1 / 21

Lecture 6 : The Lightweight Mobile Routing Algorithm

Lecture 6 : The Lightweight Mobile Routing Algorithm. Lecture 6.1 : Basic ideas behind the LMR algorithm and initialization of a network Lecture 6.2 : Route maintenance and detailed description. The Domain of the LMR Algorithm.

harlan
Download Presentation

Lecture 6 : The Lightweight Mobile Routing Algorithm

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Lecture 6 : The Lightweight Mobile Routing Algorithm Lecture 6.1 : Basic ideas behind the LMR algorithm and initialization of a network Lecture 6.2 : Route maintenance and detailed description Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)

  2. The Domain of the LMR Algorithm • The lightweight mobile routing (LMR) algorithm was developed for routing in highly dynamic mobile networks. • If the mobility is extremely high, the only possible routing strategy is flooding the network with a message and hoping that the message will eventually reach the destination. • All mobile routing protocols degenerate into flooding in extremely mobile environments. Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)

  3. The Domain of the LMR Algorithm • On the other hand, if mobility is low, shortest path based algorithms are more appropriate as shortest path computations converge before the nodes move. • The LMR algorithm is suitable in an intermediate domain when mobility is not so low that shortest path algorithms can converge, and mobility is not so high that flooding is the only possibility. Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)

  4. Properties of the LMR Algorithm • The LMR algorithm is loosely based on the link-reversal strategy of the Gafni-Bertsekas algorithm. • However, there are significant differences between the two algorithms. The most important difference is that the LMR algorithm works even when the network is partitioned. • Also, the LMR algorithm finds routes on-demand instead of maintaining paths to a destination from all other nodes. Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)

  5. Properties of the LMR Algorithm • For a given destination D, instead of maintaining routes from all source nodes to D, the algorithm guarantees route maintenance only for those sources that actually need the routes. • This property ensures that the control overhead of the algorithm is quite low. • The objective of the LMR protocol is not to find a shortest path between a source-destination pair, rather to find any path. Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)

  6. Network Model • The neighbours of a node are denoted by • For each neighbour , there exists a link between nodes and • This link may be directed or undirected. • An underlying link level protocol provides the following services : • Each node is aware of all its neighbours • A packet transmitted by a node is received correctly by all its neighbours regardless of the status of the link. Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)

  7. Control Packets • The LMR protocol uses three types of control packets : • QRY (Query) : consists of a source node ID, a destination node ID, a sequence counter and a transmitting node ID • RPY (Reply) • FQ (Failure query) Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)

  8. QRY • The sequence counter in a QRY produces increasing sequence number. • The source node ID is the ID of the node which is sending the QRY. • The transmitting node ID is the ID of the node which is forwarding the QRY. • Both RPYs and FQs consist only of a destination node ID and a transmitting node ID. Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)

  9. Link Status Table • A node maintains a link status table entry LS(j) for each neighbour j. The status of an active link is one of the following : • Unassigned (UN), upstream (UP), downstream (DN), downstream-blocked (DN-B), unassigned-waiting (UN-W), and awaiting-broadcast (A-BR). • Links marked UN, UN-W and A-BR are undirected. • Remember that this is the link status table only with respect to one destination. Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)

  10. The General Case • We will discuss the protocol in terms of a single destination D and a link status table at each node for D. • Also, we will talk about a single DAG rooted at D. However, in general there are many destinations and one DAG for each destination. • Each node keeps track of each of its neighbour´s link status for each of the destinations. Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)

  11. Initialization Phase • In the beginning, the network is unassigned. • Only the neighbours of the destination D have routes to D. All other nodes do not have any route to D. The links for all these nodes are unassigned or undirected. • A node is said to have a route if it has at least one downstream link, though it may not have a complete route to D. Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)

  12. Initializing the Network • Eventually a node i which is not a neighbour of D will require a root to D and send a QRY. • This QRY starts the initialization phase and floods the network in the following sense. • Each node that receives the QRY broadcasts it to all of its neighbours only once. QRYs travel over unassigned links. Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)

  13. RPY • A node with a route to the destination D initiates a RPY message. • If a node receives a RPY over an unassigned link, it marks the link to the neighbour (from whom the RPY came) as downstream. • If there is no RPY for a certain period of time, the initiator of the QRY may start another QRY. Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)

  14. S D QRY Nodes that have received QRY Nodes that have paths to D An Example of Initialization Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)

  15. An Example of Initialization S D QRY Nodes that have received QRY Nodes that have paths to D Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)

  16. An Example of Initialization S D QRY Nodes that have received QRY Nodes that have paths to D Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)

  17. An Example of Initialization S D QRY RPY Nodes that have received QRY Nodes that have paths to D Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)

  18. An Example of Initialization RPY S RPY D RPY Nodes that have received QRY Nodes that have paths to D Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)

  19. An Example of Initialization RPY RPY S D RPY Nodes that have received QRY Nodes that have paths to D Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)

  20. An Example of Initialization RPY RPY S D Nodes that have received QRY Nodes that have paths to D Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)

  21. Initialization Completed • If the initiator of the QRY i.e., node S is in the partition of the network that contains D, eventually some neighbouring node of D will receive the QRY. • The resulting RPY messages initializes the network into a DAG rooted at D. S obtains one or more loop-free routes to D. • Even other nodes receive routes to D as a result of the initialization. Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)

More Related