13.07.2015 Views

Page 2 Lecture Notes in Computer Science 2865 Edited by G. Goos ...

Page 2 Lecture Notes in Computer Science 2865 Edited by G. Goos ...

Page 2 Lecture Notes in Computer Science 2865 Edited by G. Goos ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

18 J. Doshi and P. Kilambibandwidth) l<strong>in</strong>k along the route it has to the dest<strong>in</strong>ation (it would be able tocalculate this from its own rout<strong>in</strong>g table).The first Type-1 reply for the dest<strong>in</strong>ation X, triggers an entry be<strong>in</strong>g addedfor the dest<strong>in</strong>ation <strong>in</strong> the source node’s rout<strong>in</strong>g table with the respond<strong>in</strong>g node’saddress set as the next hop. For subsequent Type-1 replies for the same dest<strong>in</strong>ation,the response with a higher bandwidth is chosen and the rout<strong>in</strong>g tableis updated appropriately. An <strong>in</strong>termediate node, which receives a Type-1 reply,adds an entry for dest<strong>in</strong>ation X to its rout<strong>in</strong>g table before forward<strong>in</strong>g the packetto the source A. In the event of no response from any node(with<strong>in</strong> a timeoutperiod), route discovery proceeds to the next stage, otherwise, it ends here.Type-2 messag<strong>in</strong>g (This is an on demand route discovery, follow<strong>in</strong>g the samepattern as [5] or [6]).When the members of the proactive list do not respond positively, a Type-2request is created. The Type-2 request packet conta<strong>in</strong>s a request-ID, a bandwidthfield and a node list. The source adds its address to this list and broadcasts themessage. This prompts a route discovery among the nodes that receive thismessage. Every <strong>in</strong>termediate node G(say), that receives this message checks thesource-dest<strong>in</strong>ation-request-ID tuple to see if it has already handled this packet.If it has, it discards the packet, otherwise, it adds this tuple to its list. This alsoprevents loop formation.• If G does not have knowledge of X, it adds its own address to the node listof the Type-2 message, compares its bandwidth to the bandwidth field of thepacket and sets the bandwidth field of the packet to the lower of the two values.This helps to ma<strong>in</strong>ta<strong>in</strong> the m<strong>in</strong>imum bandwidth l<strong>in</strong>k along the path so that thesource node can choose the maximum least bandwidth reply <strong>in</strong> case of multipleresponses for dest<strong>in</strong>ation X. This is because the m<strong>in</strong>imum bandwidth along apath is its bottleneck. Node G, now forwards the packet to its neighbors.• If G has knowledge of X, it simply reverses the node list of the Type-2 requestand adds it to the Type-2 reply message that it generates. It also copies thevalue of the bandwidth field from Type-2-request to the reply. It then forwardsthis message to the first node on the node list. The source just adds an entry toits rout<strong>in</strong>g table choos<strong>in</strong>g the least cost route if it has multiple routes.In case there are multiple replies for the same dest<strong>in</strong>ation, the source choosesthe response with the highest value <strong>in</strong> the bandwidth field as expla<strong>in</strong>ed earlier.The source then transmits the data packets based on this entry. In case there isa change <strong>in</strong> the network configuration over this period and the route no longerexists,the node that is not able to f<strong>in</strong>d the dest<strong>in</strong>ation(say Z) <strong>in</strong> its rout<strong>in</strong>g table,upon receipt of the data packet, returns a “route error” message to the source.This is likely to occur if the dest<strong>in</strong>ation leaves the rout<strong>in</strong>g table of Z before thearrival of the data packet but after the type-2 reply has been dispatched.Advantage of the two-stage approach: The probability of f<strong>in</strong>d<strong>in</strong>g the dest<strong>in</strong>ationnode us<strong>in</strong>g a Type-1 message is high as the members of the proactive list havea high bandwidth. Hence, they are likely to be well known to others. Therefore,<strong>in</strong> the average case, the route is likely to be found at the first stage itself. Evenif it is not found at this stage, the overhead is negligible compared to the ga<strong>in</strong>

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!