Data Communication. Guaranteed Delivery Based on Memorization
|
|
- Cory Fox
- 5 years ago
- Views:
Transcription
1 Data Communication Guaranteed Delivery Based on Memorization
2 Motivation Many greedy routing schemes perform well in dense networks Greedy routing has a small communication overhead Desirable to run Greedy routing as long as possible However, greedy routing might fail in sparse networks Guaranteed delivery is desirable property as well On the following slides: in case of failure run a recovery mechanism which requires memorizing past routing information In the message In the visited node
3 Recovery by Flooding Stojmenovic, Lin: Partial flooding to guarantee delivery (f- GEDIR, f-mfr, f-dir) Intermediate nodes handle packet according to GEDIR, MFR, Concave node broadcasts packet to all neighbors To avoid message loops: concave node rejects further copies of the message, concave nodes are removed from the list of candidate nodes Example: Message from S to D B C A S E G F H D unicast broadcast
4 Recovery by Flooding When there is a path from source to destination then one of the neighbors lies on the path guaranteed delivery Observation: flooding produces many redundant message transmissions Improvement: Component routing Connected components in node v partitions in the one-hop neighborhood graph N(v) when removing v Algorithm Concave node determines connected components Forward message to only the best neighbor in each component Number of message transmissions reduced significantly e.g. concave node has at most four connected components in the unit disk graph model
5 DFS-Based Routing Jain et al.: Geographic Routing Algorithm (GRA) Intermediate node handles message greedily Concave node maintains route to destination node Start route discovery for outdated routing tables Stuck packet is routed to destination after successful route discovery How to perform route discovery?
6 DFS-Based Routing Depth first search from concave node S Yields an acyclic path from S to D Node X puts its address on route discovery packet p Forward to neighbor who has not seen p before Select neighbor Y which minimizes XY + YD If no possible neighbor exists, remove address from p and send it back to the node from which p was originally received Alternative implementation: memorize DFS data in nodes Other metrics may be applied on next neighbor selection Quality-of-service paths (delay and bandwidth criteria, connection time, ) t1, t6: path = W W root t2: path = W X X Y3 t5: path = W X Y3 Y2 t4: path = W X Y2 t3: path = W X Y1 Y1
7 Data Communication Memoryless Guaranteed Delivery
8 Motivation Disadvantage of greedy recovery based on memorizing traffic Traffic may increase Memorized data may be outdated Greedy routing does not suffer from this fact Instantaneous forwarding decision Not affected by previous (and probably outdated) state information Question: is there a recovery strategy which preserves greedy s memoryless property?
9 The Face Recovery Principle S D F1 C F2 F3 F4 F5 T A B Locally construct a planar graph Visit face sequence providing progress towards T Traverse faces according to the left/right hand rule Return into greedy mode whenever possible
10 Face Recovery Details When to change current face traversal? How to decide the next face locally?
11 Example 1 Greedy-Face-Greedy GFG, [Bose et al., 1999]
12 GFG The face routing part P S T F P S repeat Let F be the face with P on boundary and intersecting PT Traverse * F until reaching an edge that intersects PT at some point Q P P Q until P=T * counterclockwise if inner, clockwise if outer face
13 GFG The face routing part P Q S T F P S repeat Let F be the face with P on boundary and intersecting PT Traverse * F until reaching an edge that intersects PT at some point Q P P Q until P=T * counterclockwise if inner, clockwise if outer face
14 GFG The face routing part P S T F P S repeat Let F be the face with P on boundary and intersecting PT Traverse * F until reaching an edge that intersects PT at some point Q P P Q until P=T * counterclockwise if inner, clockwise if outer face
15 GFG The face routing part P S T F P S repeat Let F be the face with P on boundary and intersecting PT Traverse * F until reaching an edge that intersects PT at some point Q P P Q until P=T * counterclockwise if inner, clockwise if outer face
16 Example 2 Greedy Other Adaptive Face Routing GOAFR, [Kuhn et al., 2003]
17 Face Routing Part of GOAFR P S T F P S repeat Explore the complete boundary of face F containing the line PT Advance to Q on F s boundary which is closest to T and set P Q until reaching T
18 Face Routing Part of GOAFR P Q S T F P S repeat Explore the complete boundary of face F containing the line PT Advance to Q on F s boundary which is closest to T and set P Q until reaching T
19 Face Routing Part of GOAFR P Q S F T P S repeat Explore the complete boundary of face F containing the line PT Advance to Q on F s boundary which is closest to T and set P Q until reaching T
20 Face Routing Part of GOAFR F S T P S repeat Explore the complete boundary of face F containing the line PT Advance to Q on F s boundary which is closest to T and set P Q until reaching T Q P
21 General Face Change Mechanism Observation: face can be traversed in two directions V S T U W After crossing variant: U selects V Before crossing variant: U selects W Best angle variant: U selects W
22 Comparison of Variants
23 FACE over Dominating Set Fact: localized planar graph construction prefers short edges over long ones Affects performance of face traversal: increased hop count How to reduce number of network nodes used by FACE? Remember: connected dominating set subset S of nodes of a graph G which satisfies Induced subgraph G[S] is connected Each node in G is either in S or has a one-hop neighbor in S Datta et al.: Perform FACE algorithm only on internal nodes defined by a connected dominating set Gabriel graph construction performed on DS only If concave node is no internal node forward to neighbor in DS Route along Gabriel graph until Local minimum handled Or node with destination in its neighbor list reached
24 Shortcut-Based FACE Routing Possibly more neighbor nodes along path produced by face traversal Locally construct planar graph used by all neighbor nodes 2-hop neighbor information needed! Perform a local planar graph traversal until reaching the last node in view and send packet to that node directly D S
25 Geographical Cluster Based Routing
26 The main Idea u C S v F1 F2 F3 T w D Connect neighboring clusters connected by a pair of nodes No UDG assumption; nodes need to be connected within one cluster Message loosely follows faces of the planar overlay graph Graph exploration requires local knowledge of all adjacent clusters Forwarding requires connectivity within Cluster C
27 GCR versus FACE
28 GCR Enables Local Traffic Dispersion v A B C
29 The Impact of Mobility Destination Node Destination Cluster Source Node Source Cluster Routing on sub graph Routing on overlay
30 Performance Study on Success Rate
31 The Advantages of Overlays No geometric network requirements Cluster membership sufficient Greedy forwarding even in recovery mode More robust to mobility
32 The Bad News Disconnection S u v T
33 The Bad News Disconnection Consider all edges A C B
34 The Bad News Disconnection Consider all edges Not implicitly planar A C D B
35 The Bad News Disconnection Consider all edges Not implicitly planar Remove bad edges Always possible? Local detection?
36 Planarity and Connectivity
37 Planarization by Edge Removal Undirected graph Unit disk graph Circular transmission range Unique sending radius ( v, w) E vw R Aggregated UDG? (a) A B C D Observation Redundancy Property Locally detectable intersection (b) D B Planarity and connectivity? C A
38 Redundancy Property not Sufficient Assumption Arbitrary network Redundancy property u1 u2 Conflicting goals Planarity Connectivity u5 v4 v3 v5 w v2 v1 u3 Additional property? ( co-existence property) u4
39 Aggregated Gabriel Graph Construction Properties
40 Aggregated Gabriel Graph Construction Gabriel graph on UDG Properties u v w
41 Aggregated Gabriel Graph Construction Gabriel graph on UDG Aggregation afterwards Properties
42 Aggregated Gabriel Graph Construction Gabriel graph on UDG Aggregation afterwards Properties Connected No regular intersection Localized construction Planar?
43 Irregular Intersection Problem Aggregated Graph A u v B w C Sub Graph 1 A u v B w C Sub graph 2 A u v B w C
44 Purged Aggregated Gabriel Graph Irregular intersection ABxC A C B
45 Purged Aggregated Gabriel Graph Irregular intersection ABxC UDG exists AC or BC A C B
46 Purged Aggregated Gabriel Graph Irregular intersection ABxC UDG exists AC or BC A Remove AB C B
47 Purged Aggregated Gabriel Graph Irregular intersection ABxC UDG exists AC or BC A Remove AB Introduce implicit edge BC Properties Planar Connected Localized construction possible Forwarding along implicit edge BC? C B
Geographical routing 1
Geographical routing 1 Routing in ad hoc networks Obtain route information between pairs of nodes wishing to communicate. Proactive protocols: maintain routing tables at each node that is updated as changes
More informationTheory and Practice of Geographic Routing
Theory and Practice of Geographic Routing Stefan Rührup Department of Computer Science University of Freiburg, Germany February 2009 Abstract Geographic routing algorithms use position information for
More informationChapter 4 Routing in Wireless Sensor Networks
Chapter 4 Routing in Wireless Sensor Networks Hannes Frey, Stefan Rührup, and Ivan Stojmenović Abstract Wireless sensor networks are formed by small sensor nodes communicating over wireless links without
More informationOn Delivery Guarantees of Face and Combined Greedy-Face Routing in Ad Hoc and Sensor Networks
On Delivery Guarantees of Face and Combined Greedy-Face Routing in Ad Hoc and Sensor Networks ABSTRACT Hannes Frey IMADA, University of Southern Denmark DK-5230 Odense M, Denmark frey@imada.sdu.dk It was
More informationSimulations of the quadrilateral-based localization
Simulations of the quadrilateral-based localization Cluster success rate v.s. node degree. Each plot represents a simulation run. 9/15/05 Jie Gao CSE590-fall05 1 Random deployment Poisson distribution
More informationGeometric Ad-Hoc Routing: Of Theory and Practice. Fabian Kuhn Roger Wattenhofer Yan Zhang Aaron Zollinger
Geometric Ad-Hoc Routing: Of Theory and Practice Fabian Kuhn Roger Wattenhofer Yan Zhang Aaron Zollinger Geometric Routing s??? t s PODC 2003 2 Greedy Routing Each node forwards message to best neighbor
More informationGeo-Routing. Chapter 2. Ad Hoc and Sensor Networks Roger Wattenhofer
Geo-Routing Chapter 2 Ad Hoc and Sensor Networks Roger Wattenhofer 2/1 Application of the Week: Mesh Networking (Roofnet) Sharing Internet access Cheaper for everybody Several gateways fault-tolerance
More informationAn Enhanced Algorithm to Find Dominating Set Nodes in Ad Hoc Wireless Networks
Georgia State University ScholarWorks @ Georgia State University Computer Science Theses Department of Computer Science 12-4-2006 An Enhanced Algorithm to Find Dominating Set Nodes in Ad Hoc Wireless Networks
More informationMobile Advanced Networks. Position-based routing geometric, geographic, location-based. Navid Nikaein Mobile Communication Department
Mobile Advanced Networks Position-based routing geometric, geographic, location-based Navid Nikaein Mobile Communication Department Navid Nikaein 2010 1 Reminder In topology-based routing, each node has
More informationA Survey on Geographic Routing Protocols for Mobile Ad hoc Networks
A Survey on Geographic Routing Protocols for Mobile Ad hoc Networks Atekeh Maghsoudlou, Marc St-Hilaire, and Thomas Kunz Department of Systems and Computer Engineering Carleton University, Ottawa, ON,
More informationChapter 7 TOPOLOGY CONTROL
Chapter 7 TOPOLOGY CONTROL Distributed Computing Group Mobile Computing Winter 2005 / 2006 Overview Topology Control Gabriel Graph et al. XTC Interference SINR & Scheduling Complexity Distributed Computing
More informationRouting. Geo-Routing. Thanks to Stefan Schmid for slides
Routing Geo-Routing Thanks to Stefan Schmid for slides 1 Overview Classic routing overview Geo-routing Greedy geo-routing Euclidean and Planar graphs Face Routing Greedy and Face Routing 2 Shortest path
More informationInternal node and shortcut based routing with guaranteed delivery in wireless networks
Internal node and shortcut based routing with guaranteed delivery in wireless networks Susanta Datta 1, Ivan Stojmenovic 1,2 and Jie Wu 3 1 SITE, University of Ottawa, Ottawa, Ontario K1N 6N5, Canada ivan@site.uottawa.ca
More informationFace Routing with Guaranteed Message Delivery in Wireless Ad-hoc Networks. Xiaoyang Guan
Face Routing with Guaranteed Message Delivery in Wireless Ad-hoc Networks by Xiaoyang Guan A thesis submitted in conformity with the requirements for the degree of Doctor of Philosophy Graduate Department
More informationRouting in Sensor Networks
Routing in Sensor Networks Routing in Sensor Networks Large scale sensor networks will be deployed, and require richer inter-node communication In-network storage (DCS, GHT, DIM, DIFS) In-network processing
More informationGeometric Routing: Of Theory and Practice
Geometric Routing: Of Theory and Practice PODC 03 F. Kuhn, R. Wattenhofer, Y. Zhang, A. Zollinger [KWZ 02] [KWZ 03] [KK 00] Asymptotically Optimal Geometric Mobile Ad-Hoc Routing Worst-Case Optimal and
More informationChallenges in Geographic Routing: Sparse Networks, Obstacles, and Traffic Provisioning
Challenges in Geographic Routing: Sparse Networks, Obstacles, and Traffic Provisioning Brad Karp Berkeley, CA bkarp@icsi.berkeley.edu DIMACS Pervasive Networking Workshop 2 May, 2 Motivating Examples Vast
More informationReview of Location-Aware Routing Protocols
Review of Location-Aware Routing Protocols Review of Location-Aware Routing Protocols School of Business (IT), James Cook University, Cairns Campus, McGregor Road, Smith Field, QLD4870, Australia {Colin.Lemmon,
More informationBeaconless Position Based Routing with Guaranteed Delivery for Wireless Ad-Hoc and Sensor Networks
Beaconless Position Based Routing with Guaranteed Delivery for Wireless Ad-Hoc and Sensor Networks Mohit Chawla 1, Nishith Goel 2, Kalai Kalaichelvan 3, Amiya Nayak 4, and Ivan Stojmenovic 4 1 IIT Guwahati,
More informationWhat is Multicasting? Multicasting Fundamentals. Unicast Transmission. Agenda. L70 - Multicasting Fundamentals. L70 - Multicasting Fundamentals
What is Multicasting? Multicasting Fundamentals Unicast transmission transmitting a packet to one receiver point-to-point transmission used by most applications today Multicast transmission transmitting
More informationRouting on Overlay Graphs in Mobile Ad Hoc Networks
Routing on Overlay Graphs in Mobile Ad Hoc Networks Sumesh J. Philip Department of Computer Science Western Illinois University Macomb IL 61455 Email: sj-philip@wiu.edu Joy Ghosh, Hung Q. Ngo, Chunming
More informationTable of Contents. 1. Introduction. 2. Geographic Routing. 2.1 Routing Mechanisms. 2.2 Destination Location. 2.3 Location Inaccuracy. 3.
Geographic Protocols in Sensor Networks Karim Seada, Ahmed Helmy Electrical Engineering Department, University of Southern California {seada, helmy}@usc.edu Table of Contents 1. Introduction 2. Geographic
More informationEfficient and Robust Geocasting Protocols for Sensor Networks
Efficient and Robust Geocasting Protocols for Sensor Networks Karim Seada, Ahmed Helmy Electrical Engineering Department, University of Southern California {seada, helmy}@usc.edu Abstract- Geocasting is
More informationVoid Traversal for Guaranteed Delivery in Geometric Routing
Void Traversal for Guaranteed Delivery in Geometric Routing Mikhail Nesterenko and Adnan Vora Computer Science Department Kent State University Kent, OH, 44242 mikhail@cs.kent.edu, avora@cs.kent.edu arxiv:0803.3632v
More informationMotivation and Basics Flat networks Hierarchy by dominating sets Hierarchy by clustering Adaptive node activity. Topology Control
Topology Control Andreas Wolf (0325330) 17.01.2007 1 Motivation and Basics 2 Flat networks 3 Hierarchy by dominating sets 4 Hierarchy by clustering 5 Adaptive node activity Options for topology control
More informationCHAPTER 5 MULTICAST GEOGRAPHY BASED ROUTING IN AD HOC NETWORKS
89 CHAPTER 5 MULTICAST GEOGRAPHY BASED ROUTING IN AD HOC NETWORKS 5.1 INTRODUCTION Efficient routing in MANET is a tough task due to their highly dynamic network topology, bandwidth controlled links and
More informationGenetic-Algorithm-Based Construction of Load-Balanced CDSs in Wireless Sensor Networks
Genetic-Algorithm-Based Construction of Load-Balanced CDSs in Wireless Sensor Networks Jing He, Shouling Ji, Mingyuan Yan, Yi Pan, and Yingshu Li Department of Computer Science Georgia State University,
More informationGeographic Routing in Simulation: GPSR
Geographic Routing in Simulation: GPSR Brad Karp UCL Computer Science CS M038/GZ06 23 rd January 2013 Context: Ad hoc Routing Early 90s: availability of off-the-shelf wireless network cards and laptops
More informationUsing Geometrical Routing for Overlay Networking in MMOGs
Using Geometrical Routing for Overlay Networking in MMOGs Behnoosh Hariri 1,2, Shervin Shirmohammadi 1, Mohammad Reza Pakravan 2 and Mohammad Hossein Alavi 2 1 Distributed and Collaborative Virtual Environment
More informationNetworks: A Deterministic Approach with Constant Overhead
Trace-Routing in 3D Wireless Sensor Networks: A Deterministic Approach with Constant Overhead Su Xia, Hongyi Wu, and Miao Jin! School of Computing and Informatics! University of Louisiana at Lafayette
More informationNetworking Sensors, I
Networking Sensors, I Sensing Networking Leonidas Guibas Stanford University Computation CS428 Networking Sensors Networking is a crucial capability for sensor networks -- networking allows: Placement
More informationAlgorithms for A Connected Dominating Set in Wireless Networks
Algorithms for A Connected Dominating Set in Wireless Networks Thesis submitted in Partial Fulfillment of the Requirements for the Award of the Degree of Master of Technology In Computer Science and Engineering
More informationChapter 6 DOMINATING SETS
Chapter 6 DOMINATING SETS Distributed Computing Group Mobile Computing Summer 2003 Overview Motivation Dominating Set Connected Dominating Set The Greedy Algorithm The Tree Growing Algorithm The Marking
More informationRouting protocols in WSN
Routing protocols in WSN 1.1 WSN Routing Scheme Data collected by sensor nodes in a WSN is typically propagated toward a base station (gateway) that links the WSN with other networks where the data can
More informationLifetime Comparison on Location Base Routing in Wireless Sensor Networks
Lifetime Comparison on Location Base Routing in Wireless Sensor Networks Hadi Asharioun, Hassan Asadollahi, Abdul Samad Ismail, and Sureswaran Ramadass Abstract Lifetime of a sensor network is defined
More informationQuiz 5 Answers. CS 441 Spring 2017
Quiz 5 Answers CS 441 Spring 2017 1. How does Flooding differ from the route discovery phase used in other reactive routing protocols such as DSR and AODV? [2] Flooding involves broadcasting of data packet
More informationGeographic Routing without Planarization
Geographic Routing without Planarization Ben Leong, Barbara Liskov, and Robert Morris MIT Computer Science and Artificial Intelligence Laboratory {benleong, liskov, rtm}@csail.mit.edu Abstract We present
More informationReliable Mobicast via Face-Aware Routing
Washington University in St. Louis Washington University Open Scholarship All Computer Science and Engineering Research Computer Science and Engineering Report Number: WUCSE-2003-49 2003-07-02 Reliable
More informationAd hoc and Sensor Networks Topology control
Ad hoc and Sensor Networks Topology control Goals of this chapter Networks can be too dense too many nodes in close (radio) vicinity This chapter looks at methods to deal with such networks by Reducing/controlling
More informationChapter 8 DOMINATING SETS
Chapter 8 DOMINATING SETS Distributed Computing Group Mobile Computing Summer 2004 Overview Motivation Dominating Set Connected Dominating Set The Greedy Algorithm The Tree Growing Algorithm The Marking
More informationarxiv: v2 [cs.dc] 28 Feb 2018
Competitive Routing in Hybrid Communication Networks Daniel Jung 1, Christina Kolb 2, Christian Scheideler 3, and Jannik Sundermeier 4 arxiv:1710.09280v2 [cs.dc] 28 Feb 2018 1 Heinz Nixdorf Institute &
More informationAn efficient implementation of the greedy forwarding strategy
An efficient implementation of the greedy forwarding strategy Hannes Stratil Embedded Computing Systems Group E182/2 Technische Universität Wien Treitlstraße 3 A-1040 Vienna Email: hannes@ecs.tuwien.ac.at
More informationChapter 8 DOMINATING SETS
Distributed Computing Group Chapter 8 DOMINATING SETS Mobile Computing Summer 2004 Overview Motivation Dominating Set Connected Dominating Set The Greedy Algorithm The Tree Growing Algorithm The Marking
More informationSurvey on Position-Based Routing 1
Survey on Position-Based Routing 1 Filipe Araújo and Luís Rodrigues Universidade de Lisboa {filipius,ler}@di.fc.ul.pt Abstract In this paper we review position-based routing for wireless ad hoc and for
More informationGeometric Spanners for Routing in Mobile Networks
1 Geometric Spanners for Routing in Mobile Networks Jie Gao, Leonidas J Guibas, John Hershberger, Li Zhang, An Zhu Abstract We propose a new routing graph, the Restricted Delaunay Graph (RDG), for mobile
More informationFairness Example: high priority for nearby stations Optimality Efficiency overhead
Routing Requirements: Correctness Simplicity Robustness Under localized failures and overloads Stability React too slow or too fast Fairness Example: high priority for nearby stations Optimality Efficiency
More informationWhat is the difference between unicast and multicast? (P# 114)
1 FINAL TERM FALL2011 (eagle_eye) CS610 current final term subjective all solved data by eagle_eye MY paper of CS610 COPUTER NETWORKS There were 30 MCQs Question no. 31 (Marks2) Find the class in 00000001.001011.1001.111
More informationDelaunay Triangulation Overlays
HighPerf or mance Swi tchi ng and Routi ng Tele com Cent erw orksh op: Sept 4, 1 97. Delaunay Triangulation Overlays Jörg Liebeherr 2003 1 HyperCast Project HyperCast is a set of protocols for large-scale
More informationAn Iterative Greedy Approach Using Geographical Destination Routing In WSN
ISSN (Online) : 2319-8753 ISSN (Print) : 2347-6710 International Journal of Innovative Research in Science, Engineering and Technology Volume 3, Special Issue 3, March 2014 2014 International Conference
More informationAN AD HOC network consists of a collection of mobile
174 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 23, NO. 1, JANUARY 2005 Geometric Spanners for Routing in Mobile Networks Jie Gao, Member, IEEE, Leonidas J. Guibas, John Hershberger, Li Zhang,
More informationThe Impact of Clustering on the Average Path Length in Wireless Sensor Networks
The Impact of Clustering on the Average Path Length in Wireless Sensor Networks Azrina Abd Aziz Y. Ahmet Şekercioğlu Department of Electrical and Computer Systems Engineering, Monash University, Australia
More informationSUPPORTING EFFICIENT AND SCALABLE MULTICASTING OVER MOBILE AD HOC NETWORKS. X.Xiang X.Wang Y.Yang
SUPPORTING EFFICIENT AND SCALABLE MULTICASTING OVER MOBILE AD HOC NETWORKS X.Xiang X.Wang Y.Yang Introduction Multicasting: an efficient way to realize group communications(one to many or many to many).
More informationTopology Control in Wireless Networks 4/24/06
Topology Control in Wireless Networks 4/4/06 1 Topology control Choose the transmission power of the nodes so as to satisfy some properties Connectivity Minimize power consumption, etc. Last class Percolation:
More informationEstimating the Free Region of a Sensor Node
Estimating the Free Region of a Sensor Node Laxmi Gewali, Navin Rongratana, Jan B. Pedersen School of Computer Science, University of Nevada 4505 Maryland Parkway Las Vegas, NV, 89154, USA Abstract We
More informationPolitecnico di Milano Facoltà di Ingegneria dell Informazione. WI-7 Ad hoc networks. Wireless Internet Prof. Antonio Capone
Politecnico di Milano Facoltà di Ingegneria dell Informazione WI-7 Ad hoc networks Wireless Internet Prof. Antonio Capone Acknowlegments o This class notes are mostly based on the teaching material of:
More informationOn-Demand Routing in Wireless Ad-Hoc Networks with Wide Levels of Network Density
On-Demand Routing in Wireless Ad-Hoc Networks with Wide Levels of Network Density Presented by Wei-Cheng Xiao Advisor: David B. Johnson 2015/03/30 Wireless Network Infrastructure Mode Internet access point
More informationDraft Notes 1 : Scaling in Ad hoc Routing Protocols
Draft Notes 1 : Scaling in Ad hoc Routing Protocols Timothy X Brown University of Colorado April 2, 2008 2 Introduction What is the best network wireless network routing protocol? This question is a function
More informationCHAPTER 4 IMPACT OF ROUTING ATTACKS IN LOCATION BASED ROUTING PROTOCOL
63 CHAPTER 4 IMPACT OF ROUTING ATTACKS IN LOCATION BASED ROUTING PROTOCOL 4.1 INTRODUCTION This chapter explains the impact of the blackhole, rushing, sybil and wormhole active attacks, in the route discovery
More informationArvind Krishnamurthy Fall 2003
Overlay Networks Arvind Krishnamurthy Fall 003 Internet Routing Internet routing is inefficient: Does not always pick the lowest latency paths Does not always pick paths with low drop rates Experimental
More informationDistributed Hashing for Scalable Multicast in Wireless Ad Hoc Networks
Purdue University Purdue e-pubs ECE Technical Reports Electrical and Computer Engineering 5-1-2006 Distributed Hashing for Scalable Multicast in Wireless Ad Hoc Networks Saumitra M. Das Purdue University
More informationReview Article Road-Aware Routing Strategies for Vehicular Ad Hoc Networks: Characteristics and Comparisons
International Journal of Distributed Sensor Networks Volume 2016, Article ID 1605734, 19 pages http://dx.doi.org/10.1155/2016/1605734 Review Article Road-Aware Routing Strategies for Vehicular Ad Hoc Networks:
More informationLecture 6: Vehicular Computing and Networking. Cristian Borcea Department of Computer Science NJIT
Lecture 6: Vehicular Computing and Networking Cristian Borcea Department of Computer Science NJIT GPS & navigation system On-Board Diagnostic (OBD) systems DVD player Satellite communication 2 Internet
More informationDEPARTMENT OF INFORMATION TECHNOLOGY
DEPARTMENT OF INFORMATION TECHNOLOGY A SEMINAR REPORT ON HYPOCOMB: BOUNDED-DEGREE LOCALIZED GEOMETRIC PLANAR GRAPHS FOR WIRELESS AD-HOC NETWORKS. OF T.E. ( INFORMATION TECHNOLOGY ) (Academic Year: 2014-2015)
More informationBGR: Blind Geographic Routing for Sensor Networks
BGR: Blind Geographic Routing for Sensor Networks Matthias Witt 1 and Volker Turau 1 1 Department of Telematics, Hamburg University of Technology, Hamburg, Germany {matthias.witt,turau}@tuhh.de Abstract
More informationIP Multicast Technology Overview
IP multicast is a bandwidth-conserving technology that reduces traffic by delivering a single stream of information simultaneously to potentially thousands of businesses and homes. Applications that take
More information1 Introduction. Networking and Computing (MobiHoc), Author Samir Das s work has been partially supported by NSF grant ANI
Connected Sensor Cover: Self-Organization of Sensor Networks for Efficient Query Execution 1 Himanshu Gupta, Zongheng Zhou, Samir R. Das, Quinyi Gu Department of Computer Science State University of New
More informationGuaranteed-delivery Geographic Routing under Uncertain Node Locations
Guaranteed-delivery Geographic Routing under Uncertain Node Locations Stefan Funke Max-Planck-Institut für Informatik Stuhlsatzenhausweg 85 66123 Saarbrücken, Germany Email: funke@mpi-inf.mpg.de Nikola
More informationUCS-805 MOBILE COMPUTING Jan-May,2011 TOPIC 8. ALAK ROY. Assistant Professor Dept. of CSE NIT Agartala.
Mobile Ad Hoc Networks: Routing TOPIC 8 UCS-805 MOBILE COMPUTING Jan-May,2011 ALAK ROY. Assistant Professor Dept. of CSE NIT Agartala Email-alakroy.nerist@gmail.com Mobile Ad Hoc Networks (MANET) Introduction
More informationStateless Multicasting in Mobile Ad Hoc Networks
Stateless Multicasting in Mobile Ad Hoc Networks Xiaojing Xiang, Member, IEEE, Xin Wang, Member, IEEE, and Yuanyuan Yang, Fellow, IEEE Abstract There are increasing interest and big challenge in designing
More informationMobile Ad-hoc and Sensor Networks Lesson 04 Mobile Ad-hoc Network (MANET) Routing Algorithms Part 1
Mobile Ad-hoc and Sensor Networks Lesson 04 Mobile Ad-hoc Network (MANET) Routing Algorithms Part 1 Oxford University Press 2007. All rights reserved. 1 Ad-hoc networks deployment For routing, target detection,
More informationGeographic and Diversity Routing in Mesh Networks
Geographic and Diversity Routing in Mesh Networks COS 463: Wireless Networks Lecture 7 Kyle Jamieson [Parts adapted from B. Karp, S. Biswas, S. Katti] Course Contents 1. Wireless From the Transport Layer
More informationEFFICIENT GREEDY-FACE-GREEDY GEOGRAPHIC ROUTING PROTOCOLS IN MOBILE AD HOC AND SENSOR NETWORKS
University of Kentucky UKnowledge Theses and Dissertations--Computer Science Computer Science 2012 EFFICIENT GREEDY-FACE-GREEDY GEOGRAPHIC ROUTING PROTOCOLS IN MOBILE AD HOC AND SENSOR NETWORKS Yan Sun
More informationPower-Dependable Transactions in Mobile Networks
Power-Dependable Transactions in Mobile Networks Ami Marowka Software Engineering Department Shenkar College of Engineering and Design 12 Anna Frank, Ramat-Gan, 52526, Israel E-mail: amimar2@yahoo.com
More informationUnicast Routing in Mobile Ad Hoc Networks. Dr. Ashikur Rahman CSE 6811: Wireless Ad hoc Networks
Unicast Routing in Mobile Ad Hoc Networks 1 Routing problem 2 Responsibility of a routing protocol Determining an optimal way to find optimal routes Determining a feasible path to a destination based on
More informationLocating and Bypassing Holes in Sensor Networks
Locating and Bypassing Holes in Sensor Networks Qing Fang Jie Gao Leonidas J. Guibas April 8, 2005 Abstract In real sensor network deployments, spatial distributions of sensors are usually far from being
More informationKeywords: Adhoc Network, Vehicular Adhoc Network, VANET, position-based routing protocols. I. INTRODUCTION
ISSN: 2349-7637 (Online) (RHIMRJ) Research Paper Available online at: www.rhimrj.com A Review: Position based Routing Protocols in VANET Rathod Kirit R 1st PhD Scholar, Rai University, Ahmedabad, Gujarat
More informationarxiv:cs/ v1 [cs.dc] 22 Nov 2006
arxiv:cs/0611117v1 [cs.dc] 22 Nov 06 Abstract 2FACE: Bi-Directional Face Traversal for Efficient Geometric Routing Mark Miyashita Mikhail Nesterenko Department of Computer Science Kent State University
More informationAd hoc and Sensor Networks Chapter 10: Topology control
Ad hoc and Sensor Networks Chapter 10: Topology control Holger Karl Computer Networks Group Universität Paderborn Goals of this chapter Networks can be too dense too many nodes in close (radio) vicinity
More informationWireless Networking & Mobile Computing
Wireless Networking & Mobile Computing CS 752/852 - Spring 2012 Network Layer: Ad Hoc Routing Tamer Nadeem Dept. of Computer Science The OSI Communication Model Page 2 Spring 2012 CS 752/852 - Wireless
More information6. Node Disjoint Split Multipath Protocol for Unified. Multicasting through Announcements (NDSM-PUMA)
103 6. Node Disjoint Split Multipath Protocol for Unified Multicasting through Announcements (NDSM-PUMA) 6.1 Introduction It has been demonstrated in chapter 3 that the performance evaluation of the PUMA
More information! Naive n-way unicast does not scale. ! IP multicast to the rescue. ! Extends IP architecture for efficient multi-point delivery. !
Bayeux: An Architecture for Scalable and Fault-tolerant Wide-area Data Dissemination ACM NOSSDAV 001 Shelley Q. Zhuang, Ben Y. Zhao, Anthony D. Joseph, Randy H. Katz, John D. Kubiatowicz {shelleyz, ravenben,
More informationLocalized routing with guaranteed delivery and a realistic physical layer in wireless sensor networks
Computer Communications 29 (2006) 2550 2555 www.elsevier.com/locate/comcom Localized routing with guaranteed delivery and a realistic physical layer in wireless sensor networks Milos Stojmenovic *, Amiya
More informationLocating and Bypassing Holes in Sensor Networks
Mobile Networks and Applications 11, 187 200, 2006 C 2006 Springer Science + Business Media, LLC. Manufactured in The Netherlands. DOI: 10.1007/s11036-006-4471-y Locating and Bypassing Holes in Sensor
More informationScalable Position-Based Multicast for Mobile Ad-hoc Networks
Scalable Position-Based Multicast for Mobile Ad-hoc Networks Matthias Transier, Holger Füßler, Jörg Widmer, Martin Mauve, and Wolfgang Effelsberg University of Mannheim, Institut für Informatik, 683 Mannheim,
More informationKapitel 5: Mobile Ad Hoc Networks. Characteristics. Applications of Ad Hoc Networks. Wireless Communication. Wireless communication networks types
Kapitel 5: Mobile Ad Hoc Networks Mobilkommunikation 2 WS 08/09 Wireless Communication Wireless communication networks types Infrastructure-based networks Infrastructureless networks Ad hoc networks Prof.
More informationGeometric Modeling Mortenson Chapter 11. Complex Model Construction
Geometric Modeling 91.580.201 Mortenson Chapter 11 Complex Model Construction Topics Topology of Models Connectivity and other intrinsic properties Graph-Based Models Emphasize topological structure Boolean
More informationA Low-Overhead Hybrid Routing Algorithm for ZigBee Networks. Zhi Ren, Lihua Tian, Jianling Cao, Jibi Li, Zilong Zhang
A Low-Overhead Hybrid Routing Algorithm for ZigBee Networks Zhi Ren, Lihua Tian, Jianling Cao, Jibi Li, Zilong Zhang Chongqing Key Lab of Mobile Communications Technology, Chongqing University of Posts
More informationR2D2: Rendezvous Regions for Data Discovery Karim Seada 1, Ahmed Helmy 2
R2D2: Rendezvous Regions for Data Discovery Karim Seada 1, Ahmed Helmy 2 1 Nokia Research Center, Palo Alto 2 Computer and Information Science and Engineering Department, University of Florida, Gainesville
More informationDistributed Core Multicast (DCM): a multicast routing protocol for many groups with few receivers
Distributed Core Multicast (DCM): a multicast routing protocol for many groups with few receivers Ljubica Blazević Jean-Yves Le Boudec Institute for computer Communications and Applications (ICA) Swiss
More informationSurvey on Location Based Routing Protocols in MANET
Survey on Location Based Routing Protocols in MANET Vivek Nikam, Prof. G.T. Chavan Sinhgad College of engineering, University of Pune Abstract- Due to the infrastructure less and dynamic nature of mobile
More informationLokale Netzstrukturen Exercise 5. Juli 19, 2017
Lokale Netzstrukturen Exercise 5 Juli 19, 2017 Ex 1 a) Definition The undirected degree 8 Yao graph over a node set V R 2, denoted YK 8 (V ), is defined as follows. For any node v V partition the plane
More informationEfficient Directional Network Backbone Construction in Mobile Ad Hoc Networks
Efficient Directional Network Backbone Construction in Mobile Ad Hoc Networks Shuhui Yang, Jie Wu, and Fei Dai Department of Computer Science Rensselaer Polytechnic Institute Troy, NY 12180 Department
More informationCHAPTER 2 WIRELESS SENSOR NETWORKS AND NEED OF TOPOLOGY CONTROL
WIRELESS SENSOR NETWORKS AND NEED OF TOPOLOGY CONTROL 2.1 Topology Control in Wireless Sensor Networks Network topology control is about management of network topology to support network-wide requirement.
More informationCompasses, Faces, and Butterflies: Route Discovery in Ad-Hoc Networks
Evangelos Kranakis, School of Computer Science, Carleton University, Ottawa 1 Compasses, Faces, and Butterflies: Route Discovery in Ad-Hoc Networks By Evangelos Kranakis School of Computer Science Carleton
More informationDesign Guidelines for Routing Protocols in Ad Hoc and Sensor Networks with a Realistic Physical Layer
TOPICS IN AD HOC NETWORKS Design Guidelines for Routing Protocols in Ad Hoc and Sensor Networks with a Realistic Physical Layer Ivan Stojmenovic, Amiya Nayak, and Johnson Kuruvila, SITE, University of
More informationConnectivity Service for Mobile Ad-Hoc Networks
Connectivity Service for Mobile Ad-Hoc Networks Alejandro Cornejo and Nancy Lynch MIT Computer Science and Artificial Intelligence Laboratory {acornejo,lynch}@csail.mit.edu Abstract We present a distributed
More informationFast, Efficient, and Robust Multicast in Wireless Mesh Networks
fast efficient and robust networking FERN Fast, Efficient, and Robust Multicast in Wireless Mesh Networks Ian Chakeres Chivukula Koundinya Pankaj Aggarwal Outline IEEE 802.11s mesh multicast FERM algorithms
More informationGEOGRAPHIC routing (also known as location-based or
IEEE/ACM TRANSACTIONS ON NETWORKING, VOL., NO., Geographic Routing in d-dimensional Spaces with Guaranteed Delivery and Low Stretch Simon S. Lam, Fellow, IEEE, and Chen Qian, Student Member, IEEE Abstract
More informationA Reliable Broadcast Algorithm with Selected Acknowledgements in Mobile Ad Hoc Networks
A Reliable Broadcast Algorithm with Selected Acknowledgements in Mobile Ad Hoc Networks Wei Lou and Jie Wu Department of Computer Science and Engineering Florida Atlantic University Boca Raton, FL 3343
More informationEnergy-Efficient Forwarding Strategies for Geographic Routing in Lossy Wireless Sensor Networks
Energy-Efficient Forwarding Strategies for Geographic Routing in Lossy Wireless Sensor Networks K. Seada, M.Zuniga, A. Helmy and B. Krishnamachari Department of Electrical Engineering University of Southern
More information