scispace - formally typeset
Search or ask a question
Proceedings ArticleDOI

Efficient Opportunistic Multicast via Tree Backbone for Wireless Mesh Networks

Guokai Zeng1, Pei Huang1, Matt W. Mutka1, Li Xiao1, Eric Torng1 
17 Oct 2011-pp 600-609
TL;DR: This paper proposes a new opportunistic multicast protocol to improve multicast throughput in Wireless Mesh Networks (WMN) by devising a Euclidean tree backbone as well as an efficient rate selection scheme to minimize the number of transmissions.
Abstract: In this paper, we propose a new opportunistic multicast protocol to improve multicast throughput in Wireless Mesh Networks (WMN). It builds upon opportunistic routing (OR) strategies that have been designed to improve unicast throughput in wireless networks. The key concept in our multicast protocol is a tree backbone. Our tree backbone protocol represents a tradeoff between traditional structured multicast protocols where a complete multicast tree is constructed and unstructured protocols where multicast is treated as a collection of unicasts. Tree backbone selects multiple nodes as intermediate nodes. Each pair of upstream and downstream nodes may be multiple hops away, and packet delivery between them takes advantage of OR. For single-rate WMNs, we show that constructing an efficient tree backbone that minimizes the number of transmissions is NP-hard, and we devise one effective heuristic algorithm for it. For multi-rate WMNs, we investigate the inherent rate-distance tradeoff and propose a Euclidean opportunistic multicast protocol by devising a Euclidean tree backbone as well as an efficient rate selection scheme to minimize the number of transmissions. In our simulations, our tree backbone multicast protocols outperform both the completely structured traditional multicast protocols and the completely unstructured unicast-based protocols augmented with OR in both throughput and delay.

Summary (4 min read)

Introduction

  • For single-rate WMNs, the authors show that constructing an efficient tree backbone that minimizes the number of transmissions is NP-hard, and they devise one effective heuristic algorithm for it.
  • The increase of the number of transmissions not only consumes more bandwidth resource, but also leads to more local interference among nearby transmissions, which may result in lower throughput.
  • The authors have to reduce the number of transmissions when they exploit opportunistic routing for multicast, which helps to improve the system throughput.
  • The “adjacent” backbone nodes may be multi-hop away in the network.
  • Section III proposes the opportunistic multicast protocol in single-rate WMNs.

A. System Model

  • WMNs consist of three types of nodes: gateways, mesh routers, and mesh clients.
  • Mesh clients are the end users of a mesh network.
  • The authors only study how to multicast packets to a group of mesh routers; then packets will be forwarded one more hop to the corresponding mesh clients that desire to receive the packets.
  • Individual WMN links may have different qualities for a variety of reasons, thus the authors use the weight on each edge to denote the packet delivery ratio.
  • The authors assume that each node has the same fixed communication range under the same rate.

B. Basic of Opportunistic Routing

  • This set Fi j is carefully selected to minimize the number of forwarding nodes while maximizing the throughput improvement.
  • Its forwarding candidates continue the forwarding based on their relay priority.
  • That is, higher priority forwarding nodes are given the first chance to forward packets.
  • When receiving packets, each forwarding node also determines if the newly received packet it receives should be forwarded, either by explicit coordination or by exploiting network coding properties.
  • The above process repeats until the destination informs the source that enough packets have been received.

C. Motivation

  • Traditional multicast protocols discover the least cost or highest throughput paths to the destinations.
  • Building a shared tree is a common way in traditional multicast protocols, where transmissions to different destinations may share some hops in the tree to minimize the bandwidth cost.
  • A natural multicast extension from OR is briefly introduced in [9], which requires the packet self route to all the destinations by OR.
  • Fig. 1(a) shows a case of natural extension, which requires totally 10 hops.
  • If the authors allow the transmissions to distinct destinations share some hops, it can decrease the total number of transmissions.

III. OPPORTUNISTIC MULTICAST IN SINGLE-RATE

  • The authors first introduce the definition of tree backbone (TB), and explain the basic idea of their Opportunistic Multicast (OM) protocol.
  • In order to save bandwidth and decrease interference, the tree backbone should minimize the number of transmissions along it.
  • Afterwards, the authors present one heuristic algorithm to construct an efficient TB.

A. Basic Idea

  • Opportunistic multicast builds the tree backbone instead of a multicast tree, which both allows the spatial opportunities given by OR and minimizes the number of transmissions by letting packets transmitted to different destinations share some hops.
  • After the packet arrives at one tree backbone node, say t, it continues routing to t’s downstream backbone node, until it reaches the destination.
  • Note that, since routing from the upstream node to the downstream node uses OR, different packets may travel along different paths.
  • A good metric to evaluate the effectiveness of a TB is the expected number of transmissions for one packet to reach all the destinations through the TB.
  • The authors prove that computing an MTB is NP-hard by proving its corresponding decision problem, TB-D defined below, is NP-hard.

B. NP-Hardness Proof

  • Furthermore, the authors compute the total expected number of transmissions.
  • Zuv, which denotes the total expected number of transmissions occurring in the network for one packet transmitted from u to v by OR.
  • The decision problem TB-D is NP-hard, so the optimization problem of computing an MTB is also NP-hard.

IV. EUCLIDEAN OPPORTUNISTIC MULTICAST IN MULTI-RATE WMNS

  • On one side, a higher data rate can be used to increase throughput, but it also has shorter transmission range and hence more hops to reach the destination.
  • Besides, there are few spatial opportunities due to the low neighbor diversity in one hop.
  • On the other side, lower data rate often has a longer transmission range and hence less hops in the selected path.
  • The higher neighbor diversity brings more spatial opportunities, but the low rate disadvantage may counteract the above benefit.
  • The inherent tradeoff between rate and distance is hereby worthy of a careful study.

A. Design Consideration

  • Fi,d is the forwarding candidate set of ni, and the node order in Fi,d is based on the relay priority.
  • When a node selects a rate, it should consider the expected bit advancement per second toward each destination, not just a specific one.
  • This naive metric is not suitable for opportunistic multicast.
  • On the other hand, the authors also need to propose a new tree backbone construction for multi-rate WMNs.

B. Euclidean Tree Backbone and Rate Selection

  • The authors assume that a longer geometric distance requires more transmissions to reach the destination.
  • This assumption is straightforward, but it does not apply to any case, since the number of transmissions depends on both the network topology and the link quality.
  • At each iteration, the geometrically nearest destination is added to the partially constructed tree with a corresponding edge.
  • Different packets received may aim to different next downstream backbone nodes, thus the forwarder needs to consider all those downstream backbone nodes, which are defined as the targets of the forwarder.
  • For each rate R j, the authors calculate the largest I-MEAR based on Eq. 7, and then they select the best rate that yields the largest I-MEAR.

V. SIMULATIONS

  • The authors evaluate their opportunistic multicast algorithms by comparing them with the natural multicast extension of OR [9] and a traditional multicast algorithm through the following metrics.
  • The average number of packets each destination receives during a time unit, also known as Throughput.
  • We can see that building an efficient tree backbone can improve the throughput, since it not only takes advantage of spatial diversity, but also minimizes the number of transmissions.the authors.the authors.
  • This is because it does not take any spatial opportunities.
  • The authors do not simulate the tree-based algorithm any more in the following subsections.

B. Delay Comparison

  • The authors evaluate the delay of ST-B and the natural extension by comparing the average time each packet takes to reach the destination.
  • The authors efficient tree backbone is able to minimize the number of transmissions as well as interference, which greatly speeds up the packet delivery.
  • In addition, when the number of receivers increases, the multicast structure becomes bigger, thus the delay of all algorithms increases due to the increasing number of transmissions.
  • It indicates that 18 Mbps has a short transmission range that greatly deceases the spatial opportunities.

A. Multicast Routing in Wireless Multi-hop Networks

  • Multicast protocols in multi-hop wireless networks can be categorized into three groups: (i) tree-based, (ii) mesh-based, and (iii) stateless protocols.
  • Tree-based protocols build an efficient multicast tree, and the packets are forwarded from the source to the destinations along tree paths [17]–[22].
  • At the same time, mesh-based protocols build multiple trees among the group members [23]–[25], such that the packets are delivered to each destination along multiple paths.
  • Compared with the first two groups of protocols, the authors do not build a complete tree or mesh.
  • Compared with stateless protocols, the backbone the authors propose is able to minimize transmissions and decrease the overhead resulting from the destination list in the packet header.

B. Opportunistic Routing

  • In recent years, opportunistic routing has become an interesting topic that improves the throughput and the transmission reliability in the face of unreliable wireless links [7].
  • Some variants of opportunistic routing are proposed to improve throughput under different situations.
  • The authors in [30] extend OR to enables devices with only one interface to operate on multiple channels, which reduces interference.
  • The forwarding candidate set and relay priority are defined based on the nodes’ geographic information [31]–[33].
  • In the ad hoc context, there are relevant works to consider, which takes advantage of diversity offered by multiple users [34].

C. Multi-rate Routing

  • One of current wireless technical trends is that modern wireless devices are able to utilize multiple transmission rates to accommodate a wide range of conditions.
  • In [10] [12], the authors study the impact of routing metrics on path capacity, investigate the impacts of several factors on the carrier sensing threshold in the multi-rate wireless networks, and propose the bandwidth distance product as a routing metric to improve throughput.
  • In order to utilize multiple channels in multi-rate networks, the Data Rate Adaptive Channel Assignment algorithm is proposed in [37], which assigns links having the same data rates on the same channel to minimize the wastage of channel resources.
  • None of the above work considers the multicast application in multi-rate networks.
  • The authors work is different from previous approaches in two aspects: (i) the authors build a backbone structure for multicast routing, and (ii) they assign rates to nodes based on the location of the nearby backbone nodes.

VII. CONCLUSION

  • The opportunistic multicast protocol in single-rate WMNs is first proposed, where a tree backbone is built to help the packets self route to destinations by OR.
  • An efficient tree backbone should minimize transmissions to increase the throughput.
  • The authors prove that computing a tree backbone with the minimum transmissions is NP-hard, and devise one heuristic algorithm for it.
  • The authors also investigate the inherent ratedistance tradeoff in opportunistic multicast and propose the Euclidean opportunistic multicast protocol in multirate WMNs.
  • Simulations show that their opportunistic multicast can achieve higher throughput and shorter delay than the natural multicast extension of OR and the traditional multicast.

Did you find this useful? Give us your feedback

Content maybe subject to copyright    Report

Efficient Opportunistic Multicast via Tree Backbone for Wireless Mesh
Networks
Guokai Zeng, Pei Huang, Matt Mutka, Li Xiao, Eric Torng
Department of Computer Science and Engineering
Michigan State University
East Lansing, Michigan, USA
Email: {zengguok, huangpe3, mutka, lxiao, torng}@cse.msu.edu
Abstract—In this paper, we propose a new opportunistic
multicast protocol to improve multicast throughput in
Wireless Mesh Networks (WMN). It builds upon oppor-
tunistic routing (OR) strategies that have been designed to
improve unicast throughput in wireless networks. The key
concept in our multicast protocol is a tree backbone. Our
tree backbone protocol represents a tradeoff between tra-
ditional structured multicast protocols where a complete
multicast tree is constructed and unstructured protocols
where multicast is treated as a collection of unicasts. Tree
backbone selects multiple nodes as intermediate nodes.
Each pair of upstream and downstream nodes may be
multiple hops away, and packet delivery between them
takes advantage of OR.
For single-rate WMNs, we s how that constructing an
efficient tree backbone that minimizes the number of
transmissions is NP-hard, and we devise one effective
heuristic algorithm for it. For multi-rate WMNs, we
investigate the inherent rate-distance tradeoff and propose
a Euclidean opportunistic multicast protocol by devising
a Euclidean tree backbone as well as an efficient rate
selection scheme to minimize the number of transmis-
sions. In our simulations, our tree backbone multicast
protocols outperform both the completely structured tra-
ditional multicast protocols and the completely unstruc-
tured unicast-based protocols augmented with OR in both
throughput and delay.
Keywords-Wireless Mesh Networks, Multicast, Oppor-
tunistic Routing, Multi-Rate
I. INTRODUCTION
Wireless mesh networks (WMN) have emerged as
an efficient means to expand the wireless reach of
metro-broadband deployments within a community or
within a company [1], [2]. For traditional wireless multi-
hop networks, such as MANETs and sensor networks,
route discovery and energy efficiency are major research
issues. However, these are relatively unimportant in
WMNs due to their static topology and rechargeable
mesh nodes. On the other hand, how to satisfy the
end users is paramount in WMNs, which usually aims
to maximize the system throughput under given band-
width [3]–[5].
Multicast communication is a critical component of
WMNs [6]. Many current or future services in WMNs
are bandwidth-sensitive and strongly based on many-
to-many interaction, such as Video on Demand. They
require efficient underlying multicast mechanisms when
throughput and delay are the critical concerns and
bandwidth may become a scarce resource.
Most traditional multicast protocols for wireless
multihop networks discover the least cost or highest
throughput paths to reach the destinations. Compared
with their wired counterparts, they build efficient mul-
ticast structures based on the wireless communication
facts: (i) the local broadcast enables multiple neighbors
to receive the packet, (ii) the packet loss ratios cannot be
ignored, and (iii) the packet delivery ratios are not the
same on different links. Thus, they usually choose one
or multiple next-hop destinations for each relay node,
and the links between selected one-hop neighbors have
good quality in the multicast structure.
However, these protocols do not fully take advantage
of the spatial characteristics of wireless communication.
It is unpredicted that which neighbors can receive the
packet in the current transmission. That is, when a
packet is transmitted, it is possible that some neighbor-
ing nodes receive the packet while the designated next-
hop destination does not. Therefore, some research work
[7], [8] has demonstrated that utilizing the cooperative
diversity to send packets through multiple relay nodes
concurrently can further improve the system throughput,
including the multicast throughput [9], which is known
as opportunistic routing (OR).
In opportunistic routing, any node that overhears the
packet transmission is encouraged to forward the packet
if it is closer to the destination. More concurrent relay
nodes give each transmission more chance to make
progress. The multicast extension of OR is discussed in
[9], but it does not build any efficient multicast structure
that is able to reduce the packet transmission. As we
know, OR brings an increase of the number of transmis-

sions because more neighbors participate in forwarding
the packets. The increase of the number of transmis-
sions not only consumes more bandwidth resource, but
also leads to more local interference among nearby
transmissions, which may result in lower throughput.
However, increasing throughput is paramount for mul-
ticast communication in wireless mesh networks. We
have to reduce the number of transmissions when we
exploit opportunistic routing for multicast, which helps
to improve the system throughput. On the contrary, tra-
ditional multicast protocols design the efficient multicast
structure that reduces packet transmissions, but they
lack of the spatial reuse of wireless communication that
also contributes to increasing throughput.
In order to achieve higher multicast throughput, we
propose the opportunistic multicast protocol by adopting
the OR strategy with an efficient multicast structure.
In this protocol, to utilize the spatial diversity, the key
step is to design a multicast tree backbone that is
different from a traditional multicast tree. Tree back-
bone specifies the packet transmission direction instead
of designating the exact next-hop destinations for the
relay nodes. The “adjacent” backbone nodes may be
multi-hop away in the network. An efficient backbone
structure must minimize the number of transmissions.
In this paper, we prove that computing a backbone
that minimizes the expected number of transmission is
NP-hard, and we devise one heuristic algorithm that
appears to work well for building an efficient backbone
in single-rate WMNs. Based on the tree backbone,
packets then self route from the upstream backbone
node to the downstream backbone nodes by OR until
they arrive at the destinations. Therefore, our protocol
not only takes advantage of spatial diversity of wireless
communication by utilizing OR, but also reduces the un-
necessary packet transmissions by building an efficient
tree backbone.
The recent trend in wireless communication is to en-
able devices with multiple transmission rates [10]–[12].
Generally speaking, low-rate communication provides
a long transmission range, while high-rate has to occur
at a short scope. The variance of transmission range
implies the variance of the neighboring node set, which
leads to different spatial opportunities. The inherent
rate-distance tradeoff for opportunistic unicast routing
has had impact on performance [11]. It is intuitive
to expect that this trade-off also affects opportunistic
multicast. In this paper, we investigate this t rade-off
and further propose a Euclidean opportunistic multicast
protocol by devising a Euclidean backbone structure
as well as an efficient rate selection scheme, which
minimizes the number of transmissions for multi-rate
WMNs .
The rest of this paper is organized as follows. Section
II describes the background and the motivation. Sec-
tion III proposes the opportunistic multicast protocol
in single-rate WMNs. We apply the basic idea of
opportunistic multicast to multi-rate WMNs in Section
IV. Section V presents simulation results. Section VI
surveys the related work, and the last section concludes
this paper.
II. B
ACKGROUND AND MOTIVATION
We start from the underlying network model by
introducing some terminology and the basic idea of op-
portunistic routing, which is followed by the motivation.
A. System Model
WMNs consist of three types of nodes: gateways,
mesh routers, and mesh clients. Gateways (access
points) connect mesh networks with the Internet. Mesh
routers form the backbone of a WMN. They typically
have minimal mobility, but they are often equipped
with a powerful ability to improve the flexibility and
capacity of WMNs. Mesh clients are the end users of a
mesh network. They are located within one-hop of mesh
routers so that they can access the Internet through the
mesh backbone. However, mesh clients usually do not
participate in transmitting data for other end users. In
this paper, we only study how to multicast packets to a
group of mesh routers; then packets will be forwarded
one more hop to the corresponding mesh clients that
desire to receive the packets.
To simplify the system model, we consider the net-
work as a weighted graph G =(V, E) with function
w, where V represents the set of gateways and mesh
routers, and E represents the physical links among
neighboring nodes (the node refers to the mesh router or
the gateway in this paper). Individual WMN links may
have different qualities for a variety of reasons, thus
we use the weight on each edge to denote the packet
delivery ratio. Since we only consider multicast among
the mesh routes that are usually fixed, the network
topology is considered as static.
Each node n
i
(1 i ≤∣V ) can transmit a packet at K
different rates R
1
, R
2
, ...R
K
. We assume that each node
has the same fixed communication range under the same
rate. That is, if nodes u and v use the same rate, and
if u can transmit packets directly to node v (and vice
versa), there is a link (u, v) in E. In this paper, we first
consider the multicast issues in single-rate WMNs, then
we apply our idea to multi-rate WMNs.
2

s
d
1
d
2
(a) Natural Extension
s
d
1
d
2
a
(b) Efficient Multicast Path
Figure 1. Motivation Example
B. Basic of Opportunistic Routing
There are different variations of OR. In the follow-
ing, we describe the basic details common to all OR
schemes.
A crucial component of OR is a forwarding set F
ij
for sending a message from node n
i
to node n
j
.This
set F
ij
is carefully selected to minimize the number
of forwarding nodes while maximizing the throughput
improvement. Furthermore, F
ij
is an ordered set where
typically nodes that are closer to destination node n
j
have higher priority. In this paper, we define closeness
to n
j
as the number of transmissions to move a packet
along the best traditional route to n
j
[7], [9], [13].
OR begins with the sender n
i
broadcasting a batch of
packets. Its forwarding candidates continue the f orward-
ing based on their relay priority. That is, higher priority
forwarding nodes are given the first chance to forward
packets. When receiving packets, each forwarding node
also determines if the newly received packet it receives
should be forwarded, either by explicit coordination
or by exploiting network coding properties. The above
process repeats until the destination informs the source
that enough packets have been received.
C. Motivation
Traditional multicast protocols discover the least cost
or highest throughput paths to the destinations. This
strategy is effective in wired networks, but not efficient
in wireless networks, since it does not exploit the
spatial characteristic of wireless communication. For
example, building a shared tree is a common way in
traditional multicast protocols, where transmissions to
different destinations may share some hops in the tree to
minimize the bandwidth cost. However, the shared tree
designates the next-hop destination for each relay node.
As a consequence, there are no spatial opportunities for
each transmission. We can safely conclude that the exact
shared tree is not suitable for opportunistic multicast.
However, if we utilize OR to realize the multicast ap-
plication without any structure, we have to face another
drawback. For instance, a natural multicast extension
from OR is briefly introduced in [9], which requires
the packet self route to all the destinations by OR.
Although utilizing the spatial diversities, this extension
also brings unnecessary transmissions and results in
more interference.
There is an example in Fig. 1, where s is the source,
and nodes d
1
and d
2
are destinations. Under the natural
extension, to deliver a packet, two copies may travel
along different paths to d
1
and d
2
byOR.Fig.1(a)
shows a case of natural extension, which requires totally
10 hops. However, if we allow the transmissions to
distinct destinations share some hops, it can decrease
the total number of transmissions. For example, the
packet is first desired to self route to node a, then
it is split into two copies that would be forwarded
to the two destinations by OR respectively. Fig. 1(b)
shows one case (solid line) of this improvement strategy,
which only needs 7 hops. Thus, we need to devise an
efficient opportunistic multicast protocol that achieves
high throughput by building an efficient backbone to
reduce transmissions.
III. O
PPORTUNISTIC MULTICAST IN SINGLE-RATE
WMNS
In this section, we first introduce the definition of
tree backbone (TB), and explain the basic idea of
our Opportunistic Multicast (OM) protocol. In order
to save bandwidth and decrease interference, the tree
backbone should minimize the number of transmissions
along it. We then prove that computing a TB with the
minimum transmissions in single-rate WMNs is NP-
hard. Afterwards, we present one heuristic algorithm to
construct an efficient TB.
3

A. Basic Idea
Opportunistic multicast builds the tree backbone in-
stead of a multicast tree, which both allows the spatial
opportunities given by OR and minimizes the number of
transmissions by letting packets transmitted to different
destinations share some hops.
Definition 1: Including a source s and a set of desti-
nations D V (G), a set of nodes T V (G) is selected
to be the backbone of multicast structure. The nodes in
T are called tree backbone nodes.
Definition 2: Among tree backbone nodes, if we des-
ignate that packets need to be delivered from backbone
node a to backbone node b by OR, we say that there
is a direction a b. Node a is called the upstream
backbone node of b, and b is called the downstream
backbone node of a.
The tree backbone nodes and direction not only
illustrate the packet’s intermediate destinations, but also
indicate the packet forwarding direction. How to select
tree backbone nodes and decide direction is explained
in the following subsections, which helps to minimize
the number of total transmissions in the network.
Definition 3: In graph G, given a source node s,a
set of destinations D, a set of tree backbone nodes
T , and a set of directions R, the multicast backbone
TB(s, D, T, R) is called tree backbone.
The tree backbone indicates the multicast structure
for a specified multicast session (source s, and des-
tination set D). The packet forwarding is determined
by the tree backbone nodes and direction. That is,
after the tree backbone (TB) is built, starting from
the source node, the packets self route to the source’s
downstream backbone nodes by opportunistic routing.
After the packet arrives at one tree backbone node, say
t, it continues routing to ts downstream backbone node,
until it reaches the destination. At each tree backbone
node, if the backbone node has multiple downstream
backbone nodes, the packet is split into multiple copies
and routed to the corresponding downstream backbone
nodes with different random paths by OR.
For example, in Fig. 1, T = {s
, a, d
1
, d
2
} and R =
{s a, a d
1
, a d
2
}. So, the packets are desired
to be delivered from s to a, then from a to d
1
and d
2
respectively. Node a is the downstream backbone node
of s, while d
1
and d
2
are the downstream backbone
nodes of a. Note that, since routing from the upstream
node to the downstream node uses OR, different packets
may travel along different paths. For instance, from s to
a, the first packet may route along the solid line, while
the second packet may route along the dotted line.
A good metric to evaluate the effectiveness of a
TB is the expected number of transmissions for one
packet to reach all the destinations through the TB.
This is because the less transmissions means less band-
width cost and less interference, which results in higher
throughput and smaller delay. For short, we call this
metric the cost weight of TB. In order to improve mul-
ticast performance, we need to compute a TB with the
minimum cost weight. We refer to this as a Minimum
Tree Backbone or MTB. We prove that computing an
MTB is NP-hard by proving its corresponding decision
problem, TB-D defined below, is NP-hard.
INSTANCE: A weighted graph G =(V, E), a weight
function w on E, a source node s V , a subset D V ,
and a positive number K.
QUESTION: Is there a TB(s, D, T, R)fors and D of
cost weight K?
B. NP-Hardness Proof
Lemma 1: TB-D is NP-hard
First, we explain how to calculate the expected num-
ber of transmissions Z
sd
for one packet to be transmitted
from source s to destination d in opportunistic routing.
For any two nodes i and j,leti < j represent that i is
“closer” to d than j, that is, i has smaller ETX [13] to
d than j.Letε
ij
denote the packet loss ratio from i to
j .Letz
sd
j
be the expected number of transmissions that
forwarder j must take to route one packet from s to d.
The expected number of packets that j must forward,
denoted by L
sd
j
,is[9]
L
sd
j
=
i> j
(z
sd
i
(1 ε
ij
)
k< j
ε
ik
) (1)
Note that L
sd
s
is 1 since source s generates the packet.
From Eq. 1, the authors in [9] deduce that the expected
number of transmissions that j must make is:
z
sd
j
=
L
sd
j
1
k< j
ε
jk
(2)
Suppose there are N nodes in the network. The calcu-
lation of z
sd
j
can be achieved in O(N
2
) [9]. Furthermore,
we compute the total expected number of transmissions
Z
sd
in the network by summing up all the nodes’
expected number of transmissions, that is,
Z
sd
=
jV(G)
z
sd
j
(3)
Second, based on the above result, given a
TB(s, D, T, R), for any direction i j R, the expected
4

a
s
d
1
d
2
Figure 2. ST-B Example
number of transmissions for delivering a packet from i
to j is Z
ij
. Hence the cost weight of the TB is:
λ
s
D
=
i jR
Z
ij
(4)
Third, we construct a complete graph G
c
with a
weight function w, where V (G
c
)=V (G). For any edge
(u, v) on G
c
, the weight w(u, v)=Z
uv
, which denotes the
total expected number of transmissions occurring in the
network for one packet transmitted from u to v by OR.
It takes O(N
2
) operations to calculate z
sd
j
for each node
j , thus it takes O(N
3
) operations to compute Z
sd
, and
O(N
5
) to get graph G
c
. Graph G
c
is constructed at the
beginning of network, and it will not change as long as
the network topology does not change, thus computing
G
c
is a one-time activity regardless how many multicast
sessions are generated in the network.
For a given TB, we can find a corresponding Steiner
tree S on G
c
, where V (S)=T . An edge (u, v) appears
on S if and only if there is a direction u v in R.The
cost weight of the TB is equal to the weight sum of
S. It i s well known that computing a Steiner tree with
weight sum K in a weighted graph is NP-hard [14], thus
TB-D is also NP-hard.
Corollary 1: Computing an MTB is NP-hard
Proof: The decision problem TB-D is NP-hard, so
the optimization problem of computing an MTB is also
NP-hard.
C. Heuristic Algorithm
We propose one Steiner tree-based heuristic algo-
rithms for MTB. For short, we call it ST-B. For this
algorithm, we suppose t hat the above complete graph
G
c
is constructed at the beginning of the network.
In this algorithm, under the well-known Takahashi-
Matsuyama (T-M) heuristic [15], a Steiner tree S is built
by an incremental approach to span over source s and
destination set D in G
c
. Initially, the tree contains only
s. At each iteration, the nearest unconnected destination
to the partially constructed tree S is found and the least-
cost path between them is added to the tree. Here, the
least-cost path P(u, v) refers to a path that connects u
and v, and the weight sum on P(u, v) is the smallest
among all paths between u and v.
During constructing S, we can get the backbone nodes
of the corresponding TB as follows:
1) Initially, T = {s}∪D.
2) At each iteration, when a least-cost path P(u, v)
is added to S, T = T ∪{u}∪{v}.
After the backbone nodes are determined, the set of
directions for TB is also discovered by this rule: for any
two nodes u, v T , if there is not any other backbone
node on path P(u, v) in S, and u is on path P(s, v) in S,
there is a direction u v R.
We use a simple example to illustrate the process.
There is a complete graph G
c
in Fig. 2 (For ease of
reading, we do not draw the edges on G
c
), where s is the
source and d
1
, d
2
are destinations. Initially, s is included
in the t ree. Next, since d
1
is “closer” to s, the least-cost
path (s, a, d
1
) is added to the tree. Afterwards, since a
is the closest tree node to d
2
, the least-cost path (a, d
2
)
is added. Based on the Steiner tree, we can build the
tree backbone TB with T = {s, a, d
1
, d
2
} and R = {s
a, a d
1
, a d
2
}
The time complexity of T-M heuristic is O(N
2
), and
searching for R also takes O(N
2
) operations. Therefore,
the time complexity of ST-B is O(N
2
).
IV. E
UCLIDEAN OPPORTUNISTIC MULTICAST IN
MULTI-RATE WMNS
Multi-rate capacity is a common feature of wireless
communication. On one side, a higher data rate can
be used to increase throughput, but it also has shorter
transmission range and hence more hops to reach the
destination. Besides, there are few spatial opportunities
due to the low neighbor diversity in one hop. On the
other side, lower data rate often has a longer transmis-
sion range and hence less hops in the selected path. The
higher neighbor diversity brings more spatial opportu-
nities, but the low rate disadvantage may counteract the
above benefit. The inherent tradeoff between rate and
distance is hereby worthy of a careful study.
A. Design Consideration
A local metric, called Expected Advancement Rate
(EAR) [11], has been proposed to find the best rate for
each node:
5

Citations
More filters
Journal ArticleDOI
TL;DR: This paper provides a taxonomy for opportunistic routing proposals, based on their routing objectives as well as the optimization tools and approaches used in the routing design, and identifies and discusses the main future research directions related to the opportunistic routed design, optimization, and deployment.
Abstract: The great advances made in the wireless technology have enabled the deployment of wireless communication networks in some of the harshest environments such as volcanoes, hurricane-affected regions, and underground mines. In such challenging environments suffering from the lack of infrastructure, traditional routing is not efficient and sometimes not even feasible. Moreover, the exponential growth of the number of wireless connected devices has created the need for a new routing paradigm that could benefit from the potentials offered by these heterogeneous wireless devices. Hence, in order to overcome the traditional routing limitations, and to increase the capacity of current dynamic heterogeneous wireless networks, the opportunistic routing paradigm has been proposed and developed in recent research works. Motivated by the great interest that has been attributed to this new paradigm within the last decade, we provide a comprehensive survey of the existing literature related to opportunistic routing. We first study the main design building blocks of opportunistic routing. Then, we provide a taxonomy for opportunistic routing proposals, based on their routing objectives as well as the optimization tools and approaches used in the routing design. Hence, five opportunistic routing classes are defined and studied in this paper, namely, geographic opportunistic routing, link-state-aware opportunistic routing, probabilistic opportunistic routing, optimization-based opportunistic routing, and cross-layer opportunistic routing. We also review the main protocols proposed in the literature for each class. Finally, we identify and discuss the main future research directions related to the opportunistic routing design, optimization, and deployment.

229 citations


Cites background or methods from "Efficient Opportunistic Multicast v..."

  • ...Among these works, only do OMT [122] and Pacifier [124] consider cross layer opportunistic multicast routing design by integrating rate control and intra-flow network coding respectively....

    [...]

  • ...So far, only few works [122]–[124] have been proposed in this area....

    [...]

  • ...For instance, the Euclidean backbone tree is used in [122], and the minimum Steiner tree is used in [123]....

    [...]

Journal ArticleDOI
TL;DR: A planned opportunistic routing scheme that aims to determine the optimal single-copy multipath (SCMP) transmission strategy that satisfies the delay requirement and, at the same time, minimizes communication cost is developed.
Abstract: In this paper, we study the problem of delay-constrained data transmission in mobile opportunistic device-to-device networks. In contrast to the deterministic or greedy single-copy single-path (SCSP) and multicopy multipath (MCMP) routing schemes that have been discussed in the literature, we develop a planned opportunistic routing scheme that aims to determine the optimal single-copy multipath (SCMP) transmission strategy that satisfies the delay requirement and, at the same time, minimizes communication cost. We first address the unicast by formulating the optimization problem and developing a distributed routing algorithm under practical network settings. Then, we explore optimal multicast strategies based on the SCMP transmissions. We implement the proposed algorithms on Android tablets and carry out extensive experiments, each with 25 nodes, for a period of two weeks. Moreover, we extract the algorithm codes from our prototype and run simulations based on the Haggle trace to study performance trends under various network settings. The experimental and simulation results show that the proposed protocols achieve significant performance gain in comparison with their counterparts based on SCSP and MCMP transmissions.

19 citations


Cites background from "Efficient Opportunistic Multicast v..."

  • ...[41], and the other approach is based on Centrality [39]....

    [...]

  • ...They employ either SCSP [39]–[41] or MCMP [20], [21] transmissions and, thus, share similar drawbacks as previously discussed for unicast....

    [...]

Posted Content
TL;DR: A new framework for OR metric design is devised, starting with a custom tutorial with a new look to OR and OR metrics, and a new insightful framework for future research directions is developed.
Abstract: High-speed, low latency, and heterogeneity features of 5G, as the common denominator of many emerging and classic wireless applications, have put wireless technology back in the spotlight. Continuous connectivity requirement in low-power and wide-reach networks underlines the need for more efficient routing over scarce wireless resources, in multi-hp scenarios. In this regard, Opportunistic Routing (OR), which utilizes the broadcast nature of wireless media to provide transmission cooperation amongst a selected number of overhearing nodes, has become more promising than ever. Crucial to the overall network performance, which nodes to participate and where they stand on the transmission-priority hierarchy, are decided by user-defined OR metrics embedded in OR protocols. Therefore, the task of choosing or designing an appropriate OR metric is a critical one. The numerousness, proprietary notations, and the objective variousness of OR metrics can cause the interested researcher to lose insight and become overwhelmed, making the metric selection or design effort-intensive. While there are not any comprehensive OR metrics surveys in the literature, those who partially address the subject are non-exhaustive and lacking in detail. Furthermore, they offer limited insight regarding related taxonomy and future research recommendations. In this paper, starting with a custom tutorial with a new look to OR and OR metrics, we devise a new framework for OR metric design. Introducing a new taxonomy enables us to take a structured, investigative, and comparative approach to OR metrics, supported by extensive simulations. Exhaustive coverage of OR metrics, formulated in a unified notation, is presented with sufficient details. Self-explanatory, easy-to-grasp, and visual-friendly quick references are provided, which can be used independently from the rest of the paper.

4 citations


Cites background or methods from "Efficient Opportunistic Multicast v..."

  • ...The MEAR of node i with respect to all multicast destinations set DST is defined as: MEAR(i,DST ) = max rhi ∑ h∈DST EAR(i,F hi ) ....

    [...]

  • ...● Multicast Expected Advancement Rate (MEAR), I-MEAR: MEAR [158] is a naive extension of the EAR metric to multicast applications....

    [...]

  • ...● EPA/EOT/EAR/EDRb/DDR/MEAR/OEE/DUER/ FE/espeed: Distance proximity might not always be an appropriate packet advancement criterion since a geographically closer-to-destination node might have no forwarding path....

    [...]

  • ...MEAR [158] is a naive extension of the EAR metric to multicast applications....

    [...]

  • ...networks employing this feature include WMNs [117]– [119], [132], [158]....

    [...]

Journal ArticleDOI
26 Oct 2018-PLOS ONE
TL;DR: A multicriteria adaptive opportunistic treecast routing protocol (MAOTRP), which adapts the route selection mechanism according to active multicastings for efficient multimedia dissemination in VVT, and shows that the proposed dissemination scheme improves QoS and QoE, and reduces the average disconnection time.
Abstract: This paper presents vehicle-to-vehicle telescreen (VVT) and a multicast scheme to disseminate digital signage multimedia services to vehicular ad hoc networks (VANETs). Multimedia dissemination in VANETs is challenging because of the high packet losses (PLs), delays and longer disconnection times, which degrade the network quality of service (QoS) and user quality of experience (QoE). To reduce the PLs and delays, most existing multimedia multicast schemes in VANETs primarily select routes based on longer route expiration times (RET) or lowest path delays. The RET-based schemes suffer less from PLs when there are fewer active multicastings in the network. When the number of active multicastings increases, delay-based schemes suffer less from PLs comparatively. This tradeoff implies to design an adaptive mechanism by mutually complementing the RET-based and delay-based schemes to reduce PLs and delays. In this paper, we propose a multicriteria adaptive opportunistic treecast routing protocol (MAOTRP), which adapts the route selection mechanism according to active multicastings for efficient multimedia dissemination in VVT. The MAOTRP adjusts the weights of route selection parameters, including RET and delays, by considering their contribution in improving packet delivery ratio. MAOTRP extends a tree-based multicast protocol to provide robustness through alternate routes for link failures to reduce PLs. Through several experimental evaluations, we show that the proposed dissemination scheme improves QoS and QoE, and reduces the average disconnection time.

4 citations

Journal ArticleDOI
TL;DR: In this paper, a taxonomy of Opportunistic Routing (OR) metrics is presented, and a new taxonomy for OR metric design is proposed, supported by extensive simulations.

3 citations

References
More filters
Proceedings ArticleDOI
26 Sep 2004
TL;DR: A new metric for routing in multi-radio, multi-hop wireless networks with stationary nodes called Weighted Cumulative ETT (WCETT) significantly outperforms previously-proposed routing metrics by making judicious use of the second radio.
Abstract: We present a new metric for routing in multi-radio, multi-hop wireless networks. We focus on wireless networks with stationary nodes, such as community wireless networks.The goal of the metric is to choose a high-throughput path between a source and a destination. Our metric assigns weights to individual links based on the Expected Transmission Time (ETT) of a packet over the link. The ETT is a function of the loss rate and the bandwidth of the link. The individual link weights are combined into a path metric called Weighted Cumulative ETT (WCETT) that explicitly accounts for the interference among links that use the same channel. The WCETT metric is incorporated into a routing protocol that we call Multi-Radio Link-Quality Source Routing.We studied the performance of our metric by implementing it in a wireless testbed consisting of 23 nodes, each equipped with two 802.11 wireless cards. We find that in a multi-radio environment, our metric significantly outperforms previously-proposed routing metrics by making judicious use of the second radio.

2,633 citations

Journal ArticleDOI
TL;DR: This paper examines the basic building block of cooperative diversity systems, a simple fading relay channel where the source, destination, and relay terminals are each equipped with single antenna transceivers and shows that space-time codes designed for the case of colocated multiantenna channels can be used to realize cooperative diversity provided that appropriate power control is employed.
Abstract: Cooperative diversity is a transmission technique, where multiple terminals pool their resources to form a virtual antenna array that realizes spatial diversity gain in a distributed fashion. In this paper, we examine the basic building block of cooperative diversity systems, a simple fading relay channel where the source, destination, and relay terminals are each equipped with single antenna transceivers. We consider three different time-division multiple-access-based cooperative protocols that vary the degree of broadcasting and receive collision. The relay terminal operates in either the amplify-and-forward (AF) or decode-and-forward (DF) modes. For each protocol, we study the ergodic and outage capacity behavior (assuming Gaussian code books) under the AF and DF modes of relaying. We analyze the spatial diversity performance of the various protocols and find that full spatial diversity (second-order in this case) is achieved by certain protocols provided that appropriate power control is employed. Our analysis unifies previous results reported in the literature and establishes the superiority (both from a capacity, as well as a diversity point-of-view) of a new protocol proposed in this paper. The second part of the paper is devoted to (distributed) space-time code design for fading relay channels operating in the AF mode. We show that the corresponding code design criteria consist of the traditional rank and determinant criteria for the case of colocated antennas, as well as appropriate power control rules. Consequently space-time codes designed for the case of colocated multiantenna channels can be used to realize cooperative diversity provided that appropriate power control is employed.

2,032 citations


"Efficient Opportunistic Multicast v..." refers background in this paper

  • ...Compared with their wired counterparts, they build efficient multicast structures based on the wireless communication facts: (i) the local broadcast enables multiple neighbors to receive the packet, (ii) the packet loss ratios cannot be ignored, and (iii) the packet delivery ratios are not the same…...

    [...]

Proceedings ArticleDOI
22 Aug 2005
TL;DR: ExOR chooses each hop of a packet's route after the transmission for that hop, so that the choice can reflect which intermediate nodes actually received the transmission, which gives each transmission multiple opportunities to make progress.
Abstract: This paper describes ExOR,an integrated routing and MAC protocol that increases the throughput of large unicast transfers in multi-hop wireless networks. ExOR chooses each hop of a packet's route after the transmission for that hop, so that the choice can reflect which intermediate nodes actually received the transmission. This deferred choice gives each transmission multiple opportunities to make progress. As a result ExOR can use long radio links with high loss rates, which would be avoided by traditional routing. ExOR increases a connection's throughput while using no more network capacity than traditional routine.ExOR's design faces the following challenges. The nodes that receive each packet must agree on their identities and choose one forwarder.The agreement protocol must have low overhead, but must also be robust enough that it rarely forwards a packet zero times or more than once. Finally, ExOR must choose the forwarder with the lowest remaining cost to the ultimate destination.Measurements of an implementation on a 38-node 802.11b test-bed show that ExOR increases throughput for most node pairs when compared with traditional routing. For pairs between which traditional routing uses one or two hops, ExOR's robust acknowledgments prevent unnecessary retransmissions,increasing throughput by nearly 35%. For more distant pairs, ExOR takes advantage of the choice of forwarders to provide throughput gains of a factor of two to four.

1,575 citations


"Efficient Opportunistic Multicast v..." refers background in this paper

  • ...Compared with their wired counterparts, they build efficient multicast structures based on the wireless communication facts: (i) the local broadcast enables multiple neighbors to receive the packet, (ii) the packet loss ratios cannot be ignored, and (iii) the packet delivery ratios are not the same…...

    [...]

Proceedings ArticleDOI
01 Aug 1999
TL;DR: Ad-hoc On-Demand Distance Vector Routing is extended to offer novel multicast capabilities which follow naturally from the way AODV establishes unicast routes.
Abstract: An ad-hoc network is the cooperative engagement of a collection of (typically wireless) mobile nodes without the required intervention of any centralized access point or existing infrastructure. To provide optimal communication ability, a routing protocol for such a dynamic self-starting network must be capable of unicast, broadcast, and multicast. In this paper we extend Ad-hoc On-Demand Distance Vector Routing (AODV), an algorithm for the operation of such ad-hoc networks, to offer novel multicast capabilities which follow naturally from the way AODV establishes unicast routes. AODV builds multicast trees as needed (i.e., on-demand) to connect multicast group members. Control of the multicast tree is distributed so that there is no single point of failure. AODV provides loop-free routes for both unicast and multicast, even while repairing broken links. We include an evaluation methodology and simulation results to validate the correct and efficient operation of the AODV algorithm.

1,245 citations

Proceedings ArticleDOI
27 Aug 2007
TL;DR: More as mentioned in this paper is a MAC-independent opportunistic routing protocol, which randomly mixes packets before forwarding them to ensure that routers that hear the same transmission do not forward the same packets, thus, it needs no special scheduler to coordinate routers and can run directly on top of 802.11.
Abstract: Opportunistic routing is a recent technique that achieves high throughput in the face of lossy wireless links. The current opportunistic routing protocol, ExOR, ties the MAC with routing, imposing a strict schedule on routers' access to the medium. Although the scheduler delivers opportunistic gains, it misses some of the inherent features of the 802.11 MAC. For example, it prevents spatial reuse and thus may underutilize the wireless medium. It also eliminates the layering abstraction, making the protocol less amenable to extensions to alternate traffic types such as multicast.This paper presents MORE, a MAC-independent opportunistic routing protocol. MORE randomly mixes packets before forwarding them. This randomness ensures that routers that hear the same transmission do not forward the same packets. Thus, MORE needs no special scheduler to coordinate routers and can run directly on top of 802.11. Experimental results from a 20-node wireless testbed show that MORE's median unicast throughput is 22% higher than ExOR, and the gains rise to 45% over ExOR when there is a chance of spatial reuse. For multicast, MORE's gains increase with the number of destinations, and are 35-200% greater than ExOR.

1,198 citations

Frequently Asked Questions (14)
Q1. What are the contributions mentioned in the paper "Efficient opportunistic multicast via tree backbone for wireless mesh networks" ?

In this paper, the authors propose a new opportunistic multicast protocol to improve multicast throughput in Wireless Mesh Networks ( WMN ). For single-rate WMNs, the authors show that constructing an efficient tree backbone that minimizes the number of transmissions is NP-hard, and they devise one effective heuristic algorithm for it. For multi-rate WMNs, the authors investigate the inherent rate-distance tradeoff and propose a Euclidean opportunistic multicast protocol by devising a Euclidean tree backbone as well as an efficient rate selection scheme to minimize the number of transmissions. 

Their efficient tree backbone is able to minimize the number of transmissions as well as interference, which greatly speeds up the packet delivery. 

The routing strategies in [9], [29] aim to combine network coding with opportunistic routing in a natural fashion, so that they can achieve the cooperative spatial diversity. 

The second step is to determine the direction set R. For any edge (u,v) in the Euclidean Steiner tree, if u is added to the tree before v, there is a direction u→ v∈R. 

A good metric to evaluate the effectiveness of a TB is the expected number of transmissions for one packet to reach all the destinations through the TB. 

At each tree backbone node, if the backbone node has multiple downstream backbone nodes, the packet is split into multiple copies and routed to the corresponding downstream backbone nodes with different random paths by OR. 

Previous TB construction is based on the number of transmissions Zsd on each pair of source s and destination d. Calculating Zsd requires the information of link delivery ratios. 

That is, after the tree backbone (TB) is built, starting from the source node, the packets self route to the source’s downstream backbone nodes by opportunistic routing. 

Definition 1: Including a source s and a set of destinations D ⊆V (G), a set of nodes T ⊆V (G) is selected to be the backbone of multicast structure. 

In this paper, the authors define closeness to n j as the number of transmissions to move a packet along the best traditional route to n j [7], [9], [13].OR begins with the sender ni broadcasting a batch of packets. 

In this algorithm, under the well-known TakahashiMatsuyama (T-M) heuristic [15], a Steiner tree S is built by an incremental approach to span over source s and destination set D in Gc. Initially, the tree contains onlys. 

How to select tree backbone nodes and decide direction is explained in the following subsections, which helps to minimize the number of total transmissions in the network. 

That is, if nodes u and v use the same rate, and if u can transmit packets directly to node v (and vice versa), there is a link (u,v) in E. 

Their work inherits the characteristic of opportunistic routing, but differs from the above papers, since it focuses on multicast and builds an efficient backbone.