1
An Efficient Multicast Protocol in Mobile Ad-hoc Networks Using Forward Error Correction Techniques
- S. C. Chen, C. R. Dow, P.J. Lin, and S. F.
An Efficient Multicast Protocol in Mobile Ad-hoc Networks Using - - PowerPoint PPT Presentation
An Efficient Multicast Protocol in Mobile Ad-hoc Networks Using Forward Error Correction Techniques S. C. Chen, C. R. Dow, P.J. Lin, and S. F. Hwang Department of Information Engineering and Computer Science, Feng Chia University 1 Outline
1
2/14
Introduction Recovery Points and FEC based Multicast
RP establishment scheme RP mergence scheme FEC scheme RP maintenance scheme
Experimental Results Conclusions
3/14
Multicasting is a strategy to effectively use
Mobile Ad-hoc Networks
Multi-hop communications Highly dynamic topology Unstable forwarding path
Reliable multicast becomes a very challenging
4/14
Many reliable multicast protocols have been proposed
ARQ (Automatic Repeat reQuest) based protocols Gossip-based protocols Hybrid ARQ and FEC (Forward Error Correction) based
protocols
These reliable multicast protocols may need the
A major challenge to these recovery schemes is to reduce
feedback implosion problem
Especially, when the number of receivers and senders
increases
5/14
In this work, we propose a recovery points and FEC
RP establishment scheme
Keep data packets from the source Recover the lost packets for its downstream RPs
RP mergence scheme
To avoid excessive control overhead
FEC scheme
Enhance the reliability of data transmission
RP maintenance scheme
6/14
Source nodes and MCHs are default recovery points Attach and piggyback a Logic Hop Count field to a data
Each clusterhead increments one to this field and then
forwards it to the virtual backbone
A clusterhead will set itself to an RP if the Logic Hop Count
equals h
If a MCH receives the data packet, it will set the Logic Hop
Count to zero
S S
RP
Source node Clusterhead Recovery Point Logic_Hop_Count=1 Logic_Hop_Count=1 Logic_Hop_Count=2 Logic_Hop_Count=2
M
M MCH RP
Logic_Hop_Count=0 Logic_Hop_Count=1
RP
Logic_Hop_Count=0
7/14
To avoid excessive RP control overhead
Case 1: if a selected RP is adjacent to an MCH, it is
S
RP M
S
M RP
Source node MCH Recovery Point Clusterhead
8/14
To avoid excessive RP control overhead
Case 2: if there are more than one RPs that are the
S
RP RP
S
RP
Source node Recovery Point Clusterhead
RP
9/14
10/14
Maintenance for packet releasing
After comparing data packet sequence number and resending
lost packets
The upstream RP deletes data packets kept in its memory
Maintenance for Node Joining
When a receiver joins a cluster When an RP moves to anther MCH or RP and becomes an
Maintenance for Node Leaving
When an MCH only manages one receiver and the receiver
leaves
When the RP or MCH leaves the cluster
11/14
Simulator: GloMoSim Nodes: 100 Area: 1000m × 1000m Tx_range: 200m Mobility model: Random waypoint
Max Speed: 1m/s ~ 30m/s
Number of senders : 1 ~ 50 Number of receivers : 25 ~ 125 Logic Hops : 2 The ratio of redundant data (R) : 1.5
12/14
0.74 0.77 0.8 0.83 0.86 0.89 0.92 0.95 0.98 1 5 10 20 30 40 50 60 Number of Receivers D elivery Ratio ODMRP RP Scheme LC=2 RP Scheme with FEC AMRIS ODMRP with RMDP
Delivery Ratio vs. Number of Receivers
0.0% 50.0% 100.0% 150.0% 200.0% 250.0% 1 5 10 20 30 40 50 60 Number of Receivers M ulticast Efficiency ODMRP RP Scheme LC=2 RP Scheme with FEC AMRIS ODMRP with RMDP
Multicast Efficiency vs. Number
13/14
0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1 1 5 10 20 30 40 50 Number of Senders Delivery Ratio
ODMRP RP Scheme LC=2 RP Scheme with FEC AMRIS ODMRP with RMDP
Delivery Ratio vs. Number of Senders Multicast Efficiency vs. Number
0.0% 10.0% 20.0% 30.0% 40.0% 50.0% 60.0% 1 5 10 20 30 40 50 Number of Senders Multicast Efficiency ODMRP RP Scheme LC=2 RP Scheme with FEC AMRIS ODMRP with RMDP
14/14
In this work, we proposed a reliable multicasting
The RP scheme can be used to recover lost packets The FEC scheme can be used to enhance the
The RP mergence and maintenance schemes can
The experimental results show that the proposed
15
16/14
Reliable Multicast Protocols
ARQ-based multicast protocols [20, 51, 59, 60]
Detecting packet losses and notifying the sources to
retransmit the lost packets
Gossip-based protocols [13, 43]
Lost packet recovery is performed locally
Hybrid ARQ-FEC based schemes [50, 56]
Uses the FEC technique to encode the data packets to
redundant data packets
Use the ARQ technique to repair the lost packets from
sources
17/14
Previous work
Clustering [36]
Distributed label clustering algorithm Small number of clusters A stable scheme
Virtual backbone [37]
Minimal Steiner tree Small number of backbone nodes A stable route
18/14
No No No Yes (clustering + virtual backbone) Yes (clustering + virtual backbone) Hierarchical structure No No ARQ + FEC Gossip Gossip + FEC Recovery strategy Mesh ODMRP Shared Tree AMRIS Mesh ODMRP with RMDP Shared Tree RP scheme Shared Tree RP scheme with FEC Multicast structure
19/14
Logic Hops between MCHs vs. Number of Nodes
0.5 1 1.5 2 2.5 3 3.5 50 100 150 200 250 300 350 Number of Nodes Logic Hops Max Average Min
20/14
Number of Different Roles vs. Number of Nodes
2 4 6 8 10 12 14 16 50 100 150 200 250 300 350 Number of Nodes Num ber of Different Roles. Number of CHs Number of MCHs Number of RPs
21/14
1 2 4 21 17 15 14 13 11 10 9 8 12 7 5 3 16 20 18 19
Clusterhead Multicast Cluster head Sender Multicast Receiver
6 22
S Gateway or Ordinary node M R R M S M M R R
Received packets 1.2.3 Received packets 1.2.3 Sent packets 1.2.3.4 into the virtual backbone
1 2 4 21 17 15 14 13 11 10 9 8 12 7 5 3 16 20 18 19
Clusterhead Multicast Cluster head Sender Multicast Receiver
6 22
S Gateway or Ordinary node M R R M S M M R R
Received packets 1.2.3 Received packets 1.2.3 Sent packets 1.2.3.4 into the virtual backbone
22/14
1 2 4 21 17 15 14 13 11 10 9 8 12 7 5 3 16 20 18 19
Clusterhead Multicast Cluster head Sender Multicast Receiver
6 22
S Gateway or Ordinary node M R R M S M M R R R Hop count over 3
1 2 4 21 17 15 14 13 11 10 9 8 12 7 5 3 16 20 18 19
Clusterhead Multicast Cluster head Sender Multicast Receiver
6 22
S Gateway or Ordinary node M R R M S M M R R R Hop count over 3
23/14
Before sending data,
The sender separates the data file into many transmission
groups (TGs)
An (n, k) RS code is applied to each group After encoding the data file, the sender transmits partial
redundant data to receivers
When an RP or receiver receives a data packet
It will use the counter R[i] to record how many data packets
have been received for each TGi
Detects and recovers the packet loss
For the receiver, if the R[i]
It can decode the data packets for TGi to the original data
packets
24/14