Scholarly article on topic 'Simulation of multi-radio multi-channel 802.11-based mesh networks in ns-3'

Simulation of multi-radio multi-channel 802.11-based mesh networks in ns-3 Academic research paper on "Electrical engineering, electronic engineering, information engineering"

Share paper

Academic research paper on topic "Simulation of multi-radio multi-channel 802.11-based mesh networks in ns-3"

0 EURASIP Journal on Wireless Communications and Networking

a SpringerOpen Journal

RESEARCH Open Access

Simulation of multi-radio multi-channel 802.11-based mesh networks in ns-3

Maryam Amiri-Nezhad1*, Manel Guerrero-Zapata1, Boris Bellalta2 and Lloreng Cerda-Alabern1


In the context of wireless network simulation, many simulators are capable of evaluating the performance of single-channel network protocols, but they need many modifications to be able to simulate multi-radio multi-channel networks. We address the problem of simulating channel assignment protocols for multi-radio wireless mesh networks in ns-3 simulator, providing the essential steps needed to simulate a channel assignment protocol. In addition, we explain the details of simulating the Semi-dynamic Interference aware Channel Assignment (SICA) protocol as an example. We use SICA as a reference to address the challenges of validating and verifying the simulation model. To validate the channel assignment model in SICA, we use mathematical validation based on Markov chains. Furthermore, we propose a novel automated test module to verify the simulation process.

Keywords: Network simulation; ns-3; Channel assignment; Mesh networks; Markov model; Validation; Verification

1 Introduction

Wireless mesh networks (WMN) will be the next self-configuring backhaul providing Internet access for last mile users through multi-hop forwarding (Figure 1). Mesh networks however suffer from wireless interference due to the broadcast nature of the wireless media that may degrade their performance significantly.

Multi-radio WMNs are able to offer higher network capacity using different non-overlapping channels provided by IEEE 802.11 standards in the unlicensed bands [1]. Although there are several non-overlapping channels available, the number of channels that can be used simultaneously by a single node is limited by the number of radio interfaces installed on the node. Therefore, a mechanism which selects the best channel, in terms of interference, among all available channels, is needed in order to achieve the maximum possible network performance.

Technical solutions for multi-hop wireless networks are being specified in IEEE 802.11s [2]. IEEE 802.11s is developed as an extension of the successful IEEE 802.11 standard for WLANs (wireless local area networks) [1].


1 Department of Computer Architecture, Universität Politecnica de Catalunya, Barcelona 08034, Spain

Full list of author information is available at the end of the article

IEEE 802.11s defines the mesh operation in a single channel although multi-radio mesh routers can form different meshes. The connection between different meshes is provided via bridging. Mesh routers can initiate the channel switching mechanism which moves the mesh, or part of it, to another channel. The routers which do not want to follow the channel switch request may join another mesh. Channel switching may help mesh routers to avoid the external interference but does not reduce the internal interference between routers which belong to the same mesh basic service set (MBSS), since it moves the MBSS to another channel. However, frequent channel switching may degrade the mesh performance due to the high overheads that it implies [3].

In multi-radio mesh networks, channel assignment (CA) is a mechanism which tries to find a feasible mapping between wireless channels and radio interfaces at each node with the aim of maximizing the capacity of the network.

A channel assignment solution must satisfy the following conditions to be feasible:

• The number of channels assigned to a node must be equal or less than the number of radio interfaces it has.

• The neighboring nodes must have at least a radio at a common channel to be able to communicate with each other.


© 2014 Amiri-Nezhad et al.; licensee Springer. This is an Open Access article distributed under the terms of the Creative Commons Attribution License (, which permits unrestricted use, distribution, and reproduction in any medium, provided the original workis properly credited.

Based on the time duration between consecutive runs of the channel assignment protocol, CAs are categorized as static, dynamic, and semi-dynamic [3].

Most of the CAs proposed in the literature fall into static category [4-13], where nodes tune their radios to certain channels permanently. Static CAs are easy to deploy but unsuccessful to cope with the changes in the wireless environment [4].

Dynamic channel assignments [14,15], on the other hand, enforce the nodes to switch their interface dynamically from one channel to another between successive data transmissions. Therefore, they require tight synchronizations among nodes. Dynamic approaches are only used for single radio nodes working over multiple frequencies, since they cannot exploit the advantages of multi-radio networks [3].

Static CAs can be easily extended to be semi-dynamic [16-26] if the node refreshes the channels assigned to the radios on a regular time period. Semi-dynamic CAs adapt fast to the changes in the traffic

pattern and the interference on the wireless medium from both internal and external sources. However, to maintain the network connectivity, neighboring nodes are supposed to share a common channel [16,27].

Hybrid CAs apply a semi-dynamic channel assignment to the fixed radio interface of each multi-radio node while the other radio is controlled dynamically. Wireless nodes which use hybrid CAs may not share a common channel with their neighbors, since the dynamic radio switches to the channel of the neighboring nodes to make the connection.

Implementing a multi-radio multi-channel mesh network is very challenging due to the following reasons:

• The transmitting and receiving antennas installed on a single mesh node should be separated enough to reduce the noise of the transmitter on its own receiver [27,28].

• The current 802.11 commodity devices suffer interference caused from non-overlapping

frequencies over each other due to lack of prefect filtering at the antenna [28].

• The media access control (MAC) layer of the IEEE 802.11 standard should be modified to support channel assignment mechanisms [3].

• The routing protocol must be modified to take the advantage of the underlying channel assignment [6,16,17,27].

Channel assignment mechanisms are usually evaluated via simulations due to the multiple considerations and complex scenarios required to evaluate them [7-10,13,22-25]. However, most of the current network simulators do not support multi-radio routers nor dynamic re-configuration of the radio interface, requiring modifications into their core level to allow the evaluation of CA mechanisms [29].

ns-3 [30] is a young simulator which allows the wireless mesh nodes to be equipped with more than one radio interface and makes it possible to change the frequency of the radio during the simulation run time. Although those features are necessary in order to simulate a multi-radio multi-channel network, they are not enough for simulating hybrid or dynamic CA mechanisms. Multi-radio mesh networks simulated in ns-3 based on the recently published standard, IEEE 802.11s [2], are assumed to share common channels. The ns-3 modules for IEEE 802.11s can be used to simulate static or semi-dynamic CAs, but they are insufficient for dynamic or hybrid CA. As in IEEE 802.11s, the peer links are formed over common channels, and the peer management protocol must be changed to be able to send beacons for neighboring mesh points which do not share any common channel. This modification is incompatible with the IEEE 802.11s standard which assumes that mesh points operate in a single channel [2]. According to the IEEE 802.11s standard, multi-radio stations form different meshes on different channels, which are unified in a single LAN using the layer 2 bridging. We consider the problem of simulating hybrid CAs without restricting our work to IEEE 802.11s mesh networks.

In this work, we show in detail how to simulate a hybrid channel assignment protocol using ns-3 simulator without any need to modify the simulator's source code (Section 2). This work is the first step in clarifying the necessary components and considerations for building a dynamic/hybrid CA in ns-3. Furthermore, we have also focused on the validation and verification mechanisms for simulation-based studies, which are the two aspects that have not yet been considered by the research community when it comes to implement the CA mechanism. We use the simulator version 3.9 released on August 2011. As a specific example, we present the simulation of the channel assignment proposed in [25,26] (Section 3). This example is used to explain the simulation verification and the

validation of the CA model (Sections 4 and 5). A brief summary of other CA protocols proposed in the literature which could also be implemented following the presented approach is described in Section 6, and conclusions are presented in Section 7.

2 Simulation components for multi-radio mesh networks

In this section, we introduce the required extensions to ns-3 simulator [30] for simulating hybrid CA mechanisms. These extensions include the basic functions on top of which the CA mechanism can be implemented, in addition to presenting how to simulate external interference for adaptive CAs.

2.1 Multi-radio wireless nodes

Multi-radio wireless mesh nodes are the required basic building blocks of the simulation scenarios. Figure 2 shows a wireless mesh node equipped with several radio interfaces.

The figure depicts a general cross-layer channel assignment protocol that interacts with the components of the simulation: traffic generators, routing protocol, and the channel sensing mechanism.

In Program 1, it can be seen how to make a multi-radio node (MRNode) in ns-3, where I is the number of radio interfaces which must be installed on a node. Note that in ns-3, a unique ID starting from 0 is automatically assigned to each radio interface.

d MRNode->AggregateObj^ the object to the node

Table 1 shows a sample configuration of the MAC and physical layers, which makes IEEE 802.11a-based radio interfaces. The radio propagation model is set to the fixed range propagation model with a maximum range equal to 250 m. We also define a single transmission rate equal to

6 Mbps for data and control packet transmission. Note that this configuration is not fixed and it can be set to any of the propagation and channel loss models that ns-3 supports [30].

Lines 8 and 9 of Program 1 show how any other object (CA mechanism, routing protocol, etc.) is created and aggregated to the wireless mesh node. Figure 3 shows the class diagram of a node in ns-3.

Sections 2.2.1, 2.2.2, and 2.3 provide a brief explanation of the components which must be added to the multi-

f N

Traffic Generator a-e o er

Routing/ Forwarding Protocol a-e >

Channel Sensing Mechanism a-e zr. 03' B g

V 1 a

Net Device • • • • Net Device

\ y

Channel Channel

Figure 2 Node object.

radio node to make it possible to simulate the channel assignment mechanism.

2.2 Network devices

2.2.1 Configuring the radio interface

ns-3 indicates each channel with a unique ID, which starts from 0. By default, the channel assigned to all radios in a node is set to 0. To re-configure the channel assigned to a radio interface, a node has to change the ID of the default channel in the physical layer of the radio interface. All channels in ns-3 are supposed to be non-overlapping.

Program 2 shows the process of assigning channel c to the first radio interface (netDevice) installed on MRNode.

Program 2 Assign channel c to a radio interface (netDcvice)

1 Ptr <NetDevice> netOevice= MRN«le->GetDevice (0) ///< Get the address of the

radio interface

2 Ptr <WifiNetDevice> wifiNetDevice=

3 netDevice—>GetObject<WifiNetDev ice >{)

■i Ptr<WifiPhy> netDevicePhyicalLayer - w ifi Ne tDe vice->GetPhy () ;///< Get the

access to the physical layer s if (! net Device PJiyical Layer—>lsStateBusy {) )

a netDevicePhyical Layer—>SetChannelNumber( c) ; !//< Change the channel of the

radio interface

T el se

9 Time delayToldle =

to net DevieePhy ica ILaye r —>Get Delay lint i I Id le () ; ///< Get the time left until

n Simulator^ Schedule (delayToldle ,&Switch I nte rface . this, c): ///< Schedule

the timer to change the channel later

Note that if the interface is busy due to sending or receiving, it is not possible to switch to another frequency. Program 2 checks the status of the device (line 5) before setting the new channel.

It is also possible to acquire the remaining time until the device gets idle (line 9) and set the channel afterwards (line 11).

2.2.2 Data service components

To transmit packets in a multi-radio multi-channel architecture, where wireless nodes use a dynamic or hybrid CA, some extra tasks must be done to acquire the channel on which the packets must be sent, in addition to computing the time for switching a radio interface to the desired channel. Figure 4 shows the main process that a node follows to deliver packets on the presented multiradio multi-channel architecture. It comprises three steps: destination channel query, time stamp assignment, and packet queueing.

Unlike single-channel networks, a node in a multichannel architecture needs to consider the possibility of having next hop neighbors on different channels. Therefore, to forward a packet, a wireless mesh node needs to

Table 1 Physical and MAC layer configuration

Parameter name Description Sample value

Standard MAC and physical layer standard ns3::WIFI_PHY_STANDARD_80211a

PropagationDelay The propagation delay between the specified source and destination ns3::ConstantSpeedPropagationDelayModel

PropagationLoss Modalize the propagation loss through a transmission medium ns3::RangePropagationLossModel

MaxRange Radio range 250 m

RemoteStationManager Data and control packets transmission rate ns3::ConstantRateWifiManager

Routing Port


Destination Channel Query

Time Stamp Assignment

Packet Queuing

tr h- ■

1—h CD O

i—h >

Figure 4 Data services for channel assignment mechanism.

know the channel on which it can send the packet, in addition to the address of the next hop mesh node.

The Destination Channel Query function finds the channel on which the packet must be sent. A Packet Queuing mechanism buffers packets and keeps them until the sender switches one radio interface to the corresponding destination channel. To avoid saturation in a given queue, the packets that have been waiting for a period of time exceeding a certain threshold are dropped from the queue. For such purpose, a time stamp is assigned to each new arriving packet and used as a reference to drop the packets.

a. Destination Channel Query: Multi-radio nodes keep the following information about their neighbors in addition to their address:

• The number of radio interfaces a node has

• The channel assigned to each radio interface

• At which time each node will switch from one channel to another

• At which time each node can receive packets on each channel.

The mentioned information is kept in the Neighbor Table. To forward a packet, a node gets the receiving channel of the next hop neighbor. With this information, the node can tune a radio to that channel and send the pending packets.

Nodes use control messages to update the information about their neighbors in the Neighbor Table. This is necessary for the adaptive channel allocation mechanisms, where a node changes the channel of its radio interface frequently.

Every time that a node informs its neighbors about switching the channel of its radio interface, the neighbors will update the entry in the Neighbor Table.

In a multi-channel architecture, nodes may need to monitor the available channels to acquire the list of busy channels. When forwarding a packet, the node should make sure that the receiver is not in the monitoring mode. Therefore, the node needs to keep the next monitoring period for all of its neighbors to avoid initializing any transmission.

Program 3 shows an entry of the Neighbor Table.

Program 3 Ail entry of tin' Neighbor Table

I si r net Neigh borTableEntry

a uint32_t mJd ; ///< The ID of the neighbor

1 uint32-t m_neigh borRadioNe f//< The number of radio interfaces that the

uint32.tB m.neighborChannel : ///< The channel uied by neighbor's radio interface

s Address m-Addr //< MAC address of the neighbor's radio interface t Time m.switchTime; ///< Shows the remaining time that a neighbor stay on the current channel

a u ■ ■■ 13 2 _ I m_neighbor N ewCha nne ; ///< New channel for the receiving radio o Time m.monitorTime; ///< Shows the remaining time until the neighbor starts

10 Time rn.updateTTme , ///< Tims stamp, which shows the moment that the

Information is updated

11 bocl close ; ///< If the entry expired or not

b. Time Stamp Assignment: Nodes must time stamp the packets waiting to be sent over a certain channel; in case the destination channel is busy, the older packets must be discarded to avoid saturation. Therefore, it is possible to control the length of the buffers.

The time stamp assigned to each packet is equal to the time at which the packet was received from the routing agent (Tenqueu(p)). We define Twait(p) as the maximum amount of time that a packet is allowed to stay in the buffer before it is transmitted over the wireless media. To remove the old packets, a node checks the current time of the system (Tcurrent) and deletes those packets that

Tcurrent > Tenqueu (p) + Twait(p).

To avoid the queues from getting saturated in high traffic rate, nodes may select a smaller value for Twait(p).

c. Data Queuing: In multi-radio multi-channel networks, the number of available frequencies is bigger than the number of radio interfaces at each router (|C| > I). Therefore, the neighboring nodes may set their antennas over different channels. A wireless mesh node which has traffic for more than one neighbor, might need to switch to different channels to be able to deliver its packets to the next hop. During the time that a node transmits data over a channel, packets destined for other channels must be buffered to be sent later.

We create sequential first-in, first-out queues for buffering packets in ns-3 for different channels. Each queue corresponds to one of the available channels. The defined queues have the ability to eliminate the old packets automatically as described in Section 2.2.2.

Table 2 shows the fields of each element of the queue with a brief description.

2.3 External interference and channel sensing

Simulating two separate wireless networks which interfere with each other is not possible in ns-3. Different wireless networks simulated in the same scenario do not have any effect over each other since ns-3 treated them separately.

For an adaptive channel assignment, we have a scenario where each channel is occupied by different amounts of interference. Nodes estimate the amount of interference through sensing or monitoring all channels at the

same time [16,22]. Simulating this scenario is possible only if the interference threshold is set separately for each channel.

To simulate the external interference in ns-3, we can consider the external interference as it was noise, and therefore, we can model it by properly adjusting the noise figure and the error rate parameter for each radio interface [30]. However, using this approach, we are not able to differentiate between the signal propagation, the noise effects, and the external interference, which introduces an unnecessary complexity to understand the results, as we can simply avoid by developing an independent module.

Therefore, to simulate the external interference on wireless channels, we have created an Interference Emulator for each channel (Program 4). The Interference Emulator is based on a semi-Markov model of the possible channel status (Figure 5), where the status of a channel is considered as either Busy or Idle. The expected idle duration (Tidle) of a random variable that follows an exponential distribution with rate ¡x is given by

Fta (t) = 1 - e-xt. (1)

The emulator keeps the channel Busy for a predefined period of time (BusyDuration) according to IEEE 802.11k [31]. The duration of Idle state is determined using an exponential random variable with the mean equal to MeanIdleTime.

In the constructor (line 8 of Program 4), a timer is initialized to call the ChangeStatus function when it expires. Initially, the delay of the timer is set to an exponentially distributed random variable with the mean equal to MeanIdleTime ms.

ChangeStatus changes the status of the channel from Idle_State to Busy_State or vice versa. It sets the timer to BusyDuration after setting the channel status to Busy_State. Whenever it changes the channel status to

Figure 5 Channel status.

Table 2 Packet buffer elements

Element Description

Packet type The type of the packet: data or control

Packet A pointer to the packet

Expire time The time at which the packet expires and should be


Idle_State, it sets the timer to a randomly selected duration.

To monitor a channel, a node checks the Interference Emulator Status attached to the channel during the sensing period.

The amount of interference over a channel, induced by an external network, can be varied by setting different values for MeanIdleTime and BusyDuration.

2.4 Routing modifications

When simulating multi-radio multi-channel WMNs, considering a proper routing protocol is challenging. The routing has to be considered as a joint problem with the channel assignment [16,18-20], since any change in the channel radio mapping affects the quality of the links between nodes and may trigger the routing protocol to reroute the traffic. On the other hand, the changes in the traffic pattern have an impact on the next decision of the channel assignment protocol. Therefore, the routing protocol and the routing metric must be modified to adapt to the channel assignment [6,32].

In ns-3, the available routing protocols are not applicable for multi-radio wireless networks when using dynamic or hybrid channel assignment. Nevertheless, as we are only focusing on fixed WMNs, where nodes are fixed or have limited mobility, the static routing is a simple way to avoid complexity related to the dynamic routing protocols. The global routing simulated in ns-3 provides static routing only for wired networks by filling the routing tables at the beginning of the simulation. In the case of wireless networks, there is no static routing since the topology of a wireless network is determined by the propagation model and other parameters at run time [30].

Therefore, we have attached a static routing table to each node and initialized it using Shortest Path First (SPF) algorithm, minimizing the number of hops between each node and any other destination. Each node knows about the next hop node on the paths to all other nodes in the network. Program 5 shows an entry of the Routing Table. The routing table includes channel information of the next hop nodes. This will give flexibility to routing protocols which apply channel information in the metrics [6]. It is also very useful when the next hop node has more

than one receiving radio, and hence, it is accessible over multiple channels.

The Routing Table can be filled either using a file containing all shortest paths between all nodes or during the simulation using route request messages. We have used a file which is filled by R numerical tool [33] feeding the position of nodes in the network.

The routing header which is attached to each packet has the following elements:

• Sequence number

• Node ID of the source

• Node ID of the destination

• Node ID of the next hop device to the destination

• The time of originating the packet.

The relay nodes on the path from the source to the destination update the ID of the next hop node in the header and forward the packet.

2.5 Synchronization

In a dynamic or hybrid CA, the synchronization can be achieved through exchanging messages either using a fixed radio over a common channel or using the data channels. Since each node assigns a channel to its receiving radio which differs from its neighbors, nodes must be aware of the channels which are being used by their neighbors and any upcoming switching to the new channel, in case of using adaptive CAs. Moreover, if nodes sense the medium to detect the external interference, they must be aware of the sensing period of their neighbors to avoid initiating any transmission on the same channel that is being sensed for detecting external interference.

We use the term event to refer to upcoming switching a channel or sensing a channel event.

We use control messages to make nodes aware of upcoming events. The key point is, instead of reporting the time of each event, nodes report the remaining time slots until the event. Neighboring nodes upon receiving the message add the time slots reported in the received control message to their local time to acquire the time of each event.

To reduce the delay of receiving a control message, which may affect the calculation, the control messages have to get the highest priority to be transmitted along other messages.

This method works fine in ns-3, and nodes are able to synchronize the events with their neighbors.

3 An example of CA implementation: SICA

In this section, we provide a brief explanation about Semi-dynamic Interference aware Channel Assignment (SICA) mechanism as presented in [25,26]. We explain in detail how each component of SICA is implemented in ns-3. Notice that, in Sections 4 and 5, we tackle the challenge of validating and verifying the simulation model for SICA. We introduce a novel Markov model to validate the SICA results from the theoretical point of view. We also develop a new automated test module to verify the implementation of SICA in the simulator.

Figures 6 and 7 show the class diagram and the collaboration diagram of using the defined classes to model a channel assignment protocol. In the following section, we show with more detail the simulation of a channel assignment mechanism, called SICA, in ns-3 using the components introduced before. Moreover, we provide the details of some important process regarding the Data Forwarding and Channel Selection.

SICA is a protocol proposed and simulated in ns-3 for wireless mesh networks [25,26]. The source code of SICA is available and can be accessed at [34].

SICA is implemented in a network where nodes are equipped with two radio interfaces; each one is able to use a set C (with cardinality |C| > 1) of non-overlapping

channels. The radios will be referred to as the receiving radio and the transmitting radio, and denoted by R and T, respectively.

The aim of the channel assignment mechanism is to select the channels which suffer less interferences in terms of both internal and external interference. The channel assignment mechanism selects and assigns a channel to the R radio of each node. Then, the node switches the T radio according to the receiving channel of its neighbors to start transmission. After a channel switch, the T radio remains on the same channel until all packets, which are addressed to the same destination node, have been sent or until a maximum period of time has expired [25].

Nodes estimate the amount of external interference on a channel via sensing the channel. Then, they use control packets called Hello to exchange channel sensing information and inform their neighbors about upcoming interface switching for the receiving radio (R).

3.1 External interference estimation

Using the Channel Emulators (Section 2.3), the status of a channel can be monitored as Busy or Idle. Each node monitors the channel's status for its receiving radio (R) once in each sensing period of length TSS seconds. For monitoring a channel c, the node checks the status of the corresponding Channel Emulator (ce) at a pre-defined rate (TSRate).

At the end of the monitoring period, the node estimates the amount of external interference over a channel (Bext) using Equation 2.

Bext(c) =---(2)

Tbusy (c) + Tidle (c)

Tbusy and Tidle show the duration of the Busy and the Idle states, respectively.

Note that each node senses only one channel during the monitoring period. It then sends this information to its neighbors, and as its neighbors do the same, it gathers information about other channels via the control packets received from its neighbors (see Section 3.3).

The internal interference is estimated based on the Interference Protocol Model proposed in [35]. Each node is informed by its neighbors about the current channel of their receiving radio. Therefore, a node i can calculate the number of neighboring nodes over channel c (Ri(c)). Then, the node estimates the density of interfering nodes on channel c by ^^ where Ni represents the total number of neighbors of node i.

In SICA, nodes use the average of the estimated external and internal interference over a channel as a metric to select a channel that has more available capacity.






m\_delay m\_delayLefp




SwitchingDelay ChannelSenseRate ChannelBusyBackoffTime

ChannelSensePeriod ChannelAssignmentInterval HelloInterval

m\_switchTimer m\_CATimer m\_helloTimer m\_channelSenseRateTimer m\_channelSenseTimer


ns3::ChannelEmuContainer -<

Figure 7 Collaboration class diagram of the CA class.

3.2 Channel selection mechanism

The channel selection mechanism is developed as a repeated game which uses the interference estimation information and selects the best possible channel for the receiving radio of a node.

Initially, the channel selection mechanism calculates and assigns a weight to all available channels based on the amount of internal and external interference estimated over a channel. Then, the weights are updated using the multiplicative weight update technique proposed in [36,37].

We define wt (c) as the weight assigned to channel c at time t. The channel assignment computes the probability of selecting a channel as

Program 6 Channel Selection Mechanism

Pt (c) =

wt (c)


wit (c) = wit-1(c)Mc),

where Mi(c) is the loss suffered by node i considering the external and internal interference over channel c [25], and j is the game parameter in the range of (0,1) [37].

Then, SICA selects a random channel considering the probability of each channel as shown in Program 6.

Initially, all weights are set to 1; thus, the probability of selecting any channel is identical. After selecting a channel, the node gathers information from its neighbors and updates the loss that it suffered. Then, the weights are updated as follows:

uini32_t SelectRandomChannel ( std ;: vector <uint32.i > channels) {

/// channels contains the list of available channels

std :: vector<double> prob; ///< A vector to keep the probability of selecting any channel

std :: vector<double> weight;///< A vector to keep the weights assigned to each channel

std :: vector<double> cProb;///< A vector to keep the cumulative probability of channels

EmpiricalVariable emRnd;///< An empirical random variable to select a random

number based on cumulative probabilities double total We ight =0: double tempW;

/// read the weights of channels

for ( std : : vector<uint32_t >:: iterator l=channels . begin (); i !=channels. end (); -h-¡)

tempW=m_channel GetChannelWeight(* I); weight push-back(tempW) ; total Wei ght+=tempW:

for (uinr32_t i =0; i<weight. si2e (); i++)

prob push_back( weight [ i ]/total Weight );///< Compute the probabilities using the weights

sort(channels.begin() .channels end () , CompareChannelsWeight(* this)): ///< Sort

channels considering their weights sort ( prob . begin (),prob .end ()):///< Sort the probabilities

cProb=Com puteCumulativeProbability ( prob) ; ///< Adds up the probabilities to

have the cumulative probability vector for (uint32_t i=0; i< cProb . size (J ; •++>

emRnd . CDF( i . c Prob [ i J);///< Feeds the probabilities to the random variable return channels (emRnd . Getlnteger() ]; ///< Select a random channel considering the assigned probabilities

Program 6 computes and sorts the probability of selecting a channel according to Equation 3 (lines 11 to 18 and line 20). Then, it sorts the list of available channels based on the weights (probabilities) assigned to each channel (line 19). Line 21 computes the cumulative probability vector by adding up each probability value with all probabilities lower than it. Then, the probabilities are fed to the empirical random variable generator (lines 22 and 23) which generates a random number as an index for the available channels' list (line 24 of Program 6).

3.3 Control packet elements

Unlike most CAs proposed in the literature [16,20,22], in SICA, there is no common control channel shared

by all nodes. In SICA, the synchronization is achieved through exchanging packets over the data channels. Since each node can assign a different channel to its receiving (R) radio, nodes must be aware of the channels used by their neighbors' R radios. In SICA, a node broadcasts Hello packets to report the channel of its R radio to its neighbors. Figure 8 shows the content of a Hello packet.

In addition to the receiving channel announcement, Hello packets are used to inform about the channel sensing information and the receiving channel of the neighboring nodes, so a node can compute the external and internal interference for each channel. In order to do that, there is a field in each packet which contains the amount of external interference over the receiving channel estimated by the node. The number of neighbors and the channels of their receiving radio is also added at the end of each Hello packet.

The remaining time before a node switches its R radio to another channel and the remaining time before the node starts sensing the current channel are also announced via Hello packets. The announcements inform the neighboring nodes about upcoming channel switching or sensing events.

3.4 Data and control transmission

For each channel c e C, SICA maintains two sequential first-in first-out queues for buffering packets (Section 2.2.2): control packet queue (Qctrl(c)) and data

packet queue (Qa(c)). Qctrl(c) has higher priority than Qd(c). The source and each node in the middle of the path to the destination push each packet to the corresponding queue attached to each channel. Each packet is time stamped when it is pushed to the queue. Using the time stamp as a reference, packets that remain in the queue for a longer time than a certain threshold are discarded to avoid saturation (see Section 2.2.2).

When the transmitter radio switches to a channel, it fetches the stored packets from the queues and sends them until there is no packet left in the queues or until a maximum amount of time has elapsed [25]. Program 7 shows how packets are sent over a channel c.

Program 7 Send packets over channel c

i uint32_t helloQueueSlze=QCir.[. GetSize (c);///< Get the size of the queue which

keeps control messages 7 uint32_t dataQueueSize=<?,j. GetSize(c) :///< Get the size of the queue which keeps dais messages

3 Time txEstimation = EstimateTxDuration (maxPacketSize , wifi phy);

4 while (( helloQueueSize >0 || dataQueueSize>0 )&& TlnterfaceReadyToSend(c .

txEstimat ion })

e if ( helloQueueSize >0)

a protocolNumber=SICA_HELtO.PORT;///< Set the port number to control port


o qEntry=<3c<w , Dequeue (c);///< Fetch a queue entry of a control message

n else

13 protocol N um ber=SICA.OATA.PORT;///< Set the port number to data port


14 qEntry=Qj . Dequeue( c); ///< Fetch a queue entry of a data message }

16 if ( qEntry)

is SendPacket(qEntry—>GetPacket()->Copy() . m_rl nterface , protocolNumber); ///<

20 helloQueueSize=Qf(H . GetSize(c):

21 dataQueueSize=Qj. GetSize(c) :

0 0 1 2 3 4 5 6 7 1 8 9 0 1 2 3 4 5 2 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 __1___1___1___1___1___1___1___1___1___1___1___1___1___1___L 3 1

t^ t^ t^ t^ t^ t^ t^ t^ t^ t^ t^ t^ t^ 1 I i---i---i---i---i---i---i---r Hello Sequence Number __I___I___I___I___I___I___I___I___I___I___I___I___I___I___I___I___I___I___I___I___I___I___L

--i---i---i---i---i---i---i---i---i---i---i---i---i---i---i---i---i---i---i---i---i---i---r Originator Node ID __1___1___1___1___1___1___1___1___1___1___1___1___1___1___1___1___1___1___1___1___1___1___L

--i---i---i---i---i---i---i---i---i---i---i---i---i---i---i---i---i---i---i---i---i---i---r Hello Originator Time __1___1___1___1___1___1___1___1___1___1___1___1___1___1___1___1___1___1___1___1___1___1___L

Numboer Of Radios Receiving Channel (C) 1 1 1 1 1 1 1 T 1 1 1 1 i---1---T Busy Duration Over C Next Receiving Channel __1___1___1___1___1___1___1___1___1___1___1___1___1___1___L

t^ t^ t^ t^ t^ t^ t^ t^ t^ t^ t^ t^ t^ 1 I i---i---i---i---i---i---i---r Receiving Radio MAC Address (Part 1) __1___1___1___1___1___1___1___1___1___1___1___1___1___1___1___1___1___1___1___1___1___1___L

—i---i---i---i---i---i---i---i---i---i---i---i---i---i---i---i---i---i---i---i---i---i---r Receiving Radio MAC Address (Part 2) __1___1___1___1___1___1___1___1___1___1___1___1___1___1___1___1___1___1___1___1___1___1___L

i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i Remaining Time Before Switching To New Channel _l___|___|___|___|___|___|___|___|___|___|___|___|___|___|___|___|___|___|___|___|___|___i___i___|___i___i___i___|___|___|___

+---i---i---i---i---i---i---i---i---i---i---i---i---i---i---i---i---i---i---i---i---i---i---i---i---i---i---i---i---i---i-- Remaining Time Before Sensing Current Channel j___i___i___i___i___i___i___i___i___i___i___i___i___i___i___i___i___i___i___i___i___i___i___i___i___i___i___i___i___i___i___

Number Of Neighbors Receiving Channel -1 1 1 1 1 1 1 1 1 -1 1 1 1 1 1 1 Receiving Channel -2 Receiving Channel -3 __i___i___i___i___i___i___i___i___i___i___i___i___i___i___i___

t^ t^ t^ t^ t^ t^ t^ t^ t^ t^ t^ t^ t^ 1 I i---i---i---i---i---i---i---r Neighbor 1 Node ID __I___I___I___I___I___I___I___I___I___I___I___I___I___I___I___I___I___I___I___I___I___I___L

--i---i---i---i---i---i---i---i---i---i---i---i---i---i---i---i---i---i---i---i---i---i---r Neighbor 2 Node ID (if exist) __1___1___1___1___1___1___1___1___1___1___1___1___1___1___1___1___1___1___1___1___1___1___L

--i---i---i---i---i---i---i---i---i---i---i---i---i---i---i---i---i---i---i---i---i---i---r Neighbor 3 Node ID (if exist) __1___1___1___1___1___1___1___1___1___1___1___1___1___1___1___1___1___1___1___1___1___1___L

Figure 8 Hello packet elements.

TInterfaceReadyToSend (line 4) is a function which gets the ID of the channel and the estimation of the required time to send a packet by the T radio and checks whether it is possible or not to send a packet over the channel.

In the following cases, the TInterfaceReadyToSend returns False, which prevents the node from sending packets over channel c:

• The channel is being sensed by any of the neighbors.

• The channel is busy due to the external interference.

• The T interface did not switch to the channel successfully.

• The estimated transmission time is less than the remaining time over the current channel.

4 Validating the game model

Model validation deals with building the right model. It is the process of determining whether a simulation model is an accurate representation of the system. Validation can be obtained based on mathematical proof of correctness by comparing the results of the model with other models [38,39].

The channel assignment in SICA is modeled as a repeated game, where nodes compete to occupy the most vacant channel (as explained in detail in Section 3.2). The game is played repeatedly in a sequence of game rounds. In each round, the player plays a mixed strategy based on the weights assigned to each channel.

In the following section, we use a Markov chain model to prove that the results of the game are consistent with how the system operates. Moreover, the model comparison makes it possible to find under which conditions the game converges to a steady state and which parameters have greater effect on the performance.

We simulate the game model using R numerical tool [33] and compare the result with the results obtained using the Markov model to compute the probability of selecting channels.

We define the process of selecting a channel for a radio interface at each node as a Markov chain.

Figure 9 shows the Markov chain that models how a node selects the channels. The channel set (strategy set) was mapped to the state space of the Markov model. The payoff Pi = 1 — Mi is considered as the reward for the transition between channel c and c by node i.

The probability of having a node at any of the state is given by the Boltzmann distribution [40,41]. Equation 5 shows the transition probability from state c to c, which is related to the reward of the destination channel normalized by the total reward of all channels:

Here X is the learning parameter which means that small values of X enable the player to choose the optimal strategy more accurately. For our model, we define X = 1 — j , where j is the learning parameter used for the game model of SICA (see Section 3).

Using the R tool, we have simulated the game-based learning algorithm of SICA for a node. We define p as the final probability vector of selecting each channel equal to the mixed strategy vector obtained for the node. We compare p, obtained for different rounds of SICA algorithm, with stationary channel transition vector p, obtained from the Markov model (Figures 10 and 11). Moreover, we run SICA in ns-3 simulator and report the probability distribution of selecting channels over 200 s of simulation run. (Figures 12 and 13).

Figure 10 shows the probability of selecting a channel at each node. For clarity, we show the available bandwidth of each channel with a red line at the same figure with the probability distribution of selecting a channel. As shown, the available bandwidth in each channel decreases linearly from channels 1 to 8. The right y-axis shows the available bandwidth related to the total bandwidth of a channel, while the left y-axis shows the probability of selecting the channel.

Figure 10 shows that the weighted learning algorithm matches quite closely the result from solving the Markov model after 100 rounds for j = 0.9.

We examine SICA and the Markov model for the case that 50% of the channels (channels with the IDs from 5 to 8) are occupied by the external interference. The interference occupies 80% of the bandwidth of those channels, while channels with the IDs from 1to4 are almost free.

Figure 11 shows that in this specific scenario, when the decision about selecting the best channels is more clear, the learning algorithm of SICA converges to the Markov solution much faster, in this case only after 15 rounds.

The other technique for validating a model is showing the model operation behavior over time [38]. To study the behavior of SICA over time, we simulate SICA using ns-3 simulator for a grid network of size 5 x 5 nodes and 2

Qi,cc —

Ml k€Ce "

CBR traffic flows of 100 kbps. The results are obtained averaging over 10 simulation runs, and the error bars show the 90% confidence interval.

Figure 12 shows how the probability of selecting a target channel changes over time, when a different amount of external interference is introduced on each channel. Specifically, the channel with the higher ID suffers more external interference. The figure shows that the nodes tend to select the channel which offers more bandwidth, which is the expected behavior of any CA.

Figure 13 shows the average probability of selecting each channel over time when the external interference is introduced on the first four channels (channels with the IDs from 1 to 4) while other channels are free. The figure

shows that the probability of selecting any of the busy channels tends to 0 over time, while the probability of selecting any of the free channels (channels with the IDs from 5 to 8) increases to 0.25 which confirms the results shown in Figure 11. Moreover, it can be observed how SICA achieves a proportional utilization of the four free channels.

5 Verifying the simulation model

Model verification ensures that the computer programming and implementation of the conceptual model are correct [38]. Assertion checking is one of the dynamic verification techniques for simulation model. Unlike the static techniques which analyze the program to

„ 0.9 -

§ 0.8 -

u 0.7 -£

j» 0.6 -

Ja 0.5 -

'S 0.4 -

a 0.3 -

3 0.2£

Channel Avaliability

1 Rounds

- A- 15 Rounds

20 Rounds

-X- 50 Rounds



-0-— —---- —a>

A- - - - - - A - - - - - - À - - - - - -A-


Channels' ID

Figure 11 The probability of selecting a channel where only 50% of the channels are free.

- 0.6 - 0.5

- 0.4 -a

- 0.3 „

h 0.2 S

- 0.1 < - 0

10 30 50 70 90 110 130 150 170 190

Simulation Time (s) Figure 12 The probability of selecting a channel for a node overtime.

determine if it is correct (syntax analysis), dynamic verification deals with checking the correctness of the values which are obtained after executing the program [38,42].

To verify the simulation in ns-3, we design a state space explorer (SSE) which is invoked by the major events that happen in the simulations and performs state checking to verify the correctness of the simulation.

We assume that the simulation, as a system, consists of a group of entities joined together to accomplish the packet delivery goal and hence virtually represents the operation of the real system.

We consider each radio interface as an entity with the following attributes:

• The frequency channel it is using

• The number of packets it has received

• The number of packets it has sent

• The number of packets it has dropped.

The State of the system (st) is the complete description of the system at any time which includes all entities and values of their attributes. We consider those

s 0.3 -

£ 0.2 H

_e— Channel 1

-A- Channel 2

Channel 3

-X- Channel 4

Channel 5

-v- Channel 6

-B- Channel 7

-*- Channel 8



10 30 50 70 90 110 130 150 170 190

Simulation Time (s)

Figure 13 The probability of selecting a channel for a node over time where only 50% of the channels are free.

attributes which are relevant to the objective of interest. st represents a function of all entities which assigns a value to all attributes. We consider that f contains all possible states of the system and call it state space.

The Event (et) is any occurrence which changes the state of the system. In our model, we consider the following events:

• Sending a packet (Send, unconditional event)

• Receiving a packet (Receive, conditional, et = Receive| et0 = Send t0 < t)

• Dropping a packet (Drop, conditional, et = Dropl et0 = Send t0 < t)

• Changing the channel of the radio interface (Channel Change, unconditional event).

We define E as the set containing all above events. The first three events occurred between two entities: the sender and the receiver.

An Assertion is a property which must be held for all states of the system to be able to prove the correctness of the simulation.

For the simulation of the channel assignment protocol, we define the following assertions:

• Only one channel must be assigned to a radio. In a hybrid CA, after assigning a channel to a radio, the radio may not switch immediately to the new channel since the node must inform the neighbors about the upcoming switching. Moreover, if a radio is receiving data, the node will not switch until the end of the data transmission. Therefore, CA must avoid assigning a new channel to a radio before the previous channel assignation took effect.

• There must be a common channel between the sender radio and the receiver radio at any given time. In dynamic and hybrid CAs, the data transmission mechanism must be sure that the radios of the nodes are tuned to the same channel before the transmission starts. This must be achieved through an appropriate synchronization and switching mechanism.

We have designed SSE in ns-3, which starts from the initial state of the system and reaches the successor state following the simulation events, and checks for any violation from the assertions.

s0 is defined as the initial state of the simulation. We define s as explored by so if s is the successor state of the system after the triggering event e (e e E), and we notate it as s0 A s. The event handler is triggered by any of the events in E, and it calls the state control procedure to check the assertion of the successor event.

fi,c is defined as the number of receiving radios of node i which are tuned to channel c. For any node i, the assertion condition is

jyik = Ii, Vi e N, (6)

where Ii represents the number of radio interfaces of node i.

For any transmission pairs (i, j), the assertion condition

3c e C , fif = 1. (7)

Algorithm 1 shows the state check algorithm which is triggered by sending, receiving, or dropping packet events and checks if any violations happen from the assertions.

Algorithm 1: StateCheck1 (St, et-i, P) Input: The current state of the system at time t (St), the last event which moved the system to state St (et—i), and the pointer to the packet in the case of sending and receiving events (P) Output: Whether the assertion holds or not if St == S0 then | exit(0); end else

src=et—1— > Sender(); dst=et—1— > Receiver(); for each channel cinC do iffsrc,cfdst,c then

Write( 'Assertion holds'); exit(0); end end

Write(Assertion violated'); exit(1); end

Algorithm 2 shows the process of checking a Channel Change event. The state checker gets the node which selects the new channels and checks whether the number of channels selected by the node is equal or less than the number of radio interfaces it has. In SICA, each node selects only one channel at a time and all nodes are equipped with two radio interfaces; thus, the violation from the assertions never happens for the Channel Change events.

Algorithm 2: StateCheck2 (St, et-i) Input: The current state of the system at time t (St) and the last event which moved the system to state St (et-i) Output: Whether the assertion holds or not if St == So; then | exit(0); end else

N =et-1- > Node();

C=N- > Channels() ;

I=N — > Radios();

if C <= I then

Write('Assertion holds'); exit(0);

Write(Assertion violated');

exit(1); end

Figures 14 and 15 are obtained running State Space Check algorithm (Algorithm 1) for checking the simulation events of SICA. The simulation parameters are the same as the parameters considered for Figure 13.

Figure 14 shows the state space control for Send, Receive, and Drop events. The figure depicts the number of events that happened during 2oo s of simulation run and the number of events for which the assertion holds. The figure shows that SICA does not violate any of the assertions.

Figure 15 shows the number of packets which have been sent, received, or dropped on each channel when the external interference is introduced over channels with the IDs from 1 to 4. The figure confirms that SICA makes the network use the capacity of the free channels efficiently.

Figure 16 shows the average number of radio interfaces over each channel during the simulation time. Note that the simulation parameters are the same as those in Figure 15. The figure shows that the number of radio interfaces over the set of channels that are occupied by external interference decreases over time. It proves that the channel assignment successfully detects and avoids the channels which are occupied by external interference as it is expected.

Figure 17 shows the average number of packets (with a size of 1 kb) in each data queue over the time. The figure shows that the proposed data delivery mechanism ensures that the number of waiting packets in each channel is lower than the default maximum queue size in ns-3 (100 packets) [30]. In addition, the maximum number of packets waiting in a queue at the beginning of the simulation (marked in red), happened over those channels that are kept busy by external interference.

6 Related work

Channel assignment is a problem that must be solved toward the implementation of wireless mesh networks, and it has been studied extensively during the last years. Although many solutions have been considered for channel assignment [3-13,16-24,43-47], few proposals are adaptive to the changes in the wireless environment such

6000 -

5000 -

4000 -

3000 -

2000 -

1000 -

□ Send

□ Receive

□ Dropped

■□. Od,

Channels' ID

Figure 15 Number of events over each channel.

as the interference induced from other wireless networks [16,22,25,48].

The first interference aware CA mechanism is Breath First Search Channel Assignment (BFSCA) [16]. BFSCA is a priority-based and centralized algorithm which assigns better channels to the links that are close to the gateway. The channel assignment assumes that there is a common channel between nodes for coordination. Another relevant adaptive and semi-dynamic CA proposal is Urban-X [22]. Urban-X is a traffic and interference

aware CA which relies on a common channel between nodes for exchanging control packets.

Semi-dynamic Interference aware Channel Assignment (SICA) [25] is a game-based CA mechanism that considers both the internal and external interference. SICA is distributed and assumes that in wireless networks, nodes do not have perfect information about their neighbors. This is the main contribution that differentiates SICA from other game-based CAs [24,49-55]. Moreover, nodes do not need to tune one

radio interface over a common channel. The implementation of SICA in ns-3 has been detailed in the previous section.

Simulating SICA and any other hybrid or dynamic CA in the current network simulators needs some general components which are missing in all simulators. The necessary modifications for ns-2 simulator [56], for evaluating multi-radio wireless networks, are presented in [29]. The manual is restricted to the static channel assignment, which assigns a channel to the radio interface of a node before the simulation starts and keeps the configuration until the end of the simulation. Unlike the previous work, we provide the essential steps toward simulating channel assignment protocols in ns-3 simulator in this paper, including the validation of the game model used in SICA with a Markov model.

Furthermore, to the best of the authors' knowledge, this is the first time that the correctness of the channel assignment simulation is controlled through checking the simulation events.

7 Conclusions

In this paper, we have presented the extensions which must be done in ns-3 simulator to simulate channel assignment mechanisms for multi-radio wireless networks. We provided the simulation details of the Semi-dynamic Interference aware Channel Assignment (SICA) mechanism which is proposed in [25,26]. In addition, the source code of SICA is published and available in [34]. We also tackled the challenge of testing the simulation model in channel assignment protocols by using SICA as

an example. We proposed a new Markov model and an automated test algorithm.

We verified the simulation of SICA using a novel state space checker which checks the relevant simulation events for any violation from the feasibility conditions of channel assignment solution. The results prove the correctness of the simulation and show that SICA is capable of utilizing the channels in a fair and efficient way. Moreover, we justified the results obtained by the game theory-based model of SICA, using a new Markov chain model.

In the future, we plan to expand our implementation by improving the data delivery mechanism to incorporate differentiated priority scheduling, such that higher priority traffic can be transmitted in preference to lower priority traffic. It is also desired to consider traffic rate adaptation for channel assignment in addition to designing a method to avoid saturation of data queues for high rate traffic. We also plan to investigate the necessary modifications to the routing protocol for making it able to work along hybrid channel assignment protocols.

Competing interests

The authors declare that they have no competing interests. Acknowledgements

This work has been partially supported by the Spanish Government under project TEC2012-32354 (Plan Nacional I+D) and TIN2013-47272-C2-2, and by the Catalan Government (SGR-2014-1173 and SGR-2014-881).

Author details

1 Department of Computer Architecture, Universitat Politecnica de Catalunya, Barcelona 08034, Spain.2Department of Information and Communication Technologies, Universitat Pompeu Fabra, Barcelona 08002, Spain.

Received: 31 December 2013 Accepted: 10 June 2014

Published: 16 July 2014


1. IEEE-SA, IEEE standard for information technology-telecommunications and information exchange between systems-local and metropolitan area networks-specific requirements - part 11: wireless LAN medium access control (MAC) and physical layer (PHY) specifications. IEEE Std 802.11-2007 (Revision of IEEE Std 802.11-1999) (2007). doi:10.1109/IEEESTD.2007.373646

2. IEEE-SA, IEEE standard for information technology-telecommunications and information exchange between systems-local and metropolitan area networks-specific requirements - part 11: wireless LAN medium access control (MAC) and physical layer (PHY) specifications amendment 10: mesh networking. IEEE Std 802.11s-2011 (Amendment to IEEE Std 802.11-2007) (2011)

3. J Crichigno, M-Y Wu, W Shu, Protocols and architectures for channel assignment in wireless mesh networks. Ad Hoc Netw. 6,1051-1077 (2008). doi:10.1016/j.adhoc.2007.10.002

4. L Zhang, X Wang, C Liu, Channel assignment in multi-radio multi-channel wireless mesh network by topology approach, in Proc. WRIInt. Conf. Communications and Mobile Computing CMC'09, vol. 2 (IEEE, Yunnan, China, 6-8 Jan 2009), pp. 358-362. doi:10.1109/CMC.2009.245

5. L Xu, Y Xiang, M Shi, A novel channel assignment algorithm based on topology simplification in multi-radio wirelesss mesh networks, in Proc. 25th IEEE Int. Performance, Computing, and Communications Conf. IPCCC 2006 (IEEE, Phoenix, AZ, USA, 10-12 April 2006), pp. 230-238. doi:10.1109/.2006.1629411

6. R Draves, J Padhye, B Zill, Routing in multi-radio, multi-hop wireless mesh networks, in Proceedings of the 10th Annual International Conferenceon Mobile Computing and Networking (ACM, New York, 2004), pp. 114-128

7. MK Marina, SR Das, AP Subramanian, A topology control approach for utilizing multiple channels in multi-radio wireless mesh networks. Comput. Netw. 54(2), 241-256. (IEEE, Boston, MA, USA, 3-7 Oct. 2005). doi:10.1016/j.comnet.2009.05.015

8. AP Subramanian, H Gupta, SR Das, J Cao, Minimum interference channel assignment in multiradio wireless mesh networks. IEEE Trans. Mobile Comput. 7(12), 1459-1473 (Dec. 2008)

9. S Avallone, IF Akyildiz, A channel assignment algorithm for multi-radio wireless mesh networks. Proc. 16th Int. Conf. Comput Commun. Netw. ICCCN 2007. 31 (7), 1343-1353 (2008)

10. H Skalli, S Ghosh, SK Das, L Lenzini, Channel assignment strategies for multiradio wireless mesh networks issues and solutions. Commun. Mag. IEEE. 45(11), 86-95 (2007). doi:10.1109/MC0M.2007.4378326

11. B Shao, J Tao, F Wang, Static channel assignment with the physical interference model for maximum capacity in multi-radio multi-channel wireless mesh networks, in Proc. 9th IntGrid and Cooperative Computing (GCC)Conf (IEEE, Nanjing, China, 1-5 Nov 2010), pp. 338-343. doi:10.1109/GCC.2010.72

12. A Raniwala, K Gopalan, T-c Chiueh, Centralized channel assignment and routing algorithms for multi-channel wireless mesh networks. SIGMOBILE Mob. Comput. Commun. Rev. 8(2), 50-65 (2004)

13. M Amiri Nezhad, L Cerda-Alabern, Utility based channel assignment mechanism for multi radio mesh networks, in Proceedings of the 8th ACM International Workshop on Mobility Management and Wireless Access. MobiWac '10 (ACM, New York, 2010), pp. 68-74

14. MX Gong, SF Midkiff, S Mao, On-demand routing and channel assignment in multi-channel mobile ad hoc networks. Ad Hoc Netw. 7(1), 63-78 (2009). Elsevier

15. P Bahl, R Chandra, SSCH: slotted seeded channel hopping for capacity improvement in IEEE802.11 ad-hoc wireless networks (ACM, New York, 2004), pp. 216-230

16. KN Ramachandran, EM Belding, KC Almeroth, MM Buddhikot, Interference-aware channel assignment in multi-radio wireless mesh networks, in Proc. 25th IEEE Int. Conf. Computer Communications INFOCOM 2006 (IEEE, Barcelona, Spain, Apr 2006), pp. 1-12. doi:10.1109/INF0C0M.2006.177

17. X Wu, J Liu, G Chen, Analysis of bottleneck delay and throughput in wireless mesh networks, in Proc. IEEE Int Mobile Adhoc and Sensor Systems (MASS) Conf (IEEE, Vancouver, BC, Oct 2006), pp. 765-770. doi:10.1109/M0BH0C.2006.278648

18. M Alicherry, R Bhatia, LE Li, Joint channel assignment and routing for throughput optimization in multiradio wireless mesh networks. IEEE J. Select. Areas Commun. 24(11), 1960-1971 (2006). doi:10.1109/JSAC.2006.881641

19. AH Mohsenian-Rad, VWS Wong, Joint logical topology design, interface assignment, channel allocation, and routing for multi-channel wireless mesh networks. IEEE Trans. Wireless Commun. 6(12), 4432-4440 (2007). doi:10.1109/TWC.2007.060312

20. A Raniwala, T-C Chiueh, Architecture and algorithms for an IEEE 802.11-based multi-channel wireless mesh network, in INFOCOM 2005.24th Ann. Joint Conf. IEEEComputCommun. Soc. Proc. IEEE, vol. 3 (IEEE, Miami, FL, USA, 13-17 March 2005), pp. 2223-2234. doi:10.1109/INFC0M.2005.1498497

21. P Kyasanur, NH Vaidya, Routing and link-layer protocolsfor multi-channel multi-interface ad hoc wireless networks. SIGMOBILE Mob. Comput. Commun. Rev. 10(1), 31-43 (2006)

22. MDF Wooseong Kim, JK Andreas, M Gerla, Urban-X: towards distributed channel assignment in cognitive multi-radio mesh networks, in IFIP Wireless Days (IEEE, Venice, 2010)

23. S-H Kim, Y-J Suh, Rate-based channel assignment algorithm for multi-channel multi-rate wireless mesh networks, in Proc. IEEE Global Telecommunications Conf. IEEE GLOBECOM 2008, (2008), pp. 1-5. doi:10.1109/GLOCOM.2008.ECP.125

24. M Felegyhazi, M Cagalj, SS Bidokhti, J-P Hubaux, Non-cooperative multi-radio channel allocation in wireless networks, in INFOCOM 2007. 26th IEEE InternationalConferenceon Computer Communications. IEEE (IEEE, New Orleans, LA, USA, 30 Nov. 2008-4 Dec. 2008), pp. 1442-1450

25. MA Nezhad, L Cerda-Alabern, Adaptive channel assignment for wireless mesh networks using game theory, in Proc. IEEE 8th Int Mobile Adhoc and Sensor Systems (MASS) Conf (IEEE, Valencia, Spain, 17-22 Oct 2011),

pp. 746-751. doi:10.1109/MASS.2011.82

26. M Amiri Nezhad, L Cerda-Alabern, B Bellalta, M Guerrero Zapata, A semi-dynamic, g.b., interference aware channel assignment for multi-radio multi-channel wireless mesh networks. Int. J. Ad Hoc Ubiquitous Comput. 14(3), 200-2013 (2013). doi:10.1504/IJAHUC.2013.058237, InderScience

27. A Dhananjay, H Zhang, J Li, L Subramanian, Practical, distributed channel assignment and routing in dual-radio mesh networks, in SIGCOMM '09: Proceedings of the ACM SIGCOMM 2009 Conferenceon Data Communication (ACM, New York, 2009), pp. 99-110. doi:10.1145/1592568.1592581

28. J Robinson, K Papagiannaki, C Diot, X Guo, L Krishnamurthy, Experimenting with a multi-radio mesh networking testbed, in WiNMee Workshop (IEEE, Seoul, Korea, 3 Apr 2005)

29. R Aguero-Calvo, J Perez-Campo, Adding Multiple Interface Support in NS-2. (University of Cantabria, Cantabria, Spain, 2007). http://personales.unican. es/aguerocr/.

30. ns-3 Development Team, ns-3 Manual (release ns-3.9). (ns-3 project, Seattle, WA, USA, 2011). index.html.

31. IEEE-SA, IEEE standard for information technology telecommunications and information exchange between systems local and metropolitan area networks specific requirements part 11: wireless LAN medium access control (MAC) and physical layer (PHY) specifications amendment 1: radio resource measurement of wireless LANs. IEEE Std 802.11k-2008 (Amendment to IEEE Std 802.11-2007) (2008). doi:10.1109/IEEESTD.2008.4544755

32. M Youssef, M Ibrahim, M Abdelatif, L Chen, AV Vasilakos, Routing metrics of cognitive radio networks: a survey. Commun. Surv. Tutor. IEEE. 16(1), 92-109 (2014). doi:10.1109/SURV.2013.082713.00184

33. RDCTeam, R:A Language and Environment for Statistical Computing. (R Foundation for Statistical Computing, Vienna, 2008). R Foundation for Statistical Computing.

34. MA Nezhad, Semi-dynamic Interference Aware Channel Assignment (SICA) (2012).

35. P Gupta, PR Kumar, The capacity of wireless networks. IEEETrans. Inform. Theory. 46(2), 388-404 (2000). doi:10.1109/18.825799

36. Y Freund, RE Schapire, Game theory, on-line prediction and boosting, in COLT'96: Proceedings of the Ninth Annual Conferenceon Computational Learning Theory (ACM, New York, 1996), pp. 325-332

37. Y Freund, RE Schapire, Adaptive game playing using multiplicative weights. Games Econom. Behav. 29(1-2), 79-103 (1999)

38. RG Sargent, Verification, validation and accreditation of simulation models, in Proceedings of the 2000 Winter Simulation Conference, vol. 1

(IEEE, Orlando, FL, USA, 10-13 Dec 2000), pp. 50-591. doi:10.1109/WSC.2000.899697

39. AM Law, How to build valid and credible simulation models, in

Proceedings of the 2009 Winter Simulation Conference (WSC) (IEEE, Austin, TX, USA, 13-16 Dec 2009), pp. 24-33. doi:10.1109/WSC.2009.5429312

40. L Weibing, W Xianjia, H Binbin, Evolutionary Markov games based on neural network, in Proceedings of the 6th International Symposium on Neural Networks: Advances in Neural Networks - PartIII. ISNN 2009 (Springer, Berlin, Heidelberg, 2009), pp. 109-115. doi:10.1007/978-3-642-01513-7-12.

41. R Kindermann, Markov Random Fields and Their Applications (Contemporary Mathematics; V. 1). (Amer Mathematical Society, 1980).

42. O Balci, Verification, validation, and accreditation, in Proceedings of the 30th Conference on Winter Simulation. WSC '98 (IEEE Computer Society Press, Los Alamitos, 1998), pp. 41-4. 293172.293183.

43. W Si, S Selvakennedy, AY Zomaya, An overview of channel assignment methods for multi-radio multi-channel wireless mesh networks. J. Parallel Distrib. Comput. 70, 505-524 (2010). doi:10.1016/j.jpdc.2009.09.011

44. H Cheng, N Xiong, AV Vasilakos, LTYang, G Chen, X Zhuang, Nodes organization for channel assignment with topology preservation in multi-radio wireless mesh networks. Ad Hoc Netw. 10(5), 760-773 (2012). doi:10.1016/j.adhoc.2011.02.004. Special Issue on Cognitive Radio Ad Hoc Networks

45. PP Demestichas, VAG Stavroulaki, LM Papadopoulou, AV Vasilakos, ME Theologou, Service configuration and traffic distribution in composite radio environments. Syst. Man, Cybernet. Part C: Appl. Rev. IEEE Trans. 34(1), 69-81 (2004). doi:10.1109/TSMCC.2003.818500

46. PBF Duarte, ZM Fadlullah, AV Vasilakos, N Kato, On the partially overlapped channel assignment on wireless mesh network backbone: a game theoretic approach. Select. Areas Commun. IEEE J. 30(1), 119-127

(2012). doi:10.1109/JSAC.2012.12011 1

47. Y He, R Yuan, J Sun, W Gong, Semi-random backoff: towards resource reservation for channel access in wireless lans, in 17th IEEE International Conference on Network Protocols, 2009. ICNP2009 (IEEE, Princeton, NJ, USA, 13-16 Oct 2009), pp. 21-30. doi:10.1109/ICNP.2009.5339700

48. D Lopez-Perez, X Chu, AV Vasilakos, H Claussen, On distributed and coordinated resource allocation for interference mitigation in self-organizing LTE networks. Netw. IEEE/ACM Trans. 21(4), 1145-1158

(2013). doi:10.1109/TNET.2012.2218124

49. L Gao, X Wang, Y Xu, W Chen, Distributed multi-radio channel allocation in multi-hop ad hoc networks, in ICC08 (IEEE, Beijing, China, 19-23 May 2008), pp. 3156-3160

50. TChen, S Zhong, Perfectly fair channel assignment in non-cooperative multi-radio multi-channel wireless networks. Comput. Commun. 32(6), 1058-1061 (2009)

51. I Shah, S Jan, K-K Loo, Selfish flow games in non-cooperative multi-radio multi-channel wireless mesh networks with imperfect information, in 20106th International Conference on Wireless and Mobile Communications (ICWMC) (IEEE, Valencia, Spain, 20-25 Sept 2010), pp. 219-225

52. H-K Kim, C-Y Oh, T-J Lee, Fair and collision-aware multi-channel assignment based on game theory for wireless multi-hop networks. IEICE Trans. Commun. 92,1282-1290 (2009). doi:10.1587/transcom.E92.B.1282

53. S-S Byun, I Balashingham, AV Vasilakos, H-N Lee, Computation of an equilibrium in spectrum markets for cognitive radio networks. Comput. IEEE Trans. 63(2), 304-316 (2014). doi:10.1109/TC.2012.211

54. MA Khan, H Tembine, AV Vasilakos, Game dynamics and cost of learning in heterogeneous 4G networks. Select. Areas Commun. IEEE J. 30(1), 198-213 (2012). doi:10.1109/JSAC.2012.120118

55. MA Khan, H Tembine, AV Vasilakos, Evolutionary coalitional games: design and challenges in wireless networks. Wireless Commun. IEEE. 19(2), 50-56 (2012). doi:10.1109/MWC.2012.6189413

56. K Fall, (eds.) KV, Thens Manual (formerly ns Notes and Documentation). (ACM, Berkeley, 2003).


Cite this article as: Amiri-Nezhad etal.: Simulation of multi-radio multi-channel 802.11-based mesh networks in ns-3. EURASIP Journal on Wireless Communications and Networking 2014 2014:118.

Submit your manuscript to a SpringerOpen journal and benefit from:

7 Convenient online submission 7 Rigorous peer review 7 Immediate publication on acceptance 7 Open access: articles freely available online 7 High visibility within the field 7 Retaining the copyright to your article

Submit your next manuscript at 7