Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)

Slides:



Advertisements
Similar presentations
1 Routing Protocols I. 2 Routing Recall: There are two parts to routing IP packets: 1. How to pass a packet from an input interface to the output interface.
Advertisements

Multicasting in Mobile Ad hoc Networks By XIE Jiawei.
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Routing in a Parallel Computer. A network of processors is represented by graph G=(V,E), where |V| = N. Each processor has unique ID between 1 and N.
Outline. Theorem For the two processor network, Bit C(Leader) = Bit C(MaxF) = 2[log 2 ((M + 2)/3.5)] and Bit C t (Leader) = Bit C t (MaxF) = 2[log 2 ((M.
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
TORA! TORA! TORA! By Jansen Cohoon. Developing TORA TORA was funded by the Army Research Laboratory. TORA is presently being transitioned into the commercial.
MANETs Routing Dr. Raad S. Al-Qassas Department of Computer Science PSUT
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
1/14 Ad Hoc Networking, Eli M. Gafni and Dimitri P. Bertsekas Distributed Algorithm for Generating Loop-free Routes in Networks With Frequently.
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
1 Spring Semester 2007, Dept. of Computer Science, Technion Internet Networking recitation #4 Mobile Ad-Hoc Networks AODV Routing.
CPSC 689: Discrete Algorithms for Mobile and Wireless Systems Spring 2009 Prof. Jennifer Welch.
NCKU CSIE CIAL1 Principles and Protocols for Power Control in Wireless Ad Hoc Networks Authors: Vikas Kawadia and P. R. Kumar Publisher: IEEE JOURNAL ON.
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
CPSC 689: Discrete Algorithms for Mobile and Wireless Systems Spring 2009 Prof. Jennifer Welch.
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Performance Comparison of Existing Leader Election Algorithms for Dynamic Networks Mobile Ad Hoc (Dynamic) Networks: Collection of potentially mobile computing.
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
1 Spring Semester 2007, Dept. of Computer Science, Technion Internet Networking recitation #5 Mobile Ad-Hoc Networks TBRPF.
1 Analysis of Link Reversal Routing Algorithms Srikanta Tirthapura (Iowa State University) and Costas Busch (Renssaeler Polytechnic Institute)
TORA : Temporally Ordered Routing Algorithm Invented by Vincent Park and M.Scott Corson from University of Maryland. TORA is an on-demand routing protocol.
1 Shortest Path Algorithms. 2 Routing Algorithms Shortest path routing What is a shortest path? –Minimum number of hops? –Minimum distance? There is a.
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
CS401 presentation1 Effective Replica Allocation in Ad Hoc Networks for Improving Data Accessibility Takahiro Hara Presented by Mingsheng Peng (Proc. IEEE.
Ad Hoc Wireless Routing COS 461: Computer Networks
A Highly Adaptive Distributed Routing Algorithm for Mobile Wireless Networks Research Paper By V. D. Park and M. S. Corson.
1 Spring Semester 2009, Dept. of Computer Science, Technion Internet Networking recitation #3 Mobile Ad-Hoc Networks AODV Routing.
Leader Election Algorithms for Mobile Ad Hoc Networks Presented by: Joseph Gunawan.
The Destination Sequenced Distance Vector (DSDV) protocol
1 Ad Hoc On-Demand Distance Vector Routing (AODV) Dr. R. B. Patel.
Analysis of Link Reversal Routing Algorithms for Mobile Ad Hoc Networks Costas Busch (RPI) Srikanth Surapaneni (RPI) Srikanta Tirthapura (Iowa State University)
DISTRIBUTED SYSTEMS II A POLYNOMIAL LOCAL SOLUTION TO MUTUAL EXCLUSION Prof Philippas Tsigas Distributed Computing and Systems Research Group.
1 Computer Communication & Networks Lecture 21 Network Layer: Delivery, Forwarding, Routing Waleed.
Distributed systems Consensus Prof R. Guerraoui Distributed Programming Laboratory.
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
A Framework for Reliable Routing in Mobile Ad Hoc Networks Zhenqiang Ye Srikanth V. Krishnamurthy Satish K. Tripathi.
2/14/2016  A. Orda, A. Segall, 1 Queueing Networks M nodes external arrival rate (Poisson) service rate in each node (exponential) upon service completion.
Load Balanced Link Reversal Routing in Mobile Wireless Ad Hoc Networks Nabhendra Bisnik, Alhussein Abouzeid ECSE Department RPI Costas Busch CSCI Department.
Ad Hoc On-Demand Distance Vector Routing (AODV) ietf
Spring Routing: Part I Section 4.2 Outline Algorithms Scalability.
Network Layer (2). Review Physical layer: move bits between physically connected stations Data link layer: move frames between physically connected stations.
Lecture 7. Building Forwarding Tables There are several methods Static Method Dynamic Methods Centralized Distributed Distance Vector Link State.
CS 6401 Intra-domain Routing Outline Introduction to Routing Distance Vector Algorithm.
Asstt. Professor Adeel Akram. Other Novel Routing Approaches Link reversal Aimed for highly dynamic networks Goal: to identify some path, as opposed.
1 Most important algorithms! Routing Algorithms Properties Shortest Path Routing Flooding Distance Vector Routing Link State routing Hierarchical routing.
GeoTORA: A Protocol for Geocasting in Mobile Ad Hoc Networks
Author:Zarei.M.;Faez.K. ;Nya.J.M.
On-demand Multipath Distance Vector Routing in Ad Hoc Networks(AOMDV)
Internet Networking recitation #4
Sensor Network Routing
Routing: Distance Vector Algorithm
任課教授:陳朝鈞 教授 學生:王志嘉、馬敏修
Analysis of Link Reversal Routing Algorithms
Temporally-Ordered Routing Algorithm (TORA)
by Saltanat Mashirova & Afshin Mahini
Intradomain Routing Outline Introduction to Routing
CSCE 411 Design and Analysis of Algorithms
Effective Replica Allocation
Vinay Singh Graduate school of Software Dongseo University
Presentation transcript:

Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC) Alternative Formulation of Full Reversal  Associate with each node i, a pair, where i is the unique node ID and is an integer.  Set of pairs are ordered lexicographically. Direction of any link goes from to iff  At each iteration, a node with no outgoing links increases its so as to reverse all its incoming links.

Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC) Partial Reversal Method  Every node i, other than the destination, keeps a list of its neighbouring nodes j that have reversed the direction of the corresponding links (i,j).  At each iteration, each node i that has no outgoing links reverses the directions of links (i,j) for all j that do not appear in its list. Then it empties the list.  If there is no such j (all its neighbours appear in the list), i reverses all incoming links and empties the list.

Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC) Partial Reversal Example dest

Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC) Partial Reversal Example Nodes that reverse dest Link failure

Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC) Partial Reversal Example Nodes that reverse dest Link failure

Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC) Partial Reversal Example Nodes that reverse dest Link failure

Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC) Partial Reversal Example dest Nodes that reverse Link failure

Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC) Partial Reversal Example dest Nodes that reverse Link failure

Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC) Height-Based Formulation of Partial Reversal  We associate with every node a triple where and are integers.  The set of triples are ordered lexicographically. Let N be the set of nodes in the network.  The initial set of triples satisfies for all, and for any link we have if and only if link in the initial DAG is directed from to

Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC) Height-Based Formulation of Partial Reversal  The set of triples forms a total order and the directed graph is loop-free regardless of the values for and.  The triple associated with each node can be viewed as a height and links are directed from higher to lower height.  The parameter is a reference level and and differentiate the relative node heights with a common reference level.

Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC) Changing Heights  A new iteration of the distributed algorithm is triggered when one or more of the nodes do not have any downstream links.  Suppose is the set of one-hop neighbours of node. The k-th iteration is implemented in the following way.

Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC) Changing Heights  A node, other than the destination, for which, increases to and sets : If there exists a neighbour with ; otherwise,  For all other nodes : and

Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC) Example of Height Modification in Partial Reversal Link failure (0,4,1)(0,3,2)(0,2,3)(0,5,4) (0,2,5) (0,1,6) (0,0,0) Dest Nodes that modify heights

Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC) Example of Height Modification in Partial Reversal Link failure (0,4,1)(0,3,2)(0,2,3)(0,5,4) (0,2,5) (1,1,6) (0,0,0) Dest Nodes that modify heights

Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC) Example of Height Modification in Partial Reversal Link failure (0,4,1)(0,3,2)(1,0,3)(0,5,4) (1,0,5) (1,1,6) (0,0,0) Dest Nodes that modify heights

Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC) Example of Height Modification in Partial Reversal (0,4,1)(1,-1,2)(1,0,3)(0,5,4) (1,0,5) (1,1,6) (0,0,0) Dest Link failure Nodes that modify heights

Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC) Example of Height Modification in Partial Reversal Link failure (1,-2,1)(1,-1,2)(1,0,3)(0,5,4) (1,0,5) (1,1,6) (0,0,0) Dest Nodes that modify heights

Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC) Properties of Partial Reversal  The DAG is transformed from destination- disoriented to destination-oriented at the end of the partial reversal.  No node with a valid route to the destination ever participates in the reversal process.  A valid route is a sequence of directed links from a node to the destination.

Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC) Partial Reversal is Loop Free Proof by contradiction: Assume there is a loop, then k This is impossible since the heights have a total order.

Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC) Routing Using the GF Algorithm  The GF algorithm is completely distributed and each node executes the algorithm independently.  Suppose a node i has a packet for a destination node D. Either i wants to send the packet to D, or some other node j has sent the packet to i.  In either case, i forwards the packet to one of its downstream neighbours.  Since the network is a DAG, i will never get back this packet again and the packet will reach its destination D.

Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC) Getting Information from Neighbours  Each node exchanges information with its neighbours to keep track of the neighbours´ height.  Recall that each node has a height for each destination. Hence, each node needs to keep a list of heights for all the destinations in the network.  Each node exchanges this list with its neighbours periodically.

Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC) DAG Maintenance  A node forwards its packet for a destination D either if it does not need to reverse its links in the DAG for D, or when it has completed reversing its links.  Note that there are potentially N DAGs for a network with N nodes because each node may be a destination.  The link reversals are done independently for each DAG depending on a node´s situation with respect to that DAG.

Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC) Properties of Gafni-Bertsekas Algorithm  The GF algorithm has many good properties, e.g., maintaining multiple routes, only local propagation of network modification, loop freedom etc.  However, the GF algorithm works only for connected networks and cannot be used in general for mobile ad hoc networks.