04797138 - Star
-
Upload
vinay-challuru -
Category
Documents
-
view
216 -
download
0
Transcript of 04797138 - Star
-
8/8/2019 04797138 - Star
1/5
Link Probability Based Opportunistic Routing Metric in Wireless Network
Yanhua Li, Yuan-an Liu , Pengkui Luo
Abstract
Opportunistic routing is a new design trend of wireless
network routing protocol. It takes good advantages of the
broadcast nature of wireless network. The source can use
multiple potential paths to deliver the packets to the desti-
nation. The routing metric used for selecting the forwarder
lists is very important for designing the opportunistic rout-
ing scheme. In this paper, we propose a novel routing metricSTR (successful transmission rate) to choose the forwarder
list, which is based on total successful transmission rate.
It considers multi-links contribution, instead of one best
link information used in ETX. We also introduce the fair op-
portunistic routing with linear coding (FORLC) scheme us-
ing our STR metric. The extensive simulation results show
that the opportunistic routing with our STR metrics can al-
ways outperform ETX based ExOR scheme. The maximum
benefit of the throughput using the STR based FORLC can
be 30% more than the ETX based MORE. It also has at most10 times throughputs than traditional routing protocol.
Keywords: Opportunistic routing, routing metric, wire-less routing.
1. Introduction
The traditional routing protocols we used, such as
AODV, DSR and etc., are all based on single best path
to deliver packets. This would easily cause a lot of retrans-
missions and high frequent route rediscovery. Multi-path
routing protocol [5, 6] is an improvement to single path
routing protocol. It selects multi-paths to deliver packets.
It indeed increases the delivery ratio, but it increases the
duplicate transmissions of packets as well, since there is noefficient scheduling scheme for these paths. Opportunistic
routing [2, 3, 4, 8, 10, 9] uses multi-paths to deliver packets,
and do not increase the transmission cost. A forwarder list is
maintained for each flow. Any packet in the flow may use all
Yanhua Li and Yuan-an Liu are with Beijing U. of Posts &
Telecommunications, Beijing, China.(Email: [email protected],
[email protected])Pengkui Luo is with Dep. of CS, U. of Minnesota, Minneapolis, USA.
(Email: [email protected].)
the nodes in the list to do the forwarding. And the nodes in
forwarder list are prioritized with some metric. Each node
only forwards the packets which havent been received by
any high priority node. This would efficiently reduce the
transmissions of duplicate packets. ETX is a routing met-
ric to choose the candidate set. ETX captures the minimum
number of total transmissions to send a packet from a cer-
tain node to the destination. ExOR [3, 1] uses the ETX to
choose a candidate forwarder set. It can provide better per-formances over traditional routing protocols shown in [7].
But there are still some problems in ExOR. After a transmis-
sion, all the nodes in the candidate set have to wait for the
forwarding of the nodes with higher priority in order. It is
not an efficient way to do the spatial reuse. Moreover mul-
ticast is not implemented. MORE (MAC-independent Op-
portunistic Routing Protocol) randomly mixes packets be-
fore forwarding them. This randomness ensures the routers
that overhear the same transmission will not forward the
same packets. In this way, MORE doesnt need special
scheduler to coordinate routers and can run directly on top
of802.11. In other words, MORE introduces network cod-
ing to Opportunistic Routing Protocol. It can also supportboth unicast and multicast. In Chachulskis paper [4], ETX
is used as a routing metric to select the forwarder list. Us-
ing ETX in MORE is not suitable because MORE is a fair
scheme, unlike ExOR which is an unfair scheme to use the
nodes based on their priorities. It does not need ETX to se-
lect candidate nodes with priorities, and treat them based on
the different priorities. MORE does not find a good way to
the process of forwarding in both unicast and multicast ei-
ther. Moreover, it does not introduce error control and rate
control schemes. ETX is not an optimal metric to choose
the forwarder list in opportunistic routing, because it only
considers one link with the lowest cost. When the node can
reach multiple neighbors, these multi-links can increase the
transmission rate and reduce the delivery cost. So the cost
depends on not only the single link probabilities, but also
the number of links it can leads to. The more number of
links it can use, the less cost it needs to take. Based on
the differences between ExOR and MORE, we suppose a
novel metric STR (successful transmission rate) for fair op-
portunistic routing protocols, and present a fair opportunis-
tic routing protocol (FORLC) which uses STR as a metric
2009 International Conference on Communications and Mobile Computing
978-0-7695-3501-2/09 $25.00 2009 IEEE
DOI 10.1109/CMC.2009.170
308
2009 International Conference on Communications and Mobile Computing
978-0-7695-3501-2/09 $25.00 2009 IEEE
DOI 10.1109/CMC.2009.170
308
-
8/8/2019 04797138 - Star
2/5
to select the forwarder list. The rest of the paper is orga-
nized as follows. Section 2 introduces the difference be-
tween fair scheme and unfair scheme of opportunistic rout-
ing protocols, using ExOR and MORE as examples. STR
is described in Section 3. In Section 4, we illuminate the
FORLC protocol. Section 5 gives the analysis of proposed
protocol and provides simulation results. We conclude ourpaper in Section 6.
2. Fair and Unfair opportunistic routing
scheme
In this section, we are in the position of introducing the
existing opportunistic routing schemes. Kindly, there are
two types scheme, unfair/fair opportunistic routing. Unfair
opportunistic routing scheme often builds a candidate for-
warder set, in which many forwarders are prioritized with
orders. The higher priority indicates that the node is closer
to the destination. So in ExOR, every node chooses thehighest prioritized node to forward the packets it received
first. And the nodes with lower priorities have to wait and
listen to the nodes with higher priorities, so that every node
only forwarder the packets that have not been received by
any higher priority node. Fair opportunistic routing scheme
also builds a candidate forwarder set. But all the nodes in
it are fair without any priority. The set just includes some
closer nodes to the destination than the source. MORE is
a typical fair opportunistic routing. Node forwards coded
packet, once it receives an innovative packet from others
and the credit value is positive. The node need neither a
special scheduler to coordinate with other routers, nor wait-
ing for other nodes. Fig. 1 shows an example topology, andETX values are marked for each node.
Figure 1. Connective Graph with ETX metricvalues marked.
In ExOR, the Source chooses the candidate forwarder
set as {B, A}, because B has lower ETX than A. Then,ExOR tries to send more packets through B to destination,
and the other nodes have to wait until B finishes its trans-
mission to decide which packets should be forwarded. Ob-
viously, in Fig. 1, if the source sends a batch of 125 pack-ets out, A and B would both receive 100 packets respec-tively as expected. Then A would send the 100 packet outto Dst along A C Dst and A D Dst. Dstwould receive totally 60 packets from both C and D re-
spectively. Now the question is how many distinguishedpackets would be received by Dst through As forward-
ing? We can easily get that this number of the different
packets obeys to the hyper-geometric distribution. Let X
denote the number of distinguished packets received by the
destination. Dst would receive E(X) = 84 distinguishedpackets through As transmissions, and will similarly re-
ceive 64 different packets from Bs transmissions. So, Acan send more packets to Bs in this particular case. This
also illustrates that ETX does not always make good de-
cision, since it does not consider the multiple links infor-
mation for each potential forwarder. There are also more
issues in ExOR, such as not supporting spatial reuse and
multi-cast. MORE makes some progress over ExOR. It cansupport spatial reuse and multi-cast, but it still uses ETX as
the routing metric to choose the candidate set. This would
be a big issue, since non-optimal forwarder list would re-
sults directly in many duplicate transmissions. In MORE,
because all the packets from the nodes are coded, just a few
coded packets which are not linearly independent with oth-
ers are considered as duplicate packets. Even though the
node A and node B may receive the same packets using
MORE, they would generate some new linear combinations
of these packets to send. This will reduce the number of
duplicate transmissions. Hence, opportunistic routing will
result in higher throughputs for each source destination pair,
since it takes advantage of multiple links to the destination.But if the source only uses this best route to deliver all the
packets, the total number of duplicate transmissions will be
the least in this graph. So, how to get lower number of du-
plicate transmissions from the source to the destination, as
well as getting higher throughput is a big challenge.
3. STR: Successful Transmission Rate
We introduce a novel routing metric, Successful Trans-
mission Rate (STR) to construct the forwarder lists. STR
denotes the expected successful transmission rate between
a certain node and the destination. Each node calculates itsSTR to the destination, and chooses some of the neighbors
with the higher STR values into its forwarder set. The exact
approach used to calculate the STR is showed below: (1) If
the node Xand the destination are within one hop (showed
in Fig. 2), the STR of node X is
STRX = PXD . (1)
(2) If there are two hops between node X and the desti-
309309
-
8/8/2019 04797138 - Star
3/5
nation (showed in Fig. 3), the STR of node X is
STRX = PX1P1D +N
i=1
PXiPiD
i1
j=1
(1 PXj ). (2)
If there are more than 2 hops from node X to destination(showed in Fig. 4), the graph could always be transferred
to an equivalent graph in which the node X and Dst are
within 2 hops. We reserve the nodeXs one hop forwarders,and simply replace the subgraph between these one hop for-
warders andDst to a set of equivalent one hop probabilities.
These equivalent one hop probabilities are exactly the STR
values of each node. With this approach, we can calculate
STR for every node in a common graph. The STR of node
X is
STRX = PX1STR1D +N
i=1
PXiSTRiD
i1
j=1
(1 PXj ).
(3)So, in this algorithm, node needs to know its on-hop for-
warders STR values to calculate its own STR value. The
STRs should be calculated from the nodes, which are closer
to destination, to the node farther away from the destina-
tion. For example, we calculate the STRs for the topology
shown in Fig. 1. Node C, D and Es STRs can simply be
calculated by using equation 1. Node A, Bs STRs can be
calculated with equation 2. When calculating the STR of
node Source, we use the As STR value to replace the sub-
graph between node A and node Dst, similarly for node B.
Then we can use equation 3 to get the STR value of node
source. All the STRs of nodes in Fig. 1 are listed in Table. 1.
Table 1. List of STR for each node in Fig. 1Node Src A B C D E Dst
STR 84% 84% 64% 80% 80% 80% 100%
4. FORLC: Fair Opportunistic Routing With
Linear Coding
In this section, we will introduce fair opportunistic rout-
ing with linear coding (FORLC) protocol, in which STR is
used to choose the forwarder set for every node. Every 20minutes, hello messages are broadcasted to exchange link
quality information between each node pair.
When a source requires a route to its destination, nodes
would use the algorithm below to select the local forwarder
sets. These forwarder sets include all the efficient nodes
which can be used as a potential forwarder of the data pack-
ets.
Like in MORE scheme, the source breaks up the file
into batches ofK packets, where batch size K may vary
Algorithm 1 For Node X Selecting the forwarder set.
1: /* Generate a preliminary forwarders Set R*/2: R := 3: for each vertex vi inN(X) do4: ifET X(vi, Des) < ETX(X,Des) then5: R := R {vi}6: end if7: end for
8: /*Choose useful forwarders C from R */9: ST Ro := 010: ST Rn := 011: C := 12: while TRUE do13: /*find the next best candidate v*/14: for each vertex vj in R do15: ifST Rn > ST RX(C {vj}) then16: v := vj17: ST Rn := ST RX(C {vj})18: end if19: end for20: if(ST Rn < Threshold) (R = ) then21: C := C {v}22: R := R {v}23: ST Ro := ST Rn24: else25: Break26: end if27: end while28: RETURNC
from one batch to another. These K uncoded packets are
called native packets. When the 802.11 MAC is ready tosend, the source creates a random linear combination of
the K native packets in the current batch and broadcasts
the coded packet. FORLC scheme uses STR as metric to
choose the forwarder list. Every node maintains a local for-
warder list. Before forwarding the packet, node would up-
date the packets forwarder list with its local one.
After receiving a packet, the node checks whether it is
in the packets forwarder set. If so, it would check whetherthe packet is linearly independent with the packets in its
cache. Then, it stores the innovative packet into its cache,
and makes a new linear combination of the packets it has.
The packets received by destination are all linearly coded
packets. When the destination receives a packet, it will
also check whether the packet is linear independent with
the packets in its cache. Destination only caches the pack-
ets, which are independent with each other. When destina-
tion receives K independent packets, it resumes the orig-
inal K packets and sends ACKs back to source along the
best route. An ACK packet indicates that the current batch
has been received successfully by the destination. Each for-
warder stops sending packets of the current batch, when itreceives the ACK. If source receives the ACK, it would stop
sending the current batch, and start the next batch.
In dense wireless network, not all of the neighbors of a
certain node would be involved into the forwarder set, be-
cause that will result in more duplicate transmissions and
more power consumptions. So, in FORLC, we introduce
a STR threshold to select the forwarder set. We always
choose the highest STR forwarder nodes into forwarder set,
310310
-
8/8/2019 04797138 - Star
4/5
Figure 2. One hop nodepair.
Figure 3. Two hops nodepair
Figure 4. Substitution withSTR value.
until the nodes own STR is more than a certain threshold
or there is no qualified forwarders any more. We choose
95% as the threshold. This threshold is got by our simu-lations. We randomly changed the density of the network
many times, and varied the threshold with different values
in each topology to compare the performances, in terms of
total cost rate and duplicate transmission rate. The resultsshow that 95% is the best value as the threshold. When thethreshold is greater than 95%, the cost of transmissions willincrease rapidly. More detailed analysis is shown in sec-
tion 5.
5. Evaluation
In this section, we evaluate the performances of the STR
based FORLC protocol. In the simulations, we use 1 Mbpsas the transmission rate. Each simulation period is 300 sec-onds, and the payload size of each packet is 1 Kbytes. We
randomly generate the scenarios with a certain number ofintermediate nodes for the source-destination pair. The link
qualities between these nodes are all randomly generated.
At the beginning of each random scenario, nodes exchange
hello messages to collect the link qualities information of
the topology for 60 seconds. Then, the source sends thepackets to the destination using FORLC, MORE and AODV
protocols, respectively. The simulation in each scenario is
repeated 100 times, in order to reduce the effect of skewfrom a limited sample size. We choose the batch size as
100.
We recorder the total numbers of transmissions needed
for delivering all the packets successfully to the destination.
The average number of transmissions for each packet can becalculated easily by dividing the total numbers of transmis-
sions by the total number of data packets in each simulation.
This value will be referred to the Packet Transmission Cost
(PTR). The Fig. 5(a)and Fig. 5(b) show that the STR based
FORLC can outperform ETX based MORE and the tradi-
tional routing in all of the scenarios. Since the forwarder
lists selected by STR and ETX are the same for some node
pairs, we could see some points are located on the 45 degree
line (shown in Fig. 5(b)).
Since the linear coded packets received by destination
might not be independent with each other, these duplicate
transmissions are a huge waste of network resources. The
transmissions for the linear correlative packets are actually
the duplicate transmissions. The total number of duplicate
transmissions divided by the total number of packets will bereferred to the duplicate transmission rate, which captures
the number of duplicate transmissions for each data packet.
In the simulations, we varied the batch size from 20 packetsto 600 packets, we could see that the duplicate transmis-sion cost decreases as the batch size increases, and the STR
based FORLC always gets less duplicate transmission cost
than ETX based MORE, as shown in Fig. 5(c).
In this part, we generate a random topology with 50nodes in it, among them there are 10 source-destinationpairs. We still use 1 Mbps as the transmission rate. For thewhole simulation time, each pair completed 1 megabytesdata transmissions from the source to the destination. We
recorded the throughputs for each routing protocol. The
Fig. 5(d) shows that the comparison of throughputs between
traditional routing, MORE and FORLC protocol. Each bar
in the figure is the average value of100 simulations.
In Fig. 5(d), the bars are sorted by the values of the
throughputs of the FORLC protocol. The figure shows
that the opportunistic routing always has higher throughputs
than the traditional routing. For most of the node-pairs, the
FORLC has higher throughputs than the MORE protocol.
It has the same throughput as MORE for other node pairs,
because the forwarder sets selected by STR and ETX are
the same for these node pairs.
In dense network, each node may have lots of neighbors.Many nodes may be qualified for the forwarder set. If we
choose all these nodes in to the local forwarder set, it will
result in the more duplicate transmissions. So, we introduce
a STR threshold in the FORLC protocol. When the STR
value of the current node is larger than the threshold after
choosing some neighbors into forwarder set, the node will
stop introducing new forwarders. The results show that 95%is the best value as the threshold. When the threshold is
311311
-
8/8/2019 04797138 - Star
5/5
0 10 20 30 40 50 60 700
10
20
30
40
50
60
70
The Packet Transmission Cost: Tranditional Routing
ThePacketTransmissionCost:FORLC
(a) Packet transmission cost: Traditional
routing vs. FORLC
0 10 20 30 400
10
20
30
40
The Packet Transmission Cost: ETX Based MORE
ThePacketTransmissionCost:FORLC
(b) Packet transmission cost: MORE vs.
FORLC
0 100 200 300 400 500 6000
0.1
0.2
0.3
0.4
Batch Size
DuplicateTransmissionCost
STR based FORLC
ETX based MORE
(c) Duplicate Transmission Cost:
FORLC vs. MORE
#1 #2 #3 #4 #5 #6 #7 #8 #9 #100
5
10
15
20
25
30
35
Node Pair ID
Throughputs(Kbytes/s)
Tranditional RoutingETX Based MORESTR Based FORLC
(d) Throughputs comparison
0~60%65%70%75%80%85%90%95%100% +Infinity0
0.05
0.1
0.15
0.2
0.25
STR Threshold
Duplicat
eTx.Cost(times/packet)
(e) Duplicate Transmissions Cost varies
with the STR threshold
0~60%65%70%75%80%85%90%95%100% +Infinity0
0.5
1
1.5
2
2.5
3
3.5
STR Threshold
Pac
ketTx.Cost(times)
(f) The Packet Transmission Cost varies
with the STR threshold
Figure 5. Simulation results.
greater than 95%, the cost of transmissions will increaserapidly.
6. Conclusion
In this paper, we propose a novel routing metric STR,
which is based on the successful transmission rate from
a node to the destination, to choose forwarder set for fair
opportunistic routing. We also propose FORLC protocol,
which uses the STR metric to select the forwarder set, and
do the linear coding for the data packets. It can improve
the network performances, in terms of throughputs and the
packet transmission cost. Comparing with the MORE, the
FORLC protocol can increase the throughput 30% more
than the MORE protocol at most, and 10 times than the tra-ditional routing at most in our simulations. The STR based
FORLC can also reduce the packet transmission cost.
References
[1] MIT roofnet. http://pdos.csail.mit.edu/roofnet/.
[2] S. Biswas and R. Morris. Opportunistic routing in multi-
hop wireless networks. SIGCOMM Comput. Commun. Rev.,
34(1):6974, 2004.
[3] S. Biswas and R. Morris. Exor: Opportunistic routing
in multi-hop wireless networks. In Proceedings of the
ACM SIGCOMM 05 Conference, Philadelphia, Pennsylva-
nia, August 2005.[4] S. Chachulski, M. Jennings, S. Katti, and D. Katabi. Trading
structure for randomness in wireless opportunistic routing.
In SIGCOMM, 2007.[5] S.-J. Lee and M. Gerla. AODV-BR: Backup routing in ad
hoc networks. In WCNC2000.[6] M. K. Marina and S. R. Das. Ad hoc on-demand multipath
distance vector routing. SIGMOBILE Mob. Comput. Com-
mun. Rev., 6(3):9293, 2002.[7] C. Perkins and E. Royer. Ad hoc on demand distance vector
routing, mobile computing systems and applications. In In
Proceedings of WMCSA 99, 1999.[8] B. Sadeghi, V. Kanodia, A. Sabharwal, and E. Knightly. Op-
portunistic media access for multirate ad hoc networks. In
MobiCom 02.[9] C. Westphal. Opportunistic Routing in Dynamic Ad Hoc
networks. In Proc. of IEEE MASS, Oct. 2006.[10] C. Yu, K. G. Shin, and L. Song. Link-layer salvaging for
making routing progress in mobile ad hoc networks. In Mo-
biHoc 05.
312312