Skip to main content
Log in

Efficient cross-layer protocol for bandwidth-satisfied multicast in multi-rate MANETs

  • Published:
Wireless Networks Aims and scope Submit manuscript

Abstract

Since the multi-rate enhancements have been implemented in 802.11 wireless networks, QoS-constrained multicast protocols for multimedia communication should be adapted to exploit them fully. This work proposes a multicast protocol for data rate selection and bandwidth-satisfied multicast tree determination with an efficient cross-layer design based on the integration of PHY and MAC layers into the network layer. To use bandwidth efficiently and increase network capacity (which is the number of multicast flows supported by the network), we aim to select the combination of data rates and a multicast tree whose total amount of bandwidth consumption to the network is minimal in order to maximize the network capacity. The performance of the proposed protocol is compared with two existing protocols. Simulation results indicate that the proposed protocol has the ability to admit more multicast flows.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17
Fig. 18

Similar content being viewed by others

References

  1. Sinha, P., Sivakumar, R., & Bhanghavan, V. (1999). MCEDAR: Multicast core-extraction distributed ad-hoc routing. Proceedings of the IEEE Wireless Communications and Networking Conference (pp. 1313–1317).

  2. Pagani, E., & Rossi, G. P. (2001). A framework for the admission control of QoS multicast traffic in mobile ad hoc networks. Proceedings of the ACM International Workshop on Wireless Mobile Multimedia (pp. 3–12).

  3. Darehshoorzadeh, A., Dehghan, M., & Motlagh, G. R. J. (2007). Quality of service support for ODMRP multicast routing in ad hoc networks. Lecture Notes in Computer Science (pp. 237–247).

  4. Hu, C. C., Wu, E. H. K., & Chen, G. H. (2008). Bandwidth-satisfied multicast tree in MANETs. IEEE Transations on Mobile Computing, 7(6), 712–723.

    Article  Google Scholar 

  5. Jurdak, R. (2007). Wireless ad hoc and sensor networks: A cross-layer design perspective. New York: Springer.

  6. Chou, C. T., Liu, B. H., & Misra, A. (2007). Maximizing broadcast and multicast traffic load through link-rate diversity in wireless mesh networks. Proceedings of the IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (pp. 1–12).

  7. Chou, C. T., Misra, A., & Qadir, J. (2006). Low latency broadcast in multirate wireless mesh networks. IEEE Journal on Selected Areas in Communications, 24(11), 2081–2091.

    Article  Google Scholar 

  8. Liu, B. H., Chou, C. T., Misra, A., & Jha, S. (2008). Rate-diversity and resource-aware broadcast and multicast in multi-rate wireless mesh networks. ACM/Kluwer Mobile Networks and Applications, 13, 38–53.

    Article  Google Scholar 

  9. Sivakumar, R., Sinha, P., & Bharghavan, V. (1999). CEDAR: A core-extraction distributed ad hoc routing algorithm. IEEE Journal on Selected Areas in Communications, 17, 1454–1465.

    Article  Google Scholar 

  10. Lee, S. J., & Gerla, M. (2002). On-demand multicast routing protocol in multihop wireless mobile networks. ACM/Kluwer Mobile Networks and Applications, 7, 441–453.

    Article  Google Scholar 

  11. Yang, Y., & Kravets, R. (2005). Content-aware admission control for ad hoc networks. IEEE Transactions on Mobile Computing, 4(4), 363–377.

    Article  Google Scholar 

  12. Chen, L., & Heinzelman, W. (2005). Qos-aware routing based on bandwidth estimation for mobile ad hoc networks. IEEE Journal on Selected Areas in Communications, 23(3), 561–572.

    Article  Google Scholar 

  13. Hu, C. C., Wu, E. H. K., & Chen, G. H. (2005). Two bandwidth-violation problems and bandwidth-satisfied multicast trees in MANETs. Proceedings of IFIP International Conference on Personal Wireless Communications (PWC) (pp. 51–58).

  14. IEEE. (1999). Wireless LAN medium access control (MAC) and physical layer (PHY) Sp ec. IEEE 802.11 standard.

  15. Kamerman, A., & Monteban, L. (1997). WaveLAN-II: A high-performance wireless LAN for the unlicensed band. Bell Labs Technical Journal, 2(Summer), 118–133.

    Google Scholar 

  16. Holland, G., Vaidya, N., & Bahl, P. (2001, July 1). A rate-adaptive MAC protocol for multi-hop wireless networks. Proceedings of ACM SIGMOBILE (pp. 236–250). Rome, Italy.

  17. Ge, W., Zhang, J., & Shen, S. (2005). Rate optimization for MAC layer multicast in wireless networks. Proceedings of IEEE GLOBECOM (pp. 2986–2990).

  18. Chaporkar, P., & Sarkar, S. (2005). Wireless multicast: Theory and approaches. IEEE Transactions on Information Theory, 51(6), 1954–1972.

    Article  MathSciNet  Google Scholar 

  19. Kuri, J., & Kasera, S. K. (2001). Reliable multicast in multi-access wireless LANs. Wireless Networks, 7(4), 359–369.

    Article  MATH  Google Scholar 

  20. Gupta, S. K. S., Shankar, V., & Lalwani, S. (2003). Reliable multicast MAC protocol for wireless LANs. Proceedings of IEEE ICC (pp. 93–97). Anchorage.

  21. Seok, Y., & Choi, Y. (2003). Efficient multicast supporting in multi-rate wireless local area networks. Lecture Notes in Computer Science (pp. 273–283).

  22. Villalon, J., Cuenca, P., Orozco-Barbosa, L., Seok, Y., & Turletti, T. (2007). ARSM: A cross-layer auto rate selection multicast mechanism for multi-rate wireless LANs. IET Communications, 1(5), 893–902.

    Article  Google Scholar 

  23. Ge, W., Zhang, J., & Shen, S. (2007). A cross-layer design approach to multicast in wireless networks. IEEE Transactions on Wireless Communications, 6(3), 1063–1071.

    Article  Google Scholar 

  24. Lim, H., Jung, D., Hwang, J., Park, K.-J., & Hou, J. C. (2007). Contention control for high end-to-end throughput performance of wireless mesh networks. Third Annual International Wireless Internet Conference (pp. 22–24).

  25. Muqattash, A., & Krunz, M. (2005). POWMAC: A single-channel power-control protocol for throughput enhancement in wireless ad hoc networks. IEEE Journal on Selected Areas in Communications, 23(5), 1067–1084.

    Article  Google Scholar 

  26. Cerveira, C. R., & Costa, L. H. M. K. (2006). A time-based admission control mechanism for IEEE 802.11 ad hoc networks. Mobile and Wireless Communication Networks, 211, 217–228.

    Article  Google Scholar 

  27. Xi, Y., Wei, J. B., & Zhuang, Z. W. (2005). Throughput analysis of IEEE 802.11 DCF over correlated fading channel in MANET. Proceedings of the International Conference on Wireless Communications, Networking and Mobile Computing, 2, 694–697.

  28. Jiang, S., He, D., & Rao, J. (2005). A prediction-based link availability estimation for routing metrics in MANETs. IEEE/ACM Transactions Network, 13(6), 1302–1312.

    Article  Google Scholar 

  29. Agrawal, P., Anvekar, D. K., & Narendran, B. (1994). Optimal prioritization of handovers in mobile cellular networks. Proceeding of the IEEE PIMRC (pp. 1393–1398).

  30. Narendran, B., Agrawal, P., & Anvekar, D. K. (1994). Minimizing cellular handover failures without channel utilization loss. Proceedings of the IEEE GLOBECOM (pp. 1679–1685).

  31. Toh, C. K. (1997). Associativity-based routing for ad hoc networks. Wireless Personal Communications (pp. 103–139).

  32. Toh, C. K. (1996). Wireless ATM & ad-hoc networks. The Netherlands: Kluwer.

  33. Network Simulator (Version 2). http://www-mash.cs.berkeley.edu/ns/.

  34. Geoffrion, A., & Marsten, R. (1972). Integer programming algorithms: A framework and state-of-the-art survey. Management Science, 18, 465–491.

    Article  MATH  MathSciNet  Google Scholar 

  35. Nain, P., Towsley, D., Liu, B., & Liu, Z. (2005). Properties of random direction model. Proceeding of the IEEE INFOCOM.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Chia-Cheng Hu.

Appendices

Appendix 1: Minimum_B_Tree

Minimum_B_Tree is executed by a repeat-until loop. Without loss of generality, assume \( D = \{ v_{{d_{1} }} ,v_{{d_{2} }} , \ldots ,v_{{d_{c} }} \} \), where c = |D| and \( v_{{d_{i} }} \) is the ith client in D. The execution of the repeat-until loop consists of multiple iterations and terminates when D becomes empty. At each iteration of the repeat-until loop, a for-next loop is executed to determine a route (i.e., P i ), a set (i.e., X i ) of data rates, and the weight (w i ) of the combination (i.e., X i and P i ) for the ith client \( v_{{d_{i} }} \) in D by invoking Minimum_B_Routes. After the for-next loop has been executed, vy ∈ D is obtained so that its determined combination with the smallest weight, i.e., \( w_{y} = \min \{ w_{k} \left| {v_{k} } \right. \in D\} \). Then v y is connected to the server v s and deleted from D.

Initially, set Δ = {} and F = {v s }. The execution of the for-next loop consists of |D| iterations. At the first iteration of the repeat-until loop, all bandwidth-satisfied routes from v s to all clients are obtained as a consequence by the execution of the for-next loop. The client with the route, whose weight is the smallest among the routes to v s , is selected as v y . Then, X/F/Δ are replaced by X ∪ X y /F ∪ Py/Δ ∪ {v y }, and v y is removed from D. Notably, P y is a bandwidth-satisfied route from v s to v y .

At the second iteration of the repeat-until loop, a bandwidth-satisfied multicast tree is constructed. For each client \( v_{{d_{i} }} \) in D, the for-next loop is executed to find the bandwidth-satisfied routes P i s from some forwarders ∈ F to \( v_{{d_{i} }} \). After the execution of the for-next loop, the client, say \( v_{{d_{l} }} \) (1 ≤ l ≤ c), is selected as v y . Then, X/F/Δ are updated accordingly, and v y is removed from D. The resulting multicast tree, which can be represented by F, connects v s to two clients. Notably, the multicast tree is bandwidth-satisfied and HMRP can be avoided, as a consequence by executing Minimum_B_Routes (The input parameters X/F/Δ are updated at the first iteration of the repeat-until loop).

Similarly, a bandwidth-satisfied multicast tree (represented by X and F) that connects v s to three clients is obtained at the third iteration of the repeat-until loop. When the execution of the repeat-until loop at the tth iteration of the outer for-next loop terminates, X and F represent a bandwidth-satisfied multicast tree that connects v s to \( v_{{d_{1} }} ,v_{{d_{2} }} , \ldots v_{{d_{c} }} \). The algorithm Minimum_B_Tree is detailed below.

Appendix 2: Minimum_B_Routes

Minimum_B_Routes has five input parameters—v d , b_req, X, F and Δ. It also has three output parameters—X d , P d and w d . Let Pi,d be the set of forwarders along the v i  − d i route, Xi,d be the set of determined data rates used by the forwarders in Pi,d, and wi,d is the total blocked time induced by the forwarders in Pi,d, where \( w_{i,d} = \sum\nolimits_{{j \in P_{i,d} }} {w_{j} } \). Here, w j is the blocked time induced by forwarder v j . With v j ’s data rate r j recorded in Xi,d, we define \( w_{j} = {\frac{{|I_{{j,r_{j} }} \cup II_{{j,r_{j} }} \cup \{ v_{j} \} |}}{{r_{j} }}} \), where \( I_{{j,r_{j} }} (II_{{j,r_{j} }} ) \) is the set of r j -one-hop (r j -two-hop) neighboring hosts of v j . The execution of Minimum_B_Routes invokes another procedure, B_Violation, which returns true if a bandwidth violation happens and false otherwise.

Initially In the first for-next loop of Minimum_B_Routes, set r i to the maximum available data rate between v i and v d in order to minimize w i,d for every \( v_{i} \in N \). The maximum available data rate between v i and v d can be obtained by comparing the “Receiving SINR” column of one-hop neighbor table of v d with the SINR thresholds of each data rate, and select the maximum SINR threshold which is not larger than the “Receiving SINR” column of one-hop neighbor table of v d . Recall that in the multi-rate MANETs, if the SINR value from a transmitter to a receiver exceeds the threshold θ t , then the transmitter can transmit data packets to the receiver successfully by using r t .

If v i is a forwarder in the routes to the other destinations, i.e., \( v_{i} \in F \), and will not cause delay violation when invoking B_Violation, Minimum_B_Routes terminates since v d can receive the packets from the forwarder v i . If v i is not a forwarder and will not cause delay violation by using r i when invoking B_Violation, set \( w_{i,d} = {\frac{{|I_{{i,r_{i} }} \cup II_{{i,r_{i} }} \cup \{ v_{i} \} |}}{{r_{i} }}},P_{i,d} = \{ v_{i} \} ; \) \( R_{i,d} = \{ r_{i} \} \). In the two cases of causing delay violation or the case of \( v_{d} \notin I_{{i,\gamma_{i} }} \), set \( P_{i,d} \leftarrow \{ \} ,X_{i,d} \leftarrow \{ \} \,{\text{and}}\,w_{i,d} \leftarrow \infty \).

The routes are established iteratively by a repeat-until loop. In each iteration, a host v x with minimum w x,d that has not already been selected is determined. Then, for each r 1-one-hop neighbor v j of v x , the v j  − v d route (i.e., P j,d) is replaced with the v x  − v d route that is augmented with the v j v x hop (i.e., \( P_{j,d} \cup \{ v_{x} \} \)), and the set of determined data rates (i.e., X j,d) is replaced with \( \{ r_{j} \} \cup X_{x,d} \), if the new v j  − v d route has smaller w j,d than the old v j  − v d route and does not cause a bandwidth violation. After the execution of the repeat-until loop, all bandwidth-satisfied routes (i.e., P 1,d , P 2,d ,…, P |N| ) from all hosts to v d are obtained as a consequence of executing the for-next loop. A forwarder v y  ∈ F is selected, where \( w_{y,d} = { \min }\left\{ {\left. {w_{k,d} } \right|v_{k} \in F} \right\} \). Minimum_B_Routes is detailed below.

Appendix 3: B_Violation

B_Violation has four input parameters—b_req, X, F, and Δ, which are inherited from Minimum_B_Routes. Let \( M = \Updelta \cup F \cup \bigcup\limits_{{v_{j} \in F,r_{j} \in X}} {(I_{{j,\gamma_{j} }} \cup II_{{j,\gamma_{j} }} )} \). B_Violation checks whether the forwarders in F cause a bandwidth violation to the hosts in M. Checking the hosts in \( \bigcup\limits_{{v_{j} \in F,r_{j} \in X}} {(I_{{j,\gamma_{j} }} \cup II_{{j,\gamma_{j} }} )} \) can avoid HRP happened to the ongoing flows. Bandwidth violation happens at a host v i in M if the total increment of blocked time that is induced by the forwarders in F exceeds the idle time of v i , i.e., i_time i . If a bandwidth violation happens, then B_Violation returns true. Finally, B_Violation returns false, if no bandwidth violation happens. B_Violation is detailed below.

Appendix 4: Information collection

Initially, set Ň i  = {N i } and I_time i  = {i_time i }. Upon receiving a b_join_reply from a host, say v β , Ň i (I_time i ) is replaced with Ň i ∪ Ň β , (I_time i ∪ I_time β ). The algorithm is elaborated below.

  1. (1)

    The server v s performs the following.

    1. (1.1)

      Set hopcount = 0.

    2. (1.2)

      Transmit a b_join_query(hopcount) to its neighbors.

    3. (1.3)

      Wait for b_join_replys from its neighbors for a period of 2 × (maxhopcount − 1) × t.

  2. (2)

    Upon receiving a non-redundant b_join_query(hopcount) from a host, say v α , a host v i performs the following.

    1. (2.1)

      Set Ň i  = {N i } and I_time i  = {i_time i }.

    2. (2.2)

      If hopcount < maxhopcount − 1, perform the following.

      1. (2.2.1)

        Set hopcount = hopcount + 1.

      2. (2.2.2)

        Transmit b_join_query(hopcount) to its neighbors.

      3. (2.2.3)

        Wait for b_join_replys from its neighbors for a period of 2 × (maxhopcount − 1 − hopcount) × t.

    3. (2.3)

      If hopcount = maxhopcount − 1, reply a b_join_reply(Ň i , I_time i ) to v α .

  3. (3)

    Upon receiving a b_join_reply(Ň β , I_time β ) from a host, say v β , a host v i performs the following.

    1. (3.1)

      Set Ň i  = Ň i  ∪ Ň β and I_time i  = I_time i  ∪ I_time β .

When a timeout occurs at step (2.2.3), v i replies with a b_join_reply(Ň i , I_time i ) to v α. Finally, the algorithm terminates when a timeout occurs at step (1.3), and v s can obtain all t_snr i,j and i_time i s from Ň s and I_time s , respectively.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Hu, CC. Efficient cross-layer protocol for bandwidth-satisfied multicast in multi-rate MANETs. Wireless Netw 17, 739–757 (2011). https://doi.org/10.1007/s11276-010-0312-9

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11276-010-0312-9

Keywords

Navigation