16
Complexity and design of QoS routing algorithms in wireless mesh networks Bahador Bakhshi , Siavash Khorsandi Computer Engineering and Information Technology Department, Amirkabir University of Technology, Hafez Avenue, Tehran, Iran article info Article history: Received 7 February 2010 Received in revised form 19 March 2011 Accepted 22 March 2011 Available online 30 March 2011 Keywords: Wireless mesh networks Bandwidth constrained routing NP-complete Routing metric Integer linear programming abstract Quality of service (QoS) provisioning in wireless mesh networks (WMNs) is an open issue to support emerging multimedia services. In this paper, we study the problem of QoS provisioning in terms of end-to-end bandwidth allocation in WMNs. It is challenging due to interferences in the networks. We consider widely used interference models and show that except a few special cases, the problem of find- ing a feasible path is NP-complete under the models. We propose a k-shortest path based algorithmic framework to solve this problem. We also consider the problem of optimizing network performance by on-line dynamic routing, and adapt commonly used conventional QoS routing metrics to be used in WMNs. We find the optimal solutions for these problems through formulating them as optimization models. A model is developed to check the existence of a feasible path and another to find the optimal path for a demand; moreover, an on-line optimal QoS routing algorithm is developed. Comparing the algorithms implemented by the proposed framework with the optimization models shows that our solu- tion can find existing feasible paths with high probability, efficiently optimizes path lengths, and has a comparable performance to the optimal QoS routing algorithm. Furthermore, our results show that con- trary to wireline networks, minimizing resource consumption should be preferred over load distribution even in lightly loaded WMNs. Ó 2011 Elsevier B.V. All rights reserved. 1. Introduction Wireless mesh networking is a promising technology for future multi-hop wireless access networks. The most distinguishing fea- ture of WMNs is the static multi-hop wireless backbone of the net- works compared to other wireless networks. WMNs can act as the last-mile in Internet service provider networks, where multimedia services are an integral ingredient of the networks. Multimedia services need end-to-end QoS support. It is often defined in terms of bandwidth, delay, and delay jitter. However, it is argued that bandwidth allocation is the main QoS requirement since it controls delay and jitter as well [1]. The problem of end-to-end bandwidth allocation is, in fact, twofold. First, to accept a given traffic demand with a bandwidth requirement, the bandwidth constrained routing algorithm should find a path with sufficient end-to-end band- width, which is called feasible path. Second, network resources should be utilized efficiently to avoid congestions and effective load distribution throughout the network to maximize network performance. Bandwidth constrained routing is a long standing problem in the networking literature. It has been extensively studied in both wireline and wireless networks [1–18]. Previous studies in wireline networks mostly focused on the efficient network utilization as- pect because feasible paths in these networks are simply found using the network pruning technique [2–6]. These solutions cannot be directly applied for WMNs since they do not consider interfer- ence, which is a fundamental issue in multi-hop wireless networks. In wireline networks, a flow routed through a path consumes only the bandwidth of the links in the path. However, in WMNs, each flow consumes bandwidth of all the links in the interference range of the path. The exact bandwidth consumption by a flow is deter- mined by the interference pattern that specifies the links interfere with each other. The studies on the bandwidth constrained routing problem in wireless networks mainly have considered the problem of finding feasible paths. Most the proposed solutions are variations of flood- ing-based algorithms [1,7–16]. These solutions are not efficient in WMNs because the significant overhead of the flooding-based algo- rithms is tolerable only in highly dynamic networks, which is not the case in WMNs. Recently, a few link-state like (and centralized) algorithms have been proposed [17–19]. The major shortcoming of the existing studies is that they do not consider the complexity of bandwidth consumption and its relation to the interference pat- tern, and usually use (over) simplified interference models. The algorithmic aspects of the bandwidth constrained routing problem, e.g., complexity of finding a feasible path and the effect of the system models on the complexity, in general WMNs have not yet been studied in the literature. Most of the previous work 0140-3664/$ - see front matter Ó 2011 Elsevier B.V. All rights reserved. doi:10.1016/j.comcom.2011.03.012 Corresponding author. Tel.: +98 9144230468. E-mail addresses: [email protected] (B. Bakhshi), [email protected] (S. Khorsandi). Computer Communications 34 (2011) 1722–1737 Contents lists available at ScienceDirect Computer Communications journal homepage: www.elsevier.com/locate/comcom

Complexity and design of QoS routing algorithms in wireless mesh networks

Embed Size (px)

Citation preview

Page 1: Complexity and design of QoS routing algorithms in wireless mesh networks

Computer Communications 34 (2011) 1722–1737

Contents lists available at ScienceDirect

Computer Communications

journal homepage: www.elsevier .com/ locate/comcom

Complexity and design of QoS routing algorithms in wireless mesh networks

Bahador Bakhshi ⇑, Siavash KhorsandiComputer Engineering and Information Technology Department, Amirkabir University of Technology, Hafez Avenue, Tehran, Iran

a r t i c l e i n f o

Article history:Received 7 February 2010Received in revised form 19 March 2011Accepted 22 March 2011Available online 30 March 2011

Keywords:Wireless mesh networksBandwidth constrained routingNP-completeRouting metricInteger linear programming

0140-3664/$ - see front matter � 2011 Elsevier B.V. Adoi:10.1016/j.comcom.2011.03.012

⇑ Corresponding author. Tel.: +98 9144230468.E-mail addresses: [email protected] (B. Bakhshi),

(S. Khorsandi).

a b s t r a c t

Quality of service (QoS) provisioning in wireless mesh networks (WMNs) is an open issue to supportemerging multimedia services. In this paper, we study the problem of QoS provisioning in terms ofend-to-end bandwidth allocation in WMNs. It is challenging due to interferences in the networks. Weconsider widely used interference models and show that except a few special cases, the problem of find-ing a feasible path is NP-complete under the models. We propose a k-shortest path based algorithmicframework to solve this problem. We also consider the problem of optimizing network performanceby on-line dynamic routing, and adapt commonly used conventional QoS routing metrics to be used inWMNs. We find the optimal solutions for these problems through formulating them as optimizationmodels. A model is developed to check the existence of a feasible path and another to find the optimalpath for a demand; moreover, an on-line optimal QoS routing algorithm is developed. Comparing thealgorithms implemented by the proposed framework with the optimization models shows that our solu-tion can find existing feasible paths with high probability, efficiently optimizes path lengths, and has acomparable performance to the optimal QoS routing algorithm. Furthermore, our results show that con-trary to wireline networks, minimizing resource consumption should be preferred over load distributioneven in lightly loaded WMNs.

� 2011 Elsevier B.V. All rights reserved.

1. Introduction

Wireless mesh networking is a promising technology for futuremulti-hop wireless access networks. The most distinguishing fea-ture of WMNs is the static multi-hop wireless backbone of the net-works compared to other wireless networks. WMNs can act as thelast-mile in Internet service provider networks, where multimediaservices are an integral ingredient of the networks. Multimediaservices need end-to-end QoS support. It is often defined in termsof bandwidth, delay, and delay jitter. However, it is argued thatbandwidth allocation is the main QoS requirement since it controlsdelay and jitter as well [1]. The problem of end-to-end bandwidthallocation is, in fact, twofold. First, to accept a given traffic demandwith a bandwidth requirement, the bandwidth constrained routingalgorithm should find a path with sufficient end-to-end band-width, which is called feasible path. Second, network resourcesshould be utilized efficiently to avoid congestions and effectiveload distribution throughout the network to maximize networkperformance.

Bandwidth constrained routing is a long standing problem inthe networking literature. It has been extensively studied in bothwireline and wireless networks [1–18]. Previous studies in wireline

ll rights reserved.

[email protected]

networks mostly focused on the efficient network utilization as-pect because feasible paths in these networks are simply foundusing the network pruning technique [2–6]. These solutions cannotbe directly applied for WMNs since they do not consider interfer-ence, which is a fundamental issue in multi-hop wireless networks.In wireline networks, a flow routed through a path consumes onlythe bandwidth of the links in the path. However, in WMNs, eachflow consumes bandwidth of all the links in the interference rangeof the path. The exact bandwidth consumption by a flow is deter-mined by the interference pattern that specifies the links interferewith each other.

The studies on the bandwidth constrained routing problem inwireless networks mainly have considered the problem of findingfeasible paths. Most the proposed solutions are variations of flood-ing-based algorithms [1,7–16]. These solutions are not efficient inWMNs because the significant overhead of the flooding-based algo-rithms is tolerable only in highly dynamic networks, which is notthe case in WMNs. Recently, a few link-state like (and centralized)algorithms have been proposed [17–19]. The major shortcoming ofthe existing studies is that they do not consider the complexity ofbandwidth consumption and its relation to the interference pat-tern, and usually use (over) simplified interference models.

The algorithmic aspects of the bandwidth constrained routingproblem, e.g., complexity of finding a feasible path and the effectof the system models on the complexity, in general WMNs havenot yet been studied in the literature. Most of the previous work

Page 2: Complexity and design of QoS routing algorithms in wireless mesh networks

B. Bakhshi, S. Khorsandi / Computer Communications 34 (2011) 1722–1737 1723

has not considered these complexities and only proposed ad hocheuristic solutions rather than a systematic approach to solve theproblem. Moreover, none of the previous studies have providedevaluations of the ability of their proposed solutions to deal withthe complexities.

In this paper, we study the algorithmic aspects of the QoS rout-ing problem, where the QoS requirement is described in terms ofend-to-end bandwidth. We consider general multi-rate conten-tion-based WMNs, which can be either single-channel or multi-channel. It is assumed that the pattern of interferences is static,specified by an interference model, and is given. Another assump-tion is that the network is deployed in a rural area, in which thebehavior of the links is stable and predictable as shown in [20].We consider the WMN as a part of an Internet service provider net-work. Hence, the network is managed, and routing and resourceallocation algorithms are parts of the centralized network manage-ment tool. It is supposed that a fairly accurate and complete viewof the network is available to the algorithms. Traffic demands ar-rive in an on-line fashion; so, no prior knowledge of future de-mands is available. When a new demand arrives, there are someexisting flows in the network; the objective is to find a feasiblepath for the demand. It is a path that bandwidth consumption bythe demand through it does not violate the guaranteed bandwidthof the existing flows. Moreover, we need to distribute the load inthe network through optimizing the feasible paths to boost net-work performance. Our contributions to the problem are asfollows:

� We analyze the complexity of the bandwidth constrained rout-ing problem under widely used interference models. We iden-tify special situations in which the problem of finding afeasible path is polynomially solvable, and prove its intractabil-ity in general cases.� Based on systematic investigations of the complexity analysis

results, we propose the adjustable constrained routing algorith-mic framework (ACRAF). It is composed of the k-shortest pathalgorithm, a selector function, and hop-by-hop call admissioncontrol.� We consider different routing metrics traditionally used for QoS

routing, and adapt them for the bandwidth constrained routingin WMNs. It yields six routing algorithms, which are imple-mented through setting the parameters of ACRAF.� We develop optimization models to check the existence of a

feasible path for a given demand and find the minimum lengthfeasible path for it. Furthermore, we develop an on-line optimalQoS routing algorithm. These are used as benchmarks to evalu-ate the performance of ACRAF.

The rest of the paper is organized as follows. We present anoverview of the related work and the differences between ourwork and the previous studies in Section 2. In Section 3, afterdescribing the needed models, we formulate the problem. In Sec-tion 4, we analyze the complexity of the bandwidth constrainedrouting under various interference models. The proposed solutionis discussed in detail in Section 5. We develop the optimizationmodels in Section 6. Simulation results are presented in Section 7;and finally, Section 8 concludes this paper.

2. Related work

The bandwidth constrained routing problem has been the sub-ject of many studies from the early days of network development.This problem has been studied in wireline networks in the contextof load balancing and traffic engineering, especially in the MPLSnetworks [2–6]. These solutions are based on forming a feasible

residual network by pruning all links that do not have sufficient re-sources. In the pruned network, every path is feasible. In WMNs,the feasible residual network cannot be constructed by link-levelpruning due to the complexity of bandwidth consumption arisesfrom interference in the networks. In fact, we show that the prob-lem of finding a feasible path is NP-complete, generally.

A number of studies have been carried out on the bandwidthconstrained routing problem in multi-hop wireless networks[21,22]. Some of them, e.g., [1,7–13], have been specifically dedi-cated for mobile ad hoc networks (MANETs). These works focusedon the dynamic nature of MANETs, and proposed flooding-basedrouting algorithms [7–9]; some works attempted to reduce theoverhead of the flooding-based algorithm, e.g., [8,13]. The mainobjective in these studies is to deal with node mobility. However,due to the static infrastructure of WMNs, this is not the main chal-lenge in WMNs.

In recent years, a few algorithms and protocols have been pro-posed for QoS routing in single-channel [14–18,23], and multi-channel multi-radio WMNs [19,24,25]. In [14–16], the authorsproposed flooding-based algorithms to find a feasible path but theydid not consider load distribution throughout the network andthe complexity of finding a feasible path. The authors in [23] pro-posed a flooding-based algorithm to find a path that satisfies mul-tiple QoS constraints. The most closely related studies to this paperare [17–19,26,27]. The authors in [17] proposed the IQRoutingalgorithm, which is a combination of multiple routing algorithms.IQRouting applies the algorithms one-by-one, and if it finds multi-ple feasible paths, it selects the widest or the least-cost path. Jiaet al. dealt with the shortest widest path problem using thek-shortest path algorithm in [18]. The interference model used in[17,18] is only suitable for single-channel networks; furthermore,these solutions may not find a feasible path, even if it does exist.In [19], a hop-count bounded heuristic algorithm was proposedto find a feasible path with maximum bottleneck capacity, whichapproximates the widest path. The authors in [26] studied themaximum bandwidth routing problem and proposed a heuristicalgorithm and an optimization model. A technique was proposedin [28] to approximate the bandwidth of a given path. The authorsin [27] considered the 1-hop interference model [29] and enhancedthis technique to approximate the path bandwidth in a distributedmanner. Using the distributed approach, the authors proposed ahop-by-hop QoS routing algorithm. However, these studies didnot provide analyses of the complexity of the problem.

In terms of complexity analysis, NP-completeness of the shortestwidest path problem was proved in [18]. The authors in [19] conjec-tured that there is no polynomial time algorithm for the bandwidthconstrained routing in multi-channel multi-radio WMNs. In [30,31],the authors analyzed the complexity of the bandwidth constrainedrouting in single-channel multi-hop wireless networks and provedNP-completeness of this problem. In this paper, we analyze thecomplexity under different interference models; moreover, weevaluate the performance of our proposed pseudo-polynomial algo-rithm to deal with the intractability of the problem.

Besides these QoS routing algorithms, a number of previousworks proposed routing metrics for on-line load balancing in wire-less networks [32–36]. They were designed to capture packet lossratio and interference. These metrics were used for best-effort traf-fic routing. Such routing metrics are unlikely to be applicable inQoS routing in rural WMNs. They try to distinguish between linksthat have intermediate loss rates, and since this is not the case inrural WMNs, it will lead to an erratic behavior of the routing layer[20]. In [37], an off-line mechanism was proposed to achieve opti-mal load balancing whilst satisfying user requirements. Clearly,this mechanism cannot be used for on-line bandwidth constrainedrouting, which is our concern in this paper, because it needs priorknowledge of the traffic matrix.

Page 3: Complexity and design of QoS routing algorithms in wireless mesh networks

1724 B. Bakhshi, S. Khorsandi / Computer Communications 34 (2011) 1722–1737

3. System model and problem statement

In this section, we first describe the assumptions and modelsused throughout the paper; then, we formulate the problem westudy here. The notations used are summarized in Table 1. For easeof description, we drop the subscripts when they are clear from thecontext, e.g., c is the physical channel capacity of all links.

3.1. Assumptions

We consider multi-rate contention-based WMNs in which allnodes are static. The network can be single-channel or multi-chan-nel multi-radio; in the latter case, all nodes have multiple radios,and there are C orthogonal available channels in the frequencyspectrum. We assume that the network is deployed in a rural loca-tion where the PHY layer is stable, i.e., links would perform more orless like wired links [20]. Hence, we suppose that the physicalchannel capacity does not vary over time similar to previous work[15–19,30,31]. Moreover, in this paper, we consider a centralizedrouting algorithm like previous studies [17–19,31].

3.2. System model

The network is modeled by a digraph G = (V,E,C), where V is theset of n nodes, E is the set of m links, and set C denotes the physicalchannel capacities. Each v 2 V corresponds to a node in the net-work. Let d(u,v) denote the Euclidean distance between nodes uand v. For a given pair of nodes u and v, there is a link (u,v) 2 E ifd(u,v) 6 TR, where TR is the transmission range. Set C is {c(u,v) "(u,v) 2 E}, where c(u,v) is the physical channel capacity of (u,v).

The links interfering with (u,v) are denoted by the interferenceset I(u,v). This set is determined by a particular interference model,e.g., k-hop interference model [29] or protocol model [38]. It is sup-

Table 1Notations.

Notation Description

u and v NodeV Set of nodes, and jVj = n(u,v) LinkE Set of links, and jEj = md(u,v) The Euclidean distance between nodes u and vI(u,v) Interference set of link (u,v)I Set of interference sets I = {I(u,v) "(u,v) 2 E}bI Size of of the largest interference set

Iðu;vÞ Set of potentially interfering links with (u,v)

c(u,v) Physical channel capacity of link (u,v)C Set of physical capacities C = {c(u,v) "(u,v) 2 E}f(u,v) Flow on link (u,v)ALB(u,v) Available link bandwidth of (u,v)AAB(u,v) Available area bandwidth of (u,v)TR Transmission rangeIR Interference rangeC The number of orthogonal channels in frequency spectrumru The number of radios of node udeg (u) Degree of node up Path p = < u ? � � �? v> from u to vP Set of pathsp1 � p2 The concatenation of paths p1 and p2

l(p) Path length functionbw(p) Bandwidth of path pd d = (s,d,b, t,e): Demand for a path from s to d, required

bandwidth = b, arrival time = t, and exit time = eD Set of demands, D = {di}/ / = (s,d,b,p): Flow at rate b from s to d through path pU The set of existing flows, U = {/i}BC(/, (u,v)) Bandwidth consumption of flow / at link (u,v)k The number of hops in k-hop interference model, and the

number of paths in k-shortest path algorithm

posed that interference pattern is static; the given interference setsdo not change over time. We assume that I(u,v) is given for all links,ðu1;v1Þ 2 Iðu2 ;v2Þ if and only if ðu2;v2Þ 2 Iðu1 ;v1Þ, and (u,v) 2 I(u,v). Theset of all interference sets is denoted by I.

From the point of view of a flow, there are two kinds of interfer-ences. The inter-flow interference is the interference between theflow and other existing flows, and the intra-flow interference isthe interference between different links in the path of the flow.

3.3. Bandwidth models

3.3.1. Available bandwidthWe use the row constraint introduced in [39] to compute link

available bandwidths. It is a sufficient condition for feasibility ofbandwidth allocation and implies that the aggregate load of thelinks in the interference set of each link must be less than physicalchannel capacities. Let f(u,v) denote the flow on link (u,v). This con-straint imposes that:

Xðu0 ;v 0 Þ2Iðu;vÞ

fðu0 ;v 0 Þcðu0 ;v 0 Þ

6 1 8ðu;vÞ 2 E; ð1Þ

where fðu;vÞcðu;vÞ is the fraction of time (u,v) needs to transmit flow f(u,v).

We refer (1) as the ‘‘capacity constraint’’ since if it is satisfied, net-work bandwidth allocation will be feasible. Based on this constraint,we define two bandwidths for each link as follows:

Definition 1. Available Link Bandwidth of ðu;vÞ : ALBðu;vÞ ¼max

0; cðu;vÞ 1�Pðu0 ;v 0Þ2Iðu;vÞ

fðu0 ;v 0 Þcðu0 ;v 0 Þ

� �n o.

Definition 2. Available area bandwidth of ðu;vÞ : AABðu;vÞ ¼minðu0 ;v 0 Þ2Iðu;vÞ

cðu;vÞcðu0 ;v 0 Þ

ALBðu0;v 0Þn o

.

ALB(u,v) and AAB(u,v) are, respectively, the maximum bit ratesat which link (u,v) can transmit without violating its capacityconstraint and the constraint of the other links in its interferenceset. These definitions are clarified by an illustrative example de-picted in Fig. 1. Let cðu1 ;v1Þ ¼ 10; cðu2 ;v2Þ ¼ 20; cðu3 ;v3Þ ¼ 20; cðu4 ;v4Þ ¼40; fðu1 ; v1Þ ¼ 2; fðu2 ;v2Þ ¼ 0; fðu3 ;v3Þ ¼ 10, and fðu4 ;v4Þ = 15. Using these

definitions, we have ALBðu1;v1Þ ¼ cðu1 ;v1Þ 1� fðu1 ;v1 Þcðu1 ;v1 Þ

� fðu2 ;v2 Þcðu2 ;v2 Þ

� �¼

8; ALBðu2; v2Þ ¼ 20 1 � 210 � 0

20 � 1020

� �¼ 6; ALBðu3; v3Þ ¼ 20 1 � 0

20��

1020� 15

40Þ ¼ 2:5, and ALBðu4; v4Þ ¼ 40 1� 1020� 15

40

� �¼ 5. Moreover,

AABðu1; v1Þ ¼ min 1010 ALBðu1; v1Þ; 10

20 ALBðu2; v2Þ� �

¼ 3; AABðu2; v2Þ ¼AABðu3;v3Þ ¼ 20

20 ALBðu3;v3Þ ¼ 2:5, and AAB(u4,v4) = 5. Note thatalthough ALB(u2,v2) = 6, link (u2,v2) should not transmit in a ratemore than AAB(u2,v2) = 2.5 to maintain the guaranteed bandwidthof flow fðu3 ;v3Þ.

3.3.2. Bandwidth consumptionThere are two key observations about the bandwidth consump-

tion of a flow in multi-hop wireless networks. Consider flow /= (s,d,b,p) that is from s to d through path p at rate b. First, the flow

ig. 1. Illustration of ALB (Definition 1) and AAB (Definition 2). The network is angle-channel WMN. Suppose Iðu1 ;v1 Þ ¼ fðu1; v1Þ; ðu2;v2Þg; Iðu2 ;v2 Þ ¼ fðu1; v1Þ; ðu2;

2Þ; ðu3; v3Þg; Iðu3 ;v3 Þ ¼ fðu2; v2Þ; ðu3;v3Þ; ðu4;v4Þg, and Iðu4 ;v4Þ ¼ fðu3;v3Þ; ðu4; v4Þg.

Fsiv

Page 4: Complexity and design of QoS routing algorithms in wireless mesh networks

B. Bakhshi, S. Khorsandi / Computer Communications 34 (2011) 1722–1737 1725

not only consumes the bandwidth of the links in the path, "(u,v)2 p, but also it consumes the bandwidth of other links (u0,v0) in theinterference range of the path. We name the links whose band-width is consumed by the flow as the ‘‘affected links’’ of the path,which is defined below.

Definition 3. Affected Links of p: AL(p) = {(u0,v0) 2 I(u,v) "(u,v) 2 p}.Note that by definition (u,v) 2 AL(p) if (u,v) 2 p, and if

(u,v) R AL(p), its available bandwidth is not influenced by creatingflow / = (s,d,b,p).

The second observation is that a flow may consume the band-width of a link multiple times. Consider link (u,v) 2 AL(p) and as-sume (u0,v0) 2 p interferes with (u,v); in other words, (u0,v0) 2p \ I(u,v). The amount of the time fraction needed by (u0,v0) to trans-mit load b is b

cðu0 ;v 0 Þ. During this time, link (u,v) must be shut down to

avoid interference. This happens for each (u0,v0) 2 p \ I(u,v); there-fore, the total time fraction link (u,v) must be shut down due toallocating bandwidth b through path p is

Pðu0 ;v 0 Þ2p\Iðu;vÞ

bcðu0 ;v 0 Þ

. As a re-sult, we have:

Definition 4. The bandwidth consumption by flow / = (s,d,b,p) atlink (u,v) 2 AL(p) is

BCð/; ðu;vÞÞ ¼ cðu;vÞX

ðu0 ;v 0 Þ2p\Iðu;vÞ

bcðu0 ;v 0 Þ

0@

1A:

It is obvious that to maintain the guaranteed bandwidth of theexisting flows, we need BC(/, (u,v)) 6 ALB(u,v) because otherwiseBC(/, (u,v)) > ALB(u,v) yields that:

cðu;vÞX

ðu0 ;v 0 Þ2p\Iðu;vÞ

bcðu0 ;v 0Þ

0@

1A > cðu;vÞ 1�

Xðu0 ;v 0 Þ2Iðu;vÞ

fðu0 ;v 0 Þcðu0 ;v 0 Þ

0@

1A;

Xðu0 ;v 0 Þ2p\Iðu;vÞ

bcðu0 ;v 0 Þ

þX

ðu0 ;v 0 Þ2Iðu;vÞ

fðu0 ;v 0 Þcðu0 ;v 0Þ

> 1;

that means the capacity constraint of the link is violated.

3.4. Problem statement

In this paper, we study the QoS routing problem in WMNs. Inthe problem, there is a set of demands D = {di = (si,di,bi, ti,ei)}; de-mand di arrives at time ti, needs a path with bandwidth bi fromnode si to node di. If the QoS routing algorithm can find a feasiblepath p, the demand is admitted that creates flow / = (s,d,b,p) inthe network. In this case, the demand leaves the network at timeei. In the context of QoS routing, network performance is usuallymeasured in terms of demand acceptance rate (or the number ofaccepted demands) [2–6], which needs to be optimized by theQoS routing algorithm. Obviously, this network performance opti-mization problem is equivalent to the problem of maximizing theprobability of finding a feasible path for each demand. Two factorsinfluence this probability. The first one is resource availability inthe network that determines the existence of feasible paths. Thesecond factor is the ability of the QoS routing algorithm to findexisting feasible paths. Accordingly, the QoS routing problem iscomposed of two subproblems: the problem of finding a feasiblepath for a given demand and the problem of efficient utilizationof network resources. These subproblems are explicated more for-mally in the following.

First, we consider the problem of finding a feasible path. Sup-pose that network G = (V,E,C) is given and a set of flows, U, areexisting in the network. These flows determine the available band-width of each link. At time t, a new demand d = (s,d,b, t,e) arrives.The problem is to find a feasible path p from s to d. Feasibility ofthe path implies that transmission at rate b through the path does

not violate the capacity constraint (1). In other words, it meansthat if flow / = (s,d,b,p) is created, its bandwidth consumptiondoes not exceed the available bandwidth of any link; otherwise,the capacity constraint is violated as explained in Section 3.3.2.More specifically, the problem is defined as follows:

Problem: Feasible bandwidth constrained path in WMNs (FBCP).Instance: G = (V,E,C), set I, set U of existing flows, and a demandd = (s,d,b, t,e).Question: Is there any path p = hs ? � � �? di such that creatingflow / = (s,d,b,p) satisfies BC(/, (u,v)) 6 ALB(u,v) " (u,v) 2AL(p)?

Since flow / does not affect ALB(u,v) if (u,v) R AL(p), satisfactionof this constraint only for the links (u,v) 2 AL(p) is the necessaryand sufficient condition for the feasibility of the path.

As mentioned, network performance is measured in terms ofthe number accepted demands. Hence, the second subproblem,efficient utilization of network resources, is defined formally asfollows:

Problem: Maximum acceptance rate in WMNs (MAR).Instance: G = (V,E,C), set I, and set D of demands.Question: What is the maximum number of demands that canbe accepted?

Here, we assume that there is not any information about a de-mand before it arrives. Hence, the QoS routing algorithm is on-line.When a demand arrives, the algorithm attempts to find a path for itonly according to the state of the network at the time.

4. Complexity analysis

In this section, we analyze the complexity of the FBCP and MARproblems.

4.1. Complexity of finding a feasible path

The problem of finding a feasible path with a guaranteed end-to-end bandwidth is polynomially solvable in wireline networksby networking pruning. However, in multi-hop wireless net-works, it is substantially difficult. In fact, in general, the FBCPproblem is intractable, which is due to interferences in wirelessnetworks. Interference model, which specifies the interferences,greatly influences the complexity of the problem. In the follow-ing, we first provide an insight into the complexity, give an illus-trative example, and prove a theorem on the complexity of FBCPproblem under an arbitrary interference model. Then, we con-sider different interference models widely used in the literatureand analyze the complexity of the FBCP problem under eachmodel.

4.1.1. IntroductionThe constraint of the FBCP problem, BC(/, (u,v)) 6 ALB(u,v), is

affected by both intra-flow and inter-flow interferences. However,the problem is that the interferences are not fully determined untilthe path is completely constructed. For example, in finding a pathfor demand d, if link (u,v) is selected because of ALB(u,v) P b, itcannot be guaranteed that constraint BC(/, (u,v)) 6 ALB(u,v) willbe satisfied when the path gets completed. This is due to the factthat the links added to the path after (u,v) affect BC(/, (u,v)), andmay violate the constraint. The following theorem and corollaryshow the complexity of the FBCP problem under an arbitrary inter-ference model.

Page 5: Complexity and design of QoS routing algorithms in wireless mesh networks

1726 B. Bakhshi, S. Khorsandi / Computer Communications 34 (2011) 1722–1737

Theorem 1. For a given interference model, flow / = (s,d,b,p), andlink (u,v), if BC(/, (u,v)) is the same for every path p where (u,v) 2 p,and it is the same for every path p where (u,v) 2 AL(p)np, pruning thenetwork by the following rules:

1. Link (u,v) is pruned if ALB(u,v) < BC(/, (u,v)).2. Link (u,v) is pruned if $(u0,v0) s.t. ðu;vÞ 2 Iðu0 ;v 0 Þ and

ALB(u0,v0) < BC(/, (u0,v0)).

yields that:

1. All paths in the pruned network is feasible for the demandd = (s,d,b, t,e) corresponding to flow /.

2. The pruning does not exclude any feasible path.

Proof. The proof can be found in Appendix A.1. h

Corollary 2. If the conditions of Theorem 1 hold, the FBCP problem ispolynomially solvable.

Proof. This is a direct result of Theorem 1. It is sufficient to prune thenetwork by the rules mentioned in the theorem. It implies that ifthere is a feasible path for demand d, it will be present in the prunednetwork, and since every path is feasible after the pruning, a path canbe found by polynomial time graph search algorithms. h

We illustrate the complexity of FBCP by an example when theconditions of Theorem 1 do not hold. Consider Fig. 2, which depictsa general multi-channel multi-radio WMN. Suppose that we useDijkstra’s algorithm. Assume that there is not any flow in the net-work, c = 15 bps, and a demand (u1,u5,5 bps,0,1) arrives. There aretwo (not necessarily feasible) paths for the demand: p1 =hu1 ? u2 ? u3 ? u4 ? u5i and p2 = hu1 ? u6 ? u2 ? u3 ? u4 ? u5i.We consider a flow per path: /1 = (u1,u5,5,p1) and /2 =(u1,u5,5,p2). Bandwidth consumption by these flows is shown inTable 2. As it seen, in this topology, bandwidth consumption ateach link by the demand depends on its path. Note that path p1

is not feasible, because BC(/, (u2,u3)) = BC(/, (u3,u4)) > ALB(u2,u3) =ALB(u3,u4) = c. However, p2 is feasible.

In this example, if (u2,u3) and (u3,u4) are pruned due to band-width consumption by flow /1, it excludes the existing feasiblepath p2 from the pruned network. If we do not prune the network,Dijkstra’s algorithm finds path p1 as the shortest path which is notfeasible. Even if we augment Dijkstra’s algorithm to check the

Table 2Bandwidth consumption of flows in the topology depicted in Fig. 2.

/ Bandwidth consumption at link

(u1,u2) (u1,u6) (u6,u2) (u2,u3) (u3,u4) (u4,u5)

/1 15 0 0 20 20 15/2 10 10 10 15 15 15

Fig. 2. Illustration of the complexity of finding a feasible path. Label of each link isthe channel assigned to the link. Two paths for demand (u1,u5,5,0,1) are shown bydashed lines. Assume that c = 15, and Iðu1 ;u2 Þ ¼ fðu1;u2Þ; ðu2;u3Þ; ðu3;u4Þg; Iðu2 ;u3 Þ ¼Iðu3 ;u4Þ ¼ fðu1;u2Þ; ðu2;u3Þ; ðu3;u4Þ; ðu4;u5Þg; Iðu4 ;u5 Þ ¼ fðu2;u3Þ; ðu3;u4Þ; ðu4;u5Þg, andIðu1 ;u6Þ ¼ Iðu6 ;u2Þ ¼ fðu1;u6Þ; ðu6;u2Þg.

feasibility of each partial path, it does not solve the problem. As-sume that we check the capacity constraint of all the links in theinterference set of each link before Dijkstra’s algorithm selectsthe link to be used in a partial path. In this example, the augmentedalgorithm starts from node u1 and creates partial pathsp01 ¼ hu1 ! u2i and p02 ¼ hu1 ! u6i by relaxing the node. In the nextsteps, p01 is extended to p01 ¼ hu1 ! u2 ! u3 ! u4i which is a feasi-ble partial path. After this point, no further extension is possibledue to the following reasons. First, (u4,u5) is not selected sincechecking the capacity constraint for all ðu;vÞ 2 Iðu4 ;u5Þ indicates thatthe capacity constraint of (u2,u3) and (u3,u4) is violated if therequired bandwidth is allocated through path hu1 ? u2 ? u3 ?u4 ? u5i. Second, Dijkstra’s algorithm does not extend p02 through(u6,u2) because u2 has already been visited. Therefore, even theaugmented Dijkstra’s algorithm cannot find the existing feasiblepath p2.

It should be noted that as we prove in the following, this is notthe problem of Dijkstra’s algorithm. For every polynomial searchalgorithm, it is possible to construct a pathological topology inwhich the algorithm fails to find an existing feasible path. In thefollowing, we analyze the effect of the interference models onthe complexity of the problem.

4.1.2. k-hop interference model [29]In the k-hop interference model, two links within k-hop range

interfere with each other. In this section, we assume that the net-work is single-channel and analyze the effect of the value of k onthe complexity of the FBCP problem. Multi-channel networks arediscussed in Section 4.1.4.

Case 1. Node-Exclusive model (k = 1) [29]: In this model, onlylinks that share an end-node interfere with each other; therefore,I(u,v) = {(u0,v0) s.t. u = u0 or u = v0 or v = u0 or v = v0}. We show thatFBCP is polynomially solvable under this model if routing mecha-nism (routing algorithm in conjunction with routing metric) meetsthe single-hop requirement which is defined bellow.

Definition 5. Let p1 = hu ? vi and p2 = hu ? u0 ? � � �? vi be,respectively, the single-hop and a multi-hop feasible paths fromu to v. A routing mechanism meets the single-hop requirement if italways selects p1 instead of p2.1

To show polynomial solvability of FBCP, it is sufficient to showthat the conditions of Theorem 1 hold. Consider / = (s,d,b,p), sup-pose that s and d are not directly connected, and for the sake ofsimplicity of presentation assume that all links have the samephysical channel capacity. We make the following observations.

� BC(/, (u,v)) = BC(/, (v,u)) because I(u,v) = I(v, u).� BC(/, (u,v)) = 0 if u,v R p because AL(p) = {(u,v) s.t. u 2 porv 2 p}.� BC(/, (u,v)) = 3b if (u,v) 2 p and u,v R {s,d} because p \ I(u,v) =

{(v0,u), (u,v), (v,u0)}.� BC(/, (u,v)) = 2b if (u,v) 2 p and u = s or v = d because if u = s, we

have p \ I(s, v) = {(s,v), (v,u0)} and if v = d then p \ I(u, d) ={(v0,u), (u,d)}.� BC(/, (u,v)) = 2b if (u,v) R p and u 2 pn{s,d} because due to the

single-hop requirement v R p; hence, p \ I(u,v) = {(v0,u), (u,v00)}.� BC(/, (u,v)) = b, if (u,v) R p and u = s or v = d because if u = s, due

to the single-hop requirement v R p; hence we have p \ I(s, v) ={(s,v0)}. If v = d, in the similar way, we have p \ I(u, d) = {(u0,d)}.

An example of the bandwidth consumption by a flow in a sin-gle-channel network under the node-exclusive interference modelis shown in Fig. 3. Obviously, if the network is single-channel, the

1 A simplified version of this requirement was also identified as ‘‘triangularequality’’ in [10].

in
Page 6: Complexity and design of QoS routing algorithms in wireless mesh networks

Fig. 3. Illustration of bandwidth consumption under the node-exclusive interfer-ence model in single-channel WMNs. Label of each is link the bandwidthconsumption by flow (u1,u5,1,p) at the link.

B. Bakhshi, S. Khorsandi / Computer Communications 34 (2011) 1722–1737 1727

bandwidth consumption is the same for all paths from s to d. Con-sequently, due to Theorem 1 and Corollary 2, the problem is poly-nomially solvable.

Case 2. General case (k P 2): The computational complexity ofbandwidth allocation in multi-hop wireless network under thenode-oriented k-hop interference model was studied in [31]. Thismodel implies that two nodes within k-hop distance of each otherare interfering. The authors proved that the problem is NP-complete for k P 1. In this paper, we use the link-oriented k-hopmodel [29]. It is easy to see that the node-oriented k-hop interfer-ence model is equivalent to the link-oriented (k + 1)-hop model.Hence, their analysis shows that the FBCP problem is NP-completeunder the link-oriented k-hop interference model for k P 2.

4.1.3. Interference range model [40] in single-channel networksThe interference range model is a special case of the well-

known protocol model [38]. In this model, the interference rangeIR is defined besides the transmission range TR. Under this model,two links (u,v) and (u0,v0) are interfering if d(u,u0) 6 IR or d(u,v0) 6IR or d(v,u0) 6 IR or d(v,v0) 6 IR. In this section, we assume that net-work is single-channel and analyze the effect of the value of IR onthe complexity of FBCP.

Case 1. IR,(u,v) < TR,(u,v): This is an artificial case where the inter-ference set of (u,v) contains only links that have a common end-node with (u,v). Note that this is the definition of the node-exclu-sive model; hence, in this case, the FBCP problem is polynomiallysolvable as discussed in Section 4.1.2.

Case 2. IR P (1 + c)TR: This case is usually used in the literature,where 1 6 c 6 2. It is easy to see that this model is equivalent to ageneralization of the link-oriented k-hop interference model withk P 2, where different values of k are used for different links.Therefore, as proved in [31], the FBCP problem is NP-complete inthis case.

2 The necessary and sufficient conditions are ru = deg (u) and C ¼ vðIGÞ, wherevðIGÞ is the chromatic number of the potentially interference graph. In potentiallyinterference graph IG, each vertex represents a link in G, and there is an edge betweentwo vertices if their corresponding links are potentially interfering with each other.

3 Deriving the necessary conditions is not easy in this case.

4.1.4. Interference range model [40] in multi-channel networksWhen the interference range model is used in multi-channel

multi-radio WMNs, channel assignment affects the interferencesets besides the Euclidean distance between nodes. Two links arepotentially interfering if they are in the interference range of eachother; but to be actually interfering they should also be assignedto the same channel. Channel assignment pattern and interferencesets are influenced by the number of available channels in the fre-quency spectrum, C, and the number of radios of each node, ru. Weanalyze their effects on the complexity of the FBCP problem in thissection. The following analyses are based on the interference rangemodel with IR P (1 + c)TR; however, they can be easily adapted tothe k-hop interference model.

Case 1. No interference: There is not any interference in multi-channel multi-radio WMNs if there are sufficient available chan-nels and radios. In this case, similar to wireline networks, we haveI(u,v) = {(u,v)} and AL(p) = p. As a result, for a given flow / = (s,d,b,p),we have BC(/, (u,v)) = b if only if (u,v) 2 p. Note that it is the same

for all paths; hence, the requirements of Theorem 1 are met, andconsequently, the FBCP problem can be solved polynomially.

Let Iðu;vÞ denote the set of potentially interfering links with (u,v).It is easy to see that an interference free channel assignment isachievable if C P max jIðu;vÞj and ru P deg (u). A unique channelshould be assigned to each link in every interference set thatmeans C P max jIðu;vÞj. In each node, a radio should be tuned tothe unique channel of each incoming or outgoing link that meansru P deg (u). It is important to note that these are sufficientconditions.2

Case 2. Outgoing interfering links: This is a special case, inwhich only the outgoing links of each node interfere with eachother; more formally, I(u,v) = {(u0,v0) s.t. u = u0}. This is accomplishedby assigning the same channel to all outgoing links of each node;however, the channel must be unique in the interference rangeof the outgoing links. The number of potentially interfering links

with (u,v) is jIðu;vÞj, where degðuÞ2 links are the outgoing links of the

node (including the link itself). Therefore, we need C P max

jIðu;vÞj � degðuÞ2 þ 1

� �available channels. In each node, a channel is

assigned to all outgoing links and a unique channel is needed for

each incoming link; hence, at least ru P degðuÞ2 þ 1

� �radios are

needed at node u. Again, note that these are sufficient conditionsto achieve the desired channel assignment.3

Under this channel assignment, the FBCP problem is polynomi-ally solvable since the conditions of Theorem 1 hold due to the fol-lowing reasons. First, BC(/, (u,v)) = BC(/, (u,v0)) "(u,v), (u,v0) 2 Ebecause both links have the same interference set. Second, BC(/, (u,v)) = b if (u,v) 2 p since at most one outgoing link of each nodebelongs to the path and outgoing links of different nodes are notinterfering. Hence, BC(/, (u,v)) = BC(/, (u,v0)) = b if and only ifu 2 p, and it is the same for all paths p.

Case 3. General case: In general multi-channel multi-radioWMNs with an arbitrary channel assignment, the FBCP problemis intractable as formally stated in the following theorem.

Theorem 3. The FBCP problem in multi-channel multi-radio WMNswith an arbitrary channel assignment under the interference rangemodel with IR P (1 + c)TR is NP-complete.

Proof. The proof can be found in Appendix A.2. h

4.1.5. Physical model [38]The physical interference model is another commonly used

model. It is based on the signal to interference noise ratio (SINR)concept. A transmission on link (u,v) is successful if SINR of the sig-nal received at v is greater than a predefined threshold. In [40], theauthors showed that the interference range model withIR P (1 + c)TR is a special case of the physical model. Consequently,according to the case 2 in Section 4.1.3 and case 3 in Section 4.1.4,the FBCP is NP-complete under the physical interference model inboth single and multi-channel networks.

Table 3 summarizes the results of the complexity analyses pre-sented in this section.

4.2. Complexity of efficient network utilization

Efficient network resource utilization, which is formally statedby the MAR problem, is a network-wide optimization problem.

Page 7: Complexity and design of QoS routing algorithms in wireless mesh networks

Table 3Summary of the complexity of the FBCP problem.

Interference model Network/model configuration The complexity of FBCP

k-Hop model k = 1 & Single hop requirement & Single-channel network Polynomially solvablek P 2 NP-complete

Interference range model in single-channel WMNs IR,(u,v) < TR,(u,v) Polynomially solvableIR P (1 + c)TR NP-complete

Interference range model in multi-channel WMNs with IR P (1 + c)TR C P max j Iðu;vÞ j & ru P deg (u) Polynomially solvable

C P max jIðu;vÞj � degðuÞ2 þ 1

� �& ru P degðuÞ

2 þ 1� �

Polynomially solvable

General case NP-complete

Physical model General case NP-complete

Fig. 4. A pathological topology where Dijkstra’s algorithm cannot find theminimum hop feasible path from u1 to u8 with bandwidth 6. The label of eachlink is the channel assigned to the link and c = 10 bps. Under a given interferencemodel, Iðu1 ;u4Þ ¼ Iðu4 ;u6 Þ ¼ fðu1;u4Þ; ðu4;u6Þg and the remaining links do not interferewith each other due to the channel assignment.

1728 B. Bakhshi, S. Khorsandi / Computer Communications 34 (2011) 1722–1737

Finding its optimal solution is very difficult. In fact, its off-line ver-sion in the wireline network, where there is not any interferenceand the information about all demands is given at the beginning,is NP-Hard [5]. Clearly, the on-line version in WMNs that have verycomplicated interference patterns and there is not any informationabout future demands is much more difficult.

Dynamic routing is a well-developed approach to obtain a goodapproximate solution for this problem [6]. In this approach, theminimum length feasible path is selected for each demand, wherethe length of the path is a monotonically increasing function of linkloads. Using this approach in WMNs has its own complexities. Ifthe FBCP problem is polynomially solvable, the minimum lengthfeasible path problem is also solved in polynomial time using theshortest path algorithms. However, if FBCP is NP-complete, thisproblem is extremely difficult. From the complexity theory pointof view, the problem is NP-hard since it is the optimization versionof an NP-complete decision problem, the FBCP problem.

An example, where Dijkstra’s algorithm fails to find the mini-mum length feasible path is illustrated in Fig. 4. Assume thatc = 10 bps, demand (u1,u8,6 bps,0,1) has been arrived, and theweight of each link is one. Similar to Fig. 2, bandwidth consump-tion depends on path; so, the pruning rules in Theorem 1 do notsolve the problem. We use the augmented Dijkstra’s algorithm,which is explained in Section 4.1.1. It starts from u1; in relaxingthis node, it visits u2,u3, and u4. In relaxing node u4, it does not se-lect (u4,u6) because partial path hu1 ? u4 ? u6i is not feasible dueto the interference between (u1,u4) and (u4,u6). In relaxing u3, itdoes not select (u3, u4) because u4 has already been visited. Thealgorithm continues relaxing u2, u5, u7, and u6 sequentially. Finally,it selects path p1 = hu1 ? u2 ? u5 ? u7 ? u6 ? u8i while the min-imum hop feasible path is p2 = hu1 ? u3 ? u4 ? u6 ? u8i.

5. Proposed solution

In this section, we first explain how to deal with the problems offinding a feasible path and efficient network utilization. Then, we

integrate our solutions into an algorithmic framework. Finally,we analyze the computational complexity of the framework.

5.1. Finding a feasible path

Finding a feasible path is composed of three functionalities: net-work pruning, searching, and satisfying feasibility. Our proposedmechanisms for them are as follows.

5.1.1. Network pruningFor a given instance (G, I,U,d) of the FBCP problem, we prune

the network according to AAB(u,v); (u,v) is pruned if AAB(u,v) < b.The reason is that if AAB(u,v) < b, routing the demand through(u,v) violates the capacity constraint of at least one link in theinterference set of (u,v). It must be noted that this pruning doesnot affect the solution space but shrinks the search space more thanpruning according to ALB(u,v).

5.1.2. Satisfying feasibilitySince network pruning does not guarantee feasibility of paths in

the pruned network, we use a call admission control (CAC) mech-anism to maintain path feasibility. The CAC is performed in a hop-by-hop manner as follows. Assume p = hs ? � � �? ui is a feasiblepartial path from s to u. This path can be extended one hop through(u,v) only if allocating the required bandwidth b through pathp0 = p � hu ? vi does not violate the capacity constraint of any link.More precisely, p can be extended to p0 only if for flow / = (s,v,b,p0),we have BC(/, (u,v)) 6 ALB(u,v) "(u,v) 2 AL(p0). Obviously, if v = d,path p0 will be a feasible path for the demand and it is admitted.

5.1.3. Search strategyTo search for a feasible path, we use the k-shortest path

algorithm that allows revisiting each node up to k times. We usethe k-shortest path strategy due to the shortcoming of Dijkstra’salgorithm in finding feasible paths as demonstrated by theexample in Fig. 2. It arises from the fundamental property ofDijkstra’s algorithm that each node is visited only one time. Recon-sider Fig. 2; in this figure, Dijkstra’s algorithm does not find feasiblepath p2 = hu1 ? u6 ? u2 ? u3 ? u4 ? u5i, since it does not allowrevisiting node u2 through partial path hu1 ? u6 ? u2i. In thisexample, if we use the 2-shortest path algorithm, it extends partialpath h u1 ? u6i to hu1 ? u6 ? u2i, and finally finds the feasible pathp2.

5.2. Efficient network utilization

We use the dynamic routing technique to find an approximatesolution for the MAR problem. Dynamic routing is composed oftwo subproblems: selecting an appropriate routing metric, whichwill be discussed later, and finding the minimum length paths.We use a selector function besides the k-shortest path algorithm

Page 8: Complexity and design of QoS routing algorithms in wireless mesh networks

B. Bakhshi, S. Khorsandi / Computer Communications 34 (2011) 1722–1737 1729

to approximate the minimum length feasible paths. We run the k-shortest path algorithm using path length function l(p), but do notterminate the algorithm as soon as it reaches the destination. Thealgorithm always attempts to find k paths, which are stored in setP. We select the best path among the k paths by a selector functions(P). The selector function can be either argminp2Pl(p) or a combi-nation of l(p) and other functions. This approach improves optimal-ity of the result. For example, in Fig. 4, if we use the 2-shortest pathalgorithm with lðpÞ ¼

Pðu;vÞ2p1 and selector function s(P) = arg-

minp2Pl(p), the 2-shortest path algorithm finds both pathsp1 = hu1 ? u2 ? u5 ? u7 ? u6 ? u8i and p2 = hu1 ? u3 ? u4 ?u6 ? u8i,P = {p1,p2}, and the selector function selects p2, which isthe minimum hop feasible path.

The efficiency of dynamic routing technique depends on thepath length function in use. Conventional routing metrics proposedfor this purpose in wireline networks are based on the bandwidth ofpath, bw(p). It is the maximum bit rate at which data can be trans-mitted through the path without violating the capacity constraint.Assume that a flow at rate f is transmitting through path p, itsbandwidth consumption at link (u,v) is

cðu;vÞX

ðu0 ;v 0 Þ2p\Iðu;vÞ

fcðu0 ;v 0Þ

0@

1A ¼ f

Xðu0 ;v 0 Þ2p\Iðu;vÞ

cðu;vÞcðu0 ;v 0 Þ

0@

1A:

This bandwidth consumption can be at most ALB(u,v) in order tosatisfy the capacity constrain (1); hence,

fX

ðu0 ;v 0Þ2p\Iðu;vÞ

cðu;vÞcðu0 ;v 0Þ

0@

1A ¼ ALBðu;vÞ;

and consequently,

f ¼ ALBðu; vÞPðu0 ;v 0Þ2p\Iðu;vÞ

cðu;vÞcðu0 ;v 0 Þ

:

Therefore, the bandwidth of path is defined as follows:

Definition 6. The bandwidth of path p : bwðpÞ ¼minðu;vÞ2ALðpÞALBðu;vÞP

ðu0 ;v 0 Þ2p\Iðu;vÞ

cðu;vÞcðu0 ;v 0 Þ

.

In the following, we consider a few commonly used QoS routingmetrics in wireline networks, and explain how they can be adaptedfor WMNs.

5.2.1. Hop count and least usage metricsIn spite of the fact that the hop count path length function,

lHCðpÞ ¼Pðu;vÞ2p1, is not a dynamic function, it is still being used

in bandwidth constrained routing in wireline networks, since itminimizes network resource consumption [41]. In WMNs, resourceconsumption by flows at a link depends on the size of the interfer-ence set of the link. Consequently, a path with minimum resourceusage can be found by minimizing the following path lengthfunction.

Definition 7. Least Usage path length function [42]:lLUðpÞ ¼

Pðu;vÞ2pjIðu;vÞj.

5.2.2. Widest shortest path (WSP)We find an approximate solution for the WSP problem using the

k-shortest path algorithm and an appropriate selector function. Wefind k minimum hop paths using the k-shortest path algorithm,and if there are multiple same length paths, the selector functionselects the widest one. The bandwidth of the path is defined byDefinition 6.

5.2.3. Shortest widest path (SWP)The authors in [18] approximated the shortest widest path in

single-channel networks under the 2-hop interference model.Finding SWP is harder than WSP because according to Definition6, the bandwidth of path cannot be determined before it is com-pleted. Here, we approximate a solution for SWP using path lengthfunction lWP(p) defined as follows:

Definition 8. Widest path length function: lWPðpÞ ¼max

ðu;vÞ2p1

AABðu;vÞ.

We use the k-shortest path algorithm and find the k widestpaths according to lWP(p). If there are multiple paths with the samewidth, we select the one that has the minimum number of hops.

5.2.4. Minimum criticality metricComparisons between the path length functions proposed for

dynamic bandwidth constrained routing in wireline networkswere carried out in [6,41], and showed that the following pathlength function has superior performance.

Definition 9. Reversed link bandwidth path length function:lRLBðpÞ ¼

Pðu;vÞ2p

1ALBðu;vÞ.

Some previous works, e.g., [31,43], used this routing metric inWMNs. We augment it by two observations. First, in wireless net-works, congestion occurs in an interference region not at a singlelink. Therefore, we use AAB(u,v) instead of ALB(u,v). Second, inaddition to the available bandwidth, criticality of a link also de-pends on the size of its interference set. Larger interference setsimply that links have to share bandwidth with more other interfer-ing links; in other words, it means more criticality. Hence, we takethe interferences into account, and define the following pathlength function.

Definition 10. Minimum criticality path length function:lMCðpÞ ¼

Pðu;vÞ2p

jIðu;vÞ jAABðu;vÞ.

5.3. Adjustable algorithmic framework

In this section, we present the adjustable constrained routingalgorithmic framework (ACRAF), where the aforementioned algo-rithms and routing metrics are integrated into a single framework.The value of k in the k-shortest path algorithm, the path lengthfunction l(p), and the selector function s(P) are the adjustableparameters of this framework, which are discussed in more detailin Section 5.3.1.

Algorithm 1 shows how an ACRAF-based QoS routing is imple-mented. Algorithms 2 and 3, respectively, depict the pseudo-codeof ACRAF and the k-SP algorithm. ACRAF prunes the network instep 1. In step 2, the k-SP algorithm attempts to find a set of k min-imum length feasible paths. Finally, the selector function selectsthe best path in step 3.

Algorithm k-SP is the integration of the k-shortest path algo-rithm and the CAC mechanism described in Section 5.1.2. In k-SP,each node v, except the source node, stores up to k shortest pathsfrom the source to itself together with the corresponding length inthe array v[1, . . . ,k]. The predecessor of v in the ith shortest pathand the corresponding length are stored in v[i]. p and v[i]. l, respec-tively. There are two parameters in k-SP: wl(p)(u,v) and �l(p), whichare depended on the path length function l(p). Parameter wl(p)(u,v)is the length of link (u,v) and �l(p) is the operator that computespath length from the lengths of the links. The values of the param-eters for the aforementioned path length functions are shown inTable 4.

Page 9: Complexity and design of QoS routing algorithms in wireless mesh networks

Table 4Length of link and path length computing operator for thepath length functions.

l(p) �l(p) wl(p)(u,v)

lHP(p) + 1lLU(p) + jI(u,v)jlRLB(p) + 1

ALBðu;vÞ

lMC(p) + jIðu;vÞ jAABðu;vÞ

lWP(p) Max 1AABðu;vÞ

Table 5QoS routing algorithms based on ACRAF.

Name l(p) s(P)

Wk-MHC lHC(p) argmin lHC(p)Wk-WSP lHC(p) argmax bw(argmin lHC(p))Wk-SWP lWP(p) argmin lHC(argmin lWP(p))Wk-RLB lRLB(p) argmin lRLB(p)Wk-WLU lLU(p) argmax bw(argmin lLU(p))Wk-MC lMC(p) argmin lMC(p)

1730 B. Bakhshi, S. Khorsandi / Computer Communications 34 (2011) 1722–1737

Algorithm 1: An ACRAF-based QoS routing

Input: G = (V,E,C), I, and DOutput: Set of accepted demandsRequire: D is sorted in ascending order of ti

1: Set parameters k, l(p), and s(P)2: for i = 1 to jDj do3: d D[i]4: ACRAF (G, I,d)5: if there is feasible path then6: Add d to the set of accepted demands7: return The set of accepted demands

Algorithm 2: ACRAF

Input: G = (V,E,C), I, and d = (s,d,b, t,e)Output: p = hs ? � � �? diParameter: k, l(p), and s(P)1: Prune (u,v) 2 E if AAB(u,v) < b2: P k-SP (G, I,d,k, l(p))3: p s(P)

Algorithm 3: k-SP

Input: G, I,d,k, l(p)Output: P = {p1, . . . ,pk}

1: for "v 2 Vns do2: for i = 1 to k do3: v[i].p NIL, v[i].l 1, and add v[i] to Q4: s[1].p NIL, s[1].l 0, and add s[1] to Q5: while Q is not empty do6: u[j] EXTRACTMIN(Q)7: p0 GETPARTIALPATH(G,u[j])8: for "(u,v) 2 E and v R p0 do9: if ISFEASIBLE(p0 � < u ? v>) then

10: update false11: for i = 1 to k do12: if update = false and

v[i].l > (wl(p)(u,v) � l(p)u[j].l) then13: v[i].l (wl(p)(u,v) � l(p)u[j].l)14: v[i].p u[j]15: update true16: DECREASEKEY(Q,v[i])17: for i = 1 to k do18: Add GETPARTAILPATH(G,d[i]) to P19: return P

The k-SP algorithm initializes the required data structures inlines 1–4. EXTRACTMIN finds the unvisited instance u[j] that has theminimum u[j].l and removes it from Q. GETPARTIALPATH(G,u[j]) re-turns the partial path p0, from the source node to node u. In lines8–16, k-SP relaxes u[j], in which u updates the length of v[i] ifthe following conditions hold: (i) Node v is not in the partial pathp0, which is checked in line 8; and (ii) Path p0 � hu ? vi is a feasiblepath, which is checked by ISFEASIBLE(p) in line 9; and (iii) As exam-ined in line 12, the current length of the partial path hs ? � � �? v[i]iis greater than the length of the new partial path p0 � hu ? vi, thatis u[j].l � l(p)wl(p)(u,v). In the relaxation of u[j], k-SP must updateonly one of v[i]s through link (u,v), which is enforced by variableupdate.

5.3.1. Parameters of ACRAFThere are three parameters in ACRAF: k, l(p), and s(P). The value

of k determines the efficiency of ACRAF to deal with the NP-completeness of the FBCP problem and to find the minimum lengthpaths. If the value of k is not limited, ACRAF will be exact. It willfind the optimal feasible path if any one exists at the cost of anexponential running-time. To achieve a pseudo-polynomial run-ning-time, the value of k should be restricted. Obtaining the mini-mum value of k that guarantees the exactness of the algorithm is avery difficult problem.

Different combinations of path length function l(p) and selectorfunction s(P) lead to different routing algorithms. The selectorfunction may select the best path according to multiple metrics.We use the notation ‘‘argmin l2(argminl1(p)),’’ if the best path is se-lected according to l1(p) and in the case of existing multiple mini-mum length paths, the selection is performed based on l2(p).Table 5 shows six different algorithms that can be implementedby adjusting the parameters of ACRAF.

5.3.2. Computational complexity analysisThe worst-case complexity of ACRAF depends on the complex-

ity of the k-SP algorithm. We assume that it uses the Fibonacciheap. It creates heap Q in lines 1–4, which takes O(knlog (kn))times. The complexity of EXTRACTMIN is O(log (kn)). The complexityof GETPARTIALPATH is O(n). They execute kn times, therefore the totalcomplexity is O(kn(n + log (kn)). Lines 8–16 execute per (u,v) 2 E infinding a shortest path to all nodes; since k-SP finds k paths to eachnode, these lines execute km times. In these lines, checking v R p0

takes O(n) times, ISFEASIBLE takes OðnbIÞ times, where bI is the sizeof the largest interference set, and the remaining operations areO(1). Lines 17–18 take at most O(kn) times. Combining all theserunning times yields to Oðk-SPÞ ¼ Oðkn logðknÞ þ knðnþ logðknÞÞþkmðnbI þ nÞ þ knÞ ¼ Oðkn logðknÞ þ kn2 þ knmbIÞ. The worst-casecomplexity of s(P) is OðknbIÞ. Therefore OðACRAFÞ ¼ Oðk-SPÞ ¼Oðkn logðknÞ þ kn2 þ knmbIÞ.

6. Optimal solutions

In this section, we find optimal solutions for the FBCP and MARproblems through formulating them as optimization models. Wefirst consider the FBCP problem and develop an optimizationmodel to check the existence of at least one feasible path for a

Page 10: Complexity and design of QoS routing algorithms in wireless mesh networks

B. Bakhshi, S. Khorsandi / Computer Communications 34 (2011) 1722–1737 1731

given demand. Then, we extend the model to find the minimumlength feasible paths. Finally, for the MAR problem, we developan optimal QoS routing algorithm.

6.1. Finding any feasible path

To check the existence of a feasible path for demand d in net-work G, we do not need to optimize any objective function. Thefeasible path must satisfy two constraints. The first one is the con-ventional flow conservation constraint which is

Xðu;vÞ2E

xðu;vÞ �Xðv;uÞ2E

xðv;uÞ ¼1; if u ¼ s

�1; if u ¼ d

0; otherwise

8><>: 8u 2 V ; ð2Þ

and

xðu;vÞ 2 f0; 1g 8ðu;vÞ 2 E: ð3Þ

Where the binary variable x specifies the route of the demand;x(u,v) = 1 if the demand is routed through (u,v) and x(u,v) = 0 other-wise. The flow on each link is specified by

fðu;vÞ ¼ bxðu;vÞ 8ðu; vÞ 2 E: ð4Þ

Note that if there is a set of existing flows, U – {} in the FBCP prob-lem, (4) should be fðu;vÞ ¼ f 0ðu;vÞ þ bxðu;vÞ where f 0ðu;vÞ is the existingflow on (u,v).

The second constraint is the capacity constraint. However, thecapacity constraint for a link needs to be satisfied only if the linkcarries a load. We partition E into two subsets E1 ¼ðu;vÞ 2 E s:t: f 0ðu;vÞ > 0n o

and E2 = En E1. For the links belong to E1,

the capacity constraint is

Xðu0 ;v 0 Þ2Iðu;vÞ

fðu0 ;v 0 Þcðu0 ;v 0Þ

6 1 8ðu; vÞ 2 E1: ð5Þ

For the links in set E2, the capacity constraint should be satisfied ifthe link is used to route the new demand. To model this conditionalconstraint, we use the big M technique and reformulate the capacityconstraint (1) as

Xðu0 ;v 0 Þ2Iðu;vÞ

fðu0 ;v 0 Þcðu0 ;v 0Þ

6 1þMð1� xðu;vÞÞ 8ðu; vÞ 2 E2; ð6Þ

where the parameter M is a very big value4. When (u,v) is not usedin routing, x(u,v) = 0, the right hand side of (6) becomes a very big va-lue, hence (6) does not impose any restriction. When x(u,v) = 1, (6)turns into (5).

Putting these constraints altogether yields the following model.Its solution indicates whether there is a feasible path for demand din network G or not.

Model: FEASIBLEPATH(G, I,d)Objective: No objective functionSubject to: (2)–(6)

It is important to note that this model is an integer linear pro-gramming (ILP) model due to the binary variables x(u,v). ILP modelsare NP-complete in general, and since we proved that FBCP is NP-complete, the FEASIBLEPATH is also intractable, and may not be solvedin a reasonable time.

4 It is easy to show that M must be greater than the size of the largest interferenceset.

6.2. Optimizing path lengths

We mentioned before that the dynamic routing techniqueneeds minimum length paths. The optimization model to find theminimum length feasible path for demand d in network G usingpath length function l(p) is obtained by extending FEASIBLEPATH. Letus assume link weights wl(p)(u,v) are additive; therefore, we needto optimize the following objective function:

minimizeXðu;vÞ2E

xðu;vÞwlðpÞðu; vÞ: ð7Þ

In this model, similar to FEASIBLEPATH, the path should be feasible;thus, its constraints are (2)–(6). Consequently, the desired optimi-zation model is

Model: OPTIMALPATH(G, I,d, l(p))Objective: (7)Subject to: (2)–(7)

6.3. Optimal on-line QoS routing

We develop an optimal QoS routing algorithm to solve the on-line version of the MAR problem according to the following obser-vation. Routing metrics and route selection are issues in the net-work routing problem since it is assumed that existing flows inthe network cannot be rerouted. If we relax this constraint, and as-sume that we can reoptimize flow routes at any given time, it isnot important which path is selected for each flow. In otherwords, the routing metric is not a matter. Obviously, this is anoptimal on-line strategy since we reoptimize the network everytime it is needed.

In the optimal QoS routing problem, we only need to reoptimizerouts at demand arrival times. When a new demand arrives, theoptimal algorithm checks the existence of a feasible solution forthe set active demands through solving an optimization problem.It accepts the new demand if a feasible solution exists for theset; otherwise, the new demand is rejected. The set of active de-mands denoted by D contains the new demand and all the existingflows (demands that were accepted and have not finished yet). Theoptimization model we need in this algorithm is very similar toFEASIBLEPATH with the difference that we should find feasible pathsfor a set of flows. We relax FEASIBLEPATH to get a Linear Programming(LP) model, which is much easier than the ILP model. In this relax-ation, we remove the binary variable x and assume that flows aresplittable; in other words, we use multi-path routing. Furthermore,we use (1) for the capacity constraint instead of (5) and (6). Thisshrinks the solution space of the problem because we enforce thecapacity constraint for all links even if they do not carry any load.However, its effect is negligible specially when there are severalflows in the network. Because in this case, the flows are split overalmost all links, and consequently the combination of (5) and (6) isequivalent to (1). The optimization model is obtained as follows.Constraints (3) and (4) are removed, and constraint (2) nowbecomes:

Xðu;vÞ2E

fðu;vÞ;di�Xðv;uÞ2E

fðv;uÞ;di¼

bi; if u ¼ si

�bi; if u ¼ di

0; otherwise

8><>: 8di 2 D;8u 2 V ;

ð8Þ

where fðu;vÞ;diis the flow of demand di on link (u,v). The capacity con-

straint is:

Xðu0 ;v 0 Þ2Iðu;vÞ

Pdi2D

f ðu0 ;v 0Þ;di

cðu0 ;v 0Þ6 1 8ðu; vÞ 2 E: ð9Þ

Page 11: Complexity and design of QoS routing algorithms in wireless mesh networks

1732 B. Bakhshi, S. Khorsandi / Computer Communications 34 (2011) 1722–1737

Finally, the model is

Model: FEASIBLESETðG; I;DÞObjective: No objective functionSubject to: (8) and (9)

Note that solving this model may reroute all the exiting flows.The optimal QoS routing algorithm is developed using this optimi-zation model as shown in Algorithm 4. In this algorithm, if di is re-jected, it is removed from the set of active demands in line 9;moreover, it is removed in line 12 if it is finished.

Algorithm 4: OPTIMALQR

Input: G, I, and DOutput: The set of accepted demandsRequire: D is sorted in ascending order of ti

1: Create empty set D2: for i = 1 to jDj do3: di D[i]4: Add di to D

5: Solve FEASIBLESETðG; I;DÞ6: if FEASIBLESET has a feasible solution then7: Add di to the set of accepted demands8: else9: Remove di from D

10: for each dj 2 D do11: if ej < ti+1 then12: Remove dj from D13: return The set of accepted demands

7. Simulation results

In this section, we present simulation results to evaluate theperformance of ACRAF and the routing algorithms based on it. First,we consider the performance of ACRAF to deal with the NP-completeness of the FBCP problem. Next, we investigate theproblem of optimizing path lengths. Then, the performance ofthe routing algorithms in Table 5 is compared. Finally, we presentthe results on the overhead of ACRAF.

7.1. Simulation setup

The performance of bandwidth constrained routing algorithmsdepends on network topology (average node degree) and networkload [44]. We evaluate the algorithms in different topologies,which are shown in Table 6. These topologies are general multi-channel multi-radio WMNs, in which c = 100 Mbps, C = 10, andthe number of radios of each node is a uniform random variablein the range from 2 to 5. A static channel assignment is performedby the Greedy minimum interference algorithm [45]. The interfer-ence sets are computed using the interference range model, whereTR = 150 m and IR = 350 m. In dense and sparse grid topologies, the

Table 6Simulated topologies.

Name Area (m2) n m Nodeplacement

Average nodedegree

Dense-10 675 � 675 100 1004 Grid 10.04Dense-8 525 � 525 64 612 Grid 9.56Random 1000 � 1000 100 656 Random 6.56Sparse 1350 � 1350 100 360 Grid 3.6

distance between nodes in each row (column) is TR2 and TR,

respectively.We use a flow-level event-driven simulator developed in Java.

In each experiment, there is a set of demands D = {di = (si,di,bi,ti,ei)}. The source and destination of each demand are randomlychosen. Its bandwidth requirement is a uniform random variablein the interval [1,10] Mbps. The holding time, ei � ti, is an exponen-tial random variable with mean 5 min. Demand arrival rate is aPoisson random variable.

In the FBCP problem, it is assumed that there is a number ofexiting flows, which are denoted by set U. To simulate it, whichis needed in Sections 7.2 and 7.3, we perform the following steps.At the beginning of the simulation, we create a demand, attempt toaccept it using Wk-SWP, and allocate the required bandwidth if ac-cepted; we repeat this procedure until the desired number of flowsis generated. These accepted demands are not removed until theend of the simulation. This leads to an almost random distributionof ALB(u,v) in the network. The results presented in the followingare the average of 10 experiments with different sets U and D.

7.2. Dealing with NP-completeness

To evaluate the performance of ACRAF to deal with the NP-completeness of the FBCP problem, we compare it to theFEASIBLEPATH model and use the following metric.

Definition 11. The success rate of algorithm A, SrðAÞ, is thenumber of demands that algorithm A accepts divided by thenumber of demands that FEASIBLEPATH accepts.

This metric is computed as follows. At the beginning, as ex-plained in Section 7.1, we create a number of existing flows. Then,for each demand d 2 D, we attempt to find a feasible path by theACRAF-based routing algorithm and by the FEASIBLEPATH model.We count the number of demands that each approach can accept.Since we only evaluate the ability to find a feasible path in this sec-tion, we do not create a flow for the accepted demands.

Fig. 5 shows the success rate of the Wk-MHC algorithm, whichis selected as a sample of the ACRAF-based routing algorithms inthis simulation, versus the number of existing flows, jUj. This fig-ure shows that, first, the FBCP problem is not very difficult espe-cially in lightly loaded sparse networks as ACRAF achieves a highsuccess rate. Second, ACRAF with k = 5 improves Sr(Wk�MHC) upto 9% in comparison to Dijkstra’s algorithm (ACRAF with k = 1) inFig. 5(a). Third, there is a critical number of existing flows whereACRAF has the worst success rate, e.g., 35 in Fig. 5(a), 42 inFig. 5(b), and 60 in Fig. 5(c). When the number of existing flowsis much less than the critical value, there are multiple feasiblepaths for each demand; in this case, ACRAF can find one of themeasily. When the number of existing flows is higher than the criti-cal value, there is not any feasible path for most of the demands; inthis case, the network pruning and CAC procedures shrink searchspace significantly which leads to the high success rates.

7.3. Achieving path length optimality

We evaluate the ability of ACRAF to find the minimum lengthfeasible paths by comparing it to the optimal solution obtainedby the OPTIMALPATH model. We use the optimality ratio metric,which is defined as follows, to quantify the ability.

Definition 12. Optimality ratio of algorithm A, OrðAÞ, is thelength of the feasible path found by the algorithm for a givendemand, divided by the length of the path found by the OPTIMALPATH

model for the demand.

Page 12: Complexity and design of QoS routing algorithms in wireless mesh networks

20 25 30 35 40 45 501

1.002

1.004

1.006

1.008

1.01

1.012

1.014

1.016

1.018

# of existing flows

Or (

Wk−

MH

C)

k=1k=2k=3k=4k=5

10 15 20 25 30 35 40 45 50 55 601

1.002

1.004

1.006

1.008

1.01

1.012

# of existing flows

Or (

Wk−

MH

C)

k=1k=2k=3k=4k=5

30 40 50 60 70 80 901

1.001

1.002

1.003

1.004

1.005

1.006

1.007

1.008

1.009

# of existing flows

Or (

Wk−

MH

C)

k=1k=2k=3k=4k=5

Fig. 6. Optimality ratio (Definition 12) of the Wk-MHC algorithm versus thenumber of existing flows, jDj = 200.

5 10 15 20 25 30 35 40 45 500.88

0.9

0.92

0.94

0.96

0.98

1

# of existing flows

Sr (W

k−M

HC

)

k=1k=2k=3k=4k=5

7 14 21 28 35 42 49 56 630.95

0.96

0.97

0.98

0.99

1

# of existing flows

Sr (W

k−M

HC

)

k=1k=2k=3k=4k=5

15 30 45 60 75 900.92

0.93

0.94

0.95

0.96

0.97

0.98

0.99

1

# of existing flows

Sr (W

k−M

HC

)

k=1k=2k=3k=4k=5

Fig. 5. Success rate (Definition 11) of the Wk-MHC algorithm versus the number ofexisting flows, jDj = 200.

B. Bakhshi, S. Khorsandi / Computer Communications 34 (2011) 1722–1737 1733

This metric is computed in a similar way that SrðAÞ is com-puted. We first create a number of existing flows; then, we com-pare the length of the feasible paths found by A and OPTIMALPATH

for each demand. Here, we again selected Wk-MHC as a sampleof the ACRAF-based routing algorithms. The optimality ratios ofWk-MHC versus the number of existing flows in the Random,

Dense-10, and Sparse topologies are shown in Fig. 6. These figuresshow that ACRAF, even with k = 2, performs notably better thanDijkstra’s algorithm. In addition, it is seen that the paths foundby ACRAF are typically not longer than the optimal path more than0.2–0.6%. Optimality ratio has a similar behavior to the success rateversus the number of existing flows. When there are very few flows

Page 13: Complexity and design of QoS routing algorithms in wireless mesh networks

6 12 18 24 300.5

0.55

0.6

0.65

0.7

0.75

0.8

0.85

0.9

0.95

1

Arrival Rate (demand / min)

Ar (A

)

Wk−MCWk−MHCWk−RLBWk−SWPWk−WLUWk−WSPOptimalQR

8 16 24 32 400.4

0.45

0.5

0.55

0.6

0.65

0.7

0.75

0.8

0.85

0.9

0.95

1

Arrival Rate (demand / min)

Ar (A

)

Wk−MCWk−MHCWk−RLBWk−SWPWk−WLUWk−WSPOptimalQR

10 20 30 40 500.55

0.6

0.65

0.7

0.75

0.8

0.85

0.9

0.95

1

Arrival Rate (demand / min)

Ar (A

)

Wk−MCWk−MHCWk−RLBWk−SWPWk−WLUWk−WSPOptimalQR

Fig. 7. Acceptance rate (Definition 13) of the algorithms in Table 5 versus demandarrival rate. k = 4, and j Dj = 500.

1734 B. Bakhshi, S. Khorsandi / Computer Communications 34 (2011) 1722–1737

in the network, one of the k paths found by ACRAF, is the minimumlength path; therefore, Or � 1. In the case of a high number ofexisting flows, a very limited number of demands are accepted;and for most of them, there is only one feasible path, which isthe minimum length feasible path. Consequently, the paths foundby ACRAF are optimal, that implies Or � 1.

7.4. Effect of routing metrics

In this section, we consider the MAR problem and study the ef-fect of the routing metric used in ACRAF on the approximate solu-tion obtained from it. In addition to the six ACRAF-based routingalgorithms shown in Table 5, we simulated the OPTIMALQR algo-rithm. To evaluate the performance of the algorithms, we considerthe following widely used metric.

Definition 13. Acceptance rate of algorithm A, ArðAÞ, is thenumber of accepted demands by the algorithm divided by the totalnumber of demands.

To measure this metric in each experiment, we create a set ofdemands and apply the algorithms on them. Contrary to Sections7.2 and 7.3, there is not any existing flow at the beginning, andwe allocate the required bandwidth for each accepted demand tomeasure the efficiency of network resource utilization. Fig. 7 de-picts the performance of the algorithms in the Random, Dense-8,and Sparse topologies. In these simulations, we used the Dense-8topology instead of Dense-10 because solving the FEASIBLESET model,which is needed in each iteration of OPTIMALQR, is time consumingin the Dense-10 topology.

These figures show that, first, the adapted versions of thetraditional routing metrics outperform their correspondingwireline versions; for instance, Wk-MC outperforms Wk-RLB, andWk-WLU outperforms Wk-WSP. Second, the average node degreehas a considerable influence on the performance of the algorithms.Comparing Fig. 7(c) and (b) shows that the average acceptance rateof each algorithm in Dense-8 is much less than in the Sparse topol-ogy. Third, Wk-SWP and Wk-MC are, respectively, the worst andbest routing algorithms, independent of the network topologyand load. This is contrary to the results in wireline networks[41], which showed to optimize network performance in lightlyloaded networks, routing metrics should give preference to loaddistribution, i.e., we should use SWP like algorithms. However,our results show that in WMNs, resource consumption should bepreferred over load balancing regardless of the network load andtopology.

In these figures, as it is expected, the acceptance rate of theOPTIMALQR algorithm is better than the ACRAF-based algorithmsdue to two reasons. First, the algorithm is allowed to reroute allexisting flows. Therefore, at each demand arrival time, if it isneeded, OPTIMALQR reroutes existing flows to find a feasible pathfor the new demand. However, ACRAF-based algorithm cannot re-route existing flows; they have to provide sufficient resources forupcoming demands through finding an appropriate feasible pathfor each demand. Second, OPTIMALQR uses multi-path routing whilethe ACRAF-based algorithms are single-path. Even when there isnot any single feasible path for a bandwidth intensive demand,OPTIMALQR can accept it by splitting the demand into multiplelow-bandwidth flows and routing them.

7.5. Overhead

In Section 5.3, we mentioned that the running-time of ACRAF ispseudo-polynomial since the value of k is limited. This limitationcauses that the ACRAF-based routing algorithms cannot find arbi-trary feasible paths. In this section, we present simulation results

on the trade-off between the overhead of ACRAF and its ability tofind a feasible path with respect to the value of k.

We analyzed the computational complexity of ACRAF in Sec-tion 5.3.2, and showed it is mainly determined by the computa-tional complexity of the k-SP algorithm. The computationaloverhead of k-SP is mostly due to relaxing links in lines 8–16.

Page 14: Complexity and design of QoS routing algorithms in wireless mesh networks

Table 7Overhead of ACRAF in terms of the number of updates per accepted demand.

Configuration k

Topology jUj 3 20 200

Overhead Sr Overhead Sr Overhead Sr

Sparse 50 146.53 0.996 778.48 1.0 3415.77 1.060 133.01 0.982 730.93 0.996 3092.74 1.070 87.41 1.0 412.05 1.0 1163.59 1.0

Dense-10 30 193.25 1.0 1001.21 1.0 6562.58 1.040 147.78 0.98 731.75 0.995 4265.03 1.050 137.41 0.991 664.56 0.991 3599.43 1.0

Random 25 180.69 1.0 944.91 1.0 6364.93 1.035 153.46 0.962 788.41 0.995 5174.21 1.045 85.06 1.0 392.27 1.0 2171.53 1.0

B. Bakhshi, S. Khorsandi / Computer Communications 34 (2011) 1722–1737 1735

When the conditions in lines 8, 9, and 12 hold, link (u,v) is selectedthat updates the weight and predecessor of v[j] in lines 13–16.According to these observations, we measure the overhead of AC-RAF in terms of the number of updates in lines 13–16 per accepteddemand, which is the overhead we have to pay to find each feasiblepath. In this section, since we intend to measure the trade-off be-tween the overhead and the path-finding ability of ACRAF, weslightly modified it, ACRAF finishes as soon as it finds a feasiblepath.

We simulate ACRAF with three different values of k, small(k = 3), medium (k = 20), and large (k = 200). With the large va-lue of k, ACRAF becomes an exhaustive search algorithm in oursimulations, it finds a feasible path if any exists. Table 7 showsthe simulation results, where the success rate of Wk-MHC andits overhead are presented. For each topology, we used threedifferent numbers of existing flows, jUj. These numbers wereselected according to the critical value of each topology shownin Fig. 5. The first number is less than the critical value, thesecond one is near the value, and the last number is greaterthan the value. This table shows the following results. First, AC-RAF achieves high success rates with an acceptable overheadusing small values of k. However, to be an exact algorithm,the value of k should be very large that yields a significantoverhead, e.g., up to 30 times in comparison to the small val-ues. Second, the overhead diminishes considerably by increasingthe number of existing flows. It is due to the network pruning.When many flows exist in the network, most of the links havenot sufficient available bandwidth and are pruned, whichshrinks the search space significantly. Third, the worst successrate of ACRAF in each topology is the case where jU j is aboutthe critical value of the topology, this confirms the previous re-sults depicted in Fig. 5.

8. Conclusions and future work

We have studied the problem of bandwidth constrained routingin WMNs. We analyzed the effect of interference models on thecomplexity of the problem, and showed that except a few specialcases, the problem of finding a feasible path is NP-complete. Weproposed ACRAF to solve the problem. We also investigated theproblem of optimum utilization of network resources. To achievethis, we used the dynamic routing technique and developed rout-ing metrics to consider both interferences and bandwidth. Wedeveloped six routing algorithms by adjusting the parameters ofACRAF. Moreover, we developed three optimization models: amodel to check the existence of a feasible path, a model to opti-mize path lengths, and another to find the maximum number ofacceptable demands.

Comparisons between ACRAF and the optimization modelsshowed that it can find most of existing feasible paths, optimizespath length efficiently, and has comparable performance to theoptimal QoS routing. We simulated the ACRAF-based routingalgorithms in three networks with different average node degreesunder various network loads. It showed that the performance ofthe algorithms depends on network topology and offered load;however, in all cases, the Wk-MC algorithm outperforms theothers.

In this paper, we assumed that the static interference sets aregiven, and solved the QoS routing problem. In the future, we planto study the problem of joint QoS routing and interference man-agement, which can be accomplished by e.g., channel assignmentand power control.

Acknowledgments

The authors thank the reviewers for their helpful comments andFernando A. Kuipers for commenting on the proof of the NP-completeness of FBCP.

Appendix A. Proofs

A.1. Proof of Theorem 1

The proof of Theorem 1 is as follows:

Proof. We prove both parts by contradiction.

Assume that there is an infeasible path p in the pruned network.Since flow / through path p does not consume ALB(u,v) if(u,v) R AL(p), infeasiblity of the path can only be due to thefollowing cases: there is (u,v) 2 p s.t. ALB(u,v) < BC(/, (u,v)) or thereis (u0,v0) 2 AL(p)np s.t. ALB(u0,v0) < BC(/, (u0,v0)). The first case is notpossible because of the pruning rule 1. The second case impliesthat $(u,v) 2 p s.t. (u0,v0) 2 I(u, v) and therefore ðu;vÞ 2 Iðu0 ;v 0 Þ, whichis due to the assumptions about interference sets mentioned inSection 3.2. However, this is also impossible because ifALB(u0,v0) < BC(/, (u0,v0)) then (u,v) must be pruned by the secondrule.

To prove the second part, let p be a feasible path that isexcluded from the pruned network. Without loss of generality,assume that the path is excluded due to pruning link (u,v).Pruning (u,v) implies that there is a path p0 and its correspond-ing flow /0 = (s,d,b,p0) such that ALB(u,v) < BC(/0, (u,v)) or $(u0,v0)s.t. ðu;vÞ 2 Iðu0 ;v 0 Þ and ALB(u0,v0) < BC(/0, (u0,v0)). Since the band-width consumption is the same for all paths, we haveALB(u,v) < BC(/, (u,v)) or ALB(u0,v0) < BC(/, (u0,v0)) where / is theflow corresponding to p. However, these mean that p is notfeasible because either (u,v) or (u0,v0) 2 AL(p) has not sufficientavailable bandwidth. h

A.2. Proof of Theorem 3

We prove Theorem 3 by reducing the Path with Forbidden Pairs(PFP) problem to the FBCP problem. The PFP problem is defined asfollows [46].

Problem: Path with forbidden pairs (PFP).Instance: Graph G = (V,E), a set of forbidden pairsFN = {{u1,v1}, . . . , {uq,vq}}, and nodes s and d.Question: Is there any path p = hs ? � � �? di such that containsat most one vertex from each pair in FN?

Page 15: Complexity and design of QoS routing algorithms in wireless mesh networks

Fig. A.8. An instance of PFP and its corresponding instance of FBCP.

1736 B. Bakhshi, S. Khorsandi / Computer Communications 34 (2011) 1722–1737

Proof. For the sake of simplicity of presentation, we assume thatin PFP each node belongs to only one forbidden pair. This restric-tion will be removed later. For a given instance (G,FN,s,d) of PFP,we construct an instance (G0, I,U,d) of FBCP. We assume that thereis no restriction on the number of radios and channels. The keyobservation is that nodes are the conflicting entities in PFP but inFBCP with the interference range model, links are interfering witheach other. Hence, to construct G0, we replace nodes in G by links inG0 as follows:

� Each node u 2 G is replaced by two nodes u and u0 and a link(u,u0) in G0 where cðu;u0 Þ ¼ 1.� The outgoing links of node u in G, (u,v) 2 E, are represented by

(u0,v) in G0 where cðu0 ;vÞ ¼ 1.

To form the desired interference sets:

� Set IR =1, all links are in the interference range of each other.� Assign a common channel to all links {(u0,v)" u0 2 G0}.� For each pair {u,v} 2 FN, assign the same channel to links (u,u0)

and (v,v0). However, the channel should be unique in thenetwork.� Assign a unique channel to every remaining link (u,u0) where u

does not belong to any forbidden pair in FN.

An instance of PFP and its corresponding transformed topologyare depicted in Fig. A.8. To complete the description of the instanceof FBCP, we set U = {} and d = (s,d0,b = 1,0,1). We use the followingfacts to complete the proof.

F1. Iðu;u0 Þ ¼ fðu;u0Þ; ðv ;v 0Þg if and only if ${u,v} 2 FN, and sincecðu;u0 Þ ¼ cðv ;v 0 Þ ¼ 1, only (u,u0) or only (v,v0) can be present inthe solution of FBCP.

F2. Iðu;u0 Þ ¼ fðu;u0Þg if and only if 9= {u,v} 2 FN, and sincecðu;u0 Þ P b, it can be in the solution of FBCP independent ofother links.

F3. Whereas all links {(u0,v)"u0 2 G0} are interfering with eachother, they can be in the solution of FBCP independent ofeach other because cðu0 ;vÞ ¼ 1.

We claim that path p0 ¼ hs! s0 ! u1 ! u01 ! u2 !u02 ! � � � ! d! d0i is a feasible solution for FBCP, if and only ifpath p = hs ? u1 ? u2 ? � � �? di is a feasible solution for PFP. Let p0

be feasible. If {u,v} 2 FN, due to fact F1, only (u,u0) or (v,v0) is in p0

which implies only u or v is in p and hence, p is feasible. Assume pis a feasible path for PFP, p0 is a feasible solution for FBCP becausethe capacity constraint of (u0,v)"u0 2 G0 is satisfied due to fact F3,this constraint is satisfied for (u,u0) due to F2 if 9= {u,v} 2 FN anddue to feasibility of p and F1 if ${u,v} 2 FN. These complete theproof.

If node u belongs to multiple forbidden pairs, the proof is thesame; however, the node should be replaced by multiple nodes andlinks. For example, assume {u,v1}, {u,v2} 2 FN, node u is replaced bythree nodes u, u0, and u0 and two links (u,u0) and (u0,u00). Theoutgoing link (u,v) is represented by (u0,v), the same channel isassigned to both links (u,u0) and v1;v 01

� �, and the same channel is

assigned to both links (u0,u00) and v2; v 02� �

. h

References

[1] Y. Yang, R. Kravets, Contention-aware admission control for ad hoc networks,IEEE Transactions on Mobile Computing 4 (2005) 363–377.

[2] R. Guerin, A. Orda, D. Williams, QoS routing mechanisms and OSPF extensions,in: IEEE GLOBECOM, 1997.

[3] Z. Wang, J. Crowcroft, Quality-of-service routing for supporting multimediaapplications, IEEE Journal on Selected Areas in Communications 14 (1996)1228–1234.

[4] M. Kodialam, T. Lakshman, Minimum interference routing with applications toMPLS traffic engineering, in: IEEE INFOCOM, 2000.

[5] S. Suri, M. Waldvogel, D. Bauer, P.R. Warkhede, Profile-based routing and trafficengineering, Computer Communications 26 (2003) 351–365.

[6] F. Ricciato, U. Monaco, Routing demands with time-varying bandwidth profileson a MPLS network, Computer Networks 47 (2005) 47–61.

[7] Q. Xue, A. Ganz, Ad hoc QoS on-demand routing (AQOR) in mobile ad hocnetworks, Journal of Parallel and Distributed Computing 63 (2003) 154–165.

[8] S. Chen, K. Nahrstedt, Distributed quality-of-service routing in ad hoc networks,IEEE Journal on Selected Areas in Communications 17 (1999) 1488–1505.

[9] Y. Ge, T. Kunz, L. Lamont, Quality of service routing in ad-hoc networks usingOLSR, in: Hawaii International Conference on System Sciences, 2003.

[10] H. Zhu, I. Chlamtac, Admission control and bandwidth reservation in multi-hop ad hoc networks, Computer Networks 50 (2006) 1653–1674.

[11] A. Derhab, Low-cost and accurate intra-flow contention-based admissioncontrol for IEEE 802.11 ad hoc networks, in: ADHOC-NOW, 2008.

[12] L. Chen, W. Heinzelman, QoS-aware routing based on bandwidth estimationfor mobile ad hoc networks, IEEE Journal on Selected Areas in Communications23 (2005) 561–572.

[13] P. Sinha, R. Sivakumar, V. Bharghavan, CEDAR: a core-extraction distributed adhoc routing algorithm, in: IEEE INFOCOM, 1999.

[14] V. Kone, S. Das, B.Y. Zhao, H. Zheng, QUORUM: quality of service routing inwireless mesh networks, in: QSHINE, 2007.

[15] Q. Xue, A. Ganz, QoS routing for mesh-based wireless LANs, InternationalJournal of Wireless Information Networks 9 (2002) 179–190, doi:10.1023/A:1016085627790.

Page 16: Complexity and design of QoS routing algorithms in wireless mesh networks

B. Bakhshi, S. Khorsandi / Computer Communications 34 (2011) 1722–1737 1737

[16] X. Cheng, P. Mohapatra, S.-J. Lee, S. Banerjee, MARIA: interference-awareadmission control and QoS routing in wireless mesh networks, in: IEEE ICC,2008.

[17] R. Gupta, Z. Jia, T. Tung, J. Walrand, Interference-aware QoS routing(IQRouting) for ad-hoc networks, in: IEEE GLOBECOM, 2005.

[18] Z. Jia, R. Gupta, J. Walrand, P. Varaiya, Bandwidth guaranteed routing for ad-hoc networks with interference consideration, in: IEEE ISCC, 2005.

[19] J. Tang, G. Xue, W. Zhang, Interference-aware topology control and QoS routingin multi-channel wireless mesh networks, in: ACM MobiHoc, 2005.

[20] B. Raman, K. Chebrolu, D. Gokhale, S. Sen, On the feasibility of the linkabstraction in wireless mesh networks, IEEE/ACM Transactions on Networking17 (2009) 528–541.

[21] L. Chen, W. Heinzelman, A survey of routing protocols that support QoS inmobile ad hoc networks, IEEE Network 21 (2007) 30–38.

[22] T.B. Reddy, I. Karthigeyan, B. Manoj, C.S.R. Murthy, Quality of serviceprovisioning in ad hoc wireless networks: a survey of issues and solutions,Ad Hoc Networks 4 (2006) 83–124.

[23] C. Liu, K. Leung, A. Gkelias, A novel cross-layer QoS routing algorithm forwireless mesh networks, in: IEEE ICOIN, 2008.

[24] H. Wang, K.C. Yow, QoS routing in multi-channel multihop wireless networkswith infrastructure support, in: InterSense, 2006.

[25] T. Liu, W. Liao, Interference-aware QoS routing for multi-rate multi-radiomulti-channel IEEE 802.11 wireless mesh networks, IEEE Transactions onWireless Communications 8 (2009) 166–175.

[26] C.-C. Hu, Y.-L. Kuo, C.-Y. Chiu, Y.-M. Huang, Maximum bandwidth routing andmaximum flow routing inwireless mesh networks, TelecommunicationSystems 44 (2010) 125–134, doi:10.1007/s11235-009-9217-2.

[27] R. Hou, K.-S. Lui, H.-S. Chiu, K.L. Yeung, F. Baker, Routing in multi-hop wirelessmesh networks with bandwidth guarantees, in: ACM MobiHoc, 2009.

[28] T. Salonidis, M. Garetto, A. Saha, E. Knightly, Identifying high throughput pathsin 802.11 mesh networks: a model-based approach, in: IEEE ICNP,2007.

[29] G. Sharma, R.R. Mazumdar, N.B. Shroff, On the complexity of scheduling inwireless networks, in: ACM MobiCom, 2006.

[30] C.-Y. Chiu, Y.-L. Kuo, E.-K. Wu, G.-H. Chen, Bandwidth-constrained routingproblem in wireless ad hoc networks, IEEE Transactions on Parallel andDistributed Systems 19 (2008) 4–14.

[31] L. Georgiadis, P. Jacquet, B. Mans, Bandwidth reservation in multihop wirelessnetworks: complexity and mechanisms, in: International Conference onDistributed Computing Systems, 2004.

[32] D.M. Shila, T. Anjali, Load aware traffic engineering for mesh networks,Computer Communications 31 (2008) 1460–1469. Special Issue: ResourceManagement and routing in Wireless Mesh Networks.

[33] R. Draves, J. Padhye, B. Zill, Routing in multi-radio, multi-hop wireless meshnetworks, in: ACM MobiCom, 2004.

[34] Y. Yang, J. Wang, R. Kravets, Designing routing metrics for mesh networks, in:IEEE Workshop on Wireless Mesh Networks (WiMesh), 2005.

[35] Y. Yang, J. Wang, R. Kravets, Interference-aware load balancing for multihopwireless networks, Technical report UIUCDCS-R-2005-2526, Department ofComputer Science, University of Illinois at Urbana-Champaign, 2005.

[36] A.P. Subramanian, M.M. Buddhikot, S.C. Miller, Interference aware routing inmulti-radio wireless mesh network, in: WiMesh, 2006.

[37] R. Pal, A lexicographically optimal load balanced routing scheme for wirelessmesh networks, in: IEEE ICC, 2008.

[38] P. Gupta, P. Kumar, The capacity of wireless networks, IEEE Transactions onInformation Theory 46 (2000) 388–404.

[39] R. Gupta, J. Musacchio, J. Walrand, Sufficient rate constraints for QoS flows inad-hoc networks, Ad Hoc Networks 5 (2007) 429–443.

[40] A. Iyer, C. Rosenberg, A. Karnik, What is the right model for wireless channelinterference?, IEEE Transactions on Wireless Communications 8 (2009) 2662–2671

[41] Q. Ma, P. Steenkiste, On path selection for traffic with bandwidth guarantees,in: International Conference on Network Protocols, 1997.

[42] Y. Yang, J. Wang, R. Kravets, Load-balanced routing for mesh networks, ACMMobile Computing and Communications Review 10 (2006) 3–5.

[43] H. Aiache, V. Conan, L. Lebrun, S. Rousseau, A load dependent metric forbalancing Internet traffic in wireless mesh networks, in: IEEE MASS, 2008.

[44] K. Kowalik, M. Collier, Should QoS routing algorithms prefer shortest paths?,in: IEEE ICC, 2003.

[45] A. Subramanian, H. Gupta, S. Das, J. Cao, Minimum interference channelassignment in multiradio wireless mesh networks, IEEE Transactions onMobile Computing 7 (2008) 1459–1473.

[46] M. Garey, D. Johnson, Computers and Intractability: A Guide to the Theory ofNP-Completeness, WH Freeman and Company, San Francisco, Calif, 1979.