SlideShare a Scribd company logo
Description Based addressing and routing in  Cluster-based Ad-Hoc network  for  Home Environment By Tharinda Nishantha Vidanagama Supervised by, Prof. Hidenori Nakazato Honjo Seminar 2009 12 01
Ad Hoc Networks The Ad Hoc peer network is created spontaneously as two participating nodes come within the reach of one another. As the number of participating nodes and their positions vary the network it self reconfigures allowing all nodes to communicate even if they are not within their transmission range. The main advantage of Ad Hoc networks is that they do not require any infrastructure to operate.
Ad Hoc Networks But the main disadvantages are Highly dynamic topology due to the mobility of the nodes, i.e. the links are not stable and bandwidth is limited. Mobile devices are powered by batteries, putting an energy consumption constraint Security of the network is at risk as anyone can join the network and act as transmission mediators.
Ad Hoc Networks Increasingly wireless technology is build in to many devices. Networking these devices can bring many benefits. Range of application is vast. Military Disaster Mobile phone service extension.
Description based Ad Hoc Networks Communication failures are considered normal in Ad-hoc networks. Description based addressing instead of host based(IP) addressing is more appropriate because it will not rely on a single path, but uses multicasting . In description-based routing, selective information dissemination can be implemented. Easy to understand and manage the network. This will minimize control data among peers and facilitate group communication.
Ad Hoc Network at Home ! Increasingly new functions are built in to home appliances. Home appliances fitted with wireless communication modules would become more common in near future.  The system for home networking would provide information required for inter-working environment for home appliances and it’s users.  The nodes in this environment could also have the following constraints, Low memory  Low transmission distances Some nodes may have limited power supply.
Ad Hoc Network at Home ? What about the Ad Hoc network disadvantages? Household appliances are mostly static i.e. they may not move at all. Therefore the problems arising due to mobility is very limited. Almost all appliances are plugged in to an unlimited power supply, therefore the power limitations doesn’t apply. The whole network is owned by one owner, there is no security risk within the network.
Add Hoc home network - Approach 1. Cluster Based Ad Hoc Network 2. Description Based Routing and Addressing
1. Cluster Based   Add Hoc Network Why? At home most appliances are clustered in places. Kitchen Living room Bed room etc. Clustering also reduces the amount of control data exchanged among the nodes. Only a portion of the nodes are involved in the actual routing process.
Cluster Based   Add Hoc Network Organization Everyone knows its one hop neighbors ( Neighbor Table ). Cluster heads know their neighboring cluster heads ( Cluster Adjacency Table ). Member nodes send their messages to their respective cluster heads to be forwarded to their destinations. Only cluster heads and gateways forward messages.
Problem of Routing Does a cluster head know about all other cluster heads?  This requires high memory capacity ! How to route messages beyond known cluster range? A fixed size Routing Cache (RC) is used to keep track of the nodes that are beyond range. Rather than using a table structure this helps reduce the memory usage. There is no need to store the full identities or routs.
We assume that identifiers given to the nodes in the network i.e. home appliances are similar to the following examples.    Kitchen oven, Kitchen television, Living room television  etc. In this natural language usage, a general location is identified from the beginning words and becomes more specific within that particular area by the next words.  Our routing algorithm routes the data messages in the direction of the destination.  When the message finally arrives at the particular region, there would be nodes that store the exact identifier in their Neighbor table, thus allowing the message to be delivered to the correct destination node. 2. Description Based Routing and  Addressing  
How the Routing Cache is used? If a cluster head or gateway node comes across another cluster head that is beyond its range, it inserts the name in to the RC. E.g: if the required destination is “kitchen oven” but the RC entry may be “kitchen”.  This partial match is enough to ensure that the message gets routed in the direction of the kitchen.  If the entry is in the 1 st  position of the RC it would be as follows. Routing Cache Usage   0  1  2  3  4  5  6  7  8  9  10  11  12  13  14  15 n e h c t i k
Routing Cache Storage For the simulation purpose we use a fixed size character RC. Elements are inserted in a way that some of the information about old entries are overwritten by new entries. If, S - RC size p - Number of parts the RC is divided in to ( p = 2x,  where x = 0, 1, 2… and Total possible RC entries = 2p) P - The next position in RC to be occupied  q - (  1) If entry number is an odd number   (+1) If entry number is an even number. When an entry is made in to the RC the starting position (T) for an entry is given according to the following formula.   Starting Position T=
Routing Cache storage The number of characters allocated for an entry in the RC is given by the following formula,   Number of characters =  The actual character positions are given by a modified version of the  Fibonacci  series (0, 1, 2, 3, 5…), where we have omitted the repetition of number 1. Character position in the RC is given by the following formula,
Tabular Support Structures Neighbor Table (NT):  Holds the information about a node’s one-hop  neighbors that have a bi-directional link. It holds the neighbor’s  identifier and its status. Cluster Adjacency Tables (CAT):  Holds the information about the  neighboring clusters. A neighboring CH can be two or three hops  away. The CAT holds CH identifier and the GW identifier, which  is the next immediate hop in the direction of that cluster head. Routing Cache Table (RCT):  This will be used to store directional  RC. This table will store the one hop identifier (of a GW) of each  available bi-directional link that has clusters beyond itself and RC  for that direction. All the nodes keep an NT, but the CHs and the  GWs also keep the CATs and may also use RCT.
Types of Messages Control Messages - Control messages are sent only to a node’s one-hop neighbors.   All control messages are terminated at their one-hop neighbors. The receivers update their CAT, NT and RC/RCT with the new control data and create new control messages that are sent to its neighbors. This way the entire network is configured.   Type of message Description Number of Entries for each RC RC/RCT Entries RC/RCT of the sender (CH and GW nodes) RC/RCT CAT of the sender (CH and GW nodes) CAT NT of the sender NT Status of the sender Status Name of the sender ID
Handling a Control Message When a node receives a Control Message, If receiver is a CH and previous sender is a GW node or this node is a GW and previous sender is a CH, - If the sender is unknown then Add as a neighbor -  All known CH of the sender that it has a direct link or it is through  another GW node (this GW node must be a neighbor node of the  previous sender) are inserted to this CH’s CAT. - All other CAT entries are inserted to RC/RCT. - Previous sender’s NT entries that are not even partially known are  inserted to the RC/RCT. - Sender’s RC/RCT entries that are not even partially known are also  inserted to the RC/RCT.
Types of Messages 2. Data Messages - Nodes arbitrarily generate data messages after the network has configured. Data carried by the message Data Available number of hops TTL Next receiving node (only for directional routing) Nxt. Receiver Previous sender Prev.Sender Message destination Destination Type of message Description Status of the sender Status Message identifier MsgID Name of the sender ID
Handling Data Messages When a node receives a Data Message,  If destination is this node Consume data Else if I am Gateway/Cluster head and if this data has not already been  forwarded Look for destination in neighbor table If not found  Look for destination in Cluster Adjacency table If not found Look for partial match in Cluster Adjacency table If not found  Look for partial/complete match in the RC/RCT. If found Forward message Else Discard message.
A simulation program was developed in order to evaluate the above proposal.  We have used an environment, which is a flat surface 25*25 square units, where 100 nodes are statically located.  The size of the RC was limited to 128 characters. Each node has various transmission distance (maximum of 3 units) and priorities.  Each node will send a number of messages to randomly selected destinations.  Evaluation  
Evaluation – Message broadcast It shows 100% success rate on message delivery with the current environment setting.  But… message misdirection is very high !!!.  
Evaluation – Single Routing Cache It shows on average a 100% success rate on message delivery with the current environment setting.  But… message misdirection is still high !!!.
The message misdirection occurred because of the use of single RC. RC entries do not store the direction of that particular entry. Therefore the messages maybe forwarded to the wrong way as well. Evaluation – Why the misdirection?  
Solution – Directional Routing Cache Routing nodes are given a RC for each outward link. The nodes can now compute the next hop of the messages in the right direction.
The message misdirection is significantly reduced by the directional RCs. But the Memory usage is High and unpredictable !!! Simulation – Directional Routing Cache
The RC is divided proportionally between each bidirectional link. Initially full size given to first bidirectional link with a RC entry. If another link has a RC entry the RC is proportionally divided among the links according to the number of entries in each direction. Solution:  Proportional Directional RCs
Success at 100%  Simulation: Proportional Directional RCs
The performance is similar to the equal-sized directional RCs Equal-sized RC Vs Proportional directional RC
When a message is received by a node that has many outward links, it checks each RC for a match with the destination. If more than one RC is positively matched the node has to broadcast the message to all outward links. Thereafter only the next hop nodes who know the destination will forward the message, and the others will register a lost message. Directional RCs – remaining message drop
The loss due to wrong routing is significantly reduced by the directional RCs. Simulation Comparison %
Considering that a home environment does not contain large number of nodes, this algorithm can be effectively implemented.  The use of clustering has further supported in reducing the network traffic and routing overhead. Use of descriptions improves the user understandability of the system. Use of directional RCs will significantly reduce the message loss and improve resource usage. Proportional directional RC is the solution with most preferable settings. The amount of misdirected messages is also independent of the amount of data sent by any node. Conclusion
We will study the performance and issues when movement is introduced to the network nodes. In the home environment elements such as cell phones and laptops etc, will have movement associated with them. We would also like to find the optimal RC size for a given number of nodes. Further decrease the amount of control information held and transmitted by nodes. Future extensions  
[1] Tim Daniel Hollerung, “The Cluster-Based Routing Protocol”- project group ‘Mobile Ad-Hoc Networks Based on Wireless LAN’- 2003/4P. [2]Krishna, N.H. Vaidya, M. Chatterjee and D.K. Pradhan. “A cluster-based approach for routing in dynamic networks”. ACM SIGCOMM Computer Communication Review 27:49-65, 1997. [3] M. Petorvic, V. Muthusamy, H.Jacobsen, “Content-Based Routing in Mobile Ad Hoc Networks”,IEEE MobiQuitous, 2005. [4] Mario Gerla and jack Tzu-Chieh Tsai, “Multicluster, Mobile, Multimedia radio network”. ACM- Baltzer Journal of Wireless Networks ,1: 255-265, 1995. [5] R.C.Shah and J.M. Rabaey, “ Energy aware routing for low energy ad hoc sensor networks”,0-7803-7376-6/02 IEEE 2002, pp.350-355. [6] Tharinda N. Vidanagama, Hidenori Nakazato, “Description Based Routing and Addressing in Cluster Based Ad Hoc Network” IEICE General Conference, 2009. [7] Tharinda N. Vidanagama, Hidenori Nakazato, “Reduction of Message Misdirection in Description Based Clustered Ad Hoc Networks”, (To be presented at 7 th  IEEE CCNC PerNets workshop). Reference
In a home environment nodes have a limited,  Space, Available starting positions, Destinations. Infrequently moving nodes are also considered as static. Introducing Node Movements  
Observe node and classify them accordingly. - all nodes start as static nodes. -  The nodes should monitor their own movements.  - One method is to check whether its cluster changes from time  to time. but what if the cluster moved and not the node?  Do clusters move in a home environment? Movement Options  
Vary the “Hello” message or the beaconing frequency proportional to the node movement speed.  - In this case the node it self should measure its own speed and  adjust the beaconing frequency accordingly. - rate of changing of clusters can be used as a measure of  movement speed.  Introducing Node Movements  
Use a random way point model. - Randomly select nodes and move them to random destinations. -  In a home environment node can not have random routes.  -  There are only a number of fixed routes a node can take?   - The routes depend on the architecture of the house ! Introducing Node Movements  
Thank you !
Questions ?

More Related Content

PPTX
Ch 18 intro to network layer - section 2
PDF
Computer Network
PPTX
Ch 18 intro to network layer - section 1
PPTX
Ch 18 intro to network layer - section 5
PDF
Wireless LAN in Data Communication & Networking
PPTX
Network layer new
PPTX
Computer network switches & their structures
PPT
Packet switching
Ch 18 intro to network layer - section 2
Computer Network
Ch 18 intro to network layer - section 1
Ch 18 intro to network layer - section 5
Wireless LAN in Data Communication & Networking
Network layer new
Computer network switches & their structures
Packet switching

What's hot (20)

PPTX
Ch 18 intro to network layer - section 3
PPTX
Ch 20 UNICAST ROUTING SECTION 2
PPTX
UNIT 2 WIRELESS NETWORKS - MANET and DSDV
DOCX
Packet switching
PPT
Network Layer,Computer Networks
PPT
Unit i packet switching networks
PDF
INTRODUCTION TO NETWORK LAYER
PPTX
Packet Switching
PPTX
Packet Switching
PPT
Circuit and packet_switching
PPTX
Network Layer
PDF
Ip protocol tedting
 
PPT
Packet transfer mechanism using routers and IP addresses
PDF
Circuit Switching, Packet Switching, Virtual Circuit Networks and Datagram Ne...
PPTX
Network Layer
PPT
8 Packet Switching
PPTX
Network layer
PPT
Chapter 8
PPTX
AODV routing protocol
Ch 18 intro to network layer - section 3
Ch 20 UNICAST ROUTING SECTION 2
UNIT 2 WIRELESS NETWORKS - MANET and DSDV
Packet switching
Network Layer,Computer Networks
Unit i packet switching networks
INTRODUCTION TO NETWORK LAYER
Packet Switching
Packet Switching
Circuit and packet_switching
Network Layer
Ip protocol tedting
 
Packet transfer mechanism using routers and IP addresses
Circuit Switching, Packet Switching, Virtual Circuit Networks and Datagram Ne...
Network Layer
8 Packet Switching
Network layer
Chapter 8
AODV routing protocol
Ad

Viewers also liked (14)

PPT
основы здорового образа жизни
PDF
Lucke inppropriate babysitter
ODP
Digital Natives 3
PPS
Lab Seminar 2009 07 08 Message Drop Reduction
PPT
вокруг света
PPTX
Presentatie De Salesmanagers
PPS
Lab Seminar 2009 06 17 Description Based Ad Hoc Networks
PDF
Sneeze
PDF
Luckestuff
PDF
Lucke inppropriate babysitter
PPT
Pagerank
PDF
Bio Storage Labs & Repository Overview
PPT
Gli Animali
PPT
Sanitized Knowledge Transfer Deliverable:Rapid Process Change Tutorial
основы здорового образа жизни
Lucke inppropriate babysitter
Digital Natives 3
Lab Seminar 2009 07 08 Message Drop Reduction
вокруг света
Presentatie De Salesmanagers
Lab Seminar 2009 06 17 Description Based Ad Hoc Networks
Sneeze
Luckestuff
Lucke inppropriate babysitter
Pagerank
Bio Storage Labs & Repository Overview
Gli Animali
Sanitized Knowledge Transfer Deliverable:Rapid Process Change Tutorial
Ad

Similar to Lab Seminar 2009 12 01 Message Drop Reduction And Movement (20)

PPTX
Final PPT.pptx
PDF
ENHANCEMENT OF OPTIMIZED LINKED STATE ROUTING PROTOCOL FOR ENERGY CONSERVATION
PDF
Unit8 tgb
PDF
Enhancing the Energy Parameter of Leach Protocol For Wireless Sensor Network
PDF
Energy efficient routing_in_wireless_sensor_networks
DOCX
Energy efficient routing in wireless sensor networks
PPTX
Routing Techniques
PDF
Bn36386389
PDF
Performance Evaluation of a Layered WSN Using AODV and MCF Protocols in NS-2
PDF
Enhancement of Improved Balanced LEACH for Heterogeneous Wireless Sensor Netw...
PDF
Influence of Clustering on the Performance of MobileAd Hoc Networks (MANETs)
PDF
Efectos de nodos ieee 802.15.4 zig bee
PDF
Research Inventy : International Journal of Engineering and Science
PPT
chapter 4 networking: Connecting Devices.ppt
PPTX
CN UNIT II.pptx
PDF
Analysis of Cluster Based Anycast Routing Protocol for Wireless Sensor Network
PDF
Wireless sensor network
PPT
UnIT VIII manet
PDF
Research on performance of routing protocols in manet
PPTX
Routing protocols of wsn
Final PPT.pptx
ENHANCEMENT OF OPTIMIZED LINKED STATE ROUTING PROTOCOL FOR ENERGY CONSERVATION
Unit8 tgb
Enhancing the Energy Parameter of Leach Protocol For Wireless Sensor Network
Energy efficient routing_in_wireless_sensor_networks
Energy efficient routing in wireless sensor networks
Routing Techniques
Bn36386389
Performance Evaluation of a Layered WSN Using AODV and MCF Protocols in NS-2
Enhancement of Improved Balanced LEACH for Heterogeneous Wireless Sensor Netw...
Influence of Clustering on the Performance of MobileAd Hoc Networks (MANETs)
Efectos de nodos ieee 802.15.4 zig bee
Research Inventy : International Journal of Engineering and Science
chapter 4 networking: Connecting Devices.ppt
CN UNIT II.pptx
Analysis of Cluster Based Anycast Routing Protocol for Wireless Sensor Network
Wireless sensor network
UnIT VIII manet
Research on performance of routing protocols in manet
Routing protocols of wsn

Recently uploaded (20)

PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PPTX
Big Data Technologies - Introduction.pptx
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Electronic commerce courselecture one. Pdf
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PPTX
Spectroscopy.pptx food analysis technology
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Digital-Transformation-Roadmap-for-Companies.pptx
NewMind AI Weekly Chronicles - August'25 Week I
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Big Data Technologies - Introduction.pptx
Review of recent advances in non-invasive hemoglobin estimation
Dropbox Q2 2025 Financial Results & Investor Presentation
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Electronic commerce courselecture one. Pdf
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Spectroscopy.pptx food analysis technology
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
The AUB Centre for AI in Media Proposal.docx
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Per capita expenditure prediction using model stacking based on satellite ima...
Advanced methodologies resolving dimensionality complications for autism neur...
Diabetes mellitus diagnosis method based random forest with bat algorithm
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
“AI and Expert System Decision Support & Business Intelligence Systems”

Lab Seminar 2009 12 01 Message Drop Reduction And Movement

  • 1. Description Based addressing and routing in Cluster-based Ad-Hoc network for Home Environment By Tharinda Nishantha Vidanagama Supervised by, Prof. Hidenori Nakazato Honjo Seminar 2009 12 01
  • 2. Ad Hoc Networks The Ad Hoc peer network is created spontaneously as two participating nodes come within the reach of one another. As the number of participating nodes and their positions vary the network it self reconfigures allowing all nodes to communicate even if they are not within their transmission range. The main advantage of Ad Hoc networks is that they do not require any infrastructure to operate.
  • 3. Ad Hoc Networks But the main disadvantages are Highly dynamic topology due to the mobility of the nodes, i.e. the links are not stable and bandwidth is limited. Mobile devices are powered by batteries, putting an energy consumption constraint Security of the network is at risk as anyone can join the network and act as transmission mediators.
  • 4. Ad Hoc Networks Increasingly wireless technology is build in to many devices. Networking these devices can bring many benefits. Range of application is vast. Military Disaster Mobile phone service extension.
  • 5. Description based Ad Hoc Networks Communication failures are considered normal in Ad-hoc networks. Description based addressing instead of host based(IP) addressing is more appropriate because it will not rely on a single path, but uses multicasting . In description-based routing, selective information dissemination can be implemented. Easy to understand and manage the network. This will minimize control data among peers and facilitate group communication.
  • 6. Ad Hoc Network at Home ! Increasingly new functions are built in to home appliances. Home appliances fitted with wireless communication modules would become more common in near future. The system for home networking would provide information required for inter-working environment for home appliances and it’s users. The nodes in this environment could also have the following constraints, Low memory Low transmission distances Some nodes may have limited power supply.
  • 7. Ad Hoc Network at Home ? What about the Ad Hoc network disadvantages? Household appliances are mostly static i.e. they may not move at all. Therefore the problems arising due to mobility is very limited. Almost all appliances are plugged in to an unlimited power supply, therefore the power limitations doesn’t apply. The whole network is owned by one owner, there is no security risk within the network.
  • 8. Add Hoc home network - Approach 1. Cluster Based Ad Hoc Network 2. Description Based Routing and Addressing
  • 9. 1. Cluster Based Add Hoc Network Why? At home most appliances are clustered in places. Kitchen Living room Bed room etc. Clustering also reduces the amount of control data exchanged among the nodes. Only a portion of the nodes are involved in the actual routing process.
  • 10. Cluster Based Add Hoc Network Organization Everyone knows its one hop neighbors ( Neighbor Table ). Cluster heads know their neighboring cluster heads ( Cluster Adjacency Table ). Member nodes send their messages to their respective cluster heads to be forwarded to their destinations. Only cluster heads and gateways forward messages.
  • 11. Problem of Routing Does a cluster head know about all other cluster heads? This requires high memory capacity ! How to route messages beyond known cluster range? A fixed size Routing Cache (RC) is used to keep track of the nodes that are beyond range. Rather than using a table structure this helps reduce the memory usage. There is no need to store the full identities or routs.
  • 12. We assume that identifiers given to the nodes in the network i.e. home appliances are similar to the following examples. Kitchen oven, Kitchen television, Living room television etc. In this natural language usage, a general location is identified from the beginning words and becomes more specific within that particular area by the next words. Our routing algorithm routes the data messages in the direction of the destination. When the message finally arrives at the particular region, there would be nodes that store the exact identifier in their Neighbor table, thus allowing the message to be delivered to the correct destination node. 2. Description Based Routing and Addressing  
  • 13. How the Routing Cache is used? If a cluster head or gateway node comes across another cluster head that is beyond its range, it inserts the name in to the RC. E.g: if the required destination is “kitchen oven” but the RC entry may be “kitchen”. This partial match is enough to ensure that the message gets routed in the direction of the kitchen. If the entry is in the 1 st position of the RC it would be as follows. Routing Cache Usage   0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 n e h c t i k
  • 14. Routing Cache Storage For the simulation purpose we use a fixed size character RC. Elements are inserted in a way that some of the information about old entries are overwritten by new entries. If, S - RC size p - Number of parts the RC is divided in to ( p = 2x, where x = 0, 1, 2… and Total possible RC entries = 2p) P - The next position in RC to be occupied q - (  1) If entry number is an odd number (+1) If entry number is an even number. When an entry is made in to the RC the starting position (T) for an entry is given according to the following formula. Starting Position T=
  • 15. Routing Cache storage The number of characters allocated for an entry in the RC is given by the following formula, Number of characters = The actual character positions are given by a modified version of the Fibonacci series (0, 1, 2, 3, 5…), where we have omitted the repetition of number 1. Character position in the RC is given by the following formula,
  • 16. Tabular Support Structures Neighbor Table (NT): Holds the information about a node’s one-hop neighbors that have a bi-directional link. It holds the neighbor’s identifier and its status. Cluster Adjacency Tables (CAT): Holds the information about the neighboring clusters. A neighboring CH can be two or three hops away. The CAT holds CH identifier and the GW identifier, which is the next immediate hop in the direction of that cluster head. Routing Cache Table (RCT): This will be used to store directional RC. This table will store the one hop identifier (of a GW) of each available bi-directional link that has clusters beyond itself and RC for that direction. All the nodes keep an NT, but the CHs and the GWs also keep the CATs and may also use RCT.
  • 17. Types of Messages Control Messages - Control messages are sent only to a node’s one-hop neighbors. All control messages are terminated at their one-hop neighbors. The receivers update their CAT, NT and RC/RCT with the new control data and create new control messages that are sent to its neighbors. This way the entire network is configured. Type of message Description Number of Entries for each RC RC/RCT Entries RC/RCT of the sender (CH and GW nodes) RC/RCT CAT of the sender (CH and GW nodes) CAT NT of the sender NT Status of the sender Status Name of the sender ID
  • 18. Handling a Control Message When a node receives a Control Message, If receiver is a CH and previous sender is a GW node or this node is a GW and previous sender is a CH, - If the sender is unknown then Add as a neighbor - All known CH of the sender that it has a direct link or it is through another GW node (this GW node must be a neighbor node of the previous sender) are inserted to this CH’s CAT. - All other CAT entries are inserted to RC/RCT. - Previous sender’s NT entries that are not even partially known are inserted to the RC/RCT. - Sender’s RC/RCT entries that are not even partially known are also inserted to the RC/RCT.
  • 19. Types of Messages 2. Data Messages - Nodes arbitrarily generate data messages after the network has configured. Data carried by the message Data Available number of hops TTL Next receiving node (only for directional routing) Nxt. Receiver Previous sender Prev.Sender Message destination Destination Type of message Description Status of the sender Status Message identifier MsgID Name of the sender ID
  • 20. Handling Data Messages When a node receives a Data Message, If destination is this node Consume data Else if I am Gateway/Cluster head and if this data has not already been forwarded Look for destination in neighbor table If not found Look for destination in Cluster Adjacency table If not found Look for partial match in Cluster Adjacency table If not found Look for partial/complete match in the RC/RCT. If found Forward message Else Discard message.
  • 21. A simulation program was developed in order to evaluate the above proposal. We have used an environment, which is a flat surface 25*25 square units, where 100 nodes are statically located. The size of the RC was limited to 128 characters. Each node has various transmission distance (maximum of 3 units) and priorities. Each node will send a number of messages to randomly selected destinations. Evaluation  
  • 22. Evaluation – Message broadcast It shows 100% success rate on message delivery with the current environment setting. But… message misdirection is very high !!!.  
  • 23. Evaluation – Single Routing Cache It shows on average a 100% success rate on message delivery with the current environment setting. But… message misdirection is still high !!!.
  • 24. The message misdirection occurred because of the use of single RC. RC entries do not store the direction of that particular entry. Therefore the messages maybe forwarded to the wrong way as well. Evaluation – Why the misdirection?  
  • 25. Solution – Directional Routing Cache Routing nodes are given a RC for each outward link. The nodes can now compute the next hop of the messages in the right direction.
  • 26. The message misdirection is significantly reduced by the directional RCs. But the Memory usage is High and unpredictable !!! Simulation – Directional Routing Cache
  • 27. The RC is divided proportionally between each bidirectional link. Initially full size given to first bidirectional link with a RC entry. If another link has a RC entry the RC is proportionally divided among the links according to the number of entries in each direction. Solution: Proportional Directional RCs
  • 28. Success at 100% Simulation: Proportional Directional RCs
  • 29. The performance is similar to the equal-sized directional RCs Equal-sized RC Vs Proportional directional RC
  • 30. When a message is received by a node that has many outward links, it checks each RC for a match with the destination. If more than one RC is positively matched the node has to broadcast the message to all outward links. Thereafter only the next hop nodes who know the destination will forward the message, and the others will register a lost message. Directional RCs – remaining message drop
  • 31. The loss due to wrong routing is significantly reduced by the directional RCs. Simulation Comparison %
  • 32. Considering that a home environment does not contain large number of nodes, this algorithm can be effectively implemented. The use of clustering has further supported in reducing the network traffic and routing overhead. Use of descriptions improves the user understandability of the system. Use of directional RCs will significantly reduce the message loss and improve resource usage. Proportional directional RC is the solution with most preferable settings. The amount of misdirected messages is also independent of the amount of data sent by any node. Conclusion
  • 33. We will study the performance and issues when movement is introduced to the network nodes. In the home environment elements such as cell phones and laptops etc, will have movement associated with them. We would also like to find the optimal RC size for a given number of nodes. Further decrease the amount of control information held and transmitted by nodes. Future extensions  
  • 34. [1] Tim Daniel Hollerung, “The Cluster-Based Routing Protocol”- project group ‘Mobile Ad-Hoc Networks Based on Wireless LAN’- 2003/4P. [2]Krishna, N.H. Vaidya, M. Chatterjee and D.K. Pradhan. “A cluster-based approach for routing in dynamic networks”. ACM SIGCOMM Computer Communication Review 27:49-65, 1997. [3] M. Petorvic, V. Muthusamy, H.Jacobsen, “Content-Based Routing in Mobile Ad Hoc Networks”,IEEE MobiQuitous, 2005. [4] Mario Gerla and jack Tzu-Chieh Tsai, “Multicluster, Mobile, Multimedia radio network”. ACM- Baltzer Journal of Wireless Networks ,1: 255-265, 1995. [5] R.C.Shah and J.M. Rabaey, “ Energy aware routing for low energy ad hoc sensor networks”,0-7803-7376-6/02 IEEE 2002, pp.350-355. [6] Tharinda N. Vidanagama, Hidenori Nakazato, “Description Based Routing and Addressing in Cluster Based Ad Hoc Network” IEICE General Conference, 2009. [7] Tharinda N. Vidanagama, Hidenori Nakazato, “Reduction of Message Misdirection in Description Based Clustered Ad Hoc Networks”, (To be presented at 7 th IEEE CCNC PerNets workshop). Reference
  • 35. In a home environment nodes have a limited, Space, Available starting positions, Destinations. Infrequently moving nodes are also considered as static. Introducing Node Movements  
  • 36. Observe node and classify them accordingly. - all nodes start as static nodes. - The nodes should monitor their own movements. - One method is to check whether its cluster changes from time to time. but what if the cluster moved and not the node? Do clusters move in a home environment? Movement Options  
  • 37. Vary the “Hello” message or the beaconing frequency proportional to the node movement speed. - In this case the node it self should measure its own speed and adjust the beaconing frequency accordingly. - rate of changing of clusters can be used as a measure of movement speed. Introducing Node Movements  
  • 38. Use a random way point model. - Randomly select nodes and move them to random destinations. - In a home environment node can not have random routes. - There are only a number of fixed routes a node can take? - The routes depend on the architecture of the house ! Introducing Node Movements