193
WIRELESS MESH NETWORKS WIRELESS MESH NETWORKS Ian F. AKYILDIZ* and Xudong WANG** Ian F. AKYILDIZ* and Xudong WANG** * Georgia Institute of Technology * Georgia Institute of Technology BWN (Broadband Wireless Networking) Lab & BWN (Broadband Wireless Networking) Lab & ** TeraNovi Technologies ** TeraNovi Technologies

4. ROUTING PROTOCOLS

  • Upload
    chelsi

  • View
    64

  • Download
    0

Embed Size (px)

DESCRIPTION

4. ROUTING PROTOCOLS. Scalability Fast route discovery and rediscovery (for reliability) Mobile user support (for seamless and efficient handover). Features for Optimal Routing in WMNs. Features for Optimal Routing in WMNs. Multiple Performance Metrics minimum hop-count  ineffective!! - PowerPoint PPT Presentation

Citation preview

Page 1: 4. ROUTING PROTOCOLS

WIRELESS MESH NETWORKSWIRELESS MESH NETWORKS

Ian F. AKYILDIZ* and Xudong Ian F. AKYILDIZ* and Xudong WANG**WANG**

* Georgia Institute of Technology* Georgia Institute of Technology BWN (Broadband Wireless Networking) Lab &BWN (Broadband Wireless Networking) Lab &

** TeraNovi Technologies** TeraNovi Technologies

Page 2: 4. ROUTING PROTOCOLS

2

4. ROUTING PROTOCOLS4. ROUTING PROTOCOLS

Page 3: 4. ROUTING PROTOCOLS

3

Features for Optimal Routing in Features for Optimal Routing in WMNsWMNs

ScalabilityScalability

Fast route discovery and rediscovery Fast route discovery and rediscovery (for reliability)(for reliability)

Mobile user support Mobile user support (for (for seamless and efficient seamless and efficient handover)handover)

Page 4: 4. ROUTING PROTOCOLS

4

Features for Optimal Routing in Features for Optimal Routing in WMNsWMNs

Multiple Performance MetricsMultiple Performance Metrics

minimum hop-countminimum hop-count ineffective!!ineffective!! e.g., link quality and round trip time (RTT)e.g., link quality and round trip time (RTT)

RobustnessRobustness(link failures or congestions, fault-tolerant, load balancing)(link failures or congestions, fault-tolerant, load balancing)

Adaptive Support of Both Mesh Routers and Mesh Adaptive Support of Both Mesh Routers and Mesh ClientsClients(support mobility and power efficiency)(support mobility and power efficiency)

Page 5: 4. ROUTING PROTOCOLS

5

Features for Optimal Routing in Features for Optimal Routing in WMNsWMNs

FlexibilityFlexibility– Work with/without gateways, different topologiesWork with/without gateways, different topologies

QoS SupportQoS Support– Consider routes satisfying specified criteriaConsider routes satisfying specified criteria

MulticastMulticast– Important for some applications (e.g., emergency Important for some applications (e.g., emergency

response)response)

Page 6: 4. ROUTING PROTOCOLS

6

* Apply routing algorithms derived for Ad Hoc Networks

Prelim Routing Protocols for WMNs

Page 7: 4. ROUTING PROTOCOLS

7

CLASSIFICATION OF ROUTING PROTOCOLSCLASSIFICATION OF ROUTING PROTOCOLSFOR AD HOC NETWORKSFOR AD HOC NETWORKS

Page 8: 4. ROUTING PROTOCOLS

8

OVERVIEWOVERVIEW

FlatFlat– ReactiveReactive

DSR – Dynamic Source Routing AODV – Ad hoc On demand Distance Vector

– ProactiveProactive FSR – Fisheye State RoutingFSR – Fisheye State Routing FSLS – Fuzzy Sighted Link State OLSR – Optimized Link State Routing ProtocolOLSR – Optimized Link State Routing Protocol TBRPF – Topology Broadcast Based on Reverse Path

Forwarding

Page 9: 4. ROUTING PROTOCOLS

9

OVERVIEWOVERVIEW

HierarchicalHierarchical– CGSR – Clusterhead-Gateway Switch RoutingCGSR – Clusterhead-Gateway Switch Routing– HSR – Hierarchical State RoutingHSR – Hierarchical State Routing– LANMAR – Landmark Ad Hoc RoutingLANMAR – Landmark Ad Hoc Routing– ZRP – Zone Routing ProtocolZRP – Zone Routing Protocol

Page 10: 4. ROUTING PROTOCOLS

10

OVERVIEWOVERVIEW

Geographical RoutingGeographical Routing– DREAM – Distance Routing Effect Algorithm for DREAM – Distance Routing Effect Algorithm for

MobilityMobility– GeoCast – Geographic Addressing and RoutingGeoCast – Geographic Addressing and Routing– GPSR – Greedy Perimeter Stateless RoutingGPSR – Greedy Perimeter Stateless Routing– LAR – Location-Aided RoutingLAR – Location-Aided Routing

Page 11: 4. ROUTING PROTOCOLS

11

Reminder: Ad Hoc Routing ProtocolsReminder: Ad Hoc Routing Protocols

Proactive Protocols Proactive Protocols (A(Actively seeks for routes/paths)– Determine routes independent of traffic patternDetermine routes independent of traffic pattern– Traditional link-state and distance-vector routing protocols are proactiveTraditional link-state and distance-vector routing protocols are proactive

Reactive Protocols Reactive Protocols ((Seek for routes/paths only when required)– Maintain routes only if neededMaintain routes only if needed

Hierarchical RoutingHierarchical Routing– Introduces hierarchy to the flat networkIntroduces hierarchy to the flat network

Geographic Position Assisted RoutingGeographic Position Assisted Routing– Why send packets North when the destination is South?Why send packets North when the destination is South?

Page 12: 4. ROUTING PROTOCOLS

1212

Routing Protocols from Ad Hoc Networks Used for Routing Protocols from Ad Hoc Networks Used for WMNsWMNs

– Dynamic Source Routing (DSR) Dynamic Source Routing (DSR)

in Microsoft mesh networksin Microsoft mesh networks

D.B. Johnson, D.A. Maltz, and Y.-C. Hu, “The dynamic source routing protocol for mobile ad hoc networks (DSR),” IETF Internet-Draft, 2004.

Page 13: 4. ROUTING PROTOCOLS

1313

Routing Protocols from Ad Hoc Networks Used for Routing Protocols from Ad Hoc Networks Used for WMNsWMNs

– AODV (ad-hoc on-demand distance vector) routingAODV (ad-hoc on-demand distance vector) routing Used by Used by many other companiesmany other companies Major building block for the routing framework of Major building block for the routing framework of IEEE IEEE

802.11s802.11s

C. E. Perkins, E. M. Belding-Royer, I. D. Chakeres, “Ad hoc On-Demand Distance Vector (AODV) Routing”, IETF Draft, Jan. 2004.

IEEE 802.11s Task Group, “Joint SEE-Mesh/Wi-Mesh proposal to 802.11 TGs overview,” IEEE Doc: 802.11-05/0567r6, 2006.

Page 14: 4. ROUTING PROTOCOLS

1414

Routing Protocols from Ad Hoc Networks Used for Routing Protocols from Ad Hoc Networks Used for WMNsWMNs

– Topology broadcast based on reverse path Topology broadcast based on reverse path forwarding forwarding

(TBRPF) protocol in (TBRPF) protocol in Firetide NetworksFiretide Networks

R. Ogier, F. Templin, and M. Lewis, “Topology dissemination based on reverse-path forwarding (TBRPF),” IETF RFC 3684, 2004.

Page 15: 4. ROUTING PROTOCOLS

15

Dynamic Source Routing (DSR) Dynamic Source Routing (DSR) D. B. Johnson, D. A. Maltz, Y.-C. Hu, “Dynamic Source Routing Protocol for Mobile Ad Hoc Networks”, IETF Draft, April 2004.

Based on Based on Source Routing principle!Source Routing principle!

On-demandOn-demand

Route computation performed on aRoute computation performed on a per-connection per-connection basisbasis

Page 16: 4. ROUTING PROTOCOLS

16

Dynamic Source Routing (DSR) Dynamic Source Routing (DSR)

Source, after route computation, appends each packet Source, after route computation, appends each packet with a source-route informationwith a source-route information

Intermediate hosts forward packet based on source Intermediate hosts forward packet based on source routeroute

TWO PHASES: ROUTE DISCOVERY &TWO PHASES: ROUTE DISCOVERY & ROUTE MAINTENANCEROUTE MAINTENANCE

Page 17: 4. ROUTING PROTOCOLS

17

Dynamic Source Routing (DSR):Dynamic Source Routing (DSR):ROUTE DISCOVERYROUTE DISCOVERY

When node S wants to send a packet to node D, but When node S wants to send a packet to node D, but does not know a route to D, node S initiates a does not know a route to D, node S initiates a Route Route DiscoveryDiscovery

Source node S floods (broadcasts) Source node S floods (broadcasts) Route Request (RREQ) Route Request (RREQ) packet.packet.

RREQ packet containsRREQ packet contains * DESTINATION ADDRESS

* SOURCE NODE ADDRESS and * A UNIQUE IDENTIFICATION NUMBER.

Page 18: 4. ROUTING PROTOCOLS

18

Dynamic Source Routing (DSR):Dynamic Source Routing (DSR):ROUTE DISCOVERYROUTE DISCOVERY

If the node is the receiver (i.e., has the If the node is the receiver (i.e., has the correct destination address) then returns the correct destination address) then returns the packet to the senderpacket to the sender

If the packet has already been received If the packet has already been received earlier (identified via ID) then discard the earlier (identified via ID) then discard the packetpacket

Page 19: 4. ROUTING PROTOCOLS

19

Dynamic Source Routing (DSR):Dynamic Source Routing (DSR):ROUTE DISCOVERYROUTE DISCOVERY

Each node receiving the packet checks Each node receiving the packet checks whether whether

it knows of a route to that destination.it knows of a route to that destination.

If it does not, it If it does not, it appends/adds its own appends/adds its own

identifieridentifier (address) to the route record and (address) to the route record and

forwards the RREQ packet.forwards the RREQ packet.

Page 20: 4. ROUTING PROTOCOLS

20

Dynamic Source Routing Dynamic Source Routing (DSR):(DSR):ROUTE DISCOVERYROUTE DISCOVERY

B

A

S E

F

H

J

D

C

G

IK

Z

Y

M

N

L

Page 21: 4. ROUTING PROTOCOLS

21

Dynamic Source Routing Dynamic Source Routing (DSR):(DSR):ROUTE DISCOVERYROUTE DISCOVERY

B

A

S E

F

H

J

D

C

G

IK

Represents transmission of RREQ

Z

YBroadcast transmission

M

N

L

[S]

[X,Y] Represents list of identifiers appended to RREQ

Page 22: 4. ROUTING PROTOCOLS

22

Dynamic Source Routing Dynamic Source Routing (DSR):(DSR):ROUTE DISCOVERYROUTE DISCOVERY

B

A

S E

F

H

J

D

C

G

IK

Node H receives packet RREQ from two neighbors: Potential for collision

Z

Y

M

N

L

[S,E]

[S,C]

Page 23: 4. ROUTING PROTOCOLS

23

Dynamic Source Routing Dynamic Source Routing (DSR):(DSR):ROUTE DISCOVERYROUTE DISCOVERY

B

A

S E

F

H

J

D

C

G

IK

Node C receives RREQ from G and H, but does not forward it again, because node C has already forwarded RREQ once

Z

Y

M

N

L

[S,C,G]

[S,E,F]

Page 24: 4. ROUTING PROTOCOLS

24

Dynamic Source Routing Dynamic Source Routing (DSR):(DSR):ROUTE DISCOVERYROUTE DISCOVERY

B

A

S E

F

H

J

D

C

G

IK

Z

Y

M

• Nodes J and K both broadcast RREQ to node D• Since nodes J and K are hidden from each other, their transmissions may collide

N

L

[S,C,G,K]

[S,E,F,J]

Page 25: 4. ROUTING PROTOCOLS

25

Dynamic Source Routing Dynamic Source Routing (DSR):(DSR):ROUTE DISCOVERYROUTE DISCOVERY

B

A

S E

F

H

J

D

C

G

IK

Z

Y

• Node D does not forward RREQ, because node D is the intended target of the route discovery

M

N

L

[S,E,F,J,M]

Page 26: 4. ROUTING PROTOCOLS

26

Route/Path Discovery in Route/Path Discovery in DSRDSR

Destination D on receiving the first RREQ, sends a Destination D on receiving the first RREQ, sends a Route Reply (RREP)Route Reply (RREP)

RREP is sent on a route obtained by RREP is sent on a route obtained by reversingreversing the the route appended to received RREQroute appended to received RREQ

RREP RREP includes the routeincludes the route from S to D on which from S to D on which RREQ RREQ

was received by node Dwas received by node D

Page 27: 4. ROUTING PROTOCOLS

27

Route/Path Discovery in Route/Path Discovery in DSRDSR

B

A

S E

F

H

J

D

C

G

IK

Z

Y

M

N

L

RREP [S,E,F,J,D]

Represents RREP control message

Page 28: 4. ROUTING PROTOCOLS

28

DATA DELIVERY IN DSRDATA DELIVERY IN DSR

Node S on receiving RREP, caches the route included in the RREPNode S on receiving RREP, caches the route included in the RREP

When node S sends a data packet to D, the entire route is When node S sends a data packet to D, the entire route is included in the packet headerincluded in the packet header

– hence the name hence the name Source RoutingSource Routing

Intermediate nodes use the Intermediate nodes use the Source RouteSource Route included in a included in a packet to determine to whom a packet should be packet to determine to whom a packet should be

forwardedforwarded

Page 29: 4. ROUTING PROTOCOLS

29

Data Delivery in Data Delivery in DSRDSR

B

A

S E

F

H

J

D

C

G

IK

Z

Y

M

N

L

DATA [S,E,F,J,D]

Packet header size grows with route length

Page 30: 4. ROUTING PROTOCOLS

30

DSR Optimization: DSR Optimization: Route CachingRoute Caching

Each node caches a new route it learns by any means

When node S finds route [S,E,F,J,D] to node D, node

S also learns route [S,E,F] to node F

When node K receives Route Request [S,C,G] destined

for K, it learns route [K,G,C,S] to node S

Page 31: 4. ROUTING PROTOCOLS

31

DSR Optimization: DSR Optimization: Route CachingRoute Caching

When node F forwards RREP [S,E,F,J,D], node F learns route [F,J,D] to node D

When node E forwards Data [S,E,F,J,D] it learns route [E,F,J,D] to node D

A node may also learn a route when it overhears Data

packets

Page 32: 4. ROUTING PROTOCOLS

32

Advantages of Use of Route Advantages of Use of Route CachingCaching

– can speed up route discoverycan speed up route discovery– can reduce propagation of route requestscan reduce propagation of route requests

Page 33: 4. ROUTING PROTOCOLS

33

Use of Route CachingUse of Route Caching

B

A

S E

F

H

J

D

C

G

IK

[x,y,w] Represents cached route at a node (DSR maintains the cached routes in a tree format)

M

N

L

[S,E,F,J,D][E,F,J,D]

[C,S]

[G,C,S]

[F,J,D],[F,E,S]

[J,F,E,S]

Z

Page 34: 4. ROUTING PROTOCOLS

34

Use of Route Caching:Use of Route Caching:Can Speed up Route DiscoveryCan Speed up Route Discovery

B

A

S E

F

H

J

D

C

G

IK

Z

M

N

L

[S,E,F,J,D][E,F,J,D]

[C,S]

[G,C,S]

[F,J,D],[F,E,S]

[J,F,E,S]

RREQWhen node Z sends a route requestfor node C, node K sends back a routereply [Z,K,G,C] to node Z using a locallycached route

[K,G,C,S]RREP

RREQ

Page 35: 4. ROUTING PROTOCOLS

35

Use of Route Caching:Use of Route Caching:Can Reduce Propagation of Route Can Reduce Propagation of Route RequestsRequests

B

A

S E

F

H

J

D

C

G

IK

Z

Y

M

N

L

[S,E,F,J,D][E,F,J,D]

[C,S]

[G,C,S]

[F,J,D],[F,E,S]

[J,F,E,S]

RREQ

Route Reply (RREP) from node K limits flooding of RREQ.In general, the reduction may be less dramatic.

[K,G,C,S]RREP

Page 36: 4. ROUTING PROTOCOLS

36

Dynamic Source Routing: Dynamic Source Routing: AdvantagesAdvantages

Routes maintained only between nodes who need to communicate

– reduces overhead of route maintenance

Route caching can further reduce route discovery overhead

A single route discovery may yield many routes to the destination, due to intermediate nodes replying from

local caches

Page 37: 4. ROUTING PROTOCOLS

37

Dynamic Source Routing: Dynamic Source Routing: DisadvantagesDisadvantages

Packet header size grows with route length Packet header size grows with route length Flood of route requests may potentially Flood of route requests may potentially

reach all nodesreach all nodesCare must be taken to avoid collisions Care must be taken to avoid collisions

between route requests propagated by between route requests propagated by neighboring nodesneighboring nodes– insertion of random delays before insertion of random delays before

forwarding RREQforwarding RREQ

Page 38: 4. ROUTING PROTOCOLS

38

Ad Hoc On-Demand Distance Vector Routing Ad Hoc On-Demand Distance Vector Routing (AODV) (AODV) C. E. Perkins, E. M. Belding-Royer, I. D. Chakeres, “Ad hoc On-Demand Distance Vector (AODV) Routing”, IETF Draft, Jan. 2004.

AODV attempts to improve on DSR by AODV attempts to improve on DSR by maintaining maintaining routing tables at the nodesrouting tables at the nodes, so that data packets , so that data packets do not have to contain pathsdo not have to contain paths

AODV retains the desirable feature of DSR that AODV retains the desirable feature of DSR that routes are maintained only between nodes which routes are maintained only between nodes which need to communicateneed to communicate

Page 39: 4. ROUTING PROTOCOLS

39

AODV

– Hop-by-hop routing as opposed to source routing

– On-demandOn-demand

– When a source node wants to send a message to some destination When a source node wants to send a message to some destination node and does not already have a valid route to that destination, node and does not already have a valid route to that destination, it initiates a it initiates a Path DiscoveryPath Discovery ProcessProcess to locate the destination to locate the destination (as in DSR case)(as in DSR case)

– It broadcasts the RREQ packet to its neighborsIt broadcasts the RREQ packet to its neighbors

Page 40: 4. ROUTING PROTOCOLS

40

AODVAODV

RREQs are forwarded in a manner similar to DSRRREQs are forwarded in a manner similar to DSR

When a node re-broadcasts a RREQ, it sets up a When a node re-broadcasts a RREQ, it sets up a reverse reverse pathpath pointing towards the source pointing towards the source

– AODV assumes symmetric (bi-directional) linksAODV assumes symmetric (bi-directional) links

When the intended destination receives a RREQ, it replies When the intended destination receives a RREQ, it replies by sending a Route Reply (RR)by sending a Route Reply (RR)

RR travels along the RR travels along the reverse path set-upreverse path set-up when RREQ was when RREQ was forwardedforwarded

Page 41: 4. ROUTING PROTOCOLS

41

AODVAODV

– When RREQ propagates, routing tables are When RREQ propagates, routing tables are updated at intermediate nodes updated at intermediate nodes (for route to (for route to source of RREQ)source of RREQ)

– When RREP is sent by destination, routing tables When RREP is sent by destination, routing tables updated at intermediate nodes updated at intermediate nodes (for(for route to route to

destination),destination), and propagated back to source and propagated back to source

Page 42: 4. ROUTING PROTOCOLS

42

AODVAODV

–Each node maintains its own sequence number and a broadcast ID.

–The broadcast ID is incremented for every RREQ the node initiates

Page 43: 4. ROUTING PROTOCOLS

43

AODVAODV

– The node’s IP address and the broadcast ID The node’s IP address and the broadcast ID uniquely identify a RREQ.uniquely identify a RREQ.

– Along with its own sequence number and Along with its own sequence number and broadcast broadcast

ID, the source node includes in the RREQ the ID, the source node includes in the RREQ the most most

recent sequence number it has for the recent sequence number it has for the destination.destination.

Page 44: 4. ROUTING PROTOCOLS

44

AODVAODV

– Intermediate nodes can reply to the RREQ only if Intermediate nodes can reply to the RREQ only if they have a route to the destination whose they have a route to the destination whose corresponding Destination Sequence Number is corresponding Destination Sequence Number is greater than or equal to that contained in the RREQ. greater than or equal to that contained in the RREQ.

– During the process of forwarding the RREQ, During the process of forwarding the RREQ, intermediate nodes recording their route tables with the intermediate nodes recording their route tables with the address of the neighbor from which the first copy address of the neighbor from which the first copy of the broadcast packet is receivedof the broadcast packet is received establishing a establishing a reverse path.reverse path.

Page 45: 4. ROUTING PROTOCOLS

45

AODVAODV

– If more same RREQs are received later, they are If more same RREQs are received later, they are

discarded.discarded.

– RREP packet is sent back to the neighbors and the RREP packet is sent back to the neighbors and the routing routing

tables are accordingly updated.tables are accordingly updated.

Page 46: 4. ROUTING PROTOCOLS

46

Route Requests in AODVRoute Requests in AODV

B

A

S E

F

H

J

D

C

G

IK

Z

Y

M

N

L

Page 47: 4. ROUTING PROTOCOLS

47

Route Requests in AODVRoute Requests in AODV

B

A

S E

F

H

J

D

C

G

IK

Represents transmission of RREQ

Z

Y

Broadcast transmission

M

N

L

Page 48: 4. ROUTING PROTOCOLS

48

Route Requests in AODVRoute Requests in AODV

B

A

S E

F

H

J

D

C

G

IK

Represents links on Reverse Path

Z

Y

M

N

L

Page 49: 4. ROUTING PROTOCOLS

49

Reverse Path Setup in AODVReverse Path Setup in AODV

B

A

S E

F

H

J

D

C

G

IK

• Node C receives RREQ from G and H, but does not forward it again, because node C has already forwarded RREQ once

Z

Y

M

N

L

Page 50: 4. ROUTING PROTOCOLS

50

Reverse Path Setup in AODVReverse Path Setup in AODV

B

A

S E

F

H

J

D

C

G

IK

Z

Y

M

N

L

Page 51: 4. ROUTING PROTOCOLS

51

Reverse Path Setup in AODVReverse Path Setup in AODV

B

A

S E

F

H

J

D

C

G

IK

Z

Y

• Node D does not forward RREQ, because node D is the intended target of the RREQ

M

N

L

Page 52: 4. ROUTING PROTOCOLS

52

Route Reply in AODVRoute Reply in AODV

B

A

S E

F

H

J

D

C

G

IK

Z

Y

Represents links on path taken by RREP

M

N

L

Page 53: 4. ROUTING PROTOCOLS

53

Forward Path Setup in AODVForward Path Setup in AODV

B

A

S E

F

H

J

D

C

G

IK

Z

Y

M

N

L

Forward links are setup when RREP travels alongthe reverse path

Represents a link on the forward path

Page 54: 4. ROUTING PROTOCOLS

54

Data Delivery in AODVData Delivery in AODV

B

A

S E

F

H

J

D

C

G

IK

Z

Y

M

N

L

Routing table entries used to forward data packet.NOTE: Route is not included in packet header as in DSR.

DATA

Page 55: 4. ROUTING PROTOCOLS

55

* Special considerations

- WMN routers differ from MANET routers * Power supply * Mobility * Separation of WMN routers and clients

Routing Protocols for WMNs

Page 56: 4. ROUTING PROTOCOLS

5656

Routing Challenges in WMNsRouting Challenges in WMNs

Routing in WMNs is much more complicated than in Ad Hoc Routing in WMNs is much more complicated than in Ad Hoc NetworksNetworks

REASONS:REASONS:1) Network topology is variable and inconsistent (same as ad hoc 1) Network topology is variable and inconsistent (same as ad hoc

networks)networks)

2) 2) Depending on the performance goal in routing, it may not beDepending on the performance goal in routing, it may not be possible to determine a routing path solely based on network possible to determine a routing path solely based on network

topologytopology

3) There may not be an optimal solution for a given routing 3) There may not be an optimal solution for a given routing problemproblem

4) Routing traverses both mesh routers and mesh clients that 4) Routing traverses both mesh routers and mesh clients that havehave

different networking capabilitiesdifferent networking capabilities

Page 57: 4. ROUTING PROTOCOLS

5757

Design PrinciplesDesign Principles

1)1) Maintaining a consistent and stable network Maintaining a consistent and stable network topologytopology

2) Performing dynamic and adaptive routing2) Performing dynamic and adaptive routing

3) Developing new routing metrics3) Developing new routing metrics

4) Considering tradeoff between cross-layer design 4) Considering tradeoff between cross-layer design and single-layer solutionand single-layer solution

Page 58: 4. ROUTING PROTOCOLS

5858

Design PrinciplesDesign Principles

5) Deriving distributed algorithms for routing5) Deriving distributed algorithms for routing

6) Ensuring scalability in routing6) Ensuring scalability in routing

7) Adaptively supporting both mesh routers and mesh 7) Adaptively supporting both mesh routers and mesh clientsclients

Page 59: 4. ROUTING PROTOCOLS

59

PERFORMANCE METRICS

Per-Flow Parameters: (e.g., delay, packet loss ratio, and delay jitter and other parameters such as hop-count, per-flow throughput, and intra-flow interference)

Per-Node Parameters: (computational complexity and power efficiency)

Per-Link Parameters: (e.g., link quality, channel utilization, transmission rate, and congestion)

Inter-Flow Parameters: (e.g., inter-flow interference and fairness)

Network-Wide Parameters: (e..g., total throughput or total delay)

Page 60: 4. ROUTING PROTOCOLS

60

* Hop-Count * Per-Hop RTT

* Per-Hop Packet Pair Delay

* Expected Transmission Count (ETX)

OVERVIEW OF ROUTING METRICS

Page 61: 4. ROUTING PROTOCOLS

61

* Expected Transmission on a Path (ETOP) * Expected Transmission Time (ETT)

* Weighted Cumulative ETT (WCETT) * Bottleneck Link Capacity (BLC)

* Expected Data Rate (EDR) * Airtime Cost Routing Metric

OVERVIEW OF ROUTING METRICS

Page 62: 4. ROUTING PROTOCOLS

62

* Minimum hop counting (the link quality is binary)

* Simple and requires no measurements

Disadvantages: * Can lead to poor throughput * Link quality all links do not have the same quality * Does not take packet loss or bandwidth into account * Route that minimizes hop count does not necessarily maximize the throughput

Hop Count

Page 63: 4. ROUTING PROTOCOLS

6363

Per-Hop RTTPer-Hop RTT

Measured by sending unicast probe packets between Measured by sending unicast probe packets between neighboring nodes neighboring nodes

Then calculating the time spent on the probe-ack Then calculating the time spent on the probe-ack procedureprocedure

A weighted moving average is needed to get a A weighted moving average is needed to get a smoother measurement, because one sample cannot smoother measurement, because one sample cannot really reflect the actual link status.really reflect the actual link status.

Adya A, Bahl P, Padhye J, Wolman A and Zhou L, Adya A, Bahl P, Padhye J, Wolman A and Zhou L, ““A multi-radio unification protocol for IEEE 802.11 wireless A multi-radio unification protocol for IEEE 802.11 wireless networks”,networks”, Proc. IEEE BroadNets 2004Proc. IEEE BroadNets 2004

Page 64: 4. ROUTING PROTOCOLS

6464

Per-Hop RTTPer-Hop RTT

Based on per-hop RTT, a routing protocol selects a Based on per-hop RTT, a routing protocol selects a routing path with the least sum of RTTs of all links routing path with the least sum of RTTs of all links on the path.on the path.

Per-hop RTT is able to capture Per-hop RTT is able to capture

* the packet loss ratio in a link* the packet loss ratio in a link

* the traffic load* the traffic load

* queuing delay in two nodes on the link, and * queuing delay in two nodes on the link, and

* contention status in all neighboring nodes.* contention status in all neighboring nodes.

Page 65: 4. ROUTING PROTOCOLS

65

* Loss will cause RTT to increase due to ARQ

* If ARQ fails, RTT is increased by some percentage

* This metric is load dependent

* Channel contention increases RTT

Per-Hop RTT

Page 66: 4. ROUTING PROTOCOLS

6666

Per-Hop RTTPer-Hop RTT

Its effectiveness is constrained by two problems:Its effectiveness is constrained by two problems:

PROBLEM 1:PROBLEM 1:Per-hop RTT is too much dependent on the traffic load/queuing delay, which Per-hop RTT is too much dependent on the traffic load/queuing delay, which

interferes interferes with the accuracy of per-hop RTT and thus, can easily lead to route instability.with the accuracy of per-hop RTT and thus, can easily lead to route instability.

If a separate queue is assigned to probe packets, then it can accurately If a separate queue is assigned to probe packets, then it can accurately measure the measure the

link quality but cannot reflect the traffic load. link quality but cannot reflect the traffic load.

A solution to this problem is to adopt a A solution to this problem is to adopt a link measurement link measurement scheme !scheme !

Kim K-H and Shin KG, “On accurate measurement of link quality in multi-hop wireless mesh networks,” Proc. ACM MOBICOM 2006

Page 67: 4. ROUTING PROTOCOLS

6767

Per-Hop RTTPer-Hop RTT

PROBLEM 2:PROBLEM 2: Accuracy of per-hop RTT measurement totally relies on the Accuracy of per-hop RTT measurement totally relies on the

weighted moving average scheme. weighted moving average scheme.

For large variations in measurements cause unreliable values For large variations in measurements cause unreliable values for per-hop RTT for per-hop RTT

(no matter what weight is applied in the weighted moving average (no matter what weight is applied in the weighted moving average scheme.)scheme.)

Overhead of the probe-ack procedure Overhead of the probe-ack procedure

REMARK:REMARK: Per-hop RTT captures per-link performance parameters, Per-hop RTT captures per-link performance parameters,

although although measurement is actually carried out at the network layer.measurement is actually carried out at the network layer.

Page 68: 4. ROUTING PROTOCOLS

68

Disadvantages:

* Does not take link data rate into account.

* High overhead.

* Load dependent metric may cause route flaps

* Need to insert probe at head of interface queue to avoid queuing delay

* Not scalable - every pair needs to probe each other

Disadvantages of Per-Hop RTT

Page 69: 4. ROUTING PROTOCOLS

6969

Per-Hop Packet Pair DelayPer-Hop Packet Pair Delay

Measured by sending two back-to-back probe packets from a node to Measured by sending two back-to-back probe packets from a node to its neighbor its neighbor

First First a small probe packet; Second a small probe packet; Second large large

When the neighbor receives these two packets, it finds the delay in-When the neighbor receives these two packets, it finds the delay in-between them and then sends such information back to the probing between them and then sends such information back to the probing nodenode

Since relative delay is used to measure the per-hop delay, per-hop PPD Since relative delay is used to measure the per-hop delay, per-hop PPD measurement is less impacted by queueing delays or traffic load in a measurement is less impacted by queueing delays or traffic load in a node node

Draves R, Padhye J and Zill B, “Routing in multi-radio, multi-hop wireless mesh networks,” Proc. ACM MOBICOM 2004.

Page 70: 4. ROUTING PROTOCOLS

7070

Per-Hop Packet Pair DelayPer-Hop Packet Pair Delay

* However, impact by traffic load still exists, because whether or * However, impact by traffic load still exists, because whether or

not being able to send probe packets in a link of two nodes also not being able to send probe packets in a link of two nodes also

depends on the queuing delays of other neighboring nodes. depends on the queuing delays of other neighboring nodes.

EXAMPLE:EXAMPLE:when Node A sends a probe packet to B, if A’s neighbor C is also when Node A sends a probe packet to B, if A’s neighbor C is also

sending a very high traffic load to A, then A has to delay its probe to B.sending a very high traffic load to A, then A has to delay its probe to B.

Therefore, per-hop packet pair delay still has to captureTherefore, per-hop packet pair delay still has to capture

the route instability issue. the route instability issue.

Page 71: 4. ROUTING PROTOCOLS

7171

Per-Hop Packet Pair DelayPer-Hop Packet Pair Delay

* Large overhead than per-hop RTT, due to the need * Large overhead than per-hop RTT, due to the need of more probe packetsof more probe packets

Its performance is also dependent on the weighted Its performance is also dependent on the weighted moving average scheme, and assumes the variation moving average scheme, and assumes the variation of measurements are small.of measurements are small.

Similar to per-hop RTT, per-hop PPD only captures Similar to per-hop RTT, per-hop PPD only captures per-link performance parameters. per-link performance parameters.

Page 72: 4. ROUTING PROTOCOLS

7272

Expected Transmission Count Expected Transmission Count (ETX)(ETX)

ETX of a link is the expected number of transmissions before a ETX of a link is the expected number of transmissions before a packet is successfully delivered on a linkpacket is successfully delivered on a link

For a route, the ETX is the sum of the ETXs on all linksFor a route, the ETX is the sum of the ETXs on all links

Captures the link quality and packet loss on both directions of Captures the link quality and packet loss on both directions of a link a link

The route ETX can detect interference among links of the The route ETX can detect interference among links of the same routesame route

the larger the route ETX, the more self-interference on the the larger the route ETX, the more self-interference on the route.route.

De Couto DSJ, Aguayo D, Bicket J, and Morris R, De Couto DSJ, Aguayo D, Bicket J, and Morris R, ““A high-throughput path metric for multihop wireless routing,”A high-throughput path metric for multihop wireless routing,” in Proc. ACM MOBICOM 2003in Proc. ACM MOBICOM 2003

Page 73: 4. ROUTING PROTOCOLS

7373

Expected Transmission Count Expected Transmission Count (ETX)(ETX)

Every period of Every period of seconds a node sends a broadcast probe seconds a node sends a broadcast probe message to all its neighborsmessage to all its neighbors

Each neighbor records the number of received probe Each neighbor records the number of received probe messages (denoted by nmessages (denoted by nww) during a period of w seconds, ) during a period of w seconds, where w > where w >

Thus, the delivery ratio of sending a packet from the Thus, the delivery ratio of sending a packet from the probing node to its neighbor is:probing node to its neighbor is:

nw

w /

Page 74: 4. ROUTING PROTOCOLS

7474

Expected Transmission Count Expected Transmission Count (ETX)(ETX)

If a probing node embeds the information of nIf a probing node embeds the information of nww from all its from all its neighbors to the probe packetneighbors to the probe packet

Then each of its neighbors can derive the packet delivery ratio Then each of its neighbors can derive the packet delivery ratio from the neighbor to the probing nodefrom the neighbor to the probing node

With the delivery ratio at both forward and reverse directions, With the delivery ratio at both forward and reverse directions,

denoted by ddenoted by dff and d and drr, respectively, ETX is calculated as:, respectively, ETX is calculated as:

ETX 1

d f dr

Page 75: 4. ROUTING PROTOCOLS

7575

Advantages ofAdvantages ofExpected Transmission Count Expected Transmission Count (ETX)(ETX)

Lower overhead because broadcast rather Lower overhead because broadcast rather than unicast is applied to probe messages.than unicast is applied to probe messages.

Does not measure delays, so the Does not measure delays, so the measurement based on probe messages are measurement based on probe messages are not impacted by queueing delays in a node. not impacted by queueing delays in a node.

Page 76: 4. ROUTING PROTOCOLS

7676

Disadvantages of Disadvantages of Expected Transmission Count Expected Transmission Count (ETX)(ETX)

– Probe messages experience different packet loss ratios Probe messages experience different packet loss ratios than unicast messages than unicast messages

because broadcast messages use more robust because broadcast messages use more robust modulation and coding schemes, and thus have low modulation and coding schemes, and thus have low transmission ratestransmission rates

– ETX does not take into account the differences in ETX does not take into account the differences in packet size for different traffic flows and the different packet size for different traffic flows and the different capacities for different linkscapacities for different links

Page 77: 4. ROUTING PROTOCOLS

7777

Disadvantages of Disadvantages of Expected Transmission Count Expected Transmission Count (ETX)(ETX)

– Estimation method in ETX may not be accurateEstimation method in ETX may not be accurate

* It relies on the mean loss ratio; * It relies on the mean loss ratio;

* Wireless links usually experience bursty * Wireless links usually experience bursty losses. losses.

Page 78: 4. ROUTING PROTOCOLS

78

* ETX metric performs best in static scenarios

* It is insensitive to load

* RTT is most sensitive to load

* Packet-Pair suffers from self-interference on multi-hop paths

* Minimum hop count based routing seems to perform best in mobile scenarios

* Schemes based on measurements of link quality does not converge quickly

SO FAR

Page 79: 4. ROUTING PROTOCOLS

7979

Expected Transmission on a Path Expected Transmission on a Path (ETOP)(ETOP)

* When a routing path is selected in many routing protocols, * When a routing path is selected in many routing protocols, the position of a link is not considered in the routing metricthe position of a link is not considered in the routing metric

This is true if the link layer allows an infinite number of This is true if the link layer allows an infinite number of retransmissions, because a retransmitted packet has the retransmissions, because a retransmitted packet has the same impact on upper layer no matter at which link same impact on upper layer no matter at which link retransmission happensretransmission happens

However, if the link layer allows only a limited number of However, if the link layer allows only a limited number of retransmissions, end-to-end retransmission has to be carried retransmissions, end-to-end retransmission has to be carried out. out.

Page 80: 4. ROUTING PROTOCOLS

8080

Expected Transmission on a Path Expected Transmission on a Path (ETOP)(ETOP)

Comparing two links, even if their ETX is the same, the one Comparing two links, even if their ETX is the same, the one closer to closer to

the destination can result in higher transport layer the destination can result in higher transport layer retransmissions, retransmissions,

i.e., this link can lead to worse performance if it would be i.e., this link can lead to worse performance if it would be selected.selected.

ETOP solves the above problem by taking into account the ETOP solves the above problem by taking into account the relative relative

position of a link on a routing path when the routing cost of position of a link on a routing path when the routing cost of the path is the path is

calculated.calculated.

Jakllari G, Eidenbenz S, Hengartner N, Krishnamurthy S and Faloutsos M, “Link positions matter: a non-commutative routing metric for wireless mesh networks,” Proc. IEEE INFOCOM 2008

Page 81: 4. ROUTING PROTOCOLS

8181

Expected Transmission on a Path Expected Transmission on a Path (ETOP)(ETOP)

Consider a routing path with n links from node vConsider a routing path with n links from node v00 to node v to node vnn

its cost is denoted by Tits cost is denoted by Tnn

For a packet to be delivered end-to-end through this routing path, For a packet to be delivered end-to-end through this routing path, the needed number of end-to-end attempts is assumed to be Ythe needed number of end-to-end attempts is assumed to be Ynn..

In an end-to-end attempt j, the number of links that a packet has In an end-to-end attempt j, the number of links that a packet has been traversed before it is dropped by the link layer is denoted as been traversed before it is dropped by the link layer is denoted as MM

The number of link layer transmissions at node j is assumed to be The number of link layer transmissions at node j is assumed to be HHjj . .

Page 82: 4. ROUTING PROTOCOLS

8282

Expected Transmission on a Path Expected Transmission on a Path (ETOP)(ETOP)

ETOP of a routing path is the expectation of TETOP of a routing path is the expectation of Tnn

Captures the total number of link layer transmissions of a given routing Captures the total number of link layer transmissions of a given routing path under all possible end-to-end attemptspath under all possible end-to-end attempts

Compared to ETX, ETOP can improve transport layer throughput, Compared to ETX, ETOP can improve transport layer throughput, because a routing path is selected with a least number of overall link because a routing path is selected with a least number of overall link layer retransmissions.layer retransmissions.

E[Tn ] K (E[H j | H j K ]j0

n 2

P[M j | M n])

E[Yn 1] E[H j | H j K ]

j0

n 1

Page 83: 4. ROUTING PROTOCOLS

83

Expected Transmission Time (ETT) and Weighted Cumulative ETT (WCETT)

Expected Transmission Time (ETT)– An extended version of ETX. – Based on ETX, ETT considers the impact of both packet

size and link quality

– ETT reflects the expected packet transmission time on a link.

B

SETXETT

Draves R, Padhye J and Zill B, “Comparisons of routing metrics for static multi-hop wireless Networks,” in Proc. ACM SigComm, 2004

S: packet size, B: link bandwidth.

Page 84: 4. ROUTING PROTOCOLS

84

Expected Transmission Time (ETT) and Weighted Cumulative ETT (WCETT)

– For a routing path, the expected transmission time can be the sum of ETTs of all links on the path.

– However, ETT does not take into account channel diversity in WMNs using multiple radios at some nodes

To resolve this issue, a routing metric called WCETT is proposed

Page 85: 4. ROUTING PROTOCOLS

85

Expected Transmission Time (ETT) and Weighted Cumulative ETT (WCETT)

Weighted Cumulative ETT (WCETT)

given routing path.

– First term considers the overall expected transmission time of the routing path.

– Second term captures the transmission time on the bottleneck channels. – In this way, WCETT takes into account the tradeoff between overall routing

delay and channel diversity utilization.

jkj

n

ii XETTWCETT

11

max)1( n: number of hops on a routing path, k: # of available channels for multi-radio

operation.

n

iiHOPij ETTX

channelon

jkjX

1max finds the bottleneck channel of aso

Page 86: 4. ROUTING PROTOCOLS

86

Expected Transmission Time (ETT) and Weighted Cumulative ETT (WCETT)

ETT enhances the performance of ETX by mapping packet size and link BW into the transmission time.

However, it uses a similar estimation scheme as that of ETX, so it has similar problems of ETX, i.e., inaccurate estimation, bottleneck routes, etc.

Page 87: 4. ROUTING PROTOCOLS

87

Expected Transmission Time (ETT) and Weighted Cumulative ETT (WCETT)

WCETT is not applicable to WMNs based on single-radio

multi-channel operation for two reasons:

1) broadcast probe messages cannot be sent on different channels of the same radio simultaneously;

2) the channel switching time can be comparable to ETT of a link.

Page 88: 4. ROUTING PROTOCOLS

88

Bottleneck Link Capacity (BLC)

BLC is derived based on the expected busy time (EBT) of transmitting a packet on a link.

EBT can be estimated by considering the packet loss rate (PLR) and transmission mechanism in the MAC layer. – If RTS-CTS-Data-Ack handshake is used for packet transmission as

in an IEEE 802.11 MAC,

Liu T and Liao W, “Capacity-aware routing in multi-channel multi-rate wireless mesh networks,” in Proc. IEEE ICC, 2006

Thandshake: Total transmission time of one RTS-CTS-Data-Ack

Ep: PLR. p

handshake

e

TEBT

1

Page 89: 4. ROUTING PROTOCOLS

89

Bottleneck Link Capacity (BLC)

Based on EBT, a residual capacity of a link considered as defined as the ratio between the idle time and EBT. – Considering a path P, if the residual capacity of link i is

LCi, then BLC is given by

K: Length of the routing path Pμ: fine-tuning parameter.K

iPiLC

BLC

min

Page 90: 4. ROUTING PROTOCOLS

90

Bottleneck Link Capacity (BLC)

Residual capacity of the bottleneck link of a routing path

Dividing the minimum residual capacity by a certain number is for penalizing a long routing path

Because busy time is considered in BLC, load-balancing in links has been taken into account

Page 91: 4. ROUTING PROTOCOLS

91

Bottleneck Link Capacity (BLC)

However, the self-interference of a routing path is not considered, as the minimum residual capacity is considered in BLC

– If two routing paths have different self-interferences, then the bottleneck link can have the same residual capacity.

– The same problem applies to interference from other routing paths.

Page 92: 4. ROUTING PROTOCOLS

92

Expected Data Rate (EDR)

EDR integrates the expected transmission count and expected transmission contention degree (TCD) into the same routing metric

– TCD of a link is the time that is spent on retransmitting non-

acknowledged packets over a given period.

– Considering link k on a routing path, if the sum of TCDs of links that interfere link k is Ik, then the the EDR of link k is

For EDR of a routing path, it is defined as the EDR of the bottleneck link.

Γ: maximum transmission rate of link k.

kkk ETXI

EDR

Page 93: 4. ROUTING PROTOCOLS

93

Problems of Expected Data Rate (EDR)

– EDR integrates two closely related parameters: ETX ad TCD.

– In fact, given the same packet length, if ETX is large, TCD is large too.

why ETX and TCD have to be combined like an EDR

equation remains a question.

Page 94: 4. ROUTING PROTOCOLS

94

Problems of Expected Data Rate (EDR)

– Even if the link rate is considered in the metric, it does not consider the fact that multiple rates instead of only the maximum rate are available in each link.

– Interference range of a given link k is difficult to determine, so Ik is hard to derive.

– EDR of a routing path cannot take into account the self-interference,

as the EDR of a bottleneck link is used as the EDR of the entire routing path.

Page 95: 4. ROUTING PROTOCOLS

95

Airtime Cost Routing Metric

– To identify an efficient radio-aware path among all the candidate paths,

– A default routing metric in IEEE 802.11s draft

– Reflects the amount of channel resources consumed for transmitting a frame over a particular link.

IEEE 802.11s Task Group, Draft, Amendment to Standard for Information Technology – Telecommunications and Information Exchange Between Systems - LAN/MAN Specific Requirements – Part 11: Wireless Medium Access Control (MAC) and physical layer (PHY) specifications: Amendment: ESS Mesh Networking, IEEE P802.11s/D1.00-2006.).

Page 96: 4. ROUTING PROTOCOLS

96

Airtime Cost Routing Metric

– The path which has the smallest sum of airtime cost is the best path.

– The airtime cost Ca for each link is calculated as:

pt

tPcaa er

BOOC

1

1][

Oca, Op, and Bt depend on the used transmission technology.

Oca: channel access overhead,

Op: protocol overhead,

Bt: number of bits in a test frame.

r and ept : bit rate in Mbit/s and frame error rate for the test frame size Bt, respectively.

Page 97: 4. ROUTING PROTOCOLS

97

Comparison of Different Routing Comparison of Different Routing MetricsMetrics

Many routing metrics try to capture link-layer performance parameters by using a procedure in the network layer

In fact, these schemes can be enhanced by performing link-quality measurements directly in the link layer and then use such measurements in the network layer

This method implies that the routing metrics should involve cross-layer interactions

Page 98: 4. ROUTING PROTOCOLS

98

Comparison of Different Routing Comparison of Different Routing MetricsMetrics

RoutingMetrics

LayersCaptured

Performance Parameters

Advantages Shortcomings

Hop-count Network Number of hops Simple and lowMinimum hop-count is usually not the performance goal

Per-hop RTT

Network

Packet loss, traffic load,queuing delay, contention

Multiple link metrics captured

high overhead in sending probes, estimation accuracy depends on traffic load

Per-hop PPD

NetworkPacket loss, transmission

DelayDelay

Multiple link metrics captured, less impacted by traffic load

High overhead in measuring delay, performance dependent on the measurement accuracy, no load balancing

ETXNetwork

Packet loss, retransmission, contention

Captured multiple link metrics, relative lower overhead by using broadcast

Measurement is not accurate due to differences between broadcast and unicast, no load balancing, cannot capture packet loss variations, can have bottleneck link

Page 99: 4. ROUTING PROTOCOLS

99

Comparison of Different Routing Comparison of Different Routing MetricsMetrics

RoutingMetrics

LayersCaptured

Performance Parameters

Advantages Shortcomings

ETOP Network, Link

End-to-end attempts, linkretransmission

Link position considered inrouting

Difficulty in deriving the metric

ETT &WCETT

Network

Same link metrics of ETXand also link bandwidth and packet size

Improve ETX by considering link bandwidth and packet size, channel diversity

Same problems of ETX, Not applicable to single-radio multi-channel operation

Page 100: 4. ROUTING PROTOCOLS

100

Comparison of Different Routing Comparison of Different Routing MetricsMetrics

RoutingMetrics

LayersCaptured

Performance Parameters

Advantages Shortcomings

BLC Network, Link

MAC handshake, time, packet loss rate, hop count

Residual capacity of a link is considered, so load-balancing is performed indirectly

Bottleneck link of a route does not consider self-interference

EDRNetwork

link metrics as that in ETX, contention time

Use contention time of all interfering links to considerinterference

Have the same problems as those in ETX, hard to find interfering links

Airtime Cost Link

Resource consumed bya packet on a linka link

Captures the impact of the dynamic environment to a link

Overhead in probing, Airtime cost captured by probe message may bedifferent from a packet

Page 101: 4. ROUTING PROTOCOLS

101

Remaining Issues

– The measurement or estimation method for a routing metric may not be accurate

– It may also cause large overhead, especially for a large scale network.

– Performance comparisons between different routing metrics need further research, although some work has been done for a few routing metrics.

Page 102: 4. ROUTING PROTOCOLS

102

Remaining Issues

– The design of many existing routing metrics is still “ad-hoc”,

* i.e., why the proposed routing metric can improve the network performance is not really justified;

* usually only simulation results are used to prove the

effectiveness of a routing metric.

* the side-effect of such a design is that the effectiveness of a routing metric may be limited to a certain type of WMNs.

– A routing metric may not be able to capture enough network parameters for a routing protocol to optimize the network performance.

Page 103: 4. ROUTING PROTOCOLS

103

OVERVIEW OF ROUTING ALGORITHMSOVERVIEW OF ROUTING ALGORITHMS

Hop-Count based Routing Link Level QoS Based Routing Interference Based Routing (IRMA) Routing with Load Balancing Routing Based on Residual Link Capacity End-to-End QoS Routing Reliability Aware Routing Joint Channel Assignment and Routing (Layer 2.5

Routing)

Page 104: 4. ROUTING PROTOCOLS

104

SET 1:Hop-Count based Routing Algorithms

Light Client Management Routing (LCMR) Protocol

Orthogonal Rendezvous Routing (ORR) Protocol

HEAT Protocol

Page 105: 4. ROUTING PROTOCOLS

105

Light Client Management Routing (LCMR) ProtocolWehbi B, Mallouli W and Cavalli A, Light client management protocol for wireless mesh networks.Proc. 7th Int. Conf. on Mobile Data Management (MDM), 2006

End-to-end routing path from a source to a destination client consists of

* proactive route among mesh routers and * reactive routes between clients and mesh routers

To find the best route from one client to another, hop-count is used as the routing metric.

LCMR does not require routing functionality in clients Mesh routers supporting clients take care of routing

Page 106: 4. ROUTING PROTOCOLS

106

Light Client Management Routing (LCMR) Protocol

Mesh routers need to maintain two tables:

1. MAC and IP addresses of local clients

2. IP addresses of remote clients as well as the IP addresses of remote mesh routers associated

with remote clients

Page 107: 4. ROUTING PROTOCOLS

107

Light Client Management Routing (LCMR) Protocol

Based on these two tables,

• When a local client needs to set up a routing path to a remote client,

• its associated mesh router can find out which remote mesh router is responsible for forwarding traffic to the remote client

• Based on such information, mesh routers can then set up a routing path between them using proactive routing and hop-count metric.

Page 108: 4. ROUTING PROTOCOLS

108

Disadvantages of Light Client Management Routing (LCMR) Protocol

LCMR has a high overhead of maintaining the two tables on each mesh routers,

as all clients’ IP addresses need to be collected and stored at each mesh router.

Page 109: 4. ROUTING PROTOCOLS

109

SET 1:Hop-Count based Routing Protocols

Light Client Management Routing (LCMR) Protocol

Orthogonal Rendezvous Routing (ORR) Protocol

HEAT Protocol

Page 110: 4. ROUTING PROTOCOLS

110

Orthogonal Rendezvous Routing (ORR) ProtocolCheng B, Yuksel M and Kalyanaraman S, Orthogonal rendezvous routing protocol for wireless mesh networks. Proc. IEEE Int. Conf. on Network Protocols (ICNP), 2006.

Each node can define its neighbors’ directions relative to its local North.

Relying on such information, ORR can reduce the state information for routing, and it does not need flooding for route construction.

Page 111: 4. ROUTING PROTOCOLS

111

Orthogonal Rendezvous Routing (ORR) Protocol

Compared to geographic routing, ORR does not need exact location of nodes.

Idea In 2-D Euclidean space two orthogonal lines can

have at least two intersect points with another group of two orthogonal lines,

if these two groups of orthogonal lines have different centers.

Page 112: 4. ROUTING PROTOCOLS

112

Orthogonal Rendezvous Routing (ORR) Protocol

To construct routing paths, a source node sends route discovery in orthogonal directions,

while a destination node sends route dissemination in orthogonal directions.

Thus, there is at least one intersect point, called rendezvous point

where both route discovery and route dissemination messages are received.

Page 113: 4. ROUTING PROTOCOLS

113

Orthogonal Rendezvous Routing (ORR) Protocol

In this way a routing path is established between the source and the destination

Also, routing path from the source to the rendezvous point is a reactive route and

the remaining path to the destination is a proactive route.

Page 114: 4. ROUTING PROTOCOLS

114

Shortcomings of Orthogonal Rendezvous Routing (ORR) Protocol

1. Direction of a node needs to be configured freely 2. Network is not really a 2-D space. (If a 3-D space is considered, the theory for ORR may not be valid)

3. ORR may not work if the node density is high or topology change frequently happens

4. Routing path selection procedure is based on hop-count. (However, other metrics such as link quality can be adopted to enhance the ORR).

Page 115: 4. ROUTING PROTOCOLS

115

SET 1:Hop-Count based Routing Protocols

Light Client Management Routing (LCMR) Protocol

Orthogonal Rendezvous Routing (ORR) Protocol

HEAT Protocol

Page 116: 4. ROUTING PROTOCOLS

116

HEAT ProtocolBaumann R, Lenders V, Heimlicher S and May M,HEAT: scalable routing in wireless mesh networks using temperature fields. Proc. IEEE Int. Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM), 2007

Anycast routing protocol HEAT considers all nodesin a WMN as a temperature field

– Gateways have the highest temperature

– Temperature of a non-gateway node will be determined by hop-count to the gateways and the robustness of a routing path from this node to gateways.

Page 117: 4. ROUTING PROTOCOLS

117

HEAT Protocol

Once temperatures of all nodes are determined according to this procedure, the packets from any

node to gateways can simply follow the following method:

The node forwards the packets to its neighbor with the

highest temperature, and this neighbor will repeat the

same process until reaching gateways.

Page 118: 4. ROUTING PROTOCOLS

118

Problems of HEAT Protocol

Totally depends on the assumption that the traffic of WMNs only needs to be routed between gateways and non-gateways

For other scenarios, anycast routing is not supported.

Moreover, how to consider other routing metrics in HEAT remains an open problem

Page 119: 4. ROUTING PROTOCOLS

119

OVERVIEW OF ROUTING ALGORITHMSOVERVIEW OF ROUTING ALGORITHMS

Hop-Count based Routing Link Level QoS Based Routing Interference Based Routing (IRMA) Routing with Load Balancing Routing Based on Residual Link Capacity End-to-End QoS Routing Reliability Aware Routing Joint Channel Assignment and Routing (Layer 2.5

Routing)

Page 120: 4. ROUTING PROTOCOLS

120

Set 2:Link-level QoS based Routing Algorithms

– Link quality source routing (LQSR) protocol– Multi-radio LQSR (MR-LQSR) routing

protocol- ExOR Routing Protocol– AODV-spanning tree (AODV-ST) protocol

Page 121: 4. ROUTING PROTOCOLS

121

Link Quality Source Routing (LQSR) Protocol Draves R, Padhye J and Zill B,Comparisons of routing metrics for static multi-hop wireless networks. Proc. ACM SIGCOMM, 2004.

Based on Dynamic Source Routing (DSR)

Contains all basic DSR functionalities, such as * Route Discovery (Route Request and Route Reply

messages) and

* Route Maintenance (Route Error messages).

Page 122: 4. ROUTING PROTOCOLS

122

Link Quality Source Routing (LQSR) Protocol

However, LQSR holds two major differences compared to DSR.

– LQSR is implemented as layer 2.5 protocol instead of as a network layer protocol

– LQSR supports link quality metrics.

Page 123: 4. ROUTING PROTOCOLS

123

Link Quality Source Routing (LQSR) Protocol

Layer 2.5 architecture brings two significant advantages.

– On the one hand, no modification is needed for the higher layer software,

i.e., LQSR routing protocol is transparent to higher layer software.

– Also no modification is required for link layer software.

Page 124: 4. ROUTING PROTOCOLS

124

Link Quality Source Routing (LQSR) Protocol

Performance of LQSR varies based on different routing metrics and network mobility:

– For stationary nodes in WMNs, the routing metric ETX, achieves the best

performance

Page 125: 4. ROUTING PROTOCOLS

125

Link Quality Source Routing (LQSR) Protocol

For mobile nodes:Minimum hop count method outperforms the three

link quality metrics, i.e., per-hop RTT, per-hop packet pair delay, and ETX

REASON:As the sender moves, the ETX metric cannot quickly track the changes in the link quality.

Page 126: 4. ROUTING PROTOCOLS

126

Set 2:Link-level QoS based Routing Protocols

– Link quality source routing (LQSR) protocol

–Multi-radio LQSR (MR-LQSR) routing protocol

– ExOR Routing Protocol– AODV-spanning tree (AODV-ST) protocol

Page 127: 4. ROUTING PROTOCOLS

127

Multi-Radio LQSR (MR-LQSR) Routing ProtocolDraves R, Padhye J and Zill B,“Routing in multi-radio, multi-hop wireless mesh networks”, Proc. ACM MOBICOM, 2004.

Based on LQSR, and thus, also based on DSR

Major difference from LQSR is WCETT

To make LQSR perform well in a mesh network with multiple radios per node, WCETT is used as the routing metric in the routing protocol

Page 128: 4. ROUTING PROTOCOLS

128

Multi-Radio LQSR (MR-LQSR) Routing Protocol

WCETT takes into account both link quality metric and the minimum hop-count

Achieves good tradeoff between delay and throughput

because it considers channels with good quality and channel diversity in the same routing protocol

Page 129: 4. ROUTING PROTOCOLS

129

Multi-Radio LQSR (MR-LQSR) Routing Protocol

MR-LQSR assumes nodes are stationary

This is true for mesh routers, but obviously not applicable to mesh clients

Performance of MR-LQSR can also be degraded by the mobility of nodes, i.e., mesh clients.

Page 130: 4. ROUTING PROTOCOLS

130

Multi-Radio LQSR (MR-LQSR) Routing Protocol

In WMNs, multi-channel operation over a single radio is another alternative to increase the network capacity.

But MR-LQSR is not applicable because WCETT is limited to multi-radio mode.

Page 131: 4. ROUTING PROTOCOLS

131

Set 2:Link-level QoS based Routing Protocols

– Link quality source routing (LQSR) protocol– Multi-radio LQSR (MR-LQSR) routing protocol

–ExOR Routing Protocol– AODV-spanning tree (AODV-ST) protocol

Page 132: 4. ROUTING PROTOCOLS

132132

ExOR Routing ProtocolExOR Routing ProtocolBiswas S and Morris RBiswas S and Morris R, “, “ExOR: opportunistic multihop ExOR: opportunistic multihop routing for multi-Hop wireless networksrouting for multi-Hop wireless networks,”,” iin Proc. ACM n Proc. ACM SIGCOMM, SIGCOMM, 20052005..

* Proposed to improve throughput based on * Proposed to improve throughput based on cooperative broadcasting packets from cooperative broadcasting packets from source to destination without explicitly source to destination without explicitly setting up a routing pathsetting up a routing path

Page 133: 4. ROUTING PROTOCOLS

133

Source’s behaviorSource’s behavior

Collects enough packets of the same destination to form a bCollects enough packets of the same destination to form a batchatch– ExOR operates on batches of packets for efficiencyExOR operates on batches of packets for efficiency

Selects a set of nodes to be candidate forwarders, and Selects a set of nodes to be candidate forwarders, and

includes the prioritized list in the overhead of every packetincludes the prioritized list in the overhead of every packet

Page 134: 4. ROUTING PROTOCOLS

134134

ExOR Routing ProtocolExOR Routing Protocol

* This priority of a forwarding node is * This priority of a forwarding node is determined by determined by

the cost to the destination, the cost to the destination,

which is evaluated by the accumulative ETX to which is evaluated by the accumulative ETX to the destination node. the destination node.

Page 135: 4. ROUTING PROTOCOLS

135135

ExOR Routing ProtocolExOR Routing Protocol

Set of nodes that are selected for forwarding Set of nodes that are selected for forwarding packets are determined based on the packet packets are determined based on the packet loss ratio between the source and these loss ratio between the source and these nodes. nodes.

Although many nodes can receive packets Although many nodes can receive packets from the source node, only a subset of nodes from the source node, only a subset of nodes are selected as forwarding nodesare selected as forwarding nodes

in order to reduce the overhead.in order to reduce the overhead.

Page 136: 4. ROUTING PROTOCOLS

136

Forwarders’ BehaviorForwarders’ Behavior

How can a node know whether it is one of the How can a node know whether it is one of the forwarders or not?forwarders or not?

Check the forwarder list in the overhead of Check the forwarder list in the overhead of the received packetthe received packet– If the node finds itself in the list, buffer the If the node finds itself in the list, buffer the

packet and keep state of this batchpacket and keep state of this batch– If no, discard the packetIf no, discard the packet

Page 137: 4. ROUTING PROTOCOLS

137137

Forwarder’s BehaviorForwarder’s Behavior

Highest priority forwarding node sends its own Highest priority forwarding node sends its own batch of packets following the same procedure as batch of packets following the same procedure as done by the source node. done by the source node.

This process is repeated until 90% of packets in This process is repeated until 90% of packets in each batch are received by the destination node. each batch are received by the destination node.

The remaining 10% of nodes will rely on traditional The remaining 10% of nodes will rely on traditional minimum hop-count routing to deliver. minimum hop-count routing to deliver.

Page 138: 4. ROUTING PROTOCOLS

138

Forwarders’ BehaviorForwarders’ Behavior

How can a node know whether the packet it receives How can a node know whether the packet it receives has also been received by a node with higher priority has also been received by a node with higher priority or not?or not?

ExOR designs a “batch map” to record, for every paExOR designs a “batch map” to record, for every packet in the batch, the highest-priority node known to cket in the batch, the highest-priority node known to have received that packet.have received that packet.

Page 139: 4. ROUTING PROTOCOLS

139139

Advantages of ExOR Routing Advantages of ExOR Routing ProtocolProtocol

Most of packets are delivered without setting up Most of packets are delivered without setting up routing routing

paths, which is similar to anycast routing. paths, which is similar to anycast routing.

Moreover, ExOR can improve throughput for two Moreover, ExOR can improve throughput for two reasons. reasons. – It tries to use the best link to deliver packets through It tries to use the best link to deliver packets through cooperation of forwarding nodes. cooperation of forwarding nodes.

– Progress of packet forwarding can be continued even if Progress of packet forwarding can be continued even if some nodes some nodes

on a traditional path experiences bad link quality or out of on a traditional path experiences bad link quality or out of order. order.

Page 140: 4. ROUTING PROTOCOLS

140

Set 2:Link-level QoS based Routing Protocols

– Link quality source routing (LQSR) protocol– Multi-radio LQSR (MR-LQSR) routing protocol

–ExOR Routing Protocol–AODV-spanning tree (AODV-ST) protocol

Page 141: 4. ROUTING PROTOCOLS

141

AODV-Spanning Tree (AODV-ST) ProtocolRamachandran K, Buddhikot MM, Chandranmenon G, Miller S, Almeroth K and Belding-Royer E,On the design and implementation of infrastructure mesh networks. Proc. IEEE WIMESH, 2005.

AODV ST is designed for multi-radio WMNs

ADOV-ST performs hybrid routing, i.e., for traffic inside the mesh network AODV is

used

where the spanning-tree based routing is used for traffic to/from gateways.

ETT is used as the routing metric

Page 142: 4. ROUTING PROTOCOLS

142

Drawbacks of AODV-Spanning Tree (AODV-ST) Protocol

AODV may not be efficient for intra-mesh traffic

The WCETT proposed for multi-radio WMNs is not applicable,

because AODV is a distance vector routing protocol

Page 143: 4. ROUTING PROTOCOLS

143

OVERVIEW OF ROUTING ALGORITHMSOVERVIEW OF ROUTING ALGORITHMS

Hop-Count based Routing Link Level QoS Based Routing Interference Based Routing (IRMA) Routing with Load Balancing Routing Based on Residual Link Capacity End-to-End QoS Routing Reliability Aware Routing Joint Channel Assignment and Routing (Layer 2.5

Routing)

Page 144: 4. ROUTING PROTOCOLS

144

TDMA instead of CSMA/CA as MAC

Based on the TDMA, an integrated routing and MAC scheduling algorithm (IRMA) is derived to find a routing path for each traffic flow

then determine slot allocation on each link considering

* BW allocation information * Link status, and * Topology information in the network.

Set 3:Interference Based Routing: IRMAWu Z, Ganu S and Raychaudhuri D, IRMA: integrated routing and MAC scheduling in multihopwireless mesh networks. Proc. IEEE WiMesh, 2006.

Page 145: 4. ROUTING PROTOCOLS

145

A centralized scheme

Relies on an existing solution to collect the node, link, and topology related information of the entire network and get traffic specifications of traffic flows.

Such signaling can be done in a global control plane (GCP) that can be implemented in a separate dedicated channel or a dedicated time slot

Interference based Routing: IRMA

Page 146: 4. ROUTING PROTOCOLS

146

Two routing mechanisms defined in IRMA:

– link scheduling with minimum-hop routing– link scheduling with bandwidth-aware routing

(preferred)

Interference based Routing: IRMA

Page 147: 4. ROUTING PROTOCOLS

147

Interference Based Routing: IRMALink Scheduling with Minimum-Hop Routing

A routing path is selected by shortest path using minimum hop-count.

Then time slots along this path are determined by the centralized algorithm by considering the latest flow information in the network.

may result in congested paths or links as the minimum hop-

count routing does not consider the available BW.

Page 148: 4. ROUTING PROTOCOLS

148

Interference Based Routing: IRMALink Scheduling with bandwidth-aware Routing

Available BW on each link is factored when a routing path is selected.

Based on the selection, time slots are then determined for each link on the path.

Thus, such a scheme can not only avoid contentions in traffic flows but can also avoid bottleneck or congested links.

Page 149: 4. ROUTING PROTOCOLS

149

Shortcomings of Interference Based Routing: IRMA

1. Not scalable with the network size (a centralized scheme)

2. Assumes an efficient scheme to collect all control information,

which is a challenging issue for all routing protocols.

3. MAC layer is assumed to have TDMA operation, which is not the

case for many WMNs.

Page 150: 4. ROUTING PROTOCOLS

150

OVERVIEW OF ROUTING ALGORITHMSOVERVIEW OF ROUTING ALGORITHMS

Hop-Count based Routing Link Level QoS Based Routing Interference Based Routing (IRMA) Routing with Load Balancing Routing Based on Residual Link Capacity End-to-End QoS Routing Reliability Aware Routing Scalable Routing Joint Channel Assignment and Routing (Layer 2.5

Routing)

Page 151: 4. ROUTING PROTOCOLS

151

Set 4:Routing with Load BalancingSong W and Fang X ,”Routing with congestion control and load balancing in wireless mesh networks,’Proc. Int. Conference on ITS Telecommunications, 2006

Routing is directly determined by considering network congestion

Given a source and its destination, a routing path is determined by using the route with the least congestion

If more than one paths have the same number of congested nodes, the route with minimum hop-count is selected

Congestion state of a link is determined by the number of retransmissions of RTS and ACK packets.

If the congestion exceeds a threshold, the congestion weight on this link increases

Page 152: 4. ROUTING PROTOCOLS

152

Routing with Load Balancing: CARLiu T and Liao W,Capacity-aware routing in multi-channel multi-rate wireless mesh networks. Proc. IEEE ICC, 2006.

A capacity-aware routing (CAR) protocol is proposed to balance load among links and channels in a multi-radio WMN

CAR assumes channel assignment on radios lasts long time and can be static.

With static channels on each radio in the network, CAR determines the BLC in a reactive manner for each traffic flow.

Page 153: 4. ROUTING PROTOCOLS

153

Routing with Load Balancing: CAR

Transmissions start on a routing path that is determined according to the best BLC metric.

However, this path can be switched to a new one if the source finds the new path has a higher BLC value.

Page 154: 4. ROUTING PROTOCOLS

154

Routing with Load Balancing: CAR

Due to the bottlenecked link capacity in routing, CAR improves throughput and delay performance.

CAR may not achieve optimal performance because the path selection on different flows affect each other but is not coordinated among such flows.

Page 155: 4. ROUTING PROTOCOLS

155

OVERVIEW OF ROUTING ALGORITHMSOVERVIEW OF ROUTING ALGORITHMS

Hop-Count based Routing Link Level QoS Based Routing Interference Based Routing (IRMA) Routing with Load Balancing Routing Based on Residual Link

Capacity End-to-End QoS Routing Reliability Aware Routing Scalable Routing Joint Channel Assignment and Routing (Layer 2.5

Routing)

Page 156: 4. ROUTING PROTOCOLS

156

Set 5:Routing Based on Residual Link CapacityRaniwala A, Gopalan K and Chiueh T ,”Centralized channel assignment and routing algorithms formulti-channel wireless mesh networks,” ACM Mobile Computing and Communications Review, 2005.

An alternative scheme to consider link capacity in routing is to get the information of residual link capacity

A protocol called Hyacinth is developed to perform routing and channel assignment for a multi-channel WMN.

Page 157: 4. ROUTING PROTOCOLS

157

Routing Based on Residual Link Capacity

Hyacinth considers traffic from/to gateways in WMNs and thus uses tree-based routing for such traffic.

Each node advertises its costs of its path from/to the gateway

Based on such information, a neighbor that finds a lower value in the cost will leave its old parent node and selects the new node as the new parent node.

Page 158: 4. ROUTING PROTOCOLS

158

Routing Based on Residual Link Capacity

With such a procedure, all nodes in the network build up routing paths to the gateway like a spanning tree

To reflect the cost of a path, residual capacity of a link the routing metric.

Links are selected which have the largest available capacity

Page 159: 4. ROUTING PROTOCOLS

159

OVERVIEW OF ROUTING ALGORITHMSOVERVIEW OF ROUTING ALGORITHMS

Hop-Count based Routing Link Level QoS Based Routing Interference Based Routing (IRMA) Routing with Load Balancing Routing Based on Residual Link Capacity End-to-End QoS Routing Reliability Aware Routing Scalable Routing Joint Channel Assignment and Routing (Layer 2.5

Routing)

Page 160: 4. ROUTING PROTOCOLS

160

Set 6:End-to-End QoS Routing

Quality Aware Routing Protocol Ring Mesh Routing Protocol

Page 161: 4. ROUTING PROTOCOLS

161

Quality Aware Routing ProtocolKoksal CE and Balakrishnan H,”Quality-aware routing metrics for time-varying wireless mesh networks,”IEEE Journal on Selected Areas in Communications, 2006.

End-to-end QoS can be considered in a routing protocol by ensuring end-to-end packet loss rate, delay, or bandwidth.

End-to-end packet loss rate is ensured where both ETX and ENT are used as routing metrics

ENT is used to determine what routing paths can be used

Page 162: 4. ROUTING PROTOCOLS

162

Quality Aware Routing Protocol

−Allowed packet loss rate in a link is given

−Based on this packet loss threshold and the measurement of the

link, a positive number δ used by ENT is derived.

−With δ and an existing probe scheme, ENT of each link is determined.

Page 163: 4. ROUTING PROTOCOLS

163

Quality Aware Routing Protocol

−ENT is then compared with the maximum number of transmissions of a packet before it is discarded at the link layer

−If ENT is larger than the link-layer value, the routing cost of the link will become ∞

−Otherwise, ETX is used for the routing cost of the link

Page 164: 4. ROUTING PROTOCOLS

164

Quality Aware Routing Protocol

−As a result, all links that do not satisfy packet loss requirement will be excluded from routing paths

−After this step, routing path selection is performed by just choosing a path with smallest routing cost

One critical issue: How to determine the allowed packet loss rate of a link given the threshold of end-to-end packet loss

requirement?

Page 165: 4. ROUTING PROTOCOLS

165

Set 6:End-to-End QoS Routing

Quality Aware Routing Protocol Ring Mesh Routing Protocol

Page 166: 4. ROUTING PROTOCOLS

166

RingMesh Routing ProtocolLin D, Moh T and Moh M ,”A delay-bounded multi-channel routing protocol for wireless mesh networks using multiple token rings: extended summary,”Proc. 31st IEEE Conference on Local Computer Networks (LCN), 2006.

End-to-end delay

RingMesh is developed based on a token ring protocol proposed for wireless LANs

Page 167: 4. ROUTING PROTOCOLS

167

RingMesh Routing Protocol

Multiple token rings are created and organized from the gateway to all other nodes like a spanning tree scheme

Different channels are used in neighboring rings

First ring containing the gateway is called a root ring

Next ring connected to the root ring is a child ring.

Page 168: 4. ROUTING PROTOCOLS

168

RingMesh Routing Protocol

These two rings share a common node which is called a pseudo gateway

Following this process, other child rings are connected together all the way to the root ring

For a node in the network, which ring it can join depends on the delay from it to the gateway:

the node joins a ring that can satisfy the end-to-end delay requirement.

Page 169: 4. ROUTING PROTOCOLS

169

Shortcomings of RingMesh Routing Protocol

−How to form multiple rings to support multiple gateways to improve the delay performance is not addressed?

−It is also unknown what happens if no ring can be joined by a node

−No mechanism is also available to determine the delay from a node to the gateway, which is not a trivial task

−Thus, end-to-end delay aware routing is still a challenging research topic

Page 170: 4. ROUTING PROTOCOLS

170

OVERVIEW OF ROUTING ALGORITHMSOVERVIEW OF ROUTING ALGORITHMS

Hop-Count based Routing Link Level QoS Based Routing Interference Based Routing (IRMA) Routing with Load Balancing Routing Based on Residual Link Capacity End-to-End QoS Routing Reliability Aware Routing Scalable Routing Joint Channel Assignment and Routing (Layer 2.5

Routing)

Page 171: 4. ROUTING PROTOCOLS

171

Set 7:Resilient Opportunistic Mesh Routing (ROMER) ProtocolYuan Y, Yang H,Wong SHY, Lu S and Arbaugh W,”ROMER: resilient opportunistic mesh routing for wireless mesh networks,”Proc. IEEE WIMESH, 2005

ROMER creates forwarding mesh on the fly for each packet

ROMER assumes that there is an existing scheme that can find the minimum cost from each mesh router to the gateway

Then the credit is determined while a packet is forwarded on the fly

Page 172: 4. ROUTING PROTOCOLS

172

Resilient Opportunistic Mesh Routing (ROMER) protocol

When a packet is to be delivered from a mesh router, e.g., Node S, to the gateway, the source mesh router needs to set a credit cost.

If the minimum cost from S to the gateway is Cmin,S and the credit cost is Ccredit,S,

then S has a budget cost of Cmin,S + Ccredit,S to the gateway.

When the packet is sent to the next mesh router, e.g., node A, the budget is reduced by the cost of the traversed link clinkSA

Page 173: 4. ROUTING PROTOCOLS

173

Resilient Opportunistic Mesh Routing (ROMER) protocol

At mesh router A, the needed credit is computed according to the requirement of

Ccredit,A + Cmin,A + ClinkSA <= Cmin,S + Ccredit,S,

i.e., the remaining credit at mesh router A is Ccredit,A = Cmin,S + Ccredit,S − Cmin,A − ClinkSA.

If the ratio of the remaining credit over the initial credit Ccredit,S is less than a threshold, e.g., (Cmin,A / Cmin,S)2

, then the packet at mesh router A shall be discarded;

Page 174: 4. ROUTING PROTOCOLS

174

Resilient Opportunistic Mesh Routing (ROMER) protocol

Otherwise, mesh router A forwards the packet according to a randomized opportunistic forwarding scheme.

The above process is repeated until the packet is delivered to the gateway

Page 175: 4. ROUTING PROTOCOLS

175

Resilient Opportunistic Mesh Routing (ROMER) protocol

Finally, when multiple intermediate routers receive the same packet from a mesh router and

all have enough credit to forward the packet,

they need to follow a randomized opportunistic forwarding scheme to forward packets.

Page 176: 4. ROUTING PROTOCOLS

176

Probability that each intermediate router can forward a packet depends on the quality of the link to the parent router

Resilient Opportunistic Mesh Routing (ROMER) protocol

Page 177: 4. ROUTING PROTOCOLS

177

Intermediate router with the best link quality forwards the packet with probability 1,

while other intermediate routers forward the packet with a probability of (Rl / Rmax),

where Rl is the current rate of the considered link and Rmax is the current rate at the best link.

Resilient Opportunistic Mesh Routing (ROMER) protocol

Page 178: 4. ROUTING PROTOCOLS

178

ROMER has to rely on an existing scheme to find out the minimum cost from each mesh router to the gateway

What type of cost is the best for ROMER and how to dynamically update the cost to best serve ROMER remain open questions !

Drawbacks of Resilient Opportunistic Mesh Routing (ROMER) Protocol

Page 179: 4. ROUTING PROTOCOLS

179

OVERVIEW OF ROUTING ALGORITHMSOVERVIEW OF ROUTING ALGORITHMS

Hop-Count based Routing Link Level QoS Based Routing Interference Based Routing (IRMA) Routing with Load Balancing Routing Based on Residual Link Capacity End-to-End QoS Routing Reliability Aware Routing Joint Channel Assignment and Routing

(Layer 2.5 Routing)

Page 180: 4. ROUTING PROTOCOLS

180

Multichannel Protocols

Multi-channel operation is widely adopted in WMNs Multi-channel operation is widely adopted in WMNs to improve network capacityto improve network capacity

Single-channel routing protocols may be run in each Single-channel routing protocols may be run in each of the of the

channels of the WMNchannels of the WMN– Easy design but not optimal, and does not guarantee availability of spectrum in the routes

Multi-channel routing protocols are better suitedMulti-channel routing protocols are better suited

Page 181: 4. ROUTING PROTOCOLS

181

Multichannel Protocols

Two types of multi-channel routing protocolsTwo types of multi-channel routing protocols

–Type 1: Consider the impact of multi-channel operation such as link quality, interference, packet loss, bandwidth

–Type 2: Conduct close routing/MAC cross-layer design such as joint channel allocation and routing

Page 182: 4. ROUTING PROTOCOLS

182

Multichannel Protocols

Most existing protocols are of type 1Most existing protocols are of type 1

– As an example, in MQ-LSR ignores the close relationship between traffic distribution and channel allocation by assuming different radios are assigned non-overlapping channels

– It also incorrectly assumes that the channel assignment changes relatively infrequent, leading to the necessity of joint channel-route assignment

Page 183: 4. ROUTING PROTOCOLS

183183

Joint Channel Assignment and Joint Channel Assignment and RoutingRoutingAlicherry M, Bhatia R and Li LAlicherry M, Bhatia R and Li L, , ““Joint channel assignment and Joint channel assignment and routing for throughput optimization in multi-radio wireless routing for throughput optimization in multi-radio wireless mesh networksmesh networks,”,” iin Proc. ACM MobiComn Proc. ACM MobiCom, 2005, 2005

For infrastructure WMNs (IWMNs)For infrastructure WMNs (IWMNs)

Assumption:Assumption:

Aggregated traffic load at mesh routers and channels assigned Aggregated traffic load at mesh routers and channels assigned to to

each router is not changing frequentlyeach router is not changing frequently

Channels assigned to radios on a node are determined Channels assigned to radios on a node are determined together with routing paths together with routing paths

with an objective to with an objective to obtain interference-free link schedule and obtain interference-free link schedule and achieve maximum throughputachieve maximum throughput..

Page 184: 4. ROUTING PROTOCOLS

184184

Joint Channel Assignment and Joint Channel Assignment and RoutingRoutingTang J, Xue G and Zhang WTang J, Xue G and Zhang W, , ““Interference-aware topology Interference-aware topology control control and QoS routing in multichannel wireless mesh networksand QoS routing in multichannel wireless mesh networks,”,” ACM MobiHocACM MobiHoc, 2005., 2005.

Assumes the channel assignment can be static in Assumes the channel assignment can be static in WMNsWMNs

Goal:Goal: mathematical formulation of the joint design mathematical formulation of the joint design between between

channel assignment and routingchannel assignment and routing

However, no actual protocol is proposedHowever, no actual protocol is proposed

Page 185: 4. ROUTING PROTOCOLS

185185

Distributed Joint Channel and Routing Distributed Joint Channel and Routing ProtocolProtocolAvallone S and Akyildiz, IF and Ventre GAvallone S and Akyildiz, IF and Ventre G, , ““A channel and rate A channel and rate assignment algorithm and a layer-2.5 assignment algorithm and a layer-2.5 forwarding paradigm for forwarding paradigm for multi-radio wireless mesh neetworks,multi-radio wireless mesh neetworks,”” IEEE/ACM Transactions on IEEE/ACM Transactions on Networking, Networking, 20092009

It takes into account the It takes into account the number of flows number of flows that are possible to route on each linkthat are possible to route on each link

Amount of flows is obtained from a solution Amount of flows is obtained from a solution

to the joint channel assignment and routing to the joint channel assignment and routing problemproblem

Page 186: 4. ROUTING PROTOCOLS

186186

Distributed Joint Channel and Routing Distributed Joint Channel and Routing ProtocolProtocol

Objective Objective Enable every router to utilize each of its links in Enable every router to utilize each of its links in

proportion to their assigned flow ratesproportion to their assigned flow rates

Routing protocol only requires a Routing protocol only requires a partial knowledge partial knowledge of the network topology and does not make use of of the network topology and does not make use of a destination-based routing tablea destination-based routing table

Hence, the name Hence, the name Layer-2.5 (L2.5) Layer-2.5 (L2.5) given to the given to the

routing protocol.routing protocol.

Page 187: 4. ROUTING PROTOCOLS

187

Layer-2.5 Routing AlgorithmLayer-2.5 Routing Algorithm

Each mesh router is configured with the set of pre-Each mesh router is configured with the set of pre-

computed flow rates associated with its linkscomputed flow rates associated with its links Packets are Packets are forwardedforwarded using such information (rather using such information (rather

than than routedrouted using routing tables) using routing tables)– Layer-2 information are used, hence the nameLayer-2 information are used, hence the name

Each mesh router attempts to keep the utilization of Each mesh router attempts to keep the utilization of

the outgoing links proportional to their pre-computed the outgoing links proportional to their pre-computed

flow ratesflow rates

Page 188: 4. ROUTING PROTOCOLS

188

Channel Assignment & RoutingChannel Assignment & Routing

* An approximate solution:* An approximate solution: Determine pre-computed flow ratesDetermine pre-computed flow ratesA pre-computed flow rate is determined for every link based on theA pre-computed flow rate is determined for every link based on thegiven optimization objectivegiven optimization objective

Determine the channel assignmentDetermine the channel assignmentChannels are assigned to radios in the attempt to make such Channels are assigned to radios in the attempt to make such pre-computed flow rates schedulablepre-computed flow rates schedulable

Adjust the pre-computed flow ratesAdjust the pre-computed flow ratesThe pre-computed flow rates may be adjusted in order to obtain a The pre-computed flow rates may be adjusted in order to obtain a

setset

of schedulable flow rates given the computed channel assignmentof schedulable flow rates given the computed channel assignment

Page 189: 4. ROUTING PROTOCOLS

189189

Open Research IssuesOpen Research Issues

Performance BenchmarkPerformance Benchmark – Large number of routing metrics and routing protocols Large number of routing metrics and routing protocols

available for WMNs. available for WMNs.

– Considering routing protocols for other multi-hop wireless Considering routing protocols for other multi-hop wireless networks, the number is much bigger networks, the number is much bigger

– Confusion about which routing metric and what type of Confusion about which routing metric and what type of routing protocols can provide the best performance => routing protocols can provide the best performance => benchmark to investigate and compare different routing benchmark to investigate and compare different routing metrics and protocols. metrics and protocols.

Page 190: 4. ROUTING PROTOCOLS

190190

Open Research IssuesOpen Research Issues

– It is expected to include theoretical analysis of performance It is expected to include theoretical analysis of performance bound, practical consideration of protocol design, and bound, practical consideration of protocol design, and performance evaluation either through simulations or testbeds.performance evaluation either through simulations or testbeds. In [1], a comparative study is carried out for different routing strategies for In [1], a comparative study is carried out for different routing strategies for

WMNs. WMNs. Some design guidelines are provided in Some design guidelines are provided in [2][2] for multihop wireless networks. for multihop wireless networks. However, such work is still far from providing a benchmark of selecting However, such work is still far from providing a benchmark of selecting

routing metrics and protocols.routing metrics and protocols.

[1] Wellons J, Dai L, Xue Y and Cui Y[1] Wellons J, Dai L, Xue Y and Cui Y, , ““Predictive or oblivious: a comparative study of Routing strategies for Predictive or oblivious: a comparative study of Routing strategies for wireless mesh networks under uncertain demandwireless mesh networks under uncertain demand,"," Proc. IEEE SECON Proc. IEEE SECON, 2008, 2008

[2] Yang Y and Wang J[2] Yang Y and Wang J, , ““Design guidelines for routing metrics in multihop wireless networksDesign guidelines for routing metrics in multihop wireless networks,”,”

PProc. roc. IEEE INFOCOMIEEE INFOCOM, 2008., 2008.

Page 191: 4. ROUTING PROTOCOLS

191191

Open Research IssuesOpen Research Issues

New routing metricsNew routing metrics– How to integrate multiple routing metrics into the How to integrate multiple routing metrics into the

same routing protocol is another challenging issue. same routing protocol is another challenging issue.

Page 192: 4. ROUTING PROTOCOLS

192192

Open Research IssuesOpen Research Issues

Scalable routingScalable routing – This is a This is a critical requirement critical requirement by WMNs, achieved by few by WMNs, achieved by few

routing protocols so far. routing protocols so far. – Hierarchical routing Hierarchical routing protocols can only partially solve this protocols can only partially solve this

problem due to their complexity and difficulty of problem due to their complexity and difficulty of management.management.

– Geographic routingGeographic routing needs GPS or similar needs GPS or similar cost, cost, complexitycomplexity. . Additional traffic by inquiry of destination position. Additional traffic by inquiry of destination position.

– Scalability is also related to MAC protocols. Thus, an eventual Scalability is also related to MAC protocols. Thus, an eventual scalable routing protocol must be closely integrated with the scalable routing protocol must be closely integrated with the MAC protocol.MAC protocol.

Page 193: 4. ROUTING PROTOCOLS

193193

Open Research IssuesOpen Research Issues

Network coding and routingNetwork coding and routing– Can potentially improve the performance of WMNsCan potentially improve the performance of WMNs E.g., research to apply network coding to WMNs [1], [2],E.g., research to apply network coding to WMNs [1], [2], Benefits of network coding to a multichannel WMN in [2]Benefits of network coding to a multichannel WMN in [2]– However, as network coding is still in an early phase of being However, as network coding is still in an early phase of being

applicable to a practical networking protocol, integrating applicable to a practical networking protocol, integrating network coding with routing is still a new and challenging network coding with routing is still a new and challenging research directionresearch direction

[1] Omiwade O, Zheng R and Hua C[1] Omiwade O, Zheng R and Hua C, , ““Practical localized network coding in wireless mesh networksPractical localized network coding in wireless mesh networks,”,” Proc. of IEEE SECONProc. of IEEE SECON, 2008, 2008

[2] Zhang X and Li B[2] Zhang X and Li B, , ““On the benefits of network coding in multi-channel wireless networksOn the benefits of network coding in multi-channel wireless networks,”,” Proc. of IEEE SECONProc. of IEEE SECON, 2008, 2008