Sie sind auf Seite 1von 42

Ad Hoc Networks 4 (2006) 83–124

www.elsevier.com/locate/adhoc

Quality of service provisioning in ad hoc wireless networks:


a survey of issues and solutionsq
T. Bheemarjuna Reddy, I. Karthigeyan, B.S. Manoj, C. Siva Ram Murthy *

Department of Computer Science and Engineering, Indian Institute of Technology, Madras 600036, India

Received 15 February 2004; accepted 14 April 2004


Available online 5 June 2004

Abstract

An ad hoc wireless network (AWN) is a collection of mobile hosts forming a temporary network on the fly, without
using any fixed infrastructure. Characteristics of AWNs such as lack of central coordination, mobility of hosts, dynami-
cally varying network topology, and limited availability of resources make QoS provisioning very challenging in such
networks. In this paper, we describe the issues and challenges in providing QoS for AWNs and review some of the QoS
solutions proposed. We first provide a layer-wise classification of the existing QoS solutions, and then discuss each of
these solutions.
 2004 Elsevier B.V. All rights reserved.

Keywords: Ad hoc wireless networks; Quality of service; Real-time traffic; QoS routing; QoS frameworks

1. Introduction nected through wireless links. These networks


can be formed on the fly, without requiring any
Ad hoc wireless networks (AWNs) are zero con- fixed infrastructure. As these are infrastructure-
figuration, self organizing, and highly dynamic less networks, each node should act also as a rou-
networks formed by a set of mobile hosts con- ter. Throughout this paper, the terms ‘‘mobile
host’’, ‘‘node’’, and ‘‘station’’ are used inter-
q
This work was supported by the iNautix Technologies
changeably. As a router, the mobile host repre-
India Private Limited, Chennai, India and the Department of sents an intermediate node which forwards traffic
Science and Technology, New Delhi, India. on behalf of other nodes. If the destination node
*
Corresponding author. Tel.: +91 44 2257 8340; fax: +91 44 is not within the transmission range of the source
2257 8352. node, the source node takes help of the intermedi-
E-mail addresses: arjun@cs.iitm.ernet.in (T.B. Reddy),
ikarthik@cs.iitm.ernet.in (I. Karthigeyan), bsmanoj@cs.iitm. ate nodes to communicate with the destination
ernet.in (B.S. Manoj), murthy@iitm.ernet.in (C. Siva Ram node. Tactical communication required on battle-
Murthy). fields, among a fleet of ships, or among a group

1570-8705/$ - see front matter  2004 Elsevier B.V. All rights reserved.
doi:10.1016/j.adhoc.2004.04.008
84 T.B. Reddy et al. / Ad Hoc Networks 4 (2006) 83–124

of armored vehicles are some of the military appli- <4,5>


B C
cations of these networks. Civilian applications <3,5>
path 3
include peer-to-peer computing and file sharing,
A
collaborated computing in a conference hall, and <2,4> <5,6>
search and rescue operations.

<2,6> <4,3>
E F
2. Quality of service
<3,7>
D <4,4>
Quality of service (QoS) is the performance <3,5>
level of a service offered by the network to the user.
The goal of QoS provisioning is to achieve a G

more deterministic network behavior, so that


information carried by the network can be better Fig. 1. An example of QoS routing in ad hoc wireless network.
delivered and network resources can be better uti-
lized. A network or a service provider can offer
different kinds of services to the users. Here, a Suppose a packet-flow from node B to node G
service can be characterized by a set of measura- requires a bandwidth guarantee of 4 Mbps. QoS
ble prespecified service requirements such as routing searches for a path that has sufficient
minimum bandwidth, maximum delay, maximum bandwidth to meet the bandwidth requirement of
delay variance (jitter), and maximum packet loss the flow. Here, 6 paths are available between nodes
rate. After accepting a service request from the B and G as shown in Table 1. QoS routing selects
user, the network has to ensure that service path 3 (i.e., B ! C ! F ! G) because, out of the
requirements of the userÕs flow are met, as per available paths, path 3 alone meets the bandwidth
the agreement, throughout the duration of the constraint of 4 Mbps for the flow. The end-to-end
flow (a packet stream from the source to the des- bandwidth of a path is equal to the bandwidth of
tination). In other words, the network has to pro- the bottleneck link (i.e., link having minimum
vide a set of service guarantees while transporting bandwidth among all the links of a path). The
a flow. end-to-end delay of a path is equal to the sum of
After receiving a service request from the user, delays of all the links of a path. Clearly path 3 is
the first task is to find a suitable loop-free path not optimal in terms of hop count and/or end-
from the source to the destination that will have to-end delay parameters, while path 1 is optimal
the necessary resources available to meet the QoS in terms of both hop count and end-to-end delay
requirements of the desired service. This process parameters. Hence, QoS routing has to select a
is known as QoS routing. After finding a suitable suitable path that meets the QoS constraints spec-
path, a resource reservation protocol is employed ified in the service request made by the user. QoS
to reserve necessary resources along that path. routing has been described in detail later in this
QoS guarantees can be provided only with appro- paper.
priate resource reservation techniques. For exam- QoS provisioning often requires negotiation
ple, consider the network shown in Fig. 1. between host and network, call admission control,
The attributes of each link are shown in a tuple resource reservation, and priority scheduling of
ÆBW, Dæ, where BW and D represent available packets. QoS can be rendered in AWNs through
bandwidth in Mbps and delay 1 in milliseconds. several ways, viz., per flow, per link, or per node.
In AWNs, the boundary between the service pro-
vider (network) and the user (host) is not defined
clearly, thus making it essential to have better
1
Delay includes transmission delay, propagation delay, and coordination among the hosts to achieve QoS.
queuing delay. Characteristics of AWNs such as lack of central
T.B. Reddy et al. / Ad Hoc Networks 4 (2006) 83–124 85

Table 1
Available paths from node B to node G
No. Path Hop count BW (Mbps) Delay (ms)
1 B!E!G 2 2 9
2 B!E!F!G 3 2 11
3 B!C!F!G 3 4 15
4 B!C!F!E!G 4 3 19
5 B!A!D!E!G 4 2 23
6 B!A!D!E!F!G 5 2 25

coordination, mobility of hosts, and limited avail-  Dynamically varying network topology:
ability of resources make QoS provisioning very Since the nodes in an ad hoc wireless network
challenging. do not have any restriction on mobility, the net-
work topology changes dynamically. Hence
2.1. QoS parameters in ad hoc wireless networks the admitted QoS sessions may suffer due to fre-
quent path breaks, thereby requiring such ses-
As different applications have different require- sions to be re-established over new paths.
ments, the services required by them and the asso- The delay incurred in re-establishing a QoS ses-
ciated QoS parameters differ from application to sion may cause some of the packets belonging
application. For example, in case of multimedia to that session to miss their delay targets/dead-
applications, bandwidth, delay jitter, and delay lines, which is not acceptable for applications
are the key QoS parameters, whereas military that have stringent QoS requirements.
applications have stringent security requirements.  Imprecise state information: In most cases, the
For applications such as emergency search and nodes in an ad hoc wireless network maintain
rescue operations, availability of network is the both the link-specific state information and
key QoS parameter. Applications such as group flow-specific state information. The link-specific
communication in a conference hall require that state information includes bandwidth, delay,
the transmissions among nodes consume as mini- delay jitter, loss rate, error rate, stability, cost,
mum energy as possible. Hence battery life is the and distance values for each link. The flow-
key QoS parameter here. specific information includes session ID, source
Unlike traditional wired networks, where the address, destination address, and QoS require-
QoS parameters are mainly characterized by ments of the flow (such as maximum bandwidth
the requirements of multimedia traffic, in AWNs requirement, minimum bandwidth requirement,
the QoS requirements are more influenced by the maximum delay, and maximum delay jitter).
resource constraints of the nodes. Some of the The state information is inherently imprecise
resource constraints are battery charge, processing due to dynamic changes in network topology
power, and buffer space. and channel characteristics. Hence routing
decisions may not be accurate, resulting in
some of the real-time packets missing their
3. Issues and challenges in providing QoS deadlines.
in ad hoc wireless networks  Lack of central coordination: Unlike wireless
LANs and cellular networks, AWNs do not
Providing QoS support in AWNs is an active have central controllers to coordinate the activ-
research area. AWNs have certain unique charac- ity of nodes. This further complicates QoS
teristics that pose several difficulties in provision- provisioning in AWNs.
ing QoS. A detailed discussion on how the  Error prone shared radio channel: The radio
characteristics of AWNs affects QoS provisioning channel is a broadcast medium by nature. Dur-
is given below: ing propagation through the wireless medium
86 T.B. Reddy et al. / Ad Hoc Networks 4 (2006) 83–124

the radio waves suffer from several impairments user or application). It is responsible for reserv-
such as attenuation, multi-path propagation, ing resources at all intermediate nodes along the
and interference (from other wireless devices path from the source to the destination as re-
operating in the vicinity). quested by the QoS session. QoS resource reser-
 Hidden terminal problem: The hidden terminal vation mechanisms can be broadly classified
problem is inherent in AWNs. This problem into two categories, hard state and soft state res-
occurs when packets originating from two or ervation mechanisms. In hard state resource
more sender nodes, which are not within the reservation schemes, resources are reserved at
direct transmission range of each other, collide all intermediate nodes along the path from the
at a common receiver node. It necessitates re- source to the destination throughout the dura-
transmission of packets, which may not be tion of the QoS session. If such a path is broken
acceptable for flows that have stringent QoS due to network dynamics, these reserved re-
requirements. The RTS/CTS control packet sources have to be explicitly released by a deal-
exchange mechanism, proposed in [1] and location mechanism. Such a mechanism not
adopted later in the IEEE 802.11 standard [2], only introduces additional control overhead,
reduces the hidden terminal problem only to a but may also fail to release resources completely
certain extent. BTMA [3] and DBTMA [4] pro- in case a node previously belonging to the
vide two important solutions for this problem. session becomes unreachable. Due to these
 Limited resource availability: Resources such as problems soft state resource reservation mecha-
bandwidth, battery life, storage space, and nisms, which maintain reservations only for
processing capability are limited in AWNs. small time intervals, are used. These reserva-
Out of these, bandwidth and battery life are tions get refreshed if packets belonging to
very critical resources, the availability of which the same flow are received before the timeout
significantly affects the performance of the period. The soft state reservation timeout
QoS provisioning mechanism. Hence effi- period can be equal to packet inter-arrival time
cient resource management mechanisms are re- or a multiple of the packet inter-arrival time. If
quired for optimal utilization of these scarce no data packets are received for the specified
resources. time interval, the resources are deallocated in
 Insecure medium: Due to the broadcast nature a decentralized manner without incurring any
of the wireless medium, communication additional control overhead. Thus no explicit
through a wireless channel is highly insecure. tear down is required for a flow. The hard state
Hence security is an important issue in AWNs, schemes reserve resources explicitly and hence
especially for military and tactical applica- at high network loads, the call-blocking ratio
tions. AWNs are susceptible to attacks such will be high, where as soft state schemes provide
as eavesdropping, spoofing, denial of service, high call acceptance at a gracefully degraded
message distortion, and impersonation. With- fashion.
out sophisticated security mechanisms, it is  Stateful vs stateless approach: In the stateful
very difficult to provide secure communication approach, each node maintains either global
guarantees. state information or only local state informa-
tion, while in the case of stateless approach no
Some of the design choices for providing QoS such information is maintained at the nodes.
support are described below: State information includes both the topology
information and the flow-specific information.
 Hard state vs soft state resource reservation: If global state information is available, the
QoS resource reservation is one of the very source node can use a centralized routing algo-
important components of any QoS framework rithm to route packets to the destination. The
(a QoS framework is a complete system that performance of the routing protocol depends
provides required/promised services to each on the accuracy of the global state information
T.B. Reddy et al. / Ad Hoc Networks 4 (2006) 83–124 87

maintained at the nodes. Significant control Keeping network dynamics of AWNs in mind,
overhead is incurred in gathering and maintain- it is very difficult to provide hard QoS guaran-
ing global state information. On the other hand, tees to user applications. Thus, QoS guarantees
if mobile nodes maintain only local state infor- can only be given within certain statistical
mation (which is more accurate), distributed bounds. Almost all QoS approaches available in
routing algorithms can be used. Even though the literature provide only soft QoS guarantees.
control overhead incurred in maintaining local
state information is low, care must be taken
to obtain loop-free routes. In the case of state- 4. Classifications of QoS solutions
less approach, neither flow-specific nor link-
specific state information is maintained at the The QoS solutions can be classified in two ways.
nodes. Though the stateless approach solves One classification is based on the QoS approach
the scalability problem permanently and re- employed, while the other one classifies QoS solu-
duces the burden (storage and computation) tions based on the layer at which they operate in
on nodes, providing QoS guarantees becomes the network protocol stack.
extremely difficult.
 Hard QoS vs soft QoS approach: The QoS pro- 4.1. Classifications of QoS approaches
visioning approaches can be broadly classified
into two categories, hard QoS and soft QoS ap- As shown in Fig. 2 several criteria are used for
proaches. If QoS requirements of a connection classifying QoS approaches. The QoS approaches
are guaranteed to be met for the whole duration can be classified based on the interaction between
of the session, the QoS approach is termed as the routing protocol and the QoS provisioning
hard QoS approach. If the QoS requirements mechanism, based on the interaction between the
are not guaranteed for the entire session, the network and the MAC layers, or based on the
QoS approach is termed as soft QoS approach. routing information update mechanism. Based

Classifications of QoS
approaches

Based on interaction between routing Based on interaction between network Based on the routing information
protocol and QoS provisioning mechanism and MAC layers update mechanism employed

Coupled Decoupled Independent Dependent On demand Table driven Hybrid

TBP [14] INSIGNIA [30] TBP [14] TDR [16] TBP [14] PLBQR [15] BR [19]
PLBQR [15] SWAN [33] PLBQR [15] BR [19] TDR [16] CEDAR [25]
TDR [16] PRTMAC [34] QoSAODV [18] OQR [21] QoSAODV [18]
QoSAODV [18] INSIGNIA [30] OLMQR [22] OQR [21]
BR [19] INORA [31] AQR [23] OLMQR [22]
OQR [21] SWAN [33] CEDAR [25] AQR [23]
OLMQR [22] PRTMAC [34] INORA [31]
AQR [23] PRTMAC [34]
CEDAR [25]
INORA [31]

Fig. 2. Classifications of QoS approaches.


88 T.B. Reddy et al. / Ad Hoc Networks 4 (2006) 83–124

on the interaction between the routing protocol porates features of both the table-driven and the
and the QoS provisioning mechanism, QoS ap- on-demand approaches.
proaches can be classified into two categories, cou-
pled and decoupled QoS approaches. In the case of 4.2. Layer-wise classification of existing QoS
the coupled QoS approach, the routing protocol solutions
and the QoS provisioning mechanism closely inter-
act with each other for delivering QoS guarantees. The existing QoS solutions can also be classified
If the routing protocol changes, it may fail to en- based on which layer in the network protocol stack
sure QoS guarantees. But in the case of decoupled they operate in. Fig. 3 gives a layer-wise classifica-
approach, the QoS provisioning mechanism does tion of QoS solutions. The figure also shows some
not depend on any specific routing protocol to en- of the cross-layer QoS solutions proposed for
sure QoS guarantees. AWNs. The following sections describe the vari-
Similarly, based on the interaction between the ous QoS solutions listed in Fig. 3.
routing protocol and the MAC protocol, QoS ap-
proaches can be classified into two categories,
independent and dependent QoS approaches. In 5. MAC layer solutions
the independent QoS approach, the network layer
is not dependent on the MAC layer for QoS provi- The MAC protocol determines which node
sioning. The dependent QoS approach requires the should transmit next on the broadcast channel
MAC layer to assist the routing protocol for QoS when several nodes are competing for transmission
provisioning. Finally, based on the routing infor- on that channel. Some of the MAC protocols that
mation update mechanism employed, QoS ap- provide QoS support for applications in AWNs
proaches can be classified into three categories are described below.
viz., table-driven, on-demand, and hybrid QoS ap-
proaches. In the table-driven approach, each node 5.1. Cluster TDMA
in the network maintains a routing table which
aids in forwarding packets. In the on-demand Gerla and Tsai proposed cluster TDMA [5] for
approach, no such tables are maintained at the supporting real-time traffic in AWNs. In band-
nodes, and hence the source node has to discover width-constrained AWNs, the limited resources
hthe route on the fly. The hybrid approach incor- available need to be managed efficiently. To

Layer wise QoS solutions

QoS frameworks
MAC/DLL solutions Network layer solutions [cross layer solutions]
Cluster TDMA [5] INSIGNIA [30]
802.11e [6-10] INORA [31]
On demand Table driven Hybrid SWAN [33]
DBASE [11]
MACA/PR [12] PRTMAC [34]
TBP [14] PLBQR [15] BR [19]
RTMAC [13]
TDR [16] CEDAR [25]
QoSAODV [18]
OQR [21]
OLMQR [22]
AQR [23]

Fig. 3. Layer-wise classification of QoS solutions.


T.B. Reddy et al. / Ad Hoc Networks 4 (2006) 83–124 89

achieve this goal, a dynamic clustering scheme is The data phase supports both real-time and
used in cluster TDMA. In this clustering ap- best-effort traffic. Based on the bandwidth require-
proach, nodes are split into different groups. Each ment of the real-time session, a virtual circuit (VC)
group has a cluster-head (elected by members of is setup by allocating sufficient number of slots in
that group), which acts as a regional broadcast the data phase. The remaining data slots (i.e., free
node and as a local coordinator to enhance the slots) can be used by the best-effort traffic using the
channel throughput. Every node within a cluster slotted-ALOHA scheme. For each node, a prede-
is one hop away from the cluster-head. Formation fined slot is assigned in control phase to broadcast
of clusters and selection of cluster-heads is done in its control information. The control information is
a distributed manner. Clustering algorithms split transmitted over a common code throughout the
the nodes into clusters such that they are intercon- network. At the end of the control phase, each
nected and cover all the nodes. Three such node would have learned from the information
algorithms used are, lowest-ID algorithm, high- broadcast by the cluster-head, the slot reservation
est-degree (degree refers to number of neighbors status of the data phase and the power gain lists of
which are within transmission range of a node) all its neighbors. This information helps a node to
algorithm, and least cluster change (LCC) algo- schedule free slots, verify the failure of reserved
rithm. In lowest-ID algorithm, a node becomes a slots, and drop expired real-time packets. A fast
cluster-head if it has the lowest ID among all its reservation scheme is used in which a reservation
neighbors. In the highest-degree algorithm, a node is made when the first packet is transmitted, and
with a degree greater than the degrees of all its the same slots in the subsequent frames can be
neighbors becomes the cluster-head. In LCC algo- used for the same connection. If the reserved slots
rithm, cluster-head change occurs only if a change remain idle for a certain timeout period, then they
in network causes two cluster-heads to come into are released.
one cluster or one of the nodes moves out of the
range of all the cluster-heads. In each cluster, the
5.2. IEEE 802.11e
corresponding cluster-head maintains a power
gain 2 matrix. It contains the power gain lists of
In this section the IEEE 802.11 MAC proto-
all the nodes that belong to a particular cluster.
col is first described briefly. Then, the recently
It is useful for controlling the transmission power
proposed mechanisms for QoS support, namely
and the code division within a cluster.
enhanced distributed coordination function
The time division multiple access (TDMA)
(EDCF) and hybrid coordination function
scheme is used within a cluster for controlling ac-
(HCF), defined in the IEEE 802.11e draft, are dis-
cess to the channel. Further, it is possible for mul-
cussed.
tiple sessions to share a given TDMA slot via code
division multiple access (CDMA). Across clusters,
either spatial reuse of the time-slots or different 5.2.1. IEEE 802.11 MAC protocol
spreading codes can be used to reduce the effect The 802.11 MAC protocol [2] supports two
of inter-cluster interference. A synchronous time modes of operation, namely distributed coordina-
division frame is defined to support TDMA access tion function (DCF) and point coordination func-
within a cluster and to exchange control informa- tion (PCF). The DCF mode provides best-effort
tion. Each synchronous time division frame is di- service, while the PCF mode has been designed
vided into slots. Slots and frames are to provide real-time traffic support in infrastruc-
synchronized throughout the network. A frame is ture-based wireless network configurations. The
split into a control phase and a data phase. DCF mode does not use any kind of centralized
control, all stations are allowed to contend for
the shared medium simultaneously. CSMA/CA
2
Power gain is the power propagation loss from the mechanism and random backoff scheme are used
transmitter to the receiver. to reduce frame collisions.
90 T.B. Reddy et al. / Ad Hoc Networks 4 (2006) 83–124

The PCF mode requires an access point (AP arbitrary length. Further, the transmission time
i.e., central controller) to coordinate the activity of an MSDU is not under the control of the PC be-
of all nodes in its coverage area. The stations cause of different modulation and coding schemes
requesting the PCF mode of operation get associ- specified in the IEEE 802.11 standard. QoS provi-
ated with the PC during the contention period sioning requires giving some traffic higher priority
(CP). With PCF, the channel access alternates be- over other traffic. Such service differentiation is not
tween the contention free period (CFP) and the provided in the DCF mode. Further, the backoff
contention period (CP) for the PCF and DCF mechanism is uniform for all kinds of traffic.
modes of operation, respectively. A CFP and the Due to these reasons, several mechanisms have
following CP form a super-frame. The PC gener- been proposed to enhance the IEEE 802.11 stand-
ates a beacon frame at regular beacon frame inter- ard to provide QoS support. The QoS mechanisms
vals called target beacon transmission time that are proposed as part of the IEEE 802.11e
(TBTT). The value of TBTT is announced in the draft are described below.
beacon frame. Each super-frame starts with a bea-
con frame, which is used to maintain synchroniza- 5.2.2. QoS support mechanisms of IEEE 802.11e
tion among local timers in the stations and to The IEEE 802.11 Task Group e (TGe) has been
deliver protocol related parameters. Fig. 4 shows setup to enhance the current 802.11 MAC protocol
the operation of the network in the combined such that it is able to support multimedia applica-
PCF and DCF modes. The channel access switches tions. The TGe has chosen the virtual DCF
alternately between PCF mode and DCF mode, (VDCF) [7] proposal as the enhanced DCF
but the CFP may shrink due to stretching when (EDCF) access mechanism. EDCF supports real-
DCF takes more time than expected. This happens time traffic by providing differentiated DCF access
when an MSDU is fragmented into several to the wireless medium. The TGe has also specified
MPDUs, hence giving priority to these fragments a hybrid coordination function (HCF) [8] that
over PCF mode of operation. combines EDCF with the features of PCF to sim-
PCF has certain shortcomings which make it plify the QoS provisioning. HCF operates during
unsuitable for supporting real-time traffic [6]. At both the CFP and the CP.
TBTT, the PC has to sense the medium idle for Enhanced distributed coordination function: En-
at least PIFS before transmitting the beacon hanced distributed coordination function (EDCF)
frame. If the medium is busy around TBTT, the [7] provides differentiated and distributed access to
beacon is delayed, thereby delaying the transmis- the wireless medium. Each frame from the higher
sion of real-time traffic that has to be delivered layer carries its user priority (UP). After receiving
in the following CFP. Further, polled stationsÕ each frame, the MAC layer maps it into an access
transmission durations are unknown to the PC. category (AC). Each AC has a different priority of
The MAC frame (i.e., MSDU) of the polled sta- access to the wireless medium. One or more UPs
tion may have to be fragmented and may be of can be assigned to each AC. EDCF channel access

Fig. 4. PCF and DCF frame sharing.


T.B. Reddy et al. / Ad Hoc Networks 4 (2006) 83–124 91

has up to eight ACs [9], to support UPs. EDCF where slottime includes the time needed for a sta-
supports eight UPs. Similar to the DCF, each tion to detect a frame, the propagation delay, the
AC has a set of access parameters, such as CWmin, time needed to switch from the receiving state to
CWmax, AIFS, and transmission opportunity the transmitting state, and the time to signal to
(TXOP) limit. Hence, each AC is an enhanced var- the MAC layer the state of the channel. AIFSN[i]
iant of the DCF. Flows that fall under the same is the AIFS slot count (i.e., number of time slots
AC are effectively given identical priority to access a station has to sense the channel as idle before ini-
the channel. A station accesses the channel based tiating the backoff process) for priority class i and
on the AC of the frame to be transmitted. An ac- takes values greater than zero. For high priority
cess point that provides QoS is called QoS access classes, low AIFSN values are assigned to give
point (QAP). Each QAP shall provide at least four higher priorities for them. After waiting for AIF-
ACs. Each station contends for transmission S[i], each backoff counter is set to a random inte-
opportunities (TXOPs) using a set of EDCF chan- ger drawn from the range:
nel access parameters that are unique to the AC of
the packet to be transmitted. The TXOP is defined ½1; CW ½i þ 1 for each class i with AIFSN ½i ¼ 1;
as an interval of time during which a station has
the right to initiate transmissions. It is character- ½0; CW ½i for other classes i with AIFSN ½i > 1:
ized by a starting time and a maximum duration
called TXOPLimit. Depending on the duration The reason for having a different range for classes
of TXOP, a station may transmit one or more with AIFSN[i] = 1 is to avoid transmissions initi-
MSDUs. Priority of an AC refers to the lowest ated by stations that are operating in the EDCF
UP assigned to that AC. mode from colliding with the hybrid coordinatorÕs
During CP, each AC (of priority i) of the sta- (HC, which is explained later in this section) poll
tion contends for a TXOP and independently packets. The HC operates at QAP and controls
starts a backoff counter after detecting the channel QoS basic service set (QBSS) operation under the
being idle for an arbitration inter frame space HCF. Fig. 5 illustrates the relationship between
(AIFS[i]) as specified in [10]. AIFS[i] is set as given SIFS, PIFS, DIFS, and various AIFS values. As
below: in legacy DCF, if a station detects the channel to
AIFS½i ¼ SIFS þ AIFSN ½i  slottime; be busy before the backoff counter reaches zero,

Fig. 5. An example of EDCF access mechanism.


92 T.B. Reddy et al. / Ad Hoc Networks 4 (2006) 83–124

the backoff counter is suspended. The station has and the CFP. The HCF is usable only in infra-
to wait for the channel to become idle again for structure-based BSSs that provide QoS, i.e.,
an AIFS period, before continuing to decrement QBSSs. The HCF uses a QoS-aware point coordi-
the counter. In this figure, it is assumed that sta- nator, called HC, which is typically collocated with
tion STA1 has traffic that belongs to 3 different a QAP. The HC implements the frame exchange
ACs. The backoff counter of the highest priority sequences and the MSDU handling rules defined
AC expires first, which causes the corresponding in HCF, operating during both the CP and the
AC to seize an EDCF-TXOP for initiating data CFP. It allocates TXOPs to stations and initiates
transmission. The other ACs suspend their backoff controlled contention periods for the stations to
counters and wait for the channel to become idle send reservation requests. When the HC needs ac-
again. When the backoff counter of a particular cess to the wireless medium, it senses the medium.
AC reaches zero, the corresponding station initi- If the medium remains idle for a PIFS period, it
ates a TXOP and transmits frame(s) that have initiates MSDU deliveries. The HC can start con-
the highest priority. TXOPs are allocated via con- tention-free controlled access periods (CAPs) at
tention (EDCF-TXOP) or granted through HCF any time during a CP, after the medium is deter-
(polled-TXOP) [6]. The duration of EDCF-TXOP mined to be idle for at least one PIFS period.
is limited by a QBSS-wide TXOPLimit transmitted A CAP may include one or more TXOPs. Dur-
in beacons by the HC, while during the CFP the ing the CAP, the HC may transmit frames and
starting time and maximum duration of each issue polls to stations which grant them TXOPs.
polled-TXOP is specified in the corresponding At the end of the TXOP or when the station has
CF-Poll frame by the HC. If the backoff counters no more frames to transmit, it explicitly hands
of two or more ACs in a single station reach zero over control of the medium back to the HC. During
at the same time, a scheduler inside the station CP, each TXOP begins either when the medium
avoids the virtual collision by granting the TXOP is determined to be available under the EDCF
to the highest priority AC, while low priority rules (EDCF-TXOP) or when the station receives
ACs behave as if there was an external collision a QoS CF-Poll frame from the HC (Polled-
on the wireless medium. TXOP).
Hybrid coordination function: The Hybrid coor- Fig. 6 illustrates CFP in the HCF mode of oper-
dination function (HCF) [8] combines features of ation. During CFP, the HC grants TXOPs to sta-
EDCF and PCF to provide the capability of selec- tions by sending QoS CF-Poll frames. The polled
tively handling MAC service data units (MSDUs), station can transmit one or more MSDUs in the
in a manner that has upward compatibility with allocated TXOP. If size of an MSDU is too large,
the both DCF and PCF. It uses a common set of it can be divided into two or more fragments and
frame exchange sequences during both the CP transmitted sequentially with SIFS waiting periods

Fig. 6. An example of HCF access mechanism.


T.B. Reddy et al. / Ad Hoc Networks 4 (2006) 83–124 93

in between them. These fragments have to be fully, an rt-station need not contend for the chan-
acknowledged individually. The CFP ends after nel any more during its whole session.
the time announced in the beacon frame or by a Bandwidth reservation: One of the rt-stations
CF-End frame from the HC. takes the responsibility of initiating the contention
free period (CFP) periodically. Such an rt-station
5.3. DBASE is designated as CFP generator (CFPG). The
CFP is utilized by the active rt-stations present in
The distributed bandwidth allocation/sharing/ the network to transmit their rt-frames. The
extension (DBASE) protocol [11] supports multi- CFPG issues a reservation frame (RF) periodically
media traffic [both variable bit rate (VBR) and and has the right to send its rt-frame first in the
constant bit rate (CBR)] over ad hoc WLANs. In CFP. The maximum delay between any two con-
an ad hoc WLAN, there is no fixed infrastructure secutive RFs is Dmax, where Dmax is the minimum
(i.e., AP) to coordinate the activity of individual of maximum delay bounds among all active
stations. The stations are part of a single-hop wire- rt-connections. The RF is a broadcast frame that
less network and contend for the broadcast chan- announces the beginning of the CFP.
nel in a distributed manner. For real-time traffic Assume that at time t an rt-station wants to
(rt-traffic), a contention-based process is used in transmit data. Then it monitors the channel for
order to gain access to the channel. Once a station detecting the RF during the interval (t, t + Dmax).
gains channel access, a reservation-based process is If the rt-station detects the RF, it waits until the
used to transmit the subsequent frames. The non- CFP finishes. After the CFP finishes, the rt-station
real-time stations (nrt-stations) regulate their ac- keeps sensing the channel for a period of real-time
cesses to the channel according to the standard backoff time (RBT) after detecting the channel as
CSMA/CA protocol used in 802.11 DCF. DBASE being idle for a PIFS period. The RBT of an rt-
is still compliant with the IEEE 802.11 standard. station is given by
Like the IEEE 802.11 standard, the DBASE RBT ¼ randðc; dÞ  slottime;
protocol divides the frames into three priority
where rand(c, d) returns a pseudo random integer
classes. Frames belonging to different priority
from a uniform distribution over an interval [c, d].
classes have to wait for different IFSs before they
The values of c and d are set to 0 and 3, respec-
are transmitted. Stations have to wait for a mini-
tively. If the channel is idle, the RBT counter is
mum of PIFS, before transmitting rt-frames such
decremented till it reaches zero, but it is frozen
as reservation frame (RF) and request to send
while the medium is sensed busy. Once the RBT
(RTS). The nrt-frames have the lowest priority,
counter reaches zero, the rt-station contends for
and hence stations have to wait for DIFS before
its reservation by sending an RTS packet. If
transmitting such frames.
no collision occurs, it updates its tables and
transmits its first rt-frame. If collision occurs,
5.3.1. The access procedure for real-time stations the P-persistent scheme is used to resolve the con-
Each rt-station maintains a virtual ReSer- tention. The rt-station involved in collision re-
Vation table (RSVT). In this virtual table, the transmits the RTS in the next time slot (i.e.,
information regarding all rt-stations that have slottime) with a probability P. With probability
successfully reserved the required bandwidth is (1
P), it defers for at least one time slot and
recorded. Before initiating an rt-session, the recalculates the RBT (called RBTP) using the fol-
rt-station sends an RTS in order to reserve the lowing equation:
required bandwidth. Before transmitting the
RBTP ¼ randðc þ 1; dÞ  slottime:
RTS, a corresponding entry is made in the RSVT
of the node. Every station that hears this RTS If an RF is not received during the interval
packet also makes a corresponding entry in its (t, t + Dmax), it means that there are no active rt-
RSVT. After recording into the RSVT success- stations. If the channel is still idle in the interval
94 T.B. Reddy et al. / Ad Hoc Networks 4 (2006) 83–124

(t + Dmax + d, t + Dmax + d + PIFS) and no RF is de- After listening to the channel for Dmax time period
tected, the rt-station that wants to transmit data in order to detect the presence of an RF, stations A
at time instant t, will execute the backoff scheme. and C conclude that no CFPG exists in the net-
Here d represents the remaining transmitting time work. Then, if they find the channel as being idle
of the current frame at the time instant t + Dmax. for a PIFS period, they initiate their backoff tim-
During the backoff process, the rt-station should ers. In this case, assume that RBTA is one slot
keep monitoring the channel to check whether and RBTC is three slots. During the backoff proc-
any rt-station has started acting as the CFP Gen- ess, once the channel becomes busy, the backoff
erator. If RBT reaches zero, rt-station sends an timer of station C is paused as shown in Fig.
RTS to the receiver. If no collision occurs, it gets 7(a). It is restarted from the same value once the
CTS from the receiver and acts as CFPG. If a col- channel becomes idle again. After RBTA counts
lision occurs, the P-persistent scheme as men- down to zero, station A seizes the channel and
tioned above is used to decide on when the sends an RTS. If no collision occurs, station A re-
stations are to transmit again. ceives a CTS within SIFS time duration. Then sta-
The bandwidth reservation scheme is illustrated tion A records its reservation information into the
in Fig. 7. Fig. 7(a) depicts a case in which no col- RSVT and becomes the CFPG. Since station A is
lision occurs, while Fig. 7(b) shows a scenario in currently playing the role of CFPG, it transmits
which a collision occurs. In Fig. 7(a), stations A an RF before transmitting its first rt-frame. Once
and C have rt-frames for transmission to stations station A completes its transmission, station C
B and D, respectively. Besides these, station E continues its backoff process. When RBTC counts
has nrt-frames to be transmitted to station D. down to zero, station C reserves bandwidth by

RBT (1 slot) SIFS PIFS DIFS PIFS


PIFS
A RTS RF rt–pkt ... RF rt–pkt

B CTS ACK ... ACK


freezes RBT RBT (remaining 2 slots)
C RTS rt–pkt ...

D CTS ACK CTS ACK ...

E RTS nrt–pkt ...


DBT(3 slots)

RP < delay < D max


(a)

PIFS RBT (1 slot) SIFS PIFS DIFS PIFS

A RTS RTS RF rt–pkt ... RF rt–pkt

B CTS ACK ...


RBTP (2 slots)
RTS RTS rt–pkt ...
C

D CTS ACK CTS ACK ...

E RTS nrt–pkt ...


DBT(3 slots)

RP < delay < D max


(b)

collision

Fig. 7. An example of new rt-stations joining the network: (a) without collision and (b) with collision.
T.B. Reddy et al. / Ad Hoc Networks 4 (2006) 83–124 95

adding a corresponding entry into the RSVT and CTS–DATA–ACK exchange. Therefore there is a
transmits its first rt-frame. When station E detects possibility of many fragmented free slots not being
the channel as being idle for DIFS, it implies that used at all, reducing the bandwidth efficiency of
no other rt-station wants to transmit currently, the MACA/PR.
and hence station E sends its RTS as soon as
DBTE counts down to zero. By the end of a
contention period whose length is limited by a
6. Network layer solutions
parameter RPmax (maximum repetition period),
bandwidth would be reserved for the rt-stations,
The bandwidth reservation and real-time traffic
and thereafter they need not exchange RTS/CTS
support capability of MAC protocols can ensure
control frames before transmitting their rt-frames.
reservation at the link level only, hence the
The delay between two RFs varies from real-time
network layer support for ensuring end-to-end
period (RP) to Dmax, where RP is sum of the
resource negotiation, reservation, and reconfigura-
CFP (rt-stations reserved period) and the CP for
tion is very essential. This section describes the
new rt-stations.
existing network layer solutions that support
In Fig. 7(b), assume that both station A and sta-
QoS provisioning.
tion C generate RBT as one slot. After waiting for
one time slot, both transmit their RTS frames,
which results in a collision. Then the P-persistent 6.1. QoS routing protocols
scheme is applied. Assume that station A gets ac-
cess to the channel during the next slot itself, but QoS routing protocols search for routes with
station C does not. Then, station A will retransmit sufficient resources in order to satisfy the QoS
its RTS in the following slot, while station C initi- requirements of a flow. The information regarding
ates a new backoff time RBTPC. If no collision oc- the availability of resources is managed by a re-
curs, station A gets a CTS within SIFS, and sends source management module which assists the
out an RF and its rt-frame. When RBTPC counts QoS routing protocol in its search for QoS feasible
down to zero, station C seizes the channel to send paths. The QoS routing protocol should find paths
an RTS. If any collision occurs, the rt-station uses that consume minimum resources. The QoS met-
the P-persistent scheme to resolve the collision. rics can be classified as additive metrics, concave
The collision resolution process is restricted from metrics, and multiplicative metrics. P
crossing the RPmax boundary. An additive metric Am is defined as hi¼1 Li ðmÞ,
The MAC layer solutions such as MACA/PR where Li(m) is the value of metric m over link Li
[12] and RTMAC [13] provide real-time traffic and Li 2 P. Hop length of path P is h. A concave
support in asynchronous AWNs. One advantage metric represents the minimum value over a path
of these solutions is their asynchronous mode of P and is formally defined as Cm = min(Li(m)),
operation where nodes do not require any global Li(m) 2 P. A multiplicative metric represents the
time synchronization. Another advantage of productQhof QoS metric values, and is defined as
RTMAC is its bandwidth efficiency. Since nodes M m ¼ i¼1 ðLi ðmÞÞ, Li(m) 2 P. To find a QoS feasi-
operate in the asynchronous mode, successive res- ble path for a concave metric, the available re-
ervation slots may not strictly align with each source on each link should be at least equal to
other. Hence small fragments of free slots may the required value of the metric. Bandwidth is a
occur in between reservation slots. If the free slot concave metric, while cost, delay, and delay jit-
is just enough to accommodate a DATA and ter are additive metrics. Reliability or availability
ACK packet, then RTMAC can make use of the of a link, based on some criteria such as link-
free slot, by transmitting ResvRTS–ResvCTS– break-probability is a multiplicative metric. Find-
ResvACK in some other free slot. Such small free ing an optimal path with multiple constraints
slots cannot be made use of in MACA/PR, which may be an NP-complete problem if it involves
requires the free slot to accommodate entire RTS– two or more additive metrics. For example, finding
96 T.B. Reddy et al. / Ad Hoc Networks 4 (2006) 83–124

a delay-constrained least cost path is an NP-com- ing a feasible path. If the QoS requirements are
plete problem. not stringent and can be met easily, fewer tickets
To assist QoS routing, the topology informa- are issued in order to reduce the level of search,
tion can be maintained at the nodes of AWNs. which in turn reduces the control overhead. There
The topology information needs to be refreshed exists a trade-off here between the performance of
frequently by sending link state update messages, the QoS routing protocol and the control over-
which consume precious network resources such head.
as bandwidth and battery power. Otherwise, the The state information, at the source node,
dynamically varying network topology may cause about intermediate nodes is useful in finding a
the topology information to become imprecise. much better QoS path, even if such information
This trade-off affects the performance of the QoS is not precise. The state information maintained
routing protocol. As path breaks occur frequently at each node comprises of estimations of end-to-
in AWNs compared to wired networks where a end delay and available path bandwidth for every
link goes down very rarely, the path satisfying other node present in the network. When an inter-
the QoS requirements needs to be recomputed mediate node receives a probe packet, it is either
every time the current path gets broken. The split to explore more than one path or is forwarded
QoS routing protocol should respond quickly in to just one neighbor node based on the state infor-
case of path breaks and recompute the broken mation available at that intermediate node.
path or bypass the broken link without degrading Based on the idea of ticket-based probing, two
the level of QoS. In the literature, numerous rout- heuristic algorithms are proposed, one for delay-
ing protocols have been proposed for finding QoS constrained QoS routing, and the other for band-
paths. In the following sections some of these QoS width-constrained QoS routing. In delay-con-
routing protocols are described. strained QoS routing, each probe accumulates the
delay of the path it has traversed so far. In other
6.2. Ticket-based QoS routing protocol words, if an intermediate node A receives a probe
packet (PKT) from a neighbor node B, node A up-
Ticket-based QoS routing [14] is a distributed dates the delay field in PKT by adding delay value
QoS routing protocol for AWNs. It can tolerate of the link between nodes B and A. Then node A
imprecise state information during QoS route determines the list of candidate neighbors to which
computation and exhibits good performance even it has to send probe packets. It distributes tickets
when the degree of imprecision is high. present in PKT among these new probe packets
and then forwards these probe packets to the
6.2.1. Protocol overview respective candidate neighbors. If multiple probe
The basic idea of the ticket-based probing pro- packets arrive at the destination node (with each
tocol is that the source node issues a certain num- carrying the list of intermediate nodes along its
ber of tickets and sends these tickets in probe path), it selects the path with least cost as the pri-
packets for finding a QoS feasible path. Each mary path and the other paths as the backup paths,
probe packet carries one or more tickets. Each which will be used when the primary path is broken
ticket corresponds to one instance of the probe. due to the mobility of intermediate nodes.
For example, when the source node issues three
tickets, it means that a maximum of three paths 6.2.2. Optimizing cost of a feasible path
can be probed in parallel. The number of tickets This protocol searches for the lowest cost path
generated is based on the precision of state infor- among the feasible paths. This is done during the
mation available at the source node and the QoS QoS path probing. The source node issues two
requirements of the connection request. If the types of tickets, yellow tickets and green tickets,
available state information is not precise or if the and sends them along with probe packets. Yellow
QoS requirements are very stringent, more tickets tickets prefer paths that satisfy the requirement of
are issued in order to improve the chances of find- a probe in terms of QoS metrics. For example, in
T.B. Reddy et al. / Ad Hoc Networks 4 (2006) 83–124 97

delay-constrained QoS routing, yellow tickets are changes very rapidly. In delay-constrained QoS
used to search for paths that have least delay, such routing, the queuing delay and the processing de-
that the end-to-end delay requirement is met. If the lay at the intermediate nodes are not taken into
delay requirement is very large and can be met eas- consideration while measuring the delay experi-
ily, only one yellow ticket is issued. If the delay enced so far by the probe packet. This may cause
requirement is too small to be met, then the source some data packets to miss their deadlines. The
node does not issue any yellow ticket and rejects routing algorithm works well only when the aver-
the connection request. Otherwise, more than one age lifetime of an established path is much longer
yellow ticket is issued to search multiple paths for than the average rerouting time. During the
finding a feasible QoS path. Green tickets are used rerouting process, if QoS requirements are not
to search for QoS paths with low costs. Similar to met, data packets are transmitted as best-effort
the manner in which the source node determines packets. This may not be acceptable for applica-
the number of yellow tickets, it also determines tions that have stringent QoS requirements.
the number of green tickets to be issued on the basis
of the delay requirement of the connection request. 6.3. Predictive location based QoS routing
The distribution of yellow and green tickets (by an protocol
intermediate node to its candidate neighbors) is
based on the delay and cost requirements of the The predictive location-based QoS routing pro-
connection request, respectively. The concept be- tocol (PLBQR) [15] is based on the prediction of
hind two types of tickets is to use the more aggres- the location of nodes in AWNs. The prediction
sive green tickets to find a least cost feasible path, scheme overcomes to some extent the problem
and use yellow tickets as a backup to maximize arising due to the presence of stale routing infor-
the probability of finding a feasible path. mation. No resources are reserved along the path
from the source to the destination, but QoS-aware
6.2.3. Advantages and disadvantages admission control is performed. The QoS routing
The objective of ticket-based probing is to im- protocol takes the help of an update protocol
prove the average call acceptance ratio (ACAR) and location and delay prediction schemes. The
of AWNs. ACAR is the ratio of the number of update protocol aids each node in broadcasting
calls accepted to the number of calls received by its geographic location and resource information
the network. The protocol adapts dynamically to to its neighbors. Using the update messages re-
the requirements of the application and the degree ceived from the neighbors, each node updates its
of imprecision of state information maintained. It own view of the network topology. The update
gives a trade-off between control overhead in- protocol has two types of update messages viz.,
curred in finding a feasible path and the cost of Type 1 update and Type 2 update. Each node gen-
feasible path. As the maximum number of probes erates a Type 1 update message periodically. A
in the network is equal to the number of tickets is- Type 2 update message is generated when there is
sued, the control overhead is bound by the number a considerable change in the nodeÕs velocity or
of tickets. The performance of the protocol de- direction of motion. From its recent update mes-
pends on the ticket issuing mechanism at the sages, each node can calculate an expected geo-
source node and the ticket splitting procedure at graphical location it should be located at a
the intermediate nodes. particular instant and then periodically checks if
The protocol assumes that each node has global it has deviated by a distance greater than d from
state information, but maintaining such informa- this expected location. If it has deviated, a Type
tion incurs huge control overhead in the already 2 update is generated.
bandwidth constrained AWNs. The proposed heu-
ristic algorithms, which are based on an imprecise 6.3.1. Location and delay predictions
state information model, may fail in finding a fea- In establishing a connection to the destination
sible path in the extreme cases where the topology D, the source S has to first predict the geographic
98 T.B. Reddy et al. / Ad Hoc Networks 4 (2006) 83–124

location of node D and the intermediate nodes, at Using the above Eq. (2), source S can calculate yf
the instant when the first packet reaches the if it knows xf, which in turn can be calculated as
respective nodes. Hence, this step involves location follows. Using similarity of triangles again, the fol-
as well as propagation delay prediction. The loca- lowing equation is obtained:
tion prediction is used to predict geographic loca- ðy 2
y 1 Þðxf
x2 Þ
tion of the node at a particular instant tf in the yf
y2 ¼ : ð3Þ
x2
x1
future when the packet reaches that node. The
propagation delay prediction is used to estimate By using Pythagoras theorem,
the value of tf used in the above location predic- 2 2 2
ðxf
x2 Þ þ ðy f
y 2 Þ ¼ v2 ðtf
t2 Þ : ð4Þ
tion. These predictions are performed based on
the previous update messages received from the Substituting for yf
y2 from Eq. (3) in the above
respective nodes. Eq. (4) and solving for xf, the following equation
Location prediction: Let (x1, y1) at t1 and (x2, y2) is obtained:
at t2 (t2 > t1) be the latest two updates from the des- vðtf
t1 Þðx2
x1 Þ
tination D to the source node S. Assume that the xf ¼ x2 þ qffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi : ð5Þ
2 2
second update message also indicates v, which is ðx2
x1 Þ þ ðy 2
y 1 Þ
the velocity of D at (x2, y2). Assume that node S
wishes to predict the location (xf, yf) of node D If updates include the direction information of
at some instant tf in the future. This situation is de- nodes, only one previous update is required to pre-
picted in Fig. 8. The value of tf has to be estimated dict future location (xf, yf). The calculation of
first using the delay prediction scheme, which (xf, yf) is then exactly same as that of the periodic
would be explained later in this section. From calculation of expected location (xe, ye) by the up-
Fig. 8, using similarity of triangles, the following date protocol [15].
equation is obtained: Delay prediction: The source node S has to pre-
dict the time instant tf at which a packet reaches
the given destination node or intermediate node
y 2
y 1 x2
x1
¼ : ð1Þ D. This can be known only if the end-to-end delay
y f
y 1 xf
x1
between nodes S and D is known. It is assumed
that the end-to-end delay for a data packet from
By solving the above equation for yf, node S to node D is equal to the delay experienced
ðxf
x1 Þðy 2
y 1 Þ by the latest update message received by node S
yf ¼ y1 þ : ð2Þ
x2
x1 from node D.

predicted location
(x f , y f ) at t f

v ( t f – t 2) y– y2
f

(x 2 , y 2 ) at t 2 x–x
f 2
y–
f
y1

Direction of motion of D y–y


2 1

(x 1 , y 1 ) at t 1
xf–x1

Fig. 8. Prediction of location at a future time by node S using last two updates.
T.B. Reddy et al. / Ad Hoc Networks 4 (2006) 83–124 99

6.3.2. QoS routing chosen route until the end of the connection or
Each node in the network has information until the route is recomputed in anticipation of
about the complete network topology, which is re- breakage. Note that node S only uses its view of
freshed by means of update messages. Using this the network for the entire computation.
information, the source node performs source-
routing. The network state information is main- 6.3.3. Advantages and disadvantages
tained in two tables viz., the update table and the PLBQR protocol uses location and delay pre-
routing table. When node A receives an update diction schemes which reduce to some extent the
message from node B, node A updates the corre- problem arising due to the presence of stale rout-
sponding entry for node B in the update table. ing information. Using the prediction schemes, it
For some nodes, node A maintains proximity lists. estimates when a QoS session will experience path
Proximity list of node K is a list of all nodes lying breaks and proactively finds an alternate path to
within a distance 1.5 · transmission range of node reroute the QoS session quickly. But, as no re-
K. The proximity lists are used during route com- sources are reserved along the route from the
putation. By maintaining proximity list rather source to the destination, it is not possible to pro-
than neighbor list for node K (i.e., list of nodes vide hard QoS guarantees using this protocol.
lying within node Ks transmission range), node A Even soft QoS guarantees may be broken in cases
also considers the nodes that were outside node when the network load is high. Since the location
Ks transmission range at the time their respective prediction mechanism inherently depends on the
last updates were sent, but have since moved into delay prediction mechanism, the inaccuracy in
node Ks transmission range, while computing the delay prediction adds to the inaccuracy of the
neighbors of node K. The routing table at node location prediction. The end-to-end delay for a
A contains information about all active connec- packet depends on several factors such as, the size
tions with node A as source. When an update of the packet, current traffic load in the network,
message from any node in the network reaches scheduling policy and processing capability of
node A, it checks if any of the routes in its routing intermediate nodes, and capacity of links. As the
table is broken or is about to be broken. In either delay prediction mechanism does not take into
case, route re-computation is initiated. Using the consideration some of the above factors, the pre-
location prediction based on the updates, it is dictions made by the location prediction mecha-
possible to predict whether any link on the path nism may not be accurate, resulting in QoS
is about to break. Thus, route re-computation violations for the real-time traffic.
can be initiated even before the route actually
breaks. 6.4. Trigger based distributed QoS routing
The routing algorithm given in [15] works as protocol
follows. The source node S first runs location
and delay predictions on each node in its proxim- The trigger-based (on-demand) distributed QoS
ity list in order to obtain a list of its neighbors at routing (TDR) protocol [16] was proposed by De
present. It determines which of these neighbors et al. for supporting real-time applications in
have the resources to satisfy the QoS requirements AWNs. Every node maintains only the local neigh-
of the connection (the neighbors that satisfy the borhood information in order to reduce computa-
QoS requirements are called candidates). Then it tion overhead and storage overhead. For each
performs a depth-first search for the destination neighbor, every node maintains received power
starting with each of these candidate neighbors level, current geographic coordinates, velocity,
to find all candidate routes satisfying the QoS and direction of motion. To reduce control over-
requirements of the connection request. From the head, nodes maintain only the active routes.
resulting candidate routes, the geographically In addition to the local neighborhood informa-
shortest route is chosen and the connection is tion, node N maintains a source table STN, a
established. Data packets are forwarded along this destination table DTN, or an intermediate table
100 T.B. Reddy et al. / Ad Hoc Networks 4 (2006) 83–124

ITN based on whether it actively participates in a to its downstream neighbors. If either or both of
session as the source (S), the destination (D), or ResiBW and MaxDelay criteria cannot be satis-
as an intermediate node (I), respectively. At any fied, the discovery packet is simply dropped. Upon
time instant, a node may have to maintain one receiving the first discovery packet, if the destina-
or more tables simultaneously for different on- tion D is also able to satisfy both the ResiBW
going sessions. Each node N also maintains an and the MaxDelay criteria, it builds DTD table
updated residual bandwidth (ResiBWN) which with the NodActv flag set to 1 (i.e., active) and
indicates its ability to participate in a session. A sends an ACK to the source S along the selected
soft state approach is used to maintain these route. On receiving the ACK packet, all intermedi-
tables. ate nodes and the source S set the NodActv flags
in their respective tables to 1 and refresh their
ResiBW status. The packet transmission for the
6.4.1. Routing protocol session follows immediately.
The messages that are exchanged for initiating Alternate route discovery: In SIRR, when the
and maintaining a real-time session are described received power level at an intermediate node falls
below. below a threshold Pth2, the intermediate node
Initial route discovery: If the source S has en- sends a rerouting indication to the source S. Then
ough ResiBWS to satisfy the MaxBW (maximum the source S initiates the rerouting process
bandwidth) for the session, the required band- through selective forwarding. But in INIR, when
width is temporarily reserved for a certain dura- the power level of a packet received from the next
tion within which it expects an acknowledgment node towards the destination falls below a thres-
from the destination D. If the source knows the hold Pth1 (Pth1 > Pth2), it initiates a status query
location of the destination, it performs route packet towards the source with appropriate iden-
discovery through selective forwarding. In this tification fields and with a flag field called route
approach, the source node takes advantage of repair status (RR_Stat) set to zero. If any up-
location information of its neighbors and forwards stream node is in the rerouting process, upon
route requests to only selective neighbors that are reception of status query packet it sets the
lying closely towards the destination node and sat- RR_Stat flag to 1 and sends status reply packet
isfying QoS requirements of the connection to the querying node. On arriving at the source
request. Otherwise, the source initiates a flood- the status query packet gets discarded. If the que-
ing-based initial route discovery process. Before rying node receives no status reply packet before
transmitting the route discovery packet, an entry its received power level from the downstream
is made in the source table STS for this session node goes below Pth2, it triggers the alternate
with NodActv flag (activity flag) set to zero (i.e., route discovery process (i.e., SIRR). Otherwise,
idle). To ensure stability of routes and in order it relinquishes control of rerouting. This query/re-
to reduce the control overhead, only selected ply process eliminates chances of duplicate re-
neighbors, from which packets were received with route discovery for a session. In both SIRR and
power level more than a threshold level (Pth1), are INIR, the alternate route discovery process is
considered during route establishment. After similar to the initial route discovery except that
receiving a route discovery packet, the intermedi- the rerouting process takes advantage of the loca-
ate node (IN) increments the hop count field of tion information of the local neighbors and the
that packet by one and checks for ResiBWIN. If approximate location of the destination, and for-
it can meet the MaxBW requirement and if the up- wards the rerouting requests to only selected
dated hop count field is less than MaxDelay (max- neighbors that are close to the destination and
imum delay), the required bandwidth is that satisfy the delay and bandwidth constraints.
temporarily reserved and an entry is made into The threshold parameters Pth1 and Pth2 have to
the activity table ITIN for the session with Nod- be selected judiciously in order to avoid unneces-
Actv flag set to zero. Then the packet is forwarded sary rerouting.
T.B. Reddy et al. / Ad Hoc Networks 4 (2006) 83–124 101

6.4.2. Advantages and disadvantages 6.5.2. Maximum delay extension field


In TDR protocol, if the source node knows the The maximum delay extension field is inter-
location of the destination node, it performs route preted differently for RREQ and RREP messages.
discovery through selective forwarding to reduce In a RREQ message it indicates the maximum
the control overhead. For a quick rerouting with time (in seconds) allowed for a transmission from
reduced control overhead and to reduce the packet the current node to the destination node. In a
loss during path breaks, it uses INRR and SIRR RREP message, it indicates the current estimate
schemes. But, in this protocol a QoS session is re- of cumulative delay from the current intermediate
routed if the received power level from a down- node forwarding the RREP, to the destination.
stream node falls below a certain value (i.e., Using this field the source node finds a path (if it
threshold). Due to small-scale fading, the received exists) to the destination node satisfying the maxi-
power level may vary rapidly over short periods of mum delay constraint. Before forwarding the
time or distance travelled. Some of the factors that RREQ, an intermediate node compares its NODE
influence fading are, multi-path propagation, TRAVERSAL TIME (i.e., the time it takes for a
velocity of the nodes, and bandwidth of the chan- node to process a packet) with the (remaining)
nel. Even though the downstream node may be delay indicated in the maximum delay extension
within the transmission range of the upstream field. If the delay is less than NODE TRAVERS-
node, due to fading the received power level at AL TIME, the node discards the RREQ packet.
the upstream node may fall below the threshold Otherwise, the node subtracts NODE TRAVERS-
value. This increases the control overhead because AL TIME from the delay value in the extension
of initiation of alternate route discovery process and processes the RREQ as specified in the AODV
and false rerouting of some of the sessions. protocol.
The destination node returns a RREP with the
maximum delay extension field set to zero. Each
6.5. QoS enabled ad hoc on-demand distance
intermediate node forwarding the RREP adds its
vector routing protocol
own NODE TRAVERSAL TIME to the delay
field and forwards the RREP towards the source.
Perkins et al. have extended the basic ad hoc
Before forwarding the RREP packet the interme-
on-demand distance vector (AODV) routing pro-
diate node records this delay value in the rout-
tocol [17] to provide QoS support in AWNs [18].
ing table entry for the corresponding destination
To provide QoS, packet formats have been modi-
node.
fied in order to specify the service requirements
Similarly, a minimum bandwidth extension field
which must be met by the nodes forwarding a
is also proposed to find a path (if it exists) to the
route request (RREQ) or a route reply (RREP).
destination node satisfying the minimum band-
width constraint. A QOS LOST message is gener-
6.5.1. QoS extensions to AODV protocol ated when an intermediate node experiences an
Several modifications have been carried out for increase in NODE TRAVERSAL TIME or a
the routing table structure, and RREQ and RREP decrease in the link capacity. The QOS LOST
messages in order to support QoS routing. Each message is forwarded to all sources potentially
routing table entry corresponds to a different des- affected by the change in the QoS parameter.
tination node. The following fields are appended
to each routing table entry: 6.5.3. Advantages and disadvantages
The advantage of QoS AODV protocol is the
 Maximum delay, simplicity of extension of the AODV protocol that
 Minimum available bandwidth, can potentially enable QoS provisioning. But, as
 List of sources requesting delay guarantees, no resources are reserved along the path from
 List of sources requesting bandwidth guaran- the source to the destination, this protocol is not
tees. suitable for applications that require hard QoS
102 T.B. Reddy et al. / Ad Hoc Networks 4 (2006) 83–124

guarantees. Further, NODE TRAVERSAL TIME nodes denotes the link bandwidth between them. If
is only the processing time for the packet, the the two nodes are adjacent, the path bandwidth
major part of the delay at a node is contributed between them equals their link bandwidth. For
by packet queuing and contention at the MAC example, consider two adjacent nodes, node
layer. Hence a packet may experience much more A and node B, having free slots {2, 5, 6, 8}
delay than this when the traffic load is high in and {1, 2, 4, 5}, respectively. The link bandwidth
the network. linkBW(A, B) = freeslot(A) \ freeslot(B) = {2, 5 }. It
means that only slots 2 and 5 can be used by nodes
6.6. Bandwidth routing protocol A and B for transmitting data packets to each
other. The freeslot(X) is defined as the set of slots
The bandwidth routing (BR) protocol [19] con- which are not used by any adjacent node of node X
sists of an end-to-end path bandwidth calculation (to receive or to send) from the point of view of
algorithm to inform the source node of the availa- node X.
ble bandwidth to any destination in the ad hoc net- The BR protocol uses a heuristic-based hop-
work, a bandwidth reservation algorithm to by-hop path bandwidth calculation algorithm to
reserve sufficient number of free slots for the assign free slots at every hop along the path. The
QoS flow, and a standby routing algorithm to re- algorithm is explained with the help of the example
establish the QoS flow in case of path breaks. shown in Fig. 9, where a path from source node S
Here, only bandwidth is considered to be the to destination node D is illustrated. The process of
QoS parameter. In TDMA-based networks, band- computing pathBW(S, D) is explained below.
width is measured in terms of the number of free
slots available at a node. The goal of the band-  pathBW(S, A): Since node S and node A are
width routing algorithm is to find a shortest path adjacent, the pathBW(S, A) = linkBW(A, S),
satisfying the bandwidth requirement. The trans- which is four slots. The four slots are {2, 5, 6, 7}.
mission time scale is organized into frames, each  pathBW(S, B): Since pathBW(S, A) = link-
containing a fixed number of time slots. The entire BW(A, B) ={2, 5, 6, 7}, if S uses slots 6 and 7
network is synchronized on a frame and slot basis. to send packets to A, then A can only use slots
Each frame is divided into two phases, namely the
control phase and the data phase. The control
phase is used to perform the control functions such
as slot and frame synchronization, VC setup, and
routing. The data phase is used for transmission/
reception of data packets. For each node a slot is
assigned in the control phase for it to broadcast
its routing information and slot requirements. At
the end of the control phase, each node knows
about the channel reservations made by its neigh-
bors. This information helps nodes to schedule free
slots, verify the failure of reserved slots, and drop
expired real-time packets. The BR protocol as-
sumes a half-duplex CDMA-over-TDMA system
in which only one packet can be transmitted in a
given slot.

6.6.1. Bandwidth calculation


Since the network is multi-hop in nature, the
free slots recorded at each node may be different. Fig. 9. An example of path bandwidth calculation in BR
The set of common free slots between two adjacent protocol.
T.B. Reddy et al. / Ad Hoc Networks 4 (2006) 83–124 103

2 and 5 for transmission of packets to B. This is puted using the DSDV algorithm [20] without any
because a node cannot be in transmission and extra overhead. Each node periodically exchanges
reception modes simultaneously. Hence path- routing information with its neighboring nodes.
BW(S, B) is 2 slots, by assigning slots {6, 7} The neighbor with the shortest distance to the des-
on link(S, A) and slots {2, 5} on link(A, B). tination node becomes the next node on the pri-
 pathBW(S, C): Here slots 4 and 8 are exclu- mary path to the destination node. The neighbor
sively available for linkBW(B, C), slot 2 is exclu- node with the second shortest distance to the des-
sively available for pathBW(S, B), and slot 5 is tination becomes the next node on the standby
common for both of them. So assign one of route to the destination. It is to be noted that this
slots 4, 8 to link(B, C), for example assign slot standby route is not guaranteed to be a link or
4 to link(B, C), and slot 2 to path(S, B). For node disjoint one. When a primary path fails, the
achieving maximum bandwidth assign slot 8 upstream node that detects the link break will try
to link(B, C) and slot 5 to path(S, B). Hence to rebuild a new path immediately using the stand-
pathBW(S, C) is 2 slots, by assigning slots by route. If the standby route satisfies the QoS
{6, 7} on link(S, A), slots {2, 5} on link(A, B), requirements, the new path from the point of path
and slots {4, 8} on link(B, C). break is established by sending a call setup packet
 pathBW(S, D): This case is similar to previous hop-by-hop to the destination through the standby
one. So slots 4 and 8 are assigned to path(S, C) path.
and slots 3 and 5 are assigned to link(C, D) to Since this scheme follows DSDV protocol, a
get 2 slots for pathBW(S, D). table-driven routing protocol, and uses on-demand
call admission control, similar to the on-demand
routing protocols, it is classified into the category
6.6.2. Slot assignment of hybrid solutions in the classifications Fig. 2.
The slot assignment algorithm in each node as-
signs free slots during the call setup. When a node 6.6.4. Advantages and disadvantages
receives a call setup packet, it checks whether the The BR protocol provides an efficient band-
slots that the immediate sender will use for trans- width allocation scheme for CDMA-over-TDMA
mission are free, and it also finds if there are free based AWNs. The standby routing mechanism
slots that can be used for forwarding the incoming can reduce the packet loss during path breaks.
packets. If such free slots are available, the slot But the CDMA-over-TDMA channel model that
assignment algorithm reserves the required num- is used in this protocol requires assigning a unique
ber of slots, updates the routing table, and then control slot in the control phase of super-frame for
forwards the call setup packet to the next hop. each node present in the network. This assignment
Otherwise, all the reservations that have been has to be done statically before commissioning the
made so far along the path have to be cancelled network. Due to this, it is not possible for a new
by sending a RESET packet back to the source node to enter into the network at a later point of
along that path. If reservations are made success- time. If a particular node leaves the network, the
fully along the path from the source to the destina- corresponding control slot remains unused and
tion, the destination sends a REPLY packet back there is no way to reuse such slot(s). Further, the
to the source to acknowledge having set up the network needs to be fully synchronized.
connection. The reservations are soft state in nat-
ure in order to avoid resource lock-up at interme- 6.7. On-demand QoS routing protocol
diate nodes due to path breaks.
Lin proposed an admission control scheme over
6.6.3. Standby routing mechanism an on-demand QoS routing (OQR) protocol [21]
The standby routing mechanism has to re- to guarantee bandwidth for real-time applications.
establish connections that are broken due to Since routing is on-demand in nature there is no
mobility of nodes. The standby route is easily com- need to exchange control information periodically
104 T.B. Reddy et al. / Ad Hoc Networks 4 (2006) 83–124

and maintain routing tables at each node. Similar For the example shown in Fig. 9, assume that
to the bandwidth routing (BR) protocol, the net- the source S floods a QRREQ packet with band-
work is time-slotted and bandwidth is the key width requirement of 2 time slots. Here, the desti-
QoS parameter. The path bandwidth calculation nation D receives a QRREQ packet with the
algorithm proposed in BR is used to measure the following information in its fields. The route list
available end-to-end bandwidth. The on-demand field contains (S, A, B, C) and the slot array list
QoS routing protocol is explained below. contains ([A, {2, 5, 6, 7}], [B, {2, 5}], [C, {4, 5}],
[D, {3, 8}]).
6.7.1. Route discovery
During the route discovery process the source 6.7.2. Bandwidth reservation
node that wants to find a QoS route to the desti- The destination node may receive one or more
nation floods a QoS route request (QRREQ) QRREQ packets, each giving a feasible QoS path
packet. A QRREQ packet contains the following for the connection request. The destination node
fields: packet type, source ID, destination ID, se- selects the path with least cost among them and
quence number, route list, slot array list, data, copies the fields {route list, slot array list} from
and TTL. For each QRREQ packet, the source the corresponding QRREQ packet to the QoS
node uses a new sequence number (which is route reply (QRREP) packet and sends the
monotonically increasing) in order to avoid mul- QRREP packet to the source along the path re-
tiple forwarding of the same packet by intermedi- corded in route list. As the QRREP traverses back
ate nodes. The route list records the nodes that to the source, each node recorded in route list re-
have been visited by the QRREQ packet, where serves the free slots that have been recorded in
the slot array list records free slots available at the slot array list field. Finally, when the source re-
each of these nodes. The TTL field limits the ceives the QRREP, the end-to-end bandwidth res-
maximum length of the path to be found. A node ervation process gets completed successfully and
N receiving a QRREQ packet performs the fol- starts sending data packets in the data phase.
lowing operations: The reservations made are soft state in nature in
order to avoid resource lock-up.
1. If a QRREQ with the same {source ID, se-
quence number} had been received already, this 6.7.3. Advantages and disadvantages
one gets discarded. OQR protocol uses an on-demand resource res-
2. Otherwise, route list field is checked for the ad- ervation scheme and hence produces lower control
dress of N. If it is present, node N discards this overhead. Since it uses the CDMA-over-TDMA
QRREQ packet. channel model, the network needs to be fully syn-
3. Otherwise, chronized. Further, the on-demand nature of route
discovery process leads to higher connection setup
 Node N decrements TTL by one. If TTL time.
counts down to zero, it discards this QRREQ
packet. 6.8. On-demand link-state multi-path QoS
 It calculates the path bandwidth from the routing protocol
source to this node. If it satisfies the QoS
requirement, node N records the available Unlike previous QoS routing protocols de-
free slots in the slot array list of the QRREQ scribed in this paper which try to find a single path
packet. Otherwise, node N discards this from the source to the destination satisfying the
QRREQ packet. QoS requirements, the on-demand link-state mul-
 Node N appends the address of this node to ti-path QoS routing (OLMQR) protocol [22]
the route list, and re-broadcasts this QRREQ searches for multiple paths which collectively sat-
packet if it is not the destination. isfy the required QoS. The original bandwidth
T.B. Reddy et al. / Ad Hoc Networks 4 (2006) 83–124 105

requirement is split into sub-bandwidth require- 2. Otherwise,


ments. Notably, the paths found by the multi-path
routing protocol are allowed to share the same  Node N decrements TTL by one. If TTL
sub-paths. OLMQR has better call acceptance rate counts down to zero, it discards this QRREQ
in AWNs where finding a single path satisfying all packet.
the QoS requirements is very difficult.  Node N adds itself into node history field, ap-
In this protocol, the MAC layer is assumed to pends the free time slots of the link between
be using the CDMA-over-TDMA channel model itself and the last node recorded in the node
similar to BR and OQR protocols. A mobile node history field into the free time-slot list field,
in the network knows the available bandwidth and re-broadcasts this QRREQ packet.
to each of its neighbors. The operation of this pro-
tocol consists of three phases. Phase 1 is on- The destination may receive many different
demand link-state discovery, phase 2 is uni-path QRREQ packets from the source. It constructs
discovery, and phase 3 is multi-path discovery its own view of the current network topology. It
and reply. also calculates the available bandwidths of the
links present in that network topology. For exam-
6.8.1. On-demand link-state discovery ple, consider the network shown in Fig. 10. The
For each call request, the source node floods a source S floods the network with a QRREQ pack-
QRREQ packet towards the destination. Each et by setting BW and TTL fields to 3 and 4, respec-
packet records the path history and all link-state tively. The destination D receives six QRREQ
information along its route. A QRREQ packet packets, which have traversed along the paths:
contains the following fields: source ID, destina- S ! A ! B ! D, S ! E ! F ! D, S ! A ! C ! B !
tion ID, node history, free time-slot list, bandwidth D, S ! A ! C ! F ! D, S ! E ! C ! F ! D, and
requirement, and time to live (TTL). The node his- S ! E ! C ! B ! D. Using this information, a
tory field records the path from source to the cur- partial view of the network is constructed at the
rent traversed node, the free time-slot list field destination D.
contains a list of free time slots of links, where
each entry in the list records free time slots be- 6.8.2. Uni-path discovery
tween the current traversed node and the last node Unlike the BR [19] and the OQR [21] protocols
recorded in the node history. An intermediate node discussed earlier in this section, here the uni-path
N receiving a QRREQ packet performs the follow- discovery operation (i.e., path bandwidth calcula-
ing operations: tion algorithm) does not follow the traditional
hop-by-hop approach to determine the end-
1. Node N checks node history field of the to-end path bandwidth. The uni-path discovery
QRREQ packet for its address. If it is present, approach acquires higher end-to-end path band-
the node discards this QRREQ packet. width than that acquired through the hop-by-hop

{1,2,4,5,8,9,10} {1,5,6,7,8,9}
1 5 8 9
A B
9 10 2 1
6
5 4 9 8
2 5 8
8 6 9
{2,3,5,6,7,9,10} 9 5
S C D
9 5
5 6 {1,2,4,6,8,9}
2 2 {2,4,5,6,8,9} 8 9
3 9
5 8
7 6
9 E F
3 5 9
{1,2,3,5,7,9} {3,5,6,8,9,10}

Fig. 10. An example network.


106 T.B. Reddy et al. / Ad Hoc Networks 4 (2006) 83–124

approach. For a given path (i.e., uni-path), the a b c


uni-path discovery operation determines its maxi- 2 5 9 10 1 5 8 9 1 6 8 9
S A B D
mum path bandwidth by constructing a least-
(a)
cost-first time slot reservation tree TLCF. Before
constructing TLCF, a time slot reservation tree T
is constructed. The TLCF and T trees are used to abc abc

reserve time slots efficiently for a given uni-path.


A time slot reservation tree T is constructed by
the breadth-first-search approach as follows. Gi- 3 abc abc 2 2 abc abc 3
ven a path S ! A ! B K ! D, let the root of T
be represented as abcd xy, where a represents
the bandwidth (i.e., the set of free time slots) of c a a c
1 3 3 1
link(S, A) and b represents the bandwidth of
link(A, B). Let abcd xy denote the time slots that (b) (c)
are reserved on links a and b. Child nodes of the
root are abcd xy, abcd xy, abcd xy, . . ., Fig. 11. Example of T and TLCF trees for a path.
and abcd xy, which form the first level of tree
T. The tree T recursively expands all child nodes and slots 1, 8, and 9 for the link b) and c has 1 time
of each node on each level of tree T, and follows slot bandwidth (by assigning the remaining slot 6
the same rules as that of the first level of tree T for the link c). Hence, the first pattern ab, c has
until the leaf nodes are reached. Each path from 1 time slot path bandwidth (which is the minimum
the root to leaf nodes gives a time slot reservation of bandwidths of ab and c). Similarly in the second
pattern. This pattern is used to reserve time slots pattern, bc has 2 time slots bandwidth (by assign-
from the source to the destination. To reduce the ing slots 1 and 5 for the link b and slots 6 and 8 for
time needed to search a path satisfying a given the link c) and a has 3 time slots bandwidth (by
bandwidth requirement BW, a least-cost-first time assigning the remaining slots 2, 9, and 10 for the
slot reservation tree TLCF is constructed from the link a). Hence, the second pattern bc, a has 2 time
time slot reservation tree T as follows. To obtain slots path bandwidth. From T, a least-cost-first
the TLCF, the child nodes on each level of tree T time slot reservation tree TLCF can be constructed
are sorted in ascending order from left to right as shown in Fig. 11(c). Comparing T-tree traversal
by using the number of reserved time slots in them. with TLCF-tree traversal scheme, the TLCF-tree
The uni-path time slot reservation algorithm per- traversal scheme is more efficient than the T-tree
forms depth-first-search on TLCF tree to determine traversal scheme as it reduces the time required
a time slot reservation pattern having maximum to find a feasible QoS path.
path bandwidth. The search is completed if either
the tree traversal is completed or a reservation 6.8.3. Multi-path discovery and reply
pattern is identified with a bandwidth B, where The destination initiates the multi-path discov-
B P BW . ery operation by sequentially exploiting multiple
For example, consider the path S ! A ! B ! D uni-paths such that the sum of path bandwidths
from the source S to the destination D in the net- fulfills the original bandwidth requirement BW.
work shown in Fig. 10. Let a, b, c denote free time The destination applies the uni-path discovery
slots of links (S, A), (A, B), and (B, D), respectively operation to each path in order to determine the
as shown in Fig. 11(a). For this path, a time slot maximum achievable path bandwidth of each
reservation tree T can be constructed as shown path. After accepting a path, the destination up-
in Fig. 11(b). It shows two reservation patterns, dates the network state information it maintains
the first pattern is ab, c and the second pattern is in order to reflect the current bandwidth availabil-
bc, a. In the first pattern, ab has 3 time slots band- ity on the links. Finally, the destination sends
width (by assigning slots 2, 5, and 10 for the link a reply packets along these paths, which reserve
T.B. Reddy et al. / Ad Hoc Networks 4 (2006) 83–124 107

the corresponding resources (sub-bandwidth work. This requires time synchronization across all
requirements) on the corresponding paths on their nodes in the network. Time synchronization
way back to the source. In the above example, the demands periodic exchange of control packets, that
destination D finds two uni-paths: S ! A ! B ! D results in high bandwidth consumption. AWNs
with two time slots path bandwidth and experience rapid changes in topology leading to a
S ! E ! F ! D with one time slot path bandwidth situation where network partitions and merging
as shown in Fig. 12. of partitions can take place. Fig. 13 shows the
synchronization problems arising out of dynamic
6.8.4. Advantages and disadvantages topological changes in an ad hoc wireless network.
If the QoS requirements of a flow cannot be met A completely connected and synchronized network
by a single path from the source to the destination, A at time t = t0 (shown in Fig. 13(a)) may be parti-
multiple paths are checked which collectively sat- tioned into two disjoint networks A1 and A2 at
isfy the required QoS. Hence OLMQR protocol time t = t1 (shown in Fig. 13(b)). These two net-
has better ACAR. But the overhead of maintain- works may be synchronized to two different clock
ing and repairing paths is very high compared to times as illustrated. Due to the dynamic topology
traditional uni-path routing protocols because experienced in an ad hoc wireless network, it is pos-
multiple paths are used to satisfy each flowÕs sible to have two separately synchronized networks
QoS requirements. A1 (synchronized to tA1) and A2 (synchronized to
tA2) merge to form a combined network A (Fig.
6.9. Asynchronous slot allocation strategies 13(c)). During the merging process, the real-time
calls existing in the network may be affected while
The QoS solutions discussed so far such as BR, accommodating the changes in synchronization.
OQR, and OLMQR assume a TDMA based net- The asynchronous QoS routing (AQR) scheme
work or a CDMA-over-TDMA model for the net- and slot allocation strategies proposed in [23]

1 5
A B
9 2 9 6
2 4 8 8
5 6
8 5
9
S C D
9 5
6
2 5 8 9
3 2
5 9
7 8
9 6
E F
3 5 9

8 9
A B
2 9 1
10 4
5 8 9
5 6
8 5
9
S C D
9 5
6
5 8 9
2
5
9
E F
3

free slot path1: S–>A–>B–>D


path2: S–>E–>F–>D
reserved slot

unreservable slot

Fig. 12. The uni-paths found by multi-path discovery algorithm.


108 T.B. Reddy et al. / Ad Hoc Networks 4 (2006) 83–124

Fig. 13. Illustration of synchronization problems in a dynamic network topology.

provides a unique mechanism to reserve asynchro- bandwidth availability in the link through which it
nous end-to-end bandwidth for real-time calls in received the RREQ packet. If sufficient bandwidth
AWNs. These strategies utilize the real-time is available, then it forwards the RREQ packet,
MAC (RTMAC) [13] protocol that can effect else it is dropped. The intermediate node adds its
bandwidth reservation in asynchronous AWNs. own reservation table along with the reservation
RTMAC can reserve conn-slots [number of reser- tables of the nodes the packet has already tra-
vation slots (minimum time duration that can be versed before forwarding it further. Routing loops
reserved) sufficient for a real-time session] on a are avoided by keeping track of the sequence num-
super-frame (time duration in which the existing ber, source address, and traversed path informa-
reservations repeat). AQR is an extension of dy- tions contained in the RREQ packet. Apart from
namic source routing (DSR) protocol [24]. The this reservation table, an intermediate node also
three major phases in the operation of AQR are incorporates necessary information in an offset
bandwidth feasibility test phase, bandwidth alloca- time field to enable the destination node to make
tion phase, and bandwidth reservation phase. An use of the reservation table. In other words, the
in-depth discussion of each of these phases is pro- offset time field carries synchronization informa-
vided in what follows. tion required for interpreting the reservation table
with respect to the receiving nodeÕs current time.
6.9.1. Bandwidth feasibility test phase When the source node constructs a RREQ packet,
The objective of this phase is the selection of it stores its reservation table in the packet with re-
paths with required bandwidth. The source floods spect to its current time with the quantity offset set
RREQ packets towards the destination. An inter- to zero. When the packet is about to be sent, the
mediate node that receives this RREQ, checks for difference between the current time and time of
T.B. Reddy et al. / Ad Hoc Networks 4 (2006) 83–124 109

construction of packet is stored in the offset. When The information about asynchronous slots as-
the RREQ packet is received at a node, the offset is signed at every intermediate link is included in
increased by the estimated propagation delay of the route reply (RREP) packet and propagated
transmission. Hence by using this offset time, the through the selected path back to the source.
relative difference between the local clock and the Slot allocation strategies such as early fit reserva-
time information contained in the reservation table tion (EFR), minimum bandwidth-based reserva-
carried in the RREQ can be incorporated which tion (MBR), position-based hybrid reservation
can be used for synchronizing the reservation (PHR), and k-hopcount hybrid reservation (k-
information. When the RREQ packet reaches des- HHR) are used for allocation of bandwidth and
tination, it runs the slot allocation algorithm on a positioning of slots. The order of links in which
selected path, after constructing a data structure it is chosen for allocation and the position of as-
called QoS Frame for every link in that path. signed bandwidth slots influence the end-to-end
The QoS Frame is used to calculate, for every link, delay of the path and the call acceptance rate.
the free bandwidth slots in the super-frame and We discuss MBR allocation scheme alone here.
unreservable slots due to reservations carried out Minimum bandwidth-based reservation (MBR):
by the neighborhood nodes (also referred to as un- The following steps are executed by the destination
reservable slots due to hidden terminals). node for the MBR scheme:
The destination node waits for a specific time
interval and gathers a set of RREQs and chooses  Step 1: Order the links in the non-decreasing
a shortest path with necessary bandwidth. order of free bandwidth.
 Step 2: Allocate the first free slot in the link with
6.9.2. Bandwidth allocation phase lowest free bandwidth.
In this phase, the destination node performs a  Step 3: Reorder the links in the non-decreasing
bandwidth allocation strategy that assigns free order of free bandwidth and assign the first free
slots to every intermediate link in the chosen path. slot on the link with lowest bandwidth.

A B C D E

(a)

H3 R3 R3
H3 R3 R3 H3

H3 R3 R3 H3
Time

H2 R2 R2 H2

H2 H2 R2 R2 H2
R2 R2 H1 R1 R1

H1 R1 R1 H1
A B C D E
Flow details:
1) E–>D–>C Ri: Reserved slot for flow i
2) A–>B–>C–>D Hi: Unreservable slot due to flow i
3) E–>D–>C–>B

(b)

Fig. 14. Illustration of MBR scheme: (a) example network topology and (b) MBR scheme.
110 T.B. Reddy et al. / Ad Hoc Networks 4 (2006) 83–124

 Step 4: Continue Step 3 until bandwidth is waves help in appropriate propagation of the sta-
allotted for all the links. ble high bandwidth link information and the
unstable low bandwidth link information, respec-
Fig. 14(b) shows the slot allocation carried out tively. Core broadcasts provide a reliable mecha-
in MBR scheme over a simple string topology nism for establishing paths with QoS support. A
network. The worst case end-to-end delay pro- disadvantage of this protocol is that since route
vided by MBR can be (n
1) · tsf where n is the computation is carried out at the core nodes only,
number of hops in the path and tsf is the duration movement of core nodes adversely affects the per-
of super-frame. In the example in Fig. 14(b), the formance of the protocol. Also, the core node up-
average delay experienced can be calculated as date information could cause a significant amount
33/3 slots. of control overhead.

6.9.3. Bandwidth reservation phase


7. QoS frameworks for ad hoc wireless networks
The RREP packet traverses along the path cho-
sen by the destination node. Upon receiving the
A framework for QoS is a complete system that
RREP, the intermediate node checks the status
attempts to provide required/promised services to
of conn-slot at which reservation is to be carried
each user or application. All components within
out. If it is free, the RREP packet is further for-
this system cooperate together in providing the re-
warded. Otherwise, the intermediate node tries to
quired services. The key component of any QoS
reserve any of the free slots available. If free slots
framework is the QoS model which defines the
are not available, it drops the RREP and sends a
way user requirements are met. The key design
control packet to the destination. The control
issue here is whether to serve users on a per session
packet makes all the intermediate nodes in its
basis or on a per class basis. Each class represents
way to release the bandwidth reserved for the ses-
an aggregation of users based on certain criteria.
sion and the destination node to find another path
The other key components of the framework are,
with the necessary bandwidth.
QoS routing which is used to find all or some of
the feasible paths in the network that can satisfy
6.9.4. Advantages and disadvantages user requirements, QoS signaling for resource res-
AQR has a unique advantage in that it can pro- ervation, QoS medium access control, call admis-
vide end-to-end bandwidth reservation in asyn- sion control, and packet scheduling schemes. The
chronous networks. Also the slot allocation QoS modules should react promptly to changes
strategies can be used to plan for the delay require- in the network state (topology changes) and flow
ments and dynamically choose appropriate algo- state (change in the end-to-end view of the service
rithms. AQR is an on-demand QoS routing delivered). In what follows, each componentÕs
scheme and hence the setup time and reconfigura- functionality and its role in providing QoS in
tion time of real-time calls are high. Also the band- AWNs will be described:
width efficiency of such an asynchronous system
may not be as high as a fully synchronized TDMA  Routing protocol: The routing protocol is used
system due to the formation of bandwidth holes to find a path from the source to the destination
(short free slots which cannot be used). and to forward the data packet to next interme-
CEDAR: Core extraction distributed ad hoc diate relay node. The routing protocol needs to
routing (CEDAR) [25] integrates routing and sup- work efficiently with other components of the
port for QoS. Route establishment in CEDAR is QoS framework in order to provide end-to-
carried out in two phases. The first phase finds a end QoS guarantees. These mechanisms should
core path from the source to the destination. In consume minimal resources in operation and
the second phase, a QoS feasible path is found react rapidly to changes in the network state
over the core path. The increase and decrease and flow state.
T.B. Reddy et al. / Ad Hoc Networks 4 (2006) 83–124 111

 QoS resource reservation signaling: Once a QoS to the number of flows. Hence, the IntServ model
path is found, the resource reservation signaling is not scalable for the Internet, but it can be ap-
protocol reserves the required resources along plied to small sized AWNs. But, per flow informa-
that path. For example, for applications that re- tion is difficult to maintain precisely at a node in
quire certain minimum bandwidth guarantees, an ad hoc wireless network. The DiffServ model
signaling protocol communicates with the was proposed in order to solve the scalability
MAC subsystem to find and reserve the re- problem faced by IntServ model. In this model,
quired bandwidth. On completion/termination flows are aggregated into limited number of service
of a session, the previously reserved resources classes. Each flow belongs to one of the DiffServ
are released. classes of service.
 Admission control: Even though a QoS feasible The above two service models cannot be di-
path may be available, the system needs to de- rectly applied to AWNs because of its unique char-
cide whether to actually serve the connection acteristics such as continuously varying network
or not. If the call is to be served, the signaling topology, limited resource availability, and error
protocol reserves the resources, otherwise the prone shared radio channel. Any service model
application is notified of the rejection. When a proposed should first decide upon what types of
new call is accepted, it should not jeopardize services are feasible in such networks. A hybrid
the QoS guarantees given to the already admit- service model for AWNs called FQMM is de-
ted calls. A QoS framework is evaluated based scribed below. This model is based on the above
on the number of QoS sessions it serves and it two QoS models.
is represented by ACAR metric. Admission
control ensures that there is no perceivable deg- 7.1.1. Flexible QoS model for mobile
radation in the QoS being offered to the QoS ad hoc networks
sessions admitted already. The flexible QoS model for mobile ad hoc net-
 Packet scheduling: When multiple QoS connec- works (FQMM) [29] takes advantage of the per
tions are active at the same time through a link, flow granularity of IntServ and aggregation of
the decision on which QoS flow is to be served services into classes in DiffServ.
next is made by the scheduling scheme. For A source node, which is the originator of the
example, when multiple delay-constrained ses- traffic, is responsible for traffic shaping. Traffic
sions are passing through a node, this module shaping is the process of delaying packets belonging
decides on when to schedule the transmission to a flow so that packets conform to a certain
of packets, when packets belonging to more defined traffic profile. Traffic profile contains a
than one session are pending in the transmis- description of the temporal properties of a flow
sion queue of the node. The performance of a such as its mean rate (i.e., rate at which data can
scheduling scheme is reflected by the percentage be sent per unit time on average) and burst size
of packets that meet their deadlines. (which specifies in bits per burst how much traffic
can be sent within a given unit of time without cre-
ating scheduling concerns). FQMM model provides
7.1. QoS models per flow QoS guarantees for the high priority flows
while lower priority flows are aggregated into a set
A QoS model defines the nature of service dif- of service classes as illustrated in Fig. 15. This hy-
ferentiation. In wired network QoS frameworks, brid QoS model is based on the assumption that
several service models have been proposed. Two the percentage of flows requiring per flow QoS
of these models are, integrated services (IntServ) guarantees is much less than that of low priority
model [26] and differentiated services (DiffServ) flows which can be aggregated into a set of QoS
model [27]. The IntServ model provides QoS on classes. Based on the current traffic load in the net-
a per flow basis. The volume of information main- work, service level of a flow may change dynami-
tained at an IntServ-enabled router is proportional cally from per flow to per class and vice versa.
112 T.B. Reddy et al. / Ad Hoc Networks 4 (2006) 83–124

Network traffic

Class 3 traffic

Class 2 traffic

Class 1 traffic

Integrated service provisioning


Differentiated service provisioning (per flow QoS guarantees for
(aggregation of flows into the high priority traffic class)
a set of service classes)

Fig. 15. FQMM model.

Advantages and disadvantages: FQMM provides  The amount of control overhead generated dur-
the ideal per flow QoS guarantees and overcomes ing the connection maintenance phase of RSVP
the scalability problem by classifying the low prior- signaling is too heavy for bandwidth con-
ity traffic into service classes. This protocol strained AWNs.
addresses the basic problem faced by QoS frame-  It is not adaptive to network dynamics. In
works and proposes a generic solution for AWNs wired networks, once the resources are reserved,
that can be a base for a better QoS model. But they are assumed to be available to applications
several issues still remain unresolved, such as deci- throughout the session. But these assumptions
sion upon traffic classification, allotment of per are not true in AWNs due to unrestricted
flow or aggregated service for the given flow, mobility of nodes which results in dynamic
amount of traffic belonging to per flow service, the changes in the network topology.
mechanisms used by the intermediate nodes to get
information regarding the flow, and scheduling or
forwarding of the traffic by the intermediate nodes. 7.3. INSIGNIA

7.2. QoS resource reservation signaling The INSIGNIA QoS framework [30] was
developed for providing adaptive services in
The QoS resource reservation signaling scheme AWNs. Adaptive services support applications
is responsible for reserving the required resources that require only a minimum quantitative QoS
and informing the corresponding applications, guarantee (such as minimum bandwidth) called
which then initiate data transmission. Signaling base QoS. The service level can be extended later
protocol consists of three phases, viz., connection to enhanced QoS when sufficient resources be-
establishment, connection maintenance, and con- come available. Here user sessions adapt to the
nection termination. On establishing a connection, available level of service without explicit signaling
it monitors the path and repairs/reconfigures it if between the source–destination pairs. The key
the connection suffers from any violation in its design issues in providing adaptive services are
QoS guarantees. On completion/termination of a as follows:
session, it releases the resources that had been re-
served for that session. In the wired networks,  How fast can the application service level be
the RSVP protocol [28] is used for resource reser- switched from base QoS to enhanced QoS and
vation but it cannot be applied directly to AWNs vice versa in response to changes in the network
due to the following reasons: topology and channel conditions?
T.B. Reddy et al. / Ad Hoc Networks 4 (2006) 83–124 113

 How and when to operate on the base QoS or field (INSIGNIA option) to carry the control
enhanced QoS level for an adaptive application information. The signaling information is encoded
(i.e., application that can sustain variation in into this optional QoS field. The in-band signaling
QoS levels)? system can operate at speeds close to that of packet
transmissions and is therefore better suited for
This framework can scale down, drop, or scale highly dynamic mobile network environments.
up user sessions adaptively based on network Admission control module uses soft state ap-
dynamics and user-supplied adaptation policies. proach to allocate bandwidth to flows based on
A key component of this framework is the INSIG- the maximum/minimum bandwidth requested.
NIA in-band signaling system, which supports fast Packet forwarding module classifies the incoming
reservation, restoration, and adaptation schemes packets and delivers them to the appropriate mod-
to deliver the adaptive services. The signaling sys- ule. If the packet has an INSIGNIA option, it is
tem is light-weight and responds rapidly to delivered to the INSIGNIA signaling module.
changes in the network topology and end-to-end Packets that are to be routed to other nodes are
QoS conditions. The INSIGNIA framework is de- handled by the packet-scheduling module. The
picted in Fig. 16. The routing module is independ- packets to be transmitted by a node are scheduled
ent of other components and hence any existing by the scheduler based on the forwarding policy.
routing protocol can be used. INSIGNIA assumes INSIGNIA uses a weighted round robin service
that the routing protocol provides new routes in discipline. INSIGNIA framework is transparent
case of topology changes. to any underlying MAC protocol. The INSIGNIA
In-band signaling module is used to establish, framework uses a soft state resource management
adapt, restore, and tear down adaptive services be- mechanism for efficient utilization of resources.
tween source–destination pairs. It is not dependent When an intermediate node receives a data packet
on any specific link layer protocol. In in-band sign- with RES (reservation) flag set for a QoS flow
aling systems the control information is carried and no reservation has been done until now, the
along with data packets and hence no explicit con- admission control module allocates the resources
trol channel is required. In INSIGNIA frame- based on availability. If the reservation has been
work, each data packet contains an optional QoS done already, it is re-confirmed. If no data packets

Locally originated/delivered packets

in–band
signaling
Routing module INSIGINIA Admission control

measurement/
control
routing
updates Mobile soft–state Channel state

data packets
Packet forwarding module Packet scheduling module
packet–drop

MAC

Shared wireless medium

Fig. 16. INSIGNIA QoS framework.


114 T.B. Reddy et al. / Ad Hoc Networks 4 (2006) 83–124

are received for a specified timeout period, the re- ate packet loss and delay jitter to a certain extent.
sources are deallocated in a distributed manner The bandwidth indicator flag has a value of MAX
without incurring any control overhead. In setting or MIN which represents the bandwidth available
the value for the timeout period, care should be for the flow. Table 2 shows how service mode, pay-
taken to avoid false restoration (which occurs load type, and bandwidth indicator flags reflect the
when time interval is smaller than inter arrival current status of flows. It can be seen from the
time of packets) and resource lock-up (which oc- table that the best-effort (BE) packets are routed
curs when the time interval is much greater than as normal data packets. If QoS is required by an
inter arrival time of packets). application, it can opt for base QoS in which a cer-
tain minimum bandwidth is guaranteed. For that
7.3.1. Operation of INSIGNIA framework application the bandwidth indicator flag is set to
The INSIGNIA framework supports adaptive MIN. For enhanced QoS, the source sets the band-
applications which can be applications requiring width indicator flag to MAX but it can be down-
best-effort service or applications with base QoS graded at the intermediate nodes to MIN; the
requirements or those with enhanced QoS require- service mode flag is changed to BE from RES if
ments. Due to the adaptation of the protocol to sufficient bandwidth is not available. The down-
the dynamic behavior of AWNs, the service level graded service can be restored to RES, if sufficient
of an application can be degraded in a distributed bandwidth becomes available. For enhanced QoS,
manner if enough resources are not available. the service can be downgraded either to BE service
The INSIGNIA option field contains the fol- or RES service with base QoS. The downgraded
lowing information: service mode, payload type, enhanced QoS can be upgraded later, if all the
bandwidth indicator, and bandwidth request. intermediate nodes have the required (MAX)
These indicate the dynamic behavior of the flow bandwidth.
and the requirements of the application. The inter- Destination nodes actively monitor on-going
mediate nodes take decisions regarding the flow flows, inspecting bandwidth indicator field of
state in a distributed manner based on the INSIG- incoming packets and measuring the delivered
NIA option field. The service mode can be either QoS (for example, packet loss, delay, and through-
best-effort (BE) or service requiring reservation put). Destination nodes send QoS reports (which
(RES) of resources. The payload type indicates contain information regarding the status of the
the QoS requirements of the application. It can on-going flows) to source nodes.
be either base QoS for an application that requires Route maintenance: Due to host mobility an on-
minimum bandwidth, or enhanced QoS for an going session may have to be rerouted in case of a
application which requires a certain maximum path break. The flow restoration process has to re-
bandwidth but can operate with a certain mini- establish the reservation as quickly and efficiently
mum bandwidth below which they are useless. as possible. During restoration, INSIGNIA does
Examples of applications that require enhanced not preempt resources from the existing flows for
service mode are video applications that can toler- admitting the rerouted flows. INSIGNIA supports

Table 2
INSIGNIA flags reflecting the behavior of flows
Service mode Payload type BW indicator Degrading Upgrading
BE – – – –

RES Base QoS MIN Base QoS ! BE BE ! Base QoS

RES Enhanced MAX EQoS ! BE BE ! EQoS


QoS (EQoS) EQoS ! BQoS BQoS ! EQoS
T.B. Reddy et al. / Ad Hoc Networks 4 (2006) 83–124 115

three types of flow restoration viz., immediate QoS requirements. For resource reservation, a soft
restoration which occurs when a rerouted flow state reservation mechanism is employed. INORA
immediately recovers to its original reservation, can be classified into two schemes: coarse feedback
degraded restoration which occurs when a rerouted scheme and class-based fine feedback scheme.
flow is degraded for a period (T) before it recovers
to its original reservation, and permanent restora- 7.4.1. Coarse feedback scheme
tion which occurs when the rerouted flow never In this scheme, if a node fails to admit a QoS
recovers to its original reservation. flow either due to lack of minimum required band-
width (BWmin) or because of congestion at the
7.3.2. Advantages and disadvantages node, it sends an out-of-band admission control
INSIGNIA framework provides an integrated failure (ACF) message to its upstream node. After
approach to QoS provisioning by combining in- receiving the ACF message, the upstream node re-
band signaling, call admission control, and packet routes the flow through another downstream node
scheduling together. The soft state reservation provided by the TORA routing protocol. If none
scheme used in this framework ensures that re- of its neighbors are able to admit the flow, it in
sources are quickly released at the time of path re- turn sends an ACF message to its upstream node.
configuration. But, this framework supports only While INORA is trying to find a feasible path by
adaptive applications, for example, multimedia searching the directed acyclic graph (DAG) follow-
applications. Since this framework is transparent ing admission control failure at an intermediate
to any MAC protocol, fairness and reservation node, the packets are transmitted as best-effort
scheme of MAC protocol have a significant influ- packets from the source to destination. In this
ence in providing QoS guarantees. Also as this scheme, different flows between the same source–
framework assumes that routing protocol provides destination pair can take different routes.
new routes in the case of topology changes, route
maintenance mechanism of the routing protocol 7.4.2. Class-based fine feedback scheme
employed significantly affects the delivery of real- In this scheme, the interval between BWmin and
time traffic. If enough resources are not available BWmax of a QoS flow is divided into N classes,
because of the changing network topology, the en- where BWmin and BWmax are the minimum and
hanced QoS application may be downgraded to base maximum bandwidths required by the QoS flow.
QoS or even to best-effort service. As this frame- Consider a QoS flow being initiated by the source
work uses in-band signaling, resources are not re- node S to destination node D. Let the flow be
served before the actual data transmission begins. admitted with class m (m < N).
Hence INSIGNIA is not suitable for real-time
applications that have stringent QoS requirements. 1. Let the DAG created by the TORA protocol be
as shown in Fig. 17. Let S ! A ! B ! D be the
7.4. INORA path chosen by the TORA routing protocol.
2. INSIGNIA tries to establish soft state reserva-
INORA [31] is a QoS framework for AWNs tions for the QoS flow along the path. Assume
that makes use of the INSIGNIA in-band signa- that node A has admitted the flow with class
ling mechanism and the TORA routing protocol m successfully and node B has admitted the
[32]. The QoS resource reservation signaling mech- flow with bandwidth of class l (l < m) only.
anism interacts with routing protocol to deliver 3. Node B sends an admission report message
QoS guarantees. The TORA routing protocol pro- (AR(l)) to upstream node A, indicating its
vides multiple routes between a given source–desti- ability to give only class l bandwidth to the
nation pair. The INSIGNIA signaling mechanism flow.
provides feedback to the TORA routing protocol 4. Node A splits the flow in the ratio of l to m
l
regarding the route chosen and asks for alternate and forwards the flow to node B and node Y, in
routes if the route provided does not satisfy the that ratio.
116 T.B. Reddy et al. / Ad Hoc Networks 4 (2006) 83–124

path1
node

A B

bottleneck node

pa
D

th2
S
link

bottleneck link
X Y

Fig. 17. INORA fine feedback scheme: node A has admitted the flow with class m, but node B is able to give it class l (l < m).

5. If node Y is able to give class (m


l) as re- tocol and uses feedback based control mechanisms
quested by node A, then the flow of class m is to support real-time services and service differenti-
split into two flows, one flow with bandwidth ation in AWNs. SWAN uses a local rate control
of class l along the path S ! A ! B ! D and mechanism for regulating injection of best-effort
the other one with bandwidth of class (m
l) traffic into the network, a source-based admission
along path S ! A ! Y ! D. control while accepting new real-time sessions, and
6. If node Y gives only class n (n < m
l), it sends an explicit congestion notification (ECN) mecha-
an AR(n) message to the upstream node A. nism for dynamically regulating admitted real-time
7. Node A, realizing that its downstream neigh- sessions. In this model intermediate nodes are re-
bors are unable to give class m service, informs lieved from the responsibility of maintaining per-
its ability to provide service class of (l + n) by flow or aggregate state information unlike stateful
sending an AR(l + n) to node S. QoS models such as INSIGNIA and INORA.
8. Node S tries to find another downstream neigh- Changes in topology and network conditions, even
bor, which might be able to accommodate the node and link failures, do not affect the operation
flow with class (m
(l + n)). of the SWAN control system. This makes the sys-
9. If no such neighbor is available, node S rejects tem simple, robust, and scalable.
the flow.
7.5.1. SWAN model
The SWAN model has several control modules
7.4.3. Advantages and disadvantages which are depicted in Fig. 18. Upon receiving a
INORA is better than INSIGNIA in that it can packet from the IP layer, the packet classifier
search multiple paths with lesser QoS guarantees. module checks whether it is marked (i.e., real-time
It uses the INSIGNIA in-band signaling mecha- packet) or not (i.e., best-effort packet). If it is a
nism. Since no resources are reserved before the best-effort packet, it is forwarded to the traffic
actual data transmission begins and since data shaper for regulation. If it is a real-time packet,
packets have to be transmitted as best-effort pack- the module directly forwards it to the MAC layer
ets in case of admission control failure at the inter- bypassing the traffic shaper. The traffic shaper
mediate nodes, this model may not be suitable for represents a simple leaky bucket traffic policy.
applications that require hard service guarantees. The traffic shaper delays best-effort packets in con-
formance with the rate calculated by the traffic rate
7.5. SWAN controller. The call admission controller module is
responsible for admitting or rejecting new real-
Ahn et al. proposed a distributed network time sessions. The decision on whether to admit
model called stateless wireless ad hoc networks or reject a real-time session is taken solely by the
(SWAN) [33] that assumes a best-effort MAC pro- source node based on the result of an end-to-end
T.B. Reddy et al. / Ad Hoc Networks 4 (2006) 83–124 117

pre–marked / unmarked packet request from Application Layer admit / reject

send probe
IP Admission controller
receive probe

mark / unmark / ECN


utilization of real–time traffic
unmarked
packet
Packet classifier Traffic shaper Traffic rate controller
rate
marked packet
packet delay

MAC

Shared wireless medium

Fig. 18. The SWAN model.

request/response probe. The SWAN distributed The shaping rate is adjusted every T seconds.
control algorithms are described in the following The traffic rate controller monitors the actual
sections. transmission rate. When the difference between
the shaping rate and the actual transmission rate
7.5.2. Local rate control of best-effort traffic is greater than g percent of the actual rate, then
The SWAN model assumes that most of the the traffic rate controller adjusts the shaping rate
traffic existing in the network is best-effort, which to be g percent above the actual rate. This gap al-
can serve as a ‘‘buffer zone’’ or absorber for real- lows the best-effort traffic to increase its actual rate
time traffic bursts introduced by mobility (because gradually. The threshold delay d is based on the
of rerouting of the already admitted real-time ses- delay requirements of real-time applications in
sions) or traffic variations (for example, bursty the network.
data). The best-effort traffic can be locally and rap-
idly rate controlled in an independent manner at 7.5.3. Source-based admission control of
each node in order to yield the necessary low real-time traffic
delays and stable throughput for real-time traffic. The process of admitting a new real-time ses-
The best-effort traffic utilizes remaining bandwidth sion is as follows. The admission controller mod-
(if any) left out by real-time traffic. Hence this ule at the source node sends a probing request
model does not work in scenarios where most of packet towards the destination node to assess the
the traffic is real-time in nature. end-to-end bandwidth availability. This is a best-
The traffic rate controller determines the depar- effort control packet that contains a bottleneck
ture rate of the traffic shaper using an additive in- bandwidth field. Each intermediate node on the
crease multiplicative decrease (AIMD) rate control path between the source–destination pair that
algorithm which is based on packet delay feedback receives the probing request packet updates the
from the MAC layer. The SWAN AIMD rate con- bottleneck bandwidth field in the packet if the
trol algorithm works as follows. Every T seconds, bandwidth availability at the node is less than
each node increases its transmission rate gradually the current value of the field. On receiving the
(additive increase with increment rate of c Kbps). probing request packet, the destination node sends
If the packet delays exceed the threshold delay of a probing response packet back to the source node
d seconds, then the node decrements its transmis- with the bottleneck field copied from the received
sion rate (multiplicative decrease by r percent). probing request packet. After receiving the
118 T.B. Reddy et al. / Ad Hoc Networks 4 (2006) 83–124

response message, the source node admits the new Source-based regulation: In this scheme the
real-time session only if sufficient end-to-end band- source node waits for a random amount of time
width is available. In this model, no bandwidth re- after receiving a regulate message from a con-
quest is carried in the probing message, no gested or overloaded intermediate node on the
admission control is done at intermediate nodes, path to the destination node and then initiates
and no resource allocation or reservation is done the re-establishment process. This can avoid
on behalf of the source node during the lifetime flash-crowd conditions. In this scheme the rate of
of an admitted session. the real-time traffic will gradually decrease until
it reaches below the admission control rate. Then
7.5.4. Regulation algorithms the congested or overloaded nodes will stop mark-
Host mobility and false admission pose a seri- ing packets. Even though this scheme is simple and
ous threat for fulfilling the service guarantees source-based, it has a disadvantage that sources
promised to the flows. Take the case of multiple that regulate earlier than other sources are more
source nodes initiating admission control at the likely to find the path overbooked and be forced
same instant and sharing common intermediate to terminate their sessions.
nodes on their paths to destination nodes. Since Network-based regulation: Unlike the previous
intermediate nodes do not maintain state infor- scheme, in this scheme congested or overbooked
mation and since admission control is fully nodes randomly select a congestion set of real-time
source-based, each source node may receive a sessions and only mark packets associated with
response to its probe packet indicating that that set. A congested node marks the congested
resources are available, even though the available set for a time period of T seconds and then calcu-
resources may not be not sufficient to satisfy all lates a new congested set. Hence some intelligence
the requests. The source node being unaware of is required at the intermediate nodes. Like the pre-
this fact falsely admits a new flow. If left unre- vious approach, nodes stop marking packets as
solved, it can cause excessive delays in delivery congested when the measured rate of real-time traf-
of real-time traffic. To resolve this problem, the fic reaches below the admission control rate.
SWAN AIMD rate control and source-based
admission control algorithms were augmented 7.5.5. Advantages and disadvantages
with dynamic regulation of real-time traffic. The SWAN gives a framework for supporting real-
algorithms used for this dynamic regulation are time applications by assuming a best-effort MAC
described below. protocol and not making any resource reservation.
The ECN-based regulation of real-time sessions It uses feedback based control mechanisms to reg-
operates as follows. Each node continuously esti- ulate real-time traffic at the time of congestion in
mates the locally available bandwidth. When a the network. As best-effort traffic serves as a buffer
node detects congestion/overload conditions, it zone for real-time traffic, this model does not work
starts marking the ECN bits in the IP header of well in scenarios where most of the traffic is real-
the real-time packets. If the destination receives a time in nature. Even though this model is scalable
packet with ECN bits marked, it notifies the (because the intermediate nodes do not maintain
source using a regulate message. After receiving a any per flow or aggregate state information), it
regulate message, the source node initiates re- cannot provide hard QoS guarantees due to lack
establishment of its real-time session. If the node of resource reservation at the intermediate nodes.
detecting violations marks (i.e., sets) the ECN bits An admitted real-time flow may encounter peri-
of all packets, then all sessions passing through odic violations in its bandwidth requirements. In
this node are forced to re-establish their sessions the worst case, it may have to be dropped or be
at the same instance. Since such an approach is made to live with downgraded best-effort service.
inefficient, the SWAN model considered two ap- Hence, the local rate control of best-effort traffic
proaches in which only a small number of sources mechanism alone may not be sufficient to fully
are penalized. support real-time traffic.
T.B. Reddy et al. / Ad Hoc Networks 4 (2006) 83–124 119

7.6. Proactive RTMAC 7.6.1. Operation of PRTMAC


The PRTMAC framework is shown in Fig. 19.
Proactive RTMAC (PRTMAC) [34] is a cross RTMAC [13] is used as the MAC protocol. The
layer framework, with an on-demand QoS exten- out-of-band signaling channel gathers additional
sion of DSR routing protocol at the network information about the ongoing real-time sessions,
layer and RTMAC (real-time MAC) [13] protocol such that proactive measures can be taken to pro-
at the MAC layer. PRTMAC is a tightly coupled tect these sessions from breakaways and clashes. A
solution, which requires the bandwidth reserva- narrow band control channel that operates over a
tion and bandwidth availability estimation serv- transmission range with twice that of the data
ices from the underlying MAC protocol. It is transmission range, is used as the out-of-band
designed to provide enhanced real-time traffic signaling channel. Every node sends out control
support and service differentiation to highly mo- beacons (short fixed sized packets) at regular inter-
bile ad hoc wireless networks such as that formed vals over the control channel. The information
by military combat vehicles. The performance of carried by the beacons, and the beacon itself, are
real-time sessions in ad hoc wireless networks used by the nodes to gather information about
are affected by mobility of nodes in many differ- real-time sessions. Firstly, the signal strength of
ent ways. the received beacon is used to gain an idea about
The two major ways in which mobility affects the relative distance of the node which sent the
real-time sessions are breakaways and reservation beacon. Further, the information carried by the
clashs. If a node participating in a QoS session beacon is used in predicting breakaways and
moves out of the transmission range of either or clashes. The beacons carry information about each
both of its upstream and downstream nodes, we of the sessions that the originating node is carry-
say the QoS session is broken due to breakaway. ing, and the slots in the super-frame that have been
Assume that node A is transmitting to node B over reserved for them. Each node originates periodic
a given slot (say slot #1). Similarly, at some other beacons on the control channel. The beacon has
region in the network, node C is transmitting to information about all on-going real-time sessions
node D over the same slot (slot #1). Now, if node at the node. The information includes the start
C moves into the transmission range of node B (as- and end times of the reservation slot of each ses-
sume no breakaway due to mobility for the session sion, the sender and the receiver of the session,
between nodes C and D), packets transmitted by and the service class (service classes are used to
nodes A and C result in a collision at node B. This provide differentiated services among the real-time
problem is referred as clash. sessions existing in the system, for example, the

Proactive
call maintenance Reservation Table
module
Network layer

Routing and
call admission
control module

Out–of–band
signaling module MAC layer (RTMAC)

Physical layer

Fig. 19. Modules in PRTMAC framework.


120 T.B. Reddy et al. / Ad Hoc Networks 4 (2006) 83–124

command and control sessions in a military com- strengthæ tuples of the beacons received from any
munication system may require higher priority other node. Using this, it generates a polynomial
than the other sessions) to which the session be- on the variation of signal strength with time. The
longs. The range of the control channel has to be roots of the polynomial refer to the time at which
sufficiently larger than that of the data channel the signal strength can cross a receiving threshold.
so that all possible events that can cause a session When node A predicts that node B is going to
to be interrupted can be discovered well in ad- cross the data channel range within the next bea-
vance. con interval, it takes proactive actions described
Crossover-time prediction: Crossover-time is de- in the next section. If node B is already within
fined as the time at which a node crosses another the data channel range of node A, then the predic-
nodeÕs data transmission range r. This event is de- tion will be for a crossover-out event, and all ses-
fined as crossover. As apparent from Fig. 20(a) and sions going on between nodes A and B will be
(b), there are two different crossover-times, namely interrupted. If node B is outside the range of node
crossover-time-in and crossover-time-out. A, then it is a crossover-in event, and any packets
The crossover-time-in is the expected time at belonging to existing real-time sessions at node A
which node B in Fig. 20(a), reaches the crosso- and node B will collide if their reservation times
ver-point such that a bidirectional link forms overlap. Note that if the predicted time of entry
between nodes A and B. Fig. 20(b) shows the is beyond the next beacon interval, no action needs
crossover-time-out, which happens at the instant to be taken as of now, since the event would be
node B moves away from node A such that the link predicted again, on receipt of the next beacon.
between nodes A and B breaks. Each node (say Handling breakaways: The event of breakaways
node A), upon reception of every new beacon from can be handled in two different ways, first is the
another node (say node B), predicts the crossover- local reconfiguration and second is the end-to-
time based on the signal strength history obtained end reconfiguration. In local reconfiguration, the
from past beacons i.e., if node B is inside the range upstream node (say node U) that has detected
of the data channel of node A, node A predicts the breakaway takes the responsibility and issues fresh
crossover-time-out, and if node B is outside the route probe packets to obtain a path with reserva-
range of the data channel of node A, node A pre- tion from that node to the destination. But, in the
dicts the crossover-time-in. The prediction of cross- case of end-to-end reconfiguration, node U informs
over-time-out of node B with respect to node A is the source node about the breakaway, so that the
performed by keeping track of the signal strengths source finds a new path to the destination. In
of the beacons previously sent by node B to node PRTMAC a combination of the above two types
A. A node stores a fixed number of Ætime, signal is attempted which is described as below: Node

Crossover distance

R R
Direction of
Node B’s
movement r A B
r
A B

Crossover distance

Crossover point Crossover point Direction of


R: Control channel transmission range Node B’s
movement
r: Data channel transmission range
(a) (b)

Fig. 20. Illustration of crossover-in and crossover-out.


T.B. Reddy et al. / Ad Hoc Networks 4 (2006) 83–124 121

U checks if its routing table has another path to-


wards the destination node (say node F). If there
exists such a node, then node U makes reservations
on the link U–F for the on-going session. If the ses-
#5 O
sion is interrupted and reconfigured locally a num- #1
C N
ber of times, then end-to-end reconfiguration is P
attempted.
Handling clashes: Fig. 21(a) illustrates how two
nodes can reside safely within range of each other
if the reserved slots do not overlap with each other.
Fig. 22. Clash handling.
If the reservation slots clash for the two nodes, as
indicated in Fig. 21(b), then PRTMAC handles it
in such way that the flow between say node N free reservation slot in both nodes N and C large
and node C is assigned to a new slot (#5) as shown enough to accommodate the session to be shifted.
in Fig. 22. In the absence of any measures taken to If it succeeds in finding such a free slot, the existing
resolve a clash, both the sessions that experience a reservations for the session have to be dropped
clash will be reconfigured from the source to the and new reservations have to be made for the ses-
destination, resulting in degradation of perform- sion in the free slot. This is achieved by the origi-
ance. PRTMAC prevents such an occurrence to nator of the session freeing the earlier reservation
the extent possible, by pro-actively shifting one and issuing a request for the reservation of the
of the sessions to a new slot, so that the two ses- slots belonging to the free slot.
sions do not clash. This benefit of clash resolution If both the sessions that clash have high priority
is more important when a higher priority session and node N cannot come up with a free slot en-
clashes with a lower priority session. In such a ough to accommodate the session, it informs node
case, the node having the low priority session has O about its failure in shifting the session. Now
to reconfigure it to a new slot. node O executes the above process with its coun-
As illustrated in Fig. 22, the node whose terpart, and tries to shift the session. If one of
responsibility it is to reconfigure the session is de- the sessions that clash is a high priority session
noted by node N, the other node, whose session and the other a low priority one, and the node that
clashes with node Ns session, is denoted by node has a low priority session (here it is node N) is un-
O, and the counterpart of node N in its session able to find a new slot to shift the session, the low
by node C. Node N goes through its reservation priority session undergoes end-to-end reconfigura-
tables and its neighbor reservation table corre- tion. This is to ensure that the low priority session
sponding to node C and tries to come up with a would not hinder the high priority sessions.

Direction of movement

#1 O #1 N O
#2 #1
C N C r
P P

R: Control channel transmission range


(a) r: Data channel transmission range (b)

Fig. 21. (a) No clash and (b) before clash.


122 T.B. Reddy et al. / Ad Hoc Networks 4 (2006) 83–124

7.6.2. Advantages and disadvantages [6] S. Mangold, S. Choi, P. May, O. Klein, G. Hiertz, L.
PRTMAC is appropriate in providing better Stibor, IEEE 802.11e wireless LAN for quality of service,
in: Proceedings of the European Wireless 2002, vol. 1,
real-time traffic support and service differentiation February 2002, pp. 32–39.
in high mobility AWNs such as military networks [7] IEEE 802.11 TGe, EDCF proposed draft text, TR-01/
formed by high speed combat vehicles, fleet of 131r1, March 2001.
ships, fleet of air-crafts where the power resource [8] IEEE 802.11 TGe, Hybrid coordination function (HCF)––
is not a major concern. In AWNs, formed by proposed updates to normative text of D0.1, TR-01/110r1,
March 2001.
low power and resource constrained handheld de- [9] IEEE 802.11 TGe, HCF ad hoc group recommendation––
vices, having another channel may not be an eco- normative text to EDCF access category, TR-02/241r0,
nomically viable solution. March 2001.
[10] IEEE 802.11 TGe, Proposed normative text for AIFS––
revisited, TR-01/270r0, February 2003.
8. Summary [11] S. Sheu, T. Sheu, DBASE: A distributed bandwidth
allocation/sharing/extension protocol for multimedia over
IEEE 802.11 ad hoc wireless LAN, in: Proceedings of
In this paper several solutions proposed in the IEEE INFOCOM 2001, vol. 3, April 2001, pp. 1558–1567.
literature for QoS provisioning in AWNs were dis- [12] C.R. Lin, M. Gerla, Real-time support in multihop wireless
cussed. First the issues and challenges involved in networks, Wireless Networks 5 (2) (1999) 125–135.
providing QoS in AWNs were identified. Then [13] B.S. Manoj, C. Siva Ram Murthy, Real-time traffic
the existing QoS approaches were classified support for ad hoc wireless networks, in: Proceedings of
IEEE ICON 2002, August 2002, pp. 335–340.
according to several criteria such as interaction be- [14] S. Chen, K. Nahrstedt, Distributed quality-of-service
tween routing protocol and resource reservation routing in ad hoc networks, IEEE Journal on Selected
signaling, interaction between network and MAC Areas in Communications 17 (8) (1999) 1488–1504.
layer, and routing information update mechanism. [15] S.H. Shah, K. Nahrstedt, Predictive location-based qos
A layer-wise classification of the existing QoS solu- routing in mobile ad hoc networks, in: Proceedings of
IEEE ICC 2002, vol. 2, May 2002, pp. 1022–1027.
tions was also provided. The existing QoS solu- [16] S. De, S.K. Das, H. Wu, C. Qiao, Trigger-based distrib-
tions were then discussed in a layer-wise order. uted QoS routing in mobile ad hoc networks, ACM
Finally, some of the important QoS frameworks SIGMOBILE Mobile Computing and Communications
for AWNs were described. Review 6 (3) (2002) 22–35.
[17] C.E. Perkins, E.M. Royer, Ad hoc on-demand distance
vector routing, in: Proceedings of IEEE Workshop on
Mobile Computing Systems and Applications, February
References 1999, pp. 90–100.
[18] C.E. Perkins, E.M. Royer, S.R. Das, Quality of service for
[1] P. Karn, MACA: A new channel access method for packet ad hoc on-demand distance vector routing (work in
radio, in: Proceedings of ARRL/CRRL Amateur Radio progress), IETF Internet Draft, draft-ietf-manet-aodvqos-
9th Computer Networking Conference, September 1990, 00.txt, July 2000.
pp. 134–140. [19] C.R. Lin, J. Liu, QoS routing in ad hoc wireless networks,
[2] IEEE Standards Board, Part 11: Wireless LAN Medium IEEE Journal on Selected Areas in Communications 17 (8)
Access Control (MAC) and Physical Layer (PHY) Spec- (1999) 1426–1438.
ifications, The Institute of Electrical and Electronics [20] C.E. Perkins, P. Bhagwat, Highly dynamic destination-
Engineers Inc., 1997. sequenced distance-vector routing (DSDV) for mobile
[3] F.A. Tobagi, L. Kleinrock, Packet switching in radio computers, in: Proceedings of ACM SIGCOMM 1994,
channels: Part II––The hidden terminal problem in carrier vol. 24 (4), October 1994, pp. 234–244.
sense multiple-access and the busy-tone solution, IEEE [21] C.R. Lin, On-demand QoS routing in multihop mobile
Transactions on Communications 23 (12) (1975) 1417– networks, in: Proceedings of IEEE INFOCOM 2001, vol.
1433. 3, April 2001, pp. 1735–1744.
[4] J. Deng, Z.J. Haas, Dual busy tone multiple access [22] Y. Chen, Y. Tseng, J. Sheu, P. Kuo, On-demand, link-
(DBTMA): a new medium access control for packet radio state, multi-path QoS routing in a wireless mobile ad-hoc
networks, in: Proceedings of IEEE ICUPC 1998, vol. 1, network, in: Proceedings of European Wireless 2002,
October 1998, pp. 973–977. February 2002, pp. 135–141.
[5] M. Gerla, J.T.C. Tsai, Multicluster, mobile, multimedia [23] V. Vidhyashankar, B.S. Manoj, C. Siva Ram Murthy, Slot
radio network, Wireless Networks 1 (3) (1995) 255–265. allocation schemes for delay sensitive traffic support in
T.B. Reddy et al. / Ad Hoc Networks 4 (2006) 83–124 123

asynchronous wireless mesh networks, in: Proceedings of I. Karthigeyan received the B.E. degree
HiPC 2003, December 2003. in Computer Science and Engineering
[24] D.B. Johnson, D.A. Maltz, Dynamic source routing in ad from University of Madras, Tamiln-
hoc wireless networks, in: T. Imielinski, H. Korth (Eds.), adu, India, in 2000. He is currently
Mobile Computing, Kluwer Academic Publishers, Dor- pursuing his MS (by Research) degree
drecht, 1996, pp. 153–181. in Computer Science and Engineering
[25] P. Sinha, R. Sivakumar, V. Bharghavan, CEDAR: A core at the Indian Institute of Technology
extraction distributed ad hoc routing algorithm, IEEE (IIT), Madras, India. His research
Journal on Selected Areas in Communications 17 (8) (1999) interests include Wireless Networks
1454–1466. and Optical Networks.
[26] R. Braden, D. Clark, S. Shenker, Integrated services in the
Internet architecture: an overview, in: IETF RFC1633,
June 1994.
[27] S. Blake, D. Black, M. Carlson, E. Davies, Z. Wang, W. B.S. Manoj completed his graduation
Weiss, An architecture for differentiated services, in: IETF in 1995 and post graduation in 1998
RFC2475, December 1998. both in Electronics and Communica-
[28] R. Braden, L. Zhang, S. Berson, S. Herzog, S. Jamin, tion Engineering from Institution of
Resource reservation protocol (RSVP)––Version 1 func- Engineers (India) and Pondicherry
tional specification, IETF RFC 2205, September 1997. Central University, Pondicherry, In-
[29] H. Xiao, K.G. Seah, A. Lo, K.C. Chua, A flexible quality dia, respectively. He has worked as a
of service model for mobile ad-hoc networks, in: Proceed- Senior Engineer with Banyan Net-
ings of IEEE Vehicular Technology Conference, vol. 1, works Pvt. Ltd., Chennai, India from
May 2000, pp. 445–449. 1998 to 2000 where his primary
[30] S.B. Lee, A. Gahng-Seop, X. Zhang, A.T. Campbell, responsibility included design and
INSIGNIA: An IP-based quality of service framework for development of protocols for real-time traffic support in data
mobile ad hoc networks, Journal of Parallel and Distrib- networks. He has been an Infosys doctoral student in the
uted Computing 60 (4) (2000) 374–406. Department of Computer Science and Engineering at the
[31] D. Dharmaraju, A.R. Chowdhury, P. Hovareshti, J.S. Indian Institute of Technology (IIT) Madras, India, where he
Baras, INORA––A unified signalling and routing mecha- focused on the development of architectures and protocols for
nism for QoS support in mobile ad hoc networks, in: Ad hoc wireless networks and next generation hybrid wireless
Proceedings of ICPPW 2002, August 2002, pp. 86–93. network architectures. Indian Science Congress Association has
[32] V.D. Park, M.S. Corson, A highly adaptive distributed awarded him the Young Scientist Award for the Year 2003.
routing algorithm for mobile wireless networks, in: Pro- Since January 2004, he is a Project Officer at the Department of
ceedings of IEEE INFOCOM 1997, vol. 3, April 1997, pp. Computer Science and Engineering, Indian Institute of Tech-
1405–1413. nology (IIT), Madras, India. His current research interests in-
[33] H. Ahn, A.T. Campbell, A. Veres, L. Sun, Supporting clude Ad hoc wireless networks, next generation wireless
service differentiation for real-time and best-effort traffic in architectures, and wireless sensor networks.
stateless wireless ad hoc networks, IEEE Transactions on
Mobile Computing 1 (3) (2002) 192–207.
[34] V. Vivek, T. Sandeep, B.S. Manoj, C. Siva Ram Murthy, A
novel out-of-band signaling mechanism for enhanced real- C. Siva Ram Murthy received the
time support in tactical ad hoc wireless networks, in: B.Tech. degree in Electronics and
Proceedings of IEEE RTAS 2004, May 2004. Communications Engineering from
Regional Engineering College (now
T. Bheemarjuna Reddy received the National Institute of Technology),
B.Tech. degree in Computer Science Warangal, India, in 1982, the M.Tech.
and Engineering from Andhra Uni- degree in Computer Engineering from
versity, India, in 2000 and the M.E. the Indian Institute of Technology
degree in Computer Science and Engi- (IIT), Kharagpur, India, in 1984, and
neering from the National Institute of the Ph.D. degree in Computer Science
Technology (NIT), Rourkela, India, in from the Indian Institute of Science,
2002. He is currently a doctoral student Bangalore, India, in 1988. He joined the Department of Com-
in the Department of Computer Sci- puter Science and Engineering at IIT, Madras, as a Lecturer in
ence and Engineering at the Indian September 1988 and became an Assistant Professor in August
Institute of Technology (IIT), Madras, 1989 and an Associate Professor in May 1995. He has been a
India. His research interests include QoS provisioning and Professor with the same department since September 2000. He
Multimedia streaming in Ad hoc wireless networks. has held visiting positions at the German National Research
124 T.B. Reddy et al. / Ad Hoc Networks 4 (2006) 83–124

Centre for Information Technology (GMD), Bonn, Germany, Concepts, Design, and Algorithms (Prentice-Hall PTR, USA;
the University of Stuttgart, Germany, the University of Frei- reprinted by Prentice-Hall of India, New Delhi, India). He is a
burg, Germany, the Swiss Federal Institute of Technology recipient of the Best Ph.D. Thesis Award and also of the Indian
(EPFL), Switzerland, and the University of Washington, Seat- National Science Academy Medal for Young Scientists. He is a
tle, USA. He has to his credit over 100 research papers in co-recipient of Best Paper Awards from 5th IEEE International
international journals and over 75 international conference Workshop on Parallel and Distributed Real-Time Systems held
publications. He is the co-author of the textbooks Parallel in Geneva, Switzerland in 1997 and 6th International Confer-
Computers: Architecture and Programming (Prentice-Hall of ence on High Performance Computing held in Calcutta, India
India, New Delhi, 2000), New Parallel Algorithms for Direct in 1999. He is a Fellow of Indian National Academy of Engi-
Solution of Linear Equations (John Wiley & Sons, Inc., USA, neering. His research interests include Parallel and Distributed
2000), Resource Management in Real-time Systems and Net- Computing, Real-time Systems, Lightwave Networks, and
works (MIT Press, USA, 2001), and WDM Optical Networks: Wireless Networks.

Das könnte Ihnen auch gefallen