Вы находитесь на странице: 1из 24

Int. J. Ad Hoc and Ubiquitous Computing, Vol. x, No.

x, xxxx 1

Quality of Service in mobile ad hoc networks:


a survey

Ash Mohammad Abbas* and Øivind Kure


Center for Quantifiable Quality of Service in Communication Systems,
Norwegian University of Science and Technology,
O.S. Bragstads Plass, 2E,
N-7491 Trondheim, Norway
E-mail: ash@q2s.ntnu.no
E-mail: okure@unik.no
*Corresponding author

Abstract: To support multimedia applications, it is desirable that an ad hoc network has a


provision of Quality of Service (QoS). However, the provision of QoS in a mobile ad hoc
network is a challenging task. In this paper, we present a review of the current research
related to the provision of QoS in an ad hoc environment. We examine issues and challenges
involved in providing QoS in an ad hoc network. We discuss methods of QoS provisioning
at different levels including those at the levels of routing, Medium Access Control (MAC),
and cross layer. Also, we discuss schemes for admission control and scheduling that are
proposed in the literature for the provision of QoS. We compare salient features of various
solutions and approaches and point out directions for future work.

Keywords: ad hoc networks; QoS; quality of service; methodologies; admission control;


scheduling; fairness.

Reference to this paper should be made as follows: Abbas, A.M. and Kure, Ø. (xxxx)
‘Quality of Service in mobile ad hoc networks: a survey’, Int. J. Ad Hoc and Ubiquitous
Computing, Vol. x, No. x, pp.xxx–xxx.

Biographical notes: Ash Mohammad Abbas is a Post-Doctoral Research Fellow under


European Research and Consortium on Informatics and Mathematics (ERCIM) “Alain
Bensoussan Fellowship” at Centre for Quantifiable Quality of Service in Communication
Systems (Q2S), A Center for Excellence, Norwegian University of Science and Technology
(NTNU). He is a Reader at the Department of Computer Engineering, Aligarh Muslim
University, Aligarh, India and is currently on leave for academic pursuit. He obtained PhD
from Department of Computer Science and Engineering, Indian Institute of Technology
Delhi, India. His current research interests include mobile ad hoc networks, quality of service,
and routing.

Øivind Kure is a Professor at Centre for Quantifiable Quality of Service in Communication


Systems (Q2S), A Center for Excellence, Norwegian University of Science and Technology
(NTNU). He received his PhD from the University of California, Berkeley, USA. His current
research interests include wireless ad hoc and sensor networks, Quality of Service, and
routing.

1 Introduction the communication infrastructure is abolished. Further,


people may communicate forming an ad hoc network
An ad hoc network can be formed on-the-fly and in convention centres and online conferences and
spontaneously without the required intervention of a classrooms without routing their calls to the available
centralised access point or an existing infrastructure. infrastructure. Thus, an ad hoc network may provide
An ad hoc network provides a cost effective means of a cost-effective and cheaper way to share information
communication among many mobile hosts. Applications among many mobile hosts.
of an ad hoc network include battlefield communications The unique characteristics of an ad hoc network
where soldier need to decide for a defend or offend, riot differentiate it from other classes of networks. The
control and law enforcement where only law enforcing mobile devices are connected through wireless links that
personnel need to communicate while others are not may have several effects such as fading, environmental,
allowed to do so to prevent spreading of rumours, obstacles, etc. The devices used to form an ad hoc
emergency rescue missions and disaster recovery where network possess limited transmission range, therefore,

Copyright © 2008 Inderscience Enterprises Ltd.


2 A.M. Abbas and Ø. Kure

the routes between a source and a destination are often contains discussion on basic problems encountered in
multihop. As there are no separate routers, nodes that QoS provisioning together with solutions reported in the
are part of the network need to cooperate with each literature. The survey presented in Hanzo and Tafazolli
other for relaying packets of one another towards their (2007) brings out various factors related to the QoS
ultimate destinations. The devices are often operated provisioning at the level of routing such as design
through batteries, the depletion of battery power may considerations and trade-offs. However, there is need
cause failure of nodes and associated links. The devices for a comprehensive survey on the provision of QoS
may move about randomly, and therefore, the topology in mobile ad hoc networks. Further, we believe that a
of the network varies dynamically. lot of research has carried out since the times of the
Quality of Service (QoS) means that the network surveys that appeared in Perkins and Hughes (2002),
should provide some kind of guarantee or assurance Reddy et al. (2006), Zhang and Mouftah (2005) and
about the level or grade of service provided to an Hanzo and Tafazolli (2007), and a lot more issues
application. The actual form of QoS and the QoS have emerged. Therefore, there is a need to revisit the
parameter to be considered depends upon specific methodologies presented in the literature with different
requirements of an application. For example, an issues and perspectives.
application that is delay sensitive may require the QoS In this paper, we describe a comprehensive survey
in terms of delay guarantees. Some applications may of the research carried out in this area. We start from
require that the packets should flow at certain minimum the theoretical background about provision of QoS and
bandwidth. In that case, the bandwidth will be a QoS discuss state-of-the-art research carried out in different
parameter. Certain application may require a guarantee directions that address different issues. In this survey, we
that the packets are delivered from a given source to have selected only those research papers that appeared
destination reliably, then, reliability will be a parameter either in high quality refereed journals or in proceedings
for QoS. of reputed refereed conferences. We have tried to select
As more and more applications are added on top examples that represent a group of strategies and help in
of an ad hoc network, it is desirable that the network understanding a concept.
should provide QoS in some form or the other. However, The rest of this paper is organised as follows.
the characteristics of an ad hoc network pose several In Section 2, we describe preliminary concepts related to
challenges in the provision of QoS. Some of these the provision of QoS in ad hoc networks. In Section 3, we
challenges are as follows. present a classification of methods of QoS provisioning.
Section 4 contains a brief overview of architectures for
• The topology of the network varies dynamically.
QoS provisioning in ad hoc networks. In Section 5, we
Therefore, it is difficult to design a scheme or a
describe the provision of QoS at the level of routing
protocol that is able to provide hard guarantees
and the schemes that address issues involved therein.
about the QoS desired by an application.
In Section 6, we discuss the provision of QoS at the
• The resources of the devices used are limited, MAC layer. In Section 7, we discuss cross-layer strategies
therefore, any such scheme or a protocol should be for providing QoS in ad hoc networks. In Section 8, we
a light-weight scheme. In other words, the protocol discuss the research carried out in the area of admission
should not consume a significant amount of energy control. In Section 9, we discuss different scheduling
or should not incur a large amount of algorithms used in QoS provisioning. Section 10 contains
computational or communication overheads. the description of research related to the fairness
while providing QoS. Section 11 contains miscellaneous
Due to the above mentioned challenges, one may not methods of QoS provisioning. The last section is for
expect hard guarantees about the QoS. However, one conclusion.
would rather be interested in QoS with soft guarantees.
Owing to its importance, a lot of research is directed
to the provision of QoS in ad hoc networks. There are a 2 Preliminaries
few surveys related to the QoS provisioning in a mobile
ad hoc network including an early survey presented in In this section, we describe preliminary concepts related
Perkins and Hughes (2002). A survey of QoS support in to the provision of QoS in mobile ad hoc networks.
Time Division Multiple Access (TDMA) based ad hoc We first discuss notion of QoS and then categories of QoS
networks is presented in Jawhar and Wu (2005). Another constraints.
survey about the issues and solutions pertaining to QoS
in a mobile ad hoc network is presented in Reddy et al. 2.1 Notion of QoS
(2006). However, a large part of the survey contains the
description of routing protocols and QoS architectural There is no universally agreed upon definition of QoS.
frameworks. Surveys of QoS routing solutions for In general, QoS means that the network is able to
mobile ad hoc networks are presented in Zhang and provide some form of guarantees about the level or
Mouftah (2005) and Hanzo and Tafazolli (2007). the grade of service. Generally, the level of service is
The survey presented in Zhang and Mouftah (2005) based on some parameters or constraints, often known
Quality of Service in mobile ad hoc networks: a survey 3

as QoS parameters or QoS constraints. Examples of Figure 1 shows a pictorial representation of QoS
QoS constraints include available bandwidth, end-to-end constraints and their combinations that fall in NP
delay, delay variations or jitter, probability of packet loss, and P classes of problems. The symbols used are as
etc. In what follows, we briefly describe general categories follows: A for additive, M for multiplicative, and C
of QoS constraints. for concave. Note that finding an optimal path subject
to a combination of two or more additive and/or
2.2 Categories of QoS constraints multiplicative1 constraints is an NP complete problem.
As a result, the problem of selecting any combination
A constraint makes the job of a protocol more stressful of two or more QoS parameters (such as delay, jitter,
as compared to the scenario when there is no constraint hopcount, and loss probability) and optimising them is
specified. For example, in case of routing, a route will an NP-complete problem. The only combinations of QoS
be considered if it satisfies the specified constraints. parameters or metrics that are computationally feasible
The overall value of a constraint from a source to a are bandwidth (which is a concave constraint) and any
destination may be expressed in terms of the values one of the additive/multiplicative constraints mentioned
of its constituents. Let there be a multihop path above. However, approximation algorithms exist for a
between nodes u and v consisting of nodes u1 , u2 , . . . , uk . combination of two or more constraints. Further, a
Let c(i, j) denotes the value of constraint c between commonly used method for multiple constraints to be
nodes i and j or link (i, j). Alternatively, the value of satisfied is sequential filtering. In sequential filtering, one
a constraint along a path depends upon the individual first examines whether paths between a given source and
values of the constraint along the links that form the a destination satisfy a QoS constraint. The subset of
path. Based on how the values of path constraints the paths that satisfy the first QoS constraint is further
are related to the values of their corresponding link examined whether it satisfies the second QoS constraint,
constraints, QoS constraints are classified into the and so on.
following three broad categories (Chao and Guo, 2002).
Figure 1 Constraints and their combination that lie
• Additive: A constraint whose overall value is in P or NP
summation of the values of its constituents. In other
words,

c(u, v) = c(u, u1 ) + c(u1 , u2 ) + · · · + c(uk , v).

For example delay, jitter, hopcount are additive


constraints.
• Multiplicative: A constraint whose resulting value is
a product of the values of its constituents. In other
words,

c(u, v) = c(u, u1 ).c(u1 , u2 ). . . . .c(uk , v).

For example, reliability, and the probability of


packet loss are multiplicative constraints.
In addition to the usual network operations, the
• Concave: A constraint is concave if functionalities that are to be incorporated for QoS
provisioning are (as described in Kurose and Ross (2006))
c(u, v) = min{c(u, u1 ) + c(u1 , u2 ) + · · · + c(uk , v)}. as follows:
For example, bandwidth along a path is minimum • traffic classifier
of the bandwidths of the links that constitute the
• resource reservation
path. Therefore, bandwidth is a concave QoS
constraint. • scheduling
• admission control.
Note that sometimes one may not be able to devise
methods to identify paths that satisfy a combination As mentioned earlier, these are general principles that
of QoS constraints. In other words, there may exist a may apply to any network for the provision of QoS
combination of QoS constraints that may not be satisfied irrespective of whether the network is wired or wireless,
by an underlying algorithm in a reasonable amount of and whether the network possess an infrastructure or
time. Such a problem falls into a specific class of problems does not possess any infrastructure. In case of mobile
called NP-complete problems. If a combination of QoS ad hoc networks, there are a lot of issues and challenges
constraints can be satisfied within a reasonable amount in providing QoS.2 Some of them have already been
of time, then such a problem is said to be a polynomial mentioned in the previous section.
(P) class of problem. There is a specific procedure to In what follows, we elaborate the issues and challenges
determine whether a problem is in P or NP. in QoS provisioning in mobile ad hoc networks.
4 A.M. Abbas and Ø. Kure

2.3 Issues and challenges Another issue in case of mobile ad hoc networks
is that the resources of participating nodes are limited.
As mentioned earlier, in an ad hoc network the Therefore, a protocol (that is considered to be efficient
mobile devices are connected through wireless links for wired or networks with some kind of existing
that are more prone to errors as compared to their infrastructure) that requires extensive computations and
wired counterparts. There are problems such as hidden communications may not be a good option in such
terminal, multipath fading, etc. As opposed to a wired networks. Therefore, a protocol for providing QoS in
network, there are no separate routers, therefore, the ad hoc networks should be light-weight as far as possible
mobile devices need to route packets of one another and should be able to utilise resources in an efficient and
towards their ultimate destination. Generally mobile effective manner.
devices are equipped with omni-directional antennas, and Note that QoS can be provided, in some form or the
therefore, transmission of a node are heard by nodes in other, at different layers of the protocol stack. At what
its vicinity. This causes one more issue – nodes need to layer and in what form the QoS is provided depends upon
coordinate among themselves for transmissions through the requirements of an application. Depending upon the
a shared channel. In other words, a node cannot decide actual QoS requirements of an application, the issues
on its alone about the time of the beginning of a involved in providing QoS are different. Also, the actual
transmission because the channel might be occupied by issues involved can be specific to the method used for QoS
another node in its vicinity. Therefore, the time taken provisioning.
in waiting for the transmission depends upon who are In what follows, we discuss methods of classification
the other neighbouring nodes contending for the channel. of different methodologies for providing QoS in mobile
However, their is no such issue in case of wired networks ad hoc networks.
as the channel, therein, is not shared. Note that there may
be multiple hops from a given source to a destination in
an ad hoc network and at each hop nodes may contend 3 Classification of methodologies
for the channel. Due to channel contention, it is difficult
to provide any hard guarantees about the end-to-end As we pointed out earlier, the issues involved in QoS
delays. provisioning are different depending upon the type of
On the other hand, the topology of an ad hoc network and the requirements of an application, the methodology
varies dynamically due to either movement of mobile of QoS provisioning, and the layer of protocol stack at
devices or depletion of battery power. It may affect QoS which the QoS is to be provided. In this section, we
guarantees provided by the network because a change in wish to classify the methodologies of QoS provisioning
the topology of the network may require to rediscover in mobile ad hoc networks and then we discuss different
the routes adding to the latencies and thus affecting the methods reported in the literature in each class.
QoS. It may also happen that the newly discovered routes Figure 2 shows a classification of methods of
are longer than the routes available before the topological QoS provisioning in mobile ad hoc networks that we
change which will affect the QoS more stringently, as call layered classification. In general, depending upon
the resources that were reserved for a flow before the at which layer of TCP/IP protocol suite the QoS
topological change are no longer reserved, they have provisioning is implemented, one can classify methods of
to be reserved along newer routes. It may also happen QoS provisioning into the following categories:
that the amount of resources required by the flow or
application is no longer available, adding further latencies • MAC layer
and affecting the QoS. Therefore, another issue involved
• network layer
in the provision of QoS in mobile ad hoc networks is how
to tackle changes in the topology of the network. • cross layer.

Figure 2 A layered classification of methods of QoS provisioning in ad hoc networks


Quality of Service in mobile ad hoc networks: a survey 5

Based on the methodologies used, these categories can organised manner. Therefore, it is not essential for a
be further divided into subcategories. For example, classification to classify methods into absolute levels or
MAC layer schemes are divided broadly into three categories.
subcategories: In what follows, we review the research reported in the
literature pertaining to the major categories. We would
• IEEE 802.11 like to mention that in the ensuing discussion we do not
• TDMA strictly follow either layered or functional classification
for the sake of simplicity.
• CDMA.
There can be several other MAC layer protocols as well.
Cross layer strategies are also divided into three sub 4 QoS architectures
categories, namely, scheduling, multirate, and resource
allocation. The strategies at the network layer consists In general, an architectural framework consists of a
mainly of routing protocols which can be divided into group of modules that are required for the QoS
unipath and multipath categories. provisioning in an ad hoc network e.g., routing,
On the other hand, schemes can be classified based on MAC layer, admission control, resource reservation, etc.
the major functionalities required for QoS provisioning. We describe here some of the architectural frameworks
We call it a functional classification, and is shown proposed in the literature for the provision of QoS in
in Figure 3. The major categories that are part of mobile ad hoc networks.
such a classification are routing, MAC, differentiation, An IP-based framework, called INSIGNIA,3 for
admission control, resource reservation, and scheduling. providing QoS in mobile ad hoc networks is presented
There can be different subcategories. For example, in Lee et al. (2000). It uses in-band signalling. The term
scheduling can be divided into rate based scheduling, in-band signalling means that the control information
prioritised scheduling, opportunistic scheduling, etc. is carried with data, and there is no separate control
There can be other classifications as well. For channel as opposed to another type of signalling called
example, there can be a parametric classification out-of-band signalling where control information and
in which methods are classified based on the QoS data are sent on separate channels. The framework
parameters such as delay based, bandwidth based, is aimed to provide adaptive QoS guarantees to an
throughput based, etc. Another classification can be the application. By adaptive, we mean that there is a
behavioural classification in which methods are classified minimum QoS that has to be provided to an application.
based on the manner in which QoS is provided such as The level of QoS can be enhanced later if resources
per hop, per flow, per class, etc. required to support the enhanced QoS are available.
On the other hand, we would like to mention that The architecture has several modules that are routing,
none of these classifications is an absolute classification. in-band signalling, admission control, packet forwarding
In other words, there might be a method that is classified or scheduling, MAC protocol, etc. However, it is a
to fall in a category, however, it may happen that the stateful architecture because it uses soft state resource
method incorporates or uses other methods that belong management scheme to utilise the resources.
to other categories. However, we believe that different An architecture for the provision of QoS in MANETs
works are carried out by different researchers with is called Stateless Wireless Ad hoc Network (SWAN)
different objectives and issues in mind, and therefore, Ahn et al. (2002). It supports service differentiation for
a classification simply helps in studying them in a bit realtime and best-effort traffic. The proposed architecture

Figure 3 A functional classification of methods of QoS provisioning in ad hoc networks


6 A.M. Abbas and Ø. Kure

Table 1 A comparison of architectural frameworks for QoS provisioning

Architecture Features Comments


INSIGNIA (Lee et al., 2000) Adaptive QoS Soft state resource management
SWAN (Ahn et al., 2002) Service differentiation Does not require QoS support
from MAC layer
FQMM (Xiao et al., 2000) Combination of differentiated Scalable
and integrated services

handles both the realtime traffic and the best-effort 5.1 QoS routing protocols
traffic. Local rate control is used for handling the
best-effort traffic of TCP, and a sender-based admission Several protocols are proposed in the literature with a
control is used for the realtime traffic of UDP. A merit of provision of QoS at the level of routing. Their objectives
SWAN is that it is independent of the underlying MAC and aims differ based on their applications and strategies
layer. Alternatively, it does not require a QoS support used. In what follows, we discuss some of them.
from the MAC layer. It can be used for QoS provisioning
even if the underlying MAC layer provides a best-effort 5.1.1 Bandwidth estimation based routing
service.
Another architectural model called Flexible QoS Generally, routing protocols find a feasible route from
Model for Mobile ad hoc networks (FQMM) is presented a source to a destination without taking into account
in Xiao et al. (2000). It provides a combination of current traffic in the network or specific requirements
aggregation of traffic classes as that of differentiated of an application. As a result, the network may
services model and at the same time it possesses the per become overloaded and the requirements of a realtime
flow granularity of integrated services model. Specifically, application that requires a support for QoS may not be
high priority flows are provided per flow QoS and lower met. Therefore, there seems a need to estimate the traffic
priority flows are aggregated into a set of service classes. in the network so that a feedback can be provided to the
The hybrid treatment of the traffic is based on the application in case when its requirements cannot be met.
intuition that the fraction of flows with high priority and A QoS aware routing that is based on the bandwidth
that need per flow QoS is much less as compared to flows estimation for mobile ad hoc networks is proposed in
with low priority. However, the service level of a flow Chen and Heinzelman (2005). The protocol incorporates
may change dynamically from per flow to per class and an admission control scheme together with a feedback
vice versa depending upon the traffic load in the network. scheme to meet the QoS requirements of realtime
The framework is scalable and provides a basis for future applications. The QoS routing protocol is based on
models to come up with better QoS guarantees. Ad hoc On-demand Distance Vector (AODV) routing.
A comparison of these architectural frameworks for The protocol is based on the intuition that the end-to-end
QoS provisioning in ad hoc networks is given in Table 1. throughput of a route depends upon the minimum
end-to-end residual bandwidth available along the route.
Future work To estimate available residual bandwidth, two methods
are used. In the first method, hosts listen to the channel
There are several issues that can be addressed in future and estimate the available bandwidth that is based on
such as how to decide about the classification of traffic the ratio of the time for which the channel is free and
and what percentage of traffic can be treated on per flow the time for which the channel is busy. This estimate
basis. Also, none of these architectures takes into account is called ‘listen’ bandwidth estimation. In the second
how to sustain a given level of QoS in the presence of method, every host disseminate the information about
mobile nodes or how a source node can predict what the bandwidth used by it currently. This dissemination is
level of QoS it may receive based on the current network carried out through ‘hello’ messages. A host estimates its
conditions. All these issues may be addressed in future. available bandwidth indicated in the ‘hello’ messages that
In what follows, we review the research related to the it receives from its two hop neighbours. This is called the
provision of QoS at the level of routing. ‘hello’ bandwidth estimation. The performance of ‘hello’
bandwidth estimation comes out to be better as compared
to the ‘listen’ bandwidth estimation when releasing the
5 Routing bandwidth is required immediately. However, ‘listen’
bandwidth estimation does not incur an additional
There is a lot of work reported in the literature in which overhead as compared to ‘hello’ bandwidth estimation.
the provision of QoS in an ad hoc network is embedded The reason is that in ‘hello’ bandwidth estimation, the
in the routing protocol itself. The provision of QoS at the information about bandwidth consumed by neighbours is
level of routing can be divided into different categories attached in ‘hello’ messages, and these ‘hello’ messages
for the sake of simplifying the discussion. are sent periodically.
Quality of Service in mobile ad hoc networks: a survey 7

A QoS routing protocol called Bandwidth 5.3 Backbone based QoS routing
Reservation in Ad hoc Wireless Networks (BRAWN) is
proposed in Guimaraes et al. (2009). BRAWN is also A QoS routing protocol called Core-Extraction
based on bandwidth estimation, however, it is designed Distributed Ad hoc Routing (CEDAR) is proposed in
for multirate networks. In a multirate network, nodes Sivakumar et al. (1999). The protocol is aimed to satisfy
can choose among several modulation schemes and can bandwidth requirements of a flow from a given source
communicate to neighbours using different transmission to a destination. The protocol consists of three steps
rates depending on channel conditions. BRAWN namely core extraction, link-state propagation, and
provides a network layer solution i.e., no modification route computation. In the core extraction step, a group
is required at the lower layers. The scheme employed of nodes are elected to form the core of the network in a
computes the available bandwidth at a node which is dynamic and distributed fashion by using an approximate
then used to accept or reject a flow. algorithm for minimum dominating set. A core node is
responsible for maintaining the local topology of the
5.1.2 Interference aware routing nodes in its domain and it also computes the routes for
these nodes.
A QoS routing protocol that guarantees the bandwidth A routing protocol called QoS Mobile Routing over
for ad hoc networks with interference considerations is Ad hoc On-demand Distance Vector routing (QMRB-
presented in Jia et al. (2005). The protocol addresses AODV) is proposed in Ivascu et al. (2009). The
the problem of Ad hoc Shortest Widest Paths (ASWP) main motivation behind the protocol is that a realistic
routing. A routing protocol that is aware of the MANET is likely to be heterogeneous. In other words,
interference called as Interference Aware QoS Routing there are some nodes that are rich in resources while
(IQRouting) is proposed in Gupta et al. (2005). others may not be rich enough. The protocol constructs
In IQRouting, several paths are probed using flow a routing backbone consisting of nodes that are rich in
packets in a distributed fashion for satisfying QoS. The resources. These backbone nodes are responsible to route
paths that satisfy the QoS are known as candidate paths. packets to end nodes. Figure 4 shows a network with a
The path that is the best in terms of the QoS amongst all backbone.
candidate paths is chosen by the destination node.
Figure 4 Backbone or core based QoS routing
5.2 Position based QoS routing

A QoS routing protocol called Geographical Vehicular


Grid (GVGrid) for Vehicular Ad hoc Networks
(VANET) is presented in Sun et al. (2006). GVGrid is an
on-demand and a position based routing protocol that
identifies a route from a source node (which is a fixed
base station) to vehicles that lie in a destination region.
The geographical region is divided into squares of equal
size and is called a grid. An underlying assumption in
GVGrid is that every vehicle possesses a digital map and
knows its geographical position and the direction of its
movement through a Geographical Positioning System
(GPS). The intermediate nodes remember the route till it
is broken. The quality of route is determined based on:
• the lifetime
• the packet arrival ratio.
The lifetime of a route is the duration between the time It is worth pointing out that the overheads of movement
instances when a route was established till a link on of an ordinary mobile node will be much less than the
the route is failed. The packet arrival ratio is the ratio overheads involved when a node that is part of the core or
of the packets that have arrived at the destination and the backbone of the network moves. Therefore, protocols
the packets that were sent by the source. It has been that are based on constructing a core or the backbone
shown through simulations that GVGrid performs better may not allow the backbone nodes to move, otherwise,
in terms of lifetime as compared to the contemporary the backbone is required to be constructed a fresh.
protocols.
A position based QoS routing for Ultra-Wide Band 5.4 Multipath QoS routing
(UWB) based ad hoc networks is proposed in Abdrabu
and Zhuang (2006). However, this protocol uses cross A single route from a given source to a destination may
layer properties, therefore, we shall discuss it while not be able to provide enough resources required by
describing cross layer solutions. an application. Therefore, a protocol should be capable
8 A.M. Abbas and Ø. Kure

of identifying multiple paths from a given source to a 5.5 Multicast QoS routing
destination.
A QoS routing protocol called Ticket Based Probing The issues involved in multicast routing with a provision
(TBP) is proposed in Chen and Nahrstedt (1999). A ticket of QoS are investigated in Wu and Jia (2007). Therein,
is a permission for an intermediate node to search authors use a concept of ‘node bandwidth’. Note that
exactly one path. The source sends probes towards the node bandwidth might be related to the transmission rate
destination to search for a low cost path that satisfy the by a node. As the bandwidths at the nodes of an ad hoc
QoS constraint. Each probe is required to carry at least network are limited, a multicast call can be blocked
one ticket and a probe with more than one tickets is despite the fact that enough bandwidth is available in the
allowed to split at an intermediate node each searching system so as to support the call. This is because a single
a different downstream subpath (see Figure 5). As a multicast tree does not exist at the node to support the
result, there can be multiple paths from a given source call. Authors in Wu and Jia (2007) proposed a multicast
to the destination. However, multiple paths searched may routing scheme by using either multiple paths or multiple
not satisfy any kind of disjointness. The protocol avoids multicast trees so that the bandwidth requirement of a
flooding by the ticket mechanism and is able to handle call are met. Therein, three multicast routing schemes are
sessions with either delay or bandwidth constraints. proposed named as Shortest Path Tree Based Multiple
There are multiple levels of path redundancies so as to Paths (SPTM), Least Cost Tree Based Multiple Paths
direct traffic through an alternate path in case of failure (LCTM), and Multiple Least Cost Trees (MLCT). The
of a link along an existing path. However, the protocol routing trees obtained using these strategies can meet the
needs a beacon mechanism to know the neighbours and user’s requirements in terms of delays and bandwidth.
beacon packets are transmitted periodically, therefore,
the overhead may be significant. 5.6 QoS routing with resource allocation

Figure 5 Ticket based probing: probe p1 has only one ticket A framework for generalised QoS routing with resource
while p2 has two tickets allocation is presented in Bashandy et al. (2005). The
framework combines routing with the allocation of
resources along the routes. It employs a dynamic
programming algorithm that tries to find an optimal
path between a given source and a destination and
computes the amount of resources required at each
intermediate node so as to satisfy the end-to-end QoS
requirements along the path. The QoS parameters
considered are end-to-end delay, jitter, reliability, and
bandwidth. These QoS parameters are represented as
functions of resources rather than a fixed value metrics.
Further, the applicability of the framework to rate
based service disciplines (such as GPS, packet by Packet
Generalised Processor Sharing (PGPS), and Self-Clocked
Fair Queueing (SCFQ)) is also investigated.
In what follows, we discuss multiple constraint based
QoS routing.
A routing scheme, in which different connections from a
source to a destination may request different bandwidths 5.7 Constraint based QoS routing
through different alternate paths, is presented in Jia
et al. (2004). The proposed multipath routing deals A problem that is considered to be a part of the QoS
with inaccurate link state problem. Specifically, two provisioning in a network is that how to identify paths
categories of K-shortest routing algorithms, hop-based that satisfy two or more constraints. As mentioned
and bandwidth-based are proposed, and five categories earlier, the problem of finding paths with two or
of path selection algorithms are presented, which are: more additive/multiplicative QoS constraints is an NP
Best-K-Widest (BKW), Random-K-Widest (RKW), complete problem. However, the problem of finding
Shortest-K-Widest (SKW), Best-K-Shortest (BKS), paths with one additive/multiplicative constraint and
and Widest-K-Shortest (WKS). In order to reduce the a concave constraint is not an NP complete problem.
amount of flow of link-state update information, three For example, one can find paths that satisfy two QoS
schemes are proposed that are based on the distance constraints – delay and bandwidth. Note that delay is
of the destination from the source. These schemes are: an additive constraint and bandwidth is a concave (or
Deterministic Frequency Reduction (DFR), Probabilistic min-max) constraint. In Wang and Crowcroft (1996),
Frequency Reduction (PFR), and Hop/Distance an algorithm for bandwidth-delay based QoS routing is
Threshold (HDT). presented. The algorithm first removes all links which
Quality of Service in mobile ad hoc networks: a survey 9

do not satisfy the bandwidth constraint and then finds a between a source to a destination subject to many
shortest path (in terms of delays) in the resultant graph. additive QoS constraints are presented, which are as
Due to the NP completeness of the QoS routing follows. The first FPTAS uses a single auxiliary edge
with two or more constraints, often either approximate weight to compute a shortest path. The algorithm has
algorithms or heuristics are used in place of exact a time complexity of O(Km + n log n) where K is the
algorithms. However, there are papers Mieghem and number of additive constraints, n is the number of nodes,
Kuipers (2004), Kuipers and Mieghem (2005), Mieghem and m is the number of links. It is a K-approximation
et al. (2001) which favour to use exact algorithms algorithm and can be used in hop-by-hop routing
instead of heuristics. The reason given is that the protocols. The second FPTAS is for an optimised
NP-completeness of QoS routing problems with multiple version of QoS routing problem and has the time
 K−1 
constraints occurs in specially constructed network complexity of O n . The third FPTAS is also for
topologies and such topologies are unlikely to occur in an optimised version of QoS routing problem and has
practice in a realistic network. For topologies that do not   K−1 
a time complexity of O n log n + m H , when
show the NP completeness, the complexities of heuristics there exists an H-hop path satisfying K number of
and exact algorithms can be comparable. QoS constraints. However, for implementing the FPTAS
A hop-by-hop QoS routing called Self-Adaptive proposed in Xue et al. (2007), some modifications are
Multiple Constraint Routing Algorithm (SAMCRA) is required. For example, the routing tables are required
proposed in Mieghem et al. (2001). In Mieghem and to store the next hop addresses for every source and
Kuipers (2004), some underlying concepts of an exact destination pair for some discrete values of , and the
QoS routing are explained and are incorporated in values of  can be used to determine the classes of traffic
SAMCRA. One of the concept is nonlinear definition of in the network.
the path length. In the usual linear definition, individual A framework for sufficient rate constraints for QoS
path lengths are simply added to give the resultant path flows in ad hoc networks is presented in Gupta et al.
length. In nonlinear definition, the resultant path length is (2007). It is a theoretical model that predicts the capacity
1/q power of the summation of the q powers of individual of an arbitrary ad hoc network. The proposed model uses
path lengths. Other concepts incorporated in SAMCRA a concept of a specialised graph called a conflict graph.
are k-shortest path approach, non-dominance of paths, A conflict graph represents the interference relationships
and look ahead. These concepts may serve as basic between different links of the network. Specifically, a
building blocks of a multiconstrained routing algorithm. link in the network graph is represented by a node in
The authors of Mieghem and Kuipers (2004) extend the conflict graph. There is a link between two nodes in
a similar theme in Kuipers and Mieghem (2005) in the conflict graph iff the corresponding two links in the
which they have the view that exact QoS routing is network graph interfere with each other. Therein, authors
tractable in practice. Specifically, the NP completeness proposed two sets of constraints – row constraints, and
of a multiconstrained routing problem hinges upon the clique constraints. In a network where some nodes use
following conditions: row constraints and others use clique constraints, the
• the topology union of constraints being satisfied across the network
• the granularity of link weights constitutes sufficient conditions for a flow rate vector to be
feasible. The row and clique constraints can be computed
• the correlation among link weights
in a distributed fashion using localised information about
• the constraints. the topology of the network. Distributed algorithms
Therein, the impact of these conditions on the complexity for capacity estimation that utilise these constraints are
of QoS routing is studied through mathematical analysis proposed. Further, the capacity estimated may be used to
which is further validated using simulations. implement admission control and QoS routing schemes
In Xue et al. (2007), Fully Polynomial Time in an ad hoc network. A comparison of QoS routing
Approximation Schemes (FPTAS) for finding a path protocols is shown in Table 2.

Table 2 A comparison of QoS routing protocols

Protocol Features QoS parameter Comments


QoSR-L (Lin and Liu, 1999) Bandwidth guarantees Bandwidth Time slot assignment
TBP (Chen and Nahrstedt, 1999) Ticket based probing Delay/Bandwidth Multiple paths
BE (Chen and Heinzelman, 2005) Bandwidth estimation Bandwidth Hello bandwidth estimation
Based on AODV Listen bandwidth estimation
GVGrid (Sun et al., 2006) Position based routing Lifetime Used in Vehicular
Packet arrival ratio Ad hoc Network (VANET)
ASWP (Jia et al., 2005) Interference considerations Bandwidth Ad hoc Shortest Widest Path
IQRouting (Gupta et al., 2005) Interference aware Bandwidth Use of candidate paths
CEDAR (Sivakumar et al., 1999) Core extraction Bandwidth No reliance on TDMA
QMRB-AODV (Ivascu et al., 2009) Backbone construction Throughput Traffic distribution
BRAWN (Guimaraes et al., 2009) Computes available bandwidth Bandwidth Multirate ad hoc networks
10 A.M. Abbas and Ø. Kure

Future work authors therein, discuss that one can enhance QoS by
imposing periodicity at the application layer.
In future, one may address the issue of a predictable
QoS. By the term ‘predictable QoS’, we mean that the 6.1.2 IEEE 802.11 based networks
source should be able to predict upto what extent the QoS
may be fulfilled along a route. Ofcourse, the predictable Note that IEEE 802.11 is the most widely used MAC
QoS may depend upon the network conditions such as layer for mobile ad hoc networks. There are two major
node mobility, node and link failures, and interference. flavours of IEEE 802.11 pertaining to coordination
One may also address upto what extent the QoS can function – the first is with Distributed Coordination
be sustained despite the changes in the topology of the Function (DCF) and the second is with Enhanced
network. Distributed Channel Access (EDCA). The version with
EDCA is also called IEEE 802.11e and has a support for
the provision of QoS.
6 QoS at MAC layer It seems important to analyse how well the network
with IEEE 802.11 as MAC layer protocol can support
In this section, we describe the research reported in the QoS. A unified model for the performance analysis
literature related to the provision of QoS at the MAC of IEEE 802.11e Enhanced Distributed Coordination
layer. Function (EDCA) is proposed in Hui and Devetsikiotis
(2005). The parameters analysed are saturation
6.1 Types of MAC layers throughput and delay under the assumptions of finite
number of nodes and ideal channel conditions in a
We consider the following major MAC layers for ad hoc
single hop Wireless Local Area Network (WLAN). The
networks– Carrier Sense Multiple Access with Collision
model is unified in the sense that it combines a Markov
Avoidance (CSMA/CA), IEEE 802.11, Time Division
model (Bianchi, 2000), p-persistent CSMA/CA model,
Multiple Access (TDMA), Code Division Multiple
and average value model (Tay and Chua, 2001) for
Access (CDMA), and their variations that are reported in
the analysis of DCF. The model uses either multiple
the literature.
bidimensional chains or multiple average value analysis
in separate back-off subperiods assuming that the
6.1.1 CSMA/CA based networks
p-persistent behaviour is time-dependent. The proposed
CSMA is one of the most widely used MAC layer in model is validated through simulation results.
ad hoc wireless networks. A contention based MAC An analytical model to assess the performance of
scheme called Black-Burst (BB) is proposed in Sobrinho IEEE 802.11 wireless LAN in terms of the provision
and Krishnakumar (1999). The scheme BB is a of QoS is presented in Zhai et al. (2005). The
distributed MAC scheme for the provision of QoS to parameters analysed are maximum throughput and
realtime traffic for ad hoc networks that are based on available bandwidth, delay and variations in delay,
CSMA. In this scheme, nodes contend for the channel and packet loss rate. The model is validated through
until the channel becomes free. The packets that are simulation results and it has been shown that by
marked real time have priority over non-realtime packets controlling the total traffic rate, IEEE 802.11 can support
and a node that wishes to transmit realtime packet has strict QoS requirements while achieving high channel
a priority for access to the channel over the nodes that utilisation. Another study regarding the performance
have non-realtime packets. assessment of IEEE 802.11 EDCF is presented in Hwang
A medium access control protocol called Sticky and Wu (2008). A fixed point analysis of single cell IEEE
CSMA/CA that provides implicit synchronisation 802.11 Wireless Local Area Networks (WLAN) is carried
and realtime QoS in wireless mesh networks is out in Kumar et al. (2007). A mechanism to estimate
proposed in Singh et al. (2007). The traffic considered the available bandwidth of IEEE 802.11 based ad hoc
is a combination of Voice over IP (VoIP) and networks is presented in Sarr et al. (2008).
delay-insensitive traffic. Monitoring of medium in Sticky An analysis of priority schemes of IEEE 802.11 and
CSMA/CA is similar to standard CSMA/CA with the IEEE 802.11e based wireless LANs is carried out in Xiao
difference that nodes in Sticky CSMA/CA remember (2005). The proposed backoff based priority schemes
what activities are carried out in the recent past. The differentiate among the minimum backoff window
information about the activities in the recent past is used size, the backoff window increasing factor, and the
by a newly arriving VoIP flow to grab the medium as retransmission limit. The parameters considered in the
soon as it is free, and thereafter, the VoIP flow sticks analytical model are saturation throughput, saturation
to a periodic schedule. The gaps left by the realtime delays, and frame dropping probabilities of different
traffic are filled by delay-insensitive traffic using the priority classes.
leftover bandwidth. It is shown that the total voice However, all these studies do not take into account
call carrying capacity of Sticky CSMA/CA increases the transmission range and/or carrier-sense range while
significantly as compared to the classical CSMA/CA analysing the throughput. Note that the transmission
based techniques such as IEEE 802.11 b/e. Further, range and carrier sensing range play a vital role in
Quality of Service in mobile ad hoc networks: a survey 11

the effective bandwidth and/or throughput in case of 6.1.4 CDMA based networks
ad hoc network. Analysis taking into considerations the
transmission and carrier sensing ranges of mobile devices A game-theoretic approach to energy efficient
remains a challenging task and may be addressed in modulation in networks that utilise CDMA with delay
future. as a QoS constraint is proposed in Meshkati et al.
(2007). The approach focuses on an M-ary Quadrature
Amplitude Modulation (MQAM). This is analogous to
6.1.3 TDMA based networks
a noncooperative game in which each user chooses its
In an ad hoc network that is based on TDMA, the strategy in terms of transmit power, transmit symbol
notion of bandwidth is related to the free time slots rate, and constellation size, in order to maximise its own
available along a link for transmission. The number utility while satisfying its QoS constraints. The utility
of free slots is decided by the neighbours and their function used is a measure of the number of reliable bits
transmission/reception activities. Therefore, reservation transmitted per unit of energy consumed, and is suitable
of bandwidth from a source to a destination implies for energy constrained networks. Using the proposed
reservation of time slots that are free and are available game-theoretic framework, the tradeoffs among energy
for sending packets. The methods of determining what efficiency, delay, throughput, and modulation order can
time slots are free and available for transmission can be be quantified. Specifically, the effect of coding on energy
different and define the approach taken by a protocol. efficiency is studied and quantified using the proposed
In what follows, we discuss some of the approaches game-theoretic approach. Further, the tradeoff between
proposed in the literature. energy efficiency and spectral efficiency has also been
A protocol called Distributed Slot Reservation illustrated.
Protocol (DSRP) that comprises of several strategies Low complexity MAC protocols for QoS support in
for dynamic bandwidth allocation to be used in QoS third generation radio access networks are proposed
routing for TDMA based ad hoc networks is proposed in O’Farrell and Omiyi (2005). The paper presents a
in Shih et al. (2006). In DSRP, QoS routing depends on resource metric for networks where the users have
the information gathered only from one-hop neighbours different signal-to-interference ratio requirements.
and thus making the protocol localised and distributed. Further, a deadline-driven backoff procedure that can
As mentioned earlier, the notion of bandwidth in ad hoc be used in scheduling at the MAC layer so as to
networks where TDMA is used at the MAC layer is provide a QoS support in terms of delay constraints,
related to the number of free slots. There are two types of is presented. Basically, the proposed control strategies
policies related to slot allocation to links in the network. for distributed scheduling at the MAC layer are
A policy that checks what are the valid and free slots for spread spectrum techniques. The strategies are called
a link is called a Slot Inhibited Policy (SIP) and a policy Single-Threshold Overload Signal Spread Spectrum
that decides which slots can be used by a link is called a (ST-OSSS), Multiple-Threshold Overload Signal Spread
Slot Decision Policy (SDP). Among the SDPs proposed Spectrum (MT-OSSS), and Overload Signal Spread
are: Spectrum with Overload Detection (OSSS/OD).
The access procedure for ST-OSSS and MT-OSSS
• Three-Hop Backward Decision Policy (3BDP) is overload avoidance while that for OSSS/OD is
overload detection. Finally, a MAC scheduling algorithm
• Least Conflict First Policy (LCFP) called Earlier Deadline First Parallel Link Scheduler
• Most Reuse First Policy (MRFP). (EDF-PLS) is presented with the aim to optimise spectral
efficiency.
DSRP is an on-demand slot reservation protocol for
QoS routing. When a source wants to communicate to 6.2 Recent trends in MAC design
a destination, source initiates a QoS route discovery
by sending a Route Request (RREQ) packet to its A standard called IEEE 802.11e supports WLAN
neighbours. During the route discovery phase, SIPs applications with QoS requirements. In IEEE 802.11e,
decide what are the valid slots and SDPs decide which a MAC access method called Hybrid Coordination
slots out of the valid slots can be used by a link. The Function (HCF) is introduced. HCF includes Enhanced
actual reservation of slots is carried out when a Route Distributed Channel Access (EDCA) and HCF
Reply (RREP), which is generated by the destination Controlled Channel Access (HCCA). In HCCA,
after receiving an RREQ, travels upstream. However, a reference design that consists of a reference scheduling
it has little more hassle. It may happen that the slots and an admission control is provided. In the reference
that have been decided to reserve against an RREQ may design of IEEE 802.11e, the scheduler computes a
be reserved by the RREQs generated by other nodes. common scheduled Service Interval (SI) that is the
To take care of that a Slot Adjustment Protocol (SAP) is minimum of the delay bounds of all streams. It then
used to coordinate the reservation of slots for a link by computes the duration called Transmission Opportunity
different RREQs. For that purpose, an algorithm for slot (TXOP) and Traffic Specifications (TSPEC). Admission
adjustment is proposed. control is carried out, and TXOP are allocated to each
12 A.M. Abbas and Ø. Kure

station in a round robin fashion. In fact, the reference A MAC scheme called Busy-Tone-Based (BTB) MAC
design is such that QoS is provided using the most is proposed in Wang et al. (2008) for supporting voice
stringent (i.e., the minimum of all streams) delay bound. and data traffic in ad hoc wireless networks. The
The problem due to the use of the most stringent delay issues addressed are unfairness and priority reversal
bound is that there is an overallocation of bandwidth. due to hidden terminal, exposed terminal, and location
The reason is that shorter is the SI, the larger will be dependent contention. BTB ensures guaranteed priority
the fluctuations of packet arrival rate, and this implies access for delay sensitive voice traffic using transmitter
that more bandwidth is needed to transmit all arrived busy tones in the node backoff procedure. It resolves
packets. Further, a short SI may lead to more number of hidden and exposed terminal problems. The priority
polling during a period, and there may be more polling assigned is independent of user locations, and therefore,
overhead. priority reversal is resolved. However, it does not address
Therefore, the issue is that how to avoid the issue of capture effect where a receiver may be able
overallocation of bandwidth. The answer is that different to receive correctly the desired frame even if a collision
SIs should be used for different streams with different occurs.
delay requirements. For that, an Equal-Spacing (ESP) A MAC protocol called multi-Channel MAC
based design is presented in Zhao and Tsang (2006) (CMAC) for dynamic channel allocation in multichannel
which generalises the reference scheduling of 802.11e. The wireless sensor networks4 is proposed in Chowdhury
word ‘spacing’ means an interval between two successive et al. (2009). Note that the problem of channel
scheduling of a stream. The ESP schedules each stream assignment with minimum interference in single
with equal spacing, however, it may schedule different transceiver multichannel communication is in NP,
streams with different spacing. therefore, CMAC provides a heuristic and approximate
A MAC layer protocol called an Adaptive MAC solution. The scheme employed in CMAC takes into
(AMAC) that uses m-ary tree algorithms for QoS account energy constraints in sensor nodes by placing
support in single cell ad hoc networks is proposed in them in default sleep mode as far as possible. Its
Tsigkas and Pavlidou (2008). The proposed protocol performance is compared with Sensor MAC (SMAC)
is compared with Dynamic Priority MAC Protocol for and it is observed that the performance of CMAC
Time Bounded services (DP-TB) (Tsigkas and Pavlidou, comes out to be better than SMAC in terms of energy
2006) and Elimination-Yield Non-Preemptive Priority consumption and throughput.
Multiple Access (EY-NPMA). Note that EY-NPMA is A mechanism for dynamically assigning priorities of
MAC protocol for HIPERLAN and is based on dynamic packets based on their deadlines and the traversed hops
priorities. The proposed protocol AMAC provides a per is proposed in Reddy et al. (2007). The mechanism called
flow service guarantees to flows with delay as the QoS ReAllocative Priority (ReAP) is aimed to provide QoS at
parameter. It incorporates the RTS/CTS mechanism to the MAC layer to video traffic. The scheme introduces
protect itself from the hidden terminal problem. The adaptive TXOP by modifying the TXOP dynamically
protocol adapts to traffic conditions i.e., it is sensitive based on the queue length. However, the scheme does not
to traffic load variations. However, the protocol requires take into account the mobility. A comparison of various
channel synchronisation among all those stations that MAC layer schemes with QoS provisioning is shown in
intend to transmit. Table 3.

Table 3 A comparison of MAC layer protocols used in QoS provisioning

Protocol Features QoS parameter Comments


Sticky CSMA Implicit synchronisation Delay Best-effort traffic fills the
Singh et al. (2007) gaps left by realtime traffic
DSRP Slot reservation, Bandwidth Slot Adjustment Protocol,
Shih et al. (2006) TDMA based Dynamic bandwidth allocation
GTA Quadrature Amplitude Modulation, Delay Game-Theoretic Approach
Meshkati et al. (2007) CDMA based
LC Resource metric for SNR Delay Deadline-driven backoff procedure,
O’Farrell and Omiyi (2005) requirements, CDMA based Optimise spectral efficiency
ESP Equal-Spacing based Delay Generalises reference scheduling
Zhao and Tsang (2006) reference design of 802.11e
AMAC Per flow service guarantees Delay m-ary tree algorithms,
Tsigkas and Pavlidou (2008) Dynamic priorities
BTB MAC Priority is independent of Delay Resolves hidden and
Wang et al. (2008) user locations exposed terminal problems
CMAC Dynamic Channel Allocation Energy Multichannel MAC
Chowdhury et al. (2009)
Quality of Service in mobile ad hoc networks: a survey 13

Future work the bandwidth for QoS routing in networks that utilise
TDMA at the MAC layer is proposed in Liao et al.
In future, a major problem that needs to be addressed is (2002). We call this protocol as TDMA-Based Bandwidth
the design of an efficient MAC for an ad hoc network Reservation Protocol (TBRP) to refer it for the purpose
that supports QoS. Although, there are extensions of of comparison. The protocol takes into account the
CSMA/CA and IEEE 802.11 for supporting QoS, hidden terminal problem and the exposed terminal
however, a node that wishes to transmit may need problem during the route establishment phase.
to wait for a random amount of time due to the Note that protocols that require a scheme for time
exponential backoff mechanism. Also, neighbours in the slot assignments do not seem to be suitable for an ad hoc
carrier sensing range cannot transmit simultaneously due network. The reason is that in an ad hoc network, nodes
to hidden and exposed terminal problems. Moreover, are allowed to move from their positions, and any such
neighbouring nodes that are lying along a path from the movement of nodes may require updates in the time slot
source to the destination cannot transmit simultaneously assignments incurring a significantly large overhead.
due to intra-path correlation, and thus the effective
bandwidth of the path is less than the raw bandwidth 7.2 UWB-based cross layer routing
of a link. Similarly, inter-path correlation may bite the
advantages of having multiple paths from a given source A cross layer protocol called QoS Greedy Perimeter
to a destination. One may address how to mitigate Stateless Routing (QoS-GPSR) is proposed in Abdrabu
the effect of intra-path and inter-path correlations and Zhuang (2006). In QoS-GPSR, a resource allocation
while providing the QoS in mobile ad hoc networks. algorithm is coupled with a position based routing
Another direction for future work can be the analysis of algorithm. It is suited for a single channel Ultra-
IEEE 802.11 and its variations taking into account the Wide-Band (UWB) based ad hoc network where UWB
transmission range and carrier sensing range. provides position information. The cross layer design of
In what follows, we discuss cross layer schemes. QoS-GPSR utilises contention based MAC, e.g. IEEE
802.11. Admission control at each node along the route
is based on the bandwidth availability information
7 Cross-layer QoS strategies provided by the MAC for the node and its neighbours
in its carrier sensing range. Further, the cross layer
A cross-layer protocol may utilise the properties or design enables to consider the possible simultaneous
functionalities of more than one layers. transmissions of nodes belonging to the same route
when making bandwidth reservations, as these may affect
7.1 TDMA-based cross layer routing the effective throughput. The protocol QoS-GPSR can
also work with TDMA MAC protocols, e.g. 802.15.3,
A cross layer QoS Routing (QoSR-Z) is proposed provided that a proper packet scheduling algorithm is
in Zhu and Corson (2002). QoSR-Z is based on Ad hoc employed.
On-demand Distance Vector (AODV) routing and builds
QoS routes on-demand. Also, it uses TDMA. A network 7.3 Cross layer schemes for resource allocation
layer function (i.e., routing) is coupled with the MAC
layer function (i.e., finding the time slots), therefore, we A cross layer scheme for resource allocation that operates
call it a cross layer protocol. It is based on the assumption at the physical and data link layers for the provision of
that the application is session oriented and requires a QoS guarantees in wireless relay networks is presented
constant bandwidth. Specifically, a session specifies its in Tang and Zhang (2007). The goal of the scheme
QoS requirement in terms of the number of transmission proposed, therein, is to maximise the relay network
time slots needed on its route from a given source S to throughput subject to a given delay QoS constraint. The
a destination D. For each session or flow, QoS routing scheme uses the concepts from information theory and
protocol not only finds the route, it also determines the the concepts of effective capacity in wireless networks.
slots for each link on the route. The delay constraint is characterised by a parameter
Another cross layer protocol called QoS Routing called QoS exponent which represents the information
(QoSR-L) protocol based on Destination Sequence exchanged between the physical layer and the data link
Distance Vector (DSDV) routing that tries to provide layer of the proposed cross layer scheme. There are two
bandwidth guarantees is proposed in Lin and Liu major classes of wireless relay networks – Amplify and
(1999). Bandwidth is defined in terms of number of Forward (AF), and Decode and Forward (DF). Dynamic
time slots available for transmission. The protocol is resource allocation algorithms for both types of networks
based on heuristics that may provide an approximate are developed that can be used for QoS guarantees
solution. This is because finding a schedule of free for multimedia communications in wireless networks.
slots that maximises the available bandwidth is an NP Further, analytical models are proposed for dynamic
complete problem. The protocol is based on TDMA resource allocation in AF and DF relay networks. A fixed
and requires some sort of global synchronisation that power allocation for DF relay networks has also been
incurs an extra overhead. Another protocol that reserves analysed.
14 A.M. Abbas and Ø. Kure

7.4 Cross layer schemes involving physical layer through different layer at the sender and receiver ends.
Separating the layers may simplify the design of the
A cross-layer optimisation for Low Density Parity protocol. On the other hand, the design of a cross-
Check (LDPC) coded multirate multiuser systems with layer protocol seems to be complex. However, once a
QoS constraints is presented in Li and Wang (2006). cross-layer protocol is designed, it is expected to perform
The proposed multirate multiple-access wireless system better than a protocol that uses functionalities of only
uses variable spreading gain and chip level random a single layer. However, the performance depends upon
interleaving. The proposed framework uses some services how judiciously the functionalities involving more than
from the physical layer as well as some services from one layers are incorporated.
the network layer, and therefore, it is termed as
cross-layer. At the physical layer, QoS requirements Future work
are specified in terms of target bit error rate of
each user and the transmission powers of users are In future, one may address how to utilise the cross layer
adjusted according to the current system load and the techniques to enhance the throughput when there are
corresponding rate requirements of the users. The QoS multiple source destination pairs in an ad hoc network.
requirements specified at the network layer are call The throughput depends upon many factors such as raw
blocking probabilities, call connection delays, packet bandwidth, node density, interference. Moreover, one
congestion probabilities and packet loss rates. A method may also address how to design a cross layer solution so
for call admission control that is based on Multicriterion as to minimise the number of packets dropped as that
Reinforcement Learning (MCRL) is proposed so as to may decide packet retransmissions. Further, the design
maximise the average revenue of the network subject to of cross layer techniques that are energy efficient forms
call level as well as packet level QoS. The method can another direction for future works.
handle multiple QoS constraints. In the previous sections, we described schemes based
on the layered classification. We now switch to schemes
A cross-layer scheduling algorithm with QoS support
that are part of the functional classifications. Note that
in wireless networks is proposed in Liu et al. (2006).
the schemes with routing and/or MAC functionalities are
The proposed algorithm is for MAC layer scheduling
already covered in the previous sections.
and may handle multiple connections with diverse QoS
In what follows, we discuss the research reported in
requirements with each connection employing Adaptive
the literature related to admission control.
Modulation and Coding (AMC) at the physical layer, and
therefore, it is called a cross-layer algorithm. A priority
is assigned to each connection and a connection with the 8 Admission control
highest priority is scheduled first. The performance of
the proposed scheduling algorithm is validated through Admission control is an important function for the
simulations. A comparison of cross layer techniques is provision of QoS as it determines which packet is allowed
presented in Table 4. to enter and which packet is not allowed to enter into
Note that a cross-layer technique combines the the network. The decision may be based on many factors
functionalities of network layer with MAC and/or such as what may be the consequence of allowing a
physical layer. Ultimately, the packets have to pass packet or flow to enter into the network.

Table 4 A comparison of cross layer schemes used for QoS provisioning

Scheme Features QoS parameter Layers


QoSR-Z Based on AODV, Bandwidth Network and MAC
(Zhu and Corson, 2002) Based on TDMA
QoSR-L Based on DSDV, Bandwidth Network and MAC
(Lin and Liu, 1999) Based on TDMA
TBRP TDMA based, Bandwidth Network and MAC
(Liao et al., 2002) Slot reservation
QoS-GPSR Based on UWB, Delay Network and MAC
(Abdrabu and Zhuang, 2006) Position based routing
AF-DF Resource allocation Throughput and delay Physical and data link
(Tang and Zhang, 2007)
MMSQ Multirate multiuser Multiple criteria Physical and network
(Li and Wang, 2006)
CLS Adaptive modulation Delay Physical and MAC
(Liu et al., 2006) and coding
Quality of Service in mobile ad hoc networks: a survey 15

8.1 Measurement based admission control free time slots. Authors, therein, proposed an algorithm
for assignment of time slots in an ad hoc network that
A scheme for admission control, which is based on either employs Time Division Multiple Access (TDMA)
the local measurements carried out at a node, is or Code Division Multiple Access (CDMA) at the MAC
proposed in Xiao and Li (2004). We call it Measurement layer. It is proved that a time slot assignment for a unit
Based Admission Control (MBAC). In MBAC, there of bandwidth, if exists, can be found in O(|P |) time,
are different Access Categories (AC) for best-effort, where P represents a path and |P | represents the number
video probe, video, and voice traffic. The scheme is as of links in path P . The same is extended for two units
follows. Each station carries out measurements during of bandwidth. Further, an algorithm for slot assignment
beacon intervals to estimate the transmission budget. problem with k slots in a TDMA frame is proposed that
The transmission budget provides an indication about has a complexity of O(|P |2 k). Finally, an algorithm for
the allowable transmission time and the time utilised time slot assignment problem is integrated into a call
for transmissions for each AC. Each station determines admission control scheme so as to provide QoS in terms
the transmission limit for each AC for the current of bandwidth guarantees.
beacon interval. This is based on the transmission count Schemes for call admission control for Wideband
during the previous beacon interval and the transmission Code Division Multiple Access (WCDMA) based mobile
budget calculated. The time taken in the transmissions wireless networks with multiple service classes that
of voice and video packets should not exceed the local negotiate QoS are presented in Paschos et al. (2005).
transmission limit for each AC. If the transmission Therein, bandwidth reservation is used to improve the
budget for an AC is depleted or nearly depleted, new QoS and packets are either blocked or dropped to prevent
streams are not allowed, and existing streams are not the system to form an outage situation. However, the
allowed to increase the transmission time per beacon probability of either blocking or dropping a packet is
interval that they were already using so that existing kept fairly low. The traffic is divided into two classes:
voice and video streams are protected. However, the realtime and non-realtime. In one of the call admission
proposed schemes are limited to single hop wireless control scheme that is used in a lightly loaded system,
ad hoc networks. calls are admitted and serviced with the maximum
resource requirements of the user. At a point, when no
8.2 Local admission control further calls can be accommodated, a procedure that
negotiates with new and ongoing calls to free some of the
Schemes for local data control and admission control are
resources is applied. However, the drawback of such a
proposed in Xiao and Li (2004). The schemes are aimed to
scheme is that non-realtime traffic is preempted to make
provide QoS while there is realtime traffic and data traffic
room for the realtime traffic. It has been shown that
in the network. A major issue addressed therein is how to
this drawback can be addressed using a small proportion
adapt parameters such as Contention Window (CW) and
of the available resources as a non-realtime reservation
Arbitration Inter-Frame Spacing (AIFS) so as to provide
bandwidth. The performance of the proposed algorithm
QoS to real time traffic. Specifically, two schemes for
is analysed using a multistep Markov analysis.
data control are proposed: Dynamic Function Mapping
(DFM), and Dynamic Traffic (DT). In the DFM scheme,
a function is defined for mapping traffic load conditions 8.4 Rate based admission control
to parameters such as Contention Window (CW) and
Arbitration Inter-Frame Spacing (AIFS). In the DT A protocol that is a combination of admission control
scheme, parameters are dynamically varied according and rate policing called Multi-Priority Admission and
to the tendencies of traffic load conditions. The word Rate Control (MPARC) is proposed in Yang and
‘tendency’ means whether the traffic continues to increase Kravets (2007). The protocol aims to provide throughput
or continues to decrease. A Contention-aware Admission guarantees for multi-priority traffic in ad hoc networks.
Control Protocol (CACP) is proposed in Yang and The core of MPARC is a model for allocating bandwidth
Kravets (2005). CACP provides admission control for in a unsaturated, semi-saturated, and saturated network.
flows in a single channel ad hoc network. It is based on In MPARC, different priorities are assigned for realtime
the knowledge of local resources at a node and the effect and best-effort flows. The protocol guarantees that the
of admitting the new flow on the neighbouring nodes. throughput of currently admitted realtime flows will
CACP focuses on QoS support in terms of bandwidth not decrease either due to realtime flows arriving later
allocation. with equal or lower priorities or due to best-effort
flows. In other words, throughput of currently admitted
8.3 MAC based admission control realtime flows can decrease only when a realtime flow
with a high priority arrives. In MPARC, this is ensured
A call admission control scheme for QoS guarantees in using a mechanism for admission control for newly
terms of bandwidth is proposed in Liu et al. (2005). arriving realtime flows and applying a rate policing for
The notion of bandwidth is related to the number of best-effort traffic.
16 A.M. Abbas and Ø. Kure

Table 5 A comparison of methods for call admission control

Protocol Features Comments


CACB (Liu et al., 2005) TDMA/CDMA at MAC layer, Bandwidth guarantees
Time slot assignment
MBAC (Xiao and Li, 2004) Access categories, Delay guarantees
Transmission budget
CAC-WCDMA (Paschos et al., 2005) Bandwidth reservation Traffic is divided into classes
MPARC (Yang and Kravets, 2007) Combination of admission control Throughput guarantees
with rate policing
CACP (Yang and Kravets, 2005) Localised and distributed Bandwidth guarantees
PAC Chakeres et al. (2007) Perceptive Admission Control Ensures low packet loss
and Channel Monitoring and delays

8.5 Perceptive Admission Control reported in the literature pertaining to the provision of
QoS that use scheduling.
A protocol for Perceptive Admission Control (PAC)
for providing QoS in a wireless network is proposed 9.1 Prioritised scheduling
in Chakeres et al. (2007). The protocol monitors the
wireless channel and adapts the decisions of admission A Distributed Priority Scheduling (DPS) for provision
control so that the utilisation of the network is of delay based QoS is proposed in Kanodia et al. (2002).
maintained while preventing congestion. To make an In DPS, each node locally constructs a scheduling
admission decision, sources consider the entire region table based on the information that it overhears,
that a new flow’s transmissions will impact. It is shown and incorporates estimate of its relative priority
that, with a proper Carrier Sense (CS) range, the time into MAC. The DPS uses a coordinated multihop
for which the channel is sensed busy is a good estimate scheduling mechanism in which at an intermediate node,
of the utilised and available bandwidth. The performance downstream priorities of a packet are modified based on
of the proposed protocol is analysed through simulations the service provided to the packet upstream. In other
and it comes out that PAC ensures low packet losses and words, the downstream priority index of a packet is
delays for all packets that are admitted into the network. computed recursively based on its upstream priority
However, the limitation of the protocol is that it focuses index. By doing so, downstream nodes can help packets
on a single hop admission control. catch up if they are excessively delayed upstream, whereas
A comparison of methods of call admission control the priorities of the packets that have arrived earlier can
is shown in Table 5. Note that we refer the method be reduced so that more urgent packets can pass through
presented in Liu et al. (2005) as CACB and that proposed quickly.
in Paschos et al. (2005) as CAC-WCDMA. Schemes for optimising the transmission schedule
of packets using priorities in multihop latency aware
Future work scheduling for delay constrained data are presented in
Liang and Dong (2007). The objective of schemes is to
The directions for future work pertaining to admission determine the weights to be assigned to the distance that
control for QoS provisioning in mobile ad hoc networks the packet has yet to travel and the remaining lifetime
are as follows. Firstly, one may come up with a scheme so as to rank the packets according to their urgency.
for measurement based admission control that can be The transmission schemes presented are cross-layer in
applied in a generalised mobile ad hoc network. By the nature and include schedules such as EDF and Largest
term ‘generalised’, we mean that there may be multiple Distance First (LDF). Further, an analytical framework
hops between a given source to a destination and nodes using recursive nonhomogeneous Markovian analysis is
are free to move about randomly. Secondly, one may also presented. The aim of the analytical framework is to
propose a scheme for perceptive admission control in a study the effect of lifetime-distance factor on packet loss
generalised mobile ad hoc network. probability. Therein, it is shown that a proper balance in
In what follows, we describe the research related the lifetime-distance factor can significantly improve the
to scheduling which is another functionality to be performance of the network.
considered for provision of QoS in an ad hoc network.
9.2 Rate based scheduling
9 Scheduling An analytical model for tradeoffs between delay bounds
and computational complexity of packet scheduling
A mechanism for providing QoS in a network is algorithms for the provision of QoS in a network is
scheduling. In this section, we discuss the research described in Xu and Lipton (2005). Therein, the authors
Quality of Service in mobile ad hoc networks: a survey 17

compute the delays incurred in a scheduling algorithm proposed in Znati and Melhem (2004).5 In Znati and
that employs a service discipline with respect to the delays Melhem (2004), a methodology to compute a set of
incurred in GPS. These delays are called GPS-relative feasible per node delays for a given flow and for a
delays. It is proved that, under a slightly restrictive class of delay based servers is described. Consequently,
model, the lower bound computational complexity of any the problem of an optimal assignment of per node
scheduling algorithm that guarantees O(1) GPS-relative delays that takes into account the workload across the
delay is Ω(log n), where n is the number of sessions. It routing path is formalised. The resulting solution is
has been found that the lower bound on the complexity optimal, however, its implementation overhead is high.
remains the same even if the delay bound is relaxed To overcome this shortcoming, authors, therein, propose
to O(nα ), where 0 < α < 1 which implies that the two heuristics called Equi-Partition Heuristic (EPH)
complexity remains constant during the delay interval and Load-Balancing Heuristic (LBH). EPH uses the
[O(1), O(n)]. Further, the analytical results obtained equi-partition concept to compute the initial delay values
for the above complexity are extended for a stronger and adjusts them to meet the end-to-end delay
computational model called the linear decision tree requirements. LPH distributes the load proportionally
model. It has been shown that the same lower bounds on across all nodes on the routing path using the concept
the complexity, under certain conditions, can be applied of relaxation factor. The performance of these heuristics
to guarantee tight bounds on end-to-end delays provided comes out to be comparable to that of the optimal
that the delay bounds are obtained using the latency-rate scheme.
framework.
An analytical model for end-to-end delay bounds 9.4 Proportional differentiation
for traffic aggregates under guaranteed rate scheduling
algorithms is presented in Sun and Shin (2005). In that, Schemes for QoS assurance through class selection
end-to-end delay bounds for a single aggregation are and proportional differentiation in wireless ad hoc
derived deterministically assuming that all incoming networks are proposed in Wang and Ramanathan
flows at an aggregator conform to the token-bucket (2005). The proposed schemes are based on a service
model. Three types of Guaranteed Rate (GR) scheduling model called Neighbourhood Proportional Delay
algorithms are proposed: Differentiation (NPDD) model Wang and Ramanathan
(2003). In NPDD, there are a number of service classes
• stand-alone GR
of packets and these classes are ordered in terms of
• two-level hierarchical per-hop queueing delays at each node. The NPDD model
not only holds for each node, it also holds across nodes
• rate-controlled two-level hierarchical GR; and an
in a certain neighbourhood. In other words, the delay
aggregator can use any of these algorithms.
proportionality is maintained at each node and among
The end-to-end delay bounds for multiple aggregation nodes in the same contending set. Two nodes are said to
fall within an aggregation region when aggregators use belong to the same contending set if there exists a route
the rate control for two-level hierarchical GR scheduling between them. The NPDD scheduler is work-conserving
algorithm. It is shown that using the proposed guaranteed and an algorithm known as Waiting Time Priority (WTP)
scheduling algorithms, there exists a delay bound for each (Dovrolis et al., 2002) is adopted in which each class
flow, and under certain conditions the bounds are smaller is serviced in a First-in-First-Out (FIFO) queue. The
than that of per flow scheduling. The analytical delay scheduler always schedules the head-of-line packet with
bounds are validated through simulations. highest priority of a service class. Scheduling algorithms
A rate control scheme called RCS for adaptive real (Wang and Ramanathan, 2005) used in NPDD are called
time applications in IP networks with lossy links and long Dynamic Class Selection (DCS) algorithms. Further,
round trip times is proposed in Akyilidz et al. (2007). applications of DCS are modelled using a game-theoretic
In RCS, all routers along a path use a priority discipline; approach. For noncooperative games with selfish players,
and special types of low priority packets called dummy analytical models for the existence of an equilibrium,
packets are used to probe the availability of network the feasibility of an equilibrium, and the guaranteed
resources. Moreover, to guard the RCS from temporal convergence to a feasible equilibrium when it exists,
signal losses, an algorithm for improving the robustness are proposed for both single hop as well as multihop
of RCS is proposed. Specifically, the behaviour of RCS networks.
is investigated in the presence of packet losses due to link
errors, network congestion, and temporal signal losses. 9.5 Opportunistic scheduling
Further, delay bounds for realtime traffic sources are also
studied. An opportunistic scheduling discipline to handle a
combination of realtime and best-effort traffic at a
9.3 Scheduling with end-to-end delay bounds wireless access point that utilises multiuser diversity
is proposed in Patil and Veciana (2007). The aim
Node delay assignment strategies to support end-to-end is to support probabilistic QoS in terms of service
delay requirements in heterogeneous networks are rate guarantees to realtime traffic while still achieving
18 A.M. Abbas and Ø. Kure

opportunistic throughput to all traffic classes and users. performance of the proposed algorithm is analysed
The lower bounds on the service that is to be provided through simulations.
to a realtime session are obtained under the assumption
that variations in the capacities demanded by users are 10.2 Per-station fairness
either known or can be estimated. These bounds may
enable one in predicting the QoS required by the real time A scheme called Fair QoS Agent (FQA) is proposed
traffic and the same can be incorporated using resource in Park and Kim (2007) that provide per class QoS
management and admission control schemes. Further, enhancement and per station fair channel sharing in
authors show that there can be a tradeoff between how Wireless Local Area Networks (WLAN). In FQA, there
tightly one can satisfy the QoS requirements and the are two components that operate above IEEE 802.11
overall system throughput. In other words, if the QoS MAC layer so that no change is required in IEEE
requirements for realtime traffic are very tight, then 802.11 MAC layer. These components are a dual service
realtime traffic will be given a higher priority again differentiator and a service level manager. The function
and again. This adversely affects the traffic other than of dual service differentiator is to improve QoS for
realtime traffic and thus decreasing the opportunistic different classes of traffic using appropriate algorithms
throughput gains. for scheduling and queue management. On the other
hand, service level manager is responsible for assuring
Future work fair channel sharing by estimating the fair share of each
station and dynamically adjusting the service levels of
In future, one may propose scheduling schemes that are packets. The proposed scheme is simple and it does
capable of providing per hop and per packet proportional not require to maintain per station queues. Further, an
differentiation. The type of service to be received may assurance for weighted fairness among stations in terms
depend upon the urgency level of the packet and the of channel access time is provided.
service received by the packet upstream. Also, one
should consider whether putting a packet to a higher 10.3 Fairness framework
differentiation class may lead to catching the deadline at
the final destination or not. Another direction for future As the IEEE 802.11 wireless LANs are widely deployed
research can be designing a scheduling scheme that is fair for providing realtime service such as voice and
to realtime as well as non-realtime packets. non-realtime service such as data, the provision
In what follows, we describe research related to the of fairness and QoS becomes a challenging task.
fairness in QoS provisioning. A framework for fairness and QoS assurance for current
IEEE 802.11 networks with multiple access points is
presented in Bejerano and Bhatia (2006). The framework
10 Fairness is called MiFi and relies on centralised coordination of
the APs. It is based on the fact that during any given
Note that fairness is not a functionality to be time of contention free period, APs that do not interfere
incorporated for the provision of QoS, however, it is with one another are activated and others are silent. The
among the goals or objectives of QoS provisioning that amount of service time granted to an AP is proportional
should not be overlooked. The meaning of fairness may to the load on AP and the performance of the system
depend on the context and it should be considered to is optimised employing efficient scheduling algorithms.
be associated with the requirements of the application. Therein, it is pointed out that such a scheme can be
In other words, one has to decide whether the scheme implemented without modifying either the underlying
should be fair to QoS flows or to non-QoS flows or to MAC protocol or the behaviour of mobile stations and
all flows. In general, the term ‘fairness’ means that the the scheme takes care of the hidden terminal problem and
network is able to provide the same level of service to the overlapping cell problem. The proposed framework
all its users. However, fairness is a key issue in case is validated through simulations and it is established that
of schemes that have a provision of QoS in a wireless the system supports fairness. As a result, MiFi is able
network. to provide QoS guarantees for real time traffic and still
maintains relatively high throughput for non-realtime
10.1 Wireless fair queueing traffic.

A topology-independent wireless fair queueing model Future work


for a shared medium ad hoc network is proposed
in Luo and Lu (2005). The proposed fairness model In future, one may address how to design a scheme
ensures coordinated fair channel access among the for QoS provisioning in an ad hoc network such that
contending flows so that spatial reuse of bandwidth it maintains fairness as per the requirements of the
is maximised. Algorithms that realise the fluid fairness application. Also, one may study the implications of
model with analytical bounds are presented. Further, providing the fairness on realtime and non-realtime flows.
a distributed implementation that approximates an In what flows, we describe the research related to the
ideal centralised algorithm is also presented and the miscellaneous types of QoS
Quality of Service in mobile ad hoc networks: a survey 19

11 Miscellaneous QoS involved in methodologies for the provision of individual


QoS are relatively high. Therefore, there is a need to
In this section, we discuss the research reported in the explore methodologies for the provision of QoS that are
literature keeping in view of different approaches and scalable or provide the QoS on an aggregate basis.
objectives. A loss performance study of individual QoS vs.
aggregate QoS is carried out in Xu and Guerin (2005).
11.1 User level QoS Specifically, authors therein explore the differences
between the individual QoS and aggregate QoS in terms
In a network, functionalities of layers may vary of loss guarantees where guarantees are provided only
depending upon their boundaries. Consequently, there at the aggregate level. Analytical models to compute
can be different levels of the QoS provisioning (Tasaka both individual and aggregate loss guarantees for
and Ishibashi, 2002) such as physical level, node level, ON-OFF and periodic sources are proposed. Further,
network level, end-to-end level, and user level. The user loss deviations for ON-OFF sources and periodic sources
level QoS is also called the perceptual QoS or user are also analysed.
perceived QoS. Out of these levels, the user level QoS
is the most important QoS as the users are the ultimate 11.3 Integrated QoS
recipient of the QoS. Therefore, there is a need to measure
and assess the QoS at the user level. A support for integrating QoS with traffic engineering
In Ito and Tasaka (2005), a scheme for quantitative and failure recovery is needed in a network that runs
assessment of user level QoS for audio-video the Transmission Control Protocol (TCP). Note that
transmissions using psychometric methods is presented. TCP uses window based congestion control. In general,
The psychometric methods used are: the congestion control mechanism of TCP is called
Additive Increase Multiple Decrease (AIMD). If the
• the method of paired comparisons TCP anticipates congestion, the size of the window is
• the law of comparative judgement. decreased.
Optimal algorithms for end-to-end integrated QoS,
A mapping of the QoS from application level to user traffic engineering, and failure recovery are proposed
level is carried out using principal component analysis in Movsichoff et al. (2007). Therein, laws for adapting
and multiple regression analysis. During the assessment the data rate and laws of load balancing that can be
of QoS, the transmission of an audio-video scheme over a applied to networks with multiple paths between source
loaded network is simulated. The concept of control gain and destination and where multiple classes of traffic are
through media synchronisation is proposed to reduce the to be supported. The algorithms proposed need a minimal
load on the network. amount of information for optimal control in the form of
A scheme for user input driven QoS management whether a path is congested or not. The laws of control
in ad hoc networks is proposed in Wang et al. (2009). proposed in the paper enable one to detect source inferred
The motivation behind it is that the network QoS congestion in the network. The proposed approach can
is generally defined in terms of technical parameters be used in networks with node or link failures in the
such as delay, jitter, and bandwidth. An end-user may sense that when a link or node failure occurs the traffic
often find it difficult to express his desired QoS in is rerouted away from the failed node or link. The work
such technical parameters. Therefore, there is a need to presented can set a foundation for protocol that control
translate user inputs to technical parameters. An interface the traffic at different layers such as IP, transport or
design that uses translation functions to map user inputs higher layers.
to parameters at routing and MAC layers is proposed. Apart from that techniques for integration of
Based on the translated parameters, the strategies are multihop wireless and wired networks with QoS
chosen at specific layers so that the QoS desired by constraints are presented in Bejerano (2004). Specifically,
the user is achieved. Further, the costs associated with authors therein studied the problem of integrating
adoption of different strategies at different layer is also static multihop networks with a wired backbone in
examined in Wang et al. (2009). such a manner so that QoS guarantees in terms of
bandwidth and delay are not violated. For that purpose,
11.2 Aggregate QoS the topology of the network is partitioned into a
minimal number of disjoint clusters that satisfy the QoS
QoS can be provided to flows individually or to number constraints. The problem is formulated as an instance
of flows taken together. The first type of QoS is called of the Capacitated Facility Location Problem (CFLP)
the individual QoS or fine grain QoS or per flow QoS with QoS constraints. A polynomial time approximation
and the later type of QoS is called as the aggregate algorithm is proposed that provides a solution with a
QoS or coarse grained QoS or scalable QoS. It is worth constant factor of the optimal one. Further, an adaptive
mentioning that the pace of implementing the QoS delivery mechanism is introduced that maximises the
solutions in operational networks is slow due to many throughput of each cluster without violating the QoS
reasons. One of the reasons is that the complexities constraints.
20 A.M. Abbas and Ø. Kure

11.4 Self-adaptive QoS the delay-constrained capacity of the fading channel as


compared to a fixed slot assignment scheme. The delay-
It is presumed that the Next Generation Networks (NGN) constrained capacity of a fading channel means the
should be self-adaptive so that demands for changes in maximum data rate that can be achieved when a given
traffic are satisfied. An example of such a network is probability of violation of delay bound is satisfied.
a Cognitive Packet Network (CPN). In CPN, paths are
selected adaptively in order to offer a best-effort QoS 11.7 Adaptive QoS for multimedia applications
to end users based on user defined QoS. This is done
by incorporating some kind of smartness or intelligence A mechanism for end-to-end delay control of multimedia
inside the network. On the other hand an NGN should applications over multihop wireless links is proposed
also have a provision of guaranteed QoS. Thus, an in He et al. (2008). The motivation behind the
NGN should be able to support multiple QoS services. mechanism is that in case of multimedia applications, the
In Sabella and Iovanna (2006), some key issues pertaining mechanism should adapt the client’s QoS requirements to
to the provision of QoS and how one should react network resource constraints. The proposed mechanism
to traffic changes in NGNs are presented. Therein, a has separate adaptation components that operate at
traffic engineering solution for supporting multiple QoS application layer, middleware layer, and network layer.
services in an NGN through either Multi-Protocol Label At the application layer, there is a requirement
Switching (MPLS) or Generalised Multi-Protocol Label adapter that dynamically changes the requirement
Switching (GMPLS) is explored. levels according to end-to-end delay measurement and
QoS requirements that are acceptable to the end-
11.5 Capacity and QoS user. At the middleware layer, there is a priority
adapter that dynamically adjusts the service classes
A network where paths from a source to destination based on the feedback. At the network layer, there
fail frequently is called as an intermittently connected is a service differentiation scheduler that assigns
network. Examples of such a network are an ad hoc different network resources to different service classes.
network or a sensor network. An analytical model for These three components coordinate to assign resources
QoS and capacity of intermittently connected networks to multimedia applications. The impact of adaptation
is proposed in Small and Haas (2007). In Small and scheme is evaluated on a real ad hoc network testbed
Haas (2007), a model that quantifies the resources- and it is observed that the proposed mechanism
delay tradeoff and the capacity with QoS constraints successfully adjusts multimedia applications to meet
is presented. An intermittently connected network delay requirements.
is represented using a shared wireless infostation In what follows, we conclude the paper.
model. The model is aimed to help network designers
in controlling the performance by adjusting the
communication bandwidth, fraction of time a node
12 Conclusion
spends in sleep mode, and the reliability in terms of
packet delivery.
The provision of QoS in an ad hoc network is a
challenging task and the challenge comes due to inherent
11.6 QoS and multi-user diversity characteristics of such a network. In this paper, we
presented an overview of the research related to the
The capacity of a time varying channel can be increased
provision of QoS in mobile ad hoc networks. The
with the use of diversity. The term ‘diversity’ means that
contributions of the paper are as follows.
there are multiple signal paths between a transmitter
and a receiver. Diversity can be achieved in time, space,
• We pointed out issues and challenges in providing
and frequency; and traditional diversity methods are
the QoS in a mobile ad hoc network. Some of these
applicable to a link with a single user. However, another
challenges are due to the typical nature of the
kind of diversity called multiuser diversity is introduced
problem and others are due to inherent
in Knopp and Humblet (1995). It means that multiple
characteristics and limitations associated with an
users share a time-varying channel and each of these users
ad hoc network.
has an independent channel gains for the shared medium.
In Wu and Negi (2005), the problem of supporting • We discussed two classifications of the
QoS over a fading channel is considered that utilises methodologies used to provide QoS in mobile ad
multiuser diversity. A downlink time slotted fading hoc networks. The first classification called layered
channel is shared among a number of users, say K. classification is based on the layer of the protocol
A statistical QoS that is characterised by <data rate, stack to which the corresponding methodology
delay bound, delay bound violation probability> is belongs. The second classification called functional
provided explicitly. It is shown that when delay bounds classification is based on the functionality provided
are not very tight, the approach can substantially increase by the corresponding methodology.
Quality of Service in mobile ad hoc networks: a survey 21

• We discussed various methodologies reported in the Chakeres, I.D., Royer, E.M.B. and Macker, J.P. (2007)
literature that provide QoS in one form or the ‘Perceptive admission control for wireless network quality
other. We pointed out salient features of each of service’, Elsevier Journal on Ad Hoc Networks, Vol. 5,
methodology and compared methodologies that pp.1129–1148.
address somewhat similar issues. Chao, H.J. and Guo, X. (2002) Quality of Service Control
in Hgh Speed Networks, John Wiley and Sons, Inc.,
• After describing the methodologies proposed in the New York.
literature, we pointed out issues that may be Chen, S. and Nahrstedt, L. (1999) ‘Distributed quality of
addressed in future for almost all major service routing ad hoc networks’, IEEE Journal on
functionalities that are necessary for the provision Selected Areas in Communications, Vol. 17, No. 8, August,
of QoS in an ad hoc network. pp.1488–1505.
Chen, L. and Heinzelman, W.B. (2005) ‘QoS aware
We believe that the survey presented in this paper would routing based on bandwidth estimation for mobile ad
be of some use to academia and professionals so as hoc networks’, IEEE Journal on Selected Areas in
to help them in selecting a strategy that is closer to Communications, Vol. 23, No. 3, March, pp.561–572.
the requirements of their applications. It may also help Chowdhury, K.R., Nandiraju, N., Chanda, P., Agrawal, D.P.
researchers to think directions that are either untouched and Zeng, Q.A. (2009) ‘Channel allocation and medium
or not much work is carried out to address some of the access control for wireless sensor networks’, Elsevier
issues involved in providing QoS in a mobile ad hoc Journal on Ad hoc Networks, Vol. 7, No. 2, March,
network. pp.307–321.
Dovrolis, C., Stiliadis, D. and Ramanathan, P. (2002)
‘Proportional differentiation services: delay differentiation
and packet scheduling’, IEEE/ACM Transactions on
Acknowledgement
Networking, Vol. 10, No. 1, February, pp.12–26.
Guimaraes, R., Cerda, L., Barcelo, J.M., Garcia, J.,
This work was carried out during the tenure of an
Voorhaen, M. and Blondia, C. (2009) ‘Quality of service
ERCIM ‘Alain Bensoussan’ Fellowship Programme.
through bandwidth reservation on multirate ad hoc
wireless networks’, Elsevier Journal on Ad Hoc Networks,
Vol. 7, No. 2, March, pp.388–400.
References Gupta, R., Jia, Z., Tung, T. and Walrand, J. (2005)
‘Interference-aware QoS routing (IQRouting) for ad
Abdrabu, A. and Zhuang, W. (2006) ‘A position based QoS hoc networks’, Proc. IEEE Global Telecommunications
routing scheme for UWB mobile ad hoc networks’, IEEE Conference (Globecom), IEEE Press, St. Louis, Missouri,
Journal on Selected Areas in Communications, Vol. 24, pp.2599–2604.
No. 4, April, pp.850–856. Gupta, R., Musacchio, J. and Walrand, J. (2007) ‘Sufficient
Ahn, G.S., Campbell, A.T., Veres, A. and Sun, L.H. (2002) rate constraints for QoS flows in ad hoc networks’,
‘Supporting service differentiation for real-time and Elsevier Journal on Ad Hoc Networks, Vol. 5, No. 4, May,
best-effort traffic in stateless wireless ad hoc networks’, pp.429–443.
IEEE Transactions on Mobile Computing, September, Hanzo, L. and Tafazolli, R. (2007) ‘A survey of QoS
Vol. 1, No. 3, pp.192–207. routing solutions for mobile ad hoc networks’, IEEE
Akyildiz, I.F., Akan, O.B. and Morabito, G. (2007) ‘A rate Communications Surveys, Vol. 9, No. 2, pp.50–70.
control scheme for adaptive real-time applications in IP He, W., Nahrstedt, K. and Liu, X. (2008) ‘End-to-end delay
networks with lossy links and long round trip times’, control of multimedia applications over multihop wireless
IEEE/ACM Transactions on Networking, Vol. 13, No. 3, links’, ACM Transactions on Multimedia Computing,
June, pp.554–567. Communications and Applications, Vol. 5, No. 2,
Bashandy, A.R., Chong, E.K.P. and Ghafoor, A. (2005) November, Article 16, pp.1–20.
‘Generalized quality-of-service routing with resource Hui, J. and Devetsikiotis, M. (2005) ‘A unified model
allocation’, IEEE Journal on Selected Areas in for the performance analysis of IEEE 802.11e EDCA’,
Communications, Vol. 23, No. 2, February, pp.450–463. IEEE Transactions on Communications, Vol. 53, No. 9,
Bejerano, Y. (2004) ‘Efficient integration of multihop wireless September, pp.1498–1510.
and wired networks with QoS constraints’, IEEE/ACM Hwang, I.S. and Wu, J.H. (2008) ‘Performance assessment of
Transactions on Networking, Vol. 12, No. 6, December, service differentiation in IEEE 802.11e wireless LANs’,
pp.1064–1078. InderScience International Journal of Ad hoc and
Bejerano, Y. and Bhatia, R.S. (2006) ‘A framework for fairness Ubiquitous Computing (IJAHUC), Vol. 3, No. 1, pp.21–32.
and QoS assurance for current IEEE 802.11 networks Ito, Y. and Tasaka, S. (2005) ‘Quantitative assessment of
with multiple access points’, IEEE/ACM Transactions on user-level QoS and its mapping’, IEEE Transactions on
Networking, Vol. 14, No. 4, August, pp.849–862. Multimedia, Vol. 7, No. 3, June, pp.572–584.
Bianchi, G. (2000) ‘Performance analysis of the IEEE 802.11 Ivascu, G.I., Pierre, S. and Quintero, A. (2009) ‘QoS routing
distributed coordination function (DCF)’, IEEE Journal with traffic distribution in mobile ad hoc networks’,
on Selected Areas in Communications, Vol. 18, No. 3, Elsevier Journal on Computer Communications, Vol. 32,
March, pp.535–547. No. 2, February, pp.305–316.
22 A.M. Abbas and Ø. Kure

Jawhar, I. and Wu, J. (2005) ‘QoS support in TDMA-based Liu, Q., Wang, X. and Giannakis, G.B. (2006) ‘A cross-layer
mobile ad hoc networks’, Journal of Computer Science scheduling algorithm with QoS support in wireless
and Technology, Vol. 20, No. 6, November, pp.797–810. networks’, IEEE Transactions on Vehicular Technology,
Jia, Y., Nikolaidis, I. and Gburzynski, P. (2004) ‘On the Vol. 55, No. 3, May, pp.839–847.
effectiveness of alternate paths in QoS routing’, John Wiley Luo, H. and Lu, S. (2005) ‘A topology-independent wireless
International Journal on Communication Systems, Vol. 17, fair queueing model in ad hoc networks’, IEEE Journal on
pp.1–26. Selected Areas in Communications, Vol. 23, No. 3, March,
Jia, Z., Gupta, R., Walrand, J. and Varaiya, P. (2005) pp.585–597.
‘Bandwidth guaranteed routing for ad hoc networks Meshkati, F., Goldsmith, A.J., Poor, H.V. and Schwartz,
with interference considerations’, Proc. Eleventh IEEE S.C. (2007) ‘A game-theoretic approach to energy-
Symposium on Computers and Communications, IEEE CS efficient modulation in CDMA networks with delay
Press, Cartagena, Spain, pp.3–9. QoS constraints’, IEEE Journal on Selected Areas in
Kanodia, V., Li, C., Sabharwal, A., Sadeghi, B. and Nightly, E. Communications, Vol. 25, No. 6, August, pp.1069–1078.
(2002) ‘Distributed priority scheduling and medium access Mieghem, P.F.A.V., Neve, H.D. and Kuipers, F.A. (2001)
in ad hoc networks’, ACM Wireless Networks, Vol. 8, ‘Hop-by-hop quality of service routing’, Elsevier Journal
No. 5, September, pp.455–466. on Computer Networks, Vol. 37, Nos. 3–4, pp.407–423.
Knopp, R. and Humblet, P.A. (1995) ‘Information Mieghem, P.F.A.V. and Kuipers, F.A. (2004) ‘Concepts of
capacity and power control in single-cell multiuser exact QoS routing algorithms’, IEEE/ACM Transactions
communications’, Proc. IEEE International Conference on Networking, Vol. 12, No. 5, October, pp.851–864.
on Communications (ICC), IEEE Press, Seattle, Movsichoff, B.A., Lagoa, C.M. and Che, H. (2007) ‘End-to-end
pp.331–335. optimal algorithms for integrated QoS, traffic engineering,
Kuipers, F.A. and Mieghem, P.F.A.V. (2005) ‘Conditions and failure recovery’, IEEE/ACM Transactions on
that impact the complexity of QoS routing’, IEEE/ACM Networking, Vol. 15, No. 4, August, pp.813–823.
Transactions on Networking, Vol. 13, No. 4, August, O’Farrell, T. and Omiyi, P. (2005) ‘Low-complexity medium
pp.717–730. access control protocols for QoS support in third-
Kumar, S., Raghavan, V.S. and Deng, J. (2006) ‘Medium access generation radio access networks’, IEEE Transactions
control protocols for ad hoc wireless networks: a survey’, on Wireless Communications, Vol. 4, No. 2, March,
Elsevier Journal on Ad Hoc Networks, Vol. 4, pp.326–358. pp.743–756.
Kumar, A., Altman, E., Miorandi, D. and Goyal, M. (2007) Park, E.C. and Kim, D.Y. (2007) ‘Improving quality of service
‘New insights from a fixed-point analysis of single cell and assuring fairness in WLAN access networks’, IEEE
IEEE 802.11 WLANS’, IEEE/ACM Transactions on Transactions on Mobile Computing, Vol. 6, No. 4, April,
Networking, Vol. 15, No. 3, June, pp.588–601. pp.337–350.
Kurose, J.F. and Ross, K.W. (2006) Computer Networking: Paschos, G.S., Politis, I.D. and Kotsopoulos, S.A. (2005)
A Top Down Approach Featuring the Internet, 3rd ed., ‘A quality of service negotiation-based admission control
Pearson Education, New Delhi. scheme for WCDMA mobile wireless multiclass services’,
Lee, S.B., Ahn, G.S., Zhang, X. and Campbell, A.T. (2000) IEEE Transactions on Vehicular Technology, Vol. 54,
‘INSIGNIA: an IP-based quality of service framework No. 5, September, pp.1875–1886.
for mobile ad hoc networks’, Journal of Parallel and Patil, S. and Veciana, G. (2007) ‘Managing resources and
Distributed Computing: Special Issue on Wireless and Ad quality of service in heterogeneous wireless systems
hoc Networks, Vol. 60, No. 4, April, pp.374–406. exploiting opportunism’, IEEE/ACM Transactions on
Li, K. and Wang, X. (2006) ‘Cross-layer optimization Networking, Vol. 15, No. 5, October, pp.1046–1058.
for LDPC-coded multirate multiuser systems with QoS Perkins, D.D. and Hughes, H.D. (2002) ‘A survey on quality
constraints’, IEEE Transactions on Signal Processing, of service support for mobile ad hoc networks’, Kluwer
Vol. 54, No. 7, July, pp.2567–2578. Academic Publishers Journal on Wireless Communications
Liang, B. and Dong, M. (2007) ‘Packet prioritization in and Mobile Computing, Vol. 2, No. 5, September,
multihop latency aware scheduling for delay constrained pp.503–513.
communication’, IEEE Journal on Selected Areas in Reddy, T.B., Karthigeyan, I., Manoj, B.S. and Murthy, C.S.R.
Communications, Vol. 25, No. 4, May, pp.819–830. (2006) ‘Quality of service provisioning in ad hoc wireless
Liao, W.H., Tseng, Y.C. and Shih, K.P. (2002) networks: a survey of issues and solutions’, Elsevier
‘A TDMA-based bandwidth reservation protocol for QoS Journal on Ad hoc Networks, Vol. 4, No. 1, January,
routing in a mobile ad hoc network’, IEEE International pp.83–124.
Conference on Communications (ICC), IEEE Press, Reddy, T.B., John, J.P. and Murthy, C.S.R. (2007) ‘Providing
New York, Vol. 5, pp.3186–3190. MAC QoS for multimedia traffic in 802.11e based
Lin, C.R. and Liu, J.S. (1999) ‘QoS routing in ad hoc multihop ad hoc wireless networks’, Elsevier Journal on
wireless networks’, IEEE Journal on Selected Areas in Computer Networks, Vol. 51, pp.153–176.
Communications, Vol. 17, No. 8, August, pp.1426–1438. Sabella, R. and Iovanna, P. (2006) ‘Self-adaptation in
Liu, H., Jia, X., Li, D. and Lee, C.H. (2005) ‘Bandwidth next-generation internet networks: how to react to traffic
guaranteed call admission in TDMA/CDMA ad hoc changes while respecting QoS?’, IEEE Transactions on
wireless networks’, Elsevier Journal on Ad Hoc Networks, Systems, Man, and Cybernetics–Part B: Cybernetics,
Vol. 3, pp.689–701. Vol. 36, No. 6, pp.1218–1229.
Quality of Service in mobile ad hoc networks: a survey 23

Sarr, C., Chaudet, C., Chelius, G. and Lassous, I.G. (2008) Wang, K.C. and Ramanathan, P. (2005) ‘QoS assurances
‘Bandwidth estimation for IEEE 802.11-based ad hoc through class selection and proportional differentiation in
networks’, IEEE Transactions on Mobile Computing, wireless networks’, IEEE Journal on Selected Areas in
Vol. 7, No. 10, October, pp.1228–1241. Communications, Vol. 23, No. 3, March, pp.573–584.
Shih, K.P., Chang, C.Y., Chen, Y.D. and Chuang, T.H. Wang, P., Jiang, H. and Zhuang, W. (2008) ‘A new MAC
(2006) ‘Dynamic bandwidth allocation for QoS routing on scheme supporting voice/data traffic in wireless ad hoc
TDMA-based mobile ad hoc networks’, Elsevier Journal networks’, IEEE Transactions on Mobile Computing,
on Computer Communications, Vol. 29, pp.1316–1329. Vol. 7, No. 12, December, pp.1491–1503.
Singh, S., Acharya, P.A.K., Madhow, U. and Royer, E.M.B. Wang, W., Chatterjee, M. and Kwiat, K. (2009) ‘User input
(2007) ‘Sticky CSMA/CA: implicit synchronization and driven QoS management in ad hoc networks’, Elsevier
real-time QoS in mesh networks’, Elsevier Journal on Journal on Computer Communications, Vol. 32, No. 11,
Ad Hoc Networks, Vol. 5, No. 6, August, pp.744–768. July, pp.1306–1315.
Sivakumar, R., Sinha, P. and Bharghavan, V. (1999) ‘CEDAR: Wu, D. and Negi, R. (2005) ‘Utilizing multiuser diversity
A core-extraction distributed ad hoc routing algorithm’, for efficient support of quality of service over a fading
IEEE Journal on Selected Areas in Communications, channel’, IEEE Transactions on Vehicular Technology,
Vol. 17, No. 8, August, pp.1454–1465. Vol. 54, No. 3, May, pp.1198–1206.
Small, T. and Haas, Z.J. (2007) ‘Quality of service and capacity Wu, H. and Jia, X. (2007) ‘QoS multicast routing by using
in constrained intermittent-connectivity networks’, IEEE multiple paths/trees in wireless ad hoc networks’, Elsevier
Transactions on Mobile Computing, Vol. 6, No. 7, July, Journal on Ad hoc Networks, Vol. 5, No. 5, July,
pp.803–814. pp.600–612.
Sobrinho, J. and Krishnakumar, A.S. (1999) ‘Quality of service Xiao, H., Seah, K.G., Lo, A. and Chua, K.C. (2000) ‘A flexible
in ad hoc carrier sense multiple access wireless networks’, quality of service model for mobile ad hoc networks’, Proc.
IEEE Journal on Selected Areas in Communications, Fifty First IEEE Vehicular Technology Conference IEEE
Vol. 17, No. 8, August, pp.1353–1368. Press, Tokyo, Vol. 1, pp.445–449.
Sun, W. and Shin, K.G. (2005) ‘End-to-end delay bounds Xiao, Y. and Li, H. (2004) ‘Local data control and admission
for traffic aggregates under guaranteed-rate scheduling control for QoS support in wireless ad hoc networks’,
algorithms’, IEEE/ACM Transactions on Networking, IEEE Transactions on Wireless Communications, Vol. 53,
Vol. 13, No. 5, October, pp.1188–1201. No. 5, September, pp.1558–1568.
Sun, W., Yamaguchi, H., Yukimasa, K. and Kusumoto, S. Xiao, Y. (2005) ‘Performance analysis of priority schemes for
(2006) ‘GVGrid: a QoS routing protocol for vehicular IEEE 802.11 and IEEE 802.11e wireless LANs’, IEEE
ad hoc networks’, Proc. Fourteenth IEEE International
Transactions on Wireless Communications, Vol. 4, No. 4,
Workshop on Quality of Service (IWQoS), IEEE Press,
July, pp.1506–1515.
New Haven, Connecticut, pp.130–139.
Xu, Y. and Guerin, R. (2005) ‘Individual QoS versus aggregate
Tang, J. and Zhang, X. (2007) ‘Cross-layer resource allocation
QoS: a loss performance study’, IEEE/ACM Transactions
over wireless relay networks for quality of service
on Networking, Vol. 13, No. 2, April, pp.370–383.
provisioning’, IEEE Journal on Selected Areas in
Communications, Vol. 25, No. 4, May, pp.645–656. Xu, J. and Lipton, R.J. (2005) ‘On fundamental tradeoffs
between delay bounds and computational complexity in
Tasaka, S. and Ishibashi, Y. (2002) ‘Mutually compensatory
packet scheduling algorithms’, IEEE/ACM Transactions
property of multimedia QoS’, Proc. IEEE International
on Networking, Vol. 13, No. 1, February, pp.15–28.
Conference on Communications (ICC), IEEE Press,
Anchorage, Alaska, pp.1105–1111. Xue, G., Sen, A., Zhang, W., Tang, J. and Thulasiraman,
K. (2007) ‘Finding a path subject to many additive QoS
Tay, Y.C. and Chua, K.C. (2001) ‘A capacity analysis for
constraints’, IEEE/ACM Transactions on Networking,
the IEEE 802.11 MAC protocol’, Springer Journal on
Vol. 15, No. 1, February, pp.201–211.
Wireless Networks, Vol. 7, No. 2, July, pp.159–171.
Tsigkas, O. and Pavlidou, F.N. (2006) ‘A dynamic priority Yang, Y. and Kravets, R. (2005) ‘Contention-aware admission
MAC protocol for time-bounded services in wireless control for ad hoc networks’, IEEE Transactions on
networks’, International Journal of Wireless Personal Mobile Computing, Vol. 4, No. 4, August, pp.850–856.
Communications, Vol. 38, No. 3, pp.301–324. Yang, Y. and Kravets, R. (2007) ‘Throughput guarantees for
Tsigkas, O. and Pavlidou, F.N. (2008) ‘An adaptive medium multipriority traffic in ad hoc networks’, Elsevier Journal
access control protocol using m-ary tree algorithms for on Ad Hoc Networks, Vol. 5, pp.228–253.
quality of service support in single cell ad hoc networks, Zhai, H., Chen, X. and Fang, Y. (2005) ‘How well can the
Elsevier Journal on Ad Hoc Networks, Vol. 6, No. 2, April, IEEE 802.11 wireless LAN support quality of service?’,
pp.245–259. IEEE Transactions on Wireless Communications, Vol. 4,
Wang, Z. and Crowcroft, J. (1996) ‘Quality of service routing No. 6, November, pp.3084–3094.
for supporting multimedia applications’, IEEE Journal Zhang, B. and Mouftah, H.T. (2005) ‘QoS routing for wireless
of Selected Areas in Communications, Vol. 14, No. 7, ad hoc networks: problems, algorithms, and protocols’,
pp.1228–1234. IEEE Communications Magazine, October, pp.110–117.
Wang, K.C. and Ramanathan, P. (2003) ‘End-to-end delay Zhao, Q. and Tsang, D.H.K. (2006) ‘An equal-spacing-based
assurances in multihop wireless local area networks’, design for QoS guarantee in IEEE 802.11e HCCA wireless
Proc. IEEE Conference on Global Telecommunications networks’, IEEE Transactions on Mobile Computing,
(GLOBECOM), San Francisco, California, pp.2962–2966. Vol. 7, No. 12, December, pp.1491–1503.
24 A.M. Abbas and Ø. Kure

Zhu, C. and Corson, M.S. (2002) ‘QoS routing for mobile 3


The literal meaning of the word ‘insignia’ is “a badge or
ad hoc networks’, Proc. Twenty First Annual Joint distinguishing mark”. However, INSIGNIA here stands for
Conference of IEEE Computer and Communication in-band signalling.
Societies (INFOCOM), IEEE CS Press, New York, Vol. 2, 4
Although, CMAC is proposed for sensor networks, we believe
pp.958–967. that it can also be used in ad hoc networks in situations when
Znati, T.F. and Melhem, R. (2004) ‘Node delay assignment either the nodes do not move or the mobility of nodes is very
strategies to support end-to-end delay requirements in low.
5
heterogeneous networks’, IEEE/ACM Transactions on Though the strategies presented in Znati and Melhem (2004)
Networking, Vol. 12, No. 5, October, pp.879–892. are for the internet, we believe that similar kinds of problems
can also be faced while scheduling packets at a node in an ad
hoc network.

Notes
1
Note that a constraint that is multiplicative can be converted
to an additive constraint by using logarithms.
2
In this paper, some of the papers that describe the provision
of QoS in case of networks with a centralised infrastructure
have also been considered with the view that those works can
serve as the foundations or basics for the issues and challenges
that are to be faced in providing QoS in case of an ad hoc
network too. The issues and challenges to be tackled in case
of an ad hoc network are more stringent as compared to other
types of networks whether wired or wireless.

Вам также может понравиться