ATIS Committee NIPP-NAI Working Group NAI (DSL Access) Vancouver, Canada: November 12, 2007

NIPP-NAI-2007-160

CONTRIBUTION

TITLE:

Higher-Rate Level 2 DSM Power-Saving Examples

SOURCE: W. Lee S. Jagannathan J. Cioffi G. Ginis P. Silverman

PROJECT:

Stanford

+1-650-723-2150

[email protected]

ASSIA

+1-650-654-3400

[email protected]

T1E1.4, DSM, Information only _______________________________ ABSTRACT

This contribution responds to requests for additional examples to illustrate the gains in contributions [1], and [2] from the September 2007 NIPP-NAI meeting. In particular, a method for computing and passing a cut-off frequency for band preference is used and applied to more general channels than a simple near/far (short/long) situation. Further, the gains for better level-1 and level-2 [2] use of margins is described for a more general set of line conditions. This contribution is for information only. . _______________________________

NOTICE

This contribution has been prepared to assist Accredited Standards Committee T1 – Telecommunications. This document is offered to the Committee as a basis for discussion and is not a binding proposal on the authors or any of their companies. The requirements are subject to change in form and numerical value after more study. The authors specifically reserve the right to add to, amend, or withdraw the statements contained herein.



CONTACT: J.M. Cioffi, [email protected], Tel: +1-650-723-2150 ; Fax: +1-650-724-3652

1

NIPP-NAI-2007-160

Higher-Rate Level 2 DSM Power-Saving Examples (160) W. Lee, S. Jagannathan, and J. Cioffi G. Ginis and P. Silverman Dept of EE, Stanford University 363 Packard EE, Stanford, CA 94305-9515 [email protected], P: +1-650-723-2150 ; Fax: +1-650-724-3652

ASSIA Inc. 203 Redwood Shores Parkway , Suite 250 Redwood City, CA 94065-1198 [email protected] , +1-650-654-3400 , Fax: +1-650-654-3404

ABSTRACT This contribution responds to requests for additional examples to illustrate the gains in contributions [1], and [2] from the September 2007 NIPP-NAI meeting. In particular, a method for computing and passing a cut-off frequency for band preference is used and applied to more general channels than a simple near/far (short/long) situation. Further, the gains for better level-1 and level-2 [2] use of margins is described for a more general set of line conditions. This contribution

is for information only 1. 2.

Introduction........................................................................................................................................... 1 Examples of weak/strong algorithms .................................................................................................... 2 2.1 Data rate region for upstream 10 users ......................................................................................... 2 Table 2.1 – VDSL system parameters................................................................................................... 4 2.2 Power reduction examples ............................................................................................................ 6 2.3 Reversion to weak algorithm from strong algorithm .................................................................... 8 3. References............................................................................................................................................. 8

1. Introduction Distributed Band Preference (DBP) [1] achieves near-optimal Level 2 DSM performance with very little computational/control burden. An SMC with DBP capability classifies lines as either weak or strong lines depending on the relative difficulty or ease that they may achieve the desired customer data rate. Strong users execute an alternative polite loading algorithm, while weak users execute the usual “greedy” loading algorithm. A cut-off frequency can aid the strong algorithm. Tones below the cut-off become donor tones to tones above the cut-off. This contribution provides additional detailed examples of weak/strong algorithm use, and compares with other Level 1 spectrum management methods such as USPBO and IWF. Also, methods for computing and passing the cut-off frequency are discussed, which provide alternative methods to determine the cut-off frequency than the distributed, local solution described in [1].

2

NIPP-NAI-2007-160

Single-bit control (weak/strong) is the main advantage of distributed band preference. That is, there is no central swapping, leaving the essential bit-swapping methods to react to the dynamic DSL binder environment. A cut-off frequency can also be useful and may be recommended elsewhere Error! Reference source not found.. Otherwise, DSL modem autonomous operation is retained. The SMC can compute and supply (as a new Level 2 DSM control parameter) the cut-off frequency to any strong user, and this cut-off will help the modem to achieve additional gain. The cut-off frequency can be introduced to attain significant reduction in power consumption, thus satisfying a recent goal of the second DSM Report, and more generally recent DSL standardization. Section 2 also shows the increasing rate/reach effect of using true margins for the same situations as DBP.

2. Examples of weak/strong algorithms This section provides additional examples of weak/strong algorithms to those in [1]. The strong algorithm initially runs a water-filling algorithm like the weak algorithm. Subsequently, the strong algorithm moves bits from the below-cut-off tones to the above-cut-off tones to reduce crosstalk into the weak lines assuming that the common tones to both lines are typically at lower frequencies. Since long lines can load bits only on lower-frequency tones, this bit-moving process of short lines will be greatly beneficial to long lines through reduced crosstalk. However, this bit-moving process requires the definition of cut-off frequency where good tones and bad tones are divided. One local solution is to divide the frequency region into bands randomly and compare the average SNR of each band to determine the good and bad tones. During the process, the water-level of each band is maintained flat. Another solution is to allow the SMC to send the cut-off frequencies infrequently (that is through hand-shake to be used upon initialization or re-initialization). Since the SMC has enough information about the lines, it can compute the cut-off frequencies and distribute them to its subtended (controlled) DSL modems. Any solutions from other spectrum balancing methods can be good candidates for these cut-off frequencies because the results from spectrum balancing methods are usually well-approximated by several flat bands. For examples of such methods, see the DSM Report issue 1 [3].

2.1 Data rate region for upstream 10 users Figure 1 shows the line lengths for 10 upstream DSLs. This example will use DSM Level 2 control in the upstream. The Level 2 SMC has all information about these lines including channel gains, crosstalk insertion loss transfers (Xlog), measured noises or SNRs, and rate targets. With this information, the SMC will determine those lines upon which to request the use of the strong algorithm by setting a Level 2 DSM control bit to 1, and which lines will use the weak algorithm (default or setting the same Level 2 DSM control bit set to 0). In this example, the SMC selects lines 1 to 5 for use of the strong algorithm, and lines 6 to 10 for the weak algorithm. Since it is hard to visualize a 10-dimensional rate region, Figure 10

2 plots a 2-dimensional rate region of R1 versus

∑R i =6

i

, where Ri is the data-rate of line i , by fixing other

users rates to [10 8 6 5] Mbps respectively (lines 2 to 5). The DSLs running the weak algorithm will maximize their rates under the VDSL upstream power constraint of 14.5 dBm at 6 dB of margin, and line 1 sweeps its data rate from 0 to 36 Mbps to see its effect on the long lines’ rate-sum. As line 1 increases its data rate, the other strong lines also change their power and bit allocations to satisfy their fixed ratetargets. Therefore, the weak lines see increased interference as line 1 increases its data rate. However, as seen in Figure 2, line 1 loads in a polite way to minimize the interference to weak lines. As the rate-target

3

NIPP-NAI-2007-160 10

increases, line 1’s power inevitably affects other lines, and consequently

∑R i =6

i

decreases as in Figure 2.

For the virtual noise simulations, the worst-case interference is first computed by assuming that all other users transmit at the maximum PSD level over all tones. So, in this example, the maximum virtual noise of each user is obtained by summing up 9 other users’ signals as follows:

VN where

VNiMAX (n)

user j to user i, and

MAX i

( n) =

10



j =1, j ≠ i

H i , j (n) PjMASK (n)

is the virtual noise of user i at tone n,

PjMASK (n)

H i , j ( n)

,

is the crosstalk channel gain from

is the maximum PSD level at tone n for user j. The other choice for the

virtual noise is to set as the interference from the strongest crosstalker as follows:

VNi (n) = max H i , j (n) PjMASK (n) . j ≠i

For both choices of virtual noise, as seen in Figure 2, achievable rate regions are significantly reduced by introducing virtual noise because all users use unnecessarily high power and strongly interfere with other users.

Figure 1 – DSL length distribution for Level 2 DSM Example.

4 Parameter Tone Width Number of Tones Maximum Upstream Power Coding Gain Target Margin Gap Band-plan Bit-cap

NIPP-NAI-2007-160 Value 4.3125 kHz 4096 14.5 dBmW 3 dB 6 dB 9.8 dB VDSL 2, 17MHz 15

Table 2.1 – VDSL system parameters.

Figure 2(a),(b) – Rate regions for DBPSM, IWF, IWF(UPBO), IWF(VN)

5

NIPP-NAI-2007-160

When true margins (noise margins from [2]) are used, a further rate-region enhancement can be obtained. True margins can be translated into equivalent SINR margins so no change to existing DSL modem practice is necessary as already standardized. The SMC can internally effect these translations and thus can instruct different lines to have different margins, rather than to have a practice of a uniform margin (say 6 dB target margin and 16 dB maximum margin) on all lines. Figures 3 and 4, respectively, show the rate region improvements for IWF and DBP by using a 6 dB true margin.

Figure 3– Rate regions enlargement by using 6 dB true margin for IWF (10 users)

6

NIPP-NAI-2007-160

Figure 4– Rate regions enlargement by using 6 dB true margin for DBPSM (10 users)

2.2 Power reduction examples The previous section shows the enlargement of achievable regions by using Level 2 DSM. Another main benefit of Level 2 DSM is power reduction. The larger rate region means that inner points can be achieved by using less power, and therefore, Level 2 DSM can save power compared to other methods. Figure 5(a) shows the power required per line for achieving point (A) of Figure 2 assuming that the virtual noise is set as the worst-case interference. Figure 5(b) also shows the power to achieve the same point (A) of Figure 2 assuming that the virtual noise is set as the interference from the strongest crosstalker. In this simulation, the probability of being on-state is defined as the probability of being active. Then, there can be 1024 possible line configurations, and the probability of each configuration is computed assuming the independence of activity. For example, the probability of having L(i)= [1 1 0 1 1 1 1 1 0 0] (user 3,9,10 are off) is

p(i ) = p 7 (1 − p)3 , where p is the probability of being active. By running simulations for all possible configurations and multiplying the required power with these probabilities, average power of active lines to achieve the rate point (A) can be obtained as follows. 1024

Pavg = ∑ p(i)Power (i ) , i =1

where Power(i) refers to the required power for ith line configuration.

7

NIPP-NAI-2007-160

Figure 5(a),(b) – Power reduction with Level 2 for point (A) of Figure 2

Figure 6 – Power reduction with Level 2 for point (B) of Figure 2

8

NIPP-NAI-2007-160

Figure 6 shows the power to achieve the higher data rate point (B) of Figure 2 than (A). In this case IWF with VN is not plotted because the point is not achievable. Depending on which line is to be operated in L2 mode, the SMC can decide to turn MC on/off …

2.3 Reversion to weak algorithm from strong algorithm If the DSL dynamics are severe and were not predicted correctly by the SMC (perhaps a poor or dysfunctional SMC), then a DSL modem should then (and only then) revert to the weak algorithm. If the strong algorithm can be maintained with the required target/minimum margin at the desired strong-user data rate, then it should be used. During SHOWTIME, the bit-swapping mechanism will allow the user running the strong algorithm to return to the water-filling PSD if the noise is very severe. In this case, it is not the SMC’s mistake but the actual noise variation that necessitates such a change. By responding properly to such a noise change, the DBP method allows achieving near-optimal performance unlike VN. The DBP method is better than IWF, or other existing methods such as VN or UPBO. If there is local-loop unbundling (LLU) present, each service provider may optionally select to use Level 2 DSM and will not know the lengths of other service provider’s users. That other service provider’s user crosstalk is background noise in aggregately sensed and reported by the service provider’s own DSLs, and thus used by the SMC. Each SMC makes its best decision based on the knowledge of only its own lines and the noise measured by its own lines. This SMC has the responsibility for predicting the dynamics of the binder and thereby ensuring acceptably low probability of outage.

3. References [1] J.Cioffi, W. Lee, S. Jagannathan, and G. Ginis, “The Inherent Simplicity of Distributed Band Preference,” ATIS Contribution NIPP-NAI 2007-129R2,Miami, FL, September 24, 2007. [2] S. Jagannathan, C. S. Hwang, and J.Cioffi, “Margin Optimization in DSM Levels 1 and 2,” ATIS Contribution NIPP-NAI 2007-135R1,Miami, FL, September 24, 2007. [3] P. Silverman, G. Ginis, J. M. Cioffi, An Indicator for ‘Weak vs Strong’ and ‘Frequency Cutoff’ for DSM Level 2, ATIS Contribution, number unknown, Vancouver BC Canada, November 2007. [4] Dynamic Spectrum Management Technical Report, “ATIS Committee NIPP Pre-published document ATIS-PP-0600007,” May 2007.

ATIS Committee NIPP-NAI This contribution responds ...

Sep 24, 2007 - This contribution has been prepared to assist Accredited Standards Committee T1–Telecommunications. This document ... of their companies.

154KB Sizes 0 Downloads 131 Views

Recommend Documents

ATIS Committee NIPP-NAI This contribution ...
As an example, the following simulations for VDSL2 show the benefit of reduced power in vectored systems for a given data rate and SNR margin requirement, ...

ATIS Committee NIPP-NAI This contribution provides ...
Nov 12, 2007 - ... to assist Accredited Standards Committee T1–Telecommunications. .... Figure 2 – Illustration of Upstream VDSL VN's loss of data rate by a ...

ATIS Committee NIPP-NAI This contribution explains ...
suggesting that unused lines have good value to any service provider in the .... set of data rates, binder situation, and uncontrolled “out-of-domain” noise. 3.

ATIS Committee NIPP-NAI This new contribution ...
This contribution has been prepared to assist Accredited Standards Committee T1–Telecommunications. This document is offered to the ... of their companies.

ATIS Committee NIPP-NAI This contribution explores ...
Full Binder Level 3 DSM Capacity and Vectored DSL Reinforcement ... upstream signals within those DSLs controlled by any single service provider ..... Level 3 DSM or ``vectoring'' enables the highest speeds known for DSLs and can apply to ...

ATIS Committee NIPP-NAI
upstream out-of-domain interference can be canceled and significantly higher data rates can be .... Simultaneously, the best decoding order of the users, which is ... Such weighting is a function of the desire of a service provider to trade power.

ATIS Committee NIPP-NAI
Vancouver, Canada: November 12, 2007. CONTRIBUTION ..... service provider. Such weighting is a function of the desire of a service provider to trade power.

ATIS Committee NIPP-NAI Level 2 Dynamic Spectrum ...
possibly facilitating service-provider actions for further DSL access-network ..... P. Spruyt, “Decreasing the OpEz of Remote DSL,” IEC Broadband World Forum, ...

Period Contribution
Page 1. Zurich (16.2). Samara (11.7). Minsk (12.9). Boston (18). Muscat (9.9). St. Gallen (16.7). Copenhagen (17.7). Nottingham (15). Dniprop. (10.9). Riyadh (6.9). Istanbul (7.1). Chengdu (13.9). Seoul (14.7). Bonn (14.5). Athens (5.7). Melbourne (1

Laura Schaefer's contribution to this work, based on her ...
Apr 7, 2008 - Approximately 300 invited participants from academia, business and government from the US and .... the workshop web site, and e-mails to several thousand ..... of discovery while supporting high-risk ideas and novel col-.

DMV Responds to Registration Issues & DOC Closes Niantic Facility ...
Jan 8, 2016 - action plan, and the DOC closed another correctional facility on the ... on Facebook, follow the network at www.twitter.com/CTNetworkTV or visit ...

DMV Responds to Registration Issues & DOC Closes Niantic Facility ...
Jan 8, 2016 - DMV Responds to Registration Issues & DOC Closes Niantic Facility ... action plan for a major computer glitch that has been affecting motorists ...

Committee - GitHub
OXFORD GLOBAL. EDUCATION. DEVELOPMENT ... A. Development and implementation of new technology against climate change. B. The development of an ...

introduction objectives of study contribution ... -
CONCEPT OF BUSINESS INTELLIGENCE. The use of Business Intelligence in every business function is growing. As the volume of transactional data goes up, ...

The Contribution of Jacques Derrida
administration and management from the earliest historic times as Goody. (1977) points ...... "Maximize profits" or the legislators say, "Eliminate dangerous health hazards", it does so. .... The new elite of clerks and masters produces 'a vast new .

letter - House Judiciary Committee
Jun 27, 2017 - that "after more than a year of studying the matter, it has become clear that ... Surveillance Act. In the ordinary course of business, we would be ...

Host Committee
Front L-R : Pros. Venchito Bangayan, City Pros. Ediberto Jamora, Pros. Jose Blanza, Jr. Back L-R : Pros. Jose Jerry Fulgar, Pros. Rebecca Dardo-Seredrica ...

Relational Political Contribution under Common ...
Abreu (1988) calls σ(i) the “optimal penal code” (OPC) and the existence can be shown.14). Now consider the following “simple strategy” profile σSS (ˆσ, σ(0) ...

2017 BTS contribution form.pdf
100% of your tax-deductible donation goes directly to our school and to our students. ... To encourage friendly rivalry, the grade level with the highest percentage of ... companies have programs to match charitable giving; please check with ...

Visualisations for longitudinal participation, contribution
School of Information Technologies, University of Sydney, Sydney, NSW ... aim to give teachers insights into longitudinal participation of each group member, an .... a pair of radars: the radar of verbal participation (top of Figure 2, blue shaded.

Contribution of lslamic Thought to
protection of consumers, workers, merchants, and financiers. Ijtihad. (opinion) was used to .... andZaidi paper. They affirm using the supply of credit and money,.