scispace - formally typeset
Search or ask a question

Showing papers on "Multipath routing published in 2014"


Journal ArticleDOI
TL;DR: In this article, the authors present several heuristics for a variation of the vehicle routing problem in which the transportation fleet is composed of electric vehicles with limited autonomy in need for recharge during their duties.
Abstract: This paper presents several heuristics for a variation of the vehicle routing problem in which the transportation fleet is composed of electric vehicles with limited autonomy in need for recharge during their duties. In addition to the routing plan, the amount of energy recharged and the technology used must also be determined. Constructive and local search heuristics are proposed, which are exploited within a non deterministic Simulated Annealing framework. Extensive computational results on varying instances are reported, evaluating the performance of the proposed algorithms and analyzing the distinctive elements of the problem (size, geographical configuration, recharge stations, autonomy, technologies, etc.).

359 citations


Journal ArticleDOI
TL;DR: This paper surveys different aspects of bio-inspired mechanisms and examines various algorithms that have been applied to artificial SON systems and discusses advantages, drawbacks, and further design challenges of variant algorithms.
Abstract: Inspired by swarm intelligence observed in social species, the artificial self-organized networking (SON) systems are expected to exhibit some intelligent features (e.g., flexibility, robustness, decentralized control, and self-evolution, etc.) that may have made social species so successful in the biosphere. Self-organized networks with swarm intelligence as one possible solution have attracted a lot of attention from both academia and industry. In this paper, we survey different aspects of bio-inspired mechanisms and examine various algorithms that have been applied to artificial SON systems. The existing well-known bio-inspired algorithms such as pulse-coupled oscillators (PCO)-based synchronization, ant- and/or bee-inspired cooperation and division of labor, immune systems inspired network security and Ant Colony Optimization (ACO)-based multipath routing have been surveyed and compared. The main contributions of this survey include 1) providing principles and optimization approaches of variant bio-inspired algorithms, 2) surveying and comparing critical SON issues from the perspective of physical-layer, Media Access Control (MAC)-layer and network-layer operations, and 3) discussing advantages, drawbacks, and further design challenges of variant algorithms, and then identifying their new directions and applications. In consideration of the development trends of communications networks (e.g., large-scale, heterogeneity, spectrum scarcity, etc.), some open research issues, including SON designing tradeoffs, Self-X capabilities in the 3rd Generation Partnership Project (3GPP) Long Term Evolution (LTE)/LTE-Advanced systems, cognitive machine-to-machine (M2M) self-optimization, cross-layer design, resource scheduling, and power control, etc., are also discussed in this survey.

250 citations


Proceedings ArticleDOI
01 Dec 2014
TL;DR: Segment Routing is presented, a new network architecture aimed at filling this gap, driven by use-cases defined by network operators, and its related ongoing standardization efforts are described.
Abstract: Network operators anticipate the offering of an increasing variety of cloud-based services with stringent Service Level Agreements. Technologies currently supporting IP networks however lack the flexibility and scalability properties to realize such evolution. In this article, we present Segment Routing (SR), a new network architecture aimed at filling this gap, driven by use-cases defined by network operators. SR implements the source routing and tunneling paradigms, letting nodes steer packets over paths using a sequence of instructions (segments) placed in the packet header. As such, SR allows the implementation of routing policies without per-flow entries at intermediate routers. This paper introduces the SR architecture, describes its related ongoing standardization efforts, and reviews the main use-cases envisioned by network operators.

210 citations


Journal ArticleDOI
TL;DR: A dynamic trust management protocol for secure routing optimization in DTN environments in the presence of well-behaved, selfish and malicious nodes is designed and validated and can effectively trade off message overhead and message delay for a significant gain in delivery ratio.
Abstract: Delay tolerant networks (DTNs) are characterized by high end-to-end latency, frequent disconnection, and opportunistic communication over unreliable wireless links. In this paper, we design and validate a dynamic trust management protocol for secure routing optimization in DTN environments in the presence of well-behaved, selfish and malicious nodes. We develop a novel model-based methodology for the analysis of our trust protocol and validate it via extensive simulation. Moreover, we address dynamic trust management, i.e., determining and applying the best operational settings at runtime in response to dynamically changing network conditions to minimize trust bias and to maximize the routing application performance. We perform a comparative analysis of our proposed routing protocol against Bayesian trust-based and non-trust based (PROPHET and epidemic) routing protocols. The results demonstrate that our protocol is able to deal with selfish behaviors and is resilient against trust-related attacks. Furthermore, our trust-based routing protocol can effectively trade off message overhead and message delay for a significant gain in delivery ratio. Our trust-based routing protocol operating under identified best settings outperforms Bayesian trust-based routing and PROPHET, and approaches the ideal performance of epidemic routing in delivery ratio and message delay without incurring high message or protocol maintenance overhead.

198 citations


Journal ArticleDOI
TL;DR: This work exploits the geographic opportunistic routing (GOR) for QoS provisioning with both end-to-end reliability and delay constraints in WSNs and proposes an Efficient QoS-aware GOR (EQGOR), characterized by the low time complexity.
Abstract: QoS routing is an important research issue in wireless sensor networks (WSNs), especially for mission-critical monitoring and surveillance systems which requires timely and reliable data delivery. Existing work exploits multipath routing to guarantee both reliability and delay QoS constraints in WSNs. However, the multipath routing approach suffers from a significant energy cost. In this work, we exploit the geographic opportunistic routing (GOR) for QoS provisioning with both end-to-end reliability and delay constraints in WSNs. Existing GOR protocols are not efficient for QoS provisioning in WSNs, in terms of the energy efficiency and computation delay at each hop. To improve the efficiency of QoS routing in WSNs, we define the problem of efficient GOR for multiconstrained QoS provisioning in WSNs, which can be formulated as a multiobjective multiconstraint optimization problem. Based on the analysis and observations of different routing metrics in GOR, we then propose an Efficient QoS-aware GOR (EQGOR) protocol for QoS provisioning in WSNs. EQGOR selects and prioritizes the forwarding candidate set in an efficient manner, which is suitable for WSNs in respect of energy efficiency, latency, and time complexity. We comprehensively evaluate EQGOR by comparing it with the multipath routing approach and other baseline protocols through ns-2 simulation and evaluate its time complexity through measurement on the MicaZ node. Evaluation results demonstrate the effectiveness of the GOR approach for QoS provisioning in WSNs. EQGOR significantly improves both the end-to-end energy efficiency and latency, and it is characterized by the low time complexity.

157 citations


Journal ArticleDOI
TL;DR: An optimization-based adaptive large neighborhood search heuristic for the production routing problem that outperforms existing heuristics for the PRP and can produce high-quality solutions in short computing times is introduced.
Abstract: Operational problems arising in the planning of integrated supply chains have been increasingly studied in the past decade. Among these, the production routing problem (PRP) is a difficult problem that aims to jointly optimize production, inventory, distribution, and routing decisions in order to satisfy the dynamic demand of customers and minimize the overall system cost. This paper introduces an optimization-based adaptive large neighborhood search heuristic for the PRP. In this heuristic, binary variables representing setup and routing decisions are handled by an enumeration scheme and upper-level search operators, respectively, and continuous variables associated with production, inventory, and shipment quantities are set by solving a network flow subproblem. Extensive computational experiments have been performed on benchmark instances from the literature. The results show that our algorithm generally outperforms existing heuristics for the PRP and can produce high-quality solutions in short computin...

144 citations


Journal ArticleDOI
13 Jan 2014-Sensors
TL;DR: This paper identifies various issues and challenges in pursuit of effective routing in WBSNs and provides a detailed literature review of the various existing routing protocols used in the WBSN domain by discussing their strengths and weaknesses.
Abstract: Wireless Body Sensor Networks (WBSNs) constitute a subset of Wireless Sensor Networks (WSNs) responsible for monitoring vital sign-related data of patients and accordingly route this data towards a sink. In routing sensed data towards sinks, WBSNs face some of the same routing challenges as general WSNs, but the unique requirements of WBSNs impose some more constraints that need to be addressed by the routing mechanisms. This paper identifies various issues and challenges in pursuit of effective routing in WBSNs. Furthermore, it provides a detailed literature review of the various existing routing protocols used in the WBSN domain by discussing their strengths and weaknesses.

132 citations


Journal ArticleDOI
TL;DR: This article first classify existing protocols based on different design criteria and then presents a survey of the state-of-the-art routing protocols in this area, illustrating how each of the protocols works, and discusses their advantages and disadvantages.
Abstract: Wireless sensor networks with mobile sinks, mWSNs, have attracted a lot of attention recently. This is because sink mobility can greatly alleviate the hotspot issue in WSNs and further prolong the network lifetime. However, sink mobility also causes unexpected changes in network topology and data routing paths, which can largely affect the routing performance in such networks. Design of efficient routing protocols for mWSNs has been a critical issue, and much work has been carried out in this aspect. In this article, we first classify existing protocols based on different design criteria and then present a survey of the state-of-the-art routing protocols in this area. We illustrate how each of the protocols works, and discuss their advantages and disadvantages. Finally, we point out some future directions for efficient routing in mWSNs.

117 citations


Journal ArticleDOI
TL;DR: An attack-resilient computation algorithm is presented to enable the base station to securely compute predicate count or sum even in the presence of such an attack, and shows that this algorithm outperforms other existing approaches.
Abstract: Wireless sensor networks (WSNs) are increasingly used in many applications, such as volcano and fire monitoring, urban sensing, and perimeter surveillance. In a large WSN, in-network data aggregation (i.e., combining partial results at intermediate nodes during message routing) significantly reduces the amount of communication overhead and energy consumption. The research community proposed a loss-resilient aggregation framework called synopsis diffusion, which uses duplicate-insensitive algorithms on top of multipath routing schemes to accurately compute aggregates (e.g., predicate count or sum). However, this aggregation framework does not address the problem of false subaggregate values contributed by compromised nodes. This attack may cause large errors in the aggregate computed at the base station, which is the root node in the aggregation hierarchy. In this paper, we make the synopsis diffusion approach secure against the above attack launched by compromised nodes. In particular, we present an algorithm to enable the base station to securely compute predicate count or sum even in the presence of such an attack. Our attack-resilient computation algorithm computes the true aggregate by filtering out the contributions of compromised nodes in the aggregation hierarchy. Extensive analysis and simulation study show that our algorithm outperforms other existing approaches.

114 citations


Patent
16 Apr 2014
TL;DR: In this article, a distributed load balancer in which a router receives packets from at least one client and routes packet flows to multiple load-balancer nodes according to a per-flow hashed multipath routing technique is described.
Abstract: A distributed load balancer in which a router receives packets from at least one client and routes packet flows to multiple load balancer (LB) nodes according to a per-flow hashed multipath routing technique. For a given packet flow, the LB nodes randomly select a server node as a target for the packet flow from among multiple server nodes and send a connection request to the server node. A load balancer module on the server node makes the decision on whether to accept or reject the connection based on one or more metrics indicating a respective server's current load. If the module accepts the connection request, a connection is established between the server and the client. Otherwise, the load balancer nodes may select another server node and try again. The connections established between clients and servers pass through the load balancer nodes, but are not terminated at the load balancer nodes.

109 citations


Journal ArticleDOI
TL;DR: This article introduces ORW, a practical opportunistic routing scheme for wireless sensor networks that uses a novel opportunist routing metric, EDC, that reflects the expected number of duty-cycled wakeups that are required to successfully deliver a packet from source to destination.
Abstract: Opportunistic routing is widely known to have substantially better performance than unicast routing in wireless networks with lossy links. However, wireless sensor networks are usually duty cycled, that is, they frequently enter sleep states to ensure long network lifetime. This renders existing opportunistic routing schemes impractical, as they assume that nodes are always awake and can overhear other transmissions. In this article we introduce ORW, a practical opportunistic routing scheme for wireless sensor networks. ORW uses a novel opportunistic routing metric, EDC, that reflects the expected number of duty-cycled wakeups that are required to successfully deliver a packet from source to destination. We devise distributed algorithms that find the EDC-optimal forwarding and demonstrate using analytical performance models and simulations that EDC-based opportunistic routing results in significantly reduced delay and improved energy efficiency compared to traditional unicast routing. In addition, we evaluate the performance of ORW in both simulations and testbed-based experiments. Our results show that ORW reduces radio duty cycles on average by 50p (up to 90p on individual nodes) and delays by 30p to 90p when compared to the state-of-the-art.

Journal ArticleDOI
Junqi Duan1, Dong Yang1, Haoqing Zhu1, Sidong Zhang1, Jing Zhao1 
TL;DR: This paper proposes a trust-aware secure routing framework (TSRF) with the characteristics of lightweight and high ability to resist various attacks and shows with the help of simulations that TSRF can achieve both intended security and high efficiency suitable for WSN-based networks.
Abstract: In recent years, trust-aware routing protocol plays a vital role in security of wireless sensor networks (WSNs), which is one of the most popular network technologies for smart city. However, several key issues in conventional trust-aware routing protocols still remain to be solved, such as the compatibility of trust metric with QoS metrics and the control of overhead produced by trust evaluation procedure. This paper proposes a trust-aware secure routing framework (TSRF) with the characteristics of lightweight and high ability to resist various attacks. To meet the security requirements of routing protocols in WSNs, we first analyze features of common attacks on trust-aware routing schemes. Then, specific trust computation and trust derivation schemes are proposed based on analysis results. Finally, our design uses the combination of trust metric and QoS metrics as routing metrics to present an optimized routing algorithm. We show with the help of simulations that TSRF can achieve both intended security and high efficiency suitable for WSN-based networks.

Journal ArticleDOI
TL;DR: A comprehensive survey of the main networking challenges present in the design of SG communication networks, and some of the important routing protocols proposed to address those challenges are provided.
Abstract: Smart grids (SG) represent the next step in modernizing the current electric grid. In this structure, a communications network is combined with the power grid in order to gather information that can be used to increase the efficiency of the grid, reduce power consumption, and improve the reliability of services, among other numerous advantages. SG communication networks are unique in their large scale and the limited capabilities of nodes which present several challenges in the design of efficient routing protocols. This paper provides a comprehensive survey of the main networking challenges present in the design of SG communication networks, and some of the important routing protocols proposed to address those challenges. Various technologies and architectures proposed for routing in SGs are discussed. A detailed comparison of the protocols considered in this paper is also given, and key areas that require further investigation are highlighted.

Journal ArticleDOI
TL;DR: A cross-layer design of routing, i.e., of medium access control (MAC) and physical layers, provides efficient multimedia routing in CRSNs, which is revealed through simulation experiments.
Abstract: Multimedia applications are characterized as delay-sensitive and high-bandwidth stipulating traffic sources. Supporting such demanding applications on cognitive radio sensor networks (CRSNs) with energy and spectrum constraints is a highly daunting task. In this paper, we propose a spectrum-aware cluster-based energy-efficient multimedia (SCEEM) routing protocol for CRSNs that jointly overcomes the formidable limitations of energy and spectrum. Clustering is exploited to support the quality of service (QoS) and energy-efficient routing by limiting the participating nodes in route establishment. In SCEEM routing, the number of clusters is optimally determined to minimize the distortion in multimedia quality that occurs due to packet losses and latency. Moreover, the cluster-head selection is based on the energy and relative spectrum awareness such that noncontiguous available spectrum bands are clustered and scheduled to provide continuous transmission opportunity. Routing employs clustering with hybrid medium access by combining carrier-sense multiple access (CSMA) and time-division multiple access (TDMA). TDMA operates for intracluster transmission, whereas CSMA is used for intercluster routing. Thus, a cross-layer design of routing, i.e., of medium access control (MAC) and physical layers, provides efficient multimedia routing in CRSNs, which is revealed through simulation experiments.

Journal ArticleDOI
TL;DR: A new implementation of the RPL standard for the Contiki operating system (OS) to improve data delivery reliability and to adopt a flexible cross-layering design that provides simple routing optimizations, enhanced link estimation capabilities, and efficient management of neighbor tables.
Abstract: The IPv6 routing protocol for low-power and lossy networks (RPL) has been recently standardized by the Internet Engineering Task Force (IETF) routing protocol for low-power and lossy networks (ROLL) working group to support IPv6 routing for resource-constrained devices in industrial, home, and urban environments. However, several studies have shown that RPL may experience (very) low delivery rates, particularly in large-scale deployments. In this paper, we provide an in-depth analysis of the protocol attributes and design choices that generate such unreliability issues. Then, we describe and evaluate a new implementation of the RPL standard for the Contiki operating system (OS) to improve data delivery reliability. The salient feature of our RPL implementation is to adopt a flexible cross-layering design that provides simple routing optimizations, enhanced link estimation capabilities, and efficient management of neighbor tables. In order to verify the effectiveness of our RPL implementation, we use an advanced metering infrastructure (AMI) as a case study. Results obtained using Cooja emulator in two sets of experiments, differentiated by the presence or lack of duty cycling, indicate that our RPL implementation outperforms the one provided in Contiki in terms of average packet delivery rates by up to 200% in networks with 100 nodes.

Proceedings ArticleDOI
08 Jul 2014
TL;DR: This paper leverages software defined network (SDN) technique and explores a new solution to energy-aware flow scheduling, i.e., scheduling flows in the time dimension and using exclusive routing (EXR) for each flow, which results in higher link utilization in high-radix data center networks.
Abstract: The explosive expansion of data center sizes ag- gravates the power consumption and carbon footprint, which has restricted the sustainable growth of cloud services and seriously troubled data center operators. In recent years, plenty of advanced data center network architectures have been proposed. They usually employ richly-connected topologies and multi-path routing to provide high network capacity. Unfortunately, they also undergo inefficient network energy usage during the traffic valley time. To address the problem, many energy-aware flow scheduling algorithms are proposed recently, primarily considering how to aggregate traffic by flexibly choosing the routing paths, with flows fairly sharing the link bandwidths. In this paper, we leverage software defined network (SDN) technique and explore a new solution to energy-aware flow scheduling, i.e., scheduling flows in the time dimension and using exclusive routing (EXR) for each flow, i.e., a flow always exclusively utilizes the links of its routing path. The key insight is that exclusive occupation of link resources usually results in higher link utilization in high-radix data center networks, since each flow does not need to compete for the link bandwidths with others. When scheduling the flows, EXR leaves flexibility to operators to define the priorities of flows, e.g., based on flow size, flow deadline, etc. Extensive simulations and testbed experiments both show that EXR can effectively save network energy compared with the regular fair-sharing routing (FSR), and significantly reduce the average flow completion time if assigning higher scheduling priorities to smaller flows. I. INTRODUCTION The explosive expansion of data center sizes aggravates the power consumption and carbon footprint. The statistics show that 1.5% of the global electricity usage came from data centers in 2011 (1), (2). The ever increasing energy consumption of data centers has restricted the sustainable growth of cloud services and raised economic and environmental concerns. Recently people pay attention to the contribution of networking part to the energy consumed by the whole data center. In typical data centers, the network accounts for 10-20% of the overall power consumption (3), while the proportion can be up to 50% if the mature server-side power management techniques are employed (4).

Journal ArticleDOI
TL;DR: Tests using computer simulation in Network Simulator 2 (ns-2) indicate that the overhead in PSR is only a fraction of the overhead of these baseline protocols, and PSR yields similar or better data transportation performance thanThese baseline protocols.
Abstract: Opportunistic data forwarding has drawn much attention in the research community of multihop wireless networking, with most research conducted for stationary wireless networks. One of the reasons why opportunistic data forwarding has not been widely utilized in mobile ad hoc networks (MANETs) is the lack of an efficient lightweight proactive routing scheme with strong source routing capability. In this paper, we propose a lightweight proactive source routing (PSR) protocol. PSR can maintain more network topology information than distance vector (DV) routing to facilitate source routing, although it has much smaller overhead than traditional DV-based protocols [e.g., destination-sequenced DV (DSDV)], link state (LS)-based routing [e.g., optimized link state routing (OLSR)], and reactive source routing [e.g., dynamic source routing (DSR)]. Our tests using computer simulation in Network Simulator 2 (ns-2) indicate that the overhead in PSR is only a fraction of the overhead of these baseline protocols, and PSR yields similar or better data transportation performance than these baseline protocols.

Journal ArticleDOI
TL;DR: The problem of network-wide energy consumption minimization under the network throughput constraint is formulates as a mixed-integer nonlinear programming problem by jointly optimizing routing, rate control, and power allocation and the min-max fairness model is applied to address the fairness issue.
Abstract: The increasing demand for wireless services has led to a severe energy consumption problem with the rising of greenhouse gas emission. While the renewable energy can somehow alleviate this problem, the routing, flow rate, and power still have to be well investigated with the objective of minimizing energy consumption in multi-hop energy renewable wireless mesh networks (ER-WMNs). This paper formulates the problem of network-wide energy consumption minimization under the network throughput constraint as a mixed-integer nonlinear programming problem by jointly optimizing routing, rate control, and power allocation. Moreover, the min-max fairness model is applied to address the fairness issue because the uneven routing problem may incur the sharp reduction of network performance in multi-hop ER-WMNs. Due to the high computational complexity of the formulated mathematical programming problem, an energy-aware multi-path routing algorithm (EARA) is also proposed to deal with the joint control of routing, flow rate, and power allocation in practical multi-hop WMNs. To search the optimal routing, it applies a weighted Dijkstra's shortest path algorithm, where the weight is defined as a function of the power consumption and residual energy of a node. Extensive simulation results are presented to show the performance of the proposed schemes and the effects of energy replenishment rate and network throughput on the network lifetime.

Journal ArticleDOI
TL;DR: Simulation results show that the proposed routing algorithm can enhance throughput and decrease end-to-end delay in industrial cognitive radio sensor networks (ICRSNs) based on ISA100.11a.
Abstract: This paper proposes a routing algorithm that enhances throughput and decreases end-to-end delay in industrial cognitive radio sensor networks (ICRSNs) based on ISA100.11a. In ICRSNs, the throughput is downgraded by interference from primary networks. The proposed routing algorithm is targeted at large-scale networks where data are forwarded through different clusters on their way to the sink. By estimating the maximum throughput for each path, the data can be forwarded through the most optimal path. Simulation results show that our scheme can enhance throughput and decrease end-to-end delay.

Journal ArticleDOI
TL;DR: This paper proposes an optimal routing protocol for WSN inspired by the foraging behavior of ants, which uses the principles of the fuzzy ant colony optimization routing (FACOR) to develop a suitable problem solution.
Abstract: A wireless sensor network (WSN) is a collection of sensor nodes that dynamically self-organize themselves into a wireless network without the utilization of any preexisting infrastructure. One of the major problems in WSNs is the energy consumption, whereby the network lifetime is dependent on this factor. In this paper, we propose an optimal routing protocol for WSN inspired by the foraging behavior of ants. The ants try to find existing paths between the source and base station. Furthermore, we have combined this behavior of ants with fuzzy logic in order for the ants to make the best decision. In other words, the fuzzy logic is applied to make the use of these paths optimal. Our algorithm uses the principles of the fuzzy ant colony optimization routing (FACOR) to develop a suitable problem solution. The performance of our routing algorithm is evaluated by Network Simulator 2 (NS2). The simulation results show that our algorithm optimizes the energy consumption amount, decreases the number of routing request packets, and increases the network lifetime in comparison with the original AODV.

Journal ArticleDOI
TL;DR: This paper uses the internal social features of each node in the network to perform the routing process, which converts a routing problem in a highly mobile and unstructured contact space to a static and structured feature space.
Abstract: Most routing protocols for delay tolerant networks resort to the sufficient state information, including trajectory and contact information, to ensure routing efficiency. However, state information tends to be dynamic and hard to obtain without a global and/or long-term collection process. In this paper, we use the internal social features of each node in the network to perform the routing process. In this way, feature-based routing converts a routing problem in a highly mobile and unstructured contact space to a static and structured feature space. This approach is motivated from several human contact networks, such as the Infocom 2006 trace and MIT reality mining data, where people contact each other more frequently if they have more social features in common. Our approach includes two unique processes: social feature extraction and multipath routing. In social feature extraction, we use entropy to extract the m most informative social features to create a feature space (F-space): (F1, F2,..., Fm), where Fi corresponds to a feature. The routing method then becomes a hypercube-based feature matching process, where the routing process is a step-by-step feature difference resolving process. We offer two special multipath routing schemes: node-disjoint-based routing and delegation-based routing. Extensive simulations on both real and synthetic traces are conducted in comparison with several existing approaches, including spray-and-wait routing, spray-and-focus routing, and social-aware routing based on betweenness centrality and similarity. In addition, the effectiveness of multipath routing is evaluated and compared to that of single-path routing.

Patent
16 Apr 2014
TL;DR: In this article, a distributed load balancer in which a router receives packets from at least one client and routes packet flows to multiple load-balancer nodes is described. But, instead of advertising itself, the load balance node may be advertised to the router by one or more neighbor load balancers nodes; the neighbor nodes may terminate the BGP sessions with the router in response to determining that the loadbalancer node has failed.
Abstract: A distributed load balancer in which a router receives packets from at least one client and routes packet flows to multiple load balancer nodes. The router exposes a public IP address and the load balancer nodes all advertise the same public IP address to the router. The router may implement a per-flow hashed multipath routing technique, for example an equal-cost multipath (ECMP) routing technique, to distribute the flows across the load balancer nodes. Thus, the multiple load balancer nodes may service a single public endpoint. The load balancer nodes may advertise to the router according to the Border Gateway Protocol (BGP). Rather than advertising itself, however, a load balancer node may be advertised to the router by one or more neighbor load balancer nodes; the neighbor nodes may terminate the BGP sessions with the router in response to determining that the load balancer node has failed.

Proceedings ArticleDOI
06 Mar 2014
TL;DR: The proposed routing protocol embeds the multi-layer parameters into the routing algorithm, thus combining the authentication and routing processes without incurring significant overheads, and saving resources by maintaining smaller routing information.
Abstract: This paper introduces a multi-hop routing protocol that enables secured IoT devices' communication. The routing protocol enables the IoT devices to authenticate before forming a new network or joining an existing network. The authentication uses multi-layer parameters to enhance the security of the communication. The proposed routing protocol embeds the multi-layer parameters into the routing algorithm, thus combining the authentication and routing processes without incurring significant overheads. The multi-layer parameters include a unique User-Controllable Identification, users' pre-agreed application(s), and a list of permitted devices, thus saving resources by maintaining smaller routing information. Experimental and field tests were conducted with results showing that our secure multi-hop routing is suitable to be deployed for IoT communication.

Journal ArticleDOI
TL;DR: This review paper provides an overview of existing mobile ad-hoc proactive and reactive routing protocols depending on their reactive and reactive nature respectively by presenting their characteristics, functionality, benefits and limitations and then makes their comparative analysis so to analyze their performance.
Abstract: mobile ad-hoc network is characterized as network without any physical connections. In this network there is no fixed topology due to the mobility of nodes, interference, multipath propagation and path loss. Many Routing protocols have been developed to overcome these characteristics. The purpose of this paper is to review existing mobile ad-hoc proactive and reactive routing protocols depending on their proactive and reactive nature respectively. This review paper provides an overview of these protocols by presenting their characteristics, functionality, benefits and limitations and then makes their comparative analysis so to analyze their performance. The objective of this review paper is to provide analysis about improvement of these existing protocols.

Journal ArticleDOI
TL;DR: An evaluation metric, path vacant ratio, is proposed to evaluate and then find a set of link-disjoint paths from all available paths, and a congestion control and load-balancing algorithm that can adaptively adjust the load over multipaths is proposed.
Abstract: Service-oriented architectures for wireless sensor networks (WSNs) have been proposed to provide an integrated platform, where new applications can be rapidly developed through flexible service composition. In WSNs, the existing multipath routing schemes have demonstrated the effectiveness of traffic distribution over multipaths to fulfill the quality of service requirements of applications. However, the failure of links might significantly affect the transmission performance, scalability, reliability, and security of WSNs. Thus, by considering the reliability, congestion control, and security for multipath, it is desirable to design a reliable and service-driven routing scheme to provide efficient and failure-tolerant routing scheme. In this paper, an evaluation metric, path vacant ratio, is proposed to evaluate and then find a set of link-disjoint paths from all available paths. A congestion control and load-balancing algorithm that can adaptively adjust the load over multipaths is proposed. A threshold sharing algorithm is applied to split the packets into multiple segments that will be delivered via multipaths to the destination depending on the path vacant ratio. Simulations demonstrate the performance of the adaptive and secure load-balance routing scheme. © 2014 IEEE.

Proceedings ArticleDOI
27 Mar 2014
TL;DR: Energy efficient routing protocol known as Position Responsive Routing Protocol (PRRP) is introduced to enhance energy efficiency of WSN and shows significant improvement of 45% in energy efficiency by increasing battery life of individual nodes.
Abstract: Nowadays Wireless Sensor Networks WSNs are playing a vital role in several application areas ranging health to battlefield Wireless sensor networks are easy to deploy due to its unique characteristics of size and self-organizing networks. Wireless sensor nodes contain small unchangeable and not chargeable batteries. It is a resource constraint type network Routing in WSN is most expensive task as it utilizes more power resources. This paper is intended to introduce energy efficient routing protocol known as Position Responsive Routing Protocol (PRRP) to enhance energy efficiency of WSN. Position responsive routing protocol differs in several ways than other existing routing techniques. Position response routing protocol approach allows fair distribution of gateway\cluster head selection, maximum possible distance minimization among nodes and gateways\cluster heads to utilize less energy. Position responsive routing protocol shows significant improvement of 45% in energy efficiency of wireless sensor network life time as a whole by increasing battery life of individual nodes. Furthermore PRRP shows drastic increases for data throughput and provide better solution to routing energy hole due to it fair distributed approach of gateway selection.

Journal ArticleDOI
TL;DR: The proposed scheme associates the backward difference traffic moments with the Sleep-time duration to tune the activity durations of a node for achieving optimal energy conservation and alleviating the uncontrolled energy consumption of wireless devices.

Journal ArticleDOI
TL;DR: An effective technique for preserving k-coverage and the reliability of data with logical fault tolerance is proposed and Simulation results show that the proposed method provides greater efficiency energy consumption.
Abstract: One of the major challenges in the area of wireless sensor networks is simultaneously reducing energy consumption and increasing network lifetime. Efficient routing algorithms have received considerable attention in previous studies for achieving the required efficiency, but these methods do not pay close attention to coverage, which is one of the most important Quality of Service parameters in wireless sensor networks. Suitable route selection for transferring information received from the environment to the sink plays crucial role in the network lifetime. The proposed method tries to select an efficient route for transferring the information. This paper reviews efficient routing algorithms for preserving k-coverage in a sensor network and then proposes an effective technique for preserving k-coverage and the reliability of data with logical fault tolerance. It is assumed that the network nodes are aware of their residual energy and that of their neighbors. Sensors are first categorized into two groups, coverage and communicative nodes, and some are then re-categorized as clustering and dynamic nodes. Simulation results show that the proposed method provides greater efficiency energy consumption.

Journal ArticleDOI
TL;DR: An efficient fault-tolerant routing algorithm, called Hybrid-Look-Ahead-Fault-Tolerant (HLAFT), which takes advantage of both local and look-ahead routing to boost the performance of 3D-NoC systems while ensuring fault-Tolerance.

Journal ArticleDOI
TL;DR: To facilitate a fair and comprehensive comparison among different routing algorithms, a cost function approach that integrates the end-to-end path reliability and number of hops is proposed, providing an indicator of quality of service of applications running on WSNs.
Abstract: Wireless sensor networks (WSNs) bring significant advantages over traditional communications in today's applications, such as environmental monitoring, homeland security, and health care. However, harsh and complex environments pose great challenges in the reliability of WSN communications. To achieve reliable wireless communications within WSNs, it is essential to have a reliable routing protocol and to have a means to evaluate the reliability performance of different routing protocols. In this paper, we first model the reliability of two different types of sensor nodes: 1) energy harvesting sensor nodes and 2) battery-powered sensor nodes. We then present wireless link reliability models for each type of sensor nodes, where effects of different parameters, such as battery life-time, shadowing, noise, and location uncertainty, are considered for analyzing the wireless link reliability. Based on the sensor node and wireless link reliability models, we compare the performance of different routing algorithms in terms of end-to-end path reliability and number of hops. A dynamic routing approach is then proposed to achieve the most reliable end-to-end path in WSNs. Furthermore, to facilitate a fair and comprehensive comparison among different routing algorithms, a cost function approach that integrates the end-to-end path reliability and number of hops is proposed, providing an indicator of quality of service of applications running on WSNs.