Академический Документы
Профессиональный Документы
Культура Документы
Niththiyanathan Jeyaratnarajah
Helsinki University of Technology
Espoo, Finland
Email: jeyaratn@cc.hut.fi
2.1.3 Routing
1. Discovering neighbors with bi-directional
connectivity by broadcasting a list of those The link-clustered architecture provides a natural routing
backbone consisting of clusterheads and gateways and
neighbors that they can hear and by receiving
the links between them. However, clusterheads as points
broadcasts from neighbors.
of traffic concentration may become congested and each
2. Electing clusterheads and forming clusters.
clusterhead may become a failure point for
3. Agreeing on gateways between clusters.
communication across its cluster. Therefore, link-
clustered architecture is not used as routing control
2.1.1 Clusterheads
architecture in routing algorithms. Instead, each node
There are at least two algorithms proposed for the distributes and collects routing information, and
election of clusterheads in the literature, namely generates and selects routes. However, clusters exists to
identifier-based clustering and connectivity-based define regions for transmission management primarily
clustering. Implementation for both algorithms can be and to form a routing backbone in link-clustered
either distributed or centralized. With the centralized architecture.
version, the node with the lowest or highest numbered
identifier (identifier based) or with the largest number of
neighbors (connectivity based) is chosen as a clusterhead
2.2 Near-Term Digital Radio (NTDR)
for the cluster containing that node and its one-hop Network
neighbors. With the distributed version of identifier- Near-Term Digital Radio (NTDR) networking has been
based clustering, a node elects itself if it has the lowest designed for and deployed in large tactical networks.
or highest numbered identifier in its neighborhood. With This is used as one of the clustering methods for
the distributed version of connectivity-based clustering, backbone formation.
a node becomes a clusterhead if it is the most highly
connected of all of its neighbors which are not elected as NTDR produces a set of clusters, each containing a
clusterheads. clusterhead, which are linked together forming a routing
backbone as shown in Figure 2. It comprises single level
The variants of clustering algorithms that always form of clusters with nodes within one hop of a clusterhead
disjoint clusters for the above two methods are also similar to link-clustered architecture. However, NTDR
described in the literature. In those cases clusterheads are architecture differs from link-clustered architecture in
used only as aids in cluster formation and not as the following. Clusterheads function as gateways for
coordinators of intra-cluster transmission. direct inter-cluster communications. All intra-cluster
communication must traverse through the clusterhead
except for the neighboring nodes within one hop to each
other.
All nodes are capable of quickly becoming clusterheads Ø The received signal strength from the clusterhead is
as need arises from the node interconnectivity changes unacceptably low.
due to frequent node movements or outage of
clusterheads. Each node keeps track of the neighbors 2.2.3 Routing
with which it has bi-directional connectivity by receiving In the NTDR network, the clusterheads are responsible
and periodically broadcasting beacons. for maintaining backbone and hence monitor and
Cluster
distribute information among themselves about the
changes in backbone. Each clusterhead generates
membership information of its cluster and link state
Cluster Member Backbone Link information of its links to neighboring clusterheads. It
floods the information over the backbone and computes
routes to other network nodes on the basis of it. The link
state includes a 'resistance' metric, that is a measure of
interference likely to be encountered by future
transmissions over the links. Clusterheads compute least-
resistance routes to destinations using Dijkstra's shortest-
path-first (SPF) algorithm.
When source node wants to communicate with a However, this simple routing may not be possible in the
destination node, it first distributes an address query presence of highly mobile nodes. The second strategy is
within its physical subnet, using globally unique long-path routing which randomly distributes the routes
location-invariant identifier for the destination. If the selected over the space of possible routes, and thus helps
destination is currently affiliated with a virtual subnet the network to accommodate partitioned subnets and to
represented by some member of the source's physical balance traffic load among nodes. The source chooses
subnet, the destination's address will be returned to the randomly one of the virtual subnets represented within
source. If it is not, source distributes the address query its physical subnet. if it is not a member of that virtual
within its virtual subnet. In this case, the destination's subnet packets will be forwarded to a node which is a
address will be returned, if the destination is currently member of the source's physical subnet and chosen
affiliated with a physical subnet represented by some virtual subnet. From there, routing is done to a member
member of one of the source's virtual subnets. node of both chosen virtual subnet and destination's
physical subnet as shown in Figure 5(a).
2.3.2 Routing
Availability of multiple routes within virtual subnet
If source is a member of the chosen virtual subnet, it
architecture increases a source's ability to efficiently and
selects randomly a distinct physical subnet from its own
quickly obtain an alternate route to destination and hence but represented within its virtual subnet and routes
to maintain existing session, as nodes move and packets through it to destination as shown in Figure 5(b).
connectivity changes within the network.
Long-path routing produces at most Q+P-1 different
There are two strategies suggested for multiple
routes from a source to a destination if each subnet is
forwarding. The first is direct routing, in which the connected. When there are partitioned subnets, each
source forwards packets to the destination solely on the intermediate node along the route may have to make
basis of source and destination addresses.
random selections on next hop subnet to route around
If a node is found in such a way that it is a member of
such partitions increasing the number of possible routes.
source's physical subnet and destination's virtual subnet
Therefore route length can become very long. However,
nodes can reduce route lengths by making available Routing schemes can operate correctly in the presence of
more information on their interconnectivity and using nonancestral clusters and therefore disjointness criterion
the information for route selection. Accordingly nodes is not a necessary condition.
can adopt a routing strategy which is a combination of
the two described before.
Level-3 cluster
Selected virtual Destination's
Source's physical physical subnet
subnet subnet
Level-2 cluster
Level-1 cluster
Level-0 cluster
Source Destination
Selected virtual
subnet
y
Destination's
Source's virtual virtual subnet
subnet
Gate
Figure 7: Quasi-hierarchical Routing versus Strict-
hierarchical Routing Virtual links
5 Conclusion
In this paper cluster-based control structures for large
dynamic networks are discussed in managing a shared
transmission medium, constructing routing backbones
and building abstractions of network state. The link -
cluster architecture is mainly for transmission
management whereas NTDR and virtual subnet
architectures are clustered for backbone formation. In
order to improve routing in large dynamic networks two
types of hierarchical routing architectures, namingly
quasi-hierarchical and strict-hierarchical routing
architectures, are suggested Though the concept of
cluster-based network control has existed for a long
period, only a few of the many examples of cluster-based
control structures described in this paper have been
deployed and exercised in full-scale networks.
References
[1] Charles E. Perkins: Chapter 4, Ad Hoc Networking,
Addison Wesley, 2001, ISBN 0-201-30976-9