSI reference model and
`specifies the protocols for transferring the bits to the physical channel. The transfer of high data rates that
`require large broadband is included in MBS. As a result, frequencies in the 60 GHz frequency range were
`selected as carriers. On the one hand, these frequencies are otherwise available, and on the other hand, the
`atmospheric oxygen attenuation is very high. In addition to the parameters just mentioned above, the
`radius ofa radio cell depends mainly on the noise factor, the required signal to noise power ration in the
`receiver, the bandwidth and the channel characteristics. Taking these factors into account results in cell
`radii in the scale if R = 100 to 200m. Due to damping, the rcusability intervals of a frequency are very
`short. This allows high user densities to be achieved. Cell planning as is required for operating second
`generation mobile communication networks can no longer be carried out due to the microccllular
`structure in MBS.
`
`It requires the use of procedures for dynamic channel allocation.
`
`For synchronization, the mobile station establishes the time interval on the downlink that it receives
`delayed around the signal propagation time. This leads in uplink to maximum asynchronizations between
`mobile stations near the base station and those at a large distance of Tamra = 2.Rfc : 0.666145 to 1.33us (c
`is the velocity of light) because the transmit signal of the mobile station arrives in the base station delayed
`at an equivalent run time. A measurement of the order Tasy‘nch by the base station, which is also called loop
`delay, as occurs e.g. in GSM networks is not included in MBS.
`
`
`62 to 63 GHZ
`Freuuenc rane for the downlink
`65 to 66 GHZ
`Freuenc rane for the ulink
`32
`Number of frequency channels
`30 MHZ
`Bandwidth er freuenc channel
`
`2 FDD
`Du IlCX s Mlittin
`
`Multiplex procedure
`FDMA f TDMA (hybrid)
`21.33
`s
`Slot len th
`
`Guard time
`1.33 #5
`
`QPSK x 16 QAM
`Modulation procedure
`Data rate
`20 M S mbolsfs (Tsmtm. =50 as)
`1 (2 424 bits)
`
`ATM cells E slot
`
` 100 -200 m
`
`
`Asynchronization
`T mm: 0.666 to 1.33m
`
`(t 13 to 26 symbols)
`
`Radio cell radius
`
`Table 3.1: System parameter of MBS system
`
`The system basically represents a hybrid FDMA f TDMA channel structure (FrequencyTime Division
`Multiple Access). The frequency range is subdivided into 32 channels for each 30 MHz bandwidth that
`are separated from each other by guard bands. The time range is split into time slots. The length of a slot
`is Tslol = (20 + 1.33) [15. It consists of a guard time Tguard = 1.33 as on the uplink, which is supposed to
`prevent time overlapping of the packets that are sent on the same carrier in succession from different
`mobile stations. The length of the guard time is
`
`

`

`3.3 Cell structure in MES
`
`15
`
`equivalent to the maximum asynchronization Tasy'nch such that irrespective of the position of a mobile
`station within a cell, the sum of the delay and length of a packet dies not exceed the length of the slot.
`The] .33us correspond to the signal propagation of base to mobile station and back again, if the mobile
`station assumes largest distance possible from the base station. On the downlink, guard time is required to
`adjust the transmitter when using the power control method.
`The allocation ofa slot is shown in Fig. 3.5. In addition to the actual data (2 x 168 symbols), each slot
`contains a [mining sequence (15 symbols) in the center, which serves to assess the channel step response
`of the equalizer as well as synchronization. Three different slot lengths are shown in Fig. 3.5 but only
`normal and very short slots are deployed. Normal slots serve for transferring data while very short slots
`are used for transferring dynamic parameters and collision resolution.
`If QPSK (Quaternary Phase Shifi Keying) is used, a symbol is equal to two bits and in the case of the 16
`QAM (Quadrature Amplitude Modification) a Symbol would be equal to four bits. The cost as well as the
`error susceptibility of the second modulation procedure is clearly on a higher scale and as such, QPSK
`should be deployed in the first level of implementation.
`QPSK is also taken as the modulation procedure so that 168 - 2 - 2 bits = 672 bits = 84 bytes is available
`in the case of a normal slot, out of which an ATM cell generally needs 53 bytes, and as overhead, MAC
`and LLC layer split up the remaining 53 bytes. A slot of very short length which will now be called
`subslot, has 24 - 2 - 2 bits = 96 bits = 12 bytes [15].
`
`I Guard Tlme (23 symbols)
`
`|:l Tail (5 symbols}
`Data
`
`D Train‘ng Sequence {15 symbols}
`
`Fig. 3.5 Layout ofa slot
`
`3.3
`
`M38 cell structure
`
`The MBS cell structure is similar to

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket