Beruflich Dokumente
Kultur Dokumente
Abstract— In mobile ad hoc networks (MANETs), the and other multimedia services are usually what drive
provision of Quality of Service (QoS) guarantees is much the mass uptake of a technology, it follows that to truly
more challenging than in wireline networks, mainly due realise the potential of MANETs, they must be able to
to node mobility, multi-hop communications, contention
for channel access and a lack of central coordination. deliver such services, for which best-effort protocols are
QoS guarantees are required by most multimedia and not adequate.
other time- or error-sensitive applications. The difficulties This is because multimedia applications often have
in the provision of such guarantees have limited the stringent time- and reliability-sensitive service require-
usefulness of MANETs. However, in the last decade, much ments, which the network must cater for. As a conse-
research attention has focused on providing QoS assurances
in MANET protocols. The QoS routing protocol is an quence, especially in the past five or six years, focus
integral part of any QoS solution since its function is to has shifted from best-effort services to the provision
ascertain which nodes, if any, are able to serve applications’ of higher and better-defined QoS in MANET research.
requirements. Consequently, it also plays a crucial role in QoS routing protocols play a major part in a QoS
data session admission control. mechanism, since it is their task to find which nodes, if
This document offers an up-to-date survey of most major
contributions to the pool of QoS routing solutions for any, can serve an application’s requirements. Therefore,
MANETs published in the period 1997-2006. We include a the QoS routing protocol also plays a major part in
thorough overview of QoS routing metrics, resources and session admission control (SAC), since that is dependent
factors affecting performance and classify the protocols on the discovery of a route that can support the requested
found in the literature. We also summarise their operation QoS. Alternatively, some QoS routing solutions may
and describe their interactions with the medium access
control (MAC) protocol, where applicable. This provides not attempt to serve applications’ requirements directly,
the reader with insight into their differences and allows us rather they may seek to improve all-round QoS under
to highlight trends in protocol design and identify areas particular metrics.
for future research. The majority of the solutions proposed in the litera-
ture till now have focused on providing QoS based on
two metrics: throughput and delay. Of these, the more
I. I NTRODUCTION common is throughput. This is probably because assured
At the time of writing, the field of mobile ad hoc throughput is somewhat of a “lowest common denom-
networks (MANETs) [1] has been recognised as an area inator” requirement; most voice or video applications
of research in its own right for over ten years. Much hope require some level of guaranteed throughput in addition
for spontaneous and robust wireless communications has to their other constraints. However, many other metrics
been placed in MANETs due to their decentralised, are also used to quantify QoS and in this work we cover
self-configuring and dynamic nature, which avoids the most of them and provide examples of their use.
need for an expensive base station infrastructure. In the The remainder of this article is structured as follows.
mid-to-late 1990’s research focused mainly on designing In Section II we discuss related work in terms of QoS
distributed and dynamic communications protocols for routing surveys and summarise their main points. This
sharing the wireless channel and for discovering routes is followed by a brief review of the challenges posed
between mobile devices. The aim of these protocols was by the provision of QoS on the MANET environment
to provide a basic best-effort level of service to ensure (Section III). Next, Section IV presents an overview
network operation in the face of an unpredictable and of commonly employed QoS routing metrics, the fac-
shared wireless communication medium and to maintain tors affecting QoS protocol performance, the network
a network topology view and routes in the face of failing resources consumable by applications, and some of the
links and mobile devices. trade-offs involved in protocol design. We then continue
Despite the vast array of technological solutions for in Section V by describing some methods of classifying
MANETs, their practical implementation and use in the QoS routing solutions, in order to organise the many
real world has been limited so far. Since entertainment candidate solutions.
2
Following this, we summarise the operation, key fea- • There is a trade-off between QoS provisioning and
tures and major advantages and drawbacks of a selection minimisation of power utilisation;
of QoS routing protocols proposed in the literature. We Several areas of future work were also identified:
focus on journal articles and peer-reviewed conferences, • Admission control policies and protocols require
thereby hopefully extracting the most useful and impor- further attention;
tant subset of the candidate solutions. According to one • QoS robustness;
of the classification methods described in Section V, we • QoS routing protocol security against, for example,
discuss the proposals under various headings. Firstly, denial-of-service attacks. The combination of secu-
Section VI provides some examples of QoS routing rity and QoS provisioning;
protocols that rely on contention-free MAC. Section VII • Study of QoS preservation under failure conditions;
does the same for solutions operating with a contended • QoS support for multicast applications;
MAC. Finally, methods that do not rely on any specific
In 2004, Al-Karaki and Kamal published a detailed
kind of MAC are presented in Section VIII. Under
overview [5], of the state of, and the development
each section, we group protocols into different types
trends in, the field of QoS routing. They highlighted the
of approaches, although for some approaches, only one
following areas as requiring further research attention,
example is provided. We discuss our findings and the
where some may be duplicated from [4]:
observed trends in the field of QoS routing in Section
IX. Then, future work areas are identified according to • Accommodating multiple classes of traffic, in par-
our own findings in this survey (Section X), before a ticular, ensuring that lower-class traffic is not
summary is given in Section XI. starved of network resources in the presence of real-
Note that throughout this article, we consistently em- time traffic. Additionally the inclusion of preemp-
ploy the term “(data) session” as opposed to some other tive scheduling;
• Preservation of QoS guarantees under various fail-
authors who prefer to use “call” or “(data) flow”.
ure conditions;
• The use of position-determination systems such as
II. R ELATED W ORK GPS for aiding QoS routing;
A literature search already yields several overviews • Prioritisation of control packets above data packets
and surveys of QoS routing issues and solutions. How- in QoS routing;
ever, the last one was published in early 2004 and in • Use of more “realistic” mobility models, as opposed
this paper we cover many proposals published since to the overly simplistic ones often employed in
then. Also, we select some different and less well- simulation studies (e.g. random way-point);
known protocols for inclusion in our survey as a means • Quantifying the impact of cross-layer integration;
of highlighting alternative approaches to QoS routing. • Interaction of MANETs with the Internet and the
We additionally provide a more thorough background, impact on QoS routing thereof;
especially in terms of metrics and design trade-offs and • Security in the QoS routing protocol to prevent
devise new means of classification. Consequently, the malicious retransmission, snooping and redirection
trends and future work identified also differ greatly in of packets for example;
this document. • The impact of and solutions to network partitioning
A fairly comprehensive overview of the state of the in the context of QoS routing;
field of QoS in networking in 1999 was provided by • The effect of introducing devices that are heteroge-
Chen in [2]. Chakrabarti and Mishra [3] later sum- neous in terms of their capacity and capabilities;
marised the important QoS-related issues in MANETs Many of those considerations, such as security and
that were in focus around 2001, and the issues that multicast routing are beyond the scope of this article.
required further attention. This article was updated and In this work we focus on the essence of QoS routing,
expanded in 2004 [4]. Their conclusions highlighted which is the discovery of routes that can service data
several significant points: sessions and session admission control, which depends
• Many of the underlying algorithmic problems, such on the routes discovered.
as multi-constraint routing, have been shown to be Reference [5] also discussed many of the QoS routing
NP-complete; solutions existing in early 2004 and categorised them
• QoS, and indeed best-effort, routing can only be into the following types of approaches: flat (all nodes
successfully achieved if the network is combina- play an equal role), hierarchical (some nodes are local
torially stable. This means that the nodes are not cluster heads for example), position-based (utilise loca-
moving faster than routing updates can propagate; tion information), and power-aware (take battery usage
• Different techniques are required for QoS provi- and residual charge into consideration) QoS routing.
sioning when the network size becomes very large, Finally, a thorough overview of the more widely-
since QoS state updates would take a relatively long accepted MAC and routing solutions for providing better
time to propagate to distant nodes; QoS was presented in [6]. Reddy et al. also provided
3
various classifications of QoS solutions, as discussed in central controller, some set-up, new neighbour discovery
Section V. and control operations must take place on a common
contended channel. Indeed, avoiding the aforementioned
III. P ROBLEMS FACING THE P ROVISION OF Q O S IN complications, much MANET research, as well as the
MANET S currently most popular wireless ad hoc networking tech-
nology (802.11x) is based on fully-contended access to a
The following is a summary of the major challenges common channel i.e. with Carrier-Sense Multiple Access
to providing QoS guarantees in MANETs. with Collision Avoidance (CSMA/CA).
Unreliable wireless channel: the wireless channel However, CSMA/CA greatly complicates the calcula-
is prone to bit errors due to interference from other tion of potential throughput and packet delay, compared
transmissions, thermal noise, shadowing and multi-path to TDMA-based approaches. This is because nodes must
fading effects [7]. This makes it impossible to provide also take into account the traffic at all nodes within their
hard packet delivery ratio or link longevity guarantees. carrier sensing range. Furthermore, the possibility of
Node mobility: the nodes in a MANET may move collisions also arises. Collisions waste channel capacity,
completely independently and randomly as far as the as well as node battery energy, increase delay, and can
communications protocols are concerned. This means degrade the packet delivery ratio.
that topology information has a limited lifetime and Finally, the well-understood hidden node [10] and
must be updated frequently to allow data packets to be exposed node [11] problems are a further consequence
routed to their destinations. Again, this invalidates any of channel contention. These problems are even more
hard packet delivery ratio or link stability guarantees. pronounced when we consider that nodes may interfere
Furthermore, QoS state which is link- or node position- with transmissions outside of their transmission range
dependent must be updated with a frequency that in- [12], [9], [13], since receivers are able to detect a signal
creases with node mobility. at a much greater distance than that at which they can
An important general assumption must also be stated decode its information.
here: for any routing protocol to be able to function Limited device resources: to some extent this is an
properly, the rate of topology change must not be greater historical limitation, since mobile devices are becoming
than the rate of state information propagation. Otherwise, increasingly powerful and capable. However, it still holds
the routing information will always be stale and routing true that such devices generally have less computational
will be inefficient or could even fail completely. This power, less memory and a limited (battery) power supply,
applies equally to QoS state and QoS route information. compared to devices such as desktop computers typically
A network that satisfies this condition is said to be employed in wired networks. This factor has a major
combinatorially stable [3]. impact on the provision of QoS assurances, since low
Lack of centralised control: the major advantage of memory capacity limits the amount of QoS state that can
an ad hoc network is that it may be set up spontaneously, be stored, necessitating more frequent updates, which
without planning and its members can change dynam- incur greater overhead. Additionally, QoS routing gen-
ically. This makes it difficult to provide any form of erally incurs a greater overhead than best-effort routing
centralised control. As such, communications protocols in the first place, due to the extra information being
which utilise only locally-available state and operate in disseminated. These factors lead to a higher drain on
a completely distributed manner, are preferred [8]. This mobile nodes’ limited battery power supply. Finally,
generally increases an algorithm’s overhead and com- within the pool of QoS routing problems, many are
plexity, as QoS state information must be disseminated NP-complete [3], and thus complicated heuristics are
efficiently. required for solving them, which may place an undue
Channel contention: In order to discover network strain on mobile nodes’ less-powerful processors.
topology, nodes in a MANET must communicate on a
common channel. However, this introduces the problems
of interference and channel contention. For peer-to-peer IV. Q O S ROUTING PROTOCOL DESIGN
data communications these can be avoided in various CONSIDERATIONS
ways. One way is to attempt global clock synchronisa- A. Metrics used to specify QoS requirements
tion and use a TDMA-based system where each node
may transmit at a predefined time. This is difficult to The following is a sample of the metrics commonly
achieve due to the lack of a central controller, node used by applications to specify QoS requirements to the
mobility and the complexity and overhead involved [9]. routing protocol. Consequently, they may be used as
Other ways are to use a different frequency band or constraints on route discovery and selection. Each metric
spreading code (as in CDMA) for each transmitter. is followed by a reference which provides an example of
This requires a distributed channel selection mechanism a protocol that employs the metric as a QoS constraint.
as well as the dissemination of channel information. • Minimum required throughput or capacity (bps) -
However data communications take place, without a the desired application data throughput. For an ex-
4
ample of QoS routing using this metric/constraint, • Delay jitter (s) or variance - the measured delay
see [14]; jitter on a path. See the previous section for a
• Maximum tolerable delay (s) - usually defined definition;
as the maximum tolerable end-to-end (source to • Packet loss ratio (PLR) (%) - the percentage of total
destination) delay for data packets [15]; packets sent, which is not received by the transport
• Maximum tolerable delay jitter - one widely- or higher layer agent at the packet’s final destination
accepted definition of this metric is the difference node;
between the upper bound on end-to-end delay and • Energy expended per packet (J) [20];
the absolute minimum delay [16]. The former in- • Route lifetime (s) - the statistically calculated ex-
corporates the queuing delay at each node and the pected lifetime of a route, which can depend on
latter is determined by the propagation delay and node mobility as well as node battery charges. See
the transmission time of a packet. The transmission [21];
time between two nodes is simply the packet size 2) Link and MAC Layer Metrics:
in bits / the channel capacity. This metric can also • MAC delay - the time taken to transmit a packet
be expressed as delay variance [17]; between two nodes in a contention-based MAC,
• Maximum tolerable packet loss ratio (PLR) (%) including the total time deferred and the time to
- the acceptable percentage of total packets sent, acknowledge the data [22]. This provides a good
which are not received by the transport or higher indication of the amount of traffic at the relevant
layer agent at the packet’s final destination node nodes;
[18]; • Link reliability or frame delivery ratio (%) - the
An application may typically request a particular quality statistically calculated chance of a packet or frame
of service by specifying its requirements in terms of being transmitted over a link and correctly decoded
one or more of the above metrics. For example, it at the receiver. See [23], [24] for examples of
may require a guaranteed throughput of 500kbps and routing protocols employing this metric for path
a maximum packet delay of 50ms. In most cases, the selection;
QoS protocol should only admit this data session into • Link stability (s) - the predicted lifetime of a link
the network if it can provide the requested service. The [21];
mechanism by which this decision is made is termed ses- • Node relative mobility/stability - can be measured
sion admission control (SAC) or just admission control. as the ratio of the number of neighbours that change
over a fixed period to the number that remain
the same [25]. For example, if all of the node’s
B. Node states and metrics employed for route selection neighbours are the same over a fixed period, that
This section lists many of the metrics commonly node is completely stable in that period, relative to
employed by routing protocols for path evaluation and its neighbours. We list this as a link layer metric,
selection in order to improve all-round QoS or to meet since neighbour discovery is usually performed at
the specific requirements of application data sessions. that layer;
Many of these metrics, especially those measured at 3) Physical Layer Metrics:
lower layers, are not directly interesting to the appli- • Signal-to-interference ratio (SIR) - although a phys-
cation layer, hence their listing in this section. However, ical layer metric, the received SIR at a destination
they all, at least indirectly, affect the QoS experienced node can be used as a routing metric that shows link
by a data session. quality, via cross-layer communication. Example of
1) Network Layer Metrics: use: [26];
• Bit error rate (BER) - related closely to SIR, this
Achievable throughput or residual capacity (bps) -
value determines the level of error correction and/or
•
The achievable data throughput of a path or node.
The achievable throughput or residual capacity is number of retransmissions required over a “link”
often termed “available bandwidth” in the literature; and has a major impact on the link’s reliability
we prefer to reserve the use of the word “band- metric and on energy consumption. From another
width” for quantifying the size of frequency bands perspective, the BER is a consequence of the SIR
in Hz. For an example of QoS routing using this between two nodes. For an example of use, see [27];
• Node residual battery charge or cost [20]. Examples
metric/constraint, see [14];
• End-to-end delay (s) - the measured end-to-end of use: [28], [23];
delay on a path [15]; QoS metrics such as the above can be classified as either
• Node buffer space - the number of packets in a additive, concave or multiplicative metrics, based on
node’s transmission buffer plays a major part in their mathematical properties [6]. Additive metrics are
Xn
determining the amount of delay a packet traveling defined as Li (m) over path P of length n, where
through that node will suffer (e.g. see [19]); i=1
5
Li (m) is the value of the metric m over link Li and ure [20], or the time until a specified proportion
Li ∈ P . The value of a concave metric Cm is defined of nodes fail. This measure indicates a protocol’s
as the minimum value of that metric over a path i.e. energy-efficiency and load balancing ability;
Cm = min(Li (m)). Finally, a multiplicative metric Mm • Average node lifetime (s) [20];
is calculated by taking the product of the values along • Routing energy efficiency (%) = E
Edata
∗100, where
Y
n
Edata and Etotal are the energy consumed for the
total
hence the network load. All of these factors affect the medium’s total capacity that is granted for each
performance significantly [29]; node’s use. The way to express this depends on
• Node transmission power - some nodes may have the MAC layer technique employed. In a purely
the ability to vary their transmission power. This is contention-based MAC, “transmission opportuni-
important, since at a higher power, nodes have more ties” may be envisioned, although no node can be
direct neighbours and hence connectivity increases, guaranteed channel access, merely granted it with
but the interference between nodes does as well. a certain probability. In a Time Division Multiple
Transmission power control can also result in uni- Access (TDMA)-based solution, channel capacity
directional “links” between nodes, which can affect is expressed in time slots. Similarly, in FDMA, it
the performance of routing protocols. This factor is frequency bands, and in spread spectrum tech-
has also been studied extensively, e.g. [31], [32], niques, spreading codes. Since, in MANETs, nodes
[33]; must communicate on the same channel to discover
• Channel characteristics - as detailed earlier, there network topology, FDMA and spread spectrum
are many reasons for the wireless channel being techniques are only employed if there is a separate
unreliable i.e. many reasons why bits, and hence signaling channel over which to allocate channels to
data packets, may not be delivered correctly. These pairs of communicating nodes. The majority of QoS
all affect the network’s ability to provide QoS. routing solutions in the literature rely on single-
channel MAC protocols and are thus contention- or
E. Network resources required in order to provide QoS TDMA-based, as we show in this work.
zone routing enjoys the benefits of routes being readily been called the “long hops vs. short hops dilemma”.
available. For a detailed discussion of this topic, see [39]. Another
Hybrid route discovery/state discovery schemes are question is whether protocol designers should assume
also feasible. One possibility is where the routes them- the use of transmission power control (TPC) at all.
selves are discovered pro-actively, but the QoS state Assuming TPC constrains the type of devices that can be
is only sought when a QoS-constrained data session employed, since not all nodes may be equipped with ra-
is to be admitted e.g. [15], [35]. Another possibility dios with TPC capability. Furthermore, employing TPC
is a completely hybrid approach where the QoS state can often result in uni-directional links. For example,
discovery follows the proactive/reactive intra-/inter-zone a node X may be able to transmit to a node Y, but Y
nature of route discovery. cannot reply since it is using a lower transmission power,
2) Capacity vs. Delay: It has been shown [36], [37] unless it knows the distance to X and can calculate the
that in MANETs, capacity can be traded off with packet transmission power required to reach it.
delay. If delay constraints are relaxed, then the capacity 6) Global goals vs. individual requirements: From a
of the network can be increased by exploiting multi- network designer’s point of view, the goal is usually
user diversity [36]. More specifically, if delay is not to please as many users as possible, by providing an
constrained, a source can split the packets of a session all-round high QoS. Another goal is to increase the
and send them to many different neighbours. These network lifetime, by spreading the battery usage to avoid
neighbours then forward the packets onto the destination node failures and network partitioning. However, each
when they move into its transmission range. This scheme individual user or data session has its own specific
has been shown to improve throughput, since far fewer requirements, and to satisfy the user, the network must
intermediate nodes are transmitting packets and causing match their requirements.
interference, but incurs the cost of greatly increased In more complicated scenarios, an application may
delay [36]. specify a variety of QoS constraints. For example, it may
Another strategy is to improve delay by increasing specify maximum tolerable values for PLR as well as
redundancy, at the cost of network capacity utilisa- packet delay. In this case, we desire the routing protocol
tion efficiency [37]. If multiple copies of a packet are to find a stable path with a light traffic load. However,
forwarded on multiple paths, it has been shown that from a network lifetime point of view, a path that has the
the destination receives the packet with less delay on least cost (under some residual battery charge-dependent
average. On the other hand, more network capacity is metric), is preferred. Our goal of low delay matches
consumed in sending duplicate packets [37]. Clearly, the aim of load balancing, although the path with the
increased redundancy also reduces the protocol’s energy- least traffic may not be a stable path and it may also
efficiency. have nodes with the least battery charge remaining. In
3) Packet Loss Rate vs. Capacity and Energy- this case, we clearly have a conflict between our various
Efficiency: In a similar way to the trade-off between requirements. A protocol designer must decide how to
delay and capacity, PLR can also be traded off against address this trade-off.
capacity. Increasing the redundancy by sending multiple
copies of packets over different routes, results in a higher V. P ROTOCOL C LASSIFICATION
chance of the destination receiving a copy, but reduces In [5], QoS routing protocols are classified chiefly by
the useful capacity of the network. This technique can their:
be more useful in sensor networks where data is often • treatment of network topology (flat, hierarchical or
broadcast without a reliable handshaking protocol being location-aware),
employed at the MAC layer. Once again, redundancy • and approach to route discovery (proactive, reactive,
also increases the energy expended per packet. hybrid, or predictive).
4) Energy consumption vs. responsiveness and accu-
On the other hand, in [6], they are classified in three
racy of QoS state information: Routing can only be
different ways, based on:
accurate if the frequency of neighbour discovery is high
• the interaction between the route discovery and QoS
enough to reflect frequent topological changes. However,
a high-responsiveness to change comes at an increased provisioning mechanism (coupled or decoupled),
• the interaction with the MAC layer; either indepen-
energy cost [38]. If we consider QoS routing, this trade-
off between accuracy and energy consumption is even dent or dependent,
• and again, on the approach to route discovery.
more acute, since not only the topology view, but the
QoS state information also requires frequent updating, In this paper, we elaborate on the MAC protocol interac-
to enable accurate QoS routing decisions to be made. tion classification, by considering three classes of QoS
5) Transmission power control: long vs. short hops: routing solutions:
Varying the transmission power to adjust the number of 1) those that rely on accurately-quantified resource
hops required to forward a packet to its destination, can (commonly channel capacity) availability and
yield many advantages and drawbacks. This has often resource reservation, and therefore require a
8
TABLE I
Q O S ROUTING PROTOCOL SALIENT FEATURES PART 1/2
MAC protocol
QoS assurances Network/Node Type of QoS
Protocol functionality Other assumptions
provided information utilised guarantees
assumptions
Packet transmission
Bounded delay and
delays; session Real-time
AAQR jitter; assured Soft None
throughput transport protocol
throughput
requirements
802.11 DCF;
CAAODV Assured throughput Channel idle time ratio Soft channel idle time AODV routing
estimation
802.11 DCF;
CACP Assured throughput Channel idle time ratio Soft channel idle time Source-routing
estimation
CDMA over
CBCCR Assured throughput Time slot schedule Pseudo-hard TDMA; resource DSDV routing
reservation
CDMA over
CCBR Assured throughput Time slot schedule Pseudo-hard TDMA; resource DSDV routing
reservation
Link residual
CEDAR Assured throughput Link residual capacity Soft capacity
estimation
Statistical
Assured throughput, MAC delay; channel
estimation of the
CLMCQR bounded delay and idle time ratio; link Soft
utilised
packet dropping rate reliability
information
Reduced delay jitter;
DSARP Buffer fullness Soft None
bounded delay
No
Relative location
guarantees,
Improved link and Node relative positions awareness; relative
EBR per packet None
path longevity and velocities speed awareness;
QoS im-
source-routing
provement
Node traversal delay;
Bounded delay and
GAMAN packet transmission Soft None
packet dropping rate
success ratio
VI. P ROTOCOLS RELYING ON CONTENTION - FREE channel capacity at each forwarding node. Finally, this
MAC information can be used to perform session admission
control, by only admitting data sessions for which a path
A. QoS Routing in a CDMA over TDMA network with adequate throughput capability has been found.
The problem that first concerned QoS routing protocol An early channel-capacity estimation scheme for mo-
designers was that of discovering paths that satisfy a bile wireless networks (so-called at the time), was pre-
session’s throughput requirement. This was due to the sented in [40]. The authors proposed that a clustering
fact that assured throughput seemed to be the lowest scheme is used to group nodes and that each cluster
common denominator among multimedia data sessions’ employs a different spreading code under a CDMA
requirements. Since throughput depends largely on a scheme. Within clusters, the channel was time-slotted
node gaining sufficient transmission opportunities at the to deterministically allocate channel access opportuni-
MAC layer, the first part of the solution is to define ties for each node. This allows channel capacity to be
measures of transmission opportunities i.e. the channel measured in terms of time slots. Furthermore, time slots
capacity available to a node. Following this, a mecha- may be reserved as a way of promising channel capacity
nism is required for estimating the achievable throughput to individual data sessions.
on a path, utilising the knowledge of the available The achievable throughput on a link (link capacity)
10
TABLE II
Q O S ROUTING PROTOCOL SALIENT FEATURES PART 2/2
MAC protocol
QoS assurances Network/Node Type of QoS
Protocol functionality Other assumptions
provided information utilised guarantees
assumptions
No
Reduced delay & guarantees,
Node relative stability;
HARP congestion; improved per packet None
buffer fullness
link longevity QoS im-
provement
Node interference
Channel usage
IAR Assured throughput pattern; sessions’ Soft
estimation
channel usage
Bounded path failure Node mobility model;
LSBR Soft None AODV routing
probability link lifetimes
Improved route No
lifetime; reduced Node residual battery guarantees,
MRPC energy consumption; charge; link packet per packet None
reduced packet dropping ratio QoS im-
dropping rate provement
Hard - as
long as all
Assured throughput or Node location
Node states; node movement Contention-free
any metric that can be awareness; known
NSR position; propagation and MAC; resource
calculated from node radio propagation
map propagation reservation
and link states model
predictions
are correct
Resource Proactive state
ODCR Bounded delay End-to-end path delay Soft
reservation dissemination
Idle time
UWB physical
Assured throughput; estimation; PLR
Channel idle time layer providing
QGUM bounded PLR; Soft measurement;
ratio; per-node PLR position
bounded delay multi-rate
information
transmission
Per-link PLR, packet
Improved throughput Packet sent Basic OLSR
QOLSR service time, idle time Soft
and delay notification functionality
between transmissions
Time slot schedule;
Assured throughput; TDMA; resource Transmission
SIRCCR transmission power; Pseudo-hard
bounded BER reservation power control
path loss
Available channel
Assured throughput or
TBR capacity; delay Soft Soft reservations DSDV routing
bounded delay
estimates
is then determined by the set of common free slots complete problems [40]. In the proposed scheme, this
between a transmitter-receiver pair. Note that a general difficulty is alleviated by the use of clustering; gateway
assumption in MANET design is that a node cannot nodes between clusters utilise a different spreading code
transmit and receive at the same time, since these actions for each cluster and thus avoid the chance of having
utilise the same frequency band. Therefore, separate time common free slots with upstream and downstream neigh-
slots must be employed for these operations. Figure 3 bours. Furthermore, the slot scheduling within a cluster
illustrates an example, which is explained later in this is solved by the cluster head, avoiding the need for a
section. distributed solution. The achievable throughput on a path
With this constraint, the calculation of available chan- is then determined by the minimum of the link capacities
nel capacity and the scheduling of free slots between on the path.
transmitter-receiver pairs on a route are known to be NP- This achievable throughput information is used to
11
Battery
QOLSR Charge node we show the time slots that were free prior to a data
session being admitted. In this case, the same six slots
MAC Delay
were free at each node. At a first trivial glance it appears
CLMCQR
SIR
MRPC that the path capacity is six slots. However, if node A
transmits to B in slots 1 and 2, as shown with the dark
SIRCCR
Link
PLR
IAR
shading, node B must use those two slots for receiving
CAAODV
(shaded light gray) and thus cannot use those for trans-
Delay Jitter/ CACP
Variance mitting. Say then that B forwards the received traffic to
CBCCR
GAMAN
QGUM
C in slots 3 and 4. Node C must also not transmit in
Throughput AAQR
NSR
CCBR slots 1 and 2 for fear of interfering with B’s reception
ODCR Delay TBR
CEDAR from A at those times. Therefore, C may only transmit
TBR
in slots 5 and 6. This example illustrates that nodes must
Link EBR
Stability LSBR have some common free slots to communicate, but if all
DSARP
Buffer nodes have the same set of free slots, the efficiency of
Fullness
HARP
utilisation is not very high. In Figure 3’s example, the
Node
Stability
effective path capacity usable by a new session is only
two slots, despite six being initially free at each node.
Fig. 2. Classification based on QoS metric(s) considered for route Once the available time slots and path capacity have been
selection. Each protocol is linked to all metrics which it considers determined, reservation signaling takes place to reserve
during route selection the necessary time slots for satisfying the requesting
session’s throughput requirement.
A B C The two described schemes offer a clear-cut definition
of path capacity in terms of time slots and allow a routing
protocol to provide throughput guarantees to application
data sessions by reserving these slots. However, this
comes at the cost of many assumptions. First of all,
assuming a CDMA network assumes that each group
of nodes is assigned a different spreading code. These
must either be statically assigned at network start-up,
or dynamically assigned. The former mechanism does
Fig. 3. Time slot scheduling example. Dark shading indicates a slot not deal with nodes/clusters leaving/joining the network,
is used for transmitting, and light shading for receiving. which is one of the most basic characteristics of ad hoc
networks. The latter scheme assumes that there is some
entity for assigning spreading codes, which is against
augment the classical DSDV routing protocol [45] to the ad hoc design principle of not relying on centralised
perform QoS routing. Time slots are reserved at nodes by control. Either way, the papers [40], [14] do not discuss
the first arriving data packet and reservations are released how code allocation would be achieved.
when no data packets are received for a certain number A second assumption is that of time-slotting. For each
of frames. frame to begin at the same time at each node, the network
The ideas in [40] were taken further by Lin and Liu must be globally synchronised. Synchronisation signal-
in [14], wherein they devised a detailed algorithm for ing incurs extra overhead, and as stated in previous work
calculating a path’s residual traffic capacity, seemingly [6], [9], in the face of mobility this becomes practically
filling in the gaps in detail left by [40]. Similar to the unfeasible. Furthermore, time slot assignments must be
aforementioned work, they propose using a CDMA over continually updated as nodes move, and sessions are
TDMA network. The channel is time-slotted accordingly, admitted or completed.
but several communicating pairs can share a time slot by Since these designs were published, new TDMA-
employing different spreading codes. A path’s capacity is based MAC protocol designs have come to fruition,
expressed in terms of free time slots. Route discovery is such as the IEEE 802.15.3 standard [46]. However, this
based again on DSDV [45]. Routing updates are used to protocol is designed for use in wireless personal area
refresh the “free slot” information in routing tables. The networks where every node is in range of a controller
proposed algorithm first calculates the best combination which provides the time-slot schedule. Thus, it is not
of free slots on the path for maximum throughput and suitable for wider-area MANETs. The story is the same
then attempts to reserve them for a particular data with related protocols such as 802.15.4.
session. The conclusion is that there is currently no ideal
In brief, the algorithm deals with nodes in groups of feasible solution for implementing TDMA in a multi-
three. Consider the example in Figure 3, where nodes A, hop MANET environment. We detail other protocols that
B and C are intermediate nodes on a path. Below each rely on such a network in order to highlight their other
12
(1)
for a certain period of time, hence the terms “soft”
(3)
reservation/state.
(1) (2) Speaking in its favour, this protocol can handle ses-
sions with either a delay or throughput constraint. When
Source such a constrained path is required, flooding is avoided
(1)
via the ticket mechanism, while at the same time en-
Dest.
suring that more paths are searched when requirements
Fig. 4. A simple network topology showing a possible ticket-based are stringent, increasing the chance of finding a suit-
routing operating scenario. The source issues a probe with three tickets, able route. Imprecise state information is also tolerated.
which then splits as shown. The number of tickets assigned to a path
is denoted by the number in brackets. Although the QoS states are not
However, the method has several drawbacks. Firstly, the
shown, the protocol operates by assigning more tickets to those paths protocol used to maintain routing tables for guiding the
which have a higher likelihood of satisfying the QoS constraints (delay search probes is proactive, requiring periodic updates,
or throughput).
thus incurring a large overhead and not scaling well with
network size. Secondly, the article [15] mentions that a
TDMA/CDMA MAC is assumed to take care of channel
properties which are useful from a design point of view. capacity reservation, which has the drawbacks discussed
in the previous section.
B. Ticket-based multi-path routing C. On-Demand SIR and Bandwidth-Guaranteed Routing
Chen and Nahrstedt proposed a QoS routing protocol With Transmit Power Assignment
aimed at reducing the QoS route discovery overhead A much more recent proposal for a TDMA-based QoS
while providing throughput and delay guarantees, in routing protocol is presented in [26]. Again, channel
[15]. The main novelty of their approach was in the capacity is expressed in terms of time slots. However,
method of searching for QoS paths. First of all, a an interesting characteristic of this protocol is that it
proactive protocol, such as DSDV [45] is assumed to aims to concurrently satisfy not only an application’s
keep routing tables up-to-date, with minimum delay, throughput requirement, but also its bit error rate (BER)
bottleneck throughput and minimum hop to each des- constraint. The latter, it aims to achieve by assigning
tination. When a QoS-constrained path is required for adequate transmit power to produce the necessary signal
a data session, probes are issued by the source node, to interference ratio (SIR) between a transmitter and
which are used to discover and reserve resources on a receiver pair, thereby providing a sufficiently low BER.
path. This is in contrast to the general trend in previous
Each probe is assigned a number of tickets and each candidate solutions, which aimed merely to satisfy a
ticket represents the permission to search one path. The single QoS constraint at any one time.
more stringent the delay or throughput requirements of The protocol is on-demand and in essence, follows a
the session, the greater the number of tickets issued. similar reactive route discovery strategy to classic reac-
Each intermediate node uses its routing table to decide tive routing protocols, such as DSR [47]. An advantage
which neighbours to forward the probe to and with of this protocol is that it gathers multiple routes between
how many of the remaining tickets. Neighbours through a source and destination and allows them to cooper-
which a lower delay or higher achievable throughput atively satisfy a data stream’s throughput requirement.
(depending on type of search being performed) to the However, only paths that fulfill the SIR requirement
destination is estimated, are assigned more tickets. So, on every link qualify as valid routes; the maximum
for example, in Figure 4 the source sends a probe with achievable SIR is limited by the maximum transmit
three tickets, which splits at the second node. Two tickets power.
are issued to the bottom path since it is deemed to have Time is split into frames with a control and data phase,
a higher chance of satisfying the delay requirement. Due each containing several time slots. In the control phase,
to the nature of MANETs, the state information is not each node has a specified slot and uses this to broadcast
assumed to be precise and therefore, each delay and data phase slot synchronisation, slot assignment and
bottleneck channel capacity estimate is assumed to be power management information. This broadcast is made
within a range of the estimate, rather than considering at a predefined power level, e.g. full power. The received
the value accurate. power can be measured and knowing the transmit power,
Eventually all probes reach the destination allowing the path loss can be calculated. From this, it is possible
it to select the most suitable path. It then makes soft to calculate the received SIR. This in turn leads to
reservations by sending a probe back to the source. This an estimation for the required link gain and thus the
probe also sets the incoming and outgoing links for the required power at the transmitter, pj−1 , where j is the
(i)est
connection in each node’s connections table, setting up a current node in the path and i is the time slot index.
soft connection state. The reservations and states expire When a route is required, a RReq is broadcast by the
when data is not forwarded via that virtual connection source and is received by direct neighbours. The RReq
13
2R
A G
R
B C
A D
E
F
Fig. 7. Illustration of node A’s transmission range (circle radius R)
and its carrier-sense range (circle radius 2R)
session would take. Each node receiving the admission C. Cross-Layer Multi-Constraint QoS Routing
request calculates the local capacity required by the
An approach proposed in [22] is the focus of this
session on the route. An “admission request denied”
section. First of all, Fan proposes the MAC delay metric,
message is returned to the requesting node if the local
which he defines as the time between a packet being
capacity is not sufficient.
received by the MAC protocol from the higher layers,
Another similar, yet also important approach is pro- and an ACK being received for it, after it is transmitted.
posed in [13]. In this article, the authors consider con- This includes the time deferred when awaiting channel
tention among cs-neighbours (nodes in each other’s cs- access and is thus a useful metric for avoiding busy
ranges) in a similar way to [9]. The “cs-range = 2 links. Link reliability and throughput constraints are also
hops” model is adopted here also. However, instead of considered in [22], but they use pre-existing definitions
source routing, the contention-aware session admission and methods of calculation.
mechanism is applied to AODV. The focus of the paper is on performing multi-
constraint QoS routing with the aforementioned three
The algorithm for the residual channel capacity esti- metrics. Fan reiterates the fact that the multi-constraint
mation relies on AODV’s HELLO message mechanism. QoS routing problem is NP-complete [2] when a com-
Each node records how many bits it inputs into the bination of additive and multiplicative metrics is con-
channel every second and it piggybacks this information sidered. Among the above metrics, delay is additive,
on its periodic HELLO messages. Thus a node, say link reliability is multiplicative and achievable through-
X, informs all of its neighbours of its channel usage. put is concave. However, methods have been proposed
These neighbours propagate this information onto their (see [22] and references therein) for reducing this NP-
neighbours (but only one hop) and thereby every node in complete problem to one that can be solved in poly-
X’s cs-range learns its channel usage. Conversely, since nomial time. In one such method, all QoS metrics,
all nodes implement this algorithm, X will know the except one, take bounded integer values. Then, the
channel usage of all of its cs-neighbours. All that remains task of finding a path to satisfy all constraints can be
to be done by X is to subtract the total channel usage of performed by a modified Dijkstra’s algorithm. In [22],
all these nodes from the raw channel capacity to obtain the multiplicative metric is reduced to an additive one
an estimate of the amount of free channel capacity that by taking the logarithm of the reliability percentage of
is available to it at that instant. a link. Also, the delay metric is reduced such that each
link is represented by the percentage of the allowable
The major advantage of this protocol compared to total delay it introduces. The resulting problem in the
the work in [9] is that no extra control packets are new metric space can be solved in polynomial time.
introduced, since bandwidth information is piggybacked Then, a modified Bellman-Ford or Dijkstra’s algo-
on AODV’s existing HELLO packets. However, one rithm with the new reliability metric for link weights
failing of this technique surfaces as illustrated in Figure can be used to find an approximation to the optimal path.
7: consider node B which is inside the cs-range of node In each iteration, the total MAC delay along a path is
A, but not inside the transmission radius of any of A’s checked and also paths which do not satisfy the channel
neighbours. Therefore, B cannot inform A of its channel capacity constraint are eliminated. See [22], for the exact
usage, which therefore cannot be subtracted from A’s algorithm used.
available channel capacity.
An obvious advantage of this approach is the concur-
While the approaches discussed in this section rep- rent consideration of several important QoS metrics in
resent significant progress in achievable throughput es- path selection. However, the QoS state for all paths must
timation and admission control, and hence throughput- be discovered and kept fresh. This incurs extra overhead
constrained QoS routing, there are still shortcomings. and the details of this mechanism are not discussed in
It is well-known that as a network nears saturation, [22]. Furthermore, as we have seen, such a protocol
ready-to-send and data packet collisions (in a multi- requires the presence of other mechanisms to actually
hop network) become more frequent, wasting capacity. measure the link reliability, MAC delay and available
Additional capacity is wasted due to the 802.11 backoff channel capacity values at each node.
algorithm, as the level of contention for the channel
increases. The protocols discussed in this section do not
D. On-Demand Delay-Constrained Unicast Routing
consider these sources of wastage when calculating the
Protocol
residual capacity at each node. The need to include these
factors has been recognised [51], [52]. In [52], we took A proposal in [35] focuses on providing delay-
a first step towards incorporating the effects of these constrained routes for data sessions. The key features of
factors in session admission control, employing approx- this protocol are as follows. Firstly, a proactive distance-
imate estimations of collision and backoff wastage in our vector algorithm is employed to establish and maintain
QoS routing protocol. routing tables containing the distance and next hop along
17
the shortest path to each destination node. When a delay- If the PLR bound is not exceeded, the intermediate
constrained path is required, this information is used to node appends its ID to the RReq, in a manner akin to
send a probe to the destination along the shortest path other source-routing protocols. It also adds its location
to test its suitability. If this path satisfies the maximum before performing the same procedure as the source
delay constraint, the destination returns an ACK packet to find the next node to forward the RReq to. Each
to the source, which reserves resources. For this purpose intermediate node performs the PLR checks and passes
a resource reserving MAC protocol is assumed. the RReq to the neighbour closest to the destination, until
If the minimum hop path does not satisfy the delay the destination receives the RReq.
constraint, the destination initiates a directed and limited The above procedure describes route discovery. We
flood search by broadcasting a RReq packet. Intermedi- now summarise the method for ensuring QoS on routes.
ate nodes forward the RReq if the total of their respective First of all, [18] suggests that QGUM can operate with
distances from the destination and source is below a either a contended MAC protocol, similar to the 802.11
set threshold and if the path delay is below the delay DCF, or with a TDMA-based protocol such as 802.15.3
constraint value. When a copy of the RReq reaches the [46]. In the former case, available channel capacity is
source with a path that meets the delay constraint, the determined in the same way as in [9], described in
route discovery process is complete. Section VII-B, using channel idleness ratio estimation. In
While this protocol aims to minimise the hop-distance the latter, time slots quantify channel capacity. However,
between source and destination and discovers paths that as detailed at the end of Section VI-A, we do not
satisfy a session’s delay constraint, it has some major believe 802.15.3 is the ideal solution for multi-hop
drawbacks. Firstly, while the aim of the directed flooding MANETs. Therefore we focus on the contended MAC-
is to avoid global flooding, thereby reducing overhead based algorithm.
compared to protocols that are based on that, extra After a route to the destination is discovered as
overhead is incurred by the proactive distance-vector detailed above, the session admission control procedure
protocol which maintains the routing tables. Secondly, begins. Owing to the available position information, the
the article [35] simply assumes the existence of a re- destination can calculate which nodes on the route are
source reserving MAC. However, the authors do not inside each other’s cs-ranges and thus which can transmit
discuss what kind of resources they wish to reserve and simultaneously. The destination then calculates the chan-
how this is to be achieved. Reserving channel capacity nel capacity required at each node for the data session to
for example, is problematic, as previously discussed. be admitted. It then sends an admission request (AdReq)
back along the route. Each intermediate node checks
E. QoS Greedy Perimeter Stateless Routing for Ultra- its locally available capacity and the capacity of its cs-
Wideband MANETs neighbours by flooding an AdReq, similar to the protocol
in [9], described in Section VII-B. If the intermediate
A recent proposal [18] at the time of writing highlights node and all its cs-neighbours have sufficient capacity,
a relatively new direction for MANETs: that of employ- they temporarily reserve the necessary capacity for the
ing an ultra-wideband (UWB) physical layer. One of the session and the AdReq is forwarded to the next hop in
advantages of UWB is that it allows a node’s position to the route back towards the source node.
be estimated via triangulation techniques. This provides
If any nodes or their cs-neighbours on the route have
location information, without having to rely on GPS, for
insufficient capacity, they generate an admission refused
enabling a position-based routing protocol. The proposal
message. In essence this is passed to the next hop on the
in [18] extends an older protocol, Greedy Perimeter
route towards the source, which invokes a path repair
Stateless Routing (GPSR) for QoS routing. We refer to
mechanism. This operates very similarly to the route
this proposal as QGUM, meaning “QoS GPSR for UWB
discovery procedure, except only a partial new path must
MANETs”.
be discovered starting from the node before the one
In brief, each node broadcasts beacons containing
which had insufficient capacity.
its ID and position to all of its neighbour nodes. The
destination’s position is learnt at the same time as its The main advantages of QGUM compared to earlier
ID. When a route is required, the source node sends a similar approaches described in Section VII-B are as
RReq to the neighbour node which is closest to the des- follows:
tination. The RReq specifies, among other information, • exploitation of the multi-rate capability of the UWB
the requesting data session’s total delay bound, its PLR physical layer;
constraint and the accumulated PLR so far. • exploitation of the location information provided
A node receiving the RReq factors in its own PLR by the UWB physical layer, enabling directed route
and compares the result with the PLR bound. If it is discovery;
unacceptable, a “Route Failure” is sent back to the source • simultaneous satisfaction of an application’s PLR
node. In this case, the source node begins route discovery and throughput requirements (delay can be consid-
again, starting with a different node in its neighbour list. ered instead of throughput).
18
However, these advantages must be balanced against The transmission delay of a packet depends on the
the typically shorter range offered by UWB radios. For amount of time a node spends backing off and resolving
example, while UWB provides higher data rates than collisions. A detailed analysis in [44] shows that this
existing variants of 802.11x, the approximate range for is a function of the average backoff window size and
the proposed UWB 802.15.3a specification is only 10m the FER. Using these, the derived formulae yield an
at 110Mbps [53]. Indeed, current standardisation efforts estimation for the EST of each packet and therefore
involving UWB radio technologies for wireless networks the total MAC delay of a link between a node and its
are targeted at personal area networks [54] and not neighbour.
larger-scale ad hoc WLANs as 802.11x is. This limits The achievable throughput of a link is also calculated
the applicability of protocols based on a UWB physical statistically. The MAC delay or EST of a packet is
layer. estimated as described above. Using this, and knowledge
of the overhead posed by packet headers and MAC
VIII. P ROTOCOLS INDEPENDENT OF THE TYPE OF control frames, the throughput experienced by packets
MAC can be estimated.
To calculate the residual channel capacity on a link,
A. QoS Optimized Link State Routing
the MAC protocol is required to notify the routing
A QoS routing protocol based on Optimized Link protocol when it transmits a packet. Queuing delay is
State Routing (OLSR) [55] is presented in [44]. OLSR estimated from the delay between passing a packet to the
is a pro-active protocol in which information about MAC protocol and receiving a “sent” notification, after
1-hop and 2-hop neighbours is maintained in each subtracting the estimated time consumed by contention
node’s routing table. This information is disseminated resolution and retransmissions. If there is no queuing
via periodically broadcast HELLO messages. OLSR delay, the queue is deemed empty. In this case, the
minimises the control overhead involved in flooding elapsed time since the last notification was received, is
routing information by employing only a subset of nodes, considered the link’s idle time. The total of this idle time
termed multi-point relays (MPRs), to rebroadcast it. As as a fraction of the monitoring period is multiplied by the
a consequence, only MPRs are discovered during route average throughput of a packet, to provide the estimate
discovery and thus only they are used as intermediate for residual channel capacity.
nodes on routes. Also, calculating the optimal MPR set Finally, [44] details how nodes’ MPR sets are con-
to reach all 2-hop neighbours is an NP-complete problem structed using the link capacity and delay information.
and therefore heuristics are applied. It is claimed that the proposed heuristic selects the
Since only a subset of nodes are MPRs, the best links appropriate MPRs at each node in order to ensure that
(as defined by some QoS metrics) may not be utilised for nodes are connected via the highest residual capacity and
routing. In QoS-OLSR (QOLSR) [44], this problem is lowest delay paths.
solved by proposing new heuristics for building nodes’ In summary, QOLSR appears to be a promising proac-
MPR sets in order to enable QoS routing to take place. tive QoS routing protocol for finding and maintaining the
QOLSR employs both a variation on the MAC delay shortest-widest paths in terms of delay and throughput.
metric and the achievable throughput metric for QoS It also benefits from the characteristic lower overhead
routing. (compared to earlier proactive protocols) of OLSR, due
In contrast to many of the protocols discussed so far, to the use of MPRs. While QOLSR does not rely on the
although the analysis in [44] is based on the 802.11 use of lower layer information directly, it does require
MAC, QOLSR does not rely on the MAC protocol notifications to be sent by the MAC protocol in order
to provide residual channel capacity or delay infor- to calculate QoS metrics. Avoiding complicated MAC-
mation. These values are estimated statistically, using routing interactions is a bonus, but the achievable QoS
the periodic HELLO messages, as follows. The total estimations are inherently not as accurate as with MAC
expected MAC delay of a packet is a product of the layer idle-time estimation.
average estimated delay or expected service time (EST)
of one packet and the total number of packets awaiting
transmission. The value of EST in turn depends on B. Link Stability-Based Routing
packets’ transmission times and the expected number In [21], link stability is considered as an impor-
of retransmissions the MAC layer will have to perform tant QoS metric. Stability is defined as the expected
(i.e. frame error ratio or FER). The FER is approxi- lifetime of a link, which is largely dependent on the
mated by taking the ratio of the number of HELLO node movement pattern [21]. The article presents the
messages received during a monitoring window to the probability distribution functions (PDF) of link lifetimes
number expected, which is calculated from the known under various node movement models. The remaining
HELLO sending rate. The FER provides an estimate of link lifetime is estimated as the area under the PDF
the number of retransmissions required for successful for a given mobility model, taken between the link’s
delivery of a data packet. measured lifetime so far, and infinity. For example, in
19
the random destination mobility model, nodes do not assuming that each node is capable of determining its
change direction after selecting a destination, until they position via GPS or some similar system [42].
reach it. This mobility model was found to produce a
link lifetime PDF similar to a Rayleigh distribution [21]. C. Hybrid Ad Hoc Routing Protocol
To find the probability that a link’s remaining lifetime
is greater than a time t, the PDF of the link lifetime is The Hybrid Ad hoc Routing Protocol (HARP) is
integrated between t + Lp and infinity, where Lp is the introduced in [25]. It uses the notion of quality of
link’s past lifetime. connectivity (QoC) as its routing metric. This is defined
A link lifetime model such as the one above is as a function of two nodes states: residual buffer space
proposed for each of a selection of mobility models. An and relative stability. The latter is defined for node x
application may specify a lower limit for acceptable path over a chosen period of time, t1 − t0 as:
failure probability, Pf ail . This value can be calculated |Nt0 ∩ Nt1 |
based on a data session’s delay, delay jitter and packet stab(x) = (1)
|Nt0 ∪ Nt1 |
loss rate requirements.
It is proposed [21] that this mechanism is combined where Nt0 and Nt1 are the set of neighbours of x at
with AODV for QoS routing. The value Pf ail is inserted times t0 and t1 respectively. Thus, stability is greater,
into RReq packets. Intermediate nodes test that the the fewer the number of neighbour nodes that change
cumulative failure probability of links up to that point between t0 and t1 . The higher a node’s residual buffer
(also stored in the RReq and updated by each node), is space and relative stability, the better the QoC to it is.
not greater than Pf ail . Therefore, using an appropriate The QoC of each node is used in a logical topology
model such as the above and given the data session’s construction algorithm. Each node periodically broad-
duration, it is possible to calculate the probability of a casts a beacon to all of its neighbours, which contains
path remaining intact for the duration of the data session, its address and QoC. Then, each node selects as its
Psurvive . If this is unacceptable i.e. Psurvive < Pf ail , preferred neighbour (PN) the neighbour node with the
the session is not admitted. highest QoC. A link between a node and its PN is
This simple mechanism could be useful for statis- called a preferred link. A logical tree is constructed by
tically predicting link lifetimes and therefore avoiding connecting nodes together using only preferred links. A
links and paths that have a high probability of failure tree’s growth terminates where a node’s preferred link is
while a session is active. An obvious difficulty with with a node that is already part of the tree. This heuristic
this approach is that the node mobility pattern must be has been proven to yield a forest of trees [25]. In brief,
known and must be modeled accurately for the lifetime each tree is then considered a routing zone, within which
estimation to be useful. However, combined with other proactive routing occurs. Inter-zone routing is performed
stability metrics, as shall be discussed later, this could on-demand, and hence the hybrid route discovery of this
be a useful component of a more sophisticated QoS protocol.
provisioning mechanism. In inter-zone routing, other zones may be abstracted as
Another approach that considers link and path stability nodes, thus a packet can be routed to another zone, and
as an important QoS metric, is presented in [42]. A on arrival, the intra-zone routing mechanism can direct
new variation on the stability metric is introduced in the packet to its final destination.
the form of the entropy metric. This is defined for a HARP also includes route discovery optimisations
link as a function of the relative positions and velocities, which reduce overhead. Firstly, the forest structure can
and the transmission ranges of the link’s two end nodes. be used to avoid having to flood route request (RReq)
A path’s entropy is defined as the product of the link packets used in inter-zone routing. This is done by
entropies along it. The lower the entropy, the higher the forwarding RReqs only via gateway nodes; a node is
path stability. considered to be a gateway, if it is the neighbour of a
This scheme is incorporated into a source-routed leaf node, but it is in another zone.
scheme somewhat akin to DSR, and during route discov- Secondly, features of the relative distance micro-
ery, the path entropy (among other metrics) is calculated. discovery routing protocol (RDMAR) [56] are incorpo-
A destination receives RReqs over multiple paths and rated into HARP. RDMAR does not limit the number
waits a specified interval after receiving the first one, of neighbours propagating a flooded packet, but limits
before selecting the path with the lowest entropy i.e. the scope of the flooding instead. Thus, RReqs do not
highest stability. This route is returned to the source in propagate to areas of the network where they will be
the RRep, thereby completing the route discovery. useless, thereby wasting resources.
This approach has the potential to be more accurate The time-to-live (TTL) field in a RReq is set based on
than that in [21], since it considers nodes’ relative an estimation of the relative distance of the destination in
positions and velocities for calculating the probability of terms of hops. However, the estimation can only be made
link failure, rather than just a general PDF for a given if there is some previous knowledge of the destination,
mobility model. However, this comes at the price of and a replacement path to it is sought i.e. this is not the
20
first search. In this case, the relative stabilities of each paths is greater. This algorithm pushes the network
node on the path, combined with the time elapsed since towards a state where each path has an equal flow of
the stabilities were recorded, yields an estimation for the traffic on it and thus is likely to produce the same
total maximum change in the positions of the nodes on packet delay. Essentially, this implements a form of load-
the path. This is added to the previous known distance balancing, ensuring that the energy usage of nodes is
in metres (hops * radio range) of the destination. The also distributed evenly. After adjusting the traffic on each
sum is divided by the radio range to obtain an estimated path, a statistical guarantee can be made about the delay
upper bound on the distance of the destination in number on that path.
of hops. This value is used for the TTL. DSARP is simple to implement and provides delay
A further enhancement to RDMAR in HARP, is that guarantees without relying on the MAC protocol, but
intermediate nodes may make their own estimation for has the following disadvantages. The number of buffered
the distance to the destination. If this is higher than the packets on each path must be rediscovered each time a
original estimation, it implies that the destination does new session begins, regardless of whether the route has
not lie in this direction from the source. In this case, failed or not. This incurs extra overhead. Also, the delay
the RReq is not propagated further, meaning that it does guarantees may fail in the face of mobility, if other nodes
not travel to areas of the network where the destination move into contention range and cause greater channel
surely does not lie. access delays for nodes on a session’s path.
HARP’s use of the QoC metric allows it to discover
routes that have fewer buffered packets and which are
E. Application-Aware QoS Routing
relatively stable. This results in lower average delay and
fewer mid-session route failures, potentially yielding a A rather unique approach to QoS routing is presented
lower session dropping rate. Additionally, QoC-based in [17]. It is unique because instead of using lower layer
routing produces a load-balancing effect, which avoids (MAC) information, it is based on the aid of the transport
congestion and early battery drainage of any single node, layer. The proposal, referred to as Application Aware
thereby delaying network partitioning. QoS Routing (AAQR) in the literature, assumes the use
On the downside, HARP does not consider an appli- of the real-time transport protocol (RTP) [57]. The delay
cation’s particular requirements, it aims only to improve between two nodes is estimated statistically by examin-
average packet delay and network lifetime and to reduce ing the difference between time stamps on transmission
the chance of route failure during a data session. More- and receipt of RTP packets between those two nodes.
over, the beaconing process results in higher routing The delay variance is also calculated. Furthermore, each
overhead compared to purely reactive protocols such as node records the throughput requirement of RTP sessions
DSR. which are flowing through it. Subtracting the total of
these throughput values from the raw channel capacity
gives an estimate for the total remaining capacity at that
D. Delay-Sensitive Adaptive Routing Protocol node.
The Delay-Sensitive Adaptive Routing Protocol When a QoS-route is required, applications may spec-
(DSARP) [19] employs reactive route discovery, is com- ify throughput and delay constraints. In [17] delay is
pletely decoupled from the MAC protocol and provides considered the most important constraint for multimedia
delay guarantees for time-sensitive data sessions. Its ba- applications. Routes are discovered on-demand, although
sic operation is very similar to classical reactive MANET the details of the route-discovery procedure are not
routing protocols such as DSR. However, when a path is discussed. A subset of the discovered routes is selected,
required for delay-sensitive traffic, a different algorithm such that all paths satisfy the delay constraint of the
is employed. application. From this subset a further subset of routes is
The source node sends a route request (RReq), as selected, which also satisfy the application’s throughput
usual. This is allowed to propagate to the destination, constraint. Finally, from this second subset, the route
which sends a route reply (RRep). When forwarding the with the lowest variance in RTP packet transmission
RRep, each intermediate node on the path attaches the delays, is chosen. If there are no routes that meet
number of packets awaiting transmission in its buffer. the throughput requirement, the route with the highest
Multiple RReps may be received by the source node, available channel capacity, which satisfies the delay
which then selects several shortest paths, if there are constraint, is selected.
multiple. Alternatively, the shortest path plus the next A major advantage of AAQR is that no extra overhead
shortest path are selected. Using the information about is incurred for QoS routing, since the existing transport
buffer usage at each node, the source calculates the total layer packets are used for QoS metric estimation. Ad-
number of packets on each selected path. Finally, the ditionally, both delay and throughput constraints may
traffic flow on each path is adjusted such that the new be considered. However, the use of RTP is assumed,
traffic allocated to it is greater if the existing traffic and therefore the range of application scenarios for this
on it is lower and the number of packets on other protocol is obviously limited.
21
F. Genetic Algorithm-Based QoS Routing having topologies where a relatively small number of
nodes can be combined in a relatively large number of
In [24], a Genetic Algorithm-based source-routing
ways to construct valid routes. The GAMAN protocol
protocol for MANETs (GAMAN) is proposed, which
discussed in this section provides an exploratory example
uses end-to-end delay and transmission success rate
of how GAs may possibly be applied in such networks.
for QoS metrics. Genetic Algorithms (GAs) may be
employed for heuristically approximating an optimal
solution to a problem, in this case finding the optimal G. Energy- and Reliability-Aware Routing
route based on the two QoS constraints mentioned. The Maximum Residual Packet Capacity (MRPC)
The first stage of the process involves encoding routes protocol is proposed in [23], which considers battery
so that a GA can be applied; this is termed gene coding. charge as well as link reliability during route selection.
For this purpose, paths are discovered on-demand and Admittedly, MRPC is not intended to be a QoS rout-
then a network topology view is constructed in a logical ing protocol, but we consider it here since it utilises
tree-like structure. Each node stores a tree routed at itself some QoS-related metrics to improve all-round QoS.
with its neighbour nodes as child nodes and in turn their Routing based on residual battery charge is considered
neighbour nodes as their children. Tree reductions are extensively in the literature [33]. However, in our view,
used to avoid duplicate subtrees (see [24]). Each tree protocols that consider only this state are not useful
junction is considered a gene and multiple genes make for QoS routing, since they do not improve the QoS
up a chromosome which represents a path. experienced by individual data sessions or packets. On
The route discovery algorithm is assumed to collect the other hand, MRPC also considers link reliability, as
locally computed metrics such as average delay over a detailed below.
link and the link reliability for the links on each path. In [23] a node-link metric is introduced to capture the
After the gene encoding stage, the fitness, T of each energy-lifetime of a link between nodes i(transmitter)
path, is calculated as follows: and j, which is defined as:
X
n
Ri
Di Li,j = (3)
Ei,j
T = i=1
(2)
Yn
where Ri is the residual battery charge at node i and
Ri
Ei,j is the energy required to transmit a data packet of a
i=1
given size over the link (i, j). A suggested formulation
where Di and Ri are the delay and reliability of link i for Ei,j is as follows:
respectably. The fitness values are used to select paths
for cross-over breeding and mutation operations. The Ei,j =
Ti,j
(4)
fittest path (with the smallest T ) and the offspring from (1 − pi,j )H
the genetic operations are carried forward into the next where Ti,j is the energy required for one transmis-
generation. sion attempt of the aforementioned data packet with a
While this method is a useful heuristic for approximat- fixed transmission power. Also, pi,j is the packet error
ing the optimal value over the delay and link reliability probability of the link (i, j) and H = 1 if hop-by-
metrics at the same time, it requires many paths to hop retransmissions are performed by the link layer.
be searched in order to collect enough “genetic infor- From the above formulae, it is clear that the lifetime
mation” for the GA operations to be meaningful. This of a link is higher when greater battery charge remains
means that the method is not suited to large networks, at the transmitter node, and when the reliability of
as the authors themselves admit [24]. The methods of the link is high, resulting in a low energy cost for
calculating Di and Ri are not detailed, but we assume correctly transmitting a packet. These formulae give an
they can be calculated statistically by the end nodes of estimation for the expected number of data packets that
each link. can be transmitted over a link before the battery of the
Collecting and maintaining sufficient route and QoS transmitter fails [23]. Then, if a route failure is said to
state information to make a GA useful for QoS routing occur when any single link on it fails, the lifetime of
is costly in terms of both overhead and energy consump- path p in number of packets is simply:
tion. However, heuristic methods are often the only feasi-
ble way of solving NP-complete multi-constraint multi- Lif ep = min {Li,j } (5)
hop QoS routing problems. Thus, while their general (i,j)p
applicability to MANETs is limited, GAs may play a MRPC considers the best route to be the one with the
niche role in finding near-optimal routes, while satisfying greatest residual lifetime. The paper [23] suggests that
multiple QoS constraints in certain environments. For the MRPC algorithm may be implemented in AODV [50]
example, MANETs which are less power-constrained for application in MANETs. As routes are discovered,
and experience lower levels of mobility, and/or MANETs the lifetime of the path is accumulated by calculating the
22
lifetime of each link. The next hop to a destination is This is reflected in the literature, since the majority
always selected to be the neighbour which results in the of later solutions (post-2000), are based on contended
greatest possible value for Lif ep . MAC protocols (generally 802.11) or do not rely on any
This protocol results not only in load balancing, in- set channel access mechanism to be in place. In Section
creasing the life of the network and avoiding congestion, VII we discussed several proposals relying on a con-
but also yields closer-to-optimal energy consumption tended MAC protocol, such as 802.11. Many less mature
per packet, as well as lower packet delay and packet solutions in this category did not consider the nature
loss probability, due to the preference for more reliable of contention between neighbouring nodes sufficiently
links. It can also be implemented in an on-demand fully- accurately and thus reliable QoS provisioning did not
distributed routing protocol, such as AODV. However, become a reality for MANETs. It was through key works
link reliabilities must somehow be estimated, which may such as [9], [13], that the nature of contention and its
not be a trivial problem. Furthermore, like HARP, MRPC effect on (primarily throughput-constrained) QoS rout-
does not cater to particular sessions’ requirements, only ing, begun to be well-understood. Other newer proposals
fosters better all-round QoS, and hence may be un- (Sections VII-B and VII-E) take this understanding as a
suitable for many applications. On the other hand, as basis for further QoS routing designs. Proposals such as
mentioned above, MRPC is not primarily intended to be those discussed in Section VII greatly further the field of
a QoS routing protocol, rather an energy-efficient best- QoS session admission control. This was one of the areas
effort protocol. identified as future work in previous surveys discussed
in Section II.
IX. T RENDS AND PROGRESS IN THE FIELD Many solutions continue to be based upon 802.11x
As we discussed in Section VI, many of the earlier and its CSMA/CA-based channel access mechanism.
QoS routing proposals (pre-2000) for MANETs were Even though 802.11 is an aging standard, the CSMA/CA
based on contention-free MAC protocols and relied on mechanism has survived into its most recent versions and
either TDMA or TDMA/CDMA channel access mech- therefore proposals based on the 802.11 MAC protocol
anisms. This was probably due to their well-understood continue to be very relevant. On the other hand, QoS
nature from the field of cellular communications. A routing proposals based on an ultra-wideband physical
TDMA approach offers a straightforward method of layer (e.g. [18]) are emerging. As we discussed in Sec-
quantifying channel capacity and access opportunities, tion VII-E though, UWB radios have a limiting shorter
as well as allowing such opportunities to be determinis- range compared to 802.11x. Accordingly, current UWB
tically reserved for particular application data sessions. standardisation efforts are all aimed at personal area net-
This enables throughput guarantees to be made, provided works, meaning that UWB-based QoS routing proposals
that the network dynamics do not invalidate them. Due have limited applicability to small-scale MANETs only.
to mobility, as well as the unpredictable nature of the Statistical QoS Protocols that make no assumptions
wireless channel, truly hard guarantees can never be about the MAC layer have also received greater attention
made in a MANET. in the last five years (Section VIII). Such protocols
Even though some newer proposals (Sections VI-C allow a simpler modular network stack design, without
and VI-D) continue to assume TDMA, we, and others the complications of cross-layer issues. However, no
[9] believe that non-hierarchical TDMA-based methods guaranteed level of service is provided, as we saw
are practically highly unfeasible in MANETs, since time- in the proposals discussed in Section VIII. Instead,
slotting requires global clock synchronisation, which is such protocols generally improve the all-round average
difficult to achieve in a mobile environment. A further QoS experienced by packets under some metrics, at
drawback of this approach is the high signaling overhead the expense of other performance metrics or increased
incurred by slot scheduling and the potential complexi- complexity or overhead. Such protocols may not be
ties thereof [40]. sufficient for supporting applications with stringent QoS
Newer MAC protocols such as that specified by requirements. By contrast, protocols in this category
802.15.3 [46] offer feasible TDMA solutions for have done much to improve QoS robustness to fail-
MANETs by introducing node hierarchies whereby a ures, which was another area identified as future work
group of nodes in a piconet is synchronised by a cen- in previous surveys. The link and node stability-based
tral controller node. However, this protocol is designed techniques that were summarised in Section VIII can find
only for personal area networks and not for large- longer-lasting routes and thus improve the robustness of
scale multi-hop MANETs. On the other hand, CDMA- QoS solutions against failures caused by mobility.
based methods introduce the problem of code allocation In summary we can say that there is a trend for
in a dynamic mobile environment. In light of these QoS routing solutions to move away from contention-
conclusions, we believe, as previously stated, that QoS free MAC dependence and towards contended-MAC
routing methods that rely on such channel access meth- dependence for throughput-constrained applications. To
ods are not ideal for general, and especially larger-scale cater for many other metrics, such as delay and PLR,
MANETs. numerous statistical protocols which are independent of
23
the MAC layer, have been proposed. QoS is better when some sessions are blocked but none
Another aspect of development considers the met- are dropped mid-session, rather than all sessions being
rics themselves. Again, in the earlier proposals, the admitted, but some failing. Furthermore, fast local QoS
focus was on providing an assured throughput service route-repairing schemes require additional investigation
only, since throughput was deemed the most important to improve QoS session completion rates and protocols’
requirement. Some earlier protocols could serve, for robustness against mobility.
example, either a throughput or a delay requirement, In Section III we reiterated that one of the major
but not both simultaneously. In this context, the trend challenges to the provision of QoS in MANETS is the
we observe has been to move from single-constraint unreliable wireless channel. However, we have found
routing to multi-constraint routing, as demonstrated by that the majority of QoS routing protocol evaluation
the later proposals we have discussed. However, multi- studies assume a perfect physical channel, ignoring the
constraint routing remains an NP-complete problem ([2], effects of shadowing and multi-path fading. Therefore,
[48]) and thus most of the described solutions do not studying the impact of a more realistic physical layer
aim to find optimal routes. Instead, they simply apply model on QoS routing protocol performance is another
multiple metrics to route filtering, removing all that do interesting area of future work.
not satisfy a particular constraint. One exception was As mentioned in the previous section, while simple
described in Section VIII-F, in which a genetic algorithm multi-constraint QoS routing proposals are numerous,
is employed as an heuristic to finding the optimal route there are few that attempt to optimise multi-constraint
based on more than one metric. routing. One example was based on genetic algorithms
[24]. However, such methods have limited applicabil-
X. F UTURE W ORK ity due to the overhead and energy cost of collecting
enough state information. Accurate studies are required
Following on from work summarised in Section to establish, with various networking environments and
VII-B, we believe that there is still some way to go in the topologies, whether or not it is feasible to collect and
area of throughput-constrained routing, before perfect maintain sufficient state information to apply methods
SAC is achieved, even in a low-mobility scenario. Works such as GAs. For the cases where it is, more research
such as [9], [13] consider channel contention, as well as is required on different types of heuristic algorithms
MAC overheads in achievable throughput estimation, but for calculating near-optimal paths with multiple QoS
the time wasted due to deferring transmission, random constraints. Comparative studies on the performance and
back-off and collisions has not been considered. The impact of the heuristics, are additional future work.
wastage due to collisions is especially difficult to calcu- Moreover, there is a distinct lack of protocol frameworks
late in a multi-hop environment. This is important future for incorporating such methods into practically-realisable
work, if accurate residual channel capacity estimation is systems. One promising, but perhaps not yet mature or
to be realised with contented MAC. The understanding feasible approach is that of Node State Routing [34],
of contention among nodes also needs to be transferred which we discussed in Section VI-D. Such a solution
to considerations of other QoS metrics, such as end-to- would provide the mechanism by which to disseminate
end packet delay, which is affected by the queues of the information to enable multi-constraint QoS routing.
all nodes within contention range [34]. Delay jitter and
energy consumption (due to collisions), are also affected.
XI. S UMMARY
Quantifying the impact on these metrics and more, in the
light of contention awareness and collisions, designing In this paper we reviewed the challenges to and basic
routing protocols that incorporate this knowledge and concepts behind QoS routing in MANETs and provided
evaluating them with realistic application layer models, a thorough overview of QoS routing metrics and design
is all future work. considerations. We then classified many of the major
A further trend that we have observed, is that many contributions to the QoS routing solutions pool published
designers place great emphasis on the session admission in the period 1997-2006. The protocols were selected in
(QoS route finding) capability of their protocol, which such a way as to highlight many different approaches to
is admittedly very important. In contrast, they often ne- QoS routing in MANETs, while simultaneously covering
glect or downplay the importance of session completion most of the important advances in the field since the
i.e. maintaining the routes and the QoS for as long last such survey was published. We summarised the
as an application data session requires. An aspect of operation, strengths and drawbacks of these protocols in
this, QoS robustness, was highlighted by earlier survey order to enunciate the variety of approaches proposed
writers. However, more work on the evaluation of QoS- and to expose the trends in designers’ thinking. The
sensitive session completion performance with realistic protocols’ interactions with the MAC layer were also
application layers, would be useful. Ultimately, session described. Finally, we provided an overview of the areas
completion is more important from a user perspective, and trends of progress in the field and identified topics
than session admission. This is because the perceived for future research.
24
Personal Area Networks (WPANs), 2003. IEEE Std. 802.15.3- in the field of mobile/wireless communications. He is
2003. the Founder and past Chairman of IEE International
[47] D. Johnson, D. Maltz, and J. Broch, DSR: The Dynamic Source
Routing Protocol for Multihop Wireless Ad Hoc Networks in Ad Conference on 3rd Generation Mobile Communications.
Hoc Networking, ch. 5, pp. 139–172. Addison-Wesley, 2001. He is Chairman of the EU Expert Group on Mobile
[48] F. Kuipers and P. Van Mieghem, “Conditions that impact the Technology Platform, E-Mobility as well as Chairman
complexity of QoS routing,” IEEE/ACM Trans. Networking,
vol. 13, no. 4, pp. 717–730, 2005. of the Working Group on Post-IP.
[49] IEEE Computer Society, Wireless LAN Medium Access Con-
trol (MAC) and Physical Layer (PHY) Specifications, 1999.
ANSI/IEEE Std. 802.11, 1999 Ed.
[50] C. E. Perkins and E. M. Royer, “Ad hoc on-demand distance
vector routing,” in Proc. 2nd IEEE Wksp. Mobile Computing
Systems and Applications, (New Orleans, LA), pp. 90–100, Feb.
1999.
[51] C. Sarr, C. Chaudet, G. Chelius, and I. G. Lassous, “Improving
accuracy in available bandwidth estimation for IEEE 802.11-
based ad hoc networks,” in Proc. 3rd IEEE Conf. on Mobile Ad
Hoc and Sensor Systems, (Vancouver), pp. 517–520, Oct. 2006.
[52] L. Hanzo (II.) and R. Tafazolli, “Quality of service routing and
admission control for mobile ad hoc networks with a contention-
based MAC layer,” in Proc. 3rd IEEE Conf. Mobile Ad Hoc and
Sensor Systems, (Vancouver), pp. 501–504, Oct. 2006.
[53] D. Porcino and W. Hirt, “Ultra-wideband radio technology:
Potential and challenges ahead,” IEEE Commun. Mag., vol. 41,
pp. 66–74, July 2003.
[54] S. Roy, J. Foerster, V. Somayazulu, and D. Leeper, “Ultraw-
ideband radio design: the promise of high-speed, short-range
wireless connectivity,” Proc. IEEE, vol. 92, pp. 295–311, Feb.
2004.
[55] P. Jacquet, P. Muhlethaler, T. Clausen, A. Laouiti, A. Qayyum,
and L. Viennot, “Optimized link state routing protocol for ad hoc
networking,” in Proc. IEEE Multi Topic Conf., pp. 62–68, Dec.
2001.
[56] G. Aggelou and R. Tafazolli, “RDMAR: A bandwidth-efficient
routing protocol for mobile ad hoc networks,” in Proc. 2nd ACM
Int. Wksp. Wireless mobile multimedia, pp. 26–33, 1999.
[57] H. Schulzrinne, S. Casner, R. Frederick, and V. Jacobson, “RTP:
A transport protocol for real-time applications (rfc 3550).” IETF
RFC, July 2003.
B IOGRAPHIES
Lajos Hanzo (II.) (StM’05) graduated with an MEng
degree in Computer Engineering from the University of
Southampton in 2004. Since October 2004 he has been
working towards his PhD in the Centre for Communi-
cation Systems Research at the University of Surrey,
UK. His research interests include MAC and routing
protocols for the provision of QoS in mobile ad hoc
networks and wireless sensor networks.
Rahim Tafazolli (M’89) is a Professor of Mo-
bile/Personal communications and Head of Mobile Com-
munications Research at the Center for Communication
Systems Research (CCSR), University of Surrey, UK.
He is the editor of Technologies for the Wireless Future
(Vol.1 2004 and Vol. 2 2006). He is nationally and inter-
nationally known in the field of mobile communications
and acts as external examiner for the British Telecom
M.Sc. course. He has been active in research for over
20 years and has authored and co-authored more than
300 papers in refereed international journals and confer-
ences. Professor Tafazolli is a consultant to many mobile
companies, has lectured at, chaired and been invited as
keynote speaker to a number of IEE and IEEE workshops
and conferences. He has been Technical Advisor to
many mobile companies and the European Union all