+ All Categories
Home > Documents > RING: A Cross-Layer Design for Voice Communicating on … · approach like peer-to-peer (P2P) ......

RING: A Cross-Layer Design for Voice Communicating on … · approach like peer-to-peer (P2P) ......

Date post: 18-Apr-2018
Category:
Upload: nguyentuong
View: 218 times
Download: 3 times
Share this document with a friend
8
a SciTechnol journal Research Article Kuo et al., J Comput Eng Inf Technol 2013, 2:2 http://dx.doi.org/10.4172/2324-9307.1000106 Journal of Computer Engineering & Information Technology All articles published in Journal of Computer Engineering & Information Technology are the property of SciTechnol, and is protected by copyright laws. Copyright © 2013, SciTechnol, All Rights Reserved. International Publisher of Science, Technology and Medicine RING: A Cross-Layer Design for Voice Communicating on P2P-MANET Jun-Li Kuo 1 *, Chen-Hua Shih 1 , Ming-Ching Wang 1 and Yaw- Chung Chen 1 Abstract This paper presents RING, a novel peer-to-peer (P2P) voice communicating system on mobile ad hoc network (MANET). RING proposes a ring overlay, a set of protocols, and an implementation enabling the delivery voice among peers without connecting to Internet. The logical overlay is proximal to the physical topology based on cross-layer scheme, which detects the network dynamics and peer movement to support a communication with high delivery ratio. The ring overlay is used to utilize simply, stabilize real-time delivery, and minimize signaling overhead. The characteristics of self-organization and decentralization share the network load and help the network scalability for MANET. Although the traditional P2P system falls into impropriety and inefficiency of real-time distribution on MANET, RING can achieve the acceptable quality in short-term and small-scale purpose. We discuss the comparison of overlay performance and demonstrate that RING is workable via the mathematical theory and a series of experiences. RING can deal with peer arrival and departure quickly and simply to shorten the service interruption time with minimal signaling overhead. Keywords P2P-MANET; Cross-layer design; Wireless ad hoc; P2P voice communicating; Real-time multimedia service Introduction Recent advance in wireless technology and mobile computing has provided a major development of mobile ad hoc network (MANET). In MANET, two mobile nodes can communicate with each other through other intermediate nodes over wireless infrastructure-less network without the centralized administration. A decentralized approach like peer-to-peer (P2P) computing can be an appropriate solution adopted in the self-organized environment. e P2P application usually has a specific purpose for the cooperative voice communication, so the cross-layer scheme is utilized to optimize the short-term and small-scale architecture. P2P-MANET (P2P over MANET) [1] is used to describe the cross-layer architecture, which provides the real-time communication in disaster areas and battle fields without high cost or long setup time of system installation. However, P2P and MANET techniques have been developed by different communities and addressed entirely different requirements. P2P systems are service-oriented and have evolved mainly over *Corresponding author: Jun-Li Kuo, Computer Science, National Chiao Tung University, Hsinchu, Taiwan, Tel: +886-3-573-1851; Fax: +886-3-573-1851; E-mail: [email protected] Received: April 02, 2013 Accepted: April 26, 2013 Published: May 03, 2013 the wired Internet so far, and they serve large amount of users in global scale for a long term. By contrast, MANET is spontaneous, infrastructure-less wireless networks for mobile terminals, and it serves small amount of users in local scale for a short term. erefore, the cross-layer scheme is difficult to support voice communication due to the innate disadvantages: (1) MANET degrades the maintenance of P2P overlay due to the frequent mobility problem. (2) P2P overlay is not proximal to MANET topology, this leads to the inefficient streaming delivery. (3) e unreliable wireless connection leads to the out-of-order congestion of multi-source P2P voice communicating. is paper presents Real-time Intercommunication Network Gossip (RING) to overcome the above drawbacks. RING is a voice communicating application on P2P-MANET. Mobile nodes as peers collaborate with each other on a ring overlay without the centralized server. RING integrates P2P overlay into the cross-layer scheme to manage the ad hoc topology. rough P2P overlay, a virtual conferencing room can be formed in the short-term and small-scale purpose. e users can communicate together in the infrastructure- less environment without through Internet, hence the implementation of handed device equipped with RING can be used for the disaster rescue. e ring overlay can deal with peer arrival and departure fast and simply to shorten the service interruption time with minimal signaling overhead. e implement of application neither considers the complex voicing mixer nor the connection-oriented delivery. e paper is organized as follows: Section 2 presents the related works. Section 3 introduces the voice communication on RING and illustrates our proposed cross-layer scheme. Section 4 presents the analytic performance of voice communication on P2P-MANET. In Section 5, the simulated results demonstrate that our proposed scheme works well via the measurement of packet delivery ratio and signaling overhead. Section 6 concludes the paper. Related Works In general, the cross-layer design of P2P-MANET can be described as Figure 1. e P2P protocol integrates with the ad hoc routing protocol to achieve mobility. e P2P protocol, routing protocol, and cross-layer design are discussed in the followings. Application P2P overlay Session Transport Ad hoc routing Cross-layer design Wireless MAC Figure 1: The network stack of cross-layer P2P-MANET.
Transcript

a S c i T e c h n o l j o u r n a lResearch Article

Kuo et al., J Comput Eng Inf Technol 2013, 2:2http://dx.doi.org/10.4172/2324-9307.1000106 Journal of Computer

Engineering & Information Technology

All articles published in Journal of Computer Engineering & Information Technology are the property of SciTechnol, and is protected by copyright laws. Copyright © 2013, SciTechnol, All Rights Reserved.International Publisher of Science,

Technology and Medicine

RING: A Cross-Layer Design for Voice Communicating on P2P-MANETJun-Li Kuo1*, Chen-Hua Shih1, Ming-Ching Wang1 and Yaw-Chung Chen1

AbstractThis paper presents RING, a novel peer-to-peer (P2P) voice communicating system on mobile ad hoc network (MANET). RING proposes a ring overlay, a set of protocols, and an implementation enabling the delivery voice among peers without connecting to Internet. The logical overlay is proximal to the physical topology based on cross-layer scheme, which detects the network dynamics and peer movement to support a communication with high delivery ratio. The ring overlay is used to utilize simply, stabilize real-time delivery, and minimize signaling overhead. The characteristics of self-organization and decentralization share the network load and help the network scalability for MANET. Although the traditional P2P system falls into impropriety and inefficiency of real-time distribution on MANET, RING can achieve the acceptable quality in short-term and small-scale purpose. We discuss the comparison of overlay performance and demonstrate that RING is workable via the mathematical theory and a series of experiences. RING can deal with peer arrival and departure quickly and simply to shorten the service interruption time with minimal signaling overhead.

KeywordsP2P-MANET; Cross-layer design; Wireless ad hoc; P2P voice communicating; Real-time multimedia service

Introduction Recent advance in wireless technology and mobile computing has

provided a major development of mobile ad hoc network (MANET). In MANET, two mobile nodes can communicate with each other through other intermediate nodes over wireless infrastructure-less network without the centralized administration. A decentralized approach like peer-to-peer (P2P) computing can be an appropriate solution adopted in the self-organized environment. The P2P application usually has a specific purpose for the cooperative voice communication, so the cross-layer scheme is utilized to optimize the short-term and small-scale architecture. P2P-MANET (P2P over MANET) [1] is used to describe the cross-layer architecture, which provides the real-time communication in disaster areas and battle fields without high cost or long setup time of system installation.

However, P2P and MANET techniques have been developed by different communities and addressed entirely different requirements. P2P systems are service-oriented and have evolved mainly over

*Corresponding author: Jun-Li Kuo, Computer Science, National Chiao Tung University, Hsinchu, Taiwan, Tel: +886-3-573-1851; Fax: +886-3-573-1851; E-mail: [email protected]

Received: April 02, 2013 Accepted: April 26, 2013 Published: May 03, 2013

the wired Internet so far, and they serve large amount of users in global scale for a long term. By contrast, MANET is spontaneous, infrastructure-less wireless networks for mobile terminals, and it serves small amount of users in local scale for a short term. Therefore, the cross-layer scheme is difficult to support voice communication due to the innate disadvantages: (1) MANET degrades the maintenance of P2P overlay due to the frequent mobility problem. (2) P2P overlay is not proximal to MANET topology, this leads to the inefficient streaming delivery. (3) The unreliable wireless connection leads to the out-of-order congestion of multi-source P2P voice communicating.

This paper presents Real-time Intercommunication Network Gossip (RING) to overcome the above drawbacks. RING is a voice communicating application on P2P-MANET. Mobile nodes as peers collaborate with each other on a ring overlay without the centralized server. RING integrates P2P overlay into the cross-layer scheme to manage the ad hoc topology. Through P2P overlay, a virtual conferencing room can be formed in the short-term and small-scale purpose. The users can communicate together in the infrastructure-less environment without through Internet, hence the implementation of handed device equipped with RING can be used for the disaster rescue. The ring overlay can deal with peer arrival and departure fast and simply to shorten the service interruption time with minimal signaling overhead. The implement of application neither considers the complex voicing mixer nor the connection-oriented delivery.

The paper is organized as follows: Section 2 presents the related works. Section 3 introduces the voice communication on RING and illustrates our proposed cross-layer scheme. Section 4 presents the analytic performance of voice communication on P2P-MANET. In Section 5, the simulated results demonstrate that our proposed scheme works well via the measurement of packet delivery ratio and signaling overhead. Section 6 concludes the paper.

Related WorksIn general, the cross-layer design of P2P-MANET can be

described as Figure 1. The P2P protocol integrates with the ad hoc routing protocol to achieve mobility. The P2P protocol, routing protocol, and cross-layer design are discussed in the followings.

Application

P2P overlay

Session

Transport

Ad hoc routing

Cro

ss-la

yer d

esig

n

Wireless MAC

Figure 1: The network stack of cross-layer P2P-MANET.

Citation: Kuo JL, Shih CH, Wang MC, Chen YC (2013) RING: A Cross-Layer Design for Voice Communicating on P2P-MANET. J Comput Eng Inf Technol 2:2.

• Page 2 of 8 •

doi:http://dx.doi.org/10.4172/2324-9307.1000106

Volume 2 • Issue 2 • 1000106

P2P protocol

The traditional P2P technology uses the distributed hash table (DHT) to apply for file sharing. The fast and accurate searching ability of DHT algorithms is workable attractively for different kinds of applications in wired networks. Chord [2] is a famous example of ring-based DHT,1 which is used to index peers and files2. Chord uses the consistent hashing function to map keys to peers in the static domain, and every peer can locate itself or query any peer depending on the hashing key. However, DHT is unstable for MANET due to the mobility and the locality [3]. Therefore, the studies modify DHT scheme and design the cross-layer integration of P2P overlay and ad hoc routing protocol to improve the delivery efficiency in MANET [4-6].

Routing protocol

The cross-layer design must consider the ad hoc routing protocol to complete a specific purpose of P2P application [7]. The routing protocols for MANET can be classified into reactive and proactive routing protocols. In proactive or table-driven routing protocols, such as Optimized Link State Routing (OLSR) [8], every mobile node maintains a routing table with the global information of network topology. The reactive or on-demand routing protocols, such as Dynamic Source Routing (DSR) [9], every mobile node finds a routing path only when it is necessary. However, these routing protocols are unstable for the real-time service with high data rate due to long delay and high overhead3.

Virtual Ring Routing (VRR) [10] adopts the ring-based routing4 to shorten the end-to-end delay and reduce the message overhead. VRR is an ad hoc routing protocol inspired by DHT, and it organizes the mobile nodes in a unique virtual ring which is independent of physical location. Each node maintains a small number of routing paths to its neighbors in the ring without any flooding scheme.5 VRR is suitable for P2P application due to its inheritance from DHT. However, its virtual ring is not proximal to the physical topology, so VRR has the far routing problem and serious hidden terminal problem, and VRR is unsuitable for real-time voice communication.

Cross-layer design

Audio Conferencing Testbed (ACT) [11] is based on OLSR to set up a meeting for group of people in WiFi MANET. ACT uses the minimum spanning tree to minimize the latency of audio dissemination to the whole network. Every peer must maintain its minimum spanning tree to deliver data by itself. ACT predicts the disconnection and mobility to shorten the service interruption time.

Cross-Layer and P2P based Solution (CLAPS) [12] is based on the combination of tree-based overlay and OLSR extension. CLAPS assumes that the physical routing topology can be provided by OLSR, which sends cross-layer message to optimize overlay. The source peer maintains a minimum spanning tree as its overlay. The minimum cost is computed via link distance packaged in cross-layer message, and the spanning tree is recomputed periodically to keep the overlay proximity.

Explicit Cross-Layer (EXL) [13] is implemented in the combination of Chord and OLSR. EXL proposes a cross-layer method to merge the ad hoc network triggered by P2P layer. MeshChord [14] is based on the combination of Chord and DSR. MeshChord proposes a cross-layer method to speed up the lookup operations by exploiting

the information which is available at the media access control (MAC) layer due to the one-hop broadcast.

In summary, the cross-layer schemes can improve proximity and predict mobility. They combine the characteristics of P2P overlay protocol and ad hoc routing protocol to deliver the multimedia stream efficiently. However, the above methods consider neither multi-source delivery nor sequential voice receipt. The proposed RING not only keeps the advantages of cross-layer design but also considers the multi-source delivery and sequential voice receipt.

Our Proposed SchemeWe propose a new cross-layer scheme to overcome the difficulty

of voice streaming for P2P network over MANET. A group of users can chat together when they walk or deal with other thing simultaneously. In our scheme, RING, all peers self-organize a ring overlay to simplify the maintenance of the P2P overlay. Due to the cross-layer integration, an immediate forwarding with proximity can hasten the in-time data delivery.

Overview

To construct the ring overlay, the underlay network dynamics, such as the topology and available bandwidth, must be known, such that the cross-layer information can be used for promoting the routing efficiency. We illustrate the establishment of RING as Figure 2 shown.

First, MANET allows the mobile nodes equipped with ad hoc adapter building a cooperative network. Each mobile node maintains

B

A

D

C

Ad hoc topology

Network routing

RING overlay

Voice stream

Overlay

1

2

3

Intermediate node

RING Peer

Mobile node with RING

Mobile node

B speaks

A speaks

Figure 2: Relationship between the ring overlay and the physical topology.

1Chord uses ring-based DHT to achieve multi-hop querying; our proposed scheme, RING, uses ring-based overlay to achieve one-by-one real-time delivery. They are entirely different.

2Each peer has a link to its predecessor and successor according to the DHT of Chord called finger table.

3A lot of computing cost and bandwidth is required to maintain the dynamic routing tables in proactive routing; the larger delivery delay is inefficient for heavy traffic in reactive routing.

4VRR uses ring-based routing in network layer; RING uses ring-based overlay in application layer. They are entirely different.

5Proactive routing floods on topology change; reactive routing floods to discover routes.

Citation: Kuo JL, Shih CH, Wang MC, Chen YC (2013) RING: A Cross-Layer Design for Voice Communicating on P2P-MANET. J Comput Eng Inf Technol 2:2.

• Page 3 of 8 •

doi:http://dx.doi.org/10.4172/2324-9307.1000106

Volume 2 • Issue 2 • 1000106

a routing table to know local topology and establish the point-to-point connection in ad hoc model. The voice data can be delivered via a point-to-point connection through multihop routing in an opportunistic network [15]. The users in a group must coordinate a Group ID to login the application, thus RING groups users via the Group ID. RING peers are the mobile nodes using RING application with the same Group ID.

Next, the peers organize themselves via a ring overlay to deliver live voice. Every peer only knows its front peer and rear peer in RING. Whenever a peer joins or leaves, it notices its neighbors actively. Every peer sends Probe Message to its front peer and rear peer periodically to estimate round trip time (RTT), which also indicates the movement, available bandwidth, and absence. As a result, the P2P overlay can be mapped to the physical ad hoc topology in our proposed scheme. Every peer is just responsible to forward voice data to its rear peer without handling data scheduling, peer adaptation, and multiple sources, so the algorithm complexity and the signaling overhead can be reduced.

Third, the peer creates voice data and delivers it on demand instead of maintaining a connection for VoIP. As Figure 2 shown, once the new arriving peer joins one by one via the same Group ID, every peer should connect to two nearest peers and forwards voice data. When user A speaks, the voice data with peer A’s ID is forwarded to every peer in order. Every peer checks the Peer ID to decide whether the voice data is forwarded. When peer C receives the voice data, peer C does not forward the data to peer A, because peer C knows that peer A is its rear peer and the source. The multi-source difficulty can be solved due to the unique ring overlay and a unique forwarding direction.

Peer arrival

As Figure 3 shown, the set of peer F, peer L, and peer R is a part of the proposed ring overlay. The direction of voice stream is F L R. When a new peer (peer N) launches RING to indicate to join into P2P overlay, peer N must contact someone as linkage peer, whose helps peer N to complete the arrival process because a new peer does not know any P2P overlay and friendship. If peer N contacts its linkage peer (peer L), peer L introduces its front peer (peer F) and its rear peer (peer R) as the candidates to peer N. And then peer N decides to insert between peer L and peer R, because the distance between peer N and peer R is shorter than the distance between peer N and peer F. Next, peer N notices the decision to peer L, and peer L coordinates peer R to become the rear peer of peer N.

We give a detailed explanation to clarify the diagram of peer arrival. As Figure 4 shown, the new peer passes several exchanges of messages to complete the process.

(1) The direction of voice stream is F L R. Peer L only keeps the information about peer F and peer R.

(2) The new peer (peer N) searches the peers who have the same group ID via Request Message and Response Message6.

(3) Peer N selects its linkage peer via Probe Message and Probe Ack Message. The new peer selects its linkage peer depending on RTT.

(4) Peer N contacts to peer L as its linkage peer via Link Message and Link Ack Message. Link Ack Message brings the information about the candidates. (i.e. the front peer and the rear peer of the linkage peer).

(5) Peer N sends Probe Message to the candidates (peer F and peer R) to ensure that the candidates are connectable.

(6) Peer F and peer R return Probe Ack Message to peer N. We assume that peer N receives Probe Ack Message from peer R earlier than the message from peer F.

(7) Peer N decides to connect peer R due to the short time interval between Probe and Ack. Peer N sends Decide Message to peer L to insert the path.

(8) The linkage peer resets its front peer or rear peer, and sends Connect Message to peer N and peer R to set or reset their front peers and rear peers.

(9) The direction of voice stream is F L N R. The arrival process is completed.

In ring overlay, every peer always interacts with only two peers, so the singling overhead is low. The packets are delivered sequentially and the multi-source problem is solved due to unidirectional

F

L

R

N

Linkage peer

New peer

Intermediate node

Front peer

Rear peer

F

L

R

N

Figure 3: Diagram of new peer arrival.

Peer N Peer L Peer F Peer R

Request Message

Response Message

Link Message

Link Ack Message

Probe Message

Probe Ack Message

Decide Message

Connect Message

Probe and Ack Message

Voice streaming1

2

3

4

5

6

7

8

9

Figure 4: Message flow of new peer arrival.

6We assume that peer L and peer R are in the transmission range of peer N and receives Request Message, and then they return Response Message back. Peer N knows how to route to peers L and R via Response Message.

Citation: Kuo JL, Shih CH, Wang MC, Chen YC (2013) RING: A Cross-Layer Design for Voice Communicating on P2P-MANET. J Comput Eng Inf Technol 2:2.

• Page 4 of 8 •

doi:http://dx.doi.org/10.4172/2324-9307.1000106

Volume 2 • Issue 2 • 1000106

forwarding path. As Figure 5 shown, we illustrate the detailed message flow between the new peer and the linkage peer during the arrival process. In position 1, if two nodes detect each other, a WiFi7 awareness is updated; otherwise, the new node is indicated to join the ring overlay through intermediate hops. In position 2, if the new node gets a WiFi awareness, it sends Request Message in its transmission range; otherwise, the new node floods Request Message cross the entire ad hoc network. The new node receives Response Message for P2P awareness, and this means there are other nodes using the same group ID in the ad-hoc network. Next, the new peer multicasts Probe Message to the nodes who return Response Message. The RTT is the time interval between sending Probe Message and receiving Probe Ack Message. The new node selects the linkage peer with the shortest RTT, and then the new peer joins successfully after the completeness of Link Message and Decide Message. The proposed cross-layer scheme performs time sensitivity of neighborhood, so such scheme of peer arrival is efficient with scalability and proximity.

Peer departure and movement

When a peer leaves the P2P network, it voluntarily informs its front peer and rear peer via a Left Message so that they can recover the ring overlay. The purpose of Left Message is to let the front peer and the rear peer can find each other quickly8. After receiving Left Message, the peers send Connect Message to each other for the confirmation of connectivity. When the original delivery path is broken due to peer departure, the new delivery path is established as Figure 6a shown. However, Left Message may get lost, or the peer leaves before exchanging Connect Message. The original delivery path is broken as Figure 6b shown. Therefore, in our proposed scheme, every peer multicasts periodically Probe Messages to maintain indirectly P2P overlay and monitor the neighbors’ movements. When the rear peer (peer R) finds out the disappearance of its front peer (peer L), it floods Finding Message, which includes the peer L’s ID, to all peers in the ad hoc network. Peer F receives Finding Message and knows that the peer

L is its rear peer, and then Peer F exchanges with peer R for Connect Message to establish a new delivery path.

Because every peer only knows its front peer and rear peer, it cannot gain the neighboring information like global position system (GPS). Therefore, a peer indicates its neighbor moving via the reactive leaving. As Figure 7a shown, after peer M starts to move, neither peer C nor peer D probes to peer M gradually. Peer C and peer D think that peer M should leave or move, peer D disconnects from peer M and then connects to peer C as Figure 6b. Thus peer M becomes an orphan and then finds a linkage peer as Figure 3. As Figure 7b shown, peer M finds peer A as a linkage peer and joins into the overlay.

In summary, RING adopts a ring overlay to manage peers simply, overcome multi-source difficulty, deliver voice in order, and minimize signaling overhead. The ring overlay is integrated with a cross-layer scheme to allocate peer arrival, detect peer movement, and recover peer departure, with efficiency, scalability, mobility, and proximity.

Analysis

Packet delivery ratio

Suppose the probability of failed forwarding is f in every peer, and there are n peers in the routing path N. The probability of successful delivery in N is P(N).

P(N) = (1 – f)n (1)

And the probability of unsuccessful delivery is 1 – (1 – f)n.

There may be two routing paths on the same overlay. Suppose there are m peers in another routing path M. If N is disjoint to M, i.e.

MAC layerTransport

layerApplication

Session layer

RTP / UDPRing overlay MANET

MAC layerTransportlayer

Application

Session layer

RTP / UDPRing overlay MANET

New peer Linkage peer

WiFi SNRApplication trigger

WiFi awareness WiFi awareness

Multicast Probe Messagefor RTT estimation

Probe Ack Message for RTTEstimation and alive check

Broadcast Request Message

Unicast Link MessageLink Ack Message for candidates

Unicast Decide Message

Voice streaming

Response Message for P2P awareness

1

2

QoS

Figure 5: Cross-layer message flow of new peer arrival.

Peer F Peer L Peer R

Left Message

Connect Message

Voice streaming

Peer F Peer L Peer R

Left Message

Voice streaming

XProbe and Ack Message

Probe but no Ack Message

Finding Message

Connect MessagePeer F = the front peer of the leaving peerPeer L = the leaving peerPeer R = the rear peer of the leaving peer

(a) Graceful departure (b) Reactive departure

Figure 6: Message flow of peer departure.

A B

CDM

A B

CD

M

Moving peer

(a) Moving as reactive leaving (b) Renew joining Figure 7: Diagram of peer moving.

7We implement RING on WiFi ad hoc network due to its popularity in wireless LAN.

8Left Message toward the front peer tells the front peer about the rear peer’s ID. And Left Message toward the rear peer tells the rear peer about the front peer’s ID.

Citation: Kuo JL, Shih CH, Wang MC, Chen YC (2013) RING: A Cross-Layer Design for Voice Communicating on P2P-MANET. J Comput Eng Inf Technol 2:2.

• Page 5 of 8 •

doi:http://dx.doi.org/10.4172/2324-9307.1000106

Volume 2 • Issue 2 • 1000106

N ∩ M = Φ, then the probability of unsuccessful delivery in M is 1 – (1 – f)m. Hence, the probability of successful delivery on such overlay is P1(N, M).

P1(N, M) = 1 – [1 – (1 – f)n] [1 – (1 – f)m] (2)

If N is not disjoint to M, i.e. there are k intermediate peers shared with them, then the probability of unsuccessful delivery on the overlay is [1 – (1 – f)n – k] [1 – (1 – f)m – k] + 1 – (1 – f)k. Hence, the probability of successful delivery on such overlay is P2(N, M).

P2(N, M) = 1 – [1 – (1 – f)n – k] [1 – (1 – f)m – k] – [1 – (1 – f)k]

= [1 – (1 – f)n – k] [1 – (1 – f)m – k] + (1 – f)k (3)

Of course, there may be multiple routing paths on the same overlay. The probability formula can be extended from Equation 3. However, our proposed RING has the unique ring overlay, so every source shares the unique routing path with different source and destination. The probability of successful delivery between arbitrary two sources can be expressed as Equation 4.

P2(N, M) = [1 – (1 – f)n – k] [1 – (1 – f)m – k] + (1 – f)k, N = M in RING

= [1 – (1 – f)n – k]2 + (1 – f)k, k = n – 2 for different source and destination

P2(N, N) = [1 – (1 – f)2]2 + (1 – f) n – 2, n ≥ 4 (4)

Therefore, the probability of successful delivery can be simplified as Equation 5 when n’ is the number of sources.

PS(n) = [1 – (1 – f)2]n’ + (1 – f) n – 2, n ≥ n’ (5)

Packet duplications

Suppose a probability that the ith peer creates a voice packet in a given time t is p. The event bi represents the process among n peers, and a sequence b1, b2, b3, … can be defined via Bernoulli formal:

P(bi = 1) = P(ith peer speaks) = p

P(bi = 0) = P(ith peer calms) = 1 – p (6)

At some time t, the probability that z peers create voice packets simultaneously is PZ.

PZ(z) = Czn pz (1 – p)n – z (7)

Therefore, the probability that a peer creates h packets in d time slots is PH is similar with Equation 2 theoretically.

PH(h) = Chd ph (1 – p)d – h (8)

For one peer, tj can be defined that jth packet is created in an inter-arrival time. Then the probability that a peer creates h packets in a given time t is PT.

PT(t) = P(bi is true AND h – 1 packets are created in the first t – 1), for each i

= P(bi = 1) · PH(h – 1), while based on t – 1 for t ≥ h

= p · Ch – 1t – 1 ph – 1 (1 – p)t – h

= Ch – 1t – 1 ph (1 – p)t – h (9)

And the expected time of h packets is EH (h).

EH(h) = E(t1) + E(t2) + … + E(th), E is expected function

= 1/p + 1/p + … + 1/p = h/p (10)

The Bernoulli formal can be applied to an analog of Poisson process in a continuous time. We can define that the rate of packet created is λ in a given time t. The probability that z peers create voice packets in t is PN(z, t).

PN(z, t) = e–λt (λt)z / z!, while λt = h = EH(h) × p (11)

Therefore, the expected value of duplicated packets is simplified as EN.

EN(n) = Σz PN(z, t) × z × n (12)

The fixed λ, t, n can derive the EN(n) for the low bound of packet duplications in the proposed ring-based forwarding scheme.

Simulation ResultsWe use OMNet++ [16] to simulate. In random waypoint model,

we define every wireless node with parameters (x, y, π, v, s) in a simulation environment (1000 × 1000 square meters area) as Figure 8 shown. The parameters (x, y) represent the coordinate of a node in

(x, y, π, v, s)

a

b

c

1 km

1 km

Figure 8: The simulation environment.

100000

1000000

10000000

100000000

0 4 8 12 16 20 24 28 32 36 40The number of peers (n)T

he

amount

of

voic

e co

pie

s

ACTCLAPSRINGIdeal EN(n)

Figure 9: The amount of voice copies increases with the number of peers.

Parameter Type Range Default Descriptionx natural number 0 ~ 1000 m random x-axisy natural number 0 ~ 1000 m random y-axisπ decimal 0 ~ 360o random moving anglev natural number 0 ~ 128 km/hr 0 moving speeds binary number true of false false turn on or notn natural number 4 ~ 40 32 number of peersf real number 0 ~ 1 0.02 failed probability

Table 1: The parameters of simulation.

Citation: Kuo JL, Shih CH, Wang MC, Chen YC (2013) RING: A Cross-Layer Design for Voice Communicating on P2P-MANET. J Comput Eng Inf Technol 2:2.

• Page 6 of 8 •

doi:http://dx.doi.org/10.4172/2324-9307.1000106

Volume 2 • Issue 2 • 1000106

the simulation square. π represents the moving angle of each node. If a node crosses the simulated boundary, π becomes a reflective angle as node b to ensure that every node moves in the simulation square. v represents the moving speed of each node. When v = 0, it means the node is static as node c. If s = true, the node is a member of P2P overlay as node a; otherwise, the node is just a member of MANET topology as node c. We list the parameters in Table 1.

RING can be implemented on either reactive routing protocol or proactive routing protocol. In the paper, RING is implemented on OLSR to compare with ACT and CLAPS, which both are implemented on OLSR, too. We use INETMANET [17] module based on OMNet++ to simulate OLSR. We also use WiFi ad hoc mode and CTS/ RTS mechanism to simulate MAC behaviors. Because three compared methods use the same ad hoc routing protocol and MAC protocol, the simulated performance is influenced by the P2P overlay and cross-layer scheme.

Scalability

Scalability is an essential characteristic of both P2P network and MANET. We sum up the amount of copies of voice data which are transmitted through the ad hoc network as Figure 9 illustrated. We can find out that RING, ACT, and CLAPS all have the similar performance, thus P2P solution can be demonstrated in an efficient delivery with scalability. Especially, RING has the performance approximated to an ideal EN(n) as Equation 12, because every peer only copies once for its rear peer and every intermediate node only copies once for the destination.

The packet delivery ratio is defined as the ratio of voice packets received by the destination to those generated by the source. Assume the probability of failed forwarding (f) is 0.02, the worst packet delivery ratio as Equation 5 can be derived with scalability. As Figure 10 illustrated, RING has the highest packet delivery ratio among all compared models. The delivery path is directive in order uniquely, hence RING is suitable for the wireless half-duplex connections. However, the large network leads to the long routing path, which leads to low packet delivery ratio. ACT and CLAPS have the low packet delivery ratio, because the collision happens in the overlap of spanning trees when many peers simultaneously speak. Especially CLAPS overlay tends to share the overlapping routing path, thus its packet delivery ratio degrades seriously with scalability.

We define the signaling overhead as the number of non-data packets sent per peer per second for maintaining overlay. As Figure

11 illustrated, RING have a minimum signaling overhead, because a peer only keeps its front peer and rear peer via periodical probing. A peer has more signaling overhead when the overlay is larger in ACT and CLAPS, because the spanning tree grows with the scalability.

We observe the in-order packets received by receiver as Figure 12 illustrated, in which x-axis represents the simulated time and y-axis represents the timestamp or sequence number. The sequential receipt is important for voice service, and RING always keeps packet in order, because the ring overlay inherits the advantage of

40

50

60

70

80

90

100

0 4 8 12 16 20 24 28 32 36 40The number of peers (n)

The

pac

ket

del

iver

y r

atio

(%

)

ACTCLAPSRINGWorst PS(n)

Figure 10: The packet delivery ratio decreases with the number of peers.

0

1

2

3

4

5

0 4 8 12 16 20 24 28 32 36 40The number of peers (n)

Sign

alin

g ov

erhe

ad (p

acke

ts/

seco

nd)

ACT

CLAPS

RING

Figure 11: The signaling overhead relates to the number of peers.

0

50

100

150

200

250

300

1 3 5 7 9 11 13 15 17 19 21

Delivery time (second)

Pack

et s

eque

nce

num

ber

ACT

CLAPS

RING

Figure 12: The packet loss at v = 0 m/s.

40

50

60

70

80

90

100

0 2 4 8 16 32 64 128The moving speed (m/s)

The

pac

ket d

eliv

ery

ratio

(%

)

ACT

CLAPS

RING

Figure 13: The packet delivery ratio decreases with the moving speed.

Citation: Kuo JL, Shih CH, Wang MC, Chen YC (2013) RING: A Cross-Layer Design for Voice Communicating on P2P-MANET. J Comput Eng Inf Technol 2:2.

• Page 7 of 8 •

doi:http://dx.doi.org/10.4172/2324-9307.1000106

Volume 2 • Issue 2 • 1000106

first-in-first-out delivery in essence. However, RING uses a unique overlay, in which front peer always forwards packets to rear peer, so a forwarding failure leads to a continuous loss. Although CLAPS also has continuous loss which happens due to a collision in the overlap of spanning trees. Both ACT and CLAPS have some out-of-order packets accompanied loss, because packets are delivered individually through their spanning trees, which do not guarantee the sequential delivery from multiple sources.

Mobility

Mobility is an essential characteristic for group conferencing on MANET. We set 32 peers, randomize π and increase v to simulate the peer moving. The simulation result is curved in Figure 13, and we can discover that RING has the highest packet delivery ratio among the compared models. The cross-layer scheme detects peer movement and modifies a ring overlay to avoid the far routing path. The cross-layer scheme always performs time sensitivity of neighborhood to keep proximity. Every peer keeps only two neighbors, so the overlay recovery spends minimum time and overhead. The integration of cross-layer scheme and ring overlay in RING achieves the low signaling overhead as Figure 14 illustrated. However, every peer must maintain its spanning tree in ACT or CLAPS, thus the signaling overhead is high with mobility. Also the multiple sources with high mobility degrade the packet delivery ratio, because their spanning trees are difficult to maintain.

As Figure 15 and Figure 16 illustrated, in RING, even if the ring overlay changes, the moving peer always influences only two neighbors (its front peer and its rear peer). Therefore, the low speed does not cause the high packet loss. However, the high speed changes the overlay drastically, which leads to the continuous and frequent packet loss. Although packet delivery ratio is degraded with moving speed, RING still keeps the sequential receipt. Because the ring overlay inherits the unidirectional stream, the voice arrives in order even if multiple peers speak simultaneously.

A peer movement may break a routing path. From the observation of packet loss, RING is demonstrated for a short service interruption time. However, ACT and CLAPS have the large packet loss and out-of-order receipt, because their overlays is difficult to maintain. The recovery of spanning tree usually influences multiple peers when single peer moves, so the service interruption time is long due to high scalability and mobility.

ConclusionIn this paper, we design an application for voice communication

over mobile ad hoc network. And we present a cross-layer scheme to integrate the ring overlay and mesh-based topology. The implement shows that our proposed scheme, RING (Real-time Intercommunication Network Gossip), is simple to work and suitable for small-scale conference. The simulation results show that RING has the high packet delivery ratio and the low signaling overhead, that demonstrates RING is suitable for the real-time voice delivery. The logical overlay of RING can be proximal to the physical topology based on cross-layer design. Hence, the combination of algorithms of peer arrival, movement, and departure can provides a stable routing path in dynamic ad hoc network. From simulation results, packets always arrive in order in RING, which is suitable for the wireless half-duplex connections to alleviate the multi-source problem. In the future, we consider a double-ring overlay and an admission control to save energy and shorten packet delay.

References

1. Ding G, Bhargava B (2004) Peer-to-peer file-sharing over mobile ad hoc networks. IEEE Annual Conference on Pervasive Computing and Communications Workshops.

2. Stoica I, Morris R, Karger D, Kaashoek MF, Balakrishnan H (2001) Chord: A scalable peer-to-peer lookup service for Internet applications. ACM Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications.

0

4

8

12

16

20

0 2 4 8 16 32 64 128The moving speed (m/s)

Sig

nal

ing o

ver

hea

d (p

acke

ts/

seco

nd)

ACT

CLAPS

RING

Figure 14: The signaling overhead increases with the moving speed.

0

50

100

150

200

250

300

1 3 5 7 9 11 13 15 17 19 21

Delivery time (second)

Pack

et s

eque

nce

num

ber

ACT

CLAPS

RING

Figure 15: The packet loss at v = 8 m/s.

0

50

100

150

200

250

300

1 3 5 7 9 11 13 15 17 19 21

Delivery time (second)

Pac

ket

seq

uen

ce n

um

ber

ACT

CLAPS

RING

Figure 16: The packet loss at v = 128 m/s.

Citation: Kuo JL, Shih CH, Wang MC, Chen YC (2013) RING: A Cross-Layer Design for Voice Communicating on P2P-MANET. J Comput Eng Inf Technol 2:2.

• Page 8 of 8 •

doi:http://dx.doi.org/10.4172/2324-9307.1000106

Volume 2 • Issue 2 • 1000106

3. Sbai MK, Salhi E, Barakat C (2009) A membership management protocol for mobile P2P networks. International Conference on Mobile Technology, Application & Systems.

4. Setton E, Yoo T, Zhu X, Goldsmith A, Girod B (2005) Cross-layer design of ad hoc networks for real-time video streaming. IEEE Wireless Communications.

5. Zahn T, Schiller J (2005) MADPastry: A DHT substrate for practicably sized MANETs. Workshop on Applications and Services in Wireless Networks.

6. Li M, Chen E, Sheu P (2006) A chord-based novel mobile peer-to-peer file sharing protocol. Frontiers of WWW Research and Development.

7. Hwang R, Hoh C (2009) Cross-layer design of P2P file sharing over mobile ad hoc networks. Telecommunication Systems.

8. Jacquet P, Muhlethaler P, Clausen T, Laouiti A, Qayyum A, et al. (2001) Optimized link state routing protocol for ad hoc networks. IEEE International Multi Topic Conference.

9. Johnson DB, Maltz DA, Broch J (2001) DSR: the dynamic source routing protocol for multi-hop wireless ad hoc networks. Ad Hoc Networking.

10. Caesar M, Castro M, Nightingale EB, O’Shea G, Rowstron A (2006) Virtual Ring Routing: Network Routing Inspired by DHTs. ACM Conference on

Applications, Technologies, Architectures, and Protocols for Computer Communications.

11. Wang W, Soong B, Chan Y (2009) Design and Implementation of Audio Conferencing Testbed based on Wi-Fi MANET. IEEE Wireless Communications and Networking Conference.

12. Niraula NB, Kanchanasut K, Laouiti A (2009) Peer-to-Peer Live Video Streaming over Mobile Ad Hoc Network. International Conference on Wireless Communications and Mobile Computing: Connecting the World Wirelessly.

13. Shah N, Qian D (2010) Cross-Layer Design to Merge Structured P2P Networks over MANET. IEEE International Conference on Parallel and Distributed Systems.

14. Canali C, Renda ME, Santi P, Burresi S (2010) Enabling Efficient Peer-to-Peer Resource Sharing in Wireless Mesh Networks. IEEE Transaction on Mobile Computing.

15. Conti M, Giordano S (2007) Multihop ad hoc networking: The reality. IEEE Communications Magazine.

16. OMNET++ 4.0.

17. INETMANET Framework.

Submit your next manuscript and get advantages of SciTechnol submissions

� 50 Journals � 21 Day rapid review process � 1000 Editorial team � 2 Million readers � More than 5000 � Publication immediately after acceptance � Quality and quick editorial, review processing

Submit your next manuscript at ● www.scitechnol.com/submission

Author Affiliations Top

1Computer Science, National Chiao Tung University, HsinChu, Taiwan


Recommended