2014 13th Annual Mediterranean Ad Hoc Networking Workshop (MED-HOC-NET)

Cognitive Routing with the ETX Metric Tuan Le, Vince Rabsatt, Mario Gerla Department of Computer Science University of California, Los Angeles Los Angeles, USA {tuanle, rrabsatt, gerla}@cs.ucla.edu

Abstract—The emergence of cognitive radio network technology provides network nodes with abundant licensed and unlicensed channels to select for routing. Traditional routing methods that minimize hop count often do not leverage the full capabilities of cognitive radio users. They may select high lossy links or choose arbitrarily among the different paths of the same minimum length, regardless of the often large differences in throughput among those paths. In this paper, we propose a routing algorithm that incorporates the expected transmission count metric (ETX) to select highquality channels for routing on a hop-by-hop basis. The ETX metric incorporates the effects of link loss ratios, and interference among the successive links of a path, as well as interference caused by licensed users’ activity. Our routing algorithm utilizes all the available channels and selects channels with the best ETX value, allowing us to find paths with higher stability and higher throughput. Simulation in the NS-3 environment shows that our routing protocol has high packet delivery ratio, low end-to-end delay and low hop count in the presence of interference caused by licensed users. Keywords—routing; ETX; cognitive radio; primary user; secondary user

I. I NTRODUCTION Cognitive radio networks are composed of primary and secondary users that share a common portion of the wireless spectrum. Primary users (PU) have exclusive access to the licensed spectrum. An example of a primary user may be a TV receiver in the TV bands [11]. Secondary users (SU) occupy a channel opportunistically and leave the channel either when they have finished transmission, or when they sense primary user activity [15]. Secondary users must avoid interfering with primary users as much as possible to prevent disruption to primary user traffic. In order to ensure this, cognitive radios must be aware of the characteristics of the spectrum in their environment [5]. The links made between secondary users provide the opportunity for cognitive routing. However, routing in this environment incurs additional challenges when compared to traditional networks. These challenges revolve around the responsibility of secondary users to evacuate licensed bands in response to primary (i.e. licensed) users [3]. This can make routing through the network using a single channel impractical if that channel is occupied by a primary user. In addition, each channel may have different qualities. Determining which channel has the best quality is also a challenge. Lastly, route maintenance in cognitive routing is more challenging than in

978-1-4799-5258-8/14/$31.00 ©2014 IEEE

the non-cognitive case [4]. Primary user activity may result in frequent rerouting, which can lead to low throughput, high overhead, and high latency. Due to primary user activity, the wireless environment of a cognitive network is fluid and dynamic. Therefore, traditional measures of route quality, such as bandwidth, throughput, and latency should be combined with path stability to make routing decisions. To deal with these challenges, several schemes have been proposed. One scheme is to use inter-route diversity [2] which involves the creation of multiple separate routes between source and destination, using different channels for different routes. However, each route is restricted to evolve through the same channel. This creates redundancy in the network and allows the network to recover from a failed link by sending data through one of the other paths. Inter-route spectrum diversity, however, has several drawbacks. First, the established path is very unstable as the quality of the channel may vary significantly along the path. Second, if a path is broken at the last hop, the request to reroute the packet must propagate all the way back to the source of the packet to be processed and the packet has to be rerouted again. This leads to high latency and overhead, which could be catastrophic for a cognitive network where channels are being occupied and evacuated frequently. The other scheme is to use intra-route spectrum diversity [2] which discovers only one route that can evolve through all the available channels. As opposed to inter-route diversity, which repairs a link failure by routing through a new path, intra-route diversity repairs a link failure locally by switching to a different channel on the same path, avoiding rerouting overhead. The only weakness of this approach is that channel switching does not happen until a link fails. Even when there are higher quality channels available, a node still uses the suboptimal channel to transmit the packet, resulting in low throughput. Due to the low latency overhead of intra-route spectrum diversity, we follow the same approach in designing our cognitive routing algorithm. At the same time, we improve on intra-route diversity by allowing each hop to select the bestquality channel to forward the packet to the next hop. This enhances the overall throughput in our cognitive network. The metric we use to select the channel is based on the expected transmission count metric (ETX) [7]. ETX is valuable in wireless environments as it incorporates the effects of lossy links, interference caused by PU activity, and interference

188

2014 13th Annual Mediterranean Ad Hoc Networking Workshop (MED-HOC-NET)

among the successive links of a path [13][8]. ETX optimizes for throughput as it minimizes the expected total number of packet transmissions required to successfully deliver a packet to the ultimate destination. This paper makes two main contributions. First, it presents the design, implementation, and evaluation of our ETX computation protocol. Second, it describes our modification to the intra-route spectrum diversity algorithm to use ETX for channel selection. Our scheme is abbreviated as Cognitive Routing with ETX (CRE). The remainder of this paper is organized as follows: Section II discusses the details of the ETX computation protocol and the cognitive routing algorithm that leverages ETX to select high-quality channels for routing. Section III presents the results from performance experiments. Section IV reviews the related work. Section V summarizes and concludes this paper. II. P ROTOCOL D ESIGN This section first derives the formula to compute the Expected Transmission Count (ETX) and discusses the important characteristics of ETX in finding paths on multi-hop wireless networks. It then describes the protocol to compute ETX. Finally, it presents the cognitive routing algorithm that incorporates the ETX metric. A. ETX Metric The ETX [7] of a link is the predicted number of data transmissions required to send a packet over that link, including retransmissions. The ETX of a link is calculated using the forward and reverse delivery ratios of the link. The forward delivery ratio, df , is the measured probability that a data packet successfully arrives at the recipient. The reverse delivery ratio, dr , is the probability that the ACK packet is successfully received. These two probabilities need not be the same due to different conditions, or different transmission power at each end. The details of measuring these delivery ratios are presented in the next subsection. The expected probability that a transmission is successfully received and acknowledged is df × dr . A sender will retransmit a packet that is not successfully acknowledged. The probability of such an event is 1 − df × dr . Thus, with probability df × dr , we require 1 transmission. Otherwise, we require ET X + 1 transmissions to successfully deliver the packet. The expected number of transmissions is then computed as: ET X = (df × dr )(1) + (1 − df × dr )(ET X + 1) Thus, ET X =

1 df ×dr

ETX has several important characteristics: [7] • ETX affects throughput as it is computed based on delivery ratios. • ETX handles asymmetry as it incorporates loss ratios in both forward and reverse directions.





ETX can select the best route and channel for transmission based on precise link loss ratio measurements on each channel. ETX penalizes long multi-hop paths as they suffer interference between successive hops of the same path, resulting in low throughput [10].

B. ETX Computation Protocol This subsection begins by describing the protocol to compute ETX. Then, an example is given to show how the protocol works in a wireless network. 1) Protocol Description: Secondary users compute ETX by exchanging probe packets (ETX REQ and ETX REP) with their neighbors. To facilitate ETX computation, each node maintains a window of time W, which is divided into M equal-length intervals. ETX REQ is broadcast at the beginning of each time interval. Pseudocode 1 shows the action upon receiving ETX REQ and ETX REP. Pseudocode 1 Handle ETX packet arrival 1: if packetType is ETX REQ then 2: Prepare ETX REP packet 3: Piggyback local computed dr 4: Unicast ETX REP to sender’s IP address 5: else if packetType is ETX REP then 6: if packet arrives within the time interval then 7: Increment REPcount on channel from receiver to sender 8: else 9: Discard the packet 10: end if 11: end if

Pseudocode 2 Compute dr , df , ETX at the end of time interval 1: for each channel c do 2: df [c] = avg(piggybacked dr on channel c from all neighbors) 3: for each neighbor n do count[on channel c to n] 4: dr [on channel c to n] = TREP heoretical#of REP withoutloss 1 5: ETX[on channel c to n] = df [c]×dr [on channel c to n] 6: end for 7: end for

As mentioned in the previous subsection, the two parameters used to compute ETX is dr and df . dr , df and ETX are computed at the end of each time interval as shown in Pseudocode 2. Note that as time progresses, eventually the time window W will shift. While the theoretical value of ETX REP count (the number of ETX REP packets a node should receive without loss) is capped at M, the actual value of ETX REP count (REPcount) must be correctly adjusted. For example, consider when time window W shifts from interval t0 to interval t1 . If there was an ETX REP packet arriving within interval t0 , REPcount is decremented by one. Otherwise, REPcount stays unchanged. The details of this update are not shown in Pseudocode 2. 2) An Example of ETX Computation: Fig. 1 shows our setup. The network consists of three nodes. Each node is

189

2014 13th Annual Mediterranean Ad Hoc Networking Workshop (MED-HOC-NET)

Table 1. Pattern of ETX REP packet lost and received Nodes

t0

t1

t2

t3

B↔A

Received

Received

Lost

Received

C↔A

Received

Received

Received

Received

within the broadcast range of each other. For simplicity, we assume there is only one channel in this network, say channel 1. All nodes communicate on that same channel. Each node respectively computes the ETX on channel 1 to all of their neighbors. Without loss of generality, we focus on the ETX computation at node A. Consider the pattern of ETX REP packet lost and received in both directions between two pairs of nodes (B, A) and (C, A) in Table 1.

Fig. 2. Flow of ETX REP packets at each time interval Table 2. Values of dr , df , and ETX computed at node A

Fig. 1. An example of a network setup to show ETX computation

Fig. 2 shows the ETX REP packets and the piggybacked dr values destined to A from B and C at each time interval. Table 2 shows the values of dr , df , and ETX at node A. Note that during time interval t2 , the ETX REP packet from B to A gets lost. In this case, node A treats the piggybacked dr 1 value from B to A as 0. As a result, df equals to 0+1 2 = 2. As it can be noticed from Table 2, the values of ETX start out as infinity since at time t0 the initial piggybacked dr values from B and C are not yet available and are initialized to 0. At time t1 , ETX values converge to 1 as ETX REP already arrived at A within the time interval and the piggybacked dr values became available at the end of time t0 . At time t2 , since ETX REP packet from B to A on channel 1 gets lost, the ETX values become worse, particularly on channel 1 from A to B. Note that even though ETX REP packet from C to A successfully arrives at A, the ETX value from A to C on channel 1 slightly gets worse because the value of df on that channel is affected due to the loss of ETX REP packet on channel 1 from B to A. At time t3 , since ETX REP packets successfully arrive at A from each neighbor of A, ETX values are improved. C. Cognitive Routing Algorithm The cognitive routing algorithm in which ETX is implemented is a lightweight version of Ad-hoc On-Demand Distance Vector routing (AODV) [14]. The novelty of our design is that after the path is established, each node along the path has the flexibility to dynamically select the best channel for routing based on the locally-computed optimal ETX value. This is different from any existing works [2] in which they

Node A

t0

t1

t2

channel 1 ETX REP count from B

1

2

2

t3 3

dr on channel 1 to B

1

2/2

2/3

3/4

channel 1 ETX REP count from C

1

2

3

4

dr on channel 1 to C

1

2/2

3/3

4/4

df on channel 1

0

1

1/2

5/6

ETX on channel 1 to B

inf

1

3

1.6

ETX on channel 1 to C

inf

1

2

1.2

fit the channel to use for routing after the path is already established. Our routing algorithm follows a pure on-demand route acquisition approach. Nodes that do not lie on active paths neither maintain any routing information nor participate in any periodic routing table exchanges. Further, a node does not have to discover and maintain a route to another node until the two need to communicate, unless the node is offering its service as an intermediate forwarding station to maintain connectivity between two other nodes. 1) Path Discovery: The Path Discovery process is initiated whenever a source node needs to communicate with another node for which it has no routing information in its table. The source node initiates path discovery by broadcasting a route request (RREQ) packet to its neighbors. The RREQ contains the following fields: < source addr, dest addr, broadcast id > The pair < source addr, dest addr, broadcast id > uniquely identifies a RREQ. broadcast id is incremented

190

2014 13th Annual Mediterranean Ad Hoc Networking Workshop (MED-HOC-NET)

whenever the source issues a new RREQ. Each neighbor either satisfies the RREQ by sending a route reply (RREP) back to the source, or rebroadcasts the RREQ to its own neighbors. Notice that a node may receive multiple copies of the same route broadcast packet from various neighbors. When an intermediate node receives a RREQ, if it has already received a RREQ with the same broadcast id and source addr, it drops the redundant RREQ and does not rebroadcast it. Otherwise, it keeps track of the identity of the RREQ by storing the source addr and the broadcast id of the RREQ. 2) Reverse Path Setup: As the RREQ travels from a source to various destinations, it automatically sets up the reverse path from all nodes back to the source [6]. To set up a reverse path, a node records the address of the neighbor from which it received the first copy of the RREQ. As illustrated in Fig. 3, node A wants to communicate with node D. Node A broadcasts a RREQ. Upon receiving the RREQ from A, node B and E establish the reverse paths to A and rebroadcast the RREQ. Eventually, the reverse path is formed from node D to A. Notice that RREQ is broadcast on all channels regardless of the channel quality (the ETX value). The reason is because channel quality between a node and its neighbors may vary due to different regions of PU activity. For example, in Fig. 3, we might have PU activity in the far left that causes interference on channel 1 only from A to B, but not from A to E. Thus, if node A broadcasts RREQ only on channel 1, while the RREQ reaches node E, it may not reach node B. Hence, to ensure that RREQ reaches as many neighbors as possible, a node will broadcast RREQ on all channels.

By the time a RREQ packet arrives at a node that can supply a route to the destination, a reverse path has been established to the source of the RREQ (see previous subsection). As the RREP travels back to the source, each node along the path sets up a forward pointer to the node from which the RREP came. The field one hop receiver addr specifies the address of the next node in the reserve path from the current node. This helps prevent packet flooding in the network. Only the node that has the IP address that matches the one hop receiver addr will continue propagating the RREP along the reserve path toward the source node. Notice that each node along the reverse path encodes the next hop IP address in one hop receiver addr before forwarding the RREP. The source node can begin data transmission as soon as the first RREP is received (forwarding path setup completes). Both RREP and DATA packets are transmitted on channels with the best ETX value. Fig. 4 shows the forward path setup as the RREP travels from the destination D to the source node A. As it can be noticed from the figure, as node C receives the RREP from D, it checks its IP address against the one hop receiver addr. Since the IP addresses match, it replaces the one hop receiver addr with the IP address of its next hop on the reverse path (B) and propagates the packet to B. Eventually, the RREP arrives at node A and the forward path is established.

Fig. 4. Forward Path Formation

III. E VALUATION In this section, we evaluate the performance of the ETX computation protocol and the proposed CRE routing scheme in a packet-level simulation. We first describe the simulation setup, followed by the metrics used and the results.

Fig. 3. Reverse Path Formation

3) Forward path Setup: Eventually, a RREQ will arrive at a node (possibly the destination itself) that possesses a current route to the destination. If the receiving node has a route entry for the desired destination, it unicasts a route reply packet (RREP) back to its neighbor from which it received the RREQ. A RREP contains the following information: < source addr, dest addr, broadcast id, one hop receiver addr >

A. Simulation Setup We performed our simulations using the NS-3.18 network simulator [1]. We conducted three sets of experiments. In the first set of experiments, we evaluate how effective is our ETX computation protocol in capturing channel interference. Fig. 5 shows our network topology setup for the experiment. The topology consists of four cognitive radio nodes (secondary user nodes) and two primary user (PU) nodes. Cognitive radio nodes are laid out on the same row. Node B sits in between two primary user nodes. Each node is only in the

191

2014 13th Annual Mediterranean Ad Hoc Networking Workshop (MED-HOC-NET)

transmission range of its immediate neighbors. For example, in Fig. 5, node C is in the transmission range of node B and D, but out of the transmission range of node A. Finally, we use three channels. Each channel is modeled as a separate network interface in NS-3. This is equivalent to assigning cognitive/secondary users three separate radios, one for each channel. For PU’s transmission, we dedicate channel 1 to the top PU and channel 2 to the bottom PU. Both PUs are active and periodically broadcast HELLO messages on their own dedicated channels. We performed 20 runs. The duration of each run is 100 seconds. For each run, we recorded the ETX values computed for the last 10 intervals. The length of each interval is set to 1 second. We then averaged the results over 20 runs.

Fig. 5. Network topology setup for the first set of experiments

In the second set of experiments, we evaluate the performance of our proposed CRE scheme. We use two channels. The simulated network consists of 49 nodes, laid out in a 7x7 grid. Nodes move according to the random waypoint model in a square area. We have 10 random nodes sending data packets to 10 other nodes in the network which trigger the route establishment process. We vary the number of primary users. The primary users are selected out of 49 nodes, and they periodically broadcast HELLO messages on the same channel. In the last set of experiments, we follow similar setup as in the second experiments, but we let primary users periodically switch channels to broadcast HELLO messages, resulting in both channels unavailable at a certain time period between certain nodes. B. Evaluation Metrics We compare our proposed CRE scheme against standard AODV. The distinguished difference between standard AODV and our CRE scheme is that AODV is unaware of channel availability. In the case of heavy interference on the established channel, AODV can suffer from significant packet loss along its routing path. We use the following metrics in the experiments: 1) End-to-end delay: the average time it takes a data packet to reach the destination node.

2) Packet delivery ratio: the ratio of data packets successfully received by the destination node to the total number of data packets generated by the source node. 3) Hop count: the average number of hops that the data packets arrive at the destination node. C. Experimental Results First, we show the effectiveness of ETX in capturing interference and identifying available channels. Then, we show the performance of our CRE scheme. 1) Effectiveness of ETX: Fig. 6 shows the ETX values computed for each channel in both forward and reverse directions. The ideal value for ETX is 1, which indicates that there are no expected retransmissions for a particular channel and that the channel quality is high. The ETX values are significantly high on channel 1 and 2 from A to B and from C to B. This is because, due to the interference caused by the top and bottom PUs, node B is unable to receive the ETX REQ sent from A and C. As a result, B does not send ETX REP to A and C, resulting in high ETX values from A and C to B. For the same reason, B cannot receive the ETX REP sent from A and C, resulting in high ETX values on channel 1 and 2 from B to A and C. ETX values on channel 3 remain low (close to 1) due to the absence of PU activity on this channel. Finally, ETX values are uniformly low on all three channels between C and D. This is because node C is not in the transmission range of the top and bottom PUs. Therefore, node C is able to receive ETX REQ and ETX REP from D, resulting in low ETX values in both directions between C and D. 2) CRE Routing Performance: Fig. 7 and Fig. 8 show the performance of the standard AODV and our proposed CRE across three evaluation metrics. As the number of primary users increase, CRE has significantly lower end-to-end delay, hop count and higher packet delivery ratio. The reason is because the presence of primary users cause interference on the channel which AODV uses to route packets. Since AODV lacks the ability to detect other channel availability, it will suffer packet loss on the busy channel, resulting in lower packet delivery ratio. Furthermore, since the shortest path between a source node and a destination node may be impeded by PUs’ interference, AODV routing has to take longer routing paths, resulting in high end-to-end delay and hop count. Our CRE scheme is robust to PUs’ interference. By using ETX, CRE can detect interference on the busy channel and it subsequently switches to an available channel to route the data packets. As a result, CRE successfully delivers packets using the shortest paths, resulting in low end-to-end-delay, low hop count, and high packet delivery ratio. In Fig. 8, as PUs can now affect both channels, the performance gap between AODV and CRE is slightly decreased. As two channels are occupied, CRE may have to route through non-shortest paths, resulting in higher end-to-end delay and average hop count. Furthermore, since PUs randomly switch to operate on different channels, certain segments along the established path may become unavailable on both channels, resulting in data packets unable to arrive at the destination.

192

2014 13th Annual Mediterranean Ad Hoc Networking Workshop (MED-HOC-NET)

Thus, CRE’s delivery ratio starts deviating from 1. On the other hand, the performance of AODV is improved since the channel AODV is operating on becomes less congested (some PUs switch to a different channel). IV. R ELATED W ORK Cognitive radio networks provide radio devices the ability to opportunistically access licensed bands or efficiently utilize unlicensed bands. CoRoute [9] proposes a geographic routing scheme for vehicular cognitive adhoc networks that allows vehicles to efficiently access WiFi channels to increase the network throughput. Vehicles are considered secondary users in the presence of roadside access points. SUs use the Expected Transmission Time (ETT) and Expected Transmission Count (ETX) metrics to estimate the quality of various channels, and share the results among other SUs to determine the optimal channel for operation. Vehicles are chosen to participate in the forwarding set if they offer the best progress toward the destination and minimize the ETT. The work in SEARCH [5] uses geographic forwarding in mobile cognitive networks to jointly select a channel and a route that avoid regions of PU activity. The goal is to form paths with low hop counts between a source and a destination by taking advantage of the numerous paths that are available between the two. Routes have the ability to change dynamically according to node mobility and PU activity, while the routes with the lower hop counts are preferred. Cheng [4] proposed a cognitive on-demand routing protocol that selects a minimum delay path according to the switching and backoff delay experienced at each node. In [12], spectrum sensing and routing are paired in order to allow users to utilize geographic information and learn about spectrum access opportunities at each hop to improve transmission performance. The authors introduce a new metric Cognitive Transport Throughput (CTT) that reflects the relay advantage of each relay candidate by using the expected bit progress per second for one hop relay of a packet according to packet size and channel quality.

R EFERENCES [1] NS-3 Network Simulator. [Online]. Available: http://www.nsnam.org/ [2] A. S. Cacciapuoti, M. Caleffi, and L. Paura, “Reactive routing for mobile cognitive radio ad hoc networks,” Ad Hoc Netw., vol. 10, no. 5, pp. 803– 815, Jul. 2012. [3] M. Cesana, F. Cuomo, and E. Ekici, “Routing in cognitive radio networks: Challenges and solutions,” Ad Hoc Netw., vol. 9, no. 3, pp. 228–248, May 2011. [4] G. Cheng, W. Liu, Y. Li, and W. Cheng, “Spectrum aware on-demand routing in cognitive radio networks,” in New Frontiers in Dynamic Spectrum Access Networks, 2007. DySPAN 2007. 2nd IEEE International Symposium on, 2007, pp. 571–574. [5] K. Chowdhury and M. Di Felice, “Search: A routing protocol for mobile cognitive radio ad-hoc networks,” in Sarnoff Symposium, 2009. SARNOFF ’09. IEEE, 2009, pp. 1–6. [6] M. S. Corson and A. Ephremides, “A distributed routing algorithm for mobile wireless networks,” Wirel. Netw., vol. 1, no. 1, pp. 61–81, Feb. 1995. [7] D. S. J. De Couto, D. Aguayo, J. Bicket, and R. Morris, “A highthroughput path metric for multi-hop wireless routing,” in Proceedings of the 9th Annual International Conference on Mobile Computing and Networking, 2003, pp. 134–146. [8] N. Javaid, A. Javaid, I. Khan, and K. Djouani, “Performance study of etx based wireless routing metrics,” in Computer, Control and Communication, 2009. IC4 2009. 2nd International Conference on, 2009, pp. 1–7. [9] W. Kim, M. Gerla, S. Y. Oh, K. Lee, and A. Kassler, “Coroute: a new cognitive anypath vehicular routing protocol,” Wireless Communications and Mobile Computing, vol. 11, no. 12, pp. 1588–1602, 2011. [10] J. Li, C. Blake, D. S. De Couto, H. I. Lee, and R. Morris, “Capacity of ad hoc wireless networks,” in Proceedings of the 7th Annual International Conference on Mobile Computing and Networking, 2001, pp. 61–69. [11] Y.-C. Liang, A. T. Hoang, and H.-H. Chen, “Cognitive radio on tv bands: a new approach to provide wireless connectivity for rural areas,” Wireless Communications, IEEE, vol. 15, no. 3, pp. 16–22, 2008. [12] Y. Liu, L. X. Cai, and X. Shen, “Spectrum-aware opportunistic routing in multi-hop cognitive radio networks,” Selected Areas in Communications, IEEE Journal on, vol. 30, no. 10, pp. 1958–1968, 2012. [13] X. Ni, K.-c. Lan, and R. Malaney, “On the performance of expected transmission count (etx) for wireless mesh networks,” in Proceedings of the 3rd International Conference on Performance Evaluation Methodologies and Tools, 2008, pp. 77:1–77:10. [14] C. E. Perkins and E. M. Royer, “Ad-hoc on-demand distance vector routing,” in Proceedings of the Second IEEE Workshop on Mobile Computer Systems and Applications, 1999. [15] M. Song, C. Xin, Y. Zhao, and X. Cheng, “Dynamic spectrum access: from cognitive radio to network radio,” Wireless Communications, IEEE, vol. 19, no. 1, pp. 23–29, 2012.

V. S UMMARY AND C ONCLUSION We have proposed to use ETX as a metric for multihop wireless cognitive network. Channel selection using ETX accounts for link loss ratios, the asymmetry of the loss ratios in the two directions of each link, and the reduction of throughput due to interference among the successive hops of a route and interference caused by PU activity. We have described a protocol to compute ETX. The ETX computation protocol is based on successive exchange of probe packets. The higher the number of probe packets successfully received and acknowledged, the lower the ETX value. We have presented CRE, a cognitive routing algorithm that uses ETX to select high-quality channels for routing. The experimental results show that our routing protocol has high packet delivery ratio, low end-to-end delay and low hop count in the presence of interference caused by primary users.

193

2014 13th Annual Mediterranean Ad Hoc Networking Workshop (MED-HOC-NET)

(a) ETX value on channel A to B

(b) ETX value on channel B to C

(c) ETX value on channel C to D

(d) ETX value on channel B to A

(e) ETX value on channel C to B

(f) ETX value on channel D to C

Fig. 6. ETX values in the case of interference caused by the top PU on channel 1 and the bottom PU on channel 2

(a) End-to-end delay

(b) Packet delivery ratio

(c) Hop count

Fig. 7. CRE vs AODV when PUs transmit on the same channel

(a) End-to-end delay

(b) Packet delivery ratio

(c) Hop count

Fig. 8. CRE vs AODV when PUs periodically switch and transmit on different channels

194

Cognitive Routing with the ETX Metric - IEEE Xplore

Department of Computer Science. University of California, Los Angeles. Los Angeles, USA. {tuanle, rrabsatt, gerla}@cs.ucla.edu. Abstract—The emergence of ...

573KB Sizes 0 Downloads 250 Views

Recommend Documents

Refined Routing Algorithm in Hybrid Networks with ... - IEEE Xplore
Abstract—In this paper, a low-complexity routing strategy is introduced for a hybrid network in which wireless nodes are randomly located and multiple base ...

DEARER: A Distance-and-Energy-Aware Routing with ... - IEEE Xplore
See http://www.ieee.org/publications_standards/publications/rights/index.html for more information. This article has been accepted for publication in a future ...

An Anycast Routing Strategy with Time Constraint in ... - IEEE Xplore
Tuan Le, Mario Gerla. Dept. of Computer Science, UCLA. Los Angeles, USA. {tuanle, gerla}@cs.ucla.edu. Abstract—Delay Tolerant Networks (DTNs) are sparse ...

Elastic Routing in Wireless Networks With Directional ... - IEEE Xplore
Abstract— Throughput scaling law of a large wireless network equipping directional antennas at each node is analyzed based on the information-theoretic ...

Secure Mobile Ad hoc Routing - IEEE Xplore
In mobile ad hoc networks (MANETs), multi-hop mes- sage relay is the common way for nodes to communicate and participate in network operations, making ...

Distributed Average Consensus With Dithered ... - IEEE Xplore
computation of averages of the node data over networks with band- width/power constraints or large volumes of data. Distributed averaging algorithms fail to ...

IEEE Photonics Technology - IEEE Xplore
Abstract—Due to the high beam divergence of standard laser diodes (LDs), these are not suitable for wavelength-selective feed- back without extra optical ...

Pricing-based distributed spectrum access for cognitive ... - IEEE Xplore
Abstract: A pricing-based distributed spectrum access technique for cognitive radio (CR) networks which adopt the geolocation database (GD) is proposed.

Cosine Modulated Filterbank Technique for Cognitive ... - IEEE Xplore
Satyam Computer Services Ltd. Bangalore, India. E-mail: rajarshi_mahapatraWsatyam.com. Abstract-Ultra wideband (UWB) communication systems can.

A DTN Routing and Buffer Management Strategy for ... - IEEE Xplore
Dept. of Computer Science, UCLA. Los Angeles, USA. {tuanle, kalantarian, gerla}@cs.ucla.edu. Abstract—Delay Tolerant Networks (DTNs) are sparse mobile.

A Two-Level Multicast Routing Strategy for Delay ... - IEEE Xplore
Dept. of Computer Science, UCLA. Los Angeles, USA. {tuanle, kalantarian, gerla}@cs.ucla.edu. Abstract—Delay Tolerant Networks (DTNs) are sparse mobile.

HAODV: a New Routing Protocol to Support ... - IEEE Xplore
1Department of Computer Science. 2Department of Electrical and Computer Engineering. American University of Beirut, Beirut, Lebanon. {hs33, hartail, mk62 ...

wright layout - IEEE Xplore
tive specifications for voice over asynchronous transfer mode (VoATM) [2], voice over IP. (VoIP), and voice over frame relay (VoFR) [3]. Much has been written ...

Device Ensembles - IEEE Xplore
Dec 2, 2004 - time, the computer and consumer electronics indus- tries are defining ... tered on data synchronization between desktops and personal digital ...

wright layout - IEEE Xplore
ACCEPTED FROM OPEN CALL. INTRODUCTION. Two trends motivate this article: first, the growth of telecommunications industry interest in the implementation ...

Investigating Sensor Networks with Concurrent ... - IEEE Xplore
The background behind this demonstration is described as an one-page poster submission. The goal is to show a flow of tools for quick sensor network modeling, from an high level abstraction down to a system validation, including random network genera

Providing Secrecy with Lattice Codes - IEEE Xplore
Wireless Communications and Networking Laboratory. Electrical Engineering Department. The Pennsylvania State University, University Park, PA 16802.

Trellis-Coded Modulation with Multidimensional ... - IEEE Xplore
constellation, easier tolerance to phase ambiguities, and a better trade-off between complexity and coding gain. A number of such schemes are presented and ...

Evolutionary Computation, IEEE Transactions on - IEEE Xplore
search strategy to a great number of habitats and prey distributions. We propose to synthesize a similar search strategy for the massively multimodal problems of ...

Compressive Sensing With Chaotic Sequence - IEEE Xplore
Index Terms—Chaos, compressive sensing, logistic map. I. INTRODUCTION ... attributes of a signal using very few measurements: for any. -dimensional signal ...

The Viterbi Algorithm - IEEE Xplore
HE VITERBI algorithm (VA) was proposed in 1967 as a method of decoding convolutional codes. Since that time, it has been recognized as an attractive solu-.

I iJl! - IEEE Xplore
Email: [email protected]. Abstract: A ... consumptions are 8.3mA and 1.lmA for WCDMA mode .... 8.3mA from a 1.5V supply under WCDMA mode and.

Gigabit DSL - IEEE Xplore
(DSL) technology based on MIMO transmission methods finds that symmetric data rates of more than 1 Gbps are achievable over four twisted pairs (category 3) ...