13.07.2015 Views

Page 2 Lecture Notes in Computer Science 2865 Edited by G. Goos ...

Page 2 Lecture Notes in Computer Science 2865 Edited by G. Goos ...

Page 2 Lecture Notes in Computer Science 2865 Edited by G. Goos ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

6 H. Dubois-Ferrière, M. Grossglauser, and M. Vetterliwill be scoped us<strong>in</strong>g a TTL mechanism, and will likely proceed accord<strong>in</strong>g to anexpand<strong>in</strong>g r<strong>in</strong>g search. Expand<strong>in</strong>g r<strong>in</strong>g searches are used <strong>in</strong> many ad hoc rout<strong>in</strong>gprotocols; the specifics of this procedure are omitted here. We refer to [4] as anexample of a complete, practical STR protocol formulation.A f<strong>in</strong>al example relates to proactive operation of STR. The formulation givenhere is purely reactive, mean<strong>in</strong>g that a route is only computed when it is requiredto send packets. However STR can also accommodate proactive, or hybrid proactive/reactiveoperation, where<strong>by</strong> nodes proactively <strong>in</strong>form other nodes of someor all of rout<strong>in</strong>g entries. This is done us<strong>in</strong>g route advertisement packets, and aroute update decision mechanism similar to that used when receiv<strong>in</strong>g a regularpacket: if an advertised route is shorter <strong>in</strong> the S-T space than the one <strong>in</strong> thereceiv<strong>in</strong>g node’s rout<strong>in</strong>g table, then it overrides the exist<strong>in</strong>g route. We refer to[4] for a simple example of route advertisement operation <strong>in</strong> a STR protocol.Many schemes for controll<strong>in</strong>g the proactive dissem<strong>in</strong>ation of rout<strong>in</strong>g <strong>in</strong>formationare possible. For example, [5] explore schemes to adjust the relative amount ofreactive and proactive overhead. With STR another possibility would be to def<strong>in</strong>ea threshold value ω such that a node N proactively dissem<strong>in</strong>ates only therout<strong>in</strong>g entries which satisfy f(d D ,t D ) 0. The second consequence is that the function fneed not be explicitly def<strong>in</strong>ed. For example, <strong>in</strong> the case of the GREP protocol(see Sect. 3), the ‘natural’ presentation does not def<strong>in</strong>e f explicitly, though ofcourse a function f result<strong>in</strong>g <strong>in</strong> the equivalent order<strong>in</strong>g can be def<strong>in</strong>ed.3 Three Instances of STRWe now give three <strong>in</strong>stances of specific STR algorithms which provide a sampleof the wide range of protocols that fit under the STR umbrella.3.1 FRESH: FResher Encounter SearcHFRESH [3] is a simple route discovery algorithm us<strong>in</strong>g exclusively temporal<strong>in</strong>formation. Nodes keep a record of their most recent encounter times withother nodes. Instead of search<strong>in</strong>g for the dest<strong>in</strong>ation, the source node searchesfor any <strong>in</strong>termediate node that encountered the dest<strong>in</strong>ation more recently thandid the source node itself. The <strong>in</strong>termediate node then searches for a node thatencountered the dest<strong>in</strong>ation yet more recently, and the procedure iterates untilthe dest<strong>in</strong>ation is reached. Therefore, FRESH replaces the s<strong>in</strong>gle network-wide

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!