PROXY FOR CONNECTIVITY We consider the k shortest edge disjoint paths between a pair of nodes and define a hyperlink, whose ‘connectivity’ is defined as:

Slides:



Advertisements
Similar presentations
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Advertisements

1 GPSR: Greedy Perimeter Stateless Routing for Wireless Networks B. Karp, H. T. Kung Borrowed slides from Richard Yang.
CS4550: Computer Networks II network layer basics 3 routing & congestion control.
Rumor Routing in Sensor Networks David Braginsky and Deborah Estrin Presented By Tu Tran 1.
Ranveer Chandra , Kenneth P. Birman Department of Computer Science
Generated Waypoint Efficiency: The efficiency considered here is defined as follows: As can be seen from the graph, for the obstruction radius values (200,
MANETs Routing Dr. Raad S. Al-Qassas Department of Computer Science PSUT
June 3, A New Multipath Routing Protocol for Ad Hoc Wireless Networks Amit Gupta and Amit Vyas.
1 LINK STATE PROTOCOLS (contents) Disadvantages of the distance vector protocols Link state protocols Why is a link state protocol better?
Routing Strategies Fixed Routing
Effects of Applying Mobility Localization on Source Routing Algorithms for Mobile Ad Hoc Network Hridesh Rajan presented by Metin Tekkalmaz.
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 22 Introduction to Computer Networks.
Efficient Hop ID based Routing for Sparse Ad Hoc Networks Yao Zhao 1, Bo Li 2, Qian Zhang 2, Yan Chen 1, Wenwu Zhu 3 1 Lab for Internet & Security Technology,
Adaptive Routing Proshanto Mukherji CSC 457: Computer Networks University of Rochester.
Before start… Earlier work single-path routing in sensor networks
Ad Hoc Networks Routing
Chapter 10 Introduction to Wide Area Networks Data Communications and Computer Networks: A Business User’s Approach.
CS541 Advanced Networking 1 Mobile Ad Hoc Networks (MANETs) Neil Tang 02/02/2009.
CS541 Advanced Networking 1 Routing and Shortest Path Algorithms Neil Tang 2/18/2009.
Highly Dynamic Destination- Sequenced Distance-Vector Routing (DSDV) for Mobile Computers C. E. Perkins & P. Bhagwat Presented by Paul Ampadu.
Spring Routing & Switching Umar Kalim Dept. of Communication Systems Engineering 06/04/2007.
Routing Protocol Pertemuan 21 Matakuliah: H0484/Jaringan Komputer Tahun: 2007.
Layer-3 Routing Natawut Nupairoj, Ph.D. Department of Computer Engineering Chulalongkorn University.
Ad Hoc Wireless Routing COS 461: Computer Networks
Slicing the Onion: Anonymity Using Unreliable Overlays Sachin Katti Jeffrey Cohen & Dina Katabi.
1 Pertemuan 20 Teknik Routing Matakuliah: H0174/Jaringan Komputer Tahun: 2006 Versi: 1/0.
WAN technologies and routing Packet switches and store and forward Hierarchical addresses, routing and routing tables Routing table computation Example.
Mobile Routing protocols MANET
“Intra-Network Routing Scheme using Mobile Agents” by Ajay L. Thakur.
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Chapter 5 Network Layer.
SRL: A Bidirectional Abstraction for Unidirectional Ad Hoc Networks. Venugopalan Ramasubramanian Ranveer Chandra Daniel Mosse.
1 Computer Communication & Networks Lecture 21 Network Layer: Delivery, Forwarding, Routing Waleed.
TELE202 Lecture 6 Routing in WAN 1 Lecturer Dr Z. Huang Overview ¥Last Lecture »Packet switching in Wide Area Networks »Source: chapter 10 ¥This Lecture.
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
DSDV Destination-Sequenced Distance-Vector Routing Protocol
Teknik Routing Pertemuan 10 Matakuliah: H0524/Jaringan Komputer Tahun: 2009.
a/b/g Networks Routing Herbert Rubens Slides taken from UIUC Wireless Networking Group.
Data Communications and Networks Chapter 1 - Classification of network topologies Data Communications and Network.
A Framework for Reliable Routing in Mobile Ad Hoc Networks Zhenqiang Ye Srikanth V. Krishnamurthy Satish K. Tripathi.
Graphs Upon completion you will be able to:
Spring 2000CS 4611 Routing Outline Algorithms Scalability.
Load Balanced Link Reversal Routing in Mobile Wireless Ad Hoc Networks Nabhendra Bisnik, Alhussein Abouzeid ECSE Department RPI Costas Busch CSCI Department.
Ad Hoc On-Demand Distance Vector Routing (AODV) ietf
A Multicast Routing Algorithm Using Movement Prediction for Mobile Ad Hoc Networks Huei-Wen Ferng, Ph.D. Assistant Professor Department of Computer Science.
Spring Routing: Part I Section 4.2 Outline Algorithms Scalability.
Improving Fault Tolerance in AODV Matthew J. Miller Jungmin So.
Distance Vector Routing
CS 6401 Intra-domain Routing Outline Introduction to Routing Distance Vector Algorithm.
Performance Comparison of Ad Hoc Network Routing Protocols Presented by Venkata Suresh Tamminiedi Computer Science Department Georgia State University.
COMPUTER NETWORKS CS610 Lecture-17 Hammad Khalid Khan.
CSE 373: Data Structures and Algorithms Lecture 21: Graphs V 1.
Routing algorithms. D(v): the cost from the source node to destination that has currently the least cost. p(v): previous node along current least.
Delay-Tolerant Networks (DTNs)
(How the routers’ tables are filled in)
What is a router? A router is a device that connects multiple computers together. Not to be confused with a switch Routers transmit packets of data across.
Sensor Network Routing
任課教授:陳朝鈞 教授 學生:王志嘉、馬敏修
ECE 544 Protocol Design Project 2016
Routing in Packet Networks Shortest Path Routing
CS223 Advanced Data Structures and Algorithms
High Throughput Route Selection in Multi-Rate Ad Hoc Wireless Networks
Graphs Chapter 11 Objectives Upon completion you will be able to:
Intradomain Routing Outline Introduction to Routing
A Probabilistic Routing Protocol for Mobile Ad Hoc Networks
Communication Networks
Advanced Computer Networks
Communication Networks
COMPUTER NETWORKS CS610 Lecture-16 Hammad Khalid Khan.
DSDV Destination-Sequenced Distance-Vector Routing Protocol
Routing in Mobile Wireless Networks Neil Tang 11/14/2008
Presentation transcript:

PROXY FOR CONNECTIVITY We consider the k shortest edge disjoint paths between a pair of nodes and define a hyperlink, whose ‘connectivity’ is defined as: 1 - ∏(1 – pathval(S,D,i)), where i=1,2, …, k and pathval(S,D,i) is the cost of the i th shortest path between S and D Key Design Choices – What and Why? Caveats: Loops! Routing in Rapidly Fluctuating Stochastic Networks Arka Bhattacharya and Shaunak Chatterjee, UC Berkeley Problem Definition and Challenges PROBLEM STATEMENT A network is represented as a graph G=(V,E,P), where V : the set of vertices (nodes), E : the set of edges P : matrix containing availability probability of edges The objective is to devise protocols for routing when the edge availability (i.e. P matrix) fluctuates rapidly. Problem Definition and Challenges PROBLEM STATEMENT A network is represented as a graph G=(V,E,P), where V : the set of vertices (nodes), E : the set of edges P : matrix containing availability probability of edges The objective is to devise protocols for routing when the edge availability (i.e. P matrix) fluctuates rapidly. Why we chose XL? XL is a link state algorithm which suppresses certain updates while still maintaining performance guarantees. We wanted our implementation to be able to provide similar performance guarantees. The multipath metrics are also compatible with other algorithms like distance vector and various hierarchical algorithms. Algorithm Overview Step 1: Forming Hyperlinks For each node pair which has a c-hop or shorter path between them, form the hyperlink by finding the k-shortest edge- disjoint paths. Use a multipath metric Step 2: Updating 2.1. When a link’s value changes, all nodes within its c-hop neighborhood are informed of the change. These nodes update relevant hyperlinks Hyperlink value updates are sent or suppressed using XL. Hyperlink values are less sensitive to link value changes. Step 3: Routing The route is determined using Dijkstra’s on the hyperlinks. When a packet arrives at a node, it routes it to the next node on the best available path to the hyperlink destination along the shortest hyperlink path to the packet destination. MULTIPLE PATHS? Experiments WHY CONVENTIONAL ROUTING WILL FAIL Link State Algorithms: Too many updates (fluctuations are rapid) Any other best path based algorithm will perform erratically since the best path will fluctuate a lot. In the worst case, o The current best path can deteriorate drastically o Updates about the best path will not arrive quickly enough Maintaining information about multiple best paths would be useful Pros: At least one good path despite fluctuations Dense regions for routing Routes fluctuate less compared to constituent links Larger temporal validity Cons: More critical links  more updates Increased complexity of route computation and maintenance “Connectivity” metric Successful routing depends more on existence of a path than on the best path S D X Y P Q SHORT PATHS IN HYPERLINKS Hyperlink source is sent updates about every constituent link Long paths  temporally invalid updates Large control overhead Thus, we limit each path to at most c hops ROUTING THROUGH HYPERLINKS Hyperlinks capture the redundancy information between a pair of nodes Shortened path hyperlinks capture local redundancies Thus, we route using the hyperlinks instead of the links to exploit the redundancies B3B3 B2B2 B1B1 C2C2 C3C3 C1C1 D xx x x xx x xx A B1 is the first hop from A to D along the best path in the A-D hyperlink B3B3 B2B2 B1B1 C2C2 C3C3 C1C1 D x x x x xx x xx A A is the first hop from B1 to D along the best path using the B1-A and A-D hyperlinks Other multipath metrics 1. Edge-wise sampling The connectivity metric is analogous to path-wise sampling. We can modify it to a metric representing edge-wise sampling. 2. Expected time The expected time to successfully send a packet down a link with probability p is (1/p). This can be used as the cost of the link to then perform routing. The multipath metric will reflect the expected time for a packet to travel across a hyperlink following a decision criterion which is again based on expected transmission time. Mathematical details are outlined in the accompanying report. Random graphs having 10,20,30 and 40 nodes were generated with varying amounts of redundancy. Similar trends were noticed, so we report results for n=40. The gains are not significant, but the ‘Expected time’ metric could yield much better results. The ‘overhead’ metric reported is the number of update messages per node per link value change. Fig 3. Redundancy is helpful. Higher values of k benefit more (n=40). Fig 5. Avg. transmission time also insensitive to epsilon (c=3, n=40) Fig 4. Overhead is insensitive to the value of epsilon (c=3, n=40) Fig 1. Avg. Transmission time vs Overhead (c=2, n=40) Fig 2. Avg. Transmission time vs Overhead (c=3, n=40) Conclusions The benefits are small and not significant, even for a high overhead The hyperlink cost metric used is not optimizing the performance metric Existence of more redundant paths improves transmission time