SlideShare ist ein Scribd-Unternehmen logo
1 von 15
IEEE TRANSACTIONS ON MOBILE COMPUTING,             VOL. 9,   NO. 9,   SEPTEMBER 2010                                                                  1293




               Efficient Load-Aware Routing Scheme
                     for Wireless Mesh Networks
Kae Won Choi, Wha Sook Jeon, Senior Member, IEEE, and Dong Geun Jeong, Senior Member, IEEE

       Abstract—This paper proposes a load-aware routing scheme for wireless mesh networks (WMNs). In a WMN, the traffic load tends to
       be unevenly distributed over the network. In this situation, the load-aware routing scheme can balance the load, and consequently,
       enhance the overall network capacity. We design a routing scheme which maximizes the utility, i.e., the degree of user satisfaction, by
       using the dual decomposition method. The structure of this method makes it possible to implement the proposed routing scheme in a
       fully distributed way. With the proposed scheme, a WMN is divided into multiple clusters for load control. A cluster head estimates
       traffic load in its cluster. As the estimated load gets higher, the cluster head increases the routing metrics of the routes passing through
       the cluster. Based on the routing metrics, user traffic takes a detour to avoid overloaded areas, and as a result, the WMN achieves
       global load balancing. We present the numerical results showing that the proposed scheme effectively balances the traffic load and
       outperforms the routing algorithm using the expected transmission time (ETT) as a routing metric.

       Index Terms—Wireless mesh network, load-aware routing, utility, dual decomposition.

                                                                                 Ç

1    INTRODUCTION

A     wireless mesh network (WMN) consists of a number
     of wireless routers, which do not only operate as hosts
but also forward packets on behalf of other routers. WMNs
                                                                                     over the traditional hop-count routing metric, they neglect
                                                                                     the problem of traffic load imbalance in the WMN.
                                                                                        In the WMN, a great portion of users intends to
have many advantages over conventional wired networks,                               communicate with outside networks via the wired gate-
such as low installation cost, wide coverage, and robust-                            ways. In such environment, the wireless links around the
ness, etc. Because of these advantages, WMNs have been                               gateways are likely to be a bottleneck of the network. If the
rapidly penetrating into the market with various applica-                            routing algorithm does not take account of the traffic load,
tions, for example, public Internet access, intelligent                              some gateways may be overloaded while the others may
transportation system (ITS), and public safety [1]. One of                           not. This load imbalance can be resolved by introducing a
the main research issues related to WMNs is to develop the                           load-aware routing scheme that adopts the routing metric
routing algorithm optimized for the WMN.                                             with load factor. When the load-aware routing algorithm is
                                                                                     designed to maximize the system capacity, the major benefit
   In mobile ad-hoc networks, the primary concern of
                                                                                     of the load-aware routing is the enhancement of the overall
routing has been robustness to high mobility. However,
                                                                                     system capacity due to the use of underutilized paths.
nodes in the WMN are generally quasi-static in their location.                       Although there have been some works on load-aware
Thus, the focus of the routing studies in the WMN has moved                          routing for mobile ad-hoc networks (e.g., [9], [10]) and
to performance enhancement by using sophisticated routing                            WMNs (e.g., [11], [12], [13]), they simply include some load
metrics [2], [3], [4], [5], [6], [7], [8]. For example, as the routing               factors in the routing metric without consideration of the
metrics, researchers have proposed the expected transmis-                            system-wide performance.
sion number (ETX) [2], the expected transmission time (ETT)                             In this paper, we propose a load-aware routing scheme,
and weighted cumulative ETT (WCETT) [5], the metric of                               which maximizes the total utility of the users in the WMN.
interference and channel switching (MIC) [6], and the                                The utility is a value which quantifies how satisfied a user is
modified expected number of transmissions (mETX) and                                 with the network. Since the degree of user satisfaction
                                                                                     depends on the network performance, the utility can be
effective number of transmissions (ENTs) [8]. Although these
                                                                                     given as a function of the user throughput. Generally, the
metrics have shown significant performance improvement
                                                                                     utility function is concave to reflect the law of diminishing
                                                                                     marginal utility. To design the scheme, we use the dual
. K.W. Choi is with the Department of Electrical and Computer Engineering,           decomposition method for utility maximization [14], [16].
  University of Manitoba, Room E2-390 EITC Building, 75A Chancellor’s                Using this method, we can incorporate not only the load-
  Circle, Winnipeg, MB R3T 5V6, Canada. E-mail: kaewon.choi@gmail.com.               aware routing scheme but also congestion control and fair
. W.S. Jeon is with the School of Electrical Engineering and Computer                rate allocation mechanisms into the WMN. Most notably,
  Science, Seoul National University, Gwanak-gu, Seoul 151-742, Korea.
  E-mail: wsjeon@snu.ac.kr.                                                          we can implement the load-aware routing scheme in a
. D.G. Jeong is with the School of Electronics and Information Engineering,          distributed way owing to the structure of the dual
  Hankuk University of Foreign Studies, Cheoin-gu, Yongin-si, Gyonggi-do             decomposition method.
  449-791, Korea. E-mail: dgjeong@hufs.ac.kr.                                           In the proposed routing scheme, a WMN is divided into
Manuscript received 7 Apr. 2008; revised 22 Oct. 2008; accepted 15 Dec.              multiple overlapping clusters. A cluster head takes role of
2009; published online 28 Apr. 2010.                                                 controlling the traffic load on the wireless links in its cluster.
For information on obtaining reprints of this article, please send e-mail to:
tmc@computer.org, and reference IEEECS Log Number TMC-2008-04-0129.                  The cluster head periodically estimates the total traffic load
Digital Object Identifier no. 10.1109/TMC.2010.85.                                   on the cluster and increases the “link costs” of the links in the
                                               1536-1233/10/$26.00 ß 2010 IEEE       Published by the IEEE CS, CASS, ComSoc, IES, & SPS
1294                                                     IEEE TRANSACTIONS ON MOBILE COMPUTING,     VOL. 9,   NO. 9,   SEPTEMBER 2010


cluster, if the estimated load is too high. In this scheme, each   (ROMER) algorithm in [20] also uses opportunistic for-
user chooses the route that has the minimum sum of the link        warding to deal with short-term link quality variation. The
costs on it. Thus, a user can circumvent overloaded areas in       ROMER maintains the long-term routes and opportunisti-
the network, and therefore, the network-wide load balance          cally expands or shrinks them at runtime.
can be achieved.                                                       The works in [21] and [22] focus on the applications
   The major advantages of the proposed load-aware                 accessing the wired gateways. The ad hoc on-demand
routing scheme can be summarized as follows:                       distance vector spanning tree (AODV-ST) in [21] is an
                                                                   adaptation of the AODV protocol to the WMN with the
    .  Designed by the dual decomposition method, the              wired gateways. The AODV-ST constructs a spanning tree of
       proposed load-aware routing scheme maximizes the            which the root is the gateway. In [22], the authors propose a
       system-wide performance.
                                                                   routing and channel assignment algorithm for the multi-
   . The proposed scheme is scalable, has low control
                                                                   channel WMN. In this algorithm, a spanning tree is formed in
       and computation overheads, and can be easily
                                                                   such a way that a node attaches itself to the parent node.
       implemented by means of the existing ad hoc
                                                                       The load-aware routing protocols [9], [10], [11], [12], [13]
       routing protocols [17].
                                                                   incorporate the load factor into their routing metrics. The
   The remainder of the paper is organized as follows: In          dynamic load-aware routing (DLAR) in [9] takes as the
Section 2, we briefly overview the related works. Section 3        routing metric the number of packets queued in the node
outlines the system model. In Section 4, we formulate the          interface. The load-balanced ad hoc routing (LBAR) in [10]
optimization problem and solve it by using the dual                counts the number of active paths on a node and its neighbors,
decomposition method. In Section 5, we explain how to              and uses it as a routing metric. Both the DLAR and LBAR are
implement the proposed routing scheme in a distributed             designed for the mobile ad hoc network, and aim to reduce
way. Section 6 presents the numerical results which show           the packet delay and the packet loss ratio. In [11], an
the performance of the proposed scheme. Finally, the paper         admission control and load balancing algorithm is proposed
is concluded with Section 7.                                       for the 802.11 mesh networks. In this work, the available radio
                                                                   time (ART) is calculated for each node, and the route with the
2       RELATED WORKS                                              largest ART is selected when a new connection is requested.
                                                                   This algorithm tries to maximize the average number of
For the WMN, a number of routing metrics and algorithms
                                                                   connections. In [12], the authors propose the WCETT load
have been proposed to take advantage of the stationary
                                                                   balancing (WCETT-LB) metric. The WCETT-LB is the
topology. The first routing metric is the ETX [2], which is the
expected number of transmissions required to deliver a             WCETT augmented by the load factor consisting of the
packet to the neighbor. In [3], the authors propose the            average queue length and the degree of traffic concentration.
minimum loss (ML) metric which is used to find the route           The QoS-aware routing algorithm with congestion control
with lowest end-to-end loss probability. In [4], the medium        and load balancing (QRCCLB) in [13] calculates the number
time metric (MTM) is proposed for the multirate network.           of congested nodes on each route and chooses the route with
The MTM of a link is inverse proportional to the physical          the smallest number of congested nodes.
layer transmission rate of the link. The ETT in [5] is a               Compared to these load-aware routing protocols, the
                                                                   proposed routing scheme has three major advantages. First,
combination of the ETX and the MTM. The ETT is a required
                                                                   the proposed scheme is design to maximize the system
time to transmit a single packet over a link in the multirate
                                                                   capacity by considering all necessary elements for load
network, calculated in consideration of both the number of
                                                                   balancing, e.g., the interference between flows, the link
transmissions and the physical layer transmission rate. The
                                                                   capacity, and the user demand, etc. On the other hand, the
authors in [5] also suggest the routing metric and algorithm       existing protocols fail to reflect these elements since they use
for the multiradio WMN, which are the WCETT and the                heuristically designed routing metrics. For example, the
multiradio link quality source routing (MR-LQSR), respec-          DLAR, the ART, and the WCETT-LB do not take account of
tively. The WCETT is a modification of the ETT to consider         the interference between flows. Also, the link capacity is not
the intraflow interference. While the WCETT only considers         considered by the DLAR, the LBAR, the ART, and the
the intraflow interference, the MIC [6] and the interference       QRCCLB. Second, the proposed scheme can guarantee
aware (iAWARE) [7] take account of the interflow inter-            fairness between users. When the network load is high, it is
ference as well as the intraflow interference.                     of importance for users to fairly share scarce radio resources.
    In [8], the mETX and the ENT are proposed to cope with         However, the existing protocols cannot fairly allocate
the fast link quality variation. These routing metrics contain     resources, since they are unable to distinguish which route
the standard deviation of the link quality in addition to the      is monopolized by a small number of users. Third, the
average link quality. The blacklist-aided forwarding (BAF)         proposed scheme can provide routes stable over time. Since
algorithm in [18] is proposed to tackle the problem of short-      most of the existing protocols adopt highly variable routing
term link quality degradation by disseminating the black-          metrics such as the queue length or the collision probability,
list, i.e., a set of currently degraded links. The ExOR            they are prone to suffer from the route flapping problem.
algorithm in [19] decides the next hop after the transmis-             We design the proposed routing scheme by using the
sion for that hop without predetermined routes. The ExOR           dual decomposition method for the network utility max-
can choose the next hop that successfully received the             imization. A brief introduction to this method can be found
packet, and therefore, it is robust to packet error and link       in [14], [15], and an elaborate explanation and a number of
quality variation. The resilient opportunistic mesh routing        examples can be found in [16]. To use this method, one
CHOI ET AL.: EFFICIENT LOAD-AWARE ROUTING SCHEME FOR WIRELESS MESH NETWORKS                                                       1295


                                                                                                TABLE 1
                                                                                            Table of Symbols




Fig. 1. Example mesh network.

should formulate the global optimization problem that is to         links in the network, respectively. In Table 1, we summarize
maximize the total system utility under the constraints on          all mathematical notations introduced in this section.
the traffic flows and the radio resources. After the                    The WMN under consideration provides a connection-
constraints are relaxed by the Lagrange multipliers, the            oriented service, where connections are managed in the unit
whole problem can be decomposed into the subproblems                of a flow. A flow is also unidirectional. A user can
which are solved by the different network layers in the             communicate with the other user or the gateway node after
different network nodes. In the decomposed problem, the             setting up a flow connecting them. Since a user is connected
Lagrange multipliers act as a interface between the layers          to a unique node, the flow between a pair of users can also
and the nodes, enabling the distributed entities to find the        be specified by the corresponding node pair. The node
global optimal solution only by solving their own subpro-           where a flow starts (ends) will be called the source
blems. Therefore, the dual decomposition method provides            (destination) node of the flow. Fig. 1 shows an example
a systematical way to design a distributed algorithm which          scenario where a user intends to send data to outside
finds the global optimal solution.                                  networks. As seen in this figure, if a flow conveys data to
                                                                    (from) outside networks, all gateway nodes can be the
                                                                    destination (source) node of the flow. We will identify a
3   SYSTEM MODEL                                                    flow by an index, generally f, and define F as the set of the
3.1 Mesh Network Structure                                          indices of all flows in the network.
                                                                        Data traffic on a flow is conveyed to the destination node
Each wireless router in a WMN is fixed at a location. Thus,         through a multihop route. We only consider acyclic routes.
the WMN topology does not change frequently and the                 Thus, a route can be determined by the set of all intermediate
channel quality is quasi-static. In addition, each wireless         links that the route takes. We will index a route by r and
router serves so many subscribers (i.e., users) in general that     define Dr as the set of the indices of all intermediate links on
the characteristic of the aggregated traffic is stable over time.   the route r. For a flow, there can be a number of possible
Therefore, we design the routing scheme under the system            routes that connect the source and destination nodes. Fig. 1
model of which topology and user configuration are stable.          shows some of the possible routes that a flow can take to
   In Fig. 1, we illustrate an example of the WMN. In this          send data to the outside networks. Let Gf denote the set of
figure, a node stands for a wireless router, which not only         the indices of all possible routes for flow f.
delivers data for its own users, but also relays data traffic for       For mathematical development, we assume that a flow can
other wireless routers. Among nodes, there are some                 utilize multiple routes simultaneously by dividing its data
gateway nodes connected to the wired backhaul network.              traffic into these routes. We limit the possible data rate of the
Each user is associated with its serving node. In this paper,       traffic conveyed by a flow on each route to control the amount
we do not deal with the interface between a user and its            of traffic injected to the WMN. Let f;r denote the “flow data
serving node to focus on the mesh network itself. Through           rate” which is defined as the maximum data rate at which the
the serving node, a user can send (receive) data traffic to         flow f can send data traffic on the route r. We also define
(from) the other user in the WMN or to (from) outside               f :¼ ðf;r Þr2Gf as the “flow data rate vector” of flow f. The
networks via the gateway nodes. If node n can transmit data         sum of all the components in a flow data rate vector is limited
to node m directly (i.e., without relaying), there exists a link    to the “maximumP     flow data rate,” denoted by max . That is, it
from the node n to the node m. In this paper, we define a link      should hold that r2Gf f;r max .
as unidirectional. For the mathematical representation, we              We will call f the “multipath flow data rate vector,” if
define N and L as the sets of the indices of all nodes and all      f;r  0 for more than one r in Gf . On the other hand, we
1296                                                         IEEE TRANSACTIONS ON MOBILE COMPUTING,        VOL. 9,   NO. 9,   SEPTEMBER 2010


will refer to f as the “single-path flow data rate vector,” if         transmission. If two links are adjacent enough to interfere
f;
  0 for only one “active route” 
 and f;r ¼ 0 for the             with each other, packets cannot be conveyed through the
other rs in Gf . Since the multipath routing is hard to be              two links at the same time. To incorporate this restriction
implemented in a practical sense, we will focus on finding              into the proposed scheme, we divide the WMN into
the single-path flow data rate vectors for all flows in the             multiple overlapping clusters. A cluster includes the links
WMN. Let 
f denote the active route of the flow f that has              adjacent enough to interfere with each other. Therefore, any
the single-path flow data rate vector. In case that all flows           pair of links in the same cluster cannot deliver packets
                                                                        simultaneously. A cluster is generally indexed by c, and let
have the single-path flow data rate vector, we can let 
 :¼
                                                          
                                                                        C be the set of the indices of all clusters in the WMN. We
ð
f Þf2F denote the “active route vector.”
                                                                        also define Mc as the set of all links in the cluster c.
   Deciding a single-path flow data rate vector is equivalent
                                                                           The proposed scheme estimates the traffic load in each
to deciding an active route for the flow and the flow data
                                                                        cluster. The traffic load in a cluster is the sum of the traffic
rate on the active route. An application using the flow can             load on the links in the cluster. If the traffic load in a cluster is
send user data through the active route at its flow data rate.          estimated to be too high, the proposed scheme can redirect
The active route can be decided in such a way that the                  the routes passing through the overloaded cluster for load
global load balancing is accomplished. In addition, network             balancing. The airtime ratio of a link represents the traffic
congestion can be controlled and fairness can be guaranteed             load on the link. If the sum of the airtime ratios of the links in
by deciding the flow data rate properly. Therefore, the load-           a cluster exceeds a certain bound, the cluster can be regarded
aware routing, congestion, and fairness problems can be                 as overloaded.
solved at the same time, if we find a way to calculate                     Roughly, we assume that a fixed portion of the time can
appropriate flow data rate vectors.                                     be used for data transmission, while the remainder is used
                                                                        for the purpose of control, e.g., control message exchange
3.2     Physical and Medium Access Control Layer
                                                                        and random back-off. Let
denote the ratio of the time for
        Model
                                                                        data transmission to the whole time. Since only a link can
The proposed scheme can be implemented on top of                        convey data traffic at a time within a cluster, the sum of the
various physical (PHY) and medium access control                        airtime ratios of the links in a cluster cannot exceed
.
(MAC) layer protocols that utilize a limited bandwidth                  Therefore, we have the following constraint:
and divide the time for multiple access, for example, such                                  X
as the carrier sense multiple access/collision avoidance                                        al
; for all c 2 C:                     ð2Þ
(CSMA/CA), the time division multiple access (TDMA),                                        l2Mc

and the reservation ALOHA (R-ALOHA).                                        In Fig. 1, we give an example organization of clusters.
    The effective transmission rate of a link is defined as the         Note that we do not draw all clusters to avoid over-
number of actually transmitted bits divided by the time                 crowding. In this figure, four clusters are presented, each of
spent for data transmission, calculated in consideration of             which is indicated by a dashed circle. Suppose that a cluster
retransmissions due to errors. That is, the effective transmis-         includes all incoming and outgoing links of the nodes in the
sion rate can be calculated as the PHY layer transmission               dashed circle. In this example, the clusters 1 and 2 cover the
rate times the probability of successful transmission. The              areas around the gateway nodes 1 and 2, respectively.
PHY layer transmission rate can be fixed, or can be                     When the estimated traffic load around the gateway node 1
adaptively adjusted according to the channel quality by                 is too high, the user taking the route to the gateway node 1
means of rate control schemes such as the receiver-based                may not achieve high data rate due to the constraint (2) for
autorate (RBAR) [23]. In the WMN under consideration, the               cluster 1. In this case, if the gateway node 2 is lightly loaded,
effective transmission rate of a link is assumed to be static for       it is desirable for the user to choose the route to the gateway
                                                                        node 2 for higher data rate. Thus, it can be said that the
a long time due to fixed locations of nodes. We define dl as
                                                                        traffic load is estimated and controlled in the unit of the
the effective transmission rate of the link l.
                                                                        cluster for global load balancing.
    If all flows convey data traffic through each route at their
                                                                            The notion of a cluster corresponds to a clique in the
flow data rates, the sum of the data P
                                     P      rates of traffic passing
                                                                        “conflict graph” introduced in [24]. In the conflict graph,
through link l is calculated as r2Hl f2Qr f;r , where Hl is
                                                                        vertices correspond to the links in the WMN. An edge is
defined as the set of the indices of all routes passing through
                                                                        drawn between two vertices if the corresponding links
the link l, i.e., Hl :¼ fr : l 2 Dr g, and Qr is the indices of all     interfere with each other. Thus, an edge stands for confliction
flows that use the route r, i.e., Qr :¼ ff : r 2 Gf g. We define        between two vertices. A clique in the conflict graph is a set of
the “airtime ratio” of the link l, denoted by al , as the ratio of      vertices that mutually conflict with each other. According to
the time taken up by the transmission to the total time of link         [24], unless the conflict graph is a “perfect graph,” the clique
l. The airtime ratio of the link l can be calculated as the sum of      constraints in (2) are not tight in the strict sense even when all
the data rates on the link l divided by the effective                   cliques (clusters) are taken into account. In [25], the authors
transmission rate of the link l. That is,                               propose the centralized algorithm that transforms the conflict
                               X X f;r                                 graph to a perfect graph by adding unnecessary edges to the
                         al ¼                :                    ð1Þ   conflict graph. This algorithm can also be applied to our
                               r2Hl f2Q
                                         dl
                                      r
                                                                        routing scheme. However, from a practical point of view, this
   Now, we discuss the restriction on the radio resource                algorithm is inefficient since it requires centralized control
allocation. For the protocols under consideration, time is the          and can overly reduce spatial reuse. Therefore, in this paper,
only radio resource, which is shared by links for data                  we recommend to use the clique constraints in (2) as it is.
CHOI ET AL.: EFFICIENT LOAD-AWARE ROUTING SCHEME FOR WIRELESS MESH NETWORKS                                                         1297
                                                                                                                 À1
Actually, these clique constraints are enough to serve our                               duf ðxÞ         
                                                                                                 ¼          xþ1         :            ð5Þ
purpose, i.e., identifying overloaded regions in the WMN to                                dx            pf
redirect the routes. Also, there can be too many cliques in the
                                                                    The marginal utility of a flow is the amount of the utility that
conflict graph, and therefore, considering all of them can
                                                                    the system can obtain by assigning a unit data rate to the
render the proposed scheme highly complex. From a practical
                                                                    flow. Thus, to maximize the system utility, the proposed
point of view, the clusters do not need to cover all possible       scheme is likely to allocate more data rate to the flow with
cliques, but it is enough for the clusters to be formed in such a   large marginal utility. If  is large, the marginal utility drops
way that the traffic load in each region of the WMN is              quickly as the data rate increases. In this case, the data rates
separately evaluated.                                               tend to be fairly allocated to flows, since the incentive to
3.3 Utility and Delay Penalty as Optimization Target                assign more data rate to the flow which has already received
                                                                    a high data rate reduces. The flow with large value of pf has
The flow with longer distance consumes generally more
                                                                    a large marginal utility, and therefore, it can receive more
airtime to convey the same amount of data. Therefore, if
                                                                    data rate.
maximizing system throughput is the optimization target in
the WMN, the flows with short distance are likely to be                 When the flowP sends data at its flow data rate, the data
                                                                                           f                       P
allowed to send much more data than those with long                 rate of flow f is r2Gf f;r . Note that r2Gf f;r is equal to
distance are, which leads to unfair resource allocation among       the data rate allocated to one active route, if  f is a single-
flows. Thus, we need an optimization target other than the          path flow data rate vector. Hence, the utility of flow f is
                                                                        P
system throughput to take into account the fairness among           uf ð r2Gf f;r Þ. If we consider only the utility in the objective
flows. We consider the utility of a flow that represents the        function of the optimization problem, the routing algorithm
degree of satisfaction felt by the user using the flow. The         is likely to ignore the end-to-end delay on a route. Since the
utility is a highly desirable performance measure since the         delay is also of great importance in the practical WMN, we
user satisfaction is the ultimate goal of the network design.       incorporate the delay term into the objective function. To do
   The utility function defines the mapping between the             this, we define the “delay penalty function” for each flow,
data rate of a flow and the utility of that flow. Since the         which penalizes the objective function for selecting the
utility function quantifies the network performance per-            route with long end-to-end delay. Since the time to transmit
ceived by users when a data rate is given, it can only be           a packet of x bits through the link l is given as x=dl , we can
estimated by a subjective survey, not by theoretical
                                                                    sayP the end-to-end delay on the route r is proportional
                                                                         that
development. In [26] and [27], the utility function for best
                                                                    to     l2Dr 1=dl . The delay penalty function should have a
effort traffic is derived by analyzing the results from a
subjective survey for various network data applications.            larger value when a flow sends more data on the route with
The utility function of a single best effort user is given as       long end-to-end delay. Therefore, the delay P
                                                                                                               P            penalty func-
                                                                    tion for the flow f can be given as r2Gf f;r l2Dr 1=dl .
                 uðxÞ ¼ 0:16 þ 0:8 lnðx À 3Þ;                ð3Þ        Since we have two different objectives (i.e., the utility and
                                                                    the delay penalty), we should find a Pareto optimal solution
where x is the data rate in the unit of Kilobits per second.
                                                                    such that no other solution can improve any objective
This utility function is a strictly concave function, and as a
                                                                    without worsening the other objective. To calculate a Pareto
result, it well shows the law of diminishing marginal utility.
   Although the utility function (3) might be best fitted to        optimal solution, we use the scalarization technique [28,
the survey results, it is not adequate for theoretical              pp. 178-180] that merges multiple objectives into a single
derivation since it is not defined for x 3. Thus, we do             objective by taking the weighted sum of the objectives. We
not take the specific values in (3) but adopt only the log          introduce the merged objective function as follows:
form of (3) to reflect the law of diminishing marginal utility.                            0          1
In this paper, the utility function is designed so as to contain                   X         X                XX           X 1
the parameters related to system-wide fairness and priority              OðÞ :¼
                                                                                       uf @     f;r A À  Á         f;r        ;   ð6Þ
                                                                                   f2F       r2G              f2F r2G      l2D
                                                                                                                               dl
of flows. We define the utility function of flow f as follows:                                f                     f       r


                                                                  where  :¼ ðf;r Þf2F ;r2Gf and  is the “delay penalty para-
                                                                           
                             pf     
                   uf ðxÞ :¼ ln        xþ1 ;                 ð4Þ    meter” that controls the relative importance of the delay
                                  pf
                                                                    penalty to the utility. We can reduce the end-to-end delay at
where x is the data rate,  is the system-wide fairness             the expense of the utility by increasing the delay penalty
parameter, and pf represents the priority of flow f. The
                                                                    parameter. We will demonstrate the impact of the delay
utility function enables us to control the trade-off between
efficiency and fairness by adjusting . With a high value of        penalty parameter in Section 6.
, the system-wide fairness can be guaranteed at the cost of
the system throughput. In other words, by increasing the            4   PROPOSED LOAD-AWARE ROUTING SCHEME
value of , the standard deviation of the flow data rates can
be decreased, but the average flow data rate also decreases.        In this section, we design the proposed routing scheme by
The parameter pf controls the priority of flow f. The flow          using the dual decomposition method. We first formulate the
with high priority pf is likely to enjoy a high data rate.          optimization problem from the objective function and the
   To explain the reason behind the effect of the parameters,       constraints introduced in the previous section, and derive
we introduce the marginal utility. The marginal utility can         the dual problem. Next, we explain how to calculate the flow
be derived by differentiating the utility function by the data      data rate vector for the given Lagrange multipliers and
rate. That is,                                                      suggest the subgradient method to iteratively calculate the
1298                                                                   IEEE TRANSACTIONS ON MOBILE COMPUTING,                   VOL. 9,      NO. 9,        SEPTEMBER 2010
                                                                                                                     X
optimal Lagrange multipliers. Finally, we propose the                                                  s:t:   l À           c ¼ 0;        for l 2 L;               ð13Þ
                                                                                                                     c2V l
dampening algorithm to alleviate the route flapping problem.
                                                                                                              c ! 0;         for c 2 C:                             ð14Þ
4.1 Problem Formulation
                                                                                        Ã          Ã      Ã
We formulate the optimization problem from (1), (2),                     and    Let w :¼ ð ;  Þ be any optimal solution of this dual
                                                                                          
                                                                                problem.
(6) as follows:
                               !                                                4.2     Flow Data Rate Calculation for Given Lagrange
              X       X                 XX            X1
         max      uf       f;r À  Á            f;r        ;            ð7Þ           Multipliers
              f2F     r2Gf              f2F r2Gf
                                                          d
                                                      l2Dr l                    Now, we calculate the flow data rates that maximize the
                     X X f;r                                                   Lagrangian (10) for given Lagrange multipliers. To do this,
          s:t: al ¼               ; for all l 2 L;                        ð8Þ
                    r2Hl f2Qr
                               dl                                               we find the maximizer of ð f ;  Þ over f 2 P f for each flow
                                                                                                                   
               X                                                                f. Let P f ðÞ denote the set of such maximizers, i.e.,
                                                                                              
                   al
; for all c 2 C;                                   ð9Þ   P f ð Þ :¼ arg maxf 2P f ð f ;  Þ. The following proposition
                                                                                                            
                  l2Mc
                                                                                holds for the set P f ðÞ:
                                                                                                         
                     P
where f;r ! 0 and     r2Gf f;r max for all f and r. This                     Proposition 1. The set P f ð Þ contains at least one single-path
                                                                                                            
optimization problem is feasible and convex. Let à be any
                                                   f;r                            flow data rate vector.
optimal solution of this optimization problem. We also
                                                                                Proof. The proof is provided in Appendix A.                                            u
                                                                                                                                                                       t
define the optimal flow data rate vector à :¼ ðà Þr2Gf .
                                          f      f;r
   We solve the optimization problem by converting it to
                                                                                   From now on, we will explain how to find a single-path
the dual problem according to the Lagrangian method in
                                                                                flow data rate vector in P f ðÞ. Let f ð
;  Þ be the maximum
                                                                                                              
[29]. The Lagrangian is given as follows:
                                                                                value of ðf ;  Þ when f is a single-path flow data rate
                                                                                             
  Âð; a; wÞ
                                                                               vector with the active route of 
. That is,
                                 !                                                                            
       X          X                          XX
                                              X1                                                                           X  þ l '
  :¼         uf          f;r        ÀÁ                f;r                             f ð
; Þ :¼ max       uf ðÞ À               :    ð15Þ
                                                  d                                                  0  max                     dl
     f2F       r2Gf             f2F r2Gf      l2Dr l                                                                       l2D                     

      X              X X f;r      ' X              X '
    þ       l al À                    þ      c
À      al                    We define Rf ðÞ :¼ arg max
2Gf f ð
;  Þ as the set of the
                                                                                                 
       l2L           r2Hl f2Qr
                                dl        c2C        l2Mc    ð10Þ               “optimal routes.” To maximize ðf ;  Þ, the active route 
                                                                                                                     
                         !
    X           X            X         X  þ l '                              should be one of the optimal routes in Rf ðÞ. Since uf ðÞ is
                                                                                                                             
  ¼        uf        f;r À        f;r                                         a concave function, f ð
; Þ is larger for the active route 
                                                                                                    P
    f2F         r2Gf          r2Gf      l2Dr
                                               dl                               with the smaller l2D
 l =dl . Therefore, we can also write
      X            X     '         X                                           Rf ð Þ as follows:
                                                                                    
    þ         l À      c a l þ
c ;
           l2L           c2V l                    c2C
                                                                                                                                     X  þ l
                                                                                                          Rf ð Þ ¼ arg min
                                                                                                                                                      :             ð16Þ
                                                                                                                              
2Gf            dl
where a :¼ ðal Þl2L and V l denotes the set of the indices of all                                                                    l2D

clusters that the link l belongs to (i.e., V l :¼ fc : l 2 Mc g). It
is noted that we have                                                           P We define ð þ l Þ=dl as the “link cost” of the link l. Since
                                                                                  l2D
 ð þ l Þ=dl is the sum of link costs on the route 
, the
         X XX                      XX           X                               optimal route is the route that minimizes the sum of link
             l         f;r =dl ¼         f;r     l =dl ;
            l2L    r2Hl f2Qr                       f2F r2Gf     l2Dr
                                                                                costs. Since most existing ad hoc routing algorithms can
       P          P                     P          P                            employ the sum of link costs as the routing metric, the
and c2C c l2Mc al ¼ l2L al c2V l c . In (10), l and c                       optimal route can be found by applying those ad hoc
are the Lagrange multipliers corresponding to the con-                          routing algorithms.
straints (8) and (9), respectively. We also define  :¼ ðl Þl2L ,                 When f is a single-path flow data rate vector with the
 :¼ ðc Þc2C , and w :¼ ð ;  Þ.
                                                                               active route of 
, we can maximize ðf ;  Þ if the flow data
                                                                                                                          
   From the Lagrangian, we define the dual function as                          rate on the active route is equal to
gðwÞ :¼ max;a Âð; a; wÞ. The dual function gðwÞ is defined
                    
                                                     P                                f ð
;  Þ
only for the Lagrange multipliers such that l À c2V l c ¼                                                     X  þ l '
0 for l 2 L, since we have gðwÞ ¼ 1 for the other Lagrange                            :¼ arg max      uf ðÞ À 
multipliers. Then, the dual function is given as follows:                                   0  max
                                                                                                                 l2D
                                                                                                                         dl                                          ð17Þ
                       X                      X                                                                           !þ       '
                                                                                               pf             1
                gðwÞ ¼    max ð f ;  Þ þ
c ;        ð11Þ                      ¼ min          P                   À1     ; max ;
                                                                                                       l2D
 ð þ l Þ=dl
                                        f 2P f                                                 
                                 f2F                           c2C
                                          P
where P f :¼ ff : f;r ! 0 for r 2 Gf ; r2Gf f;r max g and
                                                                               w h e r e ½xŠþ ¼ maxf0; xg. L e t u s d e f i n e f ð
; Þ :¼
                  P             P         P
ðf ;  Þ :¼ uf ð r2Gf f;r Þ À r2Gf f;r l2Dr ð þ l Þ=dl .
                                                                               ðf;r ð
; ÞÞr2Gf as follows:
   From the dual function, we define the following dual                                                        
                                                                                                                 f ð
;  Þ; if r ¼ 
;
problem:                                                                                        f;r ð
;  Þ ¼                            ð18Þ
                                                                                                                 0;          otherwise:
                                       min        gðwÞ;                  ð12Þ
                                                                                Then, we have f ð
; Þ 2 P f ðÞ if 
 2 Rf ð Þ.
CHOI ET AL.: EFFICIENT LOAD-AWARE ROUTING SCHEME FOR WIRELESS MESH NETWORKS                                                                1299

                                                                                                                          ðjÞ
4.3 Lagrange Multiplier Update                                           jP f ðà Þj  1, it is not guaranteed that f ð
f ;  ðjÞ Þ converges
                                                                               
From now on, we will find the solution of the dual problem               to the optimal flow data rate vector. The cardinality of
(12). The constraint (13) in the dual problem can be                     P f ð Ã Þ is closely related to the cardinality of Rf ð Ã Þ in (16).
                                                                                                                                    
incorporated into the dual function. We define the modified              If jRf ð Ã Þj ¼ 1, we also have jP f ð Ã Þj ¼ 1. On the other
                                                                                                                      
dual function hð Þ :¼ gðð ðÞ; ÞÞ, where  ð Þ :¼ ðl ðÞÞl2L
                                                                    hand, if jRf ðà Þj  1, the set P f ðÃ Þ contains multiple flow
                                                                                                                 
satisfies the constraint (13) for given . That is,                      data rate vectors, which include the multipath flow data
                                  X                                      rate vector distributing the data rates on the multiple routes
                        l ð Þ ¼
                                    c ;                    ð19Þ        in Rf ð Ã Þ. This means that  Ã may be the multipath flow
                                                                                                             f
                                       c2V l                             data rate vector for the flow f such that jRf ðà Þj  1. In this
                                                                                                                                 
                                                                                                                                         ðjÞ
for all l. Then, the dual optimal solution  Ã minimizes hðÞ
                                                                        case, the single-path flow data rate vector f ð
f ; ðjÞ Þ
over c ! 0 for all c 2 C.                                               cannot converge to à . However, we can still use
                                                                                                        f
                                                                               ðjÞ
   We will use the subgradient method [29, p. 620] to                    f ð
f ; ðjÞ Þ for all fs as a suboptimal solution very close
calculate the dual optimal solution. We can calculate the                to the optimal one, since there are generally a small number
subgradients of h from the theorem of dual derivatives [29,              of the flows fs such that jRf ð Ã Þj  1, and the flow data
                                                                                                                
p. 604]. Recall that 
f denotes the active route of the flow f,          rates in P f ð Ã Þ well approximate à even for fs such that
                                                                                                                      f
and 
 ¼ ð
f Þf2F denotes the active route vector. We first
                                                                        jRf ð Ã Þj  1.
                                                                               
                                                                                                          ðjÞ
calculate al ð ; Þ, which denotes the airtime ratio of link l
              
                                                              Even when we use f ð
f ;  ðjÞ Þ as a suboptimal solution,
when 
 and  are given. The airtime ratio al ð ; Þ is
                                                      
                 we still have the “route flapping problem.” The fact that
                                                                               ðjÞ
calculated as follows:                                                   f ð
f ; ðjÞ Þ converges to the set P f ðÃ Þ does not mean
                                                                                                                           
                                                                                      ðjÞ
                                                                         that  f ð
f ; ðjÞ Þ has a limit in P f ð Ã Þ. Therefore, for fs such
                                                                                                                   
                                  X X f;r ð
f ;  Þ                                                                         ðjÞ
                 al ð ;  Þ :¼
                     
                                 :         ð20Þ    that jP f ð Ã Þj  1, it is possible that f ð
f ; ðjÞ Þ alternates
                                                                                      
                                  r2Hl f2Qr
                                               dl                        between some points in P f ðÃ Þ even after  ðjÞ is sufficiently
                                                                                                            
                                                                         converged to  Ã . In this case, the active route can flap between
From al ð ;  Þ, we can calculate sð ;  Þ :¼ ðsc ð ; ÞÞc2C ,
         
                                   
       
                                                                         some routes in Rf ð Ã Þ. We now suggest the “dampening
                                                                                                  
which is defined as
                                                                         algorithm” to solve this route flapping problem.
                                   X
                 sc ð ; Þ :¼
À
                     
               al ð ;  ðÞÞ:
                                         
                ð21Þ
                                                                         4.5    Dampening Algorithm: Solution to Route
                                      l2Mc
                                                                                Flapping Problem
If 
f 2 Rf ððÞÞ for all f 2 F , the vector sð ; Þ is the
                                                           
           The dampening algorithm should alleviate the route flapping
subgradient of hðÞ.                                                    problem while keeping the solution in the close range of the
    Let  ðjÞ :¼ ððjÞ Þc2C be the estimation of à at the jth
                     c                                                   optimal one. Moreover, the dampening algorithm should be
iteration of the subgradient method. We also define 
 ðjÞ :¼            able to be implemented in a distributed way. To accomplish
   ðjÞ                                                   ðjÞ
ð
f Þf2F as the active route vector such that 
f 2 Rf ðððjÞ ÞÞ
                                                                       these goals, the dampening algorithm prevents the route
for all f 2 F . The iteration begins when j ¼ 1. The initial             flapping by changing the active route more conservatively
values should satisfy ð0Þ ! 0 for all c 2 C. The Lagrange
                             c                                           than the original algorithm does. When the original algo-
                                                                                                     ðjÞ
multipliers are updated at the jth iteration as follows:                 rithm is used, we have 
f 2 Rf ð ðjÞ Þ. This means that, at the
                                                                                                               
                           Â             À             ÁÃþ               jth iteration, the original algorithm finds any optimal route in
                  ðjþ1Þ ¼  ðjÞ À ðjÞ s 
 ðjÞ ; ðjÞ
                                                          ;      ð22Þ   Rf ð ðjÞ Þ from (16), and immediately changes the active route
                                                                              
                                                                         to the new optimal route. However, the dampening algo-
where ½ðxc Þc2C Šþ ¼ ðmaxf0; xc gÞc2C and ðjÞ is the step size.
                                                                         rithm changes the active route only if the new route increases
The step size can be the diminishing step size that satisfies
          P1 ðjÞ               P1 ðjÞ 2                                  f ð
; ðjÞ Þ by a certain margin.
ðjÞ  0,   j¼0    ¼ 1, and      j¼0 ð Þ  1. In this case,                Let us explain the operation of the dampening algorithm.
 ðjÞ converges to à . Alternatively, we can also use the               We define  as the “dampening parameter” which controls
constant step size, which makes ðjÞ converge to within                  the conservativeness in changing the route. The value of  is
                                         ðjÞ
some range of  Ã . We define  ðjÞ :¼ ðl Þl2L ¼  ððjÞ Þ. Then,
                                                                        between zero and one. If  is set to one, the dampening
 ðjÞ converges to  à when ðjÞ converges to à .                       algorithm is the same as the original algorithm. The active
                                                                         route is changed more conservatively with the smaller value
4.4 Convergence of Flow Data Rate
                    ðjÞ                                                  of . At the jth iteration, the dampening algorithm first finds
We take  f ð
f ;  ðjÞ Þ as the estimation of the optimal flow                                                 ðjÞ
                                                                         any optimal route in Rf ð ðjÞ Þ. Let yf denote the optimal route
                                                                                                     
data rate vector à at jth iteration. We will discuss the
                         f                                               for the flow f, newly found at the jth iteration. The
convergence of this flow data rate vector. Since the                                                                          ðjÞ
                                                                         dampening algorithm decides the active route 
f according
optimization problem (7) is strictly feasible and the objective
                                                                         to the following rules:
and constraint functions are concave, the strong duality
                                                                                          ðjÀ1Þ                 ðjÞ
holds from the Slater’s constraint qualification [29, p. 520].              .    If f ð
f ;  ðjÞ Þ !  Á f ðyf ; ðjÞ Þ, the dampening
Therefore, Ã is included in the set P f ð Ã Þ. Moreover,
                   f                                                            algorithm does not change the active route, i.e.,
      ðjÞ
 f ð
f ;  ðjÞ Þ also converges to the set P f ð Ã Þ as j ! 1, since
                                                                                  ðjÞ   ðjÀ1Þ
                   ðjÞ                                                           
f ¼ 
f .
we have f ð
f ; ðjÞ Þ 2 P f ð ðjÞ Þ for all j.
                                                                                         ðjÀ1Þ                 ðjÞ
     From the above statements, we can conclude that                        .    If f ð
f ;  ðjÞ Þ   Á f ðyf ; ðjÞ Þ, the dampening
      ðjÞ                                                                        algorithm changes the active route to the new
 f ð
f ;  ðjÞ Þ converges to à as j ! 1 for the flow f such
                                 f                                                                      ðjÞ      ðjÞ
that jP f ð Ã Þj ¼ 1. However, for the flow f such that
                                                                                optimal route, i.e., 
f ¼ yf .

Weitere ähnliche Inhalte

Was ist angesagt?

Energy efficiency cross layer protocol for wireless mesh network
Energy efficiency cross layer protocol for wireless mesh networkEnergy efficiency cross layer protocol for wireless mesh network
Energy efficiency cross layer protocol for wireless mesh networkIJCNCJournal
 
MULTICASTING BASED ENHANCED PROACTIVE SOURCE ROUTING IN MANETS
MULTICASTING BASED ENHANCED PROACTIVE SOURCE ROUTING IN MANETSMULTICASTING BASED ENHANCED PROACTIVE SOURCE ROUTING IN MANETS
MULTICASTING BASED ENHANCED PROACTIVE SOURCE ROUTING IN MANETSIJCNCJournal
 
Overview of Improving Robustness of MAODV Protocol by Combining Tree and Mesh...
Overview of Improving Robustness of MAODV Protocol by Combining Tree and Mesh...Overview of Improving Robustness of MAODV Protocol by Combining Tree and Mesh...
Overview of Improving Robustness of MAODV Protocol by Combining Tree and Mesh...IOSR Journals
 
Adaptive QoS Multicast Routing with Mobility Prediction in MANETs
Adaptive QoS Multicast Routing with Mobility Prediction in MANETs Adaptive QoS Multicast Routing with Mobility Prediction in MANETs
Adaptive QoS Multicast Routing with Mobility Prediction in MANETs ijasuc
 
Congestion Free Routes for Wireless Mesh Networks
Congestion Free Routes for Wireless Mesh NetworksCongestion Free Routes for Wireless Mesh Networks
Congestion Free Routes for Wireless Mesh NetworksNemesio Jr. Macabale
 
INVESTIGATING MULTILAYER OMEGA-TYPE NETWORKS OPERATING WITH THE CUT-THROUGH T...
INVESTIGATING MULTILAYER OMEGA-TYPE NETWORKS OPERATING WITH THE CUT-THROUGH T...INVESTIGATING MULTILAYER OMEGA-TYPE NETWORKS OPERATING WITH THE CUT-THROUGH T...
INVESTIGATING MULTILAYER OMEGA-TYPE NETWORKS OPERATING WITH THE CUT-THROUGH T...IJCNCJournal
 
Load aware and load balancing using aomdv routing in manet
Load aware and load balancing using aomdv routing in manetLoad aware and load balancing using aomdv routing in manet
Load aware and load balancing using aomdv routing in manetijctet
 
ENERGY LOCATION AWARE ROUTING PROTOCOL (ELARP) FOR WIRELESS MULTIMEDIA SENSOR...
ENERGY LOCATION AWARE ROUTING PROTOCOL (ELARP) FOR WIRELESS MULTIMEDIA SENSOR...ENERGY LOCATION AWARE ROUTING PROTOCOL (ELARP) FOR WIRELESS MULTIMEDIA SENSOR...
ENERGY LOCATION AWARE ROUTING PROTOCOL (ELARP) FOR WIRELESS MULTIMEDIA SENSOR...ijcsit
 
MMINIMUM RESOURCE CONSUMPTIONS ROUTING FOR OPTICAL NETWORKS
MMINIMUM RESOURCE CONSUMPTIONS ROUTING FOR OPTICAL NETWORKSMMINIMUM RESOURCE CONSUMPTIONS ROUTING FOR OPTICAL NETWORKS
MMINIMUM RESOURCE CONSUMPTIONS ROUTING FOR OPTICAL NETWORKSprj_publication
 
Performance analysis of multilayer multicast MANET CRN based on steiner minim...
Performance analysis of multilayer multicast MANET CRN based on steiner minim...Performance analysis of multilayer multicast MANET CRN based on steiner minim...
Performance analysis of multilayer multicast MANET CRN based on steiner minim...TELKOMNIKA JOURNAL
 
Load aware self organising user-centric dynamic co mp clustering for 5g networks
Load aware self organising user-centric dynamic co mp clustering for 5g networksLoad aware self organising user-centric dynamic co mp clustering for 5g networks
Load aware self organising user-centric dynamic co mp clustering for 5g networksredpel dot com
 
Performance Analysis of Energy Optimized LTE-V2X Networks for Delay Sensitive...
Performance Analysis of Energy Optimized LTE-V2X Networks for Delay Sensitive...Performance Analysis of Energy Optimized LTE-V2X Networks for Delay Sensitive...
Performance Analysis of Energy Optimized LTE-V2X Networks for Delay Sensitive...IJCNCJournal
 

Was ist angesagt? (14)

Energy efficiency cross layer protocol for wireless mesh network
Energy efficiency cross layer protocol for wireless mesh networkEnergy efficiency cross layer protocol for wireless mesh network
Energy efficiency cross layer protocol for wireless mesh network
 
MULTICASTING BASED ENHANCED PROACTIVE SOURCE ROUTING IN MANETS
MULTICASTING BASED ENHANCED PROACTIVE SOURCE ROUTING IN MANETSMULTICASTING BASED ENHANCED PROACTIVE SOURCE ROUTING IN MANETS
MULTICASTING BASED ENHANCED PROACTIVE SOURCE ROUTING IN MANETS
 
Overview of Improving Robustness of MAODV Protocol by Combining Tree and Mesh...
Overview of Improving Robustness of MAODV Protocol by Combining Tree and Mesh...Overview of Improving Robustness of MAODV Protocol by Combining Tree and Mesh...
Overview of Improving Robustness of MAODV Protocol by Combining Tree and Mesh...
 
journal_doublecol
journal_doublecoljournal_doublecol
journal_doublecol
 
Adaptive QoS Multicast Routing with Mobility Prediction in MANETs
Adaptive QoS Multicast Routing with Mobility Prediction in MANETs Adaptive QoS Multicast Routing with Mobility Prediction in MANETs
Adaptive QoS Multicast Routing with Mobility Prediction in MANETs
 
Congestion Free Routes for Wireless Mesh Networks
Congestion Free Routes for Wireless Mesh NetworksCongestion Free Routes for Wireless Mesh Networks
Congestion Free Routes for Wireless Mesh Networks
 
INVESTIGATING MULTILAYER OMEGA-TYPE NETWORKS OPERATING WITH THE CUT-THROUGH T...
INVESTIGATING MULTILAYER OMEGA-TYPE NETWORKS OPERATING WITH THE CUT-THROUGH T...INVESTIGATING MULTILAYER OMEGA-TYPE NETWORKS OPERATING WITH THE CUT-THROUGH T...
INVESTIGATING MULTILAYER OMEGA-TYPE NETWORKS OPERATING WITH THE CUT-THROUGH T...
 
Load aware and load balancing using aomdv routing in manet
Load aware and load balancing using aomdv routing in manetLoad aware and load balancing using aomdv routing in manet
Load aware and load balancing using aomdv routing in manet
 
ENERGY LOCATION AWARE ROUTING PROTOCOL (ELARP) FOR WIRELESS MULTIMEDIA SENSOR...
ENERGY LOCATION AWARE ROUTING PROTOCOL (ELARP) FOR WIRELESS MULTIMEDIA SENSOR...ENERGY LOCATION AWARE ROUTING PROTOCOL (ELARP) FOR WIRELESS MULTIMEDIA SENSOR...
ENERGY LOCATION AWARE ROUTING PROTOCOL (ELARP) FOR WIRELESS MULTIMEDIA SENSOR...
 
MMINIMUM RESOURCE CONSUMPTIONS ROUTING FOR OPTICAL NETWORKS
MMINIMUM RESOURCE CONSUMPTIONS ROUTING FOR OPTICAL NETWORKSMMINIMUM RESOURCE CONSUMPTIONS ROUTING FOR OPTICAL NETWORKS
MMINIMUM RESOURCE CONSUMPTIONS ROUTING FOR OPTICAL NETWORKS
 
Performance analysis of multilayer multicast MANET CRN based on steiner minim...
Performance analysis of multilayer multicast MANET CRN based on steiner minim...Performance analysis of multilayer multicast MANET CRN based on steiner minim...
Performance analysis of multilayer multicast MANET CRN based on steiner minim...
 
Load aware self organising user-centric dynamic co mp clustering for 5g networks
Load aware self organising user-centric dynamic co mp clustering for 5g networksLoad aware self organising user-centric dynamic co mp clustering for 5g networks
Load aware self organising user-centric dynamic co mp clustering for 5g networks
 
RoutingMetrics_PHD_2006
RoutingMetrics_PHD_2006RoutingMetrics_PHD_2006
RoutingMetrics_PHD_2006
 
Performance Analysis of Energy Optimized LTE-V2X Networks for Delay Sensitive...
Performance Analysis of Energy Optimized LTE-V2X Networks for Delay Sensitive...Performance Analysis of Energy Optimized LTE-V2X Networks for Delay Sensitive...
Performance Analysis of Energy Optimized LTE-V2X Networks for Delay Sensitive...
 

Andere mochten auch

Andere mochten auch (8)

Lifelong Learning Programme - EACEA - Key Activity 2 - Info Day
Lifelong Learning Programme - EACEA - Key Activity 2 - Info DayLifelong Learning Programme - EACEA - Key Activity 2 - Info Day
Lifelong Learning Programme - EACEA - Key Activity 2 - Info Day
 
Nettle Creek, IN - PD 360 Case Study
Nettle Creek, IN - PD 360 Case StudyNettle Creek, IN - PD 360 Case Study
Nettle Creek, IN - PD 360 Case Study
 
3 beatriz rodríguez musa a las 9
3 beatriz rodríguez   musa a las 93 beatriz rodríguez   musa a las 9
3 beatriz rodríguez musa a las 9
 
Creativity 3. A creatividade no negocio - Alberto Salgado
Creativity 3. A creatividade no negocio - Alberto SalgadoCreativity 3. A creatividade no negocio - Alberto Salgado
Creativity 3. A creatividade no negocio - Alberto Salgado
 
Planning For Success In Data Integration Deployments
Planning For Success In Data Integration DeploymentsPlanning For Success In Data Integration Deployments
Planning For Success In Data Integration Deployments
 
Top20 #1 Pattern Interrupt
Top20 #1 Pattern InterruptTop20 #1 Pattern Interrupt
Top20 #1 Pattern Interrupt
 
3_César González de Contact Comunicación
3_César González de Contact Comunicación3_César González de Contact Comunicación
3_César González de Contact Comunicación
 
Sviluppo Mobile , quali approcci?
Sviluppo Mobile , quali approcci?Sviluppo Mobile , quali approcci?
Sviluppo Mobile , quali approcci?
 

Ähnlich wie Efficient load aware routing scheme

Improvement at Network Planning using Heuristic Algorithm to Minimize Cost of...
Improvement at Network Planning using Heuristic Algorithm to Minimize Cost of...Improvement at Network Planning using Heuristic Algorithm to Minimize Cost of...
Improvement at Network Planning using Heuristic Algorithm to Minimize Cost of...Yayah Zakaria
 
Improvement at Network Planning using Heuristic Algorithm to Minimize Cost of...
Improvement at Network Planning using Heuristic Algorithm to Minimize Cost of...Improvement at Network Planning using Heuristic Algorithm to Minimize Cost of...
Improvement at Network Planning using Heuristic Algorithm to Minimize Cost of...IJECEIAES
 
Traffic-aware adaptive server load balancing for softwaredefined networks
Traffic-aware adaptive server load balancing for softwaredefined networks Traffic-aware adaptive server load balancing for softwaredefined networks
Traffic-aware adaptive server load balancing for softwaredefined networks IJECEIAES
 
Active path updation for layered routing (apular) in wireless
Active path updation for layered routing (apular) in wirelessActive path updation for layered routing (apular) in wireless
Active path updation for layered routing (apular) in wirelessAlexander Decker
 
Active Path Updation For Layered Routing (Apular) In Wireless Mesh Networks
Active Path Updation For Layered Routing (Apular) In Wireless Mesh NetworksActive Path Updation For Layered Routing (Apular) In Wireless Mesh Networks
Active Path Updation For Layered Routing (Apular) In Wireless Mesh Networkschetan1nonly
 
Efficient energy, cost reduction, and QoS based routing protocol for wireless...
Efficient energy, cost reduction, and QoS based routing protocol for wireless...Efficient energy, cost reduction, and QoS based routing protocol for wireless...
Efficient energy, cost reduction, and QoS based routing protocol for wireless...IJECEIAES
 
Adaptive Routing in Wireless Sensor Networks: QoS Optimisation for Enhanced A...
Adaptive Routing in Wireless Sensor Networks: QoS Optimisation for Enhanced A...Adaptive Routing in Wireless Sensor Networks: QoS Optimisation for Enhanced A...
Adaptive Routing in Wireless Sensor Networks: QoS Optimisation for Enhanced A...M H
 
Load balancing In Wireless Mesh Networks Using liquid–Simulated Algorithm
Load balancing In Wireless Mesh Networks Using liquid–Simulated AlgorithmLoad balancing In Wireless Mesh Networks Using liquid–Simulated Algorithm
Load balancing In Wireless Mesh Networks Using liquid–Simulated AlgorithmIJSRED
 
Multipath Routing Protocol by Breadth First Search Algorithm in Wireless Mesh...
Multipath Routing Protocol by Breadth First Search Algorithm in Wireless Mesh...Multipath Routing Protocol by Breadth First Search Algorithm in Wireless Mesh...
Multipath Routing Protocol by Breadth First Search Algorithm in Wireless Mesh...IOSR Journals
 
An optimized link state routing protocol based on a cross layer design for wi...
An optimized link state routing protocol based on a cross layer design for wi...An optimized link state routing protocol based on a cross layer design for wi...
An optimized link state routing protocol based on a cross layer design for wi...IOSR Journals
 
Design and implementation of new routing
Design and implementation of new routingDesign and implementation of new routing
Design and implementation of new routingIJCNCJournal
 
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2R
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2RDETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2R
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2Rijujournal
 
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2R
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2RDETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2R
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2Rijujournal
 
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2R
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2RDETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2R
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2Rijujournal
 
cse Wireless Mesh Networks ppt.pptx
cse  Wireless Mesh Networks ppt.pptxcse  Wireless Mesh Networks ppt.pptx
cse Wireless Mesh Networks ppt.pptxSANTHAKUMARP5
 
A survey on routing algorithms and routing metrics for wireless mesh networks
A survey on routing algorithms and routing metrics for wireless mesh networksA survey on routing algorithms and routing metrics for wireless mesh networks
A survey on routing algorithms and routing metrics for wireless mesh networksMohammad Siraj
 
A New Paradigm for Load Balancing in WMNs
A New Paradigm for Load Balancing in WMNsA New Paradigm for Load Balancing in WMNs
A New Paradigm for Load Balancing in WMNsCSCJournals
 

Ähnlich wie Efficient load aware routing scheme (20)

G04122038042
G04122038042G04122038042
G04122038042
 
Improvement at Network Planning using Heuristic Algorithm to Minimize Cost of...
Improvement at Network Planning using Heuristic Algorithm to Minimize Cost of...Improvement at Network Planning using Heuristic Algorithm to Minimize Cost of...
Improvement at Network Planning using Heuristic Algorithm to Minimize Cost of...
 
Improvement at Network Planning using Heuristic Algorithm to Minimize Cost of...
Improvement at Network Planning using Heuristic Algorithm to Minimize Cost of...Improvement at Network Planning using Heuristic Algorithm to Minimize Cost of...
Improvement at Network Planning using Heuristic Algorithm to Minimize Cost of...
 
Traffic-aware adaptive server load balancing for softwaredefined networks
Traffic-aware adaptive server load balancing for softwaredefined networks Traffic-aware adaptive server load balancing for softwaredefined networks
Traffic-aware adaptive server load balancing for softwaredefined networks
 
Active path updation for layered routing (apular) in wireless
Active path updation for layered routing (apular) in wirelessActive path updation for layered routing (apular) in wireless
Active path updation for layered routing (apular) in wireless
 
Active Path Updation For Layered Routing (Apular) In Wireless Mesh Networks
Active Path Updation For Layered Routing (Apular) In Wireless Mesh NetworksActive Path Updation For Layered Routing (Apular) In Wireless Mesh Networks
Active Path Updation For Layered Routing (Apular) In Wireless Mesh Networks
 
Efficient energy, cost reduction, and QoS based routing protocol for wireless...
Efficient energy, cost reduction, and QoS based routing protocol for wireless...Efficient energy, cost reduction, and QoS based routing protocol for wireless...
Efficient energy, cost reduction, and QoS based routing protocol for wireless...
 
Adaptive Routing in Wireless Sensor Networks: QoS Optimisation for Enhanced A...
Adaptive Routing in Wireless Sensor Networks: QoS Optimisation for Enhanced A...Adaptive Routing in Wireless Sensor Networks: QoS Optimisation for Enhanced A...
Adaptive Routing in Wireless Sensor Networks: QoS Optimisation for Enhanced A...
 
[IJCT-V3I2P21] Authors: Swati Govil, Dr.Paramjeet Rawat
[IJCT-V3I2P21] Authors: Swati Govil, Dr.Paramjeet Rawat[IJCT-V3I2P21] Authors: Swati Govil, Dr.Paramjeet Rawat
[IJCT-V3I2P21] Authors: Swati Govil, Dr.Paramjeet Rawat
 
Load balancing In Wireless Mesh Networks Using liquid–Simulated Algorithm
Load balancing In Wireless Mesh Networks Using liquid–Simulated AlgorithmLoad balancing In Wireless Mesh Networks Using liquid–Simulated Algorithm
Load balancing In Wireless Mesh Networks Using liquid–Simulated Algorithm
 
Multipath Routing Protocol by Breadth First Search Algorithm in Wireless Mesh...
Multipath Routing Protocol by Breadth First Search Algorithm in Wireless Mesh...Multipath Routing Protocol by Breadth First Search Algorithm in Wireless Mesh...
Multipath Routing Protocol by Breadth First Search Algorithm in Wireless Mesh...
 
An optimized link state routing protocol based on a cross layer design for wi...
An optimized link state routing protocol based on a cross layer design for wi...An optimized link state routing protocol based on a cross layer design for wi...
An optimized link state routing protocol based on a cross layer design for wi...
 
Design and implementation of new routing
Design and implementation of new routingDesign and implementation of new routing
Design and implementation of new routing
 
Ijcnc050203
Ijcnc050203Ijcnc050203
Ijcnc050203
 
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2R
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2RDETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2R
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2R
 
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2R
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2RDETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2R
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2R
 
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2R
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2RDETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2R
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2R
 
cse Wireless Mesh Networks ppt.pptx
cse  Wireless Mesh Networks ppt.pptxcse  Wireless Mesh Networks ppt.pptx
cse Wireless Mesh Networks ppt.pptx
 
A survey on routing algorithms and routing metrics for wireless mesh networks
A survey on routing algorithms and routing metrics for wireless mesh networksA survey on routing algorithms and routing metrics for wireless mesh networks
A survey on routing algorithms and routing metrics for wireless mesh networks
 
A New Paradigm for Load Balancing in WMNs
A New Paradigm for Load Balancing in WMNsA New Paradigm for Load Balancing in WMNs
A New Paradigm for Load Balancing in WMNs
 

Mehr von ambitlick

DCIM: Distributed Cache Invalidation Method for Maintaining Cache Consistency...
DCIM: Distributed Cache Invalidation Method for Maintaining Cache Consistency...DCIM: Distributed Cache Invalidation Method for Maintaining Cache Consistency...
DCIM: Distributed Cache Invalidation Method for Maintaining Cache Consistency...ambitlick
 
Low cost Java 2013 IEEE projects
Low cost Java 2013 IEEE projectsLow cost Java 2013 IEEE projects
Low cost Java 2013 IEEE projectsambitlick
 
Ambitlick ns2 2013
Ambitlick ns2 2013Ambitlick ns2 2013
Ambitlick ns2 2013ambitlick
 
Low cost Java IEEE Projects 2013
Low cost Java IEEE Projects 2013Low cost Java IEEE Projects 2013
Low cost Java IEEE Projects 2013ambitlick
 
Handling selfishness in replica allocation
Handling selfishness in replica allocationHandling selfishness in replica allocation
Handling selfishness in replica allocationambitlick
 
Mutual distance bounding protocols
Mutual distance bounding protocolsMutual distance bounding protocols
Mutual distance bounding protocolsambitlick
 
Moderated group authoring system for campus wide workgroups
Moderated group authoring system for campus wide workgroupsModerated group authoring system for campus wide workgroups
Moderated group authoring system for campus wide workgroupsambitlick
 
Efficient spread spectrum communication without pre shared secrets
Efficient spread spectrum communication without pre shared secretsEfficient spread spectrum communication without pre shared secrets
Efficient spread spectrum communication without pre shared secretsambitlick
 
IEEE -2012-13 Projects IN NS2
IEEE -2012-13 Projects IN NS2  IEEE -2012-13 Projects IN NS2
IEEE -2012-13 Projects IN NS2 ambitlick
 
Adaptive weight factor estimation from user review 1
Adaptive weight factor estimation from user   review 1Adaptive weight factor estimation from user   review 1
Adaptive weight factor estimation from user review 1ambitlick
 
Integrated institutional portal
Integrated institutional portalIntegrated institutional portal
Integrated institutional portalambitlick
 
Mutual distance bounding protocols
Mutual distance bounding protocolsMutual distance bounding protocols
Mutual distance bounding protocolsambitlick
 
Moderated group authoring system for campus wide workgroups
Moderated group authoring system for campus wide workgroupsModerated group authoring system for campus wide workgroups
Moderated group authoring system for campus wide workgroupsambitlick
 
Efficient spread spectrum communication without pre shared secrets
Efficient spread spectrum communication without pre shared secretsEfficient spread spectrum communication without pre shared secrets
Efficient spread spectrum communication without pre shared secretsambitlick
 
Comments on “mabs multicast authentication based on batch signature”
Comments on “mabs multicast authentication based on batch signature”Comments on “mabs multicast authentication based on batch signature”
Comments on “mabs multicast authentication based on batch signature”ambitlick
 
Energy-Efficient Protocol for Deterministic and Probabilistic Coverage In Sen...
Energy-Efficient Protocol for Deterministic and Probabilistic Coverage In Sen...Energy-Efficient Protocol for Deterministic and Probabilistic Coverage In Sen...
Energy-Efficient Protocol for Deterministic and Probabilistic Coverage In Sen...ambitlick
 
Energy efficient protocol for deterministic
Energy efficient protocol for deterministicEnergy efficient protocol for deterministic
Energy efficient protocol for deterministicambitlick
 
Estimating Parameters of Multiple Heterogeneous Target Objects Using Composit...
Estimating Parameters of Multiple Heterogeneous Target Objects Using Composit...Estimating Parameters of Multiple Heterogeneous Target Objects Using Composit...
Estimating Parameters of Multiple Heterogeneous Target Objects Using Composit...ambitlick
 

Mehr von ambitlick (20)

DCIM: Distributed Cache Invalidation Method for Maintaining Cache Consistency...
DCIM: Distributed Cache Invalidation Method for Maintaining Cache Consistency...DCIM: Distributed Cache Invalidation Method for Maintaining Cache Consistency...
DCIM: Distributed Cache Invalidation Method for Maintaining Cache Consistency...
 
Low cost Java 2013 IEEE projects
Low cost Java 2013 IEEE projectsLow cost Java 2013 IEEE projects
Low cost Java 2013 IEEE projects
 
Ambitlick ns2 2013
Ambitlick ns2 2013Ambitlick ns2 2013
Ambitlick ns2 2013
 
Low cost Java IEEE Projects 2013
Low cost Java IEEE Projects 2013Low cost Java IEEE Projects 2013
Low cost Java IEEE Projects 2013
 
Handling selfishness in replica allocation
Handling selfishness in replica allocationHandling selfishness in replica allocation
Handling selfishness in replica allocation
 
Mutual distance bounding protocols
Mutual distance bounding protocolsMutual distance bounding protocols
Mutual distance bounding protocols
 
Moderated group authoring system for campus wide workgroups
Moderated group authoring system for campus wide workgroupsModerated group authoring system for campus wide workgroups
Moderated group authoring system for campus wide workgroups
 
Efficient spread spectrum communication without pre shared secrets
Efficient spread spectrum communication without pre shared secretsEfficient spread spectrum communication without pre shared secrets
Efficient spread spectrum communication without pre shared secrets
 
IEEE -2012-13 Projects IN NS2
IEEE -2012-13 Projects IN NS2  IEEE -2012-13 Projects IN NS2
IEEE -2012-13 Projects IN NS2
 
Adaptive weight factor estimation from user review 1
Adaptive weight factor estimation from user   review 1Adaptive weight factor estimation from user   review 1
Adaptive weight factor estimation from user review 1
 
Integrated institutional portal
Integrated institutional portalIntegrated institutional portal
Integrated institutional portal
 
Embassy
EmbassyEmbassy
Embassy
 
Crm
Crm Crm
Crm
 
Mutual distance bounding protocols
Mutual distance bounding protocolsMutual distance bounding protocols
Mutual distance bounding protocols
 
Moderated group authoring system for campus wide workgroups
Moderated group authoring system for campus wide workgroupsModerated group authoring system for campus wide workgroups
Moderated group authoring system for campus wide workgroups
 
Efficient spread spectrum communication without pre shared secrets
Efficient spread spectrum communication without pre shared secretsEfficient spread spectrum communication without pre shared secrets
Efficient spread spectrum communication without pre shared secrets
 
Comments on “mabs multicast authentication based on batch signature”
Comments on “mabs multicast authentication based on batch signature”Comments on “mabs multicast authentication based on batch signature”
Comments on “mabs multicast authentication based on batch signature”
 
Energy-Efficient Protocol for Deterministic and Probabilistic Coverage In Sen...
Energy-Efficient Protocol for Deterministic and Probabilistic Coverage In Sen...Energy-Efficient Protocol for Deterministic and Probabilistic Coverage In Sen...
Energy-Efficient Protocol for Deterministic and Probabilistic Coverage In Sen...
 
Energy efficient protocol for deterministic
Energy efficient protocol for deterministicEnergy efficient protocol for deterministic
Energy efficient protocol for deterministic
 
Estimating Parameters of Multiple Heterogeneous Target Objects Using Composit...
Estimating Parameters of Multiple Heterogeneous Target Objects Using Composit...Estimating Parameters of Multiple Heterogeneous Target Objects Using Composit...
Estimating Parameters of Multiple Heterogeneous Target Objects Using Composit...
 

Kürzlich hochgeladen

Grade Three -ELLNA-REVIEWER-ENGLISH.pptx
Grade Three -ELLNA-REVIEWER-ENGLISH.pptxGrade Three -ELLNA-REVIEWER-ENGLISH.pptx
Grade Three -ELLNA-REVIEWER-ENGLISH.pptxkarenfajardo43
 
MS4 level being good citizen -imperative- (1) (1).pdf
MS4 level   being good citizen -imperative- (1) (1).pdfMS4 level   being good citizen -imperative- (1) (1).pdf
MS4 level being good citizen -imperative- (1) (1).pdfMr Bounab Samir
 
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...Association for Project Management
 
Mental Health Awareness - a toolkit for supporting young minds
Mental Health Awareness - a toolkit for supporting young mindsMental Health Awareness - a toolkit for supporting young minds
Mental Health Awareness - a toolkit for supporting young mindsPooky Knightsmith
 
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITWQ-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITWQuiz Club NITW
 
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...DhatriParmar
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxHumphrey A Beña
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfPatidar M
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)lakshayb543
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfVanessa Camilleri
 
Oppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmOppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmStan Meyer
 
Congestive Cardiac Failure..presentation
Congestive Cardiac Failure..presentationCongestive Cardiac Failure..presentation
Congestive Cardiac Failure..presentationdeepaannamalai16
 
Multi Domain Alias In the Odoo 17 ERP Module
Multi Domain Alias In the Odoo 17 ERP ModuleMulti Domain Alias In the Odoo 17 ERP Module
Multi Domain Alias In the Odoo 17 ERP ModuleCeline George
 
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptxDecoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptxDhatriParmar
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxlancelewisportillo
 

Kürzlich hochgeladen (20)

Grade Three -ELLNA-REVIEWER-ENGLISH.pptx
Grade Three -ELLNA-REVIEWER-ENGLISH.pptxGrade Three -ELLNA-REVIEWER-ENGLISH.pptx
Grade Three -ELLNA-REVIEWER-ENGLISH.pptx
 
MS4 level being good citizen -imperative- (1) (1).pdf
MS4 level   being good citizen -imperative- (1) (1).pdfMS4 level   being good citizen -imperative- (1) (1).pdf
MS4 level being good citizen -imperative- (1) (1).pdf
 
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
 
Mental Health Awareness - a toolkit for supporting young minds
Mental Health Awareness - a toolkit for supporting young mindsMental Health Awareness - a toolkit for supporting young minds
Mental Health Awareness - a toolkit for supporting young minds
 
Mattingly "AI & Prompt Design: Large Language Models"
Mattingly "AI & Prompt Design: Large Language Models"Mattingly "AI & Prompt Design: Large Language Models"
Mattingly "AI & Prompt Design: Large Language Models"
 
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITWQ-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
 
Faculty Profile prashantha K EEE dept Sri Sairam college of Engineering
Faculty Profile prashantha K EEE dept Sri Sairam college of EngineeringFaculty Profile prashantha K EEE dept Sri Sairam college of Engineering
Faculty Profile prashantha K EEE dept Sri Sairam college of Engineering
 
INCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptx
INCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptxINCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptx
INCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptx
 
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdf
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdf
 
prashanth updated resume 2024 for Teaching Profession
prashanth updated resume 2024 for Teaching Professionprashanth updated resume 2024 for Teaching Profession
prashanth updated resume 2024 for Teaching Profession
 
Paradigm shift in nursing research by RS MEHTA
Paradigm shift in nursing research by RS MEHTAParadigm shift in nursing research by RS MEHTA
Paradigm shift in nursing research by RS MEHTA
 
Oppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmOppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and Film
 
Congestive Cardiac Failure..presentation
Congestive Cardiac Failure..presentationCongestive Cardiac Failure..presentation
Congestive Cardiac Failure..presentation
 
Multi Domain Alias In the Odoo 17 ERP Module
Multi Domain Alias In the Odoo 17 ERP ModuleMulti Domain Alias In the Odoo 17 ERP Module
Multi Domain Alias In the Odoo 17 ERP Module
 
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptxDecoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
 

Efficient load aware routing scheme

  • 1. IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 9, NO. 9, SEPTEMBER 2010 1293 Efficient Load-Aware Routing Scheme for Wireless Mesh Networks Kae Won Choi, Wha Sook Jeon, Senior Member, IEEE, and Dong Geun Jeong, Senior Member, IEEE Abstract—This paper proposes a load-aware routing scheme for wireless mesh networks (WMNs). In a WMN, the traffic load tends to be unevenly distributed over the network. In this situation, the load-aware routing scheme can balance the load, and consequently, enhance the overall network capacity. We design a routing scheme which maximizes the utility, i.e., the degree of user satisfaction, by using the dual decomposition method. The structure of this method makes it possible to implement the proposed routing scheme in a fully distributed way. With the proposed scheme, a WMN is divided into multiple clusters for load control. A cluster head estimates traffic load in its cluster. As the estimated load gets higher, the cluster head increases the routing metrics of the routes passing through the cluster. Based on the routing metrics, user traffic takes a detour to avoid overloaded areas, and as a result, the WMN achieves global load balancing. We present the numerical results showing that the proposed scheme effectively balances the traffic load and outperforms the routing algorithm using the expected transmission time (ETT) as a routing metric. Index Terms—Wireless mesh network, load-aware routing, utility, dual decomposition. Ç 1 INTRODUCTION A wireless mesh network (WMN) consists of a number of wireless routers, which do not only operate as hosts but also forward packets on behalf of other routers. WMNs over the traditional hop-count routing metric, they neglect the problem of traffic load imbalance in the WMN. In the WMN, a great portion of users intends to have many advantages over conventional wired networks, communicate with outside networks via the wired gate- such as low installation cost, wide coverage, and robust- ways. In such environment, the wireless links around the ness, etc. Because of these advantages, WMNs have been gateways are likely to be a bottleneck of the network. If the rapidly penetrating into the market with various applica- routing algorithm does not take account of the traffic load, tions, for example, public Internet access, intelligent some gateways may be overloaded while the others may transportation system (ITS), and public safety [1]. One of not. This load imbalance can be resolved by introducing a the main research issues related to WMNs is to develop the load-aware routing scheme that adopts the routing metric routing algorithm optimized for the WMN. with load factor. When the load-aware routing algorithm is designed to maximize the system capacity, the major benefit In mobile ad-hoc networks, the primary concern of of the load-aware routing is the enhancement of the overall routing has been robustness to high mobility. However, system capacity due to the use of underutilized paths. nodes in the WMN are generally quasi-static in their location. Although there have been some works on load-aware Thus, the focus of the routing studies in the WMN has moved routing for mobile ad-hoc networks (e.g., [9], [10]) and to performance enhancement by using sophisticated routing WMNs (e.g., [11], [12], [13]), they simply include some load metrics [2], [3], [4], [5], [6], [7], [8]. For example, as the routing factors in the routing metric without consideration of the metrics, researchers have proposed the expected transmis- system-wide performance. sion number (ETX) [2], the expected transmission time (ETT) In this paper, we propose a load-aware routing scheme, and weighted cumulative ETT (WCETT) [5], the metric of which maximizes the total utility of the users in the WMN. interference and channel switching (MIC) [6], and the The utility is a value which quantifies how satisfied a user is modified expected number of transmissions (mETX) and with the network. Since the degree of user satisfaction depends on the network performance, the utility can be effective number of transmissions (ENTs) [8]. Although these given as a function of the user throughput. Generally, the metrics have shown significant performance improvement utility function is concave to reflect the law of diminishing marginal utility. To design the scheme, we use the dual . K.W. Choi is with the Department of Electrical and Computer Engineering, decomposition method for utility maximization [14], [16]. University of Manitoba, Room E2-390 EITC Building, 75A Chancellor’s Using this method, we can incorporate not only the load- Circle, Winnipeg, MB R3T 5V6, Canada. E-mail: kaewon.choi@gmail.com. aware routing scheme but also congestion control and fair . W.S. Jeon is with the School of Electrical Engineering and Computer rate allocation mechanisms into the WMN. Most notably, Science, Seoul National University, Gwanak-gu, Seoul 151-742, Korea. E-mail: wsjeon@snu.ac.kr. we can implement the load-aware routing scheme in a . D.G. Jeong is with the School of Electronics and Information Engineering, distributed way owing to the structure of the dual Hankuk University of Foreign Studies, Cheoin-gu, Yongin-si, Gyonggi-do decomposition method. 449-791, Korea. E-mail: dgjeong@hufs.ac.kr. In the proposed routing scheme, a WMN is divided into Manuscript received 7 Apr. 2008; revised 22 Oct. 2008; accepted 15 Dec. multiple overlapping clusters. A cluster head takes role of 2009; published online 28 Apr. 2010. controlling the traffic load on the wireless links in its cluster. For information on obtaining reprints of this article, please send e-mail to: tmc@computer.org, and reference IEEECS Log Number TMC-2008-04-0129. The cluster head periodically estimates the total traffic load Digital Object Identifier no. 10.1109/TMC.2010.85. on the cluster and increases the “link costs” of the links in the 1536-1233/10/$26.00 ß 2010 IEEE Published by the IEEE CS, CASS, ComSoc, IES, & SPS
  • 2. 1294 IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 9, NO. 9, SEPTEMBER 2010 cluster, if the estimated load is too high. In this scheme, each (ROMER) algorithm in [20] also uses opportunistic for- user chooses the route that has the minimum sum of the link warding to deal with short-term link quality variation. The costs on it. Thus, a user can circumvent overloaded areas in ROMER maintains the long-term routes and opportunisti- the network, and therefore, the network-wide load balance cally expands or shrinks them at runtime. can be achieved. The works in [21] and [22] focus on the applications The major advantages of the proposed load-aware accessing the wired gateways. The ad hoc on-demand routing scheme can be summarized as follows: distance vector spanning tree (AODV-ST) in [21] is an adaptation of the AODV protocol to the WMN with the . Designed by the dual decomposition method, the wired gateways. The AODV-ST constructs a spanning tree of proposed load-aware routing scheme maximizes the which the root is the gateway. In [22], the authors propose a system-wide performance. routing and channel assignment algorithm for the multi- . The proposed scheme is scalable, has low control channel WMN. In this algorithm, a spanning tree is formed in and computation overheads, and can be easily such a way that a node attaches itself to the parent node. implemented by means of the existing ad hoc The load-aware routing protocols [9], [10], [11], [12], [13] routing protocols [17]. incorporate the load factor into their routing metrics. The The remainder of the paper is organized as follows: In dynamic load-aware routing (DLAR) in [9] takes as the Section 2, we briefly overview the related works. Section 3 routing metric the number of packets queued in the node outlines the system model. In Section 4, we formulate the interface. The load-balanced ad hoc routing (LBAR) in [10] optimization problem and solve it by using the dual counts the number of active paths on a node and its neighbors, decomposition method. In Section 5, we explain how to and uses it as a routing metric. Both the DLAR and LBAR are implement the proposed routing scheme in a distributed designed for the mobile ad hoc network, and aim to reduce way. Section 6 presents the numerical results which show the packet delay and the packet loss ratio. In [11], an the performance of the proposed scheme. Finally, the paper admission control and load balancing algorithm is proposed is concluded with Section 7. for the 802.11 mesh networks. In this work, the available radio time (ART) is calculated for each node, and the route with the 2 RELATED WORKS largest ART is selected when a new connection is requested. This algorithm tries to maximize the average number of For the WMN, a number of routing metrics and algorithms connections. In [12], the authors propose the WCETT load have been proposed to take advantage of the stationary balancing (WCETT-LB) metric. The WCETT-LB is the topology. The first routing metric is the ETX [2], which is the expected number of transmissions required to deliver a WCETT augmented by the load factor consisting of the packet to the neighbor. In [3], the authors propose the average queue length and the degree of traffic concentration. minimum loss (ML) metric which is used to find the route The QoS-aware routing algorithm with congestion control with lowest end-to-end loss probability. In [4], the medium and load balancing (QRCCLB) in [13] calculates the number time metric (MTM) is proposed for the multirate network. of congested nodes on each route and chooses the route with The MTM of a link is inverse proportional to the physical the smallest number of congested nodes. layer transmission rate of the link. The ETT in [5] is a Compared to these load-aware routing protocols, the proposed routing scheme has three major advantages. First, combination of the ETX and the MTM. The ETT is a required the proposed scheme is design to maximize the system time to transmit a single packet over a link in the multirate capacity by considering all necessary elements for load network, calculated in consideration of both the number of balancing, e.g., the interference between flows, the link transmissions and the physical layer transmission rate. The capacity, and the user demand, etc. On the other hand, the authors in [5] also suggest the routing metric and algorithm existing protocols fail to reflect these elements since they use for the multiradio WMN, which are the WCETT and the heuristically designed routing metrics. For example, the multiradio link quality source routing (MR-LQSR), respec- DLAR, the ART, and the WCETT-LB do not take account of tively. The WCETT is a modification of the ETT to consider the interference between flows. Also, the link capacity is not the intraflow interference. While the WCETT only considers considered by the DLAR, the LBAR, the ART, and the the intraflow interference, the MIC [6] and the interference QRCCLB. Second, the proposed scheme can guarantee aware (iAWARE) [7] take account of the interflow inter- fairness between users. When the network load is high, it is ference as well as the intraflow interference. of importance for users to fairly share scarce radio resources. In [8], the mETX and the ENT are proposed to cope with However, the existing protocols cannot fairly allocate the fast link quality variation. These routing metrics contain resources, since they are unable to distinguish which route the standard deviation of the link quality in addition to the is monopolized by a small number of users. Third, the average link quality. The blacklist-aided forwarding (BAF) proposed scheme can provide routes stable over time. Since algorithm in [18] is proposed to tackle the problem of short- most of the existing protocols adopt highly variable routing term link quality degradation by disseminating the black- metrics such as the queue length or the collision probability, list, i.e., a set of currently degraded links. The ExOR they are prone to suffer from the route flapping problem. algorithm in [19] decides the next hop after the transmis- We design the proposed routing scheme by using the sion for that hop without predetermined routes. The ExOR dual decomposition method for the network utility max- can choose the next hop that successfully received the imization. A brief introduction to this method can be found packet, and therefore, it is robust to packet error and link in [14], [15], and an elaborate explanation and a number of quality variation. The resilient opportunistic mesh routing examples can be found in [16]. To use this method, one
  • 3. CHOI ET AL.: EFFICIENT LOAD-AWARE ROUTING SCHEME FOR WIRELESS MESH NETWORKS 1295 TABLE 1 Table of Symbols Fig. 1. Example mesh network. should formulate the global optimization problem that is to links in the network, respectively. In Table 1, we summarize maximize the total system utility under the constraints on all mathematical notations introduced in this section. the traffic flows and the radio resources. After the The WMN under consideration provides a connection- constraints are relaxed by the Lagrange multipliers, the oriented service, where connections are managed in the unit whole problem can be decomposed into the subproblems of a flow. A flow is also unidirectional. A user can which are solved by the different network layers in the communicate with the other user or the gateway node after different network nodes. In the decomposed problem, the setting up a flow connecting them. Since a user is connected Lagrange multipliers act as a interface between the layers to a unique node, the flow between a pair of users can also and the nodes, enabling the distributed entities to find the be specified by the corresponding node pair. The node global optimal solution only by solving their own subpro- where a flow starts (ends) will be called the source blems. Therefore, the dual decomposition method provides (destination) node of the flow. Fig. 1 shows an example a systematical way to design a distributed algorithm which scenario where a user intends to send data to outside finds the global optimal solution. networks. As seen in this figure, if a flow conveys data to (from) outside networks, all gateway nodes can be the destination (source) node of the flow. We will identify a 3 SYSTEM MODEL flow by an index, generally f, and define F as the set of the 3.1 Mesh Network Structure indices of all flows in the network. Data traffic on a flow is conveyed to the destination node Each wireless router in a WMN is fixed at a location. Thus, through a multihop route. We only consider acyclic routes. the WMN topology does not change frequently and the Thus, a route can be determined by the set of all intermediate channel quality is quasi-static. In addition, each wireless links that the route takes. We will index a route by r and router serves so many subscribers (i.e., users) in general that define Dr as the set of the indices of all intermediate links on the characteristic of the aggregated traffic is stable over time. the route r. For a flow, there can be a number of possible Therefore, we design the routing scheme under the system routes that connect the source and destination nodes. Fig. 1 model of which topology and user configuration are stable. shows some of the possible routes that a flow can take to In Fig. 1, we illustrate an example of the WMN. In this send data to the outside networks. Let Gf denote the set of figure, a node stands for a wireless router, which not only the indices of all possible routes for flow f. delivers data for its own users, but also relays data traffic for For mathematical development, we assume that a flow can other wireless routers. Among nodes, there are some utilize multiple routes simultaneously by dividing its data gateway nodes connected to the wired backhaul network. traffic into these routes. We limit the possible data rate of the Each user is associated with its serving node. In this paper, traffic conveyed by a flow on each route to control the amount we do not deal with the interface between a user and its of traffic injected to the WMN. Let f;r denote the “flow data serving node to focus on the mesh network itself. Through rate” which is defined as the maximum data rate at which the the serving node, a user can send (receive) data traffic to flow f can send data traffic on the route r. We also define (from) the other user in the WMN or to (from) outside f :¼ ðf;r Þr2Gf as the “flow data rate vector” of flow f. The networks via the gateway nodes. If node n can transmit data sum of all the components in a flow data rate vector is limited to node m directly (i.e., without relaying), there exists a link to the “maximumP flow data rate,” denoted by max . That is, it from the node n to the node m. In this paper, we define a link should hold that r2Gf f;r max . as unidirectional. For the mathematical representation, we We will call f the “multipath flow data rate vector,” if define N and L as the sets of the indices of all nodes and all f;r 0 for more than one r in Gf . On the other hand, we
  • 4. 1296 IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 9, NO. 9, SEPTEMBER 2010 will refer to f as the “single-path flow data rate vector,” if transmission. If two links are adjacent enough to interfere f; 0 for only one “active route” and f;r ¼ 0 for the with each other, packets cannot be conveyed through the other rs in Gf . Since the multipath routing is hard to be two links at the same time. To incorporate this restriction implemented in a practical sense, we will focus on finding into the proposed scheme, we divide the WMN into the single-path flow data rate vectors for all flows in the multiple overlapping clusters. A cluster includes the links WMN. Let f denote the active route of the flow f that has adjacent enough to interfere with each other. Therefore, any the single-path flow data rate vector. In case that all flows pair of links in the same cluster cannot deliver packets simultaneously. A cluster is generally indexed by c, and let have the single-path flow data rate vector, we can let :¼ C be the set of the indices of all clusters in the WMN. We ð f Þf2F denote the “active route vector.” also define Mc as the set of all links in the cluster c. Deciding a single-path flow data rate vector is equivalent The proposed scheme estimates the traffic load in each to deciding an active route for the flow and the flow data cluster. The traffic load in a cluster is the sum of the traffic rate on the active route. An application using the flow can load on the links in the cluster. If the traffic load in a cluster is send user data through the active route at its flow data rate. estimated to be too high, the proposed scheme can redirect The active route can be decided in such a way that the the routes passing through the overloaded cluster for load global load balancing is accomplished. In addition, network balancing. The airtime ratio of a link represents the traffic congestion can be controlled and fairness can be guaranteed load on the link. If the sum of the airtime ratios of the links in by deciding the flow data rate properly. Therefore, the load- a cluster exceeds a certain bound, the cluster can be regarded aware routing, congestion, and fairness problems can be as overloaded. solved at the same time, if we find a way to calculate Roughly, we assume that a fixed portion of the time can appropriate flow data rate vectors. be used for data transmission, while the remainder is used for the purpose of control, e.g., control message exchange 3.2 Physical and Medium Access Control Layer and random back-off. Let
  • 5. denote the ratio of the time for Model data transmission to the whole time. Since only a link can The proposed scheme can be implemented on top of convey data traffic at a time within a cluster, the sum of the various physical (PHY) and medium access control airtime ratios of the links in a cluster cannot exceed
  • 6. . (MAC) layer protocols that utilize a limited bandwidth Therefore, we have the following constraint: and divide the time for multiple access, for example, such X as the carrier sense multiple access/collision avoidance al
  • 7. ; for all c 2 C: ð2Þ (CSMA/CA), the time division multiple access (TDMA), l2Mc and the reservation ALOHA (R-ALOHA). In Fig. 1, we give an example organization of clusters. The effective transmission rate of a link is defined as the Note that we do not draw all clusters to avoid over- number of actually transmitted bits divided by the time crowding. In this figure, four clusters are presented, each of spent for data transmission, calculated in consideration of which is indicated by a dashed circle. Suppose that a cluster retransmissions due to errors. That is, the effective transmis- includes all incoming and outgoing links of the nodes in the sion rate can be calculated as the PHY layer transmission dashed circle. In this example, the clusters 1 and 2 cover the rate times the probability of successful transmission. The areas around the gateway nodes 1 and 2, respectively. PHY layer transmission rate can be fixed, or can be When the estimated traffic load around the gateway node 1 adaptively adjusted according to the channel quality by is too high, the user taking the route to the gateway node 1 means of rate control schemes such as the receiver-based may not achieve high data rate due to the constraint (2) for autorate (RBAR) [23]. In the WMN under consideration, the cluster 1. In this case, if the gateway node 2 is lightly loaded, effective transmission rate of a link is assumed to be static for it is desirable for the user to choose the route to the gateway node 2 for higher data rate. Thus, it can be said that the a long time due to fixed locations of nodes. We define dl as traffic load is estimated and controlled in the unit of the the effective transmission rate of the link l. cluster for global load balancing. If all flows convey data traffic through each route at their The notion of a cluster corresponds to a clique in the flow data rates, the sum of the data P P rates of traffic passing “conflict graph” introduced in [24]. In the conflict graph, through link l is calculated as r2Hl f2Qr f;r , where Hl is vertices correspond to the links in the WMN. An edge is defined as the set of the indices of all routes passing through drawn between two vertices if the corresponding links the link l, i.e., Hl :¼ fr : l 2 Dr g, and Qr is the indices of all interfere with each other. Thus, an edge stands for confliction flows that use the route r, i.e., Qr :¼ ff : r 2 Gf g. We define between two vertices. A clique in the conflict graph is a set of the “airtime ratio” of the link l, denoted by al , as the ratio of vertices that mutually conflict with each other. According to the time taken up by the transmission to the total time of link [24], unless the conflict graph is a “perfect graph,” the clique l. The airtime ratio of the link l can be calculated as the sum of constraints in (2) are not tight in the strict sense even when all the data rates on the link l divided by the effective cliques (clusters) are taken into account. In [25], the authors transmission rate of the link l. That is, propose the centralized algorithm that transforms the conflict X X f;r graph to a perfect graph by adding unnecessary edges to the al ¼ : ð1Þ conflict graph. This algorithm can also be applied to our r2Hl f2Q dl r routing scheme. However, from a practical point of view, this Now, we discuss the restriction on the radio resource algorithm is inefficient since it requires centralized control allocation. For the protocols under consideration, time is the and can overly reduce spatial reuse. Therefore, in this paper, only radio resource, which is shared by links for data we recommend to use the clique constraints in (2) as it is.
  • 8. CHOI ET AL.: EFFICIENT LOAD-AWARE ROUTING SCHEME FOR WIRELESS MESH NETWORKS 1297 À1 Actually, these clique constraints are enough to serve our duf ðxÞ ¼ xþ1 : ð5Þ purpose, i.e., identifying overloaded regions in the WMN to dx pf redirect the routes. Also, there can be too many cliques in the The marginal utility of a flow is the amount of the utility that conflict graph, and therefore, considering all of them can the system can obtain by assigning a unit data rate to the render the proposed scheme highly complex. From a practical flow. Thus, to maximize the system utility, the proposed point of view, the clusters do not need to cover all possible scheme is likely to allocate more data rate to the flow with cliques, but it is enough for the clusters to be formed in such a large marginal utility. If is large, the marginal utility drops way that the traffic load in each region of the WMN is quickly as the data rate increases. In this case, the data rates separately evaluated. tend to be fairly allocated to flows, since the incentive to 3.3 Utility and Delay Penalty as Optimization Target assign more data rate to the flow which has already received a high data rate reduces. The flow with large value of pf has The flow with longer distance consumes generally more a large marginal utility, and therefore, it can receive more airtime to convey the same amount of data. Therefore, if data rate. maximizing system throughput is the optimization target in the WMN, the flows with short distance are likely to be When the flowP sends data at its flow data rate, the data f P allowed to send much more data than those with long rate of flow f is r2Gf f;r . Note that r2Gf f;r is equal to distance are, which leads to unfair resource allocation among the data rate allocated to one active route, if f is a single- flows. Thus, we need an optimization target other than the path flow data rate vector. Hence, the utility of flow f is P system throughput to take into account the fairness among uf ð r2Gf f;r Þ. If we consider only the utility in the objective flows. We consider the utility of a flow that represents the function of the optimization problem, the routing algorithm degree of satisfaction felt by the user using the flow. The is likely to ignore the end-to-end delay on a route. Since the utility is a highly desirable performance measure since the delay is also of great importance in the practical WMN, we user satisfaction is the ultimate goal of the network design. incorporate the delay term into the objective function. To do The utility function defines the mapping between the this, we define the “delay penalty function” for each flow, data rate of a flow and the utility of that flow. Since the which penalizes the objective function for selecting the utility function quantifies the network performance per- route with long end-to-end delay. Since the time to transmit ceived by users when a data rate is given, it can only be a packet of x bits through the link l is given as x=dl , we can estimated by a subjective survey, not by theoretical sayP the end-to-end delay on the route r is proportional that development. In [26] and [27], the utility function for best to l2Dr 1=dl . The delay penalty function should have a effort traffic is derived by analyzing the results from a subjective survey for various network data applications. larger value when a flow sends more data on the route with The utility function of a single best effort user is given as long end-to-end delay. Therefore, the delay P P penalty func- tion for the flow f can be given as r2Gf f;r l2Dr 1=dl . uðxÞ ¼ 0:16 þ 0:8 lnðx À 3Þ; ð3Þ Since we have two different objectives (i.e., the utility and the delay penalty), we should find a Pareto optimal solution where x is the data rate in the unit of Kilobits per second. such that no other solution can improve any objective This utility function is a strictly concave function, and as a without worsening the other objective. To calculate a Pareto result, it well shows the law of diminishing marginal utility. Although the utility function (3) might be best fitted to optimal solution, we use the scalarization technique [28, the survey results, it is not adequate for theoretical pp. 178-180] that merges multiple objectives into a single derivation since it is not defined for x 3. Thus, we do objective by taking the weighted sum of the objectives. We not take the specific values in (3) but adopt only the log introduce the merged objective function as follows: form of (3) to reflect the law of diminishing marginal utility. 0 1 In this paper, the utility function is designed so as to contain X X XX X 1 the parameters related to system-wide fairness and priority OðÞ :¼ uf @ f;r A À Á f;r ; ð6Þ f2F r2G f2F r2G l2D dl of flows. We define the utility function of flow f as follows: f f r where :¼ ðf;r Þf2F ;r2Gf and is the “delay penalty para- pf uf ðxÞ :¼ ln xþ1 ; ð4Þ meter” that controls the relative importance of the delay pf penalty to the utility. We can reduce the end-to-end delay at where x is the data rate, is the system-wide fairness the expense of the utility by increasing the delay penalty parameter, and pf represents the priority of flow f. The parameter. We will demonstrate the impact of the delay utility function enables us to control the trade-off between efficiency and fairness by adjusting . With a high value of penalty parameter in Section 6. , the system-wide fairness can be guaranteed at the cost of the system throughput. In other words, by increasing the 4 PROPOSED LOAD-AWARE ROUTING SCHEME value of , the standard deviation of the flow data rates can be decreased, but the average flow data rate also decreases. In this section, we design the proposed routing scheme by The parameter pf controls the priority of flow f. The flow using the dual decomposition method. We first formulate the with high priority pf is likely to enjoy a high data rate. optimization problem from the objective function and the To explain the reason behind the effect of the parameters, constraints introduced in the previous section, and derive we introduce the marginal utility. The marginal utility can the dual problem. Next, we explain how to calculate the flow be derived by differentiating the utility function by the data data rate vector for the given Lagrange multipliers and rate. That is, suggest the subgradient method to iteratively calculate the
  • 9. 1298 IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 9, NO. 9, SEPTEMBER 2010 X optimal Lagrange multipliers. Finally, we propose the s:t: l À c ¼ 0; for l 2 L; ð13Þ c2V l dampening algorithm to alleviate the route flapping problem. c ! 0; for c 2 C: ð14Þ 4.1 Problem Formulation à à à We formulate the optimization problem from (1), (2), and Let w :¼ ð ; Þ be any optimal solution of this dual problem. (6) as follows: ! 4.2 Flow Data Rate Calculation for Given Lagrange X X XX X1 max uf f;r À Á f;r ; ð7Þ Multipliers f2F r2Gf f2F r2Gf d l2Dr l Now, we calculate the flow data rates that maximize the X X f;r Lagrangian (10) for given Lagrange multipliers. To do this, s:t: al ¼ ; for all l 2 L; ð8Þ r2Hl f2Qr dl we find the maximizer of ð f ; Þ over f 2 P f for each flow X f. Let P f ðÞ denote the set of such maximizers, i.e., al
  • 10. ; for all c 2 C; ð9Þ P f ð Þ :¼ arg maxf 2P f ð f ; Þ. The following proposition l2Mc holds for the set P f ðÞ: P where f;r ! 0 and r2Gf f;r max for all f and r. This Proposition 1. The set P f ð Þ contains at least one single-path optimization problem is feasible and convex. Let à be any f;r flow data rate vector. optimal solution of this optimization problem. We also Proof. The proof is provided in Appendix A. u t define the optimal flow data rate vector à :¼ ðà Þr2Gf . f f;r We solve the optimization problem by converting it to From now on, we will explain how to find a single-path the dual problem according to the Lagrangian method in flow data rate vector in P f ðÞ. Let f ð ; Þ be the maximum [29]. The Lagrangian is given as follows: value of ðf ; Þ when f is a single-path flow data rate Âð; a; wÞ vector with the active route of . That is, ! X X XX X1 X þ l ' :¼ uf f;r ÀÁ f;r f ð ; Þ :¼ max uf ðÞ À : ð15Þ d 0 max dl f2F r2Gf f2F r2Gf l2Dr l l2D X X X f;r ' X X ' þ l al À þ c
  • 11. À al We define Rf ðÞ :¼ arg max 2Gf f ð ; Þ as the set of the l2L r2Hl f2Qr dl c2C l2Mc ð10Þ “optimal routes.” To maximize ðf ; Þ, the active route ! X X X X þ l ' should be one of the optimal routes in Rf ðÞ. Since uf ðÞ is ¼ uf f;r À f;r a concave function, f ð ; Þ is larger for the active route P f2F r2Gf r2Gf l2Dr dl with the smaller l2D l =dl . Therefore, we can also write X X ' X Rf ð Þ as follows: þ l À c a l þ
  • 12. c ; l2L c2V l c2C X þ l Rf ð Þ ¼ arg min : ð16Þ 2Gf dl where a :¼ ðal Þl2L and V l denotes the set of the indices of all l2D clusters that the link l belongs to (i.e., V l :¼ fc : l 2 Mc g). It is noted that we have P We define ð þ l Þ=dl as the “link cost” of the link l. Since l2D ð þ l Þ=dl is the sum of link costs on the route , the X XX XX X optimal route is the route that minimizes the sum of link l f;r =dl ¼ f;r l =dl ; l2L r2Hl f2Qr f2F r2Gf l2Dr costs. Since most existing ad hoc routing algorithms can P P P P employ the sum of link costs as the routing metric, the and c2C c l2Mc al ¼ l2L al c2V l c . In (10), l and c optimal route can be found by applying those ad hoc are the Lagrange multipliers corresponding to the con- routing algorithms. straints (8) and (9), respectively. We also define :¼ ðl Þl2L , When f is a single-path flow data rate vector with the :¼ ðc Þc2C , and w :¼ ð ; Þ. active route of , we can maximize ðf ; Þ if the flow data From the Lagrangian, we define the dual function as rate on the active route is equal to gðwÞ :¼ max;a Âð; a; wÞ. The dual function gðwÞ is defined P f ð ; Þ only for the Lagrange multipliers such that l À c2V l c ¼ X þ l ' 0 for l 2 L, since we have gðwÞ ¼ 1 for the other Lagrange :¼ arg max uf ðÞ À multipliers. Then, the dual function is given as follows: 0 max l2D dl ð17Þ X X !þ ' pf 1 gðwÞ ¼ max ð f ; Þ þ
  • 13. c ; ð11Þ ¼ min P À1 ; max ; l2D ð þ l Þ=dl f 2P f f2F c2C P where P f :¼ ff : f;r ! 0 for r 2 Gf ; r2Gf f;r max g and w h e r e ½xŠþ ¼ maxf0; xg. L e t u s d e f i n e f ð ; Þ :¼ P P P ðf ; Þ :¼ uf ð r2Gf f;r Þ À r2Gf f;r l2Dr ð þ l Þ=dl . ðf;r ð ; ÞÞr2Gf as follows: From the dual function, we define the following dual f ð ; Þ; if r ¼ ; problem: f;r ð ; Þ ¼ ð18Þ 0; otherwise: min gðwÞ; ð12Þ Then, we have f ð ; Þ 2 P f ðÞ if 2 Rf ð Þ.
  • 14. CHOI ET AL.: EFFICIENT LOAD-AWARE ROUTING SCHEME FOR WIRELESS MESH NETWORKS 1299 ðjÞ 4.3 Lagrange Multiplier Update jP f ðà Þj 1, it is not guaranteed that f ð f ; ðjÞ Þ converges From now on, we will find the solution of the dual problem to the optimal flow data rate vector. The cardinality of (12). The constraint (13) in the dual problem can be P f ð Ã Þ is closely related to the cardinality of Rf ð Ã Þ in (16). incorporated into the dual function. We define the modified If jRf ð à Þj ¼ 1, we also have jP f ð à Þj ¼ 1. On the other dual function hð Þ :¼ gðð ðÞ; ÞÞ, where ð Þ :¼ ðl ðÞÞl2L hand, if jRf ðà Þj 1, the set P f ðÃ Þ contains multiple flow satisfies the constraint (13) for given . That is, data rate vectors, which include the multipath flow data X rate vector distributing the data rates on the multiple routes l ð Þ ¼ c ; ð19Þ in Rf ð à Þ. This means that à may be the multipath flow f c2V l data rate vector for the flow f such that jRf ðà Þj 1. In this ðjÞ for all l. Then, the dual optimal solution à minimizes hðÞ case, the single-path flow data rate vector f ð f ; ðjÞ Þ over c ! 0 for all c 2 C. cannot converge to à . However, we can still use f ðjÞ We will use the subgradient method [29, p. 620] to f ð f ; ðjÞ Þ for all fs as a suboptimal solution very close calculate the dual optimal solution. We can calculate the to the optimal one, since there are generally a small number subgradients of h from the theorem of dual derivatives [29, of the flows fs such that jRf ð à Þj 1, and the flow data p. 604]. Recall that f denotes the active route of the flow f, rates in P f ð Ã Þ well approximate à even for fs such that f and ¼ ð f Þf2F denotes the active route vector. We first jRf ð à Þj 1. ðjÞ calculate al ð ; Þ, which denotes the airtime ratio of link l Even when we use f ð f ; ðjÞ Þ as a suboptimal solution, when and are given. The airtime ratio al ð ; Þ is we still have the “route flapping problem.” The fact that ðjÞ calculated as follows: f ð f ; ðjÞ Þ converges to the set P f ðÃ Þ does not mean ðjÞ that f ð f ; ðjÞ Þ has a limit in P f ð à Þ. Therefore, for fs such X X f;r ð f ; Þ ðjÞ al ð ; Þ :¼ : ð20Þ that jP f ð à Þj 1, it is possible that f ð f ; ðjÞ Þ alternates r2Hl f2Qr dl between some points in P f ðÃ Þ even after ðjÞ is sufficiently converged to à . In this case, the active route can flap between From al ð ; Þ, we can calculate sð ; Þ :¼ ðsc ð ; ÞÞc2C , some routes in Rf ð à Þ. We now suggest the “dampening which is defined as algorithm” to solve this route flapping problem. X sc ð ; Þ :¼
  • 15. À al ð ; ðÞÞ: ð21Þ 4.5 Dampening Algorithm: Solution to Route l2Mc Flapping Problem If f 2 Rf ððÞÞ for all f 2 F , the vector sð ; Þ is the The dampening algorithm should alleviate the route flapping subgradient of hðÞ. problem while keeping the solution in the close range of the Let ðjÞ :¼ ððjÞ Þc2C be the estimation of à at the jth c optimal one. Moreover, the dampening algorithm should be iteration of the subgradient method. We also define ðjÞ :¼ able to be implemented in a distributed way. To accomplish ðjÞ ðjÞ ð f Þf2F as the active route vector such that f 2 Rf ðððjÞ ÞÞ these goals, the dampening algorithm prevents the route for all f 2 F . The iteration begins when j ¼ 1. The initial flapping by changing the active route more conservatively values should satisfy ð0Þ ! 0 for all c 2 C. The Lagrange c than the original algorithm does. When the original algo- ðjÞ multipliers are updated at the jth iteration as follows: rithm is used, we have f 2 Rf ð ðjÞ Þ. This means that, at the  À ÁÃþ jth iteration, the original algorithm finds any optimal route in ðjþ1Þ ¼ ðjÞ À ðjÞ s ðjÞ ; ðjÞ ; ð22Þ Rf ð ðjÞ Þ from (16), and immediately changes the active route to the new optimal route. However, the dampening algo- where ½ðxc Þc2C Šþ ¼ ðmaxf0; xc gÞc2C and ðjÞ is the step size. rithm changes the active route only if the new route increases The step size can be the diminishing step size that satisfies P1 ðjÞ P1 ðjÞ 2 f ð ; ðjÞ Þ by a certain margin. ðjÞ 0, j¼0 ¼ 1, and j¼0 ð Þ 1. In this case, Let us explain the operation of the dampening algorithm. ðjÞ converges to à . Alternatively, we can also use the We define as the “dampening parameter” which controls constant step size, which makes ðjÞ converge to within the conservativeness in changing the route. The value of is ðjÞ some range of à . We define ðjÞ :¼ ðl Þl2L ¼ ððjÞ Þ. Then, between zero and one. If is set to one, the dampening ðjÞ converges to à when ðjÞ converges to à . algorithm is the same as the original algorithm. The active route is changed more conservatively with the smaller value 4.4 Convergence of Flow Data Rate ðjÞ of . At the jth iteration, the dampening algorithm first finds We take f ð f ; ðjÞ Þ as the estimation of the optimal flow ðjÞ any optimal route in Rf ð ðjÞ Þ. Let yf denote the optimal route data rate vector à at jth iteration. We will discuss the f for the flow f, newly found at the jth iteration. The convergence of this flow data rate vector. Since the ðjÞ dampening algorithm decides the active route f according optimization problem (7) is strictly feasible and the objective to the following rules: and constraint functions are concave, the strong duality ðjÀ1Þ ðjÞ holds from the Slater’s constraint qualification [29, p. 520]. . If f ð f ; ðjÞ Þ ! Á f ðyf ; ðjÞ Þ, the dampening Therefore, à is included in the set P f ð à Þ. Moreover, f algorithm does not change the active route, i.e., ðjÞ f ð f ; ðjÞ Þ also converges to the set P f ð Ã Þ as j ! 1, since ðjÞ ðjÀ1Þ ðjÞ f ¼ f . we have f ð f ; ðjÞ Þ 2 P f ð ðjÞ Þ for all j. ðjÀ1Þ ðjÞ From the above statements, we can conclude that . If f ð f ; ðjÞ Þ Á f ðyf ; ðjÞ Þ, the dampening ðjÞ algorithm changes the active route to the new f ð f ; ðjÞ Þ converges to à as j ! 1 for the flow f such f ðjÞ ðjÞ that jP f ð à Þj ¼ 1. However, for the flow f such that optimal route, i.e., f ¼ yf .
  • 16. 1300 IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 9, NO. 9, SEPTEMBER 2010 Consequently, the dampening algorithm can alleviate the Theorem 1. If the dampening algorithm is used, we have ½jðjÞ À route flapping problem if the dampening parameter is set à j À ðÞŠþ ! 0 as j ! 1, where ðÞ :¼ maxfj À à j : to a sufficiently small value. The stability comes at the cost Á hðÞ hð à Þg. of the suboptimal route selection. For all j, the suboptimal Proof. The proof is provided in Appendix B. u t ðjÞ route f satisfies the following condition: À ðjÞ Á According to Theorem 1, ðjÞ converges to within the f f ; ðjÞ ! Á max f ð ; ðjÞ Þ: ð23Þ distance of ðÞ from à . If we set to a smaller value to 2Gf make the WMN more stable, the Lagrange multipliers Except for the difference in deciding ðjÞ , the dampening deviate more from à , since ðÞ becomes larger for the algorithm uses the same equations (17)-(22) as the original smaller . Additionally, for the given Lagrange multipliers, algorithm to calculate the flow data rate vectors and update the dampening algorithm selects the suboptimal route that the Lagrange multipliers. satisfies the condition in (23). Therefore, we can conclude Now, we discuss the property of the dampening that the dampening algorithm finds the suboptimal solu- algorithm. For the given active route vector ¼ ð f Þf2F , tion, to which the distance from the optimal solution is we define the “fixed-route optimization problem” as the restricted by the condition in (23) and Theorem 1. modified version of the optimization problem (7) in such a Though it is verified in Theorem 1 that ðjÞ converges to a way that the flow data rate vector of flow f is restricted to certain range of à , we cannot guarantee that ðjÞ has a limit the single-path flow data rate vector with the active route of within the range. However, ðjÞ can have a limit, if the f for all fs in F . Let hð ; Þ denote the dual function of the following condition is met. Suppose that the dampening fixed-route optimization problem with the active route algorithm selects a certain active route vector à :¼ ð f Þf2F à ðjÞ Ã vector of . The dual function hð ; Þ is given as at the Jth iteration. It is possible that ¼ for j ! J, if X X we have f ð f ; ðjÞ Þ ! Á max 2Gf f ð ; ðjÞ Þ for all f 2 F for à hð ; Þ :¼ f ð f ; ðÞÞ þ
  • 17. c : ð24Þ j ! J. There can be à satisfying the above condition, if is f2F c2C sufficiently small. Let à ð Þ denote the optimal Lagrange multiplier of the fixed-route optimization problem with the The following propositions hold for the dual function active route vector of . From Proposition 4, the Lagrange hð ; Þ: multiplier ðjÞ approaches à ð ðjÞ Þ at the jth iteration. Proposition 2. hðÞ ¼ max hð ; Þ. Therefore, ðjÞ has a limit on à ð à Þ, if we have ðjÞ ¼ à ðjÞ Proof. From Proposition 1, the single-path flow data rate for j ! J. Accordingly, f ð f ; ðjÞ Þ also converges to the vector can be a maximizer of ðf ; ð ÞÞ. Therefore, it optimal solution of the fixed-route optimization problem holds that with the active route vector of à . In this case, we can X X guarantee the lower bound on the performance of the hðÞ ¼ max f ð ; ðÞÞ þ
  • 18. c dampening algorithm as stated in the following theorem: 2Gf f2F c2C Theorem 2. Suppose that there exist à and J such that ðjÞ ¼ ( ) X X à for j ! J. Then, we have the lower bound on the ¼ max f ð f ; ðÞÞ þ
  • 19. c ¼ max hð ; Þ: performance of the dampening algorithm as follows: f2F c2C t u lim Oðð ðjÞ ; ðjÞ ÞÞ ! Á Oðà Þ; ð25Þ j!1 where à :¼ ðà Þf2F ;r2Gf , ð ; Þ :¼ ðf;r ð f ; ÞÞf2F ;r2Gf , f;r Proposition 3. hð ðjÞ ; ðjÞ Þ ! Á hððjÞ Þ for all j. and OðÞ is the objective function defined in (6). P ðjÞ Proof. For all j, we have hð ; ðjÞ Þ ¼ f2F f ð f ; ðjÞ Þ þ ðjÞ Proof. The proof is provided in Appendix C. u t P P ðjÞ P
  • 20. c2C ðjÞ ! f2F Á max 2Gf f ð ; Þ þ
  • 21. c2C ðjÞ ! c c Á hððjÞ Þ. u t 5 DISTRIBUTED IMPLEMENTATION Proposition 4. sð ; Þ is the subgradient of hð ; Þ. The proposed routing scheme can be implemented in a Proof. When is given, f ð f ; ðÞÞ is the maximizer of the distributed way, which improves the scalability of the Lagrangian of the fixed-route optimization problem with WMNs. In this section, we discuss the distributed the active route vector of . Therefore, sð ; Þ is the implementation of the proposed scheme. The flow data ðjÞ subgradient of the dual function of this optimization rate vectors f ð f ; ðjÞ Þs and the Lagrange multipliers ðjÞ s c problem from the theorem of dual derivatives. u t are distributively managed by the nodes in the WMN. The ðjÞ flow data rate vector f ð f ; ðjÞ Þ is managed by the source ðjÞ From Proposition 4, the Lagrange multipliers are node of the flow f. Recall that f ð f ; ðjÞ Þ is the single-path ðjÞ updated at the jth iteration, not by using the subgradient flow data rate vector with the active route of f , and the of hð ðjÞ Þ but by using the subgradient of hð ðjÞ ; ðjÞ Þ, since ðjÞ ðjÞ ðjÞ flow data rate on f is equal to f ð f ; Þ. Therefore, the ðjÞ f may not included in Rf ððjÞ Þ. In the dampening source node of the flow f actually manages f and ðjÞ ðjÞ ðjÞ algorithm, the Lagrange multipliers converge to within a f ð f ; Þ. certain range of the optimal Lagrange multiplier as stated in For implementation, one node within a cluster is desig- the following theorem: nated as the head of the cluster. The head of a cluster is
  • 22. CHOI ET AL.: EFFICIENT LOAD-AWARE ROUTING SCHEME FOR WIRELESS MESH NETWORKS 1301 By the above steps, not only the routing but also the link cost control and the flow control are performed. That is, . Each cluster head estimates the traffic load within P the cluster, that is, ðjÞ ðjÞ l2Mc al ð ; Þ for cluster c, and the nodes within the cluster adjust the link costs ðjÞ of its outgoing links, ð þ l Þ=dl for link l, on the basis of this estimated load as in steps 1-5 (i.e., link cost control). . Based on the link costs, the active route for each flow is updated in steps 6-8 (i.e., routing). . The flow data rate is calculated in step 9 (i.e., flow control). Theoretically, an operation can be performed only after the preceding operation has been completed. In this case, however, the proposed scheme may converge very slowly. When the dual decomposition method is used, different variables can be updated according to the different time schedules [15]. Therefore, in order to improve the conver- gence speed, in practice, different network entities (i.e., cluster heads, nodes in each cluster, and source nodes) carry out these operations asynchronously, by using currently Fig. 2. Control information exchange for distributed implementation. available information. Though it is difficult to prove that the asynchronous operation leads to the exact solution, we assumed to be able to communicate with the transmitter have confirmed by the simulation that the solutions nodes of the links in its cluster. Let us call the head of cluster c produced by the asynchronous and the synchronous opera- the “cluster head” c. The cluster head c takes the role of tions are the same in our routing problem. In the following, maintaining and updating ðjÞ . we describe three operations in more detail when they are c The proposed scheme takes the following steps at the jth implemented asynchronously. iteration of the subgradient method. Fig. 2 illustrates an . Link cost control: For link cost control, the cluster head example of control information exchange for this operation. c gathers the information on the total load in the cluster c and adjusts c to control the load on the 1. The source node of flow f sends a message contain- ðjÞ ðjÞ cluster c. This process is as follows: Each node ing f ð f ; ðjÞ Þ to the nodes on the active route f . estimates the total loads for all outgoing links and 2. Each node calculates al ð ðjÞ ; ðjÞ Þs for its all outgoing broadcasts the estimated loads periodically as in step 2. links from (20) and broadcasts them to the heads of Upon receiving the broadcasting message, the cluster clusters to which the links belong. head can compute the total airtime ratio consumed by 3. The cluster head c receives al ð ðjÞ ; ðjÞ Þs for all links the links in its cluster. If the total airtime ratio exceeds in its cluster and updates ðjÞ to ðjþ1Þ from (22). c c the available airtime ratio (i.e.,
  • 23. ), it means that the 4. The cluster head c broadcasts ðjþ1Þ to the transmit- c cluster is overloaded. Therefore, the cluster head c ter nodes of the links in its cluster. increases c as in step 3. If the cluster c is not ðjþ1Þ 5. Each node calculates l ¼ l ððjþ1Þ Þ from (19) and overloaded, that is, its total airtime ratio is smaller ðjþ1Þ derives the link cost ð þ l Þ=dl for its all outgoing than
  • 24. , the cluster head c decreases c . The cluster links. head c periodically broadcasts c as in step 4. From 6. The source node of flow f finds the optimal route this broadcasting message, f þ l ðÞg=dl s are calcu- ðjþ1Þ yf 2 Rf ððjþ1Þ Þ. An implementation example for lated for all links within the cluster as in step 5. Since finding the optimal route, when each node main- l ðÞ is the sum of c s for the clusters around the link l tains the updated link costs for its all outgoing links, (see (19)), the link cost of the link l (i.e., f þ l ð Þg=dl ) will be explained later. can be controlled by the cluster heads based on the 7. The source node of flow f is informed of the link inflicted load. ðjþ1Þ ðjÞ costs ð þ l Þ=dl s on the current active route f . Routing: The link cost of link l is calculated as ðjþ1Þ and the new optimal route yf . f þ l ðÞg=dl . Since dl is the effective transmission ðjþ1Þ ðjþ1Þ 8. The source node of flow f sets f to yf , if it rate reflecting the PHY transmission rate as well as holds that the packet error probability, we can say that 1=dl is À ðjÞ Á À ðjþ1Þ Á equivalent to the ETT in [5]. Therefore, the link cost in f f ; ðjþ1Þ Á f yf ; ðjþ1Þ : the proposed scheme can be viewed as the ETT augmented with the load control variable (i.e., l ðÞ). If not, the active route is not changed, i.e., To find the optimal route on which the sum of the ðjþ1Þ ðjÞ f ¼ f . proposed link cost is minimized, we can use either the 9. The source node of flow f calculates the flow data existing proactive routing protocols (e.g., the destina- ðjþ1Þ rate f ð f ; ðjþ1Þ Þ from (17). tion-sequenced distance vector (DSDV)) or reactive
  • 25. 1302 IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 9, NO. 9, SEPTEMBER 2010 routing protocols (e.g., the AODV and the dynamic TABLE 2 source routing (DSR)). The source node of flow f Table of Simulation Parameters periodically finds the new optimal route yf by using these routing protocols as in step 6. The source node is aware of the link costs on the current active route from the periodic report, and is also informed of the link costs on the new optimal route by the routing protocol (step 7). Based on these link costs, the source node decides whether to change the active route or not as in step 8. . Flow/congestion control: As in step 9, the source node periodically recalculates the flow data rate f ð f ; ð ÞÞ by using the link costs on the active route according to (17). As seen from (17), the source node lowers the flow data rate when the link costs on the active route is high. Since the source node limits the data rate of its traffic to the flow data rate, the source node can be quenched when the active route Let us explain the organization of clusters. We organize passes through the congested area of the network. clusters based on the following two rules, which define the interfering relationship between links. First, all incoming By the above three operations, network-wide load and outgoing links of a node interfere with each other. This balance can be achieved. If an area of the network is is because a node cannot receive or transmit data through overloaded, the link costs around the area are increased by more than one link at the same time. Second, two links the link cost control operation. Then, the source node of the interfere with each other, if the transmitter or receiver node flow passing through the area reduces its flow data rate, or of one link is within the interfering range of the transmitter finds another route that allows a higher flow data rate. or receiver node of the other link. This can be exemplified Fig. 2 illustrates an example of control information by the IEEE 802.11 protocol, in which the transmitter node exchange for a flow and a cluster. On the active route f , the sends a request-to-send (RTS) packet and the receiver node flow data rate f ð f ; ðÞÞ and the link cost f þ l ð Þg=dl are responds with a clear-to-send (CTS) packet to prevent the exchanged. This control information can be piggybacked on nodes close to the transmitter or receiver node from the data and acknowledgement (ACK) packets. In addition, interfering with packet transmission. On the basis of these the airtime ratio al ð ; ðÞÞ and the Lagrange multiplier c are rules, we organize clusters as follows: for each pair of nodes exchanged between the cluster head and nearby nodes. If the m and n within the interfering range of each other, there is a proposed scheme is applied to the systems broadcasting the cluster including all the incoming and outgoing links of beacon message periodically, for example, such as IEEE the nodes m and n. We assume that two nodes are within 802.11, 802.15.3, and 802.15.4 standards, this information can the interfering range of each other, if the received SNR at a also be conveyed by these beacon messages without addi- node from the other node is over À7 dB. tional control packet transmission. It is assumed that the ratio of the time dedicated to data transmission (i.e.,
  • 26. ) is 0.8. The maximum flow data rate (i.e., max ) is set to 100 Mbps. The system-wide fairness 6 NUMERICAL RESULTS parameter in the utility function (i.e., ) is set to 1, unless The numerical results presented below show that the noted otherwise. The priority of flow f (i.e., pf ) is set to 1 for proposed routing scheme effectively balances traffic load, all flows. For the subgradient method, the step size (i.e., ðjÞ ) and consequently, outperforms the routing algorithm using is set to 0.01. Unless noted otherwise, the delay penalty the ETT as a routing metric. parameter (i.e., ) is set to 1, and the dampening parameter (i.e., ) is set to 0.95. 6.1 Environments and Parameters for Numerical We do not assume any specific PHY/MAC layer Results protocol. Instead, we assume that the WMN uses a simple We first describe the environment and parameters for getting reservation protocol (e.g., the mesh deterministic access the numerical results. In Table 2, we summarize the (MDA) of the 802.11s protocol [30]). The WMN first simulation parameters. We consider 8 km  8 km square calculates the required amount of time for each link to area. There are 300 nodes, which are randomly located support the flow data rates of the flows on it. After that, it according to the uniform distribution. The network uses the assigns the calculated amount of time to each link by using bandwidth of 20 MHz. The transmission power of a node is a reservation protocol. Each flow on a link reserves a 24.5 dBm, and the noise density is assumed to be À163 dBm/ portion of the time assigned to the link. Then, each flow has Hz. We assume the line-of-sight (LOS) link between nodes. an end-to-end path with a reserved data rate. We assume Therefore, for the channel fading model, we only consider the that a flow has an infinite backlog and sends data at its flow path loss calculated as xÀ3:7 , where x is the distance between data rate through its end-to-end path. In this setting, we can nodes in meters. A link is established between two nodes if estimate the throughput of each flow from the reserved data the signal-to-noise ratio (SNR) between them exceeds 0 dB. rate of its end-to-end path. In this paper, we do not use an The effective transmission rate of link l (i.e., dl ) is assumed to event-based simulator since it is not necessary to simulate be the Shannon capacity of the link. That is, dl ¼ 20  log2 ð1 þ the behavior of individual packets for estimating the SNRl Þ Mbps, where SNRl is the SNR of the link l. throughput of each flow.