International Journal of Engineering Trends and Technology- July to Aug Issue 2011 QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES SWATHI NANDURI* ZAHOOR-UL-HUQ* Master of Technology, G. Pulla Reddy Engineering College, Kurnool, Andhra Pradesh, India, Associate Professor, G. Pulla Reddy Engineering College, Kurnool, Andhra Pradesh, India, ABSTRACT Mesh topologies are important for large-scale highly engineered systems. The Quality of Service (QoS) in such systems is known to decrease as the number of nodes and messages increases. We present a scalable approach for dissemination that exploits all the shortest paths between a pair of nodes and improves the QoS. Despite the presence of multiple shortest paths in a system, we show that these paths cannot be exploited by spreading the messages over the paths in a simple round-robin manner; nodes along one of these paths will always handle more messages than the nodes along the other paths. We characterize the set of shortest paths between a pair of nodes in regular mesh topologies and derive rules, using this characterization, to effectively spread the messages over all the available paths. These rules ensure that all the nodes that are at the same distance from the source handle roughly the same number of messages. By using multipath propagation and demonstrating the transmission results in case of propagation irregularities and link failures the QoS improved with this approach. Keywords: Mesh Topology, Dissemination, Contour, Contour Guided Dissemination I. INTRODUCTION The use of novel devices for communication in highly engineered and network embedded systems are presenting new challenges for monitoring and diagnosing them. These systems contain large number of nodes which will interact in peer-peer manner to achieve the application objectives [1]. To increase the number of simultaneous interactions between these nodes the transmission range of each node is restricted so that it can only communicate with its immediate set of neighbors. This arrangement is called Mesh Topology [2]. Multihop communications are necessary in such systems to send messages from any source to any destination. For example, intermediate nodes must forward messages to a monitoring station from nodes that cannot communicate directly with the ISSN:2231-5381 http://www.internationaljournalssrg.org Page 1 International Journal of Engineering Trends and Technology- July to Aug Issue 2011 monitoring station. Routing protocols are used extensively in wired and wireless networks to support multihop communication [6]. Such protocols construct and maintain routing tables at each node by relying on system wide unique node identifiers. When the number of nodes is very large, such as in sensor networks, it is not feasible to use such identifiers. Several techniques, called dissemination methods, were developed at the network layer to regulate the flow of messages between nonadjacent nodes without relying on unique node identifiers or constructing routing tables using these identifiers[3][4][5].In this paper we consider all the nodes arranged in a mesh topology and try to effectively utilize all the shortest paths present between the nodes and thus ensure that this effective utilization improves QOS. Because each node communicates directly with its immediate set of neighbors, there are multiple shortest paths between many pairs of nodes in a mesh topology. The number of such paths is limited by the relative locations of the nodes. For example, the number of shortest paths between certain pairs of nodes is one, despite the mesh topology. We define a Contour as the union of all the shortest paths between a pair of nodes and present some results to precisely characterize the structure of contours. Using this structure, we show that when messages are spread in a round-robin manner, nodes along one path in the contour will always handle more messages than the nodes along other paths in the contour. Consequently, the benefits of the multiple paths cannot be fully realized. We then present a strategy for spreading messages to neighboring nodes that effectively exploits the available shortest paths and show that our rules for spreading the messages result in a balanced loading of all the available shortest paths. We refer to this approach as Dissemination (CGD). Contour Guided II. RELATED WORK Routing protocols used in traditional wired and wireless networks are based on shortest path algorithms such as the Bellman-Ford algorithm [6] and Dijkstra’s algorithm [7].Similar protocols have been reported for ad hoc, wireless, and mobile networks The QoS achieved in these systems has also been studied . The dissemination method we describe in this paper is somewhat similar to a gradient dissemination scheme with the cost metric being the deviation from evenness of load distribution on all available shortest paths. In the current methods, the motivating factors for considering multipath routing include fault tolerance, higher aggregate bandwidth, and load balancing. The QoS aspects of multipath routing have also been addressed. The split multipath routing protocol maintains maximally edge-disjoint paths. All such method essentially focus on the discovery and maintenance of multiple paths that are useful under various constraints on the node distribution. In contrast, we assume regular mesh topologies and then precisely characterize the set of all shortest paths between any pair of nodes. We then use this geometric structure to propose rules for dissemination that result in all available shortest paths being utilized effectively so that QoS improves. III. OTHER DATA DISSEMINATING ALGORITHSMS In this section we describe other data disseminating methods and compare its performance with CGD. ISSN:2231-5381 http://www.internationaljournalssrg.org Page 2 International Journal of Engineering Trends and Technology- July to Aug Issue 2011 A. Classical Flooding In this approach a node wishes to disseminate a piece of data across the network by sending the data across all its neighbors. Whenever a node receives a data it makes copies of the data and sends that data across all its neighbors except to the node from which it received the data. The amount of time that all the nodes receives the data and makes copies of it and forwards that to all its neighbors is called a “Round”. The disadvantage with this approach is it will cause the nodes to handle many messages. B. Gossiping Gossiping is an alternative to classical flooding that uses randomization to conserve energy. Instead of forwarding data to all neighbors gossiping node only forwards data on to one randomly selected neighbors. If gossiping node receives data from a given neighbor it can forward data back to that neighbor provided if it randomly selects that neighbor. This approach requires less communication traffic but average end-end delivery rate is poor. C. Reverse-path forwarding It is a general approach that is used in several dissemination protocols. In this approach, a sink node (such as a Monitoring Station) generates a “query” that indicates an interest in data items from one or more nodes. Such a query is forwarded along one or more paths from the sink to all the nodes. The nodes forward data along these paths; since the data propagates in a direction that is reverse of the query direction, this method is referred to as reverse-path forwarding. The major flaw with this approach is if the underlying dynamic routing mechanism changes the routing tables used by the nodes during the course of broadcast, then that packet may not be delivered to the node even if the path to it exists. D. Cost field approach This is another choice for routing. Every node maintains a scalar that represents the cost of sending data back to the sink and the data is propagating along the cost gradients. Protocols based in cost-field require less memory space compared to reverse-path forwarding since there is no need to maintain a routing table. Routing decisions are based in the cost at each node. Since nodes are resource constrained in both communication and computation capabilities, cost field based approach is a good choice. E. Virtual Hierarchy approach As shown in the fig.. nodes form local clusters and a cluster head will be elected from the cluster. Nodes in the cluster may rotate their roles as the cluster head in order to achieve the energy consumption balance in the cluster. Since the radio transmission strength is adjustable, the cluster head node can be set to a more powerful transmission range to reach the monitoring station. ISSN:2231-5381 http://www.internationaljournalssrg.org Page 3 International Journal of Engineering Trends and Technology- July to Aug Issue 2011 In this analysis, we present a dissemination method that will ensure that all the nodes that are equidistant from the source node, of a contour handle approximately same number of messages. While in a uniform spreading this load balancing is not achieved.The shapes of the contours varies depending upon the node parameters. F. Geographical forwarding By utilizing the GPS or the location on a grid, the network uses location information to achieve a more efficient routing in the network. Geographic adaptive fidelity sets up a virtual grid depending on the GPS providing location and saves energy in the network by propagating messages in different nodes in the same region. The disadvantage with this approach is that GPS receivers are too expensive in terms of energy consumption ,size or cost. Structure of a Contour in E8 Concrete Challenges with the above Methods: Message loss rate is more Path link failures are more Difficult to re-transmit the messages IV. Contour Guided Dissemination V. SYSTEM EVALUATION ISSN:2231-5381 http://www.internationaljournalssrg.org Page 4 International Journal of Engineering Trends and Technology- July to Aug Issue 2011 In this section, we investigate the impact on the performance of Contour Guided Dissemination system resulting from the adopted strategy to deploy it in the network.. We consider the following schemes to implement our CGD: Here in order to realize the benefits of all the shortest paths we consider that every node receives a packet from its upstream neighbor and forwards it to its downstream neighbor. To utilize this practically we consider that every node will have the address of its sender and receiver. As the message propagate through the network, every intermediate node could easily compute (using, e.g., the distance criterion) which of its immediate neighbors are on a shortest path to the destination. For our analysis purpose we have used Java technology to show the results of our CGD approach by exploiting all the available shortest paths and observed the efficiency in the transmission of messages even incase of link failures. The number of messages handled by each node, average end-end latency, jitter , message loss rate were the primary QOS metrics considered. It was observed after practical analysis that CGD has comparatively low message loss rate and less jitter and delay were experienced. We used the above mentioned metrics as a basis to compare the performance of CGD with the unipath routing which is based on distance vector routing algorithm and shortest path tree that will be precomputed using structure of all shortest paths. In the following graphs we have taken probability of link failures on X-axis and various QoS parameters like Message loss rate Jitter and average delayon Y-axis and obtained the following results: Message Loss Rate VI. IMPLEMENTATION ISSN:2231-5381 http://www.internationaljournalssrg.org Page 5 International Journal of Engineering Trends and Technology- July to Aug Issue 2011 Average Delay with general topologies. In such networks, some nodes must spread the messages, while other nodes must utilize one of the available paths without spreading the messages further. Identifying the structure of contours, for networks with general topologies are interesting problems and the method presented here provides a systematic framework in which to carry out future investigation. IX . REFERENCES Jitter VII. FUTURE SCOPE Contour Guided Dissemination for propagating messages in networked embedded systems that exploits the location of each node and the multiple paths available between a source and a sink. The union of all of the shortest paths between a source and a sink was defined to be a contour. Focus will be laid in developing such Dissemination protocols to achieve efficient data transmissions. [1] Hill, M. Horton, R. Kling, and L. Krishnamurthy, “The Platforms Enabling Wireless Sensor Networks,” Comm. ACM, vol. 47, no. 6, pp. 41-46, June 2004. [2] .F. Akyldiz, X. Wang, and W. Wang, “Wireless Mesh Networks: A Survey,” Computer Networks, vol. 47, pp. 445-487, 2005. [3] J. Gao and L. Zhang, “Load-Balanced Short-Path Routing in Wireless Networks,” IEEE Trans. Parallel and Distributed Systems, vol. 17, no. 4, pp. 377-388, Apr. 2006. [4] C. Intanagonwiwat, R. Govindan, D. Estrin, J. Heidemann, and F. Silva, “Directed Diffusion for Wireless Sensor Networking,” IEEE/ACM Trans. Networking, vol. 11, no. 1, pp. 2-16, 2003. [5] J. Kulik, W. Heinzelman, and H. Balakrishnan, “NegotiationBased Protocols for Disseminating Information in Wireless Sensor Networks,” Wireless Networks, vol. 8, pp. 169-185, 2002. [6] R.E. Bellman, Dynamic Programming. Princeton Univ. Press, 1957. [7] G. Coulouris,J. Dollimore, and,T. Kindberg, Distributed Systems Concepts and Design, fourth ed. Addison-Wesley 2005 VIII. CONCLUSION Although the results were based on a regular topology, these results suggest new methods for dissemination in networks ISSN:2231-5381 http://www.internationaljournalssrg.org Page 6 International Journal of Engineering Trends and Technology- July to Aug Issue 2011 ISSN:2231-5381 http://www.internationaljournalssrg.org Page 7