12.07.2015 Views

Journal of Emerging Technologies in Web Intelligence Contents

Journal of Emerging Technologies in Web Intelligence Contents

Journal of Emerging Technologies in Web Intelligence Contents

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

82 JOURNAL OF EMERGING TECHNOLOGIES IN WEB INTELLIGENCE, VOL. 2, NO. 2, MAY 2010messages are handled may differ among differentprotocols, but their functionality rema<strong>in</strong>s the same: arequest is relayed until it reaches a node with a valid routeto the dest<strong>in</strong>ation or the dest<strong>in</strong>ation itself, which triggers areply message sent back to the orig<strong>in</strong>ator. Severalparameters (such as how long to keep requests <strong>in</strong> a cache,timeouts for requests, timeouts for hellos) are subject totun<strong>in</strong>g, and the choices made may result <strong>in</strong> improvements<strong>in</strong> the protocol performance. However, RREQs arepropagated us<strong>in</strong>g either an unrestricted broadcast or anexpand<strong>in</strong>g r<strong>in</strong>g search. In either case, the result<strong>in</strong>gflood<strong>in</strong>g operation causes considerable collisions <strong>of</strong>packets <strong>in</strong> wireless networks us<strong>in</strong>g contention-basedchannel access.In addition to apply<strong>in</strong>g DP to reduce the number <strong>of</strong>nodes that need to propagate RREQs transmitted onbroadcast mode, <strong>in</strong>formation regard<strong>in</strong>g prior routes to adest<strong>in</strong>ation is used to unicast RREQs to a region close tothe <strong>in</strong>tended dest<strong>in</strong>ation, so that broadcast RREQs arepostponed as much as possible and occur (if necessary)only close to the dest<strong>in</strong>ation, rather than on network-widebasis. This RREQ Algoritm presents the pseudo-code forthe modified RREQ. A route request (RREQ) is handledas follows:• If the source <strong>of</strong> a RREQ does not have any previousknowledge about the route to the dest<strong>in</strong>ation or is retry<strong>in</strong>gthe RREQ, it calculates its forwarder list us<strong>in</strong>g DP, andbroadcasts the packet (L<strong>in</strong>es 8, 9, and 14).• On the other hand, if the source <strong>of</strong> a RREQ hasknowledge about a recently expired route to thedest<strong>in</strong>ation, and there is a valid route to the next hoptowards the dest<strong>in</strong>ation (L<strong>in</strong>es 2, 3, and 4), the nodecalculates the forwarder list us<strong>in</strong>g DP (L<strong>in</strong>e 9), but <strong>in</strong>stead<strong>of</strong> broadcast<strong>in</strong>g the RREQ packet, the node unicasts thepacket to the last known next hop towards the dest<strong>in</strong>ation(L<strong>in</strong>e 12).Upon receiv<strong>in</strong>g a route request, a forwarder thatcannot respond to this request calculates its ownforwarder list us<strong>in</strong>g the <strong>in</strong>formation provided <strong>in</strong> theRREQ packet (i.e., forwarder list, second to previousforwarder list, and source node) and broadcasts or unicaststhe packet (depend<strong>in</strong>g on which one <strong>of</strong> the two first casesapply) after updat<strong>in</strong>g it with its own forwarder list.RREQ AlgorithmData : n i, dest<strong>in</strong>ation D, B i , U iResult : Unicast the RREQ, or Broadcast the RREQBeg<strong>in</strong>1 if recently expired route to D and not retry<strong>in</strong>gthen2 NextHop ← previous_nextHop(D)3 if validRoute(NextHop) then4 result←Unicast5 else6 result←Broadcast7 else8 result←Broadcast9 F i ←DP( n i, B i , U i )10 Update RREQ packet with F i11 if result== Unicast then12 Unicast the RREQ packet to NextHop13 else14 broadcast the RREQ packetendEventually, the RREQ reaches a node with a route tothe dest<strong>in</strong>ation or the dest<strong>in</strong>ation itself. Our approachattempts to reduce the delay <strong>of</strong> the route discovery byunicast<strong>in</strong>g a RREQ towards the region where thedest<strong>in</strong>ation was previously located. The success <strong>of</strong> thisapproach depends on how fresh the previous known routeto the dest<strong>in</strong>ation is, and how fast the dest<strong>in</strong>ation node ismov<strong>in</strong>g out <strong>of</strong> the previous known location. If an<strong>in</strong>termediate node has completely removed any route tothe dest<strong>in</strong>ation, the RREQ is then broadcasted. The<strong>in</strong>tended effect is to postpone the broadcast <strong>of</strong> a RREQ tothe region closest to the dest<strong>in</strong>ation. In the case that theunicast approach fails, or there is no previous route to thedest<strong>in</strong>ation, the source broadcasts by default.Because <strong>of</strong> topology changes, nodes may not havecorrect two-hop neighborhood <strong>in</strong>formation, which mayresult <strong>in</strong> forward<strong>in</strong>g lists that do not cover all nodes <strong>in</strong>the neighborhood. However, this is not a major problemwhen the request is broadcasted, because a node<strong>in</strong>correctly excluded from the forwarder list may alsoreceive the request and is able to respond <strong>in</strong> the case it hasa route to the dest<strong>in</strong>ation.C. Enhanced Dom<strong>in</strong>ant Prun<strong>in</strong>g AlgorithmIn their paper [6], wei Lou and Jie Wu proposed twoenhanced dom<strong>in</strong>ant prun<strong>in</strong>g algorithms: the TotalDom<strong>in</strong>ant prun<strong>in</strong>g (TDP) algorithm and ParatialDom<strong>in</strong>ant Prun<strong>in</strong>g (PDP).In TDP algorithm, if node v can receive a packetpiggybacked with N(N(v)) from node u , the 2-hopneighbour set that needs to be covered by v’s forwardnode list F is reduced to U = N(N(v)) – N(N(u)). Thema<strong>in</strong> objective <strong>of</strong> the TDP algorithm is that 2-hopneighbourhood <strong>in</strong>formation <strong>of</strong> each sender is piggybacked<strong>in</strong> the broadcast packet which results <strong>in</strong> consumption <strong>of</strong>more bandwidth.D. Partial Dom<strong>in</strong>ant Prun<strong>in</strong>g Algorithm:Just like the DP algorithm, <strong>in</strong> PDP, noneighbourhood <strong>in</strong>formation <strong>of</strong> the sender is piggybackedwith the broadcast packet. Apart from exclud<strong>in</strong>g N (u)and N (v) from N (N (v)) as <strong>in</strong> the DP algorithm, we canhere exclude some more nodes from neighbours <strong>of</strong> eachnode <strong>in</strong> N (u) ∩ N (v). Such a node set is denoted by P(u,v) (or simply P) = N(N(u) ∩ N(v)). Then 2-hopneighbour set U <strong>in</strong> the PDP algorithm can be given by U= N(N(v)) – N(u) – N(v) – P s<strong>in</strong>ce P is a subset <strong>of</strong>N(N(u)), we can easily see P can be excluded fromN(N(v)). Also it can be proved that U is subset <strong>of</strong> N(B),when P = N(N(u)∩N(v)), U = N(N(v)) – N(u) – N(v)-Pand B = N(v) – N(u).E Adaptive Partial Dom<strong>in</strong>ant Prun<strong>in</strong>g Algorithm[19]Adaptive dom<strong>in</strong>ant prun<strong>in</strong>g algorithm (APDP) issimilar to PDP. However, besides exclud<strong>in</strong>g N (u), N (v)and P from N (N (v)) as mentioned <strong>in</strong> PDP algorithm,adjacent nodes <strong>of</strong> U are elim<strong>in</strong>ated from U.© 2010 ACADEMY PUBLISHER

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!