Link-Correlation-Aware Opportunistic Routing with EEC for Effective Packet Recovery

DOI : 10.17577/IJERTV5IS070369

Download Full-Text PDF Cite this Publication

Text Only Version

Link-Correlation-Aware Opportunistic Routing with EEC for Effective Packet Recovery

Linu Susan Lal Talit Sara George

Department of Computer Science and Engineering Assistant Professor in CSE Caarmel Engineering College, Perunad Caarmel Engineering College, Perunad

Pathanamthitta, Kerala Pathanamthitta, Kerala

MG University, Kottayam M G University, Kottayam

Abstract Packet loss is a serious problem in the wireless networks which use conventional store-and-forward design. This paper proposes a link-correlation-aware Opportunistic routing with EEC. It provides various error recovery strategies with respect to reliability, stability, and energy consumption constraints. Here the error correction process is performed in a distributed manner where selected intermediate nodes participate in error recovery. The EEC scheme effectively detects the errors in the packet recovery so that the errors can be corrected and packet recovery can be efficient with very low latency. The use of opportunistic routing can reduce the decoding delay and reduces the packet delay by forwarding the incoming packets without waiting for the packet sent by its previous receiver to decode it. However, inappropriate assumption in opportunistic routing cause serious estimation errors in the forwarder set selection resulting in further increase in scheduling costs. The link-correlation-aware opportunistic routing overcomes the estimation errors in the forwarder set selection and reduces the scheduling costs. The proposed method is better with low latency recovery and achieves high reliability and stability.

Keywords Link-layer protocol, Opportunistic routing, EEC, wireless networks.

  1. INTRODUCTION

    Anyone who is up to date on the Wireless World will comfortably say that the dependency on Wireless Technology has increased over the last year. The data link layer is positioned just above the physical layer in all the layering models. The data travel from a source to destination, the data may have to travel through wireless physical layer links in the path. The underlying link- layer protocols of wireless network directly manage the physical network link of a computer and also integrate to higher level protocols for handling connections and data. The main functionality of the link layer is to find out the different physical links in the path and work with the link protocols to carry the data. The function of link layer is to facilitate hop-to-hop communication, by carrying data packets.

    Wireless link layer protocols such as ARQ (Automatic Repeat reQuest) and HARQ (Hybrid Automatic Repeat reQuest) are to achieve reliability by discarding an erroneous packet at the receiver and perform one or more retransmissions until the packet is error free.

    ARQ, HARQ : retransmission at each hop ACE : packet recovery at each hop

    PROPOSED METHOD: packet recovery at key nodes

    Fig. 1. Protocols for packet recovery.

    As shown in Fig.1., each packet needs to travel through all the nodes in the route, to reach the destination. In ARQ [1] protocol , when the receiver detects an error in a packet, it automatically requests the transmitter to resend the packet. This process continues until the packet is error free or error continues beyond a predetermined number of transmissions. In HARQ [1],the use of ARQ with an error correction technique called soft combining, which no longer discards the received bad data. With the soft combining data packets that arent discarded anymore. The received signal is stored in a buffer and it will be combined with next retransmission. However, these methods cause high delays and low throughput which leads to degradation in channel bandwidth utilization. Also, decoding in each hop increases reliability and the cost of computation overhead.

    Many researches [1], [2] have highlighted the limitations of these link layer protocols and proposed different solutions. These researches consider either ARQ, HARQ or combined approach of both schemes. All of them mostly follow the traditional store-and-forward mechanism. Each data packet must be received and collected by every node before it is forwarded. This mechanism increases stability, but cannot provide high stability due hop-by-hop transmission.

    The proposed error correction process is performed in a distributed manner where selected intermediate nodes participate in error recovery. It achieves effective in packet recovery with very low latency, rapid delivery of packets and high throughput with minimum data loss. For this we have to minimize the propagation and transmission delay, queuing delay and energy efficiency. Our work points to determine the key nodes to encode and decode packets in a given route and an encoding/decoding scheme.

  2. RELATED WORK

    Packet loss is a serious problem in the wireless networks which use conventional store-and-forward design. Nowadays the link-layer protocol of TCP/IP has taken so many solutions for error recovery to provide reliability for wireless systems. Different wireless communications adopted variety of error recovery mechanisms. Each packet needs to travel through all the nodes in the route, to reach the destination. Different packet recovery mechanisms such as ARQ [1] protocol, when the receiver finds an error in a packet, it automatically requests the transmitter to resend the packet. This process continues until the packet is error free or error continues beyond a predetermined number of transmission and in HARQ [1] , the use of ARQ with an error correction technique called soft combining, which no longer discards the received bad data.

    [2] propose Plena , a packet length adaptation scheme exploiting the proposed error estimating codes (EEC) for low- power wireless networks. Here consider two low-power MAC protocols for the energy consumption of different packet length. This work gives closed form solutions for the optimal packet length in terms of energy efficiency. This consumes more time.

    In [3] goal of opportunistic routing is to deliver the packet from sender to the destination in fewer hops. In the multi-hop networks, the intermediate nodes act as a helper node to deliver the packet to the destination, they are called forwarders . The selection of these forwarder nodes among the intermediate nodes is very important and has a huge impact on the performance of the opportunistic routing.

    1. opportunistic routing is novel i.e, massively parallel, and it is performed by many nodes simultaneously to maximize the gain while controlling the inter user interference. It can exhibits improvement in overall powerdelay. A gain is possible when the receivers can tolerate more interference due to the increased received signal power provided by the multiuser, in other words having more concurrent transmissions. It provides a good traffic management and the bit error rate is high.

    2. takes advantage of the broadcast nature of the wireless medium to increase reliability in communications. Here instead of selecting one node as the next hop forwarder, it selects a set of nodes to forward the packet. In this way, if one of them does not get the packet from the source, another candidate will do it and this avoids the re-transmission from the source. It offers high reliability but this work is not stable and initialization cost is high. The model study the number of re-transmissions and is good for any number of candidates, so the parameters can be easily evaluated when designing an opportunistic routing protocol. As a result, the model can provide guidelines to the researchers for evaluating the influence of the number of cadidates and how it relates to the number of re-transmissions and how two parameters(candidate list of each node and maximum number of retransmissions in each node) together contribute to the successful delivery of the data packets.

    Fig. 2. Architecture of Proposed System

  3. SYSTEM MODEL

    The proposed system (as shown in Fig.2), is link- correlation-aware Opportunistic routing with EEC. The combined system adapts effectively in the packet recovery with very low latency. EEC allows the instant estimation of the bit error rate in a partially correct packet. It is possible for predicting packet reception ratios (PRRs) at different packet lengths. The EEC scheme detects the errors in the packet recovery and the errors can be corrected and packet recovery can be efficient. The use of opportunistic routing can reduce the decoding delay and also reduces the packet delay by forwarding the incoming packets without waiting for the packet sent by its previous receiver to decode it. The link- correlation-aware opportunistic routing overcomes the estimation errors in the forwarder set selection and reduces the scheduling costs. The link correlation aware metric is proposed to capture the expected number of any-path transmissions using which a new candidate forwarder selection method is developed for effective forwarder set selection. Thus the proposed system performs better than existing with low latency packet recovery, also achieves high reliability and stability.

    The main objective of this research is to give high throughput, to minimize delay and minimize error rate of transmission for the current scenario. The main intent of this work is to provide a best route and consider the problem of how to design an efficient method for transmission at maximized throughput with minimum energy consumption, minimum bit error rate and minimum delay for every transmission.

    1. Network Creation

      Consider a wireless network composed of N nodes. It is denoted by .A traffic flow is from a source node to a destination node traverses over a predetermined set of routes. Let R= be the set of transmission routes. Each route carries a data stream with arrival rate . Here use represents the node sequence

      in ,where is the number of nodes in .

    2. Setting Key nodes and Encoding/Decoding Delay

      The en/decoding load of a node , denoted by and it is the sum of the arrival rates for all the packet streams i.e, responsible for en/decoding. A key node of route is a node responsible for en/decoding the packets travelling along the route. Matrix [1] denotes whether is a key node in

      Where, is en/decoding load

      is average en/decoding load

      (6)

      (7)

      (1)

      In each route segment, the sender encodes the packets, and the receiver decodes the packets. The receiver node is responsible for decoding for its route segment.

    3. Compute Delay and Encoding/Decoding Load

      The arrival rate of stream be denoted as ,where is responsible for en/decoding in Then,

      The average delay when a packet crosses with route segment vector be denoted as . Then, the total average packet delay decoding at within a unit time equals

      [1] The average en/decoding load of is denoted as and the average en/decoding load of all the nodes in is denoted as . Then . Following formula used for calculate average delay and en/decoding Load.

      Delay Calculation

      (2)

      Where, is Queuing delay

      (3)

      is Propagation and transmission delay

      (4)

      waiting time of queue P – packet recoded times -Transmission delay of ACK packets

      -Propagation delay -Transmission delay

      En/Decoding Load Calculation

      En/Decoding Load standard deviation

      (5)

    4. Link- Correlation -Aware Opportunistic Routing and Route Segmentation

      The nodes are consistently distributed in the plane and edges are added according to the probability that depends on the distance between the nodes. The network size is N×K where N is number of nodes and K is number of routes. Consider both the single-hop and multi-hop scenarios. In this system , where a sender s has n initial candidate forwarders to the destination d. The sender s transmits packets to the destination d. Opportunistic routing obtains significant benefit when link qualities are low. Thats because when link quality is high, the forwarder set is not so necessary and its function is almost the same as the best link. The performance of Opportunistic routing is quite close to the traditional shortest path routing under such scenarios. In the following simulations, it focuses on low link quality scenarios. Both the links from the source to the forwarder set and the links from the forwarder set to the destination are set to be lossy. In our experiments, the default size of the candidate forwarder set is two and getting routes for every fixed iterations for low and high level traffic.

    5. Estimate Error with EEC

    The EEC method has three procedures, for encoding at the sender, decoding at the receiver, and estimating BER at the receiver, respectively. These procedures are all randomized. The sender and the receiver should use the same random seed to initialize their pseudo-random number generators, so that they generate the same random sequence.

  4. SIMULATION ENVIRONMENT Conclusions are based on the results captured by

    extensive simulation of a network model which implements the proposed method. The method is implemented using MATLAB and it evaluates the performance of the system. The performance results are then compared in terms of delay, queuing delay, throughput and energy consumption. The purpose of this work is to provide a best route and consider how to design an efficient algorithm for transmit at maximized throughput with minimum energy consumption, minimum bit error rate and minimum delay for every transmission. Also here randomly choose nodes connecting source node and destination node as the route.

    Fig. 3 shows the propagation & transmission delay and queuing delay. The queuing delay increases as the rate of each data stream increases and the propagation & transmission delay remains constant.

    Fig.3. Queuing delay of proposed system

    Fig. 4 shows the queuing delay with and without using EEC versus packet arrival rates. From the figure, see that the delay reduced significantly. This is due to some reasons i.e, EEC decreases the no: of retransmissions by estimating BER of the packets.

    Fig. 4. Queuing delay of proposed system with EEC

    Fig. 5 shows the energy consumption for all nodes in the network. The coordinate (x, y) (1 x 9, 1 y 9) shows the position of each node in the network.

    Fig. 5. Energy consumption of proposed system

    Fig. 6 shows the comparison of existing system[1] and proposed system on the basis of delay.From the graph it is clear that the proposed system with EEC performs better by reducing the delay than existing system .

    Fig. 6. Delay comparison

    Fig. 7 shows the comparison of existing system and proposed system on the basis of throughput. From the graph it is clear that the proposed method with EEC performs better than existing with EEC in terms of throughput.

    Fig. 7. Throughput comparison

  5. CONCLUSION

In this paper, we proposed link-correlation-aware Opportunistic routing based with EEC. It is formed by combining the existing work with the link-correlation aware opportunistic routing and EEC schemes. The combined work adapts effectively in the packet recovery with very low latency. The distributive strategy helps in determining the lost packets all over the wireless network. The EEC scheme effectively detects the errors in the packet recovery so that the errors can be corrected and packet recovery can be efficient. The link- correlation-aware opportunistic routing overcomes the estimation errors in the forwarder set selection and reduces the scheduling costs by exploiting the diverse low correlated orwarding links. Thus the proposed method performs better than existing with low latency packet recovery and also achieves high reliability and stability.

REFERENCES

  1. Chenxi Qiu, Haiying Shen, Sohraab Soltani, Karan Sapra, Hao Jiang, and Jason O. Hallstrom,"CEDAR: A Low-Latency and Distributed Strategy for Packet Recovery in Wireless Networks".

  2. Wei Dong, Member, Jie Yu, and Pingxin Zhang ,Exploiting Error Estimating Codes for Packet Length Adaptation in Low-Power Wireless Networks .

  3. Yousaf Bin Zikria_, Sung Won Kim Jin-Ghoo Choiaa and Byung- Seoa Kimy ,A New Opportunistic Routing Forwarders Selection Scheme to Enhance Throughput for Wireless Networks .

  4. Amir Darehshoorzadeh, M. Isabel Sanchez and Azzedine Boukerche Modeling and Analysis of Opportunistic Routing in Multi-hop Wireless Networks .

  5. Won-Yong Shin, Member, IEEE, Sae-Young Chung, Senior Member, IEEE, and Yong H. Lee, Senior Member, IEEE ,Parallel Opportunistic Routing in Wireless Networks .

  6. Z. Guo et al., A practical joint network- channel coding scheme for reliable communication in wireless networks, in Proc. ACM MobiHoc, 2009, pp. 279288.

  7. B. Chen, Z. Zhou, Y. Zhao, and H. Yu, Efficient error estimating coding: Feasibility and applications, in Proc. ACM SIGCOMM, 2010, pp. 314.

  8. S. Soltani, K. Misra, and H. Radha, Delay constraint error control protocol for real-time video communication, IEEE Trans.Multimedia, vol. 11, no. 4, pp. 742751, Jun. 2009.

  9. S. S. Karande and H. Radha, Hybrid erasure-error protocols for wireless video, IEEE Trans. Multimedia, vol. 9, no. 2, pp. 307 319, Feb.2007.

Leave a Reply