Académique Documents
Professionnel Documents
Culture Documents
fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/TWC.2014.2329568, IEEE Transactions on Wireless Communications
IEEE TRANSACTIONS ON WIRELESS COMMUNICATION, 1
Abstract—Recent empirical studies have shown clear evidence links are independent when they estimate the transmission cost
that wireless links are not independent and that the packet from a upstream node to the next-hop candidate forwarder set.
receptions on adjacent wireless links are correlated. This finding Recent studies [8]–[10], however, provide clear evidence
contradicts the widely held link-independence assumption in the
calculation of the core metric, i.e., the expected number of that wireless links are not independent because of cross-
transmissions to the candidate forwarder set, in Opportunistic technology interference and correlated shadowing. Cross-
Routing (OR). The inappropriate assumption may cause serious technology interference, which is caused by the external signal
estimation errors in the forwarder set selection, which further in the unlicensed shared spectrum, can lead to correlated pack-
leads to underutilized diversity benefits or extra scheduling et losses since the high-power interferer’s signal may corrupt
costs. We thus advocate that opportunistic routing should be
made aware of link correlation. In this paper, we propose a nearby low-power links simultaneously. On the other hand,
novel link-correlation-aware opportunistic routing scheme, which correlated shadowing, a channel propagation phenomenon that
significantly improves the performance by exploiting the diverse nearby links are affected by the same shadower, may also
low correlated forwarding links. We evaluate the design in a introduce correlated packet losses to wireless networks.
real-world setting with 24 MICAz nodes. Testbed evaluation and The finding of the link correlation phenomenon has sig-
extensive simulation show that (i) higher link correlation leads to
fewer diversity benefits, and (ii) with our link-correlation-aware nificant impacts on network protocols that utilize concurrent
design, the number of transmissions is reduced by 38%. wireless links, which include but are not limited to (i) tradition-
al network protocols such as broadcast [11], multi-cast [12],
Index Terms—Opportunistic routing, Link correlation, Wire-
less networks, Protocol design. and multi-path routing [13], or (ii) diversity-based protocols
such as opportunistic routing [1]–[3], network coding [14],
and hybrid routing [15]. Ignoring this phenomenon may cause
I. I NTRODUCTION
serious estimation errors in modeling, which further leads to
PPORTUNISTIC Routing (OR), originally proposed by
O S. Biswas et al. in [1], has great potential to improve
the network performance. The basic idea of OR is fairly s-
underutilized benefits or extra costs.
For example, when the packet loss patterns of the candidate
forwarders are highly positive correlated (which means that
traightforward. Given a source and a destination in a multi-hop they lose the same packets), the performance of OR is the
wireless network, instead of preselecting a single specific node same as the traditional shortest path protocol (which uses the
to be the next-hop forwarder, a set of candidate forwarders node with the best link among the candidates), since there are
are selected to deliver the packets. Taking advantage of the no diversity benefits to exploit from the candidate forwarder
reception diversity in the candidate forwarder set, OR defers set. In this example, ignoring link correlation brings OR no
the selection of the next hop for a packet until it acquires benefits but extra candidate set schedule costs.
knowledge about the set of candidate forwarders that have Little research has been conducted to exploit link correlation
received that packet. to improve the performance of network protocols [8], [10].
Since the strength of OR comes from the packet reception In this paper, we introduce link correlation to improve OR’s
diversity of the candidate forwarder set, the candidate selection performance by optimizing the forwarder set selection and
becomes one of the key issues in OR. The selection of avoiding duplicate forwarding. Under link correlation, the
different candidates has a high effect on the performance forwarder set selection algorithm prioritizes low correlated
of OR. Extensive candidate selection algorithms based on nodes to increase the level of diversity while ensuring that
the key metric, the expected number of transmissions, have neighboring nodes are close enough to each other such that the
been proposed in the literature [1]–[7]. In these studies, the forwarded packets would be heard and duplicates are avoided.
researchers explicitly or implicitly assume that the wireless In summary, our contributions are as follows:
S. Wang, S. M. Kim and Tian He are with the Department of Computer • We reveal the impact of link correlation upon OR. A
Science and Engineering, University of Minnesota, Minneapolis, MN, USA. novel link correlation aware metric is proposed to capture the
E-mail: {shuaiw, ksong, tianhe}@cs.umn.edu. expected number of any-path transmissions.
A. Basalamah is with the Department of Computer Engineering, Umm Al
Qura University, Makkah, Saudi Arabia. E-mail: ambasalamah@uqu.edu.sa. • With the link correlation aware metric, we propose a new
S. Guo is with Arista Networks, San Francisco, CA, USA. E-mail: candidate forwarder selection algorithm to help OR fully
sguo@cs.umn.edu. exploit the diversity benefit of the wireless broadcast medium.
Y. Tobe is with the Department of Information Systems and Media Design,
Tokyo Denki University, Tokyo, Japan. E-mail: yoshito tobe@osoite.jp • We evaluate our work extensively with testbed implemen-
tations and simulations. The experiment results identify the
1536-1276 (c) 2013 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/TWC.2014.2329568, IEEE Transactions on Wireless Communications
IEEE TRANSACTIONS ON WIRELESS COMMUNICATION, 2
1 1
2 2
Node ID
Node ID
3 3
4 4
5 5
10 20 30 40 50 60 70 80 90 100 10 20 30 40 50 60 70 80 90 100
Packet ID Packet ID
(a) Real trace with correlated links (b) Synthesized traces with independent links
Fig. 1. A comparison between the link correlation and the link independent packet reception pattern where the black band indicates a packet loss: (a) the
real trace from a 802.15.4 testbed, and (b) the synthesized independent trace. Compare these two traces, we find that they are quite different. There are many
long black bands in the real trace, which indicates that a packet is lost at multiple receivers and packet receptions are correlated.
limitation of the traditional OR under the appearance of link realistic since a large number of candidates may introduce
correlation. With our link correlation aware design, the number large schedule overheads and duplicate transmissions.
of transmissions of OR is significantly reduced. Our work is different from the previous OR schemes which
The remainder of the paper is structured as follows. Sec- implicitly or explicitly assume that packet receptions cross
tion II reviews the related work. Section III presents the multiple receivers are independent when they exploit the diver-
motivation. Section IV introduces the metric, followed by sity benefit of the wireless broadcast medium. We propose a
its implementation in Section V. Experiment results from link correlation aware OR scheme to fully exploit the potential
the testbed and simulation are shown in Sections VI and diversity benefit.
Sections VII. Finally, Section VIII concludes the paper. • Link Correlation: Until recently, wireless links were al-
ways considered to be independent. Recent studies [8], [9],
II. R ELATED W ORK however, have proven the existence of link correlation. In [9],
We begin with a brief survey of prior work on opportunistic the authors derive the κ factor that is used to measure the
routing and link correlation. correlation among links. They show how the κ factor could
• Opportunistic Routing: The majority of previous studies in affect diversity based protocols such as OR. The authors
OR are devoted to candidate selection [1], [4]–[7], reception of [10] use models to generate link correlations based on
acknowledgement [16], forwarder coordination [17], [18], and distance where negative correlations are not accounted for.
rate control [19]. In this work we focus on the fundamental They follow a similar approach that developed in the mobile
issue – the candidate selection in OR. ExOR [1], the primary communication literature [21], [22], which is solely based
OR protocol, uses the single path ETX to select candidates, on correlated shadowing. The authors propose a link probing
where ETX is the average number of transmissions required protocol to help collect link correlations, but the protocol does
to send a packet through a link. The ETX value of a single not show how links are selected.
path is the sum of the ETX for each link in that path. Using While both [9], [10] briefly mention link correlation in
the single path ETX as a metric for candidate selection is the OR setting, we complement their work by providing (i)
an approximation since it cannot capture the opportunistic detailed analyses of the impact of link correlation on OR, (ii) a
paths. To account for the multiple paths that could be used correlation aware candidate selection algorithm, (iii) a detailed
by the candidates, expected any-path transmission (EAX) [20] illustration on how and when link correlation actually helps,
is used in [4]–[7] to capture a more accurate expected number (iv) models to generate and simulate link correlation and (v)
of transmissions. real implementations to demonstrate the effectiveness of a link
For example, H. Dubois et.al. propose least-cost opportunis- correlation aware design.
tic routing (LCOR) [6] which takes EAX as the metric to select
the candidate sets. Similar to the well-known Bellman-Ford III. M OTIVATION
algorithm, LCOR exhaustively searches all possible candidates In this section we first report the existence of link correla-
sets to find the paths with minimum transmissions. Its compu- tion. We then introduce the OR framework and explain how
tational cost increases dramatically in dense networks because wireless diversity serves OR. Finally, we illustrate the impact
of the exponentially explosion in the exhaustive search. In min- of link correlation on the diversity benefit of OR.
imum transmission selection (MTS) [5], the authors compute
the transmission cost with EAX from the destination back to
the source, using a dynamic programming formulation analo- A. Existence of Link Correlation
gous to the Dijkstra’s algorithm. The authors in [7] investigate In wireless networks, when a sender transmits a packet, the
the candidate selection with identical maximum candidate packet reaches to multiple receivers because of the broadcast
set sizes. The result shows that if the maximum number of medium. Link correlation is a phenomenon that the packet
candidates is not limited, different OR algorithms have almost receptions across multiple receivers have certain correlation
the same performance. They prove that this assumption is not and are not independent. To verify the existence of link
1536-1276 (c) 2013 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/TWC.2014.2329568, IEEE Transactions on Wireless Communications
IEEE TRANSACTIONS ON WIRELESS COMMUNICATION, 3
correlation, we conduct an experiment with six MICAz nodes. receptions. In OR, when one candidate fails in receiving a
In the experiment, the sender is placed in the center while packet, the other candidates may receive the packet. In the
the other five nodes are randomly deployed as receivers. The example in Figure 3, if node f1 fails to receive a packet,
sender broadcasts 1000 packets. Each packet is identified by candidate f2 may receive the packet. Similarly if f2 loses the
the sequence number. All the receivers record the reception packet as well, f3 may probably receive it. In other words, the
results through the packet sequence number. probability that all candidates lose the packet becomes quite
Figure 1(a) plots the packet reception patterns observed low because of the packet reception diversity among multiple
from the testbed. The black bands indicate packet losses while candidates.
the white bands indicate successful packet receptions. From The optimistic view of diversity comes from the assumption
Figure 1(a), we find that packet receptions are correlated. that the packet receptions cross multiple wireless links are
Specifically, there are a large number of long black bands independent. Under such an assumption, the packet loss in a
which indicate that an individual packet is lost at multiple receiver has no relationship with the packet losses in other
nodes. When packet receptions are assumed to be independent, receivers.
we synthetically generate the packet reception pattern which Let s be the source and d be the destination. Suppose Fs,d
is shown in Figure 1(b). The comparison indicates that there is the set of candidate next-hop forwarders from s to d, and
exist a big gap between the link independence model and the fi is the candidate with priority i (with 1 being the highest
real link reception patterns. The experiment results reaffirm priority). Assume that the packet delivery probability from s
the observation reported in recent studies [8], [10], [23]. to fi is ps,fi , and the ACK delivery probability from fi to s
is pfi ,s .
Sender DATA
1536-1276 (c) 2013 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/TWC.2014.2329568, IEEE Transactions on Wireless Communications
IEEE TRANSACTIONS ON WIRELESS COMMUNICATION, 4
delivering one packet to at least one of the two candidates the event that a packet is successfully received by forwarder
is given by fi with one transmission. The intersection areas represent the
1 correlated events. For example, Es,f1 ∩ Es,f2 represents the
E(s, Fs,d ) = , (2) correlation between event Es,f1 and Es,f2 . Let α0 be the
1 − P r(Es,f1 , Es,f2 )
expected number of transmissions for s to successfully deliver
where Es,fi is the event that a transmission from source s a packet to the candidate set. α0 is the inverse of the total area
is lost at forwarder fi . In the example in Figure 3, the links in Venn diagram, which is given by
from s to f1 and f2 are 100% correlated. P r(Es,f1 , Es,f2 )
α0−1 =ps,f1 + ps,f2 + ps,f3 − P r(Es,f1 , Es,f2 )
equals 0.5. Thus, E(s, Fs,d ) with candidate set {f1 , f2 } turns
out to be 2, which is greater than E(s, Fs,d ) with candidate − P r(Es,f1 , Es,f3 ) − P r(Es,f2 , Es,f3 ) (4)
set {f2 , f3 } (i.e., 1.38). As a result, selecting nodes f2 and + P r(Es,f1 , Es,f2 , Es,f3 ).
f3 as candidates is the best choice under link correlation
To calculate α, we need to count in the lost ACKs from
model. From this example, we find that the link independence
each candidate to s by multiplying each term in Eq.(4) with
assumption overestimates the real diversity of wireless links.
the probability of successfully receiving the ACK. We thus
In the following section, we further analyze the OR framework
have
under the impact of link correlation.
IV. L INK C ORRELATION M ETRIC α−1 =ps,f1 pf1 ,s + ps,f2 pf2 ,s + ps,f3 pf3 ,s
In this section we analyze OR under the existence of link − P r(Es,f1 , Es,f2 )ps,f1 ps,f2
correlation. We explore the impact of link correlation on the − P r(Es,f1 , Es,f3 )ps,f1 ps,f3 (5)
candidate set selection process and reveal how link correla- − P r(Es,f2 , Es,f3 )ps,f2 ps,f3
tion awareness improves the performance of OR. Finally we
+ P r(Es,f1 , Es,f2 , Es,f3 )ps,f1 ps,f2 ps,f3 .
propose a novel link correlation aware opportunistic routing.
We define the expected number of any-path transmissions When the candidate f1 , f2 or f3 succeeds in receiving a
needed for reliably delivering a packet from the source s to packet, it will take over the forwarding process as long as it
the destination d, given the candidate set F = {f1 , f2 , . . . , fn } does not receive an ACK from a higher priority candidate. For
with the link correlation awareness, as E(s, F, d). In our candidate f1 , it forwards a packet as long as it receives it since
design, the computation of E(s, F, d) is recursive and is f1 has the highest priority. We thus have
executed at individual nodes independently. At the receiver ( )
d, obviously, E(s, F, d) is zero. The key idea is to radially βf1 = α0 · E(f1 , F, d) · (1 − γf1 ) , (6)
calculate E(s, F, d) starting from the destination d outward to
where α0 is multiplied because of the implicit condition that
the rest of the network. Specifically, we calculate E(s, F, d)
at least one of the candidates has received the packet, and
as follows:
γf1 is the probability that candidate f1 will not take the
E(s, F, d) = α + β, (3)
forwarding process, which equals 1 − ps,f1 . For the lowest
where α captures the expected number of transmissions for priority candidate f3 , the forwarding process will not happen
successfully transmitting a packet from s to at least one of when f3 fails to receive a packet, or when an ACK is received
the candidates and getting at least one acknowledgment. β from f1 or f2 . The probability that candidate f3 will not take
captures the expected number of transmissions for delivering the forwarding process γf3 can be calculated as follows:
the packet in turn from those candidates to the destination.
γf3 =1 − ps,f3 + pf1 ,f3 P r(Es,f3 , Es,f1 )
(7)
+ pf2 ,f3 P r(Es,f2 , Es,f3 ).
Pr(Es,f1 Es,f2 Es,f3)
f1 For candidate f2 , an ACK could be received explicitly from
2
s,f
the packet from s and the ACK from f1 . γf2 is thus given by
1
s,f
s f2 d
s,f 3
Es,f2 Es,f3
γf2 = 1 − ps,f2 + pf1 ,f2 P r(Es,f1 , Es,f2 )
(8)
f3 Pr(Es,f2 Es,f3)
+(1 − pf1 ,f2 ) · pf1 ,f3 pf3 ,f2 P r(Es,f1 , Es,f2 , Es,f3 ).
(a) Topology (b) Joint Reception Similar to (6), we now obtain βf2 and βf3 where γf2 and
γf3 can be calculated with Eq.(7) and Eq.(8). Finally, β is the
Fig. 4. Three-candidate case example: (a) the topology; (b) the Venn diagram sum of βf1 , βf2 and βf3 .
of the candidate’s packet reception.
• n-candidate Case: We now extend the problem to n
• Three-candidate Case: we start by considering the 3- candidates. It turns out to be an inclusion-exclusion where we
candidate case in Figure 4, where the receptions of candidate should sum the probabilities of individual links but remove
f1 , f2 and f3 are partially correlated. Figure 4(b) shows the overlapped intersection:
the Venn diagram representing the events that candidates 1
successfully receive a transmission from the sender. Es,fi is α = ∑n k−1 P r(f k )
, (9)
k=1 (−1)
1536-1276 (c) 2013 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/TWC.2014.2329568, IEEE Transactions on Wireless Communications
IEEE TRANSACTIONS ON WIRELESS COMMUNICATION, 5
where f k ⊂ F = {f1 , . . . , fn } is any candidate forwarder set P r(Es,f1k , . . . , Es,fkk ). Assume a reception report of length L,
with size k, and P r(f k ) is the probability that the k candidate we have
forwarders successfully receive a packet and send back the
1∑
L
ACK. P r(f k ) is calculated as follows: P r(Es,f1k , . . . , Es,fkk ) = Bf (j)& . . . &Bfk (j), (13)
L j=1 1
∑ ∏
k
P r(f k ) = P r(Es,f1k , . . . , Es,fkk ) pfik ,s . (10) where Bfi (j) is a bit representing the candidate fi ’s re-
f k ⊂F i ception status of the jth packet. Bfi (j) = 1 represents
candidate fi receives the packet, otherwise Bfi (j) = 0. For
• Special Case: Eq.(9) includes the special link independence
example, in Figure 5, the sender s has three candidates.
case. When wireless links are independent, we have
We calculate s’s P r(Es,f1k , . . . , Es,fkk ) when k equals two,
∏
k i.e., P r(Es,f12 , . . . , Es,f22 ). Suppose the reception report of
P r(Es,f1k , . . . , Es,fkk ) = ps,fik . candidate f1 is [1101], which indicates that f1 receives the
i 1st, 2nd, and 4th packets and misses the 3rd packet. When the
sender s receives the reception reports from the candidates, it
And P r(f k ) in Eq.(10) turns out to be uses Eq.(13) to calculate P r(Es,f12 , . . . , Es,f22 ), i.e.,
∑ ∏
k 1
P r(f k ) = ps,fik pfik ,s . P r(Es,f12 , Es,f22 ) = (1&0 + 1&1 + 0&0 + 1&1)
4
f k ⊂F i = 50%.
For the candidates which have received the packet from the
transmitter, the expected number of transmissions to forward
the packet to the next hop is calculated as follows: f1 [ 1 1 0 1 ]
∑
n
( )
β = α0 · E(fi , F, d) · (1 − γfi ) . (11)
s f2 [ 0 1 0 1 ]
i=1
1536-1276 (c) 2013 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/TWC.2014.2329568, IEEE Transactions on Wireless Communications
IEEE TRANSACTIONS ON WIRELESS COMMUNICATION, 6
i.e., the reception report. It not only helps to calculate link Algorithm 1 CANDIDATES SELECT(s,d,setsize)
quality, which only uses the bit information in rows in Fig- 1: F ⇐ ∅; F̂ ⇐ ∅; mp ⇐ ∞; mc ⇐ ∞
ure 5, but also provides information of links’ relationship, i.e., 2: for all v ∈ N (s) do
3: if ETX(v, d) < ETX(s, d) then
the bit information in columns in Figure 5.
4: F̂ ⇐ F̂ ∪ v
To collect reception reports, we adopt the free piggyback 5: end if
mechanism with normal traffic data, which has been already 6: end for
applied by the existing protocols [24] to measure link quality 7: while |F | < setsize do
8: cand ⇐ argminE (s, F ∪ c, d)
or to improve the robustness of the routing structure. The c∈F̂
binary reception report is small and is much less frequently 9: mc ⇐ E (s, F ∪ cand, d)
10: if mc < mp then
transmitted, therefore the overhead occupies a tiny fraction
11: F ⇐ F ∪ cand; F̂ ⇐ F̂ \cand
(0.9%) of the total energy cost according to our measurements. 12: mp ⇐ mc
13: else
100 14: E(s, F, d) ⇐ mp ; break
15: end if
16: end while
90
# of received pkts
80
We initialize the candidate set F̂ by adding nodes with smaller
70 ETX values. At this step, we create a directed acyclic graph
from the source s to the destination d and eliminate candidates
60
which have higher ETX values (Lines 1-6). In lines 7-16, we
50 Ground Truth
loop through the initial candidate set and find the candidate
Estimation with Correlated Metric with the minimum E(s, F, d) value. We add the node to our
Estimation with Independent Metric
40 candidate set F and remove it from the initial set F̂ . We loop
0 5 10 15 20 25 30
the above procedures until we find enough candidates to meet
Time (minutes)
the predesigned set size.
Fig. 6. Received pkts vs. Estimation with our link correlation metric
α0 and the link independent metric ETX: the estimation with the link
correlation metric closely follows the real one while the link independent
VI. T ESTBED E XPERIMENTATION
metric overestimates the number of received packets. In the real world environment, interference exits everywhere
because of the massive number of uncontrollably deployed
wireless devices sharing the same unlicensed spectrum. In
B. Metric Accuracy the testbed experiment, we adopt interferers to introduce
We run our experiments in a period of 30 minutes, during negatively correlated, positively correlated and uncorrelated
which reception reports (0.9% overhead) are used to fresh link links. We investigate the effect of various correlation degrees
quality and P r(Es,f1k , . . . , Es,fkk ) values. Figure 6 compares on the performance of our design.
the real values with the estimates using our link correlation
metric α0 and the link independent metric ETX. From Fig- i
C. Metric Embedding
This section describes how we integrate the link correlation -1 0 1
aware metric E(s, F, d) into OR to select the candidate for-
(a) Negative correlated (b) Uncorrelated (c) Positive correlated
warder set. The key idea is to select candidates with good link
quality and prioritize them according to the E(s, F, d) value. Fig. 8. The interference pattern which is used to generate link correlation.
The design is specified by the pseudo code in Algorithm 1.
1536-1276 (c) 2013 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/TWC.2014.2329568, IEEE Transactions on Wireless Communications
IEEE TRANSACTIONS ON WIRELESS COMMUNICATION, 7
A. Generating Correlated Links correlated forwarders are selected. That’s because when one
We deploy 24 MICAz nodes in our indoor 24 feet by forwarder fails to receive a packet, the other is very likely
8 feet testbed, as shown in Figure 7(a). It forms a simple to receive it under negative correlated link correlation. We
two-hop network as shown in Figure 7(b), where we have also find that the improvement decreases when the correlation
one source s, one destination d, two interferers, and a set level increases and there are no improvement at all when the
of 20 candidate forwarders. The two interferers are placed links are perfectly correlated. That’s because when the packet
randomly within a pool of forwarders. They are used to receptions of the candidate are highly correlated, link quality
create interference of various patterns. Figure 8 shows selected becomes the only factor affecting the selection process, and
examples of interference patterns which may further lead to no diversity benefits can be exploited.
different degrees of link correlation.
5
We use the maximum transmission power, i.e., 0 dBm, to CU
100
CA Negative Correlation
Percentage of Improvement
Number of Transmissions
CA Negative Correlation CA Correlation 0
make sure that the links from the forwarders to the destination 4 CA Correlation 0 80
d are perfect. For the links from the source s to the candidate 3 60
forwarders, the transmission power is controlled carefully to 2 40
introduce the packet loss in the presence of the interference
1 20
signal. The source s sends packets with 2-byte data payload
in every 0.2s. In the default setting, the source node keeps on 0
1/4 1/3 1/2 2/3 3/4
0
1/4 1/3 1/2 2/3 3/4
sending packets until the destination returns an ACK. We use Link Quality Link Quality
802.15.4 channel 26 to avoid the effect of Wi-Fi interference. (a) Number of transmissions (b) Percentage of improvement
$" 15
(% 1.0
CU
Eenergy consumption (mJ)
'" 12 CA
'% 0.8
)*51/
&"
Delivery ratio
9
&% 0.6
%"
6 0.4
!" #%
3 0.2
" % )
Fig. 9. The impact of correlation level. Fig. 11. Energy Consumption. Fig. 12. Delivery Ratio.
1536-1276 (c) 2013 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/TWC.2014.2329568, IEEE Transactions on Wireless Communications
IEEE TRANSACTIONS ON WIRELESS COMMUNICATION, 8
10 15
A. Link Correlation Generation Model
14
Number of transmissions
Number of transmissions
9
We generate correlated links using the sampling algorithm 13
The inputs of the algorithm are the mean and the covari- 7 11
1536-1276 (c) 2013 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/TWC.2014.2329568, IEEE Transactions on Wireless Communications
IEEE TRANSACTIONS ON WIRELESS COMMUNICATION, 9
Empirical CDF Empirical CDF [11] W. Lou and J. Wu. On reducing broadcast redundancy in ad hoc wireless
1 1
networks. IEEE Transactions on Mobile Computing, 2002.
0.8 0.8 [12] Q. Huang, C. Lu, and G. Catalin Roman. Spatiotemporal multicast in
sensor networks. In SENSYS, 2003.
0.6 0.6
[13] D. Ganesan, R. Govindan, S. Shenker, and D. Estrin. Highly-resilient,
F(x)
F(x)
0.4
CU Select MAX 2
CA Select MAX 2 0.4 energy-efficient multipath routing in wireless sensor networks. SIGMO-
CU Select MAX 3 BILE, 5, 2001.
CA Select MAX 3 Select MAX 2
0.2
CU Select MAX 4
0.2
Select MAX 3
[14] S. Chachulski, M. Jennings, S. Katti, and D. Katabi. Trading structure
0
CA Select MAX 4
0
Select MAX 4 for randomness in wireless opportunistic routing. ACM SIGCOMM,
4.4 4.8 5.2 5.6 6 0 3 6 9 12 15 37(4):169–180, 2007.
x: Number of Transmissions X: Percentage of Improvement
[15] A. Khreishah, I. Khalil, and J. Wu. Distributed network coding-based
(a) The CDF of the number of trans- (b) The CDF of the percentage of opportunistic routing for multicast. In MobiHoc, 2012.
missions improvement [16] D. Koutsonikolas, C.C. Wang, and Y.C. Hu. Ccack: Efficient network
coding based opportunistic routing through cumulative coded acknowl-
Fig. 15. The impact of forwarder set sizes. edgments. In INFOCOM, pages 1–9. IEEE, 2010.
[17] E. Rozner, J. Seshadri, Y.A. Mehta, and L. Qiu. Soar: Simple oppor-
tunistic adaptive routing protocol for wireless mesh networks. IEEE
Transactions on Mobile Computing, pages 1622–1635, 2009.
VIII. C ONCLUSION [18] D. Liu, Z. Cao, J. Wang, Y. He, M. Hou, and Y. Liu. Dof: Dupli-
cate detectable opportunistic forwarding in duty-cycled wireless sensor
This paper extensively studies the impact of link correlation networks. In ICNP, pages 1–10, 2013.
on the performance of OR. We provide a detailed analysis of [19] X. Zhang and B. Li. Optimized multipath network coding in lossy
the OR framework under the influence of link correlation. We wireless networks. Selected Areas in Communications, IEEE Journal
on, 27(5):622–634, 2009.
find that diversity benefit is overestimated when we assume [20] Z. Zhong, J. Wang, S. Nelakuditi, and G.H. Lu. On selection of
that packet receptions of wireless links are independent. A candidates for opportunistic anypath forwarding. In SIGMOBILE Mob.
link correlation aware metric is thus proposed to improve Comput. Commun. Rev., pages 1–2. ACM, 2006.
[21] M. Gudmundson. Correlation model for shadow fading in mobile radio
the performance of OR by selecting the nodes with diverse systems. Electronics letters, 27(23):2145–2146, 1991.
low correlated links as forwarder candidates. We evaluate our [22] N. Patwari and P. Agrawal. Effects of correlated shadowing: Connec-
work with testbed implementation and extensive simulations. tivity, localization, and rf tomography. In IPSN, pages 82–93. IEEE
Computer Society, 2008.
The experiment result affirms the efficiency of our design in [23] S. Wang, S. Kim, Y. Liu, G. Tan, and T. He. Corlayer: A transparent link
capturing the full advantage of OR. correlation layer for energy efficient broadcast. In MOBICOM, 2013.
[24] Nouha Baccour, Anis Koubaa, Luca Mottola, Marco Zuniga, Habib
Youssef, Carlo Boano, and Mario Alves. Radio link quality estimation
ACKNOWLEDGEMENT in wireless sensor networks: a survey. ACM TOSN, 2012.
This work was supported in part by National Science [25] J.H. Macke, P. Berens, A.S. Ecker, A.S. Tolias, and M. Bethge.
Generating spike trains with specified correlation coefficients. Neural
Foundation grants CNS-0845994 and CNS-0917097. We also Computation, 21(2):397–423, 2009.
received partial support from McKnight Land-Grant Profes- [26] N.J. Higham. Computing the nearest correlation matrix—a problem
sorship and “The Shanghai Recruitment Program of Global from finance. IMA Journal of Numerical Analysis, 22(3):329, 2002.
[27] B.M. Waxman. Routing of multipoint connections. Selected Areas in
Experts”. Anas Basalamah’s work was funded by the Ful- Communications, IEEE Journal on, 6(9):1617–1622, 1988.
bright Visiting Scholar Program. Tian He is the corresponding
authors.
R EFERENCES
Shuai Wang received the B.S. and M.S. degrees
[1] S. Biswas and R. Morris. Opportunistic routing in multi-hop wire- from Huazhong University of Science and Technol-
less networks. ACM SIGCOMM Computer Communication Review, ogy, China. He is currently working toward the PhD
34(1):69–74, 2004. degree with the Department of Computer Science
[2] K. Zeng, Z. Yang, and W. Lou. Opportunistic routing in multi-radio and Engineering at the University of Minnesota,
multi-channel multi-hop wireless networks. In INFOCOM, pages 3512– Twin Cities. His research interests include big data
3521. IEEE, 2010. analysis, wireless networks and sensors, distributed
[3] C.P. Luk, W.C. Lau, and O.C. Yue. Opportunistic routing with direction- systems, network coding and related areas.
al antennas in wireless mesh networks. In INFOCOM, pages 2886–2890,
2009.
[4] Z. Zhong and S. Nelakuditi. On the efficacy of opportunistic routing.
In SECON’07, pages 441–450. IEEE, 2007.
[5] Y. Li, W. Chen, and Z.L. Zhang. Optimal forwarder list selection in
opportunistic routing. In MASS’09., pages 670–675. IEEE, 2009.
[6] H. Dubois-Ferrière, M. Grossglauser, and M. Vetterli. Valuable detours:
Least-cost anypath routing. Networking, IEEE/ACM Transactions on, Anas Basalamah is an Assistant Professor at the
19(2):333–346, 2011. Computer Engineering Department of Umm Al Qura
[7] L. Darehshoorzadeh, A.and Cerda-Alabern and V. Pla. Modeling and University. He is currently leading the Data Collec-
comparison of candidate selection algorithms in opportunistic routing. tion Research Thrust of KACST GIS Technology In-
Computer Networks, 55(13):2886–2898, 2011. novation Center at Umm Al-Qura University. He did
[8] T. Zhu, Z. Zhong, T. He, and Z.L. Zhang. Exploring link correlation for his M.S. and Ph.D. Degrees at Waseda University,
efficient flooding in wireless sensor networks. In USENIX NSDI, pages Tokyo in 2006, 2009 respectively. He worked as a
4–4. USENIX Association, 2010. Post Doctoral Researcher at the University of Tokyo
[9] K. Srinivasan, M. Jain, J.I. Choi, T. Azim, E.S. Kim, P. Levis, and and the University of Minnesota in 2010, 2011
B. Krishnamachari. The κ factor: inferring protocol performance using respectively. His areas of interest include Embed-
inter-link reception correlation. In Mobicom, pages 317–328, 2010. ded Networked Sensing, Real-world applications of
[10] A. Zubow, M. Kurth, and J.P. Redlich. Considerations on forwarder Networked Sensing, Ubiquitous Computing, Participatory and Urban Sensing.
selection for opportunistic protocols in wireless networks. EW, 2008.
1536-1276 (c) 2013 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/TWC.2014.2329568, IEEE Transactions on Wireless Communications
IEEE TRANSACTIONS ON WIRELESS COMMUNICATION, 10
1536-1276 (c) 2013 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.