Professional Documents
Culture Documents
Tarik Cicic
Paal Engelstad
27.04.2006
27.04.2006
Heterogeneity
Devices and wireless media technologies will provide a wide heterogeneity with respect to capabilities and properties [3] Some schemes focus on heterogeneity, but on one parameter only [4,5]
We argue for a more holistic approach that covers not only scalability, but also heterogeneity in terms of many different aspects, simultaneously
Explore the benefits of using MTR in ad hoc networks Using multiple topologies for resilient routing as described in [6] Profile-adjusted topologies
Different routing processes Different traffic
27.04.2006
Algorithms and mechanisms for building and maintaining consistent specialpurpose topologies should be developed.
Avoiding routing loops is a goal in itself.
As a first step: Use MT routing to improve the resilience of ad hoc networks using multi-topology routing as described in [6].
6
27.04.2006
Routing Protocols: OLSR, AODV etc. Profiles: 1, ..., 8 (High capacity and stable, , Low capacity and high mobility)
Node A announces its supported routing protocol and profile in its neighborhood
27.04.2006
Routing Protocols: OLSR, AODV etc. Profiles: 1, ..., 8 (High capacity and stable, , Low capacity and high mobility)
Node B announces its supported routing protocols and profile in its neighborhood
B
27.04.2006
Node C announces its supported routing protocols and profile in its neighborhood
Profiles: 1, ..., 8 (High capacity and stable, , Low capacity and high mobility)
27.04.2006
10
27.04.2006
11
27.04.2006
12
27.04.2006
13
When a node detect that the next hop for the packet is not available, it moves the packet to a topology where the next hop is isolated All nodes should have the same view of topologies A node that moves packets to another topology must mark the packets to identify the topology for other nodes in the network In [6] we have investigated this approach for fixed IP networks
Very few backup topologies are needed to isolate every component once Path lengths for recovered traffic are acceptable
27.04.2006
14
Backup Topology 2
Backup Topology 1
Backup Topology 3
Audun Fosselie Hansen Poster, Infocom 2006 27.04.2006
15
S
Audun Fosselie Hansen Poster, Infocom 2006 27.04.2006
16
S
Audun Fosselie Hansen Poster, Infocom 2006 27.04.2006
17
S
Audun Fosselie Hansen Poster, Infocom 2006 27.04.2006
18
References
1. C. E. Perkins and P. Bhagwat, Highly dynamic destination sequenced distance-vector routing (dsdv) for mobile computers, in Conference on Communications architectures, protocols and applications, 1994, pp. 234244. D. B. Johnson, Routing in ad hoc networks of mobile hosts, in Workshop on Mobile Computing Systems and Applications, 1994. S. Kurkowski, T. Camp, and M. Colagrosso, Manet simulation studies: the incredibles, ACM SIGMOBILE Mobile Computing and Communications Review, vol. 9, no. 4, pp. 50 61, October 2005. C. Ma and Y. Yang, A prioritized battery-aware routing protocol for wireless ad hoc networks, in 8th ACM international symposium on Modeling, analysis and simulation of wireless and mobile systems, 2005, pp. 45 52. C. E. Jones, K. M. Sivalingam, P. Agrawal, and J. C. Chen, A survey of energy efficient network protocols for wireless networks, Wireless Networks, vol. 7, no. 4, pp. 342358, August 2001 2. 3.
4.
5.
6.
7.
A. Kvalbein, A. F. Hansen, T. Cicic, S. Gjessing, and O. Lysne, Fast IP network recovery using multiple routing configurations, in Proceedings of INFOCOM, Apr. 2006.
M. Shand and S. Bryant, IP Fast Reroute Framework , IETF Internet Draft, March 2006
27.04.2006
19