WO2003094404A2 - Traffic policing in a mobile ad hoc network - Google Patents

Traffic policing in a mobile ad hoc network Download PDF

Info

Publication number
WO2003094404A2
WO2003094404A2 PCT/US2003/013138 US0313138W WO03094404A2 WO 2003094404 A2 WO2003094404 A2 WO 2003094404A2 US 0313138 W US0313138 W US 0313138W WO 03094404 A2 WO03094404 A2 WO 03094404A2
Authority
WO
WIPO (PCT)
Prior art keywords
qos
node
traffic
route
nodes
Prior art date
Application number
PCT/US2003/013138
Other languages
French (fr)
Other versions
WO2003094404A3 (en
Inventor
Joseph Bibb Cain
Original Assignee
Harris Corporation
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Harris Corporation filed Critical Harris Corporation
Priority to EP03728575A priority Critical patent/EP1502393B1/en
Priority to AU2003234262A priority patent/AU2003234262A1/en
Priority to CA002484501A priority patent/CA2484501A1/en
Priority to JP2004502518A priority patent/JP2005524336A/en
Priority to DE60323360T priority patent/DE60323360D1/en
Publication of WO2003094404A2 publication Critical patent/WO2003094404A2/en
Publication of WO2003094404A3 publication Critical patent/WO2003094404A3/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/302Route determination based on requested QoS
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/20Hop count for routing purposes, e.g. TTL
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/30Routing of multiclass traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L47/00Traffic control in data switching networks
    • H04L47/10Flow control; Congestion control
    • H04L47/11Identifying congestion
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L47/00Traffic control in data switching networks
    • H04L47/10Flow control; Congestion control
    • H04L47/20Traffic policing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L47/00Traffic control in data switching networks
    • H04L47/10Flow control; Congestion control
    • H04L47/24Traffic characterised by specific attributes, e.g. priority or QoS
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L47/00Traffic control in data switching networks
    • H04L47/10Flow control; Congestion control
    • H04L47/32Flow control; Congestion control by discarding or delaying data units, e.g. packets or frames
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L47/00Traffic control in data switching networks
    • H04L47/70Admission control; Resource allocation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L47/00Traffic control in data switching networks
    • H04L47/70Admission control; Resource allocation
    • H04L47/72Admission control; Resource allocation using reservation actions during connection setup
    • H04L47/724Admission control; Resource allocation using reservation actions during connection setup at intermediate nodes, e.g. resource reservation protocol [RSVP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L47/00Traffic control in data switching networks
    • H04L47/70Admission control; Resource allocation
    • H04L47/72Admission control; Resource allocation using reservation actions during connection setup
    • H04L47/726Reserving resources in multiple paths to be used simultaneously
    • H04L47/728Reserving resources in multiple paths to be used simultaneously for backup paths
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L47/00Traffic control in data switching networks
    • H04L47/70Admission control; Resource allocation
    • H04L47/74Admission control; Resource allocation measures in reaction to resource unavailability
    • H04L47/746Reaction triggered by a failure
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L47/00Traffic control in data switching networks
    • H04L47/70Admission control; Resource allocation
    • H04L47/78Architectures of resource allocation
    • H04L47/783Distributed allocation of resources, e.g. bandwidth brokers
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L47/00Traffic control in data switching networks
    • H04L47/70Admission control; Resource allocation
    • H04L47/80Actions related to the user profile or the type of traffic
    • H04L47/805QOS or priority aware
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L47/00Traffic control in data switching networks
    • H04L47/70Admission control; Resource allocation
    • H04L47/82Miscellaneous aspects
    • H04L47/822Collecting or measuring resource availability data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L47/00Traffic control in data switching networks
    • H04L47/70Admission control; Resource allocation
    • H04L47/82Miscellaneous aspects
    • H04L47/824Applicable to portable or mobile terminals
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W28/00Network traffic management; Network resource management
    • H04W28/02Traffic management, e.g. flow control or congestion control
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W40/00Communication routing or communication path finding
    • H04W40/24Connectivity information management, e.g. connectivity discovery or connectivity update
    • H04W40/28Connectivity information management, e.g. connectivity discovery or connectivity update for reactive routing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/02Processing of mobility data, e.g. registration information at HLR [Home Location Register] or VLR [Visitor Location Register]; Transfer of mobility data, e.g. between HLR, VLR or external networks
    • H04W8/04Registration at HLR or HSS [Home Subscriber Server]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W40/00Communication routing or communication path finding
    • H04W40/02Communication route or path selection, e.g. power-based or shortest path routing
    • H04W40/04Communication route or path selection, e.g. power-based or shortest path routing based on wireless node resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W40/00Communication routing or communication path finding
    • H04W40/02Communication route or path selection, e.g. power-based or shortest path routing
    • H04W40/12Communication route or path selection, e.g. power-based or shortest path routing based on transmission quality or channel quality
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/26Network addressing or numbering for mobility support
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W84/00Network topologies
    • H04W84/18Self-organising networks, e.g. ad-hoc networks or sensor networks
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Definitions

  • the present invention relates to the field of communication networks, and, more particularly, to mobile ad hoc wireless networks and related methods.
  • Wireless networks have experienced increased development in the past decade.
  • One of the most rapidly developing areas is mobile ad hoc networks.
  • a mobile ad hoc network includes a number of geographically- distributed, potentially mobile nodes sharing a common radio channel.
  • the most distinctive feature of mobile ad hoc networks is the lack of any fixed infrastructure.
  • the network is formed of mobile nodes only, and a network is created on the fly as the nodes transmit with each other. The network does not depend on a particular node and dynamically adjusts as some nodes join or others leave the network.
  • an ad hoc network can be quickly deployed and provide limited but much needed communications .
  • ad hoc networks are quickly finding new applications in civilian or commercial areas.
  • Ad hoc networks will allow people to exchange data in the field or in a class room without using any network structure except the one they create by simply turning on their computers or PDAs.
  • wireless communication increasingly permeates everyday life, new applications for mobile ad hoc networks will continue to emerge and become an important part of the communication structure.
  • Mobile ad hoc networks pose serious challenges to the designers.
  • nodes Due to the lack of a fixed infrastructure, nodes must self-organize and reconfigure as they move, join or leave the network. All nodes are essentially the same and there is no natural hierarchy or central controller in the network. All functions have to be distributed among the nodes. Nodes are often powered by batteries and have limited communication and computation capabilities. The bandwidth of the system is usually limited. The distance between two nodes often exceeds the radio transmission range, and a transmission has to be relayed by other nodes before reaching its destination. Consequently, a network has a multihop topology, and this topology changes as the nodes move around.
  • the Mobile Ad-Hoc Networks (MANET) working group of the Internet Engineering Task Force (IETF) has been actively evaluating and standardizing routing, including multicasting, protocols. Because the network topology changes arbitrarily as the nodes move, information is subject to becoming obsolete, and different nodes often have different views of the network, both in time (information may be outdated at some nodes but current at others) and in space (a node may only know the network topology in its neighborhood and not far away from itself) .
  • a routing protocol needs to adapt to frequent topology changes and with less accurate information. Because of these unique requirements, routing in these networks are very different from others. Gathering fresh information about the entire network is often costly and impractical. Many routing protocols are reactive (on-demand) protocols: they collect routing information only when necessary and to destinations they need routes to, and do not maintain unused routes. This way the routing overhead is greatly reduced compared to pro-active protocols which maintain optimal routes to all destinations at all time. This is important for a protocol to be adaptive.
  • AODV Dynamic Source Routing
  • DSR Dynamic Source Routing
  • TORA Temporally Ordered Routing Algorithm
  • Examples of other various routing protocols include Destination Sequenced Distance-Vector (DSDV) routing which is disclosed in U.S. Patent No. 5,412,654 to Perkins, and Zone Routing Protocol (ZRP) which is disclosed in U.S. Patent No. 6,304,556 to Haas.
  • ZRP is a hybrid protocol using both proactive and reactive approaches.
  • These conventional routing protocols use a best effort approach in selecting a route from the source node to the destination node.
  • the number of hops is the main criteria in such a best effort approach.
  • the route with the least amount of hops is selected as the transmission route.
  • QoS routing in mobile ad hoc networks is gaining interest.
  • the protocol needs not only to find a route but also to secure the resources along the route.
  • nodes must negotiate with each other to manage the resources required for QoS routes. This is further complicated by frequent topology changes. Due to these constraints, QoS routing is more demanding than best-effort routing.
  • QoS routing approaches are set forth by Chenxi Zhu in the publication entitled “Medium Access Control and Quality-of-Service Routing for Mobile Ad Hoc Networks,” 2001, and by M. Mirhakkak et al. in the publication entitled “Dynamic Quality-of-Service for Mobile Ad Hoc Networks," MITRE Corp., 2000.
  • Zhu discusses establishing bandwidth guaranteed QoS routes in small networks whose topologies change at a low to medium rate.
  • Mirhakkak et al. are concerned with resource reservation requests which specify a range of QoS values while the network makes a commitment to provide service within this range.
  • admission control is performed to forward traffic from other nodes.
  • conventional admission control protocols provide for full disclosure regarding routes and connectivity. In other words, each node shares all route and connectivity data with other nodes so that the best-effort routes are selected overall.
  • the network includes a plurality of wireless mobile nodes and a plurality of wireless communication links connecting the plurality of nodes together.
  • the method includes nodes transmitting quality-of-service (QoS) route requests to discover traffic routing based upon a QoS parameter, and the QoS route requests including a traffic flow identifier.
  • QoS quality-of-service
  • Each node calculates a node QoS tag value to make traffic admission control decisions, and each node determines whether to admit traffic in response to QoS route requests based upon the calculated QoS tag value and the QoS parameter of QoS route requests.
  • each node replies to QoS route requests to indicate whether the node can support the QoS parameter of the route request and admit the traffic, and each node polices admitted traffic based upon the traffic flow identifier to ensure that admitted traffic does not exceed the QoS parameter of the QoS route request.
  • the QoS parameter may comprise a requirement based upon at least one of available bandwidth, error rate, end-to- end delay, end-to-end delay variation, hop count, expected path durability, and priority, while the node specific QoS tag value may be a function of at least one of available power, available bandwidth by the node, recent error rate, recent delay, available bandwidth by other nodes within a range, and node queue size.
  • the method may also include each node preventing propagation of traffic that exceeds the QoS parameter of the QoS route request. This may include buffering traffic that exceeds the QoS parameter of the QoS route request, and propagating buffered traffic at the QoS parameter of the QoS route request.
  • each node may propagate buffered traffic when required resources become available, or simply discard traffic that exceeds the QoS parameter of the QoS route request.
  • replying to QoS route requests may comprise indicating what traffic routing the node can support based upon the node QoS tag value, when the node cannot support the QoS parameter of the route request.
  • a system aspect of the present invention is directed to a mobile ad hoc network having a plurality of mobile nodes, and a plurality of wireless communication links connecting the plurality of mobile nodes together.
  • Each mobile node comprises a communications device to wirelessly and unidirectionally or bi-directionally communicate with other nodes of the plurality of nodes via the wireless communication links, and a controller to route communications via the communications device.
  • the controller includes a route discovery unit to transmit quality-of-service (QoS) route requests to other nodes to discover routing to a destination node based upon at least one QoS parameter, and the QoS route requests including a traffic flow identifier.
  • QoS quality-of-service
  • a QoS tag calculation unit calculates a node QoS tag value to make traffic admission control decisions, and a traffic admission controller determines whether to admit traffic in response to QoS route requests based upon the calculated QoS tag value and the QoS parameter of QoS route requests. Furthermore, a route request processing unit replies to QoS route requests to indicate whether the node can support the QoS parameter of the route request and admit the traffic, and a traffic policing unit polices admitted traffic based upon the traffic flow identifier to ensure that admitted traffic does not exceed the QoS parameter of the QoS route request.
  • FIGs. 1-4 are schematic diagrams of a mobile ad hoc network including QoS routing in accordance with the present invention.
  • FIG. 5 is a flowchart illustrating the method steps for QoS routing in a mobile ad hoc network in accordance with the present invention.
  • FIG. 6 is a schematic diagram illustrating a router of a node in accordance with the network of the present invention.
  • FIG. 7 is a schematic diagram illustrating the details of the controller of the router in FIG. 6.
  • FIGs. 8-10 are schematic diagrams of a mobile ad hoc network including admission control in accordance with the present invention.
  • FIG. 11 is a flowchart illustrating the method steps for admission control in a mobile ad hoc network in accordance with the present invention.
  • FIG. 12 is a flowchart illustrating the method steps for policing traffic admission control in a mobile ad hoc network in accordance with the present invention.
  • FIG. 13 is a schematic diagram of a mobile ad hoc network including traffic tracking in accordance with the present invention.
  • FIG. 14 is a flowchart illustrating the method steps for tracking traffic in a mobile ad hoc network in accordance with the present invention.
  • FIGs. 15-17 are schematic diagrams of a mobile ad hoc network including dynamic channle allocation in accordance with the present invention.
  • FIG. 18 is a flowchart illustrating the method steps for dynamic channel allocation in a mobile ad hoc network in accordance with the present invention.
  • portions of the present invention may be embodied as a method, data processing system, or computer program product. Accordingly, these portions of the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment, or an embodiment combining software and hardware aspects. Furthermore, portions of the present invention may be a computer program product on a computer- usable storage medium having computer readable program code on the medium. Any suitable computer readable medium may be utilized including, but not limited to, static and dynamic storage devices, hard disks, optical storage devices, and magnetic storage devices.
  • These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory result in an article of manufacture including instructions which implement the function specified in the flowchart block or blocks.
  • the computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart block or blocks.
  • the network 20 includes a plurality of mobile nodes 30 including the source node 1 and the destination node 4 with intermediate nodes 2, 3 and 5 therebetween.
  • the nodes 30, such as laptop computers, personal digital assistants (PDAs) or mobile phones, are connected by wireless communication links 32 as would be appreciated by the skilled artisan.
  • the method begins (block 100) and includes transmitting a quality-of-service (QoS) route request RREQQ from the source node 1 to discover routing to the destination node 4 based upon a QoS parameter, as indicated at block 102 in FIG. 5.
  • QoS quality-of-service
  • the QoS parameter is preferably based upon available bandwidth, error rate, end-to- end delay, end-to-end delay variation, hop count, expected path durability, and/or priority as will be discussed in further detail below.
  • the route request RREQQ includes a QOS flow identifier and an updatable QoS link metric.
  • the method includes each intermediate node 2, 3 and 5 determining whether the node can support the requested QoS parameter of the QoS route request RREQQ. If the node cannot support the QoS parameter of a particular request RREQQ, then the request is denied or simply not forwarded by the node (block 106) . If the node, for example node 3, can support the QoS parameter of a particular request RREQQ, then the node updates the QoS link metric, forwards the QoS route request to other intermediate nodes 2 and 5, and temporarily reserves node resources for that QoS route request (block 108) .
  • Intermediate nodes 2 and 5 also must determine whether they can supp rt the requested QoS parameter of the QoS route request RREQQ forwarded from node 3. If so, the route request RREQQ with the updated QoS link metric is then forwarded to the destination node 4.
  • the destination node 4 upon receiving the QoS route request RREQQ, generates a reply RREPQ to the source node 1 including the flow identifier and updated QoS link metric for each discovered route (block 110) .
  • the destination node 4 may have received the forwarded route request RREQQ from any of various possible routes including, for example, 1-2-4 or 1-3-5-4.
  • a reply RREPQ is generated in each case.
  • the source node 1 generates QoS route metrics based upon updated QoS link metrics in replies RREPQ from the destination node 4 for discovered routes.
  • the source node 1 selects a route to the destination node 4 based upon the QoS route metrics, and, at block 116, the source node transmits route confirmations CONFQ to intermediate nodes on the selected route. This is to confirm the use of the resources on the selected route that were temporarily reserved at block 108. Other temporarily reserved resources on discovered but non-selected routes may be permitted to time out by not transmitting CONFQ on those routes .
  • the source node 1 may select at least one standby route either with or without sending confirmations CONFQ to the intermediate nodes on the standby route (block 122) .
  • a standby route may be for duplicate transmissions, for additional reliability, or may be used as a backup route in case of route and/or QoS failure.
  • the intermediate nodes 2, 3 and 5, and/or the destination node 4 may detect at any time whether the node can continue to support the requested QoS parameter of the QoS route request RREQQ.
  • reserved resources and associated routes may be permitted to time out if determined inactive, at block 126, and be released, block 128, if not used for a period of time either by data traffic or by the sending of periodic CONFQ messages.
  • the node If the node cannot continue to support the request RREQQ, then the node generates a QoS error notification RERRQ to the source node 1 (block 120) .
  • the source node 1 may maintain the selected route, upon receiving the QoS error notification RERRQ, while again transmitting a quality-of- service (QoS) route request RREQQ to discover a new routing path to the destination node 4 based upon the QoS parameter (block 102) .
  • the source node 1 may also switch to the standby route upon receiving the QoS error notification RERRQ (block 124) .
  • the described method can be applied to any type of On-Demand or Reactive routing protocol, such as Dynamic Source Routing (DSR) or Ad-Hoc On-Demand Distance Vector (AODV) routing, or to any hybrid proactive/reactive protocol, such as Zone Routing Protocol (ZRP) , as would be appreciated by the skilled artisan.
  • DSR Dynamic Source Routing
  • AODV Ad-Hoc On-Demand Distance Vector
  • ZRP Zone Routing Protocol
  • a node 30 is able to reserve a certain amount of capacity or bandwidth.
  • source node 1 of a traffic flow will send the QoS Route Request RREQQ for each required flow (the last Q in the notation indicates a QoS request) .
  • the RREQQ message performs the function of discovering a route that can support the required QoS. Nodes that forward the RREQQ to the destination 4 will note if they can meet the requested QoS before passing on the RREQQ and they will temporarily reserve resources if needed.
  • a Route Reply RREPQ packet is returned from the destination with an indication that the requested QoS can be met over that path.
  • the source node 1 may then collect multiple potential paths to the destination 4 before deciding upon the best choice to provide the desired QoS. Once this path is determined, a Confirm CONFQ message is sent to the destination 4 along the indicated path. Along the way on this path any temporary resource reservations are confirmed to be permanent reservations. QoS reservations are timed out if not used for a specified period of time. If a link fails along the route or if the QoS requirement cannot be met, a Route Error (RERRQ) packet is generated and returned to the source node.
  • RERRQ Route Error
  • the source node 1 broadcasts a RREQQ packet to the destination node.
  • This is a special type of packet similar to the conventional RREQ packet used in a protocol such as DSR or AODV.
  • the conventional RREQ broadcast is used for "best effort" service.
  • the method of the present invention may still follow the conventional procedures established by the protocol for best effort service.
  • the special RREQQ packet is used to reserve a flow at a specified capacity to the destination 4.
  • a flow ID is assigned to the RREQQ by the source node 1 which combined with the source node address uniquely identifies the flow to any node in the network 20 that is forwarding the flow.
  • the RREQQ packet also indicates the capacity that is to be reserved.
  • the minimum capacity or bandwidth requirement is checked against available capacity to determine if a reservation can be made for the flow. If the node can accommodate the required traffic flow, then the capacity is temporarily reserved for that flow ID. This temporary reservation is released if a CONFQ message is not received within a short period of time.
  • each node along the path must be able to estimate its contribution to the total path delay and check to see if the total delay along the path so far plus its contribution exceeds the specified maximum delay bound.
  • the RREQQ must be allowed to propagate all the way to the destination node 4 to determine if a valid path exists that satisfies the QoS requirement. If such a path is found, then the destination node 4 generates a RREPQ message to be returned to the source node 1. This message indicates to the source node that a valid path has been found to the destination node 4 that satisfies the requested QoS and a route has been established (in the case of DSR a source route is returned) .
  • Estimated path delay is included in the RREPQ for a request seeking a delay guarantee as well as for a path guaranteeing capacity.
  • the source node 1 may receive multiple RREPQ for paths to the destination node 4 that can meet the required QoS. It will rank order these and send out a CONFQ message indicating its selection of a path on the highest ranked path.
  • the other paths may be kept as backup paths, but if the CONFQ is not sent on these paths, there is no guarantee that the required resources will be available if needed as a backup alternate path.
  • the RREQQ packet is discarded knowing that the path through this node cannot satisfy the requested QoS.
  • other paths may be found by the discovery process. If at any time a link fails along the route or if the QoS requirement cannot be met, a Route Error RERRQ packet is generated and returned to the source node 1 for each traffic flow affected by the failure. In this case either a backup path must be used or the route discovery process is initiated again. The described procedures are easily applied to the DSR protocol.
  • the conventional DSR message types RREQ, RREP, RRER are defined as optional packet types, and can be used as defined for the conventional operation of the protocol to support "best effort" traffic in a backwards compatibility mode.
  • New optional packet types are defined to support QoS including the RREQQ, RREPQ, RRERQ, and CONFQ packet types to be used for managing QoS paths. Definition of the required header fields for these types is straightforward based on the functions defined above.
  • a special type of QoS source routed packet for QoS mission data would also be included. This packet would include the flow ID to identify which flow the packet belonged and to allow for metering of flow traffic.
  • the following procedures would be used if a failure causes a node to issue a RERRQ packet. If a RERRQ packet is received at the source node, then the current route is discarded and a backup route is tried.
  • the first packet sent on the backup route will be another type of special QoS source routed packet, the RREQT, that includes the flow ID and the QoS parameters. This packet could also include mission data.
  • Each node along the path will have to check to see if they are still maintaining a temporary reservation for the flow. If not they will recheck to see if they can support the flow and make a temporary reservation. If the packet reaches the destination with the flow supported at each intermediate node, then the destination node will return a RREPQ packet notifying the source that the path is valid.
  • the packet is discarded and the node returns a RERRQ packet to the source node notifying it that the path cannot support the requested QoS parameters. If the source node receives a RREPQ packet, then it sends a CONFQ message along the selected path confirming the choice of path in addition to continuing to send the mission data for that traffic flow. If the source node receives a RERRQ packet, then it tries the same procedure on the next available backup path. If the source node has no more backup source routes to the destination, the source node begins another route discovery process for a new QoS path to the destination node. Mission data flow is interrupted until a new route is found. For any specific protocol, the data structures required to manage the resources allocated to each traffic flow can be defined, and how to identify the flows and how to look up the routes assigned to each flow can also be defined.
  • a mobile ad hoc network 20 includes a plurality of mobile nodes 30, and a plurality of wireless communication links 32 connecting the plurality of mobile nodes together.
  • Each mobile node includes a router 40 (FIG. 6) that has a communications device 42 to wirelessly and uni-directionally or bi-directionally communicate with other nodes via the wireless communication links 32, and a controller 44 to route communications via the communications device 42.
  • a memory 46 may be included as part of the controller 44 or in connection with the controller.
  • the controller 44 includes a route discovery unit 50 to transmit the quality-of-service (QoS) route requests to other nodes to discover routing to a destination node based upon at least one QoS parameter.
  • the route request includes a flow identifier and a QoS link metric.
  • a route request processing unit 52 determines whether the node can support a requested QoS parameter of a QoS route request and to update the QoS -link metric, and a temporary resource reservation table 54 contains temporary node resource reservations for QoS route requests having supportable QoS parameters.
  • a route metric formation unit 56 generates QoS route metrics based upon updated QoS link metrics in replies from nodes with node resource reservations, and a route selection unit 58 selects a route to the destination node based upon the QoS route metrics and to transmit route confirmations to nodes on a selected route.
  • the route selection unit 58 may select a standby route, such as for backup or duplicate transmissions, with or without sending confirmations CONFQ to the nodes on the standby route.
  • the route request processing unit 52 detects whether the node can continue to support the requested QoS parameter of the QoS route request and, if not, generates the QoS error notification RERRQ.
  • the route selection unit 58 preferably maintains the selected route, upon receiving a QoS error notification from another node, while the route discovery unit 50 transmits another quality-of-service (QoS) route request RREQQ to discover new routing to the destination node based upon the QoS parameter.
  • the route selection unit 58 may switch to the standby route upon receiving the QoS error notification RERRQ from another node.
  • Another embodiment of the present invention provides traffic admission control for multihop routes in the mobile ad hoc network 22 while maintaining the quality of service needed, and will be described with reference to FIGs. 8-11.
  • Such an admission control method will adaptively allow a node to keep some resources for its own traffic, while sharing fairly in the forwarding of other's traffic.
  • the ad- hoc network is made up of a plurality of wireless mobile nodes 30 and a plurality of wireless communication links 32 connecting the plurality of nodes together.
  • the method for controlling traffic admission in the mobile ad hoc network 22 begins (block 200) and includes a source node transmitting quality-of-service (QoS) route requests RREQQ to discover traffic routing based upon a QoS parameter (block 202) .
  • QoS quality-of-service
  • each node 30 in the network 22 calculates a node QoS tag value to make traffic admission control decisions.
  • the node QoS tag value is a function of at least one node specific QoS metric.
  • the QoS parameter may be based upon, for example, bandwidth, error rate, end-to-end delay, end-to-end delay variation, hop count, expected path durability, and/or priority, while the node specific QoS metric may include one or more of available power, available bandwidth by the node, recent error rate, recent delay, available bandwidth by other nodes within a range, and node queue size, for example.
  • the QoS tag value may be a weighted sum of each term, or a vector with each term as an element.
  • Each node 30 determines admission based upon the calculated QoS tag value and the QoS parameter of QoS route requests RREQQ, and may reply to the source node, regarding whether traffic will be admitted in response to the QoS route requests (block 214) . Furthermore, each node 30 may calculate route and connectivity information associated with the node (block 210) , and transmit the route and connectivity information and the QoS tag value to other nodes for traffic route selection (block 212) .
  • Calculating the node QoS tag value 208 may include querying other nodes within a range for information regarding at least one QoS metric (block 204) , and processing the QoS metric information received from the other nodes and the at least one node specific QoS metric to calculate the node QoS tag value.
  • Calculating the node QoS tag value may further comprise verifying that each other node within the range has replied with QoS metric information (block 206) . More specifically, most of the QoS metric terms such as available power, available bandwidth by the node, recent error rate, recent delay, and node queue size, are known locally to the node. However, available bandwidth by other nodes within a range, for example, is not known locally. Thus, referring to FIG.
  • node 4 if node 1 issues a request to node 4 for 5 Mbps of an 11 Mbps transmission medium, node 4 must check to see if any other nodes in range (here nodes 1, 3 and 5) have already made prohibitive commitments. So, node 4 broadcasts a CHECK message and any nodes within range that have committed bandwidth will send a CHECK REPLY back indicating such. Node 4 makes sure that it has heard a CHECK REPLY from all nodes that it has heard from lately. With the received information, node 4 can now make a decision on whether it can support the QoS parameter of the route request RREQQ.
  • Replying to QoS route requests may comprise indicating what traffic routing the node can support based upon the node QoS tag value, when the node cannot support the QoS parameter of the route request. For example, if node 4 cannot commit to the request, it may issue a reply that describes the most that it can support. Accordingly, the source can decide whether the level is good enough or whether to scale back the request and issue a relaxed QoS request RREQQ .
  • conventional approaches provide full disclosure regarding routes and connectivity. In other words, each node 30 shares all that it knows with others, so that "best" (usually fewest hops) routes are selected overall.
  • this route and connectivity information is tagged with a value that allows other nodes to use it based on the Quality of Service needed. Additionally, the node sharing the information can decide on the level of QoS that will be allowed to use that information. This decision can be based on a common set of rules, or per node since some nodes will be advantaged. For example, a node that finds itself forwarding many packets, whose battery is running out, and is having trouble finding bandwidth for its own traffic may advertise his routes and connectivity to certain other nodes with a tag that disallows all but the most important (high priority) packets .
  • a system aspect of this embodiment of the present invention is directed to the mobile ad hoc network 22 including the plurality of mobile nodes 30, and the plurality of wireless communication links 32 connecting the plurality of mobile nodes together.
  • each mobile node has a router 40 that includes the communications device 42 to wirelessly and unidirectionally or bi-directionally communicate with other via the wireless communication links, and a controller 44 to route communications via the communications device.
  • the controller 44 includes a route discovery unit 50 to transmit quality-of-service (QoS) route requests to other nodes to discover routing to a destination node based upon at least one QoS parameter.
  • QoS tag calculation unit 60 calculates the node QoS tag value to make traffic admission control decisions.
  • a traffic admission controller 62 determines whether to admit traffic in response to QoS route requests based upon the calculated QoS tag value and the QoS parameter of QoS route requests.
  • the controller 44 may also include a connectivity calculator 64 to calculate route and connectivity information associated with the node, which may be transmitted to other nodes for traffic route selection.
  • the QoS tag calculation unit 60 may query other nodes within a range for information regarding at least one QoS metric, and process the QoS metric information received from the other nodes and the at least one node specific QoS metric to calculate the node QoS tag value. Also, the QoS tag calculation unit 60 may verify that each other node within the range has replied with QoS metric information.
  • the route request processing unit 52 replies to QoS route requests to indicate whether the node can support the QoS parameter of the route request and admit the traffic. Also, the route request processing unit 52 may indicate what traffic routing the node can support based upon the node QoS tag value, when the node cannot support the QoS parameter of the route request.
  • the network 22 includes the plurality of wireless mobile nodes 30 and the plurality of wireless communication links 32 connecting the plurality of nodes together.
  • the method begins at block 300 and includes nodes transmitting quality-of-service (QoS) route requests RREQQ to discover traffic routing based upon a QoS parameter (block 302) as described in the other embodiments.
  • QoS route requests RREQQ include at least the traffic flow identifier.
  • each node calculates a node QoS tag value to make traffic admission control decisions, and each node determines whether to admit traffic in response to QoS route requests based upon the calculated QoS tag value and the QoS parameter of QoS route requests (block 306) . Also, at block 308, each node replies to QoS route requests to indicate whether the node can support the QoS parameter of the route request and admit the traffic. However, in this embodiment, each node polices admitted traffic based upon the traffic flow identifier to ensure that admitted traffic does not exceed the QoS parameter of the QoS route request RREQQ (block 310) .
  • the QoS parameter may be based upon available bandwidth, error rate, end-to-end delay, end-to-end delay variation, hop count, expected path durability, and/or priority, for example, while the node specific QoS tag value may be a function of at least one of available power, available bandwidth by the node, recent error rate, recent delay, available bandwidth by other nodes within a range, and node queue size, for example.
  • the node polices itself to ensure that the admitted traffic does not exceed the requested bandwidth.
  • the method preferably includes each node preventing propagation of traffic that exceeds the QoS parameter of the QoS route request (block 312) .
  • This step may include buffering traffic that exceeds the QoS parameter of the QoS route request, and propagating buffered traffic at the QoS parameter of the QoS route request.
  • each node may propagate buffered traffic when required resources become available, or simply discard traffic that exceeds the QoS parameter of the QoS route request.
  • replying to QoS route requests may comprise indicating what traffic routing the node can support based upon the node QoS tag value, when the node cannot support the QoS parameter of the route request.
  • the controller 44 includes a traffic policing unit 84 to police the admitted traffic based upon the traffic flow identifier to ensure that admitted traffic does not exceed the QoS parameter of the QoS route request. Also, the traffic policing unit 84 preferably includes an excess traffic buffer 86 for storing the excess traffic.
  • the traffic flow ID is used in route tables and in the QoS packets (both control and data) .
  • this provides an identifier for performing admission control.
  • the source node that has obtained a reservation for a path of a certain capacity, for example, to the destination node can use the flow ID and meter the traffic to perform policing of the traffic. This guarantees that it never admits more than agreed upon capacity for that flow ID.
  • each node in the path to the destination can perform policing against the allocated capacity.
  • criteria other than the available capacity could be used as a criteria for deciding whether to support a given flow request. For example, a node running low on battery power may not want to support a given traffic flow. Then in this case, the RREQQ message can be ignored thereby disallowing use of the node as a forwarding node for the requested traffic flow.
  • the network 24 again includes a plurality of wireless mobile nodes 30 and a plurality of wireless communication links 32 connecting the plurality of nodes together.
  • the method begins at block 400 (FIG. 14) and includes each node monitoring traffic communicated between nodes 30 in the network 24 (block 402) .
  • Each node 30 generates traffic information based upon how much traffic is being communicated between various nodes in the network 24 (block 404) , and each node stores the traffic information locally in a buffer as a traffic database (block 406) .
  • the traffic information is preferably based upon bandwidth and may include error rate, end-to-end delay, end-to-end delay variation, hop count, expected path durability, and/or priority.
  • the traffic database may comprise a 1-hop traffic matrix.
  • the database for a specific node 1 would include traffic information for each link 32 between nodes 2-8 in the network.
  • node 1 needs a traffic route A to node 6.
  • nodes 7 and 8 are sending large amounts of traffic, but nodes 1-6 are not, it would be better to route traffic through 1-2-3-4-5-6 rather than 1-7-8-6 even though it would result in more hops.
  • the method may be advantageous to routing protocol selection, protocol parameter optimization, and route selection.
  • a traffic matrix is shown in the example below. For a 7 node network, each element in the matrix denotes how much traffic, if any, is being sent from the source node on that row to the destination node on that column.
  • the traffic is quantified in terms bandwidth over some interval (recent bandwidth used may be weighted more) , and may include packet loss rate, delay, etc. If the traffic matrix is sparsely populated (lots of zero or near zero bandwidth entries) , a reactive routing protocol would be more advantageous, since routes are not constantly updated that will not be used anyway. Conversely, a dense traffic matrix would indicate lots of interaction between nodes 30 and a proactive or hybrid protocol may provide benefits. Accordingly, the method may include each node selecting a route discovery protocol, such as a reactive, proactive or hybrid protocol, based upon the stored traffic information and (block 412) .
  • a route discovery protocol such as a reactive, proactive or hybrid protocol
  • TRAFFIC DATABASE Nodes know what traffic they are sending, receiving and forwarding. To know traffic they are not directly involved with, they can monitor or be explicitly sent messages containing traffic data. Routing protocols such as DSR that collect route information promiscuously (by hearing other nodes' requests RREQ and replies RREP, or by observing the source route in data packets) could be adapted to build much of the traffic matrix. Link-state routing protocols, such as optimized link state routing (OLSR) , already share route information, and could be extended to share traffic matrix information, since each node knows what it sends to whom, and at what quality. Also, a protocol could set timers according to expected delays through a sequence of hops, based upon the traffic matrix bandwidths, since it will know what delays to expect due to traffic congestion. This may reduce or eliminate unnecessary timeouts from occurring.
  • OLSR optimized link state routing
  • each node 30 may generate traffic destination information based upon how many destinations each of various nodes communicates with in the network 24, and store (block 410) the traffic destination information in a destination quantity database.
  • each node 30 may also discover and select traffic routes based upon the stored traffic destination information.
  • the destination quantity database would reveal the number of destinations that each of the particular nodes is communicating with.
  • the controller 44 of a router 40 in a network 24 includes a traffic monitoring unit 70 to monitor traffic communicated between nodes 30 in the network.
  • a traffic information generator 76 generates traffic information based upon how much traffic is being communicated between various nodes in the network, and a traffic information buffer 78 stores the traffic information in a traffic database.
  • the traffic monitoring unit 70 may broadcast a traffic activity query, and processes replies to the traffic activity query. Alternatively, the traffic monitoring unit 70 may passively monitor the traffic between nodes 30 in the network 24.
  • the route discovery unit 50 discovers routing to a destination node based upon the stored traffic information, and the route selection unit 58 selects traffic routes to the destination node based upon the stored traffic information.
  • the route discovery unit 50 may process the traffic information stored in the traffic database to select one of a reactive, proactive and hybrid route discovery process, and discovers traffic routes with the selected route discovery process.
  • Each traffic route comprises a combination of wireless communication links 32.
  • a traffic destination information generator 72 generates traffic destination information based upon how many destinations each of various nodes 30 communicates with in the network 24, and a destination information buffer 74 stores the traffic destination information in a destination quantity database.
  • the route discovery unit 50 may also discover routing to a destination node based upon the stored traffic destination information, and the route selection unit 58 may select traffic routes to the destination node based upon the stored traffic destination information.
  • Another embodiment of the present invention provides dynamic channel allocation in the mobile ad hoc network to efficiently make use of a plurality of channels.
  • the network 26 includes a plurality of wireless mobile nodes 30 and a plurality of wireless communication links 32 connecting the plurality of nodes together over a plurality of channels.
  • IEEE 802.11 spinoffs like 802.11a will make use of the ISM spectrum in the 5 GHz band. In this band, there is more bandwidth available to support many channels. As a result, a process to automatically assign a channel to an 802.11 node would be important. Such a channel decision would be based on current channel utilization and sampling of the other channels. Using dynamic channel selection would provide better performance since the spectrum would be used evenly. Additionally, channel use could be throttled such that QoS is maintained for current stations using the channel .
  • the method begins at block 500 (FIG. 18) and ' includes each node 30 monitoring link performance on a first channel.
  • Link performance is based upon a quality of service (QoS) threshold, such as bandwidth, error rate, end-to-end delay, end-to-end delay variation, hop count, expected path durability, and priority, for example.
  • QoS quality of service
  • each node scouts one or more other available channels when the monitored link performance on the first channel falls below the QoS threshold, for example, minimum bandwidth or maximum delay.
  • Scouting may include periodically monitoring other channels for link performance. Scouting may comprise switching to a second channel
  • each node 30 may switch back to the first channel and broadcast a channel change message if the link performance on the second channel is above the QoS threshold (block 506) , or switch to subsequent channels and broadcast channel activity queries to determine the link performance for the those channels if the link performance on the previous channel is below the QoS threshold (block 504) .
  • scouting may comprise switching to another channel (block 512) , and passively monitoring the link performance for the second channel at block 514.
  • each node 30 may switch back to the first channel and broadcast a channel change message if the link performance on the second channel is above the QoS threshold (block 506) , or switch to subsequent channels and passively monitor the link performance for those channels if the link performance on the previous channel is below the QoS threshold (block 504) .
  • each node 30 may store link performance information of each of the plurality of channels (block 508) and/or store channel information for neighboring nodes at block 510. In other words, each node 30 may keep track of what channel other nodes are using.
  • the network 26 includes nodes 30 and links 32.
  • Nodes 1A-5A are currently using a first channel, while nodes 1B-5B are currently using a second channel.
  • Node 2B determines that the link performance for the second channel is falling or has fallen below a QoS threshold, such as below a minimum bandwidth.
  • Node 2B switches to the first channel and broadcasts a channel activity query CAQ to nodes within 1-hop of node 2B (FIG. 16) .
  • Nodes IA, 2A and 3A send channel activity replies CAR to node 2B with information on the link performance of the first channel (FIG. 17) .
  • node 2B If the bandwidth on the first channel is acceptable to node 2B, it will return to the second channel and broadcast a channel change message to inform any nodes IB, 3B, 4B and 5B that it is changing to the first channel. These nodes would then note where node 2B can be found for future reference. If the bandwidth is not acceptable, node 2B will move to a third channel and repeat the steps. If all channels have been visited and node 2B has not found bandwidth above the QoS threshold, then it will select the best one, and may periodically search for a better channel.
  • a system aspect of this embodiment of the present invention is directed to the mobile ad hoc network 26 having a plurality of mobile nodes 30, and a plurality of wireless communication links 32 connecting the plurality of mobile nodes together over a plurality of channels.
  • each mobile node comprises a router 40 having a communications device 42 to wirelessly and unidirectionally or bi-directionally communicate with other nodes via the wireless communication links 32, and a controller 40 to route communications via the communications device.
  • the controller 40 includes a link performance monitor 80 to monitor link performance on a first channel.
  • a channel scouting unit 82 scouts one or more other available channels when the monitored link performance on the first channel falls below the QoS threshold.
  • the channel scouting unit 82 switches to a second channel, broadcasts a channel activity query to determine the link performance for the second channel, and processes replies to the channel activity query to determine the link performance for the second channel. Also, the channel scouting unit 82 switches back to the first channel and broadcasts a channel change message if the link performance on the second channel is above the QoS threshold, or switches to subsequent channels and broadcasts channel activity queries to determine the link performance for those channels if the link performance on the previous channel is below the QoS threshold. Alternatively, the channel scouting unit 82 may switch to another channel and passively monitor the link performance for the second channel.
  • a link performance information memory 66 stores the link performance information of each of the plurality of channels
  • a channel information memory 68 stores channel information for neighboring nodes .

Abstract

The method includes nodes transmitting quality-of-service (QoS) route requests to discover traffic routing based upon a QoS parameter (102), and the QoS route requests including a traffic flow identifier. Each node calculates a node QoS tag value to make traffic admission control decisions, and each node determines whether to admit traffic in response to QoS route requests based upon the calculated QoS tag value and the QoS parameter of QoS route requests (104). Also, each node replies to QoS route requests to indicate whether the node can support the QoS parameter of the route request and admit the traffic (110), and each node polices admitted traffic based upon the traffic flow identifier to ensure that admitted traffic does not exceed the QoS parameter of the QoS route request (118).

Description

TRAFFIC POLICING IN A MOBILE AD HOC NETWORK
Field of the Invention
The present invention relates to the field of communication networks, and, more particularly, to mobile ad hoc wireless networks and related methods.
Background of the Invention Wireless networks have experienced increased development in the past decade. One of the most rapidly developing areas is mobile ad hoc networks. Physically, a mobile ad hoc network includes a number of geographically- distributed, potentially mobile nodes sharing a common radio channel. Compared with other type of networks, such as cellular networks or satellite networks, the most distinctive feature of mobile ad hoc networks is the lack of any fixed infrastructure. The network is formed of mobile nodes only, and a network is created on the fly as the nodes transmit with each other. The network does not depend on a particular node and dynamically adjusts as some nodes join or others leave the network.
In a hostile environment where a fixed communication infrastructure is unreliable or unavailable, such as in a battle field or in a natural disaster area struck by earthquake or hurricane, an ad hoc network can be quickly deployed and provide limited but much needed communications . While the military is still a major driving force behind the development of these networks, ad hoc networks are quickly finding new applications in civilian or commercial areas. Ad hoc networks will allow people to exchange data in the field or in a class room without using any network structure except the one they create by simply turning on their computers or PDAs. As wireless communication increasingly permeates everyday life, new applications for mobile ad hoc networks will continue to emerge and become an important part of the communication structure. Mobile ad hoc networks pose serious challenges to the designers. Due to the lack of a fixed infrastructure, nodes must self-organize and reconfigure as they move, join or leave the network. All nodes are essentially the same and there is no natural hierarchy or central controller in the network. All functions have to be distributed among the nodes. Nodes are often powered by batteries and have limited communication and computation capabilities. The bandwidth of the system is usually limited. The distance between two nodes often exceeds the radio transmission range, and a transmission has to be relayed by other nodes before reaching its destination. Consequently, a network has a multihop topology, and this topology changes as the nodes move around.
The Mobile Ad-Hoc Networks (MANET) working group of the Internet Engineering Task Force (IETF) has been actively evaluating and standardizing routing, including multicasting, protocols. Because the network topology changes arbitrarily as the nodes move, information is subject to becoming obsolete, and different nodes often have different views of the network, both in time (information may be outdated at some nodes but current at others) and in space (a node may only know the network topology in its neighborhood and not far away from itself) .
A routing protocol needs to adapt to frequent topology changes and with less accurate information. Because of these unique requirements, routing in these networks are very different from others. Gathering fresh information about the entire network is often costly and impractical. Many routing protocols are reactive (on-demand) protocols: they collect routing information only when necessary and to destinations they need routes to, and do not maintain unused routes. This way the routing overhead is greatly reduced compared to pro-active protocols which maintain optimal routes to all destinations at all time. This is important for a protocol to be adaptive. Ad Hoc on Demand Distance Vector
(AODV) , Dynamic Source Routing (DSR) and Temporally Ordered Routing Algorithm (TORA) are representatives of on-demand routing protocols presented at the MANET working group.
Examples of other various routing protocols include Destination Sequenced Distance-Vector (DSDV) routing which is disclosed in U.S. Patent No. 5,412,654 to Perkins, and Zone Routing Protocol (ZRP) which is disclosed in U.S. Patent No. 6,304,556 to Haas. ZRP is a hybrid protocol using both proactive and reactive approaches. These conventional routing protocols use a best effort approach in selecting a route from the source node to the destination node. Typically, the number of hops is the main criteria in such a best effort approach. In other words, the route with the least amount of hops is selected as the transmission route.
Quality-of-service (QoS) routing in mobile ad hoc networks is gaining interest. To provide quality-of-service, the protocol needs not only to find a route but also to secure the resources along the route. Because of the limited, shared bandwidth of the network, and lack of central controller which can account for and control these limited resources, nodes must negotiate with each other to manage the resources required for QoS routes. This is further complicated by frequent topology changes. Due to these constraints, QoS routing is more demanding than best-effort routing.
Some examples of QoS routing approaches are set forth by Chenxi Zhu in the publication entitled "Medium Access Control and Quality-of-Service Routing for Mobile Ad Hoc Networks," 2001, and by M. Mirhakkak et al. in the publication entitled "Dynamic Quality-of-Service for Mobile Ad Hoc Networks," MITRE Corp., 2000. Zhu discusses establishing bandwidth guaranteed QoS routes in small networks whose topologies change at a low to medium rate. Mirhakkak et al. are concerned with resource reservation requests which specify a range of QoS values while the network makes a commitment to provide service within this range.
At each node, admission control is performed to forward traffic from other nodes. Typically, conventional admission control protocols provide for full disclosure regarding routes and connectivity. In other words, each node shares all route and connectivity data with other nodes so that the best-effort routes are selected overall.
Summary of the Invention
In view of the foregoing background, it is therefore an object of the present invention to provide traffic policing for multihop routes in a mobile ad hoc network.
This and other objects, features, and advantages in accordance with the present invention are provided by a method for policing traffic admission control in a mobile ad hoc network. The network includes a plurality of wireless mobile nodes and a plurality of wireless communication links connecting the plurality of nodes together. The method includes nodes transmitting quality-of-service (QoS) route requests to discover traffic routing based upon a QoS parameter, and the QoS route requests including a traffic flow identifier. Each node calculates a node QoS tag value to make traffic admission control decisions, and each node determines whether to admit traffic in response to QoS route requests based upon the calculated QoS tag value and the QoS parameter of QoS route requests. Also, each node replies to QoS route requests to indicate whether the node can support the QoS parameter of the route request and admit the traffic, and each node polices admitted traffic based upon the traffic flow identifier to ensure that admitted traffic does not exceed the QoS parameter of the QoS route request.
The QoS parameter may comprise a requirement based upon at least one of available bandwidth, error rate, end-to- end delay, end-to-end delay variation, hop count, expected path durability, and priority, while the node specific QoS tag value may be a function of at least one of available power, available bandwidth by the node, recent error rate, recent delay, available bandwidth by other nodes within a range, and node queue size. The method may also include each node preventing propagation of traffic that exceeds the QoS parameter of the QoS route request. This may include buffering traffic that exceeds the QoS parameter of the QoS route request, and propagating buffered traffic at the QoS parameter of the QoS route request. Alternatively, each node may propagate buffered traffic when required resources become available, or simply discard traffic that exceeds the QoS parameter of the QoS route request. Furthermore, replying to QoS route requests may comprise indicating what traffic routing the node can support based upon the node QoS tag value, when the node cannot support the QoS parameter of the route request.
A system aspect of the present invention is directed to a mobile ad hoc network having a plurality of mobile nodes, and a plurality of wireless communication links connecting the plurality of mobile nodes together. Each mobile node comprises a communications device to wirelessly and unidirectionally or bi-directionally communicate with other nodes of the plurality of nodes via the wireless communication links, and a controller to route communications via the communications device. The controller includes a route discovery unit to transmit quality-of-service (QoS) route requests to other nodes to discover routing to a destination node based upon at least one QoS parameter, and the QoS route requests including a traffic flow identifier. Also, a QoS tag calculation unit calculates a node QoS tag value to make traffic admission control decisions, and a traffic admission controller determines whether to admit traffic in response to QoS route requests based upon the calculated QoS tag value and the QoS parameter of QoS route requests. Furthermore, a route request processing unit replies to QoS route requests to indicate whether the node can support the QoS parameter of the route request and admit the traffic, and a traffic policing unit polices admitted traffic based upon the traffic flow identifier to ensure that admitted traffic does not exceed the QoS parameter of the QoS route request.
Brief Description of the Drawings
FIGs. 1-4 are schematic diagrams of a mobile ad hoc network including QoS routing in accordance with the present invention.
FIG. 5 is a flowchart illustrating the method steps for QoS routing in a mobile ad hoc network in accordance with the present invention.
FIG. 6 is a schematic diagram illustrating a router of a node in accordance with the network of the present invention. FIG. 7 is a schematic diagram illustrating the details of the controller of the router in FIG. 6.
FIGs. 8-10 are schematic diagrams of a mobile ad hoc network including admission control in accordance with the present invention. FIG. 11 is a flowchart illustrating the method steps for admission control in a mobile ad hoc network in accordance with the present invention. FIG. 12 is a flowchart illustrating the method steps for policing traffic admission control in a mobile ad hoc network in accordance with the present invention.
FIG. 13 is a schematic diagram of a mobile ad hoc network including traffic tracking in accordance with the present invention.
FIG. 14 is a flowchart illustrating the method steps for tracking traffic in a mobile ad hoc network in accordance with the present invention. FIGs. 15-17 are schematic diagrams of a mobile ad hoc network including dynamic channle allocation in accordance with the present invention.
FIG. 18 is a flowchart illustrating the method steps for dynamic channel allocation in a mobile ad hoc network in accordance with the present invention.
Detailed Description of the Preferred Embodiments
The present invention will now be described more fully hereinafter with reference to the accompanying drawings, in which preferred embodiments of the invention are shown. This invention may, however, be embodied in many different forms and should not be construed as limited to the embodiments set forth herein. Rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the scope of the invention to those skilled in the art. Like numbers refer to like elements throughout, and prime notation is used to indicate similar elements in alternative embodiments .
As will be appreciated by those skilled in the art, portions of the present invention may be embodied as a method, data processing system, or computer program product. Accordingly, these portions of the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment, or an embodiment combining software and hardware aspects. Furthermore, portions of the present invention may be a computer program product on a computer- usable storage medium having computer readable program code on the medium. Any suitable computer readable medium may be utilized including, but not limited to, static and dynamic storage devices, hard disks, optical storage devices, and magnetic storage devices.
The present invention is described below with reference to flowchart illustrations of methods, systems, and computer program products according to an embodiment of the invention. It will be understood that blocks of the illustrations, and combinations of blocks in the illustrations, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, implement the functions specified in the block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory result in an article of manufacture including instructions which implement the function specified in the flowchart block or blocks. The computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart block or blocks.
Referring initially to FIGs. 1-5, a method for determining a route from a source node to a destination node in a mobile ad hoc network 20 will now be described. The network 20 includes a plurality of mobile nodes 30 including the source node 1 and the destination node 4 with intermediate nodes 2, 3 and 5 therebetween. The nodes 30, such as laptop computers, personal digital assistants (PDAs) or mobile phones, are connected by wireless communication links 32 as would be appreciated by the skilled artisan. The method begins (block 100) and includes transmitting a quality-of-service (QoS) route request RREQQ from the source node 1 to discover routing to the destination node 4 based upon a QoS parameter, as indicated at block 102 in FIG. 5. The QoS parameter is preferably based upon available bandwidth, error rate, end-to- end delay, end-to-end delay variation, hop count, expected path durability, and/or priority as will be discussed in further detail below. The route request RREQQ includes a QOS flow identifier and an updatable QoS link metric.
Furthermore, at block 104, the method includes each intermediate node 2, 3 and 5 determining whether the node can support the requested QoS parameter of the QoS route request RREQQ. If the node cannot support the QoS parameter of a particular request RREQQ, then the request is denied or simply not forwarded by the node (block 106) . If the node, for example node 3, can support the QoS parameter of a particular request RREQQ, then the node updates the QoS link metric, forwards the QoS route request to other intermediate nodes 2 and 5, and temporarily reserves node resources for that QoS route request (block 108) . Intermediate nodes 2 and 5 also must determine whether they can supp rt the requested QoS parameter of the QoS route request RREQQ forwarded from node 3. If so, the route request RREQQ with the updated QoS link metric is then forwarded to the destination node 4.
The destination node 4, upon receiving the QoS route request RREQQ, generates a reply RREPQ to the source node 1 including the flow identifier and updated QoS link metric for each discovered route (block 110) . In other words, the destination node 4 may have received the forwarded route request RREQQ from any of various possible routes including, for example, 1-2-4 or 1-3-5-4. A reply RREPQ is generated in each case. At block 112, the source node 1 generates QoS route metrics based upon updated QoS link metrics in replies RREPQ from the destination node 4 for discovered routes. Also, at block 114, the source node 1 then selects a route to the destination node 4 based upon the QoS route metrics, and, at block 116, the source node transmits route confirmations CONFQ to intermediate nodes on the selected route. This is to confirm the use of the resources on the selected route that were temporarily reserved at block 108. Other temporarily reserved resources on discovered but non-selected routes may be permitted to time out by not transmitting CONFQ on those routes .
Also, the source node 1 may select at least one standby route either with or without sending confirmations CONFQ to the intermediate nodes on the standby route (block 122) . Such a standby route may be for duplicate transmissions, for additional reliability, or may be used as a backup route in case of route and/or QoS failure. At block 118, the intermediate nodes 2, 3 and 5, and/or the destination node 4, may detect at any time whether the node can continue to support the requested QoS parameter of the QoS route request RREQQ. If the node can continue to support the request RREQQ throughout propagation of the traffic, reserved resources and associated routes may be permitted to time out if determined inactive, at block 126, and be released, block 128, if not used for a period of time either by data traffic or by the sending of periodic CONFQ messages.
If the node cannot continue to support the request RREQQ, then the node generates a QoS error notification RERRQ to the source node 1 (block 120) . Here, the source node 1 may maintain the selected route, upon receiving the QoS error notification RERRQ, while again transmitting a quality-of- service (QoS) route request RREQQ to discover a new routing path to the destination node 4 based upon the QoS parameter (block 102) . The source node 1 may also switch to the standby route upon receiving the QoS error notification RERRQ (block 124) .
The described method can be applied to any type of On-Demand or Reactive routing protocol, such as Dynamic Source Routing (DSR) or Ad-Hoc On-Demand Distance Vector (AODV) routing, or to any hybrid proactive/reactive protocol, such as Zone Routing Protocol (ZRP) , as would be appreciated by the skilled artisan.
A more specific example considering minimum bandwidth allocation and a maximum delay constraint as categories of QoS will now be described. For a fixed bandwidth allocation it is assumed that a node 30 is able to reserve a certain amount of capacity or bandwidth. Again, source node 1 of a traffic flow will send the QoS Route Request RREQQ for each required flow (the last Q in the notation indicates a QoS request) . The RREQQ message performs the function of discovering a route that can support the required QoS. Nodes that forward the RREQQ to the destination 4 will note if they can meet the requested QoS before passing on the RREQQ and they will temporarily reserve resources if needed. A Route Reply RREPQ packet is returned from the destination with an indication that the requested QoS can be met over that path. The source node 1 may then collect multiple potential paths to the destination 4 before deciding upon the best choice to provide the desired QoS. Once this path is determined, a Confirm CONFQ message is sent to the destination 4 along the indicated path. Along the way on this path any temporary resource reservations are confirmed to be permanent reservations. QoS reservations are timed out if not used for a specified period of time. If a link fails along the route or if the QoS requirement cannot be met, a Route Error (RERRQ) packet is generated and returned to the source node.
More specifically, when a new QoS route is needed to a given destination node 4, the source node 1 broadcasts a RREQQ packet to the destination node. This is a special type of packet similar to the conventional RREQ packet used in a protocol such as DSR or AODV. The conventional RREQ broadcast is used for "best effort" service. The method of the present invention may still follow the conventional procedures established by the protocol for best effort service.
If a specified minimum capacity or bandwidth is required for a traffic flow, the special RREQQ packet is used to reserve a flow at a specified capacity to the destination 4. In this case, a flow ID is assigned to the RREQQ by the source node 1 which combined with the source node address uniquely identifies the flow to any node in the network 20 that is forwarding the flow. The RREQQ packet also indicates the capacity that is to be reserved. At each node 2, 3 and 5 in the path to the destination 4, the minimum capacity or bandwidth requirement is checked against available capacity to determine if a reservation can be made for the flow. If the node can accommodate the required traffic flow, then the capacity is temporarily reserved for that flow ID. This temporary reservation is released if a CONFQ message is not received within a short period of time. If the RREQQ is meant to insure that a path can be found that does not exceed a specified maximum delay, then each node along the path must be able to estimate its contribution to the total path delay and check to see if the total delay along the path so far plus its contribution exceeds the specified maximum delay bound.
Unlike conventional application of DSR and AODV for "best effort" traffic, the RREQQ must be allowed to propagate all the way to the destination node 4 to determine if a valid path exists that satisfies the QoS requirement. If such a path is found, then the destination node 4 generates a RREPQ message to be returned to the source node 1. This message indicates to the source node that a valid path has been found to the destination node 4 that satisfies the requested QoS and a route has been established (in the case of DSR a source route is returned) . Estimated path delay is included in the RREPQ for a request seeking a delay guarantee as well as for a path guaranteeing capacity.
The source node 1 may receive multiple RREPQ for paths to the destination node 4 that can meet the required QoS. It will rank order these and send out a CONFQ message indicating its selection of a path on the highest ranked path. The other paths may be kept as backup paths, but if the CONFQ is not sent on these paths, there is no guarantee that the required resources will be available if needed as a backup alternate path.
If at any intermediate node 2, 3 and 5 or the destination node 4, the requested QoS is violated and cannot be satisfied, then the RREQQ packet is discarded knowing that the path through this node cannot satisfy the requested QoS. However, other paths may be found by the discovery process. If at any time a link fails along the route or if the QoS requirement cannot be met, a Route Error RERRQ packet is generated and returned to the source node 1 for each traffic flow affected by the failure. In this case either a backup path must be used or the route discovery process is initiated again. The described procedures are easily applied to the DSR protocol. The conventional DSR message types RREQ, RREP, RRER are defined as optional packet types, and can be used as defined for the conventional operation of the protocol to support "best effort" traffic in a backwards compatibility mode. New optional packet types are defined to support QoS including the RREQQ, RREPQ, RRERQ, and CONFQ packet types to be used for managing QoS paths. Definition of the required header fields for these types is straightforward based on the functions defined above. A special type of QoS source routed packet for QoS mission data would also be included. This packet would include the flow ID to identify which flow the packet belonged and to allow for metering of flow traffic.
The following procedures would be used if a failure causes a node to issue a RERRQ packet. If a RERRQ packet is received at the source node, then the current route is discarded and a backup route is tried. The first packet sent on the backup route will be another type of special QoS source routed packet, the RREQT, that includes the flow ID and the QoS parameters. This packet could also include mission data.
Each node along the path will have to check to see if they are still maintaining a temporary reservation for the flow. If not they will recheck to see if they can support the flow and make a temporary reservation. If the packet reaches the destination with the flow supported at each intermediate node, then the destination node will return a RREPQ packet notifying the source that the path is valid.
If any node cannot support the flow, then the packet is discarded and the node returns a RERRQ packet to the source node notifying it that the path cannot support the requested QoS parameters. If the source node receives a RREPQ packet, then it sends a CONFQ message along the selected path confirming the choice of path in addition to continuing to send the mission data for that traffic flow. If the source node receives a RERRQ packet, then it tries the same procedure on the next available backup path. If the source node has no more backup source routes to the destination, the source node begins another route discovery process for a new QoS path to the destination node. Mission data flow is interrupted until a new route is found. For any specific protocol, the data structures required to manage the resources allocated to each traffic flow can be defined, and how to identify the flows and how to look up the routes assigned to each flow can also be defined.
Referring now additionally to Figs. 6 and 7, a system aspect of the invention will be described. A mobile ad hoc network 20 includes a plurality of mobile nodes 30, and a plurality of wireless communication links 32 connecting the plurality of mobile nodes together. Each mobile node includes a router 40 (FIG. 6) that has a communications device 42 to wirelessly and uni-directionally or bi-directionally communicate with other nodes via the wireless communication links 32, and a controller 44 to route communications via the communications device 42. Also, a memory 46 may be included as part of the controller 44 or in connection with the controller.
As shown in FIG. 7, the controller 44 includes a route discovery unit 50 to transmit the quality-of-service (QoS) route requests to other nodes to discover routing to a destination node based upon at least one QoS parameter. Again, the route request includes a flow identifier and a QoS link metric. Also, a route request processing unit 52 determines whether the node can support a requested QoS parameter of a QoS route request and to update the QoS -link metric, and a temporary resource reservation table 54 contains temporary node resource reservations for QoS route requests having supportable QoS parameters. Furthermore, a route metric formation unit 56 generates QoS route metrics based upon updated QoS link metrics in replies from nodes with node resource reservations, and a route selection unit 58 selects a route to the destination node based upon the QoS route metrics and to transmit route confirmations to nodes on a selected route.
The route selection unit 58 may select a standby route, such as for backup or duplicate transmissions, with or without sending confirmations CONFQ to the nodes on the standby route. The route request processing unit 52 detects whether the node can continue to support the requested QoS parameter of the QoS route request and, if not, generates the QoS error notification RERRQ. The route selection unit 58 preferably maintains the selected route, upon receiving a QoS error notification from another node, while the route discovery unit 50 transmits another quality-of-service (QoS) route request RREQQ to discover new routing to the destination node based upon the QoS parameter. The route selection unit 58 may switch to the standby route upon receiving the QoS error notification RERRQ from another node. Another embodiment of the present invention provides traffic admission control for multihop routes in the mobile ad hoc network 22 while maintaining the quality of service needed, and will be described with reference to FIGs. 8-11. Such an admission control method will adaptively allow a node to keep some resources for its own traffic, while sharing fairly in the forwarding of other's traffic. Again, the ad- hoc network is made up of a plurality of wireless mobile nodes 30 and a plurality of wireless communication links 32 connecting the plurality of nodes together. The method for controlling traffic admission in the mobile ad hoc network 22 begins (block 200) and includes a source node transmitting quality-of-service (QoS) route requests RREQQ to discover traffic routing based upon a QoS parameter (block 202) . At block 208, each node 30 in the network 22 calculates a node QoS tag value to make traffic admission control decisions. The node QoS tag value is a function of at least one node specific QoS metric. The QoS parameter may be based upon, for example, bandwidth, error rate, end-to-end delay, end-to-end delay variation, hop count, expected path durability, and/or priority, while the node specific QoS metric may include one or more of available power, available bandwidth by the node, recent error rate, recent delay, available bandwidth by other nodes within a range, and node queue size, for example. The QoS tag value may be a weighted sum of each term, or a vector with each term as an element.
Each node 30 determines admission based upon the calculated QoS tag value and the QoS parameter of QoS route requests RREQQ, and may reply to the source node, regarding whether traffic will be admitted in response to the QoS route requests (block 214) . Furthermore, each node 30 may calculate route and connectivity information associated with the node (block 210) , and transmit the route and connectivity information and the QoS tag value to other nodes for traffic route selection (block 212) .
Calculating the node QoS tag value 208 may include querying other nodes within a range for information regarding at least one QoS metric (block 204) , and processing the QoS metric information received from the other nodes and the at least one node specific QoS metric to calculate the node QoS tag value. Calculating the node QoS tag value may further comprise verifying that each other node within the range has replied with QoS metric information (block 206) . More specifically, most of the QoS metric terms such as available power, available bandwidth by the node, recent error rate, recent delay, and node queue size, are known locally to the node. However, available bandwidth by other nodes within a range, for example, is not known locally. Thus, referring to FIG. 8, if node 1 issues a request to node 4 for 5 Mbps of an 11 Mbps transmission medium, node 4 must check to see if any other nodes in range (here nodes 1, 3 and 5) have already made prohibitive commitments. So, node 4 broadcasts a CHECK message and any nodes within range that have committed bandwidth will send a CHECK REPLY back indicating such. Node 4 makes sure that it has heard a CHECK REPLY from all nodes that it has heard from lately. With the received information, node 4 can now make a decision on whether it can support the QoS parameter of the route request RREQQ.
Replying to QoS route requests (block 214) may comprise indicating what traffic routing the node can support based upon the node QoS tag value, when the node cannot support the QoS parameter of the route request. For example, if node 4 cannot commit to the request, it may issue a reply that describes the most that it can support. Accordingly, the source can decide whether the level is good enough or whether to scale back the request and issue a relaxed QoS request RREQQ . As discussed, conventional approaches provide full disclosure regarding routes and connectivity. In other words, each node 30 shares all that it knows with others, so that "best" (usually fewest hops) routes are selected overall. In this invention, this route and connectivity information is tagged with a value that allows other nodes to use it based on the Quality of Service needed. Additionally, the node sharing the information can decide on the level of QoS that will be allowed to use that information. This decision can be based on a common set of rules, or per node since some nodes will be advantaged. For example, a node that finds itself forwarding many packets, whose battery is running out, and is having trouble finding bandwidth for its own traffic may advertise his routes and connectivity to certain other nodes with a tag that disallows all but the most important (high priority) packets .
A system aspect of this embodiment of the present invention is directed to the mobile ad hoc network 22 including the plurality of mobile nodes 30, and the plurality of wireless communication links 32 connecting the plurality of mobile nodes together. As described earlier with reference to FIGs. 6 and 7, each mobile node has a router 40 that includes the communications device 42 to wirelessly and unidirectionally or bi-directionally communicate with other via the wireless communication links, and a controller 44 to route communications via the communications device. The controller 44 includes a route discovery unit 50 to transmit quality-of-service (QoS) route requests to other nodes to discover routing to a destination node based upon at least one QoS parameter. Here, a QoS tag calculation unit 60 calculates the node QoS tag value to make traffic admission control decisions. A traffic admission controller 62 determines whether to admit traffic in response to QoS route requests based upon the calculated QoS tag value and the QoS parameter of QoS route requests.
The controller 44 may also include a connectivity calculator 64 to calculate route and connectivity information associated with the node, which may be transmitted to other nodes for traffic route selection. The QoS tag calculation unit 60 may query other nodes within a range for information regarding at least one QoS metric, and process the QoS metric information received from the other nodes and the at least one node specific QoS metric to calculate the node QoS tag value. Also, the QoS tag calculation unit 60 may verify that each other node within the range has replied with QoS metric information.
Furthermore, the route request processing unit 52 replies to QoS route requests to indicate whether the node can support the QoS parameter of the route request and admit the traffic. Also, the route request processing unit 52 may indicate what traffic routing the node can support based upon the node QoS tag value, when the node cannot support the QoS parameter of the route request.
Another embodiment of the present invention provides traffic policing for multihop routes in a mobile ad hoc network 22, and will be described with reference to FIG. 12. as previously described, the network 22 includes the plurality of wireless mobile nodes 30 and the plurality of wireless communication links 32 connecting the plurality of nodes together. The method begins at block 300 and includes nodes transmitting quality-of-service (QoS) route requests RREQQ to discover traffic routing based upon a QoS parameter (block 302) as described in the other embodiments. Here, the QoS route requests RREQQ include at least the traffic flow identifier. At block 304, each node calculates a node QoS tag value to make traffic admission control decisions, and each node determines whether to admit traffic in response to QoS route requests based upon the calculated QoS tag value and the QoS parameter of QoS route requests (block 306) . Also, at block 308, each node replies to QoS route requests to indicate whether the node can support the QoS parameter of the route request and admit the traffic. However, in this embodiment, each node polices admitted traffic based upon the traffic flow identifier to ensure that admitted traffic does not exceed the QoS parameter of the QoS route request RREQQ (block 310) .
Again, the QoS parameter may be based upon available bandwidth, error rate, end-to-end delay, end-to-end delay variation, hop count, expected path durability, and/or priority, for example, while the node specific QoS tag value may be a function of at least one of available power, available bandwidth by the node, recent error rate, recent delay, available bandwidth by other nodes within a range, and node queue size, for example. In other words, if a request RREQQ includes a requirement for certain amount of bandwidth, for example, and the node admits the traffic associated with the request, then the node polices itself to ensure that the admitted traffic does not exceed the requested bandwidth.
The method preferably includes each node preventing propagation of traffic that exceeds the QoS parameter of the QoS route request (block 312) . This step may include buffering traffic that exceeds the QoS parameter of the QoS route request, and propagating buffered traffic at the QoS parameter of the QoS route request. Alternatively, each node may propagate buffered traffic when required resources become available, or simply discard traffic that exceeds the QoS parameter of the QoS route request. Furthermore, as described in the other embodiments, replying to QoS route requests may comprise indicating what traffic routing the node can support based upon the node QoS tag value, when the node cannot support the QoS parameter of the route request.
Referring again to FIG. 7, the controller 44 includes a traffic policing unit 84 to police the admitted traffic based upon the traffic flow identifier to ensure that admitted traffic does not exceed the QoS parameter of the QoS route request. Also, the traffic policing unit 84 preferably includes an excess traffic buffer 86 for storing the excess traffic.
More specifically, the traffic flow ID is used in route tables and in the QoS packets (both control and data) . As discussed, this provides an identifier for performing admission control. The source node that has obtained a reservation for a path of a certain capacity, for example, to the destination node can use the flow ID and meter the traffic to perform policing of the traffic. This guarantees that it never admits more than agreed upon capacity for that flow ID. In addition, each node in the path to the destination can perform policing against the allocated capacity. Of course criteria other than the available capacity could be used as a criteria for deciding whether to support a given flow request. For example, a node running low on battery power may not want to support a given traffic flow. Then in this case, the RREQQ message can be ignored thereby disallowing use of the node as a forwarding node for the requested traffic flow.
Another embodiment of the present invention provides traffic tracking for multihop routes in a mobile ad hoc network, and will be described with reference to FIGs. 13 and 14. As shown in FIG. 13, the network 24 again includes a plurality of wireless mobile nodes 30 and a plurality of wireless communication links 32 connecting the plurality of nodes together. The method begins at block 400 (FIG. 14) and includes each node monitoring traffic communicated between nodes 30 in the network 24 (block 402) . Each node 30 generates traffic information based upon how much traffic is being communicated between various nodes in the network 24 (block 404) , and each node stores the traffic information locally in a buffer as a traffic database (block 406) .
In the method, the traffic information is preferably based upon bandwidth and may include error rate, end-to-end delay, end-to-end delay variation, hop count, expected path durability, and/or priority. The traffic database may comprise a 1-hop traffic matrix. In other words, the database for a specific node 1 would include traffic information for each link 32 between nodes 2-8 in the network. In FIG. 13, node 1 needs a traffic route A to node 6. Here, if nodes 7 and 8 are sending large amounts of traffic, but nodes 1-6 are not, it would be better to route traffic through 1-2-3-4-5-6 rather than 1-7-8-6 even though it would result in more hops.
The method may be advantageous to routing protocol selection, protocol parameter optimization, and route selection. A traffic matrix is shown in the example below. For a 7 node network, each element in the matrix denotes how much traffic, if any, is being sent from the source node on that row to the destination node on that column. Here, the traffic is quantified in terms bandwidth over some interval (recent bandwidth used may be weighted more) , and may include packet loss rate, delay, etc. If the traffic matrix is sparsely populated (lots of zero or near zero bandwidth entries) , a reactive routing protocol would be more advantageous, since routes are not constantly updated that will not be used anyway. Conversely, a dense traffic matrix would indicate lots of interaction between nodes 30 and a proactive or hybrid protocol may provide benefits. Accordingly, the method may include each node selecting a route discovery protocol, such as a reactive, proactive or hybrid protocol, based upon the stored traffic information and (block 412) .
Figure imgf000025_0001
TRAFFIC DATABASE Nodes know what traffic they are sending, receiving and forwarding. To know traffic they are not directly involved with, they can monitor or be explicitly sent messages containing traffic data. Routing protocols such as DSR that collect route information promiscuously (by hearing other nodes' requests RREQ and replies RREP, or by observing the source route in data packets) could be adapted to build much of the traffic matrix. Link-state routing protocols, such as optimized link state routing (OLSR) , already share route information, and could be extended to share traffic matrix information, since each node knows what it sends to whom, and at what quality. Also, a protocol could set timers according to expected delays through a sequence of hops, based upon the traffic matrix bandwidths, since it will know what delays to expect due to traffic congestion. This may reduce or eliminate unnecessary timeouts from occurring.
Furthermore, at block 408, each node 30 may generate traffic destination information based upon how many destinations each of various nodes communicates with in the network 24, and store (block 410) the traffic destination information in a destination quantity database. Thus, each node 30 may also discover and select traffic routes based upon the stored traffic destination information. In other words, the destination quantity database would reveal the number of destinations that each of the particular nodes is communicating with.
Referring again to FIG. 7, the controller 44 of a router 40 in a network 24 in accordance with this embodiment, includes a traffic monitoring unit 70 to monitor traffic communicated between nodes 30 in the network. A traffic information generator 76 generates traffic information based upon how much traffic is being communicated between various nodes in the network, and a traffic information buffer 78 stores the traffic information in a traffic database. The traffic monitoring unit 70 may broadcast a traffic activity query, and processes replies to the traffic activity query. Alternatively, the traffic monitoring unit 70 may passively monitor the traffic between nodes 30 in the network 24. The route discovery unit 50 discovers routing to a destination node based upon the stored traffic information, and the route selection unit 58 selects traffic routes to the destination node based upon the stored traffic information. Also, the route discovery unit 50 may process the traffic information stored in the traffic database to select one of a reactive, proactive and hybrid route discovery process, and discovers traffic routes with the selected route discovery process. Each traffic route comprises a combination of wireless communication links 32. A traffic destination information generator 72 generates traffic destination information based upon how many destinations each of various nodes 30 communicates with in the network 24, and a destination information buffer 74 stores the traffic destination information in a destination quantity database. The route discovery unit 50 may also discover routing to a destination node based upon the stored traffic destination information, and the route selection unit 58 may select traffic routes to the destination node based upon the stored traffic destination information. Another embodiment of the present invention provides dynamic channel allocation in the mobile ad hoc network to efficiently make use of a plurality of channels. A method for dynamic channel allocation will be described while referring to FIGs. 15-18. Here, the network 26 includes a plurality of wireless mobile nodes 30 and a plurality of wireless communication links 32 connecting the plurality of nodes together over a plurality of channels. IEEE 802.11 spinoffs like 802.11a will make use of the ISM spectrum in the 5 GHz band. In this band, there is more bandwidth available to support many channels. As a result, a process to automatically assign a channel to an 802.11 node would be important. Such a channel decision would be based on current channel utilization and sampling of the other channels. Using dynamic channel selection would provide better performance since the spectrum would be used evenly. Additionally, channel use could be throttled such that QoS is maintained for current stations using the channel .
The method begins at block 500 (FIG. 18) and ' includes each node 30 monitoring link performance on a first channel. Link performance is based upon a quality of service (QoS) threshold, such as bandwidth, error rate, end-to-end delay, end-to-end delay variation, hop count, expected path durability, and priority, for example. At block 504) each node scouts one or more other available channels when the monitored link performance on the first channel falls below the QoS threshold, for example, minimum bandwidth or maximum delay. Scouting may include periodically monitoring other channels for link performance. Scouting may comprise switching to a second channel
(block 512) , broadcasting a channel activity query to determine the link performance for the second channel (block 516) , and processing replies to the channel activity query to determine the link performance for the second channel at block 518. Furthermore, each node 30 may switch back to the first channel and broadcast a channel change message if the link performance on the second channel is above the QoS threshold (block 506) , or switch to subsequent channels and broadcast channel activity queries to determine the link performance for the those channels if the link performance on the previous channel is below the QoS threshold (block 504) .
Alternatively, scouting may comprise switching to another channel (block 512) , and passively monitoring the link performance for the second channel at block 514. Again, each node 30 may switch back to the first channel and broadcast a channel change message if the link performance on the second channel is above the QoS threshold (block 506) , or switch to subsequent channels and passively monitor the link performance for those channels if the link performance on the previous channel is below the QoS threshold (block 504) . Also, each node 30 may store link performance information of each of the plurality of channels (block 508) and/or store channel information for neighboring nodes at block 510. In other words, each node 30 may keep track of what channel other nodes are using.
For example, as shown in FIGs. 15-17, the network 26 includes nodes 30 and links 32. Nodes 1A-5A are currently using a first channel, while nodes 1B-5B are currently using a second channel. Node 2B determines that the link performance for the second channel is falling or has fallen below a QoS threshold, such as below a minimum bandwidth. Node 2B switches to the first channel and broadcasts a channel activity query CAQ to nodes within 1-hop of node 2B (FIG. 16) . Nodes IA, 2A and 3A send channel activity replies CAR to node 2B with information on the link performance of the first channel (FIG. 17) . If the bandwidth on the first channel is acceptable to node 2B, it will return to the second channel and broadcast a channel change message to inform any nodes IB, 3B, 4B and 5B that it is changing to the first channel. These nodes would then note where node 2B can be found for future reference. If the bandwidth is not acceptable, node 2B will move to a third channel and repeat the steps. If all channels have been visited and node 2B has not found bandwidth above the QoS threshold, then it will select the best one, and may periodically search for a better channel.
A system aspect of this embodiment of the present invention is directed to the mobile ad hoc network 26 having a plurality of mobile nodes 30, and a plurality of wireless communication links 32 connecting the plurality of mobile nodes together over a plurality of channels. Referring to FIGs. 6 and 7, each mobile node comprises a router 40 having a communications device 42 to wirelessly and unidirectionally or bi-directionally communicate with other nodes via the wireless communication links 32, and a controller 40 to route communications via the communications device. The controller 40 includes a link performance monitor 80 to monitor link performance on a first channel. A channel scouting unit 82 scouts one or more other available channels when the monitored link performance on the first channel falls below the QoS threshold.
The channel scouting unit 82 switches to a second channel, broadcasts a channel activity query to determine the link performance for the second channel, and processes replies to the channel activity query to determine the link performance for the second channel. Also, the channel scouting unit 82 switches back to the first channel and broadcasts a channel change message if the link performance on the second channel is above the QoS threshold, or switches to subsequent channels and broadcasts channel activity queries to determine the link performance for those channels if the link performance on the previous channel is below the QoS threshold. Alternatively, the channel scouting unit 82 may switch to another channel and passively monitor the link performance for the second channel. A link performance information memory 66 stores the link performance information of each of the plurality of channels, and a channel information memory 68 stores channel information for neighboring nodes .

Claims

THAT WHICH IS CLAIMED IS:
1. A method for policing traffic admission control in a mobile ad hoc network comprising a plurality of wireless mobile nodes and a plurality of wireless communication links connecting the plurality of nodes together, the method comprising: at each node, calculating a node quality-of-service (QoS) tag value to make traffic admission control decisions in response to QoS route requests to discover traffic routing based upon a QoS parameter, the QoS route requests including a traffic flow identifier; at each node, determining whether to admit traffic in response to QoS route requests based upon the calculated QoS tag value and the QoS parameter of QoS route requests; and at each node, policing admitted traffic based upon the traffic flow identifier to ensure that admitted traffic does not exceed the QoS parameter of the QoS route request.
2. A method according to Claim 1 further comprising at each node, replying to QoS route requests to indicate whether the node' can support the QoS parameter of the route request and admit the traffic.
3. A method according to Claim 2 wherein replying to QoS route requests comprises indicating what traffic routing the node can support based upon the node QoS tag value, when the node cannot support the QoS parameter of the route request.
4. A method according to Claim 1 wherein the QoS parameter is based upon at least one of available bandwidth, error rate, end-to-end delay, end-to-end delay variation, hop count, expected path durability, and priority.
5. A method according to Claim 1 wherein the node specific QoS tag value is a function of at least one of available power, available bandwidth by the node, recent error rate, recent delay, available bandwidth by other nodes within a range, and node queue size.
6. A method according to Claim 1 further comprising at each node, preventing propagation of traffic that exceeds the QoS parameter of the QoS route request.
7. A method according to Claim 6 wherein preventing propagation of traffic comprises each node buffering traffic that exceeds the QoS parameter of the QoS route request.
8. A mobile ad hoc network comprising: a plurality of mobile nodes; and a plurality of wireless communication links connecting the plurality of mobile nodes together; each mobile node comprising a communications device to wirelessly communicate with other nodes of the plurality of nodes via the wireless communication links, and a controller to route communications via the communications device, and comprising a route discovery unit to transmit quality-of-service (QoS) route requests to other nodes to discover routing to a destination node based upon at least one QoS parameter, the QoS route requests including a traffic flow identifier, a QoS tag calculation unit to calculate a node QoS tag value to make traffic admission control decisions, and a traffic admission controller to determine whether to admit traffic in response to QoS route requests based upon the calculated QoS tag value and the QoS parameter of QoS route requests, a route request processing unit to reply to QoS route requests to indicate whether the node can support the QoS parameter of the route request and admit the traffic, and a traffic policing unit to police admitted traffic based upon the traffic flow identifier to ensure that admitted traffic does not exceed the QoS parameter of the QoS route request.
9. A network according to Claim 8 wherein the QoS parameter is based upon at least one of available bandwidth, error rate, end-to-end delay, end-to-end delay variation, hop count, expected path durability, and priority.
10. A network according to Claim 8 wherein the node QoS tag value comprises one or more of available power, available bandwidth by the node, recent error rate, recent delay, available bandwidth by other nodes within a range, and node queue size.
11. A network according to Claim 8 wherein the traffic policing unit prevents propagation of traffic that exceeds the QoS parameter of the QoS route request.
12. A network according to Claim 11 wherein the traffic policing unit comprises a buffer to store traffic that exceeds the QoS parameter of the QoS route request.
PCT/US2003/013138 2002-04-29 2003-04-28 Traffic policing in a mobile ad hoc network WO2003094404A2 (en)

Priority Applications (5)

Application Number Priority Date Filing Date Title
EP03728575A EP1502393B1 (en) 2002-04-29 2003-04-28 Traffic policing in a mobile ad-hoc network
AU2003234262A AU2003234262A1 (en) 2002-04-29 2003-04-28 Traffic policing in a mobile ad hoc network
CA002484501A CA2484501A1 (en) 2002-04-29 2003-04-28 Traffic policing in a mobile ad hoc network
JP2004502518A JP2005524336A (en) 2002-04-29 2003-04-28 Policy processing of traffic in mobile ad hoc networks
DE60323360T DE60323360D1 (en) 2002-04-29 2003-04-28 Traffic enforcement in a mobile ad hoc network

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US10/134,714 US7068600B2 (en) 2002-04-29 2002-04-29 Traffic policing in a mobile ad hoc network
US10/134,714 2002-04-29

Publications (2)

Publication Number Publication Date
WO2003094404A2 true WO2003094404A2 (en) 2003-11-13
WO2003094404A3 WO2003094404A3 (en) 2004-02-12

Family

ID=29249278

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2003/013138 WO2003094404A2 (en) 2002-04-29 2003-04-28 Traffic policing in a mobile ad hoc network

Country Status (9)

Country Link
US (1) US7068600B2 (en)
EP (1) EP1502393B1 (en)
JP (1) JP2005524336A (en)
CN (1) CN1650578A (en)
AT (1) ATE407497T1 (en)
AU (1) AU2003234262A1 (en)
CA (1) CA2484501A1 (en)
DE (1) DE60323360D1 (en)
WO (1) WO2003094404A2 (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2006012794A1 (en) * 2004-08-02 2006-02-09 Huawei Technologies Co., Ltd. A METHOD FOR SIGNALING INTERACTION OF ENSURING THE INTERNET PROTOCOL (IP) QUALITY OF SERVICE (QoS)
CN101707787A (en) * 2005-03-11 2010-05-12 美商内数位科技公司 Method and apparatus for implementing path-based traffic stream admission control in a wireless mesh network
US8483123B2 (en) 2006-06-30 2013-07-09 Nokia Corporation QoS request and information distribution for wireless relay networks
KR101445384B1 (en) 2005-03-11 2014-09-26 인터디지탈 테크날러지 코포레이션 Method and apparatus for implementing path-based traffic stream admission control in a wireless mesh network
CN110262533A (en) * 2019-06-25 2019-09-20 哈尔滨工业大学 A kind of method, apparatus and computer storage medium based on hierarchical task network planning modular reconfigurable satellite via Self-reconfiguration

Families Citing this family (143)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8578015B2 (en) * 2002-04-29 2013-11-05 Harris Corporation Tracking traffic in a mobile ad hoc network
US7218644B1 (en) * 2002-05-29 2007-05-15 Nokia Corporation Dynamic bandwidth allocation for bluetooth access point connections
GB0215013D0 (en) * 2002-06-28 2002-08-07 Nokia Corp Communications system and method
US8089887B2 (en) * 2002-11-19 2012-01-03 Massachusetts Institute Of Technology Method for automatic signal routing in ad hoc networks
JP4045936B2 (en) * 2002-11-26 2008-02-13 株式会社日立製作所 Address translation device
US20040156388A1 (en) * 2003-02-07 2004-08-12 Lockheed Martin Corporation System for maintaining quality of service
JP5037120B2 (en) * 2003-06-05 2012-09-26 メッシュネットワークス インコーポレイテッド Optimal routing in ad hoc wireless communication networks
KR20060018882A (en) * 2003-06-06 2006-03-02 메시네트웍스, 인코포레이티드 A method to provide a measure of link reliability to a routing protocol in an ad hoc wireless network
US8223637B2 (en) * 2003-06-17 2012-07-17 Avaya Inc. Quality-of-service and call admission control
KR100526183B1 (en) * 2003-07-15 2005-11-03 삼성전자주식회사 Apparatus and Method for efficient data transmission/reception in Mobile Ad-hoc Network
US7408885B2 (en) * 2003-08-19 2008-08-05 Avaya Inc. Method and apparatus for automatic determination of performance problem locations in a network
DE10350904B4 (en) 2003-10-31 2005-12-01 Siemens Ag Method for determining a path in a local radio communication system
US20050152373A1 (en) * 2004-01-08 2005-07-14 Interdigital Technology Corporation Packet scheduling in a wireless local area network
AU2005201005A1 (en) * 2004-03-05 2005-09-22 General Dynamics C4 Systems, Inc A method and system for capacity analysis for on the move adhoc wireless packet-switched networks
GB0407144D0 (en) 2004-03-30 2004-05-05 British Telecomm Networks
DE102004021319B4 (en) * 2004-04-30 2010-11-11 Siemens Ag Setup of multihop communication connections depending on limit values
US7995489B2 (en) * 2004-06-14 2011-08-09 The Boeing Company Topology and quality of service management apparatus and methods for communication networks
US20060099933A1 (en) * 2004-06-16 2006-05-11 Avaya Technology Llc Call admission control of a shared-access resource during a handover
US8665714B2 (en) * 2004-06-16 2014-03-04 Avaya Inc. Call admission control of shared-access resources through a call-handling server
KR100659351B1 (en) 2004-08-07 2006-12-19 학교법인 울산공업학원 A DiffServ module for QoS in Mobile ad hoc networks and a congestion control method
US20060095546A1 (en) * 2004-10-07 2006-05-04 Nokia Corporation Method and system for locating services in proximity networks for legacy application
US7719972B2 (en) * 2004-12-03 2010-05-18 Intel Corporation Methods and apparatus for providing an admission control system in a wireless mesh network
KR100703726B1 (en) * 2004-12-11 2007-04-05 삼성전자주식회사 Method for managing neighbor node and determining routing path in mobile ad hoc network, and network apparatus thereof
US7656886B2 (en) * 2005-02-07 2010-02-02 Chin-Tau Lea Non-blocking internet backbone network
US20060251119A1 (en) * 2005-05-04 2006-11-09 Sridhar Ramesh Methods and apparatus to setup end-to-end flows in wireless mesh networks
EP1727316B1 (en) * 2005-05-23 2009-10-14 Alcatel Lucent Extension to RSVP protocol for supporting OAM configuration
CN101297524B (en) 2005-08-23 2011-01-26 艾利森电话股份有限公司 Convergence type resource obligation of data flow
US8339948B2 (en) * 2005-09-16 2012-12-25 Ntt Docomo, Inc. Method for improving capacity in multi-hop wireless mesh networks
US7898957B2 (en) * 2005-10-03 2011-03-01 The Hong Kong University Of Science And Technology Non-blocking destination-based routing networks
US8385193B2 (en) 2005-10-18 2013-02-26 Qualcomm Incorporated Method and apparatus for admission control of data in a mesh network
US20070101018A1 (en) * 2005-11-01 2007-05-03 Meral Shirazipour Inter-domain QoS reservation establishment and modification
WO2007053141A1 (en) * 2005-11-02 2007-05-10 Thomson Licensing Method for determining a route in a wireless mesh network using a metric based on radio and traffic load
WO2007060536A2 (en) * 2005-11-28 2007-05-31 Iwics Inc Intelligent video, data streaming and access to distributed resources in a wireless network
US7894447B2 (en) 2005-12-06 2011-02-22 Lippershy Celestial Llc Digital object routing
US8014389B2 (en) 2005-12-06 2011-09-06 Lippershy Celestial Llc Bidding network
US8194701B2 (en) 2005-12-06 2012-06-05 Lippershy Celestial Llc System and/or method for downstream bidding
US9686183B2 (en) 2005-12-06 2017-06-20 Zarbaña Digital Fund Llc Digital object routing based on a service request
US8055897B2 (en) * 2005-12-06 2011-11-08 Lippershy Celestial Llc Digital object title and transmission information
US8243603B2 (en) * 2005-12-07 2012-08-14 Motorola Solutions, Inc. Method and system for improving a wireless communication route
US7496366B2 (en) * 2005-12-19 2009-02-24 Motorola, Inc. Wireless communication system capacity control facilitation method and apparatus
US8514861B2 (en) * 2006-01-03 2013-08-20 Meshnetworks, Inc. Apparatus and method for multicasting data in a communication network
US8570859B1 (en) * 2006-07-21 2013-10-29 Sprint Spectrum L.P. Hybrid mesh network
US7768929B2 (en) * 2006-07-31 2010-08-03 Avaya Inc. Determination of endpoint device location for efficient analysis of network performance
US20100011244A1 (en) * 2006-08-30 2010-01-14 France Telecom Method of routing data in a network comprising nodes organized into clusters
US8649264B2 (en) * 2006-10-04 2014-02-11 Qualcomm Incorporated IP flow-based load balancing over a plurality of wireless network links
US8248999B2 (en) * 2006-11-13 2012-08-21 Motorola Solutions, Inc. Method and apparatus for resource reservation in a multihop wireless network
RU2423010C2 (en) * 2007-02-07 2011-06-27 Томсон Лайсенсинг Index of routing based on data along radio communication and band, letting through for multi-channel multiple-hop wireless networks with multiple radio stations
US9030934B2 (en) * 2007-09-07 2015-05-12 Qualcomm Incorporated Host-based quality of service for wireless communications
CN101394337B (en) * 2007-09-21 2012-11-07 华为技术有限公司 Method, system and device for message routing between network nodes based on P2P
US7801153B2 (en) * 2007-10-01 2010-09-21 Powerwave Cognition, Inc. Communication scheduling of network nodes using fair access and weighting techniques
US7965671B2 (en) * 2007-10-01 2011-06-21 Powerwave Cognition, Inc. Dynamic channel sharing using bandwidth metrics
US8472315B2 (en) * 2008-02-07 2013-06-25 Belair Networks Inc. Method and system for controlling link saturation of synchronous data across packet networks
US20110164527A1 (en) * 2008-04-04 2011-07-07 Mishra Rajesh K Enhanced wireless ad hoc communication techniques
US9236933B2 (en) 2008-05-23 2016-01-12 Electronics And Telecommunications Research Institute Apparatus and method for transmitting and receiving data using multi-path in wireless communication system of distributed MAC
WO2009144756A1 (en) * 2008-05-29 2009-12-03 Selex Communications S.P.A. Modified ad-hoc on-demand di stance -vector routing protocol
US8548428B2 (en) 2009-01-28 2013-10-01 Headwater Partners I Llc Device group partitions and settlement platform
US8275830B2 (en) 2009-01-28 2012-09-25 Headwater Partners I Llc Device assisted CDR creation, aggregation, mediation and billing
US8391834B2 (en) 2009-01-28 2013-03-05 Headwater Partners I Llc Security techniques for device assisted services
US8406748B2 (en) 2009-01-28 2013-03-26 Headwater Partners I Llc Adaptive ambient services
US8346225B2 (en) 2009-01-28 2013-01-01 Headwater Partners I, Llc Quality of service for device assisted services
US8402111B2 (en) 2009-01-28 2013-03-19 Headwater Partners I, Llc Device assisted services install
US8635335B2 (en) 2009-01-28 2014-01-21 Headwater Partners I Llc System and method for wireless network offloading
US8725123B2 (en) 2008-06-05 2014-05-13 Headwater Partners I Llc Communications device with secure data path processing agents
US8832777B2 (en) 2009-03-02 2014-09-09 Headwater Partners I Llc Adapting network policies based on device service processor configuration
US8589541B2 (en) 2009-01-28 2013-11-19 Headwater Partners I Llc Device-assisted services for protecting network capacity
US8626115B2 (en) 2009-01-28 2014-01-07 Headwater Partners I Llc Wireless network service interfaces
US8898293B2 (en) 2009-01-28 2014-11-25 Headwater Partners I Llc Service offer set publishing to device agent with on-device service selection
US8340634B2 (en) 2009-01-28 2012-12-25 Headwater Partners I, Llc Enhanced roaming services and converged carrier networks with device assisted services and a proxy
US8924469B2 (en) 2008-06-05 2014-12-30 Headwater Partners I Llc Enterprise access control and accounting allocation for access networks
US8924543B2 (en) 2009-01-28 2014-12-30 Headwater Partners I Llc Service design center for device assisted services
US8250207B2 (en) 2009-01-28 2012-08-21 Headwater Partners I, Llc Network based ambient services
US8175101B2 (en) * 2008-08-15 2012-05-08 Raytheon Company Multicasting in a network using neighbor information
US8094637B1 (en) * 2008-12-01 2012-01-10 Marvell International Ltd. Avoiding mesh path discovery in wireless mesh networks
US9980146B2 (en) 2009-01-28 2018-05-22 Headwater Research Llc Communications device with secure data path processing agents
US9572019B2 (en) 2009-01-28 2017-02-14 Headwater Partners LLC Service selection set published to device agent with on-device service selection
US9557889B2 (en) 2009-01-28 2017-01-31 Headwater Partners I Llc Service plan design, user interfaces, application programming interfaces, and device management
US10326800B2 (en) 2009-01-28 2019-06-18 Headwater Research Llc Wireless network service interfaces
US10779177B2 (en) 2009-01-28 2020-09-15 Headwater Research Llc Device group partitions and settlement platform
US9571559B2 (en) 2009-01-28 2017-02-14 Headwater Partners I Llc Enhanced curfew and protection associated with a device group
US9647918B2 (en) 2009-01-28 2017-05-09 Headwater Research Llc Mobile device and method attributing media services network usage to requesting application
US8745191B2 (en) 2009-01-28 2014-06-03 Headwater Partners I Llc System and method for providing user notifications
US9955332B2 (en) 2009-01-28 2018-04-24 Headwater Research Llc Method for child wireless device activation to subscriber account of a master wireless device
US9706061B2 (en) 2009-01-28 2017-07-11 Headwater Partners I Llc Service design center for device assisted services
US9755842B2 (en) 2009-01-28 2017-09-05 Headwater Research Llc Managing service user discovery and service launch object placement on a device
US9954975B2 (en) 2009-01-28 2018-04-24 Headwater Research Llc Enhanced curfew and protection associated with a device group
US10798252B2 (en) 2009-01-28 2020-10-06 Headwater Research Llc System and method for providing user notifications
US9270559B2 (en) 2009-01-28 2016-02-23 Headwater Partners I Llc Service policy implementation for an end-user device having a control application or a proxy agent for routing an application traffic flow
US10264138B2 (en) 2009-01-28 2019-04-16 Headwater Research Llc Mobile device and service management
US8351898B2 (en) * 2009-01-28 2013-01-08 Headwater Partners I Llc Verifiable device assisted service usage billing with integrated accounting, mediation accounting, and multi-account
US8606911B2 (en) 2009-03-02 2013-12-10 Headwater Partners I Llc Flow tagging for service policy implementation
US10715342B2 (en) 2009-01-28 2020-07-14 Headwater Research Llc Managing service user discovery and service launch object placement on a device
US9578182B2 (en) 2009-01-28 2017-02-21 Headwater Partners I Llc Mobile device and service management
US10783581B2 (en) 2009-01-28 2020-09-22 Headwater Research Llc Wireless end-user device providing ambient or sponsored services
US10484858B2 (en) 2009-01-28 2019-11-19 Headwater Research Llc Enhanced roaming services and converged carrier networks with device assisted services and a proxy
US9253663B2 (en) 2009-01-28 2016-02-02 Headwater Partners I Llc Controlling mobile device communications on a roaming network based on device state
US9565707B2 (en) 2009-01-28 2017-02-07 Headwater Partners I Llc Wireless end-user device with wireless data attribution to multiple personas
US10200541B2 (en) 2009-01-28 2019-02-05 Headwater Research Llc Wireless end-user device with divided user space/kernel space traffic policy system
US10064055B2 (en) 2009-01-28 2018-08-28 Headwater Research Llc Security, fraud detection, and fraud mitigation in device-assisted services systems
US11218854B2 (en) 2009-01-28 2022-01-04 Headwater Research Llc Service plan design, user interfaces, application programming interfaces, and device management
US10841839B2 (en) 2009-01-28 2020-11-17 Headwater Research Llc Security, fraud detection, and fraud mitigation in device-assisted services systems
US8893009B2 (en) 2009-01-28 2014-11-18 Headwater Partners I Llc End user device that secures an association of application to service policy with an application certificate check
US8793758B2 (en) 2009-01-28 2014-07-29 Headwater Partners I Llc Security, fraud detection, and fraud mitigation in device-assisted services systems
US9392462B2 (en) 2009-01-28 2016-07-12 Headwater Partners I Llc Mobile end-user device with agent limiting wireless data communication for specified background applications based on a stored policy
US9351193B2 (en) 2009-01-28 2016-05-24 Headwater Partners I Llc Intermediate networking devices
US10237757B2 (en) 2009-01-28 2019-03-19 Headwater Research Llc System and method for wireless network offloading
US10492102B2 (en) 2009-01-28 2019-11-26 Headwater Research Llc Intermediate networking devices
US9858559B2 (en) 2009-01-28 2018-01-02 Headwater Research Llc Network service plan design
US10248996B2 (en) 2009-01-28 2019-04-02 Headwater Research Llc Method for operating a wireless end-user device mobile payment agent
US10057775B2 (en) 2009-01-28 2018-08-21 Headwater Research Llc Virtualized policy and charging system
EP2230803A1 (en) * 2009-03-16 2010-09-22 BRITISH TELECOMMUNICATIONS public limited company Path characterisation in networks
US8451862B2 (en) 2009-07-15 2013-05-28 Qualcomm Incorporated Systems and methods for resource allocation serving communication requirements and fairness
US8619756B2 (en) * 2009-07-15 2013-12-31 Qualcomm Incorporated Systems and methods for providing resource allocation meeting communication constraints for multi-hop network data flows
EP2579518B1 (en) * 2010-05-28 2016-09-28 Nec Corporation Transmission device, bandwidth control method and computer program
KR101136375B1 (en) 2010-07-12 2012-04-18 아주대학교산학협력단 Method and apparatus for establishing a routing path on a multi-hop network
CN102111316A (en) * 2011-03-22 2011-06-29 广州海格通信集团股份有限公司 Automatic networking method of network system
US9154826B2 (en) 2011-04-06 2015-10-06 Headwater Partners Ii Llc Distributing content and service launch objects to mobile devices
WO2012174499A2 (en) * 2011-06-17 2012-12-20 Microsoft Corporation Application specific web request routing
US9842498B2 (en) * 2011-07-05 2017-12-12 Qualcomm Incorporated Road-traffic-based group, identifier, and resource selection in vehicular peer-to-peer networks
US9167463B2 (en) * 2011-09-02 2015-10-20 Telcordia Technologies, Inc. Communication node operable to estimate faults in an ad hoc network and method of performing the same
WO2014159862A1 (en) 2013-03-14 2014-10-02 Headwater Partners I Llc Automated credential porting for mobile devices
KR101505624B1 (en) 2014-01-03 2015-03-24 아주대학교산학협력단 Mobility prediction scheme based on Relative Mobile Characteristics
US20150195189A1 (en) * 2014-01-07 2015-07-09 Alcatel Lucent Usa, Inc. Multiple tree routed selective randomized load balancing
US9756549B2 (en) 2014-03-14 2017-09-05 goTenna Inc. System and method for digital communication between computing devices
US9462025B2 (en) 2014-05-04 2016-10-04 Valens Semiconductor Ltd. Increasing link throughput to enable admission without exceeding latency variation limits
CN104104603B (en) * 2014-08-07 2017-05-24 中国人民解放军信息工程大学 Method and system for establishing data transmission links
JP6369317B2 (en) 2014-12-15 2018-08-08 ソニー株式会社 Information processing apparatus, communication system, information processing method, and program
CN106664252B (en) * 2015-06-10 2019-11-29 华为技术有限公司 Realize method, equipment and the system of service chaining
KR20170014458A (en) * 2015-07-30 2017-02-08 엘지전자 주식회사 Mobile terminal, watch-type mobile terminal and method for controlling the same
EP3379864B1 (en) * 2015-12-30 2020-11-11 Huawei Technologies Co., Ltd. Method for determining transmission link and terminal device
US9900230B2 (en) * 2016-01-07 2018-02-20 Avaya Inc. Dissemination of quality of service information in a distributed environment
US10171350B2 (en) * 2016-04-27 2019-01-01 Cisco Technology, Inc. Generating packets in a reverse direction of a service function chain
WO2018165182A1 (en) 2017-03-07 2018-09-13 128 Technology, Inc. Router device using flow duplication
US10541937B2 (en) * 2017-07-18 2020-01-21 Cisco Technology, Inc. Multi-level resource reservation
US11165863B1 (en) 2017-08-04 2021-11-02 128 Technology, Inc. Network neighborhoods for establishing communication relationships between communication interfaces in an administrative domain
US10542127B2 (en) * 2017-09-06 2020-01-21 Sap Se Fault tolerant communication in a distributed system
US10944669B1 (en) 2018-02-09 2021-03-09 GoTenna, Inc. System and method for efficient network-wide broadcast in a multi-hop wireless network using packet echos
US20190253341A1 (en) 2018-02-15 2019-08-15 128 Technology, Inc. Service Related Routing Method and Apparatus
US10813169B2 (en) 2018-03-22 2020-10-20 GoTenna, Inc. Mesh network deployment kit
GB2574875B (en) * 2018-06-21 2021-04-14 Tcl Communication Ltd Route selection and QoS support in a wireless access network
CN108924776A (en) * 2018-07-13 2018-11-30 上海邮电设计咨询研究院有限公司 A kind of fire fighting monitoring communication system
CA3107919A1 (en) 2018-07-27 2020-01-30 GoTenna, Inc. Vinetm: zero-control routing using data packet inspection for wireless mesh networks
WO2020185707A1 (en) 2019-03-08 2020-09-17 goTenna Inc. Method for utilization-based traffic throttling in a wireless mesh network
CN115428411A (en) 2020-04-23 2022-12-02 瞻博网络公司 Session monitoring using session establishment metrics

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5623495A (en) * 1995-06-15 1997-04-22 Lucent Technologies Inc. Portable base station architecture for an AD-HOC ATM lan

Family Cites Families (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5412654A (en) * 1994-01-10 1995-05-02 International Business Machines Corporation Highly dynamic destination-sequenced destination vector routing for mobile computers
US5717689A (en) * 1995-10-10 1998-02-10 Lucent Technologies Inc. Data link layer protocol for transport of ATM cells over a wireless link
US5872773A (en) * 1996-05-17 1999-02-16 Lucent Technologies Inc. Virtual trees routing protocol for an ATM-based mobile network
US5787080A (en) * 1996-06-03 1998-07-28 Philips Electronics North America Corporation Method and apparatus for reservation-based wireless-ATM local area network
US5987011A (en) * 1996-08-30 1999-11-16 Chai-Keong Toh Routing method for Ad-Hoc mobile networks
FI110987B (en) * 1998-03-31 2003-04-30 Nokia Corp Method of connecting data transfer streams
US6304556B1 (en) * 1998-08-24 2001-10-16 Cornell Research Foundation, Inc. Routing and mobility management protocols for ad-hoc networks
US6683852B2 (en) * 1998-12-15 2004-01-27 Lucent Technologies Inc. Call admission control methods and apparatus for improving route selection in packet networks
FI107772B (en) * 1998-12-16 2001-09-28 Nokia Networks Oy Method and system for limiting the quality of data transmission service
US6678252B1 (en) * 1999-10-28 2004-01-13 Verizon Laboratories Inc. Method and apparatus for dynamic source routing in ad hoc wireless networks
US6385174B1 (en) * 1999-11-12 2002-05-07 Itt Manufacturing Enterprises, Inc. Method and apparatus for transmission of node link status messages throughout a network with reduced communication protocol overhead traffic
US6459898B1 (en) * 1999-11-19 2002-10-01 Comsat Corporation Information traffic and performance monitoring for multi-beam satellites with on-board switching
WO2001058237A2 (en) * 2000-02-12 2001-08-16 Hrl Laboratories, Llc Scalable unidirectional routing for mobile ad-hoc networks
JP4879436B2 (en) * 2000-02-23 2012-02-22 マイクロソフト コーポレーション Quality of service over communication paths with wireless links
US6894991B2 (en) * 2000-11-30 2005-05-17 Verizon Laboratories Inc. Integrated method for performing scheduling, routing and access control in a computer network
US7113796B2 (en) * 2002-01-18 2006-09-26 Microsoft Corporation Framework and method for QoS-aware resource discovery in mobile ad hoc networks

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5623495A (en) * 1995-06-15 1997-04-22 Lucent Technologies Inc. Portable base station architecture for an AD-HOC ATM lan

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See also references of EP1502393A2 *

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2006012794A1 (en) * 2004-08-02 2006-02-09 Huawei Technologies Co., Ltd. A METHOD FOR SIGNALING INTERACTION OF ENSURING THE INTERNET PROTOCOL (IP) QUALITY OF SERVICE (QoS)
US7751349B2 (en) 2004-08-02 2010-07-06 Huawei Technologies Co., Ltd. Signalling exchange method for guaranteeing internet protocol quality of service
CN101707787A (en) * 2005-03-11 2010-05-12 美商内数位科技公司 Method and apparatus for implementing path-based traffic stream admission control in a wireless mesh network
JP2011103698A (en) * 2005-03-11 2011-05-26 Interdigital Technology Corp Method and apparatus for implementing path-based traffic stream admission control in wireless mesh network
JP2014027681A (en) * 2005-03-11 2014-02-06 Interdigital Technology Corp Method and apparatus for implementing path-based traffic stream admission control in wireless mesh network
KR101445384B1 (en) 2005-03-11 2014-09-26 인터디지탈 테크날러지 코포레이션 Method and apparatus for implementing path-based traffic stream admission control in a wireless mesh network
JP2014225929A (en) * 2005-03-11 2014-12-04 インターデイジタル テクノロジー コーポレーション Method and apparatus for implementing path-based traffic stream admission control in wireless mesh network
US8483123B2 (en) 2006-06-30 2013-07-09 Nokia Corporation QoS request and information distribution for wireless relay networks
CN110262533A (en) * 2019-06-25 2019-09-20 哈尔滨工业大学 A kind of method, apparatus and computer storage medium based on hierarchical task network planning modular reconfigurable satellite via Self-reconfiguration

Also Published As

Publication number Publication date
EP1502393A2 (en) 2005-02-02
WO2003094404A3 (en) 2004-02-12
DE60323360D1 (en) 2008-10-16
ATE407497T1 (en) 2008-09-15
US20030202469A1 (en) 2003-10-30
CN1650578A (en) 2005-08-03
EP1502393B1 (en) 2008-09-03
EP1502393A4 (en) 2005-10-12
US7068600B2 (en) 2006-06-27
AU2003234262A1 (en) 2003-11-17
CA2484501A1 (en) 2003-11-13
AU2003234262A8 (en) 2003-11-17
JP2005524336A (en) 2005-08-11

Similar Documents

Publication Publication Date Title
CA2484486C (en) Admission control in a mobile ad hoc network
US6954435B2 (en) Determining quality of service (QoS) routing for mobile ad hoc networks
US7068600B2 (en) Traffic policing in a mobile ad hoc network
US8578015B2 (en) Tracking traffic in a mobile ad hoc network
US7616961B2 (en) Allocating channels in a mobile ad hoc network
US7764617B2 (en) Mobile ad-hoc network and methods for performing functions therein based upon weighted quality of service metrics
US6961310B2 (en) Multiple path reactive routing in a mobile ad hoc network
US20050053007A1 (en) Route selection in mobile ad-hoc networks based on traffic state information

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A2

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ OM PH PL PT RO RU SD SE SG SK SL TJ TM TN TR TT TZ UA UG UZ VN YU ZA ZM ZW

AL Designated countries for regional patents

Kind code of ref document: A2

Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IT LU MC NL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
DFPE Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101)
WWE Wipo information: entry into national phase

Ref document number: 2484501

Country of ref document: CA

WWE Wipo information: entry into national phase

Ref document number: 2004502518

Country of ref document: JP

WWE Wipo information: entry into national phase

Ref document number: 20038096633

Country of ref document: CN

WWE Wipo information: entry into national phase

Ref document number: 2003728575

Country of ref document: EP

WWP Wipo information: published in national office

Ref document number: 2003728575

Country of ref document: EP