13.07.2015 Views

Page 2 Lecture Notes in Computer Science 2865 Edited by G. Goos ...

Page 2 Lecture Notes in Computer Science 2865 Edited by G. Goos ...

Page 2 Lecture Notes in Computer Science 2865 Edited by G. Goos ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

<strong>Lecture</strong> <strong>Notes</strong> <strong>in</strong> <strong>Computer</strong> <strong>Science</strong> <strong>2865</strong><strong>Edited</strong> <strong>by</strong> G. <strong>Goos</strong>, J. Hartmanis, and J. van Leeuwen


3Berl<strong>in</strong>HeidelbergNew YorkHong KongLondonMilanParisTokyo


Samuel Pierre Michel BarbeauEvangelos Kranakis (Eds.)Ad-Hoc, Mobile,andWireless NetworksSecond International Conference,ADHOC-NOW 2003Montreal, Canada, October 8-10, 2003Proceed<strong>in</strong>gs13


Series EditorsGerhard <strong>Goos</strong>, Karlsruhe University, GermanyJuris Hartmanis, Cornell University, NY, USAJan van Leeuwen, Utrecht University, The NetherlandsVolume EditorsSamuel PierreEcole Polytechnique de MontrealDepartment of <strong>Computer</strong> Eng<strong>in</strong>eer<strong>in</strong>gP.O. Box 6079, Station Centre-Ville, Montreal, Canada, H3C 3A7E-mail: samuel.pierre@polymtl.caMichel BarbeauEvangelos KranakisCarleton University, School of <strong>Computer</strong> <strong>Science</strong>5376 Herzberg Laboratories, 1125 Colonel <strong>by</strong> DriveOttawa, Canada, K1S 5B6E-mail: {barbeau,kranakis}@scs.carleton.caCatalog<strong>in</strong>g-<strong>in</strong>-Publication Data applied forA catalog record for this book is available from the Library of Congress.Bibliographic <strong>in</strong>formation published <strong>by</strong> Die Deutsche BibliothekDie Deutsche Bibliothek lists this publication <strong>in</strong> the Deutsche Nationalbibliografie;detailed bibliographic data is available <strong>in</strong> the Internet at .CR Subject Classification (1998): C.2, D.4.4, H.4.3, H.5.3, K.4.3ISSN 0302-9743ISBN 3-540-20260-9 Spr<strong>in</strong>ger-Verlag Berl<strong>in</strong> Heidelberg New YorkThis work is subject to copyright. All rights are reserved, whether the whole or part of the material isconcerned, specifically the rights of translation, repr<strong>in</strong>t<strong>in</strong>g, re-use of illustrations, recitation, broadcast<strong>in</strong>g,reproduction on microfilms or <strong>in</strong> any other way, and storage <strong>in</strong> data banks. Duplication of this publicationor parts thereof is permitted only under the provisions of the German Copyright Law of September 9, 1965,<strong>in</strong> its current version, and permission for use must always be obta<strong>in</strong>ed from Spr<strong>in</strong>ger-Verlag. Violations areliable for prosecution under the German Copyright Law.Spr<strong>in</strong>ger-Verlag Berl<strong>in</strong> Heidelberg New Yorka member of BertelsmannSpr<strong>in</strong>ger <strong>Science</strong>+Bus<strong>in</strong>ess Media GmbHhttp://www.spr<strong>in</strong>ger.de© Spr<strong>in</strong>ger-Verlag Berl<strong>in</strong> Heidelberg 2003Pr<strong>in</strong>ted <strong>in</strong> GermanyTypesett<strong>in</strong>g: Camera-ready <strong>by</strong> author, data conversion <strong>by</strong> Olgun <strong>Computer</strong>grafikPr<strong>in</strong>ted on acid-free paper SPIN: 10963562 06/3142 543210


PrefaceAd Hoc Networks are wireless, self-organiz<strong>in</strong>g systems formed <strong>by</strong> co-operat<strong>in</strong>gnodes, with<strong>in</strong> communication range of each other which form temporary networks.Their topology is dynamic, decentralized, and ever-chang<strong>in</strong>g, and thenodes may move around arbitrarily. The last few years have witnessed a wealthof research ideas on Ad Hoc networks which are mov<strong>in</strong>g rapidly <strong>in</strong>to implementedstandards.Mobile comput<strong>in</strong>g, particularly wireless-enabled mobile comput<strong>in</strong>g, covers alarge area of applications <strong>in</strong> mobile comput<strong>in</strong>g environments, network<strong>in</strong>g, communicationdevices and systems. This conference exposes experimental as well astheoretical research <strong>in</strong> ad hoc, mobile and wireless networks. The range of topicscovered <strong>in</strong>cludes management of power consumption, architectures and protocols,quality of service, and security. The aim of the conference was to providea unique opportunity for researchers and students <strong>in</strong> <strong>in</strong>dustry and academia toparticipate at an annual forum and share their research results and experiences.This conference followed the first successful conference (held at the Fields Institute<strong>in</strong> Toronto dur<strong>in</strong>g September 20–21 of last year), and was held at the HolidayInn, Midtown <strong>in</strong> Montreal dur<strong>in</strong>g October 8–10, 2003. It was co-sponsored<strong>by</strong> the Mobile Comput<strong>in</strong>g and Network<strong>in</strong>g Research Laboratory (LARIM) of theÉcole Polytechnique de Montréal, the School of <strong>Computer</strong> <strong>Science</strong> (SCS) of CarletonUniversity, MITACS (Mathematics of Information Technology and ComplexSystems), and the Association for Comput<strong>in</strong>g Mach<strong>in</strong>ery (ACM).Forty-two papers were submitted, of which 23 regular and 4 short papers wereselected for presentation. All papers were reviewed for technical merit <strong>by</strong> theprogram committee. We would like to thank the <strong>in</strong>vited speakers Adrian Perrig(Carnegie Mellon University, USA) and Violet R. Syrotiuk (Arizona State University,USA) for their presentations. Many thanks also go to Khaled Laouamrifor help<strong>in</strong>g with the conference logistics, as well as all the follow<strong>in</strong>g people fortheir helpful contribution as paper reviewers: Gustavo Alonso, Ronald Beaubrun,Paul Boone, Steven Chamberland, Ali Chamam, Soumaya Cherkaoui, RochGlitho, Norm Hutch<strong>in</strong>son, Jeannette Janssen, Mike Just, Danny Krizanc, ThomaKunz, Peter Marbach, Fabien Nimbona, Paolo Penna, Alejandro Qu<strong>in</strong>tero, S.S.Ravi, Daniel Rossier, Sunil Shende, Ivan Stojmenovic, Tao Wan, and Yufei Wu.Special thanks to Amir Ghavam, Jeyanthi Hall and Zhey<strong>in</strong> Li for publicity, andMark Vigder for Web site contributions. F<strong>in</strong>ally, we would like to thank allthe members of the organiz<strong>in</strong>g committee, as well as Raymond Lévesque andSébastien Lévesque from BCU.Michel BarbeauEvangelos KranakisSamuel Pierre


Organiz<strong>in</strong>g CommitteeConference Co-chairsMichel BarbeauCarleton UniversityEvangelos KranakisCarleton UniversitySamuel PierreÉcole Polytechnique de MontréalPublicity and Tutorials ChairAlejandro Qu<strong>in</strong>teroÉcole Polytechnique de MontréalLocal Arrangements ChairSab<strong>in</strong>e KébreauÉcole Polytechnique de Montréal


Program CommitteeG. Alonso, ETHZ, SwitzerlandM. Barbeau, Carleton University, CanadaR. Beaubrun, Université Laval, CanadaS. Chamberland, École Polytechnique, CanadaS. Cherkaoui, U. de Sherbrooke, CanadaR.H. Glitho, Ericsson Research, CanadaJ. Janssen, Dalhousie University, CanadaM. Just, Treasury Board, CanadaN.C. Hutch<strong>in</strong>son, UBC, CanadaE. Kranakis, Carleton University, CanadaD. Krizanc, Wesleyan University, USAT. Kunz, Carleton University, CanadaR. Liscano, Mitel Networks, CanadaP. Marbach, U. of Toronto, CanadaL. Narayanan, Concordia U., CanadaI. Nikolaidis , U. of Alberta, CanadaH. Mouftha, Ottawa U., CanadaP. Penna, University of Rome, ItalyS. Pierre, École Polytechnique, CanadaA. Qu<strong>in</strong>tero, École Polytechnique, CanadaS. Ravi, SUNY Albany, USAD. Rossier, Swisscom, SwitzerlandS. Shende, Rutgers University, USAI. Stojmenovic, U. of Ottawa, CanadaS. Tohmé, ENST, FranceKeynote SpeakersAdrian Perrig, Canergie Mellon U., USAViolet R. Syrotiuk, Arizona State U., USATutorialsIvan Stojmenovic, University of Ottawa, CanadaRamiro Liscano and Amir Ghavam, University of Ottawa, CanadaMichel Barbeau, Carleton University, Canada


Table of ContentsSpace-Time Rout<strong>in</strong>g <strong>in</strong> Ad Hoc Networks ............................. 1H. Dubois-Ferrière, M. Grossglauser, and M. VetterliSAFAR: An Adaptive Bandwidth-Efficient Rout<strong>in</strong>g Protocolfor Mobile Ad Hoc Networks ......................................... 12J. Doshi and P. KilambiEvaluation of the AODV and DSR Rout<strong>in</strong>g ProtocolsUs<strong>in</strong>g the MERIT Tool ............................................. 25P. Narayan and V.R. SyrotiukOn-demand Rout<strong>in</strong>g <strong>in</strong> MANETs:The Impact of a Realistic Physical Layer Model ........................ 37L. Q<strong>in</strong> and T. KunzArchitecture and Algorithms for Real-Time Mobility Management<strong>in</strong> Mobile IP Networks .............................................. 49M. Diha and S. PierreProactive QoS Rout<strong>in</strong>g <strong>in</strong> Ad Hoc Networks ........................... 60Y. Ge, T. Kunz, and L. LamontDeliver<strong>in</strong>g Messages <strong>in</strong> Disconnected Mobile Ad Hoc Networks ........... 72R. Shah and N.C. Hutch<strong>in</strong>sonExtend<strong>in</strong>g Seamless IP Multicast Edge-Coveragethrough Mobile Ad Hoc Access Networks .............................. 84P.M. Ruiz, A.F. Gomez-Skarmeta, P. Mart<strong>in</strong>ez, and D. LarrabeitiA Uniform Cont<strong>in</strong>uum Model for Scal<strong>in</strong>g of Ad Hoc Networks ........... 96E.W. Grundke and A.N. Z<strong>in</strong>cir-HeywoodProbabilistic Protocols for Node Discovery<strong>in</strong> Ad Hoc Multi-channel Broadcast Networks ..........................104G. Alonso, E. Kranakis, C. Sawchuk, R. Wattenhofer,and P. WidmayerTowards Adaptive WLAN Frequency ManagementUs<strong>in</strong>g Intelligent Agents ............................................116F. Gamba, J.-F. Wagen, and D. RossierAnalyz<strong>in</strong>g Split Channel Medium Access Control Schemeswith ALOHA Reservation ...........................................128J. Deng, Y.S. Han, and Z.J. HaasPrevent<strong>in</strong>g Replay Attacks for Secure Rout<strong>in</strong>g <strong>in</strong> Ad Hoc Networks .......140J. Zhen and S. Sr<strong>in</strong>ivas


XTable of ContentsResist<strong>in</strong>g Malicious Packet Dropp<strong>in</strong>g <strong>in</strong> Wireless Ad Hoc Networks .......151M. Just, E. Kranakis, and T. WanA New Framework for Build<strong>in</strong>g Secure Collaborative Systems<strong>in</strong> True Ad Hoc Network ............................................164H.-P. Bischof, A. Kam<strong>in</strong>sky, and J. B<strong>in</strong>derComput<strong>in</strong>g 2-Hop Neighborhoods <strong>in</strong> Ad Hoc Wireless Networks ..........175G. Cal<strong>in</strong>escuTopology Control Problems under Symmetricand Asymmetric Power Thresholds ...................................187S.O. Krumke, R. Liu, E.L. Lloyd, M.V. Marathe, R. Ramanathan,and S.S. RaviIDEA: An Iterative-Deepen<strong>in</strong>g Algorithm for Energy-Efficient Query<strong>in</strong>g<strong>in</strong> Ad Hoc Sensor Networks ..........................................199S. PatilOn the Interaction of Bandwidth Constra<strong>in</strong>ts and Energy Efficiency<strong>in</strong> All-Wireless Networks ............................................211T. Chu and I. NikolaidisAutomated Meter Read<strong>in</strong>g and SCADA Applicationfor Wireless Sensor Network .........................................223F.J. Mol<strong>in</strong>a, J. Barbancho, and J. LuqueRange Assignment for High Connectivity <strong>in</strong> Wireless Ad Hoc Networks ...235G. Cal<strong>in</strong>escu and P.-J. WanSte<strong>in</strong>er Systems for Topology-Transparent Access Control <strong>in</strong> MANETs ...247C.J. Colbourn, V.R. Syrotiuk, and A.C.H. L<strong>in</strong>gComplexity of Connected Components <strong>in</strong> Evolv<strong>in</strong>g Graphsand the Computation of Multicast Trees <strong>in</strong> Dynamic Networks ..........259S. Bhadra and A. FerreiraMobile Agents for Cluster<strong>in</strong>g and Rout<strong>in</strong>g <strong>in</strong> Mobile Ad Hoc Networks ...271M.K. Denko and Q.H. MahmoudRout<strong>in</strong>g Update <strong>in</strong> Ad Hoc Networks .................................277B. Macabéo, S. Pierre, and A. Qu<strong>in</strong>teroInter-vehicle Geocast Protocol Support<strong>in</strong>g Non-equipped GPS Vehicles ...281A. Benslimane and A. BachirCartesian Ad Hoc Rout<strong>in</strong>g Protocols..................................287L. Hughes, K. Shumon, and Y. ZhangAuthor Index .................................................293


Space-Time Rout<strong>in</strong>g <strong>in</strong> Ad Hoc Networks ⋆Henri Dubois-Ferrière 1 , Matthias Grossglauser 1 , and Mart<strong>in</strong> Vetterli 1,21 School of <strong>Computer</strong> and Communication <strong>Science</strong>s, EPFL, Lausanne, Switzerland{Henri.Dubois-Ferriere,Matthias.Grossglauser,Mart<strong>in</strong>.Vetterli}@epfl.ch2 Department of EECS, University of California Berkeley, USAAbstract. We <strong>in</strong>troduce Space-Time Rout<strong>in</strong>g (STR), a new approachto rout<strong>in</strong>g <strong>in</strong> mobile ad hoc networks. In STR, the age of rout<strong>in</strong>g state isconsidered jo<strong>in</strong>tly with the distance to the dest<strong>in</strong>ation. We give a generaldescription of STR, which can accommodate various temporal (age) andspatial (distance) metrics. Our formulation of STR describes a family ofrout<strong>in</strong>g algorithms, parameterized <strong>by</strong> a choice of node clock scheme, aneighbor-distance function and a b<strong>in</strong>d<strong>in</strong>g spatio-temporal metric whichallows the algorithm to compare potential routes tak<strong>in</strong>g <strong>in</strong>to accountboth their age and their distance to the dest<strong>in</strong>ation. We discuss possible<strong>in</strong>stantiations of a Space-Time Rout<strong>in</strong>g protocol. In particular, we reviewFRESH (FResher Encounter SearcH), a rout<strong>in</strong>g algorithm us<strong>in</strong>g temporal<strong>in</strong>formation only, and GREP (Generalized Route EstablishmentProtocol), a rout<strong>in</strong>g protocol which uses jo<strong>in</strong>tly spatial and temporal <strong>in</strong>formationabout routes. We discuss a third STR algorithm us<strong>in</strong>g onlyphysical notions of space and time, and f<strong>in</strong>ally show that STR providesloop-free routes.1 IntroductionAn ad hoc network is a communication medium where users or nodes also providethe <strong>in</strong>frastructure for communication. That is, nodes play both the role ofterm<strong>in</strong>als (i.e. source and dest<strong>in</strong>ation of messages) and of relays. Thus, a messagetraverses an ad hoc network <strong>by</strong> be<strong>in</strong>g relayed from node to node, until itreaches its dest<strong>in</strong>ation. When, <strong>in</strong> addition, nodes are mov<strong>in</strong>g, this becomes achalleng<strong>in</strong>g task, s<strong>in</strong>ce the topology of the network is <strong>in</strong> constant flux. How tof<strong>in</strong>d a dest<strong>in</strong>ation, how to route to that dest<strong>in</strong>ation, and how to <strong>in</strong>sure robustcommunication <strong>in</strong> the face of constant topology change are major challenges <strong>in</strong>mobile ad hoc networks.Rout<strong>in</strong>g <strong>in</strong> ad hoc networks is a well studied topic, with a number of proposedprotocols like AODV [1] and DSR [2], as well as simulation studies. A commonpo<strong>in</strong>t of exist<strong>in</strong>g algorithms is that their computations <strong>in</strong>volve almost exclusivelydistance (or spatial) types of <strong>in</strong>formation. This approach can be traced all theway back to the classic Dijkstra, Bellman-Ford, and Floyd-Warshall algorithms,which are driven <strong>by</strong> quantities measur<strong>in</strong>g distances 1 between nodes.⋆ The work presented <strong>in</strong> this paper was supported (<strong>in</strong> part) <strong>by</strong> the National CompetenceCenter <strong>in</strong> Research on Mobile Information and Communication Systems(NCCR-MICS), a center supported <strong>by</strong> the Swiss National <strong>Science</strong> Foundation undergrant number 5005-673221 equivalently, transmission costs.S. Pierre, M. Barbeau, and E. Kranakis (Eds.): ADHOC-NOW 2003, LNCS <strong>2865</strong>, pp. 1–11, 2003.c○ Spr<strong>in</strong>ger-Verlag Berl<strong>in</strong> Heidelberg 2003


2 H. Dubois-Ferrière, M. Grossglauser, and M. VetterliHowever these spatial rout<strong>in</strong>g algorithms were designed with an assumptionof static or near-static topologies, where nodes do not move and l<strong>in</strong>ks change ata slow rate (if at all). In previous work [3], we considered the situation where allnodes are constantly mov<strong>in</strong>g, mak<strong>in</strong>g therefore topology change the norm ratherthan the exception. In such a scenario, we showed that a rout<strong>in</strong>g algorithm thatwas driven exclusively <strong>by</strong> temporal metrics could significantly outperform spatialapproaches. Specifically, we <strong>in</strong>troduced an algorithm named FRESH (FResherEncounter SearcH). Us<strong>in</strong>g a simple flood-based search primitive, FRESH advancestoward the dest<strong>in</strong>ation <strong>by</strong> search<strong>in</strong>g iteratively for a node which hasencountered the dest<strong>in</strong>ation more recently than the current node.FRESH took the extreme approach of us<strong>in</strong>g only temporal <strong>in</strong>formation <strong>in</strong>order to demonstrate the value of such <strong>in</strong>formation for rout<strong>in</strong>g <strong>in</strong> highly mobilead hoc networks. However it is clear that spatial <strong>in</strong>formation can still be useful,and that ignor<strong>in</strong>g spatial state that exists <strong>in</strong> the network is highly suboptimal.Now, given that temporal <strong>in</strong>formation can <strong>in</strong>crease rout<strong>in</strong>g efficiency, and thatspatial <strong>in</strong>formation rema<strong>in</strong>s useful, the question is: Are spatial and temporalapproaches <strong>in</strong>compatible and dist<strong>in</strong>ct, or can we design rout<strong>in</strong>g algorithms which<strong>in</strong>corporate seamlessly both aspects?The purpose of this paper is to answer the above question <strong>by</strong> <strong>in</strong>troduc<strong>in</strong>g aunify<strong>in</strong>g view of rout<strong>in</strong>g <strong>in</strong> highly mobile networks us<strong>in</strong>g jo<strong>in</strong>tly both temporaland spatial <strong>in</strong>formation. We call such an approach Space-Time Rout<strong>in</strong>g (STR).The central <strong>in</strong>tuition underly<strong>in</strong>g STR is the follow<strong>in</strong>g. When the rate oftopology change <strong>in</strong>creases, the average time dur<strong>in</strong>g which spatial <strong>in</strong>formationrema<strong>in</strong>s exact is reduced. For example, a rout<strong>in</strong>g entry say<strong>in</strong>g that the dest<strong>in</strong>ationis reachable from node S <strong>in</strong> 8 hops through neighbor N becomes <strong>in</strong>exact ifN moves, or if <strong>in</strong>termediate nodes move such that the number of hops is differentthan 8. However, even if the rout<strong>in</strong>g entry is not perfectly accurate anymore, itcan still be helpful. In other words: aged, <strong>in</strong>exact rout<strong>in</strong>g state is valuable, and<strong>in</strong>corporat<strong>in</strong>g temporal <strong>in</strong>formation about the age of routes allows the algorithmto make full use of all available <strong>in</strong>formation, <strong>in</strong>clud<strong>in</strong>g partially outdated routes.This can be contrasted with spatial-only approaches which are predicated onrout<strong>in</strong>g state be<strong>in</strong>g exact (s<strong>in</strong>ce they have no way of ‘weigh<strong>in</strong>g’ the accuracy ofaged state). As a result, when spatial algorithms (conceived for mostly-staticgraphs) are transposed to mobile ad hoc rout<strong>in</strong>g protocols, the protocols mustbe very aggressive <strong>in</strong> tim<strong>in</strong>g out state <strong>in</strong> order to avoid as far as possible hav<strong>in</strong>goutdated routes which the protocols are not equipped to handle. For examplethe default route timeout <strong>in</strong> AODV [1] is 3 seconds.Just as spatial rout<strong>in</strong>g algorithms can use different distance metrics, STR isamenable to various spatial, temporal, and jo<strong>in</strong>t spatio-temporal metrics. Specifically,a particular STR algorithm is def<strong>in</strong>ed <strong>by</strong> the choice of– physical or logical notion of time,– a spatial neighbor-distance function △, and– a b<strong>in</strong>d<strong>in</strong>g spatio-temporal (S-T) metric f.Therefore we provide a general formulation of STR which is <strong>in</strong>dependent ofthe specific metric choices. The neighbor-distance metric can be logical (e.g.,


Space-Time Rout<strong>in</strong>g <strong>in</strong> Ad Hoc Networks 3number of hops) or physical (e.g., euclidean distance, energy cost). The b<strong>in</strong>d<strong>in</strong>gS-T metric is used to compare two route entries to a dest<strong>in</strong>ation of differentdistance and age and to decide which is closest <strong>in</strong> the jo<strong>in</strong>t spatio-temporalspace.The rest of the paper is organized as follows. In Section 2, we give a generalformulation of STR and discuss some properties. In Section 3, we give examplesof two specific STR algorithms: FRESH, GREP, and outl<strong>in</strong>e a third algorithmus<strong>in</strong>g physical notions of space and time. In Section 4, we discuss some propertiesof STR, <strong>in</strong>clud<strong>in</strong>g loop-freedom. Section 5 concludes the paper.2 Space-Time Rout<strong>in</strong>g2.1 Notation and AssumptionsWe note V = {1 ...n} the set of nodes <strong>in</strong> the network, and E the set of edges(i, j) ∈ E for i, j ∈ V . Associated with the set of edges is a distance function 2△ : E → R. For example if distance is counted as the number of hops, wewould have △(i, j) = 1. We assume that any node can obta<strong>in</strong> the distance toits neighbors (trivially <strong>in</strong> the case of hop-count distance, or for example us<strong>in</strong>g asignal-strength based estimation <strong>in</strong> the case of euclidean distances). Each nodema<strong>in</strong>ta<strong>in</strong>s its own clock, which is used to stamp every packet with the clock timeof the node which orig<strong>in</strong>ates it. Simple examples of a node clock are a physical(oscillator-based) clock giv<strong>in</strong>g a cont<strong>in</strong>uous read<strong>in</strong>g, for example <strong>in</strong> seconds, ora logical clock provid<strong>in</strong>g a discrete order<strong>in</strong>g of rout<strong>in</strong>g events relative to thatsource. Whichever temporal representation is used, STR does not require anyform of <strong>in</strong>ter-node clock synchronization.Then STR requires a b<strong>in</strong>d<strong>in</strong>g spatio-temporal metric, which is a functionf : R 2 → R, tak<strong>in</strong>g as <strong>in</strong>put a (spatial) distance value and a (temporal) clockvalue and return<strong>in</strong>g a scalar represent<strong>in</strong>g the “norm” of this pair <strong>in</strong> the spatiotemporalspace. The b<strong>in</strong>d<strong>in</strong>g S-T metric must satisfy the follow<strong>in</strong>g conditions:argm<strong>in</strong>f(s, t) =(0, 0) (1)For fixed d, f is an <strong>in</strong>creas<strong>in</strong>g function of tsgn(f(d, t 1 ) − f(d, t 2 )) = sgn(t 1 − t 2 ) (2)For fixed t, f is an <strong>in</strong>creas<strong>in</strong>g function of dsgn(f(d 1 ,t) − f(d 2 ,t)) = sgn(d 1 − d 2 ) (3)Rout<strong>in</strong>g Table Entries. Each node ma<strong>in</strong>ta<strong>in</strong>s a distance-vector rout<strong>in</strong>g tableconta<strong>in</strong><strong>in</strong>g one entry for each dest<strong>in</strong>ation node. In addition to the next hop anddistance fields which are used <strong>in</strong> spatial rout<strong>in</strong>g algorithms, STR rout<strong>in</strong>g entriesalso <strong>in</strong>clude the age of the entry.2 Note that given node mobility, E and △ vary over time. For simplicity of notationwe drop the time <strong>in</strong>dex s<strong>in</strong>ce we only refer to the values of E and △ “at the presenttime”.


4 H. Dubois-Ferrière, M. Grossglauser, and M. VetterliTable 1. Rout<strong>in</strong>g table entries.n N D Next hop to node D <strong>in</strong> N’s rout<strong>in</strong>g table.d N D Distance to node D <strong>in</strong> N’s rout<strong>in</strong>g table.Source Time of the rout<strong>in</strong>g entry to D <strong>in</strong> N’s rout<strong>in</strong>g table.t N DTable 1 summarizes the notation used to describe rout<strong>in</strong>g state at each node.We drop the superscript and use the notation n D ,d D ,t D when the context allowsdo<strong>in</strong>g this unambguously. We use the convention that when a node has no entryfor D, n D = null, d D = ∞, and t D = ∞.Packet Types. Beside regular data packets, STR uses route request (RREQ)and route reply (RREP) packets. A node sends a RREQ packet when it has noroute to the dest<strong>in</strong>ation, or if the next hop along the route is broken. It sends aRREP packet <strong>in</strong> reply to a route request when it has a route fresh enough andshort enough to satisfy that request. Note that STR does not use any route errorpackets: s<strong>in</strong>ce l<strong>in</strong>k breaks are always repaired locally, there is no need to <strong>in</strong>formthe source and upstream nodes when this occurs.Apart from the usual source and dest<strong>in</strong>ation addresses of a packet, we <strong>in</strong>troducethe follow<strong>in</strong>g STR-specific fields: The source time ofapacket(p.st) isthe clock time at the packet’s source node when it orig<strong>in</strong>ated the packet. Eachpacket is stamped with the clock time of the source that orig<strong>in</strong>ates it. This fieldis present <strong>in</strong> all packets.The source distance ofapacket(p.sd) is the distance this packet has traverseds<strong>in</strong>ce leav<strong>in</strong>g the source. It is updated at each hop to reflect the new distancefrom the source. This field is present <strong>in</strong> all packets.The dest<strong>in</strong>ation distance (p.dd) and dest<strong>in</strong>ation time (p.dt) ofapacketarepresent only <strong>in</strong> RREQ and RREP packets. In the case of a RREQ packet, theycome from the rout<strong>in</strong>g entry that the source of the RREQ has to the requesteddest<strong>in</strong>ation. In the case of a RREP packet, they represent the distance to therequested dest<strong>in</strong>ation from the reply<strong>in</strong>g node.2.2 STR AlgorithmDATA Process<strong>in</strong>g. We first describe orig<strong>in</strong>at<strong>in</strong>g and forward<strong>in</strong>g of data packets.A node S orig<strong>in</strong>at<strong>in</strong>g a data packet <strong>in</strong>itializes the source distance field to 0and <strong>in</strong>itializes the source time field to the present value of its clock. A node Nreceiv<strong>in</strong>g from neighbor M a packet orig<strong>in</strong>ated <strong>by</strong> node S first <strong>in</strong>crements thesource distance field of the packet to reflect the distance that the packet has nowtraversed: p.sd ← p.sd + △(N,M).Then, if the packet has come over a shorter (<strong>in</strong> the spatio-temporal metricspace) route than the route it currently has, N updates its rout<strong>in</strong>g entry to S.Formally, if f(p.sd, p.st)


Space-Time Rout<strong>in</strong>g <strong>in</strong> Ad Hoc Networks 5If n D = null, or if forward<strong>in</strong>g fails, N buffers the packet and <strong>in</strong>itiates a routerequest procedure.RREQ Process<strong>in</strong>g. AnodeN <strong>in</strong>itiat<strong>in</strong>g a route request procedure for dest<strong>in</strong>ationD sets the source distance and source time fields as for a DATA packet.The dest<strong>in</strong>ation distance and dest<strong>in</strong>ation time fields on the packet are set respectivelywith the values d D and t D from N’s rout<strong>in</strong>g table (with a suitableencod<strong>in</strong>g when d D = ∞ and t D = ∞).AnodeN receiv<strong>in</strong>g from neighbor M a RREQ packet orig<strong>in</strong>ated <strong>by</strong> S <strong>in</strong>crementsthe source distance of the packet and (possibly) updates its rout<strong>in</strong>g entryfor S accord<strong>in</strong>g to the same procedure as for a DATA packet. N then verifies ifthe spatio-temporal distance of its rout<strong>in</strong>g entry to D is smaller than the sum ofS’s spatio-temporal distance to D and the distance traveled <strong>by</strong> the packet, andorig<strong>in</strong>ates a RREP to M if this is true.Formally, if f(d D ,t D )


6 H. Dubois-Ferrière, M. Grossglauser, and M. Vetterliwill be scoped us<strong>in</strong>g a TTL mechanism, and will likely proceed accord<strong>in</strong>g to anexpand<strong>in</strong>g r<strong>in</strong>g search. Expand<strong>in</strong>g r<strong>in</strong>g searches are used <strong>in</strong> many ad hoc rout<strong>in</strong>gprotocols; the specifics of this procedure are omitted here. We refer to [4] as anexample of a complete, practical STR protocol formulation.A f<strong>in</strong>al example relates to proactive operation of STR. The formulation givenhere is purely reactive, mean<strong>in</strong>g that a route is only computed when it is requiredto send packets. However STR can also accommodate proactive, or hybrid proactive/reactiveoperation, where<strong>by</strong> nodes proactively <strong>in</strong>form other nodes of someor all of rout<strong>in</strong>g entries. This is done us<strong>in</strong>g route advertisement packets, and aroute update decision mechanism similar to that used when receiv<strong>in</strong>g a regularpacket: if an advertised route is shorter <strong>in</strong> the S-T space than the one <strong>in</strong> thereceiv<strong>in</strong>g node’s rout<strong>in</strong>g table, then it overrides the exist<strong>in</strong>g route. We refer to[4] for a simple example of route advertisement operation <strong>in</strong> a STR protocol.Many schemes for controll<strong>in</strong>g the proactive dissem<strong>in</strong>ation of rout<strong>in</strong>g <strong>in</strong>formationare possible. For example, [5] explore schemes to adjust the relative amount ofreactive and proactive overhead. With STR another possibility would be to def<strong>in</strong>ea threshold value ω such that a node N proactively dissem<strong>in</strong>ates only therout<strong>in</strong>g entries which satisfy f(d D ,t D ) 0. The second consequence is that the function fneed not be explicitly def<strong>in</strong>ed. For example, <strong>in</strong> the case of the GREP protocol(see Sect. 3), the ‘natural’ presentation does not def<strong>in</strong>e f explicitly, though ofcourse a function f result<strong>in</strong>g <strong>in</strong> the equivalent order<strong>in</strong>g can be def<strong>in</strong>ed.3 Three Instances of STRWe now give three <strong>in</strong>stances of specific STR algorithms which provide a sampleof the wide range of protocols that fit under the STR umbrella.3.1 FRESH: FResher Encounter SearcHFRESH [3] is a simple route discovery algorithm us<strong>in</strong>g exclusively temporal<strong>in</strong>formation. Nodes keep a record of their most recent encounter times withother nodes. Instead of search<strong>in</strong>g for the dest<strong>in</strong>ation, the source node searchesfor any <strong>in</strong>termediate node that encountered the dest<strong>in</strong>ation more recently thandid the source node itself. The <strong>in</strong>termediate node then searches for a node thatencountered the dest<strong>in</strong>ation yet more recently, and the procedure iterates untilthe dest<strong>in</strong>ation is reached. Therefore, FRESH replaces the s<strong>in</strong>gle network-wide


Space-Time Rout<strong>in</strong>g <strong>in</strong> Ad Hoc Networks 7search of current proposals with a succession of smaller searches, result<strong>in</strong>g <strong>in</strong> acheaper route discovery.The formulation orig<strong>in</strong>ally employed <strong>in</strong> [3] was a direct algorithmic transpositionof the above description, us<strong>in</strong>g at each iteration of an underly<strong>in</strong>g searchprimitive which roughly corresponded to the flood<strong>in</strong>g and reverse-path setupphase of STR.We now show that FRESH can be expressed as a STR algorithm. First,FRESH uses physical time, so packets are stamped with the clock time of thenode which orig<strong>in</strong>ates them. Second, the spatial distance is measured <strong>in</strong> hops:△ FRESH (i, j) = 1. F<strong>in</strong>ally, the b<strong>in</strong>d<strong>in</strong>g S-T metric ignores all spatial <strong>in</strong>formationand only compares one-hop encounter times:{ ∞ if d>1;f FRESH (d, t) =t if d ≤ 1.We note that the function f FRESH alone, when <strong>in</strong>serted <strong>in</strong>to the STR descriptionof Sect. 2 does not result <strong>in</strong> the exact FRESH algorithm [3]. This wouldrequire dist<strong>in</strong>guish<strong>in</strong>g <strong>in</strong> STR two b<strong>in</strong>d<strong>in</strong>g spatio-temporal metrics, one of which(correspond<strong>in</strong>g to this f FRESH ) to be used <strong>in</strong> decid<strong>in</strong>g whether a node’s routeis suitable to answer a route request, the other to be used <strong>in</strong> decid<strong>in</strong>g whetherto update the reverse-path entry to the source of an <strong>in</strong>com<strong>in</strong>g packet.3.2 GREP: Generalized Route Establishment ProtocolGREP [4] is a complete, practical rout<strong>in</strong>g protocol which demonstrated that aprotocol <strong>in</strong>corporat<strong>in</strong>g both spatial and temporal metrics was not only feasiblebut also highly efficient compared to spatial-only approaches. Though the orig<strong>in</strong>alproposal for GREP predates the general formulation of STR given <strong>in</strong> thispaper, we now show how GREP can be def<strong>in</strong>ed as an <strong>in</strong>stance of STR.First, GREP uses logical clocks, similar to Lamport’s clocks [6]. Each nodema<strong>in</strong>ta<strong>in</strong>s its own <strong>in</strong>teger-valued clock, and <strong>in</strong>crements it each time it transmitsa packet. Packets are stamped with the logical clock time of the node whichorig<strong>in</strong>ates them, and are therefore similar to sequence numbers as used <strong>in</strong> manyrout<strong>in</strong>g protocols [1]. As <strong>in</strong> FRESH, neighbor distances are measured <strong>in</strong> hops:△ GREP (i, j) =1.In the orig<strong>in</strong>al proposal for GREP, the b<strong>in</strong>d<strong>in</strong>g S-T metric was not explicitlycomputed. Rather, the order<strong>in</strong>g between two (s, t) pairs was obta<strong>in</strong>ed as:(s 1 ,t 1 ) < (s 2 ,t 2 )ift 1


8 H. Dubois-Ferrière, M. Grossglauser, and M. Vetterli3.3 STR with Physical Space and TimeOur third example of STR is based on a physical representation of both spatialand temporal distances, and illustrates how a priori knowledge of the mobilityprocess may be exploited <strong>in</strong> design<strong>in</strong>g the b<strong>in</strong>d<strong>in</strong>g metric f.We note X n the euclidean position of node n. Now△ measures euclideandistance between neighbors: △(i, j) =‖X i − X j ‖. Node clocks measure physicaltime as for FRESH.The b<strong>in</strong>d<strong>in</strong>g metric <strong>in</strong> this case has the formf(d, t) =d + cvt α .Note that the unit of v here is [m/s]. One possible choice would be to set v tothe average velocity of nodes, <strong>in</strong> order to have the S-T metric reflect a quantityrelated to the expected present distance to a particular node. A suitable choicefor the parameter α would depend on the mobility process assumed. For example,<strong>in</strong> a waypo<strong>in</strong>t model, nodes traverse a distance which is proportional to timeelapsed, which would <strong>in</strong>dicate the choice α = 1. Or with a random walk, onemay choose α =1/2, s<strong>in</strong>ce the time taken to traverse a distance d is O(d 2 ).4 Analysis and PropertiesLoop Freedom. In this section we show that STR is free of rout<strong>in</strong>g loops. Wedist<strong>in</strong>guish between packet loops and route loops. A packet loop happens whena unicast packet traverses the same node twice. A route loop happens when aunicast packet traverses the same node twice, and the rout<strong>in</strong>g state perta<strong>in</strong><strong>in</strong>g tothe packet’s dest<strong>in</strong>ation at that node does not change between both traversals. Aroute loop is potentially <strong>in</strong>f<strong>in</strong>ite (unless some mechanism is used to kill packetswhich have traversed more than some number of hops). In other words a packetgets “stuck” <strong>in</strong> a route loop but not <strong>in</strong> a packet loop, s<strong>in</strong>ce the rout<strong>in</strong>g state haschanged when it traverses the same node for the second time.The route loop-free operation of STR comes from a simple observation: Ateach hop, a packet advances to a node which is closer to the dest<strong>in</strong>ation <strong>in</strong> thespatio-temporal metric space.. This can be stated equivalently <strong>in</strong> terms of noderout<strong>in</strong>g tables:Lemma 1. If n N D = M then f(dM D ,tM D )


Space-Time Rout<strong>in</strong>g <strong>in</strong> Ad Hoc Networks 9DDE(2,1)E(2,1)(2,2)S(1,4)ABC(1,3) (1,2) (1,1)DS(1,4)AB(1,3) (2,3)CFig. 1. On the left side: A network with a route from S to D hav<strong>in</strong>g sequence number 1.D has moved, break<strong>in</strong>g the last hop. A packet sent <strong>by</strong> S to D is buffered at C while Csends a route request. On the right side: C’s route request is answered <strong>by</strong> D, result<strong>in</strong>g<strong>in</strong> a new route with sequence number 2. The packet for D buffered at C can now beforwarded back through B, result<strong>in</strong>g <strong>in</strong> a packet loop (S − A − B − C − B − E − D).A packet loop only occurs once; subsequent packets from S to D will be routed <strong>by</strong> Bdirectly to E.On Packet Loops. We have shown above that STR routes are loop-free. Ouranalysis has made the dist<strong>in</strong>ction between packet loops and route loops. Thisdist<strong>in</strong>ction is usually not made <strong>in</strong> the analysis of rout<strong>in</strong>g protocols because theyoften prove loop freedom <strong>by</strong> show<strong>in</strong>g that a packet will not traverse the samenode twice; therefore both packet and route loops are excluded.STR, on the other hand, excludes route loops but does not exclude packetloops. Therefore it offers a weaker guarantee than protocols such as [1] [2] whichestablish routes on an end-to-end basis and require a route to be converged beforesend<strong>in</strong>g packets. This weakened guarantee can been seen as a consequenceof STR’s distributed hop-<strong>by</strong>-hop operation which uses only local repairs without<strong>in</strong>volv<strong>in</strong>g the end-po<strong>in</strong>ts of a route. On the other hand, relax<strong>in</strong>g protocolguarantees to allow packet loops allows an <strong>in</strong>crease <strong>in</strong> efficiency which make thisparticularly worthwhile <strong>in</strong> highly mobile networks.We discuss a small example of a packet loop show<strong>in</strong>g that even when a packetloop does occur, subsequent packets will shortcut the loop and therefore packetloops cannot happen on back-to-back packets. In Fig.1, there is a route from Sto D, which might have been established <strong>by</strong> a packet sent earlier from D to Swith sequence number 1. D has s<strong>in</strong>ce moved and therefore the last hop of thisroute is broken.This example shows an <strong>in</strong>stance of a packet loop s<strong>in</strong>ce the data packet traversesnode B twice. Note that this is not a route loop s<strong>in</strong>ce B’s rout<strong>in</strong>g entry fordest<strong>in</strong>ation D has changed between the first and second traversals, and thereforethe packet does not get “stuck” <strong>in</strong> a loop between B and C. Note also thatsubsequent packets for D will now be forwarded <strong>by</strong> B to E; each <strong>in</strong>stance of apacket loop can only occur once.Exploit<strong>in</strong>g Outdated Rout<strong>in</strong>g State. Most ad hoc rout<strong>in</strong>g protocols attachsome notion of useful lifetime to their rout<strong>in</strong>g state. Typically each route (or <strong>in</strong>dividualrout<strong>in</strong>g entry) is expired when it rema<strong>in</strong>s unused past a certa<strong>in</strong> timeout(3 seconds <strong>in</strong> AODV for example).


10 H. Dubois-Ferrière, M. Grossglauser, and M. VetterliIn GREP rout<strong>in</strong>g state never times out: a rout<strong>in</strong>g entry can only be deletedwhen a newer entry overrides it. This is because a past route, which was oftenacquired at a high flood<strong>in</strong>g cost, can still carry noisy, but useful <strong>in</strong>formationabout the present topology.We consider two simple scenarios to illustrate this. The first scenario isstraightforward and concerns a short-term timescale. Consider a route whichhas been left unused for some time. In this time, one of the nodes <strong>in</strong> the routehas moved. Clearly, tim<strong>in</strong>g out the whole route at this po<strong>in</strong>t would impose acostly re-discovery if the route is needed aga<strong>in</strong>; if we keep all rout<strong>in</strong>g entriesonly a small, local repair is necessary.In the second scenario we consider a long-term timescale, on the order ofthe time required for nodes to traverse the whole area that they <strong>in</strong>habit. One<strong>in</strong>tuition might be that rout<strong>in</strong>g state has no value at this timescale, s<strong>in</strong>ce thecurrent topology has no relationship with the topology at the time when theroute was established. However, this timescale is precisely the one considered <strong>in</strong>FRESH [3] where we have shown that one-hop rout<strong>in</strong>g entries, however old, canbe used to constra<strong>in</strong> new route discoveries and significantly decrease the flood<strong>in</strong>goverhead.Hop-<strong>by</strong>-Hop Rout<strong>in</strong>g. Rout<strong>in</strong>g protocols typically view a route as a consistentend-to-end structure. In this model a route must be set up and converged fromsource to dest<strong>in</strong>ation before data can flow across it. Clearly this is well-suited(and has been proven) to wired networks, where topology changes are rare events.For more dynamic networks, where change is the norm rather than exception,the brittle nature of this model can degrade performance. For example, a s<strong>in</strong>glel<strong>in</strong>k break can br<strong>in</strong>g down an entire route, even when most of the route rema<strong>in</strong>svalid. As networks grow larger and routes get longer, the probability of a l<strong>in</strong>kbreak along a route <strong>in</strong>creases, and the amount of time when a route is availablecorrespond<strong>in</strong>gly goes down. This reduces the overall throughput available to anapplication.GREP does away with the notion of end-to-end routes and views routesas distributed structures which cont<strong>in</strong>uously adapt to change rather than beentirely torn down and rebuild from scratch at each topology change. In thishop-<strong>by</strong>-hop rout<strong>in</strong>g approach a source does not have to stop send<strong>in</strong>g when a l<strong>in</strong>kchanges along the route to the dest<strong>in</strong>ation; <strong>in</strong> fact it is <strong>in</strong> most cases not evenaware that a local repair happened further along the route.We should also note that the exclusive use of local repairs has one drawback,namely this may result <strong>in</strong> suboptimal routes that are longer than the shortestpossible path. Though our simulation results show that this is effect is not severeenough to damage GREP’s performance, we believe that a worthwhile extensionto GREP will allow a node to progressively ‘shorten’ a suboptimal route as asession goes on.5 ConclusionsIn this paper we have <strong>in</strong>troduced a new approach to rout<strong>in</strong>g <strong>in</strong> mobile ad hocnetworks, which we call space-time rout<strong>in</strong>g (STR). This approach uses both


Space-Time Rout<strong>in</strong>g <strong>in</strong> Ad Hoc Networks 11spatial and temporal distance <strong>in</strong>formation to determ<strong>in</strong>e which rout<strong>in</strong>g entries canbe used to advance a packet towards its dest<strong>in</strong>ation; it can be contrasted withexist<strong>in</strong>g protocols, which are grounded <strong>in</strong> the classic Dijkstra or Bellman-Fordalgorithms and use only spatial <strong>in</strong>formation. We have given a general formulationand discussed possible <strong>in</strong>stances of STR, <strong>in</strong>clud<strong>in</strong>g FRESH [3] and GREP [4],and discussed STR properties and loop-freedom.We believe that STR offers many opportunities for future research. One directionof future <strong>in</strong>vestigation consists <strong>in</strong> explor<strong>in</strong>g other STR <strong>in</strong>stances, such asthose outl<strong>in</strong>ed <strong>in</strong> Sect. 3.3. Another concerns the design of schemes to allow progressiveoptimization of routes computed <strong>by</strong> STR, s<strong>in</strong>ce STR may provide routesof suboptimal length. F<strong>in</strong>ally, we will consider STR <strong>in</strong> context where topologychange occurs as a result of dynamics other than node mobility. For example,nodes <strong>in</strong> a sensor network usually have static positions, but topology may bedynamic as a result of duty cycl<strong>in</strong>g.References1. Perk<strong>in</strong>s, C.E., Beld<strong>in</strong>g-Royer, E.M., Das, S.R.: Ad hoc on demand distance vector(aodv) rout<strong>in</strong>g. IETF, Internet-Draft (2003)2. Johnson, D.B., Maltz, D.A., Hu, Y.C., Jetcheva, J.G.: The dynamic source rout<strong>in</strong>gprotocol for mobile ad hoc networks (dsr). IETF, Internet-Draft (2003)3. Dubois-Ferriere, H., Grossglauser, M., Vetterli, M.: Age matters: Efficient routediscovery <strong>in</strong> mobile ad hoc networks us<strong>in</strong>g last encounter ages. In: Proceed<strong>in</strong>gsof The Fourth ACM International Symposium on Mobile Ad Hoc Network<strong>in</strong>g andComput<strong>in</strong>g, Annapolis, MD (2003)4. Dubois-Ferriere, H., Grossglauser, M., Vetterli, M.: Generalized route establishmentprotocol (grep): Proof of loop-free operation. In: EPFL Technical ReportIC/2003/40. (2003)5. Boppana, R.V., Konduru, S.: An adaptive distance vector rout<strong>in</strong>g algorithm formobile, ad hoc networks. In: Proceed<strong>in</strong>gs of the Twentieth Annual Jo<strong>in</strong>t Conferenceof the IEEE <strong>Computer</strong> and communications Societies. (2001) 1753–17626. Lamport, L.: Time, clocks and the order<strong>in</strong>g of events <strong>in</strong> a distributed system. In:Communications of the ACM. (1978)


SAFAR: An Adaptive Bandwidth-EfficientRout<strong>in</strong>g Protocol for Mobile Ad Hoc NetworksJigar Doshi and Prahlad KilambiSri Venkateswara College of Eng<strong>in</strong>eer<strong>in</strong>gUniversity of MadrasPennalur, Sriperumbudur 602 105jigar@doshi.com, prahlad@acm.orgAbstract. A mobile ad hoc network suffers from the same cost constra<strong>in</strong>tsas most wireless networks. In particular bandwidth constra<strong>in</strong>tsof wireless l<strong>in</strong>ks are severe. We present a scalable adaptive fitness-basedrout<strong>in</strong>g protocol, SAFAR, for mobile ad hoc networks <strong>in</strong> which we tryto optimize the usage of this bandwidth at every stage. The protocol ishybrid, i.e. it makes use of both proactive and reactive procedures forrout<strong>in</strong>g <strong>in</strong> an attempt to reduce route acquisition latency. Us<strong>in</strong>g a fitnessfunction, a node decides how many other nodes can be proactivelyma<strong>in</strong>ta<strong>in</strong>ed <strong>by</strong> it. Each node tries to know the best(most fit) nodes <strong>in</strong>its neighborhood. Hence, high bandwidth nodes are well known. Mostof the traffic is routed through these nodes and hence performance isoptimized. We present simulation results to substantiate the protocolsperformance. We also extend this protocol to show how it can be usedfor power aware rout<strong>in</strong>g.Keywords: MANETs, Hybrid, Adaptive, Fitness.1 IntroductionMobile Ad hoc Networks (MANETs) are multi-hop wireless <strong>in</strong>frastructure lessnetworks. All nodes are capable of movement and can be connected dynamically<strong>in</strong> an arbitrary manner. Nodes <strong>in</strong> these networks function as routers that discoverand ma<strong>in</strong>ta<strong>in</strong> routes to other nodes <strong>in</strong> the network. Applications of ad-hocnetworks have been widely studied and they f<strong>in</strong>d extensive use <strong>in</strong> emergencyservices. Mobile ad hoc network<strong>in</strong>g can support robust and efficient operation<strong>in</strong> mobile wireless networks <strong>by</strong> <strong>in</strong>corporat<strong>in</strong>g rout<strong>in</strong>g functionality <strong>in</strong>to mobilenodes. The topology <strong>in</strong> such networks is dynamic and sometimes rapidly chang<strong>in</strong>g.Therefore a protocol for such a network has to be robust as well as efficient.Mobile networks have many <strong>in</strong>terest<strong>in</strong>g characteristics, which differ from traditionalwired networks as described <strong>in</strong> detail <strong>in</strong> [1]. In particular Wireless l<strong>in</strong>kswill have significantly lower capacity than their hardwired counterparts. Thethroughput of wireless communications has to take <strong>in</strong>to account the effects ofmultiple access, fad<strong>in</strong>g, noise, and <strong>in</strong>terference conditions, etc. Therefore, transmissionrate is bound to suffer [1]. One effect of the relatively low to moderatel<strong>in</strong>k capacities is that congestion is typically the norm rather than the exception.S. Pierre, M. Barbeau, and E. Kranakis (Eds.): ADHOC-NOW 2003, LNCS <strong>2865</strong>, pp. 12–24, 2003.c○ Spr<strong>in</strong>ger-Verlag Berl<strong>in</strong> Heidelberg 2003


SAFAR: An Adaptive Bandwidth-Efficient Rout<strong>in</strong>g Protocol 13Exist<strong>in</strong>g rout<strong>in</strong>g protocols can be classified <strong>in</strong>to two - proactive rout<strong>in</strong>g protocolsand reactive rout<strong>in</strong>g protocols. Proactive rout<strong>in</strong>g protocols <strong>in</strong> general havenot been favored <strong>in</strong> ad hoc networks because of the volume of rout<strong>in</strong>g <strong>in</strong>formationexchange (overhead) <strong>in</strong> a volatile environment. Proactive protocols suchas [2] are limited <strong>in</strong> their application <strong>by</strong> this overhead. Reactive protocols on theother hand, aim to solve this problem <strong>by</strong> discover<strong>in</strong>g routes as and when necessary<strong>in</strong> an on-demand fashion. However these suffer from high route acquisitionlatencies Data packets have to wait while a route to the dest<strong>in</strong>ation is found.Reactive protocols such as [3,4], and [5] also cause excessive network traffic whenthe number of routes required is more. A few hybrid protocols like [6] which, tryto comb<strong>in</strong>e the best of both worlds, have also been proposed. But all of them arehomogenous <strong>in</strong> their view of an ad hoc network. Nodes of vary<strong>in</strong>g bandwidth andpower characterize ad hoc networks [1] and these parameters themselves varyover time. Bandwidth, hence, becomes a prime factor of optimization for an adhoc rout<strong>in</strong>g protocol. They do not take <strong>in</strong>to account this diversity <strong>in</strong> bandwidthand power capacity.We present a hybrid protocol, Scalable Adaptive Fitness-based Ad hoc Rout<strong>in</strong>g(SAFAR), which ma<strong>in</strong>ta<strong>in</strong>s a restricted active view of the surround<strong>in</strong>gs anduses route discovery for nodes, which are not <strong>in</strong> the active rout<strong>in</strong>g neighborhood.SAFAR is essentially a hybrid protocol, which routes based on the concept of‘node fitness’. Each node is assigned a fitness value, which can be its bandwidth,power or a cost metric (like the weighted average of the bandwidth and power).The protocol then uses the node’s fitness to decide its role <strong>in</strong> rout<strong>in</strong>g and the extentof its proactive nature. Thus the protocol can dynamically adjust to networkcharacteristics. As the node’s fitness changes so does its role <strong>in</strong> rout<strong>in</strong>g.2 Related WorkThere have been two ma<strong>in</strong> approaches to hybrid rout<strong>in</strong>g. One approach is touse node election to elect a landmark for a zone. This approach is used <strong>in</strong> [7].The landmarks are then proactively ma<strong>in</strong>ta<strong>in</strong>ed. The other approach <strong>in</strong>volvesform<strong>in</strong>g overlapp<strong>in</strong>g zones like those used <strong>in</strong> [6] with each node ma<strong>in</strong>ta<strong>in</strong><strong>in</strong>g aproactive zone thus distribut<strong>in</strong>g the work of the landmark leader. The disadvantageof the first approach is that the election of the landmark may consumeresources and may have to be repeated as topology changes, thus significantly<strong>in</strong>creas<strong>in</strong>g overhead. In the case of [6], its performance depends on the selectionof the zone radius, which cannot be done dynamically but <strong>in</strong>stead is set <strong>by</strong> someadm<strong>in</strong>istrative means. Unlike [7] our protocol does not use leaders. And unlike [6]our protocol does not use a statically set zone radius. The extent of proactiverout<strong>in</strong>g is wholly dynamic.Many power efficient rout<strong>in</strong>g schemes have been proposed as <strong>in</strong> [8,9]. Howeverthese schemes ma<strong>in</strong>ly optimize transmission power <strong>by</strong> us<strong>in</strong>g longer routes. Suchprotocols are aga<strong>in</strong> not dynamic and cannot be adapted to topologies whereperformance and low latency are the overrid<strong>in</strong>g concerns.[10] <strong>in</strong>troduces an adaptive hybrid protocol. Our protocol is similar to [10]<strong>in</strong> that we dynamically adjust the proactive region of the protocol. However


14 J. Doshi and P. Kilambiour protocol differs from [10] <strong>in</strong> various ways. In [10] the proactive region isuniform depend<strong>in</strong>g on the zone radius. [10] adjusts the zone radius dynamically.In our protocol the zone is not uniform. Each node selectively adds only thebest (most fit) nodes <strong>in</strong> its neighborhood to its proactive region. In [10], theadjustment of the zone is based on an approximation cost model. [10] adjuststhe proactive region <strong>in</strong> order to make a node more accessible. We change theproactive region <strong>in</strong> order to reduce route acquisition latencies. Unlike [10], we usethe concept of FITNESS(a Genetic Algorithm-based technique) to determ<strong>in</strong>e thenode’s participation <strong>in</strong> proactive rout<strong>in</strong>g. This yields a more realistic proactiveregion as it takes <strong>in</strong>to account the chang<strong>in</strong>g environment of a node.This paper is organized as follows. In section 3, we give an overview of theproposed protocol, br<strong>in</strong>g<strong>in</strong>g out its salient features. Section 4 conta<strong>in</strong>s the completefunctional description of the protocol. Section 5 conta<strong>in</strong>s simulation resultswhere we <strong>in</strong>vestigate performance of our protocol and the issues of scalabilityand route acquisition latencies. In section 6 we <strong>in</strong>vestigate adapt<strong>in</strong>g the protocolfor power oriented rout<strong>in</strong>g.3 Overview of SAFAROur protocol uses a fitness-based rout<strong>in</strong>g table buildup scheme. The fitness ofa node is based on node characteristics like power or bandwidth value and canchange over time. We query nodes, which have a “good” idea about its surround<strong>in</strong>gs.This m<strong>in</strong>imizes the overhead to ma<strong>in</strong>ta<strong>in</strong> the routes when comparedto proactive protocols and other hybrid protocols. In comparison to purely reactiveschemes, our protocol reduces route acquisition latency. Exist<strong>in</strong>g protocolsare not adaptive <strong>in</strong> terms of overhead. The disadvantage of a non-adaptive approachis that the diversity of the nodes is completely ignored. A node withlow bandwidth (or power - <strong>in</strong> battery time left) cannot afford the overhead <strong>in</strong>volved<strong>in</strong> hav<strong>in</strong>g actively ma<strong>in</strong>ta<strong>in</strong>ed routes. But a node with good bandwidth,which can afford this, helps boost its own performance as well as that of itsneighborhood. This is an example of an adaptive “overhead” scheme.For rout<strong>in</strong>g we use a two-stage approach with a limited discovery scheme <strong>in</strong>the first stage. There is a very high probability of f<strong>in</strong>d<strong>in</strong>g a route <strong>in</strong> the firststage itself. Thus the overhead of a reactive route discovery stage is avoided. Ifthe route is not found <strong>in</strong> the first stage then we use a route discovery proceduresimilar to the on demand protocols. In our protocol, data is routed be-tween twomobile nodes. We do not explore multicast operation of SAFAR. Each mobilenode ma<strong>in</strong>ta<strong>in</strong>s a rout<strong>in</strong>g table. The rout<strong>in</strong>g table conta<strong>in</strong>s the node’s address,next-hop address, bandwidth (<strong>in</strong> kbps) and power(<strong>in</strong> battery m<strong>in</strong>utes rema<strong>in</strong><strong>in</strong>g).Ancillary <strong>in</strong>formation like neighbor and update lists, required <strong>by</strong> the protocol,need to be ma<strong>in</strong>ta<strong>in</strong>ed separately or as part of the rout<strong>in</strong>g table itself. Eachnode also ma<strong>in</strong>ta<strong>in</strong>s a node heap which is a max heap ma<strong>in</strong>ta<strong>in</strong>ed <strong>in</strong> terms ofa cost value (power or bandwidth). This heap is used dur<strong>in</strong>g the table buildupprocedure expla<strong>in</strong>ed <strong>in</strong> 4.2. Power optimizations will be expla<strong>in</strong>ed <strong>in</strong> section 6.


4 Protocol DetailsSAFAR: An Adaptive Bandwidth-Efficient Rout<strong>in</strong>g Protocol 15The protocol has four ma<strong>in</strong> subdivisions. In section 4.2, we expla<strong>in</strong> the neighbordiscovery mechanism, which leads to the table buildup procedure(Section 4.3).In section 4.4, we describe how rout<strong>in</strong>g is carried out and the route discoveryprocedure. Section 4.5 describes how routes already acquired are ma<strong>in</strong>ta<strong>in</strong>ed.Assumptions:• Every node has <strong>in</strong>formation about its own bandwidth <strong>in</strong> terms of l<strong>in</strong>k capacityfrom the l<strong>in</strong>k layer.• Every node has <strong>in</strong>formation about its own power at any po<strong>in</strong>t of time. This<strong>in</strong>formation is available <strong>in</strong> terms of battery time rema<strong>in</strong><strong>in</strong>g.• All l<strong>in</strong>ks are bi-directional4.1 Fitness FunctionOur protocol uses the concept of fitness function applied extensively <strong>in</strong> [11]. Weuse this because each node exists <strong>in</strong> a diverse environment (nodes have differ<strong>in</strong>gbandwidth and power attributes). Thus, it draws a parallel to genes of differ<strong>in</strong>gfitness value exist<strong>in</strong>g <strong>in</strong> the population of a Genetic Algorithm(GA). GAs usefitness functions to determ<strong>in</strong>e which members from the population are to beselected.The fitness function, is given <strong>by</strong>, F = δ2∆where, δ is node’s cost metric and ∆is average cost metric of surround<strong>in</strong>g network environment. The choice of δ ,canvary <strong>in</strong> a volatile ad hoc environment. In most cases where neither bandwidthnor power is an overbear<strong>in</strong>g concern, the most versatile choice would be theweighted average of bandwidth and power, δ = αB+βPα+βwhere, α, β > 0,Bisthenode’s own bandwidth(<strong>in</strong> kbps) and P is the node’s rema<strong>in</strong><strong>in</strong>g power (<strong>in</strong> batterytime left). But <strong>in</strong> certa<strong>in</strong> cases, when bandwidth(or power) alone may requireoptimum usage,β (or α) could be set to 0. For the rema<strong>in</strong>der of the paper, wedescribe the protocol behavior <strong>in</strong> terms of optimiz<strong>in</strong>g bandwidth alone (α =1and β = 0). The choice of ∆ is obvious and is given <strong>by</strong> ∆ = δ nwhere, n = no.of nodes <strong>in</strong> the immediate vic<strong>in</strong>ity of the current node. A more effective choicefor ∆ might be the average of averages from different environments. This maybe given <strong>by</strong>, ∆ = ∑ N ∆ kk=1 Nwhere, ∆ k is the average of node cost metric δ forenvironment k, and N is the number of environments considered.4.2 Neighbor DiscoveryInitially when a node (say A with bandwidth 1500 kbps) jo<strong>in</strong>s a network (Fig. 1),it sends a hello packet to its neighbors <strong>by</strong> means of a broadcast as it doesnot know their addresses. The hello packet carries A’s address and cost metric(bandwidth)value.A’s neighbors (B, C, D, E, F), on receiv<strong>in</strong>g this hello packet, update theirrout<strong>in</strong>g tables, add<strong>in</strong>g A as a neighbor. They then reply, with a hello reply


16 J. Doshi and P. Kilambipacket that reports their address and bandwidth value.They also have the optionof prevent<strong>in</strong>g A from actively ma<strong>in</strong>ta<strong>in</strong><strong>in</strong>g <strong>in</strong>formation on them us<strong>in</strong>g ablock<strong>in</strong>g bit(expla<strong>in</strong>ed subsequently). For example <strong>in</strong> Fig. 1, node F sets theblock<strong>in</strong>g bit and hence prevents A from query<strong>in</strong>g it although it has high fitness.Node A, now adds all the neighborswho responded <strong>in</strong>to its neighbor listand those with block<strong>in</strong>g bit not set tothe node heap. Now the node beg<strong>in</strong>sthe table buildup procedure. NodeA, for the rema<strong>in</strong>der of its lifetime,keeps poll<strong>in</strong>g its neighborhood withhello messages to stay <strong>in</strong>formed of itsneighbors.Fig. 1. Node A’s immediate neighborhoodon its entry <strong>in</strong>to the networkUse of the Block<strong>in</strong>g bit: This bit maybe set if a node f<strong>in</strong>ds the ratio of rout<strong>in</strong>g<strong>in</strong>formation to data <strong>in</strong>formationexceeds some threshold. This safeguardsthe proactive rout<strong>in</strong>g overheadof the protocol and hence a node with high fitness is prevented from be<strong>in</strong>goverloaded (Node F <strong>in</strong> Fig. 1). The block<strong>in</strong>g bit is also set when the environmentaround that node is volatile.This forces nodes around it to switch over to reactiverout<strong>in</strong>g, which performs better <strong>in</strong> such scenarios. In a stable environment,nodes will be encouraged to use active <strong>in</strong>formation. Thus the protocol adapts tochang<strong>in</strong>g environment characteristics.4.3 Rout<strong>in</strong>g Table BuildupApplication of Fitness functionWe extend the concept of fitness function, discussed earlier, to MANETs. Eachnode uses the fitness function to f<strong>in</strong>d its role <strong>in</strong> the environment and how manynodes it can query. If it has higher fitness, it has to assume a role of facilitatorand allow less fit nodes to communicate. This function F(fitness) is now used toselect the number of nodes to be queried (M) from subsequent hop nodes us<strong>in</strong>gthe formula,M = m<strong>in</strong>(round(F × exp −i2 ×n),n1) (1)where, i is the iteration number (0,1,. . . ,n), n is the sum of number of hop (i+1)nodes to be queried and number of nodes not selected up to i iterations and n1is the number of nodes currently <strong>in</strong> heap. In Fig.2, Node A selects B, C and Ebased on this fitness function as they have sufficiently high bandwidth. It thenstarts the next iteration of the table buildup <strong>by</strong> query<strong>in</strong>g these selected nodes.This is expla<strong>in</strong>ed <strong>in</strong> the next paragraph(Query<strong>in</strong>g Fit nodes). The exponentialfall-off <strong>in</strong> the order of 2 is used because it becomes that much more expensiveto ma<strong>in</strong>ta<strong>in</strong> nodes proactively with <strong>in</strong>creas<strong>in</strong>g hop radius. This is multiplied <strong>by</strong>n, as n is dynamic and varies from hop to hop.Thus the fitness is effectively‘scaled’ [11].


SAFAR: An Adaptive Bandwidth-Efficient Rout<strong>in</strong>g Protocol 17Choice of fitness function: The ratioF(fitness), rema<strong>in</strong>s fairly constantthroughout the table buildup procedure.Hence, it makes for a stable fitnessfunction. The node is likely toquery half the nodes if its bandwidthmatches the average.Query<strong>in</strong>g Fit nodesThis <strong>in</strong>volves query<strong>in</strong>g the selectednodes once the fitness function hasbeen applied. In Fig. 2, Node Aqueries nodes B and C with a sendFig. 2. Node A, relay<strong>in</strong>g a send-table messageto nodes B,C and Etable message. This message is a request to these nodes to return their neighborlists back to the source node A. B and C are added to the proactive list(theproactive field <strong>in</strong> the rout<strong>in</strong>g table is set to true). As illustrated <strong>in</strong> Fig. 2, nodesB, C and E, on receiv<strong>in</strong>g a send table message from node A, generate a transfertable packet which reports address and bandwidth <strong>in</strong>formation of its neighbors(I,J,K,L,M,G,H respectively) back to A. It also adds A to its update list (i.e. theupdate field <strong>in</strong> the rout<strong>in</strong>g table is set to true). This list is expla<strong>in</strong>ed <strong>in</strong> section4.4. Node A, on receiv<strong>in</strong>g a table transfer message, updates its rout<strong>in</strong>g tableand its heap with the newly found nodes (I, J, K, L, M, G and H).These nodeswill be considered <strong>in</strong> the next iteration of fitness function application along withthe rejected nodes from the previous query (D). The node A calculates averagebandwidth aga<strong>in</strong> us<strong>in</strong>g new data <strong>in</strong> its rout<strong>in</strong>g table and recalculates number ofnodes to query. As shown <strong>in</strong> Fig. 3, nodes J and M are selected.It has to be noted that the Mnodes can be chosen from any hopon the basis of maximum bandwidthvalue. Thus the radius of the activeneighborhood is not ma<strong>in</strong>ta<strong>in</strong>ed uniformly.The procedure of query<strong>in</strong>g fitnodes is applied aga<strong>in</strong> on J and M(Fig. 3). At this stage the numberof nodes to query becomes zero andhence the table build-up procedureends.4.4 Rout<strong>in</strong>gFig. 3. Formation of the proactive zoneWhen a node requires a route to the dest<strong>in</strong>ation (say X), it starts a route discoveryprocedure, which follows a two-stage mechanism as given below.Type-1 messag<strong>in</strong>gThe node, <strong>in</strong> need of the route, sends a type-1 message to everyone <strong>in</strong> its proactivelist. If anyone of these queried nodes has a path to the dest<strong>in</strong>ation,it respondswith a Type-1 reply packet. This packet also reports the maximum cost(lowest


18 J. Doshi and P. Kilambibandwidth) l<strong>in</strong>k along the route it has to the dest<strong>in</strong>ation (it would be able tocalculate this from its own rout<strong>in</strong>g table).The first Type-1 reply for the dest<strong>in</strong>ation X, triggers an entry be<strong>in</strong>g addedfor the dest<strong>in</strong>ation <strong>in</strong> the source node’s rout<strong>in</strong>g table with the respond<strong>in</strong>g node’saddress set as the next hop. For subsequent Type-1 replies for the same dest<strong>in</strong>ation,the response with a higher bandwidth is chosen and the rout<strong>in</strong>g tableis updated appropriately. An <strong>in</strong>termediate node, which receives a Type-1 reply,adds an entry for dest<strong>in</strong>ation X to its rout<strong>in</strong>g table before forward<strong>in</strong>g the packetto the source A. In the event of no response from any node(with<strong>in</strong> a timeoutperiod), route discovery proceeds to the next stage, otherwise, it ends here.Type-2 messag<strong>in</strong>g (This is an on demand route discovery, follow<strong>in</strong>g the samepattern as [5] or [6]).When the members of the proactive list do not respond positively, a Type-2request is created. The Type-2 request packet conta<strong>in</strong>s a request-ID, a bandwidthfield and a node list. The source adds its address to this list and broadcasts themessage. This prompts a route discovery among the nodes that receive thismessage. Every <strong>in</strong>termediate node G(say), that receives this message checks thesource-dest<strong>in</strong>ation-request-ID tuple to see if it has already handled this packet.If it has, it discards the packet, otherwise, it adds this tuple to its list. This alsoprevents loop formation.• If G does not have knowledge of X, it adds its own address to the node listof the Type-2 message, compares its bandwidth to the bandwidth field of thepacket and sets the bandwidth field of the packet to the lower of the two values.This helps to ma<strong>in</strong>ta<strong>in</strong> the m<strong>in</strong>imum bandwidth l<strong>in</strong>k along the path so that thesource node can choose the maximum least bandwidth reply <strong>in</strong> case of multipleresponses for dest<strong>in</strong>ation X. This is because the m<strong>in</strong>imum bandwidth along apath is its bottleneck. Node G, now forwards the packet to its neighbors.• If G has knowledge of X, it simply reverses the node list of the Type-2 requestand adds it to the Type-2 reply message that it generates. It also copies thevalue of the bandwidth field from Type-2-request to the reply. It then forwardsthis message to the first node on the node list. The source just adds an entry toits rout<strong>in</strong>g table choos<strong>in</strong>g the least cost route if it has multiple routes.In case there are multiple replies for the same dest<strong>in</strong>ation, the source choosesthe response with the highest value <strong>in</strong> the bandwidth field as expla<strong>in</strong>ed earlier.The source then transmits the data packets based on this entry. In case there isa change <strong>in</strong> the network configuration over this period and the route no longerexists,the node that is not able to f<strong>in</strong>d the dest<strong>in</strong>ation(say Z) <strong>in</strong> its rout<strong>in</strong>g table,upon receipt of the data packet, returns a “route error” message to the source.This is likely to occur if the dest<strong>in</strong>ation leaves the rout<strong>in</strong>g table of Z before thearrival of the data packet but after the type-2 reply has been dispatched.Advantage of the two-stage approach: The probability of f<strong>in</strong>d<strong>in</strong>g the dest<strong>in</strong>ationnode us<strong>in</strong>g a Type-1 message is high as the members of the proactive list havea high bandwidth. Hence, they are likely to be well known to others. Therefore,<strong>in</strong> the average case, the route is likely to be found at the first stage itself. Evenif it is not found at this stage, the overhead is negligible compared to the ga<strong>in</strong>


SAFAR: An Adaptive Bandwidth-Efficient Rout<strong>in</strong>g Protocol 19<strong>in</strong> performance. It has to be noted that although the node exchanges neighbor<strong>in</strong>formation when it is queried dur<strong>in</strong>g the table buildup procedure, it does notexchange the complete rout<strong>in</strong>g table. This is why a Type-1 message is required.Exchang<strong>in</strong>g the complete table would cause problems dur<strong>in</strong>g update because ofcha<strong>in</strong>ed updates. Also, Type-2 relies on source rout<strong>in</strong>g <strong>in</strong> its reply. Hence, therout<strong>in</strong>g overhead is reduced.4.5 Route Ma<strong>in</strong>tenanceProactive region ma<strong>in</strong>tenanceIf a node A leaves the neighborhood of node X, it is removed from both theneighbor list and rout<strong>in</strong>g heap and all entries with A as the next hop are removed.If a node B sends X a send table packet, then X adds B to its update list beforesend<strong>in</strong>g A its neighbor list. In case of any change <strong>in</strong> the immediate topology ofX, i.e. a neighbor be<strong>in</strong>g added or removed, an update message will be sent to allnodes <strong>in</strong> the update list(<strong>in</strong>clud<strong>in</strong>g B). Thus, the proactive routes are ma<strong>in</strong>ta<strong>in</strong>ed.In a mobile scenario, where the topology is bound to change rapidly, nodeswill be cont<strong>in</strong>uously added and deleted from the proactive zone. This presentsa challenge because we take the trouble to dynamically buildup our “proactivezone”. Hence we describe a zone replacement strategy, as follows: The nodeX keeps monitor<strong>in</strong>g the status of its rout<strong>in</strong>g table and the number of nodesproactively ma<strong>in</strong>ta<strong>in</strong>ed. Assume, <strong>in</strong>itially the number of nodes <strong>in</strong> the proactivelist is n. Over time, due to addition and deletion of nodes, n may fall below acerta<strong>in</strong> threshold. In such a case, X deletes nodes from the heap and appliesthe table buildup procedure aga<strong>in</strong> to rebuild its proactive list from scratch. Thisthreshold value is calculated as follows: The node X keeps query<strong>in</strong>g neighborswith hello messages and also updates its lists when it gets an update packet.When the total number of proactively ma<strong>in</strong>ta<strong>in</strong>ed nodes drops below 40% of the<strong>in</strong>itial value, the node may beg<strong>in</strong> the table buildup aga<strong>in</strong>. The threshold can betweaked accord<strong>in</strong>g the environment <strong>in</strong> concern. In a highly mobile environment,the threshold may be decreased because repeatedly apply<strong>in</strong>g the table buildupprocedure will be expensive while <strong>in</strong> an environment which is expected to bestable the threshold value can be <strong>in</strong>creased. The whole buildup procedure isrepeated <strong>in</strong>stead of <strong>in</strong>cremental updates because as all the nodes are mobile, itis assumed that the node will f<strong>in</strong>d itself <strong>in</strong> a totally “alien” environment aftersome time.Handl<strong>in</strong>g Route ErrorsIf a node forward<strong>in</strong>g a data packet f<strong>in</strong>ds out that there is no route to dest<strong>in</strong>ationthen it tries a local route repair. This differs from traditional reactive schemesbecause we resort to the Type-1 discovery mechanism. If the Type-1 discoverydoes not yield a route to the dest<strong>in</strong>ation, we return a route-error message to thesource. In the very unlikely case, that we do not have a route to the source itself,we drop the packet.


20 J. Doshi and P. Kilambi5 SimulationWe simulate SAFAR under vary<strong>in</strong>g conditions of a mobile ad hoc network andshow that it achieves its objectives of be<strong>in</strong>g highly adaptive. We also ev<strong>in</strong>ce howSAFAR routes data packets expeditiously whilst rema<strong>in</strong><strong>in</strong>g bandwidth efficient.The simulator is multi threaded and has been developed <strong>in</strong> C++. The simulatoris, essentially, real time <strong>in</strong> nature and uses preprocess<strong>in</strong>g of mobility <strong>in</strong>formationto relieve some burden off its operation.The number of nodes <strong>in</strong> our simulation has been fixed at 50 to replicate thescenarios <strong>in</strong> [12]. The <strong>in</strong>itial position of nodes is chosen from a uniform randomdistribution over an area of [670mx670m]. The simulation itself runs for a periodof 900 seconds. Every cycle <strong>in</strong> the simulation corresponds to 1/10 second. Thenode movement follows the random way po<strong>in</strong>t model of mobility.The nodes areassumed to be mov<strong>in</strong>g with constant velocity. They move from one locationto another <strong>by</strong> sett<strong>in</strong>g an <strong>in</strong>itial velocity, which is ma<strong>in</strong>ta<strong>in</strong>ed throughout theirmovement. Once they reach this location the mobile host pauses for a randomamount of time before mov<strong>in</strong>g to another dest<strong>in</strong>ation. With<strong>in</strong> the next few timecycles, a change of direction occurs.Each node is assumed to be equipped with a transceiver whose transmissionrange (or radius) T R can be varied. It is assumed that all transmissions with<strong>in</strong>this radius are reliable and have a specified channel error rate. Us<strong>in</strong>g the transmissionradius we calculate the adjacency lists of each node dur<strong>in</strong>g any po<strong>in</strong>t ofthe simulation and store it <strong>in</strong> files, which are accessed <strong>by</strong> the real time simulatorat every clock cycle. Thus <strong>in</strong> each clock cycle a node knows which nodes areadjacent to it without any expensive calculations.A unique number known as node-id identifies each node. Every node differsfrom the other <strong>in</strong> terms of its bandwidth. The nodes are randomly assignedbandwidth values from a distribution that runs very close to the values present<strong>in</strong> actual mobile networks. Other than this, all nodes are homogenous <strong>in</strong> theirfunctional characteristics, i.e. an <strong>in</strong>dividual thread handles every node. Eachthread has data structures private to it, which simulates the node’s <strong>in</strong>ternal datastructures. All nodes also access shared global structures at every time <strong>in</strong>stant tosimulate the channel access and contention characteristics of the MAC layer. Inparticular, the channel may be busy, <strong>in</strong> which case, a node cannot send a messageand has to wait till it becomes free. The lower layers(MAC and physical) havebeen simulated with a packet drop rate of around 5%. Data packets are handleddifferently from other rout<strong>in</strong>g packets. Their size is randomly generated between64 <strong>by</strong>tes and 1024 <strong>by</strong>tes. Each node has sufficient buffer capacity to handle datapackets of vary<strong>in</strong>g sizes.Assumptions:• The l<strong>in</strong>k layer can report vary<strong>in</strong>g bandwidth conditions <strong>in</strong> the environment.• The hello and hello reply packets used are not part of the rout<strong>in</strong>g overhead.This is because these packets are generated, transmitted and received <strong>by</strong> thel<strong>in</strong>k layer. Any change to the bandwidth <strong>in</strong>formation is made through a sharedstructure, which is accessible at a higher layer.


SAFAR: An Adaptive Bandwidth-Efficient Rout<strong>in</strong>g Protocol 21We measure the performance of the SAFAR protocol aga<strong>in</strong>st the follow<strong>in</strong>g performancemetrics:Fig. 4. Number of nodes <strong>in</strong> proactive zonevs Standard deviation of BandwidthSize of the Proactive ZoneS<strong>in</strong>ce the proactive zone is adaptive,the size of the proactive zonevaries accord<strong>in</strong>g to the node’s bandwidthand also its neighborhood. Weshow change <strong>in</strong> average size of theproactive zone of the node with vary<strong>in</strong>gstandard deviations of bandwidthunder fairly constant average bandwidth.The graph (Fig. 4), shows thevariations <strong>in</strong> number of nodes queried<strong>by</strong> a node for proactive ma<strong>in</strong>tenancedur<strong>in</strong>g a simulation run to the standarddeviations of bandwidth. Each node <strong>in</strong> the simulation run is given a differentbandwidth value, with the standard deviation of all 50 nodes be<strong>in</strong>g shown <strong>in</strong> thegraph. The average bandwidth of nodes rema<strong>in</strong>s constant. As shown <strong>in</strong> Fig. 4,it has been found that the maximum number of nodes queried shows a sharp<strong>in</strong>crease with <strong>in</strong>crease <strong>in</strong> standard deviation of bandwidth. This is to be expecteds<strong>in</strong>ce with a larger standard deviation, there will be nodes whose bandwidth isfar greater than its surround<strong>in</strong>gs.Thus the factor F(fitness) <strong>in</strong>creases and it queries more nodes. The averagenumber of nodes rema<strong>in</strong>s fairly constant(as expected), s<strong>in</strong>ce the averagebandwidth is held constant. However, the difference between the average andmaximum value shows a steady <strong>in</strong>crease. This shows that the fitness functionallows adaptive table buildup.Type-1 SuccessThis is a measure of the percentage ofsuccessful routes discovered <strong>in</strong> stage1 of rout<strong>in</strong>g. It is measured aga<strong>in</strong>stbandwidth of the node that <strong>in</strong>itiatesthis node discovery.For analyz<strong>in</strong>g the Type-1 successratio, nodes of different bandwidthvalues are analyzed as theytry to route packets to random dest<strong>in</strong>ations.The percentages of such requeststhat are successful are logged.As seen <strong>in</strong> Fig. 5, the Type-1 successratio <strong>in</strong>creases with the bandwidthas expected. The graph alsoshows that a very high percentage ofdest<strong>in</strong>ations are found with a Type-1Fig. 5. Percentage of Type-1 queries successfulvs Node Bandwidth


22 J. Doshi and P. Kilambiquery itself thus reduc<strong>in</strong>g the need for an expensive Type-2 query mechanismand hence decreas<strong>in</strong>g route acquisition latency.Packet Delivery RatioThis is def<strong>in</strong>ed as the ratio of thenumber of data packets deliveredsuccessfully to the total data packetssent. We have considered thebusy transmission channel condition,which might affect this ratio. The ratiothus, gives us a measure of the reliabilityof a route and is measuredaga<strong>in</strong>st a vary<strong>in</strong>g transmission radius.The percentage of data packetsrouted successfully shows that SA-FAR f<strong>in</strong>ds routes quickly and accurately.The percentage of packetsrouted successfully <strong>in</strong>creases withtransmission range. This is becauseFig. 6. Packet Delivery Ratio vs TransmissionRadiusthere is more probability of loss <strong>in</strong> a route with many hops, as the movement<strong>in</strong>formation might not have been registered.Fig. 7. Route Acquisition Latency vs. BandwidthRoute Acquisition LatencyIt is def<strong>in</strong>ed as the delay between generat<strong>in</strong>ga route query and receiv<strong>in</strong>gthe correspond<strong>in</strong>g reply. Dur<strong>in</strong>g oursimulation, we assume that the process<strong>in</strong>gdelay of messages is negligiblebut take <strong>in</strong>to consideration the delaydue to queu<strong>in</strong>g of messages <strong>in</strong> thetransmission buffer.The route latency graph (Fig. 7)shows, how the latency of discover<strong>in</strong>groutes decreases with <strong>in</strong>creas<strong>in</strong>gbandwidth. This substantiatesthe advantages of SAFAR. By be<strong>in</strong>ghighly adaptive, it allows a highbandwidth node to use its capacityeffectively. It knows more dest<strong>in</strong>ationsand hence can route faster and more effectively. Even if it does not have aroute <strong>in</strong> the rout<strong>in</strong>g table, it can query us<strong>in</strong>g a Type-1 packet, which is sent tomore nodes. Thus, a high bandwidth node need not resort to Type-2 query<strong>in</strong>gwhich slows the protocol down and <strong>in</strong>creases latency. Hence, the average routeacquisition latency drops with <strong>in</strong>creas<strong>in</strong>g bandwidth.


SAFAR: An Adaptive Bandwidth-Efficient Rout<strong>in</strong>g Protocol 236 Optimization of PowerAs mentioned earlier, our protocol can switch over from the bandwidth to thepower doma<strong>in</strong> dur<strong>in</strong>g its operation. In this section, we show that bandwidth andpower are <strong>in</strong>terchangeable.To make SAFAR power centric, the bandwidth field of a node is replacedwith a power field(<strong>in</strong> battery time rema<strong>in</strong><strong>in</strong>g). Us<strong>in</strong>g this, it aga<strong>in</strong> selects nodeswhich will be ‘alive’ for a longer time.Table build-up phase: This is <strong>in</strong> direct correspondence with a high bandwidthnode, s<strong>in</strong>ce a node with higher battery power would be able to susta<strong>in</strong> moredata and rout<strong>in</strong>g traffic. This would also provide relief to nodes with low power,as they would not have to handle requests other than their own traffic. A nodewith low power would not be concerned with route efficiency and latency. S<strong>in</strong>ceit has low power, it would have few nodes <strong>in</strong> the proactive list and hence wouldnot spend too much time with Type-1 query<strong>in</strong>g. Instead, it proceeds directly toType-2 query<strong>in</strong>g which is more likely to yield a route, and also consumes lesspower <strong>in</strong> that node, than a comb<strong>in</strong>ed Type-1 Type-2 mechanism, as it has totransmit more packets which corresponds to more transmission power. Aga<strong>in</strong> ithas to be noted that this is achieved completely dynamically. In case of multipleresponses <strong>in</strong> the power doma<strong>in</strong>, the path hav<strong>in</strong>g the maximum least battery timeis chosen.7 ConclusionIn this paper, we have presented and evaluated a bandwidth adaptive hybrid protocolthat is well suited for operation <strong>in</strong> mobile ad hoc networks. The protocoluses a table build-up procedure whose little overhead is well used <strong>in</strong> the dynamicma<strong>in</strong>tenance of neighbor<strong>in</strong>g nodes on the basis of bandwidth fitness. This alsoleads to reduc<strong>in</strong>g the route acquisition latency and hence reduces rout<strong>in</strong>g overhead.It was also seen that the protocol adapts to vary<strong>in</strong>g high traffic conditions,where<strong>in</strong> a node is given the option of reduc<strong>in</strong>g its traffic <strong>by</strong> prevent<strong>in</strong>g othersfrom us<strong>in</strong>g it. An improvement to the protocol will be <strong>in</strong> us<strong>in</strong>g a hybrid costfactor, which <strong>in</strong>cludes both power and bandwidth <strong>in</strong>stead of one of them purely,mak<strong>in</strong>g it a better estimate of the network’s performance constra<strong>in</strong>t.References1. J Macker, S Corson: “Mobile Ad hoc Network<strong>in</strong>g (MANET): Rout<strong>in</strong>g ProtocolPerformance Issues and Evaluation Considerations”, Internet draft, January ’99.2. Charles E. Perk<strong>in</strong>s and Prav<strong>in</strong> Bhagwat: “Highly dynamic Dest<strong>in</strong>ation-SequencedDistance-Vector rout<strong>in</strong>g (DSDV) for mobile computers”,pages 234-244, In Proceed<strong>in</strong>gsof the SIGCOMM ’94 Conference on Communications Architectures, Protocolsand Applications, August ’94.3. Charles E. Perk<strong>in</strong>s and Elizabeth M. Royer: “Ad Hoc On Demand Distance Vector(AODV) algorithm”, In Proceed<strong>in</strong>gs of WMCSA’99, New Orleans, LA, February’99.


24 J. Doshi and P. Kilambi4. David B. Johnson and David A. Maltz: “Dynamic source rout<strong>in</strong>g <strong>in</strong> Ad hoc wirelessnetworks”, In Mobile Comput<strong>in</strong>g, edited <strong>by</strong> Tomasz Imiel<strong>in</strong>ski and Hank Korth,chapter 5, pages 153-181, Kluwer Academic Publishers, ’96.5. V<strong>in</strong>cent D. Parka and M. Scott Corsonba: “A Highly Adaptive Distributed Rout<strong>in</strong>gAlgorithm for Mobile Wireless Networks-Temporally-Ordered Rout<strong>in</strong>g Algorithm(TORA)”,In Proceed<strong>in</strong>gs of Infocom ’97.6. Zygmunt J. Haas, Marc R. Pearlman: “Zone Rout<strong>in</strong>g Protocol”, Internetdraft,, MARCH ’03.7. Mario Gerla, Xiaoyan Hong, Guangyu Pei: “Landmark Rout<strong>in</strong>g for Large ScaleWireless Ad Hoc Networks with Group Mobility”, In Proceed<strong>in</strong>gs of Mobihoc 2000,Boston, MA, November ’00.8. Suresh S<strong>in</strong>gh, Mike Woo and C S Raghavendra: “Power Aware Rout<strong>in</strong>g <strong>in</strong> MobileAdhoc Networks”, pages 181-190, In Proceed<strong>in</strong>gs of MobiCom’98.9. Javier Gomez, Andrew T. Campbell, Mahmoud Naghsh<strong>in</strong>eh and Chatschik Bisdikian:“Conserv<strong>in</strong>g Transmission Power <strong>in</strong> Wireless ad hoc Networks”, In Proceed<strong>in</strong>gsof IEEE 9th International Conference on Network Protocols, Riverside,California, November ’01.10. Venugopalan Ramasubramaniam, Zygmunt J.Haas and Em<strong>in</strong> Gün Sirer: SHARP:A Hybrid Adaptive Rout<strong>in</strong>g Protocol for Mobile Ad Hoc Networks, pages 303-314,In Proceed<strong>in</strong>gs of Mobihoc ’03.11. David E Goldberg: Genetic Algorithms <strong>in</strong> Search, Optimization and Mach<strong>in</strong>eLearn<strong>in</strong>g, pages 76-80, Pearson Education - 1999.12. David B. Johnson, Josh Broch, David A. Maltz, Yih-Chun Hu, and JorjetaJetcheva: “A performance comparison of Multi-Hop Wireless Ad Hoc NetworkRout<strong>in</strong>g Protocols”, In Proceed<strong>in</strong>gs of MobiCom ’98.


Evaluation of the AODV and DSR Rout<strong>in</strong>gProtocols Us<strong>in</strong>g the MERIT ToolPriya Narayan and Violet R. Syrotiuk ⋆<strong>Computer</strong> <strong>Science</strong> & Eng<strong>in</strong>eer<strong>in</strong>g, Arizona State University, Tempe, AZ 85287-5406Abstract. Select<strong>in</strong>g the most appropriate rout<strong>in</strong>g protocol for a givenset of conditions <strong>in</strong> a mobile ad hoc network (MANET) rema<strong>in</strong>s difficult.While the quantitative performance metrics are helpful <strong>in</strong> the selection,the problem is that the metrics of the protocols under consideration begenerated <strong>by</strong> the same simulator <strong>in</strong> order to be comparable. The MERITframework proposes to compare a rout<strong>in</strong>g protocol to a theoretical optimumrather than to a compet<strong>in</strong>g protocol. The goal is to achieve animplementation <strong>in</strong>dependent, scalable comparison methodology for protocols.In this paper we evaluate the DSR and AODV rout<strong>in</strong>g protocols <strong>in</strong>the MERIT tool. Our results agree with performance studies compar<strong>in</strong>gthese two protocols, validat<strong>in</strong>g the MERIT methodology.1 IntroductionRout<strong>in</strong>g is a fundamental problem <strong>in</strong> mobile ad hoc networks (MANETs). Whatcontributes to the difficulty of the problem is that a MANET is a collection ofmobile wireless nodes with no support<strong>in</strong>g <strong>in</strong>frastructure. As a result, rout<strong>in</strong>g<strong>in</strong>formation must be computed <strong>in</strong> a distributed manner that is responsive to thecont<strong>in</strong>uously chang<strong>in</strong>g topology <strong>in</strong>duced <strong>by</strong> node mobility.Over the past few decades, a considerable number of rout<strong>in</strong>g protocols havebeen proposed for MANETs (also called packet radio networks or multi-hopnetworks <strong>in</strong> earlier work). More recently, more than a dozen protocols have beendocumented <strong>in</strong> the form of Internet-Drafts <strong>in</strong> the Internet Eng<strong>in</strong>eer<strong>in</strong>g TaskForce (IETF) MANET work<strong>in</strong>g group [13]. Given the large choice of protocols,each with its own strengths, it rema<strong>in</strong>s a difficult problem to select the one mostappropriate for a given set of network conditions.Rout<strong>in</strong>g protocols for MANETs are traditionally evaluated <strong>by</strong> simulations<strong>in</strong>ce few testbeds exist. There is general consensus on the quantitative metricsto use for compar<strong>in</strong>g protocols, namely end-to-end throughput and delay,route acquisition time, percentage of out-of-order delivery, and the efficiency ofthe protocol <strong>in</strong> terms of control traffic overhead [4]. It has been shown that theresults from different simulation platforms cannot be directly compared. Specifically,factors such as the implementation of the physical layer not only affectthe absolute performance of a rout<strong>in</strong>g protocol, it can change the relative rank<strong>in</strong>gamong protocols for the same scenario because its impact on the differentprotocols is not uniform [18].⋆ This work was supported <strong>in</strong> part <strong>by</strong> NSF grant ANI-0220001.S. Pierre, M. Barbeau, and E. Kranakis (Eds.): ADHOC-NOW 2003, LNCS <strong>2865</strong>, pp. 25–36, 2003.c○ Spr<strong>in</strong>ger-Verlag Berl<strong>in</strong> Heidelberg 2003


26 P. Narayan and V.R. SyrotiukThe MERIT framework [6,7] takes a new approach to rout<strong>in</strong>g protocol assessmentfor MANETs. In MERIT a protocol is compared to a theoretical optimumrather than to a compet<strong>in</strong>g protocol. In particular, the measure proposed is theMERIT ratio, the mean ratio of the cost of the route actually used <strong>by</strong> the protocolto the cost of the optimal mobile path under the same network history.S<strong>in</strong>ce we take a ratio, we believe that some of the dependencies on the simulatorcancel out, yield<strong>in</strong>g an implementation <strong>in</strong>dependent measure. The MERIT spectrumis the ratio taken as a function of some network parameter, such as thenode velocity. MERIT is a scalable comparison methodology, s<strong>in</strong>ce the MERITspectra for a protocol are computed once and then can be compared to spectraof other protocols directly, rather than requir<strong>in</strong>g that protocols of <strong>in</strong>terest beported to the same simulator.The def<strong>in</strong>itions and theoretical foundations of the MERIT framework werelaid out <strong>in</strong> [6]. In this paper, we focus on the implementation of MERIT <strong>in</strong> thens-2 network simulator [14] and perform an evaluation of two well establishedMANET rout<strong>in</strong>g protocols. Specifically, we present MERIT spectra for the DynamicSource Rout<strong>in</strong>g (DSR) [11] and the Ad hoc On Demand Distance Vector(AODV) [16] rout<strong>in</strong>g protocols for several network parameters.The rema<strong>in</strong>der of this paper is organized as follows. In Section 2 we overviewthe MERIT framework as well as the DSR and AODV rout<strong>in</strong>g protocols. Section3 details the MERIT tool, the implementation of the MERIT framework,describ<strong>in</strong>g the generation of a mobile graph <strong>in</strong> ns-2. We also describe how weextract the actual routes for each of DSR and AODV and use them to computea MERIT ratio for a given run. We then use the MERIT tool to produce spectrafor various parameters. These results are presented and discussed <strong>in</strong> Section 4.Conclusions and ongo<strong>in</strong>g work are given <strong>in</strong> Section 5.2 Overview2.1 Overview of the MERIT FrameworkS<strong>in</strong>ce a MANET is a mobile network, MERIT models the history of networktopology changes over some time scale T <strong>by</strong> a sequence of graphs. A mobilegraph G = G 1 G 2 ...G T is def<strong>in</strong>ed as any sequence G i ,i =1,...,T, of graphswhere the vertices of G i correspond to the nodes <strong>in</strong> the network, and its edgescorrespond to communication l<strong>in</strong>ks between nodes. Similar models with the goalto capture dynamics <strong>in</strong> graphs <strong>in</strong>clude [1,8,12].Given a mobile graph, a mobile path between a source-dest<strong>in</strong>ation pair is def<strong>in</strong>edas a path sequence P = P 1 P 2 ...P T where P i is a path <strong>in</strong> the correspond<strong>in</strong>gG i between the same source-dest<strong>in</strong>ation pair.It is assumed that a cost model, expressed as a weight function on edges,underlies each graph. The weight function w i (u, v) for graph G i is a function ofvertex pairs (u, v) such that{ m(u, v) if edge (u, v) exists <strong>in</strong> Giw i (u, v) =(1)∞ if edge (u, v) does not exist <strong>in</strong> G iwhere m(u, v) is the value of the l<strong>in</strong>k metric on the edge (u, v).


Evaluation of the AODV and DSR Rout<strong>in</strong>g Protocols 27The weight of a path P i <strong>in</strong> G i is denoted <strong>by</strong> w i (P i ). For additive path metrics,it is the sum of the l<strong>in</strong>k weights along the edges of the path. The weight of amobile path <strong>in</strong>cludes the <strong>in</strong>dividual weights of each path <strong>in</strong> the sequence, and atransition cost c trans that represents the overhead <strong>in</strong>curred <strong>by</strong> the protocol torespond to a topology change. Thus, the weight of a mobile path P <strong>in</strong> G, denoted<strong>by</strong> w(P), is def<strong>in</strong>ed asw(P) =T∑i=1T∑−1w i (P i )+ c trans (P i ,P i+1 ). (2)Given these def<strong>in</strong>itions and assum<strong>in</strong>g a given cost model, the shortest mobilepath (SMP) problem is def<strong>in</strong>ed with<strong>in</strong> the framework as follows.Problem 1. Given a mobile graph G = G 1 ...G T and a specified source-dest<strong>in</strong>ationpair (s, t), f<strong>in</strong>d a mobile path P = P 1 ...P T from s to t, such that theweightT∑T∑−1w(P) = w i (P i )+ c trans (P i ,P i+1 )i=1of the mobile path is m<strong>in</strong>imum.In [6], a simple 2-valued transition cost function was considered <strong>in</strong>itiallybecause the SMP problem is tractable <strong>in</strong> this case.i=1i=1MERIT Assessment Measures. Two assessment measures are proposedwith<strong>in</strong> the MERIT framework: the MERIT ratio and the MERIT spectrum.For a given mobile graph G and s-t pair, let P real be the actual mobilepath generated <strong>by</strong> the MANET rout<strong>in</strong>g protocol R. The weight w(P real ) of thismobile path is computed directly from the rout<strong>in</strong>g state trace for the s-t path <strong>in</strong>each G i . The paths generated <strong>in</strong> turn directly fix the transition costs. Similarly,let P ideal be the shortest mobile path for G. Both the path P ideal and its weightw(P ideal ) are computed <strong>by</strong> the Shortest Mobile Path algorithm [6] run onthis <strong>in</strong>stance G of the mobile graph for ) source-dest<strong>in</strong>ation pair s-t.The MERIT ratio = Eis the expected value of the cost ratio of(w(Preal )w(P ideal )the actual mobile path to the shortest mobile path. The ratio represents howfar the routes <strong>in</strong> protocol R deviate <strong>in</strong> cost from the theoretical optimum. Wecompute the mean of the ratio of a large enough sample size of randomly drawns-t sessions <strong>in</strong> order to obta<strong>in</strong> a 95% confidence <strong>in</strong>terval. The distribution of thesample is implicit from the simulation parameters.The value of the MERIT ratio becomes mean<strong>in</strong>gful when we understand howit changes as a function of a some parameter. The MERIT ratio expressed asthe function of some <strong>in</strong>dependent parameter def<strong>in</strong>es the MERIT spectrum ofthe protocol R. Some examples of such parameters <strong>in</strong>clude the node velocity,the average actual path length, the average node density, transmit power levelsand the related energy consumption, and even the transition cost.


28 P. Narayan and V.R. Syrotiuk2.2 An Overview of the DSR and AODV Rout<strong>in</strong>g ProtocolsDynamic Source Rout<strong>in</strong>g. The Dynamic Source Rout<strong>in</strong>g (DSR) protocol [11]is an on-demand rout<strong>in</strong>g protocol that allows nodes to dynamically discover asource route to any dest<strong>in</strong>ation <strong>in</strong> the network. In source rout<strong>in</strong>g, the source isresponsible for comput<strong>in</strong>g the route that a packet should take.When a node wishes to communicate with another node, it employs routediscovery to flood a control packet, called a route request (RREQ), through thenetwork, <strong>in</strong> search of a route to the dest<strong>in</strong>ation. A RREQ packet with a target oft is broadcast <strong>in</strong> the network. It is forwarded hop-<strong>by</strong>-hop from the node <strong>in</strong>itiat<strong>in</strong>gthe route discovery. When the RREQ reaches the dest<strong>in</strong>ation t or a node thatis aware of a route to t, forward<strong>in</strong>g stops. A route reply (RREP) packet is sentback to the source s on the reverse path, <strong>in</strong>clud<strong>in</strong>g a full source route to thedest<strong>in</strong>ation t. This source route is <strong>in</strong>cluded <strong>in</strong> the header of each data packetsent to t and enables stateless forward<strong>in</strong>g. Data sent to t <strong>by</strong> an application isbuffered at s until a route reply with a route to t is received, at which po<strong>in</strong>t,these packets are forwarded to t along the acquired route.The route ma<strong>in</strong>tenance mechanism monitors the status of source routes <strong>in</strong>use, detects l<strong>in</strong>k failures and repairs routes with broken l<strong>in</strong>ks. When route ma<strong>in</strong>tenance<strong>in</strong>dicates that a source route is broken, s can attempt to use any otherroute it happens to know to t, or the source s can <strong>in</strong>voke route discovery aga<strong>in</strong>to f<strong>in</strong>d a new route.Ad Hoc on Demand Distance Vector. The Ad hoc On Demand DistanceVector (AODV) [16] rout<strong>in</strong>g protocol is also an on-demand protocol. Similar totraditional distance vector protocols, AODV ma<strong>in</strong>ta<strong>in</strong>s rout<strong>in</strong>g tables with oneentry per dest<strong>in</strong>ation.AODV builds routes us<strong>in</strong>g RREQ and RREP control packets similar to theroute discovery mechanism <strong>in</strong> DSR. A node receiv<strong>in</strong>g the RREQ packet maysend a RREP if it is either the dest<strong>in</strong>ation or if it has a route to the dest<strong>in</strong>ationwith correspond<strong>in</strong>g sequence number greater than or equal to that conta<strong>in</strong>ed <strong>in</strong>the RREQ. Otherwise, it rebroadcasts the RREP. As a RREP propagates backto the source, nodes set up forward path entries to the dest<strong>in</strong>ation <strong>in</strong> their routetables. Once the source node receives the RREP it may beg<strong>in</strong> to forward datapackets to the dest<strong>in</strong>ation.There are several differences <strong>in</strong> the route discovery mechanisms of DSR andAODV. The source rout<strong>in</strong>g mechanism used <strong>in</strong> DSR enables s to learn routestowards each <strong>in</strong>termediate node on the route to t. Additionally, each <strong>in</strong>termediatenode on the path from s to t may learn routes to every other node on the route.In DSR, the dest<strong>in</strong>ation node replies to all RREQs sent towards it dur<strong>in</strong>g as<strong>in</strong>gle request cycle. Thus, <strong>in</strong> DSR, the source learns many alternate routes tothe dest<strong>in</strong>ation <strong>in</strong> contrast to AODV where the dest<strong>in</strong>ation replies only to thefirst arriv<strong>in</strong>g request.


Evaluation of the AODV and DSR Rout<strong>in</strong>g Protocols 292.3 Earlier Comparisons of DSR and AODVSeveral attempts have been made to compare DSR and AODV with respect topath optimality among other measures. Broch et al. [2] use an <strong>in</strong>ternal mechanismof ns-2 to measure the path optimality for the rout<strong>in</strong>g protocols. Essentiallyan omniscient observer of the simulation stores the total number of mobilenodes and a table of shortest number of hops required to reach from one node toanother at a particular <strong>in</strong>stant of time. This <strong>in</strong>formation is used to compute thedifference between the length of the actual path used between the source anddest<strong>in</strong>ation at a particular <strong>in</strong>stant of time <strong>in</strong> the <strong>in</strong>stantaneous snapshot of thenetwork graph. The approach <strong>in</strong> MERIT is different from [2] <strong>in</strong> that it considersthe entire history of the network topology for the duration of the data flow andthe cost of updat<strong>in</strong>g the routes to the dest<strong>in</strong>ation.The studies <strong>in</strong> [2] show that DSR uses routes that are very close to optimalwhereas AODV f<strong>in</strong>ds a greater number of routes which are further apart fromthe optimal <strong>in</strong> the <strong>in</strong>stantaneous topology.In [5], the authors compare the protocols DSR and AODV us<strong>in</strong>g several quantitativemetrics. The general conclusion is that for application oriented metricssuch as delay and throughput, DSR outperforms AODV <strong>in</strong> less stressful conditions,i.e., for a smaller number of nodes and/or lower mobility.3 The MERIT ToolFigure 1 shows a high level block diagram of the MERIT tool. The tool takes, as<strong>in</strong>put, a mobile graph as well as actual route traces for the rout<strong>in</strong>g protocol underconsideration. Once there is sufficient confidence <strong>in</strong> the ratio for one parameter,runs for other parameters may beg<strong>in</strong>. From a sequence of MERIT ratios for agiven parameter, a spectrum is generated.manetRout<strong>in</strong>gProtocolMobile GraphActual PathsMERITToolMERITRatio/SpectrumMERITSpectrumVisualizationFig. 1. The MERIT tool.3.1 Simulation EnvironmentWe generate the <strong>in</strong>put for the MERIT tool us<strong>in</strong>g an extended version of ns-2[14] because it has the ability to simulate MANETs [3] and provides a referenceimplementation of the DSR and AODV rout<strong>in</strong>g protocols.We create mobility scenarios as <strong>in</strong> [2], which <strong>in</strong>clude 20 nodes <strong>in</strong> a 1500 ×300 m 2 area <strong>in</strong> order to force the use of longer routes. In our scenarios, everynode has an omni-directional transmission radius of 250 m and moves us<strong>in</strong>g the


30 P. Narayan and V.R. Syrotiukrandom waypo<strong>in</strong>t model [3] with a maximum velocity v, which varies from 0 m/sto 10 m/s. The mobility model is also characterized <strong>by</strong> a pause time.Our experiments use constant bit rate (CBR) data sources over UDP for datacommunication. The primary goal of our current experiments is to illustrate thebehaviour of rout<strong>in</strong>g protocols for simple cases. Therefore, we choose UDP asour transport layer protocol <strong>in</strong> order to elim<strong>in</strong>ate the <strong>in</strong>fluence of congestion andflow control mechanisms on the performance of the rout<strong>in</strong>g protocol.3.2 Traffic and Mobility PatternsFor a typical ns-2 wireless simulation, a connection pattern file designates theconfiguration and behaviour of data connections <strong>in</strong> the network scenario to besimulated. It specifies the end po<strong>in</strong>ts between which the data flow takes place,when the data flow over the connection should start and stop, and the typeof application data sent <strong>by</strong> the source. In our experiments, each connectionpattern file has one s-t pair and a CBR connection between them to elim<strong>in</strong>ateany possibility of collisions or buffer overflow due to high network load.For each s-t pair, the data flow starts and ends at a random time. A script togenerate connection pattern files is provided with the CMU extensions to ns-2[3]. We modify the CMU script to impose the restriction that each connectionlast for at least 100 seconds.A mobility pattern file def<strong>in</strong>es the motion of the nodes <strong>in</strong> the network andthe changes <strong>in</strong> the paths between the nodes over time. A program to generatethe mobility pattern is also provided [3]. By default, this program assumes afixed transmission range of 250 m to denote one hop. The <strong>in</strong>itial positions of thenodes are designated at random and the move sequences are generated accord<strong>in</strong>gto the random waypo<strong>in</strong>t mobility model.Us<strong>in</strong>g an approach similar to Holland and Vaidya [9,10], we generate mobilitypatterns for the network of 20 nodes mov<strong>in</strong>g with a mean speed of 2 m/s for 1800seconds and a pause time of 0 s. We call these mobility pattern files base patterns.We generate 5 such base pattern files. These base pattern scripts are used togenerate mobility patterns for mean speeds of 4, 6, 8 and 10 m/s, respectively.3.3 Extraction of the Mobile GraphIn order to generate the mobile graph for a given scenario, we sample the currentposition of every mobile node at regular <strong>in</strong>tervals and output the l<strong>in</strong>k transitionsthat occurred with<strong>in</strong> each <strong>in</strong>terval. The sampl<strong>in</strong>g <strong>in</strong>terval is such that we obta<strong>in</strong>100 samples before the node travels through its transmission radius once.The <strong>in</strong>itial connectivity matrix translates <strong>in</strong>to the first graph sequence <strong>in</strong> themobile graph. By apply<strong>in</strong>g l<strong>in</strong>k additions and breakages recorded at differenttime <strong>in</strong>tervals, we obta<strong>in</strong> the graphs <strong>in</strong> the graph sequence over the time scaleequal to the total simulation time.


Evaluation of the AODV and DSR Rout<strong>in</strong>g Protocols 313.4 Mobile Path Computation for DSRTo facilitate the computation of the mobile path for our evaluation of the DSRprotocol, we require the actual paths used <strong>by</strong> the protocol to route data packetsfrom the source to a dest<strong>in</strong>ation. In order to obta<strong>in</strong> this <strong>in</strong>formation, we modifythe DSR implementation <strong>in</strong> ns-2 to trace the primary and secondary cache eachtime an entry is either added to or deleted from the cache.For every simulation run, we gather the route cache trace and use this todeterm<strong>in</strong>e the actual path, which DSR would use to route a packet from sourceto dest<strong>in</strong>ation for a particular time sequenced graph <strong>in</strong> the mobile graph G. Thisapproach is generalized and can be used to gather route <strong>in</strong>formation for protocolimplementations <strong>in</strong> other network simulators such OpNet or QualNet [15,17].The procedure we adopt to select the actual path is consistent with the algorithmused <strong>by</strong> the ns-2 implementation of DSR to select a route. For example,Fig. 2 shows a three graph subsequence G i−1 G i G i+1 <strong>in</strong> a mobile graph for asession between source-dest<strong>in</strong>ation pair 4-5. The solid path between nodes 4 and5 is the actual route computed <strong>by</strong> DSR while the dashed path (which co<strong>in</strong>cideswith the last two hops of the actual route) is the shortest hop path.100010001000900790079007800700401211661338007004012161613380070040121616 31360060060050040011151021950040011151021950040011151021930020010018148917530020010018148917530020010018148917500 100 200 300 400 500 600 700 800 900 100000 100 200 300 400 500 600 700 800 900 100000 100 200 300 400 500 600 700 800 900 1000Fig. 2. Subsequence G i−1G iG i+1 of a mobile graph for source-dest<strong>in</strong>ation 4-5.3.5 Mobile Path Computation for AODVEvery node that implements the AODV protocol ma<strong>in</strong>ta<strong>in</strong>s a separate rout<strong>in</strong>gtable with the next hop <strong>in</strong>formation. Each entry <strong>in</strong> the rout<strong>in</strong>g table has anexpiration time and a sequence number. To compute the actual mobile path forAODV, we trace the route table for every node <strong>in</strong> the simulation whenever anew entry is added or updated <strong>in</strong> the rout<strong>in</strong>g table.One can easily trace the valid path to the dest<strong>in</strong>ation from the rout<strong>in</strong>g table<strong>in</strong>formation for each node. The expiration time for each rout<strong>in</strong>g table entryis used to judge whether or not the route calculated is stale. We use the samealgorithm used <strong>by</strong> the ns-2 AODV implementation to calculate the actual mobilepath for our mobile graph.3.6 Computation of the MERIT RatioEvery connection <strong>in</strong> the connection pattern file has a designated start (t start )and stop time (t stop ). Our mobile graph G consists of a graph sequence for the


32 P. Narayan and V.R. Syrotiukentire duration of the simulation T . S<strong>in</strong>ce DSR and AODV are reactive, the traceis valid only between t start and t stop when data flow actually exists.Only a subsequence of mobile graph G correspond<strong>in</strong>g to the time betweent start and t stop is used to extract actual paths, run the SMP algorithm, and computethe MERIT ratio. Let us denote this subsequence as G ′ = G tstart ...G tstop .For every graph <strong>in</strong> the mobile graph G ′ , we compute the actual path from thesource to the dest<strong>in</strong>ation.To compute the MERIT ratio for the mobile graph G ′ , the SMP algorithmrequires the shortest path <strong>in</strong> each graph of the mobile graph and the shortestpath <strong>in</strong> the <strong>in</strong>tersection of all subsequences of the graph sequence. We implementDijkstra’s shortest path algorithm to f<strong>in</strong>d the shortest hop path <strong>in</strong> any graph,while comput<strong>in</strong>g the cost matrix for the SMP algorithm. We use hop count asthe metric for our implementation of the SMP because both DSR and AODVuse this metric <strong>in</strong> their path computation.For this work, we consider the cases where we assign the constant values of0, 0.5, 1.0, 1.5 and 2.0 for the update cost. We chose a maximum value of 2.0 forour update cost because we found that the average path length for our simulationexperiments did not exceed 3.5 hops.4 MERIT Spectra for DSR and AODVWe conduct two sets of experiments. In the first set, we measure the MERITratio for different scenarios <strong>by</strong> vary<strong>in</strong>g the degree of mobility. In the second set,we keep the mobility rate constant and measure the MERIT ratio <strong>by</strong> vary<strong>in</strong>gthe data rate for the CBR flow from the source to the dest<strong>in</strong>ation.In all cases, our results are averaged over a sufficiently large number of runs toensure a small variance (95% confidence <strong>in</strong>terval). From the confidence <strong>in</strong>tervalcalculations on our experimental results, we f<strong>in</strong>d that the MERIT ratio varieswith<strong>in</strong> 2.85% of the plotted value.4.1 Parameters of InterestThe parameters aga<strong>in</strong>st which we plot MERIT spectra <strong>in</strong>clude:Mean speed: A mean speed of 2 m/s equates to the speed of a pedestrian anda mean speed of 10 m/s corresponds to the speed of a mov<strong>in</strong>g vehicle.Data arrival rate: The data arrival rate represents the number of packets sentper second. For our experiments, we use data arrival rates of 2, 4, 6, 8 and10 packets/second, with the traffic be<strong>in</strong>g sent out at a constant rate and thepacket size be<strong>in</strong>g constant at 64 <strong>by</strong>tes.Average path length: The average path length for a simulation run denotesthe average actual path length (hop count) over all the paths for the specifiedsource-dest<strong>in</strong>ation pair.Average end-to-end delay: The average end-to-end delay for a run denotesthe average end-to-end packet delay (<strong>in</strong> units of number of seconds) computedfrom the router trace for the data packets sent <strong>by</strong> the candidate protocols.


Evaluation of the AODV and DSR Rout<strong>in</strong>g Protocols 331.3DSRAODV1.251.2Merit Ratio1.151.11.052 3 4 5 6 7 8 9 10Mean Speed(m/s)Fig. 3. MERIT ratio versus mean speed.4.2 MERIT SpectraIn this section, we present the various MERIT spectra generated for the set ofexperiments where we vary the speed from 2 m/s to 10 m/s.Figure 3 shows that the MERIT ratio computed for DSR and AODV growswith <strong>in</strong>creas<strong>in</strong>g mobility rate. It is clear that as the speed <strong>in</strong>creases, the topologychanges at a faster rate. S<strong>in</strong>ce both DSR and AODV are on-demand protocols,a certa<strong>in</strong> delay is experienced before the routes are repaired and the rout<strong>in</strong>gcaches/tables are updated to reflect the latest changes <strong>in</strong> topology. The computedvalues of the MERIT ratio reflect that the paths <strong>in</strong> the rout<strong>in</strong>g table are closerto optimal for scenarios with lower speeds than for scenarios with higher speed,mostly because the topology changes are more frequent and route repairs or routema<strong>in</strong>tenance is done more frequently. Additionally, we observe that the DSRprotocol yields MERIT ratios that are closer to the optimal cost than AODV.The maximum and average differences between the computed MERIT ratios ofDSR and AODV expressed as a percentage is 1.25 and 0.5136 respectively. Thesedifferences are consistent with the observations made <strong>in</strong> [2] where the authorssuggest that DSR’s cach<strong>in</strong>g is more effective than AODV at lower mobility rateswhere the cached <strong>in</strong>formation goes stale more slowly.In Fig. 4, we see that the MERIT ratio <strong>in</strong>creases with respect to the actualpath length. The path length we plot is the average of the actual path lengthsfrom the route trace. The results <strong>in</strong> the figure <strong>in</strong>dicate that when the actual pathlengths computed <strong>by</strong> the AODV rout<strong>in</strong>g protocol are larger, the MERIT ratio isalso higher. AODV computes paths that are longer than the paths computed <strong>by</strong>DSR primarily because DSR has access to significantly greater amount of route<strong>in</strong>formation than AODV because it employs aggressive cach<strong>in</strong>g and promiscuouslisten<strong>in</strong>g. AODV has access to less <strong>in</strong>formation because it ma<strong>in</strong>ta<strong>in</strong>s only oneentry per dest<strong>in</strong>ation <strong>in</strong> its rout<strong>in</strong>g table and relies significantly on a higherfrequency of route discovery flood<strong>in</strong>g to keep its rout<strong>in</strong>g table up to date.When the paths between a source-dest<strong>in</strong>ation pair are longer (more hops),it could result <strong>in</strong> a higher end-to-end delay. Also, when the speed is higher andthe topology changes at a faster rate, there could be a higher end-to-end delay


34 P. Narayan and V.R. SyrotiukDSRAODVDSRAODV1.31.351.31.25Merit Ratio1.251.21.151.1Merit Ratio1.21.151.11.0513.51.05101080.8380.662.560.4440.2Path Length (Avg no of hops)2 2Arrival Rate (Packets/sec)Speed (m/s)2 0Delay (secs)Fig. 4. MERIT ratio versus (a) arrival rate and path length; (b) delay and speed.because a greater amount of route ma<strong>in</strong>tenance and repair will have to be donewhenever the topology along the path changes. We conclude that <strong>in</strong> scenarioswhere the mobility rate is higher and <strong>in</strong> scenarios where the path between thesource and the dest<strong>in</strong>ation is longer, the paths are further away from the optimal.S<strong>in</strong>ce the average delay is affected <strong>by</strong> the comb<strong>in</strong>ation of these factors and otherfactors like the network load as well, we can expect to see that higher delayswould lead to higher MERIT ratios.The SMP algorithm used to compute the ideal cost <strong>in</strong> the MERIT framework,<strong>in</strong>volves a two-valued transition cost. The transition cost can be viewedas a trade-off between the importance of the stability of the path and the lengthof the path. When the cost of updat<strong>in</strong>g path <strong>in</strong>formation is small, the SMP algorithmplaces more emphasis on search<strong>in</strong>g for the shortest path without regardto whether or not it changes the path. When the cost is larger, the algorithmgives more importance to search<strong>in</strong>g for stable paths s<strong>in</strong>ce it is costly to changepaths. We observe that MERIT ratios generally <strong>in</strong>crease with an <strong>in</strong>crease <strong>in</strong> theupdate cost values because the actual rout<strong>in</strong>g protocol implementation makesits rout<strong>in</strong>g decisions <strong>by</strong> us<strong>in</strong>g only the <strong>in</strong>stantaneous <strong>in</strong>formation recorded <strong>in</strong> itsdata structures at any given time. With a higher cost of update, the importanceof us<strong>in</strong>g the past history to make rout<strong>in</strong>g decisions is more critical because stablepaths are preferred when the update cost is higher. This is effectively captured<strong>in</strong> the higher values obta<strong>in</strong>ed for the MERIT ratio with an <strong>in</strong>crease <strong>in</strong> cost.We see that the MERIT ratio <strong>in</strong>creases with an <strong>in</strong>crease <strong>in</strong> the data arrivalrate. The path lengths for these scenarios are also noticeably shorter than theones observed for the previous set of experiments. This can be attributed to thefact that both DSR and AODV are on-demand protocols, hence a higher datarate causes the rout<strong>in</strong>g tables to be updated more frequently, result<strong>in</strong>g is smallerpath lengths.Our results clearly <strong>in</strong>dicate that for the scenarios we have considered, DSRprovides paths which are closer to the optimal than AODV. In our experiments,we choose simulation scenarios where we have only one s-t pair, which is communicat<strong>in</strong>g.We use a s<strong>in</strong>gle CBR source that sends data at a steady rate <strong>in</strong> all


Evaluation of the AODV and DSR Rout<strong>in</strong>g Protocols 35our experiments, therefore we effectively consider scenarios where the networkload is not bursty. In [2,5] it is shown that DSR outperforms AODV <strong>in</strong> scenarioswhere the offered network load is low. Our results show the same trend.5 Conclusions and Ongo<strong>in</strong>g WorkThe ma<strong>in</strong> goal of this work is to evaluate the performance of two MANET rout<strong>in</strong>gprotocols <strong>in</strong> the MERIT tool, an implementation of the MERIT framework. Ourresults show that DSR outperforms AODV <strong>in</strong> the scenarios we consider. Theseresults agree with the observations made <strong>in</strong> a similar context <strong>in</strong> [5] where theprotocols were compared <strong>in</strong> terms of their path optimality and other performancemeasures. Also, the MERIT spectra which plots the MERIT ratio aga<strong>in</strong>st variousnetwork parameters of <strong>in</strong>terest show that the MERIT ratio <strong>in</strong>tuitively capturesthe network dynamics and behaves as expected.In our ongo<strong>in</strong>g work, we are evaluat<strong>in</strong>g the performance of rout<strong>in</strong>g protocolsimplemented <strong>in</strong> different network simulators to verify the implementation<strong>in</strong>dependence, and scalability aspects of the MERIT framework. As well, weare work<strong>in</strong>g towards def<strong>in</strong><strong>in</strong>g a transition cost function that will capture moreaccurately the cost of updat<strong>in</strong>g the paths <strong>in</strong> the rout<strong>in</strong>g table.AcknowledgmentsWe thank A. Faragó for helpful discussions, J. Boleng for shar<strong>in</strong>g code to determ<strong>in</strong>el<strong>in</strong>k state transitions <strong>in</strong> ns-2, and K. Vadde for help with the figures.References1. S. Bhadra and A. Ferreira, “Comput<strong>in</strong>g Multicast Trees <strong>in</strong> Dynamic Networks us<strong>in</strong>gEvolv<strong>in</strong>g Graphs,” Institut National de Recherche en Informatique et Automatique(INRIA), Research Report No. 4531, August 2002, revised October 2002.2. J. Broch, D.A. Maltz, D.B. Johnson, Y.-C. Hu, and J. Jetcheva. “A PerformanceComparison of Multi-Hop Wireless Ad Hoc Network Rout<strong>in</strong>g Protocols,” Proceed<strong>in</strong>gsof the 4th Annual ACM/IEEE International Conference on Mobile Comput<strong>in</strong>gand Network<strong>in</strong>g (Mobicom’98), Dallas, Texas, pp. 85–97, October 1998.3. Wireless and Mobility Extensions to ns-2. Carnegie Mellon University Monarch(Mobile Network<strong>in</strong>g Architectures) Project. http:/www.monarch.cs.cmu.edu4. M.S. Corson and J. Macker. “Mobile Ad hoc Network<strong>in</strong>g (MANET): Rout<strong>in</strong>gProtocol Performance Issues and Evaluation Considerations,” Network Work<strong>in</strong>gGroup, RFC 2501, January 1999. http://www.ietf.org/rfc/rfc2501.txt5. S.R. Das, C.E. Perk<strong>in</strong>s, and E.M. Royer. “Performance Comparison of Two On-Demand Rout<strong>in</strong>g Protocols for Ad Hoc Networks,” Proceed<strong>in</strong>gs of the 19th AnnualJo<strong>in</strong>t Conference of the IEEE <strong>Computer</strong> and Communication Societies (Infocom2000), Tel Aviv, Israel, pp. 3–12, March 2000.6. A. Faragó and V.R. Syrotiuk. “MERIT: A Unified Framework for Rout<strong>in</strong>g ProtocolAssessment <strong>in</strong> Mobile Ad Hoc Networks,” Proceed<strong>in</strong>gs of the 7th Annual ACMInternational Conference on Mobile Comput<strong>in</strong>g and Network<strong>in</strong>g (Mobicom’01),Rome, Italy, pp. 53–60, July 2001.


36 P. Narayan and V.R. Syrotiuk7. A. Faragó and V.R. Syrotiuk. “MERIT: A Scalable Approach for Protocol Assessment,”Mobile Networks & Applications, Special Issue on Mobile Ad Hoc Networks,A. Campbell, M. Conti and S. Giordano (eds.), 8, pp. 567–577, 2003.8. P. Haxell, A. Rasala, G. Wilfong, and P. W<strong>in</strong>kler, “Wide-Sense Nonblock<strong>in</strong>g WDMCross-Connects,” Proceed<strong>in</strong>gs of the Tenth European Symposium on Algorithms(ESA) 2002, LNCS 2461, pp. 538–550.9. G. Holland and N. Vaidya. “Analysis of TCP Performance over Mobile Ad HocNetworks,” Proceed<strong>in</strong>gs of the 5th Annual ACM/IEEE International Conferenceon Mobile Comput<strong>in</strong>g and Network<strong>in</strong>g (Mobicom’99), Seattle, Wash<strong>in</strong>gton, pp.219–230, August 1999.10. G. Holland and N. Vaidya. “Analysis of TCP Performance over Mobile Ad HocNetworks, Part II: Simulation Details and Results” Technical Report 99-005, Departmentof <strong>Computer</strong> <strong>Science</strong>, Texas A&M University, 61 pages, February 1999.11. D.B. Johnson, D.A. Maltz, Y.-C. Hu, and J.G. Jetcheva. “The Dynamic SourceRout<strong>in</strong>g Protocol for Mobile Ad Hoc Networks (DSR),” Internet Draft, November2001. Work <strong>in</strong> progress. http://www.ietf.org/ids.<strong>by</strong>.wg/manet.html12. E. Köhler, K. Langkau, and M. Skutella, “Time-Expanded Graphs for Flow-Dependent Transit Times,” Proceed<strong>in</strong>gs of the Tenth European Symposium on Algorithms(ESA) 2002, LNCS 2461, pp. 599–611.13. Mobile Ad-Hoc Network<strong>in</strong>g (MANET) Work<strong>in</strong>g Group.http://www.ietf.org/html.charters/manet-charter.html14. The Network Simulator — ns-2. The University of California, Berkeley.http://www.isi.edu/nsname/ns/15. OpNet, <strong>by</strong> OpNet Technologies. http://www.opnet.com/16. C.E. Perk<strong>in</strong>s and E.M. Royer. “Ad hoc On-Demand Distance Vector Rout<strong>in</strong>g,”Proceed<strong>in</strong>gs of the 2nd IEEE Workshop on Mobile Comput<strong>in</strong>g Systems and Applications,New Orleans, LA, February 1999, pp. 90-100.17. QualNet, <strong>by</strong> Scalable Network Technologies.http://www.scalable-networks.com/18. M. Takai, J. Mart<strong>in</strong> and R. Bagrodia. “Effects of Wireless Physical Layer Model<strong>in</strong>g<strong>in</strong> Mobile Ad Hoc Networks,” Proceed<strong>in</strong>gs of the 2001 ACM International Symposiumon Mobile Ad Hoc Network<strong>in</strong>g & Comput<strong>in</strong>g (MobiHoc’01), Long Beach,California, pp. 87–94, October 2001.


On-demand Rout<strong>in</strong>g <strong>in</strong> MANETs:The Impact of a Realistic Physical Layer ModelLiang Q<strong>in</strong> and Thomas KunzCarleton University, Ottawa, Ont., Canada K1S 5B6{lq<strong>in</strong>,tkunz}@sce.carleton.caAbstract. Most simulations and performance comparisons of mobile ad hocnetwork rout<strong>in</strong>g protocols are based on a simplistic and idealistic physical layermodel. In real applications, there are different k<strong>in</strong>ds of noise or <strong>in</strong>terference thatimpact the signal power. We use a shadow<strong>in</strong>g propagation model <strong>in</strong> our simulationevaluation of two on-demand rout<strong>in</strong>g protocols: AODV and DSR. Becauseof signal power fluctuation, active routes will break, which causes significantthroughput degradation and longer packet delay. In this paper, we analyze theimpact of a shadow<strong>in</strong>g model on the performance of these two rout<strong>in</strong>g protocols.Then we set a new signal power threshold dur<strong>in</strong>g the route discoveryprocess so that only those l<strong>in</strong>ks with strong enough signal power will be chosen;we also reduce some control messages for DSR. The simulation resultsshow significant <strong>in</strong>creases <strong>in</strong> packet delivery ratio and decreases <strong>in</strong> packet latencyfor both protocols.1 IntroductionA mobile ad hoc network (MANET) is an <strong>in</strong>frastructure-less network. Because theradio transmission range is limited and mobile nodes are free to move randomly, theroutes are subject to frequent failure. Dozens of rout<strong>in</strong>g protocols for MANET havebeen proposed, for example, Dest<strong>in</strong>ation-Sequenced Distance-Vector Rout<strong>in</strong>g(DSDV)[1], Temporally-Ordered Rout<strong>in</strong>g Algorithm (TORA) [2], Dynamic SourceRout<strong>in</strong>g protocol (DSR)[3], Signal Stability-Based Adaptive Rout<strong>in</strong>g (SSA) [4], andAd-hoc On-Demand Distance Vector Rout<strong>in</strong>g (AODV)[5]. Performance evaluationsand comparisons between several rout<strong>in</strong>g protocols have been published <strong>in</strong> [6][7]. Butthese evaluations are based on simulations us<strong>in</strong>g a two-ray ground propagation model.In real applications, the path between transmitter and receiver can be l<strong>in</strong>e-of-sight, orobstructed <strong>by</strong> physical obstacles between them, thus the signal strength on the receivernot only depends on the distance, but also on the environment. At the timewhen this research began, few simulations tried to use different propagation models toevaluate rout<strong>in</strong>g protocol performance, and most rout<strong>in</strong>g protocols assume that packetloss over a l<strong>in</strong>k <strong>in</strong>dicates a l<strong>in</strong>k breakage due to node mobility. Takai [8] presentssimulation results us<strong>in</strong>g free space, Rayleigh and SIRCIM (Simulation of IndoorRadio Channel Impulse Response Models with Impulse Noise) propagation models <strong>in</strong>a 130m <strong>by</strong> 130m area with 20 mobile nodes. Goff [9] proposes some ways to verifywhether the signal fluctuation is caused <strong>by</strong> channel fad<strong>in</strong>g.This paper concentrates on the impact of a shadow<strong>in</strong>g propagation model on theperformance of two on-demand rout<strong>in</strong>g protocols: AODV and DSR. Simulations ofS. Pierre, M. Barbeau, and E. Kranakis (Eds.): ADHOC-NOW 2003, LNCS <strong>2865</strong>, pp. 37–48, 2003.© Spr<strong>in</strong>ger-Verlag Berl<strong>in</strong> Heidelberg 2003


38 L. Q<strong>in</strong> and T. Kunzthese two protocols show that the signal strength fluctuations cause routes to be assumedbroken, and <strong>in</strong> turn the packet delivery ratio significantly decreases and packetdelay <strong>in</strong>creases. We apply a new signal power threshold dur<strong>in</strong>g the route discoveryprocess, so that only the routes with strong signal strength will be chosen. For DSR,we also reduce some control messages to reduce traffic. Our simulation results showthat this can significantly <strong>in</strong>crease the packet deliver ratio and deceased packet latencyfor both protocols.An overview of free space, two-ray ground and shadow<strong>in</strong>g propagation models areprovided <strong>in</strong> Section 2. Section 3 analyses the impact of a shadow<strong>in</strong>g model on theperformance of rout<strong>in</strong>g protocols, and presents our proposal. Section 4 conta<strong>in</strong>s thesimulation results under different mobility patterns and parameters. Section 5 drawsour conclusion and directions for future research. A more detailed <strong>in</strong>troduction toDSR and AODV can be found <strong>in</strong> [3] [5].2 Propagation ModelsThe free space propagation model is used for the situation when the transmitter andreceiver have a clear l<strong>in</strong>e-of-sight path. The received power at receiver P ris given <strong>by</strong>the Friis free space equation [10]:2P G G λt t rP ( d)=r 2 2(4π) d Lwhere P tis the transmitted signal power, G tand G rare the antenna ga<strong>in</strong>s of the transmitterand the receiver respectively. L (L≥1) is the system loss, and λ is the wavelength.The two-ray ground reflection model considers both the direct path and aground reflection path between the transmitter and receiver. At a long distance, thismodel is more accurate than the free space model. The received signal power at adistance d from the transmitter can be expressed <strong>by</strong> [10]:P ( d)r=2PG G h ht t r t r4dwhere h rand h tare the heights of the transmit and receive antenna respectively.The free space model and two-ray ground model predict that received power decaysas a function of distance, the radio transmission range is a perfect circle. The shadow<strong>in</strong>gmodel is a statistical model. The mean received power at distance d is computedrelative to P r(d 0), represented <strong>by</strong> (<strong>in</strong> dB) [10]:P ( d)[ ]P ( d )d= −10β log( ) X σdr+dBr 00Equation (3) is also called log-normal shadow<strong>in</strong>g model. In this paper, we will simplyrefer to it as shadow<strong>in</strong>g model, and the free space and two-ray ground model as idealmodel or ideal environment. The shadow<strong>in</strong>g model consists of two parts. The first oneis the path loss model, d 0is a reference distance, β is called loss exponent. The secondpart reflects the variation of the received power at certa<strong>in</strong> distance. X σ is a Gaussian2(1)(2)(3)


On-demand Rout<strong>in</strong>g <strong>in</strong> MANETs 39random variable with zero mean and standard deviation σ, which is called shadow<strong>in</strong>gdeviation. β and σ are obta<strong>in</strong>ed <strong>by</strong> measurement. For example, β is 2 for free space, 2to 3 for obstruction <strong>in</strong>side factories [10]; σ ranges from 4 to 12 for outdoor environments.3 Mobile Ad Hoc Network with Shadow<strong>in</strong>g ModelWhen apply<strong>in</strong>g a shadow<strong>in</strong>g model <strong>in</strong> our simulations of DSR and AODV, we noticesevere performance degradation compared to the use of a two-ray ground model. Wewill first discuss the behavior of DSR and AODV with a shadow<strong>in</strong>g model, then presentour proposal.3.1 The Network Simulator (NS2)All the modifications and simulations <strong>in</strong> this paper are based on The Network Simulator(NS2). NS2 is a discrete event simulator developed <strong>by</strong> the University of Californiaat Berkeley and the VINT project [12]. The Monarch research group at Carnegie-Mellon University developed support for simulation of multihop wireless networks <strong>in</strong>NS2. It provides tools for generat<strong>in</strong>g data traffic and mobile node mobility scenariopatterns and NS2 comes with implementations of DSR and AODV. In NS2, the DistributedCoord<strong>in</strong>ation Function (DCF) of IEEE 802.11 for wireless LANs is used asthe MAC layer protocol. The radio model uses characteristics similar to a commercialradio <strong>in</strong>terface, Lucent’s WaveLAN, which is modeled as a shared-media radio withnom<strong>in</strong>al bit rate of 2Mb/s and a nom<strong>in</strong>al radio range of 250 meters with omnidirectionalantenna. We choose the traffic sources to be constant bit rate (CBR) sources.Transmission rate is 4 packets per second. Each packet is 64 <strong>by</strong>tes long.3.2 Impact of Shadow<strong>in</strong>g Model on DSR and AODVIn an ideal environment, for a transmitter and receiver pair, the received signal poweronly depends on the distance between them. So if the receiver receives a packet with asignal strength is above the reception threshold, it can be sure it is <strong>in</strong> the transmissionrange of the transmitter, and also this l<strong>in</strong>k will last for a while, depend<strong>in</strong>g on the twonodes’ mobility pattern. With a shadow<strong>in</strong>g model, the received signal power has aGaussian distribution fluctuation. When a packet transmitted successfully on a l<strong>in</strong>k, itis not guaranteed that the next packet can be delivered even if the time between thesetwo packets is short. Figure 1 shows how the signal strength for packet receptionchanges for a pair of nodes over the same period of time (i.e., the distance betweentwo nodes is the same), us<strong>in</strong>g two propagation models. Notice that these graphs recordall the packets sent <strong>by</strong> both nodes, <strong>in</strong>clud<strong>in</strong>g all control packets at the MAClayer, and the two nodes are mov<strong>in</strong>g apart. All the data are obta<strong>in</strong>ed from NS2, theshadow<strong>in</strong>g model sets β=2 and δ=4, correspond<strong>in</strong>g to a free space environment.From Figure 1(a) we can see that <strong>in</strong> a shadow<strong>in</strong>g model, the signal strength fluctuatesover at least 2 orders of magnitude. This will cause many active l<strong>in</strong>ks to be con-


40 L. Q<strong>in</strong> and T. Kunzsidered broken dur<strong>in</strong>g transmission, and performance will be affected. Table 1 showsthe comparison for DSR and AODV with ideal and shadow<strong>in</strong>g models for different βvalues, which correspond to different natural environments. All the simulations arerun <strong>in</strong> a 1500x300 m area with 50 mobile nodes, 20 sources, pause time 0 second,maximum speed is 20m/s. Simulation time is 500 seconds. Each scenario is run onlyonce to get an <strong>in</strong>itial idea about the performance degradation. As the β value determ<strong>in</strong>esaverage transmission range, compar<strong>in</strong>g the results has to be done with case, wewill expound on this issue later, where we will consider node density for fair comparison.Fig. 1. Signal Power Change over a Wireless L<strong>in</strong>k for (left) Shadow<strong>in</strong>g Model, (right) IdealModel. They do not use the same power scale.Table 1. Performance Comparisons of DSR and AODV with Different Propagation Models.DSRAODVDeliveryRatio %ControlMessagePacketDelay (s)DeliveryRatioControlMessagePacketDelay (s)Ideal 97.69 12386 0.036 98.36 31617 0.137Modelβ=2.0 98.60 18616 0.131 92.15 25597 0.807β=2.1 82.36 50725 1.498 83.89 61062 0.988β=2.2 24.62 114533 2.541 71.08 87871 1.202β=2.3 18.81 124180 2.779 58.41 127451 1.459β=2.4 9.98 150840 2.768 43.32 126284 1.752β=2.5 4.31 204613 3.587 32.95 128958 2.053β=2.6 4.08 242623 3.623 26.55 120622 2.314Delivery Ratio: total number of received packets/total number of sent packets.Control Message: total number of control messages sent.Packet Delay: average time a packet is <strong>in</strong> transit from source to the dest<strong>in</strong>ation.The impact of the shadow<strong>in</strong>g model on the performance of DSR and AODV is a significantlydecreased packet delivery ratio (PDR), <strong>in</strong>creased number of control messagesand <strong>in</strong>creased packet latency. The bigger the β value, which corresponds toshorter transmission range, the lower the PDR for both protocols. Also, the averagepacket latency with a shadow<strong>in</strong>g model can reach several seconds. Compar<strong>in</strong>g the twoprotocols, AODV has better PDR, and packet delay does not <strong>in</strong>crease as fast as DSRwith the β value. Furthermore, we observed the follow<strong>in</strong>g:


On-demand Rout<strong>in</strong>g <strong>in</strong> MANETs 41(1) Under an ideal model, most packets are dropped because a target node is out oftransmission range. With a shadow<strong>in</strong>g model, more packets are dropped because theInterface Queue is full. The routes found dur<strong>in</strong>g a Route Discovery process are notvalid because of power fluctuation. These <strong>in</strong>valid routes will trigger a new RouteDiscovery process, which significantly <strong>in</strong>creases the number of control messages,which have higher priority <strong>in</strong> the <strong>in</strong>terface queue than data packets. Then data packetshave less chance to be sent out. When more new data packets are com<strong>in</strong>g, packetshave to be dropped.(2) Because of power fluctuation, a packet may need multiple retransmission to beforwarded to the next node. Sometimes, the receiver actually received the packet, butthe transmitter did not receive an ACK from the receiver. So the transmitter assumesthis l<strong>in</strong>k is broken. In DSR, the transmitter will salvage this packet if it can f<strong>in</strong>d anotherroute to the dest<strong>in</strong>ation from its route cache. Each salvag<strong>in</strong>g <strong>in</strong>troduces oneRoute Error message to be sent to the source node. But the previous receiver stilltransmits this packet based on the source route <strong>in</strong> the packet, so the same packet maytake several paths to the dest<strong>in</strong>ation. It will consume network resources and <strong>in</strong>creasepacket latency.(3) A packet may take more or less hop counts than the “optimal” number as determ<strong>in</strong>ed<strong>by</strong> General Operations Director <strong>in</strong> NS2, which is based on the ideal environment,with different β values. For example, when β=2.0, the mean transmission rangewill be much longer than 250 m, as listed <strong>in</strong> Table 2. Even if the shortest path needs 3hops based on the ideal environment, sometimes the source can send the packet to thedest<strong>in</strong>ation directly. Especially for DSR, there are more paths shorter than the “shortest”paths pre-calculated <strong>in</strong> NS2 because of shorten<strong>in</strong>g mechanism. So for β=2.0, thePDR of DSR could be higher than the ideal model. On the other hand, the signalpower fluctuation can cause a high rate of transmission failures and bigger hop countsthan under an ideal model.(4) In DSR, there exist Route Request messages that are not sent <strong>by</strong> the source of datapackets. It happens when a node wants to send a Route Reply or Error message andf<strong>in</strong>ds that the source route is not valid and also it cannot f<strong>in</strong>d any route <strong>in</strong> its routecache. Another source of protocol overhead is due to extra Route Error messages.When Route Error and Route Reply messages are salvaged, a Route Error message issent to the source node.3.3 Improv<strong>in</strong>g Rout<strong>in</strong>g Performance under a Shadow<strong>in</strong>g ModelFrom the last section, we can see that both rout<strong>in</strong>g protocols have low PDR and longpacket latency, caused <strong>by</strong> power fluctuation, <strong>in</strong> shadow<strong>in</strong>g model. The performance isnot acceptable <strong>in</strong> real applications. In this section, we present some proposals to <strong>in</strong>creasethe PDR based on our studies. However, before we discuss the specific proposalsand results, we need to address another issue first: how to fairly compare resultsfor different β values, which determ<strong>in</strong>e the average transmission range and thereforeaverage network connectivity.3.3.1 Mean Transmission Range and Required Node DensityDifferent β values correspond to different average transmission ranges; we can changeEquation (3) to:


42 L. Q<strong>in</strong> and T. KunzP = Prdlog( ) + X σ )d 010( 10β2PG G λ dt t r0 β*10= * ( ) * 10r 0 2 2(4π) d L d0− (4)Because the mean of X σ is zero, if we set P rto the threshold P s, we will f<strong>in</strong>d a meantransmission range for different β values with Equation (4). Accord<strong>in</strong>g to the parametersused <strong>in</strong> NS2, the radio frequency is 914MHz, P t=0.281838 W, L=1, and thresholdP s=3.652x10 -10 W. The reference distance d 0is 1 m. The result<strong>in</strong>g average transmissionranges are shown <strong>in</strong> Table 2.Table 2 shows that for a transmission range equivalent to the ideal model, which is250 m, β=2.385. β values less than these correspond to a longer mean transmissionrange than ideal model, bigger values correspond to a shorter mean transmissionrange. To fairly compare the performance, we should conduct simulations under thesame or similar conditions. If we still use the same number of nodes <strong>in</strong> the same areafor higher β values, some nodes may be isolated. Bettstetter [13] proposed an algorithmfor obta<strong>in</strong><strong>in</strong>g the m<strong>in</strong>imum radio transmission range for a homogeneous nodedensity so that every node <strong>in</strong> the network is connected. But <strong>in</strong> NS2 simulations, arandom waypo<strong>in</strong>t model is used, and this model does not result <strong>in</strong> a uniform nodedistribution, so this algorithm cannot be applied. We apply a simple rule for fair comparison:for two different simulations with different transmission range, the total nodecoverage for a certa<strong>in</strong> area should be equal, i.e:πrn1w l211 1= n2πrw lwhere r 1,r 2are average radio transmission ranges, w 1, w 2and l 1,l 2are width and lengthof the simulation area, and n 1,n 2are number of mobile nodes respectively. Based onour simulations with an ideal radio model with 50 nodes <strong>in</strong> a 1500x300 m area withtransmission range of 250m, we calculate the required number of nodes for different βvalues <strong>in</strong> Table 2.Table 2. Mean Transmission Range and Required Nodes for Different Beta Values.β 2.0 2.1 2.2 2.3 2.385 2.4 2.5 2.6 2.7 2.8 2.9 3.0r(m)725 530 398 307 250 242 194 158 131 110 93 80#nodes 6 12 20 34 50 54 84 126 183 259 362 489222 20.1Xσ(5)3.3.2 Improv<strong>in</strong>g Packet Delivery RatioIn the shadow<strong>in</strong>g model, signal power strength fluctuates and exist<strong>in</strong>g routes maybecome unstable if some l<strong>in</strong>ks of a route are on the edge of the radio transmissionrange. The results <strong>in</strong> the previous sections also demonstrate that even a route discovereda very short time ago still might be assumed broken when the Route Reply isgo<strong>in</strong>g to be sent. So if nodes can have more stable routes that resist to the fluctuationthe route will live longer and a source node does not have to f<strong>in</strong>d a new route frequently,which <strong>in</strong> turn will <strong>in</strong>crease the chance to successfully deliver data packets.We can divide the stable route requirement <strong>in</strong>to two parts. First we try to f<strong>in</strong>d somestable routes, second we have to ma<strong>in</strong>ta<strong>in</strong> these routes because nodes are mov<strong>in</strong>grandomly. In this paper, we solve the first part and will give some suggestion for the


On-demand Rout<strong>in</strong>g <strong>in</strong> MANETs 45significantly <strong>by</strong> us<strong>in</strong>g a new threshold. The negative results of PDR for low β valuesare because of sparse node density, and limited Route Reply messages are reducedfurther <strong>by</strong> new threshold. When β=2.5, the packet latency under DSR <strong>in</strong>creases. Thisis because the average PDR <strong>in</strong> the orig<strong>in</strong>al DSR is very low, and delivered packetsunder our modifications are often several hops away. Consider<strong>in</strong>g the average transmissionrange is 80 meters, some packets may need more than 10 hops to reach thedest<strong>in</strong>ations. This longer route contributes to the longer latency.Fig. 2. PDR (left) and Total Control Messages (right) for Different Mobility PatternsFig. 3. Average Hop Counts (left) and Average Packet Delay (right) for Different MobilityPatternsFig. 4. PDR (left) and Total Control Messages (right) for Different Beta Values


46 L. Q<strong>in</strong> and T. KunzFig. 5. Average Hop Counts (left) and Average Packet Delay (right) for Different Beta ValuesDifferent mobility patterns do not show an apparent impact on the packet deliveryratio. The shadow<strong>in</strong>g effect is the ma<strong>in</strong> cause for the reduced PDR. For DSR, theaverage improvement for PDR is at least 31 percentage po<strong>in</strong>ts and 24 percentagepo<strong>in</strong>ts for AODV. For total number of control messages, the new threshold can reduceat least 77% for DSR, and 65% for AODVFor different mobility patterns and different β values, AODV has higher packet deliveryratio than DSR with and without the new threshold. Part of the reason is that <strong>in</strong>DSR a node can reply to a Route Request from its route cache. Though the newthreshold has blocked the weak l<strong>in</strong>ks, the rest of the route still cannot be verified.Under a shadow<strong>in</strong>g model, the cached routes are more likely out of date.When the new threshold is applied, the route reply ratio decreases rapidly, especially<strong>in</strong> DSR, as low as one tenth of orig<strong>in</strong>al DSR’s. This means that a number of weakl<strong>in</strong>ks have been blocked. Also, DSR has higher route reply ratio than AODV, because<strong>in</strong> DSR nodes are set <strong>in</strong> promiscuous mode, so that they can copy the routes from thepackets to their route caches.The average hop count <strong>in</strong>creases faster <strong>in</strong> AODV than <strong>in</strong> DSR with the newthreshold, but its average packet latency is comparable to DSR. This is because ofDSR’s salvag<strong>in</strong>g mechanism. A node might try several times to send a packet to thenext hop, if it failed, then it will try another route <strong>in</strong> its route cache to send the packet.The packet delivery rate decreases with <strong>in</strong>creas<strong>in</strong>g β value, which means shortertransmission range. A packet requires more hops to reach the dest<strong>in</strong>ation and it hashigher possibility to drop because of the power fluctuation.5 Conclusions and Future WorkWith a shadow<strong>in</strong>g model, the signal strength will fluctuate <strong>by</strong> several order of magnitudes,so the l<strong>in</strong>ks appear to become unstable. The consequence is decreased packetdelivery ratio, <strong>in</strong>creased control messages and longer packet latency. In this paper, wepropose a new signal strength threshold applied <strong>in</strong> the Route Discovery process toselect reliable l<strong>in</strong>ks, then the route can resist to fluctuation caused <strong>by</strong> shadow<strong>in</strong>g effect.Also unnecessary control messages are elim<strong>in</strong>ated for DSR. After these modificationsto DSR and AODV, <strong>in</strong> most cases the packet delivery ratio significantly <strong>in</strong>creasesand the number of control messages and packet latency are considerablyreduced.


On-demand Rout<strong>in</strong>g <strong>in</strong> MANETs 47In the ideal environment, hop count is a valid metric for select<strong>in</strong>g routes. But withshadow<strong>in</strong>g model, the shortest path means that there is high possibility that two nodesare on the edge of their transmission ranges. If signal power fluctuates, the l<strong>in</strong>k willbe assumed broken, or more retransmissions are needed to send packets successfully.Based on the wok we did so far, we believe l<strong>in</strong>k status may be a better metric forselect<strong>in</strong>g routes <strong>in</strong> shadow<strong>in</strong>g model. The l<strong>in</strong>k status of a node is a historic recordwith its neighbors. A node may not add the l<strong>in</strong>k to the route if the l<strong>in</strong>k is weak. Thisl<strong>in</strong>k status will be monitored passively to reduce overhead. A node may keep multipleroutes to the same dest<strong>in</strong>ation, and these routes can be ordered based on their status.Updat<strong>in</strong>g the route status is a future research topic, especially for <strong>in</strong>active routes.However, salvag<strong>in</strong>g is a mechanism that has to be used carefully. Sometimes thesender may salvage the packet only because of not receiv<strong>in</strong>g the ACK. The consequenceof aggressively us<strong>in</strong>g salvag<strong>in</strong>g is that the same packet is transmitted on multipleroutes to the same dest<strong>in</strong>ation, and multiple Route Error messages are sent to thesource, which cause longer packet delay, duplicated packets and wastes network resource.We are currently work<strong>in</strong>g on(1) Route ma<strong>in</strong>tenance: because of node mobility, selected solid routes may becomeunstable aga<strong>in</strong>. A node may monitor the signal strength for packets received/overheardfrom its neighbors, and <strong>in</strong>form the source once the l<strong>in</strong>k quality drops below acerta<strong>in</strong> threshold. Alternatively, a node could monitor the number of retransmissionattempts necessary to forward a packet to the next node and deduce the l<strong>in</strong>k qualityand its rate of change <strong>in</strong> that way.(2) F<strong>in</strong>d<strong>in</strong>g an appropriate threshold for different node density and β values. We canalso use different thresholds for Route Requests and Route Replies so that a sourcecan discover at least one route to send packets. This may be done adaptively, where asource node may have to reduce the threshold if it cannot discover a route.(3) More formally def<strong>in</strong><strong>in</strong>g equivalent simulation scenarios under different parametersof the physical layer model as well as explor<strong>in</strong>g additional physical layer models.References1. C. E. Perk<strong>in</strong>s and P. Bhagwat, Highly Dynamic Dest<strong>in</strong>ation-Sequenced Distance-VectorRout<strong>in</strong>g (DSDV) for Mobile <strong>Computer</strong>s, Proceed<strong>in</strong>gs of the Conference on CommunicationsArchitectures, Protocols and Applications, pages 234-244, London, England August,1994.2. V. Park and M.S. Corson, A Highly Adaptive Distributed Rout<strong>in</strong>g Algorithm for MobileWireless Networks, Proceed<strong>in</strong>gs of the IEEE Conference on <strong>Computer</strong> Communications(INFOCOM ’97), Kobe, Japan, April 1997.3. D. B. Johnson and D. A. Maltz, Dynamic Source Rout<strong>in</strong>g <strong>in</strong> Ad Hoc Wireless Networks.In Mobile Comput<strong>in</strong>g, Chapter 5, pages 153-181, Kluwer Academic Publishers, 1996.4. R. Dube et al., Signal Stability-Based Adaptive Rout<strong>in</strong>g (SSA) for Ad Hoc Networks.IEEE Personal Communications, February 1997.5. C. E. Perk<strong>in</strong>s and E. M. Royer, Ad-hoc On-Demand Distance Vector Rout<strong>in</strong>g. Proceed<strong>in</strong>gsof the 2 nd IEEE Workshop on Mobile Comput<strong>in</strong>g Systems and Applications, pages 90-100,New Orleans, LA, February 1999.


48 L. Q<strong>in</strong> and T. Kunz6. J. Broch et al., A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Rout<strong>in</strong>gProtocols. Proceed<strong>in</strong>gs of the Fourth Annual ACM/IEEE International Conference onMobile Comput<strong>in</strong>g and Network<strong>in</strong>g, Dallas, TX, October 1998.7. R. Samir et al., Performance Comparison of Two On-demand Rout<strong>in</strong>g Protocols for AdHoc Networks. Proceed<strong>in</strong>gs of the IEEE Conference on <strong>Computer</strong> Communications(INFOCOM), pages 30-12, Tel Aviv, Israel, March 2000.8. M. Takai, R. Bagrodia, K. Tang and M. Gerla, Efficient Wireless Network Simulationswith Detailed Propagation Models. Wireless Networks, pages 297-305, Vol. 7 No. 3, May2001.9. T. Goff and N. B. Abu-Ghazaleh, Preemptive Rout<strong>in</strong>g <strong>in</strong> Ad Hoc Networks. Proceed<strong>in</strong>gsof the Seventh Annual International Conference on Mobile Comput<strong>in</strong>g and Network<strong>in</strong>g,pages 43-52, Rome, Italy, July 2001.10. T. S. Rappaport, Wireless Communications: Pr<strong>in</strong>ciples and Practice. Second edition. 2002,Prentice Hall PTR. ISBN 0-13-042232-0.11. E. M. Royer and C. -K. Toh, A Review of Current Rout<strong>in</strong>g Protocols for Ad-Hoc MobileWireless Networks. IEEE Personal Communications Magaz<strong>in</strong>e, pages 46-55, April 1999.12. K. Fall and K. Varahan, editors. NS <strong>Notes</strong> and Documentation. The VINT Project, UCBerkeley, LBL, USC/ISI, and Xerox PARC, November 1997, seehttp://www.isi.edu/nsnam/ns/.13. C. Bettstetter, On the M<strong>in</strong>imum Node Degree and Connectivity of a Wireless MultihopNetwork. Proceed<strong>in</strong>gs of the 3rd ACM International Symposium on Mobile Ad Hoc Network<strong>in</strong>gand Comput<strong>in</strong>g (MobiHoc), pages 80-91, Lausanne, Switzerland, June 2002.


Architecture and Algorithms for Real-Time MobilityManagement <strong>in</strong> Mobile IP NetworksMarcell<strong>in</strong> Diha 1 and Samuel Pierre 21Mobile Comput<strong>in</strong>g and Network<strong>in</strong>g Research Laboratory (LARIM),Department of <strong>Computer</strong> Eng<strong>in</strong>eer<strong>in</strong>g,Ecole Polytechnique of Montreal, P.O. Box 6079,Station Centre-ville, Montreal, Quebec, Canada, H3C 3A7marcell<strong>in</strong>.diha@motorola.com2Mobile Comput<strong>in</strong>g and Network<strong>in</strong>g Research Laboratory (LARIM),Department of <strong>Computer</strong> Eng<strong>in</strong>eer<strong>in</strong>g,Ecole Polytechnique of Montreal, P.O. Box 6079,Station Centre-ville, Montreal, Quebec, Canada, H3C 3A7samuel.pierre@polymtl.caAbstract. This paper proposes new network architecture and algorithms forreal-time mobility management <strong>in</strong> mobile IP networks. The proposed architectureand algorithms offer a better performance based on the call-to-mobility ratio(CMR) and require less time for the location update and the tunnel<strong>in</strong>g comparedwith the Mobile IP model. These results are very useful and <strong>in</strong>terest<strong>in</strong>gfor a real-time context where the factor time is very important.1 IntroductionThe development of cellular networks brought many changes <strong>in</strong> the telephony area.Voice and ma<strong>in</strong>ly data transmission have <strong>in</strong>creased a lot. The traditional telephonymade place to new types of services that <strong>in</strong>tegrate both voice and data. It leads to thedesign and implementation of new hybrid networks able to fulfill this need. Themean-term goal is to have cellular networks entirely based on the IP protocol. Butseveral problems must be solved before achiev<strong>in</strong>g this goal. Among these problems isthe mobility management <strong>in</strong> IP networks because orig<strong>in</strong>ally these networks weredesigned fix. In addition, the real-time aspect that is not supported <strong>in</strong> the actual IPprotocol must also be addressed.The IETF developed a mobile version of IP protocol able to manage users’ mobility<strong>in</strong> IP networks [4], [6]. Three ma<strong>in</strong> algorithms are proposed for mobility management:users’ registration to a local router, foreign routers’ discovery and locationupdate when users are away from their home network, and f<strong>in</strong>ally tunnel<strong>in</strong>g and datarout<strong>in</strong>g to mobile users. The Mobile IP protocol is implemented <strong>in</strong> several local areanetworks and works well. But real-time features are not supported <strong>in</strong> the protocol.This paper proposed new network architecture and real-time mobility managementalgorithms based on the exist<strong>in</strong>g ones. The rema<strong>in</strong>der of this paper is organized asfollows. In Section 2, background and related work are presented. Section 3 describedS. Pierre, M. Barbeau, and E. Kranakis (Eds.): ADHOC-NOW 2003, LNCS <strong>2865</strong>, pp. 49–59, 2003.© Spr<strong>in</strong>ger-Verlag Berl<strong>in</strong> Heidelberg 2003


50 M. Diha and S. Pierrethe proposed architecture and algorithms as well a performance analysis. Section 4presents some simulation results and analysis. F<strong>in</strong>ally, the paper concludes with adiscussion on open problems faced <strong>by</strong> real-time mobility management <strong>in</strong> IP networks.2 Background and Related WorkThere are two major components <strong>in</strong> mobility management: handover managementand location management [1], [9].Handover management is the way a network uses to ma<strong>in</strong>ta<strong>in</strong> connection to a mobileuser as it moves and changes its access po<strong>in</strong>t to the network. In general, there aretwo types of handover: <strong>in</strong>tra-cell handover and <strong>in</strong>ter-cell handover [1]. The first typeoccurs when with<strong>in</strong> a cell a user experiences degradation of signal strength. Thisleads to a choice of new channels hav<strong>in</strong>g better signal strength at the same BaseTransceiver Station (BTS). The second type occurs when a user moves from one cellto another cell. In this case, the user’s connection <strong>in</strong>formation is transferred from theold BTS to the new one. In both <strong>in</strong>tra-cell and <strong>in</strong>ter-cell handover, the follow<strong>in</strong>g procedureis performed. First, the user <strong>in</strong>itiates a handover procedure. Then the networkor the mobile (depend<strong>in</strong>g on the unit that controls the handover operation) providesnecessary <strong>in</strong>formation and performs rout<strong>in</strong>g operations for the handover. F<strong>in</strong>ally, allsubsequent calls to the user are transferred from the old connection to the new one.Location management is the process a network uses to f<strong>in</strong>d the current attachmentpo<strong>in</strong>t of a mobile user for call delivery. The first step of the procedure is the locationregistration. In this phase, the mobile user periodically notifies the network of its newaccess po<strong>in</strong>t. The notifications allow the network to authenticate the user and updateits location profile. The second step is the call delivery. When a call belong<strong>in</strong>g to auser reached the network, a search for the user’s profile is made usually <strong>in</strong> a localdatabase. Then the call is forwarded to the user based on the <strong>in</strong>formation conta<strong>in</strong>ed <strong>in</strong>its profile.Mobility support <strong>in</strong> the IP protocol has been developed <strong>by</strong> the IETF lead<strong>in</strong>g to theMobile IP protocol [3], [6], [8]. Currently two versions of Mobile IP are available,versions 4 (IPv4) and 6 (IPv6). In this paper we focus on IPv4 s<strong>in</strong>ce it is actually themost implemented one.A Mobile Node (MN) is a node able to move from one subnet to another withoutany need of chang<strong>in</strong>g its IP address. The MN accesses the Internet via a Home Agent(HA) or a Foreign Agent (FA). The Correspondent Node (CN) is a node establish<strong>in</strong>ga connection with the MN. The HA is a local router on the MN’s home network andthe FA is a router on the visited network.The follow<strong>in</strong>g operations are <strong>in</strong>troduced <strong>by</strong> the Mobile IP protocol [4], [6].1. Discovery: How an MN f<strong>in</strong>ds an agent (HA or FA).2. Registration: How an MN registers with its HA.3. Rout<strong>in</strong>g and Tunnel<strong>in</strong>g: How an MN receives datagrams when visit<strong>in</strong>g a foreignnetwork [5], [7].


Architecture and Algorithms for Real-Time Mobility Management 51Location management operations <strong>in</strong>clude agent discovery, movement detection,form<strong>in</strong>g care-of-address, and location update. Handover operations <strong>in</strong>clude rout<strong>in</strong>gand tunnel<strong>in</strong>g.Figure 1 illustrates Mobile IP network architecture.MNHACNIP NetworkMNFAFig. 1. Mobile IP network architecture3 Architecture and Algorithms ProposedThis section presents a new Mobile IP network architecture and new algorithms support<strong>in</strong>greal-time features as well as performance analysis.3.1 Proposed ArchitectureFigure 2 shows the proposed Mobile IP network architecture.MNCN1HACNnFAIP NetworkMNFA2MNnFAFig. 2. Proposed architecture of Mobile IP networkThe architecture <strong>in</strong>troduces the follow<strong>in</strong>g ma<strong>in</strong> features:1. Real-time algorithms support.2. Connection of MNs and CNs to an FA or HA with different arrival rates <strong>in</strong> thenetwork.


52 M. Diha and S. Pierre3. All procedures associated with an MN (registration, discovery, tunnel<strong>in</strong>g and rout<strong>in</strong>g)represent different tasks with a specific priority.4. Multiprocessor agent (HA or FA). In this paper the emphasis is put on the HA.Also the Home Agent is redundant to allow failure recovery.5. A ma<strong>in</strong> processor dispatch<strong>in</strong>g the different tasks arriv<strong>in</strong>g on an agent.6. A set of faster processors is def<strong>in</strong>ed to process high-priority tasks.7. Architecture allow<strong>in</strong>g different speeds for the processors.3.2 Proposed AlgorithmsBased on the architecture described above, a set of new algorithms has been def<strong>in</strong>edfor mobility management. These algorithms are derived from Mobile IPv4 algorithms[6]. They <strong>in</strong>troduce the notion of priority management <strong>in</strong> a real-time context. The newdiscovery algorithm adds the rang<strong>in</strong>g concept <strong>in</strong> addition to the lifetime used <strong>in</strong> MobileIPv4. Also it allows the MN to <strong>in</strong>itiate Foreign Agents search at startup <strong>in</strong> steadof wait<strong>in</strong>g advertisements. In addition, this algorithm allows the MN to keep a list ofthe most recent Foreign Agents that it tries to contact first before <strong>in</strong>itiat<strong>in</strong>g any broadcastsearch.3.2.1 Tasks Schedul<strong>in</strong>g and Assignment Algorithm-Given i counter of tasks and j counter of processors.-Given n tasks TSK 1, …,TSK i, …, TSK nwith the priorities p 1, … p i, … p n.-Given S a set of faster processors and p sthreshold of a critical task.-Given u(i) the utilization rate of the task TSK iand U(j) a vector of u(i) on P j.BEGIN-i= 1, U(j)= 0, S =1.-Sort the n tasks based on u(i) on P 0.WHILE i ≤ n DOj = m<strong>in</strong>{k|U(k) + u(i) = 1}IF ( (p i> p s) && ( ∃ P R∈S | ∑ U(P R) < 1)) ) THEN TSK i→ P RELSE TSK i→ Pji ← i + 1END WHILEEND BEGINFig. 3. Task schedul<strong>in</strong>g and assignment algorithmThe schedul<strong>in</strong>g part of the algorithm is based on the EDF algorithm [2] while theassignment part is a totally new concept s<strong>in</strong>ce it based on a multiprocessor architecture.The tasks are sorted based on the deadl<strong>in</strong>e and assigned to the processors. If atask is critical (short deadl<strong>in</strong>e), it is assigned to a faster processor. If not it is assignedto a normal processor. A task is assigned to a processor only if its current utilization


Architecture and Algorithms for Real-Time Mobility Management 53rate is less than 1. This ensures that a processor is not used at its full capacity whileothers are unused.3.2.2 Registration AlgorithmThe registration procedure is a task runn<strong>in</strong>g on the HA with the highest priority. Itcan preempt any other mobility management task for a given user. For example, dur<strong>in</strong>ga tunnel<strong>in</strong>g procedure, if a registration request is received for the same user, thetunnel<strong>in</strong>g process will be delayed until the registration is done. The different stages ofthe algorithm are described as follow.1. MN sends a registration request to the HA.2. HA verifies IF a task other than the registration is <strong>in</strong> process for the same user.IF yes THEN the task is preempted <strong>by</strong> the registration task.3. HA sends a response to the MN.4. IF request accepted THEN registration procedure done ELSE MN retries UNTILrequest accepted.3.2.3 Discovery AlgorithmThe discovery algorithm <strong>in</strong>troduces also the notion of priority <strong>in</strong> a real-time environmentand it is based on the lifetime expiration and the rang<strong>in</strong>g. The discovery procedurehas the second highest priority. The different steps are described as follow.1. IF first time startup THEN MN sends a broadcast advertisement.2. FAs verify if no higher priority task is be<strong>in</strong>g executed for the same MN.IF yes THEN delay discovery process UNTIL high-priority task execution is done.3. FAs send responses back to MN.4. MN chooses FA with most strong signal strength and records the lifetime, the careof-addressand the FA’s IP address.5. IF lifetime expires or the MN starts go<strong>in</strong>g out of range (wick signal strength)THEN send registration request to Foreign Agents <strong>in</strong> the MN’s local database.IF no FA responds back THEN broadcast a discovery advertisement message.6. REPEAT steps 2 through 4 UNTIL registration succeed.7. IF registration succeeds THEN MN sends new location <strong>in</strong>formation to HA forlocation update.3.2.4 Rout<strong>in</strong>g and Tunnel<strong>in</strong>g AlgorithmThe new rout<strong>in</strong>g and tunnel<strong>in</strong>g algorithm also <strong>in</strong>troduces the notion of priority <strong>in</strong> areal-time environment. This procedure has the lowest priority. Thus, dur<strong>in</strong>g a tunnel<strong>in</strong>gprocedure, if a registration procedure is received for the same user, the locationprocedure will be suspended until the registration is done. The steps of the algorithmare the follow<strong>in</strong>g:1. HA receives data for an MN.2. HA verifies if a registration request is made for the same user.IF yes THEN HA suspends tunnel<strong>in</strong>g process until registration is done.3. IF MN <strong>in</strong> local network THEN delivered packets us<strong>in</strong>g normal IP packets deliveryprocedure ELSE forward packets to MN via its current FA.


54 M. Diha and S. Pierre3.3 Performance AnalysisThe performance analysis is based on the CMR (Call-to-Mobility Ratio). The CMR isthe average number of messages send to a user divided <strong>by</strong> the average number ofnetworks or subnets visited <strong>by</strong> the user <strong>in</strong> a given time stamp. The goal of the CMRanalysis is to determ<strong>in</strong>e the ratio <strong>by</strong> which the proposed model reduces the locationupdate and the tunnel<strong>in</strong>g times.CMRλ=µWhere λ is the average number of messages send to a user and µ the average numberof subnets or networks visited <strong>by</strong> the user between two consecutives messages.We def<strong>in</strong>e the follow<strong>in</strong>g parameters to compare the CMR <strong>in</strong> the Mobile IP and theproposed models:U cost for location update procedure execution <strong>in</strong> the Mobile IP model;L cost for tunnel<strong>in</strong>g procedure execution <strong>in</strong> Mobile IP model;u cost for location update procedure execution <strong>in</strong> the proposed model;l cost for tunnel<strong>in</strong>g procedure execution <strong>in</strong> the proposed model;T cost to cross a boundary between two subnets;U MIPtotal cost for the location update procedure <strong>in</strong> Mobile IP model;L MIPtotal cost for tunnel<strong>in</strong>g procedure execution <strong>in</strong> Mobile IP model;C MIPtotal cost for location update and tunnel<strong>in</strong>g procedures execution <strong>in</strong> MobileIP model;U PROPtotal cost for location update procedure <strong>in</strong> the proposed model;total cost for tunnel<strong>in</strong>g procedure execution <strong>in</strong> the proposed model;L PROPC PROPtotal cost for location update and tunnel<strong>in</strong>g procedures execution <strong>in</strong> the proposedmodel.The total costs are obta<strong>in</strong>ed as follows:U MIP=UCMR(1)(2)UCMIP = UMIP+ LMIP+ T = + L + TCMRCU PROP=uCMRu= UPROP+ LPROPT = + l + TCMRPROP+(3)(4)(5)


Architecture and Algorithms for Real-Time Mobility Management 55Our goal is to reduce the location update and the tunnel<strong>in</strong>g times <strong>by</strong> respectively atleast 50% and 25%. Then u = U/2 and l = L/4. We make the follow<strong>in</strong>g assumptionsto simplify the analysis L = U, T = U/4 = u/2 and U = 1, that leads to:UUPROPU= =u uMIP1(6)CCMIPPROPLLMIP 2PROPL= =l uU (4 + 5CMR)4 + 5CMR==4u+ 2CMR4u+ 2CMR(7)(8)Figures 4 shows the location update cost for different values of the CMR andu = 0.2.Location updatetotal cost25201510500 1 2CMRProposedMIPFig. 4. Comparison of location update total cost (u = 0.2)Figures 5 illustrates the location update cost for different values of the CMR andu = 0.5.Location updatetotal cost25201510500 1 2CMRProposedMIPFig. 5. Comparison of location update total cost (u = 0.5).Figure 6 shows the location update cost and the ratio C MIP/C PROPfor different valuesof the CMR for u = 0.2 and 0.5.


56 M. Diha and S. PierreCmip/Cprop0.90.80.70.60.50.5 1 1.5 2CMRu = 0.5u = 0.2Fig. 6. Comparison of ratio C MIP/C PROPOn Figures 4 and 5 we noticed that the proposed model reduces <strong>by</strong> 80% the locationupdate time for u = 0.2 and <strong>by</strong> 50% for u = 0.5 for small values of the CMR. Thereason is that <strong>in</strong> this case the mobile users make an important number of locationupdate requests and the process<strong>in</strong>g on the multiprocessor HA <strong>in</strong> the proposed architectureis faster compared with the mobile IP model. When the CMR <strong>in</strong>creases, themobile users stay longer <strong>in</strong> the same network and, <strong>in</strong> this case, the location updatetime decreases and is near 0 for the two models. For the total costs (location updateplus tunnel<strong>in</strong>g) shown <strong>in</strong> Figure 6, the reduction is between 67% and 80% for u = 0.2and between 50% and 60% for u = 0.5.We can conclude that the proposed model offers a better performance based on theCMR. Indeed, it takes less time for the location update and the tunnel<strong>in</strong>g <strong>in</strong> the proposedmodel compared with the Mobile IP model. These results are very useful and<strong>in</strong>terest<strong>in</strong>g for a real-time context where the factor time is very important. To validatethe analysis, we conducted different simulations <strong>in</strong> section 4.4 Computational ResultsFigure 7 shows the setup for the different simulations. The network used is anEthernet based LAN 10/100 Mbps with an 8-Port Ethernet Hub.Fig. 7. Simulation SetupWe simulated the implementation of the current mobile IP algorithms as well asthe proposed architecture and algorithms <strong>in</strong> a real-time environment us<strong>in</strong>g VxWorksas real-time Operat<strong>in</strong>g System runn<strong>in</strong>g on a MPPC (Motorola TM Power PC). Our


Architecture and Algorithms for Real-Time Mobility Management 57simulations focus on the location update average time, the tunnel<strong>in</strong>g average time, thenumber of tasks miss<strong>in</strong>g their deadl<strong>in</strong>e depend<strong>in</strong>g on the number and the speed of theprocessors on the HA.4.1 Location Update Average TimeIn the Mobile IP model, the location update time is constant and does not depend onthe user’s arrival rate <strong>in</strong> the network. The location update average rate value is around1 sec. In the proposed model, the location update time <strong>in</strong>crease with the user’s arrivalrate. The maximum value is around 0.8 s. For small value of the arrival rate, fewusers arrived <strong>in</strong> the network and only few processors are used for the process<strong>in</strong>g <strong>in</strong>creas<strong>in</strong>gthe location update time. But when the arrival rate <strong>in</strong>crease, many usersarrived <strong>in</strong> the network and the process<strong>in</strong>g is faster for the multiprocessor architecture<strong>in</strong> the proposed model. Overall the location update time is reduces <strong>by</strong> 20 % to 80% <strong>in</strong>the proposed model which is above the targeted objective of 50%.Figure 8 shows the location update average time for different arrival time <strong>in</strong> thenetworks.Location update time(ms)120010008006004002000100100050001000060000100000Arrival rateFig. 8. Location update average timeMIPProposed4.2 Tunnel<strong>in</strong>g Average TimeFigure 9 illustrates the tunnel<strong>in</strong>g average time for different data sizes.Tunnel<strong>in</strong>g average time(ms)2000150010005000MIPProposed1000000800000600000400000200000500001000Data size (<strong>by</strong>tes)Fig. 9. Tunnel<strong>in</strong>g average time


58 M. Diha and S. PierreThe tunnel<strong>in</strong>g time is smaller <strong>in</strong> the proposed model compare to the Mobile IPmodel. The data process<strong>in</strong>g is faster because of the multiprocessor architecture. Themessages sent to the mobile users spend less time <strong>in</strong> the message queue on the HA. Inthe mobile IP model the message i + 1 will wait longer than the message i on themessage queue, <strong>in</strong>creas<strong>in</strong>g the process<strong>in</strong>g time. But <strong>in</strong> the proposed model the messagei + 1 can be process <strong>in</strong> parallel on a different processor while process<strong>in</strong>g themessage i on an other one. As a result the total time spent <strong>in</strong> the system is reduced.Overall the tunnel<strong>in</strong>g time is reduces <strong>by</strong> 10 % to 30% <strong>in</strong> the proposed model which isabove the targeted objective of 25%.4.3 Task Schedul<strong>in</strong>g and AssignmentFigure 10 shows the number of tasks miss<strong>in</strong>g their deadl<strong>in</strong>e for different number ofprocessors with different speeds follow<strong>in</strong>g Gaussian and exponential distributions.Missed deadl<strong>in</strong>es30201000 1000 2000 3000 4000Numebr of tasksFig. 10. Processors with different speeds distributionRate= meanRate = expo.V = gaussianThe number of tasks miss<strong>in</strong>g their deadl<strong>in</strong>e <strong>in</strong> the Gaussian distribution is lowercompare to the exponential distribution. The reason is that <strong>in</strong> the first case the speedsof the processors are close to the mean speed. It is the contrary <strong>in</strong> the exponential casewhere the distribution is larger with more low speeds. This leads to a higher ratioExecution Time/Processor Speed and number of missed deadl<strong>in</strong>es. So, for configurationswith different speeds, the speeds of the processors must follow a Gaussian distribution<strong>in</strong> order to have an optimal schedul<strong>in</strong>g and assignment for the tasks.5 ConclusionIn this paper we presented a Mobile IP architecture and mobility management algorithms<strong>in</strong> a real-time context. The implementation of the proposed architecture andalgorithms gave better results for the location update and tunnel<strong>in</strong>g average times aswell as the CMR compare to the exist<strong>in</strong>g architecture and algorithms. The locationupdate time is reduced <strong>by</strong> 20% to 80% while the tunnel<strong>in</strong>g time is reduced <strong>by</strong> 10% to30%. These results meet time constra<strong>in</strong>t <strong>in</strong> real-time systems. The multiprocessor


Architecture and Algorithms for Real-Time Mobility Management 59architecture is the core of the proposed model. It gives a faster parallel process<strong>in</strong>g forthe mobile users.The schedul<strong>in</strong>g and assignment algorithm is optimal for different number of processorswith different speeds. This achievement is someth<strong>in</strong>g new compare to actualreal-time multiprocessor schedul<strong>in</strong>g and assignment algorithms. In the current algorithms,the processors must have the same speed to guarantee an optimal schedul<strong>in</strong>gand assignment.Many <strong>in</strong>vestigations are on go<strong>in</strong>g <strong>in</strong> real-time mobility management for Mobile IPnetworks. The areas cover the implementation of real-time algorithms <strong>in</strong> real networksas well as proposition of new algorithms and architectures. Also, s<strong>in</strong>ce thecurrent protocols are designed for micro-mobility, the WAN and global roam<strong>in</strong>g areasare some new doma<strong>in</strong>s of <strong>in</strong>terest.References1. Akyildiz I. F., McNair J., Ho J. S. M., Uzunalioglu H., Wang W.: Mobility Management<strong>in</strong> Next-Generation Wireless Systems, Proceed<strong>in</strong>gs of the IEEE, vol. 87, no. 8, pp. 1347-1384, Aug. 1999.2. Chrishna C.M., Kang G. S.: Real-Time Systems, McGraw Hill, 1997.3. D. B. Johnson, C. Perk<strong>in</strong>s: Mobility support <strong>in</strong> IPv6, Inter-net Eng<strong>in</strong>eer<strong>in</strong>g Task Force,Internet draft, draft-ietf-mobileip-ipv6-22.txt, May 2003.4. James D. S.: Mobile IP, The Internet Unplugged, Prentice Hall PTR, 1998.5. P. Calhoun, C. Perk<strong>in</strong>s: Tunnel establishment protocol, Internet Eng<strong>in</strong>eer<strong>in</strong>g Task Force,Internet draft, draft-ietf-mobileip-calhoun-tep-01.txt, March 1998.6. Perk<strong>in</strong>s C.: IP Mobility Support, Internet Eng<strong>in</strong>eer<strong>in</strong>g Task Force, RFC 2002, Oct. 1996.7. Perk<strong>in</strong>s C. and Johnson D. B.: Route Optimization <strong>in</strong> Mobile IP, Internet Eng<strong>in</strong>eer<strong>in</strong>gTask Force, Internet drafts, draft-ietf-mobileip-optim-11.txt, Sept. 2001.8. Perk<strong>in</strong>s C.: M<strong>in</strong>imal Encapsulation with<strong>in</strong> IP, Internet Eng<strong>in</strong>eer<strong>in</strong>g Task Force, RFC2004, Oct. 1996.9. R. Caceres and V. Padmanabhan: Fast and scalable handoffs for wireless networks, <strong>in</strong>Proc. ACM/IEEE MOBICOM’96, pp.56–66.


Proactive QoS Rout<strong>in</strong>g <strong>in</strong> Ad Hoc NetworksY<strong>in</strong>g Ge 1 , Thomas Kunz 2 , and Louise Lamont 11Communications Research Center, 3701 Carl<strong>in</strong>g Ave, Ottawa, ON K2H 8S2{y<strong>in</strong>g.ge,louise.lamont@crc.ca}2Dept. of Systems and <strong>Computer</strong> Eng<strong>in</strong>eer<strong>in</strong>g, Carleton University, Ottawa, ON K1S 5B6tkunz@sce.carleton.caAbstract. In this paper, we analyze the advantages and disadvantages of theproactive QoS rout<strong>in</strong>g <strong>in</strong> ad-hoc networks. We discuss how to support bandwidthQoS rout<strong>in</strong>g <strong>in</strong> OLSR (Optimized L<strong>in</strong>k State Protocol), a best-effort proactiveMANET rout<strong>in</strong>g protocol. Us<strong>in</strong>g OPNET, we simulate the algorithm,explor<strong>in</strong>g both traditional rout<strong>in</strong>g protocol performance metrics and QoSspecificmetrics. Our analysis of the simulation results shows that the additionalmessage overhead generated <strong>by</strong> the proactive QoS rout<strong>in</strong>g have a negative impacton the performance of the rout<strong>in</strong>g protocol. Given the negative results, weidentified research areas that would be worthwhile <strong>in</strong>vestigat<strong>in</strong>g <strong>in</strong> order to obta<strong>in</strong>better performance results.1 IntroductionQoS rout<strong>in</strong>g <strong>in</strong> Ad-Hoc network is difficult. To support QoS rout<strong>in</strong>g, the l<strong>in</strong>k statemetrics such as delay, bandwidth, jitter, loss rate and error rate <strong>in</strong> the network shouldbe available and manageable. However, gett<strong>in</strong>g and manag<strong>in</strong>g such l<strong>in</strong>k state <strong>in</strong>formation<strong>in</strong> a MANET is not trivial because the quality of a wireless l<strong>in</strong>k changes quitefrequently due to mobility and variations <strong>in</strong> the surround<strong>in</strong>gs. In addition, it is alsocomplex to evaluate the QoS rout<strong>in</strong>g performance. Compared to the traditional besteffortrout<strong>in</strong>g, QoS rout<strong>in</strong>g has two additional overheads – “computational cost” and“protocol overhead” [2]. “Computational cost” comes from the more frequent pathselection computations, s<strong>in</strong>ce besides ma<strong>in</strong>ta<strong>in</strong><strong>in</strong>g the source-dest<strong>in</strong>ation connection,additional computations are needed to determ<strong>in</strong>e paths that satisfy the QoS demands.The additional “protocol overhead” comes from the need to distribute the frequentlyupdated l<strong>in</strong>k state <strong>in</strong>formation. There is a trade-off between the QoS performance theQoS rout<strong>in</strong>g protocol achieves and the additional cost it <strong>in</strong>troduces.In on-demand QoS protocols such as [3] and [11], a route is found based on specificQoS requirements. However, the unpredictable nature of Ad-Hoc networks andthe requirement of quick reaction to QoS demands make the idea of a proactive protocolmore suitable. When a request arrives, the control layer can easily check if thepre-computed optimal route can satisfy such a request. Thus, waste of network resourceswhen attempt<strong>in</strong>g to discover <strong>in</strong>feasible routes is avoided. These advantages ofthe proactive QoS rout<strong>in</strong>g motivate us to look <strong>in</strong>to this area. However, similar to aproactive best-effort rout<strong>in</strong>g protocol, a proactive QoS rout<strong>in</strong>g may <strong>in</strong>troduce “protocol”overhead. Do these additional overhead have a negative effect on the Ad-Hocnetwork? If yes, then how much additional overhead does a proactive QoS rout<strong>in</strong>gprotocol <strong>in</strong>troduce <strong>in</strong>to the network? How does the additional overhead affect theperformance of the rout<strong>in</strong>g protocol? Can we m<strong>in</strong>imize the costs to achieve betterS. Pierre, M. Barbeau, and E. Kranakis (Eds.): ADHOC-NOW 2003, LNCS <strong>2865</strong>, pp. 60–71, 2003.© Spr<strong>in</strong>ger-Verlag Berl<strong>in</strong> Heidelberg 2003


Proactive QoS Rout<strong>in</strong>g <strong>in</strong> Ad Hoc Networks 61performance? Or should we just give up on proactive QoS rout<strong>in</strong>g? The goal of thispaper is to <strong>in</strong>vestigate the answers to these questions through the performance evaluationof a proactive bandwidth QoS rout<strong>in</strong>g algorithm that we have proposed.In [5], we studied the approach of proactive QoS rout<strong>in</strong>g and proposed 3 heuristicsthat allow OLSR (Optimized L<strong>in</strong>k State Protocol [8]) to pre-compute the best bandwidthroute among all the possible routes. That work presents the performance of theheuristics <strong>in</strong> a static network. In this paper, we implement one QoS OLSR heuristic,which guarantees to f<strong>in</strong>d the best bandwidth path <strong>in</strong> the static network and has comparablylow overhead, <strong>in</strong> OPNET and evaluate the rout<strong>in</strong>g algorithm’s performance withnode movements and data flows, and consequently, analyze the feasibility of proactiverout<strong>in</strong>g <strong>in</strong> MANET.The rest of the paper is organized as follows: a brief description of OLSR and QoSversions of OLSR is given <strong>in</strong> Section 2. The detailed implementation of QoS OLSR <strong>in</strong>OPNET is discussed <strong>in</strong> Section 3. Section 4 lists the OPNET simulation parametersand discusses the simulation results <strong>in</strong> OPNET. Section 5 analyses whether proactiveQoS rout<strong>in</strong>g is practical <strong>in</strong> an Ad-Hoc network and discusses future work.2 OLSR and QoS OLSRThe IETF’s MANET Work<strong>in</strong>g Group has <strong>in</strong>troduced the Optimized L<strong>in</strong>k State Rout<strong>in</strong>g(OLSR) protocol for mobile Ad-Hoc networks [8]. The protocol is an optimizationof the pure l<strong>in</strong>k state algorithm. The key concept used <strong>in</strong> the protocol is that ofmultipo<strong>in</strong>t relays (MPRs). The MPR set is selected such that it covers all nodes thatare two hops away. A node’s knowledge about its neighbors and two-hop neighborsis obta<strong>in</strong>ed from HELLO messages – the message each node periodically generates todeclare the nodes that it hears. The node N, which is selected as a multipo<strong>in</strong>t relay <strong>by</strong>its neighbors, periodically generates TC (Topology Control) messages, announc<strong>in</strong>gthe <strong>in</strong>formation about who has selected it as an MPR. Apart from generat<strong>in</strong>g TCsperiodically, an MPR node can also orig<strong>in</strong>ate a TC message as soon as it detects atopology change <strong>in</strong> the network. A TC message is received and processed <strong>by</strong> all theneighbors of N, but only the neighbors who are <strong>in</strong> N’s MPR set retransmit it. Us<strong>in</strong>gthis mechanism, all nodes are <strong>in</strong>formed of a subset of all l<strong>in</strong>ks – l<strong>in</strong>ks between theMPR and MPR selectors <strong>in</strong> the network. So, contrary to the classic l<strong>in</strong>k state algorithm,<strong>in</strong>stead of all l<strong>in</strong>ks, only small subsets of l<strong>in</strong>ks are declared. For route calculation,each node calculates its rout<strong>in</strong>g table us<strong>in</strong>g a “shortest hop path algorithm” basedon the partial network topology it learned. MPR selection is the key po<strong>in</strong>t <strong>in</strong> OLSR.The smaller the MPR set is, the less overhead the protocol <strong>in</strong>troduces. The proposedheuristic <strong>in</strong> [8] for MPR selection is to iteratively select a 1-hop neighbor that reachesthe maximum number of uncovered 2-hop neighbors as an MPR. If there is a tie, theone with higher degree (more neighbors) is chosen.Table 1. Node B’s MPR(s), based on Fig. 1.Node 1 Hop Neighbors 2 Hop Neighbors MPR(s)B A, C, F, G D, E CFrom the perspective of node B, both C and F cover all of node B’s 2-hopneighbors. However, C is selected as B’s MPR as it has 5 neighbors while F only has4 (C’s degree is higher than F).


62 Y. Ge, T. Kunz, and L. LamontFig. 1. Simple network. An edge between two nodes <strong>in</strong>dicates that the two nodes connected <strong>by</strong>this edge are with<strong>in</strong> reach of each other. The edge weight represents the QoS l<strong>in</strong>k attribute weare <strong>in</strong>terested <strong>in</strong>, available bandwidth.OLSR is a rout<strong>in</strong>g protocol for best-effort traffic, with emphasis on how to reducethe overhead. So <strong>in</strong> its MPR selection, the node selects the neighbor that covers themost unreachable 2-hop neighbors as MPR. However, <strong>in</strong> QoS rout<strong>in</strong>g, <strong>by</strong> such MPRselection mechanism, the “good quality” l<strong>in</strong>ks may be “hidden” to other nodes <strong>in</strong> thenetwork. As an example, we will consider the network topology <strong>in</strong> Fig. 1. In theOLSR MPR selection algorithm, node B will select C as its MPR. So for all the othernodes, they only know that they can reach B via C. Obviously, when D is build<strong>in</strong>g itsrout<strong>in</strong>g table, for dest<strong>in</strong>ation B, it will select the route D-C-B, whose bottleneckbandwidth is 3, the worst among all the possible routes. Also, when “bandwidth” isthe QoS constra<strong>in</strong>t, nodes can no longer use the “shortest hops path” algorithm asproposed <strong>in</strong> OLSR. Because of these limitations of OLSR <strong>in</strong> QoS rout<strong>in</strong>g, the QoSOLSR version revises it <strong>in</strong> two aspects: MPR selection and rout<strong>in</strong>g table computation.The decision on how each node selects its MPRs is essential to determ<strong>in</strong><strong>in</strong>g the optimalbandwidth route <strong>in</strong> the network. In select<strong>in</strong>g the MPRs, a “good bandwidth” l<strong>in</strong>kshould not be omitted. Based on this idea, we previously explored three revised MPRselection algorithms [5]. In this paper, we implement the best variant (OLSR_R2) <strong>in</strong>OPNET to compare its performance with the orig<strong>in</strong>al OLSR protocol. The idea beh<strong>in</strong>dOLSR_R2 is to select the best bandwidth neighbors as MPRs until all the 2-hopneighbors are covered.Table 2. Node B’s MPR(s), us<strong>in</strong>g OLSR_R2.Node 1 Hop Neighbors 2 Hop Neighbors MPR(s)B A, C, F, G D, E A, FAmong node B’s neighbors, A, C, and F have a connection to its 2-hop neighbors.Among them, l<strong>in</strong>k BA has the highest bandwidth. So A is first selected as B’s MPR,and the 2-hop neighbor D is covered. Similarly, F is selected as MPR next and E iscovered, so all 2-hop neighbors are covered and the algorithm term<strong>in</strong>ates. This revisedOLSR MPR selection algorithm improves the chance that a better bandwidthroute is found. However, <strong>by</strong> us<strong>in</strong>g such algorithm, the overhead also <strong>in</strong>creases becausethe number of MPRs <strong>in</strong> the network is <strong>in</strong>creased.


Proactive QoS Rout<strong>in</strong>g <strong>in</strong> Ad Hoc Networks 63Besides the MPR selection method, a node also needs to change the “shortest hopspath” algorithm <strong>in</strong> its rout<strong>in</strong>g table computation so as to f<strong>in</strong>d the best bandwidth route.We use the “Extended BF” algorithm [6], which computes the best bandwidth pathsfrom a source to any reachable dest<strong>in</strong>ations with m<strong>in</strong>imum hop count (shortest-widestpath).With bandwidth constra<strong>in</strong>t as QoS metric, it is reasonable to view the “bandwidth”as available bandwidth. Most probably, the devices <strong>in</strong> the Ad-Hoc network will beconfigured with the same wireless card, which means that all nodes <strong>in</strong> the networkhave the same maximum bandwidth. So we are only <strong>in</strong>terested <strong>in</strong> how much of therema<strong>in</strong><strong>in</strong>g bandwidth is available for new traffic. However, <strong>in</strong> real networks, bandwidthcomputation is a complex issue. Many papers such as [9] discuss how to computebandwidth <strong>in</strong> Ad-Hoc networks. Here, we use a rather simple and straightforwardapproach: measur<strong>in</strong>g how much time a node monitors an idle channel and thusis available to transmit new messages over a l<strong>in</strong>k (node’s idle time), which is similarto the approach suggested <strong>in</strong> [1].3 QoS OLSR Implementation <strong>in</strong> OPNETThe Naval Research Laboratory (NRL) of the United States Department of Defensedeveloped the orig<strong>in</strong>al OLSR model <strong>in</strong> OPNET. To implement the QoS versions ofthe OLSR protocol, besides chang<strong>in</strong>g the MPR selection mechanism and the rout<strong>in</strong>gtable calculation, the follow<strong>in</strong>g revisions are made to develop the QoS OLSR model.QoS OLSR uses the media idle time to reflect the available bandwidth over a l<strong>in</strong>k.Modify<strong>in</strong>g the standard OPNET Wireless LAN model achieves this task. EachOPNET OLSR node connects to the wireless media. The OPNET Wireless LANsimulation model <strong>in</strong>cludes a transmitter, and a receiver. If a node is send<strong>in</strong>g packets,its transmitter becomes busy. If there are other nodes beg<strong>in</strong>n<strong>in</strong>g transmission with<strong>in</strong>the <strong>in</strong>terference range of the current node, its receiver senses the busy media andsends a media busy signal. As the OPNET Wireless LAN model already def<strong>in</strong>es functionalitiesto capture changes of the media, the media idle time calculation, us<strong>in</strong>g aslid<strong>in</strong>g w<strong>in</strong>dow over the past 5 seconds, is straightforward.Also, the QoS OLSR versions need to know the available bandwidth on theneighbor l<strong>in</strong>k to select MPRs, and the available bandwidth of the far-away l<strong>in</strong>ks tocompute the rout<strong>in</strong>g table. As idle time should be used to calculate the availablebandwidth on the l<strong>in</strong>ks, we revise the format of OLSR Hello and TC messages to<strong>in</strong>clude the idle time.a. Hello message: <strong>in</strong> addition to the orig<strong>in</strong>al <strong>in</strong>formation such as neighbor addressand neighbor l<strong>in</strong>k type, a node also <strong>in</strong>cludes its own idle time <strong>in</strong> the Hello messages.Upon receiv<strong>in</strong>g a Hello message from its neighbor, a node reads the neighbor idletime, and selects MPRs us<strong>in</strong>g the QoS MPR selection algorithm.b. TC message: the TC message orig<strong>in</strong>ator not only puts its own idle time <strong>in</strong> TCmessages, but also piggybacks its MPR selectors’ idle times, which are obta<strong>in</strong>ed fromthe Hello messages. When a node receives TC messages, it knows the idle time <strong>in</strong>formationof both the TC message orig<strong>in</strong>ator and the MPR selectors, thus gets <strong>in</strong>formationabout the l<strong>in</strong>ks and the l<strong>in</strong>k bandwidth between the TC message orig<strong>in</strong>ator and


64 Y. Ge, T. Kunz, and L. Lamontits MPR selectors. In this way, it learns the partial network topology and the bandwidthcondition of that partial network, and is ready to calculate the rout<strong>in</strong>g table.Furthermore, QoS OLSR needs to decide when to orig<strong>in</strong>ate a TC message. In theorig<strong>in</strong>al OLSR, if a node detects changes <strong>in</strong> its MPR selector, it generates a new TCmessage to propagate the changes <strong>in</strong> the network topology. In QoS OLSR, however,changes <strong>in</strong> l<strong>in</strong>k bandwidth condition must also be propagated for the correct computationof the best bandwidth routes. If an MPR generates a TC message as soon as itdetects a bandwidth change over the l<strong>in</strong>k between its MPR selector and itself, therewill be many messages flood<strong>in</strong>g <strong>in</strong>to the network, caus<strong>in</strong>g extremely high overhead.So <strong>in</strong> our QoS OLSR version, a “threshold” of bandwidth change is def<strong>in</strong>ed. If anMPR f<strong>in</strong>ds there is “significant bandwidth change”, it will generate a new TC message<strong>in</strong>form<strong>in</strong>g the whole network about the change, enabl<strong>in</strong>g other nodes to updatetheir rout<strong>in</strong>g table reflect<strong>in</strong>g such changes. There is a tradeoff <strong>in</strong> how to def<strong>in</strong>e the“threshold”. On one hand, if the “threshold” is low, TC messages will be generated assoon as there is a small percentage change of the bandwidth. That will cause frequentgeneration of TC messages, <strong>in</strong>troduc<strong>in</strong>g high overhead, although more accuratebandwidth <strong>in</strong>formation is obta<strong>in</strong>ed. On the other hand, if the “threshold” is high, TCmessages will not be generated until there is a very large percentage change of thebandwidth. Thus, the overhead is reduced, but the nodes only obta<strong>in</strong> relatively <strong>in</strong>accuratebandwidth <strong>in</strong>formation. In the rest of the paper, we will utilize different “threshold”values to compare the network performance, and analyze the performance tradeoffs.4 OPNET SimulationThe follow<strong>in</strong>g environment parameters are def<strong>in</strong>ed for OPNET simulations:Movement Space: 1000m x 1000m flat spaceNumber of Nodes: 50 nodesSimulation Time: 900 seconds.Movement Model: each node randomly selects a dest<strong>in</strong>ation <strong>in</strong> the 1000m x 1000marea, moves to that dest<strong>in</strong>ation at a speed distributed uniformly between 0 and“maximum speed”. After it reaches the dest<strong>in</strong>ation, the node selects another dest<strong>in</strong>ationand another speed between 0 and “maximum speed”, and moves aga<strong>in</strong>. In the setof experiments reported here, we use 5 different “maximum speed” values: 20m/s,10m/s, 5m/s, 1m/s, and 0m/s.Communication Model: In each simulation, there are 20 communication pairs. Eachsource sends 64-<strong>by</strong>te UDP packets at a rate of 4 packets/second. So <strong>in</strong> total, 80 packetsare sent each second.OPNET Model Parameter: see Table 3.Rout<strong>in</strong>g Protocol: 4 rout<strong>in</strong>g protocols – Orig<strong>in</strong>al OLSR, QoS OLSR with 20%bandwidth updat<strong>in</strong>g threshold (20% OLSR), QoS OLSR with 40% bandwidth updat<strong>in</strong>gthreshold (40% OLSR), and QoS OLSR with 80% bandwidth updat<strong>in</strong>g threshold(80% OLSR). All the QoS OLSR algorithms use the OLSR_R2 [5] mechanism toselect MPRs, and the “Extended BF” algorithm to calculate the rout<strong>in</strong>g table.


Proactive QoS Rout<strong>in</strong>g <strong>in</strong> Ad Hoc Networks 65Table 3. OPNET Model Parameter.OLSRHello Interval 0.5sParameters TC Interval 2sData Rate2 MbpsWirelessBuffer Size256000 bitsLANRetry Limit 7ParametersWireless LAN Propagation Range250 MThe OPNET simulation results are grouped <strong>in</strong>to two sets: Basic Performance andQoS Performance (The data shown <strong>in</strong> this section are the average value from multipleruns.)Basic Performance – the basic performance is measured <strong>by</strong> a set of metrics used toevaluate most rout<strong>in</strong>g protocols: “Packet Delivery Ratio” and “End to End Delay”.Packet Delivery Ratio: percentage of packets that successfully reach the receiv<strong>in</strong>gnodes each second.End to End Delay: the average time between a packet be<strong>in</strong>g sent and be<strong>in</strong>g receivedQoS performance – metrics that relate to the bandwidth QoS rout<strong>in</strong>g studied <strong>in</strong> thispaper: “Error Rate” and “Bandwidth Difference”.Error Rate: the percentage of times the rout<strong>in</strong>g algorithms do not f<strong>in</strong>d the optimalbandwidth path.Bandwidth Difference: the average difference between the optimal bandwidth andthe detected non-optimal bandwidth <strong>in</strong> percentage.106.00%101.00%96.00%91.00%86.00%81.00%76.00%71.00%66.00%20m/s 10m/s 5m/s 1m/s 0m/sQoS 20% 66.89% 75.71% 84.66% 90.89% 98.15%QoS 40% 67.59% 79.21% 88.05% 94.31% 99.53%QoS 80% 72.05% 79.91% 89.46% 93.44% 97.58%Orig<strong>in</strong>al 75.75% 82.30% 87.81% 96.34% 96.56%QoS 20%QoS 40%QoS 80%Orig<strong>in</strong>alFig. 2. Packet Delivery Ratio under different movement patterns.Fig. 2 compares the packet delivery ratio of the 4 algorithms. From high movementto low movement, packet delivery ratio for all algorithms rises cont<strong>in</strong>uously. Withlower movement, the established l<strong>in</strong>ks between the nodes have a lower probability ofbreak<strong>in</strong>g, thus, there are less stale routes <strong>in</strong> the node rout<strong>in</strong>g tables, which results <strong>in</strong> ahigher ratio for correct packet delivery. In low movement scenarios (speed 5m/s,1m/s and 0m/s), the 4 algorithms achieve similar packet delivery ratio. However, <strong>in</strong>high movement scenario, the orig<strong>in</strong>al OLSR protocol has higher packet delivery ratio


66 Y. Ge, T. Kunz, and L. Lamontthan the 3 QoS versions, especially with a speed of 20m/s where the performancedifference between the QoS versions of OLSR and the orig<strong>in</strong>al OLSR protocol arestatistically significant. There are two ma<strong>in</strong> reasons:a. High Overhead: The orig<strong>in</strong>al OLSR protocol concentrates on how to reduce theoverhead, and m<strong>in</strong>imizes the MPR sets to reduce the TC messages flood<strong>in</strong>g <strong>in</strong>to thenetwork. However, the QoS versions of OLSR select the best bandwidth path, so <strong>in</strong>their MPR selection mechanism, they select neighbors with high idle time as MPR,result<strong>in</strong>g <strong>in</strong> a larger MPR set than the orig<strong>in</strong>al OLSR protocol. So more TC messagesare generated and relayed <strong>in</strong>to the network <strong>by</strong> QoS OLSR versions. (See Fig. 3)For all algorithms, there are fewer TC messages sent at lower movement than athigher movement. This is because at lower movement, less TC messages are generatedto reflect topology changes. Also, 20% OLSR has the highest number of TCmessages generated and relayed, while the orig<strong>in</strong>al OLSR protocol has the least numberof TC messages. Under the same speed, the difference of TC messages sent betweenthe orig<strong>in</strong>al OLSR protocol and the 3 QoS OLSR versions comes from twoaspects:1. The orig<strong>in</strong>al OLSR protocol only generates TC messages to reflect topologychange, while QoS OLSR versions also need to generate TC messages to reflectbandwidth change; with a lower bandwidth update threshold, more TC messagesare generated to reflect bandwidth change, caus<strong>in</strong>g the highest overhead <strong>in</strong> 20%OLSR2. QoS OLSR versions have larger MPR sets than the orig<strong>in</strong>al OLSR protocol, somore TC messages are generated and relayed <strong>by</strong> the larger MPR sets. Among theQoS OLSR algorithms, 20% OLSR may select more MPRs than 40% and 80%OLSR. With the possibly larger MPR set, more TC messages are generated andrelayed <strong>by</strong> 20% OLSR than 40% OLSR and 80% OLSR.Fig. 3. Average TC message overhead <strong>in</strong> the network (<strong>in</strong> packets/s) for the 4 algorithms.With higher overhead <strong>in</strong>troduced <strong>in</strong>to the network, especially for the 20% OLSR athigher movement, the wireless media is more heavily loaded.b. Incorrect Rout<strong>in</strong>g Table: if there are overlapped two hop neighbors covered <strong>by</strong>multiple MPRs, there is a high probability that TC packets collide at these neighbors,result<strong>in</strong>g <strong>in</strong> <strong>in</strong>accurate rout<strong>in</strong>g tables. This problem happens <strong>in</strong> all 4 OLSR algorithms.But because of the different MPR selection mechanism, the QoS OLSR algorithmshave more overlapped two hop neighbors than the orig<strong>in</strong>al OLSR protocol,caus<strong>in</strong>g more TC message collisions.


Proactive QoS Rout<strong>in</strong>g <strong>in</strong> Ad Hoc Networks 6730.0020.0010.000.0020m/s 10m/s 5m/s 1m/s 0m/sQoS 20% 24.92 14.82 9.55 9.20 13.05QoS 40% 20.16 13.70 10.43 9.84 9.04QoS 80% 24.70 18.88 7.78 7.09 8.11Orig<strong>in</strong>al 8.58 5.73 5.28 4.67 5.88QoS 20%QoS 40%QoS 80%Orig<strong>in</strong>alFig. 4. End-To-End Delay (ms) of data packets for 4 OLSR algorithms.Fig. 4 shows the End-to-End Delay for each algorithm under each movement pattern.Basically, for all movement patterns, the orig<strong>in</strong>al OLSR has the lowest delay.Furthermore, <strong>in</strong> the high movement scenarios, the delay between the QoS versions ofOLSR and the orig<strong>in</strong>al OLSR protocol is statistically different. As the orig<strong>in</strong>al OLSRhas the lowest overhead, its network is the least congested, result<strong>in</strong>g <strong>in</strong> the least delay.Also, the orig<strong>in</strong>al OLSR algorithm always computes the shortest hop path, while theQoS OLSR versions may compute longer paths because they target the best bottleneckbandwidth path, which also affects the end-to-end delay of the data packets.For the three QoS OLSR algorithms, we can see that at higher movement speed(20m/s and 10m/s), the 80% threshold QoS OLSR has a higher delay, while at lowermovement speed (5m/s, 1m/s and 0m/s), its delay is close to the orig<strong>in</strong>al OLSR. Toanalyze this phenomenon, recall that the 80% threshold QoS OLSR has the most<strong>in</strong>accurate bandwidth <strong>in</strong>formation of the network, which means that the rout<strong>in</strong>g algorithmmay select a route that is still relatively congested. At higher movement, all theQoS OLSR algorithms have higher overhead because of the frequent updates due totopology change (see Fig. 3), caus<strong>in</strong>g the network to be congested. Work<strong>in</strong>g on thealready congested networks, 20% QoS OLSR and 40% QoS OLSR do a better job <strong>in</strong>direct<strong>in</strong>g the traffic to the less congested routes, result<strong>in</strong>g <strong>in</strong> the lower packet delay.However, at lower movement speed, there are much less topology updates, so themore frequently sent bandwidth update messages <strong>in</strong> 20% and 40% OLSR tend tomake the network busy, result<strong>in</strong>g <strong>in</strong> a larger delay than the 80% OLSR.Fig. 5 and Fig. 6 show the “Average Difference” and “Error Rate” among the 4 algorithmsunder different movement patterns. All QoS OLSR outperform the orig<strong>in</strong>alOLSR <strong>in</strong> both the “Error Rate” and “Bandwidth Difference”. Among the QoS OLSRalgorithms, 20% OLSR updates the bandwidth condition most frequently, <strong>in</strong>troduc<strong>in</strong>gthe highest overhead, but gets the most accurate bandwidth <strong>in</strong>formation. So the routesit calculates are closest to the optimal routes. The 40% and 80% OLSR, however,update bandwidth <strong>in</strong>formation less frequently, <strong>in</strong>troduc<strong>in</strong>g less overhead, but theirQoS performances are not as good as that of 20% OLSR.The results for “Bandwidth Difference” and “Error Rate” of each algorithm arecalculated based on its own network conditions – the bandwidth difference betweenthe routes the rout<strong>in</strong>g algorithm calculated and the optimal paths <strong>in</strong> the network <strong>in</strong>


68 Y. Ge, T. Kunz, and L. Lamontwhich the rout<strong>in</strong>g algorithm works. However, because the QoS OLSR versions <strong>in</strong>troducemore overhead than the orig<strong>in</strong>al OLSR protocol, the networks <strong>in</strong> which the QoSOLSR versions work may have worse overall available bandwidth than a network thatruns the orig<strong>in</strong>al OLSR algorithm. So one may question if the QoS OLSR versionsreally improve the route bandwidth condition. To explore this question, for each scenarioand OLSR version, the average available bandwidth over both the optimalroutes and the paths found <strong>by</strong> the rout<strong>in</strong>g algorithms are computed. In the follow<strong>in</strong>g,as available bandwidth is directly related to idle time <strong>in</strong> percentage, we report availablebandwidth as percentage of idle time.40.00%30.00%20.00%10.00%0.00%20m/s 10m/s 5m/s 1m/s 0m/sQoS 20% 10.17% 9.89% 9.41% 9.19% 8.98%QoS 40% 15.41% 15.57% 14.26% 14.61% 13.18%QoS 80% 25.80% 25.57% 25.63% 21.12% 18.99%Orig<strong>in</strong>al 28.96% 30.97% 30.33% 27.51% 19.54%QoS 20%QoS 40%QoS 80%Orig<strong>in</strong>alFig. 5. Comparison of Average Bandwidth Difference.60.00%40.00%20.00%0.00%20m/s 10m/s 5m/s 1m/s 0m/sQoS 20% 18.19% 17.50% 18.25% 18.76% 13.37%QoS 40% 26.71% 26.35% 26.69% 28.98% 26.24%QoS 80% 37.17% 39.65% 38.70% 40.64% 43.65%Orig<strong>in</strong>al 43.29% 43.55% 46.35% 47.68% 53.28%QoS 20%QoS 40%QoS 80%Orig<strong>in</strong>alFig. 6. Error RateTo calculate the average available bandwidth on the routes the rout<strong>in</strong>g algorithmsf<strong>in</strong>d, first we obta<strong>in</strong> the average optimal route bandwidth (see Table 4.).The results shown are consistent with our former analysis: The lower the movementspeed, the less the overhead all the OLSR algorithms <strong>in</strong>troduce <strong>in</strong>to the network.So from speed 20m/s to 0m/s, the optimal bandwidth conditions for all the OLSRalgorithms rise cont<strong>in</strong>uously. The orig<strong>in</strong>al OLSR algorithm has the least overhead, sothe network that runs the orig<strong>in</strong>al OLSR algorithm always has the best bandwidth


Proactive QoS Rout<strong>in</strong>g <strong>in</strong> Ad Hoc Networks 69condition. Compared with 80% OLSR, 40% OLSR evenly directs traffic throughoutthe network, so under high movement (speed 20m/s, and 10m/s) where the wirelessmedia are rather busy, 40% OLSR has better optimal bandwidth routes than that ofthe 80% OLSR, although it has more overhead than 80% OLSR. Under low movement(speed 5m/s, 1m/s, and 0m/s), the added overhead of 40% OLSR has a negativeeffect on the network bandwidth condition, thus the 40% OLSR has less optimalbandwidth than 80% OLSR. As the 20% OLSR has the highest overhead, its optimalbandwidth routes have the lowest available bandwidth.From the results, we can also see that because the orig<strong>in</strong>al OLSR has the lowestoverhead, it provides the network with the best bandwidth condition – its best bandwidthpaths have the highest bottleneck bandwidth among all the OLSR versions.However, as the orig<strong>in</strong>al OLSR does not make efforts to f<strong>in</strong>d these optimal bandwidthpaths, the actual path it f<strong>in</strong>ds may have a lower bandwidth than the paths the QoSOLSR versions f<strong>in</strong>d. In the follow<strong>in</strong>g, we compare and analyze the actual bandwidthon the path the 4 versions of OLSR calculate.Table 4. Avaliable bandwidth on the optimal paths (measured as idle time).Algorithm 20m/s 10m/s 5m/s 1m/s 0m/sQoS 20% 77.68% 80.93% 82.29% 84.69% 89.73%QoS 40% 82.23% 84.92% 86.29% 87.46% 90.17%QoS 80% 78.17% 84.27% 87.17% 90.08% 92.34%Orig<strong>in</strong>al 87.07% 87.28% 90.63% 91.14% 93.08%The actual average available bandwidth the rout<strong>in</strong>g algorithms calculate= the available bandwidth on the optimal paths x ((1- “Bandwidth Difference”)x “Error Rate”) + (1- “Error Rate”))= the available bandwidth on the optimal paths x (1- “Bandwidth Difference”x “Error Rate”)Us<strong>in</strong>g the “Bandwidth Difference” and “Error Rate” values, the result for actualaverage available bandwidth the rout<strong>in</strong>g algorithms calculated is shown (see Fig. 7).We can see that although the QoS OLSR versions <strong>in</strong>troduce more overhead, theroutes they compute still have higher available bandwidth than the routes <strong>in</strong> a networkrunn<strong>in</strong>g the orig<strong>in</strong>al OLSR. In movement patterns with maximum speed 20m/s,10m/s, 5m/s, and 1m/s, among all the OLSR algorithms, the 40% OLSR always computesthe route with the best available bandwidth, as it has less overhead than 20%OLSR and more accurate bandwidth <strong>in</strong>formation than 80% OLSR. In the fixed networkcase, because of few topology updates, all the algorithms have low overhead.Thus, 20% OLSR f<strong>in</strong>ds the routes with highest bandwidth, for it has the most accuratebandwidth <strong>in</strong>formation. Based on these results, we conclude that the QoS OLSRversions do achieve bandwidth improvement over the orig<strong>in</strong>al OLSR algorithm.5 Analysis of QoS Rout<strong>in</strong>g and Future WorkAs mentioned <strong>in</strong> Section 1, there is a trade-off between the QoS performance that theQoS rout<strong>in</strong>g protocol achieves and the additional cost it <strong>in</strong>troduces. The QoS OLSR


70 Y. Ge, T. Kunz, and L. Lamontversions we study <strong>in</strong> this paper confirm this – QoS OLSR algorithms do enhance thenetwork QoS performance. However, <strong>in</strong> order to achieve this improvement, additional“protocol overhead” is also <strong>in</strong>troduced, which degrades the performance of these QoSrout<strong>in</strong>g protocols, especially with respect to “Packet Delivery Ratio” and “End-to-EndDelay” <strong>in</strong> high mobility cases. Does this then imply that we should abandon proactiveQoS rout<strong>in</strong>g and switch to on-demand QoS rout<strong>in</strong>g because of the cost? Not necessarily:Fig. 7. Average available bandwidth (<strong>in</strong> idle time) on the routes of the 4 OLSR algorithms– We do not know if on-demand rout<strong>in</strong>g algorithms have the same overhead problems.[3] discusses the performance of the “ticket-based prob<strong>in</strong>g” algorithm <strong>in</strong> a delay-constra<strong>in</strong>edenvironment, calculat<strong>in</strong>g what percentage of routes that the algorithmf<strong>in</strong>ds meet the delay request. But it fails to analyze other aspects of the rout<strong>in</strong>g algorithm,such as control overhead, packet delivery ratio etc. [11] tests the CEDAR algorithmus<strong>in</strong>g bandwidth as the QoS parameter, giv<strong>in</strong>g a detailed performance evaluation.However, [11] does not experiment with node movement. Nor does it run thesimulation <strong>in</strong> a real shared-channel environment, and the impact of channel <strong>in</strong>terferenceand packet collision are not considered.– Many proposed proactive QoS rout<strong>in</strong>g algorithm such as [10] and [7] just present abasic idea, without performance evaluation. So it is not clear whether the negativeeffect on the rout<strong>in</strong>g performance caused <strong>by</strong> the additional rout<strong>in</strong>g overhead is acommon problem to proactive QoS rout<strong>in</strong>g.Based on the above analysis, proactive QoS rout<strong>in</strong>g is still worth study<strong>in</strong>g. As theadded overhead is the ma<strong>in</strong> cost that affects the QoS rout<strong>in</strong>g algorithm’s performance,the future work on QoS rout<strong>in</strong>g <strong>in</strong> Ad-Hoc networks may be focused on how to reducethe overhead. Our future work plans <strong>in</strong>clude the follow<strong>in</strong>g:– TC packet collisions at the 2-hop neighbors cause the problem of stale rout<strong>in</strong>g tables.To avoid this problem, we can add some jitter mechanism <strong>in</strong>to the OLSR protocol– when an MPR receives a TC message, it waits for a random delay time before itrelays that TC message, <strong>in</strong>stead of relay<strong>in</strong>g it immediately.


Proactive QoS Rout<strong>in</strong>g <strong>in</strong> Ad Hoc Networks 71– Compared to the data packet load, the additional overhead the QoS OLSR versions<strong>in</strong>troduce use a large amount of l<strong>in</strong>k bandwidth. This overhead is relatively <strong>in</strong>dependentof the nom<strong>in</strong>al l<strong>in</strong>k bandwidth. We plan to explore whether the use of 802.11b,with up to 11 Mbps data rate, reduces the added network load and the result<strong>in</strong>g negativeeffect on the delivery ratio and delay.AcknowledgementsThis work is funded <strong>by</strong> the Defense Research and Development Canada (DRDC) andbenefited from various discussions with members of the CRC RNS mobile network<strong>in</strong>ggroup.References1. G. S. Ahn, A. T. Campbell, A. Veres and L. H. Sun, "SWAN: Service Differentiation <strong>in</strong>Stateless Wireless Ad-Hoc Networks", IEEE <strong>Computer</strong> and Communications Societies,2002, pages 457-466, June 20022. G. Apostolopoulos, R. Guer<strong>in</strong>, S. Kamat, and S. K. Tripathi, “Quality of Service BasedRout<strong>in</strong>g: A Performance Perspective”, Association for Comput<strong>in</strong>g Mach<strong>in</strong>ery's Special InterestGroup on Data Communication ’98, pages 17-28, September 19983. S. Chen and K. Nahrsted, "Distributed Quality-of-Service Rout<strong>in</strong>g <strong>in</strong> Ad-Hoc Networks",IEEE Journal on Selected Areas <strong>in</strong> Communications, Vol. 17, No. 8, August 1999, pages1488-15054. S. Chen and K. Nahrstedt, “An Overview of Quality-of-Service Rout<strong>in</strong>g for the NextGeneration High-Speed Networks: Problems and Solutions”, IEEE Network Magaz<strong>in</strong>e,Vol.12, No.6, pages 64-79, November 19985. Y. Ge, T. Kunz and L. Lamont, “Quality of Service Rout<strong>in</strong>g <strong>in</strong> Ad-Hoc Networks Us<strong>in</strong>gOLSR”, Proceed<strong>in</strong>g of the 36 thHawaii International Conference on System <strong>Science</strong>s(HICSS-36), Hawaii, USA, January 2003, ISBN 0-7695-1874-5, IEEE 2003.6. R. Guer<strong>in</strong> and D. Willimas, “Qos Rout<strong>in</strong>g Mechanisms and OSPF Extensions”, draft-qosrout<strong>in</strong>g-ospf-00.txt”,Internet-Draft, Internet Eng<strong>in</strong>eer<strong>in</strong>g Task Force, November 19967. Iwata, C. C. Chiang, G. Pei, M. Gerla and T. Chen, "Scalable Rout<strong>in</strong>g Strategies for Ad-Hoc Wireless Networks”, IEEE Journal on Selected Areas <strong>in</strong> Communications, Vol.17,No.8, pages 1369-1379, August 19998. P. Jacquet, P. Muhlethaler, A. Qayyum, A. Laouiti, L. Viennot, T. Clauseen, "OptimizedL<strong>in</strong>k State Rout<strong>in</strong>g Protocol draft-ietf-manet-olsr-05.txt", INTERNET-DRAFT, IETFMANET Work<strong>in</strong>g Group9. C. R. L<strong>in</strong> and J. S. Liu, “QoS Rout<strong>in</strong>g <strong>in</strong> Ad-Hoc Wireless Networks”, IEEE Journal OnSelected Areas In Communications, Vol.17, No.8, pages 1426-1438, August 199910. R. Ramanathan and M. Steenstrup, “Hierarchically-Organized, Multihop Mobile WirelessNetworks for Quality-of-Service Support”, Mobile Networks and Applications, Vol.3,pages 101-119, 199811. P. S<strong>in</strong>ha, R. Sivakumar and V. Bharghanan, "CEDAR: a Core-Extraction Distributed Ad-Hoc Rout<strong>in</strong>g Algorithm”, IEEE Journal on Selected Areas <strong>in</strong> Communications, Vol. 17,No. 8, August 1999, pages 1454-1465


Deliver<strong>in</strong>g Messages<strong>in</strong> Disconnected Mobile Ad Hoc NetworksRitesh Shah and Norman C. Hutch<strong>in</strong>sonDepartment of <strong>Computer</strong> <strong>Science</strong>, University of British Columbia{rshah,norm}@cs.ubc.caAbstract. Many rout<strong>in</strong>g protocols for mobile ad hoc networks havebeen developed. These protocols f<strong>in</strong>d a route to a dest<strong>in</strong>ation if such aroute exists. We present a novel protocol that delivers messages betweendisconnected hosts, that is, when no route exists between them. Ourprotocol uses the nodes mov<strong>in</strong>g between the neighbourhoods of the sourceand dest<strong>in</strong>ation nodes to act as carriers of the messages. We describe theprotocol <strong>in</strong> detail, provide an <strong>in</strong>itial simulation-based evaluation of itsperformance compared to both a naive scheme and the optimal scheme,and discuss some extensions to the protocol that we are explor<strong>in</strong>g.1 IntroductionAn ad-hoc network is a self-start<strong>in</strong>g network formed on-the-fly <strong>by</strong> a group ofmobile nodes without the aid of any centralized adm<strong>in</strong>istration or established<strong>in</strong>frastructure. Ad-Hoc networks f<strong>in</strong>d their use <strong>in</strong> situations where no fixed wired<strong>in</strong>frastructure is available or has been damaged <strong>by</strong> natural or man-made disaster.Rapid advancement <strong>in</strong> wireless technology and <strong>in</strong>creas<strong>in</strong>gly affordable pricesof wireless devices have made ad-hoc networks a reality. This has fuelled a lot ofresearch activity <strong>in</strong> the field. Several protocols [1], [5], [6] have been developed tof<strong>in</strong>d and ma<strong>in</strong>ta<strong>in</strong> routes between the nodes of an ad-hoc network. These rout<strong>in</strong>gprotocols can be divided <strong>in</strong>to three broad categories. First are the pro-activeprotocols, that use periodic advertisements to broadcast rout<strong>in</strong>g <strong>in</strong>formation,such as DSDV [2]. Second are on-demand protocols, that search for routes ondemand,such as AODV [4] and DSR [3]. Third are those rout<strong>in</strong>g protocols thatuse a hybrid approach, which is a comb<strong>in</strong>ation of the first two approaches. Whileeach approach has its advantages and disadvantages <strong>in</strong> f<strong>in</strong>d<strong>in</strong>g a route betweentwo mobile hosts when one exists, none of them handle the case of messagedelivery between two disconnected hosts.L<strong>in</strong>ks <strong>in</strong> a MANET (Mobile Ad-Hoc Network) are susceptible to frequentbreakage due to movement of nodes. This may cause some nodes to get disconnectedfrom others. A message dest<strong>in</strong>ed to such a disconnected node results <strong>in</strong>a delivery failure irrespective of the rout<strong>in</strong>g protocol used. Different protocolshandle this situation differently but at most they <strong>in</strong>validate the route, if therewas one already <strong>in</strong> use and <strong>in</strong>form the source about the situation.Why is the question of message delivery among disconnected hosts important?Consider a disaster relief scenario. Relief workers are work<strong>in</strong>g on severalS. Pierre, M. Barbeau, and E. Kranakis (Eds.): ADHOC-NOW 2003, LNCS <strong>2865</strong>, pp. 72–83, 2003.c○ Spr<strong>in</strong>ger-Verlag Berl<strong>in</strong> Heidelberg 2003


Deliver<strong>in</strong>g Messages <strong>in</strong> Disconnected Mobile Ad Hoc Networks 73sites scattered <strong>in</strong> an area. The workers have mobile nodes to communicate amongthemselves. The sites may be separated <strong>by</strong> a distance that is several times theradio range of the devices. In such a case some of the sites might be disconnectedfrom each other, form<strong>in</strong>g multiple partitioned mobile ad-hoc networks <strong>in</strong>the area. While sporadic node movements between the sites may offer connectivity,it may be for brief periods of time. In such a situation it would be helpfulto have some mechanism of deliver<strong>in</strong>g messages between disconnected hosts.Consider a similar scenario on a long beach hav<strong>in</strong>g several scenic-spots separatedfrom each other <strong>by</strong> a distance several times the radio range. While thereare nodes mov<strong>in</strong>g between the them, the scenic-spots may be disconnected forthe majority of the time. It is easy to see that the nodes mov<strong>in</strong>g between thesedisconnected networks could be used as carriers of messages for other nodes.Now the question is how to select the right carrier node. One option is toselect all the nodes <strong>in</strong> the connected graph conta<strong>in</strong><strong>in</strong>g the source as carrier nodes.This could create unnecessary replication of messages and wastage of networkbandwidth. So the goal is to f<strong>in</strong>d the right carrier node — the one that will come<strong>in</strong> contact with the dest<strong>in</strong>ation with<strong>in</strong> a certa<strong>in</strong> period of time <strong>in</strong> the future. It isimpossible for a source to choose the right carrier node without the knowledge ofthe present and future trajectories of all nodes. So a more ref<strong>in</strong>ed goal could be toselect those nodes as carrier nodes that have a higher probability of connect<strong>in</strong>gto the dest<strong>in</strong>ation <strong>in</strong> the future. Even this is difficult to ascerta<strong>in</strong> without theknowledge of position and direction of movement of the disconnected dest<strong>in</strong>ationand potential carrier nodes. A further ref<strong>in</strong>ed goal could be to select carrier nodes<strong>in</strong> every direction (as the position and direction of movement of the disconnecteddest<strong>in</strong>ation is not known) and to m<strong>in</strong>imize redundancy <strong>in</strong> do<strong>in</strong>g so. In this paperwe propose a completely decentralized protocol, Voilà, that replicates a messagedest<strong>in</strong>ed for a host disconnected from the source on selective nodes.2 Rout<strong>in</strong>g ProtocolOur protocol will work with any proactive or on-demand rout<strong>in</strong>g protocol <strong>in</strong>clud<strong>in</strong>gDSDV, AODV and DSR. Besides rout<strong>in</strong>g messages, the only requirement thatour algorithm places on the rout<strong>in</strong>g protocol is that it is capable of ma<strong>in</strong>ta<strong>in</strong><strong>in</strong>ga neighbour list at each node. We assume that the rout<strong>in</strong>g protocol reports withan upcall to our protocol whenever a route to a dest<strong>in</strong>ation cannot be found oris broken.3 AlgorithmThe algorithm is described from the po<strong>in</strong>ts of view of each of the nodes thatparticipate <strong>in</strong> it. The <strong>in</strong>tuition beh<strong>in</strong>d this algorithm is that mobile nodes tendto exhibit correlated movement patterns. This correlated movement of nodes or”group mobility” has been studied <strong>in</strong> the past and several group based mobilitymodels [9], [11] have been proposed. Based on this we propose that nodes thatare close to each other need not store the same message, only one of them shouldbe chosen to hold a message.


74 R. Shah and N.C. Hutch<strong>in</strong>son3.1 The Source NodeWhen a node X is unable to f<strong>in</strong>d a route to node Y or has lost the route tonode Y, it buffers the message M meant for Y and requests the neighbour list ofall of its neighbours. After the neighbour list is received from all its neighbours,node X selects the neighbour<strong>in</strong>g node Z that has most neighbours that are notneighbours of X and adds it to its picked set. It then elim<strong>in</strong>ates all of thoseneighbour<strong>in</strong>g nodes that are also the neighbours of Z <strong>by</strong> putt<strong>in</strong>g them <strong>in</strong> theelim<strong>in</strong>ated set. Node X repeats the same selection and elim<strong>in</strong>ation process withthe neighbour<strong>in</strong>g nodes set after remov<strong>in</strong>g node Z and those nodes that werejust added to the elim<strong>in</strong>ated set. The process ends when all the neighbour<strong>in</strong>gnodes of X are either <strong>in</strong> the picked or <strong>in</strong> the elim<strong>in</strong>ated set. The algorithm canbe described <strong>in</strong> set notation as follows:neigh(X) = neighbour list of node Npicked(X) = emptyelim<strong>in</strong>ated(X) = emptywhile(neigh(X) is not empty)Select a node Z : Z ∈ neigh(X)and ∀ M ( M ∈ neigh(X) and M ≠ Z|neighbour list of node Z - neighbour list of X| ≥|neighbour list of node M - neighbour list of X| )picked(X) = picked(X) ⋃ {Z}elim<strong>in</strong>ated(X) = elim<strong>in</strong>ated(X) ⋃{M : M ∈ neigh(X) and M ∈ neighbour list of node Z}neigh(X) = neigh(X) - picked(X) - elim<strong>in</strong>ated(X)endwhileAfter this process completes, the nodes <strong>in</strong> the picked set are sent the messageM and the elim<strong>in</strong>ated set <strong>in</strong> a HOLD control message. Each application message,M is uniquely identified <strong>by</strong> the tuple:A HOLD message sent <strong>by</strong> node X consists of the follow<strong>in</strong>g fields:The message-type field <strong>in</strong>dicates that its a HOLD message. The nodes <strong>in</strong>the elim<strong>in</strong>ated set are sent a NACK for message M which they buffer <strong>in</strong> theirNAKMSG queue. Node X and the nodes <strong>in</strong> the picked set buffer message M <strong>in</strong>their HOLDMSG queue.3.2 Other Selected NodesWhen a node R receives a HOLD control message from another node S, it startsa similar selection process to select other nodes to hold the application messageM. Like the orig<strong>in</strong>al source node, node R requests the neighbour list from all of


Deliver<strong>in</strong>g Messages <strong>in</strong> Disconnected Mobile Ad Hoc Networks 75its neighbour<strong>in</strong>g nodes. However, s<strong>in</strong>ce some nodes are known to have alreadyparticipated <strong>in</strong> the selection process for this message, node R can elim<strong>in</strong>ate fromconsideration the node it received the message from (S), the orig<strong>in</strong>al source node(X), and those nodes that are <strong>in</strong> the elim<strong>in</strong>ated set sent <strong>by</strong> S.A neighbour list request message, NBREQ, consists of the follow<strong>in</strong>g fields:A node T receiv<strong>in</strong>g a NBREQ message from node R replies with a neighbourlist reply message, NBREP. A NBREP control message sent <strong>by</strong> a node T consistsof the follow<strong>in</strong>g fields:The status field <strong>in</strong> the NBREP message reports on the status of this messageat the node that sent the reply, and can be one of three values: NEW mean<strong>in</strong>gthat this node knows noth<strong>in</strong>g of the message, NACKED, mean<strong>in</strong>g that this nodehas previously been sent a NACK for the message, or HELD, mean<strong>in</strong>g that thisnode is hold<strong>in</strong>g the message.Nodes respond<strong>in</strong>g with NACKED or HELD <strong>in</strong> their status are elim<strong>in</strong>atedfrom further consideration <strong>by</strong> R. After node R receives the neighbour list fromthe nodes, it uses the same algorithm as the source node X to select othernodes to hold message M. The only difference is <strong>in</strong> the <strong>in</strong>itialization of the setneigh(R). neigh(R) conta<strong>in</strong>s only those neighbour<strong>in</strong>g nodes of R that have notbeen elim<strong>in</strong>ated from consideration <strong>by</strong> R <strong>in</strong> any of the above steps. Aga<strong>in</strong> thenodes <strong>in</strong> the picked(R) set are sent a HOLD message conta<strong>in</strong><strong>in</strong>g the message Mand the set of R’s neighbours that were elim<strong>in</strong>ated from further consideration.This set conta<strong>in</strong>s the f<strong>in</strong>al value of elim<strong>in</strong>ated(R) together with the send<strong>in</strong>g node(S) and those neighbours that were elim<strong>in</strong>ated from consideration <strong>by</strong> R before.The nodes <strong>in</strong> the elim<strong>in</strong>ated(R) set are sent a NACK for the message.In order to bound the size of the HOLD control message, the elim<strong>in</strong>ated setsent <strong>by</strong> any node conta<strong>in</strong>s only those nodes that are its neighbours. Therefore,the upper bound on the size of the elim<strong>in</strong>ated set is the maximum number ofneighbours a node can have. The alternative of accumulat<strong>in</strong>g elim<strong>in</strong>ated nodes asthe HOLD message propagates would elim<strong>in</strong>ate some redundancy, at the expenseof hav<strong>in</strong>g HOLD messages that could be as large as the number of nodes <strong>in</strong> anypartition.Figure 1a shows an example network partition of 10 nodes. Suppose node 0wants to send a message to a node outside the network partition. It <strong>in</strong>itiates theprocess of select<strong>in</strong>g carrier nodes <strong>by</strong> first request<strong>in</strong>g the neighbour list from itsneighbour<strong>in</strong>g nodes 1, 2, 3, 4 and 5. After execution of the elim<strong>in</strong>ation processits picked set consists of nodes {2, 4} while its elim<strong>in</strong>ated set consists of {1, 3,5} which it sends to nodes <strong>in</strong> the picked set along with the message <strong>in</strong> a HOLDcontrol message. When node 2 receives the HOLD message it starts the selectionprocess <strong>by</strong> elim<strong>in</strong>at<strong>in</strong>g nodes 0, 1 and 3 from consideration and request<strong>in</strong>g theneighbour list from nodes 6 and 7. After execution of the algorithm its picked


76 R. Shah and N.C. Hutch<strong>in</strong>sonset consists of node {6} and its elim<strong>in</strong>ated set consists of nodes {0, 1, 3, 7}.When node 6 receives a HOLD message it starts the selection process but endsup elim<strong>in</strong>at<strong>in</strong>g all nodes from its neighbour list and thus the process term<strong>in</strong>atesat this node. Nodes 4 and 9 are the other nodes that hold the message.1620573498162305 4 978(a)(b)Fig. 1. (a) A network partition of 10 nodes (b) Node positions after some mobilityAfter a while if node 0 has another application message for an unreachablehost, the nodes that are selected this time may be different from the ones previouslyselected as some of the nodes have moved to different positions as shown <strong>in</strong>Figure 1b. When node 0 executes the algorithm it aga<strong>in</strong> ends up with the pickedset {2, 4} but this time the elim<strong>in</strong>ated set does not conta<strong>in</strong> node 3. This timethe elim<strong>in</strong>ated set is {1, 5}. When node 2 starts its selection process it requeststhe neighbour list from nodes 3 and 6. Node 3 is also be<strong>in</strong>g considered <strong>by</strong> node4 at the same time. If node 3 receives a HOLD or a NACK message for thesame application message from node 4 before the NBREQ message from node 2arrives at node 3 then node 3 reports its status appropriately to node 2 eitherstat<strong>in</strong>g that it already holds the message (status=HELD) or it has been elim<strong>in</strong>atedfrom consideration (status=NACKED) <strong>by</strong> some node which has selectedone of its neighbours to hold the message (<strong>in</strong> the present scenario node 3 wouldreceive a HOLD message from node 4). Ideally we would like a node to receiveeither a NACK or a HOLD control message for a particular application messageand not both. This cannot be achieved because of distributed nature of the algorithmand chang<strong>in</strong>g neighbour lists of the nodes dur<strong>in</strong>g the execution of thealgorithm. Thus it is possible for a node to receive both a NACK and a HOLDmessage for the same application message and <strong>in</strong> any order. Aga<strong>in</strong> referr<strong>in</strong>g toFigure 1b, if node 3 receives the NBREQ message from node 2 before it receivesthe HOLD control message from node 4, then it will receive a HOLD message


Deliver<strong>in</strong>g Messages <strong>in</strong> Disconnected Mobile Ad Hoc Networks 77from node 4 and a NACK from node 2 for the same application message. In sucha situation, the HOLD message always overrides the negative acknowledgement.3.3 Message DeliveryOnce every FIND DST INTERVAL, each node tries to f<strong>in</strong>d a route to the dest<strong>in</strong>ationsof the messages it has stored <strong>in</strong> its HOLDMSG queue. If it is able to f<strong>in</strong>da route to a dest<strong>in</strong>ation then it delivers all the messages stored for the dest<strong>in</strong>ation<strong>in</strong> its HOLDMSG queue. When a dest<strong>in</strong>ation node receives a message, eitherfrom the orig<strong>in</strong>al source or from an <strong>in</strong>termediate node, it sends an acknowledgementto the send<strong>in</strong>g node. For each message stored <strong>in</strong> the HOLDMSG queue ofa node, ids of the node that sent the HOLD message to the node and the nodesthat were sent an HOLD message <strong>by</strong> the current node are also kept. When anacknowledgement is received for a message <strong>in</strong> the HOLDMSG queue the nodeforwards the acknowledgement to all such nodes. These forwarded acknowledgementshelp <strong>in</strong> remov<strong>in</strong>g messages that have been successfully delivered to thedest<strong>in</strong>ation from the HOLDMSG queues of other nodes. This potentially preventsa lot of route search messages be<strong>in</strong>g broadcasted <strong>by</strong> all the nodes hold<strong>in</strong>gthe message <strong>in</strong> the HOLDMSG queue. Some of the nodes to which the acknowledgementsare forwarded may be disconnected from the forwarder node. In thatcase the acknowledgement is either dropped or a selection process similar tothe one used for the data messages, is started depend<strong>in</strong>g on how important theacknowledgements are <strong>in</strong> a particular application. A message is removed froma HOLDMSG queue if an acknowledgement for the message is received or themessage has been <strong>in</strong> the HOLDMSG queue for longer than MAX HOLD TIME.3.4 Node Selection MetricWhile select<strong>in</strong>g nodes for replicat<strong>in</strong>g a message, a node picks the one that has thelargest number of neighbours that are not its neighbours. The <strong>in</strong>tuition here is toselect a node that is connected to the most nodes outside the range of the nodecurrently <strong>in</strong>volved <strong>in</strong> selection process and hence can potentially dissem<strong>in</strong>ate themessage farthest <strong>in</strong> the connected graph conta<strong>in</strong><strong>in</strong>g the source.4 Experimental Set UpWe implemented our protocol for the ns2 simulator [14] and have evaluated itsperformance for scenarios <strong>in</strong>volv<strong>in</strong>g upto 120 nodes. The poor performance of ns2<strong>in</strong> simulat<strong>in</strong>g large number of nodes has prevented us from experiment<strong>in</strong>g withscenarios <strong>in</strong>volv<strong>in</strong>g a larger number of nodes. We use the modified Random WayPo<strong>in</strong>t Model described <strong>in</strong> the next subsection of this paper for our experiments.The range of each wireless node is set to 100m. The traffic generator consistsof an application runn<strong>in</strong>g at each node that tries to send a message of 64 <strong>by</strong>tesonce every five seconds to a random node (other than itself). The underly<strong>in</strong>grout<strong>in</strong>g protocol used is AODV. Table 1 shows the values of various parametersof AODV used <strong>in</strong> the simulations.


78 R. Shah and N.C. Hutch<strong>in</strong>sonTable 1. AODV parameter values used <strong>in</strong> the simulationsParameterValueEXPANDING RING SEARCH ONTTL START 7TTL THRESHOLD 7NETWORK DIAMETER 30RREQ RETRIES 1AODV LOCAL REPAIR OFFAODV LINK LAYER DETECTION OFFHELLO INTERVAL 1ALLOWED HELLO LOSS 34.1 Mobility ModelThe Random Way Po<strong>in</strong>t model is the most widely used mobility model <strong>in</strong> test<strong>in</strong>gprotocols <strong>in</strong> mobile ad-hoc networks. We have made two modifications to theRandom Way Po<strong>in</strong>t model to make it more practical.Random Way Po<strong>in</strong>t Model. The Random Way Po<strong>in</strong>t Model was first described<strong>in</strong> [3], s<strong>in</strong>ce then it has been widely used to test MANET protocols <strong>in</strong>simulated environments. In this model nodes move around <strong>in</strong> a “room”. Eachnode starts from an <strong>in</strong>itial position selected randomly from with<strong>in</strong> the simulatedarea. As the simulation progresses, each node pauses at its current position for aconstant period of time and then randomly chooses a dest<strong>in</strong>ation location fromwith<strong>in</strong> the simulated region and moves there <strong>by</strong> select<strong>in</strong>g a random speed uniformlyfrom the <strong>in</strong>terval (0,V], where V is the maximum speed with which anode can move.Modifications <strong>in</strong> Random Way Po<strong>in</strong>t Model. We believe that the applicationsdeveloped for Mobile Ad Hoc environments will be mostly <strong>in</strong>teractiveand therefore people us<strong>in</strong>g them would be walk<strong>in</strong>g or stroll<strong>in</strong>g. Studies [10] haveshown that the normal walk<strong>in</strong>g speed of an adult human be<strong>in</strong>g is around 1.5m/s. We also consider the possibility of vehicles (particularly <strong>in</strong> the disasterrelief scenarios outl<strong>in</strong>ed <strong>in</strong> section 1) mov<strong>in</strong>g at a slow speed. [13] shows thatselect<strong>in</strong>g a m<strong>in</strong>imum speed greater than zero for mobile nodes is necessary toatta<strong>in</strong> a mean<strong>in</strong>gful steady state. Therefore we choose node speed from a normaldistribution with mean speed set to 1.5 m/s. The m<strong>in</strong>imum speed is set to 0.4m/s while the maximum speed is set to 5.0 m/s.The Random Way Po<strong>in</strong>t Model assumes uniform distribution of nodes, whichis quite “unrealistic”. The density of nodes would vary a lot <strong>in</strong> any of the scenariosdescribed <strong>in</strong> section 1. There would be some hot-spots where nodes areclustered. In a disaster relief scenario these hot-spots could be sites where reliefand rescue work is be<strong>in</strong>g carried out; on a beach these could be particularlyscenic po<strong>in</strong>ts, snack bars, or volleyball courts; <strong>in</strong> a military zone these could be


Deliver<strong>in</strong>g Messages <strong>in</strong> Disconnected Mobile Ad Hoc Networks 79various army camps. In our model we have five such hot-spots randomly distributed<strong>in</strong> a space of 3000m x 600m. Each hot-spot is a circular disc of radius250m. Each node is <strong>in</strong>itially placed at a random position <strong>in</strong> a randomly selectedhot-spot. Nodes then, <strong>in</strong>stead of select<strong>in</strong>g a dest<strong>in</strong>ation uniformly from the wholearea, select a random position with<strong>in</strong> a randomly selected hot-spot. There is alsoa small probability (10%) of choos<strong>in</strong>g a dest<strong>in</strong>ation which is not <strong>in</strong> a hot spot.4.2 ResultsWe compare the results from our protocol, Voilà, with those obta<strong>in</strong>ed from twoother schemes, the Source-only scheme and the Oracle scheme. In the Sourceonlyscheme, the source node buffers the messages that could not be deliveredto a disconnected host. It tries to f<strong>in</strong>d a route to the dest<strong>in</strong>ations of bufferedmessages once every FIND DST INTERVAL. In the Oracle scheme every nodeis omniscent, i.e., it has the knowledge of the present and future trajectoriesof all the nodes <strong>in</strong> the network and hence can choose the optimal <strong>in</strong>termediatenode to send the message to, if any such node exists. When a node wants tosend an message to another node and cannot f<strong>in</strong>d a route to the dest<strong>in</strong>ation, therout<strong>in</strong>g algorithm makes an upcall to one of the three protocols. As the numberof nodes <strong>in</strong>creases from 30 to 120, the fraction of messages whose dest<strong>in</strong>ation isdisconnected from the sender decreases approximately l<strong>in</strong>early from 91% to 62%.Figure 2 shows the fraction of upcalled messages successfully delivered to thedest<strong>in</strong>ations <strong>in</strong> the three schemes as the number of nodes is varied (normalizedto those delivered <strong>by</strong> the Oracle scheme). In this experiment, FIND DST INT-ERVAL is 30 seconds and MAX HOLD TIME is 65 seconds. Voilà performsbetter than the Source-only protocol all the time except when the number isnodes is 120. We believe that this is because the network traffic <strong>in</strong> Voilà is muchhigher than <strong>in</strong> the Source-only protocol. The traffic <strong>in</strong>creases as the number ofnodes <strong>in</strong>creases, caus<strong>in</strong>g congestion <strong>in</strong> the network. We are work<strong>in</strong>g on variousapproaches to reduce the congestion when the number of nodes is large.Figure 3 shows the fraction of upcalled messages delivered to the dest<strong>in</strong>ation(normalized to those delivered <strong>by</strong> the Oracle scheme) as MAX HO-LD TIME is varied from 35 to 155 seconds <strong>in</strong> a scenario of 70 nodes. Thevalue of FIND DST INTERVAL is set at 30 seconds for this experiment. AsMAX HOLD TIME <strong>in</strong>creases, the probability of the source gett<strong>in</strong>g connectedto the dest<strong>in</strong>ation with<strong>in</strong> MAX HOLD TIME also <strong>in</strong>creases and hence we cansee the ris<strong>in</strong>g bars for the Source-only scheme. We would expect Voilà to showsimilar behaviour but the <strong>in</strong>creased network traffic aris<strong>in</strong>g from long HOLDMSGqueues at high MAX HOLD TIME causes important packets to get dropped andhence we see a small decrease <strong>in</strong> perfomance of Voilà asMAXHOLD TIME <strong>in</strong>creases.Figure 4 shows the fraction of upcalled messages delivered to the dest<strong>in</strong>ationas FIND DST INTERVAL is varied from 30 to 150 seconds <strong>in</strong> a scenarioof 70 nodes. The MAX HOLD TIME is calculated accord<strong>in</strong>g to the formula ((2* FIND DST INTERVAL) + 5) for this experiment. We see an expected drop <strong>in</strong>the number of upcalled messages delivered to the dest<strong>in</strong>ation as FIND DST INT-


80 R. Shah and N.C. Hutch<strong>in</strong>sonOracle Voilà Source-onlyOracle Voilà Source-only10.80.60.40.2030 50 70 100 120Number of nodes10.80.60.40.2035 65 95 125 155MAX_HOLD_TIME ( <strong>in</strong> seconds )Fig. 2. Fraction of messages delivered vs.number of nodesFig. 3. Fraction of messages delivered vs.MAX HOLD TIMEOracle Voilà Source-onlyOracle Voilà Source-only10.80.60.40.2030 60 90 120 150FIND_DST_INTERVAL ( <strong>in</strong> seconds )10.80.60.40.20500 525 550 575 600 625 650Distance <strong>in</strong> metersFig. 4. Fraction of messages delivered vs.FIND DST INTERVALFig. 5. Fraction of messages delivered vs.hot-spot separationERVAL <strong>in</strong>creases. As <strong>in</strong> Figure 3, Voilà performs better than the Source-onlyprotocol for all parameter values.Any scheme for deliver<strong>in</strong>g messages across disconnected networks is sensitiveto the sizes of the hot-spots and their relative positions. The size of a hot-spotdeterm<strong>in</strong>es the diameter of the network partition <strong>in</strong> the hot-spot and hence thenumber of nodes selected to hold a message. The relative positions of hot-spotsdeterm<strong>in</strong>e how connected they are under the movement of nodes and hence howmuch a scheme like ours is warranted. It is easy to see that any such scheme is notuseful for hot-spots that are completely connected at all times. To determ<strong>in</strong>e thesensitivity of the protocols to the positions of hot-spots we experimented witha scenario of 30 nodes and three circular hot-spots. The hot-spots are arrangedsuch that their centers lie <strong>in</strong> a straight l<strong>in</strong>e. The centers of the adjacent hotspotsare separated <strong>by</strong> a distance which is varied from 500m to 650m. S<strong>in</strong>ce theradius of each hot-spot is 250m, the circumferences of adjacent hot-spots toucheach other when distance is 500m. The number of messages whose dest<strong>in</strong>ationsare not connected to the source <strong>in</strong>creases as the distance between the hot-spots<strong>in</strong>creases, from 27% at 500m to 38% at 650m. Figure 5 compares the performaceof the three schemes.


5 Related WorkDeliver<strong>in</strong>g Messages <strong>in</strong> Disconnected Mobile Ad Hoc Networks 81The problem of message delivery among disconnected Mobile Ad-Hoc Networksis not new to the research community. In particular, the idea of us<strong>in</strong>g <strong>in</strong>termediatenodes to relay messages among disconnected hosts has also been proposedearlier <strong>by</strong> Li and Rus [7]. Different research groups have approached the problemof delivery <strong>in</strong> a disconnected network from the perspective of different MANETapplications and hence have come up with different solutions. Karumanchi et.al. [8] describe the problem of network partition<strong>in</strong>g <strong>in</strong> a MANET formed <strong>by</strong>a group of firefighters <strong>in</strong>volved <strong>in</strong> a firefight<strong>in</strong>g mission. Each firefighter is requiredto update its location <strong>in</strong>formation to servers <strong>in</strong> the network and must beable to obta<strong>in</strong> location <strong>in</strong>formation of other firefighters <strong>by</strong> query<strong>in</strong>g the servers.Their solution employs quorum-based strategies to update and query <strong>in</strong>formation<strong>in</strong> a partitioned network. Wang and Li [9] describe the problem of networkpartition<strong>in</strong>g among group of mobile nodes that are request<strong>in</strong>g and download<strong>in</strong>g<strong>in</strong>formation on demand from a centralized service. Their goal is to provideservice coverage even when the network is partitioned <strong>by</strong> replicat<strong>in</strong>g the serviceto appropriate nodes before a partition takes place. They employ a partitionprediction scheme to predict partition<strong>in</strong>g <strong>in</strong> the network before it occurs [12].Li and Rus [7] consider the problem of network partition<strong>in</strong>g <strong>in</strong> a doma<strong>in</strong> whereit is possible to <strong>in</strong>struct mobile nodes to change their trajectories, such as <strong>in</strong> arobotic network where a team of robots is deployed to perform sens<strong>in</strong>g tasks <strong>in</strong>a remote or hazardous environment.6 Future WorkWe have not reseached the parameter space completely, we plan to run moresimulations and determ<strong>in</strong>e the sensitivity of our protocol to more parameters. Weare also consider<strong>in</strong>g several extensions and improvements to our basic scheme.These are described <strong>in</strong> the next subsections.6.1 Reduc<strong>in</strong>g OverheadThe network overhead seems to override the benefit of replication <strong>in</strong> our protocolwhen the number of nodes is large. We are work<strong>in</strong>g on several approaches tosolve this problem. One of them is to use a cache to buffer the neighbour listsof neighbour<strong>in</strong>g nodes as it seems wasteful to ask for neighbour lists for eachmessage. A cache entry conta<strong>in</strong><strong>in</strong>g the neighbour list of a mobile node would bevalid for a short period of time and all neighbour list requests sent to the mobilenode with<strong>in</strong> that period will be serviced from the cache. This can help reduceneighbour list request and reply traffic <strong>in</strong> the network. But this would raise otherissues; specifically, the status <strong>in</strong>formation provided <strong>by</strong> a neighbour <strong>in</strong> a NBREPmessage would be lost. It is to be evaluated how much of a trade-off this is betweenreduc<strong>in</strong>g overhead and accuracy. Another approach to reduce neighbourlist request traffic is to broadcast the NBREQ message. One approach to reduce


82 R. Shah and N.C. Hutch<strong>in</strong>sonthe route search messages is to limit the number of route search messages <strong>in</strong>itiated<strong>by</strong> a node every FIND DST INTERVAL. Aga<strong>in</strong> it is to be evaluated howmuch of a trade-off this is between throughput and reduc<strong>in</strong>g overhead.6.2 Nodes with GPS ReceiversIn our algorithm when a node tries to select neighbourhood nodes to hold itsmessage, it selects those that are not close to each other (separated <strong>by</strong> an angulardistance of more than 60 degrees). But it is possible that two nodes positionedfar apart <strong>in</strong> the neighbourhood could be head<strong>in</strong>g towards the same dest<strong>in</strong>ation.It is not possible to elim<strong>in</strong>ate such cases unless the node runn<strong>in</strong>g the algorithmknows the direction of the movement of the neighbour<strong>in</strong>g nodes. If all the nodesare equipped with GPS receivers then it is possible for them to know their location<strong>in</strong>formation. The nodes can periodically relay this <strong>in</strong>formation to theirneighbour<strong>in</strong>g nodes <strong>by</strong> piggyback<strong>in</strong>g it on the local broadcast messages and otherunicast messages. The periodically arriv<strong>in</strong>g location <strong>in</strong>formation from the neighbourscan help a node to compute a neighbour’s speed and more importantly,its direction of movement. A node can then use this <strong>in</strong>formation to select appropriatenodes, i.e., the elim<strong>in</strong>ation criterion can change from nodes placed closelyto each other to nodes mov<strong>in</strong>g <strong>in</strong> almost the same direction.7 ConclusionWe have demonstrated a simple algorithm to deliver messages <strong>in</strong> disconnectedMobile Ad-Hoc networks. Our scheme does not entail any extra requirementson the present rout<strong>in</strong>g algorithms. The only requirement is a local broadcastmechanism used to discover the neighbours of nodes. Such a mechanism is used<strong>in</strong> some of the current rout<strong>in</strong>g protocols. We have presented results obta<strong>in</strong>edfrom simulat<strong>in</strong>g our scheme.References1. E. M. Royer and C-K. Toh, “A Review of Current Rout<strong>in</strong>g Protocols for Ad-HocMobile Wireless Networks”, IEEE Personal Communications Magaz<strong>in</strong>e, April 1999,46-552. C. E. Perk<strong>in</strong>s and P. Bhagwat, “Highly Dynamic Dest<strong>in</strong>ation-Sequenced Distance-Vector Rout<strong>in</strong>g (DSDV) for Mobile <strong>Computer</strong>s,” <strong>in</strong> SIGCOMM’94, 19943. D. B. Johnson and D. A. Maltz, “Dynamic Source Rout<strong>in</strong>g <strong>in</strong> Ad Hoc WirelessNetworks,” Mobile Comput<strong>in</strong>g, 1996. Kluwer Academic Publishers4. C. E. Perk<strong>in</strong>s and E. M. Royer, “Ad-hoc On-Demand Distance Vector Rout<strong>in</strong>g,”<strong>in</strong> 2nd IEEE Workshop. Mobile Comp. Sys. and Apps., , Feb 1999, 90-1005. J. Broch, D. A. Maltz, D. B. Johnson, Y.-C. Hu, and J. Jetcheva, “A performancecomparison of multi-hop wireless ad hoc network rout<strong>in</strong>g protocols”. In MobileComput<strong>in</strong>g and Network<strong>in</strong>g, 1998, 85-97


Deliver<strong>in</strong>g Messages <strong>in</strong> Disconnected Mobile Ad Hoc Networks 836. C. E. Perk<strong>in</strong>s, E. M. Royer, S. R. Das and M. K. Mar<strong>in</strong>a, “Performance Comparisonof Two On-demand Rout<strong>in</strong>g Protocols for Ad Hoc Networks”, IEEE PersonalCommunications Magaz<strong>in</strong>e, special issue on Mobile Ad Hoc Networks, Vol. 8, No.1, Feb 2001, 16-297. Q. Li and D. Rus, “Send<strong>in</strong>g Messages to Mobile Users <strong>in</strong> Disconnected Ad-hocWireless Networks,” <strong>in</strong> Proceed<strong>in</strong>gs of the Sixth ACM/IEEE Internat<strong>in</strong>al conferenceon Mobile Comput<strong>in</strong>g and Network<strong>in</strong>g (Mobicom 2000), Aug 2000, 44-558. G. Karumanchi, S. Muralidharan and R. Prakash, “Information Dissem<strong>in</strong>ation <strong>in</strong>Partitionable Mobile Ad Hoc Networks”, <strong>in</strong> Proceed<strong>in</strong>gs of IEEE Symposium onReliable Distributed Systems, Lausanne, Switzerland, Oct 20009. K. Wang and B. Li. “Efficient and Guaranteed Service Coverage <strong>in</strong> PartitionableMobile Ad-Hoc Networks.” <strong>in</strong> Proceed<strong>in</strong>gs of IEEE INFOCOM 2002, Vol. 2, Jun2002, 1089-109810. P. S. Rodman and H. M. McHenry, “Bioenergetics and the orig<strong>in</strong> of hom<strong>in</strong>idbipedalism”, Americal Journal of Physical Anthropology, Vol. 52, 1980, 103-10611. X. Hong, M. Gerla, G. Pei, and C. Chiang, “A Group Mobility Model for Ad HocWireless Networks,” <strong>in</strong> Proceed<strong>in</strong>gs of the 2nd ACM InternationalWorkshop onModel<strong>in</strong>g and Simulation of Wireless and Mobile Systems, 199912. K. Wang and B. Li. “Group Mobility and Partition Prediction <strong>in</strong> Wireless Ad-hocNetworks”, <strong>in</strong> Proceed<strong>in</strong>gs of IEEE International Conference on Communications(ICC 2002), Vol. 2, April-May 2002, 1017-102113. J. Yoon, M. Liu, and B. D. Noble, “Random waypo<strong>in</strong>t considered harmful”, <strong>in</strong>Proceed<strong>in</strong>gs of INFOCOM ’03, April 200314. http://www.isi.edu/nsnam/ns/


Extend<strong>in</strong>g Seamless IP Multicast Edge-Coveragethrough Mobile Ad Hoc Access NetworksPedro M. Ruiz 1 , Antonio F. Gomez-Skarmeta 1 ,Pedro Mart<strong>in</strong>ez 1 , and David Larrabeiti 21 University of Murcia, Facultad de Informatica, Dept. of Information andCommunication Eng<strong>in</strong>eer<strong>in</strong>g, Campus de Esp<strong>in</strong>ardo,E-30100 Esp<strong>in</strong>ardo (Murcia), Spa<strong>in</strong>{pedrom,skarmeta,pma}@dif.um.es2 University Carlos III of Madrid, Dept. of Telematic Eng<strong>in</strong>eer<strong>in</strong>g,Campus de Leganes, Avda. Universidad, 30,E-28911 Leganes (Madrid), Spa<strong>in</strong>dlarra@it.uc3m.esAbstract. The provision of multicast communications <strong>in</strong> wireless andwired networks has followed different paths which have led to differentsolutions. Little has been accomplished to-date <strong>in</strong> br<strong>in</strong>g<strong>in</strong>g together thetraditional IP multicast model used <strong>in</strong> fixed networks and multicast rout<strong>in</strong>gprotocols for wireless ad hoc networks. We analyse the provision ofan <strong>in</strong>tegrated IP multicast service <strong>in</strong> which mobile hosts can seamlesslyparticipate <strong>in</strong> IP multicast sessions regardless of the currently underly<strong>in</strong>gnetwork type. We propose a multicast architecture <strong>in</strong> comb<strong>in</strong>ationwith a new ad hoc multicast rout<strong>in</strong>g protocol called MMARP. MMARPnodes are challenged with special IGMP-handl<strong>in</strong>g capabilities allow<strong>in</strong>gour solution to comb<strong>in</strong>e the efficiency of multicast ad hoc rout<strong>in</strong>g protocolswith the support of standard-IP nodes without an impairment <strong>in</strong>the performance of the protocol. Our empirical results demonstrate thatsuch k<strong>in</strong>d of multicast ad hoc access networks offer a good performancewhen compared with the traditional s<strong>in</strong>gle-hop wireless multicast access.1 IntroductionIP Multicast is suited for efficient multipo<strong>in</strong>t communications among a groupof nodes. It has emerged as one of the most researched areas <strong>in</strong> network<strong>in</strong>g.The problem of efficient packet distribution to a specific group of dest<strong>in</strong>ationshas been researched s<strong>in</strong>ce the late 80’s and most of the routers nowadays supportIP multicast rout<strong>in</strong>g protocols. The ma<strong>in</strong> benefit of IP Multicast is thatthe bandwidth consumption for group communications is dramatically reducedcompared to unicast-based group communications. This is of particular <strong>in</strong>terestfor ‘all-IP’ and ‘beyond 3G’ mobile networks consist<strong>in</strong>g of a high number ofuser term<strong>in</strong>als us<strong>in</strong>g applications which are typically <strong>in</strong>teractive, multiparty andbandwidth-avid.Many projects like the IST project MIND (Mobile IP-based Network Developments)[1] have researched the extension of IP-based radio access networks toS. Pierre, M. Barbeau, and E. Kranakis (Eds.): ADHOC-NOW 2003, LNCS <strong>2865</strong>, pp. 84–95, 2003.c○ Spr<strong>in</strong>ger-Verlag Berl<strong>in</strong> Heidelberg 2003


Extend<strong>in</strong>g Seamless IP Multicast Edge-Coverage 85<strong>in</strong>clude ad-hoc wireless elements with<strong>in</strong> the access <strong>in</strong>frastructure as a naturalevolution towards ‘beyond 3G’ systems. In this ad hoc fr<strong>in</strong>ge, a user term<strong>in</strong>alemploys those of other users as relay po<strong>in</strong>ts to provide multi-hop paths betweenmobile nodes and the fixed access network architecture.The provision of an <strong>in</strong>tegrated IP multicast service <strong>in</strong> such an heterogeneousscenario consist<strong>in</strong>g on traditional IP core networks <strong>in</strong>terconnect<strong>in</strong>g a variety ofwireless and wired access networks and technologies is extremely complex. Thereare specific solutions for wireless ad hoc networks, but the real challenge is theireffective and efficient <strong>in</strong>tegration with (fixed) IP multicast protocols to achieve aseamless IP multicast service <strong>in</strong> which group members from any of these networktypes can take part <strong>in</strong> the same IP multicast session. Furthermore, mobile nodesshould be allowed to move among these types of networks without any servicedisruption.To our knowledge, for the specific problem of IP multicast <strong>in</strong>terwork<strong>in</strong>g betweenIP access networks and wireless and mobile ad hoc networks, there arenot satisfactory solutions so far. The typical <strong>in</strong>tra-doma<strong>in</strong> IP multicast protocolsfor fixed networks (i.e. IGMPv2[2] for multicast group membership and PIM-SM[3] for IP multicast rout<strong>in</strong>g) are not able to deal with the quick and unpredictablel<strong>in</strong>k changes which characterise ad hoc networks. They would consumetoo much overhead to keep updated distribution paths <strong>in</strong> such variable topologies.In addition, multicast ad hoc rout<strong>in</strong>g protocols like CAMP[4], ODMRP[5],and ADMR[6] among others, <strong>in</strong>corporate specific functionality which enablesthem to cope with the particular characteristics of ad hoc networks but theyare only suitable for isolated ad hoc networks. These protocols do not provideany means to <strong>in</strong>teroperate with the protocols used <strong>in</strong> the fixed IP networks andthey do not support the attachment of standard IP multicast nodes to the adhoc extension. In fact, the only few proposals to connect ad hoc networks tothe Internet, like the one <strong>by</strong> Lei and Perk<strong>in</strong>s[7] have only considered the case ofunicast traffic.In this paper we propose an <strong>in</strong>tegrated IP Multicast solution for ad hoc networkextensions consist<strong>in</strong>g of a novel IP multicast architecture and the MulticastMAnet Rout<strong>in</strong>g Protocol (MMARP). MMARP is a new multicast ad hoc rout<strong>in</strong>gprotocol based on the same basic mechanisms as other ad hoc multicast rout<strong>in</strong>gprotocols. However, it <strong>in</strong>corporates additional functionalities to deal with thecomplexity of support<strong>in</strong>g traditional IP nodes whilst <strong>in</strong>teroperat<strong>in</strong>g smoothlywith fixed IP networks. MMARP nodes are able to <strong>in</strong>tercept and process standardIP multicast messages. They further permit standard IP nodes to seamlesslyparticipate <strong>in</strong> IP multicast communications as they do when attached to a fixedIP network. The novelty of our approach is not only the provision of such an<strong>in</strong>tegrated IP multicast solution, but also the way <strong>in</strong> which the functions aredivided among the fixed and ad hoc nodes so that the <strong>in</strong>terwork<strong>in</strong>g is achievedwithout a noticeable impairment <strong>in</strong> the overall performance.The rema<strong>in</strong>der of the paper is organised as follows: section 2 comments onthe problems, requirements, and proposed architecture for ad hoc access networkextensions. A detailed description of the MMARP protocol is given <strong>in</strong> section 3.


86 P.M. Ruiz et al.Section 4 presents some empirical results. F<strong>in</strong>ally, section 5 gives some conclusions.2 Proposed Multicast ArchitectureOne of the most important design issues <strong>in</strong> the multicast architecture for seamlessIP multicast provision <strong>in</strong> ad hoc network extensions is the separation of thefunctions between the different network boundaries. We followed a top-downapproach which allowed us to derive the best design options from the particularrequirements and related issues of a seamless and <strong>in</strong>tegrated multicast solution.2.1 RequirementsThe first step towards an <strong>in</strong>tegrated IP multicast solution is the identificationof the requirements. As an objective for ad hoc network extensions we seek atrade-off <strong>in</strong> which at least the follow<strong>in</strong>g requirements are met:– Interoperability with IP Multicast mechanisms <strong>in</strong> fixed networks– Efficiency, scalability and low signall<strong>in</strong>g overhead– Resilience and robustness (e.g. several po<strong>in</strong>ts of attachment to the fixednetwork)– Compatibility with <strong>in</strong>ter-doma<strong>in</strong> multicast rout<strong>in</strong>g– Support of seamless mov<strong>in</strong>g of term<strong>in</strong>als among network types2.2 Problems to SolveTry<strong>in</strong>g to map the traditional IP multicast model <strong>in</strong>to the concrete scenario of adhoc network extensions, allows us to identify specific problems which need to besolved. Accord<strong>in</strong>g to the IP multicast model for IP multicast hosts, the processof tak<strong>in</strong>g part <strong>in</strong> multicast communications is quite straightforward. When theywish to send multicast traffic they simply use a class-D address as a dest<strong>in</strong>ationand send the datagrams. When they are <strong>in</strong>terested <strong>in</strong> receiv<strong>in</strong>g multicast traffic,they use the Internet Group Management Protocol (IGMP[6]) to <strong>in</strong>form theirFirst Hop Multicast Router (FHMR) about the group they wish to jo<strong>in</strong>. Thissimple operation is not automatically supported <strong>in</strong> ad hoc networks due to someof the problems presented below.TTL Issues. IGMP uses IP datagrams with a time-to-live (TTL) of one hop forthe communication between hosts and routers. Thus, <strong>by</strong> default, only directlyconnected hosts are able to jo<strong>in</strong> multicast groups s<strong>in</strong>ce IGMP messages areunable to transit a multi-hop ad hoc network fr<strong>in</strong>ge.Multihop Nature of MANETs. Packets sent <strong>by</strong> sources which are morethan one hop away will not automatically be received <strong>by</strong> the FHMR. However,<strong>in</strong>termediate ad hoc nodes must ensure that these packets reach the FHMR as it


Extend<strong>in</strong>g Seamless IP Multicast Edge-Coverage 87is required <strong>by</strong> most IP Multicast rout<strong>in</strong>g protocols (e.g. PIM-SM). The supportof standard IP nodes is an issue that requires that ad hoc nodes <strong>in</strong>corporatecapabilities for the <strong>in</strong>terception and process<strong>in</strong>g of IGMP messages s<strong>in</strong>ce theseare the means <strong>by</strong> which hosts jo<strong>in</strong> IP multicast groups <strong>in</strong> fixed networks. Todate, none of the proposed multicast ad hoc rout<strong>in</strong>g protocols is able to handlesuch types of messages.Flat Address<strong>in</strong>g. An additional issue relates to the differences between thehierarchical address<strong>in</strong>g architecture which is used <strong>in</strong> fixed networks and the flataddress<strong>in</strong>g architecture used <strong>in</strong> ad hoc networks. The problem is that multicastrouters usually perform a process called an ‘RPF-check’ on every <strong>in</strong>com<strong>in</strong>gpacket. This process drops any packet which arrives at an <strong>in</strong>terface which thatrouter would not use to reach the source of the packet.2.3 Proposed ArchitectureThere are several alternatives to achieve efficient network layer multicast<strong>in</strong>gsupport between nodes with<strong>in</strong> the ad hoc network extension and those <strong>in</strong> theaccess network. As we showed <strong>in</strong> [8], the most relevant are basically what wecalled a tunnel-based approach, and multicast ad hoc fr<strong>in</strong>ge. The former is basedon the creation of a tunnel between receivers and the access routers. We haveselected the multicast ad hoc fr<strong>in</strong>ge approach because, as we demonstrated <strong>in</strong>[8], it is much better <strong>in</strong> terms of scalability, simplicity and performance.The key po<strong>in</strong>t <strong>in</strong> our proposed architecture is the idea of conf<strong>in</strong><strong>in</strong>g any newfunctionality to with<strong>in</strong> the ad hoc fr<strong>in</strong>ge, challeng<strong>in</strong>g ad hoc nodes with theability to process standard protocols (i.e. IGMP) to <strong>in</strong>teract with non-ad hocnodes. This mechanism exploits the anonymous nature of IP multicast becausethe FHMR does not need to know which node is <strong>in</strong>terested <strong>in</strong> jo<strong>in</strong><strong>in</strong>g a particularmulticast group, but only if there is any. So, when a standard-IP host generatesan IGMP Report, <strong>in</strong>ternally ad hoc nodes will not need to transport that message.They use the MMARP protocol to create efficiently multicast paths with<strong>in</strong>the ad hoc extension and any of the ad hoc nodes at a s<strong>in</strong>gle hop from the FHMRwill regenerate such an IGMP Report message. This shields the solution fromthe particular IP multicast rout<strong>in</strong>g protocol be<strong>in</strong>g used <strong>in</strong> the fixed network:we can <strong>in</strong>teroperate <strong>in</strong> the same way with all of them just <strong>by</strong> send<strong>in</strong>g IGMPReports. So, our approach does not require any changes <strong>in</strong> standard IP nodesand routers. Mobile nodes will behave accord<strong>in</strong>g to the standard IP Multicastmodel <strong>in</strong> which there is no requirement for senders and the only requirement forreceivers is the use of the IGMP protocol to jo<strong>in</strong> multicast groups.In addition, as the use of Standard-IP mechanisms (e.g. the ARP or IGMPprotocols) with<strong>in</strong> ad hoc networks is costly and usually offers limited performance,we propose a specific multicast ad hoc rout<strong>in</strong>g protocol called MMARPwhich <strong>in</strong>corporates particular path creation mechanisms to support standard-IPmessages without an impairment <strong>in</strong> the protocol’s performance. These specificMMARP extensions are described <strong>in</strong> the next section, whereas the proposedarchitecture is depicted <strong>in</strong> Fig. 1.


88 P.M. Ruiz et al.Access NetworkCoreAS 6110RPMIGAS 766MSDP/MBGP DVMRP, PIM, IGMP MMARP IGMPRPPIM-SM MSDPGIGMPIP IPL2/PH L2/PHYARPIM-SMIGMPIP IPL2/PH L2/PHYMIGAppTCP/UDPMMARPIGMPIPL2/PHY...Ad hocAppTCP/UDPMMARIGMPIPL2/PHYStd-IPAppTCP/UDPIGMPIPL2/PHYFig. 1. Proposed multicast architectureThe AR and RP nodes <strong>in</strong> the figure represent standard multicast-enabledrouters runn<strong>in</strong>g PIM-SM. ‘Ad hoc’ represent pure ad hoc nodes and ‘Std IP’represnts a standard IP multicast-enabled mobile host. The protocol provid<strong>in</strong>gefficient paths between the nodes with<strong>in</strong> the ad hoc network fr<strong>in</strong>ge is theMMARP protocol presented below. From the po<strong>in</strong>t of view of the core networkand the AR, the ad hoc fr<strong>in</strong>ge is seen just as another BMA subnet (i.e. groupmembership are be<strong>in</strong>g dynamically updated <strong>by</strong> IGMP Report messages received<strong>by</strong> the ARs).3 The MMARP ProtocolThe MMARP protocol is especially designed for mobile ad hoc networks(MANETs). It is fully compatible with the standard IP Multicast model andit allows standard IP nodes to take part <strong>in</strong> multicast communications withoutrequir<strong>in</strong>g any change because MMARP supports the IGMP protocol as a meansto <strong>in</strong>teroperate both with access routers and standard IP nodes. The <strong>in</strong>teroperationwith access routers is performed <strong>by</strong> the Multicast Internet Gateways(MIGs) which are the ad hoc nodes situated just one hop away from the fixednetwork. Every MMARP node may become a MIG at any time. The only differencebetween a MIG and a normal MMARP node is that the MIG is responsiblefor notify<strong>in</strong>g the access routers about the groups memberships with<strong>in</strong> the ad hocfr<strong>in</strong>ge. The mechanism allows MMARP to work with any IP multicast rout<strong>in</strong>gprotocol <strong>in</strong> the access network and, therefore, it shields the MMARP operationfrom the protocols perform<strong>in</strong>g the <strong>in</strong>tra-doma<strong>in</strong> or <strong>in</strong>ter-doma<strong>in</strong> multicastrout<strong>in</strong>g.For the rema<strong>in</strong><strong>in</strong>g text we use the terms standard IP source or standard IPreceiver to refer to a traditional IP Multicast source or receiver and we use theterm ad hoc sender or ad hoc receiver to refer to pure ad hoc nodes.


Extend<strong>in</strong>g Seamless IP Multicast Edge-Coverage 893.1 Overall OperationMMARP uses an hybrid approach to build a distribution mesh similar to theone used <strong>by</strong> ODMRP[5]. Routes among ad hoc nodes are established on-demand,whereas routes towards nodes <strong>in</strong> the fixed networks are ma<strong>in</strong>ta<strong>in</strong>ed proactively.This offers a good trade-off between efficiency, smooth <strong>in</strong>terwork<strong>in</strong>g with thefixed network while still hav<strong>in</strong>g a good protection aga<strong>in</strong>st l<strong>in</strong>k breakages (seeFig. 2). However, the way <strong>in</strong> which the mesh is created is different from ODMRPdue to the special requirements which MMARP nodes have to face. For example,MMARP nodes can participate <strong>in</strong> the mesh creation process on behalf ofstandard IP nodes or even on behalf of the access router (AR). In addition,they have behave so that the standard IP multicast model can be preserved (i.e.mak<strong>in</strong>g all the traffic generated with<strong>in</strong> the ad hoc fr<strong>in</strong>ge to be delivered to theAR). These specific differences are expla<strong>in</strong>ed <strong>in</strong> the next subsections.The reactive part consists of a request phase and a reply phase. When an adhoc node has new data to send, it periodically broadcasts a MMARP SOURCEmessage which is flooded with<strong>in</strong> the entire ad hoc network to update the stateof <strong>in</strong>termediate nodes as well as the multicast routes. These messages have anidentifier which allows <strong>in</strong>termediate nodes to detect duplicates and avoid unnecessaryretransmissions. When such a message is received <strong>by</strong> an ad hoc node forthe first time, it stores the IP address of the previous hop and rebroadcasts thepacket. When one of these messages arrives at a receiver, or at a neighbour of astandard IP receiver, it broadcasts a MMARP JOIN message <strong>in</strong>clud<strong>in</strong>g the IPaddress of the selected previous hop towards the source. When an ad hoc nodedetects its IP address <strong>in</strong> an MMARP JOIN message, it recognises that it is <strong>in</strong> thepath between a source and a dest<strong>in</strong>ation. It then activates its MF FLAG (MulticastForwarder Flag) and rebroadcasts a MMARP JOIN message conta<strong>in</strong><strong>in</strong>g itspreviously stored next hop towards the source. In this way, a shortest multicastpath is created between the source and the dest<strong>in</strong>ation. When there are differentsources and receivers for the same group, the process results <strong>in</strong> the creation of amulticast distribution mesh like the one presented <strong>in</strong> Fig. 2).The proactive part of the protocol is simply based on the periodic advertisementof the MIGs as default multicast gateways to the fixed network. As theTTL of IGMP messages is fixed at one, the reception of an IGMP Query can beused <strong>by</strong> ad hoc nodes to detect that they are MIGs and activate its MIG FLAG.MIGs periodically broadcast a MMARP DFL ROUTE message which is floodedto the whole ad hoc network. The reception of this message <strong>in</strong>forms <strong>in</strong>termediatenodes about the path towards multicast sources <strong>in</strong> the access network. Whenthe MMARP DFL ROUTE message reaches a receiver or a neighbour of a receiver,this node <strong>in</strong>itiates a jo<strong>in</strong><strong>in</strong>g process similar to the one that we have justdescribed for the reactive approach. When the MIG receives the MMARP JOINmessage, it then sends an IGMP Report towards the FHMR, ensur<strong>in</strong>g the IPmulticast data from sources <strong>in</strong> the fixed network reach the dest<strong>in</strong>ations with<strong>in</strong>the ad hoc network extension.The protocol <strong>in</strong>corporates local repair<strong>in</strong>g mechanisms to overcome l<strong>in</strong>k breakagesdur<strong>in</strong>g the creation of the distribution mesh. Whenever a node is unable to


90 P.M. Ruiz et al.Access NetworkR 2Remote Networkwith receiversARMIGS 2S 3R 1R 3S 1Multicast Forwarders (MF)L<strong>in</strong>ksMcast routesFig. 2. Multicast mesh after request/reply phasedeliver a MMARP JOIN message to its next hop after four retries, it broadcastsa MMARP NACK message to its one-hop neighbours. Upon the reception ofthis message, the neighbours use their own route to reach that next hop. Shouldany of them not know an alternate path, they repeat the process until a path isfound. Although this recovery process does not offer optimal routes, it offers aquick recovery before the next topology refresh.Once the mesh is established, the data forward<strong>in</strong>g is very simple: data packetsaddressed to a certa<strong>in</strong> multicast group are only propagated <strong>by</strong> ad hoc nodeswhich have their MF FLAG active for that group. When such a data packetarrives at a node whose MF FLAG for that group has not expired, it checksthat it is not a duplicate and <strong>in</strong> that case retransmits the packet. In any othercase the packet is dropped.3.2 Support of Standard IP Multicast ProtocolsThe protocols used <strong>by</strong> standard IP nodes to perform their basic operation (suchas ARP, or IGMP) were designed to operate <strong>in</strong> BMA (Broadcast Medium Access)networks. However, <strong>in</strong> multihop ad hoc networks, the l<strong>in</strong>k layer has a differentsemantics. The neighbours of a node are able to receive the frames it sends but itis not guaranteed that they are able to directly communicate among all of them.In traditional ad hoc rout<strong>in</strong>g protocols without explicit support for standardIP nodes this is not a problem because each ad hoc node sends its own sourceannouncement or jo<strong>in</strong> message. In order to be compatible with the standardIP multicast model, MMARP nodes <strong>in</strong> the neighbourhood of a standard IPnode have to send MMARP SOURCE or MMARP JOIN messages on behalfof the standard IP node. This means that messages generated <strong>by</strong> standard IP


Extend<strong>in</strong>g Seamless IP Multicast Edge-Coverage 91nodes, may be received <strong>by</strong> all neighbours and processed <strong>in</strong>dependently, creat<strong>in</strong>gunnecessary paths.The MMARP protocol has been designed to avoid unnecessary generationof these messages. It <strong>in</strong>cludes a field <strong>in</strong> its header which facilitates the identificationof the node which actually triggered the send<strong>in</strong>g of the control message;this allows ad hoc nodes to identify all the MMARP packets which are triggered<strong>by</strong> a specific standard IP node, <strong>in</strong>dependently of the ad hoc neighbour whichactually generated it. Thus, ad hoc neighbours of standard IP nodes and <strong>in</strong>termediatead hoc nodes are able to detect these types of MMARP SOURCEand MMARP JOIN messages as duplicate and avoid the creation of unnecessarypaths.4 Empirical ResultsWe have set up an <strong>in</strong>door 802.11b multicast wired-to-wireless ad hoc networktestbed to evaluate the feasibility of our MMARP-based seamless IP multicastapproach for wireless ad hoc access networks. Our target is to evaluate the benefitsof MMARP-driven <strong>in</strong>frastructureless ad hoc access networks when comparedto traditional s<strong>in</strong>gle-hop wireless IP multicast <strong>in</strong> a realistic scenario.4.1 Testbed DescriptionAs it is shown <strong>in</strong> Fig. 3, the testbed consists of six x86-compatible PCs anda laptop. Different processor and memory configurations are used, s<strong>in</strong>ce thereare not any specific hardware requirements. In fact, all of these PCs are able tosupport the workload of the experiments. Three out of the six PCs are act<strong>in</strong>gas MMARP-enabled nodes runn<strong>in</strong>g Red Hat L<strong>in</strong>ux 7.2 with the 2.4.17 kernel.They have a Lucent 802.11b pcmcia card as unique NIC. The nodes labelled asWR (Wireless Router) and WWR(Wired-to-Wireless Router) are PCs runn<strong>in</strong>gFreeBSD 4.6 OS. The WWR node is equipped with two NICs, one of them be<strong>in</strong>ga Lucent WaveLan pcmcia card to provide coverage for the wireless area, whilethe other one is a 100 Mbps Ethernet NIC. The Wired Router (WR) conta<strong>in</strong>stwo 100 Mb/s Ethernet NICs, one connected to the WWR and the other one tothe rest of fixed networks. The Sender and Receiver nodes are both runn<strong>in</strong>g RedHat 7.2 with kernel 2.4.17. The sender is a x86-compatible desktop with a 100Mb/s Ethernet card whereas the receiver is a laptop PC equipped with a Lucent802.11b-compatible pcmcia wireless NIC. Wireless 2.422 GHz channel operat<strong>in</strong>gat the maximum capacity of 2 Mb/s has been used for the experiment. We havepreviously checked that this channel was not occupied <strong>by</strong> any other equipment.All the WaveLan NICs are operated <strong>in</strong> ad hoc mode.4.2 Description of the ExperimentsTo assess the effectiveness of our proposal, we have performed two different tests:s<strong>in</strong>gle-hop IP multicast and multihop ad hoc IP multicast. The former consists of


92 P.M. Ruiz et al.MIGAccess NetworkMMARP_3MMARP_2MMARP_1WWRWRSenderFig. 3. Topology of the testbedthe network depicted <strong>in</strong> Fig. 3, <strong>in</strong> which every MMARP node is switched off, sothat there is a dedicated IEEE 802.11b wireless l<strong>in</strong>k between the receiver and theWWR. The wired part of the network is runn<strong>in</strong>g the PIM-SM rout<strong>in</strong>g protocolto create the multicast path between the source and the WWR, which acts as anIGMP designated router forward<strong>in</strong>g multicast datagrams to the receiver whenit jo<strong>in</strong>s the source.The multihop tests are exactly the same regard<strong>in</strong>g the wired part of thenetwork. However, we deploy a self-organis<strong>in</strong>g ad hoc network extension withnodes runn<strong>in</strong>g MMARP rather than a s<strong>in</strong>gle-hop l<strong>in</strong>k between the receiver andthe WWR. The receiver jo<strong>in</strong>s the multicast source <strong>in</strong> the fixed network throughthis multihop access network.We use CBR traffic generator to measure the end-to-end bandwidth andpacket delivery ratio. This application generates UDP packets with a payload of900 <strong>by</strong>tes (i.e. 942 <strong>by</strong>tes <strong>in</strong>clud<strong>in</strong>g the IPv4 and UDP headers) which are thenaccounted at the dest<strong>in</strong>ation. For each of the tests we have performed severalmeasurements at <strong>in</strong>creas<strong>in</strong>g distances (7m, 15m, 24m, 30m, 42m) between thereceiver and the WWR. At each distance, we have repeated the measurementsus<strong>in</strong>g three different data rates of 100 packets/s (753.6 Kb/s), 50 packets/s (376.8Kb/s) and 25 packets/s (188.4 Kb/s) respectively. The results of the differenttrials are described <strong>in</strong> the next section.As expected, <strong>in</strong> our <strong>in</strong>door scenario the performance depends not only on thedistance but on the node’s position as well. This is ma<strong>in</strong>ly due to random noisecaused <strong>by</strong> travers<strong>in</strong>g walls, obstacles, etc. The results are calculated as the meanvalues over quite a huge number of measurements per experiment. In addition,the measurements are performed <strong>in</strong> the same positions for each distance. So,random noise is expected to be nearly the same <strong>in</strong> all the trials, not affect<strong>in</strong>gthe validity of our experiments.4.3 Experimental ResultsTo be sure about the cause of the packet losses <strong>in</strong> our analysis, we empiricallychecked that there were not packet losses with<strong>in</strong> the wired part of the network.So, all the packet losses perceived at the receiver will occur <strong>in</strong> the wireless partof the network.


Extend<strong>in</strong>g Seamless IP Multicast Edge-Coverage 938000007000001-hop-750kMMARP-750k1-hop-375kMMARP-375k1-hop-187kMMARP-187k600000Bandwidth (bps)50000040000030000020000010000005 10 15 20 25 30 35 40 45Distance (m)Fig. 4. Effective data rate achieved at <strong>in</strong>creas<strong>in</strong>g distanceAs it is shown <strong>in</strong> Fig. 4, both approaches are able to deliver the transmittedbandwidth at short distances. For those cases the l<strong>in</strong>k-layer contention is lowand the signal quality is good enough.In the s<strong>in</strong>gle-hop trials, due to the degradation of the signal strength with<strong>in</strong>creas<strong>in</strong>g distance, the achieved bandwidth is lower as the distance <strong>in</strong>creases.This is clearly assessed both for the achieved bandwidth and the packet deliveryratio <strong>in</strong> the ‘1-hop’ cases of Fig. 4, and Fig. 5. These results are basically theexpected behaviour as long as it is commonly known that (particularly <strong>in</strong> <strong>in</strong>doorscenarios) the signal strength usually decreases at a rate <strong>in</strong>versely proportionalto d 2 , d 3 and even <strong>in</strong> some cases d 4 <strong>in</strong> really bad <strong>in</strong>door conditions. In our case,it is clearly shown that the bandwidth and packet delivery ratios rapidly drop tozero for distances around 30 m and beyond. As expected for the 1-hop dedicatedl<strong>in</strong>k, given a fixed distance, the difference between the achieved bandwidth andthe one be<strong>in</strong>g used at the source is bigger at higher data rates.In the case of the multihop MMARP-based multicast ad hoc access network,it can be noticed that the performance at <strong>in</strong>creas<strong>in</strong>g distances degrades muchslower than 1/d 2 . This is because the average distance <strong>in</strong> each of the <strong>in</strong>termediatehops is lower than <strong>in</strong> the s<strong>in</strong>gle-hop trial. Thus, the mean signal strength is higherand the achieved bandwidth and packet delivery ratio are higher as well.However, as Fig. 4 shows, MMARP only manages to achieve a 100% deliveryratio at distances at which only one or two of the MMARP nodes are needed.At a distances higher to 30m some packet losses come up. These losses arema<strong>in</strong>ly due to the well-known hidden term<strong>in</strong>al problem which happens amongthe nodes MMARP 1, MMARP 2 and MMARP 3. As long as IEEE 802.11bdoes not implement layer 2 acknowledgements of multicast frames (as it does forunicast traffic), each time a collision happens the packet is lost.It is also particularly noticeable that the trial with the higher bandwidth <strong>in</strong>the multihop case performs much worse than the others. This is because, dueto contention, the effective bandwidth, even <strong>in</strong> the ideal case, is lower than the


94 P.M. Ruiz et al.10.90.81-hop-750kMMARP-750k1-hop-375kMMARP-375k1-hop-187kMMARP-187k0.7Packet Delivery Ratio0.60.50.40.30.20.105 10 15 20 25 30 35 40 45Distance (m)Fig. 5. Packet delivery ratio at <strong>in</strong>creas<strong>in</strong>g distance753,6 Kb/s generated <strong>by</strong> the source. When MMARP 1 receives a packet fromWWR and forwards it to MMARP 2, the effective bandwidth is reduced to halfof the orig<strong>in</strong>al. One half of the channel is used for receiv<strong>in</strong>g the packet andthe other half for send<strong>in</strong>g it. When MMARP 2 sends the packet to MMARP 3,the effective bandwidth is further reduced to a third of the orig<strong>in</strong>al (<strong>in</strong> optimalchannel conditions). Leav<strong>in</strong>g thus an effective bandwidth of 667 Kb/s (2/3 Mb/s)which is lower than the 753 Kb/s that the source is us<strong>in</strong>g.However, <strong>in</strong> the trials without that bandwidth limitation the MMARP protocolhas demonstrated to be able to deliver mostly 100% of the packets (even<strong>in</strong> non-optimal channel conditions) without an impairment <strong>in</strong> the overhead orthe scalability of the protocol. The differences <strong>in</strong> the packet delivery ratio betweenthese two multihop cases are ma<strong>in</strong>ly due to the hidden term<strong>in</strong>al problem.At higher data rates, the probability of two packets actually collid<strong>in</strong>g is higher.However, as the figure shows, the performance has not been severely degradedfor that reason. So, it is clear that the real limitation towards multicast ad hocaccess networks is mostly the IEEE 802.11b MAC layer, which is known not tobe very adequate for ad hoc networks. This demonstrates that, regard<strong>in</strong>g theprotocol’s behaviour, hav<strong>in</strong>g a higher number of nodes <strong>in</strong> the same radio l<strong>in</strong>k isnot an issue. Only nodes with the MF FLAG active will forward packets, andonly the best of all those nodes would be selected as a forwarder.5 Conclusions and Future WorkCurrently there is not a real solution to seamlessly support efficient IP multicastcommunications <strong>in</strong> future heterogeneous wireless scenarios. We present our solutionfor ad hoc networks extend<strong>in</strong>g fixed IP access networks. It consists of a novelarchitecture and a new multicast ad hoc rout<strong>in</strong>g protocol called MMARP. Thisapproach is the first to our knowledge be<strong>in</strong>g able to support seamless roam<strong>in</strong>g


Extend<strong>in</strong>g Seamless IP Multicast Edge-Coverage 95from multicast nodes (<strong>in</strong>clud<strong>in</strong>g traditional IP multicast hosts) between traditionalIP multicast networks and ad hoc network extensions. In the authors’ opp<strong>in</strong>ion,<strong>in</strong> addition to the proposed solution, it is also an important contributionthe demonstration through empirical experimentation that this k<strong>in</strong>d of extensionsdriven <strong>by</strong> MMARP are able to easily extend IP multicast edge-coverage<strong>in</strong> a cost-effective way, without an impairment <strong>in</strong> the overall throughput. Theresults show that even at distances which the traditional s<strong>in</strong>gle-hop approach isnot able to cover, the multihop option offers more than a 98% packet deliveryratio.For future work, we are work<strong>in</strong>g towards the analysis of the approach <strong>in</strong>hybrid ad hoc networks (e.g. mixed WLAN, Bluetooth scenarios), and withdifferent layer 2 protocols to improve the performance of the IEEE 802.11bMAC layer.AcknowledgementsThis work has been partially funded <strong>by</strong> Spanish MCYT <strong>by</strong> means of the projectsISAIAS(TIC2000-0198-P4-04) and SAM(TIC2002-04531-C04-04).References1. IST-MIND Official Web site. [On-l<strong>in</strong>e] http://www.ist-m<strong>in</strong>d.org/2. Fenner, W.: Internet Group Management Protocol, Version 2. IETF Request ForComments, RFC 2236, November, 1997.3. Estr<strong>in</strong>, D., Far<strong>in</strong>acci, D., Helmy, A., Thaler, D., Deer<strong>in</strong>g, S., Handley, M., Jacobson,V., Liu, C., Sharma P, Wei, L.: Protocol Independent Multicast Sparse Mode (PIM-SM): Protocol Specification. RFC 2362, June 1998.4. Garcia-Luna-Aceves, J.J., Madruga, E.L.: The Core Assisted Mesh Protocol. IEEEJSAC, Vol 17, No. 8, August 1999, pp.1380–1394.5. Lee, S.-J., Su, W., Gerla, M.: On-Demand Multicast Rout<strong>in</strong>g Protocol <strong>in</strong> MultihopWireless Mobile Networks. ACM/Kluwer Mobile Networks and Applications, 2000.6. Jetcheva, J.G., Johnson, D.B.: Adaptive Demand-Driven Multicast Rout<strong>in</strong>g <strong>in</strong>Multi-Hop Wireless Ad Hoc Networks. Proceed<strong>in</strong>gs of the 2001 ACM InternationalSymposium on Mobile Ad Hoc Network<strong>in</strong>g and Comput<strong>in</strong>g, ACM, Long Beach, CA,(October 2001): 33–447. H. Lei and C.E. Perk<strong>in</strong>s. Ad Hoc Network<strong>in</strong>g with Mobile IP. In Proceed<strong>in</strong>gs of theSecond European Personal Mobile Communications Conference, October 1997, pp.197–202.8. Ruiz, P.-M., Brown, G., Groves, I.: Scalable Communications for Ad hoc Extensionsconnected to Mobile IP Networks. Proceed<strong>in</strong>gs of the (PIMRC’2002). Lisbon,September, 2002. Vol. 3, pp. 1053–1057.


A Uniform Cont<strong>in</strong>uum Model for Scal<strong>in</strong>gof Ad Hoc NetworksErnst W. Grundke and A. Nur Z<strong>in</strong>cir-HeywoodFaculty of <strong>Computer</strong> <strong>Science</strong>, Dalhousie University6050 University Avenue, Halifax, Nova Scotia, Canada B3H 1W5{grundke,z<strong>in</strong>cir}@cs.dal.caAbstract. This paper models an ad-hoc network as a cont<strong>in</strong>uum of nodes, ignor<strong>in</strong>gedge effects, to f<strong>in</strong>d how the traffic scales with N, the number of nodes.We obta<strong>in</strong> expressions for the traffic due to application data, packet forward<strong>in</strong>g,mobility and rout<strong>in</strong>g, and we f<strong>in</strong>d the effects of the transmission range, R,andthebandwidth. The results <strong>in</strong>dicate that the design of scalable adhoc networks shouldtarget small numbers of nodes (not over 1000) and short transmission ranges. Theanalysis produces three dimensionless parameters that characterize the nodes andthe network: α, thewalk/talk ratio, or the ratio of the l<strong>in</strong>k event rate to the applicationpacket rate; β,theforward<strong>in</strong>g overhead, or the average number of hopsrequired for a packet to travel from source to dest<strong>in</strong>ation; and γ,therout<strong>in</strong>g overhead.We f<strong>in</strong>d that the quantity αγ/β characterizes the relative importance ofrout<strong>in</strong>g traffic and user data traffic. These quantities may be useful to comparethe results of various simulation studies.Keywords: Ad-hoc networks, mobile, scal<strong>in</strong>g, cont<strong>in</strong>uum, model.1 IntroductionSeveral features dist<strong>in</strong>guish ad-hoc networks [5] from their traditional wired counterparts:(1) Ad-hoc networks consist of mobile nodes that communicate <strong>by</strong> relativelylow-powered radio signals. (2) Nodes act both as hosts for application software andas routers to forward <strong>in</strong>com<strong>in</strong>g packets to other nodes. (3) Ad-hoc networks need tobe highly dynamic: the nodes should be able to move, <strong>in</strong>clud<strong>in</strong>g enter<strong>in</strong>g and leav<strong>in</strong>gthe network, without manual configuration. (4) F<strong>in</strong>ally, s<strong>in</strong>ce nodes rely on batteries,power is a scarce resource.Some recent papers have explored algorithms and protocols for this comb<strong>in</strong>ationof constra<strong>in</strong>ts. Santivanez et al. [11] model the scal<strong>in</strong>g of ad-hoc rout<strong>in</strong>g protocols.Gupta and Kumar [6] analyze the capacity of wireless networks under a sophisticatedmodel, although mobility and rout<strong>in</strong>g are not considered. Hong, Xu and Gerla [7] analyzethe scalability and operational features of rout<strong>in</strong>g protocols for mobile ad-hocnetworks. They divide rout<strong>in</strong>g protocols <strong>in</strong>to three categories: flat rout<strong>in</strong>g, hierarchicalrout<strong>in</strong>g and geographical (GPS-augmented) rout<strong>in</strong>g.This paper <strong>in</strong>vestigates the scal<strong>in</strong>g of a very simple model with m<strong>in</strong>imum a prioriassumptions; the effects of mobility and (flat) rout<strong>in</strong>g are <strong>in</strong>cluded. To this end, weconstruct an ad-hoc network model <strong>by</strong> specify<strong>in</strong>g just the average density of nodes(the number of nodes per unit area): we are not concerned with discrete nodes, theirS. Pierre, M. Barbeau, and E. Kranakis (Eds.): ADHOC-NOW 2003, LNCS <strong>2865</strong>, pp. 96–103, 2003.c○ Spr<strong>in</strong>ger-Verlag Berl<strong>in</strong> Heidelberg 2003


A Uniform Cont<strong>in</strong>uum Model for Scal<strong>in</strong>g of Ad Hoc Networks 97exact positions or movements, or their exact l<strong>in</strong>ks with other nodes. Thus, our modelfocuses on a cont<strong>in</strong>uum approximation rather than a graph-theoretic view of thenetwork.In order to simplify the analysis, we assume that all nodes see similar trafficconditions. In other words, we ignore the edge effects result<strong>in</strong>g from nodes near theextremity of a network hav<strong>in</strong>g fewer neighbors than centrally located nodes. In thissense our model is uniform.Our goal is to model the traffic <strong>in</strong> an ad-hoc network us<strong>in</strong>g simple and optimisticassumptions. Our simple assumptions lead to a mathematically tractable model,which <strong>in</strong> turn reveals several dimensionless parameters that characterize the operationof an ad-hoc network; these may be helpful <strong>in</strong> bridg<strong>in</strong>g the gaps between theparameters of various simulations. Our optimistic assumptions lead to upper boundson the performance of real networks. We avoid an exclusively asymptotic analysisfor a large number of nodes [11] <strong>in</strong> order to deal with practical f<strong>in</strong>ite cases; thereforeour results are derived <strong>in</strong> cf rather than Q(f) format, although the values of constantsare approximate at best.In Sections 2 and 3 we def<strong>in</strong>e the parameters to describe two-dimensional networkgeometry and node behavior, respectively. An expression for the traffic due to userapplications is derived <strong>in</strong> Section 4. In Section 5 we f<strong>in</strong>d how much traffic resultsfrom mobility to support rout<strong>in</strong>g. The user data traffic and rout<strong>in</strong>g traffic arecomb<strong>in</strong>ed <strong>in</strong> Section 6 to f<strong>in</strong>d the total traffic and the power requirement. The twodimensionalresults are extended to m dimensions <strong>in</strong> Section 7, and conclusions aredrawn <strong>in</strong> Section 8.2 Network Geometry <strong>in</strong> Two DimensionsWe consider an ad-hoc network whose nodes lie <strong>in</strong> a plane. With each node we canassociate a Voronoi cell, which is the set of po<strong>in</strong>ts closer to that node than any other.We approximate cells <strong>by</strong> circles with radii r 1 on average, giv<strong>in</strong>g an average distanced 1 =2r 1 between neighbor<strong>in</strong>g nodes, and we suppose that the cell area is approximatelypr 2 1 . (See [6], who <strong>in</strong>vestigate feasible Voronoi tessellations <strong>in</strong> detail.) Thusthe node density (the number of nodes per unit area) is approximately 4/pd 2 1 .We assume that the network consists of N nodes occupy<strong>in</strong>g a circular region ofdiameter D+d 1 , and that the maximum distance between any pair of nodes is D. Thenode density must be approximately 4N/(p(D+d 1 ) 2 ), so that Nd 21 =(D+d 1 ) 2 ,orD=d 1 (÷N-1).3 Node ModelThe essential features of nodes are that (a) they generate user data, (b) they forwardpackets, (c) they move, (d) they have a f<strong>in</strong>ite radio transmission range, and (e) theyhave a f<strong>in</strong>ite transmission bandwidth.(a) We assume that each node is a random source of user data, be<strong>in</strong>g characterized<strong>by</strong> a rate p T , the number of new data packets created and transmitted <strong>by</strong> a node perunit time to a randomly chosen dest<strong>in</strong>ation node. (The subscript T is meant to suggestan application transmitt<strong>in</strong>g, or talk<strong>in</strong>g.).(b) Packet forward<strong>in</strong>g is discussed <strong>in</strong> Section 4.


98 E.W. Grundke and A.N. Z<strong>in</strong>cir-Heywood(c) When a node moves, it may enter or leave the radio range of one or more othernodes. We assume that nodes are able to detect the mak<strong>in</strong>g and break<strong>in</strong>g of radiol<strong>in</strong>ks, and that such l<strong>in</strong>k events occur at each node at a rate p W per unit time. Thesymbol W is meant to suggest a user walk<strong>in</strong>g while carry<strong>in</strong>g a mobile device.We def<strong>in</strong>e a = p W /p T to be the walk/talk ratio, the ratio of a node's rate of l<strong>in</strong>kevents to its rate of produc<strong>in</strong>g user data packets. Notice that a depends only on thenodal behavior and not on the network configuration. The value a is a usefuldimensionless measure of the impact of node mobility.(d) It is important to model the radio transmission range of a node because of afundamental tradeoff <strong>in</strong> ad-hoc networks: a large range can reduce the number ofhops required to transport a packet to its dest<strong>in</strong>ation, but it also reduces the number ofnodes that can transmit simultaneously. We assume that the transmission range of anode is R: at distances exceed<strong>in</strong>g R, a node's signal cannot be received and does not<strong>in</strong>terfere with other reception, either because the signal is too weak or because someaspect of the physical layer restricts the nodes' participation. (For example, afrequency hopp<strong>in</strong>g scheme may form a logical small-scale network of this size.) Weassume that d 1 £ R £ D, s<strong>in</strong>ce (i) for R < d 1 the network becomes largely disconnected,and (ii) for R > D all N nodes are already with<strong>in</strong> range. The number of nodes with<strong>in</strong>range of any transmitt<strong>in</strong>g node is a group of approximately g =(R+r 1 ) 2 /r 2 1 nodes,<strong>in</strong>clud<strong>in</strong>g the transmitt<strong>in</strong>g node.(e) The quantities p T and p W cannot be arbitrarily large because the packet transmissionrate for each node is f<strong>in</strong>ite. Let b be the maximum possible value for p T ,realized when a node transmits new user data packets cont<strong>in</strong>uously and handles noother traffic. (Assum<strong>in</strong>g one packet per l<strong>in</strong>k event, p W must also satisfy p W £b.) Thenb is node's bandwidth expressed <strong>in</strong> packets/second. However, because of the natureof a typical physical layer, a node cannot atta<strong>in</strong> a packet transmission rate of b. If weassume that the g nodes with<strong>in</strong> radio range share a channel at any moment, theaverage maximum packet transmission rate per node is only b/g.4 User Data TrafficOur network is assumed to have only two types of traffic: application (user) datapackets and rout<strong>in</strong>g packets. We assume that there is no gateway to other networks.We beg<strong>in</strong> <strong>by</strong> us<strong>in</strong>g the above network geometry and node model to f<strong>in</strong>d the trafficdue to user data alone.First we def<strong>in</strong>e b (>1), the forward<strong>in</strong>g overhead, to be the average number of hopsrequired for a packet to travel from source node to dest<strong>in</strong>ation node. (We ignore datatraffic between local applications.) With the assumption of uniformity, this impliesthat for every user data packet <strong>in</strong>jected <strong>in</strong>to the network <strong>by</strong> a node, the node mustperform on average b packet transmissions. This is a cost of participat<strong>in</strong>g <strong>in</strong> an adhocnetwork: <strong>in</strong> order to orig<strong>in</strong>ate data packets at a rate p T , a node must transmit datapackets at a rate of bp T .The average distance from the source to the dest<strong>in</strong>ation [4] is about D/2. Weassume that rout<strong>in</strong>g is optimal, i.e. a packet travels roughly <strong>in</strong> a straight l<strong>in</strong>e <strong>in</strong> hopsof length R. Then the distance D/2 can be covered <strong>in</strong> b = D/(2R) hops. S<strong>in</strong>ce D=d 1 (÷N-1), we have


A Uniform Cont<strong>in</strong>uum Model for Scal<strong>in</strong>g of Ad Hoc Networks 99b = r 1( N-1) . (1)RWe note that b is dimensionless, and, because of the limits on R, satisfies 1 £b£(÷N-1)/2. (Follow<strong>in</strong>g the algebra strictly, R £ D would give 0.5 £b, but it isprecisely as R approaches D that the edge effect beg<strong>in</strong>s to matter, and b1), the rout<strong>in</strong>g overhead, to be the number of packets generated <strong>by</strong>one l<strong>in</strong>k event. As with user data traffic, uniformity implies that every node musttransmit on average g rout<strong>in</strong>g packets per l<strong>in</strong>k event, or gp W packets per unit time. To


100 E.W. Grundke and A.N. Z<strong>in</strong>cir-Heywoodestimate g, we assume that <strong>by</strong> transmitt<strong>in</strong>g one packet a node can broadcast to g-1other nodes. However, the <strong>in</strong>formation will be new to only about half of those nodes.In total we must reach N nodes, so thatorN = g g-12 , (4)g =2NR 2r 12 + 2R r 1. (5)If the range is m<strong>in</strong>imized (that is, R ª 2r 1 ), the rout<strong>in</strong>g overhead is g = (N/4) -1.Clearly this estimate needs to be ref<strong>in</strong>ed to take specific rout<strong>in</strong>g protocols <strong>in</strong>toaccount. The assumption of reach<strong>in</strong>g (g-1)/2 nodes with a s<strong>in</strong>gle packet may be quiteoptimistic, s<strong>in</strong>ce it requires a receiv<strong>in</strong>g node to “know” whether its position justifiesrebroadcast<strong>in</strong>g a given packet (e.g. whether it is at the edge of the previoustransmitter's range <strong>in</strong> the “forward” direction). On the other hand, some protocols[1,2,9,10] effectively comb<strong>in</strong>e multiple events <strong>in</strong>to a s<strong>in</strong>gle packet to improveefficiency.The rout<strong>in</strong>g overhead is Q(N/R 2 ), and is potentially much more serious than theforward<strong>in</strong>g overhead, which is only Q(÷N/R). It is <strong>in</strong>terest<strong>in</strong>g that g is Q(b 2 ).The rout<strong>in</strong>g packet rate gp W cannot exceed the limit b/g established earlier: gp W £b/g, orp W £ b gg = b g-12N g= b2N [1- r 1 2(R+r 1 ) 2 ] ª b2N . (6)Therefore the maximum rate at which a node can generate l<strong>in</strong>k events is Q(1/N). Itis almost <strong>in</strong>dependent of R because, <strong>in</strong> our model, g is Q(N/R 2 ) while the bandwidthreduction factor, 1/g, is Q(R 2 ).The limit<strong>in</strong>g case p W = b/(gg) is obta<strong>in</strong>ed for a high walk/talk ratio, where theuser data traffic is starved to zero <strong>by</strong> frequent l<strong>in</strong>k events. This sets a fundamentallimit on the product Np W , the network l<strong>in</strong>k event rate. Fortunately, the consequencesare not numerically serious for networks of modest size. For example, if N=100nodes have a bandwidth of 1Mbps each, then each node would have to generatealmost 5 Kbps of l<strong>in</strong>k event packets <strong>in</strong> order to saturate the network. Similarly, if p W= 1 event/second and rout<strong>in</strong>g packets conta<strong>in</strong> 500 bits, then saturation occurs at aboutN=1000.6 Total Traffic and PowerThe comb<strong>in</strong>ed effect of user data traffic and rout<strong>in</strong>g traffic is that each node transmitsbp T + gp W packets per unit time, and the bandwidth constra<strong>in</strong>t for the comb<strong>in</strong>ed traffic


A Uniform Cont<strong>in</strong>uum Model for Scal<strong>in</strong>g of Ad Hoc Networks 101is bp T + gp W £ b/g. Relative to transmitt<strong>in</strong>g p T packets of user data per unit time, anode <strong>in</strong>curs an overhead of b + ag.Depend<strong>in</strong>g on whether a, the walk/talk ratio, is greater or less than b/g, rout<strong>in</strong>gtraffic or forward<strong>in</strong>g traffic, respectively, dom<strong>in</strong>ates <strong>in</strong> the network. This suggestsus<strong>in</strong>g values of ag/b <strong>in</strong> order to compare the results of various simulation studies; see,for example, [1-3,8,10]. In the previous sections, a low (high) walk/talk ratio shouldbe taken to mean ag/b 1).Assum<strong>in</strong>g that the range R is limited <strong>by</strong> a threshold of received signal strength, theaverage antenna power is proportional to R 2 and to the rate of packet transmission.The average power requirement per node isP = kR 2 (bp T + g p W ) (7)where k is a constant. (The antenna power for cont<strong>in</strong>uous transmission is kR 2 b.) Thepower is Q(N), with the lead<strong>in</strong>g term aris<strong>in</strong>g from mobility. P is the radiated antennapower only, and does not <strong>in</strong>clude the power consumption of the node's circuitry itself.7 Other DimensionsThis model has been built for the most practical case of two dimensions, although wecould equally well have chosen m dimensions. For m=1 we have a model of N nodesspread <strong>in</strong> a l<strong>in</strong>e (e.g. nodes <strong>in</strong> vehicle on a road), and for m=3 we have a model of Nnodes spread <strong>in</strong> a volume (e.g. nodes carried <strong>by</strong> users <strong>in</strong> a multi-storied build<strong>in</strong>g).In m dimensions, the node density is measured <strong>in</strong> units of nodes per (unit length) m .The total number of nodes, N, and the network diameter (a distance), D, are related <strong>by</strong>Nd 1 m =(D+d 1 ) m . The number of nodes <strong>in</strong> a radio group is g =(R+r 1 ) m /r 1 m . The datatransmission overhead b becomesthe rout<strong>in</strong>g overhead g becomesb = r 1R (m N -1) , (8)g =2N( R . (9)+1) m - 1r 1The bandwidth constra<strong>in</strong>ts <strong>in</strong> m dimensions becomep T £br 1 m -1 R(R+ r 1 ) m 1mN-1(10)andr 1 mp W £ b2N [1- (R+r 1 ) m ] . (11)


102 E.W. Grundke and A.N. Z<strong>in</strong>cir-HeywoodFor m=3, from (10) the maximum p T is Q(1/R m N 1/ m ), which makes it especiallyimportant to keep the range small, while N can grow larger than was feasible <strong>in</strong> twodimensions.The R 2 factor <strong>in</strong> the power requirement is unchanged because it arises from thethree-dimensional spread<strong>in</strong>g of radio signals, regardless of m.8 ConclusionThe simple cont<strong>in</strong>uum model without edge effects has yielded a number of analyticresults. In two dimensions the user data traffic is Q(÷N/R), and rout<strong>in</strong>g traffic isQ(N/R 2 ), where N is the number of nodes and R is the transmission range. Themaximum (bandwidth-limited) user data traffic per node is Q(1/R÷N), and themaximum l<strong>in</strong>k event rate is Q(1/N). It will be <strong>in</strong>terest<strong>in</strong>g to see how closelysimulations and real networks follow these scal<strong>in</strong>g trends. Our results confirm thatthe design of flat ad-hoc networks should target small numbers of nodes (100's, not1000's), and should strive for short transmission ranges.This analysis has produced three dimensionless parameters that characterize anad-hoc network. The node behavior is characterized <strong>by</strong> a, the walk/talk ratio, whichis the ratio of the l<strong>in</strong>k event rate to the application packet rate. The network ischaracterized <strong>by</strong> b, the forward<strong>in</strong>g overhead, and <strong>by</strong> g, the rout<strong>in</strong>g overhead. Wef<strong>in</strong>d that the quantity ag/b characterizes the relative importance of rout<strong>in</strong>g traffic anduser data traffic; the two are equal when ag/b = 1. These dimensionless parametersmay prove useful to compare the results of various simulation studies and to scale adhocnetworks.References1. Am<strong>in</strong> K., Mayes J., Mikler A..: Agent-based Distance Vector Rout<strong>in</strong>g. IEEE/ACMMATA 2001: 3rd International Workshop on Mobile Agents for TelecommunicationsApplication, Canada, August (2001). Retrieved from http://students.csci.unt.edu/~am<strong>in</strong>/2. Brag<strong>in</strong>sky D., Estr<strong>in</strong> D.: Rumor Rout<strong>in</strong>g Algorithm for Sensor Networks, WSNA ’02September 28 (2002) Atlanta, Georgia, USA3. Celebi E.: Master’s Thesis: Performance Evaluation of Wireless Mobile AdHoc NetworkRout<strong>in</strong>g Protocols (2001). Retrieved May 16, 2003 from http://cis.poly.edu/~ecelebi/4. Contla, P. A.., Stojmenivoc, M.: Estimat<strong>in</strong>g Hop Counts <strong>in</strong> Position Based Rout<strong>in</strong>gSchemes for Ad Hoc Networks. Telecommunication Systems, Vol. 22 (2003) 109-1185. Corson, S., Macker, J.: Mobile Ad hoc Network<strong>in</strong>g (MANET): Rout<strong>in</strong>g ProtocolPerformance Issues and Evaluation Considerations. IETF RFC 2501 (1999) RetrievedMay 21, 2003, from http://www.ietf.org/rfc/rfc2501.txt6. Gupta P., Kumar P. R.: The Capacity of Wireless Networks. IEEE Transactions onInformation Theory, Vol. 46 Issue 2 (2000) 388-4047. Hong X., Xu K., Gerla M.: Scalable Rout<strong>in</strong>g Protocols for Mobile Ad Hoc Networks,IEEE Network, July/August (2002) 11-21


A Uniform Cont<strong>in</strong>uum Model for Scal<strong>in</strong>g of Ad Hoc Networks 1038. Johansson P., Larsson T., Hedman N., Mielczarek B., Degermark M.: Scenario-basedPerformance Analysis of Rout<strong>in</strong>g Protocols for Mobile Adhoc Networks. ACM Mobicom’99, Seattle Wash<strong>in</strong>gton USA (1999)9. Liang, S., Z<strong>in</strong>cir-Heywood, N., Heywood, M.: The Effect of Rout<strong>in</strong>g under LocalInformation Us<strong>in</strong>g a Social Insect Metaphor. IEEE 2002 World Congress onComputational Intelligence, Congress on Computation (2002) 1438-144310. M<strong>in</strong>ar N., Kramer K. H., Maes P.: Cooperative Mobile Agents for Dynamic NetworkRout<strong>in</strong>g. In: Software Agents for furutre Communications Systems, Spr<strong>in</strong>ger-Verlag,New York (1999)11. Santiváñez, C., McDonald, B., Stavrakakis, I., Ramanathan, R.: On the Scalability of AdHoc Rout<strong>in</strong>g Protocols. Proc. IEEE INFOCOM 3 (2002) 1688-1697


Probabilistic Protocols for Node Discovery<strong>in</strong> Ad Hoc Multi-channel Broadcast NetworksG. Alonso 1 , E. Kranakis 2 , C. Sawchuk 2 , R. Wattenhofer 1 , and P. Widmayer 11 Department of <strong>Computer</strong> <strong>Science</strong>, Swiss Federal Institute of Technology, ETHZurich, Switzerland2 School of <strong>Computer</strong> <strong>Science</strong>, Carleton University, Ottawa, ON, K1S 5B6, CanadaAbstract. Ad hoc networks consist of wireless, self-organiz<strong>in</strong>g nodesthat can communicate with each other <strong>in</strong> order to establish decentralizedand dynamically chang<strong>in</strong>g network topologies. Node discovery is afundamental procedure <strong>in</strong> the establishment of an ad hoc network, asa given node needs to discover what other nodes are <strong>in</strong> its communicationrange. Exist<strong>in</strong>g multi-channel node discovery protocols are typicallyconstra<strong>in</strong>ed <strong>by</strong> the network configuration that will be imposed on thenodes once they are discovered. We present a communication model thatis <strong>in</strong>dependent of the network configuration that will be established afternode discovery. We present a pair of node discovery protocols fork ≥ 2 nodes <strong>in</strong> a multi-channel system and analyze them us<strong>in</strong>g the givencommunication model.1 IntroductionAd hoc networks consist of wireless, self-organiz<strong>in</strong>g nodes that can communicatewith each other <strong>in</strong> order to establish decentralized and dynamically chang<strong>in</strong>gnetwork topologies. S<strong>in</strong>ce these networks are an <strong>in</strong>tegral part of the new wirelesssolutions sought for home or personal area networks, sensor networks, and variousother commercial and educational networks, elim<strong>in</strong>at<strong>in</strong>g the shortcom<strong>in</strong>gsof ad hoc networks is an important goal <strong>in</strong> network research [12].Before a node can communicate with the other nodes <strong>in</strong> its communicationrange, it must be aware of those nodes and thus node discovery is an essentialpart of the rendezvous layer for any node that engages <strong>in</strong> ad hoc network formation[16]. Efficient network formation requires that the rendezvous layer beable to f<strong>in</strong>d all nodes <strong>in</strong> communication range <strong>in</strong> the shortest time and withthe smallest energy expenditure possible. Obviously, the complexity of node discoveryis a function of both the number of nodes present and the number ofcommunication channels available to these nodes. Until recently, nearly all adhoc networks were formed <strong>by</strong> nodes that used s<strong>in</strong>gle channel technology such as802.11 or IR LANs and thus most of the research about node discovery <strong>in</strong> ad hocnetworks assumes there is a s<strong>in</strong>gle broadcast channel [15]. The <strong>in</strong>troduction ofBluetooth [8], however, has boosted <strong>in</strong>terest <strong>in</strong> node discovery <strong>in</strong> multi-channelsystems with frequency-hopp<strong>in</strong>g. Such research is especially important s<strong>in</strong>ce theS. Pierre, M. Barbeau, and E. Kranakis (Eds.): ADHOC-NOW 2003, LNCS <strong>2865</strong>, pp. 104–115, 2003.c○ Spr<strong>in</strong>ger-Verlag Berl<strong>in</strong> Heidelberg 2003


Probabilistic Protocols for Node Discovery 105node discovery protocol <strong>in</strong> the Bluetooth standard [8] does not scale well and isboth time and energy <strong>in</strong>tensive [16].The node discovery protocol <strong>in</strong> the Bluetooth standard [8] is asymmetric <strong>in</strong>that it assigns different roles and different frequency-hopp<strong>in</strong>g speeds to variousnodes. Salonidis et al [14] po<strong>in</strong>t out that when two or more Bluetooth userswant to form an ad hoc network, they cannot explicitly assign roles. They needa symmetric protocol for node discovery, i.e., one that does not depend on preassignedroles for the nodes. Salonidis et al [14][15], Law et al [10], and Siegemundand Rohs [16] have subsequently developed symmetric node discovery protocolsfor Bluetooth.Naturally, these protocols are constra<strong>in</strong>ed <strong>by</strong> the configuration requirementsof Bluetooth, e.g., scatternets are comprised of connected piconets where thelatter conta<strong>in</strong>s one master and seven slave nodes. There exist few multi-channelnode discovery protocols that are <strong>in</strong>dependent of any network configuration.S<strong>in</strong>ce the performance of exist<strong>in</strong>g multi-channel node discovery protocols is <strong>in</strong>extricablyl<strong>in</strong>ked to the result<strong>in</strong>g network configuration, it is difficult to comparethe performance of protocols that execute <strong>in</strong> different network configurations.In this paper, however, we present a communication model that is <strong>in</strong>dependentof any network configuration that may be imposed on nodes once they arediscovered. The model is an extension of the work <strong>by</strong> Alonso et al [1] to themulti-channel case for k ≥ 2 nodes. We present a pair of node discovery protocolsfor k ≥ 2 nodes and analyze them us<strong>in</strong>g the multi-channel communicationmodel.1.1 Multi-channel Communication ModelConsider a collection of k ≥ 2 nodes and f ≥ 2 broadcast channels or frequencies.At each po<strong>in</strong>t <strong>in</strong> time, a given node must either talk (T ) or listen (L) on oneof the f channels. A node cannot talk and listen at the same time. The state ofa node is denoted <strong>by</strong> (S, i) where S = T or S = L and i represents the chosenfrequency, i =1,...,f.Anodea hears the broadcast of another node b if, at the given time, nodesa and b choose the same frequency i, nodea listens (L) and node b talks (T ),and no other node talks on frequency i. If a node other than node b also talks onfrequency i, then collision occurs on frequency i and no node listen<strong>in</strong>g on thatfrequency hears a broadcast. (In this model, spatial frequency reuse, like thatused <strong>in</strong> cellular phones, is not possible.) The nodes are unable to dist<strong>in</strong>guishbetween collision and noise when listen<strong>in</strong>g to a given frequency. Node discoveryoccurs when node a hears the broadcast of node b and, <strong>in</strong> the next step, node bhears the broadcast of node a.An event E describes the states of the k nodes at a given po<strong>in</strong>t <strong>in</strong> time:⎛ ⎞S 1 i 1S 2 i 2E = ⎜ ⎟(1)⎝ . . ⎠S k i kwhere (S m ,i m ) is the state of the m-th node.


106 G. Alonso et al.A node discovery protocol dictates how a node should choose its state ateach po<strong>in</strong>t <strong>in</strong> time. A run of a given protocol is the sequence of events generated<strong>by</strong> the node’s choices. Let E → E ′ denote that event E is immediately followed<strong>by</strong> event E ′ <strong>in</strong> a given run of the protocol. A run term<strong>in</strong>ates when the k nodeshave discovered each other. In the two node case, the last two events of the run,E → E ′ , are 1) <strong>in</strong> event E, the first node hears the second node talk, and 2) <strong>in</strong>the last event, E ′ , the second node hears the first node talk. Thus node discoverywith two nodes occurs under the events( ) TiLi→( ) LjTjor( ) Li→Ti( ) TjLjThe relationship between frequencies i and j depends on the protocol’s frequencyallocation method and is discussed below.Let a node be represented <strong>by</strong> the random variable X that assumes the valuesof (S, i), the possible states of the node. When a node must randomly choosewhether to talk or listen, let p denote the probability that the node will talk (T )and let q =1− p denote the probability that the node will listen (L). When anode must randomly choose a frequency, let F i denote the probability that thenode will choose frequency i. Thusp i , the probability that a given node will talkon frequency i, equals Pr[X =(T,i)] = pF i and q i , the probability that a givennode will listen on frequency i, equals Pr[X =(L, i)] = qF i . S<strong>in</strong>ce p + q = 1 and∑ fi=1 F i = 1, then ∑ fi=1 p i + ∑ fi=1 q i =1.After certa<strong>in</strong> events, e.g., one node hears the broadcast of another node, anode may have to decide whether to stay with the same frequency i <strong>in</strong> the nextstep, i.e., static frequency allocation, or to aga<strong>in</strong> randomly choose a frequency,i.e., dynamic frequency allocation. If the <strong>in</strong>itial contact occurred on a givenfrequency i, one might argue that frequency i is a natural choice for furthercommunication and thus static frequency allocation should occur. One can alsoargue, however, that chances for cont<strong>in</strong>ued contact may be just as good if thenext frequency is aga<strong>in</strong> randomly chosen and thus dynamic frequency allocationcan be used.We assume that nodes are synchronized so that they start an algorithm atthe same time, choose their respective states at the same time, and ma<strong>in</strong>ta<strong>in</strong>those states for the same amount of time. While it is unlikely that all the nodesthat want to participate <strong>in</strong> a given session of node discovery will start the nodediscovery protocol at the same time, Salonidis et al [15] demonstrate that nodesynchronization can be accomplished <strong>in</strong> a reasonable amount of time. They showthat if the times at which the respective nodes start the protocol are modelled asa carefully chosen Poisson process then, after a first node has started the nodediscovery protocol, the rema<strong>in</strong><strong>in</strong>g nodes have start times that are identicallyand <strong>in</strong>dependently distributed accord<strong>in</strong>g to a truncated exponential distribution.Given this distribution, a timeout value can be estimated and <strong>in</strong>corporated <strong>in</strong>tothe beg<strong>in</strong>n<strong>in</strong>g of the node discovery protocol so that node synchronization occursbefore the nodes engage <strong>in</strong> discovery. The size of the timeout is usually smallrelative to the time required for node discovery.(2)


Probabilistic Protocols for Node Discovery 107We also assume that the nodes know the value of k, the number of nodes <strong>in</strong>the system. If the number of nodes k was unknown, then a node might need toestimate k <strong>in</strong> the course of a node discovery protocol, but we leave the study ofsuch cases to a later date.1.2 Our ContributionAs mentioned earlier, the multi-channel communication model just described fork ≥ 2 nodes is <strong>in</strong>dependent of any network configuration that might be imposedon the nodes once they are discovered. We present two node discovery protocolsfor k ≥ 2 nodes and analyze them us<strong>in</strong>g the multi-channel communication model.In the random protocol RP, each node randomly chooses whether to talk orlisten and also randomly chooses a channel or frequency. The nodes’ respectivechoices of actions (talk or listen) and frequencies over time can be represented <strong>by</strong>a str<strong>in</strong>g of symbols. If the nodes’ respective choices of actions and frequencies <strong>in</strong>a given time t are such that one node can hear the other node’s broadcast, thenthe subsequence of symbols represent<strong>in</strong>g that event is called a success pattern.By analyz<strong>in</strong>g the occurence of these success patterns, we determ<strong>in</strong>e that theexpected run time of the random protocol RP for two nodes is1+ ∑ fj=1 p jq j( ∑f) 22j=1 p jq jWe also analyze another node discovery protocol for the two node case. Inthe conditional protocol CP, a node randomly chooses to talk or listen until 1)the node talks or 2) the node listens and hears the other node’s broadcast.If a given node talked at time t, it will listen at time t + 1 <strong>in</strong> an attempt todeterm<strong>in</strong>e if the other node heard its broadcast, while if the given node listenedat time t and heard another node’s broadcast, it will talk at time t +1 <strong>in</strong>an attempt to answer the other node. The nodes will choose their respectivefrequencies accord<strong>in</strong>g to either static or dynamic frequency allocation.The CP protocol has two phases. The first phase ends for a given node whenthat node either talks or hears the other node talk. The second phase consists ofone step and the node’s behaviour <strong>in</strong> that step is determ<strong>in</strong>ed <strong>by</strong> whether it talkedor listened at the end of phase 1. A s<strong>in</strong>gle execution of the two phases is called asubrun. If, at the end of a subrun, node discovery has not occurred, then anothersubrun is executed. The length of a subrun of the CP protocol is an identicallydistributed random variable with a f<strong>in</strong>ite mean and the number of subruns <strong>in</strong> theCP protocol is a random variable with non-negative <strong>in</strong>teger values and a f<strong>in</strong>itemean. S<strong>in</strong>ce the length of a subrun is <strong>in</strong>dependent of the number of subruns forthe CP protocol, Wald’s identity implies that the expected run time of the CPprotocol for two nodes is the product of the expected length of a subrun and theexpected number of subruns.A node’s choice of frequency is random for each step <strong>in</strong> phase 1, but thefrequency choice <strong>in</strong> the phase 2 (one step) depends on whether static or dynamic


108 G. Alonso et al.frequency allocation is used. With static frequency allocation, the frequency used<strong>in</strong> phase 2 is the same frequency used <strong>in</strong> the f<strong>in</strong>al step of phase 1, while withdynamic frequency allocation, the frequency for phase 2 is randomly chosen.The expected run time for the CP protocol with two nodes is2p(1 − p)+1(2p(1 − p)) 2 ( ∑ fi=1 F i 2)with static frequency allocation and2p(1 − p)+1(2p(1 − p)) 2 ( ∑ fi=1 F 2 i )2with dynamic frequency allocation. The expected run time for the CP protocolwith two nodes is longer under dynamic frequency allocation, as opposed tostatic frequency allocation, <strong>by</strong> a factor of φ =1/ ∑ fi=1 F i 2 . For example, if thereare f equally likely frequencies such that F i = F j for all i, j, then the expectedrun time of the CP protocol with two nodes is f times greater under dynamicfrequency allocation than under static frequency allocation.Hav<strong>in</strong>g analyzed the RP and CP protocols for the two node case, we turnto the k ≥ 2 node case. In the random protocol RP for k ≥ 2 nodes, each nodeaga<strong>in</strong> decides at random whether to talk or listen and also randomly chooses afrequency. The expected run time for the RP protocol with k ≥ 2 nodes is1+ ∑ fj=1 p jq j (1 − p j ) k−22 ( ) ( k∑ ) 2f2 j=1 p jq j (1 − p j ) k−2Unfortunately, calculat<strong>in</strong>g the expected run time of the CP protocol fork>2 nodes is not as straightforward. At any time t>0<strong>in</strong>theCP protocol, agiven node can be both <strong>in</strong> phase 1 relative to one subset of nodes and <strong>in</strong> phase2 relative to another subset of nodes. Track<strong>in</strong>g the potential overlap of phasesacross the nodes becomes more complicated as the number of nodes <strong>in</strong>creases.Our analysis of the expected run time for the CP protocol with k ≥ 2 nodes,therefore, relies on simulation methods rather than a closed-form solution.1.3 Outl<strong>in</strong>e of the PaperIn section 2, we present and analyze the random protocol RP and the conditionalprotocol CP for the two node case. In section 3, we present and analyze thek ≥ 2 nodes case for the RP and CP protocols. The paper ends <strong>in</strong> section 4with some summary remarks and a brief description of open problems. Due tospace limitations, only outl<strong>in</strong>es of the proofs are given.


Probabilistic Protocols for Node Discovery 1092 Random Protocol for Two Node Multi-channel SystemIn the random protocol RP, each node decides at random whether to talk (T )or listen (L). The two nodes thus generate an event at each time t( ) S iE =S ′ i ′such that S and S ′ are either T or L, and i and i ′ are the frequencies chosen.We use the technique described <strong>in</strong> [3,11] to analyze the RP protocol. Therandom protocol RP succeeds when, for some i, j =1, 2,...,f, either( ) ( ) ( ) ( )Ti Lj Li Tj→ or →(3)Li Tj Ti LjDef<strong>in</strong>e the events A i and B i as follows:( TiA i =Li), B i =( ) LiTiA success pattern is a pair of events such that the two nodes discover eachother, e.g., A i B j , i, j ∈ 1,...,f, and thus there are 2f 2 success patterns:(4)A 1 B 1 ,...,A 1 B f ,...,A f B 1 ,...,A f B f ,B 1 A 1 ,...,B 1 A f ,...,B f A 1 ,...,B f A f .For each i, j ∈{1, 2,...,f}, the pattern A i B j (respectively B i A j ) may eitheroverlap itself, or the last event of A i B j (respectively B i A j ) may overlap with thefirst event of B j A k (respectively A j B k ) for k ∈{1, 2,...,f}. The former case1occurs with probabilityp iq ip jq jwhile the latter case occurs with probability 1p jq j.The result<strong>in</strong>g system of 2f 2 l<strong>in</strong>ear equations is⎡ ⎤E[N]⎢E[N]⎥[ ][ ]D U Π=U D Π.E[N]E[N]E[N]⎢ ⎥⎣ . ⎦E[N]whereΠ ′ =[π 1,1 ,...,π 1,f ,π 2,1 ,...,π f,1 ,...,π f,f ]and π i,j (respectively π i+f,j ) is the probability that A i B j (respectively B i ,A j )occurs before any other pattern. N is the run time for exactly one subrun ofRP . However, because RP always executes exactly one subrun, N is also therun time for the entire protocol. [ ] D UThe 2f 2 x2f 2 matrix is def<strong>in</strong>ed as follows:U D(5)


110 G. Alonso et al.– D is a diagonal f 2 x f 2 1matrix with the ((i, j), (i, j))-th entry equal to .p 2 i q2 i– U is an f 2 x f 2 matrix formed <strong>by</strong> a column of f matrices, i.e., U =[V,V,...,V] T where V is def<strong>in</strong>ed as⎡V =⎢⎣With the condition1p 1q 11p 2q 2···10 0 ··· 01p f q f0 0 ··· 0 ··· 0 0 ··· 01 1p 1q 1 p 2q 2···p f q f··· 0 0 ··· 0.............1 1 10 0 ··· 0 0 0 ··· 0 ···p 1q 1 p 2q 2···⎤⎥⎦p f q f∑i=fj=f∑π ij = 1 (6)i=1 j=1the result<strong>in</strong>g system of l<strong>in</strong>ear equations has 2f 2 + 1 unknowns and 2f 2 +1equations. Solv<strong>in</strong>g this system of equations gives us E[N], the expected runtimeof RP.Theorem 1 (RP). The expected run time for the RP protocol is:1+ ∑ fj=1 p jq j( ∑f) 2. (7)2j=1 p jq j3 Conditional Protocolfor Two Node Multi-channel SystemsThe conditional protocol CP is implemented as a series of two-phase subrunswhere phase 1 consists of a f<strong>in</strong>ite number of random steps and phase 2 consistsof a s<strong>in</strong>gle step.In phase 1 of a subrun of the CP protocol, a node follows the random protocolRP until 1) the node talks (T ) or 2) the node listens (L) and hears the othernode’s broadcast.Phase 2 of a subrun of the CP protocol consists of a s<strong>in</strong>gle step. The behaviourof a node <strong>in</strong> phase 2 is conditional on the way <strong>in</strong> which phase 1 ended.If a node talked (T ) at the end of phase 1, then it will listen (L) <strong>in</strong> the phase2 <strong>in</strong> an attempt to determ<strong>in</strong>e if the other node heard its broadcast. If a nodelistened (L) and heard the other node’s broadcast at the end of phase 1, then itwill talk (T ) <strong>in</strong> phase 2 <strong>in</strong> an attempt to answer the other node’s broadcast.If a subrun is successful, then node discovery occurs <strong>in</strong> phase 2 and the CPprotocol term<strong>in</strong>ates. If a subrun is unsuccessful, however, then another subrunis executed, i.e., phase 1 and phase 2 are repeated, until node discovery occurs.Let the probability of success <strong>in</strong> a subrun of the CP protocol be denoted<strong>by</strong> Pr[success <strong>in</strong> subrun]. S<strong>in</strong>ce the subruns of the CP protocol are <strong>in</strong>dependenttrials, the number of subruns of the CP protocol is a geometric random variable


Probabilistic Protocols for Node Discovery 111with parameter Pr[success <strong>in</strong> subrun]. The expected number of subruns of theCP protocol is thereforeE[number of subruns] =∞∑Pr[failure <strong>in</strong> subrun] k−1 Pr[success <strong>in</strong> subrun]kk=13.1 Wald’s IdentityIf, for the CP protocol, the expected number of subruns and the expected lengthof a subrun are known, then Wald’s identity can be used to calculate the expectedrun time of the protocol.Wald’s identity can be stated as follows [13]. Let W i ,i≥ 1 be <strong>in</strong>dependentand identically distributed random variables with a f<strong>in</strong>ite mean, E[W ] < ∞. LetN be a stopp<strong>in</strong>g time for W 1 ,W 2 ,... such that E[N] < ∞, i.e., the event N = nis <strong>in</strong>dependent of W n+1 ,W n+2 ,..., for all n ≥ 1. Then[ N]∑E W i = E[W ]E[N]. (9)i=1To apply Wald’s identity to the present problem, let W i be the length of asubrun of the CP protocol and let N be the number of subruns for the protocol.Def<strong>in</strong>ed <strong>in</strong> this manner, the W i are identically distributed random variables witha f<strong>in</strong>ite mean and N is a random variable with non-negative <strong>in</strong>teger values anda f<strong>in</strong>ite mean. The length of a subrun is <strong>in</strong>dependent of the number of subrunsfor the CP protocol, so W i is <strong>in</strong>dependent of N. Wald’s identity thus impliesthat the expected run time for the CP protocol is the product of the expectedlength of a subrun and the expected number of subruns, i.e.,E[run time for CP protocol] = E[length of subrun]E[number of subruns].(10)If we calculate the expected length of a subrun and the expected number ofsubruns for the CP protocol, then equation 10 allows us to calculate the expectedrun time for the protocol.(8)3.2 Expected Length of a Subrun of CP ProtocolPhase 1 of the CP protocol ends when a node talks or when a node listens andhears the broadcast of the other node. Phase 1 therefore ends when at least oneof the nodes talks so the only event that does not br<strong>in</strong>g an end to phase 1 is theevent where both nodes listen. Therefore Pr[phase 1 ends] equals1 − Pr[both nodes listen] = 1 − (1 − p) 2 =2p − p 2This implies that the expected length of phase 1 <strong>in</strong> the CP protocol isE[length of phase 1] =∞∑(2p − p 2 )(1 − (2p − p 2 )) i−1 1i =2p − p 2 (11)i=1


112 G. Alonso et al.and therefore, because phase 2 has only one step, the expected length of a subrunis:1E[length of subrun] =2p − p 2 + 1 (12)As mentioned earlier, the CP protocol allows for static or dynamic frequencyallocation. With static frequency allocation, a node that uses a frequency i atthe end of phase 1 will use the same frequency i <strong>in</strong> the s<strong>in</strong>gle step that makesup phase 2. With dynamic frequency allocation, a node randomly chooses afrequency <strong>in</strong> all steps of either phase.Substitut<strong>in</strong>g the appropriate expressions <strong>in</strong>to equation 10, we obta<strong>in</strong> thefollow<strong>in</strong>g results.Theorem 2. The expected run time for the CP protocol with static frequencyallocation is2p(1 − p)+1(2p(1 − p)) ∑ 2 fi=1 F . (13)i2Theorem 3. The expected run time for the CP protocol with dynamic frequencyallocation is2p(1 − p)+1(2p(1 − p) ∑ fi=1 F . (14)i 2 )2The expected run time for the CP protocol with two nodes is longer underdynamic frequency allocation, as opposed to static frequency allocation, <strong>by</strong>a factor of φ =1/ ∑ fi=1 F i 2 . With a uniform probability distribution for thefrequencies, φ = f.3.3 Comparison of Two Node ProtocolsTo make a simple comparison of the two node protocols, assume that the probabilityof talk<strong>in</strong>g equals the probability of listen<strong>in</strong>g, and that the f frequencychoices are uniformly distributed. The CP protocol with static frequency yieldsthe best expected run time, E[run time] = 6f, followed <strong>by</strong> the CP protocolwith dynamic frequency with an expected run time of E[run time] = 6f 2 .The RP protocol has the poorest performance, with an expected run time ofE[run time] = 8f 2 +2f.4 Random Protocolfor k ≥ 2 Node Multi-channel SystemIn the node discovery problem with k ≥ 2 nodes, node discovery occurs whentwo of the k nodes discover each other. Consider the event⎛ ⎞⎛ ⎞. .. .TiLiA abi :=. ., respectively, Bi ab:=. .,⎜⎝ Li⎟⎜⎠⎝ Ti⎟⎠....


Probabilistic Protocols for Node Discovery 113such that a


114 G. Alonso et al.complicated. For example, a given node can be <strong>in</strong> phase 1 relative to one set ofnodes yet, at the same time, it can be <strong>in</strong> phase 2 relative to another set of nodes.Our analysis of the expected run time for the CP protocol with k ≥ 2 nodes,therefore, relies on simulation results.5.1 Comparison of Multi-node ProtocolsOnce aga<strong>in</strong> we made a simple comparison of the k ≥ 2 node protocols <strong>by</strong> assum<strong>in</strong>gthat the probability of talk<strong>in</strong>g equals the probability of listen<strong>in</strong>g, andthat the f frequency choices are uniformly distributed. The expected run timefor the random protocol RP quickly became astronomical compared to the expectedrun time for either version of the CP protocol. The latter run times wereestimated through simulation results. For a given number of nodes k <strong>in</strong> the CPprotocol with static frequency allocation, and f


Probabilistic Protocols for Node Discovery 1152. D. Bertsekas and R. Gallager, Data Networks, Prentice Hall, 1992.3. G. Blom and D. Thoburn, How Many Random Digits Are Required Until GivenSequences Are Obta<strong>in</strong>ed, J. Applied Probability, 19, 518-531, 1982.4. BlueHoc: An Open-Source Simulator,http://oss.software.ibm.com/developerworks/opensource/bluehoc.5. Ericsson Microelectronics: ROK 101 007 Bluetooth Module Datasheet Rev. PA5,April 2000.6. R. Garcés, J.J. Garcia-Luna-Aceves, Collision Avoidance and Resolution MultipleAccess for Multichannel Wireless Networks, IEEE Infocom 2000, March 26 - 30,2000, Tel-Aviv, Israel.7. W. Feller, An Introduction to Probability Theory and its Applications, Vol. II,Wiley, 1966.8. J. Haartsen, Bluetooth Baseband Specification v. 1.0, www.Bluetooth.com.9. O. Kasten, M. Langhe<strong>in</strong>rich, First Experiences with Bluetooth <strong>in</strong> the Smart-ItsDistributed Sensor Network, Workshop on Ubiquitous Comput<strong>in</strong>g and Communications,PACT 2001, October 2001.10. C. Law, A.K. Mehta, K.-Y. Siu, Performance of a Bluetooth Scatternet FormationProtocol, The Second ACM Annual Workshop on Mobile Ad Hoc Network<strong>in</strong>g andComput<strong>in</strong>g (mobiHoc 2001), October 4-5, 2001, Long Beach, California, USA.11. S. R. Li, A Mart<strong>in</strong>gale Approach to the Study of Occurrence of Sequence Patterns<strong>in</strong> Repeated Experiments, Annals of Probability, 8, 1171- 1176, 1980.12. C.E. Perk<strong>in</strong>s, editor, Ad Hoc Network<strong>in</strong>g, Addison Wesley, 2001.13. S. Ross, Stochastic Processes, John Wiley and Sons, 2nd edition, 1996.14. T. Salonidis, P. Bhagwat, L. Tassiulas, Proximity Awareness and Fast ConnectionEstablishment <strong>in</strong> Bluetooth, The First ACM Annual Workshop on MobileAd Hoc Network<strong>in</strong>g and Comput<strong>in</strong>g (MobiHoc 2000), August 11, 2000, Boston,Massachusetts, USA.15. T. Salonidis, P. Bhagwat, L. Tassiulas, R. LaMaire, Distributed Topology Constructionof Bluetooth Personal Area Networks, In Proceed<strong>in</strong>gs of the TwentiethAnnual Jo<strong>in</strong>t Conference of the IEEE <strong>Computer</strong> and Communications Societies(INFOCOM 2001), April 22 - 26, 2001, Anchorage, Alaska, USA.16. F. Siegemund and M. Rohs, Rendezvous Layer Protocols for Bluetooth-EnabledSmart Devices, Technical Report, 1st International Conference on the Architectureof <strong>Computer</strong> Systems, ARCS - Trends <strong>in</strong> Network and Pervasive Comput<strong>in</strong>g, 2002.


Towards Adaptive WLAN Frequency ManagementUs<strong>in</strong>g Intelligent AgentsFiorenzo Gamba 1 , Jean-Frédéric Wagen 1 , and Daniel Rossier 21University of Applied <strong>Science</strong>s of Western SwitzerlandBd de Pérolles 80, 1705 Fribourg, Switzerland{gamba,wagen}@eif.ch2Swisscom Innovations AG, Ostermundigenstrasse 93, 3006 Bern, Switzerlanddaniel.rossier@swisscom.comAbstract. Private, corporate and public Wireless Local Area Networks(WLAN) Hot-Spots are emerg<strong>in</strong>g. In this rapidly evolv<strong>in</strong>g environment, theconfiguration of WLAN access po<strong>in</strong>ts raise the classical problem of re-us<strong>in</strong>glimited radio resources. In this paper, the problem of dynamic frequency allocationof WLAN access po<strong>in</strong>t <strong>in</strong> a highly competitive multi-provider Hot-Spotsenvironment is addressed. Our solution aims at work<strong>in</strong>g <strong>in</strong> locations whereplanned and ad-hoc deployments might be side <strong>by</strong> side. An on-l<strong>in</strong>e adaptive optimizationprocess is proposed and relies on available <strong>in</strong>formation deliveredonly <strong>by</strong> the local access po<strong>in</strong>ts <strong>in</strong> order to ma<strong>in</strong>ta<strong>in</strong> the quality of service ashigh as possible. This optimization process is implemented on a scalable andhighly flexible agent-based framework. The easy deployment of <strong>in</strong>telligentagents <strong>in</strong> a real WLAN network and their <strong>in</strong>tegration <strong>in</strong> a simulation context allowsus to perform extensive tests for small and large-scale networks. The proposedapproach has been tested on a limited but practical demonstrator thatshowed encourag<strong>in</strong>g results.Keywords: WLAN Network, Frequency Optimization, Software Agent.1 IntroductionThe evolution of telecommunications is characterivzed <strong>by</strong> an <strong>in</strong>crease <strong>in</strong> bandwidthavailability and an <strong>in</strong>crease <strong>in</strong> user mobility.Mobile networks are evolv<strong>in</strong>g to support flexible access services and offer <strong>in</strong>creas<strong>in</strong>glyhigher bandwidths as well as attractive pric<strong>in</strong>g. For example, several mobileoperators are about to offer new complementary services named here “Hot-Spot”access [1–3]. Hot-Spot solutions provide broadband mobile public access to the Internetand to corporate <strong>in</strong>tranets. The coverage of a WLAN Hot-Spot is typically poorcompared to a 2G and 3G mobile cellular solution but this limitation can be seen as anadvantage to provide end-users with high bandwidth capacity. Current Wireless LocalArea Network (WLAN) technologies deliver services access around 100 meters. Severalmobile operators currently present WLAN Hot-Spot access as a complement totheir GPRS and future UMTS offer<strong>in</strong>gs. User applications will have to be able toroam from one local Hot-Spot to another. For example: a user can access to her company’sEmail from the hotel lob<strong>by</strong> and access it aga<strong>in</strong> at the airport gate.Despite many shortcom<strong>in</strong>gs with respect to security and <strong>in</strong>ter-network or <strong>in</strong>teroperatorroam<strong>in</strong>g, WLAN IEEE802.11b products are <strong>in</strong>creas<strong>in</strong>gly becom<strong>in</strong>g veryS. Pierre, M. Barbeau, and E. Kranakis (Eds.): ADHOC-NOW 2003, LNCS <strong>2865</strong>, pp. 116–127, 2003.© Spr<strong>in</strong>ger-Verlag Berl<strong>in</strong> Heidelberg 2003


Towards Adaptive WLAN Frequency Management Us<strong>in</strong>g Intelligent Agents 117popular <strong>in</strong> many countries. Many reasons can be mentioned for such a success: lowprice, software support and a very successful <strong>in</strong>teroperability under the WiFi logo.WLAN products cont<strong>in</strong>ue to raise new expectations s<strong>in</strong>ce they can demonstrate efficientLAN access at rates above 2 Mbps (IEEE 802.11), at 11 Mbps for the IEEE802.11b specifications, or even several tens of Mbps <strong>in</strong> the near future (IEEE 802.11aand HIPERLAN) 1 .In this paper, we propose a novel approach to address the dynamic frequency allocationof WLAN Access Po<strong>in</strong>t (AP) <strong>in</strong> a multi-provider Hot-Spots environment, <strong>in</strong>order to ma<strong>in</strong>ta<strong>in</strong> high level of Quality of Service (QoS) tak<strong>in</strong>g <strong>in</strong>to account users'traffic. In Section 2, a description of the WLAN channel allocation problem and managementissues are outl<strong>in</strong>ed. Our <strong>in</strong>telligent agent based approach to tackle the channelallocation problem of the WLAN access po<strong>in</strong>ts is described <strong>in</strong> Section 3. Section 4briefly presents the fundaments of frequency optimization. Section 5 shows someprelim<strong>in</strong>ary results <strong>in</strong> our test environment, and Section 6 concludes this paper.2 Channel Allocation <strong>in</strong> WLAN NetworksCorporate users and, as price decreased, campus communities [4], have been the firstto exploit the benefits of WLAN based on the IEEE802.11x family of standards. Privateusers are also us<strong>in</strong>g the technology to avoid new wires <strong>in</strong> their homes and sometimesto share Internet access with other users. An <strong>in</strong>creas<strong>in</strong>g number of telecommunicationoperators and visionary companies have identified new bus<strong>in</strong>ess models forthe deployment of public WLAN access at popular locations (Hot-Spots) or <strong>in</strong> theirbus<strong>in</strong>ess premises [5]. As a s<strong>in</strong>gle example close to the authors, the Swiss operatorSwisscom Mobile has launched commercial services based on public WLAN Hot-Spot access based on GSM subscriptions or special value cards s<strong>in</strong>ce the end of2002 2 .In this rapidly evolv<strong>in</strong>g environment, the deployment of WLAN has to face typicalissues regard<strong>in</strong>g optimal utilization of radio resources that can be provided with<strong>in</strong> theallocated radio spectrum. The complexity of the optimization problem is amplified <strong>by</strong>the fact that all WLAN stakeholders, from private to bus<strong>in</strong>ess entities, share the samespectrum allocation without any cooperation unless proprietary bi-lateral agreementscould be arranged. For example, a public WLAN Hot-Spot operator might f<strong>in</strong>d difficultiesto offer its service at the bus stop near a popular restaurant, which has <strong>in</strong>stalledits own WLAN coverage. Add<strong>in</strong>g private WLAN users <strong>in</strong> the flats above the restaurantfurther illustrates the need for an autonomous management of the WLAN accesspo<strong>in</strong>ts. A manual and static configuration of each access po<strong>in</strong>ts, besides be<strong>in</strong>g tedious,could only provide an acceptable solution for the conditions found dur<strong>in</strong>g the measurementssurvey. A better solution would be to centralize some <strong>in</strong>formation about allthe access po<strong>in</strong>ts potentially <strong>in</strong>terfer<strong>in</strong>g. Based upon a centralized database, the bestfrequency allocation could be computed. However, this solution is not possible <strong>in</strong>practice because it does not scale to a very large number of access po<strong>in</strong>ts. Furthermore,the conditions can be quite complex s<strong>in</strong>ce the access po<strong>in</strong>ts are deployed <strong>in</strong>planned or ad-hoc manners depend<strong>in</strong>g on operators and service providers.1http://www.alcatel.com/atr2http://www.swisscom-mobile.ch/sp/4EGAAAAA-fr.html, visited March, 2, 2003.


118 F. Gamba, J.-F. Wagen, and D. RossierIn current deployment of WLAN hot spots, the frequency channel is fixed manually[6] and will be changed only if consumers compla<strong>in</strong> or if a new survey is undertaken<strong>by</strong> WLAN operators.We developed an autonomous management system that will detect the new situationand adapt the radio resource allocation so that the quality of service is maximized.2.1 Towards Agent-Based ManagementThis paper describes the architecture of an autonomous and adaptive managementsystem dedicated to on-l<strong>in</strong>e optimization of access po<strong>in</strong>t channel assignment; theprocess ma<strong>in</strong>ly relies on environmental <strong>in</strong>formation issued from the surround<strong>in</strong>g accesspo<strong>in</strong>ts and <strong>in</strong>formation exchange between enhanced access po<strong>in</strong>ts.The target architecture resorts to autonomous software agents which can run onphysically distributed or centralized platforms. From a logical viewpo<strong>in</strong>t, each softwareagent is delegated to a s<strong>in</strong>gle access po<strong>in</strong>t. Technical <strong>in</strong>formation such as thecurrently used frequency channel, the number of users, the number of rejected packets,etc. are gathered <strong>by</strong> each software agent and constitute their <strong>in</strong>ternal knowledge,i.e. their <strong>in</strong>ternal representation of the local environment. The implementation ofadvanced mechanisms to exchange <strong>in</strong>ternal knowledge between agents will enable theenhanced access po<strong>in</strong>t to perform a local optimization.One of the major characteristics of the proposed solution resides <strong>in</strong> its ability todeal with currently deployed WLAN networks <strong>in</strong> concordance with the establishedIEEE 802.11 standards [7][8] and related management systems. Thus, managementtechniques directly rely on standardized protocols and <strong>in</strong>formation models mak<strong>in</strong>g avendor-<strong>in</strong>dependent implementation possible. Simple Network Management Protocol(SNMP) has become the de facto standard for IP network management. SNMP iscommonly use to manage IP based elements and also for wireless elements.3 Intelligent Agent ApproachThe management of future WLAN networks will have to cope with highly competitiveenvironment where several operators will deploy their own <strong>in</strong>frastructure <strong>in</strong> thesame geographical areas. Furthermore, the diversity of WLAN equipments will makesuch a network very heterogeneous. As a consequence, centralized network managementsystems will be not sufficient to control f<strong>in</strong>e-gra<strong>in</strong>ed resources allocation withrespect to the available frequency spectrum. On the other hand, legacy managementsystems such as SNMP-based systems can not be ignored <strong>in</strong> the overall architecture.The elaboration of hybrid centralized and de-centralized network management systemstherefore constitute a general trend, not only for WLAN networks but also forother mobile network<strong>in</strong>g technology like ad-hoc networks [9].In this context, <strong>in</strong>telligent agents can be considered as one of the most promis<strong>in</strong>gapproaches address<strong>in</strong>g issues related to distributed applications <strong>in</strong> the rapidly expand<strong>in</strong>gcommunication <strong>in</strong>dustry [10]. Intelligent agents can be seen as a software programthat can perform specific tasks for a user and possesses a degree of <strong>in</strong>telligencethat permits it to perform parts of its tasks autonomously and to <strong>in</strong>teract with its envi-


Towards Adaptive WLAN Frequency Management Us<strong>in</strong>g Intelligent Agents 119ronment <strong>in</strong> a useful manner [11]. An <strong>in</strong>telligent agent exhibits the follow<strong>in</strong>g properties:autonomy - the agent is capable of follow<strong>in</strong>g its goal autonomously that is, without<strong>in</strong>teractions or commands from the environment - reactivity - the agent is capableof react<strong>in</strong>g appropriately to <strong>in</strong>fluences or <strong>in</strong>formation from its environment - proactivity- under specific circumstances, the agent can take the <strong>in</strong>itiative <strong>in</strong> perform<strong>in</strong>gappropriate actions - social ability - the agent is able to communicate with otheragents and to <strong>in</strong>teract with its environment <strong>in</strong> order to fulfill its tasks.Intelligent agents have been considered for network management <strong>in</strong> numerous researchprojects 3 . These various projects have led to multi-layer agent architectures <strong>in</strong>which each layer implements different abstraction views; examples of such layers arethe co-operation layer, the plann<strong>in</strong>g layer and the reactive layer. In this context, theBelief-Desire-Intention [12] probably constitutes one of the most popular agent architectureand has also been considered, under different forms, <strong>in</strong> agent-based networkmanagement systems.The development of agent standards <strong>in</strong> telecommunication is obviously a s<strong>in</strong>e quanon condition for the successful deployment of software agents <strong>in</strong> large-scale networks.The most popular agent standard at the moment is the Foundation for IntelligentPhysical Agents (FIPA) 4 .The framework we propose <strong>in</strong> this paper consists of a simple architecture <strong>in</strong> whichwe ma<strong>in</strong>ly exploit the message and communication facilities provided <strong>by</strong> the agentplatform on the one hand, and the capability of an agent to implement different parallelbehaviors on the other hand. Details about agent behavior are given <strong>in</strong> Section 3.2.Our agent-based framework is therefore composed of <strong>in</strong>telligent agents, calledAWM_agents, which exchange <strong>in</strong>formation concern<strong>in</strong>g their local environment <strong>in</strong>order to perform on-l<strong>in</strong>e optimization <strong>by</strong> (re-)configur<strong>in</strong>g the access po<strong>in</strong>t frequency(or channel). The enhanced access po<strong>in</strong>t consequently exhibits an autonomous andadaptive behavior.3.1 Jade and LEAP Agent PlatformsJade 5 is a freely downloadable Java agent platform, which is fully compliant with thelast revision of FIPA specifications; the <strong>in</strong>tra-agent activity model def<strong>in</strong>ed <strong>in</strong> Jade isbased upon a non-pre-emptive concurrency model. A Jade agent is implemented witha Java thread, which enables asynchronous <strong>in</strong>ter-platform communication as specified<strong>by</strong> FIPA. The Jade agents can implement one or several behaviors: while <strong>in</strong>tra-agentactivities are synchronous, <strong>in</strong>ter-agent communication relies on an asynchronousprocess. The behaviors are executed <strong>in</strong> a thread-per-agent concurrency model, <strong>in</strong>which there is no stack to be saved: they are managed <strong>by</strong> an <strong>in</strong>ternal scheduler implement<strong>in</strong>ga round-rob<strong>in</strong> non-pre-emptive policy among all the behaviors available<strong>in</strong> the ready queue of an agent [13]. The synchronous characteristic of <strong>in</strong>tra-agentactivity and related cooperative processes makes Jade an attractive agent platform forthe study of the agent behavior <strong>in</strong> the context of telecommunication applications, sothat our AWM_agents have been implemented <strong>in</strong>to the Jade environment. Still, Jade3An excellent overview of project activities concern<strong>in</strong>g <strong>in</strong>telligent agents for network managementcan be found <strong>in</strong> [13].4http://www.fipa.org5http://sharon.cselt.it/projects/jade


120 F. Gamba, J.-F. Wagen, and D. Rossieris made up of numerous classes and can thus be difficult to implement <strong>in</strong>to embeddedsystems.The Lightweight and Extensible Agent Platform (LEAP) 6 is a project aim<strong>in</strong>g at therealization of a FIPA platform that can be deployed seamlessly on any Java-enableddevice endowed with sufficient resources and with a wired or wireless connection,such as PDAs and smart phones [15]. LEAP significantly contributes to provid<strong>in</strong>gnetwork devices with an embedded agent platform.LEAP appears to be particularly <strong>in</strong>terest<strong>in</strong>g because it can easily be deployed <strong>in</strong> asimple Java processor based platform, which can be connected to any vendor<strong>in</strong>dependentaccess po<strong>in</strong>t. We are now <strong>in</strong>vestigat<strong>in</strong>g the deployment of ourAWM_agent <strong>in</strong>to a LEAP-based Java processor based platform.3.2 Agent BehaviorThe Jade agent platform [16] provides a novel approach towards task design withgeneric behaviors. Based on message exchanges between agents, several behaviorschemes correspond<strong>in</strong>g to various task types are def<strong>in</strong>ed <strong>in</strong> order to enable multiple<strong>in</strong>teractions with other agents.The behaviors are divided <strong>in</strong>to two ma<strong>in</strong> categories, respectively simple and compositebehaviors. A simple behavior consists <strong>in</strong> a task that is activated only once andcannot be blocked - oneShotBehaviour - or <strong>in</strong> a cyclically activated task. A compositebehavior is made up of several behaviors accord<strong>in</strong>g to a parent-child relationship; itmay consist of a sequential behavior - SequentialBehaviour - which executes the subbehaviorssequentially and term<strong>in</strong>ates when all sub-behaviors have been executed; onthe contrary, parallel behavior - ParallelBehaviour - allows the developer to implementsub-behaviors which can be executed <strong>in</strong> a non-determ<strong>in</strong>istic order. F<strong>in</strong>ally, abehavior can be described with a f<strong>in</strong>ite state mach<strong>in</strong>e (FSM); the parent behaviorcontrols the transitions between the FSM states and activates the behaviors correspond<strong>in</strong>gto the current state.From the communication po<strong>in</strong>t of view, the agents can <strong>in</strong>teract via <strong>in</strong>tra-platformcommunication: all the agents participat<strong>in</strong>g <strong>in</strong> the <strong>in</strong>teraction are managed <strong>by</strong> thesame platform; they reside <strong>in</strong> the same environment. The agents can also be distributedover several platforms, <strong>in</strong> which case they <strong>in</strong>teract via an <strong>in</strong>ter-platform communicationmechanism. In both cases, agents communicate via ACL messages. For example,if an agent platform is dedicated to one and only one access po<strong>in</strong>t, the hostedAWM_agent endowed with an SNMP manager can be logically perceived as the accesspo<strong>in</strong>t itself and only <strong>in</strong>ter-platform communication will take place. On the contrary,if an agent platform hosts several AWM_agents, the agent platform is responsiblefor manag<strong>in</strong>g several access po<strong>in</strong>ts, and <strong>in</strong>tra-platform communication will takeplace between the AWM_agents resid<strong>in</strong>g <strong>in</strong> the platform.3.3 AWM Agent ArchitectureIn our framework, an AWM_agent is dedicated to an access po<strong>in</strong>t and performs threebasic tasks: at first, the agent cont<strong>in</strong>uously monitors its local environment <strong>by</strong> query<strong>in</strong>gthe SNMP agent of the access po<strong>in</strong>t; the retrieval of particular values from MIB vari-6http://leap.crm-paris.com


Towards Adaptive WLAN Frequency Management Us<strong>in</strong>g Intelligent Agents 121ables will give <strong>in</strong>formation about the number of frames with errors (MIB:FCS), thenumber of frames delivered correctly (MIB:InUPkt), the number of associated stations(MIB:NAS) and the frequency channel (MIB:Channel), so that the agent canhave an <strong>in</strong>ternal representation of the environment. Secondly, the agent handles <strong>in</strong>com<strong>in</strong>gmessages issued from other agents. The message contents are exam<strong>in</strong>ed andprocessed accord<strong>in</strong>gly. The exchange of <strong>in</strong>formation between neighbor<strong>in</strong>g agentsimproves the channel assignment. The agent f<strong>in</strong>ally has to perform local computationto determ<strong>in</strong>e the most appropriate channel.The overall agent architecture and processes are depicted <strong>in</strong> Figure 1.Fig. 1. AWM Agent ArchitectureWe now briefly <strong>in</strong>troduce the general scenario <strong>in</strong>volv<strong>in</strong>g our AWM_agents and relatedaccess po<strong>in</strong>ts. The optimization algorithm we have implemented is currently be<strong>in</strong>gpatented and is therefore not detailed <strong>in</strong> this paper. It is however important to mentionthat the overall architecture perfectly suits a wide range of distributed optimizationalgorithms.The monitor<strong>in</strong>g task and the message process<strong>in</strong>g are implemented <strong>by</strong> means of twoJade cyclic behaviors. The monitor<strong>in</strong>g process is implemented <strong>in</strong>to the MonitorBehaviour,while message handl<strong>in</strong>g is implemented <strong>in</strong>to the MsgBehaviour.The AWM_agent queries the SNMP agent <strong>in</strong> order to retrieve the <strong>in</strong>formation fromthe access po<strong>in</strong>t, which is controlled <strong>by</strong> the agent (1). In case of <strong>in</strong>terference, theagent activates the optimization algorithm (2) and computes the new channel to beassigned to the access po<strong>in</strong>t. The new channel is set via a SNMP request (3). Theagent then sends the new channel to the neighbor<strong>in</strong>g agents (4). The receiv<strong>in</strong>g agentreads the message contents, makes sure that it fits the AWM ontology and <strong>in</strong> turnactivates the optimization algorithm if necessary (5) to compute the new channelbased upon the updated <strong>in</strong>formation. F<strong>in</strong>ally, the new channel is assigned <strong>by</strong> means ofa SNMP request (6).


122 F. Gamba, J.-F. Wagen, and D. Rossier4 Basic Pr<strong>in</strong>ciples for Channel Assignment OptimizationClassical frequency optimization <strong>in</strong> cellular networks is based on simple rules regard<strong>in</strong>gfrequency channel allocation. Usually, the same frequency and even an adjacentfrequency cannot be repeated at the same location or neighbored locations.The particular def<strong>in</strong>ition [8] of overlapp<strong>in</strong>g frequency channels <strong>in</strong> WLANIEEE802.11b with DSSS (Direct Sequence Spread Spectrum) and the CSMA/CA(Carrier Sense Multiple Access/Collision Avoidance) technique lead that a more complexrules regard<strong>in</strong>g frequency channel allocation. Indeed, measurements as depictedon Figure 2 shows that a better user throughput is obta<strong>in</strong>ed when there is either a totaloverlapp<strong>in</strong>g or, as expected, no overlapp<strong>in</strong>g of the <strong>in</strong>terfer<strong>in</strong>g channels allocated todifferent access po<strong>in</strong>ts.Fig. 2. Throughput measurements versus channel separationFig. 3. Optimization functionFigure 2 reports FTP total throughputs measured <strong>in</strong> the follow<strong>in</strong>g conditions: twousers, each l<strong>in</strong>ked to its own access po<strong>in</strong>t: one with frequency 6 (AP1) and the otheraccess po<strong>in</strong>t (AP2) with the frequency channel x (value on the x-axis). The result


Towards Adaptive WLAN Frequency Management Us<strong>in</strong>g Intelligent Agents 123shows that partial overlapp<strong>in</strong>g is worst than a complete overlapp<strong>in</strong>g of the frequencychannels. This can be expla<strong>in</strong>ed from the effectiveness of the collision avoidance(CA) when the two channels are equal. Error rate measurements not reported herealso shows that partial overlapp<strong>in</strong>g of frequency channels lead to a larger number oferrors, while total overlapp<strong>in</strong>g or non-overlapp<strong>in</strong>g channels lead to negligible numbersof errors.The results presented here have been taken <strong>in</strong>to account <strong>in</strong> the design of our optimizationfunction represented on Figure 3: a value between 0 and 100 is assigned tothe difference between 2 channels.The optimization function is not monotone. Partially overlapp<strong>in</strong>g channels lead to lownumbers. However, re-us<strong>in</strong>g the same channel on compet<strong>in</strong>g access po<strong>in</strong>ts is betterthat choos<strong>in</strong>g partially overlapp<strong>in</strong>g frequency channels. As expected, choos<strong>in</strong>g nonoverlapp<strong>in</strong>gchannel leads to the highest score.The optimization function provided <strong>in</strong> Figure 3 can be adapted if necessary to take<strong>in</strong>to account other functions if desired.5 Experiments and Results5.1 Test Bed EnvironmentOur test bed environment is based on four access po<strong>in</strong>ts (AP) represent<strong>in</strong>g two WirelessInternet Service Providers (WISPs). An Autonomous WLAN Management(AWM) agent is connected to each AP and each AP is configured with a Service SetIdentifier (SSID) that characterizes the WISP. S<strong>in</strong>ce The AWM agent must communicatebetween WISPs, then it is assumed that WISPs have to be <strong>in</strong>ter-connected. Atleast, WISPs must allow their agents to exchange messages. It is recalled that thesoftware agent platform chosen <strong>in</strong> this work simplify greatly this exchange of messages.Figure 4 shows the test environment, its architecture and the exchange of messages.Each of the 4 access po<strong>in</strong>ts has its own PC act<strong>in</strong>g as a proxy for the accesspo<strong>in</strong>t. The proxy runs the software agent platform and the software agents that havebeen designed to implement the AWM system.Access Po<strong>in</strong>ts are Cisco Aironet 350 products. The AWM Agent platform is basedon Jade platform and runs on Pentium-III PCs. Wireless LAN clients are laptops withPCMCIA WLAN cards. To test traffic congestion, we have implemented a clientemulator <strong>in</strong> the AWM agent. Thus associated term<strong>in</strong>als can be emulated <strong>by</strong> this featureon each AP.This practical test environment has a limited size and can be used to demonstratethe feasibility of our approach and determ<strong>in</strong>e the user experience under different thefrequency adaptation algorithm. Simulation environment has also deployed us<strong>in</strong>g theGeneric Network Management Tool (GNMT) [17] described <strong>in</strong> the next sub-section.In this case, larger network with several tens of access po<strong>in</strong>ts have been simulated.Comparisons with the practical test environment can also be performed.5.2 Prelim<strong>in</strong>ary ResultsIn this section, we briefly present the first results we obta<strong>in</strong> with our experimentalenvironment. Figure 5 presents the four access po<strong>in</strong>ts with virtual <strong>in</strong>terference l<strong>in</strong>ks. Itis recalled that a Virtual Interference L<strong>in</strong>k (VIL) is def<strong>in</strong>ed as a communication chan-


124 F. Gamba, J.-F. Wagen, and D. Rossiernel between two access po<strong>in</strong>ts which are subject to <strong>in</strong>terfere each with other. Currently,VIL topology is determ<strong>in</strong>ed and configured manually <strong>by</strong> edit<strong>in</strong>g a property filefor each AWM_agent. Automatic VIL discovery mechanism is currently be<strong>in</strong>g <strong>in</strong>vestigated.Fig. 4. Test environment architectureThe number appear<strong>in</strong>g on each VIL corresponds to the difference of frequencychannel between APs. For example, AP1 is configured on channel 13 and AP2 is alsoon channel 13, therefore the number 0 (=|freq(AP1)-freq(AP2)|=|13-13|) is circled onthe VIL (AP1, AP2).MIB Parameters have been <strong>in</strong>troduced <strong>in</strong> Section 3.3. In the beg<strong>in</strong>n<strong>in</strong>g of our experiment,we have configured each access po<strong>in</strong>t on the channel 1. We have then associateda certa<strong>in</strong> number of stations (mobile users) to the access po<strong>in</strong>ts accord<strong>in</strong>g to thefollow<strong>in</strong>g scheme: two stations (users) are associated to AP1, three to AP3, five toAP2 and no station is associated to AP4. The numbers depicted on the figure showsthe f<strong>in</strong>al (and stable) configuration we obta<strong>in</strong> after less than 10 m<strong>in</strong>utes. It is importantto see that the optimization algorithm takes <strong>in</strong>to account the possibility to havetwo access po<strong>in</strong>ts configured with the same channel (AP1 and AP2). As expla<strong>in</strong>ed <strong>in</strong>Section 4, hav<strong>in</strong>g two neighbor<strong>in</strong>g access po<strong>in</strong>ts on the same channels may be consideredas a better solution than hav<strong>in</strong>g a small difference of frequency.Figure 6 shows the adaptive process over time and, hence, the evolution of the assignedfrequency channel for each access po<strong>in</strong>t. A different l<strong>in</strong>e profile (size andstyle) is given to each AP.The optimization algorithm must obviously ensure that the process will convergeand avoids cycles. The algorithm we implemented becomes stable after a few m<strong>in</strong>utes.This algorithm is be<strong>in</strong>g patented, thus no more details are provided. Dur<strong>in</strong>g theoptimization process, the APs may change several time their frequency channel. Auser associated with a particular access po<strong>in</strong>t loose a few packets dur<strong>in</strong>g the 1 to 3


Towards Adaptive WLAN Frequency Management Us<strong>in</strong>g Intelligent Agents 125seconds break occurr<strong>in</strong>g at each change of frequency channel. Practically, the endusers do not feel these losses especially if the newer operat<strong>in</strong>g systems are used.Fig. 5. F<strong>in</strong>al values when the adaptive process becomes stable (circle number is on VIL)Evolution of the changes of channels <strong>by</strong> AP14131211Freq(AP1)=13Freq(AP3)=13Channel number10987654AP 1AP 2AP 3AP 4Freq(AP2)=63210Freq(AP4)=100:0000:2300:3300:4300:5201:0701:1601:2901:4002:1102:1202:2002:4203:1203:4204:1204:4205:1205:4306:1306:4307:1307:4308:1308:43Time [mm:ss]Fig. 6. Evolution of the adaptive process over time6 ConclusionsAn approach to address the problem of dynamic frequency allocation for WLANaccess po<strong>in</strong>t <strong>in</strong> a multi-provider Hot-Spots environment has been presented. The operat<strong>in</strong>gfrequency channel at each access po<strong>in</strong>t is modified <strong>in</strong> order to <strong>in</strong>crease thequality of service measured at the access po<strong>in</strong>ts. This channel (re-)configuration isperformed via SNMP. Several parameters are comb<strong>in</strong>ed <strong>in</strong> a metric def<strong>in</strong>ed to objectivelymeasure the performance at each access po<strong>in</strong>t and compare the results to itsneighbors. In our demonstrator, four parameters obta<strong>in</strong>ed from the MIB access po<strong>in</strong>ts


126 F. Gamba, J.-F. Wagen, and D. Rossierhave been used: the number of frames with errors (FCS), the number of frames deliveredcorrectly (InUPkt), the number of associated stations (NAS) and the frequencychannel.The exchange of <strong>in</strong>formation between access po<strong>in</strong>ts regard<strong>in</strong>g performance measuresand newly assigned channel plays a central role <strong>in</strong> the solution presented here.Advanced communication mechanisms rely on the Jade agent-platform. Our agentbasedframework is composed of <strong>in</strong>telligent agents, called AWM_agents, whichclosely <strong>in</strong>teract <strong>in</strong> order to keep an up-to-date <strong>in</strong>ternal representation of their localenvironment and therefore to perform on-l<strong>in</strong>e optimization <strong>by</strong> (re-)configur<strong>in</strong>g thefrequency channel of the access po<strong>in</strong>t.The architecture and functionalities of our solution has been expla<strong>in</strong>ed. Each accesspo<strong>in</strong>t is controlled <strong>by</strong> an AWM_agent. The AWM_agent queries a SNMP agent <strong>in</strong>order to retrieve the <strong>in</strong>formation from the access po<strong>in</strong>t. In case of <strong>in</strong>terference, theagent activates an optimization algorithm and computes the new channel to be assignedto the access po<strong>in</strong>t.Prelim<strong>in</strong>ary results have been presented to illustrate the feasibility of our approach.The stability of the optimization process has been tested on the demonstrator and thesimulator. Measurements demonstrated that frequency channels can be modified withlittle perturbation to the users associated to a given access po<strong>in</strong>t.Future work will focus on extend<strong>in</strong>g the demonstrators to a large number of accesspo<strong>in</strong>ts <strong>in</strong> a campus environment. Further tests and measurements will also be performedon the simulator. Furthermore, improvements of the optimization algorithmwill be <strong>in</strong>vestigated.References1. Levilla<strong>in</strong>, P., Wireless LAN for Entreprise. Alcatel Telecommunications Review, Q20022. Juha Ala-Laurila, Jouni Mikkonen, Jyri R<strong>in</strong>nemaa, “Wireless LAN Access Network Architecturefor Mobile Operators”, IEEE Commun. Mag,. November 2001, pp 82-89.3. Shidong Zhou, M<strong>in</strong>g Zhao, Xib<strong>in</strong> Xu, J<strong>in</strong>g Wang, Yan Yao, “Distributed Wireless CommunicationSystem: A New Architecture for Futur Public Wireless Access”, ”, IEEECommun. Mag, .March 2003, pp 108-113.4. David Kotz, Kob<strong>by</strong> Esse<strong>in</strong>, “Analysis of a Campus-wide Wireless Network”,MOBICOM’02, September 23-26, 2002 Atlanta, Georgia, USA5. He<strong>in</strong>z Luediger, Sven Zeisberg, “User and Bus<strong>in</strong>ess Perspectives on an Open Mobile AccessStandard”, IEEE Commun. Mag,. September 2000, pp 160-163.6. Alex Hills, “Large-Scale Wireless LAN Design”, IEEE Commun. Mag,. November 2001,pp 98-104.7. IEEE Std 802.11, Part 11: Wireless LAN Medium Access Control (MAC) and PhysicalLayer (PHY) Specifications, <strong>in</strong>clud<strong>in</strong>g ieee802.11-mib, edition 19998. IEEE Std 802.11b, Part 11: Wireless LAN Medium Access Control (MAC) and PhysicalLayer (PHY) specifications: Higher-Speed Physical Layer Extension <strong>in</strong> the 2.4 GHz Band,ISBN 0-7381-1812-5.9. Chien-Chung Shen, Chavalit Srisathapornphat, and Chaiporn Jaikaeo, "An Adaptive ManagementArchitecture for Ad Hoc Networks", IEEE Commun. Mag, February 200310. Nicholas R. Jenn<strong>in</strong>gs, “An Agent-based Approach for Build<strong>in</strong>g Complex Software Systems”,Communications of the ACM, Vol.44, No.4 (April 2001).11. Walter Brenner, Rüdiger Zarnekow, Hartmut Wittig, "Intelligent Software Agents", Spr<strong>in</strong>ger-Verlag(Berl<strong>in</strong> Heidelberg, 1998).


Towards Adaptive WLAN Frequency Management Us<strong>in</strong>g Intelligent Agents 12712. Wooldridge and N.R. Jenn<strong>in</strong>gs, "Agent Theories, Architectures, and Languages: a Survey",In M. Wooldridge and N.R. Jenn<strong>in</strong>gs, editors, Intelligent Agents, number 890 <strong>in</strong> LNCS,pages 1-39 (Spr<strong>in</strong>ger Verlag, 1995).13. Alex L. G. Hayzelden, Rachel A. Bourne, "Agent Technology for CommunicationInfrastructures", Wiley & Sons Ltd, 2001.14. Fabio Bellifem<strong>in</strong>e, Agost<strong>in</strong>o Poggi, Giovanni Rimassa, "Jade - a FIPA-compliant agentframework", <strong>in</strong> Proc. of the 4 th International Conference on the Practical Application of ArtificialIntelligence and Multi-agent Technology (PAAM'99), pp.97-108, (London, UK,1999).15. Federico Bergenti and Agost<strong>in</strong>o Poggi, "LEAP: A FIPA Platform for Handheld and MobileDevices", <strong>in</strong> Proc. of 8 th Intl. Workshop on Agent Theories, Architecture and Languages(ATAL'2001) (Seattle, USA, August 2001).16. Fabio Bellifem<strong>in</strong>e, Giovanni Caire, Tiziana Trucco, Giovanni Rimassa, "Jade Programmer'sGuide", available at http://sharon.cselt.it/projects/jade, 2002.17. Daniel Rossier, “A Description of the Generic Network Management Tool”, Technical Report,Department of Informatics, University of Fribourg (Switzerland, August 2002).


Analyz<strong>in</strong>g Split Channel Medium AccessControl Schemes with ALOHA Reservation ⋆J<strong>in</strong>g Deng 1 , Yunghsiang S. Han 2 , and Zygmunt J. Haas 31 The CASE Center and the Dept. of Electrical Eng<strong>in</strong>eer<strong>in</strong>g and <strong>Computer</strong> <strong>Science</strong>at Syracuse University, Syracuse, NY, USAjdeng01@ecs.syr.edu2 The Dept. of <strong>Computer</strong> <strong>Science</strong> and Information Eng.National Chi Nan University, Taiwan, R.O.C.yshan@csie.ncnu.edu.tw3 School of Electrical & <strong>Computer</strong> Eng<strong>in</strong>eer<strong>in</strong>g at Cornell UniversityIthaca, NY, USAhaas@ece.cornell.eduAbstract. In order to improve the throughput performance of MediumAccess Control (MAC) schemes <strong>in</strong> wireless communication networks,some researchers proposed to split the s<strong>in</strong>gle shared channel <strong>in</strong>to twosubchannels: a control subchannel and a data subchannel. The controlsubchannel is used for access reservation to the data subchannel overwhich the data packets are transmitted, and such reservation can bedone through the use of the dialogues such as RTS/CTS (Ready-To-Send/Clear-To-Send) dialogue. In this paper, we evaluate the maximumachievable throughput of split-channel MAC schemes that are based onRTS/CTS dialogues with pure ALOHA contention resolution mechanism.We derive and calculate numerically the probability density function(pdf) of the contention resolution periods on the control subchannel.We then apply these results to calculate the throughput of the splitchannelMAC schemes, which we then compare with the performance ofthe correspond<strong>in</strong>g s<strong>in</strong>gle-channel MAC schemes. Our results show that,when radio propagation delays are negligible, the maximum achievablethroughput of the split-channel MAC schemes is lower than that of thecorrespond<strong>in</strong>g s<strong>in</strong>gle-channel MAC schemes <strong>in</strong> the scenarios that we havestudied. Consequently, our results suggest that splitt<strong>in</strong>g the s<strong>in</strong>gle sharedchannel of the MAC scheme <strong>in</strong> a wireless network should be avoided.Simulation results are presented to support our analytical results.⋆ This work was supported <strong>in</strong> part <strong>by</strong> the SUPRIA program of the CASE Centerat Syracuse University, <strong>by</strong> the National <strong>Science</strong> Council of Taiwan, R.O.C., undergrants NSC 90-2213-E-260-007 and NSC 91-2213-E-260-021, and <strong>by</strong> the DoD Multidiscipl<strong>in</strong>aryUniversity Research Initiative (MURI) program adm<strong>in</strong>istered <strong>by</strong> theOffice of Naval Research under grant number N00014-00-1-0564. Part of Han’s workwas completed dur<strong>in</strong>g his visit to the CASE Center and Dept. of Electrical Eng<strong>in</strong>eer<strong>in</strong>gand <strong>Computer</strong> <strong>Science</strong> at Syracuse University, USA.S. Pierre, M. Barbeau, and E. Kranakis (Eds.): ADHOC-NOW 2003, LNCS <strong>2865</strong>, pp. 128–139, 2003.c○ Spr<strong>in</strong>ger-Verlag Berl<strong>in</strong> Heidelberg 2003


1 IntroductionAnalyz<strong>in</strong>g Split Channel Medium Access Control Schemes 129In wireless communication networks, Medium Access Control (MAC) schemesare used to control the access of active nodes to the shared channel [1]. As thethroughput of the MAC schemes may significantly affect the overall performanceof the wireless networks, some researchers proposed to split, either <strong>in</strong> time or <strong>in</strong>frequency, the s<strong>in</strong>gle shared channel <strong>in</strong>to two subchannels: a control subchanneland a data subchannel. The control subchannel is used for reservation of accessto the data subchannel over which the data packets are transmitted, and suchreservation can be done through the use of the RTS/CTS (Ready-To-Send/Clear-To-Send) dialogue. Examples of such split-channel MAC schemes can be found<strong>in</strong> [2], [3], [4], [5], [6], and [7].In this paper, we analyze the performance of a generic split-channel MACscheme, which is based on the RTS/CTS dialogue and with pure ALOHA [8]contention resolution on the control subchannel. A ready node sends an RTSpacket on the control subchannel to reserve the use of the data subchannel.When the RTS packet is received, the <strong>in</strong>tended receiver replies with a CTSpacket to acknowledge the successful reservation of the data subchannel [9] [10].Based on the previous work [11], we calculate the probability density function(pdf) of the contention resolution periods on the control subchannel. This pdfis then used to calculate the expected wait<strong>in</strong>g time on the data subchannel andthe throughput of the split-channel MAC schemes. We determ<strong>in</strong>e the maximumachievable throughput of the split-channel MAC scheme as a function of theratio of the bandwidths of the control subchannel and the entire channel andcompare the result to that of the correspond<strong>in</strong>g s<strong>in</strong>gle-channel MAC schemes. Weshow that, when pure ALOHA technique is used for contention resolution on thecontrol subchannel and radio propagation delays are negligible, the throughputof the split-channel MAC schemes is <strong>in</strong>ferior to that of the s<strong>in</strong>gle-channel MACschemes.For notational convenience, we term s<strong>in</strong>gle-channel MAC scheme as MAC-1and split-channel MAC scheme as MAC-2. We further def<strong>in</strong>e MAC-2R as MAC-2 with parallel reservations; i.e., <strong>in</strong> the MAC-2R scheme, contention resolutionstake place on the control subchannel <strong>in</strong> parallel with the transmission of datapackets on the data subchannel.The paper is organized as follows: Section 2 summarizes the related work. InSection 3, we present our ma<strong>in</strong> comparison results of compar<strong>in</strong>g the MAC-1, theMAC-2, and the MAC-2R schemes. In Section 4, our numerical and simulationresults are derived. We then conclude this work <strong>in</strong> Section 5.2 Related WorkA dynamic reservation technique called split-channel reservation multiple access(SRMA) was <strong>in</strong>troduced for packet switch<strong>in</strong>g radio channels <strong>in</strong> [2]. In SRMA,the available bandwidth was divided <strong>in</strong>to three channels: two used to transmitcontrol <strong>in</strong>formation and, one used for message transmission. Message delay of


130 J. Deng, Y.S. Han, and Z.J. HaasSRMA was studied <strong>in</strong> that paper and it was shown that SRMA out-performsother MAC schemes under some network sett<strong>in</strong>gs.Split channel MAC scheme was compared with s<strong>in</strong>gle channel MAC scheme<strong>in</strong> [12]. The authors categorized “schedul<strong>in</strong>g epochs,” the periods of time neededto schedule the next data transmission, <strong>in</strong>to two groups: bandwidth-dependentcomponent (e.g., contention resolution of reservation packets) and bandwidth<strong>in</strong>dependentcomponent (e.g., radio propagation delay). It was found that, if asystem has no bandwidth-<strong>in</strong>dependent component <strong>in</strong> its schedul<strong>in</strong>g epochs, thesplit-channel schemes may achieve the same performance as the s<strong>in</strong>gle-channelschemes do. However, the analysis <strong>in</strong> that paper considered the average contentionresolution period only, rather than the random distribution of theseperiods.Similarly, [5] compared the performance of the s<strong>in</strong>gle-channel MAC schemesand that of the split-channel MAC schemes <strong>by</strong> consider<strong>in</strong>g only the expectedvalue of the contention resolution periods. In [5] and [6], the authors furtherproposed to use partial pipel<strong>in</strong><strong>in</strong>g technique to solve the problem of unbalancedseparation of the control channel and the data channel. This approach is similarto the generalized MAC-2R scheme, even though busy signals but not RTS/CTSdialogues are transmitted on the control subchannel.In [11], the authors studied the contention resolution period of the pureALOHA channel and the CSMA channel. They derived the Laplace transformof the pdf of the contention resolution periods of the two channels. The expectedvalue and the variance of the resolution periods were calculated. Our work differsfrom [11], <strong>in</strong> that we study the throughput of the split-channel MAC schemesand compare it to that of the s<strong>in</strong>gle-channel MAC schemes. We analyze thecontention resolution periods numerically and use these results to determ<strong>in</strong>e themaximum achievable throughput of the split-channel MAC schemes.In [3], RTS/CTS dialogue packets are transmitted on a separate signal<strong>in</strong>g(control) channel. The protocol conserves battery power at nodes that are notactively transmitt<strong>in</strong>g or receiv<strong>in</strong>g packets <strong>by</strong> <strong>in</strong>telligently power<strong>in</strong>g them off. APower Controlled Dual Channel (PCDC) scheme for wireless ad hoc networkswas proposed <strong>in</strong> [7]. By transmitt<strong>in</strong>g RTS/CTS dialogues on the control channelwith maximum power and data packets on the ma<strong>in</strong> channel with adjustable(lower) power, <strong>in</strong>terference-limited simultaneous transmission can take place <strong>in</strong>the neighborhood of a receiv<strong>in</strong>g node. However, these studies used separate channelsma<strong>in</strong>ly to achieve energy efficiency and low <strong>in</strong>terference between neighbor<strong>in</strong>gtransmissions <strong>in</strong> multi-hop networks.3 Throughput Comparisons3.1 Assumptions and NotationsIn order to compare the throughput of the MAC-1, the MAC-2, and the MAC-2R schemes, we make the follow<strong>in</strong>g assumptions. The wireless communicationnetwork we study is assumed to be fully-connected, i.e., all nodes are <strong>in</strong> the transmissionrange of each other. We also assume that the packet process<strong>in</strong>g delays


Analyz<strong>in</strong>g Split Channel Medium Access Control Schemes 131and the radio propagation delays are negligible and that the traffic generated <strong>by</strong>active nodes (<strong>in</strong>clud<strong>in</strong>g retransmissions) is Poisson with rate λ.We establish the follow<strong>in</strong>g notation:– L c , L d : the length of a control packet and that of a data packet, respectively– k: the ratio of data packet length to the control packet length; i.e., k = L dL c– R, R c , and R d : the data rate of the entire shared channel, the control subchannel,and the data subchannel, respectively; i.e., R = R c + R d– r: the ratio of the data rate of the control subchannel to the data rate of theentire channel <strong>in</strong> the MAC-2 and the MAC-2R schemes; i.e., r = RcR = RcR c+R d– γ 1 , δ 1 : the transmission time of a control packet and the transmission timeof a data packet <strong>in</strong> the MAC-1 scheme, respectively; i.e., γ 1 = LcR and δ 1 =L dR= kγ 1– γ 2 , δ 2 : the transmission time of a control packet and the transmission timeof a data packet, respectively, <strong>in</strong> the MAC-2 or the MAC-2R schemes; i.e.,γ 2 = LcR c= γ1rand δ 2 = L dR d= kγ11−r– δ: normalized data packet transmission time <strong>in</strong> the MAC-2 and the MAC-2Rschemes; i.e., δ = δ2γ 2= kr1−r .3.2 Compar<strong>in</strong>g the Throughput of the MAC-1and the MAC-2 SchemesFig. 1 depicts an example of the operations of the MAC-1, the MAC-2, andthe MAC-2R schemes. We treat the packet transmission on the channel as arenewal process. To send a data packet successfully, two control packets and adata packet need to be transmitted on the shared channel after the contentionresolution period, which is the time between the end of the previous successfuldata transmission and the beg<strong>in</strong>n<strong>in</strong>g of current successful RTS/CTS dialogue.Accord<strong>in</strong>g to [11], the expected value of the normalized contention resolutionperiod <strong>in</strong> ALOHA channels (w) is a constant, when normalized Poisson trafficarrival rate is fixed. In the MAC-1 scheme, the expected time of a data packettransmission cycle is:t 1 = wγ 1 +2γ 1 + δ 1 =(w +2+k) · γ 1 .Thus, accord<strong>in</strong>g to the property of renewal processes, the throughput of theMAC-1 scheme can be expressed asS 1 = δ 1= kγ 1 k=t 1 t 1 w +2+k . (1)In the MAC-2 scheme, the available bandwidth is split <strong>in</strong>to two subchannels.Channel requests can only be transmitted after the current data transmissionends. The throughput of the MAC-2 scheme is a function of r. The expectedtime of a renewal cycle is( w +2t 2 = w · γ 2 +2· γ 2 + δ 2 =r+ k )· γ 1 .1 − r


132 J. Deng, Y.S. Han, and Z.J. HaasMAC−1Contention Resolution­ ½ ­ ½ Æ ½RTS CTS DATAÛ­ ½­ ¾MAC−2Û­ ¾Contention Resolution­ ¾RTS­ ¾CTSÆ ¾DATAMAC−2RÛ­ ¾Æ ¾Contention ResolutionDATA­ ¾ ­ ¾ ­ ¾RTS CTS ¡¡¡ RTS CTSÆ ¾DATAFig. 1. Comparison of MAC-1, MAC-2, and MAC-2RTherefore, the throughput of the MAC-2 scheme isS 2 (r) = δ 2t 2· (1 − r) =kw+2r+ k1−r, (2)where the term 1 − r <strong>in</strong> the first equation represents the portion of the entireavailable bandwidth of the shared channel that is used as the data subchannel.Compar<strong>in</strong>g (1) and (2), we conclude that S 2 (r)


Analyz<strong>in</strong>g Split Channel Medium Access Control Schemes 133W =K−1∑i=1[I (i) + F (i)] + I (K) , (3)where K is the number of busy periods 1 dur<strong>in</strong>g the W + 2 contention resolutionperiods, of which the last one is successful, I (i) is the i-th idle period, and F (i)is the i-th failed busy period, <strong>in</strong> which RTS packet collisions occur. In (3), thesummation term <strong>in</strong>cludes K − 1 failed busy periods and the idle periods lead<strong>in</strong>gthem. The second term, I (K) , represents the idle period lead<strong>in</strong>g the successfulbusy period.Let p s be the probability that a successful RTS/CTS dialogue starts after anidle period on the control subchannel. The Laplace transform of the pdf of thecontention resolution period W is [11]W ∗ (s) =p s1I ∗ (s) − (1 − p s)F ∗ (s) , (4)where W ∗ (s) is the Laplace transform of g(w), the pdf of W , I ∗ (s) is the Laplacetransform of i(t), the pdf of the <strong>in</strong>dividual idle periods, and F ∗ (s) is the Laplacetransform of f(t), the pdf of the <strong>in</strong>dividual failed periods 2 .S<strong>in</strong>ce the <strong>in</strong>ter-arrival times of packet reservations for the control subchannel(newly generated and those scheduled for retransmission) are identical, <strong>in</strong>dependent,and exponentially distributed with mean 1/G <strong>in</strong> time units of γ 2 , whereG = λγ 2 , the Laplace transform of the channel idle time (I) isI ∗ (s) =GG + s .The probability of a successful transmission of a packet after an idle period isgiven <strong>by</strong>p s = e −G .The duration of an unsuccessful transmission [ period F is given <strong>in</strong> [11] asF ∗ (s) =Ge−(s+G) 1 − e −(s+G)](1 − e −G ) [ s + Ge −(s+G)] .Thus,W ∗ (s) =Ge −G [ s + Ge −(s+G)]s 2 + sG [ 1+e −(s+G)] + G 2 e −2(s+G) (5)and consequently,w = E[W ]=− ∂W∗ (s)∂s∣ = 1s=0G e2G − 1 .1 We denote those contention periods with a packet transmission on the control subchannelas busy periods.2 We assume that all pdfs exist.


134 J. Deng, Y.S. Han, and Z.J. HaasIn the MAC-2R scheme, when the value of W (say, w) satisfies w +2 ≤δ, the RTS/CTS dialogue succeeds before the end of the current data packettransmission on the data subchannel. Thus, the next data packet transmissioncan start immediately after the current one ends. However, when w +2>δ(asshown <strong>in</strong> Fig. 2), the data subchannel will be left idle for a period of time, whichwe def<strong>in</strong>e as the wait<strong>in</strong>g time on data subchannel (w 2 ). The expected value ofthis wait<strong>in</strong>g time (w 2 ) can be calculated asw 2 =∫ ∞δ−2[w − (δ − 2)] · g(w) dw . (6)Note that the above equation holds even when δ − 2 < 0.Therefore, the throughput of the MAC-2R scheme can be expressed asδ1S 2R (r) = · (1 − r) =. (7)δ + w 211−r + w2krNote that the control subchannel access scheme is ALOHA for RTS packets.To maximize the throughput of the control subchannel, the RTS packet arrivalrate <strong>in</strong> unit time on the control subchannel, G = λγ 2 , should be 0.5. In this case,the delay from when the control subchannel becomes available for reservationuntil a successful RTS/CTS dialogue takes place is m<strong>in</strong>imized [11]. Thus, thisvalue of G m<strong>in</strong>imizes w.Before we proceed to calculate w 2 , it is worthwhile to evaluate the throughputif we only consider the average delay of contention resolution on the controlsubchannel. In this case, the average time of each reservation cycle on the controlsubchannel is E[W ]+2=w + 2 and the time of each transmission cycle on thedata subchannel is δ. The optimal throughput of the MAC-2R scheme occurswhen δ = w + 2; i.e., the data packets are placed back-to-back and there is nowait<strong>in</strong>g time needed on the data subchannel for conclusion of the contentionresolution on the control subchannel. Thus,δ =kr∗1 − r ∗ = w +2 ,and the optimal r, which we label as r ∗ , based on the expected value of contentionresolution delay isr ∗ = w +2k + w +2 . (8)However, <strong>by</strong> substitut<strong>in</strong>g r ∗ <strong>in</strong>to (7), we obta<strong>in</strong> thatS 2R (r ∗ )=kw +2+k(11+ w2w+2which is lower than S 1 for w 2 > 0.In order to calculate w 2 , we need to derive g(w) explicitly. Instead of deriv<strong>in</strong>ga closed-form for g(w), we use a numerical <strong>in</strong>version of Laplace transforms presented<strong>in</strong> [13]. The value of g(w) for a specified value of w can be estimated asfollows. First, g(w) can be represented <strong>by</strong> a sequence of discrete values, s n (w),),


Analyz<strong>in</strong>g Split Channel Medium Access Control Schemes 135g(w) =s n (w) − e d as n →∞ ,where e d = ∑ ∞i=1 e−iA g((2i +1)t) is the discretization error. Then, g(w) can beapproximated <strong>by</strong> the s n (w) sequence as:g(w) ≈ s n (w) = eA/2w{12 W ∗ ( A n2w )+ ∑i=1( ) } A +2iπj(−1) i Re(W ∗ ), (9)2wwhere A is a positive constant s.t. W ∗ (s) has no s<strong>in</strong>gular po<strong>in</strong>ts on or to the rightof the vertical l<strong>in</strong>e s = A/(2w) and Re(W ∗ )(s) is the real part of W ∗ (s) whens is substituted <strong>by</strong> a complex number x + yj. In (9), n represents the degreeof discretization of g(w), i.e., the larger the value of n is, the more accuratethe estimation of g(w) <strong>by</strong>s n (w) is. In the numerical results shown later, wefound that n = 30 provides accurate enough results when compared with oursimulation results.If |g(w)| ≤1, the error is bounded <strong>by</strong> [13]|e d |≤ e−A1 − e −A .When A ≥ 18.5, the discretization error is 10 −8 . The constant A can be further<strong>in</strong>creased to improve the accuracy of the result.4 Numerical and Simulation ResultsWe present our numerical and simulation results <strong>in</strong> this section. The availablechannel data rate is 1 Mbps and the control packet length is 48 bits 3 . Oursimulation, written <strong>in</strong> C language, implements a network with 50 nodes, whichare <strong>in</strong> the range of each other.Fig. 3 depicts our numerical results of g(w) for pure ALOHA-based MACschemes and accord<strong>in</strong>g to (5) and (9). We observe from this figure that, whennormalized traffic load (G) is small, g(w) decreases with the <strong>in</strong>crease of w. AsG <strong>in</strong>creases, there is a knee <strong>in</strong> g(w) around w = 2, where the decl<strong>in</strong>e of g(w)suddenly slows down.These numerical results can be verified at w = 0. The pdf of the contentionresolution period w at w = 0 can be calculated as the pdf that exactly one RTSpacket is sent out at w = 0 multiplied <strong>by</strong> the probability that no other RTSpackets are transmitted on the control subchannel <strong>in</strong> the next unit time, i.e.,g(0) = Ge −Gw∣ ∣w=0 · e −G·1 = Ge −G .ForG =0.25, 0.50, 0.75, 1.00, and 2.00,g(0) is 0.1947, 0.3033, 0.3543, 0.3679, and 0.2707, respectively. These resultsmatch exactly those shown <strong>in</strong> Fig. 3.Fig. 4 depicts our numerical results of expected wait<strong>in</strong>g time on the datasubchannel, w 2 , of the pure ALOHA-based MAC-2R scheme. These results are3 Of course, these system parameters may be changed. However, our results suggestthat the conclusions for different parameters’ values rema<strong>in</strong> unchanged.


136 J. Deng, Y.S. Han, and Z.J. HaasProbability Density Function, g(w)0.40.350.30.250.20.150.1G=0.25G=0.5G=0.75G=1.0G=2.00.0500 2 4 6 8 10 12 14 16 18 20Contention Resolution Period, wFig. 3. Probability density function of W , g(w), with different G for MACschemes76L d= 1024L d= 2048L d= 4096Expected wait<strong>in</strong>g time, w 25432100 0.05 0.1 0.15 0.2 0.25 0.3 0.35 0.4 0.45 0.5Ratio of control channel over entire channel, rFig. 4. Expected wait<strong>in</strong>g time on the data subchannel, w 2 , for MAC-2Rcalculated accord<strong>in</strong>g to (6) and the pdf obta<strong>in</strong>ed through numerical calculationsfor different network sett<strong>in</strong>gs. To m<strong>in</strong>imize w 2 and maximize the throughput ofthe MAC-2R scheme, we choose normalized traffic load G =0.5 <strong>in</strong> the calculationof g(w). In these results, the control packet length (L c ) is fixed at 48 bits, whilethe data packet length (L d ) takes on the values of: 1024, 2048, and 4096 bits toillustrate different operational overheads of the control packets.As shown <strong>in</strong> Fig. 4, the expected wait<strong>in</strong>g time on the data subchannel decreasesexponentially as r <strong>in</strong>creases. Furthermore, this decrease is much fasterwhen k = L dL cis larger. Thus, for the same value of r, the expected wait<strong>in</strong>g timeon the data subchannel is significantly shorter <strong>in</strong> networks with larger k. This isdue to a much longer data packet transmission time, δ. From this figure, we canalso confirm the non-zero expected wait<strong>in</strong>g time when r is chosen as the optimalvalue of r ∗ = w+2w+2+k, as shown <strong>in</strong> (8). The non-zero expected wait<strong>in</strong>g time onthe data subchannel leads to an <strong>in</strong>ferior performance of the MAC-2R scheme,compared to the performance of the MAC-1 scheme.


Analyz<strong>in</strong>g Split Channel Medium Access Control Schemes 13710.90.8Throughput of MAC−1 and MAC−2R0.70.60.50.40.30.20.1L d=1024, S 1L d=1024, S 2RL d=1024, S 2R, simulationL d=2048, S 1L d=2048, S 2RL d=2048, S 2R, simulationL d=4096, S 1L d=4096, S 2RL d=4096, S 2R, simulation00 0.05 0.1 0.15 0.2 0.25 0.3 0.35 0.4 0.45 0.5Ratio of control channel over entire channel, rFig. 5. Throughput comparisons between MAC-1 and MAC-2RIn Fig. 5, we compare the throughput performance of pure ALOHA-basedMAC-1 and MAC-2R schemes for different data packet lengths. The straight l<strong>in</strong>esrepresent the throughput of the MAC-1 scheme. The throughput of the MAC-2R scheme <strong>in</strong>creases as r <strong>in</strong>creases until the throughput reaches the maximumachievable value and then degrades. When r is too small, the control subchannelneeds much longer time to come up with a successful RTS/CTS dialogue.However, when r is too large, the fraction of the entire available channel used totransmit data is too small, limit<strong>in</strong>g the throughput of the MAC-2R scheme.Compar<strong>in</strong>g the throughput performance of the MAC-1 and the MAC-2Rschemes, we observe that the MAC-1 scheme always out-performs the MAC-2Rscheme, due to the non-zero wait<strong>in</strong>g time on the data subchannel <strong>in</strong> the MAC-2R scheme. As expected, the throughput <strong>in</strong>creases as L d (or k) becomes larger,approach<strong>in</strong>g 1 as L d (or k) <strong>in</strong>creases. In the same figure, Fig. 5, we also draw thesimulation results of the MAC-2R scheme, demonstrat<strong>in</strong>g that our simulationresults closely match those obta<strong>in</strong>ed <strong>by</strong> our analysis.In Fig. 6, we show the ratio of the throughputs of the MAC-2R and the MAC-1 scheme, S 2R /S 1 , as a function of r for different data packet lengths L d .Itcanbe observed that the maximum achievable throughput of the MAC-2R schemeis closer to the throughput of the correspond<strong>in</strong>g MAC-1 scheme as L d <strong>in</strong>creases.Thus, the penalty for splitt<strong>in</strong>g the s<strong>in</strong>gle channel is lower when data packetlength is larger. As L d <strong>in</strong>creases, the optimum r that achieves the maximumthroughput for the MAC-2R scheme becomes smaller.In Fig. 6, we also draw symbols represent<strong>in</strong>g the performance of the MAC-2R scheme, when the s<strong>in</strong>gle channel is split accord<strong>in</strong>g to the expected value ofthe contention resolution periods. In these cases, r is set to r ∗ = w+2w+2+k ,asshown <strong>in</strong> (8). As shown <strong>in</strong> the figure, the throughput of the MAC-2R schemes isoffset from the optimum operation po<strong>in</strong>t of the MAC-2R scheme. Interest<strong>in</strong>gly,we f<strong>in</strong>d that such a non-optimum scheme would operate at the same relativeperformance S 2R /S 1 for the different values of L d , as the three symbols are all


138 J. Deng, Y.S. Han, and Z.J. HaasThroughput Comparison of MAC−1 and MAC−2R, S 2R/S 110.90.80.70.60.50.40.30.20.1L d=1024L d=2048L d=409600 0.05 0.1 0.15 0.2 0.25 0.3 0.35 0.4 0.45 0.5Ratio of control channel over entire channel, rFig. 6. Throughput comparisons between MAC-1 and MAC-2Rat 0.78 4 . When the MAC-2R scheme is optimized accord<strong>in</strong>g to the expectedvalue of the contention resolution periods, i.e., sett<strong>in</strong>g r to r ∗ , we conclude thatthe throughput degradation of the MAC-2R scheme over the MAC-1 scheme canbe as high as 22%.5 ConclusionsIn wireless communication networks, the Medium Access Control (MAC) schemecan significantly affect the performance of the network system. To improve thethroughput performance of MAC schemes on random access channels, some researchersproposed to split the s<strong>in</strong>gle shared channel <strong>in</strong>to two subchannels: a controlsubchannel and a data subchannel. Control packets are sent on the controlsubchannel, while the data subchannel is used solely to transmit data packets.Therefore, separation of control packet transmission and data packet transmissionis achieved.Some previous publications <strong>in</strong> the literature claimed that the split-channelMAC scheme may achieve the same or better throughput as the correspond<strong>in</strong>gs<strong>in</strong>gle-channel MAC scheme does. However, as we show <strong>in</strong> this paper, theseoptimistic results were derived <strong>by</strong> consider<strong>in</strong>g only the expected value of the contentionresolution periods, without tak<strong>in</strong>g <strong>in</strong>to the account the random distributionof these periods. When the randomness of the contention resolution periodsis considered, the split-channel schemes are <strong>in</strong>ferior to the s<strong>in</strong>gle-channel scheme<strong>in</strong> fully-connected networks and for the scenarios that we have studied here. Accord<strong>in</strong>gto our analysis, this result holds even if the split-channel schemes areoptimized with respect to the ratio of the bandwidth of the control subchannelto the bandwidth of the entire channel.[( ) ]∣4In fact, when r = r ∗ = w+2w+2+k , S 12R/S 1 = 1/1−r + w2 k ∣∣r=rkr w+2+k=∗( )1/ 1+ w2w+2. S<strong>in</strong>ce δ = w + 2 and it is not related to k, w 2 is not related tok accord<strong>in</strong>g to (6). Therefore, the ratio S 2R /S 1 is not related to k.


Analyz<strong>in</strong>g Split Channel Medium Access Control Schemes 139The <strong>in</strong>ferior throughput performance of split-channel schemes is due to thefact that the control subchannel cannot generate a successful channel reservationdialogue dur<strong>in</strong>g the period of time when data packets are transmitted onthe data subchannel. The randomness of these contention resolution periods requiresa larger portion of the available bandwidth to be allocated to the controlsubchannel, so that long wait<strong>in</strong>g time on the data subchannel would be unnecessary.However, as the overall throughput of split-channel schemes is limited<strong>by</strong> the capacity of the data subchannel, such allocation of a larger bandwidthto the control subchannel results <strong>in</strong> significant loss of performance of the datasubchannel.Even though our results are derived for MAC protocols that are based onthe RTS/CTS dialogue, these results can be applied to other split-channel MACschemes as well. In particular, these results can be useful for system eng<strong>in</strong>eer<strong>in</strong>g<strong>in</strong> evaluat<strong>in</strong>g the advantage and disadvantage of splitt<strong>in</strong>g a s<strong>in</strong>gle shared channel.References1. Gallager, R.G.: A perspective on multiaccess channels. IEEE Trans. on InformationTheory IT-31 (1985) 124–1422. Tobagi, F.A., Kle<strong>in</strong>rock, L.: Packet switch<strong>in</strong>g <strong>in</strong> radio channels: Part III-poll<strong>in</strong>gand (dynamic) split-channel reservation multiple access. IEEE Trans. on CommunicationsCOM-24 (1976) 832–8453. S<strong>in</strong>gh, S., Raghavendra, C.S.: PAMAS - power aware multi-access protocol withsignal<strong>in</strong>g for ad hoc networks. ACM <strong>Computer</strong> Communications Review 28 (1998)4. Hung, W.C., Law, K.L.E., Leon-Garcia, A.: A dynamic multi-channel MAC for adhoc LAN. In: Proc. 21st Biennial Symposium on Communications. (2002) 31–35K<strong>in</strong>gston, Canada.5. Yang, X., Vaidya, N.H.: Pipel<strong>in</strong>ed packet schedul<strong>in</strong>g <strong>in</strong> wireless LANs. Researchreport, University of Ill<strong>in</strong>ois at Urbana-Champaign (2002)6. Yang, X., Vaidya, N.H.: Explicit and implicit pipel<strong>in</strong><strong>in</strong>g for wireless medium accesscontrol. In: Proc. of Vehicular Technology Conference (VTC). (2003) Orlando,Florida, USA.7. Muqattash, A., Krunz, M.: Power controlled dual channel (PCDC) medium accessprotocol for wireless ad hoc networks. In: Proceed<strong>in</strong>gs of the 21st InternationalAnnual Jo<strong>in</strong>t Conference of the IEEE <strong>Computer</strong> and Communications Societies(INFOCOM 2003). (2003)8. Abramson, N.: The ALOHA system - another alternative for computer communications.In: AFIPS Conference Proceed<strong>in</strong>gs of Fall Jo<strong>in</strong>t <strong>Computer</strong> Conference.Volume 37. (1970) 281–2859. Karn, P.: MACA - a new channel access method for packet radio. In: ARRL/CRRLAmateur Radio 9th <strong>Computer</strong> Network<strong>in</strong>g Conference. (1990) 134–14010. IEEE 802.11: Wireless LAN MAC and physical layer specifications (1999)11. Takagi, H., Kle<strong>in</strong>rock, L.: Output processes <strong>in</strong> contention packet broadcast<strong>in</strong>gsystems. IEEE Trans. on Communications COM-33 (1985) 1191–119912. Todd, T.D., Mark, J.W.: Capacity allocation <strong>in</strong> multiple access networks. IEEETrans. on Communications COM-33 (1985) 1224–122613. Abate, J., Whitt, W.: Numerical <strong>in</strong>version of Laplace transforms of probabilitydistributions. ORSA J. Comput<strong>in</strong>g 7 (1995) 36–43


Prevent<strong>in</strong>g Replay Attacks for Secure Rout<strong>in</strong>g<strong>in</strong> Ad Hoc NetworksJane Zhen and Sampalli Sr<strong>in</strong>ivasDalhousie University, Halifax, NS, Canada, B3H 1W5{zhen,sr<strong>in</strong>i}@cs.dal.caAbstract. The design of secure rout<strong>in</strong>g techniques is a crucial and challeng<strong>in</strong>grequirement <strong>in</strong> mobile ad hoc network<strong>in</strong>g. This is due to the factthat the highly dynamic nature of the ad hoc nodes, their limited transmissionrange, and their reliance on an implicit trust model to routepackets make the rout<strong>in</strong>g protocols <strong>in</strong>herently susceptible to attacks. Wepropose a solution to prevent two important types of replay attacks onthe Ad Hoc On-Demand Distance Vector (AODV) rout<strong>in</strong>g protocol. Ourtechnique is based on strengthen<strong>in</strong>g the neighbor authentication mechanism<strong>by</strong> a simple extension to the AODV protocol. Analysis of thetechnique <strong>in</strong>dicates that it achieves security with little overhead.1 IntroductionAd hoc network<strong>in</strong>g is currently becom<strong>in</strong>g a popular wireless technology for manyapplications such as personal area network<strong>in</strong>g, disaster relief and rescue operations,and a variety of military, bus<strong>in</strong>ess and scientific applications. The attractivefeatures of such mobile ad hoc networks (MANET’s) <strong>in</strong>clude automaticself-configuration and self-ma<strong>in</strong>tenance, quick and <strong>in</strong>expensive deployment, andthe lack of the need for fixed network <strong>in</strong>frastructures or centralized adm<strong>in</strong>istration[1]. However, along side the advantages, a number of design challenges <strong>in</strong>MANET’s have emerged. One such crucial requirement is the design of securerout<strong>in</strong>g protocols. In such networks, the highly dynamic nature of the nodescan cause the network’s topology to change rapidly and unpredictably. Furthermore,wireless transmissions from each node are limited <strong>in</strong> their range. Due tothese reasons, the nodes must cooperate amongst themselves to exchange rout<strong>in</strong>g<strong>in</strong>formation and most rout<strong>in</strong>g algorithms for ad hoc networks rely on animplicit trust model to exchange <strong>in</strong>formation between neighbors. As a consequence,MANET rout<strong>in</strong>g protocols are vulnerable to a variety of attacks suchas eavesdropp<strong>in</strong>g, denial of service, packet <strong>in</strong>jection, traffic analysis and replayattacks [2]-[18].In this paper, we propose a solution to prevent two types of replay attackson the Ad Hoc On-Demand Distance Vector (AODV), which is currently on theverge of becom<strong>in</strong>g a standard rout<strong>in</strong>g protocol for ad hoc networks. The firsttype of replay attack is the wormhole attack, <strong>in</strong> which attackers tunnel RouteRequest (RREQ) packets from one node to another through a fast l<strong>in</strong>k such thatS. Pierre, M. Barbeau, and E. Kranakis (Eds.): ADHOC-NOW 2003, LNCS <strong>2865</strong>, pp. 140–150, 2003.c○ Spr<strong>in</strong>ger-Verlag Berl<strong>in</strong> Heidelberg 2003


Prevent<strong>in</strong>g Replay Attacks for Secure Rout<strong>in</strong>g <strong>in</strong> Ad Hoc Networks 141the route pass<strong>in</strong>g through this tunnel will appear to be the shortest and thusgets selected. Consequently, attacker nodes at either ends of the tunnel can drop,delay or modify packets. We also identify a new type of replay attack that canoccur on the AODV protocol - the RREQ Flood<strong>in</strong>g attack. In this type, attackerscan generate extra route discoveries <strong>by</strong> tak<strong>in</strong>g advantage of the “expand<strong>in</strong>g r<strong>in</strong>g”propagation of RREQ’s <strong>in</strong> that not all nodes have the knowledge that the RREQhas been processed. If performed massively, these packets will result <strong>in</strong> a numberof unnecessary resource-consum<strong>in</strong>g route discoveries.Our technique is based on strengthen<strong>in</strong>g the neighbor authentication mechanism<strong>by</strong> a simple extension to the AODV protocol <strong>in</strong> order to determ<strong>in</strong>e if thesource nodes of RREQ packets are really <strong>in</strong> the neighborhood. By measur<strong>in</strong>g theRound Trip Time (RTT) between two nodes and compar<strong>in</strong>g the RTT value withan adaptive threshold, we can choose to discard or process the received RREQ.The threshold is calculated <strong>by</strong> requir<strong>in</strong>g special Hello packets be<strong>in</strong>g replied immediately<strong>in</strong>stead of periodically. Analysis of the technique <strong>in</strong>dicates that itachieves security with little overhead.The rest of the paper is organized as follows. Section 2 provides an overviewof attacks on the AODV protocol and describes the two types of replay attacks.Section 3 surveys related work <strong>in</strong> this area. Section 4 describes the proposedapproach. Section 5 gives a probabilistic analysis of the technique to provide anestimation of the overhead. Section 6 provides a discussion of the proposal andconclud<strong>in</strong>g remarks.2 Attacks on the AODV Protocol2.1 Overview of AODVBriefly, the AODV rout<strong>in</strong>g protocol works as follows [2]. A node broadcasts aRoute Request (RREQ) if it wants to communicate with another node and novalid route is found <strong>in</strong> its rout<strong>in</strong>g table. The RREQ has the latest sequencenumber of the orig<strong>in</strong>ator,an RREQ ID (or broadcast id) to mark that it hasnot been processed, and the latest sequence number of the dest<strong>in</strong>ation that theorig<strong>in</strong>ator has <strong>in</strong> its rout<strong>in</strong>g table. Each <strong>in</strong>termediate node <strong>in</strong>crements the hopcount field <strong>in</strong> RREQ <strong>by</strong> one and broadcasts this RREQ until the RREQ reachesthe dest<strong>in</strong>ation or a node that has a higher dest<strong>in</strong>ation sequence number than theone <strong>in</strong> the packet. Multiple replies (Route Replies - RREP’s) may be generatedand transmitted along the reverse path. Each <strong>in</strong>termediate node <strong>in</strong>crements thehop count <strong>in</strong> RREP and updates its rout<strong>in</strong>g table if the RREP has a highersequence number of the dest<strong>in</strong>ation or a shorter hop count. This cont<strong>in</strong>ues untilthe RREP arrives at the orig<strong>in</strong>ator.2.2 Known Attacks on AODVA variety of known attacks on the AODV protocol have been identified [4,7,11,12,15,16].


142 J. Zhen and S. Sr<strong>in</strong>ivasTraffic Analysis: Resource limitations make it difficult to <strong>in</strong>corporate strongencryption mechanisms <strong>in</strong>to wireless data transmissions. Furthermore, mutablefields <strong>in</strong> the rout<strong>in</strong>g packets such as hop count are not authenticated. This mayresult <strong>in</strong> exposure of <strong>in</strong>formation <strong>by</strong> traffic analysis.Rout<strong>in</strong>g Loop: By impersonat<strong>in</strong>g other hosts’ Medium Access Control (MAC)addresses and falsify<strong>in</strong>g favored packets (such as those with higher sequence numbersor shorter hop counts), attackers can make routes to form a loop. This typeof attack has become less likely as a result of node authentication mechanismsproposed recently [4].Black/Gray Hole: By falsely claim<strong>in</strong>g they have optimal routes to multipledest<strong>in</strong>ations, attackers can manage to make relative amount of routes pass <strong>by</strong>them so as to manipulate packets later on. This attack has been solved <strong>by</strong> Denget. al. [18].Detour: Malicious nodes operate on packets illegally, such as <strong>by</strong> chang<strong>in</strong>g hopcounts and sequence numbers arbitrarily, to poison rout<strong>in</strong>g tables and make itimpossible for optimal routes to be chosen. Some solutions have been proposedbut they only solve part of the problem [4].Fake RERR(Route Error): A malicious node claims that an actually wellconnectednode is now unreachable <strong>by</strong> forg<strong>in</strong>g RERR packets. This RERR mayhave a high sequence number (fresher than any other) such that nodes will notaccept any opposite <strong>in</strong>formation (such as RREQ to/from the isolated node).Injection of Extra Control Packets: Injected control packets will result <strong>in</strong>unnecessary network operations. For example, <strong>in</strong>jected RREQ will cause thenetwork to be flooded without the need for data transmission, thus result<strong>in</strong>g <strong>in</strong>a denial of service attack. This can be solved <strong>by</strong> authenticat<strong>in</strong>g the source of theRREQ packets [15].General Replay Attacks: Intruder nodes can launch attacks on the ad hocnetwork <strong>by</strong> replay<strong>in</strong>g rout<strong>in</strong>g packets. While general authentication mechanismscannot prevent replay attacks, the sequence number and the RREQ ID fieldsare designed to reduce their possibility. However, there are two types of replayattacks that are particularly challeng<strong>in</strong>g to defend aga<strong>in</strong>st. We describe these <strong>in</strong>the next section.2.3 Two Special Replay AttacksRREQ Flood<strong>in</strong>g Attack. We identify a potential replay attack on the AODVprotocol. The RREQ packets are broadcast <strong>in</strong> an <strong>in</strong>crement<strong>in</strong>g r<strong>in</strong>g to reduce


Prevent<strong>in</strong>g Replay Attacks for Secure Rout<strong>in</strong>g <strong>in</strong> Ad Hoc Networks 143the overhead caused <strong>by</strong> flood<strong>in</strong>g the whole network. The packets are flooded <strong>in</strong>a small area (a r<strong>in</strong>g) first def<strong>in</strong>ed <strong>by</strong> a start<strong>in</strong>g TTL (time-to-live) <strong>in</strong> the IPheaders. After RING TRAVERSAL TIME, if no RREP has been received, theflooded area is enlarged <strong>by</strong> <strong>in</strong>creas<strong>in</strong>g the TTL <strong>by</strong> a fixed value. The procedureis repeated until an RREP is received <strong>by</strong> the orig<strong>in</strong>ator of the RREQ, i.e., theroute has been found [2].Nodes <strong>in</strong> the network avoid their packets from be<strong>in</strong>g replayed <strong>by</strong> <strong>in</strong>crement<strong>in</strong>ga sequence number and RREQ ID for each new packet. From the description<strong>in</strong> the last paragraph, we can observe that the RREQ’s only exist with<strong>in</strong> anarea. The nodes outside the area will never know the freshest sequence numbersand RREQ ID’s. It is trivial to simply record the RREQ of one node and thenbroadcast it <strong>in</strong> another area of the network. If the area where the packets arebroadcast to has up-to-date <strong>in</strong>formation, the packets will be simply discarded.If the <strong>in</strong>formation is out-of-date, the packets will provoke extra unnecessaryrounds of route discoveries. By perform<strong>in</strong>g this attack massively, a denial ofservice attack can be launched.This attack is illustrated <strong>in</strong> Fig.1. At time t0, attacker M overhears the RREQfrom A. At time t1, M replays the RREQ to B. Because B has not heard thefreshest RREQ, it will start process<strong>in</strong>g the RREQ so an unnecessary round ofroute discovery is launched <strong>in</strong> the area.Fig. 1. RREQ Flood<strong>in</strong>g AttackWormhole Attack. Wormhole attack has been described <strong>in</strong> [16]. Here weoutl<strong>in</strong>e it just for a review. In this k<strong>in</strong>d of replay attack, a tunnel is formedbetween two nodes through which attackers can transmit packets <strong>in</strong> a speedfaster than the normal hop-<strong>by</strong>-hop propagation through legitimate wireless l<strong>in</strong>ks<strong>by</strong> us<strong>in</strong>g long range directional wireless l<strong>in</strong>ks or even wired l<strong>in</strong>ks.Figure 2 illustrates this attack. Node A wants to f<strong>in</strong>d out a route to nodeB. It broadcasts an RREQ which first reaches X and M1 (an attacker-could betransparent to the network). While X relays RREQ to its neighbors W and Y,M1 tunnels this request to M2 (another attacker) us<strong>in</strong>g a fast l<strong>in</strong>k. M2 broadcaststhis RREQ to Z, which <strong>in</strong> turn relays it to B. S<strong>in</strong>ce this is faster than thevalid route, the valid RREQ is suppressed, and this route is shorter, the maliciousroute A-M1-M2-Z-B is selected. Furthermore, if nodes near A are about to


144 J. Zhen and S. Sr<strong>in</strong>ivasFig. 2. Wormhole Attackcommunicate with nodes near B, they will also choose this route pass<strong>in</strong>g M1-M2.Then M1 and M2 can drop, delay or modify packets <strong>in</strong> transit.One severe problem is that perform<strong>in</strong>g both k<strong>in</strong>d of attacks does not even requireattackers to have legitimate keys <strong>in</strong> the network s<strong>in</strong>ce only packet record<strong>in</strong>g,replay and MAC spoof<strong>in</strong>g are needed and these can easily be achieved withoutidentification.3 Related WorkThere have been many proposals for secur<strong>in</strong>g rout<strong>in</strong>g protocols <strong>in</strong> MANET’s.Marti et. al. [8] propose a “watch-dog” mechanism <strong>by</strong> implement<strong>in</strong>g an overhear<strong>in</strong>gmodule at each node to check if the forward<strong>in</strong>g of the packet at the nextnode has been changed illegitimately. Zapata and Asokan [3][4] present a secureextension to the AODV protocol to protect packets from malicious modification.Papadimitratos and Haas [5][9] propose the Secure Rout<strong>in</strong>g Protocol (SRP) toset up a secure association between two nodes, and a secure l<strong>in</strong>k state rout<strong>in</strong>galgorithm. Hu et. al. [6]propose SEAD (Secure Efficient Ad Hoc Distance VectorRout<strong>in</strong>g) to secure the algorithm us<strong>in</strong>g a one-way hash cha<strong>in</strong>. In [10], Yi et. al.def<strong>in</strong>e security levels for each node to avoid rout<strong>in</strong>g through un-trusted nodes.In [12] <strong>by</strong> Dahill et. al., packets are signed hop-<strong>by</strong>-hop us<strong>in</strong>g PKI (AuthenticatedRout<strong>in</strong>g for Ad Hoc Networks-ARAN). Other approaches are proposedto enhance co-operations among nodes <strong>in</strong> [13] <strong>by</strong> Buttyan and Hubauz and [14]<strong>by</strong> Buchegger and Boudec. Hu et. al. [7] propose Ariadne, a new secure rout<strong>in</strong>gprotocol.Hu et. al. [16] def<strong>in</strong>e the wormhole attack and propose a solution us<strong>in</strong>g packetleashes. Their solution needs extra hardware to provide geographic <strong>in</strong>formationand all nodes <strong>in</strong> the network need their clocks to be synchronized. Also, it needsaccurate prediction of packet send<strong>in</strong>g time and receiv<strong>in</strong>g time. These requirementsare not feasible for current common-used hardware and software.Multi-path rout<strong>in</strong>g protocols <strong>in</strong> which multiple paths are returned <strong>in</strong> eachroute discovery can reduce the impact of the wormhole attack because the traffic


Prevent<strong>in</strong>g Replay Attacks for Secure Rout<strong>in</strong>g <strong>in</strong> Ad Hoc Networks 145is not focused on one route any more [15][17]. But still some precious resourcesare wasted <strong>in</strong> the permitted range. If these attacks are performed frequently, theloss can be remarkable.In [11](Awerbuch et. al.), a confirmation for each data packet is required fromthe receiv<strong>in</strong>g node. By limit<strong>in</strong>g the number of missed data packets, the routewith poor quality will result <strong>in</strong> an <strong>in</strong>vestigation. It can detect the existence ofwormhole only after the degradation has been detected and it still needs tof<strong>in</strong>d another route to go over from the beg<strong>in</strong>n<strong>in</strong>g. Our proposal can preventwormholes from be<strong>in</strong>g formed.4 Our Proposal4.1 OverviewIt is important to note that the authentication of neighbors <strong>in</strong> AODV is weak.The neighbor<strong>in</strong>g mechanism <strong>in</strong> AODV is that each node adds a new neighborto its neighbor list whenever it hears a “reliable enough” signal no matter whosends the signal. A malicious node can send this signal <strong>by</strong> simply record<strong>in</strong>gpackets, spoof<strong>in</strong>g the MAC address (or not, if there is no MAC address mapp<strong>in</strong>gmechanism set up) to impersonate other nodes.The weak neighbor authentication gives room to perform the above two replayattacks. The basic idea of our solution is to measure the Round Trip Time(RTT) between two nodes to decide if they are true neighbors. For the RREQFlood<strong>in</strong>g attack (Fig.1), when B receives an RREQ, if it could check that thispacket could not be orig<strong>in</strong>ated from direct neighbor nodes <strong>by</strong> look<strong>in</strong>g at thevalue of RTT to the node, it would discard the request.For the wormhole attack (Fig.2), the situation is more complicated. Thewormhole attack has three scenarios if proper authentication mechanism hasbeen used to discrim<strong>in</strong>ate between outsiders and <strong>in</strong>siders; thus outsiders cannotparticipate <strong>in</strong> the operation of the network because they do not have legitimateidentifications: (1) M1 and M2 are both outsiders; (2) M1 is a collud<strong>in</strong>g <strong>in</strong>siderand M2 is an outsider or vice versa; (3) M1 and M2 are both <strong>in</strong>siders. In scenario(1), s<strong>in</strong>ce M1 and M2 are all transparent nodes the RREQ received <strong>by</strong> Z canonly come from A. In scenario (2), if M1 is an outsider and M2 selects not tohide (of course it will not hide because <strong>in</strong> that way Z would receive RREQ fromA and would know the existence of wormhole from RTT), it is also possiblefor Z to receive RREQ forwarded <strong>by</strong> M2 or <strong>by</strong> M1 <strong>in</strong> the second case. If theyexchange keys, then the case will be the same as <strong>in</strong> follow<strong>in</strong>g scenario. In scenario(3), Z may receive from A, M1 or M2. If M1 and M2 are all outsiders(1) then<strong>by</strong> measur<strong>in</strong>g RTT to A, node Z would know the existence of a wormhole. Forscenario (2)(3), node Z would receive RTT replies from any node as long as theyappear valid. Except those approaches detect<strong>in</strong>g wormhole after QoS(Quality ofService) degrades, current approaches cannot detect this type of attack yet.The proposal <strong>in</strong>volves send<strong>in</strong>g a verification message to un-trusted neighborsfor which a node receives RREQ for the first time. An un-trusted neighboris a neighbor that is not assured to be with<strong>in</strong> transmission range. From the


146 J. Zhen and S. Sr<strong>in</strong>ivasbeg<strong>in</strong>n<strong>in</strong>g of form<strong>in</strong>g the network, each neighbor is set as trusted because weassume that there is no replay attack <strong>in</strong> that moment due to the spontaneousnature of the ad-hoc network. From then on, nodes move around across differentnodes’ transmission range. Upon receiv<strong>in</strong>g a RREQ from an un-trusted node,or “neighbor”, a node will send a verification message and wait for the reply.Only after the node has approved the neighbor from its RTT value, the RREQ isforwarded cont<strong>in</strong>uously. It seems that this will <strong>in</strong>crease the RREQ propagationdelay for several folds, but our analysis will show this is not the case becausethe RREQ is broadcast and the path go<strong>in</strong>g through the trusted nodes have lessresistance while verifications are be<strong>in</strong>g made on other paths.Because RTT is such a variable value depend<strong>in</strong>g on node capability andtraffic load, we measure the local average RTT as the threshold. A new RTTto an un-trusted neighbor will be compared with this threshold for accept<strong>in</strong>g orreject<strong>in</strong>g. Basically, the threshold at a node equals the average RTT to its alltrusted neighbors.In order to attack successfully, the RREQ replay attack must be appliedon the nodes far away from the orig<strong>in</strong>ator because nodes around the orig<strong>in</strong>atorhave the freshest <strong>in</strong>formation. And the wormhole attack can form more seriousharm when applied on larger range because this makes attackers have morecontrol on the traffic. This large straddle necessitates at least two attackers;otherwise, one attacker will have to use powerful signals which will be heard <strong>by</strong>a large group of the nodes. By compar<strong>in</strong>g neighbor lists among them to f<strong>in</strong>dthe abnormal common neighbor, we would be able to detect this attack. The<strong>in</strong>volvement of two attackers <strong>in</strong>creases the possibility of detect<strong>in</strong>g replays <strong>by</strong>compar<strong>in</strong>g RTT times. Even though these attackers have powerful equipment,MAC delays depend only on local traffic. We assume that two attackers will makeRTT remarkablely different between attacked scenarios and normal situation.4.2 Verification ProcedureThe verification procedure used to measure RTT between two nodes send<strong>in</strong>g/receiv<strong>in</strong>g RREQ is illustrated <strong>in</strong> Fig.3. We assume that we have an efficient wayto distribute a secret between each pair of nodes such that A and B share akey Kab. The random number is generated uniquely for each verification procedureto prevent replayed verification reply (VEF REP). IPa and IPb are IPaddresses of A and B. They are added to dist<strong>in</strong>guish between the direction ofA-B and B-A, otherwise anyone hear<strong>in</strong>g VEF REQ message can replay it backto forge a VEF REP. Even though IP addresses are public, without Kab, nodesother than B cannot forge VEF REP’s to A. Each packet must be signed orencrypted depend<strong>in</strong>g on its efficiency because we need a mechanism for A andB to authenticate each other.4.3 ThresholdWe base the calculation of RTT threshold value on the Hello message exchange<strong>in</strong> AODV protocol. Accord<strong>in</strong>g to the protocol, nodes are required to broadcast


Prevent<strong>in</strong>g Replay Attacks for Secure Rout<strong>in</strong>g <strong>in</strong> Ad Hoc Networks 147Fig. 3. Measur<strong>in</strong>g RTTHello messages periodically to assure neighbors that the l<strong>in</strong>ks between them arestill alive. We use a slightly modified Hello message (RTT REQ) <strong>by</strong> <strong>in</strong>clud<strong>in</strong>ga flag to request for an immediate reply (RTT REP). By send<strong>in</strong>g such a specialHello after every n Hello’s, each node should get the RTT to each trustedneighbor <strong>by</strong> subtract<strong>in</strong>g the receiv<strong>in</strong>g time of RTT REP <strong>by</strong> the send<strong>in</strong>g time ofRTT REQ. Trusted neighbors are those neighbors that have passed verification.At the beg<strong>in</strong>n<strong>in</strong>g all neighbors are set as trusted because we assume there is noreplay due to the spontaneous nature of the ad-hoc network. The RTT thresholdis calculated <strong>by</strong> averag<strong>in</strong>g the RTT’s to all trusted neighbors and add<strong>in</strong>g amarg<strong>in</strong> depend<strong>in</strong>g on the str<strong>in</strong>gency of security. RTT REP messages also needto be slightly different to be dist<strong>in</strong>guished from other common Hello’s. To reduceoverhead, RTT Hello’s do not need to be encrypted or signed because neitherconfidentiality nor <strong>in</strong>tegrity is required (it is only with<strong>in</strong> one-hop range). But arandom number or time-stamp should be added to each RTT REQ to be embedded<strong>in</strong> the RTT REP to prevent fake replies.For the nodes that currently do not have any route to ma<strong>in</strong>ta<strong>in</strong> and thus arenot broadcast<strong>in</strong>g Hello’s, RTT Hello’s are required to ma<strong>in</strong>ta<strong>in</strong> RTT thresholdsfor themselves. S<strong>in</strong>ce RTT Hello’s have much longer <strong>in</strong>terval, the overhead willbe m<strong>in</strong>imum.5 AnalysisIn this section, we give a mathematical analysis of the overhead caused <strong>by</strong> neighborverification procedures. The overhead caused <strong>by</strong> RTT Hello is ignored s<strong>in</strong>cethey are just Hello packets that need immediate responses.Suppose <strong>in</strong> a network of N nodes, each node has neighbor change rate X,i.e., after a specific period of time, X percent new neighbors need to be verified.Also, we suppose dur<strong>in</strong>g this period of time M RREQ’s are processed.We can deem X as the probability of the verification be<strong>in</strong>g launched <strong>in</strong>one-hop range. If the average length of routes <strong>in</strong> the network is Y hops, thenaccord<strong>in</strong>g to B<strong>in</strong>omial distribution the probability of the verification be<strong>in</strong>g held<strong>in</strong> only one hop is:P 1 = ( )Y1 X 1 (1 − X) (Y −1) (1)The probability of i hops be<strong>in</strong>g verified is:P i = ( )Yi X i (1 − X) (Y −i) (2)where 0 ≤ i ≤ Y . Suppose the time consumed at each hop is t if no verificationis needed, 3t if the verification is applied (one RREQ(t) and one RTT(2t)), then


148 J. Zhen and S. Sr<strong>in</strong>ivasthe time of f<strong>in</strong>d<strong>in</strong>g a route with i hops be<strong>in</strong>g verified is Ti =3t∗i+t∗(Y −i).Theexpectation E i of the time consumed <strong>in</strong> f<strong>in</strong>d<strong>in</strong>g a route will be ∑ i=Yi=0 P i ∗ T i .Forexample, with X = 10% and Y = 6 we can have follow<strong>in</strong>g table:Table 1. Verification Probabilitiesi 0 1 2 3 4 5 6P i 0.531 0.354 0.010 0.015 0.001 0.000 0.000T i 6t 8t 10t 12t 14t 16t 18tFrom the table above, we can calculate E i =7.2t. Such that when neighborverification probability is 10%, the average extra time for f<strong>in</strong>d<strong>in</strong>g a new routewould be (7.203t − 6t)/6t = 20%. The fact that this overhead will be sharedamong the process<strong>in</strong>g of M RREQ’s makes it not significant.6 Discussion and ConclusionsAdd<strong>in</strong>g more mechanisms always needs more protection. The question is: willthis mechanism pose new security risks to the rout<strong>in</strong>g protocol? Can verificationrequests (VEF REQ) be replayed to some other area <strong>in</strong> the network? We arguethat this is not possible because each verification request needs the knowledge ofthe shared key between two nodes. The verification packets between two nodescannot be applied to other pairs.Can RTT REP packets be forged <strong>by</strong> illegitimate nodes to fool the node tocalculate wrong RTT threshold? This will not occur because if we have authentictrustable neighbors from <strong>in</strong>itial stage of the network and each round of calculationof RTT threshold is based on the replies from trusted neighbors, the authenticationof RTT REPs will be guaranteed and the impact from a particularnode will be balanced <strong>by</strong> other nodes after RTT averag<strong>in</strong>g.Can RTT REQs be replayed to some other area <strong>in</strong> the network? When receiv<strong>in</strong>ga RTT REQ replayed <strong>by</strong> an illegitimate node, the node may add theillegitimate node to its neighbor list and send back a RTT REP. S<strong>in</strong>ce the costof send<strong>in</strong>g a RTT REP is just trivial this will not impact the send<strong>in</strong>g node much.The replayed RTT REP will be discarded simply because the source node is not<strong>in</strong> the trusted neighbor list. The nodes <strong>in</strong> trusted neighbor list are added afterthe verification process.What if a neighbor moves away while the node still has not sent anotherRTT REQ s<strong>in</strong>ce there is an <strong>in</strong>terval? In this case, regular connectivity ma<strong>in</strong>tenancewill discover the leav<strong>in</strong>g of the neighbor and purge it out of its neighborlist.In summary, we proposed a solution to prevent two important types of replayattacks, namely, the wormhole attack and the RREQ flood<strong>in</strong>g attack, on theAODV rout<strong>in</strong>g protocol. Our technique is based on strengthen<strong>in</strong>g the neighborauthentication mechanism <strong>by</strong> a simple extension to the protocol. Analysis of the


Prevent<strong>in</strong>g Replay Attacks for Secure Rout<strong>in</strong>g <strong>in</strong> Ad Hoc Networks 149technique <strong>in</strong>dicates that it achieves security with little overhead. Our future workentails simulation studies of the proposal, modell<strong>in</strong>g other types of attacks onthe AODV protocol and <strong>in</strong>corporation of the proposed technique <strong>in</strong> the AODVprotocol.References1. C.-K. Toh, Ad Hoc Mobile Wireless Networks : Protocols and Systems, PrenticeHall, 2002.2. C. E. Perk<strong>in</strong>s, E. M. Beld<strong>in</strong>g-Royer and S. R. Das, “Ad hoc On-Demand DistanceVector (AODV) Rout<strong>in</strong>g,” draft-ietf-manet-aodv-13.txt, Feb. 2003.3. M.G. Zapata, “Secure Ad Hoc On-Demand Distance Vector(SAODV) Rout<strong>in</strong>g,”draft-guerrero-manet-saodv-00.txt, Aug. 2001.4. M. G.,Zapata and N.Asokan, “Secur<strong>in</strong>g Ad Hoc Rout<strong>in</strong>g Protocols,” Proc. ACMWorkshop on Wireless Security(WiSe’02), Atlanta, Georgia, USA, Sep. 2002, pp.1-10.5. P. Papadimitratos and Z. J. Haas, “Secure Rout<strong>in</strong>g for Mobile Ad Hoc Networks”,Proc. the SCS Communication Networks and Distributed Systems Model<strong>in</strong>g andSimulation Conference(CNDS 2002), San Antonio, TX, Jan. 2002.6. Y. Hu, D. B. Johnson and A. Perrig, “SEAD: Secure Efficient Distance VectorRout<strong>in</strong>g for Mobile Wireless Ad Hoc Networks,” Proc. the 4th IEEE Workshop onMobile Comput<strong>in</strong>g Systems & Applications (WMCSA 2002), Calicoon, NY, Jun.2002, pp. 3-13.7. Y.Hu, A. Perrig and D. B. Johnson, “Ariadne: A Secure On-Demand Rout<strong>in</strong>gProtocol for Ad Hoc Networks,” Proc. the Eighth ACM International Conferenceon Mobile Comput<strong>in</strong>g and Network<strong>in</strong>g (MobiCom 2002), Atlanta, GA, Sep. 2002,pp. 12-23.8. S.Marti,T.J.Giuli,K.Lai and M.Baker, “Mitigat<strong>in</strong>g Rout<strong>in</strong>g Misbehavior <strong>in</strong> MobileAd Hoc Networks,” Proc. the Sixth annual ACM/IEEE International Conferenceon Mobile Comput<strong>in</strong>g and Network<strong>in</strong>g, 2000, pp. 255-265.9. P. Papadimitratos and Z. J. Haas, “Secure L<strong>in</strong>k State Rout<strong>in</strong>g for Mobile AdHoc Networks,” Proc. the IEEE Workshop on Security and Assurance <strong>in</strong> Ad Hoc,Orlando, FL, Jan. 2003.10. S. Yi, P. Naldurg and R. Kravets, “Security-Aware Ad hoc Rout<strong>in</strong>g for WirelessNetworks,” Proc. ACM Mobihoc, 2001.11. B. Awerbuch, D. Holmer, C. Nita-Rotaru and H. Rubens, “An On-Demand SecureRout<strong>in</strong>g Protocol Resilient to Byzant<strong>in</strong>e Failures,” ACM Workshop on WirelessSecurity(Wise’02), Atlanta, Georgia, Sep.2002.12. B. Dahill, B. Lev<strong>in</strong>e, E. Royer and C. Shields, “A Secure Rout<strong>in</strong>g Protocol For AdHoc Networks,” Technical Report UM-CS-2001-037, University of Massachusetts,Department of <strong>Computer</strong> <strong>Science</strong>, Aug. 2001.13. L. Buttyan and J. Hubauz, “Nuglets: a Virtual Currency to Stimulate Cooperation<strong>in</strong> Self-Organized Mobile Ad Hoc Networks,” Technical Report DSC/2001/001,Swiss Federal Institute of Technology-Lausanne, Department of CommunicationSystems, Jan. 2001.14. S. Buchegger and J. L. Boudec, “The Selfish Node: Increas<strong>in</strong>g Rout<strong>in</strong>g Securityfor Mobile Ad Hoc Networks,” IBM Research Report RR 3354, May 2001.15. R. Ramanujan and A. Ahamad, “Techniques For Intrusion-Resistant Ad Hoc Rout<strong>in</strong>gAlgorithms (TIARA),” Proc. MILCOM 2000, Los Angeles, Oct. 2000.


150 J. Zhen and S. Sr<strong>in</strong>ivas16. Y. Hu, A. Perrig and D. B. Johnson, “Packet Leashes: A Defense Aga<strong>in</strong>st WormholeAttacks <strong>in</strong> Wireless Ad Hoc Networks,” Technical Report TR01-384, RiceUniversity Department of <strong>Computer</strong> <strong>Science</strong>, Dec. 2001.17. Y. Yi, S. Lee, W. Su and M. Gerla, “On-Demand Multicast Rout<strong>in</strong>g Protocol(ODMRP) for Ad Hoc Networks,” draft-ietf-manet-odmrp-04.txt, Feb. 2003.18. H. Deng, W. Li, and Dharma P. Agrawal, “Rout<strong>in</strong>g Security <strong>in</strong> Ad Hoc Networks”,IEEE Communications Magaz<strong>in</strong>e, Special Topics on Security <strong>in</strong> TelecommunicationNetworks, Vol. 40, No. 10, October 2002, pp. 70-75.


Resist<strong>in</strong>g Malicious Packet Dropp<strong>in</strong>g<strong>in</strong> Wireless Ad Hoc NetworksMike Just 1 , Evangelos Kranakis 2,⋆ ,andTaoWan 2,⋆⋆1 Treasury Board of Canada, Secretariat, 2745 Iris St., Ottawa, ON, K1A 0R5, Canada2 School of <strong>Computer</strong> <strong>Science</strong>, Carleton University, Ottawa, ON, K1S 5B6, CanadaAbstract. Most of the rout<strong>in</strong>g protocols <strong>in</strong> wireless ad hoc networks, such asDSR, assume nodes are trustworthy and cooperative. This assumption renderswireless ad hoc networks vulnerable to various types of Denial of Service (DoS)attacks. We present a distributed prob<strong>in</strong>g technique to detect and mitigate onetype of DoS attacks, namely malicious packet dropp<strong>in</strong>g, <strong>in</strong> wireless ad hoc networks.A malicious node can promise to forward packets but <strong>in</strong> fact fails to doso. In our distributed prob<strong>in</strong>g technique, every node <strong>in</strong> the network will probe theother nodes periodically to detect if any of them fail to perform the forward<strong>in</strong>gfunction. Subsequently, node state <strong>in</strong>formation can be utilized <strong>by</strong> the rout<strong>in</strong>g protocolto <strong>by</strong>pass those malicious nodes. Our experiments show that <strong>in</strong> a moderatelychang<strong>in</strong>g network, the prob<strong>in</strong>g technique can detect most of the malicious nodeswith a relatively low false positive rate. The packet delivery rate <strong>in</strong> the networkcan also be <strong>in</strong>creased accord<strong>in</strong>gly.Keywords: Security, Denial of Service (DoS), Wireless Ad Hoc Networks, DistributedProb<strong>in</strong>g, Secure Rout<strong>in</strong>g Protocols.1 IntroductionA wireless or mobile ad hoc network (MANET) is formed <strong>by</strong> a group of wireless nodeswhich agree to forward packets for each other. One assumption made <strong>by</strong> most ad hocrout<strong>in</strong>g protocols [16, 21] is that every node is trustworthy and cooperative. In otherwords, if a node claims it can reach another node <strong>by</strong> a certa<strong>in</strong> path or distance, the claimis trusted. If a node reports a l<strong>in</strong>k break, the l<strong>in</strong>k will no longer be used. Although suchan assumption can simplify the design and implementation of ad hoc rout<strong>in</strong>g protocols,it does make ad hoc networks vulnerable to various types of denial of service (DoS)attacks, which are discussed <strong>in</strong> detail <strong>in</strong> Section 2. One class of DoS attacks is maliciouspacket dropp<strong>in</strong>g. A malicious node can silently drop some or all of the data packets sentto it for further forward<strong>in</strong>g even when no congestion occurs.Malicious packet dropp<strong>in</strong>g attack presents a new threat to wireless ad hoc networkss<strong>in</strong>ce they lack physical protection and strong access control mechanism. An adversary⋆ Research supported <strong>in</strong> part <strong>by</strong> NSERC (Natural <strong>Science</strong>s and Eng<strong>in</strong>eer<strong>in</strong>g Research Councilof Canada) and MITACS (Mathematics of Information Technology and Complex Systems)grants.⋆⋆ Research supported <strong>in</strong> part <strong>by</strong> OCIPEP (Office of Critical Infrastructure Protection and EmergencyPreparedness) Research Fellowship.S. Pierre, M. Barbeau, and E. Kranakis (Eds.): ADHOC-NOW 2003, LNCS <strong>2865</strong>, pp. 151–163, 2003.c○ Spr<strong>in</strong>ger-Verlag Berl<strong>in</strong> Heidelberg 2003


152 M. Just, E. Kranakis, and T. Wancan easily jo<strong>in</strong> the network or capture a mobile node and then starts to disrupt networkcommunication <strong>by</strong> silently dropp<strong>in</strong>g packets. It is also a threat to the Internet s<strong>in</strong>ce thevarious software vulnerabilities would allow attackers to ga<strong>in</strong> remote control of routerson the Internet. If malicious packet dropp<strong>in</strong>g attack is used along with other attack<strong>in</strong>gtechniques, such as shorter distance fraud, it can create more powerful attacks (i.e.,black hole [12]) which may completely disrupt network communication.Current network protocols do not have the capability to detect the malicious packetdropp<strong>in</strong>g attack. Network congestion control mechanisms do not apply here s<strong>in</strong>ce packetsare not dropped due to congestion. L<strong>in</strong>k layer acknowledgment, such as IEEE 802.11MAC protocol [1], can detect l<strong>in</strong>k layer break, but cannot detect forward<strong>in</strong>g level break.Although upper layer acknowledgment, such as TCP ACK, allows for detect<strong>in</strong>g end-toendcommunication break, it can be <strong>in</strong>efficient and it does not <strong>in</strong>dicate the node at whichthe communication breaks. Moreover such mechanism is not available <strong>in</strong> connectionlesstransport layer protocols, such as UDP. Therefore, it is important to develop mechanismsto render networks the robustness for resist<strong>in</strong>g the malicious packet dropp<strong>in</strong>gattack.In this paper, we present a proactive distributed prob<strong>in</strong>g technique to detect andmitigate the malicious packet dropp<strong>in</strong>g attack. In our approach, every node proactivelymonitors the forward<strong>in</strong>g behavior of other nodes. Suppose node A wants to know ifnode B performs its forward<strong>in</strong>g functions, it will send a probe message to a node onehop away from node B, let us say to node C. C is supposed to respond to the probe message<strong>by</strong> send<strong>in</strong>g back an acknowledgment to A. If A can receive the acknowledgmentwith<strong>in</strong> a certa<strong>in</strong> time period, it acts as a confirmation that node B forwarded the probemessage to C. With the assumption that a probe message is <strong>in</strong>dist<strong>in</strong>guishable from anormal data packet, A knows that B will forward all the other packets.Our experiments demonstrate that <strong>in</strong> a moderately chang<strong>in</strong>g network, the prob<strong>in</strong>gtechnique can detect most of the malicious nodes with a relatively low false positiverate. The packet delivery rate <strong>in</strong> the network can also be <strong>in</strong>creased if the detected maliciousnodes are <strong>by</strong>passed from network communication. We argue that the prob<strong>in</strong>gtechnique is of practical significance s<strong>in</strong>ce it can be implemented <strong>in</strong> the applicationlayer and does not require the modification of underly<strong>in</strong>g rout<strong>in</strong>g protocols.The rema<strong>in</strong>der of the paper is organized as follows. In Section 2, we analyze theDoS attacks aga<strong>in</strong>st a network <strong>in</strong>frastructure and review the correspond<strong>in</strong>g preventionmechanisms. In Section 3, we def<strong>in</strong>e frequently used notation and term<strong>in</strong>ology. In Section4, we present our solution for monitor<strong>in</strong>g wireless ad hoc networks. In section 5,we describe the implementation and simulation of our solution. We conclude the paper<strong>in</strong> the last section.2 DoS Attacks on Rout<strong>in</strong>g InfrastructureWireless ad hoc networks are vulnerable to various types of DoS attacks, such as signal<strong>in</strong>jection, battery dra<strong>in</strong>, among others. This paper focuses on the DoS attacks on itsrout<strong>in</strong>g <strong>in</strong>frastructure. Based on the types of traffic transmitted <strong>in</strong> a network, we canclassify these DoS attacks <strong>in</strong>to two categories: DoS attacks on rout<strong>in</strong>g traffic and DoSattacks on data traffic. Such classification is also applicable to the Internet.


Resist<strong>in</strong>g Malicious Packet Dropp<strong>in</strong>g <strong>in</strong> Wireless Ad Hoc Networks 1532.1 DoS Attacks on Rout<strong>in</strong>g TrafficAn attacker can launch DoS attacks aga<strong>in</strong>st a network <strong>by</strong> dissem<strong>in</strong>at<strong>in</strong>g false rout<strong>in</strong>g<strong>in</strong>formation so that established routes for data traffic transmission are undesirable or<strong>in</strong>valid. There are at least three possible consequences. Firstly, data traffic may be captured<strong>in</strong> a black hole [13] and never leave out. For example, <strong>in</strong> a distance vector rout<strong>in</strong>gprotocol, an attacker can attract data traffic <strong>by</strong> advertis<strong>in</strong>g shorter distance and then dropthe attracted traffic. Secondly, data traffic may not flow through rout<strong>in</strong>g paths fairly andsome of them are dropped due to network congestion. For example, an attacker canavoid some traffic or redirect traffic to other nodes <strong>by</strong> advertis<strong>in</strong>g carefully crafted rout<strong>in</strong>gupdate messages. Thirdly, an attacker may dissem<strong>in</strong>ate arbitrary rout<strong>in</strong>g <strong>in</strong>formationto mislead other routers to create <strong>in</strong>valid paths <strong>in</strong> their rout<strong>in</strong>g table. As a result, datatraffic flow<strong>in</strong>g through those paths will eventually be dropped due to network unreachabilityor life time expiration (i.e., <strong>in</strong> presence of rout<strong>in</strong>g loops).2.2 DoS Attacks on Data TrafficAn attacker can launch two types of DoS attacks on data traffic. First, it can <strong>in</strong>ject asignificant amount of data traffic <strong>in</strong>to the network to clog the network. If there is noprotection mechanism <strong>in</strong> place for provision<strong>in</strong>g data traffic, legitimate user packets willbe dropped along with malicious ones as the result of congestion control. In the worstcase, the network could be completely shutdown.Second, if a malicious user manages to jo<strong>in</strong> a network or compromise a legitimaterouter, it can silently drop some or all of the data packets transmitted to it for furtherforward<strong>in</strong>g. We call it the malicious packet dropp<strong>in</strong>g attack. Malicious packet dropp<strong>in</strong>gattack is a serious threat to the rout<strong>in</strong>g <strong>in</strong>frastructure of both MANET and the Internets<strong>in</strong>ce it is easy to launch and difficult to detect. To launch the attack, an attacker needsto ga<strong>in</strong> the control of at least one router <strong>in</strong> the target network. The router used to launchthe attack can be a specialized router or a computer runn<strong>in</strong>g rout<strong>in</strong>g software. To ga<strong>in</strong>access to a specialized router, an attacker can explore the software vulnerability of arouter (e.g., buffer overflow) or explore the weakness of logon authentication process(i.e., weak password). Many routers run vulnerable software and open the vulnerabilityto the world. For example, a survey [17] on 471 Internet routers shows that majority ofthem run SSH, Telnet or HTTP and 17% of them accept connections from arbitrary IPaddresses. An attacker can also explore the vulnerabilities of rout<strong>in</strong>g protocols to jo<strong>in</strong>the network with his own computer or a compromised <strong>in</strong>side mach<strong>in</strong>e. This is possibledue to the fact that most rout<strong>in</strong>g protocols only deploy very weak authenticationmechanisms, such as pla<strong>in</strong> text passwords.2.3 Prevent<strong>in</strong>g DoS Attacks on Rout<strong>in</strong>g TrafficSignificant work has been done to secure rout<strong>in</strong>g protocols aga<strong>in</strong>st DoS attacks on rout<strong>in</strong>gtraffic. Most of them apply cryptographic techniques (asymmetric or symmetric) toauthenticat<strong>in</strong>g rout<strong>in</strong>g traffic.Asymmetric cryptographic techniques, such as public-key based digital signatures,can be used to sign rout<strong>in</strong>g messages [24–26] to prevent external <strong>in</strong>truders from jo<strong>in</strong><strong>in</strong>g


154 M. Just, E. Kranakis, and T. Wanthe network or malicious <strong>in</strong>siders from spoof<strong>in</strong>g or modify<strong>in</strong>g rout<strong>in</strong>g messages. Thedisadvantages are: 1) They are quite <strong>in</strong>efficient s<strong>in</strong>ce both the signature generation andverification process <strong>in</strong>volve the execution of computationally expensive functions. 2)They cannot prevent <strong>in</strong>ternal attacks.Given the <strong>in</strong>efficiency of digital signature mechanisms, some researchers [7, 27]proposed to use symmetric cryptographic primitives (i.e., one-way hash cha<strong>in</strong>s, onetimesignatures, authentication tree, etc.) for authenticat<strong>in</strong>g rout<strong>in</strong>g messages. Unfortunately,these approaches still do not prevent attacks from compromised <strong>in</strong>ternal routers.Hu, Johnson, and Perrig [13, 14] take the step further <strong>in</strong> secur<strong>in</strong>g distance vector rout<strong>in</strong>gprotocols <strong>by</strong> forc<strong>in</strong>g a node to <strong>in</strong>crease metrics when forward<strong>in</strong>g rout<strong>in</strong>g updatemessages. Therefore, their approaches can prevent compromised nodes from claim<strong>in</strong>gshorter distances. The disadvantage is that a malicious node can avoid traffic <strong>by</strong> claim<strong>in</strong>glonger distances.2.4 Prevent<strong>in</strong>g DoS Attacks on Data TrafficIt has been hypothesized that a network with QoS support can well resist DoS attackss<strong>in</strong>ce malicious packets will be dropped <strong>in</strong> the first place when fac<strong>in</strong>g network congestion.Other researchers proposed mechanisms [3, 6] to trace back to the orig<strong>in</strong> of themalicious packets which cause the network congestion and drop them <strong>in</strong> the routerswhere they first enter <strong>in</strong>to the victim network. Ingress/Egress filter<strong>in</strong>g can also be helpfulif IP spoof<strong>in</strong>g is utilized <strong>in</strong> the attack.Several approaches have been proposed to prevent DoS attacks on data forward<strong>in</strong>glevel. Perlman [22] proposed hop-<strong>by</strong>-hop packet acknowledgment to detect packetdropp<strong>in</strong>g <strong>in</strong> a network. The disadvantage is that it will generate significantly high rout<strong>in</strong>goverhead. Cheung et al [8] proposed a prob<strong>in</strong>g method for defeat<strong>in</strong>g denial of serviceattacks <strong>in</strong> a fixed rout<strong>in</strong>g <strong>in</strong>frastructure us<strong>in</strong>g neighborhood prob<strong>in</strong>g. It requires atest<strong>in</strong>g router to have a private address which allows it to generate a packet dest<strong>in</strong>ed toitself but goes through the tested router. This requirement is not practical <strong>in</strong> MANETs.A distributed monitor<strong>in</strong>g approach is proposed <strong>in</strong> [4] for detect<strong>in</strong>g disruptive routers.The protocol is based on the pr<strong>in</strong>ciple that any packets sent to a router and not dest<strong>in</strong>edto it are supposed to leave that router. This pr<strong>in</strong>cipal is not applicable to MANET dueto their chang<strong>in</strong>g network topology.Marti et al [19] proposed and implemented two protocols for detect<strong>in</strong>g and mitigat<strong>in</strong>gmisbehav<strong>in</strong>g nodes <strong>in</strong> wireless ad hoc networks <strong>by</strong> overhear<strong>in</strong>g neighborhoodtransmissions. Their method is very effective for detect<strong>in</strong>g misbehaviors <strong>in</strong> one-hopaway. To monitor the behavior of nodes two or more hops away, one node has to trustand rely on the <strong>in</strong>formation from other nodes, which <strong>in</strong>troduces the vulnerability thatgood nodes may be <strong>by</strong>passed <strong>by</strong> malicious or <strong>in</strong>correct accusation.Buchegger and Le Boudec [5] developed the CONFIDANT protocol for encourag<strong>in</strong>gnode cooperation <strong>in</strong> dynamic ad-hoc networks. Each node monitors the behaviorand ma<strong>in</strong>ta<strong>in</strong>s the reputation of its neighbors. The reputation <strong>in</strong>formation may be sharedamong friends. A trust management approach similar to Pretty GOOD Privacy (PGP)is used to validate received reputation <strong>in</strong>formation. Nodes with bad reputation may beisolated from the network. As a result, nodes are forced to be cooperative for their own


Resist<strong>in</strong>g Malicious Packet Dropp<strong>in</strong>g <strong>in</strong> Wireless Ad Hoc Networks 155<strong>in</strong>terest. Our proposed prob<strong>in</strong>g technique can be used as one of the monitor<strong>in</strong>g techniques<strong>in</strong> the CONFIDANT protocol.Awerbuch et al [2] proposed a secure rout<strong>in</strong>g protocol for resist<strong>in</strong>g <strong>by</strong>zant<strong>in</strong>e failures<strong>in</strong> a wireless ad hoc network. The protocol requires an ultimate dest<strong>in</strong>ation to sendan acknowledgment back to the sender for each of its successfully received packets. Ifthe loss rate of acknowledgment packets exceeds the predef<strong>in</strong>ed threshold, which is setto be slightly above the normal packet loss rate, the route used for send<strong>in</strong>g packets fromthe source to the dest<strong>in</strong>ation is detected as faulty and a b<strong>in</strong>ary search prob<strong>in</strong>g techniqueis deployed to locate the faulty l<strong>in</strong>k. The disadvantages of this protocol are: 1) it may<strong>in</strong>cur significant rout<strong>in</strong>g overhead; 2) a data packet with an <strong>in</strong>serted probe list can bedist<strong>in</strong>guished from those without probe lists, although the probe list is onion encryptedand cannot be tampered en route. Our proposed prob<strong>in</strong>g technique differs <strong>in</strong> that it canbe implemented above the network layer (e.g., based on UDP), and the end-to-end encryptionof IP payload us<strong>in</strong>g pair-wise shared keys can prevent <strong>in</strong>termediate nodes fromdist<strong>in</strong>guish<strong>in</strong>g probe messages from data packets.Padmanabhan and Simon [20] proposed a secure traceroute to locate faulty routers<strong>in</strong> wired networks. In their approach, end hosts will monitor network performance. If anend-to-end performance degrade is detected <strong>by</strong> a host to a dest<strong>in</strong>ation, a compla<strong>in</strong>t bitis set <strong>in</strong> all the subsequent traffic to that dest<strong>in</strong>ation. The compla<strong>in</strong><strong>in</strong>g host itself or therouter sitt<strong>in</strong>g closest to the compla<strong>in</strong><strong>in</strong>g host may start the troubleshoot<strong>in</strong>g process if itobserves enough compla<strong>in</strong>ts. It first sends a secure traceroute packet to the next hop,which can be derived from its rout<strong>in</strong>g table. The router receiv<strong>in</strong>g the secure traceroutepacket is expected to send a response back which also <strong>in</strong>cludes a next hop address. Thisprocess repeats until a faulty router is located (no response received from it) or everyrouter on the path to the ultimate dest<strong>in</strong>ation proves healthy. Our approach is differentfrom the secure traceroute <strong>in</strong> that 1) our approach is proposed for MANET us<strong>in</strong>g sourcerout<strong>in</strong>g protocols (e.g., DSR), the secure traceroute is ma<strong>in</strong>ly used <strong>in</strong> wired networks. 2)our approach does not require modification to exist<strong>in</strong>g rout<strong>in</strong>g <strong>in</strong>frastructures, the securetraceroute may need to modify IP layer <strong>in</strong> order to monitor performance problem; 3)our approach utilizes redundant rout<strong>in</strong>g <strong>in</strong>formation for diagnosis, the secure traceroutedoes not.Malicious nodes silently dropp<strong>in</strong>g packets exhibit the same behavior as selfish nodes,which may choose to drop packets for the sake of sav<strong>in</strong>g its own constra<strong>in</strong>t resources,such as battery or CPU cycle. Selfishness and its threat to the network performance havebeen well studied <strong>by</strong> Roughgarden [23]. Incentive mechanisms have been proposed toencourage selfish nodes to be cooperative and to forward packets for others. Unfortunately,<strong>in</strong>centive mechanisms don’t work for malicious users s<strong>in</strong>ce they never play<strong>by</strong> rules. Our proposed prob<strong>in</strong>g scheme can be used to detect and mitigate selfishnessproblem.3 Def<strong>in</strong>itions and Assumptions3.1 Node StatesWe classify the states of a node as follows. A node is GOOD if it responds to probemessages for itself and forwards other probe messages along their source routes. A


156 M. Just, E. Kranakis, and T. Wannode is BAD if it responds to probe messages dest<strong>in</strong>ed to itself but fails <strong>in</strong> forward<strong>in</strong>gprobe messages for others. A benign l<strong>in</strong>k failure may also be detected as BAD behaviorif it is not cleared <strong>by</strong> other mechanisms (e.g., route error <strong>in</strong> DSR). A node is consideredDOWN if 1) it is a neighbor node to the prob<strong>in</strong>g node and it doesn’t respond to probemessages; or 2) it is not a neighbor node and it doesn’t respond to probe messagesthrough all the known paths. A node is considered at the UNKNOWN state if on allknown paths from the prob<strong>in</strong>g node to the node, there exists at least one node <strong>in</strong> BADor DOWN state.3.2 AssumptionsProbe messages are <strong>in</strong>dist<strong>in</strong>guishable from normal packets. One limitation of the prob<strong>in</strong>gtechnique is that it can be easily defeated if probe messages can be dist<strong>in</strong>guishedfrom normal data packets. For example, a malicious node may forward probe messages,but drop all the other data packets, there<strong>by</strong> avoid<strong>in</strong>g detection. This assumption can berealized us<strong>in</strong>g end-to-end encryption of IP payload <strong>by</strong> pair-wise shared keys. S<strong>in</strong>ce amalicious node can understand only the IP header, it does not have the <strong>in</strong>formation ofupper layer protocols, such as TCP/UDP port numbers. By implement<strong>in</strong>g the prob<strong>in</strong>gtechnique above the network layer (e.g., based UDP), an adversary will not be able todist<strong>in</strong>guish a probe message from a other data packet (e.g., HTTP or SMTP packet).Some other options are: 1) piggyback<strong>in</strong>g a probe message on a normal data packetwhich requires acknowledgment, such as TCP SYN. The disadvantage is that such datapackets may not be available dur<strong>in</strong>g the time of prob<strong>in</strong>g. 2) assum<strong>in</strong>g that an adversarycannot modify the forward<strong>in</strong>g software of the compromised router. Therefore, theadversary can only make decisions based on IP addresses, which does not allow fordist<strong>in</strong>guish<strong>in</strong>g a probe message from a normal data packet.Multi-hop source rout<strong>in</strong>g protocols. The prob<strong>in</strong>g technique assumes a multi-hopsource rout<strong>in</strong>g protocol s<strong>in</strong>ce a prob<strong>in</strong>g node needs to specify the source route <strong>by</strong> whicha probe message takes to get to the dest<strong>in</strong>ation. This assumption is practical s<strong>in</strong>ce somerout<strong>in</strong>g protocols, such as Dynamical Source Rout<strong>in</strong>g (DSR) [16], are multi-hop sourcerout<strong>in</strong>g protocols.Bi-directional communication l<strong>in</strong>ks. We assume that all communication l<strong>in</strong>ks arebi-directional. This assumption is practical <strong>in</strong> some wireless networks, such as IEEE802.11 [1], where all l<strong>in</strong>ks have to be bi-directional for l<strong>in</strong>k layer acknowledgment towork.4 The Distributed Prob<strong>in</strong>g SchemeIn order to monitor the behavior of mobile nodes <strong>by</strong> the prob<strong>in</strong>g technique, we needto decide which node should probe and how far it should probe. Given a network withn nodes, there are several <strong>in</strong>terest<strong>in</strong>g possibilities: 1) there is only one prob<strong>in</strong>g nodeand it probes all the other nodes; 2) there are k prob<strong>in</strong>g nodes (1


Resist<strong>in</strong>g Malicious Packet Dropp<strong>in</strong>g <strong>in</strong> Wireless Ad Hoc Networks 157is that one node does not need to rely upon the <strong>in</strong>formation from other nodes to detectmalicious ones. The disadvantage is that it may generate significant network overhead.The network overhead can be reduced if probe messages piggyback normal packets.To simplify the problem, we divided the prob<strong>in</strong>g technique <strong>in</strong>to three algorithms: 1)the prob<strong>in</strong>g path selection algorithm; 2) the prob<strong>in</strong>g algorithm; and 3) the diagnosisalgorithm. These are described below.4.1 Prob<strong>in</strong>g Path Selection AlgorithmThe prob<strong>in</strong>g paths are selected solely from the rout<strong>in</strong>g cache ma<strong>in</strong>ta<strong>in</strong>ed <strong>by</strong> a mobilenode. There are usually many redundant paths <strong>in</strong> the rout<strong>in</strong>g cache. Although prob<strong>in</strong>gover each of them may allow for validat<strong>in</strong>g all the known paths, it will also producesignificant network overhead. The ideal strategy shall select a m<strong>in</strong>imum number ofpaths but allows for monitor<strong>in</strong>g the forward<strong>in</strong>g behavior of as many nodes <strong>in</strong> the rout<strong>in</strong>gcache as possible. The prob<strong>in</strong>g path selection algorithm returns a set of paths with thefollow<strong>in</strong>g properties.1) For any two paths p i and p j , p i p j . S<strong>in</strong>ce prob<strong>in</strong>g over a path can alwaysdisclose the forward<strong>in</strong>g behavior of those nodes <strong>in</strong> any of its subsets, any path which isa subset of another path will be elim<strong>in</strong>ated.2) For any two paths p i and p j , if the second farthest node <strong>in</strong> p i is an <strong>in</strong>termediatenode of p j , the farthest node of p i will be removed. For example, given two pathsp 1 = A → B → C → D and p 2 = A → E → F → C → G → H, node D willbe removed from p 1 . With D <strong>in</strong> p 1 , A can monitor the forward<strong>in</strong>g function of C.S<strong>in</strong>cesuch monitor<strong>in</strong>g can be achieved <strong>by</strong> prob<strong>in</strong>g over p 2 , there is no need to keep D <strong>in</strong> p 1 .C will still be kept <strong>in</strong> p 1 ,s<strong>in</strong>ceA needs to monitor B <strong>by</strong> send<strong>in</strong>g a probe message to C.3) The length of any path (<strong>in</strong> terms of number of hops) is greater than 1. S<strong>in</strong>ce weare <strong>in</strong>terested <strong>in</strong> monitor<strong>in</strong>g the forward<strong>in</strong>g function of mobile nodes, prob<strong>in</strong>g over aone hop path offers no <strong>in</strong>formation. A probe message is sent to a neighbor node onlywhen a node subsequent to it doesn’t respond to the probe message and the prob<strong>in</strong>gnode needs to know if the neighbor node is BAD or has moved out of its transmissionrange.4.2 The Prob<strong>in</strong>g AlgorithmWith a set of selected prob<strong>in</strong>g paths, the prob<strong>in</strong>g algorithm will probe over each ofthem. Given a prob<strong>in</strong>g path, there are at least two ways of prob<strong>in</strong>g. One way is to probefrom the farthest node to the nearest. The other way is to probe from the nearest node tothe farthest. Each has its own advantages and disadvantages. Prob<strong>in</strong>g from far to near isbetter if the prob<strong>in</strong>g path is GOOD s<strong>in</strong>ce it takes only one probe message and proves thegoodness of all the <strong>in</strong>termediate nodes. But it may take more probe messages if a BADnode is located near the prob<strong>in</strong>g node. This method can be applied to a network wherewe have the confidence that the majority of the nodes <strong>in</strong> the network are GOOD. Theadvantage of prob<strong>in</strong>g from near to far is that it generates smaller number of prob<strong>in</strong>gmessages to detect a BAD node located near the prob<strong>in</strong>g node. Another advantage isthat we have the prior knowledge of the states of all the <strong>in</strong>termediate nodes along thepath to the probed node except its immediate predecessor node. The disadvantage is


158 M. Just, E. Kranakis, and T. Wanthe an <strong>in</strong>telligent attacker may be able to avoid detection <strong>by</strong> forward<strong>in</strong>g all packets(<strong>in</strong>clud<strong>in</strong>g probe messages dest<strong>in</strong>ed to the downstream nodes) for a certa<strong>in</strong> period oftime immediately after receiv<strong>in</strong>g a probe message for itself. A received probe messagetherefore serves as a signature to an attacker that a diagnosis process is ongo<strong>in</strong>g, and itwould start to behave normally for a short period of time. Other search strategy (e.g.,b<strong>in</strong>ary search) can also be deployed to reduce network overhead.In this paper, we present the algorithm for the first method, prob<strong>in</strong>g from the farthestnodes to the nearest, s<strong>in</strong>ce it is stronger than the other alternatives <strong>in</strong> detect<strong>in</strong>gmalicious nodes. For a prob<strong>in</strong>g path, the prob<strong>in</strong>g node sends a probe message to the farthestnode. If an acknowledgment message is received with<strong>in</strong> a certa<strong>in</strong> period of time,all the <strong>in</strong>termediate nodes are shown to be GOOD. Otherwise, a probe message is sentto the second farthest node. This process is repeated until one node responds to theprobe message or the nearest node (a neighbor node) is probed and it is not responsive.In the latter case, we know that the neighbor node <strong>in</strong> the probed path either is DOWNor has moved out to another location. S<strong>in</strong>ce the neighbor node is not responsive, thereis noth<strong>in</strong>g we can do to monitor the rest nodes <strong>in</strong> the path. Therefore, prob<strong>in</strong>g over thispath is stopped. If an <strong>in</strong>termediate node is responsive but a node subsequent to it is not,it is possible: 1) the <strong>in</strong>termediate node failed forward<strong>in</strong>g the probe message to the nextnode; 2) the l<strong>in</strong>k between the two nodes is broken <strong>by</strong> location change; 3) the unresponsivenode is <strong>in</strong>capable of respond<strong>in</strong>g to the probe message. The diagnosis algorithm willthen be called to decide which one is the case.4.3 The Diagnosis AlgorithmAfter the prob<strong>in</strong>g node detects a node (v i ) is responsive but the subsequent node (v i+1 )is unresponsive, it calls the diagnosis algorithm to determ<strong>in</strong>e if the l<strong>in</strong>k v i ↔ v i+1 isbroken at the l<strong>in</strong>k level or forward<strong>in</strong>g level.The prob<strong>in</strong>g node first searches the rout<strong>in</strong>g cache for another path to v i+1 .Ifsuchapath exists, it will probe v i+1 through this path. If v i+1 is still unresponsive, it searchesthe rout<strong>in</strong>g cache for another path. This process repeats until 1) there is a route (p)through which node v i+1 is responsive, or 2) the rout<strong>in</strong>g cache is exhausted.In case 1, the diagnosis algorithm appends v i to the path p and sends a probe messageto v i over p. If an acknowledgment is received from v i , v i is diagnosed as BADs<strong>in</strong>ce the l<strong>in</strong>k v i+1 → v i is good but l<strong>in</strong>k v i → v i+1 is not. Based on the assumptionthat any l<strong>in</strong>k is bidirectional, v i ↔ v i+1 should be good at l<strong>in</strong>k level. Therefore, it isbroken at forward<strong>in</strong>g level. If v i is unresponsive over the new path, the l<strong>in</strong>k v i ↔ v i+1is diagnosed as broken <strong>in</strong> l<strong>in</strong>k layer. It is also possible that both v i and v i+1 are BAD.S<strong>in</strong>ce there is no sufficient <strong>in</strong>formation available to dist<strong>in</strong>guish this situation from thel<strong>in</strong>k layer break, we treat this situation as l<strong>in</strong>k layer break. It causes false negatives.In case 2, node v i+1 may have moved out from its previous location and a newpath to v i+1 is not discovered <strong>by</strong> the prob<strong>in</strong>g node yet. It is also possible that nodev i+1 has moved out from the network or is DOWN. Although a route discovery may beable to disclose further <strong>in</strong>formation, it is also very expensive. Therefore, the diagnosisalgorithm simply treats node v as be<strong>in</strong>g DOWN.When a node is detected as BAD, the rout<strong>in</strong>g cache is updated <strong>by</strong> remov<strong>in</strong>g all nodessubsequent to the bad node. When a l<strong>in</strong>k is detected as broken, the rout<strong>in</strong>g cache is also


Resist<strong>in</strong>g Malicious Packet Dropp<strong>in</strong>g <strong>in</strong> Wireless Ad Hoc Networks 159<strong>in</strong>formed and the l<strong>in</strong>k is truncated from all the paths. When the rout<strong>in</strong>g cache adds aroute to the cache, it looks up the node state table and truncates the route accord<strong>in</strong>gly ifthere is any BAD node <strong>in</strong> the path.5 SimulationsWe study the detection rate of the prob<strong>in</strong>g technique and and its impact on networkperformance us<strong>in</strong>g the NS-2 network simulator [18] with the wireless extension fromRice University. The simulation is performed on Sun Ultra 10 workstations runn<strong>in</strong>gSolaris 5.7.5.1 Simulation EnvironmentWe implemented the prob<strong>in</strong>g technique <strong>in</strong> NS-2 version 2.1b9a with wireless extension.The rout<strong>in</strong>g protocol we use is Dynamic Source Rout<strong>in</strong>g (DSR) and the rout<strong>in</strong>g cacheis path cache with a primary and a secondary FIFO cache [11]. The prob<strong>in</strong>g techniqueis implemented as a part of DSR and the probe message is a new type of DSR packet.We simulate a network with 670m x 670m space and 50 mobile nodes. The simulationtime is 100 seconds. The mobile nodes move with<strong>in</strong> the network space accord<strong>in</strong>g tothe random waypo<strong>in</strong>t mobility model [15] with a maximum speed of 20m/s. The pausetime is 50 seconds, which represents a network with moderately chang<strong>in</strong>g topology.The communication patterns we use are 10 constant bit rate (CBR) connections with adata rate of 4 packets per second. Those simulation parameters are widely used <strong>by</strong> thecommunity. We chose them to make our simulation results comparable with others.We randomly choose 0, 3, 5, 8, 10, 13, and 15 BAD nodes <strong>in</strong> each of the simulation.Security researchers like to assume the worst case, but it rarely happens <strong>in</strong> reallife. S<strong>in</strong>ce it is realistic that the majority of nodes <strong>in</strong> a network should be GOOD, wesimulate at most 15 BAD nodes, which represent 30 percent of the total number ofnodes.5.2 MetricsWe chose the follow<strong>in</strong>g metrics for measur<strong>in</strong>g the prob<strong>in</strong>g technique: 1) Detection Rate,the ratio of the number of detected BAD nodes and the total number of actual BADnodes. 2) False Positive Rate, the ratio of number of GOOD nodes mistakenly detectedas BAD and the total number of GOOD nodes. The comb<strong>in</strong>ation of this metric and thedetection rate tells us the overall performance of the prob<strong>in</strong>g technique. 3) Packet DeliveryRate, the ratio of total number of data packets received and the total number ofdata packets sent <strong>in</strong> application level. In our simulation, the data packets refer to theCBR traffic. 4) Network Overhead, the ratio of total number of rout<strong>in</strong>g related transmissions(<strong>in</strong>clud<strong>in</strong>g all DSR related traffic and probe messages) and the total number ofpacket transmissions (<strong>in</strong>clud<strong>in</strong>g both rout<strong>in</strong>g related transmissions and data transmissions).Each packet hop is counted as one transmission.


160 M. Just, E. Kranakis, and T. Wan5.3 Simulation ResultsWe study the prob<strong>in</strong>g technique us<strong>in</strong>g the above def<strong>in</strong>ed metrics. The standard DSR(Standard DSR) is used as a basel<strong>in</strong>e to compare with the DSR with the extension ofthe prob<strong>in</strong>g technique (DSR Probe). We run the simulation 5 times and all the graphs(Figure 1) are plotted from the data averaged from the 5 runs.1DSR_Probe1DSR_ProbeDetection Rate0.80.60.40.2Palse Positive Ration0.80.60.40.200 0.05 0.1 0.15 0.2 0.25 0.3 0.3500 0.05 0.1 0.15 0.2 0.25 0.3 0.35Percent of BAD NodesPercent of BAD Nodes(a) Detection Rate(b) False Positive RatePackets Delivery Ration10.80.60.40.2Standard_DSRDSR_ProbeRout<strong>in</strong>g Overhead10.80.60.40.2Standard_DSRDSR_Probe00 0.05 0.1 0.15 0.2 0.25 0.3 0.35Percent of BAD Nodes(c) Network Throughput00 0.05 0.1 0.15 0.2 0.25 0.3 0.35Percent of BAD Nodes(d) Rout<strong>in</strong>g OverheadFig. 1. Simulation ResultsDetection Rate. Figure 1.a shows the detection rate. In the best case, 94% of the badnodes can be detected. In the worst case, the detect rate is 76%. There are several reasonswhy a BAD node is not detected. First, the BAD node is not <strong>in</strong> any path <strong>in</strong> therout<strong>in</strong>g cache each time when the prob<strong>in</strong>g technique starts to probe. S<strong>in</strong>ce the prob<strong>in</strong>gpaths are selected solely based on the paths ma<strong>in</strong>ta<strong>in</strong>ed <strong>by</strong> the rout<strong>in</strong>g cache, if a node isnot conta<strong>in</strong>ed <strong>in</strong> any path, its forward<strong>in</strong>g function will not be monitored. Second, thereare two consecutive BAD nodes <strong>in</strong> a path, and the bad behavior of one is hidden <strong>by</strong> theother. The l<strong>in</strong>k between the two bad nodes is detected as l<strong>in</strong>k layer break, the the badbehavior is not detected. Although this affects the detection rate, it does not have impacton packet delivery rate s<strong>in</strong>ce the l<strong>in</strong>k is removed from the rout<strong>in</strong>g cache <strong>in</strong> any way.False Positive Rate. Figure 1.b shows the false positive rate. We can see from thegraph that the highest false positive rate is below 9%, which is relatively low. Thefalse positive is caused ma<strong>in</strong>ly <strong>by</strong> node movement s<strong>in</strong>ce some l<strong>in</strong>k layer breaks are


Resist<strong>in</strong>g Malicious Packet Dropp<strong>in</strong>g <strong>in</strong> Wireless Ad Hoc Networks 161detected as forward<strong>in</strong>g level misbehavior. Therefore, it will decrease when the nodemotion becomes slower.Packet Delivery Rate. The graph of packet delivery rate (Figure 1.c) has two curvesand they represent the throughput of standard DSR and the DSR with the extensionof the prob<strong>in</strong>g technique. The graph demonstrates that the DSR with the prob<strong>in</strong>g techniqueextension always performs better than the standard DSR. This is <strong>in</strong> l<strong>in</strong>e with ourexpectation s<strong>in</strong>ce the bad nodes which failed <strong>in</strong> forward<strong>in</strong>g packets are removed fromthe rout<strong>in</strong>g cache. The result is that good paths are used for transmitt<strong>in</strong>g packets.We can also see from the graphs that packet delivery rate sometimes is higher whenthere is a higher percentage of BAD nodes than when there is a lower percentage ofBAD nodes. This is contrary to the common expectation. As expla<strong>in</strong>ed <strong>in</strong> [19], therandomness of NS-2 results <strong>in</strong> this effect due to the fact that route replies may arriveat nodes <strong>in</strong> different orders <strong>in</strong> different runs. Therefore, a node may choose a path withBAD nodes <strong>in</strong> one run but choose a good path <strong>in</strong> another run.Overhead. As shown <strong>in</strong> Figure 1.d, the rout<strong>in</strong>g overhead is <strong>in</strong>creased significantlywhen the network topology changes faster or there is a high percentage of BAD nodes<strong>in</strong> the network. In both scenarios, a large number of probe messages have to be sentout to f<strong>in</strong>alize the node states. The overhead can be reduced dramatically if prob<strong>in</strong>gmessages piggyback normal data packets.6 ConclusionWireless ad hoc networks are vulnerable to various types of DoS attacks. We presenteda distributed prob<strong>in</strong>g technique to detect and migitate the malicious packet dropp<strong>in</strong>gattack <strong>in</strong> MANETs. We implemented the prob<strong>in</strong>g technique <strong>in</strong> NS-2 with wireless extensions.Our experiments show that <strong>in</strong> a moderately chang<strong>in</strong>g network, the prob<strong>in</strong>gtechnique can detect most of the malicious nodes with a relative low false positive rate.The packet delivery rate can also be <strong>in</strong>creased if the node state <strong>in</strong>formation is sharedwith rout<strong>in</strong>g cache. We th<strong>in</strong>k the prob<strong>in</strong>g technique is of practical significance s<strong>in</strong>ce itcan be implemented <strong>in</strong>dependently from rout<strong>in</strong>g software and does not require modificationto the exist<strong>in</strong>g <strong>in</strong>frastructure. The disadvantage of the prob<strong>in</strong>g technique is that itgenerates relatively high network rout<strong>in</strong>g overhead if probe messages do not piggybackdata packets.References1. ANSI/IEEE std 802.11. Wireless LAN Medium Access Control (MAC) and Physical Layer(PHY) specification, 1999.2. B. Awerbuch, D. Holmer, C. Nita-Rotaru, and H. Rubens. An On-Demand Secure Rout<strong>in</strong>gProtocol Resilient to Byzant<strong>in</strong>e Failures. In ACM Workshop on Wireless Security (WiSe),September 2002.3. S.M. Bellov<strong>in</strong>, M. Leech, and T. Taylor. ICMP Traceback Messages. Internet draft: draftietf-itrace-03.txt,January 2003.


162 M. Just, E. Kranakis, and T. Wan4. K.A. Bradley, S. Cheung, N. Puketza, B. Mukherjee, and R.A. Olsson. Detect<strong>in</strong>g DisruptiveRouters: A Distributed Network Monitor<strong>in</strong>g Approach. In Proceed<strong>in</strong>gs of the IEEE Symposiumon Research <strong>in</strong> Security and Privacy, pages 115-124, May 1998.5. S. Buchegger and J.Y. Le Boudec. Performance Analysis of the CONFIDANT Protocol (CooperationOf Nodes - Fairness In Dynamic Ad-hoc NeTworks) In Proceed<strong>in</strong>gs of the ThirdACM International Symposium on Mobile Ad Hoc Network<strong>in</strong>g and Comput<strong>in</strong>g, (MobiHoc2002), June 2002.6. H. Burch and H. Cheswich. Trac<strong>in</strong>g anonymous packets to their approximate source. InProceed<strong>in</strong>gs of USENIX LISA. pages 319-327, New Orleans, LA, December 2002.7. S. Cheung. An Efficient Message Authentication Scheme for L<strong>in</strong>k State Rout<strong>in</strong>g. In Proceed<strong>in</strong>gsof the 13th Annual <strong>Computer</strong> Security Applications Conference, San Diego, California,USA, December 1997.8. S. Cheung and K. Levitt. Protect<strong>in</strong>g rout<strong>in</strong>g <strong>in</strong>frastructure from denial of service us<strong>in</strong>g cooperative<strong>in</strong>trusion detection. In Proceed<strong>in</strong>gs of New Security Paradigms Workshop, GreatLangdale, Cumbria, UK, September 1997.9. B.P. Crow, I.K. Widjaja, G. Jeong, and P.T. Sakai. IEEE 802.11 Wireless Local Area Networks.IEEE Communications Magaz<strong>in</strong>e, vol. 35, No. 9: pages 116-126, September 1997.10. A. Habib, M. Hefeeda, and B. Bhargava. Detect<strong>in</strong>g Service Violations and DoS Attacks.In Proceed<strong>in</strong>gs of 2003 Internet Society Symposium on Network and Distributed SystemSecurity (NDSS’03), San Diego, California, USA. February 2003.11. Y.C. Hu and D.B. Johnson. Cach<strong>in</strong>g Strategies <strong>in</strong> On-Demand Rout<strong>in</strong>g Protocols for WirelessAd Hoc Networks. In Proceed<strong>in</strong>gs of the Sixth Annual IEEE/ACM International Conferenceon Mobile Comput<strong>in</strong>g and Network<strong>in</strong>g (MobiCom 2000), pages 231-242, August 2000.12. Y.C. Hu, A. Perrig, and D.B. Johnson. Ariadne: A Secure On-Demand Rout<strong>in</strong>g Protocol forAd Hoc Networks. In Proceed<strong>in</strong>gs of the Eighth ACM International Conference on MobileComput<strong>in</strong>g and Network<strong>in</strong>g (MobiCom 2002), September 23-28, 2002.13. Y.C. Hu, D.B. Johnson, and A. Perrig. Secure Efficient Distance Vector Rout<strong>in</strong>g Protocol <strong>in</strong>Mobile wireless Ad Hoc Networks. In Proceed<strong>in</strong>gs of the Fourth IEEE Workshop on MobileComput<strong>in</strong>g Systems and Applications (WMCSA 2002), June 2002.14. Y.C. Hu, A. Perrig, and D.B. Johnson. Efficient Security Mechanisms for Rout<strong>in</strong>g Protocols.In Proceed<strong>in</strong>gs of 2003 Internet Society Symposium on Network and Distributed SystemSecurity (NDSS’03), San Diego, California, USA. February 2003.15. D. Johnson and D.A. Maltz. Dynamic Source Rout<strong>in</strong>g <strong>in</strong> Ad Hoc Wireless Networks. InMobile Comput<strong>in</strong>g, chapter 5, pages 153-181. Kluwer Academic Publishers, 1996.16. D. Johnson, D.A. Maltz, Y.C. Hu, and J.G. Jetcheva. The Dynamic Source Rout<strong>in</strong>g Protocolfor Mobile Ad Hoc Networks (Internet-Draft). Mobile Ad-hoc Network (MANET) Work<strong>in</strong>gGroup, IETF, February 2002.17. G.M. Jones. The Case for Network Infrastructure Security. ;logon: The Magaz<strong>in</strong>e ofUSENIX and SAGE. pages 25-29, Volume 27, Number 6, December 2002.18. K. Fall and K. Varadhan, editors. The ns Manual (formerly ns <strong>Notes</strong> and Documentation).April 14, 2002. http://www.isi.edu/nsnam/ns/doc/<strong>in</strong>dex.html19. S. Marti, T.J. Giuli, K. Lai, and M. Baker. Mitigat<strong>in</strong>g Rout<strong>in</strong>g Misbehavior <strong>in</strong> Mobile AdHoc Networks. In Proceed<strong>in</strong>gs of the Sixth Annual ACM/IEEE International Conference onMobile Comput<strong>in</strong>g and Network<strong>in</strong>g (MOBICOM 2000), August 2000.20. V.N. Padmanabhan and D. R. Simon. Secure Traceroute to Detect Faulty or Malicious Rout<strong>in</strong>g.In ACM SIGCOMM Workshop on Hot Topic <strong>in</strong> Networks (HotNets-I), October 2002.21. C.E. Perk<strong>in</strong>s, E. M. Royer, and S.R. Das. Ad Hoc On Demand Distance Vector (AODV)Rout<strong>in</strong>g (Internet-Draft). June 2002.22. R. Perlman. Network Layer Protocols with Byzant<strong>in</strong>e Robustness. PhD thesis, MassachusettsInstitute of Technology, August 1988.


Resist<strong>in</strong>g Malicious Packet Dropp<strong>in</strong>g <strong>in</strong> Wireless Ad Hoc Networks 16323. T. Roughgarden. Selfish Rout<strong>in</strong>g. PhD thesis, Cornell University, May 2002.24. B.R. Smith and J.J. Garcia-Luna-Aceves. Secur<strong>in</strong>g the Border Gateway Rout<strong>in</strong>g Protocol. InProceed<strong>in</strong>gs of Global Internet 1996. London, UK. November 1996.25. B.R. Smith, S. Murthy, and J.J. Garcia-Luna-Aceves. Secur<strong>in</strong>g Distance-Vector Rout<strong>in</strong>g Protocols.In Proceed<strong>in</strong>gs of 1997 Internet Society Symposium on Network and Distributed SystemSecurity (NDSS’97), San Diego, California, USA. February 1997.26. M.G. Zapata and N. Asokan. Secur<strong>in</strong>g Ad Hoc Rout<strong>in</strong>g Protocols. In Proceed<strong>in</strong>gs of theACM Workshop on Wireless Security (WiSe 2002), September 2002.27. Kan Zhang. Efficient Protocols for Sign<strong>in</strong>g Rout<strong>in</strong>g Messages. In Proceed<strong>in</strong>gs of 1997 InternetSociety Symposium on Network and Distributed System Security (NDSS’98), San Diego,California, USA, March 1998.


A New Framework for Build<strong>in</strong>g Secure CollaborativeSystems <strong>in</strong> True Ad Hoc NetworkHans-Peter Bischof, Alan Kam<strong>in</strong>sky, and Joseph B<strong>in</strong>derRochester Institute of Technology, 102Lomb Mermorial Dr, Rochester, NY 14623{hpb,ark,jsb7834}@cs.rit.eduAbstract. Many-to-Many Invocation (M2MI) is a new paradigm for build<strong>in</strong>gsecure collaborative systems that run <strong>in</strong> true ad hoc networks of fixed and mobilecomput<strong>in</strong>g devices. M2MI is useful for build<strong>in</strong>g a broad range of systems,<strong>in</strong>clud<strong>in</strong>g service discovery frameworks; groupware for mobile ad hoc collaboration;systems <strong>in</strong>volv<strong>in</strong>g networked devices (pr<strong>in</strong>ters, cameras, sensors); andcollaborative middleware systems. M2MI provides an object oriented methodcall abstraction based on broadcast<strong>in</strong>g. An M2MI <strong>in</strong>vocation means “every objectout there that implements this <strong>in</strong>terface, call this method.” M2MI is layeredon top of a new messag<strong>in</strong>g protocol, the Many-to-Many Protocol (M2MP),which broadcasts messages to all near<strong>by</strong> devices us<strong>in</strong>g the wireless network's<strong>in</strong>herent broadcast nature <strong>in</strong>stead of rout<strong>in</strong>g messages from device to device. Inan M2MI-based system, central servers are not required; network adm<strong>in</strong>istrationis not required; complicated, resource-consum<strong>in</strong>g ad hoc rout<strong>in</strong>g protocolsare not required; and system development and deployment are simplified.Keywords: Collaborative systems, peer-to-peer systems, distributed objects,decentralized key management, ad hoc network<strong>in</strong>g, server-less network<strong>in</strong>g.IntroductionThis paper describes a new paradigm, Many-to-Many Invocation (M2MI), for build<strong>in</strong>gsecure collaborative systems that run <strong>in</strong> true ad hoc networks of fixed and mobilecomput<strong>in</strong>g devices. M2MI is useful for build<strong>in</strong>g a broad range of systems, <strong>in</strong>clud<strong>in</strong>gservice discovery frameworks; groupware for mobile ad hoc collaboration.We also address encryption and decryption of M2MI method <strong>in</strong>vocations and a describea decentralized key management <strong>in</strong> ad hoc networks.M2MI provides an object oriented method call abstraction based on broadcast<strong>in</strong>g.An M2MI-based application broadcasts method <strong>in</strong>vocations, which are received andperformed <strong>by</strong> many objects <strong>in</strong> many target devices simultaneously. An M2MI <strong>in</strong>vocationmeans “Everyone out there that implements this <strong>in</strong>terface, call this method.” Thecall<strong>in</strong>g application does not need to know the identities of the target devices ahead oftime, does not need to explicitly discover the target devices, and does not need to setup <strong>in</strong>dividual connections to the target devices. The call<strong>in</strong>g device simply broadcastsmethod <strong>in</strong>vocations, and all objects <strong>in</strong> the proximal network that implement thosemethods will execute them.S. Pierre, M. Barbeau, and E. Kranakis (Eds.): ADHOC-NOW 2003, LNCS <strong>2865</strong>, pp. 164–174, 2003.© Spr<strong>in</strong>ger-Verlag Berl<strong>in</strong> Heidelberg 2003


A New Framework for Build<strong>in</strong>g Secure Collaborative Systems 165As a result, M2MI offers these key advantages over exist<strong>in</strong>g systems:• M2MI-based systems do not require central servers; <strong>in</strong>stead, applications run collectivelyon the proximal devices themselves.• M2MI-based systems do not require network adm<strong>in</strong>istration to assign addresses todevices, set up rout<strong>in</strong>g, and so on, s<strong>in</strong>ce method <strong>in</strong>vocations are broadcast to allnear<strong>by</strong> devices. Consequently,• M2MI is well-suited for an ad hoc network<strong>in</strong>g environment where central serversmay not be available and devices may come and go unpredictably.• M2MI-based systems allow to decrypt an encrypt method <strong>in</strong>vocations us<strong>in</strong>g sessionkeys [9].• M2MI-based systems do not need complicated ad hoc rout<strong>in</strong>g protocols that consumememory, process<strong>in</strong>g, and network bandwidth resources [10]. Consequently,• M2MI is well-suited for small mobile devices with limited resources and batterylife.• M2MI simplifies system development <strong>in</strong> several ways. By us<strong>in</strong>g M2MI's highlevelmethod call abstraction, developers avoid hav<strong>in</strong>g to work with low-level networkmessages. S<strong>in</strong>ce M2MI does not need to discover target devices explicitly orset up <strong>in</strong>dividual connections, developers need not write the code to do all that.• M2MI simplifies system deployment <strong>by</strong> elim<strong>in</strong>at<strong>in</strong>g the need for always-on applicationservers, lookup services, code-base servers, and so on; <strong>by</strong> elim<strong>in</strong>at<strong>in</strong>g thesoftware that would otherwise have to be <strong>in</strong>stalled on all these servers; and <strong>by</strong>elim<strong>in</strong>at<strong>in</strong>g the need for network configuration.M2MI's key technical <strong>in</strong>novations are these:• M2MI layers an object oriented abstraction on top of broadcast messag<strong>in</strong>g, lett<strong>in</strong>gthe application developer work with high-level method calls <strong>in</strong>stead of low-levelnetwork messages.• M2MI uses dynamic proxy synthesis to create remote method <strong>in</strong>vocation proxies(stubs and skeletons) automatically at run time - as opposed to exist<strong>in</strong>g remotemethod <strong>in</strong>vocation systems, which compile the proxies, offl<strong>in</strong>e and which mustdeploy the proxies ahead of time.This paper is organized as follows: the next chapter describes the target environmentfor M2MI based systems; the follow<strong>in</strong>g chapter discusses the M2MI paradigm followed<strong>by</strong> a chapter show<strong>in</strong>g how M2MI can be used to develop applications and servicediscovery frameworks. The last two chapters discuss a dynamic fault tolerant keymanagement system.Target EnvironmnetM2MI's target doma<strong>in</strong> is ad hoc collaborative systems: systems where multiple userswith comput<strong>in</strong>g devices, as well as multiple standalone devices like pr<strong>in</strong>ters, cameras,and sensors, all participate simultaneously (collaborative); and systems where thevarious devices come and go and so are not configured to know about each otherahead of time (ad hoc). Examples of ad hoc collaborative systems <strong>in</strong>clude:


166 H.-P. Bischof, A. Kam<strong>in</strong>sky, and J. B<strong>in</strong>der• Applications that discover and use near<strong>by</strong> networked services: a document pr<strong>in</strong>t<strong>in</strong>gapplication that f<strong>in</strong>ds pr<strong>in</strong>ters wherever the user happens to be, or a surveillanceapplication that displays images from near<strong>by</strong> video cameras.• Collaborative middleware systems like shared tuple spaces [1].• Groupware applications: a chat session, a shared whiteboard, a group appo<strong>in</strong>tmentscheduler, a file shar<strong>in</strong>g application, or a multiplayer game.In many such collaborative systems, every device needs to talk to every other device.Every person's chat messages are displayed on every person's device; every person'scalendar on every person's device is queried and updated with the next meet<strong>in</strong>g time.In contrast to applications like email or web brows<strong>in</strong>g (one-to-one communication) orweb-cast<strong>in</strong>g (one-to-many communication), the collaborative systems envisioned hereexhibit many-to-many communication patterns. M2MI is designed especially to supportapplications with many-to-many communication patterns, although it also supportsother communication patterns.Devices come and go as the system is runn<strong>in</strong>g, the devices do not know eachother’s identities beforehand; <strong>in</strong>stead, the devices form ad hoc networks among themselves.M2MI is <strong>in</strong>tended for runn<strong>in</strong>g collaborative systems without central servers. In awireless ad hoc network of devices, rely<strong>in</strong>g on servers <strong>in</strong> a wired network is unattractivebecause the devices are not necessarily always <strong>in</strong> range of a wireless access po<strong>in</strong>t.Furthermore, rely<strong>in</strong>g on any one wireless device to act as a server is unattractive becausedevices may come and go without prior notification. Instead, all the devices -whichever ones happen to be present <strong>in</strong> the chang<strong>in</strong>g set of proximal devices - act <strong>in</strong>concert to run the system.The M2MI ParadigmRemote method <strong>in</strong>vocation (RMI) [7] can be viewed as an object oriented abstractionof po<strong>in</strong>t-to-po<strong>in</strong>t communication: what looks like a method call is <strong>in</strong> fact a messagesent and a response sent back. In the same way, M2MI can be viewed as an objectoriented abstraction of broadcast communication. This section describes the M2MIparadigm at a conceptual level.HandlesM2MI lets an application <strong>in</strong>voke a method declared <strong>in</strong> an <strong>in</strong>terface. To do so, theapplication needs some k<strong>in</strong>d of “reference” upon which to perform the <strong>in</strong>vocation. InM2MI, a reference is called a handle, and there are three varieties, omnihandles, unihandles,and multihandles.OmnihandlesAn omnihandle for an <strong>in</strong>terface stands for “every object out there that implements this<strong>in</strong>terface.” An application can ask the M2MI layer to create an omnihandle for a cer-


A New Framework for Build<strong>in</strong>g Secure Collaborative Systems 167ta<strong>in</strong> <strong>in</strong>terface X, called the omnihandle's target <strong>in</strong>terface. (A handle can implementmore than one target <strong>in</strong>terface if desired. An omnihandle for <strong>in</strong>terface Foo; the omnihandleis named allFoos is created <strong>by</strong> code like this:Foo allFoos = M2MI.getOmnihandle(Foo.class);Once an omnihandle is created, call<strong>in</strong>g method doSometh<strong>in</strong>g on the omnihandlefor <strong>in</strong>terface AnInterface means, “Every object out there that implements <strong>in</strong>terfaceAnInterface, perform method doSometh<strong>in</strong>g.” The method is actuallyperformed <strong>by</strong> whichever objects implement<strong>in</strong>g <strong>in</strong>terface AnInterface exist at the timethe method is <strong>in</strong>voked on the omnihandle. Thus, different objects could respond to anomnihandle <strong>in</strong>vocationat different times. Three objects implement<strong>in</strong>g <strong>in</strong>terface Foo,objects A, B, and D, happen to be <strong>in</strong> existence at that time; so all three objects performmethod y. Note that even though object D did not exist when the omnihandleallFoos was created, the method is nonetheless <strong>in</strong>voked on object D.The target objects <strong>in</strong>voked <strong>by</strong> an M2MI method call need not reside <strong>in</strong> the sameprocess as the call<strong>in</strong>g object. The target objects can reside <strong>in</strong> other processes or otherdevices. As long as the target objects are <strong>in</strong> range to receive a broadcast from thecall<strong>in</strong>g object over the network, the M2MI layer will f<strong>in</strong>d the target objects and performa remote method <strong>in</strong>vocation on each one.Export<strong>in</strong>g ObjectsTo receive <strong>in</strong>vocations on a certa<strong>in</strong> <strong>in</strong>terface X, an application creates an object thatimplements <strong>in</strong>terface X and exports the object to the M2MI layer. Thereafter, theM2MI layer will <strong>in</strong>voke that object's method Y whenever anyone calls method Y onan omnihandle for <strong>in</strong>terface X. An object is exported with code like this:M2MI.export(b, Foo.class);Foo.class is the class of the target <strong>in</strong>terface through which M2MI <strong>in</strong>vocations willcome to the object. We say the object is “exported as type Foo.” M2MI also lets anobject be exported as more than one target <strong>in</strong>terface. Once exported, an object staysexported until explicitly unexported:M2MI.unexport(b);In other words, M2MI does not do distributed garbage collection (DGC). In manydistributed collaborative applications, DGC is unwanted; an object that is exported <strong>by</strong>one device as part of a distributed application should rema<strong>in</strong> exported even if thereare no other devices <strong>in</strong>vok<strong>in</strong>g the object yet. In cases where DGC is needed, it can beprovided <strong>by</strong> a leas<strong>in</strong>g mechanism explicit <strong>in</strong> the <strong>in</strong>terface.UnihandlesA unihandle for an <strong>in</strong>terface stands for “one particular object out there that implementsthis <strong>in</strong>terface.” An application can export an object and have the M2MI layer


168 H.-P. Bischof, A. Kam<strong>in</strong>sky, and J. B<strong>in</strong>derreturn a unihandle for that object. Unlike an omnihandle, a unihandle is bound to oneparticular object at the time the unihandle is created. A unihandle is created <strong>by</strong> codelike this:Foo b_Foo = M2MI.getUnihandle(b,Foo.class);Once a unihandle is created, call<strong>in</strong>g method Y on the unihandle means, “The particularobject out there associated with this unihandle, perform method Y.” When thestatement b_Foo.y(); is executed, only object B performs the method. As with anomnihandle, the target object for a unihandle <strong>in</strong>vocation need not reside <strong>in</strong> the sameprocess or device as the call<strong>in</strong>g object.A unihandle can be detached from its object, after which the object can no longerbe <strong>in</strong>voked via the unihandle:b_Foo.detach();MultihandlesA multihandle for an <strong>in</strong>terface stands for “one particular set of objects out there thatimplement this <strong>in</strong>terface.” Unlike a unihandle which only refers to one object, a multihandlecan refer to zero or more objects. But unlike an omnihandle which automaticallyrefers to all objects that implement a certa<strong>in</strong> target <strong>in</strong>terface, a multihandle onlyrefers to those objects that have been explicitly attached to the multihandle.The multihandle is named someFoos, and it is attached to two objects, A and D.The multihandle is created and attached to the objects <strong>by</strong> code like this:Foo someFoos = M2MI.getMultihandle(Foo.class);someFoos.attach(a); someFoos.attach(d);Once a multihandle is created, call<strong>in</strong>g method Y on the multihandle means, “Theparticular object or objects out there associated with this multihandle, perform methodY.” When the statement someFoos.y(); is executed, objects A and D perform themethod, but not objects B or C. As with an omnihandle or unihandle, the target objectsfor a multihandle <strong>in</strong>vocation need not reside <strong>in</strong> the same process or device as thecall<strong>in</strong>g object or each other.A multihandle can be created <strong>in</strong> one process and sent toanother process, and the dest<strong>in</strong>ation process can then attach its own objects to themultihandle.An object can also be detached from a multihandle:someFoos.detach(a);M2MI-Based SystemsThis section gives one examples show<strong>in</strong>g how M2MI can be used to design a chatapplication and a pr<strong>in</strong>t service discovery system. These examples show the eleganceof ad hoc collaborative systems based on M2MI. Further examples can be found at[4].


A New Framework for Build<strong>in</strong>g Secure Collaborative Systems 169Service Discovery – Pr<strong>in</strong>t<strong>in</strong>gAs an example of an M2MI-based system <strong>in</strong>volv<strong>in</strong>g stand-alone devices provid<strong>in</strong>gservices, consider pr<strong>in</strong>t<strong>in</strong>g. To pr<strong>in</strong>t a document from a mobile device, the user mustdiscover the near<strong>by</strong> pr<strong>in</strong>ters and pr<strong>in</strong>t the document on one selected pr<strong>in</strong>ter. Pr<strong>in</strong>terdiscovery is a two-step process: the user broadcasts a pr<strong>in</strong>ter discovery request via anomnihandle <strong>in</strong>vocation; then each pr<strong>in</strong>ter sends its own unihandle back to the user viaa unihandle <strong>in</strong>vocation on the user. To pr<strong>in</strong>t the document, the user does an <strong>in</strong>vocationon the selected pr<strong>in</strong>ter's unihandle.Specifically, each pr<strong>in</strong>ter has a pr<strong>in</strong>t service object that implements this <strong>in</strong>terface:public <strong>in</strong>terface Pr<strong>in</strong>tService {public void pr<strong>in</strong>t(Document doc);}The pr<strong>in</strong>ter exports its pr<strong>in</strong>t service object to the M2MI layer and obta<strong>in</strong>s a unihandleattached to the object. The pr<strong>in</strong>ter is now prepared to process document pr<strong>in</strong>t<strong>in</strong>grequests. To discover pr<strong>in</strong>ters, there are two pr<strong>in</strong>t discovery <strong>in</strong>terfaces:public <strong>in</strong>terface Pr<strong>in</strong>tDiscovery {public void request(Pr<strong>in</strong>tClient client);}public <strong>in</strong>terface Pr<strong>in</strong>tClient {public void report(Pr<strong>in</strong>tService pr<strong>in</strong>ter,Str<strong>in</strong>g name);}The client pr<strong>in</strong>t<strong>in</strong>g application exports a pr<strong>in</strong>t client object implement<strong>in</strong>g <strong>in</strong>terfacePr<strong>in</strong>tClient to the M2MI layer and obta<strong>in</strong>s a unihandle attached to the object.The application also obta<strong>in</strong>s from the M2MI layer an omnihandle for <strong>in</strong>terfacePr<strong>in</strong>tDiscovery. The application is now prepared to make pr<strong>in</strong>t discovery requestsand process pr<strong>in</strong>t discovery reports.Each pr<strong>in</strong>ter exports a pr<strong>in</strong>t discovery object implement<strong>in</strong>g <strong>in</strong>terface Pr<strong>in</strong>tDiscoveryto the M2MI layer. The pr<strong>in</strong>ter is now prepared to process pr<strong>in</strong>t discoveryrequests and generate pr<strong>in</strong>t discovery reportsThe application first callspr<strong>in</strong>tDiscovery.request(theClient);on an omnihandle for <strong>in</strong>terface Pr<strong>in</strong>tDiscovery, pass<strong>in</strong>g <strong>in</strong> the unihandle to itsown pr<strong>in</strong>t client object. S<strong>in</strong>ce it is <strong>in</strong>voked on an omnihandle, this call goes to all thepr<strong>in</strong>ters. The application now waits for pr<strong>in</strong>t discovery reports.Each pr<strong>in</strong>ter's request method callstheClient.report(thePr<strong>in</strong>ter,"Pr<strong>in</strong>ter Name");The method is <strong>in</strong>voked on the pr<strong>in</strong>t client unihandle passed <strong>in</strong> as an argument. Themethod call arguments are the unihandle to the pr<strong>in</strong>ter's pr<strong>in</strong>t service object and thename of the pr<strong>in</strong>ter. S<strong>in</strong>ce it is <strong>in</strong>voked on a unihandle, this call goes just to the re-


170 H.-P. Bischof, A. Kam<strong>in</strong>sky, and J. B<strong>in</strong>derquest<strong>in</strong>g client pr<strong>in</strong>t<strong>in</strong>g application, not to any other pr<strong>in</strong>t clients that may be present.After execut<strong>in</strong>g all the report <strong>in</strong>vocations, the pr<strong>in</strong>t<strong>in</strong>g application knows the name ofeach available pr<strong>in</strong>ter and has a unihandle for submitt<strong>in</strong>g jobs to each pr<strong>in</strong>ter.F<strong>in</strong>ally, after ask<strong>in</strong>g the user to select one of the pr<strong>in</strong>ters, the application calls:c_Pr<strong>in</strong>ter.pr<strong>in</strong>t(theDocument);where c_Pr<strong>in</strong>ter is the selected pr<strong>in</strong>ter's unihandle as previously passed to thereport method. S<strong>in</strong>ce it is <strong>in</strong>voked on a unihandle, this call goes just to the selectedpr<strong>in</strong>ter, not the other pr<strong>in</strong>ters. The pr<strong>in</strong>ter proceeds to pr<strong>in</strong>t the document passed tothe pr<strong>in</strong>t method.Clearly, this <strong>in</strong>vocation pattern of broadcast discovery request - discovery responses- service usage can apply to any service, not just pr<strong>in</strong>t<strong>in</strong>g. It is even possibleto def<strong>in</strong>e a generic service discovery <strong>in</strong>terface that can be used to f<strong>in</strong>d objects thatimplement any <strong>in</strong>terface, the desired <strong>in</strong>terface be<strong>in</strong>g specified as a parameter of thediscovery method <strong>in</strong>vocation.M2MI ArchitectureOur <strong>in</strong>itial work with M2MI has focused on networked collaborative systems. In thisenvironment of ad hoc networks of proximal mobile wireless devices, M2MI is layeredon top of a new network protocol, M2MP. We have implemented <strong>in</strong>itial versionsof M2MP and M2MI <strong>in</strong> Java. Are detailed description of the design and architecturecan be found at [4].M2MI SecurityProvid<strong>in</strong>g security with<strong>in</strong> M2MI-based systems is an area of current development.We have identified these general security requirements:• Confidentiality - Intruders who are not part of a collaborative system must not beable to understand the contents of the M2MI <strong>in</strong>vocations.• Participant authentication - Intruders who are not authorized to participate <strong>in</strong> acollaborative system must not be able to perform M2MI <strong>in</strong>vocations <strong>in</strong> that system.• Service authentication - Intruders must not be able to masquerade as legitimateparticipants <strong>in</strong> a collaborative system and accept M2MI <strong>in</strong>vocations. For example,a client must be assured that a service claim<strong>in</strong>g to be a certa<strong>in</strong> pr<strong>in</strong>ter really is thepr<strong>in</strong>ter that is go<strong>in</strong>g to pr<strong>in</strong>t the client's job and not some <strong>in</strong>truder.While exist<strong>in</strong>g techniques for achiev<strong>in</strong>g confidentiality and authentication work well<strong>in</strong> an environment of fixed hosts, wired networks, these techniques will not work well<strong>in</strong> an environment of mobile devices, wireless networks, and no central servers.A decentralized key management is necessary n order to achieve the security requirements.


A New Framework for Build<strong>in</strong>g Secure Collaborative Systems 171Decentralized Keymanagement <strong>in</strong> Ad Hoc NetworkdState of the ArtKey management has been the thrust of several research <strong>in</strong>itiatives <strong>in</strong> the ad hocnetwork<strong>in</strong>g doma<strong>in</strong> (e.g., [1, 6] et al). Each of these approaches seeks to establish apublic key <strong>in</strong>frastructure with<strong>in</strong> the constra<strong>in</strong>ts of ad hoc networks; each approach isdiscussed below.“Secur<strong>in</strong>g Ad Hoc Networks” [10] was one of the first notable publications to proposea public key management service for ad hoc networks. The service itself encapsulatesa public/private key pair K/k. The private key, k, is used to sign other nodes'public keys; the public key, K, is used to verify the signature. The service employs a(n, t+1) threshold scheme to distribute the private key and the digital sign<strong>in</strong>g processamong n nodes. Each of the n nodes is denoted as a server node, as it has a specialrole <strong>in</strong> the sign<strong>in</strong>g service. Comb<strong>in</strong>er nodes - which may be a subset of the servernodes or altogether different nodes - are also required to comb<strong>in</strong>e each server's partialsignature. For example, to sign a certificate, each of the n server nodes must generatea partial signature us<strong>in</strong>g its share of the private (k 1, k 2, … k n) to compute a partialsignature of the certificate. Once generated, each server node sends its partial signatureto the comb<strong>in</strong>er; the comb<strong>in</strong>er then computes the entire signature. To its credit[10] was quite progressive at its <strong>in</strong>ception, as its design is largely proactive andcapable of handl<strong>in</strong>g a dynamic network state. Nonetheless, the service has remnantsof its wired predecessor, namely, a trusted authority, and specialized server and comb<strong>in</strong>ernodes. Although the threshold scheme employed allows t < n servers to becompromised without sacrific<strong>in</strong>g the service, its largely centralized approachencapsulates relatively few po<strong>in</strong>ts of failure and attack.“Provid<strong>in</strong>g Robust and Ubiquitous Security Support for Ad Hoc Networks [6] presentsa natural extension to [1], where<strong>in</strong> the sign<strong>in</strong>g service is distributed to any noden the network. For example, if a network member requires a certificate, it need onlybe <strong>in</strong> the proximity of any t+1 nodes. The service is otherwise similar to [6]. Despitethe improved distribution, [6] still requires a trusted party at <strong>in</strong>itialization. Further,because any node <strong>in</strong> the network may participate <strong>in</strong> the shar<strong>in</strong>g, a malicious nodemay masquerade as t+1 bogus nodes and reconstruct the private key.More recently, Hubaux et al have proposed a self organiz<strong>in</strong>g public key <strong>in</strong>frastructure<strong>in</strong> [1]. Unlike the previous two publications, [1] does not require a trusted authorityor any specialized nodes; <strong>in</strong>stead, each node issues its own certificates to othernodes. Each node ma<strong>in</strong>ta<strong>in</strong>s a limited repository of other nodes' certificates. When anode wishes to validate a certificate of another node, the nodes comb<strong>in</strong>e their certificaterepositories; the validat<strong>in</strong>g node then exam<strong>in</strong>es the merged certificate repositoryfor falsified certificates. If none are found, the certificate is accepted; otherwise it isrejected. The primary drawback of [1] is its <strong>in</strong>itialization time. In long-lived ad hocnetworks, such overhead may be admissable; it is likely to be prohibitive <strong>in</strong> moretransient sett<strong>in</strong>gs.Although each of the above paradigms is effective <strong>in</strong> its own right, they are allbased on a common assumption, namely, po<strong>in</strong>t-to-po<strong>in</strong>t communication. Public key<strong>in</strong>frastructures enable nodes with authentic public encryption keys that they may useto establish secure communication with one another. However, many ad hoc networksare collaborative, many-to-many environments. In these sett<strong>in</strong>gs, public key cryptographyis computationally <strong>in</strong>tensive, as each group message must be encrypted n-1


172 H.-P. Bischof, A. Kam<strong>in</strong>sky, and J. B<strong>in</strong>dertimes. Group key management paradigms which provide a shared symmetric key thatis shared among all group members, have been used throughout the wired network<strong>in</strong>gdoma<strong>in</strong> to secure broadcast and many-to-many communication environments; however,very few attempts have been made to adapt group key management <strong>in</strong>frastructuresto an ad hoc sett<strong>in</strong>g.Dom<strong>in</strong>ant group key management paradigms <strong>in</strong>clude the well-known CLIQUESproject [8], Kim et al [5], and several others. Each of these protocols is based on thegeneralized Diffie-Hellman problem, which requires every network member to contributeto the generation of the shared group key. Because they were developed forwired environments, many of these approaches require po<strong>in</strong>t-to-po<strong>in</strong>t and broadcastmediums, synchronous messag<strong>in</strong>g, and static network topologies. Unfortunately, thewireless, amorphous, transient, many-to-many nature of ad hoc networks precludesmany of the assumptions on which the above protocols were developed. We, therefore,<strong>in</strong>troduce a new approach to key management that can effectively functionwith<strong>in</strong> the constra<strong>in</strong>ts of an ad hoc network environment.Look<strong>in</strong>g ForwardThe ad hoc network environment we envision is transient, dynamic <strong>in</strong> structure andmembership, proximal, and broadcast-based. We also assume that network nodeswish to collaborate, that is, our primary goal is to ensure secure many-to-many communication.As a result, our paradigm is fully decentralized (i.e., it lacks server orotherwise specialized nodes), lightweight, and best-suited for small, spontaneousnetworks. The first protocol we present is not authenticated; the second is an extensionof the first that <strong>in</strong>cludes authentication mechanisms.The nucleus of our first protocol is a tuple-like entity, <strong>in</strong>spired <strong>by</strong> Gelerntner's tuples<strong>in</strong> [2], that is effectively a hash table shared among all members of the group.Each member of the group has an entry <strong>in</strong> the hash table, which <strong>in</strong>cludes that member'scontribution to the group key.The follow<strong>in</strong>g atomic operations may be performed on the tuple:• take() - removes the tuple from the space, such that no other group member maymodify its contents.• read() - reads the current contents of the tuple• write() - writes the tuple <strong>in</strong>to the space, overwrit<strong>in</strong>g the previous tupleAlthough the tuple spaces are often implemented as a centrally-based service, thetuples used <strong>in</strong> this context are fully distributed: each member hosts its own entry <strong>in</strong>the tuple. Nodes may host more than one entry if replication is desired <strong>in</strong> the <strong>in</strong>terestof availability.Group GenesisGroup genesis requires two or more parties to be present.1. Group members agree on a cyclic group, G, of order q, and a generator, α <strong>in</strong> G;each member then chooses a secret share, N i∈ G.2. The first member, M 1, <strong>in</strong>stantiates a Tuple Space and places a new tuple <strong>in</strong> thespace. The tuple <strong>in</strong>itially conta<strong>in</strong>s M i's contribution and the current card<strong>in</strong>al value.M ithen sends a broadcast message to the group stat<strong>in</strong>g that tuple has been created.


A New Framework for Build<strong>in</strong>g Secure Collaborative Systems 1733. Upon receipt of the broadcast message, each member attempts to remove the tuplefrom the space <strong>in</strong> order to add its contribution. Because take() request will withdrawthe tuple from the space; the other take() will block until the tuple is returnedto the space. The member who receives the tuple then adds an entry <strong>in</strong> the tuplefor itself and updates all exist<strong>in</strong>g <strong>in</strong>termediate values and the card<strong>in</strong>al value. Thisstep is repeated until M 2… M n-1have written their contributions <strong>in</strong>to the tuple.4. The last member of the group has special role <strong>in</strong> the key generation process. Thelast member is not pre-determ<strong>in</strong>ed; it is simply the last member to send a take() request.M nfirst performs a take() operation on the tuple. It then exponentiates each<strong>in</strong>termediate value <strong>in</strong> the tuple with its secret exponent, Sn, and adds <strong>in</strong> an <strong>in</strong>termediatevalue for itself. Unlike its predecessors, M ndoes not update the card<strong>in</strong>alvalue, as the f<strong>in</strong>al card<strong>in</strong>al value is the group key. Instead, it writes the tuple back<strong>in</strong>to the space with the previous card<strong>in</strong>al value and the updated <strong>in</strong>termediate values.Mn then sends a broadcast message to the group, which <strong>in</strong>forms them of theterm<strong>in</strong>ation of the key generation phase.Upon receipt of the broadcast message, each member read()s its <strong>in</strong>termediate valueand uses it to compute the group key.Member Addition – jo<strong>in</strong>()A jo<strong>in</strong>() operation denotes the addition of a s<strong>in</strong>gle group member. Semantics for jo<strong>in</strong>()entail a modification of the group key, such that the new member's share is <strong>in</strong>cluded<strong>in</strong> the group key. The steps required for jo<strong>in</strong>() follow.1. M n+1take()s the tuple out of the space, adds its <strong>in</strong>termediate value, updates eachexist<strong>in</strong>g <strong>in</strong>termediate values, and write()s the tuple back <strong>in</strong>to the space.2. M GCperforms a take() on the tuple, updates the card<strong>in</strong>al value, write()s the tupleback <strong>in</strong>to the space, and notifies all group members that the key generation is complete.Follow<strong>in</strong>g a jo<strong>in</strong>() operation, the new member becomes new group controller (i.e.,M n+1= M GC).By default, jo<strong>in</strong> does not ensure forward or backward secrecy. In many scenarios,this may be admissable; however, a simple extension to the jo<strong>in</strong> operation can ensureforward and backward secrecy. The revised protocol requires the exist<strong>in</strong>g group controller,M n, factor its secret, S nout of the exist<strong>in</strong>g card<strong>in</strong>al and <strong>in</strong>termediate values,choose a new secret, S n, and exponentiate each <strong>in</strong>termediate value with it.Member Removal - leave()Leave entails the removal of a group member's contribution to the group key, there<strong>by</strong>prohibit<strong>in</strong>g it from decrypt<strong>in</strong>g subsequent group messages. The follow<strong>in</strong>g protocolassumes that the departure is voluntary. If the departure is not voluntary, the first stepis clearly omitted, however, the excluded member is still unable to derive the groupkey.1. The depart<strong>in</strong>g member, M p, factors its contribution out of each entry <strong>in</strong> the tuple.2. The group controller, M GC, chooses a new secret S GCand exponentiates each entry<strong>in</strong> the tuple with it.


174 H.-P. Bischof, A. Kam<strong>in</strong>sky, and J. B<strong>in</strong>derConclusionWe present a dynamic, fault--tolerant symmetric key management system. Unlikeother key management paradigms, our approach does not require a specific order <strong>in</strong>which contributions are collected, nor does it rely on a trusted or centralized entity tocomb<strong>in</strong>e the partial keys.References1. S. Capkun, L. Buttyan, and J. Hubaux. Self-organized public-key management for mobilead hoc networks, 2002.2. D. Gelernter. Generative communication <strong>in</strong> L<strong>in</strong>da. ACM Transactions on Programm<strong>in</strong>gLanguages and Systems, 7(1):80-112, January 1985.3. Internet Eng<strong>in</strong>eer<strong>in</strong>g Task Force. IP Rout<strong>in</strong>g for Wireless/Mobile Hosts (mobileip) Work<strong>in</strong>gGroup. http://www.ietf.org/html.charters/mobileip-charter.html.4. A. Kam<strong>in</strong>sky, Hans-Peter Bischof. Many-to-Many Invocation: A new object oriented paradigmfor ad hoc collaborative systems. 17th Annual ACM Conference on Object OrientedProgramm<strong>in</strong>g Systems, Languages, and Applications (OOPSLA 2002), Onward! track, November2002, to appear. Prepr<strong>in</strong>t:http://www.cs.rit.edu/~anh<strong>in</strong>ga/publications/publications.shtml5. Yongdae Kim, Adrian Perrig, and Gene Tsudik. Simple and fault-tolerant key agreement fordynamic collaborative groups. In Proceed<strong>in</strong>gs of the 7th ACM conference on <strong>Computer</strong>and communications security, pages 235244, 20006. H. Luo and S. Lu. Ubiquitous and robust authentication services for ad hoc wireless networks,2000.7. Michael Ste<strong>in</strong>er, Gene Tsudik, and Michael Waidner. CLIQUES: A new approach to groupkey agreement. In Proceed<strong>in</strong>gs of the 18th International Conference on Distributed Comput<strong>in</strong>gSystems (ICDCS98), pages 380387, Amsterdam, 1998. IEEE <strong>Computer</strong> Society Press.8. Jefferson S, Tuttle. Security <strong>in</strong> an Ad Hoc Network us<strong>in</strong>g Many-to-Many Invocation,http://www.cs.rit.edu/~jst17349. A. Wollrath, R. Riggs, and J. Waldo. A distributed object model for the Java system. Comput<strong>in</strong>gSystems, 9(4):265-290, Fall 1996.10. S.-M. Yoo and Z.-H. Zhou. All-to-all communication <strong>in</strong> wireless ad hoc networks. In Proceed<strong>in</strong>gsof the 39 th Annual ACM Southeast Conference, pages 180-181, March 2001.http://webster.cs.uga.edu/~jam/acm-se/review/abstract/syoo.ps.11. Lidong Zhou and Zygmunt J. Haas. Secur<strong>in</strong>g ad hoc networks. IEEE Network, 13(6):2430,1999.


Comput<strong>in</strong>g 2-Hop Neighborhoods<strong>in</strong> Ad Hoc Wireless NetworksGruia Cal<strong>in</strong>escuDepartment of <strong>Computer</strong> <strong>Science</strong>, Ill<strong>in</strong>ois Institute of Technology, Chicago, IL 60616cal<strong>in</strong>esc@iit.eduAbstract. We present efficient distributed algorithms for comput<strong>in</strong>g 2-hop neighborhoods <strong>in</strong> Ad Hoc Wireless Networks. The knowledge of the2-hop neighborhood is assumed <strong>in</strong> many protocols and algorithms forrout<strong>in</strong>g, cluster<strong>in</strong>g, and distributed channel assignment, but no efficientdistributed algorithms for comput<strong>in</strong>g the 2-hop neighborhoods were previouslypublished.The problem is nontrivial, as the graphs <strong>in</strong>duced <strong>by</strong> ad-hoc wireless networkscan be dense. We employ the broadcast nature of the wirelessnetworks to obta<strong>in</strong> a distributed algorithm <strong>in</strong> which every node ga<strong>in</strong>sknowledge of its 2-hop neighborhood us<strong>in</strong>g a total of O(n) messages,where n is the total number of nodes <strong>in</strong> the network, and each messagehas O(log n) bits, which we assume is enough to encode the ID andthe geographic position of a node. Our algorithm operates <strong>in</strong> an asynchronousenvironment, and makes use of the geographic position of thenodes.A more complicated algorithm achieves the same communication boundswhen geographical positions are not available, but nodes are capable ofevaluat<strong>in</strong>g the distance to neighbor<strong>in</strong>g nodes or the angle of signal arrival.We also discuss updat<strong>in</strong>g the knowledge of 2-hop neighborhoods whennodes jo<strong>in</strong> or leave the network.1 IntroductionWireless ad hoc networks can be flexibly and quickly deployed for many applicationssuch as automated battlefield, search and rescue, and disaster relief.Unlike wired networks or cellular networks, no physical backbone <strong>in</strong>frastructureis <strong>in</strong>stalled <strong>in</strong> wireless ad hoc networks. A communication session is achievedeither through a s<strong>in</strong>gle-hop radio transmission if the communication parties areclose enough, or through relay<strong>in</strong>g <strong>by</strong> <strong>in</strong>termediate nodes otherwise.In this paper, we assume that all nodes <strong>in</strong> a wireless ad hoc network aredistributed <strong>in</strong> a two-dimensional plane and have an equal maximum transmissionrange of one unit. The topology of such wireless ad hoc network can be modeledas a unit-disk graph, or UDG (see [11] for many <strong>in</strong>terest<strong>in</strong>g properties of unitdiskgraphs), a geometric graph <strong>in</strong> which there is a l<strong>in</strong>k between two nodes ifand only if their distance is at most one.The 1-hop neighborhood of a node v (denoted <strong>by</strong> N 1 (v)) is simply the setof nodes adjacent to it <strong>in</strong> the UDG. We use N 2 (v) to denote the set of nodesS. Pierre, M. Barbeau, and E. Kranakis (Eds.): ADHOC-NOW 2003, LNCS <strong>2865</strong>, pp. 175–186, 2003.c○ Spr<strong>in</strong>ger-Verlag Berl<strong>in</strong> Heidelberg 2003


176 G. Cal<strong>in</strong>escuof the UDG 2-hops away from v. The 2-hop neighborhood of v is the bipartitegraph with node set N 1 (v) ∪ N 2 (v) <strong>in</strong> which all the l<strong>in</strong>ks of the UDG with oneendpo<strong>in</strong>t <strong>in</strong> N 1 (v) and the other endpo<strong>in</strong>t <strong>in</strong> N 2 (v) are <strong>in</strong>cluded.Knowledge of the 2-hop neighborhoods is assumed <strong>in</strong> many distributed algorithmand protocols such as construct<strong>in</strong>g structures [24,6], improved rout<strong>in</strong>g[20], broadcast<strong>in</strong>g [9], and channel assignment [3]. The clusters used for channelcontrol typically have diameter at most two [19]. The knowledge of the setof 2-hop neighbors is helpful <strong>in</strong> frequency assignment to avoid secondary <strong>in</strong>terference.Also distributed algorithms for L(2, 1)-Label<strong>in</strong>g ([12,8,10]) can use the<strong>in</strong>formation about 2-hop neighborhoods stored <strong>by</strong> every node. Knowledge of the2-hop neighborhood can be used for efficient computation of multipo<strong>in</strong>t relays,used for example <strong>in</strong> [14].Our distributed algorithms operate <strong>in</strong> an asynchronous environment, and weuse the number of messages as the measure of the efficiency of the algorithm. Inour model a message can hold the ID of a node, the geographical position of anode, and O(log n) bits, where n is the total number of nodes <strong>in</strong> the network.Concentrat<strong>in</strong>g on the number and the length of the messages is justified <strong>by</strong>the limited resources available to wireless nodes. We assume nodes have O(n)memory available.In this model, comput<strong>in</strong>g the set of 1-hop neighbors with O(n) messagesis trivial: every node broadcasts a message announc<strong>in</strong>g its ID. One can easilycompute the 2-hop neighborhood with O(n) messages of size ∆ log n each, where∆ is the maximum number of 1-hop neighnors. But we <strong>in</strong>sist on messages ofsize O(log n) each, and therefore, as UDGs can be dense, comput<strong>in</strong>g the 2-hopneighborhood is not trivial.The broadcast nature of the communication <strong>in</strong> ad hoc wireless networks ishowever very useful when comput<strong>in</strong>g local <strong>in</strong>formation. To our knowledge nodistributed algorithm for comput<strong>in</strong>g 2-hop neighborhoods has been previouslyproposed and analyzed.First we assume that each static wireless node knows its position <strong>in</strong>formation,either through a low-power Global Position System (GPS) receiver or throughsome other ways. Then to construct the 2-hop neighborhoods it is enough toknow the IDs and positions of the 1-hop and 2-hop neighbors. With these assumptions,we present a simple distributed algorithm which allows every node tocompute the positions of its 2-hop neighbors. The total number of O(log n)-bitmessages of the algorithm is O(n).Second, we assume that position <strong>in</strong>formation is not available, but every twoadjacent nodes are capable of estimat<strong>in</strong>g their pairwise distance. Prob<strong>in</strong>g - lower<strong>in</strong>gthe transmission power over an <strong>in</strong>terval of time - is one way which allowsthe computation of pairwise distances. A detailed discussion of location systemsappears <strong>in</strong> [13]. Under this assumption, we present a distributed algorithmwhich allows every node to compute its 2-hop neighborhood. The total numberof O(log n)-bit messages of the algorithm is O(n). The algorithm is basedon triangulation and can be immediatly updated to work when the angle-of-


Comput<strong>in</strong>g 2-Hop Neighborhoods <strong>in</strong> Ad Hoc Wireless Networks 177arrival <strong>in</strong>formation is available (an assumption justified <strong>in</strong> [18] or [15]) <strong>in</strong>steadof pairwise distances.Our approach is based on the specific connected dom<strong>in</strong>at<strong>in</strong>g set <strong>in</strong>troduced<strong>by</strong> Alzoubi, Wan, and Frieder [2,21]. This connected dom<strong>in</strong>at<strong>in</strong>g set is based ona maximal <strong>in</strong>dependent set (MIS), whose role <strong>in</strong> algorithms for unit-disk graphswas discovered <strong>by</strong> Marathe et. al [16]. An MIS is a dom<strong>in</strong>at<strong>in</strong>g set: every nodemust have a 1-hop neighbor <strong>in</strong> the maximal <strong>in</strong>dependent set. In our algorithm,each node uses its adjacent node(s) <strong>in</strong> the MIS to broadcast over a larger arearelevant <strong>in</strong>formation. Listen<strong>in</strong>g to the <strong>in</strong>formation about other nodes broadcast<strong>by</strong> the MIS nodes enables a node to compute its 2-hop neighborhood. There isa direct (without us<strong>in</strong>g a MIS) solution when node positions are available, butit is more complicated and requires synchronization <strong>in</strong> order to achieve O(n)messages each of size O(log n) bits.The example <strong>in</strong> Figure 1 shows that Θ(n/ log n) time is sometimes necessaryfor comput<strong>in</strong>g 2-hop neighborhoods (assum<strong>in</strong>g one “step” allows the transmissionof O(log n) bits), as the center node has to transmit Θ(n) bits to showthe existance (or non-existance) of each node on one side to the nodes on theother side. This justifies our concentration on communication complexity, andnot time complexity. And while our algorithms use heavily the nodes <strong>in</strong> the connecteddom<strong>in</strong>at<strong>in</strong>g set, the same example shows that overload<strong>in</strong>g certa<strong>in</strong> nodesis sometimes unavoidable.Fig. 1. The center node of this disk of radius 1 must send Θ(n) bits to allow the correctcomputation of the 2-hop neighborhoodsWe also describe a straightforward procedure of updat<strong>in</strong>g the 2-hop neighborhoodswhen nodes jo<strong>in</strong> or leave the network. When leav<strong>in</strong>g the network, thecommunication cost is O(log n) bits. When jo<strong>in</strong><strong>in</strong>g the network, the number ofmessages is bounded <strong>by</strong> a small constant times the number of nodes <strong>in</strong> the 2-hopneighborhood of the new node.The paper is organized as follows. The next section clarifies the notationand expla<strong>in</strong>s the properties of the connected dom<strong>in</strong>at<strong>in</strong>g set our algorithms use.


178 G. Cal<strong>in</strong>escuSection 3 describe the algorithm for the situation when geographic position isavailable. Section 4 describes the generalization of the algorithm to the situationwhen only pairwise distance <strong>in</strong> between adjacent nodes is available. Section 5 describesthe recomputation of 2-hop neighborhoods due to changes <strong>in</strong> the networkconfiguration. We conclude with Section 6.2 Prelim<strong>in</strong>ariesIn this paper <strong>by</strong> broadcast we understand local broadcast - a packet send <strong>by</strong> anode, and received <strong>by</strong> every other node with<strong>in</strong> the transmission range.Recently [2,21] <strong>in</strong>troduced a virtual backbone of the network, and our algorithmsmake heavy used of this virtual backbone. The next subsection quicklyreproduces their construction, and lists the important properties of the virtualbackbone.2.1 The Virtual BackboneThe virtual backbone is a connected dom<strong>in</strong>at<strong>in</strong>g set <strong>in</strong> the UDG. It is basedon a maximal <strong>in</strong>dependent set (MIS), and we call the nodes <strong>in</strong> the maximal<strong>in</strong>dependent set MIS nodes. MIS nodes cannot be 1 hop away; if two MIS nodesare two or three hops away, we call them virtually-adjacent. One or two connectornodes are used to establish a path correspond<strong>in</strong>g to a pair of virtually-adjacentMIS nodes. A node can participate as a connector for several pairs of virtuallyadjacentMIS nodes. Only the l<strong>in</strong>ks <strong>in</strong> between a connector node and the MISnodes it connects, or <strong>in</strong> between two connector nodes which together establishthe path correspond<strong>in</strong>g to a pair of virtually-adjacent MIS nodes are added tothe virtual backbone.In [2,21] it is shown how the virtual backbone (<strong>in</strong>clud<strong>in</strong>g add<strong>in</strong>g the connectornodes) can be constructed distributely with O(n) messages, where the messagesize is O(log n) bits. They also show how to ma<strong>in</strong>ta<strong>in</strong> the virtual backbone whenthe topology of the network changes.Wan et. al. [2,21] proved that the virtual backbone is connected. Us<strong>in</strong>g an areaargument, [2,21] proved that with<strong>in</strong> three hops of an MIS node there could be atmost 47 MIS nodes, and therefore the maximum degree of the virtual backboneis bounded <strong>by</strong> a constant we call ∆. Please refer to Figure 2 for <strong>in</strong>tuition on thevirtual backbone described above.It was first proved <strong>in</strong> [16] that the size of any maximal <strong>in</strong>dependent set isat most five times the m<strong>in</strong>imum dom<strong>in</strong>at<strong>in</strong>g set <strong>in</strong> the UDG, as <strong>in</strong> fact for anynode x can have at most five neighbors <strong>in</strong> an MIS. Alzoubi et al. [2,21] noticedthat their virtual backbone is also with<strong>in</strong> a constant the size of the m<strong>in</strong>imumconnected dom<strong>in</strong>at<strong>in</strong>g set.In addition, it is immediate that the virtual backbone of [2,21], together withl<strong>in</strong>ks from every node to an MIS node adjacent to it, is a hop-spanner. Precisely,for every path <strong>in</strong> the UDG, there is a path on the virtual backbone with at mostthree times as many l<strong>in</strong>ks from an MIS node adjacent to the orig<strong>in</strong> of the path


Comput<strong>in</strong>g 2-Hop Neighborhoods <strong>in</strong> Ad Hoc Wireless Networks 179Fig. 2. An illustration of the virtual backbone of Alzoubi, Wan, and Frieder. The solidround nodes are the MIS node, which form a dom<strong>in</strong>at<strong>in</strong>g set. Two virtually-adjacentMIS nodes are connected <strong>by</strong> paths of length at most three through connector nodes -the empty t<strong>in</strong>y circles <strong>in</strong> the figure. Nodes not <strong>in</strong> the virtual backbone are small solidsquares <strong>in</strong> the figureto an MIS node adjacent to the dest<strong>in</strong>ation of the path. This fact was noticed <strong>by</strong>Alzoubi [1], and <strong>by</strong> Wang and Li [22], which also planarize the virtual backbonewhile keep<strong>in</strong>g all its attractive properties.3 Geographic Position AvailableIn this section we describe the distributed algorithm which allows every nodeto construct the list of its 2-hop neighbors, assum<strong>in</strong>g every node knows its geographicalposition. With this <strong>in</strong>formation, every node can also easily computethe l<strong>in</strong>ks between its 1-hop and 2-hop neighbors. Our algorithm is described <strong>in</strong>the simplest version, and we do not try to optimize the constant hidden <strong>in</strong> theO notation.We start from the moment the virtual backbone is already constructed, andevery node knows the ID and the position of its neighbors. The idea of thealgorithm is for every node to efficiently announce its ID and position to asubset of nodes which <strong>in</strong>cludes its 2-hop neighbors.The responsibility for announc<strong>in</strong>g the ID and position of a node v is taken <strong>by</strong>the MIS nodes adjacent to v. Each such MIS node assembles a packet conta<strong>in</strong><strong>in</strong>g:< ID, position, counter >, with the ID and position of v, and a counter variablebe<strong>in</strong>g set to 2. The MIS node then broadcasts the packet.A connector node is used to establish a l<strong>in</strong>k <strong>in</strong> between several pairs ofvirtually-adjacent MIS nodes, and will not retransmit packets which do nottravel <strong>in</strong> between these pairs of MIS nodes. The connector node will rebroadcastpackets with nonzero counter orig<strong>in</strong>ated <strong>by</strong> one of the nodes <strong>in</strong> a pair of virtuallyadjacentMIS nodes, thus mak<strong>in</strong>g sure the packet advances towards the otherMIS node <strong>in</strong> the pair. Recall that the path <strong>in</strong> between a pair of virtually-adjacentMIS nodes has one or two connector nodes.


180 G. Cal<strong>in</strong>escuWhen receiv<strong>in</strong>g a packet of type < ID, position, counter >, an MIS nodechecks whether this is the first message with this ID, and if yes decreases thecounter variable and rebroadcasts the packet.A node listens to the packets broadcasted <strong>by</strong> all the adjacent MIS nodes (hereit is convenient to assume a MIS is adjacent to itself), and, us<strong>in</strong>g its <strong>in</strong>ternallist of 1-hop neighbors, checks if the node announced <strong>in</strong> the packet is a 2-hopneighbor or not - thus construct<strong>in</strong>g the list of 2-hop neighbors.Theorem 1. When f<strong>in</strong>ished, the algorithm described above correctly computesthe 2-hop neighborhood for every node <strong>in</strong> the network, and uses O(n) messagesof size O(log n) each.Proof. The fact that the virtual backbone is a bounded-degree hop-spanner essentiallyimplies the correctness of the algorithm. The precise argument is asfollows. Assume nodes v and u share a neighbor x, and let ¯v, ū, and ¯x be nodes<strong>in</strong> MIS which are adjacent to v, u, and x. Then ¯v creates a packet with the IDand position of v, and with its counter set to 2. As ¯v and ¯x are virtually-adjacent,¯x will receive the packet and retransmit it with counter set to 1. As ¯x and ū arevirtually-adjacent, ū will also broadcast the packet, and therefore u f<strong>in</strong>ds outthe ID and position of v.Regard<strong>in</strong>g the number of messages, we count the packets announc<strong>in</strong>g the IDand position of x. Such packets are be<strong>in</strong>g sent <strong>by</strong> S 1 , the MIS nodes adjacentto x, and we recall that |S 1 |≤5. They are also sent <strong>by</strong> S 2 , the MIS nodesvirtually-adjacent to S 1 ,<strong>by</strong>S 3 , the MIS nodes virtually-adjacent to S 2 , and<strong>by</strong> the connector nodes <strong>in</strong> between pairs of virtually-adjacent MIS nodes <strong>in</strong>sideS 1 ∪ S 2 , and <strong>by</strong> the connector nodes <strong>in</strong> between virtually-adjacent MIS nodes ofS 2 and S 3 . Thus the total number of nodes retransmitt<strong>in</strong>g packets announc<strong>in</strong>g IDand position of x is O(∆ 2 ). As ∆, the maximum degree of the virtual backboneis constant, the total number of messages is O(n).⊓⊔We remark that with the counter of a packet be<strong>in</strong>g <strong>in</strong>itially set to k (anddecreased <strong>by</strong> one whenever a MIS node retransmits), the same argument asabove implies that with O(∆ k ) messages every node can compute its k-hopneighborhoods.4 Pairwise Distances AvailableIn this section we assume that neighbor<strong>in</strong>g nodes can compute their pairwisedistance, but are not aware of their precise geographical position.Our approach is based on the virtual backbone used before and rigid pieces,which we def<strong>in</strong>e as subgraphs conta<strong>in</strong><strong>in</strong>g one MIS node and a subset of its neighborssuch that a system of coord<strong>in</strong>ates can be locally established and <strong>in</strong> whichthe position of every node of the rigid piece is completely def<strong>in</strong>ed. A theory ofgeometric rigidity is well established [23]. We need only simple properties whichare easily proved below.First we describe the distributed algorithm for comput<strong>in</strong>g the rigid pieces.Before the actual construction, every node announces all the MIS nodes to whichit is adjacent, and records the <strong>in</strong>formation transmitted <strong>by</strong> all its neighbors.


Comput<strong>in</strong>g 2-Hop Neighborhoods <strong>in</strong> Ad Hoc Wireless Networks 181Every MIS node v constructs one after the other the rigid pieces <strong>in</strong> which itparticipates, and ensures these pieces are disjo<strong>in</strong>t with the exception of v. Eachsuch piece will have an ID, composed of the ID of the unique MIS which is <strong>in</strong>the piece and an <strong>in</strong>teger <strong>in</strong> between 1 and 18. Once a node is assigned to a piecetogether with v, it announces <strong>in</strong> a broadcast message the ID of the rigid pieceand its coord<strong>in</strong>ates with respect to the rigid piece.Let us describe the construction of one such rigid piece. The MIS node valways has coord<strong>in</strong>ates (0, 0) with respect to the rigid piece. If all nodes adjacentto v are <strong>in</strong> a rigid piece with v, the procedure stops. Otherwise, v selects aneighbor x which is not <strong>in</strong> a rigid piece with v, and asks x to announce itsparticipation <strong>in</strong> the rigid piece and its coord<strong>in</strong>ates with respect to the rigidpiece: (||xv||, 0). Every node y adjacent to both v and x and not yet <strong>in</strong> someother rigid piece with v, computes its coord<strong>in</strong>ates with respect to v and x basedon the length of the sides of the triangle xyv. Actually, while the first coord<strong>in</strong>ateof y is unique, the second one is not: only its absolute value can be computedexactly. If the angle ŷvx is bigger than π/3, y will not participate <strong>in</strong> the rigidpiece. If the second coord<strong>in</strong>ate of y is 0, then y participates <strong>in</strong> the piece andannounces its participation and its unique coord<strong>in</strong>ates with respect to the rigidpiece. If the angle ŷvx is at most π/3 and the second coord<strong>in</strong>ate of y is nonzero, yannounces it is will<strong>in</strong>g to participate <strong>in</strong> the piece. Node v will pick only one suchy (assum<strong>in</strong>g it exists), and announce that both of y’s coord<strong>in</strong>ates with respectto the rigid piece will be positive. See Figure 3 for <strong>in</strong>tuition. At this moment yannounces its participation <strong>in</strong> the rigid piece and its coord<strong>in</strong>ates with respect tothe rigid piece. Every node z adjacent to v, x, and y, and not yet <strong>in</strong> some otherrigid piece with v, computes its unique coord<strong>in</strong>ates with respect to the rigidpiece, and announces its participation <strong>in</strong> the rigid piece and its coord<strong>in</strong>ates.The follow<strong>in</strong>g theorem enumerates the important properties of the distributedalgorithm described above.Theorem 2. Every non-MIS node is a member of at most five rigid pieces.Every MIS node is a member of at most 18 rigid pieces. Comput<strong>in</strong>g the nodesof a rigid piece and the coord<strong>in</strong>ates with respect to the rigid piece of every nodecan be done with a number of messages bounded <strong>by</strong> a constant times the numberof nodes adjacent to the MIS node <strong>in</strong> the piece. The total number of messages(each hav<strong>in</strong>g O(log n) bits) until every node announces every piece <strong>in</strong> which itparticipates, together with its coord<strong>in</strong>ates with respect to the rigid piece, is O(n).Proof. Once we prove that a MIS node constructs at most 18 rigid pieces, therema<strong>in</strong><strong>in</strong>g assertions of the theorem follow from the description of the algorithm.Let k be the number of rigid pieces constructed and let x i be the first nodesselected <strong>by</strong> v when construct<strong>in</strong>g the i th piece. Let y i be the node picked <strong>by</strong> v asthe first node of the rigid piece with nonzero second coord<strong>in</strong>ate with respect tothe i th rigid piece, if such a node exists. If y i exists, def<strong>in</strong>e R i be the sector of theunit disk centered at v consist<strong>in</strong>g of the po<strong>in</strong>ts z with angles zvx ̂ i and ẑvy i atmost π/3. If y i does not exists, let R i be the sector of the unit disk centered at v


182 G. Cal<strong>in</strong>escuRyvxFig. 3. The unnamed nodes <strong>in</strong> the figure can jo<strong>in</strong> the rigid piece started <strong>by</strong> v, x,and y. In the system of coord<strong>in</strong>ates used, v is the orig<strong>in</strong>, x has second coord<strong>in</strong>ate0, and y has the second coord<strong>in</strong>ate positive. Notice that every node <strong>in</strong> the sectorof the disk R = R i can jo<strong>in</strong> the rigid piece and that R covers at least 1/6 oftheunit disk centered at vx’y’xjxivzyjyix"y"Fig. 4. There could be at most three sectors R k which conta<strong>in</strong> the po<strong>in</strong>t z: thefirst given <strong>by</strong> x i and y i (which are on opposite sides of the l<strong>in</strong>e vz) and thentwo sectors given <strong>by</strong> x ′ and y ′ (both above the l<strong>in</strong>e vz) and <strong>by</strong> x” and y” (bothunder the l<strong>in</strong>e vz). As shown <strong>in</strong> proof of Theorem 2, a fourth sector such as theone given <strong>by</strong> x j and y j cannot existsconsist<strong>in</strong>g of the po<strong>in</strong>ts z with angles ̂ zvx i at most π/3. Figure 3 aga<strong>in</strong> provides<strong>in</strong>tuition.We claim that any po<strong>in</strong>t z belongs to at most three sectors R i ,1≤ i ≤ k.See Figure 4 for <strong>in</strong>tuition. Indeed, if there are i


Comput<strong>in</strong>g 2-Hop Neighborhoods <strong>in</strong> Ad Hoc Wireless Networks 183If both y i and y j exist, x i and y i are on different sides of vz, and x j andy j are also on different sides of vz, then we obta<strong>in</strong> a contradiction as follow.Assum<strong>in</strong>g i.Any node receiv<strong>in</strong>g such a message evaluates whether it has neighbors <strong>in</strong> therigid piece, and if yes the node computes the set of its neighbors from the rigidpiece which are adjacent to v, based on their coord<strong>in</strong>ates with respect to therigid piece.If v has three or more neighbors <strong>in</strong> common with a rigid piece, but theyare col<strong>in</strong>iar, v cannot exactly compute its coord<strong>in</strong>ates with respect to therigid piece, but has exactly two possible value for its coord<strong>in</strong>ates. Then v asksits neighbors <strong>in</strong> MIS to announce both positions with a packet conta<strong>in</strong><strong>in</strong>g


184 G. Cal<strong>in</strong>escu< nodeID, pieceID, coord<strong>in</strong>ates 1 , coord<strong>in</strong>ates 2 , counter >. Any node y receiv<strong>in</strong>gsuch a message evaluates if it has neighbors <strong>in</strong> the rigid piece, and if yes, asabove, it can compute two sets S 1 and S 2 of nodes <strong>in</strong> the rigid piece which couldbe the common neighbors with v - assum<strong>in</strong>g v has coord<strong>in</strong>ates coord<strong>in</strong>ates 1 orcoord<strong>in</strong>ates 2 with respect to the rigid piece. At least one of S 1 and S 2 is a setof col<strong>in</strong>ear po<strong>in</strong>ts, and if both are, they co<strong>in</strong>cide. That set of col<strong>in</strong>ear po<strong>in</strong>ts isthe set of neighbors common to y and v <strong>in</strong> the rigid piece.All cases are taken care of and we conclude:Theorem 3. There is a distributed algorithm which, under the assumption thatevery node can estimate the distance to every adjacent node, computes for everynode v the set of its 2-hop neighbors N 2 (v) and the l<strong>in</strong>ks <strong>in</strong> between N 1 (v) andN 2 (v) with a total of O(n) messages each of size O(log n) bits.5 Updat<strong>in</strong>g the 2-Hop NeighborhoodsIn this section we discuss the message complexity of updat<strong>in</strong>g the 2-hop neighborhoodsdue to changes <strong>in</strong> network topology. We do not address updat<strong>in</strong>g thevirtual backbone as this was done <strong>in</strong> [2]. The proposed protocol is straightforwardand does not use the virtual backbone. We assume geographical knowledgeis available <strong>in</strong> this section.Before leav<strong>in</strong>g the network, a node u uses its knowledge to let its 2-hopneighborhs know the fact it is leav<strong>in</strong>g as described below. First the node ucomputes a maximal <strong>in</strong>dependent set (MIS) <strong>in</strong> the graph <strong>in</strong>duced <strong>by</strong> its 2-hopneighborhs. Then u computes at most one “connector” node for each MIS node.As before, MIS is a dom<strong>in</strong>at<strong>in</strong>g set, and us<strong>in</strong>g an area argument, has constantsize. Node u prepares an < ID, position, leav<strong>in</strong>g, relay > message, with its ownID and position, the fact that it is leav<strong>in</strong>g the network, and the full list of relaynodes. Each node, after receiv<strong>in</strong>g such a message, make a note that u is leav<strong>in</strong>gand updates its 2-hop neighborhood accord<strong>in</strong>gly, and, if it f<strong>in</strong>ds itself <strong>in</strong> the listof relay nodes, rebroadcast the message once.When a node v jo<strong>in</strong>s the network, it will broadcasts its ID and position.Every exist<strong>in</strong>g node which receives this message will rebroadcast the ID andposition of v. Every node y receiv<strong>in</strong>g such a message, will update its stored 2-hopneighborhood to reflect the presence of v. Ify is adjacent to v, it will broadcastits ID and position. If y is a 2-hop neighbor of v, it selects a common neighborx and asks x to relay to v the position and ID of y. The total bit complexity ofmessage is O(q log n), where q is the size of the 2-hop neighborhood of v, and itcannot be improved <strong>by</strong> more than a constant factor s<strong>in</strong>ce v must f<strong>in</strong>d out theIDs of the nodes <strong>in</strong> its 2-hop neighborhood.6 ConclusionsThe virtual backbone of Alzoubi, Wan, and Frieder [2,21] can be constructedwithout any geographical knowledge: their algorithm “operates” directly on the


Comput<strong>in</strong>g 2-Hop Neighborhoods <strong>in</strong> Ad Hoc Wireless Networks 185unit-disk graph. We need at least the distance <strong>in</strong> between any pair of adjacentnodes. Same arguments us<strong>in</strong>g rigid pieces apply when a node is able to computethe angle <strong>in</strong> between the segments to adjacent nodes. However, without any geographicalknowledge we do not know whether it is possible to compute 2-hopneighborhoods with O(n) messages each hav<strong>in</strong>g O(log n) bits. This observationraises the <strong>in</strong>terest<strong>in</strong>g question whether there are any (mean<strong>in</strong>gful) problemswhich have higher communication complexity on unit-disk graphs than on embedded(nodes aware of their geographical position) unit-disk graphs. Note thatit is NP-Hard to recognize unit-disk graphs [7].However, it follows from standard algebraic geometry results (page 542 of[17] or improved bounds <strong>in</strong> [4]) that the number of labeled unit-disk graphs of nnodes is between 2 c1n log n and 2 c2n log n , for constants c 1 and c 2 and therefore aprotocol with a total O(n log n) bits communication complexity is possible. AnO(n log n) bits communication complexity would follow from a solution to anopen problem <strong>in</strong> algebraic geometry [5]. It is worth mention<strong>in</strong>g that algebraicgeometry solutions seem to have huge runn<strong>in</strong>g time and space complexity.Our model does not account for messages lost because of <strong>in</strong>terference. Itwould be desirable to design synchronous distributed algorithms with low messagecomplexity and low time complexity <strong>in</strong> a model where messages are losteither due to signal <strong>in</strong>terference or due to node overload<strong>in</strong>g.AcknowledgmentsThe author thanks Peng-Jun Wan and Xiang-Yang Li, who <strong>in</strong>spired this paper <strong>by</strong>present<strong>in</strong>g their results. The author thanks Sougata Basu, Adrian Dumitrescu,and Peter Sanders for <strong>in</strong>sight <strong>in</strong> the issue of extend<strong>in</strong>g the results to case whengeographical knowledge is not available.References1. Khaled M. Alzoubi, “Distributed Algorithms for Connected Dom<strong>in</strong>at<strong>in</strong>g Set <strong>in</strong>Wireless Ad Hoc Networks”, Ill<strong>in</strong>ois Institute of Technology, 2002.2. Khaled M. Alzoubi, Peng-Jun Wan and Ophir Frieder, “Message-Optimal ConnectedDom<strong>in</strong>at<strong>in</strong>g Sets <strong>in</strong> Mobile Ad Hoc Networks”, <strong>in</strong> ACM MOBIHOC ’02.3. L. Bao and J. J. Garcia-Luna-Aceves, “Channel Access Schedul<strong>in</strong>g <strong>in</strong> Ad HocNetworks with Unidirectional L<strong>in</strong>ks”, 5th International Workshop on Discrete Algorithmsand Methods for Mobility, 2001, <strong>Page</strong>s 9–18.4. S. Basu “Different bounds on the different Betti numbers of semi-algebraic sets”,to appear <strong>in</strong> Discrete and Computational Geometry. Available athttp://www.math.gatech.edu/˜saugata/.5. S. Basu, R. Pollack, and M. F. Roy, Algorithms <strong>in</strong> Real Algebraic Geometry,Spr<strong>in</strong>ger-Verlag, 2003.6. V. Bharghavan and B. Das, “Rout<strong>in</strong>g <strong>in</strong> Ad Hoc Networks Us<strong>in</strong>g M<strong>in</strong>imum ConnectedDom<strong>in</strong>at<strong>in</strong>g Sets”, International Conference on Communications’97, Montreal,Canada. June 1997.


186 G. Cal<strong>in</strong>escu7. He<strong>in</strong>z Breu and David G. Kirkpatrick. “Unit disk graph recognition is NP-hard”,Computational Geometry. Theory and Applications, 9:3–24, 1998.8. T. Calamoneri and R. Petreschi, “L(2,1)-Label<strong>in</strong>g of Planar Graphs”, 5th InternationalWorkshop on Discrete Algorithms and Methods for Mobility, 2001, <strong>Page</strong>s28–33.9. G. Cal<strong>in</strong>escu, I. Mandoiu, P.-J. Wan, and A. Zelikovsky, “Select<strong>in</strong>g Forward<strong>in</strong>gNeighbors <strong>in</strong> Wireless Ad Hoc Networks”, 5th International Workshop on DiscreteAlgorithms and Methods for Mobility, 2001, <strong>Page</strong>s 34–43.10. I. Chlamtac and S. P<strong>in</strong>ter, “Distributed Nodes Organization Algorithm for ChannelAccess <strong>in</strong> a Multihop Dynamic Radio Network”, IEEE Trans. on <strong>Computer</strong>s,36(6):728–737, 1987.11. B. N. Clark, C. J. Colbourn, and D. S. Johnson, “Unit Disk Graphs”, DiscreteMathematics, 86:165–177, 1990.12. J. R. Griggs and R. K. Yeh, “Label<strong>in</strong>g Graphs with a Condition at Distance 2”,SIAM J. Disc. Math, 5:586–595, 1992.13. J. Hightower and G Borriello, “Location Systems for Ubiquitous Comput<strong>in</strong>g”,IEEE <strong>Computer</strong>, vol. 34(8), 2001, pp 57–66.14. P. Jacquet, A. Laouiti, P. M<strong>in</strong>et, and L. Viennot, “Performance analysis of OLSRmultipo<strong>in</strong>t relay flood<strong>in</strong>g <strong>in</strong> two ad hoc wireless network models”, <strong>in</strong> RSRCP,Special issue on Mobility and Internet, 2001.15. K. Krizman, T. Bieda, and T. Rappaport, “Wireless position location: fundamentals,implementation strategies, and source of error”, Veh. Tech. Conf, 1997, 919–923.16. M. V. Marathe, H. Breu, H. B. Hunt III, S. S. Ravi and D. J. Rosenkrantz, ”SimpleHeuristics for Unit Disk Graphs”, Networks, Vol. 25, 1995, pp. 59–68.17. B. Mishra, “Computational Real Algebraic Geometry” <strong>in</strong> Handbook of Discreteand Computational Geometry, J. E. Goodman and J. O’Rourke (editors), CRCPress, 1997.18. A. Nasipuri and K. Lim “A Directionality based Location Discovery Scheme forWireless Sensor Networks”, WSNA 2002.19. S. Ramanathan and M. Steenstrup, “A survey of rout<strong>in</strong>g techniques for mobilecommunication networks”, ACM/Baltzer Mobile Networks and Applications, 89–104, 1996.20. I Stojmenovic and X. L<strong>in</strong>, “Loop-free hybrid s<strong>in</strong>gle-path/flood<strong>in</strong>g rout<strong>in</strong>g algorithmswith guaranteed delivery for wireless networks”, IEEE Transactions onParallel and Distributed Systems, 12:1023–1032, 2001.21. Peng-Jun Wan, Khaled M. Alzoubi, and Ophir Frieder “Distributed Constructionof Connected Dom<strong>in</strong>at<strong>in</strong>g Set <strong>in</strong> Wireless Ad Hoc Networks”, <strong>in</strong> IEEE INFOCOM2002.22. Yu Wang and Xiang-Yang Li, “Geometric Spanners for Wireless Ad Hoc Networks”,<strong>in</strong> ICDCS 2002.23. W. Whiteley “Rigidity and Scene Analysis”, Handbook of Discrete and ComputationalGeometry, 893–916, ed. J. E. Goodman and J. O’Rourke, CRC Press, 1997.24. J. Wu and H.L. Li, “On calculat<strong>in</strong>g connected dom<strong>in</strong>at<strong>in</strong>g set for efficient rout<strong>in</strong>g<strong>in</strong> ad hoc wireless networks”, Proceed<strong>in</strong>gs of the 3rd ACM <strong>in</strong>ternational workshopon Discrete algorithms and methods for mobile comput<strong>in</strong>g and communications,1999, <strong>Page</strong>s 7–14.


Topology Control Problems under Symmetricand Asymmetric Power ThresholdsSven O. Krumke 1 , Rui Liu 2 , Errol L. Lloyd 2 , Madhav V. Marathe 3 ,Ram Ramanathan 4 , and S.S. Ravi 51 Konrad-Zuse-Zentrum für Informationstechnik, Berl<strong>in</strong> (ZIB)Takustraße 7, 14195 Berl<strong>in</strong>-Dahlem, Germanykrumke@zib.de2 University of Delaware, Newark, DE 19716{ruliu,elloyd}@cis.udel.edu3 Los Alamos National Laboratory, MS M997, Los Alamos, NM 87545marathe@lanl.gov4 Internetwork Research Department, BBN Technologies, Cambridge, MA 02138ramanath@bbn.com5 University at Albany - SUNY, Albany, NY 12222ravi@cs.albany.eduAbstract. We consider topology control problems where the goal is toassign transmission powers to the nodes of an ad hoc network so as to<strong>in</strong>duce graphs satisfy<strong>in</strong>g specific properties. The properties consideredare connectivity, bounded diameter and m<strong>in</strong>imum node degree. The optimizationobjective is to m<strong>in</strong>imize the total power assigned to nodes. Asthese problems are NP-hard <strong>in</strong> general, our focus is on develop<strong>in</strong>g approximationalgorithms with provable performance guarantees. We presentresults under both symmetric and asymmetric power threshold models.1 IntroductionIt is well known that battery power is a precious resource <strong>in</strong> ad hoc networks.Therefore, techniques for m<strong>in</strong>imiz<strong>in</strong>g the energy consumed <strong>in</strong> ad hoc networkshave assumed importance. Topology control problems arise <strong>in</strong> that context. Thegoal of such problems is to control the topology of networks through the assignmentof suitable transmission powers to nodes. Formally, such problems arespecified <strong>by</strong> requir<strong>in</strong>g the <strong>in</strong>duced network to satisfy some graph theoretic propertieswhile m<strong>in</strong>imiz<strong>in</strong>g some function of the transmission powers assigned totransceivers (nodes). Previous work <strong>in</strong> this area has considered properties suchas node and edge connectivity and optimization objectives such as m<strong>in</strong>imiz<strong>in</strong>gmaximum power and m<strong>in</strong>imiz<strong>in</strong>g total power. A summary of previous results <strong>in</strong>this area is presented <strong>in</strong> Section 3.2.In this paper, we study topology control problems for three graph properties,namely connectedness, bounded diameter and m<strong>in</strong>imum node degree (Preciseformulations of these problems are provided <strong>in</strong> Section 2.1.). Connectedness isa basic requirement for any network. Ad hoc networks with small diameters areS. Pierre, M. Barbeau, and E. Kranakis (Eds.): ADHOC-NOW 2003, LNCS <strong>2865</strong>, pp. 187–198, 2003.c○ Spr<strong>in</strong>ger-Verlag Berl<strong>in</strong> Heidelberg 2003


188 S.O. Krumke et al.desirable <strong>in</strong> practice s<strong>in</strong>ce the diameter of a network determ<strong>in</strong>es the maximumend-to-end delay for message delivery. Networks <strong>in</strong> which the degree of each nodeis at or above a certa<strong>in</strong> threshold value are useful from a reliability perspective.In such networks, the failure of a small number of nodes or l<strong>in</strong>ks is unlikelyto disconnect the network. For all of these properties, the problem of m<strong>in</strong>imiz<strong>in</strong>gthe maximum power can be solved efficiently; this follows directly from ageneral result presented <strong>in</strong> [10]. So, we consider topology control problems forthese properties under the objective of m<strong>in</strong>imiz<strong>in</strong>g total power. These problemsare NP-complete <strong>in</strong> general. The focus of this paper is therefore on develop<strong>in</strong>gapproximation algorithms with proven performance guarantees.Previous work on topology control has assumed the symmetric power thresholdmodel. In that model, the m<strong>in</strong>imum transmission power (also called thepower threshold) needed for a node x to reach a node y is assumed to beequal to the m<strong>in</strong>imum transmission power needed for y to reach x. In practice,power threshold values for two nodes x and y may be asymmetric because oftwo reasons. First, the ambient noise levels of the regions conta<strong>in</strong><strong>in</strong>g the twonodes may be different. Secondly, one of the nodes may be equipped with a directionalantenna [12] while the other node may have only an omnidirectionalantenna. Motivated <strong>by</strong> these considerations, we study topology control problemsunder the asymmetric power threshold model. Our results show (as one wouldexpect) that problems do become “harder” under the asymmetric power thresholdmodel. In particular, we show that under the asymmetric power thresholdmodel, the problem of obta<strong>in</strong><strong>in</strong>g a connected graph while m<strong>in</strong>imiz<strong>in</strong>g the totalpower cannot be approximated to with<strong>in</strong> a factor of Ω(log n), where n is thenumber of nodes, unless P = NP. We also present an approximation algorithmwith a performance guarantee of O(log n) for the problem. Under the symmetricpower threshold model, it is known that this problem is NP-hard but can beapproximated to with<strong>in</strong> a constant factor [4,8].2 Problems Considered2.1 Model and Problem FormulationWe are given a set V of transceivers (nodes). For each ordered pair (u, v)of transceivers, we are given a transmission power threshold, denoted <strong>by</strong>p(u, v), with the follow<strong>in</strong>g significance: A signal transmitted <strong>by</strong> the transceiveru can be received <strong>by</strong> v only when the transmission power of u is at least p(u, v).It is assumed that p(u, v) > 0 for all nodes u and v.We study topology control problems under both symmetric and asymmetricpower threshold models. Under the symmetric power threshold model, for eachpair of transceivers u and v, p(u, v) =p(v, u). The asymmetric threshold modelis more general. Under this model, there may be some pairs of transceivers uand v such that p(u, v) ≠ p(v, u).A power assignment is a function f : V → R + that specifies a nonnegativepower value f(v) to each transceiver v ∈ V . Two models for graphs <strong>in</strong>duced<strong>by</strong> power assignments have been considered <strong>in</strong> the literature. In this paper we


Topology Control Problems 189utilize the undirected graph model, <strong>in</strong> which the <strong>in</strong>duced graph G f (V,E f ) hasthe undirected edge {u, v} if and only if f(u) ≥ p(u, v) and f(v) ≥ p(v, u).For a power assignment f, the maximum power assigned to any node is given <strong>by</strong>max{f(v) : v ∈ V }; the total power assigned to all nodes is given <strong>by</strong> ∑ v∈V f(v).Follow<strong>in</strong>g [10], we denote each topology control problem <strong>by</strong> a triple of theform 〈M, P, O〉. In such a specification, M ∈{Dir, Undir} represents thegraph model, P represents the desired graph property and O represents the m<strong>in</strong>imizationobjective. In general, O ∈{MaxP, TotalP} (abbreviations of MaxPower and Total Power respectively). However, for all the problems considered<strong>in</strong> this paper, O = TotalP.Us<strong>in</strong>g this notation, we now def<strong>in</strong>e the ma<strong>in</strong> problems studied <strong>in</strong> this paper.1. In the 〈Undir, Diameter, TotalP〉 problem, we are given a set Vof transceivers, the power threshold values p(u, v) for each pair (u, v) oftransceivers and a diameter 1 bound D. The goal is to compute a power assignmentf such that the undirected graph G f <strong>in</strong>duced <strong>by</strong> f has diameterat most D, and the total power assigned is a m<strong>in</strong>imum among all powerassignments that <strong>in</strong>duce graphs satisfy<strong>in</strong>g the diameter constra<strong>in</strong>t.2. In the 〈Undir, Deg LB, TotalP〉 problem, we are given a set V oftransceivers, the power threshold values p(u, v) for each pair (u, v) ∈ V andan <strong>in</strong>teger ∆, where 2 ≤ ∆ ≤|V |−1. The goal is to compute a powerassignment f such that the undirected graph G f <strong>in</strong>duced <strong>by</strong> f is connected,the degree of each node <strong>in</strong> G f is at least ∆, and the total power assignedis a m<strong>in</strong>imum among all power assignments that <strong>in</strong>duce connected graphssatisfy<strong>in</strong>g the degree constra<strong>in</strong>t.3. In the 〈Undir, Connected, TotalP〉 problem, we are given a set Vof transceivers and the power threshold values p(u, v) for each pair (u, v)of transceivers. The goal is to compute a power assignment f such that theundirected graph G f <strong>in</strong>duced <strong>by</strong> f is connected and the total power assignedis a m<strong>in</strong>imum among all power assignments that <strong>in</strong>duce connected graphs.We study the 〈Undir, Diameter, TotalP〉 and 〈Undir, Deg LB, TotalP〉problems under the symmetric power threshold model. The 〈Undir, Connected,TotalP〉 problem has been studied previously under the symmetricpower threshold model [4,8]. We study it under the asymmetric threshold model(Section 5). Due to space limitations, we discuss only the results for 〈Undir, Diameter,TotalP〉 and 〈Undir, Connected, TotalP〉 problems <strong>in</strong> therema<strong>in</strong>der of this paper.The follow<strong>in</strong>g graph theoretic def<strong>in</strong>ition is used throughout this paper.Def<strong>in</strong>ition 1. Let G(V,E) be an undirected graph. An edge subgraph G ′ (V,E ′ )of G uses the same set V of nodes and a subset E ′ of the edge set E.1 The diameter of G, denoted <strong>by</strong> Dia(G), is the maximum over the lengths of shortestpaths between all pairs of nodes <strong>in</strong> G.


190 S.O. Krumke et al.2.2 Bicriteria ApproximationOur results for the diameter problem use the bicriteria approximation frameworkdeveloped <strong>in</strong> [11] for deal<strong>in</strong>g with computationally <strong>in</strong>tractable optimizationproblems <strong>in</strong>volv<strong>in</strong>g two objectives. We recall the relevant def<strong>in</strong>itions and notation.Def<strong>in</strong>ition 2. Suppose a problem Π with two m<strong>in</strong>imization objectives A and Bis posed <strong>in</strong> the follow<strong>in</strong>g manner: Given a budget constra<strong>in</strong>t on objective A, f<strong>in</strong>d asolution which m<strong>in</strong>imizes the value of objective B among all solutions satisfy<strong>in</strong>gthe budget constra<strong>in</strong>t. An (α, β)-approximation algorithm for problem Π isa polynomial time algorithm that provides for every <strong>in</strong>stance of Π a solutionsatisfy<strong>in</strong>g the follow<strong>in</strong>g two conditions.1. The solution violates the budget constra<strong>in</strong>t on objective A <strong>by</strong> a factor of atmost α.2. The value of objective B <strong>in</strong> the solution is with<strong>in</strong> a factor of at most β ofthe m<strong>in</strong>imum possible value satisfy<strong>in</strong>g the budget constra<strong>in</strong>t.We note that 〈Undir, Diameter, TotalP〉 is an example of an optimizationproblem with two objectives. In this problem, diameter of the <strong>in</strong>duced graphand total power serve as the budgeted objective (with budget D) and the m<strong>in</strong>imizationobjective respectively. Thus, an (α, β)-approximation algorithm for theproblem provides a solution where the <strong>in</strong>duced graph has diameter at most αD,and the total power assigned is with<strong>in</strong> a factor β of the m<strong>in</strong>imum total powerneeded to <strong>in</strong>duce a graph with diameter at most D.To obta<strong>in</strong> bicriteria approximation algorithms for the 〈Undir, Diameter,TotalP〉 problem, we rely on known approximation results for anotherproblem, called M<strong>in</strong>imum Cost Tree with a Diameter Constra<strong>in</strong>t(Mctdc), also <strong>in</strong>volv<strong>in</strong>g two m<strong>in</strong>imization objectives. A formal def<strong>in</strong>ition of thisproblem is as follows.M<strong>in</strong>imum Cost Tree with a Diameter Constra<strong>in</strong>t (Mctdc)Instance: A connected undirected graph G(V,E), a nonnegative weight w(e) foreach edge e ∈ E, an <strong>in</strong>teger δ ≤ n − 1.Requirement: F<strong>in</strong>d an edge subgraph T (V,E T )ofG such that T (V,E T ) is a tree,Dia(T ) ≤ δ and the total weight of the edges <strong>in</strong> E T is the smallest among allthe trees satisfy<strong>in</strong>g the diameter constra<strong>in</strong>t.Mctdc is known to be NP-hard [11]. Bicriteria approximations for this problemhave been presented <strong>in</strong> [2,9,11]. These results are used <strong>in</strong> Section 4.3 Summary of Results and Related Work3.1 Summary of ResultsThe follow<strong>in</strong>g are the ma<strong>in</strong> results presented <strong>in</strong> this paper. For all the problems,n denotes the number of transceivers <strong>in</strong> the problem <strong>in</strong>stance.


Topology Control Problems 1911. We show that if the diameter constra<strong>in</strong>t cannot be violated, the 〈Undir, Diameter,TotalP〉 problem cannot be approximated to with<strong>in</strong> an Ω(log n)factor unless P = NP. This result holds even when the diameter boundD = 2. (Note that the problem is trivial when D = 1.)2. We show that us<strong>in</strong>g any (α, β)-approximation algorithm for the Mctdcproblem, one can devise a (2α, 2(1− 1/n) β)-approximation algorithm for〈Undir, Diameter, TotalP〉 problem. This result is based on a generalframework presented <strong>in</strong> [10] for approximat<strong>in</strong>g the total power objective.Utiliz<strong>in</strong>g this general framework and known bicriteria approximations forthe Mctdc problem, we obta<strong>in</strong> several bicriteria approximation algorithmsfor the 〈Undir, Diameter, TotalP〉 problem. (See Section 4.2.)3. For every fixed <strong>in</strong>teger ∆ ≥ 2, we show that the 〈Undir, Deg LB, TotalP〉problem is NP-complete. Also, we present an approximation algorithm witha performance guarantee of 2(∆+1)(1−1/n) for the problem. This algorithmproduces a power assignment that <strong>in</strong>duces a connected graph <strong>in</strong> which eachnode has degree at least ∆. The performance guarantee is with respect to theoptimal total power value. (Details regard<strong>in</strong>g these results will be <strong>in</strong>cluded<strong>in</strong> a complete version of this paper.)4. While the above results are under the symmetric power threshold model, weconsider the 〈Undir, Connected, TotalP〉 problem under the asymmetricpower threshold model. We show that the problem cannot be approximatedto with<strong>in</strong> an Ω(log n) factor unless P = NP. We also presentan O(log n) approximation algorithm for the problem.3.2 Related WorkReference [10] provides a general approach that leads to an approximation frameworkfor m<strong>in</strong>imiz<strong>in</strong>g total power. Us<strong>in</strong>g that framework, two new approximationalgorithms for 〈Undir, 2-Node Connected, TotalP〉 and 〈Undir, 2-Edge Connected, TotalP〉 with an asymptotic approximation ratio of 8 arepresented <strong>in</strong> [10]. Both of the approximation ratios are improved to 4 <strong>in</strong> [6]. Reference[3] shows that the 〈Dir, Strongly Connected, TotalP〉 problem isNP-complete and presents a 2-approximation algorithm for the problem. Cal<strong>in</strong>escuet al. [4] improve the approximation ratio to (1+ln 2). The approximationratio is further improved to 5/3 <strong>in</strong> a journal submission based on [4].4 Results for Diameter Problems4.1 Lower Bound on ApproximationThe follow<strong>in</strong>g theorem can be proven us<strong>in</strong>g an approximation preserv<strong>in</strong>g reductionfrom the M<strong>in</strong>imum Set Cover (Msc) problem. The proof is omitted dueto space constra<strong>in</strong>t.


192 S.O. Krumke et al.1. From the given problem <strong>in</strong>stance, construct the undirected complete edge weightedgraph G c(V,E c), where the weight of each edge {u, v} <strong>in</strong> E c is equal to the powerthreshold value p(u, v).2. Use any approximation algorithm A for the Mctdc problem on graph G c(V,E c)with diameter bound 2D, and obta<strong>in</strong> a spann<strong>in</strong>g tree T (V,E T )ofG c.3. For each node (transceiver) u, assign a power value f(u) equal to the weight of thelargest edge <strong>in</strong>cident on u <strong>in</strong> T .Fig. 1. Outl<strong>in</strong>e of Heuristic Gen-Diameter-Total-PowerTheorem 1. Let n denote the number of nodes <strong>in</strong> an <strong>in</strong>stance of the〈Undir, Diameter, TotalP〉 problem. There is a constant δ 1 , 0


Topology Control Problems 193power assigned <strong>by</strong> the heuristic for the <strong>in</strong>stance I. The goal of this subsection isto prove the follow<strong>in</strong>g result.Theorem 2. Suppose Algorithm A used <strong>in</strong> Step 2 of Heuristic Gen-Diameter-Total-Power is an (α, β)-approximation algorithm for the Mctdc problem.For any <strong>in</strong>stance I of the 〈Undir, Diameter, TotalP〉 problem, HeuristicGen-Diameter-Total-Power produces a power assignment f satisfy<strong>in</strong>g thefollow<strong>in</strong>g two properties.1. Dia(G f ) ≤ 2 αD.2. DTP(I) ≤ 2 β (1 − 1/n) OPT(I).Our proof of Theorem 2 uses a few lemmas proved below. We beg<strong>in</strong> with asimple lemma about spann<strong>in</strong>g trees generated <strong>by</strong> carry<strong>in</strong>g out BFS on a connectedgraph. The proof of this lemma is omitted.Lemma 1. Let G be a connected graph with diameter δ. LetT be any spann<strong>in</strong>gtree for G generated <strong>by</strong> BFS. Then Dia(T ) ≤ 2 δ.⊓⊔The next lemma <strong>in</strong>dicates why <strong>in</strong> Step 2 of Heuristic Gen-Diameter-Total-Power, we use the diameter bound of 2D.Lemma 2. Consider the complete graph G c (V,E c ) constructed <strong>in</strong> Step 1 ofHeuristic Gen-Diameter-Total-Power. There is a spann<strong>in</strong>g tree T 1 (V,E T1 )of G c satisfy<strong>in</strong>g the follow<strong>in</strong>g two properties.(a) Dia(T 1 ) ≤ 2D. ∑(b) Let W (E T1 ) = p(x, y) denote the total edge weight of T 1 . Then,{x,y}∈E T1W (E T1 ) ≤ (1 − 1/n) OPT(I).Proof:Part (a): Consider the graph G f ∗ <strong>in</strong>duced <strong>by</strong> the optimal power assignmentf ∗ . Note that Dia(G f ∗) ≤ D. Let v be node such that f ∗ (v) has the largest valueamong all the nodes <strong>in</strong> V . Let T 1 (V,E T1 ) be a spann<strong>in</strong>g tree of G f ∗ generated<strong>by</strong> carry<strong>in</strong>g out a BFS on G f ∗ with v as the root. Then, from Lemma 1, we haveDia(T 1 ) ≤ 2D.Part (b): Consider another assignment w of weights to the edges of T 1 as<strong>in</strong>dicated below. Consider each edge {x, y} <strong>in</strong> T 1 , where y is the parent of x. Letw(x, y) =f ∗ (x). Thus, the power value assigned <strong>by</strong> the optimal solution to eachnode except the root becomes the weight of exactly one edge of T 1 . The powervalue f ∗ (v) of the root is not assigned to any edge. Therefore,∑w(x, y) = OPT(I) − f ∗ (v).{x,y}∈E T1S<strong>in</strong>ce v has the maximum power value under f ∗ among all the nodes, we havef ∗ (v) ≥ OPT(I)/n. Therefore,∑{x,y}∈E T1w(x, y) ≤ (1 − 1/n) OPT(I).


194 S.O. Krumke et al.The follow<strong>in</strong>g claim relates the weight w(x, y) to the power threshold valuep(x, y). We omit the proof of this claim.Claim. For each edge {x, y} ∈E T1 , w(x, y) ≥ p(x, y).⊓⊔As a simple consequence of the above claim, we haveW (E T1 ) ≤∑w(x, y) ≤ (1 − 1/n) OPT(I),{x,y}∈E T1and this completes the proof of Part (b) of the lemma.⊓⊔The next lemma, which follows from Lemma 2, uses the performance guaranteeprovided <strong>by</strong> the approximation algorithm A used <strong>in</strong> Step 2 of the heuristic.Lemma 3. Let T (V,E T ) denote the tree produced <strong>by</strong> A at the end of Step 2of Heuristic Gen-Diameter-Total-Power. LetW (E T ) = ∑ {x,y}∈E Tp(x, y)denote the total weight of the edges <strong>in</strong> T .Let(α, β) denote the performanceguarantee provided <strong>by</strong> A for the Mctdc problem. Then,(a) Dia(T ) ≤ 2 αD.(b) W (E T ) ≤ β (1 − 1/n) OPT(I).⊓⊔We are now ready to prove Theorem 2.Proof of Theorem 2: Consider the spann<strong>in</strong>g tree T (V,E T ) produced <strong>in</strong> Step 2of the heuristic. We will first show that every edge {x, y} ∈ E T is also <strong>in</strong>G f (V,E f ), the graph <strong>in</strong>duced <strong>by</strong> the power assignment constructed <strong>in</strong> Step 3of the heuristic. To see this, notice that f(x) is the largest weight of an edge<strong>in</strong>cident on x <strong>in</strong> T . Thus, f(x) ≥ p(x, y). Similarly, f(y) ≥ p(x, y). Thus, everyedge <strong>in</strong> E T is also <strong>in</strong> E f . S<strong>in</strong>ce Dia(T ) ≤ 2 αD, and addition of edges cannot<strong>in</strong>crease the diameter, it follows that Dia(G f ) ≤ 2 αD.To bound DTP(I), we note from Lemma 3 that W (E T ) ≤ β (1 −1/n) OPT(I). In the power assignment constructed <strong>in</strong> Step 3, the weight ofany edge can be assigned to at most two nodes (namely, the end po<strong>in</strong>ts of thatedge). Thus, the total power assigned to all the nodes is at most 2 W (E T ). Inother words, DTP(I) ≤ 2 β (1 − 1/n) OPT(I), and this completes the proof ofTheorem 2.⊓⊔Obta<strong>in</strong><strong>in</strong>g Approximation Algorithms from Theorem 2. We now briefly<strong>in</strong>dicate how several bicriteria approximation algorithms for the 〈Undir, Diameter,TotalP〉 problem can be obta<strong>in</strong>ed us<strong>in</strong>g Gen-Diameter-Total-Power <strong>in</strong> conjunction with known bicriteria approximation results for theMctdc problem.1. For any fixed ɛ>0,a(2⌈log 2 n⌉, (1+ɛ) ⌈log 2 n⌉)-approximation algorithm ispresented <strong>in</strong> [11] for the Mctdc problem. Us<strong>in</strong>g this algorithm and sett<strong>in</strong>gɛ


Topology Control Problems 1952. For any fixed D ≥ 1, a (1,O(D log n))-approximation algorithm for theMctdc problem is presented <strong>in</strong> [2]. Thus, for any fixed D ≥ 1, we canobta<strong>in</strong> a (2,O(D log n))-approximation algorithm for the 〈Undir, Diameter,TotalP〉 problem.3. For any D and any fixed ɛ>0,a(1,O(n ɛ log n))-approximation algorithmfor the Mctdc problem is presented <strong>in</strong> [9]. Thus, for this case, we can obta<strong>in</strong>a (2,O(n ɛ log n))-approximation algorithm for the 〈Undir, Diameter,TotalP〉 problem.The above results are for <strong>in</strong>duc<strong>in</strong>g a bounded diameter graph over all the nodes.We can also obta<strong>in</strong> an approximation algorithm for the Ste<strong>in</strong>er version of the〈Undir, Diameter, TotalP〉 problem where only a specified subset of thenodes (called the term<strong>in</strong>als) need to be connected together <strong>in</strong>to a graph ofbounded diameter. Lett<strong>in</strong>g η denote the number of term<strong>in</strong>als, reference [11]presents an (O(log η),O(log η))-approximation algorithm for the Ste<strong>in</strong>er versionof the Mctdc problem. Us<strong>in</strong>g this approximation algorithm <strong>in</strong> Step 2 of Figure 1,we obta<strong>in</strong> an (O(log η),O(log η))-approximation algorithm for the Ste<strong>in</strong>er versionof the 〈Undir, Diameter, TotalP〉 problem.5 Asymmetric Power Threshold Model ResultsIn this section, we consider the 〈Undir, Connected, TotalP〉 problem underthe asymmetric threshold model. We beg<strong>in</strong> with a lower bound on the approximabilityof the problem. This lower bound result can be proven <strong>in</strong> a mannersimilar to that of Theorem 1.Theorem 3. Let n denote the number of transceivers <strong>in</strong> an <strong>in</strong>stance of the〈Undir, Connected, TotalP〉 problem. There is a constant δ, 0


196 S.O. Krumke et al.1. Let α =6lnn ∑ ni=1 γn i .2. From the given <strong>in</strong>stance of 〈Undir, Connected, TotalP〉, construct a graphG 1(V 1,E 1) as follows.(a) For each transceiver v i (1 ≤ i ≤ n) <strong>in</strong> the problem <strong>in</strong>stance, create a setg i = {u 0 i ,u 1 i ,...,u n i } of n + 1 nodes. Let the weight w(u 0 i )=α. For 1 ≤ j ≤ n,let the weight w(u j i )=γj i . The node set V1 is given <strong>by</strong> g1 ∪ g2 ∪ ...∪ gn.(b) For each i, connect the nodes <strong>in</strong> g i together as an (n + 1)-clique. (Nodes u 0 i ,1 ≤ i ≤ n, are not <strong>in</strong>volved <strong>in</strong> any edges other than these clique edges.)(c) For any pair of nodes u j i and ul k, where 1 ≤ j, l ≤ n, ifγ j i ≥ p(v i,v k ) andγk l ≥ p(v k ,v i), then add the edge {u j i ,ul k} to E 1. The edge set E 1 consists ofthe clique edges added <strong>in</strong> Step 2(b) and the edges added <strong>in</strong> Step 2(c).3. Use the algorithm of [7] us<strong>in</strong>g a small value (say, 0.1) for ɛ to f<strong>in</strong>d a connecteddom<strong>in</strong>at<strong>in</strong>g set D 1 of approximately m<strong>in</strong>imal weight for G 1.4. If for some i, D 1 conta<strong>in</strong>s both u j i and uk i , where j


Topology Control Problems 197<strong>by</strong> the approximation algorithm. For space reasons, the proofs of the lemmasare omitted.Lemma 4. For the graph G 1 constructed <strong>in</strong> Step 2 of the algorithm, the weightof a m<strong>in</strong>imum connected dom<strong>in</strong>at<strong>in</strong>g set is at most OPT(I).⊓⊔Lemma 5. Consider the dom<strong>in</strong>at<strong>in</strong>g set D 1 found <strong>in</strong> Step 3 of the algorithm(Figure 2).(a) Let W (D 1 ) denote the total weight of the nodes <strong>in</strong> D 1 . Then, W (D 1 )


198 S.O. Krumke et al.for any given diameter value. A second problem is to improve the approximationratio for the 〈Undir, Deg LB, TotalP〉 problem. F<strong>in</strong>ally, it would also beof <strong>in</strong>terest to consider other topology control problems under the asymmetricthreshold model.References1. D. M. Blough, M. Leonc<strong>in</strong>i, G. Resta, and P. Santi, “On the Symmetric RangeAssignment Problem <strong>in</strong> Wireless Ad Hoc Networks”, Proc. 2nd IFIP InternationalConference on Theoretical <strong>Computer</strong> <strong>Science</strong>, Montreal, August 2002.2. M. Charikar, C. Chekuri, T. Cheung, Z. Dai, A. Goel, S. Guha, and M. Li, “ApproximationAlgorithms for Directed Ste<strong>in</strong>er Problems”, Journal of Algorithms,Vol. 33, No. 1, 1999, pp. 73–91.3. W. Chen and N. Huang, “The Strongly Connect<strong>in</strong>g Problem on Multihop PacketRadio Networks”, IEEE Trans. Communication, Vol. 37, No. 3, Mar. 1989.4. G. Cal<strong>in</strong>escu, I. Mandoiu, and A. Zelikovsky. “Symmetric Connectivity with M<strong>in</strong>imumPower Consumption <strong>in</strong> Radio Networks”, Proc. 2nd IFIP InternationalConference on Theoretical <strong>Computer</strong> <strong>Science</strong>, Montreal, August 2002.5. A. E. F. Clementi, P. Penna and R. Silvestri. “Hardness Results for the PowerRange Assignment Problem <strong>in</strong> Packet Radio Networks”, Proc. Third InternationalWorkshop on Randomization and Approximation <strong>in</strong> <strong>Computer</strong> <strong>Science</strong> (AP-PROX 1999), <strong>Lecture</strong> <strong>Notes</strong> <strong>in</strong> <strong>Computer</strong> <strong>Science</strong> Vol. 1671, Spr<strong>in</strong>ger-Verlag, July1999, pp. 195–208.6. G. Cal<strong>in</strong>escu and P-J Wan. “Symmetric High Connectivity with M<strong>in</strong>imum TotalPower Consumption <strong>in</strong> Multihop Packet Radio Networks”, Submitted for journalpublication, 2003.7. S. Guha and S. Khuller, “Improved Methods for Approximat<strong>in</strong>g Node WeightedSte<strong>in</strong>er Trees and Connected Dom<strong>in</strong>at<strong>in</strong>g Sets”, Information and Computation,Vol. 150, 1999, pp. 57–74.8. L. M. Kirousis, E. Kranakis, D. Krizanc and A. Pelc, “Power Consumption <strong>in</strong>Packet Radio Networks”, Proc. 14th Annual Symposium on Theoretical Aspectsof <strong>Computer</strong> <strong>Science</strong> (STACS 97), <strong>Lecture</strong> <strong>Notes</strong> <strong>in</strong> <strong>Computer</strong> <strong>Science</strong> Vol. 1200,Spr<strong>in</strong>ger-Verlag, Feb. 1997, pp. 363–374.9. G. Kortsarz and D. Peleg, “Approximat<strong>in</strong>g the Weight of Shallow Light Trees”,Discrete Applied Mathematics, Vol. 93, 1999, pp. 265–285. (Prelim<strong>in</strong>ary versionappeared <strong>in</strong> Proc. Eighth ACM-SIAM Symp. on Discrete Algorithms (SODA’97),New Orleans, LA, Jan. 1977, pp. 103–110.)10. E. L. Lloyd, R. Liu, M. V. Marathe, R. Ramanathan and S. S. Ravi, “AlgorithmicAspects of Topology Control Problems for Ad hoc Networks”, Proc. Third ACMInternational Symposium on Mobile Ad Hoc Network<strong>in</strong>g and Comput<strong>in</strong>g (Mobi-Hoc’02), Laussane, Switzerland, June 2002.11. M. V. Marathe, R. Ravi, R. Sundaram, S. S. Ravi, D. J. Rosenkrantz and H. B.Hunt III, “Bicriteria Network Design Problems”, Journal of Algorithms, Vol. 28,No. 1, July 1998, pp. 142–171.12. R. Ramanathan, “On the Performance of Ad Hoc Networks with Beamform<strong>in</strong>gAntennas”, Proc. Second ACM International Symposium on Mobile Ad Hoc Network<strong>in</strong>gand Comput<strong>in</strong>g (MobiHoc’01), Long Beach, CA, Oct. 2001.13. R. Ramanathan and R. Rosales-Ha<strong>in</strong>, “Topology Control of Multihop WirelessNetworks Us<strong>in</strong>g Transmit Power Adjustment”, Proc. INFOCOM 2000.


IDEA: An Iterative-Deepen<strong>in</strong>g Algorithmfor Energy-Efficient Query<strong>in</strong>g<strong>in</strong> Ad Hoc Sensor NetworksSwapnil PatilDepartment of <strong>Computer</strong> <strong>Science</strong>State University of New York at Stony BrookStony Brook, NY 11790, USAswapnil@cs.sunysb.eduAbstract. The data-centric ad hoc sensor networks make efficientsearch<strong>in</strong>g a crucial and challeng<strong>in</strong>g operation. Dynamic topology makeflood<strong>in</strong>g the most widely adopted solution at a cost of high bandwidthcongestion lead<strong>in</strong>g to <strong>in</strong>efficient use of resources and low network lifetime.This paper presents IDEA, an efficient query<strong>in</strong>g and search<strong>in</strong>g techniquefor ad hoc sensor networks that reduces average energy consumptionwhile ma<strong>in</strong>ta<strong>in</strong><strong>in</strong>g the capacity and performance of the network. IDEAis based on iterative-deepen<strong>in</strong>g search which check-po<strong>in</strong>ts the flood<strong>in</strong>g ofrequests based on the results. This is further extended to a token-basedapproach called T-IDEA, which <strong>in</strong>volves local decisions made <strong>by</strong> nodesto determ<strong>in</strong>e their participation <strong>in</strong> a virtual search<strong>in</strong>g network. Resultsshow that IDEA and T-IDEA significantly reduces the energy consumptioncompared to classical flood<strong>in</strong>g approaches. Apart from that T-IDEApresents a highly distributed self-supervis<strong>in</strong>g topology formation whichperforms very well to <strong>in</strong>crease the lifetime of the ad hoc sensor network....1 IntroductionRecent advances <strong>in</strong> wireless and mobile networks have led to <strong>in</strong>terest <strong>in</strong> build<strong>in</strong>gand deploy<strong>in</strong>g <strong>in</strong> ad-hoc and sensor networks. Due to their constra<strong>in</strong>ed environmentand distributed operations, these networks provide an challeng<strong>in</strong>g researchproblems. Due to the distributed operations, most rout<strong>in</strong>g and search<strong>in</strong>goperations <strong>in</strong> mobile ad-hoc and sensor networks are multi-hop. Thus, mak<strong>in</strong>gflood<strong>in</strong>g based approaches the most feasible. Many rout<strong>in</strong>g protocols [1,2,3] havebeen proposed us<strong>in</strong>g flood<strong>in</strong>g or broadcast mechanisms.In flood<strong>in</strong>g, each node broadcasts the query to all its neighbor<strong>in</strong>g nodes.These nodes perform a local search for the query. If unsuccessful, these nodesbroadcast the query to its neighbors and so on. Thus the query reaches theentire network, more than once for most of the nodes. But each node rejectsquery messages which have already been received once (based on their ID).This paper <strong>in</strong>troduces and evaluates new search<strong>in</strong>g algorithm(s) <strong>in</strong> ad hocsensor networks called IDEA and T-IDEA. These techniques achieve a significantga<strong>in</strong> over classical flood<strong>in</strong>g based approach, and could easily scale to largenetworks.S. Pierre, M. Barbeau, and E. Kranakis (Eds.): ADHOC-NOW 2003, LNCS <strong>2865</strong>, pp. 199–210, 2003.c○ Spr<strong>in</strong>ger-Verlag Berl<strong>in</strong> Heidelberg 2003


200 S. PatilIDEA uses the concept of iterative deepen<strong>in</strong>g <strong>by</strong> ‘iteratively’ send<strong>in</strong>g thequery messages to the <strong>in</strong>creas<strong>in</strong>g number of nodes until the query is answered (ornot matched). This floods the query throughout the network only if the searchdoes not yield a result at the certa<strong>in</strong> ‘check-po<strong>in</strong>ts’ i.e. end of each iteration.This technique is also applied to a self-organiz<strong>in</strong>g, token-based search, T-IDEAwhich adaptively takes <strong>in</strong>to account the constra<strong>in</strong>ts of each node. Each sensornode identifies itself as ‘available’ or ‘unavailable’ for search operations, basedon local decisions made towards overall network performance improvement.The rema<strong>in</strong>der of the paper is organized as follows. First, a brief summaryof the problem is presented. Section 2 presents a brief description of the problemwith the assumptions for that algorithm. Section 3 describes the iterativedeepen<strong>in</strong>g algorithm <strong>in</strong> details, followed <strong>by</strong> an active token based version of theiterative deepen<strong>in</strong>g algorithm. Section 5 presents the experiments and the resultsof this protocol. F<strong>in</strong>ally, Section 6 presents some related work and the follow<strong>in</strong>gsection concludes the paper.2 Problem OverviewInformation dissem<strong>in</strong>ation and gather<strong>in</strong>g is one of the most important tasks froma mobile ad hoc network. Constra<strong>in</strong>ts like limited energy, dynamic network, lowbandwidth etc. make it more challeng<strong>in</strong>g. Dynamic search<strong>in</strong>g techniques arecrucial for energy-efficient operations of mobile ad hoc networks.This paper <strong>in</strong>troduces a novel approach called IDEA to search <strong>in</strong> ad-hocnetworks, us<strong>in</strong>g iterative-deepen<strong>in</strong>g, a known search technique to search overstate space <strong>in</strong> artificial <strong>in</strong>telligence applications [14]. Iterative deepen<strong>in</strong>g searchesare a comb<strong>in</strong>ation of breadth-first searches with series of depth-first searcheswith <strong>in</strong>creas<strong>in</strong>g bounds of depth. This is further extended to use <strong>in</strong> conjunctionwith local <strong>in</strong>formation based on the <strong>in</strong>teraction with neighbor<strong>in</strong>g nodes, calledas token-based algorithm, T-IDEA. Nodes make local decisions, based on theirenergy constra<strong>in</strong>ts and importance <strong>in</strong> the search operation, to make themselvesavailable for search<strong>in</strong>g.3 Iterative-Deepen<strong>in</strong>gIn applications where relevance of the search result is an important measure,iterative deepen<strong>in</strong>g is a better search technique than many classical algorithms.In the iterative deepen<strong>in</strong>g technique, multiple breadth-first searches are <strong>in</strong>itiatedwith <strong>in</strong>creas<strong>in</strong>g depth limits, until the appropriate result has been found, or<strong>in</strong> case of rout<strong>in</strong>g dest<strong>in</strong>ation has been reached, or as <strong>in</strong> the worst-case, themaximum depth limit D has been reached.There are various motivations to support this search technique <strong>in</strong> sensor networks.First, the cost of query<strong>in</strong>g at smaller depths is less than query-process<strong>in</strong>gcost at larger depths. This is because of the fast growth of the number of nodesto be searched at grow<strong>in</strong>g depths. Secondly, this would also lead to reduced numberof resources utilized for query process<strong>in</strong>g <strong>in</strong> a constra<strong>in</strong>ed ad-hoc network.Compared to the traditional graph search<strong>in</strong>g problems like BFS of depth d, this


IDEA: An Iterative-Deepen<strong>in</strong>g Algorithm for Energy-Efficient Query<strong>in</strong>g 201algorithm would asymptotically perform well <strong>by</strong> satisfy<strong>in</strong>g the query at a depthless than d. In deed, experiments show (Section 6) that for a fairly dense ad-hocnetwork with approximately 8 neighbors per node, with depth,d = 7, almost70% of all queries can be satisfied at a depth less than d.IDEA works on a network-wide rule called i-Rule which specifies the policyfor depths of iteration for search<strong>in</strong>g and the time-<strong>in</strong>terval between successiveiterations. Suppose the rule is, i − Rule = {i 1 ,i 2 ,i 3 ,T}, this means that thedepth of search for the first iteration is i 1 , the search depth for second iterationis i 2 and the third to depth i 3 . Intuitively, if the search reaches the third-leveliteration, then it has the same performance as BFS of depth i 3 . The <strong>in</strong>tervalbetween these successive iterations known as the <strong>in</strong>ter-iteration <strong>in</strong>terval, T, whichis required for the source (which <strong>in</strong>itiates the query) to receive and analyze theresponse messages. One advantage of such a policy is that the rule could bebased on any metric like the number of hops, time-to-search (like TTL) etc. But<strong>in</strong> case of ad hoc networks, the most common metric is the number of hops,consider<strong>in</strong>g that the communication cost is proportional to the number of hops.The algorithm details are expla<strong>in</strong>ed further below.For a i-Rule = {i,j,k,T}, a source node S <strong>in</strong>itiates flood<strong>in</strong>g (or BFS) tilla depth i i.e. start<strong>in</strong>g from the source the query is flooded to all nodes i hopsaway from the source. When the query reaches nodes that are i hops away,the query is halted and not flooded further. Dur<strong>in</strong>g this time the source S, mayor may not receive the response messages to the query. After wait<strong>in</strong>g for the<strong>in</strong>ter-iteration <strong>in</strong>terval, T, if it receives appropriate responses, then the sourcewould stop query<strong>in</strong>g. Else if the source does not receive appropriate results orno results, it <strong>in</strong>itiates the second search iteration. It is important to note that,the def<strong>in</strong>ition of the term ‘appropriate response’ or ‘search results’ is applicationspecific and is not addressed <strong>in</strong> this paper.To <strong>in</strong>itiate the second search iteration, source S will send the Cont<strong>in</strong>ue-jmessage, <strong>in</strong>dicat<strong>in</strong>g nodes to flood the message, j hops from the source. It shouldbe noted that nodes which are i hops away from the source, have already processedthe query and store the query with them (they are <strong>in</strong> halted state). Henceif these nodes (with<strong>in</strong> i hops from the source) were to process the query, it woulddegrade the performance of the protocol <strong>by</strong> wast<strong>in</strong>g energy of this constra<strong>in</strong>ed adhoc network. Instead of re-process<strong>in</strong>g the query, these nodes which are with<strong>in</strong> ihops from the source would simply forward the received cont<strong>in</strong>ue-j messages.Once the last node (i.e. i hops from the source) receives the message, thesenodes re-send the halted query, and flood it to all the nodes which are ‘j - i’hops from the present node (remember, j means j nodes from the source). Oneimportant po<strong>in</strong>t to note here is that, node will halt the query only for a timegreater than the <strong>in</strong>ter-iteration <strong>in</strong>terval, T; before delet<strong>in</strong>g its state.It would always be a case that more than one query and consequently manycont<strong>in</strong>ue messages are be<strong>in</strong>g flooded <strong>in</strong> the network. To match the queries withappropriate cont<strong>in</strong>ue messages, every query is assigned a unique identifier, as<strong>in</strong> case of DSR [2]. The cont<strong>in</strong>ue message will have the identifier for the correspond<strong>in</strong>gquery, thus nodes know which query is to be re-sent.


202 S. PatilAfter flood<strong>in</strong>g the query to nodes j hops away, the algorithm cont<strong>in</strong>ues to thehigher levels of depth <strong>in</strong> the subsequent iterations <strong>in</strong> the i-Rule. After the lastiteration, <strong>in</strong> this case after k hops away, queries are not halted and the search isterm<strong>in</strong>ated.4 T-IDEA: Token-Based Iterative-Deepen<strong>in</strong>g AlgorithmIterative-deepen<strong>in</strong>g search is a good technique to keep a check on the flood<strong>in</strong>g ofthe query <strong>by</strong> ma<strong>in</strong>ta<strong>in</strong><strong>in</strong>g ‘check-po<strong>in</strong>ts’ i.e. iterations <strong>in</strong> the flood<strong>in</strong>g the query.But it does not take <strong>in</strong>to account the energy considerations of the mobile nodes,which is crucial to estimate the network lifetime for any protocol. A betteralgorithm should be adaptive to the energy constra<strong>in</strong>ts on the nodes <strong>in</strong> the adhoc network, <strong>by</strong> <strong>in</strong>volv<strong>in</strong>g nodes which have energy capacity to susta<strong>in</strong> as alongas possible, thus hav<strong>in</strong>g a m<strong>in</strong>imal effect on the network lifetime.T-IDEA implements this strategy <strong>by</strong> query<strong>in</strong>g only a subset of the neighbors,there<strong>by</strong> reduc<strong>in</strong>g the cost, but select<strong>in</strong>g neighbors which would convergeto correct results. These neighbors identify themselves as participants <strong>in</strong> thissearch. We use a token-based scheme <strong>in</strong> which each node makes local decisionswhether to take part <strong>in</strong> the search or not. Factors which are primarily functional<strong>in</strong> this token-based scheme are energy constra<strong>in</strong>ts, query process<strong>in</strong>g capacityetc. The follow<strong>in</strong>g sections describe the participation algorithm for nodes whichparticipate <strong>in</strong> this search and the search <strong>in</strong> the participat<strong>in</strong>g nodes of ad hocnetwork.4.1 T-IDEA AlgorithmTo avoid <strong>in</strong>volv<strong>in</strong>g highly constra<strong>in</strong>ed nodes or nodes who identify themselvesas ‘irrelevant’ for particular search, this algorithm allows any source to querynodes which identify themselves as part of the search and are will<strong>in</strong>g to acceptand forward the queries.Each node <strong>in</strong> the ad hoc network broadcasts participation token(s) to all ofits neighbors. There are two types of tokens q-tokens and t-tokens. q-token(s)represent the number of query messages, q, for which the node can be the partof the search network and t-token represents the search-TTL for the node i.e. ttime units. Thus, a source would send a query to only those nodes, from which ithas a valid token. Once the node has replied/forwarded its q number of queriesor has been a part for t time-units, it broadcasts a zero-token message send<strong>in</strong>gits <strong>in</strong>ability to take part <strong>in</strong> an any more active search query requests.In aggregate, the consta<strong>in</strong>ed nodes would declare their level of participation<strong>in</strong> the search operations, <strong>by</strong> means of number of queries or time-to-search. Incase of t-tokens, sometimes the node receives and processes queries at a veryhigh rate, lead<strong>in</strong>g to high energy dra<strong>in</strong> of the ad hoc node capacity. So to reducethe query process<strong>in</strong>g, the node can send a q-token before the expiration of thet-token, to control its energy dra<strong>in</strong>age caused due to high query-process<strong>in</strong>g rate.Similarly if a node has earlier sent a q-token to neighbors, but is receiv<strong>in</strong>g queries


IDEA: An Iterative-Deepen<strong>in</strong>g Algorithm for Energy-Efficient Query<strong>in</strong>g 203at a very low rate (thus ma<strong>in</strong> energy is dra<strong>in</strong>ed <strong>by</strong> stay<strong>in</strong>g <strong>in</strong> active mode); <strong>in</strong>this case it can broadcast a t-token to declare a new token of its availability.Thus the generation of these tokens is primarily driven <strong>by</strong> the energy constra<strong>in</strong>tsof respective nodes. Section 5 describes the energy-based token generation modelused dur<strong>in</strong>g experiments.One po<strong>in</strong>t of discussion <strong>in</strong> the token generation algorithm is the primarymetric to be used. In the discussion so far energy has been the primary factor,and it would be the case for majority of applications. But suppose the networkconsists of mobile computers or handhelds which can be charged frequently,then energy might not be most important criteria. Another metric which playsan important role <strong>in</strong> search<strong>in</strong>g is the connectivity and the ability to forward tonodes that lead to appropriate results. For example, nodes which have previouslyreplied to the queries at a high frequency could be used to declare tokens ofavailability. Another criterion would be to use neighbors that have respondedwith messages with least number of hops. This is a very application specificmetris, which is beyond the scope of this paper.The T-IDEA search forwards the query message(s) to just a subset of itsneighbors, based on the token-declaration made <strong>by</strong> the neighbor<strong>in</strong>g mobile nodes.By send<strong>in</strong>g the query to a small subset of neighbor nodes, we will likely reducethe costs <strong>in</strong>curred <strong>by</strong> the nodes dur<strong>in</strong>g query process<strong>in</strong>g and forward<strong>in</strong>g. Onthe other hand, <strong>by</strong> select<strong>in</strong>g neighbors which wold produce many results, we canma<strong>in</strong>ta<strong>in</strong> quality of results to a large degree, even though fewer nodes are visited.4.2 Resilient SearchThis search algorithm is a controlled flood<strong>in</strong>g approach which depends on nodesof the ad-hoc network identify<strong>in</strong>g themselves to be a part of the search<strong>in</strong>g network.One drawback of such a scheme, isthe <strong>in</strong>creased probability of failure thanflood<strong>in</strong>g (where even if a node dies the query can propagated <strong>by</strong> some part ofthe network). This is possible <strong>in</strong> cases described earlier when a node experiencesheavy energy dra<strong>in</strong>age than predicted dur<strong>in</strong>g the token declaration (dueto <strong>in</strong>crease <strong>in</strong> query process<strong>in</strong>g rate).This problem is alleviated <strong>by</strong> use of keep-alive messages. If a query is forwardedfor certa<strong>in</strong> number of hops, as declared <strong>in</strong> the i-Rule, we need to sendexplicit keep-alive messages. In case if the source node receives query responsemessages, they are considered to be implicit keep-alive messages. But if thesource does not receive either of them it can re-issue the query.4.3 Distributed Token Declaration AlgorithmA more distributed token declaration scheme for the nodes <strong>in</strong> the ad hoc network,would be to assign tokens to neighbors <strong>in</strong> proportion to their capacities. Based onthe previous tokens received from your neighbors, the neighbor<strong>in</strong>g node whichdeclares high capacity is assigned more tokens for query<strong>in</strong>g the current node.This distributed token-algorithm is similar to fair queu<strong>in</strong>g policies used for flowfairness <strong>in</strong> networks.


204 S. Patil5 Simulation ModelSource node submits a search query to the network D times, spread over an<strong>in</strong>terval, where maximum D = 7. The network assumes that each node can havea maximum of 8 neighbors and for experimental reasons the flood<strong>in</strong>g has a limitof 7 hops from the source node.The ma<strong>in</strong> aim of this algorithm is the energy efficient operation. The simulationshave given vary<strong>in</strong>g weights to the energy consumed <strong>by</strong> different message.Some of the important messages <strong>in</strong> this algorithm are Query Messages, Query-Response, Query-Result, Cont<strong>in</strong>ue with arbitrary maximum messages sizes of100 <strong>by</strong>tes, 80 <strong>by</strong>tes, 70 <strong>by</strong>tes each and 40 <strong>by</strong>tes each. The energy required <strong>by</strong>each node is constant and is 1 micro-Joule per <strong>by</strong>te. These values are takenbased on the approximate ratio of the packet sizes <strong>in</strong> packet networks which <strong>in</strong>cludesheader, identifier and query-str<strong>in</strong>g (which is variable length). So <strong>in</strong> somecases it is possible that the packets might be of sizes smaller than the mentionedabove. But the most important factor here is the energy required per <strong>by</strong>te, thatdeterm<strong>in</strong>es the efficiency of the algorithm.5.1 Aggregate Energy Consumption ModelEach query be<strong>in</strong>g propagated through the mobile network consumes energy. Thismetric gives us results about the energy consumption due the query process<strong>in</strong>g.Let,E q be the energy required to communicate the query message;N q be the number of nodes that process query k hops awayE q be the number of nodes that process the query aga<strong>in</strong> k hops away i.e. redundantqueries.where,T otal Energy per Query , T E q = E q × (T q + T r ) (1)Total Query Messages, T q = N (q,x) + R (q,x) andTotal Response Messages, T q = Resp (q,x) + Rslt (q,x)andN (q,x) is the number of nodes that process query Q, k hops away fromR (q,x) is the number of redundant edges when the query Q is processed.Resp (q,x) is the number of response messages received per query Q from a nodex which is k hops from the source.Rslt (q,x) is the number of results received per query Q.This model is modified to accommodate the changes based on IDEA andT-IDEA methods5.2 Energy Model for IDEAIn case of IDEA, the aggregate energy consumed per query must take <strong>in</strong>to accountthe cost of send<strong>in</strong>g cont<strong>in</strong>ue messages, as well as the possibility that a


IDEA: An Iterative-Deepen<strong>in</strong>g Algorithm for Energy-Efficient Query<strong>in</strong>g 205query may term<strong>in</strong>ate before reach<strong>in</strong>g the maximum depth. Let R be the IDEArule (the iterative depths) which would be used for evaluation. The rules aredef<strong>in</strong>ed as a set of values, where the i th value, represents the number of hopsa message is forwarded <strong>in</strong> the i th iteration (this is for 1 < i < N − 1 , for aN-item set, s<strong>in</strong>ce the last value if the <strong>in</strong>ter-iteration <strong>in</strong>terval) or is halted. Let usassume d to be the item of the IDEA rule set i.e. we need to go d hops dur<strong>in</strong>gthe flood<strong>in</strong>g approach.So the energy consumption equation (1) would change to accommodate theIDEA algorithm. It would be a sum of the energy consumed to flood the query ton hops and receiv<strong>in</strong>g response messages from nodes at n hops. If the query endsbefore reach<strong>in</strong>g nodes which are n hops away, then it will not be sent to nodesthat are n hops away nor receive results from nodes which ar n hops away. Thiscondition can be mathematically represented as a constant A, which is multipliedto the naive energy consumption relation achieved above <strong>in</strong> eqn (1).A = 1 , if n is a rule <strong>in</strong> the IDEA-rule of iterationsand query Q does not end at nodes n hops away= 0 , otherwiseAnother important factor is the overhead caused <strong>by</strong> send<strong>in</strong>g the cont<strong>in</strong>uemessages. cont<strong>in</strong>ue messages are sent to nodes n hops away if:(a) depth k is <strong>in</strong> the IDEA-rule(b) query is not satisfied with<strong>in</strong> depth k before expiration(c) depth k < D (max depth i.e. highest value of IDEA-rule elements)5.3 Energy Model for T-IDEAEnergy consumption equation for token-based iterative deepen<strong>in</strong>g is similar toequation (1), for a classical flood<strong>in</strong>g approach. The only change that is <strong>in</strong>corporatedis the heuristic to decide whether a node would participate <strong>in</strong> the searchoperation <strong>in</strong> the ad hoc network, based on local decisions.6 Results6.1 Average Aggregate Energy ConsumptionFigure 1 shows the cost of each rule-item, for differnt values of <strong>in</strong>ter-iteration<strong>in</strong>terval, T, <strong>in</strong> terms of average aggregate energy consumption. Along the x-axis,we vary the rule, d i.e. number of hops. Immediately obvious <strong>in</strong> these figures arethe cost sav<strong>in</strong>gs. IDEA-Rule R 1 at T = 8 units uses just about 19% of theaggregate bandwidth per query used <strong>by</strong> classical flood<strong>in</strong>g, IDEA-Rule R 7 , andjust 41% of the aggregate process<strong>in</strong>g cost per query.To understand how such enormous sav<strong>in</strong>gs are possible, we must understandthe tradeoffs between the different rules and <strong>in</strong>ter-iteration <strong>in</strong>terval, T. Let usfocus on energy consumption per query message, <strong>in</strong> Figure 1. First, notice that


206 S. PatilAvg. Aggregate Energy Consumption (<strong>in</strong> Joules)98765432T = 1T = 3T = 5T = 7T = 10T = 5011 2 3 4 5 6 7Depth of Search<strong>in</strong>g (Number of hops)Fig. 1. Avg. Aggregate Energy Consumption for Iterative-Deepen<strong>in</strong>g Searchthe average aggregate bandwidth for d = 7 (i.e. rule 7 or classical flood<strong>in</strong>g) isthe same, regardless of tt T. S<strong>in</strong>ce the <strong>in</strong>ter-iteration <strong>in</strong>terval, T is consideredonly between iterations, it does not affect IDEA-Rule R 7 = {7}, which hasonly a s<strong>in</strong>gle iteration. Next, notice that as the number of hops for iteration,d, <strong>in</strong>creases, the energy consumption of IDEA-Rule R d <strong>in</strong>creases as well. Thelarger d is, the more likely the rule will waste bandwidth <strong>by</strong> send<strong>in</strong>g the queryout to too many nodes i.e send<strong>in</strong>g the query out to more nodes than necessary.Send<strong>in</strong>g the query out to more nodes than necessary will generate more energyconsumption for forward<strong>in</strong>g the query, and transferr<strong>in</strong>g response messages backto the source. Hence, as d <strong>in</strong>creases, bandwidth consumption <strong>in</strong>creases as well,giv<strong>in</strong>g IDEA-Rule R 7 or classical flood<strong>in</strong>g gives the worst energy consumptionperformance.Now, notice that as the <strong>in</strong>ter-iteration <strong>in</strong>terval, T, decreases, energy consumptionper query usage <strong>in</strong>creases. If T is small, then it is highly possible that sourcewill assume that the query was not satisfied, lead<strong>in</strong>g to the overshoot<strong>in</strong>g effectas described earlier. For example, say T = 10 and d = 6, if a query Q can besatisfied at depth 6, but more time than T is required before certa<strong>in</strong> number ofresults arrive at the client, then the client will only wait for T seconds, determ<strong>in</strong>ethat the query is not satisfied, and <strong>in</strong>itiate the next iteration at depth 7. In thiscase, the source overshoots the goal. The smaller T is, the more often the sourcewill overshoot; hence, energy consumption usage <strong>in</strong>creases as T decreases.T-IDEA decreases the number of nodes which would take part <strong>in</strong> the queryprocess<strong>in</strong>g operation based on the local decisions and tokens created <strong>by</strong> eachnode. This helps <strong>in</strong> <strong>in</strong>creas<strong>in</strong>g the aggregate capacity of the network, s<strong>in</strong>cesome nodes are not <strong>in</strong>volved the energy consum<strong>in</strong>g query process<strong>in</strong>g process.


IDEA: An Iterative-Deepen<strong>in</strong>g Algorithm for Energy-Efficient Query<strong>in</strong>g 207Avg. Aggregate Energy Consumption (<strong>in</strong> Joules)54.543.532.521.51T = 1T = 3T = 5T = 7T = 10T = 500.51 2 3 4 5 6 7Depth of Search<strong>in</strong>g (Number of hops)(a) 50% nodes <strong>in</strong>activeAvg. Aggregate Energy Consumption (<strong>in</strong> Joules)7654321T = 1T = 3T = 5T = 7T = 10T = 5001 2 3 4 5 6 7Depth of Search<strong>in</strong>g (Number of hops)(b) 25% nodes <strong>in</strong>activeFig. 2. Avg. Aggregate Energy Consumption for Iterative-Deepen<strong>in</strong>g Search with afraction of <strong>in</strong>active nodes. (25% and 50%)Figure 2, shows the variations <strong>in</strong> the avg. energy consumption for query<strong>in</strong>g thead-hoc sensor network us<strong>in</strong>g the T-IDEA algorithm.


208 S. PatilTable 1. Probability of correct search results us<strong>in</strong>g IDEA for 4 and 8 neighbor nodesNo. of Search Results Pr(4-neighbors per node) Pr(8-neighbors per node)50 0.698 0.756100 0.597 0.673150 0.534 0.572200 0.458 0.5026.2 Query Results CorrectnessPerformance of the iterative deepen<strong>in</strong>g technique and its rules, also depends onthe value chosen for number of results expected, R. In addition, performancedepends on the number of nodes that process each query, which <strong>in</strong> turn is determ<strong>in</strong>edlocally <strong>by</strong> the number of neighbors (degree) that a node ma<strong>in</strong>ta<strong>in</strong>s. Tosee the effect of these two factors on the IDEA algorithm, the first simulationassumed 8 neighbors per node (approximately), then for 4 neighbors per node.Over each data set, we then ran analysis for four different values of search results,first with R = 50, then R = 100, R = 150 and R =200Table 1 shows the performance of each variation <strong>in</strong> terms of query satisfactionprobability, Pr(). It represents all iterative deepen<strong>in</strong>g policies as it is <strong>in</strong>dependentof the <strong>in</strong>ter-iteration <strong>in</strong>terval, T. As expected, when the def<strong>in</strong>ition of querysatisfaction, Q def , <strong>in</strong>creases, the level of satisfaction decreases. However, it isencourag<strong>in</strong>g to note that satisfaction does not drop very quickly as number ofsearch results <strong>in</strong>crease.Also as expected, when the number of neighbors per node decreases, theprobability that a query is satisfied also decreases, s<strong>in</strong>ce fewer neighbors generallytranslates to fewer number of results. However, we f<strong>in</strong>d it <strong>in</strong>terest<strong>in</strong>g thatsatisfaction probability with 4 neighbors per node is not much lower than satisfactionprobability with 8 neighbors per node. The reason be<strong>in</strong>g that with 8neighbors per node, the source node usually receives more results than neededto satisfy the query. When the number of neighbors per node decreased to 4,the source received significantly fewer results, but <strong>in</strong> most cases it was able toproduce the query results.7 Related WorkVarious research groups have worked on optimization of search<strong>in</strong>g algorithms<strong>in</strong> ad-hoc sensor networks. Earlier research was focused on optimal flood<strong>in</strong>g orbroadcast<strong>in</strong>g <strong>in</strong> ad hoc networks. [11] proposes a heuristics based algorithm,which decides to forward the packet based on various factors like probabilisticneighbor node selection. On the other hand, this paper gives a determ<strong>in</strong>isticselection policy based on the tokens or the policy for iterative deepen<strong>in</strong>g. [8]uses the concept of elim<strong>in</strong>ation scheme based on the <strong>in</strong>formation of nodes towhich the packet was broadcast from the transmitter. Node(s) do not broadcastto nodes which have already received the packet. This ‘broadcast cover state’ is


IDEA: An Iterative-Deepen<strong>in</strong>g Algorithm for Energy-Efficient Query<strong>in</strong>g 209ma<strong>in</strong>ta<strong>in</strong>ed <strong>by</strong> the transmitter after transmitt<strong>in</strong>g to the new nodes. [4] also usesthe concept of elim<strong>in</strong>ation set based on the tuple of location co-ord<strong>in</strong>ates andneighbor nodes for a particular node; it also uses a negative acknowledgementscheme for retransmissions. Algorithm <strong>in</strong> this paper does not keep the state ofthe broadcast either for the IDEA search or for the token-based, T-IDEA search,s<strong>in</strong>ce it scales robustly to any change <strong>in</strong> the topology.Many approaches use the topological <strong>in</strong>formation of the ad hoc network.[10] selects a set of neighbors called multipo<strong>in</strong>t relays (MPR), based on thetopological <strong>in</strong>formation such that each node covers the same network region,which the complete set of neighbors does. The computation of this m<strong>in</strong>imal setis NP-Complete problem. The iterative-deepen<strong>in</strong>g search <strong>in</strong> this work does notexploit any topology <strong>in</strong>formation, but tries to exploit tokens received from theneighbor nodes (<strong>in</strong> case of T-IDEA).Several works use the concept of dom<strong>in</strong>at<strong>in</strong>g set to optimally broadcast thepackets, which are different from the approach addressed <strong>by</strong> this paper whichdoes an optimal flood<strong>in</strong>g based on a policy(s). [9] proposed a distributed determ<strong>in</strong>isticalgorithm, which def<strong>in</strong>ed a set as dom<strong>in</strong>at<strong>in</strong>g if all nodes <strong>in</strong> that graphare either the neighbor nodes belong<strong>in</strong>g to the set or <strong>in</strong> the set of neighbors.Two rules are proposed to reduce the number of <strong>in</strong>ternal nodes.Another genre of solutions was the cluster-based approach, where nodes organizethemselves <strong>in</strong> clusters and nom<strong>in</strong>ate cluster heads to do the rout<strong>in</strong>g. [6],[12], [13] perform cluster<strong>in</strong>g for a hierarchical rout<strong>in</strong>g scheme, but not ma<strong>in</strong>lyfor efficient flood<strong>in</strong>g. This scheme depends on the complete neighbor <strong>in</strong>formationand <strong>in</strong>curs an overhead due to exchange of ‘HELLO’ messages. These classicalcluster<strong>in</strong>g approaches focus on form<strong>in</strong>g clusters but do not have an optimal connectedset with least number of clusters. More recent work like [5] is based onself-prun<strong>in</strong>g methods that makes local decisions on the forward<strong>in</strong>g status. Thisdepends on small clustered topology creation which changes dynamically. However,this work forms a topology of nodes <strong>in</strong>volved <strong>in</strong> the search<strong>in</strong>g, but does nothave cluster<strong>in</strong>g, it is completely granular to s<strong>in</strong>gle node level.8 ConclusionThis paper exam<strong>in</strong>ed a novel approach for efficient search<strong>in</strong>g <strong>in</strong> ad-hoc sensornetworks. The results <strong>in</strong> section 7 show the trade-off(s) <strong>in</strong>volved <strong>in</strong> the IDEAalgorithm(s),described <strong>in</strong> this paper, compared to classical search and queryalgorithms. This paper <strong>in</strong>cludes several contributions. First, IDEA algorithmis probably the first algorithm (to the best of author’s knowledge) to use theiterative-deepen<strong>in</strong>g algorithm to efficiently control the flood<strong>in</strong>g <strong>in</strong> a ad-hoc sensornetwork. Second, the token-based algorithm T-IDEA, gives a self-stabiliz<strong>in</strong>gapproach to dynamically adapt to the constra<strong>in</strong>ts of <strong>in</strong>dividual nodes <strong>in</strong> thenetwork. Unlike previous approaches, this does not use any complex algorithmbut is based on the local decisions, based on per-node characteristics, made <strong>by</strong>the nodes <strong>in</strong>dividually <strong>in</strong> the sensor network. F<strong>in</strong>ally simulations show that theIDEA algorithm (s) perform better that the classical approaches <strong>in</strong> an energyconstra<strong>in</strong>ednetwork environment. IDEA and T-IDEA reduce the aggregate en-


210 S. Patilergy consumption of the network significantly, while ma<strong>in</strong>ta<strong>in</strong><strong>in</strong>g the quality ofresults. This <strong>in</strong>creases the average lifetime of the network with an <strong>in</strong>creasedperformance and scalability.AcknowledgementsI would like to thank my advisor Prof.Samir R. Das for his valuable suggestionsand discussions dur<strong>in</strong>g this research work. I am also grateful to my colleaguesat the WINGS Lab <strong>in</strong> the Department of <strong>Computer</strong> <strong>Science</strong> at SUNY at StonyBrook.References1. C. Perk<strong>in</strong>s, E. Royer, S. Das, Ad hoc on demand distance vector(AODV) rout<strong>in</strong>g,http://www.ietf.org/<strong>in</strong>ternet-drafts/draft-ieftmanet-aodv-03.txt, 1999.2. D.B. Johnson and D.A. Maltz, Dynamic source rout<strong>in</strong>g <strong>in</strong> ad hoc wireless networks,Mobile Comput<strong>in</strong>g, Academic Publishers,1996. pp. 153-181.3. S.-J. Lee, W. Su, and M. Gerla On-Demand Multicast Rout<strong>in</strong>g Protocol (ODMRP)for Ad Hoc Networks, Internet Draft, draftietf-manet-odmrp-02.txt, Jan. 20004. I. Stojmenovic, M. Seddigh, and J. Zunic, Internal node based broadcast<strong>in</strong>g algorithms<strong>in</strong> wireless networks, <strong>in</strong> Proceed<strong>in</strong>gs of the HawaiiInt. Conf. on System<strong>Science</strong>s, Jan. 2001.5. B. Chen, K. H. Jamieson, and R. Morris An energy-efficient coord<strong>in</strong>ation algorithmfor topology ma<strong>in</strong>tenance <strong>in</strong> Ad Hoc wireless networks, Mobicom, 20016. C.R. L<strong>in</strong> and M. Gerla, Adaptive Cluster<strong>in</strong>g for Mobile Wireless Networks, IEEEJournal on Selected Areas <strong>in</strong> Communications, Vol. 15, No. 7, Sep. 1997, pp. 1265-1275.7. I. Stojmenovic, M. Seddigh, and J. Zunic, Dom<strong>in</strong>at<strong>in</strong>g sets and neighborelim<strong>in</strong>ation-based broadcast<strong>in</strong>g algorithms <strong>in</strong> wireless networks, IEEE Transactionson Parallel and Distributed Systems, vol. 12, no. 12, Dec.2001.8. W. Peng and X.C. Lu, On the reduction of broadcast redundancy <strong>in</strong> mobile adhoc networks, <strong>in</strong> Proceed<strong>in</strong>gs of the Annual Workshop on Mobile and Ad HocNetwork<strong>in</strong>g and Comput<strong>in</strong>g (MobiHOC 2000), Boston, Massachusetts, USA, Aug.2000, pp. 129-130.9. J. Wu and H. Li, A dom<strong>in</strong>at<strong>in</strong>g-set-based rout<strong>in</strong>g scheme <strong>in</strong> ad hoc wireless networks,<strong>in</strong> Proceed<strong>in</strong>gs of the Third Int’l Workshop Discrete Algorithms and Methodsfor Mobile Comput<strong>in</strong>g and Communications (DIALM), Aug.1999, pp. 7-14.10. A. Qayyum, L. Viennot, and A.Laouiti, Multipo<strong>in</strong>t relay<strong>in</strong>g for flood<strong>in</strong>g broadcastmessages <strong>in</strong> mobile wireless networks, <strong>in</strong> Proceed<strong>in</strong>gs of the 35th Annual HawaiiInternational Conference on System <strong>Science</strong>s (HICSS’02), Hawaii, 2002.11. Sze-Yao Ni, Yu-Chee Tseng, Yuh-Shyan Chen, and Jang-P<strong>in</strong>g Sheu, The broadcaststorm problem <strong>in</strong> a mobile ad hoc network, <strong>in</strong> Proceed<strong>in</strong>gs of the MobiCom’99,Seattle WA, Aug. 1999.12. Gerla, M and Tasi, J., A Multi-cluster, mobile, multimedia radio network, ACM-Baltzer Journal of Wireless Networks, Vol. 1 No.3, 199513. Krishna, P., Vaidya, N.H., Chatterjee, M., Pradhan, D.K., A cluster-based approachfor rout<strong>in</strong>g <strong>in</strong> dynamic networks, <strong>Computer</strong> Communication Review, vol.27,(no.2), ACM, April 1997.14. S. Russel and P. Norvig. Artificial Intelligence: A Modern Approach. Prentice-Hall,1995.


On the Interaction of Bandwidth Constra<strong>in</strong>tsand Energy Efficiency <strong>in</strong> All-Wireless NetworksTommy Chu and Ioanis NikolaidisComput<strong>in</strong>g <strong>Science</strong> DepartmentUniversity of AlbertaEdmonton, Alberta T6G 2E8, Canada{tommy,yannis}@cs.ualberta.caAbstract. The m<strong>in</strong>imization of expended energy for unicast and broadcastcommunication between nodes <strong>in</strong> a wireless network has been studiedmostly as a path optimization problem without particular regard forthe traffic load demands. In this paper, we consider the call admissionproblem where<strong>by</strong> given a traffic load (described as source-dest<strong>in</strong>ationrate demands) the required expended energy is m<strong>in</strong>imized. In addition,we explicitly model bandwidth capacity constra<strong>in</strong>ts. The capacity constra<strong>in</strong>tsreflect the fact that, from the perspective of a s<strong>in</strong>gle node, traffic<strong>in</strong>cludes data that the nodes orig<strong>in</strong>ate and forward, as well as trafficthey receive and is of no <strong>in</strong>terest to them. This last class of traffic isunavoidable due to the transmission radius of near<strong>by</strong> stations. Underthe assumption that the MAC protocol behaves <strong>in</strong> an ideal fashion, weconsider two centralized algorithms that attempt to admit the given loadand we remark on their relative performance, especially with respect totheir energy consumption and block<strong>in</strong>g (connection rejection) rate.1 IntroductionApart from elim<strong>in</strong>at<strong>in</strong>g the need for a pre-exist<strong>in</strong>g <strong>in</strong>frastructure, a serious motivationbeh<strong>in</strong>d the deployment of wireless networks is the ability to establishconnectivity among, hopefully, unrestricted number of wireless nodes. Naturally,the extent to which this is doable has to do with the volume of carried trafficand the extent to which the radio spectrum is wisely reused among all participat<strong>in</strong>gnodes. While a sufficiently <strong>in</strong>tense traffic load can render any network<strong>in</strong>adequate, the idea of proper reuse of the radio spectrum <strong>in</strong> light of compet<strong>in</strong>gnodes is not at all solved. In fact, there have been studies, such as the one <strong>in</strong> [1]suggest<strong>in</strong>g that wireless ad hoc networks are, <strong>in</strong> pr<strong>in</strong>ciple, not scalable. That is,the foreseen benefit of spatial reuse of the radio spectrum produces dim<strong>in</strong>ish<strong>in</strong>greturns. The rate at which bandwidth reuse <strong>in</strong>creases with <strong>in</strong>creas<strong>in</strong>g numberof nodes cannot catch up with the <strong>in</strong>creas<strong>in</strong>g load demands that the additionalnodes place on the network.The broadcast wireless advantage, furthermore <strong>in</strong> [2], illustrates the propertyof manipulate the transmission range. Increas<strong>in</strong>g the transmission powercan reach more neighbors while it decreases the spatial reuse and <strong>in</strong>crease theS. Pierre, M. Barbeau, and E. Kranakis (Eds.): ADHOC-NOW 2003, LNCS <strong>2865</strong>, pp. 211–222, 2003.c○ Spr<strong>in</strong>ger-Verlag Berl<strong>in</strong> Heidelberg 2003


212 T. Chu and I. Nikolaidisenergy demands. Clearly, <strong>in</strong> reality, not all nodes are expected to place the sameload burden on a wireless network. One cannot discount the value of nodes thatpotentially forward traffic but do not <strong>in</strong>troduce their own traffic (or lots of theirown traffic). In this sense, even if the asymptotic dim<strong>in</strong>ish<strong>in</strong>g returns of spatialreuse dom<strong>in</strong>ate, the scale of the network at which the <strong>in</strong>troduced load dom<strong>in</strong>atesover space reuse may be sufficiently large for most applications. What becomesevident at this po<strong>in</strong>t is that the allocation of source-dest<strong>in</strong>ation demands onactual paths <strong>in</strong> a wireless network, specifically <strong>in</strong> an ad hoc network, has notbeen widely studied as a function of the source-dest<strong>in</strong>ation loads. The conceptof a load matrix is certa<strong>in</strong>ly old and quite heavily used <strong>in</strong> circuit switch<strong>in</strong>gnetworks [3]. We will use it <strong>in</strong> the context of path establishment <strong>in</strong> a packetswitch<strong>in</strong>gwireless network. The idea is to assign all the source-dest<strong>in</strong>ation paths<strong>in</strong> an ad hoc network, such that their global (over all nodes) energy demandsare collectively m<strong>in</strong>imized. How packet transmissions take place, at each <strong>in</strong>termediatehop, are left outside the scope of the paper. Suffice is to say that weconsider the existence of an ideal MAC protocol which properly synchronizes thetransmission of compet<strong>in</strong>g nodes without caus<strong>in</strong>g any undue reduction on theeffective capacity. The particular problem of implemented MAC protocols thatprovide coord<strong>in</strong>ated access to the medium <strong>in</strong> order to capitalize on spatial reuseis left outside the scope of the paper, and it is a research topic on its own right,e.g., [4,5].In a wireless environment, each transmission is a local broadcast, that is, itis received <strong>by</strong> more than just the next hop along the path. As such, even thoughnodes outside the path from source to dest<strong>in</strong>ation are un<strong>in</strong>terested <strong>in</strong> the specificpacket (they will neither forward it, nor they are the <strong>in</strong>tended dest<strong>in</strong>ation), theywill nevertheless “hear” it. Assum<strong>in</strong>g the energy required to receive a packetis substantially small, at least compared to transmitt<strong>in</strong>g a packet, overhear<strong>in</strong>gpackets can result <strong>in</strong> a small energy penalty but, more importantly, it results <strong>in</strong>a congestion penalty. That is, the nodes that overhear the packet transmissionshave to refra<strong>in</strong> from us<strong>in</strong>g the medium for their own purposes.Consider a specific node, i, that is with<strong>in</strong> the range of several other nodes.Let us assume that these other nodes transmit traffic of τ i bits per second total.The specific node is liable for forward<strong>in</strong>g some of this received traffic, Θ i bitsper second (clearly Θ i ≤ τ i ). F<strong>in</strong>ally, the node also orig<strong>in</strong>ates some of the traffic(acts as a source) for a load of A i bits per second. From the perspective of thenode, the wireless medium provides a capacity of C bits per second. In orderfor the routes <strong>in</strong> the network to be feasible, the capacity constra<strong>in</strong>t τ i + Θ i +A i ≤ C must be satisfied at each nodes <strong>in</strong> the network. We note however, thatany technique that attempts to m<strong>in</strong>imize energy consumption, will attempt tom<strong>in</strong>imize transmission radii. The result is that energy consumption reduction isexpected to force τ i to be reduced as well, except for the fraction that has tobe absolutely (because of the topology) forwarded <strong>by</strong> node i which implies thatthe least traffic possible as seen from node i is 2Θ + A i ≤C. Nevertheless, τ i alsoreflects the fact that nodes are assigned a particular transmission range to ensurethe connectivity of the network, or more specifically, the existence of paths from


On the Interaction of Bandwidth Constra<strong>in</strong>ts and Energy Efficiency 213source to dest<strong>in</strong>ation (if we care only about particular source-dest<strong>in</strong>ation pairsand not about the connectivity of nodes that have no traffic to send or receive).Hence, too low a τ i can result <strong>in</strong> a disconnected topology.For the sake of exposition, we will consider the problem of f<strong>in</strong>d<strong>in</strong>g pathsbetween source-dest<strong>in</strong>ation pairs <strong>in</strong> static wireless networks. We will be given atraffic matrix which <strong>in</strong>dicates the traffic load between each source-dest<strong>in</strong>ationpair. The load is asymmetric (that is, the load from A to B is not necessarily equalto the load from B to A) and is non-zero for all source-dest<strong>in</strong>ation pairs (butcan be arbitrarily small). Each source-dest<strong>in</strong>ation pair will subsequently haveto be routed us<strong>in</strong>g multiple <strong>in</strong>termediate hops. If no capacity constra<strong>in</strong>ts arepresent, a source-dest<strong>in</strong>ation pair can pick the lowest energy cost from source todest<strong>in</strong>ation us<strong>in</strong>g a conventional shortest path algorithm. That is, the shortestpath algorithm can be applied on a graph <strong>in</strong> which the costs stand for thedistance between the nodes raised to the loss exponent. For a s<strong>in</strong>gle sourcedest<strong>in</strong>ationpair, and if no other traffic or bandwidth constra<strong>in</strong>ts existed, thatwould be the optimum solution. We note that the unicast energy m<strong>in</strong>imizationproblem is <strong>in</strong> fact a shortest path problem, compared to the multicast/broadcastenergy m<strong>in</strong>imization problem, which is known to be NP-hard [6].Unfortunately, the general case of the problem (multiple source-dest<strong>in</strong>ationdemands, capacity constra<strong>in</strong>ts and wireless broadcast nature) is sufficiently complexto defy currently a simple answer. We note that the first two features (multiplesource-dest<strong>in</strong>ation demands, capacity constra<strong>in</strong>ts) render the problem a caseof the node-capacitated multi-commodity flow class of problems. That is, eachnode has a capacity as a constra<strong>in</strong>t while each node pair need to established aflow and deliver amount of traffic concurrently <strong>in</strong> a network. This problem is alsoshown to be NP hard [7], and many approximation algorithms have been proposed.Unfortunately, the literature on the topic does not consider the broadcastnature of the wireless medium, and thus the fact that τ i is not just a functionof the traffic <strong>in</strong>tended to be received <strong>by</strong> i but also of the traffic of other nodesthat are “near” i - i.e., it depends on the geometric features of the topology. It isthus not surpris<strong>in</strong>g that results on node-capacitated multi-commodity flow arespecific to particular topologies, e.g., r<strong>in</strong>gs [8]. The general case appears to bean extremely complex case, even without the presence of mobility.We po<strong>in</strong>t out that several versions of the basic problem exist. For example,transmission and reception <strong>by</strong> a node are lumped <strong>in</strong>to one capacity constra<strong>in</strong>tonly. Clearly, separate channels can be used for transmitt<strong>in</strong>g and receiv<strong>in</strong>g, withseparate fixed capacities. Secondly, we assume knowledge of the traffic loadsbetween all source-dest<strong>in</strong>ation. If the traffic load matrices present only knowledgeof the average load.2 AlgorithmsLet us assume that we have been given the costs D[u][v] between any two nodesu and v. The costs are determ<strong>in</strong>ed as the Euclidian distance between the po<strong>in</strong>ts,raised to the power of the loss exponent. The follow<strong>in</strong>g two simple heuristics


214 T. Chu and I. Nikolaidisaim at produc<strong>in</strong>g paths among all source-dest<strong>in</strong>ation pairs subject to the pernodebandwidth constra<strong>in</strong>ts and with the objective of m<strong>in</strong>imiz<strong>in</strong>g the powerconsumption.The <strong>in</strong>itial topology graph considered, G(V,E), is completely connected. Subsequentlyedges are removed to ensure that the capacity constra<strong>in</strong>ts are not violated.T is the set of source-dest<strong>in</strong>ation demands, where<strong>by</strong> T i,j is the demand(bits per second) from node i to node j. Ps is the set of all paths establishedwith the <strong>in</strong>tention of m<strong>in</strong>imiz<strong>in</strong>g energy cost. Shortest Path(G(V,E), D, source,dest<strong>in</strong>ation, Path) is any straightforward implementation of the shortest pathalgorithm from source node to dest<strong>in</strong>ation node on a graph whose connectivity iscaptured <strong>by</strong> G(V,E) and the edge costs are captured <strong>by</strong> D. The Shortest Path()returns true if a path is found and false if it could not, because the source anddest<strong>in</strong>ation are <strong>in</strong> two different connected components.2.1 Successive M<strong>in</strong>imum Energy PathsSuccessive_M<strong>in</strong>imum_Energy_Paths (Input: V, D, P, T; Output Ps)1: for all u ∈ V do2: C[u] ←03: end for4: G(V,E) ← completely connected graph of V nodes5: while T ≠ ∅ do6: select T i,j from T7: R ← C8: repeat9: reconstruct ← false10: if (!Shortest P ath(G, P, i, j, P ath)) then11: return (INFEASIBLE)12: else13: for all (u, v) ∈ P ath do14: for all x ∈ V do15: if D[u][v] ≤ D[u][x] then16: R[x] ← R[x]+T i,j17: end if18: if R[x] > capacity then19: reconstruct ← true20: end if21: end for22: end for23: if (!reconstruct) then24: C ← R25: Ps ← Ps∪ P ath26: else27: for all (u, v) ∈ P ath do28: for all (x, y) ∈ E do


On the Interaction of Bandwidth Constra<strong>in</strong>ts and Energy Efficiency 21529: if (R[x] > capacity and D[x][y] >D[x][u] − D[u][v]) then30: E = E\(x, y)31: end if32: end for33: end for34: end if35: end if36: until (!reconstruct)37: T ← T \T i,j38: end while39: return (F EASIBLE)Psuedocode 1: Successive M<strong>in</strong>imum Energy PathsIn the first algorithm we create one (for each source-dest<strong>in</strong>ation pair) m<strong>in</strong>imumenergy path at a time. Such path construction can employ the shortestpath algorithm, e.g. the Bellman Ford algorithm, with the transmitt<strong>in</strong>g energyas the cost. We cont<strong>in</strong>ue add<strong>in</strong>g paths, until the capacity constra<strong>in</strong>t of one nodeis exceeded. We will reduce the maximum transmission power level of each nodewhose transmission violated the capacity of the node <strong>in</strong> question. The reductionof the transmission power is captured <strong>by</strong> remov<strong>in</strong>g the correspond<strong>in</strong>g edges and,subsequently, rerunn<strong>in</strong>g the shortest path. Hypothetically, it is still possible thatthe new path will <strong>in</strong>fluence the load of the removed edges, due to the near<strong>by</strong>nodes relay<strong>in</strong>g its traffic. Subsequently, we remove nodes as relays from considerationand re-run the shortest-path algorithm. The process cont<strong>in</strong>ues until a pathcan be found that does not exceed the capacity constra<strong>in</strong>ts of any of the nodes ittraverses through and of any of the nodes that overhear its transmission. Therefore,the order of path construction is critical to the outcome. We also note thatcerta<strong>in</strong> traffic load matrices are simply <strong>in</strong>feasible they cannot be accommodated,because one or more source-dest<strong>in</strong>ation paths cannot be established.2.2 All Pairs M<strong>in</strong>imum Energy PathsAll_Pairs_M<strong>in</strong>imum_Energy_Paths(Input: G(V,E),D,P,T; Output Ps)1: All P airs Shortest P aths(G, P, P s)2: for all u ∈ V do3: C[u] ← capacity4: end for5: for all T i,j ∈ T do6: for all (u, v) ∈ Ps i,j do7: for all x ∈ V do8: if (P [u][v] ≤ P [u][x]) then9: C[x] ← C[x] − T i,j10: end if11: end for


216 T. Chu and I. Nikolaidis12: end for13: end for14: while (true) do15: m<strong>in</strong>Node ←−116: m<strong>in</strong>C ← <strong>in</strong>f17: for all x ∈ V do18: if (C[x] < 0 and C[x] < m<strong>in</strong>C) then19: m<strong>in</strong>Node ← x20: m<strong>in</strong>C ← C[x]21: end if22: end for23: if (m<strong>in</strong>Node = −1) then24: return (F EASIBLE)25: end if26: for all Ps i,j <strong>in</strong>P s do27: for k =1to |Ps i,j |−2 do28: s ← Ps i,j [k]29: via ← Ps i,j [k +1]30: d ← CurrentP ath[k +2]31: if (P [s][via] ≤ P [s][m<strong>in</strong>Node] andP [via][d] ≤ P [via][m<strong>in</strong>Node]) then32: for all v ∈ V do33: if (D[via][v] ≤ D[via][d]) then34: C[v]+ = T i,j35: end if36: Ps i,j ← Ps i,j − via37: end for38: end if39: end for40: end for41: if C[m<strong>in</strong>Node] < 0 then42: return (INFEASIBLE)43: end if44: end whilePsuedocode 2: All Pairs M<strong>in</strong>imum Energy PathsIn the second heuristic, All Pairs Shortest Paths(V,D,Ps) is an all pairsshortest path algorithm applied on aVvertex completely connected graph. Thecosts of the edges are provided <strong>in</strong> D and the result<strong>in</strong>g paths returned <strong>in</strong> Ps. Psis a set of paths. With slight abuse of syntax, Ps i,j represents the path from i toj <strong>in</strong> set Ps, and Ps ij [k] isthek th vertex along the paths from i to j from set Ps.This algorithm is based on the idea of all-pairs shortest paths algorithm suchas the Floyd-Warshall algorithm, which runs <strong>in</strong> O(N 3 ) time. We exam<strong>in</strong>e thenodes where the bandwidth constra<strong>in</strong>t is violated. We first f<strong>in</strong>d out a node such


On the Interaction of Bandwidth Constra<strong>in</strong>ts and Energy Efficiency 217that its bandwidth violation is the most. Then, we will fix the transmission radiiof the nodes <strong>in</strong> the vic<strong>in</strong>ity of the node found <strong>in</strong> violation of the capacity constra<strong>in</strong>t.If a path be<strong>in</strong>g overheard <strong>by</strong> the node with the capacity violation turnsout to consist of a two-hop sub-path and two correspond<strong>in</strong>g transmission radiicover that constra<strong>in</strong>ed node, we will reduce it to one-hop path if possible. Theidea is taken from the triangulation relaxation of the shortest path construction.Note that when we compute the m<strong>in</strong>imum energy path, the relaxation step <strong>by</strong>add<strong>in</strong>g an edge to any exist<strong>in</strong>g path can reduce the cost of a specific node. Tothis end, we have computed the m<strong>in</strong>imum energy path but we would like tosatisfy the bandwidth constra<strong>in</strong>t <strong>by</strong> sacrific<strong>in</strong>g energy consumption. Hence, wewill take the reverse procedure of the relaxation step. We will select the firsttwo-hop sub-path with such property, and after we replace it <strong>by</strong> a s<strong>in</strong>gle relay,we will remove the load from these two hops and recalculate the load for thenew s<strong>in</strong>gle transmission. This exam<strong>in</strong>ation process will cont<strong>in</strong>ue until no nodehandl<strong>in</strong>g or overhear<strong>in</strong>g the traffic or no path re-construction has been made.This approach differs from the previous one <strong>in</strong> the process of repair<strong>in</strong>g path.The previous algorithm considers the reconstruction of the entire path whilethis approach considers the subsection of a path that causes the bandwidth constra<strong>in</strong>tviolation. Aga<strong>in</strong>, it is totally with<strong>in</strong> reason to end up with an <strong>in</strong>feasibleconfiguration.3 Simulation StudyThe cost we computed captures the global energy consumption. After we constructthe paths from all source-dest<strong>in</strong>ation pairs, we compute the total transmissionenergy consumption. If a node is <strong>in</strong>volved the communication of differentsource-dest<strong>in</strong>ation pair, its transmission power may not be the same <strong>in</strong> these differentpaths. As a result, we consider the total transmission power Energy[i ][j]for a particular path, and us<strong>in</strong>g T i,j as the weight for each paths’ transmissionpower, the average global energy consumption is equal to the sum of T i,j x Energy[i][j].That is, further<strong>in</strong>g the concept of an ideal MAC, the cost calculationassumes that a node can vary its transmission power depend<strong>in</strong>g on the dest<strong>in</strong>ationof the packet be<strong>in</strong>g handled each time. The simulations were conducted withrandomly placed nodes with<strong>in</strong> a 1500x500 rectangular area and without nodemobility. The capacity of each node, C, was the unit of bandwidth, hence C=1throughout the simulations. The traffic load matrix, T i,j , was produced <strong>in</strong> a randomfashion. Specifically, each element of T i,j , is uniformly randomly generatedto be a demand between 0 and L/2(N-1) (where L is a parameter controll<strong>in</strong>gthe relative load over all nodes and N is the number of nodes). The particularformula guarantees that the sum of traffic orig<strong>in</strong>at<strong>in</strong>g from source i is less thanwhich guarantees that the load of another nodes due to forward<strong>in</strong>g the load ofthis source-dest<strong>in</strong>ation pair is go<strong>in</strong>g to be less than 1 (i.e. A i =y:x=i∧ j ∈V ∧ y= ∑ T x,j ≤ 1 ). Note however the restriction of the traffic matrix andcapacity generation is not sufficient to avoid <strong>in</strong>feasible solution scenarios. Therelative load is a predef<strong>in</strong>ed parameter while the absolute load is def<strong>in</strong>ed as the


218 T. Chu and I. Nikolaidis1.8E+091.6E+09Global Energy Consumption1.4E+091.2E+091.0E+098.0E+086.0E+084.0E+082.0E+080.0E+00N=10N=20N=30N=500 0.5 1 1.5 2Offered Traffic LoadFig. 1. The global energy consumption for Successive M<strong>in</strong>imum Energy Paths Algorithmselect<strong>in</strong>g the source-dest<strong>in</strong>ation paths to admit <strong>in</strong> arbitrary node number.sum of all traffic load divide <strong>by</strong> the relative load ( ∑ T i,j /L). The simulation arefor N=10, 20, 30, and 50 nodes and, L=0.1 to 2 <strong>in</strong> 0.1 <strong>in</strong>terval. The traffic loadis between 0 and 2 because we would like to show the spatial reuse feature of adhoc network (revealed when the load is larger than 1). The simulation resultsare shown <strong>in</strong> Fig. 1 and Fig. 2 for the first algorithm and <strong>in</strong> Fig. 3 and Fig. 4for the second algorithm.The results are expressed as a relation between global energy consumptionand the average traffic load. Our <strong>in</strong>tuition would suggest that the more theload, the more the nodes that end up violat<strong>in</strong>g their respective constra<strong>in</strong>ts, thelonger the paths to avoid such congested nodes, hence, the more the energyrequired. This situation is partly what happens <strong>in</strong> Fig. 1. However, the graphshows that the energy consumption drops when the load is near 0.8. The figureis mislead<strong>in</strong>g <strong>in</strong> this respect because what is miss<strong>in</strong>g is the fact that several ofthe runs that correspond to the po<strong>in</strong>t at 0.8 and higher resulted <strong>in</strong> <strong>in</strong>feasiblescenarios. Fig. 2 demonstrates the ratio of <strong>in</strong>feasible solution correspond<strong>in</strong>g tothe result generated from the successive m<strong>in</strong>imum energy paths algorithm withunordered path construction. With 50 nodes, the number of <strong>in</strong>feasible solution isaround 90 A more def<strong>in</strong>ite result from our simulations suggests that the globalenergy decreases as the number of nodes <strong>in</strong>creases with the same simulationarea. This is because and additional node provides an opportunity for paths tobe split along a longer path where the sum of energy required over the entire pathis lower than with fewer <strong>in</strong>termediate hops. Nevertheless, this cannot counter thefact that additional nodes produce a higher node density and a higher probability


On the Interaction of Bandwidth Constra<strong>in</strong>ts and Energy Efficiency 219Fraction of Infeasible Solutions10.90.80.70.60.50.40.30.20.10N=10N=20N=30N=500 0.5 1 1.5 2Relative loadFig. 2. Percentage of <strong>in</strong>feasible solution correspond<strong>in</strong>g to Fig. 1.that the transmissions will congest other nodes, and hence it restricts paths frombe<strong>in</strong>g available. The unavailability of a path therefore has a direct impact on theability of conserve energy <strong>by</strong> us<strong>in</strong>g it as a relay.Apply<strong>in</strong>g the Successive M<strong>in</strong>imum Energy Paths construction, we f<strong>in</strong>d thatit is highly unlikely to obta<strong>in</strong> the optimal solution (or even a solution when thetraffic demand is high) for this multiple source-dest<strong>in</strong>ation demands and energyconsumption optimization problem. Our experiments were also run with differentorder for path construction, such as <strong>in</strong>creas<strong>in</strong>g traffic demands or decreas<strong>in</strong>gtraffic demands for the source-dest<strong>in</strong>ation pairs, but the results are similar tothe ones reported here. The Successive M<strong>in</strong>imum Energy Paths algorithm constructsone path at a time us<strong>in</strong>g the shortest path algorithm us<strong>in</strong>g the energycost matrix. Each path construction achieves the m<strong>in</strong>imum energy consumptionrequirement of a particular path. However, <strong>in</strong> the Successive M<strong>in</strong>imum EnergyPaths algorithm, the bandwidth reservation is performed <strong>by</strong> ignor<strong>in</strong>g the alreadyallocated source-dest<strong>in</strong>ation pairs.Furthermore, we observe that <strong>in</strong> order to m<strong>in</strong>imize the energy consumption,the path construction process will likely end up with a longer path. Assume Sis the source node and D is the dest<strong>in</strong>ation node. An additional node R caneither act a relay transmission such that the path is from S to R and fromR to D or sitt<strong>in</strong>g there overhear<strong>in</strong>g it. The distance between a node pair isdenoted d i,j , and the energy usage is (d i,j ) α , where α is correspond<strong>in</strong>g to theloss exponent (2 ≤ α ≤ 4). Assume d S,D is equal to 5 units of distance; d S,R andd S,D are equal to 3 units. With the energy as the cost matrix, s<strong>in</strong>ce (d S,D ) α ≥(d S,R ) α +(d R,D ) α , R will not act as an relay, and therefore D will <strong>in</strong>crease the


220 T. Chu and I. Nikolaidis2.0E+101.8E+10Global Energy Consumption1.6E+101.4E+101.2E+101.0E+108.0E+096.0E+094.0E+092.0E+090.0E+00N=10N=20N=30N=500 0.5 1 1.5 2Offered Traffic LoadFig. 3. Simulation results for All Pairs M<strong>in</strong>imum Energy Pathsoverhear<strong>in</strong>g traffic twice. Although the energy consumption is reduced, each nodeconsumes capacity because of overhear<strong>in</strong>g the traffic (S will overhear the relay<strong>in</strong>gtransmission of R, and R will receive and transmit, act<strong>in</strong>g as relay, the traffic fromS, thus consum<strong>in</strong>g its capacity). As the loss exponent <strong>in</strong>tensifies, this scenariooccurs more often. Even if we attempt to reconstruct the particular constra<strong>in</strong>tviolatedpath, there may not exist a route from the source to the dest<strong>in</strong>ation.As a result, most of the overhear<strong>in</strong>g traffic dra<strong>in</strong>s out the bandwidth capacityand results <strong>in</strong> the <strong>in</strong>feasible solution.Our conclusion from the Successive M<strong>in</strong>imum Energy Paths constructionis that us<strong>in</strong>g the shortest path algorithm with the transmission power as thecost matrix results <strong>in</strong> the m<strong>in</strong>imum energy path construction for the particularsource-dest<strong>in</strong>ation pair. However, the overall traffic demands grow due to theuse of relays and the capacity allocation becomes <strong>in</strong>feasible. The All Pairs M<strong>in</strong>imumEnergy Paths Construction creates all m<strong>in</strong>imum energy paths without theknowledge of the traffic demands. The result<strong>in</strong>g energy cost is subsequently compromised(<strong>in</strong>creased) <strong>in</strong> order to “fix” the capacity violations, us<strong>in</strong>g the <strong>in</strong>verseof the triangle relaxation.The simulation of All Pairs M<strong>in</strong>imum Energy paths uses the same <strong>in</strong>putparameters, and the result are also expressed with global energy consumptionand the probability of hav<strong>in</strong>g <strong>in</strong>feasible solution shown <strong>in</strong> Fig. 3 and Fig. 4 respectively.A comparison of Fig. 2 and Fig. 4 suggests that All Pairs M<strong>in</strong>imumEnergy provides a better potential for spatial reuse (the load exceeds 1 and stillresults <strong>in</strong> feasible configurations). In fact, when the traffic load is equal to 1.3<strong>in</strong> the 50 nodes scenario, the number of <strong>in</strong>feasible solutions was 0. The energy


On the Interaction of Bandwidth Constra<strong>in</strong>ts and Energy Efficiency 221Fraction of Infeasible Solutions10.90.80.70.60.50.40.30.20.10N=10N=20N=30N=500 0.5 1 1.5 2Offered Traffic LoadFig. 4. Percentage of <strong>in</strong>feasible solutions correspond<strong>in</strong>g to the Fig. 3.consumption curve rises when the load is around than 0.6. A similar observationfrom the previous result is that the global energy consumption <strong>in</strong>creases as thenumber of participat<strong>in</strong>g node decreases. Still, as the load <strong>in</strong>creases, the global energyconsumption curve rise abruptly captur<strong>in</strong>g an, almost exponential, <strong>in</strong>creaseof energy consumption <strong>in</strong> order to produce a feasible solution. The first explanationis that the energy consumption rises quickly because we do not f<strong>in</strong>d twoparticular small amount energy transmissions to replace via the <strong>in</strong>verse-trianglerelaxation. Another reason is, of course, that the load cannot be accommodated.4 ConclusionsIn this paper we considered the problem of energy m<strong>in</strong>imization <strong>in</strong> a bandwidthconstra<strong>in</strong>ed ad hoc wireless environment. The apparent tendency of energy m<strong>in</strong>imizationto reduce transmission radii would appear to be <strong>in</strong> agreement withspatial reuse (which benefits from transmission radius reduction as well). Unfortunately,<strong>in</strong> a bandwidth constra<strong>in</strong>ed sett<strong>in</strong>g, it becomes immediately obviousthat m<strong>in</strong>imization of energy results <strong>in</strong> longer paths, add<strong>in</strong>g to the congestion anddim<strong>in</strong>ish<strong>in</strong>g the benefits of spatial reuse. The observation applies to large networkconfigurations, leav<strong>in</strong>g potential for smaller network configurations (loadwiseand node-wise) to still benefit <strong>by</strong> the choice of the right path constructionheuristic. Two such heuristics are studied <strong>in</strong> this paper, and it appears that ascheme that attempts to reduce the load of relay nodes could result <strong>in</strong> improvedperformance for a modest sacrifice <strong>in</strong> energy consumption. The next step is to


222 T. Chu and I. Nikolaidisattack the problem from the viewpo<strong>in</strong>t of optimization to appreciate how the<strong>in</strong>troduction of each capacity constra<strong>in</strong>t diverts the search towards the mimimalenergy solution.References1. P. Gupta and P. Kumar, “Capacity of Wireless Networks,” IEEE Transactions onInformation Theory, vol.46, no 2, p.388-404, Mar 2000.2. J. E. Wieselthier, G. Nguygen, and A. Ephremides, “On the Construction of EnergyEfficient Broadcast and Multicast trees <strong>in</strong> Wireless Networks,” In Proc. of IEEEINFOCOM 2000, Tel-Aviv, Israel, vol.2, p.585-594, Mar 2000.3. A. Med<strong>in</strong>a, N. Taft, K. Salamatian, S. Bhattacharyya, and C. Diot, “Traffic MatrixEstimation: Exist<strong>in</strong>g Techniques and New Directions,” In Proc. of the 2002 conferenceon Applications, Technologies, Architectures, and Protocols for <strong>Computer</strong>Communications, Pittsburgh, Pennsylvania, USA, p.161-174, Aug 2002.4. M. Mar<strong>in</strong>a, G. Kondylis, and U.C. Kozat, “RBRP: A Robust Broadcast ReservationProtocol for Mobile Ad Hoc Networks,” In Proc. of IEEE/ICC-2001, Hels<strong>in</strong>ki,F<strong>in</strong>land,vol.3, p.878-885, Jun 2001.5. Z. Tang and J. Garcia-Luna-Aceves, “A Protocol for Topology-Dependent TransmissionSchedul<strong>in</strong>g,” In Proc. of IEEE WCNC 1999, New Orleans, Las Angelas,USA, vol.3, p.1333-1337, Sep 1999.6. M. Cagalj, J.-P. Hubaux, and C. Enz, “M<strong>in</strong>imum-Energy Broadcast <strong>in</strong> All-WirelessNetworks: NP-Completeness and Distribution Issues,” In Proc. of 8 th Annual InternationalConference on Mobile Comput<strong>in</strong>g and Network<strong>in</strong>g, Atlanta, Georgia, USA,p.172-182, Sep 2002.7. V. Guruswami, S. Khanna, B. Shepherd, R. Rajaraman and M. Yannakakis, “Near-Optimal Hardness Results and Approximation Algorithms for Edge-Disjo<strong>in</strong>t Pathsand Related Problems,” In Proc. of the 31 st Annual ACM Symposium on Theoryof Comput<strong>in</strong>g, Atlanta, Georgia, USA, p.19-28, May 1999.8. V. Tandon, A. Frank, and Z. Vegh, “Node-capacitated Multicommodity Rout<strong>in</strong>g fora R<strong>in</strong>g,” Math. of Operations Research, vol.27, no.2, p.372-383, May 2002.


Automated Meter Read<strong>in</strong>g and SCADAApplication for Wireless Sensor NetworkFrancisco Javier Mol<strong>in</strong>a, Julio Barbancho, and Joaqu<strong>in</strong> LuqueDepartamento de Tecnologia Electronica, University of Seville,C/ Virgen de Africa, 7. Seville 41011, Spa<strong>in</strong>{fjmol<strong>in</strong>a,jbarbancho,jluque}@us.esTel.: (+034) 954 55 28 35, Fax: (+034) 954 55 28 33Abstract. Currently, there are many technologies available to automatepublic utilities services (water, gas and electricity). AMR, AutomatedMeter Read<strong>in</strong>g, and SCADA, Supervisory Control and Data Acquisition,are the ma<strong>in</strong> functions that these technologies must support. Inthis paper, we propose a low cost network with a similar architecture toa static ad-hoc sensor network based on low power and unlicensed radio.Topological parameters for this network are analyzed to obta<strong>in</strong> optimalperformances and to derive a pseudo-range criterion to create anapplication-specific spann<strong>in</strong>g tree for poll<strong>in</strong>g optimization purposes. Inapplication layer services, we analytically study different poll<strong>in</strong>g schemes.Keywords: Automated Meter Read<strong>in</strong>g Application, SCADA, Ad HocNetworks, Spann<strong>in</strong>g Tree Algorithm, Multihop Rout<strong>in</strong>g Protocol.1 IntroductionS<strong>in</strong>ce the 70’s, many technologies have been developed for Automatic MeterRead<strong>in</strong>g functions (AMR) and Distribution Automation (DA) for utility applications(water, gas and electricity) [1,2]. Many studies show that solutionsbased on low power radio networks are viable and that they offer the bestcost/performance ratio[3,4,5]. However, it is only <strong>in</strong> the late 90’s that, radioand microcontroller technologies have allowed the development of smart sensornetworks. We propose (<strong>in</strong> this paper) the use of ad-hoc network technologies tosupport this application because:– ad-hoc protocols are best suited to low power systems,– nodes can be located without pre-plann<strong>in</strong>g,– and topology is more flexible, mak<strong>in</strong>g management simpler.Public utilities’ management has many different aspects closely <strong>in</strong>terrelatedthat must be coord<strong>in</strong>ated with<strong>in</strong> a corporative network: (e.g. Meter read<strong>in</strong>gfrom customer meters, Distribution management, Economic dispatch...) Theseapplications are often distributed throughout many computers. But, customerdata polled from sensor networks, queries, remote control orders and networkmanagement messages must be processed <strong>by</strong> a unique computer named UC -S. Pierre, M. Barbeau, and E. Kranakis (Eds.): ADHOC-NOW 2003, LNCS <strong>2865</strong>, pp. 223–234, 2003.c○ Spr<strong>in</strong>ger-Verlag Berl<strong>in</strong> Heidelberg 2003


224 F.J. Mol<strong>in</strong>a, J. Barbancho, and J. LuqueUtility Controller. UC works as the master that controls many remote units (sensornodes), like a well known architecture called SCADA, Supervisory Controland Data Acquisition. We have called this application ASCADA, AugmentedSCADA, as it has to support typical SCADA functions and additional AMRservices. Some of these are listed below:a) AMR functions. Meter read<strong>in</strong>g or check<strong>in</strong>g an <strong>in</strong>dividual customer, agroup-cluster of meters, and all meters (global read<strong>in</strong>g). These queries couldbe simultaneous, and the execution time must be as short as possible to reducethe read<strong>in</strong>g period. Nowadays, the on-site read<strong>in</strong>g period, carried out<strong>by</strong> an operator, is about two months. The goal is to manage global read<strong>in</strong>gsdaily or weekly.b) Telemetry functions. These services obta<strong>in</strong> data from sensors, and theycontrol some elements located at selected po<strong>in</strong>ts of the distribution network(flow, power, state of valves or switches, etc.) Distribution sens<strong>in</strong>g and automationwill enhance supply services, reduc<strong>in</strong>g failure, alarm and responsetimes. All this data must be polled periodically, and the completion timemust be as short as possible to reduce the bandwidth load.c) Remote control orders. Security and reliability are the ma<strong>in</strong> characteristicsof these services. M<strong>in</strong>imization of transmission time is a general objective.In this case, it is quite important to reduce multiple hops and providedynamic rout<strong>in</strong>g capabilities to enhance reliability. Further functions wouldbe:– encrypted data and sender identification for secure operations,– order sequenc<strong>in</strong>g to avoid duplication,– receipt request for confirmation,– message transmission <strong>in</strong>dicat<strong>in</strong>g the end of the command.c) Alarm transmission. From distribution elements, nodes detect transmissionscaused <strong>by</strong> an exceptional situation. Nodes from customer meters mustnot have this service to avoid network overload.Some AMR services need to use a high percentage of network capacity. Thisfact will be present throughout the paper. The next section analyses topologycharacteristics more closely related to <strong>in</strong>dividual and overall poll<strong>in</strong>g. Section 3presents different strategies to compute and optimize global poll<strong>in</strong>g and simulationresults. F<strong>in</strong>ally, we outl<strong>in</strong>e future work and alternative solutions that arecurrently be<strong>in</strong>g tested.2 Topological Model and PropertiesThe IEEE work<strong>in</strong>g group SC-31 has proposed a set of topological models forAMR systems. Figure 1 shows the model based on a fixed radio network. Eachelement is conceptual and does not necessarily exist <strong>in</strong> the form shown. Devices<strong>in</strong> the topology could be comb<strong>in</strong>ed or reduced to a null element. When they arepresent, elements A, B, C, D and X are <strong>in</strong>termediate devices. The topology cansupport multiple delivery po<strong>in</strong>ts, as shown, separated <strong>by</strong> service boundaries.


Automated Meter Read<strong>in</strong>g and SCADA Application 225Fig. 1. Radio AMR topology model.Table 1. Radio ranges on different scenarios and 100mW radiated power.Band Indoors Outdoors Outdoors(with obstacles) (with <strong>in</strong> l<strong>in</strong>e-sight)433 MHz


226 F.J. Mol<strong>in</strong>a, J. Barbancho, and J. LuqueThe End Devices used <strong>in</strong>clude radio OEMs which are compliant with ETS300-220. In European cities, most of them are located <strong>in</strong>doors (but shouldn’t), sothe radio range ends up be<strong>in</strong>g about 100 m (433 MHz band). The Radio Networkconsists of many End Devices form<strong>in</strong>g a dense network where each node needs amultihop transmission to reach the Utility Controller node. There is no plann<strong>in</strong>gto select node locations, so the network topology has an arbitrary structure likean ad-hoc network, although the amount of nodes will be greater (thousands formedium size cities).Currently, ad-hoc networks are classified <strong>in</strong>to two categories:1. Mobile Ad-hoc Networks -MANET.2. Sensor Ad-hoc Networks.Although the proposed network has some common aspects with sensor networks,it differs from both:– Nodes have no mobility.– Communication is usually between nodes and the UC.– Power is not a ma<strong>in</strong> priority.– Nodes are prone to failure.– They are densely deployed with<strong>in</strong> the range area.– There are few topological changes (on very few occasions a node is added orelim<strong>in</strong>ated and radio range changes rarely occur).Ad-hoc networks do not have any special nodes. However, for an applicationlayer, the Utility Controller will have true a special node. We will use thisproperty for optimiz<strong>in</strong>g network performance. To measure the relationship betweenthese network performances and topology, we def<strong>in</strong>e a simple parameter -Medium Number of Hops a node needs to reach the Utility Controller. is relatedto medium access time from UC to a node, and to global poll<strong>in</strong>g time, also. Wehave estimated <strong>in</strong> various scenarios. The first one is shown <strong>in</strong> figure 2, and itassumes the follow<strong>in</strong>g conditions:1. Network nodes are uniformly distributed across the city, so we can def<strong>in</strong>e adensity parameter.2. All devices are <strong>in</strong>doors, so the radio range will be short and the same for allof them.3. UC is located at center of the net.We will refer to this topology as SR - Short Range Topology. We have proventhat depends ma<strong>in</strong>ly on geometric parameters, and it can be computed approximatelywhen R GC ≫ R SR as it follows:WhereNH ≈ 2 3 H = 2 R GC(1)3 R SR– R GC - Global Radius. It is the radius of a circle that covers all nodes <strong>in</strong> thecity or a significant number of them.


Automated Meter Read<strong>in</strong>g and SCADA Application 227UC- Utility ControllerNodeRR- Radio RangeRGR- Global Range RadiumFig. 2. SR - Short Range Topology.– R SR - Short Radio range. It is the medium value of short radio range ofcommunication equipment.NH is closely related to network topology. It enables comput<strong>in</strong>g networkperformances for several protocols and topologies. M<strong>in</strong>imiz<strong>in</strong>g NH, will greatlyenhance the completion time for the global read<strong>in</strong>g service. This optimization isvery important because global read<strong>in</strong>g would probably be the major load service.Other functions like order and alarm transmission will also be enhanced. AsNH decreases, transmission reliability will grow and service execution time willreduced. One way to enhance previous SR topology is to use those nodes thathave much longer range than R SR as a bridge to reach UC reduc<strong>in</strong>g <strong>in</strong>termediatehops. For example, equipment located outdoors may have a range up to ten timesgreater. Long range nodes could act as a long range subnetwork, able to connectany city area with the UC through fewer <strong>in</strong>termediate hops. Network protocolsmust enable message flow between short range nodes and the closest long rangenodes <strong>in</strong> order to cont<strong>in</strong>ue through the long-range subnetwork. In this way, thenetwork is divided <strong>in</strong>to different clusters with<strong>in</strong> a ma<strong>in</strong> node that belongs to thelong range subnet (see figure 3). We will refer to this topology as SR-LR (ShortRange - Long range) architecture.In this case, as usual, the number of short range nodes is significantly greaterthan the number of large range nodes. It can be shown that NH will be:NH SR−LR ≈ NH SR + NH LR = 2 R LR+ 2 R GC(2)3 R SR 3 R LRNote that NH SR does not depend on geometric parameters. It depends onradio transmission characteristics. However, NH depends on city geometry. Amedium number of hops result<strong>in</strong>g from SR-LR architecture is significantly less


228 F.J. Mol<strong>in</strong>a, J. Barbancho, and J. LuqueUtillity ControlerShort Range NodeRSR-Short Radio RangeLong Range NodeRLR-Long Radio RangeFig. 3. SR-LR architecture.than SR architecture. For example, <strong>in</strong> a medium-size, European city like Seville(Spa<strong>in</strong>) 95% of the population is located <strong>in</strong>side of a circle of about R GC ≈ 5Km.Then:NH SR ≈ 2 50003 1000 =33.33 NH SR ≈ 2 (10003 100 + 5000 )= 10 (3)1000NH is generally a geometric parameter that we have to relate to network orprotocol characteristics. As is shown <strong>in</strong> figure 4, messages flow between the UC,and nodes. They can be described as a token mov<strong>in</strong>g through a spann<strong>in</strong>g tree.Each node represents a hop, and its branches show some of the equipment <strong>in</strong>sideits radio range. A first approximation of the number of transmissions may bederived from <strong>in</strong> a simple way, <strong>in</strong> terms of tokens mov<strong>in</strong>g <strong>in</strong> a spann<strong>in</strong>g tree,under the follow<strong>in</strong>g conditions:1. There is only a token <strong>in</strong> the tree, so there are no collisions.2. The token always jumps between parent and children without retransmission.3. Tokens flow follow<strong>in</strong>g m<strong>in</strong>imum paths.Then:NT = NH (4)These conditions draw an ideal scenario:– where a tree grows,– radially without loops,– all the nodes are <strong>in</strong> service,– and there are no collisions or <strong>in</strong>terference.A first approch for real scenarios can be derived, suppos<strong>in</strong>g that p is theerror rate of transmissions between nodes. In this way retransmissions will be


Automated Meter Read<strong>in</strong>g and SCADA Application 229necessary. We assume also, that p is uniform with<strong>in</strong> the radio range and thesame for all nodes <strong>in</strong> the network. Then, we have proved that the maximumvalue for medium number of transmissions is:NT MAX = 1 · NH (5)1 − pAga<strong>in</strong> NT depends on NH directly. So, f<strong>in</strong>d<strong>in</strong>g the short paths to the UCsold be the basis of topology management and performance optimization. Wehave developed a custom algorithm to f<strong>in</strong>d these paths, but any other would bepossible [9,10,11,12,13,14] (most of these are designed for po<strong>in</strong>t to po<strong>in</strong>t communication).However, ASCADA def<strong>in</strong>es the UC at the application layer as thema<strong>in</strong> node. It is often present as a transmitter or receiver. Topologies describedpreviously make use of these properties to m<strong>in</strong>imize multiple hops and createpreference paths to the UC (based on a m<strong>in</strong>imum hops criteria). Moreover, sensornetworks usually select paths based either on power or quality l<strong>in</strong>k criteria[15,16]. Because a m<strong>in</strong>imum number of transmissions is the objective, our selectedcriteria quantify these transmissions as close as possible to reality. Let i, jbe two neighbor nodes. We def<strong>in</strong>e as pseudo-range from node i to the UC throughj :ρ ij = d j + nt ij d j = m<strong>in</strong> ( )ρ jx ∀x (6)Where d ij is the m<strong>in</strong>imum pseudo-range between j and UC, and nt ij is themedium number of transmissions between i and j, then, equation 6 assures thelocation of a short path follow<strong>in</strong>g a reasonable l<strong>in</strong>k quality along it, and loopfree.3 Augmented Scada Application OptimizationNodes always know the path to root through the parent node, but any selectedalgorithm must allow the root node (UC) to have an approximate image ofcurrent tree topology. This way, packets from nodes to the root do not conta<strong>in</strong><strong>in</strong>formation about rout<strong>in</strong>g. Conversely, messages from root to nodes generallyuse an explicit rout<strong>in</strong>g scheme, so packets must conta<strong>in</strong> <strong>in</strong>formation about thepath. Packet header size must be optimized because radio frames should be asshort as possible to reduce the transmission error ratio, effective bandwidth, etc.We propose <strong>in</strong> the paper to optimize application services <strong>in</strong> such a way sothat message traffic and rout<strong>in</strong>g header size are m<strong>in</strong>imal. In the follow<strong>in</strong>g, wesummarize all these application services:AMR services:– AMR Read : Root sends a read message to a node to read data or check ameter.– AMR Poll: Root sends a message to read data from all meters <strong>in</strong> a node.– AMR Collect: Root sends a message aga<strong>in</strong>, to read data from all nodes of asubtree.


230 F.J. Mol<strong>in</strong>a, J. Barbancho, and J. LuqueTelemetry services:– TLM Poll<strong>in</strong>g. This service <strong>in</strong>itiates a periodic poll<strong>in</strong>g to a subset of nodes,located at distribution po<strong>in</strong>ts. It creates and updates a table called ImageTable with data from sensors which <strong>in</strong>clude a timestamp. This table may beaccessed <strong>by</strong> custom primitives (TLM Read ).– TLM Read. Return data from image table with <strong>in</strong>tegrity <strong>in</strong>formation (timestamp).Remote control services:– RC Send. Root sends a message with orders to control remote device (valves,breakers...).Message must be sequenced to avoid duplication and encryptedfor secure operation. It may be necessary to notify a receipt message, andan order completion message.– AMR Collect service may be the most complex because time m<strong>in</strong>imizationand network overhead reduction are quite difficult to optimize simultaneously.There are many studies for poll<strong>in</strong>g optimization [17,18], but most ofthem use a well def<strong>in</strong>ed topology (rectangular, hexagonal...). The proposednetwork is a random network, we only suppose that nodes are uniformlydeployed either as short-range nodes or long-range nodes. Execution timeand network overheads can be evaluated approximately from topology parameters(see previous section). These values may be used to compare howdifferent poll<strong>in</strong>g schemes may optimize network performance.From the medium number of transmissions, we can compute execution time<strong>in</strong> an ideal context (equation 4) or <strong>in</strong> a more real one (equation 5). We canconsider the collect message like a token mov<strong>in</strong>g along the branches from rootto nodes, and the answer as another token return<strong>in</strong>g back from nodes. The firstapproach is a simple collect<strong>in</strong>g schedule consist<strong>in</strong>g of poll<strong>in</strong>g each node from theroot and, <strong>in</strong>dividually, wait<strong>in</strong>g for the answers. Nodes do not have an applicationlayer <strong>in</strong> that case, and there is only a s<strong>in</strong>gle token mov<strong>in</strong>g <strong>in</strong> the tree. Moreover,let us consider an ideal scenario with the follow<strong>in</strong>g conditions:1. There is no <strong>in</strong>terference or collisions.2. Wait<strong>in</strong>g time to medium access is zero.3. Protocol stack comput<strong>in</strong>g time is negligible.4. Only one frame is necessary to transmit all data from a node.5. All tokens have exactly the same size.An approach value of execution time, for an overall collect order, may bederived from a medium number of transmissions (equations 2,3,4), as:CT 1 = ( PTS · N · NT +ATS· N · NT ) ·CharSizeBaudRate(7)


Automated Meter Read<strong>in</strong>g and SCADA Application 231IdleTokenWait<strong>in</strong>g for anwser(2) Response to rootResponse (1)(3) Token sentFig. 4. Poll<strong>in</strong>g scheme 2.Where– CT 1 - Collect Time for schedule 1.– N - Network nodes.– PTS - Poll<strong>in</strong>g Token Size.– AT S- Answer Token Size.Second collect<strong>in</strong>g algorithm is shown <strong>in</strong> figure 4. An application layer <strong>in</strong> allthe nodes receives the order. This node passes the token to one of its children,and waits for a response. When it is received, (figure 4(1)) the node sends datato the root (figure 4(2)), and it passes the collect order to the next child (figure4(3)). Only when there are no more children to be polled, will the node answerwith its own data. Only one token is be<strong>in</strong>g passed between parent and children, sono path header <strong>in</strong>formation is necessary, and the answer token is simultaneouslyflow<strong>in</strong>g to the root. To prevent a lost token, a timeout period guarantees thetoken passes to the next child.Us<strong>in</strong>g the previous scenario, we can compute an approximate collect<strong>in</strong>g timevalue for that schedule. Neglect<strong>in</strong>g <strong>in</strong>itial transmissions and second order effects,the majority of transmissions are caused <strong>by</strong> answer token pass<strong>in</strong>g. Poll<strong>in</strong>g tokenpass<strong>in</strong>g occurs simultaneously and so does not have any significant effect. In thisway:CharSizeCT 2 = N · ATS · NT ·(8)BaudRateThe ratio between CT 2 and CT 1 :CT 2CT 1=N · ATS · NTN · PTS · NT + N · ATS · NT = 11+ PTSAT SUsual PTS and AT S values allow a relative decrement of about 70 per cent.A greater reduction can be reached <strong>by</strong> us<strong>in</strong>g multiple tokens. If collisions or(9)


232 F.J. Mol<strong>in</strong>a, J. Barbancho, and J. LuqueLR - Large range nodeAggregation po<strong>in</strong>t(2) Response toLR node po<strong>in</strong>t(1) Response(3) Token sentFig. 5. Simultaneously collect<strong>in</strong>g tokens: poll<strong>in</strong>g scheme 3.<strong>in</strong>terference are not considered, then collect<strong>in</strong>g time decreases to a factor equalto the number of tokens. Obviously, collisions <strong>in</strong>crease as the number of tokens<strong>in</strong>crease. Many response tokens travel to the root node, creat<strong>in</strong>g an implosionproblem [19] (which is greater near the root node). To avoid this, we propose apoll<strong>in</strong>g scheme based on Short range - Long Range topology. The root node mustsend poll<strong>in</strong>g tokens to each node <strong>in</strong> the LR subnet. Each LR node collects datafrom all their sub-trees, aggregat<strong>in</strong>g and stor<strong>in</strong>g data, without pass<strong>in</strong>g them toroot. LR nodes only send data when the UC requests them. The node applicationprotocol does not change significantly with respect to the second schedule, so thisvariant is fundamentally the same one for nodes. As it is shown <strong>in</strong> figure 5, poll<strong>in</strong>gtokens are pass<strong>in</strong>g simultaneously over different areas, so collision probabilityis low. Suppos<strong>in</strong>g that all the clusters have approximately the same numberof nodes (long-range and short range densities are homogeneous), neglect<strong>in</strong>gcollisions and second order effects, then:CT 3 =( NSR)CharSize· ATS · NT SR + N · ATS · NT LR ·N LR BaudRateAnd suppos<strong>in</strong>g that N SR ≈ N, and apply<strong>in</strong>g (equation 2)CT 3CT 1=11+ PTSAT S·1(10)1+ NT SRNT LR(11)Us<strong>in</strong>g topology parameters for Seville, this scheme may reach CT 3 = CT 1 /10.


4 Future WorksAutomated Meter Read<strong>in</strong>g and SCADA Application 233For the proposed network, we are currently work<strong>in</strong>g on network simulation,self-configuration and optimization of ASCADA services performance. For thelatter, we are study<strong>in</strong>g two complementary poll<strong>in</strong>g schedules: Avalanche tokenpass<strong>in</strong>g and data catch<strong>in</strong>g/pre-collect<strong>in</strong>g. To reduce <strong>in</strong>terference and to enhancepoll<strong>in</strong>g order diffusion, each node sends two or more tokens to the children andresponses are aggregated to send a s<strong>in</strong>gle response to the root. Nodes must beselected <strong>in</strong> such a way that <strong>in</strong>terference probability would be the least possible.Data catch<strong>in</strong>g and pre-collect<strong>in</strong>g schemes use data validation to update storeddata. Nodes save data from their children with a timestamp, so when a poll<strong>in</strong>gtoken arrives, the node may use this data without pass<strong>in</strong>g it to them. Catch<strong>in</strong>gupdate strategies, as periodically or predictive pre-collect<strong>in</strong>g, must be designedto m<strong>in</strong>imize data age and optimize network performance.Execution times and network overload optimization are the ma<strong>in</strong> objectivesof algorithms presented <strong>in</strong> this paper. Reliability however, must also be an importantcharacteristic for a SCADA system.Currently, we are work<strong>in</strong>g on reliability enhancement. Services such as ordermessag<strong>in</strong>g and alarm transmissions can be critically affected <strong>by</strong> local failures,<strong>in</strong>terference or collisions. Reliability must be present <strong>in</strong> all protocol layers, butespecially <strong>in</strong> application and network layers. Some characteristics previously outl<strong>in</strong>edmay raise reliability <strong>in</strong> application layers: order sequenc<strong>in</strong>g, encrypted messages,etc. At the network layer, we are research<strong>in</strong>g a rout<strong>in</strong>g algorithm able tof<strong>in</strong>d an alternate path when an error has occurred. We are test<strong>in</strong>g a modificationof the Fish Eye Rout<strong>in</strong>g and other algorithms [20,21].AcknowledgmentAll of this work has been made possible thanks to the project be<strong>in</strong>g jo<strong>in</strong>tly f<strong>in</strong>anced<strong>by</strong> the Spanish Government (MYCT-M<strong>in</strong>isterio de Ciencia y Tecnología)and private companies, <strong>in</strong> particular EMASESA and ISOTROL.References1. A. Bond. The water <strong>in</strong>dustry (automatic meter read<strong>in</strong>g). IEE Colloquium on ‘LowPower Radio and Meter<strong>in</strong>g’. IEE, London, UK, (Digest No.1994/060), 1994.2. Philips M. Adams, B. Trends towards standard communications for meter<strong>in</strong>g.N<strong>in</strong>th International Conference on Meter<strong>in</strong>g and Tariffs for Energy Supply. IEE,London, UK, (Conf. Publ No.462), 1999.3. A.M. Fox. The bus<strong>in</strong>ess case for radio based amr. IEE Colloquium on ‘Low PowerRadio and Meter<strong>in</strong>g’. IEE, London, UK, (Digest No.1994/060), 1999.4. Radford D. Mak, S. Design considerations for implementation of large scale automaticmeter read<strong>in</strong>g systems. IEEE Transactions on Power Delivery, 10(DigestNo.1994/060), Jan 1995.5. F.J. Mol<strong>in</strong>a, M.G. Gordillo, J. Luque, and J. Barros. Radio network architecturefor automatic meter read<strong>in</strong>g. Conférence Internationale des Grandes RéseauxÉlectiques, Krakow POLAND, 1999.


234 F.J. Mol<strong>in</strong>a, J. Barbancho, and J. Luque6. J. Broch, D. A. Maltz, D. B. Johnson, Y.C. Hu, and J. Jetcheva. A performancecomparison of multi-hop wireless ad hoc network rout<strong>in</strong>g protocols. MOBICOM,Dallas, TX, Aug 1998.7. E. Royer and C.K. Toh. A review of current rout<strong>in</strong>g protocols for ad hoc mobilewireless networks. IEEE Personal Communications, 6, Apr 1999.8. S. Das, C. Perk<strong>in</strong>s, and E. Royer. Performance comparison of two on-demandrout<strong>in</strong>g protocols for ad hoc networks. IEEE, INFOCOM 2000, 2000.9. Z. J. Wang and J. Crowcroft. Analysis of shortest-path rout<strong>in</strong>g algorithms <strong>in</strong> adynamic network environment. ACM SIGCOMM, 1992.10. J. Behrens and J. J. Garcia-Luna-Aceves. Hierarchical rout<strong>in</strong>g us<strong>in</strong>g l<strong>in</strong>k vectors.IEEE, INFOCOM 1998, 1998.11. J. J. Garcia-Luna-Aceves and M. Spohn. Source-tree rout<strong>in</strong>g <strong>in</strong> wireless networks.Proc. IEEE ICNP 99, 7th ntl. Conference on Network Protocols, Toronto, Canada,Oct 1999.12. D. B. Johnson and D. A. Maltz. Dynamic Source Rout<strong>in</strong>g <strong>in</strong> Ad Hoc WirelessNetworks. In Mobile Comput<strong>in</strong>g. Kluwer Academic Publishers, 1996.13. C. E. Perk<strong>in</strong>s and E. M. Royer. Ad-hoc on demand distance vector rout<strong>in</strong>g. WM-CSA’99, New Orleans, LA, Feb 1999.14. Couto and B Aguayo. Performance of multihop wireless networks: Shortest pathis not enough. Proceed<strong>in</strong>gs of the HotNets, Pr<strong>in</strong>ceton, New Jersey, Oct 2000.15. S. S<strong>in</strong>gh and C. S. Raghavendra. Power aware rout<strong>in</strong>g <strong>in</strong> mobile ad hoc networks.Proceed<strong>in</strong>gs of MOBICOM, 1998.16. Chandrakasan A. He<strong>in</strong>zelman, R. W. and H. Balakrishnan. Energy-eficient rout<strong>in</strong>gprotocolsfor wireless microsensor networks. In Hawaii International Conferenceon System <strong>Science</strong>s (HICSS ’00), Jan 2000.17. G.A. Cheston and S. T. Hedetniemi. Poll<strong>in</strong>g <strong>in</strong> tree networks. Proc. Second WestCoast Conf. Comput<strong>in</strong>g <strong>in</strong> Graph Theory, 1983.18. A. A. Rescigno. Optimal poll<strong>in</strong>g <strong>in</strong> communication networks. Parallel and DistributedSystems, IEEE Transactions on, 8, May 1997.19. T. Imiel<strong>in</strong>ski and S. Goel. Query<strong>in</strong>g and monitor<strong>in</strong>g deeply networked collectionsof physical objects. Proceed<strong>in</strong>gs of MobiDE’99, (Seattle, Wash<strong>in</strong>gton), 8, Aug 1999.20. Gerla M. Pei, G. and T. W. Chen. Fisheye state rout<strong>in</strong>g: A rout<strong>in</strong>g scheme for adhoc wireless networks. Proceed<strong>in</strong>gs of ICC 2000, New Orleans, LA, 8, Jun 2000.21. M. Spohn and J.J. Garcia-Luna-Aceves. Neighbourhood aware source rout<strong>in</strong>g.Proc. of ACM Symposium on Mobile Ad Hoc Network<strong>in</strong>g and Comput<strong>in</strong>g (Mobi-HOC ’01), 2001.


Range Assignment for High Connectivity<strong>in</strong> Wireless Ad Hoc NetworksGruia Cal<strong>in</strong>escu and Peng-Jun WanDepartment of <strong>Computer</strong> <strong>Science</strong>, Ill<strong>in</strong>ois Institute of Technology,Chicago, IL 60616cal<strong>in</strong>esc@iit.edu, wan@cs.iit.eduAbstract. Depend<strong>in</strong>g on whether bidirectional l<strong>in</strong>ks or unidirectionall<strong>in</strong>ks are used for communications, the network topology under a givenrange assignment is either an undirected graph referred to as the symmetrictopology, or a directed graph referred to as the asymmetric topology.The M<strong>in</strong>-Power Symmetric (resp., Asymmetric) k-Node Connectivityproblem seeks a range assignment of m<strong>in</strong>imum total power subjectto the constra<strong>in</strong>t the <strong>in</strong>duced symmetric (resp. asymmetric) topology isk-connected. Similarly, the M<strong>in</strong>-Power Symmetric (resp., Asymmetric) k-Edge Connectivity problem seeks a range assignment of m<strong>in</strong>imum totalpower subject to the constra<strong>in</strong>t the <strong>in</strong>duced symmetric (resp., asymmetric)topology is k-edge connected.The M<strong>in</strong>-Power Symmetric Biconnectivity problem and the M<strong>in</strong>-PowerSymmetric Edge-Biconnectivity problem has been studied <strong>by</strong> Lloyd et.al [21]. They show that range assignment based the approximation algorithmof Khuller and Raghavachari [17], which we refer to as AlgorithmKR, has an approximation ratio of at most 2(2 − 2/n)(2 + 1/n) for M<strong>in</strong>-Power Symmetric Biconnectivity, and range assignment based on theapproximation algorithm of Khuller and Vishk<strong>in</strong> [18], which we refer toas Algorithm KV, has an approximation ratio of at most 8(1 − 1/n)for M<strong>in</strong>-Power Symmetric Edge-Biconnectivity.In this paper, we first establish the NP-hardness of M<strong>in</strong>-Power Symmetric(Edge-)Biconnectivity. Then we show that Algorithm KR has anapproximation ratio of at most 4 for both M<strong>in</strong>-Power Symmetric Biconnectivityand M<strong>in</strong>-Power Asymmetric Biconnectivity, and AlgorithmKV has an approximation ratio of at most 2k for both M<strong>in</strong>-Power Symmetrick-Edge Connectivity and M<strong>in</strong>-Power Asymmetric k-Edge Connectivity.We also propose a new simple constant-approximation algorithmfor both M<strong>in</strong>-Power Symmetric Biconnectivity and M<strong>in</strong>-Power AsymmetricBiconnectivity. This new algorithm is best suited for distributedimplementation.1 IntroductionRecently, range assignment problems for wireless ad hoc networks have beenstudied extensively. In wireless ad hoc networks no wired backbone <strong>in</strong>frastructureis <strong>in</strong>stalled and communication sessions are achieved either through a s<strong>in</strong>glehoptransmission if the communication parties are close enough, or throughS. Pierre, M. Barbeau, and E. Kranakis (Eds.): ADHOC-NOW 2003, LNCS <strong>2865</strong>, pp. 235–246, 2003.c○ Spr<strong>in</strong>ger-Verlag Berl<strong>in</strong> Heidelberg 2003


236 G. Cal<strong>in</strong>escu and P.-J. Wan3.5 4.5v 1 v 1 v 2vv124v 2v 4 4v 3v 4v 3 v 4v 33 34.54.5(a)(b)(c)Fig. 1. The network topology: (a) the nodes and their transmission ranges, (b) theasymmetric topology, and (c) symmetric topology.relay<strong>in</strong>g <strong>by</strong> <strong>in</strong>termediate nodes otherwise. Omnidirectional antennas are used<strong>by</strong> all nodes to transmit and receive signals. Such antennas are attractive dueto their broadcast nature. A s<strong>in</strong>gle transmission <strong>by</strong> a node can be received <strong>by</strong>many nodes with<strong>in</strong> its vic<strong>in</strong>ity. We assume that every node can dynamicallyadjust its transmitt<strong>in</strong>g power based on the distance to the receiv<strong>in</strong>g node andthe background noise. In the most common power-attenuation model [22], thesignal power falls as 1dwhere d is the distance from the transmitter antennaκand κ is a real constant between 2 and 5 dependent on the wireless environment.We assume that all receivers have the same threshold for signal detection, andnormalize this threshold to one. With these assumptions, the power required tosupport a l<strong>in</strong>k between two nodes separated <strong>by</strong> a distance d is d κ .The network topology of a wireless ad hoc network, which consists of allpossible one-hop communication l<strong>in</strong>ks among the nodes, is determ<strong>in</strong>ed <strong>by</strong> thetransmission ranges of the nodes. Depend<strong>in</strong>g on whether unidirectional l<strong>in</strong>ks orbidirectional l<strong>in</strong>ks are used for communications, the network topology is represented<strong>by</strong> either a directed graph referred to as the asymmetric topology, oranundirected graph referred to as the symmetric topology. In the asymmetric topology,there is an arc from a node u to another node v if and only v is with<strong>in</strong> thetransmission range of u. In the symmetric topology, there is an edge between twonodes u and v if and only they are with<strong>in</strong> the transmission ranges of each other.An example is depicted <strong>in</strong> Figure 1. Figure 1 (a) gives the positions and thetransmission ranges of all nodes. The asymmetric topology and the symmetrictopology are given <strong>in</strong> Figure 1 (a) and (b) respectively.Connectivity is one of the most important properties of an wireless ad hocnetwork. By asymmetric k-node (resp., k-edge) connectivity we mean the asymmetrictopology is k-node (resp., k-edge) (strongly) connected, and <strong>by</strong> symmetrick-node (resp., k-edge) connectivity we mean the symmetric topology is k-node


Range Assignment for High Connectivity <strong>in</strong> Wireless Ad Hoc Networks 2370.5 0.5 110.50.50.50.51(a) (b) (c)Fig. 2. Asymmetric topology may have higher connectivity than symmetric topology.(a). The nodes lie <strong>in</strong> a regular hexagon of side equal to one, and their transmissionranges are given beside the nodes. (b) The asymmetric topology is connected. (c). Thesymmetric topology is disconnected.(resp., k-edge) connected. For k = 1, edge and node connectivity are identicalto each other, and thus are simply referred to as connectivity. For k = 2, 2-nodeconnectivity is simply referred to as biconnectivity, and 2-edge connectivity issimply referred to as edge-biconnectivity. With the same transmission ranges, theasymmetric connectivity is always not lower than the symmetric connectivity. Ifthe transmission ranges are not identical, the asymmetric connectivity may behigher than the symmetric connectivity. Figure 2 shows an example <strong>in</strong> which theasymmetric topology is connected but the symmetric topology is disconnected.The network consists of n<strong>in</strong>e nodes ly<strong>in</strong>g on a regular hexagon of side equal toone, with six nodes at the vertices of the hexagon and the other three nodes atthe midpo<strong>in</strong>ts of three alternate sides of the hexagon. Three alternate nodes atthe vertices have transmission range of one, and all others have the transmissionrange of one half. The asymmetric topology is connected, but the symmetrictopology is not. On the other hand, if all nodes have the same transmissionrange, the asymmetric topology and the symmetric topology always have thesame connectivity.The requirement on the network connectivity (either asymmetric or asymmetric)imposes a constra<strong>in</strong>t on the transmission ranges of all nodes. A crucialissue is how to f<strong>in</strong>d a range assignment of the smallest total power to meet a specifiedconnectivity requirement. The M<strong>in</strong>-Power Symmetric (resp., Asymmetric)k-Node Connectivity problem seeks a range assignment of m<strong>in</strong>imum total powersubject to the constra<strong>in</strong>t the <strong>in</strong>duced symmetric (resp. asymmetric) topology isk-connected. Similarly, the M<strong>in</strong>-Power Symmetric (resp., Asymmetric) k-EdgeConnectivity problem seeks a range assignment of m<strong>in</strong>imum total power subjectto the constra<strong>in</strong>t the <strong>in</strong>duced symmetric (resp., asymmetric) topology is k-edgeconnected. Clearly, the smallest total power for asymmetric k-node (resp., edge)connectivity is no more than the smallest total power for symmetric k-node(resp., edge) connectivity.The study of the M<strong>in</strong>-Power Asymmetric Connectivity problem was started<strong>by</strong> Chen and Huang [5], who gave a 2-approximation algorithm based on m<strong>in</strong>i-


238 G. Cal<strong>in</strong>escu and P.-J. Wanmum spann<strong>in</strong>g tree. Further contributions were made <strong>in</strong> [19] and [8]. The relatedbroadcast problem was studied <strong>in</strong> [27], [25], and [6]. The recent survey [9] presentsthe state of the art for these “asymmetric” problems. The M<strong>in</strong>-Power SymmetricConnectivity problem was proposed <strong>in</strong> [2] and [4]. Both papers claim thatM<strong>in</strong>-Power Symmetric Connectivity is NP-Hard, and [4] presents a (1 + ln 2)-approximation algorithm. In the journal submission of [4], this approximationratio is improved to 5/3.The M<strong>in</strong>-Power Symmetric Biconnectivity problem has been first studied <strong>by</strong>Ramanathan and Rosales-Ha<strong>in</strong> [23], which proposed one reasonable heuristic butwithout a proven approximation ratio. Lloyd et. al [21] studied both M<strong>in</strong>-PowerSymmetric Biconnectivity and M<strong>in</strong>-Power Symmetric Edge-Biconnectivity.Among other results, they show that the range assignment based the approximationalgorithm of Khuller and Raghavachari [17], which we refer to as AlgorithmKR, has an approximation ratio of at most 2(2 − 2/n)(2+1/n) forM<strong>in</strong>-Power Symmetric Biconnectivity, and the range assignment based on theapproximation algorithm of Khuller and Vishk<strong>in</strong> [18], which we refer to as AlgorithmKV, has an approximation ratio of at most 8(1 − 1/n) for M<strong>in</strong>-PowerSymmetric Edge-Biconnectivity.In this paper, we present a reduction that establishes the NP-Hardness ofboth M<strong>in</strong>-Power Symmetric Two-Node Connectivity and M<strong>in</strong>-Power SymmetricTwo-Edge-Connectivity. The NP-Hardness holds for plane <strong>in</strong>stances, not onlyfor arbitrary graph weights. We show that the range assignment based on theAlgorithm KR has an approximation ratio of at most 4 for both M<strong>in</strong>-PowerSymmetric Biconnectivity and M<strong>in</strong>-Power Asymmetric Biconnectivity. Specifically,we prove that the total power of this range assignment is less than fourtimes the smallest power for asymmetric biconnectivity. We also show that therange assignment based on Algorithm KV has an approximation ratio of atmost 2k for both M<strong>in</strong>-Power Symmetric k-Edge Connectivity and M<strong>in</strong>-PowerAsymmetric k-Edge Connectivity. Specifically, we prove that the total power ofthis range assignment is less than 2k times the smallest power for asymmetric k-edge connectivity. As both algorithms are graph algorithms, the approximationratios hold also if the nodes are <strong>in</strong> the three dimensional space, if the possibleranges come from a discrete set of values, if obstacles completely block the communication<strong>in</strong> between certa<strong>in</strong> pairs of nodes, and if there is a maximum valueon the ranges.Although the range assignments based Algorithm KR and Algorithm KVhave constant approximation ratios, they have very complicated implementationsand are not practical for wireless ad hoc networks. This motivates us to seek atrade-off between the approximation ratio and the implementation complexity.We propose a very simple range assignment which achieves both symmetric andasymmetric biconnectivity. The total power of this range assignment is less than8 for κ =2,or3.2 · 2 κ for κ > 2 times the smallest power for asymmetricconnectivity for plane <strong>in</strong>stances.The rema<strong>in</strong><strong>in</strong>g of this paper is organized as follows. Due to space limitations,we omit the reduction prov<strong>in</strong>g the NP-hardness of M<strong>in</strong>-Power Symmetric


Range Assignment for High Connectivity <strong>in</strong> Wireless Ad Hoc Networks 239(Edge-) Biconnectivity. In Section 2, we <strong>in</strong>troduce related graph-theoretic resultsand some terms and notations. In Section 3 and Section 4, we derive tighter upperbounds on the approximation ratios of the range assignments based AlgorithmKR and Algorithm KV respectively. In Section 5, we present the newalgorithm, MST-Augmentation, and analyze its approximation ratio. F<strong>in</strong>ally, <strong>in</strong>Section 6, we conclude the paper and report prelim<strong>in</strong>ary experimental results.2 Prelim<strong>in</strong>ariesA directed graph D =(V,A) is said to be a branch<strong>in</strong>g (or arborescence) rootedat some vertex s ∈ V if |A| = |V |−1 and there is a path to s from any othervertex. In other words, branch<strong>in</strong>gs <strong>in</strong> directed graphs are a directed analog tospann<strong>in</strong>g trees <strong>in</strong> undirected graphs.Theorem 1 (Edmonds). [11] Suppose that, given a directed graph D =(V,A)and a specified vertex s ∈ V , there are k arc-disjo<strong>in</strong>t paths to s from any othervertex of D. Then D has k arc-disjo<strong>in</strong>t branch<strong>in</strong>gs rooted at s.Theorem 2 (Whitty). [26] Suppose that, given a directed graph D =(V,A)and a specified vertex s ∈ V , there are two <strong>in</strong>ternally vertex-disjo<strong>in</strong>t paths to sfrom any other vertex of D. Then D has two arc-disjo<strong>in</strong>t branch<strong>in</strong>gs rooted at ssuch that for any vertex v ∈ V − s the two paths to s from v uniquely determ<strong>in</strong>ed<strong>by</strong> the branch<strong>in</strong>gs are <strong>in</strong>ternally vertex-disjo<strong>in</strong>t.Consider a directed graph D = (V,A), a specified vertex s ∈ V , and apositive <strong>in</strong>teger k. The cheapest subgraph of D that has k arc-disjo<strong>in</strong>t paths tos from every other vertex, if there is any, must be the union of k arc-disjo<strong>in</strong>tbranch<strong>in</strong>gs rooted at s and can be found <strong>in</strong> polynomial time <strong>by</strong> the weightedmatroid <strong>in</strong>tersection algorithm due to Lawler [20] and Edmonds [12]. The fastestimplementation of a weighted matroid <strong>in</strong>tersection algorithm is given <strong>by</strong> Gabow[14]. Given a vertex r ∈ V , the cheapest subgraph of D that has k <strong>in</strong>ternallyvertex-disjo<strong>in</strong>t paths to r from every other vertex, if there is any, can also befound <strong>in</strong> polynomial time <strong>by</strong> an algorithm due to Frank and Tardos [13], or afaster algorithm due to Gabow [15].We will also make use of a corollary of Menger’s Theorem, the so-called FanLemma.Theorem 3 (Fan Lemma). [10] Suppose that D is a k-vertex connected directedgraph and U is a proper subset of its vertices with |U| = k. Then forany vertex v not <strong>in</strong> U, there are k <strong>in</strong>ternally vertex-disjo<strong>in</strong>t paths that l<strong>in</strong>k v todist<strong>in</strong>ct vertices of U.The bidirected version of an undirected graph G is a directed graph obta<strong>in</strong>ed<strong>by</strong> replac<strong>in</strong>g every edge of G with two oppositely oriented arcs. The undirectedversion of a directed graph D is an undirected graph obta<strong>in</strong>ed <strong>by</strong> ignor<strong>in</strong>g thedirections of the arcs of D.


240 G. Cal<strong>in</strong>escu and P.-J. WanFrom now on, we model the wireless ad hoc network <strong>by</strong> a weighted completegraph G =(V,E,c) with c (e) =‖e‖ κ where ‖e‖ is the length of the edge e.Every range assignment is specified <strong>by</strong> a spann<strong>in</strong>g graph H as follows. Thetransmission power of node v with respect to H, denoted <strong>by</strong> p H (v), is def<strong>in</strong>ed<strong>by</strong> p H (v) = max u∈NH (v) c (vu) . Clearly, the symmetric topology <strong>in</strong>duced <strong>by</strong>this range assignment conta<strong>in</strong>s H as a subgraph, and the asymmetric topology<strong>in</strong>duced <strong>by</strong> this assignment conta<strong>in</strong>s the bidirected version of H as a subgraph.Thus, the range assignment specified <strong>by</strong> H achieves at least the connectivity ofH.For any spann<strong>in</strong>g subgraph H of G, we def<strong>in</strong>e the power cost of H as p (H) =∑v∈V (H) p H (v) . Then p (H) is exactly the total power of the range assignment<strong>in</strong>duced <strong>by</strong> H. We also def<strong>in</strong>e the weight of H as c (H) = ∑ e∈E(H) c (e) .The two parameters p (H) and c (H) are related <strong>by</strong> the follow<strong>in</strong>g previouslyknown lemma.Lemma 1. For any spann<strong>in</strong>g subgraph H of G, p (H) ≤ 2c (H).Proof. Let H be a subgraph of G. Then,p (H) = ∑ p H (v) = ∑ max c (vu)u∈N H (v)v∈Vv∈V≤ ∑ ∑c (vu) =2∑c (e) =2c (H) .v∈Vu∈N H (v)e∈E(H)For directed spann<strong>in</strong>g subgraphs Q, we def<strong>in</strong>e similarly p Q (v)=max vu∈Q c(cu)for every vertex v, and p(Q) = ∑ v∈V p Q(v).3 Algorithm KR for k-Edge ConnectivityAlgorithm KR [17] constructs a k-edge connected spann<strong>in</strong>g subgraph H asfollows. For some node s, let D s be the m<strong>in</strong>imum-weight directed subgraph ofthe bidirected version of G <strong>in</strong> which there are k arc-disjo<strong>in</strong>t paths to s fromevery other vertex <strong>in</strong> V . Let H be the undirected version of D s for an arbitrarynode s. Then, as shown <strong>in</strong> [17], H is k-edge connected.Let opt be the power cost of an optimum range assignment for asymmetrick-edge connectivity. We have the follow<strong>in</strong>g theorem.Theorem 4. p (H) ≤ 2k · opt.Proof. Consider Q, the directed graph given <strong>by</strong> the optimum range assignment.Q is strongly k-edge connected, and therefore <strong>by</strong> Theorem 1 Q conta<strong>in</strong>s k arcdisjo<strong>in</strong>tbranch<strong>in</strong>gs rooted at s: T 1 ,T 2 , ··· ,T k .As ∪ k i=1 T i is a feasible solution solution for the directed subgraph computed<strong>by</strong> the algorithm, c(D s ) ≤ ∑ ki=1 c(T i). For any vertex v and 1 ≤ i ≤ k, denote<strong>by</strong> a i (v) the parent of v <strong>in</strong> T i (v). Given v, p Q (v) = max vu∈Q c(uv) ≥max 1≤i≤k c (va i (v)) ≥ 1 ∑k 1≤i≤k c (va i(v)), and therefore


Range Assignment for High Connectivity <strong>in</strong> Wireless Ad Hoc Networks 241opt = p(Q) ≥ 1 k∑1≤i≤kc(T i ).Us<strong>in</strong>g Lemma 1, we conclude: p(H) ≤ 2c(H) ≤ 2c(D s ) ≤ 2 ∑ ki=1 c(T i) ≤ 2k · optTheorem 4 implies that the approximation ratio of Algorithm KR is atmost 2k.4 Algorithm KV for BiconnectivityAlgorithm KV [18] constructs a 2-node connected spann<strong>in</strong>g subgraph H asfollows.1. Let xy be the edge of G of m<strong>in</strong>imum weight and s an vertex not <strong>in</strong> V .Construct weighted directed graph D as follows: Replace every edge of Gwith two oppositely-oriented arcs of the same weight and then add two arcsxs and ys of weight 0.2. Let D ′ be the m<strong>in</strong>imum-weighted subgraph of D <strong>in</strong> which there are two<strong>in</strong>ternally vertex-disjo<strong>in</strong>t directed paths to s from every vertex <strong>in</strong> V .(D ′can be obta<strong>in</strong>ed <strong>by</strong> us<strong>in</strong>g the algorithm of Frank and Tardos [13], or a fasteralgorithm <strong>by</strong> Gabow [15]).3. Output the subgraph H of G which conta<strong>in</strong>s the edge xy and every edge ofG with at least one of its two directed copies <strong>in</strong> D ′ .As shown <strong>in</strong> [18], H is two-connected. Let opt be the power cost of an optimumrange assignment for asymmetric 2-node connectivity. We have the follow<strong>in</strong>gtheorem.Theorem 5. p (H) ≤ 4 · opt.Proof. Consider Q, the directed graph given <strong>by</strong> the optimum range assignment,to which we add the arcs xs and ys of weight 0. Us<strong>in</strong>g Theorem 3 (Fan Lemma),for any vertex v other than x and y, Q has two <strong>in</strong>ternally vertex-disjo<strong>in</strong>t directedpaths that l<strong>in</strong>k v to x and y respectively. Therefore, <strong>in</strong> Q, every vertex v has two<strong>in</strong>ternally vertex-disjo<strong>in</strong>t directed paths l<strong>in</strong>k<strong>in</strong>g it to s. Us<strong>in</strong>g Theorem 2, Q hastwo arc-disjo<strong>in</strong>t branch<strong>in</strong>gs rooted at s: A 1 and A 2 such that, for every vertexv ∈ V , the two paths <strong>in</strong> A 1 and A 2 from v to r are <strong>in</strong>ternally vertex-disjo<strong>in</strong>t.As A 1 ∪A 2 is a feasible solution for the directed subgraph we needed <strong>in</strong> step 2 ,c(D ′ ) ≤ c(A 1 )+c(A 2 ). For any vertex v and 1 ≤ i ≤ 2, denote <strong>by</strong> a i (v) the parentof v <strong>in</strong> A i (v). Given v, p Q (v) = max vu∈Q c(uv) ≥ (c (va 1 (v)) + c (va 2 (v))) /2,and therefore opt = P (Q) ≥ (c(A 1 )+c(A 2 ))/2.Us<strong>in</strong>g Lemma 1, we conclude:p(H) ≤ 2c(H) =2c(D ′ ) ≤ 2(c(A 1 )+c(A 2 )) ≤ 4optTheorem 5 implies that the approximation ratio of Algorithm KR is atmost 4.


242 G. Cal<strong>in</strong>escu and P.-J. Wan5 Algorithm MST-Augmentation for BiconnectivityIn this section, we present a simple algorithm which produces a biconnectedspann<strong>in</strong>g graph H <strong>by</strong> augment<strong>in</strong>g an MST. The algorithm first f<strong>in</strong>ds an EuclideanMST T and <strong>in</strong>itializes H to T . At any non-leaf node v of T ,alocalEuclidean MST T v over all the neighbors of v <strong>in</strong> T is constructed and addedto H. ThustheH is a union of the big MST T and many small MSTs. H is2-connected, as it follows from the follow<strong>in</strong>g argument. Only <strong>in</strong>ternal nodes ofT can be articulation po<strong>in</strong>ts; let u be such a node. Remov<strong>in</strong>g u from T creates anumber of connected components of T , each hav<strong>in</strong>g one vertex neighbor with u<strong>in</strong> T . But the neighbors of u <strong>in</strong> T rema<strong>in</strong> connected <strong>by</strong> T u , the local MST whichdoes not <strong>in</strong>clude u.We refer to this algorithm as MST-Augmentation. Besides be<strong>in</strong>g simpleand very fast (as every vertex has constant degree <strong>in</strong> T , total runn<strong>in</strong>g time isdom<strong>in</strong>ated <strong>by</strong> construct<strong>in</strong>g T and is O(n log n)), this algorithm is best suited toefficient distributed implementation. Another advantage of this algorithm is the<strong>in</strong>dependence of the path-loss exponent.To bound the approximation ratio of MST-Augmentation, we <strong>in</strong>troduce ageometric constant α def<strong>in</strong>ed below. Let o be the orig<strong>in</strong> of the Euclidean plane.A set U of at least two po<strong>in</strong>ts is called as a star-set if its Euclidean MST for{o}∪U is a star centered at o. The star is denoted <strong>by</strong> S U . Note that each starsetconta<strong>in</strong>s at least two but at most six po<strong>in</strong>ts. For any star-set U, let T U bethe m<strong>in</strong>imum spann<strong>in</strong>g tree of U. Then α is def<strong>in</strong>ed as the supreme of the ratioc (T U ) /c (S U ) over all star-sets.Lemma 2. For any κ ≥ 2, 2 κ−1 ≤ α ≤ 1.6 · 2 κ−1 . If κ =2, then α =2.Proof. The lower bound 2 κ−1 is achieved <strong>by</strong> U consist<strong>in</strong>g of two po<strong>in</strong>ts u 1 and u 2such that o is the midpo<strong>in</strong>t of the l<strong>in</strong>e segment u 1 u 2 . Next, we prove the upperbound 1.6 · 2 κ−1 . Consider any star-set U. IfU has exactly six po<strong>in</strong>ts, then thesepo<strong>in</strong>ts form a regular hexagon centered at o, and hence c (T U )= 5 6 c (S U )


Range Assignment for High Connectivity <strong>in</strong> Wireless Ad Hoc Networks 243make use of the follow<strong>in</strong>g <strong>in</strong>equality. ∑ m∑1≤i


244 G. Cal<strong>in</strong>escu and P.-J. WanThe next lemma provides an upper bound <strong>in</strong> the total weight of H ′ .Lemma 5. c (H ′ ) ≤ 2α · c (T ).Proof. From Lemma 2, we have c(T u ) ≤ α ∑ uv∈Tc(uv). Thenc(H ′ )=c(E 1 )+c(E 2 )= ∑ ∑c(uv)+∑c(T u )u leaf vu∈Tu <strong>in</strong>ternal≤ α ∑ ∑c(uv)+α∑ ∑c(uv) =2αc(T ),u leafvu∈Tu <strong>in</strong>ternal vu∈Tas every edge of T appears exactly twice <strong>in</strong> the summation.Now Theorem 6 follows immediately from Lemma 1, Lemma 3, Lemma 4,and Lemma 5:p (H) =p (H ′ ) ≤ 2c (H ′ ) < 4α · c (T ) < 4α · opt.Theorem 6 and Lemma 2 imply that the approximation ratio of MST-Augmentation is at most 8 for κ = 2 and at most 3.2 · 2 κ for general κ.6 ConclusionWe presented improved analysis for exist<strong>in</strong>g algorithms for M<strong>in</strong>-Power SymmetricBiconnectivity and M<strong>in</strong>-Power Symmetric k-Edge Connectivity, and showedthe symmetric output of these algorithms is also a good approximation for M<strong>in</strong>-Power Asymmetric Biconnectivity and M<strong>in</strong>-Power Asymmetric k-Edge Connectivity,respectively. We showed that M<strong>in</strong>-Power Symmetric Biconnectivity andM<strong>in</strong>-Power Symmetric Edge-Biconnectivity is NP-Hard. We <strong>in</strong>troduced the newalgorithm MST-Augmentation and showed it also has constant approximationratio.We are aware of <strong>in</strong>stances where the m<strong>in</strong>-power asymmetric two-connectedtopology uses only 7/10 of the m<strong>in</strong>-power symmetric two-connected topology. Itwould be <strong>in</strong>terest<strong>in</strong>g to f<strong>in</strong>d how small this ratio could be. By our analysis ofthe M<strong>in</strong>-Power Biconnectivity Algorithm KR, the ratio is at least 1/4, and <strong>in</strong>fact we can show the ratio is at least 1/3. By comparison, the ratio of m<strong>in</strong>-powersymmetric connected topology to m<strong>in</strong>-power asymmetric connected topology isknown to be at least 1/2, and this bound is tight (see for example the journalversion of [4]).Prelim<strong>in</strong>ary experimental results for M<strong>in</strong>-Power Symmetric Biconnectivityshow that on random <strong>in</strong>stances with 100 nodes, the follow<strong>in</strong>g hold:– “smart” local optimization algorithms improve <strong>by</strong> an average of 6% theRamanathan and Rosales-Ha<strong>in</strong> algorithm, with a maximum improvement of18%. The Ramanathan and Rosales-Ha<strong>in</strong> algorithm has a local optimizationphase and on average uses 29% less power than MST-Augmentation.


Range Assignment for High Connectivity <strong>in</strong> Wireless Ad Hoc Networks 245– Our best heuristics have power 75% to 250% more than the cost of the m<strong>in</strong>imumspann<strong>in</strong>g tree (the only easily computable lower bound for the problems).The average power used is 110% more than the cost of the m<strong>in</strong>imumspann<strong>in</strong>g tree.– For our best algorithms, the power required to ensure Symmetric Biconnectivityis on average 61.6% higher than the power required for SymmetricConnectivity. Our heuristics for Symmetric Connectivity are very good [1],but we still do not know the quality of the Symmetric Biconnectivity solutionsour heuristics produce. Note that the m<strong>in</strong>imum power for SymmetricBiconnectivity could be higher than the m<strong>in</strong>imum power for SymmetricConnectivity <strong>by</strong> a factor of 2 κ , as shown <strong>by</strong> an example of n nodes be<strong>in</strong>gequidistant on a l<strong>in</strong>e.AcknowledgementsWe are grateful to Nickolay Tchervensky for help with the experiments.References1. E. Althaus, G. Cal<strong>in</strong>escu, I. Mandoiu, S. Prasad, N. Tchervenski, and A. Zelikovsky,Power Efficient Range Assignment <strong>in</strong> Ad-hoc Wireless Networks, Proc. IEEE WirelessCommunications and Network<strong>in</strong>g Conference, 2003.2. D.M. Blough, M. Leonc<strong>in</strong>i, G. Resta, and P. Santi, On the Symmetric RangeAssignment Problem <strong>in</strong> Wireless Ad Hoc Networks, Proc. 2nd IFIP InternationalConference on Theoretical <strong>Computer</strong> <strong>Science</strong>, Montreal, August 2002.3. T. Calamoneri, and R. Petreschi, An Efficient Orthogonal Grid Draw<strong>in</strong>g Algorithmfor Cubic Graphs, COCOON’95, <strong>Lecture</strong>s <strong>Notes</strong> <strong>in</strong> <strong>Computer</strong> <strong>Science</strong> 959,Spr<strong>in</strong>ger-Verlag, pages 31-40, 1995.4. G. Cal<strong>in</strong>escu, I. Mandoiu, and A. Zelikovsky, Symmetric Connectivity with M<strong>in</strong>imumPower Consumption <strong>in</strong> Radio Networks, Proc. 2nd IFIP International Conferenceon Theoretical <strong>Computer</strong> <strong>Science</strong>, Montreal, August 2002.5. W.T. Chen and N.F. Huang, The Strongly Connect<strong>in</strong>g Problem on MultihopPacket Radio Networks, IEEE Transactions on Communications, vol. 37, no. 3,pp. 293-295, Oct. 1989.6. A. Clementi, P. Crescenzi, P. Penna, G. Rossi and P. Vocca, On the Complexityof Comput<strong>in</strong>g M<strong>in</strong>imum Energy Consumption Broadcast Subgraphs, 18th AnnualSymposium on Theoretical Aspects of <strong>Computer</strong> <strong>Science</strong>, LNCS 2010, 2001, pages121-131.7. A. Clementi, P. Penna and R. Silvestri, Hardness Results for The Power RangeAssignment Problem <strong>in</strong> Packet Radio Networks, Proc. 3rd International WorkshopRandomization, Approximation and Comb<strong>in</strong>atorial Optimization, <strong>Lecture</strong> <strong>Notes</strong> <strong>in</strong><strong>Computer</strong> <strong>Science</strong> 1671, pp. 197-208, 1999.8. A. Clementi, P. Penna and R. Silvestri, The Power Range Assignment Problem<strong>in</strong> Radio Networks on the Plane, Proc. 17th Annual Symposium on TheoreticalAspects of <strong>Computer</strong> <strong>Science</strong>, <strong>Lecture</strong> <strong>Notes</strong> <strong>in</strong> <strong>Computer</strong> <strong>Science</strong> 1770, pp. 651-660, 2000.


246 G. Cal<strong>in</strong>escu and P.-J. Wan9. A. Clementi, G. Huiban, P. Penna, G. Rossi and Y.C. Verhoeven, Some Recent TheoreticalAdvances and Open Questions on Energy Consumption <strong>in</strong> Ad-Hoc WirelessNetworks, 3rd Workshop on Approximation and Randomization Algorithms <strong>in</strong>Communication Networks, 2002.10. R. Diestel, Graph Theory, 2nd Edition, Graduate Texts <strong>in</strong> Mathematics, Volume173, Spr<strong>in</strong>ger-Verlag, New York, February 2000.11. J. Edmonds, Edge-disjo<strong>in</strong>t branch<strong>in</strong>gs, <strong>in</strong> Comb<strong>in</strong>atorial Algorithms, R. Rust<strong>in</strong>,Ed., pp. 91-96. Algorithmics Press, New York, 1972.12. J. Edmonds, Matroid <strong>in</strong>tersection, Annals of Discrete Mathematics, No. 4, pp.185-204, 1979.13. A. Frank and É. Tardos, An application of submodular flows, L<strong>in</strong>ear Algebra andits Applications, vol. 114/115, pp. 329-348, 1989.14. H. N. Gabow, A matroid approach to f<strong>in</strong>d<strong>in</strong>g edge connectivity and pack<strong>in</strong>g arborescences,Proc. 23rd ACM Symposium on Theory of Comput<strong>in</strong>g, pp. 112-122,May 1991.15. H.N. Gabow, A representation for cross<strong>in</strong>g set families with applications to submodularflow problems, <strong>in</strong> Proc. 4th ACM-SIAM Symposium on Discrete Algorithms,pp. 202-211, Aust<strong>in</strong>, TX, 1993.16. M.R. Garey, D.S. Johnson and R.E. Tarjan, The Planar Hamiltonian Circuit Problemis NP-complete, SIAM J. Comput., vol. 5, pp. 704-714, 1976.17. S. Khuller and B. Raghavachari, Improved approximation algorithms for uniformconnectivity problems, Journal of Algorithms 21, pp. 433-450, 1996.18. S. Khuller and U. Vishk<strong>in</strong>, Biconnectivity approximations and graph carv<strong>in</strong>gs,Journal of ACM, vol. 41, no. 2, pp. 214-235, 1994.19. L. M. Kirousis, E. Kranakis, D. Krizanc and A. Pelc, Power Consumption <strong>in</strong> PacketRadio Networks, Theoretical <strong>Computer</strong> <strong>Science</strong>, vol. 243, no. 1-2, pp. 289-305, 2000.A prelim<strong>in</strong>ary version of this papers also appeared <strong>in</strong> Proc. 14th Annual Symposiumon Theoretical Aspects of <strong>Computer</strong> <strong>Science</strong>, LNCS 1200, pp. 363 - 374, 1997.20. E. L. Lawler, Matroid <strong>in</strong>tersection algorithms, Mathematical Programm<strong>in</strong>g 9, pp.31-56, 1975.21. E. Lloyd, R. Liu, M. Marathe, R. Ramanathan, and S.S. Ravi, Algorithmic Aspectsof Topology Control Problems for Ad hoc Networks, Proc. 3rd ACM InternationalSymposium on Mobile Ad Hoc Network<strong>in</strong>g and Comput<strong>in</strong>g (MobiHoc), Lausanne,Switzerland, June 2002.22. T.S. Rappaport, Wireless Communications: Pr<strong>in</strong>ciples and Practices, PrenticeHall, 1996.23. R. Ramanathan and R. Rosales-Ha<strong>in</strong>, Topology Control of Multihop Wireless NetworksUs<strong>in</strong>g Transmit Power Adjustment, IEEE INFOCOM 2000.24. J.H. van L<strong>in</strong>t, R.M. Wilson, A course <strong>in</strong> comb<strong>in</strong>atorics, Cambridge UniversityPress, 1992.25. P-J. Wan, G. Cal<strong>in</strong>escu, X-Y. Li, and O. Frieder, M<strong>in</strong>imum Energy BroadcastRout<strong>in</strong>g <strong>in</strong> Static Ad Hoc Wireless Networks, IEEE INFOCOM 2001.26. R.W. Whitty, Vertex-disjo<strong>in</strong>t paths and edge-disjo<strong>in</strong>t branch<strong>in</strong>gs <strong>in</strong> directedgraphs, J. Graph Theory, 11(3):349-358, 1987.27. J.E. Wieselthier, G.D. Nguyen, and A. Ephremides, On the Construction ofEnergy-Efficient Broadcast and Multicast Trees <strong>in</strong> Wireless Networks. IEEE IN-FOCOM 2000.


Ste<strong>in</strong>er Systems for Topology-TransparentAccess Control <strong>in</strong> MANETsCharles J. Colbourn 1,⋆ , Violet R. Syrotiuk 1,⋆⋆ , and Alan C.H. L<strong>in</strong>g 21 <strong>Computer</strong> <strong>Science</strong> & Eng<strong>in</strong>eer<strong>in</strong>g, Arizona State University, Tempe, AZ 85287-54062 <strong>Computer</strong> <strong>Science</strong>, University of Vermont, Burl<strong>in</strong>gton, VT 05405Abstract. In this paper we exam<strong>in</strong>e the comb<strong>in</strong>atorial requirements oftopology-transparent transmission schedules for channel access <strong>in</strong> mobilead hoc networks. We formulate the problem as a comb<strong>in</strong>atorial questionand observe that its solution is a cover-free family. The mathematicalproperties of certa<strong>in</strong> cover-free families have been studied extensively. Indeed,we show that both exist<strong>in</strong>g constructions for topology-transparentschedules (which correspond to orthogonal arrays) give a cover-free family.However, a specific type of cover-free family – called a Ste<strong>in</strong>er system– supports the largest number of nodes for a given frame length. We thenexplore the m<strong>in</strong>imum and expected throughput for Ste<strong>in</strong>er systems ofsmall strength, first us<strong>in</strong>g the acknowledgement scheme proposed earlierand then us<strong>in</strong>g a more realistic model of acknowledgements. We contrastthese results with the results for comparable orthogonal arrays, <strong>in</strong>dicat<strong>in</strong>gsome important trade-offs for topology-transparent access controlprotocols.1 IntroductionIn any network based on a shared broadcast channel, the means <strong>by</strong> which accessto the channel is controlled has a fundamental impact on the overall networkperformance. While these networks <strong>in</strong>clude satellites and local area networks,our <strong>in</strong>terest is <strong>in</strong> mobile ad hoc networks (MANETs). A MANET is a collectionof mobile wireless nodes. What dist<strong>in</strong>guishes a MANET from other wirelessnetworks is that it self-organizes without the aid of any centralized control or anyfixed <strong>in</strong>frastructure. S<strong>in</strong>ce the radio transmission range of each node is limited,it may be necessary to forward over multiple hops <strong>in</strong> order for a packet to reachits dest<strong>in</strong>ation (as such, MANETs have also been called multi-hop and packetradionetworks). This also offers the opportunity for concurrent transmissionswhen nodes are sufficiently separated. The challenge <strong>in</strong> medium access control(MAC) protocols for MANETs is to f<strong>in</strong>d a satisfactory trade-off between the twoobjectives of m<strong>in</strong>imiz<strong>in</strong>g delay and maximiz<strong>in</strong>g throughput.Of the myriad of access control techniques, our focus is on topology- transparentapproaches. Unlike topology-dependent protocols, which recompute accesswhenever the network topology changes, a topology-transparent protocol acts <strong>in</strong>dependentlyof topology change. One class of protocols which may be viewed as⋆ This work was supported <strong>in</strong> part <strong>by</strong> ARO grant DAAD 19-01-1-0406.⋆⋆ This work was supported <strong>in</strong> part <strong>by</strong> NSF grant ANI-0105985.S. Pierre, M. Barbeau, and E. Kranakis (Eds.): ADHOC-NOW 2003, LNCS <strong>2865</strong>, pp. 247–258, 2003.c○ Spr<strong>in</strong>ger-Verlag Berl<strong>in</strong> Heidelberg 2003


248 C.J. Colbourn, V.R. Syrotiuk, and A.C.H. L<strong>in</strong>gtopology-transparent is the contention based MAC protocols. Contention basedapproaches achieve high throughput with a reasonable expected delay but withpoor worst-case delay. With <strong>in</strong>creas<strong>in</strong>g <strong>in</strong>terest <strong>in</strong> multi-media applications, thedelay characteristics of contention based MAC protocols do not appear adequateto provide the necessary quality-of-service (QoS) support. While there have beensome efforts to make such protocols QoS-aware, <strong>in</strong> each case the delay guaranteerema<strong>in</strong>s probabilistic [1,12,14].TDMA is an example of a scheduled access control protocol that is triviallytopology-transparent. More sophisticated schemes for generat<strong>in</strong>g topologytransparenttransmission schedules [2,10] depend on two design parameters: N,the number of nodes <strong>in</strong> the network, and D, the maximum node degree. Thiscreates complex trade-offs between the design parameters and the delay andthroughput characteristics of the result<strong>in</strong>g schedules. For example, while it isoften possible to construct schedules that are significantly shorter than TDMA,if the actual node degree exceeds D, the delay guarantee is lost. More exactly,the delay becomes probabilistic rather than determ<strong>in</strong>istic. While the questionof what should be done if the protocol fails is important (see [3,16] for somealternatives), we will not address this problem here.In [16], we observed that exist<strong>in</strong>g topology-transparent transmission schedulesare <strong>in</strong>stances of orthogonal arrays, and we explored the consequences of thisobservation on throughput. In this paper we go one step further, look<strong>in</strong>g morecarefully at the comb<strong>in</strong>atorial requirements of topology-transparent transmissionschedules. This allows us to formulate the problem as a comb<strong>in</strong>atorial questionand observe that its solution is a cover-free family. Certa<strong>in</strong> cover-free familieshave been studied extensively, and rather than derive new mathematical results,we <strong>in</strong>stead show how to use exist<strong>in</strong>g results for our application. Our first observationshows that an orthogonal array gives a cover-free family. We then showthat a specific type of cover-free family, called a Ste<strong>in</strong>er system, supports thelargest number of nodes for a given frame length. We then explore the m<strong>in</strong>imumand expected throughput for Ste<strong>in</strong>er systems of small strength, first us<strong>in</strong>g theacknowledgement scheme proposed earlier and then us<strong>in</strong>g a more realistic modelfor acknowledgements. We contrast these results with the results for comparableorthogonal arrays, <strong>in</strong>dicat<strong>in</strong>g some important trade-offs for topology-transparentprotocols.The rest of this paper is organized as follows. Section 2 first exam<strong>in</strong>es thecomb<strong>in</strong>atorial requirements of a topology-transparent transmission schedule, andshows that a cover-free family satisfies the requirements. We also show howcover-free families relate both to orthogonal arrays, and to Ste<strong>in</strong>er systems. InSection 3, we study the selection of parameters of the Ste<strong>in</strong>er system depend<strong>in</strong>gon the performance objective of <strong>in</strong>terest. We consider both m<strong>in</strong>imum and expectedthroughput us<strong>in</strong>g an acknowledgment scheme proposed earlier. As well,we <strong>in</strong>troduce a more realistic acknowledgement model and study the result<strong>in</strong>gframe throughput. We produce our results as a function of neighbourhood sizeand density, to explore the sensitivity of the actual node degree to the designparameter. Lastly, <strong>in</strong> Section 4, we summarize and conclude.


Ste<strong>in</strong>er Systems for Topology-Transparent Access Control <strong>in</strong> MANETs 2492 Cover-Free Families, Orthogonal Arrays,and Ste<strong>in</strong>er SystemsRather than start<strong>in</strong>g with the exist<strong>in</strong>g constructions for topology-transparenttransmission schedules, let us <strong>in</strong>stead beg<strong>in</strong> anew <strong>by</strong> turn<strong>in</strong>g the problem ofgenerat<strong>in</strong>g a topology-transparent transmission schedule <strong>in</strong>to a comb<strong>in</strong>atorialquestion. Assume that time is divided <strong>in</strong>to discrete units called slots and framesare a fixed number n of slots. Suppose that each node i, 1 ≤ i ≤ N, <strong>in</strong>thenetwork is assigned a transmission schedule S i = s 1 s 2 ...s n with n slots (i.e.,one frame). If s j = 1, 1 ≤ j ≤ n, then a node may transmit <strong>in</strong> the slot j,otherwise it is silent (and could receive).In design<strong>in</strong>g a topology-transparent transmission schedule with design parametersN, the number of nodes <strong>in</strong> the network and D, the maximum nodedegree, we are <strong>in</strong>terested <strong>in</strong> the follow<strong>in</strong>g comb<strong>in</strong>atorial property. For each node,we want to guarantee that if a node i has at most D neighbours its schedule S iguarantees a collision-free transmission to each neighbour.Let us treat each schedule S i as a subset T i on {1, 2,...,n} <strong>by</strong> assign<strong>in</strong>g theelements of the subset to correspond to the positions <strong>in</strong> the schedule, i.e., j ∈ T iif s j =1<strong>in</strong>S i , j =1,...,n (<strong>in</strong> essence, S i is the characteristic vector of theset T i ). Now, the comb<strong>in</strong>atorial problem to ask is for each node i to be given asubset T i with the property that the union of D or fewer other subsets cannotconta<strong>in</strong> T i . Expressed mathematically, if T j , j =1,...,D, are D neighbours of i(T j ≠ T i ), then we require that⎛ ⎞D⋃⎝ T j⎠ ⊅ T i .j=1This is precisely a D cover-free family. These are equivalent to disjunct matrices[6] and to certa<strong>in</strong> superimposed codes [7]; see [5].Let us first observe that the exist<strong>in</strong>g constructions for topology-transparenttransmission schedules [2,10] which, as we showed <strong>in</strong> [16] correspond to an orthogonalarray, give a cover-free family.2.1 An Orthogonal Array Gives a Cover-Free FamilyLet V be a set of v symbols, usually denoted <strong>by</strong> 0, 1,...,v− 1.Def<strong>in</strong>ition 1. A k × v t array A with entries from V is an orthogonal arraywith v levels and strength t (for some t <strong>in</strong> the range 0 ≤ t ≤ k) if every t × v tsubarray of A conta<strong>in</strong>s each t-tuple based on V exactly once 1 as a column. Wedenote such an array <strong>by</strong> OA(t, k, v).Table 1 shows an example from [9] of an orthogonal array of strength twowith v = 4 levels, i.e., V = {0, 1, 2, 3}. Pick any two rows, say the third andthe fourth. Each of the sixteen ordered pairs (x, y),x,y ∈ V appears the samenumber of times, once <strong>in</strong> this case.1 Here, we assume the <strong>in</strong>dex λ =1.


250 C.J. Colbourn, V.R. Syrotiuk, and A.C.H. L<strong>in</strong>gTable 1. Orthogonal array OA(2, 4, 4).0000111122223333012301230123012301231032230132100132320123101023In our application, each column gives rise to a transmission schedule. Eachcolumn <strong>in</strong>tersects every other <strong>in</strong> fewer than t positions. For example, the firstand the eighth column <strong>in</strong>tersect <strong>in</strong> no positions, while the first and the secondcolumn <strong>in</strong>tersect <strong>in</strong> a zero <strong>in</strong> the first position.The importance of this <strong>in</strong>tersection property is as follows. Select any column.S<strong>in</strong>ce any of the other columns can <strong>in</strong>tersect it <strong>in</strong> at most t − 1 positions, anycollection of D other columns has the property that our given column differsfrom all of these D <strong>in</strong> at least k − D(t − 1) positions. Provided this differenceis positive, the column therefore conta<strong>in</strong>s at least one symbol appear<strong>in</strong>g <strong>in</strong> thatposition, not occurr<strong>in</strong>g <strong>in</strong> any of the D columns <strong>in</strong> the same position. In ourapplication this means that at least one collision-free slot to each neighbourexists when a node has at most D neighbours. Thus, as long as the number ofneighbours is bounded <strong>by</strong> D, the delay to reach each neighbour is bounded, evenwhen each neighbour is transmitt<strong>in</strong>g. Clearly, the orthogonal array gives a Dcover-free family.Many techniques are known for construct<strong>in</strong>g orthogonal arrays, usually classified<strong>by</strong> the essential ideas that underlie them. There is a classic constructionbased on Galois fields and f<strong>in</strong>ite geometries; both Chlamtac and Faragó [2] andJu and Li [10] use this construction implicitly though neither observed that theywere construct<strong>in</strong>g an orthogonal array. They both employ OA(t, v, v)’s whenv is a prime power. They therefore restrict attention to the case when k = v(forc<strong>in</strong>g all frame lengths to be v 2 unnecessarily), and <strong>in</strong>deed <strong>by</strong> not permitt<strong>in</strong>gthat k>vthey do not obta<strong>in</strong> the best delay guarantees. The restriction of vto prime powers is also not required, as orthogonal arrays exist for these cases,e.g., OA(2, 7, 12), but k is not as large as v <strong>in</strong> general.In the same way that allow<strong>in</strong>g different parameters for orthogonal arraysallows more flexibility <strong>in</strong> the correspond<strong>in</strong>g schedules, relax<strong>in</strong>g the parametersfurther and ask<strong>in</strong>g for a cover-free family allows more flexibility yet.2.2 Ste<strong>in</strong>er SystemsCover-free families have been studied extensively, most frequently with the objectiveof maximiz<strong>in</strong>g the number of sets <strong>in</strong> the family. In our application, thiscorresponds to maximiz<strong>in</strong>g the number of nodes, so this is certa<strong>in</strong>ly a parameterof <strong>in</strong>terest.There is a celebrated result of Erdös, Frankl, and Füredi [8] that establishedbounds on the size of a cover-free family (see also, [13,15] and Theorem 7.3.9 <strong>in</strong>[6]). Specifically, they established that the extreme value on the size, if achievable,is realized <strong>by</strong> a Ste<strong>in</strong>er system. Hence <strong>in</strong> terms of the application, for a


Ste<strong>in</strong>er Systems for Topology-Transparent Access Control <strong>in</strong> MANETs 251Table 2. Ste<strong>in</strong>er system S(2, 4, 13).00001112233451246257364789385a46b57689a9c7ba8cb9cabcgiven number of nodes and a given maximum number of neighbours, Ste<strong>in</strong>ersystems achieve the shortest frame length of all cover-free families. Thus, theyprovide not only a solution to our problem, but <strong>in</strong>deed the best solution <strong>in</strong> termsof frame length.Def<strong>in</strong>ition 2. Given three <strong>in</strong>tegers t, k, v such that 2 ≤ t


252 C.J. Colbourn, V.R. Syrotiuk, and A.C.H. L<strong>in</strong>gIntuitively, while Chlamtac and Faragó [2] strive to get one free slot per frame,Ju and Li [10] aim to get many free slots per frame.In both studies, however, the figure of merit is m<strong>in</strong>imum throughput measuredas number of free slots with<strong>in</strong> a frame divided <strong>by</strong> frame length. To employsuch an analysis, a transmitt<strong>in</strong>g node must be able to transmit multiple differentpackets with<strong>in</strong> a frame. How does it decide to transmit a “new” packet? Inthis environment, it is expected that collisions occur, and topology-transparencydictates that the collisions cannot be anticipated. Hence an acknowledgementscheme is needed. Both schemes based on orthogonal arrays can transmit <strong>in</strong> twoconsecutive slots, and <strong>in</strong>deed must send different packets <strong>in</strong> these slots to achievethe m<strong>in</strong>imum throughput <strong>in</strong> their analyses. Both propose an acknowledgementscheme that <strong>in</strong>volves <strong>in</strong>stantaneous acknowledgment of successful receipt withoutlengthen<strong>in</strong>g the slot. Naturally, this is an optimistic assumption to facilitatethe analysis. However, the analysis can be mislead<strong>in</strong>g if it leads us to seek manyfree slots <strong>in</strong> a frame without an acceptable (realistic) acknowledgment scheme.For purposes of comparison, we consider the throughput measures employed <strong>in</strong>[2,10,16]. We also adopt a more conservative approach.We consider a more realistic model for acknowledgements. Rather than a slot<strong>by</strong> slot acknowledgement, we assume we can piggyback an acknowledgement ontoa packet sent from the dest<strong>in</strong>ation. In the worst case, this might require that thesender wait an entire frame. Hence we def<strong>in</strong>e frame throughput as the throughputachievable on a per frame basis. This properly <strong>in</strong>corporates the length of theschedule <strong>in</strong> the throughput calculation.In this section we <strong>in</strong>vestigate three questions:1. What is the probability of a successful transmission <strong>in</strong> a frame?2. What is the expected throughput?3. What is the expected frame throughput?All are functions of the number of active transmitters among the neighboursof a node.Consider a situation with sender S and receiver R. Let S be a schedulefor sender S and T 1 ,...,T D−1 be the subsets that correspond to the schedulesof the other active neighbours of R (here, we assume the worst case, when allneighbours are transmitt<strong>in</strong>g). Let T D be the subset correspond<strong>in</strong>g to the schedulefor R, and assume that R is also active.The probability of successful transmission with<strong>in</strong> a frame is just the probabilitythat S has a slot that does not appear <strong>in</strong> T 1 ,...,T D . Expected throughputthen, is the expected number of such slots. The frame throughput is the expectednumber of slots over the frame length. This effectively normalizes the expectedthroughput <strong>by</strong> frame length allow<strong>in</strong>g easier comparison between Ste<strong>in</strong>er systems.We derive these measures analytically but present the derivations elsewhere.The most complex derivation is for expected throughput. We did this for schedulesthat correspond to orthogonal arrays <strong>in</strong> [16]. This formulation may be usedas a basis to derive expected throughput for schedules that correspond to Ste<strong>in</strong>ersystems.


Ste<strong>in</strong>er Systems for Topology-Transparent Access Control <strong>in</strong> MANETs 253S(2,k,v) ThroughputS(2,k,v) Throughput vs. TDMAExpected Throughput0.40.30.20.1Ratio to TDMA Throughput40302010010 20 30 40Size of Neighbourhood010 20 30 40Size of NeighbourhoodFig. 1. Expected throughput for (a) S(2,k,v); and (b) versus TDMA, for k =3, 6, 9, 12.3.1 Numerical ResultsThe results <strong>in</strong> this section were obta<strong>in</strong>ed us<strong>in</strong>g Maple [11], a mathematical softwarepackage.Figure 1(a) plots the expected throughput for S(2,k,v) for k =3, 6, 9, 12as a function of the number of neighbours. In each of the follow<strong>in</strong>g cases,N = v(v − 1)/k(k − 1). For k =3,v =7, 13, 19, 25 are considered for N =7, 26, 57, 100 number of nodes, respectively. For k =6,v =31, 61, 91, 121 areconsidered for N =31, 122, 273, 484 number of nodes, respectively. For k =9,v =73, 145, 217, 289 are considered for N =73, 290, 651, 1156 number of nodes,respectively. F<strong>in</strong>ally, for k = 12, v = 133, 265, 397, 529 are considered for N =133, 530, 1191, 2116 number of nodes, respectively. In the figure, the y-<strong>in</strong>terceptis given <strong>by</strong> k/v, and so the curve with the highest y-<strong>in</strong>tercept has the shortestframe length (k =3,v = 7). Successive curves with lower y-<strong>in</strong>tercept havesuccessively longer frame length. The shorter the frame, the faster the expectedthroughput drops to zero. As well, the expected throughput is much more sensitiveto changes <strong>in</strong> neighbourhood size.In Fig. 1(b), we plot the expected throughput for S(2,k,v) for k =3, 6, 9, 12over the throughput of TDMA with the same frame length, as a function of thenumber of neighbours. For example, now the curve with the highest y-<strong>in</strong>terceptis k = 12, v = 529. This Ste<strong>in</strong>er system supports 2116 nodes, so the expectedframe throughput is k/v1/N = 12529 · 2116 = 48. In other words, <strong>in</strong> the best case, thisSte<strong>in</strong>er system has expected throughput that is 48 times that of TDMA with thesame frame length. When the ratio of expected throughput to the correspond<strong>in</strong>gTDMA is taken, the curve on the left essentially <strong>in</strong>verts position on the right.This means that longer frames with more opportunities to transmit are betterthan shorter frames with fewer opportunities to transmit from the perspectiveof throughput.Figure 2(a) plots the more conservative frame throughput for S(2,k,v) fork =3, 6, 9, 12 as a function of neighbourhood size, for the same v’s as <strong>in</strong> theprevious figure. Now, the y-<strong>in</strong>tercepts correspond to 1/v rather than k/v. Aga<strong>in</strong>,


254 C.J. Colbourn, V.R. Syrotiuk, and A.C.H. L<strong>in</strong>gExpected Frame Throughput0.140.120.10.080.060.040.02S(2,k,v) Frame ThroughputExpected Frame Throughput4321S(2,k,v) Frame Throughput vs. TDMA010 20 30 40Size of Neighbourhood010 20 30 40Size of NeighbourhoodFig. 2. Frame throughput for (a) S(2,k,v); and (b) versus TDMA, for k =3, 6, 9, 12.the curves with a shorter frame length have a more pronounced drop than curveswith longer frame length. As well, curves with the same k value now show aguarantee (i.e., are horizontal) for up to k neighbours, after which the guaranteedegrades.In Fig. 2(b), we plot the ratio of frame throughput for S(2,k,v) for k =3, 6, 9, 12 over the throughput of TDMA for the same frame length as a functionof neighbourhood size, for the same v’s as given earlier. Now, we see that thebest possible throughput is 1/v1/N= N/v which is 4, 3, 2, 1 for <strong>in</strong>creas<strong>in</strong>g valuesof v. Aga<strong>in</strong>, the slot guarantee is evident. That is, the curves are horizontalfor neighbourhood sizes less than or equal to k and the degrade as the neighbourhood<strong>in</strong>creases. The degradation is slower for the longer frames. The curveswhose maximum expected frame throughput equals one correspond to orthogonalarrays OA(2,v,v). Hence it is pla<strong>in</strong>ly evident that schedules constructedfrom Ste<strong>in</strong>er systems are much denser than those constructed from orthogonalarrays, with the potential to yield much higher throughput.Figure 3(a) plots m<strong>in</strong>imum throughput for S(2,k,v) for k =3, 6, 9, 12 as afunction of neighbourhood size for the same values of v as given earlier. Here,the y-<strong>in</strong>tercept is k/v (the same as <strong>in</strong> Fig. 1), however now the x-<strong>in</strong>tercept isk and is the same for each value of v. This results <strong>in</strong> the curves dropp<strong>in</strong>g tozero much more quickly than <strong>in</strong> Fig. 1. A curiosity is that the four segmentsthat correspond to the maximum m<strong>in</strong>imum throughput correspond to S(2,k,v)where the smallest frame length v for the given k provides a range of neighboursover which it provides the best m<strong>in</strong>imum throughput. That is, S(2, 3, 7) andS(2, 12, 133) are better over a larger range of neighbours than are S(2, 6, 31) andS(2, 9, 73).Figure 3(b) plots the ratio of m<strong>in</strong>imum throughput for S(2,k,v) for k =3, 6, 9, 12 over TDMA with the same frame length as a function of neighbourhoodsize for the same v’s. Aga<strong>in</strong> we see that the curves <strong>in</strong>vert order when the ratiois considered. Specifically, the curve with the highest y-<strong>in</strong>tercept is S(2, 12, 529)s<strong>in</strong>ce this is given <strong>by</strong> k/v1/Nas <strong>in</strong> Fig. 1. However the x-<strong>in</strong>tercept now correspondsto k as on the figure on the left. Now, the largest v for each k provides the bestm<strong>in</strong>imum throughput relative to TDMA.


Ste<strong>in</strong>er Systems for Topology-Transparent Access Control <strong>in</strong> MANETs 255S(2,k,v) M<strong>in</strong>imum ThroughputS(2,k,v) M<strong>in</strong>imum Throughput vs. TDMAM<strong>in</strong>imum Throughput0.40.30.20.1Ratio to TDMA Throughput40302010010 20 30 40Size of Neighbourhood010 20 30 40Size of NeighbourhoodFig. 3. M<strong>in</strong>imum throughput for (a) S(2,k,v); and (b) versus TDMA, for k =3, 6, 9, 12.M<strong>in</strong>imum Frame Throughput0.140.120.10.080.060.040.020S(2,k,v) M<strong>in</strong>imum Frame Throughput10 20 30 40Size of NeighbourhoodRatio to TDMA Frame ThroughputS(2,k,v) M<strong>in</strong>imum Frame Throughput vs. TDMA4321010 20 30 40Size of NeighbourhoodFig. 4. M<strong>in</strong>imum frame throughput for (a) S(2,k,v); and (b) versus TDMA, for k =3, 6, 9, 12.Aga<strong>in</strong>, we look at frame throughput, this time the m<strong>in</strong>imum value, <strong>in</strong> Fig. 4(for the same k’s and v’s). Not surpris<strong>in</strong>gly, the m<strong>in</strong>imum frame throughput islower than when us<strong>in</strong>g the more optimistic acknowledgement model. The ma<strong>in</strong>difference between this figure and Fig. 2 is the x-<strong>in</strong>tercepts. Here, they correspondto k, clearly show<strong>in</strong>g that with m<strong>in</strong>imum frame throughput, once theneighbourhood exceeds the design parameter, all guarantees are lost immediately.This is also true for the ratio of m<strong>in</strong>imum frame throughput over TDMAwith the same frame length (b). This figure also shows that the m<strong>in</strong>imum framethroughput is essentially constant for each k as long as the design parameter issatisfied.Figure 4 shows us someth<strong>in</strong>g very important, <strong>in</strong> addition. Larger Ste<strong>in</strong>ersystems give us a m<strong>in</strong>imum frame throughput substantially better than TDMAwhen the neighbourhood is with<strong>in</strong> the bound. This is <strong>in</strong> stark constrast with theschemes <strong>in</strong> [2,10]; they never outperform TDMA on m<strong>in</strong>imum frame throughputwhen orthogonal arrays of strength two are used.Figure 5 is different from all other figures <strong>in</strong> that it plots expected throughputversus density of the neighbourhood. That is, the x-axis is the percentage ofnodes that are neighbours — these are not absolute values, and represent much


256 C.J. Colbourn, V.R. Syrotiuk, and A.C.H. L<strong>in</strong>gExpected Throughput0.40.30.20.1S(2,k,v) ThroughputRatio to TDMA Throughput3530252015105S(2,k,v) Throughput vs. TDMA05 10 15 20 25Density of Neighbourhood05 10 15 20 25Density of NeighbourhoodFig. 5. Throughput versus density for (a) S(2,k,v); and (b) versus TDMA, for k =3, 6, 9, 12.larger neighbourhood sizes <strong>in</strong> general. The reason that the curves are jagged isthat the closest <strong>in</strong>teger value is taken as the percentage of neighbours, i.e., we donot consider fractional numbers of neighbours. While the figure shows S(2,k,v)for k =3, 6, 9, 12, only the first three values of v for each k are shown s<strong>in</strong>cethe computations are highly memory and compute <strong>in</strong>tensive. The y-<strong>in</strong>terceptsare the same as <strong>in</strong> Fig. 1. As a function of neighbourhood density, the expectedthroughput (a) is more well-behaved than as a function of neighbourhood size.When the ratio of expected throughput to TDMA throughput is consideredversus neighbourhood density (b) the curves drop more rapidly as the density<strong>in</strong>creases more rapidly than a l<strong>in</strong>ear function.F<strong>in</strong>ally, Fig. 6 once aga<strong>in</strong> plots expected throughput versus neighbourhoodsize for three Ste<strong>in</strong>er systems that support the same number of nodes, namelyN = 651 and one orthogonal array that supports a number very close to that(625). Specifically from the top down, the curves correspond to S(2, 3, 63),S(2, 9, 217), S(2, 26, 651) and OA(2, 26, 25). First, we see that the last two curvesare essentially <strong>in</strong>dist<strong>in</strong>guishable from each other. That is, for all <strong>in</strong>tents andpurposes, the S(2, 26, 651) and OA(2, 26, 25) give the same performance but theSte<strong>in</strong>er system supports more nodes. The Ste<strong>in</strong>er system with shorter framelength gives better expected throughput until the neighbourhood is about 20,at which po<strong>in</strong>t the curves all cross. Its performance also degrades more rapidlywith <strong>in</strong>creas<strong>in</strong>g neighbourhood size.4 Summary and ConclusionsIn this paper, we stepped back and exam<strong>in</strong>ed anew the comb<strong>in</strong>atorial propertiesof topology-transparent schedules. The properties were found to correspondprecisely to D cover-free families, where D is a design parameter <strong>in</strong>dicat<strong>in</strong>gmaximum number of neighbours.Studies of several Ste<strong>in</strong>er systems show the follow<strong>in</strong>g general trends. Ste<strong>in</strong>ersystems admit shorter schedules (frames) than previous cosntructions based on


Ste<strong>in</strong>er Systems for Topology-Transparent Access Control <strong>in</strong> MANETs 257600–700 Node ThroughputExpected Throughput0.040.030.020.010 10 20 30 40Size of NeighbourhoodFig. 6. Expected throughput for Ste<strong>in</strong>er systems for 600-700 nodes.orthogonal arrays. This is significant for delay sensitive applications such asmulti-media. S<strong>in</strong>ce Ste<strong>in</strong>er systems are also more dense, they support more nodesfor a given frame length and hence achieve higher throughput. While shorterschedules give the best m<strong>in</strong>imum and expected throughput, they also degradefaster as the design parameter D is exceeded. That is, longer schedules are morerobust to changes <strong>in</strong> neighbourhood size. Another general observation is that theSte<strong>in</strong>er systems that yield longer schedules achieve higher ratios on m<strong>in</strong>imum andexpected throughput when compared to TDMA schedules of the same length.We have characterized the types of solutions topology-transparent transmissionschedules require as cover-free families. Us<strong>in</strong>g this, along with a more realisticacknowledgement model, we plan to <strong>in</strong>vestigate the issue of what to dowhen the schedule fails due to node mobility caus<strong>in</strong>g the design parameter onneighbourhood size to be exceeded. This, together with simulations us<strong>in</strong>g mobilitymodels are required to determ<strong>in</strong>e how such scheduled topology-transparentprotocols compare to contention based protocols.References1. M. Benveniste, G. Chesson, M. Hoeben, A. S<strong>in</strong>gla, H. Teunissen, and M. Went<strong>in</strong>k,Enhanced Distributed Coord<strong>in</strong>ation Function (EDCF) proposed draft text, IEEEwork<strong>in</strong>g document 802.11-01/131r1, March 2001.2. I. Chlamtac and A. Faragó, “Mak<strong>in</strong>g Transmission Schedules Immune to TopologyChanges <strong>in</strong> Multi-Hop Packet Radio Networks, IEEE/ACM Transactions onNetwork<strong>in</strong>g, Vol. 2, No. 1, February 1994, pp. 23–29.3. I. Chlamtac, A. Faragó, and H. Zhang, “Time-Spread Multiple-Access (TSMA)Protocols for Multihop Mobile Radio Networks,” IEEE/ACM Transactions on Network<strong>in</strong>g,Vol. 5, No. 6, December 1997, pp. 804–812.4. C.J. Colbourn and J.H. D<strong>in</strong>itz (eds.), The CRC Handbook of Comb<strong>in</strong>atorial Designs,c○1996 CRC Press, Inc.5. C.J. Colbourn, J.H. D<strong>in</strong>itz, and D.R. St<strong>in</strong>son, “Applications of Comb<strong>in</strong>atorial Designsto Communications, Cryptography, and Network<strong>in</strong>g,” <strong>in</strong> Surveys <strong>in</strong> Comb<strong>in</strong>atorics,1999, J.D. Lamb and D.A. Preece (eds.), London Mathematical Society,<strong>Lecture</strong> Note Series 267, c○Cambridge University Press, 1999, pp. 37–100.


258 C.J. Colbourn, V.R. Syrotiuk, and A.C.H. L<strong>in</strong>g6. D.-Z. Du and F.K. Hwang, Comb<strong>in</strong>atorial Group Test<strong>in</strong>g and its Applications, 2ndedition, c○2000 World Scientific Publish<strong>in</strong>g Co. Pte. Ltd.7. A. D’yachkov, V. Rykov, and A.M. Rashad, “Superimposed Distance Codes,” ProblemsControl and Information Theory, 18 (1989), pp. 237–250.8. P. Erdös, P. Frankl and Z. Füredi, “Families of F<strong>in</strong>ite Sets <strong>in</strong> which no Set isCovered <strong>by</strong> the Union of r Others, Israel J. Math. 51 (1985), pp. 79–89.9. A.S. Hedayat, N.J.A. Sloane, and J. Stufken, Orthogonal Arrays, Theory and Applications,c○1999 Spr<strong>in</strong>ger-Verlag, New York, Inc.10. J.-H. Ju and V.O.K. Li, “An Optimal Topology-Transparent Schedul<strong>in</strong>g Method <strong>in</strong>Multihop Packet Radio Networks, IEEE/ACM Transactions on Network<strong>in</strong>g, Vol.6., No. 3, June 1998, pp. 298–306.11. Maple 8, Waterloo Maple, Inc.http://www.maplesoft.com/ma<strong>in</strong>.html12. L. Romdhani, Q. Ni, and T. Turletti. “AEDCF: Enhanced Service Differentiationfor IEEE 802.11 Wireless Ad-Hoc Networks,” INRIA Research Report, No. 4544,2002.13. M. Rusz<strong>in</strong>kó, “On the Upper Bound of the Size of the r-cover-free Families,”Journal of Comb<strong>in</strong>atorial Theory, Series A, 66 (1994), pp. 302–310.14. J.L. Sobr<strong>in</strong>ho and A.S. Krishnakumar, “Quality-of-Service <strong>in</strong> Ad Hoc Carrier SenseMultiple Access Wireless Networks,” IEEE Journal on Selected Areas <strong>in</strong> Communications,Vol. 17, No. 8, August 1999, pp. 1352–1368.15. D.R. St<strong>in</strong>son, R. Wei and L. Zhu, “Some New Bounds for Cover-Free Families,”Journal of Comb<strong>in</strong>atorial Theory, Series A, 90 (2000), pp. 224–234.16. V.R. Syrotiuk, C.J. Colbourn and A.C.H. L<strong>in</strong>g, Topology-Transparent Schedul<strong>in</strong>g<strong>in</strong> MANETs us<strong>in</strong>g Orthogonal Arrays, to appear <strong>in</strong> Proceed<strong>in</strong>gs of the DIALM-POMC Jo<strong>in</strong>t Workshop on Foundations of Mobile Comput<strong>in</strong>g, San Diego, CA,September 19, 2003.


Complexity of Connected Components<strong>in</strong> Evolv<strong>in</strong>g Graphs and the Computationof Multicast Trees <strong>in</strong> Dynamic Networks ⋆Sandeep Bhadra 1 and Afonso Ferreira 21 Dept. of Electrical Eng<strong>in</strong>eer<strong>in</strong>g, Indian Institute of Technology,Madras, Chennai, Indiasandy@ee.iitm.ernet.<strong>in</strong>2 CNRS, I3S & INRIA-Sophia Antipolis, Projet Mascotte,2004 Rt. des Lucioles, BP93, F-06902 Sophia Antipolis, France.Afonso.Ferreira@<strong>in</strong>ria.frAbstract. New technologies and the deployment of mobile and nomadicservices are driv<strong>in</strong>g the emergence of complex communicationsnetworks, that have a highly dynamic behavior. This naturally engendersnew route-discovery problems under chang<strong>in</strong>g conditions over thesenetworks. Unfortunately, the temporal variations <strong>in</strong> the topology of dynamicnetworks are hard to be effectively captured <strong>in</strong> a classical graphmodel. In this paper, we use evolv<strong>in</strong>g graphs, which helps capture thedynamic characteristics of such networks, <strong>in</strong> order to compute multicasttrees with m<strong>in</strong>imum overall transmission time for a class of wirelessmobile dynamic networks. We first show that comput<strong>in</strong>g different typesof strongly connected components <strong>in</strong> evolv<strong>in</strong>g digraphs is NP-Complete,and then propose an algorithm to build all rooted directed m<strong>in</strong>imumspann<strong>in</strong>g trees <strong>in</strong> strongly connected dynamic networks.1 IntroductionInfrastructure-less mobile communication environments, such as mobile ad-hocnetworks and low earth orbit<strong>in</strong>g (LEO) satellite systems, present a paradigmshift from back-boned networks, such as cellular telephony, <strong>in</strong> that data is transferedfrom node to node via peer-to-peer <strong>in</strong>teractions and not over an underly<strong>in</strong>gbackbone of routers. Naturally, this engenders new problems regard<strong>in</strong>g optimalrout<strong>in</strong>g of data under various conditions over these dynamic networks [15].In this sett<strong>in</strong>g, the generalized case of mobile network rout<strong>in</strong>g us<strong>in</strong>g shortestpaths or least cost methods are complicated <strong>by</strong> the arbitrary movement ofthe mobile agents there<strong>by</strong> lead<strong>in</strong>g to random variations <strong>in</strong> l<strong>in</strong>k costs and connectivity[15]. This variable nature of the topology can be aprehended only <strong>by</strong>network updates of the l<strong>in</strong>k state between mov<strong>in</strong>g nodes, thus creat<strong>in</strong>g substantialcommunication overhead along the l<strong>in</strong>k. This naturally motivates study<strong>in</strong>g⋆ This work was partially supported <strong>by</strong> the European RTN project ARACNE, theEuropean FET project CRESCCO, and the AS CNRS Dynamo. It was done whilethe first author was visit<strong>in</strong>g the project MASCOTTE, INRIA/CNRS/UNSA.S. Pierre, M. Barbeau, and E. Kranakis (Eds.): ADHOC-NOW 2003, LNCS <strong>2865</strong>, pp. 259–270, 2003.c○ Spr<strong>in</strong>ger-Verlag Berl<strong>in</strong> Heidelberg 2003


260 S. Bhadra and A. Ferreirathe model<strong>in</strong>g of such dynamics, and design<strong>in</strong>g algorithms that take it <strong>in</strong>to account[16].Literature related to route discovery issues <strong>in</strong> dynamic networks started morethan four decades ago, with papers deal<strong>in</strong>g with operations of transport networks(e.g., [5,9,11,10]). Recent work on time-dependent networks deals with flow algorithms<strong>in</strong> static networks, with edge traversal times that may depend on thenumber of flow units travers<strong>in</strong>g it at a given moment. If traversal times are discrete,then the approach proposed <strong>in</strong> [9], namely of expand<strong>in</strong>g the orig<strong>in</strong>al graph<strong>in</strong>to T layers represent<strong>in</strong>g the time steps (also called space-time approach), maywork for comput<strong>in</strong>g several path-related problems (see [13,14] and referencesthere<strong>in</strong>). Unfortunately, this approach leads to non-tractable algorithms, s<strong>in</strong>ceT may be of exponential size.Predictable dynamics. Note, however, that for the case of LEO satellite systems,Unmanned Aerial Vehicles (UAV), and other mobile networks with predest<strong>in</strong>edtrajectories of the mobile agents, the network dynamics are somewhatdeterm<strong>in</strong>istic. Therefore, s<strong>in</strong>ce the trajectories of the network agents are known<strong>in</strong> advance, it is possible to exploit this determ<strong>in</strong>ism <strong>in</strong> optimiz<strong>in</strong>g rout<strong>in</strong>g strategies[6,17,8].Another sett<strong>in</strong>g where the evolution of the network is known was studied<strong>in</strong> [7]. The authors used the notion of competitive analysis ([1]) on a dynamicsett<strong>in</strong>g <strong>in</strong> order to analyze the quality of a protocol and its on-l<strong>in</strong>e choices made,forced <strong>by</strong> the evolution of the network. At the end of the process, the historyof the network is formalized as a sequence of graph topologies on which theapplication can be solved off-l<strong>in</strong>e. The merit of the protocol is then the ratio ofthe solution cost found on-l<strong>in</strong>e over the optimal off-l<strong>in</strong>e cost.Such networks, where the topology dynamics is known or can be predicted beforehand,are henceforth referred to as fixed schedule dynamic networks (FSDN’s)(see Figure 1).(0) (1)(2) (3)Fig. 1. An FSDN represented as an <strong>in</strong>dexed set of networks. The <strong>in</strong>dices correspondto successive time-steps.Evolv<strong>in</strong>g graphs. Recently, evolv<strong>in</strong>g graphs [2] have been proposed as a formalabstraction for dynamic networks, and can be suited easily to the case of


Complexity of Connected Components <strong>in</strong> Evolv<strong>in</strong>g Graphs 261FSDN’s. Concisely, an evolv<strong>in</strong>g graph is an <strong>in</strong>dexed sequence of T subgraphs ofa given graph, where the subgraph at a given <strong>in</strong>dex po<strong>in</strong>t corresponds to thenetwork connectivity at the time <strong>in</strong>terval <strong>in</strong>dicated <strong>by</strong> the <strong>in</strong>dex number. Thetime doma<strong>in</strong> is further <strong>in</strong>corporated <strong>in</strong>to the model <strong>by</strong> restrict<strong>in</strong>g journeys (i.e.,the equivalent of paths <strong>in</strong> usual graphs) to never move <strong>in</strong>to edges which existedonly <strong>in</strong> past subgraphs (cf. Figure 2 below, and Section 2).0,1,3C0,1A0,1,2,332,31,2,3B0,1,20,1,310,2,300,1,21,2,30,1,2,30FD0,3E0,1,2,3Fig. 2. Evolv<strong>in</strong>g digraph correspond<strong>in</strong>g to FSDN <strong>in</strong> Figure 1. Edges are labeled withcorrespond<strong>in</strong>g time-steps. Observe that CBF is not a valid journey s<strong>in</strong>ce BF existsonly <strong>in</strong> the past with respect to CB.Notice that this model allows for arbitrary changes between two consecutivetime steps, with the possible creation and/or deletion of any number ofvertices and edges. Evolv<strong>in</strong>g graph edges can also be associated with traversaltimes. In [2], algorithms were proposed for f<strong>in</strong>d<strong>in</strong>g foremost, shortest, and fastestjourneys <strong>in</strong> dynamic mobile networks modeled <strong>by</strong> evolv<strong>in</strong>g graphs. Other pathproblems <strong>in</strong> evolv<strong>in</strong>g graphs can be found under the merit approach [7]. Resultsproven <strong>in</strong>clude f<strong>in</strong>d<strong>in</strong>g a sequence of paths that connect a given pair of nodesthroughout the system, such that the global rout<strong>in</strong>g plus re-rout<strong>in</strong>g costs arem<strong>in</strong>imized.Our work. We focus on the analysis of connectivity properties <strong>in</strong> FSDN’s andthe design of algorithms for build<strong>in</strong>g directed m<strong>in</strong>imal spann<strong>in</strong>g trees (DMST’s)to generate multicast routes <strong>in</strong> FSDN’s. The DMST problem <strong>in</strong> wireless networkswas def<strong>in</strong>ed <strong>in</strong> [12] as f<strong>in</strong>d<strong>in</strong>g N m<strong>in</strong>imum weight trees, or arborescences, <strong>in</strong> anetwork modeled <strong>by</strong> a strongly connected digraph with N vertices. A centralizedalgorithm for f<strong>in</strong>d<strong>in</strong>g DMST’s <strong>in</strong> static wireless networks is presented <strong>by</strong> Chuand Liu [3], and Tarjan [18] provides an efficient implementation of the same.Humblet [12] provides a distributed algorithm for f<strong>in</strong>d<strong>in</strong>g DMST’s <strong>in</strong> stronglyconnected networks. Furthermore, m<strong>in</strong>imum energy multicast trees for wirelessnetworks have also been studied for the static case <strong>in</strong> [20,19]. In contrast, ourapproach differs from these <strong>in</strong> that our algorithm builds DMST’s over dynamicmobile networks modeled <strong>by</strong> evolv<strong>in</strong>g digraphs, which can be seen as dynamicallychang<strong>in</strong>g digraphs.


262 S. Bhadra and A. FerreiraIn this paper, we start <strong>by</strong> provid<strong>in</strong>g, <strong>in</strong> the next section, basic def<strong>in</strong>itions forvarious common graph theory terms <strong>in</strong> the context of evolv<strong>in</strong>g digraphs. Follow<strong>in</strong>gHumblet [12], we def<strong>in</strong>e rooted DMST’s over strongly connected evolv<strong>in</strong>gdigraphs. This naturally leads to the question of how to determ<strong>in</strong>e if an evolv<strong>in</strong>gdigraph is strongly connected. In Section 3 we def<strong>in</strong>e strongly connected components(SCC’s) <strong>in</strong> evolv<strong>in</strong>g digraphs and discover that the unique propertiesof evolv<strong>in</strong>g digraphs yield two types of strongly connected components: standardSCC’s and the more loosely def<strong>in</strong>ed open strongly connected components(o-SCC’s), as it will become clear later. One of our results is that unlike <strong>in</strong> standarddigraphs, f<strong>in</strong>d<strong>in</strong>g the strongly connected components <strong>in</strong> evolv<strong>in</strong>g digraphsis not possible <strong>in</strong> determ<strong>in</strong>istic polynomial time, unless P=NP. In case the evolv<strong>in</strong>gdigraph is already identified as a strongly connected component, we give <strong>in</strong>Section 4 an algorithm to compute DMST, which uses a variation of Prim’s algorithm[4] for comput<strong>in</strong>g m<strong>in</strong>imum spann<strong>in</strong>g trees. For an evolv<strong>in</strong>g digraph withmaximum outdegree D, our algorithm builds the rooted DMST over a stronglyconnected component <strong>in</strong> an evolv<strong>in</strong>g digraph <strong>in</strong> O(ND log T ) time. Section 5conta<strong>in</strong>s conclud<strong>in</strong>g remarks and scope for further research.2 Graph Theoretic ModelS<strong>in</strong>ce we use evolv<strong>in</strong>g digraphs as a model for FSDN’s throughout this paper,we start with a revision of the basic def<strong>in</strong>itions of terms <strong>in</strong> the theory of evolv<strong>in</strong>gdigraphs.2.1 Evolv<strong>in</strong>g DigraphsEvolv<strong>in</strong>g digraphs are def<strong>in</strong>ed as follows.Def<strong>in</strong>ition 1 (Evolv<strong>in</strong>g Digraphs). Let a digraph G(V,E) be given, alongwith an ordered sequence of its subdigraphs, S G = G 0 ,G 1 ,...,G T , T ∈ IN. Then,the system G =(G, S G ) is called an evolv<strong>in</strong>g digraph.We now def<strong>in</strong>e some of the ma<strong>in</strong> parameters of an evolv<strong>in</strong>g digraph. Let E G =⋃Ei , and V G = ⋃ V i . It is clear that M = |E G |≤|E| = M and that N = |V G |≤|V | = N. The central notion <strong>in</strong> evolv<strong>in</strong>g graph theory is the restriction imposedupon paths to traverse arcs strictly <strong>in</strong> non-decreas<strong>in</strong>g order of arc schedule times,imply<strong>in</strong>g that there are no paths <strong>in</strong> G go<strong>in</strong>g to the “past.”Def<strong>in</strong>ition 2 (Journeys). Let P be a path <strong>in</strong> G i , under the usual def<strong>in</strong>ition.Let F (P ) be its first vertex, L(P ) be its last vertex, and |P | be its length. Wedef<strong>in</strong>e a journey <strong>in</strong> G between two vertices u and v of V G as a sequence J (u, v) =P t1 ,P t2 ,...,P tk , with t 1


Complexity of Connected Components <strong>in</strong> Evolv<strong>in</strong>g Graphs 2631ac322bFig. 3. Open Strongly Connected Components.Thus, we may alternately def<strong>in</strong>e an evolv<strong>in</strong>g digraph as a tuple G =(V G ,E G ),where each arc <strong>in</strong> E G has an arc schedule def<strong>in</strong>ed for it.Two vertices are said to be adjacent <strong>in</strong> G if and only if they are adjacent <strong>in</strong>some G i . The degree of a vertex <strong>in</strong> G is def<strong>in</strong>ed as its degree <strong>in</strong> E G .As usual, a tree <strong>in</strong> G could be def<strong>in</strong>ed as a connected <strong>in</strong>duced subdigraph ofV G with no circuits <strong>in</strong> G(V,E). However, such a tree would not be very helpfulwhen study<strong>in</strong>g connectivity issues, s<strong>in</strong>ce it does not take <strong>in</strong>to account the totalorder of the subdigraphs <strong>in</strong> G, and the restrictions it imposes on journeys <strong>in</strong> G.Therefore, we def<strong>in</strong>e a valid rooted tree <strong>in</strong> G as a rooted directed tree <strong>in</strong> G, whereall paths from the root to the leaves are journeys <strong>in</strong> G.2.2 Strongly Connected Components and ArborescencesWe def<strong>in</strong>e an evolv<strong>in</strong>g digraph G to be a strongly connected digraph if there existsa journey J <strong>in</strong> G between any two vertices <strong>in</strong> V G .Def<strong>in</strong>ition 3 (Strongly Connected Component). Analogous to standarddigraphs [4], we def<strong>in</strong>e a strongly connected component (SCC) <strong>in</strong> an evolv<strong>in</strong>gdigraph as the maximal set of vertices U G ⊆ V G such that for any pair u, v ∈ U G ,there exists a journey from u to v and from v to u us<strong>in</strong>g only arcs <strong>in</strong> the Cartesianproduct U G ⊗ U G .Thus, the subdigraph G ′ <strong>in</strong>duced <strong>by</strong> consider<strong>in</strong>g vertices <strong>in</strong> the SCC U G is astrongly connected digraph. For example, <strong>in</strong> Figure 3, {b, a} forms a SCC s<strong>in</strong>cethere are journeys from a to b and vice versa which traverse only vertices <strong>in</strong> theset {a, b}. In this figure and elsewhere <strong>in</strong> the paper arcs are labeled with theirrespective arc schedule times. Note that, unlike standard digraphs, there can bea journey between two vertices <strong>in</strong> the SCC that traverses vertices outside U G .Thus, it is possible for two vertices u, v ∈ U G to establish a journey between themwithout the constra<strong>in</strong>t that all arcs <strong>in</strong> the journey must be with<strong>in</strong> U G ⊗ U G .InFigure 3, although there exist journeys from b to c and from c to b, {b, c} is notan SCC s<strong>in</strong>ce the only journey from c to b traverses via a. Indeed the subdigraph<strong>in</strong>duced <strong>by</strong> {b, c} is not strongly connected. So, we offer a looser def<strong>in</strong>ition ofstrong connectivity as follows.


264 S. Bhadra and A. FerreiraDef<strong>in</strong>ition 4. An open strongly connected component(o-SCC) is the maximalset of vertices U ⊆ V G such that for any pair u, v ∈ U, there exists a journeyfrom u to v and from v to u.A journey between two nodes u, v ∈ U, might need to use nodes h i ∈ V G ,h i /∈U to ma<strong>in</strong>ta<strong>in</strong> strong connectivity. The set of such nodes {h i } = H(u, v) are thehelp<strong>in</strong>g nodes (h-nodes) for the vertices u, v.Consequently, an SCC U G is an o-SCC with the additional requirement thatH(u, v) =∅∀u, v ∈ U G . Hence the set {b, c} <strong>in</strong> Figure 3 forms a o-SCC withH(b, c) ={a} s<strong>in</strong>ce vertex a is required to form the only journey from b to c,there<strong>by</strong> ma<strong>in</strong>ta<strong>in</strong><strong>in</strong>g strong connectivity. Also, s<strong>in</strong>ce H(b, c) ≠ ∅, {b, c} is not anSCC.For the case of static networks, Humblet [12] def<strong>in</strong>es the concept of rootedspann<strong>in</strong>g trees over strongly connected directed networks. We extend this def<strong>in</strong>itionto the case of evolv<strong>in</strong>g digraphs as follows. We def<strong>in</strong>e a rooted directedspann<strong>in</strong>g tree or an arborescence over a o-SCC U G ∈Gas a valid rooted directedtree <strong>in</strong> G rooted at r which spans all the vertices <strong>in</strong> U G ; thus all the nodes exceptthe root has one and only one <strong>in</strong>com<strong>in</strong>g arc. Note that the arborescence mightneed to <strong>in</strong>clude h-nodes to reach some vertices <strong>in</strong> the o-SCC.3 Complexity of Strongly Connected ComponentsIn this section we will first use the foremost journey algorithm to verify strongconnectivity for an FSDN. Then we will prove that the decomposition of a FSDN<strong>in</strong>to (o-) SCC components is NP-Complete.3.1 The Network ModelA FSDN can be seen as a series of networks R = ...,R t−1 , R t , R t+1 ,... overtime. We model a FSDN as a dynamic network which has a presence matrixP E [(u, v),i], <strong>in</strong>dicat<strong>in</strong>g whether (u, v) is present at time step t i , for each l<strong>in</strong>k(u, v) ofR, and another presence matrix P V [u, i], <strong>in</strong>dicat<strong>in</strong>g whether u is presentat time step t i , for each node u of R. The network at time t i is then represented<strong>by</strong> the subnetwork R ti of R, which is obta<strong>in</strong>ed <strong>by</strong> tak<strong>in</strong>g the nodes and l<strong>in</strong>ks ofR for which their correspond<strong>in</strong>g P [i]’s <strong>in</strong>dicate they are to be present.In order to model a fixed-schedule dynamic network <strong>by</strong> an evolv<strong>in</strong>g digraph,it suffices to be given a time w<strong>in</strong>dow W of size T , and to work withG =( ⋃ R i |i ∈W, FSDN |W ). Throughout this text, we assume packet basednetworks – so transmitt<strong>in</strong>g one piece of data equals transmitt<strong>in</strong>g one packetover an arc. L<strong>in</strong>k transmission time between nodes <strong>in</strong> the network may allow forthe transmission of a packet over several l<strong>in</strong>ks before a change <strong>in</strong> the networktopology. Correspond<strong>in</strong>gly <strong>in</strong> the model, consider<strong>in</strong>g time between two successivesubdigraphs <strong>in</strong> an evolv<strong>in</strong>g digraph as unity, the time taken to cross an arc(u, v) is expressed as a positive delay w(u, v) ≤ 1. The case where the traversaltime is larger than the frequency of topology change would then yield a delayw(u, v) > 1. We also implicitly assume conservation of <strong>in</strong>formation, i.e. <strong>in</strong> case a


Complexity of Connected Components <strong>in</strong> Evolv<strong>in</strong>g Graphs 265a321, 4,7cd65bFig. 4. Overlapp<strong>in</strong>g SCC’s.node <strong>in</strong> the network disappears for any reason, then upon rejo<strong>in</strong><strong>in</strong>g the network,it will still have all the <strong>in</strong>formation that it had received before its disappearance.3.2 Verification of Strong Connectivity <strong>in</strong> FSDN’sGiven an FSDN network, we must determ<strong>in</strong>e if it is strongly connected. It isequivalent to the follow<strong>in</strong>g proposition over the correspond<strong>in</strong>g evolv<strong>in</strong>g digraph.Proposition 1. Given an evolv<strong>in</strong>g digraph G with N nodes and M l<strong>in</strong>ks overa sequence of length T , it is possible to determ<strong>in</strong>e if it is strongly connected ornot <strong>in</strong> O(NM(logT + logN )) time steps.Proof sketch: The transitive closure of G is def<strong>in</strong>ed as the digraph R G =(V,E R ), where E R = {(v i ,v j ) : ∃ a journey J (v i ,v j )}. Hence, G is stronglyconnected if the underly<strong>in</strong>g graph of R G is a complete graph. The verificationis executed simply and efficiently <strong>by</strong> form<strong>in</strong>g the shortest journeys tree for eachnode <strong>in</strong> the network us<strong>in</strong>g the algorithm proposed <strong>in</strong> [2]. For N nodes, thealgorithm is repeated N times, for an overall time of O(NM(logT + logN )).3.3 Decomposition <strong>in</strong>to SCC’sTarjan’s algorithm [4], based on the concept of forefathers <strong>in</strong> a depth-first searchtree over a digraph, is used to decompose standard digraphs <strong>in</strong>to SCC’s. HoweverSCC’s <strong>in</strong> evolv<strong>in</strong>g digraphs have the follow<strong>in</strong>g unique properties, which make itimpossible to use Tarjan’s algorithm.Property 1. Two different SCC’s can have common vertices.For example, consider the digraph given <strong>in</strong> Figure 4, where arcs are labeled withthe respective arc schedule times. From the def<strong>in</strong>ition of SCC’s we see that thereare two such components a, c, d and b, c, d which have the common vertices c, dbetween them.Property 2. For any two vertices <strong>in</strong> the SCC (respectively, o-SCC) there maybe journeys connect<strong>in</strong>g them which use vertices outside the SCC (respectively,o-SCC).


266 S. Bhadra and A. FerreiraThis stands directly from Property 1. As an example, take <strong>in</strong> Figure 4 the journeyfrom d to c, which uses vertex a that lies outside the SCC {b, c, d}.The ma<strong>in</strong> problem calls for decompos<strong>in</strong>g the evolv<strong>in</strong>g digraph <strong>in</strong>to all possibleSCC’s. Consider a subproblem COMPONENT def<strong>in</strong>ed as follows.COMPONENT: Given an evolv<strong>in</strong>g digraph G =(V G ,E G ) and an <strong>in</strong>teger k,is there a SCC of size k?We shall subsequently demonstrate that COMPONENT is NP-Complete,there<strong>by</strong> preclud<strong>in</strong>g a polynomial time algorithm for the decomposition problem,unless P=NP.Theorem 1. COMPONENT is <strong>in</strong> NP.Proof sketch: Given a subset V G ′ of V G and the <strong>in</strong>teger k, we must have a meansof verify<strong>in</strong>g <strong>in</strong> polynomial time if V G ′ is <strong>in</strong>deed a SCC of size k. First, verify that|V G ′| = k. Verify<strong>in</strong>g that the subdigraph G ′ <strong>in</strong>duced <strong>by</strong> V G ′ on G is stronglyconnected and maximum is possible <strong>in</strong> polynomial time from Proposition 1.We now def<strong>in</strong>e a strong reachability digraph for an evolv<strong>in</strong>g digraph G as anundirected graph S G =(V G ,E S ), where E S = {(v i ,v j )} if and only if (v i ,v j ) ∪(v j ,v i ) ∈ R G , the transitive closure digraph of G.To prove the NP-Completeness of COMPONENT we reduce the CLIQUEproblem to COMPONENT. CLIQUE is formally def<strong>in</strong>ed as follows: Given adigraph G =(V,E), and an <strong>in</strong>teger k, is there a clique of size k <strong>in</strong> G?Lemma 1. F<strong>in</strong>d<strong>in</strong>g an SCC <strong>in</strong> G is equivalent to f<strong>in</strong>d<strong>in</strong>g a maximal clique <strong>in</strong>S G , the strong connectivity graph of G.Proof: Directly from the def<strong>in</strong>itions of strong reachability, SCC and maximalclique, we see that the SCC <strong>in</strong> G is equivalent to f<strong>in</strong>d<strong>in</strong>g the maximal clique <strong>in</strong>S G .Theorem 2. CLIQUE can be reduced to COMPONENT <strong>in</strong> polynomial time.Proof sketch: Given an undirected graph G =(V,E) and the <strong>in</strong>teger k, weconstruct an evolv<strong>in</strong>g digraph G =(V G ,E G ) as follows (cf. Figure 5):1. For each node u i ∈ V create a node v i ∈ V G ,anodeh ii ∈ V G , and arcs(v i ,h ii ), (h ii ,v i ) with arc schedule time 2;2. For each edge {u i ,u j }∈E, do(a) create nodes h ij ,h ji ∈ V G ,(b) create arcs (v i ,h ij ),(h ij ,v i ), and arcs (v j ,h ji ), (h ji ,v j ) with arc scheduletime 2,(c) create arcs (h ij ,v j ), (v j ,h ij ) and arcs (h ji ,v i ), (v i ,h ji ) with arc scheduletime 3.3. Create an SCC connect<strong>in</strong>g all h-nodes. Label these arcs with schedule times1 and 4.By construction, S G conta<strong>in</strong>s a clique of size n ′ = |{(h ij ,h ii ):1≤ i, j ≤|V G |}| formed of the h-nodes alone. We can then prove that f<strong>in</strong>d<strong>in</strong>g an SCC <strong>in</strong> Gis the same as f<strong>in</strong>d<strong>in</strong>g a clique <strong>in</strong> G, s<strong>in</strong>ce a clique of size k <strong>in</strong> G will correspondto a clique of size n ′ + k <strong>in</strong> S G , correspond<strong>in</strong>g, <strong>in</strong> turn, to an SCC of size n ′ + k<strong>in</strong> G (via Lemma 1).


Complexity of Connected Components <strong>in</strong> Evolv<strong>in</strong>g Graphs 267h 22h 1232 22h 23K 14h11232v1232h142v 3h2 h21322 32h h24 42v3h413 2 h 3432 v 2 243 2 32h 34322h 33v1v2v31, 4h44v4Fig. 5. Construction for Theorem 2.3.4 Decomposition <strong>in</strong>to o-SCC’sHere we prove the more general result for the case of o-SCC which has a lessstrict def<strong>in</strong>ition than SCC. We def<strong>in</strong>e the decision problem as follows.o-COMPONENT: Given an evolv<strong>in</strong>g digraph G and an <strong>in</strong>teger k, is there ao-SCC of size k?Although SCC’s are a special case of o-SCC’s, the NP-Completeness of COM-PONENT does not directly imply that o-COMPONENT is NP-Complete as well.This is because a possible polynomial time algorithm for o-COMPONENT needonly answer the above decision problem and not identify the o-SCC’s of size k,thus mak<strong>in</strong>g it difficult to verify if at least one o-SCC of size k is an SCC as well(<strong>in</strong> other words if the set of h-nodes is empty or not for a particular o-SCC ofsize k). Also, the same digraph G may conta<strong>in</strong> both an SCC (of <strong>in</strong>determ<strong>in</strong>atesize) and an o-SCC of size k, soo-COMPONENT would always return “yes”,ignor<strong>in</strong>g the presence or absence of a SCC of size k, there<strong>by</strong> leav<strong>in</strong>g COMPO-NENT unsolved. Conversely, s<strong>in</strong>ce SCC’s are a special case of o-SCC’s, prov<strong>in</strong>go-COMPONENT to be NP-Complete does not directly imply that COMPO-NENT is NP-Complete as well.These arguments entail for an <strong>in</strong>dependent proof for the NP-Completenessof o-COMPONENT. Fortunately, however, the same widget utilized for the previousreduction can be applied <strong>in</strong> the current case, yield<strong>in</strong>g the follow<strong>in</strong>g results.Theorem 3. o-COMPONENT is <strong>in</strong> NP.Proof: Same as the proof for Theorem 1.Theorem 4. CLIQUE can be reduced to o-COMPONENT <strong>in</strong> polynomial time.Proof: Given an undirected graph G =(V,E) and the <strong>in</strong>teger k>3, the samearguments used <strong>in</strong> the proof of Theorem 2 apply here. Indeed, the same widgetcan be used to reduce CLIQUE to o-SCC, s<strong>in</strong>ce a SCC is a o-SCC where H = ∅,and <strong>in</strong> that widget, a max o-SCC is a max SCC, which <strong>by</strong> Theorem 2 impliesthe reduction from CLIQUE.


268 S. Bhadra and A. FerreiraTheorem 5. o-COMPONENT is NP-complete.Proof: We know that CLIQUE is NP-Complete. So from Theorem 3 and Theorem4, o-COMPONENT is NP-Complete.4 Comput<strong>in</strong>g the Directed M<strong>in</strong>imum Spann<strong>in</strong>g TreesConsider<strong>in</strong>g a strongly connected evolv<strong>in</strong>g digraph G, the object is to f<strong>in</strong>d N =|V G | rooted directed m<strong>in</strong>imum spann<strong>in</strong>g trees rooted at each of the nodes r ∈ V G .Our algorithm is a modification of the Prim-Dijkstra algorithm [4] for f<strong>in</strong>d<strong>in</strong>gMST’s <strong>in</strong> undirected standard graphs. The algorithm proceeds <strong>by</strong> build<strong>in</strong>g afragment which is a subset of the DMST start<strong>in</strong>g from the root r. The propertyof the fragment f(r) is that it consists of those edges <strong>by</strong> which <strong>in</strong>formationtransmitted at the beg<strong>in</strong>n<strong>in</strong>g of the time <strong>in</strong>terval from the root r will travel <strong>in</strong>the shortest time to the vertices <strong>in</strong>cluded already <strong>in</strong> the fragment. Hav<strong>in</strong>g def<strong>in</strong>eda fragment as such, it is easy to see how the algorithm for the DMST proceeds.In the follow<strong>in</strong>g algorithm we choose from among the set of arcs outgo<strong>in</strong>g fromthe fragment f(r), the arc with the smallest arc schedule time such that it canform a valid journey start<strong>in</strong>g from the root. A number t v is associated with eachvertex v ∈ V G denot<strong>in</strong>g the m<strong>in</strong>imum time required for that vertex to receivethe <strong>in</strong>formation given that the root r orig<strong>in</strong>ates the <strong>in</strong>formation.S<strong>in</strong>ce each node can transmit <strong>in</strong>formation only after it has received it, the<strong>in</strong>formation cannot pass simultaneously through two edges. Recall that thetime required for transmission over one arc is denoted as an arbitrary weight,w(u, v) < 1.Algorithm 11. Start with f(r) =∅ and a set V f conta<strong>in</strong><strong>in</strong>g vertices already considered <strong>in</strong>fragment f(r).2. V f = {r}, t r =13. while V f ≠ V G do(a) Let Γ f be the set of all arcs (u i ,v i ) such that u i ∈ V f , v i /∈ V f . For each(u i ,v i ) ∈ Γ f , choose the smallest arc schedule time f a (u i ,v i ), such thatf a (u i ,v i ) ≥ t ui + w(u i ,v i ).(b) Choose arc (u j ,v j ) where j = m<strong>in</strong> −1i (f a (u i ,v i )+w(u i ,v i )).(c) if f a (u j ,v j )=t uj + w(u j ,v j ), then t vj ← f a (u j ,v j ),(d) else if f a (u j ,v j ) − 1 ∈ {arc schedule of (u j ,v j )}, then t vj ← t uj +w(u j ,v j ),(e) else, t vj ← f a (u j ,v j ) − 1+w(u j ,v j )(f) add v j to V f and (u j ,v j ) to f(r).In the above algorithm, an arc schedule time i <strong>in</strong>dicates the presence of thel<strong>in</strong>k from time i − 1toi. Note that two cases might arise depend<strong>in</strong>g on whetherf a (u j ,v j )=t uj + w(u j ,v j )orf a (u j ,v j ) >t uj + w(u j ,v j ). For the first case, the<strong>in</strong>formation reaches the node exactly at the time f a (u j ,v j ). For the other case, if


Complexity of Connected Components <strong>in</strong> Evolv<strong>in</strong>g Graphs 269the arc is present both at times f a (u j ,v j ) − 1 and f a (u j ,v j ), s<strong>in</strong>ce w(u j ,v j ) < 1,the packet will reach v j <strong>in</strong> t uj + w(u j ,v j ). If, however, the arc is not present attime f a (u j ,v j ) − 1, then the transmission process itself starts at the f a (u j ,v j ) thstep (i.e. from time f a (u j ,v j ) − 1 to time f a (u j ,v j )), thus reach<strong>in</strong>g v j <strong>by</strong> timef a (u j ,v j ) − 1+w(u j ,v j ).We remark that a rooted directed tree can also be computed over an o-SCC V G ′. As a modification for that purpose, V G must be replaced <strong>by</strong> V G ′ andcorrespond<strong>in</strong>gly, Step 3 of Algorithm 1 should be modified to V G ′ ⊂ V f s<strong>in</strong>ce thefragment can also conta<strong>in</strong> the h-nodes for the vertices <strong>in</strong> V G ′ and the loop canstop once all the vertices are covered.Algorithm 1 is a greedy algorithm that always chooses the arc that transmits<strong>in</strong> m<strong>in</strong>imum time. The proof of its correctness is the same as the proof of thePrim-Dijkstra algorithm [4]. If the maximum outdegree of each vertex is D, theneach step of <strong>in</strong>creas<strong>in</strong>g the fragment will take O(NDlog T ) time and the fragmentwill <strong>in</strong>crease N times add<strong>in</strong>g up to a total execution time of O(N 2 D log T )steps.5 ConclusionThe two important results <strong>in</strong> this paper are the <strong>in</strong>tractability of the decomposition<strong>in</strong>to (open) strongly connected components <strong>in</strong> FSDN’s and the constructionof DMST’s over an already exist<strong>in</strong>g strongly connected components.The first result implies that it is possible to lead a non-strongly connectednetwork towards strong connectedness <strong>by</strong> add<strong>in</strong>g <strong>in</strong>termediary agents to serveas hops between two nodes that are out of range from each other. An <strong>in</strong>terest<strong>in</strong>gproblem would be to f<strong>in</strong>d a way to add such l<strong>in</strong>ks so as to m<strong>in</strong>imize the numberof <strong>in</strong>termediary (help<strong>in</strong>g) nodes. Another way for further research is to designapproximation algorithms for (open) strongly connected components <strong>in</strong> evolv<strong>in</strong>gdigraphs.AcknowledgmentsThe authors are grateful to Aub<strong>in</strong> Jarry and Stephane Perennes for very fruitfuldiscussions.References1. A. Borod<strong>in</strong> and R. El-Yaniv. Onl<strong>in</strong>e computation and competitive analysis. CambridgeUniversity Press, 1998.2. B. Bui-Xuan, A. Ferreira, and A. Jarry. Comput<strong>in</strong>g shortest, fastest, and foremostjourneys <strong>in</strong> dynamic networks. International Journal of Foundations of <strong>Computer</strong><strong>Science</strong>, 14(2):267–285, April 2003.3. Y. J. Chu and T. H. Liu. On the shortest arborescence of a directed graph. <strong>Science</strong>S<strong>in</strong>ica, 14:1396–1400, 1965.


270 S. Bhadra and A. Ferreira4. T. Cormen, C. Leiserson, and R. Rivest. Introduction to Algorithms. The MITPress, 1990.5. S.E. Dreyfus. An appraisal of Some Shortest-Path Algorithms. Operations Research,17:269–271, 1969.6. E. Ekici, I. F. Akyildiz, and M. D. Bender. Datagram rout<strong>in</strong>g algorithm for LEOsatellite networks. In IEEE Infocom, pages 500–508, 2000.7. A. Faragó and V.R. Syrotiuk. MERIT: A unified framework for rout<strong>in</strong>g protocolassessment <strong>in</strong> mobile ad hoc networks. In Proc. ACM Mobicom 01, pages 53–60.ACM, 2001.8. A. Ferreira, J. Galtier, and P. Penna. Topological design, rout<strong>in</strong>g and handover <strong>in</strong>satellite networks. In I. Stojmenovic, editor, Handbook of Wireless Networks andMobile Comput<strong>in</strong>g, pages 473–493. John Wiley and Sons, 2002.9. L.R. Ford and D.R. Fulkerson. Construct<strong>in</strong>g maximal dynamic flows from staticflows. Operations Research, 6:419–433, 1958.10. J. Halpern. Shortest route with time dependent length of edges and limited delaypossibilities <strong>in</strong> nodes. Zeitschrift für Operations Research, 21:117–124, 1977.11. J. Halpern and I. Priess. Shortest path with time constra<strong>in</strong>ts on movement andpark<strong>in</strong>g. Networks, 4:241–253, 1974.12. P. A. Humblet. A distributed algorithm for m<strong>in</strong>imum weight directed spann<strong>in</strong>gtrees. IEEE Transactions on Communications, COM-31(6):756–762, 1983.13. E. Köhler, K. Langkau, and M. Skutella. Time-expanded graphs for flow-dependenttransit times. In proc. ESA’02, 2002.14. E. Köhler and M.Skutella. Flows over time with load-dependent transit times. InProc. of the 13th Annual ACM-SIAM Symposium on Discrete Algorithms, pages174–183, 2002.15. C. Scheideler. Models and techniques for communication <strong>in</strong> dynamic networks. InIn H. Alt and A. Ferreira, editors, Proceed<strong>in</strong>gs of the 19th International Symposiumon Theoretical Aspects of <strong>Computer</strong> <strong>Science</strong>, volume 2285, pages 27–49. Spr<strong>in</strong>ger-Verlag, March 2002.16. I. Stojmenovic, editor. Handbook of Wireless Networks and Mobile Comput<strong>in</strong>g.John Wiley & Sons, February 2002.17. V. Syrotiuk and C. J. Colbourn. Rout<strong>in</strong>g <strong>in</strong> mobile aerial networks. In Proceed<strong>in</strong>gsof WiOpt’03 – Model<strong>in</strong>g and Optimization <strong>in</strong> Mobile, Ad-Hoc and WirelessNetworks, pages 293–302, Sophia Antipolis, March 2003. INRIA.18. R. E. Tarjan. F<strong>in</strong>d<strong>in</strong>g optimum branch<strong>in</strong>gs. Networks, pages 25–35, 1977.19. P.-J. Wan, G. Cal<strong>in</strong>escu, X. Li, and O. Frieder. M<strong>in</strong>imum-energy broadcast rout<strong>in</strong>g<strong>in</strong> static ad hoc wireless networks. In Proc. IEEE Infocom, pages 1162–1171,Anchorage, Alaska, 2001.20. J. Wieselthier, G. Nguyen, and A. Ephremides. On the construction of energyefficientbroadcast and multicast trees <strong>in</strong> wireless networks. In Proc. IEEE Infocom,pages 585–594, Tel Aviv, 2000.


Mobile Agents for Cluster<strong>in</strong>g and Rout<strong>in</strong>g<strong>in</strong> Mobile Ad Hoc NetworksMieso K. Denko and Qusay H. MahmoudDepartment of Comput<strong>in</strong>g and Information <strong>Science</strong>University of GuelphGuelph, Ontario, N1G 2W1, Canada{denko,qmahmoud}@cis.uoguelph.caAbstract. A mobile ad hoc network (MANET) is a dynamic wireless networkthat can be formed without the need for any pre-exist<strong>in</strong>g <strong>in</strong>frastructure <strong>in</strong> whicheach node can act as a router. One of the ma<strong>in</strong> challenges <strong>in</strong> ad hoc networks isthe design of robust rout<strong>in</strong>g algorithms that adapt to the frequent and randomlychang<strong>in</strong>g network topology. Organiz<strong>in</strong>g mobile nodes <strong>in</strong>to manageable clusterscan reduce rout<strong>in</strong>g overhead and provide more scalable solutions. In this paperwe propose a mobile agent-based method for cluster<strong>in</strong>g and rout<strong>in</strong>g <strong>in</strong> mobilead hoc networks. All mobile nodes use two agents to perform rout<strong>in</strong>g and cluster<strong>in</strong>goperations. Us<strong>in</strong>g this method, reactive, proactive or hybrid rout<strong>in</strong>gschemes can be employed for <strong>in</strong>tra-cluster and <strong>in</strong>ter-cluster rout<strong>in</strong>g to improvethe performance of rout<strong>in</strong>g.1 IntroductionA mobile ad hoc network (MANET) is a multihop wireless network <strong>in</strong> which mobilenodes can communicate with each other without the support of any pre-exist<strong>in</strong>g <strong>in</strong>frastructure.In this network environment, each node acts as router and can relay packetsto its neighbors. This type of network is characterized <strong>by</strong> limited bandwidth and batterypower, rapidly mov<strong>in</strong>g nodes and unpredictable topological changes. InMANETs, one of the ma<strong>in</strong> challenges is the design of adaptive and robust rout<strong>in</strong>galgorithms.Rout<strong>in</strong>g protocols designed for traditional fixed networks are not suitable for mobilead hoc networks [13, 15, 20]. As a result, several rout<strong>in</strong>g protocols have recentlybeen proposed for MANETs (see for example [3, 4, 5, 8, 13, 15, 20]). These protocolscan be classified <strong>in</strong>to three ma<strong>in</strong> categories: proactive, reactive and hybrid. Proactiverout<strong>in</strong>g protocols update routes periodically or <strong>in</strong> response to some pre-def<strong>in</strong>edevents. Reactive protocols compute routes on demand. Hybrid protocols use featuresof both reactive and proactive protocols [10]. The ma<strong>in</strong> advantage of hybrid protocolsis their flexibility <strong>in</strong> allow<strong>in</strong>g the use of different rout<strong>in</strong>g mechanisms with<strong>in</strong> andbetween clusters. S<strong>in</strong>ce the overhead for rout<strong>in</strong>g can grow faster than l<strong>in</strong>early as networksize <strong>in</strong>creases [17], rout<strong>in</strong>g <strong>in</strong> a flat architecture faces a scalability problem.Several rout<strong>in</strong>g protocols based on cluster<strong>in</strong>g architecture have been proposed <strong>in</strong>recent years (see for example [2, 3, 4, 5, 6, 11, 12 15]).S. Pierre, M. Barbeau, and E. Kranakis (Eds.): ADHOC-NOW 2003, LNCS <strong>2865</strong>, pp. 271–276, 2003.© Spr<strong>in</strong>ger-Verlag Berl<strong>in</strong> Heidelberg 2003


272 M.K. Denko and Q.H. MahmoudAn important area of research is the application of mobile agents <strong>in</strong> mobile andwireless networks. A mobile agent is a software entity that can actively migrateamong nodes <strong>in</strong> a heterogeneous network <strong>in</strong>teract<strong>in</strong>g with other agents and serviceagents [9]. This is ideal for MANETs because mobile agents are capable of support<strong>in</strong>gasynchronous communication. As a result, several mobile agent-based projectshave been proposed. For example, a mobile agent-based rout<strong>in</strong>g protocol has beenrecently proposed <strong>in</strong> [19]. The protocol uses the comb<strong>in</strong>ed benefits of traditional antbasedadaptive rout<strong>in</strong>g and the Ad-Hoc on Demand Distance Vector (AODV) rout<strong>in</strong>gprotocol to ma<strong>in</strong>ta<strong>in</strong> node connectivity and perform rout<strong>in</strong>g.In this paper, we propose a mobile agent-based method for cluster<strong>in</strong>g and rout<strong>in</strong>g<strong>in</strong> MANETs. In this method, mobile agents are used to ma<strong>in</strong>ta<strong>in</strong> cluster<strong>in</strong>g and rout<strong>in</strong>g<strong>in</strong>formation at each node <strong>in</strong> a distributed manner. The <strong>in</strong>formation ma<strong>in</strong>ta<strong>in</strong>ed <strong>in</strong>the rout<strong>in</strong>g table is used for <strong>in</strong>tra-cluster and <strong>in</strong>ter-cluster rout<strong>in</strong>g. Inter-cluster<strong>in</strong>g isperformed via the clusterhead.The rest of this paper is organized as follows. Section 2 describes the benefits ofcluster<strong>in</strong>g and mobile agents <strong>in</strong> MANETs. Section 3 presents the proposed agentbasedcluster<strong>in</strong>g and rout<strong>in</strong>g method. F<strong>in</strong>ally, conclusions and future research workare presented <strong>in</strong> Section 4.2 Cluster<strong>in</strong>g and Mobile Agents <strong>in</strong> MANETsCluster<strong>in</strong>g is the partition<strong>in</strong>g of the network <strong>in</strong>to small manageable groups of nodes.Cluster<strong>in</strong>g offers several advantages <strong>in</strong> mobile ad hoc networks. First, network partition<strong>in</strong>gimproves rout<strong>in</strong>g and mobility management [21]. It <strong>in</strong>creases system capacity,reduces signal<strong>in</strong>g and control overhead and m<strong>in</strong>imizes network congestion. Thismakes the network more scalable and as a result can support a larger network size.Second, cluster<strong>in</strong>g stabilizes the network topology and provides a virtual <strong>in</strong>frastructurefor a dynamic network. The clusterhead acts as a base station for its cluster.Third, cluster<strong>in</strong>g helps to perform more efficient resource allocation. By assign<strong>in</strong>gdifferent codes to each cluster, MAC resource management can be improved andwireless channels can be used efficiently [1, 7]. It also provides good power managementmechanisms. Clusters can be either dist<strong>in</strong>ct or overlapp<strong>in</strong>g. In the former, eachnode belongs to only one cluster while <strong>in</strong> the latter the neighbor<strong>in</strong>g clusters can have acommon node (gateway or access po<strong>in</strong>t) between them. In this paper we consider onlydist<strong>in</strong>ct clusters.Several cluster<strong>in</strong>g algorithms have been proposed <strong>in</strong> the literature for group<strong>in</strong>gnodes <strong>in</strong>to clusters [1, 2, 3, 7, 14, 17]. One of the earliest cluster<strong>in</strong>g algorithms is theL<strong>in</strong>ked Cluster Algorithm (LCA) [1] proposed for mobile radio networks. The algorithmuses a distributed control mechanism for neighbor discovery and cluster formation.In this algorithm a node with the lowest ID becomes a clusterhead. In [7], theLowest-ID (LID) and another distributed cluster<strong>in</strong>g algorithm known as Highest-Connectivity (HC) were used for cluster<strong>in</strong>g nodes <strong>in</strong> a multicluster, multihop packetradio network architecture. In the HC algorithm, a node with the highest degree iselected as a clusterhead. A cluster<strong>in</strong>g algorithm that comb<strong>in</strong>es the LID and HC cluster<strong>in</strong>galgorithms was proposed <strong>in</strong> [2]. The experimental results <strong>in</strong>dicated that thealgorithm generates a lower number clusterheads and gateways. In our approach, the


Mobile Agents for Cluster<strong>in</strong>g and Rout<strong>in</strong>g <strong>in</strong> Mobile Ad Hoc Networks 273mobile agent uses node mobility and l<strong>in</strong>k characteristic related parameters for cluster<strong>in</strong>g.A mobile agent is capable of migrat<strong>in</strong>g autonomously carry<strong>in</strong>g code, data and statewith itself. It can even spawn off child agents anywhere <strong>in</strong> the network, merge thequery results and send back the f<strong>in</strong>al result to the source node. Mobile agents canimprove bandwidth utilization, reduce communication latency, m<strong>in</strong>imize connectiontime, and reduce network traffic load.An attractive application of mobile agents is process<strong>in</strong>g data over unreliable networks,such as MANETs. In such an environment, the low reliability network can beused to transfer agents, rather than a chunk of data, from one node to another. InMANETs, the agents can travel to the nodes of the cluster and collect or process cluster<strong>in</strong>gand rout<strong>in</strong>g <strong>in</strong>formation, without the risk of network disconnection, and thenreturn to its orig<strong>in</strong>at<strong>in</strong>g node.In order to deploy mobile agents <strong>in</strong> MANETs, a suitable mobile agent platform isneeded. Conventional mobile agent platforms such as Aglets [16], Concordia [23],and D’Agent [8], to name a few, operate with<strong>in</strong> high-end desktop environments suchas W<strong>in</strong>dows and Unix. As a result some research projects have recently been proposedto develop mobile agent platforms for mobile devices. The Lightweight ExtensibleAgent Platform (LEAP) [18] aims to develop a FIPA-compliant mobile agentplatform for mobile devices with services <strong>in</strong> the area of knowledge and travel management.In our research, we hope to develop our own mobile agent platforms forMANETs.3 Mobile Agents for Cluster<strong>in</strong>g and Rout<strong>in</strong>gIn a clustered network, a cluster may be organized <strong>in</strong>to a multilevel hierarchy. A hierarchicalcluster<strong>in</strong>g architecture can reduce network rout<strong>in</strong>g overhead <strong>by</strong> hid<strong>in</strong>g <strong>in</strong>formationabout the content of the cluster. Route ma<strong>in</strong>tenance procedures and rout<strong>in</strong>gtable length can be significantly reduced [14]. Such architecture is relatively stableand scalable due to the localized nature of route computation and can be used <strong>in</strong>MANETs. Most previous works on cluster<strong>in</strong>g are based on the design of algorithmsthat form a 2-hop cluster<strong>in</strong>g architecture. These algorithms use a s<strong>in</strong>gle parametersuch as node ID, connectivity, signal strength, mobility, power or some comb<strong>in</strong>ationof these for cluster formation. The cluster formation process can be slow s<strong>in</strong>ce themethod of gather<strong>in</strong>g the <strong>in</strong>formation necessary for cluster formation may not be efficientif cluster<strong>in</strong>g with more than 2-hop architecture is desired.S<strong>in</strong>ce mobile agents are autonomous and <strong>in</strong>telligent entities, they can be used forcreat<strong>in</strong>g dynamic and adaptive cluster<strong>in</strong>g <strong>in</strong> MANETs [22]. Distributed route computationcan be performed at each node. The cluster<strong>in</strong>g architecture consists of ord<strong>in</strong>arynodes, clusterheads and gateways. In our architecture, <strong>in</strong>tra-cluster and <strong>in</strong>ter-clusterrout<strong>in</strong>g can be carried out us<strong>in</strong>g reactive, proactive or hybrid rout<strong>in</strong>g schemes. S<strong>in</strong>ce as<strong>in</strong>gle criterion is not sufficient for a stable and efficient cluster formation, an aggregatemetric that <strong>in</strong>cludes node mobility, l<strong>in</strong>k quality, available bandwidth, etc. will bema<strong>in</strong>ta<strong>in</strong>ed and used for cluster formation. This metric will also be used <strong>by</strong> the cluster<strong>in</strong>gagent to assess the quality of the clusterhead periodically.


274 M.K. Denko and Q.H. Mahmoud3.1 Ma<strong>in</strong>ta<strong>in</strong><strong>in</strong>g Rout<strong>in</strong>g and Cluster<strong>in</strong>g InformationIn our proposed architecture, each node has a Rout<strong>in</strong>g Mobile Agent (RMA) and aCluster<strong>in</strong>g Static Agent (CSA). These agents operate on top of an agent platformrunn<strong>in</strong>g on top of a Java virtual mach<strong>in</strong>e suitable for mobile devices such as the KiloVirtual Mach<strong>in</strong>e (KVM). The CSA ma<strong>in</strong>ta<strong>in</strong>s cluster<strong>in</strong>g <strong>in</strong>formation <strong>in</strong> a cluster<strong>in</strong>gtable. The cluster<strong>in</strong>g table conta<strong>in</strong>s IDs of neighbors, the node role (ord<strong>in</strong>ary node,gateway or clusterhead), mobility <strong>in</strong>formation, nodal degree and signal strength. Therout<strong>in</strong>g mobile agent moves across the network to collect and ma<strong>in</strong>ta<strong>in</strong> rout<strong>in</strong>g tableswhile the cluster<strong>in</strong>g agent gathers and ma<strong>in</strong>ta<strong>in</strong>s cluster<strong>in</strong>g <strong>in</strong>formation.All <strong>in</strong>ter-cluster rout<strong>in</strong>g is performed via the clusterhead. On receiv<strong>in</strong>g a packetfrom a node, the clusterhead forwards the packet to the preferred gateway which <strong>in</strong>turn forwards it to the adjacent cluster. In the event that the clusterhead does not havethis <strong>in</strong>formation, it can deploy the mobile agent to get the route to the target dest<strong>in</strong>ation.Rout<strong>in</strong>g and cluster<strong>in</strong>g table entries at the clusterheads are updated periodicallywith up-to-date values based on timestamps.To localize the agent mobility, the rout<strong>in</strong>g agent <strong>in</strong> a mobile node migrates onlywith<strong>in</strong> its cluster. The rout<strong>in</strong>g mobile agent also updates rout<strong>in</strong>g and cluster<strong>in</strong>g <strong>in</strong>formationdur<strong>in</strong>g each visit. The agents at the clusterhead also ma<strong>in</strong>ta<strong>in</strong> <strong>in</strong>formationabout other clusterheads and gateways. The cluster<strong>in</strong>g agent elects a clusterheadbased on the cluster<strong>in</strong>g <strong>in</strong>formation ma<strong>in</strong>ta<strong>in</strong>ed at each mobile node. Once the cluster<strong>in</strong>garchitecture stabilizes, each node will have a complete knowledge of itsneighbors.We have devised a migration strategy for rout<strong>in</strong>g mobile agents. To f<strong>in</strong>d a route,the Rout<strong>in</strong>g Mobile Agent (RMA) uses the follow<strong>in</strong>g algorithm:IF the RMA does not have the routethenThe RMA moves to the Clusterhead<strong>in</strong> that Cluster;The RMA communicates with theClusterhead;IF the Clusterhead has the rout<strong>in</strong>g <strong>in</strong>fothenThe RMA goes back and updates routes;ElseRMA <strong>in</strong> clusterhead cont<strong>in</strong>ues route search<strong>in</strong> other Clusters;END IFEND IF3.2 Mobile Nodes and Inter-agent CommunicationEach mobile agent will be given a temporary workspace to perform its functions andalso to allow multiple mobile agents to co-exist <strong>in</strong> a host. A host<strong>in</strong>g node can receivenew agents or transport them to other nodes without caus<strong>in</strong>g any <strong>in</strong>terference. Theagent system hides details about the node and provides access to local resources withthe necessary security mechanisms.


Mobile Agents for Cluster<strong>in</strong>g and Rout<strong>in</strong>g <strong>in</strong> Mobile Ad Hoc Networks 275Security is a major concern when work<strong>in</strong>g <strong>in</strong> mobile agents and MANETs. Thereare two types of security concerns: (1) protect<strong>in</strong>g the agent from the agent server,which can be accomplished <strong>by</strong> devis<strong>in</strong>g a security policy that states what agents canand cannot do; and (2) protect<strong>in</strong>g the agent server from the agent, which is almostimpossible. While several remedies have been proposed for protect<strong>in</strong>g the agent fromthe agent server, how can we actually protect an agent from be<strong>in</strong>g killed <strong>by</strong> an agentserver? Fortunately, these security issues exist when work<strong>in</strong>g with mobile agentscompet<strong>in</strong>g for a resource. When us<strong>in</strong>g mobile agents for cluster<strong>in</strong>g and rout<strong>in</strong>g,agents are cooperat<strong>in</strong>g to deliver a service.3.3 Performance MetricsMobile agents periodically exam<strong>in</strong>e the cluster<strong>in</strong>g parameters and make cluster sizeadjustments, perform re-cluster<strong>in</strong>g and monitor clusterhead quality. The cluster<strong>in</strong>garchitecture is evaluated us<strong>in</strong>g parameters such as cluster size, clusterhead changes,cluster membership changes, number of clusters, cluster splitt<strong>in</strong>g and merg<strong>in</strong>g. Eachmetric is <strong>in</strong>vestigated <strong>by</strong> vary<strong>in</strong>g network size, transmission range and node mobility.Our performance metrics for rout<strong>in</strong>g are packet delivery ratio, rout<strong>in</strong>g overhead andend-to-end delay.4 Conclusions and Future WorkIn this paper we have presented our proposed mobile agent-based method for cluster<strong>in</strong>gand rout<strong>in</strong>g <strong>in</strong> mobile ad hoc networks. In this method, each node is equippedwith a Cluster<strong>in</strong>g Static Agent (CSA) and a Rout<strong>in</strong>g Mobile Agent (RMA). Theagents are used to collect and ma<strong>in</strong>ta<strong>in</strong> rout<strong>in</strong>g and cluster<strong>in</strong>g <strong>in</strong>formation. Themethod can be used to improve the performance of cluster<strong>in</strong>g and rout<strong>in</strong>g operations<strong>by</strong> us<strong>in</strong>g agents that support asynchronous, and therefore disconnected operations,and reduces the network traffic <strong>in</strong> MANETs. Parameters for the performance evaluationof cluster<strong>in</strong>g stability and rout<strong>in</strong>g performance were identified.Our future work <strong>in</strong>cludes the design and implementation of a mobile agent platformsuitable for MANETs. Once we build the platform, we plan to run experimentsto help us compare the performance of the proposed method with other methods.References1. Baker, D.J., Ephremides, A., Flynn, J.A.: The Design and Simulation of a Mobile RadioNetwork with Distributed Control. IEEE Journal on Selected Areas <strong>in</strong> Communications,2(1): 226-237, January 1984.2. Chen, G., Stojmenovic, I.: Cluster<strong>in</strong>g and Rout<strong>in</strong>g <strong>in</strong> Wireless Ad Hoc Networks. TechnicalReport TR-99-05, Department of <strong>Computer</strong> <strong>Science</strong>, SITE, Ottawa, June 1999.3. Chiang, C.-C.: Rout<strong>in</strong>g <strong>in</strong> Clustered Multi-hop, Mobile Wireless Networks with Fad<strong>in</strong>gChannel. In proceed<strong>in</strong>gs of IEEE SICON'97, pp.197-211, 1997.4. Corson, M.S., Ephremides, A.: A Distributed Rout<strong>in</strong>g Algorithm for Mobile Wireless Networks.ACM-Baltzer Journal of Wireless Networks, 1(1):61-81, 1995.


276 M.K. Denko and Q.H. Mahmoud5. Das, B., Bharghavan, V.: Rout<strong>in</strong>g <strong>in</strong> Ad Hoc Networks Us<strong>in</strong>g M<strong>in</strong>imum ConnectedDom<strong>in</strong>at<strong>in</strong>g Sets (MCDS). In proceed<strong>in</strong>gs of 1997 IEEE International Conference onCommunications (ICC'97), 1997.6. Denko, M.K., Goddard, W.: Rout<strong>in</strong>g Algorithms <strong>in</strong> Mobile Ad Hoc Networks Us<strong>in</strong>gCluster<strong>in</strong>g. In proceed<strong>in</strong>gs of the 13th MSc/PhD Annual Conference <strong>in</strong> <strong>Computer</strong> <strong>Science</strong>,University of Stellenbosch, South Africa, pp. 6-18, 1998.7. Gerla, M., Tsai, J.T.: Multicluster, Mobile, Multimedia Radio network, ACM-BaltzerJournal of Wireless Networks, 1(3): 255-265, 1995.8. Garcia-Luna-Aceves, J.J., Mosko, M., Perk<strong>in</strong>s, C.E.: A New Approach to On-DemandLoop-Free Rout<strong>in</strong>g <strong>in</strong> Ad Hoc Networks. In proceed<strong>in</strong>gs of the 22 nd ACM Symposium onPr<strong>in</strong>ciples of Distributed Comput<strong>in</strong>g, Boston, Massachusetts, July 2003.9. Gray, S.R., Kotz, D., Cybenko, G., Rus, D.: D’Agent - Security <strong>in</strong> a Multiple-Language,Mobile Agent System. In Vigna, G. (eds.): Mobile Agents and Security, <strong>Lecture</strong> <strong>Notes</strong> <strong>in</strong><strong>Computer</strong> <strong>Science</strong>, vol. 1419. Spr<strong>in</strong>g-Verlag, Berl<strong>in</strong>, Heidelberg, 1998.10. Haas, Z.J., Perlman, M.: The performance of query control schemes for the zone rout<strong>in</strong>gprotocol. ACM/IEEE Transactions on Network<strong>in</strong>g, 9(4): 427-438, August 2001.11. Hou, T.-C., Tsai, T.-W.: An access-based cluster<strong>in</strong>g protocol for mobile multihop wirelessad hoc networks. IEEE Journal on Selected Areas <strong>in</strong> Communications, 19(7):1201-1210,2001.12. Jiang, M., Li, J., Tay., Y.C.: Cluster-Based Rout<strong>in</strong>g Protocol (CBRP), Internet-Draft,draft-ietf-manet-zone-zrp-02.txt, 1999.13. Johnson, D., Maltz, D.: Dynamic source rout<strong>in</strong>g <strong>in</strong> ad hoc wireless networks. In Perk<strong>in</strong>s,C.E. (ed.): Ad Hoc Network<strong>in</strong>g. Addison Wesley, pp. 139-172, 2001.14. Kle<strong>in</strong>rock, L., Kamoun, F.: Hierarchical Rout<strong>in</strong>g for Large Networks: PerformanceEvaluation and Optimization, <strong>Computer</strong> Networks, 1(1): 155-174, 1977.15. Krishna, P., Chatterjee, M., Vaidya, N.H., Pradhan, D.K.: A Cluster-based Approach forRout<strong>in</strong>g <strong>in</strong> Ad Hoc Networks. In proceed<strong>in</strong>gs of the 2 nd USENIX Symposium on Mobileand Location Independent Comput<strong>in</strong>g, pp. 1-10, 1996.16. Lange, D. B., Oshima, M.: Programm<strong>in</strong>g and Deploy<strong>in</strong>g Java Mobile Agents with Aglets.Addison Wesley, 1998.17. Lauer, G.S.: Packet Radio Rout<strong>in</strong>g. In Steenstrup, M. (ed.): Rout<strong>in</strong>g <strong>in</strong> CommunicationNetworks, Prentice Hall, pp. 351-396, 1995.18. LEAP: http://leap.crm-paris.com.19. Marwaha, S., Tham, C. K., Sr<strong>in</strong>vasan, D.: Mobile Agent-based Rout<strong>in</strong>g Protocol for MobileAd Hoc Networks. Symposium of Ad Hoc Networks, IEEE (GLOBCOM 2002),2002.20. Perk<strong>in</strong>s, C.E., Bhagwat, P.: Highly Dynamic Dest<strong>in</strong>ation Sequenced Distance VectorRout<strong>in</strong>g (DSDV) for Mobile <strong>Computer</strong>s. In proceed<strong>in</strong>gs of SIGCOMM, pp. 234-244,1994.21. Sharony, J.: A Mobile Radio Network Architecture with Dynamically Chang<strong>in</strong>g TopologyUs<strong>in</strong>g Virtual Subnets. ACM/Baltzer Mobile Networks and Applications, 1(1): 75-86,1996.22. Sugar, R., Imre S.: Adaptive Cluster<strong>in</strong>g Us<strong>in</strong>g Mobile Agents <strong>in</strong> Wireless Ad hoc Networks.<strong>Lecture</strong> <strong>Notes</strong> <strong>in</strong> <strong>Computer</strong> <strong>Science</strong>. Spr<strong>in</strong>g-Verlag, 2001.23. Walsh, T., Paciorek, N., Wong, D.: Security and Reliability <strong>in</strong> Concordia. In proceed<strong>in</strong>gsof the 31 st Annual Hawaii International Conference on System <strong>Science</strong>, vol. 7, pp 44-53,1998.


Rout<strong>in</strong>g Update <strong>in</strong> Ad Hoc NetworksBenjam<strong>in</strong> Macabéo, Samuel Pierre, and Alejandro Qu<strong>in</strong>teroMobile Comput<strong>in</strong>g and Network<strong>in</strong>g Research Laboratory (LARIM)Department of <strong>Computer</strong> Eng<strong>in</strong>eer<strong>in</strong>g, École Polytechnique de MontréalC.P. 6079, succ. Centre-Ville, Montréal, Québec, Canada, H3C 3A7{Benjam<strong>in</strong>.Macabeo,Samuel.Pierre,Alejandro.Qu<strong>in</strong>tero}@polymtl.caTel. (514) 340-3240 ext. 4685, Fax. (514) 340-3240Abstract. Contrary to cellular networks, ad-hoc networks are a form of mobilenetworks that function without any fixed <strong>in</strong>frastructure. This paper proposes amethod which improves rout<strong>in</strong>g success rates <strong>in</strong> mobile ad hoc networks. Thismethod is based on the density of the nodes <strong>in</strong> the neighborhood of a route andon the availability of this neighborhood. The results obta<strong>in</strong>ed are encourag<strong>in</strong>g:the data packet loss rate is significantly reduced and the time required to completea local repair route follow<strong>in</strong>g a failure decreased significantly.Index Terms: mobile ad hoc networks, route repair, AODV1 IntroductionAn ad hoc network is a mobile wireless network composed of several mobile nodes,likely to communicate together without the required <strong>in</strong>tervention of any centralizedmanagement or exist<strong>in</strong>g <strong>in</strong>frastructure. The nodes of these networks must be able tocooperate among themselves to allow communication. The deployment of ad hocnetworks is thus largely simplified compared to other forms of mobile networks.This paper suggests a method which improves the probabilities of success of a localroute repair <strong>in</strong> mobile ad hoc networks (MANETs) <strong>by</strong> accelerat<strong>in</strong>g the process ofroute reparation after the departure of a node <strong>in</strong>cluded <strong>in</strong> the route. Section 2 <strong>in</strong>troducessome background <strong>in</strong>formation and related work. Section 3 describes the solutionsuggested to improve route repairs. F<strong>in</strong>ally, Section 4 presents and analyzessimulation results.2 Background and Related WorkA rout<strong>in</strong>g protocol is a mechanism <strong>by</strong> which user traffic is directed and transportedthrough a network from a source node to its dest<strong>in</strong>ation node. It aims to maximizenetwork performance from an application po<strong>in</strong>t of view while m<strong>in</strong>imiz<strong>in</strong>g the costimposed on the network <strong>in</strong> terms of capacity. QoS (Quality of Service) rout<strong>in</strong>g protocolssearch routes with sufficient resources for QoS requirements [3, 7].S. Pierre, M. Barbeau, and E. Kranakis (Eds.): ADHOC-NOW 2003, LNCS <strong>2865</strong>, pp. 277–280, 2003.© Spr<strong>in</strong>ger-Verlag Berl<strong>in</strong> Heidelberg 2003


278 B. Macabéo, S. Pierre, and A. Qu<strong>in</strong>tero2.1 Best Effort ProtocolsDSDV (Dest<strong>in</strong>ation Sequenced Distance Vector) is a best effort protocol designedspecially for MANETs [4]. It belongs to the class of proactive protocols and uses aversion of the distributed Bellman-Ford algorithm which is adapted to ad hoc networks.The rout<strong>in</strong>g <strong>in</strong>formation associated to each node of the network is recorded <strong>in</strong>a rout<strong>in</strong>g table <strong>by</strong> each mobile station.AODV (Ad hoc On Demand Vector) represents an improvement of DSDV [5]. Infact, to synthesize, it takes the advantages of DSDV but limits bandwidth consumption.2.2 QoS Rout<strong>in</strong>g ProtocolsIn MANET, a route is def<strong>in</strong>ed as set of mobile units that contributes to data transmissionfrom source to dest<strong>in</strong>ation. Quality of service (QoS) consists of a set ofcharacteristics or constra<strong>in</strong>ts (bandwidth, hop count, delay, throughput, packet lossrate, etc.) that a connection must guarantee between a source and a dest<strong>in</strong>ation dur<strong>in</strong>gthe communication to meet the requirements of an application [1].With the <strong>in</strong>creas<strong>in</strong>g number of applications requir<strong>in</strong>g a certa<strong>in</strong> QoS, the success ofmobile ad hoc networks relies heavily on their ability to provide rout<strong>in</strong>g protocols thattake <strong>in</strong>to account QoS [2, 6].3 Rout<strong>in</strong>g Protocol <strong>in</strong> Ad Hoc NetworksThe rout<strong>in</strong>g protocol used here is based on a rout<strong>in</strong>g algorithm <strong>in</strong>itiated <strong>by</strong> the sourcethat takes <strong>in</strong>to account QoS <strong>in</strong> terms of bandwidth consumption. If a failure occursdur<strong>in</strong>g the communication between two nodes, two scenarios can be used to repair theroute: a global route repair and a local route repair. A global route repair starts fromthe source of communication. Although it requires significant time and consumesmuch bandwidth, this solution is used <strong>in</strong> most rout<strong>in</strong>g protocols. A local route repairstarts from a node <strong>in</strong> the neighborhood of the l<strong>in</strong>k where the failure occurred. Thislatter solution offers two advantages: its speed and its low bandwidth consumption.3.1 Protocol for Route RepairOur objective aims to ensure the selection of the most easily reparable route amongthose extracted from the route discovery phase. To achieve this goal, we recommendtak<strong>in</strong>g <strong>in</strong>to account the nature of the neighbor<strong>in</strong>g nodes compos<strong>in</strong>g the network, moreparticularly the node density and their availability. The reparation of a route <strong>in</strong> case offailure can be carried out through local route repair.We use the availability parameter to establish the ability of a Node A to replaceNode B. The availability of a node depends on the nature of the node, the number ofpackets forwarded <strong>by</strong> the node as well as their capacity.We def<strong>in</strong>e the density of a node λ as the number of direct neighbors of λ whoseavailable bandwidth is higher than that required <strong>by</strong> the connection. The density parameteris completely specified <strong>by</strong> a node and the bandwidth associated with thatnode.


Rout<strong>in</strong>g Update <strong>in</strong> Ad Hoc Networks 279The discovery phase: We use the route discovery phase as described <strong>in</strong> the AODVprotocol for which we add provisions for the availability and density parameters.These two parameters need to be taken <strong>in</strong>to account <strong>in</strong> order for our protocol to provideQoS. Thus, <strong>in</strong> our protocol, the source <strong>in</strong>itiates the rout<strong>in</strong>g process upon receiv<strong>in</strong>ga connection request. Then, it sends a route request for this connection to all itsneighbors. The nodes that receive the message for the first time and that fulfill theQoS requirements propagate the request message towards the dest<strong>in</strong>ation after thefollow<strong>in</strong>g scenario :The request message is gradually propagated towards the dest<strong>in</strong>ation follow<strong>in</strong>g theaforementioned scenario. F<strong>in</strong>ally, when it arrives at its dest<strong>in</strong>ation, the dest<strong>in</strong>ationnode <strong>in</strong>itiates a countdown and records all of the <strong>in</strong>com<strong>in</strong>g request messages.To select a route, we need the parameters conta<strong>in</strong>ed <strong>in</strong> each request message thatarrived at the dest<strong>in</strong>ation. It is important to mention that a route conta<strong>in</strong><strong>in</strong>g long sequencesof high density nodes will be easier to repair with the local route repair procedurethan a route that does not hold that property.4 Implementation and ResultsThe modifications to the AODV protocol were implemented us<strong>in</strong>g Opnet Modeler.The protocol def<strong>in</strong>es four types of packets that can be exchanged between the topologynodes: RERR, REEQ, RREP and DATA.4.1 ExampleHere is a specific example which illustrates the rationale for such modifications to the<strong>in</strong>itial protocol (Figure 1).Fig. 1. Topology used


280 B. Macabéo, S. Pierre, and A. Qu<strong>in</strong>teroIn the configuration presented <strong>in</strong> Figure 2, Node 0 seeks to establish a communicationwith Node 5. All of the other nodes behave as routers. Several routes are possible.Among these routes, the route pass<strong>in</strong>g through Nodes 1, 2, 3 and 4 is the shortestone from source to dest<strong>in</strong>ation.For the sake of clarity, we will only detail the results concern<strong>in</strong>g the departure ofNode 12. The data collected for Cases 1 and 2, and <strong>in</strong> particular the end-to-end (ETE)delays, reveal that no route repair is undertaken follow<strong>in</strong>g the departure of Node 12from the network, s<strong>in</strong>ce this node does not belong to the route used <strong>in</strong> these cases. Onthe other hand, we can clearly see that for Case 3, the departure of Node 12 stronglyaffects the results. Indeed, the ETE delay <strong>in</strong>creases from 0.014 to 0.016 second afterthe departure of Node 12.5 ConclusionThe rout<strong>in</strong>g method presented <strong>in</strong> this paper aims to improve QoS management <strong>in</strong>MANETs <strong>by</strong> tak<strong>in</strong>g <strong>in</strong>to account the density of a node, def<strong>in</strong>ed as the number of mobileunits available <strong>in</strong> the radio range of the node. Our approach was based on a thoroughanalysis of the available mechanisms and tools that take <strong>in</strong>to account quality ofservice <strong>in</strong> ad hoc networks. We then <strong>in</strong>troduced the concept of density and describedhow the network could exploit this <strong>in</strong>formation to improve the QoS offered.The described route selection mechanism aims to select the route whose ma<strong>in</strong>tenanceis the easiest to realize among several routes. The protocol was tested with agiven configuration. The results obta<strong>in</strong>ed are encourag<strong>in</strong>g: the data packet loss rate isstrongly reduced compared to the <strong>in</strong>itial version. In addition, the time required tocomplete a local route repair follow<strong>in</strong>g a failure is reduced significantly.References1. Chakrabarti S. and Mishra A., “QoS issues <strong>in</strong> ad hoc wireless networks”, IEEE InternationalConference on Communications, 2001, pp. 142–148.2. Das S., Mukherjee A., Bandyopadhyay S., Paul K., Saha D., “Improv<strong>in</strong>g quality-of-service<strong>in</strong> ad hoc wireless networks with adaptive multi-path rout<strong>in</strong>g”, IEEE Conference onGlobal Telecommunications, Vol. 1, 2000, pp. 261 –265.3. Hongxia S., Hughes, H., “Adaptive QoS rout<strong>in</strong>g based on prediction of local performance<strong>in</strong> ad hoc networks”, IEEE Conference on Wireless Communications and Network<strong>in</strong>g,Vol. 2 , 2003, pp. 1191 –1195.4. Perk<strong>in</strong>s C., Bhagwat P., “Highly dynamic dest<strong>in</strong>ation-sequenced distance-vector rout<strong>in</strong>gfor mobile computer”, ACM Conference on Communications Architectures, 1994, pp.234-244.5. Perk<strong>in</strong>s C., Royer E., “Ad hoc on demand distance vector algorithm”, IEEE Workshop onMobile Comput<strong>in</strong>g Systems and Applications WMCSA '99, 1999, pp. 90 –100.6. Wen-Hwa L., Yu-Chee T., Kuei-P<strong>in</strong>g S., “A TDMA-based bandwidth reservation protocolfor QoS rout<strong>in</strong>g <strong>in</strong> a wireless mobile ad hoc network”, IEEE International Conference onCommunications, Vol. 5, 2002, pp. 3186–190.7. Xiaoyan H, K. Xu, M. Gerla, “Scalable Rout<strong>in</strong>g Protocols for Mobile Ad Hoc Networks”,IEEE Network, Vol. 16, No. 4, 2002, pp. 11-21.


Inter-vehicle Geocast ProtocolSupport<strong>in</strong>g Non-equipped GPS Vehicles *Abderrahim Benslimane and Abdelmalik BachirLaboratoire d’Informatique d’Avignon LIA/CERI339 chem<strong>in</strong> des Me<strong>in</strong>ajariesBP 1228 - 84911 AVIGNON CEDEX 9{bachir,benslimane}@lia.univ-avignon.frAbstract. IVG is a GPS-based Inter-Vehicle Communication protocol used foralarm message dissem<strong>in</strong>ation among vehicles <strong>in</strong> a highway <strong>in</strong> risk situations. Itis based on the pr<strong>in</strong>ciple of wireless ad hoc networks. In this paper, we proposean improvement to IVG towards support<strong>in</strong>g its <strong>in</strong>teroperability <strong>in</strong> environmentswhere vehicles “GPS-U” without GPS devices are present. It is also the case,because of obstacles, where certa<strong>in</strong> vehicles have GPS devices but cannotobta<strong>in</strong> their position via GPS. The proposed solution allows GPS-U vehicle tocompute its position with the help of its neighbors that are equipped with GPSdevices “GPS-E”. Analyses show that the optimal performances of IVG can bereached even when the rate of GPS-U vehicle is 40%.1 IntroductionIntelligent transportation Systems (ITS) have been <strong>in</strong>vestigated for many years <strong>in</strong>Europe, Japan and North America, with the aim of provid<strong>in</strong>g new technologies ableto improve safety and efficiency of road transport. Recently, the democratisation ofGPS technology and the progress <strong>in</strong> mobile ad hoc network<strong>in</strong>g have led to the appearanceof new <strong>in</strong>ter-vehicle communication protocols [1, 2, 3]. Based on the use ofGPS devices, these protocols have been ma<strong>in</strong>ly designed for safety driv<strong>in</strong>g <strong>by</strong> thedissem<strong>in</strong>ation of urgent <strong>in</strong>formation, called alarm messages, <strong>in</strong> the case of accidents,fogs, etc, among the vehicles. In [1], the proposed solution called RBM Role BasedMulticast was designed to overcome fragmentation <strong>in</strong> the ad hoc network composed<strong>by</strong> the vehicles and to reduce the number of redundant broadcasts of alarm messages.In [2], two other solutions were proposed, Track Detection (TRADE) and DistanceDefer Time (DDT). In TRADE, each vehicle want<strong>in</strong>g to dissem<strong>in</strong>ate an alarm messagehas to determ<strong>in</strong>e positions and driv<strong>in</strong>g directions of its neighbors. DDT does notrely on neighbors ma<strong>in</strong>tenance, but <strong>in</strong>serts distance-based defer time slots for eachrebroadcast alarm message. When a vehicle execut<strong>in</strong>g DDT receives an alarm message,it sets-up a timer <strong>in</strong> order to determ<strong>in</strong>e if it is useful to rebroadcast that message.*This work is supported <strong>by</strong> CNRS/JemSTIC grant N° SUB/2002/004/DR16.S. Pierre, M. Barbeau, and E. Kranakis (Eds.): ADHOC-NOW 2003, LNCS <strong>2865</strong>, pp. 281–286, 2003.© Spr<strong>in</strong>ger-Verlag Berl<strong>in</strong> Heidelberg 2003


282 A. Benslimane and A. BachirIn [3], we proposed IVG, Inter Vehicle Geocast, an <strong>in</strong>ter vehicle message dissem<strong>in</strong>ationprotocol that improves bandwidth utilization, reduce delays and packet loss s<strong>in</strong>ceit avoids neighbors ma<strong>in</strong>tenance signall<strong>in</strong>g, and overcomes fragmented networks <strong>by</strong>the use of dynamic relays.S<strong>in</strong>ce all the previous proposed protocols are based on geographical position<strong>in</strong>gsystem (i.e. GPS), we analyze <strong>in</strong> this paper the possibility of the <strong>in</strong>teroperability betweenGPS-equipped and GPS-unequipped vehicles <strong>in</strong> IVG, with the aim to giveGPS-unequipped vehicles pert<strong>in</strong>ent <strong>in</strong>formation about the accident. The solution isbased on cooperation between GPS-E vehicles <strong>in</strong> order to help GPS-U vehicles to gettheir positions. Although the knowledge of the exact position is not always possible,the GPS-U vehicle can obta<strong>in</strong> some useful <strong>in</strong>formation such as driv<strong>in</strong>g direction anddistance from the accident.Several radiolocation systems have been proposed for locat<strong>in</strong>g the Mobiles Stations(MS) <strong>in</strong> cellular systems [4, 5, 6]. To do that, these systems use one or more ofthe follow<strong>in</strong>g parameters: signal strength, angle of arrival, time of arrival or theircomb<strong>in</strong>ations. Recently, a new algorithm Self-Position<strong>in</strong>g Algorithm (SPA) has beenproposed for position<strong>in</strong>g mobile nodes <strong>in</strong> wireless ad hoc networks [7] without rely<strong>in</strong>gon GPS and not tack<strong>in</strong>g <strong>in</strong>to account <strong>in</strong>ter-vehicle communication. In this paper,we propose another method for GPS-free position<strong>in</strong>g for IVG [3] tak<strong>in</strong>g care on urgentnature of communication. For example, <strong>in</strong> the case of an accident, vehicles withoutGPS have to be <strong>in</strong>formed <strong>in</strong> the right moment. The algorithm should be lightweightand give to the vehicle enough accurate <strong>in</strong>formation about the accident. Thesuggested solution must be temporary while wait<strong>in</strong>g for all the vehicles to be GPSequipped<strong>in</strong> the future and the disappearance of GPS-unequipped ones.The rema<strong>in</strong>der of this paper is organized as follows. In section 2, we give an overviewof IVG protocol. In section 3, we present our algorithm of GPS-free position<strong>in</strong>gfor IVG. Section 4 presents a performance evaluation of the proposed algorithm.F<strong>in</strong>ally, we give a conclusion <strong>in</strong> section 5.2 IVG PresentationIVG is ma<strong>in</strong>ly designed for effective alarm message dissem<strong>in</strong>ation <strong>in</strong> the ad hoc networkof vehicles <strong>in</strong> a highway. IVG is based on geographical multicast, which consists<strong>in</strong> determ<strong>in</strong><strong>in</strong>g the multicast group accord<strong>in</strong>g to the driv<strong>in</strong>g direction and theposition<strong>in</strong>g of the vehicles. The multicast is restra<strong>in</strong>ed to the so-called risk areas.First, broken vehicle (or accident) beg<strong>in</strong>s to broadcast an alarm message to <strong>in</strong>form theother vehicles of the situation. S<strong>in</strong>ce the accident vehicle can just <strong>in</strong>form its one-hopneighbors, some other vehicles have to rebroadcast the alarm message to <strong>in</strong>form thevehicles located at more than one hop from the accident. The vehicle that performsthe rebroadcast is called relay. Relays <strong>in</strong> IVG are designated <strong>in</strong> fully distributed manner.The way with which a node is designated as relay is based on distance defer timealgorithm. The node that receives an alarm message does not rebroadcast it immediatelybut has to wait some time to take a decision about rebroadcast. When the defertime expires, if it does not receive the same alarm message from another node beh<strong>in</strong>d


Inter-vehicle Geocast Protocol Support<strong>in</strong>g Non-equipped GPS Vehicles 283it, it deduces that there is no relay node beh<strong>in</strong>d it. Thus it has to designate it self as arelay and starts to broadcast the alarm messages <strong>in</strong> order to <strong>in</strong>form the vehicles whichcould be beh<strong>in</strong>d it. The defer time of a node (x) receiv<strong>in</strong>g a message from anothernode (s) is <strong>in</strong>versely proportional to the distance separat<strong>in</strong>g them that is to favorite thefarthest node to wait less time and to rebroadcast faster. The alarm message mustconta<strong>in</strong> some <strong>in</strong>formation such as accident position, previous and current positions ofthe relay from which the message is received. This <strong>in</strong>formation is used <strong>by</strong> the vehiclethat received the alarm message <strong>in</strong> order to determ<strong>in</strong>e its location accord<strong>in</strong>g the accidentvehicle [3]. The message is relevant if the vehicle is located <strong>in</strong> a relevant areaand it is received for the first time. When a vehicle receives the same alarm messagebefore its defer timer expires, it concludes that there is another vehicle beh<strong>in</strong>d itwhich is broadcast<strong>in</strong>g the same alarm message. In this situation, the second alarmmessage is not relevant because the vehicle was already <strong>in</strong>formed about the accident<strong>by</strong> the first alarm message and it is useless to rebroadcast it because there is a relaybeh<strong>in</strong>d it that is ensur<strong>in</strong>g the dissem<strong>in</strong>ation of this alarm message.The message dissem<strong>in</strong>ation <strong>in</strong> IVG depends on the rate of vehicles equipped withGPS device <strong>in</strong> the road. We believe that the success of IVG depends on its performanceswith GPS-unequipped vehicles. In the next section, we propose a solution thatallows the well function<strong>in</strong>g of IVG even with GPS-unequipped vehicles. The performancesof that solution depend on the rate of GPS-unequipped vehicles and on thedensity of vehicle <strong>in</strong> the highway.3 GPS-Unequipped AlgorithmS<strong>in</strong>ce each vehicle execut<strong>in</strong>g IVG relies on the periodic computation of its driv<strong>in</strong>gdirection (previous and current positions) some modifications have to be envisaged tomake GPS-U vehicles know these positions when the communication with the GPSsatellite is not possible. IVG can be executed normally if these positions are accuratelyknown. However, this is not always possible. In some situations, GPS-U vehiclescan’t obta<strong>in</strong> their exact previous and current positions. In that case, these vehiclescan’t participate <strong>in</strong> the process of alarm message dissem<strong>in</strong>ation. However, they canobta<strong>in</strong> some <strong>in</strong>formation about the driv<strong>in</strong>g direction and the distance from the accident.This can help the driver to take decisions. For example, if the accident happens<strong>in</strong> the opposite driv<strong>in</strong>g direction accord<strong>in</strong>g to the accident <strong>in</strong> a divided highway therewill be no need to brake.In order to obta<strong>in</strong> and refresh its position, a GPS-U vehicle, say S, periodicallybroadcasts a PREQ (Position Request) message to its one-hop neighbors. When aGPS-E vehicle receives a PREQ, it creates a PREP (Position Reply) message, <strong>in</strong>cludesits current position <strong>in</strong> that message, and sends it back to S. The knowledge ofthe exact position of S depends on the number and the positions (not all aligned) ofneighbors send<strong>in</strong>g PREP messages. S can compute its exact position if it receives atleast three PREP from three different vehicles (Fig. 1).


284 A. Benslimane and A. BachirFig. 1. Location us<strong>in</strong>g three non-aligned GPS-E vehiclesWhen S receives three PREP messages from three different vehicles, say V 1, V 2and V 3, it uses a radiolocation method (i.e., signal strength) <strong>in</strong> order to determ<strong>in</strong>e thedistances d 1, d 2and d 3from V 1,V 2and V 3. In this case the exact position of S can beeasily calculated.The algorithm of IVG can be executed normally if the GPS-U vehicles can computetheir positions. In fact, GPS-U vehicle uses PREP messages <strong>in</strong> order to get itsposition <strong>in</strong>stead of GPS satellite. However this is not always possible because <strong>in</strong> somecases, where the number of PREP messages is less than three, the exact position cannotbe known. In what follows, we study these cases, when S receives two, one, orzero PREP.We suppose that S receives answers when it moves from a previous position, S p, toa current position, S c. To allow computation of positions and driv<strong>in</strong>g directions ofvehicles, we dist<strong>in</strong>guish the follow<strong>in</strong>g situations:– If S has two neighbors <strong>in</strong> S pand three neighbors <strong>in</strong> S c, or three neighbors <strong>in</strong> S pandtwo neighbors <strong>in</strong> S c, then the exact positions can be known.– If S has three neighbors <strong>in</strong> S pand one neighbor <strong>in</strong> S c, or one neighbor <strong>in</strong> S pandthree neighbors <strong>in</strong> S c, then one exact position S p(Resp. S c) can be calculated. Thesecond position, called the lack<strong>in</strong>g position, is the <strong>in</strong>tersection of two circles. Hence,if this <strong>in</strong>tersection is <strong>in</strong> one po<strong>in</strong>t, the exact value of the lack<strong>in</strong>g position S c(Resp. S p)can be known. Else, the lack<strong>in</strong>g position can be one of the two po<strong>in</strong>ts of the <strong>in</strong>tersectionof the two circles. In some cases, even when the exact values of previous or currentpositions are not accurately known, the driv<strong>in</strong>g direction of vehicle S can beguessed. This is the case where the two possible solutions fall <strong>in</strong> the same driv<strong>in</strong>gdirection.4 Simulations and AnalysisIn order to evaluate the performance of the IVG-U algorithm, we model a straightroad 10 km long with C lanes <strong>in</strong> each direction. Each vehicle on the road moves at aconstant, randomly chosen velocity. For sake of simplicity, we do not model complexmaneuvers like lane changes and overtak<strong>in</strong>g. Furthermore, we uniformly distributethe number of vehicles per kilometer per lane to model the traffic density <strong>in</strong> the road.


Inter-vehicle Geocast Protocol Support<strong>in</strong>g Non-equipped GPS Vehicles 285S<strong>in</strong>ce the knowledge of the position of a GPS-U vehicle depends on the number ofits GPS-E neighbors, we derive a formula giv<strong>in</strong>g the mean number of GPS-E⎛ ⎞τ N −1⎝10 3 , where H is theW ⎠neighbors of a GPS-U vehicle: N(GPS-E) = ⋅⎜⎟⋅⎡H⎤surface covered <strong>by</strong> a GPS-U vehicle and τ is the rate of GPS-E. The mean number ofvehicles per m 2 is (N/103W), where W is the width of the lane.Fig. 2 shows the variation of the mean number of GPS-E neighbors of a vehicleaccord<strong>in</strong>g to the variations of the rate of GPS-E vehicles, transmission range andtraffic density. We consider four situations accord<strong>in</strong>g to the density of traffic (N=2, 4,6 and 8) and four other situation accord<strong>in</strong>g to the rate of GPS-E (τ = 0.2, 0.4, 0.6 and0.8). We remark that the mean number of GPS-E vehicles is proportional to thetransmission range and the GPS-E vehicles rate. We remark that when τ is greaterthan 60% that the mean number of GPS-E neighbors is greater that three even with alow transmission range (R=150). This means that all GPS-U vehicles can obta<strong>in</strong> theirpositions and IVG performs well.Two other simulations with τ = 60% and τ = 40% that are not <strong>in</strong>cluded here, showthat with τ around 40% and traffic density is low (N=2) that the mean number ofGPS-E neighbors can be less than three when the transmission range is less than250m. In this situation, the performances are not optimal s<strong>in</strong>ce not all the GPS-Uvehicles can obta<strong>in</strong> their positions. However, we can envisage that the GPS-U vehicles<strong>in</strong>crease their transmission power to reach ranges more than 250m <strong>in</strong> order to getmore than two GPS-E neighbors, therefore they can compute theirs exact positions.Fig. 2. The average number of GPS-E neighbors with different τ ratesFor τ = 40%, curve shows that the number of GPS-E neighbors is always less thanthree even the transmission range is 400m when the traffic density is low (N=2). Inthis situation, not all GPS-U vehicles can compute their exact positions. Hence, thesevehicles can’t be relays <strong>in</strong> IVG, they are just passive elements.


286 A. Benslimane and A. Bachir5 ConclusionIn this paper, we propose an improvement to the basic IVG algorithm towards support<strong>in</strong>gits <strong>in</strong>teroperability <strong>in</strong> environments where GPS-U vehicles are present. Weshow that the performances of IVG are optimal when a GPS-E rate is 60%. We alsoshow that we can improve the performances of our method when GPS-E rate is 40%<strong>by</strong> the <strong>in</strong>crease of the transmission range.In some situation where GPS-E rate is less than 20%, the exact positions of suchGPS-U vehicles cannot be known even with high transmission power. In that situations,we propose to let these vehicle as passive elements (they don’t re-broadcastalarm messages) and we give them some <strong>in</strong>formation such as driv<strong>in</strong>g direction anddistance from the accident. This <strong>in</strong>formation can help the driver to take decisions.We are develop<strong>in</strong>g an extension to the ns-2 code of IVG <strong>in</strong> order to support thepresence of GPS-U vehicles. Indeed, we believe that the performances of the proposedmethod are better than those presented <strong>in</strong> the mathematical analysis because <strong>in</strong>the real world some GPS-U vehicles can get their positions and help other GPS-Uvehicles. This means that average number of GPS-E vehicles can be higher than theone presented <strong>in</strong> section 4. Thus the performance of IVG can be optimal even withless than 40% <strong>in</strong>itially GPS-E vehicles.References1. L.Briesemeister and G. Hommel, “Overcom<strong>in</strong>g Fragmentation <strong>in</strong> Mobile Ad Hoc Networks”,Journal of Communications and Networks. Vol. 2, N° 3, pp. 182-187, September2000.2. M. Sun et al., ‘GPS-based Message Broadcast for Adaptive Inter-vehicle Communications”,Proc. of IEEE VTC Fall 2000, Boston, MA, 6:2685-2692, September2000.3. A. Bachir and A. Benslimane, “A Multicast Protocol <strong>in</strong> Ad-hoc Networks: Inter-VehiclesGeocast”, IEEE VTC-spr<strong>in</strong>g 2003, Jeju, Korea, April 2003.4. James J. Caffery and Gordon L. Stüber, “Overview of Radiolocation <strong>in</strong> CDMACellular Systems”, IEEE Communications Magaz<strong>in</strong>e pp. 38-45, April 1998.5. E. K. Wesel, “Wireless Multimedia Communications: Network<strong>in</strong>g Video, Voiceand Data”, Addition-Wesley, One Jacob Way, Read<strong>in</strong>g Massachusetts 01867USA, 1998.6. S. Venkatraman, J. Caffery and H.R. You, “Location Us<strong>in</strong>g LOS Range Estimation <strong>in</strong>NLOS Environments”, IEEE VTC Spr<strong>in</strong>g, Birm<strong>in</strong>gham, AL, May 2002, pp. 856-860.7. M.P. Wylie and J. Holtzman, “The non-l<strong>in</strong>ear sight problem <strong>in</strong> mobile locationestimation”, 5th IEEE International Conference on Universal Personal Communication,1996.8. S. Capkun, M. Hamdi and J-P. Hubaux, “GPS-free position<strong>in</strong>g <strong>in</strong> mobile ad hocnetworks”, Hawaii International Conference on System <strong>Science</strong>s, 2001.


Cartesian Ad Hoc Rout<strong>in</strong>g Protocols ⋆Larry Hughes, Kafil Shumon, and Y<strong>in</strong>g ZhangDepartment of Electrical and <strong>Computer</strong> Eng<strong>in</strong>eer<strong>in</strong>gDalhousie UniversityHalifax, Nova Scotia, B3J 2X4, Canada{larry.hughes,kshumon,yzhang}@dal.caAbstract. As ad hoc networks ga<strong>in</strong> <strong>in</strong> popularity, some of their limitationsare becom<strong>in</strong>g apparent, notably power and bandwidth restrictions.Consequently, it is necessary to utilize protocols that reduce power consumption,reduce traffic, and restrict flood<strong>in</strong>g. In this paper, two adaptive,connectionless protocols and their support<strong>in</strong>g subsystems are described.The protocols, when used with directional antennas, can reducethe number of nodes <strong>in</strong>volved <strong>in</strong> a transmission, there<strong>by</strong> address<strong>in</strong>g theissue of power consumption and bandwidth utilization.Keywords: MANET, location awareness, direction awareness.1 IntroductionA mobile ad hoc network (MANET) is a collection of wireless mobile nodesthat are capable of communicat<strong>in</strong>g with each other without the use of a network<strong>in</strong>frastructure or any centralized communication [1]. Like most wirelessnetworks, a MANET is both power and bandwidth sensitive. Communication <strong>in</strong>a MANET poses special challenges because the network is <strong>in</strong>frastructureless andtopologically dynamic. Energy conservation also plays an important role <strong>in</strong> theperformance of ad hoc networks s<strong>in</strong>ce most mobile hosts are battery operated.In a relatively dense network with many nodes ly<strong>in</strong>g between the source andthe dest<strong>in</strong>ation, these two problems become even more prom<strong>in</strong>ent. A numberof MANET protocols have been proposed, <strong>in</strong>clud<strong>in</strong>g on-demand protocols forsav<strong>in</strong>g bandwidth, such as DSR [2] and CBRP [3], and for power sav<strong>in</strong>g, suchas power-aware localized rout<strong>in</strong>g [4] and energy conserved rout<strong>in</strong>g [5].Cartesian Ad hoc Rout<strong>in</strong>g Protocols (CARPs) are a set of three adaptive,connectionless protocols that address the problems of rout<strong>in</strong>g and power consumption<strong>in</strong> MANETs; they are loosely based on the Cartesian Rout<strong>in</strong>g Protocol[6]. Each protocol operates at the physical layer (us<strong>in</strong>g directional antennas) andthe network layer (through its adaptive protocols); all nodes are location anddirection aware. The protocols designed for CARP have three objectives: restrictflood<strong>in</strong>g, reduce power consumption, and reduce traffic. Due to space restrictionsonly two of the protocols are presented <strong>in</strong> this paper.⋆ This research is supported <strong>by</strong> an Atlantic Innovation Fund research grant as part ofthe <strong>Computer</strong> Networks and Services Research programme.S. Pierre, M. Barbeau, and E. Kranakis (Eds.): ADHOC-NOW 2003, LNCS <strong>2865</strong>, pp. 287–292, 2003.c○ Spr<strong>in</strong>ger-Verlag Berl<strong>in</strong> Heidelberg 2003


288 L. Hughes, K. Shumon, and Y. ZhangLocationDirection and LocationDeterm<strong>in</strong>ationLocationLocation andDirectionPKT Location PKT Transmission PKT Antenna PKTVerificationArea CreationSelectionFig. 1. CARP data flow diagram.2 CARPAll Cartesian Ad hoc Rout<strong>in</strong>g Protocols attempt to restrict transmission to thosenodes that lie between the source and the dest<strong>in</strong>ation. First, a directional antennais used to create a bound<strong>in</strong>g box with a horizontal beamwidth of 90 ◦ . Next, theprotocol is used to limit the number of forward<strong>in</strong>g nodes <strong>in</strong> the bound<strong>in</strong>g box <strong>by</strong>creat<strong>in</strong>g a transmission area. The source and dest<strong>in</strong>ation nodes are at oppositeends of the transmission area; each node with<strong>in</strong> the transmission area is referredto as an <strong>in</strong>termediate node. Acurrent node is a node that is forward<strong>in</strong>g a packet.Fig. 1 shows the CARP subsystems. When a source node is to transmita packet, it uses the Transmission Area Creation subsystem to determ<strong>in</strong>e thetransmission area. Antenna Selection is then employed to select the antennafac<strong>in</strong>g the dest<strong>in</strong>ation. The Location Verification subsystem of each <strong>in</strong>termediatenode determ<strong>in</strong>es whether the node is with<strong>in</strong> the transmission area; if it is, thesteps used <strong>by</strong> the source node are repeated. This process cont<strong>in</strong>ues until thepacket reaches the dest<strong>in</strong>ation 1 .In addition to its payload, a CARP packet consists of the source address,the dest<strong>in</strong>ation address, and transmission area <strong>in</strong>formation. At a m<strong>in</strong>imum, thetransmission area <strong>in</strong>formation is the address of the current node (x c ,y c ).3 Transmission Area with Limit<strong>in</strong>g AngleIf the transmission area has the same shape as the bound<strong>in</strong>g box, unnecessarytransmissions may occur especially <strong>in</strong> dense network. To reduce the number ofpotential <strong>in</strong>termediate nodes <strong>in</strong> the transmission area, the follow<strong>in</strong>g protocolattempts to restrict the size of the area <strong>by</strong> employ<strong>in</strong>g a limit<strong>in</strong>g angle.The limit<strong>in</strong>g angle, φ, def<strong>in</strong>es the shape of the transmission area betweenthe current node, C, and the dest<strong>in</strong>ation node, D, as shown <strong>in</strong> Fig. 2. Each<strong>in</strong>termediate node forms an angle φ i with the current node and the dest<strong>in</strong>ationnode.1 S<strong>in</strong>ce the dest<strong>in</strong>ation may move dur<strong>in</strong>g a transmission, a circular expected zone iscreated [7]. Unless otherwise <strong>in</strong>dicated, the expected zone and its related calculationsare beyond the scope of this paper.


Cartesian Ad Hoc Rout<strong>in</strong>g Protocols 289D(x d ,y d )φφφNode1Node2Node3Node4C(x c,y c)Fig. 2. Transmission area with limit<strong>in</strong>g angle.Table 1. Nodes <strong>in</strong> the network.Value of φ Shape of Transmission Area Example Path Lengthφ = 180 ◦ l<strong>in</strong>e connect<strong>in</strong>g current and dest<strong>in</strong>ation Node1 Shortest90 ◦


290 L. Hughes, K. Shumon, and Y. Zhang2aExpected zoneDr1r2C2bD2bC2c(a) An ellipse(b) Transmission areaFig. 3. Fixedpathlengthshapes.4 TransmissionAreawithFixedPathLengthAs well as mak<strong>in</strong>g the transmission area with a limit<strong>in</strong>g angle, the area can alsobe determ<strong>in</strong>ed from the path length. S<strong>in</strong>ce nodes with a fixed path length forman ellipse, the second CARP algorithm uses an ellipse as the transmission area.In Fig. 3(a), the current and dest<strong>in</strong>ation nodes are two foci of an ellipse; thedistance between these two nodes is 2c. The major axis of the ellipse is 2a andthe m<strong>in</strong>or axis of ellipse is 2b.The follow<strong>in</strong>g equations are of <strong>in</strong>terest:r 1 + r 2 =2a (2)b 2 + c 2 = a 2 (3)All the nodes located on the ellipse boundary have the same path length 2a,as shown <strong>in</strong> equation 2, while nodes located <strong>in</strong>side the ellipse have a shorter pathlength. These nodes are <strong>in</strong>side the transmission area.An expected zone is def<strong>in</strong>ed as the overlapp<strong>in</strong>g area of a circle (centred atthe dest<strong>in</strong>ation) and the ellipse as shown <strong>in</strong> Fig. 3(b).The transmission area <strong>in</strong>formation for this algorithm is the current nodeaddress (x c ,y c ).4.1 Transmission Area Creation SubsystemThe parameters a, b and c determ<strong>in</strong>e the shape of the ellipse; however s<strong>in</strong>ce theyare correlated as illustrated <strong>in</strong> equation 3, if any two of them are known, thethird can be calculated.The value of a is related to the radius of the expected zone, r, andthedistance between the source and the dest<strong>in</strong>ation, 2c. S<strong>in</strong>ce the positions of thecurrent and dest<strong>in</strong>ation nodes are assumed to be fixed at the transmission of thepacket, a is determ<strong>in</strong>ed from the radius of the expected zone, r, which is relatedto the speed of the dest<strong>in</strong>ation [7].An ellipse <strong>in</strong> a sparse network has a larger value of b than that <strong>in</strong> a densenetwork to <strong>in</strong>clude more nodes <strong>in</strong> the area. Fig. 3(b) shows the transmission areawith different values of b <strong>in</strong> networks with different densities.When an <strong>in</strong>termediate node forwards the packet, it substitutes the currentnode co-ord<strong>in</strong>ates with its own to create the transmission area for the next hop.


Cartesian Ad Hoc Rout<strong>in</strong>g Protocols 2914.2 Location Verification SubsystemWhen an <strong>in</strong>termediate node receives a packet, it calculates the follow<strong>in</strong>g:– its distance to the source r1 and to the dest<strong>in</strong>ation r2– distance between source and dest<strong>in</strong>ation 2c– major axis of the ellipse 2a =2c +2rIf r1 +r2 < 2a, the node is <strong>in</strong>side the transmission area and is to forwardthe packet towards the dest<strong>in</strong>ation; otherwise it is to discard the packet.5 Support<strong>in</strong>g HardwareEach CARP node must be direction and location aware, <strong>in</strong> addition, it needs toselect the proper antenna(s) for packet transmission.5.1 Direction and Location Determ<strong>in</strong>ation SubsystemThe Direction and Location Determ<strong>in</strong>ation subsystem consists of two dist<strong>in</strong>ctunits.A Direction Unit, which is responsible for determ<strong>in</strong><strong>in</strong>g magnetic North tomake the node direction aware. A magnetoresistive sensor chip can be employedto act like an electronic compass [8]. The compass has a fixed orientation withthe antenna subsystem (described below) so that the direction <strong>in</strong> which eachantenna is fac<strong>in</strong>g is always known. The sensor gives a deviation angle of 0 ◦ whilefac<strong>in</strong>g towards the earth’s magnetic North and the angle of deviation <strong>in</strong>creasesas the antenna module rotates clockwise and resets after each complete rotation.The Location Unit is responsible for determ<strong>in</strong><strong>in</strong>g the location of the node.Any location detection system, such as GPS [9], can be used to provide thelocation co-ord<strong>in</strong>ates.5.2 Antenna Selection SubsystemThis subsystem selects the proper antenna or antennas <strong>in</strong> the antenna module<strong>by</strong> tak<strong>in</strong>g the dest<strong>in</strong>ation coord<strong>in</strong>ates from the packet and the local nodeand direction <strong>in</strong>formation provided <strong>by</strong> the direction and location determ<strong>in</strong>ationsubsystem. The antenna module consists of four directional antennas with eachhav<strong>in</strong>g a horizontal beamwidth of 90 ◦ and a vertical beamwidth of 180 ◦ .The appropriate antenna or antennas are then chosen as follows. First, theangle of <strong>in</strong>cl<strong>in</strong>ation (θ) is determ<strong>in</strong>ed with reference to the x-axis between thecurrent and dest<strong>in</strong>ation nodes us<strong>in</strong>g their coord<strong>in</strong>ates. S<strong>in</strong>ce a positive <strong>in</strong>cl<strong>in</strong>ationwith reference to the x-axis is required, 180 ◦ is added to θ if θ is less than 0 ◦ .Then the angle of <strong>in</strong>cl<strong>in</strong>ation is conditioned to determ<strong>in</strong>e the direction of thedest<strong>in</strong>ation node. Next the angle of deviation of the compass is added to θ.F<strong>in</strong>ally, θ is conditioned to be <strong>in</strong> the range from 0 ◦ to 360 ◦ .Once the f<strong>in</strong>al θ is calculated the selection of the antenna or antennas can bemade easily. When θ is a multiple of 90 ◦ , the two antennas on two sides of theangle are chosen.


292 L. Hughes, K. Shumon, and Y. Zhang6 Conclud<strong>in</strong>g RemarksThis paper described two of the Cartesian Ad hoc Rout<strong>in</strong>g Protocols. These areadaptive and connectionless rout<strong>in</strong>g protocols which:– restrict any flood<strong>in</strong>g to with<strong>in</strong> the transmission area.– reduce power consumption of nodes outside the transmission area, s<strong>in</strong>ce theyare not <strong>in</strong>volved <strong>in</strong> the communication.– reduce the number of nodes <strong>in</strong> the communication <strong>by</strong> dynamically adjust<strong>in</strong>gthe transmission area and deploy<strong>in</strong>g directional transmission.In this paper, it has been assumed that the <strong>in</strong>termediate nodes have a uniformdensity between the source and dest<strong>in</strong>ation; however, <strong>in</strong> a real networkenvironment, this may not be the case. For example, the number of <strong>in</strong>termediatenodes may appear to be dense, when <strong>in</strong> reality, there may be a peak aroundthe source or dest<strong>in</strong>ation only. We are <strong>in</strong> the process of exam<strong>in</strong><strong>in</strong>g non-uniformnetwork densities with the OPNET modell<strong>in</strong>g tool.References1. Ilyas, M., ed., The Handbook of Ad Hoc Wireless Networks, CRC Press, Jan. 2003.2. Johnson, D.B. et al., The dynamic source rout<strong>in</strong>g protocol for mobile ad hoc networks,IETF Internet Draft. http://www.ietf.org/<strong>in</strong>ternet-drafts/draft-ietf-manetdst-02.txt,1999. Accessed 12 June 2003.3. Jiang, M. et al, The cluster based rout<strong>in</strong>g protocol (CBRP) for ad hoc networks,IETF Internet Draft. http://www.ietf.org/<strong>in</strong>ternet-drafts/draft-ietf-manetcbrp-spec-01.txt,1999. Accessed 12 June 2003.4. Stojmenovic, I. and L<strong>in</strong> X., Power-aware localized rout<strong>in</strong>g <strong>in</strong> wireless networks, IEEEInternational Parallel and Distributed Symp., 2000.5. Chang, J-H, and Tassiulas, L., Energy conserv<strong>in</strong>g rout<strong>in</strong>g <strong>in</strong> wireless as hoc networks,Infocom 2000.6. Hughes, L. et al, Cartesian Rout<strong>in</strong>g, <strong>Computer</strong> Networks, vol. 34, pp. 455 - 466,2000.7. Ko, Y.B., and Vaidya, N.H., Us<strong>in</strong>g Location Information In Wireless Ad Hoc Networks,IEEE 49th Vehicular Technology Conference, pp. 1952-1956, vol. 3, 1999.8. Stork, T., Electronic Compass Design Us<strong>in</strong>g KMZ51 and KMZ52,http://www.semiconductors.philips.com/acrobat/applicationnotes/AN00022 COMPASS.pdf. Accessed 13 June 2003.9. Instant GPS, http://www.motorola.com/ies/GPS. Accessed 13 June 2003.


<strong>Lecture</strong> <strong>Notes</strong> <strong>in</strong> <strong>Computer</strong> <strong>Science</strong> <strong>2865</strong><strong>Edited</strong> <strong>by</strong> G. <strong>Goos</strong>, J. Hartmanis, and J. van Leeuwen


3Berl<strong>in</strong>HeidelbergNew YorkHong KongLondonMilanParisTokyo


Samuel Pierre Michel BarbeauEvangelos Kranakis (Eds.)Ad-Hoc, Mobile,andWireless NetworksSecond International Conference,ADHOC-NOW 2003Montreal, Canada, October 8-10, 2003Proceed<strong>in</strong>gs13


Series EditorsGerhard <strong>Goos</strong>, Karlsruhe University, GermanyJuris Hartmanis, Cornell University, NY, USAJan van Leeuwen, Utrecht University, The NetherlandsVolume EditorsSamuel PierreEcole Polytechnique de MontrealDepartment of <strong>Computer</strong> Eng<strong>in</strong>eer<strong>in</strong>gP.O. Box 6079, Station Centre-Ville, Montreal, Canada, H3C 3A7E-mail: samuel.pierre@polymtl.caMichel BarbeauEvangelos KranakisCarleton University, School of <strong>Computer</strong> <strong>Science</strong>5376 Herzberg Laboratories, 1125 Colonel <strong>by</strong> DriveOttawa, Canada, K1S 5B6E-mail: {barbeau,kranakis}@scs.carleton.caCatalog<strong>in</strong>g-<strong>in</strong>-Publication Data applied forA catalog record for this book is available from the Library of Congress.Bibliographic <strong>in</strong>formation published <strong>by</strong> Die Deutsche BibliothekDie Deutsche Bibliothek lists this publication <strong>in</strong> the Deutsche Nationalbibliografie;detailed bibliographic data is available <strong>in</strong> the Internet at .CR Subject Classification (1998): C.2, D.4.4, H.4.3, H.5.3, K.4.3ISSN 0302-9743ISBN 3-540-20260-9 Spr<strong>in</strong>ger-Verlag Berl<strong>in</strong> Heidelberg New YorkThis work is subject to copyright. All rights are reserved, whether the whole or part of the material isconcerned, specifically the rights of translation, repr<strong>in</strong>t<strong>in</strong>g, re-use of illustrations, recitation, broadcast<strong>in</strong>g,reproduction on microfilms or <strong>in</strong> any other way, and storage <strong>in</strong> data banks. Duplication of this publicationor parts thereof is permitted only under the provisions of the German Copyright Law of September 9, 1965,<strong>in</strong> its current version, and permission for use must always be obta<strong>in</strong>ed from Spr<strong>in</strong>ger-Verlag. Violations areliable for prosecution under the German Copyright Law.Spr<strong>in</strong>ger-Verlag Berl<strong>in</strong> Heidelberg New Yorka member of BertelsmannSpr<strong>in</strong>ger <strong>Science</strong>+Bus<strong>in</strong>ess Media GmbHhttp://www.spr<strong>in</strong>ger.de© Spr<strong>in</strong>ger-Verlag Berl<strong>in</strong> Heidelberg 2003Pr<strong>in</strong>ted <strong>in</strong> GermanyTypesett<strong>in</strong>g: Camera-ready <strong>by</strong> author, data conversion <strong>by</strong> Olgun <strong>Computer</strong>grafikPr<strong>in</strong>ted on acid-free paper SPIN: 10963562 06/3142 543210


PrefaceAd Hoc Networks are wireless, self-organiz<strong>in</strong>g systems formed <strong>by</strong> co-operat<strong>in</strong>gnodes, with<strong>in</strong> communication range of each other which form temporary networks.Their topology is dynamic, decentralized, and ever-chang<strong>in</strong>g, and thenodes may move around arbitrarily. The last few years have witnessed a wealthof research ideas on Ad Hoc networks which are mov<strong>in</strong>g rapidly <strong>in</strong>to implementedstandards.Mobile comput<strong>in</strong>g, particularly wireless-enabled mobile comput<strong>in</strong>g, covers alarge area of applications <strong>in</strong> mobile comput<strong>in</strong>g environments, network<strong>in</strong>g, communicationdevices and systems. This conference exposes experimental as well astheoretical research <strong>in</strong> ad hoc, mobile and wireless networks. The range of topicscovered <strong>in</strong>cludes management of power consumption, architectures and protocols,quality of service, and security. The aim of the conference was to providea unique opportunity for researchers and students <strong>in</strong> <strong>in</strong>dustry and academia toparticipate at an annual forum and share their research results and experiences.This conference followed the first successful conference (held at the Fields Institute<strong>in</strong> Toronto dur<strong>in</strong>g September 20–21 of last year), and was held at the HolidayInn, Midtown <strong>in</strong> Montreal dur<strong>in</strong>g October 8–10, 2003. It was co-sponsored<strong>by</strong> the Mobile Comput<strong>in</strong>g and Network<strong>in</strong>g Research Laboratory (LARIM) of theÉcole Polytechnique de Montréal, the School of <strong>Computer</strong> <strong>Science</strong> (SCS) of CarletonUniversity, MITACS (Mathematics of Information Technology and ComplexSystems), and the Association for Comput<strong>in</strong>g Mach<strong>in</strong>ery (ACM).Forty-two papers were submitted, of which 23 regular and 4 short papers wereselected for presentation. All papers were reviewed for technical merit <strong>by</strong> theprogram committee. We would like to thank the <strong>in</strong>vited speakers Adrian Perrig(Carnegie Mellon University, USA) and Violet R. Syrotiuk (Arizona State University,USA) for their presentations. Many thanks also go to Khaled Laouamrifor help<strong>in</strong>g with the conference logistics, as well as all the follow<strong>in</strong>g people fortheir helpful contribution as paper reviewers: Gustavo Alonso, Ronald Beaubrun,Paul Boone, Steven Chamberland, Ali Chamam, Soumaya Cherkaoui, RochGlitho, Norm Hutch<strong>in</strong>son, Jeannette Janssen, Mike Just, Danny Krizanc, ThomaKunz, Peter Marbach, Fabien Nimbona, Paolo Penna, Alejandro Qu<strong>in</strong>tero, S.S.Ravi, Daniel Rossier, Sunil Shende, Ivan Stojmenovic, Tao Wan, and Yufei Wu.Special thanks to Amir Ghavam, Jeyanthi Hall and Zhey<strong>in</strong> Li for publicity, andMark Vigder for Web site contributions. F<strong>in</strong>ally, we would like to thank allthe members of the organiz<strong>in</strong>g committee, as well as Raymond Lévesque andSébastien Lévesque from BCU.Michel BarbeauEvangelos KranakisSamuel Pierre


Organiz<strong>in</strong>g CommitteeConference Co-chairsMichel BarbeauCarleton UniversityEvangelos KranakisCarleton UniversitySamuel PierreÉcole Polytechnique de MontréalPublicity and Tutorials ChairAlejandro Qu<strong>in</strong>teroÉcole Polytechnique de MontréalLocal Arrangements ChairSab<strong>in</strong>e KébreauÉcole Polytechnique de Montréal


Program CommitteeG. Alonso, ETHZ, SwitzerlandM. Barbeau, Carleton University, CanadaR. Beaubrun, Université Laval, CanadaS. Chamberland, École Polytechnique, CanadaS. Cherkaoui, U. de Sherbrooke, CanadaR.H. Glitho, Ericsson Research, CanadaJ. Janssen, Dalhousie University, CanadaM. Just, Treasury Board, CanadaN.C. Hutch<strong>in</strong>son, UBC, CanadaE. Kranakis, Carleton University, CanadaD. Krizanc, Wesleyan University, USAT. Kunz, Carleton University, CanadaR. Liscano, Mitel Networks, CanadaP. Marbach, U. of Toronto, CanadaL. Narayanan, Concordia U., CanadaI. Nikolaidis , U. of Alberta, CanadaH. Mouftha, Ottawa U., CanadaP. Penna, University of Rome, ItalyS. Pierre, École Polytechnique, CanadaA. Qu<strong>in</strong>tero, École Polytechnique, CanadaS. Ravi, SUNY Albany, USAD. Rossier, Swisscom, SwitzerlandS. Shende, Rutgers University, USAI. Stojmenovic, U. of Ottawa, CanadaS. Tohmé, ENST, FranceKeynote SpeakersAdrian Perrig, Canergie Mellon U., USAViolet R. Syrotiuk, Arizona State U., USATutorialsIvan Stojmenovic, University of Ottawa, CanadaRamiro Liscano and Amir Ghavam, University of Ottawa, CanadaMichel Barbeau, Carleton University, Canada


Table of ContentsSpace-Time Rout<strong>in</strong>g <strong>in</strong> Ad Hoc Networks ............................. 1H. Dubois-Ferrière, M. Grossglauser, and M. VetterliSAFAR: An Adaptive Bandwidth-Efficient Rout<strong>in</strong>g Protocolfor Mobile Ad Hoc Networks ......................................... 12J. Doshi and P. KilambiEvaluation of the AODV and DSR Rout<strong>in</strong>g ProtocolsUs<strong>in</strong>g the MERIT Tool ............................................. 25P. Narayan and V.R. SyrotiukOn-demand Rout<strong>in</strong>g <strong>in</strong> MANETs:The Impact of a Realistic Physical Layer Model ........................ 37L. Q<strong>in</strong> and T. KunzArchitecture and Algorithms for Real-Time Mobility Management<strong>in</strong> Mobile IP Networks .............................................. 49M. Diha and S. PierreProactive QoS Rout<strong>in</strong>g <strong>in</strong> Ad Hoc Networks ........................... 60Y. Ge, T. Kunz, and L. LamontDeliver<strong>in</strong>g Messages <strong>in</strong> Disconnected Mobile Ad Hoc Networks ........... 72R. Shah and N.C. Hutch<strong>in</strong>sonExtend<strong>in</strong>g Seamless IP Multicast Edge-Coveragethrough Mobile Ad Hoc Access Networks .............................. 84P.M. Ruiz, A.F. Gomez-Skarmeta, P. Mart<strong>in</strong>ez, and D. LarrabeitiA Uniform Cont<strong>in</strong>uum Model for Scal<strong>in</strong>g of Ad Hoc Networks ........... 96E.W. Grundke and A.N. Z<strong>in</strong>cir-HeywoodProbabilistic Protocols for Node Discovery<strong>in</strong> Ad Hoc Multi-channel Broadcast Networks ..........................104G. Alonso, E. Kranakis, C. Sawchuk, R. Wattenhofer,and P. WidmayerTowards Adaptive WLAN Frequency ManagementUs<strong>in</strong>g Intelligent Agents ............................................116F. Gamba, J.-F. Wagen, and D. RossierAnalyz<strong>in</strong>g Split Channel Medium Access Control Schemeswith ALOHA Reservation ...........................................128J. Deng, Y.S. Han, and Z.J. HaasPrevent<strong>in</strong>g Replay Attacks for Secure Rout<strong>in</strong>g <strong>in</strong> Ad Hoc Networks .......140J. Zhen and S. Sr<strong>in</strong>ivas


XTable of ContentsResist<strong>in</strong>g Malicious Packet Dropp<strong>in</strong>g <strong>in</strong> Wireless Ad Hoc Networks .......151M. Just, E. Kranakis, and T. WanA New Framework for Build<strong>in</strong>g Secure Collaborative Systems<strong>in</strong> True Ad Hoc Network ............................................164H.-P. Bischof, A. Kam<strong>in</strong>sky, and J. B<strong>in</strong>derComput<strong>in</strong>g 2-Hop Neighborhoods <strong>in</strong> Ad Hoc Wireless Networks ..........175G. Cal<strong>in</strong>escuTopology Control Problems under Symmetricand Asymmetric Power Thresholds ...................................187S.O. Krumke, R. Liu, E.L. Lloyd, M.V. Marathe, R. Ramanathan,and S.S. RaviIDEA: An Iterative-Deepen<strong>in</strong>g Algorithm for Energy-Efficient Query<strong>in</strong>g<strong>in</strong> Ad Hoc Sensor Networks ..........................................199S. PatilOn the Interaction of Bandwidth Constra<strong>in</strong>ts and Energy Efficiency<strong>in</strong> All-Wireless Networks ............................................211T. Chu and I. NikolaidisAutomated Meter Read<strong>in</strong>g and SCADA Applicationfor Wireless Sensor Network .........................................223F.J. Mol<strong>in</strong>a, J. Barbancho, and J. LuqueRange Assignment for High Connectivity <strong>in</strong> Wireless Ad Hoc Networks ...235G. Cal<strong>in</strong>escu and P.-J. WanSte<strong>in</strong>er Systems for Topology-Transparent Access Control <strong>in</strong> MANETs ...247C.J. Colbourn, V.R. Syrotiuk, and A.C.H. L<strong>in</strong>gComplexity of Connected Components <strong>in</strong> Evolv<strong>in</strong>g Graphsand the Computation of Multicast Trees <strong>in</strong> Dynamic Networks ..........259S. Bhadra and A. FerreiraMobile Agents for Cluster<strong>in</strong>g and Rout<strong>in</strong>g <strong>in</strong> Mobile Ad Hoc Networks ...271M.K. Denko and Q.H. MahmoudRout<strong>in</strong>g Update <strong>in</strong> Ad Hoc Networks .................................277B. Macabéo, S. Pierre, and A. Qu<strong>in</strong>teroInter-vehicle Geocast Protocol Support<strong>in</strong>g Non-equipped GPS Vehicles ...281A. Benslimane and A. BachirCartesian Ad Hoc Rout<strong>in</strong>g Protocols..................................287L. Hughes, K. Shumon, and Y. ZhangAuthor Index .................................................293


Author IndexAlonso, G. 104Bachir, A. 281Barbancho, J. 223Benslimane, A. 281Bhadra, S. 259B<strong>in</strong>der, J. 164Bischof, H.-P. 164Cal<strong>in</strong>escu, G. 175, 235Chu, T. 211Colbourn, C.J. 247Deng, J. 128Denko, M.K. 271Diha, M. 49Doshi, J. 12Dubois-Ferrière, H. 1Ferreira, A. 259Gamba, F. 116Ge, Y. 60Gomez-Skarmeta, A.F. 84Grossglauser, M. 1Grundke, E.W. 96Haas, Z.J. 128Han, Y.S. 128Hughes, L. 287Hutch<strong>in</strong>son, N.C. 72Just, M. 151Kam<strong>in</strong>sky, A. 164Kilambi, P. 12Kranakis, E. 104, 151Krumke, S.O. 187Kunz, T. 37, 60Lamont, L. 60Larrabeiti, D. 84L<strong>in</strong>g, A.C.H. 247Liu, R. 187Lloyd, E.L. 187Luque, J. 223Macabéo, B. 277Mahmoud, Q.H. 271Marathe, M.V. 187Mart<strong>in</strong>ez, P. 84Mol<strong>in</strong>a, F.J. 223Narayan, P. 25Nikolaidis, I. 211Patil, S. 199Pierre, S. 49, 277Q<strong>in</strong>, L. 37Qu<strong>in</strong>tero, A. 277Ramanathan, R. 187Ravi, S.S. 187Rossier, D. 116Ruiz, P.M. 84Sawchuk, C. 104Shah, R. 72Shumon, K. 287Sr<strong>in</strong>ivas, S. 140Syrotiuk, V.R. 25, 247Vetterli, M. 1Wagen, J.-F. 116Wan, P.-J. 235Wan, T. 151Wattenhofer, R. 104Widmayer, P. 104Zhang, Y. 287Zhen, J. 140Z<strong>in</strong>cir-Heywood, A.N. 96

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!