• Aucun résultat trouvé

Improving Routing and Network Performance in Mobile Ad Hoc Networks Using Quality of Nodes

N/A
N/A
Protected

Academic year: 2021

Partager "Improving Routing and Network Performance in Mobile Ad Hoc Networks Using Quality of Nodes"

Copied!
6
0
0

Texte intégral

(1)

HAL Id: inria-00466593

https://hal.inria.fr/inria-00466593

Submitted on 24 Mar 2010

HAL

is a multi-disciplinary open access archive for the deposit and dissemination of sci- entific research documents, whether they are pub- lished or not. The documents may come from teaching and research institutions in France or abroad, or from public or private research centers.

L’archive ouverte pluridisciplinaire

HAL, est

destinée au dépôt et à la diffusion de documents scientifiques de niveau recherche, publiés ou non, émanant des établissements d’enseignement et de recherche français ou étrangers, des laboratoires publics ou privés.

Improving Routing and Network Performance in Mobile Ad Hoc Networks Using Quality of Nodes

Navid Nikaein, Christian Bonnet

To cite this version:

Navid Nikaein, Christian Bonnet. Improving Routing and Network Performance in Mobile Ad Hoc

Networks Using Quality of Nodes. WiOpt’03: Modeling and Optimization in Mobile, Ad Hoc and

Wireless Networks, Mar 2003, Sophia Antipolis, France. 5 p. �inria-00466593�

(2)

Improving Routing and Network Performance in Mobile Ad Hoc Networks Using Quality of Nodes

Navid Nikaein and Christian Bonnet Institut Eur´ecom

Sophia Antipolis, France Firstname.Name@eurecom.fr

Abstract—In this paper we suggest a mechanism to describe the quality of nodes over time from the network point of view, and use this quality for extracting the links connecting the pair of best nodes. Therefore, links (or nodes) can be properly selected so as to improve the routing performance. We also present a distributed algorithm to construct a forest of nodes with the high quality. The constructed forest reduces the broadcasting overhead by selecting a subset of the neighboring nodes for forwarding a packet. Fur- thermore, the subset of the forwarding nodes belongs to the set of nodes with the high quality, which in turn improves routing per- formance. We also provide some simulation results to show the efficiency of the algorithm.

Index Terms— Manet, routing, broadcasting, QoS, graph- theory.

I. INTRODUCTION

Mobile ad hoc networking is a challenging task due to the frequent changes in network topology as well as the lack of wireless resources [1]. As a result, routing in such networks experiences link failure more often. Hence, it is essential that a routing protocol for an ad hoc network considers the reasons for link failure to improve the routing performance. Link failure stems from node mobility and lack of network resources both reside in the wireless medium and in nodes. Therefore it is essential to capture the aforesaid characteristics to identify the quality of nodes and hence the quality of links [2], [3], [4].

In this paper we suggest a mechanism to describe the qual- ity of nodes over time from the network point of view, and use this quality for extracting the links connecting the pair of best nodes. Due to the reasons of link failure in mobile ad hoc net- works, this quality should not only reflect the available network resources but also the stability of such resources. Therefore, links (or nodes) can be properly selected so as to improve the routing performance. We also present a distributed algorithm to construct a forest of nodes with the high quality. The ratio- nale behind the forest construction is to reduces the broadcast- ing overhead since a subset of the set of neighboring nodes is selected for forwarding a packet. Furthermore, the subset of the forwarding nodes belongs to the set of nodes with the high quality, which in turn improves routing performance. This for- est is dynamic because the quality of nodes change over time, and also it is connected thanks to gateway nodes.

II. QUALITY OFNODES

Unlike fixed/wired networks, the performance of ad hoc rout- ing strictly depends on the “quality” of each individual node.

This quality should not only represent the available network re- sources reside both in the wireless medium and in the mobile nodes but also the stability of these resources. This is because mobile ad hoc networks potentially have less resources than wired networks. Furthermore, mobility may result in link fail- ure which in turn may result in a broken path. Therefore, more criterion are required in order to capture the quality of the links between nodes. We define QoS state as the power level, buffer level, and stability level of a node to represent the “quality” of nodes, and hence the quality of network [5]. In this work for the sake of simplicity, we only consider buffer level as the available network resources in a symmetric environment where all nodes have similar capabilities such as transmission range and buffer capacity. However, additional QoS states such as link SINRs can be used based on an asymmetric environment. Note that a QoS state is internal to a node and it is periodically evaluated by each node. The QoS state of a particular node reveals whether the node is forced to be selfish or not. In the selfish mode, a node ceases to be a router and acts only as a host. We assume that each node periodically broadcasts its presence and its QoS state in the form of a beacon to its neighboring nodes.

Power Level: The power level represents the battery life time. It represents a node’s internal state, and we assume that a node is capable of determining its state. It is trans- lated into a two-bit code that indicates the QoS state of a node in terms of battery life time. We classify the QoS state in terms of battery life time into high, medium, low and selfish states corresponding to each of the four two-bit codes. For example, a high QoS state may be indicated if the battery life time is between 75% and 100% of its actual life time, and a node may exhibit selfish behavior in case its life time is lower than 25%. Intermediate battery levels may be classified into medium and low states.

Buffer Level—which stands for the available unallocated buffer. Note that if the buffer level of a particular node is low, then this implies that a large number of packets are queued up for forwarding, which in turn implies that a packet routed through this node would have to experi- ence high queuing delays. This metric is translated into a two-bit code which indicates the QoS state of a node in terms of available buffer. This two-bit code is used to in-

(3)

dicate high, medium, low and selfish QoS state in terms of the buffer level. A high QoS state indicates that the corresponding node no packets queued up for forwarding, while selfish QoS state shows that the available buffer is less than 25 percent of its size. Since there is a slight delay between the broadcast of this metric and its use, instan- taneous buffer-level may be misleading. Hence, a node should maintain the average buffer-level such as exponen- tially weighted moving average (EWMA).

Stability Level—we define the connectivity variance of a node with respect to its neighboring nodes over time as the stability of that node. This metric is used to avoid unstable nodes to relay packets. We estimate the stability of a node

xas:

stab(x)= jN

t0

\N

t1 j

jN

t0 [N

t1 j

N

t

1

andNt 0

represent the nodes in the neighborhood of

x at timest1 andt0 respectively. Note that,t1 t

0 de- notes the time period in which nodes exchange beacons. A node is unstable if a large number of its neighbors change.

Further, if most (or all) of the neighbors remain the same at the two timest1 andt0, then we call this node stable.

Note thatNt1

\N

t0 (the numerator ofstab(x)) denotes the set of nodes that have remained in the neighborhood of

x between timest0 andt1. The denominator ofstab(x) is a normalization term. A node has high stability if none of its neighbors change (Nt1

= N

t0) , in this case we havestab(x) = 1. A node is unstable (no stability), if all its neighbors change (Nt

1

\N

t

0

=), in this case we havestab(x) = 0. We say that a node has low stability if0 < stab(x) 0:5and that it has medium stability if

0:5 <stab(x)<1. A two-bit code maps the stability to four QoS states of high, medium, low and no stability. For the sake of conformity with the other metric, if a node has no stability, we say that it has selfish stability.

In order to facilitate the notion of QoS state, we need to map the the QoS state onto a single weighted metric which can be compared and whose best can be chosen. Supposes,b, andp denote the stability, buffer and power levels of a particular node.

Note thats;b;p 2f0;3gsince we are using a two bit code to capture these metrics. We say that the QoS state of a nodeV is:

V =f(s;b;p)=s+b+p

The weights,, and denote the relative importance of stability, buffer, and power level amongst themselves. For the sake of simplicity, we only consider stability and buffer level to determine the QoS state of a node. Since we desire stability to be the most important followed by the buffer level. we propose

= 2and = 1. Hence, given two nodes, we are always in a position to select the better one. For example in Fig. 1, if a nodef hass=2,b =3then its QoS state is: 7. On the other hand a nodekwiths = 3,b =3has a QoS state value of 9.

Hence, in our scheme, nodekis a “better” node than nodef.

III. ALGORITHM FORFORESTCONSTRUCTION WITHHIGH

QUALITYNODES

Quality of service forest (QoS-F) is a distributed algorithm to construct a forest of high quality links (or nodes) from net- work point of view, and use these for routing and broadcasting.

The main objectives of QoS-F are to reduce the overhead of broadcasting and to improve routing performance. To reduce the broadcasting overhead, QoS-F elects the smallest subset of the set of neighboring nodes in order to forward a packet. A packet is forwarded if the message has not been received by the node before, and the node belongs to the subset of the for- warder nodes. On the other hand, it improves routing perfor- mance since the subset of forwarding nodes belongs to the set of high quality nodes. The QoS-F algorithm consists of three cyclic time-ordered phases: preferred neighbor election, quality of service forest construction, and neighboring table construc- tion, which are carried out based on the information provided by beacons. A beacon is a periodic message exchanged only between a node and its neighboring nodes. We assume that ini- tially each node knows the QoS state of its neighboring nodes.

Then, each node in the network topology carries out the pre- ferred neighbor election algorithm to choose a preferred neigh- bor. The preferred neighbor of a node is the node that owns maximum neighborhood QoS state among neighboring nodes.

Then, a forest is constructed by connecting each node to its pre- ferred neighbor and vice versa. It has been proven that whatever is the network topology, connecting each node to its preferred neighbor always yields a forest (i.e. we have no cycle) [6]. The neighboring table contains the set of nodes with which there exist a direct link over which data may be transmitted. How- ever, only a subset of them are selected to forward a packet, hence reducing broadcasting overhead and therefore increasing network lifetime. Furthermore, this subset provides the high quality connections between nodes, and thus improving routing performance.

A. Preferred Neighbor Election

Letx and y be any nodes of the graphG = (V;E). We assume that initially each nodexknows the ID numbers and the QoS state of its neighboring nodes. However, they are pe- riodically provided in a beacon. Based on these two informa- tion, node x can determine its PN. For this purpose, nodex computes a set of nodes whose QoS state are equal to maxi- mum neighborhood QoS state. This set is denoted byPNx

=

fyjQoS State(y) = max(QoS State(N

x

))g = fyjV(y) =

max(V(N

x

))g, whereNxis the neighboring nodes of nodex. We distinguish three cases:

No PN—if the set is empty, then nodexhas no PN which means it has no neighbors. In Fig. 1, nodenhas no neigh- bor and consequently no PN;

Single PN—if the PNx has only one member, then this member is the elected PN. For example, in Fig. 1, node

f has five neighbors: k;y;q;b;g, but the set ofPNf has only one member which is the nodek;

(4)

Multiple PN— the set of PNx can have more than one member which is the case for node x, since PNx

=

fy;dg. This means that there are more than one neighbor with the maximum neighborhood QoS state. In this case, we assume that nodexelects a node with the greatest ID number. So, nodexelects nodeysince its ID number is greater than noded(regarding to the alphabetical order).

b d

t x 9 7

6 4 3

4 4 f

k c

q y

5 4

n9 5 a8

g

(a) An arbitrary graphG

Edge of graph G y Node x with degree y x

Bridge Edge of Forest F

(b) Legend

Fig. 1. Each node in the graph is characterized by its QoS state and a letter which represents its ID number, and we assume that each node knows the QoS state and the ID number of its neighboring nodes.

Consequently the main idea of the algorithm is to select, for each nodenin the network topology, a neighbor that has the maximum QoS state in the neighborhood. For nodes that eval- uate two identical QoS state values, we break ties by setting the convention that nodes with higher IDs are preferred. We say that nodey is the preferred neighbor of nodex, ify is in the neighborhood ofxand has the maximum QoS state among its neighbors. In this manner, each node in the network selects a preferred neighbor, and we can obtain a forest. Note that a node that has any one of these metrics as selfish is not considered for preferred neighbor election (see section II).

B. Quality of Service Forest Construction

A forest is built by connecting each node to its PN. In [6], it is proven that, whatever is the network topology, this approach always yields a forest (i.e. we have no cycle). This is because the way in which a node is elected follows a monotonic increas- ing function depending on its QoS state and on its ID number.

Fig. 2 shows the forest of high quality links (or nodes).

C. Beaconing and Neighboring Table Construction

Basically, neighboring table is the table through which node

x detects changes to its neighborhood. This table consists

b d

t x 9 7

6 4 3

4 4 f

k c

q y

5 4

n9 5 8 a

g

Fig. 2. Constructed forest with high quality links.

of three information: a neighboring ID (NID), its QoS state (QoS STATE), and whether node x is a forwarder node of this neighbor (FORWARDER STATE). The value of FOR- WARDER STATE is null at the beginning, which represents that nodexis a forwarder of its entire neighborhood. Such in- formation is considered valid for a limited period of time, and must be refreshed periodically to remain valid. Expired infor- mation is purged from the table. Table I shows the neighboring table of nodef in Fig. 2. One of our goal is to reduce the num- ber of neighbors whose forwarder node isx, hence reducing broadcasting overhead.

To provide first two information in the neighboring table, each node periodically broadcasts its presence and its QoS state in the form of a beacon. Upon receiving a beacon, a node can gather information describing its neighborhood, as well as de- tect the quality of every neighbors to act as a router. Based on the neighboring QoS state and ID, node x performs the preferred neighbor election algorithm to choose its preferred neighbor, sayy. As soon as nodexdetermines its PNy, it sets nodeyas a forwarder (a direct forest member) in its neighbor- ing table, and then it must notify its neighboring nodes, espe- ciallyy, of its decision. Therefore, nodexsets its beacon to

B

x

=(x;QoS STATE;y). Upon receivingx’s beacon, each node updates its information regardingxand verifies whether they have been chosen as the PN ofx. Among the neighbor- ing nodes ofx, the PNysets nodexas a forwarder too. Other neighboring nodes ofxsetyas a non-forwarder node in their neighboring tables if nodexhas already been set as a forwarder node. In this way, we say thatyis learned to only be the for- warder of nodex. On the other hand, if nodexhas not been set as a forwarder in the neighboring tables, then nodey be- comes a forwarder because it is considered as a gateway node connecting two different trees of the same forest. It has to be mentioned, nodes that are not in the same tree but they are in the direct transmission range of each other are called gateway nodes. Consequently, the set of forwarder nodes is reduced. For example in Fig. 2, nodef elects node kas its PN, and sends a beaconBf

= (f;QoS State;k). Thus nodek becomes a forwarder node inf’s table. Similarly, nodef becomes a for- warder for nodek. Furthermore, nodesf can be learned by the nodesb;yas a non-forwarder nodes becausekis the elected PN of bothb andy. Likewise, nodesb;ycan be learned by node

f as a non-forwarder nodes since nodekis set as a forwarder of nodef. Nodeg, on the other hand, becomes a forwarder node for nodef because it is not a PN of any neighbor off includingf itself. Hence, the set of forwarder nodes of nodef

(5)

is reduced from5to3. Another advantage is that the leaf nodes becomes non-forwarder nodes, e.g. node. Table I shows the neighboring table of nodef.

TABLE I

NEIGHBORING TABLE OF NODEf

NID QoS STATE FORWARDER STATE

k 9 yes

y 4 no

q 3 yes

b 5 no

g 5 yes (gateway)

However, formation of some fake-gateway nodes and thus forwarder nodes seems inevitable unless we provide some knowledge of the tree member for each node [6]. We believe that in a highly mobile network, providing such information is a waste of wireless scarce resources. Moreover, it increases the complexity of the algorithm. Therefore, we compromise some fake-forwarder nodes against network resources and the com- plexity of the algorithm. In Fig. 2, nodeqis a fake-forwarder node oftand vice versa.

D. Results

The following results were obtained by implementing the static QoS-F algorithm in C++ and measuring the metrics af- ter the population of mobile nodes was distributed uniformly on a grid of 2000m2000m with each node having a trans- mission range of 250m. One key aspect of this measurement is how QoS-F behave with an increasing number of nodes in the network. The graph in Fig. 3 shows the number of edges in the topology and the number of edges in the QoS-forest versus the number of mobile nodes. We consider two cases: variable den- sity where the network is sparse at the beginning and becomes highly dense, and constant density where the area covered by the ad hoc network increases as the number of nodes increases.

There is a theoretical fact that the number of edges in a tree is of the order of the number of nodes. For a tree with nnodes, the number of edges must ben 1. Further, since a forest has strictly lesser edges than a tree spanning all the nodes in QoS-F, the number of edges in the forest as reflected by Fig. 3 isO(n).

E. Performance Analysis

IV. SIMULATIONMODEL

We use a detailed simulation model based on ns-2 [7] in our evaluation. In a recent work, the Monarch research group in CMU [8] developed support for simulation multi-hop wire- less networks complete with physical, data link and MAC layer model on ns-2. Traffic sources are CBR (constant bit rate). The data rate is equal to 4 packets per second and 512 bytes per packet. However, we only consider one communication pat- terns corresponding to 10 is used. The mobility model uses

0 50 100 150 200 250 300 350 400 450 500

0 500 1000 1500 2000 2500

Number of nodes

Number of edges

QoS−F Total Edges

(a) Constant Density

0 50 100 150 200 250 300 350 400 450 500

0 1000 2000 3000 4000 5000 6000

Number of nodes

Number of edges

QoS−F Total Edges

(b) Variable Density

Fig. 3. Total number of the edges in the network topology vs. the total number edges generated by the forest.

the random way point model in a rectangular field (1500m 300m). 50 nodes move in it with a randomly chosen speed (uni- formly between 0 and 20m/sec). Each node starts its movement from a random location to a random destination. Once the des- tination is reached, another random destination is targeted after a pause. The selected pause times, which affects the relative speeds of the mobile, are 0, 30, 60, 150, 300, 600, and 900 sec- onds. For each pause time, we randomly generate 10 different mobility scenarios. So, each data point in the performance re- sults represents an average of 10 runs. Simulations are run for 900 seconds.

V. PERFORMANCERESULTS

We compare the performance of the HARP-hybrid ad hoc routing protocol [9] with and without QoS-F algorithm. The following three key performance metrics are evaluated:

Packet delivery ratio - The ratio of the data packets de- livered to the destination to those generated by the CBR sources. Fig. 4 shows a comparison of this metric for the HARP with and without QoS-F algorithm. Routing with QoS-F has a better packet delivery ratio because of the high quality links used during the routing process. Note that the high quality links (or nodes) reduce the probabil- ity of link failure specially in the high mobility, and hence improving routing performance.

Average end-to-end delay of data packets - This includes all possible delays caused by buffering during route dis- covery latency, queuing at the interface queue, retransmis- sion delays at the MAC, propagation and transfer times.

As it is illustrated in Fig. 5, routing with QoS-F has a bet- ter end-to-end delay since the subset of forwarding nodes belongs to the set of nodes with the high quality links.

Routing overhead - Total number of bytes and packets used for routing during the simulation. As it is shown in Fig. 6 and 7, QoS-F improves routing overhead (bytes and

# of packets) in the high mobility. The reason is that the forest structure reduces the broadcasting overhead by se- lecting a subset of the neighboring nodes for forwarding a packet. However, in the low mobility the overhead of QoS-F is higher because of the beaconing process.

(6)

0 100 200 300 400 500 600 700 800 900 0.94

0.95 0.96 0.97 0.98 0.99 1

Pause time (s)

Packet delivery ratio (%)

Routing eith QoS−F, 10 sources Routing without QoS−F, 10 sources

Fig. 4. Packet Delivery Ratio

0 100 200 300 400 500 600 700 800 900

0.01 0.015 0.02 0.025 0.03 0.035 0.04 0.045 0.05 0.055

Pause Time (s)

Average end−to−end delay (ms)

Routing with QoS−F, 10 sources Routing without QoS−F, 10 sources

Fig. 5. Average End-to-End Delay

0 100 200 300 400 500 600 700 800 900

0 0.5 1 1.5 2 2.5 3 3.5x 105

Pause time (s)

Routing overhead (packets)

Routing with QoS−F, 10 sources Routing without QoS−F, 10 sources

Fig. 6. Routing overhead in terms of number of packets

0 100 200 300 400 500 600 700 800 900

0 2 4 6 8 10 12x 106

Pause time (s)

Routing overhead (bytes)

Routing with QoS−F, 10 sources Routing without QoS−F, 10 sources

Fig. 7. Routing Overhead in terms of bytes

VI. CONCLUSION

We have addressed a mechanism to describe the quality of nodes over time from the network point of view and use this quality for extracting the links connecting the pair of best nodes.

This quality is introduced in response to the reasons of link fail- ure in mobile ad hoc networks. Therefore, links can be prop- erly selected so as to improve routing performance. We have also proposed a distributed algorithm to construct a quality of service forest in order to reduce the overhead of broadcasting.

Forest is used to reduce the broadcasting overhead since a sub- set of the set of neighboring nodes is selected for forwarding a packet. Furthermore, the subset of the forwarding nodes be- longs to the set of nodes with the high quality, which in turn improves routing performance. We have shown some simula- tion results to show the efficiency of the algorithm.

REFERENCES

[1] Mobile Ad Hoc Networking (MANET), Available at http :

==tonnant:itd:nrl :navy:mil =manet=manethome:html. [2] D. Chalmers and M. Sloman, “A survey of QoS in mobile computing

environments,” IEEE Communications Surveys, 1999.

[3] K. Wu and J. Harms, “QoS support in mobile ad hoc networks,” 2001.

[4] D. D. Perkins and H. D. Hughes, “A survey on quality-of-service sup- port for mobile ad hoc networks,” Wireless Communications and Mobile Computing, 2002.

[5] Navid Nikaein, Christian Bonnet, Yan Moret, and Idris A. Rai, “2lqos- two-layered quality of service model for reactive routing protocols for mo- bile ad hoc networks,” in Proceeding of SCI - 6th World Multiconference on Systemics, Cybernetics and Informatics, 2002.

[6] Navid Nikaein, H. Labiod, and C. Bonnet, “DDR-distributed dynamic routing algorithm for mobile ad hoc networks,” in MobiHOC. IEEE, 2000.

[7] K. Fall and K. Varadhan, ns notes and documentation, A Collaboration between researchers at UC Berkeley, LBL, USC/ISI, and Xerox PARC, available at:http:==www:isi:edu=nsnam=ns=.

[8] “The CMU monarch (Mobile Networking Architecture) project,” Web Site at:http:==www:monarh:s:mu:edu=.

[9] Navid Nikaein, C. Bonnet, and Neda Nikaein, “HARP - hybrid ad hoc rout- ing protocol,” in IST - International Symposium on Telecommunications, 2001.

Références

Documents relatifs

Unité de recherche INRIA Rennes : IRISA, Campus universitaire de Beaulieu - 35042 Rennes Cedex (France) Unité de recherche INRIA Rhône-Alpes : 655, avenue de l’Europe -

Considering both figure 12 and figure 6, we observe that, when varying the number of traffic streams in the network, OLSR consistently has a shorter route length - even at a

Theses nodes participate correctly in routing function but not forward data packets it receive for other node; so data packets may be dropped instead of being forwarded to their

ix.. 2 Classification of Wireless Mesh Networks. 3 Communication Technologies for Wireless Mesh Networks. 4 The Power of Wireless Mesh Networks. 5 Differences from Traditional

For creating a spanning forest over a mobile ad hoc DTN using DA-GRS in a decentral- ized way, nodes must exchange some messages between them in order to have knowl- edge of who else

In the 6th wave of the EWCS Eurofound [ 33 ] defined job quality as composition of seven dimensions, representing largely the most important job aspects for well-being of the

Each forward ant contains the IP address of its source node, the IP address of the destination node, a sequence number, a hop count field and a dynamically growing stack. The