Вы находитесь на странице: 1из 10

Cluster-Based Networks

Niththiyanathan Jeyaratnarajah
Helsinki University of Technology
Espoo, Finland
Email: jeyaratn@cc.hut.fi

Abstract Cluster-based control structures promote more efficient


use of resources in controlling large dynamic networks.
Cluster-based network control structures promote more With cluster based control, the physical network is
efficient use of resources in controlling large dynamic transformed into a virtual network of interconnected
networks. Therefore they are very good candidates for ad node clusters. There can be one or more controllers per
hoc networks. There are many types of cluster-based cluster and their functions are to make control decisions
architectures proposed in the literature for specific for cluster members, construct and distribute
purposes. Of them link-cluster architecture is specifically representations of cluster state for external use.
designed for transmission management in ad hoc
networks. Near-Term Digital Radio Network (NTDR) This paper presents several cluster based control
architecture and virtual subnet architecture are the structures and associated control algorithms for large
clustering methods used for backbone formation. dynamic networks. Applicability of these structures and
Hierarchical routing- quasi, or strict - is the favored algorithms to ad hoc networks are also investigated
approach to improve routing efficiency in cluster-based particularly on routing functions. Cluster-based control
networks. Either link-state routing or distance-vector networks improves efficiency of resource use by creating
routing is used in hierarchical routing. SURAN and contexts for:
MMWN routing architectures are based on strict-
hierarchical routing. Ø Managing wireless transmission among multiple
nodes to reduce channel contention.
Ø Forming routing backbones to reduce network
1 Introduction diameter.
A communication network is an entity with dynamically Ø Abstracting network state information to reduce its
changing states in an unpredictable manner. To meet quantity and variability.
performance goals prescribed for user traffic, a network
must be able to adapt its behavior to accommodate 2 Cluster based network
changes in its intrinsic properties such as connectivity, architectures
capacity and offered load. The control functions
governing the network's performance have the following The cluster based control structures used in ad hoc
objectives which are competing: networks to achieve specific purposes are described
Ø Quick and accurate response when adapting below.
network's behavior to current network state.
Ø Minimal use of network resources during and after 2.1 Link-cluster architecture
the adaptation process. This type of architecture is used in multiple-access
broadcast environments. Distinct clusters of nodes are
The networks that constantly change connectivity (e.g., formed in such a way that transmissions are managed in
mobile networks) or are large with a large amount of a contention-free manner, thus reducing interference. In
configuration parameters are better served by self- this architecture, all network nodes autonomously
organizing controlled structure. They are built and organize themselves into interconnected clusters Each
maintained by nodes, and provide increased network cluster contains a clusterhead, one or more gateways,
availability, faster response to state changes, less and zero or more ordinary nodes as shown in Figure 1.
probability of configuration errors.
The clusterhead schedules transmissions and allocates
The appropriate network control structure and algorithms resources within the clusters. Gateways connect adjacent
for using this type of structure are chosen depending on clusters. A gateway may directly connect two clusters as
the control functions to be performed, size of the a member of both, or indirectly connect two clusters as a
network and the expected frequency and magnitude of member of one and forming a link to a member of the
changes in network state.
other. Therefore architecture can contain both 2.1.2 Node Mobility
overlapping and disjoint clusters. As nodes move about the network, cluster membership
Nodes establish a link-clustered architecture over a must be updated accordingly to ensure proper scheduling
physical network by the following: of transmissions. Clustering algorithms described by
Baker, Ephremidis, Wieselthier, Gerla, and Tsai
Gateway recompute cluster membership, and clusterhead and
Ordinary Node Cluster Clusterhead gateway status whenever a node moves in or out of a
cluster. Identifier-based clustering is more stable than
connectivity-based clustering in the cluster
recomputation approach. This is because a node's
clusterhead status may change more frequently with
connectivity based clustering.
The least cluster change algorithm reduces the number of
changes in clusterhead status due to node movement. In
this algorithm, a change in clusterhead status occurs only
if two clusterheads move within the range of each other
and in this case one of them relinquishes its clusterhead
or an ordinary node moves out of range of any other
node and becomes a clusterhead for its own cluster. The
cluster maintenance schemes are also proposed by Lin
and Gerla to minimize the number of changes in the set
Figure 1: The Link-Clustered Architecture of existing clusters as nodes move.

2.1.3 Routing
1. Discovering neighbors with bi-directional
connectivity by broadcasting a list of those The link-clustered architecture provides a natural routing
backbone consisting of clusterheads and gateways and
neighbors that they can hear and by receiving
the links between them. However, clusterheads as points
broadcasts from neighbors.
of traffic concentration may become congested and each
2. Electing clusterheads and forming clusters.
clusterhead may become a failure point for
3. Agreeing on gateways between clusters.
communication across its cluster. Therefore, link-
clustered architecture is not used as routing control
2.1.1 Clusterheads
architecture in routing algorithms. Instead, each node
There are at least two algorithms proposed for the distributes and collects routing information, and
election of clusterheads in the literature, namely generates and selects routes. However, clusters exists to
identifier-based clustering and connectivity-based define regions for transmission management primarily
clustering. Implementation for both algorithms can be and to form a routing backbone in link-clustered
either distributed or centralized. With the centralized architecture.
version, the node with the lowest or highest numbered
identifier (identifier based) or with the largest number of
neighbors (connectivity based) is chosen as a clusterhead
2.2 Near-Term Digital Radio (NTDR)
for the cluster containing that node and its one-hop Network
neighbors. With the distributed version of identifier- Near-Term Digital Radio (NTDR) networking has been
based clustering, a node elects itself if it has the lowest designed for and deployed in large tactical networks.
or highest numbered identifier in its neighborhood. With This is used as one of the clustering methods for
the distributed version of connectivity-based clustering, backbone formation.
a node becomes a clusterhead if it is the most highly
connected of all of its neighbors which are not elected as NTDR produces a set of clusters, each containing a
clusterheads. clusterhead, which are linked together forming a routing
backbone as shown in Figure 2. It comprises single level
The variants of clustering algorithms that always form of clusters with nodes within one hop of a clusterhead
disjoint clusters for the above two methods are also similar to link-clustered architecture. However, NTDR
described in the literature. In those cases clusterheads are architecture differs from link-clustered architecture in
used only as aids in cluster formation and not as the following. Clusterheads function as gateways for
coordinators of intra-cluster transmission. direct inter-cluster communications. All intra-cluster
communication must traverse through the clusterhead
except for the neighboring nodes within one hop to each
other.
All nodes are capable of quickly becoming clusterheads Ø The received signal strength from the clusterhead is
as need arises from the node interconnectivity changes unacceptably low.
due to frequent node movements or outage of
clusterheads. Each node keeps track of the neighbors 2.2.3 Routing
with which it has bi-directional connectivity by receiving In the NTDR network, the clusterheads are responsible
and periodically broadcasting beacons. for maintaining backbone and hence monitor and
Cluster
distribute information among themselves about the
changes in backbone. Each clusterhead generates
membership information of its cluster and link state
Cluster Member Backbone Link information of its links to neighboring clusterheads. It
floods the information over the backbone and computes
routes to other network nodes on the basis of it. The link
state includes a 'resistance' metric, that is a measure of
interference likely to be encountered by future
transmissions over the links. Clusterheads compute least-
resistance routes to destinations using Dijkstra's shortest-
path-first (SPF) algorithm.

2.3 Virtual Subnet Architecture


The virtual subnet architecture employs a set of several
Clusterhead disjoint routing backbones to provide fault-tolerant
connectivity and load balancing in a multihop mobile
wireless network. Based on the node locality, the
network is first divided into a set of physical subnets
Figure 2: The NTDR Network Architecture of disjoint clusters. Members of different physical
subnets are clustered together to form virtual subnets,
each of which spans all physical subnets.
2.2.1 Clusterheads
Physical Subnet
An NTDR node elects itself as clusterhead if it does not
receive beacons from any clusterhead or if it receives Dark-grey Virtual Subnet
beacons advertising two different partition identifiers.
The NTDR algorithm uses the following mechanisms to
limit the number of nodes simultaneously attempting to
Guest Node
become clusterheads:
Ø Each node that detects one of the conditions for
becoming clusterhead waits a short random time
interval and tests again the conditions. If the
condition persists following the waiting period , the
node assumes the role of clusterhead.
Ø Each new clusterhead immediately issues beacons
in quick succession proclaiming its status.
Light-grey Virtual Subnet
2.2.2 Cluster Affiliation Black Virtual Subnet
A node seeking cluster affiliation prefers clusters such
that Figure 3: The virtual Subnet Architecture
Ø The node and the clusterhead belong to the same
organization. Neighboring physical subnets and all virtual subnets are
Ø The signal from the clusterhead is transmitted at low assigned different frequencies for communication to
power but received at high strength. reduce interference. Both the maximum number, P, of
Ø The resulting cluster size is relatively small. physical subnets and the maximum number, Q, of virtual
subnets in the network are predetermined.
A cluster member remains affiliated with its chosen
clusterhead until one of the following occurs: Each node is a member of exactly one physical and zero
Ø The clusterhead relinquishes its role. or more virtual subnets, as shown Figure 3. A node
Ø The clusterhead's beacons no longer list the might belong to multiple virtual subnets if it
member. communicates frequently with those subnets' members.
A node's address within this cluster-based control as shown in Figure 4 (a), packets are forwarded through
structure uniquely identifies both its physical and virtual that node. If the destination node is a guest of a physical
subnet affiliations by the prefix of its address subnet, packets are routed through a node which is a
representing the physical subnet and suffix of its address member of source's virtual subnet and destination's
representing the virtual subnet. If a node is member of physical subnet as shown in Figure 4 (b).
multiple virtual subnets, it will possess multiple address Source Destination
Destination's virtual
suffixes and hence multiple addresses.
subnet

The virtual subnet architecture presents a framework for


organizing and using multiple overlaid routing
backbones in an ad hoc network. Therefore, s complete
set of networking algorithms such as subnet clustering,
frequency assignment, distribution of address and
routing information, computing of routes, and
forwarding of packets, compatible with this architecture (a)
Source's physical Destination's physical
has to be specified before it could be realized as an
actual ad hoc network.

2.3.1 Node Mobility


When a node moves from one location to another, it may
require to join another physical subnet and new virtual
subnet to remain connected to the network. The node
affiliates one of the proximate physical subnets and one
of the available virtual subnets (one with unfilled quota
Q). If all proximate subnets have filled their quotas of Source
Destination
virtual subnet affiliations, the node affiliates with one of Source's virtual subnet
those physical subnets as a "guest" and may later (b)
become a member, if space is available. The node then
announces its new acquired address to all members of its
new physical and virtual subnets. Figure 4: Direct Routing

When source node wants to communicate with a However, this simple routing may not be possible in the
destination node, it first distributes an address query presence of highly mobile nodes. The second strategy is
within its physical subnet, using globally unique long-path routing which randomly distributes the routes
location-invariant identifier for the destination. If the selected over the space of possible routes, and thus helps
destination is currently affiliated with a virtual subnet the network to accommodate partitioned subnets and to
represented by some member of the source's physical balance traffic load among nodes. The source chooses
subnet, the destination's address will be returned to the randomly one of the virtual subnets represented within
source. If it is not, source distributes the address query its physical subnet. if it is not a member of that virtual
within its virtual subnet. In this case, the destination's subnet packets will be forwarded to a node which is a
address will be returned, if the destination is currently member of the source's physical subnet and chosen
affiliated with a physical subnet represented by some virtual subnet. From there, routing is done to a member
member of one of the source's virtual subnets. node of both chosen virtual subnet and destination's
physical subnet as shown in Figure 5(a).
2.3.2 Routing
Availability of multiple routes within virtual subnet
If source is a member of the chosen virtual subnet, it
architecture increases a source's ability to efficiently and
selects randomly a distinct physical subnet from its own
quickly obtain an alternate route to destination and hence but represented within its virtual subnet and routes
to maintain existing session, as nodes move and packets through it to destination as shown in Figure 5(b).
connectivity changes within the network.
Long-path routing produces at most Q+P-1 different
There are two strategies suggested for multiple
routes from a source to a destination if each subnet is
forwarding. The first is direct routing, in which the connected. When there are partitioned subnets, each
source forwards packets to the destination solely on the intermediate node along the route may have to make
basis of source and destination addresses.
random selections on next hop subnet to route around
If a node is found in such a way that it is a member of
such partitions increasing the number of possible routes.
source's physical subnet and destination's virtual subnet
Therefore route length can become very long. However,
nodes can reduce route lengths by making available Routing schemes can operate correctly in the presence of
more information on their interconnectivity and using nonancestral clusters and therefore disjointness criterion
the information for route selection. Accordingly nodes is not a necessary condition.
can adopt a routing strategy which is a combination of
the two described before.
Level-3 cluster
Selected virtual Destination's
Source's physical physical subnet
subnet subnet
Level-2 cluster

Level-1 cluster

Level-0 cluster
Source Destination
Selected virtual
subnet
y
Destination's
Source's virtual virtual subnet
subnet

Source's physical Destination's


subnet physical subnet

Destination Figure 6: The Nested Cluster Architecture


Source

The hierarchical routing scheme can be classified to be


quasi-hierarchical or strict-hierarchical. The distinction
between them is elaborated with the following example.
Figure 5: Long-Path Routing
Let's assume that ck is the lowest-level cluster containing
both the source and destination of a session. With quasi-
3 Routing in cluster-based networks hierarchical routing, a packet is routed directly from the
source, s0, to the boundary of dk-1, the level-(k-1) cluster
The inherently dynamic nature of ad hoc networks poses of the destination, d0. From there, the packet is routed
challenges on the design of effective yet efficient routing directly to the boundary of dk-2, d0's level-(k-2) cluster
functions. Routing functions are focused in this section. and so on, until finally being routed directly from the
boundary of d1 to d0. With strict-hierarchical routing, a
3.1 Hierarchical routing packet is routed indirectly from s0 to the boundary of sk-1,
Hierarchical cluster-based control structure is a network s0's level-(k-1) cluster, as follows. First, the packet is
consisting of N nodes organized into an m-level routed directly from s0 to the boundary of s1. From there,
hierarchy of nested clusters of nodes, as shown in Figure it is routed through level-1 clusters in s2, until it reaches
6, such that all level-i clusters are disjoint for 0≤i<m . the boundary of s2, and so on, until it reaches the
boundary of sk-1. Once at the boundary of sk-1, the packet
Each node is a level-0 cluster. They are grouped into is routed through level-(k-1) clusters in ck to the
level-1 clusters that in turn are grouped into level-2 boundary of dk-1. From there, the packet is routed
clusters, and so on, such that eventually all level-(m-1) through level-(k-2) clusters in dk-1 to reach the boundary
clusters are grouped into a single level-m cluster of dk-2, and so on, until finally being routed directly
containing all nodes. Addressing scheme for this type of from the boundary of d1 to d0. The following Figure 7
nested cluster structure is of hierarchical type. The depicts the two ways.
address is expressed as the concatenation of the labels of
the level-(m-1) through level-0 clusters that contain the
node. For example, with respect to the clustering
hierarchy depicted in Figure 6, the address of the node z
is x.y.z with u as the implicit prefix .
the form of costs over virtual links to "neighboring"
Strict-hierarchical Route
gates both within the same cluster and in adjacent
clusters connected to the gate via direct links. The gate
floods this link-state information to all other gates in all
level-1 clusters. Then all gates in the network generate
minimum-cost routes to all other gates, and hence to all
other clusters, in the network. Moreover, each gate
floods its intra-cluster nodes its minimum costs to all
other clusters. By combining this inter-cluster cost
information with the intra-cluster link-state information,
d0
a node can determine the next hop on the minimum-cost
route to any destination cluster.
s0 d1
s1 d2
s2 Quasi-hierarchical Route c3 Cluster

Gate
Figure 7: Quasi-hierarchical Routing versus Strict-
hierarchical Routing Virtual links

3.1.1 Quasi-hierarchical routing


Most of the hierarchical cluster-based routing fall into
the quasi-hierarchical category. Furthermore, almost all
quasi-hierarchical routing schemes are derivatives of the
distance vector routing approach. In this case, the
objective is to determine the next hop on the minimum-
cost route from a node to each level-i cluster within the
node's level-(i+1) cluster, for 0≤i<m. The information
about routing inside of the cluster is not distributed
outside the cluster.

This routing scheme reduces the routing information


Figure 8: The Link-State Routing Architecture with
received and forwarding information retained by each Gates
node from O(N) for a nonhierarchical control structure to
O(mCmax) for an m-level hierarchical control structure of Distance-vector and link-state quasi-hierarchical routing
nested clusters, where Cmax is the maximum number, schemes can be applied as hybrid schemes for routing in
over all i, of level-i clusters contained within a level- large tactical packet radio networks. This hybrid scheme
(i+1) cluster. For large values of m and arbitrary sources was suggested for Survivable Adaptive Networks
and destinations, this quasi-hierarchical routing scheme (SURAN) program. In this scheme, each node ultimately
may yield routes whose costs are larger than those of the uses distance-vector routing to determine the next hop on
true minimum-cost paths. However, in practice clusters the minimum-cost route to each destination, but for
are formed with only a few levels and the cost difference destination outside of its cluster the distance vector
is often small. routing information is in part derived from link-state
information between clusters and super clusters.
Quasi-hierarchical routing can also be based on link state
routing . With this scheme, nodes generate, distribute, Both quasi-hierarchical routing schemes such as regional
and use hierarchical routing information as follows. Each node routing and landmark routing enlist certain nodes
node within a level-1 cluster floods, to other nodes as focal points for routing. The focal nodes help guide
within the cluster, its link state information expressed as nodes in making forwarding decisions for a packet as it
link cost to its neighboring nodes. All nodes then travels from source to destination.
generate minimum-cost routes via Dijkstra's SPF
algorithm to all other nodes within that cluster. Each gate With regional node routing , each level-k cluster, termed
node on the boundary of a cluster uses intra-cluster link- as k-region, contains one (or more) k-regional nodes
state information to compute every other gate for the except the top-level m-region. Node affiliations to
cluster. A gate then constructs link state information in
regions and the addressing scheme are depicted in the similarly obtained from other clusters, c's representative
following Figure 9. computes the minimum-cost routes and next-hop clusters
from c to any other level-i clusters within its level-(i+1)
cluster. Subsequently, the representative of c distributes
the route cost and next-hop cluster information together
Level-3 with the cluster boundary information to all nodes within
c..

There are two key differences between strict-hierarchical


routing and quasi-hierarchical routing with respect to
Level-2 forwarding information. The first difference concerns
the number of forwarding table entries a node must
Level-1 consult to determine the next-hop node to a destination.
With quasi-hierarchical routing, the next hop to level-i
x cluster c' stored in the forwarding table is always a node
Level-0
which is a neighbor of node x. With strict-hierarchical
routing, the next hop to c' stored in the forwarding table
is always a cluster at level j≤ i, as explained below. For
a
an entry for c' to appear in x's forwarding table, c' and x's
y
level-i cluster, c, must be siblings within x's level-(i+1)
cluster. If c' and c are nonneighboring siblings, the next
z hop to c' is a level-i cluster that is neighbor of c. If c' and
c are neighboring siblings, the next hop to c' is a level-j
cluster, where 0≤j<i, that lies on the boundary of c and
b contains at least one node, y, with direct link to c'. With
c
quasi-hierarchical routing, a node can determine the next
hop to any destination using a single forwarding table
0-regional entry, whereas wit strict-hierarchical routing, a node may
have to consult up to 2m-1 forwarding table entries to
1-regional Address of c: determine the next-hop node to a destination. In practice
2-regional x-a.z-b.c
m remains small.
Figure 9: The Regional Node Routing Architecture
The second difference concerns the costs of the routes
from which the forwarding entries are derived. With
With landmark routing, each level-i landmark, x defines quasi-hierarchical routing, the cost to reach the level-i
a level-i cluster consisting of all nodes that are within the cluster, c', from x is always the true minimum cost as it
radius of ri(x) node hops from x, where 0< ri(x) ≤ ri and is computed as the sum of individual link costs. With the
rI is the maximum radius permitted for level-i cluster. strict-hierarchical routing, the cost to reach c' from x is
Each level-m landmark has a radius that is at least as computed as the sum of the individual cluster costs over
large as the diameter of the network and each node is a all level-i in the route from c to c'. Therefore the latter
leve-0 landmark. For 0<i≤m, more than one level-i routing is likely to yield higher-cost routes than the
landmark is also a level-(i+1) landmark and for each former routing.
such landmark, y, rI+1(y)>rI(y).
The following strict-hierarchical routing scheme was
3.1.2 Strict-hierarchical Routing chosen for use in SURAN packet radio network because
Strict-hierarchical routing is a favored approach in of route stability in the presence of dynamically
mobile wireless networks due to their robustness in the changing nodes and links. Each node uses distance-
presence of network state changes. The robustness vector routing to determine the minimum cost routes and
comes at the expense of increased route costs and packet next-hop nodes to all nodes within its cluster and to all
forwarding overhead compared to those for quasi- neighboring clusters within its supercluster. As shown in
statistical routing. Figure 10 one node within each cluster (or supercluster)
acts as a clusterhead (or super-clusterhead) that is
In this type of routing, a representative of a level-i responsible for generating and distributing routing
cluster, c, gathers its routing information and distributes information about the cluster (or supercluster) to all
(employing either the distance-vector or the link-state other clusters (or superclusters) within the same
approach) to representatives of other level-i clusters supercluster (or network).
within its level-(i+1) cluster. Using routing information
Each clusterhead (or superclusterhead) determines the The link-based strict-hierarchical routing schemes
connectivity and cost to each neighboring clusterhead (or described below were designed to provide quality of
super-clusterhead). It then floods this link-state service routing in large dynamic networks. Both
information to all clusterheads (or super-clusterheads) in schemes have the following features:
its supercluster (or network). Suggested costs from one Ø Nodes represent and distribute routing information
clusterhead (or super-clusterhead) include the number of according to the link-state approach, at all levels of
node hops to the neighboring clusterhead (or super- the clustering hierarchy.
clusterhead), the number of cluster hops to the Ø Nodes select routes with the objective of satisfying
neighboring super-clusterhead, and the value 1 to individual users' service requests given the
indicate inter(super)cluster connectivity only. constraints imposed by the current state of the
network, and they forward packets as directed by the
Supercluster sources.
Node Cluster
Destination-based packet forwarding employed by the
hierarchical routing schemes so far is not sufficient in
the context of quality-of-service provision. Not only
does source-directed forwarding offer quality-of-service
but also does it ensure that different nodes make
forwarding decisions consistent with the route selected
by the source and hence increase the chances of
successful packet delivery. Moreover, source-directed
forwarding usually results in smaller forwarding tables.
With explicit-route forwarding, a node does not need to
maintain a forwarding table. With virtual-circuit
forwarding, the size of a node's forwarding table is
directly proportional to the number of virtual circuits in
which it participates. With destination-based forwarding
the size of node's forwarding table is directly
proportional to the number of destinations for which it
has received routing information.

A strict-hierarchical routing scheme designed for


Border Node multimedia support in large mobile wireless, referred to
Clusterhead as a MMWN is presented by Ramanathan. Figure 11
Super-clusterhead illustrates the nested-cluster architecture for MMWN. In
this architecture, each node is a level-0 cluster, but two
distinct nodes may have different numbers of ancestral
Figure 10: The SURAN Routing Architecture
clusters. Thus, a cluster may be associated with multiple
levels in the clustering hierarchy, and the height of the
A hybrid strict-hierarchical routing scheme is used in clustering hierarchy is expressed as the maximum level
large, tactical packet radio networks. This routing associated with the single cluster that contains all others.
scheme is strict-hierarchical in terms of forwarding table Two clusters are considered to be siblings, even if they
entries, but it is also quasi-hierarchical in terms of the appear at different levels of clustering hierarchy,
granularity and propagation of routing information. provided that they both share the same parent cluster.
Each node participates in distance-vector routing to Sibling clusters may form a connecting virtual gateway
determine the minimum cost route and corresponding if a direct link exists between at least one pair of border
next hop to each node in its level-1 cluster and add to nodes, one in each cluster. A virtual gateway consists of
discover the boundary nodes of that level-1 cluster and the border nodes in each of the two clusters with their
their connectivity of neighboring clusters. Within a connecting links. Two virtual gateways attached to a
level-1 cluster, route cost is expressed in terms of the cluster form the endpoints of a virtual link across that
number of node hops and the next hop is neighboring cluster.
node. Routing outside of node's level-1 cluster is
accomplished with information provided by global Each cluster contains at least one QoS manager that
routing nodes. Each level-1 cluster contains a global generates abstracted link-state information such as
routing node playing the role of cluster representatives. connectivity to the cluster, services (e.g., delay,
Global routing nodes execute the quasi-hierarchical throughput, loss rate) across the cluster and to
routing procedure. neighboring clusters, and distributes the information to
other clusters. QoS manager for a cluster floods the
cluster's link-state updates to all nodes within the parent Ø Minimizing the amount of routing information to be
cluster. routed, processed, and stored by each node
Ø Maximizing connectivity within each cluster
Ø Localizing high-intensity traffic within a cluster
a's Level-2 Ø Localizing highly variable traffic within a cluster.
Ancestral Cluster Ø Minimizing the number of intercluster links
Ø Maximizing the stability of intercluster links
a
Virtual Gateway Ø Minimizing the difference between the hierarchical
Connecting b and x route and the true optimal route for each pair of
nodes.
b
Moreover, the clustering algorithm may be subject to
constraints such as the following:
x Ø Upper and lower limits on the number of child
v clusters within each cluster
y Ø An upper limit on the diameter of each cluster in
z terms of child clusters
Ø All clusters containing the number of child clusters

Hierarchical cluster-based control structures force a tight


coupling among routing, clustering and abstraction and
thus algorithm used for one of the these functions affects
z's Level-3 Border Node for v the others. For instance, the choice of clustering
Ancestral Cluster Virtual Gateway and x
Connecting y and v
algorithm determines which nodes are clustered together,
which in turn determines the connectivity and services
provided by each cluster and hence what state
information can be abstracted for use by routing. The
Figure 11: The MMWN Routing Architecture abstraction algorithm determines the representation of
cluster state, which in turn may influence the formation
Using this link-state information, a node attempts to of higher level clusters if the clustering algorithm tends
generate routes that are consistent with both the users' to group together similar lower level clusters. The
service requests and the network's current capabilities. routing algorithm determines which routes are selected,
Hierarchical cluster-based control structures offer the which in turn affects traffic load in the network, and thus
opportunity to significantly reduce the quantity of may affect the formation of clusters based on criteria
network state information that must be distributed, such as traffic localization. Therefore determining which
processed, and stored throughout a network. It is realized combination of routing, clustering and abstraction
by representing the state of a cluster in an abstracted algorithms is most appropriate for a particular network,
form that hides the details of connectivity and services exhibiting both low overload and a high probability of
offered within the cluster. However, constructing a finding routes that meet users' service requirements and
reasonable abstraction for a cluster with wide-ranging or conform to the network's service limitations a topic for
frequently changing characteristics requires trading off further research.
size and fidelity of the abstraction. Abstraction
techniques, however, share the feature that the When a node moves to another cluster, it acquires an
connectivity and services for a cluster, c, are expressed address reflecting its new location with respect to
relative to c's neighboring clusters, which are entry clustering hierarchy. The mapping between a node's
points to and exit points from c. identity and address must be maintained by nodes within
the network such that a source can determine the address
of any destination in a network. A location manager
4 Clustering updates address mappings in the location database as
Formation and maintenance of a cluster-based control nodes move, finds the mapping for a node in the location
structure requires algorithms for initially clustering database, and pages a portion of the network for the
nodes and or adjusting clusters as nodes join, leave, or address of a node when the mapping in the database is
move within the network. There are a number of stale. Two approaches have been suggested to distribute
clustering algorithms for fixed networks and mobile the contents of the location database throughout a
networks in the literature. A clustering algorithm must hierarchical cluster-based control structure for mobile
produce clusters which are connected and may achieve networks.
other objectives such as:
One approach is that the network contains a set of
redundant top-level location managers such that each
location manager maintains the address mapping for
each node in the network. In this approach updating
costs are high whereas finding costs are low.

In the second approach, the network contains a set of


location managers, one per cluster such that each
location manager maintains only the address mappings
for nodes within its cluster. When a source requests the
address of a destination, the address query propagates
from a lowest –level location manager to successively
higher-level location managers until it reaches one that
can respond to the query or until a page is deemed
necessary. With this method update costs are low but
finding costs are high

5 Conclusion
In this paper cluster-based control structures for large
dynamic networks are discussed in managing a shared
transmission medium, constructing routing backbones
and building abstractions of network state. The link -
cluster architecture is mainly for transmission
management whereas NTDR and virtual subnet
architectures are clustered for backbone formation. In
order to improve routing in large dynamic networks two
types of hierarchical routing architectures, namingly
quasi-hierarchical and strict-hierarchical routing
architectures, are suggested Though the concept of
cluster-based network control has existed for a long
period, only a few of the many examples of cluster-based
control structures described in this paper have been
deployed and exercised in full-scale networks.

Ad hoc networks possess two properties that make them


candidates for cluster-based control: mobile nodes,
which may cause frequent changes in network
connectivity; and wireless links, which have shared
access, are susceptible to large and frequent fluctuations
in quality, and may induce significant per-hop delays.
The cluster-based control structures can be more
appropriate candidates for improving the performance of
ad hoc networks through reduced sensitivity to small
changes in state and through localized control in
response to significant changes in state.

References
[1] Charles E. Perkins: Chapter 4, Ad Hoc Networking,
Addison Wesley, 2001, ISBN 0-201-30976-9

Вам также может понравиться