Beruflich Dokumente
Kultur Dokumente
742
increases. As more traffic is routed through a best through this notification message, a child MR
route, it increases the load on the intermediate notifies to its parent MR which paths to use for
MRs and thereby deteriorating the overall forwarding its traffic. Parent MRs receiving this
performance of the path. As can be noticed this notification message then registers the child MR
performance degradation is due to the traffic in its routing table and updates the route(s) that
build up on certain hot paths. But, if we utilize should be used to forward the traffic from the
multiple paths to balance the traffic, such a child MR. The parent MR also establishes a
situation would seldom occur. We propose to reverse route to the child MR.
exploit these multiple paths to synergistically After processing the
improve the overall performance in a WMN. PARENT_NOTIFICATION message, a parent
MR will then unicasts another notification
3.1 Multi-path Route Discovery
message (called CHILD_NOTIFICATION) to all
Each node in the network selects a set of the corresponding MRs (that occur in the selected
routes from itself to the destination and informs routes). This CHILD_NOTIFICATION is
all the corresponding intermediate nodes. The propagated all the way until it reaches the IGWs.
idea of restricting the set of routes for forwarding This CHILD_NOTIFICATION message informs
traffic from a particular source is derived from all the intermediate MRs along the route
the traditional source routing technique which including the IGW about a child MR and the path
offers a unique advantage. With source routing, that can be followed to reach this child MR. On
we can incorporate the decision of choosing the receiving the CHILD_NOTIFICATION message,
route with good channel diversity which is each parent MR registers this child MR and
otherwise not possible in distance vector routing. follow similar steps (as described earlier) in
We divide the route discovery and route registering the multiple route(s) to reach a child
maintenance procedures into different phases. MR in their respective routing tables. Thus each
The following subsections will describe the intermediate MR (including the IGW) that is in
details of the protocol. the path from a child MR to IGW now has one or
3.1.1 Initial Network setup phase more route(s) to the corresponding child MR.
This phase allows all the nodes to discover We now illustrate the operation of our
multiple routes to the IGWs. The IGWs and MRs protocol using a simple example. Consider the
that have at least one path to the IGW can sample mesh network shown in figure 2. In this
broadcast the advertisements. Initially, when the figure there are two gateway nodes (GW0 and
network is just started, only the gateway nodes GW1) which are connected to the wired network.
broadcast advertisements of internet connectivity. These gateways announce their presence by
Neighboring MRs setup paths to all the possible periodic beacons which include some additional
IGWs in the order of their performance. These information as discussed earlier. MRs 1, 3 and 4
nodes further broadcast the connection receive these advertisements. MR 3 receives two
advertisements. In these advertisements they advertisements (from GW 0 and GW 1). Let us
announce all their routes to the IGWs with their suppose that the link between MR 3 and GW 1 is
order of preference. These advertisements can better than the link between MR 3 and GW 0. It
include certain metrics such as ETT or delay to thus prioritizes its routes to the GWs according to
the Gateways (additional information such as its the link capacity and path performance (WCETT
local load, average queue lengths etc. can also be can be used as a metric).
included). A MR after hearing these Now consider the case of MR 6. Let us suppose it
advertisements then decides the different routes receives the first route advertisements to GW
that are acceptable to it and adds this to its from MR 5 (5-4-GW0, and 5-1-GW0). Since it
routing table. It then unicasts a doesn’t have any routes already, it selects both of
PARENT_NOTIFICATION message to the them and sends a PARENT_NOTIFY message to
selected parent MRs (from whom it has selected MR 5 including its preference of the routes to
the route(s)). This message contains all the routes MR 5. MR 5 then creates an entry in its routing
it has chosen from the advertised routes. Thus table and notes the preferred next hops as
specified by the child MR (MR 6). It then sends
743
a CHILD_NOTIFY message to notify its parents 3.1.3 Fast rediscovery of paths
(in this case MR 4 and MR 1) about the child Although topology changes in a WMN are very
(MR 6) along with the selected routes. Similar to uncommon, nevertheless there is still some
MR 5 they also register the preferred next hops possibility. Some possibilities are when a new
for traffic from MR 6. This notification goes until MR is added to the network or a MR reboots.
it reaches the GW0. Moreover due to varied reasons 1 , the links are
highly unstable and temporary glitches can occur.
In such cases, some routes may become stale and
thus it is highly important for any routing
algorithm to quickly adapt to these changes by
facilitating faster recovery.
We consider the two cases when an existing
MR reboots or goes down in an active network.
In such a case, the adjacent nodes will detect its
absence and update the routing table. Specifically
when an MR detects the failure of a neighbor, it
checks its routing table to verify if any route has
this neighbor in the next hop field. If such routes
Figure 2: Mesh network scenario are found, they are temporarily suspended. When
a route is suspended, the traffic from the affected
3.1.2 Route maintenance source nodes is routed through other possible
A WMN is an ad hoc network and hence can next hop nodes. If however there was only one
undergo periodic up gradation. As new MRs can next hop chosen by the source node, then the MR
be added or some existing MRs may be switched is authorized to route the traffic through alternate
off etc, new routes should be discovered and paths until the threshold time. If the neighbor
some obsolete routes should be detected. The node recovers before this threshold time, the
MRs should be promptly informed about these route is made active again. Otherwise the source
changes in the network and avoid sending traffic node will be notified by an RERR.
over stale routes.
In the route maintenance phase of our 4 Traffic balancing at Mesh Routers
protocol, we facilitate the monitoring and In the previous sections, we have seen how each
exchange of the changing information in the MR (and Gateways) elegantly discovers and
network. After initial route discovery phase, each maintains multiple routes to and from the
MR continuously monitors the performance of all Gateways. Once we have these multiple routes
the active paths. On finding new routes or stale setup, our task is to divide the traffic among these
routes, a MR appropriately validates its routing routes to balance the load, without degrading the
tables and announces this information to its performance. In this section, we will describe
neighboring nodes. Neighboring nodes promptly how each MR uses these available route(s) to
update their routing table using this information achieve load balancing.
and further propagate the changes.
In order to facilitate faster failure recovery, 4.1 Round Robin scheduling
we provide certain authority to intermediate This is by far the simplest traffic splitting
nodes. When an MR detects the failure of a mechanism that can be used for effective traffic
particular next hop, it immediately checks its load balancing in a network. A node sends every
routing table to identify all the routes that pass packet to a different next hop thus uniformly
through the failed MR. Upon identifying all such distributing traffic over in the network. However
routes; it temporarily suspends the scheduling this scheme suffers from setback due to possible
through this node. Thus, even though the source out of order delivery of packets belonging to
nodes that have selected the routes that are far
away, they are not affected by any intermediate 1
Possible reasons are due to small scale fading and
node failures. multipath signal transmissions
744
same flow. The transport layer protocols need to attributed due to the path selected by MR 8 for
maintain a large buffer to cope up with out of reaching the IGW. As it uses only a single path,
order delivery and can lead to unnecessary loss traffic from nearby nodes can choke the longer
with protocols such as TCP. hop length flows [7]. Self interference and unfair
channel access are the other reasons that
4.2 Congestion aware routing
contribute to this starvation of this client.
One of the important features of any multi-path On the other hand, when we use our MMESH,
routing algorithm should be the ability to the traffic is distributed over multiple routes.
effectively mitigate congestion and avoid routing Figure 3(b) shows the throughput performance
traffic through congested routes. High average when MMESH is used. We observe a substantial
queue lengths indicate high congestion at a node improvement in the throughputs of flows from
which can lead to possible packet droppings in MR 8. Since the packets are distributed over
turn decreasing the performance of the network. multiple routes, the packets that are transmitted
Thus if we find that a particular next hop node through the non-congested nodes are thus not
has high average queue length over a period of dropped due to overflowing buffers. We observe
time, we temporarily skip that node and send the that a majority of these packets can successfully
traffic through other neighboring nodes. reach the IGW. However as we still route some
of the packets through the congested nodes, these
5 Performance Evaluation are lost due to the buffer over flows.
In this section, we evaluate the performance Figure 3(c) shows the instantaneous
of our proposed routing protocol using extensive throughputs of the three flows when we use our
simulations using ns-2. We have implemented congestion aware multipath routing mechanism.
our MMESH protocol in ns-2 simulator (version We can notice the increased throughput of the
2.29) [9]. We also enhanced ns-2 by modifying flow from MR 8. Recall from section 3.2, each
its default 802.11 MAC layer implementation to node reports some of the node specific metrics
support the multi-rate transmissions specified by such as average queue length to its neighbors
IEEE 802.11b standard. We considered a 3x3 through the periodic HELLO advertisements.
grid of MRs serving up to 50 end users/clients This information is used to determine whether a
(CN). Each MR is equipped with two radios: one packet should be sent or skipped through a
for communicating in the backbone network i.e. particular next hop node. When a MR notices
with other peer MRs while the second radio is high average queue lengths in a next hop node
used to explicitly communicate with CNs. The for a period of time, it avoids sending any
bottom left MR i.e. MR0, serves as the Internet packets through this node until the congestion
gateway for all other MRs. reduces. This optimization not only helps in
5.1 Throughput performance with UDP traffic
improving the performance of the flows by
reducing the packet drop probability, but also
We start aggregate of flows from CNs under greatly reduces the wastage of valuable
MR 8, MR 6, and MR 4 when the simulation bandwidth.
time is 5, 20, and 30 seconds respectively. Figure Next we also measure the throughputs of these
3 (a-c) shows the instantaneous throughput of the clients by varying the traffic generation rates of
flows from the three clients. As we can observe, their flows. Figure 4(a-c) shows the throughput
when we use AODV as the routing protocol, the with increasing traffic generation rate. We can
clients that are closer to the IGW enjoy very high observe a tremendous improvement in the
throughput. Initially when only CNs under MR 8 throughput of clients under MR 8 without
are transmitting in the network, they achieve affecting the performance of other clients. From
decent throughput of around 300 Kbps. But when figure 4 (c), we can notice that Congestion aware
the flows from CNs under MR 4 start, flows from MMESH helps in further improving the
MR 8 suffer from severe packet loss. performance by as high as 100%.
Different factors contribute for this poor
performance. The primary reason for this can be
745
350 MR-8 400 MR-8 400 MR-8
MR-6 MR-6 MR-6
300 350 350
MR-4 MR-4 MR-4
300 300
Throughput (Kbps
Throughput (Kbps
Throughput (Kbps
250
250 250
200
200 200
150
150 150
100
100 100
50 50 50
0 0 0
0 25 50 75 100 125 150 0 25 50 75 100 125 150 0 25 50 75 100 125 150
Time (s) Time (s) Time (s)
300
200 MR-8 200
Throughput (Kbps
Throughput (Kbps
Throughput (Kbps
746