Nandi Raju 2007
Nandi Raju 2007
44
IGW 1 IGW
IGW .11a AP1
.11a
1 60
AP1
AP1 AP2
AP2 Client .11a
6 40
Clients
Client AP2 AP3
6
Clients
Client Clients
Client Clients
(a) (b) (c)
■ Figure 3. a) Single-radio single-channel mesh network; b) dual-radio single-channel mesh network; c) multiradio
multichannel mesh network.
WSNs or MANETs has been primarily oriented the neighboring MRs at each hop along the
toward energy conservation. However, for MRs, backhaul link to the IGW.
power is no longer a constraint, and the focus of Figure 3c shows the use of a multichannel
MAC protocols should be on achieving higher approach using multiple radios that successfully
throughput rather than energy conservation overcomes all the problems encountered in the
issues. other architectures. Ideally, two radios are
Even with an efficient MAC design, fairness employed for the backhaul link and one for ser-
among flows of different hop lengths may not be vicing the mesh clients. The uplink and down-
achieved [8]. In multihop networks, a packet has link backhaul radios and the service radio are all
to be forwarded by many intermediate nodes. operated at nonoverlapping channels, eliminat-
Whenever an intermediate node receives a pack- ing potential co-channel interference. As each
et for forwarding, it has to perform IP layer mesh router can be equipped with multiple
lookup and Address Resolution Protocol (ARP) radios, fixed channel assignment to these radios
lookup, and then contend for the channel at the is a more viable solution. Efficient and intelli-
MAC layer at each hop. This not only increases gent channel assignment schemes have to be
end-to-end delay, but also dramatically amplifies designed as the number of channels is not infi-
the probability of packet loss. nite or may not be sufficient in a high node den-
A single--radio single-channel mesh architec- sity scenario. Several channel assignment
ture is shown in Fig. 3a. Ramanathan et al. [9] mechanisms [11–14] are being proposed. Elegant
suggests a radical change spanning across rout- assignment schemes can also be derived from
ing, MAC, and PHY layer protocols to speed up graph coloring approaches [15]. Ramachandran
the process of forwarding in these networks. et al. [13] investigate the channel assignment
Assigning orthogonal channels to the MRs with- problem based on an interference-estimation
in the interference range can help alleviate the technique. Adya et al. [11] perform the channel
hidden and exposed terminal problems, and assignment using a measurement-based approach
assist in improving the overall capacity of the that is dependent on channel quality for select-
network. So et al. [10] proposed multichannel ing the appropriate channel. Deafness is another
MAC protocols using a single radio for ad hoc key issue that has yet to be addressed in such an
networks and showed the performance gains. environment.
But considering the traffic characteristics in a Many commercial MRs2 currently in the mar-
WMN, frequent channel switching may be ket use multiple radios with multichannel capa-
required to communicate with neighboring bility for improving channel capacity. As all
nodes. In such scenarios, single-radio multichan- these vendors use their own proprietary MAC
nel MAC may not provide any significant perfor- and routing protocols for their products, interop-
1 In Atheros chipsets mance gains because of the high channel erability cannot be guaranteed. A multiradio
channel switching delay is switching delay.1 The plummeting cost of wire- unification protocol, a virtual MAC, proposed by
close to 10 ms, which is less radios has opened up new avenues for Adya et al. [11] is an interesting approach to
considerably higher when designing MRs using multiple radios. MRs can managing multiple radios. But concrete and
we consider the transmis- now use multiple radios tuned to orthogonal robust native layer 2 protocols can be more
sion rates. channels for simultaneously communicating with effective and efficient than such virtual MAC
their neighbors. Figure 3b shows the use of a solutions. With multiple radios communicating
2 Kiyon Inc. and, dual-radio WMN. One radio provides service to on noninterfering channels, an interesting aspect
MeshDymanics are two of its mesh clients (using channel 6 in 2.4 GHz to focus on is efficient flow scheduling in a
the startup companies 802.11 b/g), and the other radio forms the back- neighborhood so that resource usage can be
actively involved in manu- haul link connecting all the MRs to the IGW maximized.
facturing commercial (using 5 GHz 802.11a). However, it suffers from Another important issue that needs attention
MRs. the disadvantage of sharing the bandwidth with is QoS provisioning. The envisioned scenario of
Even with this reduction, the time required for tree-based protocol, AODV-ST, that modifies
Capacity is a key estimating remains very high, necessitating fur- the popular AODV protocol by including expect-
ther improvement in the design of effective tech- ed transmission time (ETT) as the routing met-
issue in WMNs. niques. ric. In their work the mesh relays/routers
There are several IMPACT OF THE TRAFFIC MODEL
construct a spanning tree corresponding to each
gateway in the network. Each MR maintains a
elements that decide MANETs have been predominantly designed to primary gateway (with the least end-to-end
facilitate sharing of network resources and data delay) and routes traffic through this gateway.
the capacity of among a set of dynamic users. Typically, the traf- Load balancing is achieved by prudently routing
fic in a MANET is between any two nodes in the the traffic flows through the least loaded gate-
WMN, such as network. However, in WMNs the traffic is ori- way. In order to estimate the least loaded gate-
ented either toward (upstream) or away from way, periodic round-trip time (RTT) probing is
network architecture, (downstream) the IGW. Also unlike MANETs, performed. If the least loaded gateway found is
network topology, the expected traffic volume in WMNs is very
high. The use of traditional routing protocols
not the default gateway, new traffic flows are
routed through that node, and existing flows
traffic pattern, designed for MANETS in WMNs may lead to continue to use the earlier path. However, they
subdued performance due to the presence of do not consider routing in multichannel architec-
network node hotspots near an IGW. ture, and inter- and intraflow interferences
It is imperative for any routing protocol remain a big challenge.
density, number designed for WMNs to include efficient load bal- In summary, while designing routing algo-
ancing capabilities. It is also important to incor- rithms and metrics for WMNs, the following
of channels, porate efficient search techniques to select the challenges should be addressed.
transmission power best among the multiple paths and employ effi-
cient traffic splitting among these routes [1]. Open Research Issues
level, etc. Multipath routing increases the reliability and • Routing metrics should ensure that low-band-
robustness of the network. Existing literature on width links are seldom selected when links of
multipath routing in MANETs/WSNs primarily higher bandwidth are possible.
focuses on finding edge disjoint or node disjoint • Routing metrics should incorporate link stabil-
routes for energy efficiency. Although use of ity so that frequent route fluctuations can be
node disjoint routes may be feasible in a WMN, avoided.
the use of maximal disjoint routes can yield bet- • Metrics should choose routes that have good
ter distribution of traffic load. channel diversity to minimize intra- and inter-
Another important issue is link stability. Due flow interference.
to varied reasons such as interference, fading, • A routing algorithm should perform load bal-
and shadowing, links are highly unstable. As a ancing and ensure that a router does not
result, frequent route flaps occur, leading to an become a bottleneck node.
extremely unstable and unpredictable network. • Any load balancing algorithm that is designed
Thus, metrics designed for WMNs should be should have quick convergence and not be
able to capture the link stability in the network. oscillatory. At the same time, it should allow
Draves et al. [3] propose a new routing met- good usage of network resources.
ric, Weighted Cumulative Expected Transmis- • Loop-free routing should be guaranteed.
sion Time (WCETT), for multiradio • Routing algorithms should provide QoS guar-
multichannel networks. They improve ETX by anteed paths or at least some support for QoS
taking into consideration throughputs of the provisioning.
links and channel diversity. The proposed metric • Efficient route recovery and maintenance
chooses routes having high throughput links should be provisioned.
(consequently lower end-to-end delay). Further- • Elegant techniques to handle handoffs and
more, they also consider intraflow interference minimize handoff latencies should be
(packets of the same flow contend with each designed.
other at different hops) and alleviate this by
cleverly selecting routes that involve channel CAPACITY ISSUES IN WMNS
diversity. Although WCETT is shown to work
well in a multiradio multichannel network, it has Capacity is a key issue in WMNs. In the past
limitations due to interflow intereference that decade, several research efforts have been made
make it unsuitable for large networks. to study the capacity of wireless ad hoc networks
Raniwala et al. [14] propose Hyacinth, a mul- that can be adapted to the area of stationary
tichannel WMN in which each mesh node is multihop networks. These studies mainly focused
equipped with multiple 802.11 network interface on the issue of scalability of the throughput with
cards (NICs). They explore distributed channel the size of the network (i.e., the number of
assignment and routing by first creating a span- nodes n in the network). There are several ele-
ning tree rooted at the gateway. The available ments that decide the capacity of a WMN, such
NICs are divided among the parent node (UP- as network architecture, network topology, traf-
NIC) and the children nodes (DOWN-NIC). fic pattern, network node density, number of
The DOWN-NICs of the parent and the UP- channels, and transmission power level.
NICs of the children are tuned to the same One of the seminal works was done by Gupta
channel for communication, and the channel to and Kumar [19], who analyzed the capacity of
be used is assigned by the parent. However, stationary wireless networks from the viewpoint
load-sensitive path metrics are not suitable or of information theory. Their research is based
optimal for WMNs. on the principle that the interference between
Ramachandran et al. [18] propose a spanning- neighboring nodes utilizing the same channel to
There are two col that would fix all these potential loopholes
that could be exploited by an intruder.
[7] V. Kawadia and P. R. Kumar, “A cautionary Perspective on
Cross-Layer Design,” IEEE Wireless Commun., Feb. 2005.
[8] N. Nandiraju et al., “A Novel Queue Management
dimensions to As an additional check, continuous monitor- Mechanism for Improving Performance of Multihop
ing of the network by an intrusion detection sys- Flows in IEEE 802.11s based Mesh Networks,” Proc.
security in WMNs tem that helps detect misbehavior is required. IPCCC, 2006.
[9] R. Ramanathan, “Challenges: A Radically New Architec-
Qui et al. [32] propose a novel troubleshooting
which consists of technique to trace the exact root source of prob-
ture for Next Generation Mobile Ad-Hoc Networks,”
Proc. ACM MOBICOM, 2005.
lems plaguing the multihop wireless network like
MPs and mesh packet dropping, link congestion, and MAC mis-
[10] J. So and N. Vaidya, “Multi-Channel MAC for Ad Hoc
Networks: Handling Multi-Channel Hidden Terminals
Using A Single Transceiver,” Proc. MobiHOC 2004.
clients. As the behavior. Physical and link layer parameters
such as received signal strength, packet transmis-
[11] A. Adya et al., “A Multi-Radio Unification Protocol for
IEEE 802.11 Wireless Networks,” Proc. IEEE Conf.
interconnected MPs sion, and retransmission counts are collected as Broadband Networks, 2004.
[12] P. Kyasanur and N. H. Vaidya, “Routing and Interface
trace data and reused to recreate the network
form the backbone scenario in a simulator like Qualnet for post- Assignment in Multi-Channel Multi-Interface Wireless
Networks,” IEEE WCNC, New Orleans, LA, Mar. 2005.
analysis. The simulator is then used as a fault
of the network, diagnosis tool for identifying deviant behavior.
[13] K. Ramachandran et al., “Interference-Aware Channel
Assignment in Multi-Radio Wireless Mesh Networks,”
In order to maintain secure operation of IEEE INFOCOM, 2006.
the highest level of WMNs, there are several open research avenues [14] A. Raniwala and T. Chiueh, “Architecture and Algo-
rithms for an IEEE 802.11-Based Multi-Channel Wireless
security is required to be explored that are summarized below. Mesh Network,” Proc. IEEE INFOCOM, 2005.
[15] T. R. Jensen and B. Toft, Graph Coloring Problems,
here. Hence, all the Open Research Issues Wiley Interscience, 1995.
[16] M. Alicherry, R. Bhatia, and L. Li, “Joint Channel
• Authentication of MRs is an important issue
ongoing traffic to be addressed.
Assignment and Routing for Throughput Optimization
in Multi-radio Wireless Mesh Networks,” Proc. MOBI-
• Scalable key management technique needs to COM, 2005.
should be encrypted be developed. [17] J. Padhye et al., “Estimation of Link Interference in
Static Multi-hop Wireless Networks,” Proc. IMC 2005.
• A secure multipath routing protocol is
using secure required.
[18] K. Ramachandran et al., “On the Design and Imple-
mentation of Infrastructure Mesh Networks,” Proc. IEEE
standards. • A multilayered security protocol that address-
es all the above mentioned issues is desired to
Wksp. Wireless Mesh Networks, 2005.
[19] P. Gupta and P. R. Kumar, “The Capacity of Wireless
Networks,” Proc. IEEE Trans. Info. Theory, vol. 46, no.
provide the highest level of protection. 2, 2000.
• A distributed intrusion detection system is [20] M. Grossglauser and D. Tse, “Mobility Can Increase
required for continuous monitoring of the net- the Capacity of Ad Hoc Wireless Networks,” Proc. IEEE
work. INFOCOM, 2001.
[21] M. Gastpar and M. Vetterli, “On the Capacity of Wireless
Networks: The Relay Case,” Proc. IEEE INFOCOM, 2004.
CONCLUSION [22] A. E. Gamal et al., “Throughput-Delay Trade-off in
Wireless Networks,” Proc. IEEE INFOCOM, 2004.
WMNs introduce a new paradigm of true wire- [23] J. Jun and M. L. Sichitiu, “The Nominal Capacity of Wire-
less Mesh Networks,” IEEE Wireless Commun., 2003.
less Internet access, providing the maximum [24] K. Jain et al., “Impact of Interference on Multihop Wireless
degree of flexibility at reduced cost to users. The Network Performance,” Proc. ACM MOBICOM, 2003.
scalability, self-configuring, and self-healing abil- [24] I. F. Akyildiz and X. Wang, “A Survey on Wireless Mesh
ities of WMNs makes it a versatile technology Networks,” Proc. IEEE Radio Commun., Sept. 2005.
[25] P. Kyasanur and N. Vaidya, “Capacity of Multi-Channel
expected to surpass other wireless technologies. Wireless Networks: Impact of Number of Channels and
As wireless mesh networks gain momentum in Interfaces,” Proc. MOBICOM, 2005.
an endeavor to complement the wired backbone [26] Y. Yoo, S. Ahn, and D. P. Agrawal, “A Credit-Payment
network, many issues are hindering its smooth Scheme for Packet Forwarding Fairness in Mobile Ad
Hoc Networks,” Proc. IEEE ICC, 2005.
progress. In this article we highlight some open [27] S. Marti et al., “Mitigating Router Misbehavior in
research challenges at different layers, examine Mobile Ad-Hoc Networks,” Proc. MOBICOM, 2000.
the feasibility of some state-of-the-art protocols, [28] L. Santhanam et al., “Distributed Self-policing Archi-
and discuss various issues. tecture for Packet Forwarding Fairness in Wireless Mesh
Networks,” to Appear in 11th IFIP Int’l. Conf. Pers.
Thus, the incumbent research proposals at Wireless Commun., Albacete, Spain, Sept. 20–22, 2006.
each layer should strongly advocate a secure and [29] P. Bahl et al., “DAIR: A Framework for Troubleshooting
scalable design seeking to further optimize the Enterprise Wireless Networks Using Desktop Infra-
performance of WMNs. Although they have structure,” Proc. ACM HotNets-IV 2005, College Park,
MD, 2005.
developed in leaps in recent years, there is still [30] Y. Hu, A. Perrig, and D. Johnson, “Ariadne: A Secure
ample research work for radical progress of on Demand Routing Protocol for Ad Hoc Networks,”
WMNs and true realization of Web-in-the-sky. Proc. ACM MOBICOM, 2002, pp. 12–23.
[31] V. Gupta, S. Krishnamurthy, and M. Faloutsos, “Denial
REFERENCES of Service Attacks at the MAC Layer in Wireless Ad Hoc
Networks,” Proc. IEEE MILCOM, 2002.
[1] C. Cordeiro and D. P. Agrawal, Ad Hoc & Sensor Net-
[32] L. Qui et al., “Troubleshooting Multihop Wireless Net-
works, Theory and Applications, World Scientific,
works,” Proc. SIGMETRICS (extended abstract), June 2005.
Spring 2006.
[2] D. D. Couto et al., “A High-Throughput Path Metric for
Multi-Hop Wireless Routing,” Proc. ACM MOBICOM, ADDITIONAL READING
2003. [1] S. Zhong, Y. Yang, and J. Chen, “Sprite: A Simple,
[3] R. Draves, J. Padhye, and B. Zill, “Routing in Multi- Cheat-Proof, Credit-Based System for Mobile Ad Hoc
Radio, Multi-Hop Wireless Mesh Networks,” Proc. Networks,” Proc. IEEE INFOCOM, 2003.
MOBICOM, 2004.
[5] V. Jain et al., “A Cross Layer MAC with Explicit Synchro-
nization through Intelligent Feedback for Multiple BIOGRAPHIES
Beam Antennas,” Proc. IEEE GLOBECOM, 2005. DHARMA P. AGRAWAL [M’74, F’87] (dpa@ececs.uc.edu) is the
[6] S. Liese, D. Wu, and P. Mohapatra, “Experimental Char- Ohio Board of Regents Distinguished Professor of Comput-
acterization of an 802.11b Wireless Mesh Network,” UC er Science and Engineering and founding director of the
Davis Comp. Sci. Dept. tech. rep. Center for Distributed and Mobile Computing in the
Department of Electrical and Communications Engineering DEEPTI NANDIRAJU (nandirds@ececs.uc.edu) has been a doc-
and Computer Science (ECECS), University of Cincinnati, toral student in the Center for Distributed and Mobile Thus, the incumbent
Onio. He has been a faculty member at North Carolina Computing at the University of Cincinnati since 2004. She
State University, Raleigh, (1982–1998) and Wayne State received her B.S. degree in 2001 and M.S. degree in 2003 research proposals at
University, Detroit, Michigan (1977–1982). His current with a gold medal in computer science from Assam Univer-
research interests are energy-efficient routing and informa-
tion retrieval in sensor and mesh networks, QoS in inte-
sity, Silchar, India. Her current research interests are in the
area of fairness issues and routing protocols for wireless ad
each layer should
grated wireless networks, use of smart multibeam
directional antennas for enhanced QoS, and various
hoc and mesh networks.
strongly advocate a
aspects of sensor networks including environmental moni- L AKSHMI S ANTHANAM (santhal@ececs.uc.edu) received her
toring and secured communication in ad hoc and sensor B.E. degree in computer science and engineering from the secure and scalable
networks. His co-authored textbook, Introduction to Wire- University of Madras, India, in 2003. She is currently a doc-
less and Mobile Systems (Thomson) has been adopted toral student working as a research assistant in the Center design seeking to
throughout the world and revolutionized the way the for Distributed and Mobile Computing at the University of
course is taught. His second co-authored textbook, Ad Hoc
and Sensor Networks, has just been published. He has
Cincinnati. Her research interests include detection of self-
ish behavior, traceback of DoS attacks, combating DoS
further optimize the
served as an editor of IEEE Computer magazine, IEEE Trans-
actions on Computers, and the International Journal of
attacks, intrusion detection in multihop networks, and
other security concerns in wireless ad hoc and mesh net-
performance of
High Speed Computing. He is an editor for the Journal of works.
Parallel and Distributed Systems, International Journal on WMNs. There is still
Distributed Sensor Networks, International Journal of Ad B ING H E [S ’01](heb@ececs.uc.edu) is a Ph.D. student in
Hoc and Ubiquitous Computing, International Journal of computer engineering at the Center for Distributed and ample research work
Ad Hoc & Sensor Wireless Networks, and Journal of Infor- Mobile Computing in the Department of ECECS, University
mation Assurance and Security. He has been Program Chair
and General Chair for numerous international conferences
of Cincinnati. His current research interests include archi-
tecture and capacity of wireless mesh networks, and
for radical progress
and meetings. He has received numerous certificates and
awards from the IEEE Computer Society. He was awarded a
resource allocation in 802.16 wireless MANs. He received
his B.S. degree in communication engineering and M.S.
of WMNs and a true
Third Millennium Medal by the IEEE for his outstanding degree in signal and information processing from Northern
contributions. He has also delivered keynote speeches at Jiaotong University of China. He has been an engineer at realization of
five international conferences. He also has four patents and Honeywell Technology Solutions Laboratory in China.
16 patent disclosures in wireless networking. He has been Web-in-the-sky.
selected as a Fulbright Senior Specialist for a duration of J UNFANG W ANG (wangjf@ececs.uc.edu) received her B.S.
five years. He is a Fellow of the ACM, AAAS, and WIF. degree in computer science from Northeastern University (,
China, and her M.S. degree in computer science from Nan-
NAGESH NANDIRAJU [S] (nandirns@ececs.uc.edu) is currently jing University of Aeronautics & Astronautics, China. She
pursuing his doctoral studies in the Department of ECECS, was previously a senior software engineer and team man-
University of Cincinnati. He is working as a research assis- ager at Zhongxing Telecom Company, China, working on
tant in the Center for Distributed and Mobile Computing the PCS and has a patent pending on it. Currently she is
at the University of Cincinnati. He received his B.E in com- pursuing her Ph.D. degree in the Center for Distributed and
puter science and engineering first class with distinction Mobile Computing in the Department of ECECS, University
from the University of Pune in 2001. His research interests of Cincinnati. Her current research interests include posi-
are in the broad area of wireless ad hoc and infrastruc- tioning techniques, channel assignment, and cross-layer
tured networks. His work includes performance evaluation routing in wireless mesh networks, and interference control
and design of efficient MAC and routing protocols for mul- in WLAN and wireless mesh networks.
tihop wireless ad hoc, mesh, and sensor networks. He has
prior work experience at the National Institute of Technolo-
gy, Silchar, India.