SlideShare uma empresa Scribd logo
1 de 31
Baixar para ler offline
Mobile and Wireless Computing
Institute for Computer Science, University of Freiburg
Western Australian Interactive Virtual Environments Centre (IVEC)
Lecture 5 : Link Reversal Routing
Lecture 5.1 : Basic ideas behind Link Reversal
Routing
Lecture 5.2 : The Gafni-Bertsekas algorithm for
Link Reversal Routing
Mobile and Wireless Computing
Institute for Computer Science, University of Freiburg
Western Australian Interactive Virtual Environments Centre (IVEC)
Link Reversal Routing (LRR)
Link Reversal Routing is suitable for ad hoc
mobile networks that do not fall under the
following two categories :
– The rate of topological changes are not so fast as to
make flooding the only possible routing method.
– Also, the changes are not so slow that it is possible to
maintain shortest paths efficiently.
However, the success of the LRR method
depends on other factors like network size,
network topology and available bandwidth.
Mobile and Wireless Computing
Institute for Computer Science, University of Freiburg
Western Australian Interactive Virtual Environments Centre (IVEC)
General Approach
The main objective of the LRR approach is to
reduce the number of control messages due to
topological changes.
The LRR approaches do not try to maintain
extensive routing tables like proactive protocols.
Instead, the main aim of all LRR approaches is
to maintain a directed acyclic graph (DAG)
rooted at the destination.
Mobile and Wireless Computing
Institute for Computer Science, University of Freiburg
Western Australian Interactive Virtual Environments Centre (IVEC)
Directed Acyclic Graph
The destination is the only node that may have
only incoming links. All other nodes that have
incoming links must also have outgoing links.
We will talk about only a single destination and
the DAG associated with it.
However, it should be noted that at any time all
the nodes in the network may be destinations of
messages from other nodes.
Mobile and Wireless Computing
Institute for Computer Science, University of Freiburg
Western Australian Interactive Virtual Environments Centre (IVEC)
Directed Acyclic Graph
Each such destination will have a rooted DAG
associated with it.
If we consider a single destination D, a rooted
DAG provides multiple paths to D.
However, if we consider another node N, there
is no knowledge in N that can be used by N to
decide its position in the DAG relative to D.
Mobile and Wireless Computing
Institute for Computer Science, University of Freiburg
Western Australian Interactive Virtual Environments Centre (IVEC)
An Example
Dest
Each node only knows its one-hop neighbours and
does not get any information from other nodes.
Mobile and Wireless Computing
Institute for Computer Science, University of Freiburg
Western Australian Interactive Virtual Environments Centre (IVEC)
An Example
Dest
This DAG is drawn assuming only one destination.
In general there may be many destinations and each
node except the destination will try to maintain at least
one outgoing link to participate in the DAG.
Mobile and Wireless Computing
Institute for Computer Science, University of Freiburg
Western Australian Interactive Virtual Environments Centre (IVEC)
An Example
Dest
Since the overall DAG has no cycles, no message will
loop around a cycle and each message will eventually
reach its destination.
Mobile and Wireless Computing
Institute for Computer Science, University of Freiburg
Western Australian Interactive Virtual Environments Centre (IVEC)
Difference from Other Protocols
Unlike table-driven protocols like DSDV, the
LRR approaches do not require global
information.
Unlike reactive protocols like DSR and AODV,
there is no need to find a path to a destination
through route request messages.
LRR approaches have lower overheads in terms
of control packets as well as lower latency in
finding paths.
Mobile and Wireless Computing
Institute for Computer Science, University of Freiburg
Western Australian Interactive Virtual Environments Centre (IVEC)
Maintaining the DAG
One of the key issues in all LRR based protocols
is to maintain the DAG correctly. This is done
differently in different protocols.
We will first discuss the situation when a node
needs to take some action for maintaining the
overall DAG.
We will discuss the maintenance procedure for
different protocols later.
Mobile and Wireless Computing
Institute for Computer Science, University of Freiburg
Western Australian Interactive Virtual Environments Centre (IVEC)
What Triggers Route or DAG Maintenance
i j
k
For a node i, if there is a directed edge from i to
j, then i is called the upstream neighbour of j and
j is called the downstream neighbour of i.
A node needs to initiate route maintenance if it
has lost all of its downstream neighbours.
Mobile and Wireless Computing
Institute for Computer Science, University of Freiburg
Western Australian Interactive Virtual Environments Centre (IVEC)
Triggering DAG Maintenance
i
upstream
downstream
DAG maintenance only affects those nodes for whom all
previous directed paths pass through node i.
Hence, DAG maintenance has mostly local effects in
LRR protocols.
Mobile and Wireless Computing
Institute for Computer Science, University of Freiburg
Western Australian Interactive Virtual Environments Centre (IVEC)
The General Scenario for Multiple Destinations
d1
d2
d3
d4
i j
For two neighbours i and j, i can be both upstream and
downstream neighbour of j depending on the destination.
For destinations d1, d2 and d4, i is the upstream
neighbour of j. For d3, i is the downstream neighbour of j.
The status of each link is stored in each node tagged with
the destination ID.
Mobile and Wireless Computing
Institute for Computer Science, University of Freiburg
Western Australian Interactive Virtual Environments Centre (IVEC)
Gafni-Bertsekas (GF) Algorithm
The GF algorithm was first proposed for routing
in packet radio networks. The aim was to solve
the following problem :
– Given a connected, destination-disoriented DAG,
transform it into a destination-oriented DAG by
reversing the directions of some of its links.
We consider only one destination node, however
the algorithm can be executed concurrently for
multiple destination nodes.
Mobile and Wireless Computing
Institute for Computer Science, University of Freiburg
Western Australian Interactive Virtual Environments Centre (IVEC)
Some Definitions
A DAG is destination-oriented, if for every node
n there exists a directed path originating at n
and terminating at the destination.
Otherwise, the DAG is destination-disoriented.
The whole idea behind the GF algorithm is :
Given a destination, change the directions of
some of the links in the DAG so that it becomes
destination-oriented.
Mobile and Wireless Computing
Institute for Computer Science, University of Freiburg
Western Australian Interactive Virtual Environments Centre (IVEC)
A Destination-Oriented DAG
Dest
We can make the DAG destination-disoriented if we
change it so that there is at least one node (other than
the destination) with no outgoing edges.
Mobile and Wireless Computing
Institute for Computer Science, University of Freiburg
Western Australian Interactive Virtual Environments Centre (IVEC)
A Simple Theorem
Theorem : A DAG is destination-disoriented if
and only if there exists a node other than the
destination that has no outgoing link.
Proof : if :
Suppose there is a node n (other than the
destination) which has no outgoing link. Clearly,
n does not have a path to the destination since it
has no outgoing links.
Mobile and Wireless Computing
Institute for Computer Science, University of Freiburg
Western Australian Interactive Virtual Environments Centre (IVEC)
A Simple Theorem
Only if : Suppose there is at least one node n
such that n does not have a path to the
destination.
Since our network is a DAG, it is not possible
that a path from n will loop around a cycle.
Hence paths from n will fail to reach the
destination only if they reach a node without any
outgoing link.
Mobile and Wireless Computing
Institute for Computer Science, University of Freiburg
Western Australian Interactive Virtual Environments Centre (IVEC)
Destination-Oriented DAG
Hence, to maintain a destination-oriented DAG,
we have to ensure the following :
– Every node except the destination has at least one
outgoing edge. This is ensured by reversing link
directions in the DAG.
– The underlying network should remain a DAG when
we perform link reversals.
Mobile and Wireless Computing
Institute for Computer Science, University of Freiburg
Western Australian Interactive Virtual Environments Centre (IVEC)
Full Reversal and Partial Reversal Methods
The GF algorithm provides two methods for link
reversal : full reversal and partial reversal.
Full Reversal : If a node n (other than the
destination) has no outgoing links, it reverses
the directions of all of its incoming links.
Full reversals propagate through the network
until each node (except the destination) has at
least one outgoing link.
Mobile and Wireless Computing
Institute for Computer Science, University of Freiburg
Western Australian Interactive Virtual Environments Centre (IVEC)
Full Reversal Example
1
2 3
4 5 6
dest
Mobile and Wireless Computing
Institute for Computer Science, University of Freiburg
Western Australian Interactive Virtual Environments Centre (IVEC)
Full Reversal Example
1
2 3
4 5 6
dest
Link failure
Nodes that reverse
Mobile and Wireless Computing
Institute for Computer Science, University of Freiburg
Western Australian Interactive Virtual Environments Centre (IVEC)
Full Reversal Example
Nodes that reverse
1
2 3
4 5 6
dest
Link failure
Mobile and Wireless Computing
Institute for Computer Science, University of Freiburg
Western Australian Interactive Virtual Environments Centre (IVEC)
Full Reversal Example
Nodes that reverse
1
2 3
4 6
dest
Link failure
5
Mobile and Wireless Computing
Institute for Computer Science, University of Freiburg
Western Australian Interactive Virtual Environments Centre (IVEC)
Full Reversal Example
Nodes that reverse
1
2 3
4 6
dest
Link failure
5
Mobile and Wireless Computing
Institute for Computer Science, University of Freiburg
Western Australian Interactive Virtual Environments Centre (IVEC)
Full Reversal Example
Nodes that reverse
1
2 3
4 6
dest
Link failure
5
Mobile and Wireless Computing
Institute for Computer Science, University of Freiburg
Western Australian Interactive Virtual Environments Centre (IVEC)
Full Reversal is Loop Free
Assume that a loop is formed when a node n
does a full reversal.
In that case, one of the nodes on the loop must
be n.
However, n has only outgoing links after the full
reversal. Hence, n cannot be part of a loop.
Mobile and Wireless Computing
Institute for Computer Science, University of Freiburg
Western Australian Interactive Virtual Environments Centre (IVEC)
Full Reversal Does not Oscillate
The GF algorithm assumes that the network is
always connected.
Hence, there is at least one node P with an
outgoing link to the destination.
P will never execute a full reversal and hence
the iteration will stop at P.
However, GF algorithm does not work if the
network is partitioned. A partitioned network may
result in infinite oscillation of full reversal.
Mobile and Wireless Computing
Institute for Computer Science, University of Freiburg
Western Australian Interactive Virtual Environments Centre (IVEC)
GF Fails to Converge for Partitioned Networks
dest
1
2
3 4
5
Link failure
Nodes that reverse
Mobile and Wireless Computing
Institute for Computer Science, University of Freiburg
Western Australian Interactive Virtual Environments Centre (IVEC)
GF Fails to Converge for Partitioned Networks
dest
1
2
3 4
5
Nodes that reverse
Mobile and Wireless Computing
Institute for Computer Science, University of Freiburg
Western Australian Interactive Virtual Environments Centre (IVEC)
GF Fails to Converge for Partitioned Networks
2
dest
1
3 4
5
Nodes that reverse

Mais conteúdo relacionado

Mais procurados

Performance Analysis of AODV and DSDV - FINAL YEAR PROJECT
Performance Analysis of AODV and DSDV - FINAL YEAR PROJECTPerformance Analysis of AODV and DSDV - FINAL YEAR PROJECT
Performance Analysis of AODV and DSDV - FINAL YEAR PROJECTRavi Teja P
 
Evaluation of scalability and bandwidth
Evaluation of scalability and bandwidthEvaluation of scalability and bandwidth
Evaluation of scalability and bandwidthIJCNCJournal
 
LOAD BALANCING AND PROVIDING SECURITY USING RSA IN WIRELESS SENSOR NETWORKS
LOAD BALANCING AND PROVIDING SECURITY USING RSA IN WIRELESS SENSOR NETWORKSLOAD BALANCING AND PROVIDING SECURITY USING RSA IN WIRELESS SENSOR NETWORKS
LOAD BALANCING AND PROVIDING SECURITY USING RSA IN WIRELESS SENSOR NETWORKSIJARIIT
 
Paper id 25201418
Paper id 25201418Paper id 25201418
Paper id 25201418IJRAT
 
Slide aansw
Slide aanswSlide aansw
Slide aanswedge7
 
Analysis of Random Based Mobility Model using TCP Traffic for AODV and DSDV M...
Analysis of Random Based Mobility Model using TCP Traffic for AODV and DSDV M...Analysis of Random Based Mobility Model using TCP Traffic for AODV and DSDV M...
Analysis of Random Based Mobility Model using TCP Traffic for AODV and DSDV M...ijsrd.com
 
PERFORMANCE ANALYSIS AND COMPARISON OF IMPROVED DSR WITH DSR, AODV AND DSDV R...
PERFORMANCE ANALYSIS AND COMPARISON OF IMPROVED DSR WITH DSR, AODV AND DSDV R...PERFORMANCE ANALYSIS AND COMPARISON OF IMPROVED DSR WITH DSR, AODV AND DSDV R...
PERFORMANCE ANALYSIS AND COMPARISON OF IMPROVED DSR WITH DSR, AODV AND DSDV R...ijp2p
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
Modeling and Performance Evaluation TAODV Routing Protocol Using Stochastic P...
Modeling and Performance Evaluation TAODV Routing Protocol Using Stochastic P...Modeling and Performance Evaluation TAODV Routing Protocol Using Stochastic P...
Modeling and Performance Evaluation TAODV Routing Protocol Using Stochastic P...Editor IJCATR
 
Performance Comparison of AODV, DSR and LAR1 in Mobile Ad-hoc Network based o...
Performance Comparison of AODV, DSR and LAR1 in Mobile Ad-hoc Network based o...Performance Comparison of AODV, DSR and LAR1 in Mobile Ad-hoc Network based o...
Performance Comparison of AODV, DSR and LAR1 in Mobile Ad-hoc Network based o...IOSR Journals
 
Cross-layer based performance optimization for different mobility and traffic...
Cross-layer based performance optimization for different mobility and traffic...Cross-layer based performance optimization for different mobility and traffic...
Cross-layer based performance optimization for different mobility and traffic...IOSR Journals
 

Mais procurados (19)

Performance Analysis of AODV and DSDV - FINAL YEAR PROJECT
Performance Analysis of AODV and DSDV - FINAL YEAR PROJECTPerformance Analysis of AODV and DSDV - FINAL YEAR PROJECT
Performance Analysis of AODV and DSDV - FINAL YEAR PROJECT
 
Hj2413101315
Hj2413101315Hj2413101315
Hj2413101315
 
Evaluation of scalability and bandwidth
Evaluation of scalability and bandwidthEvaluation of scalability and bandwidth
Evaluation of scalability and bandwidth
 
LOAD BALANCING AND PROVIDING SECURITY USING RSA IN WIRELESS SENSOR NETWORKS
LOAD BALANCING AND PROVIDING SECURITY USING RSA IN WIRELESS SENSOR NETWORKSLOAD BALANCING AND PROVIDING SECURITY USING RSA IN WIRELESS SENSOR NETWORKS
LOAD BALANCING AND PROVIDING SECURITY USING RSA IN WIRELESS SENSOR NETWORKS
 
Ab25144148
Ab25144148Ab25144148
Ab25144148
 
159 163
159 163159 163
159 163
 
Paper id 25201418
Paper id 25201418Paper id 25201418
Paper id 25201418
 
Slide aansw
Slide aanswSlide aansw
Slide aansw
 
Ho2413421346
Ho2413421346Ho2413421346
Ho2413421346
 
Analysis of Random Based Mobility Model using TCP Traffic for AODV and DSDV M...
Analysis of Random Based Mobility Model using TCP Traffic for AODV and DSDV M...Analysis of Random Based Mobility Model using TCP Traffic for AODV and DSDV M...
Analysis of Random Based Mobility Model using TCP Traffic for AODV and DSDV M...
 
PERFORMANCE ANALYSIS AND COMPARISON OF IMPROVED DSR WITH DSR, AODV AND DSDV R...
PERFORMANCE ANALYSIS AND COMPARISON OF IMPROVED DSR WITH DSR, AODV AND DSDV R...PERFORMANCE ANALYSIS AND COMPARISON OF IMPROVED DSR WITH DSR, AODV AND DSDV R...
PERFORMANCE ANALYSIS AND COMPARISON OF IMPROVED DSR WITH DSR, AODV AND DSDV R...
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Modeling and Performance Evaluation TAODV Routing Protocol Using Stochastic P...
Modeling and Performance Evaluation TAODV Routing Protocol Using Stochastic P...Modeling and Performance Evaluation TAODV Routing Protocol Using Stochastic P...
Modeling and Performance Evaluation TAODV Routing Protocol Using Stochastic P...
 
E04402030037
E04402030037E04402030037
E04402030037
 
Fa25939942
Fa25939942Fa25939942
Fa25939942
 
Performance Comparison of AODV, DSR and LAR1 in Mobile Ad-hoc Network based o...
Performance Comparison of AODV, DSR and LAR1 in Mobile Ad-hoc Network based o...Performance Comparison of AODV, DSR and LAR1 in Mobile Ad-hoc Network based o...
Performance Comparison of AODV, DSR and LAR1 in Mobile Ad-hoc Network based o...
 
Cross-layer based performance optimization for different mobility and traffic...
Cross-layer based performance optimization for different mobility and traffic...Cross-layer based performance optimization for different mobility and traffic...
Cross-layer based performance optimization for different mobility and traffic...
 
D4610922df8edb89513e496bbbe7672d7453
D4610922df8edb89513e496bbbe7672d7453D4610922df8edb89513e496bbbe7672d7453
D4610922df8edb89513e496bbbe7672d7453
 

Destaque

Quan ly truyen thong ca nhan full
Quan ly truyen thong ca nhan fullQuan ly truyen thong ca nhan full
Quan ly truyen thong ca nhan fullMyLan2014
 
Promoting the well being of children in out of home care:
Promoting the well being of children in out of home care:Promoting the well being of children in out of home care:
Promoting the well being of children in out of home care:BASPCAN
 
torrorgenreconventions 101007040329-phpapp02
torrorgenreconventions 101007040329-phpapp02torrorgenreconventions 101007040329-phpapp02
torrorgenreconventions 101007040329-phpapp02Sadè 🌹💕
 
קיימות וטביעת רגל פחמנית- ראיון במגזין כיל הגלובלי- ינואר 16
קיימות וטביעת רגל פחמנית- ראיון במגזין כיל הגלובלי- ינואר 16קיימות וטביעת רגל פחמנית- ראיון במגזין כיל הגלובלי- ינואר 16
קיימות וטביעת רגל פחמנית- ראיון במגזין כיל הגלובלי- ינואר 16Roy Weidberg
 
START alert Nigeria (Lassa fever)
START alert Nigeria (Lassa fever)START alert Nigeria (Lassa fever)
START alert Nigeria (Lassa fever)Lylaa Shaikh
 
Mailchimp for Beginners
Mailchimp for BeginnersMailchimp for Beginners
Mailchimp for BeginnersDom Cushnan
 
Su hinh thanh marketing-COLOR GROUP
Su hinh thanh marketing-COLOR GROUPSu hinh thanh marketing-COLOR GROUP
Su hinh thanh marketing-COLOR GROUPMyLan2014
 
Управление машиностроительным производством
Управление машиностроительным производством Управление машиностроительным производством
Управление машиностроительным производством ICL Solutions
 
multimedia-y_educacion
multimedia-y_educacionmultimedia-y_educacion
multimedia-y_educacionalexitangel
 

Destaque (15)

Quan ly truyen thong ca nhan full
Quan ly truyen thong ca nhan fullQuan ly truyen thong ca nhan full
Quan ly truyen thong ca nhan full
 
Summer Salads - Laura Baddish
Summer Salads - Laura BaddishSummer Salads - Laura Baddish
Summer Salads - Laura Baddish
 
Promoting the well being of children in out of home care:
Promoting the well being of children in out of home care:Promoting the well being of children in out of home care:
Promoting the well being of children in out of home care:
 
Presentazione standard2.4
Presentazione standard2.4Presentazione standard2.4
Presentazione standard2.4
 
Yasmine portfolio
Yasmine portfolioYasmine portfolio
Yasmine portfolio
 
torrorgenreconventions 101007040329-phpapp02
torrorgenreconventions 101007040329-phpapp02torrorgenreconventions 101007040329-phpapp02
torrorgenreconventions 101007040329-phpapp02
 
קיימות וטביעת רגל פחמנית- ראיון במגזין כיל הגלובלי- ינואר 16
קיימות וטביעת רגל פחמנית- ראיון במגזין כיל הגלובלי- ינואר 16קיימות וטביעת רגל פחמנית- ראיון במגזין כיל הגלובלי- ינואר 16
קיימות וטביעת רגל פחמנית- ראיון במגזין כיל הגלובלי- ינואר 16
 
START alert Nigeria (Lassa fever)
START alert Nigeria (Lassa fever)START alert Nigeria (Lassa fever)
START alert Nigeria (Lassa fever)
 
Mailchimp for Beginners
Mailchimp for BeginnersMailchimp for Beginners
Mailchimp for Beginners
 
Su hinh thanh marketing-COLOR GROUP
Su hinh thanh marketing-COLOR GROUPSu hinh thanh marketing-COLOR GROUP
Su hinh thanh marketing-COLOR GROUP
 
Управление машиностроительным производством
Управление машиностроительным производством Управление машиностроительным производством
Управление машиностроительным производством
 
Bulletin municipal 2016 de Bazoges en Pareds
Bulletin municipal 2016 de Bazoges en Pareds  Bulletin municipal 2016 de Bazoges en Pareds
Bulletin municipal 2016 de Bazoges en Pareds
 
Europura citi strategy 2015
Europura citi strategy 2015Europura citi strategy 2015
Europura citi strategy 2015
 
multimedia-y_educacion
multimedia-y_educacionmultimedia-y_educacion
multimedia-y_educacion
 
Europura citi 02 uv
Europura citi 02 uvEuropura citi 02 uv
Europura citi 02 uv
 

Semelhante a 05 1 mobile_computing

Distributed Path Computation Using DIV Algorithm
Distributed Path Computation Using DIV AlgorithmDistributed Path Computation Using DIV Algorithm
Distributed Path Computation Using DIV AlgorithmIOSR Journals
 
Performance Analysis of DSR, STAR, ZRP Routing Protocols for a Dynamic Ad-Hoc...
Performance Analysis of DSR, STAR, ZRP Routing Protocols for a Dynamic Ad-Hoc...Performance Analysis of DSR, STAR, ZRP Routing Protocols for a Dynamic Ad-Hoc...
Performance Analysis of DSR, STAR, ZRP Routing Protocols for a Dynamic Ad-Hoc...IRJET Journal
 
Modified GPSR for Fault Tolerant and Energy Efficiency in Mobile Ad Hoc Network
Modified GPSR for Fault Tolerant and Energy Efficiency in Mobile Ad Hoc NetworkModified GPSR for Fault Tolerant and Energy Efficiency in Mobile Ad Hoc Network
Modified GPSR for Fault Tolerant and Energy Efficiency in Mobile Ad Hoc NetworkCSEIJJournal
 
Improvement over aodv routing protocol in vanet
Improvement over aodv routing protocol in vanetImprovement over aodv routing protocol in vanet
Improvement over aodv routing protocol in vanetIAEME Publication
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
 
Nearest Adjacent Node Discovery Scheme for Routing Protocol in Wireless Senso...
Nearest Adjacent Node Discovery Scheme for Routing Protocol in Wireless Senso...Nearest Adjacent Node Discovery Scheme for Routing Protocol in Wireless Senso...
Nearest Adjacent Node Discovery Scheme for Routing Protocol in Wireless Senso...IOSR Journals
 
Distance’s quantification
Distance’s quantificationDistance’s quantification
Distance’s quantificationcsandit
 
Routing protocols in Ad-hoc Networks- A Simulation Study
Routing protocols in Ad-hoc Networks- A Simulation StudyRouting protocols in Ad-hoc Networks- A Simulation Study
Routing protocols in Ad-hoc Networks- A Simulation StudyIOSR Journals
 
AN IMPLEMENTATION POSSIBILITIES FOR AODV ROUTING PROTOCOL IN REAL WORLD
AN IMPLEMENTATION POSSIBILITIES FOR AODV ROUTING PROTOCOL IN REAL WORLDAN IMPLEMENTATION POSSIBILITIES FOR AODV ROUTING PROTOCOL IN REAL WORLD
AN IMPLEMENTATION POSSIBILITIES FOR AODV ROUTING PROTOCOL IN REAL WORLDijdpsjournal
 
MOBILITY AWARE ROUTING PROTOCOL IN AD-HOC NETWORK
MOBILITY AWARE ROUTING PROTOCOL IN AD-HOC NETWORK MOBILITY AWARE ROUTING PROTOCOL IN AD-HOC NETWORK
MOBILITY AWARE ROUTING PROTOCOL IN AD-HOC NETWORK cscpconf
 
Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...
Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...
Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...IOSR Journals
 
Comparative Analysis of Distance Vector Routing & Link State Protocols
Comparative Analysis of Distance Vector Routing & Link State ProtocolsComparative Analysis of Distance Vector Routing & Link State Protocols
Comparative Analysis of Distance Vector Routing & Link State ProtocolsEast West University
 
Virtual Position based Olsr Protocol for Wireless Sensor Networks
Virtual Position based Olsr Protocol for Wireless Sensor NetworksVirtual Position based Olsr Protocol for Wireless Sensor Networks
Virtual Position based Olsr Protocol for Wireless Sensor Networksijcnes
 
Opportunistic Data Forwarding in Manet
Opportunistic Data Forwarding in ManetOpportunistic Data Forwarding in Manet
Opportunistic Data Forwarding in ManetIJTET Journal
 
PERFORMANCE EVALUATION ON EXTENDED ROUTING PROTOCOL OF AODV IN MANET
PERFORMANCE EVALUATION ON EXTENDED ROUTING PROTOCOL OF AODV IN MANETPERFORMANCE EVALUATION ON EXTENDED ROUTING PROTOCOL OF AODV IN MANET
PERFORMANCE EVALUATION ON EXTENDED ROUTING PROTOCOL OF AODV IN MANETijasuc
 

Semelhante a 05 1 mobile_computing (20)

Distributed Path Computation Using DIV Algorithm
Distributed Path Computation Using DIV AlgorithmDistributed Path Computation Using DIV Algorithm
Distributed Path Computation Using DIV Algorithm
 
C0431320
C0431320C0431320
C0431320
 
Performance Analysis of DSR, STAR, ZRP Routing Protocols for a Dynamic Ad-Hoc...
Performance Analysis of DSR, STAR, ZRP Routing Protocols for a Dynamic Ad-Hoc...Performance Analysis of DSR, STAR, ZRP Routing Protocols for a Dynamic Ad-Hoc...
Performance Analysis of DSR, STAR, ZRP Routing Protocols for a Dynamic Ad-Hoc...
 
Modified GPSR for Fault Tolerant and Energy Efficiency in Mobile Ad Hoc Network
Modified GPSR for Fault Tolerant and Energy Efficiency in Mobile Ad Hoc NetworkModified GPSR for Fault Tolerant and Energy Efficiency in Mobile Ad Hoc Network
Modified GPSR for Fault Tolerant and Energy Efficiency in Mobile Ad Hoc Network
 
Wiki2010 Unit 4
Wiki2010 Unit 4Wiki2010 Unit 4
Wiki2010 Unit 4
 
Improvement over aodv routing protocol in vanet
Improvement over aodv routing protocol in vanetImprovement over aodv routing protocol in vanet
Improvement over aodv routing protocol in vanet
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
Nearest Adjacent Node Discovery Scheme for Routing Protocol in Wireless Senso...
Nearest Adjacent Node Discovery Scheme for Routing Protocol in Wireless Senso...Nearest Adjacent Node Discovery Scheme for Routing Protocol in Wireless Senso...
Nearest Adjacent Node Discovery Scheme for Routing Protocol in Wireless Senso...
 
Distance’s quantification
Distance’s quantificationDistance’s quantification
Distance’s quantification
 
Routing protocols in Ad-hoc Networks- A Simulation Study
Routing protocols in Ad-hoc Networks- A Simulation StudyRouting protocols in Ad-hoc Networks- A Simulation Study
Routing protocols in Ad-hoc Networks- A Simulation Study
 
AN IMPLEMENTATION POSSIBILITIES FOR AODV ROUTING PROTOCOL IN REAL WORLD
AN IMPLEMENTATION POSSIBILITIES FOR AODV ROUTING PROTOCOL IN REAL WORLDAN IMPLEMENTATION POSSIBILITIES FOR AODV ROUTING PROTOCOL IN REAL WORLD
AN IMPLEMENTATION POSSIBILITIES FOR AODV ROUTING PROTOCOL IN REAL WORLD
 
Ijariie1150
Ijariie1150Ijariie1150
Ijariie1150
 
MOBILITY AWARE ROUTING PROTOCOL IN AD-HOC NETWORK
MOBILITY AWARE ROUTING PROTOCOL IN AD-HOC NETWORK MOBILITY AWARE ROUTING PROTOCOL IN AD-HOC NETWORK
MOBILITY AWARE ROUTING PROTOCOL IN AD-HOC NETWORK
 
Hd3312521256
Hd3312521256Hd3312521256
Hd3312521256
 
Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...
Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...
Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...
 
Comparative Analysis of Distance Vector Routing & Link State Protocols
Comparative Analysis of Distance Vector Routing & Link State ProtocolsComparative Analysis of Distance Vector Routing & Link State Protocols
Comparative Analysis of Distance Vector Routing & Link State Protocols
 
Virtual Position based Olsr Protocol for Wireless Sensor Networks
Virtual Position based Olsr Protocol for Wireless Sensor NetworksVirtual Position based Olsr Protocol for Wireless Sensor Networks
Virtual Position based Olsr Protocol for Wireless Sensor Networks
 
Opportunistic Data Forwarding in Manet
Opportunistic Data Forwarding in ManetOpportunistic Data Forwarding in Manet
Opportunistic Data Forwarding in Manet
 
Md3421762181
Md3421762181Md3421762181
Md3421762181
 
PERFORMANCE EVALUATION ON EXTENDED ROUTING PROTOCOL OF AODV IN MANET
PERFORMANCE EVALUATION ON EXTENDED ROUTING PROTOCOL OF AODV IN MANETPERFORMANCE EVALUATION ON EXTENDED ROUTING PROTOCOL OF AODV IN MANET
PERFORMANCE EVALUATION ON EXTENDED ROUTING PROTOCOL OF AODV IN MANET
 

05 1 mobile_computing

  • 1. Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC) Lecture 5 : Link Reversal Routing Lecture 5.1 : Basic ideas behind Link Reversal Routing Lecture 5.2 : The Gafni-Bertsekas algorithm for Link Reversal Routing
  • 2. Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC) Link Reversal Routing (LRR) Link Reversal Routing is suitable for ad hoc mobile networks that do not fall under the following two categories : – The rate of topological changes are not so fast as to make flooding the only possible routing method. – Also, the changes are not so slow that it is possible to maintain shortest paths efficiently. However, the success of the LRR method depends on other factors like network size, network topology and available bandwidth.
  • 3. Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC) General Approach The main objective of the LRR approach is to reduce the number of control messages due to topological changes. The LRR approaches do not try to maintain extensive routing tables like proactive protocols. Instead, the main aim of all LRR approaches is to maintain a directed acyclic graph (DAG) rooted at the destination.
  • 4. Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC) Directed Acyclic Graph The destination is the only node that may have only incoming links. All other nodes that have incoming links must also have outgoing links. We will talk about only a single destination and the DAG associated with it. However, it should be noted that at any time all the nodes in the network may be destinations of messages from other nodes.
  • 5. Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC) Directed Acyclic Graph Each such destination will have a rooted DAG associated with it. If we consider a single destination D, a rooted DAG provides multiple paths to D. However, if we consider another node N, there is no knowledge in N that can be used by N to decide its position in the DAG relative to D.
  • 6. Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC) An Example Dest Each node only knows its one-hop neighbours and does not get any information from other nodes.
  • 7. Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC) An Example Dest This DAG is drawn assuming only one destination. In general there may be many destinations and each node except the destination will try to maintain at least one outgoing link to participate in the DAG.
  • 8. Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC) An Example Dest Since the overall DAG has no cycles, no message will loop around a cycle and each message will eventually reach its destination.
  • 9. Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC) Difference from Other Protocols Unlike table-driven protocols like DSDV, the LRR approaches do not require global information. Unlike reactive protocols like DSR and AODV, there is no need to find a path to a destination through route request messages. LRR approaches have lower overheads in terms of control packets as well as lower latency in finding paths.
  • 10. Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC) Maintaining the DAG One of the key issues in all LRR based protocols is to maintain the DAG correctly. This is done differently in different protocols. We will first discuss the situation when a node needs to take some action for maintaining the overall DAG. We will discuss the maintenance procedure for different protocols later.
  • 11. Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC) What Triggers Route or DAG Maintenance i j k For a node i, if there is a directed edge from i to j, then i is called the upstream neighbour of j and j is called the downstream neighbour of i. A node needs to initiate route maintenance if it has lost all of its downstream neighbours.
  • 12. Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC) Triggering DAG Maintenance i upstream downstream DAG maintenance only affects those nodes for whom all previous directed paths pass through node i. Hence, DAG maintenance has mostly local effects in LRR protocols.
  • 13. Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC) The General Scenario for Multiple Destinations d1 d2 d3 d4 i j For two neighbours i and j, i can be both upstream and downstream neighbour of j depending on the destination. For destinations d1, d2 and d4, i is the upstream neighbour of j. For d3, i is the downstream neighbour of j. The status of each link is stored in each node tagged with the destination ID.
  • 14. Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC) Gafni-Bertsekas (GF) Algorithm The GF algorithm was first proposed for routing in packet radio networks. The aim was to solve the following problem : – Given a connected, destination-disoriented DAG, transform it into a destination-oriented DAG by reversing the directions of some of its links. We consider only one destination node, however the algorithm can be executed concurrently for multiple destination nodes.
  • 15. Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC) Some Definitions A DAG is destination-oriented, if for every node n there exists a directed path originating at n and terminating at the destination. Otherwise, the DAG is destination-disoriented. The whole idea behind the GF algorithm is : Given a destination, change the directions of some of the links in the DAG so that it becomes destination-oriented.
  • 16. Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC) A Destination-Oriented DAG Dest We can make the DAG destination-disoriented if we change it so that there is at least one node (other than the destination) with no outgoing edges.
  • 17. Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC) A Simple Theorem Theorem : A DAG is destination-disoriented if and only if there exists a node other than the destination that has no outgoing link. Proof : if : Suppose there is a node n (other than the destination) which has no outgoing link. Clearly, n does not have a path to the destination since it has no outgoing links.
  • 18. Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC) A Simple Theorem Only if : Suppose there is at least one node n such that n does not have a path to the destination. Since our network is a DAG, it is not possible that a path from n will loop around a cycle. Hence paths from n will fail to reach the destination only if they reach a node without any outgoing link.
  • 19. Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC) Destination-Oriented DAG Hence, to maintain a destination-oriented DAG, we have to ensure the following : – Every node except the destination has at least one outgoing edge. This is ensured by reversing link directions in the DAG. – The underlying network should remain a DAG when we perform link reversals.
  • 20. Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC) Full Reversal and Partial Reversal Methods The GF algorithm provides two methods for link reversal : full reversal and partial reversal. Full Reversal : If a node n (other than the destination) has no outgoing links, it reverses the directions of all of its incoming links. Full reversals propagate through the network until each node (except the destination) has at least one outgoing link.
  • 21. Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC) Full Reversal Example 1 2 3 4 5 6 dest
  • 22. Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC) Full Reversal Example 1 2 3 4 5 6 dest Link failure Nodes that reverse
  • 23. Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC) Full Reversal Example Nodes that reverse 1 2 3 4 5 6 dest Link failure
  • 24. Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC) Full Reversal Example Nodes that reverse 1 2 3 4 6 dest Link failure 5
  • 25. Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC) Full Reversal Example Nodes that reverse 1 2 3 4 6 dest Link failure 5
  • 26. Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC) Full Reversal Example Nodes that reverse 1 2 3 4 6 dest Link failure 5
  • 27. Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC) Full Reversal is Loop Free Assume that a loop is formed when a node n does a full reversal. In that case, one of the nodes on the loop must be n. However, n has only outgoing links after the full reversal. Hence, n cannot be part of a loop.
  • 28. Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC) Full Reversal Does not Oscillate The GF algorithm assumes that the network is always connected. Hence, there is at least one node P with an outgoing link to the destination. P will never execute a full reversal and hence the iteration will stop at P. However, GF algorithm does not work if the network is partitioned. A partitioned network may result in infinite oscillation of full reversal.
  • 29. Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC) GF Fails to Converge for Partitioned Networks dest 1 2 3 4 5 Link failure Nodes that reverse
  • 30. Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC) GF Fails to Converge for Partitioned Networks dest 1 2 3 4 5 Nodes that reverse
  • 31. Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC) GF Fails to Converge for Partitioned Networks 2 dest 1 3 4 5 Nodes that reverse