Cross-layer analysis of protocol delay in mobile devices receiving BCMCS
- 315 Downloads
Broadcast and multicast services allow the high-speed delivery of multimedia content to multiple subscribers over CDMA2000 wireless networks. This relies on a high-rate broadcast packet data system with an air interface governed by two interacting protocols: the medium access control (MAC) protocol specifies the methods of multiplexing and of forward error correction used to reduce the radio link error-rate seen by the higher layers; and the security protocol specifies the procedures used to encrypt and decrypt content, following the Advanced Encryption Standard. We investigated the mutual effect of these protocols, in the context of an ARM9-based mobile platform, and their influence on delay. This allowed us to propose a novel analytic model that can predict the total delay by summing the separate but related delays incurred by implementations of the MAC and security protocols with particular parameters. This cross-layer model includes the characteristics of error control in the MAC layer and the varying condition of the fading channel in the physical layer. We can use this model to estimate the size of data buffers that mobiles require to provide a seamless multimedia service.
KeywordsAdvanced encryption standard Cross-layer timing analysis Mobile devices Broadcast and multicast services
This research was supported by Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Education, Science and Technology (2012R1A1A1001835).
- 3.Broadcast-Multicast Service Security Framework (2003). 3GPP2 Std. S.R0083 Rev. 1.0.Google Scholar
- 4.Enhanced Cryptographic Algorithms (2005) 3GPP2 Std. S.S0055 Rev. 2.0.Google Scholar
- 6.Daemen, J., & Rijmen, V. (2000). The block cipher Rijndael, lecture notes in computer science 1820, 277–284.Google Scholar
- 9.Chen, T., Wei, Y., Tiedemann, E. G., Sinnarajah, R., & Wang, J. (2002). A high-rate broadcast channel design for CDMA2000. In Proceedings of IEEE GLOBECOM 1, 605–609.Google Scholar
- 17.Provvedi, L., Rattray, C., Hofmann, J., & Parolari, S. (2004). Provision of MBMS over the GERAN: Technical solutions and performance. In Proceedings of IEE international conference on 3G mobile communication technologies, pp. 494–498.Google Scholar
- 18.Jenkac, H., Liebl, G., Stockhammer, T., & Xu, W. (2004) Flexible outer Reed–Solomon coding on RLC layer for MBMS over GERAN. In Proceedings of IEEE vehicular technology conference 5, pp. 2777–2781.Google Scholar
- 20.Kang, K., Kim, C., Noh, D. K. & Ryu, J. (2008). Modeling the execution time of Reed-Solomon decoding on an ARM9-based mobile platform. In Proceedings of ICCCN.Google Scholar
- 21.Kang, K., & Noh, D. K. (2009). Stochastic timing analysis of the AES cipher algorithm over a correlated fading channel. In Proceedings of ICCCN.Google Scholar
- 25.Bertoni, G., Breveglieri, L., Fragneto, P., Macchetti, M., & Marchesin, S. (2002). Efficient software implementation of AES on 32-bit olatforms, Lecture Notes in Computer Science 2523, 159–171.Google Scholar
- 26.Code for AES, http://www.gladman.me.uk.
- 27.IAR Embedded Workbench for ARM, http://www.iar.com.
- 28.Proakis, J. G., & Salehi, M. (2008). Digital communications. New York: McGraw-Hill.Google Scholar
- 31.Coded Modulation Library, http://www.iterativesolutions.com.