A Novel Distributed Routing Protocol To Support Ad-Hoc Mobile Computing
A Novel Distributed Routing Protocol To Support Ad-Hoc Mobile Computing
Mobile Computing
Chai-Keong Toh*
University of Cambridge Computer Laboratory
New Museums Site, Cambridge CB2 3QG
United Kingdom
Abstract
1.2
Routing in PRNs
Introduction
1.2.2
0-7803-3255-5196
$5.000 1996 IEEE
480
can be transported. This approach is commonly associated with point-to-point routing, where each node in a
route has a lookup table for forwarding incoming packets
to the respective out-going links. Hence, if a topology
changes, a route re-establishment phase is needed. Detailed comparisons between these approaches are found
in [B. 871.
routes remain passive. This therefore avoid packet duplicates. Furthermore, the selected route tends to be more
long-lived due to the property of associativity, which is
described below.
2.1
The essence of ABR lies on the fact that a MHs association with its neighbour changes as it is migrating and
its transiting period can be identified by the associativity
ticks. The migration is such that after this unstable period, there exists a period of stability, where the MH will
spend some dormant time within a cell before it starts
to move again. The threshold where the associativity
transitions take place is defined by A t h T e s h o l d , as shown
in Figure 1.
Associativity ticks are updated by the MHs data
link layer protocol, which periodically broadcasts beacons
identifying itself and constantly updates its associativity
ticks in accordance to the MHs sighted in its neighbourhood. In a scenario where an ad-hoc WLAN has a wireless
cell size of 10 m with a MHs minimum migration speed
of 2 m/s and a beacon transmission interval of a second,
the maximum possible associativity ticks of the migrating
MH with its neighbours is 5. Likewise, the neighbouring
MHs will also record associativity ticks of no more than 5.
This value is A t h T e s h o l d and any associativity ticks greater
than A t h r e s h o l d implies periods of association stability.
To further support our claim about dormant time, we
gathered the mobility traces of 52 badge wearers for a consecutive of 5 days at the Cambridge University Computer
Laboratory2 from the Active Badge System [Hop92]. The
traces provide specific information on the sighted location, the wireless cell, the MH, the quality of sightings and
the time of sightings. Figure 2 and 3 show the dormant
time distributions obtained for a day and a week respectively. The average dormant time ranges from 35.79 to
47.99 minutes. Hence, we believe that a practical mobile
user will spend some dormant time at a location before
he/she decides to move again.
Principles of ABR
2.2
Properties of ABR
Associativity-Based Routing
481
Associativity
_______.__._____________
2.3
The properties of associativity can also be applied t o BSoriented WLANs. When a MH sees a BS, its associativity ticks with the BS will be high. But this associativity ticks will be reset when the BS fails (equivalent
to an associated node moving away). Hence, under such
circumstances, the MH can apply associativity-based adhoc routing to re-route its packets to its neighbouring
MHs who may have access to other BSs. In this manner,
robustness can be achieved during BSs failures.
Dormant Time Distribution For 52 Badge Users InA Day
4 o m
2.4
Distributions
Figure 2: Dormant Time Distribution of 52 Badge Wearers on a day at the Computer Laboratory.
Figure 3: Dormant Time Distribution of 52 Badge Wearers in a week at the Computer Laboratory.
482
T a b l e 1 : A B R Route S e l e c t i o n A l g o r i t h m
Let S , be the set of possible routes from SRC-+DEST,
w h e r e i = 1 , 2 , ...
Let RLZ be the relaying load in each node j of a route in S i ,
3.1.1
w h e r e j = 1 . 2 . ...
Let RL,,,
be the maximum route relaying load nllowed per MH.
Let A T t h r c s h o l d be the minimum associativity ticks needed for
association stability.
Let A T ? the associativity ticks in each node j of a route in S ; .
Let
Let
Let
Let
Let
Let
Let
Let
Begin
If ( A T +
>
3 -
else L ;
If ( R L (
>
++;
++;
End
Hi,,,
= H i / , ; L;,,,
U i a v e = U ; / , ; Y;,,,
ui++;
RL,,,)
3 else Yi
H;++
++;
=Li/a;
Y;/a;
End
Best Route Computation
Let the set of ncceptable routes with Ui,,,
where
P1 c
= 0 and H Z a v e # 0 be P I ,
S;
Begin
H1ciaue = H K Z , , ,
Begin
... = H
~ where
~
n
~
BQ-REPLY Cycle
k.
= {1,2,3
~
, ,...,P}
H I I Routs
~
Wttlmut V d a t r n g Relu?iiq! Load *
Compute a route K k with M i n { K k } < M i n { K m } . V m # k .
or if a set of routes K O exists such that
M i n { K i } = M i n { K z } ... = M i n { K n } .
where 0={1,2,3 ,...,q }
LWL
End
End
End
End
BQ Control Packet
2.5
3.1
3.2
The route maintenance phase performs the following operations : (a) partial route discovery, (b) invalid route
When IN Moves
_----
FQ Control Packet
3.2.1
3.2.2
LQ Control Packet
3.2.3 Intermediate Nodes (INS) Movements
While a lower arm IN RRC is taking place, any movements by any upper arm INS will not result in LQ[H]
or FQ[1] process being initiated since the lower arm
IN has earlier sent FQ[1] downstream to erase invalid routes. If the FQ[1] packet does not succeed
in propagating towards the DEST, the LQ[H] process initiated by the lower arm IN will also serve to
delete these invalid routes.
The lower arm refers to the SRC and INS that contribute to half the route length from SRC to DEST.
If any of these nodes moves, FQ[1] packet will be
propagated downstream towards the DEST, and the
pivoting node will perform LQ{H} and await for the
DESTs REPLY. If no REPLY is received, FQ[O]
packet is sent to the next upstream node and the
new pivoting node then invokes the LQ{H} process
again, but with a different value of H. The cycle proceeds until the new pivoting node is the SRC, where
the BQ process will be initiated to discover a new
route.
3.2.4
Subnet-Bridging MH Movement
0
3.2.5
Associativity
Valid
No R o u t e
ReConstructions
Are Needed
I1
Associativity Violated
INS & DEST Moves SRC Moves
Normal
Case
Route Within
Subnet
LQ,
REPLY
Cycle
Success
Worst
Case
BQ,
REPLY
Cycle
Success
BQ,
REPLY
Cycle
Success
NO
Route Spans
Across Subnets
Route
ReConstructions
Are Needed
Concurrent Moves
Network is
Partitioned.
BQ REPLY
Cycle will
retrv before
aborting
Ultimately
Only One Route
Re-Construction
Cycle Is Valid
3.3
Acknowledgments
The author would like to thank Prof. D R McAuley (Glasgow University) and Dr. David Greaves (Cambridge University Computer Laboratory) for their comments on this
work. The author is grateful to Kings College Cambridge
for funding his research work.
References
[B. 871 B. Leiner, D Nielson & F. Tobagi. Issues In
Packet Radio Design. Proceedings of the IEEE,
75(1), January 1987.
[Bha94] Charles Perkins & Pravin Bhagwat. Highly
Dynamic Destination-Sequenced Distance Vector
Routing (DSDV) for Mobile Computers. In
Proceedings of AGM SIGCOMM 94, September
1994.
Conclusion
486