Toward Network Coding-Based Protocols For Data Broadcasting in Wireless Ad Hoc Networks
Toward Network Coding-Based Protocols For Data Broadcasting in Wireless Ad Hoc Networks
2, FEBRUARY 2010
Abstract—In this paper we consider practical dissemination settings. This is very important as linear random coding is
algorithms exploiting network coding for data broadcasting in lightweight and inherently localized and, as such, can be
ad hoc wireless networks. For an efcient design, we analyze exploited by communication protocols at low overhead.
issues related to the use of network coding in realistic network
scenarios. In detail, we quantify the impact of random access In this paper, we consider the random network coding
schemes, as used by IEEE 802.11, on the performance of network schemes of [9] for all-to-all data transmission. According to
coding. In such scenarios, deadlock situations may occur where these algorithms, whenever an innovative packet is received at
the delivery process stops and some of the nodes never gather a given node, it generates with probability 𝜌 (the forwarding
the required packets. To tackle this problem, we propose a factor) a new packet through RLNC and broadcasts it over the
proactive mechanism (called proactive network coding) which
adapts its transmission schedule according to the decoding status channel. For the medium access control (MAC) we consider
of neighboring nodes. This scheme can detect when nodes need several variants of carrier sense multiple access (CSMA). We
additional packets in order to decode and acts accordingly. focus on the interaction between MAC and network coding
We nally investigate the behavior of network coding schemes over different wireless network congurations in order to
in multi-rate environments, where we propose a distributed capture the effects of each protocol component and quantify
heuristic approach for the selection of data rates.
the performance degradation due to packet collisions and
Index Terms—Wireless ad hoc networks, network coding, data random transmission schedules. Subsequently, based on our
dissemination, protocol design. performance evaluation we design a proactive dissemination
mechanism and we show that it outperforms the reactive
I. I NTRODUCTION schemes in [9]. The main contributions of this paper are:
∙ We study the performance of random network coding in
Authorized licensed use limited to: ELETTRONICA E INFORMATICA PADOVA. Downloaded on March 03,2010 at 15:45:05 EST from IEEE Xplore. Restrictions apply.
ASTERJADHI et al.: TOWARD NETWORK CODING-BASED PROTOCOLS FOR DATA BROADCASTING IN WIRELESS AD HOC NETWORKS 663
The authors of the paper experimentally show that signicant II. T HE I MPACT OF MAC L AYER ON DATA
gains, in terms of maximum throughput, are possible even D ISSEMINATION VIA N ETWORK C ODING
in the case of unicast transmissions and even when network
coding is implemented through simple XORing of packets In this section we study the behavior of Network Coding
within a single-hop neighborhood (rather than forwarding in realistic environments. Our aim is to address open issues
encoded packets over multiple hops). [6] presents BFLY, a for its application in wireless networks with a realistic MAC
localized network coding protocol which recognizes buttery Layer.
structures in the network to exploit the coding opportunities Problem description: wireless ad hoc networks are severely
they represent. This protocol builds on COPE and also encodes constrained by interference and channel impairments, espe-
packets through XOR operations, but it additionally allows cially in the case of broadcast communication. The use of
the transmission of encoded packets over multiple hops. The traditional access mechanisms such as CSMA-like protocols,
work in [5], [6] present practical communication schemes, when multiple nodes transmit, may suffer from a high number
where [5] quanties the achievable gains from coding when of collisions and dropped packets. Two main factors are to be
an actual MAC layer is used. Our focus is different in terms of taken into account when using network coding in conjunction
network scenario, as we consider an all-to-all communication with an actual MAC, namely 1) collisions and 2) packet
paradigm and encode packets in 𝐺𝐹 (𝑞) with 𝑞 = 256, scheduling. Both collisions and scheduling are the direct
considering more general coding rules. In [8], the authors consequence of the random (CSMA-like) channel access that
investigate the interaction between MAC and network cod- we adopt in this study. Collisions impact the performance as
ing in wireless multi-hop networks, and propose distributed fewer packets are collected; as a consequence it takes longer
and opportunistic scheduling rules for the combination of to obtain full rank decoding matrices at the receivers. Packet
packets in the presence of time-varying fading links. They scheduling refers to the way in which different nodes take
also look at the impact of MAC schedules. However, this turns in transmitting, which is dictated by the MAC rules. The
topic is treated differently from what we do here as packets transmission order is important when network coding is used
at relay nodes are XORed and possible deadlocks in the at higher layers as it inuences the way encoded packets are
data dissemination are not investigated. The authors of [17] created, i.e., which packets are mixed together. In this paper
study the interaction of network coding and MAC, devis- we focus on the analysis of random access schemes as used
ing suitable conict-free transmission schedules (for a given by IEEE 802.11.
connectivity graph) and related off- and on-line algorithms Network topologies: we start our investigation with circu-
for wireless multi-hop networks. However, their strategies lar and grid reference scenarios and then consider random
entail some coordination among nodes which incurs additional topologies. We ensure that all random topologies used in
communication overhead with respect to RLNC. Reference [9] the simulations are connected. To this end, we do a simple
studies all-to-all communication scenarios and introduces a breadth-rst-search of the underlying connectivity graph and
class of lightweight reactive and distributed network coding check if all nodes are visited (a standard procedure to check
protocols based on RLNC, proving the superiority of these for connectivity). The topology is valid (i.e., it is used in
schemes over ooding [18] and epidemic routing [1]. Our the simulations) if a single connected cluster exists and is
present work is the natural continuation of [9], which we discarded otherwise.
complement investigating the performance degradation due to Physical layer: for the results in this paper we have im-
actual MAC schemes and proposing a solution to deadlocks plemented an extended version of the ns2 physical layer
in the dissemination of the information, which may occur for IEEE 802.11b/g which includes packet error rate (PER)
in certain topologies. The performance evaluation that we calculations accounting for modulation, channel effects, and
carry out in this paper is based on simulation results obtained multi-user interference. In detail, the Signal to Interference
using ns2; the relevant simulation code can be downloaded plus Noise Ratio (SINR) is evaluated for each receiving node
from [19]. and for each packet taking into consideration the interference
The remainder of this paper is organized as follows. In generated by nearby transmitters. PERs are obtained from pre-
Section II we quantify the impact of several IEEE 802.11 calculated packet error rate curves. For the channel, we use the
variants on the performance of network coding. In Section III standard ns2 two ray ground propagation model. More details
we design a lightweight and distributed mechanism to perform can be found in [20].
network coding more efciently and show via simulations that MAC protocols: we consider four different MAC protocols
it can signicantly outperform the data dissemination schemes based on CSMA, which is currently the most widely used
of [9]. Other results are given for multi-rate environments medium access mechanism in wireless ad hoc networks.
in Section IV: on the one hand, high data rates are good 1) IEEE 802.11b: is considered as the baseline MAC. We
as they shorten packet transmission times, thereby reducing adopt the basic access provided by IEEE 802.11b that, in the
the collision probability; on the other hand, however, in a broadcast mode, does not use any acknowledgment mecha-
multi-hop scenario high data rates mean that packets have to nism. In case of collision, no retransmission occurs and the
travel more hops to reach the destination. Thus, determining packet is lost.
suitable data rates for each node, so as to obtain good 2) IEEE 802.11b with pseudo broadcast [5]: this scheme
tradeoffs between delay and delivery ratio, is a challenging and is an improvement of the basic IEEE 802.11b, where an
interesting problem for which we propose a heuristic solution acknowledgment mechanism is implemented. A given node
in Section IV. Section V concludes the paper. randomly picks a neighbor and sends a packet to it via
Authorized licensed use limited to: ELETTRONICA E INFORMATICA PADOVA. Downloaded on March 03,2010 at 15:45:05 EST from IEEE Xplore. Restrictions apply.
664 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 9, NO. 2, FEBRUARY 2010
unicast by including its address in the packet header. All no collisions) assure a packet delivery ratio of 1 when the
other neighbors are in promiscuous mode and can thus over- number of neighbors is 2 (the packet delivery ratio is dened
hear/decode the transmission. However, only the neighbor in Section II-A).
which is the intended receiver of the unicast sends back an 2) Semi-deterministic network coding: in this case, for a given
acknowledgment. This is done according to the basic IEEE forwarding factor 𝜌, each node sends out a new combination
802.11b unicast communication mode (without RTS/CTS). after having received exactly ⌈1/𝜌⌉ innovative packets. As
The packet is retransmitted, after a backoff period, in case an example, 𝜌 = 0.5 means that each node deterministically
there is no acknowledgment from the intended receiver. Using transmits a new combination every two received innovative
this mechanism, only collisions at the addressed receiver can packets. The forwarding factor, in this case, is not related to a
be detected, while collisions occurring at any of the other probability, but it is rather used as a threshold on the number
neighbors are ignored. Also, this strategy does not solve the of incoming messages.
hidden terminal problem. 3) Timed network coding: The two previous schemes have
3) IEEE 802.11 with pseudo broadcast and RTS/CTS hand- two major drawbacks. The rst is that they are particularly
shake: To further improve the performance we consider the sensitive to packet losses, e.g., due to collisions. In fact, if
previous scheme with additional RTS/CTS handshake. These one of the transmitted packets is lost, the propagation of
control messages are introduced to alleviate the hidden node the information through the network could be interrupted.
problem. The CTS is only transmitted by the node addressed The second drawback is that both probabilistic and semi-
in the packet header. As for the previous schemes, this strategy deterministic network coding suffer from some inefciencies
can not detect collisions at all overhearing nodes. when there is a small number of packets to combine. In
4) Ideal MAC: is a simple mechanism where transmitted such cases, new combinations are created from a small set
packets are only affected by the delay, Δ = ℓ + Δprop ≃ ℓ, of packets and, for this reason, are often not innovative. To
where Δprop is the propagation delay and ℓ is the packet alleviate these problems, we introduce a timing strategy into
transmission time. That is, we assume to have an omniscient the rst scheme. For each received innovative packet, a timer
entity which regulates the transmissions in order to completely is activated. When the timer has expired, the node decides
avoid interference and collisions. Hence, as a node sends a to send out a new random combination with probability 𝜌.
packet, all its neighbors successfully receive the message after The timer, 𝜏 , is a uniform random variable in [0, 𝜏max ]. This
the (xed) delay Δ. Note that this MAC still schedules packet timing approach has two advantages. With the introduction
transmissions according to CSMA and is thus non-ideal from of a waiting interval before transmission, nodes have the
a packet scheduling point of view when network coding is chance of collecting other innovative packets and send out
used at the upper layers. This idealized scheme is exploited richer combinations. Moreover, the reduction of the number
to pinpoint the effect of packet errors on the performance of of transmissions and the random characteristic of the timer
network coding. help in decreasing the collision probability at the MAC layer.
Network coding: we consider the RLNC paradigm of [3], The drawback of the timed scheme is the introduction of a
which is implemented as presented in [15]. At any given short delay due to the timer. Hence, the timer value shall be
node, every new encoded packet is obtained as the linear chosen so as to achieve a good trade-off between extra delay
combination of all packets in its receiving buffer, where and performance improvements. In IEEE 802.11b, this value
the combination coefcients are scalars randomly picked in has to be large enough to allow for the collection of more than
𝐺𝐹 (𝑞). These scalars are then stored in an encoding vector one packet, which translates to selecting 𝜏max ≈ 10 − 30 ms.
which is sent along with the encoded packet, see [15] for We picked 𝜏max = 20 ms. Note that in general 𝜏max depends
further details. In addition, we implement three different on network density and ow demands.
packet combination techniques. The rst two are inspired by Trafc pattern: for the trafc pattern, each node 𝑖 inserts into
the work in [9], while the last one is a new proposal. In the network a single original packet 𝑥𝑖 and wants to collect all
the following, we detail the packet combination strategies the other inserted packets. 𝑥𝑖 s are generated either randomly
considered in this section. All the presented schemes are or deterministically. In the former case, each node inserts its
characterized by a design parameter, called forwarding factor original packet by independently picking the insertion time
𝜌, which is dened as the ratio between the average number uniformly in a xed length interval of Δ1 = 100 ms. In the
of packets transmitted and the average number of innovative latter case, we can assume to have a simple application that
packets received, per node. A received packet is innovative inserts original packets sequentially in each node. Subsequent
whenever it increases the rank of the decoding matrix [9]. For insertions, at different nodes, are separated by xed time
the schemes below 𝜌, is decided a priori and equal for all intervals of Δ2 = 1 s. For this value of Δ2 , with the consid-
nodes. ered scenario (e.g., transmission times and network size), the
1) Probabilistic network coding: this approach uses RLNC. collision probability is negligible for both original packets and
Each node sends a random linear combination of the packets subsequent transmissions elicited by network coding. This is
in its buffer. When receiving an innovative message a new useful to assess the performance of our dissemination schemes
combination is transmitted with probability 𝜌 (the forwarding when used with an ideal MAC.
factor) whereas nothing is transmitted with probability 1 − 𝜌.
For 𝜌 = 0.5, a node on average sends a new message every two A. MAC and Combination Strategies: Simulation results
innovative packets received. From [21] we know that 𝜌 = 0.5 In this section, we discuss the most relevant results we
would theoretically (circular topology, ideal scheduling, and obtained via ns2 simulations. All presented schemes are eval-
Authorized licensed use limited to: ELETTRONICA E INFORMATICA PADOVA. Downloaded on March 03,2010 at 15:45:05 EST from IEEE Xplore. Restrictions apply.
ASTERJADHI et al.: TOWARD NETWORK CODING-BASED PROTOCOLS FOR DATA BROADCASTING IN WIRELESS AD HOC NETWORKS 665
NC ! IEEE 802.11b
NC ! IEEE 802.11b pb RTS/CTS
1 NC ! IEEE 802.11b pb
1
NC ! Ideal Mac
Flooding ! IEEE 802.11b
0.6 0.6
0.4 0.4
NC ! IEEE 802.11b
NC ! IEEE 802.11b pb
NC ! IEEE 802.11b pb RTS/CTS
NC ! Ideal Mac
0.2 0.2 Flooding ! IEEE 802.11b
Flooding ! IEEE 802.11b pb
Flooding ! IEEE 802.11b pb RTS/CTS
Flooding ! Ideal Mac
0 0
0.2 0.4 0.6 0.8 1 0.2 0.4 0.6 0.8 1
Forwarding Factor, ! Forwarding Factor, !
Fig. 1. Packet Delivery Ratio: Performance comparison of Probabilistic Fig. 2. Packet Delivery Ratio: Performance comparison of Probabilistic
network coding and Probabilistic Flooding for different MAC protocols in network coding and Probabilistic Flooding for different MAC protocols in
circular networks with 𝑛 = 16. grid networks with 𝑛 = 16.
Authorized licensed use limited to: ELETTRONICA E INFORMATICA PADOVA. Downloaded on March 03,2010 at 15:45:05 EST from IEEE Xplore. Restrictions apply.
666 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 9, NO. 2, FEBRUARY 2010
0
10
NC ! IEEE 802.11b 1
NC ! IEEE 802.11b pb
NC ! IEEE 802.11b pb RTS/CTS
NC ! Ideal Mac
0.6
!2 0.4
10
Authorized licensed use limited to: ELETTRONICA E INFORMATICA PADOVA. Downloaded on March 03,2010 at 15:45:05 EST from IEEE Xplore. Restrictions apply.
ASTERJADHI et al.: TOWARD NETWORK CODING-BASED PROTOCOLS FOR DATA BROADCASTING IN WIRELESS AD HOC NETWORKS 667
Authorized licensed use limited to: ELETTRONICA E INFORMATICA PADOVA. Downloaded on March 03,2010 at 15:45:05 EST from IEEE Xplore. Restrictions apply.
668 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 9, NO. 2, FEBRUARY 2010
When a node receives an SSM from each of its known q/W q/W ... q/W q/W
neighbors, the SSC is veried and transmissions are stopped.
We refer to this scheme as Strong ProNC as it requires strong p p p p
assumptions on the data trafc. In order to send out SSMs, q/W
each node needs to know in advance how many packets it 0 1 2 ... W-2 W-1
wants to collect. This fact implies that each node has full 1-p 1-p 1-p 1-p
knowledge about the amount (and type) of data owing over q/W q/W
the network. Note that the collection of this information may 1-q
q/W ... q/W
not be feasible in practice.
The second strategy we propose is based on the WSC.
-1
During data propagation, each node sends out beacons (Weak
Stopping Messages, WSM) containing a decoding eld which
is set to 1 if it can decode all packets in its buffer and to 0 1-q
otherwise. In addition, beacons contain a rank eld specifying
the rank of the nodes’ decoding matrices. According to the Fig. 7. Markov chain tracking the evolution of the IEEE 802.11 broadcast
Weak Stopping Conditions each node suspends its transmis- transmission process. For 𝑛𝑣 nodes in a neighborhood, 𝑝 is the probability
that at least one of the remaining 𝑛𝑣 nodes transmits when the target node
sions when all its neighbors can decode all the packets in their is in slot 𝑖 = 1, . . . , 𝑊 − 1. 1 − 𝑞 is the probability that the transmission
buffers and their matrices have the same (full) rank. We refer buffer is empty after the transmission of a given packet. 𝑊 is the backoff
to this second strategy as Weak ProNC because it does not window size of IEEE 802.11.
require any knowledge about the data trafc and has a limited
overhead. However, Weak ProNC is suboptimal as there are dimensional Markov chain of Fig. 7 (a two dimensional chain
some situations in which the rank alone does not capture the was used in [22] for the IEEE 802.11 unicast case to take
exact decoding status at different nodes. For instance, it might retransmissions into account). In addition, in order to model
happen that all neighbors of a node can decode all the packets the transmission process in nonsaturated trafc conditions, we
in their buffers and they all have the same rank but the decoded adopt the technique of [23] where idle transmission times
information is different. (due to empty transmission queues) are modeled through the
addition of the further state −1. With reference to Fig. 7
A. Rate adaptation heuristics our model works as follows. When a target node has a
packet to transmit, it starts the backoff process by randomly
We dene 𝜏 as the time elapsed between the completion of selecting a backoff counter value from 0 to 𝑊 − 1 and then
the transmission of a packet by the PHY and the instant when starting to decrement the counter until state 0 is reached. State
the next packet is made available for transmission at the MAC, 𝑖 = 0, 1, . . . , 𝑊 − 1 represents the current backoff counter
i.e., the idle time of the node. Note that 𝜏 is (roughly) inversely value. The transition from state 𝑖 to state 𝑖 − 1 occurs with
proportional to the transmission rate of the nodes. In what probability 1 − 𝑝 after a backoff slot time (of xed duration
follows, we present an approximate model to nd the value of 𝜎), while with probability 𝑝 the process remains in state 𝑖.
𝜏 that maximizes the amount of innovative information that 𝑝 is the probability that at least one of the remaining 𝑛𝑣
is transferred over the channel as a function of the system nodes transmit when the target node is in state 𝑖. If this
parameters. Note that the physical (PHY) layer data rate is kept occurs, the node momentarily stops counting down its backoff
constant. Methods to change the PHY rate are investigated in timer. The current packet is nally transmitted when the
Section IV. backoff process reaches state 0 (transmission state). Upon the
Impact of MAC layer dynamics: in what follows we de- completion of the packet transmission two events can occur:
rive the relationship between the value of 𝜏avg = 𝐸[𝜏 ] E1) with probability 𝑞 the transmission queue is non-empty
that maximizes the throughput, referred to as 𝜏avg ★
, and the and a new backoff timer is uniformly selected at random in
number of neighbors at any given node, 𝑛𝑣 . We consider {0, 1, . . . , 𝑊 − 1}: the probability that the system moves from
the packet transmission process in a given neighborhood of state 0 to any state 𝑖 = 0, 1, . . . , 𝑊 − 1 is thus 𝑞/𝑊 . E2) With
𝑛 = 𝑛𝑣 + 1 nodes making the following assumptions: A1) we probability 1 − 𝑞 the transmission queue is empty and in this
neglect the channel propagation delay as for the considered case the process moves to the idle state −1, where it remains
system parameters it has a negligible impact on the throughput until a new packet arrives (at which point the chain evolution
performance, A2) we assume that all packets involved in a is the same as in E1).
collision are lost and A3) we assume that any transmitted
Let 𝜋𝑖 , 𝑖 = −1, 0, 1, . . . , 𝑊 − 1 be the steady-state proba-
packet is always successfully received by all nodes in the bilities of the above Markov chain. Our goal is to nd 𝜋0 (the
neighborhood unless it collides with another transmission. To
transmission probability) and relate it to 𝜏avg . From the chain
obtain a rate adaptation heuristic we model the IEEE 802.11 regularities, and by computing recursively through the chain
broadcast communication process. As in [22], the evolution from right to left, we obtain:
of the transmission backoff counter is tracked using a suitable
Markov chain. However, in our case the backoff window size
𝑊 is always constant as packets are neither retransmitted nor 𝑖𝑞(𝜋0 + 𝜋−1 )
𝜋𝑊 −𝑖 = , 𝑖 = 1, 2, . . . , 𝑊 − 1 ,
acknowledged. This implies that the broadcast backoff process 𝑊 (1 − 𝑝)
of any of the 𝑛𝑣 + 1 nodes can be modeled through the one 𝜋0 = (𝜋0 + 𝜋−1 )𝑞 . (1)
Authorized licensed use limited to: ELETTRONICA E INFORMATICA PADOVA. Downloaded on March 03,2010 at 15:45:05 EST from IEEE Xplore. Restrictions apply.
ASTERJADHI et al.: TOWARD NETWORK CODING-BASED PROTOCOLS FOR DATA BROADCASTING IN WIRELESS AD HOC NETWORKS 669
∑𝑊 −1
From the normalization condition 𝑖=−1 𝜋𝑖 = 1 we nd The optimal transmission probability 𝜋0★ can be found as (see
1 calculations in Section VI of [22]):
𝜋0 + 𝜋−1 = (𝑊 −1)𝑞
, (2)
1+ 2(1−𝑝)
𝜋0★ = argmax 𝑔(𝜋0 )
𝜋
√ 0
from which we nally obtain 𝜋0 as: [(𝑛𝑣 + 1) + 2𝑛𝑣 (𝑇𝑠 /𝜎 − 1)]/(𝑛𝑣 + 1) − 1
𝑞 = (10)
.
𝜋0 = . (3) 𝑛𝑣 (𝑇𝑠 /𝜎 − 1)
−1)𝑞
1 + (𝑊
2(1−𝑝) The optimal 𝜏avg
★
, is obtained from 𝜋0★ as:
The probability 𝑝 that at least one of the remaining 𝑛𝑣 nodes 1. Express 𝑞 as 𝑞 = 1 − 𝑒−𝐸[slot length]/𝜏avg , which as shown
transmits when the target node is in slot 𝑖 = 1, . . . , 𝑊 − 1 in [23] provides a good approximation of the queue
𝑑𝑒𝑓
is found as: 𝑝 = 1 − (1 − 𝜋0 )𝑛𝑣 = 𝑓1 (𝜋0 ). We additionally behavior in the unsaturated case. Inverting this relation
dene the probability 𝑃𝑡 that at least one node is transmitting gives:
in a given slot, 𝐸[slot length]
𝑛𝑣 +1 𝜏avg = −
𝑃𝑡 = 1 − (1 − 𝜋0 ) , (4) log(1 − 𝑞)
and 𝑃𝑠 as the probability that only one node is in the 𝜎(1 − 𝑃𝑡 ) + 𝑃𝑡 𝑇𝑠
= − . (11)
transmission state, conditioned on the fact that at least one log(1 − 𝑞)
node is transmitting. 𝑃𝑠 is obtained as: 2. Obtain 𝜋0★ from (10).
(𝑛𝑣 + 1)𝜋0 (1 − 𝜋0 )𝑛𝑣 (𝑛𝑣 + 1)𝜋0 (1 − 𝜋0 )𝑛𝑣 3. Invert (3) to nd 𝑝 as a function of 𝜋0 as:
𝑃𝑠 = = . (5)
𝑃𝑡 1 − (1 − 𝜋0 )𝑛𝑣 +1 𝜋0 (𝑊 − 1) 𝑑𝑒𝑓
𝑝=1− = 𝑓2 (𝜋0 , 𝑞) (12)
We are now ready to calculate the normalized throughput 𝑆 2(1 − 𝜋0 /𝑞)
as (see [22]): and nd 𝑞 ★ as the solution of 𝑓1 (𝜋0★ ) − 𝑓2 (𝜋0★ , 𝑞) = 0,
𝐸[payload bits successfully transmitted in a slot] which leads to:
𝑆= . (6)
𝐸[slot length] 2𝜋0★ (1 − 𝜋0★ )𝑛𝑣
Since a successful transmission occurs in a slot with proba- 𝑞★ = . (13)
2(1 − 𝜋0★ )𝑛𝑣 + 𝜋0★ (1 − 𝑊 )
bility 𝑃𝑡 𝑃𝑠 , the average number of payload bits successfully
4. Obtain 𝜏avg
★
from (11) setting 𝑞 ← 𝑞 ★ and expanding
transmitted in a slot time is 𝑃𝑡 𝑃𝑠 𝑃 , where 𝑃 is the payload
𝐸[slot length] using (4):
size. The average length of a slot can be obtained by consid-
ering the following three mutually exclusive cases: C1) with ★ 𝑇𝑠 − (1 − 𝜋0★ )𝑛𝑣 +1 (𝑇𝑠 − 𝜎)
𝜏avg = ( ) (14)
probability 1 − 𝑃𝑡 , none of the nodes transmit in the slot. The 2(1−𝜋 ★ )𝑛𝑣 +𝜋 ★ (1−𝑊 )
log 2(1−𝜋★0)𝑛𝑣 +1 +𝜋0 ★ (1−𝑊 )
duration of an empty backoff slot is 𝜎 = 20 𝜇s. C2) with 0 0
probability 𝑃𝑡 𝑃𝑠 , only one node transmits in the slot. The slot We observe that our model is accurate for sufciently large
duration in this case is 𝑇𝑠 , which is the transmission time 𝑛𝑣 , i.e., 𝑛𝑣 ≥ 4. For smaller values it is however inaccurate
of a packet, given by the sum of the time spent transmitting because of several approximations made in the analysis, i.e.,
the physical header (𝑇PHY ), the MAC header (𝑇MAC ), the the expression of 𝑞 [23], the independence of the busy channel
network coding header (𝑇NC (𝑛) = 𝑁 𝐶(𝑛)/𝑅), the payload probability 𝑝 among subsequent access slots [22] and to the
(𝑇𝑃 = 𝑃/𝑅), plus the distributed inter frame space (DIFS) fact that in our derivation of the steady state probabilities
time, 𝑇DIFS : we neglect the semi-Markov character of the process, i.e.,
𝑇𝑠 = 𝑇PHY + 𝑇MAC + 𝑇NC (𝑛) + 𝑇𝑃 + 𝑇DIFS . (7) that states 0 and 𝑖 ∕= 0 have different durations (a common
simplication for the analysis of IEEE 802.11 throughput [22],
C3) With probability 𝑃𝑡 (1 − 𝑃𝑠 ), multiple nodes transmit in [23]).
a slot time, leading to a collision event. The duration of this Implementation notes: in our implementation we pick
slot is also 𝑇𝑠 because packets are not acknowledged and, 𝜏avg = 𝜏avg★
selecting 𝜏 uniformly in [0, 2𝜏avg ], which gives
therefore, the transmission period for successful and collided 𝐸[𝜏 ] = 𝜏avg . We obtain 𝜏avg★
as a function of 𝑛𝑣 from (14)
packets is the same. Hence, we have 𝐸[slot length] = 𝜎(1 − using 𝑇PHY = 192 𝜇s, 𝑇MAC = 224 𝜇s, 𝑇DIFS = 50 𝜇s,
𝑃𝑡 ) + 𝑃𝑡 𝑃𝑠 𝑇𝑠 + 𝑃𝑡 (1 − 𝑃𝑠 )𝑇𝑠 . These facts together with (6) 𝜎 = 20 𝜇s, 𝑅 = 1 Mbps and 𝑊 = 32 slots, which are used
give: for IEEE 802.11b broadcast with a rate of 1 Mbps. We nd
𝑃𝑡 𝑃𝑠 𝑃 that the relationship between the two is well approximated
𝑆 =
𝜎(1 − 𝑃𝑡 ) + 𝑃𝑡 𝑃𝑠 𝑇𝑠 + 𝑃𝑡 (1 − 𝑃𝑠 )𝑇𝑠 by a linear function, as predicted by the simulation results
𝑃𝑠 (𝑃/𝜎) of [9], [24]. A good approximation is in fact given by the
= . (8) following heuristic: 𝜏avg
★
≃ 𝜅𝑛𝑣 𝑇𝑠 , where 𝜅 = 0.7. We note
(1 − 𝑃𝑡 )/𝑃𝑡 + 𝑇𝑠 /𝜎
that 𝜏avg corresponds to the average amount of time spent
Note that the maximum throughput is achieved when the
in state −1, i.e., to the time elapsed between the completion
following function is maximized: of the transmission of a packet by the PHY and the instant
𝑃𝑠 when a new packet is made available by ProNC. The inter-
𝑔(𝜋0 ) =
(1 − 𝑃𝑡 )/𝑃𝑡 + 𝑇𝑠 /𝜎 packet transmission time is greater than 𝜏avg as it also includes
(𝑛𝑣 + 1)𝜋0 (1 − 𝜋0 )𝑛𝑣 the time spent in backoff. Moreover, ProNC requires the
= . (9)
𝑇𝑠 /𝜎 − (1 − 𝜋0 )𝑛𝑣 +1 (𝑇𝑠 /𝜎 − 1) estimation of the number of neighbors at each node which
Authorized licensed use limited to: ELETTRONICA E INFORMATICA PADOVA. Downloaded on March 03,2010 at 15:45:05 EST from IEEE Xplore. Restrictions apply.
670 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 9, NO. 2, FEBRUARY 2010
0 0
10 10
increasing !
!1 !1
10 10
increasing !
n v =4 n v =2
!2 Weak ProNC !2 n v =4 n v =2 Weak ProNC
10 10
Strong ProNC Strong ProNC
Reactive NC, nv=2 Reactive NC, n =2
v
Reactive NC, n =4 Reactive NC, n =4
v n v =8 v
Reactive NC, nv=8
Reactive NC, n =8
v n v =8
Reactive NC, n =16 Reactive NC, nv=16
v !3
!3 Reactive NC, nv=32
10 Reactive NC, n =32 10
v
Adaptive NC, n =2 Adaptive NC, nv=2
v
Adaptive NC, n =4 Adaptive NC, nv=4
v
Adaptive NC, nv=8 Adaptive NC, n =8
v
n v =32 n v =16 n v =8 n v =4
Adaptive NC, nv=16 n v =16 Adaptive NC, nv=16
!4
!4
Adaptive NC, nv=32 n v =32 10 Adaptive NC, nv=32
10
Fig. 8. Failure probability 1−𝑃 𝐷𝑅 vs delay: comparison between proactive Fig. 9. Failure probability 1 − 𝑃 𝐷𝑅 vs overhead: comparison between
and reactive schemes. The curves shown for reactive schemes are obtained proactive and reactive schemes. The curves shown for reactive schemes are
for different values of 𝑛𝑣 ∈ {2, 4, 8, 16, 32}, varying 𝜌 as the independent obtained for different values of 𝑛𝑣 ∈ {2, 4, 8, 16, 32}, varying 𝜌 as the
parameter. independent parameter.
can be simply achieved by monitoring the source addresses average node densities by varying the average number of
of incoming packets. Note that both the stopping conditions neighbors, 𝑛𝑣 ∈ {2, 4, 8, 16, 32}. For the MAC, we adopt the
and the packet rate adaptation mechanism depend on the node basic IEEE802.11b broadcast mode, accounting for channel
density. Most importantly, the number of nodes estimated in errors and collisions. In the following graphs we consider
this way is smaller than that of the previous analysis. In the probabilistic network coding of Section II (referred to as
fact, this number of neighbors only accounts for the nodes ”Reactive NC” in the plots) as well as the adaptive network
within transmission range, whereas 𝑛𝑣 should include all coding (referred to as ”Adaptive NC”) scheme of [9] where
nodes in the collision domain, whose range is always greater. 𝜌 is picked independently at each node as 𝜌 = 𝑐/(𝑛𝑣 + 1),
′
Hence, the actual inter-packet transmission time 𝜏avg , which where 𝑐 is a suitable constant equal for all nodes [9]. In Fig. 8
accounts for all these facts, is 𝜏avg = 𝜅 𝑛𝑣 𝑇𝑠 where 𝜅′ = 6.
′ ′
we show the tradeoff between failure probability, 1 − 𝑃 𝐷𝑅,
We thus use this linear heuristic which gives good results and the packet delivery delay. We note that ProNC performs
across all simulations. In addition, Stopping Messages are better in terms of data recovery; 1 − 𝑃 𝐷𝑅 is at least one
included within data packets at the cost of a few extra bits. order of magnitude smaller for ProNC when 𝑛𝑣 ∈ {8, 16}.
For SSM, we need one additional bit, whereas for WSM we For small 𝑛𝑣 , i.e., 𝑛𝑣 ∈ {2, 4}, we often obtain pathological
need a bit to represent the decoding status and a byte to topologies leading to deadlocks of the data dissemination
communicate the rank of the local decoding matrix2 . In both when reactive protocols are used. ProNC efciently deals
cases, the additional overhead is acceptable. On the downside, with these topologies and alleviates the deadlock problem by
when a node becomes inactive it must send out at least one offering better performance in terms of 1 − 𝑃 𝐷𝑅. On the
Stopping Message to communicate its change of status and downside, in these cases the dissemination of data in ProNC
this packet may be useless for coding purposes. We note takes slightly longer due to the waiting periods of proactive
that piggybacking control information within data packets has schemes (see variable 𝜏 ). The tradeoff concerning the protocol
the benecial effect of keeping channel congestion low. In overhead is shown in Fig. 9: similarly to reactive schemes,
addition, the added control information (SSMs and WSMs, the overhead of ProNC increases with decreasing 𝑛𝑣 . This
rank, decoding status) is used to increase the efciency of is because network coding is more efcient when the node
network coding schemes which, in turn, can further reduce density is high. Also, the overhead of ProNC is usually smaller
the number of transmissions for a target performance level. than that of reactive schemes, while it always outperforms
These benets are quantitatively veried below. reactive solutions in terms of data recovery performance. For
both graphs Weak ProNC performs slightly worse than Strong
B. ProNC: Simulation Results ProNC in terms of packet delivery ratio, whereas it performs
Next, we compare the ProNC scheme against the reactive better in terms of overhead performance for the same 𝑛𝑣 .
probabilistic schemes proposed in [9]. The results that follow The difference in performance is more signicant at small
are for topologies where nodes are randomly placed within densities, i.e., where deadlocks are more likely to occur. As
a xed area in such a way that the topology is always con- demonstrated in [25], the overhead performance of all schemes
nected, possibly through multi-hop paths. We consider several at high densities approaches that of an idealized scheme,
having the minimum possible overhead: this reects the fact
2 A single byte often sufces in practice, i.e., the number of nodes in the
that network coding works better when there are more coding
network that generate original packets is lower than or equal to 256. Coding opportunities.
over more original packets would imply the inversion of large matrices at the
receiver which is impractical and difcult to obtain in realtime. To summarize, both Strong and Weak ProNC show satisfac-
Authorized licensed use limited to: ELETTRONICA E INFORMATICA PADOVA. Downloaded on March 03,2010 at 15:45:05 EST from IEEE Xplore. Restrictions apply.
ASTERJADHI et al.: TOWARD NETWORK CODING-BASED PROTOCOLS FOR DATA BROADCASTING IN WIRELESS AD HOC NETWORKS 671
Authorized licensed use limited to: ELETTRONICA E INFORMATICA PADOVA. Downloaded on March 03,2010 at 15:45:05 EST from IEEE Xplore. Restrictions apply.
672 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 9, NO. 2, FEBRUARY 2010
n = 7, ! = 0.4
v
network sizes. As usual, various tradeoffs can be obtained for
!1
nv = 7, ! = 0.6 different forwarding factors 𝜌: high 𝜌 values always lead to
10 nv = 7, ! = 0.8
n = 10, ! = 0.4
v
good 𝑃 𝐷𝑅 performance at the cost of additional delay, while
a small 𝜌 is a good choice in terms of delay performance at
Failure Probability, 1!PDR
n = 10, ! = 0.6
v
n = 10, ! = 0.8
v
nv = 15, ! = 0.4
the cost of an increased failure probability.
n = 15, ! = 0.6
!2
v
10 n = 15, ! = 0.8
v V. C ONCLUSIONS
In this paper we focused on the design of practical broad-
casting schemes based on network coding for wireless ad
10
!3 increasing c f hoc networks. First we discussed the impact of IEEE 802.11-
like random access on the performance of reactive network
coding [9]. We identied potential problems due to premature
termination of the data dissemination. To solve these, we pro-
10
!4 posed an original proactive network coding (ProNC) strategy.
0.004 0.006 0.008 0.01 0.012 0.014 0.016 0.018 0.02 0.022 0.024
We nally focused on broadcasting protocols for multi-rate ad
Packet Delivery Delay [s]
hoc networks, where we devised a lightweight rate adaptation
Fig. 12. Tradeoff between failure probability 1 − 𝑃 𝐷𝑅 and packet delivery heuristic. The designed protocols use estimates of the local
delay for a multi-rate ad hoc network with different network densities. node density to reduce the collision probability and keep a
Different curves correspond to different forwarding factors 𝜌. Each curve sufcient amount of innovative packets owing across the
is plotted for varying 𝑐𝑓 .
network. The effectiveness of our schemes was demonstrated
by simulation in a range of different scenarios.
factors 𝑐𝑓 . For this gure, nodes have on average 𝑛𝑣 = 10
neighbors, solid curves represent reactive network coding with ACKNOWLEDGMENT
xed data rate (only the extreme cases of 6 and 54 Mbps are
This paper is partly based on research presented at IEEE
plotted), whereas dotted curves represent the reliability when
ICC 2007 and IEEE GLOBECOM 2007. This work was
nodes are allowed to adapt their data rate based on the above
partially supported by DoCoMo Euro-Labs.
heuristic. First of all, we observe that transmitting with the
highest rate of 54 Mbps performs the worst. This is because
R EFERENCES
in such a case the error probability is quite high and this affects
the overall performance. As expected, a xed rate of 6 Mbps [1] P. Eugster, R. Guerraoui, A.-M. Kermarrec, and L. Massoulie, “Epidemic
information dissemination in distributed systems,” Computer, vol. 37,
leads to the best reliability performance. However, setting no. 5, pp. 60–67, May 2004.
𝑐𝑓 = 40% gets very close to this performance while leading [2] D. Tuninetti and C. Fragouli, “Processing along the way: forwarding vs.
to a better delay metric, as we can see from Fig. 11. From coding,” in ISITA, Parma, Italy, Oct. 2004.
[3] T. Ho, M. Medard, R. Koetter, D. R. Karger, M. Effros, J. Shi, and
this plot we can further appreciate the benets of adapting B. Leong, “A random linear network coding approach to multicast,”
the data rate: overall, for a coverage factor of 𝑐𝑓 = 40% we IEEE Trans. Inf. Theory, vol. 52, no. 10, pp. 4413–4430, Oct. 2006.
get the shortest delays by performing, in terms of reliability, [4] J. Yuan, Z. Li, W. Yu, and B. Li, “A cross-layer optimization framework
for multihop multicast in wireless mesh networks,” IEEE J. Sel. Areas
almost as well as the xed rate scheme with 6 Mbps. For Commun., vol. 24, no. 11, pp. 2092–2103, Nov. 2006.
the non monotonic behavior of the curves of Fig. 11, note [5] S. Katti, H. Rahul, W. Hu, D. Katabi, M. Médard, and J. Crowcroft,
that when 𝜌 is low, e.g., 𝜌 = 0.1, the dissemination of “Xors in the air: practical wireless network coding,” ACM SIGCOMM
Comput. Commun. Rev., vol. 36, no. 4, pp. 243–254, Oct. 2006.
innovative information terminates early (in this case deadlocks [6] S. Omiwade, R. Zheng, and C. Hua, “Practical localized network coding
are frequent) and a large number of nodes are unable to in wireless mesh networks,” in Proc. IEEE SECON, San Francisco,
decode all packets (𝑃 𝐷𝑅 is low, see Fig. 10). An increasing 𝜌 USA, June 2008, pp. 332–340.
[7] Y. Wu, P. A. Chou, Q. Zhang, K. Jain, W. Zhu, and S.-Y. Kung,
allows the dissemination process to continue longer, leading to “Network planning in wireless ad hoc networks: a cross-layer approach,”
fewer deadlocks, thus the delay increases with a corresponding IEEE J. Sel. Areas Commun., vol. 23, no. 1, pp. 136–150, 2005.
increase in 𝑃 𝐷𝑅. A further increase of 𝜌 at rst allows [8] H. Yomo and P. Popovski, “Opportunistic scheduling for wireless
network coding,” IEEE Trans. Wireless Commun., vol. 8, no. 6, pp.
a quicker dissemination of innovative information (shorter 2766–2770, June 2009.
delays), and afterwards the delay increases again due to [9] C. Fragouli, J. Widmer, and J.-Y. L. Boudec, “Efcient broadcasting
the increased trafc load (collisions). Fig. 12 shows tradeoff using network coding,” IEEE/ACM Trans. Networking, vol. 16, no. 2,
pp. 450–463, Apr. 2008.
results representing the failure probability 1 − 𝑃 𝐷𝑅 as a [10] C. Gkantsidis and P. R. Rodriguez, “Network coding for large scale
function of the packet delivery delay for different number of content distribution,” in Proc. IEEE INFOCOM, Miami, FL, USA, Mar.
neighbors 𝑛𝑣 ∈ {7, 10, 15}. Simulation curves are plotted for 2005, pp. 2235–2245.
[11] R. Ahlswede, N. Cai, S.-Y. R. Li, and R. Yeung, “Network information
different values of 𝜌 and each curve is obtained by varying ow,” IEEE Trans. Inf. Theory, vol. 46, no. 4, pp. 1204–1216, July
𝑐𝑓 . Good schemes are those lying on the bottom left of the 2000.
plot (i.e., having short delay and high reliability). From this [12] R. Koetter and M. Médard, “An algebraic approach to network coding,”
IEEE/ACM Trans. Networking, vol. 11, no. 5, pp. 782–795, Oct. 2003.
graph we see that for each (𝑛𝑣 , 𝜌) pair there exists a suitable [13] C. Fragouli and E. Soljanin, “Information ow decomposition for
coverage factor 𝑐𝑓 which minimizes the delay while achieving network coding,” IEEE Trans. Inf. Theory, vol. 52, no. 3, pp. 829–848,
good performance in term of 1 − 𝑃 𝐷𝑅. In practice, 𝑐𝑓 in the Mar. 2006.
[14] C. Chekuri, C. Fragouli, and E. Soljanin, “On average throughput and
range [30, 50]% are good choices as they give good reliability alphabet size in network coding,” IEEE Trans. Inf. Theory, vol. 52, no. 6,
performance while ensuring short delays for all reasonable pp. 2410–2424, June 2006.
Authorized licensed use limited to: ELETTRONICA E INFORMATICA PADOVA. Downloaded on March 03,2010 at 15:45:05 EST from IEEE Xplore. Restrictions apply.
ASTERJADHI et al.: TOWARD NETWORK CODING-BASED PROTOCOLS FOR DATA BROADCASTING IN WIRELESS AD HOC NETWORKS 673
[15] P. A. Chou, Y. Wu, and K. Jain, “Practical network coding,” in Michele Rossi received the Laurea degree in Electri-
41st Allerton Conference on Communication Control and Computing, cal Engineering (with honors) and the Ph.D. degree
Allerton, IL, USA, Oct. 2003. in Information Engineering from the University of
[16] H. Dubois-Ferriére, D. Estrin, and M. Vetterli, “Packet combining in Ferrara in 2000 and 2004, respectively. From March
sensor networks,” in Proc. ACM SenSys, San Diego, CA, USA, Nov. 2000 to October 2005 he has been a Research Fellow
2005, pp. 102–115. at the Department of Engineering of the University
[17] Y. E. Sagduyu and A. Ephremides, “Crosslayer design for distributed of Ferrara. During 2003 he was on leave at the
MAC and network coding in wireless ad hoc networks,” in Proc. IEEE Center for Wireless Communications (CWC) at the
ISIT, Adelaide, Australia, Sep. 2005, pp. 1863–1867. University of California San Diego (UCSD), where
[18] Y.-C. Tseng, S.-Y. Ni, Y.-S. Chen, and J.-P. Sheu, “The broadcast storm he performed research on wireless sensor networks.
problem in a mobile ad hoc network,” Wireless Networks, vol. 8, no. In November 2005 he joined the Department of
2/3, pp. 153–167, Mar. 2002. Information Engineering of the University of Padova, Italy, where he is an As-
[19] “ns2 simulation code for wireless network coding.” [Online]. Available: sistant Professor. Dr. Rossi is currently part of the EU-funded SENSEI project
http://telecom.dei.unipd.it/simulation and of the WISE-WAI project, both on wireless sensor networks. His research
[20] N. Baldo, F. Maguolo, M. Miozzo, M. Rossi, and M. Zorzi, “ns2- interests are centered around the dissemination of data in distributed ad hoc
MIRACLE: a modular framework for multi-technology and cross-layer and wireless sensor networks, including integrated MAC/routing schemes,
support in network simulator 2,” in Proc. ACM ValueTools, Nantes, data dissemination via network coding, the application of compressive sensing
France, Oct. 2007, pp. 1–8. techniques for the reconstruction of signals in wireless sensor networks and
[21] J. Widmer, C. Fragouli, and J.-Y. L. Boudec, “Low-complexity energy- cooperative routing policies for ad hoc networks.
efcient broadcasting in wireless ad hoc networks using network cod-
ing,” in NetCod, Riva del Garda, Italy, Apr. 2005.
[22] G. Bianchi, “Performance analysis of the IEEE 802.11 distributed Joerg Widmer is manager of the Ubiquitous Net-
coordination function,” IEEE J. Sel. Areas Commun., vol. 18, no. 3, working Research Group at DOCOMO Euro-Labs,
pp. 535–547, Mar. 2000. Munich, Germany. His research expertise covers
[23] F. Daneshgaran, M. Laddomada, F. Mesiti, and M. Mondin, “Unsat- wired and wireless networks, ranging from MAC
urated throughput analysis of IEEE 802.11 in the presence of non layer design for wireless communication, sensor
ideal transmission channel and capture effects,” IEEE Trans. Wireless networking, and network coding to transport proto-
Commun., vol. 7, no. 4, pp. 1276–1286, Apr. 2008. cols and future Internet architectures. Before joining
[24] E. Fasolo, M. Rossi, J. Widmer, and M. Zorzi, “On MAC scheduling DOCOMO, Joerg Widmer was senior researcher
and packet combination strategies for random network coding,” in Proc. at EPFL, Switzerland, working on ultra-wide band
IEEE ICC, Glasgow, UK, June 2007, pp. 3582–3589. communication and network coding. Joerg Widmer
[25] ——, “A proactive network coding strategy for pervasive wireless obtained his M.S. degree and Ph.D. degree in com-
networking,” in Proc. IEEE GLOBECOM, Washington DC, USA, Nov. puter science from the University of Mannheim, Germany in 2000 and 2003,
2007, pp. 5271–5276. respectively. In 1999 and 2000 he was a visiting researcher at the International
[26] A. Gkelias, M. Dohler, and H. Aghvami, “Throughput analysis for Computer Science Institute in Berkeley, CA, USA. He authored more than 60
wireless multi-hop CSMA,” in Proc. IEEE PIMRC, Barcelona, Spain, conference and journal papers, holds several patents, and regularly participates
Sep. 2004, pp. 979–983. in program committees of major conferences.
Authorized licensed use limited to: ELETTRONICA E INFORMATICA PADOVA. Downloaded on March 03,2010 at 15:45:05 EST from IEEE Xplore. Restrictions apply.