9
IEEE Communications Magazine • January 2011 134 0163-6804/11/$25.00 © 2011 IEEE INTRODUCTION Mission-critical (MC) systems and organizations, such as healthcare, police, and firefighting, rely heavily on the underlying telecommunications infrastructure to conduct their daily tactical and emergency operations. In recent years, the MC sector has witnessed the proliferation of diverse multimedia applications such as remote patient monitoring, two-way video/audio conferencing, 3D geographical mapping and positioning, enhanced telemetry, and live surveillance video broadcasting. All these technological advance- ments are expected to force MC service pro- viders (SPs) to migrate from simple data services to triple-play (data, voice, and video) or even quadruple-play (triple-play plus mobile) services on a single infrastructure in order to offer state- of-the-art MC service support. Public safety and disaster relief (PSDR) net- works are particularly designed to guarantee reliable, continuous, secure, and flexible MC ser- vice. Since 1997 the terrestrial trunked radio (TETRA) standard [1] (predominant in Europe, Middle East and Africa, and Asia Pacific) and the ASTRO-25 standard (equally predominant in the Americas) have become the de facto stan- dards for PSDR communications, and have been employed by senior market players (e.g., Motorola and Nokia) in their deployment of MC networks in rural and urban areas. More inter- estingly, TETRA networks have successfully penetrated other large markets such as trans- portation, utilities, and oil/gas services (as recent- ly announced in Qatar) [2]. The current two major TETRA releases (TETRA-1 and TETRA- 2) developed by the European Telecommunica- tions Standards Institute (ETSI), provide radio capabilities endorsing network controlled ser- vices and direct mobile-to-mobile communica- tions, with a wide range of functionalities such as group calls, fast call setup, encryption/decryp- tion, real-time localization, and grade-of-service (GoS) connections [1]. However, the access capability offered by TETRA, which focuses on voice plus data (V+D) services only, is not suffi- cient to satisfy the bandwidth requirements of the emerging multimedia PSDR applications. The transmission rates of these applications are peculiarly higher than the 28.8 kb/s TETRA maximum data bit rate. In May 2000 Project MESA [3] was intro- duced to define a new platform and a set of MC requirements that aim at forming an advanced PSDR telecommunication network with an improved bit rate of 2 Mb/s. In 2007, Motorola announced MOTOA 4 [4], a suite of proprietary network solutions leveraging the ubiquity of the IEEE 802.11n to form a wireless outdoor mesh wide area network (MWAN). MOTOA 4 oper- ates at high data bit rates of 300 Mb/s and offers full ASTRO interoperability. However, its deployment has been restricted to urban areas only. In a similar timeline, public networks have been preceding the MC sector in terms of tech- nological evolution and market deployments. Recently, the integration of Ethernet passive optical network (EPON) and WiMAX has been presented as the evolutionary next step toward the convergence to a high-speed wireless and cost-effective broadband access network [5–7]. More attractively, EPON and WiMAX perfectly match in terms of capacity hierarchies and design premises. EPON, for instance, supports a total of 1 Gb/s bandwidth in both downstream and upstream directions, shared by typically N 32 ABSTRACT The convergence of optical and wireless net- works has been envisioned recently as an attrac- tive economic broadband access solution; yet, its usage has been restricted to public users only. To serve mission-critical services in public safety and disaster relief communications using the fiber-wireless integration, key challenges such as fault recovery, security, and quality of service assurance must be addressed. This article intro- duces MC-FiWiBAN, a new emergency-aware architecture that leverages layer 2 virtual private networks to support mission-critical services over the integration. Each virtual private network cor- responds to a specific mission-critical system requirements bundle that is stipulated in the ser- vice level agreement and fulfilled via an effective resource management paradigm. Simulation results show that MC-FiWiBAN can commit guaranteed quality of service for emergency and non-emergency services. TOPICS IN OPTICAL COMMUNICATIONS Ahmad R. Dhaini and Pin-Han Ho, University of Waterloo MC-FiWiBAN: An Emergency-Aware Mission-Critical Fiber-Wireless Broadband Access Network

MC-FiWiBAN: An Emergency-Aware Mission-Critical Fiber ...staff.aub.edu.lb/~ad57/documents/MC_FiWiBAN_COMMAG.pdf · thermore, the integration can help realize fixed mobile convergence

  • Upload
    vomien

  • View
    215

  • Download
    1

Embed Size (px)

Citation preview

IEEE Communications Magazine • January 2011134 0163-6804/11/$25.00 © 2011 IEEE

INTRODUCTION

Mission-critical (MC) systems and organizations,such as healthcare, police, and firefighting, relyheavily on the underlying telecommunicationsinfrastructure to conduct their daily tactical andemergency operations. In recent years, the MCsector has witnessed the proliferation of diversemultimedia applications such as remote patientmonitoring, two-way video/audio conferencing,3D geographical mapping and positioning,enhanced telemetry, and live surveillance videobroadcasting. All these technological advance-ments are expected to force MC service pro-viders (SPs) to migrate from simple data servicesto triple-play (data, voice, and video) or evenquadruple-play (triple-play plus mobile) serviceson a single infrastructure in order to offer state-of-the-art MC service support.

Public safety and disaster relief (PSDR) net-works are particularly designed to guaranteereliable, continuous, secure, and flexible MC ser-vice. Since 1997 the terrestrial trunked radio(TETRA) standard [1] (predominant in Europe,Middle East and Africa, and Asia Pacific) andthe ASTRO-25 standard (equally predominantin the Americas) have become the de facto stan-

dards for PSDR communications, and have beenemployed by senior market players (e.g.,Motorola and Nokia) in their deployment of MCnetworks in rural and urban areas. More inter-estingly, TETRA networks have successfullypenetrated other large markets such as trans-portation, utilities, and oil/gas services (as recent-ly announced in Qatar) [2]. The current twomajor TETRA releases (TETRA-1 and TETRA-2) developed by the European Telecommunica-tions Standards Institute (ETSI), provide radiocapabilities endorsing network controlled ser-vices and direct mobile-to-mobile communica-tions, with a wide range of functionalities such asgroup calls, fast call setup, encryption/decryp-tion, real-time localization, and grade-of-service(GoS) connections [1]. However, the accesscapability offered by TETRA, which focuses onvoice plus data (V+D) services only, is not suffi-cient to satisfy the bandwidth requirements ofthe emerging multimedia PSDR applications.The transmission rates of these applications arepeculiarly higher than the 28.8 kb/s TETRAmaximum data bit rate.

In May 2000 Project MESA [3] was intro-duced to define a new platform and a set of MCrequirements that aim at forming an advancedPSDR telecommunication network with animproved bit rate of 2 Mb/s. In 2007, Motorolaannounced MOTOA4 [4], a suite of proprietarynetwork solutions leveraging the ubiquity of theIEEE 802.11n to form a wireless outdoor meshwide area network (MWAN). MOTOA4 oper-ates at high data bit rates of 300 Mb/s and offersfull ASTRO interoperability. However, itsdeployment has been restricted to urban areasonly.

In a similar timeline, public networks havebeen preceding the MC sector in terms of tech-nological evolution and market deployments.Recently, the integration of Ethernet passiveoptical network (EPON) and WiMAX has beenpresented as the evolutionary next step towardthe convergence to a high-speed wireless andcost-effective broadband access network [5–7].More attractively, EPON and WiMAX perfectlymatch in terms of capacity hierarchies and designpremises. EPON, for instance, supports a totalof 1 Gb/s bandwidth in both downstream andupstream directions, shared by typically N ≤ 32

ABSTRACT

The convergence of optical and wireless net-works has been envisioned recently as an attrac-tive economic broadband access solution; yet, itsusage has been restricted to public users only.To serve mission-critical services in public safetyand disaster relief communications using thefiber-wireless integration, key challenges such asfault recovery, security, and quality of serviceassurance must be addressed. This article intro-duces MC-FiWiBAN, a new emergency-awarearchitecture that leverages layer 2 virtual privatenetworks to support mission-critical services overthe integration. Each virtual private network cor-responds to a specific mission-critical systemrequirements bundle that is stipulated in the ser-vice level agreement and fulfilled via an effectiveresource management paradigm. Simulationresults show that MC-FiWiBAN can commitguaranteed quality of service for emergency andnon-emergency services.

TOPICS IN OPTICAL COMMUNICATIONS

Ahmad R. Dhaini and Pin-Han Ho, University of Waterloo

MC-FiWiBAN: An Emergency-AwareMission-Critical Fiber-WirelessBroadband Access Network

DHAINI LAYOUT 12/16/10 12:29 PM Page 134

IEEE Communications Magazine • January 2011 135

remote optical network units (ONUs). On aver-age, each ONU accesses ≈ 70 Mb/s bandwidth,which matches the total capacity offered by aWiMAX base station (BS) over a 20 MHz chan-nel. In addition, the integration enables integrat-ed resource allocation and packet schedulingparadigms that help to better support the emerg-ing quality of service (QoS) applications, as wellas improve the overall network throughput. Fur-thermore, the integration can help realize fixedmobile convergence (FMC) by supporting mobil-ity in the broadband network access, thereby sig-nificantly reducing network design andoperational costs [5].

The article aims at taking advantage of thepublic network evolution to support MC servicesover the fiber-wireless (FiWi) integration. In thiscontext, we propose MC-FiWiBAN (Fig. 1), anew emergency-aware architecture that can helpextend the MC multimedia service coverage torural areas, as well as improve the PSDR useraccess to the IP-based network core. PSDR andMC services require high security, custom net-work control, and fast network access, in addi-tion to a fine degree of QoS assurance andbandwidth guarantees. MC-FiWiBAN enforcesthese features via the construction of a layer 2virtual private network (VPN), which has beenwidely established in wired networks and is con-sidered a killer application in modern Internetcarriers [8, 9].

Figure 1 shows how MC-FiWiBAN can beeasily integrated with the TETRA infrastructure(i.e., TETRA switching and management infra-structure [SwMI]) using IP/Ethernet as the inter-face between the optical line terminal (OLT)and an Internet gateway (IGW) located at theTETRA SwMI. The main function of an IGW is

to hide from the SwMI the anomalies of MC-FiWiBAN, thereby achieving seamless integra-tion with almost no SwMI changes [10]. Asimpler strategy would be to directly embed theOLT as part of the SwiMI infrastructure; howev-er, a special interconnection agreement will thenbe required to preserve and/or lease the properTETRA authorizations to the access network. ATETRA radio user is envisioned to operate as adual-mode terminal capable of supporting bothTETRA and WiMAX radio/air interfaces inorder to provide full interoperability betweenMC units and systems across these heteroge-neous networks.

With MC-FiWiBAN, the article attempts toprovide an effective solution to the resourcemanagement problem — one of the key issuesthat arise in VPN construction over a sharednetwork infrastructure. A resource allocationframework is presented to achieve a guaranteedQoS level for MC services as defined in theVPN service level agreement (SLA). To the bestof our knowledge, this is the first work that con-siders the support of MC services over EPON-WiMAX.

The rest of the article is organized as follows.We first overview MC systems. We next presentMC-FiWiBAN by highlighting the main keyissues in the aspects of design and implementa-tion. An illustrative simulation example is thenpresented, and we finally conclude the article.

MISSION-CRITICAL SYSTEMSDifferent from public systems, an MC systemrequires a set of unique services and networkrequirements. In this section we brieflyoverview different types of multimedia services

Figure 1. MC-FiWiBAN supporting MC VPNs and integrating with TETRA networks. In safety-critical places (e.g., hospitals [H]), anetwork bridge may be used to connect ONU and BS, such that the BS is placed a small distance away from its designated safety-criti-cal site.

OLT

TETRASwiMI

(IP-based)

IP-basednetwork

c ore

IP/Ethernet

Internet/Gateway(IGW)

Fire intranet

PoliceIntranet

Hospitalintranet

Remote expert

Remote expert

Remoteexpert

Splitter1:N

20 Km

Remotedatabase

TETRAnetwork

TETRAnetwork

OLT: Optical line terminalONU: Optical network unitBS: WiMAX base stationSS: subscriber stationBridge: network bridge (optional)

Note: ONU and BS can be mounted in onebox (so-called ONU-BS).

TETRAuser/terminal

TETRA site

Remotedatabase

FireHQ

Firestation

ONU

Bridge

BS

SS

SS

SS

Remote database

SS

H

Clinic

ONU

BridgeBS

SS

SS

SS

SS

AMBULANCE

AMBULANCE

AMBULANCE

AMBULANCE

Policestation

PoliceHQ

ONU

Bridge

BS

SS

SS

Mobile MC units

SSSS

DHAINI LAYOUT 12/16/10 12:29 PM Page 135

IEEE Communications Magazine • January 2011136

envisioned to extensively appear in such a sys-tem. We also highlight the main networkrequirements for ensuring robust MC servicesupport.

MISSION-CRITICAL SERVICESWith the emerging multimedia MC services,PSDR users can establish audio/video calls orshare images and other miscellaneous MC infor-mation. These services (Fig. 2a) possess strin-gent QoS and security requirements that need tobe fulfilled via an effective network solution.Typically, an MC service may belong to one ofthe following categories:• Emergency (asynchronous): A one-way mes-

sage (or flow of short length) is triggered byan emergency event (e.g., fire event, crimi-nal pursuit or an alarm by a health moni-toring system) and requires immediatedelivery/broadcast.

• Real-time (synchronous): It can be as simpleas telephone calls or as complex as sophisti-cated virtual-reality robotic surgery. It canalso be used for monitoring of long-termcare agents by establishing videoconferenc-ing. A particular example of a real-timeapplication is the live video surveillance sys-tem. The deployment of such a system overMC-FiWiBAN, as shown in Fig. 2b, canprovide a secure and robust wireless con-nection that eliminates the wiring/rewiringoverhead of conventional surveillance sys-tems.

• Store-and-forward (asynchronous): Itsupports delivery of non-emergency MCdata (images, bio-signals, etc.) to special-ists for e-consultation, evaluation, orother purposes. It does not require inter-active communications between involvedparties in real time; however, high dataintegrity and bandwidth guarantees arecrucial.

MISSION-CRITICAL NETWORK REQUIREMENTS

In addition to security and reliability, an MCnetwork must fulfill the following salient require-ments:1• Operability: The ability to establish and sus-

tain communications between different MCunits during an MC event

• Interoperability: The ability of all MC units(from all levels and disciplines) to commu-nicate among each other as authorized andas needed, regardless of their network capa-bilities

• Continuity of Communications: The abilityto maintain communications, even in theevent of a network failure

It is therefore essential that any designed oradopted network solution must sustain thesenetwork requirements to perpetuate the diverseQoS requirements of MC services.

MC-FIWIBANAs described, the deployment of MC systemscompels a set of features to be available in theunderlying network. In this section we discernthe building blocks of MC-FiWiBAN to embracethese distinctive attributes.

LAYER 2 VPNS OVER EPON-WIMAXAn MC system provisions a specific bundle ofservices with different QoS requirements to itsusers. To support these services over EPON-WiMAX, we propose to develop layer 2 VPNsover the EPON-WiMAX infrastructure; eachVPN corresponds to a specific service require-ment bundle issued by a registered system [9].Such VPNs are referred to as layer 2 VPNs inthe sense that they are built on the layer 2 pro-tocols.

Compared to layer 3 VPNs, layer 2 VPNs canbetter resolve complications due to network

Figure 2. a) Envisioned mission-critical applications and services; b) an illustration of a surveillance system over MC-FiWiBAN.

Bedroom Living Room

HeadquartersSSSS

ONU-BS

VPN EPON

Home patient monitoring

Heart

Remote consulting Event coverage and tracking

Robotic surgery Mobile medical units (MMUs)

(a) (b)

Electro-cardiogram

Living roomBedroom

1 In 2005 the U.S. Depart-ment of Homeland Secu-rity (DHS) activated acommunications pro-gram, Safecom(http://www.safecompro-gram.gov), which aims atimproving emergencyresponses through wirelesscommunications. Safe-com has also listed thesame features as emergen-cy requirements.

DHAINI LAYOUT 12/16/10 12:29 PM Page 136

IEEE Communications Magazine • January 2011 137

dynamics and fast wireless changing channel sta-tus [9]. In addition, layer 2 VPNs provide strongsupport for premium services with custom-designed control of layer 3 routing and IPaddressing, diverse QoS requirements, and secu-rity assurance, as well as the features intrinsicallyexhibited in the medium access control (MAC)layer [8]. These attributes are vital in the courseof MC service support over the EPON-WiMAXintegration.

With the initiation of layer 2 VPNs direct-ly on the integration, users of each registeredsystem can dynamically configure their ser-vice requirements and possibly issue call pre-emption requests through a suite of serviceaccess points (SAPs) and interfaces that aremanipulatively maintained in the correspond-ing VPN package. This property is essentialto an MC system where stringent bandwidthguarantees and call preemption requests arepresent [3]. Furthermore, such VPNs enableinteroperability between fixed and mobileplatforms.

The layer 2 VPN requests that are issuedby the users can be handled within the MCorganization without the need to involve fur-ther overlay and additional VPN agents [8]. Asa result, the classified nature of MC operationsis preserved; and the constantly changing MCunits’ locations, especially in mobile tacticalscenarios, are easily handled. Meanwhile, sur-vivabil i ty of the end-user services can beenhanced by multihoming,2 which can easilybe manipulated in the layer 2 VPNs [8]. TheVPN applications can determine if a usershould be associated with multiple ONU-BSsthrough separate air interfaces, so as to enablefast fault recovery, which is vital to the MCscenario.

VPN TUNNELING

As depicted in Fig. 3, we classify an MC-FiWiBAN VPN tunnel as either interdomain orintradomain:• Intra-domain: A tunnel is established

between customer edges (CEs) that belongto the same architectural domain (e.g.,between two WiMAX subscriber stations[SSs]).

• Inter-domain: A tunnel is establishedbetween CEs that belong to different archi-tectural domains (e.g., between the OLTand an SS).To achieve operability, a VPN tunnel is to be

established such that sufficient resources areallocated in MC-FiWiBAN (in both theuplink/upstream and downlink/downstreamdirections) and in the optical ring. The downlinkresource allocation is argued to be deterministic,due to being broadcast in nature under EPON-WiMAX [5, 7]. Hence, the article focuses on theuplink/upstream resource management problemin MC-FiWiBAN.

FAULT TOLERANCE AND ERROR RECOVERYTo maintain service continuity, a fast recoveryfrom any possible unexpected failure is required.In MC-FiWiBAN a VPN tunnel may fail due tothe following reasons:• A damage in the wireless link between the

ONU-BS and the wireless user (an intrado-main VPN error)

• A fiber cut between the ONU-BS and thesplitter (a hybrid inter-/intradomain VPNfault)

• A fiber cut between the splitter and theOLT (a hybrid inter-/intradomain VPNerror)

Figure 3. VPN tunneling in MC-FiWiBAN.

Point-to-multi-point(PMP)

Mesh

CO

Optical Ring

PE

PE ONU-BS Optical network unit-base station

Optical line terminal

Provider edge

CO Central office

CO

PE

COInter-domainVPN tunnel

PE

CE

CESS CE

SSSS

SS SS

CE

Intra-domainVPN tunnel

Inter-domainVPN tunnel

ONU-BS

ONU-BS

ONU-BS ONU-BS

ONU-BS

ONU-BS

ONU-BS

ONU-BS

ONU-BS

SS

SS

SS

SSCE

SS

SS SS

SS

SS

SS SS

SSCE

CE Customer edge Optical link

Wireless linkSS Subscriber station

SS

SS

SS

SS

SS

SS

CE

SS

OLT

Bidirectional

OLT

OLT

OLT

2 Multihoming refers to asingle host making use ofseveral connections asso-ciated with various inter-connected networks.

DHAINI LAYOUT 12/16/10 12:29 PM Page 137

IEEE Communications Magazine • January 2011138

• A fiber cut on the metro ring, causing dam-age to the interdomain established VPNEnabled via multihoming, fast fault recovery

can be attained through the following strategies.If the wireless channel between the ONU-BSand the SS is deteriorated, the VPN tunnel canbe rerouted to another ONU-BS in range usinga direct connection (in the case of point-to-mul-tipoint [PMP] topology), or through a multihoproute (in the case of mesh topology with theONU-BS not in range) [11]. Similarly, if a fibercut occurs between an ONU-BS and the splitteror between the OLT and the splitter, the failurecan be averted by establishing communicationwith an alternative ONU-BS of a neighboringEPON-WiMAX network, to reach its networkboundary by means of the bidirectional metroring, which is also fault-tolerant by nature [12].Such a strategy cannot be performed in tradi-tional PONs and/or WiMAX networks [6].

These routing stratagems can easily be accom-modated in layer 2 through specialized routingagents (located at each network boundary) tomaintain service continuity of the VPNs.Nonetheless, other layer 3 FiWi routing proto-cols [11] may alternatively be adopted to servethe same purpose.

EMERGENCY-AWARE QOS SUPPORTAs mentioned, QoS requirements are specifiedin the SLA of each VPN. To support QoS in theMAC, the IEEE 802.16 standard defines fiveclasses of service (CoSs): unsolicited grant ser-vice (UGS), real-time polling service (rtPS),embedded real-time polling service (ertPS)(defined in IEEE 802.16e), non-real-time pollingservice (nrtPS), and best effort (BE) [13]. AnMC service plan typically comprises two types ofdata:• Regular periodic traffic (i.e., real-time or

store-and-forward) that is transmitted fre-quently

• Emergency messages that are highly erraticbut extremely delay-sensitiveAs shown in Table 1, QoS support for regular

MC traffic can be achieved by mapping each ser-vice to one of the WiMAX CoSs based on itstype and QoS requirements. On the other hand,emergency traffic requires QoS protection andimmediate transfer; therefore, it should not bemixed with other types of services. For this rea-son, we define a new IEEE 802.16 CoS, emer-gency grant service (EGS). EGS has the highestpriority, over all other services, and possessesstringent QoS requirements. Moreover, due toits erratic nature and sporadic occurrence (e.g,once in several weeks/months), EGS traffic isreported to the ONU-BS whenever an emergen-cy event occurs, and is placed in a separatebuffering queue.

EGS not only reduces the control overheadcaused by reporting the bandwidth needs in eachpolling interval (PI), but also eliminates thewaste of bandwidth caused by reservingresources for emergency services in each PI (incase the UGS approach is applied)3 [13]. With aseparate buffer, EGS also facilitates the imple-mentation of a service preemption mechanismrequired in emergency situations with congestednetworks.

SERVICE CLASSIFICATION AND COS MAPPINGThe design of a MAC protocol that arbitratesthe transmission of MC users over the sharedMC-FiWiBAN resources requires an MC serviceclassification at both the end user/SS and ONU-BS.

At the SS — Table 1 shows the mapping of theenvisaged MC users’ applications to the IEEE802.16 CoSs of each SS. This classification makesMC-FiWiBAN scalable in the sense that the sup-port of more users will then require no changes,especially to the adopted resource allocation

Table 1. Envisaged multimedia applications/service classification and CoS mapping.

Service type ApplicationQoS requirements

IEEE 802.16CoS

Data bit rate One-way end-to-end delay Jitter

Emergency call/event Device/human trigger 2–5 kb/s ≤10 ms N/A EGS

AudioDiagnostic (interactive) 4–25 kb/s ≤1 s ≤1 ms UGS

Conferencing (real-time) 5–70 kb/s ≤150 ms ≤1 ms UGS

VideoVideo streaming 1–6 Mb/s ≤10 s N/A nrtPS/rtPS

Conferencing (real-time) 20 kb/s–1 Mb/s ≤250 ms N/A rtPS

Monitoring services

Enhanced telemetry (real-time) 20–50 kb/s ≤250 ms N/A rtPS

MC data transfer 20–50 kb/s ≤250 ms N/A nrtPS

Bulk data transfer 50 kb/s–few Mb/s ≤10 s N/A nrtPS

Multimedia transfer Routine activities 100 kb/s–few Mb/s ≤10 s N/A nrtPS

Best effort (BE) Email/web browsing Minimum throughput BE

3 In WiMAX UGS trafficis not reported by the user.Instead, a fixed share ofbandwidth is allocated inevery PI for each admittedUGS flow.

DHAINI LAYOUT 12/16/10 12:29 PM Page 138

IEEE Communications Magazine • January 2011 139

schemes, since the VPN-to-MAC mapping, viathe predefined SAPs, will implicitly take care ofsatisfying its requirements without compromisingthe QoS level of existing services.

At the ONU-BS — According to the IEEE802.13ah standard, an ONU is allowed to sup-port and report up to eight queues [5]. To pre-serve the standard, we install a total of six queuesat the ONU-BS and then perform a simple one-to-one CoS mapping.

VPN RESOURCE MANAGEMENTOur previous work in [9] introduced the firstframework to address the resource managementproblem of layer 2 VPNs over EPON-WiMAX.The proposed framework, WiMAX-VPON, con-sists of a QoS-provisioning paradigm and a jointVPN-based access control (AC) and uplink/

upstream dynamic bandwidth allocation (DBA)mechanism. WiMAX-VPON ensures bandwidthguarantees for each VPN service and protects itsQoS. In this work we extend WiMAX-VPON tosupport MC services and requests.

VPN-Based QoS Provisioning — With the newframework, the effective upstream VPON cycleTeff

VPON, which is the upstream optical PI lengthminus the control overhead caused by the pollingand requesting signaling, is divided into two sub-cycles. As illustrated in Fig. 4, the first subcycleβTeff

VPON is shared among all K VPNs, whereasthe second subcycle (1 – β)Teff

VPON is sharedamong non-VPN services (to support legacyusers as well). Note that Teff

VPON can be obtainedeither via simulations by measuring the signalingoverhead rate or analytically [14].

Let Bkmin be the bandwidth reserved for VPN

Figure 4. MC-FiWiBAN QoS-provisioning paradigm with K = 4 VPNs; all supported by ONU-BSs 1, 5, 8,and 10. These ONU-BSs provision V4 services through SSs 3, 4, 6, and 9. In turn, SS3 accommodates V4requests. EGS4

3 means EGS bandwidth belongs to SS3 and V4.

Each SSaccomodatesmultiple VPN

service requests

Each ONU-BSprovisions multiple

VPNs

B1

βTVPONeff

(1 − β)TVPONeff

αkB1

VPN 1

BE43UGS4

3EGS43 . . . . . .

BE

ONU-BS1

Guard time

Real-time traffic

VPN 2 VPN 4 non-VPN

Control overhead

VPN 3

(1-αk)B1min

min

min

SS3

ONU-BS5 ONU-BS10

SS4 SS9SS4

ONU-BS8

EGS not only reduces

the control overhead

caused by reporting

the bandwidth needs

in each polling

interval (PI), but also

eliminates the

wastage of

bandwidth caused

by reserving

resources for

emergency services

in each PI (in case

the UGS approach

is applied).

DHAINI LAYOUT 12/16/10 12:29 PM Page 139

IEEE Communications Magazine • January 2011140

k (denoted Vk) in each PI, and RN the transmis-sion speed of PON in megabits per second. Inaddition, let each Vk be given a weight wk todetermine its agreed upon bandwidth share. Bk

min(in bytes, thus divide by 8) is then computed asfollows:

To guarantee a minimum per-VPN SLA-based throughput for BE traffic and in order toeliminate starvation (in case of the admission ofa large number of EGS or real-time flows thathave higher priority), we reserve a portion ofαkBk

min. As a result, all the Vk real-time andemergency flows share the (1 – αk)Bk

min remain-ing bandwidth.

A Joint VPN-Based AC and DBA Mechanism— To guarantee a per-VPN QoS assurance inthe uplink/upstream direction, a joint VPN-based AC and DBA scheme is proposed comple-menting the proposed QoS provisioningframework [9].

With MC-FiWiBAN, VPN-AC admits allEGS and BE flows. Each admitted BE flowshares its reserved portion αkBk

min with all other

BE flows belonging to Vk, while an EGS flow isalways satisfied. Adversely, a constant bit rate(CBR, e.g., UGS) flow is admitted if its meanrate can be accommodated in both the wirelesstotal capacity and VPN bandwidth share. On theother hand, for variable bit rate traffic (VBR,e.g., rtPS and nrtPS), a guaranteed rate (with spe-cific delay requirements) is extracted from thearrival process passing through a dual-tokenleaky bucket (DTLB) situated at the MAC bufferentrance. Consequently, a VBR flow is admittedif its guaranteed rate can be accommodated inthe network.

The proposed VPN-DBA is installed at theOLT, and each ONU-BS and mainly divideseach upstream/uplink cycle/frame into two sub-cycles. The first subcycle is used to allocate guar-anteed bandwidth for admitted EGS andreal-time traffic, whereas the second subcycle isused to allocate BE traffic per VPN. Moreover,in addition to the MAC requests, VPN-DBAtakes into consideration the physical layer (PHY)burst profile associated with each wireless linksuch that a statistical QoS guarantee is achieved[9]. However unlike in [9] where EGS was notsupported, if the uplink channel is overloadedand an emergency event occurs, a call preemp-tion mechanism is designed to borrow enoughbandwidth from the BE quota to serve the

BT R w

wk effVPON

N kk

k

K

min , .=× × ⎛

⎝⎜

⎠⎟=

=∑

β

8 11

where

Figure 5. One-way end-to-end average packet delay with and without our AC framework (90 percent confidence interval): a) EGS flow;b) UGS flow; c) rtPS flow; d) nrtPS flow.

Number of VPN users

End-to-end (SS to OLT) average packet delay

(a)

160

> 10 ms

> 100 ms

< 10 ms< 10 ms

> 1 s

Systemsaturation

Systemsaturation

Systemsaturation

Systemsaturation

0

0.005

0

Ave

rage

pac

ket

dela

y (s

)

0.01

0.015

0.02

0.025

0.03

0.035

0.04

0.045

0.05

176 192 208 224 240144128112968064483216

Number of VPN users

End-to-end (SS to OLT) average packet delay

(c)

160010-4

Ave

rage

pac

ket

dela

y (s

)

100

101

176 192 208 224 240144128112968064483216Number of VPN users

End-to-end (SS to OLT) average packet delay

(d)

160010-4

Ave

rage

pac

ket

dela

y (s

)

10-1

10-1

10-2

10-2

10-310-3

100

176 192 208 224 240144128112968064483216

Number of VPN users

End-to-end (SS to OLT) average packet delay

(b)

1600

0.005

0

Ave

rage

pac

ket

dela

y (s

)

0.01

0.015

0.02

0.025

0.03

0.035

0.04

0.045

0.05

176 192 208 224 240144128112968064483216

AC-FTRAC-MTRNO-AC-FTRNO-AC-MTR

AC-FTRAC-MTRNO-AC-FTRNO-AC-MTR

AC-FTRAC-MTRNO-AC-FTRNO-AC-MTR

AC-FTRAC-MTRNO-AC-FTRNO-AC-MTR

DHAINI LAYOUT 12/16/10 12:29 PM Page 140

incoming EGS flow(s). The borrowed bandwidthis then re-allocated back to BE traffic once allemergency flows are served and satisfied.

SIMULATION RESULTSIn our illustrative simulation example we set theWiMAX-VPON parameters as follows: numberof ONU-BSs N = 16, ∀k, αk = 0.1, β = 1, K =4, and RN =1 Gb/s. The WiMAX total band-width is equal to 20 MHz. Vk is randomly gener-ated for each connecting SS. Without loss ofgenerality, we assume that all MC systems (i.e.,VPNs) have equal weights (wk). We also consid-er various adaptive modulation and coding(AMC) modes for different SSs (i.e., binaryphase shift keying [BPSK], quaternary phaseshift keying [QPSK], and M-quadrature ampli-tude modulation [QAM]).

To stress test our framework, we assume thateach SS has five flows (i.e., EGS, UGS, rtPS,nrtPS, and BE). We inject each EGS flow at arate of 5 kb/s. Every UGS flow is generated witha guaranteed rate of 64 kb/s [9]. Each rtPS flow isgenerated at a guaranteed rate of 5 Mb/s (whichis the average bit rate of a DVD-quality video[9]), and each nrtPS flow is generated with aguaranteed rate of 500 kb/s [9]. Each self-similarBE flow is generated at a mean rate of 1 Mb/s.

The number of VPN users increments by ⎪N⎪with time and reflects the attempt to connect anew MC unit to each ONU-BS simultaneously.Our framework is evaluated vs. the MC QoSrequirements listed in Table 1. We consider twosimulation scenarios: fixed transmission rate(FTR), where all SSs have the same fixed transmis-sion rate, and multiple transmission rates (MTR),where a random AMC is selected for every SS.

Figures 5 and 6 show the end-to-end averagepacket delay for EGS and real-time flows of atagged SS, and the total per-VPN BE trafficthroughput, respectively. As noticed, althoughable to meet the QoS requirements for someservices (e.g., UGS and nrtPS), typical resourcemanagement schemes (with no AC) are unableto maintain the QoS requirements for all MCVPN services, especially after system saturation.

On the other hand, the application ofWiMAX-VPON (with AC) is able to maintainthe QoS requirements for all types of services (interms of delay and throughput). This proves theeffectiveness of our framework in maintainingnetwork stability as well as ensuring and protect-ing the QoS level for all types of traffic. Figure 6also shows how the bandwidth borrowing mecha-nism may affect the overall BE throughput. How-ever, in our simulations flows never leave thenetwork; therefore, by giving up some of itsbandwidth quota, the total V3 BE traffic witness-es permanent throughput degradation.

CONCLUSION AND FUTURE WORK

CONCLUSIONThis article presents MC-FiWiBAN, a new emer-gency-aware fiber-wireless (FiWi) access net-work that leverages layer 2 VPNs over theEPON-WiMAX integrated network to providestate-of-the-art mission-critical service support.MC-FiWiBAN extends MC coverage to rural

areas and improves PSDR communications byendorsing the emerging MC multimedia services.A QoS provisioning framework was also present-ed to address the resource management problemarising from the establishment of VPNs. Oursimulation results proved the effectiveness ofMC-FiWiBAN in guaranteeing the QoS require-ments for different types of services.

FUTURE WORKWhile the presented simulation results provedthe effectiveness of MC-FiWiBAN, real deploy-ment scenarios and experiments can be of greatadded value to further highlight the advantagesof MC-FiWiBAN. Such experiments need toconsider large cities and areas where TETRA-based and MC-FiWiBAN-based systems withdual-mode users are deployed. These users willthen be configured to intercommunicate throughthe proposed architecture. Consequently, mobili-ty management will emerge as a theme thatneeds to be handled in the new architecture. Notonly will seamless handoff techniques berequired, but scenarios where PSDR users roambetween TETRA and MC-FiWiBAN coveragezones will require special handover protocolsthat consider the physical layer heterogeneity ofboth networks. Furthermore, other VPN relatedissues such as VPN gateway design and configu-ration, as well as advanced VPN resource man-agement paradigms may also be addressed.

As a final note, the key advantages of MC-FiWiBAN are summarized as follows:• Robustness: By constructing layer 2 VPNs

and performing the proper error recoveryand resource management strategies, MC-FiWiBAN can be more robust than legacywired and wireless networks (e.g., tradition-al PONs, WiMAX, and WiFi) that also pos-sess limited reaching abilities.

• Centralized operation and management: MC-FiWiBAN not only provides high-speedmobile access in rural areas, but alsoenables centralized control over the net-work resources (bandwidth and channel) atthe OLT using its operation, administra-tion, and management (OAM) unit.

IEEE Communications Magazine • January 2011 141

Figure 6. Total per-VPN BE throughput.

VPN ID

Borrowed Bandwidth

α = 0.1 ⇒ BE quota ≈ 24.5 Mb/s

1

5

0

Tota

l BE

thro

ughp

ut (

Mb/

s)

10

15

20

25

30

35

2 3 4

No AC-MTRAC-MTRNo AC-FTRAC-FTR

DHAINI LAYOUT 12/16/10 12:29 PM Page 141

IEEE Communications Magazine • January 2011142

• VPN interoperability: By deploying layer 2VPNs, MC-FiWiBAN provides an integrat-ed VPN service suite that enables interop-erability between fixed and mobileplatforms.

• Scalability: The installation of WiMAX net-works in rural areas enables seamless sup-port of more users and services, such thatno modifications are required to the alreadyinstalled equipment and layer 2 protocols.

• Improved TETRA services: Due to theincreased bit rates of MC-FiWiBAN,TETRA (V+D) services’ limitations (e.g.,call setup delays) can be considerablyimproved. Furthermore, the emerging MCmultimedia applications can be supportedseamlessly.

ACKNOWLEDGMENTSThe authors would like to thank Prof. AbdallahShami (UWO, Canada) and Dr. James She(Cambridge, United Kingdom) for their insight-ful feedback on this work.

REFERENCES[1] ETSI EN 300 392-2 V2.5.2, “Terrestrial Trunked Radio

(TETRA); Voice plus Data (V+D); Part 2: Air Interface(AI),” May 2006.

[2] TETRA; http://www.tetramou.com/.[3] Project MESA; http://www.projectmesa.org.[4] MOTOA4;

http://business.motorola.com/MOTOA4/index.html.[5] G. Shen, R. S. Tucker, and C.-J. Chae, “Fixed Mobile

Convergence Architectures for Broadband Access: Inte-gration of EPON and WiMAX,” IEEE Commun. Mag.,vol. 45, no. 8, Aug. 2007, pp. 44–50.

[6] S. Sarkar, S. Dixit, and B. Mukherjee, “Hybrid Wireless-Optical Broadband-Access Network (WOBAN): A Reviewof Relevant Challenges,” IEEE/OSA J. Lightwave Tech.,vol. 25, no. 11, Nov. 2007, pp. 3329–40.

[7] J. She and P.-H. Ho, “Cooperative Coded Video Multicastfor IPTV Services under EPON-WiMAX Integration,” IEEECommun. Mag., vol. 46, no. 8, Aug. 2008, pp. 104–10.

[8] W. Luo et al., Layer-2 VPN Architecture, CISCO Press,2005.

[9] A. R. Dhaini, P.-H. Ho, and X. Jiang, “WiMAX-VPON: AFramework of Layer-2 VPNs for Next-Generation AccessNetworks,” IEEE/OSA J. Optical Commun. Net., vol. 2,no. 7, July 2010, pp. 400–14.

[10] A. K. Salkintzis, “Evolving Public Safety Communica-tion Systems by Integrating WLAN and TETRA Net-works,” IEEE Commun. Mag., vol. 44, no. 1, Jan. 2006,pp. 38–46.

[11] S. Sarkar et al., “A Novel Delay-Aware Routing Algo-rithm (DARA) for a Hybrid Wireless-Optical BroadbandAccess Network (WOBAN),” IEEE Network, vol. 22, no.3, May 2008, pp. 20–28.

[12] S. Spadaro et al., “Positioning of the RPR Standard inContemporary Operator Environments,” IEEE Network,vol. 18, no. 2, Mar. 2004, pp. 35–40.

[13] IEEE, “IEEE Standard for Local and Metropolitan AreaNetworks Part 16: Air Interface for Fixed BroadbandWireless Access Systems,” 2004.

[14] A. R. Dhaini, P.-H. Ho, and X. Jiang, “PerformanceAnalysis of QoS-Aware Layer-2 VPNs over Fiber-Wireless(FiWi) Networks,” Proc. IEEE GLOBECOM ‘10, Miami, FL,Dec. 2010.

BIOGRAPHIESAHMAD R. DHAINI ([email protected]) received hisB.Sc. in computer science from the American Universityof Beirut (AUB) in 2004, and his M.App.Sc. in electricaland computer engineering from Concordia University,Montreal, Canada, with a best thesis award nominationin 2006. He worked as a software consultant at TEKSys-tems, Montreal, in 2006–2007; and as a software design-er at Ericsson, Montreal, in 2007–2008. He is currentlyworking toward his Ph.D. degree in electrical and com-puter engineering at the University of Waterloo. Hisresearch interests focus on optical/wireless broadbandaccess networks.

PIN-HAN HO ([email protected]) received his Ph.D.degree from Queens University, Kingston, Ontario, Canada,in 2002. He is now an associate professor in the Depart-ment of Electrical and Computer Engineering, University ofWaterloo, Canada. His current research interests cover awide range of topics in broadband wired and wirelesscommunication networks, including survivable networkdesign, wireless metropolitan area networks such as IEEE802.16 networks, fiber-wireless network integration, andnetwork security.

While the presented

simulation results

proved the

effectiveness of

MC-FiWiBAN, real

deployment

scenarios and

experiments can be

of great added value

to further highlight

the advantages of

MC-FiWiBAN.

DHAINI LAYOUT 12/16/10 12:29 PM Page 142