Draft Notes 1 : Scaling in Ad hoc Routing Protocols
|
|
- Cecil Young
- 5 years ago
- Views:
Transcription
1 Draft Notes 1 : Scaling in Ad hoc Routing Protocols Timothy X Brown University of Colorado April 2, Introduction What is the best network wireless network routing protocol? This question is a function of what routing protocols do. The three basic functions of any routing protocol are: 1. Topology Discovery: What is connected to what in the network? 2. Route Choice: Given what we know about the network topology, what route do we choose? 3. Route Maintenance: How do we discover when a route is no longer good and what do we do to choose or discover a new route? 3 Flooding As a simple example, consider flooding. In flooding a source broadcasts a data packet along with a unique identifier (UID). This UID is used by every receiver to check if it has already heard this packet before or not. If not the receiver broadcasts the packet. In this way the data packet is eventually transmitted by every node in the network, except the receiver. How might we get a UID? The UID might be the source address and a distinct number assigned by that source. Flooding is simple in that it implicitly discovers the network topology, forming a tree of transmissions starting at the source and branching out to the other nodes in the network. It is robust since the message is repeated by many nodes in the network and thus a lost reception may not be significant if the receiver gets the packet from other nodes in the broadcast. The route choice is also implicit in that the packet follows all paths along the flooding tree. Route maintenance is also robust in the sense that it uses whatever connectivity exists at the time of the flood and assumes nothing based on prior floods. Flooding is a simple and robust protocol and so is a baseline against which to compare other protocols. How do we compare with other protocols? There might be several metrics related to packet delay, packet delivery ratio, and routing overhead. Delay might measure how much excess time it takes to deliver the data packet compared to the minimum time assuming the routing follows the shortest path. Packet delivery ratio is the ratio of packets 1
2 successfully delivered to the destination compared to the number of offered packets. Routing overhead might count the average number of packets sent in the network per packet successfully delivered. How does flooding hold up to these metrics? Flooding tends to follow shortest hop paths and so has excess delay close to zero. Since flooding sends packets via broadcast, there are no ACKs and a flood in a sparse network may fail to reach some areas of the network. Analyzing the packet delivery ratio is complex and in well connected networks with modest traffic is close to 1 so we will not consider it further here. Flooding s routing overhead depends on the number of nodes in the network. If there are n nodes in the network, each delivered packet will require n 1 packet transmissions (every node except the destination). 4 Scaling and Order notation: O( ), o( ), and Ω( ). We will be comparing several different classes of protocols. For a class of protocols the exact behavior may vary depending on implementation details. However, our concern is often to understand how the protocol scales, i.e. how a performance metric varies as the network somehow grows. Typical growth might be in terms of number of nodes, n, or total data traffic sent, D. Scaling is important because most protocols work well when the network is small and what we want to know is what becomes important or limiting as the network becomes large. As a network grows many factors may be in play, but a few will dominate and it is understanding how these dominating factors compare that is important. We might say that an algorithm is linear or logarithmic. The first we want to indicate that a doubling of the size might double the overhead. The second indicates that a doubling of the size might increase the overhead by a constant factor (log(2n) = log(n) + log(2)). Consider the case of flooding. The overhead is H(n) = n 1 packets per packet delivered. If we let n new = 2n then the new overhead is H(n new ) = 2n 1. This isn t an exact doubling since H(n new )/H(n) 2. Nevertheless, our intuition tells us that the 1 becomes insignificant as n becomes large and doubling n essentially doubles the overhead. To capture notion this we can write: H(n) = O(n) where the O(n) indicates that the overhead is growing essentially linear in n. Technically, H(n) = O(g(n))) implies H(n) ag(n) + b for some positive constants a and b. Thus H(n) = O(n) says that H(n) is upper bounded by a linear function, an + b. In other words we would say that the overhead grows no worse than a linear function. What if we say that H (n) = O(log n)? This implies that H (n) a log n + b. What is the base of the logarithm? Is it base 2 as in bits, or base 10 as in decibels, or natural logarithms? Can see that it does not matter? No matter what base, every log differs only by a constant factor. This constant factor only changes the a and b constants by the same factor. Since a and b are not explicitly defined, the base of the log is irrelevant. What can we say about H (n) = O(log n) versus H(n) = O(n)? We would know that for large enough n, H (n) < H(n) since for large enough n, log n n and a log(n) + b < an + b 2
3 for any set of positive a, a, b, and b. We would say that H (n) scales better than H(n). The key observation about order notation is that it allows us to compare the behavior of different algorithms or protocols without bogging down in the details of the exact implementation. It also allows us to highlight when differences are superficial (i.e. they have the same order) or fundamental. So you would never say that H(n) = O(7n + n). Although technically valid, it is customary to throw out everything that is captured by the factors a and b. Clearly, the 7 is not relevant since it is a constant factor. The square root is not relevant either since for large n, n n and could be captured by increasing a or b. 4.1 Order notation arithmetic If we do one algorithm followed by another then we add the two order notations. For example two O(log n) algorithms yields an O(log n) + O(log n) = O(2 log n) = O(log n) algorithm. As another example an O(n) algorithm followed by an O( n) algorithm yields an O(n) + O( n) = O(n + n) = O(n) If we repeat an O(n) algorithm a bounded number of times (e.g. at most B times)? Then it is O(Bn) = O(n). What if we repeat it n times? This factor of n can not be ignored. In this case, the complexity is O(n n). Thus, we get the rule that running a bounded number of algorithms has the order notation of the fastest growing algorithm. Running an algorithm an unbounded number of times generally increases the rate of growth. Finally, we note some pitfalls. First, though we say that two algorithms with the same order are superficially the same, they may differ by huge constants. An algorithm may be 2 times, 10 times, or 1,000 times worse but as long as they both have the same order such constants are lost. Second, though we say that one algorithm scales better than another again these are asymptotic results for when n is large. For some cases n may need to be really large to make a difference. For instance, H(n) = n = O(n) and H (n) = 10 6 log 2 n = O(log n). Though H (n) scales better, H(n) has lower overhead for all n < Only when n is larger than this does the better scaling become apparent. Third, some surprising statements can be made because O() is just a bound. For instance if H(n) = O(log n) then H(n) = O(n). Why? Because if H(n) a log n + b then there exists constants so that H(n) a n + b. How would we characterize the excess delay for flooding? Here we would say that D(n) = O(1). This is an alternative way of saying that the excess delay is bounded no matter how big the network. Why is this true? As the message propagates in the flood, it naturally will follow the shortest path to the destination Finally, we note that there are other order notations such as o(n) which serves as a lower bound and Ω(n) which serves as both an upper and lower bound. We will not define these here. 3
4 5 Ad hoc Routing Protocols We had discussed two classes ad hoc routing protocols in class, proactive and reactive protocols. Armed with our order notation we can say something about each of these classes without analyzing any specific protocol. 5.1 Reactive Protocols In a reactive protocol, the first packet that a source has to send to a destination requires a route discovery. If we assume that this discovery is a flooding mechanism, followed by a bounded number of responses from the destination then the discovery will require at most O(n) + O(Bn) = O(n). The first O(n) is the cost of the flood as computed above. The O(Bn) represents the bounded number of responses. In the worst case the network is a long chain of n nodes and the response has to traverse from one side of the chain to the other. In a more realistic topology, the response might go through only a few nodes but that is not relevant here since as we show here even the worst case assumption does not change the order for the route discovery. Now consider the forwarding of packets. Let us suppose that the route to forward a packet is typically O(R(n)) hops. Then the complexity to forward a single packet from one source to one destination is O(n) + O(R(n)) = O(n). This follows because in the worst case, the route will pass through O(n) hops as described in flooding. So, we see that reactive protocols are no better than flooding if we must discover a new route for each packet. Clearly, reactive protocols only improve over flooding if we can send many packets before we need to perform a route discovery. If the network is static, then a single discovery can be shared by all subsequent packets sent to the same destination. If we ultimately send S packets to the same destination then the cost of the initial flood can be amortized across the S packets sent. In this case, the cost to send S packets is: and the cost per packet is O(n) + O(SR(n)) O(n/S) + O(R(n)). Clearly if S grows with n and R(n) is sublinear then we can do better with reactive protocols than with flooding. For example, assume that a network is compact and roughly a square grid with n rows of n nodes. 1 In this case R(n) = n. Further, assume the network is very stable so that the first term can be ignored. In this case, the overhead of the reactive protocol is O( n) packets per packet delivered. 1 Embedded in this claim is the assumption that the area covered by the network is growing proportional to the number of nodes; a four times increase in nodes results in a 2 times increase in the width and height of the area covered. This implies that the expected number of hops between two random nodes grows as the square root of the number of nodes if the range of every node is bounded. This discussion emphasizes the importance of spelling out your assumptions. Other assumptions could have been made with different results. 4
5 5.2 Proactive Protocols Consider a simple distance vector protocol that sends periodic table announcements to its neighbors. Here the announcements are sent as broadcasts. Let S be the number of packets sent between each broadcasts by some node in the network. If as before, R(n) is the scaling of the expected route length then in one period we have n announcements sent (every node sends an announce ment) and we send S packets to their destination. Thus, the cost to send S packets is and the cost per packet is O(n) + O(SR(n)) O(n/S) + O(R(n)); exactly the same as for the reactive protocols. Another proactive protocol is a link-state protocol. We can ignore the initial topology dissemination. Why? Because this is done once and is amortized across all subsequent packets that are sent. Once every node has the topology, link changes are announced by the nodes on each side of the termination flooding out the change. So, again, if S packets are sent out between each change and each change yields an O(n) flood, then we get the exact same result as before. 5.3 Link Stability, S Now we should investigate the stability factor in more detail. A simple model has each link stable for a random time with some average time t. Now if we consider k links, then the average time before any one breaks is t = O( 1 ). Now if there are f flows being sent from k k some source to some destination, and each flow has the same expected rate, r, then the total rate is fr = O(f). Finally, if f flows are sending data for the period that k links are stable we see that the number of packets that are sent while all the links are stable is S = O( f ). k The values of f and k differ for each of the three examples that we have studied. In the case of the simple reactive protocol, f = 1 since we are considering only one route and k = O(R(n)) since the route can be used for as long as all the links on the route are stable. Thus, S = O( 1 ). R(n) With the proactive distance vector protocol we can assume that the number of flows is proportional to the number of nodes, f n. A lower bound on the period in which neighbor updates are sent is that they are sent at least as often as links break in the network. If node density is fixed, then with increasing n the number of neighbors stays constant and the number of links k n. Thus S = O(1). The same argument applies to the proactive link state protocol so that S = O(1). Note that S is a constant or decreases with n. This implies that n/s grows faster than linear. Since R(n) is at worst linear we can write O(R(n)) = O(n). But this term can be ignored compared to O(S/n). Combining these results yields the following table: 5
6 Protocol S cost per packet Reactive O( 1 R(n) O(nR(n)) Distance Vector O(1) O(n) Link State O(1) O(n) Flooding N/A O(n) From the table we see that none of the protocols scales better then flooding if the network is dynamic. In order to scale, it is clear that something more than the simple versions of these protocols described here are required. Most protocols use various techniques that do make them very efficient, but in the limit they scale no better than flooding. For this reason the protocols often specify a maximum size for which they are designed. 6
CS/ENGRD 2110 Object-Oriented Programming and Data Structures Spring 2012 Thorsten Joachims. Lecture 10: Asymptotic Complexity and
CS/ENGRD 2110 Object-Oriented Programming and Data Structures Spring 2012 Thorsten Joachims Lecture 10: Asymptotic Complexity and What Makes a Good Algorithm? Suppose you have two possible algorithms or
More informationDelay Tolerant Networks
Delay Tolerant Networks DEPARTMENT OF INFORMATICS & TELECOMMUNICATIONS NATIONAL AND KAPODISTRIAN UNIVERSITY OF ATHENS What is different? S A wireless network that is very sparse and partitioned disconnected
More information3. Evaluation of Selected Tree and Mesh based Routing Protocols
33 3. Evaluation of Selected Tree and Mesh based Routing Protocols 3.1 Introduction Construction of best possible multicast trees and maintaining the group connections in sequence is challenging even in
More informationAlgorithms and Data Structures
Algorithms and Data Structures Spring 2019 Alexis Maciel Department of Computer Science Clarkson University Copyright c 2019 Alexis Maciel ii Contents 1 Analysis of Algorithms 1 1.1 Introduction.................................
More informationGeographical routing 1
Geographical routing 1 Routing in ad hoc networks Obtain route information between pairs of nodes wishing to communicate. Proactive protocols: maintain routing tables at each node that is updated as changes
More informationRouting in Variable Topology Networks
Routing in Variable Topology Networks Dr. Alhussein Abouzeid Electrical, Computer and Systems Engineering (ECSE) Rensselaer Polytechnic Institute Variable Topology Networks P2P networks for distributed
More informationAlgorithm Analysis. (Algorithm Analysis ) Data Structures and Programming Spring / 48
Algorithm Analysis (Algorithm Analysis ) Data Structures and Programming Spring 2018 1 / 48 What is an Algorithm? An algorithm is a clearly specified set of instructions to be followed to solve a problem
More informationRouting Protocols in MANETs
Chapter 4 Routing Protocols in MANETs 4.1 Introduction The main aim of any Ad Hoc network routing protocol is to meet the challenges of the dynamically changing topology and establish a correct and an
More informationA COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET
ISSN: 2278 1323 All Rights Reserved 2016 IJARCET 296 A COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET Dr. R. Shanmugavadivu 1, B. Chitra 2 1 Assistant Professor, Department of Computer
More informationFairness Example: high priority for nearby stations Optimality Efficiency overhead
Routing Requirements: Correctness Simplicity Robustness Under localized failures and overloads Stability React too slow or too fast Fairness Example: high priority for nearby stations Optimality Efficiency
More informationThe Performance of MANET Routing Protocols for Scalable Video Communication
Communications and Network, 23, 5, 9-25 http://dx.doi.org/.4236/cn.23.522 Published Online May 23 (http://www.scirp.org/journal/cn) The Performance of MANET Routing Protocols for Scalable Video Communication
More informationDSDV: Proactive. Distance Vector (Basic idea) Distance Vector. Distance Vector Algorithm: Tables 12/13/2016
estination Sequenced istance Vector (SV) Routing [Perkins94] SV: Proactive SV is a proactive protocol means it maintains up-to-date routing information for all available nodes in the network. No extra
More informationUnicast Routing in Mobile Ad Hoc Networks. Dr. Ashikur Rahman CSE 6811: Wireless Ad hoc Networks
Unicast Routing in Mobile Ad Hoc Networks 1 Routing problem 2 Responsibility of a routing protocol Determining an optimal way to find optimal routes Determining a feasible path to a destination based on
More informationEfficient Broadcasting in Ad Hoc Wireless Networks Using Directional Antennas
Efficient Broadcasting in Ad Hoc Wireless Networks Using Directional Antennas Fei Dai Department of Electrical and Computer Engineering North Dakota State University Fargo, ND 5805 Email: fdai@ece.ndsu.edu
More informationChapter 8 DOMINATING SETS
Chapter 8 DOMINATING SETS Distributed Computing Group Mobile Computing Summer 2004 Overview Motivation Dominating Set Connected Dominating Set The Greedy Algorithm The Tree Growing Algorithm The Marking
More informationRouting protocols in WSN
Routing protocols in WSN 1.1 WSN Routing Scheme Data collected by sensor nodes in a WSN is typically propagated toward a base station (gateway) that links the WSN with other networks where the data can
More informationChapter 6 DOMINATING SETS
Chapter 6 DOMINATING SETS Distributed Computing Group Mobile Computing Summer 2003 Overview Motivation Dominating Set Connected Dominating Set The Greedy Algorithm The Tree Growing Algorithm The Marking
More informationImplementation and simulation of OLSR protocol with QoS in Ad Hoc Networks
Implementation and simulation of OLSR protocol with QoS in Ad Hoc Networks Mounir FRIKHA, Manel MAAMER Higher School of Communication of Tunis (SUP COM), Network Department, m.frikha@supcom.rnu.tn ABSTRACT
More informationChapter 8 DOMINATING SETS
Distributed Computing Group Chapter 8 DOMINATING SETS Mobile Computing Summer 2004 Overview Motivation Dominating Set Connected Dominating Set The Greedy Algorithm The Tree Growing Algorithm The Marking
More informationMergeSort, Recurrences, Asymptotic Analysis Scribe: Michael P. Kim Date: April 1, 2015
CS161, Lecture 2 MergeSort, Recurrences, Asymptotic Analysis Scribe: Michael P. Kim Date: April 1, 2015 1 Introduction Today, we will introduce a fundamental algorithm design paradigm, Divide-And-Conquer,
More informationLecture 6: Vehicular Computing and Networking. Cristian Borcea Department of Computer Science NJIT
Lecture 6: Vehicular Computing and Networking Cristian Borcea Department of Computer Science NJIT GPS & navigation system On-Board Diagnostic (OBD) systems DVD player Satellite communication 2 Internet
More informationDestination Sequenced Distance. [Perkins94] CSE 6811 : Lecture 6
estination Sequenced istance Vector (SV) Routing [Perkins94] SE 6811 : Lecture 6 SV: Proactive SV is a proactive protocol means it maintains up to date routing information for all available nodes in the
More informationOn-Demand Routing in Wireless Ad-Hoc Networks with Wide Levels of Network Density
On-Demand Routing in Wireless Ad-Hoc Networks with Wide Levels of Network Density Presented by Wei-Cheng Xiao Advisor: David B. Johnson 2015/03/30 Wireless Network Infrastructure Mode Internet access point
More informationComparison of proposed path selection protocols for IEEE s WLAN mesh networks
Comparison of proposed path selection protocols for IEEE 802.11s WLAN mesh networks Sana Ghannay, Sonia Mettali Gammar and Farouk Kamoun CRISTAL lab, National School of Computer Sciences, ENSI, 2010, Manouba
More informationMulti-Tier Mobile Ad Hoc Routing
Multi-Tier Mobile Ad Hoc Routing Bo Ryu Tim Andersen Tamer Elbatt Network Analysis and Systems Dept. HRL Laboratories, LLC. Malibu, CA, USA. {ryu,cellotim,telbatt}@wins.hrl.com Abstract We present a new
More informationPerformance Comparison of MANETs Routing Protocols for Dense and Sparse Topology
2012 International Conference on Information and Computer Networks (ICICN 2012) IPCSIT vol. 27 (2012) (2012) IACSIT Press, Singapore Performance Comparison of MANETs Routing Protocols for Dense and Sparse
More informationPerformance Analysis and Enhancement of Routing Protocol in Manet
Vol.2, Issue.2, Mar-Apr 2012 pp-323-328 ISSN: 2249-6645 Performance Analysis and Enhancement of Routing Protocol in Manet Jaya Jacob*, V.Seethalakshmi** *II MECS, Sri Shakthi Institute of Engineering and
More informationPresenting a multicast routing protocol for enhanced efficiency in mobile ad-hoc networks
Presenting a multicast routing protocol for enhanced efficiency in mobile ad-hoc networks Mehdi Jalili, Islamic Azad University, Shabestar Branch, Shabestar, Iran mehdijalili2000@gmail.com Mohammad Ali
More informationAlgorithm Analysis. College of Computing & Information Technology King Abdulaziz University. CPCS-204 Data Structures I
Algorithm Analysis College of Computing & Information Technology King Abdulaziz University CPCS-204 Data Structures I Order Analysis Judging the Efficiency/Speed of an Algorithm Thus far, we ve looked
More informationAN ADAPTIVE GATEWAY DISCOVERY IN HYBRID MANETS
AN ADAPTIVE GATEWAY DISCOVERY IN HYBRID MANETS F. D. Trujillo, A. Triviño, E. Casilari and A. Díaz-Estrella Department of Electronic Technology University of Malaga A. J. Yuste Department of Telecommunication
More informationIN a mobile ad hoc network, nodes move arbitrarily.
IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 5, NO. 6, JUNE 2006 609 Distributed Cache Updating for the Dynamic Source Routing Protocol Xin Yu Abstract On-demand routing protocols use route caches to make
More informationEfficient Broadcasting in Ad Hoc Wireless Networks Using Directional Antennas
Efficient Broadcasting in Ad Hoc Wireless Networks Using Directional Antennas Fei Dai and Jie Wu Department of Computer Science and Engineering Florida Atlantic University Boca Raton, FL 3343 Abstract
More informationWe will show that the height of a RB tree on n vertices is approximately 2*log n. In class I presented a simple structural proof of this claim:
We have seen that the insert operation on a RB takes an amount of time proportional to the number of the levels of the tree (since the additional operations required to do any rebalancing require constant
More informationCOMP 161 Lecture Notes 16 Analyzing Search and Sort
COMP 161 Lecture Notes 16 Analyzing Search and Sort In these notes we analyze search and sort. Counting Operations When we analyze the complexity of procedures we re determine the order of the number of
More informationRecitation 9. Prelim Review
Recitation 9 Prelim Review 1 Heaps 2 Review: Binary heap min heap 1 2 99 4 3 PriorityQueue Maintains max or min of collection (no duplicates) Follows heap order invariant at every level Always balanced!
More informationPerformance Comparison of Scalable Location Services for Geographic Ad Hoc Routing
Performance Comparison of Scalable Location Services for Geographic Ad Hoc Routing Saumitra M. Das, Himabindu Pucha and Y. Charlie Hu School of Electrical and Computer Engineering Purdue University West
More informationWireless Internet Routing. Learning from Deployments Link Metrics
Wireless Internet Routing Learning from Deployments Link Metrics 1 Learning From Deployments Early worked focused traditional routing issues o Control plane: topology management, neighbor discovery o Data
More informationPROGRAM EFFICIENCY & COMPLEXITY ANALYSIS
Lecture 03-04 PROGRAM EFFICIENCY & COMPLEXITY ANALYSIS By: Dr. Zahoor Jan 1 ALGORITHM DEFINITION A finite set of statements that guarantees an optimal solution in finite interval of time 2 GOOD ALGORITHMS?
More informationExpected Path Bandwidth Based Efficient Routing Mechanism in Wireless Mesh Network
Expected Path Bandwidth Based Efficient Routing Mechanism in Wireless Mesh Network K Anandkumar, D.Vijendra Babu PG Student, Chennai, India Head, Chennai, India ABSTRACT : Wireless mesh networks (WMNs)
More informationRouting Outline. EECS 122, Lecture 15
Fall & Walrand Lecture 5 Outline EECS, Lecture 5 Kevin Fall kfall@cs.berkeley.edu Jean Walrand wlr@eecs.berkeley.edu Definition/Key Questions Distance Vector Link State Comparison Variations EECS - Fall
More informationAnalysis of Link Reversal Routing Algorithms for Mobile Ad Hoc Networks
Analysis of Link Reversal Routing Algorithms for Mobile Ad Hoc Networks Seminar of Distributed Computing WS 04/05 ETH Zurich, 1.2.2005 Nicolas Born nborn@student.ethz.ch Paper Analysis of Link Reversal
More informationRouting in a network
Routing in a network Focus is small to medium size networks, not yet the Internet Overview Then Distance vector algorithm (RIP) Link state algorithm (OSPF) Talk about routing more generally E.g., cost
More informationA Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols. Broch et al Presented by Brian Card
A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols Broch et al Presented by Brian Card 1 Outline Introduction NS enhancements Protocols: DSDV TORA DRS AODV Evaluation Conclusions
More informationCS 6402 DESIGN AND ANALYSIS OF ALGORITHMS QUESTION BANK
CS 6402 DESIGN AND ANALYSIS OF ALGORITHMS QUESTION BANK Page 1 UNIT I INTRODUCTION 2 marks 1. Why is the need of studying algorithms? From a practical standpoint, a standard set of algorithms from different
More information(Refer Slide Time: 1:27)
Data Structures and Algorithms Dr. Naveen Garg Department of Computer Science and Engineering Indian Institute of Technology, Delhi Lecture 1 Introduction to Data Structures and Algorithms Welcome to data
More informationExpanding Ring Search for Route Discovery in LOADng Routing Protocol
Expanding Ring Search for Route Discovery in LOADng Routing Protocol Antonin Bas, Jiazi Yi, Thomas Clausen Laboratoire d Informatique (LIX) Ecole Polytechnique, France) antonin@antonin-bas.fr, jiazi@jiaziyi.com,
More informationUsing Hybrid Algorithm in Wireless Ad-Hoc Networks: Reducing the Number of Transmissions
Using Hybrid Algorithm in Wireless Ad-Hoc Networks: Reducing the Number of Transmissions R.Thamaraiselvan 1, S.Gopikrishnan 2, V.Pavithra Devi 3 PG Student, Computer Science & Engineering, Paavai College
More informationRouting Protocols in MANET: Comparative Study
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 7, July 2014, pg.119
More informationEvaluation of Routing Protocols for Mobile Ad hoc Networks
International Journal of Soft Computing and Engineering (IJSCE) Evaluation of Routing Protocols for Mobile Ad hoc Networks Abstract Mobile Ad hoc network is a self-configuring infrastructure less network
More informationContent. 1. Introduction. 2. The Ad-hoc On-Demand Distance Vector Algorithm. 3. Simulation and Results. 4. Future Work. 5.
Rahem Abri Content 1. Introduction 2. The Ad-hoc On-Demand Distance Vector Algorithm Path Discovery Reverse Path Setup Forward Path Setup Route Table Management Path Management Local Connectivity Management
More informationAODV-PA: AODV with Path Accumulation
-PA: with Path Accumulation Sumit Gwalani Elizabeth M. Belding-Royer Department of Computer Science University of California, Santa Barbara fsumitg, ebeldingg@cs.ucsb.edu Charles E. Perkins Communications
More informationA Routing Protocol for Utilizing Multiple Channels in Multi-Hop Wireless Networks with a Single Transceiver
1 A Routing Protocol for Utilizing Multiple Channels in Multi-Hop Wireless Networks with a Single Transceiver Jungmin So Dept. of Computer Science, and Coordinated Science Laboratory University of Illinois
More informationCS 229 Final Report: Location Based Adaptive Routing Protocol(LBAR) using Reinforcement Learning
CS 229 Final Report: Location Based Adaptive Routing Protocol(LBAR) using Reinforcement Learning By: Eunjoon Cho and Kevin Wong Abstract In this paper we present an algorithm for a location based adaptive
More information6. Node Disjoint Split Multipath Protocol for Unified. Multicasting through Announcements (NDSM-PUMA)
103 6. Node Disjoint Split Multipath Protocol for Unified Multicasting through Announcements (NDSM-PUMA) 6.1 Introduction It has been demonstrated in chapter 3 that the performance evaluation of the PUMA
More informationAd hoc and Sensor Networks Topology control
Ad hoc and Sensor Networks Topology control Goals of this chapter Networks can be too dense too many nodes in close (radio) vicinity This chapter looks at methods to deal with such networks by Reducing/controlling
More informationCommunication Networks I December 4, 2001 Agenda Graph theory notation Trees Shortest path algorithms Distributed, asynchronous algorithms Page 1
Communication Networks I December, Agenda Graph theory notation Trees Shortest path algorithms Distributed, asynchronous algorithms Page Communication Networks I December, Notation G = (V,E) denotes a
More informationSome Ad Hoc Network Characteristics Effects on the Performance of On-Demand Routing Protocols
Inf. Sci. Lett. 2, No. 2, 69-75 (2013) 69 Information Sciences Letters An International Journal http://dx.doi.org/10.12785/isl/020204 Some Ad Hoc Network Characteristics Effects on the Performance On-Demand
More informationCSE 461: Bridging LANs. Last Topic
CSE 461: Bridging LANs Last Topic Medium Access Control (MAC) protocols Part of the Link Layer At the heart of Local Area Networks (LANs) How do multiple parties share a wire or the air? Random access
More informationLecture 13: Routing in multihop wireless networks. Mythili Vutukuru CS 653 Spring 2014 March 3, Monday
Lecture 13: Routing in multihop wireless networks Mythili Vutukuru CS 653 Spring 2014 March 3, Monday Routing in multihop networks Figure out a path from source to destination. Basic techniques of routing
More informationCSE 461 Routing. Routing. Focus: Distance-vector and link-state Shortest path routing Key properties of schemes
CSE 46 Routing Routing Focus: How to find and set up paths through a network Distance-vector and link-state Shortest path routing Key properties of schemes Application Transport Network Link Physical Forwarding
More informationComputer Networks. Routing
Computer Networks Routing Topics Link State Routing (Continued) Hierarchical Routing Broadcast Routing Sending distinct packets Flooding Multi-destination routing Using spanning tree Reverse path forwarding
More informationWhat is Multicasting? Multicasting Fundamentals. Unicast Transmission. Agenda. L70 - Multicasting Fundamentals. L70 - Multicasting Fundamentals
What is Multicasting? Multicasting Fundamentals Unicast transmission transmitting a packet to one receiver point-to-point transmission used by most applications today Multicast transmission transmitting
More informationINVESTIGATING THE SCALABILITY OF THE FISH-EYE STATE ROUTING PROTOCOL FOR AD HOC NETWORKS
INVESTIGATING THE SCALABILITY OF THE FISH-EYE STATE ROUTING PROTOCOL FOR AD HOC NETWORKS 1 NATARAJAN MEGHANATHAN, 2 AYOMIDE ODUNSI 1 Asstt Prof., Department of Computer Science, Jackson State University,
More informationChapter 7 TOPOLOGY CONTROL
Chapter 7 TOPOLOGY CONTROL Distributed Computing Group Mobile Computing Winter 2005 / 2006 Overview Topology Control Gabriel Graph et al. XTC Interference SINR & Scheduling Complexity Distributed Computing
More informationGeo-Routing. Chapter 2. Ad Hoc and Sensor Networks Roger Wattenhofer
Geo-Routing Chapter 2 Ad Hoc and Sensor Networks Roger Wattenhofer 2/1 Application of the Week: Mesh Networking (Roofnet) Sharing Internet access Cheaper for everybody Several gateways fault-tolerance
More information10/5/2016. Comparing Algorithms. Analyzing Code ( worst case ) Example. Analyzing Code. Binary Search. Linear Search
10/5/2016 CSE373: Data Structures and Algorithms Asymptotic Analysis (Big O,, and ) Steve Tanimoto Autumn 2016 This lecture material represents the work of multiple instructors at the University of Washington.
More informationLecture (08, 09) Routing in Switched Networks
Agenda Lecture (08, 09) Routing in Switched Networks Dr. Ahmed ElShafee Routing protocols Fixed Flooding Random Adaptive ARPANET Routing Strategies ١ Dr. Ahmed ElShafee, ACU Fall 2011, Networks I ٢ Dr.
More informationQoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET
2011 International Conference on Information and Network Technology IPCSIT vol.4 (2011) (2011) IACSIT Press, Singapore QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET Ashwini V. Biradar
More informationCSE 421: Introduction to Algorithms Complexity
CSE 421: Introduction to Algorithms Complexity Yin-Tat Lee 1 Defining Efficiency Runs fast on typical real problem instances Pros: Sensible, Bottom-line oriented Cons: Moving target (diff computers, programming
More informationasymptotic growth rate or order compare two functions, but ignore constant factors, small inputs
Big-Oh 1 asymptotic growth rate or order 2 compare two functions, but ignore constant factors, small inputs asymptotic growth rate or order 2 compare two functions, but ignore constant factors, small inputs
More informationChapter 7 CONCLUSION
97 Chapter 7 CONCLUSION 7.1. Introduction A Mobile Ad-hoc Network (MANET) could be considered as network of mobile nodes which communicate with each other without any fixed infrastructure. The nodes in
More informationCS5984 Mobile Computing
CS5984 Mobile Computing Dr. Ayman Abdel-Hamid Computer Science Department Virginia Tech Part II 1 Outline Routing Protocols for Ad hoc Networks DSDV: Highly Dynamic Destination-Sequenced Distance- Vector
More informationData Communication. Guaranteed Delivery Based on Memorization
Data Communication Guaranteed Delivery Based on Memorization Motivation Many greedy routing schemes perform well in dense networks Greedy routing has a small communication overhead Desirable to run Greedy
More informationImpact of Node Velocity and Density on Probabilistic Flooding and its Effectiveness in MANET
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 12, December 2014,
More informationInformation Brokerage
Information Brokerage Sensing Networking Leonidas Guibas Stanford University Computation CS321 Information Brokerage Services in Dynamic Environments Information Brokerage Information providers (sources,
More informationSLALoM: A Scalable Location Management Scheme for Large Mobile Ad-hoc Networks
SLALoM A Scalable Location Management Scheme for Large Mobile Ad-hoc Networks Christine T. Cheng *, Howard L. Lemberg, Sumesh J. Philip, Eric van den Berg and Tao Zhang * Institute for Math & its Applications,
More informationChapter 8 LOCATION SERVICES
Chapter 8 LOCATION SERVICES Distributed Computing Group Mobile Computing Winter 2005 / 2006 Overview Mobile IP Motivation Data transfer Encapsulation Location Services & Routing Classification of location
More informationChapter 12. Routing and Routing Protocols 12-1
Chapter 12 Routing and Routing Protocols 12-1 Routing in Circuit Switched Network Many connections will need paths through more than one switch Need to find a route Efficiency Resilience Public telephone
More informationPerformance Evaluation of Various Routing Protocols in MANET
208 Performance Evaluation of Various Routing Protocols in MANET Jaya Jacob 1,V.Seethalakshmi 2 1 II MECS,Sri Shakthi Institute of Science and Technology, Coimbatore, India 2 Associate Professor-ECE, Sri
More informationASYMPTOTIC COMPLEXITY
Simplicity is a great virtue but it requires hard work to achieve it and education to appreciate it. And to make matters worse: complexity sells better. - Edsger Dijkstra ASYMPTOTIC COMPLEXITY Lecture
More informationPERFORMANCE COMPARISON OF LINK, NODE AND ZONE DISJOINT MULTI-PATH ROUTING STRATEGIES AND MINIMUM HOP SINGLE PATH ROUTING FOR MOBILE AD HOC NETWORKS
PERFORMANCE COMPARISON OF LINK, NODE AND ZONE DISJOINT MULTI-PATH ROUTING STRATEGIES AND MINIMUM HOP SINGLE PATH ROUTING FOR MOBILE AD HOC NETWORKS Natarajan Meghanathan Jackson State University, 1400
More informationReliability Benefit of Network Coding
Reliability Benefit of Majid Ghaderi, Don Towsley and Jim Kurose Department of Computer Science University of Massachusetts Amherst {mghaderi,towsley,kurose}@cs.umass.edu Abstract The capacity benefit
More informationMobility and Density Aware AODV Protocol Extension for Mobile Adhoc Networks-MADA-AODV
Journal of Computer Science 8 (1): 13-17, 2012 ISSN 1549-3636 2011 Science Publications Mobility and Density Aware AODV Protocol Extension for Mobile Adhoc Networks-MADA-AODV 1 S. Deepa and 2 G.M. Kadhar
More informationUCS-805 MOBILE COMPUTING Jan-May,2011 TOPIC 8. ALAK ROY. Assistant Professor Dept. of CSE NIT Agartala.
Mobile Ad Hoc Networks: Routing TOPIC 8 UCS-805 MOBILE COMPUTING Jan-May,2011 ALAK ROY. Assistant Professor Dept. of CSE NIT Agartala Email-alakroy.nerist@gmail.com Mobile Ad Hoc Networks (MANET) Introduction
More informationA B C D E Total / 24 / 23 / 12 / 18 / 3 / 80
Carnegie Mellon Computer Science Department. 15-441 Spring 2010 Midterm Name: Andrew ID: INSTRUCTIONS: There are 10 pages (numbered at the bottom). Make sure you have all of them. Please write your name
More informationRouting. Information Networks p.1/35
Routing Routing is done by the network layer protocol to guide packets through the communication subnet to their destinations The time when routing decisions are made depends on whether we are using virtual
More informationKapitel 5: Mobile Ad Hoc Networks. Characteristics. Applications of Ad Hoc Networks. Wireless Communication. Wireless communication networks types
Kapitel 5: Mobile Ad Hoc Networks Mobilkommunikation 2 WS 08/09 Wireless Communication Wireless communication networks types Infrastructure-based networks Infrastructureless networks Ad hoc networks Prof.
More informationLoad Balanced Link Reversal Routing in Mobile Wireless Ad Hoc Networks
Load Balanced Link Reversal Routing in Mobile Wireless Ad Hoc Networks Nabhendra Bisnik, Alhussein Abouzeid ECSE Department RPI Costas Busch CSCI Department RPI Mobile Wireless Networks Wireless nodes
More informationIntroduction to Communication Networks Spring Unit 13 Network extensions Bridges.
Introduction to Communication Networks Spring 2007 Unit 13 Network extensions Bridges. Acknowledgements slides coming from: The book by Peterson/Davie The book by Wiliam Stallings Slides from lectures
More informationNetwork Routing - II Failures, Recovery, and Change
MIT 6.02 DRAFT Lecture Notes Spring 2009 (Last update: April 27, 2009) Comments, questions or bug reports? Please contact Hari Balakrishnan (hari@mit.edu) or 6.02-staff@mit.edu LECTURE 21 Network Routing
More informationUnit 1 Chapter 4 ITERATIVE ALGORITHM DESIGN ISSUES
DESIGN AND ANALYSIS OF ALGORITHMS Unit 1 Chapter 4 ITERATIVE ALGORITHM DESIGN ISSUES http://milanvachhani.blogspot.in USE OF LOOPS As we break down algorithm into sub-algorithms, sooner or later we shall
More informationInvestigation on the fisheye state algorithm in context with QoS routing. Author: Yi Zhou. Prof: Raimo Kantola Instructor: Dr.
Investigation on the fisheye state algorithm in context with QoS routing Author: Yi Zhou Prof: Raimo Kantola Instructor: Dr. Peng Zhang 1 Table of Contents 1. Overview of routing algorithms 2. Fisheye
More information[ 11.2, 11.3, 11.4] Analysis of Algorithms. Complexity of Algorithms. 400 lecture note # Overview
400 lecture note #0 [.2,.3,.4] Analysis of Algorithms Complexity of Algorithms 0. Overview The complexity of an algorithm refers to the amount of time and/or space it requires to execute. The analysis
More informationWireless Mesh Networks
Wireless Mesh Networks COS 463: Wireless Networks Lecture 6 Kyle Jamieson [Parts adapted from I. F. Akyildiz, B. Karp] Wireless Mesh Networks Describes wireless networks in which each node can communicate
More informationThroughout this course, we use the terms vertex and node interchangeably.
Chapter Vertex Coloring. Introduction Vertex coloring is an infamous graph theory problem. It is also a useful toy example to see the style of this course already in the first lecture. Vertex coloring
More informationPerformance Evaluation of AODV and DSDV Routing Protocol in wireless sensor network Environment
2012 International Conference on Computer Networks and Communication Systems (CNCS 2012) IPCSIT vol.35(2012) (2012) IACSIT Press, Singapore Performance Evaluation of AODV and DSDV Routing Protocol in wireless
More informationComputer Science 210 Data Structures Siena College Fall Topic Notes: Complexity and Asymptotic Analysis
Computer Science 210 Data Structures Siena College Fall 2017 Topic Notes: Complexity and Asymptotic Analysis Consider the abstract data type, the Vector or ArrayList. This structure affords us the opportunity
More informationRouting Protocols in Mobile Ad-Hoc Network
International Journal of Computer Science & Management Studies, Vol. 12, Issue 02, April 2012 Protocols in Mobile Ad-Hoc Network Sachin Minocha M. Tech Student, Vaish College of Engineering, Rohtak, Haryana
More informationAppointed BrOadcast (ABO): Reducing Routing Overhead in. IEEE Mobile Ad Hoc Networks
Appointed BrOadcast (ABO): Reducing Routing Overhead in IEEE 802.11 Mobile Ad Hoc Networks Chun-Yen Hsu and Shun-Te Wang Computer Network Lab., Department of Electronic Engineering National Taiwan University
More informationAnalysis of GPS and Zone Based Vehicular Routing on Urban City Roads
Analysis of GPS and Zone Based Vehicular Routing on Urban City Roads Aye Zarchi Minn 1, May Zin Oo 2, Mazliza Othman 3 1,2 Department of Information Technology, Mandalay Technological University, Myanmar
More information