Application-specific Topology-independent Routing for Multi-hop Wireless Networks

Application-specific Topology-independent Routing for Multi-hop Wireless Networks PDF Author: Mustafa Omer Kilavuz
Publisher:
ISBN:
Category : Electronic books
Languages : en
Pages : 206

Get Book Here

Book Description
Provisioning of rich routing building blocks to mobile ad-hoc networking applications has been of high interest. Several multi-hop wireless network applications need flexibility in describing paths their traffic will follow. To accommodate this need, previous work has proposed several viable routing schemes such as Dynamic Source Routing (DSR) and Trajectory-Based Routing (TBR). However, tradeoffs involved in the interaction of these routing schemes and the application-specific requirements or constraints have not been explored. Particularly, techniques to help the application to do the right routing choices based on a desired metric are much needed. Depending on the application's goals, routing choices should be steered for different metrics rather than the traditional notion of shortest-path in terms of distance. For instance, obstacle or hostility avoidance would require "accurate" paths, end-to-end traffic engineering/balancing would require "minimum utilization" paths, low delay routing for multimedia traffic would require "short distance" paths, and, finally, low loss routing for reliable end-to-end transfers would require "minimum congestion" paths. Our focus in this dissertation is the "accuracy" of paths. First, we consider techniques that minimize routing protocol state costs under application-based constraints. We study the constraint of "accuracy" of the application's desired route, as this constraint provides a range of choices to the applications. As a crucial part of this optimization framework, we investigate the tradeoff between the packet header size and the network state. We, then, apply our framework to the case of TBR with application-based accuracy constraints in obeying a given trajectory and show that approximating trajectories under such accuracy constraints is NP-hard. We develop heuristics solving this problem and illustrate their performance. Second, we take our TBR framework to a more general solution by adding automated trajectory generator and end-to-end traffic engineering support. We focus on the context of multi-hop wireless protocols for which application-specific needs are emphasized along with a highly dynamic underlying network environment. We propose a framework supporting a standardized way of interfacing between the network routing and the wireless applications. We use this framework to develop a roadmap-based trajectory planning scheme to engineer the end-to-end traffic over multi-hop wireless networks. We illustrate how our roadmap-based approach can automate the process of planning/selecting the trajectories so that better balancing of the traffic is achieved. We compare our roadmap-based trajectory planning approach to its shortest-path routing counterpart, Greedy Parameter Stateless Routing (GPSR), and show that beneficial tradeoffs can be attained.

Application-specific Topology-independent Routing for Multi-hop Wireless Networks

Application-specific Topology-independent Routing for Multi-hop Wireless Networks PDF Author: Mustafa Omer Kilavuz
Publisher:
ISBN:
Category : Electronic books
Languages : en
Pages : 206

Get Book Here

Book Description
Provisioning of rich routing building blocks to mobile ad-hoc networking applications has been of high interest. Several multi-hop wireless network applications need flexibility in describing paths their traffic will follow. To accommodate this need, previous work has proposed several viable routing schemes such as Dynamic Source Routing (DSR) and Trajectory-Based Routing (TBR). However, tradeoffs involved in the interaction of these routing schemes and the application-specific requirements or constraints have not been explored. Particularly, techniques to help the application to do the right routing choices based on a desired metric are much needed. Depending on the application's goals, routing choices should be steered for different metrics rather than the traditional notion of shortest-path in terms of distance. For instance, obstacle or hostility avoidance would require "accurate" paths, end-to-end traffic engineering/balancing would require "minimum utilization" paths, low delay routing for multimedia traffic would require "short distance" paths, and, finally, low loss routing for reliable end-to-end transfers would require "minimum congestion" paths. Our focus in this dissertation is the "accuracy" of paths. First, we consider techniques that minimize routing protocol state costs under application-based constraints. We study the constraint of "accuracy" of the application's desired route, as this constraint provides a range of choices to the applications. As a crucial part of this optimization framework, we investigate the tradeoff between the packet header size and the network state. We, then, apply our framework to the case of TBR with application-based accuracy constraints in obeying a given trajectory and show that approximating trajectories under such accuracy constraints is NP-hard. We develop heuristics solving this problem and illustrate their performance. Second, we take our TBR framework to a more general solution by adding automated trajectory generator and end-to-end traffic engineering support. We focus on the context of multi-hop wireless protocols for which application-specific needs are emphasized along with a highly dynamic underlying network environment. We propose a framework supporting a standardized way of interfacing between the network routing and the wireless applications. We use this framework to develop a roadmap-based trajectory planning scheme to engineer the end-to-end traffic over multi-hop wireless networks. We illustrate how our roadmap-based approach can automate the process of planning/selecting the trajectories so that better balancing of the traffic is achieved. We compare our roadmap-based trajectory planning approach to its shortest-path routing counterpart, Greedy Parameter Stateless Routing (GPSR), and show that beneficial tradeoffs can be attained.

Routing for Wireless Multi-Hop Networks

Routing for Wireless Multi-Hop Networks PDF Author: Sherin Abdel Hamid
Publisher: Springer Science & Business Media
ISBN: 1461463572
Category : Computers
Languages : en
Pages : 81

Get Book Here

Book Description
The focus of this brief is to identify what unifies and what distinguishes the routing functions in four wireless multi-hop network paradigms. The brief introduces a generic routing model that can be used as a foundation of wireless multi-hop routing protocol analysis and design. It demonstrates that such model can be adopted by any wireless multi-hop routing protocol. Also presented is a glimpse of the ideal wireless multi-hop routing protocol along with several open issues.

Multihop Wireless Networks

Multihop Wireless Networks PDF Author: Kai Zeng
Publisher: John Wiley & Sons
ISBN: 1119974291
Category : Technology & Engineering
Languages : en
Pages : 211

Get Book Here

Book Description
This book provides an introduction to opportunistic routing an emerging technology designed to improve the packet forwarding reliability, network capacity and energy efficiency of multihop wireless networks This book presents a comprehensive background to the technological challenges lying behind opportunistic routing. The authors cover many fundamental research issues for this new concept, including the basic principles, performance limit and performance improvement of opportunistic routing compared to traditional routing, energy efficiency and distributed opportunistic routing protocol design, geographic opportunistic routing, opportunistic broadcasting, and security issues associated with opportunistic routing, etc. Furthermore, the authors discuss technologies such as multi-rate, multi-channel, multi-radio wireless communications, energy detection, channel measurement, etc. The book brings together all the new results on this topic in a systematic, coherent and unified presentation and provides a much needed comprehensive introduction to this topic. Key Features: Addresses opportunistic routing, an emerging technology designed to improve the packet forwarding reliability, network capacity and energy efficiency of multihop wireless networks Discusses the technological challenges lying behind this new technology, and covers a wide range of practical implementation issues Explores many fundamental research issues for this new concept, including the basic principles of opportunistic routing, performance limits and performance improvement, and compares them to traditional routing (e.g. energy efficiency and distributed opportunistic routing protocol design, broadcasting, and security issues) Covers technologies such as multi-rate, multi-channel, multi-radio wireless communications, energy detection, channel measurement, etc. This book provides an invaluable reference for researchers working in the field of wireless networks and wireless communications, and Wireless professionals. Graduate students will also find this book of interest.

Secure Routing in Multi-Hop Wireless Networks

Secure Routing in Multi-Hop Wireless Networks PDF Author: Gergely Acs
Publisher: LAP Lambert Academic Publishing
ISBN: 9783838387277
Category :
Languages : en
Pages : 116

Get Book Here

Book Description
Routing is a fundamental networking function in every communication system, and multi-hop wireless networks are no exceptions. Attacking the routing service, an adversary can easily paralyse the operation of an entire network. The malicious manipulation of some routing messages results in the dissemination of incorrect routing information which can eventually lead to network malfunction. Even more, intermediate nodes can be corrupted, and thus, exhibit arbitrary behavior. Due to the subtle nature of attacks against routing protocols, informal reasoning about wireless routing security is an error-prone method. In this work, I develop a formal framework in which precise definitions of secure routing can be given, and secure routing protocols proposed for multi-hop wireless networks can be rigorously analysed. I demonstrate the usefulness of this framework in two ways: first, I prove the security of several existing routing protocols. Second, applying the design principles that were identified during the analyses, I propose novel routing protocols for wireless ad hoc and sensor networks and I prove that they are secure in my model.

Resource Allocation and Routing in Multi-hop Wireless Networks

Resource Allocation and Routing in Multi-hop Wireless Networks PDF Author: Yong Ding (Graduate of Michigan State University)
Publisher:
ISBN:
Category : Computer network protocols
Languages : en
Pages : 394

Get Book Here

Book Description


Network Routing

Network Routing PDF Author: Sudip Misra
Publisher: John Wiley & Sons
ISBN: 0470750065
Category : Technology & Engineering
Languages : en
Pages : 448

Get Book Here

Book Description
Network Routing: Fundamentals, Applications and Emerging Technologies serves as single point of reference for both advanced undergraduate and graduate students studying network routing, covering both the fundamental and more moderately advanced concepts of routing in traditional data networks such as the Internet, and emerging routing concepts currently being researched and developed, such as cellular networks, wireless ad hoc networks, sensor networks, and low power networks.

On-Demand Routing in Multi-hop Wireless Mobile Ad Hoc Networks

On-Demand Routing in Multi-hop Wireless Mobile Ad Hoc Networks PDF Author:
Publisher:
ISBN:
Category :
Languages : en
Pages : 190

Get Book Here

Book Description
An ad hoc network is a collection of wireless mobile nodes dynamically forming a temporary network without the use of any preexisting network infrastructure or centralized administration. Routing protocols used in ad hoc networks must automatically adjust to environments that can vary between the extremes of high mobility with low bandwidth, and low mobility with high bandwidth. This thesis argues that such protocols must operate in an on-demand fashion and that they must carefully limit the number of nodes required to react to a given topology change in the network. I have embodied these two principles in a routing protocol called Dynamic Source Routing (DSR). As a result of its unique design, the protocol adapts quickly to routing changes when node movement is frequent, yet requires little or no overhead during periods in which nodes move less frequently. By presenting a detailed analysis of DSR's behavior in a variety of situations, this thesis generalizes the lessons learned from DSR so that they can be applied to the many other new routing protocols that have adopted the basic DSR framework. The thesis proves the practicality of the DSR protocol through performance results collected from a full-scale 8 node testbed, and it demonstrates several methodologies for experimenting with protocols and applications in an ad hoc network environment, including the emulation of ad hoc networks.

Advanced Routing Protocols for Wireless Networks

Advanced Routing Protocols for Wireless Networks PDF Author: Miguel Elias Mitre Campista
Publisher: John Wiley & Sons
ISBN: 1118984927
Category : Technology & Engineering
Languages : en
Pages : 149

Get Book Here

Book Description
This text introduces the principles of routing protocols and metrics as they affect wireless networking environments, specifically in urban areas. Timely because of the recent rise in small city life, this topic includes the consideration of ad hoc, mesh, vehicular, sensor, and delay tolerant networks. These approaches are each unique, and author Miguel Mitre Campista provides a thorough, but accessible, explanation of their individual characteristics for engineers, computer scientists, IT professionals, and curious Internet users.

MAC and Routing Protocols for Multi-hop Wireless Networks

MAC and Routing Protocols for Multi-hop Wireless Networks PDF Author: Chih-Yuan Liao
Publisher:
ISBN:
Category : Computer network protocols
Languages : en
Pages : 51

Get Book Here

Book Description
Abstract: "Wireless systems for industry have mostly used cellular-phone-style radio links, using point-to-point or point-to-multipoint transmission. Past research has indicated that these network architectures are not suitable for several industrial applications because of their rigid structure, meticulous planning requirements, and dropped signals. In contrast, wireless mesh networks are multi-hop systems in which devices assist each other in transmitting packets through the network, and they provide a reliable, flexible system that can be extended to thousands of devices. Some inherent advantages with mesh networks are scalability, non line-of-sight communications, high data rates, and low-cost deployment. Mesh networks have been deployed by MIT researchers and a few companies on a small scale. Mesh networks have not been deployed widely, in part because of some fundamental problems with the current protocols with regards to QoS support and scalability. To meet these requirements, the MAC protocol should be able to guarantee near constant capacity for networks of different sizes, and the routing protocol should perform admission control. Current CSMA-based MAC protocols have been shown to perform inadequately in terms of throughput and scalability in multi-hop deployments. The key problem with using protocols like IEEE 802.11 is that the link throughput is affected severely due to the exposed terminal problem, uncoordinated contentions, and wasteful backoffs. With the 802.11 MAC protocol, our results show that the capacity falls to about 1/10th for a chain and below 1/20th for a grid with horizontal constant bit rate flows. We have developed the WisperNet MAC and routing protocols, which provide end-to-end QoS guarantees over a multi-hop mesh network. By exploiting the topology information and the fact that fixed wireless nodes separated by 3 hops or more can transmit simultaneously, we eliminate collisions and maximize network utilization. The WisperNet routing protocol performs admission control. We show that the WisperNet MAC protocol can guarantee up to 9 times more capacity than IEEE 802.11, and this capacity remains nearly constant as the network grows. Also included is a performance analysis of different routing policies, and their effect on network utilization."

Routing and Topology Control in Multi-hop, Multi-channel, and Multi-radio Wireless Mesh Networks

Routing and Topology Control in Multi-hop, Multi-channel, and Multi-radio Wireless Mesh Networks PDF Author: Eiman Alotaibi
Publisher:
ISBN:
Category :
Languages : en
Pages : 368

Get Book Here

Book Description