Towards Ethernet-based wireless mesh networks for fast moving users

advertisement
Towards Ethernet-based wireless mesh networks for fast moving users
Filip De Greve, Wim Vandenberghe,
Filip De Turck, Ingrid Moerman and Piet Demeester
Ghent University - IBBT - IMEC - Department of Information Technology
Gaston Crommenlaan 8 - bus 201, 9050 Gent, Belgium.
Email: {Filip.DeGreve,Wim.Vandenberghe}@intec.ugent.be
Abstract
In this paper we examine the capabilities of Switched
Ethernet for building wireless mesh networks (WMNs) and
more specific for the support of fast moving users. We will
motivate that Switched Ethernet with wireless extensions is
a promising auto-configurable WMN technology. An inherent Ethernet feature, topology modification according to the
actual link rates, will be used to avoid poor wireless links
in the active topology. We demonstrate that fast recovery
is feasible in a WMN by extending the standard spanning
tree protocols. Simulations and analytical results will reveal some basic differences if the wired links of Switched
Ethernet are replaced by wireless links and this leads to a
parameter evaluation of the IEEE 802.11e protocol for optimizing the bandwidth usage of the wireless medium.
1
1.1
Introduction
Motivation
Nowadays, a lot of multimedia applications are taken for
granted in fixed networks. These applications require a high
level of Quality of Service (QoS) and are generally characterized by high bandwidth requirements which can currently only be offered by fixed broadband access technologies. In previous work [1] we presented a network architecture which was designed to cope with the specific requirements of delivering broadband traffic to fast moving users.
The aggregation part of this architecture deployed Layer 2
Ethernet techniques and this paper explores the possibilities
of extending Ethernet-based architectures towards wireless
mesh environments. The choice for wireless Ethernet networks will be detailed in the next section. However, in general a lot of challenges have to be tackled before wireless
mesh networks will have a similar throughput or QoS experience as can be expected in a wired environment [2]. Despite the inherent vulnerability of the wireless technology
for all kinds of interference wireless mesh networking will
become important in access and aggregation networks. It is
expected that network installation costs will be lower than
the wired equivalent. WMNs diminish the amount of necessary cables and save on expensive digging costs. In this
paper, we focus on IEEE 802.11 (also known as Wifi) but
promising future technologies such as WiMax which developed a mobile extension of the standard (IEEE 802.16e),
could also be used for mesh networking.
1.2
Related work
Currently, a lot of research defines wireless mesh networks from scratch, proposing their own architecture and
routing protocols. They mostly aim for deployment in
aggregation networks because in this area mesh networks
seem the most promising at this time. While many propose
tree-like architectures [3–5], surprisingly almost no publications seem to be exploring the capabilities of Switched
Ethernet in the wireless mesh. However, why develop a
brand new protocol, if modifications to existing protocols
can behave similarly? Shorter development times and easier acceptance due to the familiarity are straight-forward
additional benefits. In addition, Ethernet is well suited
for the problem statement with fast moving users due to
the fact that Layer 2 forwarding mechanisms can rapidly
adapt to new locations of moving users. Moreover, wireless mesh networks will look like tree-structures where the
root acts as a gateway towards the wired backbone and with
dominant communication between root and leafs. In [3] a
new tree construction algorithm is presented and leaf-leaf
communication is not supported by the architecture. In
Ethernet-based networks leaf-leaf communication will naturally be supported. In [4, 5] good methods for channel assignment and load balancing are presented. [4] presents a
new, yet basic, tree construction technique which is similar
to the IEEE 802.1D spanning tree (ST) protocol. The loadsensitive path weight functions may however cause network
instabilities because they are depending on traffic variations
Proceedings of the 32nd EUROMICRO Conference on Software Engineering and Advanced Applications (EUROMICRO-SEAA'06)
0-7695-2594-6/06 $20.00 © 2006
which may be very large and irregular in WMNs. Therefore,
[5] suggests topology-dependent path weight functions that
base weights on topological properties such as hop count or
link capacity. However, both use load-dependent distributed
algorithms which take time to converge, while fast changing
traffic characteristics are never considered.
1.3
Wired backbone
SGW
Wireless
Mesh
Network
WGW
Contribution
WLAN
WLAN
WLAN
In this paper we examine infrastructure-based mesh networks and we will show that extended Switched Ethernet is
a promising WMN technology. Therefore, we present the
necessary modifications which enable efficient Ethernetbased WMNs. If Switched Ethernet would be deployed
with wireless links, some basic but important performance
differences can be derived. This leads to a parameter optimization of IEEE 802.11e (i.e. the priority handling extension of standard IEEE 802.11) to ensure efficient bandwidth usage. In a test bed environment we illustrate how
Ethernet-based WMNs can automatically adapt their topology in coordination with a link rate adaptation protocol. Because trees are not constructed based on the shortest path to
the root but on the widest path to the root, poor wireless
links are automatically avoided by the active topology. We
also prove that wireless recovery can be as fast as wired recovery without important drawbacks.
system shortly before train traffic will effectively be using
a VLAN tunnel at the next WGW on its track. This paper
won’t detail this reservation mechanism but all the necessary alterations of the distributed Ethernet mechanisms in
order to enable efficient Ethernet-based WMNs. The next
section discusses the performance differences if wired links
are replaced by wireless links and parameter optimizations
of the wireless medium for WMNs.
2
3
Figure 1. Wireless aggregation networks for
fast moving users
Aggregation network architecture
The architecture (presented in Fig. 1) aims at aggregation networks where typically a lot of leave nodes require
connectivity from and to a limited set of service gateways
(SGWs). The leave nodes are connecting one or more trackside WLANs; these leave nodes are called WLAN gateways (WGWs). Users can connect to the closest WGW.
With the current BW limitations of IEEE 802.11 WMNs
a wired backbone is still indispensable. If multiple gateways towards the backbone are geographically spread, loadbalancing techniques can increase the mesh throughput significantly. Every SGW will be root of a one or more ST
instances and WMN nodes will be member of multiple ST
instances. Our architecture will be optimised for root-leaf
traffic but leaf-leaf communication will still be possible
without necessarily passing the root node. In a wired aggregation network bandwidth guarantees are delivered by
means of VLAN (Virtual LAN) tunnels and an associated
Layer 2 reservation protocol [1]. The Layer 2 reservation
mechanism enables to maintain an up-to-date view of the
resource usage at all times. This view can be used by the
central management that handles the fast moving aspect by
reserving for every moving vehicle the best path towards the
WGW. In order to have continuous bandwidth guarantees
the reservation system has to be activated by the centralized
Wired Ethernet vs. Wireless Ethernet
The range of current WMN systems can be situated
between the following two extremes: single-frequency
WMNs and multi-channel WMNs with directional antennas. For single-frequency systems WMN collisions can
occur with every transmission of nodes within interference range. This deployment has great resemblance with
half-duplex Shared Ethernet with its Ethernet collision domains (CSMA/CD or Carrier Sense Multiple Access with
Collision Detection) and bus systems. Shared Ethernet
(the oldest and original Ethernet standard) was specifically
designed for local area networks (LAN) but the lack of
QoS and throughput limitations due to shared resources
were reasons to deploy full-duplex Switched Ethernet. In
this standard dedicated point-to-point links are introduced
which are able to transport traffic in two directions at the
same time. These same reasons are driving the extension of
WMNs with multiple interfaces and multiple channels. At
the other end of the spectrum multi-channel WMNs with directional antennas are practically able to eliminate all interlink interference. This is an equivalent of wired Switched
Ethernet except for the fact that wireless links remain halfduplex because a single interface cannot send and receive
at the same time. In practice, a WMN will be situated in
between these two extremes: collisions will be reduced but
2
http://folk.uio.no/paalee/
Proceedings of the 32nd EUROMICRO Conference on Software Engineering and Advanced Applications (EUROMICRO-SEAA'06)
0-7695-2594-6/06 $20.00 © 2006
47.4
it remains hard (or expensive) to eliminate all interference.
Undoubtedly, future WMNs will have more and more similarities with Switched Ethernet networks due to the inherent limitations of shared media. Therefore, we focus in this
section on basic but important performance differences if
Switched Ethernet would be deployed with wireless links.
Wired Switched Ethernet has following features: (i) autoconfiguration, (ii) self-recovery, (iii) full duplex links, (iv)
priority queuing, (v) constant bandwidth, (vi) fixed link rate
and (vii) proportional fairness.
The first two features, auto-configuration and selfrecovery, are partly responsible for the popularity of Ethernet and must clearly be maintained in the wireless Ethernet
architecture (see Section 4). The spanning tree protocol is
basically responsible for these two features. The spanning
tree organises the nodes in a forwarding topology which allows nodes to automatically join. The active topology must
be absolutely free of loops which is crucial for correct Ethernet forwarding. In case of failures a new spanning tree
topology is formed. The original standard used the legacy
IEEE 802.1D Spanning Tree Protocol (STP) to maintain a
loop free topology. Enhancement of the recovery times has
been addressed by introduction of the IEEE 802.1W Rapid
Spanning Tree Protocol (RSTP). Finally, IEEE 802.1s Multiple Spanning Tree Protocol (MSTP) was introduced which
maintains multiple trees instead of a single tree. Because all
links can now be used in the network (instead of at most N1 links in an network of N nodes), the bandwidth efficiency
of IEEE 802.1D/W Ethernet networks is improved.
Full duplex links (iii) can only be created if upand downstream traffic are decoupled by using separate
interfaces on different non-interfering channels. However, in practice this option doesn’t seem feasible due
to the limited range of available non-interfering channels. IEEE 802.11b/802.11g standards provide 3 nonoverlapping channels while IEEE 802.11a provides 12 nonoverlapping channels. Priority queueing in wireless networks will be discussed in Section 3.3. The final three features - (v), (vi) and (vii) - are quite straight-forward features for full-duplex links. However, we should be aware
that constant bandwidth or fixed link rate are non-existent
in wireless environment as will be explained in this section.
The proportional fairness problem will be discussed in Section 3.2.
3.1
47.2
Effective BW usage (%)
47
46.8
46.6
46.4
46.2
46
45.8
45.6
0
10
1
10
2
factor α
10
3
10
Figure 2. Effective BW usage at the drop off
point (relative to the link rate) as a function of
the factor α of the dominant source.
ance (CSMA/CA). The default transmission scheme requires positive acknowledgement of every successfully received packet by the destination station. Retransmission of
not-acknowledged packets is handled with binary exponential backoff rules. The QoS-extension of DCF, the enhanced
distributed channel access (EDCA) of IEEE 802.11e, permits up to 4 access categories (ACs) at each wireless interface. Each AC i has its own wireless access parameters such as initial backoff window (Wi,init ), retransmission
limit (Ri,max ) and arbitration interframe space (AIF Si ).
Also the factor σi which is used for increasing the window
size after frame collisions is differentiated. Each AC behaves roughly as a single DCF interface but each AC has its
own backoff counter and internal collisions are handled by
a virtual collision handler based on priority: the contending
AC with highest priority gains access to the medium and
other contending ACs go into the backoff phase. If one AC
has a smaller Wi,init , smaller AIF Si or smaller Ri,max ,
the AC has a better chance of accessing the medium earlier.
3.2
Proportional fairness
Proportional fairness is achieved if the available bandwidth in a medium is proportionally distributed according
to the traffic loads of the different flows. In Switched Ethernet temporary packet losses during bursty periods will be
shared proportionally amongst the different flows assuming
equal packet lengths. However, in a wireless medium this
is no longer true. Opnet-simulations can reveal this unfairness. We simulated 4 wireless senders with a single dominant node which sends 3 times more traffic than the other
nodes (with equal packet size). We will note this factor as
α. If traffic load is increased proportionally, the dominant
source will drop off at a certain point while the other nodes
IEEE 802.11 specifics
The 802.11 standard includes two medium access mechanisms: a mandatory contention-based channel access function and an optional centrally controlled access function.
We will only discuss the first one: the distributed coordination function (DCF). DCF is a random access scheme
based on carrier-sense multiple access with collision avoid3
Proceedings of the 32nd EUROMICRO Conference on Software Engineering and Advanced Applications (EUROMICRO-SEAA'06)
0-7695-2594-6/06 $20.00 © 2006
50
will continue increasing their throughput. We call this point
the drop off point. Further traffic load increase leads to complete saturation where all traffic flows end up with an equal
share of the wireless medium. Ideally a mesh reservation
system should try to avoid saturation and maximize the resource usage up to the drop off point. The drop off point as
a function of α is shown in Fig. 2. For increasing α (< 8)
the BW usage will mainly increase while for higher α (≥ 8)
the BW usage will start decreasing again and will saturate
to 46.068% of the link rate. This saturation is noticeable
at α-values higher than 200. The saturation value equals
the effective BW usage of a saturated medium with a single
sender (= 46.073%). This means that for high α values nondominant sources no longer influence the total BW usage.
The absolute α-dependency of the drop off point remains
limited but it accentuates the irregularities in wireless BW
usage that may occur under various conditions.
3.3
Total bandwidth without QoS
Total bandwidth with QoS (Xiao)
Bandwidth QoS class 0 (Xiao)
Bandwidth QoS class 1 (Xiao)
Bandwidth QoS class 2 (Xiao)
Total bandwidth with QoS (Paal)
Bandwidth QoS class 0 (Paal)
Bandwidth QoS class 1 (Paal)
Bandwidth QoS class 2 (Paal)
45
Effective BW usage (%)
40
35
30
25
20
15
10
5
0
1
2
3
4
5
6
7
Initial size of the backoff window
Figure 3. Total effective BW usage and BW
usage per AC as a function of the W0,init .
IEEE 802.11e parameter optimization
systems would just further favor the highest QoS classes
which is not relevant in this study. Keep in mind that this
model is developed for WLANs and that a similar exact
model for mesh networks does not exist. However, under
saturation conditions this model can still be used for optimizing the wireless access parameters. The parameter n
indicating the amount of senders which are interfering, can
simply be derived in a WLAN, namely the amount of stations in range of the access point. In multi-hop networks the
number of interfering stations is different for every node.
The parameter n is chosen by selecting the bottleneck link
in the mesh topology and counting all senders in the same
frequency range which can interfere transmission on this
link. This link can be found easily and is typically located
close to the aggregation gateway where efficient BW usage
is the most critical and saturation is most likely to occur.
In Ethernet the IEEE 802.1p standard introduced
priority-based scheduling. The QoS-extension of IEEE
802.11 is called IEEE 802.11e. However, important differences can be noticed in comparison to its wired equivalent.
Our analytical study of the medium usage is based on models presented in a series of IEEE 802.11 performance studies [6] [7] which are based on Bianchi’s work [8]. Bianchi
introduced the basic model for describing the saturation behaviour of IEEE 802.11 WLANs. Xiao [7] extended this
model for 802.11e and also added delay studies. Paal [6]
further improved the model and achieved the highest accuracy by modelling correctly the virtual collision handler and
added a model for the non-saturated mode which can predict the starvation point of lower ACs. For all these models
a thorough verification is performed with simulation results.
In our simulations, we used Paal’s model (unless mentioned otherwise) because this is the most complete model.
The current value Wij of the backoff window for AC i and
the jth backoff stage is determined as follows with σ ≥ 1.0:
Wij = σ j · Wi,init , for j = 0, 1, ... , Ri,max
Wi,init = σ i · W0,init , for i = 0, 1, ... , N oQ − 1
3.3.1
Influence of the number of output queues per AC
Introduction of multiple output queues per AC surprisingly
affects the maximal bandwidth usage. This is illustrated on
Fig. 3 which represents the effective total BW usage and the
BW usage per AC as a function of the initial window size.
For low initial backoff windows the BW usage decreases if
three ACs are introduced. For higher initial backoff windows the BW usage without QoS will drop earlier. Actually
this effect is similar to the findings in [8] according to the
number of IEEE 802.11 stations n: the maximum BW differs for different values of n. As explained in 3.1 every AC
acts as a single DCF sender; this means that by adding QoS
queues there are no longer n senders but rather n · N oQ
senders. This explains the shift in maximal BW usage. Two
models, Xiao and Paal, are compared: it is clear that due to
the virtual collision handler Paal achieves a higher through-
(1)
(2)
The AC access parameters are bound to the following rule
with AC 0 referred to as the highest AC: for 0 ≤ k <
l < N oQ: Wk,init ≤ Wl,init , Rk,max ≤ Rl,max and
AIF Sk ≤ AIF Sl . N oQ indicates the number of active QoS queues per station. Equation 1 implicates that
all ACs have the same exponential backoff mechanism
and that access control chances don’t depend on the exact
backoff stage. Equation 2 indicates that the initial backoff windows ratios are constant, meaning W0,init /W1,init =
W1,init /W2,init = W2,init /W3,init = 1/σ. More complex
4
Proceedings of the 32nd EUROMICRO Conference on Software Engineering and Advanced Applications (EUROMICRO-SEAA'06)
0-7695-2594-6/06 $20.00 © 2006
2
Total effective BW usage (%)
45
40
35
30
n=3
n=8
n=25
n=50
n=100
25
20
8
16
64
128
256
Ratio: σ=1
Ratio: σ=1.25
Ratio: σ=1.33
Ratio: σ=1.5
Ratio: σ=2
Ratio: σ=3
4.5
4
1.6
3.5
1.4
3
2.5
1.2
2
1
1.5
8
16
32
64
128
256
1
Initial size of the backoff window
512
Initial size of the backoff window
Figure 5. Total effective BW usage as a function of the initial backoff window.
Figure 4. Total effective BW usage for N oQ=3
for different numbers of interfering nodes n.
3.3.3
put for the highest AC and that other ACs get less access
to the medium in comparison with Xiao. The influence is
the highest for low initial backoff windows and decreases
for increasing Wi,init which is logical because the amount
of internal collisions is strongly reduced for higher backoff windows. It is clearly shown that the lowest AC’s BW
usage doesn’t drop to zero in saturation. In Switched Ethernet the highest QoS class would starve all other classes.
From our point of view this seems the appropriate behavior
while many authors find this starvation effect a disadvantage. IEEE 802.11e lacks this feature due to the fact that
AC queues have an independent backoff timer as explained
previously. Implementations which freeze the backoff timer
of lower classes if the highest AC queue is non-empty, could
achieve a pure priority-based access control where all lower
ACs would be starved by the highest AC.
3.3.2
1.8
0.8
32
5
BW: σ=1
BW: σ=1.25
BW: σ=1.33
BW: σ=1.5
BW: σ=2
BW: σ=3
Ratio of BW usages class 0 and class 1
Total BW usage (%), relative to without QoS
50
Influence of the parameter σ
In Fig. 5 we examine the influence of varying the parameter
σ. Focussing on maximizing the BW usage two operating
modes are clear: for high Winit it is better to choose a low σ
while for low Winit higher σ values improve the BW usage.
However, low σ values imply that BW usage of high priority ACs are influenced by the BW usage of the lower ACs.
This is visualized on the second axis: a high BW usage ratio of class 0 and class 1 is desired. For mesh networks
which have to be deployed with low Winit according to the
previous study, this means that high σ values are preferred.
At this point there seems no upper limit for the σ value
but this changes if the influence of σ on the different average delays per AC is taken into account. This is depicted
in Fig. 6. In the IEEE standards default values are recommended for the initial backoff window size: 32 time slots
for IEEE 802.11b and 16 time slots for IEEE 802.11a but
we will proof that this is not always the best value for mesh
networks. To illustrate this we will optimise the BW usage for n=5 and N oQ = 3 and with the following perhop averaged delay constraints: delayAC0 < 500μsec,
delayAC1 < 1000μsec and delayAC2 < 2000μsec. For
high σ it seems hard to fulfill the delay constraints of
the lower classes. If we operate close to saturation, a
high σ will restrict the medium access of the lower values too much leading to high average delays. If we start
max
=32 not a single delay
with σ=3 and Winit,0 = Winit,0
constraint is met: delayAC0 = 656μsec, delayAC1 =
1515μsec and delayAC2 = 4004μsec. It is not until
Winit,0 is increased to 512, that all delay conditions are
met: delayAC0 = 349μsec, delayAC1 = 570μsec and
delayAC2 = 1231μsec. At this point the BW usage has
dropped to approximately 53% of the maximum BW usmax
. In this evaluation the lowest QoS class
age with Winit,0
Influence of the parameter n
In Fig. 4 the influence of the number of senders is depicted. For high n the BW usage drops severely for low
Winit and it is better to choose high Winit . However,
infrastructure-based mesh networks will probably operate
with much lower n ranges: between 2 and 10. In this area
low Winit are preferred: for n=3 the maximum BW usage is
achieved for W0,init =16 but there is no BW gain by adding
three QoS queues as can be seen in the previous Fig. 3:
BW usage drops with 3% compared to DCF. For higher
Winit gains will increase compared to DCF: up to 50% for
W0,init =512. High Winit are of course less interesting for
mesh networks due to the decreased AC differentiation.
5
Proceedings of the 32nd EUROMICRO Conference on Software Engineering and Advanced Applications (EUROMICRO-SEAA'06)
0-7695-2594-6/06 $20.00 © 2006
6000
5000
4000
Delay (μsec)
limited to the link initiation phase. It is still dependent
on the NIC capabilities (such as IEEE 802.11 version or
supported rates) but the highest-level operational mode will
also depend on the wireless link conditions. We will not further describe such LRA algorithms [9] but our architecture
is able to use LRA feedback to adapt the active topology.
σ=2 class=0
σ=2 class=1
σ=2 class=2
σ=2.5 class=0
σ=2.5 class=1
σ=2.5 class=2
σ=3 class=0
σ=3 class=1
σ=3 class=2
3000
4
2000
4.1
1000
0
8
16
32
64
128
256
Prototype node architecture
The node architecture of a wireless Ethernet node is depicted in Fig. 7. The representation is concordant with Click
Modular Router [10] configurations. The Click Modular
Router is a modular software architecture for building flexible and configurable network devices. The Click configuration consists of packet processing modules which are interconnected in a directed graph. Packets are flowing along
the edges of the graph and enter/exit via decoupled network interface modules: incoming interfaces on the left and
outgoing interfaces on the right. The dark grey zone contains the representation of a standard VLAN-aware multispanning tree Ethernet switch. At the network edges traffic
will be VLAN-tagged: a VLAN tag can uniquely be associated with a single spanning tree instance and will define
the end-to-end path because every tree contains a single
path between every two nodes. As presented in previous
work [1] we extended the switch with a fast and efficient
failure detection mechanism, called Link Probe. We proved
that very fast recovery in Ethernet networks of realistic size
is still possible even though recovery times of a distributed
recovery system are dependent on the network size. We use
a Link Probe send module per link port and a single Link
Probe analyser module. In the section about fast recovery
we will further detail both these modules.
The key blocks for extending the Ethernet switch are the
linkbinder (wireless-interface-to-link conversion) and the
linkunbinder (link-to-wireless-interface conversion). The
linkbinder is controlled by the neighbor-interface binding
(NIB) module which gets its information from the neighborhood table. The NIB module will decide which neighbours will be connected over a direct link. The linkbinder
module is responsible for the forwarding to the correct link
port (e.g. link port 1-4 on Fig. 7). The linkunbinder will
do the exact reverse operation of the linkbinder module and
map the link port on the correct wireless output NIC.
The wifi-dependent control traffic are probes, beacons
or control messages for distributing wireless information in
the WMN. This information is used for creating the singlehop neighbourhood table. The link-dependent control traffic include spanning tree messages but also messages for future building blocks like distributed channel assignment and
power control modules. Additionally the link rate adapta-
512
Initial backoff window size
Figure 6. Average saturation delay per AC as
a function of the initial backoff window.
condition seemed the biggest driver for increasing Winit,0 .
Taking a look at the delay curves in Fig. 6 shows that decreasing σ will positively affect the delays of the lowest
classes while the delay of the highest class is increased.
Important to notice is that the impact gradually increases
for lower ACs and (less important) for lower Winit,0 . This
means that delays for the highest AC will relatively change
less. If we increase σ to 2.5 all constraints are met for
Winit,0 =128: delayAC0 = 481μsec, delayAC1 = 848μsec
and delayAC2 = 1757μsec. At this point the BW usage reaches 89% of the maximum possible BW usage. In
this evaluation all 3 constraints are decisive and the highest AC constraint is just met. These findings suggest that
σ cannot be much further decreased in order to reach lower
Winit,0 and increase the BW usage. Indeed, for σ=2 the
conditions are met for Winit,0 =256: delayAC0 = 438μsec,
delayAC1 = 639μsec and delayAC2 = 1038μsec with AC
0 as the biggest driver. The BW usage only reached 77%
for σ=2. In this way an ideal σ-value can be derived.
3.4
Wireless MST Ethernet Mesh Network
Link rate adaptation (LRA)
The rate of a wired link between two nodes is determined by an auto-negotiation protocol which outcome is
dependent on the capabilities of the two network interface
cards (NICs). The purpose of auto-negotiation is to find a
way for two NICs that share a link, to communicate with
each other, regardless of whether they both implement the
same Ethernet version or option set. Auto-negotiation is
performed during link initiation and configures each NIC
for the highest-level operational mode that both NICs support. In a wireless environment similar techniques exist to
determine the optimal rate for two wireless NICs to communicate. However, this process is continuous and no longer
6
Proceedings of the 32nd EUROMICRO Conference on Software Engineering and Advanced Applications (EUROMICRO-SEAA'06)
0-7695-2594-6/06 $20.00 © 2006
Single-hop
Neighborhood Info
Table
PDU or data packets
configuration messages
Interface –
Power frequency
Table
Label over different trees
(requires configuration)
Constructing Trees
Link-dependent
control traffic
uses
Neighbor Interface binding
Label -Tree
Table
Block/
unblock
Block/
unblock
alters
OUT
LinkProbe Send
Module
1
Interface 1
Data packets
other
2
3
Interface 1
LinkProbe Send
Module
Link
Probe
Analyser
Data packets
LinkProbe Send
Module
Data packets
LinkProbe Send
Module
4
Interface 2
wifi-dependent
control traffic
Link-dependent
control traffic
MSTP
wifi-dependent
control traffic
IN
Labels identifying trees
(autoconfiguration)
Interface 2
Data packets
other
link ports
feedback
Set rate outgoing packets
Link Rate Adaptation
Figure 7. Node architecture for 2 wireless NICs, max. 4 connected neighbors and 2 tree instances
4.2.1
Max
Neighbours=1
WMN A
0
36 Mb/s
Max
Neighbours=2
12 Mb/s
WMN A
WMN B 555555
0
12 Mb/s
In order to adapt the active topology to the effective link
rates we used the stripped MADWIFI driver and combined it with the standard Click element MadwifiRate. The
specifics of the LRA protocol implemented in MadwifiRate
are not presented (but can be found in [9]); however, any
LRA protocol could be used to adapt the ST parameters.
The Ethernet standard suggests how the ST parameters can
be adjusted to the current link rates: port path cost parameters can be modified according to the conversion table (pp.
154 - IEEE 802.1D-2004) as presented in Table 1. In order
to avoid instable topologies multiple successful transmissions are required after link rate increase before port path
cost parameters are effectively adjusted.
WMN B
36 Mb/s
WMN C 1111110
WMN C
1666667
Max
Neighbours=1
Figure 8. Test bed with three WMN nodes.
tion module will monitor the incoming traffic on all wireless
NICs and will determine appropriate output rates per destination address. This is demonstrated in Section 4.2.1.
4.2
Tree modification due to LRA
Root
Root
As test a stream is sent from node A to node C, consisting of short 14 Mbps bursts with packet size 1404 bytes.
Between node A and node C (see Fig. 8), a wall reduces
the maximum attainable link rate. Assume the LRA protocol starts at the lowest 802.11a rate, 6 MBps and while the
LRA protocol will increase sequentially the rate according
to current medium conditions. Figure 9 shows how the link
rate is sequentially increased to 9, 12 and 18 Mbps. At a
link rate of 18 Mbps the bursts successfully pass with full
peak rate. During the process no Spanning Tree instabilities are detected and a single topology change (with obligatory MAC address flushing) occurs in the network when the
port path cost parameters associated with the link between
A and C are not further decreased. The ST protocol converges with root path costs 0 for node A, 555555 for node
B and 1111110 for node C.
Test bed implementation
We implemented this data plane on a Click Modular
Router test bed with three Linux PCs (see Fig. 8). We used
two D-Link wireless NICs with Atheros AR5212 chipset
(802.11a/b/g compliant) per station (at the time of writing
802.11e compliant NICs are still rare) and the complete
Linux driver is available from the Multiband Atheros Driver
for Wifi (MADWIFI) project [11]. We also used a stripped
MADWIFI driver [12] which allows us to send and receive
802.11-frames in Click; other device drivers would only allow you to exchange 802.3-frames.
7
Proceedings of the 32nd EUROMICRO Conference on Software Engineering and Advanced Applications (EUROMICRO-SEAA'06)
0-7695-2594-6/06 $20.00 © 2006
16
250
Minimized detection time (wired)
Offset value (wired)
Minimized detection time (wireless−ng)
Offset value (wireless−ng)
Minimized detection time (wireless−stripped)
Offset value (wireless−stripped)
200
12
10
Time (ms)
Effective throughput (Mbps)
14
8
6
150
100
4
50
2
0
0
0.5
1
1.5
2
Time (s)
2.5
3
3.5
4
7
0
x 10
0
10
20
30
40
50
60
70
80
90
100
Send Interval (ms)
Figure 9. Illustration of LRA algorithm.
Figure 10. Minimized detection times.
Table 1. IEEE 802.1D path cost parameters.
Link speed Recommended value
≤ 100 Kb/s
200 000 000
1 Mb/s
20 000 000
10 Mb/s
2 000 000
100 Mb/s
200 000
4.2.2
the Link Probe modules are bound by the following equation: Receive Interval > Send Interval · 2 + offset value.
The stripped driver which was based on an old driver implementation, is less efficient for small send intervals. The new
driver Madwifi-ng (2006-02-22) performed better and had
only slightly higher offsets than wired Ethernet (in the 5msrange). Detection times near 25 ms can be achieved on standard Linux PCs with 3GHz CPU clock speed. We stresstested the performance by saturating the medium with two
other nearby nodes. The additional offset was in the msrange concordant with the saturation delay calculations of
Section 3.3. If the Link Probe packets could be given priority with 802.11e NICs, detection times could be made less
load-dependent. After detection recovery of connectivity is
performed quickly but this is not sufficient to recover the
data operation: out-dated MAC addresses still need to be
deleted as fast as possible. Because the faster Link Probe
mechanism takes over from the slow standard detection
mechanism, we payed extra attention to MSTP’s implementation of the flushing mechanism. Otherwise, flushing risks
to be postponed for a single period of the Hello time.
Fast recovery in wireless mesh networks
Instead of adding a novel management component the distributed Link Probe mechanism is used in cooperation with
the MSTP protocol in order to maintain the plug-and-play
feature of Ethernet. Link Probe was developed to bypass
the MSTP failure detection by deploying a more bandwidth
efficient heart beat mechanism that monitors the link status
in wired environment. In wireless environment Link Probe
is even more suited due to the fact that hardware detection
techniques (e.g. for UTP or coax failures) are useless and
that even link quality degradations can now easily be detected. When monitoring the link status there is no need to
look for specific packets since any packet is fine to assert
that the link is operational. The receiver module of Link
Probe will reset the receive interval at the receiving side every time a packet arrives. The send module of Link Probe
will assure that every send interval at least one packet is
transmitted on the link. The send module will monitor outgoing packets: if a packet passes during the send interval,
the sender does not need to send a packet. This means that
send and receive interval can be reduced without sacrificing
usable bandwidth. As shown in Section 3.2 on proportional
fairness the Link Probe streams will have no impact on the
BW usage. With a send interval of 10ms Link Probe rates
are approximately 50kbps, which means α is easily larger
than 100 in an IEEE 802.11a medium.
The detection times of our implementation in the Click
Modular Router are presented in Fig. 10 and compared with
the results in wired Ethernet. Send and receive interval of
However, the coordination of Link Probe with MSTP is
not sufficient in a wireless medium because as stated previously mesh network throughput can only be increased significantly if frequency usages are dispersed across the entire WMN. If a node gets disconnected after a node failure,
neighbour nodes may be communicating on other frequencies. This is the case in the network example of Fig. 8. We
configured arbitrarily-chosen frequencies: WMN node A
and WMN node B communicate on channel 36 and WMN
node B and WMN node C communicate on channel 132.
If node B fails, node C gets disconnected but has no active
interface that can communicate with node A. The disconnected node would want to connect to a neighbour node
which has the best connectivity with the root or in other
words, to the neighbour node with lowest ST root distance.
8
Proceedings of the 32nd EUROMICRO Conference on Software Engineering and Advanced Applications (EUROMICRO-SEAA'06)
0-7695-2594-6/06 $20.00 © 2006
6
the wireless access parameters do not automatically guarantee optimal bandwidth usage of the medium.
Effective throughput (Mbps)
5
References
4
[1] De Greve F., Van Quickenborne F., et al., A new
carrier-grade aggregation network model for delivering broadband service to fast moving users, To appear
in International Journal of Communication Systems,
Wiley, 2006.
3
2
1
0
0.94
0.96
0.98
1
1.02
Time (s)
1.04
1.06
[2] Bruno R., Conti M. and Gregori E., Mesh networks:
commodity multihop ad hoc networks, IEEE Communications Magazine, Mar 2005.
1.08
7
x 10
Figure 11. Recovery in the WMN of Fig. 8
[3] Shenoy N., Pan Y. , et. al., Route robustness of multimeshed tree routing scheme for internet MANETs,
IEEE Globecom conference, Nov 2005, St. Louis,
USA.
This problem is resolved by the use of beacons which contain the most recent root distance in every ST instance.
In addition, nodes will distribute notifications to all their
neighbours if frequency changes occurred. In this way,
nodes can store all this backup path information. Due to
the fixed infrastructure-based environment this information
is not likely to change rapidly. After failure node C will
detect that its NIC has lost all connectivity and will start
searching for the best neighbour amongst its non-connected
neighbours: node A. Lookup in the neighbourhood table
will reveal the currently used channels of node A and node
C will perform a frequency change in order to restore connectivity as illustrated in Fig. 11. We send 4 Mbps constant
bit rate data stream from node A to node C and simulate a
failure of node B. The Link Probe receive window was set
to 300ms. The time after failure detection to swap channels
is of the order of ms, as is the time to reconfigure the spanning tree. No packets were received during 311ms which
indicates that total recovery time is dominated by the detection time (as in wired Ethernet environment).
5
[4] Raniwala A. and Chiueh T, Architecture and algorithms for an IEEE 802.11-based multi-channel wireless mesh networks, IEEE Infocom 2005, Mar 2005,
Miami, USA.
[5] Yang Y., Wang J. and Kravets R., Load-balanced
Routing For Mesh Networks, 11th International Conference on Mobile Computing and Networking, Aug
2005.
[6] Engelstad P.E. and Osterbo O.N., Delay and throughput analysis of IEEE 802.11e EDCA with starvation
prediction, 5th International IEEE Workshop on Wireless Local Networks, Nov 2005, Sydney, Australia.
[7] Xiao Y., Performance analysis of priority schemes
for IEEE 802.11 and 802.11e Wireless LANs, IEEE
Transactions on Wireless Communications, 4(4), July
2005.
[8] Bianchi G., Performance analysis of the IEEE 802.11
Distributed Coordination Function, IEEE J-SAC,
18(3), Mar 2000, pp. 535-547.
Conclusions
[9] Lacage M., Masnshaei M.H. and Turletti T, IEEE
802.11 rate adaptation: a practical approach, The 7th
ACM/IEEE MSWiM, 2004, Venice, Italy, pp. 126-134.
In this paper we examined infrastructure-based mesh
networks and showed that wireless Switched Ethernet is a
promising technology for aggregation networks. We presented the necessary extensions to standard Ethernet and
evaluated them in a test bed implementation. This allowed
us to prove that fast distributed recovery based on the spanning tree recovery mechanism can be realised in practice.
We also introduced modifications of the active spanning tree
topology in coordination with a link rate adaptation algorithm. This enables wireless mesh networks to avoid poor
wireless links that could form a bottleneck for the multi-hop
throughput. Analytically, we studied IEEE 802.11e parameter variations and illustrated that the standards settings of
[10] Kohler E. , Morris R., Chen B., Jannotti J. and
Kaashoek M. F., The Click modular router, ACM
Transactions on computer systems, 18(3), pp. 236 297, 2000.
[11] Multiband Atheros Driver for WiFi (MADWIFI),
[http://sourceforge.net/projects/madwifi/], Mar 2006.
[12] Bicket J., Madwifi Stripped, [http://pdos.csail.mit
.edu/jbicket/madwifi.stripped/], Feb. 2006.
9
Proceedings of the 32nd EUROMICRO Conference on Software Engineering and Advanced Applications (EUROMICRO-SEAA'06)
0-7695-2594-6/06 $20.00 © 2006
Download