6.3 Selective Greedy Forwarding (SelG): Protocol Design
6.3.2 Stage 2: The Greedy Selection of the Best Candidate
the next subsection.
ST Ai. Assume Z(Iik) is an indicator variable such that,
Z(Iik) =
1 If Iik is currently being used for communication
0 Otherwise
According to the protocol interference model, only one interface can transmit among the interfaces that interfere with each other. Consider an interface Iik ∈Γi. Then either Iik can transmit or a set of interfaces from H(Iik) can transmit, where no two interfaces interfere with each other.
Theorem 6.2. For every interface Iik ∈Γi of ST Ai, following condition must hold true for minimum interference data communication,
Z(Iik) + X
Ijm∈H(Iik)
Z(Ijm)≤1.11364α (6.1)
where α is the beam-width of the interfaceIik, expressed in radians.
Proof. The proof extends the concept provided in Lemma 1, given in [53], for protocol interference model in multi-interface mesh network. According to the protocol interference model, two interfaces interfere with each other, if they are at-most q×Rc distance apart.
Consider the following two cases,
Case I. AssumeIiktransmits. In this case, none of the interfaces inH(Iik) can transmit.
Therefore,
Z(Iik) = 1 X
Ijm∈H(Iki)
Z(Ijm) = 0
This satisfies the inequality given in (6.1).
Case II. Assume Iik does not transmit. In this case, two interfaces from H(Iik) can transmit, provided that they are at-leastq×Rcdistance apart. Let us assume that there exists S number of interfaces in H(Iik), who are at least q ×Rc
distance apart. Considering the fact that all interfaces inH(Iik) must be within the disk centered at Iik and with radius q×Rc (based of the protocol model consideration, interference range is at-mostq×Rc), the problem of finding S can be reduced to the circle packing problem discussed in [218]. Let us consider
Interface Iik Beam direction for
MPi qxRc
qxRc MPu
MPv 2
1.5xqxRc
Figure 6.2: Interference characterization
Fig. 6.2. If ST Ai does not use interface Iik, then the interfaces of ST Au and ST Av can transmit simultaneously if they are at-least q×Rc distance apart.
Without considering the directionality of the interfaces, the problem of “finding maximum number of interfaces that can simultaneously transmit”, is similar to the problem of “finding maximum number of non-overlapping circles of radius (q×Rc)/2 that can be packed within a circle of radius 1.5×q×Rc”. From [218], the value is 7. Therefore, for uniform distribution of the directional beams of the interfaces,
S≤α
2π ×7≈1.11364α
whereαis the beam-width of the interfaceIik, expressed in radians. As a result, Z(Iik) = 0
X
Ijm∈H(Iik)
Z(Ijm)≤1.11364α
This follows the theorem.
The interference characteristics for multi-interface mesh networks, as derived in equation (6.1), gives a theoretical upper bound for selecting maximum number of interfaces for simultaneous interference-free communications. The bound is free of the q value, which indicates that interference range does not affect interface selection, until the set of interfering interfaces (H(Iik)) are identified properly. IEEE 802.11sMCCA advertisement messageprovides the support for populating the set of interfering interfaces in every DTIM
interval. In practice interference-free interface selection can not be guaranteed because of the approximation in the protocol interference model2. However, as shown in [214], with proper power adjustments, protocol interference model can capture interference with minimum error, and therefore, equation (6.1) can provide the bound for the minimum interference interface selection. Accordingly, equation (6.1) works as a constraint for the greedy selection to support the minimum interference mesh path selection. The next section provides the utility function for the greedy selection strategy.
Design of the Utility Function
The utility function is designed based on the effect of the current network dynamics (channel condition and interference) over the path metric information, to find out the set of PNCs. Let Ckij denote the link metric value between ST Ai and ST Aj through interface Iik ∈Γi, whenST Aj was selected as a PNC. Similarly assume thatPkij denotes the path metric during the PNC computation. The utility function for the greedy selection of ST Aj, denoted as U(ST Aj, Iik) is expressed as follows;
U(ST Aj, Iik) =
1 + v u u t
Ckij
2
−(Ckij)2
Ckij2
×Pkij; ifCkij <Ckij
1− v u u t
Ckij
2
−(Ckij)2
Ckij2
×Pkij; ifCkij >Ckij Pkij; ifCkij =Ckij
(6.2)
The utility function estimates the path metric value based on the statistical dispersion in the current link metric value. A negative dispersion in the link metric value indicates possible cost reduction in the path metric value. Similarly, a positive dispersion in the link metric indicates cost inflation in the path metric. It can be noted that based on the stored information, the values ofCkij andPkij are obtained as follows;
Ckij =Li[ST Aj, Iik] Pkij =Fi[ST Aj, Iik]
2Protocol interference model can not handle cumulative interference [214]. Therefore, the set of interfaces that introduce interferences due to cumulative power effect, can not be identified properly through MCCA broadcast messages. As a result, small error is observed in the set of interfering interfaces.
The utility function along with the interference constraint is used for the greedy selection ofhST Aj, Iiki as the next-hop forwarder, discussed next.
The Greedy Selection Strategy
The greedy selection is based on a constrained optimization problem, formulated as follows.
Problem 6.1.
min
hST Aj,Iiki
U(ST Aj, Iik) s.t. Z(Iik) + X
e0∈H(Iik)
Z(e0)≤1.11364α
ST Aj ∈Fi
Iik∈Γi
The constrained optimization given in Problem 6.1 returns the hST Aj, Iiki pair that provides minimum utility maintaining the interference constraint. The convergent time of the constrained optimization is analyzed using following theorem.
Theorem 6.3. Problem 6.1 can be solved within O(|Fi| × |Γi|) time complexity.
Proof. Let Yi = hST Aj, Iiki represent the optimal solution of Problem 6.1 for ST Ai. Instead of allowing Yi to take specific (MP, interface) value, let us define Yi to be a vector in {O1,O2, ...,Ok}, where eachOj takes a possible solution, and is represented by an integer value from [0...k]. Let this integer is chosen as follows: consider an equilateral simplex Σk in Rk−1 with vertices b1, b2, ..., bk. Let ck = b1+b2+...+bk k be the centroid of Σk, and let Oj = bj−ck for 1 ≤ j ≤k. Then problem 6.1 is represented as an integer semidefinite program with finite solution bound. From [219], the problem can be solved within O(k) time complexity by exploring all the elements in the vector {O1,O2, ...,Ok}.
In the present scenario,k=|Fi| × |Γi|. This follows the theorem.
Nevertheless in practice, the numeric value of the bound O(|Fi| × |Γi|) is very less (maximum within the order of two digits). So the running time for the problem is significantly low. The above selection procedure returns the next-hop candidate from the set of PNCs, and corresponding interface to be used, considering the link metric and its dispersion, as well as the interference constraint.
6.3.3 Extension of the SelG Protocol for Path Selection Between Two