scispace - formally typeset
Search or ask a question

Showing papers on "Dynamic Source Routing published in 2007"


01 Feb 2007
TL;DR: The Dynamic Source Routing protocol is a simple and efficient routing protocol designed specifically for use in multi-hop wireless ad hoc networks of mobile nodes, designed to work well even with very high rates of mobility.
Abstract: The Dynamic Source Routing protocol (DSR) is a simple and efficient routing protocol designed specifically for use in multi-hop wireless ad hoc networks of mobile nodes. DSR allows the network to be completely self-organizing and self-configuring, without the need for any existing network infrastructure or administration. The protocol is composed of the two mechanisms of "Route Discovery" and "Route Maintenance", which work together to allow nodes to discover and maintain source routes to arbitrary destinations in the ad hoc network. The use of source routing allows packet routing to be trivially loop-free, avoids the need for up-to-date routing information in the intermediate nodes through which packets are forwarded, and allows nodes forwarding or overhearing packets to cache the routing information in them for their own future use. All aspects of the protocol operate entirely on-demand, allowing the routing packet overhead of DSR to scale automatically to only that needed to react to changes in the routes currently in use. This document specifies the operation of the DSR protocol for routing unicast IP packets in multi-hop wireless ad hoc networks.

1,649 citations


Proceedings ArticleDOI
09 Sep 2007
TL;DR: SimBet Routing is proposed which exploits the exchange of pre-estimated "betweenness' centrality metrics and locally determined social "similarity' to the destination node and outperforms PRoPHET Routing, particularly when the sending and receiving nodes have low connectivity.
Abstract: Message delivery in sparse Mobile Ad hoc Networks (MANETs) is difficult due to the fact that the network graph is rarely (if ever) connected. A key challenge is to find a route that can provide good delivery performance and low end-to-end delay in a disconnected network graph where nodes may move freely. This paper presents a multidisciplinary solution based on the consideration of the so-called small world dynamics which have been proposed for economy and social studies and have recently revealed to be a successful approach to be exploited for characterising information propagation in wireless networks. To this purpose, some bridge nodes are identified based on their centrality characteristics, i.e., on their capability to broker information exchange among otherwise disconnected nodes. Due to the complexity of the centrality metrics in populated networks the concept of ego networks is exploited where nodes are not required to exchange information about the entire network topology, but only locally available information is considered. Then SimBet Routing is proposed which exploits the exchange of pre-estimated "betweenness' centrality metrics and locally determined social "similarity' to the destination node. We present simulations using real trace data to demonstrate that SimBet Routing results in delivery performance close to Epidemic Routing but with significantly reduced overhead. Additionally, we show that SimBet Routing outperforms PRoPHET Routing, particularly when the sending and receiving nodes have low connectivity.

1,232 citations


Proceedings ArticleDOI
27 Aug 2007
TL;DR: More as mentioned in this paper is a MAC-independent opportunistic routing protocol, which randomly mixes packets before forwarding them to ensure that routers that hear the same transmission do not forward the same packets, thus, it needs no special scheduler to coordinate routers and can run directly on top of 802.11.
Abstract: Opportunistic routing is a recent technique that achieves high throughput in the face of lossy wireless links. The current opportunistic routing protocol, ExOR, ties the MAC with routing, imposing a strict schedule on routers' access to the medium. Although the scheduler delivers opportunistic gains, it misses some of the inherent features of the 802.11 MAC. For example, it prevents spatial reuse and thus may underutilize the wireless medium. It also eliminates the layering abstraction, making the protocol less amenable to extensions to alternate traffic types such as multicast.This paper presents MORE, a MAC-independent opportunistic routing protocol. MORE randomly mixes packets before forwarding them. This randomness ensures that routers that hear the same transmission do not forward the same packets. Thus, MORE needs no special scheduler to coordinate routers and can run directly on top of 802.11. Experimental results from a 20-node wireless testbed show that MORE's median unicast throughput is 22% higher than ExOR, and the gains rise to 45% over ExOR when there is a chance of spatial reuse. For multicast, MORE's gains increase with the number of destinations, and are 35-200% greater than ExOR.

1,198 citations


Proceedings ArticleDOI
27 Aug 2007
TL;DR: RAPID is presented, an intentional DTN routing protocol that can optimize a specific routing metric such as worst-case delivery latency or the fraction of packets that are delivered within a deadline and significantly outperforms existing routing protocols for several metrics.
Abstract: Many DTN routing protocols use a variety of mechanisms, including discovering the meeting probabilities among nodes, packet replication, and network coding. The primary focus of these mechanisms is to increase the likelihood of finding a path with limited information, so these approaches have only an incidental effect on such routing metrics as maximum or average delivery latency. In this paper, we present RAPID, an intentional DTN routing protocol that can optimize a specific routing metric such as worst-case delivery latency or the fraction of packets that are delivered within a deadline. The key insight is to treat DTN routing as a resource allocation problem that translates the routing metric into per-packet utilities which determine how packets should be replicated in the system.We evaluate RAPID rigorously through a prototype of RAPID deployed over a vehicular DTN testbed of 40 buses and simulations based on real traces. To our knowledge, this is the first paper to report on a routing protocol deployed on a real DTN at this scale. Our results suggest that RAPID significantly outperforms existing routing protocols for several metrics. We also show empirically that for small loads RAPID is within 10% of the optimal performance.

1,078 citations


Journal ArticleDOI
TL;DR: This paper uses empirical vehicle traffic data measured on 1-80 freeway in California to develop a comprehensive analytical framework to study the disconnected network phenomenon and its network characteristics, and shows that, depending on the sparsity of vehicles or the market penetration rate of cars using Dedicated Short Range Communication technology, the network re-healing time can vary from a few seconds to several minutes.
Abstract: A vehicular ad hoc network (VANET) may exhibit a bipolar behavior, i.e., the network can either be fully connected or sparsely connected depending on the time of day or on the market penetration rate of the wireless communication devices. In this paper, we use empirical vehicle traffic data measured on 1-80 freeway in California to develop a comprehensive analytical framework to study the disconnected network phenomenon and its network characteristics. These characteristics shed light on the key routing performance metrics of interest in disconnected VANETs, such as the average time taken to propagate a packet to disconnected nodes (i.e., the re-healing time). Our results show that, depending on the sparsity of vehicles or the market penetration rate of cars using Dedicated Short Range Communication (DSRC) technology, the network re-healing time can vary from a few seconds to several minutes. This suggests that, for vehicular safety applications, a new ad hoc routing protocol will be needed as the conventional ad hoc routing protocols such as Dynamic Source Routing (DSR) and Ad Hoc On-Demand Distance Vector Routing (AODV) will not work with such long re-healing times. In addition, the developed analytical framework and its predictions provide valuable insights into the VANET routing performance in the disconnected network regime.

534 citations


Journal ArticleDOI
TL;DR: The main idea of the 2ACK scheme is to send two-hop acknowledgment packets in the opposite direction of the routing path in order to reduce additional routing overhead.
Abstract: We study routing misbehavior in MANETs (mobile ad hoc networks) in this paper. In general, routing protocols for MANETs are designed based on the assumption that all participating nodes are fully cooperative. However, due to the open structure and scarcely available battery-based energy, node misbehaviors may exist. One such routing misbehavior is that some selfish nodes will participate in the route discovery and maintenance processes but refuse to forward data packets. In this paper, we propose the 2ACK scheme that serves as an add-on technique for routing schemes to detect routing misbehavior and to mitigate their adverse effect. The main idea of the 2ACK scheme is to send two-hop acknowledgment packets in the opposite direction of the routing path. In order to reduce additional routing overhead, only a fraction of the received data packets are acknowledged in the 2ACK scheme. Analytical and simulation results are presented to evaluate the performance of the proposed scheme

485 citations


01 Jan 2007
TL;DR: In this paper, the authors investigate the state-of-the-art of security issues in MANET and examine routing attacks, such as link spoofing and colluding misrelay attacks, as well as countermeasures against such attacks.
Abstract: Recently, mobile ad hoc networks became a hot research topic among researchers due to their flexibility and independence of network infrastructures, such as base stations. Due to unique characteristics, such as dynamic network topology, limited bandwidth, and limited battery power, routing in a MANET is a particularly challenging task compared to a conventional network. Early work in MANET research has mainly focused on developing an efficient routing mechanism in such a highly dynamic and resource-constrained network. At present, several efficient routing protocols have been proposed for MANET. Most of these protocols assume a trusted and cooperative environment. However, in the presence of malicious nodes, the networks are vulnerable to various kinds of attacks. In MANET, routing attacks are particularly serious. In this article, we investigate the state-of-the-art of security issues in MANET. In particular, we examine routing attacks, such as link spoofing and colluding misrelay attacks, as well as countermeasures against such attacks in existing MANET protocols.

474 citations


Journal ArticleDOI
TL;DR: This article investigates the state-of-the-art of security issues in MANET and examines routing attacks, such as link spoofing and colluding misrelay attacks, as well as countermeasures against such attacks in existing MANET protocols.
Abstract: Recently, mobile ad hoc networks became a hot research topic among researchers due to their flexibility and independence of network infrastructures, such as base stations. Due to unique characteristics, such as dynamic network topology, limited bandwidth, and limited battery power, routing in a MANET is a particularly challenging task compared to a conventional network. Early work in MANET research has mainly focused on developing an efficient routing mechanism in such a highly dynamic and resource-constrained network. At present, several efficient routing protocols have been proposed for MANET. Most of these protocols assume a trusted and cooperative environment. However, in the presence of malicious nodes, the networks are vulnerable to various kinds of attacks. In MANET, routing attacks are particularly serious. In this article, we investigate the state-of-the-art of security issues in MANET. In particular, we examine routing attacks, such as link spoofing and colluding misrelay attacks, as well as countermeasures against such attacks in existing MANET protocols.

447 citations


Proceedings ArticleDOI
01 May 2007
TL;DR: A scalable and reliable point-to-point routing algorithm for ad hoc wireless networks and sensor-nets, and it is proved that the greedy routing strategy makes a consistent choice of the node responsible for the address, irrespective of the source address of the request.
Abstract: We propose a scalable and reliable point-to-point routing algorithm for ad hoc wireless networks and sensor-nets. Our algorithm assigns to each node of the network a virtual coordinate in the hyperbolic plane, and performs greedy geographic routing with respect to these virtual coordinates. Unlike other proposed greedy routing algorithms based on virtual coordinates, our embedding guarantees that the greedy algorithm is always successful in finding a route to the destination, if such a route exists. We describe a distributed algorithm for computing each node's virtual coordinates in the hyperbolic plane, and for greedily routing packets to a destination point in the hyperbolic plane. (This destination may be the address of another node of the network, or it may be an address associated to a piece of content in a Distributed Hash Table. In the latter case we prove that the greedy routing strategy makes a consistent choice of the node responsible for the address, irrespective of the source address of the request.) We evaluate the resulting algorithm in terms of both path stretch and node congestion.

423 citations


Journal ArticleDOI
TL;DR: A metric that estimates the average waiting time for each potential next hop is designed, which provides performance similar to that of schemes that have global knowledge of the network topology, yet without requiring that knowledge.
Abstract: Delay-tolerant networks (DTNs) have the potential to interconnect devices in regions that current networking technology cannot reach. To realize the DTN vision, routes must be found over multiple unreliable, intermittently-connected hops. In this paper we present a practical routing protocol that uses only observed information about the network. We designed a metric that estimates the average waiting time for each potential next hop. This learned topology information is distributed using a link-state routing protocol, where the link-state packets are "flooded" using epidemic routing. The routing is recomputed each time connections are established, allowing messages to take advantage of unpredictable contacts. A message is forwarded if the topology suggests that the connected node is "closer" to the destination than the current node. We demonstrate through simulation that our protocol provides performance similar to that of schemes that have global knowledge of the network topology, yet without requiring that knowledge. Further, it requires significantly less resources than the alternative, epidemic routing, suggesting that our approach scales better with the number of messages in the network. This performance is achieved with minimal protocol overhead for networks of approximately 100 nodes.

380 citations


Proceedings ArticleDOI
01 May 2007
TL;DR: In this paper, a theoretical formulation for computing the throughput of network coding on any wireless network topology and any pattern of concurrent unicast traffic sessions is presented, and the tradeoff between routing flows close to each other for utilizing coding opportunities and away from each other to avoid wireless interference is analyzed.
Abstract: A recent approach, COPE, for improving the throughput of unicast traffic in wireless multi-hop networks exploits the broadcast nature of the wireless medium through opportunistic network coding. In this paper, we analyze throughput improvements obtained by COPE-type network coding in wireless networks from a theoretical perspective. We make two key contributions. First, we obtain a theoretical formulation for computing the throughput of network coding on any wireless network topology and any pattern of concurrent unicast traffic sessions. Second, we advocate that routing be made aware of network coding opportunities rather than, as in COPE, being oblivious to it. More importantly, our work studies the tradeoff between routing flows "close to each other" for utilizing coding opportunities and "away from each other" for avoiding wireless interference. Our theoretical formulation provides a method for computing source-destination routes and utilizing the best coding opportunities from available ones so as to maximize the throughput. We handle scheduling of broadcast transmissions subject to wireless transmit/receive diversity and link interference in our optimization framework. Using our formulations, we compare the performance of traditional unicast routing and network coding with coding-oblivious and coding-aware routing on a variety of mesh network topologies, including some derived from contemporary mesh network testbeds. Our evaluations show that a route selection strategy that is aware of network coding opportunities leads to higher end-to-end throughput when compared to coding-oblivious routing strategies.

Proceedings ArticleDOI
18 Jun 2007
TL;DR: Results show that HH-VBF yields much better performance than VBF in sparse networks, and is less sensitive to the routing pipe radius threshold, and the behavior of HH- VBF can facilitate the avoidance of any "void" areas in the network.
Abstract: This paper investigates a fundamental networking problem in underwater sensor networks: robust and energy-efficient routing. We present an adaptive location-based routing protocol, called hop-by-hop vector-based forwarding (HH-VBF). It uses the notion of a "routing vector" (a vector from the source to the sink) acting as the axis of the "routing pipe", similar to the vector based forward (VBF) routing in the work of P. Xie, J.-H. Cui and L. Lao (VBF: Vector-Based Forwarding Protocol for Underwater Sensor Networks. Technical report, UCONN CSE Technical Report: UbiNet-TR05-03 (BECAT/CSE-TR-05-6), Feb. 2005). Unlike the original VBF approach, however, HH-VBF suggests the use of a routing vector for each individual forwarder in the network, instead of a single network-wide source-to-sink routing vector. By the creation of the hop-by-hop vectors, HH-VBF can overcome two major problems in VBF: (1) too small data delivery ratio for sparse networks; (2) too sensitive to "routing pipe" radius threshold. We conduct simulations to evaluate HH-VBF, and the results show that HH-VBF yields much better performance than VBF in sparse networks. In addition, HH-VBF is less sensitive to the routing pipe radius threshold. Furthermore, we also analyze the behavior of HH-VBF and show that assuming proper redundancy and feedback techniques, HH-VBF can facilitate the avoidance of any "void" areas in the network.

Book
12 Apr 2007
TL;DR: Introduction / Part I: Packet Routed / Part II: Circuitswitched (Voice) Routing / Part III: Transport Routing/ Part IV: Router and Switching Architecture / Part V: Integrated Routing & New Directions
Abstract: Introduction / Part I: Packet Routing / Part II: Circuitswitched (Voice) Routing / Part III: Transport Routing / Part IV: Router and Switching Architecture / Part V: Integrated Routing & New Directions

Proceedings ArticleDOI
29 Oct 2007
TL;DR: The extent to which routing performance optimizations have left the system vulnerable to end-to-end traffic analysis attacks from non-global adversaries with minimal resources is shown.
Abstract: Tor has become one of the most popular overlay networks for anonymizing TCP traffic. Its popularity is due in part to its perceived strong anonymity properties and its relatively low latency service. Low latency is achieved through Tor's ability to balance the traffic load by optimizing Tor router selection to probabilistically favor routers with high bandwidth capabilities. We investigate how Tor's routing optimizations impact its ability to provide strong anonymity. Through experiments conducted on PlanetLab, we show the extent to which routing performance optimizations have left the system vulnerable to end-to-end traffic analysis attacks from non-global adversaries with minimal resources. Further, we demonstrate that entry guards, added to mitigate path disruption attacks, are themselves vulnerable to attack. Finally, we explore solutions to improve Tor's current routing algorithms and propose alternative routing strategies that prevent some of the routing attacks used in our experiments.

Proceedings ArticleDOI
11 May 2007
TL;DR: The first complete version of a multi-hop broadcast protocol for vehicular ad hoc networks (VANET) is reported and it is shown that the broadcast message can be disseminate efficiently and the proposed design of the distributed vehicular broadcast (DV-CAST) protocol integrates the use of various routing solutions.
Abstract: In this paper, we report the first complete version of a multi-hop broadcast protocol for vehicular ad hoc networks (VANET). Our results clearly show that broadcasting in VANET is very different from routing in mobile ad hoc networks (MANET) due to several reasons such as network topology, mobility patterns, demographics, traffic patterns at different times of the day, etc. These differences imply that conventional ad hoc routing protocols such as DSR and AODV will not be appropriate in VANETs for most vehicular broadcast applications. We identify three very different regimes that a vehicular broadcast protocol needs to work in: i) dense traffic regime; ii) sparse traffic regime; and iii) regular traffic regime. We build upon our previously proposed routing solutions for each regime and we show that the broadcast message can be disseminate efficiently. The proposed design of the distributed vehicular broadcast (DV-CAST) protocol integrates the use of various routing solutions we have previously proposed.

Journal ArticleDOI
Philip A. Chou1, Yunnan Wu1
TL;DR: An overview of the theory, practice, and applications of network coding is provided, including resource efficiency, computational efficiency, and robustness to network dynamics.
Abstract: In today's practical communication networks such as the Internet, information delivery is performed by routing. A promising generalization of routing is network coding. The potential advantages of network coding over routing include resource (e.g., bandwidth and power) efficiency, computational efficiency, and robustness to network dynamics. This tutorial article provides an overview of the theory, practice, and applications of network coding.

Proceedings ArticleDOI
18 Jun 2007
TL;DR: This paper proposes a context-based protocol (HiBOp), and compares it with popular solutions, i.e., Epidemic Routing and PROPHET, to show that HiBOp is able to drastically reduce resource consumption and preserves the performance in terms of message delay.
Abstract: In opportunistic networks the existence of a simultaneous path between a sender and a receiver is not assumed. This model (which fits well to pervasive networking environments) completely breaks the main assumptions on which MANET routing protocols are built. Routing in opportunistic networks is usually based on some form of controlled flooding. But often this results in very high resource consumption and network congestion. In this paper we advocate context-based routing for opportunistic networks. We provide a general framework for managing and using context for taking forwarding decisions. We propose a context-based protocol (HiBOp), and compare it with popular solutions, i.e., Epidemic Routing and PROPHET. Results show that HiBOp is able to drastically reduce resource consumption. At the same time, it significantly reduces the message loss rate, and preserves the performance in terms of message delay.

Journal ArticleDOI
TL;DR: A prediction-based routing (PBR) protocol that is specifically tailored to the mobile gateway scenario and takes advantage of the predictable mobility pattern of vehicles on highways, which uses predicted route lifetimes to preemptively create new routes before existing ones fail.
Abstract: Development in short-range wireless LAN (WLAN) and long-range wireless WAN (WWAN) technologies have motivated recent efforts to integrate the two. This creates new application scenarios that were not possible before. Vehicles with only WLAN radios can use other vehicles that have both WLAN and WWAN radios as mobile gateways and connect to the Internet while on the road. The most difficult challenge in the scenario is to deal with frequent route breakages due to dynamic mobility of vehicles on the road. Existing routing protocols that are widely used for mobile ad hoc networks are reactive in nature and wait until existing routes break before constructing new routes. The frequent route failures result in a significant amount of time needed for repairing existing routes or reconstructing new routes. In spite of the dynamic mobility, the motion of vehicles on highways is quite predictable compared to other mobility patterns for wireless ad hoc networks, with location and velocity information readily available. This can be exploited to predict how long a route will last between a vehicle requiring Internet connectivity and the gateway that provides a route to the Internet. Successful prediction of route lifetimes can significantly reduce the number of route failures. In this paper, we introduce a prediction-based routing (PBR) protocol that is specifically tailored to the mobile gateway scenario and takes advantage of the predictable mobility pattern of vehicles on highways. The protocol uses predicted route lifetimes to preemptively create new routes before existing ones fail. We study the performance of this protocol through simulation and demonstrate significant reductions in route failures compared to protocols that do not use preemptive routing. Moreover, we find that the overhead of preemptive routing is kept in check due to the ability of PBR to predict route lifetimes.

Proceedings ArticleDOI
24 Jun 2007
TL;DR: This work proposes an inter-vehicle ad-hoc routing protocol called GyTAR (improved greedy traffic aware routing protocol) suitable for city environments and shows significant performance improvement in terms of packet delivery ratio, end-to-end delay, and routing overhead.
Abstract: The fundamental component for the success of VANET (vehicular ad hoc networks) applications is routing since it must efficiently handle rapid topology changes and a fragmented network. Current MANET (mobile ad hoc networks) routing protocols fail to fully address these specific needs especially in a city environments (nodes distribution, constrained but high mobility patterns, signal transmissions blocked by obstacles, etc.). In our current work, we propose an inter-vehicle ad-hoc routing protocol called GyTAR (improved greedy traffic aware routing protocol) suitable for city environments. GyTAR consists of two modules: (i) dynamic selection of the junctions through which a packet must pass to reach its destination, and (ii) an improved greedy strategy used to forward packets between two junctions. In this paper, we give detailed description of our approach and present its added value compared to other existing vehicular routing protocols. Simulation results show significant performance improvement in terms of packet delivery ratio, end-to-end delay, and routing overhead.

Proceedings ArticleDOI
21 May 2007
TL;DR: Evaluating the performance of reactive (AODV, DSR) and proactive (OLSR) routing protocols in MANETs under CBR traffic with different network conditions shows the superiority of proactive over reactive protocols in routing such traffic at the cost of a higher routing load.
Abstract: The mobility of nodes in mobile ad hoc networks (MANETs) results in frequent changes of network topology making routing in MANETs a challenging task. Some studies have been reported in the literature to evaluate the performance of the proposed routing algorithms. However, since the publication of experimental standards for some routing protocols by IETF, little activity has been done to contrast the performance of reactive against proactive protocols. This paper evaluates the performance of reactive (AODV, DSR) and proactive (OLSR) routing protocols in MANETs under CBR traffic with different network conditions. Our results, contrarily to previously reported studies conducted on the same routing protocols, show the superiority of proactive over reactive protocols in routing such traffic at the cost of a higher routing load.

Proceedings ArticleDOI
24 Jun 2007
TL;DR: A node analytical model is proposed to describe the scheduling-based channel assignment progress, which relief the inter-flow interference and frequent switching delay and an on-demand interaction is used to derive a cumulative delay based routing protocol.
Abstract: In cognitive radio networks, nodes can work on different frequency bands. Existing routing proposals help nodes select frequency bands without considering the effect of band switching and intra-band backoff. In this paper, We propose a joint interaction between on-demand routing and spectrum scheduling. A node analytical model is proposed to describe the scheduling-based channel assignment progress, which relief the inter-flow interference and frequent switching delay. We also use an on-demand interaction to derive a cumulative delay based routing protocol. Simulation results show that, comparing to other approaches, our protocol provides better adaptability to the multi- flow environment and derives paths with much lower cumulative delay.

Journal ArticleDOI
TL;DR: An overview of the void problem is presented and the currently available void-handling techniques (as of July 2006) for geographic routing are surveyed, each designed with a different approach.
Abstract: Communications voids, where geographic greedy forwarding fails to move a packet further towards its destination, are an important issue for geographic routing in wireless networks. This article presents an overview of the void problem and surveys the currently available void-handling techniques (as of July 2006) for geographic routing. In the survey, we classify these void-handling techniques into six categories, each designed with a different approach, that is, planar-graph-based, geometric, flooding-based, costbased, heuristic, and hybrid. For each category, we present its basic principle and illustrate some classic techniques as well as the latest advances. We also provide a qualitative comparison of these techniques and discuss some possible directions of future research.

Proceedings ArticleDOI
01 Apr 2007
TL;DR: This paper proposes an approach to reactively initiate route computing and frequency band selection, and presents a novel multi-flow multi-frequency scheduling scheme for single node to relief the multi- flow interference and frequent switching delay.
Abstract: Routing in multi-hop cognitive radio net- works(CRN) should consider how to dynamically switch frequency band for either per flow throughput guarantee or global spectrum utilization. Previous research have offered both centralized and distributed solutions on combining the two, but since different nodes may sense different spectrum availability, efficiently sharing this information in the dynamic spectrum environment still remains challenging. In this paper, we propose an approach to reactively initiate route computing and frequency band selection. We further present a novel multi-flow multi-frequency scheduling scheme for single node to relief the multi-flow interference and frequent switching delay. We use cumulative delay along the path for evaluation, simulation results show that, comparing to other typical approaches, our protocol provides better adaptability to the dynamic spectrum and multi-flow environment, and incurs much lower cumulative delay.

Patent
07 May 2007
TL;DR: In this article, a path is selected using a context-based path pruning (CPP) technique that involves maintaining multiple local contexts at each intermediate node, with each local context representing at least one partial path.
Abstract: Context-based routing in multi-hop networks involves using a context-based routing metric. In a described implementation, respective path values are calculated for respective ones of multiple paths using the context-based routing metric. A path is selected from the multiple paths responsive to the calculated path values. Data is transmitted over at least one link of the selected path. In an example embodiment, the context-based routing metric is ascertained responsive to an estimated service interval (ESI) of a bottleneck link of each path of the multiple paths. In another example embodiment, the context-based routing metric is ascertained responsive to an expected resource consumption (ERC) metric. In an example embodiment of path selection, the path is selected using a context-based path pruning (CPP) technique that involves maintaining multiple local contexts at each intermediate node, with each local context representing at least one partial path.

Journal ArticleDOI
TL;DR: Routing protocols used in wired network cannot be used for mobile ad-hoc networks because of node mobility, so these protocols are divided into two classes: table driven and demand based.
Abstract: Mobile ad hoc networks(MANET) represent complex distributed systems that comprise wireless mobile nodes that can freely and dynamically self organize into arbitrary and temporary ad-hoc network topologies, allowing people and devices to seamlessly internet work in areas with no preexisting communication infrastructure e.g., disaster recovery environments. An ad-hoc network is not a new one, having been around in various forms for over 20 years. Traditionally, tactical networks have been the only communication networking application that followed the ad-hoc paradigm. Recently the introduction of new technologies such as Bluetooth, IEEE 802.11 and hyperlan are helping enable eventual commercial MANET deployments outside the military domain. These recent revolutions have been generating a renewed and growing interest in the research and development of MANET. To facilitate communication within the network a routing protocol is used to discover routes between nodes. The goal of the routing protocol is to have an efficient route establishment between a pair of nodes, so that messages can be delivered in a timely manner. Bandwidth and power constraints are the important factors to be considered in current wireless network because multi-hop ad-hoc wireless relies on each node in the network to act as a router and packet forwarder. This dependency places bandwidth, power computation demands on mobile host to be taken into account while choosing the protocol. Routing protocols used in wired network cannot be used for mobile ad-hoc networks because of node mobility. The ad-hoc routing protocols are divided into two classes: table driven and demand based. This paper reviews and discusses routing protocol belonging to each category.

Journal ArticleDOI
TL;DR: This paper proposes a distributed, scalable and localized multipath search protocol to discover multiple node-disjoint paths between the sink and source nodes and proposes a load balancing algorithm to distribute the traffic over the multiple paths discovered.
Abstract: The energy consumption is a key design criterion for the routing protocols in wireless sensor networks. Some of the conventional single path routing schemes may not be optimal to maximize the network lifetime and connectivity. In this paper, we propose a distributed, scalable and localized multipath search protocol to discover multiple node-disjoint paths between the sink and source nodes. We also propose a load balancing algorithm to distribute the traffic over the multiple paths discovered. We compare our proposed scheme with the directed diffusion, directed transmission, N-to-1 multipath routing, and the energy-aware routing protocols. Simulation results show that our proposed scheme has a higher node energy efficiency, lower average delay and control overhead than those protocols. Copyright © 2006 John Wiley & Sons, Ltd.

Proceedings ArticleDOI
27 Aug 2007
TL;DR: This work proposes a technique called Failure-Carrying Packets (FCP), a technique that allows data packets to autonomously discover a working path without requiring completely up-to-date state in routers, and shows that it provides better routing guarantees under failures despite maintaining lesser state at the routers.
Abstract: Current distributed routing paradigms (such as link-state, distance-vector, and path-vector) involve a convergence process consisting of an iterative exploration of intermediate routes triggered by certain events such as link failures. The convergence process increases router load, introduces outages and transient loops, and slows reaction to failures. We propose a new routing paradigm where the goal is not to reduce the convergence times but rather to eliminate the convergence process completely. To this end, we propose a technique called Failure-Carrying Packets (FCP) that allows data packets to autonomously discover a working path without requiring completely up-to-date state in routers. Our simulations, performed using real-world failure traces and Rocketfuel topologies, show that: (a) the overhead of FCP is very low, (b) unlike traditional link-state routing (such as OSPF), FCP can provide both low loss-rate as well as low control overhead, (c) compared to prior work in backup path pre-computations, FCP provides better routing guarantees under failures despite maintaining lesser state at the routers.

Journal ArticleDOI
TL;DR: This article extensively and exclusively studies the issues involved with QoS-aware routing and presents an overview and comparison of existing QoS -aware routing protocols and the open issues that must be addressed to fully support QoS'-aware routing.
Abstract: The explosive growth in the use of mobile devices coupled with users' desires for real-time applications has provided new challenges in the design of protocols for mobile ad hoc networks. Chief among these challenges to enabling real-time applications for mobile ad hoc networks is incorporating support for quality of service (QoS), such as meeting bandwidth or delay constraints. In particular, it is important that routing protocols incorporate QoS metrics in route finding and maintenance to support end-to-end QoS. This article extensively and exclusively studies the issues involved with QoS-aware routing and presents an overview and comparison of existing QoS-aware routing protocols. In addition, the open issues that must be addressed to fully support QoS-aware routing are discussed.

Journal Article
TL;DR: Study of the effects of various mobility models on the performance of two routing protocols Dynamic Source Routing (DSR- Reactive Protocol) and Destination-Sequenced Distance- Vector (DSDV-Proactive protocol) shows that performance of the routing protocol varies across different mobility models, node densities and length of data paths.
Abstract: A Mobile Ad-Hoc Network (MANET) is a self- configuring network of mobile nodes connected by wire- less links to form an arbitrary topology without the use of existing infrastructure. In this paper, we have studied the effects of various mobility models on the performance of two routing protocols Dynamic Source Routing (DSR- Reactive Protocol) and Destination-Sequenced Distance- Vector (DSDV-Proactive Protocol). For experiment pur- poses, we have considered four mobility scenarios: Ran- dom Waypoint, Group Mobility, Freeway and Manhattan models. These four Mobility Models are selected to rep- resent possibility of practical application in future. Per- formance comparison has also been conducted across varying node densities and number of hops. Experiment results illustrate that performance of the routing protocol varies across different mobility models, node densities and length of data paths.

Patent
07 Feb 2007
TL;DR: In this article, a network routing device according to the invention transmits a packet via a second port based upon destination information included in the packet received via a first port referring to a routing table and calculates beforehand a third port which is a transfer destination when a fault occurs in a destination connected to the second port.
Abstract: A network routing device according to the invention transmits a packet via a second port based upon destination information included in the packet received via a first port referring to a routing table. In addition, the network routing device calculates beforehand a third port which is a transfer destination when a fault occurs in a destination connected to the second port. Further, the network routing device holds scenario information including a combination of the second port and the third port and updates the routing table based upon the scenario information when a fault is detected in either of the ports.