• Non ci sono risultati.

A Robust and Energy Efficient Protocol for Random Walk in Ad hoc Networks with IEEE 802.11∗

N/A
N/A
Protected

Academic year: 2021

Condividi "A Robust and Energy Efficient Protocol for Random Walk in Ad hoc Networks with IEEE 802.11∗"

Copied!
8
0
0

Testo completo

(1)

A Robust and Energy Efficient Protocol for Random Walk in

Ad hoc Networks with IEEE 802.11

Adnan Noor Mian, Roberto Beraldi, Roberto Baldoni

DIS, Universit`a di Roma “La Sapienza”,

Via Ariosto, 25

Roma, 00185, Italy

{adnan, beraldi, baldoni}@dis.uniroma1.it

Abstract

This paper is about energy efficient and robust imple- mentation of random walks in mobile wireless networks.

While random walk based algorithm are often proposed to solve many problems in wireless networks, their imple- mentation is usually done at the application layer so that many characteristics of the wireless transmissions are not exploited. In this paper we show that we can greatly reduce the energy requirements to perform a walk by better exploit- ing the broadcast nature of the transmissions. We propose a robust, energy efficient distributed next hop selection al- gorithm. To evaluate the algorithm we present a simulation study performed withns-2. We found that in the proposed algorithm energy is reduced to more than 4 times and the se- lection delay is reduced to more than 8 times as compared to a standard next hop selection implementation.

1 Introduction

Random walk is a special kind of approach for solv- ing many recurrent problems arising in distributed systems.

Due to their simplicity random walk based algorithms are specially suitable for dynamic systems. To implement a random walk all we need is to forward a packet from a node to one of its neighbor node selected at random. Moreover, wireless networks are particularly favorable to implement random walks due to the broadcast nature of the transmis- sions. Concrete applications of random walk algorithms in- clude membership services [2], group based communica- tion [3], search/query [1], and routing [4].

Random walk is inherently a sequential process, i.e., nodes are visited in a sequence one after the other. A small forward delay is thus an important requirement, especially

This work has been supported by the NoE , “RESIST” (European Commission, contract number: 026764)

when the number of nodes in the network is high. Due to the sequential visits of the walker, the improvement in the per hop delay is subject to a multiplicative factor. If we are able to reduce the delay by an amount, sayδt, the overall reduction perceived by the end user is kδt, where k is the average number of steps required before the random walk terminates. For example, the number of steps before the al- gorithm described in [3] terminates, varies ask = O(n3), wheren is the number of nodes in the network. A reduction in per hop delay is then highly visible.

To implement a random walk based algorithm the usual approach is to design the protocol at the application level.

Although this approach is clearly adequate in wired net- works, e.g., in p2p applications, the wireless networks often have different constraints, for example, to minimize the en- ergy consumption.

The critical part of a random walk is the implementation of a step of the walk, i.e., selecting a node at random and then sending the walker to it. This apparently simple prob- lem is not trivial to solve efficiently in dynamic wireless networks. The usual approach to deal with changing neigh- bors requires the forwarding node to first discover its cur- rent neighbors and then forward the walker to one of them selected at random. Application layer neighbor discovery can be implemented straightforwardly by periodic beacons, which is a clear source of inefficiency. Each node is re- quired to announce itself at a rate sufficiently high to be properly detected as soon as it enters the transmission range of the forwarding node. An alternative solution requires the forwarding node to discover the neighbors only when the walker is to be forwarded. The forwarding node in this case engages in a probing phase during which all neighbors are discovered. The problem with this solution is that a step of the walk may require a long delay. This is because in order to reduce collisions the response to the neighbor discovery packet has to be randomized over a sufficiently long time interval.

(2)

Contribution of this study In this paper we propose a new random walk protocol which works on top of data link layer for mobile ad hoc networks (MANETs). This protocol assumes IEEE 802.11 MAC layer but uses only its broad- cast primitive and it basic medium access mechanism. We compare the proposed protocol with a unicast based random walk protocol which not only uses the basic access mecha- nism but also the RTS/CTS collision avoidance mechanism of IEEE 802.11. The proposed protocol is not only robust and energy efficient but also incurs less overheads and de- lays.

The rest of the paper is organized as follows. Section 2 discusses some important background that is needed to understand the presented work. In Section 3 we propose and discuss a new pure random walk protocol that uses a distributed selection algorithm. Section 4 gives the simula- tion details followed by the simulations results in Section 5.

Section 6 concludes our work and points out the directions for future work.

2 Background

Medium access mechanisms in IEEE 802.11

The protocols presented in this paper assume MAC IEEE 802.11 standard. Let us first briefly explain IEEE 802.11 basic access mechanism of Distributed Coordination Func- tion (DCF). Suppose a nodej wants to send DATA to node i, node j senses the channel to determine whether it is idle.

If it is idle for a specified time interval the nodej is allowed to transmit, otherwise the transmission is deferred until the ongoing transmission terminates. The deferred time known as backoff time. It is chosen at random. The backoff time decreases as long as the channel is idle. The node transmits when the backoff time reaches zero. The backoff proce- dure guarantees fair access to the shared medium to differ- ent nodes. The details of the backoff algorithm can be found in the [6].

The DCF is extended with RTS/CTS mechanism [5] to solve the hidden terminal problem. Suppose a nodej is in- terested in sending data to a nodei, then the node j broad- casts a special Request-To-Send (RTS) packet. When a neighbor node other than nodei receives this packet, it de- fers it’s transmission for a specified period. When node i receives this packet it broadcasts a reply message called Clear-To-Send (CTS) to give permission to nodej to send DATA. Any other node that receives CTS defers transmis- sion until it receive ACK packet. In the third phase node j broadcast DATA to node i. In the fourth phase node i replies to nodej with ACK packet. When node j receives this packet, it will stop its retry timer and if other nodes receive this packet they will resume their scheduled trans- missions [7].

ALGORITHM RW-CS() 1 on reception ofquery packet 2

3 ifquery.destN ode= i 4 then

5 terminate algorithm 6

7 ifquery.destN ode= i 8 then

9 update neighborInfoTable

10 select randomly from neighborInf oT able 11 send(query) to selected neighbor

Figure 1. Algorithm for RW-CS on a node i

RandomW alk

A random walk on a given graph is a sequential visit that a token performs on the nodes of the graph in random order.

There are several nice properties that make the random walk appealing for many concrete applications. Here we restrict ourselves to consider random walk as a search tool. An important metric of random walk is the mean hitting time.

It is the expected number of steps or hops in random walk when a node i is visited for the first time starting from a nodes [10]. An important property of random walk is that it eventually visits all nodes of the graph. Thus, if the search node belongs to the graph, eventually it is visited.

When random walk is used as a search algorithm the to- ken is implemented as a query packet which contains the description of the node that is being searched. The query packet is forwarded from a node to one of its neighbor se- lected at random. This process is continued until either the target node is found or a termination condition like TTL expire, is met. Figure 1 shows the pseudocode of this proto- col assuming that the underlaying network topology is time variant.

When a query packet arrives at a particular node, the al- gorithm terminates if it is a destination node otherwise the node starts a neighbor discovery phase, during which the node discovers the current neighbors (this is required since the neighbors change over time). After neighbor discovery phase, a neighbor is selected at random and query is for- warded to it. As the neighbor selection is done explicitly by the forwarding node, we refer this protocol as Random Walk with Centralized Selection (RW-CS).

3 Proposed protocol

In this section we propose an energy efficient and robust protocol of a Random Walk algorithm that uses Distributed Selection mechanism for selecting neighbors. The protocol is designed for dynamic systems e.g., systems composed of mobile nodes. Throughout this paper we shall refer to this protocol as RW-DS.

(3)

query

ACK+query CTF RTF

t1=randomTime<t2 queryTimer(t4)

CTFTimer(t3)

j i

n m

Figure 2. RW-DS protocol sequence diagram

3.1 Basic assumptions

The system consists of mobile nodes which can form wireless ad hoc network based on IEEE 802.11. The target node is present within the network. The network remains connected and there is a bidirectional connectivity between neighbor nodes at any time. The nodes can communicate only via abcast(m) primitive. This primitive broadcasts the packetm using the local broadcast facility of the un- derlying MAC protocol, which uses the carrier sense and binary backoff mechanism to access the medium.

3.2 Protocol description

Our protocol is designed to work directly on top of data link layer. This allows to skip the hidden sources of in- efficiency that characterizes the classical implementation over the network layer. The proposed protocol uses a four- phase messages exchange pattern, DATA/RTF/CTF/ACK as shown in the Figure 2, which embeds an efficient and ro- bust distributed selection logic. In the first phase, suppose a nodej broadcasts DATA that is a query packet. In the sec- ond phase, each neighbor that receives the query replies by broadcasting a special packet called Request-To-Forward (RTF), with a random delay t1. In the third phase, after receiving the first RTF packet from a neighbor node, say nodei, the node j broadcasts another special packet called Clear-To-Forward (CTF) that does two things. First it sup- presses the transmission of any further CTF packets from the neighbors if these packets have not yet been transmitted and second it acts as a permission for nodei to forward the query packet. In the fourth phase, the nodei broadcasts the query, which also acts as an acknowledgement that CTF was received. Now if nodei is a destination node then neighbors do not generate any further RTFs and the algorithm termi- nates otherwise the same four-phases are repeated.

Figure 3 shows the pseudo-code of the proposed proto- col. Some important remarks about it are as follows. We first briefly describe the packets used the protocol. The

ALGORITHM RW-DS() 1 upon reception of query packet 2

3 cancelCT F T imer if pending

4 ifquery.destN ode= i and query.destF ound = 1 5 then terminate algorithm

6 ifquery.destN ode= i and query.destF ound = 0 7 thenRT F.destF ound← 0

8 t1 ← jitter(t2) 9 ifquery.destN ode= i 10 thenRT F.destF ound← 1 11 t1 ← jitter(t2) 12

13 RT F.queryBcastN ode← query.bcastNode 14 RT F.bcastN ode← i

15 setRT F T imer(t1) 16 uponRT F T imer expire 17 CT F ReceptionEnabled← 1 18 bcast(RT F )

19 20

21 upon reception of RTF packet 22

23 synchronized{

24 ifRT F.queryBcastN ode= i and RT F ReceptionEnabled = 1 25 then

26 RT F ReceptionEnabled← 0 } 27 cancelqueryT imer if pending

28 CT F.RT F BcastN ode← RT F.bcastNode 29 CT F.destF ound← RT F.destF ound 30 tCT F bcasted← 0

31 setCT F T imer(0.0) 32 uponCT F T imer expire 33 broadcast(CT F )

34 tCT F Bcasted← tCT F Bcasted + 1 35 iftCT F bcasted≤ 5

36 then setCT F T imer(t3) 37

38

39 upon reception of CTF packet 40

41 synchronized{

42 ifCT F.RT F BcastN ode= i

43 andCT F.bcastN ode= query.bcastNode 44 andCT F ReceptionEnabled= 1 45 then

46 CT F ReceptionEnabled← 0 } 47 ifCT F.destF ound= 0 48 thenquery.destF ound← 0 49

50 ifCT F.destF ound= 1 51 thenquery.destF ound← 1 52

53 RT F ReceptionEnabled← 1 54 query.bcastN ode← i 55 tQueryBcasted← 0 56 setqueryT imer(0.0) 57 uponqueryT imer expire

58 bcast(query)

59 ifquery.destF ound= 0

60 thentQueryBcast← tQueryBcast + 1

61 iftQueryBcast≤ 5

62 then setqueryT ime(t4)

63

64 ifCT F.RT F BcastN ode= i 65 then cancelRT F T imer if pending

Figure 3. The pseudo-code of proposed algo- rithm

RTF packet informs the node, that just sent the query, that a neighbor node has received the query and is wait- ing for its approval to forward the query. The RTF

(4)

packet header has three main fields. TheRT F.bcastN ode contains the address of node that has broadcasted the RTF packet, RT F.destF ound is 1 if node broadcast- ing the RTF is the destination node and 0 otherwise and RT F.queryBcastN ode field contains the address of the node that has sent the query. CTF packet gives permission to forward the query packet only to the node whose RTF packet was received first. The important CTF packet fields in the pseudo-code given in Figure 3 are similar RTF packet fields. The query packet is a search packet that hops from node to node in search of a destination. This packet also acts as an acknowledgement to the reception of CTF packet. It also has fields similar to CTF and RTF packets.

There are three different timers that keep the protocol working properly. RT F T imer starts with the reception of the query (line 15). Each node, after receiving the query, replies with RTF after a random delay t1 (lines 15-18). The time t1 is equal to jitter(t2), where jitter is a function that se- lects a random time in the range [0, t2]. CT F T imer with an expiry time t3 controls the delay between rebroadcasts of CTF packets. When a node receives RTF, it broadcasts CTF immediately (lines 31-33). The node that sent the RTF packet when receives this CTF packet sets itsqueryT imer, which eventually broadcasts the query (lines 56-57). For all other nodes this CTF has the effect of canceling the corre- spondingRT F T imer timers if they have not already ex- pired (lines 64, 65). Now if due to collision CTF packet is not able to reach the RTF sending node, then query will not be broadcasted and random walk will stop. To solve this problem the node rebroadcast CTF if query is not received within a specified time, say, time t3. TheCT F T imer ex- pires at the most 5 times (lines 32-36) or it is canceled (line 3). It is canceled on reception of a query packet, thus indi- cating that CTF was received correctly. queryT imer con- trols the time delay between rebroadcasts of a query packet.

It may happen that a query is broadcasted but it does not reach any of its neighbors due to collisions. Random walk will stop in such cases. Query thus has to be rebroadcasted to keep the random walk going. queryT imer with expiry time of t4 controls the time delay between rebroadcast of the query. The rebroadcasts are done 5 times before giving up (lines 57-62). We shall explain tuning of these timers in section 4.1.

To avoid splitting of random walk the algorithm pro- cesses only the first RTF received and all later RTFs are discarded (lines 24, 26). This is done with the help of a flag RT F ReceptionEnabled which is initialized to 1. When RTF packet is received, it will only be processed if it meets the conditions given in line 24. After the reception of first RTF packet, the flagRT F ReceptionEnabled is set to 0 (line 26). This disables any further RTF packet processing until the node broadcast a query packet (line 53). There are also conditions imposed on processing CTF packet (lines

42-44). These conditions make sure that only that CTF packet is received which is part of the on going four-phase message exchange process. Once a node has broadcasted a query, it will not process another CTF packet until the node again receives and processes a query packet. This takes care of CTF packets generated due to uncanceledCT F T imer of neighbor nodes. A CT F T imer remains uncanceled (line 3) if it does not receives and processes a query packet, due to collisions. Note that the checking of if condition and setting the flag in lines from 23-26 and lines 42-44 are synchronized atomic processes, so that during these opera- tions another received RTF or CTF packets can not access the flags.

3.3 Characteristics of the protocol

Bandwidth efficient The proposed protocol is bandwidth efficient as it generates less number of packets as compared to RW-CS. The efficiency comes from the fact that in RW- DS the selection and forwarding mechanisms are implicit, which means that the same broadcast packets are contribut- ing for selection and forwarding. The RW-CS, whereas, results in much more packets. This is due to the follow- ing three reasons. Firstly, in RW-CS neighbor discovery and forwarding phases are distinct. Secondly, as RW-CS uses unicast, so the IP address has to be resolved before sending the unicast frame. To resolve the IP address ARP packets are used. Lastly, the unicast mechanism of IEEE 802.11 uses the RTS/CTS packets for reliable communica- tion. Thus the aggregate effect is the generation of large number of packets.

Energy efficient Energy consumption of a node depends not only on the number of packets transmitted but also on the number of packets received. In the proposed protocol RW-DS, the total number of sent and received frames are much less as compared to RW-CS. This is because in RW- DS less number of packets are generated as explained pre- viously and hence less number of packets are received re- sulting in less energy consumption as compared to RW-CS.

Robustness In the proposed protocol, the selection takes place when the first RTF packet is successfully received by a node. If the first RTF packet is lost due to a collision then RTF from another neighbor can be received. So actu- ally the robustness of the proposed protocol comes from the fact that reception of RTF from any neighbor node is suffi- cient whereas in RW-CS unicast is the cause of the fragility of the protocol. During the unicast mechanism the packets RTS/CTS/DATA/ACK are sent to specific nodes. If these nodes do not receive any of these packets, random walk will die out. Also in unicast the IP address has to be resolved to MAC address before transmission. This is accomplished by using ARP protocol in which an ARP request frame is

(5)

broadcasted with a specific node as an intended recipient.

In IEEE 802.11 the broadcast mechanism is unreliable as there is no acknowledgement scheme and no retransmission of broadcast in case of collisions.

Decreased source to destination delay In RW-CS the forwarding node has to wait for the discovery of all or at least most of the expected neighbors before it decides the neighbor to send the query. This delay increases with the increased neighbor density. Whereas in RW-DS the first neighbor to reply is selected and the node can forward the query as soon as it receives the first RTF reply.

How this protocol is different from IEEE 802.11 RTS/CTS mechanism This protocol seems like the IEEE 802.11 RTS/CTS mechanism but actually it is quite dif- ferent in its purpose and also in the way it works. The RTS/CTS mechanism is basically an access method and is an extension of Distributed Coordination Function (DCF) of 802.11 MAC protocol. This mechanism is used to get rid of hidden node problem in ad hoc networks [7]. The proposed protocol on the other hand is concerned with the random selection of one of the neighbor nodes and forwarding the query to that node. Also in the proposed protocol the DATA is sent in the first phase while in IEEE 802.11 RTS/CTS mechanism DATA is sent in the third phase. Sending the data in the first phase has the advantage of implementing look ahead, which can greatly reduce the number of hops to search a destination. Due to space limitation we shall not go into the details of look ahead.

4 Simulation setup

To evaluate the proposed protocol we did detailed simu- lations usingns-2.30 [8]. We used 914 MHz Lucent Wave- LAN DSSS radio interface model available in ns-2 [8].

Each node has a transmission range of 250m and carrier sense range of 550m. We used two ray ground reflection model as the wireless propagation model.

Each reading of the simulation was taken after minimum of 250 runs. To have independent different runs of each the simulation experiment we set the seed of the random number generator ofns-2 to heuristic.

We compared the proposed protocol with a standard im- plementation using three different scenarios. Grid scenario was chosen to validate the protocol, comparing it with the corresponding Markov Chain [9] simulations of the grid. In these grid scenarios we choose the extreme diagonal nodes as the source and destination nodes. In the second scenario the static nodes were placed randomly. Such type of scenar- ios have their importance in wireless sensor networks. The third scenario is for mobile ad hoc networks in which mo- bile nodes are initially placed uniformly at random. In the last two scenarios terrain is a flat area of 2000m x 1000m in

27 28 29 30 31 32 33 34 35 36

0 0.01 0.02 0.03 0.04 0.05 0.06 0.07 0.08 0.09 0.1

Mean percent of immediate returns

Jitter (secs)

Figure 4. Immediate returns on a 10x10 grid which the source is fixed at (500m, 500m) and destination fixed at (1500m, 500m). Fixing source and destination as- sures that they are always at least some hops away. In case of mobility scenario, we choose random way point model.

As we are interested in looking at the effects of mobility exclusively, so we choose zero pause time.

4.1 Tuning the protocol timers

The purpose of tuning timers in the proposed protocol is to achieve sustainable random walk that finds the destina- tion with a minimum delay.

RTFTimer t2 has to be adjusted with the density of the neighbors. For more dense networks t2 should be chosen large and for less dense networks small value of t2 will be sufficient. We have also seen that ifRT F T imer t2 is made very small the hitting time increases, as shown in Figure 4 for a grid topology. This increase in the mean number of hops is due to the increased immediate returns of the query packet, that is, cases in which a packet goes from nodei to j and then comes back to i in the following hop. The rea- son for such a behavior is due to the backoff algorithm of IEEE 802.11. This behavior is explained as follows. Sup- pose that a query hops from nodei to node j. Now node j has to send the query to a node selected randomly from one of its neighbors, which also include nodei. As t2 is small so neighbors of nodej reply with RTF within the short interval [0,t2], resulting in lot of collisions at nodej. So the proba- bility of receiving RTF from neighbors other than nodei be- comes very small. This is because the nodei after sending CTF had a backoff and now receives the query broadcasted from a node j. The node j previously had collisions and supposedly was not able to receive any of the RTF packets.

After the expiry of backoff time the nodei broadcasts RTF packet. This RTF packet probably being the last to reply is received by nodej and thus becomes the winner to forward the query. Thus the query goes from nodej back to node i.

We set the t2 timer with a value little greater than time where the mean number of immediate returns are less in the graph shown in Figure 4. A greater value allows us to use the same protocol in greater neighbor densities. For our simulation experiments we sett2 = 0.01 secs.

(6)

CTFTimer IfCT F T imer t3 is small then there would be redundant CTF rebroadcasts and if t3 is large then in case of CTF collision a node has to weight unnecessarily long to receive subsequent CTF thus increasing overall delay. An idealCT F T imer setting would be to have t3 a litter greater than the time required between sending the CTF and receiv- ing the query. But this time depends on the network density.

With more neighbor density more time should be given be- fore CTF is rebroadcasted, and with less neighbor density the interval between sending CTF and receiving the query can be shorter. We set this timet3 = 0.1 secs.

queryTimer If the value ofqueryT imer t4 is short then there will be unnecessary rebroadcasts of query, which would consume resources like bandwidth and power of transmitting and receiving nodes. Selecting greater value of t4 would introduce unnecessary delays in case of colli- sions that render no RTF. To set t4 we suppose that at the most first RTF is received within time t2. Although MAC delay and rtt can also contribute in delay but since we are only interested in receiving the first RTF so we just select this timer equal to t2. We can also select a little greater or less than t2 but this will not have much effect on the de- lay per hop as only the first received RTF is processed. For simulation experiments we choset4 = 0.01 secs.

5 Simulation results

0 200 400 600 800 1000 1200 1400 1600 1800 2000

4 6 8 10 12 14 16

Mean number of hops

NxN grid RW-CS RW-DS Markov Chain

(a) Mean no. of hops

0 5000 10000 15000 20000 25000 30000 35000 40000

4 6 8 10 12 14 16

Mean of total number of messages sent

NxN grid RW-CS RW-DS

(b) Mean no. of messages sent

0 10 20 30 40 50 60 70 80 90 100

4 6 8 10 12 14 16

Mean Delay

NxN Grid RW-CS RW-DS

(c) Mean delay

0 20 40 60 80 100 120 140

4 6 8 10 12 14 16

Mean system energy (Joules)

NxN grid RW-CS RW-DS

(d) Mean energy consumption

Figure 5. A random walk search on NxN grids

150 200 250 300 350 400 450

60 70 80 90 100 110 120 130 140

Mean number of hops

No. of nodes placed randomly RW-CS RW-DS

(a) Mean no. of hops

0 5000 10000 15000 20000 25000 30000

60 70 80 90 100 110 120 130 140

Mean of total number of messages sent

No. of nodes placed randomly RW-CS RW-DS

(b) Mean no. of messages sent

0 10 20 30 40 50

60 70 80 90 100 110 120 130 140

Mean delay (secs)

No. of nodes placed randomly RW-CS RW-DS

(c) Mean delay

0 50 100 150 200

60 70 80 90 100 110 120 130 140

Mean Consumed System Energy (Joules)

No. of nodes placed randomly RW-CS RW-DS

(d) Mean energy consumption

Figure 6. A random walk search on static ran- domly placed nodes

100 150 200 250 300 350 400 450 500 550 600

60 70 80 90 100 110 120 130 140

Mean number of hops

No. of nodes placed randomly RW-CS RW-DS

(a) Mean no. of hops

0 5000 10000 15000 20000 25000

60 70 80 90 100 110 120 130 140

Mean of total number of messages sent

No. of nodes placed randomly RW-CS RW-DS

(b) Mean no. of messages sent

0 5 10 15 20 25 30 35

60 70 80 90 100 110 120 130 140

Mean delay (secs)

No. of nodes placed randomly RW-CS RW-DS

(c) Mean delay

0 50 100 150 200

60 70 80 90 100 110 120 130 140

Mean consumed system energy (Joules)

No. of nodes placed randomly RW-CS RW-DS

(d) Mean energy consumption

Figure 7. A random walk search on mobile nodes

(7)

0.3 0.4 0.5 0.6 0.7 0.8 0.9 1

0 10 20 30 40 50 60

Mean hitting probablity

Speed of nodes (m/s) RW-CS RW-DS

Figure 8. Hitting probability w.r.t speed for 60 nodes

We first simulated the protocols in grid scenarios. The graphs in Figure 5(a) show that random walks RW-CS and RW-DS have almost the same mean number of hops with respect to increasing grid nodes. To validate the proposed protocol in Figure 3 and the standard protocol in Figure 1 as a pure random walk protocol,we also did Markov Chain simulations [9], discussed briefly in appendix. These sim- ulations confirm that our both algorithms implement a pure random walk and are not biased towards having increased or decreased mean number of hops. Similarly the simula- tion graphs in Figure 6(a) and Figure 7(a) verify that the proposed protocol and the standard protocol behaves in a similar way in randomly placed nodes and mobile nodes scenarios respectively.

The remaining simulation results confirm our analytical discussion in Section 3.31. The plots in Figures 5(d), 6(d), and 7(d) show that total energy consumed by the system is much less in the RW-DS as compared to the RW-CS.

Also we see that the decreased delay in searching time from source to destination in the proposed protocol is much less as compared to RW-CS. This can be seen for all the three different scenarios in Figures 5(c), 6(c), and 7(c). As ex- pected, the proposed protocol RW-DS is more robust under mobility scenarios as compared to the RW-CS. The hitting probability remains much high in RW-DS as compared to RW-CS as seen in Figure 8.

6 Conclusions

In this paper we proposed a protocol for pure random walk in which the selection for next hop is distributive. The protocol is broadcast based and has a four-phase message exchange procedure. We compared it with a unicast cast based standard random walk protocol. Simulation studies showed that the proposed protocol (i) is bandwidth efficient

1The fluctuations in the plots of figure 6 and figure 7 can be minimized by taking large number of nodes and also large number of runs for each value, but this takes prohibitive long time usingns-2.

(ii) energy efficient and (iii) incurs less delays in searching from source to destination.

In future we plan to implement adaptive CT F T imer andqueryT imer which will adjust the timers dynamically when a node moves in a network of variable density. In mobility scenarios often the cause of stopping of random walk is the selection of nodes at the edge of transmission range of the forwarding protocol. We plan to implement mechanisms to avoid selecting such neighbors to make the protocol more robust. The proposed protocol is for a single random walk. We plan to enhance the protocol to work for simultaneous random walks. In this work we have not con- sidered any biasing mechanism that can reduce the number of hops from source to destination. We also plan to imple- ment different biasing mechanisms on top of the proposed protocol to make random walk more practicable.

Acknowledgements Many thanks to Sirio Scipini for helpful discussions onns-2, and Shah Rukh Humayoun for improving the presentation.

7 Appendix

To derive the hitting time for the grid topology, we ex- ploit the Markov chain method [9]. Letpij is the proba- bility that the walk moves from nodei to j and P the tran- sition probability matrix. If t is the target node, then the matrix Q obtained from P by removing rowt and column t contains the information needed for the hitting time com- putation. The hitting time oft starting from i is the i − th element of the column vector w, where

w= (I − Q)−11

In this expression, 1 is a column vector all of whose entries are 1 and(I − Q)−1is the fundamental matrix. I is identity matrix. The computation of the hitting time has been done numerically.

To exploit the method for the grid topology, the points of the grid are assigned coordinates w.r.t. a cartesian axis, with origin at the bottom-leftmost point of the grid. Let s= (i, j) be a grid point and ||s1, s2|| = |i1− i2| + |j1− j2| the distance between s1and s2. Then, we have:

ps1s2 =

 1/d(s1) ||s1, s2|| = 1

0 otherwise (1)

whered(s) is the number of neighbors of point s.

References

[1] C. Avin and C. Brito, “Efficient and robust query pro- cessing in dynamic environments using random walk techniques”, Proc. of the third international symposium on Information processing in sensor networks, Berke- ley, California, USA, 2004

(8)

[2] Z. Bar-Yossef, R. Friedman, and G. Kliot, “RaWMS - Random Walk based Lightweight Membership Ser- vice for Wireless Ad Hoc Networks”, 7th ACM Inter- national Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc 2006), Florence, Italy. May 2006.

[3] S. Dolev, E. Schiller, and J. Welch. “Random walk for self-stabilizing group communication in ad hoc net- works” IEEE Transactions on Mobile Computing, Vol 5, No 7, JULY 2006

[4] H. Tian, H. Shen and T. Matsuzawa,“ Random walk routing for Wireless Sensor Networks”, Proceedings of the Sixth PDCAT’05

[5] IEEE Std. 802.11-1999, Part11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) specifications. IEEE Std. 802.11, 1999 edition [6] F. Cali, M. Conti and E. Gregori. “IEEE 802.11 Proto-

col: Design and Performance Evaluation of an Adaptive Backoff Mechanism”, IEEE Journal on selected arears in communications Vol 18, No 9, September 2000 [7] S. Basagni, M. Conti, S. Giordano and I. Stojmenovic,

“Mobile Ad Hoc Networking”, IEEE Press, John Wiley

& Sons, Inc. NJ, 2004, pp 69-116.

[8] Network Simulator ns-2.

http://www.isi.edu/nsnam/ns/

[9] C. M. Grinstead and J. L. Snell. “Introduction to Prob- ability”, American Mathematical Society, pp 405-430.

[10] L. Lovazs, “Random walks on graphs: A survey”, Combinatorics, Paul Erdos in Eighty, Vol. 2, 1993, J’anos Bolyai Mathematical Society Budapest.

Riferimenti

Documenti correlati

Figure 4.8: General workflow of the three-phases a-ARM rhodopsin fluorescence screening protocol. This diagram displays the methodology for automatic searching of

However nding any way of handling resource sharing in these systems without breaking the BIP has been an open problem for long time, as long as the idea of solving it using

o nell’adozione di uno scopo mutualistico) ed un diverso orientamento geografico dell’operatività (internazionale, nazionale, regionale e locale). Ma ciò che giustifica il

The Animal Welfare Indicators (AWIN) project is the first project, funded by the European Commission, intended to improve donkey welfare by developing a scientifically sound

Upon startup a bridge sets all its link to PRE-FORWARDING and claims to be Root and designated bridge on every port When the information about root are expired the bridge tries

When an RTF packet is received, it will only be processed if it meets the conditions given in line 3 of algorithm 3 and then disables the flag RT F ReceptionEnabled stopping any

b) Mean hitting time, worst case: Figure 4(a) shows the variation of hitting time for increasing network size for different biasing strategies for the worst case search scenario,

The aim of the research was to investigate the effects of an experimental educational programme of Adapted Physical Activity (APA), integrating the potential of