scispace - formally typeset
Search or ask a question

Showing papers on "Link-state routing protocol published in 2008"


Journal ArticleDOI
TL;DR: A detailed exploration of the single-copy routing space is performed in order to identify efficient single- copy solutions that can be employed when low resource usage is critical, and can help improve the design of general routing schemes that use multiple copies.
Abstract: Intermittently connected mobile networks are wireless networks where most of the time there does not exist a complete path from the source to the destination. There are many real networks that follow this model, for example, wildlife tracking sensor networks, military networks, vehicular ad hoc networks, etc. In this context, conventional routing schemes fail, because they try to establish complete end-to-end paths, before any data is sent. To deal with such networks researchers have suggested to use flooding-based routing schemes. While flooding-based schemes have a high probability of delivery, they waste a lot of energy and suffer from severe contention which can significantly degrade their performance. Furthermore, proposed efforts to reduce the overhead of flooding-based schemes have often been plagued by large delays. With this in mind, we introduce a new family of routing schemes that "spray" a few message copies into the network, and then route each copy independently towards the destination. We show that, if carefully designed, spray routing not only performs significantly fewer transmissions per message, but also has lower average delivery delays than existing schemes; furthermore, it is highly scalable and retains good performance under a large range of scenarios. Finally, we use our theoretical framework proposed in our 2004 paper to analyze the performance of spray routing. We also use this theory to show how to choose the number of copies to be sprayed and how to optimally distribute these copies to relays.

1,162 citations


BookDOI
01 Jan 2008
TL;DR: In this article, the authors present a survey of the state-of-the-art approaches for solving the Capacitated Vehicle Routing Problem on trees and using a genetic algorithm to solve the generalized orienteering problem.
Abstract: Overviews and Surveys- Routing a Heterogeneous Fleet of Vehicles- A Decade of Capacitated Arc Routing- Inventory Routing- The Period Vehicle Routing Problem and its Extensions- The Split Delivery Vehicle Routing Problem: A Survey- Challenges and Advances in A Priori Routing- Metaheuristics for the Vehicle Routing Problem and Its Extensions: A Categorized Bibliography- Parallel Solution Methods for Vehicle Routing Problems- Recent Developments in Dynamic Vehicle Routing Systems- New Directions in Modeling and Algorithms- Online Vehicle Routing Problems: A Survey- Modeling and Solving the Capacitated Vehicle Routing Problem on Trees- Using a Genetic Algorithm to Solve the Generalized Orienteering Problem- An Integer Linear Programming Local Search for Capacitated Vehicle Routing Problems- Robust Branch-Cut-and-Price Algorithms for Vehicle Routing Problems- Recent Models and Algorithms for One-to-One Pickup and Delivery Problems- One-to-Many-to-One Single Vehicle Pickup and Delivery Problems- Challenges and Opportunities in Attended Home Delivery- Chvatal-Gomory Rank-1 Cuts Used in a Dantzig-Wolfe Decomposition of the Vehicle Routing Problem with Time Windows- Vehicle Routing Problems with Inter-Tour Resource Constraints- From Single-Objective to Multi-Objective Vehicle Routing Problems: Motivations, Case Studies, and Methods- Practical Applications- Vehicle Routing for Small Package Delivery and Pickup Services- Advances in Meter Reading: Heuristic Solution of the Close Enough Traveling Salesman Problem over a Street Network- Multiperiod Planning and Routing on a Rolling Horizon for Field Force Optimization Logistics- Health Care Logistics, Emergency Preparedness, and Disaster Relief: New Challenges for Routing Problems with a Focus on the Austrian Situation- Vehicle Routing Problems and Container Terminal Operations - An Update of Research

976 citations


Book ChapterDOI
30 May 2008
TL;DR: CHs can be combined with many other route planning techniques, leading to improved performance for many-to-many routing, transit-node routing, goal-directed routing or mobile and dynamic scenarios, and a hierarchical query algorithm using bidirectional shortest-path search is obtained.
Abstract: We present a route planning technique solely based on the concept of node contraction. The nodes are first ordered by 'importance'. A hierarchy is then generated by iteratively contracting the least important node. Contracting a node υ means replacing shortest paths going through v by shortcuts. We obtain a hierarchical query algorithm using bidirectional shortest-path search. The forward search uses only edges leading to more important nodes and the backward search uses only edges coming from more important nodes. For fastest routes in road networks, the graph remains very sparse throughout the contraction process using rather simple heuristics for ordering the nodes. We have five times lower query times than the best previous hierarchical Dijkstra-based speedup techniques and a negative space overhead, i.e., the data structure for distance computation needs less space than the input graph. CHs can be combined with many other route planning techniques, leading to improved performance for many-to-many routing, transit-node routing, goal-directed routing or mobile and dynamic scenarios.

739 citations


Journal ArticleDOI
TL;DR: This paper reviews several routing protocols proposed for possible deployment of mobile ad hoc networks in military, government and commercial applications with a particular focus on security aspects, and analyses of the secure versions of the proposed protocols are discussed.
Abstract: Several routing protocols have been proposed in recent years for possible deployment of mobile ad hoc networks (MANETs) in military, government and commercial applications. In this paper, we review these protocols with a particular focus on security aspects. The protocols differ in terms of routing methodologies and the information used to make routing decisions. Four representative routing protocols are chosen for analysis and evaluation including: Ad Hoc on demand Distance Vector routing (AODV), Dynamic Source Routing (DSR), Optimized Link State Routing (OLSR) and Temporally Ordered Routing Algorithm (TORA). Secure ad hoc networks have to meet five security requirements: confidentiality, integrity, authentication, non-repudiation and availability. The analyses of the secure versions of the proposed protocols are discussed with respect to the above security requirements.

329 citations


Journal ArticleDOI
TL;DR: The state of the art in WMN metrics is analyzed and a taxonomy for WMN routing protocols is proposed and performance measurements for a WMN, deployed using various routing metrics, are presented and corroborate the analysis.
Abstract: WMNs are low-cost access networks built on cooperative routing over a backbone composed of stationary wireless routers. WMNs must deal with the highly unstable wireless medium. Therefore, the design of algorithms that consider link quality to choose the best routes are enabling routing metrics and protocols to evolve. In this work, we analyze the state of the art in WMN metrics and propose a taxonomy for WMN routing protocols. Performance measurements for a WMN, deployed using various routing metrics, are presented and corroborate our analysis.

319 citations


Proceedings ArticleDOI
15 Sep 2008
TL;DR: A scalable routing technique based on location information, and optimized for minimum energy per bit consumption is presented, and it is shown that the protocol's performance is close to the ideal case, as the additional burden of dynamic route discovery is minimal.
Abstract: Multi-hop transmission is considered for large coverage areas in bandwidth-limited underwater acoustic networks. In this paper, we present a scalable routing technique based on location information, and optimized for minimum energy per bit consumption. The proposed Focused Beam Routing (FBR) protocol is suitable for networks containing both static and mobile nodes, which are not necessarily synchronized to a global clock. A source node must be aware of its own location and the location of its final destination, but not those of other nodes.The FBR protocol can be defined as a cross-layer approach, in which the routing protocol, the medium access control and the physical layer functionalities are tightly coupled by power control. It can be described as a distributed algorithm, in which a route is dynamically established as the data packet traverses the network towards its final destination. The selection of the next relay is made at each step of the path after suitable candidates have proposed themselves.The system performance is measured in terms of energy per bit consumption and average packet end-to-end delay. The results are compared to those obtained using pre-established routes, defined via Dijkstra's algorithm for minimal power consumption. It is shown that the protocol's performance is close to the ideal case, as the additional burden of dynamic route discovery is minimal.

308 citations


Journal ArticleDOI
01 Jan 2008-Networks
TL;DR: The resource constrained elementary shortest path problem (RCESPP) arises as a pricing subproblem in branch‐and‐price algorithms for vehicle‐routing problems with additional constraints and is addressed by addressing the optimization of the RCESPP and presenting and comparing three methods.
Abstract: The resource constrained elementary shortest path problem (RCESPP) arises as a pricing subproblem in branch-and-price algorithms for vehicle routing problems with additional constraints. We address the optimization of the RCESPP and we present and compare three methods. The frst method is a well-known exact dynamic programming algorithm improved by new ideas, such as bi-directional search with resource-based bounding. The second method consists of a branch-and-bound algorithm, where lower bounds are computed by dynamic programming with state space relaxation; we show how bounded bi-directional search can be adapted to state space relaxation and we present different branching strategies and their hybridization. The third method, called decremental state space relaxation, is a new one; exact dynamic programming and state space relaxation are two special cases of this new method. The experimental comparison of the three methods is defnitely favourable to decremental state space relaxation. Computational results are given for different kinds of resources, arising from the capacitated vehicle routing problem, the vehicle routing problem with distribution and collection and the vehicle routing problem with capacities and time windows

258 citations


Journal ArticleDOI
TL;DR: This paper utilizes the multiple paths between the source and sink pairs for QoS provisioning and converts the optimization problem as a probabilistic programming into a deterministic linear programming, which is much easier and convenient to solve.
Abstract: Sensor nodes are densely deployed to accomplish various applications because of the inexpensive cost and small size. Depending on different applications, the traffic in the wireless sensor networks may be mixed with time-sensitive packets and reliability-demanding packets. Therefore, QoS routing is an important issue in wireless sensor networks. Our goal is to provide soft-QoS to different packets as path information is not readily available in wireless networks. In this paper, we utilize the multiple paths between the source and sink pairs for QoS provisioning. Unlike E2E QoS schemes, soft-QoS mapped into links on a path is provided based on local link state information. By the estimation and approximation of path quality, traditional NP-complete QoS problem can be transformed to a modest problem. The idea is to formulate the optimization problem as a probabilistic programming, then based on some approximation technique, we convert it into a deterministic linear programming, which is much easier and convenient to solve. More importantly, the resulting solution is also one to the original probabilistic programming. Simulation results demonstrate the effectiveness of our approach.

239 citations


Journal ArticleDOI
TL;DR: A novel selection strategy based on the concept of Neighbors-on-Path is presented that can be coupled with any adaptive routing algorithm to exploit the situations of indecision occurring when the routing function returns several admissible output channels.
Abstract: Efficient and deadlock-free routing is critical to the performance of networks-on-chip. The effectiveness of any adaptive routing algorithm strongly depends on the underlying selection strategy. A selection function is used to select the output channel where the packet will be forwarded on. In this paper we present a novel selection strategy that can be coupled with any adaptive routing algorithm. The proposed selection strategy is based on the concept of Neighbors-on-Path the aims of which is to exploit the situations of indecision occurring when the routing function returns several admissible output channels. The overall objective is to choose the channel that will allow the packet to be routed to its destination along a path that is as free as possible of congested nodes. Performance evaluation is carried out by using a flit-accurate simulator under traffic scenarios generated by both synthetic and real applications. Results obtained show how the proposed selection strategy applied to the Odd-Even routing algorithm yields an improvement in both average delay and saturation point up to 20% and 30% on average respectively, with a minimal overhead in terms of area occupation. In addition, a positive effect on total energy consumption is also observed under near-congestion packet injection rates.

226 citations


Journal ArticleDOI
TL;DR: This article surveys flexible multipath routing techniques that are both scalable and incentive compatible and covers multihoming, tagging, tunneling, and extensions to existing Internet routing protocols.
Abstract: The Internet would be more efficient and robust if routers could flexibly divide traffic over multiple paths. Often, having one or two extra paths is sufficient for customizing paths for different applications, improving security, reacting to failures, and balancing load. However, support for Internet-wide multipath routing faces two significant barriers. First, multipath routing could impose significant computational and storage overhead in a network the size of the Internet. Second, the independent networks that comprise the Internet will not relinquish control over the flow of traffic without appropriate incentives. In this article, we survey flexible multipath routing techniques that are both scalable and incentive compatible. Techniques covered include: multihoming, tagging, tunneling, and extensions to existing Internet routing protocols.

220 citations


Journal ArticleDOI
TL;DR: A class of energy-efficient routing protocols for underwater sensor networks are designed based on the insights gained in an in-depth analysis of the impacts of fundamental differences between underwater acoustic propagation and terrestrial radio propagation.
Abstract: Interest in underwater acoustic networks has grown rapidly with the desire to monitor the large portion of the world covered by oceans. Fundamental differences between underwater acoustic propagation and terrestrial radio propagation may call for new criteria for the design of networking protocols. In this paper, we focus on some of these fundamental differences, including attenuation and noise, propagation delays, and the dependence of usable bandwidth and transmit power on distance (which has not been extensively considered before in protocol design studies). Furthermore, the relationship between the energy consumptions of acoustic modems in various modes (i.e., transmit, receive, and idle) is different than that of their terrestrial radio counterparts, which also impacts the design of energy-efficient protocols. The main contribution of this work is an in-depth analysis of the impacts of these unique relationships. We present insights that are useful in guiding both protocol design and network deployment. We design a class of energy-efficient routing protocols for underwater sensor networks based on the insights gained in our analysis. These protocols are tested in a number of relevant network scenarios, and shown to significantly outperform other commonly used routing strategies and to provide near optimal total path energy consumption. Finally, we implement in ns2 a detailed model of the underwater acoustic channel, and study the performance of routing choices when used with a simple MAC protocol and a realistic PHY model, with special regard to such issues as interference and medium access.

Journal ArticleDOI
TL;DR: This paper proposes a cooperation-based routing algorithm, namely, the minimum power cooperative routing (MPCR), which makes full use of the cooperative communications while constructing the minimum-power route, and shows that the MPCR algorithm can achieve power saving of 65.61% in regular linear networks and 29.8% inregular grid networks.
Abstract: Recently, the merits of cooperative communication in the physical layer have been explored. However, the impact of cooperative communication on the design of the higher layers has not been well-understood yet. Cooperative routing in wireless networks has gained much interest due to its ability to exploit the broadcast nature of the wireless medium in designing power efficient routing algorithms. Most of the existing cooperation based routing algorithms are implemented by finding a shortest path route first and then improving the route using cooperative communication. As such, these routing algorithms do not fully exploit the merits of cooperative communications, since the optimal cooperative route might not be similar to the shortest path route. In this paper, we propose a cooperation-based routing algorithm, namely, the minimum power cooperative routing (MPCR) algorithm, which makes full use of the cooperative communications while constructing the minimum-power route. The MPCR algorithm constructs the minimum-power route, which guarantees certain throughput, as a cascade of the minimum-power single-relay building blocks from the source to the destination. Thus, any distributed shortest path algorithm can be utilized to find the optimal cooperative route with polynomial complexity. Using analysis, we show that the MPCR algorithm can achieve power saving of 65.61% in regular linear networks and 29.8% in regular grid networks compared to the existing cooperation-based routing algorithms, where the cooperative routes are constructed based on the shortest-path routes. From simulation results, MPCR algorithm can have 37.64% power saving in random networks compared to those cooperation-based routing algorithms.

Journal ArticleDOI
TL;DR: It is shown that the proposed scheme can significantly reduce the data traffic and improve the network lifetime and a distributed gradient algorithm designed accordingly can converge to the optimal value efficiently under all network configurations.
Abstract: An optimal routing and data aggregation scheme for wireless sensor networks is proposed in this paper. The objective is to maximize the network lifetime by jointly optimizing data aggregation and routing. We adopt a model to integrate data aggregation with the underlying routing scheme and present a smoothing approximation function for the optimization problem. The necessary and sufficient conditions for achieving the optimality are derived and a distributed gradient algorithm is designed accordingly. We show that the proposed scheme can significantly reduce the data traffic and improve the network lifetime. The distributed algorithm can converge to the optimal value efficiently under all network configurations.

Proceedings ArticleDOI
15 May 2008
TL;DR: Results of simulation show that, the proposed spectrum aware on-demand routing which doesn't base on control channel can well fit MSCRN and improve the network throughput comparing to the same network scenario without cognitive ability.
Abstract: In multi-hop single transceiver Cognitive Radio networks (MSCRN), routing becomes of great challenge when IEEE 802.11 DCF is used as the MAC protocol. Routing should not base on common control channel because it is not ensured that common control channel can be obtained by each node. In this paper, we propose a spectrum aware on-demand routing which doesn't base on control channel. A channel assignment algorithm aimed at improving link utilization is derived from delay-analysis. The overhead and gain by switching are balanced in this algorithm. For deafness problem caused by switching can result in significant performance degradation, constraints to avoid the appearance of deafness in channel assignment process are given. We stress that our approach can be easily implemented for the using of standard IEEE 802.11DCF. Results of simulation show that, our approach can well fit MSCRN and improve the network throughput comparing to the same network scenario without cognitive ability.

Patent
25 Nov 2008
TL;DR: In this paper, the authors present a routing management system for VoIP calls in a Voice over Internet Protocol (VoIP) system, which includes a routing manager which maintains a list of local routes, establishes and manages connections to the routing server, exports routes to the Routing Server, imports disseminated routes from the routing Server, caches those routes for future use, finds all matching routes for a particular number dialed by the user and prioritizes those routes based on timing, access and ordering information.
Abstract: A method, system, and computer program product for routing network traffic (calls in a Voice over Internet Protocol (VoIP)), which expands the capabilities of existing systems by providing faster and more efficient direction of network traffic, is disclosed. A routing management system includes a routing manager which maintains a list of local routes, establishes and manages connections to the routing server(s), exports routes to the routing server(s), imports disseminated routes from the routing server(s), obtains static global and dynamic routes from the routing server(s), caches those routes for future use, finds all matching routes for a particular number dialed by the user, and prioritizing those routes based on timing, access and ordering information. An additional embodiment contains at least one routing server which provides look-up services for gateway server(s), allows export of local routes from gateway server(s), and distributes translation data; and at least one gateway server which handles calls received on either the Internet protocol (IP) or traditional telephony networks. The gateway server bridges calls between the different kinds of networks, interacts with users, interfaces with the routing system.

Journal ArticleDOI
TL;DR: This paper presents the taxonomy of the multicast routing protocols, their properties and design features, and aims to aid MANETs researchers and application developers in selecting appropriate multicasts routing protocols for their work.

Journal ArticleDOI
TL;DR: An algorithmic model for wireless ad hoc and sensor networks that aims to be sufficiently close to reality as to represent practical realworld networks while at the same time being concise enough to promote strong theoretical results is studied.
Abstract: In this paper, we study an algorithmic model for wireless ad hoc and sensor networks that aims to be sufficiently close to reality as to represent practical real-world networks while at the same time being concise enough to promote strong theoretical results The quasi unit disk graph model contains all edges shorter than a parameter d between 0 and 1 and no edges longer than 1 We show that--in comparison to the cost known for unit disk graphs--the complexity results of geographic routing in this model contain the additional factor 1/d2 We prove that in quasi unit disk graphs flooding is an asymptotically message-optimal routing technique, we provide a geographic routing algorithm being most efficient in dense networks, and we show that classic geographic routing is possible with the same asymptotic performance guarantees as for unit disk graphs if d ≥ 1/√2

Proceedings ArticleDOI
15 Sep 2008
TL;DR: DIsruption REsilient Content Transport is presented, which is a content dissemination approach for ad hoc networks that exploits in-network storage and the hop-by-hop dissemination of named information objects and provides a high degree of reliability while maintaining low levels of delivery latencies and signaling and data overhead.
Abstract: Content dissemination in disrupted networks poses a big challenge, given that the current routing architectures of ad hoc networks require establishing routes from sources to destinations before content can disseminated between them. In ad hoc networks subject to disruption, lack of reliable connectivity between producers and consumers of information makes most routing protocols perform very poorly or not work at all. We present DIRECT (DIsruption REsilient Content Transport), which is a content dissemination approach for ad hoc networks that exploits in-network storage and the hop-by-hop dissemination of named information objects. Simulation experiments illustrate that DIRECT provides a high degree of reliability while maintaining low levels of delivery latencies and signaling and data overhead compared to traditional on-demand routing and epidemic routing.

Proceedings ArticleDOI
13 Apr 2008
TL;DR: This work provides important guidelines for designing routing metrics and identifies the specific properties that a routing metric must have in order to be combined with certain type of routing protocols.
Abstract: The design of a routing protocol must be based on the characteristics of its target networks. The diversity of wireless networks motivates the design of different routing metrics, capturing different aspects of wireless communications. The design of routing metrics, however, is not arbitrary since it has a great impact on the proper operation of routing protocols. Combining a wrong type of routing metrics with a routing protocol may result in routing loops and suboptimal paths. In this paper, we thoroughly study the relationship between routing metrics and routing protocols. Our work provides important guidelines for designing routing metrics and identifies the specific properties that a routing metric must have in order to be combined with certain type of routing protocols.

Journal ArticleDOI
TL;DR: Different basic functioning principles for routing protocols in underwater wireless sensor networks (relaying, direct transmission and clustering) are proposed and the total energy consumption is analyzed for each case, establishing a comparison between them.

Patent
18 Aug 2008
TL;DR: In this article, the authors describe a routing process for transmitting a packet through a node in the network based on available information on the network topology and/or the contents of the packet.
Abstract: The systems and methods described herein include adaptive routing processes for packet-based wireless communication networks. This routing approach works both in MANETs (when a contemporaneous end-to-end path is available) and in DTNs (when a contemporaneous end to end path is not available, but one of formed over space and time). In particular, the methods include adaptively selecting a routing process for transmitting a packet through a node in the network based on available information on the network topology and/or the contents of the packet.

Journal ArticleDOI
TL;DR: The decomposition is demonstrated by implementing an overlay construction toolkit Overlay Weaver, which is the first feasibility proof of the layered model by supporting multiple algorithms and the higher-level services and the resulting algorithm implementations work on a real TCP/IP network as it is.

Journal ArticleDOI
TL;DR: An efficient method to detect and avoid wormhole attacks in the OLSR protocOLSR protocolol, which exhibits several advantages, among which are its nonreliance on any time synchronization or location information, and its high detection rate under various scenarios.
Abstract: A particularly severe attack on routing protocols in ad hoc networks is the so-called worm- hole attack in which two or more colluding attackers record packets at one location, and tunnel them to another location for replay at that remote location. When this attack targets specifically routing control packets, the nodes that are close to the attackers are shielded from any alternative routes with more than one or two hops to the remote location. All routes are thus directed to the wormhole established by the attackers. In the optimized link state routing protocol, if a wormhole attack is launched during the propagation of link state packets, the wrong link information percolates throughout the network, leading to routing disruption. In this article we devise an efficient method to detect and avoid wormhole attacks in the OLSR protocOLSR protocolol. This method first attempts to pinpoint links that may potentially be part of a wormhole tunnel. Then a proper wormhole detection mechanism is applied to suspicious links by means of an exchange of encrypted probing packets between the two supposed neighbors (endpoints of the wormhole). The proposed solution exhibits several advantages, among which are its nonreliance on any time synchronization or location information, and its high detection rate under various scenarios.

Journal ArticleDOI
TL;DR: An algorithm based on tabu search is presented for the periodic vehicle routing problem and computational results presented on randomly generated test problems that are made publicly available.
Abstract: In this paper, we consider a periodic vehicle routing problem that includes, in addition to the classical constraints, the possibility of a vehicle doing more than one route per day, as long as the maximum daily operation time for the vehicle is not exceeded. In addition, some constraints relating to accessibility of the vehicles to the customers, in the sense that not every vehicle can visit every customer, must be observed. We refer to the problem we consider here as the site-dependent multi-trip periodic vehicle routing problem. An algorithm based on tabu search is presented for the problem and computational results presented on randomly generated test problems that are made publicly available. Our algorithm is also tested on a number of routing problems from the literature that constitute particular cases of the proposed problem. Specifically we consider the periodic vehicle routing problem; the site-dependent vehicle routing problem; the multi-trip vehicle routing problem; and the classical vehicle routing problem. Computational results for our tabu search algorithm on test problems taken from the literature for all of these problems are presented.

Proceedings ArticleDOI
13 Apr 2008
TL;DR: It is shown that a cubic routing stretch constitutes a lower bound for any local memoryless routing algorithm, and several randomized geographic routing algorithms which work well for 3D network topologies are proposed and analyzed.
Abstract: We reconsider the problem of geographic routing in wireless ad hoc networks. We are interested in local, memoryless routing algorithms, i.e. each network node bases its routing decision solely on its local view of the network, nodes do not store any message state, and the message itself can only carry information about O(1) nodes. In geographic routing schemes, each network node is assumed to know the coordinates of itself and all adjacent nodes, and each message carries the coordinates of its target. Whereas many of the aspects of geographic routing have already been solved for 2D networks, little is known about higher-dimensional networks. It has been shown only recently that there is in fact no local memoryless routing algorithm for 3D networks that delivers messages deterministically. In this paper, we show that a cubic routing stretch constitutes a lower bound for any local memoryless routing algorithm, and propose and analyze several randomized geographic routing algorithms which work well for 3D network topologies. For unit ball graphs, we present a technique to locally capture the surface of holes in the network, which leads to 3D routing algorithms similar to the greedy-face-greedy approach for 2D networks.

01 Jan 2008
TL;DR: The studies have shown that reactive protocols perform better than proactive protocols, and DSR has performed well for the performance parameters namely delivery ratio and routing overload while AODV performed better in terms of average delay.
Abstract: Summary The Efficient routing protocols can provide significant benefits to mobile ad hoc networks, in terms of both performance and reliability. Many routing protocols for such networks have been proposed so far. Amongst the most popular ones are Ad hoc Ondemand Distance Vector (AODV), Destination-Sequenced Distance-Vector Routing protocol (DSDV), Dynamic Source Routing Protocol (DSR), and Optimum Link State Routing (OLSR). Despite the popularity of those protocols, research efforts have not focused much in evaluating their performance when applied to variable bit rate (VBR). In this paper we present our observations regarding the performance comparison of the above protocols for VBR in mobile ad hoc networks (MANETs). We perform extensive simulations, using NS-2 simulator. Our studies have shown that reactive protocols perform better than proactive protocols. Further DSR has performed well for the performance parameters namely delivery ratio and routing overload while AODV performed better in terms of average delay.

Journal ArticleDOI
TL;DR: This paper considers (p, q )-Epidemic Routing, a class of store-carry-forward routing schemes, for sparsely populated mobile ad hoc networks, taking account of the recovery process that deletes unnecessary packets from the network.
Abstract: This paper considers (p, q )-Epidemic Routing, a class of store-carry-forward routing schemes, for sparsely populated mobile ad hoc networks. Our forwarding scheme includes Two-Hop Forwarding and the conventional Epidemic Routing as special cases. In such forwarding schemes, the original packet is copied many times and its packet copies spread over the network. Therefore those packet copies should be deleted after a packet reaches the destination. We analyze the performance of (p, q)-Epidemic Routing with VACCINE recovery scheme. Unlike most of the existing studies, we discuss the performance of (p, q)-Epidemic Routing in depth, taking account of the recovery process that deletes unnecessary packets from the network.

Proceedings ArticleDOI
26 May 2008
TL;DR: This paper proposes to use the expected minimum delay (EMD) as a new delivery probability metric in DTNs with repetitive but non-deterministic mobility and proposes a proposed EMD-based routing protocol, called routing in cyclic MobiSpace (RCM), which outperforms several existing opportunistic routing protocols when simulated using both real and synthetic traces.
Abstract: A key challenge of routing in delay tolerant networks (DTNs) is finding routes that have high delivery rates and low end-to-end delays. When oracles are not available for future connectivity, opportunistic routing is preferred in DTNs, in which messages are forwarded to nodes with higher delivery probabilities. We observe that real objects have repetitive motions, but no prior research work has investigated the cyclic delivery probability of messages between nodes. In this paper, we propose to use the expected minimum delay (EMD) as a new delivery probability metric in DTNs with repetitive but non-deterministic mobility. Specifically, we model the network as a probabilistic time-space graph with historical contact information or prior knowledge about the network. We then translate it into a probabilistic state-space graph in which the time dimension is removed. Finally, we apply the Markov decision process to derive the EMDs of the messages at particular times. Our proposed EMD-based routing protocol, called routing in cyclic MobiSpace (RCM), outperforms several existing opportunistic routing protocols when simulated using both real and synthetic traces.

Proceedings ArticleDOI
09 Dec 2008
TL;DR: LISP-DHT is designed to take full advantage of the DHT architecture in order to build an efficient and secured mapping lookup system while preserving the locality of the mapping.
Abstract: Recent activities in the IRTF (Internet Research Task Force), and in particular in the Routing Research Group (RRG), focus on defining a new Internet architecture, in order to solve scalability issues related to interdomain routing. The research community has agreed that the separation of the end-systems' addressing space (the identifiers) and the routing locators' space will alleviate the routing burden of the Default Free Zone. Nevertheless, such approach, adding a new level of indirection, implies the need of storing and distributing mappings between identifiers and routing locators. In this paper we present LISP-DHT, a mapping distribution system based on Distributed Hash Tables (DHTs). LISP-DHT is designed to take full advantage of the DHT architecture in order to build an efficient and secured mapping lookup system while preserving the locality of the mapping. The paper describes the overall architecture of LISP-DHT, explaining its main points and how it works.

Journal ArticleDOI
TL;DR: This paper contains an introduction to the problem field of geographic routing, a specific routing algorithm based on a synthesis of the greedy forwarding and face routing approaches, and an algorithmic analysis of the presented algorithm from both a worst-case and an average-case perspective.
Abstract: The one type of routing in ad hoc and sensor networks that currently appears to be most amenable to algorithmic analysis is geographic routing. This paper contains an introduction to the problem field of geographic routing, presents a specific routing algorithm based on a synthesis of the greedy forwarding and face routing approaches, and provides an algorithmic analysis of the presented algorithm from both a worst-case and an average-case perspective.