Free Essay

Optimal Packet Routing

In:

Submitted By subhashita
Words 1064
Pages 5
OPTIMAL PACKET ROUTING

Abstract-
The optimal routing is the determination of the optimal routing policy that is the set of routes on which packets need to be transmitted in order to reduce the delay, cost and throughput. The routing optimization problem is an important tool in the optimization of both the operational capabilities and the design of large scale commuter communications networks. Resource requirements are not taken into account for conventional routing algorithms. The problem of finding optimal routes in a packet switched computer can be done using non linear multi commodity flow problem. The mathematical programming technique which is applied for the solution of routing problem for large networks is inefficient output. By using Heuristic methods satisfactory results can be obtained. But using Heuristic technique the results are not always optimal and may have some limitations. To overcome all this we can use decomposition method which is very efficient for computation and results are nearly exact.
Introduction-
Routers are basically classified into two types- Oblivious and Adaptive. In oblivious routing the path is completely determined by the sources and destination. Whereas Deterministic routing is the same path is chosen between a source and destination. The nature of deterministic routing is distributed that is each node makes its routing decisions independent of others which make routing simple and fast and this is widely used in most of the networks. On the other hand in oblivious routing algorithms it is difficult because of certain traffic patterns that are many flows are routed through same link and generate heavy network congestion.
In adaptive routing, given sources and destination address the path taken by a particular packet is dynamically adjusted depending on the network congestion. Adaptive routing uses dynamic load balancing can achieve better throughput and latency when compared to oblivious routing. But with the adaptive the challenges may be faced are balancing the router complexity with capability to adapt.
Main Body- In this paper, we will discuss the application aware oblivious routing framework that statically determines the deadlock free routes considering applications communication characteristics Michel et. al [3].As the framework supports a variety of algorithms which can optimize various cost functions like channel load, latency of routes, or the combination. Band width sensitive oblivious routing, with static virtual channel allocation, produces deadlock-free routes gives rough estimates of bandwidth demands of all flows obtained through application program analysis and/or profiling. Using these estimates, an offline algorithm determines routes for the data transfers that maximize satisfaction of flow demand or minimize maximum channel load, while ensuring deadlock freedom. The network is then statically configured prior to runtime as processing elements are loaded with the computation code. This approach can achieve better throughput than traditional oblivious routing algorithms because routes are optimized based on the bandwidth demands. The routers used for these processes are kept simple as the routes are configured statically and they do not change at runtime.
Router Architecture- Fig. 1 shows typical virtual channel router architecture and its operation. It consists of data path of the router consisting a switch and a buffer The input buffer store flits while they are waiting to be forwarded to the next cycle. When the flit is ready to move the switch connects the input buffer to an appropriate channel. Data path is controlled using three control modules: a router, a virtual channel allocator and a switch allocator. The routing operations takes in four phases routing (RC), virtual channel allocation (VA), switch allocation (SA), and a switch traversal (ST). These represent one to four pipeline stages in modern virtual channel routers. At the input channel a head flit is arrived, the router stores the input in the buffer from the allocated virtual channel and determines the next hop for the packet (RC phase). The router then allocates a virtual channel in VA phase and finally flit comes SA phase and moves to the output port (ST phase).

a. Router Architecture
Routing Computation (RC) Switch Traversal (ST) Switch Allocation (SA)
Virtual Channel Allocation (VA)

b. Router Pipeline

Fig. 1. Typical virtual-channel router architecture. It indicates that the modules and routing step may be modified for our approach.
Application aware oblivious routing exploits application knowledge to provide deadlock freedom and efficient network resources. Two deadlock avoidance techniques, namely acyclic channel dependency routing and static virtual channel allocation.
The Bandwidth sensitive Oblivious routing algorithm targets only minimal routes and made the deadlock free. Bandwidth sensitive oblivious routing selects the routes to minimize the more number of channel load. A minimal route that heuristically minimizes the maximum channel load. A Heuristic method maintains the deadlock freedom by checking to see if rerouting introduces cycles. Palesi et al. [1],[2] provides framework and algorithms for application specific bandwidth aware deadlock free adaptive routing. For a given set of source destination pairs cycles are broken in such a way to minimize the impact on the average degree of adaptiveness. To spread traffic uniformly through the network the bandwidth requirements are taken into the account. For this Towles et al. [30] give a multicommodity flow linear programming formulation for router algorithm design. In oblivious routing schemes, the application is breached into different ways using adhoc schemes. Deadlock can be avoided by assuming that each flow has its own private channel.

Conclusion- An offline strategy to compute routes, it doesn’t require any significant modification to standard routers as it is based on the knowledge of applications data transfers to arrive at an application aware oblivious routing framework. Application performance can be improved by estimating the bandwidth demand of the applications data transfer. The main limitation is knowledge is required for processing. Heuristic algorithms are easier to code and require less memory space. They are quite close to optimum.
References-
[1] M. Palesi, R. Holsmark, S. Kumar, and V. Catania, “A Methodology for Design of Application Specific Deadlock-Free Routing Algorithms for NoC Systems,” Proc. Fourth Int’l Conf. Hardware/ Software Codesign and System Synthesis (CODES+ISSS ’06), Oct. 2006.
[2] M. Palesi, G. Longo, S. Signorino, R. Holsmark, S. Kumar, and V.Catania, “Design of Bandwidth Aware and Congestion Avoiding
Efficient Routing Algorithms for Networks-on-Chip Platforms,” Proc. ACM/IEEE Int’l Symp. Networks-on-Chip (NOCS), pp. 97-106,2008
[3] Michel A. Kinsy, Myong Hyon Cho, Keun Sup Shim, Mieszko Lis, G. Edward Suh,” Optimal and Heuristic Application-Aware Oblivious Routing” Proc.

Similar Documents

Free Essay

Optimal Packet Routing Scheme with Multiple Sources and Multiple Destinations

...Project Report CS239: Computational Geometry Optimal Packet Routing Scheme with Multiple Sources and Multiple Destinations Submitted by (403-134-387) Winter 2004 Input / Problem The idea of the problem originates from the need of online companies like amazon, netflix, etc, to send the merchandize purchased by customers. The customers are located at different places. How these packets are routed so as to minimize the cost is a big problem. Most of the times these stores have multiple distribution centers or outlets from where the demand can be met. Thus the problem takes the shape of multiple source, multiple, multiple destinations. Given ‘n’ Source points (Distribution centers), and ‘m’ destination/consumer points. Location of the distribution and destination points described in their (x,y) co-ordinates. The measure of cost is the distance metric (length of the route). Output The output of the problem would be, which distribution center would serve which destination points and how the packet would be routed to minimize cost. Note: If the routes are represented as a graph then the graph would be a disconnected graph, depending on what destination nodes are served by which distribution center node. What is known? The general case of this problem, without any restrictions, can be modeled as Steiner Tree problem. It is a well known problem and its computation has been shown to be NPHard, by Garey, Graham and Johnson (1976). Approach In this analysis...

Words: 2950 - Pages: 12

Free Essay

Simulation Study on Service Based Adaptive Qos Framework for Vehicular Adhoc Network- Redem

...vehicles in mobility and provides interim connectivity to vehicles. One of the major advantages of VANETs over MANETs is the unlimited battery power generated on the fly. VANET plays a major role in defining safety measures by streaming communication between vehicles, infotainment and telematics. In any generic network phenomena the concept of routing and its characteristics are highly linked with Quality of Service (QoS). The United Nations Consultative Committee for International Telephony and Telegraphy (CCITT) Recommendation E.800 has defined QoS as: “The collective effect of service performance which determines the degree of satisfaction of a user of the service”. The major concern of VANET routing is that whether the performance can satisfy the throughput and delay requirements of such media streaming applications. Unavailability of efficient routing algorithms for the VANET scenario, force the researchers to use the MANET routing algorithms. An analysis of VANET routing protocols shows that its performance is not acceptable due to the feature of very high mobility in terms of speed[3]. Its adverse effect leads to broken links, with high packet drop and overhead due to missing route repairs or failure. This phenomenon...

Words: 1550 - Pages: 7

Premium Essay

Nt1310 Unit 7 Case Study

...in which we can keep a check on the number of duplicate packets generated due to the Flooding Routing technique? - Hop Count: A number of potential hops is included in the header of the packet. If the sender knows how many hops it will take to get to the destination the hop count is set to that number. If it doesn’t, it sets the hop count to the highest possible number of hops in the network. Then, each time the transmission hops the hop count is reduced by one. When it reaches zero, that individual transmission is discarded as at this point one of the many flooded transmissions should have been delivered and any extras can be discarded. - Selective Flooding: In selective flooding, as opposed to sending the transmission...

Words: 738 - Pages: 3

Free Essay

Title Paper

...for OLSR Routing Protocol in MANET Kirti Aniruddha Adoni1 and Radhika D. Joshi2 1 Modern College of Engineering, Shivaji Nagar, University of Pune, , India akirti2008@gmail.com, k_adoni@rediffmail.com 2 College of Engineering, University of Pune, India rdj.extc@coep.ac.in ABSTRACT Mobile Adhoc Network (MANET) eliminates the complexity associated with an infrastructure networks. Wireless devices are allowed to communicate on the fly for applications. It does not rely on base station to coordinate the flow of the nodes in the network. This paper introduces an algorithm of multipath OLSR (Optimized Link State Routing) for energy optimization of the nodes in the network. It is concluded that this solution improves the number of nodes alive by about 10 to 25% by always choosing energy optimized paths in the network with some increase in normalized routing overheads. KEYWORDS OLSR, multipath, Energy Optimization, Nodes Alive, Overheads 1. INTRODUCTION A Mobile Adhoc NETwork (MANET) is a multi-hop, distributed and self configuration network[1].The communication between two distant nodes is through the number of intermediate nodes which relays the information from one point to another. As nodes can move randomly within the network, routing packets between any pair of nodes become a challenging task. A route that is believed to be optimal for energy utilization at certain time might not be optimal at all, few moments later.[4] Traditional proactive routing protocols[3...

Words: 3772 - Pages: 16

Premium Essay

A Distributed Joint Channel-Assignment, Scheduling and Routing Algorithm for Multi-Channel Ad Hoc Wireless Networks

...A Distributed Joint Channel-Assignment, Scheduling and Routing Algorithm for Multi-Channel Ad Hoc Wireless Networks Xiaojun Lin and Shahzada Rasool School of Electrical and Computer Engineering, Purdue University West Lafayette, IN 47907, U.S.A. {linx,srasool}@ecn.purdue.edu Abstract— The capacity of ad hoc wireless networks can be substantially increased by equipping each network node with multiple radio interfaces that can operate on multiple non-overlapping channels. However, new scheduling, channelassignment, and routing algorithms are required to fully utilize the increased bandwidth in multi-channel multi-radio ad hoc networks. In this paper, we develop a fully distributed algorithm that jointly solves the channel-assignment, scheduling and routing problem. Our algorithm is an online algorithm, i.e., it does not require prior information on the offered load to the network, and can adapt automatically to the changes in the network topology and offered load. We show that our algorithm is provably efficient. That is, even compared with the optimal centralized and offline algorithm, our proposed distributed algorithm can achieve a provable fraction of the maximum system capacity. Further, the achievable fraction that we can guarantee is larger than that of some other comparable algorithms in the literature. I. I NTRODUCTION Multi-channel multi-radio ad hoc wireless networks have recently received a substantial amount of interest, especially under...

Words: 8961 - Pages: 36

Free Essay

Multicast

...(PIM). Define multiprotocol BGP. Learn how Multicast Source Discovery Protocol (MSDP) works. Explain reliable multicast: PGM. Internet Protocol Multicast Background Internet Protocol (IP) multicast is a bandwidth-conserving technology that reduces traffic by simultaneously delivering a single stream of information to thousands of corporate recipients and homes. Applications that take advantage of multicast include videoconferencing, corporate communications, distance learning, and distribution of software, stock quotes, and news. IP Multicast delivers source traffic to multiple receivers without adding any additional burden on the source or the receivers while using the least network bandwidth of any competing technology. Multicast packets are replicated in the network by Cisco routers enabled with Protocol Independent Multicast (PIM) and other supporting multicast protocols resulting in the most efficient delivery of data to multiple receivers possible. All alternatives require the source to send more than one copy of the data. Some even require the source to send an individual copy to each receiver. If there are thousands of receivers, even low-bandwidth applications benefit from using Cisco IP Multicast. High-bandwidth applications, such as MPEG video, may require a large portion of the available network bandwidth for a single stream. In these applications, the only way to send to more than one receiver simultaneously is by using IP Multicast. Figure 43-1 demonstrates how...

Words: 6080 - Pages: 25

Free Essay

Multicast Capacity in Manet with Infrastructure Support

...1 Multicast Capacity in MANET with Infrastructure Support Zhenzhi Qian, Xiaohua Tian, Xi Chen, Wentao Huang and Xinbing Wang Department of Electronic Engineering Shanghai Jiao Tong University, China Email: {199012315171, xtian, qfbzcx, yelohuang, xwang8}@sjtu.edu.cn ! Abstract—We study the multicast capacity under a network model featuring both node’s mobility and infrastructure support. Combinations between mobility and infrastructure, as well as multicast transmission and infrastructure, have already been showed effective ways to increase it. In this work, we jointly consider the impact of the above three factors on network capacity. We assume that m static base stations and n mobile users are placed in an ad hoc network. A general mobility model is adopted, such that each user moves within a bounded distance from its home-point with an arbitrary pattern. In addition, each mobile node serves as a source of multicast transmission, which results in a total number of n multicast transmissions. We focus on the situations in which base stations actually benefit the capacity improvement, and find that multicast capacity in a mobile hybrid network falls into several regimes. For each regime, reachable upper and lower bounds are derived. Our work contains theoretical analysis of multicast capacity in hybrid networks and provides guidelines for the design of real hybrid system combing cellular and ad hoc networks. 1 Index Terms—Wireless ad hoc network; multicast capacity; mobility;...

Words: 6686 - Pages: 27

Premium Essay

Advantages Of Ad Hoc Network

...Useful when number of traffic session is much lower than the number of nodes. . No routing structure created a priori. Two key methods for route discovery: . Source routing . Backward routing . Introduce delay. Examples: AODV Ad hoc on demand distance vector routing Route Discovery Process . Source node initiates path discoverer process by broadcasting RREQ. . RREQ is forwarded until it reaches an intermediate node that has recent route information about the destination or till it reaches the destination. . The RREQ uses sequence numbers to ensure that the routes are loop free and reply contains latest information only. 15 Route Reply Process . When a node forwards a route request packet to its neighbor; it also records in the table the node from which the first copy of the request came. . This table is used to construct the reverse path for the RREQ. . As the RREQ traverses back to the source, the nodes along the path enter the forward route into their tables. . If one of the intermediate nodes move then the moved nodes neighbor realizes the link failure and sends a link failure notification to its upstream neighbors and so on till it reaches the source. . Route Error Packets are used to erase broken...

Words: 4647 - Pages: 19

Free Essay

Boss

...1 Describe the difference between distance-vector and link-state dynamic routing protocols. Give an example of each.  Distance vector routing is so named because it involves two factors: the distance, or metric, of a destination, and the vector, or direction to take to get there. Routing information is only exchanged between directly connected neighbors. This means a router knows from which neighbor a route was learned, but it does not know where that neighbor learned the route; a router can't see beyond its own neighbors. This aspect of distance vector routing is sometimes referred to as "routing by rumor." Measures like split horizon and poison reverse are employed to avoid routing loops. Link-state routing, in contrast, requires that all routers know about the paths reachable by all other routers in the network. Link-state information is flooded throughout the link-state domain (an area in OSPF or IS-IS) to ensure all routers poses a synchronized copy of the area's link-state database. From this common database, each router constructs its own relative shortest-path tree, with itself as the root, for all known routes. A Comparison: Link State vs. Distance Vector If all routers were running a Distance Vector protocol, the path or 'route' chosen would be from A B directly over the ISDN serial link, even though that link is about 10 times slower than the indirect route from A C D B. [pic] A Link State protocol would choose the A C D B path because it's using a...

Words: 1070 - Pages: 5

Premium Essay

Nt1310 Unit 7 Exercise 1

...Each node keeps its sequence number and broadcast ID. For every RREQ the node originates broadcast ID which is increased and together with the node's IP address uniquely identifies an RREQ. At the end that route will be the concluding route that has the minimum hop count from source to destination. 2. Proactive Protocols: - It keeps the routing data even before it is desired. They try to keep up to date information from each node to every other node in the network. Routes data is generally kept in the routing tables and is occasionally updated as the network topology differs. Proactive routing protocols are driven with the help of tables. The routes are updated continuously and when a node wants to route packets to another node, it uses an already available route. These protocols maintain routes to all possible destinations even...

Words: 1800 - Pages: 8

Free Essay

Network

...Preface A large class of routing protocols for MANETs, namely, reactive protocols, employs some form of caching to reduce the no. of route discoveries .the simplest form of caching is based on associating a timeout with each cache entry. Such timer based cache scheme can increase the protocol efficiency. However the timeout is not well tuned, a sever performance degradation arises as entries are removed either too early or too late from the cache . In this paper, we address the problem designing a proactive protocol scheme that does not rely on any timer-based mechanism. This scheme guarantees that valid cached routes are never removed while stale routes are removed aggressively .This proactive caching scheme has been embedded in the Zone Routing Protocol (ZRP) framework. 1: INTRODUCTION The term MANET (Mobile Adhoc Network)refers to a multihop packet based wireless network composed of a set of mobile nodes that can communicate and move at the same time , without using any kind of fixed wired infrastructure. MNET are actually self organizing and adaptive networks that can be formed and deformed on-the-fly without the need of any centralized administration. As for other packet data networks, one –to-one communication in a MANET is achieved by unicast routing each single packet. Routing in MANET is challenging due to the constraints existing on the transmission...

Words: 2723 - Pages: 11

Premium Essay

Manet

...Mobile ad-hoc network is wireless network composed of different nodes communicate with each other without having to establish infrastructure. The security of such network is a major concern. To improve the security of such network, technique proposed here is securing routing protocol AODV through the use of Symmetric Encryption algorithm AES. This secures the data as well as preserves the confidentiality. Further future work to be carried as of node authentication using IP address and using the AODV routing protocol and digital signature scheme. Keywords-- Mobile ad-hoc, symmetric encryption algorithm, confidentiality, AODV, Digital signature, IP address The nodes involved in a MANET should collaborate amongst themselves and each node acts as a relay as needed, to implement functions e.g. security and routing. C] Multihop Routing: Basic types of ad hoc routing algorithms can be singlehop and multihop, based on different link layer attributes and routing protocols. Single-hop MANET is simpler than multihop in terms of structure and implementation, with the cost of lesser functionality and applicability. When delivering data packets from a source to its destination out of the direct wireless transmission range, the packets should be forwarded via one or more intermediate nodes D] Light –weight Terminal: In most cases, the MANET nodes are mobile devices with less CPU processing capability, small memory size, and low power storage. Such devices need optimized algorithms and mechanisms...

Words: 2868 - Pages: 12

Free Essay

Implementation and Evaluation of Wireless Mesh Networks on Manet Routing Protocols

...2013 Implementation and Evaluation of Wireless Mesh Networks on MANET Routing Protocols Shashi Bhushan1,Anil Saroliya2 ,Vijander Singh3 Research Scholar, Computer Science, Amity University, Jaipur, India 1 Assistant Professor, Computer Science, Amity University, Jaipur, India 2 Senior Lecturer, Computer Science, Amity University, Jaipur, India 3 Abstract—Wireless Mesh Network (WMN) is a kind of network which is made up of Mesh router and Mesh clients where Mesh router having lesser mobility and form the heart of WMNs. In this paper, Wireless Mesh Network over MANET implemented using routing protocols such as AODV, DSR. In this work NS-2.34 simulator is used for simulations. Various measurements and calculations were figure out in this work like throughput, Average end-end delay, PDR, NRL and Routing packets in Random way point mobility model. WMN have features such as self configuration, self healing and low cost of equipment. This work specifically aims to study the performance of routing protocols in a wireless mesh network, where static mesh routers and mobile clients participate together to implement networks functionality such as routing and packet forwarding in different mobility scenarios Keywords- Ad hoc Network, Routing Protocols, Wireless Mesh Network, Performance, Throughput, PDR, NRL and Routing packets in Random way point mobility model, Simulation on Network simulator NS-2, AODV,DSR , Routing Overhead. I. INTRODUCTION A Mobile Ad-hoc network (MANET) is an autonomous...

Words: 4335 - Pages: 18

Free Essay

Routing Approaches of Delay Tolerant Networks

...©2010 International Journal of Computer Applications (0975 - 8887) Volume 1 – No. 17 Routing Approaches in Delay Tolerant Networks: A Survey R. J. D'Souza National Institute of Technology Karnataka, Surathkal, India Johny Jose National Institute of Technology Karnataka, Surathkal, India ABSTRACT Delay Tolerant Networks (DTNs) have evolved from Mobile Ad Hoc Networks (MANET). It is a network, where contemporaneous connectivity among all nodes doesn’t exist. This leads to the problem of how to route a packet from one node to another, in such a network. This problem becomes more complex, when the node mobility also is considered. The researchers have attempted to address this issue for over a decade. They have found that communication is possible in such a challenged network. The design of routing protocol for such networks is an important issue. This work surveys the literature and classifies the various routing approaches. discontinuity in the network. There are also methods that have employed additional mobile nodes, to provide better message delivery. Researchers are even exploring how the social interaction of humans can be utilized for routing in a DTN. This survey has made an extensive study of the various routing strategies taken by the researchers in the past few years. We have classified them based on the type of knowledge used for routing. 2. FLOODING BASED APPROACHES Knowledge about the network helps in deciding the best next hop. It can happen that the...

Words: 6818 - Pages: 28

Free Essay

Mobile Ip in Source Routing Systems

...Technical University of Ilmenau Faculty of Computer Science and Automation Department of Integrated Communications Systems Student research project (Mobile IP in Source Routing Systems) Supervisor: Dipl.-Inf. Florian Liers Editor: Imad kailouh Ilmenau, July 2010 1. Introduction ............................................................................................................. 4 1.1 Motivation .......................................................................................................... 4 1.2 Purpose of the work .......................................................................................... 4 2. Basics ..................................................................................................................... 5 2.1 Internet Protocol (IP) ......................................................................................... 5 2.1.1 IP Routing....................................................................................................... 5 2.1.1.1 What is routing ...................................................................................... 5 2.1.1.2 Source vs. Hop by Hop Routing ............................................................ 5 2.2 Mobile IP ........................................................................................................... 7 2.2.1 Terminology in Mobile IP ............................................................................. 7 2.2.2 How Mobile IP Works...

Words: 7747 - Pages: 31