13.07.2015 Views

Page 2 Lecture Notes in Computer Science 2865 Edited by G. Goos ...

Page 2 Lecture Notes in Computer Science 2865 Edited by G. Goos ...

Page 2 Lecture Notes in Computer Science 2865 Edited by G. Goos ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

4 Protocol DetailsSAFAR: An Adaptive Bandwidth-Efficient Rout<strong>in</strong>g Protocol 15The protocol has four ma<strong>in</strong> subdivisions. In section 4.2, we expla<strong>in</strong> the neighbordiscovery mechanism, which leads to the table buildup procedure(Section 4.3).In section 4.4, we describe how rout<strong>in</strong>g is carried out and the route discoveryprocedure. Section 4.5 describes how routes already acquired are ma<strong>in</strong>ta<strong>in</strong>ed.Assumptions:• Every node has <strong>in</strong>formation about its own bandwidth <strong>in</strong> terms of l<strong>in</strong>k capacityfrom the l<strong>in</strong>k layer.• Every node has <strong>in</strong>formation about its own power at any po<strong>in</strong>t of time. This<strong>in</strong>formation is available <strong>in</strong> terms of battery time rema<strong>in</strong><strong>in</strong>g.• All l<strong>in</strong>ks are bi-directional4.1 Fitness FunctionOur protocol uses the concept of fitness function applied extensively <strong>in</strong> [11]. Weuse this because each node exists <strong>in</strong> a diverse environment (nodes have differ<strong>in</strong>gbandwidth and power attributes). Thus, it draws a parallel to genes of differ<strong>in</strong>gfitness value exist<strong>in</strong>g <strong>in</strong> the population of a Genetic Algorithm(GA). GAs usefitness functions to determ<strong>in</strong>e which members from the population are to beselected.The fitness function, is given <strong>by</strong>, F = δ2∆where, δ is node’s cost metric and ∆is average cost metric of surround<strong>in</strong>g network environment. The choice of δ ,canvary <strong>in</strong> a volatile ad hoc environment. In most cases where neither bandwidthnor power is an overbear<strong>in</strong>g concern, the most versatile choice would be theweighted average of bandwidth and power, δ = αB+βPα+βwhere, α, β > 0,Bisthenode’s own bandwidth(<strong>in</strong> kbps) and P is the node’s rema<strong>in</strong><strong>in</strong>g power (<strong>in</strong> batterytime left). But <strong>in</strong> certa<strong>in</strong> cases, when bandwidth(or power) alone may requireoptimum usage,β (or α) could be set to 0. For the rema<strong>in</strong>der of the paper, wedescribe the protocol behavior <strong>in</strong> terms of optimiz<strong>in</strong>g bandwidth alone (α =1and β = 0). The choice of ∆ is obvious and is given <strong>by</strong> ∆ = δ nwhere, n = no.of nodes <strong>in</strong> the immediate vic<strong>in</strong>ity of the current node. A more effective choicefor ∆ might be the average of averages from different environments. This maybe given <strong>by</strong>, ∆ = ∑ N ∆ kk=1 Nwhere, ∆ k is the average of node cost metric δ forenvironment k, and N is the number of environments considered.4.2 Neighbor DiscoveryInitially when a node (say A with bandwidth 1500 kbps) jo<strong>in</strong>s a network (Fig. 1),it sends a hello packet to its neighbors <strong>by</strong> means of a broadcast as it doesnot know their addresses. The hello packet carries A’s address and cost metric(bandwidth)value.A’s neighbors (B, C, D, E, F), on receiv<strong>in</strong>g this hello packet, update theirrout<strong>in</strong>g tables, add<strong>in</strong>g A as a neighbor. They then reply, with a hello reply

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!