Beruflich Dokumente
Kultur Dokumente
I. INTRODUCTION
WMN stands next in the list of technologies which have the
capacity to influence the way we communicate today. It has
the capacity to change our work style and enhance our
productivity. Although derived from military research into
mobile networks, WMNs have their greatest potential in the
commercial marketplace. Though WMNs can be based upon a
number of technologies, their practical commercial evolution
is primarily occurring through the use of wireless LAN
communications. There are two basic types of wireless LAN
networking structures, referred to as peer to peer and
infrastructure. In a peer to peer networking structure, each
node can directly communicate with the other. While in an
infrastructure LAN networking environment, all traffic flows
through an access point. A wireless mesh network represents
a series of peer to peer transmissions where each node
functions as a router and a repeater. This wireless peer to peer
network structure is also referred to as an ad hoc network.
Compared with their single-hop counterpart, wireless LANs,
the WMNs are self-organized with the nodes automatically
establishing ad hoc networks and maintaining their
connectivity. This provides more reliability, larger coverage
and reduces equipment cost. [2]
As illustrated in the Figure 1, the network architecture
consists of two parts, the mesh backbone and local footprints.
All the mesh nodes are equipped with two wireless interfaces.
One is an IEEE 802.11a/g compliant radio, which is the
backbone traffic carrier. Another is an IEEE 802.11b radio,
which provides access to wireless clients in the local
footprint. It supports standard configured wireless clients,
which usually have off-the-shelf IEEE 802.11 hardware.
Wireless clients can have access to the Internet or intranet
through the wireless mesh backbone. Arriving users can
immediately join the network when they come into range and
2
turn
on
their
devices.
3
associated a forwarding group, FG. Any node in FG is in
charge of forwarding (broadcast) multicast packets of G. That
is, when a forwarding node (a node in FG) receives a
multicast packet, it will broadcast this packet if it is not a
duplicate. All neighbors can hear it, but only neighbors that
are in FG will determine if it is a duplicate and then
broadcast it in turn. [10]
This project compares the two different methodologies of
multicasting (source based and mesh based) proposed in
WMNs. Two routing protocols ADMR and ODMRP have
been selected, one from each of these categories. Comparison
of these protocols against metrics including packet delivery
ratio, number of data packets transmitted per data packet
delivered, number of control packets transmitted per data
packet delivered, number of control packets and data packets
transmitted per data packet delivered. While the performance
was determined on the basis of varying the number of
senders, node mobility and multicast group size for each of
these protocols. NS2 (Network Simulator 2) has been used as
the simulator to compare the protocols.
The rest of the paper has been organized as follows, in
section II a few of the papers having related work is
discussed, section III deals with the description of the
multicast routing protocols, section IV discusses the NS2
environment, section V discusses the results and observations
leading to the comparison of the protocols, section VI draws
conclusions based on the results, section VII indicates the
future work that needs to be done to enhance the mesh
network model in NS2.
II.RELATED WORK
A lot of research has been going on in the field of
multicasting in Wireless Mesh Networks. [11] talks about
efficient multicast routing on wireless mesh networks and its
interconnection to wired IP multicast services. They propose a
tree construction scheme which reduces data overhead by
making maximum use of the broadcast nature of the wireless
medium. They define a distributed approximation of MST
heuristic algorithm. [12] compares different approaches to
reliable multicast protocols namely Scalable Reliable
Multicast (SRM), Multicast File Transfer Protocol (MFTP).
[13] has developed a new multicasting protocol (PUMA
protocol for unified multicasting through announcements)
which establishes and maintains a shared mesh for each
multicast group without requiring a unicast routing protocol.
They compared the performance of MAODV, ODMRP and
PUMA on the basis of mobility, group members, number of
senders, traffic load and number of multicast groups. PUMA
uses a receiver initiated approach in which receivers join a
multicast group using the address of a special node (usually
called the group leader), without the need for network-wide
flooding of control or data packets from all the sources of a
group. PUMA eliminates the need for a unicast routing
protocol and the pre-assignment of cores to multicast groups.
PUMA was found to achieve a higher packet delivery ratio
than ODMRP or MAODV, while incurring far less control
overhead.
[3] compares MAODV and ODMRP. They identified some
ADMR
2.
3.
4
of the multicast group. It does not follow any predetermined
sequence of hops. These multicast packets are forwarded only
by the tree members of this multicast forwarding tree.
If no routing state information exists for this sender and
group, the routing layer on S adds an ADMR header to the
data packet and sends the data packet as a network flood.
Also the node records in its Node Table the MAC address of
the node from which it received the packet, and the sequence
number stored in the packet's ADMR header. This
information will be used for duplicate detection and also, for
forwarding packets back to S. This type of forwarding
increases robustness against packet loss due to collisions or
broken links.
Each source floods its first data packet for a group, and each
receiver responds to that flood with a RECEIVER JOIN
packet. All nodes that receive and forward this packet towards
S create a forwarding entry in its Membership Table for the
Source S and Group G. A flood-response cycle is initiated by
each receiver when it first joins the group.
The collection of paths with forwarding state between S and
the receivers for G produces the Forwarding Tree [4]
5
Table to determine to what nodes it should forward the
packet. If the flag bit is set to tree flooding, then it passes the
multicast packet to the next layer in the protocol stack and the
packet flows along the tree from the sender to the group
receiver. While if the flag bit was set to network flood, the
packet would be flooded among all the nodes in the network.
ODMRP
6
R1
S1
I1
R2
S2
I2
R3
JoinReplyofNodeR1
Sender
NextNode
S1
I1
S2
I2
JoinReplyofNodeI1
Sender
NextNode
S1
S1
7
network components are further divided into two subclasses,
Connector and Classifier, based on the number of the possible
output data paths.
Pure OTcl
objects
OTcl/C++ split
objects
OTcl
Tclcl
linkage
NS-2
Pure C++
objects
C++
Event Scheduler
The figure below shows each network object using an event
scheduler. The network object that issues an event has to
handle it at a later time. Also the data path between the
network objects is different from the event path. The packets
are handed from one network object to another using
send(Packet* p) {target_->recv(p)}; method of the sender and
recv(Packet*, Handler* h = 0) method of the receiver. [21]
Packet
The following shows the format of a NS packet. It is
composed of a stack of headers and an optional data space.
TK8
OTcl
Tclcl
...
tcl
ex
exampl
e
test
Ns-2
lib
Nam-1
C++ code
mcast
...
validation tests
OTcl code
Performance Metrics
ADMR and ODMRPs performance was compared on the
basis of the following metrics. [19]
Results
The trace files generated from executing the tcl (script) files
in NS2 are parsed by the mcast_totals.pl Perl Script [18] to
generate the MATLAB ready output files. These graphs are
generated on MATLAB. MATLAB is a high-level language
and interactive environment that enables performing
computationally intensive tasks [22].
Varying the number of multicast receivers
V. SIMULATION ENVIRONMENT
One protocol from each type of multicasting protocols was
chosen for comparison. The implementation of ADMR (tree
based multicasting protocol) and ODMRP (mesh based
multicasting protocol) from the Monarch Project [18] is used
for analyses.
Experimental Setup
0.7
1
0.98
0.94
0.92
0.9
0.88
0.86
0.84
ADMR
ODMRP
0.82
0.8
5
6
7
Number of Receivers
ADMR
ODMRP
18
16
14
12
10
8
6
4
2
0
5
6
7
Number of Receivers
0.5
0.4
0.3
0.2
0.1
0
10
20
0.6
10
5
6
7
Number of Receivers
10
0.96
ADMR
ODMRP
20
ADMR
ODMRP
18
16
14
12
10
8
6
4
2
0
5
6
7
Number of Receivers
10
0.99
ADMR
ODMRP
0.98
0.96
0.95
0.94
0.93
0.92
0.91
0.9
5
6
Number of Sources
10
14
ADMR
ODMRP
14
12
10
8
6
4
2
0
5
6
Number of Sources
10
12
1
ADMR
ODMRP
10
0.9
8
6
16
4
2
0
5
6
Number of Sources
0.8
0.7
0.6
10
0.5
16
0.4
ADMR
ODMRP
4
5
6
7
Number of Groups (Size)
10
0.6
11
0.5
0.4
0.3
0.2
0.1
0
5
6
Number of Sources
10
0.97
10
10
9
8
7
6
5
4
3
2
1
ADMR
ODMRP
1
4
5
6
7
Number of Groups (Size)
10
11
0.98
ADMR
ODMRP
1.5
0.94
0.92
0.9
0.88
0.5
ADMR
ODMRP
0.96
2.5
0.86
4
5
6
7
Number of Groups (Size)
10
0.84
1.5
2.5
3
3.5
4
Single Source vs Multiple Source
12
10
8
6
4
2
0
ADMR
ODMRP
1
4
5
6
7
Number of Groups (Size)
14
4.5
ADMR
ODMRP
2.4
2.2
2
1.8
1.6
1.4
1.2
1
0.8
1.5
10
2.5
3
3.5
4
Single Source vs Multiple Source
4.5
1.4
ADMR
ODMRP
1.2
1
0.8
0.6
0.4
0.2
0
1.5
2.5
3
3.5
4
Single Source vs Multiple Source
4.5
12
VII. REFERENCES
ADMR
ODMRP
3.5
3
2.5
2
1.5
1
0.5
1.5
2.5
3
3.5
4
Single Source vs Multiple Source
4.5
Sung-Ju Lee, Mario Gerla, and Ching-Chuan Chiang, OnDemand Multicast Routing Protocol
[9]
13
[19]
ACKNOWLEDEMENT
The author would like to thank Dr Bruce Millard, Professor of Practice, Division of Computing Studies, ASU
Polytechnic, for his support and guidance throughout this project work.
Bio: Vikas graduated from the Ragiv Gandhi Technical University, Bhopal, India with a bachelors degree in Computer
Science & Engineering in 2006. He joined Arizona State University at the Polytechnic Campus in Fall 2006, majoring in
Computing Studies and completed his Masters degree in 2007. His research interests include network security and web
development.