13.07.2015 Views

Page 2 Lecture Notes in Computer Science 2865 Edited by G. Goos ...

Page 2 Lecture Notes in Computer Science 2865 Edited by G. Goos ...

Page 2 Lecture Notes in Computer Science 2865 Edited by G. Goos ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Space-Time Rout<strong>in</strong>g <strong>in</strong> Ad Hoc Networks 9DDE(2,1)E(2,1)(2,2)S(1,4)ABC(1,3) (1,2) (1,1)DS(1,4)AB(1,3) (2,3)CFig. 1. On the left side: A network with a route from S to D hav<strong>in</strong>g sequence number 1.D has moved, break<strong>in</strong>g the last hop. A packet sent <strong>by</strong> S to D is buffered at C while Csends a route request. On the right side: C’s route request is answered <strong>by</strong> D, result<strong>in</strong>g<strong>in</strong> a new route with sequence number 2. The packet for D buffered at C can now beforwarded back through B, result<strong>in</strong>g <strong>in</strong> a packet loop (S − A − B − C − B − E − D).A packet loop only occurs once; subsequent packets from S to D will be routed <strong>by</strong> Bdirectly to E.On Packet Loops. We have shown above that STR routes are loop-free. Ouranalysis has made the dist<strong>in</strong>ction between packet loops and route loops. Thisdist<strong>in</strong>ction is usually not made <strong>in</strong> the analysis of rout<strong>in</strong>g protocols because theyoften prove loop freedom <strong>by</strong> show<strong>in</strong>g that a packet will not traverse the samenode twice; therefore both packet and route loops are excluded.STR, on the other hand, excludes route loops but does not exclude packetloops. Therefore it offers a weaker guarantee than protocols such as [1] [2] whichestablish routes on an end-to-end basis and require a route to be converged beforesend<strong>in</strong>g packets. This weakened guarantee can been seen as a consequenceof STR’s distributed hop-<strong>by</strong>-hop operation which uses only local repairs without<strong>in</strong>volv<strong>in</strong>g the end-po<strong>in</strong>ts of a route. On the other hand, relax<strong>in</strong>g protocolguarantees to allow packet loops allows an <strong>in</strong>crease <strong>in</strong> efficiency which make thisparticularly worthwhile <strong>in</strong> highly mobile networks.We discuss a small example of a packet loop show<strong>in</strong>g that even when a packetloop does occur, subsequent packets will shortcut the loop and therefore packetloops cannot happen on back-to-back packets. In Fig.1, there is a route from Sto D, which might have been established <strong>by</strong> a packet sent earlier from D to Swith sequence number 1. D has s<strong>in</strong>ce moved and therefore the last hop of thisroute is broken.This example shows an <strong>in</strong>stance of a packet loop s<strong>in</strong>ce the data packet traversesnode B twice. Note that this is not a route loop s<strong>in</strong>ce B’s rout<strong>in</strong>g entry fordest<strong>in</strong>ation D has changed between the first and second traversals, and thereforethe packet does not get “stuck” <strong>in</strong> a loop between B and C. Note also thatsubsequent packets for D will now be forwarded <strong>by</strong> B to E; each <strong>in</strong>stance of apacket loop can only occur once.Exploit<strong>in</strong>g Outdated Rout<strong>in</strong>g State. Most ad hoc rout<strong>in</strong>g protocols attachsome notion of useful lifetime to their rout<strong>in</strong>g state. Typically each route (or <strong>in</strong>dividualrout<strong>in</strong>g entry) is expired when it rema<strong>in</strong>s unused past a certa<strong>in</strong> timeout(3 seconds <strong>in</strong> AODV for example).

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!