Exploiting congestion information in network and higher layer protocols in multihop wireless ad hoc networks
read more
Citations
MiNT: a miniaturized network testbed for mobile wireless research
A new beacon order adaptation algorithm for IEEE 802.15.4 networks
Congestion-Aware Rate Adaptation in Wireless Networks: A Measurement-Driven Approach
PARMA: a PHY/MAC aware routing metric for ad-hoc wireless networks with multi-rate radios
A cross-layer based intrusion detection approach for wireless ad hoc networks
References
Ad-hoc on-demand distance vector routing
Dynamic Source Routing in Ad Hoc Wireless Networks.
Dynamic Source Routing in Ad Hoc Wireless Networks
Highly dynamic Destination-Sequenced Distance-Vector routing (DSDV) for mobile computers
Random early detection gateways for congestion avoidance
Related Papers (5)
Frequently Asked Questions (17)
Q2. What are the main challenges for network protocols operating in an ad hoc network?
The mobility of the nodes and the fundamentally limited capacity of the wireless medium, together with wireless transmission effects such as attenuation, multipath propagation, and interference, combine to create significant challenges for network protocols operating in an ad hoc network.
Q3. What are the parameters for measuring local network congestion around a node?
The parameters for measuring local network congestion around a node depend largely on the MAC layer, and many different wireless MAC layers, based on methods such as random access, TDMA, and polling, have been proposed and implemented.
Q4. What is the behavior of TCP in their simulations?
All behavior of TCP in their simulations was created by ns without modification, based on their setting of the ECN bits in the IP header of packets as appropriate.
Q5. What is the way to confirm a packet?
If a packet is not acknowledged, the forwarding node assumes that the next-hop destination is unreachable over this link, and sends a ROUTE ERROR to the source of the packet, indicating the broken link.
Q6. What is the common way to set the CE codepoint in a packet?
When a TCP sender receives a packet with the CE codepoint set in its IP header, the TCP sender responds using its congestion control algorithm as it would to a packet drop [25].
Q7. What did the authors find in the simulations?
Their simulations demonstrated substantial improvement to DSR and TCP in terms of scalability, packet delivery, overhead, and fairness resulting from this use of congestion information.
Q8. What is the MAC layer utilization measurement?
Since their MAC layer utilization measurement represents an average of the recent level to which the wireless medium around the node is busy, the setting of the CE codepoint in a packet by an intermediate node indicates a sustained congestion condition needing action from the TCP sender.
Q9. What is the MAC layer utilization metric used in a proactive routing protocol?
In a proactive routing protocol, nodes can affect the routes chosen by the protocol by using the congestion information to alter the metric for certain routing table entries that it exchanges with other nodes.
Q10. What is the MAC layer utilization at each node?
In their simulation, the authors use a combination of the MAC layer utilization and instantaneous queue length metrics to determine the congestion level at each node.
Q11. What is the way to avoid a packet being retransmitted?
When a node forwarding a packet fails to receive acknowledgement from the next-hop destination, as described above, in addition to sending a ROUTE ERROR back to the source of the packet, the node may attempt to use an alternate route to the destination, if it knows of one.
Q12. How many Mbps wireless networks are used?
The version of the ns simulator that the authors used provides a physical and MAC layer model including proper modeling of backoff, contention, collisions, capture, and propagation; it models the IEEE 802.11 Distributed Coordination Function (DCF) MAC [12] over a 2 Mbps wireless network with a a nominal maximum transmission range of 250 m.
Q13. What is the value of pause time in the Random Waypoint model?
This value of pause time represents a network in which all nodes are in continuous motion, with each node turning and moving toward a new destination as soon as it reaches its current destination.
Q14. What was the support for this work?
This work was supported in part by NSF under grant CCR-0209204, by NASA under grant NAG3-2534, and by a gift from Schlumberger to Rice University.
Q15. What is the effect of increasing the amount of bandwidth for a multi-hop TCP flow?
This result is expected in any system designed to increase fairness: a multi-hop TCP flow will require more aggregate wireless bandwidth for the same amount of end-to-end delivered bandwidth, so increasing the throughput for connections traversing more hops will have an adverse effect on TCP connections traversing fewer hops.
Q16. How many simulated CBR traffic sources did the authors use?
One of these sets of experiments was performed using 50 mobile nodes in a simulation area of 1500 m×300 m modeling 900 seconds of simulated time for each run, and the other set was performed using 100 mobile nodes in an area of 1000 m×1000 m modeling 1000 seconds of simulated time for each run; in both of these sets of experiments, the authors simulated a number of CBR traffic sources, varying from 2 to 30 CBR sources per run, with each source sending 4 512-byte packets per second.
Q17. How many times has a packet been salvaged?
To prevent the possibility of infinite looping of a packet, each source route includes a salvage count, indicating how many times the packet has been salvaged in this way.