The present invention pertains to the field of communication networks.
The present invention more particularly relates to a method of configuring the topology of a communication network.
Mesh networking can be defined as a way to route data, voice and instructions between nodes. It allows for continuous connections and reconfiguration around broken or blocked paths by “hopping” from node to node until the destination is reached. A mesh network whose nodes are all connected to each other is a fully connected network. Mesh networks differ from other networks in that the component parts can all connect to each other via multiple hops, and they generally are not mobile. Mesh networks can be seen as one type of ad hoc network.
A node is a critical element of any computer network. It can be defined as a point in a network at which lines intersect or branch, a device attached to a network, or a terminal or other point in a computer network where messages can be created, received, or transmitted. A node can be any device connected to a computer network. Nodes can be computers, personal digital assistants (PDAs), cell phones, or various other networked devices. On a TCP/IP network, a node is any device with an IP address. If the node is a computer, it is more often called a “host”. A node is a connection point, either a redistribution point or an end point, for data transmission. In general, a node has programmed or engineered capability to recognize and process or forward transmissions to other nodes. If the network in question is the Internet, every node must have a MAC address or Data Link Control address if it is at least a data link layer device, as defined in the OSI model.
Routing algorithms for mesh network have to be robust to node failures, and link quality variations due to packet loss, and shadow-fading. It has been shown in the scientific publication “Performance Anomaly of 802.11 b” (M. Heusse, F. Rousseau, G. Berger-Sabbatel, A. Duda, in proc. of IEEE Infocom 2003, San Francisco, Calif., USA, March 2003) that the MAC-layer interactions play a significant role in determining the capacity of a link. The MAC-layer is the Media Access Control layer that arbitrates access of nodes to the wireless medium. In particular, depending on the MAC-layer contention, the goodput of a link can be substantially lower than its bit rate due to sharing of the wireless medium by multiple nodes. Past work has primarily focused on defining routing metrics to determine high throughput routes. Examples of such routing metrics are MAC-agnostic routing metrics, such as ETX [D. S. J. De Couto, D. Aguayo, J. Bicket, and R. Morris, “A High-Throughput Path Metric for Multi-Hop Wireless Routing” in proc. of ACM MobiCom 2003, San Diego, Calif., USA, Sep 2003], ETT [J. Padhye, R. Draves, and B. Zill, “Routing in Multi-radio, Multi-hop Wireless Mesh Networks” in proc. of ACM MobiCom 2004, Philadelphia, Pennsylvania, USA, Sep 2004], and MAC-aware routing metrics, such as ETP(V. Mhatre, H. Lundgren, and C. Diot. Mac-aware routing in wireless mesh networks. In The Fourth International Wireless on Demand Network Systems and Services (IEEE/IFIP WONS 2007), Obergurgl, Austria, January 2007], EDR [J. C. Park and S. Kasera, “Expected Data Rate: An Accurate High-Throughput Path Metric For Multi-Hop Wireless Routing” in proc. of IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, SECON 2005, Santa Clara, Calif., USA, Sep 2005], IRU [Y. Yang, J. Wang, and R. Kravets, “Designing Routing Metrics for Mesh Networks” in proc. of IEEE Workshop on Wireless Mesh Networks WiMesh 2005, Santa Clara, Calif., USA, Sep 2005].
When shortest path routing is used with any of the above routing metrics, the resulting routing algorithms do not support load balancing. This is because the load-agnostic behavior of shortest path algorithms can result in scenarios where a few gateways have too many associated mesh nodes, while other gateways are under-utilized. Further load imbalance in the network could be caused by gateway failures. 100% uptime for gateways is not possible, since the connection of the gateways to the Internet may fail occasionally, or the gateways may be unreachable [http://www.netequality.net]. Consequently, failure of one or more gateways can lead to overloading of a few selected gateways. Load balancing and routing algorithms which recently proposed in [Y. Bejerano, S. Han, and A. Kumar, “Efficient load-balancing routing for wireless mesh networks” Computer Networks, Elsevier Science, 2007, Vol. 51, pp 2450-2466] to handle such load imbalance do not take the MAC-layer interaction into account.
Since the number of gateways in a mesh network is limited, the routing should ensure that the traffic load is optimally distributed across all the gateways. Furthermore, in a wireless network, the links have complex interdependence due to their MAC-layer interaction through the CSMA-CA (Carrier Sense Multiple Access with Collision Avoidance) protocol. The routing decisions should ensure that links that experience heavy contention should not be used for carrying the majority of the routing traffic. Thus, the routing problem must address the above two constraints.
Past approaches to routing in mesh networks either (i) do not account for the MAC-layer interactions between the links in a tractable manner, or (ii) are agnostic to load-balancing across gateways.
The present invention is defined, in its broader sense, as a method of configuring the topology of a communication network comprising a plurality of nodes (i, j, . . . , N), said communication network being organized as a forest structure comprising trees and subtrees, characterized in that at least one node i maintains a periodic timer and in that an expiration of said timer of said node i triggers the steps of:
Preferably, the step of selecting a parent node by said node i comprises a sub-step of executing a function having as parameters respective subtree sizes of a node j before and after the migration of said node i to another node k.
According to a preferred embodiment, the step of selecting a parent node by said node i is performed by using a routing metric referred to as the Expected Throughput ETP defined as:
Advantageously, said method comprises a step of, for each node kεSi, where Si is the set of candidate parent nodes of node i, forming set Hik, which is the set of nodes that are affected if node i migrates to node k.
According to a particular embodiment, the method comprises the step of computing the following quantity:
where |Tj| and |T′j| are the respective subtree sizes, while ETPl
Preferably, the potential parent is F′i, which results in a reduction of the function:
F′
i=argminkεS
Advantageously, the migration to F′i is performed if F′i≈Fi, where Fi is the initial parent.
According to a particular embodiment, the computing steps that are necessary for node i to select the parent node are distributed among different nodes.
The method according to the invention is different from the solutions of the prior art, at least for the following reasons:
The present invention can be defined as a tractable, distributed, and greedy mesh routing method that jointly addresses the MAC interactions between the links as well as load balancing across the gateways. The solution according to the present invention works around the tractability problem arising from the interaction between MAC and routing, and jointly solves the problem of MAC-aware routing and load balancing. Instead of using shortest path routing, the solution according to the present invention determines a delay optimal routing forest (union of disjoint trees rooted at the gateways).
The invention allows to optimize resources for mesh routing and load balancing.
The method according to the invention is beneficial to the mesh network scenarios which have topology imbalance. Such imbalance often arises when one or more gateway nodes fail. Simulation results show that in scenarios of gateway failures, the solution according to the invention results in 30-60% throughput improvement over other load balancing techniques, as well as over other proposed routing solutions (see
For scenarios in which there is no load imbalance, the solution according to the invention performs as well as, or marginally better than other proposed solutions.
The following detailed description will be better understood with the drawings, in which:
In the invention, a mesh network comprises a plurality of nodes.
The node 1 shown on
Consider a mesh network in which G is the set of gateways that have direct connectivity to the Internet, and M is the set of mesh nodes. Each mesh node Iε M connects to a single gateway, G(i) ε G, using other mesh nodes. In this case, mesh node i is considered to be associated with gateway G(i). Nodes are organized in disjoint trees Tgi, each tree rooted at a gateway node gi, ε G. Let T be the union of all these trees. Thus, T corresponds to one possible choice of routing. The subtree rooted at mesh node i ε M is denoted by Ti. Note that Ti includes node i. All the nodes have a single radio for mesh communication, and operate over a common channel. The latter assumption is used because if a single radio is available for mesh communication, monitoring of link qualities over multiple channels is difficult. We assume that another radio is available at each mesh node for communication with its clients over an orthogonal channel.
Consider the example topology shown in
Two links contend with each other at the MAC layer if the carrier sensing at the senders or the RTS-CTS (Request to Send and Clear to Send handshake) mechanism preclude them from being active simultaneously. We use the following notation. The indicator function 1{liΔlj} is one if links li and lj contend with each other, and zero otherwise. In other words only one of the two contending links can be active at a time. In 802.11 DCF, the presence of low bit rate links considerably reduces the throughput of a nearby high bit rate link, since the slower links occupy the channel for longer duration. For example, consider k wireless links having nominal bit rates of Rj, j=1 to k, and assume that all the links lie within the same contention domain, i.e., only one link from this set can be active at a time. For this scenario, 802.11 DCF allocates on average an equal number of channel access opportunities to all the links. Based on this observation, the following routing metric is referred to as the Expected Throughput (ETP),
In the model in Eq. (1), the sum of the inverse of the data rates models the equal time share received by all the contending links, while the success probability term, Pl
Shortest path routing algorithms which rely on routing metrics, such as ETX (Expected Transmission Count) and ETT (Expected Transmission Time) do not include support for load balancing across multiple gateways. We build here on top of ETP (Expected Throughput) to incorporate load balancing. In routing forest T, let Pj be the route of node j to its associated gateway, i.e., Pj is the set of links between node j and its associated gateway. A mesh node i is connected to its parent node through link li. If link li belongs to path Pj, i.e., j ε Ti, then a fraction of the bandwidth of link li is used for the traffic of node j. For simplicity, we assume that all the nodes in a subtree are treated equally, i.e., we assume fair bandwidth sharing within a subtree. Since the expected throughput of link lj is ETPl
where |Ti| is the number of nodes in subtree Ti (including node i). Hence the transmission delay of a bit of node j over link Li is
Thus, the total transmission delay for node j in sending a bit to its associated gateway is:
The total transmission delay over all of the mesh nodes for sending a bit to their respective gateway nodes is:
Note that the above cost function includes the effect of spatial multiplexing through the ETP metric. This is unlike shortest path routing with ETT where the computed path metric does not account for the possible concurrent operation of links separated by more than three hops. As a result, ETT unfairly penalizes long paths.
Note that in Eq. (2), all terms are of the form
For some i. Furthermore, a term such as
corresponds to link li, and appears exactly |Ti| times, once for each node in the subtree Ti. Thus, we can rewrite (2) as follows:
where ETPl
We solve the problem of determining routes that are optimal with respect to the cost function defined in Eq. (3). Minimizing the objective function in Eq. (3) requires us to evaluate the objective function over all the possible routing forests (exponential complexity). Traditional shortest path algorithms used in conjunction with ETX and ETT are not applicable here, since the link weights in our problem formulation are not fixed, but depend on the routing configuration itself. We are not aware of any algorithms that compute optimum trees when link weights depend on the choice of tree. Hence we propose an algorithm, referred to as MaLB (MAC-aware and Load Balanced routing) that is guaranteed to converge at least to a local minimum of Eq. (3). MaLB is a greedy, and distributed routing algorithm.
In the following, we first briefly describe the idea behind the proposed algorithm, and then present the exact algorithmic details.
It is assumed that as an initial configuration, the network is organized in a forest structure (not necessarily optimum).
This could be generated through hop count, ETX, or ETT based routing. Starting with this initial topology, the proposed algorithm progressively reconfigures the network topology.
Each node maintains a periodic timer. When the timer at node i expires, it finds the best point of attachment to the routing forest, or equivalently, the best parent node, and then migrates to the new parent node along with its entire subtree. For example, in
Since the link between node i and j, denoted by Lij is no longer used after migration, this also has an impact on the ETP of the active links in the contention domain of nodes i and j. Likewise, after the migration, the link between i and k, denoted by lik which was initially inactive, becomes active.
This has an impact on the ETP of other active links in the contention domain of nodes i and k.
We denote Fi as the current parent of node i. Set Ak denotes the set of ancestors of node k including itself. The set of candidate parent nodes of node i is denoted by Si.
This set includes those neighbors of node i that are not in its subtree (to avoid routing loops). The set of nodes that belong to the contention domain of link lj is denoted by CDl
Each node maintains a periodic timer. When the timer of node i expires, it executes the following steps:
H
ik
=CD
l
k
∪CD
F
∪A
F
∪A
k.
where |Tj| and |Ti| are the respective subtree sizes, while ETPl
F′
i=argminkεS
Typically, estimation of link quality (bit rate and packet success ratio) requires sending periodic probes, and averaging the observed results over time durations of a few minutes.
This is required, because the random time-varying shadow-fading results in substantial fluctuations in link qualities, and hence responding to such short term fluctuations can lead to route flaps. We assume that the period of the timers running on mesh nodes for making migration decisions are also of the order of few minutes, since reliable link quality estimates are not available at a smaller time scale.
It is also assumed that the message exchange between a node, its children, and its ancestors during a migration can be completed within a few milliseconds, since this involves exchanging short association/disassociation messages. Under this model, it is reasonable to assume that with high probability, at any given instant, only one node is involved in migration in the entire network. For example, in a network of 100 nodes, with a migration timer period of 2 minutes, and assuming that the multi-hop association/dissociation message of 40 bytes travels 10 hops at 6 Mbps, the probability that at least two nodes are simultaneously in the migrating phase is less than 10−3. Thus, the routing tree information at each node is consistent at every time instant with high probability. With the timer values tuned in accordance with the above observation, we have the following result on the convergence of the algorithm according to the present invention.
The two distinguishing features of the approach presented above are (i) Inclusion of MAC-layer interactions through ETP, and (ii) Load balancing through efficient multi-hop association of mesh nodes to gateways. The MAC interactions between the links lead to substantial increase in the complexity of ETP. Hence, we define a new routing algorithm that performs load balancing, but uses a simple model for estimating the capacity of a link. In this model, the MAC interactions between the links are ignored, and the product of the bit rate and the packet success probability of the link is used as a measure of its capacity. Using the approach presented above, the routing problem is equivalent to finding optimum forest structures which minimize the following objective function corresponding to Eq. (3).
Corresponding to the first algorithm presented above, we define another algorithm for finding the optimum routes. This second algorithm forms the middle ground, since it is an intermediate low complexity solution between load-agnostic routing algorithms, such as shortest path with ETX, ETT, and a MAC-aware load balancing routing algorithm such as the first algorithm.
This second algorithm is identical to the first algorithm, except that in the first step, the set of affected nodes Hik does not account for MAC-layer impact, i.e., Hik is defined as follows:
H
ik
=A
F
∪A
k.
Observe that the reciprocal of the term in the denominator of Eq. (6) is the ETT of the parent link of node i. Therefore, comparing Eq. (3) and Eq. (6), we note that the second algorithm corresponds to the case of joint routing and load balancing when the reciprocal of ETT is used as the estimate of the link bandwidth.
It is further shown that the throughput increases progressively as we go from ETX to the first algorithm. The second algorithm has higher throughput than ETX and ETT due to its load balancing attribute. However, further throughput increase can be obtained using the first algorithm when the MAC-layer interaction is also taken into account.
Distributed implementation of the method according to the present invention is possible.
It is shown that this process converges within a finite number of migrations.
In fact, for a mesh network consisting of 100 nodes, the simulation results show that the method according to the present invention converges after less than 60 migrations.
The above specification, examples and drawings provide a complete description of the method according to the present invention. Since many embodiments of the invention can be made without departing from the spirit and scope of the invention, the invention resides in the claims herein after appended.
Number | Date | Country | Kind |
---|---|---|---|
07301565.3 | Nov 2007 | EP | regional |