Document not found! Please try again

Performance evaluation of scheduling in IEEE ... - Semantic Scholar

32 downloads 8513 Views 952KB Size Report
a Department of Computer Science, University of Maryland, College Park, MD 20742, USA b Department of Computer Science, City ... Available online 2 November 2006. Abstract ...... Lidong Lin received his BSc and MSc degrees in.
Computer Communications 30 (2007) 782–792 www.elsevier.com/locate/comcom

Performance evaluation of scheduling in IEEE 802.16 based wireless mesh networks Bo Han b

a,*

, Weijia Jia b, Lidong Lin

b

a Department of Computer Science, University of Maryland, College Park, MD 20742, USA Department of Computer Science, City University of Hong Kong, 83 Tat Chee Avenue, Kowloon, Hong Kong

Received 2 May 2006; accepted 4 October 2006 Available online 2 November 2006

Abstract IEEE 802.16 employs TDMA (Time Division Multiple Access) as the access method and the policy for selecting scheduled links in a given time slot will definitely impact the system performance. We propose a collision-free centralized scheduling algorithm for IEEE 802.16 based Wireless Mesh Networks (WMN) to provide high-quality wireless multimedia services. We design a relay strategy for the mesh nodes in a transmission tree, taking special considerations on fairness, channel utilization and transmission delay. We evaluated the proposed algorithm with four selection criteria through extensive simulations and the experimental results are instrumental for improving the performance of IEEE 802.16 based WMNs in terms of link scheduling. To the best of the authors’ knowledge, this work is the first one on the centralized scheduling for IEEE 802.16 mesh mode that considers the relay model.  2006 Elsevier B.V. All rights reserved. Keywords: Wireless mesh networks; Wireless access networks; IEEE 802.16; Link scheduling; Relay model

1. Introduction The rapid growth of high-speed multimedia services for residential and small business customers has created an increasing demand for last mile broadband access. Traditional broadband access is offered through digital subscriber line (xDSL), cable or T1 networks. Each of these techniques has different cost, performance, and deployment trade-offs. While cable and DSL are already being deployed on a large scale, Fix Broadband Wireless Access (FBWA) systems [1,2] are gaining extensive acceptance for wireless multimedia services with several advantages. These include avoiding distance limitations of DSL, rapid deployment, lower maintenance and upgrade costs, and granular investment to match market growth [2]. Study group 802.16 has been formed under IEEE Project 802 to recom-

*

Corresponding author. Tel.: +1 301 405 2724; fax: +1 301 405 6707. E-mail addresses: [email protected] (B. Han), [email protected] (W. Jia), [email protected] (L. Lin). 0140-3664/$ - see front matter  2006 Elsevier B.V. All rights reserved. doi:10.1016/j.comcom.2006.10.001

mend an air interface for FBWA systems that can support multimedia services [3]. Compared with traditional wireless ad hoc networks, wireless mesh networks have the following distinct features [4,5]. First, wireless mesh networks are not isolated selfconfigured networks and emerge as a flexible and low-cost extension of existing wired infrastructure networks. Generally, WMNs serve as access networks that employ multihop forwarding to relay traffic. Power consumption is not a primary concern in such an environment because the mesh nodes are fixed and wire-powered. Mostly involved communication is to and from wired gateway (Base Station), rather than between pairs of end-nodes. Moreover, nodes in a mesh network are either stationary or minimally mobile. Thus, contrary to routing in mobile ad hoc networks, the links in WMNs have much longer duration times. At last, most applications of WMNs are broadband services with various QoS requirements [4]. In IEEE 802.16 protocol stack, the medium access control layer (MAC) supports both point-to-multipoint (P2MP) mode and mesh (multipoint-to-multipoint) mode.

B. Han et al. / Computer Communications 30 (2007) 782–792

In the mesh mode, scheduling is one of the most important problems that will impact the system performance. A scheduling is a sequence of fixed-length time slots, where each possible transmission is assigned a time slot in such a way that the transmissions assigned to the same time slot do not collide. Generally, there are two kinds of scheduling – broadcast and link. In a broadcast scheduling, the entities scheduled are the nodes themselves. The transmission of a node is intended for, and must be received collision-free by all of its neighbors. While in a link scheduling, the links between nodes are scheduled. The transmission of a node is intended for a particular neighbor, and it is required that there be no collision at this receiver. We proposed a collision-free centralized scheduling algorithm which is conformed to the defined mesh mode in IEEE 802.16 standard. Compared with existing scheduling algorithms, the proposed scheme considers some distinct features of WMNs, such as the function of access networks and the inherent relay model. Moreover, this scheduling algorithm also considers some important performance metrics, such as fairness, channel utilization and transmission delay. The experimental results are instrumental for improving the performance of IEEE 802.16 based WMNs in terms of link scheduling. The remainder of this paper is organized as follows. Section 2 introduces some related work. The centralized scheduling mechanism for IEEE 802.16 mesh mode is described in Section 3. In Section 4 our centralized scheduling algorithm for IEEE 802.16 mesh mode is proposed. We discuss the construction of scheduling tree and buffer management policy in Section 5. Section 6 presents performance evaluation and Section 7 contains some conclusion remarks. 2. Related work Several IEEE special task groups have been established to define the requirements for mesh networking in wireless personal area networks (WPANs), wireless local area networks (WLANs) and wireless metropolitan area networks (WMANs). Although at different degrees of maturity, the following emerging standards have been identified: IEEE 802.11s, IEEE 802.15.5, IEEE 802.16a, and IEEE 802.20. A brief introduction of these open standards can be found in [5]. Most of the existing researches about WMNs are based on IEEE 802.11 standard [6–11]. Kyasanur and Vaidya studied the problem of improving the capacity of multichannel wireless networks by using multiple interfaces [6]. Aguayo et al. analyzed the causes of packet loss in a 38node urban multi-hop 802.11b mesh network [7]. Raniwala and Chiueh proposed a multi-channel WMN architecture that equips each mesh network node with multiple 802.11 network interface cards [8]. Draves et al. presented a new metric, which is a function of the loss rate and the bandwidth of the link, for routing in multi-radio multi-hop wireless mesh networks [9]. Gambiroza et al. studied fairness and end-to-end performance in multi-hop wireless back-

783

haul networks through a formal reference model and an extensive set of simulation experiments [10]. Tang et al. studied interference-aware topology control and QoS routing in IEEE 802.11-based multi-channel wireless mesh networks with dynamic traffic [11]. Little work has been done about IEEE 802.16 based wireless mesh networks. Wei et al. adopted an interference-aware cross-layer design to increase the throughput of 802.16 WMN [12]. Cao et al. developed a stochastic model for the distributed scheduler of IEEE 802.16 mesh mode [13]. The general scheduling problem has been extensively studied in Packet Radio Network (PRNET) [14–22]. The work in [14] is mainly about the capacity region of a PRNET which is defined as the set of all origin-to-destination (o-d) message rates that are achievable via any arbitrary protocol. The author showed that the problem of determining whether a given point belongs to the capacity region of a PRNET is NP-Hard. Nelson and Kleinrock defined a channel access protocol for a PRNET in which the locations of the nodes of the network were assumed to be fixed and known [15]. Two polynomial time algorithms were proposed for link scheduling in a spread spectrum radio network [16]. Cidon and Sidi introduced new distributed dynamic channel assignment algorithms for a multihop PRNET [17]. The basic idea of the algorithms is to split the shared channel into a control segment and a transmission segment. Ephremides and Truong provided a comprehensive study of scheduling broadcast transmissions in a multihop, mobile PRNET [18]. Chou and Li derived an upper bound of the minimum TDMA frame length of any collision-free node assignment protocol in a PRNET in which a node had multiple reception capacity [19]. Ramanathan and Lloyd considered both link and broadcast scheduling in multi-hop PRNETs [20]. In each instance, scheduling algorithms were given that improved upon existing algorithms both theoretically and experimentally. Gronkvist compared broadcast and link scheduling and determined which one was preferable [21]. He showed that only the connectivity of the network and the input traffic load of the network were needed in order to determine whether broadcast or link scheduling was preferable. Bjorklund et al. developed mathematical programming formulations for resource optimization for both broadcast and link scheduling [22]. They further presented a column generation approach which constantly yielded an optimal or near-optimal solutions in numerical experiments. However, no extensive experimental study or only very simple experiment was given in these existing literatures. Scheduling algorithm is also an important research topic in traditional ad hoc networks and Bluetooth scatternets. Ra´cz et al. proposed a pseudo-random coordinated scatternet scheduling algorithm to perform the scheduling of both intra and inter-piconet communication in Bluetooth networks [23]. Kim et al. presented two versions of QoS-aware scheduling algorithms: a perfect assignment algorithm for bipartite scatternet and a distributed localized algorithm

784

B. Han et al. / Computer Communications 30 (2007) 782–792

[24]. Salonidis and Tassiulas presented a framework for the provision of deterministic end-to-end bandwidth guarantees in wireless ad hoc networks [25]. This framework did not require any a priori knowledge on the number of nodes in the network nor even network-wide slot synchronization. Recently, two centralized scheduling algorithm were proposed for WMN [26,27]. However, none of them consider the relay model which is very important in WMN. Several research works also have been done to make wireless ad hoc networks take the role of access networks. Hsiao et al. described a distributed routing algorithm that performed dynamic load-balancing for wireless access networks [28]. Bejerano considered the problem of designing an efficient and low-cost infrastructure for connecting static multi-hop wireless networks with wired backbone, while ensuring QoS requirements such as bandwidth and delay [29]. To the best of our knowledge, no research work has been proposed to address the centralized scheduling in IEEE 802.16 based WMNs that considers the relay model. 3. Background on IEEE 802.16 mesh mode In IEEE 802.16 P2MP operation, wireless links operate among a central Base Station (BS) and a set of Subscriber Stations (SSs). The BS is the only transmitter operating in the downlink (from BS to SS), so it transmits without having to coordinate with other stations. Subscriber stations share the uplink to the BS on a demand basis. Whereas in the mesh mode, all nodes are organized in an ad hoc fashion, each node can relay traffic for others and QoS is provisioned on a packet-by-packet basis. A system that has a direct connection to backhaul services outside the mesh network is termed the Mesh BS. All the other systems of a mesh network are termed Mesh SSs. Uplinks and downlinks are defined as the directions to and from the Mesh BS, respectively. Mesh differs from P2MP mode in that in the mesh mode, traffic can be routed through other Mesh SSs and can occur directly between the Mesh SSs, whereas in the P2MP mode, traffic only occurs between the BS and SSs. Moreover, unlike P2MP mode, the mesh mode only supports Time Division Duplex (TDD) for uplink and downlink traffic [3]. For the transmission, several SSs share the wireless channel in a TDMA fashion. In what follows, unless specified otherwise, we will refer to BS and SS as Mesh BS and Mesh SS, respectively. And we will use the terms SS and node interchangeably. A new SS, say u, entering IEEE 802.16 based WMN obeys the following procedures. At first u scans for MSH-NCFG (Mesh Network Configuration) messages to establish coarse synchronization with the network (the cost of synchronization phase is beyond the scope of this paper). Then u shall build a physical neighbor list from the acquired information. From this list, u selects a Sponsoring Node (SN) according to some policy. A sponsoring node is defined as a neighboring node that relays MAC messages to and from the BS for u. Namely, it is an

upstream node that is closer the BS. Registration is the process where u is assigned its node ID. After entering the network, a node can also establish links with other nodes. Fig. 1 gives an example of network topology which is composed of one BS and 11 SSs. There is a link between two SSs if they are within the transmission range of each other. Fig. 2 shows the corresponding scheduling tree (or called transmission tree) that only contains the transmission links between a node and its SN. We define the omitted links in Fig. 2 (compared with Fig. 1) as interference links. BS will periodically broadcast MSH-CSCF (Mesh Centralized Scheduling Configuration) messages that include the complete topology of scheduling tree to the nodes. Due to the centralized nature of the scheduling algorithm, there is no hidden terminal problem here. In IEEE 802.16 based WMNs, communications going through all the transmission links shall be controlled by a scheduling algorithm. There are three kinds of scheduling in IEEE 802.16 mesh mode: centralized, coordinated distributed and uncoordinated distributed scheduling. We will brief the general idea of centralized scheduling (the focus of this paper) below. For distributed scheduling, we refer interested readers to [3]. Using centralized scheduling, the BS shall gather traffic demands through MSH-CSCH (Mesh Centralized Scheduling) messages from all the SSs within a certain hop range and communicates the information to all the SSs. Subsequently, the SSs determine their own transmission opportunities in a distributed fashion, using a common predetermined algorithm with the same input information. Therefore, the outputs are the same for all these SSs. The SSs will let the BS know their changes of traffic demands through MSH-CSCH messages. Then the BS will

Fig. 1. Network topology.

Fig. 2. Scheduling tree.

B. Han et al. / Computer Communications 30 (2007) 782–792

785

rebroadcast the adjusted traffic demands and the SSs can recalculate their transmission opportunities. To quote IEEE 802.16 standard [3], the advantage of centralized scheduling is that ‘‘it is typically used in a more optimal manner than distributed scheduling for traffic streams, which persist over a duration that is greater than the cycle time to relay the new resource requests and distribute the updated schedule’’. However, the detail of this centralized algorithm is not defined in IEEE 802.16 standard. 4. Our scheduling scheme 4.1. Problem definitions and modeling As mentioned above, the considered traffic in IEEE 802.16 based WMNs is mainly to and from the BS, thus we focus on link scheduling in this paper. In IEEE 802.16 mesh mode, the underlying TDMA communication is structured into frames, each composes of several equal duration time slots. Therefore, in this TDMA based scheduling scheme we make a considerable effort at maximizing the spatial reuse of the available bandwidth while at the same time eliminating the possibility of collision. We define the closed one-hop neighbor set of node u as Nb[u] (u is also in this set) and the set of nodes sponsored by node v as Sons(v). The cycle of a link scheduling is the time needed to transmit all the traffic to/from the BS in the WMN, under certain traffic model. The length of a link scheduling is the number of time slots in the cycle. The cycle keeps repeating until the next scheduling update. The channel utilization ratio (CUR) is defined as the ratio between the number of occupied time slots and the total number of available time slots (the length of scheduling multiplied by the number of nodes). Note that, the resulted CUR is, in fact, the average CUR for all SSs. The average transmission delay is the number of time slots between the time slot when a packet is transmitted by the source SS and the time slot when the same packet arrives at the destination. Suppose a packet is sent out in time slot 2 and arrives to the destination in time slot 7, the transmission delay is then calculated as 5 time slots. Here, we consider the following special scheduling problem: how to assign time slots to transmission links in IEEE 802.16 based WMNs so as (1) to reduce the length of scheduling; (2) to improve the channel utilization ratio and (3) to decrease the transmission delay, subjected to some constraints presented below. In particular, depending on the signaling mechanism, transmissions may collide in two ways in wireless networks: primary and secondary interference [20]. Primary interference occurs when a node has to do more than one thing in a single time slot. The reason for this constraint is that the nodes cannot transmit and receive simultaneously and cannot transmit/receive more than one packet at the same time. Thus, this constraint is also referred to as the transmission/reception constraint. Secondary interference occurs when a receiver R tuned to a particular transmitter T is within the range of another transmitter whose transmis-

Fig. 3. Interference model.

sions, though not intended for R, interfere with the transmissions of T. This constraint is also referred to as the interference-free constraint. We do not explicitly consider non-collision-related channel errors in this paper. We can use the partial topology in Fig. 3 to illustrate the interference model more clearly. In this figure, two nodes that are within the transmission range of each other are connected by a link. The solid lines represent the transmission links in the scheduling tree and the dashed lines represent the interference links. We stress that although there is no traffic transmitted over interference links and these links do not have to be scheduled, they may induce conflicts between transmission links. Suppose the node in the higher part of the figure is closer to the BS and the link from node A to B (uplink) is scheduled in the current time slot. Due to these two kinds of interference, nodes B, C, E, F, N and P cannot transmit through their uplinks in the same time slot. In fact, these interfered nodes can be divided into two groups: (1) Nb[B]–{A}, such as nodes B, C and P and (2) Sons(Nb[A]–{B}), such as nodes E, F and N. For example, if node P is scheduled to transmit to Q, B will receive packets from both A and P. If node N is scheduled to transmit to M, M will receive packets from both A and N. Thus, these transmissions will collide. Note that, in IEEE 802.16 mesh mode, uplinks and downlinks are scheduled separately. In this paper we only describe the scheduling algorithm for uplinks and it can be easily extended to the case of downlinks. 4.2. Transmission-tree scheduling (TTS) algorithm In the proposed algorithm, a SS is assigned service token based on its traffic demand. We use service token to allocate time slots to each link proportionally according to the traffic demand of the link’s transmitter, thus, the fairness is guaranteed (no nodes will be starved). A link can be scheduled only if the service token number of its transmitter is nonzero. Each time after a link is assigned a time slot, the service token of the transmitter is decreased by one and that of the receiver is increased by one. Thus, using the change of service token, we can easily integrate the hop-byhop relay model of WMN into our algorithm.

786

B. Han et al. / Computer Communications 30 (2007) 782–792

Suppose there are totally n SSs and the traffic demand of SSi is tri. Then the service token assigned to SSi will be tokeni = tri/g, where g is the greatest common divisor (GCD) of tr1, tr2, . . .trn. We divide the traffic demands by their GCD to reduce the length of scheduling. For example, if the traffic demands of the SSs are 2Mbps, 8Mbps, 6Mbps and 4Mbps. The service tokens assigned to the SSs will be 1, 4, 3 and 2. Compared with the service token assignment 2, 8, 6 and 4, the length of resulted scheduling is reduced to half. Here, we name the set {tokeni} as ST. Fig. 4 gives the details of the algorithm. Suppose the length of the resulted scheduling is k. The inputs of this algorithm are the scheduling tree T and the service token set ST, and the output is an n · k scheduling matrix S. If node i is scheduled in time slot j, Sij = 1, otherwise, Sij = 0. Initially, all the elements in S are 0. In each round (for the while loop), initially, if the service token of the transmitter of a link is nonzero, this link is marked as available, otherwise, it is marked as idle. An available link satisfied with some selection criterion (to be discussed later) is scheduled in the current time slot. The selected link is marked as scheduled and all the conflicting neighboring links of it are marked as interfered. The service tokens of the transmitter and receiver of this scheduled link are also adjusted. Then, the next scheduled link is selected based on the same rule. The selection is repeated until none of the links are marked as available. The same procedure is repeated until the service tokens of all these SSs are decreased to 0. The implementation of function select_one_link() is determined by different selection criteria. In this paper, we consider four kinds of criteria: random, min interference, nearest to BS (hop count) and farthest to BS. In random selection, each time the scheduled link is selected randomly.

In the min interference selection, the link whose transmitter interferes the minimal number of other SSs is chosen for scheduling. While in the nearest to BS and farthest to BS selections, the link whose transmitter has the minimal or maximal hop count to the BS is scheduled. If two SSs have the same number of interfered neighbors or the same hop count to the BS, we use the node ID to break the tie and choose the SS with the smaller node ID. Note that, when the service token of nodes with smaller ID is decreased to 0, nodes with higher ID will get the chance to be scheduled, thus will not be starved forever. Moreover, the transmission slots assigned to a node is determined by the number of its server tokens. Therefore, when tie occurs, nodes with smaller ID cannot always transmit more frequently than nodes with higher ID. 4.3. Example To illustrate the whole algorithm clearly, Fig. 5 gives two scheduling matrices using farthest to BS (Fig. 5(a)) and nearest to BS (Fig. 5(b)), respectively. The scheduling is based on the WMN shown in Fig. 2 and all the SSs have unified traffic demands. Since the link is directional, in the following, when we say that u is scheduled or marked, it means that the link with transmitter u is scheduled or marked. In farthest to BS scheduling algorithm, since nodes 9, 10 and 11 are all three hops away from the BS, for the first time slot after we use node ID to break the tie, the node with the smallest ID, say node 9, is scheduled first. Nodes 1, 2, 4, 5 and 10 are thus marked as interfered. In the remainder nodes, node 11 is then chosen in the same time slot and nodes 2, 3, 5, 6 and 7 are interfered because of this selection. At last node 8 is also chosen in time slot 1 and nodes 2, 3, 6 and 7 are marked as interfered. Finally,

Fig. 4. Pseudo code for the proposed scheduling algorithm.

B. Han et al. / Computer Communications 30 (2007) 782–792

a

787

b

Fig. 5. Two scheduling matrices.

nodes 8, 9 and 11 are scheduled to transmit in time slot 1. While in nearest to BS scheduling algorithm, for time slot 1, only nodes 1 and 7 are chosen for scheduling. From these two scheduling matrices, we can see that the two scheduling lengths are 19 and 17, respectively. The channel utilization ratio of farthest to BS is 10.5% and that of nearest to BS is 11.8%. Under this situation, the performance of nearest to BS is better than that of farthest to BS. Note that the channel utilization ratio is rather low. In most of the time slots, only one transmission link can be scheduled. 4.4. Performance analysis This subsection analyzes the time complexity of the proposed scheduling algorithm and gives some bounds on the length of scheduling. Proposition 1. Let hopi be the hop count of SSi to BS, the length of scheduling k is at most O(n). Proof. The total number of occupied time Pn slots is Pn token  hop . Thus, we can get k 6 i i i¼1 i¼1 tokeni  hopi . The worst case occurs when there is only one link scheduled in each time slot. As mentioned above, the BS shall gather traffic demands from all the SSs within a certain hop range HRthreshold, therefore hopi 6 HRthreshold. In a real IEEE 802.16 based WMN, the traffic demand of each SS will also have the maximal value which should be a constant. Thus, k 6 O(n). h Proposition 2. The time complexity of the proposed scheduling algorithm is O(n2). Proof. From the pseudo code in Fig. 4, we can see that the proposed algorithm TTS consists of two loops with executions of at most k times and n times respectively. Therefore, the time complexity is O(nk). Based on Proposition 1, we have that k 6 O(n), thus, this proposition is proved. h Proposition 3. The channel utilization ratio CUR = Pn token  hopi /nk, where n is the total number of SSs i i¼1 and k is the length of the scheduling.

The proof of the Proposition 3 is straightforward by the definition of CUR. 5. Discussions 5.1. Construction of scheduling tree The level of a node in the scheduling tree is defined as follows: the level of the BS is assigned to be 0; after a node selects its sponsoring node, it obtains its own level by increasing the level of its SN by 1. That is, the level of a node is its hop count to the BS. During the construction of scheduling tree in IEEE 802.16 mesh mode, nodes will broadcast MSH-NCFG message regularly. The nodes that are within the transmission range of the BS will receive this message and know that they are in level 1 of the scheduling tree. After a new node joins the mesh network, it will receive several MSH-NCFG messages. In the implementation of the following simulation, this new node will select the nearest neighbor with the minimum level as its SN. Note that, only nodes with hop count less than HRthreshold can join the scheduling tree. HRthreshold is a configuration value that need only be known to the BS, as it can be derived by the other nodes from the MSHCSCF message [3]. 5.2. Buffer management policy One major difference between our proposed algorithm and the existing approaches [14–27] is that we integrate the inherent relay model of access networks into this scheduling algorithm. Each node will take care of both its own data and the data forwarded for its children if there is any. Because a node can only transmit one packet when it gets a transmission opportunity, data packets from its children may be buffered into a queue. The emphasis of this paper is the link scheduling algorithm in IEEE 802.16 mesh mode. Thus, for simplicity, first in, first out (FIFO) is used to manage the buffer in the following simulation study. That is, we distinguish the data packets arriving at a given node according to their arrival time. Evaluating the impact

788

B. Han et al. / Computer Communications 30 (2007) 782–792

of other queueing models, such as Earliest Deadline First with Frame Reservation (EDF-FR) [30] and Start Time Fair Queueing (STFQ) [31] is our current research work. 5.3. Fairness and CUR Fairness is an important issue to ensure that well-behaved nodes are not penalized because of the excessive bandwidth demands of aggressive nodes. Whereas, maximizing channel utilization is critical to effectively support communication-intensive applications, e.g., video conferencing and remote transfer of large files. Achieving both fairness and maximization of channel utilization in scheduling algorithm is particularly challenging in a shared-medium multi-hop wireless network [32]. We can use the scheduling matrix in Fig. 5 to illustrate the relationship between fairness and CUR more clearly. In Fig. 5(b), for time slot 8, only node 4 is scheduled. If we just consider the interference model, nodes 8 and 11 can also transmit data in this time slot. But assigning transmission opportunities to nodes 8 and 11 will result in unfairness since they can then get more bandwidth. In our proposed algorithm, because nodes 8 and 11 have no service token at time slot 8, they are confined to use this time slot. This is the effectiveness of service token. Therefore, in this scheduling algorithm higher priority is given to fairness other than CUR. 6. Simulation 6.1. Performance metrics As mentioned above, three parameters are set up for the performance evaluation. They are the length of scheduling k, CUR, and the average transmission delay. The length of scheduling is the most important performance measure of a scheduling algorithm, and it is considered in most of the existing literatures. In many applications, the transmission schedule is constructed only when the network is initialized and the data communication is done according to this schedule for as long as the network remains up. Due to the shared nature of wireless channel, CUR is another significant performance metric that we must consider. Higher CUR will improve Pn the effect transport capacity of WMNs. Since CUR = i¼1 tokeni  hopi /nk, we can see that given the scheduling tree and service token set, CUR is inverse proportional to the length of scheduling k. That is, smaller k will lead to a better CUR. Moreover, since IEEE 802.16 based WMN is used to provide broadband wireless multimedia services, we also aim to reduce the transmission delay using the proposed scheduling algorithm. 6.2. Simulation setup As mentioned above, to the best of the author’s knowledge, this is the first scheduling algorithm in IEEE 802.16 mesh mode that considers the relay model. No comparison

can be made with existing schemes. Therefore, we aim to investigate the impact of different selection criteria on above mentioned performance metrics. For simplicity, in the following we call the scheduling algorithms using the above four selection criteria as Random, Channel, Furthest and Nearest, respectively. A C-coded custom simulator is used to evaluate the performance of the proposed scheduling algorithm. In the simulation, a given number of SSs were randomly and uniformly distributed in a square simulation area of size 100 by 100 units. The BS is placed at the center of the simulation area. Each SS has a fixed transmission range r. Thus, two SSs are neighbors when their distance is smaller than their transmission range. All the simulation results presented in this section were obtained by running these algorithms on 300 connected graphs. HRthreshold is assigned to be 7. We obtain the simulation results for both unified (the service token number of nodes is 1) and heterogeneous (the service token number of nodes is randomly selected from 0 to 3) traffic demands. 6.3. Simulation result Fig. 6 gives the simulation results about the length of scheduling. The simulation configurations for Figs. 6(a), (b), (c) and (d) are as following: (a) the node’s transmission range is 15 units, the number of nodes in the network ranges from 50 to 120 with increment step of 10 and the service token of nodes is 1; (b) the node’s transmission range is 20 units, the number of nodes in the network ranges from 20 to 100 with increment step of 10 and the service token of nodes is 1; (c) the number of nodes in the network is 20, the node’s transmission range ranges from 20 to 65 units with increment step of 5 and the service token of nodes is 1 and (d) the node’s transmission range is 15 units, the number of nodes in the network ranges from 50 to 120 with increment step of 10 and the service token of nodes is randomly selected from 0 to 3. The simulation configurations for Fig. 7 and 8 are the same as those for Fig. 6. As mentioned above, we use the number of time slots to measure the length of scheduling and average transmission delay. Therefore, the unit of the y-axis in Figs. 6 and 8 is the number of time slots. From Figs. 6(a), (b) and (d), we notice that when the node’s transmission range is fixed, the increase of the number of nodes in the network will increase the length of scheduling. When the number of nodes is fixed, the increase of node’s transmission range will decrease the length of scheduling as shown in Fig. 6(c). Comparing Figs. 6(a) with (d), we find that the increase of average service token will lead to longer scheduling length. From Fig. 6(c), we can see that when the node’s transmission range increases to be larger than 55 units, the scheduling length decreases to 20 which is the same as the number of the nodes. The reason is that under this network topology, almost all the SSs are one hop away from the BS and the mesh network degrades to a P2MP network, thus every SS needs only one time slot to transmit its own data to the BS. Among these four algorithms,

B. Han et al. / Computer Communications 30 (2007) 782–792

a

b

c

d

Fig. 6. Length of the scheduling.

a

b

c

d

Fig. 7. Channel utilization ratio.

789

790

B. Han et al. / Computer Communications 30 (2007) 782–792

a

b

c

d

e

f

Fig. 8. Average transmission delay.

Nearest performs best, followed by Random and Channel (these two algorithms perform very closely) and the performance of Furthest is the worst. The reason is that when the mesh network is used as access network, the nodes which locate nearer to the BS will become the bottleneck in the scheduling tree and thus giving higher priority to these nodes will reduce the number of time slots used for scheduling. Fig. 7 shows the simulation results about channel utilization ratio. From these four figures, we notice that when the node’s transmission range is fixed, the increase of the number of nodes in the network will reduce the CUR.

The reason is that added nodes may increase the number of interfered nodes when one node is transmitting, consequently, downgrades the number of nodes that can transmit at the same time. When the number of nodes is fixed, the increase of node’s transmission range may also decrease CUR with the similar reasons. Among these four algorithms, Nearest achieves the best CUR and that of Furthest is the worst. However, the CUR is very low. In most of the situations, this ratio is below 10%. The reason Channel results in worse CUR than Nearest is that Channel does not give higher priority to the bottleneck nodes nearer to the BS. Therefore, packets will be buffered at these nodes

B. Han et al. / Computer Communications 30 (2007) 782–792

and the CUR for the last several time slots in the scheduling circle is very low. We calculate the average transmission delay for nodes in different levels separately, since nodes with larger hop count to the BS will generally suffer longer transmission delay than those with smaller hop count to the BS and it is not reasonable to mix all these nodes together. Fig. 8 plots the simulation results about average transmission delay for the nodes at level 3 and level 7, respectively. Due to the limited space, we omit the curves for the nodes at other levels since they show similar results. In Fig. 8, we have not plotted the curve for the configuration of fixed number of nodes with increasing transmission range, because when the transmission range changes, it dose not make sense to compare the average transmission delay for nodes at the same level. From these figures, we still find that Nearest causes the smallest average transmission delay, while Furthest generates the largest transmission delay. When r = 15 units, tokeni = 1 and n = 120, the average transmission delay (for the nodes at level 3) of Nearest is only about 50% of that of Furthest. Giving higher priority to the nodes that are further away from the BS may cause more data packets buffered at the intermediate nodes which will result in longer transmission delay. Comparing Figs. 8(a), (b) and (c) with Figs. 8(d), (e) and (f), we also confirm that the nodes at higher level cause longer average transmission delay than those at lower level. 7. Conclusion We proposed a collision-free centralized scheduling algorithm for IEEE 802.16 based WMNs. In this algorithm, we consider some particular features of WMNs, such as the function of access networks. The inherent relay model is also integrated into this scheduling algorithm. This scheduling scheme takes fairness, channel utilization and transmission delay into consideration. In the proposed algorithm, the selection policy for scheduled links will impact the algorithm’s performance. We use the length of scheduling, channel utilization ratio and transmission delay to evaluate the performance of the proposed scheduling algorithm. The comprehensive simulation studies show that giving higher priority to the nodes nearer to the BS will reduce the length of scheduling and transmission delay and improve the channel utilization ratio. Our current work includes investigating the impact of different buffer management policies on the transmission delay and further research on the computation complexity of the proposed scheduling problem. Moreover, we are considering using some advanced techniques, such as directional antenna and multi-channel/multi-radio to improve the channel utilization. Acknowledgements The work was supported by CityU Strategic Grant Nos. 7001777, 7001709 and CityU FSE Funding for Research

791

No. 9610027. This work was also partially sponsored by 973 National Basic Research Program, Minister of Science and Technology of China under Grant No. 2003CB317003. Most of the work was done when the first author was a graduate student at City University of Hong Kong and was supported by Graduate Scholarship from the University Grants Committee of Hong Kong, Research Tuition Scholarship and Research Activities Funds from City University of Hong Kong. The first author is grateful to Prof. Imrich Chlamtac, Prof. Errol L. Lloyd, Dr. Shay Kutten, Dr. Anat Lerner and Dr. Subramanian Ramanathan for their help during his literature review. We are grateful to the anonymous reviewers for their valuable comments and suggestions. References [1] W. Webb, Broadband fixed wireless access as a key component of the future integrated communications environment, IEEE Communication Magazine 39 (9) (2002) 115–121. [2] H. Bolcskel, A.J. Paulraj, K.V.S. Hari, R.U. Nabar, W.W. Lu, Fixed broadband wireless access: state of the art, challenges, and future directions, IEEE Communication Magazine 39 (1) (2001) 100–108. [3] IEEE Std 802.16-2004, IEEE standard for local and metropolitan area networks part 16: air interface for fixed broadband wireless access systems, Oct. 1, 2004. [4] I.F. Akyildiz, X. Wang, W. Wang, Wireless mesh networks: a survey, Elsevier Journal of Computer Networks 47 (2005) 445–487. [5] R. Bruno, M. Conti, E. Gregori, Mesh networks: commodity multihop ad hoc networks, IEEE Communication Magazine 43 (3) (2005) 123–131. [6] P. Kyasanur, N.H. Vaidya, Routing and interface assignment in multi-channel multi-interface wireless networks, in: Proc. of the 2005 IEEE Wireless Communications and Networking Conference (WCNC 2005), March 2005, pp. 2051–2056. [7] D. Aguayo, J. Bicket, S. Biswas, G. Judd, R. Morris, Link-level measurements from an 802.11b mesh network, in: Proc. of the 2004 ACM Annual Conference of the Special Interest Group on Data Communication (SIGCOMM), August 2004, pp. 121–132. [8] A. Raniwala, T.-C. Chiueh, Architecture and algorithms for an IEEE 802.11-based multi-channel wireless mesh network, in: Proc. of the 24th Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM 2005), March 2005, pp. 2223–2234. [9] R. Draves, J. Padhye, B. Zill, Routing in multi-radio, multi-hop wireless mesh networks, in: Proc. of the 10th ACM Annual International Conference on Mobile Computing and Networking (MOBICOM 2004), Sep. 2004, pp. 114–128. [10] V. Gambiroza, B. Sadeghi, E. Knightly, End-to-end performance and fairness in multihop wireless backhaul networks, in: Proc. of the 10th ACM Annual International Conference on Mobile Computing and Networking (MOBICOM 2004), Sep. 2004, pp. 287–301. [11] J. Tang, G.L. Xue, W.Y. Zhang, Interference-aware topology control and QoS routing in multi-channel wireless mesh networks, in Proc. of the Sixth ACM International Symposium on Mobile Ad Hoc Networking and Computing (MOBIHOC 2005), May 2005, pp. 68– 77. [12] H.-Y. Wei, S. Ganguly, R. Izmailov, Z. Haas, Interference-aware IEEE 802.16 WiMax mesh networks, in: Proc. of the 61st IEEE Vehicular Technology Conference (VTC Spring 2005), May 2005, pp. 3102–3106. [13] M. Cao, W.C. Ma, Q. Zhang, X.D. Wang, W.W. Zhu, Modeling and performance analysis of the distributed scheduler in IEEE 802.16 mesh mode, in: Proc. of the Sixth ACM International Symposium on Mobile Ad Hoc Networking and Computing (MOBIHOC 2005), May 2005, pp. 78–89.

792

B. Han et al. / Computer Communications 30 (2007) 782–792

[14] E. Arikan, Some complexity results about packet radio networks, IEEE Transactions on Information Theory 30 (4) (1984) 681–685. [15] R. Nelson, L. Kleinrock, Spatial TDMA: a collision-free multihop channel access protocol, IEEE Transactions on Communications 33 (9) (1985) 934–944. [16] B. Hajek, G. Sasaki, Link scheduling in polynomial time, IEEE Transactions on Information Theory 34 (5) (1988) 910–917. [17] I. Cidon, M. Sidi, Distributed assignment algorithms for multihop packet radio networks, IEEE Transactions on Computers 38 (10) (1989) 1353–1361. [18] A. Ephremides, T.V. Truong, Scheduling broadcasts in multihop radio networks, IEEE Transactions on Communications 38 (4) (1990) 456–460. [19] A.-M. Chou, Victor O.K. Li, Slot allocation strategies for TDMA protocols in multihop packet radio networks, in: Proc. of the 11th Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM 1992), May 1992, pp. 710–716. [20] S. Ramanathan, E.L. Lloyd, Scheduling algorithms for multihop radio networks, IEEE/ACM Transactions on Networking 1 (2) (1993) 166–177. [21] J. Gronkvist, Assignment methods for spatial reuse TDMA, in: Proc. of the First ACM International Symposium on Mobile Ad Hoc Networking and Computing (MOBIHOC 2000), Aug. 2000, pp. 119– 124. [22] P. Bjorklund, P. Varbrand, D. Yuan, Resource optimization of spatial TDMA in ad hoc radio networks: a column generation approach, in: Proc. of the 22th Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM 2003), Mar. 2003, pp. 818–824. [23] A. Ra´cz, G. Miklo´s, F. Kubinszky, A. Valko´, A pseudo random coordinated scheduling algorithm for bluetooth scatternets, in: Proc. of the Second ACM International Symposium on Mobile Ad Hoc Networking and Computing (MOBIHOC 2001), Oct. 2001, pp. 193– 203. [24] Y.M. Kim, T.H. Lai, A. Arora, A QoS-aware scheduling algorithm for bluetooth scatternets, in: Proc. of the 32nd International Conference on Parallel Processing (ICPP 2003), Oct. 2003, pp. 455– 462. [25] T. Salonidis, L. Tassiulas, Distributed dynamic scheduling for end-toend rate guarantees in wireless ad hoc networks, in: Proc. of the Sixth ACM International Symposium on Mobile Ad Hoc Networking and Computing (MOBIHOC 2005), May 2005, pp. 145–156. [26] D. Kim, A. Ganz, Fair and efficient multihop scheduling algorithm for IEEE 802.16 BWA systems, in: Proc. of Second International Conference on Broadband Networks (BROADNETS 2005), Oct. 2005, pp. 895–901. [27] N. B. Salem, J.-P. Hubaux, A fair scheduling for wireless mesh networks, in: Proc. of First IEEE Workshop on Wireless Mesh Networks (WiMesh 2005) Held in Conjunction with SECON-2005, Sep. 2005. [28] P.H. Hsiao, A. Hwang, H.T. Kung, D. Vlah, Load-balancing routing for wireless access networks, in: Proc. of the 20th Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM 2001), Apr. 2001, pp. 986–995. [29] Y. Bejerano, Efficient integration of multihop wireless and wired networks with QoS constraints, IEEE/ACM Transactions on Networking 12 (6) (2004) 1064–1078. [30] E. Hossain, V.K. Bhargava, Link-level traffic scheduling for providing predictive QoS in wireless multimedia networks, IEEE Transactions on Multimedia 6 (1) (2004) 199–217.

[31] P. Goyal, H.M. Vin, H. Chen, Start-time fair queueing: a scheduling algorithm for integrated services packet switching networks, IEEE/ ACM Transactions on Networking 5 (5) (1997) 690–704. [32] H.Y. Luo, S.W. Lu, V. Bharghavan, A new model For packet scheduling in multihop wireless networks, in: Proc. of the Sixth ACM Annual International Conference on Mobile Computing and Networking (MOBICOM 2000), Aug. 2000, pp. 76–86.

Bo Han is a Ph.D. student in Department of Computer Science at University of Maryland, College Park. He received his B.E. in Computer Science and Technology from Tsinghua University in 2000 and M.Phil. in Computer Science from City University of Hong Kong in 2006. In 2003, he worked as a research assistant in City University of Hong Kong. He was a visiting scholar at Department of Computer Science, University of Maryland, College Park from Dec. 2005 to Jul. 2006. His research interests include Wireless Communication, Distributed Algorithms and Internet Computing.

Weijia Jia received the BSc, MSc, and PhD degrees, all in computer science, in 1982, 1984, and 1993 from Center South University, China and Polytechnic Faculty of Mons, Belgium. He joined the German National Research Center for Information Science (GMD) in St. Augustin in 1993 as a research fellow. In 1995, he joined the Department of Computer Science, City University of Hong Kong (CityU) and, currently, he is an (adjunct) associate professor of CityU. His research interests include computer network, distributed systems, multicast and anycast QoS routing protocols for Internet and wireless communications. In these fields, he has published more than 150 papers and books/chapters in the international journals and conference proceedings. He has been the Principal-Investigator of 18 research projects supported by RGC Research Grants, Hong Kong and Strategic Research Grants, CityU. He has served as PC cochairs and PC members for various IEEE international conferences. He is a member of the IEEE.

Lidong Lin received his BSc and MSc degrees in applied mathematics from Jinan University, Guangzhou, China, in 1999 and 2002, respectively. He is currently working toward the PhD degree in the Department of Computer Science, City University of Hong Kong. His main research interests include bandwidth measurement, WLAN and Wimax performance analysis.

Suggest Documents