You are on page 1of 7

PROCEEDINGS OF ― 4th NATIONAL CONFERENCE on ADVANCED COMPUTING

TECHNOLOGIES(NCACT‘11) ― on FEBRUARY 2,2011 @ S.A.ENGINEERING COLLEGE

EFFICIENT ROUTING BASED ON LOAD


BALANCING IN WIRELESS MESH NETWORKS
*S. Sumathi, **S.Bharathiraja
Vel Tech Multi Tech Dr.Rangaragan & Dr.Sakunthala Engineering College, Anna University
Avadi, Chennai, India
*sumathikumarapandian@gmail.com
**bharathiraja.88s@gmail.com

Abstract—In This paper proposes a usually equipped with multiple wireless


clustered routing scheme for wireless interfaces built on either the same or different
mesh networks (WMNs). In a WMN, the wireless access technologies.
traffic load tends to be unevenly Inspite of all these differences, mesh and
distributed over the network. In this conventional wireless routers are usually built
situation, the clustered routing scheme based on a similar hardware platform. Mesh
can balance the load, and consequently, routers have minimal mobility and form the
enhance the overall network capacity. mesh backbone for mesh clients. Thus,
We design a routing scheme which although mesh clients can also work as a
maximizes the utility. In this system router for mesh networking, the hardware
WMN is divided into multiple clusters for platform and software for them can be much
load control. A cluster head estimates simpler than those for mesh routers. For
traffic load in its cluster. In this paper example, communication protocols for mesh
we propose an algorithm to network clients can be light-weight, gateway or bridge
these mesh nodes in to well define functions do not exist in mesh clients, only a
clusters with less-energy-constrained single wireless interface is needed in a mesh
gateway nodes acting as cluster heads, client, and so on.
and balance load among these gateways. In the WMN, a great portion of users
Simulation results show how our intends to communicate with outside networks
approach can balance the load and via the wired gateways.In such environment,
improve the lifetime of the system. the wireless links around the gateways are
Keywords— Wireless mesh networks, likely to be a bottleneck of the network. If
cluster head therouting algorithm does not take account of
the traffic load,some gateways may be
Introduction overloaded while the others maynot. This load
T IN Wireless mesh networks (WMNs) are imbalance can be resolved by introducing a
dynamically self-organized and self-configured, load-aware routing scheme that adopts the
with the nodes in the network automatically routing metric with load factor. When the
establishing an ad hoc network and load-aware routing algorithm is designed to
maintaining the mesh connectivity. WMNs are maximize the system capacity, the major
comprised of two types of nodes: mesh benefit of the load-aware routing is the
routers and mesh clients. Other than the enhancement of the overallsystem capacity
routing capability for gateway/bridge functions due to the use of underutilized paths.Although
as in a conventional wireless router, a mesh there have been some works on load-aware
router contains additional routing functions to routing for mobile ad-hoc networks andWMNs
support mesh networking. Through multi-hop , they simply include some load factors in the
communications, the same coverage can be routing metric without consideration of
achieved by a mesh router with much lower thesystem-wide performance.In this paper, we
transmission power. To further improve the propose a load-aware routing scheme,which
flexibility of mesh networking, a mesh router is maximizes the total utility of the users in the

395
PROCEEDINGS OF ― 4th NATIONAL CONFERENCE on ADVANCED COMPUTING
TECHNOLOGIES(NCACT‘11) ― on FEBRUARY 2,2011 @ S.A.ENGINEERING COLLEGE

WMN.The utility is a value which quantifies and the multi radio link quality source routing
how satisfied a user is with the network. Since (MR-LQSR), respectively. The WCETT is a
the degree of user satisfaction depends on the modification of the ETT to consider the intra
network performance, the utility can begiven flow interference. While the WCETT only
as a function of the user throughput. considers the intra flow interference, the MIC
Generally, the utility function is concave to and the interference aware (iAWARE) take
reflect the law of diminishing marginal utility. account of the interflow interference as well as
To design the scheme, we use the dual the intra flow interference.
decomposition method for utility maximization The mETX and the ENT are
.Using this method, we can incorporate not proposed to cope with the fast link quality
only the load aware routing scheme but also variation. These routing metrics contain the
congestion control and fair rate allocation standard deviation of the link quality in
mechanisms into the WMN. Most notably, we addition to the average link quality. The
can implement the load-aware routing scheme blacklist-aided forwarding (BAF) algorithm in
in a distributed way owing to the structure of explains to tackle the problem of shortterm
the dual decomposition method. link quality degradation by disseminating the
In the proposed routing blacklist, i.e., a set of currently degraded links.
scheme, a WMN is divided into multiple The ExOR algorithm explains the next hop
overlapping clusters. A cluster head takes role after the transmission for that hop without
of controlling the traffic load on the wireless predetermined routes. The ExOR can choose
links in its cluster. The cluster head the next hop that successfully received the
periodically estimates the total traffic load on packet, and therefore, it is robust to packet
the cluster and increases the ―link costs‖ of error and link quality variation. The resilient
the links in the mesh client. . In this paper we opportunistic mesh routing(ROMER) algorithm
propose an algorithm to network these mesh uses opportunistic forwarding to deal with
nodes in to well define clusters with less- short-term link quality variation. The
energy-constrained gateway nodes acting as ROMER maintains the long-term routes and
cluster heads, and balance load among these opportunistically expands or shrinks them at
gateways. Simulation results show how our runtime.
approach can balance the load and improve The ad hoc on-demand distance
the lifetime of the system vector spanning tree (AODV-ST) is an
adaptation of the AODV protocol to the WMN
2 RELATED WORKS with the wired gateways. The AODV-ST
For the WMN, a number of routing constructs a spanning tree of which the root is
metrics and algorithms have been proposed to the gateway. A routing and
take advantage of the stationary channel assignment algorithm for the
topology. The first routing metric is the ETX , multichannel WMN.
which is the expected number of In this algorithm, a spanning tree
transmissions required to deliver a packet to is formed in
the neighbor. In minimum loss (ML) metric such a way that a node attaches itself to the
this is used to find the route with lowest end- parent node.
to-end loss probability. The medium time The load-aware routing protocols incorporate
metric (MTM) is proposed for the multirate the load factor into their routing metrics. The
network.The MTM of a link is inverse dynamic load-aware routing (DLAR) takes as
proportional to the physical layer transmission the routing metric the number of packets
rate of the link. The ETT is a combination of queued in the node interface. The load-
the ETX and the MTM. The ETT is a required balanced ad hoc routing (LBAR) counts then
time to transmit a single packet over a link in umberof active pathson a node and its
the multirate network, calculated in neighbors, and uses it as a routing metric.
consideration of both the number of Both the DLAR and LBAR are designed for the
transmissions and the physical layer mobile ad hoc network, and aim to reduce the
transmission rate. packet delay and the packet loss ratio. An
The routing metric and algorithm admission control and load balancing
for the multiradio WMN, which are the WCETT algorithm is proposed for the 802.11 mesh

396
PROCEEDINGS OF ― 4th NATIONAL CONFERENCE on ADVANCED COMPUTING
TECHNOLOGIES(NCACT‘11) ― on FEBRUARY 2,2011 @ S.A.ENGINEERING COLLEGE

networks. In this work, the available radio can be decomposed into the subproblems
time (ART) is calculated for each node, and which are solved by the different network
the route with the largest ART is selected layers in the different network nodes. In the
when a new connection is requested.This decomposed problem, the Lagrange multipliers
algorithm tries to maximize the average act as a interface between the layers and the
number of connections. The WCETT load nodes, enabling the distributed entities to find
balancing (WCETT-LB) metric. The WCETT-LB the global optimal solution only by solving
is the WCETT augmented by the load factor their own subproblems.
consisting of the average queue length and Therefore ,the dual decomposition
the degree of traffic concentration. method provides a systematical way to design
The QoS-aware routing algorithm a distributed algorithm which finds the global
with congestion control and load balancing optimal solution.The mesh router relays
(QRCCLB) calculates the number of congested aggregated data traffic of mesh clients to and
nodes on each route and chooses the route from the IP core network. Typically, a mesh
with the smallest number of congested router has multiple wireless Interfaces to
nodes.Compared to these load-aware routing communicate with other mesh routers, and
protocols, the each wireless interface corresponds to one
proposed routing scheme has three major wireless channel.
advantages. First,the proposed scheme is These wireless channels have
design to maximize the system capacity by different characteristics, because wireless
considering all necessary elements for load interfaces are running on different frequencies
balancing, e.g., the interference between and built on either the same or different
flows, the link capacity, and the user demand, wireless access technologies, e.g., IEEE
etc. On the other hand, the existing protocols 802.11a/b/g/n. It is also possible that
fail to reflect these elements since they use directional antennas are employed on some
heuristically designed routing metrics. For interfaces to establish wireless channels over
example, the DLAR, the ART, and the WCETT- long distances.
LB do not take account of the interference
between flows. Also, the link capacity is not 3 SYSTEM MODEL
considered by the DLAR, the LBAR, the ART, 3.1 Mesh Network Structure
and the QRCCLB. Second, the proposed Each wireless router in a WMN
scheme can guarantee fairness between users. is fixed at a location. Thus, the WMN topology
When the network load is high, it is of does not change frequently and the channel
importance for users to fairly share scarce quality is quasi-static. In addition, each
radio resources.
However, the existing protocols
cannot fairly allocate resources, since they are
unable to distinguish which route is
monopolized by a small number of users.
Third, the proposed scheme can provide
routes stable over time. Since most of the
existing protocols adopt highly variable routing
metrics such as the queue length or the
collision probability, they are prone to suffer
from the route flapping problem.
We design the proposed routing
scheme by using the dual decomposition
method for the network utility maximization.
To use this method, one should formulate the
global optimization problem that is to
maximize the total system utility under the
constraints on the traffic flows and the radio
resources. After the constraints are relaxed by
the Lagrange multipliers, the whole problem

397
PROCEEDINGS OF ― 4th NATIONAL CONFERENCE on ADVANCED COMPUTING
TECHNOLOGIES(NCACT‘11) ― on FEBRUARY 2,2011 @ S.A.ENGINEERING COLLEGE

wireless router serves so many subscribers If all flows convey data traffic
(i.e., users) in general that the characteristic through each route at their flow data rates,
of the aggregated traffic is stable over time. the sum of the data rates of traffic passing
Therefore, we design the routing through link l is calculated as Pr2Hl Pf2Qr
scheme under the system model of which _f;r, where Hl is defined as the set of the
topology and user configuration are stable. In indices of all routes passing through the link l,
Fig. 1, we illustrate an example of the WMN. and Qr is the indices of all flows that use the
In this figure, a node stands for a wireless route r.We define the ―airtime ratio‖ of the link
router, which not only delivers data for its own l, denoted by al, as the ratio of the time taken
users, but also relays data traffic for other up by the transmission to the total time of link
wireless routers. Among nodes, there are l. The airtime ratio of the link l can be
some gateway nodes connected to the wired calculated as the sum of the data rates on the
backhaul network. Each user is associated link l divided by the effective transmission rate
with its serving node. In this paper, we do not of the link l. That is,
deal with the interface between a user and its
serving node to focus on the mesh network
itself. Through the serving node, a user can
send (receive) data traffic to (from) the other Now, we discuss the restriction on the
user in the WMN or to (from) outside networks radio resource allocation. For the protocols
via the gateway nodes. If node n can transmit under consideration, time is the only radio
data to node m directly (i.e., without relaying), resource, which is shared by links for data
there exists a link from the node n to the transmission. If two links are adjacent enough
nodem. In this paper, we define a link as to interfere with each other, packets cannot be
unidirectional. conveyed through the two links at the same
time. To incorporate this restriction into the
3.2 Physical and Medium Access Control Layer proposed scheme, we divide the WMN into
Model multiple overlapping clusters. A cluster
The proposed scheme can be includes the links adjacent enough to interfere
implemented on top of various physical with each other. Therefore, any pair of links in
(PHY) and medium access control (MAC) the same cluster cannot deliver packets
layer protocols that utilize a limited simultaneously. A cluster is generally indexed
bandwidth and divide the time for multiple by c, and let C be the set of the indices of all
access, for example, such as the carrier sense clusters in the WMN. We also define Mc as the
multiple access/collision avoidance set of all links in the cluster c. The proposed
(CSMA/CA), the time division multiple access scheme estimates the traffic load in each
(TDMA), cluster. The traffic load in a cluster is the sum
and the reservation ALOHA (R-ALOHA). of the traffic load on the links in the cluster. If
The effective transmission rate of a the traffic load in a cluster is estimated to be
link is defined as the number of actually too high, the proposed scheme can redirect
transmitted bits divided by the time spent for the routes passing through the overloaded
data transmission, calculated in consideration cluster for load balancing. The airtime ratio of
of retransmissions due to errors. That is, the a link represents the traffic load on the link. If
effective transmission rate can be calculated the sum of the airtime ratios of the links in a
as the PHY layer transmission rate times the cluster exceeds a certain bound, the cluster
probability of successful transmission. The can be regarded as overloaded. Roughly, we
PHY layer transmission rate can be fixed, or assume that a fixed portion of the time can be
can be adaptively adjusted according to the used for data transmission, while the
channel quality by means of rate control remainder is used for the purpose of control,
schemes such as the receiver-based autorate e.g., control message exchange and random
(RBAR). In the WMN under consideration, the back-off. Let _ denote the ratio of the time for
effective transmission rate of a link is assumed data transmission to the whole time. Since
to be static for a long time due to fixed only a link can convey data traffic at a time
locations of nodes. We define dl as the within a cluster, the sum of the airtime ratios
effective transmission rate of the link l. of the links in a cluster cannot exceed _.
Therefore, we have the following constraint:

398
PROCEEDINGS OF ― 4th NATIONAL CONFERENCE on ADVANCED COMPUTING
TECHNOLOGIES(NCACT‘11) ― on FEBRUARY 2,2011 @ S.A.ENGINEERING COLLEGE

practical point of view, the clusters do not


need to cover all possible cliques, but it is
enough for the clusters to be formed in such a
way that the traffic load in each region of the
WMN is separately evaluated
In Fig. 1, we give an example organization of
clusters.
4. Load-Balanced Clustering
Note that we do not draw all
The main objective of our
clusters to avoid overcrowding. In this figure,
approach is to cluster sensor network
four clusters are presented, each of which is
efficiently around few high-energy gateway
indicated by a dashed circle. Suppose that a
nodes. Clustering enables network scalability
cluster includes all incoming and outgoing links
to large number of Sensors and extends the
of the nodes in the dashed circle. In this
life of the network by allowing the Sensors to
example, the clusters 1 and 2 cover the areas
conserve energy through communication with
around the gateway nodes 1 and 2,
Closer nodes and by balancing the load among
respectively. When the estimated traffic load
the gateway nodes. Gateways associate cost
around the gateway node 1 is too high, the
to communicate with each sensor in the
user taking the route to the gateway node 1
network. Clusters are formed based on the
may not achieve high data rate due to the
cost of communication and the load on the
constraint (2) for cluster 1. In this case, if the
gateways. Network setup is performed in two
gateway node 2 is lightly loaded, it is desirable
stages;
for the user to choose the route to the
Bootstrapping‘ and ‗Clustering‘.
gateway node 2 for higher data rate. Thus, it
In the bootstrapping phase, gateways discover
can be said that the traffic load is estimated
the nodes that are located within their
and controlled in the unit of the cluster for
communication range. Gateways broadcast a
global load balancing.
message indicating the start of clustering. We
The notion of a cluster corresponds
assume that receivers of sensors are open
to a clique in the conflict graph. In the conflict
throughout the clustering process. Each
graph, vertices correspond to the links in the
gateway starts the clustering at a different
WMN. An edge is drawn between two vertices
instance of time in order to avoid collisions. In
if the corresponding links interfere with each
reply the sensors also broadcast a message
other. Thus, an edge stands for confliction
with their maximum transmission power
between two vertices. A clique in the conflict
indicating their location and energy reserve in
graph is a set of vertices that mutually conflict
this message. Each node discovered in this
with each other. Unless the conflict graph is a
phase is included in a range set per gateway.
―perfect graph,‖ the clique constraints in (2)
In the clustering phase, gateways
are not tight in the strict sense even when all
calculate the cost of communication, with each
cliques (clusters) are taken into account. We
node in the range set. This
propose the centralized algorithm that
Information is then exchanged between all the
transforms the conflict graph to a perfect
gateways.
graph by adding unnecessary edges to the
After receiving the data from all the other
conflict graph. This algorithm can also be
gateways each
applied to our routing scheme. However, from
gateway start clustering nodes based on the
a practical point of view, this algorithm is
communication cost and the current load on
inefficient since it requires centralized control
its cluster. When the clustering is over, all the
and can overly reduce spatial reuse.
sensors are informed about the ID of the
Therefore, in this paper, we recommend to
cluster they belong to. Since gateways share
use the clique constraints in (2) as it is.
the common information during clustering,
Actually, these clique constraints
each sensor belongs to only one cluster. For
are enough to serve our purpose, i.e.,
inter-cluster communication all the traffic is
identifying overloaded regions in the WMN to
routed through
redirect the routes. Also, there can be too
the gateways.
many cliques in the conflict graph, and
therefore, considering all of them can render
the proposed scheme highly complex.Froma

399
PROCEEDINGS OF ― 4th NATIONAL CONFERENCE on ADVANCED COMPUTING
TECHNOLOGIES(NCACT‘11) ― on FEBRUARY 2,2011 @ S.A.ENGINEERING COLLEGE

4.1 Optimization Heuristics the part of the cluster for which it minimizes
Before minimizing the objective the objective function. The process is repeated
function we allocate the nodes in the ESet to till all the nodes in the sensors are not
their respective clusters and calculate the load. clustered.
If we allocate the remaining nodes to the
clusters only by minimizing the objective
function we experience large overlapping of 5 Performance Results
clusters. Considering only the load on In this section we present some results
gateways as a factor for clustering might do so obtained by our simulation. To evaluate the
at the expense of sensors. Our experiments performance of our algorithm, we compare the
also show that some sensors are not part of results with shortest distanceclustering where
the gateways nearest to them. This will a gateway includes a sensor in its cluster if the
increase the communication energy of the distance between them is minimum. We
sensors. Exhaustive search methods like measure three different properties of the
simulated annealing can be used to find the system based on different metrics. Standard
optimum results to balance the load as well as Deviation of Load per cluster: Experiments are
maintain the minimum distance with the performed to measure load on each cluster
gateway. But by using these methods the after clustering. Standard deviation of the load
complexity of the algorithm is increased with of the system gives a good evaluation of
the increase in sensors and gateways. In order distribution on load per cluster. We measure
to balance load of gateways and preserve the deviation in load by varying the number of
precious energy of sensors, we select few gateways from 2 to 10 in a fixed 100 nodes
nodes that are located radically near a network. In order to demonstrate that the
gateway and include them in the ESet of the load is balanced for any setup we ran the
gateway. A node is included in the ESet of a same experiments for 10 different normal
gateway if, its distance to the gateway is less distributions. Same experiments are performed
than a critical distance. Initially, the critical with shortest distance clustering and the
distance is equal to the minimum distance in results are compared with our approach.
the ESet. Then the critical distance is gradually Variance in load signifies that load is not
increased till the median of distances in ESet is uniformly distributed among the clusters.
reached. This procedure is repeated for all the Results demonstrate that for all distributions
gateways based on increasing order of our approach outperforms the shortest
cardinality, which balances load while distance
performing the selection. Experimental results clustering
show that this method significantly reduces
the number of nodes to be considered for
exhaustive search and reduces overlapping
between the clusters.
Now, we start clustering the
remaining sensors in the system. Since
sensors cannot reach all the gateways,
minimizing objective function for those
gateways will unnecessarily increase the
complexity of algorithm. In order to save
computation for clustering we sort the sensors
based on increasing order their reach. Nodes
with same reach are grouped together to
avoid extra computation of calculating the
objective function for the gateways they
cannot reach. Nodes with lower reach are To test our system for different sensors
considered first because they have fewer densities we measured standard deviation of
clusters to join. The objective function is load by using 5 gateways and increasing the
calculated by assigning these nodes to the number of sensors in the system from 100 to
gateways they can reach. The node becomes 500 with uniform increments. The graph

400
PROCEEDINGS OF ― 4th NATIONAL CONFERENCE on ADVANCED COMPUTING
TECHNOLOGIES(NCACT‘11) ― on FEBRUARY 2,2011 @ S.A.ENGINEERING COLLEGE

shown in Fig 3 clearly indicates that our serves as a hop to relay data from sensors
approach increase the scalability of the to a distant command node. If nodes are not
system. The performance of our approach uniformly distributed around the gateways the
remains constant with increase in density. The clusters formed will be of varied load, which
rising curve of the shortest distance clustering will affect the lifetime and energy consumption
indicates that variance in load is increasing of the system. Simulation results demonstrate
with increase in density. The demonstrated that our algorithm consistently balances load
results are based on the normal distribution of among different clusters and performs well in
sensors. Average communication energy per all distributions of nodes. Our future plan
cluster: We measure total energy required to includes extending the clustering model to
communicate between gateway and all the allow gateway mobility. Also, we plan to study
sensors in its cluster. Communication energy is different failure scenarios in sensor networks
directly proportional to the distance between and introduce run-time fault-tolerance in the
two nodes. If clusters are formed based on system.
shortest distance the average energy REFERENCES
consumed will be minimal but the load will not [1] R. Bruno, M. Conti, and E. Gregori,
be balanced. Sensors clustered by shortest ―Mesh Networks: Commodity Multihop Ad Hoc
distance method will consume less Networks,‖ IEEE Comm. Magazine, vol. 43, no.
communication energy in the beginning but 3, pp. 123-131, Mar. 2005.
will consume more energy later due to [2] D. De Couto, D. Aguayo, J. Bicket, and
overhead of re-clustering. We try to minimize R. Morris, ―High- Throughput Path Metric for
the average communication energy to perform Multi-Hop Wireless Routing,‖ Proc. ACM
as good as shortest distance algorithm in MobiCom, Sept. 2003.
terms of communication energy. The [3] D. Passos, D.V. Teixeira, D.C.
experimental results, in Fig. 4, show that the Muchaluat-Saade, L.C.S. Magalhaes, and
performance of shortest distance clustering C.V.N. Albuquerque, ―Mesh Network
decreases with the increase in number of Performance Measurements,‖ Proc. Int‘l
clusters. Information and Telecomm. Technologies
6. Conclusions and future work: Symp.,
In this paper we have introduced an Dec. 2006.
approach to cluster unattended wireless [4] B. Awerbuch, D. Holmer, and H.
sensors about few high-energy gateway nodes Rubens, ―The Medium Time Metric: High
and balance load among these clusters. The Throughput Route Selection in Multi-Rate Ad
gateway node acts as a centralized manager Hoc Wireless Networks,‖ Mobile Networks and
to handle the sensors Applications, vol. 11,no. 2, pp. 253-266, Apr.
2006.
[5] R. Draves, J. Padhye, and B. Zill,
―Routing in Multi-Radio, Multi-Hop Wireless
Mesh Networks,‖ Proc. ACM MobiCom, Sept.
2004.
[6] Y. Yang, J. Wang, and R. Kravets,
―Designing Routing Metrics for Mesh
Networks,‖ Proc. IEEE Workshop Wireless
Mesh Networks, Sept. 2005.

401

You might also like