Global State Routing: A New Routing Scheme for Ad-hoc Wireless Networks

Similar documents
Bandwidth Efficient Distant Vector Routing for Ad Hoc Networks

A Highly Effective and Efficient Route Discovery & Maintenance in DSR

Design and Implementation of a Simulator for Ad Hoc Network Routing Protocols

DYNAMIC SEARCH TECHNIQUE USED FOR IMPROVING PASSIVE SOURCE ROUTING PROTOCOL IN MANET

Dynamic Search Technique Used for Improving Passive Source Routing Protocol in Manet

A System and Trac Dependent Adaptive Routing. Algorithm for Ad Hoc Networks 1. neighbor which leads to a shortest path to the destination.

Routing. 4. Mar INF-3190: Switching and Routing

Jerrolyn Brees and Sukhamay Kundu Department of Computer Science Louisiana State University Baton Rouge, LA 70803, USA

ICS 351: Today's plan. distance-vector routing game link-state routing OSPF

A Distributed Routing Algorithm for Supporting Connection-Oriented Service in Wireless Networks with Time-Varying Connectivity

Routing Security in Mobile Ad Hoc Networks: An Extension of DSR

ROUTE STABILITY MODEL FOR DSR IN WIRELESS ADHOC NETWORKS

Fairness Example: high priority for nearby stations Optimality Efficiency overhead

A Survey of Routing Protocol in MANET

POWER AWARE ENERGY EFFICIENT ROUTING PROTOCOL

Unicast Routing in Mobile Ad-Hoc Networks

Routing Protocols Wireless for Ad Hoc Wireless Networks: Classifications of Protocols and A review of Table Driven Protocols Abstract:

Shortcut Tree Routing using Neighbor Table in ZigBee Wireless Networks

Simulation & Performance Analysis of Mobile Ad-Hoc Network Routing Protocol

Routing Protocols in MANETs

Communication Networks I December 4, 2001 Agenda Graph theory notation Trees Shortest path algorithms Distributed, asynchronous algorithms Page 1

Simulation Based Performance Analysis of Routing Protocols Using Random Waypoint Mobility Model in Mobile Ad Hoc Network

Chapter 7 CONCLUSION

Zone-based Proactive Source Routing Protocol for Ad-hoc Networks

Mobility and Density Aware AODV Protocol Extension for Mobile Adhoc Networks-MADA-AODV

Chapter XIV FSR Evaluation Using the Suboptimal Operational Values

Routing Protocol Based Shared and Session Key Exchange Protocol for Wireless Mobile Ad-hoc Network

Enhanced QoS in MANETs using Analysis of Routing Protocol

Ad Hoc Networks: Issues and Routing

Performance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s

C13b: Routing Problem and Algorithms

/$10.00 (c) 1998 IEEE

PERFORMANCE EVALUATION & COMPARISON OF ROUTING PROTOCOLS FOR AD HOC WIRELESS NETWORKS

Keywords- EED(end-to-end delay), Router, Network, Cost, Shortest Path

Lecture (08, 09) Routing in Switched Networks

Volume 3, Issue 6, June 2015 International Journal of Advance Research in Computer Science and Management Studies

The General Analysis of Proactive Protocols DSDV, FSR and WRP

Ad Hoc Routing Protocols and Issues

A Survey on Performance Evaluation of MANET Routing Protocols

Scenario-based comparison of Source-Tracing and Dynamic Source Routing Protocols for Ad-Hoc Networks

REVIEW ON ROUTING PROTOCOLS FOR MOBILE AD HOC NETWORKS

2013, IJARCSSE All Rights Reserved Page 85

A COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET

H-MMAC: A Hybrid Multi-channel MAC Protocol for Wireless Ad hoc Networks

A Comparative Analysis of Pro-active Routing Protocols in MANET

A Study on Mobile Internet Protocol and Mobile Adhoc Network Routing Protocols

Keywords Mobile Ad hoc Networks, Multi-hop Routing, Infrastructure less, Multicast Routing, Routing.

PERFORMANCE EVALUATION OF DSR AND AODV OVER UDP AND TCP CONNECTIONS

ECE 333: Introduction to Communication Networks Fall 2001

STUDY ON MOBILE ADHOC NETWORK ROUTING PROTOCOLS

Module 8. Routing. Version 2 ECE, IIT Kharagpur

Bandwidth Routing in Multi-hop Packet Radio Environment

DISCOVERING OPTIMUM FORWARDER LIST IN MULTICAST WIRELESS SENSOR NETWORK

Exploring Multiple Paths using Link Utilization in Computer Networks

Course Routing Classification Properties Routing Protocols 1/39

A Location-based Directional Route Discovery (LDRD) Protocol in Mobile Ad-hoc Networks

Performance Comparison and Analysis of Table- Driven and On-Demand Routing Protocols for Mobile Ad-hoc Networks

A Routing Protocol for. Physically Hierarchical Ad Hoc Networks. (Preliminary Version) Department of Computer Science. Texas A&M University

Analysis of Shortest-Path Routing Algorithms in a Dynamic Network Environment

Wireless Networks (CSC-7602) Lecture 8 (22 Oct. 2007) Seung-Jong Park (Jay) Fair Queueing

Connectivity, Energy and Mobility Driven Clustering Algorithm for Mobile Ad Hoc Networks

Empirical Study of Mobility effect on IEEE MAC protocol for Mobile Ad- Hoc Networks

Routing in Ad Hoc Wireless Networks PROF. MICHAEL TSAI / DR. KATE LIN 2014/05/14

Comparison of Various Routing Protocols & Brief of MANET

Power Aware Routing using Power Control in Ad Hoc Networks

COMP3331/9331 XXXX Computer Networks and Applications Final Examination (SAMPLE SOLUTIONS)

Routing Protocols in MANET: Comparative Study

Improving Performance in Ad hoc Networks through Location based Multi Hop Forwarding

Performance Evaluation Of Ad-Hoc On Demand Routing Protocol (AODV) Using NS-3 Simulator

Chapter 5 (Week 9) The Network Layer ANDREW S. TANENBAUM COMPUTER NETWORKS FOURTH EDITION PP BLM431 Computer Networks Dr.

International Journal on Emerging Technologies 2(1): 1-6(2011) ISSN :

Design Principles for Distributed Channel Assignment in Wireless Ad Hoc Networks

15-441: Computer Networking. Wireless Networking

FAULT TOLERANT REAL TIME COMMUNICATION IN MULTIHOP NETWORKS USING SEGMENTED BACKUP

Security Enhanced Dynamic Routing using Quasigroups Mr. K.J. Pavithran Kumar 1 and Mr. D. Vivekananda Reddy 2

Gateway Discovery Approaches Implementation and Performance Analysis in the Integrated Mobile Ad Hoc Network (MANET)-Internet Scenario

Performance Metrics of MANET in Multi-Hop Wireless Ad-Hoc Network Routing Protocols

Routing and Multicast in Multihop, Mobile Wireless Networks

Redes de Computadores. Shortest Paths in Networks

Performance Analysis of OLSR and QoS Constraint OLSR in MANET

QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET

Analysis of Black-Hole Attack in MANET using AODV Routing Protocol

AN EFFICIENT MAC PROTOCOL FOR SUPPORTING QOS IN WIRELESS SENSOR NETWORKS

RECEIVER CONTROLLED MEDIUM ACCESS IN MULTIHOP AD HOC NETWORKS WITH MULTIPACKET RECEPTION

Survey of Stability Based Routing Protocols in Mobile Ad-hoc Networks

ANewRoutingProtocolinAdHocNetworks with Unidirectional Links

AN EFFICIENT POWER CONTROLLED ROUTING IN MANETs

Performance Comparison of DSDV, AODV, DSR, Routing protocols for MANETs

Mr. Pradip A. Chougule 1, Mr. Rajesh A. Sanadi 2, Mr. U. H.Kamble 3

Bandwidth-Efficient Multicast Routing for Multihop, Ad-Hoc Wireless Networks *

3. Evaluation of Selected Tree and Mesh based Routing Protocols

Efficient Hybrid Multicast Routing Protocol for Ad-Hoc Wireless Networks

Routing Protocol comparison

Reducing End to End per Packet Energy Consumption

QoS Routing using OLSR with Optimization for Flooding

Study of Route Reconstruction Mechanism in DSDV Based Routing Protocols

Implementation and simulation of OLSR protocol with QoS in Ad Hoc Networks

Analysis QoS Parameters for Mobile Ad-Hoc Network Routing Protocols: Under Group Mobility Model

IJESRT. [Dahiya, 2(5): May, 2013] ISSN: Keywords: AODV, DSDV, Wireless network, NS-2.

ICS 351: Today's plan. OSPF BGP Routing in general

Transcription:

Global State Routing: A New Routing Scheme for Ad-hoc Wireless Networks Tsu-Wei Chen and Mario Gerla Computer Science Department University of California, Los Angeles ftsuwei,gerlag@csuclaedu Abstract In an ad-hoc environment with no wired communication infrastructure, it is necessary that mobile hosts operate as routers in order to maintain the information about connectivity However, with the presence of high mobility and low signal/interference ratio (SIR), traditional routing schemes for wired networks are not appropriate, as they either lack the ability to quickly reflect the changing topology, or may cause excessive overhead, which degrades network performance Considering these restrictions, we propose a new scheme especially designed for routing in an ad-hoc wireless environments We call this scheme Global State Routing (), where nes exchange vectors of link states among their neighbors during routing information exchange Based on the link state vectors, nes maintain a global knowledge of the network topology and optimize their routing decisions locally The performance of the algorithm, studied in this paper through a series of simulations, reveals that this scheme provides a better solution than existing approaches in a truly mobile, ad-hoc environment I Intruction In an ad hoc wireless network where wired infrastructures are not feasible, mobility and bandwidth are two key elements presenting research challenges Mobility causes the life time of a connection between two hosts to vary greatly; and limited bandwidth makes a network to be easily congested by control signalling Routing schemes developed for wired networks selm consider restrictions of this type Instead, they assume that the network is mostly stable and the overhead for routing messages is negligible Considering the difference between wireless and wireline network, we believe it is necessary to develop a wireless routing protocol that reacts quickly to changes of network topology but consumes only a reasonable amount of bandwidth for the control trafc In this paper, we propose a new routing scheme for ad-hoc wireless networks It is MAC (medium access control) layer efcient because the overhead of control message is kept low It still provides accurate solutions for nding optimal paths The rest of this paper is organized as follow In section II, we survey the existing wireless routing protocols Then we propose a new routing scheme in section III Section IV presents the complexity analysis of this scheme and compares it with others To verify the effectiveness, we simulate a mobile environment and the report the performance results in section V Lastly, we conclude our work and propose issues for future research in section VI II Previous Work Several routing schemes based on (distributed Bellman- Ford) [1] or LS (link state) [2] have been proposed in the past for both wireline or wireless networks The advantages of are its simplicity and computation efciency due to its distributed characteristic However, the slow convergence and the tendency of creating routing loops make not suitable for a wireless network with high mobility Though approaches were proposed in [3, 4, 5, 6] to solve looping problem, none of them overcome the problem of slow convergence In part for these reasons, LS is preferred and used in many mern networks like Internet [7] or ATM [8] In LS, a global network topology is maintained in all routers, and any link change will be updated by floing immediately As a result, the time required for a router to converge to the new topology is shorter than in Since global topology is maintained, preventing routing loop is also easier Unfortunately, as LS relies on floing to disseminate the update information, excessive control overhead may be generated, especially when the mobility is high In addition, because of the large amount of small packets, floing is also inefcient for the radio MAC layer A third routing scheme proposed recently for ad-hoc wireless network is called on-demand routing Namely, the route between two nes is computed when there is a need Most ondemand routing are based on a query/response approach [9, 1, 11] Since floing is used for query packet dissemination and route maintenance, on-demand routing tends to become inefcient when trafc load and mobility increase III The Global State Routing Our goal is to design a routing scheme that is MAC efcient in ad-hoc wireless radio networks That is, the control packet size should be able to achieve optimized MAC throughput, and the number of control packet should be controllable We prefer to maintain the knowledge of full network topology as in link state routing, but wish to avoid the inefcient floing mechanism Therefore, we develop our scheme based on LS, which has the advantage of routing accuracy, and we apt the dissemination meth used in, which has the advantage of no floing This scheme is called Global State Routing (), and more detailed description is given below

A Network Mel The ad-hoc wireless network is meled as an undirected graph G = (V; E), where V is a set of jv j nes and E is a set of jej undirected links connecting nes in V Each ne has a unique identier and represents a mobile host with a wireless communication device with transmission range R, and an innity storage space Nes may move around and change their speed and direction independently An undirected link (i; j) connecting two nes i and j is formed when the distance between i and j become less than or equal to R Link (i; j) is removed from E when ne i and j move apart, and out of their transmission ranges For each ne i, one list and three tables are maintained They are: a neighbor list A i, a topology table T T i, a next hop table NEXT i and a distance table D i A i is dened as a set of nes that are adjacent to ne i Each destination j has an entry in table T T i which contains two parts: T T i :LS(j) and T T i :SEQ(j) T T i :LS(j) denotes the link state information reported by ne j, and T T i :SEQ(j) denotes the timestamp indicating the time ne j has generated this link state information Similar, for every destination j, NEXT i (j) denotes the next hop to forward packets destined to j on the shortest path, while D i (j) denotes the distances of the shortest path from i to j Additionally, a weight function, weight: E! Z +, is used to compute the distance of a link Since min-hop shortest path is the only objective in this paper, this weight function simply returns 1 if two nes have direct connection, otherwise, it returns 1 This weight function may also be replaced with other functions for routing with different metrics For instance, a bandwidth function can be used to realize a QoS routing B Algorithm The details of protocol are listed in Fig 1 At the beginning, each ne i starts with an empty neighbor list A i, and an empty topology table T T i After ne i initializes its local variables with proper values as described in procedure NeInit(i), it learns about its neighbors by examining the sender eld of each packet in its inbound queue, PktQueue That is, assuming that all nes can be heard by i are i s neighbors, ne i adds all routing packet senders to its neighbor list, A i Ne i then invokes PktProcess(i) to process the received routing messages, which contain link state information broadcasted by it neighbors PktProcess(i) makes sure that only the most up to date link state information is used to compute the best route by comparing the embedded sequence number, pkt:seq(j), with the ones stored in ne i s local storage, for each destination j If any entry in the incoming message has a newer sequence number regarding destination j, T T i :LS(j) will be replaced by pkt:ls(j), and T T i :SEQ(j) will be replaced by pkt:seq(j) After the routing messages are examined, ne i rebuilds the routing table based on the newly computed topology table and then broadcasts the new information to its neighbors Such process is periically repeated C Information Dissemination The key difference between our and traditional LS is the way routing information is disseminated In LS, link state packets are generated and floed into the network whenever a ne detects topology changes esn t flo the link state packets Instead, nes in maintain the link state table based on the up to date information received from neighboring nes, and periically exchange it with their local neighbors only Information is disseminated as the link state with larger sequence numbers replaces the one with smaller sequence numbers In this respect, it is similar to (or more precisely, the DSDV [4]) where the value of distances is replaced according to the time stamp of sequence number D Shortest Path Computation FindSP(i) creates a shortest path tree rooted at i In principle, any existing shortest path algorithm can be used to create the tree In this paper, however, the procedure listed in Fig 1 is based on the Dijkstra s algorithm [12] with mications so that the next hop table (NEXT i ) and the distance tables(d i ) are computed in parallel with the tree reconstruction At ne i, FindSP(i) initiates with P = g, then it iterates until P = V In each iteration, it searches for a ne j such that ne j minimizes the value of (D i (k) + weight(k; j)), for all j and k, where j 2 V? P, k 2 A i and weight(k,j) 6= 1 Once ne j is found, P is augmented with j, D(j) is assigned to D(k) + weight(k; j) and NEXT i (j) is assigned to next i (k) That is, as the shortest path from i to j has to go through k, the successor for i to j is the same successor for i to k IV Complexity In this section, we analyze the complexity of the scheme and compare it with two other routing schemes: and LS The complexity is studied under ve aspects: 1 Computation Complexity (CC): the number of computation steps for a ne to perform a routing computation after an update message is received; 2 Memory Complexity (MC): the memory space required to store the routing information; 3 Data Complexity (DC): the aggregate size of control packets exchanged by a ne in each time slot; 4 Packet Complexity (PC): the average number of routing packets exchanged by a ne in each time slot; 5 Convergence Time (CT): the times requires to detect a link change Protocol CC MC DC PC CT O(N 2 ) O(N d) O(jEj)=I O(1) O(D I) LS O(N 2 ) O(N 2 ) O(jEj)=I O(N ) O(D) O(N ) O(N ) O(N )=I O(1) O(N I) Table 1 Complexity Comparison Table 1 shows the results of our comparison In the table, N denotes the number of nes in network (jv j), D denotes the maximum hop distance, the diameter, in the network, d and I denote

the degree of ne connectivity and the routing update interval, respectively and LS have same memory complexity and computation complexity as both maintain the topology for the whole network and use Dijkstra s algorithm to compute shortest path routes Dijkstra s algorithm requires typically O(N 2 ) steps to compute the shortest paths from one source to all destinations, although it is possible to reduce it to O(NlogN ) [12] O(N 2 ) memory space is required to store the network topology represented by a connection matrix As for, it has complexity of O(N ) for computing and memory, as it only keeps the distance information for each destination, and computes shortest paths in a distributed fashion For the data complexity, in each ne broadcasts information for N d links on average, and the complexity is divided by I, the update interval LS, on the other hand, has similar accumulated data size for each link update, but its update interval I may become extremely small when mobility increase This issue, to be addressed shortly, was veried through simulation In addition, as LS transmits one short packet for each link update, its packet complexity can be as high as O(N ) when the mobility is high On the other hand, both and transmit a xed number of update tables using longer packets to optimize the MAC throughput Lastly, the convergence time for is also superior than that for In fact, if shorter update interval is used, can converge as fast as LS V Simulation Unlike in [5, 4, 9, 1], where wireless network is simulated by static network with higher link failure rate, we used a truly mobile environment in our simulator to determine the connectivity among mobile hosts The simulation is programmed in C++ to simulate an environment of 5 5 unit 2 Arbitrary numbers of nes, representing the mobile hosts, move independently on their own trajectories within this virtual space The maximum moving speed and the number of nes are given at run time Additional assumptions used in our simulations includes: (1) no ne failure during simulation; (2) ne number is always constant in the run time of simulation; (3) a time slotted system; (4) radio transmission range is xed at R, which is specied at the beginning of the simulation; (5) two nes can hear each other if they are within the transmission range, that is, open space channel mel is used Three routing schemes:, LS and are used exclusively in the simulation The and LS are based on the schemes described in [13] Both and can be executed with a routing update interval (I) specied at run time By default, I is set to 3 (one update per three time slots), while in LS, nes flo link state packets whenever they detect changes in their local connectivities Also, the number of nes in our simulation is set to 6 A Performance Measurements Two metrics are used to evaluate the routing performances: routing inaccuracy and control overhead Using them, we examine the impact to the performances of different mobility, update interval and radio transmission range A1 Routing Inaccuracy Routing inaccuracy is checked by comparing the next hop table of each ne with the tables generated by an off-line algorithm This off-line algorithm has knowledges of the exact network topology to compute the optimal solution for each ne at each time slot For a destination which is still far away, an incorrect value in the next hop table is less critical than nes that are close by Considering this, we dene the routing inaccuracy for ne i, A i, as: A i = 1 D X next i(k)6=next i M (k) (D? hop i (k) + 1) then the overall routing inaccuracy is computed by averaging A i, for all i 2 N, where N, next i (), hop i (), D are dened in section III, and next i M () is the next hop table computed by the off-line algorithm A2 Control Overhead The control overhead is evaluated by examining the average number of routing control packets exchanged on each link The reason for using the number of control packets instead of the total control bits exchanged is due to the characteristic of radio devices and MAC layer protocol It is known that a radio device spends considerable time to switch from receive to transmit me This typically exceeds the time used for sending a small packet If spread spectrum is used, the acquisition time may become even more signicant For LS, we account for each link state packet that is generated by a ne either because it detects a topology change, or it receives one from its neighbors and forwards it by floing Each of packet requires a transition for radio device from receiving me to transmitting me For type algorithm, a routing table update is counted as one packet This is under the assumption that the routing table can be transmitted in a xed number of consecutive MAC layer frames (without transmit/receive switching) B Simulation Results In addition to routing accuracy and control overhead, we also examine the impact to performance due to changes in mobility, update interval and radio transmission range These results are summarized below B1 Routing Inaccuracy Fig 2 shows the inaccuracy of different routing schemes at different ne speeds LS performs best at all speed ranges, since it reacts the fastest to the topology changes performs less accurately than LS since it updates the routing information only every three time slots However, still performs better than B2 Control Overhead As shown in Fig 3, both and algorithms have a flat distribution of packet overhead, which means the overhead of both cases remains constant regardless of mobility This is because nes in both schemes exchange routing information periically with only their adjacent neighbors On the other hand, with LS schemes, the overhead is much worse than and which means more packets are generated The gures also show that as degree of mobility becomes higher, the overhead for LS increases This validates that LS is not suitable for high mobility environment

B3 Mobility Impact As Fig 3 shows, the control overhead for LS increases rapidly as nes move at higher speeds An unmanageable flo of packets overwhelms the radio channel and minates packet queue in each ne On the other hand, mobility has no effect on control overhead for and This is reasonable because in LS, routing updates are event driven: a ne sends a link state packet into the network whenever changes in its neighborho are detected And a large amount of these link state packets will then be generated due to the floing mechanism The impact of mobility to routing inaccuracy is, however, independent of the impact to control overhead Overall, higher mobility causes higher inaccuracy for all three schemes LS performs the best in every mobility value, as indicated by Fig 2 LS sustains inaccuracy equal to or lower than 15% even at a ne speed of 16 units per time slot, while provides poorly acceptable routing solutions Our performs between and LS; in low speed range, is as accurate as LS; while in high speed range, becomes worse but is still better than B4 Update Interval Update interval also plays an important role for the routing overhead and inaccuracy As we showed earlier, LS achieves higher routing accuracy because update packets are sent out immediately whenever a ne detects topology change Thus the delay is bounded by the minimum time resolution used by the system Fig 4 shows that inaccuracy is degraded or improved by adjusting the routing interval up or wn The same holds for as shown in Fig 5, except that the improvement is not very signicant as the accuracy is already poor even in the low mobility conditions As expected, we note that more improvements can be observed when mobility is high B5 Radio Transmission Range The range of radio transmission determines the degree of ne connectivity As shown in Fig 6, the larger the transmission range the larger the connectivity degree and the larger the control packet size for and LS Fig 7 shows the decrease in routing error rate as transmission range increases Larger transmission range means more nes can be reached in one hop without requiring routing decision However, as indicated in [14], the spatial reuse is less efcient when transmission range is large It is interesting to note that, the worst case esn t happens when R = 8, which is the smallest range in our simulation Instead, it happens at about R = 15, regardless of mobility It is obvious that as transmission range increases, the hop distance between any two nes also decreases, so less routing error may be formed On the other hand, as transmission range decreases, the graph will become disjoint To the extreme, when the transmission range equals zero, no two nes can talk to each other, and the next hop entries will becomes all empty VI Conclusion In this paper, we intruce a new routing scheme, the Global State Routing, to provide an efcient routing solution for wireless, mobile networks The routing accuracy of is comparable to an ideal LS scheme and thus superior to the traditional, although it esn t require individual link state broadcasting which may cause serious consumption of wireless bandwidth As a result, is more desirable for a mobile environment where mobility is high and bandwidth is relatively low Our future plan includes the evaluation of MAC layer impact to the routing efciency This requires enhancements to our simulators with different MAC layers such as MACA, MACA/PR and Cluster/TDMA [14] QoS routing for multimedia support in wireless environment is also considered to be embedded in since it provides higher routing accuracy without sacricing bandwidth Besides simulation, implementing in an IP wireless testbed is also in progress References [1] D Bertsekas and R Gallager, Routing in Data Networks, chapter 5, Prentice Hall, second edition, 1987 [2] JM McQuillan et al, The new routing algorithm for the ARPANET, IEEE Transaction of Communications, vol 28, no 5, pp 711,719, May 198 [3] S Murthy and JJ Garcia-Luna-Aceves, A routing protocol for packet radio networks, in Proc IEEE Mobicom, Nov 1995, pp 86 95 [4] CE Perkins and P Bhagwat, Highly dynamic destinationsequenced distance-vector routing (DSDV) for mobile computers, in ACM SIGCOMM 94, 1994, pp 234 244 [5] S Murthy and JJ Garcia-Luna-Aceves, A routing protocol for packet radio networks, in Proc IEEE Mobicom, Nov 1995, pp 86 95 [6] C Hedrick, Routing Information Protocol, in IETF RFC 158, 1988 [7] J Moy, OSPF Version 2, in IETF RFC 1583, 1994 [8] The ATM Forum, Private Network-Network Interface Specication v1, 1996 [9] M S Corson and A Ephremides, A destributed routing algorithm for mobile wireless networks, ACM-Baltzer Journal of Wireless Networks, vol 1, pp 61 81, Jan 1995 [1] V D Park and M S Corson, A highly adaptive destributed routing algorithm for mobile wireless networks, IEEE Infocom, 1997 [11] C-K Toh, A novel distributed routing protocol to support ad-hoc mobile computing, in IEEE IPCCC, 1996 [12] R Sedgewick, Weighted Graphs, chapter 31, Addision- Wesley, 1983 [13] Andrew S Tanenbaum, Computer Networks, Third Edition, Prentice Hall, 1996 [14] M Gerla and J T Tsai, Multicluster, mobile, multimedia radio network, ACM-Baltzer Journal of Wireless Networks, vol 1, no 3, pp 255 265, 1995

proc Ne(i) NeInit(i); while TRUE if PktQueue 6=!! packet received foreach pkt 2 PktQueue A i A i [ fpkt:sourceg PktProcess(i; pkt) ; FindSP(i); if (clock () m UpdateInterval) = RoutingUpdate(i); CheckNeighbors(i); T T i:ls(i) A i; proc NeInit(i) foreach j 2 V A i(j) ; D i(j) 1; NEXT i(j)?1; SEQ i(j)?1; A i A i [ fx j link (i; x) existsg; T T i:ls(i) A i; D i(i) ; NEXT i(i) i; t i ; SEQ i(i) t i; proc RoutingUpdate(i) t i t i + 1; T T i:seq(i) t i; T T i:ls(i) ; foreach x 2 A i T T i:ls(i) T T i:ls(i) [ fxg; message:tt ; T T ig; message:id i; broadcast(j; message) to all j 2 A i; proc FindSP (i) Dijkstra s shortest-path algorithm P g; D i(i) ; foreach x 2 fj j (j 2 V ) ^ (j 6= i)g if x 2 T T i:ls(i) then D i(x) weight(i; x); NEXT i(k) k; else D i(x) 1; NEXT i(k)?1; while P 6= V foreach k 2 V? P; l 2 P Find (l; k) such that weight(l; k) = minfd i(l) + weight(l; k)g; P P [ fkg; D i(k) D i(l) + weight(l; k); NEXT i(k) NEXT i(l); proc PktProcess(i; pkt) source pkt:source; T T i:ls(j) T T i:ls(j) [ fsourceg; foreach j 2 V if (j 6= i) ^ (pkt:seq(j) > T T i:seq(j)) then begin T T i:seq(j) pkt:seq(i); T T i:ls(j) pkt:ls(i); end proc CheckNeighbors(i) foreach j 2 A i if weight(i; j) = 1 A i = A i? fjg; Fig 1 The Protocol Inaccuracy 7 6 5 4 3 2 1 6 nes LS Control Overhead (packet/ne/timeslot) 8 7 6 5 4 3 2 1 r nes LS Control Overhead (packet/ne/timeslot) 6 5 4 3 2 1 I= 1 slot I= 2slots I= 3 slots I= 4 slots 2 4 6 8 1 12 14 16 2 4 6 8 1 12 14 16 2 4 6 8 1 12 14 16 Fig 2 Inaccuracy: 6 nes Fig 3 Overhead: 6 nes Fig 4 Inaccuracy at different update intervals: Control Overhead (packet/ne/timeslot) 7 6 5 4 3 2 1 I= 1 slot I= 2 slots I= 3 slots I= 4 slots Degree of Connectivity 6 5 4 3 2 1 unit/timeslot 25 units/timeslot 5 units/timeslot 5 units/timeslot 5 units/timeslot Routing Inaccuracy 5 45 4 35 3 25 2 15 1 5 unit/timeslot 25 units/timeslot 5 units/timeslot 75 units/timeslot 1 units/timeslot 2 4 6 8 1 12 14 16 5 1 15 2 25 3 35 4 45 5 TX Range 5 1 15 2 25 3 35 4 45 5 TX Range Fig 5 Inaccuracy at different update intervals: Fig 6 Connectivity vs TX range Fig 7 Inaccuracy vs TX range