You are on page 1of 8

A Bandwidth-Reservation Mechanism for On-Demand Ad hoc Path Finding

Irina Gerasimov and Robert Simon


Center for Image Analysis
Department of Computer Science
George Mason University
Fairfax, VA, 22030
{igerasim, simon}@cs.gmu.edu

ABSTRACT
One of the major challenges faced by designers of ad hoc discovery and route repair. Since ad hoc network topologies
network systems is the deployment of end-to-end quality-of- are highly dynamic, routes between two nodes often need to
service support mechanisms. This paper describes QoS- be produced or discovered upon demand, at the time of
AODV¸ an integrated route discovery and bandwidth connection establishment in the case of a QoS connection,
reservation protocol. QoS-AODV is designed to operate since previous routes may no longer exist. Route repair is
within a TDMA network. Unlike other path finding and concerned with finding a new route during the lifetime of a
route discovery protocols that ignore the impact of the data connection, because the existing route has “broken”, due to
link layer, QoS-AODV incorporates slot scheduling node mobility or transmission impairment. The second
information to ensure that end-to-end bandwidth is actually system activity consists of resource reservation for QoS
reserved. Further, QoS-AODV is an enhanced version of connections. This often involves allocation of resources at
the Ad hoc On-demand Distance Vector routing protocol, the data link or MAC level. An example of this is the
and is therefore compatible with proposed route discovery reservation of slots in a TDMA frame. The problem of
and maintenance techniques. In order to test the resource reservation at the data link level is complicated in
effectiveness of our protocol we implemented a version of an ad hoc environment, for two reasons. The first is the
QoS-AODV, along with two similar protocols, in the ns-2 mobility problem, and the second is the so-called “hidden
simulator. Our experiments showed the QoS-AODV terminal” problem. A hidden terminal in a wireless system
significantly improved the probability of being able to find is due to two nodes transmitting simultaneously to a third
an end-to-end QoS path. node, such that the two nodes that are transmitting are out of
each other’s range. However, their transmissions are garbled
at the third node, which can hear them both.
Key Words: Ad hoc Networking, Ad Hoc QoS routing,
QoS over AODV. This paper describes a novel solution to the QoS path
finding problem in ad hoc networks. We present QoS-
AODV, a protocol that combines on-demand routing with an
1. Introduction efficient MAC layer resource reservation mechanism. The
protocol is a modified and enhanced version of the Ad hoc
The new generation of wireless mobile computers can On-demand Distance Vector (AODV, [Perkins1999]). In
temporarily form multi-hop networks without the aid of a particular, we have introduced link and path bandwidth
fixed infrastructure. This activity is usually called ad hoc calculation mechanisms and a resource reservation protocol
networking. As this technology matures, ad hoc networks into the original AODV protocol. The outcome is a QoS
will increasingly need to support distributed multimedia path finding mechanism that maximizes the likelihood of
communication. In a traditional wired network, supporting finding routes that can support QoS traffic requirements in
multimedia communication involves using some number of ad hoc networks. Although the focus of our work is on
widely studied quality-of-service (QoS) algorithms for bandwidth reservation within a TDMA framework, our
routing and resource reservation. However, due to technique can be extended to other data link layer resource
unpredictable and potentially rapid changes in route and reservation issues.
bandwidth availability, significant challenges need to be In order to test the performance of our protocol we have
addressed before QoS techniques can be deployed in ad hoc implemented QoS-AODV in the ns-2 simulator [Ns2]. We
environments. also defined and implemented two other QoS path-finding
Supporting QoS in an ad hoc environment entails the protocols, and ran an extensive series of performance tests to
coordination of several system activities. The first is route assess the relative effectiveness of our approach. Our results

Proceedings of the 35th Annual Simulation Symposium (SS’02)


1080-241X/02 $17.00 © 2002 IEEE
indicate that for a variety of mobility scenarios QoS-AODV protocol. Moreover, our routing algorithm is fully aware of
substantially increases the likelihood of being able to find the bandwidth resource availability that was done by
suitable paths that meet the QoS requirements of a coupling together routing and MAC TDMA layers.
multimedia connection.

2b) The AODV routing protocol


The paper proceeds as follows. Section 2 describes
related work and gives some background in the AODV. The starting point for our protocol was to modify an
Section 3 presents the details of QoS-AODV. Section 4 existing on-demand routing protocol for best effort ad hoc
describes our performance study, and Section 5 offers some networking. We took the Ad hoc On-Demand Distance
concluding remarks. Vector protocol (AODV) [Perkins1999]. AODV uses a
broadcast route discovery mechanism, and it relies on
dynamically established routing table entries at intermediate
2. Background nodes. The functions performed by AODV protocol include
local connectivity management, route discovery, route table
QoS-AODV is a combined route discovery and management and path maintenance.
bandwidth reservation mechanism for providing end-to-end Local connectivity management happens as follows.
QoS in an ad hoc environment. This section first describes Nodes learn about their neighbors by either receiving or
related work in QoS routing over ad hoc systems. We then sending broadcast packets from or to their neighbors.
provide a brief overview of the original AODV protocol. Receiving the broadcast or HELLO from a new neighbor, or
failing to receive HELLO messages from a node that was
2a) Related Work previously in the neighborhood, indicates that the local
connectivity has changed.
There are several major approaches for QoS routing and The source node initiates path discovery by broadcasting
resource reservation in ad hoc networks. Here we present a route request, RREQ, packet to its neighbors. When a node
some current proposals related to our work. The first receives an RREQ, in case it has routing information, it
approach is based on distributed on-demand path search, sends the reply, RREP, packet back to the destination.
which uses known link bandwidth between nodes. An Otherwise, it rebroadcasts the RREQ packet further to its
example of this approach is contained in [Chen 1999]. Due neighbors. As the RREQ packet travels from the source to
to the distributed path calculation, this approach is scalable. the destination it automatically sets up the reverse path from
Further, by limiting the number of path search requests all nodes back to the source. As the RREP travels back to the
flooding is prevented. Although scalability and limited source, each node along the path sets up a forward pointer to
protocol overhead are clearly desirable in all ad hoc QoS the node from which the RREP came and updates its timeout
routing techniques, we believe there are potential drawbacks information for route entries to the source and destination.
to this approach. In particular, the path finding procedure is For each destination of interest a node maintains a single
not designed to take advantage of QoS information available route table entry that contains the address of the destination,
at the MAC layer. This in turn can lead to underutilization the next hop along the path to that destination, the number of
of network capacity. The second approach of QoS hops to the destination, and other route related parameters. If
implementation over ad hoc networks [Chen 1997], [Lin a node is presented with two different routes to the
1999], [Lin 2000] and [Ho 2000] focuses specifically on the destination it chooses the fresher route. If both routes were
MAC layer. It is based on reservation of node MAC layer discovered simultaneously, the route with fewer hops is
Time or Code Division Multiple Access (TDMA or CDMA) preferred.
time slots. In this approach, one or several paths to
destination are discovered, regardless of the link bandwidth Path maintenance is performed in several ways. When
available on nodes along those paths. Only after the path is any node lying along an established path moves so that some
discovered, is the path bandwidth to the destination node of the nodes become unreachable, a special RREP message
calculated. However, requiring the complete path is send to affected source nodes. Upon receiving notification
information has several potential drawbacks, such as low of a broken link, the source node restarts the path discovery
scalability, poor tolerance to fast topology changes, process, if it still requires that route.
calculations overhead, message flooding, etc. The design of AODV protocol does not have QoS
QoS-AODV uses some of the scheduling mechanisms functionality. Since it is in the class of best-effort ad hoc
presented in [Lin 1999]. However, our QoS approach is routing protocols, AODV does not take into account the
different from the above solutions in that we incorporate underlying data link layer and features of transmission over
QoS path finding based on bandwidth-scheduling wireless media.
mechanism into an already existing ad hoc non-QoS routing

Proceedings of the 35th Annual Simulation Symposium (SS’02)


1080-241X/02 $17.00 © 2002 IEEE
3. QoS-AODV protocol
Figure 1. Calculation of node time slot
This section defines our protocol, called QoS-AODV. scheduling. The notation c=a^b means that c is a
QoS-AODV performs path search simultaneously with time schedule received from a schedule a after slots of
slot scheduling by using simple heuristic algorithms. When a schedule b were extracted from a. The c=a|b
paths having the required QoS characteristics are means that c includes slots of both schedules, a
discovered, the protocol creates Virtual Connections by and b.
reserving MAC TDMA time slots along one of those paths.
We first present a description of how we augmented pure
AODV with QoS capabilities. There we explain how nodes Send_slots(node A) and recv_slots(node A) are the slots
exchange and calculate their time slot schedules and how we that node A uses for sending and receiving of data packets to
calculate link bandwidth between the nodes. Then we its neighbors. Recv_slots(node A neighbors) are the slots that
demonstrate how AODV path discovery was augmented with the neighbors of node A use for receiving of data packets
our path bandwidth scheduling mechanism and explain how from node A and other neighbors.
that mechanism works. At the end of the section, we describe We distinguish between free_send_slots and
our reservation protocol that is able to create, maintain and free_recv_slots terms. Free_recv_slots are node slots that
release Virtual Connections. are not used for receiving or sending data packets from that
node. Those slots can include the slots used by node
neighbors to receive data packets from their neighbors. In
3a). Time slot information calculation case of the calculation of free_send_slots of a node, the slots
used for receiving by that nodes neighbors must be taken
The QoS-AODV protocol is coupled with the underlying into consideration, since scheduling those slots for sending
MAC TDMA protocol. Each MAC TDMA frame consists from the node does lead to collision at node neighbors, if
of two phases, a control phase and a data phase. The control they receive during the time of those slots. Therefore,
phase is divided into number of slots that equal to the free_send_slots are the slots at which none of a node or its
maximum number of nodes in the ad hoc cluster. An ad hoc neighbors receive or send.
cluster is defined as a set of mobile hosts that exchange
messages between each other. Due to node mobility, nodes For the exchange of slot scheduling information in QoS-
can join or leave at any time. Nodes of one ad hoc cluster are AODV, we use modified AODV HELLO messages. Those
not able to receive messages from another ad hoc cluster; messages are sent either in the predefined time periods if
otherwise, both clusters need to be considered as a single none of the link bandwidths to neighbors are changed, or in
group in order to prevent packet collisions. Slot scheduling shorter time periods if there are any changes in link
is not negotiated between nodes in the control phase, since bandwidth. When a node A receives time scheduling slots
each node transmits during its own time slot. This way each from its neighbor X, it updates its own and its neighbor slot
node has a chance to transmit its control packets that include scheduling information as shown on Figure 2.
AODV, MAC and messages of other network control layers
without collisions. send_slots(node X) = HELLO(send_slots(node X))
The data phase is used for transmission of application- recv_slots(node X) = HELLO(recv_slots(node X))
layer packets and it consists of a limited number of slots. free_slots(node X) = HELLO(free_slots(node X))
Each node keeps information about its and its neighbor time recv_slots(node A) = 0
slots that are used for send and receive. This time slot recv_slots(node A neighbors) = 0
information is presented as a schedule. We define a schedule for (each neighbor N of node A) {
as a sequence of the numbers 0 or 1, where each number is recv_slots(node A) =
the order number of the time slot in the phase. We call a recv_slots(node A) | send_slots(node N)
node a neighbor of another node if those nodes are in the recv_slots(node A neighbors) =
transmission range of each other. It is necessary for each recv_slots(node A neighbors) | recv_slots(node N)
node to calculate which are slots are available for send and }
receive to its neighbors. In Figure 1 we show how to Figure 2. Update of node slot scheduling
calculate this information for a node A. information at node A when node A receives
HELLO message from neighbor node X.
free_recv_slots(node A) =
^(send_slots(node A) | recv_slots(node A))
free_send_slots(node A) = The link bandwidth between two nodes is calculated as
free_recv_slots(node A) ^ the intersection of their free slot schedules (Figure 3). The
recv_slots(node A neighbors) send link bandwidth is defined as intersect of

Proceedings of the 35th Annual Simulation Symposium (SS’02)


1080-241X/02 $17.00 © 2002 IEEE
free_send_slots of a sender node and free_recv_slots of a along the path to the source and link and path bandwidth
receiver node. The receive link bandwidth is defined as schedules between those nodes, in addition to one that
intersect of free_recv_slots of a receiver node and corresponds to the original AODV protocol. Based on
free_send_slots of a sender node. received link and path bandwidth information of nodes along
the path, the intermediate node calculates the path bandwidth
schedules by the algorithms similar to ones presented in [Lin
1999]. If the calculated path bandwidth to the source is
send_link_bandwidth (A sends to X) = insufficient, then the node does not forward RREQ message
free_send_slots(node A) & free_recv_slots(node X) further.
recv_link_bandwidth (A receives from X) = When the destination node receives a RREQ, it does the
free_recv_slots(node A) & free_send_slots(node X) path bandwidth calculation using the same algorithm as the
intermediate nodes. Afterwards, if there is path bandwidth
available it starts the reservation protocol.
Figure 3. Calculation at node A link bandwidth
scheduling from A to its neighbor X. When a RREQ message is received for a specific route in
“pure” AODV, the node checks whether the newer path is
fresher then the older one and if they are equal, it compares
The link bandwidth information is used for calculation of the hops counts of both paths. In QoS-AODV, we add
path bandwidth schedules to source and destination nodes. another heuristic, available bandwidth, so the node can
choose a path with the sufficient bandwidth, in addition to
the one with fewer hops. If there is enough path bandwidth,
3b) QoS path discovery and maintenance RREQ message is augmented with the path and link
bandwidth parameters and is broadcasted further.
The QoS-AODV path discovery process is
complimentary to AODV path discovery algorithm. In Since the routing table entries are created on “per call
“pure” AODV the path from the source to the destination is ID” basis, the number of entries can grow quite high. To
chosen regardless of bandwidth availability for that path. prevent growing of route tables, their entries are removed
However, the simple addition of calculation of slot either when the VC is released or during periodic clean ups.
scheduling along that path cannot provide the quantity of Figure 4 shows an example of how the QoS-AODV
available bandwidth and slot scheduling. If the system path’s search is performed, starting from the source node X
supports a set of calls with different bandwidth to the destination node D. When a source node X receives a
requirements, then for each call the slot scheduling and path call from the Application layer to create a new VC with
bandwidth availability calculation must be done specific bandwidth requirements, it broadcasts RREQ
individually. This makes it necessary to set specific Ids in message containing call ID and number of slots required for
each routing table entries and routing packets used for the the reservations (Figure 4a). When the RREQ message is
path discovery. received by A, it knows that X is its neighbor, so the
The scenario of path discovery in QoS-AODV is as available path bandwidth from X to A is equal to receive
follows: Once the source node receives the QoS call request link bandwidth from X to A. Path bandwidth XA is
from its application layer, it needs to establish the virtual calculated as the portion of the receive link bandwidth XA.
connection from the source to the destination node. To do Then A augments the received RREQ message with link
so, the source node checks if it has enough link bandwidth bandwidth of XA and address of X and rebroadcast RREQ
available to any of its neighbors. If it does not it denies the (Figure 4b). When B gets a RREQ message from A it figures
request for connection. However, if it does, then the source out that X is A's neighbor, so the available path bandwidth
node creates a routing table entry for the requested and slot scheduling are calculated using XA and AB receive
application call ID and the destination address. Finally, the link bandwidth. Then B checks whether path bandwidths XA
source node broadcasts RREQ, the AODV request message and AB are sufficient, and if they are B adds address of X
that in addition to standard AODV information contains the and A together with receive link bandwidth AB and path
call ID and the number of slots required for reservation. bandwidth XA to RREQ message and rebroadcast it (Figure
4c). When C receives RREQ from B, in order for C to
When an intermediate node receives a RREQ message it
calculate path bandwidth schedules to X, it has to know all
checks whether it already has an entry in its routing table
tree link bandwidths, XA, AB and BC to avoid packet
corresponding to the received Application call ID. If it does
collisions.
not, it creates a new entry, otherwise it checks whether the
received route to the source is fresher then the one it already In order to cut down on the amount of calculations, C
has. In case it is, it sets information for the reverse path to gets only path bandwidth XA, which was calculated on B,
the source, which corresponds to the given call ID. The route and link bandwidth AB. C uses receive link bandwidths BC
table entry information contains the addresses of three nodes and AB in order to calculate path bandwidths AB and BC. In

Proceedings of the 35th Annual Simulation Symposium (SS’02)


1080-241X/02 $17.00 © 2002 IEEE
order to prevent the hidden terminal problem, before the Figure 4d. C got RREQ from B and calculates
calculation of path bandwidths AB and BC is done, the path pw(AB) and pw(BC). Then B rebroadcasts RREQ
bandwidth schedule XA has to be subtracted from AB and with the addresses of A and B, pw(AB) and lw(BC).
BC receive link bandwidths, since if B would transmit in the
same time slots as X then packet collisions will happen. At
last, C checks whether the bandwidth is sufficient, as it was
done on B, and if it is it sets addresses of B and A as well as
receive link bandwidth BC and path bandwidth AB in RREQ
message and broadcast that (Figure 4d). After D gets RREQ
from C, it performs calculations similar to the ones done on
C in order to get path bandwidth scheduling CD and BC
(Figure 4e).
Figure 4e. D got RREQ from C and calculates
pw(BC) and pw(CD).
Figure 4. Example of QoS-AODV path search
initiated at source node X for the destination node
D. A solid line between two nodes indicates that
node can hear each other. The arrow out coming
from the node means that a node broadcast
messages to its neighbors.
Figure 4a. X broadcasts RREQ message with
number n slots required for VC. The parameters needed to calculate path bandwidth from
a node to the destination are summarized in Figure 5. Those
parameters are kept in routing table entries corresponding to
the specific Application ID.

receive link bandwidth NA (A receives from N)


index of N’s neighbor M, where M is next hop in
routing table entry for the destination X, at node N
Figure 4b. A got RREQ from X and calculates
receive link bandwidth MN (N receives from M)
pw(XA). Then A rebroadcasts RREQ with the index of M’s neighbor P, where P is next hop in
address of X and lw(XA). routing table entry for the destination X, at node M
path bandwidths NA, MN and PM

Figure 5. Path bandwidth calculation


parameters set at node A for the routing table entry
for the destination node X, whose next hop is a
node N.

Figure 4c. B got RREQ from A and calculates 3c) Virtual Connection (VC) establishment,
pw(AB) and pw(XA). Then B broadcasts RREQ with maintenance and release
the addresses of X and A, pw(XA) and lw(AB).
Once the destination node receives RREQ message and
figures out that there is bandwidth available to the source
node, it starts the reservation protocol. First, it creates the
reservation instance with parameters, shown in Table 1.

Proceedings of the 35th Annual Simulation Symposium (SS’02)


1080-241X/02 $17.00 © 2002 IEEE
source node ID 4. Performance Evaluation of QoS-AODV.
destination node ID
application call ID In order to judge the effectiveness of QoS-AODV, we
previous hop performed an extensive series of simulation experiments that
next hop compared QoS-AODV to two other protocols. We used the
CMU extension of ns-2 simulator that has already
previous hop bandwidth scheduling
implemented the AODV protocol. Since the existing
next hop bandwidth scheduling implementation of AODV relies on the underlying MAC
reservation status 802.11 and there was no suitable implementation of TDMA
MAC in ns-2, we implemented a new MAC TDMA layer.
Table 1. Resource reservation parameters, We developed an interface between MAC and the routing
stored at each node along VC for that VC ID. layers that enables slot reservation for sending to and
receiving from the specified neighbors. In addition, we
The parameters for a reservation instance are taken from added the capability to detect and report the collisions for
the routing table entry that corresponds to the VC ID. Then the MAC TDMA layer. Collisions occur when a node
the destination node reserves MAC receive slots receives or sends data packets from a neighbor in time slots
corresponding to previous hop bandwidth scheduling and that have already been assigned to receive or send to another
composes a reservation message, RSV, which is a new neighbor.
message added to AODV protocol. The RSV message has
the address of the next hop, the path bandwidth to that hop, For simplicity, we refer to QoS-AODV as QOSA-AODV.
and the addresses and path bandwidth of two more hops The two protocols that we compared to QOSA-AODV are as
along the path. RSV is sent to the next hop contained in the follows. The first protocol is called PURE-AODV. Its
routing table entry. functionality is close to one in the original AODV, with only
exception that a VC is created for sending packets from the
When an intermediate node receives the RSV message, it source to the destination. As the original AODV, PURE-
creates a reservation instance and sets its resource AODV does not maintain information about the link
reservation parameters, corresponding to ones contained in bandwidth available to its neighbors. After the source node
RSV messages. It reserves MAC receive and send slots and gets a route to the destination it starts the reservation
it reserves send path bandwidth to the neighbor it got the protocol. From the routing table entry corresponding to that
RSV message from. If the slot reservation was made route it gets the address of the immediate neighbor then
successfully, intermediate nodes get the address of the next guesses the path bandwidth to it. If the bandwidth is
neighbor along the path and the path bandwidth to it, sufficient, it makes reservations, as described for QOSA-
composes RSV message and sends it along the path to the AODV, and then sends the RSV message to the next hop
source. If the slot reservation has failed, which can happen along the path. When an intermediate hop receives the RSV
because other neighboring nodes may reserve the same slots message, it guesses the path bandwidth scheduling to the
simultaneously, then resource release is made, and an next hop, from the full link bandwidth range with the
unreserved message, URSV, is sent along the path back to exclusion of the path bandwidth received from the source
the destination. When source node receives the RSV and if that guess is right, it propagates the RSV message
message, it does reservations and notifies the application further. In case the guess was wrong, the URSV message is
layer that the VC is set as well. The application layer in turn composed and sent back to the source node. When the RSV
starts sending data packets. message reaches the destination and all the reservations went
After the application terminates the connection, the VC successfully, the rest proceeds as in QOSA-AODV. The
is released by generating a URSV message that is sent along resource release and handling of broken routes happen the
the path to the destination. When node receives the URSV same way as in QOSA-AODV as well.
packet it release resources as described above. The second protocol is called Simple QoS AODV, or
Established VCs can be broken when nodes go beyond QOSS-AODV. The path discovery and maintenance in this
each others transmission range or when new nodes enter protocol, together with the VC creation and reservation
node transmission range with the slots already reserved for mechanisms, happen as in PURE-AODV. The difference is
the transmission or receiving. After QoS-AODV discovers that in QOSS-AODV, the nodes are aware of the available
that VC is broken, it releases resources and sends URSV link bandwidth to their neighbors, and exchange link
messages to the source and the destination nodes. When the bandwidth information as in QOSA-AODV. While doing
source node receives URSV, it checks whether it has more reservations, QOSS-AODV composes a path bandwidth
messages to transfer. If it does, then it goes through the path scheduling out of known link bandwidth to the next hop. The
discovery session.

Proceedings of the 35th Annual Simulation Symposium (SS’02)


1080-241X/02 $17.00 © 2002 IEEE
above-described properties of the protocols are summarized 10 nodes/500x500sq.m
in the Table 2. 1
QOSS

call acceptance ratio


0.8
QOSA
AODV: PURE QOSS QOSA
0.6 PURE
Time slot
information No Yes 0.4
is available
RREQ contains 0.2
Path RREQ, RREP as in additional QOS 0
discovery original AODV information 0 6 12 18 24 30
node speed, m/s
Route table One route table entry per One route table
management destination as in original entry per call
AODV ID Plot 1. Call acceptance ratio for different node
RSV is sent from source RSV is sent speeds for 10 nodes placed on 500x500 meter area.
Reservation to destination, then ACK is from
protocol sent from destination to destination to
source source 20 nodes/700x700sq.m
1
QOSS

call aceptance ratio


Table 2. Properties of PURE, QOSS and QOSA 0.8 QOSA
AODV protocols.
0.6 PURE
The performance of three protocols was studied for
different system topologies and mobility models. The 0.4
mobility pattern was set as follows: in the beginning of the 0.2
simulation the nodes wee randomly distributed on the
specified area. Then for each node, the destination is 0
randomly picked, and the node starts moving towards that 0 6 12 18 24 30
node speed, m/s
destination with the speed not exceeding a predetermined
threshold. When node stops it picks up a new destination,
and this behavior is repeated. For call generation, the
Plot 2. Call acceptance ratio for different node
destination and the source nodes were randomly picked and
the time for ith call to be issued is calculated as stime(i) = speeds for 20 nodes placed on 700x700 meter area.
stime(i-1) + interval*0.75 + random_uniform(0,
interval*0.5). Here, stime(0) = 0, and interval = total
simulation time/total number of calls, and random_uniform() 30 nodes/900x900sq.m
returns a random number from the interval specified in its 1
QOSS
call acceptance ratio

parenthesis. 0.8 QOSA


The topology of the system was created by the random PURE
generation of sets of nodes, varying from 10 to 30, for 0.6
different square areas varying from 500x500m (10 nodes) to 0.4
700x700m (20 nodes) to 900x900m (30 nodes). The radius
of node transmission was set to be equal to 250m. The 0.2
simulation time was set to 40,000 seconds and the number of
0
calls was set to 10,000 per simulation. The holding time of
0 6 12 18 24 30
the connection requests followed the normal distribution. node speed, m/s
The number of TDMA time frames required per connection
was randomly set to 1, 2, or 3 slots. The node speed was
varied from 0 to 30m/s. The results are presented on Plots 1- Plot 3. Call acceptance ratio for different node
3. speeds for 30 nodes placed on 900x900 meter area.
Each point shown on presented plots is the average of
data taken from five simulation experiments; the error bars
are the standard deviation of those data. As it can be seen,
for the stable nodes, most of the calls are accepted for

Proceedings of the 35th Annual Simulation Symposium (SS’02)


1080-241X/02 $17.00 © 2002 IEEE
QOSA-AODV, while QOSS-AODV and PURE-AODV information. The second used slot scheduling information,
acceptance rates are 85% and 40%, correspondingly. As the but did not make use of the protocol message features of
nodes move, the acceptance rate for all protocols decreases QoS-AODV. Our experiments showed the QoS-AODV
because of increasing number of race conditions, which may significantly improved the probability of being able to find
occur during the VC establishment process. The race an end-to-end QoS path, as compared to these two other,
condition may happen during the reservation phase, and is “lighter” approaches.
due to outdated bandwidth scheduling. This situation arises
because other nodes have reserved the same slots, or the
neighborhood of nodes along path has changed due to node References
movements that as the result change node link bandwidth.
[Chen 1999], Chen, S.; Nahrstedt, K., "Distributed
The results show that the call acceptance ratio for PURE-
quality-of-service routing in ad hoc networks", IEEE Journal
AODV is the lowest and is around 20% for all three topology
on Selected Areas in Communications, page(s): 1488 - 1505
setups. It also can be seen that QOSA-AODV outperforms
Aug. 1999.
QOSS-AODV for at least 10% for all topologies presented.
One advantage of PURE-AODV is that it has the least
control message overhead during its local connectivity [Chen 1997] Chen, T.-W.; Tsai, J.T.; Gerla, M., "QoS
management and path discovery sessions. PURE-AODV routing performance in multihop, multimedia, wireless
starts reservations for every call it receives from the networks", 1997 IEEE 6th International Conference on
Application layer. However, unawareness of PURE-AODV Universal Personal Communications Record, 1997.
about link bandwidths to the node neighbors may quickly Conference Record, pages: 557 - 561 vol.2, 12-16 Oct. 1997.
lead to race conditions.
The QOSS-AODV connectivity management makes [Ho 2000] Ho, Y.-K.; Liu, R.-S. "On-demand QoS-based
nodes aware of link bandwidth to their neighbors. However, routing protocol for ad hoc mobile wireless networks", Fifth
nodes do not know whether there is a path bandwidth IEEE Symposium on Computers and Communications,
available to the required destinations. As in PURE-AODV 2000. Proceedings. ISCC 2000, pages: 560 - 565 3-6 July
the reservation process starts for most of the call as soon as 2000.
there is enough link bandwidth available between node and
the next hop of corresponding route table entry. During the
reservation process, node may soon discover that while there [Lin 1999] Lin C. R.; Liu, J.-S., "QoS routing in ad hoc
is a path to the destination there is no path bandwidth wireless networks", IEEE Journal on Selected Areas in
available, so the reservation backs up to the source and the Communications, page(s): 1426 - 1438, Aug. 1999, Volume:
call fails. 17 Issue: 8.
In QOSA-AODV once the path is discovered it is
guaranteed that the reservation done along that path would [Lin 2000] Lin, C. R.; Liu, C.-C., "An on-demand QoS
not be refused because of insufficient bandwidth. So, all the routing protocol for mobile ad hoc networks", Conference
reservations started are completed except ones that on IEEE International Networks, 2000. (ICON 2000).
encounter racing conditions. Despite the message overhead Proceedings, pages: 160 - 164, 5-8 Sept. 2000.
of QOSA, the significant increase in call acceptance makes
it clearly superior to the other protocols we studied.
[Ns2] See http://www.idi.edu/nsam/ns/.

5. Summary
[Perkins1999] Perkins C.E.; Royer, E.M.; "Ad hoc on-
This paper described an integrated route discovery and demand distance vector routing", Second IEEE Workshop
bandwidth reservation protocol called QoS-AODV. The key on Mobile Computing and Applications, 1999, Proceedings.
advantage of QoS-AODV is that it incorporates TDMA WMCSA '99., pages 90-100.
scheduling during the route discovery phase. The protocol
is based upon the original AODV technique for route
discovery and repair. We have added several messages and
procedures to support QoS path reservation and release.
We also developed a simulation program within the ns-2
framework. We compared our protocol with two other QoS
enhanced versions of AODV. The first used the path found
by AODV without making use of any type of slot scheduling

Proceedings of the 35th Annual Simulation Symposium (SS’02)


1080-241X/02 $17.00 © 2002 IEEE

You might also like