• Title/Summary/Keyword: Source Routing

Search Result 414, Processing Time 0.033 seconds

Circuit-Switched “Network Capacity” under QoS Constraints

  • Wieselthier, Jeffrey E.;Nguyen, Gam D.;Ephremides, Anthony
    • Journal of Communications and Networks
    • /
    • v.4 no.3
    • /
    • pp.230-245
    • /
    • 2002
  • Usually the network-throughput maximization problem for constant-bit-rate (CBR) circuit-switched traffic is posed for a fixed offered load profile. Then choices of routes and of admission control policies are sought to achieve maximum throughput (usually under QoS constraints). However, similarly to the notion of channel “capacity,” it is also of interest to determine the “network capacity;” i.e., for a given network we would like to know the maximum throughput it can deliver (again subject to specified QoS constraints) if the appropriate traffic load is supplied. Thus, in addition to determining routes and admission controls, we would like to specify the vector of offered loads between each source/destination pair that “achieves capacity.” Since the combined problem of choosing all three parameters (i.e., offered load, admission control, and routing) is too complex to address, we consider here only the optimal determination of offered load for given routing and admission control policies. We provide an off-line algorithm, which is based on Lagrangian techniques that perform robustly in this rigorously formulated nonlinear optimization problem with nonlinear constraints. We demonstrate that significant improvement is obtained, as compared with simple uniform loading schemes, and that fairness mechanisms can be incorporated with little loss in overall throughput.

A Fast Repair Scheme for Failed Paths in Directed Diffusion Routing Protocol (다이렉티드 디퓨전 라우팅 프로토콜에서의 빠른 장애경로 복구 기법1))

  • Choe, Ji-Sul;Lee, Jung-Eun;Kim, Jong-Hun;Kim, Jong-Wan;Kim, Kee-Cheon
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2008.05a
    • /
    • pp.721-724
    • /
    • 2008
  • 무선 센서 네트워크(WSN)를 구성하는 각 센서 노드들의 에너지 관리는 네트워크 전체의 생명주기에 영향을 미치는 요소 중 가장 중요한 요소이다. 센서 노드들은 한번 설치된 이후 짧게는 수개월에서 길게는 몇 년에 걸쳐 동작해야 하기 때문에 배터리에 의존하고 있는 센서 노드들의 에너지를 효율적으로 관리할 수 있는 기술들이 필요하다. Directed Diffusion은 센서 노드에서 수집한 데이터를 네트워크 전체에 브로드캐스팅 하지 않고, 소스(Source)노드로부터 싱크(Sink)노드까지 강화(Reinforce)된 경로를 통해서만 데이터를 전송하여 경로 이외의 노드들의 불필요한 에너지 소모를 줄일 수 있는 라우팅 프로토콜이다. 그러나 기존의 Directed Diffusion에서는 전송 경로 상에 장애가 발생했을 경우 싱크에서 전송한 익스플로러터리 패킷을 기다려야 하며, 장애가 발견되고 재전송되기 전까지 전송된 데이터는 무의미한 데이터가 된다. 본 논문에서는 앞서 언급된 Directed Diffusion의 장애 경로 복구의 문제점을 보완하기 위해 Fast Repair(FR)를 제안한다. FR은 데이터 전송 경로 상에 장애 발생 시 데이터를 재전송 하고 경로를 재설정하는데 효율적이며, 성능평가 결과에서도 기존의 Directed Diffusion에 비하여 향상된 성능을 나타내고 있다.

A Cluster Based Energy Efficient Tree Routing Protocol in Wireless Sensor Networks (광역 WSN 을 위한 클러스팅 트리 라우팅 프로토콜)

  • Nurhayati, Nurhayati;Choi, Sung-Hee;Lee, Kyung-Oh
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2011.04a
    • /
    • pp.576-579
    • /
    • 2011
  • Wireless sensor network are widely all over different fields. Because of its distinguished characteristics, we must take account of the factor of energy consumed when designing routing protocol. Wireless sensor networks consist of small battery powered devices with limited energy resources. Once deployed, the small sensor nodes are usually inaccessible to the user, and thus replacement of the energy source is not feasible. Hence, energy efficiency is a key design issue that needs to be enhanced in order to improve the life span of the network. In BCDCP, all sensors sends data from the CH (Cluster Head) and then to the BS (Base Station). BCDCP works well in a smallscale network however is not preferred in a large scale network since it uses much energy for long distance wireless communication. TBRP can be used for large scale network, but it weakness lies on the fact that the nodedry out of energy easily since it uses multi-hops transmission data to the Base Station. Here, we proposed a routing protocol. A Cluster Based Energy Efficient Tree Routing Protocol (CETRP) in Wireless Sensor Networks (WSNs) to prolong network life time through the balanced energy consumption. CETRP selects Cluster Head of cluster tree shape and uses maximum two hops data transmission to the Cluster Head in every level. We show CETRP outperforms BCDCP and TBRP with several experiments.

Minimizing Cost and Delay in Shared Multicast Trees

  • Koh, Seok-Joo;Yi, Jong-Hwa;Hahm, Jin-Ho;Chin, Byoung-Moon;Park, Chee-Hang
    • ETRI Journal
    • /
    • v.22 no.1
    • /
    • pp.30-37
    • /
    • 2000
  • Existing tree construction mechanisms are classified into source-based trees and center-based trees. The source-based trees produce a source-rooted tree with a low delay. However, for the applications with multiple senders, the management overheads for routing tables and resource reservations are too high. The center-based trees are easy to implement and manage, but a priori configuration of candidate center nodes is required, and the optimization mature such as tree cost and delay is not considered. In this paper, we propose a new multicast tree building algorithm. The proposal algorithm basically builds a non-center based shared tree. In particular, any center node is not pre-configured. In the purposed algorithm, a multicast node among current tree nodes is suitably assigned to each incoming user: Such a node is selected in a fashion that tree cost and the maximum end-to-end delay on the tree are jointly minimized. The existing and proposed algorithms are compared by experiments. In the simulation results, it is shown that the proposed algorithm approximately provides the cost saving of 30% and the delay saving of 10%, compared to the existing approaches. In conclusion, we see that the cost and delay aspects for multicast trees can be improved at the cost of additional computations.

  • PDF

Energy Efficient Cross Layer Multipath Routing for Image Delivery in Wireless Sensor Networks

  • Rao, Santhosha;Shama, Kumara;Rao, Pavan Kumar
    • Journal of Information Processing Systems
    • /
    • v.14 no.6
    • /
    • pp.1347-1360
    • /
    • 2018
  • Owing to limited energy in wireless devices power saving is very critical to prolong the lifetime of the networks. In this regard, we designed a cross-layer optimization mechanism based on power control in which source node broadcasts a Route Request Packet (RREQ) containing information such as node id, image size, end to end bit error rate (BER) and residual battery energy to its neighbor nodes to initiate a multimedia session. Each intermediate node appends its remaining battery energy, link gain, node id and average noise power to the RREQ packet. Upon receiving the RREQ packets, the sink node finds node disjoint paths and calculates the optimal power vectors for each disjoint path using cross layer optimization algorithm. Sink based cross-layer maximal minimal residual energy (MMRE) algorithm finds the number of image packets that can be sent on each path and sends the Route Reply Packet (RREP) to the source on each disjoint path which contains the information such as optimal power vector, remaining battery energy vector and number of packets that can be sent on the path by the source. Simulation results indicate that considerable energy saving can be accomplished with the proposed cross layer power control algorithm.

Analysis of Sediment Reduction with VFS and Diversion Channel with Enhancements in SWAT Landuse-Subbasin Overland Flow and VFS Modules

  • Park, Youn-Shik;Kim, Jong-Gun;Kim, Nam-Won;Engel, Bernie;Lim, Kyoung-Jae
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2009.05a
    • /
    • pp.752-757
    • /
    • 2009
  • In the last decade, many methods such as greet chamber, reservoir, or debris barrier, have been utilized to manage and prevent muddy water problem. The Vegetative Filter Strip (VFS) has been thought to be one of the most effective methods to trap sediment effectively. The VFS are usually installed at the edge of agricultural areas adjacent to stream or drainage ditches, and it has been shown that the VFS effectively removes pollutants transported with upland runoff. But, if the VFS is installed without any scientific analysis of rainfall-runoff characteristics, soil erosion, and sediment analysis, it may not reduce the sediment as much as expected. Although Soil and Water Assessment Tool (SWAT) model has been used worldwide for many hydrologic and Non-Point Source Pollution (NPSP) analysis at a watershed scale. but it has many limitations in simulating the VFS. Because it considers only 'filter strip width' when the model estimates sediment trapping efficiency, and does not consider the routing of sediment with overland flow option which is expected to maximize the sediment trapping efficiency from upper agricultural subbasin to lower spatially-explicit filter strip. Therefore, the SWAT overland flow option between landuse-subbasins with sediment routing capability was enhanced with modifications in SWAT watershed configuration and SWAT engine. The enhanced SWAT can simulate the sediment trapping efficiency of the VFS in the similar way as the desktop VFSMOD-w system does. Also it now can simulate the effects of overland flow from upper subbasin to reflect the increased runoff volume at the receiving subbasin, which is what is occurring at the field if no diversion channel is installed. In this study, the enhanced SWAT model was applied to small watershed located at Jaun-ri in South Korea to simulate diversion channel and spatially-explicit VFS. It was found that approximately sediment can be reduced by 31%, 65%, 68%, with diversion channel, the VFS, and the VFS with diversion channel, respectively.

  • PDF

Investigation of Secure Wireless Multihop Ad hoc Network (안전한 무선 Multihop Ad hoc 네트워크를 위한 연구)

  • Lee, Sang-Duck;Park, Jong-An;Han, Seung-Jo;Pyun, Jae-Young
    • Journal of Advanced Navigation Technology
    • /
    • v.11 no.1
    • /
    • pp.118-126
    • /
    • 2007
  • An ad hoc network is a system of wireless mobile nodes that dynamically self-organize in arbitrary and temporary network topologies allowing people and devices to internetwork without any preexisting communication infrastructure. Although ad hoc network is attractive solution, there are still some major flaws that prevent commercial growth. Security is one of these main barriers; ad hoc networks are known to be particularly vulnerable to security attack. It is difficult to establish a centralized key distribution center and a trusted certification authority to provide cryptographic keys and digital certificates to nodes. To prevent attacks in ad hoc routing protocols, many algorithms have been used. In this paper, we have depicted a secure framework for multipath routing in wireless multihop network, which is comprehensive solution for secure data forwarding in wireless multihop networks. With the simulation results, the proposed scheme is compared with existing source routing scheme.

  • PDF

The typd of service and virtual destination node based multicast routing algorithm in ATM network (ATM 통신망에서의 서비스 유형과 경로 충첩 효과를 반영한 멀티캐스트 라우팅 알고리즘)

  • 양선희
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.21 no.11
    • /
    • pp.2886-2896
    • /
    • 1996
  • The Type of Service based multicast routing algorithm is necessary to support efficiently herogeneous applications in ATM network. In this paper I propose the Constrained Multicast Tree with Virtual Destination(DMTVD) heuristic algorithm as least cost multicast routing algorithm. The service is categorized into two types, as delay sensitive and non in CMTVD algorithm. For the delay sensitive service type, the cost optimized route is the Minimum Cost Stenier Tree connecting all the destination node group, virtual destination node group and source node with least costs, subject to the delay along the path being less than the maximum allowable end to end delay. The other side for the non-delay sensitive service, the cost optimized route is the MCST connecting all the multicast groups with least costs, subject to the traffic load is balanced in the network. The CMTVD algorithm is based on the Constrained Multicasting Tree algorithm but regards the nodes branching multiple destination nodes as virtural destination node. The experimental results show that the total route costs is enhanced 10%-15% than the CTM algorithm.

  • PDF

QoS-guaranteed Routing for Wireless Sensor Networks (무선 센서 네트워크를 위한 QoS 보장 라우팅)

  • Heo, Jun-Young
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.11 no.6
    • /
    • pp.23-29
    • /
    • 2011
  • In some applications of wireless sensor networks, requirements such as energy efficiency, real-time, and reliable delivery need to be considered. In this paper, we propose a novel routing algorithm for wireless sensor networks. It provides real-time, reliable delivery of a packet, while considering energy awareness. In the proposed algorithm, a node estimates the energy cost, delay and reliability of a path to the sink node, based only on information from neighboring nodes. Then, it calculates the probability of selecting a path, using the estimates. When packet forwarding is required, it randomly selects the next node. A path with lower energy cost is likely to be selected, because the probability is inversely proportional to the energy cost to the sink node. To achieve real-time delivery, only paths that may deliver a packet in time are selected. To achieve reliability, it may send a redundant packet via an alternate path, but only if it is a source of a packet. Experimental results show that the proposed algorithm is suitable for providing energy efficient, real-time, reliable communications.

A Routing Protocol with Fast-Recovery of Failures Using Backup Paths on MANETs (MANET에서 백업경로를 이용한 빠른 경로복구 능력을 가진 라우팅 프로토콜)

  • Thai, Ahn Tran;Kim, Myung-Kyun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.7
    • /
    • pp.1541-1548
    • /
    • 2012
  • This paper proposes a new multipath-based routing protocol on MANETs with Fast-Recovery of failures. The proposed protocol establishes the primary and secondary paths between a source and a destination considering the end-to-end packet reception reliability of routes. The primary path is used to transmit messages, and the secondary path is used to recover the path when detecting failures on the primary path. If a node detects a link failure during message transmission, it can recover the path locally by switching from the primary to the secondary path. By allowing the intermediate nodes to recover locally the route failure, the proposed protocol can reduce the number of packet loss and the amount of control packets for setting up new paths. The simulation result using QualNet simulator shows that the proposed protocol was about 10-20% higher than other protocols in terms of end-to-end message delivery ratio and the fault recovery time in case of link fault was about 3 times faster than the other protocols.