Performance MOBILITY-SUPPORT ATM SWITCH

WIRELESS ATM SWITCHES 358 When a signaling message for the completion of the connection setup between the switch and the new base station which a mobile terminal is currently visiting arrives, the handoff controller updates the output port address in the output port address memory and the output VCI in the output VCI memory for the handoff connection. Since the signaling message has information about a new connection subpath for a mobile’s handoff, a COS can resume transmitting ATM cells of a handoff connection with a new allocated output port address and VCI. To resume transmission, the mobility controller accesses the HP memory through the old VCI to find the HOL cell Ž . of the handoff connection. If the HP is not null, its AT, A pair is inserted in a sequencer that is associated with the new output port address. This can resume transmitting cells of the handoff connection through the new output port.

12.5.2 Performance

In this subsection we present the performance of the mobility-support switch architecture described in the previous section. For performance study, it is assumed that cells from different VCs are multiplexed in bursts, and that the bursts are interleaved as they arrive at each input port of the switch. To quantify the traffic characteristics, the following traffic model is considered in which an arrival process to an input Ž . Ž . port alternates between on active and off idle periods. Figure 12.10 shows the traffic model used for simulations. During the on period, cells that originate from the same VC arrive at an input port continuously in consecutive cell time slots, and during the off period no cells are generated. Both the on and off periods are assumed to be geometrically w x w x distributed with average lengths E B and E I , respectively. Fig. 12.10 The simulated traffic model. MOBILITY-SUPPORT ATM SWITCH 359 Let us define p as the probability that an arriving cell is the last cell in a burst, and q as the probability that a new burst starts per time slot. Then the probability that the burst has i cells is iy1 w x P B s i s 1 y p p, i G 1, 12.1 Ž . Ž . and the probability that an idle period will last for j time slots is j w x P I s j s 1 y q q, j G 0, 12.2 Ž . Ž . where we assume that there is at least one cell in each burst and the duration w x w x of an idle period can be zero. The average lengths E B and E I are given by 1 1 y q w x w x E B s and E I s . 12.3 Ž . p q Given p and q, the offered load ␳ is equal to w x E B . 12.4 Ž . w x w x E B q E I In this simulation study, it is assumed that the switch size N is 16 and the Ž . total number of VCs is 512 32 VCs per input port . The initial route of each Ž . VC is shown in Table 12.1. Then the offered load ␳ of each input port i i TABLE 12.1 Initial Routing Table Input Output VC Port Address Port Address 1 1 1 2 1 2 . . . . . . . . . 16 1 16 17 1 1 18 1 2 . . . . . . . . . 32 1 16 33 2 1 34 2 2 . . . . . . . . . 512 16 16 WIRELESS ATM SWITCHES 360 Ž . and the offered load ␳ of each output port j are given by j 32 ␳ s ␳ , i s 1, 2, . . . , 16, 12.5 Ž . Ý i VC Ž iy1. =32qk ks1 and 16 ␳ s ␳ , j s 1, 2, . . . , 16, 12.6 Ž . Ý j VC jq16=k ks0 where ␳ and ␳ are the average load of VC and VC VC Ž iy1. =32qk Ž iy1. =32qk jq16=k the average load of VC , respectively. jq16=k For simplicity, a uniform source distribution is considered, in which any burst to each input port has an equal probability of being originated from any VC, and successive choices of VC are independent. Then the average load of each VC is the same and can be expressed as ␳ s ␳ , k s 1, 2, . . . , 512 12.7 Ž . VC VC k Ž . Ž . and ␳ in 12.5 and ␳ in 12.6 become i j ␳ s ␳ s ␳ s 32 ␳ . 12.8 Ž . i j VC Although it was assumed that the traffic loads to each output port are uniformly distributed, the uniform distribution is no longer valid when handoff is considered. Since handoff changes the route of the corresponding Ž . VC e.g., the output port address of the VC , the traffic load distribution to each output port is dynamically changed depending on the handoff rate. It is noted that this will affect the delay and cell loss performance of a mobility- support switch. Figure 12.11 shows the average cell delay as a function of input offered Ž . load ␳ in different situations. Here N and M are the switch size and the i total number of VCs, respectively. BL means the average burst length, which Ž . is given in 12.3 , and HR is the handoff rate, which is defined as the average number of handoffs that occur in a switch during a second. It is assumed that all VCs are mobile connections, and each VC has an equal probability of handoff. It is also assumed that each handoff is independent. As mentioned in Section 12.4, handoff requires buffering until a new connection subpath is established between a COS and the new base station that a mobile terminal is roaming to. It is assumed that this buffering time is 10 ms, allowing for the w x connection setup for several hops 36 . Thus, when handoff for a VC occurs, the cells of the VC are queued in the switch memory and transmitted through a different output port after 10 ms. In Figure 12.11, the case of 100rs handoff rate is compared with the case of no handoff. The 100rs handoff rate means that the handoff of each VC MOBILITY-SUPPORT ATM SWITCH 361 Fig. 12.11 Average delay as a function of offered load. occurs in every 5.12 s on the average, and the rate is sufficiently high to see the handoff effect of the worst case. As shown in Figure 12.11, the average cell delay of the handoff case is larger than that of the no-handoff case. This Ž . Ž . is so with both bursty BL s 15 and nonbursty BL s 1 traffic and is Ž . prominent with large input offered load ␳ . For example, for an input i offered load ␳ of 0.9 and burst length BL of 15, the handoff case’s average i Ž . delay 222.7 cell times is almost twice as large as that in the no-handoff case Ž . 116.2 cell times . There are two factors that increase the average delay in the handoff case. One is that due to handoffs of each VC, the offered loads to each output port are unbalanced, while the load distribution of each output port is assumed to be uniform for the no-handoff case. The other is that when handoff occurs, no incoming cells of the corresponding VC are served during the connection setup time of a new subpath. Figure 12.12 shows simulation results on cell loss probability vs. buffer size. In this experiment, the switch size, the number total of VCs, and the offered load to each input port are 16, 512, and 0.9, respectively. For uniform Ž . random traffic BL s 1 , the required buffer size is much smaller than that Ž . for bursty traffic BL s 15 , and the required buffer size in the handoff case is larger than that in the no-handoff case. This shows that a COS needs a large memory for buffering cells of each handoff VC, although it uses a shared memory. For example, for bursty traffic the required buffer size in the handoff case is about 7000 cells to maintain the cell loss probability at less than 10 y 6 . This is at least twice as large as in the no-handoff case Ž . about 3300 . WIRELESS ATM SWITCHES 362 Fig. 12.12 Cell loss probability as a function of buffer size. Simulation results show the impact of handoffs on the performance of the mobility-support switch architecture. It can be noticed that the average cell delay in the handoff case is almost two times larger than that in the no-handoff case when the traffic load is heavy and bursty and the handoff rate is high. It can be also noticed that the required memory size in the handoff case is double that in the no-handoff case for heavily loaded bursty traffic and high handoff rate. REFERENCES 1. D. Raychaudhuri and N. D. Wilson, ‘‘ATM-based transport architecture for multiservices wireless personal communication networks,’’ IEEE J. Select. Areas Commun., vol. 12, no. 8, pp. 1401᎐1414, Oct. 1994. 2. M. Umehira, M. Nakura, H. Sato, and A. Hashimoto, ‘‘ATM wireless access for mobile multimedia: concept and architecture,’’ IEEE Personal Commun., pp. 39᎐48, Oct. 1996. 3. D. Raychaudhuri, ‘‘Wireless ATM networks: architecture, system design and prototyping,’’ IEEE Personal Commun., pp. 42᎐49, Aug. 1996. 4. J. Porter and A. Hopper, ‘‘An overview of the ORL wireless ATM system,’’ Proc. IEEE ATM Workshop, Sept. 1995. 5. E. Hyden, J. Trotter, P. Krzyzanowski, M. Srivastava, and P. Agarwal, ‘‘SWAN: an indoor wireless ATM network,’’ Proc. ICUPC ’95, Tokyo, Japan, pp. 853᎐857, Nov. 1995. REFERENCES 363 6. M. J. Karol, K. Y. Eng, and M. Veeraraghavan, ‘‘BAHAMA: a broadband ad-hoc wireless ATM local area network,’’ Proc. IEEE ICC ’95, pp. 1216᎐1223, June 1995. 7. D. Raychaudhuri, L. Dellaverson, M. Umehira, J. Mikkonen, T. Phipps, C. Lind, and H. Suzuki, ‘‘Charter, scope and work plan for proposed wireless ATM working group,’’ ATM Forumr96-0530rPLEN, Apr. 1996. 8. R. R. Bhat and K. Rauhala, ‘‘Draft baseline text for wireless ATM capability set 1 specification,’’ ATM ForumrBTD-WATM-01.10, Dec. 1998. 9. R. R. Bhat and R. Gupta, ‘‘Requiremets document for wireless ATM,’’ ATM Forumr98-0395rWATM, Jul. 1998. 10. G. Bautz, H. Mitts, J. Mikkonen, M. Niemi, and K. Rauhala, ‘‘A proposal for access point control protocol,’’ ATM Forumr97-0507rWATM, July 1997. 11. D. Raychaudhuri, L. J. French, R. J. Siracusa, S. K. Biswas, R. Yuan, P. Narasimhan, and C. A. Johnston, ‘‘WATMnet: a prototype wireless ATM system for multimedia personal communication,’’ IEEE J. Select. Areas Commun., vol. 15, no. 1, pp. 83᎐95, Jan. 1997. 12. C. A. Johnston, P. Narasimhan, J. Kokudo, and M. Ohki, ‘‘Architecture and implementation of radio access protocols in wireless ATM networks,’’ IEEE ICC ’98, Atlanta, GA, Jun. 1998. 13. R. Yuan, S. Biswas, and D. Raychaudhuri, ‘‘A signaling and control architecture for mobility support in wireless ATM networks,’’ Proc. IEEE ICC ’96, pp. 478᎐484, Dallas, 1996. 14. P. Narasimhan, S. K. Biswas, C. A. Johnston, R. J. Siracusa, and H. Kim, ‘‘Design and performance of radio access protocols in WATMnet, a prototype wireless ATM network,’’ Proc. ICUPC ’97, San Diego, CA, Oct. 1997. 15. S. K. Biswas, H. Kim, P. Narasimhan, R. J. Siracusa, and C. A. Johnston, ‘‘Design and implementation of data link control protocol for CBR traffic in wireless ATM networks,’’ Proc. ICUPC ’98, Florence, Italy, Oct. 1998. 16. ORL Radio ATM project. http:rrwww.orl.co.ukrradior 17. A. Acampora and M. Naghshineh, ‘‘An architecture and methodology for mobile-executed handoff in cellular ATM networks,’’ IEEE J. Select. Areas Commun., vol. 12, no. 8, pp. 1365᎐1375, Oct. 1994. 18. M. J. Karol, Z. Liu, and K. Y. Eng, ‘‘Distributed-queuing request update multiple Ž . Ž . access DQRUMA for wireless packet ATM networks,’’ Proc. IEEE ICC ’95, pp. 1224᎐1231, Jun. 1995. 19. The Magic WAND wireless ATM demonstrator. http:rrwww.tik.ee.ethz.chr; wand 20. The MEDIAN project. http:rrwww.imst.dermedianrmedian.html 21. The SAMBA project. http:rrhostria.cet.ptrsambarindex.hml Ž . 22. European Telecommunications Standards Institute ETSI project on Broadband Ž . Radio Access Network BRAN . http:rrwww.etsi.orgrbran 23. D. Petras et al., ‘‘Wireless ATM: performance evaluation of a DSAqqMAC protocol with fast collision resolution by a probing algorithm,’’ Int. J. Wireless Inf. Networks, vol. 4, no. 4, 1997. 24. F. Bauchot et al., ‘‘MASCARA: a MAC protocol for wireless ATM,’’ ACTS Mobile Summit, Granada, Spain, Nov. 1996. WIRELESS ATM SWITCHES 364 25. P. Narasimhan et al., ‘‘Proposal for radio transport convergence, medium access control, and logical link control layers for wireless ATM,’’ ETSI BRAN 噛4, London, Sep. 1997. 26. H. Hashemi, ‘‘The indoor radio propagation channel,’’ Proc. IEEE, vol. 81, no. 7, pp. 943᎐968, Jul. 1993. 27. C. -K. Toh, ‘‘Crossover switch discovery for wireless ATM LANs,’’ ACM J. Mobile Networks Appl., vol. 1, no. 2, pp. 145᎐165, Oct. 1996. 28. B. Rajagopalan, ‘‘Mobility management in integrated wireless-ATM networks,’’ Proc. 1st Int. Conf. on Mobile Computing and Networking, Berkeley, CA, Nov. 1995. 29. A. Acharya, J. Li, B. Rajagopalan, and D. Raychaudhuri, ‘‘Mobility management in wireless ATM networks,’’ IEEE Commun. Mag., vol. 35, no. 11, pp. 100᎐109, Nov. 1997. 30. J. H. Condon et al., ‘‘Rednet: a wireless ATM local area network using infrared links,’’ Proc. of 1st Int. Conf. on Mobile Computing and Networking, pp. 151᎐159, Berkeley, CA, Nov. 1995. 31. B. A. Akyol and D. C. Cox, ‘‘Rerouting for handoff in a wireless ATM network,’’ IEEE Personal Commun., pp. 26᎐33, Oct. 1996. 32. C.-K. Toh and B. Akyol, ‘‘A survey of handover techniques in wireless ATM networks,’’ Int. Wireless Inf. Networks J., vol. 5, no. 1, 1998. 33. H. Kim and H. J. Chao, ‘‘Design of a mobility-support ATM switch,’’ Proc. Globecom’98, Sydney, Australia, Nov. 1998. 34. H. J. Chao and N. Uzun, ‘‘A VLSI sequencer chip for ATM traffic shaper and queue manager,’’ IEEE J. Solid-State Circuits, vol. 9, no. 7, pp. 1634᎐1643, Nov. 1992. 35. H. J. Chao, H. Cheng, Y. R. Jeng, and D. Jeong, ‘‘Design of a generalized priority queue manager for ATM switches,’’ IEEE J. Select. Areas Commun., vol. 15, no. 5, pp. 867᎐880, Jun. 1997. 36. S. K. Biswas, ‘‘Handling realtime traffic in mobile networks,’’ Ph.D. Thesis, University of Cambridge Computer Laboratory, Sep. 1994. H. Jonathan Chao, Cheuk H. Lam, Eiji Oki Copyright 䊚 2001 John Wiley Sons, Inc. Ž . Ž . ISBNs: 0-471-00454-5 Hardback ; 0-471-22440-5 Electronic CHAPTER 13 IP ROUTE LOOKUPS The emergence of new multimedia networking applications and the growth of the Internet due to the exponentially increasing number of users, hosts, and domains have led to a situation where network capacity is becoming a scarce resource. In order to maintain the good service, three key factors have been considered in designing IP networks: large-bandwidth links, high router data w x throughput, and high packet forwarding rates 16 . With the advent of fiber optics, which provides fast links, and the current switching technology, which is applied for moving packets from the input interface of a router to the corresponding output interface at gigabit speeds, the first two factors can be readily handled. Therefore, the key to the success of the next generation IP networks is the deployment of high-performance routers to forward the packets at the high speeds. There are many tasks to be performed in packet forwarding; packet Ž . header encapsulation and decapsulation, updating a time-to-live TTL field in each packet header, classifying the packets into queues for specific service classes, etc. The major task, which seems to dominate the processing time of the incoming packet, is searching for the next-hop information of the appro- priate prefix matching the destination address from a routing table. This is also called an IP route lookup. As the Internet has evolved and grown over in recent years, it has been proved that the IP address space, which is divided into classes A, B, and C, is inflexible and wasteful. Class C, with a maximum of 254 host addresses, is too small, while class B, which allows up to 65,534 addresses, is too large for most organizations. The lack of a network class of a size that is appropriate for mid-sized organization results in exhaustion of the class B network address 365 IP ROUTE LOOKUPS 366 space. In order to use the address space efficiently, bundles of class C addresses were given out instead of class B addresses. This also causes massive growth of routing table entries. To reduce the number of routing table entries, classless interdomain routing Ž . w x CIDR 4 was introduced to allow for arbitrary aggregation of networks. A network that has identical routing information for all subnets except a single one requires only two entries in the routing table: one for the specific Ž . subnet which has preference if it is matched and the other for the remain- ing subnets. This decreases the size of the routing table and results in better usage of the available address space. On the other hand, an efficient mechanism to do IP route lookups is required. In the CIDR approach, a routing table consists of a set of IP routes. Each ² : IP route is represented by a route prefixrprefix length pair. The prefix length indicates the number of significant bits in the route prefix. Search- ing is done in a longest-matching manner. For example, a routing table ² : ² : ² : may have the prefix routes 12.0.54.8r32 , 12.0.54.0r24 , and 12.0.0.0r16 . ² : If a packet has the destination address 12.0.54.2 , the second prefix route is matched, and its next hop is retrieved and used for forwarding the packet. This chapter is organized as follows: Starting from Section 13.1, the architectures of generic routers are described and the design criteria that should be considered for IP lookups is discussed. Recently, there have been a number of techniques proposed to provide fast IP lookups w x 2, 3, 5, 6, 9, 12, 14, 15, 16 . From Section 13.2 to Section 13.9 we will look at several IP route-lookup schemes proposed over the past few years.

13.1 IP ROUTER DESIGN