Project Presentation Quality of service in ad-hoc networks

Presented By: Abbas Agane ELG 5125 - University of Ottawa November 29, 2005


Introduction  Ad-hoc Network definition  Overview: Ad-hoc networks  Network architecture  Applications of ad-hoc networks  Ad-hoc networks characteristics and requirements Overview: QoS  

What is QoS ? 

The need of QoS in MANETs  Why QoS is hard in MANETs  Current Solutions for Support in MANETs  Flexible QoS Model for MANETs  INSIGNIA-MANETs QoS Signaling   Cluster-based Routing Protocol   SWAN for MANETs 

Ad-hoc QoS interconnectivity with Fixed Network  Domain services  Model for QoS ad-hoc interaction with the host domain  Mechanism of operation  Ad-hoc QoS interaction with the host domain architecture End-to-end Qos in MANETs connected to Fixed Networks (DS-SWAN)  DS-SWAN for upstream Conclusions Q&A

Ad Hoc Network definition 

An ad-hoc network is a wireless LAN, in which some devices are part of the network only for the duration of a communication session or while in some close proximity to the rest of the network. A "mobile ad hoc network" (MANET) is an autonomous system of mobile routers (and associated hosts) connected by wireless links forming an arbitrary graph. Routers are free to move randomly and organize themselves arbitrarily; network topology may change rapidly and unpredictably. May operate in a stand-alone fashion, or may be connected to the Internet. An ad hoc network can be regarded as a spontaneous network : a network that automatically emerges when nodes gather together 3  

Relaying .Internet compatible standards-based wireless systems 4 .Mobility .Independent of public infrastructure .High capacity .Self configuring and healing .Rapid Deployment .MANET Mobile Ad hoc NETworks B C A D .

Network Architecture  Flat network infrastructure  Multi-layered network infrastructure Cluster Head Cluster Head Cluster Head 5 .

laptops Cooperative environments  taxi cab network  meeting rooms Emergency operations  policing and fire fighting Military environments  Battlefield Network of sensors or floats over water 6 .Applications of Ad Hoc Networks      Personal communications  cell phones.

Ad Hoc Networks Characteristics and Requirements  Autonomous and spontaneous nature of nodes  Distributed Algorithms to support security. reliability and consistency of exchanged and stored information  Time-varying network topology (no pre-existing infrastructure or central administration)  Scalable routing and mobility management techniques to face network dynamics Enhanced functionalities to improve link layer performance. QoS network support and end-to-end efficiency Energy conserving techniques at all layers  Fluctuating link capacity and network resources   Low-power devices  7 .

What is QoS ?    Hard to agree on a common definition of QoS A QoS enabled network shall ensure:  That its applications and/or their users have their QoS parameters fulfilled. availability. while at the same time ensuring an efficient resource usage  That the most important traffic still has its QoS parameters fulfilled during network overload What are the most important QoS parameters:  Throughput. delay. jitter and packet loss 8 .

only route high priority traffic through terminals that are low on power Need QoS aware routing 9  . role. jitter.The need for QoS in MANETs Applications have special service requirements  VoIP: delay. minimum bandwidth  Needs intelligent buffer handling and queueing Routing traffic is important  No retransmission of lost broadcast messages  Routing contol messages must be prioritized User traffic prioritization is needed  user. situation etc   High mobility of users and network nodes  For use in emergency and military operations  Wireless bandwidth and battery capacity are scarce resources Need efficient resource usage E.g.

causing data loss and delays Imprecise state information  Link state changes continuously  Flow states change over time No central control for coordination Error-prone shared medium Hidden terminal problem Limited resources availability  Bandwidth.Why QoS is Hard in Mobile Ad Hoc Networks?       Dynamic network topology  Flow stop receiving QoS provisions due to path disconnections  New paths Must be established. storage. processing capabilities  Insecure medium 10 . battery life.

Current Solutions for QoS support in Mobile Ad Hoc Networks   Because of the unique characteristics of the ad-hoc environment three models provide some good insight into the issues of QoS in MANETs These models provide a comprehensive solutions. namely    INSIGNIA FQMM SWAN FQMM INSIGNIA SWAN Can be integrated with multiple routing protocols Flexibility! 11 .

 the rest is assigned per-class granularity. but improves the per-class granularity to per-flow granularity for certain class of traffic Built over IntServ and DiffServ models.Flexible QoS Model for MANETs (FQMM)        First QoS Model proposed in 2000 for MANETs by Xiao et al Proposes a hybrid provisioning that combines the per-flow granularity on IntServ and per-class granularity of DiffServ Adopts DiffServ. c o re  Three types of nodes defined    in g re s s Ingress (transmit) Interior (forward) Egress (receive) 2 1 3 4 e g re s s 6 5 7 12 . it can operate with extranet traffic Classification is made at the source node QoS provisioning is made on every node along the path FQMM Model provisions the traffic into two portions  the highest priority is assigned per-flow granularity.

1998  In-band signaling  Base and enhanced QoS levels Per-flow management  Resources management adapted as technology  Intelligent packet scheduling  Flow reservation. restoration and adaptation QoS reports periodically sent to source node  Source node takes action to adapt flows to observed network condition Routing  Any routing protocol can be used  Route maintenance procedure will affect In-band signaling  Establish. adapt.INSIGNIA  MANETs QoS Signaling     First signaling protocol designed solely for MANETs by Ahn et al. tear down reservations  Control information embedded in data packets 13 .

 If yes . Bandwidth Request (MAX/MIN): indicates the requested amount of bandwidth. deny resources Service Type = BE (best-effort). the packet will be forwarded with the allowed resources.INSIGNIA   OPTION Field  Supports in-band signaling by adding a new option field in the IP header to carry the signaling control Reservation Mode (REQ/RES): indicates whether there is already a reservation for this packet. Reservation M ode Service Type Payload Indicator Bandw ith Indicator Bandw ith Request REQ/RES 1 bit RT/BE 1 bit RT/BE 1 bit M AX/M IN 1 bit M AX 16 bits M IN The INSIGNIA OPTION field 14 .  If no . the packet is forwarded to INSIGNIA Module which in coordination with a AC may either: grant resources Service Type = RT (real-time).

15 .  If M2 is heavy-loaded it may also degrade the service level to BE/MIN where there is actually no QoS.INSIGNIA  Bottleneck Node r ser ti /ser i e/ i t ttleneck node During the flow reservation process a node may be a bottleneck: The service will degrade from REQ/RT/MAX REQ/RT/MAX REQ/RT/MIN MD M2 M1 Ms M4 M5 M3 REQ/RT/MIN RT/MAX -> RT/MIN.

scalable protocol Use clustering approach to minimize on-demand route discovery traffic  use local repair to reduce route acquisition delay and new route discovery traffic  suggest a solution to use uni-directional links 16 .Cluster-based Routing Protocol for Mobile Ad hoc Networks     When network size increase. efficient. flat routing schemes become infeasible. hierarchical routing Explicit hierarchy  Group nodes geographically close to each other into explicit clusters  Clusterhead  Communicate to other nodes on behalf of the cluster Clustering is: a distributed.

Cluster Formation routing: showing a data path from source to destination Destination Source 17 .

bi-directional link)  maintain a 2-hop-topology link state table HELLO message format: Node ID Neighbor ID Node tatus Neighbor status Link status Adjacent cluster ID 18 . C_UNDECIDED)  link status (uni-directional link.  Nodes periodically exchange HELLO pkts to maintain a neighbor table  neighbor status (C_HEAD. stable clusters with only local information  Mechanism:  Variations of min-id cluster formation algorithm. C_MEMBER.Cluster Formation  Objective:  Form small.

SWAN Stateless Wireless Ad Hoc Networks           An alternative to INSIGNIA with improved scalabilities properties Is a stateless network scheme designed specifically for MANETs with no need to process complex signaling. best-effort and real-time traffic Both level of service can be mapped to DCSPs with known PHB (based on bandwidth requirement) to facilitate extranet QoS May decide to demote part of the real-time traffic to best-effort service due to lack of resources The transmission rate for the best-effort traffic is locally estimated and adjusted to accommodate the bandwidth required by Real Time traffic Supports source-based admission control and distributed congestion control for real-time traffic Uses explicit congestion notification (ECN) 19 . to achieve scalability and robustness Promotes rate control system that can be used at each node to treat traffic either as real-time or best-effort Excessive real-time traffic is automatically demoted to best-effort While provides a model that deals with traffic on a per-class . it uses merely two level of service. or to keep per-flow information.

ad-hoc QoS interconnectivity with fixed network         Ad-Hoc network needs to cling to a host network in order to gain access to the internet Co-operation between ad hoc network and the host network can facilitate end-to-end QoS support Framework proposed by Morgan and Kunz defines a solution for interaction between ad hoc and host networks This framework is not affected by the specific QoS model implemented on either side Ad-Hoc network may decide to implement INSIGNIA. while host network may decide to implement DiffServ or IntServ Ad-hoc networks rely on the host network resources and services in order to access to the outside world The host network provides support for the ad-hoc by providing access to specific domain services and agreements Domain services are expressed in terms of three major components 20 . SWAN. or FQMM.

Domain services     Service Level Agreement (SLA): Fixed networks define SLA as a contract between a customer and service provider that specifies. what services the network service provider will furnish  Ad hoc domain: may decide to use any protocol such as SLP (service Location Protocol ) to locate specific services such as a mail server. and packet fragmentation  Ad Hoc network: need to adopt a set of DSCP codes in order to be able to deal with DiffServ QoS traffic Service Provisioning Policy: how traffic conditioners are configured on domain boundary nodes and how traffic streams are mapped to behaviour aggregates to achieve a range of services 21 . based on individual needs Traffic Conditioning Agreement (TCA): Specifying classifier rules and any corresponding traffic profiles and metering and shaping rules which are to apply the traffic streams selected by the classifier An example of TCA is the DSCP mapping.

[2] 22 .Model for QoS ad-hoc interaction with host domain Network Elements [1].

extranet packets have to be returned to the sender with an error report 23 . extranet packets have to be rerouted to an alternate GW Otherwise it will return to the originating node with a proper error code GWs have to create a table of the in-service DSCP This table provides a way of finding an alternate GW When a GW looses link connectivity during a per-flow session.Mechanism of Operation          The GW to the proposed friendly domain can use SLA and TCA proposed by its fixed domain only GW(A ) adopts SLA and TCA proposed by domain DS While GW(A ) adopts SLA and TCA proposed by domain DS The GW has to achieve a compromise between the costs using different services When a GW looses link connectivity during a per-class.

on one hand and D . Bursty traffic will simply eat up resources of other flows Proved that the performance degradation due to bursty flow comes with performance enhancement in the form of reduction of delay in the tail of the delay distribution 24 . A . D on the other hand All end-to-end reservations that use RSVP will use the same aggregate if they belong to the same class All same class reservations will share resources reserved by a single aRSVP This raises the problem of dealing with bursty traffic.Aggregate RSVP           Is used to solve the scalability issues of RSVP protocol It is particular efficient for inter-domain reservations The terminal ad hoc network is good to employ aRSVP Since. all ad-hoc extranet traffic have to pass through an access network aRSVP is used to configure an aggregate PHB between nodes A . because it will simply eat up the resources of other flow Because.

they can simply activated Reactive approach. DSCP) Then other users will use pre-configured services. and only solicit a request for upgrade when needed Problem is the reservation of unused resources in anticipation of future need Unused resources can be released until needed. the GW will broadcast a solicit message requiring all ANs to reply with the level of service and cost they can obtain from a specified host domain GW then will apply a selection criteria to choose which AN should provide aRSVP connection Reactive approach does not reserve unused resources like the proactive one However. by reserving services only when needed When services for a new DSCP are needed.e. a certain delay is expected to find the right AN. When needed. by allowing the first or best AN to place an aRSVP request to reserve all classes of traffic (i. and to perform versus reactive aRSVP reservation can be determined from the service policy-provisioning repository 25 .Pro-active and reactive approach          Proactive approach.

are all imported  GW has a common access to SLA. [2] Ad-hoc may employ FQMM. SWAN. TCA. or INSIGNIA. TCA.Ad-hoc QoS interaction with host domain Architecture Architecture Elements [1]. which will use the service policies in order to perform QoS routing SLA. and service provisioning policies 26 . and may be using dRSVP Ad-hoc will have a traffic forwarding algorithm. and service provisioning policies.

End-To-End QoS in MANETs Connected to Fixed Networks DS-SWAN (Diff-SWAN)        New protocol proposed by Remondo. the corresponding nodes in the fixed IP network periodically monitor the average end-to-end delays of the real-time flows DS-SWAN has been designed to combat the effect of congestion due to excess of best-effort traffic on end-to-end delay real-time flows 27 . the ingress edge router periodically monitors the number of Expedited Forwarding (EF) packets that are dropped by its token bucket meter On the other hand. designed to support end-toend QoS in ad-hoc networks connected to fixed DiffServ domain DS-SWAN warns nodes in the ad-hoc networks when congestion is excessive for the correct functioning of real-time applications These nodes react by slowing down best-effort traffic DS-SWAN significantly improves end-to-end delays for real-time flows without starvation of background traffic DS-SWAN.

DS-SWAN for upstream traffic  For Real-time traffic. then besteffort traffic is more efficiently restricted and real-time traffic is not so much 28 influenced by best-effort traffic. the DiffServ service class is the Expedite Forwarding PHB (Peer-Hop Behaviour) The number of dropped packets at the ingress edge router and the end-toend delay of the real-time connection are associated with the QoS parameters of the SWAN model in the ad hoc network  If the rate of the best-effort leaky bucket traffic shaper is lower. thereby maintaining the required QoS .

DS-SWAN for upstream traffic (cont )    When a destination node detects that the end-to-end delay of one VoIP flow approached the threshold (i. becomes greater than 140ms). it sends the message only to the VoIP sources generating flows that have problems to keep their end-to-end delay under 150ms.e. which will obviously also arrive at the intermediate nodes along the routes All these nodes forward the QoS_LOST message to all their neighbours because they may be contending with them for medium access 29 . it sends a QoS_LOST warning to the ingress edge route When the edge router sends a QoS_LOST to the ad hoc network.

DS-SWAN for upstream traffic (cont )    The nodes in the ad hoc network use priority scheduling at the MAC layer to prioritize routing packets and QoS_LOST packets When a node in ad hoc network receives the QoS_LOST message. it will react by modifying the parameter value in the AIMD rate control algorithm Every time that a QoS_LOST message is received . the node decreases the value of c by c-bit/s with a certain minimum value   When no QoS_LOST message is received during T seconds the node increases the value of c by c+bit/s unless the initial value of c has reached For r is opposite of the above results r-> r-bit/s/ c+bit/s 30 .

QoS information in both fixed and ad-hoc networks should be involved This demands an interaction between the sections 31 . I have presented different existing QoS model for wireless ad-hoc networks and a proposed frameworks for ad-hoc interconnectivity with fixed domains INSIGNIA.Conclusion        In this project. each model provide the basics for a more comprehensive model Mobile nodes can connect to the Internet gateways of different types. SWAN. I presented existing classified different level of QoS for hybrid fixed networks In order to achieve an end-to-end QoS approach. FQMM and DS-SWAN. providing different QoS Classified different approach with respect to different mobility scenarios Furthermore.

University of California [7] QoS-aware Routing Based on Bandwidth Estimation for Mobile Ad Hoc networks Lei Chen and Wendi Heinzelman.rochester. Jian Li and Chao Gui.References  David Remondo Catalonia Univ. Schult. [8] Dynamic Quality of Service for Mobile Ad-Hoc Networks M. University of Rochester 32 .berkeley. Antoins Dimakis el (smartnets@uclink. Carleton University [4] A Glance at Quality of Services in Mobile Ad-Hoc Networks Zeinalipour-Yazti Demetrios (csyiazti@cs. University of Rochester{chenlei. The MITRE Corporation [9] Network Architecture to Support QoS in Mobile Ad Hoc Networks Lei Chen and Wendi [5] Quality of Service in Ad-Hoc Networks Eric Chi. of Technology (UPC) [1] Towards End-to-End QoS in Ad-Hoc Networks Connected to Fixed Networks         [2] An architectural framework for MANET QoS interaction with access domains Yasser Morgan and Thomas Kunz. Carleton University [3]A proposal for an ad-hoc network QoS gateway Yasser Morgan and Thomas Kunz. [6] QoS in Mobile Ad Hoc Networks Prasant Mohapatra. D. wheinzel}@ece. Thomson.

Q&A Thank You! Questions? 33 .

Sign up to vote on this title
UsefulNot useful