SlideShare uma empresa Scribd logo
1 de 18
Fisheye State Routing
Protocol Overview
By:
Nir Solomon
Yoav Francis
Interdisciplinary Center, Herzliya
Ad-Hoc Network
A wireless network between mobile nodes
No infrastructure
Limited communication distance
Low-powered users
How to route messages?
Flooding/Broadcast
Not scalable
Using the shortest path from source to
destination
Requires nodes to keep topology data
Ad-Hoc Network (cont.)
Node moves cause network topology changes
Results in routes change
Nodes need to update their topology information
A node disconnecting to or from a neighbor needs to notify
other nodes
There are many upates – must make update process efficient
Low overhead
Fast propagation
Ad-Hoc Routing algorithms
 Proactive:
 Always monitor network topology
 Advantage: Always know how to route to any node
 Disadvantages:
Routing table storage
Periodic control traffic overhead
 Example protocols: LSR, FSR
 Reactive:
 Look for a route only when need to send a packet
 Advantages:
Low routing table storage
No periodic control traffic
 Disadvantage: route search overhead
 Example protocols: TORA, DSR
Link State Routing
Each node holds a routing table with the link state of all
nodes in the network
Periodically or on link change: flood “link state” – list of
neighbors (neighbor = 1 hop)
Re-broadcasts link state information received from neighbors
Use timestamp to distinguish new from stale updates
Routing
The destination is stored in the message header
Each forwarding node finds the shortest path to the destination
according to its routing table
 On each update of the topology map – each node must calculate
the shortest path to all other nodes again.
Link State Routing drawbacks
As the number of nodes grow or mobility increases:
Routing tables grow linearly
Link state overhead grow linearly – the overhead
packets will consume most of the bandwidth as
network size increases.
Not scalable
• Fish do have 360° (or almost) vision.
• Fishes (and humans) do have a higher
concentration of optic nerves close to they focal
point than elsewhere in they eye.
• As a result fisheye captures with high detail the
points near the focal point
Fisheye Vision
Fisheye Vision (Cont.)
Published in “Fisheye State Routing in Mobile
Ad Hoc Networks” in 2000, by Guangyu Pei ,
Mario Gerla , Tsu-Wei Chen at ICDCS.
Aim – Reduce routing updates overhead in large
ad-hoc networks.
Background
Fisheye State Routing (FSR)
• Proactive link-state routing protocol.
• Similar to link state as it maintains a full topology map at each node
– Periodic exchange of Hello packet.
– Periodic exchange of topology tables within the local neighbors
only (instead of flooding the entire network) .
• Topology tables update frequency decreases with distance to
destination
– Updates for a near destination are propagated more frequently then
updates for a remote destination
Fisheye State Routing (Cont.)
Every node holds:
 Neighbor list
 Topology Table
 Next Hop Table
 Distance Table
For large network, in order to reduce the size of the routing
update message, the FSR technique uses different
exchange periods for different entries in the routing table.
Relative to each node, the network is divided into
different scopes.
Fisheye State Routing (Cont.)
Central Node
1-hop neighbor
2-hops or more
neighbor
The link state updates of the nodes in scope k are sent every 2k-1
T to all the
neighboring nodes
•K is the hop distance
•T is the link state updates transmission period
Scope 1
Scope 2
Fisheye State Routing (Cont.)
 Maintain accurate routing information for immediate neighbors.
 Progressively less detail as distance increases.
 Link state of immediate neighbors are exchanged more frequently.
 The exchange frequency decreases proportionally to the distance.
 As the packet gets closer to the destination, the accuracy
increases.
Fisheye State Routing
0
5
1
2
4
3
0:{1}
1:{0,2,3}
2:{5,1,4}
3:{1,4}
4:{5,2,3}
5:{2,4}
1
0
1
1
2
2
LST HOP
0:{1}
1:{0,2,3}
2:{5,1,4}
3:{1,4}
4:{5,2,3}
5:{2,4}
2
1
2
0
1
2
LST HOP
0:{1}
1:{0,2,3}
2:{5,1,4}
3:{1,4}
4:{5,2,3}
5:{2,4}
2
2
1
1
0
1
LST HOP
Entries in black are
exchanged more
frequently
Simulation Results
FSR – Conclusions
 Major scalability benefit: link state overhead decreases
significantly
 Unsolved problems:
Route table size still grows linearly with network size
Out of date routes to remote destinations
Our Project
Questions?
Thanks!

Mais conteúdo relacionado

Mais procurados

Issues in routing protocol
Issues in routing protocolIssues in routing protocol
Issues in routing protocolPradeep Kumar TS
 
Location Aided Routing (LAR)
Location Aided Routing (LAR) Location Aided Routing (LAR)
Location Aided Routing (LAR) Pradeep Kumar TS
 
Geographic Routing in WSN
Geographic Routing in WSNGeographic Routing in WSN
Geographic Routing in WSNMahbubur Rahman
 
Mobile Network Layer
Mobile Network LayerMobile Network Layer
Mobile Network LayerRahul Hada
 
Mobility management in adhoc network
Mobility management in adhoc networkMobility management in adhoc network
Mobility management in adhoc networkAman Saurabh
 
Wireless Sensor Network Routing Protocols
Wireless Sensor Network Routing ProtocolsWireless Sensor Network Routing Protocols
Wireless Sensor Network Routing ProtocolsVirendra Thakur
 
Zone Routing Protocol
Zone Routing ProtocolZone Routing Protocol
Zone Routing Protocolnitss007
 
Power Aware Routing in Adhoc Networks
Power Aware Routing in Adhoc NetworksPower Aware Routing in Adhoc Networks
Power Aware Routing in Adhoc NetworksPradeep Kumar TS
 
Classification of routing protocols
Classification of routing protocolsClassification of routing protocols
Classification of routing protocolsMenaga Selvaraj
 
TCP over wireless slides
TCP over wireless slidesTCP over wireless slides
TCP over wireless slidesMahesh Rajawat
 
Routing protocols-network-layer
Routing protocols-network-layerRouting protocols-network-layer
Routing protocols-network-layerNitesh Singh
 
Multicastingand multicast routing protocols
Multicastingand multicast routing protocolsMulticastingand multicast routing protocols
Multicastingand multicast routing protocolsIffat Anjum
 
Energy consumption of wsn
Energy consumption of wsnEnergy consumption of wsn
Energy consumption of wsnDeepaDasarathan
 
Dijkstra & flooding ppt(Routing algorithm)
Dijkstra & flooding ppt(Routing algorithm)Dijkstra & flooding ppt(Routing algorithm)
Dijkstra & flooding ppt(Routing algorithm)Anshul gour
 
Directed diffusion for wireless sensor networking
Directed diffusion for wireless sensor networkingDirected diffusion for wireless sensor networking
Directed diffusion for wireless sensor networkingHabibur Rahman
 

Mais procurados (20)

Leach protocol
Leach protocolLeach protocol
Leach protocol
 
Issues in routing protocol
Issues in routing protocolIssues in routing protocol
Issues in routing protocol
 
Location Aided Routing (LAR)
Location Aided Routing (LAR) Location Aided Routing (LAR)
Location Aided Routing (LAR)
 
Link state routing protocol
Link state routing protocolLink state routing protocol
Link state routing protocol
 
Geographic Routing in WSN
Geographic Routing in WSNGeographic Routing in WSN
Geographic Routing in WSN
 
Media Access Control
Media Access ControlMedia Access Control
Media Access Control
 
Routing Protocols in WSN
Routing Protocols in WSNRouting Protocols in WSN
Routing Protocols in WSN
 
Mobile Network Layer
Mobile Network LayerMobile Network Layer
Mobile Network Layer
 
Mobility management in adhoc network
Mobility management in adhoc networkMobility management in adhoc network
Mobility management in adhoc network
 
Wireless Sensor Network Routing Protocols
Wireless Sensor Network Routing ProtocolsWireless Sensor Network Routing Protocols
Wireless Sensor Network Routing Protocols
 
Zone Routing Protocol
Zone Routing ProtocolZone Routing Protocol
Zone Routing Protocol
 
6lowpan
6lowpan6lowpan
6lowpan
 
Power Aware Routing in Adhoc Networks
Power Aware Routing in Adhoc NetworksPower Aware Routing in Adhoc Networks
Power Aware Routing in Adhoc Networks
 
Classification of routing protocols
Classification of routing protocolsClassification of routing protocols
Classification of routing protocols
 
TCP over wireless slides
TCP over wireless slidesTCP over wireless slides
TCP over wireless slides
 
Routing protocols-network-layer
Routing protocols-network-layerRouting protocols-network-layer
Routing protocols-network-layer
 
Multicastingand multicast routing protocols
Multicastingand multicast routing protocolsMulticastingand multicast routing protocols
Multicastingand multicast routing protocols
 
Energy consumption of wsn
Energy consumption of wsnEnergy consumption of wsn
Energy consumption of wsn
 
Dijkstra & flooding ppt(Routing algorithm)
Dijkstra & flooding ppt(Routing algorithm)Dijkstra & flooding ppt(Routing algorithm)
Dijkstra & flooding ppt(Routing algorithm)
 
Directed diffusion for wireless sensor networking
Directed diffusion for wireless sensor networkingDirected diffusion for wireless sensor networking
Directed diffusion for wireless sensor networking
 

Semelhante a Fisheye State Routing (FSR) - Protocol Overview

introAdhocRoutingRoutingRoutingRouting-new.ppt
introAdhocRoutingRoutingRoutingRouting-new.pptintroAdhocRoutingRoutingRoutingRouting-new.ppt
introAdhocRoutingRoutingRoutingRouting-new.pptDEEPAK948083
 
CS6003 AD HOC AND SENSOR NETWORKS
CS6003 AD HOC AND SENSOR NETWORKSCS6003 AD HOC AND SENSOR NETWORKS
CS6003 AD HOC AND SENSOR NETWORKSKathirvel Ayyaswamy
 
Lecture 9 10 .mobile ad-hoc routing protocols
Lecture 9 10 .mobile ad-hoc routing protocolsLecture 9 10 .mobile ad-hoc routing protocols
Lecture 9 10 .mobile ad-hoc routing protocolsChandra Meena
 
Opportunistic Data Forwarding in Manet
Opportunistic Data Forwarding in ManetOpportunistic Data Forwarding in Manet
Opportunistic Data Forwarding in ManetIJTET Journal
 
Module 3: Routing Protocols and Transport Layer in Ad-hoc Networks
Module 3: Routing Protocols and Transport Layer in Ad-hoc Networks Module 3: Routing Protocols and Transport Layer in Ad-hoc Networks
Module 3: Routing Protocols and Transport Layer in Ad-hoc Networks Sitamarhi Institute of Technology
 
Unit VIII wireless sensor networks
Unit VIII wireless sensor networksUnit VIII wireless sensor networks
Unit VIII wireless sensor networkssangusajjan
 
Wireless sensor network
Wireless sensor networkWireless sensor network
Wireless sensor networkJamia Hamdard
 
Powerpoint presentation on wireless communication
Powerpoint presentation on wireless communicationPowerpoint presentation on wireless communication
Powerpoint presentation on wireless communicationmanish kumar
 
Cluster based routing protocol
Cluster based routing protocolCluster based routing protocol
Cluster based routing protocolSudhansu Dash
 
BASICS OF ROUTING IN NETWORKS
BASICS OF ROUTING IN NETWORKSBASICS OF ROUTING IN NETWORKS
BASICS OF ROUTING IN NETWORKSKABILESH RAMAR
 
MPLS Deployment Chapter 1 - Basic
MPLS Deployment Chapter 1 - BasicMPLS Deployment Chapter 1 - Basic
MPLS Deployment Chapter 1 - BasicEricsson
 
Experimental Analysis Of On Demand Routing Protocol
Experimental Analysis Of On Demand Routing ProtocolExperimental Analysis Of On Demand Routing Protocol
Experimental Analysis Of On Demand Routing Protocolsmita gupta
 
Unit 4_Network Layer_Part II.pptx
Unit 4_Network Layer_Part II.pptxUnit 4_Network Layer_Part II.pptx
Unit 4_Network Layer_Part II.pptxHODElex
 

Semelhante a Fisheye State Routing (FSR) - Protocol Overview (20)

Routing Techniques
Routing TechniquesRouting Techniques
Routing Techniques
 
introAdhocRoutingRoutingRoutingRouting-new.ppt
introAdhocRoutingRoutingRoutingRouting-new.pptintroAdhocRoutingRoutingRoutingRouting-new.ppt
introAdhocRoutingRoutingRoutingRouting-new.ppt
 
CS6003 AD HOC AND SENSOR NETWORKS
CS6003 AD HOC AND SENSOR NETWORKSCS6003 AD HOC AND SENSOR NETWORKS
CS6003 AD HOC AND SENSOR NETWORKS
 
Lecture 9 10 .mobile ad-hoc routing protocols
Lecture 9 10 .mobile ad-hoc routing protocolsLecture 9 10 .mobile ad-hoc routing protocols
Lecture 9 10 .mobile ad-hoc routing protocols
 
Md3421762181
Md3421762181Md3421762181
Md3421762181
 
Opportunistic Data Forwarding in Manet
Opportunistic Data Forwarding in ManetOpportunistic Data Forwarding in Manet
Opportunistic Data Forwarding in Manet
 
Module 3: Routing Protocols and Transport Layer in Ad-hoc Networks
Module 3: Routing Protocols and Transport Layer in Ad-hoc Networks Module 3: Routing Protocols and Transport Layer in Ad-hoc Networks
Module 3: Routing Protocols and Transport Layer in Ad-hoc Networks
 
Routing protocols
Routing protocolsRouting protocols
Routing protocols
 
Vanet routing
Vanet routingVanet routing
Vanet routing
 
Unit VIII wireless sensor networks
Unit VIII wireless sensor networksUnit VIII wireless sensor networks
Unit VIII wireless sensor networks
 
It6601 mobile computing unit 4
It6601 mobile computing unit 4It6601 mobile computing unit 4
It6601 mobile computing unit 4
 
Wireless sensor network
Wireless sensor networkWireless sensor network
Wireless sensor network
 
Unit8 tgb
Unit8 tgbUnit8 tgb
Unit8 tgb
 
Powerpoint presentation on wireless communication
Powerpoint presentation on wireless communicationPowerpoint presentation on wireless communication
Powerpoint presentation on wireless communication
 
Cluster based routing protocol
Cluster based routing protocolCluster based routing protocol
Cluster based routing protocol
 
BASICS OF ROUTING IN NETWORKS
BASICS OF ROUTING IN NETWORKSBASICS OF ROUTING IN NETWORKS
BASICS OF ROUTING IN NETWORKS
 
MPLS Deployment Chapter 1 - Basic
MPLS Deployment Chapter 1 - BasicMPLS Deployment Chapter 1 - Basic
MPLS Deployment Chapter 1 - Basic
 
UNIT-3 Adhoc.pptx
UNIT-3 Adhoc.pptxUNIT-3 Adhoc.pptx
UNIT-3 Adhoc.pptx
 
Experimental Analysis Of On Demand Routing Protocol
Experimental Analysis Of On Demand Routing ProtocolExperimental Analysis Of On Demand Routing Protocol
Experimental Analysis Of On Demand Routing Protocol
 
Unit 4_Network Layer_Part II.pptx
Unit 4_Network Layer_Part II.pptxUnit 4_Network Layer_Part II.pptx
Unit 4_Network Layer_Part II.pptx
 

Mais de Yoav Francis

Marxism in the internet age and social networks
Marxism in the internet age and social networksMarxism in the internet age and social networks
Marxism in the internet age and social networksYoav Francis
 
1953 and all that. A tale of two sciences (Kitcher, 1984)
1953 and all that. A tale of two sciences (Kitcher, 1984)1953 and all that. A tale of two sciences (Kitcher, 1984)
1953 and all that. A tale of two sciences (Kitcher, 1984)Yoav Francis
 
States of Mind: can they be communicated and compared?
States of Mind: can they be communicated and compared?States of Mind: can they be communicated and compared?
States of Mind: can they be communicated and compared?Yoav Francis
 
Carnivores: Inspection under Philosophy of Action
Carnivores: Inspection under Philosophy of ActionCarnivores: Inspection under Philosophy of Action
Carnivores: Inspection under Philosophy of ActionYoav Francis
 
From Hierarchical to a One-Level view of Consciousness: Overview and Comparison
From Hierarchical to a One-Level view of Consciousness: Overview and ComparisonFrom Hierarchical to a One-Level view of Consciousness: Overview and Comparison
From Hierarchical to a One-Level view of Consciousness: Overview and ComparisonYoav Francis
 
Theories of Consciousness - Overview and Discussion
Theories of Consciousness - Overview and DiscussionTheories of Consciousness - Overview and Discussion
Theories of Consciousness - Overview and DiscussionYoav Francis
 
McTaggart's Argument on the Unreality of Time - Overview and Discussion
McTaggart's Argument on the Unreality of Time - Overview and DiscussionMcTaggart's Argument on the Unreality of Time - Overview and Discussion
McTaggart's Argument on the Unreality of Time - Overview and DiscussionYoav Francis
 
Epicurean Physics: on the Existence of Minimal Units
Epicurean Physics: on the Existence of Minimal UnitsEpicurean Physics: on the Existence of Minimal Units
Epicurean Physics: on the Existence of Minimal UnitsYoav Francis
 
Isaiah Berlin: Positive and Negative Freedom
Isaiah Berlin: Positive and Negative FreedomIsaiah Berlin: Positive and Negative Freedom
Isaiah Berlin: Positive and Negative FreedomYoav Francis
 
"A Single Man": Choosing Life in a Nietzschean Context
"A Single Man": Choosing Life in a Nietzschean Context"A Single Man": Choosing Life in a Nietzschean Context
"A Single Man": Choosing Life in a Nietzschean ContextYoav Francis
 
General Solution for Josephus Problem
General Solution for Josephus ProblemGeneral Solution for Josephus Problem
General Solution for Josephus ProblemYoav Francis
 
Durkheim, Weber and Comte: Comparative Analysis and Analysis
Durkheim, Weber and Comte: Comparative Analysis and AnalysisDurkheim, Weber and Comte: Comparative Analysis and Analysis
Durkheim, Weber and Comte: Comparative Analysis and AnalysisYoav Francis
 
Wii Sensor Bar Positioning in 3D Space
Wii Sensor Bar Positioning in 3D SpaceWii Sensor Bar Positioning in 3D Space
Wii Sensor Bar Positioning in 3D SpaceYoav Francis
 
NLP Literature Survey with focus on Computerized Deception Detection
NLP Literature Survey with focus on Computerized Deception DetectionNLP Literature Survey with focus on Computerized Deception Detection
NLP Literature Survey with focus on Computerized Deception DetectionYoav Francis
 
CAP Theorem - Theory, Implications and Practices
CAP Theorem - Theory, Implications and PracticesCAP Theorem - Theory, Implications and Practices
CAP Theorem - Theory, Implications and PracticesYoav Francis
 
Cloud Caching Proxy+ - Scalable Cloud-Based Proxy Server
Cloud Caching Proxy+ - Scalable Cloud-Based Proxy ServerCloud Caching Proxy+ - Scalable Cloud-Based Proxy Server
Cloud Caching Proxy+ - Scalable Cloud-Based Proxy ServerYoav Francis
 
Floodlight OpenFlow DDoS
Floodlight OpenFlow DDoSFloodlight OpenFlow DDoS
Floodlight OpenFlow DDoSYoav Francis
 

Mais de Yoav Francis (17)

Marxism in the internet age and social networks
Marxism in the internet age and social networksMarxism in the internet age and social networks
Marxism in the internet age and social networks
 
1953 and all that. A tale of two sciences (Kitcher, 1984)
1953 and all that. A tale of two sciences (Kitcher, 1984)1953 and all that. A tale of two sciences (Kitcher, 1984)
1953 and all that. A tale of two sciences (Kitcher, 1984)
 
States of Mind: can they be communicated and compared?
States of Mind: can they be communicated and compared?States of Mind: can they be communicated and compared?
States of Mind: can they be communicated and compared?
 
Carnivores: Inspection under Philosophy of Action
Carnivores: Inspection under Philosophy of ActionCarnivores: Inspection under Philosophy of Action
Carnivores: Inspection under Philosophy of Action
 
From Hierarchical to a One-Level view of Consciousness: Overview and Comparison
From Hierarchical to a One-Level view of Consciousness: Overview and ComparisonFrom Hierarchical to a One-Level view of Consciousness: Overview and Comparison
From Hierarchical to a One-Level view of Consciousness: Overview and Comparison
 
Theories of Consciousness - Overview and Discussion
Theories of Consciousness - Overview and DiscussionTheories of Consciousness - Overview and Discussion
Theories of Consciousness - Overview and Discussion
 
McTaggart's Argument on the Unreality of Time - Overview and Discussion
McTaggart's Argument on the Unreality of Time - Overview and DiscussionMcTaggart's Argument on the Unreality of Time - Overview and Discussion
McTaggart's Argument on the Unreality of Time - Overview and Discussion
 
Epicurean Physics: on the Existence of Minimal Units
Epicurean Physics: on the Existence of Minimal UnitsEpicurean Physics: on the Existence of Minimal Units
Epicurean Physics: on the Existence of Minimal Units
 
Isaiah Berlin: Positive and Negative Freedom
Isaiah Berlin: Positive and Negative FreedomIsaiah Berlin: Positive and Negative Freedom
Isaiah Berlin: Positive and Negative Freedom
 
"A Single Man": Choosing Life in a Nietzschean Context
"A Single Man": Choosing Life in a Nietzschean Context"A Single Man": Choosing Life in a Nietzschean Context
"A Single Man": Choosing Life in a Nietzschean Context
 
General Solution for Josephus Problem
General Solution for Josephus ProblemGeneral Solution for Josephus Problem
General Solution for Josephus Problem
 
Durkheim, Weber and Comte: Comparative Analysis and Analysis
Durkheim, Weber and Comte: Comparative Analysis and AnalysisDurkheim, Weber and Comte: Comparative Analysis and Analysis
Durkheim, Weber and Comte: Comparative Analysis and Analysis
 
Wii Sensor Bar Positioning in 3D Space
Wii Sensor Bar Positioning in 3D SpaceWii Sensor Bar Positioning in 3D Space
Wii Sensor Bar Positioning in 3D Space
 
NLP Literature Survey with focus on Computerized Deception Detection
NLP Literature Survey with focus on Computerized Deception DetectionNLP Literature Survey with focus on Computerized Deception Detection
NLP Literature Survey with focus on Computerized Deception Detection
 
CAP Theorem - Theory, Implications and Practices
CAP Theorem - Theory, Implications and PracticesCAP Theorem - Theory, Implications and Practices
CAP Theorem - Theory, Implications and Practices
 
Cloud Caching Proxy+ - Scalable Cloud-Based Proxy Server
Cloud Caching Proxy+ - Scalable Cloud-Based Proxy ServerCloud Caching Proxy+ - Scalable Cloud-Based Proxy Server
Cloud Caching Proxy+ - Scalable Cloud-Based Proxy Server
 
Floodlight OpenFlow DDoS
Floodlight OpenFlow DDoSFloodlight OpenFlow DDoS
Floodlight OpenFlow DDoS
 

Último

Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdfChristopherTHyatt
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 

Último (20)

Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 

Fisheye State Routing (FSR) - Protocol Overview

  • 1. Fisheye State Routing Protocol Overview By: Nir Solomon Yoav Francis Interdisciplinary Center, Herzliya
  • 2. Ad-Hoc Network A wireless network between mobile nodes No infrastructure Limited communication distance Low-powered users How to route messages? Flooding/Broadcast Not scalable Using the shortest path from source to destination Requires nodes to keep topology data
  • 3. Ad-Hoc Network (cont.) Node moves cause network topology changes Results in routes change Nodes need to update their topology information A node disconnecting to or from a neighbor needs to notify other nodes There are many upates – must make update process efficient Low overhead Fast propagation
  • 4. Ad-Hoc Routing algorithms  Proactive:  Always monitor network topology  Advantage: Always know how to route to any node  Disadvantages: Routing table storage Periodic control traffic overhead  Example protocols: LSR, FSR  Reactive:  Look for a route only when need to send a packet  Advantages: Low routing table storage No periodic control traffic  Disadvantage: route search overhead  Example protocols: TORA, DSR
  • 5. Link State Routing Each node holds a routing table with the link state of all nodes in the network Periodically or on link change: flood “link state” – list of neighbors (neighbor = 1 hop) Re-broadcasts link state information received from neighbors Use timestamp to distinguish new from stale updates Routing The destination is stored in the message header Each forwarding node finds the shortest path to the destination according to its routing table  On each update of the topology map – each node must calculate the shortest path to all other nodes again.
  • 6. Link State Routing drawbacks As the number of nodes grow or mobility increases: Routing tables grow linearly Link state overhead grow linearly – the overhead packets will consume most of the bandwidth as network size increases. Not scalable
  • 7. • Fish do have 360° (or almost) vision. • Fishes (and humans) do have a higher concentration of optic nerves close to they focal point than elsewhere in they eye. • As a result fisheye captures with high detail the points near the focal point Fisheye Vision
  • 9. Published in “Fisheye State Routing in Mobile Ad Hoc Networks” in 2000, by Guangyu Pei , Mario Gerla , Tsu-Wei Chen at ICDCS. Aim – Reduce routing updates overhead in large ad-hoc networks. Background
  • 10. Fisheye State Routing (FSR) • Proactive link-state routing protocol. • Similar to link state as it maintains a full topology map at each node – Periodic exchange of Hello packet. – Periodic exchange of topology tables within the local neighbors only (instead of flooding the entire network) . • Topology tables update frequency decreases with distance to destination – Updates for a near destination are propagated more frequently then updates for a remote destination
  • 11. Fisheye State Routing (Cont.) Every node holds:  Neighbor list  Topology Table  Next Hop Table  Distance Table For large network, in order to reduce the size of the routing update message, the FSR technique uses different exchange periods for different entries in the routing table. Relative to each node, the network is divided into different scopes.
  • 12. Fisheye State Routing (Cont.) Central Node 1-hop neighbor 2-hops or more neighbor The link state updates of the nodes in scope k are sent every 2k-1 T to all the neighboring nodes •K is the hop distance •T is the link state updates transmission period Scope 1 Scope 2
  • 13. Fisheye State Routing (Cont.)  Maintain accurate routing information for immediate neighbors.  Progressively less detail as distance increases.  Link state of immediate neighbors are exchanged more frequently.  The exchange frequency decreases proportionally to the distance.  As the packet gets closer to the destination, the accuracy increases.
  • 14. Fisheye State Routing 0 5 1 2 4 3 0:{1} 1:{0,2,3} 2:{5,1,4} 3:{1,4} 4:{5,2,3} 5:{2,4} 1 0 1 1 2 2 LST HOP 0:{1} 1:{0,2,3} 2:{5,1,4} 3:{1,4} 4:{5,2,3} 5:{2,4} 2 1 2 0 1 2 LST HOP 0:{1} 1:{0,2,3} 2:{5,1,4} 3:{1,4} 4:{5,2,3} 5:{2,4} 2 2 1 1 0 1 LST HOP Entries in black are exchanged more frequently
  • 16. FSR – Conclusions  Major scalability benefit: link state overhead decreases significantly  Unsolved problems: Route table size still grows linearly with network size Out of date routes to remote destinations

Notas do Editor

  1. גם node שעוזב את הרשת וכו '
  2. Proactive – always know network topology, always know network topology and best send method Requires storage at every node for the routing table, a lot of overhead of update packets – more than data itsself. Reactive (on demend)– do the search for route only when need to find a route. Storage is small, no need to hold topology, less overhead. Route search time is long.
  3. Link state = Network Topology (“State of the link”) Distance Vector = Only hold the next hop for each node and the cost (hop distance), not entire/partial network topology. Like a router. Distance – as in number of hops Problem : we may take a “worse” route that indeed has less hops but takes longer than passing through multi-hop route.
  4. 2 From UCLA, one from Bell Labs. ICDCS = I nternational Workshop on Wireless Networks and Mobile Computing
  5. We only transfer to our close neighbors, every x time. What shall we pass ? Which nodes are in the update ? - as the distance from our node increases, we will update the information regarding those nodes in less frequency than closer ones. - this will cause the update packets size to be smaller + less update packets will be sent (we will only send update packets every x-time) - בעצם , נשלח חלקים מן המידע ולא את כל הטבלה , בהתאם למרחק מן הצומת
  6. Neighbor list – all nodes in distance of one hop Topology table – the “link state” (neighbor list) – I save at my node the list of the nodes that every node sees Next hop table / distance table – tables that are computed with shortest path (dijkstra) – each time an update occurs, an algorithm runs that finds the shortest path from our node to every node that was contained in the update. Change exchange periods – in every update packet we send, we choose which nodes to put in our update packet – depending on the frequency and nodes the distance (so, close nodes will be sent an update every x time, far nodes will be sent an update every 2x time, etc.)
  7. Central Node = working node (my node) I update ONLY the green nodes. What will be contained in the update – this is something else. תלוי מימוש – T הוא לבחירת המממש וכן זה לא חייב להיות 2 , וגם אפשר להגיד שעד מרחק 5 אני גם מעדכן כל 2T למשל.
  8. (בציור) הלבנים – הם באותו scope כי בשניהם המרחק גדול מ- 2 . ככל שצמתים מתרחקים – המידע שיש לנו עליהם הוא פחות עדכני – יכול להיות שבטרם קיבלנו עדכון הטופולוגיה השתנתה, node עזב, התרחק וכו'. תדירות העדכון היא ביחס הפוך למרחק. ככל שהפקטה מתקרבת ליעד, ה- Routing הופך ליותר מדויק (כי כל node יודע במדויק את ה- routing אל ה- nodes הקרובים)
  9. Node אפס רואה את 1 , ויש לו הופ 1 אליו – זה מה שבעצם רואים בטבלה. הטבלה של כל node מחזיקה את כל הטופולוגיה. ( LST הוא טבלת הטופולוגיה)
  10. סימולציה מן המאמר – מראה שה- overhead אם יש רק סקופ 1 – link state רגיל. ככל שמס' ה- nodes גדלים , מקטינים את ה- accuracy מעט אך יורד ה- overhead – בעצם בציור רואים שככל שמגדילים את ה- scopes (בהינתן אותו מספר' nodes ) – התקורה הכוללת במערכת הולכת וקטנה, כמובן על חשבון accuracy .
  11. LINK STATE = טופולוגית הרשת גודל טבלת ה- route – לא scalable מבחינת הסטורג' (כי הוא מכיר את כל ה- nodes ושומר אותם. כאשר יש המון nodes מדובר לשמור את כל הקשרים וכל ה- nodes - הרבה storage )