1. Technical Field
The invention relates to wireless networks. More particularly, the invention relates to the overall network architecture of a scalable broadband wireless mesh access network.
2. Description of the Prior Art
There are a number of issues concerning the design of a wireless network which do not arise in a wired system. Two known approaches to wireless networking are those of point-multipoint networking and mesh networking.
Point-Multipoint (P-MP)
P-MP systems are by far the most common network architecture used in broadband wireless Internet access. A base station is established in a location visible to a number of customers. A backhaul connection is established to the base station, via wireless or wireline, and customer premise equipment (CPE) is installed at each customer's location. It is usually necessary to use an outdoor antenna to achieve reasonable range and performance.
One major drawback of P-MP is that base stations have to be located where it is possible to site a base station. Such a location may not coincide with a target customer base. Base stations are also expensive, and the cost of backhaul services can be prohibitive.
Another major drawback to P-MP is that the cost of the CPE installations, i.e. the “truck roll,” becomes prohibitive in the aggregate as more and more customers are added to the system.
Yet another drawback to P-MP is that there are inevitably be dead zones where some potential customers do not have line of sight (LOS) to the base station, and therefore cannot receive service.
Mesh Networking
Mesh networking, generally, dispenses with the idea of a base station, with each CPE also being a relay node. The backhaul connection is connected to one or more relay nodes, and each additional customer adds an additional relay node to the network.
A mesh network for urban and sub-urban environments requires the network to support a large number of users at a low initial cost per user and be usable in an environment with high-rise buildings (4-20 floors) or low-height buildings (1-4 floors with trees in environment). Unfortunately, mesh networking, as currently implemented, does not scale well beyond perhaps five relay nodes. Latency, i.e. the amount of delay added at each node, is increasingly noticeable as more relaying is necessary to get packets from a customer to the backhaul connection. One solution to the latency issue is have multiple backhaul connections, but doing so somewhat defeats the cost-effectiveness of mesh networking.
It would be advantageous to provide a mesh access network that: (1) supports a large number of users, e.g. up to 1000 users per sector (2) at broadband data rates and (3) with low latency for voice/video applications. It would also be advantageous if such network provided (4) support for capacity and coverage limited deployment scenarios, and (5) had a high spectrum reuse factor, i.e. it should reduce the distance between simultaneous active links using same carrier to get more capacity from network. Finally, it would be advantageous if such network (6) provided scalable deployment, i.e. if it could be deployed using two carriers, and if one could add more carriers to increase overall capacity and number of users.
The invention comprises a mesh access network architecture that provides a combination of high data rates to a large number of users and >99% coverage to potential customers in a service area. The network design also provides scalable capacity that scales to more capacity/users with additional frequency carriers and coverage over a large area with additional base-stations. This is achieved in the presently preferred embodiment of the invention by using a combination of centralized mesh network control and intelligent interference management.
The invention comprises a mesh access network architecture that provides a combination of high data rates to a large number of users and >99% coverage to potential customers in a service area. The network design also provides scalable capacity that scales to more capacity/users with additional frequency carriers and coverage over a large area with additional base-stations. This is achieved in the presently preferred embodiment of the invention by using a combination of centralized mesh network control and intelligent interference management.
Nodes and Antennas
There are typically four types of nodes in a mesh network:
Outdoor repeaters according to the invention herein have roof-top antennas that have three antenna panels arranged within a cylindrical structure.
The indoor terminals with indoor antennas are window mounted to get the best possible signal from an indoor location. The indoor node also uses a split element antenna with H and V antenna elements that are combined using a power combiner. This provides some diversity combining gain without the higher cost of multiple RF units. The indoor antennas have a 90 degree azimuth HPBW.
The outdoor terminals have roof-top high gain antennas with small beam-widths. These antennas that have a similar structure as the indoor antenna, i.e. split element antenna with H and V antenna elements combined using a power combiner. The outdoor antennas have 18 degree azimuth and elevation HPBW.
The base-station sector antenna has a 20-30 degree azimuth HPBW. It has a similar structure as one of the panels on the repeater antenna. i.e. H and V elements mounted one on top of the other for polarization diversity. The activation of this panel activates the H and V elements simultaneously using separate RF units and baseband diversity module.
Wireless Links
The herein disclosed mesh access network consists of the following types of links:
Each base-station in the herein disclosed mesh access network preferably consists of six sectors, although those skilled in the art will appreciate that a different number of sectors may be used in connection with the invention herein. A sector consists of a large number of indoor terminal nodes, some outdoor terminal nodes, and a small number of outdoor repeaters. The nodes in each sector are arranged in a tree structure starting from the base-station.
All communication with nodes in a sector that cannot communicate directly with the base-station is done through a first set of repeaters in the sector. Data packets from the base-station to a node are switched to the node through multiple hops. Similarly, data packets from a node are transmitted through multiple hops to the base-station. In the presently preferred embodiment of the invention, the number of hops in a sector is limited to four, i.e. Base-station→Repeater1→Repeater2→Repeater3→Terminal, to provide lower latency, although those skilled in the art will appreciate that another number of hops may be chosen, as desired, in connection with the invention.
The network topology is designed for urban and sub-urban deployments. In urban deployments the repeaters are preferably located at or below the median height of buildings in the sector to reduce the interference caused by the links.
Interference and reuse in the network is managed using frequency, time, and directionality.
There are two basic types of links:
The BS→R(L1) links can be active in all sectors in all cells simultaneously because of transmitter (Tx) and receiver (Rx) antenna directionality. In the preferred embodiment, approximately 40% of all the time-slots are preferably reserved for these links. The ratio of down and up traffic can be set to, for example, 3:1, 2:1, 1:1 using an appropriate number of T/R time-slots at each end, although other ratios may be used in connection with the invention. This determines sector capacity, which in the preferred embodiment is approximately 6 Mbps for 5 MHz×2 and 8.4 Mbps for 7 MHz×2.
The in-sector R/BS→R/T links are active only in their assigned time-slots (A/B/C). The repeaters distribute data packets to/from terminals in these time-slots by scheduling non-interfering links to transmit at the same time. This enables the system to maximize the available capacity in the network and make up for the loss of capacity due to repeating.
The deployment of several base-stations in an area is done by planning base-station sectors to manage interference.
Scalability
The capacity of a base-station can be increased by adding more carriers, for example a total of four or six carriers. This can be done sector by sector wherever more capacity is needed. This requires a different base-station radio for each sector for each carrier. It also requires another set of first level repeaters to communicate with the base-station on different carriers at the same time. Other nodes in each sector must switch to different carriers for the 20% in-sector time-slots (A/B/C). For example, a sector using carrier F1 in A time-slots, uses carrier F3 in B time-slots and carrier F5 in C time-slots. The additional capacity can be used to provide additional capacity to individual nodes or add more nodes in a sector.
Latency Management and Spectral Efficiency
Each sector in the network represents a tree structure rooted at the base-station. Links use two types of time-slots for communication—long and short.
Long time-slots are very spectrally efficient and can transmit a large number of bytes (˜2 k bytes) in each time-slot. A base-station communicates with level-1 repeaters (R1) using long time-slots because these links carry all the packets in the network destined to/from repeaters and terminals connected to them. Because 40% of all the time-slots are long, the overall network is very spectrally efficient.
Short time-slots have approximately 20% the capacity and 25% the duration of the long time-slots. All the Repeater→Repeater/Terminal and Base-station→Terminal links preferably use short time-slots. They are less spectrally efficient compared to the long time-slots, but they have lower latencies due to their shorter duration. This also improves the link utilization of the short time-slots because these links are likely to have fewer bytes to transmit compared to the Base-station→Level-1 Repeater links.
The short time-slots are time-multiplexed (A/B/C) to maximize the utilization of the spectrum and reduce latencies. Link scheduling takes into account interference information and schedules 3-4 simultaneous in-sector links in each short time-slot.
As described in U.S. patent application Ser. No. ______ unassigned (COWA0002) also owned by the Applicant, a network is defined as a set of links between nodes. For example, the uni-directional link between Node I and Node J is called Iij.
For example, there are N nodes and M directional links (Iij and Iji are considered different links) in a network. The interference between links in the network determines which links in the network can operate simultaneously. In other words, if a link Iij is active there exists a set of links Lij which cannot all be active at the same time. The set of all links Lij in the network constitute the interference matrix of the network. The degree of interference α(Iij, L) of a directional link Iij in a set L of links is defined as the number of links in set L that cannot be active due to interference while link Iij is active.
The bandwidth needed by links to carry actual traffic over a specific time period is a set of link bandwidth requests. The request may be zero. In that case, no traffic is to be carried over the link. Because link capacities vary depending on various link parameters, bandwidth requests are expressed in unit of credits, not bps (bits/sec). A credit is a unit the resource bandwidth allocation algorithm uses to maintain fair bandwidth distribution between links. It is the result of normalization of requested bandwidth, in terms of bps, with respect to the corresponding link capacity.
Suppose that the set of links L0,1 that gets interference, i.e. that cannot be active while link I0,1 is active, is:
Similarly, suppose there are the following interference sets:
Equivalently, the interference can be expressed using the interference matrix I shown in Table 1 below.
Number 1 in the matrix of Table 1 shows that links in a corresponding row and column cannot be active at the same time. Empty boxes in the matrix represent 0s.
A link bandwidth request is expressed in terms of the link capacity. Suppose that 64 credits are equivalent to full link capacity. If a link is given 64 credits, that link can be active all the time. If a link is given 32 credits, that link is active 50% of the time.
Suppose at a particular time, there exist the following bandwidth requests in credits:
The set of links requesting bandwidth is:
Using the interference matrix I, the degree of interference of I0,2 in this set is computed as follows:
Other degrees of interference can be computed similarly:
Assume that time division multiple access (TDMA) techniques are used to multiplex link activities. Given the constraints of the interference matrix and a list of bandwidth requests, attempt to find a schedule to make optimal use of total network capacity and fairly satisfy bandwidth requests.
An equivalent problem is to find an optimal schedule that satisfies all requests using the least amount of network resources, in this case, credits or time. If the average activity concurrency is defined as the average number of concurrent active links of a schedule, then the optimal schedule is the one having the highest average activity concurrency.
A schedule specifies when a set of links are active and also specifies the members of the set. Mathematically, a schedule S can be expressed as:
Continuing with Example 1 above, the following is one possible schedule for links requesting bandwidth:
This schedule uses 10+35+5+10+20=80 credits to satisfy 35+20+15+10+10+10+10+5=115 requested credits. The average activity concurrency is 115/80=1.4375.
This schedule is not necessarily the best schedule for this example. In fact, using the algorithm described in detail below, one can find a better schedule using less credits while still satisfying all bandwidth requests.
An optimal schedule must satisfy the following conditions:
For any link, granted credits equals requested credits
Minimal total network resource spent
Because this problem is NP-hard, a heuristic algorithm is disclosed herein for a near optimal solution. For purposes of the discussion herein, a problem is NP-hard if an algorithm for solving it can be translated into one for solving any other NP-problem, i.e. nondeterministic polynomial time problem. NP-hard therefore means “at least as hard as any NP-problem,” although it might, in fact, be harder.
Simulations show that in many cases this algorithm generates optimal schedules; and in cases that it does not, the schedules are usually close to optimal and are always better than average.
Bandwidth Allocation Algorithm
The algorithm disclosed herein is based on the assumption that there exists a centralized node (hub) in the network that coordinates all network activities (see
Assume that each node 50, 52 in the network conveys its knowledge of interference, topology, and its bandwidth needs to the hub. The actual mechanism for transporting this information to the hub is within the knowledge of those skilled in the art and is, therefore, not discussed in detail herein. The hub collects this information from individual nodes and constructs the interference matrix, topology matrix, and list of credit tokens to have a complete view of the network.
The bandwidth allocation algorithm running at hub is described as followed (see
Use this algorithm to compute the schedule for Example 2.
Step 1 (see Table 2 below).
Steps 2-5:
Get the first Schedule S={({I0,2, I5,9, I3,1}, 10)}.
Go back to step 1 (see Table 3 below).
Steps 2-5:
Get a revised Schedule S={({I0,2, I5,9, I3,1}, 10), ({I0,2}, 25)}.
Go back to step 1 (see Table 4 below).
Steps 2-5:
Get a revised Schedule:
Go back to step 1 (see Table 5 below).
Steps 2-5:
Get a revised Schedule:
Go back to step 1 (see Table 6 below)
Steps 2-5:
Get a revised Schedule:
Go back to step 1 (see Table 7 below).
Steps 2-5:
Get the schedule:
This schedule uses 10+25+10+5+10+10=70 credits to satisfy 35+20+15+10+10+10+10+5=115 requested credits. The average activity concurrency is 115/70=1.6428. Obviously, this schedule is better than the one presented in the previous example. In fact, it can be proved that this schedule is the optimal one for this particular example. There is no other schedule that can use less number of credits to satisfy all these bandwidth requests.
Step 7:
Because the total resource is only 64 credits, the previous schedule is prorated to obtain the final schedule:
This schedule is broadcast to all nodes in the network.
Upon receiving the schedule, each node in the network uses the binary allocation map scheme to compute its own slot assignment. Allocation map is an array of numbers that is used to map a range of consecutive numbers to partially equally spaced numbers. The idea is that, given a portion of resources, a node can figure out its active timeslots by projecting that portion (consecutive numbers) through the map. For example, all links in set Li are assigned to the range [Σ0,i−1χj, Σ0,iχj], which, in turn, represent a set of near-equally spaced time slots.
Assume that the allocation map is designed for 64 time slots, corresponding to 64 credits.
The allocation map for 64 time slots is shown in Table 8 below.
A range of credit indices can be deduced for each set of links in the final schedule Sf. For example, the set {I0,2, I5,9, I3,1} is correspondent to [1,9]. Set {I0,2} is correspondent to [10,32]; and so on.
Using the combination of allocation map and the final schedule Sf, any node is aware of which link is active at a particular time slot t. For example, the set {I0,2, I5,9, I3,1} is active in time slots 1, 5, 9, 17, 25, 33, 41, 49, 57.
Maximizing Network Capacity Using Unscheduled Time Slots
To facilitate the explanation of using unscheduled time slots, use the schedule obtained in previous example.
Some notable points need to be made about this schedule:
With these observations, it can be seen the scheduled bandwidth very likely represents only about half of total network capacity. Hence, a collision-based mechanism is devised to use the other half, which is going to be wasted if not used otherwise.
Each node in the network maintains, for each of its local links, one set of links interfering with that link. Local links are links directly connected to the node. By using the schedule S broadcast by the Hub, a node knows which of its local links can be active without interfering with the scheduled links which are currently active. An active unscheduled link at time slot t is a link that is not scheduled to be active at time t, but could be made active if the intended receiver is ready to receive. This can be decided by its directly connected nodes because this activity does not cause interference with the current active scheduled links. A link can be unscheduled at one time slot and is scheduled in another time slot. Active unscheduled links can interfere and collide which each other, but they do not interfere with the currently active scheduled links.
Unscheduled links are mainly used when a node does not have uplink scheduled bandwidth and need to request bandwidth or need to send some small uplink transient traffic. It is used to boost up network capacity, as well as network response time.
Using Example 4, the final schedule is:
Pick one time slot t. Suppose that it corresponds to ({I2,6, I0,1}, 5) in the schedule. This means that I2,6 and I0,1 are active at time slot t. The matrix of interference indicates that any of links {I4,8, I9,5} can also be active. Although each node does not maintain the matrix of interference for the whole network, it does keep sets of interference links for each of its local link. Hence, local nodes (4 and 9) know that they can activate the link at time slot t. In this specific example, if both I4,8 I9,5 are active, they still do not collide. However, that is not always the case. Nodes can use a backoff mechanism to resolve collision if it happens.
Although the invention is described herein with reference to the preferred embodiment, one skilled in the art will readily appreciate that other applications may be substituted for those set forth herein without departing from the spirit and scope of the present invention. Accordingly, the invention should only be limited by the claims included below.