13.07.2015 Views

Page 2 Lecture Notes in Computer Science 2865 Edited by G. Goos ...

Page 2 Lecture Notes in Computer Science 2865 Edited by G. Goos ...

Page 2 Lecture Notes in Computer Science 2865 Edited by G. Goos ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

16 J. Doshi and P. Kilambipacket that reports their address and bandwidth value.They also have the optionof prevent<strong>in</strong>g A from actively ma<strong>in</strong>ta<strong>in</strong><strong>in</strong>g <strong>in</strong>formation on them us<strong>in</strong>g ablock<strong>in</strong>g bit(expla<strong>in</strong>ed subsequently). For example <strong>in</strong> Fig. 1, node F sets theblock<strong>in</strong>g bit and hence prevents A from query<strong>in</strong>g it although it has high fitness.Node A, now adds all the neighborswho responded <strong>in</strong>to its neighbor listand those with block<strong>in</strong>g bit not set tothe node heap. Now the node beg<strong>in</strong>sthe table buildup procedure. NodeA, for the rema<strong>in</strong>der of its lifetime,keeps poll<strong>in</strong>g its neighborhood withhello messages to stay <strong>in</strong>formed of itsneighbors.Fig. 1. Node A’s immediate neighborhoodon its entry <strong>in</strong>to the networkUse of the Block<strong>in</strong>g bit: This bit maybe set if a node f<strong>in</strong>ds the ratio of rout<strong>in</strong>g<strong>in</strong>formation to data <strong>in</strong>formationexceeds some threshold. This safeguardsthe proactive rout<strong>in</strong>g overheadof the protocol and hence a node with high fitness is prevented from be<strong>in</strong>goverloaded (Node F <strong>in</strong> Fig. 1). The block<strong>in</strong>g bit is also set when the environmentaround that node is volatile.This forces nodes around it to switch over to reactiverout<strong>in</strong>g, which performs better <strong>in</strong> such scenarios. In a stable environment,nodes will be encouraged to use active <strong>in</strong>formation. Thus the protocol adapts tochang<strong>in</strong>g environment characteristics.4.3 Rout<strong>in</strong>g Table BuildupApplication of Fitness functionWe extend the concept of fitness function, discussed earlier, to MANETs. Eachnode uses the fitness function to f<strong>in</strong>d its role <strong>in</strong> the environment and how manynodes it can query. If it has higher fitness, it has to assume a role of facilitatorand allow less fit nodes to communicate. This function F(fitness) is now used toselect the number of nodes to be queried (M) from subsequent hop nodes us<strong>in</strong>gthe formula,M = m<strong>in</strong>(round(F × exp −i2 ×n),n1) (1)where, i is the iteration number (0,1,. . . ,n), n is the sum of number of hop (i+1)nodes to be queried and number of nodes not selected up to i iterations and n1is the number of nodes currently <strong>in</strong> heap. In Fig.2, Node A selects B, C and Ebased on this fitness function as they have sufficiently high bandwidth. It thenstarts the next iteration of the table buildup <strong>by</strong> query<strong>in</strong>g these selected nodes.This is expla<strong>in</strong>ed <strong>in</strong> the next paragraph(Query<strong>in</strong>g Fit nodes). The exponentialfall-off <strong>in</strong> the order of 2 is used because it becomes that much more expensiveto ma<strong>in</strong>ta<strong>in</strong> nodes proactively with <strong>in</strong>creas<strong>in</strong>g hop radius. This is multiplied <strong>by</strong>n, as n is dynamic and varies from hop to hop.Thus the fitness is effectively‘scaled’ [11].

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!