1

On Selection of Candidates for Opportunistic Any-Path Forwarding ∗

Zifei Zhong∗ , Junling Wang∗ , Guor-Huar Lu† , Srihari Nelakuditi‡ Univ. of South Carolina (student) † Univ. of Minnesota (student) ‡ Univ. of South Carolina (faculty)

I. I NTRODUCTION AND M OTIVATION Routing protocols for wireless networks have traditionally focused on finding the best path for forwarding packets between a pair of nodes. While such single-path forwarding is suitable for wired networks with relatively stable point-to-point links, it is not an ideal approach for wireless networks with broadcast links of time varying qualities. Fluctuations in the quality of any of the links along the predetermined single path can cause excessive retransmissions at the link layer or reroutings at the network layer. Exploiting the broadcast nature of wireless transmissions, several opportunistic routing schemes have been proposed to make the forwarding insensitive to link quality variations [1], [2]. The general idea behind these schemes is that, for each destination, a set of candidate next hops are selected in-advance and one of them is chosen for forwarding on a per-packet basis according to its reachability at that instant. By employing such opportunistic any-path forwarding (OAPF), these schemes reduce the number of transmissions needed for reliable delivery of a packet to its destination. The candidate selection and prioritization are the two key issues that need to be addressed by any opportunistic routing scheme. Previously proposed opportunistic schemes such as ExOR [1] select many possible nexthops as candidates and prioritize them based on the best-path ETX from a candidate to the destination. We argue that, instead of many candidates, it is desirable to select a few good ones that do help reduce the number of transmissions. This would decrease the extent of interference caused by the candidates to their neighbors in transmitting per-packet ACKs [1] or the amount of delay in the delivery of a batch of packets [3]. In addition, prioritization based on the best-path ETX from candidate to destination does not account for the fact that the candidates also in turn employ any-path forwarding. To address the above issues, in this paper, we define a new metric expected any-path transmissions (EAX) for a pair of nodes with a given set of candidates that captures the expected number of transmissions between them under opportunistic forwarding. We then describe a candidate selection and prioritization method based on EAX to minimize the number of candidates without adversely affecting the performance in terms of the number of transmissions needed for reliable delivery.

E

0.3

0.5 0.4

A

0.6

B

0.8

Fig. 1.

0.8

0.8

C

D

0.3

F

Topology for illustration of candidate selection

II. E XPECTED A NY-PATH T RANSMISSIONS We now define the EAX for a source s and a destination d. Let C s,d be the set of candidate next hops from s to d, and Cis,d be the candidate with priority i (with 1 being the highest). Suppose the delivery probability from s to Cis,d is pi (considering both the forward data and backward ACK transmissions). Then, we have EAX(s, d) =

1+

Qi−1 s,d i EAX(Ci , d)pi j=1 (1

P

1−

Q

i (1

− pj )

− pi )

Consider the network shown in Fig. 1, where each edge is labeled with the associated delivery probability. Suppose D is the destination. Further assume that A selects B and E as candidates and similarly B has C and D, while all other nodes have just one candidate each. The corresponding EAX and best path ETX values from each node to the destination D are given below. metric ETX EAX

A 4.47 3.24

B 2.50 1.82

C 1.25 1.25

D 0 0

E 2 2

F 3.33 3.33

III. C ANDIDATE S ELECTION BASED ON EAX It is possible that the addition of a candidate next hop for a node pair, while not contributing much to the delivery of packets between that node pair, can actually degrade the overall network throughput. For example, under ExOR (that does not use RTS/CTS), when two candidates c1 and c2 receive a DATA packet from a sender s, both respond with ACK which can potentially interfere with other ongoing DATA transmissions in the neighborhood of c1 and c2 . The proposed new metric EAX helps determine the contribution of a candidate to the delivery of packets between a node pair and enables judicious selection of candidates. The selection of candidates based on EAX can be performed as follows at a node s for a specific destination d. First, a set of potential candidates, Cˆ s,d , is determined based on the best path ETX. A neighbor j is included

OAPFETX OAPFEAX(0%) OAPFEAX(1%)

0.4

fraction of node pairs

0.35 0.3 0.25 0.2 0.15 0.1 0.05 0

Fig. 2.

1

2

3

4 5 number of candidates

6

7

>7

5

expected extent of interference (OAPFETX / OAPFEAX)

0.45

expected extent of interference (OAPFETX / OAPFEAX)

2

4

3

2

1

0 0.96

0.98 1 1.02 1.04 1.06 1.08 1.1 1.12 expected number of transmissions (OAPFETX / OAPFEAX)

1.14

5

4

3

2

1

0 0.96

0.98 1 1.02 1.04 1.06 1.08 1.1 1.12 expected number of transmissions (OAPFETX / OAPFEAX)

1.14

OAPFETX vs OAPFEAX : (a) no. of candidates; expected interference and no. of transmissions with (b) ψ = 0% and (c) ψ = 1%

in Cˆ s,d only if ETX(s, d) > ETX(j, d). Then, a subset of Cˆ s,d is selected as the actual candidate set C s,d . Note that the candidate selection for all the nodes in Cˆ s,d is done before it is done for s. The set C s,d is initialized with the next hop having the smallest ETX to d. The rest of the candidates are selected incrementally as follows. A potential candidate is considered for inclusion in the set C s,d only if it reduces the EAX(s, d) by a factor of at least ψ , which is configurable parameter. Among such potential candidates, the one that reduces EAX(s, d) the most is added to C s,d . This process is repeated till no new candidates are added to the set. The candidate selection based on ETX and EAX is illustrated using Fig. 1. Assume node A is the source and node D is the destination. By using ETX, node A will choose 3 candidates: B, E, and F. Because paths from these nodes to D have smaller ETX than that from A to D. If we use EAX, then only 2 nodes, B and E, will be selected by source A. Because the EAX with these two candidates is less than the EAX of F, adding F to the candidate set does not decrease EAX between A and D. Similarly prioritization based on EAX yields different ordering among the candidates. Based on EAX, B gets higher priority than E. The differences in the candidate selection and prioritization based on ETX and EAX for source A and destination D are summarized below. metric ETX EAX

(src, dst) (A, D) (A, D)

cand. size 3 2

candidates B, E, F B, E

priority E>B>F B>E

IV. E VALUATION OF EAX- BASED OAPF We now compare the performance of OAPF based on ETX with that based on EAX in terms of the number of candidates selected per each node pair, and also the resulting EAX. We use the link-level measurements data from MIT Roofnet [4] for the evaluation. Roofnet is a 38-node multi-hop wireless mesh network with 352 uni-directional links. The measurement trace records a delivery ratio for each link every 200 ms for 90 sec. We compute the average delivery ratio over 90 sec for each

link and use these average values to select candidates for each pair of nodes as per ETX and EAX. Fig. 2(a) shows the number of candidates and the corresponding fraction of node pairs having that many candidates under OAPFETX and OAPFEAX with ψ = 0 and ψ = 1%. There is no significant difference in the number of candidates between OAPFETX and OAPFEAX with ψ = 0. However, even with a very small ψ value of 1%, there is a substantial decrease in the number of candidates. To demonstrate the effect of a smaller candidate set on the delivery, in Fig. 2(b) and Fig. 2(c), we plot for each node pair, the ratio of EAX under OAPFETX and OAPFEAX against ratio of expected interference under OAPFETX and OAPFEAX , for ψ = 0 and ψ = 1% respectively. We approximate the extent of interference caused by a set of candidates C s,d with the expected number of nodes that receive (based on the average delivery ratios of links) an ACK, from at least one of the candidates, when a DATA packet is sent from s to d. It is clear that OAPFEAX with a small ψ value of 1% selects fewer good candidates and thus reduces the interference to others while delivering as well as OAPFETX with many more candidates. V. C ONCLUSION We proposed a new metric EAX for opportunistic anypath forwarding and described a candidate selection and prioritization method based on EAX. We demonstrated that EAX-based selection, without hurting the delivery for a node pair, can reduce the potential interference to other node pairs. We need to further evaluate the proposed approach with simulations and experiments. R EFERENCES [1] S. Biswas and R. Morris, “Opportunistic routing in multi-hop wireless networks,” in HotNets-II, Nov. 2003. [2] Romit Roy Choudhury and Nitin H. Vaidya, “Mac-layer anycasting in ad hoc networks,” SIGCOMM Comput. Commun. Rev., vol. 34, no. 1, pp. 75–80, 2004. [3] Sanjit Zubin Biswas, “Opportunistic Routing in Multi-hop Wireless Networks,” MS Thesis, MIT, 2005. [4] MIT Roofnet, “http://www.pdos.lcs.mit.edu/roofnet/,” .

On Selection of Candidates for Opportunistic Any-Path ... - CiteSeerX

Routing protocols for wireless networks have tradi- ... forwarding is suitable for wired networks with relatively ... reliable delivery of a packet to its destination.

90KB Sizes 0 Downloads 240 Views

Recommend Documents

On Selection of Candidates for Opportunistic Any-Path ... - CiteSeerX
Routing protocols for wireless networks have tradi- tionally focused on finding the ... on EAX to minimize the number of candidates without adversely affecting the ...

Performance Evaluation of Parallel Opportunistic Multihop ... - CiteSeerX
of the IEEE International Conference on Communications, Seattle,. WA, pp. 331-335 ... From August 2008 to April 2009, he was with Lumicomm Inc.,. Daejeon ...

Opportunistic Relay Selection Based on Interference ...
code the third symbols while being interfered with by. Rπ2(1) ... own timer with K initial values, which are proportional to ... The timer of the relay Rπ1(ˆk) with the.

A Genomic Scan for Selection Reveals Candidates for ...
Nov 18, 2008 - Rows in bold indicate loci with P < 0.05 for both lnRV and. lnRH. ... b A locus that was previously mapped in a different cross (see text for details). ..... reading.ac.uk/Statistics/genetics/software.html) was used to investigate.

Opportunistic Underlay Transmission in Multi-carrier ... - CiteSeerX
KAIST Institute for Information Technology Convergence ... Several spectrum-sensing tech- ..... correlation in frequency domain reduces the degree of freedom.

Selection on domestication traits and quantitative trait loci ... - CiteSeerX
lations have received increased scrutiny following the introduction of transgenic technologies (Chapman & Burke ... success of this technology will depend upon consistent, strong negative fitness effects of the linked allele in the ..... locus (range

Web-Scale Multi-Task Feature Selection for Behavioral ... - CiteSeerX
Sparse Multi−task (aggressive). Sparse Multi−task(conservative). Per−Campaign L1. Figure 3: Features histogram across campaigns. The. X-axis represents the ...

An Empirical Evaluation of Client-side Server Selection ... - CiteSeerX
selecting the “best” server to invoke at the client side is not a trivial task, as this ... Server Selection, Replicated Web Services, Empirical Evaluation. 1. INTRODUCTION .... server to be invoked randomly amongst the set of servers hosting a r

The Impact of Candidates' Statements about Climate Change on ...
invest in windmills and solar panels as alternative energy sources. ... green statements was apparent among Democratic respondents (see row 2 of Table 2).45 ...

The Impact of Candidates' Statements about Climate Change on ...
We need to begin using new forms of energy that are made in America and will be ... invest in windmills and solar panels as alternative energy sources. Instead ...

Training for Candidates -
o House or small meetings – candidates host and make short speech, most important to listen, answer questions, and ..... 16. ETU web Site: http://www.etu.org.za/

Training for Candidates -
service delivery, negative about jobs, corruption, ANC leaders, consultation, contact, and ANC ... o House or small meetings – candidates host and make short speech, ... If not available for deployment report in good time to provincial person in.

Opportunistic Interference Alignment for Interference ...
This work was supported by the Industrial Strategic Technology Develop- ... [10033822, Operation framework development of large-scale intelligent and.

Opportunistic Interference Alignment for Interference ...
Simulation results show that the proposed scheme provides significant improvement in ... Section IV shows simulation results under the OIA scheme. Finally, we summarize the paper with some ..... [1] V. R. Cadambe and S. A. Jafar, “Interference alig

Throughput Maximization for Opportunistic Spectrum ... - IEEE Xplore
Abstract—In this paper, we propose a novel transmission probability scheduling scheme for opportunistic spectrum access in cognitive radio networks. With the ...

Opportunistic Interference Alignment for MIMO ...
1School of ECE, UNIST, Ulsan, Korea, E-mail: [email protected]. 2Dept. of CSE .... user feeds back the effective channel vector and quantity of inter-cell.

Opportunistic Interference Alignment for Random ... - IEEE Xplore
Dec 14, 2015 - the new standardization called IEEE 802.11 high-efficiency wireless ... Short Range Wireless Transmission Technology with Robustness to ...

On the Impact of Kernel Approximation on Learning ... - CiteSeerX
The size of modern day learning problems found in com- puter vision, natural ... tion 2 introduces the problem of kernel stability and gives a kernel stability ...

On Efficient Graph Substructure Selection
Abstract. Graphs have a wide range of applications in many domains. The graph substructure selection problem is to find all subgraph isomor- phic mappings of ...

Throughput Maximization for Opportunistic Spectrum ...
Aug 27, 2010 - Throughput Maximization for Opportunistic. Spectrum Access via Transmission. Probability Scheduling Scheme. Yang Cao, Daiming Qu, Guohui Zhong, Tao Jiang. Huazhong University of Science and Technology,. Wuhan, China ...

Opportunistic Interference Alignment for MIMO ...
usage is required for the decoding of one signal block [6]. In addition, global channel state .... K-cell MIMO Interfering MAC. We show that for the antenna ...