Qos Routing Solutions For Mobile Ad Hoc Network: Jiwa Abdullah
Qos Routing Solutions For Mobile Ad Hoc Network: Jiwa Abdullah
1. Introduction
For the past decade, the field of mobile ad hoc networks (MANETs) [1] has been accepted as
a legitimate area of research. It avoids the need for base station infrastructure by being able
to self-organized and self-configuring. Hence it provides a spontaneous and yet robust
wireless communication systems. Initially, MANETs researchers were focused mainly on
designing distributed and dynamic communications protocols for shared channel and for
route discovery. It offers best-effort protocols to ensure optimum network operation in an
unpredictable wireless environment. Additionally it maintained a network topology view
and routes in the face of disruption of links, failure mobile devices and short residual
connectivity time. Nonetheless one could not actually experienced any successful practical
implementation of MANETs in the real world. Entertainment and some other multimedia
services usually made an impact on any technological breakthrough but the potential of
MANETs are not truly realized. They must be able to deliver such services, for which best-
effort protocols are not adequate. This is because multimedia applications often have
stringent delay and reliability sensitive service requirements. Subsequently, the research
focus has shifted from best-effort services to the provision of better defined QoS in MANET.
QoS routing protocols then play an essential role in a QoS mechanism, since it is their task to
find which nodes, if any, can serve an application's requirements. It plays a major part in
session admission control (SAC), due to its dependence on the route discovery that support
the requested QoS. Alternatively, some QoS routing solutions may not attempt to serve
applications' requirements directly, rather to improve QoS under a particular metrics. Most
of the solutions proposed in the literature, until now have focused on providing QoS based
on throughput and delay. Throughput is the most common metric used. This is due to its
character as the lowest common denominator requirement. It is noted that, most voice or
video applications require some level of guaranteed throughput in addition to their other
constraints. However, many other useful metrics are also used to quantify QoS. In this work
we cover most of them and provide examples of their use. The remainder of this article is
structured as follows. In Section 2 we discuss related work in terms of QoS routing surveys
and summarize their main points. Section 3 describes the problem statement of QoS routing.
Section 4 explains in detail the existing heuristics of QoS routing protocol. Section 5
describes a brief review of the challenges posed by the provision of QoS on the MANET
environment. Section 6 presents the factors that need to be considered in designing a viable
QoS routing protocol, QoS routing protocol performance, the network resources consumable
418 Mobile Ad-Hoc Networks: Protocol Design
2. Related work
There are several overviews and surveys of QoS routing issues and solutions. Chen et al ,
provided a fairly comprehensive overview of QoS in networking [2]. Chakrabarti et al [3]
summarized the important QoS-related issues in MANETs and subsequently produced an
updated version [4]. A survey by Zhang et al [5], highlighted several significant points: (1)
Most of the algorithmic problems, such as multi-constraint routing, have been shown to be
NP-complete; (2) QoS and indeed Best Effort routing can only be successfully achieved if the
network is stable. This means that the nodes are not moving faster than routing updates can
propagate; (3) Techniques of QoS provisioning differ when the network size becomes very
large, since QoS state updating mechanism takes longer time to propagate to distant nodes;
(4) There is a trade-off between QoS provisioning and minimisation of power utilization.
Areas of future work were also identified: (1) Admission control policies and protocols
require further attention; (2) QoS robustness; (3) QoS routing protocol security against, for
example, denial-of-service attacks. (4) The combination of security and QoS provisioning; (5)
Study of QoS preservation under failure conditions; (6) QoS support for multicast
applications. Mohapatra et al [56] provides a survey of issues in supporting QoS in
MANETs. The paper considered a layered view of QoS provisioning in MANETs. In
addition to the basic issues in QoS, it describes the efforts on QoS support at each of the
layers, starting from the physical and going up to the application layer.
Al-Karaki et al [6], provided a detailed overview in the field of QoS routing. The following
aspects were highlighted: (1) Accommodating multiple classes of traffic, but still allowing
the propagation of lower-class traffic with the inclusion of preemptive scheduling; (2)
Ensuring QoS guarantees under various failure conditions; (3) usage of localization devices
such as GPS; (4) Prioritization of control packets; (5) Using realistic mobility models; (6)
Quantifying the impact of cross-layer integration; (7) MANETs and Internet interoperability;
(8) Secured QoS routing protocol, preventing malicious and harmful retransmission; (9)
Network partitioning in the context of QoS routing; (10) Node heterogeneity in terms of
their capacity and capabilities.
In this paper we focus on the essentials of QoS routing, which is the discovery of routes
servicing data sessions and admission control. Al-Karaki et al [6] also discussed various QoS
routing solutions which falls into the following categories: (1) flat, which means that all
nodes perform an equal role; (2) hierarchical, where some nodes are group heads; (3)
position-based protocol where location information is made available, and (4) power-aware
in which battery usage and residual charge are considered. Reddy et. al [7] provide a
thorough overview of the more widely accepted MAC and routing solutions for providing
QoS Routing Solutions for Mobile Ad Hoc Network 419
better QoS. The author provides two varieties of QoS solution, one is based on the QoS
routing employed, while the other one is based on the layer at which they operate in the
network protocol stack. The QoS routing employed is further classified into the mechanism
which is based on (1) interaction between routing protocol. (2) QoS provisioning
mechanism; (3) interaction between network and MAC layers; (4) on the routing
information update mechanism employed that is on demand, table driven or hybrid.
quantification, triggers may be used to control the emission of updates and timers to force a
minimum interval between the emission of updates. [13]. A problem that relates to the
frequency of the distribution of information pertaining to the state of the network is the
inaccuracy that a lower frequency can introduce. Other sources of inaccuracy are the
propagation delay of routing messages in large networks, the utilization of estimates, the
impact of the metrics measurement mechanism used and information aggregation in
hierarchical systems. The study of the impact of routing information inaccuracy on the
performance of communication systems and the definition of the mechanisms to overcome
its problems has been the subject of several research projects [14] [15] [16] [17].
number of hops. These algorithms support load balancing, showing top performance with
low network loading. However, this approach damages best-effort traffic performance
because it contributes to resource consumption. Another shortest-widest path algorithm
uses propagation delay, as the second metric. Wang et al presented the related path
computation algorithms which are based on distance-vector and link-state [9].
topology change must not be greater than the rate of state information propagation.
Otherwise, the routing information will always be stale and routing will be inefficient or could
even fail completely. This applies equally to QoS state and QoS route information. A network
that satisfies this condition is said to be combinatorially stable [3].
5.6 Heterogeneity
MANETs are typically heterogeneous networks with various types of mobile nodes with
diverse nature of communication technologies employed. Its diversity comes in the form of
different types of nodes, ranging from sensors, palmtops and laptops within an organisation
or a result of multiorganisation consortium. In a military application, different military units
ranging from soldiers to tanks can come together, hence forming a MANET system. Nodes
differ in their energy capacities and computational abilities. Hence, mobile nodes will have
different packet generation rates, routing responsibilities, network activities and energy
draining rates. Coping with node heterogeneity is a key factor for the successful operation of
MANETs.
2. Network Layer:
a. Throughput measured in bit per second(bps) which is the amount of data traffic the
entire network carried to its destination in one second;
b. Node throughput (bps), defined as the average throughput achieved by a single node;
c. Route discovery delay for reactive protocols as a measure of effectiveness of the
reactive protocols.
d. In order to measure the operating cost and efficiency of Qos routing protocol,
normalised routing load (NRL) could be employed. It is the ratio of routing packets
transmitted to data packets received at the destination [44].
e. Network lifetime (s) may be defined as the time until network partitioning occurs due
to node failure [42], indicating the energy-efficiency and load balancing ability of the
protocol.
f. Average node lifetime (s) [42] shows the effective power usage and optimization.
3. MAC Layer
a. Normalised MAC load is very similar to the normalised routing load (NRL), which
represents the ratio of bits sent as MAC control frames to the bits of user data frames
transmitted [44].
b. MAC energy efficiency, represent the ratio of energy used for sending data bits to the
total energy expended for data plus MAC headers and control frames;
was presented based on heuristics: (i) admission control; (ii) scheduling discipline; (iii)
ordering of QoS metrics; (iv) sequential filtering; (v) control theory approach and (vi)
computational intelligence approach.
In this Section, we elaborate on the classification based on MAC protocol interaction, by
considering the following classes of QoS routing solutions.
The authors proposed a kind of clustering scheme to group nodes where each cluster
employs a different spreading code under a CDMA scheme. Within clusters, the channel
was time-slotted to deterministically allocate channel access opportunities for each node.
Hence, the channel capacity could be measured in terms of time slots. Additionally, time
slots may be reserved as a way of promising channel capacity to individual data sessions.
The ideas in [57] were taken further by Lin et al [30], wherein they devised a detailed
algorithm for calculating a path's residual traffic capacity, seemingly filling in the gaps in
detail left by [57]. Similar to the aforementioned work, they propose using a CDMA over
TDMA network. The channel is time-slotted accordingly, but several communicating pairs
can share a time slot by employing different spreading codes. A path's capacity is expressed
in terms of free time slots. Route discovery is based again on DSDV [58]. Routing updates
are used to refresh the free slots information in routing tables. The proposed algorithm first
calculates the best combination of free slots on the path for maximum throughput and then
attempts to reserve them for a particular data session. In brief, the algorithm deals with
nodes in groups of three. Below each node we show the time slots that were free prior to a
data session being admitted. In this case, the same six slots were free at each node. At a first
trivial glance it appears that the path capacity is six slots. This illustrates that nodes must
have some common free slots to communicate, but if all nodes have the same set of free
slots, the efficiency of utilisation is not very high. Then, the effective path capacity usable by
a new session is only two slots, despite six being initially free at each node. Once the
available time slots and path capacity have been determined, reservation signaling takes
place to reserve the necessary time slots for satisfying the requesting session's throughput
requirement. The two described schemes offer a clear-cut definition of path capacity in
terms of time slots and allow a routing protocol to provide throughput guarantees to
application data sessions by reserving these slots. However, this comes at the cost of many
assumptions. First of all, assuming a CDMA network assumes that each group of nodes is
assigned a different spreading code. These must either be statically assigned at network
start-up, or dynamically assigned. The former mechanism does not deal with nodes/clusters
leaving/joining the network, which is one of the most basic characteristics of ad hoc
networks. The latter scheme assumes that there is some entity for assigning spreading codes,
which is against the ad hoc design principle of not relying on centralized control. A second
assumption is that of time-slotting. For each frame to begin at the same time at each node,
the network must be globally synchronised. Synchronisation signaling incurs extra
overhead, and as stated in previous work [7], [25], in the face of mobility this becomes
practically unfeasible. Furthermore, time slot assignments must be continually updated as
nodes move, and sessions are admitted or completed. Since these designs were published,
new TDMA based MAC protocol designs have come to fruition, such as the IEEE 802.15.3
standard [59]. However, this protocol is designed for use in wireless personal area networks
where every node is in range of a controller which provides the time-slot schedule. Thus, it
is not suitable for wider-area MANETs. The conclusion is that there is currently no ideal
feasible solution for implementing TDMA in a multihop MANET environment.
8.3 SIR and bandwidth guaranteed routing with additional transmit power
Another TDMA-based QoS routing protocol is presented by Kim et al [40] with channel
capacity expressed in terms of time slots. Furthermore, this protocol aimed to concurrently
satisfy the application's throughput requirement and its BER constraint. For BER constraint,
it aims to achieve by assigning adequate transmit power to produce the necessary signal to
interference ratio (SIR) between a transmitter and receiver pair, with lower BER. This is in
contrast to the previous candidate solutions, which aimed merely to satisfy a single QoS
constraint at a particular moment. The protocol is on-demand and in essence, follows a
similar reactive route discovery strategy to DSR [61]. An advantage of this protocol is that it
gathers multiple routes between a source and destination and allows them to cooperatively
satisfy a data stream's throughput requirement. However, only paths that fulfill the SIR
requirement on every link qualify as valid routes. However; the maximum achievable SIR is
limited by the maximum transmit power. Time is split into frames with a control and data
phase, each containing several time slots. In the control phase, each node has a specified slot
and uses this to broadcast data phase slot synchronization, slot assignment and power
management information. This broadcast is made at a predefined power level. The received
power can be measured and knowing the transmit power, the path loss can be calculated.
From this, it is possible to calculate the received SIR. This in turn leads to an estimation for
434 Mobile Ad-Hoc Networks: Protocol Design
the required link gain and thus the required power at the transmitter, p(ji−)1est , where j is the
current node in the path and i is the time slot index. When a route is required, a RREQ is
broadcast by the source and is received by direct neighbours. As in previous TDMA
examples, forwarding nodes must be careful not to transmit in a slot in which their
upstream node is receiving contains the number of time slots and SIR requirements. Time
slots at the current node must be idle and not used for receiving, to be considered for
reservation. Slots for which p(ji−)1est is lower, are preferred. As long as one free slot exists, the
node is appended to a list in the RREQ packet, along with the required power estimate for
the transmitter for that particular transmission slot. The destination eventually receives
multiple RREQs, hence the need for only one free slot on each path, since multiple paths can
cooperatively serve the throughput requirement. It returns RREPs to the source along the
discovered paths, which deliver the estimated power information so that the correct power
can be set in the relevant transmission time slots.
constrained routing depends on a TDMA-based MAC protocol for capacity reservation and
throughput guarantees.
subtracting the channel usage of all sessions on links in the same clique from the link's nominal
capacity. This link capacity information may be utilised to solve the throughput-constrained
MANET routing problem. Additionally, Yang et al [25] published and discussed the problems
of achievable throughput estimation in a contended-access network which depend on the
node’s transmission range, R. Nodes within the Carrier-Sense rang are termed as CS-
neighbours, and this set of nodes is the CS-neighbourhood. The CS-range which is equivalent
to 2R model simulates the physical layer characteristics of network adapters which are able to
sense the presence of a signal at a much greater range than that at which they are able to
decode the information it carries. In a contention-based MAC protocol such as the 802.11
distributed coordination function(DCF)[63], a node may only transmit when it senses the
channel idle. Therefore, any nodes transmitting within its CS-range may cause the channel to
be busy and are thus in direct contention for channel access. This is one of the key realizations
in [25] such that all nodes in the CS-range (CS-neighbours) must be considered when
estimating a node's achievable throughput. More specifically, in 802.11, the channel is deemed
idle if both the transmit and receive states are idle and no node within R has reserved the
channel via the network. The major advantage of this protocol is that no extra control packets
are introduced, since bandwidth information is piggybacked on the existing HELLO packets.
While the approaches discussed in this section represent significant progress in achievable
throughput estimation and admission control, and hence throughput constrained QoS
routing, there are still shortcomings. It is well-known that as a network nears saturation,
ready-to-send and data packet collisions (in a multihop network) become more frequent,
wasting capacity. Additional capacity is wasted due to the 802.11 backoff algorithm, as the
level of contention for the channel increases. The protocols discussed in this section do not
consider these sources of wastage when calculating the residual capacity at each node.
several important QoS metrics in path selection. However, QoS state for all paths must be
discovered and kept fresh. This incurs extra overhead. Furthermore, such a protocol
requires the participation of other mechanisms which could measure the link reliability,
MAC delay and available channel capacity at each node.
the route are inside each other's CS-ranges and thus can transmit simultaneously. The
destination then calculates the channel capacity required at each node for the data session to
be admitted. It then sends an admission request (AdReq) back along the route. Each
intermediate node checks its locally available capacity and the capacity of its csneighbours
by flooding an AdReq. If the intermediate node and all its CS-neighbours have sufficient
capacity, they temporarily reserve the necessary capacity for the session and the AdReq is
forwarded to the next hop in the route back towards the source node. If any nodes or their
CS-neighbours on the route have insufficient capacity, they generate an admission refused
message, towards the source, which then invokes a route repair mechanism. However, the
advantages of QGUM, must be balanced against the typically shorter range offered by UWB
radios, which is only 10m at 110Mbps [64]. Hence, current standardisation efforts involving
UWB radio technologies for wireless networks are targeted at personal area networks [65]
[54] and not larger-scale ad hoc WLANs as 802.11x is. This limits the applicability of
protocols based on a UWB physical layer.
times t0 and t1 respectively. Thus, stability is greater, the fewer the number of neighbour nodes
that change between t0 and t1. The higher a node's residual buffer space and relative stability,
the better the QoC to it is. The QoC of each node is used in a logical topology construction
algorithm. Each node periodically broadcasts a beacon to all of its neighbours, which contains
its address and QoC. Then, each node selects as its preferred neighbour (PN) the neighbour
node with the highest QoC. A link between a node and its PN is called a preferred link. A
logical tree is constructed by connecting nodes together using only preferred links. A tree's
growth terminates where a node's preferred link is with a node that is already part of the tree.
This heuristic has been proven to yield a forest of trees [39]. In brief, each tree is then
considered a routing zone, within which proactive routing occurs. Inter-zone routing is
performed on-demand, and hence the hybrid route discovery of this protocol. In inter-zone
routing, other zones may be abstracted as nodes, thus a packet can be routed to another zone,
and on arrival, the intra-zone routing mechanism can direct the packet to its final destination.
HARP also includes route discovery optimizations which reduce overhead. Firstly, the forest
structure can be used to avoid having to flood route request (RREQ) packets used in inter-zone
routing. This is done by forwarding RREQs only via gateway nodes; a node is considered to be
a gateway, if it is the neighbour of a leaf node, but it is in another zone. Secondly, features of
the Relative Distance Microdiscovery (RDM) routing protocol (RDMAR) [67] are incorporated
into HARP. RDMAR does not limit the number of neighbours propagating a flooded packet,
but limits the scope of the flooding instead. Thus, RREQs do not propagate to areas of the
network where they will be useless, thereby wasting resources. The time-to-live (TTL) field in
a RREQ is set based on an estimation of the relative distance of the destination in terms of
hops. However, the estimation can only be made if there is some previous knowledge of the
destination, and a replacement path to it is sought. In this case, the relative stabilities of each
node on the path, combined with the time elapsed since the stabilities were recorded, yields an
estimation for the total maximum change in the positions of the nodes on the path. This is
added to the previous known distance in metres of the destination. The sum is divided by the
radio range to obtain an estimated upper bound on the distance of the destination in number
of hops. This value is used for the TTL.
ensuring that the energy usage of nodes is also distributed evenly. After adjusting the traffic
on each path, a statistical guarantee can be made about the delay on that path. DSARP is
simple to implement and provides delay guarantees without relying on the MAC protocol, but
has the following disadvantages. The number of buffered packets on each path must be
rediscovered each time a new session begins, regardless of whether the route has failed or not.
This incurs extra overhead. Also, the delay guarantees may fail in the face of mobility, if other
nodes move into contention range and cause greater channel access delays for nodes on a
session's path.
Hello messages that are sent to their neighbors. AQOR uses the sum of a node’s neighbors’
traffic as the estimated total traffic affecting the node. This estimated traffic can be larger
than the real overall traffic. This overestimation imposes a stringent bandwidth admission
control threshold. The available bandwidth is thus a lower bound on the real available
bandwidth. End-to-end one way downstream delay is approximated by using half the
round trip delay. With the knowledge of available bandwidth and end-to-end delay, the
smallest delay path with sufficient bandwidth is chosen as the QoS route. Temporary
reservation is used to free the reserved resources efficiently at each node when the existing
routes are broken. If a node does not receive data packets in a certain interval, the node
immediately invalidates the reservation. This avoids using explicit resource release control
packets upon route changes. The adaptive route recovery procedure includes detection of
broken links and triggered route recovery at the destination, which occurs when the
destination node detects a QoS violation or a time-out of the destination’s resource
reservation.
the node inserts the route into its local routing table, if there is no corresponding route entry;
or the node updates its routing table, if the route already exists. When the source node
receives multiple routes, the choice of which route to use is based on the route class
information. The first route class routes obtain higher priority than the second route class and
the third route class routes. Similarly, the second route class routes obtain higher priority than
the third route class routes. After selecting the desired route(s), bandwidth is reserved by
sending a QoS Reserve packet from the source to the destination along the selected route(s).
ADQR uses a fast route maintenance scheme, called two-phase monitored rerouting, which
is composed of Pre Rerouting and Rerouting. The Pre Rerouting phase occurs when the route
changes from first route class to second route class, and the Rerouting phase is invoked when
the route changes from second route class to third route class. In Pre Rerouting, the source node
finds alternate paths in advance, before the current path becomes unavailable, and in
Rerouting, the source node switches to one of these alternate paths in advance of the current
path becoming unavailable.
n
∑ Di
i =1
T= n
∏ Ri
i =1
where Di and Ri are the delay and reliability of link i respectively. The fitness values are used
to select paths for cross-over breeding and mutation operations. The fittest path (with the
smallest T) and the offspring from the genetic operations are carried forward into the next
generation. While this method is a useful heuristic for approximating the optimal value over
the delay and link reliability metrics at the same time, it requires many paths to be searched
in order to collect enough .genetic information for the GA operations to be meaningful. This
means that the method is not suited to large networks, as the authors themselves admit [38].
The methods of calculating Di and Ri are not detailed, but we assume they can be calculated
statistically by the end nodes of each link. Collecting and maintaining sufficient route and
444 Mobile Ad-Hoc Networks: Protocol Design
QoS state information to make a GA useful for QoS routing is costly in terms of both
overhead and energy consumption. However, heuristic methods are often the only feasible
way of solving NP-complete multi-constraint multihop QoS routing problems. Thus, while
their general applicability to MANETs is limited, GAs may play a niche role in finding near-
optimal routes, while satisfying multiple QoS constraints in certain environments. For
example, MANETs which are less power-constrained and experience lower levels of
mobility, and/or MANETs having topologies where a relatively small number of nodes can
be combined in a relatively large number of ways to construct valid routes. The GAMAN
protocol discussed in this section provides an exploratory example of how GAs may
possibly be applied in such networks.
Another QoS routing algorithm was proposed by Peng et al [69]. The authors proposed
route discovery technique, RLGAMAN. It tries to increase the probability of success in
finding QoS feasible routes and integrates a distributed route discovery scheme with a
reinforcement learning (RL) method. It utilizes the local information for the dynamic
network environment; and the route expand scheme based on genetic algorithms (GA)
method to find more new feasible paths and avoid the problem of local optimize. The
performance of the RLGAMAN was investigated by simulation experiment using NS2. The
authours claimed that when compared to traditional method, the experiment results showed
the network with RLGAMAN had improved its efficient and effectiveness.
11.2 QOSRGA
QOSRGA (QoS Routing Using GA) was designed to select QoS route based on QoS metrics
such as bandwidth, delay and node connectivity index (nci) [70]. QoS Routing for MANET
posses several challenges that must be addressed. In selecting the most optimal route from
source to destination, one has to choose from a set of routes with the corresponding quality
of connectivity and resources. Due to the nature of node mobility the protocol demands an
exceptional performance. It needs to select a single route with the longest residual node-pair
connectivity time simultaneously. The proposed QOSRGA is based on source routing which
effectively select the most viable routes in terms of bandwidth availability, end-to-end
delay, media access delay and the sum of nci. The NDMRD protocol [22] initially
determined a number of potential routes by calculating the number of returning Route
Reply(RREP) packet from destination. The returning RREP packets extract the QoS
parameters from each node along the routes. Genetic Algorithm (GA), then operates on the
accumulated set of routes and the corresponding set of QoS parameters. A genetic algorithm
for this particular problem must have these five issues resolved before the application of the
generic GA framework: (1) a genetic representation for potential solutions to the problem
called chromosomes. (2) a methodology to create an initial population of potential solutions.
(3) an evolution function that plays the role of the environment, rating solutions in terms of
their fitness. (4) GA operators that alter the structure of chromosomes. (5) values for various
parameters that the genetic algorithm uses such as population size and probabilities of
applying genetic operators.
the effect of inclusion of this scheduler with different underlying multicast routing
protocols, like NTPMR, CAMP, and ODMRP, run over IEEE 802.11 as the MAC protocol.
Queuing dynamics with different degrees of mobility and routing protocols show that the
composition of packets in the queue determines the effect of giving priority to control
packets or setting priorities among data packets, for the average delay. During low mobility,
the average delay is dominated by network congestion due to data traffic. During high
mobility, it is dominated by route changes. We have addressed a fuzzy-based priority
scheduler for data packets, which improves the QoS parameters in MANETs. The fuzzy
scheduler attaches a priority index to each packet in the queue of the node. Unlike the
normal sorting procedure for scheduling packet, a crisp priority index is calculated based on
the inputs such as queue length, data rate, and expiry time of packets, which are derived
from the network. The membership functions and rule bases of the fuzzy scheduler are
carefully designed.
Sun et al [71] proposed QoS routing algorithm based on fuzzy logic. They proposed Fuzzy
controller based QoS Routing Algorithm with a multiclass scheme (FQRA) for mobile ad hoc
networks. In FQRA, a routing table is maintained to manage the lifetime of the active routes.
Then FQRA applies a fuzzy logic system to dynamically evaluate the route expiry time. The
fuzzy logic is chosen because there are uncertainties associated with node mobility and the
estimation of link crash; moreover, there exist a mathematical model capable of estimating
the node mobility. In addition, FQRA is able to take some controlling factors into
consideration. The performance of the FQRA is studied using NS2 and evaluated in terms of
quantitative measures such as improved path success ratio, reduced average end-to-end
delay and increased packet delivery ratio. Generally it shows a promising approach.
be applied easily to other MAC protocols. In addition to the basic routing functionality,
EARA-QoS supports an integrated lightweight QoS provision scheme. In this scheme, traffic
flows are classified into different service classes. The classification is based on their relative
delay bounds. Therefore, the delay sensitive traffic is given a higher priority than other
insensitive traffic flows. The core technique of the QoS provision scheme is a token bucket
queuing scheme, which is used to provide the high priority to the real-time traffic, and also
to protect the lower-priority traffic from starvation. Experimental results from simulation of
mobile ad hoc networks show that this QoS routing algorithm performs well over a variety
of environmental conditions, such as network size, nodal mobility and traffic loads.
Ri
Li , j =
Ei , j
where Ri is the residual battery charge at node i and Ei,j is the energy required to transmit a
data packet of a given size over the link (i, j). A suggested formulation for Ei,j is as follows
Ti , j
Ei , j =
(1 − p )
H
i, j
where Ti,j is the energy required for one transmission attempt of the aforementioned data
packet with a fixed transmission power. Also, pi,j is the packet error probability of the link (i,
j) and H = 1 if hop by hop retransmissions are performed by the link layer. From the above
formulae, it is clear that the lifetime of a link is higher when greater battery charge remains
at the transmitter node, and when the reliability of the link is high, resulting in a low energy
cost for correctly transmitting a packet. These formulae give an estimation for the expected
number of data packets that can be transmitted over a link before the battery of the
transmitter fails [37]. Then, if a route failure is said to occur when any single link on it fails,
the lifetime of path p in number of packets is simply:
Life p = min Li , j
( i , j )∈p
{ }
MRPC considers the best route to be the one with the greatest residual lifetime. The
authours[23], suggests that the MRPC algorithm may be implemented in AODV [75] for
application in MANETs. As routes are discovered, the lifetime of the path is accumulated by
QoS Routing Solutions for Mobile Ad Hoc Network 447
calculating the lifetime of each link. The next hop to a destination is always selected to be
the neighbour which results in the greatest possible value for Lifep. This protocol results not
only in load balancing, increasing the life of the network and avoiding congestion, but also
yields closer-to-optimal energy consumption per packet, as well as lower packet delay and
packet loss probability, due to the preference for more reliable links. It can also be
implemented in an on-demand fully distributed routing protocol, such as AODV. However,
link reliabilities must somehow be estimated, which may not be a trivial problem.
Furthermore, like HARP, MRPC does not cater to particular sessions' requirements, only
fosters better all-round QoS, and hence may be unsuitable for many applications. On the
other hand, as mentioned above, MRPC is not primarily intended to be a QoS routing
protocol, rather an energy-efficient best effort protocol.
emerging. As we discussed though, UWB radios have a limited shorter range compared to
802.11x. Accordingly, current UWB standardisation efforts are all aimed at personal area
networks, meaning that UWB-based QoS routing proposals have limited applicability to
small-scale MANETs only. Statistical QoS Protocols that make no assumptions about the
MAC layer have also received greater attention in the last few years. Such protocols allow a
simpler modular network stack design, without the complications of cross-layer issues.
However, no guaranteed level of service is provided, as we saw in the proposals discussed
in Section 10. Instead, such protocols generally improve the all-round average QoS
experienced by packets under some metrics, at the expense of other performance metrics or
increased complexity or overhead. Such protocols may not be sufficient for supporting
applications with stringent QoS requirements. By contrast, protocols in this category have
done much to improve QoS robustness to failures, which was another area identified as
future work in previous surveys. The link and node stability-based techniques that were
summarised in Section 10 can find longer-lasting routes and thus improve the robustness of
QoS solutions against failures caused by mobility. In summary we can say that there is a
trend for QoS routing solutions to move away from contention free MAC dependence and
towards contended-MAC dependence for throughput-constrained applications. To cater for
many other metrics, such as delay and PLR, numerous statistical protocols which are
independent of the MAC layer, have been proposed. Another aspect of development
considers the metrics themselves. Again, in the earlier proposals, the focus was on providing
an assured throughput service only, since throughput was deemed the most important
requirement. Some earlier protocols could serve, for example, either a throughput or a delay
requirement, but not both simultaneously. In this context, the trend we observe has been to
move from single-constraint routing to multi-constraint routing, as demonstrated by the
later proposals we have discussed. However, multiconstraint routing remains an NP-
complete problem [2], [77] and thus most of the described solutions do not aim to find
optimal routes. Instead, they simply apply multiple metrics to route filtering, removing all
that do not satisfy a particular constraint. One exception was described in Section 11.2, in
which a genetic algorithm is employed as an heuristic to finding the optimal route based on
more than one metric.
emphasis on the session admission (QoS route finding) capability of their protocol, which is
admittedly very important. In contrast, they often neglect or downplay the importance of
session completion i.e. maintaining the routes and the QoS for as long as an application data
session requires. An aspect of this, QoS robustness, was highlighted by earlier survey
writers. However, more work on the evaluation of QoS sensitive session completion
performance with realistic application layers, would be useful. Ultimately, session
completion is more important from a user perspective, than session admission. This is
because the perceived QoS is better when some sessions are blocked but none are dropped
mid-session, rather than all sessions being admitted, but some failing. Furthermore, fast
local QoS route-repairing schemes require additional investigation to improve QoS session
completion rates and protocols' robustness against mobility. In Section III we reiterated that
one of the major challenges to the provision of QoS in MANETS is the unreliable wireless
channel. However, we have found that the majority of QoS routing protocol evaluation
studies assume a perfect physical channel, ignoring the effects of shadowing and multi-path
fading. Therefore, studying the impact of a more realistic physical layer model on QoS
routing protocol performance is another interesting area of future work.
As mentioned in the previous section, while simple multi-constraint QoS routing proposals
are numerous, there are few that attempt to optimise multi-constraint routing. One example
was based on genetic algorithms [38]. However, such methods have limited applicability
due to the overhead and energy cost of collecting enough state information. Accurate
studies are required to establish, with various networking environments and topologies,
whether or not it is feasible to collect and maintain sufficient state information to apply
methods such as GAs. For the cases where it is, more research is required on different types
of heuristic algorithms for calculating near-optimal paths with multiple QoS constraints.
Comparative studies on the performance and impact of the heuristics, are additional future
work. Moreover, there is a distinct lack of protocol frameworks for incorporating such
methods into practically-realisable systems. One promising, but perhaps not yet mature or
feasible approach is that of Node State Routing [49]. Such a solution would provide the
mechanism by which to disseminate the information to enable multi-constraint QoS routing.
14. Summary
In this paper we reviewed the challenges to and basic concepts behind QoS routing in
MANETs and provided a thorough overview of QoS routing metrics and design
considerations. We then classified many of the major contributions to the QoS routing
solutions pool published in recent years. The protocols were selected in such a way as to
highlight many different approaches to QoS routing in MANETs, while simultaneously
covering most of the important advances in the field since the last such survey was
published. We summarised the operation, strengths and drawbacks of these protocols in
order to enunciate the variety of approaches proposed and to expose the trends in designers'
thinking. The protocols' interactions with the MAC layer were also described. Finally, we
provided an overview of the areas and trends of progress in the field and identified topics
for future research.
15. References
[1] I. Chlamtac, M. Conti, J.J.-N. Liu, "Mobile ad hoc networking: imperatives and challenges,"
Adhoc, vol. 1, pp. 13-64, 2003.
450 Mobile Ad-Hoc Networks: Protocol Design
[19] S. Rampal, Routing and End-to-end Quality of Service in Multimedia Networks, PhD Thesis,
Department of Electrical and Computer Engineering, North Caroline State
University, August 1995.
[20] B. Li and K. Nahrstedt, "A control theoretical model for quality of service adaptations "
in Proceedings of Sixth IEEE International Workshop on Quality of Service, 1998, pp. 145-
153.
[21] C. Gomathy and S. Shanmugavel, Supporting QoS in MANET by a Fuzzy Priority
Scheduler and Performance Analysis with Multicast Routing ProtocolsEURASIP
Journal onWireless Communications and Networking 2005:3, 426–436
[22] J.Abdullah and D.J.Parish, “QOSRGA Protocol Using Non-Disjoint Multiple Routes in
Mobile AD Hoc Networks.” The MMU International Symposium on Information
and Communication Technologies (M2USIC2007), 19-20 Nov 2007, Petaling Jaya,
Malaysia
[23] S. Saunders, Antennas and Propagation for Wireless Communication Systems Concept and
Design. New York, USA: John Wiley and Sons, 1999.
[24] C. E. Perkins, ed., Ad Hoc Networking, ch. 3. Addison Wesley, 2001.
[25] Y. Yang and R. Kravets, .Contention-aware admission control for ad hoc networks,.
IEEE Trans. Mobile Comput., vol. 4, pp. 363. 377, Aug 2005.
[26] P. Karn, MACA: A new channel access method for packet radio, in: Proceedings of
ARRL/CRRL Amateur Radio 9th Computer Networking Conference, September
1990, pp. 134–140.
[27] IEEE Standards Board, Part 11: Wireless LAN Medium Access Control (MAC) and
Physical Layer (PHY) Specifications, The Institute of Electrical and Electronics
Engineers Inc., 1997.
[28] F.A. Tobagi, L. Kleinrock, Packet switching in radio channels: Part II––The hidden
terminal problem in carrier sense multiple-access and the busy-tone solution, IEEE
Transactions on Communications 23 (12) (1975) 1417–1433.
[29] J. Deng, Z.J. Haas, Dual busy tone multiple access (DBTMA): a new medium access
control for packet radio networks, in: Proceedings of IEEE ICUPC 1998, vol. 1,
October 1998, pp. 973–977.
[30] C. R. Lin and J.-S. Liu, .Qos routing in ad hoc wireless networks,. IEEE J. Select. Areas
Commun., vol. 17, pp. 1426. 1438, Aug. 1999.
[31] A. R. Bashandy, E. K. P. Chong, and A. Ghafoor, .Generalized quality-of-service routing
with resource allocation,. IEEE J. Select. Areas Commun., vol. 23, pp. 450.463, Feb
2005.
[32] M. Wang and G.-S. Kuo, .An application-aware QoS routing scheme with improved
stability for multimedia applications in mobile ad hoc networks,. in Proc. IEEE
Vehicular Technology Conf., pp. 1901.1905, Sep. 2005.
[33] A. Abdrabou and W. Zhuang, .A position-based qos routing scheme for UWB mobile ad
hoc networks,. IEEE J. Select. Areas Commun., vol. 24, pp. 850.856, Apr. 2006.
[34] M. Sheng, J. Li, and Y. Shi, .Routing protocol with QoS guarantees for ad-hoc network,.
Electronics Letters, vol. 39, pp. 143.145, Jan. 2003.
[35] I. Rubin and Y.-C. Liu, .Link stability models for QoS ad hoc routing algorithms,. in
Proc. 58th IEEE Vehicular Technology Conf., vol. 5, pp. 3084.3088, Oct. 2003.
[36] Z. Fan, .QoS routing using lower layer information in ad hoc networks,. in Proc.
Personal, Indoor and Mobile Radio Communications Conf., pp. 135.139, Sep. 2004.
452 Mobile Ad-Hoc Networks: Protocol Design
[37] A. Misra and S. Banerjee, .MRPC: Maximising network lifetime for reliable routing in
wireless environments,. in Proc. IEEE Wireless Communications and Networking Conf.,
(Orlando, Florida), March 2002.
[38] L. Barolli, A. Koyama, and N. Shiratori, .A QoS routing method for ad-hoc networks
based on genetic algorithm,. in Proc. 14th Int. Wksp. Database and Expert Systems
Applications, pp. 175. 179, Sep. 2003.
[39] N. Nikaein, C. Bonnet, and N. Nikaein, .Hybrid ad hoc routing protocol - HARP,. in
Proc. Int. Symp. Telecommunications, 2001.
[40] D. Kim, C.-H. Min, and S. Kim, .On-demand SIR and bandwidth-guaranteed routing
with transmit power assignment in ad hoc mobile networks,. IEEE Trans. Veh.
Technol., vol. 53, pp. 1215.1223, July 2004.
[41] N. Wisitpongphan, G. Ferrari, S. Panichpapiboon, J. Parikh, and O. Tonguz, .Qos
provisioning using BER-based routing in ad hoc wireless networks,. in Proc.
Vehicular Technology Conf., vol. 4, pp. 2483.2487, May 2005.
[42] S. Singh, M. Woo, and C. S. Raghavendra, .Power-aware routing in mobile ad hoc
networks,. in Proc. Int. Conf. Mobile Computing and Networking, pp. 181.190, 1998
[43] C.-K. Toh, .Maximum battery life routing to support ubiquitous mobile computing in
wireless ad hoc networks,. IEEE Trans. Commun., vol. 39, no. 6, pp. 138.147, 2001.
[44] C. E. Perkins, E. M. Royer, S. R. Das, and M. K. Marina, Performance comparison of two
on-demand routing protocols for ad hoc networks,. IEEE Personal Commun. Mag.,
vol. 8, pp. 16.28, Feb. 2001.
[45] J. Broch, D. A. Maltz, D. B. Johnson, Y.-C. Hu, and J. Jetcheva, .A performance
comparison of multi-hop wireless ad hoc network routing protocols,. in Proc. Int.
Conf. on Mobile Computing and Networking, Oct. 1998.
[46] J.-H. Chang and L. Tassiulas, .Energy-conserving routing in wireless ad-hoc networks,.
in Proc. IEEE INFOCOM, vol. 1, pp. 22.31, 2000.
[47] S. Doshi, S. Bhandare, and T. Brown, .An on-demand minimum energy routing protocol
for a wireless ad-hoc network,. Mobile Computing and Communications Review, vol. 6,
no. 2, pp. 50.66, 2002.
[48] C. Yu, B. Lee, and H.-Y. Youn, .Energy-ef_cient routing protocols for mobile ad-hoc
networks,. Wiley J. Wireless Commun. and Mobile Comput., pp. 959.973, December
2003.
[49] J. Stine and G. de Veciana, .A paradigm for quality of service in wireless ad hoc
networks using synchronous signalling and node states,. IEEE J. Select. Areas
Commun., vol. 22, pp. 1301.1321, Sep. 2004.
[50] M. Grossglauser and D. Tse, .Mobility increases the capacity of ad hoc wireless
networks,. IEEE/ACM Trans. Networking, 2002.
[51] E. Neely, M.J.and Modiano, .Capacity and delay tradeoffs for ad hoc mobile networks,.
IEEE Trans. Inform. Theory, 2005.
[52] L. Galluccio and S. Morabito, G.and Palazzo, .Analytical evaluation of a tradeoff
between energy efficiency and responsiveness of neighbor discovery in self-
organizing ad hoc network,. IEEE J. Select. Areas Commun., vol. 22, pp. 1167.1182,
Sep. 2004.
[53] D. Haenggi, M.and Puccinelli, .Routing in ad hoc networks: a case for long hops,. IEEE
Commun. Mag., vol. 43, pp. 93.101, Oct. 2005.
QoS Routing Solutions for Mobile Ad Hoc Network 453
[54] Qi Xue and Aura Ganz, Ad Hoc Qos On-Demand Routing(AQOR) in Mobile Ad Hoc
Networks, Journal of Parallel and Distributed Computing, V63, 2003, Pg 154-165.
[55] RTP: A Transport Protocol for Real Time Applications, IETF RFC1889,
Available: www.ietf.org/rfc/rfc1889.txt
[56] Prasant Mohapatra, Jian Li and Chao Gui, ‘QoS In Mobile Ad Hoc Networks ‘, IEEE
Wireless Communications, June 2003.
[57] T.-W. Chen, J. T. Tsai, and M. Gerta, .QoS routing performance in multihop,
multimedia, wireless networks,. in Proc. IEEE 6th Int. Conf. Universal Personal
Communications, vol. 2, pp. 557. 561, Oct 1997.
[58] C. E. Perkins and P. Bragwat, .Highly dynamic destination sequenced distance-vector
routing (DSDV) for mobile computers, in Proc. ACM SIGCOMM '94, pp. 234.244,
1994.
[59] IEEE Computer Society, Wireless Medium Access Control (MAC) and Physical Layer (PHY)
Specifications for High-Rate Wireless Personal Area Networks (WPANs), 2003. IEEE Std.
802.15.3-2003.
[60] R. Sivakumar, P. Sinha, and V. Bharghavan, .CEDAR: a core extraction distributed ad
hoc routing algorithm,. IEEE J. Select. Areas Commun., vol. 17, pp. 1454.1465, Aug.
1999.
[61] R. Gupta, Z. Jia, T. Tung, and J. Walrand, .Interference-aware qos routing (IQRouting)
for ad-hoc networks,. in Proc. Global Telecommunications Conf., vol. 5, pp. 2599.2604,
Nov. 2005.
[62] D. Johnson, D. Maltz, and J. Broch, DSR: The Dynamic Source Routing Protocol for
Multihop Wireless Ad Hoc Networks in Ad Hoc Networking, ch. 5, pp. 139.172.
Addison-Wesley, 2001.
[63] IEEE Computer Society, Wireless LAN Medium Access Control (MAC) and Physical Layer
(PHY) Specifications, 1999. ANSI/IEEE Std. 802.11, 1999 Ed.
[64] D. Porcino and W. Hirt, .Ultra-wideband radio technology: Potential and challenges
ahead,. IEEE Commun. Mag., vol. 41, pp. 66.74, July 2003.
[65] H.Badis and K.Al Agha, QOLSR, “QoS routing for Ad Hoc Wireless Networks Using
OSLR”, Wiley European Transactions on Telecommunications, Vol 15, no 4: 427-
442, 2005.
[66] H. Shen, B. Shi, L. zou, and H. Gong, .A distributed entropy based long-life qos routing
algorithm in ad hoc network,. in Proc.IEEE Canadian Conf. on Electrical and Computer
Engineering, vol. 3, pp. 1535.1538, May 2003.
[67] G. Aggelou and R. Tafazolli, .RDMAR: A bandwidth-efficient routing protocol for
mobile ad hoc networks,. in Proc. 2nd ACM Int. Wksp. Wireless mobile multimedia, pp.
26.33, 1999.
[68] H. Schulzrinne, S. Casner, R. Frederick, and V. Jacobson, .RTP: A transport protocol for
real-time applications (rfc 3550). IETF RFC, July 2003.
[69] Fu Peng and Zhang Deyun, Hybrid Optimize Strategy based QoS Route Algorithm for
Mobile Ad hoc Networks, Journal of Computer Science 2 (2): 160-165, 2006, ISSN
1549-3636 © 2006 Science Publications
[70] J.Abdullah and D.J.Parish, Node Connectivity Index as Mobility Metric for GA-Based
QoS Routing in MANET, Proc of ACM/IEEE, Intl Conf on Mobile Technology,
Application and Systems, 10-12 Sept 2007, Singapore.
454 Mobile Ad-Hoc Networks: Protocol Design
[71] B. Sun, C. Gui, Q. Zhang, H. Chen, Fuzzy Controller Based QoS Routing Algorithm
with a Multiclass Scheme for MANET, Int. J. of Computers, Communications &
Control, ISSN 1841-9836, E-ISSN 1841-9844 Vol. IV (2009), No. 4, pp. 427-438
[72] Z. Liu, M. Z. Kwiatkowska, and C. Constantinou, “A swarm intelligence routing
algorithm for manets,” in Proceedings of the IASTED International Conference on
Communications Internet and Information Technology, no. 433, November 2004, pp.
484–489.
[73] E. M. Royer, S. J. Lee, and C. E. Perkins, “The effects of mac protocols on ad hoc
networks communication,” in Proceedings of the IEEE Wireless Communications and
Networking Conference (WCNC), vol. 2, 2000, pp. 543–548.
[74] IEEE Computer Society LAN MAN Standards Committee, Wireless LAN Medium Access
Control (MAC) and Physical Layer (PHY) Specifications, Institute of Electrical and
Electronics Engineers Std., 1997.
[75] C. E. Perkins and E. M. Royer, .Ad hoc on-demand distance vector routing,. in Proc. 2nd
IEEE Wksp. Mobile Computing Systems and Applications, (New Orleans, LA), pp.
90.100, Feb. 1999.
[76] L. Chen and W. Heinzelman, .QoS-aware routing based on bandwidth estimation for
mobile ad hoc networks,. IEEE J.Select. Areas Commun., vol. 23, pp. 561.572, Mar.
2005.
[77] F. Kuipers and P. Van Mieghem, .Conditions that impact the complexity of QoS
routing,. IEEE/ACM Trans. Networking, vol. 13, no. 4, pp. 717.730, 2005.