12
Mobile Netw Appl DOI 10.1007/s11036-008-0050-8 QUORUM—Quality of Service in Wireless Mesh Networks Vinod Kone · Sudipto Das · Ben Y. Zhao · Haitao Zheng © Springer Science + Business Media, LLC 2008 Abstract Wireless mesh networks (WMNs) can pro- vide seamless broadband connectivity to network users with low setup and maintenance costs. To support next- generation applications with real-time requirements, however, these networks must provide improved qual- ity of service guarantees. Current mesh protocols use techniques that fail to accurately predict the per- formance of end-to-end paths, and do not optimize performance based on knowledge of mesh network structures. In this paper, we propose QUORUM, a routing protocol optimized for WMNs that provides accurate QoS properties by correctly predicting delay and loss characteristics of data traffic. QUORUM in- tegrates a novel end-to-end packet delay estimation mechanism with stability-aware routing policies, allow- ing it to more accurately follow QoS requirements while minimizing misbehavior of selfish nodes. Keywords QoS · routing · wireless mesh 1 Introduction Wireless mesh networks (WMNs) have emerged as a popular alternative to provide last-mile connectivity to Internet users. Wireless mesh networks [1] are dynam- ically self-organizing and self-configuring networks where participating nodes automatically establish and maintain connectivity amongst themselves. These networks are robust and have low up-front and network V. Kone (B ) · S. Das · B. Y. Zhao · H. Zheng Computer Science, University of California, Santa Barbara, UC Santa Barbara, Santa Barbara, CA 93106, USA e-mail: [email protected] maintenance costs. A WMN may be thought as a multi- hop mobile ad-hoc network (MANET) with extended connectivity. They provide a cheaper alternative last mile connectivity than ADSL or Cable networks, and have been adopted by numerous academic and indus- trial deployments (Champaign–Urbana community wireless network, http://www.cuwireless.net/; bay area wireless user group, http://www.bawug.org/; wireless LAN infrastructure mesh networks: capabilities and benefits, www.firetide.com; mesh dynamics structured mesh networking for mobile data, video and voice, http://meshdynamics.com/meshdynamics.documents/ MD4000_BROCHURE.pdf, Tropos MetroMesh architec- ture overview, http://www.tropos.com/pdf/metromesh_ datasheet.pdf)[2, 3]. As deployments of WMNs continue to grow, we expect these networks to have the ability to support the new generation of streaming-media applications, such as voice over IP (VoIP) and video on-demand (VOD) [4]. These applications require quality of service (QoS) guarantees in terms of minimum bandwidth and maxi- mum end-to-end delay. Most existing work on wireless mesh networks rely on adapting protocols originally designed for mobile ad hoc networks, and offer little support for QoS. In this paper, we propose a routing protocol for wire- less mesh networks that provides QoS guarantees to applications based on metrics of minimum bandwidth ( B min ) and maximum end-to-end delay (T max ). While issues such as end-to-end route discovery have been studied in great depth for WMNs and MANETs [5, 6], our goal is to build a WMN routing protocol that pro- vides “strong” QoS guarantees. By “strong” we mean that our protocol will accept application requests for desired bandwidth and delay bounds for a flow, and

QUORUM—Quality of Service in Wireless Mesh Networksravenben/publications/pdf/quorum-monet08… · QUORUM—Quality of Service in Wireless Mesh Networks ... A WMN may be thought

Embed Size (px)

Citation preview

Page 1: QUORUM—Quality of Service in Wireless Mesh Networksravenben/publications/pdf/quorum-monet08… · QUORUM—Quality of Service in Wireless Mesh Networks ... A WMN may be thought

Mobile Netw ApplDOI 10.1007/s11036-008-0050-8

QUORUM—Quality of Service in WirelessMesh Networks

Vinod Kone · Sudipto Das ·Ben Y. Zhao · Haitao Zheng

© Springer Science + Business Media, LLC 2008

Abstract Wireless mesh networks (WMNs) can pro-vide seamless broadband connectivity to network userswith low setup and maintenance costs. To support next-generation applications with real-time requirements,however, these networks must provide improved qual-ity of service guarantees. Current mesh protocols usetechniques that fail to accurately predict the per-formance of end-to-end paths, and do not optimizeperformance based on knowledge of mesh networkstructures. In this paper, we propose QUORUM, arouting protocol optimized for WMNs that providesaccurate QoS properties by correctly predicting delayand loss characteristics of data traffic. QUORUM in-tegrates a novel end-to-end packet delay estimationmechanism with stability-aware routing policies, allow-ing it to more accurately follow QoS requirementswhile minimizing misbehavior of selfish nodes.

Keywords QoS · routing · wireless mesh

1 Introduction

Wireless mesh networks (WMNs) have emerged as apopular alternative to provide last-mile connectivity toInternet users. Wireless mesh networks [1] are dynam-ically self-organizing and self-configuring networkswhere participating nodes automatically establish andmaintain connectivity amongst themselves. Thesenetworks are robust and have low up-front and network

V. Kone (B) · S. Das · B. Y. Zhao · H. ZhengComputer Science, University of California, Santa Barbara,UC Santa Barbara, Santa Barbara, CA 93106, USAe-mail: [email protected]

maintenance costs. A WMN may be thought as a multi-hop mobile ad-hoc network (MANET) with extendedconnectivity. They provide a cheaper alternative lastmile connectivity than ADSL or Cable networks, andhave been adopted by numerous academic and indus-trial deployments (Champaign–Urbana communitywireless network, http://www.cuwireless.net/; bay areawireless user group, http://www.bawug.org/; wirelessLAN infrastructure mesh networks: capabilities andbenefits, www.firetide.com; mesh dynamics structuredmesh networking for mobile data, video and voice,http://meshdynamics.com/meshdynamics.documents/MD4000_BROCHURE.pdf, Tropos MetroMesh architec-ture overview, http://www.tropos.com/pdf/metromesh_datasheet.pdf) [2, 3].

As deployments of WMNs continue to grow, weexpect these networks to have the ability to support thenew generation of streaming-media applications, suchas voice over IP (VoIP) and video on-demand (VOD)[4]. These applications require quality of service (QoS)guarantees in terms of minimum bandwidth and maxi-mum end-to-end delay. Most existing work on wirelessmesh networks rely on adapting protocols originallydesigned for mobile ad hoc networks, and offer littlesupport for QoS.

In this paper, we propose a routing protocol for wire-less mesh networks that provides QoS guarantees toapplications based on metrics of minimum bandwidth(Bmin) and maximum end-to-end delay (Tmax). Whileissues such as end-to-end route discovery have beenstudied in great depth for WMNs and MANETs [5, 6],our goal is to build a WMN routing protocol that pro-vides “strong” QoS guarantees. By “strong” we meanthat our protocol will accept application requests fordesired bandwidth and delay bounds for a flow, and

Page 2: QUORUM—Quality of Service in Wireless Mesh Networksravenben/publications/pdf/quorum-monet08… · QUORUM—Quality of Service in Wireless Mesh Networks ... A WMN may be thought

Mobile Netw Appl

either reject the flow if such constraints are not possi-ble, or accept the flow that satisfies those performancebounds at the time of the request. If and when a routeis disrupted by a node or link failure, our protocol auto-matically detects the route breakages, and re-discoversalternate routes if they exist.

This paper makes three key contributions. First, wepropose a mechanism that accurately predicts the end-to-end delay of a flow, and show how it can be in-tegrated into flow setup to satisfy QoS requirements.Second, we define a robustness metric for link qualityand demonstrate its utility in route selection. This ro-bustness metric supports “intelligent” routing that notonly deals with communication gray-zones and fluctu-ating neighbors [7], but also helps discourage selfish“Free-riding” behavior [8]. Finally, we perform exten-sive evaluation of our protocol in the Qualnet simulatorunder a variety of conditions and metrics.

The remainder of this paper is organized as follows.Section 2 describes previous work on routing and QoSsupport in wireless networks. Second, Section 3 de-scribes our network model and design objectives, andhighlights the major challenges in providing strong QoSguarantees. Next, Section 4 describes the details of theQUORUM routing protocol. Finally, we describe oursimulation setup and results in Section 5 and concludein Section 6.

2 Related work

Wireless networks has been an active area of researchinterest and a significant work has been done on routingin wireless networks [9–11] and MANETS [5, 6]. Butthere has been a relatively less focus on providing“strong” QoS guarantees for WMNs. Most of the ex-isting work is either focused on MANETs or WMNswhich have multiple radios. A review of relevant litera-ture shows that various approaches have been taken toprovide QoS guarantees.

Some researchers advocate for a stateless approach[12], while others have advocated maintaining state atintermediate nodes [13–15]. Providing a stateless solu-tion in [12], the authors describe a way to achieve QoSrouting without using explicit reservation mechanismsand give new distributed solution to oscillation andcollision of flows. This paper proposes QoS based onOLSR, and has both the advantages and disadvantagesof the underlying proactive routing protocol. Movingon to the stateful approaches, Chen et. al. [15] proposea Distributed QoS Routing Scheme where the path iscomputed by the exchange of control messages, and thestate information kept at each node is collectively used

to find a path. WMR [14] is another stateful protocolthat has been proposed to provide QoS enabled routingin WMNs and is the result of modifying its MANETcounterpart, AQOR [13] to the wireless mesh context.Both AQOR and WMR cannot provide strong delayguarantees, since they perform delay estimation usingroute request (RREQ) and route reply (RREP) mes-sages. Our experiments in Section 5 show these delayestimators to be highly inaccurate.

Other approaches include use of channel switch-ing [16] where APs use multiple channels and MobileHosts (MHs), upon detection of a QoS violation, switchchannels to connect to another AP. Another approach[17] proposes clustering of end hosts and use of orthog-onal channels to reduce the effect of interference. Avery different method [17] suggests the use of a sta-tistical mechanics technique called Annealing. In [17],the authors propose a new QoS routing protocol forwireless mesh networks. They use delay and band-width as the QoS parameters and then use Mean FieldAnnealing for finding a suitable path. MFN_RS usesdeterministic equations to replace stochastic processesin simulated annealing (SA) and saddle point approxi-mation in the calculation of stationary probability dis-tribution at equilibrium.

Even though there has been some work in design-ing solutions for providing QoS enabled routing forWMNs, none of these protocols deliver “strong” QoSguarantees in terms of latency or throughput metrics.Our work, QUORUM, is a stateful approach that per-forms On-demand route discovery and selection usingmultiple metrics like bandwidth, delay, and robustness(discussed in details in Section 3.2.1) while providing“strong” QoS guarantees. Even though the problemof providing QoS guarantees based on multiple con-straints has been shown to be NP Complete [17], itis also known that with suitable heuristics, a multi-constrained QoS routing algorithm can work in poly-nomial time [18].

QUORUM differs from the work described above invarious aspects. Firstly, our network uses single radiosthroughout (although the Mesh Routers use multipleradios, one radio is used to communicate with the cli-ents while the other is used to communicate with otherMRs). Although recent research [10, 11] propose theuse of multiple radios, we go for single radios forsimplicity, energy efficiency, and lower cost. Secondly,QUORUM is a reactive protocol that maintains “soft”state at all the nodes in the network. Thirdly, QUO-RUM uses a novel DUMMY-RREP phase to accuratelypredict the delay that will be experienced by the flowsin the network. Finally, QUORUM uses a concept ofRobustness of the routes. The robustness of the nodes

Page 3: QUORUM—Quality of Service in Wireless Mesh Networksravenben/publications/pdf/quorum-monet08… · QUORUM—Quality of Service in Wireless Mesh Networks ... A WMN may be thought

Mobile Netw Appl

are calculated by using the HELLO messages used to ex-change the information about the reservations at eachnode. The robustness metric not only allows rejectionof transient routes and working around the fluctuatingneighbor problem, but it also equips the protocol withthe inherent ability to tackle a type of “Selfish” behav-ior referred in literature as “Free-riding’ [8].

3 Network model and challenges

In this section, we define our context by outlining ourmodel of the network, then describe two key challengesthat motivated the development of the QUORUMrouting protocol.

3.1 Network model

We use a hybrid mesh architecture [1] consisting ofthree types of nodes, Mesh Clients representing endusers, Mesh Routers that communicate with clients andother mesh routers, and Internet Gateways that commu-nicate with mesh routers and the external Internet. Anexample is shown in Fig. 1. Mesh routers and clientsrun the same routing protocol. Mesh routers have twointerfaces operating on orthogonal channels, one forcommunicating with mesh clients and other for com-municating with other mesh routers. Mesh clients haveonly one interface. Three types of routes are possible:those that connect two mesh clients served by the samemesh router, those that connect mesh clients servedby different mesh routers, and those that connect a

The Internet

Internet Gateway Internet Gateway

Mesh Router

Mesh Clients

Figure 1 WMN hybrid network architecture consists of meshrouters, mesh clients and internet gateways. A router has twointerfaces, one for clients and one for other routers

mesh client to an Internet host. Also, note that ournetwork uses Layer 3 routing throughout in order toleverage the advantages of MANETs, including ease ofdeployment and extended connectivity.

3.2 Design challenges

This section describes two major design challenges fora QoS-enabled mesh routing protocol, and forms thebasis for two of the major contributions made by thispaper: detecting and avoiding “fragile” routes, and pro-ducing accurate estimates of a flow’s end-to-end delay.

3.2.1 Measuring link robustness

A significant challenge faced by existing routing proto-cols is the communication gray zone problem [7]. Mostrouting protocols such as AODV [5] and WMR [14]rely on control (RREQ) packets to detect and establishend to end routes. However, these control (broadcast)packets have properties that differ significantly fromdata packets. To be more specific, the three main dif-fering characteristics are (1) broadcast packets are sentat lower bit rates which make them more reliable thandata packets for decoding (2) smaller sizes of broadcastpackets result in lower probability for collision and (3)no acknowledgment for broadcast packets means theflow is unidirectional whereas data with acks constitutesa bidirectional flow. As a result of these differences,each node has a strip of surrounding region called grayzone. Neighboring nodes present in this zone might beable to successfully receive broadcast packets but mightnot be able to receive data packets (Fig. 2). Note that,the next hop neighbor of a node for an end to end routeis selected based on the neighbor’s capability of send-ing and receiving RREQs, which are broadcast packets.Hence, there is a significant chance that many of thenodes along the chosen route fall into the gray zones’of their neighbors on the route. Consequently, oncethe data starts flowing along this “fragile” route some

Gray Zone

Broadcast range

Unicast range

Figure 2 Communication gray zone. Neighbors in the gray zonemay receive broadcast packets but may not receive data packets

Page 4: QUORUM—Quality of Service in Wireless Mesh Networksravenben/publications/pdf/quorum-monet08… · QUORUM—Quality of Service in Wireless Mesh Networks ... A WMN may be thought

Mobile Netw Appl

0

10000

20000

30000

40000

50000

2 4 6 8 10 12 14 16 18 20

Con

trol

Ove

rhea

d

Number of Flows

AODV

Figure 3 Control Overhead in a 50 node network. Overhead iscalculated as the total number of RREQs forwarded by all thenodes in the network

nodes will not able to receive data packets, triggeringfrequent link repairs. Since, link repairs usually entailre-routing process which includes broadcast flooding ofRREQ packets and RREPs there would be enormousamount of overhead in the network. This results in aperformance deterioration especially for QoS routingprotocols because of the disruption of flows due to theoverhead of the additional control traffic.

To demonstrate this, we quantify the control over-head in a network of 50 nodes (Fig. 8) with varyingnumber of flows in the network. Each flow is requiredto send 10,000 data packets at a rate of 50 kbps. Flowsare selected randomly in each run and the simulationis averaged over 20 runs. As Fig. 3 shows, there is anastronomically high amount of control packet overheadin the network as the number of flows increases. Asexplained earlier, this is due to the large amount ofbroadcast floods introduced into the network as part offrequent re-routing due to route breaks. Here we quan-tify overhead as the number of RREQs forwarded byall nodes in the network. Understanding the gray zonephenomenon motivates us to design a robust routingalgorithm that detects and avoids fragile routes, therebysignificantly reducing control overhead.

3.2.2 End-to-end delay estimation

A critical component of any QoS-enabled routing pro-tocol is end-to-end delay estimation. Current protocolsestimate end-to-end delay by measuring the time takento route RREQ and RREP packets along the given path.We observe, however, that RREQ and RREP packets aresignificantly different from normal data packets, andare therefore unlikely to experience the same levels oftraffic delay and loss as data packets.

We perform an experiment to quantify the errorintroduced by two estimation methods (RREP packets

and hop count) to measure end-to-end delay. RREPtechnique estimates the delay by measuring the delayexperienced by RREQ packets and the correspondingRREP packets. The Hopcount technique estimates thedelay as the number of hops × the average per-hopdelay. We select a small topology of 14 nodes and in-troduce a single 5-hop flow into the network. As shownin Fig. 4, both the techniques introduce significantestimation errors: RREP Estimate overestimates andHopcount underestimates the actual delay experiencedby the data packets.

There are two main reasons for the significant dis-crepancy between the RREP estimate and the actualend-to-end packet delay, both based on wireless inter-ference. First, RREQ packets are flooded across multipleroutes in the network during route discovery. The resultis a burst of simultaneous traffic across a large numberof links. These RREQ packets propagating along differ-ent routes interfere with each other, causing inter-flowinterference, which unicast data does not experiencebecause it follows a single path at any given time. Thesecond factor is the intra-flow interference experiencedby data packets. When a stream of packets traverse aroute, the broadcast nature of the underlying wirelessnetwork means different packets of the same flow willinterfere with each other, resulting in media contentionand per-packet delays. Control packets such as RREQ donot experience intra-flow interference because there isno stream of packets following one single path. RREPoverestimates because it accounts for the dominantbut non-existent inter-flow interference whereas Hop-count underestimates the delay because it doesn’t ac-count for the intra-flow interference. This motivatesan in-band delay estimation mechanism for end-to-endpacket delay. To address this, QUORUM introduces aDUMMY-RREP latency estimator in Section 4.3.

0.002 0.004 0.006 0.008

0.01 0.012 0.014 0.016 0.018

0.02

50 100 150 200 250 300 350 400 450 500

End

to E

nd D

elay

(se

cs)

Data Rate (kbps)

RREP EstimateActual Delay

Hopcount-based

Figure 4 End to end delay estimation of the data packets. RREPoverestimates end-to-end delay because of inter-flow interfer-ence. The hopcount-based approach underestimates the delaysince it does not account for intra-flow interference

Page 5: QUORUM—Quality of Service in Wireless Mesh Networksravenben/publications/pdf/quorum-monet08… · QUORUM—Quality of Service in Wireless Mesh Networks ... A WMN may be thought

Mobile Netw Appl

Table 1 Structureof a flow table SRC DEST B/W Reserved Bmin Tmax Quality I/F

-32bits- -32bits- -32bits- -32bits- -32bits- -32bits- -32bits-

4 The QUORUM routing protocol

The goal of the QUORUM routing protocol is to pro-vide a QoS-constrained route from source to destina-tion. Specifically, the route selected by the protocolshould deliver packets with minimum bandwidth Bmin

and end-to-end latency less than Tmax, where both para-meters are specified by the application at flow initiationtime. In addition, QUORUM should choose the mostrobust among all possible candidate routes satisfyingthe above constraints.

QUORUM is a reactive protocol that discoversroutes on-demand. During the route discovery phaseof the protocol, each intermediate node uses an admis-sion control scheme to check whether the flow can beaccepted or not. If accepted, a Flow Table (Table 1)entry for that particular flow is created. For specifics ofthe admission control scheme, we refer the reader toprotocols such as AQOR [13] and WMR [14]. Basically,each node collects the bandwidth reserved at its onehop neighbors (piggybacked on periodic HELLO pack-ets) and stores it in its Neighbor Table (Table 2).

While QUORUM borrows the admission controlscheme from AQOR and WMR, there are several keydifferences. The main drawback of WMR [14] is thatit does not leverage knowledge of the mesh networktopology. In contrast, QUORUM treats mesh routersand clients differently (See Section 4.2). Another differ-ence is that AQOR and WMR select the route on whichthe first in-time RREP packet arrives, whereas QUO-RUM uses periodic messages to estimate link quality,and selects the most robust route whenever possible.This means that QUORUM considers three metrics(bandwidth, delay and robustness) while AQOR dealswith only bandwidth and delay. We describe the novelaspects of QUORUM in the remainder of this section.

4.1 Estimating route robustness

Each node in the network estimates the robustness ofits links to its one-hop neighbors. Nodes estimate alink’s quality or robustness by measuring the number

of HELLO packets received during a rolling window oftime. Measurements of the recent window is combinedwith a historical value (Q) as an exponentially weightedmoving average (EWMA) to compute the updated es-timate. Specifically, each node computes a rolling CQ,the percentage of HELLO packets received in the lastROBUSTNESS_INTERVAL seconds. A link’s robust-ness is computed as: R = α · CQ + (1 − α) · Q.

Each node maintains estimates of link robustnessto all of its neighbors in the Neighbor Table. Nodescompute the robustness of an end-to-end route as theaverage link quality across all links along the path. Linkquality estimates are accumulated by RREQ packets onthe reverse path, and RREP packets on the forwardpath.

By using end-to-end robustness to differentiate be-tween candidate routes, QUORUM avoids unreliableroutes or those that cross communication gray zones.Since gray zone neighbors have lower link quality withrespect to their corresponding nodes, routes consist-ing of such neighbors have lower end to end stabilitycompared to more robust routes. More precisely, anode doesn’t forward packets (control and data) of itsneighbor if its robustness is less than 50% and hencethe protocol avoids routes with unstable nodes duringroute selection. This threshold is selected based on ex-perimental runs and is a trade off between eliminatinggray zone neighbors and avoiding false positives. Theresult is a more robust end-to-end path that avoids thehigh overhead of route repair messages.

4.2 Topology-aware route discovery

We optimize QUORUM for hierarchical wireless meshnetworks by limiting the flooding of control messagesusing explicit knowledge of the network topology.Recall that for streaming-media applications such asVideo-on-Demand, much of the data traffic can be lo-calized to a mesh group if the request can be met locallyby data caches. In these cases, broadcasting controlpackets beyond the mesh group creates unnecessarynetwork congestion and disruption to other flows.

Table 2 Structureof a neighbor table DEST B/W Reserved # of Hello Pkts Quality I/F

-32bits- -32bits- -32bits- -32bits- -32bits-

Page 6: QUORUM—Quality of Service in Wireless Mesh Networksravenben/publications/pdf/quorum-monet08… · QUORUM—Quality of Service in Wireless Mesh Networks ... A WMN may be thought

Mobile Netw Appl

Figure 5 Selective flooding.If source and destinationreside in the same meshgroup, we limit controlpacket flooding to the meshgroup. Otherwise, controlpacket flooding is limited tothe source and destinationmesh groups and betweenmesh routers

a SRC and DEST under the same mesh router b SRC and DEST under different mesh routers

We illustrate two examples of this technique in Fig. 5.Figure 5a shows a scenario where both the source anddestination are under the same mesh router (MR).Here it is logical to limit the control flood to nodesserved by the local router. If the source and the destina-tion are under different MRs, as in Fig. 5b, then controltraffic should be limited to the two mesh groups and allmesh routers, avoiding unnecessary congestion in meshgroups without the source or destination. We achievethis topology awareness by requiring mesh clients in thesame mesh group to reside in the same unique subnet.Mesh routers then make intelligent decisions that limitthe propagation of control packets.

Also, as explained earlier, we limit control packetflooding by having nodes accept flooding messagesonly from “robust” neighbors (those with link qual-ity >50%). As can be seen later in the experimentalsection, this scheme reaps huge benefits in terms ofreduction of control overhead in addition to addressingthe communication gray zone problem.

4.3 Estimating end to end delay

As we showed in Section 3.2.2, end-to-end delay re-ported by RREQ-RREP measurements differs substan-tially from delay experienced by actual data packets. Toaddress this, we introduce a DUMMY-RREP phase duringroute discovery. The aim of this phase is to accuratelyestimate the delay that will be experienced by the actualdata packets by sending a dummy stream of packetshaving identical characteristics to data packets. Whena source receives RREP packets, it saves them in aRREP_TABLE. The source then takes the RREP for aroute from this table and sends a stream of DUMMYdata packets along the path traversed by this RREP.DUMMY packets have the same size, priority and datarate as real data packets, effectively emulating the in-terference experienced by the actual data packets ona particular path. Each stream includes 2H numberof packets, where H is the hopcount reported by theRREP. This parameter balances the trade-off betweencontrol overhead and measurement accuracy, and is

based on our experiments over a number of flows withvarying path lengths. Figure 6 plots the result of oneof our experiments where we introduce a single 5 hopflow into the network and observe the delay predictionof dummy stream with varying number of constituentpackets. We can see that, dummy stream of 10 packets(2 × hopcount) or more experiences similar intra-flowinterference as the actual data packets and hence pre-dicts the end to end delay fairly accurately.

The destination calculates the average delay of allDUMMY packets received, and reports it back to thesource via a RREP. If the average delay reported by thisRREP is within the bound requested by the application,the source selects this route and starts sending datapackets. Soft-state timers are included at both sourceand destination to take care of lost packets. If thereported delay exceeds the requested limit, the sourcedoes a linear back-off and sends the DUMMY stream on adifferent route selected from its RREP_TABLE. Figure 7shows the approximate route setup delay of QUORUMcompared to AODV. For this experiment, flows of 50kbps were randomly chosen from the 50 node topology

0.012

0.013

0.014

0.015

0.016

0.017

0.018

0.019

0.02

0.021

0 2 4 6 8 10 12 14 16 18 20

End

to E

nd D

elay

(se

c)

No. of packets in the Dummy Stream

Dummy EstimateActual Delay

Figure 6 Delay estimation vs Number of packets in dummystream. For a five hop flow, we can observe that ten packetsin the dummy stream is sufficient to predict the actual delayexperienced by the data packets

Page 7: QUORUM—Quality of Service in Wireless Mesh Networksravenben/publications/pdf/quorum-monet08… · QUORUM—Quality of Service in Wireless Mesh Networks ... A WMN may be thought

Mobile Netw Appl

0.1

0.2

0.3

0.4

0.5

0.6

0.7

0.8

0.9

2 4 6 8 10 12 14 16 18 20

Ave

rage

Set

up T

ime

(sec

s)

Number of Flows

AODVQUORUM

Figure 7 Route setup delay vs number of flows. Each pointcorresponds to the average setup time taken by the correspond-ing number of flows in the network. QUORUM takes relativelylonger time due to the additional DUMMY-RREP phase

in Fig. 8. We see that QUORUM takes longer thanAODV to set up a route because of the DUMMY-RREPphase, but it is a reasonable trade-off given the resultingaccurate end-to-end delay estimation.

4.4 Tackling misbehaving nodes

Another key advantage that QUORUM has overother QoS routing protocols is the ability to punishand discourage selfish “free-riding” behavior. In realnetworks, selfish nodes can utilize the network in-frastructure for routing while avoiding forwardingother nodes’ packets. In QUORUM, a misbehavingnode can achieve this by not broadcasting HELLOpackets while listening to neighbors’ broadcasts. Sinceneighbors have no information about the misbehav-ing node, they select their routes via other neighbors.Meanwhile, the misbehaving node can still use itsneighbors to route its own packets.

0

200

400

600

800

1000

1200

1400

0 200 400 600 800 1000 1200

y (m

eter

s)

x (meters)

12

3

456

7

89

10 1112

1314

1516

17

1819

20 2122

2324

25

26 2728

2930

31

32

33

3435 36

37

3839

40

4142

43

44

45

46

47

48

49

50

Figure 8 Our simulation topology of 45 mesh clients and 5 meshrouters (10, 20, 30, 40, 50). Each router (n) is responsible for 9mesh clients (n − 9, n − 8, . . . , n − 1)

To discourage this behavior, we propose a simplevariant of the popular “Tit-for-Tat” rule based on linkrobustness. According to this rule, a node does notforward the packets of a neighbor if the neighbor’slink quality is lower than a certain threshold. In thiscase, neighbors of a selfish node will estimate its linkquality as 0 and the node’s packets are dropped bythe neighbors due to low robustness. In effect, therobustness metric provides an incentive for a cooper-ative environment in the network. Recall that to dealwith the communication gray zone problem, a nodeonly accepts control packets from nodes that have ro-bustness above a particular threshold. This link qual-ity/robustness threshold serves a dual purpose and is acritical component of the QUORUM protocol.

4.5 QoS violation and recovery

QUORUM detects changes in path quality that violateQoS guarantees with the help of reservation timeoutsof Flow Table entries. We identify two different QoSviolations as follows: In the first case, an intermediatenode receives a data packet but does not have a cor-responding Flow Table entry for that flow. This meansthat the node has deleted the Flow Table entry becauseof a reservation timeout. Hence, it sends a Route Error(RERR) packet back to the source which re-initiatesroute discovery and re-routes the packets. A secondcase is where the destination detects, with the helpof its Flow Table, that data packets arriving at it areexceeding the Tmax requested by the source. In this case,the destination increments its sequence number andbroadcasts an unsolicited RREP back to the source. Onreceipt of this RREP, the source immediately re-routespackets via the path traveled by this RREP thus avoidingthe lengthy re-routing process. This scheme is similar tothe recovery scheme used by AQOR [13].

5 Simulation results

We perform detailed evaluation of our protocol usingthe Qualnet (http://scalable-networks.com) simulator.Despite our best efforts, however, we were unable toobtain a Qualnet implementation of an existing QoS-routing protocol to compare with.

5.1 Experimental setup

Our network topology, shown in Fig. 8, consists of 50nodes (5 mesh routers and 45 mesh clients). Each mesh

Page 8: QUORUM—Quality of Service in Wireless Mesh Networksravenben/publications/pdf/quorum-monet08… · QUORUM—Quality of Service in Wireless Mesh Networks ... A WMN may be thought

Mobile Netw Appl

router is responsible for forwarding outgoing trafficof clients in its group. All nodes are static and areplaced in an area of 1500 m × 1500 m. The protocol isimplemented on top of 802.11b MAC protocol with araw channel bandwidth of 11 Mbps at each node. Notethat unlike our architecture, there is no explicit gatewaynode in our simulations, since any mesh router can actas a gateway node. For any traffic destined outside theWMN, our routing protocol provides guarantees onlytill the Internet Gateway.

Application traffic is sent as CBR with 512 bytepackets. Each flow source sends a maximum of 10,000packets to its destination. After 10 s for network sta-bilization, flows are introduced gradually into the net-work. Each flow is alive for 10 min, and each simulationrun lasts for 15 min. For our robustness computations,nodes broadcast HELLO packets every 200 ms, andcompute robustness values once per second, with theEWMA weight factor, α = 0.5.

5.2 QoS routing behavior

The experiments in this sub-section demonstrate theeffectiveness of QUORUM in guaranteeing QoS to thedifferent flows in the network. In order to signify this,we develop a scenario where we congest the networkso that admission control comes into play. As AODVis best effort, it will try to deliver packets from all thesources, while QUORUM would try and provide QoSguarantees and in its quest to do so, it might rejectsome flows based on the load in the network. As isevident from Fig. 9a, we select 5 flows (F:S − D inthe figure refers to the flow whose source is S anddestination D) in the topology in Fig. 8. As can be seen,all the flows originate in the same subnet of MR 30 and

all flows except one end in the same subnet. Each of theflows request a bandwidth of 500 kbps. The experimentis repeated for 20 seeds, but the flows remain the samein each run. The flows are started in the order they areshown in Fig. 9a.

As shown in Fig. 9a, QUORUM rejects F:27–28 ina number of scenarios since it is the last requestedflow, but provides delivery within the requested de-lay to all admitted flows. On the other hand, AODVtries to deliver packets from all the flows resulting inexcessive contention and very high delays. Figure 9bdemonstrates the fact that QUORUM does not com-promise on the delivery of the packets for the flowsaccepted. Packet delivery ratio (PDR) is calculated asthe ratio of packets received by the destination to thepackets sent by the source. From the figure it is clearthat QUORUM guarantees high PDR for those flowsthat are admitted into the network. In the rest of thepaper, we use PDR only to refer to flows that have beenadmitted into the network by AODV or QUORUM.

5.3 Control overhead

Control overhead of the protocol is defined as the totalnumber of control packets forwarded by all the nodesin the network. For QUORUM, we also include theDUMMY packets as an overhead induced by the protocol(in addition to RREQs which is common in both). Thisexperiment shows the benefits of intelligent routingin QUORUM. We note that AODV has an inherentadvantage when it comes to overhead, because a sourcenode does not need to send RREQ packets to a desti-nation whose route it knows implicitly from previousflows. In QUORUM, a source must send RREQ packetsto all destinations, even for those whose routes are

0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9

F:21-39 F:24-22 F:29-23 F:25-26 F:27-28

End

to E

nd D

elay

(se

cs)

Flow ID

AODVQUORUM

0

0.2

0.4

0.6

0.8

1

1.2

F:21-39 F:24-22 F:29-23 F:25-26 F:27-28

Ave

rage

Pac

ket D

eliv

ery

Rat

io

Flow ID

AODVQUORUM

a End to End Delay of the different flows b Packet Delivery Ratio of the different flows

Figure 9 In the figure we can observe that F:27–28 is almost always rejected by QUORUM to provide relatively lower delays to theaccepted flows. Figure shows that QUORUM provides higher packet delivery ratio to all the accepted flows

Page 9: QUORUM—Quality of Service in Wireless Mesh Networksravenben/publications/pdf/quorum-monet08… · QUORUM—Quality of Service in Wireless Mesh Networks ... A WMN may be thought

Mobile Netw Appl

50

100

150

200

250

300

350

400

450

50 100 150 200 250 300 350 400 450 500

Con

trol

Ove

rhea

d

Data Rate (kbps)

AODV-RREQQUORUM-RREQ-DUMMY

QUORUM-RREQ

0

10000

20000

30000

40000

50000

2 4 6 8 10 12 14 16 18 20

Con

trol

Ove

rhea

d

Number of Flows

AODV-RREQQUORUM-RREQ-DUMMY

QUORUM-RREQ

a Control Overhead vs Data Rate b Control Overhead vs Number of Flows

Figure 10 From the figure we can see that control overheadin QUORUM is reduced by 40% compared to AODV due tointelligent routing. Figure shows the high overhead induced by

AODV due to its susceptibility to select unstable routes, unlikeQUORUM which selects stable routes and hence keeps thecontrol overhead to a minimum

known. The control messages are required to estimatewhether bandwidth and delay constraints are satisfiedon any given path.

Figure 10a and b plots the control overhead of theprotocols with varying data rates and varying numberof flows in the network. We also plot the RREQ-onlyoverhead of QUORUM to see the amount of overheadactually reduced by the intelligent routing. Figure 10shows that control overhead of QUORUM is lowerthan AODV by 30-35%.

Figure 10b shows a drastic increase in the controloverhead of AODV with increase in the number offlows in the system. The reason for this astronom-ically high overhead is the susceptibility of AODVprotocol to choose unstable routes which are betterin terms of hop count. Due to this, the sources inAODV end up selecting unstable routes which breakoften, resulting in re-routing and hence higher controloverhead. QUORUM refrains from accepting unstable

routes by having a robustness threshold as described inSection 4.2.

5.4 End to end delay estimation

This section evaluates one of the major contributionsof this paper, end to end delay estimation during routesetup. We show the usefulness of the DUMMY-RREPphase in the estimation of end to end delay. The delayestimated by the RREP packets, delay estimated by theDUMMY-RREP phase and actual delay experienced bythe data packets are analyzed for varying data rates(50–100 kbps) and varying flows(each requesting a Bmin

of 50 kbps). As shown in Fig. 11, delay estimated by theRREQ-RREP phase differs from the actual delay by aconsiderable margin. By having the DUMMY stream em-ulate the data packets, QUORUM is able to accuratelyestimate the actual end to end delay.

0

0.002

0.004

0.006

0.008

0.01

0.012

0.014

0.016

50 100 150 200 250 300 350 400 450 500Ave

rage

End

to E

nd D

elay

(se

cs)

Data Rate (kbps)

RREP EstimateDummy Estimate

Actual Delay

0

0.002

0.004

0.006

0.008

0.01

0.012

0.014

0.016

2 4 6 8 10 12 14 16 18 20Ave

rage

End

to E

nd D

elay

(se

cs)

Number of Flows

RREP EstimateDummy Estimate

Actual Delay

a E2E Delay Estimation vs Data Rate b E2E Delay Estimation vs Number of Flows

Figure 11 End to end delay estimation. In (b) each flow requests a Bmin of 50 kbps. We can observe that, in both the cases, QUORUMdoes a good job of estimating the actual delay fairly accurately

Page 10: QUORUM—Quality of Service in Wireless Mesh Networksravenben/publications/pdf/quorum-monet08… · QUORUM—Quality of Service in Wireless Mesh Networks ... A WMN may be thought

Mobile Netw Appl

0

0.002

0.004

0.006

0.008

0.01

50 100 150 200 250 300 350 400 450 500Ave

rage

End

to E

nd D

elay

(se

cs)

Data Rate (kbps)

AODVQUORUM

0

0.002

0.004

0.006

0.008

0.01

0.012

2 4 6 8 10 12 14 16 18 20Ave

rage

End

to E

nd D

elay

(se

cs)

Number of Flows

AODVQUORUM

a Average End to End Delay vs Data Rate b Average End to End Delay vs Number of Flows

Figure 12 Average end to end delay experienced by the datapackets is consistently lower in QUORUM when compared toAODV. This is because QUORUM always selects paths which

satisfy the delay bound requested by the application. In (b) theaverage delay of the flows in QUORUM is 33% lower than thatexperienced in AODV

5.5 Scalability

The main goal of this experiment is to test howQUORUM scales as the number of flows in the net-work increases and when the data rates of the flowsincrease. The metrics used are average system through-put, packet delivery ratio and average end to end delay.For the varying data rate experiment we randomlypicked five flows and for varying flows experiment eachrandomly picked flow requested a Bmin of 50 kbps.We do not plot the graphs for the average systemthroughput and the packet delivery ratio because bothAODV and QUORUM achieved equally high systemthroughput and PDR of 0.98 and higher.

Figure 12 plots the average end to end delay experi-enced by the accepted flows in the network. In both theexperiments QUORUM out-performs AODV. This is

0

20

40

60

80

100

120

140

160

0 10 20 30 40 50

Ave

rage

Thr

ough

put (

kbps

)

Percentage Misbehavior

AODV-goodQUORUM-good

AODV-badQUORUM-bad

Figure 13 We plot throughput values for both “good” and “bad”flows in AODV and QUORUM. QUORUM clearly discouragesselfish behavior by denying them network bandwidth

because of the ability of QUORUM to select stableroutes in which the data packets experience acceptabledelays, verified by the DUMMY-RREP phase.

5.6 Tackling misbehaving nodes

Another contribution of QUORUM is its inherent abil-ity to tackle selfish misbehavior or free-riding by pro-viding an incentive to co-operate. The misbehaviormodel is as described in Section 4.4. In this experi-ment, the average throughput of “bad” and “good”flows are calculated separately. A flow is considered“bad” if either its source or destination is a misbehavingnode, otherwise its considered “good”. The misbehav-ing nodes are selected randomly for each of the 20 runsand only mesh clients can misbehave. Ten flows of 50kbps data rate are randomly picked for each run.

From Fig. 13, we can see that AODV allows free-riding of the misbehaving nodes, while the throughputof the misbehaving nodes is considerably reduced inQUORUM. Percentage misbehavior refers to the per-centage of the nodes in the network that misbehave.It is interesting to note that AODV is not affectedgreatly by this kind of misbehavior because it doesn’trely on the HELLO packets for its routes unlike QUO-RUM. Though QUORUM gets affected by the HELLOpacket misbehavior, we can observe that free-riding ofmisbehaving nodes is reduced to a great extent. Thisis because misbehaving nodes have robustness of zeroin the eyes of their neighbors and hence their controlpackets for routing are not forwarded because of theirlow robustness.

Page 11: QUORUM—Quality of Service in Wireless Mesh Networksravenben/publications/pdf/quorum-monet08… · QUORUM—Quality of Service in Wireless Mesh Networks ... A WMN may be thought

Mobile Netw Appl

6 Conclusion

In this paper, we have developed QUORUM, a novelQoS-aware routing protocol for wireless mesh net-works. Specifically, QUORUM takes three QoS met-rics into account: bandwidth, end to end delay androute robustness. To optimize QUORUM for wirelessmesh networks, we propose several mechanisms in-cluding topology-aware route discovery that drasticallyreduce the control overhead and network congestionfrom route discovery. In addition, we introduce thenovel DUMMY-RREP data latency estimator, and show itto be effective in providing accurate estimates of end-to-end delay experienced by data packets. Finally, ourproposed link robustness metric allows QUORUM topunish and discourage free-riding behavior by selfishnodes, a side effect of the robustness metric.

Acknowledgements We would like to thank the anonymousreviewers for their helpful comments, and Prof. ElizabethBelding for her feedback on earlier versions of this work. Thiswork is supported in part by NSF under CAREER Award#CNS-0546216 and DARPA under the Control Plane project(BAA 04-11).

References

1. Akyildiz I, Wang X, Wang W (2005) Wireless mesh networks:a survey. Comput Networks 47:445–487

2. Bicket J, Aguayo D, Biswas S, Morris R (2005) Architectureand evaluation of an unplanned 802.11b mesh network. In:Proc. of MobiCom, New York, NY

3. Raman B, Chebrolu K (2007) Experiences in using WiFi forrural internet in India. IEEE Commun Mag 45(1):104–110,January

4. Allen M, Zhao BY, Wolski R (2007) Deploying video-on-demand services on cable networks. In: Proc. of ICDCS,Toronto, Canada, June 2007

5. Perkins C, Royer E (1999) Ad hoc on-demand distancevector routing. In: Proc. of WMCSA, February 1999

6. Johnson DB, Maltz DA, Broch J (2001) DSR: the dynamicsource routing protocol for multi-hop wireless Ad Hoc net-works. Ad hoc Networking 5:139–172

7. Lundgren H, Nordstrom E, Tschudin C (2002) The gray zoneproblem in IEEE 802.11b based Ad hoc Networks. MC2R6(3):104–105

8. Mahajan R, et al (2005) Sustaining cooperation in multi-hopwireless networks. In: Proc. of NSDI

9. Nandiraju NS, Agrawal DP (2006) Multipath routing in wire-less mesh networks. In: Proc. of MASS

10. Draves R, Padhye J, Zill B (2004) Routing in multi-radio,multi-hop wireless mesh networks. In: Proc. of MobiCom,New York, NY

11. Draves R, Padhye J, Zill B (2004) Comparison of routingmetrics for static multi-hop wireless networks. In: Proc. ofSIGCOMM, Portland, OR

12. Badis H, Gawedzki I, Al Agha K (2004) QoS routing in adhoc networks using QOLSR with no need of explicit reserva-tion. In: Proc. of VTC, September 2004

13. Xue Q, Ganz A (2003) Ad hoc QoS on-demand routing(AQOR) in mobile ad hoc networks. J Parallel DistribComput 63:154–165

14. Xue Q, Ganz A (2002) QoS routing for mesh-based wirelessLANs. Int J Wirel Inf Netw 9:179–190, July

15. Chen S, Nahrstedt K (1999) A distributed quality-of-servicerouting in ad-hoc networks. IEEE JSAC 17(8):1488–1505,August

16. Wang H, Yow KC (2006) QoS routing in multi-channelmultihop wireless networks with infrastructure support. In:InterSense, New York, NY

17. Liu L, Feng G (2005) Mean field network based QoS routingscheme for wireless mesh networks. In: Proc. of WiCOM,September

18. Kuipers FA, Mieghem PFAV (2005) Conditions that im-pact the complexity of QoS routing. IEEE/ACM TransNetw 13(4):717–730

Vinod Kone received his B.Tech (Hons.) degree in ComputerScience and Engineering from IIT Guwahati, India in 2006. Heis currently a Ph.D. student in the Department of ComputerScience at U. C. Santa Barbara. His research interests includewireless networks, network protocols and distributed systems. Heis a recipient of the Pratibha Merit Scholarship (2002–2006) andthe Citrix Online Graduate Fellowship (2006-07).

Page 12: QUORUM—Quality of Service in Wireless Mesh Networksravenben/publications/pdf/quorum-monet08… · QUORUM—Quality of Service in Wireless Mesh Networks ... A WMN may be thought

Mobile Netw Appl

Sudipto Das received his B.E. degree in Computer Scienceand Engineering from Jadavpur University, India in 2006 andis currently a Ph.D. student in the Department of ComputerScience at U. C. Santa Barbara. He has worked in the area ofwireless networks, especially performance optimizations for wire-less ad-hoc routing protocols. He is currently associated with theDatabaseSystems Lab at UCSB and his current research interestslie in investigating the use of parallel hardware to acceleratevarious Database and Data Stream Queries.

Ben Y. Zhao is a faculty member at the Computer Science de-partment, U.C. Santa Barbara. Before UCSB, he completed his

M.S. and Ph.D. degrees in Computer Science at U.C. Berkeley,and his B.S. degree from Yale University. His research spans theareas of security and privacy, networking and distributed systems.He is a recent recipient of the National Science Foundation’sCAREER award (2005), the MIT Tech Review’s TR-35 Award(Top 35 Young Innovators Under 35) in 2006, and ComputerWorld’s Top 40 IT Innovators Award (2007).

Haitao Zheng received her B.S. from Xian Jiaotong Universityin 1995, her M.S.EE and Ph.D. degrees in Electrical and Com-puter Engineering from University of Maryland, College Park, in1998 and 1999, respectively. She has held research positions atthe wireless research lab at Bell-Labs and as a project lead atMicrosoft Research Asia. In 2005, she joined the ComputerScience department at U. C. Santa Barbara. Dr. Zheng is arecipient of the 2005 MIT Technology Review Top 35 Innovatorsunder 35 award, best student paper award at IEEE DySPAN2007, 2002 Bell Laboratories President’s Gold Award, and the1998–1999 George Harhalakis Outstanding Graduate StudentAward from University of Maryland. Dr. Zheng’s research in-terests include wireless systems and networking and multimediacomputing.