...Project Report CS239: Computational Geometry Optimal Packet Routing Scheme with Multiple Sources and Multiple Destinations Submitted by (403-134-387) Winter 2004 Input / Problem The idea of the problem originates from the need of online companies like amazon, netflix, etc, to send the merchandize purchased by customers. The customers are located at different places. How these packets are routed so as to minimize the cost is a big problem. Most of the times these stores have multiple distribution centers or outlets from where the demand can be met. Thus the problem takes the shape of multiple source, multiple, multiple destinations. Given ‘n’ Source points (Distribution centers), and ‘m’ destination/consumer points. Location of the distribution and destination points described in their (x,y) co-ordinates. The measure of cost is the distance metric (length of the route). Output The output of the problem would be, which distribution center would serve which destination points and how the packet would be routed to minimize cost. Note: If the routes are represented as a graph then the graph would be a disconnected graph, depending on what destination nodes are served by which distribution center node. What is known? The general case of this problem, without any restrictions, can be modeled as Steiner Tree problem. It is a well known problem and its computation has been shown to be NPHard, by Garey, Graham and Johnson (1976). Approach In this analysis...
Words: 2950 - Pages: 12
...vehicles in mobility and provides interim connectivity to vehicles. One of the major advantages of VANETs over MANETs is the unlimited battery power generated on the fly. VANET plays a major role in defining safety measures by streaming communication between vehicles, infotainment and telematics. In any generic network phenomena the concept of routing and its characteristics are highly linked with Quality of Service (QoS). The United Nations Consultative Committee for International Telephony and Telegraphy (CCITT) Recommendation E.800 has defined QoS as: “The collective effect of service performance which determines the degree of satisfaction of a user of the service”. The major concern of VANET routing is that whether the performance can satisfy the throughput and delay requirements of such media streaming applications. Unavailability of efficient routing algorithms for the VANET scenario, force the researchers to use the MANET routing algorithms. An analysis of VANET routing protocols shows that its performance is not acceptable due to the feature of very high mobility in terms of speed[3]. Its adverse effect leads to broken links, with high packet drop and overhead due to missing route repairs or failure. This phenomenon...
Words: 1550 - Pages: 7
...in which we can keep a check on the number of duplicate packets generated due to the Flooding Routing technique? - Hop Count: A number of potential hops is included in the header of the packet. If the sender knows how many hops it will take to get to the destination the hop count is set to that number. If it doesn’t, it sets the hop count to the highest possible number of hops in the network. Then, each time the transmission hops the hop count is reduced by one. When it reaches zero, that individual transmission is discarded as at this point one of the many flooded transmissions should have been delivered and any extras can be discarded. - Selective Flooding: In selective flooding, as opposed to sending the transmission...
Words: 738 - Pages: 3
...for OLSR Routing Protocol in MANET Kirti Aniruddha Adoni1 and Radhika D. Joshi2 1 Modern College of Engineering, Shivaji Nagar, University of Pune, , India akirti2008@gmail.com, k_adoni@rediffmail.com 2 College of Engineering, University of Pune, India rdj.extc@coep.ac.in ABSTRACT Mobile Adhoc Network (MANET) eliminates the complexity associated with an infrastructure networks. Wireless devices are allowed to communicate on the fly for applications. It does not rely on base station to coordinate the flow of the nodes in the network. This paper introduces an algorithm of multipath OLSR (Optimized Link State Routing) for energy optimization of the nodes in the network. It is concluded that this solution improves the number of nodes alive by about 10 to 25% by always choosing energy optimized paths in the network with some increase in normalized routing overheads. KEYWORDS OLSR, multipath, Energy Optimization, Nodes Alive, Overheads 1. INTRODUCTION A Mobile Adhoc NETwork (MANET) is a multi-hop, distributed and self configuration network[1].The communication between two distant nodes is through the number of intermediate nodes which relays the information from one point to another. As nodes can move randomly within the network, routing packets between any pair of nodes become a challenging task. A route that is believed to be optimal for energy utilization at certain time might not be optimal at all, few moments later.[4] Traditional proactive routing protocols[3...
Words: 3772 - Pages: 16
...A Distributed Joint Channel-Assignment, Scheduling and Routing Algorithm for Multi-Channel Ad Hoc Wireless Networks Xiaojun Lin and Shahzada Rasool School of Electrical and Computer Engineering, Purdue University West Lafayette, IN 47907, U.S.A. {linx,srasool}@ecn.purdue.edu Abstract— The capacity of ad hoc wireless networks can be substantially increased by equipping each network node with multiple radio interfaces that can operate on multiple non-overlapping channels. However, new scheduling, channelassignment, and routing algorithms are required to fully utilize the increased bandwidth in multi-channel multi-radio ad hoc networks. In this paper, we develop a fully distributed algorithm that jointly solves the channel-assignment, scheduling and routing problem. Our algorithm is an online algorithm, i.e., it does not require prior information on the offered load to the network, and can adapt automatically to the changes in the network topology and offered load. We show that our algorithm is provably efficient. That is, even compared with the optimal centralized and offline algorithm, our proposed distributed algorithm can achieve a provable fraction of the maximum system capacity. Further, the achievable fraction that we can guarantee is larger than that of some other comparable algorithms in the literature. I. I NTRODUCTION Multi-channel multi-radio ad hoc wireless networks have recently received a substantial amount of interest, especially under...
Words: 8961 - Pages: 36
...(PIM). Define multiprotocol BGP. Learn how Multicast Source Discovery Protocol (MSDP) works. Explain reliable multicast: PGM. Internet Protocol Multicast Background Internet Protocol (IP) multicast is a bandwidth-conserving technology that reduces traffic by simultaneously delivering a single stream of information to thousands of corporate recipients and homes. Applications that take advantage of multicast include videoconferencing, corporate communications, distance learning, and distribution of software, stock quotes, and news. IP Multicast delivers source traffic to multiple receivers without adding any additional burden on the source or the receivers while using the least network bandwidth of any competing technology. Multicast packets are replicated in the network by Cisco routers enabled with Protocol Independent Multicast (PIM) and other supporting multicast protocols resulting in the most efficient delivery of data to multiple receivers possible. All alternatives require the source to send more than one copy of the data. Some even require the source to send an individual copy to each receiver. If there are thousands of receivers, even low-bandwidth applications benefit from using Cisco IP Multicast. High-bandwidth applications, such as MPEG video, may require a large portion of the available network bandwidth for a single stream. In these applications, the only way to send to more than one receiver simultaneously is by using IP Multicast. Figure 43-1 demonstrates how...
Words: 6080 - Pages: 25
...1 Multicast Capacity in MANET with Infrastructure Support Zhenzhi Qian, Xiaohua Tian, Xi Chen, Wentao Huang and Xinbing Wang Department of Electronic Engineering Shanghai Jiao Tong University, China Email: {199012315171, xtian, qfbzcx, yelohuang, xwang8}@sjtu.edu.cn ! Abstract—We study the multicast capacity under a network model featuring both node’s mobility and infrastructure support. Combinations between mobility and infrastructure, as well as multicast transmission and infrastructure, have already been showed effective ways to increase it. In this work, we jointly consider the impact of the above three factors on network capacity. We assume that m static base stations and n mobile users are placed in an ad hoc network. A general mobility model is adopted, such that each user moves within a bounded distance from its home-point with an arbitrary pattern. In addition, each mobile node serves as a source of multicast transmission, which results in a total number of n multicast transmissions. We focus on the situations in which base stations actually benefit the capacity improvement, and find that multicast capacity in a mobile hybrid network falls into several regimes. For each regime, reachable upper and lower bounds are derived. Our work contains theoretical analysis of multicast capacity in hybrid networks and provides guidelines for the design of real hybrid system combing cellular and ad hoc networks. 1 Index Terms—Wireless ad hoc network; multicast capacity; mobility;...
Words: 6686 - Pages: 27
...Useful when number of traffic session is much lower than the number of nodes. . No routing structure created a priori. Two key methods for route discovery: . Source routing . Backward routing . Introduce delay. Examples: AODV Ad hoc on demand distance vector routing Route Discovery Process . Source node initiates path discoverer process by broadcasting RREQ. . RREQ is forwarded until it reaches an intermediate node that has recent route information about the destination or till it reaches the destination. . The RREQ uses sequence numbers to ensure that the routes are loop free and reply contains latest information only. 15 Route Reply Process . When a node forwards a route request packet to its neighbor; it also records in the table the node from which the first copy of the request came. . This table is used to construct the reverse path for the RREQ. . As the RREQ traverses back to the source, the nodes along the path enter the forward route into their tables. . If one of the intermediate nodes move then the moved nodes neighbor realizes the link failure and sends a link failure notification to its upstream neighbors and so on till it reaches the source. . Route Error Packets are used to erase broken...
Words: 4647 - Pages: 19
...Each node keeps its sequence number and broadcast ID. For every RREQ the node originates broadcast ID which is increased and together with the node's IP address uniquely identifies an RREQ. At the end that route will be the concluding route that has the minimum hop count from source to destination. 2. Proactive Protocols: - It keeps the routing data even before it is desired. They try to keep up to date information from each node to every other node in the network. Routes data is generally kept in the routing tables and is occasionally updated as the network topology differs. Proactive routing protocols are driven with the help of tables. The routes are updated continuously and when a node wants to route packets to another node, it uses an already available route. These protocols maintain routes to all possible destinations even...
Words: 1800 - Pages: 8
...1 Describe the difference between distance-vector and link-state dynamic routing protocols. Give an example of each. Distance vector routing is so named because it involves two factors: the distance, or metric, of a destination, and the vector, or direction to take to get there. Routing information is only exchanged between directly connected neighbors. This means a router knows from which neighbor a route was learned, but it does not know where that neighbor learned the route; a router can't see beyond its own neighbors. This aspect of distance vector routing is sometimes referred to as "routing by rumor." Measures like split horizon and poison reverse are employed to avoid routing loops. Link-state routing, in contrast, requires that all routers know about the paths reachable by all other routers in the network. Link-state information is flooded throughout the link-state domain (an area in OSPF or IS-IS) to ensure all routers poses a synchronized copy of the area's link-state database. From this common database, each router constructs its own relative shortest-path tree, with itself as the root, for all known routes. A Comparison: Link State vs. Distance Vector If all routers were running a Distance Vector protocol, the path or 'route' chosen would be from A B directly over the ISDN serial link, even though that link is about 10 times slower than the indirect route from A C D B. [pic] A Link State protocol would choose the A C D B path because it's using a...
Words: 1070 - Pages: 5
...Preface A large class of routing protocols for MANETs, namely, reactive protocols, employs some form of caching to reduce the no. of route discoveries .the simplest form of caching is based on associating a timeout with each cache entry. Such timer based cache scheme can increase the protocol efficiency. However the timeout is not well tuned, a sever performance degradation arises as entries are removed either too early or too late from the cache . In this paper, we address the problem designing a proactive protocol scheme that does not rely on any timer-based mechanism. This scheme guarantees that valid cached routes are never removed while stale routes are removed aggressively .This proactive caching scheme has been embedded in the Zone Routing Protocol (ZRP) framework. 1: INTRODUCTION The term MANET (Mobile Adhoc Network)refers to a multihop packet based wireless network composed of a set of mobile nodes that can communicate and move at the same time , without using any kind of fixed wired infrastructure. MNET are actually self organizing and adaptive networks that can be formed and deformed on-the-fly without the need of any centralized administration. As for other packet data networks, one –to-one communication in a MANET is achieved by unicast routing each single packet. Routing in MANET is challenging due to the constraints existing on the transmission...
Words: 2723 - Pages: 11
...Mobile ad-hoc network is wireless network composed of different nodes communicate with each other without having to establish infrastructure. The security of such network is a major concern. To improve the security of such network, technique proposed here is securing routing protocol AODV through the use of Symmetric Encryption algorithm AES. This secures the data as well as preserves the confidentiality. Further future work to be carried as of node authentication using IP address and using the AODV routing protocol and digital signature scheme. Keywords-- Mobile ad-hoc, symmetric encryption algorithm, confidentiality, AODV, Digital signature, IP address The nodes involved in a MANET should collaborate amongst themselves and each node acts as a relay as needed, to implement functions e.g. security and routing. C] Multihop Routing: Basic types of ad hoc routing algorithms can be singlehop and multihop, based on different link layer attributes and routing protocols. Single-hop MANET is simpler than multihop in terms of structure and implementation, with the cost of lesser functionality and applicability. When delivering data packets from a source to its destination out of the direct wireless transmission range, the packets should be forwarded via one or more intermediate nodes D] Light –weight Terminal: In most cases, the MANET nodes are mobile devices with less CPU processing capability, small memory size, and low power storage. Such devices need optimized algorithms and mechanisms...
Words: 2868 - Pages: 12
...2013 Implementation and Evaluation of Wireless Mesh Networks on MANET Routing Protocols Shashi Bhushan1,Anil Saroliya2 ,Vijander Singh3 Research Scholar, Computer Science, Amity University, Jaipur, India 1 Assistant Professor, Computer Science, Amity University, Jaipur, India 2 Senior Lecturer, Computer Science, Amity University, Jaipur, India 3 Abstract—Wireless Mesh Network (WMN) is a kind of network which is made up of Mesh router and Mesh clients where Mesh router having lesser mobility and form the heart of WMNs. In this paper, Wireless Mesh Network over MANET implemented using routing protocols such as AODV, DSR. In this work NS-2.34 simulator is used for simulations. Various measurements and calculations were figure out in this work like throughput, Average end-end delay, PDR, NRL and Routing packets in Random way point mobility model. WMN have features such as self configuration, self healing and low cost of equipment. This work specifically aims to study the performance of routing protocols in a wireless mesh network, where static mesh routers and mobile clients participate together to implement networks functionality such as routing and packet forwarding in different mobility scenarios Keywords- Ad hoc Network, Routing Protocols, Wireless Mesh Network, Performance, Throughput, PDR, NRL and Routing packets in Random way point mobility model, Simulation on Network simulator NS-2, AODV,DSR , Routing Overhead. I. INTRODUCTION A Mobile Ad-hoc network (MANET) is an autonomous...
Words: 4335 - Pages: 18
...©2010 International Journal of Computer Applications (0975 - 8887) Volume 1 – No. 17 Routing Approaches in Delay Tolerant Networks: A Survey R. J. D'Souza National Institute of Technology Karnataka, Surathkal, India Johny Jose National Institute of Technology Karnataka, Surathkal, India ABSTRACT Delay Tolerant Networks (DTNs) have evolved from Mobile Ad Hoc Networks (MANET). It is a network, where contemporaneous connectivity among all nodes doesn’t exist. This leads to the problem of how to route a packet from one node to another, in such a network. This problem becomes more complex, when the node mobility also is considered. The researchers have attempted to address this issue for over a decade. They have found that communication is possible in such a challenged network. The design of routing protocol for such networks is an important issue. This work surveys the literature and classifies the various routing approaches. discontinuity in the network. There are also methods that have employed additional mobile nodes, to provide better message delivery. Researchers are even exploring how the social interaction of humans can be utilized for routing in a DTN. This survey has made an extensive study of the various routing strategies taken by the researchers in the past few years. We have classified them based on the type of knowledge used for routing. 2. FLOODING BASED APPROACHES Knowledge about the network helps in deciding the best next hop. It can happen that the...
Words: 6818 - Pages: 28
...The following table compares the functions performed at each OSI model layer. Layer | Description and Keywords | Application (Layer 7) | The Application layer integrates network functionality into the host operating system, and enables network services. The Application layer does not include specific applications that provide services, but rather provides the capability for services to operate on the network.Most Application layer protocols operate at multiple layers down to the Session and even Transport layers. However, they are classified as Application layer protocols because they start at the Application layer (the Application layer is the highest layer where they operate). Services typically associated with the Application layer include: * HTTP * Telnet * FTP * TFTP * SNMP | Presentation (Layer 6) | The Presentation layer formats or "presents" data into a compatible form for receipt by the Application layer or the destination system. Specifically, the Presentation layer ensures: * Formatting and translation of data between systems. * Negotiation of data transfer syntax between systems, through converting character sets to the correct format. * Encapsulation of data into message envelopes by encryption and compression. * Restoration of data by decryption and decompression. | Session (Layer 5) | The Session layer's primary function is managing the sessions in which data is transferred. Functions at this layer include: * Management of multiple sessions...
Words: 836 - Pages: 4