Escolar Documentos
Profissional Documentos
Cultura Documentos
Abstract This paper first envisions the advent of the wireless distinct non-overlapping channel. By enabling multiple
mesh networks with multiple radios and directional antennas channels to carry network traffic simultaneously, this
in future. Then, based on the observation that simplicity trend essentially multiplies the available bandwidth for
induces efficiency and scalability, the paper proposes a joint network nodes.
geometric deployment and routing strategy for such mesh
networks, and also gives a concrete approach under this • Directional antennas: these antennas are used in the
strategy. The main idea of this strategy is to deploy mesh backhaul connections, enabling the nodes to
networks in certain kind of geometric graph, and then design communicate in a point-to-point fashion. Thus, the
a geometric routing protocol by exploiting the routing interference among links sharing identical channels is
properties of this graph. The proposed concrete approach basically eliminated. Note that, the directional antennas
comprises two parts: (1) a topology generation algorithm are still not perfect in eliminating interference, and the
based on Delaunay triangulations and (2) a geometric routing effects of interference between directional antennas are
protocol based on the greedy forwarding algorithm. Both discussed in [6, 7].
parts are characterized by simplicity and appealing properties,
with formal proofs provided when possible. The simulation Until now, not all WMN deployments have employed the
results validate our proposed approach. above two technologies, and only some of them did (e.g., [1,
3]). However, with the decreasing hardware cost, we
Index Terms directional antennas, Delaunay triangulations, envision that the WMNs in future will employ both.
geometric routing, network deployment, wireless mesh networks Accordingly, in this paper, we focus on such WMNs with
multiple radios/channels and directional antennas, and refer
I. INTRODUCTION to them as Directional WMNs (DWMNs). For a DWMN, if
Wireless mesh networks (WMNs) typically consist of a we depict its nodes on a (x, y) coordinates system and draw
set of mesh routers that communicate with each other via a straight line for each point-to-point communication link
wireless links and form a mesh topology [1, 2, 3, 4, 5]. The among the nodes, we will get a geometric graph (see Figure
basic functionalities of these mesh routers are (1) providing 1).
the backhaul connection for Wireless LANs (WLANs) and
(2) routing the traffic in the backhaul. These mesh routers
may also have additional functionalities, based on which
they can be classified into the following three categories:
• gateways: also interface with the Internet.
• APs: also serve as Access Points (APs) for WLANs.
• pure mesh routers: only have the aforementioned basic
functionalities.
In this paper, we solely focus on the basic functionalities of
these mesh routers, aiming to improve their performance in
the backhaul. For brevity, we also refer to these mesh
routers as “nodes” hereafter.
According to [1, 2, 3, 4, 5], the recent years saw the
following two new technologies for the WMNs:
• Multiple radios and multiple channels: each node is Figure 1. Modeling a DWMN with a geometric graph
equipped with multiple radios, each of which uses a Based on the above model, we propose a geometric
scheme for the DWMNs, which advocates that the position
———————————————— information (i.e., the (x, y) coordinates) of the nodes will
• The authors are with the Centre for Distributed & High Performance play a major role in the deployment and routing of the
Computing, School of Information Technologies, University of Sydney, DWMNs. The motivation for proposing this scheme is to
NSW 2006, Australia.
• Email: weisheng@it.usyd.edu.au, albert.zomaya@sydney.edu.au,
perform what can be planned in advance to simplify the
and drskennedy@acm.org operation of WMNs, thus achieving efficiency and
scalability. In retrospect, an important lesson from Internet
Manuscript received (insert date of submission if desired). Please note that all deployment is the Simplicity Principle [8], which states that
acknowledgments should be placed at the end of the paper, before the bibliography. ‘complexity is the primary aspect which impedes efficient
scaling, and is the primary driver of increases in both capital the desirable routing properties of the complete DTs and (2)
expenditure and operational expenditure for the network being feasible for the WMN deployment and (3) having a
carriers’. low computation complexity. Note that though the PDT
generation algorithm is the same as that presented in our
For this geometric scheme, we propose a joint geometric previous work [14], in this paper we prove a theorem stating
deployment and routing strategy, and also give a concrete its low computation complexity and conduct more
approach to validate this strategy. The idea of this strategy is evaluations on its performance.
to deploy the DWMNs with certain kind of geometric graph
as the network topology, and then design a geometric The LBGF protocol extends the well-known greedy
routing protocol by exploiting this graph’s routing forwarding algorithm [10] by allowing the delivery of a
properties. The justifications for this strategy are as follows: packet farther from the destination in limited number of
times. Moreover, it proactively detects two kinds of loops to
• Feasibility: the (x, y) coordinates of mesh routers can be reduce the packet drop ratio. Compared with other
obtained by the GPS devices, and are accurate enough geometric routing protocols, LBGF achieves more
for use in a city area. Recall that the Internet uses the simplicity by discarding the mechanism of face routing [15],
prefix of IP addresses to perform routing; however, since which are exploited by most other geometric protocols to
the Internet turns out to be deployed haphazardly, the recover from local failure when the greedy forwarding does
prefix of IP addresses cannot reflect the actual locations not work. In addition, LBGF provably causes no loops even
of subnetworks or computers. However, the (x, y) under the network dynamics and non-planar network
coordinates of mesh routers can achieve this purpose. topologies, while the geometric routing protocols with the
• Locality: geometric routing protocols are localized [9] face routing mechanism cannot achieve this. We note here
protocols in that the routing decision is solely based on a that LBGF is a significant modification to the Backward-
constant amount of information stored in the packets and Enabled Greedy Forwarding protocol presented in our
the positions of the current forwarding node, its previous work [14], which incurs a larger packet drop ratio.
neighbors and the destination. Thus, geometric routing To the best of our knowledge, we are the first to
protocols are inherently efficient and scalable. advocate such a combined geometric deployment and
• Ease of maintenance: the localized property also routing strategy for WMNs. We show by extensive
significantly eases the maintenance of WMNs, since the simulations that:
reconfiguration to one part of the network does not need • The PDT Generation algorithm can generate topologies
to be notified to the other parts. that not only enable LBGF to find paths very close to the
• Fixedness: with the nodes in WMNs not mobile, the actual shortest paths, but also reduce the installation cost
periodical exchange of position information among them for deployers.
is no longer needed. In contrast, such exchanging • The LBGF protocol can scale to a large number of
overhead is significant for the mobile wireless networks nodes. Moreover, it performs well in terms of packet
[10, 11]. drop ratio and path qualities.
• Directionality: with the interference among backhaul The rest of this paper is organized as follows. Section 2
links eliminated by the directional antennas, the metrics reviews related work and distinguishes our work from
related to positions become practical for making routing others. Section 3 introduces the theoretical background for
decisions. Otherwise, the interference-aware routing our concrete approach. Section 4 presents the PDT
metrics (e.g., WCETT in [12] and MGF in [13]) are generation algorithm and its evaluation. Section 5 presents
more reasonable. the LBGF protocol and its evaluation. Finally, section 6
• Dynamics: though the nodes in WMNs are not mobile, concludes this paper and discusses the future work.
there exist significant network dynamics such as link II. RELATED WORK
failure and congestion, making the static routing
protocols unsuitable. However, since the geometric As our work covers two areas, node deployment and
routing protocols basically rely on the one-hop neighbor geometric routing, the related work in these two areas is
information that can be updated quickly, they are well discussed respectively in this section. Generally speaking,
suited for dynamic networks. our work has its uniqueness in both areas.
To validate this strategy, we present a concrete approach A. Node deployment
that consists of the following two parts dealing with The node deployment issue exists in the context of
deployment and routing respectively: the Pruned Delaunay WMNs, wireless sensor networks (WSNs), and cellular
Triangulation (PDT) generation algorithm and the Limited mobile networks. Generally, the node deployment solutions
Backward Greedy Forwarding (LBGF) protocol. aim at optimizing different criteria for these three types of
The PDT generation algorithm uses Delaunay networks.
triangulations (DT, see Section 3 for its definition and Since WMNs just emerged in the recent years and the
routing properties) as the basis to generate the network deployment issue has not received enough attention from the
topologies. Basically, it produces first refined and then academic community, we only discovered one study [16]
pruned DTs. The PDTs have the advantages of (1) retaining that investigates the impact of several factors such as the
Authorized licensed use limited to: Dayananda Sagar College of Engineering. Downloaded on August 17,2010 at 06:26:18 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication.
IEEE TRANSACTIONS ON COMPUTERS
number of radios and backhaul connectivity on the exchanging control messages among the nodes, which
deployment of WMNs. As a simulated study on network incurs significant overhead.
performance, this work is based on extensive Monte Carlo
simulations, which reveal several practical guidelines on the Finally, in routing a packet to the destination, if the
WMN deployment. processing node does not have a neighbor closer to the
destination than itself, face routing is used to overcome this
For WSNs, the study on deployment mainly considers communication void phenomenon and to guarantee the
the criteria of coverage area, connectivity, and installation packet delivery [15]. Though face routing can not generate
cost [17, 18, 19]. It is worth noting that in WSNs, coverage loops in static networks, it can do so in dynamic networks.
area and connectivity are generally optimized instead of
routing, since the WSNs are more concerned with gathering For example, face routing will fall in a loop in the
data or detecting events. A similar work to our PDT dynamic network scenario depicted in Figure 2, where the
generation algorithm is the Adaptive Triangular Deployment source s has a packet P destined for t, and the link ac is
algorithm (ATRI) [19], which also exploits the Delaunay temporarily broken. We assume that a combined greedy-
triangulations to conduct deployment. The difference is that face routing algorithm is used here. In the beginning, s will
the ATRI algorithm is designed to maximize the coverage send P to u according to the greedy forwarding algorithm.
area and minimize the coverage gaps, while our PDT At u, since no neighbor is closer to t than u, u will start the
generation algorithm is designed to preserve the routing face routing process. Without loss of generality, here we
property of the complete DTs and save the installation cost. assume that u uses the left-hand rule to forward P. Thus, P
will traverse nodes a, b, c sequentially. When P arrives at c,
For cellular mobile networks, the study on the suppose the link ac becomes available. In this new topology,
deployment of base stations (BS) is called cellular BS P will be trapped in the loop bcab, since in a face routing
planning, which is a major research topic in this area. For algorithm, loops are detected by remembering the first edge
cellular BS planning, the main criteria to consider include of the current face being traversed [9]. In this example, the
coverage area, traffic distribution, signal quality, and face routing algorithm will remember the edge ua, so it will
installation cost [20, 21]. Note that, routing is not considered not be able to discover the loop bcab.
here, since routing is basically done at the mobile switching
centers instead of BSs in cellular networks. The current BS a
planning approaches generally use the hexagonal
deployment strategy. c u
Authorized licensed use limited to: Dayananda Sagar College of Engineering. Downloaded on August 17,2010 at 06:26:18 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication.
IEEE TRANSACTIONS ON COMPUTERS
Authorized licensed use limited to: Dayananda Sagar College of Engineering. Downloaded on August 17,2010 at 06:26:18 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication.
IEEE TRANSACTIONS ON COMPUTERS
Authorized licensed use limited to: Dayananda Sagar College of Engineering. Downloaded on August 17,2010 at 06:26:18 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication.
IEEE TRANSACTIONS ON COMPUTERS
1. // Initialization
graph T = DTR;
v = an arbitrary node on the boundary of T;
2. // Traversing each node on the boundary of T clockwise
do {
// examining triangles at node v
for (each triangle with v as a vertex) {
// to keep the triangulation structure during the
// examination, only mark for deletion here
if (it is a bad triangle)
mark the edge opposite to the right or
obtuse angle (also the longest edge in it)
for deletion;
}
T = T – those marked edges;
Figure 6. The DTR without new nodes added on the boundary // advance v in clockwise order
v = next node on the boundary of T ;
}
until (no bad triangles are found on a boundary node)
3. Output T as the final PDT;
Authorized licensed use limited to: Dayananda Sagar College of Engineering. Downloaded on August 17,2010 at 06:26:18 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication.
IEEE TRANSACTIONS ON COMPUTERS
divided by πd 2
min
. In light of this, the parameter dmin is
critical in determining the upper bound of N. In our
evaluations below, we use dmin =50m (we believe this
minimum distance can be realized by the deployers), and
our experiments show that our algorithm at most adds n new
nodes to the network topology. Therefore, the PDT
generation algorithm actually has a time complexity of
O(nÂlog(n)) in our settings.
C. Algorithm evaluation
This subsection first describes the experiment setup, and
then gives experimental results on the following four
metrics: the ratio of added pure mesh routers, the ratio of
pruned edges, the link deviation ratio and Euclidean
deviation ratio of the PDTs. The first two metrics reflect the
Figure 9. The proof of backward-free property installation cost for using the PDTs as the network
Since the deletion of edge xz only affects the topologies, and the last two metrics reflect the path quality
neighborhood of x and z, to prove the graph remains of PDTs.
backward-free only requires to prove that for both x and z
1) Experiment setup
(without loss of generality, we prove it for x here), given any
The given AP nodes are assumed to be randomly
destination t, there exists a neighbor v satisfying d(v, t) < d(x,
distributed in a square area with a constant density, and this
t). As shown in Figure 9, lb, lxy, and lyz divide the half plane
density is set to 10 nodes/km2. For instance, if the number of
where t resides into three areas: I, II, and III. Suppose t is in
nodes is 20, the side length of the square area is
I, which completely lies in the left side of the bisector lxz, so
approximately 1414m. Since a DT exists for any set of
we have d(x, t) < d(z, t). Moreover, z is the only neighbor
points on a plane [23], our PDT generation algorithm works
that x loses when xz is deleted, so x must have another
for any kind of distribution of AP nodes, and we only use
neighbor v, such that d(v, t) < d(x, t). Suppose t is in area II
the random distribution here to conduct experiments. Our
or III, which completely lies above the bisector lxy, so we
PDT generation algorithm is implemented by modifying the
have d(y, t) < d(x, t), thus y is the nearer neighbor of x to t.
aforementioned software Triangle. With this
And similar proof can be done for node z.
implementation, experiments are conducted on network
Theorem 2: The PDT generation algorithm has a time sizes of 50, 100, 200, 400, 600, 800, and 1000 given AP
complexity of O(nÂlog(n)) + O(N), where n is the number of nodes respectively. For each network size, 200 random
given AP nodes and N the total number of nodes at the end topologies are generated and the average result of them is
of the algorithm. obtained.
Proof: The time complexity of the PDT generation 2) The ratio of added pure mesh routers
algorithm is the sum of the time complexities of its three The ratio of added pure mesh routers for a topology
stages. For stage 1, according to [23], the construction of DT equals the number of added pure mesh routers divided by
costs O(nÂlog(n)), where n is the number of the given AP the total number of nodes after the topology generation.
nodes. For stage 2, according to [30, 31], the refinement Figure 10 plots the average ratio of 200 topologies for each
algorithm costs O(N), where N is the total number of nodes experimented network size. From this figure, we see that (1)
after the refinement. For stage 3, according to our pruning this ratio increases with the growth of the network size, and
algorithm described in Figure 8, it at most processes all the the increasing slope levels out gradually; and (2) this ratio is
triangles in the DTR, so it costs O(NT), where NT is the less than 0.5 for all plotted network sizes. Thus, we can infer
number of triangles in the DTR. Since the number of that the number of added pure mesh routers is below half the
triangles has a linear relationship with the number of nodes number of all mesh routers, and tends to increase linearly in
in a triangulation [23], the stage 3 also costs O(N). relation to the network size.
Combining the costs of the three stages, the total time
complexity of the PDT generation algorithm equals 0.48
0.46
Authorized licensed use limited to: Dayananda Sagar College of Engineering. Downloaded on August 17,2010 at 06:26:18 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication.
IEEE TRANSACTIONS ON COMPUTERS
Figure 10. The ratio of added pure mesh routers GF tend to deviate more from the shortest paths when the
network size grows; (2) PDT improves the link deviation
ratio significantly over DTAP; and (3) for PDTs, the link
3) The ratio of pruned edges deviation ratio remains below 1.1 for all experimented
The ratio of pruned edges for a topology equals the network sizes. Thus, it can be seen that the PDTs provide
number of pruned edges divided by the total number of very high path quality in terms of number of links.
edges after the topology generation. Figure 11 plots the
average ratio of pruned edges of 200 topologies for each 1.3
experimented network size. From this figure, we see that (1) DT_AP PDT
PDTs; and (2) this ratio is quite small (below 0.1) for all 1.15
plotted network sizes. 1.1
1.05
0.1
0.09 1
Ratio of pruned edges
0.08 0 100 200 300 400 500 600 700 800 900 1000
0.07
0.06 Number of give n AP nodes
0.05
0.04 Figure 12. The link deviation ratios for DTAP and PDT
0.03
0.02
0.01
5) The Euclidean deviation ratio of PDTs
0 For the definition of Euclidean deviation ratio, please
0 100 200 300 400 500 600 700 800 900 1000 see the previous subsection. Figure 13 plots the average
Number of given AP nodes
Euclidean deviation ratio of 200 topologies for each
experimented network size. Also for the comparison
Figure 11. The ratio of pruned edges purpose, the deviation ratios for both DTAP and PDT are
According to the formula ‘e = 3n – 3 – k’ mentioned in plotted. From this figure, we see that (1) the Euclidean
Section 3, the total number of edges in a PDT is less than 3 deviation ratio is lower than its link counterpart, because the
times the total number of nodes. Since Figure 11 shows that structure of DTs is more helpful for finding short paths in
the edge pruning does not reduce the number of edges the Euclidean metric than the link metric; (2) for the
significantly, the installation cost of network links remains a Euclidean deviation ratio, PDT also improves significantly
linear relationship with the network nodes. Though the over DTAP; and (3) for PDTs, this deviation ratio remains
pruning of the edges does not help significantly in saving the below 1.05 for all plotted network sizes. Thus, it can be seen
installation cost, it does remove the bad angles and links, that the PDTs also provide very high path quality in terms of
thus making the PDTs feasible for deployment. Euclidean distance.
Authorized licensed use limited to: Dayananda Sagar College of Engineering. Downloaded on August 17,2010 at 06:26:18 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication.
IEEE TRANSACTIONS ON COMPUTERS
not send packets to this link. Thus, both kinds of network Exploiting these three fields in the packet header as well
dynamics can be monitored locally by nodes, without the as the neighbor lists at nodes, the LBGF protocol is detailed
overhead of exchanging control packets in the network- in Figure 15, where the processing node is denoted u, the
layer. Finally, with the presence of network dynamics, the packet being processed P, P’s destination node t. For
underlying network topology may not be backward-free. To explanation, comments are also inserted in Figure 15.
address this issue, LBGF allows backward a packet to
reduce the packet drop ratio. For loop prevention, LBGF 1. // search the neighbor list
imposes a limit to the number of times that a packet can be u looks for a neighbor v with the shortest d(v, t) that
backwarded (denoted by BW_LIMIT hereafter). Later, we satisfies:
will prove that this technique guarantees no routing loops. (1) link uv is up;
(2) packet buffer of link uv is not full;
Besides guaranteeing no loops by imposing the // the two-hop loop detection:
BW_LIMIT, LBGF also detects the following two kinds of (3) if (u is not a dangling node)
loops to break them proactively. v is not the neighbor that just sent P to u ;
// the backward-then-forward loop detection:
• two-hop loops: the loops between two neighboring nodes. (4) v cannot be the node recorded in BH;
• backward-then-forward loops: the loops that consist of a 2. // all neighbors are not available
if (v is not found) {
series of consecutive transmissions in backward mode
u drops P;
and then a series of consecutive transmissions in forward return;
modes. Figure 14 gives two examples of such backward- }
then-forward loops with node t as the destination. 3. // when v is closer to t than u
if (d(v, t) < d(u, t)) {
b c u puts 0 to the msb of BN;
u forwards P to v;
c a t d b a t return;
}
4. // check whether the BW_LIMIT is exceeded
d e if ( BN in P < BW_LIMIT ) {
(1) Loop abcda (2) Loop abcdeba // the previous transmission mode is forward?
if ( the msb of BN == 0 ) {
u puts its node ID into BH;
Figure 14. Two examples of the backward-then-forward loops
u puts 1 to the msb of BN;
We believe these two kinds of loops are the most }
common loops that occur in our network settings. By u increases BN by 1;
breaking these two kinds of loops, the packet drop ratio shall u forwards P to v;
be significantly reduced, which is verified in our simulations. return;
}
B. Protocol description 5. // BN in P >= BW_LIMIT
Required by LBGF, the following three fields are added u drops P;
to a packet’s network-layer header:
• Dst Coords: the (x, y) coordinates of the destination
node. Figure 15. The LBGF protocol
• Backward Number (BN): the number of times that this As seen from Figure 15, to break the two-hop loops, a
packet has been backwarded. Moreover, we use the node u is prohibited from returning P to its predecessor (i.e.,
most significant bit (msb) of BN to indicate the u’s neighbor that sent P to u in the last step), unless u is a
transmission mode of a packet, with ‘0’ indicating the dangling node. Here a dangling node is defined as a node
forward mode and ‘1’ the backward mode. When that only has one neighbor, excluding those neighbors
creating a packet, the msb of BN is initialized to ‘0’. connected by broken or congested links. Note that, the
• Backward Head (BH): for each series of consecutive reason for permitting a dangling node to return P to its
backward transmissions, this field records the first node predecessor is to enable P to come out of the dangling node
that starts this backward series. For comparison purpose, situation. And to break the backward-then-forward loops, a
node u is prohibited from sending P to the node recorded in
when creating a packet, the BH field is initialized to a
BH. Since a BH node will definitely appear in a backward-
non-existing value. then-forward loop, avoiding sending P to the BH node again
Note that, LBGF uses less number of fields in the packet breaks this kind of loops.
header than the combined greedy-face routing mechanism,
which has several variants. All these variants typically need To exemplify the LBGF protocol, we next give two
the following five fields in their packet header: the network scenarios involving two-hop loop and backward-
destination coordinates, the forwarding mode, the node then-forward loop respectively. For the two-hop loop, in
where the greedy forwarding fails, the first edge of the Figure 16, the source s has a packet P to transmit to the
current face being traversed, and the nearest node or point destination t, and node a constitutes a dangling node. In this
on an edge ever reached toward the destination [9, 10]. scenario, P will be sent to b and then a. Since a is a dangling
Authorized licensed use limited to: Dayananda Sagar College of Engineering. Downloaded on August 17,2010 at 06:26:18 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication.
IEEE TRANSACTIONS ON COMPUTERS
node, it is allowed to return P to b. Not a dangling node, b is After this final backward transmission, all transmissions of
prohibited to send P to a, thus has to send P to s. Similarly, s P will be forward transmission, thus P will reach the
will send P to c. Finally, P will follow the path cdet to reach destination or get dropped in light of the same argument in
t, thus overcoming the two-hop loop and the dangling node the previous paragraph.
situation. Note that, his proof reveals the following facts about the
s b a loop-free property of LBGF:
• It does not require the network topology to be backward-
c t free. Hence, the purpose for PDTs to be backward-free is
not to guarantee the loop-free property of LBGF, but to
reduce the length of the routing paths and the packet
d e drop ratio.
Figure 16. An example scenario for the two-hop loop with a • It holds for arbitrary network topologies, not necessarily
dangling node planar ones as in the face routing.
For the backward-then-forward loop scenario depicted by
• It holds under the conditions of link failures or
Figure 17, the source s also has a packet P to transmit to the
congestions.
destination t. Initially, s will send P to node a, set the
transmission mode to backward, and record itself in BH of P. Theorem 4: For any network topology with its maximum
Since a is prohibited from sending P back to s, a will send P node degree bounded by a constant, LBGF runs with O(1)
to b. Then, P will follow the path bcda to reach a again, with complexity in both time and space at a node.
the transmission mode now changed to forward. Since s is
recorded in BH of P, a is not allowed to send P to s. Thus, a Proof: For the time complexity, the only non-trivial
will send P to b, set the transmission mode to backward, and computation in LBGF is one search of the neighbor list. If
record itself in BH of P. Afterwards, the packet will follow the maximum node degree is bounded by a constant, this
the path bcd to reach d. At d, since a is recorded in BH of P, search can be completed in O(1) time.
d cannot send P to a. Instead, d will send P to e, thus For the space complexity, a node needs to store its
breaking the two backward-then-forward loops sabcdas and neighbor list in the memory, which costs O(1) space due to
abcda. the bounded maximum node degree. Moreover, a packet,
which also costs a node’s memory, only carries three fields
b in its header for LBGF. Since both types of space costs are
constant, LBGF consumes O(1) space at a node. ͚
c a s t Note that, this theorem certainly holds when the network
topologies are PDTs, in which the maximum node degree is
f bounded by 12 due to min = 30°.
d e
C. Protocol evaluation
Figure 17. An example scenario for the backward-then-
We implement the LBGF protocol in ns-2 [32], into
forward loop which two parts of codes are added: a routing module that
realizes the steps in Figure 15 and a link object that
We next prove the following two theorems regarding the simulates the point-to-point wireless links. Besides, to
loop-free property and the complexity of LBGF simulate these point-to-point links, the WirelessChannel
respectively. These two proofs also give some insights to object in ns-2 is modified, so that it only delivers the
this protocol. wireless signal to the two neighboring nodes in a point-to-
point link. To compare with other works, we implement
Theorem 3: For any network topology, LBGF is loop-free another well-known geometric routing protocol called
in that it either delivers a packet P to the destination t or GOAFR [33] under ns-2. GOAFR claims itself to be worst-
drops P. case optimal and average-case efficient in terms of path
qualities. Also, a theoretical work [9] shows that GOAFR
Proof: This proof is done in two cases. First, suppose P is guarantees delivery under arbitrary static network topologies,
never backwarded. Then in each transmission, P gets closer while other well-known geometric routing protocols such as
to the destination, thus each node visited is different from GOAFR+ [34] and GPVFR [35] cannot.
all the previously-visited ones. Since there are finite
number of nodes in the network, P will definitely reach the Using the network topologies produced by our PDT
destination in finite transmission steps or get dropped due generation algorithm, we conduct experiments on LBGF and
to no available neighbors. GOAFR with network sizes of 100, 200, 400, 600, 800, and
1000 nodes. To simulate the dynamic networks, the
Second, suppose P is ever backwarded. Because the
Exponential Model included in ns-2 is used to generate link
number of backward transmissions is bounded, and also
failures. In this model, the up time and down time for a link
because the number of consecutive forward transmissions are exponentially distributed, and their means can be set by
between any two backward transmissions cannot be infinite the command-line arguments up-interval and down-interval
as revealed in the previous paragraph, after finite respectively. Using this model, experiments are conducted
transmission steps, P will be backwarded for the last time. on the following three scenarios for each network size:
10
Authorized licensed use limited to: Dayananda Sagar College of Engineering. Downloaded on August 17,2010 at 06:26:18 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication.
IEEE TRANSACTIONS ON COMPUTERS
11
Authorized licensed use limited to: Dayananda Sagar College of Engineering. Downloaded on August 17,2010 at 06:26:18 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication.
IEEE TRANSACTIONS ON COMPUTERS
shows that both ratios have very large values, so our loop the network size is large; and (2) LBGF achieves low link
detection techniques are very effective. deviation ratios, especially in the Static scenario, which
indicates that LBGF performs well in finding paths with
Table I. The two loop detection ratios with respect to the
short lengths; and (2) LBGF performs slightly better than
number of packets dropped
GOAFR.
R_TwoHop R_BthenF
LBGF0 GOAFR0
N100 56.7 26.0 LBGF1 GOAFR1
1.6
1.2
1.1
3) Packet drop ratio
1
Packet drop ratio is defined as the total number of packets
0 100 200 300 400 500 600 700 800 900 1000
dropped by all nodes versus the total number of packets
Number of mesh routers
generated by all nodes during an experiment. Figure 20 plots
our experimental results on it, showing that (1) both LBGF
and GOAFR exhibit very low packet drop ratios (less than Figure 21. Average link deviation ratios
0.017 even under Dyn2) and (2) in the Static scenario, where
the only network dynamics is network congestion, both 5) Average Euclidean deviation ratios
protocols achieve a drop ratio of nearly zero, and (3) in the Figure 22 plots the average Euclidean deviation ratios of
scenarios Dyn1 and Dyn2, LBGF outperforms GOAFR 200 experiments for both protocols in all the three scenarios.
considerably. In addition to what are already reflected in Figure 21, this
figure mainly shows that for both protocols in all the three
LBGF0 GOAFR0 scenarios, the Euclidean deviation ratio has a smaller range
0.018
LBGF1 GOAFR1 than its hop counterpart, which is because the structure of
0.016
LBGF2 GOAFR2 DTs is more helpful for finding short paths in the Euclidean
metric than the link metric.
Packet drop ratio
0.014
0.012
0.01
0.008 LBGF0 GOAFR0
0.006 LBGF1 GOAFR1
0.004 LBGF2 GOAFR2
Avg Euclidean deviation ratios
0.002 1.2
0 1.18
0 100 200 300 400 500 600 700 800 900 1000
1.16
Number of mesh routers
1.14
1.12
Figure 20. Packet drop ratios 1.1
Note that, the drop ratio of LBGF decreases with the 1.08
growth of the network size. This reflects that a larger 1.06
BW_LIMIT (set to 1.5 ⋅ n ) tends to offer a packet more 0 100 200 300 400 500 600 700 800 900 1000
Number of mesh routers
chance to reach the destination, despite that the path
traversed by a packet becomes longer. On the contrary, the
drop ratio of GOAFR increases with the growth of the Figure 22. Average Euclidean deviation ratios
network size. This is because GOAFR drops a packet when
(1) the packet encounters again the first edge that it traverses VI. CONCLUSION
on the current face such that a loop is discovered or (2) the In this paper, we first foresee the advent of the DWMNs
packet falls into a loop that cannot be discovered by the face with multiple radios and directional antennas in future. Then,
routing mechanism but the TTL (set to 128) is exceeded. based on the observation that simplicity brings the efficiency
And when the path traversed by a packet is longer, the and scalability, we propose a joint geometric deployment
packet has a larger chance to fall into a loop. and routing strategy, and then give a concrete approach
4) Average link deviation ratios under this strategy for the DWMNs. The proposed concrete
Figure 21 plots the average link deviation ratios of 200 approach has the following two parts: the PDT generation
experiments for both protocols in all the three scenarios. It algorithm and the LBGF routing protocol. We prove
shows that: (1) for both protocols in all the three scenarios, theoretically or show empirically the following merits of
the link deviation ratios increase with the growth of network these two parts.
size, reflecting that the paths found by the geometric routing • The PDT generation algorithm (1) has a low time
protocols are more likely to deviate from the optimal when complexity of O(nÂlog(n)), where n is the number of AP
12
Authorized licensed use limited to: Dayananda Sagar College of Engineering. Downloaded on August 17,2010 at 06:26:18 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication.
IEEE TRANSACTIONS ON COMPUTERS
nodes in the network, and (2) guarantees that the experience with an outdoors testbed," in International
generated PDTs are backward-free, and (3) incurs low Symposium on Modeling and Optimization in Mobile, Ad
installation cost for the deployers. Hoc, and Wireless Networks and Workshops (WiOPT) 2008,
pp. 24-29.
• The LBGF protocol (1) has a constant complexity in [7] T. Ireland, A. Nyzio, M. Zink, and J. Kurose, "The Impact of
both time and space at nodes, (2) guarantees that the Directional Antenna Orientation, Spacing, and Channel
route of a packet is loop-free, (3) incurs a low packet Separation on Long-distance Multi-hop 802.11g Networks: A
drop ratio, and (4) finds high quality paths with both low Measurement Study," in International Symposium on
link deviation ratio and low Euclidean deviation ratios. Modeling and Optimization in Mobile, Ad Hoc and Wireless
Networks and Workshops (WiOpt), 2007, pp. 1-6.
Being the first to propose the geometric deployment and [8] R. Bush and D. Meyer. (2002, Some Internet Architectural
routing strategy for WMNs, we believe many problems Guidelines and Philosophy. RFC 3439, Informational.
under this strategy are worth exploring, especially the [9] H. Frey and I. Stojmenovic, "On delivery guarantees of face
follows. and combined greedy-face routing in ad hoc and sensor
networks," in ACM MobiCom, 2006, pp. 390-401
• The backward-free property is newly introduced for the [10] B. Karp and H. T. Kung, "GPSR: Greedy Perimeter Stateless
geometric graphs in this paper. Since this property Routing for Wireless Networks " in ACM MobiCom, 2000,
enables the geometric routing protocols to produce high pp. 243-254.
quality paths, finding the sufficient and necessary [11] J. Gao, L. J. Guibas, J. Hershberger, L. Zhang, and A. Zhu,
conditions for a geometric graph to be backward-free "Geometric spanners for routing in mobile networks," IEEE
constitutes an interesting open problem. Journal on Selected Areas in Communications, vol. 23, pp.
174-185, 2005.
• Our proposed PDT is only an example of the backward- [12] R. Draves, J. Padhye, and B. Zill, "Routing in multi-radio,
free graphs, and other kinds of such graphs are worth multi-hop wireless mesh networks," in ACM Mobicom, 2004,
exploring to suit different requirements of network pp. 114 - 128.
deployments. [13] P. Kyasanur and N. H. Vaidya, "Routing and Link-layer
• Since the face routing mechanism does not function Protocols for Multi-Channel Multi-Interface Ad Hoc Wireless
Networks," ACM SIGMOBILE Mobile Computing and
properly in dynamic networks as manifested in Section II,
Communications Review, vol. 10, 2006.
designing other kinds of geometric routing protocols [14] W. Si and S. Selvakennedy, "A Position-Based Deployment
capable of tackling network dynamics becomes a and Routing Approach for Directional Wireless Mesh
challenging problem. While our LBGF protocol attempts Networks," in The International Conference on Computer
to solve this problem by imposing a backward limit and Communications and Networks (ICCCN) 2008, pp. 1-8.
detecting loops proactively, other different mechanisms [15] D. Chen and P. K. Varshney, "A Survey Of Void Handling
can be further explored. Techniques For Geographic Routing In Wireless Networks,"
IEEE Communications Surveys & Tutorials, vol. 9, pp. 50-67,
Finally, we note that no current WMN deployments use
2007.
such a geometric deployment and routing strategy yet. This
[16] J. Robinson and E. W. Knightly, "A Performance Study of
is because the implementation of this strategy requires the Deployment Factors in Wireless Mesh Networks," in IEEE
modification to the TCP/IP protocol stack at the mesh Infocom, 2007, pp. 2054 - 2062.
routers (i.e., enabling these mesh routers to insert, exploit, [17] J. Pan, Y. T. Hou, L. Cai, Y. Shi, and S. Shen, "Topology
and then remove the position information from the headers control for wireless sensor networks," in ACM MobiCom, San
of network packets). Though this modification is not Diego, CA, USA, 2003, pp. 286-299.
difficult, no WMN deployers will be tempted to do this if [18] C.-F. Huang and Y.-C. Tseng, "The Coverage Problem in a
the benefit of this geometric strategy is not apparent. Thus, Wireless Sensor Network," Mobile Networks and
we believe that when the scale of the WMNs becomes large, Applications, vol. 10, pp. 519-528, 2005.
the scalability and efficiency advantages of this geometric [19] M. Ma and Y. Yang, "Adaptive Triangular Deployment
strategy will become evident, and this geometric strategy Algorithm for Unattended Mobile Sensor Networks," IEEE
will be adopted and prevail. Transactions on Computers vol. 56, pp. 946-847, 2007.
[20] E. Amaldi, A. Capone, and F. Malucelli, "Planning UMTS
REFERENCE Base Station Location: Optimization Models with Power
[1] BelAirNetworks, "BelAir300 Converged Multi-service Control and Algorithms," IEEE Transactions on Wireless
Wireless Node," http://www.belairnetworks.com, Data Communications, vol. 2, pp. 939-952, 2003.
Sheet,2007. [21] R. Mathar and T. Niessen, "Optimum positioning of base
[2] MeshDynamics, "Technology - Performance Analysis," stations for cellular radio networks," Wireless Networks, vol.
http://www.meshdynamics.com, Online,2006. 6, pp. 421-428, 2000.
[3] Nortel, "Wireless Mesh Network Basics," [22] M. Mauve, J. Widmer, and H. Hartenstein, "A survey on
http://www.nortel.com, Standard Document Release 3.0,2007. position-based routing in mobile ad hoc networks," IEEE
[4] StrixSystems, "Solving the wireless mesh multi-hop Network, vol. 15, pp. 30-39, 2001.
dilemma," http://www.strixsystems.com, White Paper,2006. [23] M. d. Berg, M. v. Kreveld, M. Overmars, and O.
[5] TroposNetworks, "Tropos Networks MetroMesh Schwarzkopf, Computational geometry: algorithms and
Architecture," http://www.tropos.com, White Paper,2005. applications, 2nd ed. New York: Springer, 2000.
[6] V. Angelakis, N. Kossifidis, S. Papadakis, V. Siris, and A. [24] P. Bose and P. Morin, "Online Routing in Triangulations," in
Traganitis, "The effect of using directional antennas on International Symposium on Algorithms and Computation,
adjacent channel interference in 802.11a: Modeling and 1999, pp. 113-122.
13
Authorized licensed use limited to: Dayananda Sagar College of Engineering. Downloaded on August 17,2010 at 06:26:18 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication.
IEEE TRANSACTIONS ON COMPUTERS
[25] J. M. Keil and C. A. Gutwin, "Classes of graphs which Council Member of the Institute for Computer Sciences, Social–
approximate the complete euclidean graph," Discrete and Informatics, and Telecommunications Engineering (in Brussels). He
Computational Geometry, vol. 7, pp. 13-28, 1992. received the 1997 Edgeworth David Medal from the Royal Society
of New South Wales for outstanding contributions to Australian
[26] P. Bose, L. Devroye, M. Loffler, J. Snoeyink, and V. Verma, Science. Professor Zomaya is also the recipient of the Meritorious
"The spanning ratio of the Delaunay triangulation is greater Service Award (in 2000) and the Golden Core Recognition (in
than Pi/2," in Canadian Conference on Computational 2006), both from the IEEE Computer Society. He is a Chartered
Geometry, 2009, pp. 1-3. Engineer (CEng), a Fellow of the American Association for the
[27] J. R. Shewchuk. Triangle version 1.6, Advancement of Science, the IEEE, the Institution of Electrical
http://www.cs.cmu.edu/~quake/triangle.html. Available: Engineers (U.K.), and a Distinguished Engineer of the ACM. His
research interests are in the areas of high performance computing,
http://www.cs.cmu.edu/~quake/triangle.html, 2005.
parallel algorithms, mobile computing, and bioinformatics.
[28] P. Chew, "Guaranteed Quality Mesh Generation for Curved
Surfaces," in The Annual Symposium on Computational Selvadurai Selvakennedy obtained his PhD in computer
Geometry, 1993, pp. 274-280. networking in 1999 from the University of Putra, Malaysia. He
[29] J. Ruppert, "A Delaunay Refinement Algorithm for Quality 2- currently works as a consulting engineer with a professional
Dimensional Mesh Generation," Journal of Algorithms, vol. services company, and is also associated with the University of
18, pp. 548-585, 1995. Sydney, Australia. His research interests lie in developing protocols
[30] A. Ungor, "Off-centers: A new type of Steiner points for and algorithms for radio resource management, MAC and network
protocols, middleware and topology control issues in wireless mesh
computing size-optimal guaranteed-quality Delaunay
networks. He has served on the technical program committees of
triangulations," in Proceedings of LATIN, 2004, pp. 152-161. many international conferences. Dr. Selvakennedy is a professional
[31] L. P. Chew, "Guaranteed-Quality Triangular Meshes," member of ACM.
Department of Computer Science, Cornell University,
Technical Report TR-89-983,1989.
[32] NS-2. Network Simulator 2, http://www.isi.edu/nsnam/ns.
2008.
[33] F. Kuhn, R. Wattenhofer, and A. Zollinger, "Worst Case
Optimal and Average Case Efficient Geometric AdHoc
Routing," in ACM MobiHoc, 2003, pp. 267 - 278.
[34] F. Kuhn, R. Wattenhofer, Y. Zhang, and A. Zollinger,
"Geometric ad-hoc routing: of theory and practice," in ACM
PODC, 2003, pp. 63--72.
[35] B. Leong, S. Mitra, and B. Liskov, "Path Vector Face
Routing: Geographic Routing with Local Face Information,"
in ICNP, 2005, pp. 147--158.
[36] F. Harary, Graph Theory: MA: Addison-Wesley, 1994.
[37] P. Bose and L. Devroye, "On the stabbing number of a
random Delaunay triangulation," Computational Geometry:
Theory and Applications, vol. 36, pp. 89-105, 2007.
14
Authorized licensed use limited to: Dayananda Sagar College of Engineering. Downloaded on August 17,2010 at 06:26:18 UTC from IEEE Xplore. Restrictions apply.