Distributed quality-of-service routing in ad hoc networks
Summary (3 min read)
Introduction
- The goal of QoS routing is twofold: a) selecting network paths that have sufficient resources to meet the QoS requirements of all admitted connections and b) achieving global efficiency in resource utilization.
- The recent work can be divided into three broad categories: source routing, distributed routing, and hierarchical routing.
- The authors shall only study the type of ad hoc networks whose topologies are not changing that fast to make the QoS routing meaningless.
B. Stationary and Transient Links
- The links between the stationary or slowly moving nodes are likely to exist continuously.
- The links between the fast moving nodes are likely to xist only for a short period of time.
- A routing path should use stationary links whenever possible in order to reduce the probability of a path breaking when the network topology changes [7].
- An immediate implication is that the links that are just formed are more likely to be broken than the links that have already existed for some time.
C. QoS State Metrics
- A node is assumed to keep the up-to-date local state about all outgoing links.
- The state information of link includes: 1) delay , the channel delay of the link, including the radio propagation delay, the queuing delay, and the protocol-processing time; 2) bandwidth , the residual bandwidth of the link; and 3) cost , which can be simply one as a hop count or a function of the link utilization.
- The delay, bandwidth, and cost of a path are defined as follows: delay delay delay bandwidth bandwidth bandwidth cost cost cost.
D. Routing Problems
- When there are multiple feasible paths, the authors want to select the one with the least cost.
- 3We assume every node has the precise information about its local state.the authors.the authors.
- Keeps the least end-to-end cost fromto , i.e., the cost of the least-cost path, also known as 3) Cost.
- Keeps the estimated maximum change of before the next update, also known as Delay variation.
- At an intermediate node, a probe with more than one ticket is allowed to be split into multiple ones, each searching a different downstream subpath.
A. Determining the Number of Tickets
- Consider a connection request whose source, destination, and bandwidth requirement are, , and , respectively.
- 11When TDMA is used and each message takes a time slot regardless of the message length, as long as it fits in a time slot, local multicast will still save bandwidth.
- If , then sends itself a probe with yellow tickets and green tickets to activate the routing process.
B. Forwarding the Received Tickets
- Suppose a node receives a probe with yellow tickets and green tickets.
- If is still empty, then invalidate all tickets and send them tof r the purpose of termination detection.
- Is determined based on the observation that a probe sent toward the direction with a larger residual bandwidth should have more yellow tickets.
- There are numerous examples of such mobile networks.
- In addition, the authors use path redundancy to tolerate the topology dynamics and use path repairing to repair the broken path at the breaking point.
C. Termination and Path Selection
- The routing process is terminated when all probes have either reached the destination or been dropped by the intermediate nodes.
- In order to detect the termination, the authors require the intermediate nodes to send the invalidated tickets9 to the destination instead of discarding them.
- The authors choose the first approach for its simplicity.
- If multiple probes with valid tickets arrive at the destination, the path with the least cost is selected as the primary path, and the other paths are the secondary paths, which will be used when the primary path is broken due to the mobility of intermediate nodes.
- After the primary path is selected, a confirmation message is sent back along the path to the source and reserves resources along the way.
F. Soft States
- Routing and rerouting can be used in conjunction with RSVP [32], which is a resource reservation protocol.
- RSVP is based on soft states, i.e., the resource reservation must be refreshed periodically.
- Soft states are deleted if not refreshed within a time-out period.
- Every node in the network maintains a connection table, which has an entry for every connection passing the node, containing the incoming link and the outgoing link used by the connection.
- A refreshing message is sent from the destination back along the routing path to the source periodically [32].
A. Detection of Broken Paths
- Let , , and be the source, the destination, and the established routing path, respectively.
- Similarly, each node on except has a successive node, denoted as.
- A single approach is proposed for all the above cases: if a node using the neighbor discovering protocol finds that is no longer its neighbor,detects that is broken at link .
- One possible implementation is for each node to maintain a link table for every outgoing link, storing the set of connections using that link.
C. Path Redundancy
- There is a tradeoff between the overhead of redundancy and the performance of QoS provision.
- For the most critical connections, the highest level of redundancy is used, also known as 1) First-Level Redundancy.
- Data packets are sent only along the primary path.
- When the primary path is detected broken, the source node selects one from the secondary paths to be the new primary path.
- When becomes less than , the routing algorithm is activated to find more secondary paths.
A. Success Ratio
- Figs. 5–8 compare the success ratios of the three algorithms.
- Each point in the figures is taken by running 5000 independently generated random connection requests.
- The success ratio is a function of both the average delay requirement and the imprecision rate.
- The former is represented by the axis, and the latter is shown by different figures.
- This is because TBP searches multiple paths, and the number of paths searched is adjusted according to how difficult it will be to find a feasible path.
B. Message Overhead
- 11–14 compare the average message overhead of the three algorithms.
- The flooding algorithm has a prohibitively high message overhead.
- TBP has a modest overhead that is higher than that of SP but much lower than that of the flooding algorithm.
- The message overhead of TBP increases as the imprecision rate increases.
C. Average Path Cost
- Figs. 15–18 compare the average path cost of the three algorithms.
- Recall that the green tickets are designed to find the low-cost feasible paths.
- There is one exception in Fig. 18, that the average path cost of TBP is higher than that of SP when is relatively low.
- That can be explained as follows: TBP has a much higher success ratio than SP when the imprecision rate is 50%.
- They also tend to have higher cost, which brings the average path cost up.
D. Mobility Test
- The goal of this test is to evaluate how the node mobility affects the QoS provision.
- Fig. 21 shows the QoS ratio with respect to the mobility ratio.
- Most of these algorithms use flooding to discover routing paths.
- Hence, TBP needs to address the imprecise state problem, which is important for QoS routing, while the previous work does not have this problem.
- 18 Such a routing approach works well for best-effort traffic, but is not sufficient for QoS traffic.
Did you find this useful? Give us your feedback
Citations
3,656 citations
Cites background from "Distributed quality-of-service rout..."
...Some techniques explicitly schedule transmission slots in time or frequency division MAC layers to provide bandwidth guarantees [7, 13, 21, 23, 34], while others treat the MAC as opaque, and rely upon it for bandwidth and delay information and constraints [6, 30, 31]....
[...]
863 citations
Cites background from "Distributed quality-of-service rout..."
...ROUTING PROTOCOL The proposed routing protocol is designed with two important goals: . localized packet routing decision without global network state update or a priori path setup, and . providing differentiated QoS options in timeliness and reliability domains....
[...]
...WIRELESS sensor networks can be used for manymission-critical applications such as target tracking in battlefields and emergency response....
[...]
757 citations
Cites methods from "Distributed quality-of-service rout..."
...All nonlocalized routing algorithms proposed in literature are variations of shortest weighted path algorithm (e.g., [ 5 ], [19], [22], [26])....
[...]
564 citations
Cites background from "Distributed quality-of-service rout..."
...Keywords: Ad hoc; QoS; Routing; Admission control; Bandwidth reservation...
[...]
References
42,654 citations
40,020 citations
8,614 citations
8,256 citations
"Distributed quality-of-service rout..." refers background in this paper
...…networks: the destination-sequenced distance vector (DSDV) protocol [1], the wireless routing protocol [2], Gafni–Bertsekas algorithms [3], the lightweight mobile routing protocol [4], the temporally-ordered routing algorithms [5], the dynamic source routing protocol [6], the associativity-based…...
[...]
...A path that satisfies the delay (or bandwidth) constraint is called a feasible path....
[...]
6,877 citations