scispace - formally typeset
Search or ask a question

Showing papers on "Equal-cost multi-path routing published in 2009"


Proceedings ArticleDOI
20 Jun 2009
TL;DR: A case is made for a new approach to designing on-chip interconnection networks that eliminates the need for buffers for routing or flow control and new algorithms for routing without using buffers in router input/output ports are described.
Abstract: Buffers in on-chip networks consume significant energy, occupy chip area, and increase design complexity. In this paper, we make a case for a new approach to designing on-chip interconnection networks that eliminates the need for buffers for routing or flow control. We describe new algorithms for routing without using buffers in router input/output ports. We analyze the advantages and disadvantages of bufferless routing and discuss how router latency can be reduced by taking advantage of the fact that input/output buffers do not exist. Our evaluations show that routing without buffers significantly reduces the energy consumption of the on-chip cache/processor-to-cache network, while providing similar performance to that of existing buffered routing algorithms at low network utilization (i.e., on most real applications). We conclude that bufferless routing can be an attractive and energy-efficient design option for on-chip cache/processor-to-cache networks where network utilization is low.

427 citations


Proceedings ArticleDOI
16 Aug 2009
TL;DR: A new routing protocol, pathlet routing, in which networks advertise fragments of paths that sources concatenate into end-to-end source routes that can emulate the policies of BGP, source routing, and several recent multipath proposals is presented.
Abstract: We present a new routing protocol, pathlet routing, in which networks advertise fragments of paths, called pathlets, that sources concatenate into end-to-end source routes. Intuitively, the pathlet is a highly flexible building block, capturing policy constraints as well as enabling an exponentially large number of path choices. In particular, we show that pathlet routing can emulate the policies of BGP, source routing, and several recent multipath proposals. This flexibility lets us address two major challenges for Internet routing: scalability and source-controlled routing. When a router's routing policy has only "local" constraints, it can be represented using a small number of pathlets, leading to very small forwarding tables and many choices of routes for senders. Crucially, pathlet routing does not impose a global requirement on what style of policy is used, but rather allows multiple styles to coexist. The protocol thus supports complex routing policies while enabling and incentivizing the adoption of policies that yield small forwarding plane state and a high degree of path choice.

320 citations


Journal ArticleDOI
TL;DR: This paper proposes a simple opportunistic adaptive routing protocol (SOAR) to explicitly support multiple simultaneous flows in wireless mesh networks and shows that SOAR significantly outperforms traditional routing and a seminal opportunistic routing protocol, ExOR, under a wide range of scenarios.
Abstract: Multihop wireless mesh networks are becoming a new attractive communication paradigm owing to their low cost and ease of deployment. Routing protocols are critical to the performance and reliability of wireless mesh networks. Traditional routing protocols send traffic along predetermined paths and face difficulties in coping with unreliable and unpredictable wireless medium. In this paper, we propose a simple opportunistic adaptive routing protocol (SOAR) to explicitly support multiple simultaneous flows in wireless mesh networks. SOAR incorporates the following four major components to achieve high throughput and fairness: 1) adaptive forwarding path selection to leverage path diversity while minimizing duplicate transmissions, 2) priority timer-based forwarding to let only the best forwarding node forward the packet, 3) local loss recovery to efficiently detect and retransmit lost packets, and 4) adaptive rate control to determine an appropriate sending rate according to the current network conditions. We implement SOAR in both NS-2 simulation and an 18-node wireless mesh testbed. Our extensive evaluation shows that SOAR significantly outperforms traditional routing and a seminal opportunistic routing protocol, ExOR, under a wide range of scenarios.

314 citations


Journal ArticleDOI
TL;DR: A checklist is provided as a guideline so that a network designer can choose an appropriate multipath routing protocol to meet the network's application objectives.

283 citations


Journal ArticleDOI
01 Jun 2009
TL;DR: A hybrid routing algorithm for MANETs based on ACO and zone routing framework of bordercasting, HOPNET, based on ants hopping from one zone to the next, consists of the local proactive route discovery within a node's neighborhood and reactive communication between the neighborhoods.
Abstract: Mobile ad hoc network (MANET) is a group of mobile nodes which communicates with each other without any supporting infrastructure. Routing in MANET is extremely challenging because of MANETs dynamic features, its limited bandwidth and power energy. Nature-inspired algorithms (swarm intelligence) such as ant colony optimization (ACO) algorithms have shown to be a good technique for developing routing algorithms for MANETs. Swarm intelligence is a computational intelligence technique that involves collective behavior of autonomous agents that locally interact with each other in a distributed environment to solve a given problem in the hope of finding a global solution to the problem. In this paper, we propose a hybrid routing algorithm for MANETs based on ACO and zone routing framework of bordercasting. The algorithm, HOPNET, based on ants hopping from one zone to the next, consists of the local proactive route discovery within a node's neighborhood and reactive communication between the neighborhoods. The algorithm has features extracted from ZRP and DSR protocols and is simulated on GlomoSim and is compared to AODV routing protocol. The algorithm is also compared to the well known hybrid routing algorithm, AntHocNet, which is not based on zone routing framework. Results indicate that HOPNET is highly scalable for large networks compared to AntHocNet. The results also indicate that the selection of the zone radius has considerable impact on the delivery packet ratio and HOPNET performs significantly better than AntHocNet for high and low mobility. The algorithm has been compared to random way point model and random drunken model and the results show the efficiency and inefficiency of bordercasting. Finally, HOPNET is compared to ZRP and the strength of nature-inspired algorithm is shown.

227 citations


Journal ArticleDOI
TL;DR: This paper proposes a class of routing schemes that can identify the nodes of "highest utility" for routing, improving the delay and delivery ratio by four to five times, and proposes an analytical framework based on fluid models that can be used to analyze the performance of various opportunistic routing strategies, in heterogeneous settings.
Abstract: Communication networks are traditionally assumed to be connected. However, emerging wireless applications such as vehicular networks, pocket-switched networks, etc., coupled with volatile links, node mobility, and power outages, will require the network to operate despite frequent disconnections. To this end, opportunistic routing techniques have been proposed, where a node may store-and-carry a message for some time, until a new forwarding opportunity arises. Although a number of such algorithms exist, most focus on relatively homogeneous settings of nodes. However, in many envisioned applications, participating nodes might include handhelds, vehicles, sensors, etc. These various "classesrdquo have diverse characteristics and mobility patterns, and will contribute quite differently to the routing process. In this paper, we address the problem of routing in intermittently connected wireless networks comprising multiple classes of nodes. We show that proposed solutions, which perform well in homogeneous scenarios, are not as competent in this setting. To this end, we propose a class of routing schemes that can identify the nodes of "highest utilityrdquo for routing, improving the delay and delivery ratio by four to five times. Additionally, we propose an analytical framework based on fluid models that can be used to analyze the performance of various opportunistic routing strategies, in heterogeneous settings.

205 citations


Journal ArticleDOI
TL;DR: The basic idea behind opportunistic routing is illustrated, how different protocols work are illustrated, and current research work is categorized based on different criteria to discuss their merits and drawbacks.
Abstract: Opportunistic routing has recently attracted much attention as it is considered a promising direction for improving the performance of wireless ad hoc and sensor networks. With opportunistic routing, intermediate nodes collaborate on packet forwarding in a localized and consistent manner. Opportunistic routing greatly increases transmission reliability and network throughput by taking advantage of the broadcast nature of the wireless medium. In this article we first illustrate the basic idea behind opportunistic routing, and then categorize current research work based on different criteria. We illustrate how different protocols work, and discuss their merits and drawbacks. Finally, we point out potential issues and future directions in opportunistic routing for wireless ad hoc and sensor networks.

180 citations


Proceedings ArticleDOI
19 Apr 2009
TL;DR: New routing/scheduling back-pressure algorithms that not only guarantees network stability (through-put optimality), but also adaptively selects a set of optimal routes based on shortest-path information in order to minimize average path-lengths between each source and destination pair are proposed.
Abstract: Back-pressure based algorithms based on the algorithm by Tassiulas and Ephremides have recently received much attention for jointly routing and scheduling over multi-hop wireless networks. However a significant weakness of this approach has been in routing, because the traditional back-pressure algorithm explores and exploits all feasible paths between each source and destination. While this extensive exploration is essential in order to maintain stability when the network is heavily loaded, under light or moderate loads, packets may be sent over unnecessarily long routes and the algorithm could be very inefficient in terms of end-to-end delay and routing convergence times. This paper proposes new routing/scheduling back-pressure algorithms that not only guarantees network stability (through-put optimality), but also adaptively selects a set of optimal routes based on shortest-path information in order to minimize average path-lengths between each source and destination pair. Our results indicate that under the traditional back-pressure algorithm, the end-to-end packet delay first decreases and then increases as a function of the network load (arrival rate). This surprising low-load behavior is explained due to the fact that the traditional back-pressure algorithm exploits all paths (including very long ones) even when the traffic load is light. On the otherhand, the proposed algorithm adaptively selects a set of routes according to the traffic load so that long paths are used only when necessary, thus resulting in much smaller end-to-end packet delays as compared to the traditional back-pressure algorithm.

152 citations


Proceedings ArticleDOI
19 Apr 2009
TL;DR: A simple but robust generalization of greedy distance routing called Gravity-Pressure (GP) routing is proposed, which always succeeds in finding a route to the destination provided that a path exists, even if a significant fraction of links or nodes is removed subsequent to the embedding.
Abstract: We propose an embedding and routing scheme for arbitrary network connectivity graphs, based on greedy routing and utilizing virtual node coordinates. In dynamic multihop packet-switching communication networks, routing elements can join or leave during network operation or exhibit intermittent failures. We present an algorithm for online greedy graph embedding in the hyperbolic plane that enables incremental embedding of network nodes as they join the network, without disturbing the global embedding. Even a single link or node removal may invalidate the greedy routing success guarantees in network embeddings based on an embedded spanning tree subgraph. As an alternative to frequent reembedding of temporally dynamic network graphs in order to retain the greedy embedding property, we propose a simple but robust generalization of greedy distance routing called Gravity-Pressure (GP) routing. Our routing method always succeeds in finding a route to the destination provided that a path exists, even if a significant fraction of links or nodes is removed subsequent to the embedding. GP routing does not require precomputation or maintenance of special spanning subgraphs and, as demonstrated by our numerical evaluation, is particularly suitable for operation in tandem with our proposed algorithm for online graph embedding.

140 citations


Journal ArticleDOI
TL;DR: This paper combines routing and cooperative diversity, with the consideration of a realistic channel model, on a multihop network with multiple relays at each hop, and three routing strategies are designed to achieve the full diversity gain provided by cooperation among the relays.
Abstract: The fading characteristics and broadcast nature of wireless channels are usually not fully considered in the design of routing protocols for wireless networks. In this paper, we combine routing and cooperative diversity, with the consideration of a realistic channel model. We focus on a multihop network with multiple relays at each hop, and three routing strategies are designed to achieve the full diversity gain provided by cooperation among the relays. In particular, an optimal routing strategy is proposed to minimize the end-to-end outage, which requires the channel information of all the links and serves as a performance bound. An ad-hoc routing strategy is then proposed based on a hop-by-hop relay selection, which can be easily implemented in a distributed way. As expected, ad-hoc routing performs worse than optimal routing, especially with a large number of hops. To achieve a good complexity-performance tradeoff, an N-hop routing strategy is further proposed, where a joint optimization is performed every N hops. Simulation results are provided which verify the outage analyses of the proposed routing strategies.

135 citations


Proceedings ArticleDOI
20 Jun 2009
TL;DR: This paper introduces indirect global adaptive routing (IAR) in which the adaptive routing decision uses information that is not directly available at the source router, and describes four IAR routing methods: credit round trip (CRT), progressive adaptive routing, piggyback routing (PB), and reservation routing (RES).
Abstract: Recently proposed high-radix interconnection networks [10] require global adaptive routing to achieve optimum performance. Existing direct adaptive routing methods are slow to sense congestion remote from the source router and hence misroute many packets before such congestion is detected. This paper introduces indirect global adaptive routing (IAR) in which the adaptive routing decision uses information that is not directly available at the source router. We describe four IAR routing methods: credit round trip (CRT) [10], progressive adaptive routing (PAR), piggyback routing (PB), and reservation routing (RES). We evaluate each of these methods on the dragonfly topology under both steady-state and transient loads. Our results show that PB, PAR, and CRT all achieve good performance. PB provides the best absolute performance, with 2-7% lower latency on steady-state uniform random traffic at 70% load, while PAR provides the fastest response on transient loads. We also evaluate the implementation costs of the indirect adaptive routing methods and show that PB has the lowest implementation cost requiring

Proceedings ArticleDOI
19 Apr 2009
TL;DR: This paper presents a new routing paradigm that generalizes opportunistic routing in wireless mesh networks by introducing a polynomial-time algorithm and provides the proof of its optimality.
Abstract: In this paper, we present a new routing paradigm that generalizes opportunistic routing in wireless mesh networks. In multirate anypath routing, each node uses both a set of next hops and a selected transmission rate to reach a destination. Using this rate, a packet is broadcast to the nodes in the set and one of them forwards the packet on to the destination. To date, there is no theory capable of jointly optimizing both the set of next hops and the transmission rate used by each node. We bridge this gap by introducing a polynomial-time algorithm to this problem and provide the proof of its optimality. The proposed algorithm runs in the same running time as regular shortest-path algorithms and is therefore suitable for deployment in link-state routing protocols. We conducted experiments in a 802.11b testbed network, and our results show that multirate anypath routing performs on average 80% and up to 6.4 times better than anypath routing with a fixed rate of 11 Mbps. If the rate is fixed at 1 Mbps instead, performance improves by up to one order of magnitude. I. INTRODUCTION The high loss rate and dynamic quality of links make routing in wireless mesh networks extremely challenging (1). Anypath routing 1 has been recently proposed as a way to circumvent these shortcomings by using multiple next hops for each destination (3)-(6). Each packet is broadcast to a forwarding set composed of several neighbors, and the packet must be retransmitted only if none of the neighbors in the set receive it. Therefore, while the link to a given neighbor is down or performing poorly, another nearby neighbor may receive the packet and forward it on. This is in contrast to single-path routing where only one neighbor is assigned as the next hop for each destination. In this case, if the link to this neighbor is not performing well, a packet may be lost even though other neighbors may have overheard it. Existing work on anypath routing has focused on wireless networks that use a single transmission rate. This approach, albeit straightforward, presents two major drawbacks. First, using a single rate over the entire network underutilizes available bandwidth resources. Some links may perform well at a higher rate, while others may only work at a lower rate. Secondly and most importantly, the network may become disconnected at a higher bit rate. We provide experimental measurements from a 802.11b testbed which show that this phenomenon is not uncommon in practice. The key problem is that higher transmission rates have a shorter radio range, which reduces network density and connectivity. As the bit rate in- creases, links becomes lossier and the network eventually gets disconnected. Therefore, in order to guarantee connectivity, single-rate anypath routing must be limited to low rates. In multirate anypath routing, these problems do not exist; however, we face different challenges. First, we must find 1 We use the term anypath rather than opportunistic routing, since oppor- tunistic routing is an overloaded term also used for opportunistic contacts (2).

Journal ArticleDOI
TL;DR: A novel algorithm that detects internal attacks by using both message and route redundancy during route discovery and an optimal routing algorithm with routing metric combining both requirements on a node's trustworthiness and performance are proposed.
Abstract: To secure a mobile ad hoc network (MANET) in adversarial environments, a particularly challenging problem is how to feasibly detect and defend possible attacks on routing protocols, particularly internal attacks, such as a Byzantine attack. In this paper, we propose a novel algorithm that detects internal attacks by using both message and route redundancy during route discovery. The route-discovery messages are protected by pairwise secret keys between a source and destination and some intermediate nodes along a route established by using public key cryptographic mechanisms. We also propose an optimal routing algorithm with routing metric combining both requirements on a node's trustworthiness and performance. A node builds up the trustworthiness on its neighboring nodes based on its observations on the behaviors of the neighbor nodes. Both of the proposed algorithms can be integrated into existing routing protocols for MANETs, such as ad hoc on-demand distance vector routing (AODV) and dynamic source routing (DSR). As an example, we present such an integrated protocol called secure routing against collusion (SRAC), in which a node makes a routing decision based on its trust of its neighboring nodes and the performance provided by them. The simulation results have demonstrated the significant advantages of the proposed attack detection and routing algorithm over some known protocols.

Journal ArticleDOI
TL;DR: This article reviews some of the latest proposals in the field of beacon-less geographic routing and introduces the main design challenges and alternatives and performs an empirical study to assess the performance of Beacon-based and beacon- less routing protocols using a real WSN deployment.
Abstract: Geographic routing has emerged as one of the most efficient and scalable routing solutions for wireless sensor networks. In traditional geographic routing protocols, each node exchanges periodic one-hop beacons to determine the position of its neighbors. Recent studies proved that these beacons can create severe problems in real deployments due to the highly dynamic and error-prone nature of wireless links. To avoid these problems, new variants of geographic routing protocols that do not require beacons are being proposed. In this article we review some of the latest proposals in the field of beacon-less geographic routing and introduce the main design challenges and alternatives. In addition, we perform an empirical study to assess the performance of beacon-based and beacon-less routing protocols using a real WSN deployment.

Proceedings ArticleDOI
19 May 2009
TL;DR: This work demonstrates the two routing algorithms, XY routing algorithm and Odd-Even (OE) routing algorithm, and simulates and compared based on a 3X3 mesh topology NoC with NIRGAM simulator, showing that OE routing algorithm increases P parameter greatly as compared toXY routing algorithm.
Abstract: The Network-on-Chip (NoC) has been recognized as a paradigm to solve System-on-Chip (SoC) design challenges. The routing algorithm is one of key researches of a NoC design. XY routing algorithm, which is a kind of distributed deterministic routing algorithms, is simple to be implemented. Odd-Even (OE) routing algorithm, whose implementation is complex, is a sort of distributed adaptive routing algorithms with deadlock-free ability. We demonstrate the two routing algorithms in details at first. XY routing algorithm and OE routing algorithm are then simulated and compared based on a 3X3 mesh topology NoC with NIRGAM simulator. The simulation results show that OE routing algorithm, whose P parameter equals to 1.09, increases P parameter greatly as compared to XY routing algorithm, whose P parameter equals to 0.86, in a 2-dimension 3X3 mesh topology NoC, with Constant Bit Rate (CBR) traffic condition of each tail.

Journal ArticleDOI
TL;DR: This article proves that given a unit disk graph and the angles between adjacent edges, it is NP-hard to find a valid embedding in the plane such that neighboring nodes are within distance 1 from each other and non-neighboring nodes are at least distance 2 away and proposes a practical anchor-free embedding scheme by solving a linear program.
Abstract: Location information is useful both for network organization and for sensor data integrity. In this article, we study the anchor-free 2D localization problem by using local angle measurements. We prove that given a unit disk graph and the angles between adjacent edges, it is NP-hard to find a valid embedding in the plane such that neighboring nodes are within distance 1 from each other and non-neighboring nodes are at least distance √2/2 away. Despite the negative results, however, we can find a planar spanner of a unit disk graph by using only local angles. The planar spanner can be used to generate a set of virtual coordinates that enable efficient and local routing schemes such as geographical routing or approximate shortest path routing. We also proposed a practical anchor-free embedding scheme by solving a linear program. We show by simulation that it gives both a good local embedding, with neighboring nodes embedded close and non-neighboring nodes far away, and a satisfactory global view such that geographical routing and approximate shortest path routing on the embedded graph are almost identical to those on the original (true) embedding.

Journal ArticleDOI
01 May 2009
TL;DR: Simulation results reveal that ETR not only outperforms TR in terms of hop-counts, but also is more energy-efficient than TR.
Abstract: Tree routing (TR) is a low-overhead routing protocol designated for simple, low-cost and low-power wireless sensor networks. It avoids flooding the network with path search and update messages in order to conserve bandwidth and energy by using only parent-child links for packet forwarding. The major drawback of TR is the increased hop-counts as compared with more sophisticated path search protocols. We propose an enhanced tree routing (ETR) strategy for sensor networks which have structured node address assignment schemes. In addition to the parent-child links, ETR also uses links to other one-hop neighbours if it is decided that this will lead to a shorter path. It is shown that such a decision can be made with minimum storage and computing cost by utilizing the address structure. Detailed algorithms for applying ETR to ZigBee networks are also presented. Simulation results reveal that ETR not only outperforms TR in terms of hop-counts, but also is more energy-efficient than TR.

Patent
25 Mar 2009
TL;DR: In this paper, a method of networking a plurality of servers together within a data center is disclosed, which includes the step of addressing a data packet for delivery to a destination server by providing the destination server address as a flat address.
Abstract: A method of networking a plurality of servers together within a data center is disclosed. The method includes the step of addressing a data packet for delivery to a destination server by providing the destination server address as a flat address. The method further includes the steps of obtaining routing information required to route the packet to the destination server. This routing information may be obtained from a directory service servicing the plurality of servers. Once the routing information is obtained, the data packet may be routed to the destination server according to the flat address of the destination server and routing information obtained from the directory service.

Journal ArticleDOI
TL;DR: Results show that node-disjoint multipath routing can be applied to VANETs to substantially improve performance in terms of delay and packet delivery probability only if the node- Disjoint paths are properly chosen.
Abstract: Many multipath routing schemes have recently been proposed to improve the performance of wireless networks. Multipath routing is supposed to reduce the end-to-end packet delay and increase the packet delivery ratio. Therefore, it can also improve the packet delivery ratio in vehicular ad hoc networks (VANETs) when the mobility of relaying vehicles is unknown. However, in wireless networks, multiple paths are exposed to mutual interference or path coupling, which impairs efficiency. The intriguing question is whether the node-disjoint multipath routing really helps. In this paper, we examine the performance of node-disjoint multipath routing in VANETs. Through extensive simulations, we explore the effect of mutual interference on the behavior of node-disjoint paths. It is shown that whether node-disjoint paths are able to improve performance, compared with the single path, is determined by path coupling and the source-destination distance. Results show that node-disjoint multipath routing can be applied to VANETs to substantially improve performance in terms of delay and packet delivery probability only if the node-disjoint paths are properly chosen.

Proceedings ArticleDOI
17 Nov 2009
TL;DR: A general theory for analyzing the forwarder list selection problem is established, and an optimal solution is developed, the minimum transmission selection (MTS) algorithm, which minimizes the expected number of transmissions and it can be incorporated into existing opportunistic routing protocols to select optimal forwarder lists.
Abstract: Unlike traditional wireless routing protocols which use a single fixed path, opportunistic routing explicitly takes advantage of the broadcast nature of wireless communications by using a set of forwarders to opportunistically perform packet forwarding. A key issue in the design of opportunistic routing protocols is the forwarder list selection problem. In this paper we establish a general theory for analyzing the forwarder list selection problem, and develop an optimal solution, the minimum transmission selection (MTS) algorithm, which minimizes the expected number of transmissions and it can be incorporated into existing opportunistic routing protocols to select optimal forwarder lists. Our theory and algorithm can also be generalized to optimize other routing objectives such as minimizing the expected transmission time or energy consumption in opportunistic routing. Through extensive simulations, we demonstrate that in more than 90% cases the MTS algorithm outperforms the ETX forwarder selection scheme used in existing opportunistic routing protocols such as ExOR and MORE.

Proceedings ArticleDOI
30 Nov 2009
TL;DR: REER uses the residual energy, node available buffer size, and Signal-to-Noise Ratio (SNR) to predict the best next hop through the paths construction phase and achieves more energy savings, lower average delay and higher packet delivery ratio than other protocols.
Abstract: Wireless Sensor Networks (WSNs) are subject to node failures because of energy constraints, as well nodes can be added to or removed from the network upon application demands, resulting in unpredictable topology changes. Furthermore, due to limited transmission range of wireless sensor nodes, multiple hops are usually needed for a node to exchange information with other nodes or sink node(s). This makes the design of routing protocols in such networks a challenging task. In all proposed single path routing schemes a periodic low-rate flooding of data is required to recover from path failures, which causes consumption of scarce resources of the sensor node. Thus multipath routing schemes is an optimal alternative to maximize the network lifetime. Multipath routing schemes distribute the traffic across multiple paths instead of routing all the traffic along a single path, which spreads consumed energy evenly across the nodes within the network, potentially resulting in longer lifetimes. In this paper, we propose a robust and energy efficient multipath routing protocol (shortly abbreviated as REER). REER uses the residual energy, node available buffer size, and Signal-to-Noise Ratio (SNR) to predict the best next hop through the paths construction phase. REER examines two methods of traffic allocation; the first method uses a single path among the discovered paths to transfer the data message, when this path cost falls bellow a certain threshold, it then switches to the next alternative path. The second method is to split up the transmitted message into number of segments of equal size, add XOR-based error correction codes, and then transmit it across multiple paths simultaneously to increase the probability that an essential portion of the packet is received at the destination without incurring excessive delay. Through computer simulation, we evaluate and study the performance of our routing protocol and compare it with other protocols. Simulation results show that our protocol achieves more energy savings, lower average delay and higher packet delivery ratio than other protocols.

Journal ArticleDOI
TL;DR: The simulation results show that the proposed on-demand bandwidth-constrained routing protocol can successfully discover paths that meet the end-to-end bandwidth requirements of flows, protect existing flows from QoS violations, exploit the capacity gain due to multiple channels, and incurs low message overhead.
Abstract: QoS routing in multi-channel wireless mesh networks (WMNs) with contention-based MAC protocols is a very challenging problem. In this paper, we propose an on-demand bandwidth-constrained routing protocol for multi-radio multi-rate multi-channel WMNs with the IEEE 802.11 DCF MAC protocol. The routing protocol is based on a distributed threshold-triggered bandwidth estimation scheme, implemented at each node for estimating the free-to-use bandwidth on each associated channel. According to the free-to-use bandwidth at each node, the call admission control, which is integrated into the routing protocol, predicts the residual bandwidth of a path with the consideration of inter-flow and intra-flow interference. To select the most efficient path among all feasible ones, we propose a routing metric which strikes a balance between the cost and the bandwidth of the path. The simulation results show that our routing protocol can successfully discover paths that meet the end-to-end bandwidth requirements of flows, protect existing flows from QoS violations, exploit the capacity gain due to multiple channels, and incurs low message overhead.

Proceedings ArticleDOI
21 Jun 2009
TL;DR: An analytical comparison between 6LoWPAN's mesh-under and route-over schemes in terms of the packet/fragment arrival probability, the total number of transmissions and the total delay between source and destination is performed.
Abstract: Transmission of IPv6 packets over Low-power Wireless Personal Area Networks (6LoWPAN) was considered nearly impractical once. The size of IPv6 packets is much larger than the packet size of the IEEE 802.15.4 data link layer. 6LoWPAN implements an adaptation layer between network and data link layers. Main purpose of the adaptation layer is to fragment and reassemble IPv6 packets. Implementation of the adaptation layer enhances the routing/forwarding decision of packets both network and adaptation layers. We can divide the routing scheme in 6LoWPAN into two categories: the mesh-under and the route-over, based on the routing decision taken on adaptation layer or network layer respectively. In this paper we perform an analytical comparison between these two schemes in terms of the packet/fragment arrival probability, the total number of transmissions and the total delay between source and destination. We also compare the selective fragment retransmission mechanism between mesh-under and route-over schemes.

Journal ArticleDOI
TL;DR: This paper proposes a vehicular mobility model that reflects real-world vehicle movement and introduces a two-phase routing protocol (TOPO) that incorporates road map information and argues that the TOPO can serve as a framework that integrates existing VANET routing protocols.
Abstract: A vehicular ad hoc network (VANET) is a highly mobile wireless ad hoc network that is targeted to support vehicular safety, traffic monitoring, and other applications. Mobility models used in traditional mobile ad hoc networks cannot directly be applied to VANETs since real-world factors such as road layouts and traffic regulations are not considered. In this paper, we propose a vehicular mobility model that reflects real-world vehicle movement and study the performance of packet-routing protocols. First, we study the routing in small-scale VANETs and propose two routing schemes: (1) connection-based restricted forwarding (CBRF) and (2) connectionless geographic forwarding (CLGF). With the insights obtained, we consider routing in large-scale VANETs. Since road complexity and traffic variety may cause many potential problems that existing routing protocols cannot address, we introduce a two-phase routing protocol (TOPO) that incorporates road map information. The proposed protocol defines an overlay graph with roads of high vehicular density and access graphs that are connected to the overlay. While in the overlay, packets are forwarded along a precalculated path. As far as access routing is concerned, we employ the aforementioned CBRF and CLGF schemes and send packets to the overlay or handle packets delivered from the overlay. We argue that the TOPO can serve as a framework that integrates existing VANET routing protocols. We also consider data diversity in VANETs and design the TOPO as an intelligent transportation system (ITS)-friendly protocol. To validate our design philosophy and the routing protocol, we use different areas in the city of Orlando, FL, and generate vehicular mobility traces, following our mobility models. We feed the traces to network simulators and study the routing behavior. Simulation results demonstrate the performance and effectiveness of the proposed routing protocols for large-scale VANET scenarios.

Journal ArticleDOI
TL;DR: This paper proposes a routing algorithm that routes on contact information compressed by three combined methods that addresses the challenge of efficient information aggregation and compression in the time-space domain while maintaining critical information for efficient routing.
Abstract: The nonexistence of an end-to-end path poses a challenge in adapting traditional routing algorithms to delay-tolerant networks (DTNs). Previous works have covered centralized routing approaches based on deterministic mobility, ferry-based routing with deterministic or semideterministic mobility, flooding-based approaches for networks with general mobility, and probability-based routing for semideterministic mobility models. Unfortunately, none of these methods can guarantee both scalability and delivery. In this paper, we extend the investigation of scalable deterministic routing in DTNs with repetitive mobility based on our previous works. Instead of routing with global contact knowledge, we propose a routing algorithm that routes on contact information compressed by three combined methods. We address the challenge of efficient information aggregation and compression in the time-space domain while maintaining critical information for efficient routing. Then, we extend it to handle a moderate level of uncertainty in contact prediction. Analytical studies and simulation results show that the performance of our proposed routing algorithm, DTN hierarchical routing (DHR), is comparable to that of the optimal time-space Dijkstra algorithm in terms of delay and hop count. At the same time, the per-node storage overhead is substantially reduced and becomes scalable.

Journal ArticleDOI
TL;DR: This paper discusses the sufficient condition on link bandwidth that makes a routing solution feasible, then provides mathematical optimization models to tackle both energy and bandwidth constraints, and proposes two efficient heuristics to compute the routing topology and link data rate.
Abstract: In sensor networks, both energy and bandwidth are scarce resources. In the past, many energy efficient routing algorithms have been devised in order to maximize network lifetime, in which wireless link bandwidth has been optimistically assumed to be sufficient. This article shows that ignoring the bandwidth constraint can lead to infeasible routing solutions. As energy constraint affects how data should be routed, link bandwidth also affects not only the routing topology but also the allowed data rate on each link. In this paper, we discuss the sufficient condition on link bandwidth that makes a routing solution feasible, then provide mathematical optimization models to tackle both energy and bandwidth constraints.We first present a basic mathematical model to address using uniform transmission power for routing without data aggregation, then extend it to handle nonuniform transmission power, and then routing with data aggregation. We propose two efficient heuristics to compute the routing topology and link data rate. Simulation results show that these heuristics provide more feasible routing solutions than previous work, and provide significant improvement on throughput and lifetime.

Proceedings ArticleDOI
01 Dec 2009
TL;DR: The results show that uni-directional routing architecture, in all but one case, is the most energy efficient choice both in the traditional FPGA domain and the mobile domain where clock frequencies are fixed.
Abstract: In this work, we evaluate bi-directional and unidirectional FPGA routing architectures in terms of energy and power consumption using an updated power estimation framework compatible with VPR 5.0. The goal of this research is to help FPGA vendors find the best FPGA architectures. Initially, we make some general observations on how two types of routing architectures affect speed, area consumption, and power consumption. We observe how routing buffer sizing affects both the critical path delay and power and energy consumption of FPGAs with certain routing architectures. Our results show that uni-directional routing architecture, in all but one case, is the most energy efficient choice both in the traditional FPGA domain and the mobile domain where clock frequencies are fixed.

Proceedings ArticleDOI
30 Nov 2009
TL;DR: This paper presents, to the best of the knowledge, the first experimental study on gradient routing as advocated by IETF ROLL, and shows experimentally that gradient routing is robust against topological changes.
Abstract: IETF ROLL has recently proposed gradient routing as a fundamental building block for data collection in Wireless Sensor Networks. This paper seconds this choice by presenting an implementation of gradient routing on current hardware, and by showing experimentally that gradient routing is robust against topological changes. To stress its self-healing quality, we design and implement a complete communication stack in which neighbor tables are built in a purely reactive fashion. We quantify the resulting topological changes, and show how gradient routing elegantly handles these dynamics. This paper presents, to the best of our knowledge, the first experimental study on gradient routing as advocated by IETF ROLL.

Journal ArticleDOI
TL;DR: A new algorithm is presented which achieves a worst case performance ratio of [email protected], where @r denotes the best known approximation ratio for the Steiner minimum tree problem.

Journal ArticleDOI
TL;DR: This paper introduces an efficient distributed joint channel assignment and routing protocol, called J-CAR, which allows a data interface to dynamically change its routing protocol working mode between send and receive on a call-by-call basis, which distributed jointChannel assignment enhances the utilization of both interface and channel.
Abstract: The capacity of an IEEE 802.11-based multi-hop wireless network is limited. By effectively utilizing multiple non-overlapping channels and multiple interfaces, collision and co-channel interference can be reduced. This allows more concurrent transmissions and thus enhances the network capacity. In this paper, we introduce an efficient distributed joint channel assignment and routing protocol, called J-CAR. Unlike existing schemes, J-CAR allows a data interface to dynamically change its routing protocol working mode between send and receive on a call-by-call basis, which distributed joint channel assignment enhances the utilization of both interface and channel. In J-CAR, channels are negotiated and assigned to active links in conjunction with the on-demand routing process. At each hop, J-CAR conducts a local optimization by selecting the least interfered channel according to the channel interference index. The channel interference index is designed by taking both the protocol and physical interference models into consideration. To find the least interfered path for network load balancing on a global scale, J-CAR employs a length-constrained widest-path routing. The ldquowidthrdquo of a path is determined by the interference level of its bottleneck link. With an adjustable threshold on the path length (with respect to the shortest-path), the excessively long path can also be avoided. We show that with a comparable complexity as the existing schemes, J-CAR provides much higher system good puts and shorter end-to-end packet delays.