- Research
- Open Access
An initial analysis of packet function-aware extension to Dijkstra algorithm for wireless networks
- Mustafa Arisoylu^{1}Email author
https://doi.org/10.1186/s13638-016-0544-1
© Arisoylu. 2016
- Received: 18 December 2015
- Accepted: 4 February 2016
- Published: 29 February 2016
Abstract
In this paper, we promote the packet function (e.g., packet size) -aware extension of the Dijkstra algorithm (i.e., PFA_SPF) as a base algorithm where any routing protocol can evolve it and integrate it with appropriate routing metrics. In particular, we propose a generic algorithm for packet function-aware path setup for multi-hop networks. The algorithm is based on a generic and novel extension of the classical Dijkstra algorithm in which the cost of each link is a non-negative-valued function of packet parameter(s) (e.g., packet size) rather than a scalar value. The algorithm minimizes the sum of the cost functions (e.g., total transmission delay or total energy consumption) experienced by each packet (e.g., maximizing the throughput) from the source to the destination node. We did initial analysis based on simulation of the algorithm for various random multi-hop wireless networks (e.g., 802.11), utilizing realistic link delay models. Finally, we demonstrate the initial significant potential performance improvements of our algorithm over the existing prior art.
Keywords
- Path setup
- Wireless networks
- Packet function aware
1 Introduction
Multi-hop wireless and wired networks and associated protocols are widely used and studied for various applications for residential, military, and emergency networking [1–74].
1.1 Wireless network types
Depending on the deployment scenario, wireless networks can be mobile or static. Accordingly, these networks can exhibit a wide range of characteristics in terms of connectivity, delay, bandwidth, and topology over time.
On one hand, static multi-hop wireless mesh networks got significant attention due to various commercial deployments such as residential multi-hop wireless networks (e.g., among residents or within a resident) or community wireless networks [14, 46, 50–52]. In this case, mostly the network nodes/user equipment are static or minimally mobile.
On the other extreme, some wireless networks may not have continuous network connectivity due to the mobility and/or extreme conditions of the environment so that even the well-known ad hoc routing protocols such as AODV [75] and DSR [76] do not work well. Such networks in the literature are called delay-tolerant networks [53–57]. These networks range from terrestrial mobile networks and military ad hoc networks to deep space communications. The overall routing/path setup is based on store-and-forward routing so that the data is incrementally stored and forwarded over the network until it eventually reaches the intended destination.
Even though the results of this paper apply both static and mobile networks (including the delay-tolerant networks), the basic network model used in this paper is from an experimental static wireless network deployment and the simulations in this paper are based on this network model. Therefore, the initial focus and motivation of the findings of this paper is towards static wireless networks.
1.2 Packet size distributions
Applications, such as File Download, VoIP, and Video on Demand, generate diverse packet sizes [1–7]. For instance, a file download application mostly utilizes the maximum transmission unit (MTU) (e.g., 1500 bytes), to maximize the throughput, whereas Voice over IP (VoIP) applications generate smaller packets of about 200 bytes in size to minimize the delay. In other words, it is observed that there is diversity in the packet size distribution over the Internet, and the amount of traffic with small packet sizes is significant.
1.3 Wireless MAC layer challenges and solutions
There is a vast number of MAC layer wireless protocols designed for specific applications differing from each other in various aspects. However, in almost all the cases, there is a MAC layer overhead time per packet transmission resulting from various protocol implementation details. As an example, 802.11 inherits such MAC layer overhead time as shown in [16, 19, 21].
802.11 with multiple data transmission rates is known to assign a fair chance to each link to access the channel. Therefore, the throughput achieved on each contending link, regardless of its data transmission rate, may end up being the same low rate (i.e., max-min fair rate), which is even lower than that of the slowest contending link in the network. This effect, which is generally called the harmonic mean effect of 802.11, significantly reduces the overall network throughput. Various research papers studied this anomaly of 802.11 and other interference-limited multi-hop networks, as in [14, 16–20, 25].
Liu et al. [17] and Korakis et al. [18] propose and implement a novel cooperative MAC layer mechanism attempting to solve the 802.11 throughput problem mentioned earlier.
Dunn et al. [19] propose to set the MTU value of an 802.11 link based on the corresponding data transmission rate to increase the overall throughput while providing a proportional-like fairness rather than max-min type fairness among the contending links in the network.
In [22], VoIP packets are aggregated to minimize the MAC layer overhead of the system while still meeting the delay requirements.
Channel assignment in multi-channel wireless networks (e.g., 802.11/WiFi) is also an active area of research where multiple algorithms are devised to assign optimal channels to each link [32–34] in order to reduce the interference within the network.
1.4 Coding techniques and transport layer efforts
There is also research on multi-path routing in wireless networks [8] utilizing coding techniques such as digital fountain codes [9, 10]. Given that a message with k packets is encoded into n packets for transmission, the digital fountain code allows the receiver to recover the original k packets as long as any k out of n packets are received. In such a setup, receiving the packets in order is not a requirement/limitation anymore such that as long as the receiver receives enough number of packets regardless of the order, the original message can be recovered.
Other coding techniques with multicasting is also discussed in various novel research papers [58, 59] where authors designed CodePipe via opportunistic routing and random linear network coding (along with intra- and inter-batch coding) which not only leads to simple coordination among nodes but also increases the multicast throughput.
In addition to the above multi-path and coding techniques, as a transport protocol, TCP-friendly rate control for wired and wireless networks is also studied in various papers [11–13], so that the adverse effects of wireless packet losses and out-of-order packet delivery to TCP can be avoided while still avoiding the congestion collapse in the network. In fact, both the coding techniques as well as TCP-friendly transport layer solutions above can be integrated for an end-to-end reliable and TCP-friendly rate control.
2 Related work
In this section, we provide an overview on the related work covering MAC and routing layer solutions for wireless mesh networking.
2.1 Routing metrics and protocols
Depending on the optimization objective of the path setup algorithm, and the related MAC layer protocol characteristics, the link cost metrics can be a function of the packet characteristics, link transmission rates, hop count, link packet loss rates, and MAC layer overhead parameters rather than fixed scalar values. In [46], a set of route metrics are compared in static as well as mobile network scenarios, namely, hop count, per-hop round trip time [47], expected transmission count [44], and per-hop packet pair delay [48].
One of the basic metrics being used in wired as well as wireless networks is the hop count. However, it does not take into account any delay, bandwidth, and packet loss rate and characteristics and may end up with non-optimal paths.
Expected transmission count metric (ETX) is presented and demonstrated in [44, 45] that selects paths which minimize the expected number of transmissions. ETX method requires a periodic broadcast of probes in both direction of a wireless link and computes the delivery ratio (over a sliding window) to calculate the expected transmission count (i.e., ETX =1/(delivery ratio_ f× delivery ratio _r) where the delivery ratio_ f/r refers each direction of the wireless link. In this method, the probe packet sizes are fixed and not representing the real traffic packet size mix and they are mostly transmitted at the network basic rate. Therefore, in the ETX model, the packet size as well as the different transmission rates are not included in the model.
On the other hand, ETT improves ETX via taking into account the differences in link transmission rates such as ETT = ETX × S/B where S is the packet size of the probe chosen and B is the estimated bandwidth of the link. Another improvement of ETT over ETX is that ETX would prefer a heavily congested link (which has lower loss rates) over a lightly congested link (which has a higher loss rate). Introducing the throughput metric into its cost calculation, ETT aims to address this issue.
However, ETT still uses fixed size of the probe (for data packets) and specifies the cost metric accordingly and does not mention any packet function (or packet size) -dependent path setup.
A medium time metric (MTM)-based method, which is studied in [23, 24], minimizes the end-to-end transmission delay of a packet. The model to calculate the metric is similar to the previous ones such that T = (overhead + S/B)/rel where overhead is the per packet overhead of the link and S is the size of the packet and B is the bandwidth of the link. Finally, rel is the reliability index which is the same as the delivery ratio of the packets. In that respect, one can see that MTM = ETX × overhead + ETT. The proposal in the end is to optimize the path setup for 1500-byte packet size only and for some additional reliability metrics. Even though this study took into consideration the packet size, in the end, they have end up optimizing the path setup for 1500-byte packets. However, our initial analysis as well as findings in this paper suggests that indeed packet size is an important parameter to be considered to optimize the path setup. Please note that packet size is just a sample parameter for our algorithm; indeed, it can be any packet function that the network operator may choose to optimize for path setup.
In this paper, we simulated both hop count as well as link metric for 1500 bytes (with respect to our network model which is in alignment with MTM [23]) in comparison to our proposed metric (e.g., packet function/size) over Dijkstra as well as extended version of Dijkstra algorithm.
As known, many link state routing protocols for wired and wireless networks (e.g., OLSR [29], OSPF [28, 31], IS-IS [30], MCLSR (multi-channel link state routing) [15], CEDAR (a core-extraction distributed ad hoc routing algorithm) [35], TILSRP (trust integrated link state routing protocol for wireless sensor networks) [36]) are taking Dijkstra algorithm as a base and build the protocol on top of it.
Accordingly, various routing metrics are used by these routing protocols. For instance, MR-LQSR (multi-radio link-quality source routing—utilizing ETT/WCETT weighted cumulative expected transmission time metric) [49] is another link-state routing protocol. In MR-LQSR [49], expected transmission time (ETT) of a packet over the link is a function of the loss rate and bandwidth of the link. The authors consider the combination of the MTM [23] and the expected transmission count metric (ETX) [44] as the expected transmission time metric (ETT) and furthermore added a weighted factor for channel diversity which is referred as weighted cumulative expected transmission time metric (WCETT).
2.2 Cooperative communications
The fundamentals of the cooperative communications assume a network model with three nodes A, B, and C. A and C have a low throughput link whereas A and B as well as B and C have high throughput links. The cooperative communications suggests using the multi-hop higher throughput links wherever appropriate [37–43]. In a sense, our method proposes an extended idea where the cooperative communications are performed based on a packet function (e.g., packet size) in an optimal way.
As mentioned before, Liu et al. [17] and Korakis et al. [18] propose and implement a novel cooperative MAC layer mechanism to increase the performance of the IEEE 802.11 MAC protocol. In this new proposed MAC, they allow an intermediate helper node to act as a relay whenever it is appropriate. However, the network model they use to decide to use the relay node or not does ignore the MAC layer overhead.
2.3 Packet size-aware path setup
In [21], the authors conducted experiments to measure the transmission delay experienced by packets with different sizes. Based on these measurements, the transmission delay on an 802.11 link is modeled as a function of the MAC overhead time, packet size, and the effective transmission rate, as in [19] and in alignment with [23, 24].
Furthermore, in [21], the total transmission delays of alternative paths between a source and destination nodes are compared. It is seen that the optimum path for a packet that maximizes throughput indeed depends on the size of the packet. Note that minimizing the overall transmission delay is equivalent to maximizing the end-to-end throughput, as mentioned by [23, 24].
Next, in [21], a simple packet size-aware path selection mechanism is implemented as a Linux kernel module utilizing the netfilter framework for a small network, and the corresponding performance is evaluated through various experiments.
However in [21], the authors do not provide any generic solution for the packet size-aware path setup.
2.4 Our contribution
In this paper, we have extended the classical Dijkstra algorithm considering the link costs/metrics are functions of packet and link parameters (e.g., packet size, link rate) to minimize the total cost function (e.g., transmission delay, energy consumption). The algorithm proposed in this paper is a generic algorithm which works for any network (e.g., wired or wireless) as long as the cost functions of the links are non-negative valued. In this paper, we not only devise such an algorithm but also simulate the algorithm for packet size-aware path setup over a basic 802.11-based multi-hop wireless network model as an initial example and demonstrate the significant potential performance improvements of our algorithm over the existing prior art (i.e., minimum hop-based path selection and path optimized for 1500 bytes).
The aim of this paper is to present an interesting and novel idea extending the classical path setup algorithms and trigger additional investigation on this subject. In other words, in this paper, we are not proposing a complete routing protocol; instead, we are showing the potential of a packet function-aware path setup algorithm as an extension to Dijkstra over a basic fundamental network model. Our proposal in this paper is to promote the packet function-aware extension of the Dijkstra algorithm as a base algorithm where any appropriate routing protocol can evolve and integrate it (with other routing metrics discussed above) and build on top of it. Therefore, in this paper, it does not make sense to compare our extension to Dijkstra Algorithm to full-fledged routing protocols. As a future work, we are considering to build a routing protocol based on the PFA_SPF and compare it with the existing routing protocols through simulations as well as experiments over real deployments.
It is important to note that the sole focus of this paper is the network layer performance optimization. The performance interactions with higher layer protocols (e.g., transport layer protocols TCP, UDP, or application layer protocols) are outside the scope of this paper and left as a future work. Especially, TCP performance may be adversely affected by out-of-order packet delivery since our method can generate multiple paths for a single TCP connection.
In addition to that as mentioned in the previous section, there are various research on TCP-friendly rate control techniques along with multi-path and digital fountain type codes (for applications from file downloads to Voice and Video). This overall networking solution does not require in-order delivery of packets to the receiver. Therefore, as an example, the PFA_SPF algorithm can easily be utilized in such network models.
The rest of the paper is organized as follows: Section 3 presents the proposed algorithm. Section 4 discusses a sample network model. Section 5 presents the simulation results of the proposed algorithm where the packet parameter is the packet size and the objective is to minimize the total transmission delay over various randomly generated networks. Section 6 concludes the paper and mentions the potential future work.
3 The packet function-aware shortest-path first (PFA_SPF) algorithm
In this section, we propose an algorithm that finds the shortest path between a source node and all the other nodes in the network for all possible values of the related packet parameter (e.g., packet size).
The algorithm is a novel extension of the Dijkstra’s algorithm (see [26] and [27]) that originally assumes scalar link costs. However, our algorithm assumes the cost of each link to be a non-negative-valued function of some packet parameter such as packet size. We call our algorithm “packet function-aware shortest-path first algorithm” (PFA_SPF).
The algorithm solves any shortest-path computation problem in which the link costs are non-negative-valued functions of a packet attribute or some other network-related attribute rather than scalars. Any routing protocol based on our extended version of Dijkstra algorithm (PFA_SPF) can decide on the cost metrics (e.g., it could be packet size-based delay or energy consumption) and add other dimensions to the cost (e.g., loss rate, channel state) and use an evolved version of the algorithm to be able to realize a dynamic and optimized path setup.
In the original Dijkstra algorithm, a shortest-path tree is constructed from a source node to all the other nodes in the network. The PFA_SPF algorithm presented in this study possibly generates multiple shortest-path trees that are associated to a packet parameter (e.g., packet size) range. The shortest-path trees as well as the related packet parameter ranges are computed in the PFA_SPF algorithm.
Let G be the graph composed of a set of nodes V and a set of links L connecting the nodes. Let node S∈V be the node from which the shortest-path trees to all other nodes in the network are computed.
We describe the algorithm as a function x, which can be any packet parameter, such as packet size. Let I(x _{ a },x _{ b }) denote the interval on the real line, i.e., [ x _{ a },x _{ b }).
Let D _{ j }(x) be the distance from node j to node S as a function of x. Let \(\vec {D}(x)\) be the vector of distances from all the nodes in set V to the node S as a function of x; i.e., \(\vec {D}(x)=\,[\!\ldots,D_{i}(x),\dots ]\) for i∈V.
Let d _{ i,j }(x) be the cost of link (i,j)∈L as a function of x.
Let \(\vec {D}(x)\) be the array of link costs as a function of x for all the links in L in the network; i.e., \(\vec {d}(x)=\,[\!\ldots,d_{i,j}(x),\dots ]\) for i,j∈V.
Let N H _{ j }(x) be the next-hop node for node j as a function of x. Let \(\vec {NH}(x)\) be the vector of next-hop nodes for all the nodes as a function of x. Basically, the vector of such next-hop nodes specifies the spanning trees from node S to all other nodes in the network as a function of x.
When the domain of any of the above functions, say f(x), is restricted to I(x _{ a },x _{ b }), it is denoted as f(I(x _{ a },x _{ b })). For instance, the function P(x) for any interval such as x _{ a }≤x<x _{ b } is denoted as P(I(x _{ a },x _{ b })).
The PFA_SPF algorithm can be described as one initialization stage and two functions recursively calling each other.
The detailed description of the algorithm is as follows.
3.1 Detailed description of the algorithm
Initialization:
As can be seen, the proposed algorithm implements a recursive method in which the find_minimum_distancefunction calls the update_nexthop_distancesfunction and vice versa. The stopping criterion for the algorithm is P(I(x _{ a },x _{ b }))=V in the find_minimum_distancefunction; i.e., the algorithm stops when the permanently labeled set for the interval I(x _{ a },x _{ b }) spans to the entire set of nodes in the network.
The complexity of the original Dijkstra algorithm is O(|V|^{2}) in the worst case (see [27]). In comparison to the Dijkstra algorithm, the complexity of the PFA_SPF algorithm is O(|I|×|V|^{2}) in the worst case where |I| is the maximum number of identified subintervals, such as packet size-based subintervals in case of packet size-aware cost functions. Note that this is the worst case complexity since the PFA_SPF algorithm finds the common shortest-path tree until the next subinterval is identified. Then, the algorithm adds the new shortest-path tree for the new subintervals and continues until the next subinterval leads to a new tree or the stop condition of the algorithm is met. In other words, the algorithm may find different number of subintervals for each node separately, so |I| being the maximum is a worst case bound. However, intuitively, the average number of subintervals over the nodes would give a better estimation on the complexity.
The value of |I| depends not only on the topology of the network including the number of nodes |V| and the number of links |L| but also on the link cost functions. However, to have an idea on the complexity of the algorithm through empirical data obtained via our simulations over 4000 random network topologies, one can refer to Fig. 10 which shows the average number of paths vs. network size. As can be seen in the figure, the average number of paths or the average number of subintervals is from 1.5 to 2.3 over 4000 random networks of 20 to 80 nodes. This clearly indicates that the complexity of the PFA_SPF algorithm is at most 2.3 times that of the Dijkstra algorithm for ensemble of 4000 random networks.
The explicit formulation of the upper bounds to the worst case complexity of the algorithm with respect to the link cost function types, the number of nodes (|V|), and links (|L|) is left as a future work.
Notice that the PFA_SPF algorithm is optimal since it is equivalent to the Dijkstra algorithm by construction. One way to prove this is to fix the value of the packet parameter in question (e.g., packet size) in the PFA_SPF algorithm to obtain the Dijkstra algorithm optimized for that packet parameter value. The PFA_SPF algorithm can be seen as a generalization of the Dijkstra algorithm for arbitrary link cost functions.
In the next section, we simulate the PFA_SPF algorithm over randomly generated networks.
4 Sample network model
In this paper, as a sample network model, we utilize the network model in [19, 21] (in alignment with [16, 24]), which is based on experimentation and analysis of multi-hop 802.11 network deployments where all the nodes in the network are in the same contention neighborhood. Note that our algorithm is not limited to this network model; the reason to choose this network model is to present the potential benefits of our algorithm over a basic and fundamental setup.
In addition to that, in real-life deployments, there are various scenarios (as discussed in the “Introduction” section) where a larger network is divided into relatively smaller number of nodes on a single channel where the links of the same channel can stay in the same contention neighborhood.
4.1 Delay and throughput model
where θ _{ i } is the MAC layer overhead time, and b _{ i } is the effective transmission rate for link i.
Please note that the MTM of [24] that is discussed in the earlier sections (i.e., T =(overhead+S/B)/rel) is very similar to the model above where only variable rel (i.e., reliability or the delivery ratio) is not explicitly represented in the model above. However, since 1/rel is a coefficient, through measurements, it is represented by the overall model through measurements.
Equations (1), (2), and (3) assume that packet sizes are equal to P.
Please note that Eq. (3) is validated in [21] through real 802.11 multi-hop experimentation for up to four nodes. In this paper, we use this model over simulations with increased network size. As our proposed PFA_SPF algorithm is not specific to 802.11 or any other MAC layer protocol, we believe that using Eq. (3) above for increased network sizes in our simulations in this paper is sufficient to present not only the functionality but also the potential benefits of our algorithm. As mentioned previously, our aim in this paper is to present an interesting and novel idea extending the classical path setup algorithms and trigger additional investigation on this subject.
4.2 Validation of the model
To validate this model, in [21], the authors performed various experiments to estimate parameters such as the overhead time θ _{ i } and effective bit rate b _{ i } for each transmission rate.
In [21], multi-hop path performance measurements to validate the above model are conducted and verified. The transport protocol that was used in the experiments for devising the above network model was UDP (with infinite demand) over single and multi-hop paths. The size of the packets belonging to this traffic is kept constant throughout each experiment. However, TCP-based experiments for validation of the model along with the benefits have been conducted as well (see [21] for details).
5 Simulation results
In this section, we present the analyzed scenarios as well as the simulation results of the proposed path setup algorithm over various network topologies for the random networks defined in Section 4. We have used the sample network model of this paper that we have obtained via real deployment setup experimentations and extended it via simulations. The link cost metrics are chosen to be the transmission delay as a function of the packet size as well as effective bit rate and overhead time as defined in Section 4. In these simulations, we compute the PFA_SPF algorithm and find possibly multiple shortest-path trees from the source node to all other nodes in the network where each tree is optimized for an optimum packet size interval. Based on these packet size intervals, we compute the throughput gain of the algorithm based on our sample network model with respect to the minimum hop count metric as well as the method optimized just for 1500 bytes. The simulations presented in this paper is developed using Python programming language.
5.1 A sample network
The steps of the PFA_SPF algorithm can be traced for this network as follows:
Initialization:
find_minimum_distance:
update_nexthop_distances:
find_minimum_distance:
update_nexthop_distance:
find_minimum_distance:
Thus, node S will send all the packets with size in [ 0,546.6) with respect to the tree in Fig. 2 a; i.e., packets destined to nodes 1 and 2 will go through the direct link. However, node S will send a packet of size in [ 546.6,1500) using the shortest-path tree in Fig. 2 b. In other words, a packet of size between 546.6 and 1500 that originated from node S and is destined to node 2 must traverse node 1.
In the next subsections, we have simulated the PFA_SPF algorithm over various networks. The throughput performance of PFA_SPF algorithm is compared with alternative path setup mechanisms including minimizing the hop count and optimizing with respect to a packet size of 1500 bytes.
5.2 Tandem nine-node network
The transmission rate of the wireless link between any nodes i and j above is 11 Mbps if the nodes are one hop apart, 5.5 Mbps if they are two hops apart, 2 Mbps if they are three hops apart, and 1 Mbps if they are four hops apart. For the nodes that are more than four hops apart, there is no wireless link.
The results of algorithms for tandem nine-node network
Node | Interval | D(x) | N H ^{1}(x) | N H ^{2}(x) | N H ^{3}(x) |
---|---|---|---|---|---|
1 | [ 0.0,1500.0) | 1.06+0.0008x | S | S | S |
2 | [ 0.0,1500.0) | 1.04+0.0016x | S | S | S |
3 | [ 0.0,365.2) | 1.26+0.0047x | S | S | 1 |
[ 365.2,1500.0) | 2.10+0.0024x | 1 | |||
4 | [ 0.0,62.9) | 1.69+0.0094x | S | S | 2 |
[ 62.9,1500.0) | 2.08+0.0032x | 2 | |||
5 | [ 0.0,365.2) | 2.30+0.0063x | 2 | 1 | 3 |
[ 365.2,1500.0) | 3.14+0.0040x | 3 | |||
6 | [ 0.0,130.4) | 2.52+0.0094x | 3 | 2 | 4 |
[ 130.4,1500.0) | 3.12+0.0048x | 4 | |||
7 | [ 0.0,62.9) | 2.95+0.0141x | 3 | 3 | 5 |
[ 62.9,365.2) | 3.34+0.0079x | 4 | |||
[ 365.2,1500.0) | 4.18+0.0056x | 5 | |||
8 | [ 0.0,23.1) | 3.38+0.0188x | 4 | 4 | 6 |
[ 23.1,130.4) | 3.56+0.0110x | 5 | |||
[ 130.4,1500.0) | 4.16+0.0064x | 6 |
The path setup mechanism minimizing the hop count results in the next-hop entries N H ^{2}(x) as shown in Table 1. In addition, a path setup mechanism that is optimized with respect to a packet size of 1500 bytes generates the next-hop entries N H ^{3}(x).
5.3 Random networks
In this section, we generate random networks with various node sizes over a circular area in which the nodes are distributed randomly.
Wireless link rate values for ranges
Rate (Mbps) | Maximum range |
---|---|
11.0 | 399 m |
5.5 | 531 m |
2.0 | 669 m |
1.0 | 796 m |
For those nodes that are separated by more than 796 m, there is no link possible. Consequently, there is no guarantee that a randomly generated network will be connected; i.e., each node can be reached from another one by a connection path. We exclude those networks that are not connected from our discussion.
The results of PFA_SPF algorithm for sample network
Node | Interval | D(x) | Path |
---|---|---|---|
1 | [ 0.0,1500.0) | 1.26+0.004x | 0, 1 |
2 | [ 0.0,25.0) | 3.99+0.015x | 0, 23, 7, 2 |
[ 25.0,161.5) | 4.01+0.014x | 0, 23, 5, 2 | |
[ 161.5,277.4) | 4.64+0.011x | 0, 19, 24, 5, 2 | |
[ 277.4,365.2) | 5.50+0.007x | 0, 19, 24, 5, 28, 2 | |
[ 365.2,1500.0) | 6.34+0.005x | 0, 11, 19, 24, 5, 28, 2 | |
3 | [ 0.0,161.5) | 1.69+0.009x | 0, 3 |
[ 161.5,1500.0) | 2.32+0.005x | 0, 15, 3 | |
4 | [ 0.0,161.5) | 4.21+0.018x | 0, 24, 28, 4 |
[ 161.5,277.4) | 4.84+0.014x | 0, 19, 24, 28, 4 | |
[ 277.4,365.2) | 5.70+0.011x | 0, 19, 24, 5, 28, 4 | |
[ 365.2,1500.0) | 6.54+0.009x | 0, 11, 19, 24, 5, 28, 4 | |
5 | [ 0.0,161.5) | 2.75+0.010x | 0, 23, 5 |
[ 161.5,365.2) | 3.38+0.006x | 0, 19, 24, 5 | |
[ 365.2,1500.0) | 4.22+0.004x | 0, 11, 19, 24, 5 | |
6 | [ 0.0,62.9) | 2.73+0.011x | 0, 22, 6 |
[ 62.9,1500.0) | 3.12+0.004x | 0, 22, 13, 6 | |
7 | [ 0.0,411.3) | 2.73+0.011x | 0, 23, 7 |
[ 411.3,1500.0) | 5.28+0.004x | 0, 11, 19, 24, 5, 7 | |
8 | [ 0.0,161.5) | 5.27+0.019x | 0, 24, 28, 4, 8 |
[ 161.5,277.4) | 5.90+0.015x | 0, 19, 24, 28, 4, 8 | |
[ 277.4,365.2) | 6.76+0.012x | 0, 19, 24, 5, 28, 4, 8 | |
[ 365.2,1500.0) | 7.60+0.010x | 0, 11, 19, 24, 5, 28, 4, 8 | |
9 | [ 0.0,58.6) | 3.38+0.018x | 0, 23, 9 |
[ 58.6,411.3) | 3.79+0.011x | 0, 23, 7, 9 | |
[ 411.3,1500.0) | 6.34+0.005x | 0, 11, 19, 24, 5, 7, 9 | |
10 | [ 0.0,25.0) | 2.30+0.006x | 0, 19, 10 |
[ 25.0,546.7) | 2.32+0.005x | 0, 11, 10 | |
[ 546.7,1500.0) | 3.14+0.004x | 0, 11, 19, 10 | |
11 | [ 0.0,1500.0) | 1.06+0.000x | 0, 11 |
12 | [ 0.0,25.0) | 3.56+0.011x | 0, 19, 10, 12 |
[ 25.0,365.2) | 3.58+0.010x | 0, 11, 10, 12 | |
[ 365.2,546.7) | 4.42+0.007x | 0, 11, 10, 17, 12 | |
[ 546.7,1500.0) | 5.24+0.006x | 0, 11, 19, 10, 17, 12 | |
13 | [ 0.0,1500.0) | 2.08+0.003x | 0, 22, 13 |
14 | [ 0.0,161.5) | 1.69+0.009x | 0, 14 |
[ 161.5,365.2) | 2.32+0.005x | 0, 19, 14 | |
[ 365.2,1500.0) | 3.16+0.003x | 0, 11, 19, 14 | |
15 | [ 0.0,1500.0) | 1.26+0.004x | 0, 15 |
16 | [ 0.0,1500.0) | 3.12+0.004x | 0, 22, 13, 16 |
17 | [ 0.0,25.0) | 3.34+0.007x | 0, 19, 10, 17 |
[ 25.0,546.7) | 3.36+0.007x | 0, 11, 10, 17 | |
[ 546.7,1500.0) | 4.18+0.005x | 0, 11, 19, 10, 17 | |
18 | [ 0.0,1500.0) | 2.30+0.006x | 0, 15, 18 |
19 | [ 0.0,365.2) | 1.26+0.004x | 0, 19 |
[ 365.2,1500.0) | 2.10+0.002x | 0, 11, 19 | |
20 | [ 0.0,58.6) | 2.95+0.014x | 0, 1, 20 |
[ 58.6,1500.0) | 3.36+0.007x | 0, 15, 18, 20 | |
21 | [ 0.0,1500.0) | 2.52+0.009x | 0, 1, 21 |
22 | [ 0.0,1500.0) | 1.04+0.001x | 0, 22 |
23 | [ 0.0,468.5) | 1.69+0.009x | 0, 23 |
[ 468.5,1500.0) | 4.22+0.004x | 0, 11, 19, 24, 23 | |
24 | [ 0.0,161.5) | 1.69+0.009x | 0, 24 |
[ 161.5,365.2) | 2.32+0.005x | 0, 19, 24 | |
[ 365.2,1500.0) | 3.16+0.003x | 0, 11, 19, 24 | |
25 | [ 0.0,1500.0) | 2.08+0.003x | 0, 22, 25 |
26 | [ 0.0,545.7) | 1.69+0.009x | 0, 26 |
[ 545.7,1500.0) | 4.20+0.004x | 0, 11, 19, 24, 26 | |
27 | [ 0.0,25.0) | 3.99+0.015x | 0, 19, 10, 27 |
[ 25.0,62.9) | 4.01+0.014x | 0, 11, 10, 27 | |
[ 62.9,546.7) | 4.40+0.008x | 0, 11, 10, 17, 27 | |
[ 546.7,1500.0) | 5.22+0.007x | 0, 11, 19, 10, 17, 27 | |
28 | [ 0.0,161.5) | 2.95+0.014x | 0, 24, 28 |
[ 161.5,277.4) | 3.58+0.010x | 0, 19, 24, 28 | |
[ 277.4,365.2) | 4.44+0.007x | 0, 19, 24, 5, 28 | |
[ 365.2,1500.0) | 5.28+0.004x | 0, 11, 19, 24, 5, 28 | |
29 | [ 0.0,161.5) | 3.99+0.015x | 0, 15, 18, 29 |
[ 161.5,1500.0) | 4.62+0.011x | 0, 15, 18, 20, 29 |
To obtain the plots in this section, we generated 1000 connected random networks for each network size.
6 Conclusions
The focus of this paper is to present a novel and generic extension of the classical Dijkstra path setup algorithm for multi-hop networks where the link costs are not scalar but a function of packet parameters such as packet size. As can be seen in the algorithm statement, there is no assumption of any specific network model. That is, the algorithm is not limited to a specific MAC layer, physical layer, or a network model. In fact, the algorithm can be used both in multi-hop wired and wireless networks.
In this paper, we aim to present the basic novel algorithm as well as the benefits of the algorithm over a fundamental and basic network model and compare it with the most used classical base path setup metrics: hop count and optimized for only 1500 bytes. The results show the significant potential benefits for the future routing protocols leveraging and integrating such a packet size-aware path setup algorithm.
In particular, we simulated the algorithm for the packet size-aware path setup that we show to significantly improve the overall performance with respect to the prior work.
The effect of the proposed path setup mechanism presented in this paper on the performance of higher layer protocols, such as transport layer protocols, in particular TCP, is known and left as a future work. Especially, TCP performance getting adversely affected by out-of-order packet delivery is within the scope of the future work of this study as our method can generate multiple paths for a single TCP connection.
However, as mentioned in the introduction part of the paper, there are various research on TFRC (TCP-friendly rate control) with multi-path routing protocols along with the coding techniques (e.g., digital fountain codes) where our proposed method/algorithm in this paper can be an integral part of the solution. In such solutions, the adverse effects of wireless packet losses and out-of-order packet delivery to the TFRC-based transport protocol are eliminated while still avoiding the congestion collapse in the network.
Even though in this paper, we have done an initial analysis based on a real but relatively small network. As a future work, we plan to experiment and simulate with larger networks along with other 802.11 standards such as 802.11 n/g/a and to model the link delay and throughput along with the larger packet sizes, such as Jumbo frames. In addition, we plan to design and implement a complete routing protocol minimizing the total transmission delay and/or the total energy consumption based on the proposed generic algorithm and test it over real network deployments along with extensive simulations.
Declarations
Open Access This article is distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made.
Authors’ Affiliations
References
- X Wu, W Li, F Liu, H Yu, in IEEE International Conference on Wavelet Active Media Technology and Information Processing (ICWAMTIP). Packet size distribution of typical Internet applications, (2012).Google Scholar
- C Fraleigh, S Moon, B Lyles, C Cotton, M Khan, D Moll, R Rockell, T Seely, C Diot, Packet-level traffic measurements from the Sprint IP backcone. IEEE Network. 17(6), 6–16 (2003).View ArticleGoogle Scholar
- R Sinha, C Papadopulos, J Heidemann, Internet packet size distributions: some observations, ISI-TR-2007-643. USC/Information Sciences Institute Technical Report, (2007).Google Scholar
- Y Cheng, V Ravindran, A Leon-Garcia, in 26th IEEE International Conference on Computer Communications, INFOCOM. Internet traffic characterization using packet-pair probing, (2007).Google Scholar
- J Downey, Understanding VoIP packet sizing and traffic engineering, in SCRE Cable-tec Expo, White Paper, (June 2005).Google Scholar
- K Thompson, G Miller, R Wilder, Wide-area internet traffic patterns and characteristics. IEEE Network. 11(6), 10–23 (1997).View ArticleGoogle Scholar
- A Mena, J Heidemann, in Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies, INFOCOM. An empirical study of real audio traffic, (2000).Google Scholar
- Sun, Jun, Y Wen, L Zheng, in Proceedings IEEE International Conference on Computer Communications, INFOCOM. On file-based content distribution over wireless networks via multiple paths: coding and delay trade-off, (2011).Google Scholar
- JW Byers, M Luby, M Mitzenmacher, A digital fountain approach to asynchronous reliable multicast. IEEE Journal on Selected Areas in Communications, JSAC. 20(8), 1528–1540 (2002).View ArticleGoogle Scholar
- JW Byers, M Lubyy, M Mitzenmacher, A Rege, in Proc. Special Interest Group on Data Communications Conference ACM SIGCOMM. A digital fountain approach to reliable distribution of bulk data, (1998).Google Scholar
- S Floyd, et al., in Proceedings of Special Interest Group on Data Communications Conference, ACM SIGCOMM. Equation-based congestion control for unicast applications (SwedenStockholm, 2000), pp. 43–56.Google Scholar
- J Padhye, D Kurose, R Towsley, in Proc. Int’l. Wksp. Network and Op. Sys. Support for Digital Audio and Video, NOSSDAV. A model based TCP-friendly rate control protocol, (1999).Google Scholar
- S Cen, PC Cosman, GM Voelker, End-to-end differentiation of congestion and wireless losses. Netw. IEEE/ACM Trans. 11(5), 703–717 (2003).View ArticleGoogle Scholar
- M Arisoylu, T Javidi, RL Cruz, in IEEE International Conference on Communications, ICC. End-to-end and MAC-layer fair rate assignment in interference-limited wireless access networks, (2006).Google Scholar
- C Kim, Y Ko, NH Vaidya, in IEEE Military Communications Conference, MILCOM. Link-state routing protocol for multi-channel multi-interface wireless networks, (2008).Google Scholar
- M Heusse, F Rousseau, GB Sabbatel, A Duda, in Twenty-Second Annual Joint Conference of the IEEE Computer and Communications, INFOCOM. Performance anomaly of 802.11b, (2003).Google Scholar
- P Liu, Z Tao, S Panwar, in IEEE International Conference on Communications, ICC. A cooperative MAC protocol for wireless local area networks, (2005).Google Scholar
- T Korakis, S Narayanan, A Bagri, S Panwar, in IEEE International Conference on Communications, ICC. Implementing a cooperative MAC protocol for wireless LANs, (2006).Google Scholar
- J Dunn, M Neufeld, A Sheth, D Grunwald, J Bennett, in IEEE First International Conference on Broadband Networks, BroadNets. A practical cross-layer mechanism for fairness in 802.11 networks, (2004).Google Scholar
- DSJ De Couto, D Aguayo, J Bicket, R Morris, A high throughput path metric for multi-hop wireless routing. Journal Wireless Networks - Special issue: Selected papers from ACM MobiCom 2003. 11(4), 419–434 (2005).View ArticleGoogle Scholar
- M Arisoylu, S Ergut, RL Cruz, R Rao, in IEEE Consumer Communications and Networking Conference, CCNC. Packet size aware path setup for wireless networks, (2008).Google Scholar
- C Pepin, UC Kozat, AS Ramprashad, in 4th International Symposium on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks, IEEE WiOpt. A joint traffic shaping and routing approach to improve the performance of 802.11 mesh networks, (2006).Google Scholar
- B Awerbuch, D Holmer, H Rubens, High throughput route selection in multi-rate ad hoc wireless networks, Wireless On-demand Network Systems (WONS), (2004).Google Scholar
- DHB Awerbuch, H Rubens, The medium time metric: High throughput route selection in multirate ad hoc wireless networks. Mobile Networks and Applications. 11(2), 253–266 (2006).View ArticleGoogle Scholar
- M Arisoylu, RL Cruz, T Javidi, in Proceedings of the Allerton Conference on Communications, Control, and Computing. Rate assignment in micro-buffered high speed networks, (2005).Google Scholar
- R Perlman, Interconnections: bridges, routers, switches and Internet-working protocols, 2nd Ed (Addison Wesley, 1999).Google Scholar
- D Bertsekas, R Gallager, Data Networks, 2nd edn. (Prentice Hall, Englewood Cliffs, New Jersey, 1992).MATHGoogle Scholar
- J Moy, OSPF version 2, RFC 2328 (1998) http://ietf.org/rfc/rfc2328.txt.
- T Clausen, P Jacquet, A Laouiti, P Minet, P Muhlethaler, A Qayyum, L Viennot (Optimized link state routing protocol, draft MANET-IETF, 2002. http://www.ietf.org/internet-drafts/draft-ietfmanet-olsr-07.txt.
- D Oran, OSI IS-IS Intra-domain routing protocol, RFC 1142 (1990) http://ietf.org/rfc/rfc1142.txt.
- J Moy, OSPF, Anatomy of an Internet Routing Protocol (AddisonWesley, Boston, 1998).Google Scholar
- R Murty, J Padhye, R Chandra, A Wolman, B Zill, in NSDI ’08: 5th USENIX Symposium on Networked Systems Design and Implementation. Designing high performance enterprise Wi-Fi networks, (2008).Google Scholar
- A Raniwala, T Chiueh, in IEEE International Conference on Computer Communications INFOCOM. Architecture and algorithms for an IEEE 802.11-based multi-channel wireless mesh network (Miami, FL, 2005).Google Scholar
- KN Ramachandran, EM Belding, KC Almeroth, MM Buddhikot, in IEEE International Conference on Computer Communications INFOCOM. Interference-aware channel assignment in multi-radio wireless mesh networks, (2006).Google Scholar
- R Sivakumar, P Sinha, V Bharghavan, CEDAR: a core-extraction distributed ad hoc routing algorithm. IEE J. Selected Areas Commun. 17(8), 1454–1465 (1999).View ArticleGoogle Scholar
- A Raha, SS Babu, MK Naskar, O Alfandi, Hogrefe D, in IEEE 5th International Conference on Advanced Networks and Telecommunication Systems (ANTS). Trust integrated link state routing protocol for wireless sensor networks (TILSRP), (2011).Google Scholar
- EC van der Meulen, Three-terminal communication channels. Adv. Appl. Probab. 3:, 120–154 (1971).View ArticleMathSciNetMATHGoogle Scholar
- A Sendonaris, E Erkip, B Aazhang, User cooperation diversity—Part I: system description. IEEE Trans. Commun. 51(11), 1927–1938 (2003).View ArticleGoogle Scholar
- A Sendonaris, E Erkip, B Aazhang, User cooperation diversity—Part II: implementation aspects and performance analysis. IEEE Trans. Commun. 51(11), 1939–1948 (2003).View ArticleGoogle Scholar
- T Cover, A Gamal, Capacity theorems for the relay channel. IEEE Trans. Inf. Theory. 25(5), 572–584 (1979).View ArticleMATHGoogle Scholar
- G Kramer, M Gastpar, P Gupta, Cooperative strategies and capacity theorems for relay networks. IEEE Trans. Inf. Theory. 51(9), 3037–3063 (2005).View ArticleMathSciNetMATHGoogle Scholar
- A Host-Madsen, Capacity bounds for cooperative diversity. IEEE Trans. Inf. Theory. 52(4), 1522–1544 (2006).View ArticleMathSciNetGoogle Scholar
- L Lai, K Liu, H El Gamal, The three-node wireless network: achievable rates and cooperation strategies. IEEE Trans. Inf. Theory. 52(3), 805–828 (2006).View ArticleMathSciNetMATHGoogle Scholar
- DSJD Couto, D Aguayo, J Bicket, R Morris, in 9th annual international conference on mobile computing and networking (ACM MobiCom 03). A high-throughput path metric for multi-hop wireless networks, (2003).Google Scholar
- D Aguayo, J Bicket, S Biswas, G Judd, R Morris, in Proceedings of Special Interest Group on Data Communications Conference, ACM SIGCOMM. Link-level measurements from an 802.11b mesh network, (2004).Google Scholar
- R Draves, J Padhye, B Zill, in Proceedings of Special Interest Group on Data Communications Conference, ACM SIGCOMM. Comparison of routing metrics for static multi-hop wireless networks, (2004).Google Scholar
- A Adya, P Bahl, J Padhye, A Wolman, L Zhou, in IEEE International Conference on Broadband Networks, BroadNets. A multi-radio unification protocol for ieee 802.11 wireless networks, (2004).Google Scholar
- S Keshav, in Proceedings of Special Interest Group on Data Communications Conference, ACM SIGCOMM. A control-theoretic approach to flow control, (1991).Google Scholar
- R Draves, J Padhye, B Zill, in annual international conference on mobile computing and networking in ACM MobiCom. Routing in multi-radio, multi-hop wireless mesh networks, (2004).Google Scholar
- R Karrer, A Sabharwal, E Knightly, in ACM Workshop on Hot Topics in Networks (HotNets). Enabling large-scale wireless broadband: the case for TAPs, (2003).Google Scholar
- D Aguayo, J Bicket, S Biswas, DD Couto, in annual international conference on mobile computing and networking MobiCom Poster. MIT roofnet: construction of a production quality ad-hoc network, (2003).Google Scholar
- K Ramachandran, I Sheriff, E Belding, K Almeroth, in PAM’07 Proceedings of the 8th international conference on Passive and active network measurement. Routing stability in static wireless mesh networks, (2007).Google Scholar
- K Fall, in Proceedings of Special Interest Group on Data Communications Conference, ACM SIGCOMM. A delay-tolerant network architecture for challenged Internets, (2003).Google Scholar
- Y Zeng, et al., Directional routing and scheduling for green vehicular delay tolerant networks. Wireless Netw. 19(2), 161–173 (2013).View ArticleGoogle Scholar
- T Spyropoulos, et al., Routing for disruption tolerant networks: taxonomy and design. Wireless Netw. 16(8), 2349–2370 (2010).View ArticleGoogle Scholar
- A Vasilakos, et al., Delay tolerant networks: Protocols and applications (CRC Press, Boca Raton, 2012).Google Scholar
- A Dvir, et al., Backpressure-based routing protocol for DTNs. ACM SIGCOMM Comput. Commun. Rev. 41(4), 405–406 (2011).MathSciNetGoogle Scholar
- Li Peng, et al., in IEEE International Conference on Computer Communications INFOCOM. CodePipe: an opportunistic feeding and routing protocol for reliable multicast with pipelined network coding, (2012).Google Scholar
- Li Peng, et al., Reliable multicast with pipelined network coding using opportunistic feeding and routing. IEEE Trans. Parallel Distributed Syst. 25(12), 3264–3273 (2014).View ArticleGoogle Scholar
- L Liu, et al., Physarum Optimization: A biology-inspired algorithm for the Steiner tree problem in networks. IEEE Trans. Comput. 64(3), 819–832 (2015).MathSciNetGoogle Scholar
- Y Liu, et al., Multi-layer clustering routing algorithm for wireless vehicular sensor networks. IET Commun. 4(7), 810–816.Google Scholar
- C Busch, et al., Approximating congestion + dilation in networks via “Quality of Routing” games. IEEE Trans. Comput. 61(9), 1270–1283 (2012).View ArticleMathSciNetGoogle Scholar
- T Meng, et al., Spatial reusability-aware routing in multi-hop wireless networks. IEEE TMC (2015). doi:10.1109/TC.2015.2417543.
- Y-S Yen, et al., Flooding-limited and multi-constrained QoS multicast routing based on the genetic algorithm for MANETs. Math. Comput. Modell. 53(11-12), 2238–2250 (2011).View ArticleGoogle Scholar
- M Youssef, et al., Routing metrics of cognitive radio networks: a survey. IEEE Commun. Surv. Tutorials. 16(1), 92–109 (2014).View ArticleGoogle Scholar
- I Woungang, SK Dhurandher, A Athanasios, V Vasilakos, Routing in opportunistic networks (Springer, 2013).Google Scholar
- XM Zhang, et al., Interference-based topology control algorithm for delay-constrained mobile ad hoc networks. IEEE Trans. Mobile Comput. 14(4), 742–754 (2015).View ArticleGoogle Scholar
- A Attar, et al., A survey of security challenges in cognitive radio networks: solutions and future research directions. Proc. IEEE. 12:, 3172–3186 (2012).View ArticleGoogle Scholar
- AV Vasilakos, et al., Information centric network: research challenges and opportunities. J. Netw. Comput. Appl. 52:, 1–10 (2015).View ArticleGoogle Scholar
- Marwaha S, et al., in Congress on Evolutionary Computation, CEC, 2. Evolutionary fuzzy multi-objective routing for wireless mobile ad hoc networks, (2004), pp. 1964–1971.Google Scholar
- A Vasilakos, et al., Optimizing QoS routing in hierarchical ATM networks using computational intelligence techniques. IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews, (2003).Google Scholar
- W Quan, C Xu, AV Vasilakos, J Guan, H Zhang, LA Grieco, in IFIP Networking Conference. TB2F: Tree-bitmap and bloom-filter for a scalable and efficient name lookup in content-centric networking, (2014).Google Scholar
- K Liu, et al., A cooperative MAC protocol with rapid relay selection for wireless ad hoc networks. Comput. Netw. 91:, 262–282 (2015).View ArticleGoogle Scholar
- L Xiang, et al., in 8th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON). Compressed data aggregation for energy efficient wireless sensor networks, (2011).Google Scholar
- C Perkins, Royer E, in Second IEEE Workshop on Mobile Computing Systems and Applications, WMCSA. Ad hoc on-demand distance vector routing, (1999).Google Scholar
- DB Johnson, DA Maltz, Dynamic source routing in Ad-hoc Wireless Networks. Mobile Computing, pages 153–181. Kluwer Academic Publishers (1996).Google Scholar