Routing

A Routing algorithm tells each intermediate node on the route which outgoing edge the message should be sent, depending on the destination. Cost of routing (messages) Vs. table (memory space).

Size of routing

Cost of routing is measured by stretch factor : maxu,v cost(v,u) dist(u,v) .

G. Pandurangan

1

Compact Routing

Two extreme approaches: 1. Shortest path routing: stretch factor is 1. Memory: O(n log n) bits per node. 2. Flooding: stretch is O(m). No memory. Name-independent vs. name-based routing. Tradeoff between stretch and memory requirements. Theorem 1. There exists a routing algorithm with stretch factor O(k) which uses an average of O(n1/k log2 n) bits per node, for any value of k ≥ 1.

G. Pandurangan

2

Cover: Definition

Consider a network G = (V, E). Let S ⊆ V . S is a cluster in G if the subgraph induced by S is connected. The size of a cluster S — number of nodes in S. The diameter of a cluster — diam(S) is the diameter of this induced subgraph (strong diameter). A cover is a collection of clusters C = {S1, S2, . . . , Sk } such that the ∪ki=1Si = V . Pk vol(C) = i=1 |Si| ≥ n.

G. Pandurangan

3

Cover parameters: Sparsity: vol(C)/n is the average number of occurrences of any node in all clusters of C (average degree of cover). Determines the cost of the algorithm using the cover. 2. Locality: diam(C) — maximum diameter of a cluster in C. Low diameter — faster running time. Goal: Construct covers with low volume and diameter. Tradeoff between diameter and volume.

G. Pandurangan

4

Neighborhood Cover

Given a subset of vertices W ⊆ V , the ρneighborhood cover of W is the collection of ρneighborhoods of the vertices of W , denoted by Γρ(W ) = {Γρ(v)|v ∈ W }.

Typically W = V in many applications and ρ will be chosen appropriately. Goal: To find Neighborhood covers with low volume and diameter.

G. Pandurangan

5

Coarsening

A Cover is coarser than another cover if its clusters contain the clusters of the other cover. Given two collections of clusters, C = {S1, . . . , Sh} and C 0 = {S10 , . . . , Sh0 }, C 0 is a coarsening of C if for every Si ∈ C, there exists Sj0 ∈ C 0 such that Si ⊆ Sj0 .

G. Pandurangan

6

A Cover Construction Algorithm Input: Cover S; Output: Cover T . T = φ. While S 6= φ do select an arbitrary cluster s0 ∈ S. z = s0 . Repeat (merge cluster layers around z) y = z (y is kernel of resulting cluster z) Z = {s|s ∈ S, s ∩ y 6= φ} z = ∪s∈Z S until |z| ≤ n1/k |y| S =S−Z T = T ∪ {Z}. Endwhile Output(T ). G. Pandurangan

7

Analysis

Theorem 2. Given a weighted graph G = (V, E, w), |V | = n, a cover S and an integer k ≥ 1, the algorithm constructs a coarsening cover T of S that satisfies the following properties: 1. Rad(T ) ≤ (2K + 1)Rad(S). (k + 1/2)Diam(S)).

(Diam(T ) ≤

2. vol(T ) ≤ n1+1/k (i.e., the ave. degree ≤ n1/k ) Proof: Part 2: Consider the collection C of kernels y corresponding to the clusters Z generated by the algo. The kernels in C are mutually disjoint. From the termination condition, |z| ≤ n1/k |y|. P P 1/k Thus, z |z| ≤ y n |y| ≤ n1/k n = n1+1/k .

G. Pandurangan

8

Part 1: Consider some iteration of the while loop, starting with some cluster s ∈ S. Let J denote the number of times the repeat loop is executed. Denote the initial sets Z and z by Z0 and z0 respectively. In the ith iteration of the repeat loop, the sets constructed are Zi−1, zi and yi. For 1 ≤ i ≤ J, yi = zi−1. Claim 1: |zi| ≥ ni/k , for every 0 ≤ i ≤ J − 1, and strict inequality holds for i ≥ 1. Proof by induction on i. Trivial for i = 0. Now, |zi| ≥ n1/k |zi−1| ≥ n1/k n(i−1)/k . The first inequality follows from the fact that termination condition of the repeat loop was not met. G. Pandurangan

9

Claim 2: For every 1 ≤ i ≤ J, Rad(yi) ≤ (2i − 1)Rad(S). Proof by induction on i. Base case trivial (since Y1 = s ∈ S). Induction step: Rad(yi) Rad(yi−1) + 2Rad(S).

=

Rad(zi−1)



Since J ≤ k, Rad(yj ) ≤ (2k − 1)Rad(S). Hence Rad(zj ) ≤ (2k + 1)Rad(S).

G. Pandurangan

10

Application to Compact Routing

Name-independent routing scheme. Hierarchy of routing algorithms, each restricted to a region of certain diameter. A regional (s, d)-routing algorithm provides O(s) stretch inside regions of diameter d: For any v, u, any message sent from v to u is delivered if dist(v, u) ≤ d; otherwise v is notified. In both cases, only O(s.d) messages sent. Let Ri be the regional (s, 2i) routing algorithm. We use R1, . . . , Rlog D algorithms concurrently (D = Diam(G)). Try R1, . . . till successful. Plog d Number of messages is i=0 s2i = O(sd). G. Pandurangan

11

Regional Routing Algorithm

A Regional (s, d) routing algorithm with O(s) stretch factor and O(n1/s log n) average memory per node. Idea: Use sparse covers. Start with a d−neighborhood cover D and coarsen it to get a cover D0 such that: 1. diam(D0) ≤ (s + 1/2)diam(D) ≤ (s + 1/2)2d. 2. vol(D0) ≤ n1+1/s. For each node v, designate one cluster containing the d-neighborhood of v to be the home cluster of v. (Ignore non-home clusters in D0.) For each home cluster in D0 choose some node as root and construct the shortest paths tree from the root to all other nodes in the cluster — cluster tree.

G. Pandurangan

12

DFS routing

Inside the cluster, routing is done based on DFS numbering of the cluster tree. Each node records its own dfs number — df s(v), and the dfs numbers of its children in the cluster tree. The root maintains a table with the dfs number of each node v in the cluster. To send a message to u, v sends a message to the cluster root. root either notifies failure, or routes by sending message down the tree.

G. Pandurangan

13

At most 2diam(D0) messages are sent. stretch is O(s.d).

Hence

Total memory bits in a cluster is number of nodes in the cluster times log n. Hence total memory in all O(vol(D0) log n) = O(n1+1/s log n) bits.

nodes

is

Total memory overhead of all routing schemes is O(n1+1/s log2 n) bits. Theorem 3. There exists a routing algorithm with stretch factor O(k) which uses an average of O(n1/k log2 n) bits per node, for any value of k ≥ 1.

G. Pandurangan

14

Routing

|V | = n, a cover S and an integer k ≥ 1, the algorithm constructs a coarsening cover T of S that satisfies the following properties: 1. Rad(T) ≤ (2K + 1)Rad(S).

120KB Sizes 2 Downloads 137 Views

Recommend Documents

A Survey on Routing Protocol Routing Protocol Routing ... - IJRIT
CGSR Cluster head Gateway Switch Routing protocol [9] is a multichannel operation ..... protocols of mobile ad-hoc networks”, International Journal of Computer ...

A Survey on Routing Protocol Routing Protocol Routing ... - IJRIT
The infrastructure less and the dynamic nature .... faster convergence, it employs a unique method of maintaining information regarding the shortest distance to.

Sheet1 Page 1 routing routing Success Fail Missing Success ... - GitHub
elliptic. 0 apex2. 10. 0. 0 alu4. 8 s298. 10. 0. 0. 10 alu4. 10. 0. 0. 0. 91. 89. 0. 0 misex3. 9 mcnc localsearch hmetis greedy mcnc localsearch flat. Netlist. Netlist.

Review on Review on Routing Tech Routing Tech ...
that particular ant agent is discarded from the network. ... concept of watchdog for every packet to detect the irregularities if any in the routes and the nodes.

Review of Routing Protocols Routing Protocols ...
The safety aspect (such as accidents, brake event) of VANET application warrants on time delivery of ... the design of efficient routing protocols for VANET challenging. Fig. 2- Routing protocol hierarchy. VANET ROUTING PROTOCOLS. Position. Based. GP

Dynamic Routing Between Capsules
Oct 26, 2017 - represent existence is by using a separate logistic unit whose output is the probability that the entity exists ... vector of instantiation parameters to represent the existence of the entity and to force the orientation ..... We also

MaidSafe-Routing -
ity a host may expect from the communication component is to abstract away the ... [6] Vuze: http://wiki.vuze.com/index.php/dht. [7] Petar Maymounkov and David ...

Routing Domain sysgeo'riogfor 'FQQ'QX
Forelgn Apphcatlon Prmnty Data ... equipment are data communications channels (DCCs). .... recovery of the failure, the SID is reinstated on the expiry of.

Virtual Id Routing
address as both the identity and location of an endpoint has .... moves. Therefore when an endpoint ea with id ida wants ..... edge network management crisis.

dynamic routing pdf
Sign in. Loading… Whoops! There was a problem loading more pages. Retrying... Whoops! There was a problem previewing this document. Retrying.

Open Source Software for Routing
ISIS (IPv6) (and ISIS IPv4 is not yet useable). • Multiple branches of Quagga: -. Quagga.net (official “Master” branch), Euro-IX, Quagga-RE and more. 17.

STATIC ROUTING DI MIKROTIK.pdf
dibawah ini. Pada langkah ini kita menambhakan address list Address yang. terhubung dengan mikrotik kita. Page 3 of 8. STATIC ROUTING DI MIKROTIK.pdf.

Download-This-CCNA-Routing-An.pdf
There was a problem loading more pages. Retrying... Download-This-CCNA-Routing-An.pdf. Download-This-CCNA-Routing-An.pdf. Open. Extract. Open with.

Performance Enhancement of Routing Protocol in MANET
Ghaziabad, U.P., India ... Service (QoS) support for Mobile Ad hoc Networks (MANETs) is an exigent task due to dynamic topology and limited resource. To support QoS, the link state ... Mobile ad hoc network (MANET) is a collection of mobile devices,

TroubleShooting OSPFv2 Routing Issues.pdf
any unnecessary Routes. Page 3 of 15. TroubleShooting OSPFv2 Routing Issues.pdf. TroubleShooting OSPFv2 Routing Issues.pdf. Open. Extract. Open with.

Call Routing Management in Enterprise VoIP Networks
based phones (softphones) are used to initiate and listen for incom- ing calls. ... messages such as call initiation and termination between the caller and the ..... ica (to toll free numbers, internal PBX numbers except for those ... 5.3 Mobile User

Papillon: Greedy Routing in Rings - CS - Huji
And it has good locality behavior in that every step decreases the distance to the target. Finally, it is simple to implement, yielding robust deployments. For these ...

Open Source Software for Routing - Semantic Scholar
Documentation & clean code http://www.xorp.org/ ... DragonFlyBSD, Windows. ‣ Juniper like CLI. ‣ Written ... (no GPL limitations). Clean C++ Source with good.

Routing in Ad-Hoc Networks
generate a significant amount of network control traffic when the topology of the network changes frequently. Lastly, packets can .... time, which happens very often in radio networks due to collisions or other transmission problems. In addition, OLS

Improved Optimal Link State Routing (OLSR) Protocol
performance by selecting an appropriate “Hello Refresh Interval” for better throughput and select suitable MPR nodes, to reduce overhead and packet duplicity.

tectures & Routing T.Michalareas, L.Sacks University College London ...
posals support a proactive management model of services and network ... reasonable cost and support for a number of promising business models, has.

Distributed Energy-conserving Routing Protocols
Department of Computer Science ... high residual power but the system is not connected be- .... maintain the connectivity of the network to ensure com-.