Academia.eduAcademia.edu

MAC protocols over wireless mesh networks: problems and perspective

2008, Journal of Parallel and Distributed Computing

The wireless mesh network (WMN) has been an emerging technology in recent years. Because the transmission medium used in networking backhaul access points (APs) is radio, the wireless mesh network is not only easy and cost effective in deployment, but also has good scalability in coverage area and capacity. This paper provides an overview of distributed medium access control (MAC) protocols, discusses their features and suitability for WMNs and identifies potential challenges and open research issues. Specifically, we overview the technical medium access control of the new standard for WMNs, the mesh deployments of the IEEE 802.16 MAC and we focus on the coordinated distributed scheduling (CDS) scheme of this. Moreover, we assess the fitness of the IEEE 802.11 over wireless mesh networks. Through the study of existing solutions, we analyze the previous work and sketch the contours of the directions to achieve the throughput and the latency that must be guaranteed in WMNs. In this context we suggest future enhancements to the standard that could increase throughput, while also increase the robustness, without complexity increases and propose and evaluate a new distributed scheduling scheme (DSS). We compared the CDS and the DSS and simulations studies document and confirm the positive characteristics of the proposed scheme. Furthermore, we proposed an analytical model to assess a lower bound in terms of delay.

J. Parallel Distrib. Comput. 68 (2008) 387 – 397 www.elsevier.com/locate/jpdc MAC protocols over wireless mesh networks: problems and perspective V. Loscrì D.E.I.S. Department, University of Calabria, 87036 Rende, CS, Italy Received 31 October 2006; accepted 7 May 2007 Available online 16 May 2007 Abstract The wireless mesh network (WMN) has been an emerging technology in recent years. Because the transmission medium used in networking backhaul access points (APs) is radio, the wireless mesh network is not only easy and cost effective in deployment, but also has good scalability in coverage area and capacity. This paper provides an overview of distributed medium access control (MAC) protocols, discusses their features and suitability for WMNs and identifies potential challenges and open research issues. Specifically, we overview the technical medium access control of the new standard for WMNs, the mesh deployments of the IEEE 802.16 MAC and we focus on the coordinated distributed scheduling (CDS) scheme of this. Moreover, we assess the fitness of the IEEE 802.11 over wireless mesh networks. Through the study of existing solutions, we analyze the previous work and sketch the contours of the directions to achieve the throughput and the latency that must be guaranteed in WMNs. In this context we suggest future enhancements to the standard that could increase throughput, while also increase the robustness, without complexity increases and propose and evaluate a new distributed scheduling scheme (DSS). We compared the CDS and the DSS and simulations studies document and confirm the positive characteristics of the proposed scheme. Furthermore, we proposed an analytical model to assess a lower bound in terms of delay. © 2007 Elsevier Inc. All rights reserved. Keywords: Wireless mesh networks (WMNs); MAC; IEEE 802.11; IEEE 802.16; Coordinated distributed scheduling; TDMA 1. Introduction The wireless mesh networking has emerged as a promising technology for future broadband wireless access [1,4]. Although the notion of mesh networking has been discussed extensively in wireline and optical networks [7,9], the research mainly focuses on restoration of link failure and/or design of survivable and healing networks. When applying mesh networking techniques over shared wireless medium with limited radio spectrum, many new challenges are raised such as fading mitigation, effective and efficient medium access control (MAC), quality of service (QoS) routing, call admission control, etc. Wireless mesh networks (WMNs) consist of wireline gateways, mesh routers and mesh clients, organized in a three-tier architecture [1,16] as shown in Fig. 1. A mesh client network can be formed in an ad hoc manner and connected to one or more mesh routers. The mesh routers in fixed sites comprise a wireless mesh backbone to provide relay service to the mesh client networks and other access networks such as cellular networks, wireless E-mail address: [email protected]. 0743-7315/$ - see front matter © 2007 Elsevier Inc. All rights reserved. doi:10.1016/j.jpdc.2007.05.002 local area networks (LANs), etc. The wireless mesh backbone provides a platform to integrate the wireless LANs, so that a multi-mode mobile station with multiple air interfaces can roam freely among the access networks and select desired services. For WMNs, due to the limited radio bandwidth, MAC is essential to coordinate the transmissions from/to the mesh routers and clients in an effective and efficient manner. MAC for wireless networks can be categorized into two groups: centralized and distributed MAC, according whether the access to the medium is coordinated in a centralized or distributed fashion. Centralized MAC is usually designed for infrastructure-based networks such as cellular networks. On the other hand, distributed MAC is suitable for infrastructure-less networks such as mobile ad hoc networks without a pre-existing central controller, where each node determines its own access to the medium according to its local observation of the channel [5]. Due to the self-organization nature of WMNs, it is desired to apply distributed MAC to achieve efficient resource utilization. Without central coordination, distributed MAC is more challenging than centralized MAC as contention and hence transmission collision are generally inevitable. There are extensive research results on 388 V. Loscrì / J. Parallel Distrib. Comput. 68 (2008) 387 – 397 Fig. 1. An illustration of wireless mesh network. distributed MAC over mobile ad hoc networks in the literature [12,15]. Although organized in an ad hoc manner, the WMNs are quite different from traditional mobile ad hoc networks. In fact, the wireless mesh backbone is with low (or no) mobility and has no power constraint and the wireless clients may form a network attached to fixed mesh routers, thus with only limited mobility. The traffic volume in the wireless mesh backbone in a large-scale WMN can be very large and can vary from one mesh router to another, thus posing significant challenges on the MAC design. Therefore, it may not be effective or efficient to directly apply existing MAC protocols proposed for ad hoc networks (i.e., the Evolutionary-TDMA, E-TDMA [22,23]) to the wireless mesh backbone and the mesh client networks. This paper is to provide a comprehensive overview on distributed MAC protocols, discuss their suitability for WMNs, and present new solutions while discussing further research issues in this area. The rest of the paper is organized as follows. In Section 2 we give an overview of the IEEE Std 802.11. The IEEE Std 802.16 and specifically the coordinated distributed scheduling scheme (CDS) is described in Section 3. In Section 4 we present a new totally distributed scheduling scheme (DSS) for WMNs. In Section 5 we propose an analytical approach to evaluate the delay in a TDMA protocol. This analytical model will be used in Section 6 to compute a delay lower bound. Moreover, in Section 6 we discuss performance comparisons between the differ- ent solutions presented and open research issues are discussed in this section. Finally, the conclusion remarks are given in Section 7. 2. The std IEEE 802.11: problems and challenges in a WMN 2.1. The IEEE 802.11: some details The 802.11 protocol covers the MAC and physical layers. The standard currently defines a single-hop MAC which interacts with three PHYs (all of them running at 1 and 2 Mb/s) as follows: frequency hopping spread spectrum in the 2.4 GHz band, direct sequence spread spectrum in the 2.4 GHz band, and infrared. The MAC layer defines two different access methods, the distributed coordination function (DCF) and point coordination function (PCF). The basic access mechanism, the DCF, is basically a carrier sense multiple access with collision avoidance (CSMA/CA) mechanism. A CSMA protocol works as follows. A station desiring to transmit senses the medium. If the medium is busy (i.e., some other station is transmitting), the station defers its transmission to a later time. If the medium is sensed as free, the station is allowed to transmit. These kinds of protocols are very effective when the medium is not heavily loaded, since it allows stations to transmit with minimum V. Loscrì / J. Parallel Distrib. Comput. 68 (2008) 387 – 397 delay. But there is always a chance of stations simultaneously sensing the medium as free and transmitting at the same time, causing a collision. The latter case will cause significant delay. In order to overcome the collision problem, the 802.11 uses a CA mechanism coupled with a positive acknowledge scheme, as follows: • A station wanting to transmit senses the medium. If the medium is busy, it defers. If the medium is free for a specified time, called the distributed interframe space (DIFS) in the standard, the station is allowed to transmit. • The receiving station checks the cyclic redundancy check (CRC) of the received packet and sends an acknowledgement packet. Receipt of this ACK indicates to the transmitter that no collision occurred. If the sender does not receive the ACK packet, it retransmits the frame until it receives an ACK or throws it away after a given number of retransmissions. According to the standard, a maximum of seven retransmissions are allowed before the frame is dropped. In order to reduce the probability of two stations due not hearing each other, the well-known “hidden node problem”, the standard defines a virtual CS mechanism: a station wanting to transmit a packet first transmits a short control packet called request to send (RTS), which includes the source, destination, and duration of the intended packet and ACK transaction. The destination station responds, if the medium is free, with a response control Packet called clear to send (CTS), which includes the same duration information. All other stations receiving either RTS or the CTS set their virtual CS indicator, called a network allocation vector (NAV), for the given duration and use this information together with the physical CS when sensing the medium. This mechanism reduces the probability of the receiver area collision caused by a station that is “hidden” from the transmitter during RTS transmission, because the station overhears the CTS and “reserves” the medium as busy until the end of the transaction. A hidden node is one that is within the interfering range of the intended destination but out of the sensing range of the sender. Hidden nodes can cause collisions on data transmissions. Wireless packet networks also face the exposed node problem. Exposed nodes are complementary to hidden nodes. An exposed node is one that is within the sensing range of the sender but out of the interfering range of the destination. As consequence, the available bandwidth is underutilized. In the 802.11 MAC layer protocol, there is no scheme to deal with this problem. This might cause a serious problem when it is used in multihop wireless networks. 2.2. The IEEE 802.11: problems and challenges in a WMN A WMN is a dynamic collection of backhaul routers. It is similar to an ad hoc network, but the topology, composed of backhaul routers, is static. The backhaul router has more functionality than an AP. However the IEEE 802.11 MAC protocol, CSMA/CA, is originally designed for single-hop WLAN environment, not for multihop wireless networks. The backhaul networking of a WMN must have the following concerns: capacity, throughput, latency, and reach. Based on the analysis on 389 previous works [21,11], CSMA/CA cannot meet the requirements of backhaul networking. In [21], the authors discovered that CSMA/CA did not function well in a wireless multi-hop environment. The results revealed that not only the instability problem of throughput occurred in the TCP connections, but also a serious unfairness existed among TCP connections. This is caused by the hidden terminal problem, the exposed terminal problem, and the binary exponential backoff scheme of the IEEE 802.11. In Section 6 we will show results that confirm results obtained in [21,11]. 3. IEEE 802.16 mesh mode 3.1. General description of IEEE 802.16 Almost all the existing works about the IEEE 802.16 are on the PMP mode [10,6,20]. The main difference between PMP and Mesh mode is that in the PMP mode, traffic only occurs between the base station (BS) and subscriber stations (SSs), while in the Mesh mode, traffic can be relayed via other SSs, and also can occur directly between SSs. Comparing with the tree-based multi-hop network topology of 802.16 tree-based mobile multihop relay (MMR) [17,3], 802.16 mesh mode places more challenges on the link scheduling algorithms. In order to achieve efficient collision-free multi-hop data transmission, the Mesh mode defines three scheduling schemes, i.e., centralized, coordinated distributed, and uncoordinated distributed scheduling, to resolve wireless interference occurred in the 2-hop neighborhood of a node. Each frame in the IEEE 802.16 standard is divided into two parts: (i) a control sub-frame consisting of MSH_CTRL_LEN (0–15) transmission opportunities (XmtOps in the standard) and (ii) a TDM data sub-frame consisting of up to 256 minislots. All the XmtOps are in fixed length of 7 OFDM symbols (Ts). There are two types of control sub-frame, i.e., schedule control sub-frame and network control sub-frame. In the following we will describe details of the CDS. 3.2. Coordinated distributed scheduling (CDS) CDS scheme [13,14] is designed to achieve collision-free periodical transmissions for two types of control messages, i.e., MSH-NCFG and MSH-DSCH, respectively. Since the exact same algorithm is used independently for these two types of messages in separate XmtOps (transmission opportunities), we can simply analyze the behavior of one, and the result is applicable to the other. In this part, a general introduction of the IEEE 802.16 distributed scheduling behavior is given. In the 802.16 scheduling algorithm, the control messages and data packets are allocated in different time slots in a frame. The allocation of the data time slots is performed through the control message exchange so that there is no contention in the data time slots. In the distributed scheduling, a node selects its next transmission time in the current one. Because other nodes may also transmit in the selected time slot so that the node uses an election algorithm to compute whether it can win or not. The general concept of CDS is to let nodes running the scheduling algorithm independently derive pseudo-random but predictable 390 V. Loscrì / J. Parallel Distrib. Comput. 68 (2008) 387 – 397 behaviors by exchanging two-hop (or three-hop) neighborhood schedule information with each other. Both randomness and predictability are achieved by dynamically constructing random generator seeds for each node according to a common rule. The seed for a node is based on its unique node ID and the index (or timestamp) of a candidate XmtOp.Given the neighborhood information, the random number generated locally will be the same with the corresponding one generated at a neighboring node. In distributed scheduling, the scheduling information for each station is described by two parameters:  NextXmtXm :: 5 bits, XmtHoldoff Exponent :: 3 bits. Given these two parameters of a specific neighbor, a node can determine a bounded interval for NextXmtTime (the next slot in which a node will transmit) as well as the following: NextXmtXm ∗ 2XmtHoldoffExponent ≺ NextXmtTime (NextXmtXm + 1) ∗ 2XmtHoldoffExponent , (1) EarliestSubsequentXmtTime = NextXmtTime +2XmtHoldoffExponent+4 . (2) Since the exact scheduled XmtOp of the neighborhood is unknown, as implementation issue, one may define NextXmtTime to be the last XmtOp within the interval when calculating EarliestSubsequentXmtTime. The holdoff exponent value decides the channel contention time of node so it is an important parameter that can affect the system performance. In the mesh mode, every station calculates its NextXmtTime using the distributed election algorithm defined in the standard [14]. In this algorithm, one station sets the first transmission slot after the holdoff time as the temporary next transmission opportunity and then competes this slot with all the competing nodes in the two-hop neighborhood. At the previously scheduled XmtOp, a node (the local node, LN) will run an election algorithm to find its next collision-free XmtOp. Based on the calculated NextXmtTime time interval and EarliestSubsequentXmtTime, a node can exclude a subset of neighboring nodes. In this way the utilization of XmtOps is improved. The local node will increment the candidate XmtOp and running the same election algorithm until it wins the election. Based on the above description, we can see that the probability a node winning a contention is determined by the total number of competing nodes, and the total number of competing nodes is related with the number of neighbor nodes and their topologies and exponent value. So, in this algorithm the choice of the exponent value is crucial, but different results can be obtained for different network density and topology. Values of XmtHoldoffExponent and NextXmtXm can be optimal for a type of network with certain topology and density characteristics but they have to be changed when different topologies and densities are considered. In this way the CDS is not robust. 4. A new topology-free scheme: the DSS In this section we describe some potential enhancements to mesh deployment of 802.16 that are well within reach. The proposed advances should increase the average throughput and the robustness of the CDS scheme of 802.16. We do not modify the structure frame of the standard and do not add complexity, so the hardware of the standard must not be changed. 4.1. Details of the DSS The proposed scheme differs from the IEEE 802.16 CDS scheme in the selection of the new XmtOp. In fact, a node transmitting in the current XmtOp uses a random function instead of the hash function (the MeshElection function defined in the IEEE Std 802.16) to compute the next XmtOp. The frame structure is shown in Fig. 2. The DSS scheduling mechanism for LN is described in Fig. 3. In Fig. 3 random function randomly picks-up an available slot. A slot is available if the state in the next frame of the LN is Idle. The access is conflict-free because the LN uses the current XmtOp slot computed in a conflict-free fashion in the previous frame. Whether a node LN did not find an available XmtOp slot in the previous frame or lost this slot for some reasons as shown in Fig. 4 it will apply a redistribution function. This function is an Hash Function in which a node, which needs a XmtOp for the current frame, analyzes a set of available slots (that is, the state of the LN is Idle in this slot). The hash function will be applied to the onehop neighbors of the LN. In this way, all the neighbors that do not have a valid XmtOp slot in the current frame will apply the same function with the same information (slot number, neighbor ID and address of the node applying the function) and only one node will win the competition. The main advantage of the DSS mechanism is that no parameters must be set, and in this way the protocol is robust for different topologies and network scenarios. Each node considers a number of XmtOp (opportunities) that is 16 as well as in the IEEE 802.16 Std and this is the number of opportunities (in the control frame) to transmit updated schedule, send data slots reservation requests and reserve another XmtOp. Specifically, with constraints required by conflict-free TDMA transmissions, the activity of a node ni in a slot s can be classified into the following states: • TX: Transmits to a set of neighbors R: (state(s) = Transmit, target(s) = R). • RX: Receive from a neighbor nj : (state(s) = Recv, target(s) = nj ). If a node is not transmitting or receiving in this slot, it is in one of the following (passive) states: • Blocked from transmitting because at least one of its neighbors receives from another node, and none of its neighbors transmits: (state(s)Block_TX). • Blocked from receiving because at least one neighbor is transmitting to another node, and none of its neighbors receives: (state(s) = Block_RX). 391 V. Loscrì / J. Parallel Distrib. Comput. 68 (2008) 387 – 397 Control Round Data Round Control ReDistribution Round Control Round Re-allocation Phase Allocation Phase Redistribution Function …… … … . Information Frame 1 IS1 Next Ctrl Schedule (Random Function) …… ISL Information Frame M IS1 …… ISL Data Frame Allocation Fig. 2. Frame structure of distributed scheduling scheme (DSS). At the beginning of each control frame, a control re-distribution round is applied, it will be applied to the nodes that do not have a valid XmtOp in the current frame. The redistribution function considered in this work is the same Hash function considered in the IEEE Std. 802.16e. In the control round each node applies a random function to compute the next XmtOp and sends updated information in the current XmtOp. Data slots allocation takes place in the control round. Each node in its current XmtOp can send data slots reservation requests. LN: Is it the current XmtOp my XmtOp? NO YES LN is in a Passive State in the current XmtOp Random Function: LN selects an available next XmtOp for the next frame YSE Did LN find a new next NO YES XmtOp slot? Is LN in Receive State in the current XmtOp? LN receives updated scheduling from neighbours and loses LN uses the current XmtOp to the next XmtOp make data slots reservation YES computed in the current requests and to update frame neighboring nodes Redistribution Function: at the beginning of the next frame LN applies an Hash Function to the set of available slots. A slot is available if the current state in the frame of LN LN receives updated schedule from1-hop neighbor in Transmit State in the current XmtOp slot is Idle. Fig. 3. Flow chart of local node (LN) scheduling mechanism of DSS. 392 V. Loscrì / J. Parallel Distrib. Comput. 68 (2008) 387 – 397 Current Schedule Next Schedule S4 S7 S5 S11 4 23 5 4 S11 23 5 Fig. 4. Current schedule: node 4 is transmitting in the slot S4, node 23 is transmitting in the slot S7 and node 5 is transmitting in the slot S5. Node 4 reserves the slot S11, in the current schedule for the next schedule, as XmtOp. This reservation takes place in the slot S4. Node 4 transmits the updated schedule to its neighborhood. Node 23 is notified with the updated schedule. In the next slot, S5, node 5 reserves the same slot S11 (selected randomly). Node 5 will be notified that this slot is already reserved by another neighbor node (node 4) in the slot S7 by node 23. • Both blocked from transmitting because at least one neighbor is receiving, and blocked from receiving because at least another neighbor is transmitting: (state(s) = Block_TX_RX). • Experiencing a collision when it is supposed to receive from a neighbor (state(s) = Collision). • Idle, when none of its neighbors transmits or receives in this slot: (state(s) = Idle). Of course these states are mutually exclusive. The state of the slots in which a node transmits is called active state, state in which a node does not transmit is a passive state. The channel is partitioned in two sub-portions: a control round where the schedules are updated and data round where user data transmission takes place (Fig. 2). The state of the nodes in each slot is updated during the control round when each node in the current XmtOp computes the next XmtOp and sends the updated information to the neighbors. The data schedule will be updated at the beginning of each new frame; in this way different transmission requirement nodes can be accommodated. Two different informations are considered in the control round: (1) current information (or current schedule) and (2) next information (or next schedule). The current schedule is the actual schedule used by the node to transmit and to compute another NextXmtTime (in accordance with the IEEE 802.16 notation, that is the next XmtOp). The mechanism used to compute a new transmission time (NextXmtTime) will be the random function in DSS. After the random function is called and the NextXmtTime is computed a node updates its schedule and sends this (the updated schedule) to its neighborhood through the message (MSH-DSCH) where the request of a certain bandwidth is contained. In the mechanism described above, it can happen that a node, acquired a conflict-free broadcast slot, loses it because it will receive some other information from some neighbors after it reserved the slot. When this latter situation occurs, a node will contend for an unassigned slot at the beginning of the next frame (the state of the node in the slot must be Idle). A typical situation that may occur is described in Fig. 4 and a node (node 5, in the specific case) will be not able to use the XmtOp computed in the next frame. For this reason at the beginning of each frame, where the partial schedule is ready and all the nodes acquired information from the neighborhood, each node that does not have a XmtOp will run a redistribution function to try to use the control broadcast slots unused. In order to ensure that no two neighbor nodes grab the same slot, an hash function based on the ID of the nodes and a timestamp (slot) is used. Of course, the redistribution function will be applied only for the broadcast slots in which the node state is Idle. This new scheduling mechanism ensures that the schedules are conflict-free and a node has not to wait for any particular order to reserve a new broadcast control slot. 5. Delay bound computation The performance metrics of interest in the MAC layer include the throughput and delay. In the IEEE 802.16 mesh mode, the details of the data sub-frame reservation are left unstandardized and to be implemented by the vendors; and the control subframe is independent of the data sub-frame. In this section we develop an analytical delay model that gives a lower bound. The following analysis aims at providing an approximation of the end-to-end data transmission delay. For the analysis we make the following assumptions: • The wireless backbone network and the wireless access network operate on different channels. Therefore we assume that there is no interference between the data transmissions between the access points (APs) and the transmissions between the mobile nodes and the APs. • The APs are uniformly distributed. • All the APs have similar transmission capabilities. This assumption makes the analysis more tractable (and the same assumption is maintained in the simulation campaigns). • Time is slotted and synchronization is maintained by the APs (i.e., through the periodic transmission of beacon messages). • The medium access is performed in a conflict-free fashion through a TDMA protocol which operates in two different channels: a control channel and a data channel (this assumption is coherent with the CDS of the 802.16 and the DSS introduced in this paper). The control channel is characterized by the same number (16 control slots) of control slots used in the CDS scheme and the DSS introduced in this work. We assume that the TDMA protocol used for our analysis is optimal. To produce the optimal schedule (where optimality is measured in terms of bandwidth efficiency; i.e., we desire schedules with the minimum number of TDMA slots) is NP-complete [2,18,8]. With the term optimal we signify that the distribution of both the control and the data slots is realized in an optimal fashion, that is maximizing the assignment of the slots maintaining the conflict-free property of the schedules. The evaluation of the delay has been computed considering different components of the delay (propagation delay, transmission delay and queuing delay) and considering the delay introduced by the transmission of the packets between two APs (in a multi-hop environment). In order to conduct this analysis we assume that there is a total knowledge of the topology and some centralized coordinator is able to manage the distribution of slots in a TDMA fashion. In this way the distribution of the bandwidth resource is only constrained by the density of the network. V. Loscrì / J. Parallel Distrib. Comput. 68 (2008) 387 – 397 Table 1 Parameters used for the analytical model R r N′ N P PropSpeed Bandwidth Data packet dimension Queuing buffer dimension TTS (slot duration) TPS Tdata−frame Tctrl−frame Range of the network Transmission radius of an AP Number of 1 and 2 hop neighbors Number of nodes in the network Network density 3 × 108 m/s 1 Mb/s 64 bytes 50 pkts (in the simulations) 1.54 × 10−4 (s) 1.2264 × 10−2 (s) 9.8 × 10−3 (s) 2.464 × 10−3 (s) The end-to-end delay is computed considering the 1-hop transmission delay between APs. The parameters introduced in our evaluation are reported in Table 1. In order to consider a more accurate model all kinds of delays have been taken into account, as said: • Propagation delay: It has been computed as the ratio of the distance between two nodes (APs) and the propagation speed PropSpeed. As the distance between two nodes may vary between  (>0) (we assume two nodes are not exactly at the same location) and r (transmission radius of a node), the average inter-nodes distance da can be computed as follows:  √ r r2 − ε da = , that is da ≈ 2 , (1) 2 2 393 of our analysis it is not important the particular passive state associated with a node but it is only important whether a node grab a slot to transmit or not. A packet transmission is complete when two data slots are assigned, because each slot is 32 bytes and a data packet is 64 bytes. In the ideal case we assume do not have any overhead. In the simulation campaigns we take into account an overhead of 20 byte and the real dimension of a data packet is 84 bytes. We are assuming backlogged sources. Let p be the probability that a saturated AP transmits a packet in a frame (control − frame + data − frame). In an ideal TDMA paradigm this probability is related with the total number of neighbors (1 and 2-hop neighbors) and can be written as ⎧ NCS NDS ⎪ p= ′ if NCS < (N ′ − 1) ⎪ ⎪ ′ − 1) ⎪ N − 1 2(N ⎪ ⎪ ⎪ and NDS < 2(N ′ − 1), ⎪ ⎪ ⎪ ⎪ ⎪ ⎪ NDS ⎪ ⎪ if NCS(N ′ − 1) ⎪ ⎨ p = 2(N ′ − 1) (3) and NDS < 2(N ′ − 1), ⎪ ⎪ ⎪ ⎪ ⎪ NCS ⎪ ⎪ p= if NCS < (N ′ − 1) ⎪ ′ − 1) ⎪ (N ⎪ ⎪ ⎪ ⎪ and NDS 2(N ′ − 1), ⎪ ⎪ ⎪ ⎩ p=1 otherwise, where NCS is the number of control slots and NDS is the number of data slots. Let N1 be the number of 1-hop neighbors (it is the number of nodes in the coverage area of an AP). N1 can be expressed as N1 = r 2 where  is the network density and can be expressed as  = NR 2 . N ′ is the number of 2 (2) 1 and 2-hop neighbors and can be computed as N ′ = 4N Rr 2 . By considering the equilibrium state, each transition can be straightforwardly computed as follows: • Transmission delay: It is related with the number of control and data slots used. When the number of control and data slots is higher than the number of nodes in the network the delay is related to the duration of the frame and the duration of the slot, otherwise the transmission delay is related with the density of nodes in the network. • Queuing delay: It is related with the number of packets that have to be sent from an AP. ⎧ ′ P(PS)(PS) =(1−p)N ⎪ ⎪ ⎪ ⎨ P(PS)(TX) =1 if p=1, ⎪ ⎪ (Tdata−frame +Tctrl−frame ) ⎪  ⎩ (TTS ) otherwise, P(PS)(TX) =p (1−p)B(d) (4) delayprop da Distance . = = PropSpeed 3 × 108 (m/s) The computation of the delay between APs follows a similar approach as in [12]. As represented in Table 1 r is the radius of an AP (for simplicity we assumed all the APs have the same radius) and N the number of the APs uniformly distributed over an area of diameter k. The data transmission process involves two different schedules: the control and the data schedules. In the control schedule a node, with a certain probability p, acquires a control slot. This control slot is used to update the schedule, to send the updated schedule to the neighbors and to reserve data slots. Data slots are allocated in the control schedule. Two different states are associated with each node (in a simplified version): Passive (PS) state and a Transmitting (TX) state. In the PS state a node can be blocked to transmit in a certain slot because another neighbor is transmitting in the same slot or can be Idle or can be in a receiving state. To the scope where TTS is the duration of a slot, Tctrl−frame is the duration of the control frame and Tdata−frame is the duration of the data frame. For a given transmission, the area B(d) where nodes may potentially interfere with the transmitting node can be computed as (d is the inter-nodes distance) [6]: ⎞ ⎛  2 d d d ⎠ , (5) B(d) = r 2 − 2r 2 arccos ⎝ − 1− 2r 2r 2r ⎛ ⎜ delayAP−AP = ⎜ ⎝ 1− P(PS)(TX) (Tctrl−frame +Tdata−frame ) ⎞ P(PS)(TX) (Tctrl−frame +Tdata−frame ) +TPS ⎟ ⎟ ⎠ P(PS)(TX) (Tctrl−frame +Tdata−frame ) P(PS)(TX) (Tctrl−frame +Tdata−frame ) +TPS ∗ (Tctrl−frame + Tdata−frame ) , (6) 394 V. Loscrì / J. Parallel Distrib. Comput. 68 (2008) 387 – 397 where d is the same as da computed in (1). The delay can be derived as in (6). TPS is the time a node is in a passive state. Let us remember that a PS is the state in a generic slot in which a node is not transmitting, that is a node can be in receiving state, blocked to transmit, blocked to receive, blocked to transmit and receive, collision or idle. We are evaluating the end-to-end data transmission delay and for this reason the TPS is evaluated considering the average time a node spends in a passive state before to acquire the right to transmit in a data slot time. Let us assume that the distribution of the AP is uniform, the transmissions are scheduled in a round robin fashion and the transmissions are multi-hop transmissions, that means that each intermediate AP would have to transmit its traffic as well as the traffic of its children. With these assumptions, the average number of node ni at each hop level i can be expressed as  ir N ni = 2x dx, (7) R 2 (i−1)r  R Nr 2  2 2 k+1 R 2 k − (k − 1) (8) pk =   , Nr2 k 2 − (k − 1)2 R2 ni =  N 2 2 r 2. i − (i − 1) R2 (9) Let kmax be the maximum number of hops and pk the number of packets that an AP has to forward. Then, if we consider k < kmax , pk can be expressed as  kavg  2 2 k+1 k − (k − 1)   , pk = (10) k 2 − (k − 1)2 qk = pk ∗ delayAP−AP (11) delayTOT = qk + delayAP−AP + delayPROP , (12) kavg in (11) is the average number of hops that a packet has to traverse in order to be delivered to the destination. We evaluated the parameter kavg considering different scenarios generated with ns. It is interesting to observe that increasing the number of nodes in the network (considering the same dimension of the area), the parameter kavg decreases because higher is the number of nodes that link a source to the destination. Of course, when the number of nodes increases the possibility of conflicts in the network increases too and the latency to acquire a slot increases. So, the queuing delay qk can therefore be approximated by (11). The total average delay can be written as (12). 6. Performance results In this section results pertaining to the performance of an 802.16 system in a distributed mesh deployment are presented in comparison with the new totally DSS presented in Section 4 and the IEEE Std 802.11. Results about IEEE 802.11 are shown in order to confirm simulation results obtained in other works [21,11]. Furthermore, the analytical approach developed in Section 5 has been used to compute a delay lower bound. In the current MAC modules for ns-2 no 802.16 MAC module is available yet, so we implement a new MAC module for the IEEE 802.16 mesh mode. The module consists of the scheduling controller that handles the signalling channel contention and in the current transmission slot contends the next transmission time using the election mechanism defined in the standard based on the collected neighbors’ information. Another fundamental component of this module is the data channel that receives and transmits data packets in the allocated time slots. Identical XmtHoldoffExponent and NextXmtXm have been used for all scenarios as far as the IEEE 802.16 is concerned. Specifically, different simulation campaigns have been conducted with the same traffic load and the same topology and different XmtHoldoffExponent and NextXmtXm values and the better values, in terms of delay and throughput, have been selected. The parameters evaluated in this section are: • Throughput: is the percentage of delivered packets over the total packets sent in the networks. • Delay: intuitively, the delay of a packet in a network is the time it takes the packet to reach the destination after it leaves the source. We take into account queuing delay at the source because we consider multihop transmissions and a node can be involved in different simultaneous transmissions. Moreover, the delay has been computed considering the different components of the delays, that is propagation delay, transmission delay and queuing delay. • Unused slot: this parameter has been introduced as a kind of measure of the effectiveness of the scheduling scheme used. In fact, we will show how the CDS manages the bandwidth resources in a fashion the conflict-free property of the schedules created to be guaranteed, but a certain amount of slots in each frame is unassigned. In this way, the efficiency of the network decreases. In this paper, we evaluated performance of WMNs in treebased architectures. The node 1 works as a gateway and the others nodes work as APs. We simulated traffic of terminal users with varying traffic load among the APs. In all the plots 802.16 is the CDS of the IEEE 802.16, DSS developed in this work, 802_11 is the IEEE Std 802.11 and analytical scheme is the ideal, analytical scheme developed in Section 5. Comparisons of the CDS scheme, the DSS and the IEEE 802.11 are done in terms of average throughput and average end-toend data packets delay in different density network conditions, obtained considering a different number of nodes in the network. Specifically, we varied the number of nodes in a grid of 1000 × 1000, between 25 and 70. In order to estimate the system performance of 802.16 CDS, DSS and 802.11, results were obtained using a well-known simulator, the ns-2 [19]. Parameters used in the simulation campaigns are shown in Table 2. In Fig. 5 is shown the average throughput for different network densities (varying the number of nodes among 25, 30, 40, 50, 60 and 70 in the same area network). Concerning the 802.16 CDS we had to set the parameters, the better values of NextXmtTime and XmtHoldoffExponent in order to obtain the better throughput and the minimum delay. This represents a drawback of the CDS scheme, because by changing the network density and the topological characteristics of the network we need to set up the values of these parameters and for this reason we defined 395 V. Loscrì / J. Parallel Distrib. Comput. 68 (2008) 387 – 397 Table 2 Simulation parameters 802.16 DSS 30 40 Analytical Scheme 802_11 1.2 Input parameters Simulation area Traffic sources Number of nodes Sending rate Size of data packets Transmission range Simulation time Delay (sec.) 1 1000 × 1000 CBR 25, 30, 40, 50, 60, 70 4, 40, 400 packets/s 64 bytes 250 m 500 s 0.8 0.6 0.4 0.2 0 20 50 60 70 80 70 80 Nodes Number Mobility model Mobility model Pause time Mobility average speed Random way point 10 s Static network Simulator Simulator Medium access protocol Routing protocol Link bandwidth Confidence interval NS-2 (version 2.1b6a) 802.16 (CDS), DSS AODV 1 Mbps 95% Fig. 7. Average end-to-end data delay. P(PS)(TX) PPS Unused Control Slots (%) 802.16 DSS 30 25 20 15 10 5 0 20 30 40 50 60 Nodes Number TX PS Fig. 8. Percentage of control slots unassigned vs the number of nodes in the network. Fig. 5. Two states are associated with each node for a generic slot S. PS is the passive state and TX is the transmitting state. Throughput (%) 802.16 DSS 802_11 75 70 65 60 55 50 45 40 35 30 25 20 30 40 50 60 70 80 Nodes Number Fig. 6. Percentage of packets delivered over packets sent. our scheme topological-free scheme. In fact, in DSS we do not have to set any parameters to select the next XmtOp. In Fig. 6 we show the delivery ratio of data packets. As we expected [21,11], the performance of IEEE 802.11 MAC protocol is not satisfactory in a wireless multi-hop environment. Concerning the performance comparisons between the CDS of the IEEE Std 802.16 and the DSS, we can see how our scheme permits more data packets to be delivered to the destination. Above all with a higher density of the network (50, 60 and 70 nodes in the same area), our scheme delivers a higher percentage (10%) of data packets than the CDS. In order to understand why we obtain better results in terms of throughput (Fig. 6) and delay (Fig. 7), by using our scheme, we can observe the parameter in Fig. 8, unused control slots. This latter represents the degree of utilization of the control broadcast slots (opportunity to transmit XmtOp) in the network. In practice, with this parameter we tried to measure the capability, in both of the schemes, the XmtOp to be assigned. Of course, we assumed that each node tries to acquire a XmtOp in each frame but there is a higher number of unassigned slots in the CDS scheme. This is due to the mechanism used by the CDS scheme. In fact, it is based on a hash function, the MeshElection, that permits both randomness and predictability to be guaranteed but, on the other hand, this mechanism does not guarantee that each XmtOp in each frame will be assigned, that is, although some node require a XmtOp in a certain frame and there are some XmtOp “free”, available to be assigned, the XmtOp will be unassigned. Concerning scenarios where a smaller number of nodes in the network is considered (25, 30 and 40 nodes) we can see that the degree of under-utilization in both the schemes is higher, but this is due to the fact that not all the XmtOp have to be used. In fact, the number of neighbors (one and two-hop neighbors) in the networks is much smaller than the number of XmtOp(that are 16), in the simulated scenarios and in the analytical model (see Table 3). Considering that we can re-use some XmtOp, in this case the parameter does not reflect exactly the under-utilization in the network. The underutilization of the XmtOp is well reflected when the number of nodes in the network increases. In fact, considering 50, 60 and 70 the number of neighbors in the simulated scenarios is higher than the number of opportunity to transmit considered, so in this case in each frame each node tries, in average, to acquire a different XmtOp. Obviously, in this latter case is very important that for each frame we reduce the number of unassigned slots 396 V. Loscrì / J. Parallel Distrib. Comput. 68 (2008) 387 – 397 Table 3 Number of neighbors (1 and 2-hop) for different number of nodes in the network # Nodes in the network N ′ (Analytical) N ′ (Simulation) 25 30 40 50 60 70 6.25 7.5 10 12.5 15 17.5 8.2 7.6 11.3 17 20 22 and we realized this in our scheme. In fact, in our scheme, the degree of under-utilization is almost close to zero. On the contrary, in the CDS we have an under-utilization degree of 10% and 5% for 50, 60 and 70 nodes, respectively. This behavior is reflected in the throughput and delay plots. In fact, DSS works well also when the density of the network increases. Also in this case, the latency introduced is smaller than those introduced with the CDS scheme. Smaller latency also increases the reactivity of the network and decreases the average end-to-end delay. Remember that we show the under-utilization of the control slots in Fig. 8 and the delay of data packets in Fig. 7, but these two parameters are strictly related. In fact, a node (i.e., LN) that has to reserve data slots needs a XmtOp to make new reservations and to exchange updated schedules. When the latency of the scheme that manages the “distribution” of the XmtOp increases as in the case of the CDS scheme, LN will be able to reserve data slots in more time (with a more amount of delay) and performance of the network degrade. This is due to the fact that the network is much more reactive when we distribute in a more efficient fashion the XmtOp, that is, the under-utilization degree in the network concerning the broadcast control slots is smaller. Concerning the analytical scheme we show the delay of this in Fig. 7 and we based the estimation of the number 2 of neighbors on the formula N ′ = 4N Rr 2 , used in Section 5. Actually, an under-estimation is obtained in this way when the number of nodes in the network increases. In fact, as shown in Table 3, for 50, 60 and 70 nodes the number of neighbors is higher than the number of XmtOp used. We used these values and not the values obtained considering the simulation scenarios because the scope of the evaluation of the analytical delay was to establish a lower bound in terms of delay and how much the schemes that have been analyzed in this work are close to these analytical results. In this way for 50 and 60 nodes our evaluation does not take into account the interference area and the number of neighbors. In fact, the probability p a broadcast control slot to be acquired is 1 and the P(PS)(TX) that is the transition from a passive state (PS) to an active state (TX) is 1. In this way the delay is only related with the duration of the slot and the duration of the frame (control frame and data frame). The better distribution of control slots permits the latency of our scheme to be reduced in comparison of the latency introduced by the CDS. For this reason the average end-to-end data packets delay is smaller in our scheme, because the reactivity of the network is higher when the degree of under-utilization (of control slots in this case) is smaller. Moreover, we introduced more robustness in our scheme because the behavior of our scheme does not depend on the particular network conditions, as the density of the network or the topological characteristics of the network. 7. Conclusions CSMA/CA did not function well in a wireless multi-hop environment. The causes include the hidden terminal problem, exposed terminal problem and binary exponential backoff scheme, which results in transmission problems much worse in wireless multi-hop networks. The backhaul networking needs capacity, throughput, latency and reach guarantee. For this reason other MAC protocols have been proposed for wireless mesh networks (WMNs) and, specifically, we analyzed the coordinated distributed scheduling scheme (CDS) of the mesh deployment of the IEEE Std 802.16 for tree topologies. We tried to sketch some “drawback” of this scheme and we concluded that this scheme does not manage well the opportunities to transmit and introduces an excessive degree of under-utilization concerning the XmtOp (broadcast control slots). Related to these considerations we introduced a new scheme that permits the hardware characteristics of the Std 802.16 to be maintained and introduces a variation as far as the selection of a new XmtOp to be concerned. We show how the new distributed scheduling scheme (DSS) permits a better management of the broadcast control slots to be realized and this is translated in a smaller degree of under-utilization of XmtOp. This smaller under-utilization permits better performance in terms of throughput and end-to-end data packets delay to be realized and we avoid the inconvenience introduced by the CDS to have to set some parameters. In this way the scheme developed in this work is much more robust while changing the characteristics of the network as density or topology. References [1] I.F. Akyildiz, X. Wang, W. Wang, Wireless mesh networks: a survey, Computer Networks 47 (4) (2005) 445–487. [2] E. Arikan, Some complexity results about packet radio networks, IEEE Trans. Inform. Theory IT-30 (1984) 681–685. [3] M. Asa, D.T. Chen, N. Natarajan, Concepts for 802.16-based mobile multihop relay networking, document IEEE C802.16-05/15, 19 July 2005. [4] R. Bruno, M. Conti, E. Gregori, Mesh networks: commodity multihop ad hoc networks, IEEE Commun. Mag. 43 (3) (2005) 123–134. [5] A. Chandra, V. Gummalla, J.O. Limb, Wireless medium access control protocols, IEEE Commun. Surveys 3 (2) (2000) 2–15. [6] G. Chu, D. Wang, S. Mei, A QoS architecture for the MAC protocol of IEEE 802.16 BWA System, IEEE International Conference on Communications Circuits & System and West Sino Expositions 1 (2002) 435–439. [7] M. Clouquer, W.D. Grover, Availability analysis of span-restorable mesh networks, IEEE J. Selected Areas Commun. 20 (4) (2002) 810–821. [8] A. Ephremides, T. Truong, Scheduling broadcasts in multihop radio networks, IEEE Trans. Commun. 38 (1990) 456–460. [9] A. Fumagalli, I. Cerutti, M. Tacca, Optimal design of survivable mesh networks based on line switched WDM self-healing rings, IEEE/ACM Trans. Networking 11 (3) (2003) 501–512. V. Loscrì / J. Parallel Distrib. Comput. 68 (2008) 387 – 397 [10] C. Hoymann, M. Puttner, I. Forkel, The HIPERMAN standard—a performance analysis, IST SUMMIT 2003. [11] H.-Y. Hsieh, R. Sivakumar, IEEE 802.11 over Multi-hop Wireless Networks: Problems and new Perspectives, Proceedings of IEEE VTC 2002 Fall, September 2002. [12] IEEE 802.11 WG. Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specification Standard, IEEE. Aug. 1999. [13] IEEE Std 802.16a-2003, IEEE Standard for Local and metropolitan area networks—Part 16: Air Interface for Fixed Broadband Wireless Access Systems—Amendment 2: Medium Access Control Modifications and Additional Physical Layer Specifications for 2–11 GHz, 2003. [14] IEEE Std 802.16-2004 (Revision of IEEE Std 802.16-2001), IEEE Standard for Local and Metropolitan Area Networks Part 16: Air Interface for Fixed Broadband Wireless Access Systems, 2004. [15] H. Jiang, P. Wang, W. Zhuang, A distributed channel access scheme with guaranteed priority and enhanced fairness, IEEE Trans. Wireless Comm., to be published. [16] S.H. Jiang, W. Zhuang, X. Shen, A. Abdrabou, P. Wang, Differentiated services for wireless mesh backbone, IEEE Commun. Mag. 44 (7) (2006) 113–119. [17] M. Nohara, Ad hoc meeting report: mobile multihop relay networking in IEEE 802.16, document IEEE 802.16-05/51, 21 July 2005. [18] A. Sen, M. Huson, A new model for scheduling packet radio networks, in: Proceedings of INFOCOM, 1996. [19] UCB/LBNL/VINT Network Simulator—ns (Version 2) http:// www-mash.cs.berkeley.edu/ns/, 1998. 397 [20] K. Wongthavarawat, A. Ganz, IEEE 802.16 based last mile broadband wireless military networks with quality of service support, IEEE Milcom 2003, vol. 2, pp. 779–784. [21] S. Xu, T. Saadawi, Does the IEEE 802.11 MAC protocol work well in multihop wireless ad hoc networks? IEEE Commun. Mag. (2001) 130–137. [22] C. Zhu, M.S. Corson, A five-phase reservation protocol (FPRP) for mobile ad hoc networks, in: Proceedings of IEEE Conference on Computer Communications (INFOCOM), vol. 1, San Francisco, CA, USA, March 29–April 1998, pp. 322–331. [23] C. Zhu, M.S. Corson, An evolutionary-TDMA scheduling protocol (ETDMA) for mobile ad hoc networks, Technical Research Report, CSHCN TR 2001-17. Valeria Loscrì received his M.S. in computer science and Ph.D. degrees from University of Calabria, Italy in 2003 and 2006, respectively. Since early 2003, she has been with the telecommunications research group of the University of Calabria where she is fully involved in a number of projects concerning the multimedia wireless communications. She is currently research fellow at University of Calabria in the Department of Electrical and Information System (D.E.I.S.). Her research interests include quality of service and medium-access control, performance analysis, Ad hoc Networks, Wireless Sensors Networks and Wireless Mesh Networks.