Abstract

Multi-constrained routing is a key driver to support quality-of-service (QoS) for real-time multimedia applications in wireless mesh networks (WMNs). Due to the difficulty of applying strict admission control into a public WMN, it is inevitable to accommodate multiple application flows with different QoS requirements exceeding the capacity of a certain link shared by multiple flows. However, existing multi-constrained routing protocols under such an environment find the QoS degradation based on end-to-end path quality probing and trigger flooding-based route discovery from a scratch for resolving the QoS degradation, which incurs a longer recovery time and much routing overhead. In this paper, we propose a novel multi-constrained routing protocol for WMNs that finds problematic links that may affect QoS degradation to end-to-end paths and replaces them with a detour path using a local repair principle. We model congestion threshold estimation for finding problematic links and design algorithms for quickly finding detour paths and selecting an optimal path by minimizing the negative effect on existing flows nearby the detour path. Simulation results show that the proposed routing protocol achieves up to 19.6% more goodput of live video streaming applications with up to 33% reduced routing overhead compared with an existing work.

1. Introduction

A wireless mesh network (WMN) is a promising network infrastructure for mobile devices in a public space which extends connectivity with self-configuration between distributed mesh routers [1]. As the use of real-time multimedia applications in mobile devices is increasing, guaranteeing the quality-of-service (QoS) becomes important, which includes available bandwidth, end-to-end delay, jitter, and packet loss rate. A multi-constrained routing protocol [24] has attracted researchers’ attention since it is able to discover a routing path considering multiple link quality metrics at the same time. It is designed for providing an application with feasible routing paths which satisfy multiple constraints based on link quality measurement.

For guaranteeing QoS, many multi-constrained routing protocols assume admission control in a network which allocates a certain amount of network resources to a specific flow and blocks an additional flow request if the request exceeds available network capacity. However, applying such strict admission control in a public WMN is undesirable due to network resources underutilization. Because the QoS requirement of an application usually can be specified based on its peak usage, guaranteeing QoS for the application can be overprovisioning QoS, which leads to inefficient network resource utilization [57]. Moreover, due to the mobility of mesh clients transiting multiple mesh routers, the amount of traffic to be guaranteed with a specific QoS requirement will vary over time. This opens up a new challenge to existing multi-constrained routing protocols for public WMNs: If admission control gets relaxed, that is, links are allowed to accommodate traffic flows exceeding their available capacity, there is a need to deal with congestions and the QoS degradation of application flows. However, existing multi-constrained routing protocols wait until when a target flow faces unacceptable QoS degradation due to congestions and rediscover a new routing path from a scratch. It leads to severe goodput degradation in the viewpoint of an application layer. A fast and lightweight solution for resolving the QoS degradation of a multihop routing path is necessary.

In this paper, we propose a new multi-constrained routing protocol in WMNs that (1) finds links that would hamper a target application’s end-to-end QoS by estimating the congestion threshold of each link and (2) replaces a link(s) performing lower than the required QoS with a detour path to recover the end-to-end QoS requirement exploiting the information of neighbor mesh routers. For additive and multiplicative QoS metrics, the congestion threshold of each link is defined as the tolerance level of how much the quality of each link can be deteriorated while the end-to-end path quality still satisfies the applications’ QoS requirement. If a link exceeds its congestion threshold, the source node of a link finds candidates among its neighbor nodes which have connectivity to the sink node of the link. For each candidate neighbor node, the source node checks if a detour path via the candidate neighbor node is feasible, that is, the quality of the detour path is below the congestion threshold. In order to select one of multiple detour paths satisfying the congestion threshold, we define an optimization function that estimates the negative effect on existing flows nearby the detour path. Using the optimization function, the best path with the smallest negative effect on nearby existing flows is selected for local repair.

The simulation results show that the proposed local repair scheme outperforms the route discovery approach in existing multi-constrained routing protocols under congested environments in terms of the goodput of a real-time video streaming application, route maintenance time, and routing overhead. We achieve up to 19.6% higher goodput and up to 33% smaller routing overhead. The total number of flooding-based route discovery triggered for route recovery is also reduced up to 40.8% in our proposed scheme.

The rest of this paper is organized as follows. Section 2 illustrates a motivating scenario where a routing path gets degraded due to congestion and recovered using an existing multi-constrained route discovery scheme. Section 3 explains the system model of multi-constrained routing and the estimation of QoS degradation in a distributed manner for applying local repair. In Section 4, we explain the proposed scheme in the viewpoint of routing operations. In Section 5, we show simulation results of the proposed scheme compared with an existing multi-constrained routing protocol. We explain related works in Section 6, and we conclude in Section 7.

2. A Motivating Scenario

We illustrate a motivating scenario for proving the need of fast and lightweight route maintenance for multi-constrained routing protocols. In WMNs, many mobile devices join the network through one of the closest mesh routers and run a variety of applications with different QoS requirements. Assume that there is a WMN where each link between arbitrary mesh routers has bandwidth of 5 Mbps and latency of 2 ms. Consider two different types of applications: a live video streaming application and a remote desktop application. The live video streaming application has stringent bandwidth and delay requirements (3 Mbps, 20ms) for clear and smooth video playback, and the remote desktop application also demands a certain level of bandwidth (2.8 Mbps) for getting updates of screen refreshes in a remote machine. Assume that there is best effort traffic in the network which does not have any specific QoS requirement but consumes available bandwidth for delivering packets as many as possible.

As shown in Figure 1, two smartphones are connected with node (mesh router) 1 and node 5, respectively, and a routing path (a red line) from node 1 to node 5 is established for serving the traffic of a live video streaming application. In addition, a laptop connected with node 10 runs a remote desktop application and receives data stream from a remote machine connected with node 9. At first, a routing path for the remote desktop application is established through nodes 9-3-4-10, and the remote desktop flow consumes 1.76 Mbps of bandwidth although its bandwidth requirement is 2.8 Mbps. After that, a live video streaming application starts and consumes bandwidth of 3 Mbps. Since the available bandwidth of the link between node 3 and node 4 is 3.24 Mbps, the link can accommodate the live video streaming flow. Then a routing path for the live video streaming application is established through nodes 1-2-3-4-5 as the shortest feasible path (i.e., the smallest end-to-end delay). However, the remote desktop application consumes more bandwidth due to user activity and frequent screen updates, and the aggregate bandwidth consumption of both applications exceeds the capacity of the common link from node 3 to node 4. Then congestion occurs at the link 3-4, and the transmission queue size continuously increases at node 3. This makes both applications contend at the link 3-4 using less bandwidth than requested.

If the routing protocol does not monitor this quality degradation, the routing paths for both applications will stay as originally discovered because this situation is not a link break. In order to solve this quality degradation, one or more routing paths need to be reconfigured. One possible option is to perform route discovery again for problematic flows treating this situation the same as link break. The route discovery for QoS-degraded flows could cause critical performance degradation since it stops all associated application flows on a routing path, and the applications experience disconnection until a new route is established. Figure 2 shows an effect of route discovery as a result of simulating our motivating scenario in the ns-3 network simulator. The result (a) shows a case that the underlying routing protocol does not respond to QoS degradation, and the result (b) is about the case that route discovery is performed for both application flows. If the network leaves QoS degradation, then the problem lasts until one of the contending flows stops. If routes are rediscovered for QoS degradation, the applications are completely disconnected until a new route is established for each one. For route discovery, we set a route discovery timeout for accepting multiple route reply messages as one second. In the right result, both flows trigger route discovery at the same time and their established routing path experience congestion again, which triggers another route discovery. That is, new routing paths for both applications would discover a routing path avoiding the link 3-4, and both of them establish new routes passing through the partial path 3-7-4. Thus, performing route discovery for every QoS-degraded flow is not desirable for an application layer in terms of user experience (UX). Although we can reduce the route discovery timeout to millisecond levels, the application layer disconnection is unavoidable. This motivates studying a fast and local route reconfiguration scheme for quickly resolving QoS degradation and preserving application goodput.

3. System Model

This section describes models for basic multi-constrained routing and congestion threshold estimation for detecting QoS degradation in a distributed manner using common notations.

3.1. Basic Multi-Constrained Routing Model

Our model is based on existing multi-constrained path algorithms [3, 8, 9]. We model the network of mesh routers as a directed graph , where is the set of nodes and is the set of links between two nodes and . For total link quality metrics (equals the number of constraints), there is a link quality for the th metric , , between two nodes and . A path is a sequence of links connecting nodes from a source node to a destination node . A path quality is a set of path quality values for the th metric , where is the aggregation of all associated links quality values for the th metric. The aggregation function is separately defined for each metric type. A metric type for a link quality metric has one of the following values: additive, multiplicative, concave, and maximum representative. For an additive metric type, a path quality should be the sum of all individual link quality values. The link quality aggregation function for metric is defined asFor a multiplicative metric type, the aggregation function becomes a product of all individual link quality values likeFor a concave metric type such as bandwidth, a bottleneck link is directly concerned to its end-to-end path quality. Thus, the aggregation function for a concave metric type is a minimum of all individual link quality values likeIn contrast to the concave metric, a maximum representative metric type requires a maximum value. The aggregation function is

A constraint for the th metric is defined as , and an application running on the network can specify its QoS requirement using a constraint set . Then the goal of a multi-constrained routing protocol is to find a feasible routing path that satisfies all . In order to check whether the routing path is feasible or not according to constraints , an evaluation function of and is necessary. Note that the evaluation criterion depends on the metric type . If is additive, the path quality that is the addition of all individual link’s quality should not exceed the constraint. If is concave, the minimum value of all link quality values should be bigger than the constraint. For example, a delay requirement given by an application should be the upper limit of the end-to-end delay of a path (smaller than the requirement). On the other hand, a bandwidth requirement becomes a lower bound to be achieved (greater than the requirement). Using the Iverson bracket [10] for representing boolean values, we define the evaluation function aswhere the result becomes either 0 or 1. If the value is 1, then the path is called feasible for the constraint . If the result of is 1 for all , then the path is feasible for all constraints. Therefore, we define a path evaluation function aswhere .

Using the path evaluation function, we can obtain a set of candidate paths such that . Then at least one or more paths should be selected for delivering application traffic. In other words, needs to be sorted. For this, we define an optimization function . As analyzed in [11], the optimization function may have various forms according to major application demands. In this paper, we use concave metrics, especially an available bandwidth, to define the optimization function. Since there can be multiple concave metrics, we exploit a normalized weighted sum. A path with the largest quality of concave metrics is considered optimal, which is described asfor all concave type constraints , where is a weighting factor of each concave type constraint.

Though many algorithmic approaches [2, 3, 12, 13] for finding multi-constrained paths focus on additive metrics, we also consider multiplicative, concave, and maximum representative metric types altogether because an application’s QoS requirement is represented with an arbitrary set of various QoS metrics. In the real world, bandwidth, one of the famous concave metrics, is widely used as a routing metric. Thus, we clearly express all metric types to be utilized for a multi-constrained routing protocol in practice. Moreover, the goal of this paper is to design and evaluate the effect of local repair by implementing a multi-constrained routing protocol with commonly used link quality metrics including bandwidth, end-to-end delay, delay jitter, and packet loss rate.

3.2. Congestion Threshold Estimation for Detecting QoS Degradation

We derive congestion threshold from a constraint, end-to-end path quality, and a path length for the th metric. The congestion threshold can only be calculated for a feasible path where . Then it is expected that there exists a remaining amount of the corresponding network resource for the metric . Such remaining amount of network resource can be used as a room for the current path to be deteriorated without losing feasibility. Now we can allow each link on the path to consume some of the remaining resource. We divide the remaining amount by the path length in order for each link to fairly consume the additional amount of network resource. The way of dividing the remaining amount of network resource depends on the metric type . We define as the congestion threshold of the th metric for a link .

If is additive, the remaining amount of network resource is calculated by simply subtracting the constraint with the end-to-end path quality, . By arithmetically dividing the remaining amount by the path length, we get the congestion threshold for an additive metric as

Figure 3 shows how the congestion threshold of an additive metric type is calculated for each link on a path from the source to the destination . The colored areas indicate the currently measured quality of each link, and the white area is the remaining amount of network resource for the th constraint. Because the quality of each link continuously changes over time, the congestion threshold is estimated periodically.

For a multiplicative metric, the way of obtaining the remaining amount of network resource is different from additive metrics because individual link quality values are accumulated by multiplication. We need to obtain how much additional value could be multiplied to the current path quality while feasibility is still maintained. So we divide the constraint by the current path quality . In order to derive the congestion threshold from the remaining amount of resource, we use square root of the path length. Thus, the resulting congestion threshold for a multiplicative metric is

For concave or maximum representative metrics, only the bottleneck or the maximum link quality of all links is meaningful. Thus, the congestion threshold must be the same as the constraint. The congestion threshold for both concave and maximum representative metrics is

As already described in (5) for a path , we can also define an evaluation function of a link with the congestion threshold as follows:

Let be a set of congestion thresholds for all metrics. Then, following (6) for a path , we define an evaluation function for a link with a set of congestion thresholds as follows:

If is one, then the link is considered as satisfying the application’s QoS requirement.

4. A Local Repair-Based Multi-Constrained Routing Protocol

This section explains how the proposed protocol dynamically and efficiently preserves the QoS requirement of a given end-to-end path based on local repair in the presence of QoS degradation due to network congestions. For this, the proposed protocol defines new modules and operations for local repair while it adopts the distributed source-based routing concept and the flooding-based route discovery procedure commonly used in existing multi-constrained routing protocols [14, 15].

4.1. Key Design Considerations

We consider the following key design issues for the proposed protocol:

(1) Estimating end-to-end path quality degradation from local network congestion in a distributed manner with a minimum cost: a WMN is a distributed environment where each mesh router measures multiple link quality metrics with neighbor nodes. It is very costly for a mesh router to keep track of the multiple link quality metrics of arbitrary nodes further than one-hop in which the search space exponentially increases by the number of nodes and the number of links. To monitor the changes in multiple quality metrics of a path, the source has to send a probing message to the destination so that the probing message could accumulate multiple quality metrics traversing every intermediate node on the path. QoS degradation can be detected by monitoring such end-to-end path quality, but it requires time for the probing message to travel along the path. Since each link can be monitored by each intermediate node (i.e., the receiver side of the link) without creating additional probing messages for aggregating path quality, estimating QoS degradation based on the network congestion of each link is desirable for fast degradation detection and low monitoring cost.

(2) Efficiently finding alternative intermediate paths for local congestion repair: as the network congestion in a certain link(s) is identified as a potential cause to end-to-end path quality degradation, a next job is to find alternative detour paths around the link. For this, the source node of the problematic link has to know the connectivity information of its neighbor (i.e., the neighbors of a neighbor) to find nodes which has a direct connection to both sides of the link. Then, in order for these neighbors to determine whether a detour path via each of them can assume the congestion that occurred at the link, they should get informed of the congestion threshold of the link.

(3) Selecting a detour path incurring a minimum negative effect on existing flows: if one of the alternative path candidates is randomly chosen without considering the flows that already use the path, it could cause a serious side effect: that is, such existing flows could experience network congestion due to an additional allocation of network resources for the alternative path, which in turn results in another local repair on nearby nodes and further. Therefore, we should minimize such consecutive occurrences of congestion, which we call the congestion domino effect. For this, the resource usage of existing flows around each alternative path candidate should be taken into account. However, it is not efficient to catch up with all different types of constraints for all neighbors. Among multiple constraints, we need to focus on the resource usage of the most important constraint which reduces the search space most. Concave or maximum representative metric types have the characteristic of pruning the search space, and one of the representative concave metrics is available bandwidth. Thus, the bandwidth occupation of existing flows nearby the detour path candidate should be considered for estimating the congestion domino effect.

4.2. Congestion Threshold Estimation and Link Evaluation

The congestion threshold of a link for a specific flow is estimated from the measurement of the link and the path associated with the flow. In order to maintain the information of a flow, the flow’s associated routing path, and real-time link quality, each node has three table structures: a flow table, a route table, and a neighbor table. The flow table is used for storing the information of a flow which passes through the node. The route table is an extension of a commodity route table in commodity operating systems in order to provide a route for a specific flow. The neighbor table maintains necessary information for multi-constrained routing and local repair including multiple link quality metrics and connectivity information of neighbors. The column structures of the tables are described in Figure 4. A flow table maintains necessary information for supporting QoS constraints of an individual application including the flow information (a flow ID, a source address, a source port number, a destination address, a destination port number, and a flow sequence number), a flag for checking QoS degradation, a LR Count for checking the number of local repairs performed, application-driven constraints, and the congestion threshold values for the associated link. A route table maintains route entries based on a flow as an identifier so that a next-hop can be found using a flow ID. There are also default routes which provide all background traffic without specifying flow information. A neighbor table manages multiple link quality metrics for all neighbor nodes which are directly connected with a single-hop link. Based on piggybacked Hello messages, it also maintains the list of neighbors of each neighbor and the average available bandwidth of them, thereby catching up the traffic status of the two-hop scope.

In this paper, we use four different link quality metrics: available bandwidth (concave), delay (additive), delay jitter (additive), and packet loss rate (multiplicative). Available bandwidth can be estimated in various ways such as exchanging probing packets or calculating idle times of the network interface [16]. Because iperf, a well-known bandwidth benchmarking tool, generates many packets, it is not desirable to continuously run it due to network overhead. The available bandwidth estimation scheme based on idle times is suitable for WMNs because we can exploit current modulation scheme and channel idle ratio for estimating available bandwidth. For delay measurement, two nodes on a link measure a round trip time (RTT) using probing messages and divide by two to obtain the one-way link delay. Delay jitter is calculated by the difference of consecutive arrivals of probing messages used for measuring the RTT [17]. To obtain packet loss rate, we count the number of successfully received probing messages for a certain duration and get the portion of the successful receptions over the total expected number of receptions, which is proposed in the Expected Transmission Time (ETX) [18]. We use Hello messages for the probing message for the packet loss rate.

As illustrated in (8), (9), and (10), the congestion threshold at each link depends on the quality of both an individual link and an end-to-end path. Link quality can be measured at any time in each intermediate node, but the end-to-end path quality should be shared through message passing along the path. For this, we define two types of probing messages: PathProbe and PathQualityReport.

The role of a PathProbe message is to measure the end-to-end path quality by traversing individual links of the path. A source node periodically creates a PathProbe and unicasts it to the next-hop of the path. The period of sending PathProbe messages is set to one second. A PathProbe contains flow information, a flow sequence number, a QoS requirement length, a QoS requirement field, a path quality length, and a path quality field. The path quality field is used for accumulating multiple link quality metrics over the path. In order to reduce the size of control messages, the QoS requirement field is by default empty (i.e., QoS requirement length is zero) unless the application changes its requirement. If the QoS requirement length in the PathProbe is zero, each intermediate node loads the existing QoS requirement from its flow table using the flow information written in PathProbe. Otherwise, each intermediate node updates its flow table with the new QoS requirement, in other words, a set of updated constraints.

A destination node receiving the PathProbe replies back to the source with a PathQualityReport through the reverse path of the flow. The role of the PathQualityReport is to share the measured end-to-end path quality with source and intermediate nodes on the path. A PathQualityReport contains a flow, a flow sequence number, a path quality length, and a path quality field. The destination copies flow information, a flow sequence number, and the path quality information from the received PathProbe into a new PathQualityReport. Intermediate nodes receiving the PathQualityReport updates its flow table with the path quality field in the message. Using the new path quality, the intermediate node calculates the congestion threshold of a link between itself and its predecessor. Until next PathQualityReport reception, the intermediate node uses the congestion threshold for evaluating its associated link.

Using the congestion threshold, each intermediate node checks whether its corresponding link satisfies the congestion threshold, which is associated with a link evaluation function in (11). As we measure link quality on the receiver side (i.e., successor) of the link, the link evaluation is also performed at the receiver side. Note that the period evaluating each link is independent of that sending PathProbe. It depends on the updating cycle of link quality metrics such as available bandwidth or delay. The procedure updating the congestion threshold for each link is done by the round trip of PathProbe and PathQualityReport messages between a source and a destination. On the other hand, the procedure evaluating each link’s QoS degradation runs in an independent thread without being affected during exchanging PathProbe and PathQualityReport messages. The link evaluation cycle based on the congestion threshold can be adjusted to the speed at which each intermediate node measures the link quality. The intermediate node may actively reduce the link evaluation cycle as needed to predict the QoS degradation or, conversely, increase the evaluation period to reduce the computation overhead of each intermediate node. Since both a Hello messaging interval and a delay measurement cycle are one second in our scheme, we also set the link evaluation cycle as one second by default.

Due to the mobility of mesh clients which also act as data sources, application traffic in the network may change over time. When a mesh router serves an application flow generated by a specific mesh client, then the flow can be disconnected and restarted at another mesh router due to the client’s movement. Then, this mesh router may experience congestion if there are other existing flows. On the other hand, the previous mesh router may be mitigated by the mesh client. In order to handle such dynamic situations, we define the QoS degradation threshold, which indicates the consecutive number of QoS degradation occurring at the same flow. For this, we run the evaluation function periodically per unit time. In this paper, we set the QoS degradation threshold to three.

4.3. Local Repair based on Congestion Domino Effect

If any intermediate node finds its link evaluation function yields a false result, the link is treated as QoS-degraded. Then the node starts investigating whether any of its neighbor nodes can provide a detour path for the QoS-degraded flow. The detour path has the following conditions: (1) a new intermediate node in the middle of the detour path must be directly connected to both the predecessor and successor of the QoS-degraded link; (2) the detour path must satisfy the congestion threshold of the QoS-degraded link, which is feasible in other words. The procedure of searching a set of detour paths is described in Algorithm 1.

procedure SEARCHDETOUR
          A set of detour paths
COMMONNEIGHBOR
for all    do
    A candidate detour path
.append()
if    then
else
if   and   then
SEARCHDETOUR()
end if
if   and   then
SEARCHDETOUR()
end if
end if
end for
return  
end procedure
procedure COMMONNEIGHBOR
      A set of common neighbors of
for all    do
if    then
end if
end for
return  
end procedure

Based on connectivity information, an intermediate node of a certain link recognizing QoS degradation searches a set of common neighbors of both the source and the sink of the link. One common neighbor has a two-hop detour path starting from the source of the QoS-degraded link and ending at the sink passing through the common neighbor node. Since the intermediate node (the source of the degraded link) already knows the quality of a link between itself and the common neighbor, it writes the link quality to a new control message called Flow Accept Request (FAREQ). The role of a FAREQ is to ask the common neighbor to check whether the detour path including itself can accept a new flow. The FAREQ contains flow information, a flow sequence number, a time-to-live (TTL) value, congestion thresholds of all metrics, and path quality. The common neighbor node receiving the FAREQ accumulates the quality of a link between itself and the sink of the original link to the path quality field and evaluates it with the congestion threshold. If the detour path is determined feasible by the link evaluation function, then the common neighbor node replies back to the intermediate node with a control message called Flow Accept Reply (FAREP). A FAREP message contains route information of the feasible path, the path quality, and a set of a representative concave metric as the average of all neighbors’ measurement values. In this paper, the representative concave metric is bandwidth, and the average available bandwidth of all neighbors of the common neighbor can be obtained by accessing the neighbor table in the common neighbor. The Hello message contains the list of neighbors and their bandwidths.

The TTL field in the FAREQ is the maximum number of hops to search detour paths. The TTL value one indicates that a QoS-degraded link can be replaced with its one-hop common neighbors. If the TTL is two, a common neighbor whose corresponding detour path is infeasible can search another detour path for its link. Thus, TTL value more than or equal to two can make our proposed scheme to search detour paths recursively. Figure 5 shows the different sets of candidate detour paths according to the TTL values of the FAREQ. When the TTL is one, two detour paths and are found, and is the only feasible path to be repaired. If the TTL is two, then one more candidate detour path can be additionally found. At least feasible, the link can be replaced with one of the feasible detour paths which has the least congestion domino effect.

The congestion domino effect of each feasible detour path is estimated using a concave metric of the neighbors nearby the detour path. If there are multiple different concave metrics measured in the network, we set one of them as a representative metric for all concave metrics. This is because a concave metric can reduce the search space of multi-constrained routing protocols by pruning. For example, if the available bandwidth of a link does not satisfy a bandwidth constraint of a certain application, then all multihop paths passing through that link cannot support the application. Moreover, making each common neighbor to measure all link quality metrics of its neighbors is costly. Therefore, in practice, each common neighbor node calculates an average available bandwidth of all links to its neighbors to estimate the congestion domino effect. The procedure of selecting an optimal path among all candidate detour paths considering the congestion domino effect is illustrated in Algorithm 2.

procedure GETOPTIMALDETOUR
for all    do
if   is concave and representative then
if    then
end if
end if
end for
return  
end procedure

If an optimal detour path is selected among candidates, the intermediate node of the original QoS-degraded link informs all other nodes of the routing path with the locally repaired path. This is the same operation as a source of a newly discovered routing path notifies all nodes on the routing path to update their routing tables. We define a control message called RouteSetup to update routing path information of all nodes. The intermediate node sends a RouteSetup message including the updated source route information to both source and destination, and all intermediate nodes on the way to source and destination updates their routing table.

There may be multiple simultaneous flows running on the same link. If an intermediate node finds the results of its link evaluation function for multiple flows as false, then the node needs to choose which flow should be locally repaired. We select a flow which has the biggest concave constraint (i.e., the biggest bandwidth requirement). If there are multiple concave metrics, we consider the representative one of them for comparison. This is because bandwidth bottleneck can lead to increased delay due to congestion. If there are still QoS-degraded flows on the link after handling one flow with local repair, then at the next time step, another flow affecting the most in terms of the representative concave metric is handled with local repair.

In order to handle a case when there are multiple simultaneous links whose evaluation function is false on the same path, we set a random backoff time for triggering the local repair operation. If an intermediate node receives FAREQ or FAREP messages of other nodes for the same flow, then the node resets its QoS degradation threshold for the flow. The QoS degradation threshold will be increasing after the previous local repair by another link is done. The result of the previous local repair can also affect the current link quality and congestion threshold at the next time of updating path quality with a PathQualityReport. If the result of the previous local repair is good enough, then there will be no more local repair operations to be triggered. Otherwise, the link which once reset its QoS degradation threshold will also be locally repaired. However, performing local repairs too many in a routing path is not desirable because the result of local repair increases the total path length by one or up to the size of the TTL in the FAREQ.

If the intermediate node of a QoS-degraded link finds no detour path, then it creates an extension of the Route Error (RERR) called Application-Aware Route Error (ARERR) and sends it to the source. An ARERR message includes flow information and a current flow sequence number. The difference between RERR and ARERR is their triggering condition; an RERR is created when a link break occurs while an ARERR is created when QoS degradation cannot be solved by local repair. The ARERR message is also sent when the number of local repairs performed in the same path exceeds a threshold called maximum local repair threshold. The number of local repairs can be obtained from the LR Count field in the flow table. This is because the path length increases after local repair, and continuous local repairs may lead to inefficiency of the path. Thus, we limit the number of local repairs on the same path using the local repair threshold.

Figure 6 illustrates the overall flow of monitoring QoS degradation of a link, searching a set of candidate detour paths, and selecting an optimal detour path to be locally repaired.

4.4. Computational Complexity Analysis

We compare the computational complexity of the proposed local repair scheme with that of the existing flooding-based route discovery in terms of time and space. In general, the operation of flooding-based route discovery is similar to the breadth first search (BFS), and the time complexity of the BFS is . Since the scope of route discovery is usually set by a limiting factor such as a maximum hop count, we can represent the time complexity of route discovery in a different form, , where is the average number of neighbor nodes and is a maximum hop count. This is the time complexity of a general connectivity-based route discovery which means having a single additive constraint. Then for the route discovery with multiple (additive) constraints, the time complexity is , where is the number of constraints. On the other hand, the proposed local repair scheme searches the common neighbors of an intermediate node within a certain scope specified by TTL. Thus, if local repair is successfully performed, then the time complexity is , where is the TTL value of the FAREQ. However, if no detour path is found during local repair, then the time complexity becomes because route discovery is performed after the detour paths search. Considering that in practice, then the worst case time complexity of the proposed local repair scheme is the same as route discovery, . Note that and in this paper.

We secondly consider the space complexity of multi-constrained route discovery and the proposed local repair scheme. Basically in route discovery with a single additive constraint, every node has to be checked for finding feasible paths between two arbitrary nodes. Thus, the space complexity is . Under the assumption of the maximum hop count , then the time complexity can be represented as . Thus, the space complexity of multi-constrained route discovery is . In case of the proposed local repair scheme, the number of nodes to be checked are within the TTL of the FAREQ. The space complexity is if local repair is successfully performed. For the worst case, the space complexity of the proposed scheme is the same as the route discovery.

With mesh routers equipped with multiple radio interfaces (i.e., multi-radio WMNs), there can be a number of common neighbors between mesh routers, and detour paths can be easily found with the proposed local repair scheme. Thus, worst case time complexity would not occur frequently unless the whole network is highly congested. Considering time and space complexity, it is evident that the proposed scheme can significantly reduce both time and space complexity.

5. Evaluation

In this section, we discuss the effectiveness of the proposed routing protocol. We compare the proposed scheme with an existing multi-constrained routing protocol using four constraints: bandwidth, delay, delay jitter, and packet loss rate. The operations of the existing work are based on a distance vector-based source routing as well as the proposed scheme. Our evaluation metrics are as follows:(i)Application goodput as the amount of actual data consumed by an application layer per unit time(ii)The QoS degradation ratio as the time portion of degraded QoS levels for the total time of each application session(iii)The routing overhead as the amount of control messages for multi-constrained routing operations including route discovery and local repair(iv)The number of route discoveries as the total number of flooding-based route discovery operations throughout the simulation

5.1. Simulation Settings

We evaluate the proposed scheme and the existing work using ns-3 network simulator [19]. Based on the usage of WMNs in practice as described in [20], mesh routers are connected with each other using multiple IEEE 802.11g interfaces with 11 Mbps bandwidth and 2 ms delay. Mesh clients equipped with one IEEE 802.11g interface use a 2.4 GHz channel, and mesh routers have three network interfaces, one for connecting mesh clients and others for connecting with neighbor mesh routers. Mesh routers use three different channels for minimizing interference. The transmission range of all wireless channels is set to 120 meters. In the two-dimensional area of 500 × 500 m2, we place 30 mesh routers with uniform random distribution. We generate five different network topologies and obtain the average results with the same data point of simulations. Each mesh router has connections with its neighbor mesh routers based on their transmission range. We assume that all mesh routers are connected without network partitions. One of the network topologies of mesh routers we generated is illustrated in Figure 7. For mesh clients, we apply node mobility using the random waypoint model with a speed between zero to five m/s and a 10-second pause time.

We generate multiple application flows using a randomized sets of sources and destinations, in which destination nodes are different from their source and uniformly distributed in the network as well as done in the literature [8, 11]. For our experiments, we use a live video streaming application which has four QoS constraints: bandwidth, delay, delay jitter, and packet loss rate. Whether a flow satisfies its bandwidth requirement can be evaluated by application goodput. The goodput of a live video streaming application is the amount of playable data arriving at the application layer of the destination per unit time. If a data frame arrives at the destination later than its play time, then the data is discarded by the application. The size of data packets is 1024 bytes, and we vary the packet sending rate per unit time for making different conditions of network congestion. For live streaming applications, we set the QoS requirement of each flow as 1.229Mbps to 2.294Mbps, ms, ms, and , where the set of constraints is bandwidth, delay, jitter, packet loss . The bandwidth constraint is varying based on the packet sending rate of each flow from 150 to 280 packets/s.

The simulation time is 100 seconds, and all application flows randomly start and stop within the simulation time while keeping a condition that the session time is at least 50 seconds. We run 20 repetitions for each individual setting of simulation and average their results. In the proposed scheme, a local repair scope based on the TTL value of a FAREQ is varying with one and two, which we call TTL-1 and TTL-2, respectively. The interval of a link evaluation function for detecting QoS degradation is set to one second. The QoS degradation threshold of each link is fixed with three. Major simulation parameters are described in Table 1.

5.2. Application Goodput

In this section, we compare the goodput of live video streaming applications for the proposed scheme and the existing work. We aggregate the goodput of all flows for the live video streaming application in the network. Figure 8 shows the aggregate goodput of the existing work and the proposed schemes with two different local repair scopes. Both the proposed schemes outperform the existing work for all number of flows we tested, showing the most performance gain of 16.6% when 17 flows are generated. The tendency of the goodput gap between the existing work and the proposed scheme gets increasing when more flows are generated. This means that the increasing number of flows incur more congestion, and the difference of resolving the congestion leads to the performance gap. The existing work performs route discovery for every QoS degradation while the proposed scheme runs local repair when there are candidate detour paths nearby the QoS-degraded link. Because route discovery affects application session and takes longer time than the local repair we proposed, the goodput of the existing work gets reduced when more route discovery occurs. Figure 9 illustrates the aggregate goodput of the proposed scheme and the existing work with different packet sending rates per flow if the number of flows is fixed to 16. The packet sending rate indicates the bandwidth requirement of each application flow. The proposed scheme outperforms the existing work with up to 19.6% goodput gain for TTL-2. As the bandwidth consumption of each flow increases, the probability of congestion with other overlapping flows on the same link also increases. Since such congestion is resolved with lower cost and shorter time in our proposed scheme, resulting goodput becomes higher than the existing work where route discovery is performed for every congestion. Figure 10 shows the goodput of the proposed scheme and the existing work with the varying maximum speed of mesh clients from zero to 20 m/s. We fix the number of application flows to 16. As the mobility increases, the application sessions experience more disconnection and route discovery is performed more frequently. Due to the mobility, existing flows also get affected by newly discovered paths due to congestion. The proposed scheme recovers congested flows more rapidly than the existing work, gaining up to 27% higher goodput. For different TTL values in the proposed scheme, the scheme with TTL-2 outperforms the case of TTL-1 because the local repair with a one-hop scope did not find any detour path for some degraded links. If there is no detour path, route discovery is triggered for the flow which failed the local repair. On the other hand, the proposed scheme with TTL-2 can search a detour path from neighbors within two hops, and the probability of finding a detour path becomes higher than TTL-1.

5.3. QoS Degradation Ratio

We measure the QoS degradation ratio of each flow with the proposed scheme and the existing work, varying the number of flows in the network. Figure 11 illustrates changes in the average QoS degradation ratio of all flows in the network. The proposed scheme outperforms the existing work in most cases showing up to 39.6% reduction for TTL-2 with 17 flows. The proposed scheme with TTL-1 shows similar results with the existing work when the number of flows is less than or equal to 12. This is because the local repair with the information of only one-hop neighbors fails for some cases which lead to route discovery. The gap of QoS degradation ratio between the proposed scheme (TTL-2) and the existing work increases until 18 flows and gets closer in 19 and 20 flows where the network becomes saturated. This is because the QoS degradation of some flows cannot be recovered by local repair, or the number of local repairs for the flows exceeds the maximum local repair threshold per flow. Then those flows have an only option to perform route discovery to handle QoS degradation, the same as the existing work. But the proposed scheme still outperforms the existing work for all cases because some other flows are recovered by local repair. Figure 12 depicts changes in the average QoS degradation ratio of 16 flows with varying maximum speed of mesh clients. Due to the movement of mesh clients, some application sessions starting from the moving nodes are disconnected and recovered by route discovery for both the existing work and the proposed scheme; thereby overall QoS degradation ratio is increased by the movement speed of mesh clients. Except such route discovery, the proposed scheme recovers congested flows with local repair, reducing up to 5.8 percent point. Figure 13 shows the number of route discoveries with varying number of flows. As the QoS degradation ratios of the existing work and the proposed scheme with TTL-1 are similar for 10-12 flows, the numbers of route discovery of those two schemes are also similar for the same conditions. One can find that there is a tendency that the more the number of route discoveries, the more the QoS degradation ratio of flows. Figure 14 shows the number of route discoveries with varying maximum speed of mesh clients where 16 flows are running on the network. Overall, due to the movement of mesh clients which are source nodes of some flows, the number of route discoveries increases with the node speed. For the existing work, although some flows are not disconnected by mobility, they get rediscovered due to QoS degradation generated by other flows. Since the proposed scheme recovers those flows with local repair, the number of route discoveries is reduced up to 27.9% at the maximum speed of 5 m/s.

5.4. Routing Overhead

We measure the routing overhead of the existing work and the proposed scheme in terms of the amount of control messages for routing operations throughout a simulation. We obtain the routing overhead by dividing the total amount of packets generated with the amount of routing control messages, where both values are represented in bytes. We exclude control messages for link quality measurement which shows no difference among all schemes (i.e., they are basically generated for one-hop neighbors). We measure the amount of control messages for recovering a QoS-degraded routing path in the proposed scheme and the existing work. Under the same environment of the motivating scenario in Figure 1, we artificially generate QoS degradation for the link 3-4 and check the amount of control messages generated until the route is recovered by local repair or route discovery. For the proposed scheme, we consider the case when no detour path is found.

Table 2 shows the amount of routing control messages for the proposed schemes with different TTL values and the existing work in bytes. The number in the parenthesis indicates the number of control messages generated. The Application-Aware Route Request (ARREQ) and Application-Aware Route Reply (ARREP) messages are extension to Route Request (RREQ) and Route Reply (RREP) messages used for distance vector-based ad-hoc routing protocols such as AODV [21] and DSR [22]. The ARREQ message indicates a route discovery message that floods over the network by broadcast, which contains a flow information, QoS requirements as constraints, an end-to-end path quality field for accumulating link quality values of multiple hops. The ARREP message is the reply of an ARREQ generated by a destination node including the end-to-end path quality. If local repair is successfully performed, the amount of control messages are much smaller than the existing work, consuming up to 7.6% of the control messages for route discovery. In the proposed scheme, an intermediate node which detects QoS degradation unicasts FAREQ messages to the subset of its neighbors which are common neighbors of the degraded link. The neighbors receiving the FAREQ only generate an FAREP message and send it to the intermediate node. The result of local repair is also shared through the routing path from the intermediate node to the source (SourceRouteUpdate) and the destination (RouteSetup). Likewise, a minimum number of control messages are generated and delivered by unicast. When local repair in our proposed scheme fails to find any alternative detour path, the proposed scheme generates slightly more control messages than the existing work. The Failed column of each proposed scheme shows that ARERR, ARREQ, and ARREP messages are generated the same as the existing work. This is because the control messages for local repair and route discovery are aggregated. However, such failure does not always occur in the network, and our simulation results with randomized environments show that the local repair is effective for reducing the routing overhead.

Figure 15 illustrates the amount of routing control messages in bytes as increasing the number of flows in the network with 30 mesh routers. The proposed scheme outperforms in all cases reducing the control overhead up to 33% for TTL-2 compared with the existing work. With less than 14 flows, the gap between the proposed scheme and the existing work is small because QoS degradations do not occur frequently. When the network becomes congested more than or equal to 14 flows, the existing work triggers route discovery more than the proposed scheme as shown in Figure 13, which results in more routing control messages. When the network gets saturated with more than or equal to 19 flows, the amount of routing control messages of the proposed scheme increases because it is difficult to find alternative detour paths. Figure 16 depicts the amount of routing messages under different maximum speed of mesh clients with 16 flows in the network. Due to increased number of route discovery shown in Figure 14, overall amount of routing messages is increased with the mobility speed. The proposed scheme performs local repair for flows which are not disconnected by mobility, and up to 28.1% of routing messages are saved preventing unnecessary route discovery for resolving congestion.

Figure 17 shows the routing overhead incurred with increasing packet sending rates of each flow when the number of flows is fixed to 16. The routing overhead is the portion of routing control messages for all generated packets in the network. In general, the routing overhead of all schemes go down as the packet sending rate increases because the amount of data packets generated per unit time increases linearly. At the 200 packets/s, QoS degradation increases due to network congestion. From the point, the existing work incurs more number of route discoveries, and the amount of control messages for such route discovery affects the routing overhead to increase. The proposed scheme shows lower routing overhead from 200 packets/s because of smaller number of route discoveries than the existing work. The proposed scheme reduces routing overhead up to 25.11% at 250 packets/s with TTL-2. The gap of routing overheads for the existing work and the proposed scheme gets closer after 260 packets/s because the overall network becomes saturated and it is getting difficult to find alternative detour paths with local repair.

5.5. Discussions

A wireless channel is a shared medium where one device can transmit signal at a time. If three devices are consecutively connected with two wireless links using the same channel in two hops, those two links cannot be used at the same time for transmission due to signal interference. This means that if one link is used by a certain application traffic, the available bandwidth of another neighboring link is also reduced. In this paper, we assume that the available bandwidth between any pair of mesh routers is not affected by other neighboring links because our focus does not cover the interference modeling of wireless links. This is a complementary work that can be applied to available bandwidth measurement. Moreover, since mesh routers are generally assumed to be equipped with multiple radio interfaces with multiple orthogonal channels, existing solutions on channel assignment can be exploited further [23].

The proposed protocol may incur higher cost in terms of maintaining control messages and contexts than existing multi-constrained routing protocols but the evaluation result shows that it is worthy to support fast route recovery in a distributed manner. Because a mesh router is fundamentally an embedded system with limited computing resources, one can have questions on the load of supporting the proposed scheme. The capacity of wireless mesh routers are getting improved equipping multiple cores and more memory spaces, and functionalities for supporting QoS are continuously added into commodity devices. The proposed routing protocol is compatible with existing connectivity-based routing information which additionally handles information of flows and their contexts (QoS requirements, path quality, etc.). We can quickly search and identify data using flow information as an identifier, and the flow structure can be used as a key of hashing for fast and cost-efficient search. Moreover, as shown in simulation results, the proposed scheme can actually reduce the total amount of control messages on realizing QoS-aware routing.

Another concern is the integration with Software Defined Networking (SDN) using programmable networking principles. SDN is being actively applied to WMNs for its flexible and intelligent control of mesh routers considering QoS [2426]. Since the proposed local repair-based multi-constrained routing protocol is based on existing link quality measurement schemes and the extension of distance vector routing principles, our scheme can be easily applied to the SDN environment. One thing we need to concern is that the local repair operation is based on distributed routing. If an SDN controller is a centralized entity, every single context of mesh routers required for deciding an optimal alternative detour path needs to be shared with the controller, which would dramatically increase control overhead. However, by applying the concept of distributed controllers [24], some specific network contexts which are only required for neighboring mesh routers can be localized reducing the cost.

Finding a routing path with multiple different QoS metrics has been actively studied. It is known that the problem of finding an optimal path with multiple additive constraints is NP-Hard [3, 27, 28]. In order to reduce the time complexity, some approaches have defined a single aggregated metric calculated from multiple metrics [29, 30]. Although they reduce the search space the same as well-known shortest routing algorithms, this might not satisfy the requirement of applications because the single aggregated value may not guarantee the constraint of some specific metrics. In order to make a path with the best single aggregated value which could be also in the set of feasible paths, a number of heuristic algorithms have been proposed [24, 8, 9, 12, 13, 31] in which nonlinear functions are generally utilized. Since there may exist several feasible paths between the same source and destination pair, the routing protocol needs to select one of them. Such selection is done by using an optimization function or a utility function which is similar to the single aggregated metric. The type of optimization functions includes the weighted sum of all metrics [32, 33] and the utilization of only one or some of metrics based on priority [2, 3, 12]. In order to support different application requirements, authors in [11] define multiple optimization functions each of which emphasizes different parameters based on different purposes such as energy efficiency, smaller interference, or the shortest path length.

All aforementioned works mainly focus on discovering a new routing path satisfying multiple constraints. However, handling the QoS degradation of already-established paths is not considered. Most works use route discovery for the routing path that violates the QoS requirement of its corresponding application. Another option for recovering such QoS-degraded routing path is local repair. Local repair approaches have been proposed mainly in mobile ad-hoc network (MANET) routing protocols [21, 22]. The major purpose of local repair is to find a detour path which maintains end-to-end connectivity between a source and a destination under dynamic environments. It enables each intermediate node on the path to discover a new routing path between the intermediate node to the destination without the intervention of the source, thereby reducing the cost of route discovery. However, existing connectivity-based local repair schemes cannot meet the QoS requirement with multiple constraints. In the viewpoint of connectivity-based local repair approaches, QoS degradation is not the case for triggering local repair. There has been a multi-constrained routing approach to reduce the route discovery cost when QoS degradation occurs in the middle of a routing path [34]. It uses a probing message that traverses the multi-hop path from a source to a destination and accumulates link quality from the source. Then the routing protocol finds a problematic link where the end-to-end QoS requirement is violated. An intermediate node associated with the problematic link triggers local route discovery from itself to the destination considering multiple constraints. Likewise, the cost of flooding could be reduced by a smaller search space. However, this is still a flooding-based approach, and the effect of cost reduction would be small if a problematic link is closer to the source of the original path.

Therefore, most existing connectivity-based local repair schemes and one approach with multiple constraints use localized flooding. Though the search space can be reduced, the time taken by localized route discovery depends on the position of an intermediate node which finds QoS degradation. Our proposed scheme differs from the aforementioned local repair schemes because we replace the problematic link with a detour path from the predecessor to the successor of the link based on the set of multiple localized constraints.

7. Conclusion

We proposed a local repair-based multi-constrained routing protocol for public WMNs. For fast and cost-efficient route recovery in case of QoS degradation on the routing path, we modeled novel QoS degradation detection by estimating congestion threshold for each link based on its link quality, end-to-end path quality, and multiple constraints. We designed algorithms for finding alternative detour paths for a QoS-degraded link and selecting an optimal one considering the minimum negative effect on existing flows nearby the detour path. Based on the piggybacked information of each neighbor’s average bandwidth consumption as a concave link quality metric, we could estimate the negative effect on nearby flows and reduce the search space of alternative detour paths. We showed that the proposed routing protocol outperforms the existing work with higher application goodput and smaller routing overhead under congested network environments.

Data Availability

The routing protocol implementation on ns-3 and simulation results data used to support the findings of this study are available from the corresponding author upon request.

Conflicts of Interest

The authors declare that they have no conflicts of interest.

Acknowledgments

This work was supported by Institute for Information & Communications Technology Promotion (IITP) grant funded by the Korea government (MSIT) (No. 2016-0-00160, Versatile Network System Architecture for Multidimensional Diversity, and No. 2017-0-00537, Development of Autonomous IoT Collaboration Framework for Space Intelligence).