TORA : Temporally Ordered Routing Algorithm
|
|
|
- Beverley Sherman
- 10 years ago
- Views:
Transcription
1 TORA : Temporally Ordered Routing Algorithm Invented by Vincent Park and M.Scott Corson from University of Maryland. TORA is an on-demand routing protocol. The main objective of TORA is to limit control message propagation in the highly dynamic mobile computing environment. Each node has to explicitly initiate a query when it needs to send data to a particular destination.
2 TORA belongs to a class of algorithms called the link reversal algorithms. (We will defer a discussion of what this means to later). TORA essentially performs three tasks: Creation of a route from a source to a destination. Maintenance of the route. Erasure of the route when the route is no longer valid. TORA attempts to build what is known as a directed acyclic graph (DAG) which is rooted at the destination.
3 Directed Acyclic Graph (DAG) A graph G(V,E) is a directed graph with V nodes and E edges if every edge in the graph has an associated direction. Now, if a path in a directed graph forms a cycle if it originates and terminates at the same node and has at least one link in it. In other words, a path from v 0 to v k in the graph forms a cycle if v 0 = v k and the path has at least one edge. A directed graph with no cycles is a DAG. A DAG is rooted at the destination if the destination is the only node with no downstream nodes, i.e., no links lead out of the destination. Such a DAG is often called a destination oriented DAG. Creation of such a DAG from a source to a destination would contain multiple routes to the destination.
4 The idea is to first build a DAG from the source to the destination. Then as links fail, it might be necessary to recompute a DAG in order to find a route. Link Reversal algorithms are used for this. If network gets partitioned, erasures of routes is required. TORA uses three kinds of messages: $ The QRY message for creating a route. $ The UPD message for both creating and maintaining routes. $ The CLR message for erasing a route.
5 Destination Disoriented DAG Topology of the Mobile Ad Hoc Network changes in time. Thus, it is possible that one of the nodes may have all inbound links (since for example, the only outbound link failed). This is not ok since only the destination should have this property. Such a graph is called destination disoriented. At this point TORA resorts to link reversals.
6 Link Reversals Let us call a process that is invoked in response to a topology change an iteration. Full Reversals If this is invoked a node that is not the destination, upon finding that it has only inbound links will reverse the direction on all its links. Partial reversal During each iteration every node (say a node Node i) keeps a list of all its neighbors j such that during the iteration, a link from node i to node j was in fact reversed to now show node j node i. It then reverses directions of links to only those nodes that do not belong to the list.
7 Idea is similar to that of a fluid flow scheme. All the fluid is to flow from the source to the destination. The source is at the highest level, the destination is at the lowest level and the fluid flows from the highest level to the lowest level. Thus, if an intermediate node has all inbound links, it is a local minimum and it is possible that all the the fluid flows to this node rather than the destination. Now, the node has to increase its level!
8 TORA details and examples Each node has an associated height. This height is represented as a quintuple h i = (? i, oid i, r i,? i, i). This quintuple represents the height in terms of two parameters. The first is called the reference level and is indicated by the first three elements. The second is the offset from the reference level and is represented by the last two elements. When a node loses its last downstream neighbor it creates a new reference level.
9 For this reference level,? i is the time at which the failure occurred. oid i is the ID of the originating node. r i indicates one of two unique sub-levels in the reference level why? what? Later! The second part refers to an offset where:? i refers to an integer which is used to order nodes with respect to the reference level. i is the ID of the node itself. Why do I think an example is necessary now? But a few more things...
10 Initially height of each node is NULL and is represented by (-,-,-,-, i). The height of the destination is set to zero, i.e., h dest = (0,0,0,0,dest). Each node reports its height to its neighbors. If no info about a neighbor set its height to NULL. If neighbor is destination, set its height to zero. Each node also maintains the state of the links incident on it. If its height is greater than its neighbor j, the link to j is marked downstream (DOWN). Else it is marked upstream (UP).
11 Example of TORA operations The destination is X. A needs to find a route to X. A sends a QRY packet to C. C and B broadcast this message. E knows that X is one hop away. D broadcasts QRY message (contains height which is currently NULL). What does E do?
12 E creates a reference level (0,0,0) and indicates that it has an offset height? E = 1 from the reference level. It then generates an UPD message. It also sets a direction for its link to X i.e., from E to X. Why?
13 C and D receive this message from E, and generate an update. They also set E to be a downstream node. Future broadcasts of the UPD message results in the generation of the DAG. Note in the final part of the figure, all links are directed and the destination, viz. X does not have any downstream nodes.
14 Reacting to failures: Route Maintenance Let Link 4 fail. At this time notice that other than the destination all nodes still have an outbound link. Thus, none of the nodes generate an UPD message. The DAG is still OK! This is especially attractive when the network is dense most nodes have many outbound links.
15 Let Link 7 fail. Now, Node E does not have any outbound links! Thus, we resort to full link reversal at E. E generates a new reference level which is 1, sets the oid to E and transmits an UPD message. It also reverses the direction of all its inbound links.
16 At this, Node C no longer has outbound links. It resorts to partial link reversal reverses the direction of its links to A and B and transmits an UPD. It also sets its own offset to 1 to ensure that it is at a lower level compared to E.
17 Now the situation repeats at B. After B reverses its links and transmits an UPDATE. This is now a full reversal. Thus, it stays at the same level as C, but indicates the full reversal by flipping r i. This causes a partial reversal at A. (Not shown) Finally an update is generated at C. DAG is restored!
18 Now let Link 5 fail. This causes a network partition. E,D,Y and X are ok. C has no outbound links. It creates a new reference level which is 2, and sets the oid to C and sends a UPD. This causes A to have no outbound links.
19 A resorts to partial reversal. It sets its height to 1, reverses its link to B and broadcasts an update. Now B does not have outbound links. It resorts to a full reversal. At full reversal r i is flipped. This causes a partial reversal at A.
20 A s UPD message after the partial reversal creates the same situation at C. This would cause C to realize that there is no path to X. It sets its height to NULL and sends an UPD to A and B. Now the nodes realize that there is no path to X.
21 Advantages: That of an on-demand routing protocol create a DAG only when necessary. Multiple paths created. Good in dense networks. Disadvantages Same as on-demand routing protocols. Not much used since DSR and AODV outperform TORA. Not scalable by any means.
22 References Chapter 8 of book. V.D.Park and Scott.M.Corson, A Highly Adaptive Distributed Routing Algorithm for Mobile Wireless Networks, Proceedings of INFOCOM 1997.
Lecture 2.1 : The Distributed Bellman-Ford Algorithm. Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol
Lecture 2 : The DSDV Protocol Lecture 2.1 : The Distributed Bellman-Ford Algorithm Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol The Routing Problem S S D D The routing problem
A Survey of Mobile Ad Hoc network Routing Protocols*
Technical Report (Nr. 2003-08) A Survey of Mobile Ad Hoc network Routing Protocols* Changling Liu, Jörg Kaiser {changling.liu, joerg kaiser}@informatik.uni-ulm.de Department of Computer Structures University
LIST OF FIGURES. Figure No. Caption Page No.
LIST OF FIGURES Figure No. Caption Page No. Figure 1.1 A Cellular Network.. 2 Figure 1.2 A Mobile Ad hoc Network... 2 Figure 1.3 Classifications of Threats. 10 Figure 1.4 Classification of Different QoS
Lecture 8: Routing I Distance-vector Algorithms. CSE 123: Computer Networks Stefan Savage
Lecture 8: Routing I Distance-vector Algorithms CSE 3: Computer Networks Stefan Savage This class New topic: routing How do I get there from here? Overview Routing overview Intra vs. Inter-domain routing
Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols
Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols Purvi N. Ramanuj Department of Computer Engineering L.D. College of Engineering Ahmedabad Hiteishi M. Diwanji
Performance Comparison of AODV, DSDV, DSR and TORA Routing Protocols in MANETs
International Research Journal of Applied and Basic Sciences. Vol., 3 (7), 1429-1436, 2012 Available online at http:// www. irjabs.com ISSN 2251-838X 2012 Performance Comparison of AODV, DSDV, DSR and
MASTER THESIS REPORT MSc IN ELECTRICAL ENGINEERING WITH EMPHASIS ON TELECOMMUNICATION
MEE 09: 17 MASTER THESIS REPORT MSc IN ELECTRICAL ENGINEERING WITH EMPHASIS ON TELECOMMUNICATION TRASMISSION CONTROL PROTOCOL (TCP) PERFORMANCE EVALUATION IN MANET BLEKINGE INSTITUTE OF TECHNOLOGY MARCH
Location-Aided Routing (LAR) in mobile ad hoc networks
Location-Aided Routing (LAR) in mobile ad hoc networks Young-Bae Ko and Nitin H. Vaidya Department of Computer Science, Texas A&M University, College Station, TX 77843-3112, USA 2000 Abstract A mobile
Ad hoc On Demand Distance Vector (AODV) Routing Protocol
Ad hoc On Demand Distance Vector (AODV) Routing Protocol CS: 647 Advanced Topics in Wireless Networks Dr. Baruch Awerbuch & Dr. Amitabh Mishra Department of Computer Science Johns Hopkins 4-1 Reading Chapter
A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks
A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks T.Chandrasekhar 1, J.S.Chakravarthi 2, K.Sravya 3 Professor, Dept. of Electronics and Communication Engg., GIET Engg.
IP Multicasting. Applications with multiple receivers
IP Multicasting Relates to Lab 10. It covers IP multicasting, including multicast addressing, IGMP, and multicast routing. 1 Applications with multiple receivers Many applications transmit the same data
Security in Ad Hoc Network
Security in Ad Hoc Network Bingwen He Joakim Hägglund Qing Gu Abstract Security in wireless network is becoming more and more important while the using of mobile equipments such as cellular phones or laptops
CSE331: Introduction to Networks and Security. Lecture 8 Fall 2006
CSE331: Introduction to Networks and Security Lecture 8 Fall 2006 Announcements Reminders: Project I is due on Monday, Sept. 25th. Homework 1 is due on Friday, Sept. 29th. CSE331 Fall 2004 2 Internet Protocol
A Performance Comparison of Routing Protocols for Large-Scale Wireless Mobile Ad Hoc Networks
A Performance Comparison of Routing Protocols for Large-Scale Wireless Mobile Ad Hoc Networks Ioannis Broustis Gentian Jakllari Thomas Repantis Mart Molle Department of Computer Science & Engineering University
Routing with Load Balancing in Wireless Ad hoc Networks
Routing with Load Balancing in Wireless Ad hoc Networks Hossam Hassanein and Audrey Zhou Department of Computing and Information Science Queen's University Kingston, Ontario, Canada, K7L 3N6 {hossam, zhou}@cs.queensu.ca
Comprehensive Evaluation of AODV, DSR, GRP, OLSR and TORA Routing Protocols with varying number of nodes and traffic applications over MANETs
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 9, Issue 3 (Mar. - Apr. 2013), PP 54-61 Comprehensive Evaluation of AODV, DSR, GRP, OLSR and TORA Routing Protocols
WAN Wide Area Networks. Packet Switch Operation. Packet Switches. COMP476 Networked Computer Systems. WANs are made of store and forward switches.
Routing WAN Wide Area Networks WANs are made of store and forward switches. To there and back again COMP476 Networked Computer Systems A packet switch with two types of I/O connectors: one type is used
Location Information Services in Mobile Ad Hoc Networks
Location Information Services in Mobile Ad Hoc Networks Tracy Camp, Jeff Boleng, Lucas Wilcox Department of Math. and Computer Sciences Colorado School of Mines Golden, Colorado 841 Abstract In recent
CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING
CHAPTER 6 CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING 6.1 INTRODUCTION The technical challenges in WMNs are load balancing, optimal routing, fairness, network auto-configuration and mobility
DESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS
DESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS K.V. Narayanaswamy 1, C.H. Subbarao 2 1 Professor, Head Division of TLL, MSRUAS, Bangalore, INDIA, 2 Associate
Proposition of a new approach to adapt SIP protocol to Ad hoc Networks
, pp.133-148 http://dx.doi.org/10.14257/ijseia.2014.8.7,11 Proposition of a new approach to adapt SIP protocol to Ad hoc Networks I. Mourtaji, M. Bouhorma, M. Benahmed and A. Bouhdir Computer and Communication
Location-Aided Routing (LAR) in mobile ad hoc networks
Wireless Networks 6 (2000) 307 321 307 Location-Aided Routing (LAR) in mobile ad hoc networks Young-Bae Ko and Nitin H. Vaidya Department of Computer Science, Texas A&M University, College Station, TX
Multihoming and Multi-path Routing. CS 7260 Nick Feamster January 29. 2007
Multihoming and Multi-path Routing CS 7260 Nick Feamster January 29. 2007 Today s Topic IP-Based Multihoming What is it? What problem is it solving? (Why multihome?) How is it implemented today (in IP)?
PERFORMANCE ANALYSIS OF AD-HOC ON DEMAND DISTANCE VECTOR FOR MOBILE AD- HOC NETWORK
http:// PERFORMANCE ANALYSIS OF AD-HOC ON DEMAND DISTANCE VECTOR FOR MOBILE AD- HOC NETWORK Anjali Sahni 1, Ajay Kumar Yadav 2 1, 2 Department of Electronics and Communication Engineering, Mewar Institute,
Optimization of AODV routing protocol in mobile ad-hoc network by introducing features of the protocol LBAR
Optimization of AODV routing protocol in mobile ad-hoc network by introducing features of the protocol LBAR GUIDOUM AMINA University of SIDI BEL ABBES Department of Electronics Communication Networks,
GeoTORA: A Protocol for Geocasting in Mobile Ad Hoc Networks
eotor: Protocol for eocasting in Mobile d oc Networks Young-ae Ko ept. of omputer Science Texas &M University ollege Station, TX 77843-3112, US [email protected] Nitin. Vaidya ept. of omputer Science
QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES
QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES SWATHI NANDURI * ZAHOOR-UL-HUQ * Master of Technology, Associate Professor, G. Pulla Reddy Engineering College, G. Pulla Reddy Engineering
NetworkPathDiscoveryMechanismforFailuresinMobileAdhocNetworks
Global Journal of Computer Science and Technology: E Network, Web & Security Volume 14 Issue 3 Version 1.0 Year 2014 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals
Network (Tree) Topology Inference Based on Prüfer Sequence
Network (Tree) Topology Inference Based on Prüfer Sequence C. Vanniarajan and Kamala Krithivasan Department of Computer Science and Engineering Indian Institute of Technology Madras Chennai 600036 [email protected],
Internet Firewall CSIS 4222. Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS 4222. net15 1. Routers can implement packet filtering
Internet Firewall CSIS 4222 A combination of hardware and software that isolates an organization s internal network from the Internet at large Ch 27: Internet Routing Ch 30: Packet filtering & firewalls
Fast and Secure Data Transmission by Using Hybrid Protocols in Mobile Ad Hoc Network
Middle-East Journal of Scientific Research 15 (9): 1290-1294, 2013 ISSN 1990-9233 IDOSI Publications, 2013 DOI: 10.5829/idosi.mejsr.2013.15.9.11514 Fast and Secure Data Transmission by Using Hybrid Protocols
DAG based In-Network Aggregation for Sensor Network Monitoring
DAG based In-Network Aggregation for Sensor Network Monitoring Shinji Motegi, Kiyohito Yoshihara and Hiroki Horiuchi KDDI R&D Laboratories Inc. {motegi, yosshy, hr-horiuchi}@kddilabs.jp Abstract Wireless
Investigating the Performance of Routing Protocols Using Quantitative Metrics in Mobile Ad Hoc Networks
Investigating the Performance of Routing Protocols Using Quantitative Metrics in Mobile Ad Hoc Networks T. Jagadeepak 1, Dr. B. Prabhakara Rao 2, B. A. S. Roopa Devi 3 PG Student, Dept. of ECE, UCEK, JNTU,
Streaming in MANET: Proactive Link Protection and Receiver-Oriented Adaptation
Streaming in AET: Proactive Link Protection and Receiver-Oriented Adaptation Toby u ing Cai Department of Computer Science Iowa State University Ames, Iowa 50011, U.S.A. E-mail: {tobyxu, yingcai}@cs.iastate.edu
Introduction to IP v6
IP v 1-3: defined and replaced Introduction to IP v6 IP v4 - current version; 20 years old IP v5 - streams protocol IP v6 - replacement for IP v4 During developments it was called IPng - Next Generation
Static IP Routing and Aggregation Exercises
Politecnico di Torino Static IP Routing and Aggregation xercises Fulvio Risso August 0, 0 Contents I. Methodology 4. Static routing and routes aggregation 5.. Main concepts........................................
Keywords: DSDV and AODV Protocol
Volume 3, Issue 12, December 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Comparison
OSPF Version 2 (RFC 2328) Describes Autonomous Systems (AS) topology. Propagated by flooding: Link State Advertisements (LSAs).
OSPF Version 2 (RFC 2328) Interior gateway protocol (IGP). Routers maintain link-state database. Describes Autonomous Systems (AS) topology. Propagated by flooding: Link State Advertisements (LSAs). Router
Graph Theory Algorithms for Mobile Ad Hoc Networks
Informatica 36 (2012) 185-200 185 Graph Theory Algorithms for Mobile Ad Hoc Networks Natarajan Meghanathan Department of Computer Science, Jackson State University Jackson, MS 39217, USA E-mail: [email protected]
Study And Comparison Of Mobile Ad-Hoc Networks Using Ant Colony Optimization
Study And Comparison Of Mobile Ad-Hoc Networks Using Ant Colony Optimization 1 Neha Ujala Tirkey, 2 Navendu Nitin, 3 Neelesh Agrawal, 4 Arvind Kumar Jaiswal 1 M. Tech student, 2&3 Assistant Professor,
Comparative Study of Performance Evaluation for Mobile Ad hoc networks using a proxy node
Comparative Study of Performance Evaluation for Mobile Ad hoc networks using a proxy node G. E. RIZOS [email protected] D. C. VASILIADIS [email protected] E. STERGIOU [email protected] Abstract: In this paper,
PERA: Ad-Hoc Routing Protocol for Mobile Robots
PERA: Ad-Hoc Routing Protocol for Mobile Robots Carlos Agüero Vicente Matellán Pedro de-las-heras-quirós José M. Cañas DIET (Departamento de Informática, Estadística y Telemática) Universidad Rey Juan
PERFORMANCE ANALYSIS OF THE ROUTING PROTOCOLS FOR VIDEO STREAMING OVER MOBILE AD HOC NETWORKS
PERFORMANCE ANALYSIS OF THE ROUTING PROTOCOLS FOR VIDEO STREAMING OVER MOBILE AD HOC NETWORKS Muhammad Shaffatul Islam Md. Adnan Riaz Mohammed Tarique Khulna University of Engineering Technical University
Scalable Source Routing
Scalable Source Routing January 2010 Thomas Fuhrmann Department of Informatics, Self-Organizing Systems Group, Technical University Munich, Germany Routing in Networks You re there. I m here. Scalable
Quality of Service Support in Mobile ad-hoc IP Networks *
Quality of Service Support in Mobile ad-hoc IP Networks * Derya H. Cansever GTE Laboratories 40 Sylvan Road Waltham, MA 02454 Arnold M. Michelson GTE Government Systems 400 John Quincy Adams Road Taunton,
Load-balancing Approach for AOMDV in Ad-hoc Networks R. Vinod Kumar, Dr.R.S.D.Wahida Banu
Load-balancing Approach for AOMDV in Ad-hoc Networks R. Vinod Kumar, Dr.R.S.D.Wahida Banu AP/ECE HOD/ECE Sona College of Technology, GCE, Salem. Salem. ABSTRACT Routing protocol is a challenging issue
A Modified Shared-tree Multicast Routing Protocol in Ad Hoc Network
Journal of Computing and Information Technology - CIT 13, 25, 3, 177 193 177 A Modified Shared-tree Multicast Routing Protocol in Ad Hoc Network Ziping Liu 1 and Bidyut Gupta 2 1 Computer Science Department,
Internetworking and Internet-1. Global Addresses
Internetworking and Internet Global Addresses IP servcie model has two parts Datagram (connectionless) packet delivery model Global addressing scheme awaytoidentifyall H in the internetwork Properties
An Extended AODV Protocol to Support Mobility in Hybrid Networks
An Extended AODV Protocol to Support Mobility in Hybrid Networks Sèmiyou A. Adédjouma* Polytechnic School of Abomey-Calavi (EPAC) University of Abomey-Calavi (UAC) Cotonou, Benin *semiyou.adedjouma {at}
Formal Measure of the Effect of MANET size over the Performance of Various Routing Protocols
Formal Measure of the Effect of MANET size over the Performance of Various Routing Protocols Er. Pooja Kamboj Research Scholar, CSE Department Guru Nanak Dev Engineering College, Ludhiana (Punjab) Er.
QoS routing for mobile ad hoc networks
QoS routing for mobile ad hoc networks Chenxi Zhu and M. Scott Corson Flarion Technologies, Bedminster, New Jersey 07921 (czhu,[email protected]) Abstract A Quality-of-Service (QoS) routing protocol is
SIMULATION STUDY OF BLACKHOLE ATTACK IN THE MOBILE AD HOC NETWORKS
Journal of Engineering Science and Technology Vol. 4, No. 2 (2009) 243-250 School of Engineering, Taylor s University College SIMULATION STUDY OF BLACKHOLE ATTACK IN THE MOBILE AD HOC NETWORKS SHEENU SHARMA
Assignment #3 Routing and Network Analysis. CIS3210 Computer Networks. University of Guelph
Assignment #3 Routing and Network Analysis CIS3210 Computer Networks University of Guelph Part I Written (50%): 1. Given the network graph diagram above where the nodes represent routers and the weights
Security for Ad Hoc Networks. Hang Zhao
Security for Ad Hoc Networks Hang Zhao 1 Ad Hoc Networks Ad hoc -- a Latin phrase which means "for this [purpose]". An autonomous system of mobile hosts connected by wireless links, often called Mobile
Customer Specific Wireless Network Solutions Based on Standard IEEE 802.15.4
Customer Specific Wireless Network Solutions Based on Standard IEEE 802.15.4 Michael Binhack, sentec Elektronik GmbH, Werner-von-Siemens-Str. 6, 98693 Ilmenau, Germany Gerald Kupris, Freescale Semiconductor
DSR: The Dynamic Source Routing Protocol for Multi-Hop Wireless Ad Hoc Networks
DSR: The Dynamic Source Routing Protocol for Multi-Hop Wireless Ad Hoc Networks David B. Johnson David A. Maltz Josh Broch Computer Science Department Carnegie Mellon University Pittsburgh, PA 15213-3891
Chapter 15: Distributed Structures. Topology
1 1 Chapter 15: Distributed Structures Topology Network Types Operating System Concepts 15.1 Topology Sites in the system can be physically connected in a variety of ways; they are compared with respect
ISSUES AND CHALLENGES OF QUALITY OF SERVICE IN MOBILE ADHOC NETWORK
ISSUES AND CHALLENGES OF QUALITY OF SERVICE IN MOBILE ADHOC NETWORK Mukesh Kumar Student (Ph.D) Department of Computer Engineering The Technological Institute of Textile and Science, Bhiwani-127021, Haryana
Lecture 14: Data transfer in multihop wireless networks. Mythili Vutukuru CS 653 Spring 2014 March 6, Thursday
Lecture 14: Data transfer in multihop wireless networks Mythili Vutukuru CS 653 Spring 2014 March 6, Thursday Data transfer over multiple wireless hops Many applications: TCP flow from a wireless node
Study of Network Characteristics Incorporating Different Routing Protocols
Study of Network Characteristics Incorporating Different Routing Protocols Sumitpal Kaur #, Hardeep S Ryait *, Manpreet Kaur # # M. Tech Student, Department of Electronics and Comm. Engineering, Punjab
Question 1. [7 points] Consider the following scenario and assume host H s routing table is the one given below:
Computer Networks II Master degree in Computer Engineering Exam session: 11/02/2009 Teacher: Emiliano Trevisani Last name First name Student Identification number You are only allowed to use a pen and
An Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks *
An Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks * Inwhee Joe College of Information and Communications Hanyang University Seoul, Korea iwj oeshanyang.ac.kr Abstract. To satisfy the user requirements
A Study of Internet Connectivity for Mobile Ad Hoc Networks in NS 2
A Study of Internet Connectivity for Mobile Ad Hoc Networks in NS 2 Alex Ali Hamidian January 2003 Department of Communication Systems Lund Institute of Technology, Lund University Box 118 S-221 00 Lund
Load Balancing and Resource Reservation in Mobile Ad-Hoc Networks 1
Load Balancing and Resource Reservation in Mobile Ad-Hoc Networks 1 Gautam Chakrabarti Sandeep Kulkarni Department of Computer Science and Engineering Michigan State University Abstract To ensure uninterrupted
Influences of Communication Disruptions on Decentralized Routing in Transport Logistics
Influences of Communication Disruptions on Decentralized Routing in Transport Logistics Bernd Scholz-Reiter, Christian Zabel BIBA Bremer Institut für Produktion und Logistik GmbH University of Bremen Hochschulring
Transport layer issues in ad hoc wireless networks Dmitrij Lagutin, [email protected]
Transport layer issues in ad hoc wireless networks Dmitrij Lagutin, [email protected] 1. Introduction Ad hoc wireless networks pose a big challenge for transport layer protocol and transport layer protocols
Control overhead reduction: A Hierarchical Routing Protocol In Mobile Ad hoc Networks
Control overhead reduction: A Hierarchical Routing Protocol In Mobile Ad hoc Networks Dr.G.Mary Jansi Rani Professor / Department of Electronics and Communication Engineering, Sri Ramakrishna Engineering
Intelligent Agents for Routing on Mobile Ad-Hoc Networks
Intelligent Agents for Routing on Mobile Ad-Hoc Networks Y. Zhou Dalhousie University [email protected] A. N. Zincir-Heywood Dalhousie University [email protected] Abstract This paper introduces a new agent-based
Performance analysis of routing protocols of mobile ad hoc networks for VoIP applications
Cyber Journals: Multidisciplinary Journals in Science and Technology, Journal of Selected Areas in Telecommunications (JSAT), June Edition, 2012 Performance analysis of routing protocols of mobile ad hoc
[email protected] [email protected]
S. Sumathy 1 and B.Upendra Kumar 2 1 School of Computing Sciences, VIT University, Vellore-632 014, Tamilnadu, India [email protected] 2 School of Computing Sciences, VIT University, Vellore-632 014,
TOPOLOGIES NETWORK SECURITY SERVICES
TOPOLOGIES NETWORK SECURITY SERVICES 1 R.DEEPA 1 Assitant Professor, Dept.of.Computer science, Raja s college of Tamil Studies & Sanskrit,Thiruvaiyaru ABSTRACT--In the paper propose about topology security
Research Article Ant Colony and Load Balancing Optimizations for AODV Routing Protocol
Ashdin Publishing International Journal of Sensor Networks and Data Communications Vol. 1 (2012), Article ID X110203, 14 pages doi:10.4303/ijsndc/x110203 Research Article Ant Colony and Load Balancing
CSE 473 Introduction to Computer Networks. Exam 2 Solutions. Your name: 10/31/2013
CSE 473 Introduction to Computer Networks Jon Turner Exam Solutions Your name: 0/3/03. (0 points). Consider a circular DHT with 7 nodes numbered 0,,...,6, where the nodes cache key-values pairs for 60
INSIGNIA: An IP-Based Quality of Service Framework for Mobile ad Hoc Networks
Journal of Parallel and Distributed Computing 60, 374406 (2000) doi:10.1006jpdc.1999.1613, available online at http:www.idealibrary.com on INSIGNIA: An IP-Based Quality of Service Framework for Mobile
Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks
Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks Hoang Lan Nguyen and Uyen Trang Nguyen Department of Computer Science and Engineering, York University 47 Keele Street, Toronto,
COMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 2 Issue 5 May, 2013 Page No. 1680-1684 COMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK ABSTRACT: Mr.Upendra
Comparison of WCA with AODV and WCA with ACO using clustering algorithm
Comparison of WCA with AODV and WCA with ACO using clustering algorithm Deepthi Hudedagaddi, Pallavi Ravishankar, Rakesh T M, Shashikanth Dengi ABSTRACT The rapidly changing topology of Mobile Ad hoc networks
Route Discovery Protocols
Route Discovery Protocols Columbus, OH 43210 [email protected] http://www.cse.ohio-state.edu/~jain/ 1 Overview Building Routing Tables Routing Information Protocol Version 1 (RIP V1) RIP V2 OSPF
Carnegie Mellon Computer Science Department. 15-744 Spring 2007 Theory Problem Set 2
Carnegie Mellon Computer Science Department. - Spring Theory Problem Set This problem set has questions. Answer them as clearly and concisely as possible. You may discuss ideas with others in the class,
Achieving Energy Efficiency in MANETs by Using Load Balancing Approach
International Journal of Computer Networks and Communications Security VOL. 3, NO. 3, MARCH 2015, 88 94 Available online at: www.ijcncs.org E-ISSN 2308-9830 (Online) / ISSN 2410-0595 (Print) Achieving
Distance Vector Routing Protocols. Routing Protocols and Concepts Ola Lundh
Distance Vector Routing Protocols Routing Protocols and Concepts Ola Lundh Objectives The characteristics of distance vector routing protocols. The network discovery process of distance vector routing
other. A B AP wired network
1 Routing and Channel Assignment in Multi-Channel Multi-Hop Wireless Networks with Single-NIC Devices Jungmin So + Nitin H. Vaidya Department of Computer Science +, Department of Electrical and Computer
Lecture 8. IP Fundamentals
Lecture 8. Internet Network Layer: IP Fundamentals Outline Layer 3 functionalities Internet Protocol (IP) characteristics IP packet (first look) IP addresses Routing tables: how to use ARP Layer 3 functionalities
Quality of Service Routing in Ad-Hoc Networks Using OLSR
Quality of Service Routing in Ad-Hoc Networks Using OLSR Ying Ge Communications Research Centre [email protected] Thomas Kunz Carleton University [email protected] Louise Lamont Communications Research
6.263 Data Communication Networks
6.6 Data Communication Networks Lecture : Internet Routing (some slides are taken from I. Stoica and N. Mckewon & T. Griffin) Dina Katabi [email protected] www.nms.csail.mit.edu/~dina Books Text Book Data Communication
