34
46 Chapter 4 A Hybrid Wireless Network Enhanced with Ad hoc Networking 4.1 Introduction In the aftermath of a large-scale disaster such as an earthquake or a man-made emergency, communication systems are required to be able to access networks quickly and stably for rescue operations and to collect damage assessment information. A centralized hierarchical network is well suited to acquire data from massive nodes efficiently, as described in Chapter 3, provided that links between a base station (BS) and nodes are maintained. The network is capable of communicating stably with even a small power of 10 mW, provided that the links between BS and nodes maintain the link- of-sight path. However, since each link of the network is configured with a single connection, some of links could not maintain connectivity in a disaster. In the event, especially, that a large-scale natural disaster happens, the network may have a potential but an obvious issue that nodes cannot access BS directly due to deterioration of propagation condition by damages on wireless units or by interruptions. In addition, the deterioration of reachability demonstrated in Chapter 3 results in a short communication range, that is, the communication range shrinks at the same output power. It is concerned that the similar issue may take place in the future cellular network. Meanwhile, several papers have described that the ad hoc network is feasible to work effectively for disaster communications even if infrastructure facilities might not perform sufficiently [48]. Ad hoc networking scheme allows a node to rebuild a connection by diverted routes. However, we know that the connectivity of ad hoc networks is vulnerable not only due to mobility or limited power but also due to other issues such as interferences from hidden terminals [49]. When the number of multihopping increases, route connectivity may decrease, besides, end-to-end delay

Chapter 4tkfujiwr/tfujiwara/gyouseki_pdf/Thesis/... · However, since each link of the network is configured with a single connection, ... Regarding network configuration, a centralized

Embed Size (px)

Citation preview

Page 1: Chapter 4tkfujiwr/tfujiwara/gyouseki_pdf/Thesis/... · However, since each link of the network is configured with a single connection, ... Regarding network configuration, a centralized

46

Chapter 4

A Hybrid Wireless Network Enhanced with Ad hoc Networking

4.1 Introduction

In the aftermath of a large-scale disaster such as an earthquake or a man-made

emergency, communication systems are required to be able to access networks quickly

and stably for rescue operations and to collect damage assessment information. A

centralized hierarchical network is well suited to acquire data from massive nodes

efficiently, as described in Chapter 3, provided that links between a base station (BS)

and nodes are maintained. The network is capable of communicating stably with even a

small power of 10 mW, provided that the links between BS and nodes maintain the link-

of-sight path. However, since each link of the network is configured with a single

connection, some of links could not maintain connectivity in a disaster. In the event,

especially, that a large-scale natural disaster happens, the network may have a potential

but an obvious issue that nodes cannot access BS directly due to deterioration of

propagation condition by damages on wireless units or by interruptions. In addition, the

deterioration of reachability demonstrated in Chapter 3 results in a short communication

range, that is, the communication range shrinks at the same output power. It is

concerned that the similar issue may take place in the future cellular network.

Meanwhile, several papers have described that the ad hoc network is feasible to work

effectively for disaster communications even if infrastructure facilities might not

perform sufficiently [48]. Ad hoc networking scheme allows a node to rebuild a

connection by diverted routes. However, we know that the connectivity of ad hoc

networks is vulnerable not only due to mobility or limited power but also due to other

issues such as interferences from hidden terminals [49]. When the number of

multihopping increases, route connectivity may decrease, besides, end-to-end delay

Page 2: Chapter 4tkfujiwr/tfujiwara/gyouseki_pdf/Thesis/... · However, since each link of the network is configured with a single connection, ... Regarding network configuration, a centralized

47

increases in proportion to the hop count. Consequently, the reliability of the network

may degrade by excessive multihopping. Those drawbacks hamper to disseminate ad

hoc networks to emergency communications. To overcome these issues, we propose a

hybrid wireless network scheme combining ad hoc networks with centralized network,

referred to as ECCA (Enhanced Communication Scheme Combining Centralized and

Ad hoc Networks) [66], [67]. The network scheme maintains connectivity by way of

multihopping, resulting in expansion of the coverage.

4.2 Network Architecture for Disaster Communications

We first discuss network architecture for disaster communications. One of the

important roles for disaster communications is to acquire damage assessment

information and/or emergency signals, and to send them to an operation center quickly

and stably. Therefore, the network has to maintain the connectivity to access a base

station and terminals. Regarding network configuration, a centralized hierarchical

network is suitable for efficient and stable data collection, on one hand. A meshed

network is capable of providing a robust connection, on the other hand.

Figure 4.1 shows a concept of proposed network architecture for disaster

communications. The network comprises a central control station (CS), several base

stations (BS) and massive terminals. The network is divided into multiple cells, each of

which contains a BS and several terminals. We assume that those terminals are installed

in a fixed location since the primary objective of the terminals is to detecting and/or

forwarding emergency signals.

CS collects damage assessment information or other information, and makes a plan

and performs emergency rescue activities based on the information. Several

infrastructured networks such as optical networks, dedicated networks, digital

subscriber line networks, or wireless networks are available to connect CS and BSs. We

can assume that those networks are robust sufficiently against disaster damages since it

is possible to conduct quakeproof design on the facilities. On the contrary, terminals or

branch lines of networks are vulnerable for a natural disaster since it is hard to take a

Page 3: Chapter 4tkfujiwr/tfujiwara/gyouseki_pdf/Thesis/... · However, since each link of the network is configured with a single connection, ... Regarding network configuration, a centralized

48

countermeasure for the disaster on massive facilities. Therefore, we primarily discuss

the network within a cell in this paper.

Though it is possible for a terminal to communicate with other terminals via CS or

BS, it might not be necessary to support such a function for disaster communications. In

fact, communications between terminals have a potential issue to make congestion in

disaster situations. Therefore, we do not discuss the communication that a node accesses

another node via CS or BS. Besides, though the network is capable of connecting to

backbone networks, e.g., the Internet, via CS, we do not discuss the function neither in

this paper.

BS performs resource management of the network in a cell, e.g., channel assignment

or addressing of local ID to each terminal. Regarding address mapping, the network

introduces a dedicated short address to shorten the address field of a packet header,

instead of MAC address or IP address, since the amount of terminals included in the

network can be roughly determined in advance. We assume the scale of the network

covered by CS, where the number of terminals is approximately one million or less, and

where the number of BS is less than one thousand. The length of the address field is,

thereby, available at 24 bits, which consist of 10 bits for the cell address as prefix and

14 bits for the local ID of a terminal. BS assigns the address to terminals when they join

the network. The correspondence between the unique address of terminals, if they have,

and the local address is managed in the registration table of BS and CS.

CS: Central Control Station, BS: Base Station, TM: Terminal

Figure 4.1 Concept of network architecture for disaster communications.

CS

Backbone

BS

TM

Page 4: Chapter 4tkfujiwr/tfujiwara/gyouseki_pdf/Thesis/... · However, since each link of the network is configured with a single connection, ... Regarding network configuration, a centralized

49

4.3 Network Model of ECCA

A hybrid wireless network, ECCA (Enhanced Communication Scheme Combining

Centralized and Ad hoc Networks), works for data communications within a cell, which

is configured with a centralized hierarchical network (CH-Net) and ad hoc networks

(AD-Net). The former is to connect a BS and terminals directly, and the latter is to

connect terminals each other to reach BS via multihopping, as depicted in Figure 4.2.

Regarding the operation mode, terminals transmitting data in the CH-Net operate in a

cellular mode, where the terminals maintain the connection to BS, as shown in Figure

4.3 (a). On the other hand, in the AD-Net, terminals operate in an ad hoc mode, where

the terminals communicate each other and dynamically build a route to BS via

neighboring nodes by way of multihopping, as shown in Figure 4.3 (b). The terminal

operating in the cellular mode is referred to as a direct connection node (DCN), and the

terminal in the ad hoc mode is an indirect connection node (ICN). Since DCN relays a

packet between AD-Net and CH-Net, it receives both data from BS and ICN, and

forwards the data, hence, it operates as a gateway node for both networks.

In normal circumstances, terminals operate in the cellular mode. If a disaster or an

emergency happens, some links between BS and terminals may be disconnected due to

damage or obstacles, then those terminals switch into the ad hoc mode, and attempt to

build a route to BS by way of multihopping. Given that a terminal discovers gateway

nodes which are able to transmit a packet to BS directly, or other nodes which already

have a route to BS via multihopping, the terminal requests one of those neighboring

nodes to forward a packet. The requested node relays a packet toward BS along the

route which has already been built. When source nodes or intermediate nodes transmit a

packet, they record routing information in a table. To send back a packet from BS to a

node, intermediate nodes decide a route to the destination according to the table.

In addition, considering disaster communications, it may be a proper approach to

transmit data in a short packet. ECCA networking scheme handles a short packet

focusing on transferring emergency data. Consequently, a number of nodes are capable

Page 5: Chapter 4tkfujiwr/tfujiwara/gyouseki_pdf/Thesis/... · However, since each link of the network is configured with a single connection, ... Regarding network configuration, a centralized

50

of transmitting data quickly and stably in the narrow bandwidth, while the amount of

data, which the nodes can transmit, is restricted.

4.4 Channel Structure

The Proposed network, ECCA, implements two kinds of communication channels,

one is a data channel to transmit user data between BS and nodes, and the other is a

control channel to send control data from BS to nodes and status or reply data from

nodes for maintaining connections. In addition, the control channel plays a major role to

transmit data by multihopping in ECCA, as described later.

BS: Base Station

Terminal

CH-Net link AD- Net link

CH-Net

BS

AD-Net

Figure .4.2 ECCA network model.

Cell

Figure .4.3 Operation modes in ECCA.

(a) Cellular mode

BS: Base station, D: Direct connection node

D

BS

D D

(b) Ad hoc mode

G: Gateway node, I: Indirect connection node

G

BS

I

G

II

II

I I

G

Page 6: Chapter 4tkfujiwr/tfujiwara/gyouseki_pdf/Thesis/... · However, since each link of the network is configured with a single connection, ... Regarding network configuration, a centralized

51

Figure 4.4 illustrates the frame structure of the data and control channels. Since the

data channels are designed in CDMA (Code Division Multiple Access) technique, they

are multiplexed with different spreading codes, as shown in Figure 4.4 (a), and as

described in the Chapter 3. In the figure, the number of multiplexed CDMA channels is

p, and the channels are divided into q timeslots, hence, the data channel operates in TD-

CDMA (Time Division Code Division Multiple Access) fashion [40]. Thereby, the

amount of channels to transmit data is p×q.

The access protocol for the data channels employs a contention manner. When a

node intends to transmit a packet in the data channel, it sends a request packet in any

one of slots of RTS (Request to send) sub-frame to reserve one of the data channels.

Provided that the request packet reaches BS successfully, BS allocates one of the data

channels to the node, and notify the allocation in CTS (Clear to send) sub-frame. Since

the CTS informs the allocation status of the data slots, the number of timeslots in CTS is

same as the data slots. Hence, CTS can inform the allocation of p×q channels.

The node, which made a reservation of a data channel, transmits a data packet in the

designated channel, and BS replies the acknowledgement (ACK) during the slot. In

addition, provided that the node has more packets in its buffer, the node sets the

piggybacking flag of the data packet header when transmitting data, resulting in

maintaining the channel allocated to the node.

On the other hand, the control channel periodically transfers control data from BS to

nodes, and each node transmits data to indicate its status in the control channel. The

control channel is divided into short mini-timeslots, and each node in a cell is assigned

in any one of the mini-timeslots, hence the channel operates in TDM (Time Division

Multiplexing) fashion. Every node shares the control channel, which is referred to as a

common communication channel (CCCH). Figure 4.4 (b) shows its frame structure. The

data packet of CCCH consists of the packet header, the payload (data) and the CRC

(Cyclic Redundancy Check code). The packet header includes the frame type, the

address of a source, a destination, a sender and a receiver (next hop), and the hop count

(Hop-CNT) which is used for route discovery, as described in the following section.

Page 7: Chapter 4tkfujiwr/tfujiwara/gyouseki_pdf/Thesis/... · However, since each link of the network is configured with a single connection, ... Regarding network configuration, a centralized

52

The system employs a fixed allocation scheme to assign node to one of the mini-

timeslots of CCCH. Hereby, nodes are capable of maintaining accessibility without

congestion, and are able to transmit data quickly and stably, while the message length of

the packet is restricted to a small size in order to satisfy the size of the timeslot.

Moreover, those channel structures require the synchronization of the slots.

Especially, the CCCH is faced with the issue to synchronize with distributed nodes. The

GPS clock is one of the solutions, however, the system for disaster communications

requires more flexible way. This issue is nontrivial in the physical layer, and several

institutes have studied to solve the issue [73], [74], [75]. We do not address the issue in

this paper, focusing on the second and third layer.

Header

Type Rx Tx Hop- CNT

Dest Src Data CRC

T1...Tn: Terminal ID, A: ACK, Rx: Receiver node ID, Tx: Sender node ID, Dest: Destination ID, Src: Source node ID, CRC: Cyclic redundancy check code

Figure .4.4 Frame format

(b) CCCH: Common Communication Channel

DT DT A A DT A DT A

T1 T2 T3 Tn

Frame

T4

DT A

T5

DT A

Mini-timeslot

Tx Type Rx CRC Data

(a) Data Channel

Code (1) Code (2)

Code (p)

Slot (1) Slot (2) Slot (q) Data (1,1) Data (2,1)

Data (p,1)

Data (1,2) Data (2,2)

Data (p,2)

Data (1,q)

Data (2,q)

Data (p,q)

RTS

RST DATA (+Piggyback flag) + ACK CST

Frame

CTS 1 q

p

Page 8: Chapter 4tkfujiwr/tfujiwara/gyouseki_pdf/Thesis/... · However, since each link of the network is configured with a single connection, ... Regarding network configuration, a centralized

53

4.5 Routing Protocol

Various routing protocols for ad hoc networking have been proposed [24], [25], [50],

and have stated that ad hoc networks are operable even in disaster circumstances. We

first discuss the suitability of some protocols for disaster communications. Then, we

propose a routing protocol for multihopping in ECCA to operate in disaster

circumstances. The proposed routing protocol aims to transmit a packet from nodes to

BS, and reply from BS to nodes efficiently and stably. Though it is available to deliver a

packet to others node like existing ad hoc routing protocols, we focus on the

communication between nodes and BS considering emergency communications.

4.5.1 Related Routing Protocols

A) DSR

The Dynamic Source Routing (DSR) protocol [27], [25] is an on-demand routing

protocol that is based on the concept of source routing. When a node has a packet to

send to some destination, it first consults its route cache to determine whether it already

has a route to the destination. If it has an unexpired route to the destination, it will use

this route to send the packet. If the node does not have such a route, it initiates route

discovery by broadcasting a route request (RREQ) packet. This RREQ message

contains the address of the destination along with the source node's address and a

unique identification number of the packet. Each node receiving the packet checks

whether it knows of a route to the destination. If it does not, it adds its own address to

the route record of the packet, and then forwards the packet along its outgoing links. To

limit the number of RREQ propagation on the outgoing links of a node, a node only

forwards the RREQ if the node has not yet seen the request, and if the node's address

has not appeared in the route record. A route reply (RREP) is generated when either the

RREQ reaches the destination itself, or when it reaches an intermediate node that

contains in its route cache an unexpired route to the destination. Until the packet reaches

either the destination or such an intermediate node, it contains a route records yielding

the sequence of hops taken.

Page 9: Chapter 4tkfujiwr/tfujiwara/gyouseki_pdf/Thesis/... · However, since each link of the network is configured with a single connection, ... Regarding network configuration, a centralized

54

Figure 4.5 illustrates the formation of the route record as the RREQ message

propagates through the network. If the node generating the RREP is the destination, it

places the route record contained in the RREQ into the RREP. If the responding node is

an intermediate node, it appends its cached route to the route record and then generates

the RREP. To return the RREP, the responding node must have a route to the source. If

it has a route to the source in its route cache, it may use that route. Otherwise, if

symmetric links are supported, the node may reverse the route in the route record from

the route request packet. If symmetric links are not supported, the node may initiate its

own route discovery and piggyback the RREP on a new RREQ.

Thus, the DSR protocol cannot specify the length of the route record since

intermediate nodes add their own addresses in sequence. This process has a potential

issue to result in an excessive overhead, sending a short message especially. Therefore,

it is not suitable for an efficient transmission in disaster communications, where the

frequency bandwidth is extremely restricted.

N1

N2

N6N3

N8N5

N7N4

N1 N1, N2 N1, N2, N5

N1 N1, N3

N1, N3, N4

N1, N3, N4, N6

N1, N3, N4, N6, N7

Destination

Source

(a) Building the route record during route discovery.

(b) Route reply with the route record.

N1

N2

N6N3

N8N5

N7N4

N1, N2, N5, N8N1, N2, N5, N8N1, N2, N5, N8

Figure 4.5 Route discovery process in DSR

Page 10: Chapter 4tkfujiwr/tfujiwara/gyouseki_pdf/Thesis/... · However, since each link of the network is configured with a single connection, ... Regarding network configuration, a centralized

55

B) AODV

The Ad hoc On-Demand Distance Vector (AODV) routing protocol [26], [25] is an

on-demand routing protocol that is based on the Destination Sequenced Distance Vector

(DSDV) algorithm [51], but does not exchange routing table. When a source node wants

to send a message to a destination node and does not have a valid route to that

destination, it initiates a path discovery process to locate the other node. It broadcasts a

route request (RREQ) packet to its neighbors, which then forward the request to their

neighbors, until either the destination or an intermediate node with a fresh route to the

destination is located, as shown in Figure 4.6 (a).

AODV uses destination sequence numbers to ensure that all routes are loop-free and

contain the most recent route information. The source node includes in the RREQ the

most recent sequence number it has for the destination. Intermediate nodes can reply to

the RREQ only if they have a route to the destination whose corresponding destination

sequence number is greater than or equal to that contained in the RREQ. During the

process of forwarding the RREQ, intermediate nodes record in their route tables that

addresses of neighbors from which the first copy of the broadcast packet was received,

thereby establishing a reverse path. If additional copies of the same RREQ are received

later, these packets are discarded.

Once the RREQ has reached the destination or an intermediate node with a fresh

route, the destination or the intermediate node responds by unicasting a route reply

(RREP) packet back to the neighbor from which it first received the RREQ, as shown in

Figure 4.6 (b). As the RREP is routed back along the reverse path, nodes along this path

set up forward route entries in the route tables that point to the node from which the

RREP came. The source node can begin data transmission as soon as the first RREP is

received and can later update its routing information if it discovers a better route.

Associated with each route entry is a route timer, which causes the deletion of the

entry if it is not used within a specified lifetime. Since an RREP is forwarded along the

path established by an RREQ, AODV only supports the use of symmetric links.

Page 11: Chapter 4tkfujiwr/tfujiwara/gyouseki_pdf/Thesis/... · However, since each link of the network is configured with a single connection, ... Regarding network configuration, a centralized

56

Sending a message packet by unicasting in AODV, the packet header includes the

addresses of the source node, the destination node and the next hop node. Thereby, the

length of the header can be fixed. This scheme is reasonable to transmit a small message

in the restricted frequency bandwidth. However, AODV also uses broadcasting

technique to discover a route. In the event that a disaster happens and the conditions of

wireless links are deteriorated, massive route request packets may be generated

simultaneously, and lapsing into heavy congestion. Furthermore, when increasing the

node density, the issue becomes serious.

N1

N2

N6N3

N8N5

N7N4

Destination

Source

(a) Broadcasting for route discovery.

(b) Route reply by unicasting.

N1

N2

N6N3

N8N5

N7N4

Figure 4.6 Route discovery process in AODV

Page 12: Chapter 4tkfujiwr/tfujiwara/gyouseki_pdf/Thesis/... · However, since each link of the network is configured with a single connection, ... Regarding network configuration, a centralized

57

C) DSDV

The Destination Sequence Distance Vector (DSDV) routing protocol [51] is a

proactive table-driven routing protocol. Each node in the ad hoc network maintains a

routing table in which all of the possible destinations and the number of routing hops to

each destination are recorded. Figure 4.7 shows the process to add a link in DSDV,

where node-A joins the network. The node-A first transmits the routing information:

<node-ID, sequence number, hop count>, e.g., <A, 101, 0>. Node-B receiving the data,

inserts the information into the routing table. Then, the node-B propagates new route

information to neighbors: <A, 101, 1>. Likewise, other nodes update their routing table,

and continue propagation of the information. Hence, routing information is always

made readily available, regardless of whether the source node requires a route or not.

Updating information of a routing table is sent periodically throughout the network to

maintain table consistency. Therefore, this may generate a lot of control traffic in the

network, resulting in an inefficient utilization of network resources. DSDV introduces

two types of route update packets to alleviate this problem, one is a full dump packet,

and the other is a smaller incremental packet. However, these are not an essential

method of settlement. It may be hard to operate well in disaster circumstances since the

propagation conditions of massive nodes may be changed simultaneously.

B

D

C

E A

A, 101, 0

Figure 4.7 Link addition in DSDV in case that the node-A adds the network.

A, 101, 1

A, 101, 1

A, 101, 2 Dest Seq Next Metric

B's Route Table

B 132 B 0 C 144 C 1 D 202 D 1 E 155 D 2 A 101 A 1

Page 13: Chapter 4tkfujiwr/tfujiwara/gyouseki_pdf/Thesis/... · However, since each link of the network is configured with a single connection, ... Regarding network configuration, a centralized

58

D) ZRP

The Zone Routing Protocol (ZRP) [25], [87] is a hybrid protocol incorporating the

merits of on-demand and table-driven routing protocols. A routing zone is similar to a

cluster with the exception that every node acts as a cluster head and a member of other

clusters. Zones can overlap, and each node specifies a zone radius in terms of hops. The

size of a chosen zone, therefore, can affect ad hoc communication performance. In ZRP,

a routing zone comprises a few mobile nodes within one, two, or more hops away from

where the central node is formed. Within this zone, a table-driven-based routing

protocol is used. This implies that route updates are performed for nodes within the

zone. Each node, therefore, has a route to all other nodes within the zone. If the

destination node resides outside the source zone, an on-demand search-query routing

method is used.

ZRP itself has three sub-protocols:

• The proactive Intra-zone Routing Protocol (IARP)

• The reactive Inter-zone Routing Protocol (IERP)

• The Broadcast Resolution Protocol (BRP)

IARP can be implemented using existing link-state or distance-vector routing. The

routing information is propagated to the border of the routing zone. The IARP relies on

an underlying neighbor discovery protocol to detect the presence and absence of

neighboring nodes, and therefore, link connectivity to these nodes. Its main role is to

ensure that each node within the zone has a consistent routing table that is up-to-date

and reflects information on how to reach all other nodes in the zone.

IERP relies on border nodes to perform on-demand routing to search for routing

information to nodes residing outside its current zone. Instead of allowing the query

broadcast to penetrate into nodes within other zones, the border nodes in other zones

that receive this message will not propagate it further. IERP uses the broadcast

resolution protocol.

Because parts of an ad hoc route are running different routing protocols, their

characteristics will be different. Some part of the route is dependent on proper routing

Page 14: Chapter 4tkfujiwr/tfujiwara/gyouseki_pdf/Thesis/... · However, since each link of the network is configured with a single connection, ... Regarding network configuration, a centralized

59

convergence, while the other part is dependent on how accurate the discovered inter-

zone route is. This can make assurance of routing stability very difficult. Without proper

query control, ZRP may actually perform worse than standard flooding-based protocols.

ZRP's route discovery process is, therefore, route table lookup and/or inter-zone route

query search. When a route is broken due to node mobility, if the source of the mobility

is within the zone, it will be treated like a link change event and an event-driven route

update used in proactive routing will inform all other nodes in the zone. If the source of

the mobility is a result of the border node or other zone nodes, then route repair in the

form of a route query search is performed, or in the worst case, the source node is

informed of route failure.

The routing zone reduces overhead of the route discovery procedure. However, it

adds the other overhead of maintaining zone membership and routing information

within each zone [88].

4.5.2 Requirements for Routing Protocols in Disaster Communications

Considering the requirements of routing protocols in disaster communications, we

first assume that the network handles data of a small size such as emergency signals

instead of a large data like an image. Reducing the size of the data part in a packet, the

packet header should be small enough for efficient data transmission.

In addition, communication congestion is a critical issue. In the event that a disaster

happens, a number of terminals, which detect emergency signals from various sensors,

try to transmit data to a specified destination. Assuming an on-demand routing protocol,

the terminals will start the route discovery process simultaneously, lapsing into

congestion or collision by the route request packets. While lasting the change of

propagation conditions, the route discovery process may be repeated, not only

immediately after the event but also during several hours or more. The process induces

a lot of transmission and includes a potential issue of congestion. Therefore, in addition

to the performance comparison for several routing protocols, as shown in many papers,

e.g., [89], [90], we need to discuss their congeniality for disaster communications, as

listed in Table 4.1., considering the bandwidth consumption due to the route request.

Page 15: Chapter 4tkfujiwr/tfujiwara/gyouseki_pdf/Thesis/... · However, since each link of the network is configured with a single connection, ... Regarding network configuration, a centralized

60

In the case of DSR, a source node designates a route to transmit a packet, and

accumulates in the packet header the addresses of multiple intermediate nodes along the

route. Provided that the multihopping range increases, the header length also increases,

thereby, the packet header should be variable length. In conditions where the disaster

communication system transmits a short data, route addressing of DSR is not reasonable

in terms of efficiency. In addition, since DSR broadcasts a route request packet to

discover a route, it may result in flooding storm in the aftermath of a disaster.

On the other hand, in the case of AODV, since each intermediate node decides a

route and forwards a packet according to the routing table, it is able to fix the packet

header length. The addressing manner is preferable when transmitting a short data in

disaster communications. However, AODV also broadcasts a route request packet to

discover a route, and then similar issue to DSR may occur in disaster circumstances.

DSDV requires updating the routing table periodically. Especially, in the aftermath

of a disaster, the transmission may happen massively, entailing heavy traffic congestion.

As well as ZRP, since IARP (Intra-zone Routing Protocol) uses a table-driven-based

routing protocol, the same issue as DSDV may happen, even though the impact is

limited within the zone. Moreover, IERP (Inter-zone Routing Protocol) may generate

on-demand route discovery simultaneously, the traffic status may be confused.

Table 4.1 Comparison of Ad hoc routing protocols for disaster communications.

DSR AODV DSDV ZRP

Classification Reactive Reactive Proactive Hybrid

Routing Link state Distance vector Distance vector Distance vector + On-demand

Route discovery Broadcast Broadcast Table Inside: Table Outside: Broadcast

Route maintenance ACK / Route Error Hello Table dump Table dump

Header length Variable Fixed Fixed Variable

Bandwidth consumption ∆ ∆ × ×

Stability × × ∆ ∆

Feat

ures

for

disa

ster

com

m

Congeniality × ∆ × ×

Page 16: Chapter 4tkfujiwr/tfujiwara/gyouseki_pdf/Thesis/... · However, since each link of the network is configured with a single connection, ... Regarding network configuration, a centralized

61

4.5.3 Management of Route Discovery Process

In the event that a link of the hierarchical network disconnected, who initiates the

route discovery process, BS or nodes?

(1) Center-centric:

In case that BS initiates the process, we refer to the policy as center-centric, BS

needs to decide that each link is available or not. Provided that BS notices data from a

node has not reached BS via neither a direct path nor a multihopping path for a specified

period, it initiates the process for route discovery, and broadcasts a route request packet

[70]. If BS knows the area where the desired node is located, it is available to send a

request packet by designating a node, which is located near the desired node. If not, BS

must broadcast a request packet to whole network.

In Figure 4.8 (a), when BS attempts to find T1, it sends a route request packet to Ta

since BS has connection to Ta, and knows T1 is located near Ta. Then, Ta forwards the

route request by broadcasting. The request packet is transferred to T1 via T3 and T2, or

T3, T4 and T5. T1 may select the route via T2 and T3, and sends back the reply to Ta,

finally, Ta sends back the reply to BS. However, if T1 is broken, the BS cannot know

whether the node is not available or the route is not available, then it may repeat the

route discovery while the route reply does not arrive. This approach is an open-end

process, and then results in confusion.

(2) Node-centric:

In case that a node initiates the route discovery process, we refer to the policy as

node-centric. Nodes are capable of detecting by themselves that they cannot access BS

directly nor via multihopping since they have not received any reply from BS for a

specified period. In conditions where a node transmits the route request to neighbors,

and any neighboring node receives the request, and then the neighboring node sends

back the acknowledgement. If a node cannot operate any more, it does not output any

power, and does not interfere for neighboring nodes. It means that the node-centric

manner is superior to the center-centric on the route discovery in a disaster, where

Page 17: Chapter 4tkfujiwr/tfujiwara/gyouseki_pdf/Thesis/... · However, since each link of the network is configured with a single connection, ... Regarding network configuration, a centralized

62

massive nodes may be broken.

Figure 4.8 (b) shows the process of the node-centric route discovery. Since T1 cannot

access BS, it broadcasts a route request packet. The request is relayed via T2 and T3, or

T5, T4 and T3 by broadcasting. Assuming Ta has connection to BS, and receiving the

request via two routes, it may select the route via T3 and T2, and send back the reply.

As a result, T1 can build a route to BS via T2, T3, and Ta.

However, if a node cannot receive a reply for the route request, it may transmit the

route request again. As a result, such a node may invoke a heavy traffic. Thus, the node-

centric may also have a potential issue, though the manner has an advantage. We will

propose a routing protocol to overcome these issues in the next section.

REPLY to T2

(a) Center-centric routing process

BS

Ta

Distressed area

R-REQ (T1)

T3

T2

T1

T5 T4

REPLY to T3

REPLY to Ta

REPLY

Route request

Data

Reply

R-REQ

R-REQ

Figure 4.8 Node-centric / Center-centric route discoveries.

(b) Node-centric routing process

BS

Ta

Damaged node T3

T2

T1

T5 T4

T6

Route request

Data

Reply

R-REQ

R-REQ

REPLY

Data

Page 18: Chapter 4tkfujiwr/tfujiwara/gyouseki_pdf/Thesis/... · However, since each link of the network is configured with a single connection, ... Regarding network configuration, a centralized

63

4.5.4 Routing Protocol: LISNER

We propose a routing protocol for ECCA, which aims to build a route to BS without

an extra communication such as route request or exchanging a routing table. The

scheme is based on communications monitoring, thereby, referred to as LISNER (Listen

& Search Neighbor Environment Routing Protocols) [66], [67].

A) Outline

In the ECCA scheme, a node which has a route to BS transmits a control data

periodically using the CCCH channel, operating in either the cellular mode or the ad

hoc mode. In the event that the node cannot access BS, it monitors communications of

neighboring nodes. If the node receives a packet by overhearing, it checks the hop count

contained in the packet header. Recognizing that the neighboring node is able to access

BS with the hop count, the node requests the neighboring node to relay its packet. The

neighboring node forwards the packet to the next hop node which has been discovered

in advance. The packet is relayed, and finally reaches BS. Then, BS sends back the

reply message to the source node via the same route.

B) Route Discovery

In the event that a node cannot access BS in cellular mode, the node switches into the

ad hoc mode, and then initiates the route discovery process. The process does not

broadcast a route request packet, instead, monitors communications of neighboring

nodes. The route discovery scheme employs "hop-count" (Hop-CNT) as a metric, which

indicates the hopping range to reach BS and is included in the packet header, as

depicted in Figure 4.4 (b). The node knows the neighbor have a route to reach BS by the

number of the Hop-CNT.

Provided that a node overhears surrounding communications on the CCCH and

acquires a packet which any node transmits to another node or BS, it recognizes the

hopping range to reach BS by checking the Hop-CNT. The node transmits a packet

increasing the Hop-CNT by one to the discovered neighboring node to confirm that the

neighbor can forward a packet. If the node receives the acknowledgement from the

Page 19: Chapter 4tkfujiwr/tfujiwara/gyouseki_pdf/Thesis/... · However, since each link of the network is configured with a single connection, ... Regarding network configuration, a centralized

64

neighbor, it can decide the route to reach BS. If not, the node does not store the

neighboring node as the relay node, and monitors the channel again.

To maintain the routing information, each node has an entry table and a route table,

as shown in Table 4.2 and 4.3. The entry table contains a destination address, a next hop

node address, and a hop count of the next hop node. The table is used for transmitting a

packet toward BS. In conditions where the Hop-CNT contained in the packet is smaller

than the value stored in its entry table, the node updates the information of the entry

table. That is, the node maintains the entry that has the smallest hop count. If there are

multiple accessible nodes at the smallest hop count, it can select one of them randomly.

The amount of data of the table depends on the memory capacity of the node. Since the

proposed routing protocol chooses the shortest path, the number of the accessible nodes

is a trivial issue, though it may influence on the redundancy of alternative paths.

In the event that a node notices it cannot overhear the communication of a

neighboring node recorded in the table during the time to live (TTL) designated as a

system parameter in advance, the node deletes the entry to the neighboring node. When

a node notices by overhearing that the Hop-CNT of the next neighbors has changed, it

updates the data of its entry table. In addition, immediately after the Hop-CNT of an

intermediate node has changed, when the node receives a packet, and the Hop-CNT is

inconsistent with the record of the table, then the intermediate node replies the negative

acknowledgment (NAK) to inform the inconsistency of the Hop-CNT. The node

received the NAK retransmits the packet to the neighbor or to the other neighboring

nodes recorded in the table, after updating the Hop-CNT.

On the other hand, the route table contains route information to reply a packet, i.e.,

source node and sender node addresses, as illustrated by an example in Table 4.3. Those

data are set up when relaying packets toward BS. When sending back a reply to the

source node, the node transmits the reply packet to the sender node address recorded in

the table. In the event that a relaying node notice that it has not received a packet from a

certain source node for the TTL designated as a system parameter in advance, the node

deletes the record of the route table.

Page 20: Chapter 4tkfujiwr/tfujiwara/gyouseki_pdf/Thesis/... · However, since each link of the network is configured with a single connection, ... Regarding network configuration, a centralized

65

Table 4.2 Entry table of node-s for multihopping. Table 4.3 Route table of node-f.

Thus, nodes discover a route to BS, and maintain the route by monitoring the

surrounding communications. Each node knows the addresses of the next hop nodes.

Thereby, every node transmit a packet by designating the receiver i.e., by unicasting. It

allows nodes to transmit a packet stably, and to prevent generating extra

communications by broadcasting.

Figure 4.9 shows the scenario of the route discovery. When node-s cannot access BS,

it listens for the surrounding communications, and then captures a packet. The node-s

checks the sender node address (node-i) and the Hop-CNT. Then, the node-s records in

its entry table the address of node-i as the next hop node and the Hop-CNT (=k), as

listed in Table 4.2. When the node-s sends a packet to the node-i, which has a route to

reach BS, it sets the Hop-CNT of the packet as k+1. Receiving the packet, the node-i

relays the packet to node-f according to its own entry table. Finally, the packet reaches

BS by way of multihopping. If the node-s may hear a signal from another node (node-j),

it records the address and the Hop-CNT of node-j. Since the Hop-CNT of node-i is k

hops and node-j is k+1 hops, node-s, thereby, selects node-i as the next hop node

because of the smaller hop count.

Destination Next hop Hop-CNT

BS node-i k

BS node-j k+1

Source Sender

node-s node-i

node-t node-h

Figure 4.9 Route discovery

G1

G2

BS

kk

k+1 1

k+1

k+1

kk+1

1i

S

j g

f

ht

Page 21: Chapter 4tkfujiwr/tfujiwara/gyouseki_pdf/Thesis/... · However, since each link of the network is configured with a single connection, ... Regarding network configuration, a centralized

66

C) Upward and Downward Routes

This paper refers to the route toward BS as "Upward", and the route from BS to

nodes as "Downward". As mentioned above, an upward packet is transmitted to BS

according to the entry table of each node, on one hand. On the other hand, a downward

packet is sent back according to the route table. An example of each table is shown in

Table 4.2 and 4.3. When an intermediate node (node-f) is required to relay a packet by

node-i in Figure 4.9, it forwards the packet to the next hop node according to the entry

table. Concurrently, the node-f records in its route table the address of node-i as the next

send-back address, and the address of node-s as the destination for the downward.

Likewise, receiving a packet from node-h, which was initiated by node-t, node-f records

the address of node-h and node-t for the downward. When a downward packet

addressed to node-s arrives at node-f, the node-f can decide to relays the packet to node-

i according to the route table. Finally, the packet is delivered to node-s along the

downward route.

D) Route Error and Route Maintenance

In the event that an intermediate node detects failure in forwarding a packet, though

the node may retransmit a packet via another route, it does not carry out the retrans-

mission in ECCA scheme. If some intermediate nodes execute retransmission to another

route, it may take a long time for a source node to detect the failure, despite requiring a

short delay to deliver packets to BS. Besides, the stale message may rove during

retransmission, and may hamper other communications in the network.

Alternatively, ECCA introduces an idea to handle communication failure that an

intermediate node replies a route-error message or an expiration message to the

downward node if it detects the failure. The route-error message is replied in case that

the node has another route to be able to forward the message. On the other hand, the

expiration message is replied in case that the node has no route to forward the message.

Therefore, when the source node receives the route-error message, it can retransmit the

packet to the same next hop node, because the intermediate nodes have an alternative

Page 22: Chapter 4tkfujiwr/tfujiwara/gyouseki_pdf/Thesis/... · However, since each link of the network is configured with a single connection, ... Regarding network configuration, a centralized

67

path. When the source node receives the expiration message, it must send the packet to

another next hop node to transmit via another route.

Figure 4.10 demonstrates a scenario to reply either a route-error message (r-err) or

an expiration message (exp). In the event that an intermediate node (node-i) detects

failure at link-3 when forwarding a packet to the next hop node (node-f ), deletes the

entry to node-f from the entry table of node-i. If the entry table contains another route,

link-4, the node-i replies r-err to the downward node (node-r) according to the route

table. If node-i does not have any next hop node in the entry table, it returns exp to

node-r. Since intermediate nodes do not execute the retransmission process in ECCA,

node-r relays to the next downward node (node-s) the r-err received from node-i. If

node-r receives the exp from node-i, it deletes the route to node-i from the table, and

relays the exp. Only if the node-r has an alternative path in the entry table when

receiving the exp, it sends back to its downward node (node-s) the r-err instead of the

exp, since the node-r can choose an alternative path to forward a packet in the next

transmission. When the r-err arrives at the source node (node-s), the node can

retransmit the same packet to the same next hop node, or can select another next hop

node. If the node-s transmits a packet to the node-r again, the node-r forwards the

packet to the alternative node, node-j, according to the entry table of node-r. When the

node-s receives the exp, it must select another next hop node (node-k). If there is no

entry in the table of the source node, it must wait for transmitting the packet, until

overhearing communications of neighbors and discovering another route.

Concerning route maintenance, since each node transmits a packet periodically in

ECCA scheme, it can update the freshness of routes automatically, resulting in

maintaining the connectivity between neighboring nodes. Moreover, since this protocol

does not transmit a search packet such as a route request or a hello message by

broadcasting to inform connectivity for neighboring nodes, nodes do not induce

interference. It leads to stable transfer of packets.

Page 23: Chapter 4tkfujiwr/tfujiwara/gyouseki_pdf/Thesis/... · However, since each link of the network is configured with a single connection, ... Regarding network configuration, a centralized

68

Figure 4.10 Route error and route maintenance.

i

f

G1

r

G2

BS S

g

link-1 link-2

link-3

link-4

k

l mG3

jlink-5

link-6

err / experr / exp

Next Hop

i j

3 4

Entry table

Next Hop

r k

4 4

Entry table

Next Hop

fg

22

Entry table

Page 24: Chapter 4tkfujiwr/tfujiwara/gyouseki_pdf/Thesis/... · However, since each link of the network is configured with a single connection, ... Regarding network configuration, a centralized

69

4.6 Medium Access Control Protocol

The medium access control (MAC) protocol is a key factor to avoid collision of

packets or communication congestion in wireless networks. Most protocols have been

proposed to aim achieving the best-effort performance instead of accessibility. This

section proposes a MAC protocol based on time scheduling to ensure channel access in

disaster or emergency circumstances. We first discuss the classification of related

wireless MAC protocols, and then describe a protocol for ECCA.

4.6.1 Classification of MAC Protocols

Wireless MAC protocols are broadly classified into two categories; distributed

protocols and centralized protocols, according to the type of network architecture.

Reference [52] has further classified them into a random access protocol, a guaranteed

access protocol, and a hybrid access protocol. The hybrid access protocol is further

classified into reservation access and demand assignment. To discuss the feature of the

ECCA MAC protocol, we have reviewed them, and have classified the protocols into

random, reservation, scheduling and channelization access protocols, as shown in Table

4.4, considering the allocation fashion.

We briefly review some wireless MAC protocols. First, Table 4.4 lists fundamental

protocols, CSMA/CA and ALOHA [53] as the random access protocol in the distributed

manner, which contend for access to the medium. Regarding the reservation access

protocol, it is much efficient to transmit data. Some existing protocols, MACA [54],

MACAW [55], FAMA [56] and IEEE 802.11-DCF [57], [58] are listed in the table.

They acquire the channel with handshaking of RTS and CTS between nodes. When a

node overhears RTS or CTS, the node is inhibited to transmit a packet during the

designated time. In addition to the RTS-CTS manner based on MACA and MACAW,

IEEE 802.11-DCF introduces virtual carrier sensing, which is achieved by using time

fields in the packets to indicate the duration of the current transmission to other nodes.

The time field is called the Network Allocation Vector (NAV). When all nodes hears

the RTS or CTS, they back off NAV amount of time before sensing the channel again.

Page 25: Chapter 4tkfujiwr/tfujiwara/gyouseki_pdf/Thesis/... · However, since each link of the network is configured with a single connection, ... Regarding network configuration, a centralized

70

This protocol achieves high performance by the best efforts as known well in the

wireless LAN. However, when the node density becomes higher, the efficiency

deteriorates due to exposed and hidden node problem [49], [59], [60], [61]. Regarding

the scheduling access in distributed MAC protocols, USAP is proposed in [65], which is

a distributed TDMA slot assignment protocol. It allows a transmitter to choose one or

more slots from the pool of unassigned slots in its neighborhood, coordinate the

announcement and confirmation of the assignment with the neighboring nodes up to two

hops away, and detect and resolve conflicting assignments that result from unfortunate

timing and mobility of the nodes.

Second, the access protocol in cellular network is categorized as channelization

access, which statically allocates channels to mobile stations, and it is used for voice

communication. Those protocols allow a mobile station to acquire a channel stably, if

the network affords the number of channels, otherwise, call blocking may occur. We

know well that the access scheme is vulnerable for heavy phone use especially in

disaster circumstances.

Third, the random access protocol and the reservation access protocol in centralized

wireless MAC protocols are access manners based on contention scheme using a master

station. Table 4.4 lists some examples with reference to [52]; ISMA [62] is for random

access, and PRMA [63] and DQRUMA [64] for reservation access. In ISMA, a central

station broadcasts "Idle signal (IS)" when it detects that the channel is idle. All nodes

that have data in the buffer transmit with a probability p. If more than two nodes

transmit a packet for the same IS, the probability that collision occurs is p2 or less. In

case of reservation access protocols, PRMA handles voice and data. A voice node

transmits a packet in a vacant slot with a probability p. A successful voice packet

reserves that slot for the following packets in the stream until the end of talk. A data

node also contends similarly, however, no reservation is made for a successful data

node. That scheme gives priority to the voice node over the data node. In DQRUMA,

the uplink and downlink are frequency duplexed. The uplink consists of a request

channel and a packet-transmission data channel. The former is used to send requests by

contention, and the latter to send data based on reservation. Before transmitting data, a

Page 26: Chapter 4tkfujiwr/tfujiwara/gyouseki_pdf/Thesis/... · However, since each link of the network is configured with a single connection, ... Regarding network configuration, a centralized

71

node attempt to reserve a channel with a small request packet in contention-based

random access. If the node successfully made a reservation, it is informed by

broadcasting the ID of the node on the downlink acknowledgement (ACK) channel, and

is allowed to transmit data on data channel without collision.

Fourth, the scheduling access protocol guarantees the channel access by way of

polling or dedicated channel allocation. IEEE 802.11-PCF (Point Coordination

Function) mode allows nodes to ensure contention-free access with an access point

polling nodes in order.

4.6.2 MAC Protocol for ECCA

ECCA network scheme is based on the centralized MAC protocols. The channels of

ECCA, the data channel (DCH) and the common communication channel (CCCH),

introduce individual MAC protocols in order to satisfy the requirements.

The DCH connecting between BS and nodes directly employs the reservation access

manner due to transmitting data flexibly and efficiently, as categorized in Table 4.4. The

channel is mainly used for normal data transmission, not for emergency

Channel Allocation Access Centralized MAC Protocols Distributed MAC Protocols

Static allocation Channelization FDMA, TDMA, CDMA

ECCA-CH(*)

Random ISMA CSMA/CA, ALOHA

Reservation PRMA, DQRUMA ECCA-DCH

802.11-DCF MACA, MACAW, FAMA

Dynamic allocation

Scheduling Polling

802.11-PCF ECCA-AD(*)

USAP

(*) CCCH channel of ECCA network operates by two modes; one is for the cellular mode, the other is for the ad hoc mode. This scheme is described the later section.

Table 4.4 Classification of wireless MAC protocols based on access methods.

Page 27: Chapter 4tkfujiwr/tfujiwara/gyouseki_pdf/Thesis/... · However, since each link of the network is configured with a single connection, ... Regarding network configuration, a centralized

72

communications. When a node have a packet, it sends a small request packet in a

channel of RTS sub-frame by selecting a timeslot and a CDMA code randomly to make

a reservation of data channel, as shown in the previous Figure 4.4. Provided that the

base station receives the request successfully, the base station assigns to the node a

timeslot and a CDMA code of the data channels, and notifies the allocation information

by CTS sub-frame. Receiving the notification, the node transmits a data packet using

the designated data channel. In conditions where the node has more packets in its buffer,

the node sets the piggybacking flag when transmitting data. Thereby, the node is able to

maintain the channel. Thus, nodes can transmit data in the data channel without

collision.

On the other hand, each timeslot of the common communication channel (CCCH) is

assigned to every node in advance, and maintains the allocation until the node removes

from the network. In case of CH-Net, each node transmits data in the designated

timeslot; hence, it is the channelized access manner, as classified in Table 4.4. The

access manner can ensure access to BS. In case of AD-Net by multihopping, each node

transmits data in the dynamically scheduled and designated channel. The protocol

referred to as MICS is described in the next section. Thus, the channel access protocol

in ECCA, especially on CCCH, aims to transmit data quickly and stably for disaster

communications.

4.6.3 Comparison of MAC Protocols

The Data channel of ECCA, DCH, is based on CDMA and TDMA channels, and

employs the reservation access scheme for the MAC protocol, as described above. The

CDMA manner provides the benefits to improve the frequency band efficiency and the

noise-interference characteristics. The TDMA provides the efficient allocation of

channels. Since the data transmission is carried out on demand, not periodically, and the

data size is rather a large, the reservation access manner is more adequate than

scheduling or random access. Hereby, several nodes can access the channels quickly

and stably, and transmit data efficiently in normal conditions.

Page 28: Chapter 4tkfujiwr/tfujiwara/gyouseki_pdf/Thesis/... · However, since each link of the network is configured with a single connection, ... Regarding network configuration, a centralized

73

The CCCH is required to guarantee to access. The channelization access manner

such as FDMA, TDMA and CDMA, are capable of providing stable data transmission

for allocated nodes, though those manners have a definite limitation due to the capacity.

In conditions where the ECCA is used in the network that the number of nodes can be

supposed, and where the data transferred on CCCH is restricted to small size to handle

emergency data, the CCCH can employ the channelization access manner. Especially,

CCCH in the CH-Net between a base station and nodes satisfies those conditions.

Therefore, the CCCH in the CH-Net, referred to as ECCA-CH in Table 4.4, employs the

access scheme. Each node is assigned in one of the timeslots by fixed allocation. Hereby,

the access of those channels is ensured, in conditions where the link between the base

station and the node is maintained.

Meanwhile, in case of multi-hopping on CCCH, if several nodes require a certain

node to relay a packet and the intermediate node relays the packet based on the

channelization such as ECCA-CH, the node may be congested with forwarding packets.

If the node accesses CCCH by random access or reservation access, it cannot ensure

quick data transmission. Hereafter, we propose a protocol for multihopping based on

scheduling manner.

4.6.4 Multihop Access Scheduling: MICS

ECCA needs to deliver a packet at the short delay even in multihop transmission. We

discuss a multihop access scheduling scheme, MICS (Multihop Access on Initial Channel

by Scheduling). In conditions where a node has discovered a route to BS via an adjacent

node in ad hoc networks, the node sends its own packet and relaying packets via

neighbors. If a number of packets arrive at a node, the node has to accumulate the

packets in the queue and send them sequentially, when acquiring a channel. Since all

packets converge at BS due to the network topology, the network may suffer congestion

at BS or around direct connection nodes (DCNs) even in ECCA. In particular, the

network lapses into a long delay to deliver packets in a large-scale disaster, since the

number of DCN is reduced and the number of multihopping range is increased.

Page 29: Chapter 4tkfujiwr/tfujiwara/gyouseki_pdf/Thesis/... · However, since each link of the network is configured with a single connection, ... Regarding network configuration, a centralized

74

In the medium access scheme of ECCA, when a node sends an own packet to the

adjacent, the source node transmits it in the designated own timeslot. Since the timeslot

is allocated only to the node, this channel can transmit a packet without contention. An

intermediate node, however, is required to relay packets by multiple nodes. In

conditions where the intermediate node can use only a designated slot to forward the

packets, those packets are stacked in the queue of the intermediate node, and then the

packets result in a long delay even when the intermediate node sends an own packet.

This scheme may bring another issue on fairness that the node cannot send even own

packets.

To overcome this issue, ECCA proposes a dedicated protocol for multihop access

scheduling, MICS (Multihop Access on Initial Channel by Scheduling) [66], [67], based

on TDM (Time Division Multiplexing) to transmit data by way of multihopping. When

a source node transmits a packet, it transmits it on the designated timeslot, on one hand.

When an intermediate node, on the other hand, relays packets, the node transmits them

on the timeslots designated to the source nodes, not on the timeslot of the intermediate

node. Therefore, even if packets converge from several nodes to the intermediate node,

the node can complete to relay the packets in the next frame without packets stacked in

the queue. However, source nodes have to wait for sending the next packet while other

nodes occupy its timeslot to relay the packet. Though this protocol requires the source

nodes to impose a restriction, it achieves an efficient and fair transmission on

intermediate nodes. The MICS protocol requires BS to send back a reply packet

(REPLY) to indicate the idle state of the timeslot to the source node.

Figure 4.11 shows the access scheduling in multihop by MICS protocol. Each node

is assigned at one of timeslots. They can transmit their own packets at the designated

timeslot. In the figure, T1 is a DCN; it can transmit a packet in every slot, and receive

the REPLY piggybacked on the ACK packet between BS and the node. A multihopping

node sends its own packet to a neighbor at the designated slot; T2 sends its packet to T1

at T2's slot. An intermediate node, on the other hand, does not relay the packet on its

own slot, but relays it on the slot of source node. In the figure, T1 relays the packet of T2

on the T2's slot, and sends back the REPLY on the T2's slot as well. Likewise, Tn

Page 30: Chapter 4tkfujiwr/tfujiwara/gyouseki_pdf/Thesis/... · However, since each link of the network is configured with a single connection, ... Regarding network configuration, a centralized

75

transmits its packet on the Tn's slot, while the intermediate nodes, Ti, Tj, etc relay the

packet on the Tn's slot. Finally the packet reaches BS, and vice versa.

In this protocol, since an intermediate node can forward every packets at the next

frame, there is no stacked packet in the queue of the node, even though several

neighbors require to forward their packets. Despite the advantage, the source node has

to wait for the REPLY during the duration (td), which is the transmission delay for two-

way, in the case of the node Tn, as illustrated in Figure 4.11.

Regarding the error process, a node received a packet replies ACK at the same

timeslot. Note the symbol of ACK is omitted in Figure 4.11. If a node does not receive

the ACK, it knows the failure by the time-out process. The node does not retransmit the

packet in the MAC protocol, while the failure is informed to the upper layer. The node

sends back the error message in the downward route, according to the routing protocol,

as described in the previous section. In fact, the failure happens on the REPLY, the node

is not possible to transfer the error message, has to discard the message. The source

node decides the failure by the error message or by time-out process in case of the lack

of REPLY. Since the source node knows the transmission delay (td) in advance in this

protocol, provided that retransmission process is not carried out, the node is possible to

detect the failure after td.

Actually, restricted retransmissions in the MAC layer might be useful if the

retransmission process is optimized for a specific condition. However, since the

optimization of the retransmission is not a primary discussion in this paper, we do not

discuss about it in detail.

Page 31: Chapter 4tkfujiwr/tfujiwara/gyouseki_pdf/Thesis/... · However, since each link of the network is configured with a single connection, ... Regarding network configuration, a centralized

76

DATA (Uplink) REPLY (Downlink)

Figure 4.11 Multihop access scheduling protocol: MICS.

(T1)

(T2)

(T3)

(Tn)

Slot Frame

k

k+1

T2 T1 BS

(T1)

(T2)

(T3)

(Tn)

(T1)

(T2)

(T3)

(Tn)

(T1)

(T2)

(T3)

(Tn)

k+2

k+m

fram

e

Time

Tn

timeslot

Tran

smis

sion

Del

ay =

t d

Ti Tj

Page 32: Chapter 4tkfujiwr/tfujiwara/gyouseki_pdf/Thesis/... · However, since each link of the network is configured with a single connection, ... Regarding network configuration, a centralized

77

4.7 Scenario for Route Discovery and Multihopping

We have presented a route discovery protocol, LISNER, and a multihop access

scheduling protocol, MICS, for ECCA to operate in disaster communications. We

demonstrate the scenario for the protocols, based on the operation of Figure 4.11 and

Figure 4.12.

We assume that T1 is able to access BS directly (Hop-CNT=1), and T2 and T3 are

disconnected from BS. T2 locates near T1, T3 near T2, respectively, as depicted in

Figure 4.12. While T1 periodically transmits a packet to BS, if T2 can hear the

communications of T1, it recognizes that T1 is able to reach BS, and the Hop-CNT is

one (1). Then, T2 records in the entry table the address of T1 as the next hop node, and

requests T1 to forward a packet to BS, setting the Hop-CNT at two (2). The packet

header from T2 to T1 includes the followings, Rx=T1, Tx=T2, Dest=BS, Src=T2 and

Hop-CNT=2. When receiving the packet from T2, T1 relays the packet in T2's slot of the

next frame, setting the Hop-CNT at one (1). Concurrently, T1 records the downward

route in the route table to reach T2; i.e., the source node is T2, the sender is also T2.

When a reply packet for T2 arrives at T1 from BS, T1 decides the route to T2 according

to the route table, and then relays the reply packet to T2.

Likewise, T3 recognizes that T2 can reach BS at two hops by monitoring the

communications, as depicted in Figure 4.12. When T3 sends T2 a packet in its own slot,

T2 relays the packet to T1 in T3's slot according to the entry table. As a result, the packet

of T3 reaches BS via T2 and T1. Even if packets from several nodes converge to T1, T1 is

capable of forwarding packets of them within one frame since it can use timeslots of the

source nodes.

In the event that T2 cannot receive ACK from T1 due to communication failure, T2

detects the failure in the MAC layer, and then informs it to the network layer. The

network layer of T2 sends back the expiration message to T3 in the next frame, since the

node has no route in the entry table. If receiving the expiration message, the source

node T3 waits during the transmission delay (td), and then retransmits the packet in

another route via Ta even if it takes four hops from T3 to BS. In the event that T2 cannot

Page 33: Chapter 4tkfujiwr/tfujiwara/gyouseki_pdf/Thesis/... · However, since each link of the network is configured with a single connection, ... Regarding network configuration, a centralized

78

receive REPLY from T1, T1 is not possible to deliver the error message to the downward

node. Consequently, though T3 cannot receive any error message, it recognizes the

failure by time-out process, waiting during the duration (td). After that manner, T3 can

retransmit the packet via an available route.

Figure 4.12 Scenario for multihopping in ECCA

BS

Hop=1

T1T2

Hop=1

Hop=2T3

Hop=2

Hop=3

T4

T5

Hop=2

Hop=2

Src Send T3 T3

Route table

BSNext Hop

0

Entry table

Src Send T2T3

T2T2

Route tableT1

Next Hop 1

Entry table

Ta Tk

T2 Next Hop

2

Entry table

Ta 3

Page 34: Chapter 4tkfujiwr/tfujiwara/gyouseki_pdf/Thesis/... · However, since each link of the network is configured with a single connection, ... Regarding network configuration, a centralized

79

4.8 Summary

We have presented a hybrid wireless network scheme, ECCA, which combines ad

hoc networks with a centralized network, to satisfy the requirements for connectivity

and accessibility of the network in disaster communications. The routing protocol,

LISNER, allows a node to find an available route via neighboring nodes by monitoring

scheme, not using a control packet such as the route request. The protocol can achieve

multihop transmission by unicasting, resulting in stable communications. The MAC

protocol for multihopping, MICS, provides forwarding a packet quickly even in the

congested state in the network. Hence, ECCA satisfies the requirements in disaster

communications to ensure accessibility without an extra-delay and to provide a robust

connection with ad hoc networking. ECCA can provide the stable routing process and

the feature for congestion avoidance.