Table of Contents Author Guidelines Submit a Manuscript
The Scientific World Journal
Volume 2015, Article ID 405974, 11 pages
http://dx.doi.org/10.1155/2015/405974
Research Article

Primary Path Reservation Using Enhanced Slot Assignment in TDMA for Session Admission

1Department of Computer Science and Engineering, Tagore Engineering College, Chennai 600127, India
2Department of Electronics and Communication Engineering, Jerusalem College of Engineering, Chennai 600100, India
3HCL Technology, Chennai, India
4Department of Computer Science and Engineering, Anand Institute of Higher Engineering and Technology, Chennai, India

Received 16 May 2014; Revised 15 September 2014; Accepted 28 October 2014

Academic Editor: Ahmad T. Azar

Copyright © 2015 Suresh Koneri Chandrasekaran et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Abstract

Mobile ad hoc networks (MANET) is a self-organized collection of nodes that communicates without any infrastructure. Providing quality of service (QoS) in such networks is a competitive task due to unreliable wireless link, mobility, lack of centralized coordination, and channel contention. The success of many real time applications is purely based on the QoS, which can be achieved by quality aware routing (QAR) and admission control (AC). Recently proposed QoS mechanisms do focus completely on either reservation or admission control but are not better enough. In MANET, high mobility causes frequent path break due to the fact that every time the source node must find the route. In such cases the QoS session is affected. To admit a QoS session, admission control protocols must ensure the bandwidth of the relaying path before transmission starts; reservation of such bandwidth noticeably improves the admission control performance. Many TDMA based reservation mechanisms are proposed but need some improvement over slot reservation procedures. In order to overcome this specific issue, we propose a framework—PRAC (primary path reservation admission control protocol), which achieves improved QoS by making use of backup route combined with resource reservation. A network topology has been simulated and our approach proves to be a mechanism that admits the session effectively.

1. Introduction

The strength of MANET [1] lies in its ability to form self-organized network which seems to be an interesting fact. A MANET provides a practical way to rapidly build a decentralized communication network in areas where there is no existing infrastructure or where temporary connectivity is needed. This property makes these networks highly flexible. There exist some practical design issues in MANET such as limited bandwidth, dynamic nature of topology, and decentralized coordination. Due to these design issues, the quality factors like bandwidth, delay, and jitter [2] get affected. Certain real time applications such as audio and video expect additional bandwidth in order to provide QoS [35]. The goal of QoS is to achieve more deterministic network behaviour so that the information carried by the network can be better delivered and the resources can be better utilized. To provide QoS, we need certain frameworks such as reservation, scheduling, admission control, and routing algorithms [69].

Admission control can avoid the network congestion by estimating whether the new session is admissible or not [10, 11]. Various admission control methods have been proposed in many articles in last few years. However the admission control based protocols have certain pitfalls such as improper handling of session. Different mechanism has been proposed for session admission, of which backup mechanism has a noticeable achievement [12, 13]. Admission control algorithm combined with backup path solves the frequent path beak due to mobility; even such mechanism is not utilized properly. The reservation mechanism ensures the QoS [8, 14]. There are many reservation based protocols, such as hop reservation multiple accesses (HRMA) [15] and five-phase reservation protocol (FPRP) [16, 17]. In addition, contention based protocols, such as carrier sensing multiple accesses with collision avoidance (CSMA/CA), and hybrid protocols, such as TDMA protocol based on contention and reservation [18], exist. The reservation based TDMA protocols have several advantages over contention based protocols, of which conflict free and maximum spatial reuse efficiency is acquainted to the domain [14, 19, 20]. For network with dynamic topology FPRP is a suitable one. Even though the performance aspect of FPRP is improved, still the time slot utilization was not improved.

Considering all the issues of admission control, reservation and backup path, we propose a QoS framework named primary path reservation admission control (PRAC). PRAC framework focuses on admission control and reservation, in order to achieve quality of service. Using backup route aided admission control protocols, such as StAC [13], MACMAN [12], introduces too many control overheads, whereas our proposed protocol minimizes the control packets. In the reservation mechanism such as TDMA, the slot assignment procedure for any request does not consider the neighboring slot assignment. Due to the fact that bandwidth is commonly shared by all carrier sensing nodes, it affects the current node transmission. So it is mandatory to consider the neighboring slot assignment when calculating the bandwidth, which further tries to avoid collisions. By using PRAC, we minimize the delay and maximize the throughput for any admitted session, thereby increasing the overall performance.

2. Background and Related Works

2.1. Admission Control

The admission control (AC) mechanism provides a way that should ensure admissible path from one node to another. Such mechanism determines admission of new data flows by keeping track of available bandwidth; it determines the residual capacity of any individual node and also of the carrier sensing neighbor () nodes [10]. The AC Protocol starts with calculation of local nodes capacity. The local capacity of any node can be estimated by any of the quality aware routing (QAR) protocols [2123]. This protocol discovers the routes which have sufficient resource that satisfies the requirements of a session. Apart from these protocols, the basic routing protocols like DSR [21] can also be used to estimate the local capacity (bandwidth), where the local capacity is the unconsumed bandwidth at a given node. Various methods have been proposed to calculate the local capacity in [1113], among which channel ideal time (CIT) is suitable for admission control and can be calculated using channel ideal time and link transmission in use [12, 13]. The residual capacity calculation alone does not serve the need of admission control, so the second phase continues with ensuring the adequate capacity of the . This adequate capacity can be calculated by several methods. In [10], the first proposed method, referred to as CACP-Multihop, gathers information about the residual capacities can be obtained from the neighbors using admission request packets which are flooded through the network with a radius of two hops. The second proposed method, referred to as CACP-Power, uses a high power transmission mechanism to send the admission request packet to all nodes within the . The other proposed method in adaptive admission control [7] and SoftMAC [11] sends hello packets to calculate the CIT value.

2.2. Related Works

We have analyzed a wide range of protocols before landing up in a concept to provide a new way of admission control. The works done by various authors depict that the core concentration is on providing QoS and to address the issues related to them. In-depth analysis of [7, 24] paves way to get a clear picture classifying the admission control protocols and these proposals provide many useful information pieces for forming a more efficient protocol.

In [13], multipath admission control (MACMAN) was proposed. The paper discussed the priority given to QoS by maintaining backup routes, which thereby enhances the performance (by trying to avoid path or packet loss) of the overall network. Even though this method proves optimal in increasing the performance, the concealed fact is that maintaining the backup routes increases control overhead too. An improved version of MACMAN staggered backup (StAC-backup) [13] proposes a technique that involves only partial disjoint set for admission control which reduces the path identification control overhead when compared to other protocols discussed. As the control overhead due to the beacon messages increases, the network data transfer rate decreases. In [25], distributed admission control protocol (DACP) was proposed. This paper contributes mechanisms to provide QoS by making use of bandwidth reservation. In order to reserve bandwidth, DACP estimates local and neighbour capacity. So mentioned protocol does not consider the hidden and exposed terminal problem since reservation of bandwidth may not be accurate and also the paper does not consider backup route based routing.

In [8], an on-demand bandwidth reservation QoS routing protocol for mobile ad hoc networks was proposed, which considers revising the bandwidth estimation and reservation procedure. For route discovery, an approach min-max was used to satisfy the bandwidth requirement. Also the reservation procedure used estimates the weight of its neighbor’s slot for availability. The time slot with lowest weight will be reserved. The proposed method admission control and bandwidth reservation (ACBR) in [26] suffers from a limitation that estimates the available capacity of the neighboring nodes, using one-hop distance only. In addition, it does not take the contenting nodes in the interference range into account. In other words, this scheme considers only the contention of nodes within transmission range.

In [18], the proposed TMMR protocol performs bandwidth reservation in order to attain multihop packet transmissions. It also provisions the node mobility through fast fault node detection. TDMA based reservation mechanism is exploited but still it does not improve time slot selection for reservation. The novel idea of time slot utilization proposed in [20] does not consider the impact of hidden terminal problem and it lacks effectiveness in session admission. Considering the above discussed facts, our proposed method exhibits the flow of admission in an efficient reservation, combined with a backup path mechanism. The effect of such an improvised mechanism shows enhanced performance.

3. Primary Path Reservation Admission Control Protocol (PRAC)

3.1. Backup Route Discovery

Studies on backup route discovery emphasize that many backup routes have to be maintained to overcome re-routing process after a route failure. The disadvantage of the above stated method is that since many control packets are sent through and forth, there is a consistent increase in the network overhead. In PRAC, we maintain a primary path and a single backup path. From previous analysis, dynamic source routing (DSR) [21] proves to be a suitable routing protocol for finding backup routes. The backup route discovery process finds the route in which the nodes involved in the process are in a complete disjoint set. The backup path discovered should not include the nodes that were in the primary path [12]. Results from [13] which include many backup routes prove that the nodes in primary and backup routes can be sufficiently disjoint and are not required to be in full disjoint sets. Considerwhere is the primary path and is the backup path. But in PRAC since only one backup route is maintained, the backup route nodes should be a complete disjoint set with that of the primary route nodes:If many backup paths are maintained, the condition for partial or sufficient disjoint sets may yield better performance, whereas, in the case of a single backup, if the primary path fails then the probability of backup failure is also feasible. Hence the backup path nodes should be a complete disjoint set, thereby reducing the risk of failure. The capacity constraint route discovering process is explained in Figure 1. The route discovery process starts with the request for session. In this, the source node broadcasts the RREQ packet to all its neighbouring nodes. Each node calculates its own residual capacity, which if satisfies the capacity requested by a session, will rebroadcast the RREQ packet to their neighbours. The session capacity requirement can be calculated as follows:This equation is used to calculate the session capacity requirement at any node. Here is the number of slots required and is the number of contenting nodes in the carrier sensing range. MACMAN [12] implements high power method that builds up sets, which in turn increases the beacon overhead making it a probable disadvantage. Our proposed PRAC method overcomes it by the use of admission request packet (similar to CACP-Multihop), flooded through the network, covering a two-hop radius at the time of session admission, depending upon the session capacity; a node may confirm the session admission or deny it. In the case of primary route failure, backup route discovery is initiated, in which the process is decoupled from the normal route discovery mechanism and only admission control mechanism takes place.

Figure 1: Capacity constraint route discovering process.
3.2. Validation of Single Backup Path over Multiple Backup Paths

Though multiple backup path approach does make sure the backup route availability and better manages the throughput drop, it adds additional overhead in the network by sending probe packet to manage the paths. Moreover the single backup path provides a better way in managing the overall traffic in a given network by avoiding unintended interference that happened on the session routes. As there is only one backup path, the maintenance quotient is virtually lower compared to the multiple backup method (that periodically engages the routes for the probing). Though the problem of handling the mobility/path-break appears to exist in this single backup path, it provides a way to find out another path if initial backup path fails to establish the connection. So in any eventual case the single backup path does make sure that at any point of time there is a path existing for the data transmission. We assume is the number of hops between the source and the destination. The single paths can achieve reduced probe packet as demonstrated in shown calculation below. The analytical verification and the robustness of the single backup path are based on the simple routing model. The probability of packet control overheads denoted between the source and the destination in the single backup path routing: where is average control packet and is the number of hops. Now we can find that the probability of control packets in multiple backup paths maintained iswhere is the number of disjoint-backup paths. As the number of hops, , and the multiple backup paths, increases the probability of the overhead in the network increases as depicted in the formula (5), whereas in single backup path, the only parameter that causes the overhead to increase is the number of hops and similarly the number of control packets to send also increases. This does make sure that the network traffic is managed better.

3.3. Reservation

The purpose of backup route discovery is to find the residual capacity of each and every node in a route. Such a mechanism discovers many routes, among which the efficient routes are selected (the mechanism involved in backup route discovery has been discussed in Section 3.1). The reservation approach in our proposal focuses only on the primary route. When the destination node receives the first RREQ packet of a session, it is considered as the primary path and reservation reply is sent along the reverse direction of the same primary path. When the second RREQ packet is received, this path is not reserved but it will be considered as a backup path thereby sending a normal reply. This reservation process is coupled with backup route discovery. The above facts discussed address how the reservation process integrates the route discovery stage. The reason behind using TDMA for reservation in this paper is that it tolerates the radio interference problem and it holds good in our scenario, since all the nodes share the single common channel. We propose a new approach in TDMA which considers both hidden terminal and exposed terminal problem. A glance on the following example helps us to understand the problem in making reservation. In Figure 2, consider the path from A to C. Here the grey slots depict that they are busy and similarly the white slots are free. Between A and B there are five matching free slots and between B and C there are four matching free slots . If we reserve slots for A to transmit and slot for B to transmit, then the path bandwidth is only three. Suppose that if the other pair D and E are currently using slot 2 to communicate, two possible cases will arise.

Figure 2: Bandwidth calculation interfered by hidden and exposed terminal problem.

Case 1. If is the receiver on slot 2, then A will not allow sending on slot 2, so collision occurs at . This is called hidden terminal problem since common free slots between A and B are reduced to .

Case 2. Due to Case 1, the bandwidth of the path A to C degrades to 2 slots. If is the sender on slot 2 then A will not allow sending on slot 2. This is called exposed terminal problem.

3.3.1. System Model

(1)Each node maintains the neighbor’s information (including available slot). This information is gathered by hello message.(2)TDMA frames are fixed length; time frame had 16 time slots, with 5 ms for each time slot.(3)Nodes shared single common channel.(4)Each frame consists of two subframes: the data frame and control frame. The data frame consists of fixed number of data slots. When a node wants to transmit or receive data packets, it may use its control slot to reserve the desired data slots. In the control frame, each node has a committed control slot and therefore avoids contention and collision.(5)Control and data slot handshake: the control slot holds control packets such as the route request, hello packet, the route reply, and the route error. When a node wants to transfer data it may use the control packets to reserve the required path. Once it is reserved, it can be used for both transmitting and receiving data.

3.3.2. Data Structure

(i)We maintain sending slot table (), receiving slot table (), and hop count table in every node. The sending slot table : of node records the time slots of all the nodes within 2 hops from and is having sending activities. So if slot of node has been reserved for transmission; otherwise, . The receiving slot table : of node records the time slots of all the nodes which are within 2 hops from node and are having receiving activities. Similarly, if slot of node has been reserved for receiving; otherwise, . The hop count table : of a node maintains a record of the mutual distances between nodes in ’s neighborhood. Similarly, for each node that is within 1 hop from ; if node is within 1 hop from ; otherwise, .(ii)The RREQ has following parameters: where is source node and is the destination node and is the session identity issued by source; is bandwidth requirement, which can be represented by the number of slots. is the node that is currently relaying RREQ. The is the partial path, with the available slot, that has been discovered so far. It has the format . Here is node identity, where and each contains the total slots that are found to be available for to transmit to . is neighbour hop list . Here each node may serve as the next hop of node that extends the current partial path, only if has sufficient slots and also contains slots that can be used by to transmit to .(iii)The RREP has following parameters: . When a route is found at the destination , we need to initiate a packet RREP to the source node . This packet traverses through the reverse path and reserves the slots on the .

Lemma 1. A slot can be used by a node to send to another node without causing collision, if the following conditions are satisfied.(1)Slot is not scheduled to send/receive node in neither nor .(2)For any 1-hop neighbor of , slot is not scheduled to receive data in .(3)For any 1-hop neighbor or , slot is not scheduled to send data in .

3.3.3. Reservation Procedure

(A) Route Request Phase. When a node receives a broadcast packet ) from a neighbour node and if has not received the same packet before, then Algorithm 1 will be executed. As shown in Step 1, if does not have the node listed in it, then a will be created. Hence the corresponding parameter that contains time slots can be used by to transmit to without collision. In Step 2, the temporary tables for sending and receiving and are used during the probing stage, in which the confirmed list is stored in original and . As the path is propagated for each slot of a node, the confirmed slot information is saved in the respective temporary tables and . This confirmed slot in respective node is carried over to next node that is visited and this will continue till the destination node.

Algorithm 1

(1) When RREQ arrives at intermediate nodes (see Algorithm 1), in Step 3 the information of and will be saved in the temporary tables that we have discussed in Step 2. The routine is called to check if there is any slot available for to send . In case of any slot available in one hop to extend the current path, then the RREQ will be rebroadcasted. The same routine is used for node to choose the free time slots in order to send data to . The slot selection procedure is based on Lemma 1. In case, if the required free slot is available, then the algorithm will proceed further to know if there are more free slots to occupy. This is mainly to increase the channel reuse which is essential in the case of wireless communication. Selection of these free slots is done, giving high priority to the ones (node) without the hidden and exposed terminal problems. To achieve this, we give the valid time slot , an increased priority so that to the neighbour of .

(2) When RREQ arrives at destination node, a confirmed path is formed once the destination receives the . The destination node can still accept the request RREQ or choose ignoring it, based on following condition. When a node receives a broadcast packet RREQ from a node , then if does not have listed in it, then a will be created. The corresponding parameter contains time slots that can be used by to transmit to without collision. Then RREP will be sent to the source .(i)Let be the entry in such that .(ii).(iii)Send to source .

(B) Route Reply Phase. As a part of the reply sequence, the packet will be sent in the reverse direction of in unicast manner with each intermediate node relaying the packet. Also the “receive” and “send” information will be saved in the respective table in each node where the packet is traversed. Assuming that contains (), each intermediate node will update the sending and receiving table (confirmed one) with available time slot information (see Algorithm 2).

Algorithm 2

3.4. Route Maintenance

The fact behind route maintenance is that the process monitors the primary and backup routes on a regular basis, checking for QoS requirements (session requirements) [12, 13]. In our proposed method, when the primary route fails, the control moves towards the backup path. Here, PRAC makes use of BRQ (backup route query) message that continuously monitors the stability and effectiveness of the backup path. Previous studies show that many other mechanisms use multiple backup routes, which accounts for increase in reliability but also increases the control overhead. But in our model, the possibility of the primary path failure is very low because of the reservation mechanism used, as described before. The control overhead in PRAC model is very low because path monitoring does not comprise many backup paths and instead is done for a single backup path only. In Figure 3 we describe overall route maintenance process. In case of failure of the primary path, in order to maintain the reliability of the network, the backup path is taken. This backup path is herewith considered to be primary and starts reservation process. Since our proposed model uses a single backup strategy, when the backup is taken as primary (in case of failure), then we lack the existence of a backup path (PRAC requires the presence of a primary and backup path always). Hence the source finds a backup path from route cache. As mentioned before, with the use of BRQ message, the route cache is analysed for the best route that accomplishes the session request. When a node receives a BRQ message, it calculates the contention difference (CD). In our maintenance model, we avoid the calculation of contention count. The reason is that the transmission flow along the primary path is likely to reduce the measured available bandwidth along the backup path. Calculating contention count may end up in insufficient metric; hence the contention difference proves to be an optimal method: The CD should hold a constraint in which . If the above condition fails, then it sends a BRQF message to the source, thereby removing the specific route from route cache. The advantage of PRAC route maintenance is that in the case of both primary and backup path being failed, the source does not go for route recovery process again and instead it makes use of the route cache information [21].

Figure 3: Route maintenance.

4. Performance Evaluation

4.1. Simulation Environments

We use NS-2 network simulator to verify the PRAC’s performance. Based on our analysis, set of simulations involves a larger network with random mobility. Following are the specifications that have been followed while simulating the PRAC protocol. 100 nodes are randomly placed in a 1000 m × 1000 m area. By setting the node transmission range of 250 m and a CS-Range of 550 m, multihop routes have been created and also allowed all types of collisions to occur. 50 nodes are randomly chosen as sources of traffic to 50 other nodes. Each session was CBR traffic flows that were used with a packet size of 512 bytes and a bit rate of 128 kbps. The nodes move according to the random waypoint mobility model and the bandwidth of the channel is 2 Mbps. The two ray ground propagation model was employed to avoid wireless channel errors. Backup route query (BRQ) interval is 2 s (Table 1).

Table 1: Parameter settings.
4.2. Results and Discussions

Figure 4 shows the throughput of each session attained by PRAC. In the results, the number of admitted sessions is more or less similar; in addition, the throughput of the admitted session is higher than other models during the simulation time. As shown, we obtain higher throughput while using PRAC. However, when St backup [13] and DACP [25] are used, only medium throughput is obtained and when TMMR [18] is used, only lower throughput is obtained. From the results it is clear that the proposed protocol is capable of reducing the number of unnecessary routing packets during route discovery, by making admission control decisions at every node in the network. Thus, DACP can use more resources in the network than other models to transmit data packets. The admission control without backup path (i.e., TMMR and DACP) model shows poor throughput, while the admission control with backup path (St backup and PRAC) shows high throughput. In addition, PRAC attains greater aggregated throughput than other models.

Figure 4: Throughput.

It is also essential to inspect the overhead produced by the protocol since PRAC introduces additional control messages. Figure 5 demonstrates the average amount of control packets transmitted for the duration in the simulations. As expected, the graph demonstrations a notable increase in control traffic in the network when we use backup path. When compared to the existing protocols our PRAC protocol noticeably produces lesser control packets. As seen in Section 3.3, the actual amount of control packet overhead is an important factor for maintaining a single backup path. A tradeoff happens between the extra control packet overhead and the facility to quickly switch to a new path if the present one breaks down. However, there is an increase in overhead if the protocol uses backup routes that are to be maintained. But this increase is acceptable due to the improvement of the other performance parameters. At first, the overhead is low; this is because of minimum number of sessions that are admitted and also the backup route maintenance messages are produced on a per-flow basis for admitted flows.

Figure 5: Control packets overheads.

Since any admission control protocols are mainly designed to put up real time applications that have requirements on end-to-end delay, it is essential to make sure that the additional overhead does not include added delay that go above the delay bounds of the requests [27]. The end-to-end delay for the sessions can be seen in Figure 6. From this figure, PRAC is capable of providing an increase in data packet delivery and minimizing the end-to-end delay. Since there is no admission control performed in TMMR, the network becomes congested as new sessions are added to the network, resulting in decreased throughput and dramatically increasing the delay of the sessions. On the other hand, the throughput of the sessions shows significant degradation; also the delay rises as the number of sessions increases. The average end-to-end delay in the simulations that is achieved for all other three protocols is much higher than PRAC, indicating PRAC’s ability to balance the network load.

Figure 6: End to end delay.

Figure 7 shows the average number of times the sessions are stopped per simulation. When using TMMR, DACP, and St backup, a large number of sessions are stopped. When using PRAC, in many cases, these same sessions can switch to a backup route and retain the transmission. For all the other protocols, it is likely that as the number of admitted sessions increases so does the number of session breaks. However, PRAC is able to handle the session breaks even if large amount of session is admitted. The reduced number of session drops is likely to increase the QoS at the end user.

Figure 7: Session drop ratio.

In Figure 8 we inspect the number of sessions that each protocol permits to be active at the same time. It can be agreed that when the number of sessions is minimum, the variance among the protocols is negligible. However, when a larger number of sessions are initiated, PRAC is able to sustain that more than all other three protocols. This contributes to the variances in delivery rate among the protocols and proves that PRAC is capable of using the resources in the network more efficiently.

Figure 8: Session admission ratio.

Finally, as shown in Figure 9 we compare different backup path approach to identify the overall control packet probability. It is obvious that the probability is least for no Backup approach, as there is no much of backup transmission planned after the failure attempt in first time. Also the trend in the shown diagram depicts that the higher the backup routes, the larger the control packet probability in the network. To balance the overhead or the control packet probability and to manage the overall data transmission quality, single backup path will be the better choice as it has least probability next to no backup approach but still we have a backup path to handle the earlier failure attempts thus making sure the continuous operation of data transmission.

Figure 9: Identifying the overall control packet probability when using different backup path.

5. Conclusion and Future Work

Pitching the performance of any network, keeping it uncompromised depends upon the QoS provided by the network. If that is the case, our proposed PRAC model minimizes the delay and maximized throughput for any admitted session thereby increasing the overall performance. However, the model considers the respective nodes capacity, analyzing its neighbor’s capacity. The QoS provided eventually does not bring up any constrains on reliability. Considering our environment where mobility is high, our model ensures a tested backup path, which holds the key to revival from the path break. Providing many backup paths increases the control overheads, whereas PRAC considers only one tested backup path and this relatively reduces the control overheads. In general, in the mobile networks, resource reservation provides QoS. Our reservation procedure supports real time applications by avoiding the hidden and exposed terminal problems. Thus it provides collision free reservation and minimized delay. Our protocol PRAC, which includes admission control along with reservation mechanism, ensures much minimized delay. We attain a problem free reservation, but still connectivity poses a major problem in the mobile ad hoc network. In future, studies can be made on providing QOS without any connectivity issues, which paves way for many research enhancements.

Conflict of Interests

The authors declare that there is no conflict of interests regarding the publication of this paper.

References

  1. R. Ramanathan, J. Redi, and B. Technologies, “A brief overview of ad hoc networks: challenges and directions,” IEEE Communications Magazine, vol. 40, no. 5, pp. 20–22, 2002. View at Google Scholar
  2. H. Menouar, F. Filali, and M. Lenardi, “A survey and qualitative analysis of MAC protocols for vehicular ad hoc networks,” IEEE Wireless Communications, vol. 13, no. 5, pp. 30–35, 2006. View at Publisher · View at Google Scholar · View at Scopus
  3. T. B. Reddy, I. Karthigeyan, B. S. Manoj, and C. Siva Ram Murthy, “Quality of service provisioning in ad hoc wireless networks: a survey of issues and solutions,” Ad Hoc Networks, vol. 4, no. 1, pp. 83–124, 2006. View at Publisher · View at Google Scholar
  4. L. Chen and W. B. Heinzelman, “QoS-aware routing based on bandwidth estimation for mobile ad hoc networks,” IEEE Journal on Selected Areas in Communications, vol. 23, no. 3, pp. 561–572, 2005. View at Publisher · View at Google Scholar · View at Scopus
  5. S. Sivavakeesar and G. Pavlou, “Quality of Service aware MAC based on IEEE 802.11 for multihop ad-hoc networks,” in Proceedings of the IEEE Wireless Communications and Networking Conference, Atlanta, Ga, USA, 2004.
  6. X. Chen, H. M. Jones, and D. Jayalath, “Channel-aware routing in MANETs with route handoff,” IEEE Transactions on Mobile Computing, vol. 10, no. 1, pp. 108–121, 2011. View at Publisher · View at Google Scholar · View at Scopus
  7. L. Hanzo II and R. Tafazolli, “Admission control schemes for 802.11-based multi-hop mobile ad hoc networks: a survey,” IEEE Communications Surveys and Tutorials, vol. 11, no. 4, pp. 78–108, 2009. View at Publisher · View at Google Scholar · View at Scopus
  8. C.-S. Hsu, J.-P. Sheu, and S.-C. Tung, “An on-demand bandwidth reservation QoS routing protocol for mobile ad hoc networks,” in Proceedings of the IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing, pp. 198–207, June 2006. View at Publisher · View at Google Scholar · View at Scopus
  9. K. C. Suresh and S. Prakash, “MAC and routing layer supports for QoS in MANET: a survey,” International Journal of Computer Applications, vol. 60, no. 8, pp. 40–46, 2012. View at Google Scholar
  10. Y. Yang and R. Kravets, “Contention-aware admission control for ad hoc networks,” IEEE Transactions on Mobile Computing, vol. 4, no. 4, pp. 363–377, 2005. View at Publisher · View at Google Scholar · View at Scopus
  11. H. Wu, Y. Liu, Q. Zhang, and Z.-L. Zhang, “SoftMAC: layer 2.5 collaborative MAC for multimedia support in multihop wireless networks,” IEEE Transactions on Mobile Computing, vol. 6, no. 1, pp. 12–25, 2007. View at Publisher · View at Google Scholar · View at Scopus
  12. A. Lindgren and E. Belding-Royer, “Multi-path admission control for mobile ad hoc networks,” in Proceedings of the 2nd Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services (MobiQuitous '05), IEEE, 2005.
  13. L. Hanzo and R. Tafazolli, “QoS-aware routing and admission control in shadow-fading environments for multirate MANETs,” IEEE Transactions on Mobile Computing, vol. 10, no. 5, pp. 622–637, 2011. View at Publisher · View at Google Scholar · View at Scopus
  14. D. Zhang, W. Zhang, and K. Liu, “A dual channel reservation MAC protocol for mobile Ad Hoc networks,” Communications in Information Science and Management Engineering, vol. 3, no. 12, pp. 604–613, 2013. View at Google Scholar
  15. Z. Tang and J. J. Garcia-Luna-Aceves, “Hop reservation multiple access for multichannel packet radio networks,” Computer Communications, vol. 23, no. 10, pp. 877–886, 2000. View at Publisher · View at Google Scholar · View at Scopus
  16. C. Zhu and M. S. Corson, “A five-phase reservation protocol (FPRP) for mobile ad hoc networks,” in Proceedings of the 17th Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM '98), pp. 322–331, San Francisco, Calif, USA, 1998.
  17. Q. Yang, Y. Zhuang, and J. Shi, “An improved contention access mechanism for FPRP to increase throughput,” ETRI Journal, vol. 35, no. 1, pp. 58–68, 2013. View at Publisher · View at Google Scholar · View at Scopus
  18. J.-R. Cha, K.-C. Go, J.-H. Kim, and W.-C. Park, “TDMA-based multi-hop resource reservation protocol for real-time applications in tactical mobile adhoc network,” in Proceedings of the IEEE Military Communications Conference (MILCOM '10), pp. 1936–1941, November 2010. View at Publisher · View at Google Scholar · View at Scopus
  19. I. Bekmezci and F. Alagöz, “Delay sensitive, energy efficient and fault tolerant distributed slot assignment algorithm for wireless sensor networks under convergecast data traffic,” International Journal of Distributed Sensor Networks, vol. 5, no. 5, pp. 557–575, 2009. View at Publisher · View at Google Scholar · View at Scopus
  20. Y. Li, B. Sun, X. Luo, and N. Xiong, “A time slot reservation in modified TDMA-based ad hoc networks with directional antennas,” International Journal of Distributed Sensor Networks, vol. 2013, Article ID 636797, 12 pages, 2013. View at Publisher · View at Google Scholar · View at Scopus
  21. D. B. Johnson and D. A. Maltz, “Dynamic source routing in ad hoc wireless networks,” in Mobile Computing, vol. 353, pp. 153–181, Kluwer Academic, 1996. View at Google Scholar
  22. Y. Chang, Q. Liu, X. Jia, and K. Zhou, “Routing and transmission scheduling for minimizing broadcast delay in multi-rate wireless mesh networks using directional antennas,” Wireless Communications and Mobile Computing, 2012. View at Publisher · View at Google Scholar
  23. Y. Kim, H. Ko, S. Pack, W. Lee, and X. Shen, “Mobility-aware call admission control algorithm with handoff queue in mobile hotspots,” IEEE Transactions on Vehicular Technology, vol. 62, no. 8, pp. 3903–3912, 2013. View at Publisher · View at Google Scholar · View at Scopus
  24. L. Khoukhi, H. Badis, L. Merghem-Boulahia, and M. Esseghir, “Admission control in wireless ad hoc networks: a survey,” EURASIP Journal on Wireless Communications and Networking, vol. 2013, no. 1, article 109, 2013. View at Publisher · View at Google Scholar · View at Scopus
  25. J. Youn, S. Pack, and Y.-G. Hong, “Distributed admission control protocol for end-to-end QoS assurance in ad hoc wireless networks,” EURASIP Journal on Wireless Communications and Networking, vol. 2011, article 163, 2011. View at Publisher · View at Google Scholar
  26. H. Zhu and I. Chlamtac, “Admission control and bandwidth reservation in multi-hop ad hoc networks,” Computer Networks, vol. 50, no. 11, pp. 1653–1674, 2006. View at Publisher · View at Google Scholar · View at Scopus
  27. T. Liu, W. Liao, and J.-F. Lee, “Distributed contention-aware call admission control for IEEE 802.11 multi-radio multi-rate multi-channel wireless mesh networks,” Mobile Networks and Applications, vol. 14, no. 2, pp. 134–142, 2009. View at Publisher · View at Google Scholar · View at Scopus