An Efficient Multicast Protocol in Mobile Ad-hoc Networks Using - - PowerPoint PPT Presentation

an efficient multicast protocol in mobile ad hoc networks
SMART_READER_LITE
LIVE PREVIEW

An Efficient Multicast Protocol in Mobile Ad-hoc Networks Using - - PowerPoint PPT Presentation

An Efficient Multicast Protocol in Mobile Ad-hoc Networks Using Forward Error Correction Techniques S. C. Chen, C. R. Dow, P.J. Lin, and S. F. Hwang Department of Information Engineering and Computer Science, Feng Chia University 1 Outline


slide-1
SLIDE 1

1

An Efficient Multicast Protocol in Mobile Ad-hoc Networks Using Forward Error Correction Techniques

  • S. C. Chen, C. R. Dow, P.J. Lin, and S. F.

Hwang Department of Information Engineering and Computer Science, Feng Chia University

slide-2
SLIDE 2

2/14

Outline

Introduction Recovery Points and FEC based Multicast

Schemes

RP establishment scheme RP mergence scheme FEC scheme RP maintenance scheme

Experimental Results Conclusions

slide-3
SLIDE 3

3/14

Introduction (1/2)

Multicasting is a strategy to effectively use

bandwidth for point to multi-point communications

Mobile Ad-hoc Networks

Multi-hop communications Highly dynamic topology Unstable forwarding path

Reliable multicast becomes a very challenging

research problem in mobile ad-hoc networks

slide-4
SLIDE 4

4/14

Introduction (2/2)

Many reliable multicast protocols have been proposed

for MANETs

ARQ (Automatic Repeat reQuest) based protocols Gossip-based protocols Hybrid ARQ and FEC (Forward Error Correction) based

protocols

These reliable multicast protocols may need the

recovery schemes

A major challenge to these recovery schemes is to reduce

feedback implosion problem

Especially, when the number of receivers and senders

increases

slide-5
SLIDE 5

5/14

Recovery Points and FEC based Multicast Schemes

In this work, we propose a recovery points and FEC

based multicast scheme

RP establishment scheme

Keep data packets from the source Recover the lost packets for its downstream RPs

RP mergence scheme

To avoid excessive control overhead

FEC scheme

Enhance the reliability of data transmission

RP maintenance scheme

slide-6
SLIDE 6

6/14

RP Establishment Scheme

Source nodes and MCHs are default recovery points Attach and piggyback a Logic Hop Count field to a data

packet

Each clusterhead increments one to this field and then

forwards it to the virtual backbone

A clusterhead will set itself to an RP if the Logic Hop Count

equals h

If a MCH receives the data packet, it will set the Logic Hop

Count to zero

S S

RP

Source node Clusterhead Recovery Point Logic_Hop_Count=1 Logic_Hop_Count=1 Logic_Hop_Count=2 Logic_Hop_Count=2

M

M MCH RP

Logic_Hop_Count=0 Logic_Hop_Count=1

RP

Logic_Hop_Count=0

slide-7
SLIDE 7

7/14

RP Mergence Scheme (1/2)

To avoid excessive RP control overhead

Case 1: if a selected RP is adjacent to an MCH, it is

unnecessary to establish an RP

S

RP M

S

M RP

Source node MCH Recovery Point Clusterhead

slide-8
SLIDE 8

8/14

RP Mergence Scheme (2/2)

To avoid excessive RP control overhead

Case 2: if there are more than one RPs that are the

child nodes of a clusterhead, they will be merged

S

RP RP

S

RP

Source node Recovery Point Clusterhead

RP

slide-9
SLIDE 9

9/14

FEC Scheme

  • !""#
  • !""#
slide-10
SLIDE 10

10/14

RP Maintenance Scheme

Maintenance for packet releasing

After comparing data packet sequence number and resending

lost packets

The upstream RP deletes data packets kept in its memory

Maintenance for Node Joining

When a receiver joins a cluster When an RP moves to anther MCH or RP and becomes an

  • rdinary node

Maintenance for Node Leaving

When an MCH only manages one receiver and the receiver

leaves

When the RP or MCH leaves the cluster

slide-11
SLIDE 11

11/14

Experimental Environment for the Multicast Scheme

Simulator: GloMoSim Nodes: 100 Area: 1000m × 1000m Tx_range: 200m Mobility model: Random waypoint

Max Speed: 1m/s ~ 30m/s

Number of senders : 1 ~ 50 Number of receivers : 25 ~ 125 Logic Hops : 2 The ratio of redundant data (R) : 1.5

slide-12
SLIDE 12

12/14

Experimental Results of the Multicast Scheme (1/2)

0.74 0.77 0.8 0.83 0.86 0.89 0.92 0.95 0.98 1 5 10 20 30 40 50 60 Number of Receivers D elivery Ratio ODMRP RP Scheme LC=2 RP Scheme with FEC AMRIS ODMRP with RMDP

Delivery Ratio vs. Number of Receivers

0.0% 50.0% 100.0% 150.0% 200.0% 250.0% 1 5 10 20 30 40 50 60 Number of Receivers M ulticast Efficiency ODMRP RP Scheme LC=2 RP Scheme with FEC AMRIS ODMRP with RMDP

Multicast Efficiency vs. Number

  • f Receivers
slide-13
SLIDE 13

13/14

Experimental Results of the Multicast Scheme (2/2)

0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1 1 5 10 20 30 40 50 Number of Senders Delivery Ratio

ODMRP RP Scheme LC=2 RP Scheme with FEC AMRIS ODMRP with RMDP

Delivery Ratio vs. Number of Senders Multicast Efficiency vs. Number

  • f Senders

0.0% 10.0% 20.0% 30.0% 40.0% 50.0% 60.0% 1 5 10 20 30 40 50 Number of Senders Multicast Efficiency ODMRP RP Scheme LC=2 RP Scheme with FEC AMRIS ODMRP with RMDP

slide-14
SLIDE 14

14/14

Conclusions

In this work, we proposed a reliable multicasting

protocol using the RP and FEC schemes for MANETs.

The RP scheme can be used to recover lost packets The FEC scheme can be used to enhance the

reliability of data transmission

The RP mergence and maintenance schemes can

avoid excessive control overhead and reduce the node mobility problem

The experimental results show that the proposed

scheme can achieve high delivery ratio and high multicast efficiency

slide-15
SLIDE 15

15

Appendix

slide-16
SLIDE 16

16/14

Related Work (1/2)

Reliable Multicast Protocols

ARQ-based multicast protocols [20, 51, 59, 60]

Detecting packet losses and notifying the sources to

retransmit the lost packets

Gossip-based protocols [13, 43]

Lost packet recovery is performed locally

Hybrid ARQ-FEC based schemes [50, 56]

Uses the FEC technique to encode the data packets to

redundant data packets

Use the ARQ technique to repair the lost packets from

sources

slide-17
SLIDE 17

17/14

Related Work (2/2)

Previous work

Clustering [36]

Distributed label clustering algorithm Small number of clusters A stable scheme

Virtual backbone [37]

Minimal Steiner tree Small number of backbone nodes A stable route

slide-18
SLIDE 18

18/14

Comparisons of Various Schemes

No No No Yes (clustering + virtual backbone) Yes (clustering + virtual backbone) Hierarchical structure No No ARQ + FEC Gossip Gossip + FEC Recovery strategy Mesh ODMRP Shared Tree AMRIS Mesh ODMRP with RMDP Shared Tree RP scheme Shared Tree RP scheme with FEC Multicast structure

slide-19
SLIDE 19

19/14

Experimental Results of the Multicast Scheme

Logic Hops between MCHs vs. Number of Nodes

0.5 1 1.5 2 2.5 3 3.5 50 100 150 200 250 300 350 Number of Nodes Logic Hops Max Average Min

slide-20
SLIDE 20

20/14

Experimental Results of the Multicast Scheme

Number of Different Roles vs. Number of Nodes

2 4 6 8 10 12 14 16 50 100 150 200 250 300 350 Number of Nodes Num ber of Different Roles. Number of CHs Number of MCHs Number of RPs

slide-21
SLIDE 21

21/14

An Example of Packet Loss Problem

1 2 4 21 17 15 14 13 11 10 9 8 12 7 5 3 16 20 18 19

Clusterhead Multicast Cluster head Sender Multicast Receiver

6 22

S Gateway or Ordinary node M R R M S M M R R

Received packets 1.2.3 Received packets 1.2.3 Sent packets 1.2.3.4 into the virtual backbone

1 2 4 21 17 15 14 13 11 10 9 8 12 7 5 3 16 20 18 19

Clusterhead Multicast Cluster head Sender Multicast Receiver

6 22

S Gateway or Ordinary node M R R M S M M R R

Received packets 1.2.3 Received packets 1.2.3 Sent packets 1.2.3.4 into the virtual backbone

slide-22
SLIDE 22

22/14

The Problem of HOP_COUNT field is set to 3

1 2 4 21 17 15 14 13 11 10 9 8 12 7 5 3 16 20 18 19

Clusterhead Multicast Cluster head Sender Multicast Receiver

6 22

S Gateway or Ordinary node M R R M S M M R R R Hop count over 3

1 2 4 21 17 15 14 13 11 10 9 8 12 7 5 3 16 20 18 19

Clusterhead Multicast Cluster head Sender Multicast Receiver

6 22

S Gateway or Ordinary node M R R M S M M R R R Hop count over 3

slide-23
SLIDE 23

23/14

FEC Scheme

Before sending data,

The sender separates the data file into many transmission

groups (TGs)

An (n, k) RS code is applied to each group After encoding the data file, the sender transmits partial

redundant data to receivers

When an RP or receiver receives a data packet

It will use the counter R[i] to record how many data packets

have been received for each TGi

Detects and recovers the packet loss

For the receiver, if the R[i]

k

It can decode the data packets for TGi to the original data

packets

slide-24
SLIDE 24

24/14

Speed of the encoding/decoding process on various architectures