Quality of Service in mobile ad hoc networks: a

Int. J. Ad Hoc and Ubiquitous Computing, Vol. x, No. x, xxxx
1
Quality of Service in mobile ad hoc networks:
a survey
Ash Mohammad Abbas* and Øivind Kure
Center for Quantifiable Quality of Service in Communication Systems,
Norwegian University of Science and Technology,
O.S. Bragstads Plass, 2E,
N-7491 Trondheim, Norway
E-mail: ash@q2s.ntnu.no
E-mail: okure@unik.no
*Corresponding author
Abstract: To support multimedia applications, it is desirable that an ad hoc network has a
provision of Quality of Service (QoS). However, the provision of QoS in a mobile ad hoc
network is a challenging task. In this paper, we present a review of the current research
related to the provision of QoS in an ad hoc environment. We examine issues and challenges
involved in providing QoS in an ad hoc network. We discuss methods of QoS provisioning
at different levels including those at the levels of routing, Medium Access Control (MAC),
and cross layer. Also, we discuss schemes for admission control and scheduling that are
proposed in the literature for the provision of QoS. We compare salient features of various
solutions and approaches and point out directions for future work.
Keywords: ad hoc networks; QoS; quality of service; methodologies; admission control;
scheduling; fairness.
Reference to this paper should be made as follows: Abbas, A.M. and Kure, Ø. (xxxx)
‘Quality of Service in mobile ad hoc networks: a survey’, Int. J. Ad Hoc and Ubiquitous
Computing, Vol. x, No. x, pp.xxx–xxx.
Biographical notes: Ash Mohammad Abbas is a Post-Doctoral Research Fellow under
European Research and Consortium on Informatics and Mathematics (ERCIM) “Alain
Bensoussan Fellowship” at Centre for Quantifiable Quality of Service in Communication
Systems (Q2S), A Center for Excellence, Norwegian University of Science and Technology
(NTNU). He is a Reader at the Department of Computer Engineering, Aligarh Muslim
University, Aligarh, India and is currently on leave for academic pursuit. He obtained PhD
from Department of Computer Science and Engineering, Indian Institute of Technology
Delhi, India. His current research interests include mobile ad hoc networks, quality of service,
and routing.
Øivind Kure is a Professor at Centre for Quantifiable Quality of Service in Communication
Systems (Q2S), A Center for Excellence, Norwegian University of Science and Technology
(NTNU). He received his PhD from the University of California, Berkeley, USA. His current
research interests include wireless ad hoc and sensor networks, Quality of Service, and
routing.
1 Introduction
An ad hoc network can be formed on-the-fly and
spontaneously without the required intervention of a
centralised access point or an existing infrastructure.
An ad hoc network provides a cost effective means of
communication among many mobile hosts. Applications
of an ad hoc network include battlefield communications
where soldier need to decide for a defend or offend, riot
control and law enforcement where only law enforcing
personnel need to communicate while others are not
allowed to do so to prevent spreading of rumours,
emergency rescue missions and disaster recovery where
Copyright © 2008 Inderscience Enterprises Ltd.
the communication infrastructure is abolished. Further,
people may communicate forming an ad hoc network
in convention centres and online conferences and
classrooms without routing their calls to the available
infrastructure. Thus, an ad hoc network may provide
a cost-effective and cheaper way to share information
among many mobile hosts.
The unique characteristics of an ad hoc network
differentiate it from other classes of networks. The
mobile devices are connected through wireless links that
may have several effects such as fading, environmental,
obstacles, etc. The devices used to form an ad hoc
network possess limited transmission range, therefore,
2
A.M. Abbas and Ø. Kure
the routes between a source and a destination are often
multihop. As there are no separate routers, nodes that
are part of the network need to cooperate with each
other for relaying packets of one another towards their
ultimate destinations. The devices are often operated
through batteries, the depletion of battery power may
cause failure of nodes and associated links. The devices
may move about randomly, and therefore, the topology
of the network varies dynamically.
Quality of Service (QoS) means that the network
should provide some kind of guarantee or assurance
about the level or grade of service provided to an
application. The actual form of QoS and the QoS
parameter to be considered depends upon specific
requirements of an application. For example, an
application that is delay sensitive may require the QoS
in terms of delay guarantees. Some applications may
require that the packets should flow at certain minimum
bandwidth. In that case, the bandwidth will be a QoS
parameter. Certain application may require a guarantee
that the packets are delivered from a given source to
destination reliably, then, reliability will be a parameter
for QoS.
As more and more applications are added on top
of an ad hoc network, it is desirable that the network
should provide QoS in some form or the other. However,
the characteristics of an ad hoc network pose several
challenges in the provision of QoS. Some of these
challenges are as follows.
•
The topology of the network varies dynamically.
Therefore, it is difficult to design a scheme or a
protocol that is able to provide hard guarantees
about the QoS desired by an application.
•
The resources of the devices used are limited,
therefore, any such scheme or a protocol should be
a light-weight scheme. In other words, the protocol
should not consume a significant amount of energy
or should not incur a large amount of
computational or communication overheads.
Due to the above mentioned challenges, one may not
expect hard guarantees about the QoS. However, one
would rather be interested in QoS with soft guarantees.
Owing to its importance, a lot of research is directed
to the provision of QoS in ad hoc networks. There are a
few surveys related to the QoS provisioning in a mobile
ad hoc network including an early survey presented in
Perkins and Hughes (2002). A survey of QoS support in
Time Division Multiple Access (TDMA) based ad hoc
networks is presented in Jawhar and Wu (2005). Another
survey about the issues and solutions pertaining to QoS
in a mobile ad hoc network is presented in Reddy et al.
(2006). However, a large part of the survey contains the
description of routing protocols and QoS architectural
frameworks. Surveys of QoS routing solutions for
mobile ad hoc networks are presented in Zhang and
Mouftah (2005) and Hanzo and Tafazolli (2007).
The survey presented in Zhang and Mouftah (2005)
contains discussion on basic problems encountered in
QoS provisioning together with solutions reported in the
literature. The survey presented in Hanzo and Tafazolli
(2007) brings out various factors related to the QoS
provisioning at the level of routing such as design
considerations and trade-offs. However, there is need
for a comprehensive survey on the provision of QoS
in mobile ad hoc networks. Further, we believe that a
lot of research has carried out since the times of the
surveys that appeared in Perkins and Hughes (2002),
Reddy et al. (2006), Zhang and Mouftah (2005) and
Hanzo and Tafazolli (2007), and a lot more issues
have emerged. Therefore, there is a need to revisit the
methodologies presented in the literature with different
issues and perspectives.
In this paper, we describe a comprehensive survey
of the research carried out in this area. We start from
the theoretical background about provision of QoS and
discuss state-of-the-art research carried out in different
directions that address different issues. In this survey, we
have selected only those research papers that appeared
either in high quality refereed journals or in proceedings
of reputed refereed conferences. We have tried to select
examples that represent a group of strategies and help in
understanding a concept.
The rest of this paper is organised as follows.
In Section 2, we describe preliminary concepts related to
the provision of QoS in ad hoc networks. In Section 3, we
present a classification of methods of QoS provisioning.
Section 4 contains a brief overview of architectures for
QoS provisioning in ad hoc networks. In Section 5, we
describe the provision of QoS at the level of routing
and the schemes that address issues involved therein.
In Section 6, we discuss the provision of QoS at the
MAC layer. In Section 7, we discuss cross-layer strategies
for providing QoS in ad hoc networks. In Section 8, we
discuss the research carried out in the area of admission
control. In Section 9, we discuss different scheduling
algorithms used in QoS provisioning. Section 10 contains
the description of research related to the fairness
while providing QoS. Section 11 contains miscellaneous
methods of QoS provisioning. The last section is for
conclusion.
2 Preliminaries
In this section, we describe preliminary concepts related
to the provision of QoS in mobile ad hoc networks.
We first discuss notion of QoS and then categories of QoS
constraints.
2.1 Notion of QoS
There is no universally agreed upon definition of QoS.
In general, QoS means that the network is able to
provide some form of guarantees about the level or
the grade of service. Generally, the level of service is
based on some parameters or constraints, often known
3
Quality of Service in mobile ad hoc networks: a survey
as QoS parameters or QoS constraints. Examples of
QoS constraints include available bandwidth, end-to-end
delay, delay variations or jitter, probability of packet loss,
etc. In what follows, we briefly describe general categories
of QoS constraints.
2.2 Categories of QoS constraints
A constraint makes the job of a protocol more stressful
as compared to the scenario when there is no constraint
specified. For example, in case of routing, a route will
be considered if it satisfies the specified constraints.
The overall value of a constraint from a source to a
destination may be expressed in terms of the values
of its constituents. Let there be a multihop path
between nodes u and v consisting of nodes u1 , u2 , . . . , uk .
Let c(i, j) denotes the value of constraint c between
nodes i and j or link (i, j). Alternatively, the value of
a constraint along a path depends upon the individual
values of the constraint along the links that form the
path. Based on how the values of path constraints
are related to the values of their corresponding link
constraints, QoS constraints are classified into the
following three broad categories (Chao and Guo, 2002).
•
Additive: A constraint whose overall value is
summation of the values of its constituents. In other
words,
Figure 1 shows a pictorial representation of QoS
constraints and their combinations that fall in NP
and P classes of problems. The symbols used are as
follows: A for additive, M for multiplicative, and C
for concave. Note that finding an optimal path subject
to a combination of two or more additive and/or
multiplicative1 constraints is an NP complete problem.
As a result, the problem of selecting any combination
of two or more QoS parameters (such as delay, jitter,
hopcount, and loss probability) and optimising them is
an NP-complete problem. The only combinations of QoS
parameters or metrics that are computationally feasible
are bandwidth (which is a concave constraint) and any
one of the additive/multiplicative constraints mentioned
above. However, approximation algorithms exist for a
combination of two or more constraints. Further, a
commonly used method for multiple constraints to be
satisfied is sequential filtering. In sequential filtering, one
first examines whether paths between a given source and
a destination satisfy a QoS constraint. The subset of
the paths that satisfy the first QoS constraint is further
examined whether it satisfies the second QoS constraint,
and so on.
Figure 1 Constraints and their combination that lie
in P or NP
c(u, v) = c(u, u1 ) + c(u1 , u2 ) + · · · + c(uk , v).
For example delay, jitter, hopcount are additive
constraints.
•
Multiplicative: A constraint whose resulting value is
a product of the values of its constituents. In other
words,
c(u, v) = c(u, u1 ).c(u1 , u2 ). . . . .c(uk , v).
For example, reliability, and the probability of
packet loss are multiplicative constraints.
•
Concave: A constraint is concave if
c(u, v) = min{c(u, u1 ) + c(u1 , u2 ) + · · · + c(uk , v)}.
For example, bandwidth along a path is minimum
of the bandwidths of the links that constitute the
path. Therefore, bandwidth is a concave QoS
constraint.
Note that sometimes one may not be able to devise
methods to identify paths that satisfy a combination
of QoS constraints. In other words, there may exist a
combination of QoS constraints that may not be satisfied
by an underlying algorithm in a reasonable amount of
time. Such a problem falls into a specific class of problems
called NP-complete problems. If a combination of QoS
constraints can be satisfied within a reasonable amount
of time, then such a problem is said to be a polynomial
(P) class of problem. There is a specific procedure to
determine whether a problem is in P or NP.
In addition to the usual network operations, the
functionalities that are to be incorporated for QoS
provisioning are (as described in Kurose and Ross (2006))
as follows:
•
traffic classifier
•
resource reservation
•
scheduling
•
admission control.
As mentioned earlier, these are general principles that
may apply to any network for the provision of QoS
irrespective of whether the network is wired or wireless,
and whether the network possess an infrastructure or
does not possess any infrastructure. In case of mobile
ad hoc networks, there are a lot of issues and challenges
in providing QoS.2 Some of them have already been
mentioned in the previous section.
In what follows, we elaborate the issues and challenges
in QoS provisioning in mobile ad hoc networks.
4
A.M. Abbas and Ø. Kure
2.3 Issues and challenges
As mentioned earlier, in an ad hoc network the
mobile devices are connected through wireless links
that are more prone to errors as compared to their
wired counterparts. There are problems such as hidden
terminal, multipath fading, etc. As opposed to a wired
network, there are no separate routers, therefore, the
mobile devices need to route packets of one another
towards their ultimate destination. Generally mobile
devices are equipped with omni-directional antennas, and
therefore, transmission of a node are heard by nodes in
its vicinity. This causes one more issue – nodes need to
coordinate among themselves for transmissions through
a shared channel. In other words, a node cannot decide
on its alone about the time of the beginning of a
transmission because the channel might be occupied by
another node in its vicinity. Therefore, the time taken
in waiting for the transmission depends upon who are
the other neighbouring nodes contending for the channel.
However, their is no such issue in case of wired networks
as the channel, therein, is not shared. Note that there may
be multiple hops from a given source to a destination in
an ad hoc network and at each hop nodes may contend
for the channel. Due to channel contention, it is difficult
to provide any hard guarantees about the end-to-end
delays.
On the other hand, the topology of an ad hoc network
varies dynamically due to either movement of mobile
devices or depletion of battery power. It may affect QoS
guarantees provided by the network because a change in
the topology of the network may require to rediscover
the routes adding to the latencies and thus affecting the
QoS. It may also happen that the newly discovered routes
are longer than the routes available before the topological
change which will affect the QoS more stringently, as
the resources that were reserved for a flow before the
topological change are no longer reserved, they have
to be reserved along newer routes. It may also happen
that the amount of resources required by the flow or
application is no longer available, adding further latencies
and affecting the QoS. Therefore, another issue involved
in the provision of QoS in mobile ad hoc networks is how
to tackle changes in the topology of the network.
Another issue in case of mobile ad hoc networks
is that the resources of participating nodes are limited.
Therefore, a protocol (that is considered to be efficient
for wired or networks with some kind of existing
infrastructure) that requires extensive computations and
communications may not be a good option in such
networks. Therefore, a protocol for providing QoS in
ad hoc networks should be light-weight as far as possible
and should be able to utilise resources in an efficient and
effective manner.
Note that QoS can be provided, in some form or the
other, at different layers of the protocol stack. At what
layer and in what form the QoS is provided depends upon
the requirements of an application. Depending upon the
actual QoS requirements of an application, the issues
involved in providing QoS are different. Also, the actual
issues involved can be specific to the method used for QoS
provisioning.
In what follows, we discuss methods of classification
of different methodologies for providing QoS in mobile
ad hoc networks.
3 Classification of methodologies
As we pointed out earlier, the issues involved in QoS
provisioning are different depending upon the type of
and the requirements of an application, the methodology
of QoS provisioning, and the layer of protocol stack at
which the QoS is to be provided. In this section, we
wish to classify the methodologies of QoS provisioning
in mobile ad hoc networks and then we discuss different
methods reported in the literature in each class.
Figure 2 shows a classification of methods of
QoS provisioning in mobile ad hoc networks that we
call layered classification. In general, depending upon
at which layer of TCP/IP protocol suite the QoS
provisioning is implemented, one can classify methods of
QoS provisioning into the following categories:
•
MAC layer
•
network layer
•
cross layer.
Figure 2 A layered classification of methods of QoS provisioning in ad hoc networks
Quality of Service in mobile ad hoc networks: a survey
Based on the methodologies used, these categories can
be further divided into subcategories. For example,
MAC layer schemes are divided broadly into three
subcategories:
•
IEEE 802.11
•
TDMA
•
CDMA.
There can be several other MAC layer protocols as well.
Cross layer strategies are also divided into three sub
categories, namely, scheduling, multirate, and resource
allocation. The strategies at the network layer consists
mainly of routing protocols which can be divided into
unipath and multipath categories.
On the other hand, schemes can be classified based on
the major functionalities required for QoS provisioning.
We call it a functional classification, and is shown
in Figure 3. The major categories that are part of
such a classification are routing, MAC, differentiation,
admission control, resource reservation, and scheduling.
There can be different subcategories. For example,
scheduling can be divided into rate based scheduling,
prioritised scheduling, opportunistic scheduling, etc.
There can be other classifications as well. For
example, there can be a parametric classification
in which methods are classified based on the QoS
parameters such as delay based, bandwidth based,
throughput based, etc. Another classification can be the
behavioural classification in which methods are classified
based on the manner in which QoS is provided such as
per hop, per flow, per class, etc.
On the other hand, we would like to mention that
none of these classifications is an absolute classification.
In other words, there might be a method that is classified
to fall in a category, however, it may happen that the
method incorporates or uses other methods that belong
to other categories. However, we believe that different
works are carried out by different researchers with
different objectives and issues in mind, and therefore,
a classification simply helps in studying them in a bit
5
organised manner. Therefore, it is not essential for a
classification to classify methods into absolute levels or
categories.
In what follows, we review the research reported in the
literature pertaining to the major categories. We would
like to mention that in the ensuing discussion we do not
strictly follow either layered or functional classification
for the sake of simplicity.
4 QoS architectures
In general, an architectural framework consists of a
group of modules that are required for the QoS
provisioning in an ad hoc network e.g., routing,
MAC layer, admission control, resource reservation, etc.
We describe here some of the architectural frameworks
proposed in the literature for the provision of QoS in
mobile ad hoc networks.
An IP-based framework, called INSIGNIA,3 for
providing QoS in mobile ad hoc networks is presented
in Lee et al. (2000). It uses in-band signalling. The term
in-band signalling means that the control information
is carried with data, and there is no separate control
channel as opposed to another type of signalling called
out-of-band signalling where control information and
data are sent on separate channels. The framework
is aimed to provide adaptive QoS guarantees to an
application. By adaptive, we mean that there is a
minimum QoS that has to be provided to an application.
The level of QoS can be enhanced later if resources
required to support the enhanced QoS are available.
The architecture has several modules that are routing,
in-band signalling, admission control, packet forwarding
or scheduling, MAC protocol, etc. However, it is a
stateful architecture because it uses soft state resource
management scheme to utilise the resources.
An architecture for the provision of QoS in MANETs
is called Stateless Wireless Ad hoc Network (SWAN)
Ahn et al. (2002). It supports service differentiation for
realtime and best-effort traffic. The proposed architecture
Figure 3 A functional classification of methods of QoS provisioning in ad hoc networks
6
A.M. Abbas and Ø. Kure
Table 1 A comparison of architectural frameworks for QoS provisioning
Architecture
Features
Comments
INSIGNIA (Lee et al., 2000)
SWAN (Ahn et al., 2002)
Adaptive QoS
Service differentiation
FQMM (Xiao et al., 2000)
Combination of differentiated
and integrated services
Soft state resource management
Does not require QoS support
from MAC layer
Scalable
handles both the realtime traffic and the best-effort
traffic. Local rate control is used for handling the
best-effort traffic of TCP, and a sender-based admission
control is used for the realtime traffic of UDP. A merit of
SWAN is that it is independent of the underlying MAC
layer. Alternatively, it does not require a QoS support
from the MAC layer. It can be used for QoS provisioning
even if the underlying MAC layer provides a best-effort
service.
Another architectural model called Flexible QoS
Model for Mobile ad hoc networks (FQMM) is presented
in Xiao et al. (2000). It provides a combination of
aggregation of traffic classes as that of differentiated
services model and at the same time it possesses the per
flow granularity of integrated services model. Specifically,
high priority flows are provided per flow QoS and lower
priority flows are aggregated into a set of service classes.
The hybrid treatment of the traffic is based on the
intuition that the fraction of flows with high priority and
that need per flow QoS is much less as compared to flows
with low priority. However, the service level of a flow
may change dynamically from per flow to per class and
vice versa depending upon the traffic load in the network.
The framework is scalable and provides a basis for future
models to come up with better QoS guarantees.
A comparison of these architectural frameworks for
QoS provisioning in ad hoc networks is given in Table 1.
Future work
There are several issues that can be addressed in future
such as how to decide about the classification of traffic
and what percentage of traffic can be treated on per flow
basis. Also, none of these architectures takes into account
how to sustain a given level of QoS in the presence of
mobile nodes or how a source node can predict what
level of QoS it may receive based on the current network
conditions. All these issues may be addressed in future.
In what follows, we review the research related to the
provision of QoS at the level of routing.
5 Routing
There is a lot of work reported in the literature in which
the provision of QoS in an ad hoc network is embedded
in the routing protocol itself. The provision of QoS at the
level of routing can be divided into different categories
for the sake of simplifying the discussion.
5.1 QoS routing protocols
Several protocols are proposed in the literature with a
provision of QoS at the level of routing. Their objectives
and aims differ based on their applications and strategies
used. In what follows, we discuss some of them.
5.1.1 Bandwidth estimation based routing
Generally, routing protocols find a feasible route from
a source to a destination without taking into account
current traffic in the network or specific requirements
of an application. As a result, the network may
become overloaded and the requirements of a realtime
application that requires a support for QoS may not be
met. Therefore, there seems a need to estimate the traffic
in the network so that a feedback can be provided to the
application in case when its requirements cannot be met.
A QoS aware routing that is based on the bandwidth
estimation for mobile ad hoc networks is proposed in
Chen and Heinzelman (2005). The protocol incorporates
an admission control scheme together with a feedback
scheme to meet the QoS requirements of realtime
applications. The QoS routing protocol is based on
Ad hoc On-demand Distance Vector (AODV) routing.
The protocol is based on the intuition that the end-to-end
throughput of a route depends upon the minimum
end-to-end residual bandwidth available along the route.
To estimate available residual bandwidth, two methods
are used. In the first method, hosts listen to the channel
and estimate the available bandwidth that is based on
the ratio of the time for which the channel is free and
the time for which the channel is busy. This estimate
is called ‘listen’ bandwidth estimation. In the second
method, every host disseminate the information about
the bandwidth used by it currently. This dissemination is
carried out through ‘hello’ messages. A host estimates its
available bandwidth indicated in the ‘hello’ messages that
it receives from its two hop neighbours. This is called the
‘hello’ bandwidth estimation. The performance of ‘hello’
bandwidth estimation comes out to be better as compared
to the ‘listen’ bandwidth estimation when releasing the
bandwidth is required immediately. However, ‘listen’
bandwidth estimation does not incur an additional
overhead as compared to ‘hello’ bandwidth estimation.
The reason is that in ‘hello’ bandwidth estimation, the
information about bandwidth consumed by neighbours is
attached in ‘hello’ messages, and these ‘hello’ messages
are sent periodically.
Quality of Service in mobile ad hoc networks: a survey
A QoS routing protocol called Bandwidth
Reservation in Ad hoc Wireless Networks (BRAWN) is
proposed in Guimaraes et al. (2009). BRAWN is also
based on bandwidth estimation, however, it is designed
for multirate networks. In a multirate network, nodes
can choose among several modulation schemes and can
communicate to neighbours using different transmission
rates depending on channel conditions. BRAWN
provides a network layer solution i.e., no modification
is required at the lower layers. The scheme employed
computes the available bandwidth at a node which is
then used to accept or reject a flow.
5.1.2 Interference aware routing
A QoS routing protocol that guarantees the bandwidth
for ad hoc networks with interference considerations is
presented in Jia et al. (2005). The protocol addresses
the problem of Ad hoc Shortest Widest Paths (ASWP)
routing. A routing protocol that is aware of the
interference called as Interference Aware QoS Routing
(IQRouting) is proposed in Gupta et al. (2005).
In IQRouting, several paths are probed using flow
packets in a distributed fashion for satisfying QoS. The
paths that satisfy the QoS are known as candidate paths.
The path that is the best in terms of the QoS amongst all
candidate paths is chosen by the destination node.
7
5.3 Backbone based QoS routing
A QoS routing protocol called Core-Extraction
Distributed Ad hoc Routing (CEDAR) is proposed in
Sivakumar et al. (1999). The protocol is aimed to satisfy
bandwidth requirements of a flow from a given source
to a destination. The protocol consists of three steps
namely core extraction, link-state propagation, and
route computation. In the core extraction step, a group
of nodes are elected to form the core of the network in a
dynamic and distributed fashion by using an approximate
algorithm for minimum dominating set. A core node is
responsible for maintaining the local topology of the
nodes in its domain and it also computes the routes for
these nodes.
A routing protocol called QoS Mobile Routing over
Ad hoc On-demand Distance Vector routing (QMRBAODV) is proposed in Ivascu et al. (2009). The
main motivation behind the protocol is that a realistic
MANET is likely to be heterogeneous. In other words,
there are some nodes that are rich in resources while
others may not be rich enough. The protocol constructs
a routing backbone consisting of nodes that are rich in
resources. These backbone nodes are responsible to route
packets to end nodes. Figure 4 shows a network with a
backbone.
Figure 4 Backbone or core based QoS routing
5.2 Position based QoS routing
A QoS routing protocol called Geographical Vehicular
Grid (GVGrid) for Vehicular Ad hoc Networks
(VANET) is presented in Sun et al. (2006). GVGrid is an
on-demand and a position based routing protocol that
identifies a route from a source node (which is a fixed
base station) to vehicles that lie in a destination region.
The geographical region is divided into squares of equal
size and is called a grid. An underlying assumption in
GVGrid is that every vehicle possesses a digital map and
knows its geographical position and the direction of its
movement through a Geographical Positioning System
(GPS). The intermediate nodes remember the route till it
is broken. The quality of route is determined based on:
•
the lifetime
•
the packet arrival ratio.
The lifetime of a route is the duration between the time
instances when a route was established till a link on
the route is failed. The packet arrival ratio is the ratio
of the packets that have arrived at the destination and
the packets that were sent by the source. It has been
shown through simulations that GVGrid performs better
in terms of lifetime as compared to the contemporary
protocols.
A position based QoS routing for Ultra-Wide Band
(UWB) based ad hoc networks is proposed in Abdrabu
and Zhuang (2006). However, this protocol uses cross
layer properties, therefore, we shall discuss it while
describing cross layer solutions.
It is worth pointing out that the overheads of movement
of an ordinary mobile node will be much less than the
overheads involved when a node that is part of the core or
the backbone of the network moves. Therefore, protocols
that are based on constructing a core or the backbone
may not allow the backbone nodes to move, otherwise,
the backbone is required to be constructed a fresh.
5.4 Multipath QoS routing
A single route from a given source to a destination may
not be able to provide enough resources required by
an application. Therefore, a protocol should be capable
8
A.M. Abbas and Ø. Kure
of identifying multiple paths from a given source to a
destination.
A QoS routing protocol called Ticket Based Probing
(TBP) is proposed in Chen and Nahrstedt (1999). A ticket
is a permission for an intermediate node to search
exactly one path. The source sends probes towards the
destination to search for a low cost path that satisfy the
QoS constraint. Each probe is required to carry at least
one ticket and a probe with more than one tickets is
allowed to split at an intermediate node each searching
a different downstream subpath (see Figure 5). As a
result, there can be multiple paths from a given source
to the destination. However, multiple paths searched may
not satisfy any kind of disjointness. The protocol avoids
flooding by the ticket mechanism and is able to handle
sessions with either delay or bandwidth constraints.
There are multiple levels of path redundancies so as to
direct traffic through an alternate path in case of failure
of a link along an existing path. However, the protocol
needs a beacon mechanism to know the neighbours and
beacon packets are transmitted periodically, therefore,
the overhead may be significant.
Figure 5 Ticket based probing: probe p1 has only one ticket
while p2 has two tickets
A routing scheme, in which different connections from a
source to a destination may request different bandwidths
through different alternate paths, is presented in Jia
et al. (2004). The proposed multipath routing deals
with inaccurate link state problem. Specifically, two
categories of K-shortest routing algorithms, hop-based
and bandwidth-based are proposed, and five categories
of path selection algorithms are presented, which are:
Best-K-Widest (BKW), Random-K-Widest (RKW),
Shortest-K-Widest (SKW), Best-K-Shortest (BKS),
and Widest-K-Shortest (WKS). In order to reduce the
amount of flow of link-state update information, three
schemes are proposed that are based on the distance
of the destination from the source. These schemes are:
Deterministic Frequency Reduction (DFR), Probabilistic
Frequency Reduction (PFR), and Hop/Distance
Threshold (HDT).
5.5 Multicast QoS routing
The issues involved in multicast routing with a provision
of QoS are investigated in Wu and Jia (2007). Therein,
authors use a concept of ‘node bandwidth’. Note that
node bandwidth might be related to the transmission rate
by a node. As the bandwidths at the nodes of an ad hoc
network are limited, a multicast call can be blocked
despite the fact that enough bandwidth is available in the
system so as to support the call. This is because a single
multicast tree does not exist at the node to support the
call. Authors in Wu and Jia (2007) proposed a multicast
routing scheme by using either multiple paths or multiple
multicast trees so that the bandwidth requirement of a
call are met. Therein, three multicast routing schemes are
proposed named as Shortest Path Tree Based Multiple
Paths (SPTM), Least Cost Tree Based Multiple Paths
(LCTM), and Multiple Least Cost Trees (MLCT). The
routing trees obtained using these strategies can meet the
user’s requirements in terms of delays and bandwidth.
5.6 QoS routing with resource allocation
A framework for generalised QoS routing with resource
allocation is presented in Bashandy et al. (2005). The
framework combines routing with the allocation of
resources along the routes. It employs a dynamic
programming algorithm that tries to find an optimal
path between a given source and a destination and
computes the amount of resources required at each
intermediate node so as to satisfy the end-to-end QoS
requirements along the path. The QoS parameters
considered are end-to-end delay, jitter, reliability, and
bandwidth. These QoS parameters are represented as
functions of resources rather than a fixed value metrics.
Further, the applicability of the framework to rate
based service disciplines (such as GPS, packet by Packet
Generalised Processor Sharing (PGPS), and Self-Clocked
Fair Queueing (SCFQ)) is also investigated.
In what follows, we discuss multiple constraint based
QoS routing.
5.7 Constraint based QoS routing
A problem that is considered to be a part of the QoS
provisioning in a network is that how to identify paths
that satisfy two or more constraints. As mentioned
earlier, the problem of finding paths with two or
more additive/multiplicative QoS constraints is an NP
complete problem. However, the problem of finding
paths with one additive/multiplicative constraint and
a concave constraint is not an NP complete problem.
For example, one can find paths that satisfy two QoS
constraints – delay and bandwidth. Note that delay is
an additive constraint and bandwidth is a concave (or
min-max) constraint. In Wang and Crowcroft (1996),
an algorithm for bandwidth-delay based QoS routing is
presented. The algorithm first removes all links which
9
Quality of Service in mobile ad hoc networks: a survey
do not satisfy the bandwidth constraint and then finds a
shortest path (in terms of delays) in the resultant graph.
Due to the NP completeness of the QoS routing
with two or more constraints, often either approximate
algorithms or heuristics are used in place of exact
algorithms. However, there are papers Mieghem and
Kuipers (2004), Kuipers and Mieghem (2005), Mieghem
et al. (2001) which favour to use exact algorithms
instead of heuristics. The reason given is that the
NP-completeness of QoS routing problems with multiple
constraints occurs in specially constructed network
topologies and such topologies are unlikely to occur in
practice in a realistic network. For topologies that do not
show the NP completeness, the complexities of heuristics
and exact algorithms can be comparable.
A hop-by-hop QoS routing called Self-Adaptive
Multiple Constraint Routing Algorithm (SAMCRA) is
proposed in Mieghem et al. (2001). In Mieghem and
Kuipers (2004), some underlying concepts of an exact
QoS routing are explained and are incorporated in
SAMCRA. One of the concept is nonlinear definition of
the path length. In the usual linear definition, individual
path lengths are simply added to give the resultant path
length. In nonlinear definition, the resultant path length is
1/q power of the summation of the q powers of individual
path lengths. Other concepts incorporated in SAMCRA
are k-shortest path approach, non-dominance of paths,
and look ahead. These concepts may serve as basic
building blocks of a multiconstrained routing algorithm.
The authors of Mieghem and Kuipers (2004) extend
a similar theme in Kuipers and Mieghem (2005) in
which they have the view that exact QoS routing is
tractable in practice. Specifically, the NP completeness
of a multiconstrained routing problem hinges upon the
following conditions:
•
•
•
the topology
the granularity of link weights
the correlation among link weights
•
the constraints.
Therein, the impact of these conditions on the complexity
of QoS routing is studied through mathematical analysis
which is further validated using simulations.
In Xue et al. (2007), Fully Polynomial Time
Approximation Schemes (FPTAS) for finding a path
between a source to a destination subject to many
additive QoS constraints are presented, which are as
follows. The first FPTAS uses a single auxiliary edge
weight to compute a shortest path. The algorithm has
a time complexity of O(Km + n log n) where K is the
number of additive constraints, n is the number of nodes,
and m is the number of links. It is a K-approximation
algorithm and can be used in hop-by-hop routing
protocols. The second FPTAS is for an optimised
version of QoS routing problem and has the time
K−1 complexity of O n
. The third FPTAS is also for
an optimised version of QoS routing problem and has
K−1 a time complexity of O n log n + m H
, when
there exists an H-hop path satisfying K number of
QoS constraints. However, for implementing the FPTAS
proposed in Xue et al. (2007), some modifications are
required. For example, the routing tables are required
to store the next hop addresses for every source and
destination pair for some discrete values of , and the
values of can be used to determine the classes of traffic
in the network.
A framework for sufficient rate constraints for QoS
flows in ad hoc networks is presented in Gupta et al.
(2007). It is a theoretical model that predicts the capacity
of an arbitrary ad hoc network. The proposed model uses
a concept of a specialised graph called a conflict graph.
A conflict graph represents the interference relationships
between different links of the network. Specifically, a
link in the network graph is represented by a node in
the conflict graph. There is a link between two nodes in
the conflict graph iff the corresponding two links in the
network graph interfere with each other. Therein, authors
proposed two sets of constraints – row constraints, and
clique constraints. In a network where some nodes use
row constraints and others use clique constraints, the
union of constraints being satisfied across the network
constitutes sufficient conditions for a flow rate vector to be
feasible. The row and clique constraints can be computed
in a distributed fashion using localised information about
the topology of the network. Distributed algorithms
for capacity estimation that utilise these constraints are
proposed. Further, the capacity estimated may be used to
implement admission control and QoS routing schemes
in an ad hoc network. A comparison of QoS routing
protocols is shown in Table 2.
Table 2 A comparison of QoS routing protocols
Protocol
Features
QoS parameter
Comments
QoSR-L (Lin and Liu, 1999)
TBP (Chen and Nahrstedt, 1999)
BE (Chen and Heinzelman, 2005)
Bandwidth
Delay/Bandwidth
Bandwidth
GVGrid (Sun et al., 2006)
Bandwidth guarantees
Ticket based probing
Bandwidth estimation
Based on AODV
Position based routing
ASWP (Jia et al., 2005)
IQRouting (Gupta et al., 2005)
CEDAR (Sivakumar et al., 1999)
QMRB-AODV (Ivascu et al., 2009)
BRAWN (Guimaraes et al., 2009)
Interference considerations
Interference aware
Core extraction
Backbone construction
Computes available bandwidth
Time slot assignment
Multiple paths
Hello bandwidth estimation
Listen bandwidth estimation
Used in Vehicular
Ad hoc Network (VANET)
Ad hoc Shortest Widest Path
Use of candidate paths
No reliance on TDMA
Traffic distribution
Multirate ad hoc networks
Lifetime
Packet arrival ratio
Bandwidth
Bandwidth
Bandwidth
Throughput
Bandwidth
10
A.M. Abbas and Ø. Kure
Future work
In future, one may address the issue of a predictable
QoS. By the term ‘predictable QoS’, we mean that the
source should be able to predict upto what extent the QoS
may be fulfilled along a route. Ofcourse, the predictable
QoS may depend upon the network conditions such as
node mobility, node and link failures, and interference.
One may also address upto what extent the QoS can
be sustained despite the changes in the topology of the
network.
6 QoS at MAC layer
In this section, we describe the research reported in the
literature related to the provision of QoS at the MAC
layer.
6.1 Types of MAC layers
We consider the following major MAC layers for ad hoc
networks– Carrier Sense Multiple Access with Collision
Avoidance (CSMA/CA), IEEE 802.11, Time Division
Multiple Access (TDMA), Code Division Multiple
Access (CDMA), and their variations that are reported in
the literature.
6.1.1 CSMA/CA based networks
CSMA is one of the most widely used MAC layer in
ad hoc wireless networks. A contention based MAC
scheme called Black-Burst (BB) is proposed in Sobrinho
and Krishnakumar (1999). The scheme BB is a
distributed MAC scheme for the provision of QoS to
realtime traffic for ad hoc networks that are based on
CSMA. In this scheme, nodes contend for the channel
until the channel becomes free. The packets that are
marked real time have priority over non-realtime packets
and a node that wishes to transmit realtime packet has
a priority for access to the channel over the nodes that
have non-realtime packets.
A medium access control protocol called Sticky
CSMA/CA that provides implicit synchronisation
and realtime QoS in wireless mesh networks is
proposed in Singh et al. (2007). The traffic considered
is a combination of Voice over IP (VoIP) and
delay-insensitive traffic. Monitoring of medium in Sticky
CSMA/CA is similar to standard CSMA/CA with the
difference that nodes in Sticky CSMA/CA remember
what activities are carried out in the recent past. The
information about the activities in the recent past is used
by a newly arriving VoIP flow to grab the medium as
soon as it is free, and thereafter, the VoIP flow sticks
to a periodic schedule. The gaps left by the realtime
traffic are filled by delay-insensitive traffic using the
leftover bandwidth. It is shown that the total voice
call carrying capacity of Sticky CSMA/CA increases
significantly as compared to the classical CSMA/CA
based techniques such as IEEE 802.11 b/e. Further,
authors therein, discuss that one can enhance QoS by
imposing periodicity at the application layer.
6.1.2 IEEE 802.11 based networks
Note that IEEE 802.11 is the most widely used MAC
layer for mobile ad hoc networks. There are two major
flavours of IEEE 802.11 pertaining to coordination
function – the first is with Distributed Coordination
Function (DCF) and the second is with Enhanced
Distributed Channel Access (EDCA). The version with
EDCA is also called IEEE 802.11e and has a support for
the provision of QoS.
It seems important to analyse how well the network
with IEEE 802.11 as MAC layer protocol can support
QoS. A unified model for the performance analysis
of IEEE 802.11e Enhanced Distributed Coordination
Function (EDCA) is proposed in Hui and Devetsikiotis
(2005). The parameters analysed are saturation
throughput and delay under the assumptions of finite
number of nodes and ideal channel conditions in a
single hop Wireless Local Area Network (WLAN). The
model is unified in the sense that it combines a Markov
model (Bianchi, 2000), p-persistent CSMA/CA model,
and average value model (Tay and Chua, 2001) for
the analysis of DCF. The model uses either multiple
bidimensional chains or multiple average value analysis
in separate back-off subperiods assuming that the
p-persistent behaviour is time-dependent. The proposed
model is validated through simulation results.
An analytical model to assess the performance of
IEEE 802.11 wireless LAN in terms of the provision
of QoS is presented in Zhai et al. (2005). The
parameters analysed are maximum throughput and
available bandwidth, delay and variations in delay,
and packet loss rate. The model is validated through
simulation results and it has been shown that by
controlling the total traffic rate, IEEE 802.11 can support
strict QoS requirements while achieving high channel
utilisation. Another study regarding the performance
assessment of IEEE 802.11 EDCF is presented in Hwang
and Wu (2008). A fixed point analysis of single cell IEEE
802.11 Wireless Local Area Networks (WLAN) is carried
out in Kumar et al. (2007). A mechanism to estimate
the available bandwidth of IEEE 802.11 based ad hoc
networks is presented in Sarr et al. (2008).
An analysis of priority schemes of IEEE 802.11 and
IEEE 802.11e based wireless LANs is carried out in Xiao
(2005). The proposed backoff based priority schemes
differentiate among the minimum backoff window
size, the backoff window increasing factor, and the
retransmission limit. The parameters considered in the
analytical model are saturation throughput, saturation
delays, and frame dropping probabilities of different
priority classes.
However, all these studies do not take into account
the transmission range and/or carrier-sense range while
analysing the throughput. Note that the transmission
range and carrier sensing range play a vital role in
Quality of Service in mobile ad hoc networks: a survey
the effective bandwidth and/or throughput in case of
ad hoc network. Analysis taking into considerations the
transmission and carrier sensing ranges of mobile devices
remains a challenging task and may be addressed in
future.
6.1.3 TDMA based networks
In an ad hoc network that is based on TDMA, the
notion of bandwidth is related to the free time slots
available along a link for transmission. The number
of free slots is decided by the neighbours and their
transmission/reception activities. Therefore, reservation
of bandwidth from a source to a destination implies
reservation of time slots that are free and are available
for sending packets. The methods of determining what
time slots are free and available for transmission can be
different and define the approach taken by a protocol.
In what follows, we discuss some of the approaches
proposed in the literature.
A protocol called Distributed Slot Reservation
Protocol (DSRP) that comprises of several strategies
for dynamic bandwidth allocation to be used in QoS
routing for TDMA based ad hoc networks is proposed
in Shih et al. (2006). In DSRP, QoS routing depends on
the information gathered only from one-hop neighbours
and thus making the protocol localised and distributed.
As mentioned earlier, the notion of bandwidth in ad hoc
networks where TDMA is used at the MAC layer is
related to the number of free slots. There are two types of
policies related to slot allocation to links in the network.
A policy that checks what are the valid and free slots for
a link is called a Slot Inhibited Policy (SIP) and a policy
that decides which slots can be used by a link is called a
Slot Decision Policy (SDP). Among the SDPs proposed
are:
•
Three-Hop Backward Decision Policy (3BDP)
•
Least Conflict First Policy (LCFP)
•
Most Reuse First Policy (MRFP).
DSRP is an on-demand slot reservation protocol for
QoS routing. When a source wants to communicate to
a destination, source initiates a QoS route discovery
by sending a Route Request (RREQ) packet to its
neighbours. During the route discovery phase, SIPs
decide what are the valid slots and SDPs decide which
slots out of the valid slots can be used by a link. The
actual reservation of slots is carried out when a Route
Reply (RREP), which is generated by the destination
after receiving an RREQ, travels upstream. However,
it has little more hassle. It may happen that the slots
that have been decided to reserve against an RREQ may
be reserved by the RREQs generated by other nodes.
To take care of that a Slot Adjustment Protocol (SAP) is
used to coordinate the reservation of slots for a link by
different RREQs. For that purpose, an algorithm for slot
adjustment is proposed.
11
6.1.4 CDMA based networks
A game-theoretic approach to energy efficient
modulation in networks that utilise CDMA with delay
as a QoS constraint is proposed in Meshkati et al.
(2007). The approach focuses on an M-ary Quadrature
Amplitude Modulation (MQAM). This is analogous to
a noncooperative game in which each user chooses its
strategy in terms of transmit power, transmit symbol
rate, and constellation size, in order to maximise its own
utility while satisfying its QoS constraints. The utility
function used is a measure of the number of reliable bits
transmitted per unit of energy consumed, and is suitable
for energy constrained networks. Using the proposed
game-theoretic framework, the tradeoffs among energy
efficiency, delay, throughput, and modulation order can
be quantified. Specifically, the effect of coding on energy
efficiency is studied and quantified using the proposed
game-theoretic approach. Further, the tradeoff between
energy efficiency and spectral efficiency has also been
illustrated.
Low complexity MAC protocols for QoS support in
third generation radio access networks are proposed
in O’Farrell and Omiyi (2005). The paper presents a
resource metric for networks where the users have
different signal-to-interference ratio requirements.
Further, a deadline-driven backoff procedure that can
be used in scheduling at the MAC layer so as to
provide a QoS support in terms of delay constraints,
is presented. Basically, the proposed control strategies
for distributed scheduling at the MAC layer are
spread spectrum techniques. The strategies are called
Single-Threshold Overload Signal Spread Spectrum
(ST-OSSS), Multiple-Threshold Overload Signal Spread
Spectrum (MT-OSSS), and Overload Signal Spread
Spectrum with Overload Detection (OSSS/OD).
The access procedure for ST-OSSS and MT-OSSS
is overload avoidance while that for OSSS/OD is
overload detection. Finally, a MAC scheduling algorithm
called Earlier Deadline First Parallel Link Scheduler
(EDF-PLS) is presented with the aim to optimise spectral
efficiency.
6.2 Recent trends in MAC design
A standard called IEEE 802.11e supports WLAN
applications with QoS requirements. In IEEE 802.11e,
a MAC access method called Hybrid Coordination
Function (HCF) is introduced. HCF includes Enhanced
Distributed Channel Access (EDCA) and HCF
Controlled Channel Access (HCCA). In HCCA,
a reference design that consists of a reference scheduling
and an admission control is provided. In the reference
design of IEEE 802.11e, the scheduler computes a
common scheduled Service Interval (SI) that is the
minimum of the delay bounds of all streams. It then
computes the duration called Transmission Opportunity
(TXOP) and Traffic Specifications (TSPEC). Admission
control is carried out, and TXOP are allocated to each
12
A.M. Abbas and Ø. Kure
station in a round robin fashion. In fact, the reference
design is such that QoS is provided using the most
stringent (i.e., the minimum of all streams) delay bound.
The problem due to the use of the most stringent delay
bound is that there is an overallocation of bandwidth.
The reason is that shorter is the SI, the larger will be
the fluctuations of packet arrival rate, and this implies
that more bandwidth is needed to transmit all arrived
packets. Further, a short SI may lead to more number of
polling during a period, and there may be more polling
overhead.
Therefore, the issue is that how to avoid
overallocation of bandwidth. The answer is that different
SIs should be used for different streams with different
delay requirements. For that, an Equal-Spacing (ESP)
based design is presented in Zhao and Tsang (2006)
which generalises the reference scheduling of 802.11e. The
word ‘spacing’ means an interval between two successive
scheduling of a stream. The ESP schedules each stream
with equal spacing, however, it may schedule different
streams with different spacing.
A MAC layer protocol called an Adaptive MAC
(AMAC) that uses m-ary tree algorithms for QoS
support in single cell ad hoc networks is proposed in
Tsigkas and Pavlidou (2008). The proposed protocol
is compared with Dynamic Priority MAC Protocol for
Time Bounded services (DP-TB) (Tsigkas and Pavlidou,
2006) and Elimination-Yield Non-Preemptive Priority
Multiple Access (EY-NPMA). Note that EY-NPMA is
MAC protocol for HIPERLAN and is based on dynamic
priorities. The proposed protocol AMAC provides a per
flow service guarantees to flows with delay as the QoS
parameter. It incorporates the RTS/CTS mechanism to
protect itself from the hidden terminal problem. The
protocol adapts to traffic conditions i.e., it is sensitive
to traffic load variations. However, the protocol requires
channel synchronisation among all those stations that
intend to transmit.
A MAC scheme called Busy-Tone-Based (BTB) MAC
is proposed in Wang et al. (2008) for supporting voice
and data traffic in ad hoc wireless networks. The
issues addressed are unfairness and priority reversal
due to hidden terminal, exposed terminal, and location
dependent contention. BTB ensures guaranteed priority
access for delay sensitive voice traffic using transmitter
busy tones in the node backoff procedure. It resolves
hidden and exposed terminal problems. The priority
assigned is independent of user locations, and therefore,
priority reversal is resolved. However, it does not address
the issue of capture effect where a receiver may be able
to receive correctly the desired frame even if a collision
occurs.
A MAC protocol called multi-Channel MAC
(CMAC) for dynamic channel allocation in multichannel
wireless sensor networks4 is proposed in Chowdhury
et al. (2009). Note that the problem of channel
assignment with minimum interference in single
transceiver multichannel communication is in NP,
therefore, CMAC provides a heuristic and approximate
solution. The scheme employed in CMAC takes into
account energy constraints in sensor nodes by placing
them in default sleep mode as far as possible. Its
performance is compared with Sensor MAC (SMAC)
and it is observed that the performance of CMAC
comes out to be better than SMAC in terms of energy
consumption and throughput.
A mechanism for dynamically assigning priorities of
packets based on their deadlines and the traversed hops
is proposed in Reddy et al. (2007). The mechanism called
ReAllocative Priority (ReAP) is aimed to provide QoS at
the MAC layer to video traffic. The scheme introduces
adaptive TXOP by modifying the TXOP dynamically
based on the queue length. However, the scheme does not
take into account the mobility. A comparison of various
MAC layer schemes with QoS provisioning is shown in
Table 3.
Table 3 A comparison of MAC layer protocols used in QoS provisioning
Protocol
Features
QoS parameter
Comments
Sticky CSMA
Singh et al. (2007)
DSRP
Shih et al. (2006)
GTA
Meshkati et al. (2007)
LC
O’Farrell and Omiyi (2005)
ESP
Zhao and Tsang (2006)
AMAC
Tsigkas and Pavlidou (2008)
BTB MAC
Wang et al. (2008)
CMAC
Chowdhury et al. (2009)
Implicit synchronisation
Delay
Slot reservation,
TDMA based
Quadrature Amplitude Modulation,
CDMA based
Resource metric for SNR
requirements, CDMA based
Equal-Spacing based
reference design
Per flow service guarantees
Bandwidth
Best-effort traffic fills the
gaps left by realtime traffic
Slot Adjustment Protocol,
Dynamic bandwidth allocation
Game-Theoretic Approach
Priority is independent of
user locations
Dynamic Channel Allocation
Delay
Delay
Delay
Delay
Delay
Energy
Deadline-driven backoff procedure,
Optimise spectral efficiency
Generalises reference scheduling
of 802.11e
m-ary tree algorithms,
Dynamic priorities
Resolves hidden and
exposed terminal problems
Multichannel MAC
Quality of Service in mobile ad hoc networks: a survey
Future work
In future, a major problem that needs to be addressed is
the design of an efficient MAC for an ad hoc network
that supports QoS. Although, there are extensions of
CSMA/CA and IEEE 802.11 for supporting QoS,
however, a node that wishes to transmit may need
to wait for a random amount of time due to the
exponential backoff mechanism. Also, neighbours in the
carrier sensing range cannot transmit simultaneously due
to hidden and exposed terminal problems. Moreover,
neighbouring nodes that are lying along a path from the
source to the destination cannot transmit simultaneously
due to intra-path correlation, and thus the effective
bandwidth of the path is less than the raw bandwidth
of a link. Similarly, inter-path correlation may bite the
advantages of having multiple paths from a given source
to a destination. One may address how to mitigate
the effect of intra-path and inter-path correlations
while providing the QoS in mobile ad hoc networks.
Another direction for future work can be the analysis of
IEEE 802.11 and its variations taking into account the
transmission range and carrier sensing range.
In what follows, we discuss cross layer schemes.
7 Cross-layer QoS strategies
A cross-layer protocol may utilise the properties or
functionalities of more than one layers.
7.1 TDMA-based cross layer routing
A cross layer QoS Routing (QoSR-Z) is proposed
in Zhu and Corson (2002). QoSR-Z is based on Ad hoc
On-demand Distance Vector (AODV) routing and builds
QoS routes on-demand. Also, it uses TDMA. A network
layer function (i.e., routing) is coupled with the MAC
layer function (i.e., finding the time slots), therefore, we
call it a cross layer protocol. It is based on the assumption
that the application is session oriented and requires a
constant bandwidth. Specifically, a session specifies its
QoS requirement in terms of the number of transmission
time slots needed on its route from a given source S to
a destination D. For each session or flow, QoS routing
protocol not only finds the route, it also determines the
slots for each link on the route.
Another cross layer protocol called QoS Routing
(QoSR-L) protocol based on Destination Sequence
Distance Vector (DSDV) routing that tries to provide
bandwidth guarantees is proposed in Lin and Liu
(1999). Bandwidth is defined in terms of number of
time slots available for transmission. The protocol is
based on heuristics that may provide an approximate
solution. This is because finding a schedule of free
slots that maximises the available bandwidth is an NP
complete problem. The protocol is based on TDMA
and requires some sort of global synchronisation that
incurs an extra overhead. Another protocol that reserves
13
the bandwidth for QoS routing in networks that utilise
TDMA at the MAC layer is proposed in Liao et al.
(2002). We call this protocol as TDMA-Based Bandwidth
Reservation Protocol (TBRP) to refer it for the purpose
of comparison. The protocol takes into account the
hidden terminal problem and the exposed terminal
problem during the route establishment phase.
Note that protocols that require a scheme for time
slot assignments do not seem to be suitable for an ad hoc
network. The reason is that in an ad hoc network, nodes
are allowed to move from their positions, and any such
movement of nodes may require updates in the time slot
assignments incurring a significantly large overhead.
7.2 UWB-based cross layer routing
A cross layer protocol called QoS Greedy Perimeter
Stateless Routing (QoS-GPSR) is proposed in Abdrabu
and Zhuang (2006). In QoS-GPSR, a resource allocation
algorithm is coupled with a position based routing
algorithm. It is suited for a single channel UltraWide-Band (UWB) based ad hoc network where UWB
provides position information. The cross layer design of
QoS-GPSR utilises contention based MAC, e.g. IEEE
802.11. Admission control at each node along the route
is based on the bandwidth availability information
provided by the MAC for the node and its neighbours
in its carrier sensing range. Further, the cross layer
design enables to consider the possible simultaneous
transmissions of nodes belonging to the same route
when making bandwidth reservations, as these may affect
the effective throughput. The protocol QoS-GPSR can
also work with TDMA MAC protocols, e.g. 802.15.3,
provided that a proper packet scheduling algorithm is
employed.
7.3 Cross layer schemes for resource allocation
A cross layer scheme for resource allocation that operates
at the physical and data link layers for the provision of
QoS guarantees in wireless relay networks is presented
in Tang and Zhang (2007). The goal of the scheme
proposed, therein, is to maximise the relay network
throughput subject to a given delay QoS constraint. The
scheme uses the concepts from information theory and
the concepts of effective capacity in wireless networks.
The delay constraint is characterised by a parameter
called QoS exponent which represents the information
exchanged between the physical layer and the data link
layer of the proposed cross layer scheme. There are two
major classes of wireless relay networks – Amplify and
Forward (AF), and Decode and Forward (DF). Dynamic
resource allocation algorithms for both types of networks
are developed that can be used for QoS guarantees
for multimedia communications in wireless networks.
Further, analytical models are proposed for dynamic
resource allocation in AF and DF relay networks. A fixed
power allocation for DF relay networks has also been
analysed.
14
A.M. Abbas and Ø. Kure
7.4 Cross layer schemes involving physical layer
A cross-layer optimisation for Low Density Parity
Check (LDPC) coded multirate multiuser systems with
QoS constraints is presented in Li and Wang (2006).
The proposed multirate multiple-access wireless system
uses variable spreading gain and chip level random
interleaving. The proposed framework uses some services
from the physical layer as well as some services from
the network layer, and therefore, it is termed as
cross-layer. At the physical layer, QoS requirements
are specified in terms of target bit error rate of
each user and the transmission powers of users are
adjusted according to the current system load and the
corresponding rate requirements of the users. The QoS
requirements specified at the network layer are call
blocking probabilities, call connection delays, packet
congestion probabilities and packet loss rates. A method
for call admission control that is based on Multicriterion
Reinforcement Learning (MCRL) is proposed so as to
maximise the average revenue of the network subject to
call level as well as packet level QoS. The method can
handle multiple QoS constraints.
A cross-layer scheduling algorithm with QoS support
in wireless networks is proposed in Liu et al. (2006).
The proposed algorithm is for MAC layer scheduling
and may handle multiple connections with diverse QoS
requirements with each connection employing Adaptive
Modulation and Coding (AMC) at the physical layer, and
therefore, it is called a cross-layer algorithm. A priority
is assigned to each connection and a connection with the
highest priority is scheduled first. The performance of
the proposed scheduling algorithm is validated through
simulations. A comparison of cross layer techniques is
presented in Table 4.
Note that a cross-layer technique combines the
functionalities of network layer with MAC and/or
physical layer. Ultimately, the packets have to pass
through different layer at the sender and receiver ends.
Separating the layers may simplify the design of the
protocol. On the other hand, the design of a crosslayer protocol seems to be complex. However, once a
cross-layer protocol is designed, it is expected to perform
better than a protocol that uses functionalities of only
a single layer. However, the performance depends upon
how judiciously the functionalities involving more than
one layers are incorporated.
Future work
In future, one may address how to utilise the cross layer
techniques to enhance the throughput when there are
multiple source destination pairs in an ad hoc network.
The throughput depends upon many factors such as raw
bandwidth, node density, interference. Moreover, one
may also address how to design a cross layer solution so
as to minimise the number of packets dropped as that
may decide packet retransmissions. Further, the design
of cross layer techniques that are energy efficient forms
another direction for future works.
In the previous sections, we described schemes based
on the layered classification. We now switch to schemes
that are part of the functional classifications. Note that
the schemes with routing and/or MAC functionalities are
already covered in the previous sections.
In what follows, we discuss the research reported in
the literature related to admission control.
8 Admission control
Admission control is an important function for the
provision of QoS as it determines which packet is allowed
to enter and which packet is not allowed to enter into
the network. The decision may be based on many factors
such as what may be the consequence of allowing a
packet or flow to enter into the network.
Table 4 A comparison of cross layer schemes used for QoS provisioning
Scheme
Features
QoS parameter
Layers
QoSR-Z
(Zhu and Corson, 2002)
Based on AODV,
Based on TDMA
Bandwidth
Network and MAC
QoSR-L
(Lin and Liu, 1999)
Based on DSDV,
Based on TDMA
Bandwidth
Network and MAC
TBRP
(Liao et al., 2002)
TDMA based,
Slot reservation
Bandwidth
Network and MAC
QoS-GPSR
(Abdrabu and Zhuang, 2006)
Based on UWB,
Position based routing
Delay
Network and MAC
AF-DF
(Tang and Zhang, 2007)
Resource allocation
Throughput and delay
Physical and data link
MMSQ
(Li and Wang, 2006)
Multirate multiuser
Multiple criteria
Physical and network
CLS
(Liu et al., 2006)
Adaptive modulation
and coding
Delay
Physical and MAC
Quality of Service in mobile ad hoc networks: a survey
8.1 Measurement based admission control
A scheme for admission control, which is based on
the local measurements carried out at a node, is
proposed in Xiao and Li (2004). We call it Measurement
Based Admission Control (MBAC). In MBAC, there
are different Access Categories (AC) for best-effort,
video probe, video, and voice traffic. The scheme is as
follows. Each station carries out measurements during
beacon intervals to estimate the transmission budget.
The transmission budget provides an indication about
the allowable transmission time and the time utilised
for transmissions for each AC. Each station determines
the transmission limit for each AC for the current
beacon interval. This is based on the transmission count
during the previous beacon interval and the transmission
budget calculated. The time taken in the transmissions
of voice and video packets should not exceed the local
transmission limit for each AC. If the transmission
budget for an AC is depleted or nearly depleted, new
streams are not allowed, and existing streams are not
allowed to increase the transmission time per beacon
interval that they were already using so that existing
voice and video streams are protected. However, the
proposed schemes are limited to single hop wireless
ad hoc networks.
8.2 Local admission control
Schemes for local data control and admission control are
proposed in Xiao and Li (2004). The schemes are aimed to
provide QoS while there is realtime traffic and data traffic
in the network. A major issue addressed therein is how to
adapt parameters such as Contention Window (CW) and
Arbitration Inter-Frame Spacing (AIFS) so as to provide
QoS to real time traffic. Specifically, two schemes for
data control are proposed: Dynamic Function Mapping
(DFM), and Dynamic Traffic (DT). In the DFM scheme,
a function is defined for mapping traffic load conditions
to parameters such as Contention Window (CW) and
Arbitration Inter-Frame Spacing (AIFS). In the DT
scheme, parameters are dynamically varied according
to the tendencies of traffic load conditions. The word
‘tendency’ means whether the traffic continues to increase
or continues to decrease. A Contention-aware Admission
Control Protocol (CACP) is proposed in Yang and
Kravets (2005). CACP provides admission control for
flows in a single channel ad hoc network. It is based on
the knowledge of local resources at a node and the effect
of admitting the new flow on the neighbouring nodes.
CACP focuses on QoS support in terms of bandwidth
allocation.
8.3 MAC based admission control
A call admission control scheme for QoS guarantees in
terms of bandwidth is proposed in Liu et al. (2005).
The notion of bandwidth is related to the number of
15
free time slots. Authors, therein, proposed an algorithm
for assignment of time slots in an ad hoc network that
either employs Time Division Multiple Access (TDMA)
or Code Division Multiple Access (CDMA) at the MAC
layer. It is proved that a time slot assignment for a unit
of bandwidth, if exists, can be found in O(|P |) time,
where P represents a path and |P | represents the number
of links in path P . The same is extended for two units
of bandwidth. Further, an algorithm for slot assignment
problem with k slots in a TDMA frame is proposed that
has a complexity of O(|P |2 k). Finally, an algorithm for
time slot assignment problem is integrated into a call
admission control scheme so as to provide QoS in terms
of bandwidth guarantees.
Schemes for call admission control for Wideband
Code Division Multiple Access (WCDMA) based mobile
wireless networks with multiple service classes that
negotiate QoS are presented in Paschos et al. (2005).
Therein, bandwidth reservation is used to improve the
QoS and packets are either blocked or dropped to prevent
the system to form an outage situation. However, the
probability of either blocking or dropping a packet is
kept fairly low. The traffic is divided into two classes:
realtime and non-realtime. In one of the call admission
control scheme that is used in a lightly loaded system,
calls are admitted and serviced with the maximum
resource requirements of the user. At a point, when no
further calls can be accommodated, a procedure that
negotiates with new and ongoing calls to free some of the
resources is applied. However, the drawback of such a
scheme is that non-realtime traffic is preempted to make
room for the realtime traffic. It has been shown that
this drawback can be addressed using a small proportion
of the available resources as a non-realtime reservation
bandwidth. The performance of the proposed algorithm
is analysed using a multistep Markov analysis.
8.4 Rate based admission control
A protocol that is a combination of admission control
and rate policing called Multi-Priority Admission and
Rate Control (MPARC) is proposed in Yang and
Kravets (2007). The protocol aims to provide throughput
guarantees for multi-priority traffic in ad hoc networks.
The core of MPARC is a model for allocating bandwidth
in a unsaturated, semi-saturated, and saturated network.
In MPARC, different priorities are assigned for realtime
and best-effort flows. The protocol guarantees that the
throughput of currently admitted realtime flows will
not decrease either due to realtime flows arriving later
with equal or lower priorities or due to best-effort
flows. In other words, throughput of currently admitted
realtime flows can decrease only when a realtime flow
with a high priority arrives. In MPARC, this is ensured
using a mechanism for admission control for newly
arriving realtime flows and applying a rate policing for
best-effort traffic.
16
A.M. Abbas and Ø. Kure
Table 5 A comparison of methods for call admission control
Protocol
Features
Comments
CACB (Liu et al., 2005)
TDMA/CDMA at MAC layer,
Time slot assignment
Bandwidth guarantees
MBAC (Xiao and Li, 2004)
Access categories,
Transmission budget
Delay guarantees
CAC-WCDMA (Paschos et al., 2005)
Bandwidth reservation
Traffic is divided into classes
MPARC (Yang and Kravets, 2007)
Combination of admission control
with rate policing
Throughput guarantees
CACP (Yang and Kravets, 2005)
Localised and distributed
Bandwidth guarantees
PAC Chakeres et al. (2007)
Perceptive Admission Control
and Channel Monitoring
Ensures low packet loss
and delays
8.5 Perceptive Admission Control
A protocol for Perceptive Admission Control (PAC)
for providing QoS in a wireless network is proposed
in Chakeres et al. (2007). The protocol monitors the
wireless channel and adapts the decisions of admission
control so that the utilisation of the network is
maintained while preventing congestion. To make an
admission decision, sources consider the entire region
that a new flow’s transmissions will impact. It is shown
that, with a proper Carrier Sense (CS) range, the time
for which the channel is sensed busy is a good estimate
of the utilised and available bandwidth. The performance
of the proposed protocol is analysed through simulations
and it comes out that PAC ensures low packet losses and
delays for all packets that are admitted into the network.
However, the limitation of the protocol is that it focuses
on a single hop admission control.
A comparison of methods of call admission control
is shown in Table 5. Note that we refer the method
presented in Liu et al. (2005) as CACB and that proposed
in Paschos et al. (2005) as CAC-WCDMA.
Future work
The directions for future work pertaining to admission
control for QoS provisioning in mobile ad hoc networks
are as follows. Firstly, one may come up with a scheme
for measurement based admission control that can be
applied in a generalised mobile ad hoc network. By the
term ‘generalised’, we mean that there may be multiple
hops between a given source to a destination and nodes
are free to move about randomly. Secondly, one may
propose a scheme for perceptive admission control in a
generalised mobile ad hoc network.
In what follows, we describe the research related
to scheduling which is another functionality to be
considered for provision of QoS in an ad hoc network.
reported in the literature pertaining to the provision of
QoS that use scheduling.
9.1 Prioritised scheduling
A Distributed Priority Scheduling (DPS) for provision
of delay based QoS is proposed in Kanodia et al. (2002).
In DPS, each node locally constructs a scheduling
table based on the information that it overhears,
and incorporates estimate of its relative priority
into MAC. The DPS uses a coordinated multihop
scheduling mechanism in which at an intermediate node,
downstream priorities of a packet are modified based on
the service provided to the packet upstream. In other
words, the downstream priority index of a packet is
computed recursively based on its upstream priority
index. By doing so, downstream nodes can help packets
catch up if they are excessively delayed upstream, whereas
the priorities of the packets that have arrived earlier can
be reduced so that more urgent packets can pass through
quickly.
Schemes for optimising the transmission schedule
of packets using priorities in multihop latency aware
scheduling for delay constrained data are presented in
Liang and Dong (2007). The objective of schemes is to
determine the weights to be assigned to the distance that
the packet has yet to travel and the remaining lifetime
so as to rank the packets according to their urgency.
The transmission schemes presented are cross-layer in
nature and include schedules such as EDF and Largest
Distance First (LDF). Further, an analytical framework
using recursive nonhomogeneous Markovian analysis is
also presented. The aim of the analytical framework is to
study the effect of lifetime-distance factor on packet loss
probability. Therein, it is shown that a proper balance in
the lifetime-distance factor can significantly improve the
performance of the network.
9.2 Rate based scheduling
9 Scheduling
A mechanism for providing QoS in a network is
scheduling. In this section, we discuss the research
An analytical model for tradeoffs between delay bounds
and computational complexity of packet scheduling
algorithms for the provision of QoS in a network is
described in Xu and Lipton (2005). Therein, the authors
Quality of Service in mobile ad hoc networks: a survey
compute the delays incurred in a scheduling algorithm
that employs a service discipline with respect to the delays
incurred in GPS. These delays are called GPS-relative
delays. It is proved that, under a slightly restrictive
model, the lower bound computational complexity of any
scheduling algorithm that guarantees O(1) GPS-relative
delay is Ω(log n), where n is the number of sessions. It
has been found that the lower bound on the complexity
remains the same even if the delay bound is relaxed
to O(nα ), where 0 < α < 1 which implies that the
complexity remains constant during the delay interval
[O(1), O(n)]. Further, the analytical results obtained
for the above complexity are extended for a stronger
computational model called the linear decision tree
model. It has been shown that the same lower bounds on
the complexity, under certain conditions, can be applied
to guarantee tight bounds on end-to-end delays provided
that the delay bounds are obtained using the latency-rate
framework.
An analytical model for end-to-end delay bounds
for traffic aggregates under guaranteed rate scheduling
algorithms is presented in Sun and Shin (2005). In that,
end-to-end delay bounds for a single aggregation are
derived deterministically assuming that all incoming
flows at an aggregator conform to the token-bucket
model. Three types of Guaranteed Rate (GR) scheduling
algorithms are proposed:
•
stand-alone GR
•
two-level hierarchical
•
rate-controlled two-level hierarchical GR; and an
aggregator can use any of these algorithms.
The end-to-end delay bounds for multiple aggregation
fall within an aggregation region when aggregators use
the rate control for two-level hierarchical GR scheduling
algorithm. It is shown that using the proposed guaranteed
scheduling algorithms, there exists a delay bound for each
flow, and under certain conditions the bounds are smaller
than that of per flow scheduling. The analytical delay
bounds are validated through simulations.
A rate control scheme called RCS for adaptive real
time applications in IP networks with lossy links and long
round trip times is proposed in Akyilidz et al. (2007).
In RCS, all routers along a path use a priority discipline;
and special types of low priority packets called dummy
packets are used to probe the availability of network
resources. Moreover, to guard the RCS from temporal
signal losses, an algorithm for improving the robustness
of RCS is proposed. Specifically, the behaviour of RCS
is investigated in the presence of packet losses due to link
errors, network congestion, and temporal signal losses.
Further, delay bounds for realtime traffic sources are also
studied.
9.3 Scheduling with end-to-end delay bounds
Node delay assignment strategies to support end-to-end
delay requirements in heterogeneous networks are
17
proposed in Znati and Melhem (2004).5 In Znati and
Melhem (2004), a methodology to compute a set of
feasible per node delays for a given flow and for a
class of delay based servers is described. Consequently,
the problem of an optimal assignment of per node
delays that takes into account the workload across the
routing path is formalised. The resulting solution is
optimal, however, its implementation overhead is high.
To overcome this shortcoming, authors, therein, propose
two heuristics called Equi-Partition Heuristic (EPH)
and Load-Balancing Heuristic (LBH). EPH uses the
equi-partition concept to compute the initial delay values
and adjusts them to meet the end-to-end delay
requirements. LPH distributes the load proportionally
across all nodes on the routing path using the concept
of relaxation factor. The performance of these heuristics
comes out to be comparable to that of the optimal
scheme.
9.4 Proportional differentiation
Schemes for QoS assurance through class selection
and proportional differentiation in wireless ad hoc
networks are proposed in Wang and Ramanathan
(2005). The proposed schemes are based on a service
model called Neighbourhood Proportional Delay
Differentiation (NPDD) model Wang and Ramanathan
(2003). In NPDD, there are a number of service classes
of packets and these classes are ordered in terms of
per-hop queueing delays at each node. The NPDD model
not only holds for each node, it also holds across nodes
in a certain neighbourhood. In other words, the delay
proportionality is maintained at each node and among
nodes in the same contending set. Two nodes are said to
belong to the same contending set if there exists a route
between them. The NPDD scheduler is work-conserving
and an algorithm known as Waiting Time Priority (WTP)
(Dovrolis et al., 2002) is adopted in which each class
is serviced in a First-in-First-Out (FIFO) queue. The
scheduler always schedules the head-of-line packet with
highest priority of a service class. Scheduling algorithms
(Wang and Ramanathan, 2005) used in NPDD are called
Dynamic Class Selection (DCS) algorithms. Further,
applications of DCS are modelled using a game-theoretic
approach. For noncooperative games with selfish players,
analytical models for the existence of an equilibrium,
the feasibility of an equilibrium, and the guaranteed
convergence to a feasible equilibrium when it exists,
are proposed for both single hop as well as multihop
networks.
9.5 Opportunistic scheduling
An opportunistic scheduling discipline to handle a
combination of realtime and best-effort traffic at a
wireless access point that utilises multiuser diversity
is proposed in Patil and Veciana (2007). The aim
is to support probabilistic QoS in terms of service
rate guarantees to realtime traffic while still achieving
18
A.M. Abbas and Ø. Kure
opportunistic throughput to all traffic classes and users.
The lower bounds on the service that is to be provided
to a realtime session are obtained under the assumption
that variations in the capacities demanded by users are
either known or can be estimated. These bounds may
enable one in predicting the QoS required by the real time
traffic and the same can be incorporated using resource
management and admission control schemes. Further,
authors show that there can be a tradeoff between how
tightly one can satisfy the QoS requirements and the
overall system throughput. In other words, if the QoS
requirements for realtime traffic are very tight, then
realtime traffic will be given a higher priority again
and again. This adversely affects the traffic other than
realtime traffic and thus decreasing the opportunistic
throughput gains.
Future work
In future, one may propose scheduling schemes that are
capable of providing per hop and per packet proportional
differentiation. The type of service to be received may
depend upon the urgency level of the packet and the
service received by the packet upstream. Also, one
should consider whether putting a packet to a higher
differentiation class may lead to catching the deadline at
the final destination or not. Another direction for future
research can be designing a scheduling scheme that is fair
to realtime as well as non-realtime packets.
In what follows, we describe research related to the
fairness in QoS provisioning.
10 Fairness
Note that fairness is not a functionality to be
incorporated for the provision of QoS, however, it is
among the goals or objectives of QoS provisioning that
should not be overlooked. The meaning of fairness may
depend on the context and it should be considered to
be associated with the requirements of the application.
In other words, one has to decide whether the scheme
should be fair to QoS flows or to non-QoS flows or to
all flows. In general, the term ‘fairness’ means that the
network is able to provide the same level of service to
all its users. However, fairness is a key issue in case
of schemes that have a provision of QoS in a wireless
network.
10.1 Wireless fair queueing
A topology-independent wireless fair queueing model
for a shared medium ad hoc network is proposed
in Luo and Lu (2005). The proposed fairness model
ensures coordinated fair channel access among the
contending flows so that spatial reuse of bandwidth
is maximised. Algorithms that realise the fluid fairness
model with analytical bounds are presented. Further,
a distributed implementation that approximates an
ideal centralised algorithm is also presented and the
performance of the proposed algorithm is analysed
through simulations.
10.2 Per-station fairness
A scheme called Fair QoS Agent (FQA) is proposed
in Park and Kim (2007) that provide per class QoS
enhancement and per station fair channel sharing in
Wireless Local Area Networks (WLAN). In FQA, there
are two components that operate above IEEE 802.11
MAC layer so that no change is required in IEEE
802.11 MAC layer. These components are a dual service
differentiator and a service level manager. The function
of dual service differentiator is to improve QoS for
different classes of traffic using appropriate algorithms
for scheduling and queue management. On the other
hand, service level manager is responsible for assuring
fair channel sharing by estimating the fair share of each
station and dynamically adjusting the service levels of
packets. The proposed scheme is simple and it does
not require to maintain per station queues. Further, an
assurance for weighted fairness among stations in terms
of channel access time is provided.
10.3 Fairness framework
As the IEEE 802.11 wireless LANs are widely deployed
for providing realtime service such as voice and
non-realtime service such as data, the provision
of fairness and QoS becomes a challenging task.
A framework for fairness and QoS assurance for current
IEEE 802.11 networks with multiple access points is
presented in Bejerano and Bhatia (2006). The framework
is called MiFi and relies on centralised coordination of
the APs. It is based on the fact that during any given
time of contention free period, APs that do not interfere
with one another are activated and others are silent. The
amount of service time granted to an AP is proportional
to the load on AP and the performance of the system
is optimised employing efficient scheduling algorithms.
Therein, it is pointed out that such a scheme can be
implemented without modifying either the underlying
MAC protocol or the behaviour of mobile stations and
the scheme takes care of the hidden terminal problem and
the overlapping cell problem. The proposed framework
is validated through simulations and it is established that
the system supports fairness. As a result, MiFi is able
to provide QoS guarantees for real time traffic and still
maintains relatively high throughput for non-realtime
traffic.
Future work
In future, one may address how to design a scheme
for QoS provisioning in an ad hoc network such that
it maintains fairness as per the requirements of the
application. Also, one may study the implications of
providing the fairness on realtime and non-realtime flows.
In what flows, we describe the research related to the
miscellaneous types of QoS
Quality of Service in mobile ad hoc networks: a survey
11 Miscellaneous QoS
In this section, we discuss the research reported in the
literature keeping in view of different approaches and
objectives.
11.1 User level QoS
In a network, functionalities of layers may vary
depending upon their boundaries. Consequently, there
can be different levels of the QoS provisioning (Tasaka
and Ishibashi, 2002) such as physical level, node level,
network level, end-to-end level, and user level. The user
level QoS is also called the perceptual QoS or user
perceived QoS. Out of these levels, the user level QoS
is the most important QoS as the users are the ultimate
recipient of the QoS. Therefore, there is a need to measure
and assess the QoS at the user level.
In Ito and Tasaka (2005), a scheme for quantitative
assessment of user level QoS for audio-video
transmissions using psychometric methods is presented.
The psychometric methods used are:
•
the method of paired comparisons
•
the law of comparative judgement.
A mapping of the QoS from application level to user
level is carried out using principal component analysis
and multiple regression analysis. During the assessment
of QoS, the transmission of an audio-video scheme over a
loaded network is simulated. The concept of control gain
through media synchronisation is proposed to reduce the
load on the network.
A scheme for user input driven QoS management
in ad hoc networks is proposed in Wang et al. (2009).
The motivation behind it is that the network QoS
is generally defined in terms of technical parameters
such as delay, jitter, and bandwidth. An end-user may
often find it difficult to express his desired QoS in
such technical parameters. Therefore, there is a need to
translate user inputs to technical parameters. An interface
design that uses translation functions to map user inputs
to parameters at routing and MAC layers is proposed.
Based on the translated parameters, the strategies are
chosen at specific layers so that the QoS desired by
the user is achieved. Further, the costs associated with
adoption of different strategies at different layer is also
examined in Wang et al. (2009).
11.2 Aggregate QoS
QoS can be provided to flows individually or to number
of flows taken together. The first type of QoS is called
the individual QoS or fine grain QoS or per flow QoS
and the later type of QoS is called as the aggregate
QoS or coarse grained QoS or scalable QoS. It is worth
mentioning that the pace of implementing the QoS
solutions in operational networks is slow due to many
reasons. One of the reasons is that the complexities
19
involved in methodologies for the provision of individual
QoS are relatively high. Therefore, there is a need to
explore methodologies for the provision of QoS that are
scalable or provide the QoS on an aggregate basis.
A loss performance study of individual QoS vs.
aggregate QoS is carried out in Xu and Guerin (2005).
Specifically, authors therein explore the differences
between the individual QoS and aggregate QoS in terms
of loss guarantees where guarantees are provided only
at the aggregate level. Analytical models to compute
both individual and aggregate loss guarantees for
ON-OFF and periodic sources are proposed. Further,
loss deviations for ON-OFF sources and periodic sources
are also analysed.
11.3 Integrated QoS
A support for integrating QoS with traffic engineering
and failure recovery is needed in a network that runs
the Transmission Control Protocol (TCP). Note that
TCP uses window based congestion control. In general,
the congestion control mechanism of TCP is called
Additive Increase Multiple Decrease (AIMD). If the
TCP anticipates congestion, the size of the window is
decreased.
Optimal algorithms for end-to-end integrated QoS,
traffic engineering, and failure recovery are proposed
in Movsichoff et al. (2007). Therein, laws for adapting
the data rate and laws of load balancing that can be
applied to networks with multiple paths between source
and destination and where multiple classes of traffic are
to be supported. The algorithms proposed need a minimal
amount of information for optimal control in the form of
whether a path is congested or not. The laws of control
proposed in the paper enable one to detect source inferred
congestion in the network. The proposed approach can
be used in networks with node or link failures in the
sense that when a link or node failure occurs the traffic
is rerouted away from the failed node or link. The work
presented can set a foundation for protocol that control
the traffic at different layers such as IP, transport or
higher layers.
Apart from that techniques for integration of
multihop wireless and wired networks with QoS
constraints are presented in Bejerano (2004). Specifically,
authors therein studied the problem of integrating
static multihop networks with a wired backbone in
such a manner so that QoS guarantees in terms of
bandwidth and delay are not violated. For that purpose,
the topology of the network is partitioned into a
minimal number of disjoint clusters that satisfy the QoS
constraints. The problem is formulated as an instance
of the Capacitated Facility Location Problem (CFLP)
with QoS constraints. A polynomial time approximation
algorithm is proposed that provides a solution with a
constant factor of the optimal one. Further, an adaptive
delivery mechanism is introduced that maximises the
throughput of each cluster without violating the QoS
constraints.
20
A.M. Abbas and Ø. Kure
11.4 Self-adaptive QoS
It is presumed that the Next Generation Networks (NGN)
should be self-adaptive so that demands for changes in
traffic are satisfied. An example of such a network is
a Cognitive Packet Network (CPN). In CPN, paths are
selected adaptively in order to offer a best-effort QoS
to end users based on user defined QoS. This is done
by incorporating some kind of smartness or intelligence
inside the network. On the other hand an NGN should
also have a provision of guaranteed QoS. Thus, an
NGN should be able to support multiple QoS services.
In Sabella and Iovanna (2006), some key issues pertaining
to the provision of QoS and how one should react
to traffic changes in NGNs are presented. Therein, a
traffic engineering solution for supporting multiple QoS
services in an NGN through either Multi-Protocol Label
Switching (MPLS) or Generalised Multi-Protocol Label
Switching (GMPLS) is explored.
11.5 Capacity and QoS
A network where paths from a source to destination
fail frequently is called as an intermittently connected
network. Examples of such a network are an ad hoc
network or a sensor network. An analytical model for
QoS and capacity of intermittently connected networks
is proposed in Small and Haas (2007). In Small and
Haas (2007), a model that quantifies the resourcesdelay tradeoff and the capacity with QoS constraints
is presented. An intermittently connected network
is represented using a shared wireless infostation
model. The model is aimed to help network designers
in controlling the performance by adjusting the
communication bandwidth, fraction of time a node
spends in sleep mode, and the reliability in terms of
packet delivery.
11.6 QoS and multi-user diversity
The capacity of a time varying channel can be increased
with the use of diversity. The term ‘diversity’ means that
there are multiple signal paths between a transmitter
and a receiver. Diversity can be achieved in time, space,
and frequency; and traditional diversity methods are
applicable to a link with a single user. However, another
kind of diversity called multiuser diversity is introduced
in Knopp and Humblet (1995). It means that multiple
users share a time-varying channel and each of these users
has an independent channel gains for the shared medium.
In Wu and Negi (2005), the problem of supporting
QoS over a fading channel is considered that utilises
multiuser diversity. A downlink time slotted fading
channel is shared among a number of users, say K.
A statistical QoS that is characterised by <data rate,
delay bound, delay bound violation probability> is
provided explicitly. It is shown that when delay bounds
are not very tight, the approach can substantially increase
the delay-constrained capacity of the fading channel as
compared to a fixed slot assignment scheme. The delayconstrained capacity of a fading channel means the
maximum data rate that can be achieved when a given
probability of violation of delay bound is satisfied.
11.7 Adaptive QoS for multimedia applications
A mechanism for end-to-end delay control of multimedia
applications over multihop wireless links is proposed
in He et al. (2008). The motivation behind the
mechanism is that in case of multimedia applications, the
mechanism should adapt the client’s QoS requirements to
network resource constraints. The proposed mechanism
has separate adaptation components that operate at
application layer, middleware layer, and network layer.
At the application layer, there is a requirement
adapter that dynamically changes the requirement
levels according to end-to-end delay measurement and
QoS requirements that are acceptable to the enduser. At the middleware layer, there is a priority
adapter that dynamically adjusts the service classes
based on the feedback. At the network layer, there
is a service differentiation scheduler that assigns
different network resources to different service classes.
These three components coordinate to assign resources
to multimedia applications. The impact of adaptation
scheme is evaluated on a real ad hoc network testbed
and it is observed that the proposed mechanism
successfully adjusts multimedia applications to meet
delay requirements.
In what follows, we conclude the paper.
12 Conclusion
The provision of QoS in an ad hoc network is a
challenging task and the challenge comes due to inherent
characteristics of such a network. In this paper, we
presented an overview of the research related to the
provision of QoS in mobile ad hoc networks. The
contributions of the paper are as follows.
•
We pointed out issues and challenges in providing
the QoS in a mobile ad hoc network. Some of these
challenges are due to the typical nature of the
problem and others are due to inherent
characteristics and limitations associated with an
ad hoc network.
•
We discussed two classifications of the
methodologies used to provide QoS in mobile ad
hoc networks. The first classification called layered
classification is based on the layer of the protocol
stack to which the corresponding methodology
belongs. The second classification called functional
classification is based on the functionality provided
by the corresponding methodology.
Quality of Service in mobile ad hoc networks: a survey
•
We discussed various methodologies reported in the
literature that provide QoS in one form or the
other. We pointed out salient features of each
methodology and compared methodologies that
address somewhat similar issues.
•
After describing the methodologies proposed in the
literature, we pointed out issues that may be
addressed in future for almost all major
functionalities that are necessary for the provision
of QoS in an ad hoc network.
We believe that the survey presented in this paper would
be of some use to academia and professionals so as
to help them in selecting a strategy that is closer to
the requirements of their applications. It may also help
researchers to think directions that are either untouched
or not much work is carried out to address some of the
issues involved in providing QoS in a mobile ad hoc
network.
Acknowledgement
This work was carried out during the tenure of an
ERCIM ‘Alain Bensoussan’ Fellowship Programme.
References
Abdrabu, A. and Zhuang, W. (2006) ‘A position based QoS
routing scheme for UWB mobile ad hoc networks’, IEEE
Journal on Selected Areas in Communications, Vol. 24,
No. 4, April, pp.850–856.
Ahn, G.S., Campbell, A.T., Veres, A. and Sun, L.H. (2002)
‘Supporting service differentiation for real-time and
best-effort traffic in stateless wireless ad hoc networks’,
IEEE Transactions on Mobile Computing, September,
Vol. 1, No. 3, pp.192–207.
Akyildiz, I.F., Akan, O.B. and Morabito, G. (2007) ‘A rate
control scheme for adaptive real-time applications in IP
networks with lossy links and long round trip times’,
IEEE/ACM Transactions on Networking, Vol. 13, No. 3,
June, pp.554–567.
Bashandy, A.R., Chong, E.K.P. and Ghafoor, A. (2005)
‘Generalized quality-of-service routing with resource
allocation’, IEEE Journal on Selected Areas in
Communications, Vol. 23, No. 2, February, pp.450–463.
Bejerano, Y. (2004) ‘Efficient integration of multihop wireless
and wired networks with QoS constraints’, IEEE/ACM
Transactions on Networking, Vol. 12, No. 6, December,
pp.1064–1078.
Bejerano, Y. and Bhatia, R.S. (2006) ‘A framework for fairness
and QoS assurance for current IEEE 802.11 networks
with multiple access points’, IEEE/ACM Transactions on
Networking, Vol. 14, No. 4, August, pp.849–862.
Bianchi, G. (2000) ‘Performance analysis of the IEEE 802.11
distributed coordination function (DCF)’, IEEE Journal
on Selected Areas in Communications, Vol. 18, No. 3,
March, pp.535–547.
21
Chakeres, I.D., Royer, E.M.B. and Macker, J.P. (2007)
‘Perceptive admission control for wireless network quality
of service’, Elsevier Journal on Ad Hoc Networks, Vol. 5,
pp.1129–1148.
Chao, H.J. and Guo, X. (2002) Quality of Service Control
in Hgh Speed Networks, John Wiley and Sons, Inc.,
New York.
Chen, S. and Nahrstedt, L. (1999) ‘Distributed quality of
service routing ad hoc networks’, IEEE Journal on
Selected Areas in Communications, Vol. 17, No. 8, August,
pp.1488–1505.
Chen, L. and Heinzelman, W.B. (2005) ‘QoS aware
routing based on bandwidth estimation for mobile ad
hoc networks’, IEEE Journal on Selected Areas in
Communications, Vol. 23, No. 3, March, pp.561–572.
Chowdhury, K.R., Nandiraju, N., Chanda, P., Agrawal, D.P.
and Zeng, Q.A. (2009) ‘Channel allocation and medium
access control for wireless sensor networks’, Elsevier
Journal on Ad hoc Networks, Vol. 7, No. 2, March,
pp.307–321.
Dovrolis, C., Stiliadis, D. and Ramanathan, P. (2002)
‘Proportional differentiation services: delay differentiation
and packet scheduling’, IEEE/ACM Transactions on
Networking, Vol. 10, No. 1, February, pp.12–26.
Guimaraes, R., Cerda, L., Barcelo, J.M., Garcia, J.,
Voorhaen, M. and Blondia, C. (2009) ‘Quality of service
through bandwidth reservation on multirate ad hoc
wireless networks’, Elsevier Journal on Ad Hoc Networks,
Vol. 7, No. 2, March, pp.388–400.
Gupta, R., Jia, Z., Tung, T. and Walrand, J. (2005)
‘Interference-aware QoS routing (IQRouting) for ad
hoc networks’, Proc. IEEE Global Telecommunications
Conference (Globecom), IEEE Press, St. Louis, Missouri,
pp.2599–2604.
Gupta, R., Musacchio, J. and Walrand, J. (2007) ‘Sufficient
rate constraints for QoS flows in ad hoc networks’,
Elsevier Journal on Ad Hoc Networks, Vol. 5, No. 4, May,
pp.429–443.
Hanzo, L. and Tafazolli, R. (2007) ‘A survey of QoS
routing solutions for mobile ad hoc networks’, IEEE
Communications Surveys, Vol. 9, No. 2, pp.50–70.
He, W., Nahrstedt, K. and Liu, X. (2008) ‘End-to-end delay
control of multimedia applications over multihop wireless
links’, ACM Transactions on Multimedia Computing,
Communications and Applications, Vol. 5, No. 2,
November, Article 16, pp.1–20.
Hui, J. and Devetsikiotis, M. (2005) ‘A unified model
for the performance analysis of IEEE 802.11e EDCA’,
IEEE Transactions on Communications, Vol. 53, No. 9,
September, pp.1498–1510.
Hwang, I.S. and Wu, J.H. (2008) ‘Performance assessment of
service differentiation in IEEE 802.11e wireless LANs’,
InderScience International Journal of Ad hoc and
Ubiquitous Computing (IJAHUC), Vol. 3, No. 1, pp.21–32.
Ito, Y. and Tasaka, S. (2005) ‘Quantitative assessment of
user-level QoS and its mapping’, IEEE Transactions on
Multimedia, Vol. 7, No. 3, June, pp.572–584.
Ivascu, G.I., Pierre, S. and Quintero, A. (2009) ‘QoS routing
with traffic distribution in mobile ad hoc networks’,
Elsevier Journal on Computer Communications, Vol. 32,
No. 2, February, pp.305–316.
22
A.M. Abbas and Ø. Kure
Jawhar, I. and Wu, J. (2005) ‘QoS support in TDMA-based
mobile ad hoc networks’, Journal of Computer Science
and Technology, Vol. 20, No. 6, November, pp.797–810.
Jia, Y., Nikolaidis, I. and Gburzynski, P. (2004) ‘On the
effectiveness of alternate paths in QoS routing’, John Wiley
International Journal on Communication Systems, Vol. 17,
pp.1–26.
Jia, Z., Gupta, R., Walrand, J. and Varaiya, P. (2005)
‘Bandwidth guaranteed routing for ad hoc networks
with interference considerations’, Proc. Eleventh IEEE
Symposium on Computers and Communications, IEEE CS
Press, Cartagena, Spain, pp.3–9.
Kanodia, V., Li, C., Sabharwal, A., Sadeghi, B. and Nightly, E.
(2002) ‘Distributed priority scheduling and medium access
in ad hoc networks’, ACM Wireless Networks, Vol. 8,
No. 5, September, pp.455–466.
Knopp, R. and Humblet, P.A. (1995) ‘Information
capacity and power control in single-cell multiuser
communications’, Proc. IEEE International Conference
on Communications (ICC), IEEE Press, Seattle,
pp.331–335.
Kuipers, F.A. and Mieghem, P.F.A.V. (2005) ‘Conditions
that impact the complexity of QoS routing’, IEEE/ACM
Transactions on Networking, Vol. 13, No. 4, August,
pp.717–730.
Kumar, S., Raghavan, V.S. and Deng, J. (2006) ‘Medium access
control protocols for ad hoc wireless networks: a survey’,
Elsevier Journal on Ad Hoc Networks, Vol. 4, pp.326–358.
Kumar, A., Altman, E., Miorandi, D. and Goyal, M. (2007)
‘New insights from a fixed-point analysis of single cell
IEEE 802.11 WLANS’, IEEE/ACM Transactions on
Networking, Vol. 15, No. 3, June, pp.588–601.
Kurose, J.F. and Ross, K.W. (2006) Computer Networking:
A Top Down Approach Featuring the Internet, 3rd ed.,
Pearson Education, New Delhi.
Lee, S.B., Ahn, G.S., Zhang, X. and Campbell, A.T. (2000)
‘INSIGNIA: an IP-based quality of service framework
for mobile ad hoc networks’, Journal of Parallel and
Distributed Computing: Special Issue on Wireless and Ad
hoc Networks, Vol. 60, No. 4, April, pp.374–406.
Li, K. and Wang, X. (2006) ‘Cross-layer optimization
for LDPC-coded multirate multiuser systems with QoS
constraints’, IEEE Transactions on Signal Processing,
Vol. 54, No. 7, July, pp.2567–2578.
Liang, B. and Dong, M. (2007) ‘Packet prioritization in
multihop latency aware scheduling for delay constrained
communication’, IEEE Journal on Selected Areas in
Communications, Vol. 25, No. 4, May, pp.819–830.
Liao, W.H., Tseng, Y.C. and Shih, K.P. (2002)
‘A TDMA-based bandwidth reservation protocol for QoS
routing in a mobile ad hoc network’, IEEE International
Conference on Communications (ICC), IEEE Press,
New York, Vol. 5, pp.3186–3190.
Lin, C.R. and Liu, J.S. (1999) ‘QoS routing in ad hoc
wireless networks’, IEEE Journal on Selected Areas in
Communications, Vol. 17, No. 8, August, pp.1426–1438.
Liu, H., Jia, X., Li, D. and Lee, C.H. (2005) ‘Bandwidth
guaranteed call admission in TDMA/CDMA ad hoc
wireless networks’, Elsevier Journal on Ad Hoc Networks,
Vol. 3, pp.689–701.
Liu, Q., Wang, X. and Giannakis, G.B. (2006) ‘A cross-layer
scheduling algorithm with QoS support in wireless
networks’, IEEE Transactions on Vehicular Technology,
Vol. 55, No. 3, May, pp.839–847.
Luo, H. and Lu, S. (2005) ‘A topology-independent wireless
fair queueing model in ad hoc networks’, IEEE Journal on
Selected Areas in Communications, Vol. 23, No. 3, March,
pp.585–597.
Meshkati, F., Goldsmith, A.J., Poor, H.V. and Schwartz,
S.C. (2007) ‘A game-theoretic approach to energyefficient modulation in CDMA networks with delay
QoS constraints’, IEEE Journal on Selected Areas in
Communications, Vol. 25, No. 6, August, pp.1069–1078.
Mieghem, P.F.A.V., Neve, H.D. and Kuipers, F.A. (2001)
‘Hop-by-hop quality of service routing’, Elsevier Journal
on Computer Networks, Vol. 37, Nos. 3–4, pp.407–423.
Mieghem, P.F.A.V. and Kuipers, F.A. (2004) ‘Concepts of
exact QoS routing algorithms’, IEEE/ACM Transactions
on Networking, Vol. 12, No. 5, October, pp.851–864.
Movsichoff, B.A., Lagoa, C.M. and Che, H. (2007) ‘End-to-end
optimal algorithms for integrated QoS, traffic engineering,
and failure recovery’, IEEE/ACM Transactions on
Networking, Vol. 15, No. 4, August, pp.813–823.
O’Farrell, T. and Omiyi, P. (2005) ‘Low-complexity medium
access control protocols for QoS support in thirdgeneration radio access networks’, IEEE Transactions
on Wireless Communications, Vol. 4, No. 2, March,
pp.743–756.
Park, E.C. and Kim, D.Y. (2007) ‘Improving quality of service
and assuring fairness in WLAN access networks’, IEEE
Transactions on Mobile Computing, Vol. 6, No. 4, April,
pp.337–350.
Paschos, G.S., Politis, I.D. and Kotsopoulos, S.A. (2005)
‘A quality of service negotiation-based admission control
scheme for WCDMA mobile wireless multiclass services’,
IEEE Transactions on Vehicular Technology, Vol. 54,
No. 5, September, pp.1875–1886.
Patil, S. and Veciana, G. (2007) ‘Managing resources and
quality of service in heterogeneous wireless systems
exploiting opportunism’, IEEE/ACM Transactions on
Networking, Vol. 15, No. 5, October, pp.1046–1058.
Perkins, D.D. and Hughes, H.D. (2002) ‘A survey on quality
of service support for mobile ad hoc networks’, Kluwer
Academic Publishers Journal on Wireless Communications
and Mobile Computing, Vol. 2, No. 5, September,
pp.503–513.
Reddy, T.B., Karthigeyan, I., Manoj, B.S. and Murthy, C.S.R.
(2006) ‘Quality of service provisioning in ad hoc wireless
networks: a survey of issues and solutions’, Elsevier
Journal on Ad hoc Networks, Vol. 4, No. 1, January,
pp.83–124.
Reddy, T.B., John, J.P. and Murthy, C.S.R. (2007) ‘Providing
MAC QoS for multimedia traffic in 802.11e based
multihop ad hoc wireless networks’, Elsevier Journal on
Computer Networks, Vol. 51, pp.153–176.
Sabella, R. and Iovanna, P. (2006) ‘Self-adaptation in
next-generation internet networks: how to react to traffic
changes while respecting QoS?’, IEEE Transactions on
Systems, Man, and Cybernetics–Part B: Cybernetics,
Vol. 36, No. 6, pp.1218–1229.
Quality of Service in mobile ad hoc networks: a survey
Sarr, C., Chaudet, C., Chelius, G. and Lassous, I.G. (2008)
‘Bandwidth estimation for IEEE 802.11-based ad hoc
networks’, IEEE Transactions on Mobile Computing,
Vol. 7, No. 10, October, pp.1228–1241.
Shih, K.P., Chang, C.Y., Chen, Y.D. and Chuang, T.H.
(2006) ‘Dynamic bandwidth allocation for QoS routing on
TDMA-based mobile ad hoc networks’, Elsevier Journal
on Computer Communications, Vol. 29, pp.1316–1329.
Singh, S., Acharya, P.A.K., Madhow, U. and Royer, E.M.B.
(2007) ‘Sticky CSMA/CA: implicit synchronization and
real-time QoS in mesh networks’, Elsevier Journal on
Ad Hoc Networks, Vol. 5, No. 6, August, pp.744–768.
Sivakumar, R., Sinha, P. and Bharghavan, V. (1999) ‘CEDAR:
A core-extraction distributed ad hoc routing algorithm’,
IEEE Journal on Selected Areas in Communications,
Vol. 17, No. 8, August, pp.1454–1465.
Small, T. and Haas, Z.J. (2007) ‘Quality of service and capacity
in constrained intermittent-connectivity networks’, IEEE
Transactions on Mobile Computing, Vol. 6, No. 7, July,
pp.803–814.
Sobrinho, J. and Krishnakumar, A.S. (1999) ‘Quality of service
in ad hoc carrier sense multiple access wireless networks’,
IEEE Journal on Selected Areas in Communications,
Vol. 17, No. 8, August, pp.1353–1368.
Sun, W. and Shin, K.G. (2005) ‘End-to-end delay bounds
for traffic aggregates under guaranteed-rate scheduling
algorithms’, IEEE/ACM Transactions on Networking,
Vol. 13, No. 5, October, pp.1188–1201.
Sun, W., Yamaguchi, H., Yukimasa, K. and Kusumoto, S.
(2006) ‘GVGrid: a QoS routing protocol for vehicular
ad hoc networks’, Proc. Fourteenth IEEE International
Workshop on Quality of Service (IWQoS), IEEE Press,
New Haven, Connecticut, pp.130–139.
Tang, J. and Zhang, X. (2007) ‘Cross-layer resource allocation
over wireless relay networks for quality of service
provisioning’, IEEE Journal on Selected Areas in
Communications, Vol. 25, No. 4, May, pp.645–656.
Tasaka, S. and Ishibashi, Y. (2002) ‘Mutually compensatory
property of multimedia QoS’, Proc. IEEE International
Conference on Communications (ICC), IEEE Press,
Anchorage, Alaska, pp.1105–1111.
Tay, Y.C. and Chua, K.C. (2001) ‘A capacity analysis for
the IEEE 802.11 MAC protocol’, Springer Journal on
Wireless Networks, Vol. 7, No. 2, July, pp.159–171.
Tsigkas, O. and Pavlidou, F.N. (2006) ‘A dynamic priority
MAC protocol for time-bounded services in wireless
networks’, International Journal of Wireless Personal
Communications, Vol. 38, No. 3, pp.301–324.
Tsigkas, O. and Pavlidou, F.N. (2008) ‘An adaptive medium
access control protocol using m-ary tree algorithms for
quality of service support in single cell ad hoc networks,
Elsevier Journal on Ad Hoc Networks, Vol. 6, No. 2, April,
pp.245–259.
Wang, Z. and Crowcroft, J. (1996) ‘Quality of service routing
for supporting multimedia applications’, IEEE Journal
of Selected Areas in Communications, Vol. 14, No. 7,
pp.1228–1234.
Wang, K.C. and Ramanathan, P. (2003) ‘End-to-end delay
assurances in multihop wireless local area networks’,
Proc. IEEE Conference on Global Telecommunications
(GLOBECOM), San Francisco, California, pp.2962–2966.
23
Wang, K.C. and Ramanathan, P. (2005) ‘QoS assurances
through class selection and proportional differentiation in
wireless networks’, IEEE Journal on Selected Areas in
Communications, Vol. 23, No. 3, March, pp.573–584.
Wang, P., Jiang, H. and Zhuang, W. (2008) ‘A new MAC
scheme supporting voice/data traffic in wireless ad hoc
networks’, IEEE Transactions on Mobile Computing,
Vol. 7, No. 12, December, pp.1491–1503.
Wang, W., Chatterjee, M. and Kwiat, K. (2009) ‘User input
driven QoS management in ad hoc networks’, Elsevier
Journal on Computer Communications, Vol. 32, No. 11,
July, pp.1306–1315.
Wu, D. and Negi, R. (2005) ‘Utilizing multiuser diversity
for efficient support of quality of service over a fading
channel’, IEEE Transactions on Vehicular Technology,
Vol. 54, No. 3, May, pp.1198–1206.
Wu, H. and Jia, X. (2007) ‘QoS multicast routing by using
multiple paths/trees in wireless ad hoc networks’, Elsevier
Journal on Ad hoc Networks, Vol. 5, No. 5, July,
pp.600–612.
Xiao, H., Seah, K.G., Lo, A. and Chua, K.C. (2000) ‘A flexible
quality of service model for mobile ad hoc networks’, Proc.
Fifty First IEEE Vehicular Technology Conference IEEE
Press, Tokyo, Vol. 1, pp.445–449.
Xiao, Y. and Li, H. (2004) ‘Local data control and admission
control for QoS support in wireless ad hoc networks’,
IEEE Transactions on Wireless Communications, Vol. 53,
No. 5, September, pp.1558–1568.
Xiao, Y. (2005) ‘Performance analysis of priority schemes for
IEEE 802.11 and IEEE 802.11e wireless LANs’, IEEE
Transactions on Wireless Communications, Vol. 4, No. 4,
July, pp.1506–1515.
Xu, Y. and Guerin, R. (2005) ‘Individual QoS versus aggregate
QoS: a loss performance study’, IEEE/ACM Transactions
on Networking, Vol. 13, No. 2, April, pp.370–383.
Xu, J. and Lipton, R.J. (2005) ‘On fundamental tradeoffs
between delay bounds and computational complexity in
packet scheduling algorithms’, IEEE/ACM Transactions
on Networking, Vol. 13, No. 1, February, pp.15–28.
Xue, G., Sen, A., Zhang, W., Tang, J. and Thulasiraman,
K. (2007) ‘Finding a path subject to many additive QoS
constraints’, IEEE/ACM Transactions on Networking,
Vol. 15, No. 1, February, pp.201–211.
Yang, Y. and Kravets, R. (2005) ‘Contention-aware admission
control for ad hoc networks’, IEEE Transactions on
Mobile Computing, Vol. 4, No. 4, August, pp.850–856.
Yang, Y. and Kravets, R. (2007) ‘Throughput guarantees for
multipriority traffic in ad hoc networks’, Elsevier Journal
on Ad Hoc Networks, Vol. 5, pp.228–253.
Zhai, H., Chen, X. and Fang, Y. (2005) ‘How well can the
IEEE 802.11 wireless LAN support quality of service?’,
IEEE Transactions on Wireless Communications, Vol. 4,
No. 6, November, pp.3084–3094.
Zhang, B. and Mouftah, H.T. (2005) ‘QoS routing for wireless
ad hoc networks: problems, algorithms, and protocols’,
IEEE Communications Magazine, October, pp.110–117.
Zhao, Q. and Tsang, D.H.K. (2006) ‘An equal-spacing-based
design for QoS guarantee in IEEE 802.11e HCCA wireless
networks’, IEEE Transactions on Mobile Computing,
Vol. 7, No. 12, December, pp.1491–1503.
24
A.M. Abbas and Ø. Kure
Zhu, C. and Corson, M.S. (2002) ‘QoS routing for mobile
ad hoc networks’, Proc. Twenty First Annual Joint
Conference of IEEE Computer and Communication
Societies (INFOCOM), IEEE CS Press, New York, Vol. 2,
pp.958–967.
Znati, T.F. and Melhem, R. (2004) ‘Node delay assignment
strategies to support end-to-end delay requirements in
heterogeneous networks’, IEEE/ACM Transactions on
Networking, Vol. 12, No. 5, October, pp.879–892.
Notes
1
Note that a constraint that is multiplicative can be converted
to an additive constraint by using logarithms.
2
In this paper, some of the papers that describe the provision
of QoS in case of networks with a centralised infrastructure
have also been considered with the view that those works can
serve as the foundations or basics for the issues and challenges
that are to be faced in providing QoS in case of an ad hoc
network too. The issues and challenges to be tackled in case
of an ad hoc network are more stringent as compared to other
types of networks whether wired or wireless.
3
The literal meaning of the word ‘insignia’ is “a badge or
distinguishing mark”. However, INSIGNIA here stands for
in-band signalling.
4
Although, CMAC is proposed for sensor networks, we believe
that it can also be used in ad hoc networks in situations when
either the nodes do not move or the mobility of nodes is very
low.
5
Though the strategies presented in Znati and Melhem (2004)
are for the internet, we believe that similar kinds of problems
can also be faced while scheduling packets at a node in an ad
hoc network.