DOI QR코드

DOI QR Code

Resilient Packet Transmission (RPT) for the Buffer Based Routing (BBR) Protocol

  • Rathee, Geetanjali (Dept. of Computer Science Engineering & Information Communication Technology, Jaypee University) ;
  • Rakesh, Nitin (Dept. of Computer Science and Engineering, Amity School of Engineering and Technology, Amity University Campus)
  • Received : 2013.08.26
  • Accepted : 2014.01.17
  • Published : 2016.03.31

Abstract

To provide effective communication in the wireless mesh network (WMN), several algorithms have been proposed. Since the possibilities of numerous failures always exist during communication, resiliency has been proven to be an important aspect for WMN to recover from these failures. In general, resiliency is the diligence of the reliability and availability in network. Several types of resiliency based routing algorithms have been proposed (i.e., Resilient Multicast, ROMER, etc.). Resilient Multicast establishes a two-node disjoint path and ROMER uses a credit-based approach to provide resiliency in the network. However, these proposed approaches have some disadvantages in terms of network throughput and network congestion. Previously, the buffer based routing (BBR) approach has been proposed to overcome these disadvantages. We proved earlier that BBR is more efficient in regards to w.r.t throughput, network performance, and reliability. In this paper, we consider the node/link failure issues and analogous performance of BBR. For these items we have proposed a resilient packet transmission (RPT) algorithm as a remedy for BBR during these types of failures. We also share the comparative performance analysis of previous approaches as compared to our proposed approach. Network throughput, network congestion, and resiliency against node/link failure are particular performance metrics that are examined over different sized WMNs.

Keywords

References

  1. O. Kwon and Y. Wen, "An empirical study of the factors affecting social network service use," Journal of Computers in Human Behavior, vol. 26, no. 2, pp. 254-263, 2010. https://doi.org/10.1016/j.chb.2009.04.011
  2. T. Hu, R. S. Poston, and W. J. Kettinger, "Nonadopters of online social network services: is it easy to have fun yet?," Journal of Communications of the Association for Information Systems, vol. 29, no. 1, pp. 441-458, 2011.
  3. M. Manoufali, H. Alshaer, P. Y. Kong, and S. Jimaa, "Technologies and networks supporting maritime wireless mesh communications," in Proceedings of the 6th Joint IFIP Wireless and Mobile Networking Conference (WMNC), Dubai, 2013, pp. 1-8.
  4. W. S. Kim and S. H. Chung, "Design of optimized AODV routing protocol for multi-interface multi-channel wireless mesh networks," in Proceedings of the IEEE 27th International Conference on Advanced Information Networking and Applications (AINA), Barcelona, Spain, 2013, pp. 325-332.
  5. L. Song and Z. B. Xia, "An anycast routing protocol for wireless mesh access network," in Proceeding of the IEEE WASE International Conference on Information Engineering (ICIE , Taiyuan, Shanxi, 2009, pp. 82-85.
  6. B. K. Gupta, B. M. Acharya, and M. K. Mishra, "Optimization of routing algorithm in wireless mesh networks," in Proceedings of the World Congress on Nature & Biologically Inspired Computing (NaBIC 2009), Coimbatore, India, 2009, pp. 1150-1155.
  7. J. Dong, R. Curtmola, and C. Nita-Rotaru, "Secure high-throughput multicast routing in wireless mesh networks," IEEE Transactions on Mobile Computing, vol. 10, no. 5, pp. 653-668, 2011. https://doi.org/10.1109/TMC.2010.194
  8. H. Herrman, D. E. Stewart, N. Diaz-Granados, E. L. Berger, B. Jackson, and T. Yuen, "What is resilience?" Canadian Journal of Psychiatry, vol. 56, no. 5, pp. 258-265, 2011. https://doi.org/10.1177/070674371105600504
  9. H. Mustafa, X. Zhang, Z. Liu, W. Xu, and A. Perrig, "Jamming-Resilient Multipath Routing," IEEE Transactions on Dependable and Secure Computing, vol. 9, no. 6, pp. 852-864, 2012. https://doi.org/10.1109/TDSC.2012.69
  10. N. Rakesh and V. Tyagi, "Failure recovery in XOR'ed networks," in Proceedings of the IEEE International Conference on Signal Processing, Computing and Control (ISPCC), Waknaghat, India, 2012, pp. 1-6.
  11. N. Rakesh and V. Tyagi, V. "Failure detection using contour approach on network coded parallel networks," Procedia Engineering, vol. 38, pp. 763-770, 2012.
  12. S. Lee, B. Bhattacharjee, A. Srinivasan, and S. Khuller, "Efficient and resilient backbones for multihop wireless networks," IEEE Transactions on Mobile Computing, vol. 7, no. 11, pp. 1349-1362, 2008. https://doi.org/10.1109/TMC.2008.69
  13. T. Bu, M. C. Chan, and R. Ramjee, "Connectivity, performance, and resiliency of IP-based CDMA radio access networks," IEEE Transactions on Mobile Computing, vol. 5, no. 8, pp. 1103-1118, 2006. https://doi.org/10.1109/TMC.2006.108
  14. X. Zhao, J. Guo, C. T. Chou, and S. Jha, "Resilient multicasting in wireless mesh networks," in Proceedings of the 13th International Conference on Telecommunications, Polo de Aveiro, Portugal, 2006, pp. 1-4.
  15. Y. Yuan, H. Yang, S. H. Wong, S. Lu, and W. Arbaugh, "ROMER: resilient opportunistic mesh routing for wireless mesh networks," in Proceedings of the IEEE Workshop on Wireless Mesh Networks (WiMesh), 2005, pp. 1-9.
  16. G. Rathee, A. Mundra, N. Rakesh, and S. P. Ghrera, "Buffered based routing and resiliency approach for WMN," in Proceedings of the International Conference on Human Computer Interactions (ICHCI), Chennai, India, 2013, pp. 1-7.
  17. B. K. Gupta, A. Mundra, and N. Rakesh, "Failure detection and recovery in hierarchical network Using FTN approach," International Journal of Computer Science, vol. 10, no. 2, pp. 414-421, 2013.
  18. K. Shah, G. Dua, D. Sharma, P. Mishra, and N. Rakesh, "Transmission of successful route error message (RERR) in routing aware multiple description video coding over mobile ad-hoc network," International Journal of Multimedia & Its Applications, vol. 3, no. 3, pp. 51-59, 2011. https://doi.org/10.5121/ijma.2011.3305
  19. N. Rakesh and V. Tyagi, "Parallel architecture coding: link failure-recovery mechanism (PAC: LF-RM)," International Journal of System Assurance Engineering and Management, vol. 4, no. 4, pp. 386-396, 2012. https://doi.org/10.1007/s13198-012-0119-4

Cited by

  1. Modified AODV (MAODV) Against Black Hole in WMN pp.2250-1762, 2017, https://doi.org/10.1007/s40010-017-0399-9