U B I C

advertisement
UBICC Journal
Ubiquitous Computing and Communication Journal
2008 Volume 3 . 2008-04-30 . ISSN 1992-8424
Special Issue on
Mobile Adhoc Networks
UBICC Publishers © 2008
Ubiquitous Computing and Communication Journal
Edited by Usman Tariq.
Special Co-Editor Dr. Shafique Ahmad Chaudhry
Ubiquitous Computing and
Communication Journal
Book: 2008 Volume 3
Publishing Date: 2008-04-30
Proceedings
ISSN 1992-8424
This work is subjected to copyright. All rights are reserved whether the whole or part of the material is
concerned, specifically the rights of translation, reprinting, re-use of illusions, recitation, broadcasting,
reproduction on microfilms or in any other way, and storage in data banks. Duplication of this publication of
parts thereof is permitted only under the provision of the copyright law 1965, in its current version, and
permission of use must always be obtained from UBICC Publishers. Violations are liable to prosecution under
the copy right law.
UBICC Journal is a part of UBICC Publishers
www.ubicc.org
© UBICC Journal
Printed in South Korea
Typesetting: Camera-ready by author, data conversation by UBICC Publishing Services, South Korea
UBICC Publishers
Table of Contents
Papers
1.
Performance Evaluation of Deadline Monotonic Policy over 802.11 protocol
Ines el Korbi . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
2.
Impact of Node density on Cross Layer Design for Reliable Route Discovery in Mobile Ad-hoc
Networks
Ramachandran B, Shanmugavel S . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
3.
A Framework for Aggregated Quality of Service in Mobile Ad hoc Networks
Ash Mohammad Abbas . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
Performance Evaluation of Deadline Monotonic Policy
over 802.11 protocol
Ines El Korbi and Leila Azouz Saidane
National School of Computer Science
University of Manouba, 2010 Tunisia
Emails: ines.korbi@gmail.com Leila.saidane@ensi.rnu.tn
ABSTRACT
Real time applications are characterized by their delay bounds. To satisfy the
Quality of Service (QoS) requirements of such flows over wireless
communications, we enhance the 802.11 protocol to support the Deadline
Monotonic (DM) scheduling policy. Then, we propose to evaluate the performance
of DM in terms of throughput, average medium access delay and medium access
delay distrbution. To evaluate the performance of the DM policy, we develop a
Markov chain based analytical model and derive expressions of the throughput,
average MAC layer service time and service time distribution. Therefore, we
validate the mathematical model and extend analytial results to a multi-hop
network by simulation using the ns-2 network simulator.
Keywords: Deadline Monotonic, 802.11 protocol, Performance evaluation,
Medium access delay, Throughput, Probabilistic medium access delay bounds.
1
INTRODUCTION
Supporting applications with QoS requirements
has become an important challenge for all
communications networks. In wireless LANs, the
IEEE 802.11 protocol [5] has been enhanced and the
IEEE 802.11e protocol [6] was proposed to support
quality of service over wireless communications.
In the absence of a coordination point, the IEEE
802.11 defines the Distributed Coordination
Function (DCF) based on the Carrier Sense Multiple
Access with Collision Avoidance (CSMA/CA)
protocol. The IEEE 802.11e proposes the Enhanced
Distributed Channel Access (EDCA) as an extension
for DCF. With EDCA, each station maintains four
priorities called Access Categories (ACs). The
quality of service offered to each flow depends on
the AC to which it belongs.
Nevertheless, the granularity of service offered
by 802.11e (4 priorities at most) can not satisfy the
real time flows requirements (where each flow is
characterized by its own delay bound).
Therefore, we propose in this paper a new
medium access mechanism based on the Deadline
Monotonic (DM) policy [9] to schedule real time
flows over 802.11. Indeed DM is a real time
scheduling policy that assigns static priorities to flow
packets according to their deadlines; the packet with
the shortest deadline being assigned the highest
priority. To support the DM policy over 802.11, we
use a distributed scheduling and introduce a new
medium access backoff policy. Therefore, we focus
on performance evaluation of the DM policy in terms
of achievable throughput, average MAC layer
service time and MAC layer service time
distribution. Hence, we follow these steps:
− First, we propose a Markov Chain
framework modeling the backoff process of
n contending stations within the same
broadcast region [1].
Due to the complexity of the mathematical
model, we restrict the analysis to n
contending stations belonging to two traffic
categories (each traffic category is
characterized by its own delay bound).
−
From the analytical model, we derive the
throughput achieved by each traffic
category.
− Then, we use the generalized Z-transforms
[3] to derive expressions of the average
MAC layer service time and service time
distribution.
− As the analytical model was restricted to
two traffic categories, analytical results are
extended by simulation to different traffic
categories.
− Finally, we consider a simple multi-hop
scenario to deduce the behavior of the DM
policy in a multi hop environment.
UbiCC Journal, Volume 3, Special issue on Mobile Ad hoc Networks
1
The rest of this paper is organized as follows. In
section 2, we review the state of the art of the IEEE
802.11 DCF, QoS support over 802.11 mainly the
IEEE 80.211e EDCA and real time scheduling over
802.11. In section 3, we present the distributed
scheduling and introduce the new medium access
backoff policy to support DM over 802.11. In section
4, we present our mathematical model based on
Markov chain analysis. Section 5 and 6 present
respectively throughput and the service time
analysis. Analytical results are validated by
simulation using the ns-2 network simulator [16]. In
section 7, we extend our study by simulation, first to
take into consideration different traffic categories,
second, to study the behavior of the DM algorithm in
a multi-hop environment where factors like
interferences or routing protocols exist. Finally, we
conclude in Section 8.
2
LITTERATURE REVIEWS
2.1 The 802.11 protocol
2.1.1 Description of the IEEE 802.11 DCF
Using DCF, a station shall ensure that the
channel is idle when it attempts to transmit. Then it
selects a random backoff in the contention window
[0,CW-1], where CW is the current window size and
varies between the minimum and the maximum
contention window sizes. If the channel is sensed
busy, the station suspends its backoff until the
channel becomes idle for a Distributed Inter Frame
Space (DIFS) after a successful transmission or an
Extended Inter Frame Space (EIFS) after a collision.
The packet is transmitted when the backoff reaches
zero. A packet is dropped if it collides after
maximum retransmission attempts.
The above described two way handshaking
packet transmission procedure is called basic access
mechanism. DCF defines a four way handshaking
technique called Request To Send/ Clear To Send
(RTS/CTS) to prevent the hidden station problem. A
station S j is said to be hidden from S i if S j is
within the transmission range of the receiver of S i
and out of the transmission range of S i .
2.1.2 Performance evaluation of the 802.11
DCF
Different works have been proposed to evaluate
the performance of the 802.11 protocol based on
Bianchi’s work [1]. Indeed, Bianchi proposed a
Markov chain based analytical model to evaluate the
saturation throughput of the 802.11 protocol. By
saturation conditions, it’s meant that contending have
always packets to transmit.
Several works extended the Bianchi model either
to suit more realistic scenarios or to evaluate other
performance parameters. Indeed, the authors of [2]
incorporate the frame retry limits in the Bianchi’s
model and show that Bianchi overestimates the
maximum achievable throughput. The native model
is also extended in [10] to a non saturated
environment. In [12], the authors derive the average
packet service time at a 802.11 node. A new
generalized Z-transform based framework has been
proposed in [3] to derive probabilistic bounds on
MAC layer service time. Therefore, it would be
possible to provide probabilistic end to end delay
bounds in a wireless network.
2.2 Supporting QoS over 802.11
2.2.1 Differentiation mechanisms over 802.11
Emerging applications like audio and video
applications require quality of service guarantees in
terms of throughput delay, jitter, loss rate, etc.
Transmitting
such
flows
over
wireless
communications
require
supporting
service
differentiation mechanisms over wireless networks.
Many medium access schemes have been
proposed to provide some QoS enhancements over
the IEEE 802.11 WLAN. Indeed, [4] assigns
different priorities to the incoming flows. Priority
classes are differentiated according to one of three
802.11 parameters: the backoff increase function,
Inter Frame Spacing (IFS) and the maximum frame
length. Experiments show that all the three
differentiation schemes offer better guarantees for
the highest priority flow. But the backoff increase
function mechanism doesn’t perform well with TCP
flows because ACKs affect the differentiation
mechanism.
In [7], an algorithm is proposed to provide
service differentiation using two parameters of IEEE
802.11, the backoff interval and the IFS. With this
scheme high priority stations are more likely to
access the medium than low priority ones. The above
described researches led to the standardization of a
new protocol that supports QoS over 802.11, the
IEEE 802.11e protocol [6].
2.2.2 The IEEE 802.11e EDCA
The IEEE 802.11e proposes a new medium
access mechanism called the Enhanced Distributed
Channel Access (EDCA), that enhances the IEEE
802.11 DCF. With EDCA, each station maintains
four priorities called Access Categories (ACs). Each
access category is characterized by a minimum and a
maximum contention window sizes and an
Arbitration Inter Frame Spacing (AIFS).
Different analytical models have been proposed
to evaluate the performance of 802.11e EDCA. In
[17], Xiao extends Bianchi’s model to the prioritized
schemes provided by 802.11e by introducing
multiple ACs with distinct minimum and maximum
contention window sizes. But the AIFS
differentiation parameter is lacking in Xiao’s model.
Recently Osterbo and Al. have proposed
UbiCC Journal, Volume 3, Special issue on Mobile Ad hoc Networks
2
different works to evaluate the performance of the
IEEE 802.11e EDCA [13], [14], [15]. They propose
a model that takes into consideration all the
differentiation parameters of the EDFA especially
the AIFS one. Moreover different parameters of QoS
have been evaluated such as throughput, average
service time, service time distribution and
probabilistic response time bounds for both saturated
and non saturated cases.
Although the IEEE 802.11e EDCA classifies the
traffic into four prioritized ACs, there is still no
guarantee of real time transmission service. This is
due to the lack of a satisfactory scheduling method
for various delay-sensitive flows. Hence, we need a
scheduling policy dedicated to such delay sensitive
flows.
2.3 Real time scheduling over 802.11
A distributed solution for the support of realtime sources over IEEE 802.11, called Blackburst, is
discussed in [8]. This scheme modifies the MAC
protocol to send short transmissions in order to gain
priority for real-time service. It is shown that this
approach is able to support bounded delays. The
main drawback of this scheme is that it requires
constant intervals for high priority traffic; otherwise
the performance degrades very much.
In [18], the authors proposed a distributed
priority scheduling over 802.11 to support a class of
dynamic priority schedulers such as Earliest
Deadline First (EDF) or Virtual Clock (VC). Indeed,
the EDF policy is used to schedule real time flows
according to their absolute deadlines, where the
absolute deadline is the node arrival time plus the
delay bound.
To realize a distributed scheduling over 802.11,
the authors of [18] used a priority broadcast
mechanism where each station maintains an entry for
the highest priority packet of all other stations. Thus,
stations can adjust their backoff according to other
stations priorities.
The overhead introduced by the broadcast
priority mechanism is negligible. This is due to the
fact that priorities are exchanged using native DATA
and ACK packets. Nevertheless, the authors of [18]
propose a generic backoff policy which can be used
by a class dynamic priority schedulers no matter if
this scheduler targets delay sensitive flows or rate
sensitive flows.
In this paper, we focus on delay sensitive flows
and propose to support the fixed priority deadline
monotonic scheduler over 802.11 to schedule delay
sensitive flows. For instance, we use a priority
broadcast mechanism similar to [5] and propose a
new medium access backoff policy where the
backoff value is inferred from the deadline
information.
3
SUPPORTING DEADLINE MONOTONIC
(DM) POLICY OVER 802.11
With DCF all the stations share the same
transmission medium. Then, the HOL (Head of Line)
packets of all the stations (highest priority packets)
will contend for the channel with the same priority
even if they have different deadlines.
Introducing DM over 802.11 allows stations
having packets with short deadlines to access the
channel with higher priority than those having
packets with long deadlines. Providing such a QoS
requires distributed scheduling and a new medium
access policy.
3.1 Distributed Scheduling over 802.11
To realize a distributed scheduling over 802.11,
we introduce a priority broadcast mechanism similar
to [18]. Indeed each station maintains a local
scheduling table with entries for HOL packets of all
other stations. Each entry in the scheduling table of
node S i comprises two fields S j , D j where S j is
the source node MAC address and D j is the
(
)
deadline of the HOL packet of node S j . To
broadcast the HOL packet deadlines, we propose to
use the DATA/ACK access mode.
When a node S i transmits a DATA packet, it
piggybacks the deadline of its HOL packet. The
nodes hearing the DATA packet add an entry for S i
in their local scheduling tables by filling the
corresponding fields. The receiver of the DATA
packet copies the priority of the HOL packet in ACK
before sending the ACK frame. All the stations that
did not hear the DATA packet add an entry for S i
using the information in the ACK packet.
3.2 DM medium access backoff policy
Let’s consider two stations S 1 and S 2
transmitting two flows with the same deadline D1 (
D1 is expressed as a number of 802.11 slots). The
two stations having the same delay bound can access
the channel with the same priority using the native
802.11 DCF.
Now, we suppose that S 1 and S 2 transmit flows
with different delay bounds D1 and D 2 such as
D1 < D 2 , and generate two packets at time instants
t 1 and t 2 . If S 2 had the same delay bound as S 1 ,
its packet would have been generated at time t '2 such
as t '2 = t 2 + D 21 , where D21 = ( D2 − D1 ) .
At that time, S 1 and S 2 would have the same
priority and transmit their packets according to the
UbiCC Journal, Volume 3, Special issue on Mobile Ad hoc Networks
3
802.11 protocol.
Thus, to support DM over 802.11, each station
uses a new backoff policy where the backoff is given
by:
• The random backoff selected in [ 0 , CW − 1]
according to 802.11 DCF, referred as BAsic
Backoff (BAB).
• The DM Shifting Backoff (DMSB):
corresponds to the additional backoff slots that
a station with low priority (the HOL packet
having a large deadline) adds to its BAB to
have the same priority as the station with the
highest priority (the HOL packet having the
shortest deadline).
Whenever a station S i sends an ACK or hears
an ACK on the channel its DMSB is revaluated as
follows:
DMSB( S i ) = Deadline( HOL( S i ) ) − DTmin ( S i )
(1)
Where DTmin ( S i ) is the minimum of the HOL
packet deadlines present in S i scheduling table and
Deadline( HOL( S i ) ) is the HOL packet deadline of
node S i .
Hence, when S i has to transmit its HOL packet
with a delay bound Di , it selects a BAB in the
contention window [ 0 , CW min − 1] and computes the
WHole Backoff (WHB) value as follows:
WHB( S i ) = DMSB( S i ) + BAB( S i )
(2)
The station S i decrements its BAB when it
senses an idle slot. Now, we suppose that S i senses
the channel busy. If a successful transmission is
heard, then S i  revaluates its DMSB when a correct
ACK is heard. Then the station S i adds the new
DMSB value to its current BAB as in equation (2).
Whereas, if a collision is heard, S i reinitializes its
DMSB and adds it to its current BAB to allow
colliding stations contending with the same priority
as for their first transmission attempt. S i transmits
when its WHB reaches 0. If the transmission fails, S i
doubles its contention window size and repeats the
above procedure until the packet is successfully
transmitted
or
dropped
after
maximum
retransmission attempts.
4
In this section, we propose a mathematical
model to evaluate the performance of the DM policy
using Markov chain analysis [1]. We consider the
following assumptions:
Assumption 1:
The system under study comprises n contending
stations hearing each other transmissions.
Assumption 2:
Each station S i transmits a flow Fi with a delay
bound Di . The n stations are divided into two traffic
categories C1 and C 2 such as:
− C1 represents n1 nodes transmitting flows
with delay bound D1 .
− C 2 represents n 2 nodes transmitting flows
with delay bound D 2 , such as D1 < D 2 ,
D21 = ( D 2 − D1 ) and ( n1 + n 2 ) = n .
Assumption 3:
We operate in saturation conditions: each station has
immediately a packet available for transmission after
the service completion of the previous packet [1].
Assumption 4:
A station selects a BAB in a constant contention
window [0 ,W − 1] independently of the transmission
attempt. This is a simplifying assumption to limit the
complexity of the mathematical model.
Assumption 5:
We are in stationary conditions, i.e. the n stations
have already sent one packet at least.
Depending on the traffic category to which it
belongs, each station S i will be modeled by a
Markov Chain representing its whole backoff (WHB)
process.
4.1 Markov chain modeling a station of category
C1
Figure 1 illustrates the Markov chain modeling a
station S 1 of category C1 . The states of this Markov
chain are described by the following quadruplet
( R , i , i − j , D21 ) where:
R : takes two values denoted by C 2 and
•
~ C 2 . When R = ~ C 2 , the n 2 stations of
category C 2 are decrementing their shifting
backoff (DMSB) during D21 slots and
wouldn’t contend for the channel. When
R = C 2 , the D 21 slots had already been
elapsed and stations of category C 2 will
contend for the channel..
MATHEMATICAL MODEL OF THE DM
POLICY OVER 802.11
UbiCC Journal, Volume 3, Special issue on Mobile Ad hoc Networks
4
Figure 1: Markov chain modeling a category C1 Station
•
•
•
i : the value of the BAB selected by S 1 in
[0 ,W − 1] .
( i − j ) : corresponds to the current backoff of
the station S 1 .
D 21 : corresponds to ( D2 − D1 ) . We choose
the negative notation − D 21 for stations of
C1 to express the fact that only stations of
category C 2 have a positive DMSB equal to
D 21 .
Initially S 1 selects a random BAB and is in
one of the states ( ~ C2 , i , i ,− D21 ) , i = 0..W − 1 .
During ( D 21 − 1) slots, S 1 decrements its backoff if
none of the ( n1 − 1) remaining stations of category
C1 transmits. Indeed, during these slots, the n 2
stations of category C 2 are decrementing their
DMSB and wouldn’t contend for the channel.
When S 1 is in one of the states
( ~ C 2 , i , i − ( D21 − 1) ,− D21 ) ,
i = D 21 ..W − 1 and
th
senses the channel idle, it decrements its D 21
slot.
But S 1 knows that henceforth the n 2 stations of
category C 2 can contend for the channel (the D 21
slots had been elapsed). Hence, S 1 moves to one of
the states ( C 2 , i , i − D21 ,− D 21 ) , i = D 21 ..W − 1 .
However, when the station S 1 is in one of the
states ( ~ C 2 , i , i − j ,− D 21 ) , i = 1..W − 1 ,
j = 0.. min( D 21 − 1, i − 1) and at least one of the
( n1 − 1) remaining stations of category C1
transmits, then the stations of category C 2 will
reinitialize their DMSB and wouldn’t contend for
channel during additional D21 slots. Therefore, S 1
moves
to
the
state ( ~ C 2 , i − j , i − j ,− D 21 ) ,
i = 1..W − 1 , j = 0.. min( D21 − 1, i − 1) .
Now, If S 1 is in one of the states
( C 2 , i , i − D21 ,− D21 ) , i = ( D21 + 1) ..W − 1 and at
least one of the ( n − 1) remaining stations (either a
category C1 or a category C 2 station) transmits,
then S 1 moves to one of the states
( ~ C 2 , i − D21 , i − D21 ,− D21 ) , i = ( D21 + 1) ..W − 1 .
4.2 Markov chain modeling a station of
category C2
Figure 2 illustrates the Markov chain modeling
a station S 2 of category C 2 . Each state of S 2
Markov chain is represented by the quadruplet
( i , k , D21 − j , D21 ) where:
• i : refers to the BAB value selected by S 2 in
[0 ,W − 1] .
k : refers to the current BAB value of S 2 .
•
•
•
D21 − j : refers to the current DMSB of S 2 ,
j ∈ [ 0 , D21 ] .
D21 : corresponds to ( D 2 − D1 ) .
When S 2 selects a BAB, its DMSB equals D21 
and is in one of the states ( i , i , D 21 , D 21 ) ,
i = 0..W − 1 . During D21 slots, only the n1
stations of category C1 contend for the channel.
If S 2 senses the channel idle during D21 slots, it
moves to one of the states ( i , i ,0 , D 21 ) , i = 0..W − 1 ,
where it ends its shifting backoff.
UbiCC Journal, Volume 3, Special issue on Mobile Ad hoc Networks
5
Figure 2: Markov chain modeling a category C 2 Station
When S 2 is in one of the states ( i , i ,0 , D 21 ) ,
i = 0..W − 1 , the ( n 2 − 1) other stations of category
C 2 have also decremented their DMSB and can
contend for the channel. Thus, S 2 decrements its
BAB and moves to the state ( i , i − 1,0 , D 21 ) ,
i = 2..W − 1 , only if none of ( n − 1) remaining
stations transmits.
If S 2 is in one of the states ( i , i − 1,0 , D 21 ) ,
i = 2..W − 1 , and at least one of the ( n − 1)
remaining stations transmits, the n 2 stations of
category C 2 will reinitialize their DMSB and S 2
( i − 1, i − 1, D21 , D21 ) ,
moves to the state
i = 2..W − 1 .
4.3 Blocking probabilities in the Markov chains
According to the explanations given in
paragraphs 4.1 and 4.2, the states of the Markov
chains modeling stations S 1 and S 2 can be divided
into the following groups:
•
•
•
•
γ
: the set of states of S 2 , where stations
of category C 2 contend for the channel
(pink states in figure 2).
γ 2 = { ( i , i ,0 , D21 ) , i = 0..W − 1
2
∪ ( i , i − 1,0 , D 21 ) , i = 2..W − 1}
Therefore, when stations of category C 1 are in
one the states of ξ 1 , stations of category C 2 are in
one of the states of ξ 2 . Similarly, when stations of
category C 1 are is in one of the states of γ 1 ,
stations of category C 2 are in one of the states of
γ 2.
Hence, we derive the expressions of S 1
blocking probabilities p11 and p12 shown in
figure 1 as follows:
−
p11 : the probability that S 1 is blocked given
that S 1 is in one of the states of ξ 1 . p11 is
ξ 1 : the set of states of S 1 where none of the
n 2 stations of category C 2 contends for the
channel (blue states in figure 1).
ξ 1 = { ( ~ C 2 , i , i − j ,− D 21 ) , i = 0..W − 1,
j = 0.. min( max( 0 , i − 1) , D 21 − 1)}
the probability that at least a station S 1' of
the other ( n1 − 1) stations of C 1 transmits
given that S 1' is in one of the states of ξ 1 .
γ
of C1 transmits given that S 1' is in one of
the states of ξ 1 :
: the set of states of S 1 where stations of
category C 2 can contend for the channel
(pink states in figure 1).
γ 1 = { ( C 2 , i , i − D 21 ,− D 21 ) , i = D 21 ..W − 1}
ξ
1
: the set of states of S 2 where stations of
category C 2 do not contend for the channel
(blue states in figure 2).
ξ 2 = { ( i , i , D 21 − j , D 21 ) , i = 0..W − 1,
p 11 = 1 − ( 1 − τ
where τ
τ
11
[
=
π
(3)
]
( ~ C2 ,0 ,0 ,− D21 )
1
W − 1  min ( max ( 0 ,i − 1) ,D21 − 1)

π 1( ~C2 ,i ,i − j ,− D21 )

i= 0 
j= 0
∑
π 1( R ,i ,i −
) n1 − 1
is the probability that a station S 1'
= Pr S 1' transmits ξ 1
2
j = 0..( D 21 − 1)}
11
11
j ,− D21 )
∑




(4)
is defined as the probability of
the state ( R , i , i − j ,− D21 ) , in the stationary
UbiCC Journal, Volume 3, Special issue on Mobile Ad hoc Networks
6
conditions and Π
{
= π
1
( R ,i ,i −
j ,− D21 )
1
}
is the
probability vector of a category C 1 station.
−
p12 : the probability that S 1 is blocked given
that S 1 is in one of the states of γ 1 . p12 is
the probability that at least a station S 1' of
the other ( n1 − 1) stations of C 1 transmits
given that S 1' is in one of the states of γ 1 or
at least a station S 2' of the n 2 stations of
−
p 22 : the probability that S 2 is blocked
given that S 2 is in one of the states of γ 2 .
p 22 = 1 − ( 1 − τ
 Π i Pi = Π i


π ij = 1
 j

∑
) n1 − 1 ( 1 − τ 22 ) n2
12
(5)
where τ 12 is the probability that a station S 1'
of C 1 transmits given that S 1' is in one of
the states of γ 1 .
τ
[
= Pr S 1' transmits γ
12
=
π 1( C2 ,D21 ,0 ,− D21 )
W−1
∑
π
1
]
(6)
( C2 ,i ,i − D21 ,− D21 )
1
22
the probability that a station S 2' of
C 2 transmits given that S 2' is in one of the
states of γ 2 .
τ
12
= Pr
=
[
S '2
transmits γ
π
W−1
∑
π
π
2
2
]
2
+
i= 0
( i ,k ,D21 −
W−1
∑
π
( i ,i − 1,0 ,D21 )
2
(7)
i= 2
j ,D21 )
of the state
(10)
4.4 Transition probability matrices
4.4.1 Transition probability matrix of a
category C1 station
Let P1 be the transition probability matrix of
the station S 1 of category C1 . P1 { i , j} is the
probability to transit from state i to state j . We
have:
P1 { ( ~ C 2 , i , i − j ,− D 21 ) , ( ~ C 2 , i , i − ( j + 1) ,− D 21 )}
stationary condition. Π
2
j , D 21 ) ,
{
= π
in the
( i ,k ,D21 −
2
j ,D21 )
}
is the probability vector of a category C 2
station.
In the same way, we evaluate p 21 and p 22 the
blocking probabilities of station S 2 as shown in
figure 2:
p 21 : the probability that S 2 is blocked
−
given that S 2 is in one of the states of ξ 2 .
p 21 = 1 − ( 1 − τ
11
(11)
i = 1.. min(W − 1, D 21 − 1)
(12)
P1 { ( ~ C 2 , i , i − D 21 + 1,− D 21 ) , ( C 2 , i , i − D 21 ,− D 21 )}
P1{ ( ~ C2 , i , i − j ,− D21 ) , ( ~ C2 , i − j , i − j ,− D21 )}
= p11 , i = 2..W − 1, j = 1.. min( i − 1, D21 − 1)
P1 { ( ~ C2 , i , i ,− D21 ) , ( ~ C2 , i , i ,− D21 )} = p11 ,
is defined as the probability
( i , k , D21 −
P1 { ( ~ C 2 , i ,1,− D 21 ) , ( ~ C 2 ,0 ,0 ,− D 21 )} = 1 − p11 ,
= 1 − p11 , i = D 21 ..W − 1
( 0 ,0 ,0 ,D21 )
( i ,i ,0 ,D21 )
2
(9)
= 1 − p11 , i = 2..W − 1, j = 0.. min( i − 2 , D 21 − 2 )
i = D21
and τ
) n1 ( 1 − τ 22 ) n2 − 1
The blocking probabilities described above
allow deducing the transition state probabilities and
having the transition probability matrix Pi , for a
station of traffic category C i .
Therefore, we can evaluate the state
probabilities by solving the following system [11]:
C 2 transmits given that S 2' is in one of the
states of γ 2 .
p 12 = 1 − ( 1 − τ
12
)
n1
(8)
i = 1..W − 1
(13)
(14)
(15)
P1{ ( C2 , i , i − D21 ,− D21 ) , ( ~ C2 , i − D21 , i − D21 ,− D21 )}
= p12 , i = ( D21 + 1) ..W − 1
(16)
P1{ ( C2 ,i ,i − D21 ,− D21 ) ,( C2 ,( i − 1) ,( i − 1 − D21 ) ,− D21 )}
= 1 − p12 ,i = ( D21 + 1) ..W − 1
(17)
P1{ ( ~ C2 ,0 ,0 ,− D21 ) , ( ~ C2 , i , i ,− D21 )} =
1
,
W
(18)
i = 0..W − 1
If ( D 21 < W ) then:
UbiCC Journal, Volume 3, Special issue on Mobile Ad hoc Networks
7
1
,
W
P1{ ( C2 , D21 ,0 ,− D21 ) , ( ~ C2 , i , i ,− D21 )} =
 τ 11 = f (τ 11 ,τ 12 ,τ 22 )

 τ 12 = f (τ 11 ,τ 12 ,τ 22 )

 τ 22 = f (τ 11 ,τ 12 ,τ 22 )
 under the constraint

 τ 11 > 0 ,τ 12 > 0 ,τ 22 > 0 ,τ
(19)
i = 0..W − 1
By replacing p11 and p 12 by their values in
equations (3) and (5) and by replacing P1 and Π 1
in (10) and solving the resulting system, we can
( R ,i ,i − j ,− D21 )
express π 1
as a function of τ 11 , τ 12 and
τ 22 given respectively by equations (4), (6) and
(7).
Transition probability matrix of a
category C2 station
Let P2 be the transition probability matrix of
the station S 2 belonging to the traffic category C 2 .
The transition probabilities of S 2 are:
4.4.2
P2 { ( i , i , D21 − j , D21 ) , ( i , i , D21 − ( j + 1) , D21 )}
(20)
= 1 − p21 , i = 0..W − 1, j = 0..( D21 − 1)
P2 { ( i , i ,0 , D21 ) , ( i , i − 1,0 , D21 )} = 1 − p22 ,
P2 { ( 1,1,0 , D21 ) , ( 0 ,0 ,0 , D21 )} = 1 − p22
(23)
P2 { ( i , i ,0 , D21 ) , ( i , i , D21 , D21 )} = p22 ,
(24)
i = 1..W − 1
P2 { ( i , i − 1,0 , D21 ) , ( i − 1, i − 1, D21 , D21 )} = p22 ,
i = 2..W − 1
(25)
P2 { ( i , i − 1,0 , D21 ) , ( i − 1, i − 2 ,0 , D21 )} = 1 − p22 ,
i = 3..W − 1
P2 { ( 0 ,0 ,0 , D21 ) , ( i , i , D21 , D21 )} =
(26)
1
, i = 0..W − 1 (27)
W
22
given respectively by equations (4), (6)
and (7). Moreover, by replacing π
π
( i ,k ,D21 −
2
j ,D21 )
( R ,i ,i −
1
j ,− D21 )
and
22
< 1
THROUGHPUT ANALYSIS
Pi ,s : the probability that a station S i belonging
to the traffic category C i transmits a packet
successfully. Let S 1 and S 2 be two stations
belonging respectively to traffic categories C 1
and C 2 . We have:
P1,s = Pr [ S1 transmits successfully ξ 1 ] Pr [ξ 1 ]
+ Pr [ S1 transmits successfully γ 1 ] Pr [γ 1 ]
= τ 11 ( 1 − p11 ) Pr [ξ 1 ] + τ 12 ( 1 − p12 ) Pr [γ 1 ]
(29)
P2 ,s = Pr [ S 2 transmits successfully ξ
+ Pr [ S 2 transmits successfully γ
−
22 ( 1 −
p 22 ) Pr [γ
2]
2
] Pr[ξ 2 ]
] Pr[γ 2 ]
2
(30)
Pidle : the probability that the channel is idle.
The channel is idle if the n1 stations of
category C 1 don’t transmit given that these stations
are in one of the states of ξ 1 or if the n stations
(both category C 1 and category C2 stations) don’t
transmit given that stations of category C 1 are in
one of the states of γ 1 . Thus:
Pidle = ( 1 − τ
by their values, in equations (4), (6)
and (7), we obtain a system of non linear equations
as follows:
< 1,τ
In this section, we propose to evaluate Bi , the
normalized throughput achieved by a station of
traffic category C i [1]. Hence, we define:
=τ
By replacing p 21 and p22 by their values in
equations (8) and (9) and by replacing P2 and Π 2
in (10) and solving the resulting system, we can
( i ,k ,D − j ,D21 )
express π 2 21
as a function of τ 11 , τ 12
and τ
5
(22)
i = 2..W − 1
12
Solving the above system (28), allows deducing
the expressions of τ 11 , τ 12 and τ 22 , and deriving
the state probabilities of Markov chains modeling
category C 1 and category C 2 stations.
(21)
i = 0..W − 1, j = 0..( D21 − 1)
< 1,τ
(28)
−
P2 { ( i , i , D21 − j , D21 ) , ( i , i , D21 , D21 )} = p21 ,
11
11
) n1
Pr [ξ 1 ] + ( 1 − τ
12
) n1 ( 1 − τ 22 ) n2
Pr [γ 1 ]
(31)
Hence, the expression of the throughput of a
category C i station is given by:
UbiCC Journal, Volume 3, Special issue on Mobile Ad hoc Networks
8
Bi =
Pi ,s T P

PIdle Te + Ps Ts +  1 − PIdle −


2
∑
i= 1

ni Pi ,s  Tc


(32)
Where Te denotes the duration of an empty
slot, Ts and Tc denote respectively the duration of
a successful transmission and a collision.
2


 1 − PIdle −
ni Pi ,s 
corresponds
to
the


i= 1


probability of collision. Finally T p denotes the
∑
average time required to transmit the packet data
payload. We have:
(
)
Ts = T PHY + TMAC + T p + T D + SIFS +
( TPHY
+ T ACK + T D ) + DIFS
(
)
Tc = TPHY + TMAC + T p + TD + EIFS
For all the scenarios, we consider that we are in
n
presence of n contending stations with
stations
2
for each traffic category. In figure 3, n is fixed to
8 and we depict the throughput achieved by the
different stations present in the network as a
function of the contention window size W ,
( D21 = 1) . We notice that the throughput achieved
by category C1 stations (stations numbered from
S 11 to S 14 ) is greater than the one achieved by
category C 2 stations (stations numbered from S 21
to S 24 ).
(33)
(34)
Where T PHY , TMAC and T ACK are the
durations of the PHY header, the MAC header and
the ACK packet [1], [13]. T D is the time required to
transmit the two bytes deadline information.
Stations hearing a collision wait during EIFS before
resuming their backoff.
For numerical results stations transmit 512
bytes data packets using 802.11.b MAC and PHY
layers parameters (given in table 1) with a data rate
equal to 11Mbps. For simulation scenarios, the
propagation model is a two ray ground model. The
transmission range of each node is 250m. The
distance between two neighbors is 5m. The EIFS
parameter is set to ACKTimeout as in ns-2, where:
ACKTimeout = DIFS + ( T PHY + T ACK + T D ) + SIFS
(35)
Table 1: 802.11 b parameters.
Data Rate
Slot
SIFS
DIFS
PHY Header
MAC Header
ACK
Short Retry Limit
11 Mb/s
20 µs
10 µs
50 µs
192 µs
272 µs
112 µs
7
Figure 3: Normalized throughput as a function of
the contention window size ( D 21 = 1, n = 8 )
Analytically, stations belonging to the same
traffic category have the same throughput given by
equation (31). Simulation results validate analytical
results and show that stations belonging to the same
traffic category (either category C1 or category C 2
) have nearly the same throughput. Thus, we
conclude the fairness of DM between stations of the
same category.
For subsequent throughput scenarios, we focus
on one representative station of each traffic
category. Figure 4, compares category C1 and
category C 2 stations throughputs to the one
obtained with 802.11.
Curves are represented as a function of W and
for different values of D21 . Indeed as D21
increases, the category C1 station throughput
increases, whereas the category C 2 station
throughput decreases. Moreover as W increases,
the difference between stations throughputs is
reduced. This is due to the fact that the shifting
backoff becomes negligible compared to the
contention window size.
UbiCC Journal, Volume 3, Special issue on Mobile Ad hoc Networks
9
Finally, we notice that the category C1 station
obtains better throughput with DM than with
802.11, but the opposite scenario happens to the
category C 2 station.
We propose to evaluate the Z-Transform of the
MAC layer service time [3], [14], [15] to derive an
expression of the average service time. The service
time depends on the duration of an idle slot Te , the
duration of a successful transmission Ts and the
duration of a collision Tc [1], [3],[14]. As Te is the
smallest duration event, the duration of all events
 Tevent 
will be given by 
.
 Te 
6.1 Z-Transform of the MAC layer service time
6.1.1 Service time Z-transform of a category
C1 station:
Let TS 1 ( Z ) be the service time Z-transform of
a station S1 belonging to traffic category C 1 . We
define:
Figure 4: Normalized throughput as a function of
the contention window size (different D21 values)
In figure 5, we generalize the results for
different numbers of contending stations and fix the
contention window size W to 32.
H 1( R ,i ,i −
j ,− D21 )
(Z) :
The Z-transform of the
time already elapsed from the instant S 1 selects a
basic backoff in [ 0 ,W − 1] (i.e. being in one of the
states ( ~ C 2 , i , i ,− D 21 ) ) to the time it is found in the
state ( R ,i ,i − j ,− D21 ) .
Moreover, we define:
11
Psuc
: the probability that S 1 observes a
successful transmission on the channel,
while S 1 is in one of the states of ξ 1 .
•
11
Psuc
= ( n1 − 1)τ 11 ( 1 − τ 11 ) n1 − 2
(36)
12
Psuc
: the probability that S 1 observes a
successful transmission on the channel,
while S 1 is in one of the states of γ 1 .
•
12
Psuc
= ( n1 − 1)τ 12 ( 1 − τ 12 ) n1 − 2 ( 1 − τ 22 ) n2
Figure 5: Normalized throughput as a function of
the number of contending stations
All the curves show that DM performs service
differentiation over 802.11 and offers better
throughput for category C1 stations independently
of the number of contending stations.
6
SERVICE TIME ANALYSIS
In this section, we evaluate the average MAC
layer service time of category C 1 and category C 2
stations using the DM policy. The service time is
the time interval from the time instant that a packet
becomes at the head of the queue and starts to
contend for transmission to the time instant that
either the packet is acknowledged for a successful
transmission or dropped.
+ n2τ 22 ( 1 − τ 22 ) n2 − 1 ( 1 − τ 12 ) n1 − 1
(37)
We evaluate H 1( R ,i ,i − j ,− D21 ) ( Z ) for each state
of S1 Markov chain as follows:
H 1( ~ C2 ,i ,i ,− D21 ) ( Z ) =
(p
11
−
11
Psuc
)
 Ts 

1  11  Te 
+ Psuc Z
+
W 

 Tc  
  min ( i + D21 − 1,W − 1)
T 
Z e  
H 1( ~ C 2 ,k ,i ,− D21 )
k = i+ 1


∑
(Z)
 Ts 
 Tc 

 
 12  Te 
T
12
+ Ĥ 1( C 2 ,i + D21 ,i ,− D21 ) ( Z )  Psuc Z
+ p11 − Psuc Z  e 


(
)





(38)
Where:
UbiCC Journal, Volume 3, Special issue on Mobile Ad hoc Networks
10
 Ĥ 1( C ,i + D ,i ,− D ) ( Z ) = H 1( C ,i + D ,i ,− D ) ( Z )
2
21
21
2
21
21

 if ( i + D 21 ) ≤ W − 1

 Ĥ 1( C2 ,i + D21 ,i ,− D21 ) ( Z ) = 0 Otherwise
(39)
We also have:
H 1( ~ C2 ,i ,i −
( (1 −
j ,− D21 ) ( Z ) =
p11 ) Z ) j H 1( ~ C2 ,i ,i ,− D21 ) ( Z )
 Ts 
 
Te 
11 
1 − Psuc
Z
i = 2..W − 1, j = 1..min( i − 1, D21 − 1)
(
 Tc 
 
Te 
)
( (1 −
1−
p11 ) Z ) D21 H 1( ~ C2 ,i ,i ,− D21 ) ( Z )
 Ts 
 
11  Te 
Psuc Z
(
− p11 −
11
Psuc
)
 Tc 
 
T
Z e 
+ ( 1 − p12 ) ZH 1( C 2 ,i + 1,i + 1− D21 ,− D21 ) ( Z ) ,i = D21 ..W − 2
(41)
H 1( C 2 ,W − 1,W − 1− D21 ,− D21 ) ( Z )
=
( (1 −
p11 ) Z ) D21 H 1( ~ C2 ,W − 1,W − 1,− D21 ) ( Z )
1−
 Ts 
 
11  Te 
Psuc Z
(
− p11 −
11
Psuc
)
TS1 ( Z ) =
  Tc 
  Te 
+ ( 1 − p12 ) H 1( C2 ,D21 ,0 ,− D21 ) ( Z )
p11 H 1( ~ C2 ,0 ,0 ,− D21 ) ( Z )
Z
i= 0 

)∑
+ p12 H 1( C2 ,D21 ,0 ,− D21 ) ( Z )
1−
+ ( 1 − p11 ) Z
min ( W − 1,D21 − 1)
∑
i= 2
i
(44)
6.1.2 Service time Z-transform of a category
C2 station:
In the same way, let TS2 (Z) be the service
time Z-transform of a station S 2 of category C 2 .
We define:
H 2( i ,k ,D21 − j ,D21 ) ( Z ) : The Z-transform of the
time already elapsed from the instant S 2 selects a
basic backoff in [0 ,W − 1] (i.e. being in one of the
states ( i , i , D21 , D 21 ) ) to the time it is found in the
state ( i , k , D21 − j , D 21 ) .
Moreover, we define:
•
21
Psuc
: the probability that S 2 observes a
successful transmission on the channel,
while S 2 is in one of the states of ξ 2 .
11
Psuc
= ( n1 − 1)τ 12 ( 1 − τ 12 ) n1 − 1
p11 ) ZH 1( ~ C2 ,1,1,− D21 ) ( Z )
(
− p11 −
H 1( ~ C2 ,i ,1,− D21 ) ( Z ) +
11
Psuc
)Z
 Tc 
 
 Te 
•
1
W
If S 1 transmission state is ( ~ C 2 ,0 ,0 ,− D 21 ) ,
the transmission will be successful only if none of
the ( n1 − 1) remaining stations of C 1 transmits.
Whereas when the station S 1 transmission state is
( C 2 , D21 ,0 ,− D21 ) , the transmission occurs
successfully only if none of ( n − 1) remaining
stations (either a category C 1 or a category C 2
station) transmits.
If the transmission fails, S 1 tries another
transmission. After m retransmissions, if the
packet is not acknowledged, it will be dropped.
(45)
22
Psuc
: the probability that S 2 observes a
successful transmission on the channel,
while S 2 is in one of the states of γ 2 .
22
Psuc
= n1τ 12 ( 1 − τ 12 ) n1 − 1 ( 1 − τ 22 ) n2 − 1
(43)
Thus:
))
(
 Tc 
 
T
Z e 
 Ts 
 
11  Te 
Psuc Z
(
  Tc 
 T
+  Z  e  p11H 1( ~ C2 ,0 ,0 ,− D21 ) ( Z ) + p12 H 1( C 2 ,D21 ,0 ,− D21 ) ( Z )


(42)
H 1( ~ C 2 ,0 ,0 ,− D21 ) ( Z ) =
p11 ) H 1( ~ C 2 ,0 ,0 ,− D21 ) ( Z )
m
+ ( 1 − p12 ) ZH 1( C 2 ,i + 1,i + 1− D21 ,− D21 ) ( Z ) ,i = D21 ..W − 2
(1 −
(( 1 −
11
− p11 − Psuc
Z
(40)
H 1( C2 ,i ,i − D21 ,− D21 ) ( Z ) =
 Ts 
 
T
Z e 
+ ( n2 − 1)τ 22 ( 1 − τ 22 ) n2 − 2 ( 1 − τ 12 ) n1
(46)
We evaluate H 2( i ,i ,D21 − j ,− D21 ) ( Z ) for each state
of S1 Markov chain as follows:
1
H 2( i ,i ,D21 − j ,D21 ) ( Z ) =
, i = 0 and i = W − 1 (47)
W
 Ts 

1  22  Te 
H 2( i ,i ,D21 ,D21 ) ( Z ) =
+  Psuc Z
+
W 

 Tc  
  
T
22
p 22 − Psuc
Z  e   H 2( i + 1,i ,0 ,D21 ) ( Z ) , i = 1..W − 2


(48)
(
)
To compute H 2( i ,i ,D21 −
j ,D21 )
(Z) ,
we define
j
( Z ) , such as:
Tdec
UbiCC Journal, Volume 3, Special issue on Mobile Ad hoc Networks
11
)





m+ 1
0
Tdec
(Z) =
1
(49)
(1 −
j
Tdec
(Z) =

 21
1 −  Psuc
Z


for j = 1..D 21
 Ts 
 
 Te 
p 21 ) Z
(
)
21
+ p 21 − Psuc
Z
 Tc 
 
 Te 

 j− 1
 Tdec ( Z )


 Tc 


 


T
TS 2 ( Z ) =  p 22 Z  e  H 2( 0 ,0 ,0 ,D21 ) ( Z ) 




(1 −
p 22 ) Z
 Ts 
 
 Te 
H 2( 0 ,0 ,0 ,D21 ) ( Z )
m
∑
i= 0
m+ 1
+
 Tc 


 


Te 

H 2( 0 ,0 ,0 ,D21 ) ( Z ) 
 p 22 Z




(54)
(50)
So:
H 2( i ,i ,D21 −
j ,D21 )
(Z) =
H 2( i ,i ,D21 −
j + 1,D21 )
i = 0..W − 1, j = 1..D 21 , ( i , j ) ≠ ( 0 , D 21 )
( Z )Tdecj ( Z ) ,
(51)
And:
H 2( i ,i − 1,0 ,D21 ) ( Z ) = ( 1 − p 22 ) ZH 2( i + 1,i ,0 ,D21 ) ( Z )
+
(1 −
p 22 ) ZH 2( i ,i ,0 ,D21 ) ( Z )
 Ts 
 Tc 

 
 22  Te 
T
22
1 −  Psuc Z
+ p 22 − Psuc Z  e 


i = 2..W − 2
(
)
Where TS i( 1) ( Z ) , is the derivate of the service
time Z-transform of station S i [11].

 D21
 Tdec ( Z )


(51)
H 2( W − 1,W − 2 ,0 ,D21 ) ( Z )
=
(1 −
p 22 ) ZH 2( W − 1,W − 1,0 ,D21 ) ( Z )
 Ts 
 Tc 

 
 22  Te 
T
22
1 −  Psuc Z
+ p 22 − Psuc Z  e 


(
)
6.2 Average Service Time
From equations (43) (respectively equation
(54)), we derive the average service time of a
category C 1 station ( respectively a category C 2
station). The average service time of a category C i
station is given by:
X i = TS i( 1) ( 1)
(55)
(52)

 D21
 Tdec ( Z )


By considering the same configuration as in
figure 3, we depict in figure 5, the average service
time of category C 1 and category C2 stations as a
function of W . As for the throughput analysis,
stations belonging to the same traffic category have
nearly the same average service value. Simulation
service time values coincide with analytical values
given by equation (55). These results confirm the
fairness of DM in serving stations of the same
category.
According to figure 2 and using equations (44),
we have:
H 2( 0 ,0 ,0 ,D21 ) ( Z ) = H 2( 0 ,1,0 ,D21 ) ( Z )Tdec21 ( Z )
( 1 − p 22 ) ZH 2( 1,1,0 ,D21 ) ( Z )
+
(53)
 Ts 
 Tc  

  
 22  Te 
Te 
D21
22

1 −  Psuc Z
+ p 22 − Psuc Z
 Tdec ( Z )




D
(
)
Therefore, we can derive an expression of S 2
Z-transform service time as follows:
Figure 6: Average service time as a function of the
contention window size (D21=1, n=8)
In figure 8, we show that category C 1 stations
obtain better average service time than the one
obtained with 802.11 protocol. Whereas, the
opposite scenario happens for category C 2 stations
UbiCC Journal, Volume 3, Special issue on Mobile Ad hoc Networks
12
i
independently of n , the number of contending
stations within the network.
D 21 = 4 , the probability that
S 1 service time
exceeds 0.005s equals 0.28%. Whereas, station S 2
service time exceeds 0.005s with the probability
5.67%. Thus, DM offers better service time
guarantees for the stations with the highest priority.
In figure 9, we double the size of the contention
window size and set it to 64. We notice that
category C 1 and category C 2 stations service time
curves become closer. Indeed, when W becomes
large, the BAB values increase and the (DMSB)
becomes negligible compared to the basic backoff.
The whole backoff values of S 1 and S 2 become
near and their service time accordingly.
Figure 7: Average service time as a function of the
number of contending stations
6.3 Service Time Distribution
Service time distribution is obtained by
inverting the service time Z transforms given by
equations (43) and (54). But we are most interested
in probabilistic service time bounds derived by
inverting the complementary service time Z
transform given by [11]:
1 − TS i ( Z )
~
Xi (Z) =
1− Z
(55)
Figure 9: Complementary service time distribution
for different values of D21 (W=64)
In figure 8, we depict analytical and simulation
values of the complementary service time
distribution of both category C 1 and category C 2
station (W = 32 ) .
In figure 10, we depict the complementary
service time distribution for both category C 1 and
category C 2 stations and for values of n , the
number of contending nodes.
Figure 8: Complementary service time distribution
for different values of D21 , (W = 32 )
Figure 10: Complementary service time
distribution for different values of the contending
stations
All the curves drop gradually to 0 as the delay
increases. Category C 1 stations curves drop to 0
faster than category C 2 curves. Indeed, when
Analytical and simulation results show that
complementary service time curves drop faster
when the number of contending stations is small for
both category C 1 and category C 2 stations. This
UbiCC Journal, Volume 3, Special issue on Mobile Ad hoc Networks
13
means that all stations service time increases as the
number of contending nodes increases.
7 EXTENTIONS OF THE ANAYTICAL
RESULTS BY SIMULATION
The mathematical analysis undertaken above
show that DM performs service differentiation over
802.11 protocol and offers better QoS guarantees
for highest priority stations
Nevertheless, the analysis was restricted to two
traffic categories. In this section, we first generalize
the results by simulation for different traffic
categories. Therefore, we consider a simple multihop and evaluate the performance of the DM policy
when the stations belong to different broadcast
regions.
CW max < 1024 and K =1.
Analytical and simulation results show that
throughput values increase with stations priority.
Indeed, the station with the lowest delay bound has
the maximum throughput.
Moreover, figure 12 shows that stations
belonging to the same traffic category have the
same throughput. For instance, when n is set to 15
(i.e. m = 3 ), the three stations of the same traffic
category have almost the same throughput.
7.1 Extension of the analytical results
In this section, we consider n stations
contending for the channel in the same broadcast
region. The n stations belong to 5 traffic categories
where n = 5 m and m is the number of stations of
the same traffic category. A traffic category C i is
characterized by a delay bound Di , and
Dij = Di − D j is the difference between the
deadline values of category C i and category C j
stations. We have:
Dij = ( i − j ) K
(53)
Where K is the deadline multiplicity factor
and is given by:
Di + 1,i = Di + 1 − Di = K
(53)
Indeed, when K varies, the deadline values of
all other stations also vary. Stations belonging to
the traffic category C i are numbered from S i1 to
S im .
Figure 11: Normalized throughput for different
traffic category stations
In figure 11, we depict the throughput achieved
by different traffic categories stations as a function
of the minimum contention window size CW min
such as CW min is always smaller than CW max ,
Figure 12: Normalized throughput: different
stations belonging to the same traffic category
In figure 13, we depict the average service
time of the different traffic category stations as a
function of K , the deadline multiplicity factor. We
notice that the highest priority station average
service time decreases as the deadline multiplicity
factor increases. Whereas, the lowest priority
station average service time increases with K .
Figure 13: Average service time as a function of
the deadline multiplicity factor K
In the same way, the probabilistic service time
bounds offered to S 11 (the highest priority station)
are better than those offered to station S 51 (the
lowest priority station). Indeed, the probability that
S 11 service time exceeds 0.01s=0.3%. But, station
UbiCC Journal, Volume 3, Special issue on Mobile Ad hoc Networks
14
S 51 service time exceeds 0.01s with the probability
of 36%.
and D21 = D 2 − D1 =5 slots. Flows F3 and F4 are
transmitted respectively by S 12 and S 4 and have
the same delay bound. Finally, F5 and F6 are
transmitted respectively by S 5 and S 6 with delay
bounds D1 and D2 and D 2 ,1 = D2 − D1 = 5 slots.
Figure 16 shows that the throughput achieved
by F1 is smaller than the one achieved by F2 .
Figure 14: Complementary
distribution (W=32, n=8)
service
time
The above results generalize the analytical
model results and show once again that DM
performs service differentiation over 802.11 and
offer better guarantees in terms of throughput,
average service time and probabilistic service time
bounds for flows with short deadlines.
7.2 Simple Multi hop scenario
In the above study, we considered that
contending stations belong to the same broadcast
region. In reality, stations may not be within one
hop from each other. Thus a packet can go through
several hops before reaching its destination. Hence,
factors like routing protocols or interferences may
preclude the DM policy from working correctly.
In the following paragraph, we evaluate the
performance of the DM policy in a multi-hop
environment. Hence, we consider a 13 node simple
mtlti-hop scenario described in figure 15.
Figure 15: Simple multi hop scenario
Six flows are transmitted over the network. Flows
packets are routed using the AODV protocol.
Flows F1 and F2 are respectively transmitted by
stations S 1 and S 2 with delay bounds D1 and D2
Figure 16: Normalized throughput using DM
policy
Indeed, both flows cross nodes 6 and 7, where
F1 got a higher priority to access the medium than
F2 when the DM policy is used. We obtain the
same results for flows F5 and F6 . Flows F3 and
F4 have almost the same throughput since they
have equal deadlines.
Figure 17 show that the complementary service
time distribution curves drop to 0 faster for flow F1
than for flow F2 .
Figure 17: End to end complementary service time
distribution
The same behavior is obtained for flow F5 and F6,
where F5 has the shortest delay bound.
Hence, we conclude that even in a multi-hop
UbiCC Journal, Volume 3, Special issue on Mobile Ad hoc Networks
15
environment, the DM policy performs service
differentiation over 802.11 and provides better QoS
guarantees for flows with short deadlines.
8
CONCLUSION
In this paper we first proposed to support the
DM policy over 802.11 protocol. Therefore, we
used a distributed backoff scheduling algorithm and
introduced a new medium access backoff policy.
Then we proposed a mathematical model to
evaluate the performance of the DM policy. Indeed,
we considered n contending stations belonging to
two traffic categories characterized by different
delay bounds. Analytical and simulation results
show that DM performs service differentiation over
802.11 and offers better guarantees in terms of
throughput, average service time and probabilistic
service time bounds for the flows having small
deadlines. Moreover, DM achieves fairness
between stations belonging to the same traffic
category.
Then, we extended by simulation the analytical
results obtained for two traffic categories to
different traffic categories. Simulation results
showed that even if contending stations belong to
K traffic categories, K > 2 , the DM policy offers
better QoS guarantees for highest priority stations.
Finally, we considered a simple multi-hop scenario
and concluded that factors like routing messages or
interferences don’t impact the behavior of the DM
policy and DM still provides better QoS guarantees
for stations with short deadlines.
9
REFERENCES
[1] G. Bianchi: Performance Analysis of the IEEE
802.11 Distributed Coordination Function,
IEEE J-SAC Vol. 18 N. 3, (March 2000).
[2] H. Wu1, Y. Peng, K. Long, S. Cheng, J. Ma:
Performance of Reliable Transport Protocol
over IEEE 802.11 Wireless LAN: Analysis and
Enhancement, In Proceedings of the IEEE
INFOCOM`02, June 2002.
[3] H. Zhai, Y. Kwon, Y., Fang: Performance
Analysis of IEEE 802.11 MAC protocol in
wireless LANs”, Wireless Computer and
Mobile Computing, (2004).
[4] I. Aad and C. Castelluccia, “Differentiation
mechanisms for IEEE 802.11”, In Proc. of
IEEE Infocom 2001, (April 2001).
[5] IEEE 802.11 WG: Part 11: Wireless LAN
Medium Access Control (MAC) and Physical
Layer (PHY) specification”, IEEE (1999).
[6] IEEE 802.11 WG, ”Draft Supplement to Part
11: Wireless Medium Access Control (MAC)
and physical layer (PHY) specifications:
Medium Access Control (MAC) Enhancements
for Quality of Service (QoS)”, IEEE
802.11e/D13.0, (January 2005).
[7] J. Deng, R. S. Chang: A priority Scheme for
IEEE 802.11 DCF Access Method, IEICE
Transactions in Communications, vol. 82-B,
no. 1, (January 1999).
[8] J.L. Sobrinho, A.S. Krishnakumar: Real-time
traffic over the IEEE 802.11 medium access
control layer, Bell Labs Technical Journal, pp.
172-187, (1996).
[9] J. Y. T. Leung, J. Whitehead: On the
Complexity of Fixed-Priority Scheduling of
Periodic, Real-Time Tasks, Performance
Evaluation (Netherlands), pp. 237-250, (1982).
[10]K. Duffy, D. Malone, D. J. Leith: Modeling
the 802.11 Distributed Coordination Function
in Non-saturated Conditions, IEEE/ACM
Transactions
on
Networking
(TON),
Vol. 15 , pp. 159-172 (February 2007)
[11]L. Kleinrock: Queuing Systems,Vol. 1: Theory,
Wiley Interscience, 1976.
[12]P. Chatzimisios, V. Vitsas, A. C. Boucouvalas:
Throughput and delay analysis of IEEE 802.11
protocol, in Proceedings of 2002 IEEE 5th
International Workshop on
Networked
Appliances, (2002).
[13]P.E. Engelstad, O.N. Osterbo: Delay and
Throughput Analysis of IEEE 802.11e EDCA
with Starvation Prediction, In proceedings of
the The IEEE Conference on Local Computer
Networks , LCN’05 (2005).
[14]P.E. Engelstad, O.N. Osterbo: Queueing Delay
Analysis of 802.11e EDCA, Proceedings of
The Third Annual Conference on Wireless On
demand Network Systems and Services
(WONS 2006), France, (January 2006).
[15]P.E. Engelstad, O.N. Osterbo: The Delay
Distribution of IEEE 802.11e EDCA and
802.11 DCF, in the proceeding of 25th IEEE
International Performance Computing and
Communications Conference (IPCCC’06),
(April 2006), USA.
[16]The
network
simulator
ns-2,
http://www.isi.edu/nsnam/ns/.
[17]Y. Xiao: Performance analysis of IEEE
802.11e EDCF under saturation conditions,
Proceedings of ICC, Paris, France, (June 2004).
[18]V. Kanodia, C. Li: Distribted Priority
Scheduling and Medium Access in Ad-hoc
Networks”, ACM Wireless Networks, Volume
8, (November 2002).
UbiCC Journal, Volume 3, Special issue on Mobile Ad hoc Networks
16
Impact of Node Density on Cross Layer Design for Reliable Route Discovery
in Mobile Ad-hoc Networks
B.Ramachandran
S.Shanmugavel
Dept. of Electronics & Communication Engg.
S.R.M. University
Chennai – 603 203
profbram@yahoo.com
Dept. of Electronics & Communication Engg.
Anna University
Chennai – 600 025
ssv@annauniv.edu
Abstract :
The mobile nature of nodes and dynamic
topology of Mobile Ad-hoc Networks (MANETs) lead
to route failures and requiring the transmission of
control packets. It is important to reduce the number of
control packets to save resources and to improve the
overall performance of the network. Ad-hoc Ondemand Distance Vector (AODV) is appealing as an
efficient on demand routing protocol because of low
routing overhead and high performance. However,
AODV is not robust against topology variations as it
uses weak links due to long hops introduced by shortest
path metric. In this paper we propose a mobility
adaptive cross layer design to enhance the performance
of AODV routing protocol by establishing stable
routes. The adaptive decision making according to the
speed of mobile nodes on Route Request (RREQ)
packet forwarding results in stable routes. We also test
the impact of node density in the network on our
algorithm, to tell, when to invoke the our cross layer
design in mobile ad-hoc networks. To demonstrate the
efficiency of our protocol and its impact on network
connectivity, we present simulations using network
simulator, GloMoSim.
Keywords: Mobile Ad-hoc Networks, AODV, Routing
Overhead, Stable Route, and Cross Layer Design.
AODV and DSR send control packets only when route
discovery or route maintenance is done. When a route
is created or repaired, the control packets, particularly
RREQ packets flooded by source is network wide
broadcast. Moreover, the number of control packets
increased rapidly with network size and topology
changes.
The primary goal of an ad-hoc network
routing protocol is correct and efficient route
establishment between a pair of nodes so that messages
may be delivered in a timely manner.
Route
construction should be done with a minimum of
overhead and bandwidth consumption. The on-demand
routing protocols create route only when desired by the
source node. When a node requires a route to a
destination, it initiates a route discovery process within
the network. This process is completed once a route is
found or all possible route permutations have been
examined. Once a route has been established, it is
maintained by a route maintenance procedure or until
the route is no longer desired. The Ad-hoc On-Demand
Distance Vector routing protocol builds on the
Destination Sequenced Distance Vector (DSDV)
algorithm. It is an improvement on DSDV because it
typically minimizes the routing load by creating routes
on a demand basis.
AODV [2] is a pure on-demand route
acquisition system, since node that are not on a
selected path do not maintain routing information or
participate in routing table exchanges. When a source
node desires to send a message to some destination and
does not already have a valid route to that destination,
it initiates a “route discovery” process to locate the
destination. It broadcasts a route request packet to its
neighbours, which then forward to their neighbours and
so on, until either the destination or an intermediate
node with a “fresh enough” route to the destination is
located. During the process of forwarding the RREQ,
the intermediate nodes record in their route tables the
address of the neighbor from which the first copy of
the broadcast packet is received thereby establishing a
reverse path. If additional copies of the same RREQ
are later received, these packets are discarded. Once
the RREQ reaches the destination or an intermediate
node with a fresh enough route, the destination /
I. Introduction
Recent growing interest on potential
commercial usage of MANETs has led to the serious
research in this energy and bandwidth constrained
network. It is essential to reduce control packet
overhead as they consume resources. Routing in
MANETs is non trivial. Since mobile nodes have
limited
transmission
capacity,
they
mostly
intercommunicate by multi-hop relay. Multi-hop
routing is challenged by limited wireless bandwidth,
low device power, dynamically changing network
topology, and high vulnerability to failure and many
more. To meet those challengeous, many routing
protocols have been proposed for MANET [1]. They
are categorized as proactive and reactive protocols.
Proactive protocols such as DSDV periodically send
routing control packets to neighbors for updating
routing tables. Reactive routing protocols such as
UbiCC Journal, Volume 3, Special issue on Mobile Ad hoc Networks
17
intermediate node responds by a unicast route reply
(RREP) packet back to the neighbor from which it first
received the RREQ. (The route maintenance process
and other details of AODV are not considered here as
they are out of scope of this paper).
AODV prefers longer hops to form shortest
path, which in turn makes route with weaker links. The
presence of node mobility may induce route failures
(link failures) frequently. Many studies have shown
that the on demand approach is relatively quite
efficient under a wide range of scenarios. But when
seen in isolation, route discovery component is the
major bottleneck in on demand protocols. Since route
discovery is done via network wide flooding, it incurs
significant routing overhead and eats greater network
resources. Actually, the longer distance between
intermediate nodes on the route rises route maintenance
cost, reduces the packet transmission rate (due to
increased packet loss), and induces frequent route
failures [3].
In our previous work, we proposed a cross
layer design extension to AODV in order to form stable
routes. It reduces route failures and hence, keeps
routing overheads as low as possible, at the cost of
lengthy routes with more hops. In this paper, we go
further in enhancing AODV performance, by using
mobility based adaptive cross layer design to optimize
the trade off between route stability and number of
hops. Our objective is to form reliable routes in order
to reduce number of routing control packets, and thus
conserving network resources.
The proposed mobility adaptive cross layer
design couples the route discovery process with
physical layer related received signal strength
information and speed of mobile nodes to built stable
and optimum routes. As these constraints on received
signal strength and node speed will certainly have an
impact on network connectivity, we also study the
suitability of our algorithm under various node density
levels. The remainder of this paper is organized as
follows. In section II, we present the related work and
emphasize the need for cross layer design. Section III
describes the proposed mobility adaptive cross layer
algorithm. The simulation model, results and analysis
are presented in section IV. Finally we conclude our
discussion in section V.
II. Related Work
As an optimization for the current basic
AODV, in [4], a novel stable adaptive enhancement for
AODV routing protocol is proposed, which considers
joint route hop count, node stability and route traffic
load as a route selection metric. A QoS routing
protocol based on AODV to provide higher packet
delivery ratio and lower routing overheads using a
local repair mechanism is proposed in [5]. The received
signal strength changing rate is used to predict the link
available time between two nodes to find out a
satisfying routing path in [6], which reports
improvement in route connection time. In [7], route
fragility coefficient (RFC) is used as routing metric, to
cause AODV to find a stable route. Mobility aware
agents are introduced in ad-hoc networks and Hello
packets of AODV protocol is modified in [8] to
enhance mobility awareness of node to force it to avoid
highly mobile neighbor nodes to be part of routes and
ultimately to reduce the re-route discovery. On
receiving the Hello Packet with GPS co-ordinates of
the originator, mobility agent compares them with
previous ones and hence has awareness about the
mobility of the originator with references to itself.
In [9], an AODV based protocol which uses a
backbone network to reduce control overhead is
proposed. The destination location is given by GPS and
transmitted to source by the backbone network to limit
the route search zone. But formation of an additional
backbone network and GPS enabled service are extra
burden for infrastructure-less ad-hoc network
implementation. In order to cope with problems such as
the poor performance of wireless links and mobile
terminals including high error rate, power saving
requirements and quality of service, a protocol stack
that considers cross layer interaction is required [10].
Multi-hop routing, random movement of the
nodes and other features unique to ad-hoc networks
results in lots of control signal overhead for route
discovery and maintenance. This is highly
unacceptable in bandwidth-constrained ad-hoc
networks. Usually the mobile devices have limited
computing resources and severe energy constraints.
Currently ad hoc routing protocols are researched to
work mainly on the network layer. It guarantees the
independency of the network layer. However each
layer needs to do redundant processing and
unnecessary packet exchange to get information that is
easily available to other layers. This increases control
signals resulting in wastage of resources such as
bandwidth and energy. Due to these characteristics,
there is lot of research work happening in the
performance optimization of ad-hoc networks.
However, most of the research works are based on
optimization at individual layer. But optimizing a
particular layer might improve the performance of that
layer locally but might produce non-intuitive side
effects that will degrade the overall system
performance. Hence optimization across the layers is
required through interaction among layers by sharing
interlayer interaction metrics [11]. By using cross layer
interaction, different layers can share locally available
information. This is useful to design and standardize an
adaptive architecture that can exploit the interdependencies among link, medium access, networking
UbiCC Journal, Volume 3, Special issue on Mobile Ad hoc Networks
18
and application protocols. The architecture where each
layer of the protocol stack responds to the local
variations as well as to the information from other
layers is a major challenge [12].
Cross layer interaction schemes that can
support adaptability and optimization of the routing
protocols can discover and maintain the routes based
on current link status, traffic congestion, signal strength
etc. Usually routing layer is not concerned with signal
strength related information handling. Lower layer
takes care of signal strength related issues. Signal
strength can be useful to know the quality of link to
select for best effort packet forwarding and to achieve
power conservation [13]. Only the link with signal
strength above the threshold value can forward the
packet. Routing algorithm can exploit signal
characteristics related information for such benefits.
In the previous work on Reliable AODV [14],
we used signal strength information as interlayer
interaction parameter. The strength (received power) of
RREQ broadcast packet is passed to the routing layer
by the physical layer. In the routing layer the signal
strength is compared with a pre-defined threshold
value. If the signal strength is greater than the
threshold, the routing layer continues the route
discovery process. Otherwise the Reliable AODV
drops the RREQ packet. This leads to formation of
routes with strong links where adjacent nodes are well
within the transmission range of each other. So, even
when the nodes are moving, the probability of route
failure due to link breakages would be less with
Reliable AODV, compared to the existing Basic
AODV. The threshold value is set suitably with
reference to the nodes’ transmission power which
dictates the transmission range. The essence of
Reliable AODV is illustrated in Fig.1 where the node
A sends a RREQ which is received by its neighbors B
and C. As the received signal strength at node B
exceeds the threshold, it forwards the RREQ but the
node C drops the RREQ because it is close to the
transmission range boundary of node A and hence has
a weak link to node A.
The fixed threshold value used is independent
of speed of mobile nodes and it may not be justified to
low speed nodes. Hence, in this new adaptive cross
layer design, we propose adaptive decision making of
RREQ forwarding in accordance with speed of mobile
nodes which is discussed in the following section.
III. Mobility Adaptive Cross Layer Design
Routing protocol may let route / link failure
happen which is detected at MAC layer by
retransmission limits, but dealing with route failure in
this reactive manner results in longer delay,
unnecessary packets loss and significant overhead
when an alternate new route is discovered. This
problem becomes more visible especially when mobile
nodes move at high speed where route failure is more
probable due to dynamic topology changes and
negative impact of control packet overhead on network
resources utilization is of more significance. We
emphasize that routing should not only be aware of, but
also be adaptive to node mobility. Hence we propose
mobility adaptive cross layer design.
In this cross layer design a node receiving
signal, measures its strength and passes it from
physical layer to routing layer. We also assumed that
information about speed of the node is available to it.
Hence the signal strength, when receiving RREQ
packet which is a MAC broadcast, is passed to routing
layer along with the speed information of the node. The
AODV routing protocol’s route discovery mechanism
is modified to use the above two parameters in making
a decision on forwarding / discarding the RREQ
packet.
The received signal strength is measured and
used to calculate the distance between the transmitting
and receiving nodes. The two ray propagation model is
considered, where the loss coefficient value used is 2
as the maximum transmission range (dmax) of nodes is
350 meters which corresponds to 10dBm transmission
power. Hence the received signal strength can be
expressed as
Pr = Pt (λ/ 4πd)2
(1)
Where, Pt - Transmission Power
λ - Wavelength in meters
and d - Distance between transmitting and
receiving nodes
Also the unity gain omni directional
transmitting and receiving antennas are considered.
When the RREQ packet is presented with
received signal strength information to the AODV
implementation of the node, it calculates its distance
from transmitting node using,
d = Sqrt (Pt / Pr) * (λ / 4π)
(2)
Next, the receiving node calculates its
distance to the transmission range boundary of the
Fig. 1 Reliable AODV
UbiCC Journal, Volume 3, Special issue on Mobile Ad hoc Networks
19
transmitting node using the known maximum
transmission range (dmax) as,
db=dmax– d
(3)
The minimum time needed for a node to go
out of the transmission range boundary of the
transmitting node depends its distance from the
boundary and the speed as given below.
tb = db / Speed
(4)
If the source specifies a minimum route lifetime (tl), in its RREQ packet, any intermediate node
receiving that packet can calculate its safe distance
from transmission range boundary using its speed
information as
ds = tl * Speed
(5)
It is now possible to the node to make a
decision on forwarding the RREQ. That is, the decision
rule inserted in AODV route discovery mechanism is,
{If (db ≥ ds),
then forward RREQ
else drop RREQ }.
(6)
Hence the route discovery mechanism of
AODV routing protocol is made adaptive to the node
speed, which leads to the formation of more stable
(reliable) routes. The parameter tl, the minimum route
life-time, is application specific.
This adaptive algorithm will certainly reduce
the hop count and hence the average end-to-end delay
of data packets than those incurred with fixed signal
strength threshold based RREQ processing. To show
the efficiency of our new adaptive algorithm,
simulation results are presented in the next section.
standard with RTS / CTS extension and provide link
layer feedback to routing layer. The CBR traffic of 4
packets per sec, with 512 bytes packet size is used.
There are two randomly chosen source-destination
pairs and each source generates 4200 packets.
Simulations are run for 1200 seconds and each data
point represents an average of at least four runs with
different seed values.
Identical mobility and traffic scenarios are
used across the three protocol variants. The fixed signal
strength threshold used in AODV-Fixed variant is 78dBm whereas AODV-Adaptive used received signal
strength and speed of mobile nodes passed from
physical layer through cross layer interaction. The
minimum route life-time requirement is set as 4
seconds. We used the following five parameters to
evaluate the performance of the protocol variants: 1)
Number of routes selected (implies route failures), 2)
Number of RREQ packets transmitted (counted hopby-hop basis), 3) Packet delivery ratio, 4) Number of
Hops and 5) Average end-to-end delay.
IV. Simulation Model and Result Analysis
The simulation for evaluating the problem is
implemented within the GloMoSim library [15].
GloMoSim provides a scalable simulation environment
for wireless network systems. It is designed using the
parallel discrete event simulation capability provided
by PARSEC, a C based simulation language developed
by parallel computing laboratory at University
California at Los Angels, for sequential and parallel
execution of discrete event simulation models. The
simulation area is 1000 x 1000 square meters size,
where nodes are placed uniformly. The transmission
power and receiver threshold level of nodes are 10dBm
and -81dBm respectively. The random way point
mobility model is used. In this model, each node
chooses a random destination and move towards that
destination with a random speed chosen between the
minimum and maximum values specified. The node
then waits there for the specified pause time and
continues it movement as described above. The
bandwidth of shared wireless channel is assumed to be
2 MHz. The physical layer employs two ray
propagation model. The nodes use the distributed coordination function of IEEE 802.11 WLAN [16]
UbiCC Journal, Volume 3, Special issue on Mobile Ad hoc Networks
Fig 2. Route Failure Frequency
Fig 3. Routing Overhead
20
Fig 4. Reliable Packet Delivery
Fig 5. Average Path Length
In the experiment to study the effect of
mobility, the maximum speed of nodes is varied
between 0-25 m/sec, where 49 nodes are used in the
simulation. Fig 2 shows the number of routes used by
three protocol variants. The Fixed and Adaptive
AODVs result in reduced number of routes selected,
i.e. reduced number of route failures that reflect the
formation of reliable (more stable) routes. Hence the
number RREQ sent by nodes also got reduced as
shown Fig 3. We could also infer that usage of fixed
threshold value leads to reduced connectivity,
particularly at very low speed ranges, which make
AODV-fixed to suffer with increased RREQ broadcast
during route search process. The improvement in
packet delivery ratio is reflected in Fig 4.
Both AODV-Fixed and AODV-Adaptive
variants outperform AODV-Basic, because of stable
route formation. But this improvement is at the cost of
increased number of hops, which is shown in fig 5.
This figure also highlights the need of mobility
adaptive route discovery which optimizes routes with
speed information and helps in reducing the average
end-to-end delay of data packets significantly than
those incurred with fixed threshold usage. Fig 6 shows
the delay performance of three protocol variants.
Further, in order to explore the impact of node
density on the proposed new cross layer algorithm, we
conducted another experiment, in which the node
density is varied between 16 and 64 nodes in 1000 x
1000 sqm area. The maximum speed of mobile nodes
is set as 25 m/sec. The imposed signal strength
threshold and minimum route life-time constraints
reduce network connectivity, which is shown in Fig 7.
The number of routes used by AODV-Fixed variant is
relatively low at very low node density, which does not
imply formation of stable routes but reflects scarcity of
network connectivity. The repeated search for
connectivity increases the RREQ broadcasts in AODVFixed variant which is presented Fig 8. But, the
performance of AODV-Adaptive excels in this regard.
Hence, the control packet overhead is under control
even in lightly densed network with our adaptive
algorithm.
The packet delivery ratio suffers when these
constraints are enforced in lightly densed networks.
The improvement is visible only when network
density increases beyond a particular level as shown in
Fig 9. So, it is clear that cross layer design using signal
strength threshold is useful and improves network
performance in highly densed networks where
redundantly available links ensure required network
connectivity. Where as the new adaptive algorithm
makes a trade off in this regard between the basic and
fixed AODV variants. Hence when to invoke cross
layer algorithm is also an important design issue.
Fig 6. Delay Performance
UbiCC Journal, Volume 3, Special issue on Mobile Ad hoc Networks
21
V. Conclusion
Fig 7. Node density vs Route Failures
Fig 8. Node Density vs Routing Overhead
Fig 9. Node Density vs PDR
We observe that the cross layer
AODV with fixed threshold reduces the number of
route failures and routing overheads, at the cost of
increased hop counts and average end-to-end delay.
Certainly the proposed mobility adaptive algorithm
for route discovery optimizes the above trade off. The
AODV-Adaptive variant reduces number of hops and
delay to a greater extent and brings them closer to
those of AODV-Basic variant. It is important to note
that both cross layer AODV variants improve the
packet delivery ratio, but at the cost of slightly
increased end-to-end delay. However, the reduced
route failures and routing overheads obtained are very
attractive for mobile ad-hoc networks which are highly
resources constrained. Finally, it is worth to note that
impact on network connectivity due to signal strength
threshold enforcement is serious in lightly densed
networks and hence, the proposed cross layer design is
well suited for highly densed networks.
References:
[1] Mohammad Ilyas, “The Hand Book of Ad-hoc
Wireless Networks”, CRC Press, 2003.
[2] C E Perkins, E M Royer and S R Das, “
Adhoc On-demand Distance Vector Routing
Protocol”, IETF RFC 3651, July 2003.
[3] B.Awerbuch, D.Holmer and H.Rubens, “High
Throughput Route Selection in Multi-rate Ad-hoc
networks”, in Proc. of First working Conf. on
Wireless On-demand Network Systems, 2004.
[4] X.Zhong et al., “Stable Enhancement for AODV
Routing Protocol”, in proc. of 14th IEEE Conf. on
Personal,
Indoor
and
Mobile
Radio
Communication, vol 1, pp 201-205,2003.
[5] Y.Zhang and T.A. Gulliver, “Quality of Service for
Ad-hoc On-demand Distance Vector Routing”, in
proc.of IEEE International Conf. on Wireless
Mobile
Computing,
Networking
and
Communications, vol 3, pp 192-193, 2005.
[6] R.S.Chang and S.J.Leu, “Long-lived Path Routing
with Received Signal strength for Ad-hoc
Networks”, in proc. of 1st International
Symposium on Wireless Pervasive Computing,
2006.
[7] G.Quddus et al., “Finding A Stable Route Through
AODV by Using Route Fragility Coefficient as
Metric”, In proc. of International Conf. on
Networking and Services, pp 107- 113, 2006.
[8] M.Idrees et al., “Enhancement in AODV Routing
Using Mobility Agents”, in proc. of IEEE
Symposium on Emerging Technologies, pp 98102, 2005.
[9] D.Espes and C.Teyssie, “Approach for Reducing
Control Packets in AODV-based MANETs”, in
proc. of 4th European Conf. on Universal Multi-
UbiCC Journal, Volume 3, Special issue on Mobile Ad hoc Networks
22
service Networks, pp 93-104, Toulouse, France,
2007.
[10] G Carneiro et al., Cross Layer Design in 4G
Wireless Terminals, IEEE Wireless Commn., vol
11, no 2, pp 7-13, April 2004.
[11] T S Rappaport, et al., Wireless Commn: Past
event and a future perspective,
IEEE
Communication Magazine, vol 40,
no 5 (50th
Anniversary ), pp 148-161, 2002.
[12] V.Srivastava and M.Motani, “Cross Layer design
: A Survey and The road Ahead”, IEEE
Communication Magazine, vol. 43, no.12, pp 112119, dec2005.
[13] B. Ramachandran and S. Shanmugavel, “A
Power
Conservative Cross Layer Design for
Mobile
Ad-hoc
Networks” , Information
Technology Journal, vol 4, no 2, pp 125-131,
2005.
[14] B.Ramahandran and S.Shanmugavel, “Reliable
Route Discovery for Mobile Ad-hoc Networks”,
in proc of IETE International Conf. on Next
Generation Networks, pp CP 26.1-26.6, Mumbai,
India, 2006.
[15] GloMoSim User Manual,
http://pcl.cs.ucla.edu/project/glomosim
[16] LAN IEEE Std 802.11, Part 11:
Wireless
MAC & PHY Layer Specifications, 1999.
UbiCC Journal, Volume 3, Special issue on Mobile Ad hoc Networks
23
A FRAMEWORK FOR AN AGGREGATED QUALITY OF SERVICE IN
MOBILE AD HOC NETWORKS
Ash Mohammad Abbas, Khaled Mohd Abdullah Al Soufy
Department of Computer Engineering
Zakir Husain College of Engineering and Technology
Aligarh Muslim University
Aligarh – 202002, India
am.abbas@amu.ac.in
ABSTRACT
Providing quality of service in an ad hoc network is a challenging task. In this
paper, we discuss a framework for user perceived quality of service in mobile ad
hoc networks. In our framework, we try to aggregate the impact of various quality
of service parameters. Our framework is flexible and has a provision of providing
dynamic quality of service. Further, an application may adapt from the required
quality of service to that which can readily be provided by the network under a
stressful environment. Our framework may adapt to the QoS desired by a source
based on user satisfaction.
Keywords: User perceived quality of service, quality of service aggregation,
dynamic and adaptive, ad hoc networks.
1
INTRODUCTION
An ad hoc network is a cooperative engagement
of a collection of mobile devices without the
required intervention of a centralized infrastructure
or a centralized access point. In the absence of
centralized infrastructure, an ad hoc network may
provide a cost-effective and a cheaper way of
communication. Applications of an ad hoc network
include battlefield communications, disaster recovery
missions, convention centers, online classrooms,
online conferences, etc.
In an ad hoc network, there are no separate
routers. As a result, the devices need to forward
packets of one another towards their ultimate
destinations. The devices possess limited radio
transmission ranges, therefore, routes between any
two hosts are often multihop. The devices are often
operated through batteries whose power depletion
may cause the device failure and/or associated link
failures. Further, nodes may move about randomly
and thus the topology of the network varies
dynamically.
There can be applications of an ad hoc network,
where users expect a given level of quality of service
(QoS) to be provided by the network. These
applications may include multimedia streaming,
exchanging geographical maps, etc. However, the
requirements and the expectations of users about the
level of the QoS to be provided by an ad hoc network
may not be as high as those in case of a wired
network or a wireless network that possesses a
centralized infrastructure.
Provision of QoS in an ad hoc network is a
challenging problem. The challenge is posed by the
characteristics of ad hoc networks. In an ad hoc
network, one cannot have a solution that either relies
on extensive amount of computations or consumes a
significant amount of power and energy because the
resources of the devices used to form such a network
are scarce. Note that an ad hoc network is an on the
fly network and should be self organizing in nature.
Frequent node and link failures together with
mobility of nodes give rise to a highly dynamic
topology of the network. The dynamically varying
topology of the network makes it difficult to provide
any hard QoS guarantees. However, as the users are
aware that they are part of an ad hoc network,
therefore, instead of expecting hard QoS guarantees,
users may expect a soft QoS.
In situations, when an end-user can tolerate
variations in the QoS, the user should have a
flexibility to change the specifications of QoS
parameters depending upon the extent of satisfaction
with the QoS provided by the network. However, not
much work is done in this area. In [6], a framework
for QoS aware service location is presented in the
context of an ad hoc web server system. Therein, the
authors assign the priorities in integers to QoS
parameters. In [11], an adaptive QoS routing
protocol is presented by rerouting the packets that
faced QoS violations.
The rest of this paper is organized as follows. In
Section 2, we discuss the framework for an
aggregated quality of service. In Section 3, we
discuss how to adapt quality of service based on user
feedback. In Section 4, we describe methods of QoS
aggregation. Section 5 contains results
and
UbiCC Journal, Volume 3, Special issue on Mobile Ad hoc Networks
24
Table 1: Symbols used for QoS parameters in AQS.
Weight
Min/Max
Value
Tolerance
Limit (%)
Parameter
Weight
Min
Max
End-to-End
Delay
Delay Jitter
wD
Dmax
δD
0.40
3.0
-
wJ
J max
δJ
Bandwidth
wB
Bmin
δB
0.20
0.25
-
1.0
3.0
wR
Rmin
δR
0.2
2.0
-
Packet Delivery
Ratio
Route Lifetime
0.80
2.0
wL
Lmin
δL
End-to-End
Delay
Delay Jitter
Bandwidth
Packet
Delivery
Ratio
Route
Lifetime
Tolerance
Limit (%)
1.0
10
2.0
discussions. Finally, the last section is for conclusion
and future directions.
2
Table 2: Example 1 – Values of QoS parameters.
Parameter
A FRAMEWORK FOR AN AGGREGATED
QOS
In this section, we describe a framework for an
aggregated QoS. We call our framework as an
aggregated QoS (AQS) framework because it
aggregates the effect of many QoS parameters or
metrics. In our framework, we consider a set of QoS
parameters such as end-to-end delay, delay jitter,
bandwidth, packet delivery ratio, route lifetime 1 .
Our aggregation mechanism consists of
assigning importance or weights to each of the
parameters discussed in the previous subsection, and
then computing a factor of aggregation. Let us first
consider assignment of importance or weights 2 . To
each of these parameters, we assign a weight
wi , 0 ≤ wi ≤ 1 , in such a fashion so that
n
∑ w =1
i
(1)
0.1
0.05
-
In what follows, we define aggregated QoS to
incorporate the effect of the parameters mentioned
above.
Definition 1: Let there be n QoS parameters
P1 , P2 ,..., Pn . Let Pk ,1 ≤ k ≤ n for bandwidth be
defined as follows.
PBW =
FileSize
BW
(2)
where, FileSize denotes the size of file that is sent
using the particular bandwidth.
Let Pk ,1 ≤ k ≤ n for packet delivery ratio be
defined as follows.
PPDR = RΔ
(3)
where, Δ is the duration of time for which the
particular packet delivery ratio 3 is desired.
Having defined the constituent parameters in
time units, we now define a parameter called
Weighted Aggregate QoS (WAQ) as follows.
i =1
where wi represents the relative importance (or the
weight) of parameter i. If there are n parameters, and
each parameter i is assigned a weight 1/n then all
QoS parameters are equally important. If
wi > w j , i ≠ j , then parameter i is said to be
relatively more important than parameter j.
The notation used to represent information
related to QoS parameters is as follows. We use the
following symbols to represent QoS parameters− D:
end-to-end delays, J: delay jitter, B: bandwidth, R:
packet delivery ratio, L: route lifetime. For each of
these parameters, the symbol w is used to represent
relative importance or weight, prefix Δ is used to
represent tolerance limit, and subscripts max/min are
used to represent either the maximum or minimum
value of the parameter. This notation is summarized
in Table 1.
_________________________
1
There can be long list of QoS parameters, however, we consider
only the parameters defined above.
2
Note that it is a different issue that who assigns the weights to
the parameters and shall be discussed later in this paper.
{( P
+∑ {( P
WAQ = ∑
min
i
max
j
}
)w }
+ TLi ) wi
i
+ TL j
(4)
j
j
where 1 ≤ i, j ≤ n, i ≠ j , and Pi min is the value of ith
parameter whose minimum value is specified, and
Pjmax is the value of jth parameter whose maximum
values is specified. Further, TLi and TL j are values
of the corresponding tolerance limits for ith and jth
parameters.
Note that the unit of aggregation parameter,
WAQ, is time. Further, it will have positive values
and its values may come out to be greater than 1
depending the values of its constituent QoS
parameters. In what follows, we define an
aggregation factor, whose value lies between 0 and
1.
_________________________
3
In this way, we have converted all parameters to a single unit
i.e. time. This is done so that we are able to aggregate the effect of
different parameters on the QoS.
UbiCC Journal, Volume 3, Special issue on Mobile Ad hoc Networks
25
Table 3: Example 2 – Values of QoS parameters.
Figure 1: Adapting QoS through user feedback.
Definition 2: Let the QoS parameters,
Pi , Pjmax , and their tolerance limits, TLi , and TL j ,
min
be defined as in Definition 1. We define a factor that
we call Weighted Aggregate QoS Factor (WAQF) as
follows.
WAQ
WAQF =
min
∑ ( Pi + TLi ) + ∑ ( Pjmax + TL j )
i
j
(5)
where, WAQ is given by (4) as part of Definition 1.
It is worth mentioning that WAQF has no unit as it is
simply a ratio bearing the units of time in both the
numerator as well as the denominator of the
expression defining it.
In what follows, we discuss an example
incorporating different weights and the values of the
QoS parameters mentioned above.
Example 1: Let the weights, min/max values,
and tolerance limits assigned by the source for
different QoS parameters be as given in Table 2.
In Example 1, the end user has given the highest
relative importance by assigning a weight 0.40 to the
end-to-end delay. The maximum value of the delay is
specified to be 3.0 milliseconds, however, the user
may accept upto a tolerance limit 1.0%. This means
that user may accept a value of the end-to-end delay
upto 3.01 milliseconds. The second parameter is
delay jitter. For that the user has specified a weight
of 0.20, the maximum value to be 0.2 milliseconds,
and a tolerance limit of 1.0%. This means that the
user can accept the value of delay jitter upto 0.202
milliseconds. The third parameter is bandwidth
reserved for the flow. The user has specified a
weight of 0.25, the minimum value of bandwidth to
be 2.0 Mbps, and a tolerance limit of 3.0%. In other
words, the user may accept the bandwidth upto 1.96
Mbps. The fourth parameter, packet delivery ratio is
assigned a weight of 0.10, the minimum value 80%
and a tolerance limit of 2.0%. This means that the
user may accept the packet delivery ratio upto 78%.
The last parameter is route lifetime 4 that is assigned
a weight of 0.05, the minimum value 10
milliseconds, and a tolerance limit of 2.0%. In other
words, the user may accept the value of the route
failure time upto 9.8 milliseconds.
____________________________
4
There can be a debate whether one should consider the
minimum value or the maximum value of route failure time. The
user would prefer to specify the minimum value of route failure
time, so that there are no route failures during packet
transmissions. However, from the point of view of network, one
would like to maximize the value of route failure time.
Parameter
Weight
Min
Max
End-to-End
Delay
Delay Jitter
Bandwidth
Packet
Delivery
Ratio
Route
Lifetime
0.30
2.0
-
Tolerance
Limit (%)
1.0
0.10
0.45
0.1
0.3
2.0
-
0.80
1.0
3.0
2.0
0.05
-
10
2.0
Table 4: Default values of QoS parameters.
Parameter
Value
End-to-End Delay
Delay Jitter
Bandwidth
Packet
Delivery
Ratio
Route Lifetime
5.00
0.01
10.0
0.90
Tolerance
Limit (%)
2.0
2.0
2.0
2.0
10.0
2.0
Table 5: Sets of weights assigned to QoS
parameters.
Set No.
S1
S2
S3
S4
S5
Set of Weights
0.6 0.1 0.1 0.1
0.1 0.6 0.1 0.1
0.1 0.1 0.6 0.1
0.1 0.1 0.1 0.6
0.1 0.1 0.1 0.1
0.1
0.1
0.1
0.1
0.6
Table 6: The QoS parameter WAQ and the factor
WAQF as a function of bandwidth.
Bandwidth
1
2
3
4
5
6
7
8
9
10
WAQ
3.40964
3.30760
3.27359
3.25658
3.24638
3.23957
3.23471
3.23107
3.22824
3.22597
WAQF
0.2
0.2
0.2
0.2
0.2
0.2
0.2
0.2
0.2
0.2
Table 7: The QoS parameter WAQ and the factor
WAQF as a function of FileSize.
FileSize
1
2
3
4
5
6
7
8
9
10
UbiCC Journal, Volume 3, Special issue on Mobile Ad hoc Networks
WAQ
3.22957
3.24638
3.26678
3.28719
3.30760
3.32801
3.34842
3.36883
3.38923
3.40964
WAQF
0.2
0.2
0.2
0.2
0.2
0.2
0.2
0.2
0.2
0.2
26
Table 8: The QoS parameter WAQ and the factor
WAQF as a function of Δ .
WAQ
WAQF
Δ
1
2
3
4
5
6
7
8
9
10
3.22597
3.40957
3.59317
3.77677
3.96037
4.14397
4.32757
4.51170
4.69477
4.87837
0.2
0.2
0.2
0.2
0.2
0.2
0.2
0.2
0.2
0.2
Table 9: The QoS parameter WAQ and the factor
WAQF as a function of sets of weights.
Set of Weights
S1
S2
S3
S4
S5
WAQ
4.06298
1.61788
1.66400
2.07198
6.71298
WAQF
0.251892
0.100304
0.103163
0.128457
0.416184
Let the file size be 1 Mb, and the maximum
bandwidth be Bmax = X Mbps. As a result, 1/X
seconds is consumed in sending a file of the
specified size over the specified bandwidth. For a
variation or tolerance limit of Δ in a given
bandwidth X, the value of the parameter Pk for
bandwidth is
1
PBW =
(6)
.
X − ( X ×Δ)
Therefore, for a tolerance limit of 3.0% in the
value of bandwidth which is 2.0 Mbps (as shown in
Table 2 for Example 1), the value of PBW is
1
= 0.515463917. Further, in case of
2 − (2× 0.03)
packet delivery ratio which is given by (3), assume
that Δ be 1 time unit, so that PPDR is affected by the
packet delivery ratio only and that is R. For Example
1, the value of aggregation parameter, WAQ, comes
out to be 1.948065979. The value of denominator is
14.69946392. The value of the aggregation factor,
WAQF, comes out to be 0.132526328.
Note that in Example 1, the end-to-end delay is
assigned the highest weight or priority. This is an
example of delay-sensitive application. Depending
upon the weight assigned to a QoS parameter, there
can be other types of applications as well. For that
consider another example with different weights and
different values of corresponding QoS parameters.
Example 2: Let the weights, min/max values,
and tolerance limits assigned by the source for
different QoS parameters be as given in Table 3.
In Example 2, the bandwidth is assigned the
highest relative importance. This is an example of
bandwidth-sensitive application. The next relatively
important parameter is end-to-end delay. Other
parameters may not be so important for a particular
application, therefore, those are assigned relatively
low weights. For rest of the parameters, we assume a
similar scenario as in Example 1.
In Example 2, PBW =0.515463917. The value of
aggregation parameter, WAQ, comes out to be
1.447258763. The value of denominator is 15.233.
The value of the aggregation factor, WAQF, comes
out to be 0.095008124. Note that the aggregation
factor is 28.31% smaller as compared to that in
Example 1. The reason is that in case of WAQ, the
contribution of end-to-end delay component has
become half of that in Example 1, and the
contribution of delay jitter has also been decreased.
The total decrease of these two parameters is
approximately 0.6. The contribution due to
bandwidth has increased by a value of approximately
0.103. As a result, the net effect is a decrease by a
value of approximately 0.5 in the value of WAQ.
The aggregation factor, WAQF, has changed
accordingly.
In what follows, we discuss a framework for
adapting QoS through user feedback.
3
ADAPTIVE QOS THROUGH USER FEEDBACK
Fig. 1 shows a framework for adapting QoS
using user feedback. The steps in our framework are
as follows.
• The source or the user specifies the values
of different QoS parameters with their
minimum/maximum values and tolerance
limits.
• The QoS parameters alongwith their
respective values are given to the QoS
Manager.
• If QoS Manager receives QoS parameters
for a packet of the flow for the first time, it
sorts the parameters according to their
relative importance or weights. After, that
the QoS Manager calls a protocol or a
method to take care of the parameter that is
relatively the most important. After that it
takes measures to take care of the next
relatively important parameter (if possible),
and so on.
• The packet is then delivered to the
destination according to its QoS
specifications and the source is informed
accordingly.
• If the source or the user is satisfied with the
QoS of the packet delivered, the next packet
is sent to the destination.
• If the source is not satisfied with the QoS of
the packet delivered, it informs the QoS
Manager about the change it wishes to have
UbiCC Journal, Volume 3, Special issue on Mobile Ad hoc Networks
27
in the QoS. The QoS Manager tries to
adjust the QoS parameters accordingly.
Note that the source specifies the values of QoS
parameters, their minimum and/or maximum values,
relative importance, and tolerance limit for each
parameter. As mentioned above, QoS Manager sorts
the parameters according to their relative importance.
The QoS Manager calls appropriate methods or
protocols for providing the QoS. The fact that which
protocol has to be called first depends upon the
relative importance of the parameters. Depending
upon the relative importance of QoS parameters,
different methods are required to be called.
Further, the functionality of QoS Manager 5
resides at every node in the network. As mentioned
earlier, we confine to wireless networks using 802.11
and the nodes in that are operating in ad hoc mode.
However, the same can be extended with some
modifications to other types of wireless networks as
well. There might be a question that in ad hoc
networks, nodes have limited resources so why do
we have QoS with user feedback. It should be noted
that provision of user feedback in our approach
should require little more computations. In general,
the energy and power consumption during
transmissions is significantly larger than that of
computations. We believe that the provision of user
feedback shall not consume a significant amount of
energy rather it will add few more computations and
would be feasible with current technological trends.
In what follows, we describe what are the
methods and protocols that may need to be called for
a QoS specification.
4
METHODS FOR AGGREGATED QOS
In this section, we present methods and protocols
that the QoS Manager needs to call for providing the
desired QoS. Note that the input to the QoS Manager
is a set of parameters with their respective values,
tolerance limits, and relative importance. The first
and the foremost task that the QoS Manager needs to
perform is sorting of the QoS parameters according
to their relative importance or weight. Another set of
input is the user feedback, in case when some form
of QoS has been provided to the flow but the user is
not satisfied with the QoS. Once the QoS parameters
have been sorted, appropriate methods and/or
protocols are required to be called, to provide the
given level of QoS.
Algorithm 1 describes what are the actions that
are taken by the QoS Manager. When a sources
needs to send packets of a flow, it sends a
qosEnquiry packet to the QoS Manager along with
the specification of QoS parameters. The QoS
________________________
5
Manager extracts the values of QoS parameters,
tolerance limit, and relative importance. If the sum of
all relative importance or weight is greater than 1,
the QoS specifications are referred back to the
source. Otherwise, the QoS Manager marks whether
a parameter is “insignificant” or “significant”.
We assume that if the weight assigned to a
particular parameter is less than 1/(2k), where k is the
number of QoS parameters, then the parameter is
insignificant, otherwise it is significant. If a
parameter is insignificant, the QoS Manager need
not bother about it. For all significant parameters, the
weights of the parameters are arranged in descending
order. The first parameter in this order is the most
significant parameter. An appropriate protocol is
called to provide QoS for the most significant
parameter so obtained. A qosReply packet is sent to
the source by the QoS Manager. Upon receiving a
qosReply packet, the source sends a TestQoS
packet. The TestQoS packet is delivered to the
destination and a flag named statusPi is set to be
“done” for the QoS parameter, Pi . The source, if
satisfied sends the extent upto that he/she is satisfied.
If the satisfaction of the source falls below 50%, the
source shall specify his/her desired QoS parameters
again, and the above process shall continue. When
the user is satisfied by the QoS provided to TestQoS
packets, he/she will start sending actual packets.
The component QoS Manager is not only manages the QoS,
however, it is also responsible for other functions like resource
reservation, call admission control, and negotiating the QoS.
Figure 2: The QoS parameter WAQ and the factor
WAQF as functions of bandwidth.
Figure 3: The QoS parameter WAQ and the factor
WAQF as functions of FileSize.
UbiCC Journal, Volume 3, Special issue on Mobile Ad hoc Networks
28
__________________________________________________________________________________________
Algorithm 1: Marking of significant parameters by QoS Manager
__________________________________________________________________________________________
Let i ∈ enum P: {Delay, Jitter, Bandwidth, Delivery Ratio, Lifetime}, 1 ≤ i ≤ k , k =| P | , where |.| denotes the
cardinality. For parameter i, let wi : weight, Vi : value, δi : tolerance limit.
1: if UserSatisfactionPi ≤ 0.5 then
2:
statusPi = "notdone"
3:
Get wi , Vi , δi for all i such that statusPi = "notdone"
4:
if
∑ w > 1 then
i
i
5:
6:
7:
8:
9:
10:
11:
12:
13:
14:
15:
Refer back the QoS parameters to the source
1
else if 0 ≤ wi ≤
then
2k
Mark Pi : "insignificant"
else
Mark Pi : "significant"
end if
For all Pi that are marked "significant", arrange wi in descending order
For max( wi ) , call a protocol to provide the QoS for parameter Pi
Deliver the packet to destination
set stausPi = "done"
end if
___________________________________________________________________________
There is an issue about how long should one be
allowed so as not to waste time in setting up of the
desired QoS. This depends upon how many attempts
are being made for a QoS parameter. We limit these
attempt to 3 irrespective of the user satisfaction.
After third attempt, we assumed that the most
significant parameter is taken care of.
In what follows, we discuss some empirical
results.
5
Figure 4: The QoS parameter WAQ and the factor
WAQF as functions of Δ .
Figure 5: The QoS parameter WAQ and the factor
WAQF versus sets of weights.
RESULTS AND DISCUSSION
Let us first discuss some results pertaining to the
effect of aggregation of QoS parameters.
5.1 Effect of Aggregation
We have defined the weighted aggregation QoS
parameter, WAQ, and weighted aggregation QoS
factor, WAQF, in Section 2. For the results in this
subsection, the values of different QoS parameters
and their tolerance limits are shown in Table 4. The
default weight assigned to each QoS parameter is
equal and is 0.20. The default value of FileSize is 1
bandwidth unit (e.g. 1 Mbps, if the bandwidth is
expressed in Mbps). The default value of time
duration for which a desired packet delivery ratio is
needed, Δ is 1 time unit.
UbiCC Journal, Volume 3, Special issue on Mobile Ad hoc Networks
29
Table 6 shows the empirical values of the QoS
aggregation parameter, WAQ, and that of the QoS
aggregation factor, WAQF, as functions of
bandwidth. It is observed from Table 6 that the QoS
aggregation parameter, WAQ, decreases with the
increase in the bandwidth. The decrease in WAQ is
not linear (see Figure 2). The values of the QoS
factor remain constant. The reason is that for equal
weights assigned to individual QoS parameters, the
amount of increase in numerator and the
denominator of the QoS aggregation factor, WAQF
(as defined by (5), is almost the same. Hence,
WAQF remains the same and is equal to the weight
assigned to each individual QoS parameter.
Table 7 shows the empirical values of the QoS
aggregation parameter, WAQ, and that of the QoS
aggregation factor, WAQF, as functions of FileSize.
It is observed from Table 7 that the QoS aggregation
parameter, WAQ, increases with the increase in the
FileSize. The decrease in WAQ is linear (see Figure
3).
Table 8 shows the empirical values of the QoS
aggregation parameter, WAQ, and that of the QoS
aggregation factor, WAQF, as functions of Δ . We
mentioned earlier that Δ is the time duration for
which the specified packet delivery ratio is required.
It is observed from Table 8 that the QoS aggregation
parameter, WAQ, increases with the increase in Δ .
The decrease in WAQ is linear (see Figure 4). The
values of the QoS factor, WAQF, remain constant
for the reason mentioned above.
The sets of weights assigned to the QoS
parameters in the following order <end-to-end delay,
delay jitter, bandwidth, packet delivery ratio, route
lifetime> are shown in Table 5. It is observed that the
value of the QoS aggregation parameter, WAQ, and
that of aggregation factor, WAQF, are the largest for
the set of weights, S6, and is the smallest for the set
of weights, S2 (see Figure 5). The reason being that
in case of S6, the contribution of the largest valued
QoS parameter i.e. route lifetime is multiplied by the
largest weight among S6. However, the situation in
case of S2 is just reverse of that in S6. Note that the
next largest values of WAQ and WAQF are for the
set of weights, S2. In that case the contribution of the
next large valued parameter i.e. end-to-end delay is
multiplied by the largest weight among the set of
weights S1.
5.2 Effect of User Feedback
Recall that when the significant parameters are
found. The QoS Manager selects and calls
appropriate protocols depending upon the QoS
parameters. A qosReply packet is sent to the source
by the QoS Manager. Upon receiving a qosReply
packet, the source sends a TestQoS packet. The
TestQoS packet is delivered to the destination and a
flag named statusPi is set to “done” for the QoS
parameter, Pi . The source, if satisfied sends the
extent upto which he/she is satisfied. If the
satisfaction of the source falls below 50%, the source
shall specify his/her desired QoS parameters again,
and the above process shall continue. When the user
is satisfied by the QoS provided to TestQoS packets,
he/she will start sending actual packets.
The TestQoS packets are simply overheads 6 .
The number of these packets depends upon the
extent of user satisfaction 7 . However, since there is
a cost associated with user perceived QoS, therefore,
the number of attempts made by the user for a
desired level of QoS is restricted to 3. The user may
select any one level of QoS that suits to his/her needs
out of that provided by these attempts.
Note that we mentioned it earlier that nodes are
operating in ad hoc mode and the type of network we
are interested in, is supposed to use 802.11 standards.
A consequence of having user feedback is that some
of the energy is consumed by the TestQoS packets
which would have been used for some other useful
task. However, we would like to remind that these
packets are very small in size and that we have
limited these packets to only a few (say 3). Although,
there is some additional energy consumption,
however, that is the price to be paid to have user
feedback about the QoS. However, we believe that it
would not be too large to be afforded.
5.3 Probability of User Satisfaction
In order to evaluate the probability of user
satisfaction, let us assume a simple scenario in which
ps is the probability that the user is satisfied after an
attempt has been made, i.e. after sending a TestQoS
packet. The probability that the user is not satisfied
after sending a TestQoS packet will then be 1− ps .
Let us assume that each attempt is made
independently. Then, the probability that the user is
satisfied in k such attempts out of n attempts have
been made, will then be governed by
⎛ n⎞
n− k
PkUS = ⎜⎜ ⎟⎟⎟ psk (1− ps ) .
⎜⎝k ⎠⎟
(7)
The above equation is an expression of the
binomial distribution for Bernoulli trials. The
probability getting exactly one success (i.e. user is
________________________
6
There will be overheads for a protocol that is used to get the
desired level of QoS. However, those overheads will depend upon
the specific protocol.
7
Although, the level of user satisfaction is not a measurable
quantity, however, depending upon the feedback received by
letting them to answer a set of questions, one may be able to get a
feel of the level of user satisfaction. Either the number of
questions successfully answered by an end-user, or by some other
measure, may be taken as the user satisfaction. Therefore, let us
assume that a user satisfaction of 50% means that 50% of the
questions have successfully answered by the end-user.
UbiCC Journal, Volume 3, Special issue on Mobile Ad hoc Networks
30
satisfied in exactly one of the attempts) is given by
⎛3⎞
2
P1US = ⎜⎜ ⎟⎟⎟ p1s (1− ps ) .
⎜⎝1⎠⎟
(8)
We want that the user to be satisfied in at least
one of the attempt out of three attempts have been
made. The probability that the user is satisfied in
atleast one of the three attempts is given by
⎛ 3⎞
3− k
ψ = ⎜⎜ ⎟⎟⎟ psk (1− ps ) .
⎜⎝k ⎠⎟
(9)
For ps = 0.5 , ψ = 0.875 . It means that if the
probability of success (i.e. the probability that the
user is satisfied after an attempt) is assumed to be
0.5, then the probability of satisfaction of the user in
at least one of these attempts is 0.875. As mentioned
earlier, the user may select the QoS that fits best to
his/her needs, if he wishes to do so.
Note that, in this paper, wherever we referred to
the aggregation of QoS parameters, we mean the
aggregation of only those parameters whose
combined effect may be computed in a reasonable
amount of time (i.e. polynomial time). The
parameters that we considered in this paper are only
for the purpose of example. One has to see which
parameters can be computationally combined before
actually aggregating their effect. In case, one wishes
to see the effect of the parameters that cannot be
combined computationally, one may use a technique
called QoS filtering. In that, if one wishes to seek
QoS based on parameters ( A1 , A2 ,..., An ) . One should
first seek the QoS based on one of these parameters,
say A1 , and then on the resulting set of A1 , one
should seek QoS based on A2 , and so on. Further,
which parameter should be considered first or what
should be the order of parameters in the QoS filtering
will depend upon what is the relative importance of
the parameters considered.
6
CONCLUSION
Providing QoS in a mobile ad hoc network is a
challenging task due to inherent characteristics of
such a network. In this paper, we proposed a
framework for provision of QoS in a mobile ad hoc
network. Our contributions are as follows.
• We proposed that one can aggregate the
effect of QoS parameters depending upon
the importance or weights assigned to each
parameter.
• In our framework, we tried to incorporate
the level of user satisfaction about the QoS
provided by the network.
• We proposed that there can be a trade-off
between the QoS expected by the end-user
and the QoS that may be provided by the
network. However, we left it on to the enduser to decide about the trade-off depending
upon his/her requirements.
• We discussed overheads incurred in
adapting the QoS to the level of expectance
of the user.
In summary, we discussed a framework for an
aggregated and dynamic QoS based on user
satisfaction. Further validation of the framework
forms our future work.
7
REFERENCES
[1] S.C. Lo, G. Lee, W.T. Chen, J.C. Liu,
“Architecture for Mobility and QoS Support in
All-IP Wireless Networks”, IEEE Journal on
Selected Areas in Communications (JSAC), vol.
22, no. 4, May 2004.
[2] B. Li, L. Li, B. Li, K.M. Sivalingam, X.R. Cao,
“Call Admission Control for Voice/Data
Integrated Cellular Networks: Performance
Analysis and Comparative Study”, IEEE Journal
on Selected Areas in Communications (JSAC),
vol. 22, no. 4, May 2004.
[3] N. Passas, E. Zervas, G. Hortopan, and L.
Merakos, “A Flow Rejection Algorithm for QoS
Maintenance in a Variable Bandwidth Wireless
IP Environment”, IEEE Journal on Selected
Areas in Communications (JSAC), vol. 22, no. 4,
May 2004.
[4] Dutta, W. Chen, O. Altintas, H. Schulzrinne,
“Mobility Approaches for All-IP Wireless
Networks”, Proceedings of 6th World Multi
Conference on Systematics, Cybernetics and
Informatics (SCI), July 2002.
[5] M. Ghaderi, R. Boutaba, “Towards All-IP
Wireless Networks: Architectures and Resource
Management
Mechanism”,
InderScience
International Journal on Wireless and Mobile
Computing (IJWMC), 2005.
[6] J. Liu, V. Issarny, “QoS-Aware Service Location
in Mobile Ad hoc Networks”, Proceedings of
IEEE International Conference on Mobile Data
Management (MDM), pp. 224-235, 2004.
[7] H. Zhai, X. Chen, Y. Fang, “How Well Can the
IEEE 802.11 Wireless LAN Support Quality of
Service?”, IEEE Transactions on Wireless
Communications, vol. 4, no. 6, November 2005.
[8] C.S.R. Murthy, B.S. Manoj, Ad Hoc Wireless
Networks: Architectures and Protocols, Pearson
Education, New Delhi, 2005.
[9] H.J. Chao, X. Guo, Quality of Service Control in
High-Speed Networks, John Wiley, New York,
2002.
[10]Zanella, D. Miorandi, S. Pupolin, P. Raimondi,
“On Providing Soft-QoS in Wireless Ad hoc
Networks”, Proceedings of International
UbiCC Journal, Volume 3, Special issue on Mobile Ad hoc Networks
31
Symposium on Wireless Personal Multimedia
Computing (WPMC), October 2003.
[11]V. Kone, S. Nandi, “QoS Constrained Adaptive
Routing Protocol for Mobile Ad hoc Networks”,
Proceedings of 9th IEEE International
Conference on Information Technology (ICIT),
pp. 40-45, December 2006.
[12]M. Mirhakkak, N. Schult, D. Thomson,
“Dynamic Quality-of-Service for Mobile Ad hoc
Networks”,
Technical
Report,
Mitre
Corporation, http://www.mitrecorporation.net/
work/tech_papers/tech_papers_00/thomson\mp_
adhoc/thomson_adhoc.pdf, 2000.
[13]B. Li, “QoS-Aware Adaptive Services in Mobile
Ad hoc Networks”, Proceedings of IEEE
International Workshop on Quality of Sevice
(IWQoS), pp. 251-268, 2001.
[14]A.M. Abbas, K.A.M. Soufi, “LANM: Lifetime
Aware Node-Disjoint Multipath Routing for
Mobile Ad hoc Networks”, Proccedings of IET
International Conference on Information and
Communication Technology in Electrical
Sciences (ICTES), 2007.
[15] S. Nelakudity, Z.L. Zhang, R.P. Tsang, D.H.C.
Du, “Adaptive Proportional Routing: A
Localized QoS Routing Approach”, IEEE/ACM
Transactions on Networking, vol. 10, no. 6,
December 2002.
[16] Y.S. Chen, Y.C. Tseng, J.P. Sheu, P.H. Quo,
“An On-demand, Link-State, Multipath QoS
Routing in A Wireless Mobile Ad hoc Network”,
Elsevier Journal on Computer Communications,
2003.
[17] S. Wu, K.Y.M. Wong, B. Li, “A Dynamic Call
Admission Policy With Precision QoS
Guarantee Using Stochastic Control for Mobile
Wireless Networks”, IEEE Transaction on
Networking, vol. 10, no. 2, pp. 257-271, April
2002.
UbiCC Journal, Volume 3, Special issue on Mobile Ad hoc Networks
32
Download