13.07.2015 Views

Page 2 Lecture Notes in Computer Science 2865 Edited by G. Goos ...

Page 2 Lecture Notes in Computer Science 2865 Edited by G. Goos ...

Page 2 Lecture Notes in Computer Science 2865 Edited by G. Goos ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Space-Time Rout<strong>in</strong>g <strong>in</strong> Ad Hoc Networks 9DDE(2,1)E(2,1)(2,2)S(1,4)ABC(1,3) (1,2) (1,1)DS(1,4)AB(1,3) (2,3)CFig. 1. On the left side: A network with a route from S to D hav<strong>in</strong>g sequence number 1.D has moved, break<strong>in</strong>g the last hop. A packet sent <strong>by</strong> S to D is buffered at C while Csends a route request. On the right side: C’s route request is answered <strong>by</strong> D, result<strong>in</strong>g<strong>in</strong> a new route with sequence number 2. The packet for D buffered at C can now beforwarded back through B, result<strong>in</strong>g <strong>in</strong> a packet loop (S − A − B − C − B − E − D).A packet loop only occurs once; subsequent packets from S to D will be routed <strong>by</strong> Bdirectly to E.On Packet Loops. We have shown above that STR routes are loop-free. Ouranalysis has made the dist<strong>in</strong>ction between packet loops and route loops. Thisdist<strong>in</strong>ction is usually not made <strong>in</strong> the analysis of rout<strong>in</strong>g protocols because theyoften prove loop freedom <strong>by</strong> show<strong>in</strong>g that a packet will not traverse the samenode twice; therefore both packet and route loops are excluded.STR, on the other hand, excludes route loops but does not exclude packetloops. Therefore it offers a weaker guarantee than protocols such as [1] [2] whichestablish routes on an end-to-end basis and require a route to be converged beforesend<strong>in</strong>g packets. This weakened guarantee can been seen as a consequenceof STR’s distributed hop-<strong>by</strong>-hop operation which uses only local repairs without<strong>in</strong>volv<strong>in</strong>g the end-po<strong>in</strong>ts of a route. On the other hand, relax<strong>in</strong>g protocolguarantees to allow packet loops allows an <strong>in</strong>crease <strong>in</strong> efficiency which make thisparticularly worthwhile <strong>in</strong> highly mobile networks.We discuss a small example of a packet loop show<strong>in</strong>g that even when a packetloop does occur, subsequent packets will shortcut the loop and therefore packetloops cannot happen on back-to-back packets. In Fig.1, there is a route from Sto D, which might have been established <strong>by</strong> a packet sent earlier from D to Swith sequence number 1. D has s<strong>in</strong>ce moved and therefore the last hop of thisroute is broken.This example shows an <strong>in</strong>stance of a packet loop s<strong>in</strong>ce the data packet traversesnode B twice. Note that this is not a route loop s<strong>in</strong>ce B’s rout<strong>in</strong>g entry fordest<strong>in</strong>ation D has changed between the first and second traversals, and thereforethe packet does not get “stuck” <strong>in</strong> a loop between B and C. Note also thatsubsequent packets for D will now be forwarded <strong>by</strong> B to E; each <strong>in</strong>stance of apacket loop can only occur once.Exploit<strong>in</strong>g Outdated Rout<strong>in</strong>g State. Most ad hoc rout<strong>in</strong>g protocols attachsome notion of useful lifetime to their rout<strong>in</strong>g state. Typically each route (or <strong>in</strong>dividualrout<strong>in</strong>g entry) is expired when it rema<strong>in</strong>s unused past a certa<strong>in</strong> timeout(3 seconds <strong>in</strong> AODV for example).

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!