IOP Generic Communication (IOP GenCom) Quality of Service for Personal Networks at Home Deliverable D 2.4 Refinement of new QoS protocols and mechanisms Abstract This document presents a refinement of the state of the art QoS protocols and mechanisms for Personal networks as presented in the previous deliverable. In the first part of the document efficient searching for resources and services in Personal Networks is addressed. There are two common methods employed for searching: Flooding and Random Walks (RW), where for Personal Networks we propose the use of multiple RWs. The performance of searching with multiple RWs on two graph topologies, ER random graphs and power law graphs generated using preferential attachment are studied. An efficient way of searching graphs using RWs with no repetition of steps (i.e., memory) is shown, and in addition we show that an optimal value of the memory Μ depends on the topology of the network. The second part of the document deals with QoS differentiation in Personal Networks. By giving different priorities to users, their performance can be increased or decreased. We study the impact of the priority settings on the average waiting time of a packet for each customer class. A mathematical model is developed to approximate the 1-limited polling system that is used to model the network. The third part of the document analyses the throughput of Personal Networks, taking into account the impact of interference due to the wireless transmissions. A new theorem is stated and proven that provides an upper bound on the throughput a network can achieve. The results presented in this document can be used to refine existing protocols and serve as a basis for developing new ones. They provide insights in the different aspects affecting the QoS a Personal Network can obtain. IOP GenCom QoS for PNs at Home – D2.2 Assessment of proposed QoS protocols and mechanisms Colophon Date of Delivery: Version: Authors: Editor: Participants: Work Package Classification: No. of Pages: July 1, 2007 1.0 Tom Coenen, Santpal Dhillon Tom Coenen Network Architecture and Services (NAS), TUDelft Wireless Mobile Communication (WMC), TUDelft Design and Analysis of Communication Systems (DACS), UTwente Stochastic Operations Research (SOR), UTwente WP2 QoS control and modeling in both traffic and routing Public 38 Revision History Version Date 1.0 1 July 2007 Editor Tom Coenen Summary IOP GenCom QoS for PNs at Home – D2.2 Assessment of proposed QoS protocols and mechanisms Table of Content 1. INTRODUCTION....................................................................................................2 1.1 PURPOSE ...............................................................................................................3 1.2 SCOPE ...................................................................................................................3 1.3 ASSUMPTIONS .......................................................................................................3 1.4 OUTLINE OF THIS DOCUMENT ................................................................................4 2. SEARCHING IN PERSONAL NETWORKS.......................................................5 2.1 RELATED WORK ....................................................................................................5 2.2 SEARCH STRATEGIES .............................................................................................6 2.2.1 Random Walk........................................................................................................... 6 2.2.2 Random Walk with memory M................................................................................. 6 2.3 SEARCHING WITH MULTIPLE RW QUERIES ............................................................7 3. QOS DIFFERENTIATION IN PERSONAL NETWORKS..............................15 3.1 MODELING DESCRIPTION .....................................................................................15 3.2 POLLING MODEL ..................................................................................................16 3.3 ANALYSIS ...........................................................................................................16 3.3.1 General case .......................................................................................................... 16 3.3.2 Special cases .......................................................................................................... 19 3.4 VALIDATION .......................................................................................................20 3.4.1 General case .......................................................................................................... 20 3.4.2 Special cases .......................................................................................................... 21 3.5 CONCLUSION .......................................................................................................22 4 AN UPPER BOUND ON NETWORK THROUGHPUT....................................24 4.1 AD HOC INTERFERENCE MODEL ...........................................................................25 4.2 THE EXTENDED MULTICOMMODITY FLOW PROBLEM ...........................................27 4.3 EXAMPLES...........................................................................................................29 4.4 CONCLUSION .......................................................................................................31 5 CONCLUSION .......................................................................................................32 6 REFERENCES........................................................................................................33 APPENDIX.................................................................................................................37 A. ACRONYMS ......................................................................................................37 1 IOP GenCom QoS for PNs at Home – D2.2 Assessment of proposed QoS protocols and mechanisms 1. Introduction This document presents a refinement of the state of the art QoS protocols and mechanisms for Personal networks as presented in the previous deliverable. Personal Network (PN) [1] is a user-centric concept that is proposed to realize the users’ request to access information and services with their mobile devices at hand anywhere and anytime (Fig. 1). Recent advances in wireless communications, mobile computing and hand-held electronic devices have made the concept possible for development. Niemegeers and Heemstra de Groot had an in-depth analysis in [1] of the concept and the research issues that are crucial in developing personal networks. In brief, personal networks extend the user’s personal operating space of a PAN, which is normally less than 10 meters around the user, to a global coverage of his home network, corporate network, other personal resources and resources belonging to others regardless of their geographical locations. Thus a Personal Network is essentially a combination of various sub networks which may be ad hoc, cellular, wired or wireless networks etc. Figure 1 Personal Networks Novel QoS routing approaches are required to efficiently manage and support Personal Network features such as distributed multimedia services, mobile users and networks, heterogeneous inter-networking, service guarantees, point-to-multipoint communications, real time applications, which require hard time constraints etc. The problem of routing in wired, cellular and ad hoc networks has been discussed extensively in literature and current Internet and cellular networks are examples of routing protocols being used successfully. In single hop wireless technologies, such as WLAN (IEEE 802.11), no routing protocols are needed, but these networks are being extended to multihop networks. However, QoS support is missing in these routing protocols. Since most of the networking in PN is ad hoc based and delivering end-to-end QoS in ad hoc networks is intrinsically linked to the performance of routing protocols used, the main focus of this document is on routing protocols and models for ad hoc networks. 2 IOP GenCom QoS for PNs at Home – D2.2 Assessment of proposed QoS protocols and mechanisms Routing in ad hoc networks is a complex issue due to inherent non uniform propagation characteristics of wireless transmissions and the possibility that nodes may move at any instant. If only two hosts, located closely together, are involved in the ad hoc network, no real routing protocol or routing decisions are necessary. In contrast, since most of the ad hoc networks have a large number of hosts, packets make multiple hops to travel from any source to a destination node. Thus routing protocols are necessary in multihop wireless ad hoc networks. 1.1 Purpose The purpose of this document is to refine various routing protocols for ad hoc networks that will be utilized in the proposed personal network architecture and solutions to ensure that the QoS requirements are being met. However, the design of a new QoS routing protocol or use of any previous proposed routing protocol for personal networks should not be limited by this document. An analysis of searching strategies in Personal Networks and the possible throughput of a network, as well as the modeling of QoS differentiation give insight in how to refine existing protocols, or give a basis for the design of new ones. 1.2 Scope In this document, we will provide insight in how to refine various routing protocols that have been proposed for ad hoc networks. A search strategy using multiple random walk queries is analyzed. Delivering end to end quality of service in Personal networks is linked to the performance of the routing protocol used. We give a mathematical model to determine the impact of QoS settings on the waiting time of packets in a network. Furthermore, for a general type of network, an upper bound is derived for the throughput that can be achieved. All these results provide valuable insight needed when developing QoS aware networks and their routing protocols. 1.3 Assumptions There are some assumptions when discussing the requirements of personal networks. • Devices: the devices we are discussing are all digital communicating devices that are equipped with at least one communicating interface either wireless interfaces such as UMTS, 802.11 and 802.15, or wired links such as Ethernet, xDSL. Some devices may be multimode with more than one interface type. • Ad hoc networks: the ad hoc networks we are referring to in this document may consist of heterogeneous wireless technologies such as 802.11, 802.15. Therefore, what we are discussing are multihop hybrid ad hoc networks with partially mesh topology. Partial mesh topology refers to a topology of an ad hoc network where nodes may connect to only some, not all of the other nodes. Partial mesh topology is partly the result of the heterogeneous wireless technologies that may be involved in the ad hoc networks. • WLAN (IEEE 802.11): the WLAN technology we discuss here is in mixed mode, that is, a WLAN node can dynamically switch between ad hoc mode and infrastructure mode during communication. 3 IOP GenCom QoS for PNs at Home – D2.2 Assessment of proposed QoS protocols and mechanisms 1.4 Outline of this document The outline of this document is as follows. First of all, several search strategies for wireless networks are listed. Then we elaborate on what we find to be the best strategy for Personal Networks and evaluate this type of strategy, using multiple random walk queries. The second part of the document models the QoS aspects in wireless networks. The impact of the differentiation between users is captured to see impact on the waiting time of packets for different classes of customers. The third part states a theorem that has been developed to provide insight in the throughput that can be achieved in a general type of network. Using the theorem, an upper bound can be derived, or for given demands between users a factor can be computed that shows the percentage of these demands that can be met. The final part concludes this document by summarizing the obtained results. 4 IOP GenCom QoS for PNs at Home – D2.2 Assessment of proposed QoS protocols and mechanisms 2. Searching in Personal Networks Efficient searching for resources and services is an important issue in Personal Networks. There are two common methods employed for searching - flooding and random walks (RW). In wireless ad-hoc networks, reactive protocols such as AODV and DSR use flooding to locate the destination [23]. In peer-to-peer networks, both flooding and RW have been employed to locate services and resources [3], [4], [14]. RWs have been shown to induce lower overhead than constrained flooding for searching in peer-to-peer networks [4], [14]. Multiple RWs have been proposed for searching on unstructured peerto-peer networks by Lv et al. [4]. In web graphs, search engines use breadth first search to perform a complete search of the web. However, to reduce the overhead of searching, agents or spiders based on RW, where the next hop is chosen uniformly among the neighbors of the node, or variations of the RW such as the RW strategy where the next hop is chosen as the node with maximum degree are widely used [21]. We propose the use of multiple RWs for searching in Personal Networks. We study the performance of searching with multiple RWs on two graph topologies - ER random graphs and power law graphs generated using preferential attachment. Both these graph topologies are important since ad-hoc wireless network, a constituent of the PN, can be modeled as ER random graphs [18] while the overlay or peer-to-peer topology constructed for PN can be modeled as power law random graphs [14]. We do not consider dynamic topologies in this paper. In case of multiple RW queries, we study the optimal number of queries and the Τ Τ Λ of queries for ER random graphs and preferential attachment power law graphs. We also show an efficient way of searching graphs using RWs with no repetition of steps (i.e., memory). In addition, an optimal value of the memory Μ depends on the topology of the network. Adaptive techniques based on RWs have been proposed for searching by Bisnik and Abhouzeid [22]. In the searching technique proposed in [22], the number of RW queries used for searching is varied depending on the previous performance of searching. Our work differs from previous approaches since we study the optimization between the number of queries and the time-to-live (Τ Τ Λ) of queries for different graph topologies. 2.1 Related work Unstructured overlay networks such as Gia proposed by Chawathe et al. [3] and Gnutella build a random graph and use flooding or RWs to discover data stored at different nodes. RWs have been shown to induce lower overhead than constrained flooding used by the current versions of Gnutella [4], [14]. In the original Gia [3], the RWs were biased to prefer nodes with higher capacity but Castro et al. [2] have shown that preferring nodes with higher degree leads to a higher success rate and a lower delay. Thus, further improvements have been proposed to Gia in which RWs are biased towards the higher degree nodes [2]. Also, variations of RWs have been proposed in which there are no loops [2]. Different search algorithms for scale-free and power law graphs have been analyzed in [1], [9], [10]. The term local search algorithm or path finding strategies is also used for different variations of RWs [1], [10]. In [1] and [10], RW strategies where the next hop is chosen as the node with the highest degree and without retracing of steps have been analyzed in terms of expected hopcount and weight. We show that strategies 5 IOP GenCom QoS for PNs at Home – D2.2 Assessment of proposed QoS protocols and mechanisms such as RW using highest degree and RW without retracing of steps can lead to deadlocks. Therefore, the comparison of different RW strategies should also include an analysis of deadlocks, in addition, to the expected hopcount comparison. In mobile agent based routing, the mobile agents perform a RW or a variant of the RW while searching for the destination. In Ant-Net, loop-erased RWs are used by the mobile agents [27]. Mobile agents using RW have been proposed for providing membership services for ad-hoc networks by Dolev et al. [8]. As a sampling technique, RWs have been used for providing membership services in ad hoc networks [5], [19] that provide the nodes in the network with a view of the other nodes and that are used by various applications such as location services, peer sampling services and random overlay constructions [19]. Bar-Yossef et al. [19] develop a membership service for ad hoc networks based on RW using highest degree. They show that the performance of such membership service is superior to other existing membership services based on gossiping or flooding [19]. The analysis of RWs has been an active topic of research [7], [8], [16]. Lovász [8] and Chung [11] presents a detailed survey of the RWs. An exact analysis of RWs on graph topologies such as the lattice and the torus has been studied in [7]. 2.2 Search strategies 2.2.1 Random Walk In searching with RW, the next hop is chosen uniformly among the neighbors of the nodes. Thus, no topology information is required to search with RWs. 2.2.2 Random Walk with memory M A first-in first-out (FIFO) list, called the memory list M, is maintained. The memory list M contains the node identifiers νϕ of the last Μ nodes visited during the RW, i.e. M = {ν1, ν2,…, νΜ}, where Μ = |M | represents the number of elements in the memory list M. The next hop is chosen uniformly among the neighbours of the node that are not in the memory list M. In our implementation of the RW strategy with memory Μ (RWM), the node identifier of the current node is not stored in the memory list M and no self-loops are allowed (The next hop cannot be chosen as the node itself.) The idea of using RWM on a graph is similar to the RW with unbounded memory in a continuous 3-dimensional space which has been referred to as self-avoiding RW [26]. The RWM strategy is equivalent to the search queries proposed for overlay networks where the structure is used to ensure that nodes are visited only once during a query and to control the number of nodes that are visited accurately [4]. From the routing point of view, the major shortcoming of RWs on graphs is the existence of loops in the path while traveling from the source to the destination node. To prevent loops, the simplest method is to introduce memory in the RWs. The one hop loops can be prevented by using Μ = 1, both the two hop and one hop loops can be prevented by using Μ = 2 and so on. Thus, a complete memory Μ = Ν − 1 totally eliminates loops in the RWs. But the introduction of memory (Μ ≥ 1) in RWs can lead to a deadlock. Figure 1 6 IOP GenCom QoS for PNs at Home – D2.2 Assessment of proposed QoS protocols and mechanisms explains the concept of deadlock in a RW with memory. Let us assume that the RW has a memory Μ = 3 represented as M= {ν1, ν2, ν3} where ν3 represents the last node visited. A3 A A4 A1 A2 C B 1 4 2 3 Figure 1: Explanation of deadlock in (a) RW with memory: The path 1→2→3→4 is shown by arrows. At node 4, the dashed lines indicate the links that cannot be used with memory M≥3. (b) RW using highest degree: Node A1 chooses node 1 as next hop and node 1 chooses node A1 as next hop leading to an infinite loop. Consider the situation where the RW enters the cluster B at node 1. Suppose that the RW leads to a path 1 → 2 → 3 → 4 in the cluster B. At node 2, the memory list M contains and at node 3 the memory list M contains {1, 2}. At node 4, the memory list M contains {1, 2, 3} and since all the neighbors of node 4 are in the memory list M and no self loops are allowed, the RW cannot move forward nor backward. Therefore, a deadlock prevents the RW from ever reaching the destination. Keeping the memory Μ equal to the degree of nodes is not sufficient to prevent loops. Consider the same situation as above but with memory equal to degree of node 4, i.e. Μ = 2. At node 4, the memory list M contains {2, 3} and the next hop can be chosen as node 1. Thus, introducing memory may remove the loops in the RW but can induce deadlocks. In the implementation of Gia, Castro et al. [4] have used a query in RWs which consists of all the previously visited hops. This is similar to using complete memory in our analysis. The above analysis shows that there are two distinct regimes possible for RWs. Without memory, i.e. Μ = 0, the RWs can have loops but no deadlocks. For complete memory, the RWs can only have deadlocks and no loops. When the value of the memory Μ is such that 0 < Μ < Ν − 1, the RWs can have loops and deadlocks. 2.3 Searching with multiple RW queries We show that using multiple queries reduces the overhead for searching as compared to flooding with sequence numbers. Searching (packet) overhead is defined as product of number of hops for each query (packet) and number of queries (packets) i.e., the total number of packets exchanged. A single RW query has an overhead and time to discover 7 IOP GenCom QoS for PNs at Home – D2.2 Assessment of proposed QoS protocols and mechanisms of Ο(Ν log Ν ) for ER random graphs and BA power law graphs [6], [24]. Since the time to discover is large in RW, we split a single RW query into Θ multiple queries each with a given Τ Τ Λ. Each RW query stops when the Τ Τ Λ is reached or the destination is located (In RWM, the query also stops if there is a deadlock). Since each RW query makes at most Τ Τ Λ hops, the worst-case searching overhead is Θ*Τ Τ Λ. The expected number of hops is less since any query stops once the destination is found. However, there is a probability that a destination is never located by the multiple queries. Thus, with multiple queries we define the probability of success as the probability that the destination is located by at least one query out of the Θ queries generated. In flooding with sequence numbers, the probability of success is defined as the probability that a destination is located with a given Τ Τ Λ. We want to minimize Τ Τ Λ and Θ and maximize Pr [success]. To analyze the performance of multiple ΡΩ queries, we define the efficiency as the inverse of expected packet overhead needed to discover the destination node. The efficiency is normalized by multiplying by Ν. The gain of searching in one scheme over another is defined as the ratio of efficiency for the corresponding schemes. η= Number of iterations(Pr[success] ×N Total number of packets ⎛ RW M ⎞ η (RWM ) g⎜ ⎟= ⎝ RW ⎠ η (RW ) (1) (2) Consider a single RW and RWM on a complete graph ΚΝ . The searching overhead can be approximated by the product of expected hopcount to discover destination and the number of iterations. Since in RW and RWM, the expected hopcount is Ν − 1 and (Ν − 1)/2 respectively, the gain for a complete graph ΚΝ. In flooding with Τ Τ Λ = 1, × is Ν/(Ν − 1) and with Τ Τ Λ = 2, × is Ν/ (Ν − 1)2. Thus, the efficiency of flooding depends on the value of Τ Τ Λ and the efficiency decreases with Τ Τ Λ. Table II and III show the efficiency for a single RW, RWM query and flooding with sequence numbers for different values of Ν and π. The results for flooding in Tables II and III are for optimized values of Τ Τ Λ such that Pr [success] is close to 1. The gain obtained by using RW over flooding is significant, particularly, when the link density π is large. In addition, RWM=N-1 is a more efficient way of searching than RW since the expected number of hops required to find destination or deadlock is less. However, the probability of deadlocks is high when the link density π is small. As the link density π is decreased, efficiency for both RW and RWM decreases. This is in contrast to flooding where the efficiency increases as the link density is decreased. Table I Efficiency of searching by using flooding, and a single RW or RWM query for a dense ER random graph (πΝ=80) for different values of Ν. pN=80 N g g (RWM × (RW) × (RWM) × (flooding) (RW/flooding) /RW) 8 IOP GenCom QoS for PNs at Home – D2.2 Assessment of proposed QoS protocols and mechanisms 100 200 400 800 1.17 1.08 1.05 1.01 1.82 2.16 1.99 2.0 0.015 0.03 0.06 0.12 78 36 17.5 8.5 1.55 2 1.9 1.98 Table II Efficiency of searching by using flooding, and a single RW or RWM query for a dense ER random graph (πΝ=10) for different values of Ν. N × (RW) 100 200 400 800 0.84 0.84 0.82 0.8 RWM -× (flooding) 1.6 (0.73) 1.54 (0.66) 1.47 (0.59) 1.4 (0.52) pN=10 g g (RWM × (flooding) (RW/flooding) /RW) 0.14 6 1.89 0.21 4 1.83 0.11 7.5 1.79 0.14 5.7 1.76 A single RW leads to lower overhead to locate a destination than flooding with sequence numbers. However, the time to search for destination is much larger than in flooding. Since we want to maximize Pr[success] and minimize Τ Τ Λ, we split the single RW or RWM into multiple queries with fixed Τ Τ Λ such that Θ * Τ Τ Λ = Ν log Ν . Table III and IV show the results for multiple RW and RWM queries for ER random graph with Ν = 400 and link density π = 0.015 and 0.2 respectively. In Table IV, since the link density π is large, Pr [success] ' 1 and is not shown. The probability of success is very low in RWM with only a single query when the link density π is small. However, when split into multiple queries, Pr [success] increases. As the Τ Τ Λ is decreased and Θ is increased, the efficiency decreases for both RW and RWM. The decrease in efficiency occurs with small Τ Τ Λ since most of the queries search only the neighboring nodes which have been visited already by other queries. There is also a decrease in efficiency because the number of queries and the Τ Τ Λ is fixed. Thus, multiple queries might locate the destination. The terminating conditions can be included which improve the efficiency but increases the complexity of searching algorithms. For example, a scheme is proposed in [4], where the query checks with the source node whether the destination is located. As shown by tables IV and V, the efficiency decreases by a factor of 3 as the Τ Τ Λ is decreased from 2400 to 120. Moreover, when the Τ Τ Λ is small, the gain obtained by using RWM over RW is small. Therefore, only for large values of link density π and Τ Τ Λ, RWM is a more efficient way of searching than RW. If we use Θ > 1 with Τ Τ Λ = 2400, the efficiency decreases. Ν=400. pN=6 N=400 Table III Efficiency of searching by multiple RW or RWM queries for π=0.015 and × RW Pr[success] × RWM Pr[success] g (RWM /RW) 9 IOP GenCom QoS for PNs at Home – D2.2 Assessment of proposed QoS protocols and mechanisms Q=1, TTL = 2400 Q=20, TTL = 120 Q = 120, TTL = 20 Q = 400, TTL = 6 Ν=400. 0.7 0.996 1.23 0.28 1.8 0.27 0.96 0.33 0.97 1.2 0.24 0.95 0.26 0.97 1.1 0.15 0.73 0.18 0.82 1.2 Table IV Efficiency of searching by multiple RW or RWM queries for π=0.2 and N=400 Q=1, TTL = 2400 Q=20, TTL = 120 Q = 120, TTL = 20 Q = 400, TTL = 6 × (RW) 0.7 × (RWM) 1.997 g (RWM /RW) 2 0.27 0.298 1 0.24 0.285 1 0.15 0.261 1 Figure 2 shows Pr [success] versus the searching overhead (number of packets exchanged) and the worst time to discover the destination. Since the size of network is not known a priori, we also show simulations for query split into multiple queries with a different Τ Τ Λ. We use a linearly increasing Τ Τ Λ and the maximum time to discover is given by maximum Τ Τ Λmax. Τ Τ Λ(λ) = Τ Τ Λmin + (λ − 1) ∗ αδδ_Τ Τ Λ (3) Using (3), the αδδ_Τ Τ Λ parameter can be expressed as Τ Τ Λmax−Τ Τ Λmin/Θ−1. Figure 2 shows that efficiency of searching by RW and RWM decreases with Τ Τ Λ. This is in contrast to the assumptions made in the analysis in [22], where searching with multiple queries and independent uniform sampling are assumed to be equivalent. Also, the linear query performs as good as sending multiple queries with a large Τ Τ Λ(100). Thus, the simulations show that searching by using a single RW query with Τ Τ Λ is more efficient than sending Θ RW queries with Τ Τ Λ’ (Τ Τ Λ = Θ*Τ Τ Λ’) for ER random graphs. Figure 3 shows the results for searching with multiple queries in BA power law graph. In these graphs, RWM=2 gives the best performance in terms of reducing search overhead. RWM=N-1 performs worse than RWM=2 since many of the queries end in a deadlock. This reduces the efficiency of the RWM=N-1 strategy and queries with larger Τ Τ Λ need to be sent to achieve the same probability of success as RWM=2. Moreover, the improvement in performance of different RW strategies compared to flooding is limited. Even with a large Τ Τ Λ = 1000, the RW does not perform better than flooding. Figure 4 compares the performance of searching with RW and RWM in ER random graph and BA power law graph using the same Τ Τ Λ = 400. The results are for Ν = 10000 and 10 IOP GenCom QoS for PNs at Home – D2.2 Assessment of proposed QoS protocols and mechanisms for ER random graph the link density π = 0.001. Figure 4 also shows the results for searching for a high-degree destination node in BA power law graph (the average degree of the destination is 72). Searching in ER random graphs performs better than in BA power law graph. This can be attributed to the fact that most of the nodes in ER random graph have a larger degree than the degree of nodes in BA power law graph (section III.E). Thus, in BA power law graph, the RW makes large number of hops among the low degree nodes while searching for the destination node. Moreover, in BA power law graph, since the degree of uniformly chosen destination and source nodes is small, performance of searching for a uniformly chosen node is much worse than searching for a high degree node. 11 IOP GenCom QoS for PNs at Home – D2.2 Assessment of proposed QoS protocols and mechanisms 1.0 0.8 Pr[success] 0.6 Flooding with sequence num bers RW (TTL = 6) RW (TTL = 100) RW M = N-1 ( TTL = 100 ) RW ( Q = 20 ) RW M = N-1 ( Q = 20 ) linear query RW ( TTL m in = 20, add_TTL = 2 ) RW M = N-1 ( TTL m in = 20, add_TTL = 2 ) 0.4 0.2 N = 400 p = 0.015 0.0 500 1000 Number of messages 1500 1.0 Pr[success] 0.8 0.6 Flooding with sequence num bers Q = 20, RW M = N-1 Q = 20, RW Linear Query RW (TTLm in = 20, add_T T L = 2) RW M = N-1 (T T L m in = 20, add_T T L = 2) 0.4 N = 400 p = 0.015 0.2 0.0 0 50 100 150 200 Worst case time to discover Figure 2: Performance of searching using RW and RWM with multiple queries in ER random graph for N = 400 and p = 0.015. 12 IOP GenCom QoS for PNs at Home – D2.2 Assessment of proposed QoS protocols and mechanisms 1.0 0.8 N = 10000 Pr[success] 0.6 Flooding with sequence numbers RW TTL min = 100, add_TTL = 20 TTL = 10 TTL = 1000 0.4 RWM M = N-1, TTL min = 100, add_TTL = 20 M= N-1, TTL = 100 M = 2, TTL = 100 M = 2, TTL min = 100, add_TTL = 20 0.2 0.0 0 10 20 30 40x10 3 Number of messages 1.0 0.8 Pr[success] 0.6 N = 10000 0.4 flooding with sequence numbers RW RWM 0.2 TTLmin = 100, add_TTL = 20 M = 2, TTLmin = 100, add_TTL = 20 M = N-1, TTLmin = 100, add_TTL = 20 0.0 0 1000 2000 3000 4000 Worst case time to discover Figure 3: Performance of searching using RW and RWM with multiple queries for BA power law graph (N = 10000). 13 IOP GenCom QoS for PNs at Home – D2.2 Assessment of proposed QoS protocols and mechanisms 1.0 0.8 N = 10000 p = 0.001 (ER graph) Pr[success] 0.6 ER random graph Flooding RW, TTL = 400 RWM = N-1, TTL = 400 BA model Flooding RW, TTL = 400 High degree destination RW, TTL = 400 0.4 0.2 0.0 0 10 20 30 40 Number of messages 50 60x10 3 Figure 4: Comparison of searching by multiple RW and RWM queries on ER random graph and BA power law graph. (N = 10000 and for ER random graph p = 0.0001) 14 IOP GenCom QoS for PNs at Home – D2.2 Assessment of proposed QoS protocols and mechanisms 3. QoS differentiation in Personal Networks In this part we present a novel queueing analysis approach to determine the waiting time of packets at a node in a network with QoS differentiation. In the network we consider, the differentiation between the users is done by giving them different probabilities of being allowed to transmit a packet. We model the network by a polling model: we model the nodes in the network as queues and the shared transmission capacity as a single server moving between the queues. Such an approach has also been used for the analysis of for instance Bluetooth Piconets [30],[31], where a cyclic polling model mimics the protocol in use. Opposed to previous work, we do not assume a cyclic polling model, but capture the random nature of the CSMA/CA based MAC protocol, as is used in e.g. IEEE 802.11, by setting probabilities for the nodes to be polled next, thus arriving at a random polling model. What we consider to be the main contribution of our work is an analysis of non-saturated nodes, with Poisson packet arrivals and thus taking into account the dynamic nature of the network. For various settings, we determine the waiting time at the different nodes to obtain insight into the effect of service differentiation in a communication network. By viewing the nodes in the network as isolated queues with a server that goes on vacations, of which the length depends on the state of the other nodes, we analyze the behaviour of such a queue. In case of saturated nodes, this analysis is exact. Another exact analysis is possible for a network with identical nodes, where a polling model with switchover times can be used to analyze the waiting time of packets at a node. Previous work on QoS differentiation has focused on the impact on the throughput and level of differentiation due to IEEE 802.11 parameters, such as the backoff values, AIFS and TXOP limits, which determine the time until a transmission attempt, the waiting time after a transmission and the maximum number of packets to send during a transmission. For the basic IEEE 802.11 protocol, Bianchi [28] used a Markov chain analysis to determine the transmission and collision probabilities to compute the throughput of the network under saturation conditions. Many extensions have been made to this model to include the frame retransmission limit [37], capture [36] and flow level dynamics [29] as well as non-saturation conditions [38]. For the IEEE 802.11e protocol, analytical results also often build on the work of Bianchi, for example [39]. The approach presented in the present paper differs substantially from these models, as we differentiate between users by the probability of being allowed to transmit a packet. We propose a novel way of approximating the waiting time of a packet for a communication network with QoS differentiation, but the background of our paper with the listed previous work coincides. 3.1 Modeling description We consider a network consisting of two types of users (high and low priority) that want to transmit packets over a wireless channel. The network is a so called "single cell" where the transmission capacity is fully shared as all nodes are within each others interference range. Hence only one transmission can take place at any point in time. Quality of Service (QoS) differentiation is made between the nodes by for instance setting different backoff window values, interframe spaces and TXOP limits as in the IEEE 802.11e protocol. These parameters influence the time it takes for a node to attempt a transmission, the time a node waits after the channel becomes idle and the amount of packets the node is allowed send at once on its turn to transmit. We assume that the TXOP limit is the same for all nodes, being one single packet, and that the other settings 15 IOP GenCom QoS for PNs at Home – D2.2 Assessment of proposed QoS protocols and mechanisms only influence the probability of a node being next in turn to transmit a packet. We also take into account the random access scheme in IEEE 802.11, due to the CSMA/CA based MAC protocol. We also assume that the size of a packet is the same for all nodes. We analyze the impact of the distinction between the two types of nodes by considering the expected waiting time of a packet for each type of node. 3.2 Polling model To model the system, we make the analogy between the nodes competing for the channel to transmit a packet and one server representing the shared transmission capacity. A node being allowed to transmit coincides with the service of a packet at the queue by the server. As the channel is used by the different nodes in a random order (due to the random access scheme of the MAC protocol, which depends on the parameters), this can be modelled as the server polling the different nodes. The distinction between the two types of nodes is made by the probability that the server will move to one of the nodes. We will take the probability of moving to a high priority (HP) node to be a times as high as moving to a low priority (LP) node. Each node has an infinite queue and packets arrive according to a Poisson process with rates l(HP) and l(LP) at the two different types of queues. The service time of a packet is considered to be deterministic with value as the packet sizes in the system are equal for all nodes and the channel speed is considered to be constant at all times. As a node is only allowed to transmit one packet when being polled, the service discipline is 1-limited. We assume that there are no switchover times between the queues, so that consecutive transmissions of packets can take place. 3.3 Analysis In the following, we will derive expressions for the average waiting time of a packet for any type of queue. We start with considering one high priority node, surrounded by n low priority nodes. At both queues, packets arrive according to a Poisson process. The server will move to the HP queue with probability a/(n+a) and to a certain LP queue with probability 1/(n+a). We present an algorithm to approximate the waiting time of a packet for both types of queue. For specific situations, being that either the HP or LP nodes are saturated, meaning they always have packets ready to be transmitted, exact results are presented. Exact results are also given for the situation where all nodes are equal. 3.3.1 General case Consider the situation where customers arrive at the HP and LP node according to a Poisson process with rates l(HP) and l(LP) respectively, such that the nodes are not saturated. To determine the average waiting time of a packet in the queue, we consider the queues separately, as if they are isolated. From the point of view of the HP node, the server is either present and serving a customer, or away while serving an LP node. We thus can consider the system as an M/D/1 queue with vacations (c.f. [34],[40]), where the absence of the server while serving other nodes are the vacations. The length of these vacations, which depend on the state of the other queues, influences the waiting time of the packets in the queue. For illustratory reasons, we first give the analysis for the situation where there are two nodes, one high priority and one low priority node, which, as we show later, can be extended to any number of nodes. 16 IOP GenCom QoS for PNs at Home – D2.2 Assessment of proposed QoS protocols and mechanisms Two nodes In the two node situation, each node can be considered separately as a queue with a server that goes on vacation as described before. The duration of a vacation now depends on the state of the other queue. We approximate the distribution of the length of the vacation V(x), given the number of customers N(y) at the other queue (HP or LP) using the following recursion: ∞ P (V ( x) = kτ | N ( y ) = i ) = q( y ) ∑ P(V ( x) = (k − 1)τ | N ( y ) = j ) P ( A( y ) = j − i + 1) j = i −1 ⎧1, i = 0 P (V ( x) = 0 | N ( y ) = i ) = ⎨ ⎩1 − q( y ), i = 1..∞ where V(x) is the length of the vacation seen by the node x, whereas N(y), q(y) and A(y) are the number of customers at node yP, the probability of the server polling node yP and the number of arriving customers during a service time at node yP respectively. The variable x can be HP or LP and y then automatically is the other queue. As the number of customers in a queue will not tend to infinity in a stable system, we will truncate the queues as if there is a maximum of M customers in the queue for numerical purposes. The vacation length distribution is then determined using P(V ( x) = kτ ) = ∑ P(V ( x) = kτ | N ( y ) = i ) P ( N ( y ) = i ) , i where we use the steady state distribution of a node y for the values of P(N(y)=i). As this steady state distribution is not known, we start with a random distribution assuming the node to be empty with high probability to prevent analyzing an instable system. Using this distribution, the vacation distribution for the other queue is obtained. Having obtained the vacation time distribution, we derive the probability generating function (pgf) φ(z) of the number of customers left behind by a departing customer of the HP node. This also gives us the steady state distribution of the number of customers in the queue (c.f. [43]), so that by using Little's law we acquire the expected waiting time of a packet. The pgf is given by (c.f. [OMM91]) φ(z)=[V∗(z)-V(z)]S(z)π(0)/(z-V(z)S(z)), (1) where V(z) is the pgf of the number of customers arriving during a vacation and V*(z) is the pgf of the number of customers arriving during a vacation, given that at least one customer arrived. S(z) is the pgf of the number of customers arriving during a service time and π(0) denotes the steady state probability of the queue being empty. For the derivation of this formula we refer to the appendix. Note that for the standard M/D/1 queue (without vacations) we would have V*(z)=z and V(z)=1. In our situation however, when the server leaves the queue empty this will lead the server to serve a customer in the LP node. A customer arriving at the HP node during this service time has to wait for the server to become available, which differs from the immediate service it would receive in the M/D/1 queue, even if the HP node gets an infinite higher priority. We now have obtained the steady state distribution of the number of packets at the considered queue. This steady state can in turn be used to determine the vacation time distribution of the other queue as done in the previous step. This leads to the following iteration: 1. Set the initial steady state queue length distribution 2. Compute the vacation time distribution 17 IOP GenCom QoS for PNs at Home – D2.2 Assessment of proposed QoS protocols and mechanisms 3. Determine the steady state queue length distribution of the queue 4. Loop steps 2 and 3 until convergence occurs This approach mimics the interaction between the two queues and thus provides insight in the proportion of customers at each queue. The approach estimates the number of customers found at the other queue to determine the vacation time for the considered queue. When this vacation time is underestimated, the server might switch to the other queue earlier than in the real situation and starts servicing a packet at the considered queue (when available), thus leaving the server busy. When however the vacation time is overestimated, the approach leaves the server at the other queue, whereas this queue actually would be empty, thus leaving the server idle while it could process jobs in the considered (non-empty) queue. The presented approach hence underestimates the capacity of the server, but equally for both queues. The average waiting time of all customers in the total system, which can be seen as an M/D/1 queue as it is work conserving, is known and given by EW(total)= τ(2-ρ)/2(1-ρ), where ρ=(λ(LP)+λ(HP))τ, the load of the total system. The results obtained by the iteration give a higher average waiting time due to underestimation of the server capacity. The waiting time of each type of customer should hence be scaled down, so that the average waiting time of all customers in the system is correct. This leads to in improved estimation of the average waiting type of a customer per type of queue. Multiple queues Note that this approach can easily be extended to multiple queues of any priority class. The vacation length of a considered queue then depends on the state of all the other queues, but can be computed in a similar way. However, the number of iterations needed and the numerical efforts involved will grow exponentially with the number of queues in the system. Take for example the situation with three queues, one HP queue and two LP queues. The vacation length distribution of a queue is then given by P(V ( x) = kτ | N (1) = i, N (2) = j ) = ∞ ∞ q (1) ∑∑ P (V ( x) = (k − 1)τ | N (1) = a, N (2) = b) P( A(1) = a − i + 1) P( A(2) = b − j ) a =i −1b = j ∞ + q(2)∑ ∞ ∑ P(V ( x) = (k − 1)τ | N (1) = a, N (2) = b) P( A(1) = a − i) P( A(2) = b − j + 1) a = i b = j −1 ⎧1, i, j = 0 ⎪q( x) /(1 − q(2)), i = 1..∞, j = 0 ⎪ P(V ( x) = 0 | N (1) = i, N (2) = j ) = ⎨ ⎪q( x) /(1 − q(1)), i = 0, j = 1..∞ ⎪⎩q( x), i, j = 1..∞ The vacation length distribution is found using ∑∑ P(V ( x) = 0 | N (1) = i, N (2) = i j ) P ( N (1) = i, N ( 2) = j ) , j where again the steady state distribution of the other nodes is needed. Starting again with a random distribution (with the queues almost always empty) we find the vacation time and hence the corresponding steady state distribution of the queue under consideration. 18 IOP GenCom QoS for PNs at Home – D2.2 Assessment of proposed QoS protocols and mechanisms Now the next queue can be analyzed, using the found distribution of the previous queue. This is repeated until the steady state distributions converge and the average waiting time follows using Little's law. 3.3.2 Special cases Saturated LP nodes Consider the situation where one high priority node with Poisson(λ(HP)) packet arrivals is surrounded by n saturated low priority nodes. This situation gives insight in the impact on the waiting time of a packet when giving priority to a user in a busy network. We take the probability q of visiting the high priority queue to be q=(a)/(n+a) where a denotes the factor of importance given to the high priority node, meaning the probability of visiting the HP queue compared to the LP queue is times as high. The vacation length distribution is then given by the geometric distribution P (V ( x) = kτ ) = (1 − q ) k q , as any time the server does not jump to the HP node, it will service exactly one packet at an LP node. As the average time between arrivals of the server is τ/q and the server only serves one customer at each visit, the HP queue is stable when q>λτ. With the exact distribution of the vacation length known, we can use the pgf of the number of customers in the queue given by (1) to find the average number of customers in the HP queue. The waiting time then easily follows from Little's law. Empty HP node We now consider the situation where the low priority nodes are no longer saturated, but each have an arrival process of rate λ(LP) and a deterministic service time of value . Let node n+1 be the HP queue, the conservation law (cf [41]) then states that n +1 n +1 ∑ ρ (i) EW (i, q) = ρ i =1 ∑ λ (i)β (i) ( 2) i =1 2(1 − ρ ) where EW(i,q) denotes the average waiting time in the queue (not including service) and ρ(i)=λ(LP)τ for i=1..n and ρ(n+1)= λ(HP) τ, so that and ρ =nρ(LP) + ρ(HP). As the service time distribution is deterministic for any queue, we have that β (i ) ( 2) =τ² and the total waiting time of a customer is EW(i)=EW(i,q)+τ. Consider the situation where there are only n LP nodes, so the arrival rate at the HP queue is set equal to zero. The stability condition is that ρ = nλ(LP)τ < 1 and it immediately follows that 19 IOP GenCom QoS for PNs at Home – D2.2 Assessment of proposed QoS protocols and mechanisms n n ∑ ρ ( LP) EW ( LP, q) = ρ ∑ λ ( LP)τ i =1 2(1 − ρ ) i =1 EW ( LP, q) = 2 ρτ 2(1 − ρ ) (2 − ρ )τ EW ( LP) = 2(1 − ρ ) Saturated HP node Now consider the situation where the HP queue is saturated, then we have n identical queues, and looking from the point of view of the LP nodes a server with vacations. The server vacations can be modelled as a switchover time between the queues, which can be zero (the HP queue is not necessarily visited before visiting another LP queue). Let p_{i} denote the probability of jumping to queue i, s_{i} the average time it takes to switch to queue i and the average mean switchover time, then we have (cf [35]) n n ∑ ρ (i)[1 − i =1 λ (i ) σ p(i ) 1 − ρ ]EW (i ) = ρ ∑ λ (i)β (i) i =1 2(1 − ρ ) ( 2) + σ 1− ρ n ρ (i ) ∑ p(i) i =1 n −∑ ρ (i ) s(i ) + i =1 ρ 2σ n ∑ p(i)s(i) i =1 where for our model we have that λ(i)= λ(LP)= λ, ρ(i)=λτ, ρ=nλτ, β (i ) ( 2) = τ ², p(i)=1/n, s(i)=qτ /(1-q), s (i ) ( 2) =(q(q+1)τ/(1-q)² and σ =s(i) as all switchover times are equal. Here q denotes the probability of the server polling the HP node. The expression simplifies to [1 − nλqτ nλτ 2 qτn q + 1 − 2qτ ]EW ( LP) = + + (1 − q)(1 − nλτ ) 2(1 − nλτ ) (1 − q)(1 − nλτ ) 2(1 − q) and applying Little's law the average total number of customers in the queue is found again. The stability condition for this system is that nλ σ /(1- ρ)<1, as this is the number of arriving customers during the average cycle time of a queue. This can be rewritten into n< 1 − aλτ λτ where a denotes the factor of the probability of visiting the HP node next, that is P(jump to a certain LP node)=P(jump to HP node), which in this case is the probability of going on a vacation. Note that this approach can easily be extended to the situation with multiple high priority nodes, as only the probability of the server being on vacation changes, so only the values of s(i) and s (i ) ( 2) need to be adjusted. 3.4 Validation 3.4.1 General case Two nodes The following table shows the results of the algorithm compared with simulation results for different values of the arrival rates at the two queues (one HP and one LP 20 ( 2) IOP GenCom QoS for PNs at Home – D2.2 Assessment of proposed QoS protocols and mechanisms queue). The probability of moving to the HP queue is twice as high as for the LP queue for all situations. We have that q=a/(n+a) is the probability of jumping to the HP node. Rates λ(LP) λ(HP) 0.2 0.5 0.5 0.2 0.1 0.01 0.01 0.1 0.4 0.1 0.1 0.4 0.1 0.3 0.3 0.1 Simulation LP HP 0.472 1.046 1.169 0.347 0.106 0.010 0.010 0.106 0.612 0.138 0.155 0.593 0.137 0.396 0.408 0.128 Algorithm LP HP 0.506 1.009 1.205 0.311 0.106 0.010 0.011 0.105 0.617 0.132 0.171 0.578 0.147 0.385 0.409 0.124 LP 7.278 3.078 0.041 3.974 0.903 10.14 7.391 0.308 Error HP 3.538 10.412 0.517 0.490 4.343 2.460 2.726 3.534 3.4.2 Special cases Saturated low priority nodes Figure 1 shows the average waiting time of a packet in the HP queue, for different values of n, the number of saturated low priority queues in the system. The arrival rate at the HP queue is set to λ(HP)=0.01. Three lines represent the results of the model for a=2...4, where a=2 is the highest line and a=4 the lowest and the dots are the corresponding simulation results. It clearly follows from the figure that where for a sparse network (low number of LP nodes) the differentiation has hardly any effect, whereas for a dense network (high number of LP nodes) a higher priority has a bigger impact. Figure 1: Saturated LP nodes Empty and saturated high prioirity node Figure 2 shows the average waiting time of a packet in an LP queue, for different values of n. The arrival rate λ(LP) is set to 0.01. In this scenario the HP node is absent (or empty) and the whole network behaves as a standard M/D/1 queue where each separate queue has the same average behaviour. 21 IOP GenCom QoS for PNs at Home – D2.2 Assessment of proposed QoS protocols and mechanisms Figure 2: Empty HP node Figure 3 shows the situation with a saturated HP node, again for the values of a=2...4, with a=2 the lowest and a=4 the highest line, still using λ(LP)=0.01. For higher values of a, the server will more often be processing HP packets, leaving less capacity for the LP nodes. This shows from the figure as the saturation sets in for lower values of n. When the network is sparse, we see there is a high impact of the differentiation on the waiting time of the low priority packets, which diminishes slightly as the number of nodes grows. Nearing the saturation point, the impact increases again. Figure 3: Saturated HP node 3.5 Conclusion This part has studied the impact of service differentiation on the waiting time of packets of the different classes. The differentiation was made by giving different probabilities to the nodes for being allowed to transmit a packet next. The network under consideration was mapped onto a polling system, which was analyzed using polling models and queueing models with server vacations. For both saturated and non-saturated queues we have derived either expressions for the waiting time, or given an algorithm to approximate the waiting time of a packet. Simulation results have shown that for the 22 IOP GenCom QoS for PNs at Home – D2.2 Assessment of proposed QoS protocols and mechanisms saturated case the results are exact, whereas for the non-saturated case the algorithm performs well, with results mostly within a 10% error bound. The impact of the priority setting has been analyzed, which shows that by doubling the probability of visiting the HP queue compared to the LP queue deteriorates the waiting time for the LP queue and can easily lead to instability. Future work may include different TXOP limits, one other setting of the IEEE 802.11e protocol that differentiates between users. A similar analysis can be done, using for example the approach presented in [42] to determine the steady state distribution when the vacation time distribution has been determined. 23 IOP GenCom QoS for PNs at Home – D2.2 Assessment of proposed QoS protocols and mechanisms 4 An upper bound on network throughput Interference is an important aspect of wireless networks that seriously affects the capacity of the network. This is especially so in a wireless multi-hop network, where a transmission on one link interferes with transmissions on links in the vicinity. On a multihop path self-interference may result in substantial degradation of end-to-end network performance. In this respect, due to interaction among hops, multi-hop wireless networks considerably differ from wired networks thus calling for new modelling and analysis techniques that take into account interference constraints. In the absence of interference, but including capacity constraints on the transmission rate of nodes, feasibility of a set of traffic demands between pairs of nodes can be determined by considering the flow allocation in the network as a multicommodity flow problem. The network is modelled as a graph, with the vertices representing the nodes where traffic is originated, terminated or forwarded. There is an edge between vertices if the corresponding nodes are within each others transmission range. Each edge has a capacity, representing the throughput that is possible over that edge. The multicommodity flow problem then addresses the question whether there exists a set of paths and real numbers (fractions) so that: (1) for each traffic demand, there is a set of paths from the traffic source to the destination; (2) fractions of the traffic demand can be allocated to each path so that for each source-destination pair the traffic demand is realized and (3) the capacity constraints are taken into account. This part considers a generic wireless network configuration and traffic load specified via parameters such as nodes, transmission and interference ranges, as well as the traffic matrix indicating the demands between source nodes and sink nodes. We make no assumptions about the homogeneity of nodes with regard to transmission range or interference range, nor the capacity of the links. This is in contrast to previous work [46] that has focused on asymptotic bounds under assumptions such as node homogeneity and random communication patterns. In [49] a conflict graph is used to address the problem of finding a feasible flow allocation to realize demands between pairs of nodes. While the conflict graph provides a more comprehensive modelling of the scheduling problem, it is also more complicated to deal with. A detailed discussion on the relation of our work with [49] is presented in Section 4, showing that we obtain a tight upper bound for an example provided in [49]. In [50] the question of a routing algorithm to find paths satisfying the traffic demands in a distributed setting is addressed. For an LP relaxation of the interference problem, [52] presents necessary conditions for link flow feasibility. This yields an upper bound similar to that of [49]. In addition [52] introduces an edge colouring problem in which each colour at an edge represents a time slot for transmission. This problem is solved using a FPTAS, yielding a lower bound for the link flow allocation. In [53] this work is extended to multi-radio and multi-channel networks. Our work does not solve any LP's, but provides a good characterization for the feasibility of the fractional multiflow problem with interference constraints which gives a fast way of finding upper bounds for a slightly different interference constraint setting. In this part we introduce a new approach to model interference in a carrier sensing multihop wireless network. To this end, we transform the sustainable load problem into a multicommodity flow problem that we extend with interference constraints. The main theorem of this part states a condition for the feasibility of the multicommodity flow problem with interference constraints, given the demands between source and destination nodes. Using this theorem, we compute the maximal throughput between a single source 24 IOP GenCom QoS for PNs at Home – D2.2 Assessment of proposed QoS protocols and mechanisms and a single destination. We consider the following elements to be the key contribution of our work: · The use of polyhedral combinatorics (Farkas' Lemma) to obtain a structural expression for feasibility of the multicommodity flow problem with interference constraints, in terms of a `generalized cut condition' analogous to the `max-flow min-cut' theorem of Ford and Fulkerson [44]. · The generality of our framework which incorporates the following realistic effects: the transmission range is not necessarily equal to the interference range, the network may consist of mixed wired and wireless connections and wireless links have different capacities depending on distance, obstacles or transmission power. 4.1 Ad hoc interference model Ad-hoc networks use transmissions over a wireless channel to communicate between users. However, if multiple transmissions take place at the same time over the same wireless channel, transmissions may collide and the data will be lost. This interference limits the throughput of ad-hoc networks. Adopting the model of [48], we will model the interference constraints. To do so, we define the transmission range and the interference range of a node. When nodes in a wireless network want to communicate, they need to be close enough to receive each others signals. The transmission range of a node is the maximum distance from that node to where its received signal strength is insufficient for maintaining communications. Even though a signal may be too weak to be received correctly outside the transmission range, the signal can still cause interference preventing nodes from receiving other signals correctly. The interference range is the maximum distance from a node to where it prevents other nodes to maintain communications. Note that in general and in our model the transmission and interference range are not equal. In the following we adopt a graph representation (see e.g. [47],[49]) in which these ranges will be represented by arcs. Let V denote the set of nodes, A the set of arcs and let δ + (u ) denote the arcs leaving node u. In a carrier sensing network, nodes within each others interference range will avoid transmitting at the same time. We will model this as follows: Let R(v) denote the set of nodes within the interference range of node v (which includes v itself), that is: if one of the nodes in R(v)\{v} is transmitting, then v cannot receive other transmissions, nor can v transmit. Let ρ(u) denote the fraction of time that a node u is transmitting, then ∑ ρ (u ) ≤ f (v ) (1) u∈R ( v ) where f(v) denotes the interference capacity of the node. The interference capacity denotes the amount of interference a node can handle and still transmit data itself. For a wired network one could set f(v)=∞, whereas f(v)=1 ensures that no two nodes within each others interference range transmit at the same time. Taking f(v)<1 can model a loss due to for instance non-ideal CSMA/CA effects. Consider the set I(v) of all arcs leaving v, entering v and leaving the nodes that are in v's interference range: I (v) = {a | a ∈ δ + (u ), u ∈ R(v)} . (2) 25 IOP GenCom QoS for PNs at Home – D2.2 Assessment of proposed QoS protocols and mechanisms It follows that for all the arcs that are within I(v) the interference capacity f(v) may not be exceeded. In particular, if f(v)=1, simultaneous transmissions cannot take place over arcs a₁,a₂ ∈ I(v). For later use, we also introduce here a dual notion of I(v), viz. J(a), the set of vertices that experience interference by a transmission over arc a: J(a)={v ∈ V|a ∈ I(v)}. (3) Consider node v ∈ V. The interference arc set I(v) is denoted using bold arcs in Figure 1a and the set of nodes J(a) affected by arc a by the grey nodes in Figure 1b. Figure 1: I(v) and J(a) To each arc a a capacity b(a)>0 is assigned. In actual networks, due to e.g. unequal distances among nodes or external disturbances such as noise, the link capacities may be different. Consider a set of source and destination pairs (r(1),s(1)),...,(r(k),s(k)). When the net amount of flow between a source node r(i) and a destination node s(i) is d(i), we say that the value of the (r(i),s(i)) flow is d(i). For an allocation, let x{i}(a) denote the amount of traffic for source destination pair (r(i),s(i)) over link a. We will call this the flow of commodity i over arc a. To take the link capacities into account, we use the following interference constraints: x{i}(a ) ≤ f (v ) . i =1 a∈I ( v ) b( a ) k ∑∑ Note that the interference constraints indicate whether a node can receive correctly and that we assume that collisions are fatal, which is a worst case scenario as in practice caption may be possible. However, as we impose condition (3) on all nodes, for a transmission over link (u,v) to be successful, we have that (3) must hold for both u and v, so both sender and receiver must be free of interference. This closely resembles the behaviour of IEEE 802.11 under RTS-CTS, where both sender and receiver must be free of interference, see e.g. [54]. For a successful communication, the sender must be able to hear the link layer acknowledgement transmitted by the receiver. 26 IOP GenCom QoS for PNs at Home – D2.2 Assessment of proposed QoS protocols and mechanisms 4.2 The extended multicommodity flow problem The multicommodity flow problem (MCFP) describes the problem of finding an allocation of flows over links such that all flows are transferred from their source to their destination, without exceeding the capacity of the links. The multicommodity flow problem with interference constraints is as follows. Given a graph G(V,A), with link capacities b:A→ℝ⁺, interference capacities f:V→ℝ⁺ and source and destination pairs (r(1),s(1)),...,(r(k),s(k)) with demands d(1),...,d(k) ∈ ℝ⁺, find for each i=1,...,k an (r(i),s(i)) flow x{i} ∈ ℝ₊{|A|} of value d(i), where x{i}(a) is the amount of traffic of commodity i sent via arc a, and so that for each arc a∈ A and vertex v ∈ V the capacity and interference constraints are met. Let δ + (U ) ={a=(u,v) ∈ A|u ∈ U,v ∉U} and δ − (U ) ={a=(u,v) ∈ A|u∉U,v ∈ U} so that δ + (v) and δ − (v) denote the arcs leaving and entering node v respectively. Our multicommodity flow problem with interference constraints has the following feasibility constraints: k ∑ x{i}(a) ≤ b(a), ∀a ∈ A (4) i =1 ∑ x{i}( a) = a∈δ + ( v ) (5) a∈δ − ( v ) ∑ x{i}( a) − ∑ x{i}(a ) − a∈δ + ( r ( i )) a∈δ + ( s ( i )) ∑ x{i}(a), ∀v ∈ V , v ≠ r (i), s(i) ∑ x{i}(a) = d (i), ∀i (6) ∑ x{i}(a) = −d (i), ∀i (7) a∈δ − ( r ( i )) a∈δ − ( s ( i )) x{i}(a ) ≤ f (v ) i =1 a∈I ( v ) b( a ) k ∑∑ (8) Equation (4) shows the capacity constraints on the arcs, equation (5) assures flow conservation, i.e. for each node the flow in must equal the flow out, and (6) and (7) define that the demands leaving the source and entering the destination. Note that (7) is redundant as it follows from (5) and (6), but is included here for completeness. Equation (8) is our interference constraint. Equations (4)-(7) define the multicommodity flow problem in its standard form, that is included in our formulation by setting the interference capacities of all nodes to infinity, that is f(v)=∞ for all v ∈ V. We now formulate a generalized cut condition for the multicommodity flow problem with interference constraints, so including (8). To this end, define length functions l:A→ℝ⁺ on all arcs and interference functions w:V→ℝ⁺ on all nodes. For a given length function l:A→ℝ⁺ and interference function w:V→ℝ⁺, let dist{l,w}(r(i),s(i)) denote the distance function that incorporates both the length and interference, where the distance of a path is built up of the distance q{l,w}(a) of the arcs in the path as follows 27 IOP GenCom QoS for PNs at Home – D2.2 Assessment of proposed QoS protocols and mechanisms q{l.w}( a ) = l (a ) + (9) w(t ) t ∈J ( a ) b ( a ) ∑ q{l , w}( P ) = ∑ q{l , w}( a ) (10) dist{l , w}( r , s ) = min q{l , w}( P) (11) a∈P P∈P{ r , s} with J(a) as in (2) and P{r,s} the set of all paths from r to s. Theorem: The multicommodity flow problem with interference constraints is feasible, if and only if for all length functions l:A→ℝ⁺ and node interference functions w:V→ℝ⁺ it holds that k ∑ d (i)dist{l , w}(r (i), s(i)) ≤ ∑ l (a)b(a) + ∑ w(v) f (v) i =1 a∈ A (12) v∈V The proof of Theorem 1 is given is omitted here. The interference function w(v) is a dual variable that can be interpreted as the price paid for a unit of the interference capacity of a node v, which gives a weighted cut of the nodes by chosing the values of w(v) to be zero or not (likewise the length function l(a) can be interpreted as the price paid for a unit of capacity of an arc a, which also gives a weighted cut of the arcs). The distance of an arc is then the price paid for the capacity of that arc, together with the price paid for the interference capacity used by that arc for a flow unit. Note that our theorem is an extension of the cut condition for the multicommodity flow problem (without interference). This can be seen as follows. Setting all interference capacities to a very large value the condition of Theorem 1 reduces to k ∑ d (i)dist{l}(r (i), s(i)) ≤ ∑ l (a)b(a) i =1 a∈ A as the inequality only makes sense for w=0. The cut condition by setting a length of 1 to all arcs in a cut and zero otherwise for the multicommodity flow problem states that ∑ b( a ) ≥ a∈δ + (U ) ∑ d (i) . r ( i )∈U s ( i )∉U This cut condition is necessary for the existence of a solution, but not sufficient. The max-flow min-cut theorem states that if k=1, for every network, there exists a flow (maxflow) for which the amount is equal to the total capacity of the smallest cut in the network (min-cut), see Ford and Fulkerson [44]. A direct consequence of Theorem 1 is that when there is only one commodity, a bound on the throughput d of the network can be determined by d= ∑ l (a)b(a) + ∑ w(v) f (v) a∈ A v∈V dist{l , w}( r , s ) . 28 IOP GenCom QoS for PNs at Home – D2.2 Assessment of proposed QoS protocols and mechanisms When there are multiple commodities with demands d(1),...,d(k), Theorem 1 can determine the maximal value 0 ≤ λ ≤ 1 such that for all commodities a throughput of d(i) can be achieved using λ= ∑ l (a)b(a) + ∑ w(v) f (v) a∈A k v∈V ∑ d (i)dist{l , w}(r (i), s(i)) . i =1 4.3 Examples We can consider the network as depicted in Figure 2 as nodes in a network, connected by links using 802.11b with a maximum transmission rate of 11 Mbit/s, but with link 3 having a bad connection, due to distance or a disturbance, only reaching the minimal transmission rate of 5.5 Mbit/s. Figure 2: Series of nodes with capacity constraints We want to transmit data from node 1 to node 5. If we solve for the best solution without considering interference, it is clear that we can send at a speed of 5.5 Mbit/s, as this is limited by the slowest link. The interference constraints for the network with identical link capacities would imply that all links can be used one third of the time, leading to an overall throughput of 1.83 Mbit/s when considering the constraints separately. For the example of Figure 2 we have the interference constraints x (1) x (2) x (3) + + ≤1 11 11 5 .5 x(2) x (3) x(4) + + ≤1 11 5 .5 11 From a direct solution of (4)-(8) it follows that x(a)=2.75 is a feasible solution, higher than the earlier claimed 1.83 Mbit/s. Using Theorem 1, we find that 2w(1) + 4w(2) + 4w(3) + 3w(4) + w(5) ≤ 11 11l (1) + 11l (2) + 5.5l (3) + 11l (4) + w(1) + w(2) + w(3) + w(4) + w(5) d (1)(l (1) + l (2) + l (3) + l (4) + which gives by taking the cut w(3)=1 and all other values (including l(i)) equal to zero 4/(11)d(1) ≤ 1. So x(a)=2.75 is also the optimal solution. The value now found for x(a) can be interpreted as the fraction of time a link is in use multiplied by the transmission rate of the link. This shows that links one, two and four get a quarter of the time, whereas link three gets half of the time. So when considering four slots, link one, two and four each get one slot (where link one and four use the same slot!) and link three the other two. This way we 29 IOP GenCom QoS for PNs at Home – D2.2 Assessment of proposed QoS protocols and mechanisms have an accurate representation of the network incorporating both the capacity and interference constraints, together with the flow conservation laws. We now consider the more sophisticated network used in [49] as depicted in Figure 3, where all arcs have capacity 1. Figure 3: 3x3 grid The upper bound on the throughput from node 0 to node 8 for this network obtained in [49] is 0.667, opposed to the optimal 0.5, even though their algorithm has discovered all possible cliques in the conflict graph. Using Theorem 1 and taking the cut w(1)=w(3)=1 or w(4)=1 gives the lowest upper bound that can be achieved, resulting in d(1) ≤ 0.5, which is tight. The reason we obtain a different result than in [49] is that we use constraints for all nodes, so that considering for example node 0 we have that x(3)+x(9) ≤ 1, as both signals reach node 0. In the approach of Jain et al., arcs 3 and 9 are not connected in the conflict graph, as a simultaneous transmission over both arcs is possible. There is an interesting relation between the approach presented in this paper and the results of [49]. Jain et al. use a conflict graph to determine lower and upper bounds for the throughput of the network. The conflict graph C has vertices corresponding to the arcs in the transmission graph, where there is an edge between two arcs if and only if the arcs are not allowed to transmit simultaneously. In our approach, C has as vertex set A, where there is an edge between a(i) and a(j) (for some 1 ≤ i,j ≤ |A|) if and only if ∃v ∈ V s.t. a(i),a(j) ∈ I(v). Note that I(v) defines a clique in C for each v in V. In fact, our interference model adopted here resembles the protocol model of [49], but it is `stronger' in the sense that for the same network, we have more interference constraints (edges in the conflict graph) than [49]. In [49] it is shown that a vector x(i):A→ℝ⁺ (corresponding to a flow i), can be scheduled without interference conflicts if and only if x(i) lies in the stable set polytope of C. (The stable set polytope is the convex hull of the incidence vectors of the stable sets in the graph). It is well-known that the stable set polytope is contained in the fractional stable set polytope. (The fractional stable set polytope is defined by all constraints indicating that the total flow in a maximal clique in the conflict graph is at most 1.) In this paper, instead of first defining the conflict graph C and then discovering its cliques, we directly formulate inequalities corresponding to the cliques I(v) for all v ∈ V. The polytope defined by these inequalities will therefore contain the fractional stable set polytope. As a result, the upper bound obtained here cannot always be achieved using a flow allocation without interference conflicts. 30 IOP GenCom QoS for PNs at Home – D2.2 Assessment of proposed QoS protocols and mechanisms 4.4 Conclusion In this part we considered multi-hop wireless networks, for which we have stated a theorem giving a necessary and sufficient condition for the existence of a solution for the multicommodity flow problem with interference constraints, given a required throughput between nodes of the network. By extending the multicommodity flow problem with interference constraints, while still considering the capacity of the links, we have constructed an LP formulation for assigning flows to links to achieve the required throughput between certain nodes in the network. Using Farkas' Lemma, we have developed the corresponding general cut condition which gives an upper bound on the throughput that can be achieved in the network, given the source-destination pairs. The upper bounds are found by defining a cut, where the best cut will give a tight bound on the throughput, analogous to the max-flow min-cut theorem for the multicommodity flow problem. Several examples illustrate the use of the theorem in finding the optimal throughput for some simpler networks. The applicability of this work for wireless multi-hop networks can for example be seen when designing a network that must be able to support a certain throughput for each user. Another possible application is for admission control, as our necessary and sufficient condition determines when adding a commodity will no longer result in a feasible solution using the same cutvector. If for any cutvector the condition does not hold, there exists no feasible solution for adding the commodity. If the cutvector however does not show infeasibility, this is no guarantee for feasibility as a different cutvector may give a tighter result for the situation with the added commodity. Due to the general nature of the theorem, any type of network with heterogeneous users and protocols can be modelled. 31 IOP GenCom QoS for PNs at Home – D2.2 Assessment of proposed QoS protocols and mechanisms 5 Conclusion In this document various topics are discussed for the refinement of QoS protocols and mechanisms for Personal Networks. These topics build on the various routing protocols, and QoS mechanisms for ad hoc networks, as presented in the previous deliverable. Advantages and disadvantages of searching strategies are discussed. In compliance with the notion of QoS as presented in an earlier deliverable, an analysis has been made of the impact of QoS differentiation on the waiting time of packets in a network with different classes of customers. Finally, a theorem is stated providing insight in the ability o a network to accommodate a certain demand by the users. This theorem can also be used to derive an upper bound on the total throughput a network can achieve. All these topics provide insight in how to refine QoS protocols and mechanisms, taking into consideration the advantages and limitations of the currently available ones. 32 IOP GenCom QoS for PNs at Home – D2.2 Assessment of proposed QoS protocols and mechanisms 6 References [1] B.J. Kim, C.N. Yoon, S.K. Han and H. Jeong, Path finding strategies in scale-free networks, Physical Review E, vol. 65, 2002. [2] M. Castro, M. Costa and A. Rowstron, Peer-to-peer overlays: structured, unstructured or both?, Technical Report MSR-TR-2004-73, 2004. [3] Y. Chawathe, S. Ratnasamy, L. Breslau, N. Lanham and S. Shenker, Making Gnutella-like P2P Systems Scalable, Proc. SIGCOMM Conference, 2003. [4] Q. Lv, P. Cao, E. Cohen, K. Li and S. Shenker, Search and Replication in Unstructured Peerto-Peer Networks, Proc. 16th ACM International Conference on Supercomputing, 2002. [5] S. Dolev, E. Schiller and J. Welch, Random Walk for Self-Stabilizing Group Communication in Ad-Hoc Networks, Proc. 21st Symposium on Reliable Distributed Systems, 2002. [6] J. Jonasson, On the cover time of random walks on random graphs, Combinatorics, Probability and Computing, 7, pp. 265-279, 1998. [7] M. Mihail, A. Saberi and P. Tetali, Random Walks with Lookahead in Power Law Ranom Graphs, Internet Mathematics, 2006. [8] L. Lovász, Random Walks on Graphs: A Survey, Combinatorics, Paul Erd˝os is Eighty (Volume 2), János Bolyai Mathematical Society Budapest, pp. 353-398, 1996. [9] L. A. Adamic, R. M. Lukose, A. R. Puniyani and B. A. Huberman, Search in power-law networks, Physical Review E, vol. 64, 2001. [10] H. P. Thadakamalla, R. Albert and S. R. T. Kumara, Search in weighted complex networks, Physical Review E, vol. 72, 2005. [11] F. R. K. Chung, Spectral Graph Theory, CBMS Conference on Recent Advances in Spectral Graph Theory, 1994. [12] B. Bollobas, Random Graphs, Academic Press, 1985. [13] S. Valverde and Ricard V. Solé, Internet’s Critical Path Horizon, Eur. Phys. J. B. 38, pp. 242-252, 2004. [14] C. Gkantsidis, M. Mihail and A. Saberi, Random walks in peer-to-peer networks: Algorithms and Evaluation, Performance Evaluation 63, pp. 241-263, 2006. [15] P. Van Mieghem, Performance Analysis of Communication Networks and Systems, Cambridge University Press, 2006. [16] D. J. Aldous and J. A. Fill, Reversible Markov chains and Random walks on graphs, (monograph in preparation). [17] C. Gkantsidis, M. Mihail and A. Saberi, Hybrid search schemes for unstructured peer-topeer networks, Proc. IEEE INFOCOM, 2005. [18] R. Hekmat and P. Van Mieghem, Degree Distribution and Hopcount in Wireless Ad-hoc Networks, Proc. 11th IEEE International Conference on Networks, 2003. 33 IOP GenCom QoS for PNs at Home – D2.2 Assessment of proposed QoS protocols and mechanisms [19] Z. Bar-Yossef, R. Friedman and G. Kliot, RaWMS- Random Walk based Lightweight Membership Service for Wireless Ad Hoc Networks, Proc. MobiHoc, pp. 238-249, 2006. [20] S.S. Dhillon and P. Van Mieghem, Comparison of Random Walk strategies for Ad-hoc Networks, Proc. 6th Annual Mediterranean Ad Hoc Networking Workshop, pp.204-211, 2007. [21] C. Cooper and A. Frieze, Crawling on web graphs , Proceedings of the thiry-fourth annual ACM symposium on Theory of computing, pp. 419 - 427, 2002. [22] N. Bisnik and A. A. Abouzeid, Optimizing Random Walk Search Algorithms in P2P Networks, Computer Networks, 2006. [23] S.R. Das, C.E. Perkins and E. E. Royer, Performance Comparison of Two On-Demand Routing Protocols for Ad Hoc Networks, Proc. INFOCOM, pp. 3-12, 2000. [24] C. Cooper and A. Frieze, The cover time of the preferential attachment graph, Journal of Combinatorial Theory, Series B 97, 269-290. [25] A. BarabÁsi, R. Albert and H. Jeong, Mean-field theory for scale-free random networks, PhysicaA 272, pp. 173-187, 1999. [26] G.F. Lawler, O. Schramm and W. Werner, On the scaling limit of planar self-avoiding walk , Proc. Symposium Pure Math., 72, Part 2, Amer. Math. Soc., Providence, RI, 2004. [27] S.S. Dhillon and P. Van Mieghem, Performance analysis of the AntNet algorithm, Computer Networks, vol 51, Issue 8, pp. 2104-2125, 2007. [28] Bianchi, G., Performance analysis of the IEEE 802.11 distributed coordination function, IEEE Journal on Selected Areas in Communications, vol. 18, nr. 3, 535-547, 2000. [29] Litjens, R., Roijers, F., van den Berg, J.L., Boucherie, R.J. and Fleuren, M., "Performance analysis of Wireless LANs: An integrated packet/flow level approach", Proceedings of the 18th International Teletraffic Congress, Berlin, Germany, 651-660, 2003. [30] Miorandi, D. and Zanella, A., Performance Analysis of Limited-1 Polling in a Bluetooth Piconet, Proceedings of PIMRC '04, Barcelona, Spain, 2004. [31] Zussman, G., Yechiali, U. and Segall, A., Exact Probabilistic Analysis of the Limited Scheduling Algorithm for Symmetrical Bluetooth Piconets, Proceedings of PWC '03, Venice, Italy, 2003. [32] Levy, H., Polling Systems: Applications, Modeling, and Optimization, IEEE Transactions on Communications, vol. 38, no. 10, 1990. [33] Cheung, S-K., van den Berg, J. and Boucherie, R.J., Decomposing the queue length distribution of processor-sharing models into queue lengths of permanent customer queues, Performance Evaluation, vol. 62, 100-116, 2005. [34] Fuhrmann, S.W., A Note on the M/G/1 Queue with Server Vacations, Operations Research, vol. 32, no. 6, 1368-1373, 1984. [35] Boxma, O.J. and Weststrate, J.A., Waiting times in polling systems with Markovian server routing, Informatik-Fachberichte, vol. 218, 89-104, 1989. 34 IOP GenCom QoS for PNs at Home – D2.2 Assessment of proposed QoS protocols and mechanisms [36] Hadzi-Velkov, Z. and Spasenovski, B., Capture effect in IEEE 802.11 Wireless LANs, Proceedings of IEEE ICWLHN '01, Singapore, 2001. [37] Wu, H. et al., Performance of reliable transport protocol over IEEE 802.11 wireless LAN: Analysis and enhancement, Proceedings of IEEE INFOCOM '02, New York, USA, 2002 [38] Engelstad, P.E. and Østerbø, O.N., Non-Saturation and Saturation Analysis of IEEE 802.11e EDCA with Starvation Prediction, Proceedings of ACM MSWiM '05, Montreal, Canada, 2005. [39] Zhu, H. and Chlamtac, I., An Analytic Model for IEEE 802.11e EDCF Differential Services, Proceedings of IEEE ICCCN '03, Dallas, USA, 2003. [40] Fuhrmann, S.W. and Cooper, R.B., Stochastic decompositions in the M/G/1 queue with generalized vacations, Operations Research, vol. 33, 1117--1129, 1985. [41] Groenendijk, W.P., Conservation laws in polling systems, Ph.D. Thesis, University of Utrecht, 1990. [42] Kramer, M., Stationary distributions in a queueing system with vacation times and limited service, Queueing Systems, vol. 4, 57-68, 1989. [43] Cooper, R.B., Introduction to queueing theory, Elsevier North Holland Inc., 1981. OMM91 : Ommeren, van J.C.W., The discrete-time single-server queue, Queueing Systems, vol. 8, no. 1, 279-294, 1991. [44] Ford, L.R. and Fulkerson, D.R., Maximal flow through a network, Canadian Journal of Mathematics, vol. 8, p 399-404, 1956. [45] Ford, L.R. and Fulkerson, D.R., Flows in Networks, Princeton University Press, Princeton, NJ, 1962. [46] Gupta, K. and Kumar, P.R., The capacity of wireless networks, IEEE Transactions on Information Theory, 46(2), p 388-404, 2000. [47] Gupta, R., Musacchio, J. and Walrand, J., Sufficient rate constraints for QoS flows in ad-hoc networks, UCB/ERL Technical Memorandum M04/42, 2004. [48] Haan, R. de, Boucherie, R.J. and Ommeren, J-K. van, Modelling multi-path signal interference in ad-hoc networks, Technical Memorandum, Dep. of Applied Mathematics, University of Twente, 2006. [49] Jain, K., et al., Impact of interference on multihop wireless network performance, Proc. of ACM Mobicom 2003, p 66-80, 2003. [50] Jia, Z., et al, Bandwidth guaranteed routing for ad-hoc networks with interference constraints, Proc. of ISCC, 2005. [51] Johansson, T. and Carr-Motyckova, L., Reducing interference in ad-hoc networks through topology control, Proc. of DIALM-POMC '05, p 17-23, 2005. [52] Kodialam, M. and Nandagopal, T., Characterizing achievable rates in multihop wireless networks: The joint routing and scheduling problem, Proc. of ACM Mobicom 2003, p 42-54, 2003. [53] Kodialam, M. and Nandagopal, T., Characterizing the capacity region in multi-radio multichannel wireless mesh networks, Proc. of ACM Mobicom, 2005. 35 IOP GenCom QoS for PNs at Home – D2.2 Assessment of proposed QoS protocols and mechanisms [54] Litjens, R., et al, Analysis of flow transfer times in IEEE 802.11 wireless LANs, Annales de télécommunications, vol. 59, p 1407-1432, 2004. [55] Rickenbach, P. von, et al., A robust interference model for wireless ad-hoc networks, Proc. of IPDPS'05, vol. 13, p 239.1, 2005. [56] Schrijver, A., Combinatorial Optimization: Polyhedra and efficiency, Springer, Berlin, 2003. 36 IOP GenCom QoS for PNs at Home – D2.2 Assessment of proposed QoS protocols and mechanisms Appendix A. ACRONYMS ABR Associativity Based Routing AMRoute Ad Hoc Multicast Routing Protocol AODV Ad Hoc On Demand Distance Vector Routing BB Black Burst BF Bellman-Ford Algorithm BPS Batch-arrival Processor Sharing CGSR Cluster Gateway Switch Routing CSMA/CA Carrier Sense Multiple Access with Collision Avoidance DCF Distributed Control Function DPS Discriminatory Processor Sharing DSDV Destination Sequence Distance Vector Routing DSR Dynamic Source Routing FGMP Forwarding Group Multicast Protocol GPSR Greedy Perimeter State Routing IEEE Institute of Electrical and Electronics Engineers IP Internet Protocol LAPAR Location Aided Power Aware Routing LAR Location Aided Routing MAC Medium Access Protocol MACA/PR Multiple Access with Collision Avoidance with Piggyback Reservation MACAW Media Access Protocol for Wireless LAN's MCEDAR Multicast Core-Extraction Distributed Ad Hoc Routing Protocol ODMRP On-Demand Multicast Routing Protocol OSPF Open Shortest Path First PAMAS Power Aware Multi Access Protocol with Signaling PAN Personal Area Network PARO Power-Aware Routing Optimization Protocol PN Personal Network 37 IOP GenCom QoS for PNs at Home – D2.2 Assessment of proposed QoS protocols and mechanisms QoS Quality of Service RTS/CTS Request / Clear To Send SAMCRA Self Adaptive Multiple Constraints Routing Algorithm SSR Signal Stability Routing Protocol TORA Temporally Ordered Routing Algorithm WLAN Wireless Local Area Network WRP Wireless Routing Protocol ZRP Zone Routing Protocol 38