[ieee 2012 ieee symposium on computers and communications (iscc) - cappadocia, turkey...
TRANSCRIPT
Admission Control for QoS Provision in Wireless Mesh Networks
Eduardo Pompeo da Silva Mineiro
MídiaCom Labs
Telecommunications Engineering Department
Federal Fluminense University
Niterói, Brazil
Débora Christina Muchaluat-Saade
MídiaCom Labs
Computer Science Department
Federal Fluminense University
Niterói, Brazil
Abstract— This work presents an admission control
mechanism for multi-hop wireless mesh networks based on the
IEEE 802.11 standard and the OLSR routing protocol. This
mechanism, called CAC-OLSR, aims at ensuring that traffic
flows with quality of service (QoS) requirements, especially
voice and video, are only admitted in the mesh network if it has
available resources in order to provide flow requirements. In
addition, QoS requirements of previously admitted traffic
flows cannot be violated. The proposal was evaluated with NS-
2 and Evalvid simulations.
Keywords-Quality of Service, QoS, admission control,
wireless mesh networks, OLSR, CAC-OLSR.
I. INTRODUCTION
Technological advances coupled with cost reduction have stimulated the implementation of wireless networks based on the IEEE 802.11 standard [1]. In addition, there is a growing trend in providing different services over IP networks, such as voice and video, which require a minimum level of quality of service (QoS). Some QoS mechanisms that have been widely disseminated and applied to wired networks need special treatment in wireless scenarios, especially because of bandwidth restrictions and huge channel quality variability.
Regarding quality of service in IEEE 802.11 wireless networks, it is important to consider the IEEE 802.11e amendment [2], which was incorporated into the original standard in 2007. This amendment established four traffic categories with different channel access priority, through the configuration of some parameters such as frame spacing, contention window size and transmission opportunity.
However, only traffic differentiation based on channel access priority is not sufficient to guarantee the quality of service required by some multimedia applications. For example, it does not avoid traffic congestion when many flows of the same access category are injected in the network. This will probably generate delay increase and throughput decrease observed by each flow.
In the case of voice transmission, for example, in order to guarantee quality of calls, network capacity must not be violated [3]. Unfortunately, this condition is not always satisfied when applying traffic differentiation only.
In this context, it is necessary to provide an admission control mechanism, which should be responsible for the entry of new network flows so that the quality of service required by them is met, without violating the requirements demanded by previously admitted flows.
The IEEE 802.11 standard suggests an admission control mechanism for wireless networks operating in the infrastructure mode. On the other hand, it does not define any admission control mechanism aimed at wireless mesh networks, where nodes communicate in ad hoc mode using multiple wireless hops.
This paper proposes an admission control mechanism for multi-hop wireless mesh networks based on the IEEE 802.11 distributed access mode. The proposed mechanism, called CAC-OLSR, is an extension to the OLSR [4] routing protocol (Optimized Link State Routing), which is widely used in wireless mesh networks [5, 6].
In addition to admission control, CAC-OLSR has the ability to reserve channel time resources for voice and video access categories. If those reserved resources are not fully used, they can be destined to other access categories in order to optimize network resource use.
The rest of the paper is structured as follows. Section II discusses related work. Section III proposes CAC-OLSR, an admission control mechanism for wireless mesh networks. Section IV presents a performance analysis through simulations made in Network Simulator (NS-2) [7]. Finally Section V covers the conclusions and future work.
II. RELATED WORK
The work of Yang and Kravets [8], referenced in many articles on the subject, proposed an admission control for ad hoc networks based on channel occupation. In summary, each node decides about the admission of a new flow by comparing the estimated occupation of the channel caused by the incoming traffic to the available channel resources, measured by carrier detection. If the former is smaller than the latter, the flow can be admitted.
In another article [9], Chakeres and Belding-Royer used the same principle of Yang and Kravets [8], but proposed a zone extension to be considered by each node when
978-1-4673-2713-8/12/$31.00 ©2012 IEEE 000331
measuring channel occupation. This is due because of "hidden terminals", which can lead to false admissions. Both works did not take into account the IEEE 802.11e access categories. Also, they did not detail how their mechanisms would work in a multi-hop network.
Chakeres and Belding-Royer [9] suggested an association with reactive routing protocols, where the admission of new flows occurs during the route discovery process, but they did not mention how the mechanism could be applied to proactive protocols like OLSR [4]. Also, they did not consider intraflow interference, which will be addressed in the next section.
Lindgren and Belding-Royer [10] presented a treatment approach for intraflow interference. They proposed a factor called contention counter, which must be applied during the resource estimation to be consumed by a new flow. That work also proposed the admission control process during route discovery, a fact that excludes the application of the mechanism in networks whose routing protocol is proactive, such as OLSR [4]. They did not take into account the IEEE 802.11e access categories.
Ahn et al. [11] proposed a mechanism called SWAN, which means Service Differentiation in Stateless Wireless Ad Hoc Networks. SWAN does not depend on a specific routing protocol. It uses rate control for UDP and TCP best effort traffic, and sender-based admission control for UDP traffic. The admission control is always executed by the source node, which sends a probe to the destination node in order to check the available bandwidth in the network and to compare it with the bandwidth required by the new flow. SWAN did not take into account the IEEE 802.11e access categories.
Cerveira and Costa [12] proposed an extension to the AODV protocol [13] adding an admission control mechanism similar to those mentioned so far. However, it differentiates the channel time occupation between QoS and best-effort traffic, ignoring the latter in the process of admitting new flows. Through that strategy, best effort traffic will only occupy network resources not used by flows that demand QoS. The authors also considered the use of IEEE 802.11e access categories and assumed that best effort traffic uses TCP as the transport protocol. They also presented a treatment for intraflow interference.
Nguyen and Minet [14] presented an admission control proposal for the OLSR protocol [4]. In fact, the article proposed a modified version of OLSR, which considered bandwidth allocation and channel interference for route selection, besides admission control. The latter is based on two steps: feasibility and acceptability. In the first step, the incoming traffic node compares the bandwidth required by the flow with the available bandwidth on each node of the path (the available bandwidth of each node is disseminated via Hello messages). If the required bandwidth is smaller than the smallest available bandwidth among all nodes in the path, the flow may be accepted. In the acceptability step, there is a check for the interference caused by the new flow
in the vicinity of the nodes along the path. The proposal neither considered IEEE 802.11e, nor addressed the issue of intraflow interference.
Badis and Agha [15] proposed an admission control for the QOLSR [16] protocol. The scheme is based on sending preliminary messages called Check Request (CREQ) and Check Reply (CREP), which carry the incoming flow requirements in terms of bandwidth, delay and jitter. Each node in the path checks whether or not such requirements can be met and forwards the message along only in the positive case. If the CREQ node source receives a CREP, the corresponding flow is accepted. That work dealt with intraflow interference, but did not consider IEEE 802.11e.
As far as it was possible for the current work to investigate, the mechanism that will be presented in the following section is the first admission control mechanism, to be proposed for a proactive routing protocol, that addresses all the following features: considers a wireless network composed of multiple hops; considers the IEEE 802.11e access categories; presents a treatment for inter and intraflow interferences and deals with QoS violation.
Besides all the features above, this paper considers the reservation of channel time resources for voice and video access categories. If not used, those resources can be used by other categories. This is important because if it is not considered and, for example, the network capacity is fully used by previously admitted video flows, the admission control mechanism might not allow new voice flows, even though they belong to the highest priority category. CAC-OLSR, in this case, would stop the latest admitted video flow in order to admit voice traffic until the reserved resources for the voice category was reached. This issue is a new insight into the admission problem, as far as it was not considered by any of the mentioned related works.
III. CAC-OLSR
The CAC-OLSR proposal, which means Call Admission Control OLSR, uses as main criterion for flow admission the comparison between current channel time occupation and the estimated occupation demanded by a new flow. Furthermore, it uses the IEEE 802.11e access categories, treats inter and intraflow interference and deals with QoS violation.
In order to facilitate the mechanism understanding, this section is structured as follows. Section A presents the channel occupation measurement method, while Section B shows how the estimated occupation demanded by a new flow is done. Section C describes how inter and intra flow interferences are treated. QoS violation is discussed in Section D and Section E presents the admission policy.
A. Channel Occupation Measurement
In order to measure channel occupation, carrier detection is observed for a given period of time. This can be done in IEEE 802.11 by monitoring a function called PHYCS – PHY carrier sense, which indicates if the channel is idle or busy.
978-1-4673-2713-8/12/$31.00 ©2012 IEEE 000332
However, this work proposes that channel is considered busy only if it is used by QoS traffic (voice and video). In other words, channel must be considered idle during transmission or reception of traffic without QoS (best effort and background). This strategy was adopted to prevent non-admission of QoS flows because of channel occupation with traffic without QoS. It is considered here, as adopted in [12], that the lower channel access priority and the use of TCP will automatically reduce best effort and background traffic category throughput in the presence of QoS traffic.
In summary, channel occupation measurement observes carrier detection periodically during a certain period (100 ms by default) and returns the percentage occupation caused by frames belonging to voice and video access categories. If the frame access category can not be identified, that frame is also considered for channel occupation measurement.
B. Channel Occupation Estimation for a New Flow
Channel occupation for a new flow can be estimated if the time required for one single frame transmission and the flow frame rate are known.
Based on IEEE 802.11, the time required to successfully transmit a frame, without RTS and CTS [1] procedures, is given by Equation (1).
Tframe = Data + SIFS + ACK + AIFS + Backoff (1)
In Equation (1), "Data" is the time required for a single data frame transmission; SIFS is the interframe spacing before an ACK transmission, which corresponds to the acknowledgment of the data frame previously sent; AIFS is the interframe spacing before the transmission of another data frame, depending on its access category. Finally, Backoff represents the time wasted with the contention process as described in IEEE 802.11.
SIFS and AIFS values can be easily obtained in IEEE 802.11 recommendations. Moreover, Data and ACK transmission time can be calculated with the frame size and transmission rate information.
Backoff time can be estimated based on the contention window average value multiplied by the duration of a time slot, which can also be obtained in IEEE 802.11 standard.
After estimating the time required for one data frame transmission (Equation 1), it is necessary to check the amount of frames sent by a given flow during an observation period. As a result, it is possible to estimate the percentage channel time occupation that will be consumed by that flow.
C. Interference
1) Interflow Interference
It is considered as interflow interference, one that happens among two or more different flows that compete for channel access. The correct treatment of this type of interference is very important to ensure that the admission of a new flow neither will interfere with previously admitted flows, nor will violate their QoS requirements.
To mitigate this problem, it is necessary to verify the available resources in terms of channel availability, both in the nodes along the path of the new flow, as well as in their neighbors that are located in the interference region.
CAC-OLSR combats interflow interference by propagating channel occupation observed by each node via OLSR Hello messages [4]. Each node that receives a Hello message stores the channel occupation information in its one and two-hop neighbor tables, which are already maintained by OLSR. This proposal considers that a node interference region consists of its one and two-hop neighbors only.
Thus, each node along the path can verify whether it has, as well as its one and two-hop neighbors have, the necessary resources to meet the new flow demand during the admission control process.
2) Intraflow Interference
Intraflow interference happens when nodes that forward packets of the same flow are interfering with each other. This will probably cause flow throughput decrease, even though each individual node has enough channel resource availability. To illustrate this phenomenon, Figure 1 shows a scenario where node 1 is transmitting a flow to node 5.
The filled circles represent the data transmission or reception range for each node, while the dashed one represents the carrier sensing range for node 3. Observe that node 3 is in the detection region of nodes 1, 2, 4 and 5, which prevents it from transmitting simultaneously with any of them. As a result, free time channel available resources should be reduced by a factor of 5. Thus, it is necessary to compute at each node, the number of nodes involved in the intraflow interference region in order to correctly estimate the resources that will be demanded by a new flow.
CAC-OLSR protocol considers that intraflow interference should be estimated by calculating a factor called Contention Counter (CC) [10]. This factor sums, in each node, the number of nodes belonging to the intraflow interference region, limited to a maximum of 5, i.e., the previous two, the two latter and the node itself. For example, the CC factor of node 3 in Figure 1 equals 5.
1
2
3
5
4
Figure 1. Intraflow interference.
Finally, this factor should be applied to estimate channel time occupation demanded by a new flow. For example, if after applying the method described in Section B, a value of 5% of occupation was reached, each node along the path must consider that the flow will consume 5% * CC of channel time capacity.
978-1-4673-2713-8/12/$31.00 ©2012 IEEE 000333
D. QoS Violation
An admission control mechanism must deal with QoS violation, which may happen, for example, because of false admissions, node mobility, changes in a node neighborhood or due to variations in signal propagation conditions.
In CAC-OLSR, every node periodically monitors channel occupation with QoS flows. If one of them detects that occupation is greater than a threshold called “Violation Threshold”, the network is near congestion and one or more flows need to be stopped.
In this case, CAC-OLSR first checks if the reserved resources for video access category was violated. If so, an ICMP message is sent to the source node of the last admitted video flow in order to stop it. If not, voice access category reserved resources were violated. Then an ICMP message is sent to the source node of the last admitted voice flow in order to stop it. Figure 2 illustrates the proposed QoS violation mechanism.
Figure 2. QoS violation mechanism.
In order to avoid synchronization, each node starts to check channel occupation in a different time. Moreover there must be an interval of, at least, the observation period (100 ms) between measurements for resource update purposes.
The “Violation Threshold” must be a value greater than the one used by the admission control algorithm to admit new flows. Also, it must be neither too low to avoid unnecessary flow interruptions nor too high to avoid QoS violation.
E. Admission Policy
The admission policy includes the criteria to be used to decide if a new flow can be admitted in the network. These criteria are based on definitions and proposals presented in the previous sections. To make it clearer, Figure 3 shows a simplified flowchart of the proposed mechanism, which is explained below.
Upon receiving a data packet, CAC-OLSR checks whether it was originated in a client of the mesh node itself. If not, the packet is normally routed as in the original OLSR. Included in this action is the premise that if a node receives a packet to be forwarded, then it has already passed through the admission process at the source mesh node and therefore should be immediately forwarded.
If the packet was originated in a client of the mesh node itself, then it checks if it has associated QoS, i.e., whether it will be forwarded as voice or video categories. This checking
is done by consulting the IP header ToS (Type of Service) or DSCP (Differentiated Services Code Point) field. The ToS/DSCP value is used to map the packet to the appropriate IEEE 802.11e access category [2].
Figure 3. Admission flowchart.
If the packet does not demand QoS, i.e., if it belongs to best effort or background categories, then it should be normally forwarded, unless channel occupation with QoS traffic is over a configurable threshold. This threshold must be smaller than the “Violation Threshold”, as seen in the previous section. If channel occupation with QoS traffic is greater than the threshold chosen, the packet is discarded, avoiding network congestion.
It is important to observe that traffic without QoS will pass through CAC-OLSR admission control mechanism only if the network is not congested. That traffic lower channel access priority and the use of TCP in most cases regulate traffic injection into the network by itself.
Back to the flowchart in Figure 3, if the flow has associated QoS (voice and video categories), then the source mesh node will check whether it has previously been admitted and still has an entry in the admission table. If so, the packet is immediately sent. If not, a new admission process is started.
In fact, before starting a new admission process, it checks if the flow has already been rejected within a minimum time interval required for a new admission process to be initiated. If so, the flow should again be rejected.
It is worth to notice that it was necessary to create a flow table in each node database with the admission, accepted and rejected flows. Each entry in that table has a timer. Flows without packet transmission for a given time will be excluded and will have to pass through the admission process again. Rejected flows will remain on the table until the timer times out and a new admission attempt will not be allowed for them during this period.
978-1-4673-2713-8/12/$31.00 ©2012 IEEE 000334
After the previous step, the node checks if channel occupation with QoS traffic is smaller than the threshold value and if it is smaller than the reserved resources value for the access category of the new flow. If both conditions are not satisfied, the flow must be rejected. On the other hand, if one of them is met the node sends a CREQ – Check Request – message, which must be answered by the destination with a CREP – Check Reply. It is import to notice that if only the second condition is met and the channel occupation with QoS traffic is higher than the threshold, it means that the other access category exceeded its reserved resources and its latest flow must be interrupted (QoS violation).
CREQ and CREP aims at avoiding inter and intraflow interference problems, as already explained. Each node in the path, upon receiving a CREQ, checks the channel occupation perceived by itself and all its one and two-hop neighbors. Those occupations are compared to the value estimated for the new flow, which includes the CC factor. If the node itself or any of its neighbors has no available resources, CREQ should be discarded. On the other hand, if all nodes have the necessary resources, CREQ must be forwarded to next node in the path until the destination node is reached.
The destination node must process CREQ and send a CREP, which will cross the path in the reverse way. Again, each node will check for available resources before forwarding CREP. If the source node receives CREP, it will process the message and finally admit the flow if it has available resources. The source node has a timer for receiving the corresponding CREP. After timeout, the flow is considered rejected.
IV. PERFOMANCE ANALYSIS
In order to analyze the performance of CAC-OLSR, simulations were done using Network Simulator - NS-2 version 2.34 [7] and Evalvid [20]. The results were compared with the standard OLSR protocol [4] and with SWAN [11] admission control mechanism. SWAN [11] was chosen because an RFC draft was written based on it and because its NS-2 code was available [17].
A. Simulation Scenario
For evaluation of CAC-OLSR, a mesh network scenario composed of 10 nodes randomly placed in an area of 500m x 500m was configured in NS-2 [7]. The random position was provided by the setdest tool, available in NS-2.
All simulations described here were performed using the standard OLSR protocol, CAC-OLSR and SWAN control admission mechanism.
As the NS-2 version employed did not have an implementation of OLSR, the code developed by the University of Murcia, UM-OLSR, version 0.8.7 [18], which is totally adherent to RFC 3626 [4], was used.
The IEEE 802.11e access categories were considered only for OLSR and CAC-OLSR evaluation, since SWAN did not consider them. These access categories were
developed for NS-2 by TKN group [19] and the parameters for each one were set up according to the IEEE 802.11 standard suggestion [1].
All simulations were done without the use of RTS/CTS [1]. All scenarios used IEEE 802.11g in ad-hoc mode and the TwoRayGround propagation model. The transmission range was set to 250 m, while the carrier sensing range, to 550 m.
Network traffic was generated as follows: to model voice and video flows, two CBR (Constant Bit Rate) traffic sources were respectively implemented, one with 160-byte packet size sent every 20ms (64 Kbps) and another with 1280-byte packet size transmitted every 10ms (1024 Kbps). Best effort and background traffic were modeled as FTP with 1300 and 1500-byte packet sizes respectively. At each 20s, a new flow from each type (voice, video, best effort and background) was randomly injected in the network. The first four flows, however, began after 30s of simulation, to ensure the correct routing protocol convergence. The total simulation time was 431s. The threshold values adopted were 95% for QoS violation and 90% for the admission process. The reserved channel time resources values for QoS categories were 55% for voice and 35% for video.
For each simulation, the following metrics were computed: average end-to-end delay, average throughput per flow and average aggregate throughput. In addition to these metrics, the average number of admitted flows and the additional control overhead injected into the network were also measured for CAC-OLSR.
A second test was done in order to evaluate the quality of a real video transmission. The same scenario described above was set in NS-2 with some differences in the network traffic. In this test, one flow from each type (voice, video, best effort and background) was injected every 10s, starting after 30s. Besides that, a real video called “News” [20] was injected after 50s. “News” is a QCIF video with average throughput of 310 Kbps and duration of 12s. This video was encoded and prepared for transmission in NS-2 using Evalvid tool set. The video was repeated four times, so it lasted 48s. Source and destination was randomly selected. In the destination, each received video frame PSNR was calculated and converted to a MOS grade.
Finally, for the purpose of evaluating CAC-OLSR QoS violation recovery, a particular scenario was employed, as showed in Figure 4.
Figure 4. QoS violation recovery scenario.
Voice and video flows, with the same traffic model defined before, were started every 20s from nodes 0 and 3 to
978-1-4673-2713-8/12/$31.00 ©2012 IEEE 000335
nodes 2 and 5 respectively. Nodes 0 to 2 and 3 to 5 were separated by a distance of 1000 m. After 300s of simulation, nodes 3 to 5 moved horizontally and stopped 10 m away from nodes 0 to 2. Average end-to-end delay was measured.
B. Results
The results were obtained from an average of 30 simulations for each mechanism, SWAN, OLSR+802.11e and CAC-OLSR+802.11e, with a 95% confidence interval.
1) Average End-to-end Delay
This metric considers the average end-to-end delay suffered by packets sent in each 20s interval. Figures 5 and 6 show average delay results for voice and video flows.
Observing Figure 5, it can be seen that voice flows average delay reached almost 15s with the OLSR+802.11e and 25s with SWAN. On the other hand, CAC-OLSR was able to keep average delay of all voice flows bellow 150ms, an acceptable value for voice applications. Considering video flows, CAC-OLSR maintained the delay below 500ms.
0
5
10
15
20
25
30
35
51 71 91 111 131 151 171 191 211 231 251 271 291 311 331 351 371 391 411 431Time (seconds)
Dela
y (s)
SWAN 802.11e+OLSR 802.11e+CAC-OLSR
Figure 5. Average end-to-end delay for voice flows.
-5
0
5
10
15
20
25
51 71 91 111 131 151 171 191 211 231 251 271 291 311 331 351 371 391 411 431
Time (seconds)
Dela
y (s)
SWAN 802.11e+OLSR 802.11e+CAC-OLSR
Figure 6. Average end-to-end delay for video flows.
2) Average throughput per flow
The average throughput per flow corresponds to the average bits per second transmitted per flow at each 20s interval. Figures 7 and 8 show throughput results for voice and video flows.
0
10
20
30
40
50
60
70
80
51 71 91 111 131 151 171 191 211 231 251 271 291 311 331 351 371 391 411 431
Time (seconds)
Th
rou
gh
pu
t p
er
Flo
w (
Kb
ps)
SWAN 802.11e+OLSR 802.11e+CAC-OLSR
Figure 7. Average throughput per flow for voice flows.
0
200
400
600
800
1000
1200
1400
51 71 91 111 131 151 171 191 211 231 251 271 291 311 331 351 371 391 411 431
Time (seconds)
Thro
ughput per
Flo
w (K
bps)
SWAN 802.11e+OLSR 802.11e+CAC-OLSR
Figure 8. Average throughput per flow for video flows.
Only CAC-OLSR was able to deliver the required average throughput per flow, i.e., 64 Kbps for voice and 1024 Kbps for video.
3) Average aggregate throughput
The average aggregate throughput corresponds to the average bits per second transmitted by all traffic flows at each 20s time interval. Figure 9 shows the average aggregated throughput for QoS traffic, while Figure 10 shows throughput for non-QoS traffic.
0
500
1000
1500
2000
2500
3000
3500
51 71 91 111 131 151 171 191 211 231 251 271 291 311 331 351 371 391 411 431
Time (seconds)
Th
roug
hput
(Kb
ps)
SWAN 802.11e+OLSR 802.11e+CAC-OLSR
Figure 9. Average aggregate throughput for QoS traffic.
978-1-4673-2713-8/12/$31.00 ©2012 IEEE 000336
0
500
1000
1500
2000
2500
3000
51 71 91 111 131 151 171 191 211 231 251 271 291 311 331 351 371 391 411 431Time (seconds)
Thro
ughput (K
bps)
SWAN 802.11e+OLSR 802.11e+CAC-OLSR
Figure 10. Average aggregate throughput for non-QoS traffic.
In the case of aggregate throughput for QoS traffic, CAC-OLSR presented the best result, as shown in Figure 9, probably because of less time spent with MAC retransmissions. For non-QoS traffic, as shown in Figure 10, CAC-OLSR also presented better results, although after 271s the average aggregate throughput remained below 50 Kbps for all mechanisms.
4) Admitted Flows
Figure 11 shows the average number of voice and
video admitted flows. OLSR+802.11e does not have an
admission control mechanism. So, with 431s of simulation,
there were 21 voice and 21 video flows in the network.
0
2
4
6
8
10
12
31 51 71 91 111 131 151 171 191 211 231 251 271 291 311 331 351 371 391 411 431
Time (seconds)
Num
ber of Flo
ws
SWAN Voice SWAN Video
CAC-OLSR Voice CAC-OLSR Video
Figure 11. Admitted Flows.
SWAN admitted an average of 9 voice and 11 video flows. As SWAN could not satisfy QoS metric requirements for all flows, it admitted more flows than network capacity was able to support. This is probably due to the fact that the mechanism does not consider traffic between transmission and carrier sensing ranges when admitting a new flow.
CAC-OLSR admitted an average of 8 voice and almost 2 video flows after 431s of simulations. In addition to satisfying QoS requirements for all admitted flows, CAC-OLSR also presented better results in terms of aggregate throughput. So, the proposed mechanism admitted an appropriate number of flows.
5) Admission Control Overhead
One concern about adopting CAC-OLSR is the
additional overhead introduced into the network, mainly
because of CREQ and CREP messages. However, as shown
in Table I, this increase was, on average, less than 6%
considering the number of packets. Considering an average
of 8343.10 control packets sent by CAC-OLSR, 464.57
were CREQ or CREP messages, which represent 5.57% of
the total. It is noteworthy that the other packets are usually
sent by the original OSLR protocol [4] (Hello, topology
control messages - TC, among others). With respect to the
additional amount of bytes injected into the network
because of CREQ and CREP, the simulations showed an
increase of only 4.04%.
TABLE I. CAC-OLSR ADITIONAL OVERHEAD
Description CREQ or CREP Control Packets %
Sent Packets 464.57 8343.10 5.57%
Amount of bytes 44311.40 1097641.40 4.04%
6) Real Video Transmission
Using the Evalvid tool set,, the percentage number of
frames classified in each MOS grade was calculated.
0%
10%
20%
30%
40%
50%
60%
70%
80%
90%
100%
Reference CAC-
OLSR+802.11e
OLSR+802.11e SWAN
Rec
eiv
ed
Fra
me
s p
er
MO
S (
%)
Bad (1) Poor (2) Fair (3) Good (4) Excelent (5)
Figure 12. Received frames per MOS.
As shown in Figure 12, CAC-OLSR presented the best
results, with almost 100% of received frames classified as
“Excellent”, as the original video. On the other hand, OLSR
received only 30% of the frames as “Good” and “Excelent”,
while SWAN received most of frames with “Bad” quality.
7) QoS Violation Recovery
The scenario proposed to evaluate QoS violation recovery, as previously described, is extremely severe. The two groups of nodes are put together when each one has almost 100% of its channel resources consumed by voice and video flows. This evaluation was done only with CAC-OLSR, with and without the QoS violation recovery mechanism.
Figures 13 and 14 showed that with the QoS violation recovery, voice and video end-to-end average delay were reestablished after a severe neighborhood change. The same did not happen without the violation mechanism.
978-1-4673-2713-8/12/$31.00 ©2012 IEEE 000337
0
0,5
1
1,5
2
2,5
3
3,5
4
4,5
51 71 91 111 131 151 171 191 211 231 251 271 291 311 331 351 371 391 411 431Time(s)
Dela
y(s
)
CAC-OLSR without QoS Recovery CAC-OLSR with QoS Recovery
Figure 13. Average end-to-end voice delay.
0
1
2
3
4
5
6
7
51 71 91 111 131 151 171 191 211 231 251 271 291 311 331 351 371 391 411 431Time (seconds)
Dela
y (s)
CAC-OLSR without QoS Recovery CAC-OLSR with QoS Recovery
Figure 14. Average end-to-end video delay.
V. CONCLUSIONS
This paper presented CAC-OLSR, an admission control mechanism for IEEE 802.11e wireless mesh networks, using the OLSR routing protocol. The proposal considered available channel time resources in order to admit a new flow and presented an approach to deal with inter and intraflow interferences. CAC-OLSR also dealt with QoS violation and provided the ability to reserve channel time resources for voice and video access categories.
Performance results provided by CAC-OLSR were quite satisfactory compared to those produced by SWAN and by the original OLSR protocol using the IEEE 802.11e access categories. There was a significant reduction in the end-to-end average delay and an increase in the aggregate throughput. Moreover, CAC-OLSR was able to maintain the throughput demanded by voice and video flows. The additional-control-byte overhead introduced by the admission mechanism was less than 5%.
As future works, CAC-OLSR is going to be implemented in openwrt-based mesh routers in order to be evaluated in a real network. Also, scalability needs to be investigated in a scenario with a large number of mesh nodes and flows, as well as the mechanism´s behavior with node mobility. Another future work is the improvement of channel occupation estimation for a new flow using a statistical approach.
REFERENCES
[1] IEEE P802.11-2007 IEEE Standard for Information Technology Telecommunications and Information Exchange between Systems - Local and Metropolitan Area Networks - Specific Requirements - Part 11: Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications. June 2007.
[2] IEEE P802.11e-2005 IEEE Standard - Local and Metropolitan Area Networks - Part 11– Amendment 8: Medium Access Control (MAC) Quality of Service Enhancements. November 2005.
[3] Conceição, A. F., Li, J. and Florêncio, D. A., “Voice transmission over IEEE 802.11 networks: main issues and restrictions”, in WebMedia '06 Proceedings of the 12th Brazilian Symposium on Multimedia and the web, Natal-RN, Brazil, November 2006.
[4] Clausen, T. and Jacquet, P. “Optimized link state routing protocol (OLSR)” – RFC 3626. 2006.
[5] Passos, D., Teixeira, D. V., Saade, D. C. M, Magalhães, L. C. S, Albuquerque, C. V. N., “Mesh Network Performance Measurements”, in International Information and Telecommunications Technologies Symposium, 2006.
[6] Sing, S., Sran, S. S., Chand, T., “Performance Comparision of AODV, OLSR and OFLSR in Wireless Mesh Networks”, in National Conference of Challenges & Opportunities in Information Technology (COIT 2008), March 2008.
[7] Fall, K. and Varadhan, K. “The network simulator - ns-2”, http://www.isi.edu/nsnam/ns/.
[8] Yang, Y., Kravets, R., “Contention-aware Admission Control Protocol for Ad-hoc Networks”, in IEEE Transactions on Mobile Computing, vol 4, pp 363-377. 2005.
[9] Chakeres, I., Belding-Royer, E., “Perceptive Admission Control for Wireless Network Quality of Service”, in Ad Hoc Networks, vol 5, pp 1129-1148. 2007.
[10] Lindgren, A., Belding-Royer, E., “Multi-path Admission Control for Mobile Ad hoc Networks”, in ACM SIGMOBILE Mobile Computing and Communications, vol 8, pp 68-71, 2004.
[11] Ahn, G.-S., Campbell, A. T., Veres, A., Sun, L.-H., “Supporting Service Differentiation for Real-Time e Best-Effort Traffic in Stateless Wireless Ad Hoc Networks”, in IEEE Transactions on Mobile Computing, vol. 1, no. 3, pp 192-207, July 2002.
[12] Cerveira, C. R. and Costa, L. H. M. K., “A Time-based Admission Control Mechanism for IEEE 802.11 Ad Hoc Networks”, in 8th Mobile Wireless Communications Network, Santiago, Chile. 2006
[13] Perkins, C., Belding-Royer, E., “Ad hoc On-Demand Distance Vector (AODV) Routing – RFC 3561”, 2003.
[14] Nguyen, D., Minet, P., “Interference-Aware QoS OLSR for Mobile Ad-hoc Network Routing”, in Sixth International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing and First ACIS International Workshop on Self-Assembling Wireless Networks (SNPD/SAWN'05), 2005.
[15] Badis, H., Agha, K. A., “CEQMM: A Complete and Efficient Quality of service Model for MANETs”, in International Symposium on Performance Evaluation of Wireless Ad Hoc, Sensor, and Ubiquitous Networks, 2006.
[16] Badis H., Agha, K. A. e Munaretto A., "Quality of Service for Ad hoc Optimized Link State Routing Protocol (QOLSR)", in IETF-61 Meeting: Internet Engineering Task Force, Washington, DC, November 2004.
[17] Ahn, G.-S., Campbell, A. T., Veres, A., Sun, L.-H., “SWAN – Stateless Wireless Ad hoc Networks”, http://comet.columbia.edu/ swan/.
[18] Ros, F. J., “OLSR protocol for the ns2 network simulator”, University of Murcia, Murcia, Spain, 2009.
[19] Wiethölter, S., Emmelmann, M., Hoene, C. and Wolisz, A., “TKN EDCA Model for ns-2”, Telecommunication Networks Group, Technische Universität, Berlin, 2006.
[20] Evalvid - A Video Quality Evaluation Tool-set home page http://www.tkn.tu-berlin.de/research/evalvid.
978-1-4673-2713-8/12/$31.00 ©2012 IEEE 000338