13.07.2015 Views

Page 2 Lecture Notes in Computer Science 2865 Edited by G. Goos ...

Page 2 Lecture Notes in Computer Science 2865 Edited by G. Goos ...

Page 2 Lecture Notes in Computer Science 2865 Edited by G. Goos ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

SAFAR: An Adaptive Bandwidth-Efficient Rout<strong>in</strong>g Protocol 19<strong>in</strong> performance. It has to be noted that although the node exchanges neighbor<strong>in</strong>formation when it is queried dur<strong>in</strong>g the table buildup procedure, it does notexchange the complete rout<strong>in</strong>g table. This is why a Type-1 message is required.Exchang<strong>in</strong>g the complete table would cause problems dur<strong>in</strong>g update because ofcha<strong>in</strong>ed updates. Also, Type-2 relies on source rout<strong>in</strong>g <strong>in</strong> its reply. Hence, therout<strong>in</strong>g overhead is reduced.4.5 Route Ma<strong>in</strong>tenanceProactive region ma<strong>in</strong>tenanceIf a node A leaves the neighborhood of node X, it is removed from both theneighbor list and rout<strong>in</strong>g heap and all entries with A as the next hop are removed.If a node B sends X a send table packet, then X adds B to its update list beforesend<strong>in</strong>g A its neighbor list. In case of any change <strong>in</strong> the immediate topology ofX, i.e. a neighbor be<strong>in</strong>g added or removed, an update message will be sent to allnodes <strong>in</strong> the update list(<strong>in</strong>clud<strong>in</strong>g B). Thus, the proactive routes are ma<strong>in</strong>ta<strong>in</strong>ed.In a mobile scenario, where the topology is bound to change rapidly, nodeswill be cont<strong>in</strong>uously added and deleted from the proactive zone. This presentsa challenge because we take the trouble to dynamically buildup our “proactivezone”. Hence we describe a zone replacement strategy, as follows: The nodeX keeps monitor<strong>in</strong>g the status of its rout<strong>in</strong>g table and the number of nodesproactively ma<strong>in</strong>ta<strong>in</strong>ed. Assume, <strong>in</strong>itially the number of nodes <strong>in</strong> the proactivelist is n. Over time, due to addition and deletion of nodes, n may fall below acerta<strong>in</strong> threshold. In such a case, X deletes nodes from the heap and appliesthe table buildup procedure aga<strong>in</strong> to rebuild its proactive list from scratch. Thisthreshold value is calculated as follows: The node X keeps query<strong>in</strong>g neighborswith hello messages and also updates its lists when it gets an update packet.When the total number of proactively ma<strong>in</strong>ta<strong>in</strong>ed nodes drops below 40% of the<strong>in</strong>itial value, the node may beg<strong>in</strong> the table buildup aga<strong>in</strong>. The threshold can betweaked accord<strong>in</strong>g the environment <strong>in</strong> concern. In a highly mobile environment,the threshold may be decreased because repeatedly apply<strong>in</strong>g the table buildupprocedure will be expensive while <strong>in</strong> an environment which is expected to bestable the threshold value can be <strong>in</strong>creased. The whole buildup procedure isrepeated <strong>in</strong>stead of <strong>in</strong>cremental updates because as all the nodes are mobile, itis assumed that the node will f<strong>in</strong>d itself <strong>in</strong> a totally “alien” environment aftersome time.Handl<strong>in</strong>g Route ErrorsIf a node forward<strong>in</strong>g a data packet f<strong>in</strong>ds out that there is no route to dest<strong>in</strong>ationthen it tries a local route repair. This differs from traditional reactive schemesbecause we resort to the Type-1 discovery mechanism. If the Type-1 discoverydoes not yield a route to the dest<strong>in</strong>ation, we return a route-error message to thesource. In the very unlikely case, that we do not have a route to the source itself,we drop the packet.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!