A Model for the Loss of Hello-Messages in a

advertisement
A Model for the Loss of Hello-Messages in a
Wireless Mesh Network
Geir Egeland
Department of Electrical and Computer Engineering
University of Stavanger, Norway
Email:geir.egeland@gmail.com
Abstract—The links in an ad hoc or wireless mesh network are
normally kept alive by the exchange of Hello-messages between
neighbouring nodes. These Hello-messages are prone to collisions
with traffic from hidden nodes. If several Hello-messages are lost
due to overlapping transmissions, the node expecting the Hellomessages erroneously assumes that the link is down. This is called
an apparent link-failure. This paper provides an analytical model
for the loss of Hello-messages in a mesh network. Knowing the
probability of losing a Hello-message, the probability of apparent
link-failures can easily be found, which can further be used in
reliability analysis of wireless mesh networks.
I. I NTRODUCTION
The performance of an ad hoc network, such as a wireless mesh network, depends strongly on the routing protocol’s ability to preserve links between neighbouring nodes.
A common method is to establish and maintain the links
proactively by the use of one-hop Hello-messages, which are
exchanged between neighbouring nodes. Regardless of the use
of link maintenance schemes, link-failures will be present in
ad hoc networks. Some link-failures are unavoidable, such
as when a wireless node deliberately leaves a network or
is subject to a power failure. Also, a link will cease to be
operative when two nodes move out of each others radio
transmission range. In addition to these, a set of link-failures
which are referred to as apparent link-failures exist. They
are primarily caused by loss of Hello-messages as a result
of overlapping transmissions from hidden nodes [1]. The
performance degradation can be significant in wireless mesh
networks, and a model for apparent link-failures is needed in
order to find ways to prevent them and improve the network
reliability. This is the main motivation of this paper, where an
analytical model for loss of Hello-messages is presented.
Hello-messages are broadcasted in order to conserve network resources. Thus, every link on which a Hello-message
is received effectively obtains maintenance from only one
message. Broadcast packets are not acknowledged, and Hellomessages are therefore inherently unreliable. A node anticipates to receive a Hello-message from a neighbour node within
a given time interval and can accept that messages occasionally
will be missing due to various error conditions. However,
if a node fails to receive a number (r + 1) of consecutive
Hello-messages, it will assume that the node on the other side
of the link is permanently unavailable and that the link is
Paal E. Engelstad
University of Oslo, Simula and
Telenor GBD&R, Norway
Email:paal.engelstad@telenor.com
inoperable. The value of the configurable parameter r is a
tradeoff between providing the routing protocol with stable and
reliability links (a large r), and the ability to detect link failures
in a timely and fast manner (a small r). Since Hello-messages
are broadcasted, they are unable to take advantage of the
Request-To-Send/Clear-To-Send (RTS/CTS) signalling, which
adds protection against hidden nodes for the IEEE 802.11
MAC protocol’s [2] unicast data transmissions. Although some
Hello-message loss is avoided using RTS/CTS, it will only
help the links of the node that issues the CTS. The result is
that the Hello-messages will be susceptible to collisions with
traffic from hidden nodes even if RTS/CTS is enabled. Thus,
the utilisation of a link may be prevented since the link can be
marked as inoperable due to Hello-message loss. An example
of a routing protocol that makes use of Hello-messages is the
proactive protocol Optimized Link State Routing (OLSR) [3].
Reactive routing protocols can also maintain links proactively
using Hello-messages. Indeed, this is an optional mode of
operation for the reactive Ad hoc On-Demand Distance Vector
(AODV) routing protocol [4].
Not much published work relates directly to modelling of
the loss of Hello-messages in wireless mesh networks. In [5]
the performance of neighbour sensing in ad hoc networks
is studied, but only parameters such as the transmission
frequency of the Hello-messages and the link-layer feedback
are covered. In [6] a model for packet collision and the
effect of hidden and masked nodes are studied, but only for
simple topologies, and the work is not directly applicable
to the Hello-message problem. The work in [7] addresses
link-failures in wireless ad hoc networks through the effect
of routing instability. Here the authors study the throughput
of TCP/UDP in networks where the routing protocol falsely
assumes a link is inoperable. However, what causes a link to
become unavailable to the routing protocol is not studied.
The main contribution of this paper is an analytical model
for the probability of losing Hello-messages caused by overlapping transmissions from hidden nodes. The model provides
upper and lower bounds and can serve as input to link
reliability analysis. The validity of the model is supported
by simulations. Further, two example topologies are studied
where we show that the probability of losing Hello-messages
caused by overlapping transmissions can be significant. For
simplicity, we refer to these Hello-messages as beacons in
the analysis. From the model, we find the probability (perror )
that one such beacon is lost as a result of a packet collision,
notably a collision with a transmission from hidden nodes.
The probability that a receiving node considers a link to be
inoperative at the time a beacon is expected, can then typically
be found as pr+1
error .
The rest of the paper is organised as follows: Section II
presents the network and the analytical model. This section
also verifies the analytical model. The model is then compared
with simulation results from the ns-2 network simulator [8] in
section III, where the beacon loss in arbitrary mesh topologies
also is analysed. Finally, conclusions are drawn in section IV.
II. A M ODEL FOR B EACON L OSS P ROBABILITY
A. Assumptions and example topologies
In order to simplify the analysis, the model is based on a
set of assumptions. First, it is assumed that a beacon sent by
a node has a negligible probability of colliding with a beacon
from any of the neighbouring nodes. This is a fair assumption,
since beacons are short packets that are transmitted periodically and at a random instant at a relatively low rate. Second,
it is assumed that the probability that the beacon collides with
a data transmission from any of the (non-hidden) neighbouring
nodes also is negligible. This is a relatively fair assumption,
since a MAC layer often has mechanisms that reduce such
collisions to a minimum. Examples of such mechanisms are
the collision avoidance scheme of the IEEE 802.11 MAC
protocol, with randomised access to the channel after a busy
period, and the carrier- and virtual sense of the physical layer.
Thus, the probability that beacons are lost, is the result of
overlapping data packet transmissions from hidden nodes only.
The two example topologies that are illustrated in Figure 1
will serve as reference for the explanation of the model. In
the two topologies, node s0 transmits beacon packets to its
neighbouring nodes (node s1 ). However, node s1 has three
neighbour nodes that are hidden from node s0 . Thus, if any
of the nodes in the set {s2 , s4 , s6 } have data (D) to transmit,
this might overlap with the beacons (B) from node s0 , and
overlap/collide at node s1 . In Figure 1(a) the hidden nodes are
not within the radio transmission range of each other, while in
Figure 1(b) they are all within each others range. These two
examples represent two extremes, forming upper and lower
bounds on the performance of a real system.
The data traffic from the nodes in the set {s2 , s4 , s6 } is
modelled as an M/M/1 queue where the data rate is Poisson
distributed with parameter λc and the channel access and
transmission time is exponential distributed with parameter
1/µ. This is not very realistic, since traffic in a real network
will follow other distributions. However, it allows us to verify
the model in a simple manner. Later in the paper we will
provide upper and lower bounds for the beacon loss probability
that is based on a large number of random independent traffic
scenarios, which captures more of the characteristics of the
traffic in a real network.
D
s2
s0
B
s1
D
s6
s4
s3
D
D
s2
s7
s0
s5
(a) Isolated hidden nodes
B
s1
s6
s4
s3
D
D
s7
s5
(b) Connected hidden nodes
Figure 1. Sample topologies where the hidden nodes {s2 , s4 , s6 } are isolated
or connected. When the hidden nodes send data (D), this may collide with
the beacons (B) sent by node s0 .
B. Beacon collision with only one hidden node
Consider the topology in Figure 1(a). We want to find
the probability (perror ) that the beacon from s1 and a data
packet from the hidden node s2 collide. If qs2 (0) denotes
the probability of node s2 having zero packets awaiting in
its buffer, perror is expressed as [9]:
perror = Pr{Collision|qs2 (0) > 0} · Pr{qs2 (0) > 0}
+ Pr{Collision|qs2 (0) = 0} · Pr{qs2 (0) = 0}
= (1 − p0 ) · 1 + (1 − e−λc ωb /Tp ) · p0
(1)
where p0 is the probability that the hidden node s2 has
zero packets awaiting to be transmitted. The parameters Tp
and ωb represent the average transmission time of the data
packet and of the beacon packet, respectively. Both these
transmission times are assumed to be exponentially distributed.
The probability that a node has i data packets in its packet
queue is given by pi = (1 − ρ)ρi , where ρ = λc /µ, thus
p0 = 1 − ρ [10].
C. Isolated hidden nodes
We will now evaluate the probability that a beacon collides
with data transmissions from a set of hidden nodes using the
topology illustrated in Figure 1(a). In this example topology,
the hidden nodes are assumed to be isolated, i.e. outside the
transmission range of each other. Individually, the probability
that one of them sends a data packet which overlaps with
a beacon from node s0 is given by Eq. 1 (denoted pe ).
The number of data packets overlapping with a beacon is
binomially distributed B(m, pe ) where m is the number of
hidden nodes. The probability that a beacon is lost can then
be expressed as:
m X
m k
pIerror (m hidden nodes) =
p (1 − pe )m−k (2)
k e
k=1
D. Connected hidden nodes
In Figure 1(b) the hidden nodes are all within radio transmission range of each other. When all the hidden nodes are
connected, the calculation of the beacon loss probability is not
as straightforward, and we need to make some simplifying
assumptions. First, it is assumed that the nodes access the
common channel according to a 1-persistent CSMA protocol
[11]. This might seem like a contradiction, since it was
stated earlier that we assumed a MAC protocol that reduces
the collisions between non-hidden neighbours to a minimum.
However, for the case where the hidden nodes are connected,
mλc
x0
mλc
x1
µz1
mλc
µz2
mλc
mλc
···
x2
µz3
xN −1
µzN −1
xN
µzN
Figure 2. A Markov model of the total number of packets waiting to be
transmitted by the m hidden nodes where λc is the mean packet arrival rate,
1/µ is the mean service time and zn is the average number of the m hidden
nodes transmitting simultaneously.
there will be a parameter (zn ) in the model that can be set
to control to which extent transmissions between the hidden
nodes are permitted to collide with each other. Second, it is
assumed that the arrival rates at the different hidden nodes
are not coupled, hence a Markov model can be used for the
analysis.
Consider the Markov chain illustrated in Figure 2. Each
state represents the sum of all packets queuing up in the m
hidden nodes. Here zn is the average number of hidden nodes
transmitting when a total of n packets are distributed amongst
the hidden nodes.
We now want to find the probability of being in state x0 ,
which is the case for which none of the hidden nodes have
packets awaiting transmission (pC
0 ). Using standard queuing
theory [10], it can easily be shown that this probability is
given by:

!−1 −1
N
i
X
Y

 , ρ = λc
(3)
pC
(mρ)i
zn,i
0 = 1+
µ
n=1
i=1
where zn,i is the average number of the m nodes transmitting
simultaneously and is calculated according to:

i=1
1


Pn

m

k(m
β
(1−ρ
)
)
k,n

n<m,i>1

Pn k m
 k=1
ρ=λc /µ
( )βk,n
k=1 k
(4)
zn,i =


 Pm−1 m


(1−ρm )
k( )β
n≥m,i>1

Pm−1k mk,n
 k=1
+m·ρm
ρ=λc /µ
β
( k ) k,n
k=1
The probability that one or more of the m nodes having zero
packets in its buffer, given the sum of packets in the buffers is
n, is given by the term 1 − ρm in Eq. 4. The combinations of
k of m buffers containing packets,
constrained by a total sum
of n packets is given by m
β
,
where βk,n is calculated
k,n
k
using:

k=1
1




n − 1
k=2


n−2−
P
n− n−(k−2)−
k−1
βk,n =
ij

ik−1
(k−1)
j=3

X
X
X

Pk−1


··
n − 1 − j=2 ij k>2


ik−1 =1
ik−2 =1
i2 =1
By substituting p0 in Eq. 1 with pC
0 (Eq. 3), the probability
that transmissions from the connected hidden nodes overlap
with a beacon can be calculated as:
C
−λc ωb /Tp
pC
error = 1 − p0 · e
(5)
(a) Results for Figure 1(a)
(b) Results for Figure 1(b)
Figure 3. The probability of beacon loss (ωb /Tp = 0.3) for the topologies
illustrated in Figure 1. The results are shown with a 95% confidence interval.
In order to test the model’s accuracy, a discrete-event simulator was developed. The simulator models a two-dimensional
network where every node transmits with the same power
on the same channel. Also, every node experiences the same
path loss versus distance and have the same antenna gain and
receiver sensitivity. A node receives a packet if and only if the
packet does not overlap with any other packet transmitted by
a node within its range. The propagation delay is assumed to
be negligible and the nodes are static. The correctness of the
simulator was verified using mathematical expressions for the
Aloha [12] and p-persistent CSMA [11] protocol, where MAC
layer throughput was compared with the simulation results.
Figure 3 shows the probability of overlapping transmissions
for the topologies in Figure 1. Analytical and simulated results
are shown. Packets at each node were generated independently
according to a Poisson process with the average rate λc . The
results in Figure 3 show that the model provides sufficient
accuracy, even though the model assumes that the length of
a packet from a hidden node is exponential distributed, while
the simulation model uses a fixed packet length. This indicates
that our simplification is fair and that the model provides
satisfactory accuracy.
E. Bounds for the beacon loss probability
The beacon loss probability depends on how the hidden
nodes of s1 access the channel and if they have packets
in their buffer. For the case where the hidden nodes are
isolated, any packet that arrives at one of these nodes will
be transmitted immediately, since they will never sense the
channel as busy. This will represent a lower bound for the
beacon loss probability.
When the hidden nodes are connected, i.e. within each
others transmission range, a packet arriving at one of the
hidden nodes might have to wait until an ongoing transmission
is finished before it is transmitted. When all the buffers are
filled, the m hidden nodes will transmit simultaneously after
an ongoing transmission is finished, thus emptying the buffers
at a rate of m · µ. If we however change the model for the
connected case, and enforce that the hidden nodes access the
d6
d10
d6
d10
d4
d8
d12
d4
D
d2
D
d7
d9
d11
d0
d1
D
d3
d5
(a) Topology A
Figure 4. The probability of beacon loss (ωb /Tp = 0.3) for the topology
illustrated in Figure 1. Upper and lower bounds are calculated using Eq. 3
(connected hidden nodes and zn = 1∀n), and Eq. 2 (isolated hidden nodes),
respectively. The case where zn is calculated according to Eq. 4 is also shown.
channel one at a time, the rate of emptying the buffers of the
hidden nodes is reduced to µ, and can be calculated using
Eq. 3 with zn = 1∀n. The model will now resemble the
IEEE 802.11 MAC protocol, which has mechanisms that aim
to reduce collisions on the channel to a minimum. This will
represent an upper bound for the beacon loss probability.
Figure 4 illustrates the upper and lower bounds for the
probability of overlapping transmissions for the topologies in
Figure 1. An interesting result is that when using a MAC
mechanism that reduces the probability of unicast packet
collisions on the channel, the probability of beacon loss is
increased. The reason is that the data packets of the hidden
nodes then ”fills up” the channel more efficiently, leaving less
residual time for a beacon to be transmitted on the channel
without colliding with a data packet.
III. B EACON L OSS IN A RBITRARY M ESH T OPOLOGIES
A. Analysis of some selected traffic patterns
Up to this point, the analysis has only considered the basic
topologies in Figure 1. In this section we investigate how the
analysis of these topologies can be applied to more complex
mesh topologies and focus the study on the two topologies
in Figure 5. We can observe that the analysis can easily be
generalised for any arbitrary mesh topology. First, we study a
specific traffic pattern as shown in Figure 5. Then, in the next
sub-sections, the beacon loss probability for random traffic
patterns will be analysed.
In order to see how the model performs in a realistic
situation, the self-developed discrete-event simulator used in
previous section is abandoned. Instead, we now compare the
analysis with results from the ns-2 network simulator, using
the IEEE 802.11 MAC protocol in the simulations. Table I
shows the simulation parameters. The ns-2 model is configured
such that the sensing range (CP) is equal to the transmission
range (RX). The traffic is generated according to a Poisson
process where the packet size is fixed. It is expected that the
results for the probability of beacon loss might differ, since
MAC layer
Slot time
Values
20µs
d0
d7
B
d9
d1
d11
d3
d5
(b) Topology B
Figure 5.
NS -2
d8
d2
D
B
D
The simulation topologies.
Table I
S IMULATION PARAMETERS .
Physical layer
Propagation
model
SIFS/DIFS
10/50µs CPThreshold
Queue Length 50
CS/RXThreshold
RTS-CTS
OFF
Data rate
Values
Simulation
Two Ray Simulation/
transient time
10 dB
Traffic/
Distribution
Equal
Packet size
(UDP/IP/MAC)
11.0Mbps #Replications
Values
900s/25s
Poisson
1478
10
the CSMA protocol in the analytical model is different from
the IEEE 802.11 MAC protocol used in the ns-2 simulator.
In addition, effects such as retransmission by the MAC layer
in the ns-2 simulator will cause the packet buffers to be
emptied differently than in an M/M/1 queue. However, the
traffic pattern chosen in Figure 5 is such that probability of
MAC retransmissions is negligible.
Figure 6 shows the beacon loss probability for the topologies in Figure 5. The maximum traffic load per node in the
ns2-simulation is 2Mbps ≈ 0.27(λc T ). The results in Figure
6 show simulated and analytical beacon loss probability. The
parameters Tp and ωb in Eq. 1 is calculated according to [13]
and the parameters in Table I.
In topology A, node d1 has two hidden nodes and these
two nodes transmit data to one of their 1-hop neighbours
(d7 →d8 and d3 →d5 ). The beacon is sent from d0 →d1 and
ωb is calculated to be 1104µs. The traffic/topology scenario
is the same as in Figure 1(a) and the results are shown
in Figure 6(a). From the figure we can see that the model
provides satisfactory accuracy compared to the simulation
results from ns-2. This is as expected, since there is no data
packet loss, thus no retransmissions or any contention for
channel access in this topology. In topology B, node d7 has
three hidden nodes which transmit data to one of their 1-hop
neighbours (d0 →d1 , d2 →d4 and d8 →d10 ). The beacon is sent
from d9 →d7 and ωb is calculated to 1392µs. The analytical 1persistent CSMA model was modified in order to resemble the
results from the ns-2 simulation. By setting zn = 1∀n in Eq.
3, we imitate the channel access behaviour of the IEEE 802.11
MAC protocol, where the probability of a collision between
transmissions of the connected hidden nodes is minimal. The
results in Figure 6(b) show the beacon loss probability for
topology B. We observe that the simulation result also in this
scenario matches well with the analytical model.
(a) Results for topology A
(b) Results for topology B
Figure 6. The probability of beacon loss for the topology illustrated in Figure
5. The results are shown with a 95% confidence interval.
B. Complex traffic patterns
Before attempting to model more complex traffic patterns,
we must ensure that the basic model is capturing all possible
transmission configurations. In fact, the initial model did not
take into account the possibility that a neighbouring node
receiving the beacon could be transmitting any data packets.
Therefore, an approximate model will be provided, where the
channel access time of the neighbouring node receiving the
beacon is also taken into account. This model will be used in
the next sub-section when random traffic patterns is analysed.
Again, consider the sample topology illustrated in Figure
1(a). Let us assume that node s1 has a traffic load with the
rate λc and the probability that it gains access to the channel in
order to transmit a packet is ps1 . If the nodes {s1 , s2 , s4 , s6 }
are modelled as M/M/1 queues, the probability that e.g. node
s2 has no packets in its buffer can be expressed as:
"
k #−1
N X
ρ
qs2 (0) = 1 +
, ρ = λc /µ (6)
1 − ps1
k=1
An approximate expression for ps1 is the probability that none
of the neighbour nodes of s1 have
Q a packet in its buffer. The
probability ps1 is then given by i∈{2,4,6} qsi (0) and can now
be written as:
"
k #−n
N X
ρ
(7)
ps1 ≈ 1 +
1 − ps1
k=1
where solutions for ps1 can be found numerically and n =
|{s2 , s4 , s6 }|. For the case of isolated hidden nodes in Figure
1(a), the parameter p0 in Eq. 1 can now be expressed as qsi (0)
in Eq. 6.
For the connected hidden nodes in Figure 1(b), the probability ps1 is equal to 1/(m + 1), since each of the m + 1
nodes gets an equal share of the common channel. Thus, pC
0
is rewritten as:


i !−1 −1
N
i
X
Y
1
C
i

(8)
p0 = 1 +
(mρ)
zn,i 1 −
m+1
n=1
i=1
(a) Results for topology A
(b) Results for topology B
Figure 7. The probability of beacon loss for the topology illustrated in
Figure 5. In topology A, the beacon is sent from d0 →d1 and data from
d7 →d8 , d3 →d5 and d7 →d9 (ωb |d0 = 1104µs). In topology B, the beacon
is sent from d9 →d7 and data from d2 →d4 , d8 →d10 , d0 →d1 and d7 →d9
(ωb |d9 = 1392µs). Maximum traffic load per node in the ns2-simulation is
2Mbps ≈ 0.27(λc T ). The results are shown with a 95% confidence interval.
Using Eq. 6-8, we can now calculate the beacon loss probability in the case where node d1 transmits data to node d0 in
Figure 5(a) (topology A), and where node d9 transmits data
packet to node d7 in Figure 5(b) (topology B). Analytical and
ns-2 simulation results are shown in Figure 7. As can be seen
from the figure, the approximation for complex traffic patterns
in the model achieves acceptable results.
C. Random traffic pattern of bursty traffic
In this section we investigate the case for where the data
traffic is bursty and the traffic pattern is random. The simplest
approach to analyse a bursty traffic pattern, is to generate
a snapshot of the traffic in the topology. It is assumed that
the time between each snapshot is sufficiently long for the
traffic patterns of each snapshot to be considered independent.
For each link in the topologies in Figure 5, we now assume
that a burst of data packets is transmitted with the probability
ptx /2. The data packets within a burst are generated according
to a Poisson process with the rate parameter λc = 0.2.
This snapshot represents a possible data transmission pattern.
Generating a large number of random independent snapshots
for a given ptx , the overall average beacon loss probability for
a given λc can be found.
The Figures 8-9 show results for Topology A and B,
respectively and illustrates that the beacon loss probability
is significant even at a relatively low load of λc T = 0.2.
The simulation results are generated using the self-developed
discrete-event simulator and show the average beacon loss
probability based on 100 random generated traffic patterns
with a 95% confidence interval. The simulation time for each
burst is 600s. The figures also show analytical results based
on the 100 random independent generated traffic patterns,
where average upper and lower bounds for the beacon loss
probability are calculated. The upper bound corresponds to
the extreme case where all hidden nodes are connected with
zn = 1∀n, while the lower bound corresponds to the other
Figure 8. Probability of beacon loss (simulated and analytical) for the topology illustrated in Figure 5(a) (topology A). Traffic flows from di → dj , i 6= j
with probability ptx at the rate λc T = 0.2.
advanced simulation tool (ns-2), it was observed that the
model provides acceptable accuracy for simple topologies.
Also, more advanced topologies with random traffic patterns
and bursty traffic have been studied, where the model manages
to provide average upper and lower bounds for the beacon loss
probability with satisfactory accuracy. As shown in this paper,
the Hello-message loss probability caused by overlapping
transmissions can be significant in wireless mesh networks.
Both in the analysis and simulations it has been assumed
that all arrival rates are decoupled. Extending the analysis to
also consider multi-hop packet flows could be an interesting
topic for further research. Also, in reliability studies of wireless mesh networks, a given link failure probability often is
assumed. The Hello-message loss probability is a key element
of a routing protocol’s link-failure detection mechanism. An
interesting topic for future work would be to extend the model
to also cover link-failure probability for beacon based linkmaintenance in wireless mesh networks, where a good model
is missing in order to determine the bounds for the link-failure
probability.
ACKNOWLEDGMENT
This work has been financed by the Research Council of
Norway through the SWACOM project.
R EFERENCES
Figure 9. Probability of beacon loss (simulated and analytical) for the topology illustrated in Figure 5(b) (topology B). Traffic flows from di → dj , i 6= j
with probability ptx at the rate λc T = 0.2.
extreme where all hidden nodes are isolated. As the results
show, the analytical upper and lower bound provide a good
indication of the expected beacon-loss probability. However,
as ptx increases it can be seen that the gap between the upper
and lower bound increases. This is a result of complex traffic
pattern and interaction between the nodes. For the case when
ptx → 1 (i.e. there is traffic on every link) and the relatively
low traffic load of λc T = 0.2, it is natural that the upper and
the lower bound differ. However, for high values of ptx and
as λc T → 1, we expect that the gap between the upper and
lower bound will be small, since the probability that any of
the hidden nodes have a packet awaiting transmission is close
to 1. The study of this is however an area for future work.
IV. C ONCLUSION AND F UTURE W ORK
This paper introduces an approximate model for the Hellomessages loss probability caused by overlapping transmissions
is wireless mesh networks. The model, which assumes a
CSMA MAC layer is further extended to provide rough upper
and lower bounds for Hello-message loss probability in IEEE
MAC. Using both a self-developed simulator and a more
[1] F. Tobagi and L. Kleinrock, “Packet switching in radio channels: Part
ii–the hidden terminal problem in carrier sense multiple-access and the
busy-tone solution,” Communications, IEEE Transactions on, vol. 23,
no. 12, pp. 1417–1433, Dec 1975.
[2] Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY)
Specification, IEEE Std. 802.11, 1997.
[3] T. Clausen and P. Jacquet, Optimized Link State Routing Protocol
(OLSR), IETF Std. RFC3636, October 2003.
[4] C. Perkins, E. Belding-Royer, and S. Das, Ad hoc On-Demand Distance
Vector (AODV) Routing, IETF Std. RFC3561, July 2003.
[5] M. Voorhaen and C. Blondia, “Analyzing the impact of neighbor sensing
on the performance of the olsr protocol,” in Modeling and Optimization
in Mobile, Ad Hoc and Wireless Networks, 2006 4th International
Symposium on, April 2006, pp. 1–6.
[6] S. Ray, D. Starobinski, and J. B. Carruthers, “Performance of wireless
networks with hidden nodes: a queuing-theoretic analysis,” Comput.
Commun., vol. 28, no. 10, pp. 1179–1192, 2005.
[7] P. C. Ng and S. C. Liew, “Re-routing instability in ieee 802.11 multihop ad-hoc networks,” in Local Computer Networks, 2004. 29th Annual
IEEE International Conference on, Nov. 2004, pp. 602–609.
[8] “The Network Simulator NS-2,” http://www.isi.edu/nsnam/ns/.
[9] A. Dubey, A. Jain, R. Upadhyay, and S. Charhate, “Performance
evaluation of wireless network in presence of hidden node: A queuing
theory approach,” in Modeling and Simulation, 2008. AICMS 08. Second
Asia International Conference on, May 2008, pp. 225–229.
[10] L. Kleinrock, Theory, Volume 1, Queueing Systems. Wiley-Interscience,
1975.
[11] L. Kleinrock and F. Tobagi, “Packet switching in radio channels:
Part i–carrier sense multiple-access modes and their throughput-delay
characteristics,” Communications, IEEE Transactions on, vol. 23, no. 12,
pp. 1400–1416, Dec 1975.
[12] N. Abramson, “The aloha system: another alternative for computer
communications,” in AFIPS ’70 (Fall): Proceedings of the November
17-19, 1970, fall joint computer conference. New York, NY, USA:
ACM, 1970, pp. 281–285.
[13] P. E. Engelstad and O. N. Østerbø, “Non-saturation and saturation
analysis of ieee 802.11e edca with starvation prediction,” in MSWiM
’05: Proceedings of the 8th ACM international symposium on Modeling,
analysis and simulation of wireless and mobile systems. New York,
NY, USA: ACM, 2005, pp. 224–233.
Download