Usage model: Wireless Peer to Peer Communication IEEE 802.16 Presentation Submission Template (Rev....
-
Upload
raymond-shields -
Category
Documents
-
view
218 -
download
0
Transcript of Usage model: Wireless Peer to Peer Communication IEEE 802.16 Presentation Submission Template (Rev....
Usage model: Wireless Peer to Peer Communication
IEEE 802.16 Presentation Submission Template (Rev. 9) Document Number: IEEE C802.16m-08/259Date Submitted: 2008-04-07Source:
Kaibin Zhang, Gang Shen, Jimin Liu, Dongyao Wang Voice: + 86-21-58541240-7167
Alcatel Shanghai Bell E-mail: [email protected]
Xiaolu Dong, Ying Du E-mail: [email protected]
Venue: Re: Call for contributions and comments on 802.16jm
Base Contribution:N/A
Purpose:Submitted for purpose of review/discussion by 16jm Ad Hoc Group, and acceptance into P802.16m SDD
Notice:This document does not represent the agreed views of the IEEE 802.16 Working Group or any of its subgroups. It represents only the views of the participants listed in the “Source(s)” field above. It is offered as a basis for discussion. It is not binding on the contributor(s), who reserve(s) the right to add, amend or withdraw material contained herein.
Release:The contributor grants a free, irrevocable license to the IEEE to incorporate material contained in this contribution, and any modifications thereof, in the creation of an IEEE Standards publication; to copyright in the IEEE’s name any IEEE Standards publication even though it may include portions of this contribution; and at the IEEE’s sole discretion to permit others to reproduce in whole or in part the resulting IEEE Standards publication. The contributor also acknowledges and accepts that
this contribution may be made public by IEEE 802.16.
Patent Policy:The contributor is familiar with the IEEE-SA Patent Policy and Procedures:
<http://standards.ieee.org/guides/bylaws/sect6-7.html#6> and <http://standards.ieee.org/guides/opman/sect6.html#6.3>.Further information is located at <http://standards.ieee.org/board/pat/pat-material.html> and <http://standards.ieee.org/board/pat >.
Background
• IMT-Advanced Network Topology proposes multi-hop, mesh and P2P (peer-to-peer) modes
• 16m SRD required 16m support new services, e.g. real-time gaming or real-time video streaming over high definition screens
• Existing P2MP possibly does not satisfy the demand of new services– Lower end to end latency– More bandwidth requirement
New usage model Wireless Peer to Peer communication
• P2P: – Traffic from one MS to another MS directly, or multi-hop
communication through intermediate RS or MS, bypassing BS
• Advantages– Low latency
– Significantly reduce the traffic burden at BS
– Power saving on MS
– High spectrum efficiency
– High flexibility, reliability
Topology of Wireless Peer to Peer communication
16m BS
16m RS
16m MS 16m MS
16m BS
16m RS
16m MS 16m MS
Data transmission
MS communicate via intermediate RS
MS communicate directly
• Wireless communication between MS in trains– Data transmission directly or via MRS
between MSs
– Only some control messages relayed between BS and RS
– Easy to perform handover with less impact on service flow
Application scenario 1Public transportation
RS
MSMS
BS
Application scenario 2Airport
• Real-time services, e.g. video gaming, between passengers– Wireless communication between MSs
– Lower latency
RS
MS
MS
Departure lounge
Airport terminal
Application scenario 3Enterprises
RS
BS
MS MS
Video conferenc
e
Video conferenc
e
• Large coverage, multiple buildings at one site– Optimum solution for enterprise customers
– Both internal video or audio services could bypass BS
– Less cost for enterprises and new revenue model for operators
Business model
• Peer to peer wireless communication is oriented to services– Only applied to the services designated by operators, e.g. interactive video
gaming– Operators can control whether MS is allowed to setup P2P communication
• Normally, MS are not allowed to setup P2P arbitrarily• In some special cases, e.g. emergency, MS may communicate by themselves
• Operable and administrable– Revenue models of wireless P2P for operators
• Paid by users initiating services over P2P, e.g. Interactive video gaming• Billing could be based on
– On-line time– Bandwidth consumption
• in terms of the bandwidth request/allocation info.
– Content supervision• Transmission path can be redirected to pass RS or BS
Proposed comments on Usage Model
• 16j Usage Model Document(C80216j-06/015) is regarded as the basis of 16m multi-hop relay usage model
• It is proposed to add the ‘wireless peer to peer communication’ as a 16m multi-hop relay usage model
Proposed comments on Usage ModelText (1)
•It is proposed to add the following section into the 16m multi-hop relay Usage Model Document
x.x Wireless Peer to Peer Usage Modelx.x Wireless Peer to Peer Usage ModelIn this usage model RS are deployed in the network to improve coverage, In this usage model RS are deployed in the network to improve coverage, capacity or per user throughput. In this usage model the data transmission capacity or per user throughput. In this usage model the data transmission may occur between MSs through zero or multiple RS and does not pass may occur between MSs through zero or multiple RS and does not pass through BS. RS deployed in this model could be fixed, nomadic or mobile.through BS. RS deployed in this model could be fixed, nomadic or mobile.Some example application scenarios include:Some example application scenarios include:
• Communication between MS on board moving vehiclesCommunication between MS on board moving vehicles• Interactive services among MSs at airportInteractive services among MSs at airport• Enterprises internal communicationsEnterprises internal communications
Proposed comments on Usage ModelType of routes
• Replace the first paragraph of the section ‘Type of Routes’ with the following description
All data communication can be classified into two All data communication can be classified into two categories: one is the data communication between BS and categories: one is the data communication between BS and MSs through zero or more RS, and the other is the data MSs through zero or more RS, and the other is the data transmission between MSs through zero or more RS. In the transmission between MSs through zero or more RS. In the second case, the data transmission bypasses BS.second case, the data transmission bypasses BS.