Interference-Aware Channel Assignment in Multi-Radio Wireless Mesh Networks
Interference-Aware Channel Assignment in Multi-Radio Wireless Mesh Networks
I. I NTRODUCTION
Typical deployments of static multi-hop wireless networks,
called wireless mesh networks, utilize routers equipped with
only one IEEE 802.11 radio. IEEE 802.11 radios are typically
single-channel radios. As a result, single-radio mesh networks
can suffer from serious capacity degradation due to the halfduplex nature of the wireless medium [10].
Fortunately, the IEEE 802.11 PHY specification permits the
simultaneous operation of multiple non-overlapping channels.
For example, three non-overlapping channels in the 2.4GHz
band can be simultaneously used. The IEEE 802.11a specification allows up to twelve non-overlapping channels in the
5.0 GHz band. By deploying multi-radio routers in wireless
mesh networks and assigning the radios to non-overlapping
channels, the routers can communicate simultaneously with
minimal interference in spite of being in direct interference
range of each other. Therefore, the capacity of wireless mesh
networks can be increased.
In equipping routers with multiple radios, a nave strategy
would be to equip each router with the number of radios equal
to the number of orthogonal channels. However, this strategy
is economically prohibitive due to the significant number
of non-overlapping channels. Furthermore, small form-factor
embedded systems used for manufacturing routers support
only a limited number of radios. Consequently, using all nonoverlapping channels on a mesh router is still not a viable
option.
A. Research Contributions
To the best of our knowledge, ours is the first solution
to address the problem of dynamic channel assignment in
wireless mesh networks in the presence of interference from
co-located wireless networks. A key goal in the design of the
proposed solution has been to make the solution amenable
to easy implementation using currently available radios. This
differentiates our work from several proposed solutions (surveyed in Section IX) which require either specialized as yet
unavailable radios or knowledge about the network such as
anticipated traffic patterns and the specific paths to be traversed
by network flows.
Specifically, the contributions of this paper are as follows:
A dynamic, interference-aware channel assignment algorithm that minimizes interference between the mesh
network and co-located wireless networks.
A multi-radio conflict graph, an extension to the wellknown conflict graph model, to model the interference
relationship between multi-radio routers in a wireless
mesh network.
A novel interference estimation scheme that routers use
to estimate the interference level in their neighborhoods.
A link redirection protocol that prevents the disruption of
flows during channel assignment.
A comprehensive performance study that shows significant throughput improvements in the presence of varying
interference levels, which are validated through empirical
measurements on a prototype implementation.
B. Paper Outline
The remainder of the paper is organized as follows: Section II discusses the effect of channel assignment on network topology. In Section III, we formulate the channel
assignment problem. Section IV describes our interference
estimation technique and the multi-radio conflict graph model.
In Section V, we present our centralized channel assignment
algorithm. We discuss the challenges we addressed during the
development of our prototype implementation in Section VI.
Section VII presents results from our simulation-based evaluation, while results from our prototype evaluation are presented
in Section VIII. In section IX, we summarize related work, and
Section X concludes the paper.
II. C HANNEL A SSIGNMENT AND N ETWORK T OPOLOGY
In a multi-radio mesh network, channel assignment to radios
can alter the network topology. Consider the example four
node topology in Figure 1(a). Here, node C is equipped with
three radios and the other nodes (A, B, and D) have one radio
each. Each link in the figure is labeled with its channel number.
Figure 1(a) illustrates the topology when all radios are tuned
to channel one. Figure 1(b) illustrates the change in network
topology after channel assignment.
Alterations in the network topology have three main drawbacks. First, subsequent node failures have a higher probability
of causing network partitions. Consequently, portions of the
mesh may become unreachable, resulting in the disruption
B
1
A
1
(a)
Fig. 1.
D
1
A
1
(b)
D
3
A
1
D
3
(c)
This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the Proceedings IEEE Infocom.
Fig. 2.
This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the Proceedings IEEE Infocom.
1 Wireless devices, such as ones using the Prism 2/2.5 chipset, sometimes
allow the capture of packets transmitted by carrier-sensing radios that fail the
FCS check. This mechanism at first might suggest a technique to identify
the carrier-sensing radios. However, the utility of this capture mechanism is
limited because the information contained in the garbled packets is by nature
faulty.
2 An approach that avoids specialized hardware assumes that the carriersensing range is k times the reception range [19]. We note that the relationship
is non-deterministic and less likely to be effective in practice because the
carrier-sensing range is dependent on a myriad number of factors such as
transmission power, receiver sensitivity, environmental conditions, and the
presence of obstacles.
This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the Proceedings IEEE Infocom.
A1 : B1
B1
A1
AB
B1 : C1
A1 : C1
C2
AC
BC
D1
CD
(a)
(b)
B1 : C2
A1 : C2
D1 : C1
D1 : C2
(c)
This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the Proceedings IEEE Infocom.
For all vertices in the MCG, the CAS then computes their
distances from the gateway. The distance of an MCG vertex is
the average of the distances from the gateway of the two radios
that make up the vertex. The distance of a radio is obtained
from beacons initiated by the gateway. A beacon is a gateway
advertisement broadcasted hop-by-hop throughout the mesh.
Each beacon contains a hop-count field that is incremented at
each hop during its broadcast. The distance of a router from the
gateway is the shortest path length of a single beacon instance
received by the router over all paths. The router communicates
the distance to the CAS via periodic heartbeat messages sent
every minute in our implementation.
Algorithm: Once the average distances are computed, the
CAS uses the BFS-CA algorithm to assign channels to the
mesh radios. The algorithm is summarized in Algorithm 1.
The algorithm starts by adding all vertices from the MCG
to a list, V (Line 1). It does a breadth first search of the
MCG to visit all vertices and assign them channels. The search
starts from vertices that correspond to links emanating from
the gateway (Lines 3, 4). In line 3, the smallest hopcount
vertex is determined of all vertices in the MCG. In line 4,
all vertices with distance equal to the smallest hop count are
added to a queue, Q. If vertices correspond to network links
emanating from the gateway, their hop count is 0.5. These
vertices are then sorted by increasing delay values (Line 5).
This sort is performed in order to give higher priority to the
better links emanating from the shortest hop count router (the
gateway for the first BFS iteration).
The algorithm then visits each vertex in Q (Line 11) and
permanently assigns them the highest ranked channel that does
not conflict with the channel assignments of its neighbors
(Line 13). If a non-conflicting channel is not available, a randomly chosen channel is permanently assigned to the vertex.
Note, however, that the default channel is never assigned. Once
a vertex is assigned a channel, all vertices that contain either
radio from the just-assigned vertex are placed in a list, L (Line
17). In line 18, all vertices from L are removed from the
MCG. This step is needed to satisfy the constraint that only
one channel is assigned to each radio. The radios in the list
of vertices that do not belong to the just-assigned vertex are
tentatively assigned the latters channel (Line 19).
In lines 20-21, vertices at the next level of the breadth first
search are added to Q. These vertices correspond to links
that fan-out from the gateway towards the periphery. To find
such links in the MCG, two steps are performed. In the first
step (Line 20), the router from the just-assigned vertex that is
farthest away from the gateway is chosen; the farthest router
is the router with the higher hop-count of the two routers that
make up the just-assigned vertex. In the second step (Line
20), all unvisited MCG vertices that contain a radio belonging
to the farthest router are added to the list, T ail. This list
is sorted (Line 22) by increasing value of the delay metric
to give higher priority to better links that emanate from the
farthest router. Finally, in line 23, the vertices from T ail are
added to Q. The above described algorithm continues until all
vertices in the MCG are visited. In line 25, any radio that is
not assigned a permanent channel during the search, because
vertices containing it were deleted in line 18, is permanently
assigned one of the channels tentatively assigned to it in line
19.
Once channel assignments are decided, the CAS notifies the
mesh routers to re-assign their radios to the chosen channels.
The exact protocol is described in Section VI-D.
D. Channel Re-assignment Strategy
To adapt to the changing interference characteristics, the
CAS periodically re-assigns channels. The periodicity depends
ultimately on how frequently interference levels in the mesh
network are expected to change. If a large number of interfering devices in the vicinity of the mesh network are expected
to be short-lived, the invocation rate should be increased. On
the other hand, if a majority of the interfering devices are
likely to be long-lived, the invocation rate can be decreased.
In our implementation, we have set the rate to ten minutes. We
believe this rate results in a good tradeoff between interference
adaptation and mesh radio reconfiguration. Nevertheless, we
expect the network operator of a mesh network to choose a
rate to best suit the target deployment.
VI. I MPLEMENTATION C ONSIDERATIONS
In the earlier sections, we omitted details on several implementation specific steps, such as the channel estimation
procedure, link delay estimation, and the channel assignment
process. This section describes the implementation aspects of
these steps as they become critical when BFS-CA is used in
practice.
This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the Proceedings IEEE Infocom.
A. Interference Estimation
Each mesh router performs interference estimation by capturing packets from the medium. To capture packets, we use a
special operating mode supported by typical radio hardware
called the RFMon mode. This mode allows IEEE 802.11
management frames and regular data frames in the medium to
be captured. The management frames are periodically transmitted (typically every 100 msec) by devices that implement
the IEEE 802.11 specification. We do not use the typical
promiscuous mode supported by the radios because that mode
only sniffs data frames and does not sniff IEEE management
frames. Consequently, devices that do not transmit any data
packets during the capture period will not be discovered.
The RFMon mode provides information about each packet,
such as the rate at which it was sent and the size of the
packet. It derives this information by interpreting physical
layer information associated with the packet and therefore can
provide the information even if layer 2 encryption is used to
conceal the contents of the packets. The captured packets are
then used to measure the number of interfering radios and the
bandwidth consumed by those radios.
Radios, when placed in RFMon mode, cannot transmit data
packets for the duration of the sniffing. This is because some
commercial radios, such as those utilizing the Prism 2/2.5
chipset, cannot perform packet transmission in RFMon mode.
Even if radios can transmit in RFMon mode, such as ones utilizing the Atheros chipset, because the interference estimation
at each router occurs independently of its neighbors, there is
no guarantee that two radios will be on the same channel in
order to communicate successfully. Therefore, any flow that
uses a radio temporarily in RFMon mode will be disrupted.
To prevent flow disruption, we use link redirection, described
next.
B. Link Redirection
Link redirection is achieved when a flow intended for a
routers non-default radio is redirected to the routers default
radio instead. Link redirection is invoked in two cases: (1)
when a routers intended transmitter is incapable of delivering
packets, and (2) when the intended receiver on the neighboring
router is incapable of receiving packets. Redirection is possible
because the default radios on all routers operate on the default
channel.
Our link redirection protocol is as follows: whenever a
radio has to change its state to inactive, it broadcasts an
INTERFACE-INACTIVE message every second for three seconds before it changes state. The multiple broadcasts allow for any message losses. Any neighbor that receives the
INTERFACE-INACTIVE message deletes the address of the
soon-to-become inactive radio from its routing tables. Once
the deletion occurs, link redirection is invoked until the radio
becomes active again. We simply rely on the routing protocol
to notify that a radio has become active.
This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the Proceedings IEEE Infocom.
This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the Proceedings IEEE Infocom.
1200
Packets Received
1000
800
600
Data
400
200
0
0
A
300
Interference
S
A
600
900 1200 1500 1760
Time (seconds)
with four radios. Six routers, chosen from the routers two hops
away from the gateway, are each equipped with three radios.
Six more routers at three hops from the gateway are equipped
with two radios. Remaining routers are single-radio routers.
The selection of multi-radio routers is done manually in order
to comply with the router placement strategy discussed in
Section III.
C. Network Scenarios
We consider three network scenarios in our evaluation. In
the first scenario, we evaluate the throughput improvement
obtained by utilizing multi-radio routers instead of singleradio routers. Ten randomly chosen routers at the periphery
send data in two minute FTP transfers to the gateway. The
scenario lasts for forty minutes. Therefore, multiple channel
assignments occur in the network. This scenario is designed
to be an ideal scenario in which: (1) there is no inter-flow
interference in the network; and (2) there is no interference
from external networks. To satisfy the first requirement, each
source begins transmission 30 seconds after the previous
one has stopped; the first source starts 620 seconds into the
simulation to allow for the first channel assignment to occur.
To satisfy the second requirement, we do not co-locate any
external nodes.
For scenario 2, we again consider a network setting in
which there there is no external interference. However, unlike
scenario 1, we let multiple flows within the mesh interfere with
each other. The traffic is generated by the same set of sources
as chosen in the first scenario. Furthermore, the sources start
at the same times as in scenario 1. However, they do not stop
transmitting until the end of the simulation (forty minutes).
For scenario 3, we consider a general network setting in
which there is inter-flow interference as well as interference
from external networks. To create this scenario, we take
scenario 2 and introduce interfering nodes in multiples of 4 up
to a total of 28 interfering nodes in each of the four topologies.
The nodes are organized into sender-receiver pairs. Each pair is
randomly distributed in the terrain space. A sender from each
pair transmits a 8 Mbps CBR stream consisting of 1024 byte
packets in 10 minute bursts to the receiver in the pair. The
interval between each burst is 50 seconds. The nodes start
This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the Proceedings IEEE Infocom.
1000
500
2
3
Topology
1500
1
MultiRadio Static
Single Radio
BFSCA
Static MultiRadio
0.8
0.6
0.4
0.2
0.2
3
2
1
0
0.4
0.6
BFSCA
0.8
BFSCA
Static MultiRadio
2
3
Topology
Fig. 5. Results from scenario 1 where the BFS-CA and static schemes are compared against a single-radio scheme. Scenario 1 has no inter-flow interference
and no external interference.
400
200
Topology
BFSCA
Avg Hop Count
600
0
0
BFSCA
Static MultiRadio
Static MultiRadio
800
0.8
0.6
0.4
0.2
0.2
Static MultiRadio
3
2
1
0.4
0.6
BFSCA
0.8
2
3
Topology
Fig. 6. Results from scenario 2 where BFS-CA is compared against the static scheme in the presence of inter-flow interference but without external
interference.
the points in the plot are above the x = y line. These points
indicate paths that with the static scheme have higher CDE
values than with the BFS-CA scheme. Consequently, paths
with the static scheme are more channel diversified than with
the BFS-CA scheme.
Figure 5(c) is a plot of the average hop-counts for the two
multi-radio schemes in scenario 1 for the four topologies. The
hop-count with BFS-CA is higher than with the static scheme.
This is because WCETT, the routing metric in our evaluations,
prefers a frequency diversified path over alternatives that may
be shorter. Because of the assignment strategies of the two
schemes, WCETT picks longer frequency diversified paths
with BFS-CA than with the static scheme.
The above noted performance improvement of the static
scheme over BFS-CA is achieved only in an ideal scenario
where sources send traffic to the gateway one at a time.
Because of the assignment strategy in the static scheme, when
multiple sources transmit, flows to the gateway each traverse
links tuned to the same channels, resulting in increased interference between the flows. Consequently, the throughput
improvement with the static scheme is expected to be less
than with the BFS-CA scheme.
This intuition is verified in scenario 2 wherein multiple
sources transmit to the gateway at the same time. Figure 6(a)
plots the mean throughput obtained with the two multi-radio
schemes. Clearly, BFS-CA outperforms the static scheme.
Specifically, the throughput improvement is as high as 72%
with topology 2 and 48%, 60%, and 13% with topolo-
This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the Proceedings IEEE Infocom.
BFSCA
Percentage Improvement
100
100 BFSCA
BFSCA
50
50
50
Static MultiRadio
100
50
Static MultiRadio
100
4
100
8 12 16 20 24 28
Interfering Radios
(a) Topology 1
BFSCA
50
8 12 16 20 24 28
Interfering Radios
(b) Topology 2
100
BFSCA
50
50
50
Static MultiRadio
100
Static MultiRadio
100
8 12 16 20 24 28
Interfering Radios
(c) Topology 3
8 12 16 20 24 28
Interfering Radios
(d) Topology 4
slightly better than the static scheme. More noteworthy is BFSCAs performance in topology 3 (the grid topology) in which
the throughput gains with BFS-CA is only marginally better
than the topology 4 case. This is because in topology 3, the
mesh routers and interfering networks are densely populated in
the terrain space. Consequently, the interference foot-print of
the interfering networks is greater in the dense environment.
As a result, re-assignment of channels yields only minimal
throughput improvement with BFS-CA.
VIII. P ROTOTYPE I MPLEMENTATION
Our primary motivation in implementing a prototype is to
demonstrate the practicality of our proposed BFS-CA algorithm and protocol. We evaluate the implementation in a six
node IEEE 802.11b testbed with the Linux 2.4.26 operating
system.
The prototype implementation consists of a router module
and a CAS module. The router module is installed on each
mesh router and implements the interference estimation and
link redirection procedures as described in Section VI. To
perform RFMon sniffing, it invokes Linux utilities such as
the iwconfig wireless utilities and the tethereal packet capture
tool. The CAS module implements the BFS-CA algorithm.
Interference estimation occurs every 5 minutes, and the channel selection procedure is invoked every 10 minutes as in the
simulations.
Because IEEE 802.11b supports only three non-overlapping
channels (1, 6, and 11), the performance improvement obtained using the proposed solution in our testbed setting is
expected to be limited. We considered using Atheros based
IEEE 802.11a radios. However, our testbed nodes use Linux
and ad-hoc mode support in Linux drivers for IEEE 802.11a
radios is currently faulty [3].
This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the Proceedings IEEE Infocom.
Packets Received
Interfering Stream
600
400
Mesh Stream
200
R EFERENCES
S
Fig. 8.
find that BFS-CA results in significant performance improvements in the presence of varying interference levels, which
are validated through empirical measurements on a testbed.
As future work, we plan to evaluate BFS-CA on the UCSB
MeshNet [6], a thirty node multi-radio wireless mesh testbed
at UCSB.
500
1000
1500
Time (seconds)
2000
[1]
[2]
[3]
[4]
[5]
[6]
[7]
[8]
[9]
[10]
[11]
[12]
[13]
[14]
[15]
[16]
[17]
[18]
[19]
[20]
X. C ONCLUSIONS
Multi-radio routers can significantly improve the performance of wireless mesh networks. However, any static assignment of channels to the mesh radios can degrade network performance because of interference from co-located wireless networks. This paper presented BFS-CA, a dynamic, interferenceaware channel assignment algorithm and corresponding protocol for multi-radio wireless mesh networks. BFS-CA improves
the performance of wireless mesh networks by minimizing
interference between routers in the mesh network and between
the mesh network and co-located wireless networks. The
proposed solution is practical and easily implementable. We
[21]
[22]
[23]
[24]
[25]
This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the Proceedings IEEE Infocom.