scispace - formally typeset
Search or ask a question
Journal ArticleDOI

An efficient routing protocol for wireless networks

01 Oct 1996-Mobile Networks and Applications (Springer-Verlag New York, Inc.)-Vol. 1, Iss: 2, pp 183-197
TL;DR: WRP reduces the number of cases in which a temporary routing loop can occur, which accounts for its fast convergence properties and its performance is compared by simulation with the performance of the distributed Bellman-Ford Algorithm, DUAL, and an Ideal Link-state Algorithm.
Abstract: We present the Wireless Routing Protocol (WRP). In WRP, routing nodes communicate the distance and second-to-last hop for each destination. WRP reduces the number of cases in which a temporary routing loop can occur, which accounts for its fast convergence properties. A detailed proof of correctness is presented and its performance is compared by simulation with the performance of the distributed Bellman-Ford Algorithm (DBF), DUAL (a loop-free distance-vector algorithm) and an Ideal Link-state Algorithm (ILS), which represent the state of the art of internet routing. The simulation results indicate that WRP is the most efficient of the alternatives analyzed.

Summary (4 min read)

1 { Introduction

  • The routing protocols used in multihop packet-radio networks implemented in the past [2, 3, 11] were based on shortest-path routing algorithms that have been typically based on the distributed Bellman-Ford algorithm (DBF) [4].
  • This problem is usually called the counting-to-in nity problem.
  • OSPF [12] relies on broadcasting complete topology information among routers, and organizes an internet hierarchically to cope with the overhead incurred with topology broadcast.
  • This is a destination-oriented protocol in which separate versions of the algorithm run independently for each destination.
  • The following sections show that the protocol is correct (i.e., that it produces correct routing tables within a nite time after topology changes) and compares its performance with that of DBF, DUAL and an ideal link state algorithm (ILS) which uses Dijkstra's shortest path algorithm.

2.1 { Overview

  • Each node represents a router and is a computing unit involving a processor, local memory and input and output queues with unlimited capacity.
  • All messages received by a node are put in an input queue and are processed in FIFO order.
  • A link is assumed to exist between two nodes only if there is radio connectivity between the two nodes and they can exchange update messages reliably with a certain probability of success.
  • To ensure that connectivity with a neighbor still exists when there are no recent transmissions of routing table updates or ACKs, periodic update messages without any routing table changes (null update messages) are sent to the neighbors.
  • The time interval between two such null update messages is the HelloInterval.

Procedure Message

  • The link-cost table of node i lists the cost of relaying information through each neighbor k, and the number of periodic update periods that have elapsed since node i received any error-free messages from k.
  • The way in which costs are assigned to links is beyond the scope of this speci cation.
  • The list of updates sent in the update message Node i retransmits the list of updates in an update message when the retransmission counter of the corresponding entry in the MRL reaches zero.

2.3 { Information Exchanged among Nodes

  • In WRP, nodes exchange routing-table update messages (which the authors call \update messages" for brevity) that propagate only from a node to its neighbors.
  • An update message contains the following information: A sequence number assigned by the sending node.
  • An example of this event can be the case in which a node identi es a new neighbor and sends its entire routing table.
  • The response list of the update message is used to avoid the situation in which a neighbor is asked to send multiple ACKs to the same update message, simply because some other neighbor of the node sending the update did not acknowledge.

2.4 { Routing-Table Updating

  • Figures 1 and 2 specify important procedures of WRP used to update the routing and distance tables.
  • In contrast, all previous path- nding algorithms [5, 10, 15] check the consistency of the predecessor only for the neighbor associated with the input event.
  • Whenever node i sends a new update message, it must Decrement the retransmission counter of all the existing entries in the MRL Delete the updates in existing entries in the MRL that are included in the new update message.
  • An in nite distance to all destinations through node k is assumed, with the exception of node k itself and those destinations reported in node k's updates, if the message received from k was an update message.
  • This information can be transmitted in one or multiple update messages that only node k needs to acknowledge.

2.5 { Example

  • The following example illustrates the working of WRP.
  • Consider a four node network shown in Figure 3(a).
  • Each update will be acknowledged by an ACK message from the neighbor.
  • Also, when i gets node k's update message, i updates its distance table entry through neighbor k and checks for the possible paths to destination j through any other neighboring nodes.
  • This illustrates how the method used in WRP to update a node's distance table (Step (2) in Procedure DT) helps in the reduction of the formation of temporary loops in the explicit paths.

3 { Correctness of WRP

  • The authors show that the basic routing algorithm used in WRP is correct.
  • The following assumptions are made on the behavior of links and routers for the working of WRP.
  • A lower-level protocol is responsible for maintaining the status of the link.
  • Link lengths are always positive and a failed link has an in nite length.
  • For simplicity, the following proof assumes that all update messages sent over an operational link are received correctly.

Proof

  • There are four possible situations involving the shortest path from i to j.
  • (n;m) is on the shortest path and its length does not change enough to modify the shortest path (although the length of the shortest path changes).
  • In Case (2), router is aware of the change in the link cost along the shortest path after a delay not exceeding the number of links on the new shortest path.
  • Each of these neighbors will update their table entries and the change in the link cost propagates.
  • This process continues until a stable router which does not change its successor is encountered.

4 { Complexity Analysis

  • WRP's time complexity is O(h) in the worst-case, where h is the height of the routing tree.
  • Time complexity is de ned as the largest time that can elapse between the moment T when the last topology change occurs and the moment at which all the routers have nal shortest path and distances to all other routers.
  • The weight of the links are as indicated.
  • This reduces the number of update messages required.

5 { Simulation Results

  • To gain insight into the average-case performance of WRP in a dynamic environment, the authors have simulated its operation using an actor-based, discrete-event simulation language called Drama [17], together with a network simulation library.
  • The library provides a standard input syntax and a framework for constructing simulations consisting of routers attached to each other via links.
  • Link failures and recoveries are simulated by sending link status message to the nodes at the end points of the appropriate links.
  • The message count obtained from the simulation runs is not the exact number of updates and acknowledgments sent by each protocol, but accurately re ects the relative di erences among protocols.
  • The authors chose these topologies to compare the performance of routing algorithms for well-known cases given that they cannot sample a large enough number of networks to make statistically justi able statements about how an algorithm scales with network parameters.

5.1 { Total Response to a Single Resource Change

  • The graphs in Figures 5 and 6 depict the number of messages exchanged and the number of steps required before PFA, DBF, DUAL, and ILS converge for every link failing and recovering in the ARPANET topology.
  • The authors focus more on the results for the ARPANET topology, because of its larger size.
  • Similar graphs for every node failing and recovering are given in Figures 7 and 8 respectively.
  • All topology changes are performed one at a time and the algorithms were allowed to converge after each such change before the next resource change occurs.
  • For a single resource failure, PFA outperforms DUAL.

5.2 { Dynamics with Mobile Nodes

  • The authors modeled mobility in the simulation by making the links fail and come back up arbitrarily at random points in time.
  • Node failure is simulated as all the links associated with that node going down at the same time.
  • The links are chosen at random from the set of all the existing links in the fully connected network.
  • In all cases, the average number of messages for DBF and DUAL are more than that of WRP.
  • ILS sends maximum number of messages since the complete topology information has to be exchanged between neighbors every time the topology changes.

6 { Conclusion

  • A new routing protocol, WRP, for a wireless network has been presented.
  • This protocol is based on a path- nding algorithm which substantially reduces the number of cases in which routing loops can occur.
  • A mechanism has been proposed for the reliable exchange of update messages as part of WRP.
  • The basic algorithm used in WRP has been proved to be correct and WRP's complexity has been analyzed.
  • The results indicate that WRP is an excellent alternative for routing in wireless networks.

Did you find this useful? Give us your feedback

Content maybe subject to copyright    Report

Baltzer Journals
An Ecient Routing Proto col for Wireless Networks
Shree Murthy and J.J. Garcia-Luna-Aceves
Computer Engineering, University of California,
Santa Cruz, CA 95064
We present the wireless routing proto col (WRP). In WRP, routing nodes commu-
nicate the distance and second-to-last hop for each destination. WRP reduces the
number of cases in which a temporary routing lo op can o ccur, which accounts for
its fast convergence properties. A detailed proof of correctness is presented and its
performance is compared by simulation with the p erformance of the distributed
Bellman-Ford algorithm (DBF), DUAL (a lo op-free distance-vector algorithm)
and an ideal link-state algorithm (ILS), which represent the state of the art of
internet routing. The simulation results indicate that WRP is the most ecient
of the alternatives analyzed.
Keywords
: routing, packet radio, wireless, distance-vector, link-state, shortest-
path
1{Introduction
The routing protocols used in multihop packet-radio networks implemented in
the past [2,3,11]were based on shortest-path routing algorithms that have b een
typically based on the distributed Bellman-Ford algorithm (DBF) [4]. According
to DBF, a routing node knows the length of the shortest path from each neighbor
to every network destination and this information is used to compute the shortest
path and successor in the path to each destination. An update message contains a
vector of one or more entries, each of which species as a minimum, the distance to
a given destination. A ma jor performance problem with DBF is that it takes a very
long time to up date the routing tables of network nodes after network partitions,
node failures, or increase in network congestion. This p erformance problem of
DBF stems from the fact that it has no inherent mechanism to determine when a
network no de should stop incrementing its distance to a given destination. This
problem is usually called the
counting-to-innity
problem.
The counting-to-innity problem is overcome in one of three ways in existing
This work was supp orted in part by the Advanced Research Pro jects Agency (ARPA) under
contract F19628-93-C-0175 and by the Oce of Naval Research under Contract No. N-00014-
92-J-1807.

S. Murthy and J.J. Garcia-Luna
2
internet routing protocols. OSPF [12] relies on broadcasting complete topology
information among routers, and organizes an internet hierarchically to cope with
the overhead incurred with topology broadcast. BGP [16] exchanges distance
vectors that sp ecify complete paths to destinations. EIGRP [1] uses a lo op-free
routing algorithm called DUAL [8], which is based on internodal coordination
that can span multiple hops; DUAL also eliminates temporary routing lo ops.
However, there are signicant dierences b etween wireless networks and wired
internets in whichinternet routing protocols are used. A wired internet has rela-
tively high bandwidth and top ology that changes infrequently; in contrast, wire-
less networks have mobile nodes and have limited bandwidth for network control.
Accordingly, ooding, multihop internodal synchronization and the specication
of complete path information would incur too muchoverhead in a multihop ra-
dio network with a dynamic topology. On the other hand, the routing protocols
based on DBF or mo dications of DBF would take a long time to converge and the
frequent topology changes in a wireless network with mobile no des make the loop-
ing problem of DBF unacceptable. Therefore, there is a need for a new routing
protocol whichisdevoid of all these drawbacks.
In the recent past, a number of eorts have been made to address the limitation
of DBF and topology broadcast in mobile wireless networks. One such eort is
the DSDV protocol [14]. In this proto col, each mobile host, which is a sp ecialized
router that periodically advertises its view of the interconnection topology with
other mobile hosts within the network to maintain up to date information ab out
the status of the network. Unfortunately, in DSDV a node has to wait until it
receives the next up date message originated by the destination in order to update
its distance-table entry for that destination. This implicit destination-centered
synchronization suers from the same latency problems of DUAL and similar
algorithms based on explicit synchronization. Also, DSDV uses b oth perio dic and
triggered up dates for updating routing information, which could cause excessive
communication overhead.
A distributed routing algorithm for mobile wireless networks based on diusing
computations has been proposed by Corson and Ephremides [6]. This protocol
relies on the exchange of short control packets forming a
query-reply
process. It
also has the ability to maintain multiple paths to a given destination. This is
a destination-oriented proto col in which separate versions of the algorithm run
independently for each destination. Routing is source-initiated, which means that
routes are maintained by those sources which actually desire routes. Even though
this algorithm provides multiple paths to the destination, because of the query-
based synchronization approachtoachieve lo op-free paths, the communication
complexity could b e high.
Recently,anumber of distributed shortest-path algorithms have b een pro-
posed [5, 7, 9, 10,15] that utilize information regarding the length and second-

S. Murthy and J.J. Garcia-Luna
3
to-last hop (predecessor) of the shortest path to each destination to eliminate
the counting-to-innity problem of DBF. We call this type of algorithms as
path-
nding algorithms
. According to these algorithms, each node maintains the shortest-
path spanning tree rep orted by its neighbors. A node uses this information along
with the cost of adjacent links to generate its own shortest-path spanning tree.
An update message exchanged among neighbors consists of a vector of entries
that report updates to the sender's spanning tree; each up date entry contains a
destination identier, the distance to the destination, and the second-to-last hop
of the shortest path to the destination.
Path-nding algorithms are an attractive approach for wireless networks, be-
cause they eliminate counting-to-innity problem. However, these algorithms can
still incur temp orary lo ops in the paths specied by the predecessor before they
converge; without prop er precautions, this can lead to slow convergence, or incur
substantial processing if a node is required to update its entire routing table for
each input event. To address these problems, wehave prop osed a path-nding
algorithm, PFA, which substantially reduces temporary lo oping situations [13],
and which limits routing table up dates to include only that entries aected bya
network change.
The rest of this pap er describes a wireless routing proto col (WRP) for a packet
radio network based on PFA, illustrating the key asp ects of the proto col's opera-
tion. The following sections show that the protocol is correct (i.e., that it produces
correct routing tables within a nite time after topology changes) and compares
its performance with that of DBF, DUAL and an ideal link state algorithm (ILS)
which uses Dijkstra's shortest path algorithm.
ILS consists of ideal oo ding of link-state up dates in order to replicate the
topology of the network at each router; ideal o oding means that innite sequence
numbers can b e used to validate link-state up dates, and that all such up dates are
successfully delivered at every router.
2 { Wireless Routing Proto col
2.1 { Overview
To describ e WRP,we model a network as an undirected graph represented as
G
(
V; E
), where
V
is the set of no des and
E
is the set of links (or edges) connecting
the no des. Each node represents a router and is a computing unit involving a
processor, lo cal memory and input and output queues with unlimited capacity.
In a wireless network, a node has radio connectivity with multiple no des and a
single physical radio link connects a no de with many other no des. However, for
the purposes of routing-table updating, a node
A
can consider another node
B
to be adjacent(we call such a node a \neighbor") if there is radio connectivity

S. Murthy and J.J. Garcia-Luna
4
between
A
and
B
and
A
receives up date messages from
B
. Accordingly,we map
aphysical broadcast link connecting multiple nodes into multiple point-to-point
functional links dened for these no de paths that consider to be neighbors of each
other.
Then, a functional bidirectional link connecting the nodes is assigned a p osi-
tiveweight in each direction. All messages received (transmitted) byanode are
put in an input (output) queue and are pro cessed in FIFO order. The communi-
cation links in the network are such that all up date messages transmitted over an
operational link are received in the order in which they were transmitted within
a nite time.
A link is assumed to exist between two nodes only if there is radio connectivity
between the two nodes and they can exchange update messages reliably with a
certain probability of success. When a link fails, the corresp onding distance entries
in a no de's distance and routing tables are marked as innity. A no de failure is
modeled as all links incident on that node failing at the same time.
WRP is designed to run on top of the medium-access control protocol of a
wireless network. Update messages may be lost or corrupted due to changes
in radio connectivity or jamming. Reliable transmission of up date messages is
implemented by means of retransmissions. After receiving an update message free
of errors, a no de is required to send a p ositiveacknowledgment(ACK) indicating
that it has a go od radio connectivity and has processed the update message.
Because of the broadcast nature of the radio channel, a node can send a single
update message to inform all its neighbors about changes in its routing table;
however, each such neighbor sends an ACK to the originator node.
In addition to ACKs, the connectivity can also b e ascertained with the receipt
of any message from a neighbor (which need not b e an update message). To
ensure that connectivity with a neighbor still exists when there are no recent
transmissions of routing table updates or ACKs, perio dic update messages without
any routing table changes (null update messages) are sent to the neighbors. The
time interval between two suchnull up date messages is the
Hel loInterval
.
If a node fails to receiveanytyp e of message from a neighbor for a specied
amount of time (e.g., three or four times the HelloInterval known as the
Router-
DeadInterval
), the node must assume that connectivity with that neighbor has
been lost.
2.2 { Information Maintained at Each Node
For the purpose of routing, each no de maintains a
distance table
,a
routing table
,
a
link-cost table
and a
message retransmission list
.
The distance table of node
i
is a matrix containing, for each destination
j
and each neighbor of
i
(say
k
), the distance to
j
(
D
i
jk
) and the predecessor (
p
i
jk
)
reported by
k
.

S. Murthy and J.J. Garcia-Luna
5
Procedure Init1
when
router
i
initializes itself
do begin
set a link state table with costs of adjacent links;
N
i
;
N
i
x
j
l
i
x
<
1
;
for each
(
x
2
N
i
)
do b egin
N
i
N
[
x
;
tag
i
x
null
;
s
i
x
null
;
p
i
x
null
;
D
i
x
1
end
D
i
i
0;
s
i
i
null
;
p
i
i
null
;
tag
i
i
corr ect
for each
j
2
N
call
Init2
(
x; j
)
for each
(
n
2
N
i
)
do
add (0
;i;
0
;i
)to
LI ST
i
(
n
)
x
retransmission time;
y
hello count;
z
retransmission count;
call
Send
end
Procedure Init2
(
x; j
)
begin
D
i
jx
1
;
p
i
jx
null
;
s
i
jx
null
;
seqno
i
jx
0
end
Procedure Send
begin
for each
(
n
2
N
i
)
do begin
if
(
LI ST
i
(
n
) is not empty)
then
send messages with
LI ST
i
(
n
)to
n
empty
LI ST
i
(
n
)
end
end
Procedure Message
when
router
i
receives a message on link (
i; k
)
begin
if
(
k
62
N
i
)
do
begin
N
i
N
i
[
k
;
l
i
k
cost of new link;
if
(
k
62
N
)
begin
N
N
[
k
;
tag
i
k
null
;
D
i
k
1
;
p
i
k
null
;
s
i
k
null
;
for each
x
2
N
i
do
call
Init2
(
x; k
)
end
for each
(
i; k ; l
i
k
)
do
send
update(0
;k;D
i
k
;p
i
k
)
end
reset HelloTimer;
for each
entry (
u
k
j
;j;RD
k
j
;rp
k
j
)
j
i
6
=
j
do begin
if
(
j
62
N
)
then b egin
if
(
RD
k
j
=
1
)
then
delete entry
else b egin
N
N
[
j
;
for each
entry
x
2
N
i
call
Init2
(
x; j
)
tag
i
j
null
; call
DT
end
end
else b egin
tag
i
j
null
;
end
end
for each
entry (
u
k
j
;j;RD
k
j
;rp
k
j
) left
j
i
6
=
j
do case of
u
k
j
0: call
Update
(
j; k
)
1: call
ACK
(
j; k
)
end
call
Send
end
Procedure Create RList
(
seqno
)
begin
seqno
seqno
+1;
N eighbor Set
N
i
bitmap
[]
0;
RetransmissionT imer
x
add updates to RList
end
Procedure Delete RList
(
seqno
)
begin
set
bitmap
[
seqno
]
1;
delete
1
for all
n
2
N
i
begin
if
(
bitmap
[
seqno
]=0)
delete
0;
end
if
(
delete
= 1) delete RList[seqno]
end
Procedure Update RList
(
seqno
)
begin
reset RetransmissionTimer
send update
RList
[
seqno
];
end
Procedure Clean RList
(
seqno
)
begin
for all
entries in
RList
delete
RList
[
seqno
];
end
Procedure Connectivity
when
HelloTimer expires
begin
H elloCount
[
k
]
H elloCount
[
k
]+1;
if
(
H elloCount
[
k
]
<y
)
then
reset HelloTimer;
else begin
N
i
N
i
,
k
call
Delete RList
(
k
)
l
i
k
1
tag
i
k
null
delete column for
k
in distance table
update routing table
end
end
Procedure TimeOut
(
i; k
)
when
RetransmissionTimer expires
begin
RetransmissionCounter
RetransmissionCounter - 1;
if
(RetransmissionCounter
<
z)
call
Update RList
(
k
)
else begin
N
i
N
i
,
k
call
Delete RList
(
k
)
l
i
k
1
tag
i
k
null
delete column for
k
in distance table
update routing table
end
end
Procedure DT
when
distance table up date has to be done
begin
D
i
jk
l
i
k
+
D
k
j
;
p
i
jk
p
k
j
;
(2)
for all
neighbors
b
do begin
if
k is in the path from i to j in
the distance table through neighbor
b
then
D
i
jb
D
i
kb
+
D
k
j
;
p
i
jb
p
k
j
end
end
Figure 1: Protocol Specication

Citations
More filters
Journal ArticleDOI
TL;DR: Routing protocols for ad hoc networks are examined by providing an overview of eight different protocols by presenting their characteristics and functionality, and then a comparison and discussion of their respective merits and drawbacks are provided.
Abstract: An ad hoc mobile network is a collection of mobile nodes that are dynamically and arbitrarily located in such a manner that the interconnections between nodes are capable of changing on a continual basis. In order to facilitate communication within the network, a routing protocol is used to discover routes between nodes. The primary goal of such an ad hoc network routing protocol is correct and efficient route establishment between a pair of nodes so that messages may be delivered in a timely manner. Route construction should be done with a minimum of overhead and bandwidth consumption. This article examines routing protocols for ad hoc networks and evaluates these protocols based on a given set of parameters. The article provides an overview of eight different protocols by presenting their characteristics and functionality, and then provides a comparison and discussion of their respective merits and drawbacks.

4,278 citations

Proceedings ArticleDOI
09 Apr 1997
TL;DR: The proposed protocol is a new distributed routing protocol for mobile, multihop, wireless networks that is highly adaptive, efficient and scalable; being best-suited for use in large, dense, mobile networks.
Abstract: We present a new distributed routing protocol for mobile, multihop, wireless networks. The protocol is one of a family of protocols which we term "link reversal" algorithms. The protocol's reaction is structured as a temporally-ordered sequence of diffusing computations; each computation consisting of a sequence of directed link reversals. The protocol is highly adaptive, efficient and scalable; being best-suited for use in large, dense, mobile networks. In these networks, the protocol's reaction to link failures typically involves only a localized "single pass" of the distributed algorithm. This capability is unique among protocols which are stable in the face of network partitions, and results in the protocol's high degree of adaptivity. This desirable behavior is achieved through the novel use of a "physical or logical clock" to establish the "temporal order" of topological change events which is used to structure (or order) the algorithm's reaction to topological changes. We refer to the protocol as the temporally-ordered routing algorithm (TORA).

2,211 citations


Cites methods from "An efficient routing protocol for w..."

  • ...Additionally, like GB and LMR, it has no explicit reaction to link additions further reducing its complexity relative to ILS, DUAL and WRP....

    [...]

  • ...To further complicate the problem, good parameter selection will likely be dependent on the networking environment (i.e. the size of the network, rate of topological change, etc.) While WRP is described as providing only single path routing, nodes maintain sufficient information to perform multipath routing....

    [...]

  • ...Some existing algorithms which have been developed for this environment include the following: the GafniBertsekas (GB) algorithms [10], the Lightweight Mobile Routing (LMR) protocol [11], the Destination-Sequenced Distance Vector (DSDV) routing protocol [12], the Wireless Routing Protocol (WRP) [13], and the Dynamic Source Routing (DSR) protocol [14]....

    [...]

  • ...The complexities of TORA, along with an Ideal Link-state (ILS) algorithm, the DUAL family of algorithms, the GB full reversal algorithm, the LMR protocol, the DSDV protocol, and the WRP protocol are shown in Table 1....

    [...]

Proceedings ArticleDOI
01 Oct 2002
TL;DR: The goal is to use the least energy, storage, and other resources necessary to maintain a reliable system with a very high `data homing' success rate and it is believed that the domain-centric protocols and energy tradeoffs presented here for ZebraNet will have general applicability in other wireless and sensor applications.
Abstract: Over the past decade, mobile computing and wireless communication have become increasingly important drivers of many new computing applications. The field of wireless sensor networks particularly focuses on applications involving autonomous use of compute, sensing, and wireless communication devices for both scientific and commercial purposes. This paper examines the research decisions and design tradeoffs that arise when applying wireless peer-to-peer networking techniques in a mobile sensor network designed to support wildlife tracking for biology research.The ZebraNet system includes custom tracking collars (nodes) carried by animals under study across a large, wild area; the collars operate as a peer-to-peer network to deliver logged data back to researchers. The collars include global positioning system (GPS), Flash memory, wireless transceivers, and a small CPU; essentially each node is a small, wireless computing device. Since there is no cellular service or broadcast communication covering the region where animals are studied, ad hoc, peer-to-peer routing is needed. Although numerous ad hoc protocols exist, additional challenges arise because the researchers themselves are mobile and thus there is no fixed base station towards which to aim data. Overall, our goal is to use the least energy, storage, and other resources necessary to maintain a reliable system with a very high `data homing' success rate. We plan to deploy a 30-node ZebraNet system at the Mpala Research Centre in central Kenya. More broadly, we believe that the domain-centric protocols and energy tradeoffs presented here for ZebraNet will have general applicability in other wireless and sensor applications.

2,128 citations


Cites background from "An efficient routing protocol for w..."

  • ...Some proactively search for routes to all other nodes [26, 29], while others only look for a path when a message needs to be delivered [30, 15]....

    [...]

Proceedings ArticleDOI
25 Oct 1998
TL;DR: In this article, the authors present a case for using new power-aware metn.cs for determining routes in wireless ad hoc networks and show that using these new metrics ensures that the mean time to node failure is increased si~cantly.
Abstract: b this paper we present a case for using new power-aware metn.cs for determining routes in wireless ad hoc networks. We present five ~erent metriw based on battery power consumption at nodw. We show that using th=e metrics in a shortest-cost routing algorithm reduces the cost/packet of routing packets by 5-30% over shortwt-hop routing (this cost reduction is on top of a 40-70% reduction in energy consumption obtained by using PAMAS, our MAC layer prtocol). Furthermore, using these new metrics ensures that the mean time to node failure is increased si~cantly. An interesting property of using shortest-cost routing is that packet delays do not increase. Fintiy, we note that our new metrim can be used in most tradition routing protocols for ad hoc networks.

1,885 citations

Proceedings ArticleDOI
26 Mar 2000
TL;DR: An ad-hoc network of wireless static nodes is considered as it arises in a rapidly deployed, sensor-based, monitoring system and algorithms to select the routes and the corresponding power levels such that the time until the batteries of the nodes drain-out is maximized are proposed.
Abstract: An ad-hoc network of wireless static nodes is considered as it arises in a rapidly deployed, sensor-based, monitoring system. Information is generated in certain nodes and needs to reach a set of designated gateway nodes. Each node may adjust its power within a certain range that determines the set of possible one hop away neighbors. Traffic forwarding through multiple hops is employed when the intended destination is not within immediate reach. The nodes have limited initial amounts of energy that is consumed at different rates depending on the power level and the intended receiver. We propose algorithms to select the routes and the corresponding power levels such that the time until the batteries of the nodes drain-out is maximized. The algorithms are local and amenable to distributed implementation. When there is a single power level, the problem is reduced to a maximum flow problem with node capacities and the algorithms converge to the optimal solution. When there are multiple power levels then the achievable lifetime is close to the optimal (that is computed by linear programming) most of the time. It turns out that in order to maximize the lifetime, the traffic should be routed such that the energy consumption is balanced among the nodes in proportion to their energy reserves, instead of routing to minimize the absolute consumed power.

1,830 citations


Cites background from "An efficient routing protocol for w..."

  • ...Some other routing algorithms in mobile wireless networks can be found in [15], [12], [9], [14], which, as the majority of routing protocols in mobile ad-hoc networks do, use shortest-path routing where the number of hops is the path length....

    [...]

References
More filters
Book
01 Jan 1987
TL;DR: Undergraduate and graduate classes in computer networks and wireless communications; undergraduate classes in discrete mathematics, data structures, operating systems and programming languages.
Abstract: Undergraduate and graduate classes in computer networks and wireless communications; undergraduate classes in discrete mathematics, data structures, operating systems and programming languages. Also give lectures to both undergraduate-and graduate-level network classes and mentor undergraduate and graduate students for class projects.

6,991 citations


"An efficient routing protocol for w..." refers methods in this paper

  • ...The routing protocols used in multihop packet-radio networks implemented in the past [2,3,11] were based on shortest-path routing algorithms that have been typically based on the distributed Bellman-Ford Algorithm (DBF) [4]....

    [...]

Proceedings ArticleDOI
01 Oct 1994
TL;DR: The modifications address some of the previous objections to the use of Bellman-Ford, related to the poor looping properties of such algorithms in the face of broken links and the resulting time dependent nature of the interconnection topology describing the links between the Mobile hosts.
Abstract: An ad-hoc network is the cooperative engagement of a collection of Mobile Hosts without the required intervention of any centralized Access Point. In this paper we present an innovative design for the operation of such ad-hoc networks. The basic idea of the design is to operate each Mobile Host as a specialized router, which periodically advertises its view of the interconnection topology with other Mobile Hosts within the network. This amounts to a new sort of routing protocol. We have investigated modifications to the basic Bellman-Ford routing mechanisms, as specified by RIP [5], to make it suitable for a dynamic and self-starting network mechanism as is required by users wishing to utilize ad hoc networks. Our modifications address some of the previous objections to the use of Bellman-Ford, related to the poor looping properties of such algorithms in the face of broken links and the resulting time dependent nature of the interconnection topology describing the links between the Mobile Hosts. Finally, we describe the ways in which the basic network-layer routing can be modified to provide MAC-layer support for ad-hoc networks.

6,877 citations

01 Jul 1994
TL;DR: This document, together with its companion document, "Application of the Border Gateway Protocol in the Internet", define an inter- autonomous system routing protocol for the Internet.
Abstract: This document, together with its companion document, "Application of the Border Gateway Protocol in the Internet", define an inter- autonomous system routing protocol for the Internet.

2,832 citations


"An efficient routing protocol for w..." refers background in this paper

  • ...BGP [16] exchanges distance vectors that specify complete paths to destinations....

    [...]

01 Apr 1998
TL;DR: This memo documents version 2 of the OSPF protocol, a link-state routing protocol designed to be run internal to a single Autonomous System.
Abstract: This memo documents version 2 of the OSPF protocol. OSPF is a link-state routing protocol. It is designed to be run internal to a single Autonomous System. Each OSPF router maintains an identical database describing the Autonomous System's topology. From this database, a routing table is calculated by constructing a shortest- path tree.

2,413 citations

Frequently Asked Questions (12)
Q1. What are the contributions in this paper?

The authors present the wireless routing protocol ( WRP ). A detailed proof of correctness is presented and its performance is compared by simulation with the performance of the distributed Bellman-Ford algorithm ( DBF ), DUAL ( a loop-free distance-vector algorithm ) and an ideal link-state algorithm ( ILS ), which represent the state of the art of internet routing. 

Routers send packets over links by using the function-call interface to the link's actors, but they receive packets by responding to messages delivered from the input queue. 

The routing protocols used in multihop packet-radio networks implemented in the past [2, 3, 11] were based on shortest-path routing algorithms that have been typically based on the distributed Bellman-Ford algorithm (DBF) [4]. 

In terms of the correctness proof, the e ect of retransmissions is that of added delay in the delivery of an update message to a neighbor, and a link fails when a given number of retransmissions have been attempted. 

When a link fails or a link-cost changes, node i recomputes the distances and predecessors to all a ected destinations, and sends to all its neighbors an update message for all destinations whose distance or predecessor have changed. 

When the retransmission counter for a retransmission entry m in the MRL expires, node i sends an update message with a new sequence number, an update list containing the list of updates of the retransmission entry, and a response list specifying those neighbors who did not acknowledge the update message earlier (i.e., every neighbor k for whom aikm = 1). 

a number of distributed shortest-path algorithms have been proposed [5, 7, 9, 10, 15] that utilize information regarding the length and second-to-last hop (predecessor) of the shortest path to each destination to eliminate the counting-to-in nity problem of DBF. 

To reduce the complexity of the simulation, the authors have eliminated those features of the protocols that were common to all; these features concern the reliable transmission of updates over unreliable links, and the identi cation of neighbors. 

A detailed proof of correctness is presented and its performance is compared by simulation with the performance of the distributed Bellman-Ford algorithm (DBF), DUAL (a loop-free distance-vector algorithm) and an ideal link-state algorithm (ILS), which represent the state of the art of internet routing. 

Link failures and recoveries are simulated by sending link status message to the nodes at the end points of the appropriate links. 

under the assumption that no errors or collisions occur in the network channel, counting the number of acknowledgments received for a single update broadcast to all neighbors is much the same as counting the number of updates sent by a node to its neighbors on a point-to-point basis and with no acknowledgments|the two counts di er only by one. 

By de nition 1, the cost of the link can be extracted from the routing table as (Dvj D v i ), the predecessor p v j = i and the successor svi = k, from the function RT Update.