scispace - formally typeset
Search or ask a question

Showing papers on "Link-state routing protocol published in 2007"


01 Feb 2007
TL;DR: The Dynamic Source Routing protocol is a simple and efficient routing protocol designed specifically for use in multi-hop wireless ad hoc networks of mobile nodes, designed to work well even with very high rates of mobility.
Abstract: The Dynamic Source Routing protocol (DSR) is a simple and efficient routing protocol designed specifically for use in multi-hop wireless ad hoc networks of mobile nodes. DSR allows the network to be completely self-organizing and self-configuring, without the need for any existing network infrastructure or administration. The protocol is composed of the two mechanisms of "Route Discovery" and "Route Maintenance", which work together to allow nodes to discover and maintain source routes to arbitrary destinations in the ad hoc network. The use of source routing allows packet routing to be trivially loop-free, avoids the need for up-to-date routing information in the intermediate nodes through which packets are forwarded, and allows nodes forwarding or overhearing packets to cache the routing information in them for their own future use. All aspects of the protocol operate entirely on-demand, allowing the routing packet overhead of DSR to scale automatically to only that needed to react to changes in the routes currently in use. This document specifies the operation of the DSR protocol for routing unicast IP packets in multi-hop wireless ad hoc networks.

1,649 citations


Journal ArticleDOI
TL;DR: A unified heuristic which is able to solve five different variants of the vehicle routing problem and shown promising results for a large class of vehicle routing problems with backhauls as demonstrated in Ropke and Pisinger.

1,282 citations


Proceedings ArticleDOI
27 Aug 2007
TL;DR: More as mentioned in this paper is a MAC-independent opportunistic routing protocol, which randomly mixes packets before forwarding them to ensure that routers that hear the same transmission do not forward the same packets, thus, it needs no special scheduler to coordinate routers and can run directly on top of 802.11.
Abstract: Opportunistic routing is a recent technique that achieves high throughput in the face of lossy wireless links. The current opportunistic routing protocol, ExOR, ties the MAC with routing, imposing a strict schedule on routers' access to the medium. Although the scheduler delivers opportunistic gains, it misses some of the inherent features of the 802.11 MAC. For example, it prevents spatial reuse and thus may underutilize the wireless medium. It also eliminates the layering abstraction, making the protocol less amenable to extensions to alternate traffic types such as multicast.This paper presents MORE, a MAC-independent opportunistic routing protocol. MORE randomly mixes packets before forwarding them. This randomness ensures that routers that hear the same transmission do not forward the same packets. Thus, MORE needs no special scheduler to coordinate routers and can run directly on top of 802.11. Experimental results from a 20-node wireless testbed show that MORE's median unicast throughput is 22% higher than ExOR, and the gains rise to 45% over ExOR when there is a chance of spatial reuse. For multicast, MORE's gains increase with the number of destinations, and are 35-200% greater than ExOR.

1,198 citations


Journal ArticleDOI
TL;DR: The research challenge of routing in VANETs is discussed and recent routing protocols and related mobility models for VANets are surveyed.
Abstract: Vehicular ad hoc network (VANET) is an emerging new technology integrating ad hoc network, wireless LAN (WLAN) and cellular technology to achieve intelligent inter-vehicle communications and improve road traffic safety and efficiency. VANETs are distinguished from other kinds of ad hoc networks by their hybrid network architectures, node movement characteristics, and new application scenarios. Therefore, VANETs pose many unique networking research challenges, and the design of an efficient routing protocol for VANETs is very crucial. In this article, we discuss the research challenge of routing in VANETs and survey recent routing protocols and related mobility models for VANETs.

1,147 citations


Proceedings ArticleDOI
27 Aug 2007
TL;DR: RAPID is presented, an intentional DTN routing protocol that can optimize a specific routing metric such as worst-case delivery latency or the fraction of packets that are delivered within a deadline and significantly outperforms existing routing protocols for several metrics.
Abstract: Many DTN routing protocols use a variety of mechanisms, including discovering the meeting probabilities among nodes, packet replication, and network coding. The primary focus of these mechanisms is to increase the likelihood of finding a path with limited information, so these approaches have only an incidental effect on such routing metrics as maximum or average delivery latency. In this paper, we present RAPID, an intentional DTN routing protocol that can optimize a specific routing metric such as worst-case delivery latency or the fraction of packets that are delivered within a deadline. The key insight is to treat DTN routing as a resource allocation problem that translates the routing metric into per-packet utilities which determine how packets should be replicated in the system.We evaluate RAPID rigorously through a prototype of RAPID deployed over a vehicular DTN testbed of 40 buses and simulations based on real traces. To our knowledge, this is the first paper to report on a routing protocol deployed on a real DTN at this scale. Our results suggest that RAPID significantly outperforms existing routing protocols for several metrics. We also show empirically that for small loads RAPID is within 10% of the optimal performance.

1,078 citations


Journal ArticleDOI
TL;DR: This paper uses empirical vehicle traffic data measured on 1-80 freeway in California to develop a comprehensive analytical framework to study the disconnected network phenomenon and its network characteristics, and shows that, depending on the sparsity of vehicles or the market penetration rate of cars using Dedicated Short Range Communication technology, the network re-healing time can vary from a few seconds to several minutes.
Abstract: A vehicular ad hoc network (VANET) may exhibit a bipolar behavior, i.e., the network can either be fully connected or sparsely connected depending on the time of day or on the market penetration rate of the wireless communication devices. In this paper, we use empirical vehicle traffic data measured on 1-80 freeway in California to develop a comprehensive analytical framework to study the disconnected network phenomenon and its network characteristics. These characteristics shed light on the key routing performance metrics of interest in disconnected VANETs, such as the average time taken to propagate a packet to disconnected nodes (i.e., the re-healing time). Our results show that, depending on the sparsity of vehicles or the market penetration rate of cars using Dedicated Short Range Communication (DSRC) technology, the network re-healing time can vary from a few seconds to several minutes. This suggests that, for vehicular safety applications, a new ad hoc routing protocol will be needed as the conventional ad hoc routing protocols such as Dynamic Source Routing (DSR) and Ad Hoc On-Demand Distance Vector Routing (AODV) will not work with such long re-healing times. In addition, the developed analytical framework and its predictions provide valuable insights into the VANET routing performance in the disconnected network regime.

534 citations


Journal ArticleDOI
TL;DR: The main idea of the 2ACK scheme is to send two-hop acknowledgment packets in the opposite direction of the routing path in order to reduce additional routing overhead.
Abstract: We study routing misbehavior in MANETs (mobile ad hoc networks) in this paper. In general, routing protocols for MANETs are designed based on the assumption that all participating nodes are fully cooperative. However, due to the open structure and scarcely available battery-based energy, node misbehaviors may exist. One such routing misbehavior is that some selfish nodes will participate in the route discovery and maintenance processes but refuse to forward data packets. In this paper, we propose the 2ACK scheme that serves as an add-on technique for routing schemes to detect routing misbehavior and to mitigate their adverse effect. The main idea of the 2ACK scheme is to send two-hop acknowledgment packets in the opposite direction of the routing path. In order to reduce additional routing overhead, only a fraction of the received data packets are acknowledged in the 2ACK scheme. Analytical and simulation results are presented to evaluate the performance of the proposed scheme

485 citations


01 Jan 2007
TL;DR: In this paper, the authors investigate the state-of-the-art of security issues in MANET and examine routing attacks, such as link spoofing and colluding misrelay attacks, as well as countermeasures against such attacks.
Abstract: Recently, mobile ad hoc networks became a hot research topic among researchers due to their flexibility and independence of network infrastructures, such as base stations. Due to unique characteristics, such as dynamic network topology, limited bandwidth, and limited battery power, routing in a MANET is a particularly challenging task compared to a conventional network. Early work in MANET research has mainly focused on developing an efficient routing mechanism in such a highly dynamic and resource-constrained network. At present, several efficient routing protocols have been proposed for MANET. Most of these protocols assume a trusted and cooperative environment. However, in the presence of malicious nodes, the networks are vulnerable to various kinds of attacks. In MANET, routing attacks are particularly serious. In this article, we investigate the state-of-the-art of security issues in MANET. In particular, we examine routing attacks, such as link spoofing and colluding misrelay attacks, as well as countermeasures against such attacks in existing MANET protocols.

474 citations


Journal ArticleDOI
TL;DR: This article investigates the state-of-the-art of security issues in MANET and examines routing attacks, such as link spoofing and colluding misrelay attacks, as well as countermeasures against such attacks in existing MANET protocols.
Abstract: Recently, mobile ad hoc networks became a hot research topic among researchers due to their flexibility and independence of network infrastructures, such as base stations. Due to unique characteristics, such as dynamic network topology, limited bandwidth, and limited battery power, routing in a MANET is a particularly challenging task compared to a conventional network. Early work in MANET research has mainly focused on developing an efficient routing mechanism in such a highly dynamic and resource-constrained network. At present, several efficient routing protocols have been proposed for MANET. Most of these protocols assume a trusted and cooperative environment. However, in the presence of malicious nodes, the networks are vulnerable to various kinds of attacks. In MANET, routing attacks are particularly serious. In this article, we investigate the state-of-the-art of security issues in MANET. In particular, we examine routing attacks, such as link spoofing and colluding misrelay attacks, as well as countermeasures against such attacks in existing MANET protocols.

447 citations


Proceedings ArticleDOI
01 May 2007
TL;DR: A scalable and reliable point-to-point routing algorithm for ad hoc wireless networks and sensor-nets, and it is proved that the greedy routing strategy makes a consistent choice of the node responsible for the address, irrespective of the source address of the request.
Abstract: We propose a scalable and reliable point-to-point routing algorithm for ad hoc wireless networks and sensor-nets. Our algorithm assigns to each node of the network a virtual coordinate in the hyperbolic plane, and performs greedy geographic routing with respect to these virtual coordinates. Unlike other proposed greedy routing algorithms based on virtual coordinates, our embedding guarantees that the greedy algorithm is always successful in finding a route to the destination, if such a route exists. We describe a distributed algorithm for computing each node's virtual coordinates in the hyperbolic plane, and for greedily routing packets to a destination point in the hyperbolic plane. (This destination may be the address of another node of the network, or it may be an address associated to a piece of content in a Distributed Hash Table. In the latter case we prove that the greedy routing strategy makes a consistent choice of the node responsible for the address, irrespective of the source address of the request.) We evaluate the resulting algorithm in terms of both path stretch and node congestion.

423 citations


Journal ArticleDOI
TL;DR: A metric that estimates the average waiting time for each potential next hop is designed, which provides performance similar to that of schemes that have global knowledge of the network topology, yet without requiring that knowledge.
Abstract: Delay-tolerant networks (DTNs) have the potential to interconnect devices in regions that current networking technology cannot reach. To realize the DTN vision, routes must be found over multiple unreliable, intermittently-connected hops. In this paper we present a practical routing protocol that uses only observed information about the network. We designed a metric that estimates the average waiting time for each potential next hop. This learned topology information is distributed using a link-state routing protocol, where the link-state packets are "flooded" using epidemic routing. The routing is recomputed each time connections are established, allowing messages to take advantage of unpredictable contacts. A message is forwarded if the topology suggests that the connected node is "closer" to the destination than the current node. We demonstrate through simulation that our protocol provides performance similar to that of schemes that have global knowledge of the network topology, yet without requiring that knowledge. Further, it requires significantly less resources than the alternative, epidemic routing, suggesting that our approach scales better with the number of messages in the network. This performance is achieved with minimal protocol overhead for networks of approximately 100 nodes.

Proceedings ArticleDOI
18 Jun 2007
TL;DR: Results show that HH-VBF yields much better performance than VBF in sparse networks, and is less sensitive to the routing pipe radius threshold, and the behavior of HH- VBF can facilitate the avoidance of any "void" areas in the network.
Abstract: This paper investigates a fundamental networking problem in underwater sensor networks: robust and energy-efficient routing. We present an adaptive location-based routing protocol, called hop-by-hop vector-based forwarding (HH-VBF). It uses the notion of a "routing vector" (a vector from the source to the sink) acting as the axis of the "routing pipe", similar to the vector based forward (VBF) routing in the work of P. Xie, J.-H. Cui and L. Lao (VBF: Vector-Based Forwarding Protocol for Underwater Sensor Networks. Technical report, UCONN CSE Technical Report: UbiNet-TR05-03 (BECAT/CSE-TR-05-6), Feb. 2005). Unlike the original VBF approach, however, HH-VBF suggests the use of a routing vector for each individual forwarder in the network, instead of a single network-wide source-to-sink routing vector. By the creation of the hop-by-hop vectors, HH-VBF can overcome two major problems in VBF: (1) too small data delivery ratio for sparse networks; (2) too sensitive to "routing pipe" radius threshold. We conduct simulations to evaluate HH-VBF, and the results show that HH-VBF yields much better performance than VBF in sparse networks. In addition, HH-VBF is less sensitive to the routing pipe radius threshold. Furthermore, we also analyze the behavior of HH-VBF and show that assuming proper redundancy and feedback techniques, HH-VBF can facilitate the avoidance of any "void" areas in the network.

Book
12 Apr 2007
TL;DR: Introduction / Part I: Packet Routed / Part II: Circuitswitched (Voice) Routing / Part III: Transport Routing/ Part IV: Router and Switching Architecture / Part V: Integrated Routing & New Directions
Abstract: Introduction / Part I: Packet Routing / Part II: Circuitswitched (Voice) Routing / Part III: Transport Routing / Part IV: Router and Switching Architecture / Part V: Integrated Routing & New Directions

Proceedings ArticleDOI
29 Oct 2007
TL;DR: The extent to which routing performance optimizations have left the system vulnerable to end-to-end traffic analysis attacks from non-global adversaries with minimal resources is shown.
Abstract: Tor has become one of the most popular overlay networks for anonymizing TCP traffic. Its popularity is due in part to its perceived strong anonymity properties and its relatively low latency service. Low latency is achieved through Tor's ability to balance the traffic load by optimizing Tor router selection to probabilistically favor routers with high bandwidth capabilities. We investigate how Tor's routing optimizations impact its ability to provide strong anonymity. Through experiments conducted on PlanetLab, we show the extent to which routing performance optimizations have left the system vulnerable to end-to-end traffic analysis attacks from non-global adversaries with minimal resources. Further, we demonstrate that entry guards, added to mitigate path disruption attacks, are themselves vulnerable to attack. Finally, we explore solutions to improve Tor's current routing algorithms and propose alternative routing strategies that prevent some of the routing attacks used in our experiments.

Proceedings ArticleDOI
18 Jun 2007
TL;DR: This paper proposes a context-based protocol (HiBOp), and compares it with popular solutions, i.e., Epidemic Routing and PROPHET, to show that HiBOp is able to drastically reduce resource consumption and preserves the performance in terms of message delay.
Abstract: In opportunistic networks the existence of a simultaneous path between a sender and a receiver is not assumed. This model (which fits well to pervasive networking environments) completely breaks the main assumptions on which MANET routing protocols are built. Routing in opportunistic networks is usually based on some form of controlled flooding. But often this results in very high resource consumption and network congestion. In this paper we advocate context-based routing for opportunistic networks. We provide a general framework for managing and using context for taking forwarding decisions. We propose a context-based protocol (HiBOp), and compare it with popular solutions, i.e., Epidemic Routing and PROPHET. Results show that HiBOp is able to drastically reduce resource consumption. At the same time, it significantly reduces the message loss rate, and preserves the performance in terms of message delay.

Proceedings ArticleDOI
24 Jun 2007
TL;DR: This work proposes an inter-vehicle ad-hoc routing protocol called GyTAR (improved greedy traffic aware routing protocol) suitable for city environments and shows significant performance improvement in terms of packet delivery ratio, end-to-end delay, and routing overhead.
Abstract: The fundamental component for the success of VANET (vehicular ad hoc networks) applications is routing since it must efficiently handle rapid topology changes and a fragmented network. Current MANET (mobile ad hoc networks) routing protocols fail to fully address these specific needs especially in a city environments (nodes distribution, constrained but high mobility patterns, signal transmissions blocked by obstacles, etc.). In our current work, we propose an inter-vehicle ad-hoc routing protocol called GyTAR (improved greedy traffic aware routing protocol) suitable for city environments. GyTAR consists of two modules: (i) dynamic selection of the junctions through which a packet must pass to reach its destination, and (ii) an improved greedy strategy used to forward packets between two junctions. In this paper, we give detailed description of our approach and present its added value compared to other existing vehicular routing protocols. Simulation results show significant performance improvement in terms of packet delivery ratio, end-to-end delay, and routing overhead.

Proceedings ArticleDOI
21 May 2007
TL;DR: Evaluating the performance of reactive (AODV, DSR) and proactive (OLSR) routing protocols in MANETs under CBR traffic with different network conditions shows the superiority of proactive over reactive protocols in routing such traffic at the cost of a higher routing load.
Abstract: The mobility of nodes in mobile ad hoc networks (MANETs) results in frequent changes of network topology making routing in MANETs a challenging task. Some studies have been reported in the literature to evaluate the performance of the proposed routing algorithms. However, since the publication of experimental standards for some routing protocols by IETF, little activity has been done to contrast the performance of reactive against proactive protocols. This paper evaluates the performance of reactive (AODV, DSR) and proactive (OLSR) routing protocols in MANETs under CBR traffic with different network conditions. Our results, contrarily to previously reported studies conducted on the same routing protocols, show the superiority of proactive over reactive protocols in routing such traffic at the cost of a higher routing load.

Journal ArticleDOI
TL;DR: A model to characterize the performance of multihop radio networks in the presence of energy constraints and design routing algorithms to optimally utilize the available energy is developed.
Abstract: In this paper, we develop a model to characterize the performance of multihop radio networks in the presence of energy constraints and design routing algorithms to optimally utilize the available energy. The energy model allows us to consider different types of energy sources in heterogeneous environments. The proposed algorithm is shown to achieve a competitive ratio (i.e., the ratio of the performance of any offline algorithm that has knowledge of all past and future packet arrivals to the performance of our online algorithm) that is asymptotically optimal with respect to the number of nodes in the network. The algorithm assumes no statistical information on packet arrivals and can easily be incorporated into existing routing schemes (e.g., proactive or on-demand methodologies) in a distributed fashion. Simulation results confirm that the algorithm performs very well in terms of maximizing the throughput of an energy-constrained network. Further, a new threshold-based scheme is proposed to reduce the routing overhead while incurring only minimum performance degradation.

Proceedings ArticleDOI
24 Jun 2007
TL;DR: A node analytical model is proposed to describe the scheduling-based channel assignment progress, which relief the inter-flow interference and frequent switching delay and an on-demand interaction is used to derive a cumulative delay based routing protocol.
Abstract: In cognitive radio networks, nodes can work on different frequency bands. Existing routing proposals help nodes select frequency bands without considering the effect of band switching and intra-band backoff. In this paper, We propose a joint interaction between on-demand routing and spectrum scheduling. A node analytical model is proposed to describe the scheduling-based channel assignment progress, which relief the inter-flow interference and frequent switching delay. We also use an on-demand interaction to derive a cumulative delay based routing protocol. Simulation results show that, comparing to other approaches, our protocol provides better adaptability to the multi- flow environment and derives paths with much lower cumulative delay.

Journal ArticleDOI
TL;DR: An overview of the void problem is presented and the currently available void-handling techniques (as of July 2006) for geographic routing are surveyed, each designed with a different approach.
Abstract: Communications voids, where geographic greedy forwarding fails to move a packet further towards its destination, are an important issue for geographic routing in wireless networks. This article presents an overview of the void problem and surveys the currently available void-handling techniques (as of July 2006) for geographic routing. In the survey, we classify these void-handling techniques into six categories, each designed with a different approach, that is, planar-graph-based, geometric, flooding-based, costbased, heuristic, and hybrid. For each category, we present its basic principle and illustrate some classic techniques as well as the latest advances. We also provide a qualitative comparison of these techniques and discuss some possible directions of future research.

Proceedings ArticleDOI
10 Sep 2007
TL;DR: SADV is proposed, which utilizes some static nodes at road intersections in a completely mobile vehicular network to help relay data, and outperforms other multi-hop data dissemination protocols, especially under median or low vehicle density where the network is frequently partitioned.
Abstract: Vehicular networks have attracted great interest in the research community recently, and multi-hop routing becomes an important issue. To improve data delivery performance, we propose SADV, which utilizes some static nodes at road intersections in a completely mobile vehicular network to help relay data. With the assistance of static nodes at intersections, a packet can be stored in the node for a while and wait until there are vehicles within communication range along the best delivery path to further forward the packet, which reduces the overall data delivery delay. In addition, we let adjacent nodes measure the delay of forwarding data between each other in real time, so that the routing decision can adapt to changing vehicle densities. Our simulation results show that SADV outperforms other multi-hop data dissemination protocols, especially under median or low vehicle density where the network is frequently partitioned.

Proceedings ArticleDOI
01 Apr 2007
TL;DR: This paper proposes an approach to reactively initiate route computing and frequency band selection, and presents a novel multi-flow multi-frequency scheduling scheme for single node to relief the multi- flow interference and frequent switching delay.
Abstract: Routing in multi-hop cognitive radio net- works(CRN) should consider how to dynamically switch frequency band for either per flow throughput guarantee or global spectrum utilization. Previous research have offered both centralized and distributed solutions on combining the two, but since different nodes may sense different spectrum availability, efficiently sharing this information in the dynamic spectrum environment still remains challenging. In this paper, we propose an approach to reactively initiate route computing and frequency band selection. We further present a novel multi-flow multi-frequency scheduling scheme for single node to relief the multi-flow interference and frequent switching delay. We use cumulative delay along the path for evaluation, simulation results show that, comparing to other typical approaches, our protocol provides better adaptability to the dynamic spectrum and multi-flow environment, and incurs much lower cumulative delay.

Patent
07 May 2007
TL;DR: In this article, a path is selected using a context-based path pruning (CPP) technique that involves maintaining multiple local contexts at each intermediate node, with each local context representing at least one partial path.
Abstract: Context-based routing in multi-hop networks involves using a context-based routing metric. In a described implementation, respective path values are calculated for respective ones of multiple paths using the context-based routing metric. A path is selected from the multiple paths responsive to the calculated path values. Data is transmitted over at least one link of the selected path. In an example embodiment, the context-based routing metric is ascertained responsive to an estimated service interval (ESI) of a bottleneck link of each path of the multiple paths. In another example embodiment, the context-based routing metric is ascertained responsive to an expected resource consumption (ERC) metric. In an example embodiment of path selection, the path is selected using a context-based path pruning (CPP) technique that involves maintaining multiple local contexts at each intermediate node, with each local context representing at least one partial path.

Journal ArticleDOI
TL;DR: Routing protocols used in wired network cannot be used for mobile ad-hoc networks because of node mobility, so these protocols are divided into two classes: table driven and demand based.
Abstract: Mobile ad hoc networks(MANET) represent complex distributed systems that comprise wireless mobile nodes that can freely and dynamically self organize into arbitrary and temporary ad-hoc network topologies, allowing people and devices to seamlessly internet work in areas with no preexisting communication infrastructure e.g., disaster recovery environments. An ad-hoc network is not a new one, having been around in various forms for over 20 years. Traditionally, tactical networks have been the only communication networking application that followed the ad-hoc paradigm. Recently the introduction of new technologies such as Bluetooth, IEEE 802.11 and hyperlan are helping enable eventual commercial MANET deployments outside the military domain. These recent revolutions have been generating a renewed and growing interest in the research and development of MANET. To facilitate communication within the network a routing protocol is used to discover routes between nodes. The goal of the routing protocol is to have an efficient route establishment between a pair of nodes, so that messages can be delivered in a timely manner. Bandwidth and power constraints are the important factors to be considered in current wireless network because multi-hop ad-hoc wireless relies on each node in the network to act as a router and packet forwarder. This dependency places bandwidth, power computation demands on mobile host to be taken into account while choosing the protocol. Routing protocols used in wired network cannot be used for mobile ad-hoc networks because of node mobility. The ad-hoc routing protocols are divided into two classes: table driven and demand based. This paper reviews and discusses routing protocol belonging to each category.

Journal ArticleDOI
TL;DR: This paper proposes a distributed, scalable and localized multipath search protocol to discover multiple node-disjoint paths between the sink and source nodes and proposes a load balancing algorithm to distribute the traffic over the multiple paths discovered.
Abstract: The energy consumption is a key design criterion for the routing protocols in wireless sensor networks. Some of the conventional single path routing schemes may not be optimal to maximize the network lifetime and connectivity. In this paper, we propose a distributed, scalable and localized multipath search protocol to discover multiple node-disjoint paths between the sink and source nodes. We also propose a load balancing algorithm to distribute the traffic over the multiple paths discovered. We compare our proposed scheme with the directed diffusion, directed transmission, N-to-1 multipath routing, and the energy-aware routing protocols. Simulation results show that our proposed scheme has a higher node energy efficiency, lower average delay and control overhead than those protocols. Copyright © 2006 John Wiley & Sons, Ltd.

Journal ArticleDOI
TL;DR: A local rerouting based approach called failure insensitive routing, which ensures that when no more than one link failure notification is suppressed, a packet is guaranteed to be forwarded along a loop-free path to its destination if such a path exists.
Abstract: Link failures are part of the day-to-day operation of a network due to many causes such as maintenance, faulty interfaces, and accidental fiber cuts. Commonly deployed link state routing protocols such as OSPF react to link failures through global link state advertisements and routing table recomputations causing significant forwarding discontinuity after a failure. Careful tuning of various parameters to accelerate routing convergence may cause instability when the majority of failures are transient. To enhance failure resiliency without jeopardizing routing stability, we propose a local rerouting based approach called failure insensitive routing. The proposed approach prepares for failures using interface-specific forwarding, and upon a failure, suppresses the link state advertisement and instead triggers local rerouting using a backwarding table. With this approach, when no more than one link failure notification is suppressed, a packet is guaranteed to be forwarded along a loop-free path to its destination if such a path exists. This paper demonstrates the feasibility, reliability, and stability of our approach.

Proceedings ArticleDOI
27 Aug 2007
TL;DR: This work proposes a technique called Failure-Carrying Packets (FCP), a technique that allows data packets to autonomously discover a working path without requiring completely up-to-date state in routers, and shows that it provides better routing guarantees under failures despite maintaining lesser state at the routers.
Abstract: Current distributed routing paradigms (such as link-state, distance-vector, and path-vector) involve a convergence process consisting of an iterative exploration of intermediate routes triggered by certain events such as link failures. The convergence process increases router load, introduces outages and transient loops, and slows reaction to failures. We propose a new routing paradigm where the goal is not to reduce the convergence times but rather to eliminate the convergence process completely. To this end, we propose a technique called Failure-Carrying Packets (FCP) that allows data packets to autonomously discover a working path without requiring completely up-to-date state in routers. Our simulations, performed using real-world failure traces and Rocketfuel topologies, show that: (a) the overhead of FCP is very low, (b) unlike traditional link-state routing (such as OSPF), FCP can provide both low loss-rate as well as low control overhead, (c) compared to prior work in backup path pre-computations, FCP provides better routing guarantees under failures despite maintaining lesser state at the routers.

Journal ArticleDOI
TL;DR: This article extensively and exclusively studies the issues involved with QoS-aware routing and presents an overview and comparison of existing QoS -aware routing protocols and the open issues that must be addressed to fully support QoS'-aware routing.
Abstract: The explosive growth in the use of mobile devices coupled with users' desires for real-time applications has provided new challenges in the design of protocols for mobile ad hoc networks. Chief among these challenges to enabling real-time applications for mobile ad hoc networks is incorporating support for quality of service (QoS), such as meeting bandwidth or delay constraints. In particular, it is important that routing protocols incorporate QoS metrics in route finding and maintenance to support end-to-end QoS. This article extensively and exclusively studies the issues involved with QoS-aware routing and presents an overview and comparison of existing QoS-aware routing protocols. In addition, the open issues that must be addressed to fully support QoS-aware routing are discussed.

Journal Article
TL;DR: Study of the effects of various mobility models on the performance of two routing protocols Dynamic Source Routing (DSR- Reactive Protocol) and Destination-Sequenced Distance- Vector (DSDV-Proactive protocol) shows that performance of the routing protocol varies across different mobility models, node densities and length of data paths.
Abstract: A Mobile Ad-Hoc Network (MANET) is a self- configuring network of mobile nodes connected by wire- less links to form an arbitrary topology without the use of existing infrastructure. In this paper, we have studied the effects of various mobility models on the performance of two routing protocols Dynamic Source Routing (DSR- Reactive Protocol) and Destination-Sequenced Distance- Vector (DSDV-Proactive Protocol). For experiment pur- poses, we have considered four mobility scenarios: Ran- dom Waypoint, Group Mobility, Freeway and Manhattan models. These four Mobility Models are selected to rep- resent possibility of practical application in future. Per- formance comparison has also been conducted across varying node densities and number of hops. Experiment results illustrate that performance of the routing protocol varies across different mobility models, node densities and length of data paths.

Patent
07 Feb 2007
TL;DR: In this article, a network routing device according to the invention transmits a packet via a second port based upon destination information included in the packet received via a first port referring to a routing table and calculates beforehand a third port which is a transfer destination when a fault occurs in a destination connected to the second port.
Abstract: A network routing device according to the invention transmits a packet via a second port based upon destination information included in the packet received via a first port referring to a routing table. In addition, the network routing device calculates beforehand a third port which is a transfer destination when a fault occurs in a destination connected to the second port. Further, the network routing device holds scenario information including a combination of the second port and the third port and updates the routing table based upon the scenario information when a fault is detected in either of the ports.