CONGESTION AVOIDANCE USING MULTI- PATH … · MPR Multi-path Routing Protocol MPT Multi-path Path...
Transcript of CONGESTION AVOIDANCE USING MULTI- PATH … · MPR Multi-path Routing Protocol MPT Multi-path Path...
CONGESTION AVOIDANCE USING MULTI-PATH ROUTING AND POWER CONTROL IN
MOBILE AD HOC NETWORK
by
Peter Phuc Pham
A Phd proposal submitted in partial
fulfillment of the requirements for the
degree of
Ph.D. of Telecommunications
University of South Australia
March 28, 2002
Approved by ___________________________________________________
Chairperson of Supervisory Committee
__________________________________________________
__________________________________________________
__________________________________________________
Date __________________________________________________________
UNIVERSITY OF SOUTH AUSTRALIA ABSTRACT
MULTI-PATH ROUTING AND POWER CONTROL IN MOBILE AD HOC NETWORK
By Peter Phuc Pham
Chairperson of the Supervisory Committee: Dr Sylvie Perreau
Institute for Telecommunications Research
A mobile ad hoc network (MANET) is an autonomous system of mobile hosts
connected by wireless links. There is no static infrastructure such as base stations.
If two hosts are not within radio range, all communication messages between
them must pass through one or more intermediate hosts that act as routers.
These hosts move around randomly, thus change the network topology
dynamically. Such networks are very useful in military and other tactical
applications such as emergency rescue or exploration missions, where fixed
network infrastructure is not available.
Utilization of multi-path routing mechanism to provide improved throughput
and route resilience as compared with single-path one has been explored in details
in the context of wired network. However, multi-path routing has not been
explored thoroughly in the domain of ad hoc network.
Furthermore, due to broadcast nature of mobile nodes in MANET, hidden
terminals and exposed terminals are well-known problems for significantly
reducing the network capacity. Therefore, an efficient power control algorithm is
needed to reduce interference and enhance network performance.
- i -
TABLE OF CONTENTS
INTRODUCTION ............................................................................................................1
BACKGROUND ...............................................................................................................2
DESCRIPTION OF PROPOSED RESEARCH .......................................................8
Introduction..........................................................................................................................8
Multi-path Routing in Ad Hoc Network with Load Balancing Policy......................8
1)MRP-LB: Multi-path Routing Protocol with Load Balancing...........................8
2)Simulation of the algorithm....................................................................................11
3)Data Collection Metrics ..........................................................................................12
4)Mathematical Analysis .............................................................................................12
Power Control Algorithm for Ad Hoc Network ........................................................12
1)PCA: Power Control Algorithm for Ad Hoc Network ....................................12
2)Simulation of the algorithm....................................................................................14
3)Data Collection Metrics ..........................................................................................14
4)Mathematical Analysis .............................................................................................15
WORK BREAKDOWN STRUCTURE AND RESEARCH SCHEDULE.....15
Introduction........................................................................................................................15
Work Breakdown Structure.............................................................................................15
1)MRP-LB: Multi-path Routing Protocol with Load Balancing.........................15
2)PCA: Power Control Algorithm for Ad Hoc Network ....................................16
Schedule...............................................................................................................................17
CONCLUSION ................................................................................................................19
REFERENCE ...................................................................................................................20
- ii-
LIST OF TABLES AND FIGURES
Figure 1: Work Breakdown Structure Page 15
Table 1: Schedule of the tasks Page 17
- iii-
ACKNOWLEDGMENTS
The author wishes to thank Dr. Sylvie Perreau for her advice and support in
the research.
- iv-
NETWORK PARAMETERS
Parameters Representation
N Number of nodes
Nu Number of routes per node
E Number of edges
Cijn Number of congested packet on route n
Sijn The size route of route n
Rijn The initial congested packets on route n after Route
Discovery Table 1: Network parameters
- v-
GLOSSARY
Index Meanings
AODV Ad hoc On-demand Distance Vector Routing Protocol
AODV-BR Ad hoc On-demand Distance Vector Routing Protocol with Backup Route
APR Alternate Path Routing Protocol
DSDV Destination Sequence Distance Vector Routing Protocol
DSR Dynamic Source Routing Protocol
ERRP Error Packet
GPS Global Positioning System
MAC Medium Access Control
MANET Mobile Ad Hoc Network
MPR Multi-path Routing Protocol
MPT Multi-path Path Transport
MSR Multiple Source Routing Protocol
REP Reply Packet
REQ Request Packet
SMR Split Multi-path Routing Protocol
SNR Signal-to-Noise Ration
TORA Temporally Ordered Routing Algorithm Routing Protocol
WBS Work Breakdown Structure
Table 2: Table of acronyms
- 1 -
C h a p t e r 1
INTRODUCTION
This proposal outlines a doctoral research study, which investigates the
congestion avoidance mechanism utilizing multi-path routing in MANET.
Moreover, the study also covers the research on an efficient power control
algorithm to reduce interference and hence increase the network throughput.
The breadth of study involves derivation of a congestion-avoidance multi-
path routing protocol and an efficient power control algorithm, simulations of
these algorithms, collection of simulation data and assessment of the merits of
two new algorithms and lastly derivation of analytical models for them.
The following section provides some background knowledge about MANET
and its applications. Furthermore, this section also provides an overview of
the current works on this areas and motivations for this study. The next
section provides the detailed research description. It also defines research
phases with expected results. In addition, scheduling and resource
management are also discussed. The last section provides the references
which are used in this proposal.
- 2 -
C h a p t e r 2
BACKGROUND
Mobile Ad Hoc Network (MANET) has attracted research interest for a long
time. Initially, it was named packet radio network and initiated by Department
of Defense (DoD) of the United States of America. During that time, many
works have been done for routing and medium access control for tactical
military operations. However, interests in this area were declined due to the
limitations of the mobile nodes such as power and processing capability and
were limited for voice application.
Recently, due to the development of chip technology, handheld devices have
faster processing power and consume less energy. For example, a Personal
Digital Assistant (PDA) could have the processing power of 200 MHz and
enough power resource to do routing and intercommunication tasks.
Therefore, interests in intercommunication between handheld devices without
relying on fixed infrastructure such as base stations have been growing
significantly.
The applications for MANET can be divided into two categories: military and
commercial usage. For the former, MANET can be used for operations
which are very mobile and carried out in places where fixed wireless network
infrastructure does not exist. With ad hoc networking, troops can use
handheld devices to communicate with other troops, tanks, helicopters or
planes for the location awareness or to transmit and receive military
commands.
For the case of commercial usage, MANETs can be employed in emergency
situation where quick network infrastructure setup for communication is not
- 3 -
feasible. For example, people in the conference want to communicate with
one another for exchanging ideas and information for a short period of time.
In addition, firefighters, in emergency case, are required to communicate to
yield a better coordinated operation. Furthermore, in the case of law
enforcements such as criminal raids, policemen are in the need to
communicate with one another to efficiently track down criminals. In mining,
people tend to move from places to places, the setup of fixed network for
communication is costly and not money-wise.
There are significant differences between wireless and wired network. Wired
networks have relatively high bandwidth and topology which changes
infrequently. In contrast, wireless networks have nodes with high mobility and
limited bandwidth resource. Moreover, the link breakage rate is high, leading
to high chance of partitioning the network. Therefore, classic Bellman-Ford
based routing protocols incur too much overhead and take long time to
converge and hence are not appropriate for ad hoc network. As a result, there
is a need for new routing protocols, which solves all these drawbacks.
Routing in MANET could be accomplished through either single path or
multiple paths. Using single path routing protocols, traffic is distributed
through one route hence less flexible than multi-path routing ones where
traffic is distributed on multiple paths.
The problems of two communicating entities using multiple paths have been
considered in details in various contexts for wired network. The earliest
reference to multiple path transport was referred as diversity routing [1].
Work was also been done on using multiple paths to increase the maximum
throughput between a pair of nodes [2]. It was shown that a per-packet
allocation performed better than a per-connection allocation [2].
Furthermore, a detailed analysis of multi-path routing with resource
reservation for ATM network showed that multi-path routing achieved better
- 4 -
throughput than single-path routing [3]. In addition, a detailed performance
analysis of bust level bandwidth allocation using multi-path confirmed a
better performance, in terms of capacity and delay, as compared with single-
path [29]. Furthermore, algorithms for finding multi-path with minimum
delay were shown [4] [5]. In [4], the algorithm was shown to be optimal in
terms of data packet delay.
Although the research on multi-path analysis have been covered quite
thoroughly in wired networks, research on multi-path routing for wireless
networks is still in the early age. There are some proposed multi-path routing
protocols for MANET [7] [9] [11] [12] [4] [13] [14]. However, these distribute
traffic on one connection at a time for each source-destination pair. In other
words, traffic is not diversified into multiple routes at the same time but
focused on primary route. When this route is broken, other alternate routes
are used for transmission. The on-demand multi-path routing scheme is
presented in [7] as a multi-path extension of dynamic source routing (DSR)
[8], in which alternate routes are maintained so that they can be utilized when
the primary one fails. In AODV-BR [9], an extension of AODV [10], multiple
routes are maintained and utilized only when the primary roots fails.
However, traffic is not distributed to more than one path. Multiple Source
Routing protocol (MSR) [11] proposes a weighted round-robin heuristic-
based scheduling strategy among multiple paths in order to distribute load,
but provides no analytical modeling of its performance. Split multi-path
routing (SMR), proposed in [12], focuses on building and maintaining
maximally disjoint paths, however, the load is distributed in two routes per
session. In [13], the positive effect of alternate path routing (APR) on load
balancing and end-to-end delay in mobile ad hoc networks has been explored.
In an interesting application [14], multi-path path transport (MPT) is
combined with multiple description coding in order to send video and image
information in multi-hop mobile radio network.
- 5 -
Recently, there have been some works on distributing traffic on multiple
routes simultaneously in ad hoc networks. A framework for multi-path
routing and its analytical model in mobile ad hoc network was proposed in
[6]. This scheme, utilizing M-for-N diversity coding technique, solved the
inherent unreliability of the network by adding extra information overheads to
each packet. The data load was distributed over multiple paths in order to
minimize packet drop rate, achieve load balancing, and improved end-to-end
delay. In [15], it was shown that the route breakage rate using multi-path
routing was smaller as compared with single-path one. This also implied that
the route discoveries in multi-path routing were initiated less frequently than
in single-path routing.
From the research survey of literature for multi-path routing strategy, there
are still many issues in applying multi-path routing techniques into mobile ad
hoc networks that are to be covered. In most of the routing protocols, the
traffic is distributed mainly on the primary route. It is only when this route is
broken that the traffic is diverted to alternate routes. Clearly, load-balancing is
not achieved by using these routing mechanisms. Although there are some
routing protocols which distribute traffic simultaneously on multiple paths,
there has not been a routing protocol which could dynamically cope with the
changes of topology in ad hoc network.
Obviously, there is a demand for a multi-path routing strategy not only
efficiently can balance the load on the network but also can cope with the
dynamics of the network. Using the result from [2], [13] and [15], it is likely
that combining traffic distribution into packet granularity levels with a load-
balancing policy could get the bests of both methods. The new multi-path
routing protocol which is proposed as MRP-LB in this proposal is based on
this combination. The following table shows the categorization of existing
multi-path routing protocols for ad hoc networks and where the proposed
protocol is placed.
- 6 -
Multi-path Routing Protocols
Load-balancing No Load-balancing
Single-packet Multi-packet Single-packet Multi-packet
**MRP-LB** MSR X AODV-BR,
MDSR, SMR,
APR, MPT. Table 3: Categorization of multi-path routing
protocols for MANETs
Due to the broadcast nature of ad hoc networks, capacity of wireless
networks can be reduced significantly by interference when the transmission
range of the nodes overlaps. The main causes for this reduction are hidden
terminals and exposed terminals. The hidden terminals happen when some
mobile hosts in an area cannot hear transmissions from others due to limited
sensing range. This leads to the case when two nodes are transmitting
simultaneously to one destination, resulting in collision and packet loss. The
exposed terminals occur when some (but not all) nodes can hear
transmissions from other stations not in the local area. This happens when
the sensing range is greater than actual transmission range of mobile nodes. In
this case, the node does not transmit when it is supposed to.
It was shown that hidden terminals can have a detrimental effect on wireless
network [16]. In this paper, it was pointed out that although throughput is
acceptable when about 10 percent of station pairs are hidden, packet delay
could increase by an order of magnitude. Performance of the network
dropped sharply when the number of hidden pairs exceeded 10 percent.
Though many Medium Access Control (MAC) protocols have been proposed
to increase network performance, hidden terminals can only be solved for
data packets with additional control overheads [17] [18] [19] [20].
- 7 -
A node could reduce interference its neighbors by adjusting the transmission
power to an appropriate level. This not only increases the capacity of the
network by increasing spatial reuse [26] but also minimizes the energy usage
and thus enhances the lifetime of mobile nodes which is very important since
they have limited power resource. For military network, mobile nodes are
desired to minimize the intercept or probability of detection by keeping
radiation level as low and as infrequent as possible.
Power control for ad hoc networks has been covered in literature to some
extent. The most prominent work done in this area belongs to [21], where the
formula for optimum capacity for the wireless network placed on a disk of
unit area was derived. Furthermore, a framework for routing protocols was
also suggested to obtain maximum throughput. However, this work did not
consider the mobility of the mobile nodes. Determination of optimum
transmission range was also addressed in [22]. The paper derived the
minimum critical transmission range without partitioning the network.
However, this work was purely based on geometry theory without
considering interference due to hidden terminals and exposed terminals.
Furthermore, the probability of two hops connection in wireless network is
derived in [23]. Lastly, it was shown in [24] that the capacity of wireless
network increases with increasing mobility. In order to achieve this result,
source nodes dispatched its data packets to their neighbors and waited until
there were connections to target hosts which met certain routing criteria.
Though total network capacity was increased, data packets experienced long
delay.
Obviously, although there are some work done on determining the
transmission range and capacity of wireless ad hoc network, power control in
ad hoc networks has not been considered thoroughly. Moreover, the effect of
power control on capacity of wireless network has not been covered
- 8 -
intensively in ad hoc literature. Therefore, part of this research is devoted to
this area.
In conclusion, MANET was initially named packet radio network and an
attractive research topic, restricted to military purposes during 1970s and
beginning of 1980s. However, interests in this area were declined due to the
limitations of the mobile nodes. With advances in technology, nowadays
mobile nodes are able to do routing and communicating with one another
through data, voice or video. After carefully researching the current literature
on MANET, it is clear that there are still some problems needed to be
addressed in multi-path routing mechanism, power control algorithm. The
following section proposes in details a research study to address these
problems.
- 9 -
C h a p t e r 3
DESCRIPTION OF PROPOSED RESEARCH
Introduction
In this chapter, a research study is proposed in details. There are two areas to
be addressed in the research: a multi-path routing algorithm with load
balancing policy and an efficient power control algorithm. Therefore, there
are two main sub-sections in this chapter. Each sub-section will be dedicated
for one area.
Multi-path Routing in Ad Hoc Network with Load Balancing Policy
This section consists of the following sub-sections: proposing a preliminary
algorithm for multi-path routing with load balancing policy, simulation of the
algorithm, data collection, and mathematical analysis.
1) MRP-LB: Multi-path Routing Protocol with Load Balancing The objective of the load-balancing algorithm is spreading data traffic equally
into multiple paths that are available for each source-destination pair. From
[2], we spread the traffic at packet level. As shown in the paper, by using this
granularity, routing protocol was more adaptive to dynamics of ad hoc
networks. The proposed algorithm spreads the traffic load into multiple paths
by ensuring equal number of congested packets on each route. Since the
routes for a source-destination pair have different size-route (size-route is
defined as number of hops from source to destination), it can be seen that
traffic going through each route is inversely proportional to its size-route.
A) Problem formulation
- 10 -
Table 1 contains the information and parameters assumed for the network.
The network can be described as follows. There are N nodes in the network.
Mobile nodes move randomly in terms of velocity (direction and speed). For
each source-destination pair, there are Nu routes to be established. Each
route is categorized by the size-route Sij and the number of congested packets
on route. The following section provides details on the multi-path routing
algorithm.
B) Preliminary Algorithm
The proposed algorithm is of reactive routing protocol. It consists of three
main stages: Route Discovery, Data Transmission and Route Maintenance.
B.1) Route Discovery:
The source sends request packets (REQs) to the destination to discover
multiple routes. The target host replies a maximum of Nu request packets
with Nu reply packets (REPs). Inside the REPs, there is a field, named Total
Congested Packets, to record the total number of congested packets. The
REPs are then forwarded back to the source using the reverse path of the
REQs. Furthermore, each forwarding node forwards at most one REQ and
one REP for each source-destination pair. When forwarding the REPs,
intermediate nodes record their congested packets, compute total number of
congested packets on the route and store it on the field Total Congested
Packets inside the REPs. By the end of Route Discovery phase, Nu routes are
discovered. The source also has information on the number of congested
packets on each route.
B.2) Data transmission:
Upon receiving the REPs, source node routes data packets to destination
node. It accepts a maximum of Nu reply packets. Data packets are routed
over Nu routes in such a way that the total number of congested packets in
- 11 -
each route is maintained equally. The source node records the total number of
packets sent to each route. When the host wants to choose a route for packet
transmission, it checks these numbers. In addition, it has information about
the size route of each route. Therefore, it chooses a route in accordance with
the following criteria:
1 1 1 2 2 2min{ , ,..., }ij ij ij ij ij ij ijNu ijNu ijNuS C R S C R S C R+ + +
Where:
• Sijn is the size-route of the route n.
• Cijn is the number of congested packets sent on route n.
• Rijn is the initial number of congested packets on route n after Route
Discovery phase.
Cij is updated each time a packet is sent on that route. For example, when a
packet is sent on route n, the total number of packets sent on this route will
be Cijn=Cijn+1.
By using this algorithm, traffic is guaranteed to be shared equally over Nu
multiple paths.
B.3) Route Maintenance:
In MRP-LB, every node will send periodic “Hello” messages to its neighbour
to keep track the connectivity with them. The “Hello” message consists of the
source node ID to help neighbours identifying the source. Link breakage is
detected when the node has not received a “Hello” message or a data packet
from its neighbour for a TIME_OUT period. In order to achieve this, every
node maintains a count-down timer for each neighbour. Timers are initially
set to TIME_OUT and are reset only when the node receives the “Hello”
messages or acknowledgements of successful data transmissions. Once a
broken link is detected, an Error Packet (ERRP) is sent back to the source.
When receiving the ERRP, the source and intermediate nodes check their
routing tables and delete routes, which contain the broken link.
- 12 -
2) Simulation of the algorithm Although there are many simulation environments for network research,
OPNET and ns2 are mainly used for ad hoc network. In OPNET, there exist
3 simulation models for ad hoc routing protocols, i.e. DSR, AODV and ZRP.
These models are quite primitive and moreover some of them do not
conform accordingly to the latest specifications. Furthermore, for ns2, after
the MONARCH project from Carnegie Mellon University (CMU), ns2 have
built-in models supporting ad hoc network. The following routing protocols
are supported: AODV, DSR, DSDV, TORA, and OLSR. Writing simulation
using OPNET requires less work since OPNET already has many built-in
functions, allowing fast construction of simulation model. On the other hand,
it requires a great deal of work writing simulation using ns2. Furthermore,
since OPNET is a commercial product, it tends to be more reliable and
accurate in comparison to ns2. Therefore, OPNET is chosen to the
simulation environment.
3) Data collection metrics The metrics must correctly reflect improvements of using newly-derived
multi-path algorithm against the classic single-path ones (AODV, DSR,
DSDV). The expected improvements from using new algorithm are increased
throughput, decreased end-to-end delay, and decreased number of congested
packets per mobile node. Therefore, these serve as metrics for the
performance study of the new protocol.
4) Mathematical Analysis The mathematical model for the algorithm must reflect the improvements in
throughput and average end-to-end delay and average number of congested
packets. There are following candidates for analyzing the new protocol, i.e.
Markov chain, Markov decision chain, joint-biased queue, and joint shortest
queue. The decision of which theory to be used for modeling is subjected to
further investigation.
- 13 -
Power Control Algorithm for Ad Hoc Networks
This section consists of the following sub-sections: proposing the preliminary
algorithm for an efficient power control algorithm for ad hoc network,
simulation of the algorithm, data collection, and mathematical analysis.
1) PCA: Power Control Algorithm for Ad Hoc Network The objective of using power control is to correctly adjust the power level of
transmitting node, hence its transmission range to minimize the interference
with its neighbors. This increases the performance of the wireless network by
reducing packet loss, increasing the spatial reuse [26] and reducing power
consumption.
In order to control the power efficiently, a mobile node needs location
information of its neighbors and possibly its neighbors’ neighbors. This
information can be obtained by using GPS [27]. Therefore, it is important to
know that the information might not be accurate. In addition, the power
control algorithm must be adaptive to take into accounts the mobility of
nodes. As neighbors are moving further or closer, the algorithm must increase
or decrease the power level accordingly.
Clearly, the required power level is a function of following parameters:
distance to its intended receiver, neighbors’ distance (because we want to
minimize the interference), receiver’s mobility, and lastly the remaining power
level.
We have the following generic equation:
1
N
iP D M Di Rα β ε γ
=
= + + +∑
Where: , , ,α β ε γ are weighting factors.
- 14 -
D: Distance from the transmitter to the receiver.
M: Mobility function of a receiver. This consists of its velocity and direction.
Di: Distance to a transmitter’s neighbors.
R: Remaining battery level of the transmitter.
In order to adapt to the mobility of mobile nodes, mobility prediction
mechanism shall be embedded into power control algorithm. The mobility
mechanism in [28] is recommended.
2) Simulation of the algorithm Similarly, there are two main simulation environments for power control, i.e.
OPNET and ns2. OPNET is chosen because of its easy-to-use pre-defined
library functions. Furthermore, in OPNET, wireless network module is
supported in details with documentation.
3) Data collection metrics The algorithm is aimed to reduce interference of mobile nodes. Hence, the
primary metric for evaluating the algorithm is packet drop rate. Secondly, we
expect an improvement on average throughput per node.
4) Mathematical Analysis The mathematical model for the algorithm must reflect reduction in
interference and increase in throughput. The derivation of an analytical model
can be based on analysis of network geometry, movement of mobile nodes or
connectivity of the nodes. Furthermore, the model can also be based on the
results from [25]. Moreover, due to the inaccuracy of location information, a
stochastic model is adopted. In addition, for mobility prediction, model in
[28] is used.
- 15 -
Due to mobility of mobile nodes, a convergence analysis for the new power
control mechanism shall careful assessed. It is important to guarantee
algorithm convergence for a certain level of stochastic behaviors of network.
- 16 -
C h a p t e r 4
WORK BREAKDOWN STRUCTURE AND RESEACH SCHEDULE
Introduction
This section decomposes the research project into tasks and analyzes the
interdependency of these tasks using work breakdown structure (WBS).
Furthermore, a schedule for accomplishing the tasks is proposed. Each task
has its own deadline and delivery items.
Work Breakdown Structure (WBS) Clearly, there are two main tasks, designing a new multi-path load-balancing
routing algorithm, and an efficient power control mechanism. It can be seen
that two tasks are independent from each other.
1) MRP-LB: Multi-path Routing Protocol with Load Balancing The main task is divided into the following sub-tasks
1. Designing an algorithm for multi-path routing with load-balancing
policy [TASK 1].
2. Simulating of the designed algorithm [TASK 2].
3. Collecting the data according to the indicated metrics [TASK 3].
4. Deriving an analytical model to assure the increased in performance
of the new algorithm [TASK 4].
One paper is scheduled to be written when results of the simulation of multi-
path routing algorithm is accomplished [WRITE 1]. After studying the
routing protocol thoroughly, a journal shall be produced [WRITE 2].
- 17 -
2) PCA: Power Control Algorithm for Ad Hoc Network The main task is divided into the following sub-tasks
1. Designing an algorithm for power control algorithm [TASK 1A].
2. Simulating the designed algorithm [TASK 2A].
3. Collecting the data according to the indicated metrics [TASK 3A].
4. Deriving the analytical model to assure the correctness of the
algorithm [TASK 4A].
One paper is scheduled to be written when the simulation is accomplished
[WRITE 3]. After the study of the power control algorithm is completed, a
journal on the power control shall be produced [WRITE 4].
After studying both algorithms in details, work shall focus on the interaction
of the two algorithms relating to the network performance. [TASK 5]
Lastly, write-up for PhD thesis shall begin. The thesis shall be the final work
to report in details the two algorithms and their interactions [WRITE 5].
As a consequence, we have the following WBS:
- 18 -
Figure 1: Work Breakdown Structure
Multi-path routing algorithm
with
load-balancing
Paper 1
Design Design
Simulation
Collection
Simulation
Collection
Modeling Modeling
PhD thesis write-up
PhD Research
OPNET study
Literature Research
Proposal Writing
Paper 2
Interaction of Two Algorithms
Power Control A
lgorithm
- 19 -
Schedule The following table presents an approximate schedule of the tasks.
Tasks Duration (weeks) Time
TASK 1 12 01/04/02-01/07/02
TASK 2 12 02/07/02-02/10/02
TASK 3 12 03/10/02-03/12/02
TASK 4 12 04/12/02-04/03/03
TASK 1A 12 05/03/03-05/06/03
TASK 2A 12 06/06/03-06/09/03
TASK 3A 12 07/09/03-07/11/03
TASK 4A 12 08/11/03-08/02/04
TASK 5 8 08/02/04-08/04/04
WRITE 1 4 TBD
WRITE 2 4 TBD
WRITE 3 4 TBD
WRITE 4 4 TBD
WRITE 5 24 30/02/04-30/08/04
Total task: 14 138 01/04/02-30/08/04
Table 4: Schedule of the tasks
- 20 -
C h a p t e r 5
CONCLUSION
This proposal outlines a doctoral research, which investigates a new algorithm
for multi-path routing with load-balancing policy and a power control
mechanism for MANETs. The derivation for each algorithm comprises of
the following steps: designing the algorithm, simulation, data collection, and
derivation of a mathematical model to evaluate the performance of the
algorithm. In addition, a WBS for the research is proposed with a detailed
schedule of each task.
- 21 -
REFERENCE
[1] N.F. Maxemchuk, Diversity Routing, Proc. IEEE ICC’75, 10-41 San Francisco, CA, June 1975, pp. 41. [2] R. Krishnan, and J.A. Silvester, Choice of Allocation Granularity in Multi-path Source Routing Schemes. IEEE INFOCOM’93, vol. 1, pp.322-29. [3] I. Cidon, R. Rom, Y. Shavitt, Analysis of Multi-path Routing, IEEE/ACM Transactions on
Networking, 7(6), pp. 885-896, 1999. [4] R.C Ogier, and V. Ruthenburg, Minimum-Expected-Delay Alternate Routing, Proceedings of
Infocom’92, Florence, Italy, pp. 617-625, 6-May, 1992. [5] S.V. Nageswara, S.G. Batsell, Algorithm for Minimum End-to-End Delay Paths, IEEE
Communication letters, Vol.1, No.5, Sept 1997. [6] A. Tsirigos, Z. J. Haas, Multi-path Routing in the Present of Frequent Topological Changes, IEEE
Communications Magazine, Nov, 2001. [7] A. Nasipuri and S.R. Das, On-Demand Multi-path Routing for Mobile Ad Hoc Networks, IEEE
ICCCN’99, pp. 64-70. [8] D. Johnson and D. Maltz, Dynamic Sourte Routing in Ad Hoc Wireless Networks, Mobile
Comp.., T. Imielinski and H. Korth, Eds., Kluwer, 1996. [9] S.J. Lee and M. Gerla, AODV-BR: Backup Routing in Ad Hoc Network, IEEE WCNC 2000,
pp. 1311-16. [10]C.E. Perkins and E.M. Royer, Ad-Hoc On-Demand Distance Vector Routing, IEEE WMCSA,
p. 90-100. [11]L.Wang et al, Multipath Source Routing in Wireless Ad Hoc Networks, Canadian Conf. Elec.
Comp. Eng., Vol. 1, 2000, pp. 479-83. [12]S.J. Lee and M. Gerla, Split Multi-path Routing with Maximally Disjoint Paths in Ad Hoc
Networks, ICC’01. [13]M.R. Pearlman et al, On the Impact of Alternate Path Routing for Load Balancing in Mobile Ad
Hoc Network works, MobilHOC 2000, p.150. [14]N. Gogate et al, Supporting Video/Image Applications in a Mobile Multihop Radio Environment
Using Route Diversity, IEEE ICC’99. [15]A. Nasipuri and S.R. Das, On-Demand Multi-path Routing for Mobile Ad Hoc Networks,
Proceedings of the 8th Int. Conf. on Computer Communications and Networks (IC3N), Boston, October, 1999.
[16]S. Khurana et al, Effect of Hidden Terminals on the Performance of IEEE 802.11 MAC Protocol, Proceedings of 23rd Conf. on LAN, 1998.
[17]V. Bharghavan, A. Demers, S. Shenker, and L. Zhang, MACAW: A Media Access Prococol for Wireless LAN’s, Proceedings of ACM SIGCOMM’94, pp. 212-25, ACM, 1994.
[18]C. L. Fullmer, J.J. Garcia-Luna-Aceves, FAMA-PJ: A Channel Access Protocol for Wireless LANs, ACM MOBICOM'95, Nov, 1995.
[19]Z. Tang and J.J Garcia, Hop Reservation Multiple Access (HRMA) for Multichannel Packet Radio Networks, Proceedings of the IC3N, 1998.
[20] R. Garces and J.J. Garcia, Collision avoidance and resolution multiple access (CARMA) with transmission group, Proc. IEEE INFOCOMM’97, Kope, Japan, April, 9-11, 1997.
[21] P. Gupta, and PR Kumar, The Capacity of Wireless Networks. IEEE Transactions on Information Theory, 46(2):388-404, 2000.
[22] Migual Sanchez ,Pietro Manzoni and Zygmunt J. Haas, Determination of Critical transmission Range in Ad-Hoc Networks, Proceedings of Multi-access Mobility and Tele-traffic for Wireless Communications 1999 Workshop (MMT'99), October 6th-8th, Venice, Italy.
[23] L. E. Milner, Probability of a two-hop connection in a random mobile network, Conference on Information Science and Systems, March 21-23, 2001.
[24] M. Grossglauser and D. Tse, Mobility Increases the Capacity of Wireless Adhoc Network, IEEE Infocom 2001.
- 22 -
[25]L. E. Milner, Distribution of Link Distances in a Wireless Network, Journal of Research of the National Institute of Standards and Technology, vol 106, March–April 2001.
[26] L. Kleinrock and J., Silvester, Spatial reuse in mutlihop packet radio networks, Proc. IEEE, vol. 75, pp. 156-167, Jan. 1987.
[27] G. Dommety and R. Jain, Potential networking applications of global positioning systems (GPS),Tech. Rep. TR-24, CS Dept., The Ohio State University, April 1996.
[28] S-J. Lee, W. Su and M. Gerla, Ad hoc Wireless Multi-cast with Mobility Prediction, In Proceedings of 8th International Conference on Computer Communications and Networks (ICCN’99), 1999, pp. 4-9.
[29] Ashibani, M., Mashao, D., Nleya, B., Performance analysis of burst level bandwidth allocation using multipath routing reservation, EUROCON'2001, Trends in Communications, International Conference on. , Volume: 1 , Page(s): 70 -76 vol.1.