Traffic-aware stateless multipath routing for fault-tolerance in IEEE 802.15.4 wireless mesh networks
- 261 Downloads
Single-path routing is widely used in wireless networks due to low resource consumption. However, it is vulnerable to link failure because such a failure may adversely affect an entire path. To overcome this, multipath routing has been proposed providing fault-tolerance. In this paper, we propose a novel multipath routing protocol called traffic-aware stateless multipath routing (TSMR) based on an overlaid tree topology comprising two topologies, namely, bounded degree tree (BDT) and root-oriented directional tree (RODT). BDT is strong on reducing routing overhead, and RODT is resilient against lossy links. By synergistically overlaying them, TSMR dynamically selects the local optimal path according to the given traffic flow and the failure on the primary path. In particular, TSMR enables stateless and low overhead routing despite multipath routing by keeping only one-hop neighbors to maintain multiple paths. To evaluate TSMR, we conducted simulations with a shadowing model reflecting lossy links, and compared with single and multipath routing protocols, such as ZTR, STR, AODV, and RPL. The simulation results show that the overall performance of TSMR surpasses that of others for packet delivery ratio, end-to-end delay, control overhead, memory consumption, and power consumption regardless of network size, number of sessions, and traffic flow.
KeywordsMultipath routing Fault-tolerance Tree routing Resource constraints IEEE 802.15.4 Wireless mesh networks
This work was supported by Institute for Information & communications Technology Promotion (IITP) grant funded by the Korea government (MSIP) (No. R01261610020001002, Development of agro-livestock cloud and application service for balanced production, transparent distribution and safe consumption based on GS1) and National GNSS Research Center program of Defense Acquisition Program Administration and Agency for Defense Development.
- 1.Kwon, K., Ha, M., Kim, S., & Kim, D. (2013). TAMR: Traffic aware multipath routing for fault tolerance in 6LoWPAN. In IEEE global communications conference (GLOBECOM) (pp. 109–114).Google Scholar
- 6.Winter, T., Thubert, P., Brandt, A., Clausen, T., Hui, J., Kelsey, R., Levis, P., Pister, K., Struik, R., Vasseur, J. P., & Alexander, R. (2012). RPL: IPv6 routing protocol for low power and lossy networks. In IETF Roll WG. Accessed Aug 1, 2016, from https://tools.ietf.org/html/rfc6550.
- 9.Sturek, D. (2006). ZigBee alliance. Accessed Aug 1, 2016, from https://zigbee.org.
- 11.Mulligan, G., & 6LoWPAN WG. (2007). The 6LoWPAN architecture. In The 4th workshop on embedded networked sensors (pp. 78–82).Google Scholar
- 12.Hui, J., & Thubert, P. (2011). Compression format for IPv6 datagrams over IEEE 802.15.4-based networks. In IETF 6Lo WG. Accessed Aug 1, 2016, from https://tools.ietf.org/html/rfc6282.
- 13.Kim, K., Yoo, S., Park, Daniel, S., & Lee, J. (2007). Hierarchical routing over 6LoWPAN (HiLow). In IETF Internet-Draft. Accessed Aug 1, 2016, from https://tools.ietf.org/html/draft-daniel-6lowpan-hilow-hierarchical-routing-01.
- 14.Gnawali, O., Fonseca, R., Jamieson, K., Moss, D., & Levis, P. (2009). Collection tree protocol. In The 7th ACM conference on embedded networked sensor systems (SenSys) (pp. 1–14).Google Scholar
- 18.Kim, K., Park, D., Montenegro, G., Yoo, S., & Kushalngar, N. (2007). 6LoWPAN ad hoc on-demand distance vector routing (LOAD). In IETF Internet-Draft. Accessed Aug 1, 2016, from https://tools.ietf.org/html/draft-daniel-6lowpan-load-adhoc-routing-03.
- 19.Kwon, K., Ha, M., Kim, T., Kim, S., & Kim, D. (2012). The stateless point to point routing protocol based on shortcut tree routing algorithm for IP-WSN. In IEEE 3rd international conference on the Internet of Things (IoT) (pp. 167–174).Google Scholar
- 22.Liu, Y., & Qian, K. (2016). A novel tree-based routing protocol in ZigBee wireless networks. In 8th IEEE international conference on communication software and networks (ICCSN) (pp. 469–473).Google Scholar
- 23.Intanagonwiwat, C., Govindan, R., & Estrin, D. (2000). Directed diffusion: A scalable and robust communication paradigm for sensor networks. In The 6th annual international conference on mobile computing and networking (MobiCom) (pp. 56–67).Google Scholar
- 25.Pavkoivic, B., Theoleyre, F., & Duda, A. (2011). Multipath opportunistic RPL routing over IEEE 802.15.4. In The 14th ACM international conference on modeling, analysis and simulation of wireless and mobile systems (pp. 179–186).Google Scholar
- 26.Biswas, S., & Morris, R. (2005). ExOR: Opportunistic multi-hop routing for wireless networks. In The annual conference of the special interest group on data communication (SIGCOMM) (pp. 133–144).Google Scholar
- 30.Goyal, M., Baccelli, E., Philipp, M., Brandt, A., & Martocci, J. (2013). Reactive discovery of point-to-point routes in low-power and lossy networks. IETF Roll WG. Accessed Aug 1, 2016, from https://tools.ietf.org/html/rfc6997.
- 31.Kim, K., Park, D., Montenegro, G., Yoo, S., & Kushalngar, N. (2010). Hydro: A hybrid routing protocol for low-power and lossy networks. In The 1st IEEE conference on smart grid communications (SmardGridComm) (pp. 268–273).Google Scholar
- 33.Kim, E., Kaspar, D., & Vasseur, J. P. (2012). Design and application spaces for IPv6 over low-power wireless personal area networks (6LoWPANs). In IETF 6Lo WG. Accessed Aug 1, 2016, from https://tools.ietf.org/html/rfc6568
- 36.Zhao, J., & Govindan, R. (2003). Understanding packet delivery performance in dense wireless sensor networks. In The 1st international conference on embedded networked sensor systems (Sensys), Los Angeles (pp. 1–13).Google Scholar
- 37.Kotz, D., Newport, C., & Elliott, C. (2003). The mistaken axioms of wireless-network research. Dartmouth Computer Science Technical Report TR2003-467. Accessed Aug 1, 2016, from http://www.cs.dartmouth.edu/reports/TR2003-467.
- 40.Hui, J. W., & Culler, D. E. (2008). IP is dead, long live IP for wireless sensor networks. In The proceedings of the 6th ACM conference on embedded network sensor systems (SenSys 08) (pp. 15–28).Google Scholar
- 41.Latr, B., Mil, P. D., Moerman, I., Dhoed, B., Demeester, P., & Dierdonck, N. V. (2006). Throughput and delay analysis of unslotted IEEE 802.15. 4. Journal of Networks, 1(1), 20–28.Google Scholar
- 43.Issariyakul, T., & Hossain, E. (2011). Introduction to network simulator NS2 (2nd ed.). New York: Springer.Google Scholar