A Hybrid Centralized Routing Protocol

download A Hybrid Centralized Routing Protocol

of 15

Transcript of A Hybrid Centralized Routing Protocol

  • 7/29/2019 A Hybrid Centralized Routing Protocol

    1/15

    Mobile Netw Appl (2008) 13:117131

    DOI 10.1007/s11036-008-0038-4

    A Hybrid Centralized Routing Protocolfor 802.11s WMNs

    Azman Osman Lim Xudong Wang

    Youiti Kado Bing Zhang

    Published online: 1 April 2008 Springer Science + Business Media, LLC 2008

    Abstract Wireless mesh networks (WMNs) are being

    widely accepted as a critical wireless access solutionfor various applications. Due to minimal mobility inmesh nodes, a backbone topology can be effectively

    maintained in WMN using a proactive routing protocol.

    In IEEE 802.11s standard, a tree-based routing (TBR)protocol is adopted as a viable proactive routing proto-

    col for a WMN with user traffic flowing to/from a wired

    network through a root (i.e., a mesh portal). However,

    the performance of the TBR protocol degrades rapidlyas the user traffic becomes dominated by intra-mesh

    traffic. The reason is that the routing path through the

    root even for intra-mesh traffic unnecessarily overloads

    the root. Furthermore, the TBR performance becomesmore severe when the network size of WMN is large,

    which could lead to the huge amount of intra-mesh

    traffic towards the root. To overcome these problems,

    A. O. Lim (B)National Institute of Information CommunicationsTechnology, 3-5 Hikaridai, Seika-cho, Soraku-gun,Kyoto 619-0289, Japane-mail: [email protected]

    X. WangKiyon, Inc., 9381 Judicial Drive, Suite 160,San Diego, CA 92121, USA

    Y. KadoNational Institute of Information CommunicationsTechnology, 3-5 Hikaridai, Seika-cho, Soraku-gun,Kyoto 619-0289, Japan

    B. ZhangNational Institute of Information and CommunicationsTechnology, 3-5 Hikaridai, Seika-cho, Soraku-gun,Kyoto 619-0289, Japan

    we propose a new routing mechanism, root driven

    routing (RDR) protocol, for the root to quickly deter-mine the best-metric route for any source-destinationpair of intra-mesh traffic. For inter-mesh traffic, the

    original TBR protocol is employed. Thus, the hybrid

    centralized routing protocol that combines TBR andRDR and is adaptive to all traffic scenarios. Our sim-

    ulation results reveal that the proposed RDR protocol

    outperforms the TBR protocol with much lower aver-

    age end-to-end delay and much higher packet deliveryratio for intra-mesh traffic. The simulation results also

    provide some insight into the right tradeoff between

    the TBR protocol and the RDR protocol to achieve

    the best performance of the hybrid centralized routingprotocol for WMNs.

    Keywords wireless mesh network 802.11s

    hybrid centralized tree-based routing protocol

    intra-mesh traffic

    1 Introduction

    Wireless mesh network (WMN) has recently emerged

    as one of the tremendously promising technology for

    high-speed Internet access and state-of-the-art wire-less networking in order to address a wide range of

    application scenarios. WMNs based on 802.11 wire-

    less local area network (WLAN) rely on a multihop

    wireless backbone for delivering high-speed servicesto end-users without the need for deploying any fixed

    infrastructure. WMNs supplant antiquated wired net-

    works due to its advantages in terms of low-cost de-ployment, enhanced robustness, and flexibility. WMNs

    are mainly targeted for residential, office, public safety,

  • 7/29/2019 A Hybrid Centralized Routing Protocol

    2/15

    118 Mobile Netw Appl (2008) 13:117131

    military, campus, community, small to medium busi-

    nesses, public access, emergency, municipality, and

    rural networks. Most of the above-mentioned networks

    needs to connect to the infrastructure networks. Forexample, an ambulance multihop network on an emer-

    gency call may connect to the hospital infrastructure as

    necessary for communicating with the doctor. In this

    kind of mesh topology, at least one root directly con-nects to the infrastructure networks. Moreover, nodes

    in this mesh network have minimal or no mobility.

    Thus, a proactive routing protocol is deemed moresuitable for such a mesh network.

    The aforementioned features can be well captured

    by a tree-based routing (TBR) protocol [1, 2], whichis attaining increased attention as a viable routing pro-

    tocol for the WMNs. Based on the TBR protocol, the

    root (i.e., the mesh portal) constructs tree-type pathsefficiently and quickly in the WMN, whereby all the

    participating nodes are linked to it. In addition, the

    TBR protocol is proposed based on the premise thattraffic are mostly directed to/from an infrastructurenetwork through the root, in which it works effectively

    in handling the traffic communications towards the

    root. However, when the amount of traffic inside meshnetwork increases significantly, the intra-mesh traffic

    around the root of the WMN becomes so heavy that the

    overall network performance can be degraded rapidly.Routing intra-mesh traffic through the root not only

    aggravate the said weak point of TBR protocol, but

    also waste efficient usage of network resources due

    to the physical characteristics of wireless constraints.Indeed all the forwarding of intra-mesh traffic through

    the root might flow over the routes without using the

    best-metric.To address these problems, in this paper we propose

    a new routing mechanism, namely a root driven rout-

    ing (RDR) protocol that enables the root to provide

    the best-metric route for any source-destination pairrather than go through itself when an inevitability intra-

    mesh traffic volume occurs at the root. In other words,

    the RDR protocol extends and significantly enhancesthe capability of the TBR protocol in regards to self-

    traffic-dispersing protocol and provides the best-metric

    route for all the source nodes. Furthermore, the RDRprotocol advantageously improves the network perfor-

    mance without having any impact on the TBR protocol

    operation. It is a veritable idea that both TBR and

    RDR protocols fused into one stack protocol, calleda hybrid centralized routing protocol. Thus, our main

    objective of the paper is to design an efficient and

    effective mechanism of RDR protocol that is simpleenough for combining the TBR protocol to achieve the

    best performance for all traffic scenarios in the WMNs.

    The remainder of this paper is organized as follows.

    The background of WMN and the related work are

    briefly reviewed in Section 2. An overview of TBR

    protocol is given in Section 3 and the motivation ofthis paper is highlighted in Section 4. The details of

    the proposed RDR routing protocol are described in

    Section 5. Simulation setup and experimental results

    are presented in Section 6. This paper is concluded inSection 7.

    2 Background and related work

    This section discusses the architecture of WMN andreviews the related work on tree-based approaches

    in disseminating control messages for the purpose of

    finding link status, collecting neighbor information, andrequesting routing path.

    2.1 WMN architecture

    In order to grasp the network architecture of WMN

    as specified in [3], we first explain the original 802.11-based WLAN [4]. Two types of WLAN are classified

    based on the combination of an access point and a

    station. The simplest WLAN type consists of a min-imum of two stations, wherein each station operates

    with the same protocol. This is also known as a wireless

    ad hoc network. Another WLAN type consists of a

    minimum of one station and one access point (AP). It

    is represented as a wireless access network, in whichthe AP can act as a bridge or a gateway to other wired

    networks.To address the need of wireless mesh in WLANs,

    the AP links are unwired and their links are connected

    to each other via radio links resulting in a mesh of

    connectivity among the APs. Such an enhanced archi-tecture is known as a WMN. An example of WMN

    architecture with legacy stations (STAs) as specified in

    the IEEE 802.11s [2] that is depicted in Fig. 1. In sucha WMN architecture, different entities in the WMN

    mesh link

    legacy Link

    mesh portal point (MPP)

    mesh point (MP)

    mesh access point (MAP)

    Internet

    legacy station (STA)

    A backbone of

    WMN

    Figure 1 An architecture of WMN

  • 7/29/2019 A Hybrid Centralized Routing Protocol

    3/15

    Mobile Netw Appl (2008) 13:117131 119

    play different roles according to the functionalities they

    provide. Basically, the WMN architecture consists of

    three entities; a mesh point (MP), a mesh portal point

    (MPP), and a mesh access point (MAP). The ad hoclink formation formed by the MPs, which provides the

    backbone for the WMN infrastructure, whereas the

    MPP works as a repeater or a gateway. The MP that

    supports the associated STAs is usually called as MAP.The MPs can be either stationary or mobile. However,

    the MPP and MAPs are mostly immobile. The STAs

    are usually regular devices that do not contribute tothe WMN services, such as routing and forwarding

    for multi-hopping packets. Therefore, the STAs simply

    connect to one of the MAPs in order to access the net-work resources. Since we intend to focus on the routing

    protocol in the WMN backbone networks, STAs access

    to MAPs is not considered in this paper. We also usethe terms of node and root to represent MP and MPP,

    respectively.

    2.2 Related work

    Broadcasting protocols play an importance role in dis-

    seminating information to all network nodes in thewireless multihop networks [5]. For simple and reli-

    able dissemination, a simply flooding or flooding-like

    approach is used. Despite its simplicity and reliability,flooding involves unnecessary communications, causing

    inefficient use of resources. To minimize the hefty com-

    munication overhead and reduce the number of colli-

    sions, the dissemination information is distributed overa tree path, instead of flooding it. In literature, the tree

    path broadcasting appears in two forms; a single root

    broadcast tree and multiple root broadcast trees. Inthe single root broadcast tree approach, Chlamtac and

    Kutten [6] have proposed two algorithms; distributed

    and centralized in order to increase the distribution ef-

    ficiency for maintaining the tree. In [6], both algorithmsare based on a set of time-oriented channel allocation

    rules, which results in a collision free forwarding along

    the tree. In the distributed algorithm a message calledTOKEN is generated at the root and routed through

    the network nodes. Upon TOKEN reception, a node

    becomes the focus of the tree construction activityand timeslot assignment. In the centralized algorithm

    however a nodes timeslot assignment is determined by

    the root only.

    In the multiple root broadcast trees, Ogier et al. [7]considered the idea behind reverse-path forwarding in

    [8] and proposed a new topology dissemination pro-

    tocol called topology dissemination based on reverse-path forwarding (TBRPF) protocol, in which broadcast

    trees are computed based on full topological informa-

    tion received over the broadcast trees themselves. In

    TBRPF, every node executes Dijkstras algorithm to

    determine a reverse minimum-hop tree, and then ex-

    changes some information with neighbors to determineits parent and children from the standpoints of other

    nodes. Once the topology is changed, TBRPF suffers

    from the overhead associated with computing the trees

    and communicating with neighbors.The idea of tree-based is also applied to the routing

    protocols for multicast (group-oriented) communica-

    tion. An example of tree-based multicast protocols ismulticast ad hoc on demand distance vector (MAODV)

    protocol [9]. The MAODV protocol maintains a shared

    tree for each multicast group, consisting of only re-ceivers and relays. Sources wishing to send message to

    destinations in particular multicast group acquire on

    demand routes corresponding to the destinations in away similar to the AODV protocol [10]. Each multicast

    group has a group leader. The group leader periodically

    transmits a HELLO packet to the receivers and relays.Upon HELLO packet reception, the receivers and re-lays reply with a special route request (RREQ) to the

    group leader in order to keep themselves as a member

    of shared tree. The primary drawback of MAODV ishigh delay and overhead in fixing broken links under

    high network mobility and traffic load. It may be argued

    that its dependence on a unicast routing protocol makesit less flexible.

    Besides the wireless networks, the idea of tree-based

    is used in the IEEE standardization like IEEE 802.1D

    Bridging LAN standard [11]. This tree-based algorithmconfigures a simply connected active tree topology from

    the bridge ports of a Bridged LAN. One of the bridges

    is known as the root bridge in the Bridged LAN. Onthe other hand, IEEE 802.11 working group confirmed

    a baseline draft for WMN, designated as IEEE 802.11s

    Wireless LAN medium access control (MAC) and

    physical layer (PHY) specifications: Mesh Networking[2]. In the current draft, a hybrid wireless mesh protocol

    is a combination of on-demand and proactive routing

    protocols. On-demand routing protocol is adopted fornodes that experience a changing environment, while

    proactive TBR protocol is an efficient choice for nodes

    in a static WMN topology. The proactive TBR protocolis used to avoid unnecessary routing overhead for rout-

    ing path discovery and recovery. Furthermore, the TBR

    protocol is deemed more suitable to cope with the most

    expected inter-mesh traffic that will occur between thenodes and the root (as gateway to further access the

    wired infrastructure).

    Although a plethora of research has been producedin relation to tree-based approaches for efficient and

    effective information distribution purposes, the TBR

  • 7/29/2019 A Hybrid Centralized Routing Protocol

    4/15

    120 Mobile Netw Appl (2008) 13:117131

    protocol in the WMN deployment is still open issues

    among researchers today. To the best of our knowl-

    edge, there is no so much investigations on the perfor-

    mance optimization of TBR protocol under the staticnature of WMNs.

    3 The TBR protocol

    TBR protocol that is a kind of proactive routing proto-cols builds a tree-topology network when a root in the

    WMN is configured. The root is a portal or shared edge

    node with high computation, which acts like a server forother nodes. An example of root is a gateway of campus

    network topology. In this paper, we intend to focus our

    research work mainly dealing with only one root.

    Before a node could send its traffic to another nodeinside the mesh network, the topology tree is con-

    structed in order to link all the participating nodes.This topology tree formation begins when the rootstarts to periodically broadcast a root announcement

    (RANN) message by increasing the sequence number

    in every announcement, which is set to default value

    of three seconds. The RANN message format is shownin Fig. 2a. A node receiving the RANN caches the

    originated node address of the corresponding RANN as

    a potential parent, and rebroadcasts the RANN with anupdated cumulative metric. There are two fundamental

    approaches for a child node to select its parent node.

    First, after waiting for a pre-defined time of one second

    for other arriving RANNs from all possible parents, thechild node selects a parent node with the best-metric

    d

    UnreachableDestination Address

    1

    LengthUnreachable Destination

    Sequence Number

    1 4 41

    Type Flag

    a

    b

    RootAddress

    1

    Length MetricRoot

    Sequence Number

    1 4 4 41

    Type

    1

    TTL Lifetime

    4

    Flag

    SourceAddressLength Flag Metric

    SourceSequence Number

    1 4 4 4

    DestinationAddress

    DestinationSequence Number

    4 41

    Type

    1

    TTL

    1

    Lifetime

    4

    Note: all the figures denote in Octets

    cmdenotes number of neighbor nodes

    Neighbor NodeAddress #m

    Neighbor NodeLink Metric #m

    4 4 4

    Neighbor NodeLink Metric #1

    4

    Neighbor NodeAddress #1

    ...RREP Message

    28

    Figure 2 RANN, RREP without and with neighbor information,and RERR message formats. a RANN message format. b RREPmessage format. c RREP message format with neighbor informa-tion. d RERR message format

    for its path to the root from all the possible parents.

    Alternatively, the second approach is that the child

    node does not wait for the pre-defined time for other

    arriving RANNs from all possible parents, whereasthe child node immediately selects the corresponding

    parent node that sent the first received RANN message.

    After selecting the parent node, the child node updates

    its route table in which, for instance, the latest messagesequence number. Then, the child node that has the

    known path to the root also registers itself by sending a

    route reply (RREP) message with the root as the des-tination address in the RREP message field. Figure 2b

    shows the RREP message format. Each intermediate

    node that received the RREP forwards the RREP toits selected parent and updates the node it was received

    from as the next-hop child to reach the source node in

    its route table. After receiving all the RREPs, the rootlearns all participating nodes and builds a tree topology

    to reach any node in the mesh network. If a node does

    not hear the RANN for a pre-defined period, the nodedoes not participate in tree-building until hearing avalid RANN again.

    Each node in the tree-topology network maintains

    its own route table, which has entries for recent routetowards the destination node. In the route table of each

    node, the contents are destination (DST), next hop

    (NH), link metric (LM), sequence number (SN), timestamp (TS), and node flag (NF). The field of link metric

    represents that the metric that is associated with the

    hop count, airtime cost, etc. For the sake of simplicity,

    the metric of hop count is hereinafter used for theTBR protocol as well as our proposed protocol in the

    simulation studies of this paper. The field of sequence

    number represents the most recent information of anentry. The field of time stamp represents that the time

    for an entry is stored and it is used to monitor the

    expiration of an entry. Each time the tree route is used,

    its associated time stamp is updated. If the route isnot used within the specified time, route table timeout

    must be at least the maximum of three times of RANNannouncement interval, it is deleted. The field of nodeflag represents that the destination of entry is either a

    root (R) or a node (N).

    Figure 3 shows a root and all the participating nodesform a tree-topology network using the TBR protocol.

    With the tree-topology and table-driven routing, any

    node can participate and communicate with each other

    in the network. For instance, when a node wants tosend traffic to another node, and if it has no route to its

    destination node, it sends the traffic to the root. Upon

    receiving the traffic from the source node, the rootchecks if the source traffic is intended for a node within

    the mesh or outside. The root forwards the source

  • 7/29/2019 A Hybrid Centralized Routing Protocol

    5/15

    Mobile Netw Appl (2008) 13:117131 121

    DE

    G H

    B

    F

    C

    A

    R

    I

    one-hop linkTBR route

    Root

    Wired Network Wired Network

    DE

    G H

    B

    F

    C

    A

    R

    I

    DST NH LM SN TS

    A A 1 655 1.0345

    B B 1 655 1.1355

    C A 2 655 1.3740

    D A 2 655 1.6241

    E B 2 655 1.5585

    F A 3 655 1.7925

    G A 3 655 1.8252

    H B 3 655 1.8511

    I A 4 655 1.9236

    Node As Route Table

    Rs Route Table

    DST NH LM SN TS

    R R 1 655 1.0125

    D D 1 655 1.1075

    C C 1 655 1.2930

    F C 2 655 1.5430

    G D 2 655 1.4893

    I D 3 655 1.7632

    Example:

    NF

    R

    N

    N

    N

    NN

    N

    N

    N

    N

    NF

    N

    N

    N

    N

    N

    Figure 3 A root and all participating nodes form a tree-topology

    network using the TBR protocol. The examples of route table forthe root and node A are also provided

    traffic to the destination node if it finds an entry in the

    route table, otherwise it sends to the destination node

    of the wired networks.

    4 Problem description

    There are three types of traffic requiring routing viaa mesh gateway, which is usually configured as a root

    in the WMN; upstream from inside mesh, downstream

    from outside mesh, and intra-mesh between nodeswithin mesh. For both downstream and upstream traf-

    fic, the root can provide the available proactive TBR

    protocol itself. For the traffic of intra-mesh between

    nodes within mesh, when a source node wants to sendtraffic to a destination node, which is inside the mesh

    network, the source node forwards the traffic toward

    the root if no active path exists and the destinationnode receives the traffic forwarded by the root. There

    is one serious drawback in the TBR protocol when

    other participating nodes always forward their intra-mesh traffic flow without using the best-metric route

    through the root. The root is noticeably overloaded

    with forwarding traffic as shown in Fig. 4. Moreover,

    when the network size grows and becomes significantlyhuge, the intra-mesh traffic around the root becomes

    so heavy that the overall network performance can be

    degraded sharply and the entire network can slow downor even stall. Routing the intra-mesh traffic through the

    root not only worsen the performance of TBR protocol,

    but also waste of network resources due to non-uniform

    spatial usage of shared wireless bandwidth. As a result,

    TBR protocol faces many problems like the increased

    end-to-end packet loss, the decreased network lifetime,root of the tree is unique point of failure, and poor

    load balancing whereby nodes near the root carry more

    traffic, which lead to traffic congestion around the root.

    To solve the aforementioned problems, we propose aRDR protocol that is a novelty protocol for handling

    the increment of intra-mesh traffic despite the inter-

    mesh traffic when nodes has a minimal mobility inWMNs.

    5 RDR protocol

    In this section, we introduce a new RDR protocol,which incorporates with the TBR routing so that it

    forms a hybrid centralized routing protocol for thehandling the increment of intra-mesh traffic despite the

    inter-mesh traffic in the WMNs. We first present howto build the whole network topology at the root beside

    having the tree topology and then present the proposed

    protocol description and procedure. We discuss thecomputation and algorithm of choosing the optimum

    route for any source-destination pair. We also discuss

    how to improve the proposed protocol and its protocol

    procedures when dealing with link breaks.

    Intra-mesh trafficTBR route

    Wired Network

    DE

    G H

    B

    F

    C

    A

    R

    I

    H to D

    E to F

    G to E

    I to B

    F to H

    C to B

    Figure 4 The inefficiency of the TBR protocol when dealing withintra-mesh traffic in the mesh network

  • 7/29/2019 A Hybrid Centralized Routing Protocol

    6/15

    122 Mobile Netw Appl (2008) 13:117131

    5.1 Protocol description and procedure

    The core idea of our proposed protocol is to inau-gurate a RDR protocol for handling the intra-mesh

    traffic within the mesh network. First, to enable a root

    to provide the best-metric route for any intra-meshtraffic, it needs to build a whole network topology in

    addition to the tree topology. To do so, upon receivingthe RANN message, each node piggybacks the neigh-bor information that consist of neighbor addresses

    and the corresponding metric into the RREP message

    (see Fig. 2c).

    Second, we need two additional messages; route set(RSET) and route notification (RNTF) in order to

    notify nodes within the network for their intra-mesh

    traffic. These two message formats are shown in Fig. 5band c. Basically, the proposed protocol is very simple

    and efficient to provide an on-demand routes for any

    source to its corresponding destination in the mesh

    network. Simply to say, when a source node wants tosend traffic to a destination node, the root can recom-

    mend the optimum on-demand route by notifying the

    route information using a RSET message via unicastingto the destination node or to the source node. Then,

    the destination node (or the source node) notifies the

    intermediate nodes along the recommended optimumroute with a RNTF message via unicasting. For the sake

    of consistency in term of protocol implementation, we

    only specify the case where the root sends the RSET

    message to the destination node rather than to thesource node. Figure 6 illustrates an example of how the

    root uses a RDR protocol to provide a pair of source-

    destination to deliver its intra-mesh traffic. When asource node (F) wants to send traffic to a destination

    node (H), F has no route to its H, it sends a RREQ

    message to the root and followed by sending the DATAmessages to the root. Upon receiving the RREQ mes-

    a

    b

    c

    SourceAddressLength Flag

    SourceSequence Number

    1 4 4

    DestinationAddress

    DestinationSequence Number

    4 41

    Type

    1

    TTL

    1

    Lifetime

    4

    LifetimeLength Flag

    1 4

    SourceSequence Number

    41

    Type = RSET

    1

    Node Address #n(Destination)

    4 4

    Node Address #1(Source)

    ...

    ndenotes number of notifying nodes

    Note: all the figures denote in Octets

    LifetimeLength Flag

    1 4

    SourceSequence Number

    41

    Type = RNTF

    1

    Node Address #n(Destination)

    4 4

    Node Address #1(Source)

    ...

    Figure 5 RREQ, RSET, and RNTF message formats used in theproposed protocol. a RREQ message format. b RSET messageformat. c RNTF message format

    Wired Network

    DE

    G H

    B

    F

    C

    A

    R

    I

    F R H

    DATA

    Wired Network

    DE

    G H

    B

    F

    C

    A

    R

    I

    F R H

    (1) RREQ(2) DATA

    (1)

    (3)

    (4)

    G

    (2)

    (5)

    (3) RSET

    (4) RNTF

    (5) DATA

    time

    time

    source destination

    DATA1

    DATA2

    DATAN

    DATA1DATA2

    DATAN

    DATA3

    DATA4

    DATA3

    DATA4

    DATA

    Wired Network

    Root

    Wired Network

    DE

    G H

    B

    F

    C

    A

    R

    I

    RREQ

    DE

    G H

    B

    F

    C

    A

    R

    I

    RSETRSET

    DATA

    b

    c

    a

    source destination

    Figure 6 a The TBR protocol operation for intra-mesh traffic.b The proposed RDR protocol operation for intra-mesh traffic.c The function of RREQ in the proposed protocol

    sage, the root refers to the topology information of

    the whole network, and then it selects the optimumroute from F to H. To notify the selected route, the

    root generates a RSET message via unicasting to H,

    whereby the RSET message contains the complete pathinformation from F to H. Meanwhile, the root also for-

    wards the DATA messages to H. Upon receiving the

    RSET message, H generates a RNTF message, which

    contains the path information from F to H, and thenforwards it to F via G according to the path informa-

    tion. When F receives the RNTF message, F switches

    and unicasts its DATA messages destined to H alongthe recommended optimum route by the root.

    5.2 RREQ function

    According to the example of network topology in

    Fig. 6c, when a source node ( F) wants to send traffic

  • 7/29/2019 A Hybrid Centralized Routing Protocol

    7/15

    Mobile Netw Appl (2008) 13:117131 123

    to a destination node, e.g., G, F sends the traffic to the

    root if F has no route to G. Upon receiving the traffic

    with the destination address field is set to G from F,

    node A realize that it has to forward the source trafficto G via node D. This is because A checked its route

    table and found out that there is an entry of destinationG with two-hop away through D. Thus, A rationally

    sends all the source traffic to D rather to the root. Inorder to avoid the RREQ message is being forwarded

    by A to D, the destination address field in the RREQ

    message is set to root address. By doing that, the RREQmessage is directly to the root. Upon receiving the

    RREQ message, the root generates a RSET message.

    In other words, the function of RREQ message is totrigger the generation of RSET message when the pro-

    posed protocol is applied. Before the RSET message

    is generated, the root computes the optimum route forthe source node that sent the RREQ message and the

    information of the optimum route put into the node

    address fields of RSET message as shown in Fig. 5b.

    5.3 Optimum route computation

    In the proposed protocol, the root builds a whole

    network topology upon receiving the RREP message

    that contains the neighbor information of the nodes.According to the topology information of the entire

    network, the root computes the optimum route for all

    source-destination pairs using the Dijkstras algorithm.

    Upon receiving the RREQ message, the root first se-lects all the possible valid paths for a source-destination

    pair. Then, the root chooses the best-metric route

    among the possible valid paths. After the Dijkstrasalgorithm is carried out, the root compare the compu-

    tation results with the existing TBR route information

    in its route table in order to make sure that the recom-

    mended route is an optimum route. Figure 7 shows acomputation and algorithm of choosing the optimum

    route for a source-destination pair in the mesh net-

    work when the proposed protocol is applied. In otherwords, the root can adapt to the network demands

    by necessarily recommending the optimum route for

    a source-destination pair besides the tree-type route.If the computation result of best-metric route has the

    same metric with the TBR route, the algorithm chooses

    either one randomly as an optimum route. In order to

    avoid high computation in the root, the computation isconducted one based on the latest piggybacked neigh-

    bor information of participating nodes when a RREQ

    message is received. It is intuitively clear that the com-putation process is relatively simple and consumes less

    computation power for the root.

    Dijkstras Algorithm

    DST NH LM SN RFTS

    A A 1 655 1.0345 PAB B 1 655 1.1355 PAC A 2 655 1.3740 PAD A 2 655 1.6241 PAE B 1 655 1.5585 PAF A 3 655 1.7925 PAG A 3 655 1.8252 PAH B 3 655 1.8511 PAI A 4 655 1.9236 PA

    Recommended route

    F G H

    Rs Route TableRs Neighbor List Cache Table

    node 1-hop neighbors

    A R, B, C, DB R, A, D, EC A, D, FD A, B, C, F, GE B, D, G, HF C, D, G, IG D, E, F, H, IH E, G, II F, G, HR A, B

    Metric

    2 hops

    TBR route

    Metric

    6 hops

    Tree route

    Algorithm to choose a route for any SRC-DST pair:

    myRoute = TBR_route

    if (myRoute > Recommended_route)myRoute = Recommended_route

    else if (myRoute == Recommended_route)myRoute = random(Recommended_route, TBR_route)

    end ifEnd

    Begin

    The optimum route

    NF

    NNNNNNNNN

    F C A R (3 hops)R B E H (3 hops)

    Figure 7 Computation and algorithm of choosing the optimumroute for any source-destination pair in the mesh network

    5.4 On-demand active route

    In this section, we explain how to implement and

    maintain the on-demand active route for any source-

    destination pair when the proposed protocol is applied.Upon receiving the RSET message, a destination node

    generates a RNTF message with an information of on-

    demand (optimum) route that is recommended by root.An intermediate node that received the RNTF message

    has to update its route table with the on-demand entries

    and forwards it toward the source node after process-

    ing the RNTF message. To ensure the entries for on-demand and proactive can share in one common route

    table, new column of route flag (RF) field is added into

    the route table. The field of RF represents that thedestination of entry is handled either by the proactive

    (PA) mode or for the on-demand (OD) mode. Figure 8

    illustrates an example of how to implement both proac-tive and on-demand entries in one common route table

    when the proposed protocol is applied. Upon receiving

    the RNTF message, the source node switches its traffic

    transmission to the corresponding destination node viathe recommended optimum route by the root. In the

    proposed protocol, the route between each source and

    destination pair is expected to be symmetric. Thus, theforward path to destination and the reverse path back

    to source are constructed when one RNTF message is

  • 7/29/2019 A Hybrid Centralized Routing Protocol

    8/15

    124 Mobile Netw Appl (2008) 13:117131

    DE

    G H

    B

    F

    C

    A

    R

    I

    RNTF

    DATAAn on-demand route

    is recommended

    by Root

    On-demand entriesis recorded through

    the received RNTF

    source destination

    Root

    DST NH LM SN RFTS

    E E 1 655 1.0289 PA

    Node Hs Route Table

    F G 1 325 0.2905 OD

    R

    NF

    NR E 3 655 1.0074 PA

    N

    DST NH LM SN TS

    C C 1 655 1.0775

    H G 1 325 0.4625

    Node Fs Route Table

    R C 3 655 1.0032

    RF

    PA

    OD

    R

    NF

    NPA

    N

    DST NH LM SN TS

    H H 1 325 0.3125

    D D 1 655 1.1375I I 1 655 1.4875

    Node Gs Route Table

    F F 1 325 0.3125

    RF

    PA

    OD

    R

    NF

    NPA

    N

    R D 3 655 1.1274

    PAN

    ODN

    Figure 8 On-demand route construction for an intra-mesh traffictransmission using one common route table

    received. As a result, it indirectly can reduce the overallcontrol overhead of proposed protocol despite using

    the second RNTF message to build the reverse pathback to source. In summary, one RNTF message is used

    to build a bidirectional path of source-destination pair

    when the route is assumed to be symmetric.

    Each time an on-demand route is used to forward adata packet, the source, the destination, and the inter-

    mediate nodes along the route are updated their time

    stamp field of route table to be no less than the currenttime plus active route timeout. Since the on-demand

    route is assumed to be symmetric, the time stamp field

    of route table along the reverse path back to the source,is also updated to be no less than the current time plus

    active route timeout. Since the mesh network is nearly a

    static network, the active route timeout is set to default

    value of three seconds. In other words, on-demandroutes if not used for three seconds will be invalidated.

    After three seconds, the source, the destination, and

    the intermediate nodes along the on-demand route willbe deleted their corresponding entry of the route table.

    For simplicity, a RERR message is generated to trigger

    the on-demand route in the proposed protocol.

    5.5 Optimization and maintenance

    In the proposed protocol, the root can provide the opti-

    mum route information for all source-destination pairs,

    but it requires additional control overhead to piggy-back the neighbor information of the nodes. Moreover,

    the root periodically needed to update the neighbor

    information that was piggybacked by the nodes in or-der to cope with the dynamic network changes. To

    reduce the control overhead, after the first piggybacked

    neighbor information, we recommend that upon re-

    ceiving each consecutive broadcasted RANN message

    from the root, every node replies the RREP message

    without piggybacking the neighbor information whenthe topology is unchanged. We restrict piggybacking

    the neighbor information in the RREP message only

    when the changes of the metric between a node and its

    neighbor nodes occurs. A part of the route optimizationand maintenance for the proposed protocol is quite

    similar to the TBR protocol.

    5.6 Link breaks

    A link between two nodes is not stable due to node

    movement and other restrictions. Since the networktopology is dynamically changed with respect to time,

    the root needs to maintain its topology table by send-

    ing the RANN with every maintenance interval. Forthe TBR protocol, it can provide good reliability and

    low latency through frequent dissemination of routing

    information, but it entails high control overhead andscales poorly with the increasing number of nodes.

    If the parent node is lost, the child node checks its

    cached route table and selects a new parent node (if

    any) by unicasting a RREP destined to the root viathe selected parent node. Figure 9a shows the link of

    linkbreak

    Recovery

    Mechanism

    a A new proactive link is built using RREP

    newlink

    RREP

    Root

    Wired Network Wired Network

    b F initiates new RREQ and sends it to ROOT

    DE

    G H

    B

    F

    C

    AR

    I

    DE

    G H

    B

    F

    C

    AR

    I

    DATA

    RERR

    Wired Network Wired Network

    on-demand linkproactive link

    linkbreak

    DE

    G H

    B

    F

    C

    A

    R

    I

    DE

    G H

    B

    F

    C

    A

    R

    I

    RERR

    RREQDATA

    DATA

    source

    destination

    sourcedestination

    Figure 9 a Repair of a broken tree link. b Heal of a broken on-demand link

  • 7/29/2019 A Hybrid Centralized Routing Protocol

    9/15

    Mobile Netw Appl (2008) 13:117131 125

    a child node (D) and a parent node (A) broken and

    a new link is built. For the proposed protocol, there

    is no additional mechanism is needed to re-establish

    the optimum route for an ongoing traffic transmissionof a source-destination pair when an active link of

    the optimum route is broken. Once the intermediate

    node detected an active link is broken for the next

    hop of an on-demand active route in its route tablewhile transmitting data, it sends a RERR message to

    the source node along the optimum route. For any

    intermediate node that receiving the RERR message,it deletes the corresponding entry of the on-demand

    route in its own route table. However, the source node

    stop sending its traffic transmission along the optimumroute and generates new RREQ for hoping to look

    for another recommended route information from the

    root. Figure 9a and b show a repair of a broken tree linkand a heal of a broken on-demand link, respectively.

    6 Evaluation studies

    We investigate the performance of the proposed pro-

    tocol over the TBR protocol by using analysis and

    simulation. Both results are explained accordingly inthe subsection.

    6.1 Overhead analysis

    In this section, we analyze the overhead of the pro-posed RDR protocol over the TBR protocol. First, we

    define a group of notations for the overhead analysis

    as listed in Table 1. The TBR and RDR protocolsperiodically broadcast a RANN message, in which the

    size of RANN message can be expressed as

    SBRANN= 20 (1)

    where B denotes that the RANN is a broadcast mes-

    sage. Upon receiving the RANN message, each node

    replies a RREP message when the TBR protocol is

    applied. Thus, the size of RREP message can be ex-pressed as

    SURREP= 28 (2)

    where U denotes that the RREP is an unicast message.

    On the other hand, each node replies a RREP mes-sage with neighbor information when the RDR proto-

    col is performed. Therefore, the size of RREP message

    that used for the RDR protocol can be expressed as

    SURRNI = 28+ 8n (3)

    where n is the number of neighbor MPs that excluding

    parent MP and child MPs. In RDR protocol, a source

    node that wants to communicate with a destinationnode needs an additional RREQ message to trigger

    the root to recommend an optimum route. The size ofRREQ message is given by

    SURREQ = 24 (4)

    Upon receiving the RREQ message, the root uses a

    RSET message to notify a destination node. Upon

    receiving the RSET message, the destination node usesa RNTF message to notify the intermediate nodes in

    order to establish the optimum route for the corre-

    sponding source node. The size of RSET and RNTFmessages is given by

    SU

    RSET= SU

    RNTF= 11+ 4m (5)

    where m is the number of notifying MPs.

    In this analysis, the mobility of MPs is not taken

    into account in order to simplify our calculation. Thus,we can assume that the RERR message will not be

    generated in both protocols.

    Table 1 Notations that usedfor overhead analysis Notation Description [unit]

    SBRANN

    RANN size [byte]

    SURREP RREP size [byte]

    SURRNI RREP size with neighbor information [byte]

    SURREQ RREQ size [byte]

    SURSET

    RSET size [byte]

    SURNTF RNTF size [byte]

    HMP,MP P Average number of hops between MPP and MP [no unit]

    HMP,MP Average number of hops between MPs [no unit]

    NB Number of broadcasted transmissions [no unit]

    NF Number of traffic flows [no unit]

    NMP Number of MPs [no unit]

    TRANN RANN broadcast interval [second]

  • 7/29/2019 A Hybrid Centralized Routing Protocol

    10/15

    126 Mobile Netw Appl (2008) 13:117131

    0.00

    0.01

    0.02

    0.03

    0.04

    0.05

    0.06

    2 4 6 8 10 12 14 16

    Number of traffic flows

    Routingo

    verhead(%) TBR

    RDR

    Figure 10 Routing overhead as a function of number of trafficflows

    Next, we consider that the number of traffic flows as

    NF. Let HMP,MP P and HMP,MP be the average number

    of hops between MPP and MP, and the average numberof hops between MPs, respectively. In this paper, these

    value are derived by averaging a few hundred topolo-

    gies with MPs are placed randomly and uniformly.Under these assumptions, the total control overhead

    for both protocols can be derived as follow:

    The total control message of TBR protocol is

    given by

    CT BR =

    SBRANNTRANN

    NB +

    SURREPTRANN

    NM PHMP,MP P

    (6)

    However, the total control message of RDR protocolis given by

    CRD R =

    SBRANNTRANN

    NB +

    SURRNI

    TRANN

    NMPHM P,MP P

    +

    SURREQ HMP,M PP+ S

    URSETHMP,MP P

    + SURNTFHMP,MP

    NF (7)

    In our numerical analysis, we assume that NMP is 32

    and TRANN is five seconds. We obtain the HMP,MP Pand HMP,MP by averaging 1000 topologies with 32MPs are placed randomly and uniformly. The round-off

    value of HM P,M PP and HMP,MP is 5 and 3, respectively.

    To observe the intra-mesh traffic effect on the routingoverhead, we vary the number of traffic flows. Each

    traffic flow consists of 160-byte frame size, which sends

    at the rate of 50 packets per second. We plot the routing

    overhead as a function of the number of traffic flows.

    The routing overhead is obtained as below:

    RoutingOverhead =CinBytes

    CinBytes + DinBytes(8)

    where CinBytes is the total number of control bytes trans-

    mitted and DinBytes is the total number of data bytesreceived.

    Figure 10 shows the routing overhead as a function

    of number of traffic flows. It is seen that as the num-

    ber of traffic flows increases, the routing overhead of

    both protocols decreases rapidly. When the number oftraffic flows is 2, the routing overhead of TBR protocol

    and proposed protocol is about 0.030% and 0.057%,

    respectively. The difference becomes less when thenumber of traffic flows becomes larger. For example,

    the percentage difference of 16 traffic flows between

    two protocols is 0.015%.

    6.2 Numerical simulations

    In this section, we investigate the performance of the

    RDR protocol over the TBR protocol with the OPNET11.5 simulator [12] assuming in the WMN environment.

    In our simulation, all the nodes that included one

    root are confined to a 100 100 m2 area. The root islocated in the top-left corner of the simulation area

    whereas other nodes are placed randomly and distrib-

    utedly. Other parameters are summarized in Table 2.

    We model our traffic based on voice over internet pro-tocol (VoIP). In the simulations a bidirectional VoIP

    traffic is sent, one flow from source node to destination

    Table 2 Simulation parameters

    Parameter Value

    Network simulator OPNET 11.5

    Physical characteristic IEEE 802.11a OFDM

    MAC protocol CSMA/CA

    Network coverage area 100 100 m

    Simulation time 100 sTransmission range 50 m

    Transmission bit rate 54 Mbps

    RANN broadcast interval 3 s

    RREP pre-defined time 1 s

    Mobility model Random waypoint

    Pause time 0 s

    Queue size 50 packets

    Codec scheme for VoIP G.711

    Voice offered rate 64 kbps (50 pkts/s)

    Voice frame size 160 bytes

  • 7/29/2019 A Hybrid Centralized Routing Protocol

    11/15

    Mobile Netw Appl (2008) 13:117131 127

    node and another flow vice versa. All source nodes are

    pre-selected and all corresponding destination nodes

    are chosen randomly in the network. The VoIP traffic

    consists of 160-byte frame size, which sends at the rateof 50 packets per second. A G.711 encoder/decoder is

    applied to the VoIP flows. When the mobility is taken

    into account in the network, only the root is static and

    the entire node is moving based on random waypointmodel, where the nodes direction is random, and the

    node speed is similar to human walking speed (1 m/s)

    with the pause time is zero seconds. For comparisonpurposes, the simulation time is 120 seconds and ten

    scenarios with different tree-path are averaged. Our

    simulation can be divided into two simulations. In thefirst simulation, we investigate the impact of increasing

    traffic flow on protocol performance. The number of

    nodes is fixed at 50. The number of traffic flows is variedfrom 10 flows to 50 flows in steps of 10 flows. In the

    second simulation, we focus on the influence of the

    number of nodes on the performance of both routingprotocols. The number of traffic flows is fixed at 40flows. The number of nodes is varied from 20100 in

    increment of 20.

    6.3 Comparison of packet delivery ratio

    Figures 11 and 12 show how packet delivery ratio varies

    with number of traffic flows and the number of nodes,

    respectively. Packet delivery ratio is the ratio of total

    number of packets received at the destinations over

    the total number of packets transmitted by the sources.As both number of traffic flows and number of nodes

    increase, the superiority of the RDR protocol over the

    0

    20

    40

    60

    80

    100

    10 20 30 40 50

    Number of traffic flows

    Packetdeliveryratio(%)

    TBR (0 m/s)TBR (1 m/s)

    RDR (0 m/s)RDR (1 m/s)

    Figure 11 Packet delivery ratio as a function of number of trafficflows (50 nodes)

    0

    20

    40

    60

    80

    100

    20 40 60 80 100

    Number of nodes

    Packetdeliveryratio(%)

    TBR (0 m/s)TBR (1 m/s)

    RDR (0 m/s)RDR (1 m/s)

    Figure 12 Packet delivery ratio as a function of number of nodes(40 flows with 50 packets/second)

    TBR protocol becomes very obvious. This is shown that

    traffic around the root of the tree-topology becomessignificantly less when the proposed protocol is used.

    This leads to the fact that the number of packet drops

    due to packet collision and buffer overflow reduceslargely as well as a decrement of packet processing and

    forwarding at the root. In the static network, only the

    RDR protocol always manages to deliver the packetswith a reliability greater than 98%. When nodes are

    moving, both protocols experienced the packet delivery

    drops below 55%. The reason is that a large number of

    packet drops due to many broken links occurred in thenetwork.

    6.4 Comparison of average end-to-end delay

    Average end-to-end delay is the average elapsed time

    to deliver a packet from the source to the destination,and it includes all possible delays before data packets

    arrive at their destinations. Figures 13 and 14 show

    how average end-to-end varies with number of trafficflows and the number of nodes, respectively. As both

    number of traffic flows and number of nodes increase,

    the average end-to-end delay of the RDR protocol isabout three to four times smaller than the TBR pro-

    tocol when nodes are static. This is because the RDR

    protocol yields smaller delays in routing the data mes-

    sages with the best-metric route that recommended bythe root, resulting in the decrement packet contention

    and number of transmissions, which leads to low end-

    to-end delay. When nodes are moving, both protocolsexperienced the average end-to-end delay more than

    400 ms.

  • 7/29/2019 A Hybrid Centralized Routing Protocol

    12/15

    128 Mobile Netw Appl (2008) 13:117131

    0

    0.2

    0.4

    0.6

    0.8

    1

    10 20 30 40 50

    Number of traffic flows

    Averageend-to-enddelay(s)

    TBR (0 m/s)TBR (1 m/s)

    RDR (0 m/s)RDR (1 m/s)

    Figure 13 Average end-to-end delay as a function of number oftraffic flows (50 nodes)

    6.5 Comparison of routing overhead

    The routing overhead describes how many routing mes-

    sages for route discovery and route maintenance need

    to be sent in order to propagate the data messages.In this paper, the routing overhead is obtained from

    Eq. 8. In the RDR protocol, the additional of control

    bytes accounts for RSET and RNTF messages as wellas the piggybacked neighbor information of the nodes

    in the RREP message. However, the routing overhead

    remains fair when the number of traffic flows increases,because the number of control bytes transmitted is al-

    most constant without change with the increasing trafficflow. We can see from Figs. 15 and 16 that the routing

    overheads of TBR protocol and RDR protocol become

    0

    0.2

    0.4

    0.6

    0.8

    1

    20 40 60 80 100

    Number of nodes

    Averageend-to

    -enddelay(s) TBR (0 m/s)

    TBR (1 m/s)

    RDR (0 m/s)RDR (1 m/s)

    Figure 14 Average end-to-end delay as a function of number ofnodes (40 flows with 50 packets/second)

    0

    6

    12

    18

    10 20 30 40 50

    Number of traffic flows

    Routingo

    verhead(%)

    TBR (0 m/s)TBR (1 m/s)

    RDR (0 m/s)RDR (1 m/s)

    Figure 15 Routing overhead as a function of number of trafficflows (50 nodes)

    very close with each others as the number of trafficflows becomes large or as the number of nodes becomesless. However, simulation results show that when nodes

    are moving, the routing overhead for both protocols

    is about twice as large as that of the routing overhead

    when the network is static.

    6.6 Discussion on voice quality of VoIP

    In the previous section, we adopt the VoIP traffic

    model and evaluate the average end-to-end delay and

    the packet delivery ratio of the WMN environment

    by using the TBR protocol and the RDR protocol. Inorder to justify the transmission quality of the VoIP

    traffic in our simulations, we use the requirements that

    0

    6

    12

    18

    20 40 60 80 100

    Number of nodes

    Routingoverhead(%)

    TBR (0 m/s)TBR (1 m/s)

    RDR (0 m/s)RDR (1 m/s)

    Figure 16 Routing overhead as a function of number of nodes(40 flows with 50 packets/second)

  • 7/29/2019 A Hybrid Centralized Routing Protocol

    13/15

    Mobile Netw Appl (2008) 13:117131 129

    is proposed by [13]. In [13], they determine that class

    A requires less than 100 ms of average end-to-end

    delay and more than 97% of packet delivery ratio,

    defining the speech quality for the fixed phone services.However, class B requires less than 150 ms of average

    end-to-end delay and more than 94% of packet delivery

    ratio, defining the speech quality for mobile phones

    services. Based on the Figs. 11 and 13, we conclude thatwhen all nodes are static the TBR protocol can support

    only 22 flows, and 24 flows when the number of nodes

    is 50 for class A and class B voice quality, respectively.On the other hand, under the same conditions the

    RDR protocol can support more than 50 flows for both

    class A and class B voice quality. The RDR protocol,therefore, is efficient and effective for practical voice

    applications such as VoIP service.

    6.7 The effect of intra-mesh traffic ratio inside

    the WMN

    In our previous results, all the traffic between nodes

    in the WMN are assumed to be the intra-mesh traffic.Besides the intra-mesh traffic, the traffic between a

    node in the WMN and a node on the wired networks

    is mainly originated within the mesh network. For fairevaluation, we further examine the performance of the

    RDR protocol over the TBR protocol when the intra-

    mesh traffic ratio is increased from 0% to 100%. The

    intra-mesh traffic ratio is calculated as the number ofintra-mesh traffic flows over the total number of user

    traffic flows. For example, the intra-mesh traffic ratio

    is 20%. This means that the percentage of intra-meshtraffic is 20% and the rest of the percentage, i.e., 80% is

    the inter-mesh traffic. We run the simulations with the

    rest of the parameters is the same except the number

    0

    1

    2

    3

    4

    0 20 40 60 80 100

    Intra-mesh traffic ratio (%)

    Throughput(Mbps)

    TBR

    RDR

    Figure 17 Throughput as a function of intra-mesh traffic ratio

    of nodes is 50 and 10 simulation scenarios with differ-

    ent random seeds are averaged. Figure 17 shows the

    throughput as a function of intra-mesh traffic ratio. The

    throughput is the average total number of data bytesreceived at the destinations over the total simulation

    time. Our evaluation reveals that when the intra-mesh

    traffic ratio is below 20%, the RDR protocol obtains

    approximately the same throughput compared to theTBR protocol. We can see that the RDR protocol

    outperforms the TBR protocol when the intra-mesh

    traffic ratio is more than 20%. We conclude that inorder to assure the best network performance, the TBR

    protocol can be used for inter-mesh traffic whereas the

    RDR protocol can be used for intra-mesh traffic.

    7 Concluding remarks

    In this paper, we proposed the RDR protocol to solvethe traffic concentration around the root when the TBR

    protocol is used for the intra-mesh traffic in the WMNs.

    The RDR protocol provides the optimum route bythe root for any source-destination pair of intra-mesh

    traffic. The RDR protocol advantageously improves

    the network performance without incurring any severeimpact on the operation of TBR protocol. In order to

    accomplish the best network performance, the TBR

    protocol can be used for inter-mesh traffic whereas the

    RDR protocol can be used for intra-mesh traffic. Thesetwo protocols are potentially fused into one stack pro-

    tocol, called a hybrid centralized routing protocol thatadaptively handles all traffic scenarios in the WMNs.

    Numerical simulations reveal that the RDR protocol

    is very beneficial and outperforms the TBR protocol

    with much lower average end-to-end delay and muchhigher packet delivery ratio for the intra-mesh traffic.

    Furthermore, our simulation results show that when all

    nodes are static the TBR protocol can support only 22

    traffic flows when the number of nodes is 50 for class Avoice quality, whereas the RDR protocol attains more

    than 50 traffic flows. Our simulation results are very

    encouraging and we currently focus on examining the

    multiple root broadcast trees issue for the WMNs.

    References

    1. Raniwala A, Chiueh TC (2005) Architecture and algorithmsfor an IEEE 802.11-based multi-channel wireless mesh net-work. In: Proc. IEEE INFOCOM conf. IEEE, Piscataway,pp 22232234

    2. IEEE (2007) Amendment: Mesh networking. IEEEP802.11s/D1.06. IEEE, Piscataway

  • 7/29/2019 A Hybrid Centralized Routing Protocol

    14/15

    130 Mobile Netw Appl (2008) 13:117131

    3. Akyildiz IF, Wang X, Wang W (2005) Wireless mesh net-work: a survey. Comput Netw 47(4):445487

    4. IEEE (1999) Part II: Wireless LAN medium access control(MAC) and physical layer (PHY) specifications, ANSI/IEEEStandard 802.11-1999. IEEE, Piscataway

    5. Juttner A, Magi A (2005) Tree based broadcast in ad hocnetworks. Mob Netw Appl 10(5):753762

    6. Chlamtac I, Kutten S (1987) Tree-based broadcasting inmultihop radio networks. IEEE Trans Comput C-36(10):12091223

    7. Ogier R, Templin F, Lewis M (2004) Topology dissemina-tion based on reverse-path forwarding (TBRPF). RFC 3684.IETF, Fremont

    8. Dalal YK, Metcalfe RM (1978) Reverse path forwarding ofbroadcast packets. Commun ACM 21:10401048

    9. Royer E, Perkins C (1999) Multicast operation of the adhoc on-demand distance vector routing protocol. In: Proc.mobicom conf., Seattle, 19 August 1999

    10. Perkins C, Royer E, Das S (2003) Ad hoc on-demand dis-tance vector (AODV) routing. RFC 3561. IETF, Fremont

    11. IEEE (2004) Medium access control (MAC) bridges, IEEEStandard 802.1D-2004. IEEE, Piscataway

    12. OPNET (2008) OPNET Simulator. http://www.opnet.com/

    13. Szigeti T, Hattingh C (2005) End-to-end QoS network de-sign: quality of service in LANs, WANs, and VPNs. Cisco,Indianapolis

    Azman Osman Lim received the B.Eng. (Hons) and M.Inf. Tech-nology degrees from Universiti Malaysia Sarawak (UNIMAS),Malaysia in 1998 and 2000, respectively. He received the Ph.D.degree in communications and computer engineering from KyotoUniversity in 2005. Currently, he is an expert researcher atNational Institute of Information and Communications Tech-nology (NICT), Japan, where he is one of the researchersinvolving energetically in new era of communication, calledtwo-dimensional communication system. He was a visiting re-searcher at Fudan University in China for two months before

    he joined NICT in 2005. Since 2005, he is actively joining thestandardization activities of IEEE 802.11s Mesh Networking.Since 2006, he is also joining the standardization activities of next-generation home networks from Telecommunication TechnologyCommittee (TTC), Japan. In April 2007, he obtained a Grant-in-Aid for Scientific Research from the Ministry of Education,Culture, Sports, Science and Technology (MEXT) for threeyears. His research interests include the congestion control andmanagement of ATM networks, multihop wireless networks,wireless mesh networks, wireless sensor networks, heteroge-neous wireless networks, two-dimensional communication sys-tem, game theory, and capacity theory. He is a member of IEEEand IEICE.

    Xudong Wang received his B.E. degree in Electric Engineeringand his Ph.D. degree in Automatic Control in 1992 and 1997,respectively, from Shanghai Jiao Tong University, Shanghai,P. R. China. In August 2003, he also received a Ph.D. degreein Electrical and Computer Engineering from Georgia Instituteof Technology. Currently, he is the R&D manager at Kiyon,Inc., where he leads research and development of wireless meshnetworking technologies. He was a senior network architect andresearcher in the same company. He is the creator of Kiyons pi-oneering single-channel and multi-channel TDMA technologiesfor wireless mesh networks. His research interests also includecognitive/software radios, cross-layer design, and communicationprotocols for cellular networks, mobile ad hoc networks, sensornetworks, and ultra-wideband networks. He holds a numberof patents on wireless networking technologies and most ofhis inventions have been successfully transferred to products.Dr. Wang is an editor for Elsevier Ad Hoc Networks and wasalso a guest editor for several journals. He was the demo co-chair of the ACM International Symposium on Mobile Ad HocNetworking and Computing (ACM MOBIHOC 2006). Currentlyhe is a technical program co-chair of Wireless Internet Confer-ence (WICON) 2007. He has been a technical committee member

    http://www.opnet.com/http://www.opnet.com/
  • 7/29/2019 A Hybrid Centralized Routing Protocol

    15/15

    Mobile Netw Appl (2008) 13:117131 131

    of many international conferences and a technical reviewer fornumerous international journals and conferences. Dr. Wang is amember of IEEE, ACM, and ACM SIGMOBILE and a votingmember of IEEE 802.11 and 802.15 Standard Committees.

    Youiti Kado received the B.Litt. degree from Kyoto Universityin 1992. He received the M.Eng. degree from Nara AdvancedInstitute of Science and Technology in 1995. He was an employeeat Oki Electric Industry Co., Ltd., Japan for eleven years beforehe joined Knowledge Creating Communication Research Center,NICT, Japan in 2005. His research interests include the wire-less mesh and sensor networks, ATM networks, and knowledgeprocessing.

    Bing Zhang received her B.S. degree in 1983 from PekingAeronautics and Astronautics University, China, and M.S. in1987 and Ph.D. degrees in 1990 from Hiroshima University,Japan. From 1991 she has been working at the CommunicationResearch Laboratory of Japan Ministry of Posts and Telecom-munications (presently, National Institute of Information andCommunications Technology), as a senior researcher. During1995-1996, she was a post-doctoral research associate in the

    University of Tennessee. From 2000 to 2004, she was with ATRAdaptive Communications Research Laboratories as a senior re-searcher. She is an editor for IEICE, and was a TPC member forVTC2007 (IEEE 66th Vehicular Technology Conference). Hercurrent research interests include wireless mesh networks, sensornetworks, ubiquitous computing systems and two-dimensionalcommunication system. She is a member of IEEE and IEICE.