Skip to main content
Log in

EFT: a high throughput routing metric for IEEE 802.11s wireless mesh networks

  • Published:
annals of telecommunications - annales des télécommunications Aims and scope Submit manuscript

Abstract

In this paper, we present a throughput-maximizing routing metric, referred to as expected forwarding time (EFT), for IEEE 802.11s-based wireless mesh networks. Our study reveals that most of the existing routing metrics select the paths with minimum aggregate transmission time of a packet. However, we show by analyses that, due to the shared nature of the wireless medium, other factors, such as transmission time of the contending nodes and their densities and loads, also affect the performance of routing metrics. We therefore first identify the factors that hinder the forwarding time of a packet. Furthermore, we add a new dimension to our metric by introducing traffic priority into our routing metric design, which, to the best of our knowledge, is completely unaddressed by existing studies. We also show how EFT can be incorporated into the hybrid wireless mesh protocol (HWMP), the path selection protocol used in the IEEE 802.11s draft standard. Finally, we study the performance of EFT through simulations under different network scenarios. Simulation results show that EFT outperforms other routing metrics in terms of average network throughput, end-to-end delay, and packet loss rate.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17
Fig. 18

Similar content being viewed by others

Notes

  1. Hereafter, unless mentioned explicitly, the term MP is used for both MPs and MAPs.

  2. Intra-flow interference occurs when nodes in a single path attempt to transmit packets of the same flow and interfere with each other. Inter-flow interference is the interference suffered among concurrent flows.

References

  1. Akyildiz IF, Wang X, Wang W (2005) Wireless mesh networks: a survey. Comput Netw ISDN Syst 47(4):445–487

    MATH  Google Scholar 

  2. Wang X, Lim AO (2008) IEEE 802.11s wireless mesh networks: framework and challenges. Ad Hoc Netw 6(6):970–984

    Article  Google Scholar 

  3. Jun J, Sichitiu M (2003) The nominal capacity of wireless mesh networks. IEEE Wirel Commun 10(5):8–14

    Article  Google Scholar 

  4. IEEE 802.11s Task Group (2008) Draft amendment to standard for information technology-telecommunications and information exchange between systems–local and metropolitan area networks-specific requirements—part 11: wireless lan medium access control (MAC) and physical layer (PHY) specifications: amendment IEEE p802.11s/d2.02: mesh networking

  5. Waharte S, Ishibashi B, Boutaba R, Meddour D (2008) Performance study of wireless mesh networks routing metrics, pp 1100–1106

  6. Campista M, Esposito P, Moraes I, Costa L, Duarte O, Passos D, de Albuquerque C, Saade D, Rubinstein M (2008) Routing metrics and protocols for wireless mesh networks. IEEE Netw 22(1):6–12

    Article  Google Scholar 

  7. Couto DSJD, Aguayo D, Bicket J, Morris R (2003) A high-throughput path metric for multi-hop wireless routing. In: MobiCom ’03: proceedings of the 9th annual international conference on mobile computing and networking. ACM, New York, pp 134–146

    Chapter  Google Scholar 

  8. Kim KH, Shin KG (2006) On accurate measurement of link quality in multi-hop wireless mesh networks. In: MobiCom ’06: proceedings of the 12th annual international conference on mobile computing and networking. ACM, New York, pp 38–49

    Chapter  Google Scholar 

  9. Draves R, Padhye J, Zill B (2004) Routing in multi-radio, multi-hop wireless mesh networks. In: MobiCom ’04: proceedings of the 10th annual international conference on mobile computing and networking. ACM, New York, pp 114–128

    Chapter  Google Scholar 

  10. Yang Y, Wang J, Kravets R (2006) Load-balanced routing for mesh networks. SIGMOBILE Mob Comput Commun Rev 10(4):3–5

    Article  Google Scholar 

  11. IEEE (2007) IEEE Standard for Information Technology-Telecommunications and Information Exchange between Systems—local and Metropolitan Area Networks-specific Requirements—Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications (2007) IEEE Std 802.11-2007 (Revision of IEEE Std 802.11-1999) pp C1–1184

  12. Ma L, Denko MK (2007) A routing metric for load-balancing in wireless mesh networks. In: AINAW ’07: proceedings of the 21st international conference on advanced information networking and applications workshops. IEEE Computer Society, Washington, DC, pp 409–414

    Google Scholar 

  13. Kamerman A, Monteban L (1997) WaveLAN II: a high-performance wireless lan for the unlicensed band. In: Bell labs technical journal, pp 118–133

  14. Holland G, Vaidya N, Bahl P (2001) A rate-adaptive mac protocol for multi-hop wireless networks. In: MobiCom ’01: proceedings of the 7th annual international conference on mobile computing and networking. ACM, New York, pp 236–251

    Chapter  Google Scholar 

  15. Choi J, Na J, Sup Lim Y, Park K, Kwon Kim C (2008) Collision-aware design of rate adaptation for multi-rate 802.11 WLANs. IEEE J Sel Areas Commun 26(8):1366–1375

    Article  Google Scholar 

  16. Wang J, Zhai H, Fang Y, Yuang M (2004) Opportunistic media access control and rate adaptation for wireless ad hoc networks. In: 2004 IEEE international conference on communications, vol 1, pp 154–158

  17. Joshi T, Ahuja D, Singh D, Agrawal DP (2008) Sara: stochastic automata rate adaptation for IEEE 802.11 networks. IEEE Trans Parallel Distrib Syst 19(11):1579–1590

    Article  Google Scholar 

  18. Bahr M (2006) Proposed routing for IEEE 802.11s WLAN mesh networks. In: WICON ’06: proceedings of the 2nd annual international workshop on wireless internet. ACM, New York, p 5

    Chapter  Google Scholar 

  19. Information Sciences Institute (2008) ns-2 network simulator. Software package. http://www.isi.edu/nsnam/ns/

  20. Yates RD, Goodman DJ (1999) Probability and stochastic processes: a friendly introduction for electrical and computer engineers

  21. Ghahramani S (2004) Fundamentals of probability with stochastic processes, 3rd edn. Prentice Hall, Englewood Cliffs

    Google Scholar 

Download references

Acknowledgement

This work was supported by the IT R&D program of MKE/IITA [2009-F-016-02, CASFI]. Dr. Choong Seon Hong is the corresponding author.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Choong Seon Hong.

Appendices

Appendix

1.1 A. Defer time with traffic priority

For simplicity of analysis, we consider only three classes of traffic, and according to [11], for j = 2,3, defer time (i.e., AIFS[j]) is equal to the duration of DIFS and is constant. However, for low-priority traffic (i.e., j = 1), AIFS[1] = DIFS + d s . Because a node with high-priority traffic can initiate a transmission during the extra slot of the low-priority traffic, a node with low-priority traffic cannot defreeze its backoff counter. Thus, \(d_d^1\) depends on the number of nodes associated with the higher-priority traffic and the probability at which they attempt to transmit. The defer time of traffic class 1 will include the transmission time of the high-priority packet initiated in the extra slot. Furthermore, the number of interruptions can be more than one. Therefore, the defer time of a packet of traffic class 1 is

$$ d_d^1 = {\rm AIFS}[1] + H \times T, $$
(15)

where, H is a random variable representing the number of interruptions in a single defer time and T is a random variable representing the amount of time of each interruption, given by

$$ T = {\rm AIFS}[2/3] + d_{\rm t} + {\rm SIFS} + d_{{\rm ACK}}. $$
(16)

The expected value of T is given by

$$ E[T] = {\rm AIFS}[2/3] + E[d_{\rm t}] + {\rm SIFS} + d_{{\rm ACK}}. $$
(17)

Let, μ 2 and μ 3 denote the probability at which a node with traffic classes 2 and 3, respectively, attempts to transmit in any randomly selected slot. The number of interruptions in a defer time is geometrically distributed with parameter μ, where μ is the probability that at least one high-priority packet transmits. Let n 2 and n 3 be the number of neighbors with traffic classes 2 and 3, respectively, and τ 2 and τ 3 be the probability of their transmissions, respectively. We therefore have

$$ \mu_2 = 1 - (1-\tau_2)^{n_2} $$
(18a)
$$ \mu_3 = 1 - (1-\tau_3)^{n_3} $$
(18b)
$$\begin{array}{lll} \mu &= 1 - (1-\mu_2)(1-\mu_3)\\ & = 1 - (1-\tau_2)^{n_2}(1-\tau_3)^{n_3}\\ & = 1 - (1 -\tau)^{n_2 + n_3} \end{array} $$
(18c)

The expected number of interruptions by a node with a higher-priority packet is therefore \(E[H] = \frac{\mu}{1 - \mu}\).

B. Backoff delay

The backoff time at each transmission attempt depends on the size of the backoff counter (i.e., the size of the contention window), the number of interruptions in the backoff process (which depends on the number of contending neighbors) due to transmissions (either successful or unsuccessful) by the neighbors and the channel quality (transmission rate) of the transmitting neighbors, as well as the defer time after each freezing. Thus, the backoff delay in the i-th transmission attempt (where, i = 0,1,...,M  − 1) of the j-th traffic class \(d_{\rm b}^j(i)\) is given by

$$ d_{\rm b}^j(i) = \sum\limits_{k=1}^{w_i^j}d_s + \sum\limits_{k=1}^{b_i^j} (d_{\rm b} + d_d^j) $$
(19)

At the beginning of the backoff process of the i-th transmission attempt, a node uniformly chooses a backoff value \(w_i^j\) in the range \((0, 2^i \times CW_{\rm min}(j))\), where \(2^i \times CW_{\rm min}(j)\) defines the size of the current contention window for traffic class j. Therefore, the expected size of the backoff counter is \(E[w_i^j] = \frac{w_i^j}{2}\) [20].

If the number of busy slots at the i-th transmission attempt is \(b_i^j\), then a node has to wait \(B_i^j = w_i^j + b_i^j\) slot times so that its backoff value \(w_i^j\) reaches zero and it can start transmission. Let there be n neighbors of a tagged node (the node that is in backoff). Let p t be the probability that there is a transmission in a slot. The probability of a slot being idle is the probability that none of the neighbors transmit in that slot, given by (1 − p t). Now, the expected number of \(B_i^j\) slots required to get \(w_i^j\) idle slots is found by using Pascal distribution [20] with parameters \(w_i^j\) and (1 − p t). Therefore, the expected number of slots is \(E[B_i^j]=\frac{E[w_i^j]}{1-p_{\rm t}}\). The expected number of busy slots can then be calculated as

$$ E[b_i^j]=E[B_i^j]-E[w_i^j]=\frac{w_i^j \times p_{\rm t}}{2(1-p_{\rm t})}. $$
(20)

The expected backoff delay for a packet of the j-th traffic class at the i-th transmission attempt can be found using Wald’s equation [21] as

$$ E[d_{\rm b}^j(i)]= E[w_i^j] \times d_{\rm s} + E[b_i^j]\times (d_{\rm b} + d_{\rm d}^j). \label{eq_backoff_single} $$
(21)

The number of transmission attempts (M) required for a successfully delivered packet has a truncated geometric distribution, with the PMF given by

$$ p[M=i] = \frac{p_{\rm s}(1-p_{\rm s})^i}{1-(1-p_{\rm s})^{M^{\prime}}} [i=0,1,2,...,M^{\prime}-1]. \label{eq_etx} $$
(22)

Thus, by combining Eqs. 21 and 22, the expected backoff delay for a packet of the j-th traffic class is

$$ \label{eq_exp_BO1111} E[d_{\rm b}^j] = \frac{p_{\rm s}}{1-(1-p_{\rm s})^{M^{\prime}}} \sum\limits_{i=0}^{M^{\prime}-1}(1-p_{\rm s})^i.E[d_{\rm b}^j(i)]. $$
(23)

Rights and permissions

Reprints and permissions

About this article

Cite this article

Islam, M.S., Alam, M.M., Hamid, M.A. et al. EFT: a high throughput routing metric for IEEE 802.11s wireless mesh networks. Ann. Telecommun. 65, 247–262 (2010). https://doi.org/10.1007/s12243-009-0130-1

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12243-009-0130-1

Keywords

Navigation