SlideShare a Scribd company logo
Mobile and Wireless Computing
Institute for Computer Science, University of Freiburg
Western Australian Interactive Virtual Environments Centre (IVEC)
Lecture 5 : Link Reversal Routing
Lecture 5.1 : Basic ideas behind Link Reversal
Routing
Lecture 5.2 : The Gafni-Bertsekas algorithm for
Link Reversal Routing
Mobile and Wireless Computing
Institute for Computer Science, University of Freiburg
Western Australian Interactive Virtual Environments Centre (IVEC)
Link Reversal Routing (LRR)
Link Reversal Routing is suitable for ad hoc
mobile networks that do not fall under the
following two categories :
– The rate of topological changes are not so fast as to
make flooding the only possible routing method.
– Also, the changes are not so slow that it is possible to
maintain shortest paths efficiently.
However, the success of the LRR method
depends on other factors like network size,
network topology and available bandwidth.
Mobile and Wireless Computing
Institute for Computer Science, University of Freiburg
Western Australian Interactive Virtual Environments Centre (IVEC)
General Approach
The main objective of the LRR approach is to
reduce the number of control messages due to
topological changes.
The LRR approaches do not try to maintain
extensive routing tables like proactive protocols.
Instead, the main aim of all LRR approaches is
to maintain a directed acyclic graph (DAG)
rooted at the destination.
Mobile and Wireless Computing
Institute for Computer Science, University of Freiburg
Western Australian Interactive Virtual Environments Centre (IVEC)
Directed Acyclic Graph
The destination is the only node that may have
only incoming links. All other nodes that have
incoming links must also have outgoing links.
We will talk about only a single destination and
the DAG associated with it.
However, it should be noted that at any time all
the nodes in the network may be destinations of
messages from other nodes.
Mobile and Wireless Computing
Institute for Computer Science, University of Freiburg
Western Australian Interactive Virtual Environments Centre (IVEC)
Directed Acyclic Graph
Each such destination will have a rooted DAG
associated with it.
If we consider a single destination D, a rooted
DAG provides multiple paths to D.
However, if we consider another node N, there
is no knowledge in N that can be used by N to
decide its position in the DAG relative to D.
Mobile and Wireless Computing
Institute for Computer Science, University of Freiburg
Western Australian Interactive Virtual Environments Centre (IVEC)
An Example
Dest
Each node only knows its one-hop neighbours and
does not get any information from other nodes.
Mobile and Wireless Computing
Institute for Computer Science, University of Freiburg
Western Australian Interactive Virtual Environments Centre (IVEC)
An Example
Dest
This DAG is drawn assuming only one destination.
In general there may be many destinations and each
node except the destination will try to maintain at least
one outgoing link to participate in the DAG.
Mobile and Wireless Computing
Institute for Computer Science, University of Freiburg
Western Australian Interactive Virtual Environments Centre (IVEC)
An Example
Dest
Since the overall DAG has no cycles, no message will
loop around a cycle and each message will eventually
reach its destination.
Mobile and Wireless Computing
Institute for Computer Science, University of Freiburg
Western Australian Interactive Virtual Environments Centre (IVEC)
Difference from Other Protocols
Unlike table-driven protocols like DSDV, the
LRR approaches do not require global
information.
Unlike reactive protocols like DSR and AODV,
there is no need to find a path to a destination
through route request messages.
LRR approaches have lower overheads in terms
of control packets as well as lower latency in
finding paths.
Mobile and Wireless Computing
Institute for Computer Science, University of Freiburg
Western Australian Interactive Virtual Environments Centre (IVEC)
Maintaining the DAG
One of the key issues in all LRR based protocols
is to maintain the DAG correctly. This is done
differently in different protocols.
We will first discuss the situation when a node
needs to take some action for maintaining the
overall DAG.
We will discuss the maintenance procedure for
different protocols later.
Mobile and Wireless Computing
Institute for Computer Science, University of Freiburg
Western Australian Interactive Virtual Environments Centre (IVEC)
What Triggers Route or DAG Maintenance
i j
k
For a node i, if there is a directed edge from i to
j, then i is called the upstream neighbour of j and
j is called the downstream neighbour of i.
A node needs to initiate route maintenance if it
has lost all of its downstream neighbours.
Mobile and Wireless Computing
Institute for Computer Science, University of Freiburg
Western Australian Interactive Virtual Environments Centre (IVEC)
Triggering DAG Maintenance
i
upstream
downstream
DAG maintenance only affects those nodes for whom all
previous directed paths pass through node i.
Hence, DAG maintenance has mostly local effects in
LRR protocols.
Mobile and Wireless Computing
Institute for Computer Science, University of Freiburg
Western Australian Interactive Virtual Environments Centre (IVEC)
The General Scenario for Multiple Destinations
d1
d2
d3
d4
i j
For two neighbours i and j, i can be both upstream and
downstream neighbour of j depending on the destination.
For destinations d1, d2 and d4, i is the upstream
neighbour of j. For d3, i is the downstream neighbour of j.
The status of each link is stored in each node tagged with
the destination ID.
Mobile and Wireless Computing
Institute for Computer Science, University of Freiburg
Western Australian Interactive Virtual Environments Centre (IVEC)
Gafni-Bertsekas (GF) Algorithm
The GF algorithm was first proposed for routing
in packet radio networks. The aim was to solve
the following problem :
– Given a connected, destination-disoriented DAG,
transform it into a destination-oriented DAG by
reversing the directions of some of its links.
We consider only one destination node, however
the algorithm can be executed concurrently for
multiple destination nodes.
Mobile and Wireless Computing
Institute for Computer Science, University of Freiburg
Western Australian Interactive Virtual Environments Centre (IVEC)
Some Definitions
A DAG is destination-oriented, if for every node
n there exists a directed path originating at n
and terminating at the destination.
Otherwise, the DAG is destination-disoriented.
The whole idea behind the GF algorithm is :
Given a destination, change the directions of
some of the links in the DAG so that it becomes
destination-oriented.
Mobile and Wireless Computing
Institute for Computer Science, University of Freiburg
Western Australian Interactive Virtual Environments Centre (IVEC)
A Destination-Oriented DAG
Dest
We can make the DAG destination-disoriented if we
change it so that there is at least one node (other than
the destination) with no outgoing edges.
Mobile and Wireless Computing
Institute for Computer Science, University of Freiburg
Western Australian Interactive Virtual Environments Centre (IVEC)
A Simple Theorem
Theorem : A DAG is destination-disoriented if
and only if there exists a node other than the
destination that has no outgoing link.
Proof : if :
Suppose there is a node n (other than the
destination) which has no outgoing link. Clearly,
n does not have a path to the destination since it
has no outgoing links.
Mobile and Wireless Computing
Institute for Computer Science, University of Freiburg
Western Australian Interactive Virtual Environments Centre (IVEC)
A Simple Theorem
Only if : Suppose there is at least one node n
such that n does not have a path to the
destination.
Since our network is a DAG, it is not possible
that a path from n will loop around a cycle.
Hence paths from n will fail to reach the
destination only if they reach a node without any
outgoing link.
Mobile and Wireless Computing
Institute for Computer Science, University of Freiburg
Western Australian Interactive Virtual Environments Centre (IVEC)
Destination-Oriented DAG
Hence, to maintain a destination-oriented DAG,
we have to ensure the following :
– Every node except the destination has at least one
outgoing edge. This is ensured by reversing link
directions in the DAG.
– The underlying network should remain a DAG when
we perform link reversals.
Mobile and Wireless Computing
Institute for Computer Science, University of Freiburg
Western Australian Interactive Virtual Environments Centre (IVEC)
Full Reversal and Partial Reversal Methods
The GF algorithm provides two methods for link
reversal : full reversal and partial reversal.
Full Reversal : If a node n (other than the
destination) has no outgoing links, it reverses
the directions of all of its incoming links.
Full reversals propagate through the network
until each node (except the destination) has at
least one outgoing link.
Mobile and Wireless Computing
Institute for Computer Science, University of Freiburg
Western Australian Interactive Virtual Environments Centre (IVEC)
Full Reversal Example
1
2 3
4 5 6
dest
Mobile and Wireless Computing
Institute for Computer Science, University of Freiburg
Western Australian Interactive Virtual Environments Centre (IVEC)
Full Reversal Example
1
2 3
4 5 6
dest
Link failure
Nodes that reverse
Mobile and Wireless Computing
Institute for Computer Science, University of Freiburg
Western Australian Interactive Virtual Environments Centre (IVEC)
Full Reversal Example
Nodes that reverse
1
2 3
4 5 6
dest
Link failure
Mobile and Wireless Computing
Institute for Computer Science, University of Freiburg
Western Australian Interactive Virtual Environments Centre (IVEC)
Full Reversal Example
Nodes that reverse
1
2 3
4 6
dest
Link failure
5
Mobile and Wireless Computing
Institute for Computer Science, University of Freiburg
Western Australian Interactive Virtual Environments Centre (IVEC)
Full Reversal Example
Nodes that reverse
1
2 3
4 6
dest
Link failure
5
Mobile and Wireless Computing
Institute for Computer Science, University of Freiburg
Western Australian Interactive Virtual Environments Centre (IVEC)
Full Reversal Example
Nodes that reverse
1
2 3
4 6
dest
Link failure
5
Mobile and Wireless Computing
Institute for Computer Science, University of Freiburg
Western Australian Interactive Virtual Environments Centre (IVEC)
Full Reversal is Loop Free
Assume that a loop is formed when a node n
does a full reversal.
In that case, one of the nodes on the loop must
be n.
However, n has only outgoing links after the full
reversal. Hence, n cannot be part of a loop.
Mobile and Wireless Computing
Institute for Computer Science, University of Freiburg
Western Australian Interactive Virtual Environments Centre (IVEC)
Full Reversal Does not Oscillate
The GF algorithm assumes that the network is
always connected.
Hence, there is at least one node P with an
outgoing link to the destination.
P will never execute a full reversal and hence
the iteration will stop at P.
However, GF algorithm does not work if the
network is partitioned. A partitioned network may
result in infinite oscillation of full reversal.
Mobile and Wireless Computing
Institute for Computer Science, University of Freiburg
Western Australian Interactive Virtual Environments Centre (IVEC)
GF Fails to Converge for Partitioned Networks
dest
1
2
3 4
5
Link failure
Nodes that reverse
Mobile and Wireless Computing
Institute for Computer Science, University of Freiburg
Western Australian Interactive Virtual Environments Centre (IVEC)
GF Fails to Converge for Partitioned Networks
dest
1
2
3 4
5
Nodes that reverse
Mobile and Wireless Computing
Institute for Computer Science, University of Freiburg
Western Australian Interactive Virtual Environments Centre (IVEC)
GF Fails to Converge for Partitioned Networks
2
dest
1
3 4
5
Nodes that reverse

More Related Content

PDF
498 503
Editor IJARCET
 
PDF
Black Hole Detection in AODV Using Hexagonal Encryption in Manet’s
IJMER
 
PDF
V25112115
IJERA Editor
 
PDF
109 113
Ijarcsee Journal
 
PDF
Ballpark Figure Algorithms for Data Broadcast in Wireless Networks
Editor IJCATR
 
PDF
Routing Protocols in Zigbee Based networks: A Survey
IJEEE
 
PPTX
Ccna interview questions
CISCO Online Training
 
Black Hole Detection in AODV Using Hexagonal Encryption in Manet’s
IJMER
 
V25112115
IJERA Editor
 
Ballpark Figure Algorithms for Data Broadcast in Wireless Networks
Editor IJCATR
 
Routing Protocols in Zigbee Based networks: A Survey
IJEEE
 
Ccna interview questions
CISCO Online Training
 

What's hot (19)

DOCX
Performance Analysis of AODV and DSDV - FINAL YEAR PROJECT
Ravi Teja P
 
PDF
Hj2413101315
IJERA Editor
 
PDF
Evaluation of scalability and bandwidth
IJCNCJournal
 
PDF
LOAD BALANCING AND PROVIDING SECURITY USING RSA IN WIRELESS SENSOR NETWORKS
IJARIIT
 
PDF
Ab25144148
IJERA Editor
 
PDF
159 163
Editor IJARCET
 
PDF
Paper id 25201418
IJRAT
 
PPTX
Slide aansw
edge7
 
PDF
Ho2413421346
IJERA Editor
 
PDF
Analysis of Random Based Mobility Model using TCP Traffic for AODV and DSDV M...
ijsrd.com
 
PDF
PERFORMANCE ANALYSIS AND COMPARISON OF IMPROVED DSR WITH DSR, AODV AND DSDV R...
ijp2p
 
PDF
International Journal of Computational Engineering Research(IJCER)
ijceronline
 
PDF
International Journal of Computational Engineering Research(IJCER)
ijceronline
 
PDF
Modeling and Performance Evaluation TAODV Routing Protocol Using Stochastic P...
Editor IJCATR
 
PDF
E04402030037
ijceronline
 
PDF
Fa25939942
IJERA Editor
 
PDF
Performance Comparison of AODV, DSR and LAR1 in Mobile Ad-hoc Network based o...
IOSR Journals
 
PDF
Cross-layer based performance optimization for different mobility and traffic...
IOSR Journals
 
PDF
D4610922df8edb89513e496bbbe7672d7453
university of Gujrat, pakistan
 
Performance Analysis of AODV and DSDV - FINAL YEAR PROJECT
Ravi Teja P
 
Hj2413101315
IJERA Editor
 
Evaluation of scalability and bandwidth
IJCNCJournal
 
LOAD BALANCING AND PROVIDING SECURITY USING RSA IN WIRELESS SENSOR NETWORKS
IJARIIT
 
Ab25144148
IJERA Editor
 
Paper id 25201418
IJRAT
 
Slide aansw
edge7
 
Ho2413421346
IJERA Editor
 
Analysis of Random Based Mobility Model using TCP Traffic for AODV and DSDV M...
ijsrd.com
 
PERFORMANCE ANALYSIS AND COMPARISON OF IMPROVED DSR WITH DSR, AODV AND DSDV R...
ijp2p
 
International Journal of Computational Engineering Research(IJCER)
ijceronline
 
International Journal of Computational Engineering Research(IJCER)
ijceronline
 
Modeling and Performance Evaluation TAODV Routing Protocol Using Stochastic P...
Editor IJCATR
 
E04402030037
ijceronline
 
Fa25939942
IJERA Editor
 
Performance Comparison of AODV, DSR and LAR1 in Mobile Ad-hoc Network based o...
IOSR Journals
 
Cross-layer based performance optimization for different mobility and traffic...
IOSR Journals
 
D4610922df8edb89513e496bbbe7672d7453
university of Gujrat, pakistan
 
Ad

Viewers also liked (15)

PPTX
Quan ly truyen thong ca nhan full
MyLan2014
 
PDF
Summer Salads - Laura Baddish
Laura Baddish | The Baddish Group
 
PPTX
Promoting the well being of children in out of home care:
BASPCAN
 
PDF
Presentazione standard2.4
Stefano Santarelli, Ph.D.
 
PPTX
Yasmine portfolio
Yasmine Elfeituri
 
PPTX
torrorgenreconventions 101007040329-phpapp02
Sadè 🌹💕
 
PDF
קיימות וטביעת רגל פחמנית- ראיון במגזין כיל הגלובלי- ינואר 16
Roy Weidberg
 
PDF
START alert Nigeria (Lassa fever)
Lylaa Shaikh
 
PPTX
Mailchimp for Beginners
Dom Cushnan
 
PPTX
Su hinh thanh marketing-COLOR GROUP
MyLan2014
 
PPTX
Управление машиностроительным производством
ICL Solutions
 
PDF
Bulletin municipal 2016 de Bazoges en Pareds
Commune de Bazoges en Pareds
 
PDF
Europura citi strategy 2015
EuropuraMayLocNuoc
 
PDF
multimedia-y_educacion
alexitangel
 
PDF
Europura citi 02 uv
EuropuraMayLocNuoc
 
Quan ly truyen thong ca nhan full
MyLan2014
 
Summer Salads - Laura Baddish
Laura Baddish | The Baddish Group
 
Promoting the well being of children in out of home care:
BASPCAN
 
Presentazione standard2.4
Stefano Santarelli, Ph.D.
 
Yasmine portfolio
Yasmine Elfeituri
 
torrorgenreconventions 101007040329-phpapp02
Sadè 🌹💕
 
קיימות וטביעת רגל פחמנית- ראיון במגזין כיל הגלובלי- ינואר 16
Roy Weidberg
 
START alert Nigeria (Lassa fever)
Lylaa Shaikh
 
Mailchimp for Beginners
Dom Cushnan
 
Su hinh thanh marketing-COLOR GROUP
MyLan2014
 
Управление машиностроительным производством
ICL Solutions
 
Bulletin municipal 2016 de Bazoges en Pareds
Commune de Bazoges en Pareds
 
Europura citi strategy 2015
EuropuraMayLocNuoc
 
multimedia-y_educacion
alexitangel
 
Europura citi 02 uv
EuropuraMayLocNuoc
 
Ad

Similar to 05 1 mobile_computing (20)

PDF
Distributed Path Computation Using DIV Algorithm
IOSR Journals
 
PDF
C0431320
IOSR Journals
 
PDF
Performance Analysis of DSR, STAR, ZRP Routing Protocols for a Dynamic Ad-Hoc...
IRJET Journal
 
PDF
Modified GPSR for Fault Tolerant and Energy Efficiency in Mobile Ad Hoc Network
CSEIJJournal
 
PDF
Wiki2010 Unit 4
Rebecca Buono
 
PDF
Improvement over aodv routing protocol in vanet
IAEME Publication
 
PDF
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
ijceronline
 
PDF
Nearest Adjacent Node Discovery Scheme for Routing Protocol in Wireless Senso...
IOSR Journals
 
PDF
Distance’s quantification
csandit
 
PDF
Routing protocols in Ad-hoc Networks- A Simulation Study
IOSR Journals
 
PDF
AN IMPLEMENTATION POSSIBILITIES FOR AODV ROUTING PROTOCOL IN REAL WORLD
ijdpsjournal
 
PDF
Ijariie1150
IJARIIE JOURNAL
 
PDF
MOBILITY AWARE ROUTING PROTOCOL IN AD-HOC NETWORK
cscpconf
 
PDF
Hd3312521256
IJERA Editor
 
PDF
Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...
IOSR Journals
 
PPTX
Comparative Analysis of Distance Vector Routing & Link State Protocols
East West University
 
DOCX
Virtual Position based Olsr Protocol for Wireless Sensor Networks
ijcnes
 
PDF
Opportunistic Data Forwarding in Manet
IJTET Journal
 
PDF
Md3421762181
IJERA Editor
 
PDF
PERFORMANCE EVALUATION ON EXTENDED ROUTING PROTOCOL OF AODV IN MANET
ijasuc
 
Distributed Path Computation Using DIV Algorithm
IOSR Journals
 
C0431320
IOSR Journals
 
Performance Analysis of DSR, STAR, ZRP Routing Protocols for a Dynamic Ad-Hoc...
IRJET Journal
 
Modified GPSR for Fault Tolerant and Energy Efficiency in Mobile Ad Hoc Network
CSEIJJournal
 
Wiki2010 Unit 4
Rebecca Buono
 
Improvement over aodv routing protocol in vanet
IAEME Publication
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
ijceronline
 
Nearest Adjacent Node Discovery Scheme for Routing Protocol in Wireless Senso...
IOSR Journals
 
Distance’s quantification
csandit
 
Routing protocols in Ad-hoc Networks- A Simulation Study
IOSR Journals
 
AN IMPLEMENTATION POSSIBILITIES FOR AODV ROUTING PROTOCOL IN REAL WORLD
ijdpsjournal
 
Ijariie1150
IJARIIE JOURNAL
 
MOBILITY AWARE ROUTING PROTOCOL IN AD-HOC NETWORK
cscpconf
 
Hd3312521256
IJERA Editor
 
Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...
IOSR Journals
 
Comparative Analysis of Distance Vector Routing & Link State Protocols
East West University
 
Virtual Position based Olsr Protocol for Wireless Sensor Networks
ijcnes
 
Opportunistic Data Forwarding in Manet
IJTET Journal
 
Md3421762181
IJERA Editor
 
PERFORMANCE EVALUATION ON EXTENDED ROUTING PROTOCOL OF AODV IN MANET
ijasuc
 

05 1 mobile_computing

  • 1. Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC) Lecture 5 : Link Reversal Routing Lecture 5.1 : Basic ideas behind Link Reversal Routing Lecture 5.2 : The Gafni-Bertsekas algorithm for Link Reversal Routing
  • 2. Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC) Link Reversal Routing (LRR) Link Reversal Routing is suitable for ad hoc mobile networks that do not fall under the following two categories : – The rate of topological changes are not so fast as to make flooding the only possible routing method. – Also, the changes are not so slow that it is possible to maintain shortest paths efficiently. However, the success of the LRR method depends on other factors like network size, network topology and available bandwidth.
  • 3. Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC) General Approach The main objective of the LRR approach is to reduce the number of control messages due to topological changes. The LRR approaches do not try to maintain extensive routing tables like proactive protocols. Instead, the main aim of all LRR approaches is to maintain a directed acyclic graph (DAG) rooted at the destination.
  • 4. Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC) Directed Acyclic Graph The destination is the only node that may have only incoming links. All other nodes that have incoming links must also have outgoing links. We will talk about only a single destination and the DAG associated with it. However, it should be noted that at any time all the nodes in the network may be destinations of messages from other nodes.
  • 5. Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC) Directed Acyclic Graph Each such destination will have a rooted DAG associated with it. If we consider a single destination D, a rooted DAG provides multiple paths to D. However, if we consider another node N, there is no knowledge in N that can be used by N to decide its position in the DAG relative to D.
  • 6. Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC) An Example Dest Each node only knows its one-hop neighbours and does not get any information from other nodes.
  • 7. Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC) An Example Dest This DAG is drawn assuming only one destination. In general there may be many destinations and each node except the destination will try to maintain at least one outgoing link to participate in the DAG.
  • 8. Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC) An Example Dest Since the overall DAG has no cycles, no message will loop around a cycle and each message will eventually reach its destination.
  • 9. Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC) Difference from Other Protocols Unlike table-driven protocols like DSDV, the LRR approaches do not require global information. Unlike reactive protocols like DSR and AODV, there is no need to find a path to a destination through route request messages. LRR approaches have lower overheads in terms of control packets as well as lower latency in finding paths.
  • 10. Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC) Maintaining the DAG One of the key issues in all LRR based protocols is to maintain the DAG correctly. This is done differently in different protocols. We will first discuss the situation when a node needs to take some action for maintaining the overall DAG. We will discuss the maintenance procedure for different protocols later.
  • 11. Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC) What Triggers Route or DAG Maintenance i j k For a node i, if there is a directed edge from i to j, then i is called the upstream neighbour of j and j is called the downstream neighbour of i. A node needs to initiate route maintenance if it has lost all of its downstream neighbours.
  • 12. Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC) Triggering DAG Maintenance i upstream downstream DAG maintenance only affects those nodes for whom all previous directed paths pass through node i. Hence, DAG maintenance has mostly local effects in LRR protocols.
  • 13. Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC) The General Scenario for Multiple Destinations d1 d2 d3 d4 i j For two neighbours i and j, i can be both upstream and downstream neighbour of j depending on the destination. For destinations d1, d2 and d4, i is the upstream neighbour of j. For d3, i is the downstream neighbour of j. The status of each link is stored in each node tagged with the destination ID.
  • 14. Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC) Gafni-Bertsekas (GF) Algorithm The GF algorithm was first proposed for routing in packet radio networks. The aim was to solve the following problem : – Given a connected, destination-disoriented DAG, transform it into a destination-oriented DAG by reversing the directions of some of its links. We consider only one destination node, however the algorithm can be executed concurrently for multiple destination nodes.
  • 15. Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC) Some Definitions A DAG is destination-oriented, if for every node n there exists a directed path originating at n and terminating at the destination. Otherwise, the DAG is destination-disoriented. The whole idea behind the GF algorithm is : Given a destination, change the directions of some of the links in the DAG so that it becomes destination-oriented.
  • 16. Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC) A Destination-Oriented DAG Dest We can make the DAG destination-disoriented if we change it so that there is at least one node (other than the destination) with no outgoing edges.
  • 17. Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC) A Simple Theorem Theorem : A DAG is destination-disoriented if and only if there exists a node other than the destination that has no outgoing link. Proof : if : Suppose there is a node n (other than the destination) which has no outgoing link. Clearly, n does not have a path to the destination since it has no outgoing links.
  • 18. Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC) A Simple Theorem Only if : Suppose there is at least one node n such that n does not have a path to the destination. Since our network is a DAG, it is not possible that a path from n will loop around a cycle. Hence paths from n will fail to reach the destination only if they reach a node without any outgoing link.
  • 19. Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC) Destination-Oriented DAG Hence, to maintain a destination-oriented DAG, we have to ensure the following : – Every node except the destination has at least one outgoing edge. This is ensured by reversing link directions in the DAG. – The underlying network should remain a DAG when we perform link reversals.
  • 20. Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC) Full Reversal and Partial Reversal Methods The GF algorithm provides two methods for link reversal : full reversal and partial reversal. Full Reversal : If a node n (other than the destination) has no outgoing links, it reverses the directions of all of its incoming links. Full reversals propagate through the network until each node (except the destination) has at least one outgoing link.
  • 21. Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC) Full Reversal Example 1 2 3 4 5 6 dest
  • 22. Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC) Full Reversal Example 1 2 3 4 5 6 dest Link failure Nodes that reverse
  • 23. Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC) Full Reversal Example Nodes that reverse 1 2 3 4 5 6 dest Link failure
  • 24. Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC) Full Reversal Example Nodes that reverse 1 2 3 4 6 dest Link failure 5
  • 25. Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC) Full Reversal Example Nodes that reverse 1 2 3 4 6 dest Link failure 5
  • 26. Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC) Full Reversal Example Nodes that reverse 1 2 3 4 6 dest Link failure 5
  • 27. Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC) Full Reversal is Loop Free Assume that a loop is formed when a node n does a full reversal. In that case, one of the nodes on the loop must be n. However, n has only outgoing links after the full reversal. Hence, n cannot be part of a loop.
  • 28. Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC) Full Reversal Does not Oscillate The GF algorithm assumes that the network is always connected. Hence, there is at least one node P with an outgoing link to the destination. P will never execute a full reversal and hence the iteration will stop at P. However, GF algorithm does not work if the network is partitioned. A partitioned network may result in infinite oscillation of full reversal.
  • 29. Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC) GF Fails to Converge for Partitioned Networks dest 1 2 3 4 5 Link failure Nodes that reverse
  • 30. Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC) GF Fails to Converge for Partitioned Networks dest 1 2 3 4 5 Nodes that reverse
  • 31. Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC) GF Fails to Converge for Partitioned Networks 2 dest 1 3 4 5 Nodes that reverse