CAR: Coding-Aware Opportunistic Routing in Wireless Mesh Networks

Size: px
Start display at page:

Download "CAR: Coding-Aware Opportunistic Routing in Wireless Mesh Networks"

Transcription

1 : Coding-Aware Opportunistic Routing in Wireless Mesh Networks Hongquan Liu and Yuantao Gu Received Jan., 3 Abstract An intermediate node in inter-flow network coding scheme, such as, needs to know exactly which are the previous hop and next hop of a packet before coding. It is difficult to incorporate inter-flow network coding into Opportunistic Routing (OR) because the next hop of a packet in OR can t be determined in advanced. is proposed in this paper to address this problem. Meanwhile, it aims to maximize the number of native packets coded in each single transmission. Opportunistic transmission may increase coding opportunities and the introduced small forwarding delay in also adds extra network coding chances. This introduced delay is variable. gives the coded packet that consists of a larger number of native packets with a smaller forwarding delay. The forwarder with the largest number of native packets coded together is ultimately selected to send data. Simulations demonstrate that achieves significantly throughput gains and derives a reasonable end-to-end delay in both cross topology and mesh topology under both TCP and UDP traffic. achieves 43% and 36% throughput improvement under TCP traffic and 34% and 5% throughput improvement under UDP traffic, compared to and in cross topology, respectively. also obtains a significant throughout gain in a large scale network (mesh topology). The end-to-end delay of is far smaller than that of and. significantly improves network performance of a WMN. Keywords: Network coding, opportunistic routing, wireless mesh networks. Introduction Wireless Mesh Network (WMN) is an efficient technology for broadband Internet access, but it also suffers low throughput due to the inherent broadcast characteristics like other wireless networks. Network coding and opportunistic routing are two popular mechanisms to improve the performance of WMNs by exploiting the broadcast nature of wireless medium and the path diversity that exists in the underlying network. This work was supported partially by the National Natural Science Foundation of CHINA (8787 and U8353). The authors are with Department of Electronic Engineering, Tsinghua University, Beijing 84, China. The corresponding author of this paper is Yuantao Gu ( gyt@tsinghua.edu.cn).

2 There are mainly two benefits when employing network coding. Firstly, network coding makes intra-flow packet transmission more reliable. For n native packets that need to be sent, source node and intermediate nodes are allowed to generate redundant coded packets before lossy links. The destination node may recover these n native packets as long as it has received n different coded packets, even if some of the coded packets are lost in transmission. By doing this, packet losses are masked and data transmissions are robust []. Secondly, network coding makes inter-flow packet transmission more efficient. A wireless node in promiscuous mode can perform opportunistic listening by exploiting the broadcast nature of wireless channel and obtain the information about what packets its neighbors have sent and received []. An intermediate wireless node tries its best to maximize the number of native packets forwarded in one single transmission as long as all the intended destinations are able to extract their native packets from the coded one. Opportunistic Routing (OR) has emerged as an efficient routing paradigm for improving transmission reliability and efficiency in wireless network. The first implementation of OR was proposed in [3]. Unlike classical unicast routing approaches, the next hop in OR isn t known before a packet is delivered. A packet in source node is delivered by broadcast. All the nodes are ranked based on some metric (e.g., ETX [4], hop count, etc). Any node that overhears this sending packet is regarded as the potential next hop as long as its rank is better than the sender. The best one among those potential next hops that receive this packet is selected as the ultimate next hop. This next hop repeats the same operation until this packet is received by the intended destination node. OR fully embraces the broadcast nature of wireless medium and exploits the multi-user diversity feature in WMNs. With OR, the probability of at least one of the potential next hops correctly receives a packet during one transmission is usually higher than that with classical routing approaches. Therefore, the retransmission probability is reduced and network throughput is increased with OR. As stated above, both network coding and OR can take advantage of the broadcast nature of WMNs. Incorporating intra-flow network coding into OR may complement each other. For instance, a router and its next hops in OR need to exchange state information (i.e., scheduling overhead) between each other for coordination. This scheduling overhead can be partially eliminated by network coding. Assuming there are n native packets that need to be sent at source, next hops along the paths may generate and send a random linear combination of received packets, instead of simply saving and forwarding data. These combination procedures are only based on local packet information and don t require to exchange state information. The intended destination can obtain these n native packets as long as it has received n different coded packets from different paths. MORE [5] is the first practical approach that combines network coding and OR together. MORE and its variants [6 ] are only for intra-flow packet delivery. An intermediate node in inter-flow network coding scheme such as [] needs to know exactly what the previous hop and next hop of a packet is before it starts coding. In contrast, the next hop of a packet in OR protocol can t be determined in advanced. Therefore, it is difficult to incorporate inter-flow

3 network coding into OR []. In this paper, we present, a Coding-Aware opportunistic Routing (), to address the issue of integration of inter-flow network coding and OR. It utilizes OR to maximize the number of native packets that coded in a single transmission, instead of to increase the successful receiving probability. proactively creates coding opportunities by opportunistic transmission. The router with the largest number of native packets that can be coded together among all the potential next hops is usually selected to send data. tries its best to deliver more packets in each transmission. Network throughput is significantly improved by. is compatible with higer layer protocols and works well with both TCP and UDP flows. We implement in NS and evaluate it in mesh topology with both TCP and UDP traffic. There is nearly no additional overhead for node coordination except for the information of received packets at each router which is piggybacked on header. The rest of this paper is organized as follows. Section II is the related work. Section III presents the basic idea of. The detail of is introduced in section IV. Performance evaluation is given in section V. Finally, section VI concludes the whole paper. Related work [] is the first practical implementation that increases network throughput with inter-flow network coding. A wireless node XORs several native inter-flow packets together and sends it via pseudo-broadcast as long as it finds all the intended next hops given by ETX-like [4] routings are able to extract the packet intended to them. Thus several native packets are delivered in one single transmission. Clearly, network throughput is improved. can only capture the coding opportunities along the paths given by routing protocols. Inspired by, several coding-aware routing protocols [ 5] were proposed. These protocols proposed some new metrics based on which packets are routed via paths with more coding opportunities. [, 3] formulated the coding-aware routing problem as a linear programming. Their proposed approaches are centralized protocols and not suitable for being deployed in WMNs due to the scalability problem. [4, 5] are distributed protocols which makes them easy to be implemented in practical networks. However, The coding opportunities at a node may change over time which may cause that some suboptimal paths are selected by these protocols [ 5]. [6] is also a MAC-layer mixing method like, but it proactively capture coding opportunities by allowing neighbors of a intended next hop to send coded packets. But can only recognize coding opportunities not the quality of coding opportunities. Therefore, the number of native packets coded together in each transmission isn t maximized. [] [7] extended to mix both inter and intra flows. ExOR [3] is the fist practical implementation of OR. ExOR and its variant [8] rely on priority-based forwarding to achieve opportunistic transmission. The router with the lowest 3

4 remaining cost to the ultimate destination is usually chosen to forward packets. MORE [5] first combines network coding and OR together. MORE and its variants [6 9] are only for intra-flow packet delivery. CORE [9] incorporates localized inter-flow network coding into OR to improve the throughput performance of a WMN. It aims to maximize the coding opportunities at the next hop. To achieve this goal, XORed packet with the most number of intended receivers is allowed to be sent. CORE isn t optimal because it can t make sure that the number of native packets that coded in each transmission is maximized. 3 System model A wireless mesh network is modeled as a directed graph G = (V, E), where V is the set of mesh nodes and E is the set of wireless links. All the wireless nodes in the network are communicated with each other via a same channel. Therefore, there is radio frequency interference among them. Radios on each node are omnidirectional and have a communication distance(d c ) and a interference distance (D i ), where D i > D c. Only one of the nodes in an interference range can send packets at the same time. Let S be the set of unicast flows, and each flow s S has a source node, Src(s) V and a destination node, Dst(s) V, and is associated with a rate x s. 4 Basic idea aims to maximize the number of native packets that coded in a single transmission with opportunistic transmission. The potential coding opportunity may be significantly reduced by classical routing. To illustrate, let s consider the example in Fig. where packet p goes from node A to node C, packet p goes from node C to node A, and another packet p 3 goes from node E to node B. As shown in Fig. (a), with classical routing such as shortest-path routing or ETX-like [4] routing, the disjoint paths may be chosen. In this case, there is no coding opportunity. On the other hand, if we use a opportunistic routing decision as illustrated in Fig. (b), packets p, p and p 3 will be received by all the neighbors of the senders. Then nodes B, D and E all have coding opportunities. Nodes B and E can forward p p, and node D can forward p p p3. All the coding opportunities are exploited. To maximize the number of native packets that coded in a single transmission, sets different coding opportunities with different priorities. The more native packets that can be coded together there are, the higher priority this coding opportunity is. Therefore, the coding opportunity on node D has a higher priority and p p p3 is forwarded by. Clearly, the network throughput is improved. combines distributed inter-flow network coding with opportunistic routing to improve the throughput of a WMN. All the wireless nodes are set in the promiscuous mode. When a native packet is sent, all the potential next hops receive this packet by opportunistic listening. The one with the largest number of native packets that coded together is chosen 4

5 (a) Classical routing (b) Opportunistic routing Figure : Example: effect of routing decision on the number of native packets that coded in a single transmission. to send packet. The potential next hops of this coded packet receive and decode this packet. Then they start to find native packets that can be coded in a single transmission and the one with the largest number is chosen again. This process is continued until all the packets are received by their intended destinations. 5 design In this section, the design details of are introduced. is designed to maximize the number of native packets coded together in each transmission and ultimately increase network throughput. In order to address this issue, we have to deal with the following challenges. Choose proper next hops. Due to the multi-user diversity, a packet may be received by all the neighbors of the sender via opportunistic transmission. The key question is how to choose the set of next hops for this packet to maximize coding chances. Recognize coding opportunities. There may be multiple flows at a node. should know what flows and what packets to code together. In other words, it should know whether the intended next hops can decode a coded packet. Choose best next hop. The next hops of a native packet are all allowed to send this packet. should choose the one with the largest number of native packets that coded together as the best next hop to send data. Meanwhile, other potential next hops of these native packets in this coded packets shouldn t send them. consists of three components to address the challenges above, which are opportunistic transmission, coding opportunity recognition and priority-based forwarding. Table defines the terms used in the rest of this study. 5

6 Table : Definitions of terms used in this study Term Native Packet Coded or XORed Packet Flow Id Packet Id PrevHops(i) NextHops(i) Default Nexthop(i) Coding Group Output Queue(i) Sent Queue(i) Neighbor Packet List (m, i) Overheard Packet List (m, i) Definition Non-coded packet A packet which is the XOR of several native packets A 3-bit hash of the flow s IP source and destination addresses The packet s IP sequence number The set of potential previous hops for flow i at each node The set of potential next hops for flow i at each node the next hop with the shortest path to the destination of flow i at each node The group of flows that may be coded together at each node The packet queue of flow i sorted by packet id at each node, where it keeps the packets of flow i it needs to forward The packet queue of flow i sorted by packet id at each node, where it keeps the recent N packets of flow i it has forwarded The sorted packet list of flow i at each node, where it keeps the recent N packets of flow i at node m The sorted packet list of flow i at each node, where it keeps the recent N overheard packets of flow i that node m may have received 5. Opportunistic transmission In order to effectively exploit the multi-user diversity of opportunistic transmission, should carefully choose the NextHops and PrevHops for each flow at each node. Like classical shortest path routing protocols (e.g., DSDV, etc), collects the information of hop count to other nodes at each node. In this study, we assume that all nodes are equipped with GPS receivers, therefore they have the geo-positions of themselves. also collects the geo-positions of all nodes in the network at each node. Every node also saves the hop count information of its neighbors to other nodes. 6

7 When a node wants to forward a packet, any neighbor that may potentially facilitate this packet forwarding to the destination and increase network coding chances should be included in the NextHops of this packet at this node. Based on this principal, NextHops(i) at node n should satisfy the following constraints. Any node in NextHops(i) is the neighbor of node n. The hop count to the destination of flow i at any node in NextHops(i) is less than or equal to that at node n. Nodes in NextHops(i) are closer to the destination of flow i than node n. Default Nexthop(i) is must be included in NextHops(i). If the destination of flow i is in NextHops(i), NextHops(i) only consists of this destination node. Similarly, PrevHops(i) at node n should satisfy the following constraints. Any node in PrevHops(i) is the neighbor of node n. The hop count to the destination of flow i at any node in PrevHops(i) is greater than or equal to that at node n. Nodes in PrevHops(i) are further to the destination of flow i than node n. By doing this, a native packet is closer to its destination after each transmission. Meanwhile, coding opportunities are maximized. 5. coding opportunity recognition There are three steps to process inter-flow network coding which are saving native packets, collecting packet information of neighborhood and recognizing coding opportunity. 5.. Save native packets Each flow maintains an output queue and a new received packet of flow i is buffered in Output Queue(i) at each node. 5.. Collect packet information of neighborhood inserts a variable-length network coding header in each packet to help deliver packet information, as shown in Fig.. It has two ways to collect the packet information of neighborhood. 7

8 MAC Header Header IP Header ENCODED_LEN SRC_IP DEFAULT_ NEXTHOP REPORT_LEN FLOW_ID LAST_SEQ DST_IP PKT_ID BitMap Coded Packets Information Reception Reports Figure : header. Reception reports. When node n receives a packet from its neighbor m, it can get the ids of recently heard packets of all the flows at node m by reception reports in the header, as shown in Fig.. For example, a report of the form {,, } means that the largest packet id of flow at node m is, and node m also has packets 99, 97, 94 and 9 of flow. Node n then inserts these packet ids in the Neighbor Packet List (m, ) Snooping. When a node receives a packet from node m, it guesses whether its neighbors can receive one of the native packets in this coded packet according to the positions of them. This procedure is illustrated in Algorithm. Algorithm Snooping Procedure for Neighbor n = to M && n m do for Flow i = to ENCODED LEN do if n NextHops(i), then flag = for j = to ENCODED LEN && j i do flag = flag & (n PrevHops(j)? : ) end for if flag ==, then Insert the PKT ID of flow i into Overheard Packet List (n, i) end for end for return 8

9 5..3 Recognize coding opportunity In order to facilitate coding opportunity recognition, first creates a set of Coding Group which are the flows that can potentially coded together, when a node receives a new flow. This procedure is illustrated in Algorithm. Algorithm Creating Coding Group Procedure Coding Group Set = When receiving a new flow i, for Group k = to S Coding Group Set do if j Group k, PrevHops(i) NextHops(j) && NextHops(i) PrevHops(j), then Insert i in Group k end for Insert Group {i} in Coding Group Set Sort Coding Group Set by group size When wants to find native packets that can be coded together, it just needs to search in the Coding Group Set. It searches from large group (i.e., a group with a large number of flows) to small group and it will stop searching when it judge that, if it combines the head packets in the Output Queue of flows in the current group, all the flows have at least one potential next hop can decode this XORed packet. This searching coding native packets procedure is illustrated in Algorithm 3. Algorithm 3 Searching Coding Native Packets Procedure for Group k = S to Coding Group Set do flag = for i = k.begin to k.end, do if m PrevHops(j), j Group k\{i}, the head of Output Queue(i) Neighbor Packet List (m, j) Overheard Packet List (m, j) then continue else flag = break if flag == then return all the heads of Output Queue of flows in Group k end for return 9

10 5.3 Priority-based forwarding A native packet is received by a set of next hops. introduces variable and small forwarding delays to make as many native packets as possible are coded in a single transmission. It gives the coded packet that has a larger number of native packets with a smaller forwarding delay. In other words, a coded packet with a larger number of native packets is given with a higher priority to be forwarded. Once a native packet is forwarded by one of the NextHops, the other nodes in the NextHops move this native packet from Output Queue to Sent Queue when they overhear this coded packet. There are no overhead packets for coordination between the set of NextHops in. Each intermediate node has a forwarding timer (T ). The interval of this timer, T, is proportional to the number of encodable native packets (denoted by S) and it is set by (). { T if S 4, = () T/S else, where T is a constant time interval and is set to a large-enough value (e.g.,.s) to increase coding opportunities and make the coded packet with largest number of native packets coded together to be first transmitted. We describe our decoding and encoding procedure in Algorithm 4. Intermediate nodes that aren t the Default Nexthop of a flow aren t allowed to forwarded a single native packet of this flow, as shown in Algorithm 4. By doing this, packets are forwarded along shortest paths if there are no coding opportunities. In terms of TCP flow, ACK packets are forwarded along shortest paths without opportunistic transmission to reduce transmission delay. ACK packets are coded with themselves alone. 6 Performance evaluation In this section, simulation results under NS- are presented. is evaluated in various scenarios and compared with and under both TCP flows and UDP flows. The MAC -layer protocol is IEEE 8.b. The transmission range is set to 5m and the interfering (carrier sensing) range is 55m. The packet size is set to bytes and the duration of all the flows in simulation is 5s. We use a cross topology and a 5 5 mesh topology to test the performance of, as seen in Fig. 3. The distances in the two orthogonal directions in these two topologies are set to 5m.

11 Algorithm 4 Decoding and Encoding Procedure Overhear a packet for i = to ENCODED LEN do k = the hash of SRC IP[i] and DST IP[i] if this node NextHops(k) at previous hop then Check whether packet PKT ID[j], j {,,..., ENCODED LEN}\{i} is in the Output Queue or Sent Queue if true then XOR these packets with this packet and get native packet PKT ID[i], save it in Output Queue(k). Packet Group = that returned by Algorithm 3, its size is S, set T by () if forwarding timer(t ) isn t started then Start it else if this node = DEFAULT NEXTHOP[i]then Send a decoding failure notification to the sender of this packet if previous hop NextHop(k) then Move packet PKT ID[i] from Output Queue(k) to Sent Queue(k), if exist end for for i = to REPORT LEN do k = FLOW ID[i] if previous hop NextHop(k) then Move packets {LAST SEQ[i] BitMap[i]} from Output Queue(k) to Sent Queue(k), if exist end for Forwarding Timer(T ) Expires Packet Group = that returned by Algorithm 3, its size is S if S > then XOR these native packets and send it, Move these packets from Output Queue to Sent Queue else Among all the flows whose Default Nexthop is this node, pick the one whose Output Queue header is the earliest received Send the header of this flow

12 5m 5 5m 3 4 (a) (b) Figure 3: Topologies for simulation. (a) Cross topology. (b) Mesh topology.

13 6. Cross topology In this topology, there are four -hop flows that send packets from sources to destinations, as seen in Fig. 3(a). We first study the performance of under TCP traffic. Fig. 4(a) is the aggregate throughput of TCP traffic supported by IEEE 8.,, and. far outperforms and in throughput. The throughput gain of relative to 8. is 56.8%, which is nearly 4 times to that (4.9%) of, as seen in Fig. 4(b). This means that is more effective in seizing network coding opportunities than and, as demonstrated in Fig. 4(c). Fig. 4(c) shows the distribution of the number of native packets in a single transmission at node 5 in Fig. 3(a). We can see that, under protocol, most of the coded packets at node 5 consist of 4 native TCP packets, and the result is a high throughput gain (56.8%). Under TCP traffic, achieves 43% and 36% throughput improvement compared to and, respectively. introduces a variable and small delay at each forwarder and the added delay has two benefits. First, it increases coding opportunities. Second, it allows the node with the largest number of native packets coded in a packet has the highest priority to access the medium. As a result, is better than other approaches at creating and seizing coding opportunities, as demonstrated in Fig. 4. We also examine the effects of average end-to-end delay and fairness of and compare it with 8., and. As shown in Fig. 5(a), the average end-to-end delay of is smaller and much more stable than that of 8., and. The reason is that is more effective to forward packets and it make packets wait less time in the queue. We use the fairness index define in () to evaluate the fairness performance. The more close to this index is, the more fairness it is. The fairness feature of 8. and is less stable compared with and. The index of is bigger than which means the wireless medium is more fairly allocated to different flows by. tries its best to forward more inter-flow packets in a transmission. Therefore, the resource is more fairly allocated by. F I = ( N i= f i) N N i= f, () i where f i is the rate of flow i and N is the total number of flows in simulation. Next, let us examine the performance of our proposed protocol under UDP traffic. The interval of UDP packets is set to.s. As seen in Fig. 6(a)(b), still far outperforms and and its throughput gain is 76.8%. Fig. 6(b) shows that the achieved throughput gains of and are much higher than those in Fig. 4(b), which mean that and is more suitable for UDP traffic forwarding. In other words, compared with, and aren t good at dealing with bi-direction flows (e.g., TCP flows) that involve both large and small packets. Under UDP traffic, achieves 34% and 5% throughput improvement compared to and, respectively. Fig. 4(c) shows the PDF of the number of UDP packets coded in a single transmission 3

14 Average end-to-end dela Fairness index (a) (b) Throughput (# of pkt) 3.6 x Throughput gain(%) (a) (b) (c) Percentage x x 3x 4x 4 Figure x 4 4: Results of TCP traffic in cross topology. (a) Total throughput. (b) Throughput x 3.5 x gain. (c) Distribution of number 3x of native packets coded together. 3 4x.5 Pkt.5.5 UDP TCP Average end-to-end delay (s) Fairness index (a) (b) 3.6 x 4 4 Figure 5: Effects of delay and fairness of TCP traffic in cross x 4 topology. (a) Average x endto-end delay. 3. (b) The effect of fairness. 4x x 5 3x Throughput (# of pkt).4 Throughput gain(%) Pkt (a) (b) (c) UDP 4.99

15 .99 Fairness index at node.975. Clearly, in seizing coding opportunities, is much better than and is better than under UDP traffic. As shown in Fig. 7(a), the end-to-end delay is inversely proportional to the throughput because a faster transmission makes packets wait.96 less time in queue, as explained above. far outperforms the other three approaches in end-to-end delay. In the effect of fairness, is also the best one among these four approaches,.95 as the same as that under TCP traffic, as illustrated in Fig. 7(b). 8. Throughput (# of pkt) x5 TCP.98 4 x 4 4 Throughput gain(%) x x x x x 4x 4x x (a) (b) (c) 8.4 x (a) x (b) (c) 3x 4 4x x 8 x 3x 4x gain. (c) Distribution 4 of number of native packets coded together. 8 Figure 6: Results of UDP traffic in cross topology. (a) Total throughput. (b) Throughput Pkt Throughput (# of pkt).6 x Throughput (# of pkt) Pkt 4 x 4 Average end-to-end delay (s) 8 4 Throughput gain(%) 8 Throughput gain(%) 8. (a) Figure 7: Effects of delay and fairness of UDP traffic in cross topology. (a) Average endto-end delay x5 Number (b) of 4-hop The TCP flows effect of fairness. TCP Fairness index / 6 Percentage Average end-to-end delay (s) (b).4.6 x Mesh topology We use a 5 5 mesh topology to test the performance of in supporting variable number Throughput (# of pkt) Throughput gain(%) of flows in a larger scale wireless network. The flows are 4 hop and their number are changed among, 4, 8, and 6. Average end-to-end delay (s) (a) (b) (c) (d) Again, we first examine the performance of under TCP traffic. and slightly outperform 8. in mesh topology and the aggregate throughout achieved by is significantly greater than 8., and, as shown in Fig. 8(a). Fig. 8(b) Percentage 9 Fairness index 5

16 Average end-to-end delay (s) shows the throughout gains relative to The gains achieved by and are relatively very small which means they aren t good at supporting TCP traffic. On the contrary, still obtains a significant throughout gain in large scale network compared with that in cross topology. This means packets are drained much faster in the network by compared with the other three approaches. As a result, the average end-to-end (a) achieved by is also much smaller, as shown in Fig. 8(c). When the number of flows in the network is small, the effects of fairness of the four approaches are all very well. As the number of flows increases, the fairness index of drops quickly, followed by. 5x5 The fairness of is relatively stable as the number of flows increases. TCP Fairness index (b) Throughput (# of pkt).6 x Throughput gain(%) 8 4 Average end-to-end delay (s) Fairness index (a) (b) (c) (d) / 6 Figure 8: Results of TCP traffic in mesh topology. (a) Total throughput. (b) Throughput gain. (c) Average end-to-end delay. (d) The effect of fairness. Next, let us study the performance of under UDP traffic in mesh topology. We change the interval of UDP packets from.s to.5s which makes the traffic changes from heavy to light. Fig. 8(a) shows the achieved throughout gains to 8. by, and. There are hardly any throughout gains when the traffic is light (i.e., the interval of UDP packets is big and the number of flows is small) because the network itself can afford the traffic even without the improved protocols. When the interval goes small and the number of UDP flows increases, the traffic in the network is getting heavy and the achieved throughout gains by, and are getting bigger. Again, far outperforms and in throughout. Fig. 8(b) shows the effect of average end-to-end delay under 6 UDP flows. We can see that the delay decreases as the traffic changes from heavy to light. is still the best one and the achieved delay is also very stable because packets are drained much faster in the network by it, as seen in Fig. 8(b). We can see that, in a relatively larger scale of network, the achieved performance of is still very well. 7 Conclusion An intermediate node in inter-flow network coding scheme, such as, needs to know exactly which are the previous hop and next hop of a packet to make coding decision. It is 6

17 Throughp Average end UDP Throughput gain(%) Interval of UDP packets Average end-to-end delay (s) Interval of UDP packets (a) (b) Figure 9: Results 5 of UDP traffic in mesh topology. (a) Throughput gain. (b) Average end-to-end delay under 6 UDP flows. Throughput gain(%) 5 difficult to incorporate inter-flow network coding into OR because the next hop of a packet in OR can t be determined in advanced. is proposed in this paper to address this Interval of UDP packets problem. Meanwhile, it is able to maximize the number of native packets coded in each single transmission. Opportunistic transmission increase the coding opportunities and the introduced small forwarding delays also add extra network coding chances. This introduced delay is variable. gives the coded packet that has a larger number of native packets with a smaller forwarding delay. In other words, a coded packet with a larger number of native packets is given with a higher priority to be forwarded. The forwarder with 3 / 6 the largest number of native packets coded together is ultimately selected to send data. Simulations demonstrate that achieves significantly throughput gains and derives a reasonable end-to-end delay in both cross topology and mesh topology under both TCP and UDP traffic. achieves 43% and 36% throughput improvement under TCP traffic and 34% and 5% throughput improvement under UDP traffic, compared to and in cross topology, respectively. also obtains a significant throughout gain in a large scale network (mesh topology). The end-to-end delay of is far smaller than that of and. significantly improves network performance of a WMN. References [] J. Sundararajan, D. Shah, and M. Medard, Network Coding Meets TCP: Theory and Implementation, Proceedings of the IEEE, vol. 99, no. 3, pp. 49-5,. [] S. Katti, H. Rahul, W. Hu, and D. Katabi, XORs in the air: practical wireless network coding, IEEE/ACM Trans. Networking, vol. 6, no. 3, pp , 8. [3] S. Biswas and R. Morris, Opportunistic routing in multi-hop wireless networks, SIG- COMM Comput. Commun. Rev., vol. 34, no., pp , 4. 7

18 [4] D. Couto, D. Aguayo, J. Bicket, and R. Morris, A high-throughput path metric for multi-hop wireless routing, in Proc. MobiCom 3, pp , 3. [5] S. Chachulski, M. Jennings, S. Katti, and D. Katabi, Trading structure for randomness in wireless opportunistic routing, in Proc. the ACM SIGCOMM 7, pp. 69-8, 7. [6] B. Radunovic, C. Gkantsidis, P. Key, and P. Rodriguez, Toward Practical Opportunistic Routing with Intra-session Network Coding for Mesh Networks, IEEE/ACM Trans. Networking, vol.8, no., pp.4-433, April. [7] X. Zhang and B. Li, Optimized multipath network coding in lossy wireless networks, in Proc. IEEE ICDCS 8, pp. 43-5, 8. [8] X. Zhang and B. Li, Dice: a game theoretic framework for wireless multipath network coding, in Proc. ACM MobiHoc 8, pp. 93-3, 8. [9] Y. Lin, X. Zhang, and B. Li, CodeOR: opportunistic routing in wireless mesh networks with segmented network coding, in Proc. IEEE ICNP8, pp. 3-, 8. [] D. Koutsonikolas, W. Chih-Chun, and Y.C. Hu, Efficient Network-Coding-Based Opportunistic Routing Through Cumulative Coded Acknowledgments, IEEE/ACM Trans. Networking, vol.9, no.5, pp , Oct.. [] C. Qin, Y. Xian, C. Gray, N. Santhapuri, and S. Nelakuditi, I MIX: Integration of Intra-flow and Inter-flow Wireless Network Coding, in Proc. SECON Workshops 8, pp. -6, 8. [] N. Bin, N. Santhapuri, Z. Zifei, and S. Nelakuditi, Routing with Opportunistically Coded Exchanges in Wireless Mesh Networks, in Proc. WiMesh 6, pp.57-59, 6. [3] S. Sengupta, S. Rayanchu, and S. Banerjee, An Analysis of Wireless Network Coding for Unicast Sessions: The Case for Coding-Aware Routing, in Proc. IEEE INFO- COM 7, pp. 8-36, 7. [4] L. Jilin, J.C.S. Lui, and C. Dah-Ming, D: Distributed Coding-Aware Routing in Wireless Networks, IEEE Trans. Mobile Comput., vol.9, no.4, pp.596-8, April. [5] Y. Peng, Y. Yang, X. Lu, and X. Ding, Coding-Aware Routing for Unicast Sessions in Multi-Hop Wireless Networks, in Proc. IEEE GLOBECOM, pp. -5,. [6] J. Zhang, Y. P. Chen, and I. Marsic, MAC-layer proactive mixing for network coding in multi-hop wireless networks, Computer Networks, vol. 54, no., pp. 97, Feb.. [7] H. Seferoglu and A. Markopoulou, I NC: Intra-and inter-session network coding for unicast flows in wireless networks, in Proc. IEEE INFOCOM, pp ,. 8

19 [8] E. Rozner, J. Seshadri, Y. Mebta, and L. Qiu, Simple opportunistic routing protocol for wireless mesh networks, in Proc. IEEE WiMesh 6, pp , 6. [9] Y. Yan, B. Zhang, J. Zheng, and J. Ma, CORE: a coding-aware opportunistic routing mechanism for wireless mesh networks, IEEE Wireless Communications, vol.7, no.3, pp.96-3, June. 9

XORs in the Air: Practical Wireless Network Coding

XORs in the Air: Practical Wireless Network Coding XORs in the Air: Practical Wireless Network Coding S. Katti, H. Rahul, W. Hu, D. Katabi, M. Medard, J. Crowcroft MIT & University of Cambridge Can we use 3 transmissions to send traffic? 1 2 4 3 Can we

More information

XCOR: Synergistic Inter flow Network Coding and Opportunistic Routing

XCOR: Synergistic Inter flow Network Coding and Opportunistic Routing Dimitrios Koutsonikolas (dkoutson@purdue.edu) Advisor: Y. Charlie Hu School of ECE, Purdue University XCOR: Synergistic Inter flow Network Coding and Opportunistic Routing 1. Abstract Opportunistic routing

More information

CS 268: Computer Networking. Taking Advantage of Broadcast

CS 268: Computer Networking. Taking Advantage of Broadcast CS 268: Computer Networking L-12 Wireless Broadcast Taking Advantage of Broadcast Opportunistic forwarding Network coding Assigned reading XORs In The Air: Practical Wireless Network Coding ExOR: Opportunistic

More information

CE693: Adv. Computer Networking

CE693: Adv. Computer Networking CE693: Adv. Computer Networking L-10 Wireless Broadcast Fall 1390 Acknowledgments: Lecture slides are from the graduate level Computer Networks course thought by Srinivasan Seshan at CMU. When slides are

More information

Multipath TCP with Network Coding for Wireless Mesh Networks

Multipath TCP with Network Coding for Wireless Mesh Networks This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the IEEE ICC 2 proceedings Multipath TCP with Network Coding for Wireless

More information

PRESENTED BY SARAH KWAN NETWORK CODING

PRESENTED BY SARAH KWAN NETWORK CODING PRESENTED BY SARAH KWAN NETWORK CODING NETWORK CODING PRESENTATION OUTLINE What is Network Coding? Motivation and Approach Network Coding with Lossless Networks Challenges in Developing Coding Algorithms

More information

Energy Efficient Broadcasting Using Network Coding Aware Protocol in Wireless Ad hoc Network

Energy Efficient Broadcasting Using Network Coding Aware Protocol in Wireless Ad hoc Network Energy Efficient Broadcasting Using Network Coding Aware Protocol in Wireless Ad hoc Network 1 Shuai Wang 2 Athanasios Vasilakos 1 Hongbo Jiang 1 Xiaoqiang Ma 1 Wenyu Liu 1 Kai Peng 1 Bo Liu 1 Yan Dong

More information

DCAR: Distributed Coding-Aware Routing in Wireless Networks

DCAR: Distributed Coding-Aware Routing in Wireless Networks : Distributed Coding-Aware Routing in Wireless Networks Jilin Le, John C.S. Lui Department of Computer Science and Engineering Chinese University of Hong Kong {jlle, cslui}@cse.cuhk.edu.hk Dah Ming Chiu

More information

Multi-Rate Interference Sensitive and Conflict Aware Multicast in Wireless Ad hoc Networks

Multi-Rate Interference Sensitive and Conflict Aware Multicast in Wireless Ad hoc Networks Multi-Rate Interference Sensitive and Conflict Aware Multicast in Wireless Ad hoc Networks Asma Ben Hassouna, Hend Koubaa, Farouk Kamoun CRISTAL Laboratory National School of Computer Science ENSI La Manouba,

More information

ECE 598HH: Special Topics in Wireless Networks and Mobile Systems

ECE 598HH: Special Topics in Wireless Networks and Mobile Systems ECE 598HH: Special Topics in Wireless Networks and Mobile Systems Lecture 21: Opportunistic Routing Haitham Hassanieh *These slides are courtesy of Dina Katabi 1 Lecture Outline Single Path Routing Opportunistic

More information

Performance Estimation on Opportunistic Routing Protocol based on Reliability Analysis

Performance Estimation on Opportunistic Routing Protocol based on Reliability Analysis Performance Estimation on Opportunistic Routing Protocol based on Reliability Analysis Prof. SmitaShukla Patel 1, Dr. M.Mohanpriya 2 1 Computer Science Department,Karpagam University,India 2 Computer Science

More information

Making Friends with Broadcast. Administrivia

Making Friends with Broadcast. Administrivia Making Friends with Broadcast CMU 15-744 David Andersen Administrivia Midterm Mean 66.5, Median 70, Stddev 13.7 Histo: 35-39 37 38 40-44 45-49 50-54 54 54 54 55-59 56 57 60-64 61 64 64 65-69 69 70-74 71

More information

WIRELESS networks suffer from low throughput and

WIRELESS networks suffer from low throughput and IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 16, NO. 3, JUNE 2008 497 XORs in the Air: Practical Wireless Network Coding Sachin Katti, Hariharan Rahul, Wenjun Hu, Dina Katabi, Muriel Médard, Senior Member,

More information

Opportunistic Overlay Multicast in Wireless Networks

Opportunistic Overlay Multicast in Wireless Networks This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the IEEE Globecom proceedings. Opportunistic Overlay Multicast in Wireless

More information

INCOR: Inter-flow Network Coding based Opportunistic Routing in Wireless Mesh Networks

INCOR: Inter-flow Network Coding based Opportunistic Routing in Wireless Mesh Networks INCOR: Inter-flow Network Coding based Opportunistic Routing in Wireless Mesh Networks Donghai Zhu *, Xinyu Yang*, Wei Yu t, Chao Lu t, and Xinwen Fu + *Xi'an Jiaotong University, Xi'an, China. Emails:

More information

Throughput and Fairness-Aware Dynamic Network Coding in Wireless Communication Networks

Throughput and Fairness-Aware Dynamic Network Coding in Wireless Communication Networks Throughput and Fairness-Aware Dynamic Network Coding in Wireless Communication Networks Pouya Ostovari and Jie Wu Department of Computer & Information Sciences, Temple University, Philadelphia, PA 191

More information

Network Coding Via Opportunistic Forwarding in Wireless Mesh Networks

Network Coding Via Opportunistic Forwarding in Wireless Mesh Networks Network Coding Via Opportunistic Forwarding in Wireless Mesh Networks Jian Zhang ECE Department Rutgers University New Brunswick, U.S.A. jianz@caip.rutgers.edu Yuanzhu Peter Chen Department of Computer

More information

DISCOVERING OPTIMUM FORWARDER LIST IN MULTICAST WIRELESS SENSOR NETWORK

DISCOVERING OPTIMUM FORWARDER LIST IN MULTICAST WIRELESS SENSOR NETWORK DISCOVERING OPTIMUM FORWARDER LIST IN MULTICAST WIRELESS SENSOR NETWORK G.Ratna kumar, Dr.M.Sailaja, Department(E.C.E), JNTU Kakinada,AP, India ratna_kumar43@yahoo.com, sailaja.hece@gmail.com ABSTRACT:

More information

How to evaluate exotic wireless routing protocols?

How to evaluate exotic wireless routing protocols? How to evaluate exotic wireless routing protocols? Dimitrios Koutsonikolas 1, Y. Charlie Hu 1, Konstantina Papagiannaki 2 1 Purdue University and 2 Intel Research, Pittsburgh ABSTRACT The advent of static

More information

The Importance of Being Opportunistic

The Importance of Being Opportunistic High Performance Switching and Routing Telecom Center Workshop: Sept 4, 1997. The Importance of Being Opportunistic Sachin Katti Dina Katabi, Wenjun Hu, Hariharan Rahul, and Muriel Medard Bandwidth is

More information

WITH the evolution and popularity of wireless devices,

WITH the evolution and popularity of wireless devices, Network Coding with Wait Time Insertion and Configuration for TCP Communication in Wireless Multi-hop Networks Eiji Takimoto, Shuhei Aketa, Shoichi Saito, and Koichi Mouri Abstract In TCP communication

More information

An Empirical Study of Performance Benefits of Network Coding in Multihop Wireless Networks

An Empirical Study of Performance Benefits of Network Coding in Multihop Wireless Networks An Empirical Study of Performance Benefits of Network Coding in Multihop Wireless Networks Dimitrios Koutsonikolas, Y. Charlie Hu, Chih-Chun Wang School of Electrical and Computer Engineering, Purdue University,

More information

Routing in Wireless Mesh Networks. Feb. 22, 2006

Routing in Wireless Mesh Networks. Feb. 22, 2006 Routing in Wireless Mesh Networks Feb. 22, 2006 Wireless Mesh Networks Multi-hop Wireless Networks Stationary Nodes Mobile Nodes Motivating scenario Community wireless networks (Mesh Networks) Battlefield

More information

Interference avoidance in wireless multi-hop networks 1

Interference avoidance in wireless multi-hop networks 1 Interference avoidance in wireless multi-hop networks 1 Youwei Zhang EE228A Project Report, Spring 2006 1 Motivation Wireless networks share the same unlicensed parts of the radio spectrum with devices

More information

OPTIMIZING THE DELAY IN MULTIHOP WIRELESS NETWORK USING NETWORK CODING AND SUCCESSIVE INTERFERENCE CANCELLATION

OPTIMIZING THE DELAY IN MULTIHOP WIRELESS NETWORK USING NETWORK CODING AND SUCCESSIVE INTERFERENCE CANCELLATION Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320 088X IMPACT FACTOR: 5.258 IJCSMC,

More information

Wireless (Internet) Routing. Opportunistic Routing, Network Coding, TCP over Wireless

Wireless (Internet) Routing. Opportunistic Routing, Network Coding, TCP over Wireless Wireless (Internet) Routing Opportunistic Routing, Network Coding, TCP over Wireless Outline Review of last time Opportunistic Routing o What is opportunistic routing? o ExOr o SOAR o Can we use opportunistic

More information

1158 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 18, NO. 4, AUGUST Coding-oblivious routing implies that routing decisions are not made based

1158 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 18, NO. 4, AUGUST Coding-oblivious routing implies that routing decisions are not made based 1158 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 18, NO. 4, AUGUST 2010 Network Coding-Aware Routing in Wireless Networks Sudipta Sengupta, Senior Member, IEEE, Shravan Rayanchu, and Suman Banerjee, Member,

More information

XORs in The Air: Practical Wireless Network Coding

XORs in The Air: Practical Wireless Network Coding XORs in The Air: Practical Wireless Network Coding Sachin Katti Hariharan Rahul Wenjun Hu Dina Katabi Muriel Médard Jon Crowcroft MIT CSAIL Univ. of Cambridge ABSTRACT This paper proposes COPE, a new architecture

More information

Securing the Wireless Mesh Networks against Epidemic Attack

Securing the Wireless Mesh Networks against Epidemic Attack Securing the Wireless Mesh Networks against Epidemic Attack P. Blessing Gilba, Student,M.E (Computer science and engineering) St.Peter s University,Chennai, Tamil Nadu, India. S. Siva Kumar, Assistant

More information

On the Efficacy of Opportunistic Routing

On the Efficacy of Opportunistic Routing On the Efficacy of Opportunistic Routing Zifei Zhong and Srihari Nelakuditi University of Texas, Austin University of South Carolina, Columbia Abstract Traditional routing schemes select the best path

More information

Queue Management for Network Coding in Ad Hoc Networks

Queue Management for Network Coding in Ad Hoc Networks 2012 Third International Conference on Intelligent Systems Modelling and Simulation Queue Management for Network Coding in Ad Hoc Networks S.E. Tan H.T. Yew M.S. Arifianto I. Saad K.T.K. Teo Modelling,

More information

AODV-PA: AODV with Path Accumulation

AODV-PA: AODV with Path Accumulation -PA: with Path Accumulation Sumit Gwalani Elizabeth M. Belding-Royer Department of Computer Science University of California, Santa Barbara fsumitg, ebeldingg@cs.ucsb.edu Charles E. Perkins Communications

More information

CCACK: Efficient Network Coding Based Opportunistic Routing Through. Cumulative Coded Acknowledgments

CCACK: Efficient Network Coding Based Opportunistic Routing Through. Cumulative Coded Acknowledgments CCACK: Efficient Network Coding Based Opportunistic Routing Through Cumulative Coded Acknowledgments Dimitrios Koutsonikolas, Chih-Chun Wang, Y. Charlie Hu School of Electrical and Computer Engineering,

More information

Keywords: Medium access control, network coding, routing, throughput, transmission rate. I. INTRODUCTION

Keywords: Medium access control, network coding, routing, throughput, transmission rate. I. INTRODUCTION Performance Analysis of Network Parameters, Throughput Optimization Using Joint Routing, XOR Routing and Medium Access Control in Wireless Multihop Network 1 Dr. Anuradha M. S., 2 Ms. Anjali kulkarni 1

More information

Challenge: high throughput despite loss. Roofnet has >30% loss probability. 4 Computer Networks Course (15-744), CMU, 2012.

Challenge: high throughput despite loss. Roofnet has >30% loss probability. 4 Computer Networks Course (15-744), CMU, 2012. MOTIVATIONS MAC-INDEPENDENT OPPORTUNISTIC ROUTING & ENCODING S. Chachulski, M. Jennings, S. Katti, D. Katabi SIGCOMM 07 Low quality of wireless links Multipath fading, scattering, other signals, etc. Roofnet

More information

BOND: Unifying Mobile Networks with Named Data. Michael Meisel

BOND: Unifying Mobile Networks with Named Data. Michael Meisel BOND: Unifying Mobile Networks with Named Data Michael Meisel Ph.D. Dissertation Defense March 16, 2011 Freeform Wireless Networks Multi-hop Unpredictable mobility Can be connected or disconnected Examples:

More information

A Fast and Reliable Tree based Proactive Source Routing in Mobile Adhoc Network 1 Haseena M. K., 2 Annes Philip.

A Fast and Reliable Tree based Proactive Source Routing in Mobile Adhoc Network 1 Haseena M. K., 2 Annes Philip. www.ijecs.in International Journal Of Engineering And Computer Science ISSN:239-7242 Volume 4 Issue 7 July 205, Page No. 3422-3425 A Fast and Reliable Tree based Proactive Source Routing in Mobile Adhoc

More information

Qos Parameters Estimation in MANET Using Position Based Opportunistic Routing Protocol

Qos Parameters Estimation in MANET Using Position Based Opportunistic Routing Protocol Original Article Qos Parameters Estimation in MANET Using Position Based Opportunistic Routing Protocol P. Kalaivani* 1, G. Sathya 1 and N. Senthilnathan 2 1 Assistant Professor, SNS College of Engineering,

More information

E 2 R: Energy Efficient Routing for Multi-hop Green Wireless Networks

E 2 R: Energy Efficient Routing for Multi-hop Green Wireless Networks IEEE INFOCOM Workshop on Green Communications and Networking : Energy Efficient Routing for Multi-hop Green Wireless Networks Ting Zhu, Don Towsley Department of Computer Science, University of Massachusetts

More information

MuCAR: A Greedy Multi-flow-based Coding-Aware Routing in Wireless Networks

MuCAR: A Greedy Multi-flow-based Coding-Aware Routing in Wireless Networks : A Greedy Multi-flow-based Coding-Aware Routing in Wireless Networks Jing Chen, Quan Yuan, Ruiying Du, and Jie Wu State Key Laboratory of Software Engineering, Computer School, Wuhan University, Wuhan,

More information

A Graph-based Approach to Compute Multiple Paths in Mobile Ad Hoc Networks

A Graph-based Approach to Compute Multiple Paths in Mobile Ad Hoc Networks A Graph-based Approach to Compute Multiple Paths in Mobile Ad Hoc Networks Gunyoung Koh, Duyoung Oh 1 and Heekyoung Woo 2 1 School of Electrical Engineering and Computer Science Seoul National University,

More information

Expected Path Bandwidth Based Efficient Routing Mechanism in Wireless Mesh Network

Expected Path Bandwidth Based Efficient Routing Mechanism in Wireless Mesh Network Expected Path Bandwidth Based Efficient Routing Mechanism in Wireless Mesh Network K Anandkumar, D.Vijendra Babu PG Student, Chennai, India Head, Chennai, India ABSTRACT : Wireless mesh networks (WMNs)

More information

NETWORK coding [1] [3] has attracted much interest in

NETWORK coding [1] [3] has attracted much interest in 1714 IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 60, NO. 4, MAY 2011 Analysis of General Network Coding Conditions and Design of a Free-Ride-Oriented Routing Metric Bin Guo, Student Member, IEEE, Hongkun

More information

3. Evaluation of Selected Tree and Mesh based Routing Protocols

3. Evaluation of Selected Tree and Mesh based Routing Protocols 33 3. Evaluation of Selected Tree and Mesh based Routing Protocols 3.1 Introduction Construction of best possible multicast trees and maintaining the group connections in sequence is challenging even in

More information

An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks

An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks First Author A.Sandeep Kumar Narasaraopeta Engineering College, Andhra Pradesh, India. Second Author Dr S.N.Tirumala Rao (Ph.d)

More information

High-Throughput Multicast Routing Metrics in Wireless Mesh Networks

High-Throughput Multicast Routing Metrics in Wireless Mesh Networks High-Throughput Multicast Routing Metrics in Wireless Mesh Networks Sabyasachi Roy Dimitrios Koutsonikolas Saumitra Das Y. Charlie Hu TR-ECE-05-7 September, 2005 School of Electrical and Computer Engineering

More information

Reliable video-streaming delivery in wireless access networks using Network Coding

Reliable video-streaming delivery in wireless access networks using Network Coding Reliable video-streaming delivery in wireless access networks using Network Coding MELISA JUNUZOVIĆ, KEMAL ALIČ, ALEŠ ŠVIGELJ Department of Communication Systems, Jozef Stefan Institute Jozef Stefan International

More information

Volume 2, Issue 4, April 2014 International Journal of Advance Research in Computer Science and Management Studies

Volume 2, Issue 4, April 2014 International Journal of Advance Research in Computer Science and Management Studies Volume 2, Issue 4, April 2014 International Journal of Advance Research in Computer Science and Management Studies Research Article / Paper / Case Study Available online at: www.ijarcsms.com Efficient

More information

Management Science Letters

Management Science Letters Management Science Letters 4 (2014) 2509 2516 Contents lists available at GrowingScience Management Science Letters homepage: www.growingscience.com/msl Delay-based network coding packet selection Rasoul

More information

Routing in Ad Hoc Wireless Networks PROF. MICHAEL TSAI / DR. KATE LIN 2014/05/14

Routing in Ad Hoc Wireless Networks PROF. MICHAEL TSAI / DR. KATE LIN 2014/05/14 Routing in Ad Hoc Wireless Networks PROF. MICHAEL TSAI / DR. KATE LIN 2014/05/14 Routing Algorithms Link- State algorithm Each node maintains a view of the whole network topology Find the shortest path

More information

The Importance of Being Opportunistic: Practical Network Coding for Wireless Environments

The Importance of Being Opportunistic: Practical Network Coding for Wireless Environments The Importance of Being Opportunistic: Practical Network Coding for Wireless Environments Sachin Katti Dina Katabi Wenjun Hu Hariharan Rahul Muriel Médard {skatti@, dk@, wenjun@csail., rahul@csail., medard@}mit.edu

More information

Revisiting Routing in Multi-Hop Wireless Networks: Spatial Reusability-Aware Routing

Revisiting Routing in Multi-Hop Wireless Networks: Spatial Reusability-Aware Routing Revisiting Routing in Multi-Hop Wireless Networks: Spatial Reusability-Aware Routing Tong Meng Fan Wu Guihai Chen Athanasios V. Vasilakos Shanghai Key Laboratory of Scalable Computing and Systems, Shanghai

More information

Improving the Data Scheduling Efficiency of the IEEE (d) Mesh Network

Improving the Data Scheduling Efficiency of the IEEE (d) Mesh Network Improving the Data Scheduling Efficiency of the IEEE 802.16(d) Mesh Network Shie-Yuan Wang Email: shieyuan@csie.nctu.edu.tw Chih-Che Lin Email: jclin@csie.nctu.edu.tw Ku-Han Fang Email: khfang@csie.nctu.edu.tw

More information

NEIGHBOURHOOD LOAD ROUTING AND MULTI-CHANNELS IN WIRELESS MESH NETWORKS

NEIGHBOURHOOD LOAD ROUTING AND MULTI-CHANNELS IN WIRELESS MESH NETWORKS NEIGHBOURHOOD LOAD ROUTING AND MULTI-CHANNELS IN WIRELESS MESH NETWORKS NIRMALA Y.BARKER & POORNIMA. B Department of CSE, BIETDavangere, Karnataka Email: nimms.yb@gmail.com, poornima_teju@rediffmail.com

More information

Design a Proposed Algorithm for Reliable Data Delivery for High Dynamic MANET

Design a Proposed Algorithm for Reliable Data Delivery for High Dynamic MANET Design a Proposed Algorithm for Reliable Data Delivery for High Dynamic MANET Rashmi Saini 1 and Vinit Lohan 2 1 M.Tech. Student, Department of CSE, VCE, Rohtak, Haryana (India) 2 Assistant Professor,

More information

An Analysis of Wireless Network Coding for Unicast Sessions: The Case for Coding-Aware Routing

An Analysis of Wireless Network Coding for Unicast Sessions: The Case for Coding-Aware Routing An Analysis of Wireless Network Coding for Unicast Sessions: The Case for Coding-Aware Routing Sudipta Sengupta Shravan Rayanchu,2 Suman Banerjee 2 Bell Laboratories, Lucent Technologies, Murray Hill,

More information

Practical Opportunistic Routing in High-Speed Multi-Rate Wireless Mesh Networks

Practical Opportunistic Routing in High-Speed Multi-Rate Wireless Mesh Networks Practical Opportunistic Routing in High-Speed Multi-Rate Wireless Mesh Networks Wei Hu, Jin Xie, Zhenghao Zhang Computer Science Department Florida State University Tallahassee, FL 3236, USA {hu,xie,zzhang}@cs.fsu.edu

More information

Impact of End-to-end QoS Connectivity on the Performance of Remote Wireless Local Networks

Impact of End-to-end QoS Connectivity on the Performance of Remote Wireless Local Networks Impact of End-to-end QoS Connectivity on the Performance of Remote Wireless Local Networks Veselin Rakocevic School of Engineering and Mathematical Sciences City University London EC1V HB, UK V.Rakocevic@city.ac.uk

More information

Effects of MAC Approaches on Non-Monotonic Saturation with COPE - A Simple Case Study

Effects of MAC Approaches on Non-Monotonic Saturation with COPE - A Simple Case Study Effects of MAC Approaches on Non-Monotonic Saturation with COPE - A Simple Case Study Jason Cloud*, Linda Zeger, Muriel Médard* *Research Laboratory of Electronics, Massachusetts Institute of Technology,

More information

Reliable and Energy Efficient Protocol for Wireless Sensor Network

Reliable and Energy Efficient Protocol for Wireless Sensor Network Reliable and Energy Efficient Protocol for Wireless Sensor Network Hafiyya.R.M 1, Fathima Anwar 2 P.G. Student, Department of Computer Engineering, M.E.A Engineering College, Perinthalmanna, Kerala, India

More information

Delayed ACK Approach for TCP Performance Improvement for Ad Hoc Networks Using Chain Topology

Delayed ACK Approach for TCP Performance Improvement for Ad Hoc Networks Using Chain Topology Delayed ACK Approach for TCP Performance Improvement for Ad Hoc Networks Using Chain Topology Prashant Kumar Gupta M.Tech. Scholar, Computer Networks, Bhilai Institute of Technology, Durg (C.G.), India

More information

A Routing Protocol for Utilizing Multiple Channels in Multi-Hop Wireless Networks with a Single Transceiver

A Routing Protocol for Utilizing Multiple Channels in Multi-Hop Wireless Networks with a Single Transceiver 1 A Routing Protocol for Utilizing Multiple Channels in Multi-Hop Wireless Networks with a Single Transceiver Jungmin So Dept. of Computer Science, and Coordinated Science Laboratory University of Illinois

More information

Route and Spectrum Selection in Dynamic Spectrum Networks

Route and Spectrum Selection in Dynamic Spectrum Networks Route and Spectrum Selection in Dynamic Spectrum Networks Qiwei Wang Tsinghua University Beijing, China wangqw04@mails.tsinghua.edu.cn Haitao Zheng Dept. of Computer Science Univ. of California, Santa

More information

Network Coding Efficiency In The Presence Of An Intermittent Backhaul Network

Network Coding Efficiency In The Presence Of An Intermittent Backhaul Network IEEE ICC 2016 - Wireless Communications Symposium Network Coding Efficiency In The Presence Of An Intermittent Backhaul Network Stefan Achleitner, Thomas La Porta Computer Science and Engineering The Pennsylvania

More information

Architecture and Evaluation of an Unplanned b Mesh Network

Architecture and Evaluation of an Unplanned b Mesh Network Architecture and Evaluation of an Unplanned 802.11b Mesh Network John Bicket, Daniel Aguayo, Sanjit Biswas, and Robert Morris MIT CSAIL (MobiCom 05) slides by Jong-Kwon Lee, presented by Fallon Chen May

More information

Performance Enhancement of AOMDV with Energy Efficient Routing Based On Random Way Point Mobility Model

Performance Enhancement of AOMDV with Energy Efficient Routing Based On Random Way Point Mobility Model Performance Enhancement of AOMDV with Energy Efficient Routing Based On Random Way Point Mobility Model Geetha.S, Dr.G.Geetharamani Asst.Prof, Department of MCA, BIT Campus Tiruchirappalli, Anna University,

More information

TCP and UDP Fairness in Vehicular Ad hoc Networks

TCP and UDP Fairness in Vehicular Ad hoc Networks TCP and UDP Fairness in Vehicular Ad hoc Networks Forouzan Pirmohammadi 1, Mahmood Fathy 2, Hossein Ghaffarian 3 1 Islamic Azad University, Science and Research Branch, Tehran, Iran 2,3 School of Computer

More information

Research on Transmission Based on Collaboration Coding in WSNs

Research on Transmission Based on Collaboration Coding in WSNs Research on Transmission Based on Collaboration Coding in WSNs LV Xiao-xing, ZHANG Bai-hai School of Automation Beijing Institute of Technology Beijing 8, China lvxx@mail.btvu.org Journal of Digital Information

More information

Multiple Network Coded TCP Sessions in Disruptive Wireless Scenarios

Multiple Network Coded TCP Sessions in Disruptive Wireless Scenarios Multiple Network Coded TCP Sessions in Disruptive Wireless Scenarios Chien-Chia Chen Cliff Chen Joon-Sang Park Soon Oh Mario Gerla M.Y. Sanadidi Network Research Lab, 1 Problem Statement Communication

More information

CDMR: Cooperative Diversity-based Multi-Copy Relaying in Mesh Networks

CDMR: Cooperative Diversity-based Multi-Copy Relaying in Mesh Networks CD: Cooperative Diversity-based Multi-Copy Relaying in Mesh Networks Van Nguyen and Dmitri Perkins The Center for Advanced Computer Studies University of Louisiana at Lafayette Lafayette, LA 70504 Email:

More information

O3: Optimized Overlay-based Opportunistic Routing

O3: Optimized Overlay-based Opportunistic Routing O3: Optimized Overlay-based Opportunistic Routing Mi Kyung Han Apurv Bhartia Lili Qiu Eric Rozner The University of Texas at Austin {hanmi2,apurvb,lili,erozner}@cs.utexas.edu Abstract Opportunistic routing

More information

Performance Evaluation of Wireless Network Coding under Practical Settings

Performance Evaluation of Wireless Network Coding under Practical Settings Performance Evaluation of Wireless Network Coding under Practical Settings Ihsan A. Qazi Pratik Gandhi Department of Computer Science School of Information Sciences University of Pittsburgh, Pittsburgh,

More information

End-To-End Delay Optimization in Wireless Sensor Network (WSN)

End-To-End Delay Optimization in Wireless Sensor Network (WSN) Shweta K. Kanhere 1, Mahesh Goudar 2, Vijay M. Wadhai 3 1,2 Dept. of Electronics Engineering Maharashtra Academy of Engineering, Alandi (D), Pune, India 3 MITCOE Pune, India E-mail: shweta.kanhere@gmail.com,

More information

Wireless Internet Routing. Learning from Deployments Link Metrics

Wireless Internet Routing. Learning from Deployments Link Metrics Wireless Internet Routing Learning from Deployments Link Metrics 1 Learning From Deployments Early worked focused traditional routing issues o Control plane: topology management, neighbor discovery o Data

More information

Multipath Routing Protocol for Congestion Control in Mobile Ad-hoc Network

Multipath Routing Protocol for Congestion Control in Mobile Ad-hoc Network 1 Multipath Routing Protocol for Congestion Control in Mobile Ad-hoc Network Nilima Walde, Assistant Professor, Department of Information Technology, Army Institute of Technology, Pune, India Dhananjay

More information

Appointed BrOadcast (ABO): Reducing Routing Overhead in. IEEE Mobile Ad Hoc Networks

Appointed BrOadcast (ABO): Reducing Routing Overhead in. IEEE Mobile Ad Hoc Networks Appointed BrOadcast (ABO): Reducing Routing Overhead in IEEE 802.11 Mobile Ad Hoc Networks Chun-Yen Hsu and Shun-Te Wang Computer Network Lab., Department of Electronic Engineering National Taiwan University

More information

Minimizing Energy Consumption for Cooperative Network and Diversity Coded Sensor Networks

Minimizing Energy Consumption for Cooperative Network and Diversity Coded Sensor Networks Minimizing Energy Consumption for Cooperative Network and Diversity Coded Sensor Networks Gabriel E. Arrobo and Richard D. Gitlin Department of Electrical Engineering University of South Florida Tampa,

More information

P2P and the Future Internet. Pablo Rodriguez Telefonica Research, Barcelona

P2P and the Future Internet. Pablo Rodriguez Telefonica Research, Barcelona P2P and the Future Internet Pablo Rodriguez Telefonica Research, Barcelona The Future Internet Social Networks that mimic personal relationships Personalized TV, Video Mash-Ups Recommendation and Aggregation

More information

Implementation of Optimization of Latency in Wireless Mesh Network

Implementation of Optimization of Latency in Wireless Mesh Network Implementation of Optimization of Latency in Wireless Mesh Network Kusuma M 1, Umapathi G R 2 1, 2 Dept of Information Science and Engineering, Acharya Institute of Technology, Bangalore, India ABSTRACT--

More information

Time Slot Assignment Algorithms for Reducing Upstream Latency in IEEE j Networks

Time Slot Assignment Algorithms for Reducing Upstream Latency in IEEE j Networks Time Slot Assignment Algorithms for Reducing Upstream Latency in IEEE 802.16j Networks Shimpei Tanaka Graduate School of Information Science and Technology Osaka University, Japan sinpei-t@ist.osaka-u.ac.jp

More information

AMoreEfficient COPE Architecture for Network Coding in Multihop Wireless Networks

AMoreEfficient COPE Architecture for Network Coding in Multihop Wireless Networks 766 IEICE TRANS. COMMUN., VOL.E92 B, NO.3 MARCH 2009 PAPER Special Section on Ad Hoc and Mesh Networking for Next Generation Access Systems AMoreEfficient COPE Architecture for Network Coding in Multihop

More information

Computer Communications

Computer Communications Computer Communications 33 (2010) 269 282 Contents lists available at ScienceDirect Computer Communications journal homepage: www.elsevier.com/locate/comcom Survey on diversity-based routing in wireless

More information

Link Estimation and Tree Routing

Link Estimation and Tree Routing Network Embedded Systems Sensor Networks Link Estimation and Tree Routing 1 Marcus Chang, mchang@cs.jhu.edu Slides: Andreas Terzis Outline Link quality estimation Examples of link metrics Four-Bit Wireless

More information

An Empirical Study of Performance Benefits of Network Coding in Multihop Wireless Networks

An Empirical Study of Performance Benefits of Network Coding in Multihop Wireless Networks An Empirical Study of Performance Benefits of Network Coding in Multihop Wireless Networks Dimitrios Koutsonikolas Y. Charlie Hu Chih-Chun Wang TR-ECE-08-11 December 1, 2008 School of Electrical and Computer

More information

PiggyCode: a MAC layer network coding scheme to improve TCP performance over wireless networks

PiggyCode: a MAC layer network coding scheme to improve TCP performance over wireless networks PiggyCode: a MAC layer network coding scheme to improve TCP performance over wireless networks Luca Scalia, Fabio Soldo, Mario Gerla Dipartimento di Ingegneria Elettrica, Elettronica e delle Telecomunicazioni,

More information

Opportunistic Transmission Based QoS Topology Control. QoS; Wireless Sensor Networks

Opportunistic Transmission Based QoS Topology Control. QoS; Wireless Sensor Networks Opportunistic Transmission Based QoS Topology Control in Wireless Sensor Networks Jian Ma, Chen Qian, Qian Zhang, and Lionel M. Ni Hong Kong University of Science and Technology {majian, cqian, qianzh,

More information

(INTERFERENCE AND CONGESTION AWARE ROUTING PROTOCOL)

(INTERFERENCE AND CONGESTION AWARE ROUTING PROTOCOL) Qos of Network Using Advanced Hybrid Routing in WMN, Abstract - Maximizing the network throughput in a multichannel multiradio wireless mesh network various efforts have been devoted. The recent solutions

More information

Shortcut Tree Routing using Neighbor Table in ZigBee Wireless Networks

Shortcut Tree Routing using Neighbor Table in ZigBee Wireless Networks Shortcut Tree Routing using Neighbor Table in ZigBee Wireless Networks Salmu K.P 1, Chinchu James 2 1,2 Department of Computer Science, IIET, Nellikuzhi Abstract- ZigBee is a worldwide standard for wireless

More information

Improving TCP Performance over Mobile Ad Hoc Networks by Exploiting Cross-Layer Information Awareness

Improving TCP Performance over Mobile Ad Hoc Networks by Exploiting Cross-Layer Information Awareness Improving TCP Performance over Mobile Ad Hoc Networks by Exploiting Cross-Layer Information Awareness Xin Yu Department of Computer Science Courant Institute of Mathematical Sciences New York University,

More information

Outdoor Wi Fi Mesh Routing Protocol. Akshata Danivasa Alphonse Hansel Anthony Mani Pandian Vikas Iyer Vinesh Pallen

Outdoor Wi Fi Mesh Routing Protocol. Akshata Danivasa Alphonse Hansel Anthony Mani Pandian Vikas Iyer Vinesh Pallen OutdoorWi FiMeshRoutingProtocol AkshataDanivasa AlphonseHanselAnthony ManiPandian VikasIyer VineshPallen 1 Contents 1. Abstract 3 2. Introduction. 4 3. Related Work 5 4. Problem Formulation 6 5. MODEL

More information

IN a mobile ad hoc network, nodes move arbitrarily.

IN a mobile ad hoc network, nodes move arbitrarily. IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 5, NO. 6, JUNE 2006 609 Distributed Cache Updating for the Dynamic Source Routing Protocol Xin Yu Abstract On-demand routing protocols use route caches to make

More information

Mobile Routing : Computer Networking. Overview. How to Handle Mobile Nodes? Mobile IP Ad-hoc network routing Assigned reading

Mobile Routing : Computer Networking. Overview. How to Handle Mobile Nodes? Mobile IP Ad-hoc network routing Assigned reading Mobile Routing 15-744: Computer Networking L-10 Ad Hoc Networks Mobile IP Ad-hoc network routing Assigned reading Performance Comparison of Multi-Hop Wireless Ad Hoc Routing Protocols A High Throughput

More information

Efficient Hybrid Multicast Routing Protocol for Ad-Hoc Wireless Networks

Efficient Hybrid Multicast Routing Protocol for Ad-Hoc Wireless Networks Efficient Hybrid Multicast Routing Protocol for Ad-Hoc Wireless Networks Jayanta Biswas and Mukti Barai and S. K. Nandy CAD Lab, Indian Institute of Science Bangalore, 56, India {jayanta@cadl, mbarai@cadl,

More information

CCACK: Efficient Network Coding Based Opportunistic Routing Through Cumulative Coded Acknowledgments

CCACK: Efficient Network Coding Based Opportunistic Routing Through Cumulative Coded Acknowledgments CCACK: Efficient Network Coding Based Opportunistic Routing Through Cumulative Coded Acknowledgments Dimitrios Koutsonikolas Chih-Chun Wang Y. Charlie Hu TR-ECE-09-13 December 16, 2009 School of Electrical

More information

Routing Protocols in MANETs

Routing Protocols in MANETs Chapter 4 Routing Protocols in MANETs 4.1 Introduction The main aim of any Ad Hoc network routing protocol is to meet the challenges of the dynamically changing topology and establish a correct and an

More information

Improvement of AODV Routing Protocol with QoS Support in Wireless Mesh Networks

Improvement of AODV Routing Protocol with QoS Support in Wireless Mesh Networks Available online at www.sciencedirect.com Physics Procedia 25 (2012 ) 1133 1140 2012 International Conference on Solid State Devices and Materials Science Improvement of AODV Routing Protocol with QoS

More information

Opportunistic XOR-Coding Content Propagation in VANET

Opportunistic XOR-Coding Content Propagation in VANET Opportunistic XOR-Coding Content Propagation in VANET Hossein Malakooti, Ali Jalooli, Mohammad Reza Jabbarpour, Alireza Marefat, and Rafidah Md Noor Abstract The main difference between typical wireless

More information

6367(Print), ISSN (Online) Volume 4, Issue 2, March April (2013), IAEME & TECHNOLOGY (IJCET)

6367(Print), ISSN (Online) Volume 4, Issue 2, March April (2013), IAEME & TECHNOLOGY (IJCET) INTERNATIONAL International Journal of Computer JOURNAL Engineering OF COMPUTER and Technology ENGINEERING (IJCET), ISSN 0976- & TECHNOLOGY (IJCET) ISSN 0976 6367(Print) ISSN 0976 6375(Online) Volume 4,

More information

PNC BASED DISTRIBUTED MAC PROTOCOL IN WIRELESS NETWORKS

PNC BASED DISTRIBUTED MAC PROTOCOL IN WIRELESS NETWORKS PNC BASED DISTRIBUTED MAC PROTOCOL IN WIRELESS NETWORKS Gowdara Rajasekhar Gowda 1, Dr. B R Sujatha 2 1MTech (DECS) student, E&C Dept, Malnad College of Engineering, Karnataka, India. 2Associate professor,

More information

A Neighbor Coverage Based Probabilistic Rebroadcast Reducing Routing Overhead in MANETs

A Neighbor Coverage Based Probabilistic Rebroadcast Reducing Routing Overhead in MANETs A Neighbor Coverage Based Probabilistic Rebroadcast Reducing Routing Overhead in MANETs Ankita G. Rathi #1, Mrs. J. H. Patil #2, Mr. S. A. Hashmi #3 # Computer Science-Information Technology Department,

More information