Outline

36
Dynamic Source Routing DSR 1. Multipath extension to DSR Disjoint Multipath(protocol 1) Multipath protocol 2 2. Analytic Modeling Modeling of Protocol 1 Modeling of Protocol 2 Modeling of Braided path Modeling of Advanced Braid Outline

description

Outline. Dynamic Source Routing ( DSR ) Multipath extension to DSR Disjoint Multipath(protocol 1) Multipath protocol 2 Analytic Modeling Modeling of Protocol 1 Modeling of Protocol 2 Modeling of Braided path Modeling of Advanced Braid. Dynamic Source Routing ( DSR ). 2. . 7. - PowerPoint PPT Presentation

Transcript of Outline

Page 1: Outline

• Dynamic Source Routing( DSR)1. Multipath extension to DSR

– Disjoint Multipath(protocol 1)– Multipath protocol 2

2. Analytic Modeling• Modeling of Protocol 1 • Modeling of Protocol 2• Modeling of Braided path• Modeling of Advanced Braid

Outline

Page 2: Outline

Dynamic Source Routing( DSR)

1

4

3

2

5

6

7

8

<1>

<1>

<1,2>

<1,3>

<1>

<1,4>

<1,3,5>

<1,3,5,7>

<1,4,6>

<1,4,6>

<1,4,6>

<1,4,6>

S

D

Page 3: Outline

Disjoint Multipath DSR( 1/3)• Many flooded query message arrive at the destination

via different routes.• Primary source route is the route taken by the first query

reaching the destination.• The destination “remembers” the primary source, in

order to figure out disjoint routes.• The destination controls the total number of replies ,thus

preventing a reply flood• The source keeps all routes received on reply packets in

its route cache.• When the primary route breaks ,the shortest remaining

alternate route is used.

Page 4: Outline

Disjoint Multipath DSR( 2/3)

DS

P1

P2

PN

Page 5: Outline

Disjoint Multipath DSR( 3/3)• Shortcoming An intermediate link failure on the primary route still

sends an error packet back to the source ,which will then use an alternate route

This cases a temporary loss of route for the data packets that are already in transit upstream from the failed link

Let us call this technique as protocol 1

Page 6: Outline

Multipath protocol 2 (1/3)

• The destination replies to each intermediate node in the primary route with an alternate disjoint route to the destination.

• The reply is targeted to the intermediate node instead of the source

Page 7: Outline

Multipath protocol 2 (2/3)

S D

L1 L2 L3 L4 Lk

P1

P2

P3

P4

n1

n2

n3

n4

nk+1

Page 8: Outline

Multipath protocol 2 (3/3)

• When the link Li is broken ,the node ni replace the unused portion of the route, Li to Lk ,in the data packet header by the alternate route Pi.

• The node ni is responsible for modifying the source route on all later data packets to use its own alternate route.

• This will continue until a link on Pi breaks.• It will cause an error packet transmitted backward up to

node ni-1,which will quench the error packet and switch all later data packets to its own alternate route Pi-1 .

• This process continues until the source gets an error packet and has no alternate route

Page 9: Outline

Analytic Modeling(1/2)

• The lifetime of Li is denoted by XLi

• We represent the lifetime of a wireless link between a pair of nodes by a random variable

• Assume that XLi ,i=1,2,….k, are independent and identically distributed exponential random variables ,each with mean ι

• EX:

1

tLiX

Page 10: Outline

Analytic Modeling(2/2)

• Since a route fails when any one of the wireless links in its path breaks , the lifetime of a route P ,consisting of k wireless links, is a random variable XP that can be expressed asXP =min(XL1, XL2,….., XLk)

• It is well known that XP is also an exponentially distributed random variable with a mean of

k

Page 11: Outline

Modeling of Protocol 1 (1/4)

• Assume a source S has N routes to a destination D .

• The primary route is denoted by P1 and the N-1 alternate routes are denoted by P2, P3,…. PN

• The length of route Pi is ki • The time after which none of the routes are usef

ul is a random variable T, whereT =max(XP1, XP2,….., XPN)

• T represents the time between successive route discoveries

Page 12: Outline

Modeling of Protocol 1 (2/4)

• XP1, XP2,….., XPN are exponential random variables ,where

the pdf of XPi is

Note that XPi ‘s are independent• the cdf of XPi is

Nitf tiX

i

iP,.....,2,1,)(

tt

XXi

iPiPdttftF 1)()(

0

Page 13: Outline

Modeling of Protocol 1 (3/4)

• The cdf of T ,FT(t) is obtained as

N

iX

PPP

PPP

T

tF

tXtXtXP

tXXXP

tTPtF

iP

N

N

1

)(

)](.....)()[(

]),...,,[max(

][)(

21

21

Page 14: Outline

Modeling of Protocol 1 (4/4)

• The pdf of T ,the time between successive route discoveries ,is given by

• Where λi =ki /ι=1/lifetime of the i-th route

)1()1)(1(

)1()1)(1(

)1()1)(1()(

)(')(

121

312

321

2

1

ttttN

tttt

ttttT

TT

NN

N

Ntf

tFtf

Page 15: Outline

Modeling of Protocol 2 (1/5)

• The time until the next route discovery T is the time until the event E is true ,where E is described by the following logical expression:

• Then T can be expressed as

)( 11123312211 PPPLPPPLPPLPLE kkk

),,,,max(,,

),,max(),,max(min

11

12211

PPPL

PPLPL

XXXX

XXXXXT

kkk

Page 16: Outline

Multipath protocol 2 (2/3)

S D

L1 L2 L3 L4 Lk

P1

P2

P3

P4

n1

n2

n3

n4

nk+1

Page 17: Outline

Modeling of Protocol 2 (2/5)

• Let us denote the random variable by Zi ,

• the pdf of Zi ,fZi(t) is given by

• Where

),...,,max(21 NPPP XXX

1

1

1

,1

)1()(i

j

i

jkk

ttjZ

kj

itf

11

,,2,1

ijfor

ijfork j

j

Page 18: Outline

Modeling of Protocol 2 (3/5)

• the cdf of Zi , FZi(t) is given by

• where

11

,,2,1

)1()()(1

10

ikfor

ikfork

dttftF

k

k

i

k

tt

ZZk

ii

Page 19: Outline

Modeling of Protocol 2 (4/5)

• The pdf of T =min(Z1 ,Z2 ,…, Zk )• min(Z1 ,Z2 ,…, Zk )= max((1-Z1 ),(1-Z2 ),…,(1- Zk

))• the cdf of T , FT (t) is given by

N

iX

ZZZ

ZZZT

tF

FFFP

FFFPtF

iP

k

1

)(1

])1(),...,1(),1([max

)],...,,[min()(

111

21

Page 20: Outline

Modeling of Protocol 2 (5/5)

• the pdf of T , fT (t) is given by

k

i

k

ijjZZ

PPPL

PPLPL

T

TT

tFtf

XXXX

XXXXXtf

tFtf

ii

kkk

1 ,1

k21

)(1)(

) Z,, Z, min(Z

),,,,max(,,

),,max(),,max(min)(

)(')(

11

12211

Page 21: Outline

• The expected value of T ,E[T] is given by

• No. of disjoint paths=N• Mean lifetime of a single link, ι=5

0

)(][ dttftTE T

)1(2.2,:

1,1,:

:

1Pr

21

21

21

NkkkkkkCCASE

NkkkkkkBCASE

kkkkACASE

otocol

N

N

N

3:

2:

1:

2Pr

ikkCCASE

ikkBCASE

ikkACASE

otocol

i

i

i

Page 22: Outline

Protocol 1

00.5

11.5

22.5

33.5

4

2 3 4 5 6 7Length of the primary route (k)

Inter

val b

etwee

n ro

ute

disc

over

ies,E

[T]

Case A (ki=k),N=2

Case B (ki=k+i-1),N=2

Case C (ki=k+2(i-1)),N=2N=1

Page 23: Outline

protocol 1

0

0.5

1

1.5

2

2.5

3

3.5

4

4.5

5

1 2 3 4 5 6 7No. of disjoint paths(N)

Inte

rval

bet

wee

n ro

ute

disc

over

ies,E

[T]

Case A,N=3

Case B,N=3

Case C,N=3

Case A,N=6

Case B,N=6

Case C,N=6

Page 24: Outline

Protocol 2

0

0.5

1

1.5

2

2.5

3

3.5

4

4.5

2 3 4 5 6 7

Length of the primary route (k)

Inte

rval

bet

wee

n ro

ute

disc

over

ies,E

[T]

Case A,ki=k-i+1

Case B,ki=k-i+2

Case C,ki=k-i+3

Single path

Page 25: Outline

Node fail

• Link fail

• Node fail

)),,,,max(,

),,,max(),,min(max(

)(

121

12312

121123412312

PPPn

PPnPn

kkk

XXXX

XXXXXT

PPPnPPPnPPnPnE

kkk

),,,,max(,,

),,max(),,max(min

)(

11

12211

11123312211

PPPL

PPLPL

kkk

XXXX

XXXXXT

PPPLPPPLPPLPLE

kkk

Page 26: Outline

Multipath protocol 2

S D

L1 L2 L3 L4 Lk

P1

P2

P3

P4

n1

n2

n3

n4

nk+1

Page 27: Outline

Protocol 2 (node fail)

00.5

11.5

22.5

33.5

44.5

55.5

66.5

77.5

8

2 3 4 5 6 7Length of the primary route (k)

Inte

rval

bet

wee

n ro

ute

disc

over

ies,E

[T]

Case A,ki=k-i+1

Case B,ki=k-i+2

Case C,ki=k-i+3

Single path

Page 28: Outline

Modeling of Braided path

)),max(,),,max(),,max(,

),max(,),,max(),,min(max(

13221

14332

1322114332

kk

kk

npnpnp

nnnnnn

kkkk

XXXXXX

XXXXXXT

npnpnpnnnnnnE

1 2 3 K4 K+1K-1

P1

P2

K-2

Pk-2

Pk-1

Page 29: Outline

Braided path

0

0.5

1

1.5

2

2.5

3

3.5

4

3 4 5 6 7

Length of the primary route (k)

Inte

rval

bet

wee

n ro

ute

disc

over

ies,E

[T]

Case A,alternate path=1

Case B,alternate path=2

Case C,alternate path=3

Single path

Page 30: Outline

Modeling of Advanced Braid(1/2)

• Assume length of a= length of Pi

2 3 K4 K+1K-1

P1

P2

K-2

Pk-2

Pk-1

5 6

P3

P4

a

a

K-3

Pk-3 a

1

Page 31: Outline

Modeling of Advanced Braid(2/2)

)),max(),,max(,

),,max(),,min(max(

112

3221

1123221

kkkk npanp

anpnp

kkkk

XXXXX

XXXXXT

npanpanpnpE

Page 32: Outline

Advanced Braid

0

0.5

1

1.5

2

2.5

3

3.5

4

4.5

4 5 6 7

Length of the primary route (k)

Inte

rval

bet

wee

n ro

ute

disc

over

ies,E

[T]

Case A,alternate path=1

Case B,alternate path=2

Case C,alternate path=3

Single path

Page 33: Outline

Comparison of CASE A

k 4 5 6 7

Advanced path

3.881 3.4623 3.1741 2.9591

Braided path

2.5317 2.0621 1.7755 1.5786

Protocol 2

2.9497 2.3402 1.9602 1.6979

Page 34: Outline

Comparison of CASE B

k 4 5 6 7

Advanced path

2.7621 2.4068 2.1747 2.0073

Braided path

2.055 1.6803 1.4497 1.2905

Protocol 2

2.4906 2.027 1.7313 1.5227

Page 35: Outline

Comparison of CASE C

k 4 5 6 7

Advanced path

2.3521 2.0055 1.788 1.6355

Braided path

1.8355 1.494 1.2853 1.1418

Protocol 2

2.2478 1.8374 1.5795 1.3986

Page 36: Outline

Comparison

0

1

2

3

4

5

4 5 6 7

Length of the primary route (k)

Inter

val b

etwee

n ro

ute

disc

over

ies,E

[T]

Case A,mybraid

Case B,mybraid

Case C,mybraid

Case A,braid

Case B,braid

Case C,braid

Case A,protocol 2

Case B,protocol 2

Case C,protocol 2

single path