scispace - formally typeset
Search or ask a question

Showing papers on "Destination-Sequenced Distance Vector routing published in 2006"


Journal ArticleDOI
TL;DR: AOMDV as discussed by the authors is an on-demand, multipath distance vector routing protocol for mobile ad hoc networks, which guarantees loop freedom and disjointness of alternate paths.
Abstract: We develop an on-demand, multipath distance vector routing protocol for mobile ad hoc networks. Specifically, we propose multipath extensions to a well-studied single path routing protocol known as ad hoc on-demand distance vector (AODV). The resulting protocol is referred to as ad hoc on-demand multipath distance vector (AOMDV). The protocol guarantees loop freedom and disjointness of alternate paths. Performance comparison of AOMDV with AODV using ns-2 simulations shows that AOMDV is able to effectively cope with mobility-induced route failures. In particular, it reduces the packet loss by up to 40% and achieves a remarkable improvement in the end-to-end delay (often more than a factor of two). AOMDV also reduces routing overhead by about 30% by reducing the frequency of route discovery operations. Copyright © 2006 John Wiley & Sons, Ltd.

625 citations


Journal ArticleDOI
TL;DR: A generalized routing algorithm is given to find the so-called efficient path, which considers the possible congestion in the nodes along actual paths, to improve the transportation efficiency on complex networks.
Abstract: We propose a routing strategy to improve the transportation efficiency on complex networks. Instead of using the routing strategy for shortest path, we give a generalized routing algorithm to find the so-called efficient path, which considers the possible congestion in the nodes along actual paths. Since the nodes with the largest degree are very susceptible to traffic congestion, an effective way to improve traffic and control congestion, as our strategy, can be redistributing traffic load in central nodes to other noncentral nodes. Simulation results indicate that the network capability in processing traffic is improved more than 10 times by optimizing the efficient path, which is in good agreement with the analysis.

568 citations


Proceedings ArticleDOI
22 May 2006
TL;DR: This study studies the behavior of routing protocols in VANETs by using mobility information obtained from a microscopic vehicular traffic simulator that is based on the on the real road maps of Switzerland, and investigates two improvements that increase the packet delivery ratio and reduce the delay until the first packet arrives.
Abstract: Vehicular ad hoc networks (VANETs) using WLAN tech-nology have recently received considerable attention. The evaluation of VANET routing protocols often involves simulators since management and operation of a large number of real vehicular nodes is expensive. We study the behavior of routing protocols in VANETs by using mobility information obtained from a microscopic vehicular traffic simulator that is based on the on the real road maps of Switzerland. The performance of AODV and GPSR is significantly in uenced by the choice of mobility model, and we observe a significantly reduced packet delivery ratio when employing the realistic traffic simulator to control mobility of nodes. To address the performance limitations of communication pro-tocols in VANETs, we investigate two improvements that increase the packet delivery ratio and reduce the delay until the first packet arrives. The traces used in this study are available for public download.

549 citations


Journal ArticleDOI
TL;DR: This paper presents a class of algorithms that can be implemented at the sources to stably and optimally split the flow between each source-destination pair and shows that the connection-level throughput region of such multi-path routing/congestion control algorithms can be larger than that of a single-path congestion control scheme.
Abstract: We consider the problem of congestion-aware multi-path routing in the Internet. Currently, Internet routing protocols select only a single path between a source and a destination. However, due to many policy routing decisions, single-path routing may limit the achievable throughput. In this paper, we envision a scenario where multi-path routing is enabled in the Internet to take advantage of path diversity. Using minimal congestion feedback signals from the routers, we present a class of algorithms that can be implemented at the sources to stably and optimally split the flow between each source-destination pair. We then show that the connection-level throughput region of such multi-path routing/congestion control algorithms can be larger than that of a single-path congestion control scheme.

449 citations


06 Sep 2006
TL;DR: The Secure Ad hoc On-Demand Distance Vector is an extension of the AODV routing protocol that can be used to protect the route discovery mechanism providing security features like integrity and authentication.
Abstract: The Secure Ad hoc On-Demand Distance Vector (SAODV) is an extension of the AODV routing protocol that can be used to protect the route discovery mechanism providing security features like integrity and authentication.

394 citations


Journal ArticleDOI
11 Aug 2006
TL;DR: The experimental results show that VRR provides robust performance across a wide range of environments and workloads, and performs comparably to, or better than, the best wireless routing protocol in each experiment.
Abstract: This paper presents Virtual Ring Routing (VRR), a new network routing protocol that occupies a unique point in the design space. VRR is inspired by overlay routing algorithms in Distributed Hash Tables (DHTs) but it does not rely on an underlying network routing protocol. It is implemented directly on top of the link layer. VRR provides both raditional point-to-point network routing and DHT routing to the node responsible for a hash table key.VRR can be used with any link layer technology but this paper describes a design and several implementations of VRR that are tuned for wireless networks. We evaluate the performance of VRR using simulations and measurements from a sensor network and an 802.11a testbed. The experimental results show that VRR provides robust performance across a wide range of environments and workloads. It performs comparably to, or better than, the best wireless routing protocol in each experiment. VRR performs well because of its unique features: it does not require network flooding or trans-lation between fixed identifiers and location-dependent addresses.

392 citations


Proceedings ArticleDOI
24 Jul 2006
TL;DR: Analytical models based on queuing theory are developed for DyXY routing for a two-dimensional mesh NoC architecture, and analytical results match very well with the simulation results.
Abstract: A novel routing algorithm, namely dynamic XY (DyXY) routing, is proposed for NoCs to provide adaptive routing and ensure deadlock-free and livelock-free routing at the same time.A new router architecture is developed to support the routing algorithm.Analytical models based on queuing theory are developed for DyXY routing for a two-dimensional mesh NoC architecture,and analytical results match very well with the simulation results.It is observed that DyXY routing can achieve better performance compared with static XY routing and odd-even routing.

340 citations


Proceedings ArticleDOI
23 Apr 2006
TL;DR: It is shown that routing based on MobySpace can achieve good performance compared to that of a number of standard algorithms, especially for nodes that are present in the network a large portion of the time, and the degree of homogeneity of node mobility patterns has a high impact on routing.
Abstract: Because a delay tolerant network (DTN) can often be partitioned, routing is a challenge. However, routing benefits considerably if one can take advantage of knowledge concerning node mobility. This paper addresses this problem with a generic algorithm based on the use of a high-dimensional Euclidean space, that we call MobySpace, constructed upon nodes' mobility patterns. We provide here an analysis and a large scale evaluation of this routing scheme in the context of ambient networking by replaying real mobility traces. The specific MobySpace evaluated is based on the frequency of visits of nodes to each possible location. We show that routing based on MobySpace can achieve good performance compared to that of a number of standard algorithms, especially for nodes that are present in the network a large portion of the time. We determine that the degree of homogeneity of node mobility patterns has a high impact on routing. And finally, we study the ability of nodes to learn their own mobility patterns.

337 citations


Proceedings ArticleDOI
22 May 2006
TL;DR: This paper derives accurate closed form expressions for the expected encounter time between different nodes, under ommonly used mobility models, and demonstrates that derivative results oncerning the delay of various routing schemes are very accurate, under all the mobility models examined.
Abstract: Traditionally, ad hoc networks have been viewed as a connected graph over which end-to-end routing paths had to be established.Mobility was considered a necessary evil that invalidates paths and needs to be overcome in an intelligent way to allow for seamless ommunication between nodes.However, it has recently been recognized that mobility an be turned into a useful ally, by making nodes carry data around the network instead of transmitting them. This model of routing departs from the traditional paradigm and requires new theoretical tools to model its performance. A mobility-assisted protocol forwards data only when appropriate relays encounter each other, and thus the time between such encounters, called hitting or meeting time, is of high importance.In this paper, we derive accurate closed form expressions for the expected encounter time between different nodes, under ommonly used mobility models. We also propose a mobility model that can successfully capture some important real-world mobility haracteristics, often ignored in popular mobility models, and alculate hitting times for this model as well. Finally, we integrate this results with a general theoretical framework that can be used to analyze the performance of mobility-assisted routing schemes. We demonstrate that derivative results oncerning the delay of various routing s hemes are very accurate, under all the mobility models examined. Hence, this work helps in better under-standing the performance of various approaches in different settings, and an facilitate the design of new, improved protocols.

309 citations


Journal ArticleDOI
11 Aug 2006
TL;DR: An initial stab at the ROFL routing algorithm, proposing and analyzing its scaling and efficiency properties, and suggesting that the idea of routing on flat labels cannot be immediately dismissed.
Abstract: It is accepted wisdom that the current Internet architecture conflates network locations and host identities, but there is no agreement on how a future architecture should distinguish the two. One could sidestep this quandary by routing directly on host identities themselves, and eliminating the need for network-layer protocols to include any mention of network location. The key to achieving this is the ability to route on flat labels. In this paper we take an initial stab at this challenge, proposing and analyzing our ROFL routing algorithm. While its scaling and efficiency properties are far from ideal, our results suggest that the idea of routing on flat labels cannot be immediately dismissed.

293 citations


Proceedings ArticleDOI
29 Sep 2006
TL;DR: This article gives the first complete and formal proofs that several proposed face routing, and combined greedy-face routing schemes do guarantee delivery in specific graph classes or even any arbitrary planar graphs.
Abstract: It was recently reported that all known face and combined greedy-face routing variants cannot guarantee message delivery in arbitrary undirected planar graphs. The purpose of this article is to clarify that this is not the truth in general. We show that specifically in relative neighborhood and Gabriel graphs recovery from a greedy routing failure is always possible without changing between any adjacent faces. Guaranteed delivery then follows from guaranteed recovery while traversing the very first face. In arbitrary graphs, however, a proper face selection mechanism is of importance since recovery from a greedy routing failure may require visiting a sequence of faces before greedy routing can be restarted again. A prominent approach is to visit a sequence of faces which are intersected by the line connecting the source and destination node. Whenever encountering an edge which is intersecting with this line, the critical part is to decide if face traversal has to change to the next adjacent one or not. Failures may occur from incorporating face routing procedures that force to change the traversed face at each intersection. Recently observed routing failures which were produced by the GPSR protocol in arbitrary planar graphs result from incorporating such a face routing variant. They cannot be constructed by the well known GFG algorithm which does not force changing the face anytime. Beside methods which visit the faces intersected by the source destination line, we discuss face routing variants which simply restart face routing whenever the next face has to be explored. We give the first complete and formal proofs that several proposed face routing, and combined greedyface routing schemes do guarantee delivery in specific graph classes or even any arbitrary planar graphs. We also discuss the reasons why other methods may fail to deliver a message or even end up in a loop.

Journal ArticleDOI
TL;DR: A framework for optimal routing policy problems in stochastic time-dependent networks is established, which the author believes is the first in the literature.
Abstract: We study optimal routing policy problems in stochastic time-dependent networks, where link travel times are modeled as random variables with time-dependent distributions. These are fundamental network optimization problems for a wide variety of applications, such as transportation and telecommunication systems. The routing problems studied can be viewed as counterparts of shortest path problems in deterministic networks. A routing policy is defined as a decision rule that specifies what node to take next at each decision node based on realized link travel times and the current time. We establish a framework for optimal routing policy problems in stochastic time-dependent networks, which we believe is the first in the literature. We give a comprehensive taxonomy and an in-depth discussion of variants of the problem. We then study in detail one variant that is particularly pertinent in traffic networks, where both link-wise and time-wise stochastic dependencies of link travel times are considered and online information is represented. We give an exact algorithm to this variant, analyze its complexity and point out the importance of finding good approximations to the exact solution. We then overview several approximations, and present a summary of a theoretical and computational analysis of their effectiveness against the exact algorithm.

Journal ArticleDOI
TL;DR: In this paper, the authors propose a mathematical framework in which security can be precisely defined and routing protocols for mobile ad hoc networks can be proved to be secure in a rigorous manner.
Abstract: Routing is one of the most basic networking functions in mobile ad hoc networks. Hence, an adversary can easily paralyze the operation of the network by attacking the routing protocol. This has been realized by many researchers and several "secure" routing protocols have been proposed for ad hoc networks. However, the security of those protocols has mainly been analyzed by informal means only. In this paper, we argue that flaws in ad hoc routing protocols can be very subtle, and we advocate a more systematic way of analysis. We propose a mathematical framework in which security can be precisely defined and routing protocols for mobile ad hoc networks can be proved to be secure in a rigorous manner. Our framework is tailored for on-demand source routing protocols, but the general principles are applicable to other types of protocols too. Our approach is based on the simulation paradigm, which has already been used extensively for the analysis of key establishment protocols, but, to the best of our knowledge, it has not been applied in the context of ad hoc routing so far. We also propose a new on-demand source routing protocol, called endairA, and we demonstrate the use of our framework by proving that it is secure in our model

Proceedings ArticleDOI
18 Apr 2006
TL;DR: This paper presents a novel anonymous on demand routing scheme for MANETs and identifies a number of problems of previously proposed works and proposes an efficient solution that provides anonymity in a stronger adversary model.
Abstract: Due to the nature of radio transmissions, communications in wireless networks are easy to capture and analyze. Next to this, privacy enhancing techniques (PETs) proposed for wired networks such as the Internet often cannot be applied to mobile ad hoc networks (MANETs). In this paper we present a novel anonymous on demand routing scheme for MANETs. We identify a number of problems of previously proposed works and propose an efficient solution that provides anonymity in a stronger adversary model.

Journal ArticleDOI
11 Aug 2006
TL;DR: The design of a routing system in which end-systems set tags to select non-shortest path routes as an alternative to explicit source routes is presented, to provide end- systems with a high-level of path diversity that allows them to bypass unde-sirable locations within the network.
Abstract: We present the design of a routing system in which end-systems set tags to select non-shortest path routes as an alternative to explicit source routes Routers collectively generate these routes by using tags as hints to independently deflect packets to neighbors that lie off the shortest-path We show how this can be done simply, by local extensions of the shortest path machinery, and safely, so that loops are provably not formed The result is to provide end-systems with a high-level of path diversity that allows them to bypass unde-sirable locations within the network Unlike explicit source routing, our scheme is inherently scalable and compatible with ISP policies because it derives from the deployed Internet routing We also sug-gest an encoding that is compatible with common IP usage, making our scheme incrementally deployable at the granularity of individual routers

Journal ArticleDOI
TL;DR: SCAN is a unified network-layer security solution for such networks that protects both routing and data forwarding operations through the same reactive approach and exploits localized collaboration and information cross-validation to protect the network in a self-organized manner.
Abstract: Protecting the network layer from malicious attacks is an important yet challenging security issue in mobile ad hoc networks. In this paper, we describe SCAN, a unified network-layer security solution for such networks that protects both routing and data forwarding operations through the same reactive approach. SCAN does not apply any cryptographic primitives on the routing messages. Instead, it protects the network by detecting and reacting to the malicious nodes. In SCAN, local neighboring nodes collaboratively monitor each other and sustain each other, while no single node is superior to the others. SCAN also adopts a novel credit strategy to decrease its overhead as time evolves. In essence, SCAN exploits localized collaboration and information cross-validation to protect the network in a self-organized manner. Through both analysis and simulation results, we demonstrate the effectiveness of SCAN even in a highly mobile and hostile environment.

Journal ArticleDOI
TL;DR: It is demonstrated that the performance of the three trust-based reactive routing protocols varies significantly even under similar attack, traffic, and mobility conditions, making them suitable for application in a particular extemporized environment.
Abstract: Ad hoc networks, due to their improvised nature, are frequently established in insecure environments and hence become susceptible to attacks. These attacks are launched by participating malicious nodes against different network services. Routing protocols, which act as the binding force in these networks, are a common target of these nodes. A number of secure routing protocols have recently been proposed, which make use of cryptographic algorithms to secure the routes. However, in doing so, these protocols entail a number of prerequisites during both the network establishment and operation phases. In contrast, trust-based routing protocols locate trusted rather than secure routes in the network by observing the sincerity in participation by other nodes. These protocols thus permit rapid deployment along with a dynamically adaptive operation, which conforms with the current network situation. In this paper, we evaluate the performance of three trust-based reactive routing protocols in a network with varying number of malicious nodes. With the help of exhaustive simulations, we demonstrate that the performance of the three protocols varies significantly even under similar attack, traffic, and mobility conditions. However, each trust-based routing protocol has its own peculiar advantage making it suitable for application in a particular extemporized environment.

Journal ArticleDOI
TL;DR: It is argued that routing should not only be aware of, but also be adaptive to, network congestion, and proposed a routing protocol (CRP) with such properties is proposed.
Abstract: Mobility, channel error, and congestion are the main causes for packet loss in mobile ad hoc networks. Reducing packet loss typically involves congestion control operating on top of a mobility and failure adaptive routing protocol at the network layer. In the current designs, routing is not congestion-adaptive. Routing may let a congestion happen which is detected by congestion control, but dealing with congestion in this reactive manner results in longer delay and unnecessary packet loss and requires significant overhead if a new route is needed. This problem becomes more visible especially in large-scale transmission of heavy traffic such as multimedia data, where congestion is more probable and the negative impact of packet loss on the service quality is of more significance. We argue that routing should not only be aware of, but also be adaptive to, network congestion. Hence, we propose a routing protocol (CRP) with such properties. Our ns-2 simulation results confirm that CRP improves the packet loss rate and end-to-end delay while enjoying significantly smaller protocol overhead and higher energy efficiency as compared to AODV and DSR

Journal ArticleDOI
TL;DR: It is shown that the problem of routing messages in a wireless sensor network so as to maximize network lifetime is NP-hard and an online heuristic is developed, which performs two shortest path computations to route each message, which results in greater lifetime.
Abstract: We show that the problem of routing messages in a wireless sensor network so as to maximize network lifetime is NP-hard. In our model, the online model, each message has to be routed without knowledge of future route requests. We also develop an online heuristic to maximize network lifetime. Our heuristic, which performs two shortest path computations to route each message, is superior to previously published heuristics for lifetime maximization - our heuristic results in greater lifetime and its performance is less sensitive to the selection of heuristic parameters. Additionally, our heuristic is superior on the capacity metric

Journal ArticleDOI
TL;DR: Two new construction heuristics and a tabu search heuristic are presented for the truck and trailer routing problem, a variant of the vehicle routing problem and Computational results indicate that the heuristic are competitive to the existing approaches.

Proceedings ArticleDOI
30 Nov 2006
TL;DR: The experimental results have shown that GVGrid could provide routes with longer lifetime, compared with an existing routing protocol for VANETs.
Abstract: In this paper, we present a QoS routing protocol called GVGrid for multi-hop mobile ad hoc networks constructed by vehicles, i.e., vehicular ad hoc networks (VANETs). GVGrid constructs a route on demand from a source (a fixed node or a base station) to vehicles that reside in or drive through a specified geographic region. The goal of GVGrid is to maintain a high quality route, i.e. a robust route for the vehicles' movement. Such a route can be used for high quality communication and data transmission between roadsides and vehicles, or between vehicles. The experimental results have shown that GVGrid could provide routes with longer lifetime, compared with an existing routing protocol for VANETs.

Proceedings ArticleDOI
29 Sep 2006
TL;DR: The simulative evaluation proves that the position verification system successfully discloses nodes disseminating false positions and thereby widely prevents attacks using position cheating.
Abstract: Inter-vehicle communication is regarded as one of the major applications of mobile ad hoc networks (MANETs). Compared to other MANETs, these so called vehicular ad hoc networks (VANETs) have special requirements in terms of node mobility and position-dependent applications, which are well met by geographic routing protocols. Functional research on geographic routing has already reached a considerable level, whereas security aspects have been vastly neglected so far. Since position dissemination is crucial for geographic routing, forged position information has severe impact regarding both performance and security.In order to lessen this problem, we propose a detection mechanism that is capable of recognizing nodes cheating about their position in beacons (periodic position dissemination in most single-path geographic routing protocols, e.g. GPSR). Unlike other proposals described in the literature, our detection does not rely on additional hardware or special nodes, which contradicts the ad hoc approach. Instead, this mechanism uses a number of different independent sensors to quickly give an estimation of the trustworthiness of other nodes' position claims without using dedicated infrastructure or specialized hardware.The simulative evaluation proves that our position verification system successfully discloses nodes disseminating false positions and thereby widely prevents attacks using position cheating.

Journal ArticleDOI
TL;DR: F fuzzy simulation and genetic algorithm are integrated to design a hybrid intelligent algorithm to solve the fuzzy vehicle routing model in which the travel times are assumed to be fuzzy variables.

Journal ArticleDOI
TL;DR: This paper uses a game-theoretic approach to investigate the performance of selfish routing in Internet-like environments based on realistic topologies and traffic demands in simulations and shows that in contrast to theoretical worst cases, selfish routing achieves close to optimal average latency in such environments.
Abstract: A recent trend in routing research is to avoid inefficiencies in network-level routing by allowing hosts to either choose routes themselves (e.g., source routing) or use overlay routing networks (e.g., Detour or RON). Such approaches result in selfish routing, because routing decisions are no longer based on system-wide criteria but are instead designed to optimize host-based or overlay-based metrics. A series of theoretical results showing that selfish routing can result in suboptimal system behavior have cast doubts on this approach. In this paper, we use a game-theoretic approach to investigate the performance of selfish routing in Internet-like environments based on realistic topologies and traffic demands in our simulations. We show that in contrast to theoretical worst cases, selfish routing achieves close to optimal average latency in such environments. However, such performance benefits come at the expense of significantly increased congestion on certain links. Moreover, the adaptive nature of selfish overlays can significantly reduce the effectiveness of traffic engineering by making network traffic less predictable.

Journal ArticleDOI
TL;DR: This work explores the lower level medium access control and physical phenomena that affect routing decisions in multi-rate ad hoc networks and presents the Medium Time Metric (MTM) which avoids using the long range links often selected by shortest path routing in favor of shorter, higher throughput, more reliable links.
Abstract: Modern wireless devices, such as those that implement the 802.11abg standards, utilize multiple transmission rates in order to accommodate a wide range of channel conditions. The use of multiple rates presents a significantly more complex challenge to ad hoc routing protocols than the traditional single rate model. The hop count routing metric, which is traditionally used in single rate networks, is sub-optimal in multi-rate networks as it tends to select short paths composed of maximum length links. In a multi-rate network, these long distance links operate at the slowest available rate, thus achieving low effective throughput and reduced reliability due to the low signal levels. In this work we explore the lower level medium access control and physical phenomena that affect routing decisions in multi-rate ad hoc networks. We provide simulation results which illustrate the impact of these phenomena on effective throughput and show how the traditional minimum hop routing strategy is inappropriate for multi-rate networks. As an alternative, we present the Medium Time Metric (MTM) which avoids using the long range links often selected by shortest path routing in favor of shorter, higher throughput, more reliable links. Our experimental results with 802.11 g radios show that the Medium Time Metric achieves significantly higher throughput then alternative metrics. We observed up to 17 times more end-to-end TCP throughput than when the Min Hop or ETX metrics were used.

Journal ArticleDOI
TL;DR: A lightweight hierarchical routing model, way point routing (WPR), in which a number of intermediate nodes on a route are selected as waypoints and the route is divided into segments by the waypoints, which shows that DOA scales well for large networks with more than 1,000 nodes.
Abstract: We present a lightweight hierarchical routing model, way point routing (WPR), in which a number of intermediate nodes on a route are selected as waypoints and the route is divided into segments by the waypoints. The waypoints, including the source and the destination, run a high-level intersegment routing protocol, while the nodes on each segment run a low-level intrasegment routing protocol. One distinct advantage of our model is that when a node on the route moves out or fails, instead of discarding the whole original route and discovering a new route from the source to the destination, only the two waypoint nodes of the broken segment have to find a new segment. In addition, our model is lightweight because it maintains a hierarchy only for nodes on active routes. On the other hand, existing hierarchical routing protocols such as CGSR and ZRP maintain hierarchies for the entire network. We present an instantiation of WPR, where we use DSR as the intersegment routing protocol and AODV as the intrasegment routing protocol. This instantiation is termed DSR over AODV (DOA) routing protocol. Thus, DSR and AODV - two well-known on-demand routing protocols for MANETs - are combined into one hierarchical routing protocol and become two special cases of our protocol. Furthermore, we present two novel techniques for DOA: one is an efficient loop detection method and the other is a multitarget route, discovery. Simulation results show that DOA scales well for large networks with more than 1,000 nodes, incurring about 60 percent-80 percent less overhead than AODV, while other metrics are better than or comparable to AODV and DSR

Proceedings ArticleDOI
20 Nov 2006
TL;DR: The concept of ad hoc networking between aircraft is introduced, which can be considered as a novel approach in increasing the data rate and practicality of future in-flight broadband Internet access.
Abstract: There has been an enormous growth in mobile ad hoc networks (MANETs) in land based small to medium size networks with relatively strict power and resources. In this paper the concept of ad hoc networking between aircraft is introduced, which can be considered as a novel approach in increasing the data rate and practicality of future in-flight broadband Internet access. This method also reduces the Internet traffic load on satellite nodes and also propagation delay for real-time traffic transmissions, by effectively bypassing the satellite link for nonreal time data. A dynamic routing algorithm is also proposed for efficient routing in this kind of system. A new cost metric for increasing path duration is introduced to assist routing in the proposed ad hoc network

Proceedings ArticleDOI
18 Apr 2006
TL;DR: A MECH (maximum energy cluster head) routing protocol that has self-configuration and hierarchical tree routing properties, and reduces the distance of cluster-head to the base station.
Abstract: In recent years, there has been a growing interest in wireless sensor networks. One of the major issues in wireless sensor network is developing an energy-efficient routing protocol. Since the sensor nodes have limited available power, energy conservation is a critical issue in wireless sensor network for nodes and network life. Most of the existing routing protocols for sensor networks don't turn off the radio frequency completely. They speed up the energy consumption. LEACH (low energy adaptive clustering hierarchy) is a clustering-based protocol that non-cluster-head nodes will turn off their RF completely until their pre-allocated time slot. However, LEACH has a drawback that the cluster is not evenly distributed due to its randomized rotation of local cluster-head. In this paper, we propose a MECH (maximum energy cluster head) routing protocol. It has self-configuration and hierarchical tree routing properties. MECH improves LEACH in several aspects. MECH constructs clusters based on radio range and the number of cluster members. The cluster topology in the network is distributed more equally, through our cluster constructing. We also propose a hierarchical tree routing method that reduces the distance of cluster-head to the base station.

Proceedings ArticleDOI
25 Apr 2006
TL;DR: A new deterministic routing methodology for tori and meshes, which achieves high performance without the use of virtual channels, and is topology agnostic in nature, meaning it can handle any topology derived from any combination of faults when combined with static reconfiguration.
Abstract: Computers get faster every year, but the demand for computing resources seems to grow at an even faster rate. Depending on the problem domain, this demand for more power can be satisfied by either, massively parallel computers, or clusters of computers. Common for both approaches is the dependence on high performance interconnect networks such as Myrinet, Infiniband, or 10 Gigabit Ethernet. While high throughput and low latency are key features of interconnection networks, the issue of fault-tolerance is now becoming increasingly important. As the number of network components grows so does the probability for failure, thus it becomes important to also consider the fault-tolerance mechanism of interconnection networks. The main challenge then lies in combining performance and fault-tolerance, while still keeping cost and complexity low. This paper proposes a new deterministic routing methodology for tori and meshes, which achieves high performance without the use of virtual channels. Furthermore, it is topology agnostic in nature, meaning it can handle any topology derived from any combination of faults when combined with static reconfiguration. The algorithm, referred to as segment-based routing (SR), works by partitioning a topology into subnets, and subnets into segments. This allows us to place bidirectional turn restrictions locally within a segment. As segments are independent, we gain the freedom to place turn restrictions within a segment independently from other segments. This results in a larger degree of freedom when placing turn restrictions compared to other routing strategies. In this paper a way to compute segment-based routing tables is presented and applied to meshes and tori. Evaluation results show that SR increases performance by a factor of 1.8 over FX and up*/down* routing.

Proceedings ArticleDOI
11 Sep 2006
TL;DR: This paper proposes a hybrid scheme that combines AODV and DTN-based routing and allows keeping the A ODV advantage of maintaining end-to-end semantics whenever possible while, at the same time, also offeringDTN- based communication options whenever available---leaving the choice to the application.
Abstract: Mobile Ad-hoc Network (MANET) routing protocols aim at establishing end-to-end paths between communicating nodes and thus support end-to-end semantics of existing transports and applications. In contrast, DTN-based communication schemes imply asynchronous communication (and thus often require new applications) but achieve better reachability, particularly in sparsely populated environments. In this paper, we suggest a hybrid scheme that combines AODV and DTN-based routing and allows keeping the AODV advantage of maintaining end-to-end semantics whenever possible while, at the same time, also offering DTN-based communication options whenever available---leaving the choice to the application. We present our protocol and system design, particularly including the interaction of AODV and DTN, demonstrate achievable performance gains based upon measurements, and report on initial experiments with our implementation in an emulation environment.