716 ieee transactions on mobile computing,...

18
Interference-Aware Routing in Wireless Multihop Networks Georgios Parissidis, Student Member, IEEE, Merkourios Karaliopoulos, Member, IEEE, Thrasyvoulos Spyropoulos, Member, IEEE, and Bernhard Plattner, Fellow, IEEE Abstract—Interference is an inherent characteristic of wireless (multihop) communications. Adding interference-awareness to important control functions, e.g., routing, could significantly enhance the overall network performance. Despite some initial efforts, it is not yet clearly understood how to best capture the effects of interference in routing protocol design. Most existing proposals aim at inferring its effect by actively probing the link. However, active probe measurements impose an overhead and may often misrepresent the link quality due to their interaction with other networking functions. Therefore, in this paper we follow a different approach and: 1) propose a simple yet accurate analytical model for the effect of interference on data reception probability, based only on passive measurements and information locally available at the node; 2) use this model to design an efficient interference-aware routing protocol that performs as well as probing-based protocols, yet avoids all pitfalls related to active probe measurements. To validate our proposal, we have performed experiments in a real testbed, setup in our indoor office environment. We show that the analytical predictions of our interference model exhibit good match with both experimental results as well as more complicated analytical models proposed in related literature. Furthermore, we demonstrate that a simple probeless routing protocol based on our model performs at least as good as well-known probe-based routing protocols in a large set of experiments including both intraflow and interflow interference. Index Terms—Wireless networks, interference model, interference-aware routing, routing metric. Ç 1 INTRODUCTION T HE standardization of Wireless Local Area Networks (WLANs) [1] opened the way to wireless network access provision without the need for wired infrastructure. The IEEE 802.11 ad hoc mode, in particular, enabled the intercommunication of mobile, battery-powered devices and opened the way to a revolutionary method of communication that departs from the well-established infrastructure-based network access paradigm. In this new paradigm, messages are routed (relayed) over multiple wireless (mesh) hops to reach their destination. Yet, within this paradigm, interference becomes a major impact factor on the network efficiency and performance. Due to the broadcast nature of the medium and the complex- ity of wireless propagation phenomena, it is inherently difficult to spatially partition the wireless medium into clearly disjoint links as in the case of wired networks. This combined with the random access mechanism (implemented by a carrier sense function) of the 802.11 MAC protocol gives rise to nodes that do transmit while they shouldn’t (hidden nodes), but also nodes that do not transmit while they could (exposed nodes). Both phenomena result in significant reduction of the information delivery capacity of the network. Adding interference-awareness to routing decisions can therefore enhance significantly the network performance. Jain et al. in [2] show that under ideal interference-aware routing, the data delivery capability of the network can be significantly improved with respect to shortest-path rout- ing, even under nonoptimal MAC scheduling. There have been efforts to capture the effect of interference in the design of routing metrics (see, e.g., [3], [4], [5]) that can serve as alternatives to minimum hop count; nevertheless, their common feature is that they are based on actively measuring (“probing”) the link. Such measurement-based approaches have three major disadvantages. First, the active measurements impose additional data overhead on the network. Second, part of the node radio resources is spent on probe transmissions, which may be a concern for energy- constrained nodes. Third, the achievable accuracy and reliability of the measurements can sometimes be low, either because the estimation of small or moderate error rates would need a large number of sample measurements or due to the various interactions between the active measurement packets and other packets in the network. These considerations motivate a different approach, which is to pose and try to answer the following questions: how well can we estimate interference and predict the success probability of transmitting a message over a link without resorting to measurements and probing, but rather by exploiting only information that is locally available to the node? Can an interference-aware routing metric based on a simple analytical model achieve similar performance to probing-based schemes? To this end, we first develop an analytical model to estimate the probability that a transmission destined to a node is successful in the presence of interference. Starting from the simple physical (Signal-to-Interference and Noise- Ratio (SINR)) model [6], we introduce the concepts of interference zones that aim at quantifying the effect of 716 IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 10, NO. 5, MAY 2011 . The authors are with the Computer Engineering and Networks Laboratory, Swiss Federal Institute of Technology in Zurich (ETHZ), Gloriastrasse 35, 8092 Zu ¨rich, Switzerland. E-mail: {parissid, karaliopoulos, spyropoulos, plattner}@tik.ee.ethz.ch. Manuscript received 27 Aug. 2008; revised 13 Aug. 2009; accepted 1 July 2010; published online 19 Oct. 2010. For information on obtaining reprints of this article, please send e-mail to: [email protected], and reference IEEECS Log Number TMC-2008-08-0344. Digital Object Identifier no. 10.1109/TMC.2010.205. 1536-1233/11/$26.00 ß 2011 IEEE Published by the IEEE CS, CASS, ComSoc, IES, & SPS

Upload: duonghanh

Post on 04-Jun-2018

213 views

Category:

Documents


0 download

TRANSCRIPT

Interference-Aware Routingin Wireless Multihop Networks

Georgios Parissidis, Student Member, IEEE, Merkourios Karaliopoulos, Member, IEEE,

Thrasyvoulos Spyropoulos, Member, IEEE, and Bernhard Plattner, Fellow, IEEE

Abstract—Interference is an inherent characteristic of wireless (multihop) communications. Adding interference-awareness to

important control functions, e.g., routing, could significantly enhance the overall network performance. Despite some initial efforts, it is

not yet clearly understood how to best capture the effects of interference in routing protocol design. Most existing proposals aim at

inferring its effect by actively probing the link. However, active probe measurements impose an overhead and may often misrepresent

the link quality due to their interaction with other networking functions. Therefore, in this paper we follow a different approach and:

1) propose a simple yet accurate analytical model for the effect of interference on data reception probability, based only on passive

measurements and information locally available at the node; 2) use this model to design an efficient interference-aware routing

protocol that performs as well as probing-based protocols, yet avoids all pitfalls related to active probe measurements. To validate

our proposal, we have performed experiments in a real testbed, setup in our indoor office environment. We show that the analytical

predictions of our interference model exhibit good match with both experimental results as well as more complicated analytical models

proposed in related literature. Furthermore, we demonstrate that a simple probeless routing protocol based on our model performs at

least as good as well-known probe-based routing protocols in a large set of experiments including both intraflow and interflow

interference.

Index Terms—Wireless networks, interference model, interference-aware routing, routing metric.

Ç

1 INTRODUCTION

THE standardization of Wireless Local Area Networks(WLANs) [1] opened the way to wireless network

access provision without the need for wired infrastructure.The IEEE 802.11 ad hoc mode, in particular, enabled theintercommunication of mobile, battery-powered devicesand opened the way to a revolutionary method ofcommunication that departs from the well-establishedinfrastructure-based network access paradigm. In this newparadigm, messages are routed (relayed) over multiplewireless (mesh) hops to reach their destination.

Yet, within this paradigm, interference becomes a majorimpact factor on the network efficiency and performance.Due to the broadcast nature of the medium and the complex-ity of wireless propagation phenomena, it is inherentlydifficult to spatially partition the wireless medium intoclearly disjoint links as in the case of wired networks. Thiscombined with the random access mechanism (implementedby a carrier sense function) of the 802.11 MAC protocol givesrise to nodes that do transmit while they shouldn’t (hiddennodes), but also nodes that do not transmit while they could(exposed nodes). Both phenomena result in significantreduction of the information delivery capacity of the network.

Adding interference-awareness to routing decisions cantherefore enhance significantly the network performance.

Jain et al. in [2] show that under ideal interference-awarerouting, the data delivery capability of the network can besignificantly improved with respect to shortest-path rout-ing, even under nonoptimal MAC scheduling. There havebeen efforts to capture the effect of interference in thedesign of routing metrics (see, e.g., [3], [4], [5]) that canserve as alternatives to minimum hop count; nevertheless,their common feature is that they are based on activelymeasuring (“probing”) the link. Such measurement-basedapproaches have three major disadvantages. First, the activemeasurements impose additional data overhead on thenetwork. Second, part of the node radio resources is spenton probe transmissions, which may be a concern for energy-constrained nodes. Third, the achievable accuracy andreliability of the measurements can sometimes be low,either because the estimation of small or moderate errorrates would need a large number of sample measurementsor due to the various interactions between the activemeasurement packets and other packets in the network.

These considerations motivate a different approach,which is to pose and try to answer the following questions:how well can we estimate interference and predict thesuccess probability of transmitting a message over a linkwithout resorting to measurements and probing, but ratherby exploiting only information that is locally available to thenode? Can an interference-aware routing metric based on asimple analytical model achieve similar performance toprobing-based schemes?

To this end, we first develop an analytical model toestimate the probability that a transmission destined to anode is successful in the presence of interference. Startingfrom the simple physical (Signal-to-Interference and Noise-Ratio (SINR)) model [6], we introduce the concepts ofinterference zones that aim at quantifying the effect of

716 IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 10, NO. 5, MAY 2011

. The authors are with the Computer Engineering and Networks Laboratory,Swiss Federal Institute of Technology in Zurich (ETHZ), Gloriastrasse 35,8092 Zurich, Switzerland.E-mail: {parissid, karaliopoulos, spyropoulos, plattner}@tik.ee.ethz.ch.

Manuscript received 27 Aug. 2008; revised 13 Aug. 2009; accepted 1 July2010; published online 19 Oct. 2010.For information on obtaining reprints of this article, please send e-mail to:[email protected], and reference IEEECS Log Number TMC-2008-08-0344.Digital Object Identifier no. 10.1109/TMC.2010.205.

1536-1233/11/$26.00 � 2011 IEEE Published by the IEEE CS, CASS, ComSoc, IES, & SPS

cumulative interference by concurrently transmittingnodes, such as hidden nodes and nodes outside the sensingrange. Furthermore, to also capture the carrier sensefunction common to many real MAC protocols, we includein our model a very simple and generic MAC model, whichensures that nodes within range of the transmitting sourcedefer from transmitting. Accounting for both these effects,we derive an analytical expression for the probability ofsuccessful reception in the presence of interference, as afunction of the node degree, node transmission probability,radio propagation environment, and network card recep-tion sensitivity. Compared to probe-based approaches, theadvantage of this derivation is that all model inputs can beavailable (or estimated) locally to the node; for example,information regarding a node’s degree can be extractedfrom the routing layer at no additional cost in terms ofcommunication overhead. Finally, compared to other, morecomplex analytical models of wireless interference [7], [8],our model does not require prior measurements and canscale up to large number of nodes.

It is important to note here that our analytical modeldoes not aim to capture the exact working details of arealistic 802.11 protocol (e.g., Distributed CoordinationFunction of 802.11 [1]), and unavoidably makes someassumptions with respect to real propagation phenomena,in order to ensure it remains simple enough to be utilized as ahandy interference-aware routing metric. This is the real goal ofthis work. Nevertheless, to evaluate the effect of ourassumptions in a real world setting, we validate our modelagainst experiments in a real testbed, setup for this purposein our indoor office environment. Despite the generic natureof the model, the experimental results from our IEEE 802.11testbed show good match with the analytical predictionsand advocate the model’s utility. What is more, we find thatour model predictions also follow closely those of moreelaborate well-known analytical models [8].

Having confirmed the utility of our model, we nextdefine an interference-aware routing metric that explicitlytakes interference into account via our derivation. Thismetric is generic and could be used by various routingprotocols to estimate link and path “weights.” Similar tothe Expected Transmission count (ETX) metric [9], ourmetric estimates the number of transmissions (includingretransmissions) required to send a packet over a link.However, the important difference between the two is that,unlike ETX which measures link quality directly (actively)using small probe packets, our metric tries to predict thelink quality based on information locally available at anode (passively).

Naturally, we are interested in whether and how muchthis lack of direct link measurements deteriorates therouting performance. To evaluate this, we use our testbedto perform two sets of experiments featuring intraflow andinterflow interference and variable settings for transmissionrate and transmit power. In all experiments, our metric iscompared against the minimum hop count and the ETXmetrics, the latter being the first of a whole family of probe-based metrics. In the first set, with one node-pair (dataflow) active at a time, our metric finds more high-throughput paths than ETX and minimum hop count do.

Varying the transmission rate and the transmit power doesnot change the relative performance of the metrics althoughthe absolute throughput values change, as expected. In thesecond set of experiments, we evaluate the three metricswith multiple active node-pairs (flows) simultaneously. Weobserve that our interference-aware routing metric per-forms at least as good as ETX and better than minimum hopcount despite the lack of probing.

Summarizing, the contributions of this paper are thefollowing: 1) we introduce a simple analytical model for theprobability of successful reception that can be calculatedusing information already available at the node and use realtestbed experiments to show that our model’s predictionsare sufficiently accurate; 2) we then propose an inter-ference-aware routing metric based on our derivation thatrequires no probing to estimate link and path quality, and isshown to perform at least as good as well-known probing-based routing metrics. Our contribution is also methodolo-gical. We demonstrate how a simple model for the radiointerference can yield good results when used for the designof a higher layer network function, such as interference-aware routing. We definitely do not contest the value ofmore complicated models in general; we do howeverprovide an example where a simple model fares as wellas more complicated models.

The paper is organized as follows: In Section 2, wepresent our analytical derivation for the probability ofsuccessful reception over a link in the presence ofinterference. Numerical results showing the model sensi-tivity to its parameters and their independencies arediscussed in Section 3. In Section 4, we define ourinterference-aware routing metric, and in Section 5, wepresent our indoor testbed. The model validation againsttestbed experiments is carried out in Section 6. In the samesection, we compare our model predictions with thosemade by other models. The performance evaluation of ourinterference-aware routing metric is presented in Section 7and we summarize related work in Section 8. We concludethe paper in Section 9, where we discuss how our workcould be applied to multirate networks and support routingmetrics that, besides expected transmission counts, alsotake into account the time devoted to these transmissions.

2 ANALYTICAL INTERFERENCE MODELING

Our analytical model formulation proceeds as follows: First,we derive the link delivery probability Pxi;xj that a transmis-sion from node xi is successfully received at node xj in thepresence of cumulative interference without taking a parti-cular MAC model into account; for example, nodes do notsense the medium before transmitting, as the case is withCSMA. Then, we include a simple enhancement into ourmodel that aims at capturing the effect of carrier sense andcalculate P ðxjÞ for the complete model. Finally, we expressthis probability as a function of node degree when networknodes are uniformly distributed in space.

2.1 Physical Model and Assumptions

In our analysis, the network comprises a set of nodes X ¼fx1; . . . ; xng located in the euclidean plane. Node transmis-sions may interfere each other and the outcome of an

PARISSIDIS ET AL.: INTERFERENCE-AWARE ROUTING IN WIRELESS MULTIHOP NETWORKS 717

individual transmission is determined by the SINR model(for example, see [6]). Under the SINR model, the transmis-sion success depends on the received signal strength (RSS),the interference caused by simultaneously transmittingnodes, and the environmental thermal noise level. Let Pw;ibe the transmit power of node i and T be the set of nodestransmitting at that instant (T � X). A transmission fromnode xi; i 2 T is successfully received by node xj if

Pw;ijxi�xjj�

N þP

k2T;k6¼iPw;kjxk�xjj�

� �: ð1Þ

In (1), jxi � xjj denotes the euclidean distance betweennodes xi and xj;N is the ambient noise power level, and � isthe path loss exponent, which depends on the environmentand typically ranges from 2 to 5. The SINR model impliesthat a minimum signal-to-interference ratio of � is necessaryfor successful reception. The actual value of � primarilyrelates to the specific physical layer design, such as thedeployed modulation, interleaving, and coding schemes, aswell as the receiver hardware.

For the sake of analytical tractability, we make thefollowing set of assumptions:

A1. All nodes have similar receiver chain characteristics:omnidirectional antenna, the same transmit powerand noise floor, and similar physical layer perfor-mance, i.e., Pw;i ¼ Pw;j ¼ Pw and �i ¼ �j ¼ � 8i 6¼ j.This is called the uniform node assumption. Underthis assumption, the node reception range rmax, i.e.,the maximum possible distance between two nodesallowing them to receive each other correctly in theabsence of other node transmissions, is given from

rmax ¼ffiffiffiffiffiffiffiffiffiffiffiPwN � �

s: ð2Þ

A2. Nodes transmit with equal probability � (uniformload assumption). Note that the probability � reflectsthe transmission attempt rate, i.e., the rate at whichnodes actually transmit data over the sharedmedium after the traffic shaping at MAC layer,rather than the incoming traffic load at the MAClayer from higher layers. In general, the parameter �and the number of nodes competing for the mediumare coupled with each other instead of varyingindependently. Their exact coupling relationshipdiffers according to the details of the specific MACprotocol. In the IEEE 802.11x suite of protocols, forexample, it is well known that the actual allowedvalues of the transmission probability � depend onmany parameters, such as the number of contendingnodes, back-off algorithm, and bandwidth of thewireless medium (see [10], [11] for the protocoloperation under saturation and [12], [13] undernonsaturated conditions1).

In Table 1 we summarize our notation.

2.2 Interference (“MAC-Agnostic”) Model

We pick an arbitrary sender-receiver pair and evaluate theeffect of cumulative interference from other nodes on datareception. This simple model, sometimes referred to asphysical model [6], has often been used in studies of networkthroughput for ad hoc networks. In our derivation, we drawon it to introduce the concepts of interference zone andinterference area.

Definition 1. An interference zone Aij;m with respect to areceiver node xj is the area, where up to m� 1 nodes cantransmit simultaneously, for all possible combinations of nodelocations therein, without resulting in unsuccessful reception atnode xj, in the absence of other transmissions in the network.

Definition 2. An interference area Cij;m with respect to areceiver node xj is the area beyond which a minimum of mþ 1simultaneous transmissions is required to result in unsuccessfulreception at node xj, for all possible transmitting node locations,in the absence of other transmissions in the network.

Lemma 1. Assume that a node xi transmits to another node xjand their distance jxi � xjj equals r. Then, a third node xk liesin the interference zone Aij;m of node xj;m 2 f1; 2; 3 . . .g, ifits distance to the node xj; jxk � xjj, satisfiesffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiðm� 1Þ��

p� r < jxk � xjj �

ffiffiffiffiffiffiffiffim��

p� r;m 2 f1; 2; 3 . . .g: ð3Þ

Proof. From (1) and assumption A.1, the simultaneoustransmission of m nodes will not result in unsuccessfulreception due to interference at node xj, as long as

Pwr�

N þPm

k¼1;k6¼iPw

jxk�xjj�� �;

which results in

Pwr��

Xmk¼1;k 6¼i

Pwjxk � xjj�

!�:

The sum on the right-hand side is maximized when thedistance jxk � xjj; 8xk 2 Aij;m is minimized. Requiring that

Pwr��

Xmk¼1;k6¼i

Pwjxk � xjj�min

!�;

718 IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 10, NO. 5, MAY 2011

TABLE 1A Summary of Key Notation

1. In literature related to 802.11 DCF modeling, the transmission attemptrate is denoted either with � (e.g., [11]) or with � (e.g., [10], [12]).

we get

Pwr�

>m � Pw

jxk � xjj�min�:

Therefore,

jxk � xjjmin �ffiffiffiffiffiffiffiffim��

p� r � rij;m:

In other words, the simultaneous transmission ofm nodes does not result in unsuccessful reception due tointerference at node xj when all m nodes lie at distancegreater than

ffiffiffiffiffiffiffiffim��p

� r; or, equivalently, at least mþ 1 nodetransmissions are required to prevent successful datareception if all transmitting nodes lie outside the circlecentered on node xj with radius rij;m, which coincideswith interference area Cij;m. On the other hand, theinterference zone Aij;m is delimited by the intersection ofinterference area Cij;m with the complement of inter-ference area Cj;m�1; Cij;m

TCj;m�1, namely, interference

zoneAij;m is a circular ring bounded by the circumferenceof two concentric circles with radii rij;mrij;m�1, as shownin Fig. 1. For example, a node xk is located in theinterference zone Aij;2 if its euclidean distance to node xjis

ffiffiffi��p� r < jxk � xjj �

ffiffiffiffiffiffi2��p

� r. tu

The definition of interference zones then allows toapproximate the probability Pxi;xj that a transmission of xidestined to node xj is successful despite interference fromother nodes in the network as a function of the spatialnode distribution.

Let � be the probability that a node is transmitting and

M be the number of interference zones Aij;mm 2 f1; 2; 3 . . .gthat are taken into account in the computation of Pxi;xj (M

depends on the spatial node distribution; we discuss how

to select proper values of M when nodes are uniformly

distributed in space in Section 2.4.1). Then, Pxi;xj depends

on the number of nodes nðAij;mÞ and their exact position in

interference zone Aij;m. In the general case, the nodes maylie anywhere within the interference zones, encumbering aprecise derivation of Pxi;xj ; nevertheless, it is straightfor-ward to derive an upper and a lower bound for theresulting Pxi;xj by considering two extreme cases regardingthe node positions.

In the first (worst) case, all nðAij;mÞ nodes within themth interference zone are assumed to lie at the inner zoneborder at distance rj;m�1 from the receiving node xj. In thatcase, successful reception results as long as the numberof transmitting nodes within each one area Cij;mm 2f1; 2; 3 . . .g does not exceed m� 1, respectively. Theresulting lower bound PLB

xi;xjfor the probability of success-

ful delivery can then be written

PLBxi;xj¼ ð1� �ÞnðAij;1Þ

XM�1

iM¼0

nðAij;MÞiM

� ��iM ð1� �ÞnðAij;M Þ�iM

Xmaxð0;M�2�iM Þ

iM�1¼0

nðAij;M�1ÞiM�1

� ��iM�1ð1� �ÞnðAij;M�1Þ�iM�1 � � �

Xmax 0;1�PM

n¼3in

� �i2¼0

nðAij;2Þi2

� ��i2ð1� �ÞnðAij;2Þ�i2 :

ð4Þ

In (4), the summation is made from the further awayinterference zones toward the inner ones. The number ofactive (transmitting) nodes iM lying in the most remoteinterference zone Aij;M determines the maximum numberof interferers iM�1 that can be tolerated from the zoneAij;M�1. Their sum in turn sets an upper limit to the numberof interferers iM�2 in zone Aij;M�2 that would not hintercorrect reception and so on. Under this worst-case scenario,even a single node transmission from the first interferencezone Aij;1 would result in transmission failure.

Of course, in the general case, them� 1 transmissions thatcan be tolerated in interference zone m can be distributed inall possible locations within the zone. The further they arefrom the inner border of the zone, the better the SINRbecomes; and when all of them reach the outer border of thezone, at distance rij;m from the receiver node, it becomesfeasible to accommodate another,mth, transmission, withoutimpeding successful reception. Therefore, an upper boundPUBxi;xj

for the link delivery probability is derived when weassume that all nðAij;mÞ nodes within the mth interferencezone lie at the outer zone border, namely, at distance rij;mfrom the receiving node xj. Now, the maximum number ofnodes that may be transmitting in each one areaCij;m withoutresulting in unsuccessful transmission ism, respectively, i.e.,one more than in the worst case so that

PUBxi;xj¼XMiM¼0

nðAij;MÞiM

� ��iM ð1� �ÞnðAij;M Þ�iM

Xmaxð0;M�1�iM Þ

iM�1¼0

nðAij;M�1ÞiM�1

� ��iM�1ð1� �ÞnðAij;M�1Þ�iM�1 � � �

Xmax 0;1�PM

n¼2in

� �i1¼0

nðAij;1Þi1

� ��i1ð1� �ÞnðAij;1Þ�i1 :

ð5Þ

PARISSIDIS ET AL.: INTERFERENCE-AWARE ROUTING IN WIRELESS MULTIHOP NETWORKS 719

Fig. 1. Interference zones Aij;m with respect to recipient node xj.

The summation in (5) is carried out along the same linewith the computation of the lower bound; only now themaximum number of active interferers tolerated in eachzone is one more than before since they are assumed placedin the best possible (most remote) position within theinterference zones.

2.3 MAC-Aware Interference Model

The basic model does not make any assumption aboutthe actual MAC protocol that shapes the offered traffic. Theactual transmission attempt probabilities � could be theoutcome of random access or the full backoff process of802.11 DCF operation, with the limitations discussed inassumption A.2. In this section, we take one step further tobring our model closer to CSMA/CA MAC protocols, wherenodes defer when they sense the medium busy (when thereception energy is over the Clear Channel Assessmentthreshold, CCAthr) and schedule their transmissions basedon an exponential backoff algorithm [1]. This mechanismonly partially solves the problem of interfering transmissionsas often nodes within the interference range of the receiverare outside the carrier sense range of the sender (hiddennodes). Our simple enhancement, aiming at preserving thesimplicity of our original model rather than incorporatingthe full complexity of CSMA MAC protocols, takes intoaccount the physical carrier sense property (CCAthr) fornodes located in the first interference zone Aij;1. In otherwords, all nodes within the carrier sense range of thetransmitter and inside the first interference zone of thereceiver defer from transmitting.

In Fig. 2, r1 ¼ffiffiffi��p� r denotes the radius of interference

zone Aij;1 and

r2 ¼ffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi

Pwi10CCAthr=10

r

is the sender’s physical carrier sense range. Hidden nodescan still exist in the area RH , given by

SRH¼ �r2

1 �B; ð6Þ

where B is the surface of the intersection between Aij;1

and sender’s physical carrier sensing area (see, forexample, [14])

B ¼ r21cos

�1 r2 þ r21 � r2

2

2 � r � r1

� �þ r2

2cos�1 r2 þ r2

2 � r21

2 � r � r2

� �

� 1

2

ffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiðr1 þ r2 � rÞðr1 þ r2 þ rÞðr1 � r2 þ rÞðr2 � r1 þ rÞ

p:

The two bounds for Pxi;xj for the complete model resultfrom (4) and (5), when replacing nðAij;1Þ with the expectednumber of nodes in area RH

nðAij;1Þ nðRhÞ: ð7Þ

In the rest of the paper, Pxi;xj denotes the probability ofsuccessful reception obtained from the MAC-aware model.

In Section 4.1, we discuss how we can approximate theparameter � in an IEEE 802.11x protocol, and then, use it inthe computation of Pxi;xj .

2.4 Probability of Successful Reception underUniform Node Distribution

In the general case, Pxi;xj is a function of the network radioload (via �), number of network nodes nðAij;mÞ in eachinterference zone Aij;m; 8m 2 f1; 2; 3 . . .g, propagation en-vironment (�), and hardware equipment (�). We showbelow that, under the assumption of uniform spatial nodedistribution, we can express Pxi;xj as a function of networkdensity and node degree. This is particularly attractive sincethe node degree can be easily obtained locally at each node.

For each node xi, it is possible to define its node degreeand transmission range.

Definition 3. The node degree dðxiÞ of a node xi is

dðxiÞ ¼ xjjP

jxi�xjj�

N� �; xj 2 X n fxig

( )����������: ð8Þ

In other words, the degree of the node xi equals thenumber of network nodes j � j from which xi can success-fully receive a signal in the absence of any interference fromother nodes. In the case of uniform node distribution withnode density equal to �, it is easy to see that

dðxiÞ ¼ ��ðrmaxÞ2: ð9Þ

Under the uniform node assumption, the expectednumber of nodes in an interference zone Aij;m will beproportional to its surface

E½nðAij;mÞ� ¼ ��r2

ffiffiffiffiffiffiffiffiffiffiffiffiffiðm�Þ2�

q�

ffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiððm� 1Þ�Þ2�

q� �; ð10Þ

where r ¼ jxi � xjj is the transmitter-receiver distance. Thelatter is always a fraction of the node reception range

r ¼ c � rmax; ð11Þ

where 0 < c < 1, a scale factor that depends on the nodedistribution as well as the routing protocol. For example,minimum-hop routing protocols tend to select nodes at theedge of coverage as next hop, implying a value of c close tounity. On the contrary, protocols that favor reliable overshortest paths will yield smaller values of c. E½nðAij;mÞ� cannow be written as a function of the node degree dðxjÞ

720 IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 10, NO. 5, MAY 2011

Fig. 2. Hidden nodes area RH in the first interference zone Aij;1.

E½nðAij;mÞ� ¼ c2 �ffiffiffiffiffiffiffiffiffiffiffiffiffiðm�Þ2�

q�

ffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi½ðm� 1Þ��2�

q� �� dðxjÞ: ð12Þ

We can then write the probability Pxi;xj as a function ofthe node degree dðxjÞ, if we replace nðAij;mÞ in (4) and (5)with the expected number of nodes in interference zoneAij;m; E½nðAij;mÞ�, rounded to the closest integer. For theMAC-aware interference model described in Section 2.3, thenumber of nodes in the area RH becomes

nðAij;1Þ nðAij;1Þ �SRH

�r21

: ð13Þ

2.4.1 Estimating the Number of Interference Zones, M

Although the number of zones considered in (4) and (5)does not have to be constrained, i.e., M !1, the numericalcomputation of Pxi;xj has to consider a finite number ofzones. To determine M, let us first study how theinterference contribution is spread over different zones.The width of the mth interference zone as a function of theinterference node index m is given by

fðmÞ ¼ �r2½ððmþ 1Þ�Þ2� � ðm�Þ

2��; m 2 f1; 2; ::Mg: ð14Þ

It is then straightforward to show that the derivative offðmÞ is

dfðmÞdm

¼ 4��r2

�2

�ðmþ 1Þ

2��� �m2��

< 0; � > 2; ð15Þ

namely, the width of interference zones for given �; �; c isdecreasing with higher m values, and so does the expectednumber of nodes under uniform distribution, as (12)suggests. Therefore, the interference contribution fromdifferent zones decreases as well and becomes “negligible”for some high enough value of m.

In general, M may be selected empirically taking intoaccount the particular network geometry. A more systema-tic approach would be to stop adding interference con-tributions from zones k > m, as soon as the worst-caseinterference from zone m falls below a given threshold; Mwould then equal

M ¼: min mPwr�

E½nðAij;mÞ� � Pwr�ij;m�1

� �%; m 2 f1; 2; 3; . . .g

������8<:

9=;;ð16Þ

where % > 1 is a scaling factor; higher % will result in higherM values and vice versa.

The number of interference zones computed via (16) isplotted in Figs. 3a and 3b. As expected, the number of areasthat needs to be included decreases for shorter transmitter-receiver distances and higher signal attenuation (larger a)values. For example, when % ¼ 10;M ranges from 2 to 15 for� ¼ 5, from 3 to 23 when � ¼ 4, and from 3 to 33 for � ¼ 5,as c varies from 0.1 to 0.8, respectively.

2.5 Interference Model Applicability under NodeMobility

An interesting property of our interference model is that itcan address both static and mobile networks, in contrastwith other models that apply only to static networks [7], [8].

The two bounds for the probability of successful receptionin (4) and (5) allow for arbitrary node distributions in space.Different mobility models can be accommodated as long assteady-state spatial node distributions exist for theirmobility patterns.

For example, our derivation under the assumption thatnodes are uniformly distributed applies directly formobility models widely used in the literature, such as therandom walk and random direction. For these two models,it has been proved that if users are uniformly distributed intheir movement space, they remain so for arbitrary move-ment patterns [15].

In addition, the more generic derivations in (4) and (5)still hold when the node mobility patterns do not give riseto uniform node distribution. Bettstetter et al., for example,have analytically derived the spatial node distribution overa bounded rectangular area for the random waypoint(RWP) mobility model in [16]. Though less straightforward,their result could be the starting point for the derivation ofthe number of nodes per interference zone, nðAij;mÞ,whenever the RWP model is deemed a valid assumptionfor the node mobility. Only now the resulting distributionof nodes among interference zones is strongly related to theactual position of the transmitter and receiving nodes,rather than simply their distance.

3 NUMERICAL RESULTS

In this section, we provide numerical results for the impactof the five parameters �; �; �; c, and dðxjÞ on the probabilityof successful reception Pxi;xj . Both worst-case (dashed line)and best-case (solid line) bounds, as estimated from (4) and(5) with the MAC-aware interference model adaptations ofSection 2.3, are plotted. In the case of the node degree dðxjÞ,it is important to note that we manipulate it by changing therespective node density � (see (9)). Obviously, for a givennumber of network nodes, dðxjÞ changes with the cardreception threshold, �, and path loss exponent, �. Yet, sincefrom the MAC perspective it is the number of nodeneighbors that are more relevant, we choose to depict thevarious plots as a function of node degree, even though it isalways implied that the respective degree is determined bychoosing the node density accordingly.

3.1 Impact of the Transmission AttemptProbability, �

For fixed �; �, the communication range is also fixed. Aslong as c remains fixed, the radii of the interference areas

PARISSIDIS ET AL.: INTERFERENCE-AWARE ROUTING IN WIRELESS MULTIHOP NETWORKS 721

Fig. 3. Number of interference zones, M, included in the computation ofP ðxjÞ as a function of the sender-receiver distance scale factor c.(a) � ¼ 10; dðxjÞ ¼ 10; % ¼ 10. (b) � ¼ 10; dðxjÞ ¼ 10; % ¼ 15.

and sizes of interference zones do not change. Underuniform spatial node distribution, the number of nodes ineach zone increases linearly with the node density and thusalso with the node degree, as (12) suggests. On the otherhand, increase of � for a given node degree value impliesmore communication-active nodes. As a result, highervalues of both node degree and transmission probabilityresult in higher loss probability, as intuitively expected.

Fig. 4a plots the two bounds for the link deliveryprobability Pxi;xj as a function of the node degree forvarious values of the transmission probability �. All otherparameters are kept constant; the specific values, i.e.,� ¼ 3:84; � ¼ 2:5; c ¼ 0:5, were chosen so that they matchthe values measured in the testbed and reported in Section6. The decrease of successful reception probability is moredramatic for higher node degree values since the number ofpotential interfering nodes is then higher. One order sizeincrease of �, from 0.003 to 0.03 reduces Pxi;xj by approxi-mately 16 percent for dðxjÞ ¼ 30, versus less than 4 percentfor dðxjÞ ¼ 10. The difference between the worst- and best-case bounds is within 10 percent and broadens for higher� values. As a final note, � in these examples corresponds toan unsaturated network (see discussion in Section 2.2).

3.2 Impact of the Reception Threshold, �

The reception threshold � determines when a MAC frame issuccessfully received. It depends on the transmission rate,frequency, and sensitivity of the network card/chipset;higher rates and lower quality network cards require higher� values for achieving a given frame error rate. Typicalvalues for �, as reported in network card specifications, are2.5 to 25 [17].

Increase of the reception threshold value at a givenenvironment (constant �) reduces the communicationrange, after (2), increases the widths of interference zones,as (3) suggests, and for given c results in higher concentra-tion of nodes at the first interference zones, see (10). Theresult is increased interference, as shown in Fig. 4b. Therelative reduction on the successful reception probabilityincreases with higher node density, where the concentrationof interfering nodes at the first zones becomes more visible.The relative difference between the upper and lowerbounds obtained under the MAC-aware interference modelstays well below 10 percent.

3.3 Impact of the Path Loss Exponent, �

The path loss exponent � models the reduction of the radiosignal power as a function of distance from the transmitting

source. Its values depend strongly on the radio propagationenvironment [18]. Combining (2) and (3), we could write forthe radius rij;m of interference area Cij;m

rij;m ¼ffiffiffiffiffiffiffiffiffiffiffim � ��

p�ffiffiffiffiffiffiffiffiffiffiffiPwN � �

ffiffiffiffiffiffiffiffiffiffiffiffiffiffim � Pw

N

r: ð17Þ

As � increases, the signal attenuation with distance ishigher and the radii of the interference zones decreases.Nodes can be placed closer to the receiver withoutinterfering with the intended signal. The impact of theparameter � on Pxi;xj is plotted in Fig. 4c. As with Fig. 4a,higher node degree values amplify the variation of Pxi;xjwith �. The margin between the two bounds increases with�, reaching a maximum of 11 percent for � ¼ 5.

3.4 Impact of the Sender-Receiver Distance ScaleFactor, c

In our analytical derivation, we express the distancebetween the sender and receiver nodes as a ratio of themaximum communication range, c � rmax. The impact of thesender-receiver distance on the probability of the successfulreception is plotted in Fig. 5. We vary the node degree,while letting all other parameters constant. As with � and �,higher network densities magnify the effect of c. Only the

722 IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 10, NO. 5, MAY 2011

Fig. 4. Probability of successful reception versus node degree (i.e., node density �) for variable �; �, and �; solid (dash) lines correspond to the upper(lower) bound values. (a) Variable �; � ¼ 3:84; � ¼ 2:5; c ¼ 0:5. (b) Variable �; � ¼ 3:84; � ¼ 0:02; c ¼ 0:5. (c) Variable �; � ¼ 2:5; � ¼ 0:04; c ¼ 0:5.

Fig. 5. Probability of successful reception versus node degree (i.e., nodedensity �) and sender-receiver distance scale factor c; � ¼ 2:5; � ¼ 4;� ¼ 0:02; solid (dash) lines correspond to the upper (lower) boundvalues.

latter is more dramatic in absolute terms than the one � and� have on the probability of successful reception.

Finally, Fig. 5 directly points to the well-known ineffi-ciencies of minimum-hop routing. Minimum-hop routingtends to select few but distant hops when selecting networkroutes. This trend results in more noisy but also, as Fig. 5suggests, more interference-prone links. On the other hand,“shorter” links may also imply a large number of hops,which can also be detrimental to throughput [6]. This trade-off can be resolved by interference-aware routing, which, asshown in Section 4, is the application targeted by our model.

Overall, the deviation of the two bounds is almostalways upper bounded by 10 percent, most of the timesbeing around 5 percent. Although this deviation is notnegligible, it corresponds to the worst-case possible penaltydue to the uncertainty about node locations within theinterference zones. The uncertainty reduces with the indexof zone, being highest for the first widest interference zone,and to some extent reflects the inaccuracy of localizationtechniques yielding the node positions. In practice, how-ever, one would weigh these bounds, e.g., taking theiraverage, to come up with a more realistic estimate of Pxi;xj .

4 FROM INTERFERENCE MODELING TO

INTERFERENCE-AWARE ROUTING METRIC

The ultimate objective of our interference model is tosupport the routing function. In this section, we describe aninterference-aware routing metric drawing on the modeland explain practical aspects related to its implementation.

4.1 Estimation of Transmission AttemptProbability �

The node transmission probability � in the analysis ofSection 2 cannot be directly controlled in IEEE 802.11 MAC.In our actual metric implementation using the open sourceMadwifi wireless adapter drivers [19], the traffic load isestimated in real time. We modified the source code of thedrivers similar to [20] to measure the time the wirelessmedium is sensed busy. The percentage of the busy timebðtÞtotal (0 � bðtÞtotal � 1) in 1 second time windows isreported to the interference-aware routing metric process.The busy time report includes the percentage of time bðtÞxiduring which the medium is sensed busy due to transmis-sions of sender xi. This information is fed to the estimationof the traffic load induced from interfering nodes to eachsender-receiver pair.

For uniform node distribution, we approximate thetransmission attempt probability �xi;xj for a the linkxi ! xj as

�xi;xj ¼bðtÞtotal � bðtÞxi

dðxjÞ; ð18Þ

where dðxjÞ is the degree of the receiver node xj. Thenode degree dðxjÞ is retrieved directly from the routingprotocol state.

Note that to estimate � in (18), we resort to the uniformload contribution assumption over the local neighborhood ofeach node, as if all the interfering traffic load in the sharedmedium is uniformly spread over the neighbors of thereceiver node. In other words, different receiver nodes may

well attribute different � estimates to a common neighbor oftheirs depending on the radio load each one senses.

4.2 Calculation of Interference-Aware RoutingMetric

Our interference-aware routing metric borrows essentialdesign properties of the ETX routing metric [9]; we postponea discussion on how could we support other routing metrics,originally relying on active probing, in the Section 9. ETXestimates the number of transmissions (including retrans-missions) required to send a packet over a link. Let Pxi;xj bethe expected delivery ratio of the sender node xi to receivernode xj and Pxj;xi be the reverse delivery ratio, i.e., theprobability that the acknowledgment packet is transmittedsuccessfully. Then, the probability that a packet is receivedand acknowledged correctly is Pxi;xj � Pxj;xi . Assuming thateach attempt to transmit a packet is statistically independentfrom the precedent attempt, individual transmission at-tempts can be viewed as Bernoulli trials and the number ofattempts till the packet is successfully received as ageometrically distributed variable, GeomðPxi;xj � Pxj;xiÞ.Therefore, converting the delivery ratios in both directionsto expected number of transmissions (ETXs), the interfer-ence-aware metric value Iðxi; xjÞ is

Iðxi; xjÞ ¼1

Pxi;xj � Pxj;xi; ð19Þ

where the probability of successful reception Pxi;xj at node xjis given from (4) or (5) or, more generally, some function ofthe two bounds. Note that, besides the independence ofindividual transmission attempts, the use of (19) screens thefollowing assumptions: 1) retransmissions at the MAC layerare infinite—although the more realistic case of finiteretransmissions calls for a more elaborate formula, the useof (19) preserves the ordering of paths at the routing layer2

and simplifies the respective computations; 2) the probabilityof success in consecutive (re)transmission attempts is thesame—there is experimental evidence that this assumption isnot accurate under nonsaturated demand in 802.11 networks[22]; 3) the experienced packet loss does not vary (signifi-cantly) with the packet size. We discuss further thisassumption in Section 6.

Our interference-aware metric is generic and can be usedfrom any routing protocol. In our experimental evaluation,we used the Destination-Sequenced Distance Vector (DSDV)[23] routing protocol. DSDV is a distance-vector protocolusing sequence numbers to ensure up-to-date routing tableinformation. To accommodate our metric in the DSDVimplementation, we extended the DSDV routing table entryto include a field for the probability Pxi;xj .

As routing decisions are made by the sender node xi, thequestion that arises now is how xi estimates the metricvalue Iðxi; xjÞ. Whereas the reverse probability of successfulreception at node xi (Pxj;xi ) from xj is estimated locally at xi(see Section 4.1), the forward probability of successfulreception Pxi;xj needs to be communicated to xi from xj. In

PARISSIDIS ET AL.: INTERFERENCE-AWARE ROUTING IN WIRELESS MULTIHOP NETWORKS 723

2. When the transport layer carries out end-to-end retransmissions, therelative positions of links within the paths should also be taken into accountin optimal path selection, besides the probabilities Pxi;xj , otherwisesuboptimal paths may emerge [21].

fact, each node xj advertises its local estimates of Pxi;xj forits neighbor nodes xi; i 6¼ j.

To avoid additional routing overhead, the messagesupdating the forward probabilities of successful receptionare encapsulated into the triggered routing update messagesof DSDV. Algorithm 1 describes the essential steps tocalculate the interference-aware routing metric at each node.

Algorithm 1. Estimation of the interference-aware routing

metric value Iðxi; xjÞ at node i.

Upon packet reception p

if p ¼¼ data packet from neighbor j then

Update variables bðtÞxi ; bðtÞtotal and calculate �xi;xj (18)

else

if p ¼¼ routing packet from neighbor i then

1. Get the probability of successful reception Pxj;xi and

estimate the metric Iðxi; xjÞ (4), (5), (13), (19)

2. Update the routing table. The routing protocol then

maintains the routing tables updated

else

Packet not used in the algorithm

end if

end if

5 EXPERIMENTATION PLATFORM

We evaluate our interference model and interference-awarerouting metric using testbed experiments. Our TIC-Nettestbed consists of 23 stationary Linux PC nodes equippedwith 802.11a/b/g Atheros cards. The nodes are located atthe second floor of the ETZ building, as illustrated in Fig. 6.The offices have floor-to-ceiling walls made mostly out ofwooden material. All nodes in our testbed communicateusing the IEEE 802.11b. The 802.11b cards during theexperimental evaluation are set to “ahdemo” mode, aMadwifi driver specific “ad-hoc” mode, where no manage-ment packets are sent to maintain connectivity. The RTS/CTS handshake mechanism is disabled in line withthe default behavior for most wireless cards [24], and therate adaptation mechanism is inactive. All experiments are

carried out during weekends or nights to minimizeinterference from external sources.3

5.1 Obtaining Model Inputs

The experimentation results are compared with the analy-tical estimates of the probability of successful receptionPxi;xj under uniform node distribution. The required inputsfor this calculation are the parameters �, �, and �. Theeuclidean distance r between the transmitter and receivernodes can become available through GPS [25] or otherpositioning methods. In our experiments, the node dis-tances are statically given to the routing protocol.

5.1.1 Path Loss Exponent � Estimation

The dependence of path loss on � is approximated by thelog-distance path loss model (e.g., [18])

Pij½dBm� ¼ Pdo ½dBm� � 10 � � � log dijdo

� �; ð20Þ

where d0 is a reference distance, dij is the distance betweenthe sender i and the receiver j; Pij½dBm� is the meanreceived signal power in decibel meter, and Pd0

½dBm� isthe mean received power at a reference distance d0. Weused two nodes to measure the signal strength as afunction of distance in our indoor office environment. Thesignal strength is derived by the RSS values reported bythe cards at various distances. Setting d0 ¼ 4 m andcarrying out a least-square fit computation, we estimatedPd0¼ �51:12 dBm, � ¼ 3:84. The measured values and the

least-square fit curve are plotted in Fig. 7b.4

5.1.2 SINR Threshold � Estimation

The CMU wireless channel emulator [26] was used toestimate the SINR threshold � of our Atheros wireless

724 IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 10, NO. 5, MAY 2011

Fig. 6. Our wireless mesh network testbed. The 23 802.11a/b/g nodes are distributed in offices all over the floor covering an area of approximately32 79 m2.

3. External interference was caused only by the beacons frames broadcastby the wireless APs (Access Points) installed in the building, which isnegligible compared to the traffic generated from our experiments.

4. The exponent � is taken to be the same for all node pairs in the testbedsince all nodes lie within an office environment. At a further level ofaccuracy, these values could be measured separately for different areas inthe floor or even for each single node pair. Note that these measurementsare carried out once and offline.

cards. In our experiment, two Atheros cards similar to theones in our testbed were connected to the hardwareemulator; one card was sending five thousand 802.11broadcast packets at 1 Mbps and the other was receivingthem. Note that 802.11 broadcast packets are not subject toMAC retransmissions. Varying the attenuation of the radiosignal through the emulator in increments of 1 dB, weestimated � by measuring the ratio of the correctlydelivered packets as a function of the RSS. The results areplotted in Fig. 7a. Since the noise floor of the Atheros cardswas measured to be approximately �96 dBm, the knee ofthe delivery ratio curve at RSS ¼ �92 dBm means that thethreshold value � equals 4 or 2.5 dB.

The last parameters required to estimate the probabilityPxi;xj under uniform node distribution are the number ofinterference zones, M, and expected number of nodes perinterference zone; their values are obtained from (16) and(10), respectively.

6 MODEL VALIDATION VIA TESTBED

EXPERIMENTATION

In this section, we assess the prediction capability of ourinterference model via testbed experimentation. The analy-sis in Section 2 is carried out considering a simple model forthe MAC operation. Real-world MAC protocols bear a largenumber of finer engineering details, which cannot be easilycaptured into a analytical model. Therefore, we resort toexperimentation to get a better understanding of thestrengths and limitations of our analysis in a realisticwireless network environment based on a real MACprotocol, such as the IEEE 802.11b.

6.1 Experimentation Methodology

The wireless network cards are configured to send at1 Mbps with 31.62 mW (15 dBm) of transmit power. Theaverage communication range in our testbed for thistransmit power was measured approximately to 25 m.The sender-receiver pair used in our experimental evalua-tion are nodes 4 and 23, respectively. This is one of the mostfavorably placed node pairs in the testbed in the sense thatwe can selectively include various testbed nodes in ourexperimentation and change the network density whilepreserving their adequately uniform spatial distributiontherein—we have also tested nodes 3, 10, 11 as sender nodesand moved receiver node 23 within a radius of 2 m aroundthe location shown in Fig. 6, obtaining comparable numbersof interference zones and nodes therein and similar results.

The euclidean distance between nodes 4 and 23 isr ¼ 12:5 m, which corresponds to a distance scale factorvalue of c ¼ 0:5. All captured traces of this evaluation areavailable in [27].

6.1.1 Distribution of Nodes

For the � and � values estimated earlier in Section 5, theradii of interference areas for the receiver node 23 usingLemma 1 are: r23;1 ¼ 15:8 m, r23;2 ¼ 19 m, r23;3 ¼ 21:1 m,r23;4 ¼ 22:8 m, and r23;5 ¼ 24:1 m. Equation (16) provides thenumber of interference areas that have to be considered and(12) yields the expected number of nodes EðAj;mÞ8m ¼1; 2; 3 . . .M in each interference zone as a function of thedegree of the receiver node 23. We vary the network densityby letting the node degree dðxjÞ take values in the interval[5..15] nodes. For each node degree value (scenario), weactivate the respective nodes listed in Table 2.

6.1.2 Traffic Generation

In each experimental scenario, all participating nodes sendIEEE 802.11 broadcast packets at constant bit rate. This iscommon practice in related work [7], [8], [28] since MACbroadcast packets involve no retransmissions or link-layeracknowledgments. We estimate the successful receptionprobability under simultaneous interfering transmissionsmeasuring the ratio of the successfully received packetsover the total number of broadcast packets sent.

In the remainder of the paper, the experimental resultsare compared against the average of the two bounds for Pxi;xj ,as derived in Section 2. Note that, as shown in Figs. 4 and 5,the deviation of two bounds for the testbed parameters andconsidered node degree range lies within 10 percent.

6.2 Experimentation Results

The model predictions festig are compared against theexperimental results factualig in Figs. 8a, 8b, and 8c; weplot average values of the successful packet receptions with90 percent confidence intervals. We quantify the accuracy ofour model by computing the root-mean-square error(RMSE), defined over the total number k of predictions asffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiP

ðesti � actualiÞ2

k

s:

There is close match between the two curves in all threefigures. The analytical predictions for the probability ofsuccessful reception match the monotonic change of Pxi;xj

PARISSIDIS ET AL.: INTERFERENCE-AWARE ROUTING IN WIRELESS MULTIHOP NETWORKS 725

Fig. 7. (a) Packet delivery ratio as a function of signal strength. (b) Signalstrength Pij½dBm� as a function of the distance dij.

TABLE 2Number of Nodes in Each Interference Area Aij;m8m ¼ 1; 2 . . . 5

with the node degree throughout the ½5::15� range of nodedegree values for different �. This is also reflected in theRMSE values. For � ¼ 0:005, the RMSE is 0.01 and forhigher � ¼ 0:04 the RMSE equals 0.02.

To assess how well our model trades simplicity withaccuracy, we compare it with the general model forinterference (GMI) proposed in [8]. The model, whichreflects the state-of-the-art in interference modeling, usesmeasurements to RF-profile the network nodes and links.The RF profiles are then fed into explicit Markovian modelsfor the 802.11 sender and receiver behavior to derive thepacket loss probability. The GMI evaluation in [8] waslimited to five simultaneous broadcast senders. Here, wecompare the predictions of our model and GMI in scenariosof Table 2 involving up to nine simultaneous broadcastsenders under unsaturated traffic demands.

Table 3 illustrates the relative error in prediction, � ¼absðesti�actualiÞ

actuali, for node degree dðxjÞ ¼ 5::8. In these scenarios,

both models yield comparable accuracy in predicting the

measured probability of successful delivery. Interestingly,

our model appears to even outperform GMI for higher values

of � (i.e., � ¼ 0:05). Moreover our model features distinct

advantages over GMI; it does not require seed measurements

(RF profiling) and scales better than GMI with high number of

nodes from a computational point of view. In fact, its

simplicity renders it directly applicable to routing, as shown

later in Section 4.

A final note on the experimental results concerns the

impact of packet size. The analytical derivation for Pxi;xj is

not packet size aware, namely, it does not take into account

the packet size transmitted over the medium. We investi-

gated the impact of packet size with a set of experiments.

For the given �, �, and c values of our testbed setup, we

simultaneously varied the packet size and packet transmis-

sion rate so that they yield the same equivalent node

transmission probability �, as estimated in Section 6.1. For

example, the ðpktsize; rateÞ pairs estimated for � ¼ 0:04 are

ð128bytes;20pkts=sÞ, ð256bytes;15pkts=sÞ, ð512bytes;8pkts=sÞ,and ð1;024bytes; 4:5pkts=sÞ. Fig. 9a plots Pxi;xj for all four

scenarios. The deviation between the four combinations

increases with node degree, but remains overall below 0.06.

In fact, the deviation between the curves is comparable to

the confidence intervals for the measured results, suggest-

ing that there is no significant change of Pxi;xj with packet

size. Another way to see this is at Fig. 9b, which plots the

Pxi;xj values obtained with two scenarios against each

other. Absolute coincidence of the measured values in the

two cases would align the 2D points along the 45 degree

slope line. Note that according to the 802.11 performance

analysis models (see [9], [10], [11], [12]), the collision

probability is constant for given transmission attempt

rate �—in fact, it is a monotonically decreasing function

of � in ½0; 1�. On the other hand, larger packet sizes should

make transmissions more prone to errors for given link

quality (Bit Error Rate). For the rest of the evaluation, we

use packet sizes of 128 bytes.

7 INTERFERENCE-AWARE ROUTING METRIC

PERFORMANCE EVALUATION

The ultimate mission of our interference model is to becomethe main building block for the interference-aware metricdescribed in Section 4. In this section, we evaluate theperformance of our interference-aware metric versus the

726 IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 10, NO. 5, MAY 2011

TABLE 3Relative Error � in Prediction

Fig. 8. Analytical model versus testbed experimentation results. The analytical model values are � ¼ 3:84, � ¼ 2:5, and c ¼ 0:5.(a) � ¼ 0:005;RMSE ¼ 0:01. (b) � ¼ 0:02;RMSE ¼ 0:016. (c) � ¼ 0:04;RMSE ¼ 0:019.

Fig. 9. Impact of packet size on Pxi;xj . (a) Pxi;xj versus packet size.(b) Scatter plot of Pxi;xj .

ETX and minimum hop count (Hop Count) metrics in ourindoor TIK-Net testbed. The minimum hop count repre-sents the alma mater of metrics used by default on mostrouting protocols, whereas the active-probe measurementsof ETX [9], [29] are the base for a whole family of metrics,which are viewed as current “state-of-the-art” [30]. Notethat the original ETX specification does not explicitlycapture the carrier sense impact (sender-side interference).However, the part of it that is due to the intraflowinterference is taken into account by ETX derivatives likethe Weighted Cumulative Expected Transmission Time(WCETT) [4] and the Metric for Interference and ChannelSwitching (MIA) [5], which explicitly consider the use ofchannels across the network routes. We discuss how ourmodel-driven metric can be extended along these lines inSection 9.

The Click toolkit [31] was used for our experimentation;we implemented our metric on it and relied on the Click-based implementations of the ETX metric and DSDVrouting protocol.

7.1 Experiment Sets

We evaluate our routing metric through two main sets ofexperiments:

. Experiment Set A: One node pair is active at a time,with 20 TIC-Net testbed nodes taking turns intransmitting data, resulting in 20 19 ¼ 380 differ-ent sender-receiver pairs.

. Experiment Set B: Ten node pairs transmit simulta-neously. The pairs used in this set of experiments arelisted in Table 4; nodes with id i send to nodes withid 20� ði� 1Þ with i½1::10�. This scenario is mostchallenging since it results in many multihop pathsand much cross-traffic in the network.

In the first set of experiments (set A), we evaluate thecapability of metrics to find high throughput paths in theabsence of interflow interference, i.e., interference fromother flows. In this specific set of experiments, interferenceis mainly due to simultaneous transmissions in multihopforwarding (intraflow interference). In every experiment,each node sends UDP packets at maximum rate for30 seconds. Each round is followed by 20 seconds ofpause to let routing entries converge to the initial state (notraffic/boot phase). We vary the transmit power Pw (10/18 dBm) and the transmission rate (1/11 Mbps) each timeexecuting 50 rounds. Thus, the total duration of set A is380 50 3 seconds or 15.9 hours testing all three metrics

under a single (Bit_rate, Pw) tuple and approximately

64 hours for all tuples.The second set of experiments (set B) evaluates the

metrics in the presence of interflow interference, with

multiple simultaneously active data flows. In order to

generate a challenging experimental scenario, we selected

node pairs with the largest possible distance at our testbed

(see Table 4 and Fig. 6). Within an experiment round, each

sender node is configured to send 5,000 UDP packets at a

rate of 10 packets per second. The duration of each round is

500 seconds followed by 100 seconds of pause time, thus in

total 600 seconds. We repeat each round 20 times, resulting

in 600 20 3 seconds or 40 hours for the three metrics

under each (Bit_rate, Pw) tuple.

7.2 One Node Pair Active at a Time

Fig. 10a compares the throughput Cumulative Distribution

Functions (CDFs) (in packets per second) of the paths found

for all 380 node pairs by DSDV using the ETX, minimum

hop count, and our interference-aware metric, under

Bit rate ¼ 1 Mbps, Pw ¼ 18 dBm, and Pkt size ¼ 128 B. In

the figure, there are essentially two areas, above and below,

approximately 150 packets per second. The values above

this threshold correspond to node pairs that communicate

over a single hop, whereas those smaller or equal to it to

multihop paths. The fastest two-hop path has at most half

PARISSIDIS ET AL.: INTERFERENCE-AWARE ROUTING IN WIRELESS MULTIHOP NETWORKS 727

TABLE 4Node Pairs Used for the Second Set of Experiments (Set B)

Fig. 10. One node-pair active: Bit rate ¼ 1 Mbps, Pw ¼ 18 dBm, andPkt size ¼ 128 bytes. (a) Throughput CDF (in packets per second) ofpaths found by DSDV using ETX, minimum hop count and ourinterference-aware metric. (b) Throughput histogram (in packets persecond) of paths found by DSDV using ETX, minimum hop count andour interference-aware metric.

the throughput of a single-hop path due to interferingtransmissions of two consecutive hops [9], [32].

More amenable to discussion is the throughput histo-gram (in packets per second) of the paths found by eachmetric as presented in Fig. 10b. Again, there are two distinctareas in this graph; the one with throughputs correspond-ing to one-hop paths (right side) and that with multihoppaths (left side). The right side suggests that our metricfinds more high throughput one-hop paths than the othertwo metrics, namely, among all node pairs for which one-hop paths were chosen, higher proportion of node pairs liesin the high throughput area than with the other metrics.Likewise, the left side of the graph implies that when ourmetric decides in favor of a multihop path for a node pair,the chances are much higher that this pair will get thehighest throughput possible: our metric finds up to threetimes more multihop paths with high throughput (between125 and 150 packets per second) when compared to ETXand minimum hop count. In other words, our metric tendsto select better paths, which are subject to less intraflowinterference, when the other metrics decide in favor of morelossy links.

One should note that min hop, as expected, and ETX, toa fewer extent, are more aggressive in using one-hop paths.For some small number of flows, this aggressiveness paysoff in that even over lossy one-hop paths they manage toget higher throughput than that they would with the besttwo-hop path. But for the majority of node pairs, it doesnot. Therefore, for many one-hop flows chosen by the minhop count the actual throughput is well less than theexpected >150 value. ETX should not suffer from thisproblem since it relies on active probing for estimating thelink delivery probabilities. Yet, as admitted also in the ETXpaper [9], heavy load causes the MAC protocol to becomeextremely unfair, distorting the probe-based measurements.Thus, ETX might not accurately estimate the link deliveryprobabilities and accordingly result in suboptimal paths.

7.2.1 Effect of Transmit Power

Lower transmit powers reduce the effective node commu-nication range; the network is less connected and nodesrequire more hops to communicate. Furthermore, routingmetrics have fewer paths to select. In that specific set ofexperiments, we decrease the transmit power Pw from 18 to10 dBm. We also did experiments for very low transmitpower Pw ¼ 0 dBm (1 mW); however, the network in thatspecific set of experiments is very sparsely connected and thethroughput of most of the node pairs is very close to zero.

Fig. 11a plots the throughput CDFs for Pw ¼ 10 dBm andPkt size ¼ 128 bytes. Comparing with the results for Pw ¼18 dBm (see Fig. 10a), all metrics find paths with relativelylow throughput. Our interference-aware metric finds fewermore than one-hop paths with throughput between 125 and150 packets per second; for Pw ¼ 18 dBm, there are almost100 node pairs, whereas for Pw ¼ 10 dBm only 65 nodepairs. However, it still finds more paths with highthroughput than both ETX and minimum hop count (abouttwo times more paths with high throughput values).

In summary, the transmit power affects the performanceof the metrics since it directly determines the connectivity of

the network. The advantage of our interference-awaremetric over ETX and minimum hop count is more profoundin densely connected networks (higher transmit power).The gain is smaller in sparsely connected networks becauseavailable paths that can be found from a routing protocolare fewer and there is little margin for differentiation in thedecisions made by the three metrics.

7.2.2 Effect of Transmission Rate

It is known that there is an inherent trade-off betweentransmission rate and effective transmission/communica-tion range. Higher transmission rates result in higherthroughput, but can only be supported within lowereffective transmission range, resulting in sparser network.

We repeat our experiments for transmission rate equal to11 Mbps. The sensitivity threshold for the cards used in ourexperimental evaluation, as reported from the manufacturer,are�89 dBm for 1 Mbit per second and�82 dBm for 11 Mbitper second (for 8 percent packet error rate). Fig. 12a showsthe throughput CDFs for Bit rate ¼ 11 Mbit per second,Pw ¼ 18 dBm, and data packets of Pkt size ¼ 128 bytes. Incomparison with the experiments at 1 Mbps (Fig. 10), theoverall throughput increases; 30 percent of pairs achievethroughput over 200 data packets per second for Bit rate ¼1 Mbit per second, while for 11 Mbit per second therespective value is 60-70 percent for all metrics.

728 IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 10, NO. 5, MAY 2011

Fig. 11. One node-pair active: Bit rate ¼ 1 Mbps, Pw ¼ 10 dBm, andPkt size ¼ 128 bytes. (a) Throughput CDF (in packets per second) ofpaths found by DSDV using ETX, minimum hop count and ourinterference-aware metric. (b) Throughput histogram (in packets persecond) of paths found by DSDV using ETX, minimum hop count andour interference-aware metric.

Looking into the performance of individual metrics,similar to the aforementioned results, the three metrics findapproximately the same number of one-hop routes. The gainof our interference-aware routing metric is on the left half ofthe figure where it finds multihop paths of higher through-put. This can be clearly seen in Fig. 12b where ourinterference-aware metric outperforms ETX and hop countand finds almost three times more high throughput paths(between 500 and 600 packets per second) than ETX andminimum hop count. ETX finds more paths between 200 and300 packets per second, whereas minimum hop count findsmore low-throughput paths (between 0 and 100 packetsper second).

Overall, our results suggest that our interference-awaremetric performs at least as good as ETX and minimum hopcount in almost all experimental scenarios, irrespective oftransmit power and transmission rate settings. Our metricyields performance gain for multihop paths, where intra-flow interference affects the end-to-end throughput. Mini-mum hop count does not account for interference, whereasETX estimates link losses based on probe measurements.Under heavy load, the ETX probe packets may be distorted,resulting in biased measurements.

Note that these experiments are more useful in showingthe dynamics and biases of the different metrics. Theirperformance in realistic scenarios is better reflected in thesecond type of experiments shown in the following, where

multiple flows compete for the medium. There thepenalization of min hop and ETX aggressiveness canbe seen more clearly.

7.3 Multiple Active Node Pairs

In the second set of experiments, we evaluate theperformance of the three routing metrics under multiplesimultaneous data flows. In the results that follow,we estimate the average throughput values as well asthe 95 percent confidence intervals. Fig. 13a compares thethroughput (in packets per second) of each sender-receiverpair (1-10 as illustrated in Table 4) for Bit rate ¼1 Mbps;Pkt size ¼ 128 bytes, and Pw ¼ 18 dBm. Generally,our interference-aware metric and ETX achieve higherthroughput when compared with the minimum hopcount. Specifically, for the node pairs 1, 2, 7, 8, and 9,the throughput of our interference-aware metric is higherthan ETX (10 percent on average) and minimum hopcount (30 percent on average). ETX achieves higherthroughput for the node pair 10, while for node pairs 3,4, 5, 6 the throughput is similar to our interference awaremetric. While ETX finds lower but comparable throughputpaths to the interference-aware metric, minimum hopcount achieves consistently the lowest throughput for allnode pairs.

Fig. 13b presents the throughput (in packets per second)for lower transmit power, namely, Pw ¼ 10 dBm. Amongthe three metrics, minimum hop count emerges as the most

PARISSIDIS ET AL.: INTERFERENCE-AWARE ROUTING IN WIRELESS MULTIHOP NETWORKS 729

Fig. 12. One node-pair active: Bit rate ¼ 11 Mbps, Pw ¼ 18 dBm, andPkt size ¼ 128 bytes. (a) Throughput CDF (in packets per second) ofpaths found by DSDV using ETX, minimum hop count and ourinterference-aware metric. (b) Throughput histogram (in packets persecond) of paths found by DSDV using ETX, minimum hop count andour interference-aware metric.

Fig. 13. Multiple node-pairs active: Throughput (in packets per second)of paths found by DSDV using ETX, minimum hop count and ourinterference-aware metric. (a) Bit rate ¼ 1 Mbps, Pw ¼ 18 dBm, andPkt size ¼ 128 bytes. (b) Bit rate ¼ 1 Mbps, Pw ¼ 10 dBm, and Pkt size¼ 128 bytes.

sensitive to the transmit power setting. For node pairs 1, 2,4, and 10, the throughput drops up to 50 percent belowthat obtained with transmit power of 18 dBm. The averageper-pair throughput over all node pairs for the threemetrics is presented in Table 6. Notably, our interference-aware routing metric outperforms ETX and minimum hopcount. We explain why this is the case in the paragraphsthat follow.

7.3.1 Impact of Path Length

Table 5 presents the average path length of all experimentrounds for transmit power Pw equal to 10 and 18 dBm. Tocalculate the average path length, we keep track of the pathstaken by data packets. The minimum hop count features theshortest average path length (3.2 and 3.29) followed by theinterference-aware metric (3.26 and 3.36) and ETX (3.4 and3.56). Similar results are obtained for the average pathlength of each node pair.

The small diversity in path length among the ETX,minimum hop count, and interference-aware metrics doesnot justify the difference in throughput for both experi-mental settings. In other words, since routing metrics selectpaths with approximately equal average length, thereshould be another reason differentiating the performanceof the three metrics.

7.3.2 Load Distribution

We now turn our attention in the distribution of data trafficacross network nodes and paths. In Fig. 14, the traffic load

distribution with the 95 percent confidence intervals of theaverage values is shown. More specifically, the bar chartshows the average number of packets sent and/or receivedper second at each node, i.e., nodes selected from therouting metrics to forward data traffic. We observe thatrouting metrics favor different nodes for forwarding datatraffic. Nodes 11 and 12 are selected from ETX, while ourinterference-aware metric pushes the traffic to nodes 2, 4,15, 17, and 18. Minimum hop count favors nodes 11 and 12similar to ETX, but with lower data volume.

The total volumes of transferred data for our interference-aware metric and the ETX are approximately equal, asshown in Fig. 15 that plots the per-node sorted average load.The qualitative difference between our interference-awarerouting metric and ETX is that our metric distributes thetraffic over less interfering paths. Nodes 11 and 12 selectedfrom ETX and hop count interfere to each other as they arewithin the transmission of each other. Our interference-aware routing metric distributes the traffic on less interfer-ing nodes (nodes 2, 4, 15, 17, and 18) as the estimation of linkdelivery ratios takes into account the impact of interference.The ETX metric does not directly account for link load sincebroadcast packets sent at low rate (one broadcast packet persecond) may have different loss ratios than the actual packetloss of data packets sent at higher rates.5

Summarizing the comparative performance evaluationof the three metrics, our main findings are:

. Our interference-aware routing metric performs atleast as good as the ETX and clearly better than theminimum hop count in most experimental scenarios,with intraflow interference or without. The perfor-mance improvement over ETX ranges from 5 to11 percent when average values are compared,exceeding 25 percent for individual node pairs. Ofcourse, the size of our testbed is such that it wouldbe surprising to see higher performance differencesbetween non-naive (e.g., hop count) metrics. It isconceivable that in larger testers, giving rise to pathswith even more hops, the performance gap will bemore pronounced.

. Our experimental results suggest that load balancingis the key performance differentiation factor between

730 IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 10, NO. 5, MAY 2011

TABLE 5Average Path Length over All Rounds

(Bit rate ¼ 1 Mbit per Second, Pkt size ¼ 128 Bytes)

TABLE 6Average Throughput over All Node Pairs

(Bit rate ¼ 1 Mbit per Second, Pkt size ¼ 128 Bytes)

Fig. 14. Multiple node-pairs active: Histogram of traffic load (averagenumber of packets sent/received per second) at all nodes forBit rate ¼ 1 Mbps, Pw ¼ 18 dBm, and Pkt size ¼ 128 bytes.

Fig. 15. Multiple node-pairs active: Traffic load (average per secondnumber of packets sent/received per second) sorted for all nodes.Bit rate ¼ 1 Mbps, Pw ¼ 18 dBm, and Pkt size ¼ 128 bytes.

5. The broadcast probing implementation of ETX is the original onedescribed in [3].

the two metrics. Taking explicitly interference intoaccount, our metric distributes the load amongnetwork nodes better than ETX.

. Although they affect the absolute path throughputvalues achieved by the three metrics, neither thetransmit power nor the transmission rate have asignificant impact on their relative performance.

8 RELATED WORK

Multiple access interference has always been one of the mainconcerns when building wireless networks. Whereas it isquite well explored in infrastructure-based cellular networks(see, for example, [33] and [34]), its characteristics and impactin multihop networks are less thoroughly understood.

Jain et al. in [2] propose the use of conflict graphs fordescribing interference between neighboring nodes. Con-trary to the typical graph semantics, vertices of the graphsare the individual network links(hops) with an edgeconnecting them when the two links interfere. The authorsuse this abstraction to compute bounds for the optimalnetwork throughput under ideal interference-aware routingand argue in its favor. Conflict graphs may be eitherunweighted, when they are extracted according to theProtocol Interference Model [6], or weighted, when basedon the Physical Interference Model (SINR) model. Theadvantage of the SINR model is that it can take thecumulative effects of interference due to simultaneoustransmissions into account. It has been used, beyond theexplicit context of conflict graphs, to derive capacity boundsand optimize scheduling alone [35], or jointly schedulingand routing [36]. In our work, we also start from the SINRmodel to derive an interference-aware routing protocol.

The practical estimation of interference, sometimes asinput for determining the edges (and vertices) of the conflictgraph, is addressed in [28] and [7]. Padhye et al. in [28] usebroadcast transmissions to derive the Broadcast Interfer-ence Ratio (BIR) as a measure of the interaction betweentwo network hops, whereas Reis et al. combine a simplifiedanalytical model for the CSMA/CA function of 802.11 withfewer measurements (n versus n2 in [28], where n is thenumber of network nodes) to estimate BIR values anddetermine the graph edges [7]. While their model is limitedto two competing broadcast senders, Qiu et al. develop ageneral interference model for arbitrary number of senders[8]. They build up an N-dimensional discrete-time MarkovChain (MC) for the state of each one of the N nodes, whichmay transmit or idle during a time slot. They usemeasurements and assumptions about the distribution ofwhite noise and interference to derive the transitionprobabilities of this MC and solve it numerically to obtainthe steady-state probabilities and the resulting packet lossprobabilities. It is not therefore straightforward to feed themodel as input to other tasks, such as the design ofinterference-aware metrics. Furthermore, the computationalcomplexity of the model is prohibitive: the state space of theMC grows exponentially and even with state pruning, it ishard to get results for N > 10 nodes. Both models have asstarting point RSSI measurements that profile the networknodes and become inputs to the analytical model. On thecontrary, our approach is fully analytical and circumvents

the need for measurements and their pitfalls, such as thelimited accuracy of the reported RSSI values and theirinappropriateness for nonstatic networks.

In a different line of work, focusing more on protocolengineering, there is agreement in the research communitythat interference should be an input for routing protocols.Several routing metrics have been proposed to overcomethe inefficiencies of minimum-hop routing in this respect.They rely on active probing for measuring the path roundtrip time (RTT), ETXs [3], and the WCETT [4] and makingtheir routing decisions. The actual probing may be im-plemented in broadcast mode or, as in [37], in unicast modeand be combined with cooperative and passive measure-ments to better trade accuracy with measurement overhead.It is also possible to further process these measurementstogether with information about the used radio channelsover each link to account for inter- and intraflow inter-ference, as the Metric of Interference and Channel Switch-ing (MIC) does [5]. The main disadvantage of theseapproaches is that their dependence, even to a differentextent, on probe measurements. Active probing calls foradditional capacity and results in unnecessary energywastage. Almost all implementations of probing metricsin routing protocols that we are aware of (DSDV, LQSR,OLSR) do not shut down the probing during no trafficperiods. Consequently, there is a periodic energy overheadpaid by probing based metrics—the small size of the packetis not as much a factor for energy consumption as the factthat something is sent (see, e.g., [38]). On the other hand,probing metrics cannot avoid measurement inaccuraciesand feature limited responsiveness to network nodemobility [3]. On the contrary, our model-based metriccircumvents the need for probe measurements and thepitfalls related to them, while exhibiting comparableaccuracy with those approaches.

9 CONCLUSIONS

Interference in ad hoc wireless networks is the core subjectof our paper. We derive an analytical expression for the linkdelivery probabilities as a function of the network density,load, propagation environment, and network card hard-ware. The analysis is initially carried out assuming a genericMAC model, which does not take into account anyengineering details of actual protocols, such as the IEEE802.11x suite of protocols. We then extend our analyticalderivation with a simple enhancement to capture the carriersense function of real-world MAC protocols. The predictioncapacity of our analysis is evaluated in a wireless meshnetwork testbed, which was set up particularly with thisobjective. Measurements obtained from the testbed suggestthat our model compares favorably with state-of-the-artinterference models that model explicitly the sender andreceiver operation in 802.11, without requiring RF measure-ments to profile the network nodes.

We then apply this interference model to interference-aware routing. We introduce a routing metric, whichcomputes the expected number of transmissions over a pathrelying on the analytical derivation of the link deliveryprobabilities according to our model. The metric is testedunder a large set of experimental scenarios featuring intra-flow and interflow interference and different transmission

PARISSIDIS ET AL.: INTERFERENCE-AWARE ROUTING IN WIRELESS MULTIHOP NETWORKS 731

rate and transmits power settings. Without any reliance onactive probe measurements, our metric finds better pathsthan the minimum hop and equally good with the ones thatthe ETX routing metric finds. The reason for this is that ourmetric takes advantage of its interference-awareness to betterdistribute traffic load over the network and mitigates thedetrimental impact of interference on the network through-put. Notably, it does so wasting neither network capacity nornode radio power on probe transmissions making itparticularly attractive for energy constrained nodes.

Throughout this paper, we use the ETX metric ascomparison reference for our metric and the evaluation iscarried out in single-rate networks. This is a deliberatechoice since our model effectively substitutes the “blackbox” measurement-based estimate of link delivery prob-abilities, which lies at the core of not only ETX, but a wholefamily of metrics drawing on it; for example, the ETT,WCETT, and MIC metrics discussed in the related worksection. Notably, it is straightforward to expand theapplicability of our work in multirate networks and supportrate-sensitive metrics, such as ETT. The model formulationand the link success probability formulas (4) and (5) wouldthen have to account for the transmission rate of node xi;different rates sij from the transmitter node imply differentthresholds �sij for the receiver, which, in turn, determine theradii r

sijij;m and interference zone areas A

sijij;m and, eventually,

the rate-specific link delivery probabilities Psijxi;xj . From the

metric computation point of view, nodes would need tobecome aware of the rate at which each neighbor nodetransmits to them to locally estimate the link deliveryprobabilities for each link. Such information can becommunicated among nodes with the help of the routingprotocol messages much as the link delivery probabilitiesare in the single-rate network. Awareness of the transmis-sion rate besides the link delivery probabilities would thenenable estimates of expected transmission times to be usedin ETT-like metrics.

Overall, our work is an argument in favor of modelingsimplicity. We do not dispute the general utility of moreelaborate modeling approaches; we do however give anexample, i.e., interference-aware routing, where equallygood results may be obtained with simpler models.

APPENDIX

MODEL FOR NONUNIFORM SEND RATES

The model in Section 2 was derived under the assumptionthat nodes transmit with equal probability � over the radiomedium. This assumption can be relaxed, only now moreinformation should be propagated in the network and aclosed-form expression is no longer obtainable for the twobounds of the link delivery probability.

In general, the nonuniform send rates could be the resultof different send rates at the MAC layer or application ratesor both. The SINR threshold �s and the reception range rsmaxdepend directly on the transmit rate s of the sender node.The SINR threshold value then directly determines theradio interference areas Cs

ij;m and the width of theinterference zones through (3). In the general case, eachnode nm;k in the mth interference zone might transmit with

a different transmission probability, �m;k. Therefore, thedistribution of transmitting nodes in each interference zoneis that of a sum of binomial random variables withdistributions Sm ¼

Pk Bðnm;k; pm;kÞ, where k is the number

of the mth zone node partitions with respect to thetransmission probabilities, 1 � k � nðAij;mÞ; while nm;k �1 with

Pk nm;k ¼ nðAij;mÞ and pm;k ¼ �m;k are the two

parameters of the corresponding Binomial distribution. Theresulting distribution can be both exactly calculated withrecursive methods and approximated efficiently withdistributions drawn from the Pearson family of continuousdistributions [39].

The lower bound for the link probability of receptionwould then become

PLBxi;xj¼ PrðS1 ¼ 0Þ

XM�1

iM¼0

PrðSM ¼ iMÞ

Xmaxð0;M�2�iM Þ

iM�1¼0

PrðSM�1 ¼ iM�1Þ . . .

Xmax 0;1�PM

n¼3in

� �i2¼0

PrðS2 ¼ i2Þ:

ð21Þ

The upper bound ((4) in Section 2) can be computed in asimilar manner.

Note that now the node cannot just be measuringcumulative traffic load in the radio medium, as (18)suggests. It rather has to keep track of the activities of theindividual nodes, which add to the complexity of therouting metric implementation.

REFERENCES

[1] IEEE 802.11, IEEE Standards for Information Technology, IEEE, 1999.[2] K. Jain, J. Padhye, V. Padmanabhan, and L. Qiu, “The Impact of

Interference on Multi-Hop Wireless Network Performance,” Proc.ACM MobiCom, pp. 66-80, Sept. 2003.

[3] D.S.J.D. Couto, D. Aguayo, J. Bicket, and R. Morris, “A High-Throughput Path Metric for Multi-Hop Wireless Routing,”Wireless Networks, vol. 11, no. 4, pp. 419-434, July 2005.

[4] R. Draves, J. Padhye, and B. Zill, “Routing in Multi-Radio, Multi-Hop Wireless Mesh Networks,” Proc. ACM MobiCom, pp. 114-128,Sept. 2004.

[5] J.W.Y. Yang and R. Kravets, “Designing Routing Metrics for MeshNetworks,” Proc. IEEE Workshop Wireless Mesh Networks (WiMesh),Sept. 2005.

[6] P. Gupta and P. Kumar, “The Capacity of Wireless Networks,”IEEE Trans. Information Theory, vol. 46, no. 2, pp. 388-404, Mar. 2000.

[7] C. Reis, R. Mahajan, M. Rodrig, D. Wetherall, and J. Zahorjan,“Measurement-Based Models of Delivery and Interference inStatic Wireless Networks,” Proc. ACM SIGCOMM, pp. 51-62, 2006.

[8] L. Qiu, Y. Zhang, F. Wang, M.K. Han, and R. Mahajan, “A GeneralModel of Wireless Interference,” Proc. ACM MobiCom, pp. 171-182,Sept. 2007.

[9] D.S.J. DeCouto, D. Aguayo, J. Bicket, and R. Morris, “A High-Throughput Path Metric for Multi-Hop Wireless Routing,” Proc.ACM MobiCom, Sept. 2003.

[10] G. Bianchi, “Performance Analysis of the IEEE 802.11 DistributedCoordination Function,” IEEE J. Selected Areas in Comm., vol. 18,no. 3, pp. 535-547, Mar. 2000.

[11] A. Kumar, E. Altman, D. Miorandi, and M. Goyal, “New Insightsfrom a Fixed Point Analysis of Single Cell IEEE 802.11 WLANs,”Proc. IEEE INFOCOM, vol. 3, pp. 1550-1561, Mar. 2005.

[12] D. Malone, K. Duffy, and D. Leigh, “Modeling the 802.11Distributed Coordination Function in Nonsaturated Heteroge-neous Conditions,” IEEE/ACM Trans. Networking, vol. 15, no. 1,pp. 159-172, Feb. 2007.

732 IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 10, NO. 5, MAY 2011

[13] K. Duffy and A. Ganesh, “Modeling the Impact of Buffering on802.11,” IEEE Comm. Letters, vol. 11, no. 2, pp. 219-221, Feb. 2007.

[14] A. Mathai, An Introduction to Geometrical Probability. Gordon andBreach Science, 1999.

[15] P. Nain, D. Towsley, B. Liu, and Z. Liu, “Properties of RandomDirection Models,” Proc. IEEE INFOCOM, pp. 1897-1907, Mar.2005.

[16] C. Bettstetter, G. Resta, and P. Santi, “The Node Distribution of theRandom Waypoint Mobility Model for Wireless Ad Hoc Net-works,” IEEE Trans. Mobile Computing, vol. 2, no. 3, pp. 257-269,July-Sept. 2003.

[17] Cisco Aironet 802.11a/b/g Wireless Card-Bus Adapter Data-sheets, http://www.cisco.com/en/US/prod/collateral/wire-less/ps6442/ps4555/ps5818/product_data_sheet09186a00801ebc29.pdf, 2007.

[18] T.S. Rappaport, Wireless Communications: Principles and Practice,second ed. Prentice Hall PTR, 2001.

[19] Madwifi, http://www.madwifi.org, 2010.

[20] M. Deziel and L. Lamont, “Implementation of an IEEE 802.11 LinkAvailable Bandwidth Algorithm to Allow Cross-Layering,” Proc.IEEE Wireless and Mobile Computing, Networking and Comm.(WiMob), vol. 3, pp. 117-122, Aug. 2005.

[21] G. Jakllari, S. Eidenbenz, N. Hengartner, S. Krishnamurthy, andM. Faloutsos, “Link Positions Matter: A Noncommutative RoutingMetric for Wireless Mesh Network,” Proc. IEEE INFOCOM,pp. 744-752, Apr. 2008.

[22] D.M.K.D. Huang, K.R. Duffy, and D.J. Leith, “Investigating theValidity of IEEE 802.11 MAC Modeling Hypotheses,” Proc. IEEEInt’l Symp. Personal, Indoor and Mobile Radio Comm. (PIMRC),pp. 38-49, Sept. 2008.

[23] C. Perkins and P. Bhagwat, “Highly Dynamic Destination-Sequenced Distance-Vector Routing (DSDV) for Mobile Compu-ters,” Proc. ACM SIGCOMM, pp. 234-244, Sept. 1994.

[24] M.K. Xu and S. Bae, “Effectiveness of RTS/CTS Handshake inIEEE 802.11 Based Ad Hoc Networks,” Ad Hoc Networks J., vol. 1,no. 1, pp. 107-123, July 2004.

[25] M.M.Z. Biacs, G. Marshall, and W. Riley, “The Qualcomm/SnapTrack Wireless-Assisted GPS Hybrid Positioning System andResults from Initial Commercial Deployments,” Proc. Int’lTechnical Meeting of the Satellite Division of The Inst. of Navigation,Sept. 2002.

[26] G. Judd and P. Steenkiste, “Using Emulation to Understand andImprove Wireless Networks and Applications,” Proc. IEEE Conf.Symp. Networked Systems Design and Implementation (NSDI),pp. 203-216, May 2005.

[27] Computer Engineering and Networks Lab, CommunicationSystems Group, ETH Zurich, http://www.csg.ethz.ch/people/parissidis/experimental-evaluation, 2010.

[28] J. Padhye, S. Agarwal, V. Padmanabhan, L. Qiu, A. Rao, and B.Zill, “Estimation of Link Interference in Static Multi-Hop WirelessNetworks,” Proc. IEEE ACM SIGCOMM Conf. Internet Measure-ment (IMC), pp. 1-6, Oct. 2005.

[29] R. Draves, J. Padhye, and B. Zill, “Comparison of Routing Metricsfor Static Multi-Hop Wireless Networks,” Proc. ACM SIGCOMM,pp. 133-144, 2004.

[30] G. Parissidis, M. Karaliopoulos, T. Spyropoulos, R. Baumann, andB. Plattner, “Routing metrics for Wireless Mesh Networks,”Handbook of Wireless Ad Hoc and Sensor Networks, Elsevier, 2008.

[31] R. Morris, E. Kohler, J. Jannotti, and M.F. Kaashoek, “The ClickModular Router,” ACM SIGOPS Operating Systems Rev., vol. 33,no. 5, pp. 217-231, Aug. 1999.

[32] J. Li, C. Blake, D.S.J.D. Couto, H. Lee, and R. Morris, “Capacity ofAd Hoc Wireless Networks,” Proc. ACM MobiCom, pp. 61-69, July2001.

[33] D. Tse and P. Viswanath, Fundamentals of Wireless Communications.Cambridge Univ., 2005.

[34] W.C.Y. Lee, Mobile Communications Engineering, second ed.McGraw-Hill Telecomm., 1998.

[35] O. Goussevskaia, M. Halldorsson, R. Wattenhofer, and E. Welzl,“Capacity of Arbitrary Wireless Networks,” Proc. IEEE INFO-COM, Apr. 2009.

[36] S. Kompella, J.E. Wieselthier, and A. Ephremides, “Multi-HopRouting and Scheduling in Wireless Networks Subject to SINRConstraints,” Proc. IEEE Conf. Decision and Control (CDC), Dec.2007.

[37] K.-H. Kim and K.G. Shin, “On Accurate Measurement of LinkQuality in Multi-Hop Wireless Mesh Networks,” Proc. ACMMobiCom, pp. 38-49, Sept. 2006.

[38] L.M. Feeney and M. Nilsson, “Investigating the Energy Con-sumption of a Wireless Network Interface in an Ad HocNetworking Environment,” Proc. IEEE INFOCOM, Apr. 2001.

[39] K. Butler and M. Stephens, “The Distribution of a Sum of RandomVariables,” Technical Report No. 467, Dept. of Statistics, StanfordUniv., Apr. 1993.

Georgios Parissidis received the diplomadegree in electronic and computer engineeringfrom the Technical University of Crete, Greece,in 2000, and the master’s degree in computernetworks from the University Paris 6, France, in2001. He is currently working toward thedoctoral degree at the Swiss Federal Instituteof Technology in Zurich (ETHZ), Switzerland,where he has been with the CommunicationSystems Group since 2002. His research inter-

ests include routing for wireless ad hoc networks and performanceevaluation of wireless networks. He is a student member of the IEEE.

Merkourios Karaliopoulos received the diplo-ma degree in electrical and computer engineer-ing from the Aristotle University of Thessaloniki,Greece, in 1998, and the PhD degree in broad-band satellite networking from the University ofSurrey, United Kingdom, in 2004. During 2006,he was a postdoctoral researcher in the Com-puter Science Department at the University ofNorth Carolina, Chapel Hill. He is a seniorresearcher in the Computer Engineering and

Networks Laboratory at the Swiss Federal Institute of Technology inZurich (ETHZ), Switzerland. His current research interests lie in thegeneral area of wireless networking with emphasis on routing andtransport protocol performance analysis and wireless network resilienceto node selfishness and misbehavior. He is a member of the IEEE.

Thrasyvoulos Spyropoulos received a diplomain electrical and computer engineering from theNational Technical University of Athens, Greece,in 2000, and the PhD degree in electricalengineering from the University of SouthernCalifornia, Los Angeles, in 2006. During 2006-2007, he was a postdoctoral researcher at INRIA,Sophia Antipolis, France. He is currently a seniorresearcher in the Swiss Federal Institute ofTechnology in Zurich (ETHZ), Switzerland. He

is a member of the IEEE.

Bernhard Plattner is a professor of computerengineering at the Swiss Federal Institute ofTechnology in Zurich (ETHZ), Switzerland,where he leads the communication systemsresearch group. He has been the principalinvestigator (PI) or co-PI of numerous nationaland international projects in the area of compu-ter networking. His current research interestsare in self-organizing networks, mobile ad hocnetworks, and practical aspects of information

security. He has also directed research on active networks, starting asearly as 1996, and multimedia applications for high-speed networks. In1996-1998, he served as the head of faculty of electrical engineering atthe ETHZ. He is currently the vice-rector at ETHZ for bachelor/masterstudies. He served as the program or general chair of variousinternational conferences, such as ACM SIGCOMM 1991, INET 1994,and IWAN 2002. He is a member of the ACM and the Internet Societyand a fellow of the IEEE.

. For more information on this or any other computing topic,please visit our Digital Library at www.computer.org/publications/dlib.

PARISSIDIS ET AL.: INTERFERENCE-AWARE ROUTING IN WIRELESS MULTIHOP NETWORKS 733