An Efficient Approach To Support Qos and Bandwidth Efficiency in
An Efficient Approach To Support Qos and Bandwidth Efficiency in
R.Mynuddin Sulthani1 and D.Sreenivasa Rao 2, Professor in CSE Dept, Madanapalle Institute of Technology & Science (MITS), Madanapalle, Chittoor (Dt), A.P., India. 2 Professors in ECE Dept, JNTU College of Engg, JNT University, Hyderabad, A.P., India. [email protected], [email protected] power management, security and quality of service (QoS) issues. As the nodes communicate over wireless links, each node should fight against the highly erratic nature of wireless channels as well as interference from other transmitting nodes. These factors make it a challenging problem to maximize data throughput while meeting user-required QoS in wireless ad-hoc networks Owing to mobility of the nodes and interference among nodes, great difficulty in implementing ad-hoc networks comes from frequent route changes. The high packet loss rates and frequent topological changes make the transport layer unstable and limit the amount of traffic that the network can carry. Three well-known problems in ad-hoc networks are the lack of reliable packet delivery due to interference and movement of nodes, limited bandwidth due to channel restrictions, and limited node lifetime due to small battery size [14]. Towards enlarging the life span of the network fairness of access to the network, research in QoS issues in wireless ad-hoc network is generally oriented. Along with it, the issues of connections among heterogeneous nodes are treated. For traffic flows in mobile ad-hoc networks, there is much need of research in offering reliable transport services as well as giving QoS guarantees. Since the size of the ad-hoc networks is huge, good scalability of the QoS architecture is necessary. In the case of preceding works on QoS in ad-hoc networks, the scalability issues are very hardly ever measured. On Call Admission Control (CAC) [2], there are numerous research works in wireless networks. Established end-end probing-based admission control possibly will not complete the delay necessity, because the network size is large. On the other hand, network overload can only be thwarted by CAC based on existing bandwidth not including mobility. In order to permit a flow under mobility the topology may be modified. This is ensuing in modifications of traffic distribution in the network. Therefore, even if
Abstract
With the increasing widespread use of wireless technologies, Quality of service (QoS) provisioning in ad hoc networks remains a challenging task. Good scalability of the QoS architecture is necessary, as the size of the ad hoc networks is huge. In this paper we propose a design of an efficient QoS architecture (DEQA) for mobile ad-hoc networks, which consists of a multi-path routing protocol, a call admission control scheme (CAC) and a congestion control mechanism. The multi-path routing protocol utilizes erasure code techniques for producing replicated fragments for each packet, to enhance reliability. Important fragments can be sent through the paths with strong connectivity and high delivery probability. While it receives an assured number of fragments, destination can recover the original packet. In the CAC scheme, requests are admitted based on the bandwidth availability of the path. To avoid performance degradation due to mobility-triggered congestion, a congestion control mechanism has been developed. Once congestion occurs, the best effort traffic is rate controlled, to free bandwidth for the real-time flows. All these schemes together make the proposed QoS architecture scalable to large network size and mobility. By simulation results, it has been shown that, this architecture allows us to provide reliable QoS in ad-hoc networks increases the available bandwidth, performs load balancing in the network and increases lifetime.
Reliable,
The ad-hoc wireless network is recognized as an extraordinary case of wireless network, which has no fixed backbone infrastructure. Owing to the above mentioned property, wireless ad-hoc networks can be flexible and rapidly deployed, but also poses significant technical challenges. Numerous challenges include effective routing, medium access,
49
there is sufficient bandwidth at the time of flow admission, overcrowding might still take place under mobility. This paper proposes a design of a scalable and reliable QoS architecture for mobile ad-hoc networks. It consists of i) a multi-path routing protocol, ii) a call admission control (CAC) scheme and iii) a congestion control mechanism. Towards enhancing reliability, a multi-path routing protocol, utilizing erasure code techniques for producing replicated fragments for each packet, has been proposed. After establishing the multiple paths, they can be arranged based on their strong connectivity and delivery probability. Important fragments can be sent through the stronger paths among the replicated fragments. The subsequent stronger path can be chosen from the list, if there are some unpredicted faults that happen in the path. While it receives an assured number of fragments, destination can recover the original packet. In the proposed CAC scheme, the calls based on the bandwidth availability of the path are admitted. The QoS routing to propagate bandwidth information throughout the network is adopted. An additional congestion control scheme has been developed to thwart performance degradation as a result of mobility-triggered congestion. To assign free bandwidth for the real-time flows, best effort traffic must be rate controlled once congestion occurs. All these schemes together make the proposed QoS architecture scalable to large network size and mobility.
2. Related Work
In [1], the authors have introduced and evaluated the DLite algorithm, a novel approach to service differentiation in ad-hoc networks, which applies a fair queuing scheme with separate queues for each service class. Late packets of delay constrained classes are dropped in intermediate routers. DLite is easy to implement and requires low computational overhead. It allows for adaptive multimedia applications and permits gradual deployment. In [2], the authors have proposed a scalable QoS architecture for ad-hoc networks. This scheme draws upon the positive aspects of both IntServ and DiffServ, and extends upon the scalable LANMAR routing protocol to support QoS and also it is capable of incorporating mobile backbone networks (MBNs) to further improve the scalability. In [3], the authors have proposed a new QoS framework for MANETsAdaptive Reservation and Pre-allocation Protocol (ASAP). By using two signaling messages, ASAP provides fast and efficient QoS support while maintaining adaptation flexibility and minimizing wasted reservations In [4], the authors have performed a study on the
various queuing schemes for multi-hop wireless networks and examine the fairness and throughput performance of each scheme. Each scheme offers a different degree of fairness. While relatively simple queuing schemes require less hardware and processing budget, they inevitably lack good fairness and performance. In contrast, the scheme that provides fairness requires per-flow (i.e., networklayer flow) queuing. In [5], the authors have presented an agent based scheme for efficient management of radio resources in hybrid wireless networks. Performance of the agent based scheme is measured in terms of successful handover rate between different wireless network architectures (e.g., WLAN, Cellular), and also by the allocated bandwidth to admitted calls. In [6], the authors have discuss a new packet scheduling models for an multi-hop wireless network, and which ensures fair allocation of basic channel service while seeking to maximize spatial reuse. The objective of the above model is to devise effective scheduling disciplines to provide packet-level QoS in terms of throughput, delay and fairness. The authors demonstrate a packetized algorithm that realizes the scheduling model with analytically provable performance bounds. In addition a backoff-based distributed implementation is designed in the above mentioned paper, which closely emulates the ideal centralized algorithm. The above mentioned paper also demonstrates the effectiveness of the devised algorithm through both simulations and analysis. In [7], the authors have proposed a QoS-aware routing protocol that incorporates an admission control scheme and a feedback scheme to meet the QoS requirements of real-time applications. The novel part of the above mentioned QoS-aware routing protocol is the use of the approximate bandwidth estimation to react to network traffic. The above mentioned approach implements these schemes by using two bandwidth estimation methods to find the residual bandwidth available at each node to support new streams. In [8], the authors have performed a study on interference-aware topology control and QoS routing in IEEE 802.11-based multi-channel wireless mesh networks with dynamic traffic. Channel assignment and routing are two basic issues in such networks. Different channel assignments can lead to different network topologies. A novel definition of co-channel interference has been presented in the above mentioned paper. Based on this concept, an effective heuristic for the minimum Interference Survivable Topology Control (INSTC) problem is formally defined and presented which seeks a channel assignment for the given network such that the induced network topology is interference-minimum among all K-connected topologies, which improves
50
the system performance by 57% on average in terms of connection blocking ratio. In [9], the authors have discussed an approach to support delay-sensitive multimedia applications over hybrid wireless/wired networks. By the appropriate selection of the AIMD protocol parameters, wireless resources can be efficiently utilized, flow throughput can be maximized under the constraint of the delay outage probability. Simulation results have validated the analysis, demonstrated the feasibility of the approach, and shown that the AIMD protocol can outperform the non-responsive UDP protocol when they are used to support multimedia applications over hybrid networks. In [10], the authors have presented a users' satisfaction factor (USF) defined to quantify quality of service (QoS) for different types of services such as voice, data, and multimedia, as well as for different delay constraints. This USF not only predicts the final delivered QoS during transmission, but also take advantages of the fact that different packets can be decoded at different time in the receivers. Based on this USF, four types of scheduling schemes considering tradeoffs between system performance and individual fairness are presented. The schemes presented explore the time, channel, and multi-user diversity to guarantee quality of service and enhance the network performance.
All these schemes together make the proposed QoS architecture scalable to large network size and mobility.
(1)
Where NDI k is the NDI of node N k , 0 < < 1 , is a constant employed to keep partial memory of historic status. If N k is the destination, then NDI k = 1 , because the message is already delivered to the destination successfully. Otherwise, NDI k < 1 . Clearly, NDI i is always between 0 and 1. Each node maintains a timer t1.If there is no message transmission within an interval of , then the timer t1 expires. The timer expiration indicates that the node couldnt transmit any data during . So NDI i should be updated as
NDI i = (1 ) NDI i
(2)
51
paths. The advantages of using of dispersion algorithm [12] and erasure code [13] is, simplified message manipulation and reliable data transmission. At the same time, however, the optimization of erasure coding parameters is usually inaccurate because they are calculated according to the current NDI of the source node. In addition, propagating many small messages in the network may incur further processing overhead and inefficiency of bandwidth utilization. In order to avoid the above problems we describe the process of message faulttolerance based data forwarding in the subsequent section.
the connection over the n paths in the network. The probability that the packet can be reconstructed is the probability that more than M of the fragment transmissions succeeded, or equivalently that less than K transmissions failed. We can express network reliability or probability of success as:
The above process repeats at each time when message j is transmitted to another node. In general, the more times a message has been forwarded, the more copies of the message are created, thus increasing its delivery index. As a result, it is associated with a larger MDP. So the messages with larger MDP are dispersed and sent through the best paths with high ANDI.
We ignore the overhead introduced by the rest of the network. While transmitting dispersed data, the status of the MPS routes are continuously updated based on each nodes delivery index. For this, for each path, an average node delivery index (ANDI) is calculated based on the NDI of each node in the path. For each successful or failed data, the value of ANDI of the corresponding route is increased or decreased. In case the existing route encounters some unexpected link or route failure, the algorithm selects the path with the next highest ANDI, from the list of selected disjoint
52
If it is more than the maximum bandwidth, the flow is rejected. If it is between the minimum and maximum bandwidth, a probing packet is sent to the destination node to obtain the exact available bandwidth at the destination. Based on the results, it there is available bandwidth, the flow is accepted; otherwise it is rejected.
6. Congestion Control
In mobile ad-hoc networks, call admission control at source nodes alone cannot guarantee QoS since the topology may change after flows are admitted. Network congestion can still occur frequently under mobility. Thus, congestion control is needed to provide QoS in such situations. When congestion occurs, we would like best-effort traffic to first reduce their transmissions rate to give bandwidth to real-time flows.
In our simulation, 50 mobile nodes move in a 1000 meter x 1000 meter rectangular region for 50 seconds simulation time. We assume each node moves independently with the same average speed. All nodes have the same transmission range of 250 meters. In this mobility model, a node randomly selects a destination from the physical terrain. It moves in the direction of the destination in a speed uniformly chosen between the minimal speed and maximal speed. After it reaches its destination, the node stays there for a pause time and then moves again. In our simulation, the minimal speed is 5 m/s and maximal speed is 10 m/s. The simulated traffic is Constant Bit Rate (CBR). Our simulation settings and parameters are summarized in table 1 No. of Nodes Area Size Mac Radio Range Simulation Time Traffic Source Packet Size Speed Flows Rate 50 1000m X 1000m IEEE 802.11 250m 50 sec CBR 512 10m/s 2,4,6,8 and 10 250,500,750, & 1000 Kb
B. Performance Metrics
The proposed DEQA is compared with the SMT [13] scheme. The performance is evaluated mainly, according to the following metrics. i. ii. Average end-to-end delay: The end-to-enddelay is averaged over all surviving data packets from the sources to the destinations. Average Packet Delivery Fraction: It is the ratio of the number .of packets received successfully and the total number of packets transmitted. Aggregated Throughput: We measure aggregated throughput in terms of no. packets received. Fairness: For each CBR flow, we measure the fairness as the ratio of throughput of each flow and total no. of flows. Packet Loss: We measure the packet loss , which is the no. of packets lost per unit time. Blocking Probability: We measure the blocking probability as the ratio of rejected requests per total no. of requests. Overhead: It is the overhead occurred due to control packets exchange.
iii.
iv.
7. Experimental Results
A. Simulation Model and Parameters
We use Network Simulator (NS2) to simulate our proposed algorithm. In our simulation, the channel capacity of mobile hosts is set to the same value: 2 Mbps. We use the distributed coordination function (DCF) of IEEE 802.11 for wireless LANs as the MAC layer protocol. It has the functionality to notify the network layer about link breakage.
v. vi.
vii.
53
C. Results
In this section simulation results are presented. 1. Rate In the first experiment, the transmission rate is varied as 250kb; 500kb1000Kb and the above metrics are measured. Fig1 shows the result of throughput in terms of packets. From the figure, it can be seen that DEQA scheme outperforms SMT, by gaining more packets. Fig 2 shows the PDF for DEQA and SMT. Clearly DEQAs PDF is significantly more than that of SMT. Fig 3 gives the end-to-end delay values. Due to its routing policy, DEQA has less delay when compared to SMT. Fig. 4 presents the packets dropped for both the schemes. Because of its reliability, DEQA has less packet drops than SMT. The blocking probability results for various bandwidth requests are presented in figure 5. Because of its call admission control policy, DEQA has reduced blocking probability, when compared with SMT. The fairness of all the flows are given in figure 6. Since the DEQA scheme allocates fair bandwidth for its flows, it has increased fairness when compared to SMT. Fig 7 shows that the Overhead required for SRQA is less compared overhead of SMT.
T hro ug hp ut 70 00 60 00 50 00 40 00 30 00 20 00 10 00 0 2 50 5 00 75 0 10 00 R ate(kb )
more packets. Fig 9 shows the PDF for DEQA and SMT. Clearly DEQAs PDF is significantly more than that of SMT. Fig 10 gives the end-to-end delay values. Due to its CAC and congestion control schemes, DEQA has less delay when compared to SMT. Fig. 11 presents the packets dropped for both the schemes. Because of its reliability, DEQA has less packet drops than SMT. The blocking probability results for various bandwidth requests are presented in figure 12. Because of its call admission control policy, DEQA has reduced blocking probability, when compared with SMT. The fairness of all the flows are given in figure 13. Since the DEQA scheme allocates fair bandwidth for its flows, it has increased fairness when compared to SMT. Fig 14 shows that the Overhead required for SRQA is less compared overhead of SMT.
End-to-End Delay 3 2.5 Delay(s) 2 1.5 1 0.5 0 250 500 750 1000 Rate(kb) DEQA SMT
Packets
R a te V s D r o p
DEQA SMT
500
750
1000
R a te
2. Flows In the second experiment, the no. of data flows is varied as 2, 4, 6,8,10 and the same metrics are measured. Fig8 shows the result of throughput in terms of packets. From the figure it can be seen that, DEQA scheme outperforms SMT, by gaining
54
Rate Vs Fairness 1.2 1 0.8 0.6 0.4 0.2 0 250 500 Rate 750 1000
10000 8000 Drop 6000 4000 2000 0 2
F lo w V s D r o p
Fairness
DEQA SMT
DEQA SMT
6 F lo w
10
DEQA SMT
Overhead
DEQA SMT
DEQA SMT
packets
DEQA SMT
PDF(%)
DEQA SMT
Overhead
9. Conclusion
In this paper, a joint design of reliable QoS architecture for mobile adhoc networks has been designed which consist of a multipath routing protocol, a call admission control scheme and a congestion control mechanism. In the reliable multipath routing protocol, dispersion and erasure code techniques are utilized for producing replicated fragments for each packet, to enhance reliability. Then messages with good delivery probability are identified and transmitted through the paths with high average node delivery index. While it receives an assured number of fragments, destination can recover the original packet. Next, a call admission control (CAC) scheme has been developed, in which, the
55
calls are admitted based on the bandwidth availability of the path. Finally, a congestion control mechanism has been developed to avoid performance degradation due to mobility-triggered congestion. Once congestion occurs, the best effort traffic is rate controlled, to free bandwidth for the real-time flows. By simulation results, it has been shown that, this combined QoS architecture achieves good throughput, reduces packet loss, increases available bandwidth, performs load balancing in the network and increases lifetime.
References
[1] Michael Gerharz, Christian de Waal, Matthias Frank, "A Practical View on Quality-of-Service Support in Wireless Ad Hoc Networks". In Proc. of the 3rd IEEE Workshop on Applications and Services in Wireless Communications and Mobile Computing 2002. [2] K. Xu, K. Tang, R. Bagrodia, M. Gerla, and M. Bereschinsky, Adaptive Bandwidth Management and QoS Provisioning in Large Scale Ad Hoc Networks, Proc. Military Comm. Conf. (MILCOM '03), Oct. 2003 [3] Xue, J. Stuedi, P. Alonso, G.,"ASAP: an adaptive QoS protocol for mobile ad hoc networks",14th IEEE proceedings on Personal, Indoor and Mobile Radio Communications, 2003. PIMRC 2003. [4] Jangeun Jun Sichitiu, M.L.,"Fairness and QoS in multihop wireless networks", IEEE 58th Vehicular Technology Conference, 2003. VTC 2003-Fall. [5] R. Babbar, A.O. Fapojuwo, B. Far, Agent-based resource. Management in hybrid wireless networks, accepted for presentation, IEEE Canadian Conference on Electrical and Computer Engineering, 2004 [6] Haiyun Luo, Songwu Lu, Vaduvur Bharghavany, Jerry Cheng, Gary Zhongy, "A Packet Scheduling Approach to QoS Support in Multihop Wireless Networks", ACM Journal of Mobile Networks and Applications (MONET) Vol. 9, No. 3, June 2004 [7] Lei Chen,Wendi B. Heinzelman, "QoS-Aware Routing Based on Bandwidth Estimation for Mobile Ad Hoc Networks", IEEE Journal on selected Areas in Communications, vol. 23, no. 3, March 2005. [8] J. Tang, G. Xue, and W. Zhang, "Interferenceaware topology control and QoS routing in multichannel wireless mesh networks,", Proceedings of the 6th ACM international symposium on Mobile ad hoc networking and computing, May 2527, 2005. [9] Lin Cai, Xuemin (Sherman) Shen, Jon W. Mark, and Jianping Pan, "QoS Support in Wireless/Wired Networks Using the TCPFriendly AIMD Protocol", IEEE Transactions On
Wireless Communications, VOL. 5, NO. 2, FEBRUARY 2006. [10] Zhu Han; Xin Liu; Z. Jane Wang; K. J. R. Liu, "Delay sensitive scheduling schemes for heterogeneous QoS over wireless networks", IEEE Transactions on Wireless Communications, Volume 6, Issue 2, Feb. 2007 Page(s):423 428 [11] Mahesh K.Marina, Samir R.Das Ad hoc Ondemand Multipath Distance Vector Routing, ACM Sigmobile Mobile Computing and Communications Review Volume 6 , Issue 3, July 2002. [12] Panagiotis Papadimitratos, Zygmunt J. Haas, Secure Data Communication in Mobile Ad Hoc Networks, IEEE Journal On Selected Areas In Communications, Vol. 24, No. 2, February 2006. [13] Panagiotis Papadimitratos, Zygmunt J. Haas Secure message transmission in mobile ad hoc networks , 2003 Elsevier, Ad Hoc Networks 1 (2003) 193209. [14] P. Djukic, "Optimum Resource Allocation in Multipath Ad Hoc Networks", MASc Thesis, University of Toronto, 2003
56
R.Mynuddin Sulthani received the B.E., degree in Electronics and Communication Engineering from Osmania University, Hyderabad, India in 1992, and M.Tech., in Digital Systems & Computer Electronics from JNT University, Hyderabad, India. He is pursuing his PhD work on Quality of Service (QoS) in wireless Networks, under JNT University, Hyderabad, India. His research interests are in the areas of wireless/mobile networks with emphasis on the QoS guarantee and adaptation, connection and mobility management, and wireless MAC protocols. He is currently working as a Professor & HOD in CSE Department, Madanapalle Institute of Technology & Science (MITS), Madanapalle, which is affiliated to JNTU, Hyderabad, India. He has 7 years of Industrial experience and 10 years of teaching experience. He has attended an international conference ICCCN-2008 and several Workshops conducted by various organizations in India. He has organized national level seminars, workshops and refresher courses in MITS.
D.Sreenivasa Rao received the B.Tech., degree in Electronics and Communication Engineering in 1986 from Nagarjuna University, India and M.E in Digital Systems in 1994 from Osmania University, Hyderabad, India. He was awarded the PhD degree in Computer Networks in 2004 from University of Hyderabad, India. He is a Professor in ECE Department, JNTU College Of Engineering, JNT University, Hyderabad, India. He has 20 years of teaching experience. His research interest is in the area of communications and computer networks Presently 12 research students are working under his guidance. He has 22 publications in various National, International Conferences and Journals. He has 20 years of teaching experience. He has attended more than 10 Short Term Courses, Summer Schools, and Workshops, conducted by various organizations. He has organized workshops and refresher courses. He has chaired sessions at various national conferences. He is advisory committee member for GNIT, Hyderabad. He is also governing body member for Syed Hashim College of Science & Technology, member of JNTU forum for Science & Society and Coordinator for campus networking at JNTU CE, Hyderabad
57