scispace - formally typeset
Search or ask a question

Showing papers on "Routing protocol published in 2008"


Book
01 Jan 2008
TL;DR: In this article, the authors present a series of technical papers about ad hoc networks from a variety of laboratories and experts, and explain the latest thinking on how mobile devices can best discover, identify, and communicate with other devices in the vicinity.
Abstract: Ad hoc networks are to computing devices what Yahoo Personals are to single people: both help individuals communicate productively with strangers while maintaining security. Under the rules of ad hoc networking--which continue to evolve--your mobile phone can, when placed in proximity to your handheld address book, establish a little network on its own and enable data sharing between the two devices. In Ad Hoc Networking, Charles Perkins has compiled a series of technical papers about networking on the fly from a variety of laboratories and experts. The collection explains the latest thinking on how mobile devices can best discover, identify, and communicate with other devices in the vicinity. In this treatment, ad hoc networking covers a broad swath of situations. An ad hoc network might consist of several home-computing devices, plus a notebook computer that must exist on home and office networks without extra administrative work. Such a network might also need to exist when the people and equipment in normally unrelated military units need to work together in combat. Though the papers in this book are much more descriptive of protocols and algorithms than of their implementations, they aim individually and collectively at commercialization and popularization of mobile devices that make use of ad hoc networking. You'll enjoy this book if you're involved in researching or implementing ad hoc networking capabilities for mobile devices. --David Wall Topics covered: The state-of-the-art in protocols and algorithms to be used in ad hoc networks of mobile devices that move in and out of proximity to one another, to fixed resources like printers, and to Internet connectivity. Routing with Destination-Sequenced Distance Vector (DSDV), Dynamic Source Routing (DSR), Ad hoc On-Demand Distance Vector (AODV), and other resource-discovery and routing protocols; the effects of ad hoc networking on bandwidth consumption; and battery life.

2,022 citations


Proceedings ArticleDOI
13 Apr 2008
TL;DR: This paper describes the power and associated heat management challenges in today's routers and advocates a broad approach to addressing this problem that includes making power-awareness a primary objective in the design and configuration of networks, and in theDesign and implementation of network protocols.
Abstract: Exponential bandwidth scaling has been a fundamental driver of the growth and popularity of the Internet. However, increases in bandwidth have been accompanied by increases in power consumption, and despite sustained system design efforts to address power demand, significant technological challenges remain that threaten to slow future bandwidth growth. In this paper we describe the power and associated heat management challenges in today's routers. We advocate a broad approach to addressing this problem that includes making power-awareness a primary objective in the design and configuration of networks, and in the design and implementation of network protocols. We support our arguments by providing a case study of power demands of two standard router platforms that enables us to create a generic model for router power consumption. We apply this model in a set of target network configurations and use mixed integer optimization techniques to investigate power consumption, performance and robustness in static network design and in dynamic routing. Our results indicate the potential for significant power savings in operational networks by including power-awareness.

777 citations


Book ChapterDOI
05 May 2008
TL;DR: A depth-based routing (DBR) protocol that can take advantage of a multiple-sink underwater sensor network architecture without introducing extra cost and can achieve very high packet delivery ratios for dense networks with only small communication cost is proposed.
Abstract: Providing scalable and efficient routing services in underwater sensor networks (UWSNs) is very challenging due to the unique characteristics of UWSNs. Firstly, UWSNs often employ acoustic channels for communications because radio signals do not work well in water. Compared with radio-frequency channels, acoustic channels feature much lower bandwidths and several orders of magnitudes longer propagation delays. Secondly, UWSNs usually have very dynamic topology as sensors move passively with water currents. Some routing protocols have been proposed to address the challenging problem in UWSNs. However, most of them assume that the full-dimensional location information of all sensor nodes in a network is known in prior through a localization process, which is yet another challenging issue to be solved in UWSNs. In this paper, we propose a depth-based routing (DBR) protocol. DBR does not require full-dimensional location information of sensor nodes. Instead, it needs only local depth information, which can be easily obtained with an inexpensive depth sensor that can be equipped in every underwater sensor node. A key advantage of our protocol is that it can handle network dynamics efficiently without the assistance of a localization service. Moreover, our routing protocol can take advantage of a multiple-sink underwater sensor network architecture without introducing extra cost. We conduct extensive simulations. The results show that DBR can achieve very high packet delivery ratios (at least 95%) for dense networks with only small communication cost.

652 citations


Journal ArticleDOI
01 Jun 2008
TL;DR: The dragonfly topology is introduced which uses a group of high-radix routers as a virtual router to increase the effective radix of the network and the use of selective virtual-channel discrimination and theUse of credit round-trip latency to both sense and signal channel congestion gives throughput and latency that approaches that of an ideal adaptive routing algorithm.
Abstract: Evolving technology and increasing pin-bandwidth motivate the use of high-radix routers to reduce the diameter, latency, and cost of interconnection networks. High-radix networks, however, require longer cables than their low-radix counterparts. Because cables dominate network cost, the number of cables, and particularly the number of long, global cables should be minimized to realize an efficient network. In this paper, we introduce the dragonfly topology which uses a group of high-radix routers as a virtual router to increase the effective radix of the network. With this organization, each minimally routed packet traverses at most one global channel. By reducing global channels, a dragonfly reduces cost by 20% compared to a flattened butterfly and by 52% compared to a folded Clos network in configurations with ≥ 16K nodes.We also introduce two new variants of global adaptive routing that enable load-balanced routing in the dragonfly. Each router in a dragonfly must make an adaptive routing decision based on the state of a global channel connected to a different router. Because of the indirect nature of this routing decision, conventional adaptive routing algorithms give degraded performance. We introduce the use of selective virtual-channel discrimination and the use of credit round-trip latency to both sense and signal channel congestion. The combination of these two methods gives throughput and latency that approaches that of an ideal adaptive routing algorithm.

641 citations


Journal ArticleDOI
TL;DR: SocialCast is proposed, a routing framework for publish-subscribe that exploits predictions based on metrics of social interaction to identify the best information carriers and shows that prediction of colocation and node mobility allow for maintaining a very high and steady event delivery with low overhead and latency.
Abstract: Applications involving the dissemination of information directly relevant to humans (e.g., service advertising, news spreading, environmental alerts) often rely on publish-subscribe, in which the network delivers a published message only to the nodes whose subscribed interests match it. In principle, publish- subscribe is particularly useful in mobile environments, since it minimizes the coupling among communication parties. However, to the best of our knowledge, none of the (few) works that tackled publish-subscribe in mobile environments has yet addressed intermittently-connected human networks. Socially-related people tend to be co-located quite regularly. This characteristic can be exploited to drive forwarding decisions in the interest-based routing layer supporting the publish-subscribe network, yielding not only improved performance but also the ability to overcome high rates of mobility and long-lasting disconnections. In this paper we propose SocialCast, a routing framework for publish-subscribe that exploits predictions based on metrics of social interaction (e.g., patterns of movements among communities) to identify the best information carriers. We highlight the principles underlying our protocol, illustrate its operation, and evaluate its performance using a mobility model based on a social network validated with real human mobility traces. The evaluation shows that prediction of colocation and node mobility allow for maintaining a very high and steady event delivery with low overhead and latency, despite the variation in density, number of replicas per message or speed.

513 citations


Journal ArticleDOI
TL;DR: It is expected that key management, handling of congestion, multicasting capability, and routing will remain active areas of research and development, and that DTN may continue to be an active research endeavor for at least the next few years.
Abstract: We review the rationale behind the current design of the Delay/Disruption Tolerant Networking (DTN) Architecture and highlight some remaining open issues. Its evolution, from a focus on deep space to a broader class of heterogeneous networks that may suffer disruptions, affected design decisions spanning naming and addressing, message formats, data encoding methods, routing, congestion management and security. Having now achieved relative stability with the design, additional experience is required in long-running operational environments in order to fine tune our understanding of DTN concepts and the types of capabilities that are worth the investment in implementation complexity. We expect key management, handling of congestion, multicasting capability, and routing to remain active areas of research and development, and that DTN may continue to be an active research endeavor for at least the next few years.

470 citations


Journal ArticleDOI
17 Aug 2008
TL;DR: The design, implementation, and evaluation of novel migration techniques for virtual routers with either hardware or software data planes are presented, showing that VROOM is transparent to routing protocols and results in no performance impact on the data traffic when a hardware-based data plane is used.
Abstract: The complexity of network management is widely recognized as one of the biggest challenges facing the Internet today. Point solutions for individual problems further increase system complexity while not addressing the underlying causes. In this paper, we argue that many network-management problems stem from the same root cause---the need to maintain consistency between the physical and logical configuration of the routers. Hence, we propose VROOM (Virtual ROuters On the Move), a new network-management primitive that avoids unnecessary changes to the logical topology by allowing (virtual) routers to freely move from one physical node to another. In addition to simplifying existing network-management tasks like planned maintenance and service deployment, VROOM can also help tackle emerging challenges such as reducing energy consumption. We present the design, implementation, and evaluation of novel migration techniques for virtual routers with either hardware or software data planes. Our evaluation shows that VROOM is transparent to routing protocols and results in no performance impact on the data traffic when a hardware-based data plane is used.

426 citations


Journal ArticleDOI
17 Aug 2008
TL;DR: The experiments show that SEATTLE efficiently handles network failures and host mobility, while reducing control overhead and state requirements by roughly two orders of magnitude compared with Ethernet bridging.
Abstract: IP networks today require massive effort to configure and manage. Ethernet is vastly simpler to manage, but does not scale beyond small local area networks. This paper describes an alternative network architecture called SEATTLE that achieves the best of both worlds: The scalability of IP combined with the simplicity of Ethernet. SEATTLE provides plug-and-play functionality via flat addressing, while ensuring scalability and efficiency through shortest-path routing and hash-based resolution of host information. In contrast to previous work on identity-based routing, SEATTLE ensures path predictability and stability, and simplifies network management. We performed a simulation study driven by real-world traffic traces and network topologies, and used Emulab to evaluate a prototype of our design based on the Click and XORP open-source routing platforms. Our experiments show that SEATTLE efficiently handles network failures and host mobility, while reducing control overhead and state requirements by roughly two orders of magnitude compared with Ethernet bridging.

425 citations


Proceedings ArticleDOI
24 Oct 2008
TL;DR: Regional Congestion Awareness (RCA) is proposed, a lightweight technique to improve global network balance that informs the routing policy of congestion in parts of the network beyond adjacent routers.
Abstract: Interconnection networks-on-chip (NOCs) are rapidly replacing other forms of interconnect in chip multiprocessors and system-on-chip designs. Existing interconnection networks use either oblivious or adaptive routing algorithms to determine the route taken by a packet to its destination. Despite somewhat higher implementation complexity, adaptive routing enjoys better fault tolerance characteristics, increases network throughput, and decreases latency compared to oblivious policies when faced with non-uniform or bursty traffic. However, adaptive routing can hurt performance by disturbing any inherent global load balance through greedy local decisions. To improve load balance in adapting routing, we propose Regional Congestion Awareness (RCA), a lightweight technique to improve global network balance. Instead of relying solely on local congestion information, RCA informs the routing policy of congestion in parts of the network beyond adjacent routers. Our experiments show that RCA matches or exceeds the performance of conventional adaptive routing across all workloads examined, with a 16% average and 71% maximum latency reduction on SPLASH-2 benchmarks running on a 49-core CMP. Compared to a baseline adaptive router, RCA incurs a negligible logic and modest wiring overhead.

409 citations


Journal ArticleDOI
TL;DR: This paper demonstrates the advantages of using controlled mobility in wireless sensor networks (WSNs) for increasing their lifetime, i.e., the period of time the network is able to provide its intended functionalities.
Abstract: This paper demonstrates the advantages of using controlled mobility in wireless sensor networks (WSNs) for increasing their lifetime, i.e., the period of time the network is able to provide its intended functionalities. More specifically, for WSNs that comprise a large number of statically placed sensor nodes transmitting data to a collection point (the sink), we show that by controlling the sink movements we can obtain remarkable lifetime improvements. In order to determine sink movements, we first define a Mixed Integer Linear Programming (MILP) analytical model whose solution determines those sink routes that maximize network lifetime. Our contribution expands further by defining the first heuristics for controlled sink movements that are fully distributed and localized. Our Greedy Maximum Residual Energy (GMRE) heuristic moves the sink from its current location to a new site as if drawn toward the area where nodes have the highest residual energy. We also introduce a simple distributed mobility scheme (Random Movement or RM) according to which the sink moves uncontrolled and randomly throughout the network. The different mobility schemes are compared through extensive ns2-based simulations in networks with different nodes deployment, data routing protocols, and constraints on the sink movements. In all considered scenarios, we observe that moving the sink always increases network lifetime. In particular, our experiments show that controlling the mobility of the sink leads to remarkable improvements, which are as high as sixfold compared to having the sink statically (and optimally) placed, and as high as twofold compared to uncontrolled mobility.

393 citations


Journal ArticleDOI
TL;DR: The authors' classification of failures reveals the nature and extent of failures in the Sprint IP backbone and provides a probabilistic failure model, which can be used to generate realistic failure scenarios, as input to various network design and traffic engineering problems.
Abstract: As the Internet evolves into a ubiquitous communication infrastructure and supports increasingly important services, its dependability in the presence of various failures becomes critical. In this paper, we analyze IS-IS routing updates from the Sprint IP backbone network to characterize failures that affect IP connectivity. Failures are first classified based on patterns observed at the IP-layer; in some cases, it is possible to further infer their probable causes, such as maintenance activities, router-related and optical layer problems. Key temporal and spatial characteristics of each class are analyzed and, when appropriate, parameterized using well-known distributions. Our results indicate that 20% of all failures happen during a period of scheduled maintenance activities. Of the unplanned failures, almost 30% are shared by multiple links and are most likely due to router-related and optical equipment-related problems, respectively, while 70% affect a single link at a time. Our classification of failures reveals the nature and extent of failures in the Sprint IP backbone. Furthermore, our characterization of the different classes provides a probabilistic failure model, which can be used to generate realistic failure scenarios, as input to various network design and traffic engineering problems.

Journal ArticleDOI
TL;DR: The state of the art in WMN metrics is analyzed and a taxonomy for WMN routing protocols is proposed and performance measurements for a WMN, deployed using various routing metrics, are presented and corroborate the analysis.
Abstract: WMNs are low-cost access networks built on cooperative routing over a backbone composed of stationary wireless routers. WMNs must deal with the highly unstable wireless medium. Therefore, the design of algorithms that consider link quality to choose the best routes are enabling routing metrics and protocols to evolve. In this work, we analyze the state of the art in WMN metrics and propose a taxonomy for WMN routing protocols. Performance measurements for a WMN, deployed using various routing metrics, are presented and corroborate our analysis.

Proceedings ArticleDOI
15 Sep 2008
TL;DR: A scalable routing technique based on location information, and optimized for minimum energy per bit consumption is presented, and it is shown that the protocol's performance is close to the ideal case, as the additional burden of dynamic route discovery is minimal.
Abstract: Multi-hop transmission is considered for large coverage areas in bandwidth-limited underwater acoustic networks. In this paper, we present a scalable routing technique based on location information, and optimized for minimum energy per bit consumption. The proposed Focused Beam Routing (FBR) protocol is suitable for networks containing both static and mobile nodes, which are not necessarily synchronized to a global clock. A source node must be aware of its own location and the location of its final destination, but not those of other nodes.The FBR protocol can be defined as a cross-layer approach, in which the routing protocol, the medium access control and the physical layer functionalities are tightly coupled by power control. It can be described as a distributed algorithm, in which a route is dynamically established as the data packet traverses the network towards its final destination. The selection of the next relay is made at each step of the path after suitable candidates have proposed themselves.The system performance is measured in terms of energy per bit consumption and average packet end-to-end delay. The results are compared to those obtained using pre-established routes, defined via Dijkstra's algorithm for minimal power consumption. It is shown that the protocol's performance is close to the ideal case, as the additional burden of dynamic route discovery is minimal.

Journal ArticleDOI
TL;DR: This survey reviews Internet traffic engineering from the perspective of routing optimization, and points out some challenges in TE operation and important issues that are worthy of investigation in future research activities.
Abstract: Traffic engineering is an important mechanism for Internet network providers seeking to optimize network performance and traffic delivery. Routing optimization plays a key role in traffic engineering, finding efficient routes so as to achieve the desired network performance. In this survey we review Internet traffic engineering from the perspective of routing optimization. A taxonomy of routing algorithms in the literature is provided, dating from the advent of the TE concept in the late 1990s. We classify the algorithms into multiple dimensions: unicast/multicast, intra-/inter- domain, IP-/MPLS-based and offline/online TE schemes. In addition, we investigate some important traffic engineering issues, including robustness, TE interactions, and interoperability with overlay selfish routing. In addition to a review of existing solutions, we also point out some challenges in TE operation and important issues that are worthy of investigation in future research activities.

Proceedings ArticleDOI
22 Apr 2008
TL;DR: Results from simulation and an actual implementation on TinyOS 2 indicate that Koala can achieve very low duty cycles under a wide range of download and network sizes.
Abstract: We present Koala, a reliable data retrieval system designed to operate at permille (.1%) duty cycles, essential for long term environmental monitoring networks. Koala achieves these low duty cycles by letting the network's nodes sleep most of the time and reviving them through an efficient wake-up strategy whenever the gateway performs a bulk data download. Unlike other systems which consume energy to maintain consistent network state (\emph{e.g.} routes, sleep schedules, etc.) across the network's nodes, Koala maintains no persistent routing state on the motes. Instead, a basestation calculates the network paths using reachability information collected by the motes. The Flexible Control Protocol (FCP), a protocol we developed, is then used to install this routing information on the network's nodes. This paradigm of operation not only eliminates the overhead of maintaining routing state, but also significantly reduces the complexity of the networking code running on the motes. Results from simulation and an actual implementation on TinyOS 2 indicate that Koala can achieve very low duty cycles under a wide range of download and network sizes.

Journal ArticleDOI
01 Jun 2008
TL;DR: The proposed Virtual Circuit Tree Multicasting (VCTM) router is flexible enough to improve interconnect performance for a broad spectrum of multicasting scenarios, and achieves these benefits with straightforward and inexpensive extensions to a state-of-the-art packet-switched router.
Abstract: Current state-of-the-art on-chip networks provide efficiency, high throughput, and low latency for one-to-one (unicast) traffic. The presence of one-to-many (multicast) or one-to-all (broadcast) traffic can significantly degrade the performance of these designs, since they rely on multiple unicasts to provide one-to-many communication. This results in a burst of packets from a single source and is a very inefficient way of performing multicast and broadcast communication. This inefficiency is compounded by the proliferation of architectures and coherence protocols that require multicast and broadcast communication. In this paper, we characterize a wide array of on-chip communication scenarios that benefit from hardware multicast support. We propose Virtual Circuit Tree Multicasting (VCTM) and present a detailed multicast router design that improves network performance by up to 90\% while reducing network activity (hence power) by up to 53%.Our VCTM router is flexible enough to improve interconnect performance for a broad spectrum of multicasting scenarios,and achieves these benefits with straightforward and inexpensive extensions to a state-of-the-art packet-switched router.

Proceedings ArticleDOI
08 Dec 2008
TL;DR: This paper proposes the use of pair-wise tit-for-tat (TFT) as a simple, robust and practical incentive mechanism for disruption tolerant networks and develops an incentive-aware routing protocol that allows selfish nodes to maximize their own performance while conforming to TFT constraints.
Abstract: Disruption tolerant networks (DTNs) are a class of networks in which no contemporaneous path may exist between the source and destination at a given time. In such a network, routing takes place with the help of relay nodes and in a store-and-forward fashion. If the nodes in a DTN are controlled by rational entities, such as people or organizations, the nodes can be expected to behave selfishly and attempt to maximize their utilities and conserve their resources. Since routing is an inherently cooperative activity, system operation will be critically impaired unless cooperation is somehow incentivized. The lack of end-to-end paths, high variation in network conditions, and long feedback delay in DTNs imply that existing solutions for mobile ad-hoc networks do not apply to DTNs. In this paper, we propose the use of pair-wise tit-for-tat (TFT) as a simple, robust and practical incentive mechanism for DTNs. Existing TFT mechanisms often face bootstrapping problems or suffer from exploitation. We propose a TFT mechanism that incorporates generosity and contrition to address these issues. We then develop an incentive-aware routing protocol that allows selfish nodes to maximize their own performance while conforming to TFT constraints. For comparison, we also develop techniques to optimize the system-wide performance when all nodes are cooperative. Using both synthetic and real DTN traces, we show that without an incentive mechanism, the delivery ratio among selfish nodes can be as low as 20% as what is achieved under full cooperation; in contrast, with TFT as a basis of cooperation among selfish nodes, the delivery ratio increases to 60% or higher as under full cooperation. We also address the practical challenges involved in implementing the TFT mechanism. To our knowledge, this is the first practical incentive-aware routing scheme for DTNs.

Journal ArticleDOI
17 Aug 2008
TL;DR: It is argued that far more significant network-wide benefits can be derived by redesigning network routing protocols to leverage the universal deployment of packet-level redundant content elimination as a universal primitive on all Internet routers.
Abstract: Many past systems have explored how to eliminate redundant transfers from network links and improve network efficiency. Several of these systems operate at the application layer, while the more recent systems operate on individual packets. A common aspect of these systems is that they apply to localized settings, e.g. at stub network access links. In this paper, we explore the benefits of deploying packet-level redundant content elimination as a universal primitive on all Internet routers. Such a universal deployment would immediately reduce link loads everywhere. However, we argue that far more significant network-wide benefits can be derived by redesigning network routing protocols to leverage the universal deployment. We develop "redundancy-aware" intra- and inter-domain routing algorithms and show that they enable better traffic engineering, reduce link usage costs, and enhance ISPs' responsiveness to traffic variations. In particular, employing redundancy elimination approaches across redundancy-aware routes can lower intra and inter-domain link loads by 10-50%. We also address key challenges that may hinder implementation of redundancy elimination on fast routers. Our current software router implementation can run at OC48 speeds.

Journal ArticleDOI
TL;DR: A novel selection strategy based on the concept of Neighbors-on-Path is presented that can be coupled with any adaptive routing algorithm to exploit the situations of indecision occurring when the routing function returns several admissible output channels.
Abstract: Efficient and deadlock-free routing is critical to the performance of networks-on-chip. The effectiveness of any adaptive routing algorithm strongly depends on the underlying selection strategy. A selection function is used to select the output channel where the packet will be forwarded on. In this paper we present a novel selection strategy that can be coupled with any adaptive routing algorithm. The proposed selection strategy is based on the concept of Neighbors-on-Path the aims of which is to exploit the situations of indecision occurring when the routing function returns several admissible output channels. The overall objective is to choose the channel that will allow the packet to be routed to its destination along a path that is as free as possible of congested nodes. Performance evaluation is carried out by using a flit-accurate simulator under traffic scenarios generated by both synthetic and real applications. Results obtained show how the proposed selection strategy applied to the Odd-Even routing algorithm yields an improvement in both average delay and saturation point up to 20% and 30% on average respectively, with a minimal overhead in terms of area occupation. In addition, a positive effect on total energy consumption is also observed under near-congestion packet injection rates.

Book
24 Mar 2008
TL;DR: This book describes the different technology options - MAC protocols, routing protocols, localisation and data fusion techniques - and provides the means to numerically measure their performance, whether by simulation, mathematical models or experimental test beds.
Abstract: When choosing the technology options to develop a wireless sensor network (WSN), it is vital that their performance levels can be assessed for the type of application intended. This book describes the different technology options - MAC protocols, routing protocols, localisation and data fusion techniques - and provides the means to numerically measure their performance, whether by simulation, mathematical models or experimental test beds. Case studies, based on the authors' direct experience of implementing wireless sensor networks, describe the design methodology and the type of measurements used, together with samples of the performance measurements attained.The book will enable you to answer vital questions such as:* How long will my network remain alive given the amount of sensing required of it?* For how long should I set the sleeping state of my motes?* How many sensors should I distribute to meet the expected requirements of the application?* What type of throughput should I expect as a function of the number of nodes deployed and the radio interface chosen (whether it be Bluetooth or Zigbee)?* How is the Packet Error Rate of my Zigbee motes affected by the selection of adjacent frequency sub bands in the ISM 2.4GHz band?* How is the localisation precision dependant on the number of nodes deployed in a corridor?Communications and signal processing engineers, researchers and graduate students working in wireless sensor networks will find this book an invaluable practical guide to this important technology."This book gives a proper balance between theory and application; it is a book for those RD it is valuable for both students and practicing engineers, and is an essential addition for engineering libraries." - Professor Moe Win, Associate Professor at the Laboratory for Information and Decision Systems (LIDS), Massachusetts Institute of Technology *Only book to examine wireless sensor network technologies and assess their performance capabilities against possible applications*Enables the engineer to choose the technology that will give the best performance for the intended application*Case studies, based on the authors' direct experience of implementing wireless sensor networks, describe the design methodology and the type of measurements used, together with samples of the performance measurements attained.

Journal ArticleDOI
TL;DR: This article surveys flexible multipath routing techniques that are both scalable and incentive compatible and covers multihoming, tagging, tunneling, and extensions to existing Internet routing protocols.
Abstract: The Internet would be more efficient and robust if routers could flexibly divide traffic over multiple paths. Often, having one or two extra paths is sufficient for customizing paths for different applications, improving security, reacting to failures, and balancing load. However, support for Internet-wide multipath routing faces two significant barriers. First, multipath routing could impose significant computational and storage overhead in a network the size of the Internet. Second, the independent networks that comprise the Internet will not relinquish control over the flow of traffic without appropriate incentives. In this article, we survey flexible multipath routing techniques that are both scalable and incentive compatible. Techniques covered include: multihoming, tagging, tunneling, and extensions to existing Internet routing protocols.

Proceedings ArticleDOI
24 Oct 2008
TL;DR: SAMER as discussed by the authors is a routing solution for cognitive radio mesh networks that opportunistically routes traffic across paths with higher spectrum availability and quality via a new routing metric, which balances between long-term route stability and short-term opportunistic performance.
Abstract: Cognitive radio technology holds great promises in enabling unlicensed operation in licensed bands, to meet the increasing demand for radio spectrum. The new open spectrum operation necessitates novel routing protocols to exploit the available spectrum opportunistically. In this paper we present SAMER, a routing solution for cognitive radio mesh networks. SAMER opportunistically routes traffic across paths with higher spectrum availability and quality via a new routing metric. It balances between long-term route stability and short-term opportunistic performance. SAMER builds a runtime forwarding mesh that is updated periodically and offers a set of candidate routes to the destination. The actual forwarding path opportunistically adapts to the dynamic spectrum conditions and exploits the link with the highest spectrum availability at the time. We evaluate SAMER through simulations, and show that it effectively exploits the available network spectrum and results in higher end-to-end performance.

Patent
27 Oct 2008
TL;DR: In this article, the authors propose a method and apparatus for interdomain routing of calls in a network, where the network represents a first wide area network, and each of the adjacent nodes inserts an entry in its own routing table associating access to the range of addresses in the second-wide area network with the network address of the routing node and the cost for access.
Abstract: A method and apparatus for inter-domain routing of calls in a network, where the network represents a first wide area network. A routing node of the network advertises its access to a range of addresses in a second wide area network and a cost for access to the range of addresses to all adjacent nodes in the network. Each of the adjacent nodes inserts an entry in its own routing table associating access to the range of addresses in the second wide area network with the network address of the routing node and the cost for access. Each adjacent node then modifies the cost for access by adding its own cost and advertises its access to the range of addresses in the second wide area network and the modified cost for access to all of its adjacent nodes. When a call addressed to a destination address in the range of address in the second wide area network is received at each node of the network, then the node searches for the entry in its routing table corresponding to the range of addresses in the second wide area network having the lowest cost for access and connects the call to the adjacent node associated with the entry having the lowest cost. The routing node can also advertise one or more protocol types which it can support, where the protocol types are associated with the routing node in the routing table in each adjacent node and a call having a given protocol type is also routed at each node of the network based upon its protocol type.

Journal ArticleDOI
TL;DR: How the initial 802.11s standard addresses key factors for standardization of two-tier wireless mesh networks is described and discussed, including efficient allocation of mesh resources at the routing and MAC layers.
Abstract: Today, municipalities are planning to deploy metro-scale two-tier wireless mesh networks at a rapid pace. Fittingly, the IEEE 802.11s standard is being developed to allow interoperability between heterogeneous mesh network devices. In this article we describe and discuss how the initial standard addresses key factors for standardization of these networks: Efficient allocation of mesh resources at the routing and MAC layers. Protection and conservation of the network resources via security and energy efficiency. Assurance of fairness and elimination of spatial bias via mesh congestion control. We draw on examples from existing two-tier deployments, simulations, and analytical models to motivate these enhancements within the standard.

Journal ArticleDOI
TL;DR: A class of energy-efficient routing protocols for underwater sensor networks are designed based on the insights gained in an in-depth analysis of the impacts of fundamental differences between underwater acoustic propagation and terrestrial radio propagation.
Abstract: Interest in underwater acoustic networks has grown rapidly with the desire to monitor the large portion of the world covered by oceans. Fundamental differences between underwater acoustic propagation and terrestrial radio propagation may call for new criteria for the design of networking protocols. In this paper, we focus on some of these fundamental differences, including attenuation and noise, propagation delays, and the dependence of usable bandwidth and transmit power on distance (which has not been extensively considered before in protocol design studies). Furthermore, the relationship between the energy consumptions of acoustic modems in various modes (i.e., transmit, receive, and idle) is different than that of their terrestrial radio counterparts, which also impacts the design of energy-efficient protocols. The main contribution of this work is an in-depth analysis of the impacts of these unique relationships. We present insights that are useful in guiding both protocol design and network deployment. We design a class of energy-efficient routing protocols for underwater sensor networks based on the insights gained in our analysis. These protocols are tested in a number of relevant network scenarios, and shown to significantly outperform other commonly used routing strategies and to provide near optimal total path energy consumption. Finally, we implement in ns2 a detailed model of the underwater acoustic channel, and study the performance of routing choices when used with a simple MAC protocol and a realistic PHY model, with special regard to such issues as interference and medium access.

Journal ArticleDOI
TL;DR: This paper proposes a cooperation-based routing algorithm, namely, the minimum power cooperative routing (MPCR), which makes full use of the cooperative communications while constructing the minimum-power route, and shows that the MPCR algorithm can achieve power saving of 65.61% in regular linear networks and 29.8% inregular grid networks.
Abstract: Recently, the merits of cooperative communication in the physical layer have been explored. However, the impact of cooperative communication on the design of the higher layers has not been well-understood yet. Cooperative routing in wireless networks has gained much interest due to its ability to exploit the broadcast nature of the wireless medium in designing power efficient routing algorithms. Most of the existing cooperation based routing algorithms are implemented by finding a shortest path route first and then improving the route using cooperative communication. As such, these routing algorithms do not fully exploit the merits of cooperative communications, since the optimal cooperative route might not be similar to the shortest path route. In this paper, we propose a cooperation-based routing algorithm, namely, the minimum power cooperative routing (MPCR) algorithm, which makes full use of the cooperative communications while constructing the minimum-power route. The MPCR algorithm constructs the minimum-power route, which guarantees certain throughput, as a cascade of the minimum-power single-relay building blocks from the source to the destination. Thus, any distributed shortest path algorithm can be utilized to find the optimal cooperative route with polynomial complexity. Using analysis, we show that the MPCR algorithm can achieve power saving of 65.61% in regular linear networks and 29.8% in regular grid networks compared to the existing cooperation-based routing algorithms, where the cooperative routes are constructed based on the shortest-path routes. From simulation results, MPCR algorithm can have 37.64% power saving in random networks compared to those cooperation-based routing algorithms.

Journal ArticleDOI
TL;DR: This work proposes an interference- minimized multipath routing (I2MR) protocol that increases throughput by discovering zone-disjoint paths for load balancing, requiring minimal localization support and proposes a congestion control scheme that further increased throughput by loading the paths forload balancing at the highest possible rate supportable.
Abstract: High-rate streaming in WSN is required for future applications to provide high-quality information of battlefield hot spots. Although recent advances have enabled large-scale WSN to be deployed supported by high-bandwidth backbone network for high-rate streaming, the WSN remains the bottleneck due to the low-rate radios used and the effects of wireless interferences. First, we propose a technique to evaluate the quality of a pathset for multipath load balancing, taking into consideration the effects of wireless interferences and that nodes may interfere beyond communication ranges. Second, we propose an interference- minimized multipath routing (I2MR) protocol that increases throughput by discovering zone-disjoint paths for load balancing, requiring minimal localization support. Third, we propose a congestion control scheme that further increases throughput by loading the paths for load balancing at the highest possible rate supportable. Finally, we validate thepath-set evaluation technique and also evaluate the I2MR protocol and congestion control scheme by comparing with AODV protocol and node-disjoint multipath routing (NDMR) protocol. Simulation results show that I2MR with congestion control achieves on average 230% and 150% gains in throughput over AODV and NDMR respectively, and consumes comparable or at most 24% more energy than AODV but up to 60% less energy than NDMR.

Proceedings ArticleDOI
08 Dec 2008
TL;DR: This work presents a novel routing approach for multichannel cognitive radio networks (CRNs) based on probabilistically estimating the available capacity of every channel over every CR-to-CR link, while taking into account primary radio (PR).
Abstract: We present a novel routing approach for multichannel cognitive radio networks (CRNs). Our approach is based on probabilistically estimating the available capacity of every channel over every CR-to-CR link, while taking into account primary radio (PR). Our routing design consists of two main phases. In the first phase, the source node attempts to compute the most probable path (MPP) to the destination (including the channel assignment along that path) whose bandwidth has the highest probability of satisfying a required demand D. In the second phase, we verify whether the capacity of the MPP is indeed sufficient to meet the demand at confidence level delta. If that is not the case, we judiciously add channels to the links of the MPP such that the augmented MPP satisfies the demand D at the confidence level delta. We show through simulations that our protocol always finds the best path to the destination, achieving in some cases up to 200% improvement in connection acceptance rate compared to the traditional Dijkstra.

Journal ArticleDOI
TL;DR: A new Interference-Load Aware routing metric, ILA, is proposed that finds paths with reduced inter-flow and intra-flow interference to route the traffic through congestion free areas and balance the load amongst the network nodes.

Posted Content
TL;DR: This work proposes a time-variant community mobility model, referred to as the TVC model, which realistically captures spatial and temporal correlations, and devise the communities that lead to skewed location visiting preferences, and time periods that allow us to model time dependent behaviors and periodic reappearances of nodes at specific locations.
Abstract: Realistic mobility models are fundamental to evaluate the performance of protocols in mobile ad hoc networks. Unfortunately, there are no mobility models that capture the non-homogeneous behaviors in both space and time commonly found in reality, while at the same time being easy to use and analyze. Motivated by this, we propose a time-variant community mobility model, referred to as the TVC model, which realistically captures spatial and temporal correlations. We devise the communities that lead to skewed location visiting preferences, and time periods that allow us to model time dependent behaviors and periodic re-appearances of nodes at specific locations. To demonstrate the power and flexibility of the TVC model, we use it to generate synthetic traces that match the characteristics of a number of qualitatively different mobility traces, including wireless LAN traces, vehicular mobility traces, and human encounter traces. More importantly, we show that, despite the high level of realism achieved, our TVC model is still theoretically tractable. To establish this, we derive a number of important quantities related to protocol performance, such as the average node degree, the hitting time, and the meeting time, and provide examples of how to utilize this theory to guide design decisions in routing protocols.