Вы находитесь на странице: 1из 14

1188 IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 20, NO.

8, AUGUST 2009

Multipath Dissemination in
Regular Mesh Topologies
Kranthi K. Mamidisetty, Minlan Duan, Shivakumar Sastry, Member, IEEE Computer Society, and
P.S. Sastry, Senior Member, IEEE

Abstract—Mesh topologies are important for large-scale peer-to-peer systems that use low-power transceivers. The Quality of
Service (QoS) in such systems is known to decrease as the scale increases. We present a scalable approach for dissemination that
exploits all the shortest paths between a pair of nodes and improves the QoS. Despite the presence of multiple shortest paths in a
system, we show that these paths cannot be exploited by spreading the messages over the paths in a simple round-robin manner;
nodes along one of these paths will always handle more messages than the nodes along the other paths. We characterize the set of
shortest paths between a pair of nodes in regular mesh topologies and derive rules, using this characterization, to effectively spread
the messages over all the available paths. These rules ensure that all the nodes that are at the same distance from the source handle
roughly the same number of messages. By modeling the multihop propagation in the mesh topology as a multistage queuing network,
we present simulation results from a variety of scenarios that include link failures and propagation irregularities to reflect real-world
characteristics. Our method achieves improved QoS in all these scenarios.

Index Terms—Wireless communication, network communications, packet-switching networks, routing protocols, mesh topology.

1 INTRODUCTION
such identifiers. Several techniques, called dissemination
T HE use of novel devices for computing and communica-
tion in highly engineered networked embedded systems
such as streetlight management [1], reconfigurable conveyors
methods, were developed at the network layer to regulate
the flow of messages between nonadjacent nodes without
[2], and critical infrastructures [3], presents new challenges relying on unique node identifiers or constructing routing
and opportunities for monitoring and diagnostics. These tables using these identifiers [7], [8], [9].
systems contain a large number of nodes, with each node In this paper, we consider highly engineered systems
incorporating a tiny microcontroller, sensors, actuators, and comprising of nodes arranged in a regular mesh topology.
an integrated low-power transceiver [4]. The nodes interact in We focus on methods for effectively utilizing all the shortest
a peer-to-peer manner over low-bandwidth wireless links to paths available between a pair of nodes and present results
achieve the application objectives. To increase the number of to show that effective utilization of all the available paths
simultaneous interactions between the nodes in the system, significantly improves the Quality of Service (QoS).
the transmission range of each node is limited so that it In many highly engineered systems, one can assume that
communicates directly only with its set of immediate the nodes have fixed relative locations. Often, the systems are
neighbors; such an arrangement of nodes is referred to as a designed to overlay on an underlying grid. For example, in
mesh topology [5]. automation systems, the regions demarcated by such a grid
Multihop communications are necessary in such systems are called zones [10]; a zone is a commonly used abstraction to
to send messages from any source to any destination. For support the design, operation, and maintenance activities.
example, intermediate nodes must forward messages to a Motivated by applications in such domains, we consider
monitoring station from nodes that cannot communicate regular mesh topologies that arise by embedding the nodes in
directly with the monitoring station. Routing protocols are a 2D Basegrid. We show in Section 2 that several mesh
used extensively in wired and wireless networks to support topologies arise when the location in the 2D Basegrid and the
transmission range of the nodes change. Because the grid
multihop communication [6]. Such protocols construct and
coordinates can specify the nodes, the shortest paths between
maintain routing tables at each node by relying on system- any pair of nodes can be locally computed. Most routing
wide unique node identifiers. When the number of nodes is protocols select only one of the shortest paths even when
very large, such as in sensor networks, it is not feasible to use multiple such paths exist. This results in reduced system-
level QoS [11]. We address the issue of how to effectively
utilize all the shortest paths available. Since the resulting
. K.K. Mamidisetty, M. Duan, and S. Sastry are with the Department
of Electrical and Computer Engineering, University of Akron, Akron,
methods amount to a node making local decisions on how to
OH 44325-3904. distribute messages among its immediate neighbors, without
E-mail: {km50, ssastry}@uakron.edu, MINLAN_DUAN@denso-diam.com. having to dynamically construct any routing tables, we refer
. P.S. Sastry is with the Department of Electrical Engineering, Indian to this method of forwarding messages as dissemination in
Institute of Science, Bangalore 560 012, India. spite of the fact that nodes are identified by their global
E-mail: sastry@ee.iisc.ernet.in.
coordinates in the underlying 2D Basegrid.
Manuscript received 11 Sept. 2007; revised 10 Apr. 2008; accepted 11 July Because each node communicates directly with its im-
2008; published online 27 Aug. 2008. mediate set of neighbors, there are multiple shortest paths
Recommended for acceptance by T. Abdelzaher.
For information on obtaining reprints of this article, please send e-mail to: between many pairs of nodes in a mesh topology. The number
tpds@computer.org, and reference IEEECS Log Number TPDS-2007-09-0312. of such paths is limited by the relative locations of the nodes.
Digital Object Identifier no. 10.1109/TPDS.2008.164. For example, the number of shortest paths between certain
1045-9219/09/$25.00 ß 2009 IEEE Published by the IEEE Computer Society
MAMIDISETTY ET AL.: MULTIPATH DISSEMINATION IN REGULAR MESH TOPOLOGIES 1189

pairs of nodes is one, despite the mesh topology. We define a discusses contours, their structure, and the significance of
Contour as the union of all the shortest paths between a pair of the structure on dissemination methods. Section 4 presents
nodes and present some results to precisely characterize the results to show that when the messages are spread in a
structure of contours. Using this structure, we show that round-robin manner, nodes along one path in the contour
when messages are spread in a round-robin manner, nodes will always handle more messages than nodes along other
along one path in the contour will always handle more paths. Section 5 presents optimal spreading rules that
messages than the nodes along other paths in the contour. ensure that all the nodes, which are at a same distance from
Consequently, the benefits of the multiple paths cannot be the source in a contour, handle roughly the same number of
fully realized. We then present a strategy for spreading messages. After presenting simulation results to illustrate
messages to neighboring nodes that effectively exploits the the QoS of CGD in Section 6, we conclude in Section 7.1
available shortest paths and show that our rules for spreading
the messages result in a balanced loading of all the available
shortest paths. We refer to this approach as Contour Guided 2 EMBEDDING FUNCTIONS
Dissemination (CGD). We consider mesh topologies that are obtained by embed-
CGD improves the QoS by disseminating the messages ding nodes on a 2D Basegrid and adjusting the transmission
over all the available shortest paths. Typical application range of each node. Each location on a 2D Basegrid is
scenarios in which CGD will be useful are: 1) a node identified by a unique ordered pair ði; jÞ. The distance
responding to a diagnostic query from an operator at a
between two consecutive locations on the grid, i.e., between
monitoring station, and 2) a node sending a recorded incident
ði; jÞ and ði; j þ 1Þ or between ði; jÞ and ði þ 1; jÞ, is b.
to a monitoring station in a surveillance application. CGD
Let N denote a set of nodes. An embedding function 
equitably disseminates the messages over all the available
shortest paths in a manner that maximizes utilization of all assigns a location on the 2D Basegrid and a transmission
available shortest paths. We present simulation results to range to each node, ni 2 N :
demonstrate all these aspects.  : ni 2 N ! ðIN  IN  IRÞ: ð1Þ
Routing protocols used in traditional wired and wireless
networks are based on shortest path algorithms such as the The location to which a node is assigned is assumed to be
Bellman-Ford algorithm [12] and Dijkstra’s algorithm [6]. fixed for the application. Each node knows its own location
Similar protocols have been reported for ad hoc, wireless, and the number of neighbors it has. Further, we assume that
and mobile networks [13], [14], [15], [16]. The QoS achieved all the neighbors of a node reliably receive messages sent by
in these systems has also been studied [17], [18], [19]. The the node; however, in our simulations, we empirically
dissemination method we describe in this paper is some- explore robustness to temporary link failures. Each message
what similar to a gradient dissemination scheme [13] with contains the locations of the source and destination nodes as
the cost metric being the deviation from evenness of load specified by the embedding function.
distribution on all available shortest paths. Different mesh topologies are obtained by specifying
Recent efforts have focused on exploiting multipaths to different embedding functions. Suppose that the nodes in N
improve the QoS in systems [7], [20], [21] using constrained
must be embedded along R rows and C columns, starting at
node distribution models. For example, in [21], the nodes are
location ðX; Y Þ of the 2D Basegrid.2 Let q denote the
distributed randomly in a unit disk. In [7], the nodes are
embedding in which each node n 2 N communicates directly
distributed in a narrow strip no wider than 0.86 times the
transmission range of a node. The multipath, multihop, with q neighbors. For q ¼ 4, the embedding function
approach we present in this paper also assumes a constrained    
i1
distribution of the nodes, namely, nodes are on a 2D Basegrid. 4 : ni 2 N ! X þ ði  1Þ mod C; Y þ ;b ð2Þ
While there is no stochasticity in the node distribution, we C
precisely characterize the geometry of the shortest paths and yields a mesh topology. Since the transmission range for
show how to exploit it to achieve better QoS. each node is b, it can only communicate with its four
In the current methods, the motivating factors for
immediate neighbors. Similarly, for q ¼ 8, the embedding
considering multipath routing include fault tolerance, high-
function
er aggregate bandwidth, and load balancing [22], [20], [23],
[24], [25]. The QoS aspects of multipath routing have been    
i  1 pffiffiffi
addressed in [26], [27], [28], and [29]. The split multipath 8 : ni 2 N ! X þ ði  1Þ mod C; Y þ ; b 2 ; ð3Þ
C
routing protocol maintains maximally edge-disjoint paths pffiffiffi
[30]. Braided multipaths discussed in [31] are useful when where the transmission range is b 2, yields the overlapping
the routing is coupled with diagnostic or prognostic mesh topology shown in Fig. 1a. Similarly, other embed-
methods to select alternative paths. All such methods dings such as 6 shown in Fig. 1b arise by changing the
essentially focus on the discovery and maintenance of location and transmission radius of the nodes [33].
multiple paths that are useful under various constraints on In the remainder of this paper, nodes that are assigned to
the node distribution. In contrast, we assume regular mesh location ði; jÞ on the 2D Basegrid are referred to as ni;j . In
topologies and then precisely characterize the set of all the next section, we define contours and their structure
shortest paths between any pair of nodes. We then use this precisely. The results for contours in the 8 embedding are
geometric structure to propose rules for dissemination that
presented in detail. Contours in other embeddings are
result in all available shortest paths being utilized effec-
briefly discussed at the end of the section.
tively so that QoS improves.
The rest of the paper is organized as follows: Section 2 1. A preliminary version of this work was reported in [32].
presents embedding functions that characterize a class of 2. Our method depends only on the relative locations of the source and
mesh topologies that we consider for this work. Section 3 destination nodes, and hence, the specific ðX; Y Þ is not important.
1190 IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 20, NO. 8, AUGUST 2009

Fig. 1. Other embedding examples. (a) 8 . (b) 6 .

3 CONTOURS AND THEIR STRUCTURE


Fig. 2. Different contours in the 8 embedding. Depending on the relative
Definition 1. A contour is the union of all the shortest paths positions of the source and the destination, the contour can be a
between a pair of nodes. rectangle as in (a) or a hexagon as in (b). (a) Contour in 8 enclosed by
a Rectangle. (b) Contour in 8 enclosed by a Hexagon.

Fig. 2 shows two example contours between a pair of


source and the destination. The number of shortest paths in
nodes ni;j and nq;r .3 The shape of a contour depends on the
a contour increases as xy increases.
relative locations of the source and the destination. For
In the 8 embedding, the length of the shortest path
example, Fig. 2a shows a contour in 8 that is a rectangle
between two nodes ni;j and nq;r is
enclosed by the four corner nodes: nq;r , c1, ni;j , and c2. Fig. 2b
shows another contour that is a hexagon enclosed by six dðni;j ; nq;r Þ ¼ maxfx ; y g: ð8Þ
corner nodes: nq;r , c1, c2, ni;j , c4, and c3.
Since the contour depends on the relative position of When viewed as the union of shortest paths, a contour is
the source and destination nodes, its structure can be not symmetric with respect to the source and the sink because
characterized by using only the differences in the x and the paths have direction. In addition, a contour can also be
y locations of the pair of nodes. To this end, we define viewed as a set of nodes. A node ns;t is in a contour if and only if
the following quantities: it is on a shortest path from the source to the destination. In this
view, a contour is symmetric with respect to the source and the
x ðni;j ; nq;r Þ ¼ jq  ij; ð4Þ
destination. From the well-known principle of optimality [12],
y ðni;j ; nq;r Þ ¼ jr  jj; ð5Þ a node, ns;t , is in the contour of ni;j and nq;r if and only if
 
xy ðni;j ; nq;r Þ ¼ x ðni;j ; nq;r Þ  y ðni;j ; nq;r Þ; ð6Þ
  dðni;j ; ns;t Þ þ dðns;t ; nq;r Þ ¼ dðni;j ; nq;r Þ: ð9Þ
xy
ðni;j ; nq;r Þ ¼ : ð7Þ
2
3.1 Structure of Contours in 8
For example, in Fig. 2a, x ¼ 7, y ¼ 3, and xy ¼ 4, and We now present results to characterize the contour between
in Fig. 2b, x ¼ 8, y ¼ 3, and xy ¼ 5. When the context is two nodes nq;r and ni;j .
clear, we use x , y , xy , and  without specifying the To simplify the notation, we only consider the case when q > i,
r > j, and, whenever xy > 0, q  i > r  j. All other cases
3. We consistently use nq;r to represent the source and ni;j to represent
the destination in a contour. can be handled in a similar manner.
MAMIDISETTY ET AL.: MULTIPATH DISSEMINATION IN REGULAR MESH TOPOLOGIES 1191

Lemma 1. In 8 , the contour of ni;j and nq;r is a single shortest Because y is odd, the length of the path from nq;j to
path if and only if xy ¼ 0. nqrþj;j must also be odd. Hence, the length of the path
from ni;j to nqrþj;j is even because x is odd. It follows
Proof. When xy ¼ 0, we know that q  i ¼ r  j. The path
from Lemma 3 that the contour of ni;j and nqrþj;j is a
< ni;j ; niþ1;jþ1 ; . . . ; nq1;r1 ; nq;r > is a shortest path in the rectangle with  ¼ bqrþji c and is enclosed by the
2
embedding 8 between ni;j and nq;r . All other nodes ns;t corner nodes: ni;j , niþ;j , niþ;jþ , and nqrþj;j . Let us
violate the criterion in (9) and are hence are not in the refer to this contour as B. Since the four corner nodes
contour. of B satisfy the distance condition in (9), we can
Next, we need to show that xy ¼ 0 when the conclude that all the nodes in contour B are also in the
contour is a single path. Suppose xy 6¼ 0, and without contour of ni;j and nq;r .
loss of generality, let x > y . By our notation, this Now, consider the node niþrj;r . By the criterion of (9),
means that the length of the shortest path is q  i. Let this node would be in the contour, and no node ns;r with
K > 0 be such that qi ¼ rjþK. Using (8), by direct s < i þ r  j would be in the contour. We can see that
calculation, we have dðni;j ; niþK;j ÞþdðniþK;j ; nq;r Þ ¼ ni;j , niþ1;jþ1 ; . . . ; niþrj;r is the unique shortest path
dðni;j ; nqK;r Þ þ dðnqK;r ; nq;r Þ ¼ dðni;j ; nq;r Þ. This implies between ni;j and niþrj;r . Since y is odd, the length of
that nodes nqK;r and niþK;j have to be on optimal this shortest path must be odd. Consequently, the length
paths. However, using the distance criterion (9), it is of the shortest path from niþrj;r to nq;r via the nodes
easily seen that a path from ni;j to nq;r through both niþrjþ1;r ; niþrjþ2;r ; . . . ; nq1;r ; nq;r must be even. From
these nodes is not a shortest path. This implies we Lemma 3, the contour of niþrj;r and nq;r is a rectangle
have to have at least two shortest paths. But since we with  ¼ bqrþji c and is enclosed by the nodes nq;r ,
2
are given the fact that the contour is a single path, we nq;r , nqþ;r , and nq;r . Let us refer to this contour as
must have K ¼ 0, which is same as xy ¼ 0. u
t T . Since the four corner nodes of T also satisfy the
Lemma 2. In 8 , the contour of ni;j and nq;r comprises two distance condition in (9), we conclude that all the nodes
shortest paths that are enclosed by the nodes ni;j , niþ1;j , nq1;r , in contour T are also in the contour of ni;j and nq;r .
and nq;r if and only if xy ¼ 1. Consider the path < ni;j ; niþ1;jþ1 ; niþ2;jþ2 ; . . . ; niþrjþ;
r þ  > . Let us refer to this path as line-L. From the
Proof. Given the nodes as stated, we can use the distance definition of  (7), i þ r  j þ  ¼ q  , and hence, line-L
criterion in (9) to verify that node niþ1;j and node nq1;r starts at node ni;j and ends at nq;rþ . Similarly, let us
are on different shortest paths from ni;j to nq;r . It now refer to the path < nq;r ; nq1;r1 ; nq2;r2 ; . . . ; niþ;j > as
suffices to note that nodes niþ2;j and nq2;r do not satisfy line-R. Every node ns;t that is not in contour T or
the distance criterion in (9) and, hence, these are the only contour B which is in the contour of ni;j and nq;r must lie
two shortest paths possible. between line-L and line-R. Any node not in the contours
Given two shortest paths between ni;j and nq;r , we now T and B, which is not between line-L and line-R, does not
show that the paths are enclosed by the four nodes as satisfy the distance criterion in (9). We can therefore
stated. We know that a path from nq;r to ni;j is a shortest conclude that the contour of ni;j and nq;r is a rectangle
path only if maxfx ; y g is reduced along each step of the with line-L and line-R as two edges, and hence, the four
path. Since by our notation, q  i > r  j, x must reduce corner nodes are at either ends of these lines.
along each step of the path. In the 8 embedding, there are Next, given a contour of ni;j and nq;r with four corner
only three neighbors of nq;r with a lower x , namely, nodes as stated in the theorem, we show that xy ðni;j ; nq;r Þ
nq1;r1 , nq1;r , and nq1;rþ1 . nq1;rþ1 does not satisfy the
distance criterion in (9). Using similar arguments in the is even. xy ðni;j ; nq;r Þ is even only when x ðni;j ; nq;r Þ and
neighborhood of ni;j , we conclude that only nodes niþ1;jþ1 y ðni;j ; nq;r Þ are both even or are both odd. By definition,
and niþ1;j can be on any shortest path between ni;j and nq;r . ðni;j ; nq;r Þ ¼ jqijjrjj
2 , and ðni;j ; nqrþj;j Þ ¼ jðqrþjÞijjjjj
2 .
Finally, we note that only the nodes on the two shortest Thus, ðni;j ; nq;r Þ ¼ ðni;j ; nqrþj;j Þ. niþ;j is a corner
paths satisfy the distance criterion in (9), and hence, the node in the contour of ni;j and nqrþj;j . x ðni;j ; nqrþj;r Þ ¼
four enclosing nodes are as stated. u
t
2  ðni;j ; nqrþj;j Þ by the structure of the 2D BaseGrid and
Lemma 3. In 8 , given ni;j and nq;r with y ¼ 0, the contour is a hence is even by Lemma 3. Since xy ðni;j ; nqrþj;r Þ ¼ 0, the
rectangle if and only if x is even. The four nodes at the distance dðnqrþj;j ; nq;j Þ is always equal to dðnq;r ; nq;j Þ.
corners of this rectangle are ni;j , niþ;jþ , nq;j , and nq;j .
Therefore, x ðni;j ; nq;r Þ and y ðni;j ; nq;r Þ are either both
(The proof is available in [32].)
even or both odd. Hence, xy ðni;j ; nq;r Þ must be even. t u
Theorem 1. In 8 , the contour of ni;j and nq;r is a rectangle
Lemma 4. In 8 , given ni;j and nq;r with y ¼ 0, the contour is
bounded by the nodes ni;j , niþ;j , nq;rþ , and nq;r if and
enclosed by a hexagon if and only if x is odd and x > 1. The
only if xy is even and xy > 0. six nodes at the corners of this hexagon are ni;j ; niþ; j ;
Proof. Given that xy is even, we first show that the corner niþþ1; j ; nq;jþ ; nq1;jþ and nq;j . (The proof is avail-
nodes of the contour are as stated. Since xy is even, able in [32].)
either x and y are both even or they are both odd. Let Theorem 2. In 8 , the contour of ni;j and nq;r is a hexagon
x and y be both odd without loss of generality. bounded by the nodes ni;j , niþ;j , niþþ1;j , nq;rþ ,
Consider the node nqrþj;j . By the criterion of (9),
nq1;rþ , and nq;r if and only if xy is odd and xy > 1.
this node would be in the contour, and no node ns;j
with s > q  r þ j would be in the contour. The only Proof. The proof is similar to that of Theorem 1 by using
shortest path from node nqrþj;j to nq;r is through the Lemma 4 instead of Lemma 3. u
t
nodes nqrþjþ1;jþ1 ; nqrþjþ2;jþ2 ; . . . ; nq1;r1 (by Lemma 1).
1192 IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 20, NO. 8, AUGUST 2009

4 EFFECTS OF UNIFORM SPREADING


The first strategy we consider for spreading messages over
all shortest paths will be called Uniform Spreading. This is a
straightforward strategy where the source, as well as each
intermediate node along every path in the contour, sends
successive messages in a round-robin fashion to all its
immediate neighbors in the contour. We present this
algorithm and show that the nodes along one of the paths
will always handle more messages than the nodes along
other paths whenever this strategy is used.
The following results characterize the nodes that are
inside a contour.
Observation 1. For any node ns;t that is in an 8 contour of
shortest paths from nq;r to ni;j , its neighbors ns;t1 , ns;tþ1 , and
nsþ1;tþ1 cannot be in the contour.

This follows from the distance criterion in (9). (Recall that


we are considering the case where q > i, r > j, and,
whenever xy > 0, q  i > r  j).
Lemma 5. A node ns1;tþ1 is in the 8 contour of shortest paths
from ns;t to ni;j only if xy ðns;t ; ni;j Þ > 1.
Proof. For ns1;tþ1 to be on a shortest path, we require
maxfjs  1  ij; jt þ 1  jjg < maxfjs  ij; jt  jjg. Clearly,
js  i  1j < js  ij and, hence, this is possible only
when jt þ 1  jj  js  1  ij. Rearranging terms, we get
Fig. 3. Examples of different contour structures for various values of xy . 2  js  ij  jt  jj, and hence, from the definition (7),
(a) 8 . (b) 4 . we conclude that xy ðns;t ; ni;j Þ > 1. u
t
When a message travels along a shortest path, the
In summary, the results in this section completely distance to the destination must be reduced along each step
characterize the structure of the contour (or the set of shortest of the shortest path. In view of the above observation and
paths) between any two nodes in the 8 embedding. lemma, a node ns;t can send the messages it handles to at
most three of its neighbors, i.e., ns1;t1 , ns1;t , and ns1;tþ1 .
3.2 Contours in Other Embeddings Thus, the structure of shortest paths in a contour and the
The structure of contours in the embeddings 3 , 4 , and 6 are location of a node in the contour together constrain the
reported in [33]. In the 4 embedding, the contour of ni;j and number of shortest paths from the node to the destination.
nq;r is a single path when either x or y ¼ 0. Further, when Specifically, a node na;b cannot appear on a shortest path
x > 0 and y > 0, the contour is always a rectangle bounded from ns;t to ni;j if xy ðna;b ; ni;j Þ  xy ðns;t ; ni;j Þ.
by the nodes ni;j , ni;r , nq;r , and nq;j . Fig. 3b shows a few example Given below is the algorithm for uniform spreading. We
contours in the 4 embedding. The structure of contours in the note that in the algorithm both msgCount and ngbrs½ are
6 embedding is similar to the structure of contours in 4 . In dependent on the source-destination pair. We need separate
the 3 embedding, contours have zero, one, or two pendant counters for each source-destination pair. If the first packet
(i.e., adjacent only with a single edge) nodes [33]. in a batch contains the total number of packets in that batch,
then we know how long to maintain the counters. The set of
3.3 Impact of Contour Structure on Dissemination neighbors, ngbrs½, of a node in the contour can be computed
In a multihop routing scheme, each node receives messages by the node as explained above.
from its upstream neighbor along some path and forwards Uniform Spreading Algorithm
this message to its downstream neighbor. In this paper, our
interest is in mechanisms that exploit all the shortest paths. To
utilize multiple paths, each node must receive messages from
a set of upstream neighbors and forward these messages to a
set of downstream neighbors.
To utilize the results in this paper in practical applications,
it is assumed that each message packet contains the location
of both the source and the destination. As the messages
propagate through the network, every intermediate node
could easily compute (using, e.g., the distance criterion)
which of its immediate neighbors are on a shortest path to the In the rest of this section, we analyze the properties of
destination. (This is explained further in the next section). In this algorithm.
addition, the results of this section allow the intermediate
node to know its relative position in the contour. In Section 5, 4.1 Loading under Uniform Spreading in 8
we show how this location information can be used to Uniform spreading is achieved when all the nodes in the
effectively exploit all the available shortest paths in a contour. contour execute the Uniform Spreading algorithm. To
MAMIDISETTY ET AL.: MULTIPATH DISSEMINATION IN REGULAR MESH TOPOLOGIES 1193

Fig. 5. Labeling paths in a contour.

Fig. 4. Uniform spreading in 8 .


Proof. Since xy ¼ 1, there are two paths in the contour from
Lemma 2. All the nodes along one path have xy ¼ 1 with
characterize the effects of this algorithm, we first define what respect to ni;j ; the nodes along the other path have xy ¼ 0.
we call rows in a contour. Let us refer to these paths as Path-1 and Path-0,
respectively. Since all the nodes on Path-1 have a higher
Definition 2. A row in a contour is a set of nodes that are at the xy than the nodes on Path-0, no messages can go from a
same distance (8) from the source. node on Path-0 to a node on Path-1. However, every node
ns;t on Path-1 divides the messages it handles equally
If the length of the shortest path is l, then there will be between its neighbor ns1;t on Path-0 and neighbor ns1;t1
l þ 1 rows in a contour. Note that the source and destination on Path-1. Hence, if the source nq;r generates M messages,
nodes are trivial rows with a single node in each. Fig. 4 shows a the node on Path-1 that is at a distance log2 M from nq;r will
contour with eight rows that has a shortest path of 7 hops. The handle at most one message. This means that the nodes
numbers in the circles show the number of packets handled by starting at node nqlog2 M1;rlog2 M on Path-0 handle at least
different nodes when all nodes use the uniform spreading M  1 messages. u
t
algorithm and the source sends 99 packets. Even though every
To show that uniform spreading results in loading one
node spreads the messages it handles over all the available
path of the contour in general, let us consider subpaths in a
neighbors, many nodes closer to the destination handle more
contour labeled as shown in Fig. 5. All the nodes on Path-k
messages than other nodes. This is the loading phenomenon
have xy ¼ k with respect to the destination, ni;j . Using
that we will characterize precisely in this section.
In the embedding 8 , notice in Fig. 4 that under uniform arguments similar to ones used in the proof of Lemma 6, we
note that a node in a lower numbered subpath cannot
spreading, all the nodes ns;t in rows 1; 2; . . . ;  (where  is as
forward messages to a node in a higher numbered path
defined by (7)) of the contour divide the messages they
because it will not be on a shortest path.
handle into three parts and send each part along one of their
three neighbors that are closer to the destination. Thus, we Lemma 7. Under uniform spreading in a contour in 8 , in every
can conclude that the ratio of the messages handled by a row, nodes along the subpath with xy ¼ 0 with respect to the
node in a row to the smallest number of messages handled destination will always handle more messages than the nodes
by another node in the same row follows the trinomial along other paths.
coefficients.4 The trinomial coefficient T ð; Þ is the coeffi- Proof. The proof is similar to that of the previous lemma. t
u
cient of x in the expansion of ð1 þ x þ x2 Þ . We use the
following properties of trinomial coefficients in this section: Lemma 8. Under uniform spreading in a contour in 8 , nodes
along Path-0 and Path-1 always handle more than M2 messages.
1. T ð; Þ, the central trinomial coefficient, is the
Proof. We show that the nodes nq2þ1;r and nq2þ1;rþ1
largest coefficient in the expansion of ð1 þ x þ x2 Þ handle more than M2 . Consider the nodes in a row at a
and T ð; Þ > 0. P P2 distance 2  1 from the source in the contour. Notice
2. Suppose AðÞ ¼ 1 i¼0 T ð; iÞ ¼ j¼þ1 T ð; jÞ; then, that the number of messages handled by node nq2þ1;r
AðÞ 1
3 < 2 . This follows from the symmetry of the corresponds to the central trinomial coefficient
trinomial coefficients and T ð; Þ > 0. T ð2  1; 2  1Þ. The sum of all the messages in
nodes handled by the nodes in row q  2 þ 1 is
2Að2  1Þ þ T ð2  1; 2  1Þ. The lemma follows
Lemma 6. Given a 8 contour with xy ðnq;r ; ni;j Þ ¼ 1, if nq;r sends from the property that Að2  1Þ < 1=2. u
t
M messages to ni;j , nodes along one path handle M  1 messages
Theorem 3. Under uniform spreading in a contour in 8 , when
after log2 M steps along the shortest path from nq;r to ni;j .
x 6¼ 0 and y 6¼ 0, nodes on the subpath with xy ¼ 0, with
4. This is true to the extent that the number of messages can be equally respect to the destination, will always handle more messages
divided among the nodes in a row. than the nodes along other paths.
1194 IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 20, NO. 8, AUGUST 2009

Fig. 7. Spreading in the expansion region.

5 OPTIMAL SPREADING
We now present an algorithm for spreading the messages so
that all the available paths are effectively utilized. Recall
that a row is a collection of nodes in the contour that are at
the same distance from the source. Let w be the number of
nodes in a row of a contour. We refer to w as the width of
the row. If the source sends M messages and if every node
5
in every row handles M w messages, then we can say that the
spreading is the best in the sense that all available paths are
effectively used. This is the criterion of optimality that we
choose. We will show that the algorithm presented in this
section is optimal in this sense.
Fig. 6 shows examples of two contours—one in 8 and the
other in 4 . Notice that the width of a row, w, varies with the
row number in three ways in both the contours. w first
increases monotonically, then remains constant, and then
decreases monotonically. We refer to these three regions as
the Expansion region, Propagation region, and Contraction
region, respectively.
Observation 2. In the 8 embedding, the width w of any row in the
expansion region is odd, and the width of the next downstream
row is w þ 2. When xy > 0 and even, the width of the rows in
the propagation region is the same as the largest w in the
expansion region; when xy > 0 and odd, the width of the rows in
Fig. 6. Expansion, propagation, and contraction regions. the propagation region is w þ 1. The width of each successive row
(a) Contour in 8 . (b) Contour in 4 .
in the contraction region reduces by two until the ni;j is reached.
Consider two adjacent rows m and m þ 1 in the
Proof. First, consider nodes along Path-2. Since each node
expansion region with widths w and w þ 2, respectively.
sends the messages it handles to three downstream nodes,
Since there are more nodes in row m þ 1, if all of them have
after m ¼ log3 M steps on Path-2, the node nqm;rm will
to handle the same number of messages, then at least some
handle at most one message. This node must be in row m of
of them have to receive messages from two nodes in row m.
the contour. From the properties of trinomial coefficients,
The strategy we propose uses a special labeling of the nodes
the node nqm;rmþ1 , on Path-ð2  1Þ path, will handle
in a row; every node can compute its own label using the
m messages. After m0 ¼ log3 log3 M more steps along Path-
contour structure results discussed in Section 3.
ð2  1Þ, node nqðmþm0 Þ;rðmþm0 Þþ1 will handle at most
m0 messages. Extending this argument, we conclude that 5.1 Node Labeling
in Path-k, 2; . . . ; 2, some node nqOðlog3 MÞ; rOðlog3 MÞþ2k In any row, nodes on both sides of the middle node are labeled
must handle at most one message. Since the messages as 1; 2; 3; . . . ; bw=2c, as illustrated in Fig. 7. Let nmp represent the
always move from nodes in higher numbered layers to
node that is labeled p in the mth row of a contour. Note that nm p
nodes in lower numbered layers, such messages must
is not the ID (or coordinates) of the node; in each row, two
eventually arrive at the nodes on the Layer-0 path. Hence,
nodes with different IDs would have the same label. However,
we have the theorem. u
t
for any node except the middle one in row m, only one of the
4.2 Effects of Embedding on Loading two nodes with label p would be a neighbor. Thus, for all
We observed similar loading effects under uniform spread- nodes except the middle one in row m, the node label as per the
ing in 4 and 6 . Recall that the structure of the contours in convention shown in Fig. 7 uniquely identifies a neighbor in
6 closely follows that in 4 . In these embeddings, only the row m þ 1. Under this labeling in the 8 embedding, node nm p
nodes along paths on either the X or Y axis get loaded. If mþ1
can communicate with nodes npmþ1 and npþ1 . For the middle
x > y , then the path along the X-axis in the contour will node in row m, there would be two neighbors in row m þ 1
be loaded. Proofs of loading, similar to the ones presented with the same label.
for 8 in the preceding section, for contours in 4 and 6
follow from the properties of binomial coefficients. 5. This is only possible to the extent that M is an integral multiple of w.
MAMIDISETTY ET AL.: MULTIPATH DISSEMINATION IN REGULAR MESH TOPOLOGIES 1195

5.2 Optimal Spreading ensure that all the nodes in every row of a contour handle
Our algorithm for optimal spreading is given below. In roughly the same number of messages. Theorem 4 below
the algorithm, the array ngbrs½ keeps track of the relevant shows that this objective is achieved when each node in the
neighbors for any node. As explained above, the middle expansion region and the contraction region spread messages
node in a row has two relevant neighbors in the next row to its neighbors in the ratios specified in the Optimal
that have the same label. Spreading algorithm. The empirical results in the next section
Optimal Spreading Algorithm show that this notion of optimality significantly improves the
QoS.
Theorem 4. When the source in a contour sends M messages and
there is no message loss, under the Optimal Spreading algorithm,
6
every node in each row of width w handles M w messages.
Proof. We prove the result for the expansion region of the
contour using mathematical induction. As a basis, n11 is in
a row with width w ¼ 1, and it handles M w ¼ M messages.
This node sends messages to three nodes in the next row
in a specific ratio, as given in the algorithm. The middle
M
node in row 2 receives wþ2 ¼ M3 messages from n11 . The
2
two nodes labeled n1 (recall that the middle node in row
m has two neighbors with the same label in row m þ 1)
M
receive wðwþ2Þ ¼ M3 messages each. Thus, all the nodes in
row 2 that has width w ¼ 3 handle M3 messages.
Assume that the nodes in row m of the contour with
width w handle M w messages. We show that all the nodes
M
in row m þ 1 handle wþ2 messages. As per our algorithm,
mþ1
node np sends messages to npmþ1 and npþ1
m
in the ratio
M
w þ 2  2p : 2p. Since this node has w messages, this ratio
Mp Mðp1Þ
implies that nmp sends wþ2  w messages to npmþ1 and
Mp Mp mþ1
w  wþ2 messages to npþ1 . Following this rule, the
ð11ÞM
nodes n1mþ1 receive 1M wþ2  w
M
¼ wþ2 messages from
m
the nodes n1 .
The nodes njmþ1 , 2  j  ðbwþ2 2 c  1Þ, receive

. ðj1ÞM
w  ðj1ÞM
wþ2 messages from nodes nm j1 , and
jM ðj1ÞM
. wþ2  w messages from nodes nmj .
Hence, each node nmþ1 j
M
handles wþ2 messages.
Now, consider nodes nbmþ1 1
wþ2 . These nodes receive 2 
2 c
ðM M
w  wþ2Þ messages from the middle node in row m and
bw=2cM
w  bw=2cM
wþ2 messages from nodes nm bw=2c . Thus,
mþ1 M
nodes nbðwþ2Þ=2c also handle wþ2 messages. Therefore,
M
since the middle node in row m þ 1 receives wþ2
messages from the middle node in row m, we conclude
that the spreading rules presented are optimal for the
expansion region.
Our algorithm for spreading messages is based on the It is easy to see that if the number of messages
following strategy: handled by the nodes in a row at the beginning of the
propagation region are roughly the same, this number
. In the expansion region, nodes nm p send messages to will not change since the nodes do not spread messages.
nodes nmþ1
p and nodes nmþ1
pþ1 in different ratios. The proof for the contraction region also follows from
. In the propagation region, node nm p sends all the similar induction, and the details are omitted. u
t
messages it handles to node npmþ1 . In the above proof (and in specifying our algorithm), it is
. In the contraction region, nodes nm p send messages assumed that the width of rows in the propagation region is
to node npmþ1 and nodes nmþ1
p1 in different ratios, as the same as the largest width in the expansion region.
shown in the algorithm. When the contour is a hexagon (i.e., when xy > 0 and
Intuitively, the nodes in the expansion region spread odd), there are two special cases that must be considered
messages over the available paths, the nodes in the propaga- because if w is the maximum width of the expansion region,
tion region do not spread messages and propagate them the width of the propagation region is w þ 1, and the
along a single path, and the nodes in the contraction region
coalesce messages from multiple paths. Our objective is to 6. This is only possible to the extent that M is an integral multiple of w.
1196 IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 20, NO. 8, AUGUST 2009

maximum width of the contraction region is w. These rules


are also similar to the rules specified in our algorithm [33].
To implement optimal spreading in practice, in more
general situations, one can effect the spreading of messages
in the desired ratio by using a randomized strategy that
chooses the neighbors with the proportional probabilities.
Then, the above result of equitable distribution of load
holds in an expected sense.

6 RESULTS
To evaluate the QoS achieved by CGD, we designed and
implemented a discrete-event simulation using the OM-
Net++ framework [34]. The results in this section demon-
strate the performance of CGD. For all simulations, the nodes
were embedded on the 2D Basegrid using the 8 embedding
with xy ¼ 4, one source, and one sink in the contour. In the
scenarios where the number of messages was not varied, the
source sent 5,000 messages, each of which is 36 bytes long. To
study the effects of an increased number of messages, the
number was changed between 5 and 50,000.

6.1 Simulation Approach


The multipath, multihop, dissemination of messages from
the source to the sink was modeled as a multistage queuing
network. The service time of each queue was exponentially
distributed with a mean time of 30 ms to represent 1) the
time required to propagate a message from the preceding
node, 2) the time required to receive a message in the node,
and 3) the time required to forward the message toward the Fig. 8. In optimal CGD, all the nodes in a row of the contour handle
sink. Using the channel modeling capability in OMNet++, roughly the same number of messages. This balance is not maintained
the data rate (bandwidth) was set to 38.4 Kbps. Propagation in uniform CGD. (a) Uniform CGD. (b) Optimal CGD.
delay and bit error rates were assumed to be zero, and all
links between pairs of nodes were identical. The source at the sink, t0 , were recorded. The end-to-end latency for this
generated messages with an interarrival time that was message is t0  t. The average end-to-end latency was the
exponentially distributed with a mean time of 20 ms.7 average value of t0  t over all the messages received at the
To ensure that the simulations reflected real-world sink. Jitter was the standard deviation of the end-to-end
constraints on low-power wireless propagation and topol- latencies. The ratio of the number of messages that were not
ogy, we weakened the regular topologies, which were used received at the sink to the number of messages that were sent
in the analysis in the preceding sections, by modeling link from the source was the message loss rate. To evaluate the
failures and wireless propagation irregularities. To model effects of congestion on the performance, we considered the
link failures, the probability of success for each link was number of messages lost when 1) the service time in each
varied between zero (failure) and one (success). Before node increases and 2) the number of messages sent by the
sending a message to a dowstream node, a random number source increases. In addition, throughput—defined as the
was drawn from a uniform distribution; the message was number of messages arriving at the sink per unit time—was
sent only if this random number was larger than the link used as a metric to evaluate the scalability of CGD.
failure threshold. To account for wireless propagation Since none of the multipath routing methods described in
irregularities [35], a probability of success was assigned to Section 1 relies on effectively using all the available paths to
each link in the neighborhood of a node that was drawn improve QoS, the metrics discussed above were used to
from a Weibull distribution using the parameters reported compare the performance of CGD with the performance of
in [35]. We varied the percentage of such irregular nodes 1) flooding and 2) single-shortest-path routing (Unipath),
from 0 (no nodes with irregular propagation) to 100 (all which is typically used in distance vector routing. Our focus
nodes have irregular propagation). To investigate the on regular topologies allowed us to hand-compute the
relationship between wireless propagation irregularity and shortest paths. We used flooding with duplicate elimination
the structure of the contour, we also considered the case and only considered the communication costs incurred by
where irregular nodes were localized to the expansion and nodes in the contour. We expected the average latency and
propagation regions of the contour. jitter to be much better than flooding. Since CGD exploits
6.2 QoS Metrics multiple paths, Unipath served as a watermark for acceptable
performance. The performance of CGD was investigated both
The number of messages handled by each node, average end- under uniform spreading (uniform CGD) and under optimal
to-end latency, jitter, and message loss rate were the primary spreading (optimal CGD).
QoS metrics. For each message, the time at which it was sent
from the source, t, and the time at which this message arrived 6.3 Performance of CGD
Fig. 8 shows a histogram of the number of messages
7. We developed a Java program that generated the source files required
by the OMNet++ framework. The rules for dissemination, using uniform handled in each node in uniform CGD and optimal CGD.
and optimal spreading, were encoded in these files. There were 56 nodes in the contour with xy ¼ 4. As shown
MAMIDISETTY ET AL.: MULTIPATH DISSEMINATION IN REGULAR MESH TOPOLOGIES 1197

Fig. 9. Optimal CGD maintains a balance among the nodes in a row of


a contour even in the presence of link failures. This result is obtained
when the probability of link failure was 0.2 for every link in the contour.
(a) Uniform CGD. (b) Optimal CGD.

in Fig. 8b, all the nodes in a row handle roughly the same
number of messages in optimal CGD.

6.3.1 Effects of Link Failures


To weaken the regular topologies considered in the
analysis, we examined the effects of link failures. Fig. 9
shows the number of messages handled by the nodes in a
row when the probability of link failure is 0.2. Notice that
optimal CGD (Fig. 9b) is more balanced than uniform CGD
(Fig. 9a). A similar balance across the nodes was observed
Fig. 10. The average latency and jitter of optimal CGD is significantly
when the link failure probability was varied over a range. lower than that of uniform CGD, flooding, or Unipath. The nonzero
This balance improves the QoS achieved by CGD. message loss rate for Unipath, Flooding, and Uniform CGD, when the
Fig. 10 compares the QoS achieved by optimal CGD and link failure probability is zero, is because of buffer overflow. (a) Average
uniform CGD with that achieved using Unipath and latency. (b) Jitter. (c) Message loss rate.
flooding. The probability of link failure was varied from
zero to one, and each link in the multihop network was By comparing Fig. 11 with Fig. 10, it can be noticed that
assumed to fail independently with equal probability. irregular wireless propagation effects are much less severe
Notice in Figs. 10a and 10b that optimal CGD achieves the than the effects of link failure. This is because unlike link
lowest average latency and jitter. We believe that the almost failure, when the wireless propagation is irregular, we can
constant jitter achieved by optimal CGD is due to the better still expect some communication to proceed.
load balancing across nodes. The performance of uniform We also examined how the location of nodes with irregular
CGD follows the performance achieved using Unipath. As wireless propagation affects the QoS of CGD. Fig. 12 shows
expected, Fig. 10c shows a low message loss rate for flooding. the QoS achieved under optimal spreading when the
irregular nodes are localized either to the expansion region
6.3.2 Effects of Propagation Irregularity or the propagation region of the contour. The average latency
Fig. 11 shows the QoS of CGD in the presence of nodes with (Fig. 12a) is worst when the nodes with irregular wireless
wireless propagation irregularity. As shown in Fig. 11a, propagation occur in the expansion region of a contour. The
optimal CGD achieves the lowest average end-to-end jitter followed a similar trend. Note that the message loss rate
latency. Similarly, the Jitter (Fig. 11b) is also low. However, (Fig. 12b) is low when the nodes with irregular wireless
as expected, the loss rate is lower for flooding. propagation occur in the expansion region.
1198 IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 20, NO. 8, AUGUST 2009

Fig. 11. The average latency and jitter achieved using optimal CGD is Fig. 12. When the nodes with irregular wireless propagation can be
significantly lower even when a large number of nodes in the contour localized to the expansion region of a contour, the message loss rate
have irregular propagation. (a) Average latency. (b) Jitter. improves. (a) Average latency. (b) Message loss rate.

6.3.3 Scalability these paths cannot be exploited using a straightforward


We examined the performance of optimal CGD when the scale strategy such as uniform spreading. While the results in
increases, i.e., when the number of nodes and the number of Figs. 10 and 11 show that uniform spreading performs better
messages increase. The results in the preceding section show than methods based on Unipath, optimal CGD effectively
that uniform CGD performs better than Unipath and Flood- exploits all the available shortest paths and improves QoS.
ing, and optimal CGD performs better than uniform CGD. For
this reason, the following results only compare the perfor-
mance of optimal CGD with that of uniform CGD.
To investigate how QoS changes with scale, we increased
the number of nodes and the number of messages and
observed the average latency and throughput. Fig. 13 shows
the average latency and throughput achieved when the
number of nodes in the contour is increased. We maintained
xy ¼ 4 as the number of nodes increased from around
50 to 500. While the average latency increased linearly,
because the length of the shortest path increased, the
throughput also decreases. However, the throughput of
optimal CGD is better than that of uniform CGD.
Figs. 14 and 15 show a comparison of the average delay
and throughput achieved when the queues in the intermedi-
ate nodes build up. In Fig. 14, the service time is increased
from a mean value of about 3 ms to about 80 ms. The rate at
which messages were generated at the source was not
changed. The average latency and throughput of optimal
CGD is better than that of uniform CGD. In Fig. 15, the
number of messages sent by the source increased from 5 to 50,
from 50 to 500, from 500 to 5,000, and from 5,000 to 50,000.
Optimal CGD performs much better than uniform CGD.

6.4 Summary and Discussion Fig. 13. The average latency and throughput achieved using optimal
The preceding results demonstrate that despite the avail- CGD are significantly better than those of uniform CGD. (a) Average
ability of multiple shortest paths between a pair of nodes, latency. (b) Throughput.
MAMIDISETTY ET AL.: MULTIPATH DISSEMINATION IN REGULAR MESH TOPOLOGIES 1199

Fig. 15. As the number of messages sent from a source increase,


optimal CGD delivers higher throughput and lower latency than uniform
CGD. (a) Average latency. (b) Throughput.
Fig. 14. When the service times increase, the queues in intermediate
nodes buildup. Notice that when uniform CGD is used, the effects on the
average latency and throughput are more pronounced because of optimal dissemination, some nodes must disseminate the
loading. (a) Average latency. (b) Throughput. messages over the available paths, and other nodes use only
one of the available paths. Identifying these sets of nodes in
Fig. 8 shows that the nodes in the same row of a contour general topologies is an interesting problem. In the future,
handle roughly the same number of messages when using the optimal dissemination techniques can be enhanced to
optimal CGD. Optimal CGD maintains this balance across improve QoS, mitigate interference, reduce hotspot effects,
nodes even in the presence of link failures (Fig. 9). The and design next-generation monitoring and surveillance
systems based on wireless mesh topologies.
performance of CGD remains robust in the presence of
nodes with irregular wireless propagation. Interestingly, as
shown in Fig. 12, when the nodes with irregular wireless APPENDIX
propagation are localized to the expansion region of the Proof (Lemma 3). Since y ¼ 0, we have j ¼ r. We first
contours, the effect of irregularity on latency and through- show that when x is even, the contour is enclosed by
put is less pronounced. This implies that it is important for the four corner nodes. Because y ¼ 0, < ni;j ; niþ1;j ; . . . ;
designers and system installers to focus on minimizing nq1;j ; nq;j¼r > , shown in Fig. 16, is a shortest path. Since
nodes with irregular wireless propagation in certain parts of x is even, there are an odd number of nodes in this
the system. The performance improvement achieved by path. Let us call this path a Layer-0 path. (This
optimal CGD is robust with respect to the increase in nomenclature will become clear shortly).
service time, the number of messages sent from the source, Any subpath <    ns;j ; nsþ1;j ; nsþ2;j    > in the Layer-0
and the number of nodes in the contour, as shown by the path can be replaced by a path <    ns;j ; nsþ1;jþ1 ; nsþ2;j    >
results in the preceding section. o r <    ns;j ; nsþ1;jþ1 ; nsþ2;jþ1 ; . . . ; nsþk; jþ1 ; nsþkþ1; j    >,
The practical use of CGD will be impacted by physical- where i þ 1  k  q  1 without increasing the length of
layer effects and application dynamics. In the future, we the shortest path. We call such a path as a Layer-1 path.
expect to investigate the performance of CGD in application Shortest paths that go up to j þ 2 are called Layer-2 paths,
scenarios, through simulations and experiments, that and so on, until a Layer- path. Similarly, we can define
account for Media Access Control (MAC) and interference Layer-1, Layer -2, . . . , Layer- paths. Fig. 16 shows such
across multiple paths. shortest paths.

7 CONCLUSIONS
Many future engineered systems that are based on peer-to-
peer-connected mesh topologies are likely to have multiple
paths between a pair of nodes. We defined a contour as the
union of all shortest paths between a pair of nodes. Using a
regular topology, we proved that when the messages are
spread uniformly over the paths in a contour, nodes along
one path handle more messages than other messages. We
presented an optimal strategy for spreading messages in
such systems, and our results demonstrate the effectiveness
of the spreading strategy.
Although the results are based on regular topologies,
they represent upper bounds on what can be achieved in
general topologies. These results reveal that to achieve Fig. 16. Layered paths when x is even.
1200 IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 20, NO. 8, AUGUST 2009

The node ni;jþ1 cannot be on any shortest path because [10] J. Agre, L. Clare, and S. Sastry, “A Taxonomy for Distributed
any path between ni;j and nq;j that passes through ni;jþ1 Real-Time Control Systems,” Advances in Computers, vol. 49,
pp. 303-352, 1999.
will have length  x þ 1. Similarly, node nq;jþ1 cannot [11] K. Russell, “Maximizing Performance for Wireless Mesh Net-
be on any shortest path between ni;j and nq;j . works,” EE Times, Feb. 2007.
In each layer k, 1  k  , the number of nodes that [12] R.E. Bellman, Dynamic Programming. Princeton Univ. Press, 1957.
can be on any shortest path between ni;j and nq;j [13] K. Akkaya and M. Younis, “A Survey on Routing Protocols for
reduces by 2  k. For example, the Layer-1 path will Wireless Sensor Networks,” Ad Hoc Networks, vol. 3, pp. 325-349,
2005.
have ðx þ 1Þ  2 nodes, the Layer-2 path will have [14] D.B. Johnson and D.A. Maltz, “Dynamic Source Routing in Ad Hoc
ðx þ 1Þ  4 nodes, and so on. Hence, the Layer- path Wireless Networks,” Mobile Computing, Imielinski and Korth, eds.,
must have a single node, i.e., niþ;jþ since the Layer-0 vol. 353, pp. 153-181, Kluwer Academic Publishers, 1996.
path has an odd number of nodes because x is even. [15] S. Murthy and J.J. Garcia-Luna-Aceves, “An Efficient Routing
Protocol for Wireless Networks,” Mobile Networks and Applications,
Similar arguments apply to the Layer -1, Layer -2, . . . , vol. 1, no. 2, pp. 183-197, 1996.
Layer- paths, and the Layer- path must have a single [16] C.E. Perkins and P. Bhagwat, “Highly Dynamic Destination-
node, i.e., nq;j . Hence, the four corners of the Sequenced Distance-Vector Routing (DSDV) for Mobile Compu-
rectangle are as required. ters,” Proc. ACM SIGCOMM ’94, pp. 234-244, 1994.
Next, given a contour with four corner nodes ni;j , [17] D. Chen and P.K. Varshney, “QoS Support in Wireless Sensor
Networks: A Survey,” Proc. Int’l Conf. Wireless Networks
niþ;jþ , nq;j , and nq;j , we show that x is even. (IWCN ’04), June 2004.
Consider the path from ni;j to niþ;jþ . The length of this [18] T. He, J.A. Stankovic, C. Lu, and T. Abdelzaher, “SPEED: A
path is the same as the length of the path from ni;j to Stateless Protocol for Real-Time Communication in Sensor Net-
niþ;j because of the structure of the 8 embedding. x is works,” Proc. 23rd Int’l Conf. Distributed Computing Systems
2  lengthðni;j ; niþ;j Þ and is hence even. u
t (ICDCS), 2003.
[19] C. Lu, B.M. Blum, T.F. Abdelzaher, J.A. Stankovic, and T. He,
Proof (Lemma 4). The arguments are similar to the ones “RAP: A Real-Time Communication Architecture for Large-Scale
Wireless Sensor Networks,” Proc. Eighth IEEE Real-Time and
used in the proof of Lemma 3. The only difference is that
Embedded Technology and Applications Symp. (RTAS), 2002.
the Layer- path will have two nodes instead of one [20] S. Muller, R.P. Tsang, and D. Ghosal, “Multipath Routing in
because there are an even number of nodes in the Layer-0 Mobile Ad Hoc Networks: Issues and Challenges,” Lecture Notes in
Computer Science, Springer, 2004.
path, and the number of nodes on each successive layer [21] E. Hyytia and J. Virtamo, “On Traffic Load Distribution and Load
reduces by two. u
t Balancing in Dense Wireless Multihop Networks,” EURASIP
J. Wireless Comm. and Networking, vol. 2007, pp. 1-15, 2007.
[22] R. Draves, J. Padhye, and B. Zill, “Routing in Multi-Radio,
ACKNOWLEDGMENTS Multi-Hop Wireless Mesh Networks,” Proc. ACM MobiCom,
Sept./Oct. 2004.
The authors thank the anonymous reviewers whose com- [23] P.P. Pham and S. Perreau, “Performance Analysis of Reactive
ments on an earlier draft of this paper have helped to Shortest Path and Multi-Path Routing Mechanism with Load
Balance,” Proc. IEEE INFOCOM, 2003.
improve the presentation. This material is based upon work [24] A. Valera, W. Seah, and S.V. Rao, “Cooperative Packet Caching
supported by the US National Science Foundation (NSF) and Shortest Multipath Routing in Mobile Ad Hoc Networks,”
Proc. IEEE INFOCOM, 2003.
under Grant 0720736. Any opinions, findings, and conclu-
[25] L. Wang, Y. Shu, M. Dong, L. Zhang, and W.W.O. Yang,
sions or recommendations expressed in this material are “Adaptive Multipath Source Routing in Ad Hoc Networks,” Proc.
those of the authors and do not necessarily reflect the views IEEE Int’l Conf. Comm. (ICC ’01), vol. 3, 2001.
[26] Y.S. Chen, C.Y. Tseng, J.P. Shue, and P.H. Kuo, “An On-Demand,
of the NSF. Link-State, Multi-Path QoS Routing in a Wireless Mobile Ad-Hoc
Network,” Proc. European Wireless Conf. (EW), 2002.
[27] A. Fallahi, E. Hossain, and A.S. Alfa, “QoS and Energy Trade
REFERENCES Off in Distributed Energy-Limited Mesh/Relay Networks: A
[1] R.N. Murthy, A. Gosain, M. Tierney, A. Brody, A. Fahad, J. Bers, Queuing Analysis,” IEEE Trans. Parallel and Distributed Systems,
and M. Welsh, “CitySense: A Vision for an Urbanscale Wireless vol. 17, no. 6, pp. 576-592, June 2006.
Networking Testbed,” Proc. ACM Sixth Workshop Hot Topics in [28] R. Leung, J. Liu, E. Poon, A. Chan, and B. Li, “MP-DSR: A QoS-
Networks (HotNets ’07), Nov. 2007. Aware Multi-Path Dynamic Source Routing Protocol for Wireless
[2] N. Hayslip, S. Sastry, and J. Gerhardt, “Networked Embedded Ad-Hoc Networks,” Proc. 26th Ann. IEEE Conf. Local Computer
Automation,” Assembly Automation, vol. 26, no. 3, pp. 235-241, 2006. Networks (LCN ’01), pp. 132-141, 2001.
[3] J.Z. Hecker, “PORT SECURITY—Nation Faces Formidable Chal- [29] W.H. Liao, C.Y. Tseng, S.L. Wang, and J.P. Sheu, “A Multi-Path
lenges in Making New Initiatives Successful,” technical report, US QoS Routing Protocol in a Wireless Mobile Ad-Hoc Network,”
General Accounting Office, 2002. Proc. First Int’l Conf. Networking (ICN), 2001.
[4] J. Hill, M. Horton, R. Kling, and L. Krishnamurthy, “The Platforms [30] S.J. Lee and M. Gerla, “Split Multipath Routing with Maximally
Enabling Wireless Sensor Networks,” Comm. ACM, vol. 47, no. 6, Disjoint Paths in Ad Hoc Networks,” Proc. IEEE Int’l Conf. Comm.
pp. 41-46, June 2004. (ICC ’01), vol. 10, 2001.
[5] I.F. Akyldiz, X. Wang, and W. Wang, “Wireless Mesh Networks: [31] D. Ganesan, R. Govindan, S. Shenker, and D. Estrin, “Highly-
A Survey,” Computer Networks, vol. 47, pp. 445-487, 2005. Resilient, Energy-Efficient Multipath Routing in Wireless
[6] G. Coulouris, J. Dollimore, and T. Kindberg, Distributed Systems Sensor Networks,” Mobile Computing and Comm. Rev., vol. 1,
Concepts and Design, fourth ed. Addison-Wesley, 2005. no. 2, 2002.
[7] J. Gao and L. Zhang, “Load-Balanced Short-Path Routing in [32] I.-H. Chu, M. Duan, and S. Sastry, “Contour Guided Dissemina-
Wireless Networks,” IEEE Trans. Parallel and Distributed Systems, tion for Networked Embedded Systems,” Proc. Int’l Symp.
vol. 17, no. 4, pp. 377-388, Apr. 2006. Innovative Real-Time Applications of Distributed Sensor Network
[8] C. Intanagonwiwat, R. Govindan, D. Estrin, J. Heidemann, and (IRADSN ’06), Oct. 2006.
F. Silva, “Directed Diffusion for Wireless Sensor Networking,” [33] K.K. Mamidisetty, “Generalizing Contour Guided Dissemina-
IEEE/ACM Trans. Networking, vol. 11, no. 1, pp. 2-16, 2003. tion in Mesh Topologies,” MS thesis, Univ. of Akron, May
[9] J. Kulik, W. Heinzelman, and H. Balakrishnan, “Negotiation- 2008.
Based Protocols for Disseminating Information in Wireless Sensor [34] A. Vargas, “Omnet++Discrete Event Simulation System,” Proc.
Networks,” Wireless Networks, vol. 8, pp. 169-185, 2002. European Simulation Multiconf., pp. 319-324, June 2001.
MAMIDISETTY ET AL.: MULTIPATH DISSEMINATION IN REGULAR MESH TOPOLOGIES 1201

[35] G. Zhao, T. He, S. Krishnamurthy, and J.A. Stankovic, “Impact Shivakumar Sastry received the bachelor’s
of Radio Irregularity on Wireless Sensor Networks,” Proc. Second degree in electronics engineering from Banga-
Int’l Conf. Mobile Systems, Applications, and Services (MobiSys ’04), lore University in 1984, the master’s degree in
pp. 125-138, 2004. electrical engineering from Indian Institute of
Science, the master’s degree in computer
Kranthi K. Mamidisetty received the bachelor’s science from the University of Central Florida,
degree in electronics and communication en- and the PhD degree from Case Western Reserve
gineering from Jawaharlal Nehru Technological University. Prior to his transition into academics,
University and the master’s degree in electrical he held industry positions with GE Consulting
engineering from the University of Akron, Ohio, Services and Rockwell Automation. Since 2002,
in 2008. He is currently pursuing his PhD degree he has been a member of the faculty in the Department of Electrical and
at the Department of Electrical and Computer Computer Engineering, University of Akron, Akron, Ohio. He is the
Engineering, University of Akron. recipient of several awards and holds two US patents. He is a member of
the IEEE Computer Society.

P.S. Sastry received the BSc(Hons) degree in


physics from the Indian Institute of Technology
Minlan Duan received the bachelor’s degree in (IIT), Kharagpur, in 1978 and the BE degree in
electrical engineering from the Beijing Institute of electrical communications engineering and the
Technology, China, in 2005 and the MS degree in PhD degree from the Department of Electrical
electrical engineering from the University of Engineering, Indian Institute of Science (IISc),
Akron, Akron, Ohio, in 2007. She is currently with Bangalore, in 1981 and 1985, respectively. Since
Denso International America, Inc. 1986, he has been a faculty member in the
Department of Electrical Engineering, IISc, where
he is currently a professor. He has held visiting
positions at the University of Massachusetts, Amherst, at the University of
Michigan, Ann Arbor, and at General Motors Research Laboratories,
Warren. He is an associate editor of IEEE Transactions on Systems, Man,
and Cybernetics and IEEE Transactions on Automation Science and
Engineering. He is a fellow of the Indian National Academy of Engineering
and a senior member of the IEEE. He is a recipient of the Sir C.V. Raman
Young Scientist Award from the Government of Karnataka, the Dr. Vikram
Sarabhai Research Award from PRL, and the Most Valued Colleague
Award from General Motors.

. For more information on this or any other computing topic,


please visit our Digital Library at www.computer.org/publications/dlib.

Вам также может понравиться