scispace - formally typeset
Search or ask a question

Showing papers on "Equal-cost multi-path routing published in 2012"


Proceedings ArticleDOI
01 Dec 2012
TL;DR: A survey of state-of-the-art routing techniques in Wireless Sensor Networks (WSNs) and compares the routing protocols against parameters such as power consumption, scalability, mobility, optimal routing and data aggregation.
Abstract: This paper presents a survey of state-of-the-art routing techniques in Wireless Sensor Networks (WSNs). Compared with traditional wireless networks, WSNs are characterized with denser levels of node deployment, higher unreliability of sensor nodes and severe power, computation and memory constraints. Various design challenges such as energy efficiency, data delivery models, quality of service, overheads etc., for routing protocols in WSNs are highlighted. We addressed most of the proposed routing methods along with scheme designs, benefits and result analysis wherever possible. The routing protocols discussed are classified into seven categories such as Data centric routing, Hierarchical routing, Location based routing, Negotiation based routing, Multipath based routing, Quality of Service (QoS) routing and Mobility based routing. This paper also compares the routing protocols against parameters such as power consumption, scalability, mobility, optimal routing and data aggregation. The paper concludes with possible open research issues in WSNs.

1,168 citations


Journal ArticleDOI
09 Jan 2012-Sensors
TL;DR: In this paper, the authors present a comprehensive taxonomy of multipath routing protocols for wireless sensor networks and highlight the primary motivation behind the development of each protocol category and explain the operation of different protocols in detail, with emphasis on their advantages and disadvantages.
Abstract: A wireless sensor network is a large collection of sensor nodes with limited power supply and constrained computational capability. Due to the restricted communication range and high density of sensor nodes, packet forwarding in sensor networks is usually performed through multi-hop data transmission. Therefore, routing in wireless sensor networks has been considered an important field of research over the past decade. Nowadays, multipath routing approach is widely used in wireless sensor networks to improve network performance through efficient utilization of available network resources. Accordingly, the main aim of this survey is to present the concept of the multipath routing approach and its fundamental challenges, as well as the basic motivations for utilizing this technique in wireless sensor networks. In addition, we present a comprehensive taxonomy on the existing multipath routing protocols, which are especially designed for wireless sensor networks. We highlight the primary motivation behind the development of each protocol category and explain the operation of different protocols in detail, with emphasis on their advantages and disadvantages. Furthermore, this paper compares and summarizes the state-of-the-art multipath routing techniques from the network application point of view. Finally, we identify open issues for further research in the development of multipath routing protocols for wireless sensor networks.

320 citations


Journal ArticleDOI
TL;DR: A new metric is introduced that detects the quality of friendships between nodes accurately and defines the community of each node as the set of nodes having close friendship relations with this node either directly or indirectly.
Abstract: Routing in delay tolerant networks is a challenging problem due to the intermittent connectivity between nodes resulting in the frequent absence of end-to-end path for any source-destination pair at any given time. Recently, this problem has attracted a great deal of interest and several approaches have been proposed. Since Mobile Social Networks (MSNs) are increasingly popular type of Delay Tolerant Networks (DTNs), making accurate analysis of social network properties of these networks is essential for designing efficient routing protocols. In this paper, we introduce a new metric that detects the quality of friendships between nodes accurately. Utilizing this metric, we define the community of each node as the set of nodes having close friendship relations with this node either directly or indirectly. We also present Friendship-Based Routing in which periodically differentiated friendship relations are used in forwarding of messages. Extensive simulations on both real and synthetic traces show that the introduced algorithm is more efficient than the existing algorithms.

211 citations


Journal ArticleDOI
TL;DR: This paper deals with the optimal parameter setting of the optimized link state routing (OLSR), which is a well-known mobile ad hoc network routing protocol, by defining an optimization problem and finding automatically optimal configurations of this routing protocol.
Abstract: Recent advances in wireless technologies have given rise to the emergence of vehicular ad hoc networks (VANETs). In such networks, the limited coverage of WiFi and the high mobility of the nodes generate frequent topology changes and network fragmentations. For these reasons, and taking into account that there is no central manager entity, routing packets through the network is a challenging task. Therefore, offering an efficient routing strategy is crucial to the deployment of VANETs. This paper deals with the optimal parameter setting of the optimized link state routing (OLSR), which is a well-known mobile ad hoc network routing protocol, by defining an optimization problem. This way, a series of representative metaheuristic algorithms (particle swarm optimization, differential evolution, genetic algorithm, and simulated annealing) are studied in this paper to find automatically optimal configurations of this routing protocol. In addition, a set of realistic VANET scenarios (based in the city of Malaga) have been defined to accurately evaluate the performance of the network under our automatic OLSR. In the experiments, our tuned OLSR configurations result in better quality of service (QoS) than the standard request for comments (RFC 3626), as well as several human experts, making it amenable for utilization in VANET configurations.

194 citations


Journal ArticleDOI
TL;DR: This proposed approach tries to account for link stability and for minimum drain rate energy consumption and a novel routing protocol called Link-stAbility and Energy aware Routing protocols (LAER) is proposed.
Abstract: Energy awareness for computation and protocol management is becoming a crucial factor in the design of protocols and algorithms. On the other hand, in order to support node mobility, scalable routing strategies have been designed and these protocols try to consider the path duration in order to respect some QoS constraints and to reduce the route discovery procedures. Often energy saving and path duration and stability can be two contrasting efforts and trying to satisfy both of them can be very difficult. In this paper, a novel routing strategy is proposed. This proposed approach tries to account for link stability and for minimum drain rate energy consumption. In order to verify the correctness of the proposed solution a biobjective optimization formulation has been designed and a novel routing protocol called Link-stAbility and Energy aware Routing protocols (LAER) is proposed. This novel routing scheme has been compared with other three protocols: PERRA, GPSR, and E-GPSR. The protocol performance has been evaluated in terms of Data Packet Delivery Ratio, Normalized Control Overhead, Link duration, Nodes lifetime, and Average energy consumption.

175 citations


Journal ArticleDOI
TL;DR: This paper proposes gradient routing with two-hop information for industrial wireless sensor networks to enhance real-time performance with energy efficiency and reduce end-to-end delay.
Abstract: This paper proposes gradient routing with two-hop information for industrial wireless sensor networks to enhance real-time performance with energy efficiency. Two-hop information routing is adopted from the two-hop velocity-based routing, and the proposed routing algorithm is based on the number of hops to the sink instead of distance. Additionally, an acknowledgment control scheme reduces energy consumption and computational complexity. The simulation results show a reduction in end-to-end delay and enhanced energy efficiency.

155 citations


Proceedings ArticleDOI
Jie Wu1, Yunsheng Wang1
25 Mar 2012
TL;DR: This paper uses the internal social features of each node in the network to perform the routing process, and offers two special multi-path routing schemes: node-disjoint-based routing and delegation- based routing.
Abstract: Most routing protocols for delay tolerant networks resort to the sufficient state information, including trajectory and contact information, to ensure routing efficiency. However, state information tends to be dynamic and hard to obtain without a global and/or long-term collection process. In this paper, we use the internal social features of each node in the network to perform the routing process. This approach is motivated from several social contact networks, such as the Infocom 2006 trace, where people contact each other more frequently if they have more social features in common. Our approach includes two unique processes: social feature extraction and multi-path routing. In social feature extraction, we use entropy to extract the m most informative social features to create a feature space (F-space): (F 1 , F 2 , …, F m ), where F i corresponds to a feature. The routing method then becomes a hypercube-based feature matching process where the routing process is a step-by-step feature difference resolving process. We offer two special multi-path routing schemes: node-disjoint-based routing and delegation-based routing. Extensive simulations on both real and synthetic traces are conducted in comparison with several existing approaches, including spray-and-wait routing and spray-and-focus routing.

148 citations


Patent
30 Jul 2012
TL;DR: In this article, the intermediate node can determine a routing entry for the destination associated with a next hop based on the source route and cache the routing entry and transmit the second message according to the cached routing entry.
Abstract: In one embodiment, an intermediate node of a computer network can receive a message intended for a destination. The message can include a header indicating a source route. The intermediate node can determine a routing entry for a routing entry for the destination associated with a next hop based on the source route and cache the routing entry. The intermediate node can further receive a second message intended for the destination that does not indicate the next hop, and transmit the second message according to the cached routing entry.

140 citations


Journal ArticleDOI
TL;DR: An opportunistic cognitive routing (OCR) protocol is proposed that allows users to exploit the geographic location information and discover the local spectrum access opportunities to improve the transmission performance over each hop.
Abstract: In this paper, cognitive routing coupled with spectrum sensing and sharing in a multi-channel multi-hop cognitive radio network (CRN) is investigated. Recognizing the spectrum dynamics in CRN, we propose an opportunistic cognitive routing (OCR) protocol that allows users to exploit the geographic location information and discover the local spectrum access opportunities to improve the transmission performance over each hop. Specifically, based on location information and channel usage statistics, a secondary user (SU) distributedly selects the next hop relay and adapts its transmission to the dynamic spectrum access opportunities in its neighborhood. In addition, we introduce a novel metric, namely, cognitive transport throughput (CTT), to capture the unique properties of CRN and evaluate the potential relay gain of each relay candidate. A heuristic algorithm is proposed to reduce the searching complexity of the optimal selection of channel and relay. Simulation results are given to demonstrate that our proposed OCR well adapts to the spectrum dynamics and outperforms existing routing protocols in CRN.

138 citations


Patent
21 May 2012
TL;DR: In this article, a system and method adds and manages entries on a list of entries of routing information to allow the top entry to be used for routing to a destination corresponding to the list.
Abstract: A system and method adds and manages entries on a list of entries of routing information to allow the top entry to be used for routing to a destination corresponding to the list. Costs of a wireless link may be a function of the success rate experienced on that wireless link.

132 citations


Proceedings ArticleDOI
03 Dec 2012
TL;DR: Multi-label Automatic Routing (MAR), the first compact routing protocol that attains a low path stretch (ratio of selected path length to the optimal path length) while maintaining a low routing state for mobile networks, is presented.
Abstract: We present Multi-label Automatic Routing (MAR), the first compact routing protocol that attains a low path stretch (ratio of selected path length to the optimal path length) while maintaining a low routing state for mobile networks. MAR is resilient to node movements in the network. In MAR, nodes assign themselves labels based on their location in the network through a distributed algorithm. Distributed Hash Tables (DHTs) for the node to label mappings are established in some anchor nodes. Once the labels are established, the routing is automatic based on the positional labels of the nodes and DHT lookups. This eliminates flooding completely. Unlike traditional routing protocols MAR does not need destinations-based routing tables. Hence, MAR has a small routing state. With the use of multiple labels per node, the average path length is close to the shortest path and there are multiple paths between source and destination nodes. In Qualnet simulations MAR shows a path stretch close to or better than traditional table-driven and on-demand protocols like OLSR and AODV. Simulation results also show shorter end-to-end delays due to the automatic routing. The delivery ratio of MAR is comparable to these traditional protocols but with a significantly lower network overhead.

Proceedings ArticleDOI
25 Jun 2012
TL;DR: In this article, the authors present energy efficient hierarchical routing protocols, developed from conventional LEACH routing protocol, which work in order to increase the life time and how quality routing protocol are improved for WSNs.
Abstract: An energy efficient routing protocol is the major concern in Wireless Sensor Networks (WSNs). In this survey paper, we present energy efficient hierarchical routing protocols, developed from conventional LEACH routing protocol. Main focus of our study is how these extended protocols work in order to increase the life time and how quality routing protocol are improved for WSNs. Furthermore, this paper also highlights some of the issues faced by LEACH and also explains how these issues are tackled by extended versions of LEACH. We compare the features and performance issues of the selected hierarchical routing protocols.

Journal ArticleDOI
TL;DR: This paper mathematically analyzes the power consumption of the proposed algorithm, then demonstrates that the proposed scheme is able to extend the network lifetime by alleviating the hotspot problem.

Proceedings ArticleDOI
17 Aug 2012
TL;DR: In this article, potential based routing (PBR) is introduced to achieve several design goals such as availability, adaptability, diversity, and robustness for ICN, and the performance of a random caching policy is examined.
Abstract: Information Centric Networking (ICN) has shown possibilities to solve several problems of the Internet. At the same time, some problems need to be tackled in order to advance this promising architecture. In this paper we address two of the problems, namely routing and content caching. For the routing, we introduce the Potential Based Routing (PBR) to achieve several design goals such as availability, adaptability, diversity, and robustness. In addition, we examine the performance of a random caching policy which can be a promising candidate for ICN. The integrated system of both PBR and a caching policy is named the Cache Aware Target idenTification (CATT). Simulation results demonstrate that PBR with replications located on less than 1% of total nodes can achieve a near optimal routing performance (close to the shortest path routing) even though a request message is randomly forwarded.

Journal ArticleDOI
TL;DR: This paper proposes HYbrid Multi-hop routiNg (HYMN) algorithm, which is a hybrid of the two contemporary multi-hop routing algorithm architectures, namely, flat multi- Hop routing that utilizes efficient transmission distances, and hierarchical multi-Hop routing algorithms that capitalizes on data aggregation.
Abstract: Power-aware routing in Wireless Sensor Networks (WSNs) is designed to adequately prolong the lifetime of severely resource-constrained ad hoc wireless sensor nodes}. Recent research has identified the energy hole problem in single sink-based WSNs, a characteristic of the many-to-one (convergecast) traffic patterns. In this paper, we propose HYbrid Multi-hop routiNg (HYMN) algorithm, which is a hybrid of the two contemporary multi-hop routing algorithm architectures, namely, flat multi-hop routing that utilizes efficient transmission distances, and hierarchical multi-hop routing algorithms that capitalizes on data aggregation. We provide rigorous mathematical analysis for HYMN-optimize it and model its power consumption. In addition, through extensive simulations, we demonstrate the effective performance of HYMN in terms of superior connectivity.

Journal ArticleDOI
TL;DR: A distributed adaptive opportunistic routing scheme for multihop wireless ad hoc networks that utilizes a reinforcement learning framework to opportunistically route the packets even in the absence of reliable knowledge about channel statistics and network model is proposed.
Abstract: A distributed adaptive opportunistic routing scheme for multihop wireless ad hoc networks is proposed. The proposed scheme utilizes a reinforcement learning framework to opportunistically route the packets even in the absence of reliable knowledge about channel statistics and network model. This scheme is shown to be optimal with respect to an expected average per-packet reward criterion. The proposed routing scheme jointly addresses the issues of learning and routing in an opportunistic context, where the network structure is characterized by the transmission success probabilities. In particular, this learning framework leads to a stochastic routing scheme that optimally "explores" and "exploits" the opportunities in the network.

Proceedings ArticleDOI
16 Oct 2012
TL;DR: It is shown that a routing capable adversary can enumerate the participating routers implementing these protocols; can successfully avoid sending traffic along routes containing these routers with little or no adverse effects; and in some cases can probabilistically identify connections to targeted destinations.
Abstract: Decoy Routing is a new approach to Internet censorship circumvention that was recently and independently proposed at FOCI'11, USENIX Security'11 and CCS'11. Decoy routing aims to hamper nation-state level Internet censorship by having routers, rather than end hosts, relay traffic to blocked destinations. We analyze the security of these schemes against a routing capable adversary, a censoring authority that is willing to make routing decisions in response to decoy routing systems.We explore China, Syria, Iran, and Egypt as routing capable adversaries, and evaluate several attacks that defeat the security goals of existing decoy routing proposals. In particular, we show that a routing capable adversary can enumerate the participating routers implementing these protocols; can successfully avoid sending traffic along routes containing these routers with little or no adverse effects; can identify users of these schemes through active and passive attacks; and in some cases can probabilistically identify connections to targeted destinations.

Patent
09 May 2012
TL;DR: In this article, a method and system for static routing in a TRILL network is described, where a data packet, with an inner header specifying a MAC address of a destination host, is sent by a source host and received by an ingress routing bridge.
Abstract: A method and system for static routing in a TRILL network is disclosed. Routing bridges in the TRILL network use LLDP discovery to identify their next hop routing bridges. A data packet, with an inner header specifying a MAC address of a destination host, is sent by a source host and received by an ingress routing bridge. The ingress routing bridge encapsulates the data packet with a TRILL header and an outer header and sends the data packet to a next hop routing bridge on path to the destination host. The next hop routing bridge determines it is not the egress routing bridge for the data packet and sends the data packet onward to the egress routing bridge. The egress routing bridge decapsulates the data packet and forwards the data packet to the destination host specified in the inner header.

Journal ArticleDOI
TL;DR: Performance evaluation is conducted through simulations, and the results reveal the benefits of adopting the proposed routing metric for cognitive radio ad hoc networks, known as OPERA.
Abstract: Two main issues affect the existing routing metrics for cognitive radio ad hoc networks: i) they are often based on heuristics, and thus they have not been proved to be optimal; ii) they do not account for the route diversity effects, and thus they are not able to measure the actual cost of a route. In this paper, an optimal routing metric for cognitive radio ad hoc networks, referred to as OPERA, is proposed. OPERA is designed to achieve two features: i) Optimality: OPERA is optimal when combined with both Dijkstra and Bellman-Ford based routing protocols; ii) Accuracy: OPERA exploits the route diversity provided by the intermediate nodes to measure the actual end-to-end delay, by taking explicitly into account the unique characteristics of cognitive radio networks. A closed-form expression of the proposed routing metric is analytically derived for both static and mobile networks, and its optimality is proved rigorously. Performance evaluation is conducted through simulations, and the results reveal the benefits of adopting the proposed routing metric for cognitive radio ad hoc networks.

Proceedings ArticleDOI
06 Sep 2012
TL;DR: Find ways to quantify the routing metrics so that they can be combined in an additive or lexical manner and use extensive simulation results to evaluate the impact of several routing metrics on the achieved performance.
Abstract: The diversity of applications that current and emerging Wireless Sensor Networks (WSNs) are called to support imposes different requirements on the underlying network with respect to delay and loss, while at the same time the WSN imposes its own intricacies. The satisfaction of these requirements highly depends on the metric upon which the forwarding routes are decided. In this view, the IETF ROLL group has proposed the RPL routing protocol, which can flexibly work on various routing metrics, as long as they hold specific properties. The system implementer/user is free to decide whether to use one or multiple routing metrics, as well as the way these metrics can be combined. In this paper, we provide ways to quantify the routing metrics so that they can be combined in an additive or lexical manner. We use extensive simulation results to evaluate the impact of several routing metrics on the achieved performance.

Journal ArticleDOI
TL;DR: This work presents two routing techniques, namely circular fixed-ordering monotonic routing and evolution-based rip-up and rerouting using a two-stage cost function in a high-performance congestion-driven 2-D global router and proposes two efficient via-minimization methods.
Abstract: The increasing complexity of interconnection designs has enhanced the importance of research into global routing when seeking high-routability (low overflow) results or rapid search paths that report wirelength estimations to a placer. This work presents two routing techniques, namely circular fixed-ordering monotonic routing and evolution-based rip-up and rerouting using a two-stage cost function in a high-performance congestion-driven 2-D global router. We also propose two efficient via-minimization methods, namely congestion relaxation by layer shifting and rip-up and reassignment, for a dynamic programming-based layer assignment. Experimental results demonstrate that our router achieves performance similar to the first two winning routers in ISPD 2008 Routing Contest in terms of both routability and wirelength at a 1.05 × and 18.47 × faster routing speed. Moreover, the proposed layer assignment achieves fewer vias and shorter wirelength than congestion-constrained layer assignment (COLA).

Journal ArticleDOI
TL;DR: This work considers a variant of the vehicle routing problem with time windows for which, besides routing and scheduling decisions, a number of extra deliverymen can be assigned to each route in order to reduce service times.

Proceedings ArticleDOI
10 Sep 2012
TL;DR: A novel routing/flow-control scheme that decouples the routing and the deadlock avoidance mechanisms, allowing for on-the-fly (in-transit) adaptive routing of packets and to prevent deadlock is introduced.
Abstract: Dragonfly networks have been recently proposed for the interconnection network of forthcoming exascale supercomputers. Relying on large-radix routers, they build a topology with low diameter and high throughput, divided into multiple groups of routers. While minimal routing is appropriate for uniform traffic patterns, adversarial traffic patterns can saturate inter-group links and degrade the obtained performance. Such traffic patterns occur in typical communication patterns used by many HPC applications, such as neighbor data exchanges in multi-dimensional space decompositions. Non-minimal traffic routing is employed to handle such cases. Adaptive policies have been designed to select between minimal and nonminimal routing to handle variable traffic patterns. However, previous papers have not taken into account the effect of saturation of intra-group (local) links. This paper studies how local link saturation can be common in these networks, and shows that it can largely reduce the performance. The solution to this problem is to use nonminimal paths that avoid those saturated local links. However, this extends the maximum path length, and since all previous routing proposals prevent deadlock by relying on an ascending order of virtual channels, it would imply unaffordable cost and complexity in the network routers. In this paper we introduce a novel routing/flow-control scheme that decouples the routing and the deadlock avoidance mechanisms. Our model does not impose any dependencies between virtual channels, allowing for on-the-fly (in-transit) adaptive routing of packets. To prevent deadlock we employ a deadlock-free escape sub network based on injection restriction. Simulations show that our model obtains lower latency, higher throughput, and faster adaptation to transient traffic, because it dynamically exploits a higher path diversity to avoid saturated links. Notably, our proposal consumes traffic bursts 43% faster than previous ones.

Proceedings ArticleDOI
31 Dec 2012
TL;DR: A classification of the different route planning algorithms, and how they compare and analyze their performance when they are applied in real road networks is presented, and Dijkstra, the most wellknown shortest path algorithm, is chosen to be the first algorithm to be implemented in SUMO.
Abstract: Vehicle routing problem (VRP) is a generic name referring to optimization problems in transportation, distribution and logistics industry. They mainly focus on serving a number of customers by a number of vehicles. Route planning techniques is one of the main tasks of VRP which aims to find an optimal route from a starting point to a destination on a road map. As road traffic conditions may change during the car journey (e.g., increase/decrease of the congestion level, road incidents etc), the optimal route should be re-evaluated as soon as an update in traffic conditions is available. Choosing an appropriate route planning algorithm among the existing algorithms in the literature to apply it in real road networks is an important task for any transportation application. In this paper, we first present a classification of the different route planning algorithms, and then explain how we compare and analyze their performance when they are applied in real road networks. For the purpose of comparison, we simulate the behavior of these algorithms during runtime using Simulation of Urban Mobility (SUMO) package and TRACI. We have chosen Dijkstra, the most wellknown shortest path algorithm, to be the first algorithm to be implemented in SUMO. Upon reception of any traffic conditions update that affects the current optimal route of a car, we use TRACI to re-apply the algorithm and change this cars route accordingly. In the near future, our target is to simulate other algorithms and compare their performance based on the quality of the obtained best route.

Journal ArticleDOI
TL;DR: The fundamental issues in the design of routing protocols for duty-cycled wireless sensor networks are summarized, existing protocols are classified based on different design criteria and a survey of state-of-the-art routing protocols are presented.
Abstract: Sleep scheduling is a widely used strategy for saving the energy of sensor nodes and prolonging the lifetime of a wireless sensor network (WSN). The lower the duty cycle is, the longer the network lifetime will be. However, sleep scheduling brings great challenges to the design of efficient distributed routing protocols for multi-hop duty-cycled WSNs. This issue has attracted much attention and various routing protocols have been proposed. In this article we first summarize the fundamental issues in the design of routing protocols for such networks, and then classify existing protocols based on different design criteria. We then present a survey of state-of-the-art routing protocols in this area. We illustrate how different protocols work and discuss their merits and deficiencies. Finally, we point out some future directions for routing in duty-cycled wireless sensor networks.

Journal ArticleDOI
TL;DR: A new generalized analysis of the unslotted IEEE 802.15.4 medium access control protocol concludes that heterogeneous traffic and limited carrier-sensing range play an essential role on the performance and that routing should account for the presence of dominant nodes to balance the traffic distribution across the network.
Abstract: Many of existing analytical studies of the IEEE 802154 medium access control (MAC) protocol are not adequate because they are often based on assumptions such as homogeneous traffic and ideal carrier sensing, which are far from reality for multi-hop networks, particularly in the presence of mobility In this paper, a new generalized analysis of the unslotted IEEE 802154 MAC is presented The analysis considers the effects induced by heterogeneous traffic due to multi-hop routing and different traffic generation patterns among the nodes of the network and the hidden terminals due to reduced carrier-sensing capabilities The complex relation between MAC and routing protocols is modeled, and novel results on this interaction are derived For various network configurations, conditions under which routing decisions based on packet loss probability or delay lead to an unbalanced distribution of the traffic load across multi-hop paths are studied It is shown that these routing decisions tend to direct traffic toward nodes with high packet generation rates, with potential catastrophic effects for the node's energy consumption It is concluded that heterogeneous traffic and limited carrier-sensing range play an essential role on the performance and that routing should account for the presence of dominant nodes to balance the traffic distribution across the network

Journal ArticleDOI
01 Dec 2012
TL;DR: A directional flooding-based routing protocol, called DFR, is proposed in order to achieve reliable packet delivery in underwater sensor networks, and a simulation study using ns-2 simulator proves that DFR is more suitable for UWSNs, especially when links are prone to packet loss.
Abstract: Unlike terrestrial sensor networks, underwater sensor networks (UWSNs) have salient features such as a long propagation delay, narrow bandwidth, and high packet loss over links. Hence, path setup-based routing protocols proposed for terrestrial sensor networks are not applicable because a large latency of the path establishment is observed, and packet delivery is not reliable in UWSNs. Even though routing protocols such as VBF (vector based forwarding) and HHVBF (hop-by-hop VBF) were introduced for UWSNs, their performance in terms of reliability deteriorates at high packet loss. In this paper, we therefore propose a directional flooding-based routing protocol, called DFR, in order to achieve reliable packet delivery. DFR performs a so-called controlled flooding, where DFR changes the number of nodes which participate in forwarding a packet according to their link quality. When a forwarding node has poor link quality to its neighbor nodes geographically advancing toward the sink, DFR allows more nodes to participate in forwarding the packet. Otherwise, a few nodes are enough to forward the packet reliably. In addition, we identify two types of void problems which can occur during the controlled flooding and introduce their corresponding solutions. Our simulation study using ns-2 simulator proves that DFR is more suitable for UWSNs, especially when links are prone to packet loss. Copyright © 2011 John Wiley & Sons, Ltd. (This paper is an extended version of our previous work presented in MTS/IEEE OCEANS 2008, Quebec City, Canada, September 2008.)

Proceedings ArticleDOI
Xin Wu1, Xiaowei Yang1
18 Jun 2012
TL;DR: This work uses an Open Flow implementation and simulations to show that DARD can effectively use a data center network's bisection bandwidth under both static and dynamic traffic patterns, and uses competitive game theory to demonstrate that the path selection algorithm makes progress in every step and converges to a Nash equilibrium in finite steps.
Abstract: Data center networks typically have many paths connecting each host pair to achieve high bisection bandwidth for arbitrary communication patterns. Fully utilizing the bisection bandwidth may require flows between the same source and destination pair to take different paths. However, existing routing protocols have little support for load-sensitive adaptive routing. We propose DARD, a Distributed Adaptive Routing architecture for Data center networks. DARD allows each end host to move traffic from overloaded paths to under loaded paths without central coordination. We use an Open Flow implementation and simulations to show that DARD can effectively use a data center network's bisection bandwidth under both static and dynamic traffic patterns. It outperforms previous solutions based on random path selection by 10%, and performs similarly to previous work that assigns flows to paths using a centralized controller. We use competitive game theory to show that DARD's path selection algorithm makes progress in every step and converges to a Nash equilibrium in finite steps. Our evaluation results suggest that DARD can achieve a close-to-optimal solution in practice.

Proceedings ArticleDOI
29 Nov 2012
TL;DR: This analysis demonstrates that ETPA can significantly decrease temperature rise and power consumption as well as providing a more efficient usage of the available resources compared to the most efficient routing protocol proposed so far in BANs, namely PRPLC.
Abstract: Research on routing in a network of intelligent, lightweight, micro and nano-technology sensors deployed in or around the body, namely Body Area Network (BAN), has gained great interest in the recent years. In this paper, we present an energy efficient, thermal and power aware routing algorithm for BANs named Energy Efficient Thermal and Power Aware routing (ETPA). ETPA considers a node's temperature, energy level and received power from adjacent nodes in the cost function calculation. An optimization problem is also defined in order to minimize average temperature rise in the network. Our analysis demonstrates that ETPA can significantly decrease temperature rise and power consumption as well as providing a more efficient usage of the available resources compared to the most efficient routing protocol proposed so far in BANs, namely PRPLC. Also, ETPA has a considerably higher depletion time that guarantees a longer lasting communication among nodes.

Proceedings ArticleDOI
01 Dec 2012
TL;DR: An effective geographic mobility prediction routing protocol is proposed to improve the performance of routing among UAVs and can provide effective and reliable data routing with acceptable communication overhead in the highly dynamic environment of Ad Hoc UAV Network.
Abstract: Unmanned Aerial Vehicles (UAVs) play more and more important roles in modern warfare. However, the data routing for communication among UAVs faces several challenges, such as packet loss or routing path failure etc. The main problem of UAVs data routing is caused by the high mobility of UAVs. In this paper, an effective geographic mobility prediction routing protocol is proposed to improve the performance of routing among UAVs. First, a Gaussian distribution of UAVs movement probability density function is deduced to reduce the impact of high mobility. Then, two-hop perimeter forwarding is proposed to reduce the impact of routing void. The experiment results show that the proposed approach can provide effective and reliable data routing with acceptable communication overhead in the highly dynamic environment of Ad Hoc UAV Network.