SlideShare a Scribd company logo
1 of 18
Fisheye State Routing
Protocol Overview
By:
Nir Solomon
Yoav Francis
Interdisciplinary Center, Herzliya
Ad-Hoc Network
A wireless network between mobile nodes
No infrastructure
Limited communication distance
Low-powered users
How to route messages?
Flooding/Broadcast
Not scalable
Using the shortest path from source to
destination
Requires nodes to keep topology data
Ad-Hoc Network (cont.)
Node moves cause network topology changes
Results in routes change
Nodes need to update their topology information
A node disconnecting to or from a neighbor needs to notify
other nodes
There are many upates – must make update process efficient
Low overhead
Fast propagation
Ad-Hoc Routing algorithms
 Proactive:
 Always monitor network topology
 Advantage: Always know how to route to any node
 Disadvantages:
Routing table storage
Periodic control traffic overhead
 Example protocols: LSR, FSR
 Reactive:
 Look for a route only when need to send a packet
 Advantages:
Low routing table storage
No periodic control traffic
 Disadvantage: route search overhead
 Example protocols: TORA, DSR
Link State Routing
Each node holds a routing table with the link state of all
nodes in the network
Periodically or on link change: flood “link state” – list of
neighbors (neighbor = 1 hop)
Re-broadcasts link state information received from neighbors
Use timestamp to distinguish new from stale updates
Routing
The destination is stored in the message header
Each forwarding node finds the shortest path to the destination
according to its routing table
 On each update of the topology map – each node must calculate
the shortest path to all other nodes again.
Link State Routing drawbacks
As the number of nodes grow or mobility increases:
Routing tables grow linearly
Link state overhead grow linearly – the overhead
packets will consume most of the bandwidth as
network size increases.
Not scalable
• Fish do have 360° (or almost) vision.
• Fishes (and humans) do have a higher
concentration of optic nerves close to they focal
point than elsewhere in they eye.
• As a result fisheye captures with high detail the
points near the focal point
Fisheye Vision
Fisheye Vision (Cont.)
Published in “Fisheye State Routing in Mobile
Ad Hoc Networks” in 2000, by Guangyu Pei ,
Mario Gerla , Tsu-Wei Chen at ICDCS.
Aim – Reduce routing updates overhead in large
ad-hoc networks.
Background
Fisheye State Routing (FSR)
• Proactive link-state routing protocol.
• Similar to link state as it maintains a full topology map at each node
– Periodic exchange of Hello packet.
– Periodic exchange of topology tables within the local neighbors
only (instead of flooding the entire network) .
• Topology tables update frequency decreases with distance to
destination
– Updates for a near destination are propagated more frequently then
updates for a remote destination
Fisheye State Routing (Cont.)
Every node holds:
 Neighbor list
 Topology Table
 Next Hop Table
 Distance Table
For large network, in order to reduce the size of the routing
update message, the FSR technique uses different
exchange periods for different entries in the routing table.
Relative to each node, the network is divided into
different scopes.
Fisheye State Routing (Cont.)
Central Node
1-hop neighbor
2-hops or more
neighbor
The link state updates of the nodes in scope k are sent every 2k-1
T to all the
neighboring nodes
•K is the hop distance
•T is the link state updates transmission period
Scope 1
Scope 2
Fisheye State Routing (Cont.)
 Maintain accurate routing information for immediate neighbors.
 Progressively less detail as distance increases.
 Link state of immediate neighbors are exchanged more frequently.
 The exchange frequency decreases proportionally to the distance.
 As the packet gets closer to the destination, the accuracy
increases.
Fisheye State Routing
0
5
1
2
4
3
0:{1}
1:{0,2,3}
2:{5,1,4}
3:{1,4}
4:{5,2,3}
5:{2,4}
1
0
1
1
2
2
LST HOP
0:{1}
1:{0,2,3}
2:{5,1,4}
3:{1,4}
4:{5,2,3}
5:{2,4}
2
1
2
0
1
2
LST HOP
0:{1}
1:{0,2,3}
2:{5,1,4}
3:{1,4}
4:{5,2,3}
5:{2,4}
2
2
1
1
0
1
LST HOP
Entries in black are
exchanged more
frequently
Simulation Results
FSR – Conclusions
 Major scalability benefit: link state overhead decreases
significantly
 Unsolved problems:
Route table size still grows linearly with network size
Out of date routes to remote destinations
Our Project
Questions?
Thanks!

More Related Content

What's hot

Adhoc and Sensor Networks - Chapter 03
Adhoc and Sensor Networks - Chapter 03Adhoc and Sensor Networks - Chapter 03
Adhoc and Sensor Networks - Chapter 03Ali Habeeb
 
Wireless routing protocols
Wireless routing protocolsWireless routing protocols
Wireless routing protocolsbarodia_1437
 
Issues in routing protocol
Issues in routing protocolIssues in routing protocol
Issues in routing protocolPradeep Kumar TS
 
Classification of routing protocols
Classification of routing protocolsClassification of routing protocols
Classification of routing protocolsMenaga Selvaraj
 
QOS (Quality of Services) - Computer Networks
 QOS (Quality of Services) - Computer Networks QOS (Quality of Services) - Computer Networks
QOS (Quality of Services) - Computer NetworksIIIT Manipur
 
Mac protocols for ad hoc wireless networks
Mac protocols for ad hoc wireless networks Mac protocols for ad hoc wireless networks
Mac protocols for ad hoc wireless networks Divya Tiwari
 
Lecture 11 14. Adhoc routing protocols cont..
Lecture 11 14. Adhoc  routing protocols cont..Lecture 11 14. Adhoc  routing protocols cont..
Lecture 11 14. Adhoc routing protocols cont..Chandra Meena
 
ISSUES IN AD HOC WIRELESS NETWORKS
ISSUES IN  AD HOC WIRELESS  NETWORKS ISSUES IN  AD HOC WIRELESS  NETWORKS
ISSUES IN AD HOC WIRELESS NETWORKS Dushhyant Kumar
 
Geographic Routing in WSN
Geographic Routing in WSNGeographic Routing in WSN
Geographic Routing in WSNMahbubur Rahman
 
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...ArunChokkalingam
 
Zone Routing Protocol
Zone Routing ProtocolZone Routing Protocol
Zone Routing Protocolnitss007
 
Adhoc and Sensor Networks - Chapter 02
Adhoc and Sensor Networks - Chapter 02Adhoc and Sensor Networks - Chapter 02
Adhoc and Sensor Networks - Chapter 02Ali Habeeb
 
Mac protocols
Mac protocolsMac protocols
Mac protocolsjuno susi
 
Lecture 5 6 .ad hoc network
Lecture 5 6 .ad hoc networkLecture 5 6 .ad hoc network
Lecture 5 6 .ad hoc networkChandra Meena
 

What's hot (20)

Adhoc and Sensor Networks - Chapter 03
Adhoc and Sensor Networks - Chapter 03Adhoc and Sensor Networks - Chapter 03
Adhoc and Sensor Networks - Chapter 03
 
Wireless routing protocols
Wireless routing protocolsWireless routing protocols
Wireless routing protocols
 
IEEE 802.11
IEEE 802.11IEEE 802.11
IEEE 802.11
 
Mobile Transport layer
Mobile Transport layerMobile Transport layer
Mobile Transport layer
 
Issues in routing protocol
Issues in routing protocolIssues in routing protocol
Issues in routing protocol
 
Classification of routing protocols
Classification of routing protocolsClassification of routing protocols
Classification of routing protocols
 
QOS (Quality of Services) - Computer Networks
 QOS (Quality of Services) - Computer Networks QOS (Quality of Services) - Computer Networks
QOS (Quality of Services) - Computer Networks
 
Mac protocols for ad hoc wireless networks
Mac protocols for ad hoc wireless networks Mac protocols for ad hoc wireless networks
Mac protocols for ad hoc wireless networks
 
Global state routing
Global state routingGlobal state routing
Global state routing
 
Mobile IP
Mobile IPMobile IP
Mobile IP
 
Lecture 11 14. Adhoc routing protocols cont..
Lecture 11 14. Adhoc  routing protocols cont..Lecture 11 14. Adhoc  routing protocols cont..
Lecture 11 14. Adhoc routing protocols cont..
 
ISSUES IN AD HOC WIRELESS NETWORKS
ISSUES IN  AD HOC WIRELESS  NETWORKS ISSUES IN  AD HOC WIRELESS  NETWORKS
ISSUES IN AD HOC WIRELESS NETWORKS
 
Leach protocol
Leach protocolLeach protocol
Leach protocol
 
Geographic Routing in WSN
Geographic Routing in WSNGeographic Routing in WSN
Geographic Routing in WSN
 
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
 
Zone Routing Protocol
Zone Routing ProtocolZone Routing Protocol
Zone Routing Protocol
 
Adhoc and Sensor Networks - Chapter 02
Adhoc and Sensor Networks - Chapter 02Adhoc and Sensor Networks - Chapter 02
Adhoc and Sensor Networks - Chapter 02
 
Mac protocols
Mac protocolsMac protocols
Mac protocols
 
Lecture 5 6 .ad hoc network
Lecture 5 6 .ad hoc networkLecture 5 6 .ad hoc network
Lecture 5 6 .ad hoc network
 
Adhoc wireless
Adhoc wirelessAdhoc wireless
Adhoc wireless
 

Similar to Fisheye State Routing (FSR) - Protocol Overview

introAdhocRoutingRoutingRoutingRouting-new.ppt
introAdhocRoutingRoutingRoutingRouting-new.pptintroAdhocRoutingRoutingRoutingRouting-new.ppt
introAdhocRoutingRoutingRoutingRouting-new.pptDEEPAK948083
 
CS6003 AD HOC AND SENSOR NETWORKS
CS6003 AD HOC AND SENSOR NETWORKSCS6003 AD HOC AND SENSOR NETWORKS
CS6003 AD HOC AND SENSOR NETWORKSKathirvel Ayyaswamy
 
Lecture 9 10 .mobile ad-hoc routing protocols
Lecture 9 10 .mobile ad-hoc routing protocolsLecture 9 10 .mobile ad-hoc routing protocols
Lecture 9 10 .mobile ad-hoc routing protocolsChandra Meena
 
Opportunistic Data Forwarding in Manet
Opportunistic Data Forwarding in ManetOpportunistic Data Forwarding in Manet
Opportunistic Data Forwarding in ManetIJTET Journal
 
Module 3: Routing Protocols and Transport Layer in Ad-hoc Networks
Module 3: Routing Protocols and Transport Layer in Ad-hoc Networks Module 3: Routing Protocols and Transport Layer in Ad-hoc Networks
Module 3: Routing Protocols and Transport Layer in Ad-hoc Networks Sitamarhi Institute of Technology
 
Unit VIII wireless sensor networks
Unit VIII wireless sensor networksUnit VIII wireless sensor networks
Unit VIII wireless sensor networkssangusajjan
 
Wireless sensor network
Wireless sensor networkWireless sensor network
Wireless sensor networkJamia Hamdard
 
Routing protocols-network-layer
Routing protocols-network-layerRouting protocols-network-layer
Routing protocols-network-layerNitesh Singh
 
Powerpoint presentation on wireless communication
Powerpoint presentation on wireless communicationPowerpoint presentation on wireless communication
Powerpoint presentation on wireless communicationmanish kumar
 
Cluster based routing protocol
Cluster based routing protocolCluster based routing protocol
Cluster based routing protocolSudhansu Dash
 
BASICS OF ROUTING IN NETWORKS
BASICS OF ROUTING IN NETWORKSBASICS OF ROUTING IN NETWORKS
BASICS OF ROUTING IN NETWORKSKABILESH RAMAR
 
MPLS Deployment Chapter 1 - Basic
MPLS Deployment Chapter 1 - BasicMPLS Deployment Chapter 1 - Basic
MPLS Deployment Chapter 1 - BasicEricsson
 
Experimental Analysis Of On Demand Routing Protocol
Experimental Analysis Of On Demand Routing ProtocolExperimental Analysis Of On Demand Routing Protocol
Experimental Analysis Of On Demand Routing Protocolsmita gupta
 

Similar to Fisheye State Routing (FSR) - Protocol Overview (20)

Routing Techniques
Routing TechniquesRouting Techniques
Routing Techniques
 
introAdhocRoutingRoutingRoutingRouting-new.ppt
introAdhocRoutingRoutingRoutingRouting-new.pptintroAdhocRoutingRoutingRoutingRouting-new.ppt
introAdhocRoutingRoutingRoutingRouting-new.ppt
 
CS6003 AD HOC AND SENSOR NETWORKS
CS6003 AD HOC AND SENSOR NETWORKSCS6003 AD HOC AND SENSOR NETWORKS
CS6003 AD HOC AND SENSOR NETWORKS
 
Lecture 9 10 .mobile ad-hoc routing protocols
Lecture 9 10 .mobile ad-hoc routing protocolsLecture 9 10 .mobile ad-hoc routing protocols
Lecture 9 10 .mobile ad-hoc routing protocols
 
Md3421762181
Md3421762181Md3421762181
Md3421762181
 
Opportunistic Data Forwarding in Manet
Opportunistic Data Forwarding in ManetOpportunistic Data Forwarding in Manet
Opportunistic Data Forwarding in Manet
 
Module 3: Routing Protocols and Transport Layer in Ad-hoc Networks
Module 3: Routing Protocols and Transport Layer in Ad-hoc Networks Module 3: Routing Protocols and Transport Layer in Ad-hoc Networks
Module 3: Routing Protocols and Transport Layer in Ad-hoc Networks
 
Routing protocols
Routing protocolsRouting protocols
Routing protocols
 
Vanet routing
Vanet routingVanet routing
Vanet routing
 
Unit VIII wireless sensor networks
Unit VIII wireless sensor networksUnit VIII wireless sensor networks
Unit VIII wireless sensor networks
 
It6601 mobile computing unit 4
It6601 mobile computing unit 4It6601 mobile computing unit 4
It6601 mobile computing unit 4
 
Wireless sensor network
Wireless sensor networkWireless sensor network
Wireless sensor network
 
Routing protocols-network-layer
Routing protocols-network-layerRouting protocols-network-layer
Routing protocols-network-layer
 
Unit8 tgb
Unit8 tgbUnit8 tgb
Unit8 tgb
 
Powerpoint presentation on wireless communication
Powerpoint presentation on wireless communicationPowerpoint presentation on wireless communication
Powerpoint presentation on wireless communication
 
Cluster based routing protocol
Cluster based routing protocolCluster based routing protocol
Cluster based routing protocol
 
BASICS OF ROUTING IN NETWORKS
BASICS OF ROUTING IN NETWORKSBASICS OF ROUTING IN NETWORKS
BASICS OF ROUTING IN NETWORKS
 
MPLS Deployment Chapter 1 - Basic
MPLS Deployment Chapter 1 - BasicMPLS Deployment Chapter 1 - Basic
MPLS Deployment Chapter 1 - Basic
 
UNIT-3 Adhoc.pptx
UNIT-3 Adhoc.pptxUNIT-3 Adhoc.pptx
UNIT-3 Adhoc.pptx
 
Experimental Analysis Of On Demand Routing Protocol
Experimental Analysis Of On Demand Routing ProtocolExperimental Analysis Of On Demand Routing Protocol
Experimental Analysis Of On Demand Routing Protocol
 

More from Yoav Francis

Marxism in the internet age and social networks
Marxism in the internet age and social networksMarxism in the internet age and social networks
Marxism in the internet age and social networksYoav Francis
 
1953 and all that. A tale of two sciences (Kitcher, 1984)
1953 and all that. A tale of two sciences (Kitcher, 1984)1953 and all that. A tale of two sciences (Kitcher, 1984)
1953 and all that. A tale of two sciences (Kitcher, 1984)Yoav Francis
 
States of Mind: can they be communicated and compared?
States of Mind: can they be communicated and compared?States of Mind: can they be communicated and compared?
States of Mind: can they be communicated and compared?Yoav Francis
 
Carnivores: Inspection under Philosophy of Action
Carnivores: Inspection under Philosophy of ActionCarnivores: Inspection under Philosophy of Action
Carnivores: Inspection under Philosophy of ActionYoav Francis
 
From Hierarchical to a One-Level view of Consciousness: Overview and Comparison
From Hierarchical to a One-Level view of Consciousness: Overview and ComparisonFrom Hierarchical to a One-Level view of Consciousness: Overview and Comparison
From Hierarchical to a One-Level view of Consciousness: Overview and ComparisonYoav Francis
 
Theories of Consciousness - Overview and Discussion
Theories of Consciousness - Overview and DiscussionTheories of Consciousness - Overview and Discussion
Theories of Consciousness - Overview and DiscussionYoav Francis
 
McTaggart's Argument on the Unreality of Time - Overview and Discussion
McTaggart's Argument on the Unreality of Time - Overview and DiscussionMcTaggart's Argument on the Unreality of Time - Overview and Discussion
McTaggart's Argument on the Unreality of Time - Overview and DiscussionYoav Francis
 
Epicurean Physics: on the Existence of Minimal Units
Epicurean Physics: on the Existence of Minimal UnitsEpicurean Physics: on the Existence of Minimal Units
Epicurean Physics: on the Existence of Minimal UnitsYoav Francis
 
Isaiah Berlin: Positive and Negative Freedom
Isaiah Berlin: Positive and Negative FreedomIsaiah Berlin: Positive and Negative Freedom
Isaiah Berlin: Positive and Negative FreedomYoav Francis
 
"A Single Man": Choosing Life in a Nietzschean Context
"A Single Man": Choosing Life in a Nietzschean Context"A Single Man": Choosing Life in a Nietzschean Context
"A Single Man": Choosing Life in a Nietzschean ContextYoav Francis
 
General Solution for Josephus Problem
General Solution for Josephus ProblemGeneral Solution for Josephus Problem
General Solution for Josephus ProblemYoav Francis
 
Durkheim, Weber and Comte: Comparative Analysis and Analysis
Durkheim, Weber and Comte: Comparative Analysis and AnalysisDurkheim, Weber and Comte: Comparative Analysis and Analysis
Durkheim, Weber and Comte: Comparative Analysis and AnalysisYoav Francis
 
Wii Sensor Bar Positioning in 3D Space
Wii Sensor Bar Positioning in 3D SpaceWii Sensor Bar Positioning in 3D Space
Wii Sensor Bar Positioning in 3D SpaceYoav Francis
 
NLP Literature Survey with focus on Computerized Deception Detection
NLP Literature Survey with focus on Computerized Deception DetectionNLP Literature Survey with focus on Computerized Deception Detection
NLP Literature Survey with focus on Computerized Deception DetectionYoav Francis
 
CAP Theorem - Theory, Implications and Practices
CAP Theorem - Theory, Implications and PracticesCAP Theorem - Theory, Implications and Practices
CAP Theorem - Theory, Implications and PracticesYoav Francis
 
Cloud Caching Proxy+ - Scalable Cloud-Based Proxy Server
Cloud Caching Proxy+ - Scalable Cloud-Based Proxy ServerCloud Caching Proxy+ - Scalable Cloud-Based Proxy Server
Cloud Caching Proxy+ - Scalable Cloud-Based Proxy ServerYoav Francis
 
Floodlight OpenFlow DDoS
Floodlight OpenFlow DDoSFloodlight OpenFlow DDoS
Floodlight OpenFlow DDoSYoav Francis
 

More from Yoav Francis (17)

Marxism in the internet age and social networks
Marxism in the internet age and social networksMarxism in the internet age and social networks
Marxism in the internet age and social networks
 
1953 and all that. A tale of two sciences (Kitcher, 1984)
1953 and all that. A tale of two sciences (Kitcher, 1984)1953 and all that. A tale of two sciences (Kitcher, 1984)
1953 and all that. A tale of two sciences (Kitcher, 1984)
 
States of Mind: can they be communicated and compared?
States of Mind: can they be communicated and compared?States of Mind: can they be communicated and compared?
States of Mind: can they be communicated and compared?
 
Carnivores: Inspection under Philosophy of Action
Carnivores: Inspection under Philosophy of ActionCarnivores: Inspection under Philosophy of Action
Carnivores: Inspection under Philosophy of Action
 
From Hierarchical to a One-Level view of Consciousness: Overview and Comparison
From Hierarchical to a One-Level view of Consciousness: Overview and ComparisonFrom Hierarchical to a One-Level view of Consciousness: Overview and Comparison
From Hierarchical to a One-Level view of Consciousness: Overview and Comparison
 
Theories of Consciousness - Overview and Discussion
Theories of Consciousness - Overview and DiscussionTheories of Consciousness - Overview and Discussion
Theories of Consciousness - Overview and Discussion
 
McTaggart's Argument on the Unreality of Time - Overview and Discussion
McTaggart's Argument on the Unreality of Time - Overview and DiscussionMcTaggart's Argument on the Unreality of Time - Overview and Discussion
McTaggart's Argument on the Unreality of Time - Overview and Discussion
 
Epicurean Physics: on the Existence of Minimal Units
Epicurean Physics: on the Existence of Minimal UnitsEpicurean Physics: on the Existence of Minimal Units
Epicurean Physics: on the Existence of Minimal Units
 
Isaiah Berlin: Positive and Negative Freedom
Isaiah Berlin: Positive and Negative FreedomIsaiah Berlin: Positive and Negative Freedom
Isaiah Berlin: Positive and Negative Freedom
 
"A Single Man": Choosing Life in a Nietzschean Context
"A Single Man": Choosing Life in a Nietzschean Context"A Single Man": Choosing Life in a Nietzschean Context
"A Single Man": Choosing Life in a Nietzschean Context
 
General Solution for Josephus Problem
General Solution for Josephus ProblemGeneral Solution for Josephus Problem
General Solution for Josephus Problem
 
Durkheim, Weber and Comte: Comparative Analysis and Analysis
Durkheim, Weber and Comte: Comparative Analysis and AnalysisDurkheim, Weber and Comte: Comparative Analysis and Analysis
Durkheim, Weber and Comte: Comparative Analysis and Analysis
 
Wii Sensor Bar Positioning in 3D Space
Wii Sensor Bar Positioning in 3D SpaceWii Sensor Bar Positioning in 3D Space
Wii Sensor Bar Positioning in 3D Space
 
NLP Literature Survey with focus on Computerized Deception Detection
NLP Literature Survey with focus on Computerized Deception DetectionNLP Literature Survey with focus on Computerized Deception Detection
NLP Literature Survey with focus on Computerized Deception Detection
 
CAP Theorem - Theory, Implications and Practices
CAP Theorem - Theory, Implications and PracticesCAP Theorem - Theory, Implications and Practices
CAP Theorem - Theory, Implications and Practices
 
Cloud Caching Proxy+ - Scalable Cloud-Based Proxy Server
Cloud Caching Proxy+ - Scalable Cloud-Based Proxy ServerCloud Caching Proxy+ - Scalable Cloud-Based Proxy Server
Cloud Caching Proxy+ - Scalable Cloud-Based Proxy Server
 
Floodlight OpenFlow DDoS
Floodlight OpenFlow DDoSFloodlight OpenFlow DDoS
Floodlight OpenFlow DDoS
 

Recently uploaded

Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 

Recently uploaded (20)

Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 

Fisheye State Routing (FSR) - Protocol Overview

  • 1. Fisheye State Routing Protocol Overview By: Nir Solomon Yoav Francis Interdisciplinary Center, Herzliya
  • 2. Ad-Hoc Network A wireless network between mobile nodes No infrastructure Limited communication distance Low-powered users How to route messages? Flooding/Broadcast Not scalable Using the shortest path from source to destination Requires nodes to keep topology data
  • 3. Ad-Hoc Network (cont.) Node moves cause network topology changes Results in routes change Nodes need to update their topology information A node disconnecting to or from a neighbor needs to notify other nodes There are many upates – must make update process efficient Low overhead Fast propagation
  • 4. Ad-Hoc Routing algorithms  Proactive:  Always monitor network topology  Advantage: Always know how to route to any node  Disadvantages: Routing table storage Periodic control traffic overhead  Example protocols: LSR, FSR  Reactive:  Look for a route only when need to send a packet  Advantages: Low routing table storage No periodic control traffic  Disadvantage: route search overhead  Example protocols: TORA, DSR
  • 5. Link State Routing Each node holds a routing table with the link state of all nodes in the network Periodically or on link change: flood “link state” – list of neighbors (neighbor = 1 hop) Re-broadcasts link state information received from neighbors Use timestamp to distinguish new from stale updates Routing The destination is stored in the message header Each forwarding node finds the shortest path to the destination according to its routing table  On each update of the topology map – each node must calculate the shortest path to all other nodes again.
  • 6. Link State Routing drawbacks As the number of nodes grow or mobility increases: Routing tables grow linearly Link state overhead grow linearly – the overhead packets will consume most of the bandwidth as network size increases. Not scalable
  • 7. • Fish do have 360° (or almost) vision. • Fishes (and humans) do have a higher concentration of optic nerves close to they focal point than elsewhere in they eye. • As a result fisheye captures with high detail the points near the focal point Fisheye Vision
  • 9. Published in “Fisheye State Routing in Mobile Ad Hoc Networks” in 2000, by Guangyu Pei , Mario Gerla , Tsu-Wei Chen at ICDCS. Aim – Reduce routing updates overhead in large ad-hoc networks. Background
  • 10. Fisheye State Routing (FSR) • Proactive link-state routing protocol. • Similar to link state as it maintains a full topology map at each node – Periodic exchange of Hello packet. – Periodic exchange of topology tables within the local neighbors only (instead of flooding the entire network) . • Topology tables update frequency decreases with distance to destination – Updates for a near destination are propagated more frequently then updates for a remote destination
  • 11. Fisheye State Routing (Cont.) Every node holds:  Neighbor list  Topology Table  Next Hop Table  Distance Table For large network, in order to reduce the size of the routing update message, the FSR technique uses different exchange periods for different entries in the routing table. Relative to each node, the network is divided into different scopes.
  • 12. Fisheye State Routing (Cont.) Central Node 1-hop neighbor 2-hops or more neighbor The link state updates of the nodes in scope k are sent every 2k-1 T to all the neighboring nodes •K is the hop distance •T is the link state updates transmission period Scope 1 Scope 2
  • 13. Fisheye State Routing (Cont.)  Maintain accurate routing information for immediate neighbors.  Progressively less detail as distance increases.  Link state of immediate neighbors are exchanged more frequently.  The exchange frequency decreases proportionally to the distance.  As the packet gets closer to the destination, the accuracy increases.
  • 14. Fisheye State Routing 0 5 1 2 4 3 0:{1} 1:{0,2,3} 2:{5,1,4} 3:{1,4} 4:{5,2,3} 5:{2,4} 1 0 1 1 2 2 LST HOP 0:{1} 1:{0,2,3} 2:{5,1,4} 3:{1,4} 4:{5,2,3} 5:{2,4} 2 1 2 0 1 2 LST HOP 0:{1} 1:{0,2,3} 2:{5,1,4} 3:{1,4} 4:{5,2,3} 5:{2,4} 2 2 1 1 0 1 LST HOP Entries in black are exchanged more frequently
  • 16. FSR – Conclusions  Major scalability benefit: link state overhead decreases significantly  Unsolved problems: Route table size still grows linearly with network size Out of date routes to remote destinations

Editor's Notes

  1. גם node שעוזב את הרשת וכו '
  2. Proactive – always know network topology, always know network topology and best send method Requires storage at every node for the routing table, a lot of overhead of update packets – more than data itsself. Reactive (on demend)– do the search for route only when need to find a route. Storage is small, no need to hold topology, less overhead. Route search time is long.
  3. Link state = Network Topology (“State of the link”) Distance Vector = Only hold the next hop for each node and the cost (hop distance), not entire/partial network topology. Like a router. Distance – as in number of hops Problem : we may take a “worse” route that indeed has less hops but takes longer than passing through multi-hop route.
  4. 2 From UCLA, one from Bell Labs. ICDCS = I nternational Workshop on Wireless Networks and Mobile Computing
  5. We only transfer to our close neighbors, every x time. What shall we pass ? Which nodes are in the update ? - as the distance from our node increases, we will update the information regarding those nodes in less frequency than closer ones. - this will cause the update packets size to be smaller + less update packets will be sent (we will only send update packets every x-time) - בעצם , נשלח חלקים מן המידע ולא את כל הטבלה , בהתאם למרחק מן הצומת
  6. Neighbor list – all nodes in distance of one hop Topology table – the “link state” (neighbor list) – I save at my node the list of the nodes that every node sees Next hop table / distance table – tables that are computed with shortest path (dijkstra) – each time an update occurs, an algorithm runs that finds the shortest path from our node to every node that was contained in the update. Change exchange periods – in every update packet we send, we choose which nodes to put in our update packet – depending on the frequency and nodes the distance (so, close nodes will be sent an update every x time, far nodes will be sent an update every 2x time, etc.)
  7. Central Node = working node (my node) I update ONLY the green nodes. What will be contained in the update – this is something else. תלוי מימוש – T הוא לבחירת המממש וכן זה לא חייב להיות 2 , וגם אפשר להגיד שעד מרחק 5 אני גם מעדכן כל 2T למשל.
  8. (בציור) הלבנים – הם באותו scope כי בשניהם המרחק גדול מ- 2 . ככל שצמתים מתרחקים – המידע שיש לנו עליהם הוא פחות עדכני – יכול להיות שבטרם קיבלנו עדכון הטופולוגיה השתנתה, node עזב, התרחק וכו'. תדירות העדכון היא ביחס הפוך למרחק. ככל שהפקטה מתקרבת ליעד, ה- Routing הופך ליותר מדויק (כי כל node יודע במדויק את ה- routing אל ה- nodes הקרובים)
  9. Node אפס רואה את 1 , ויש לו הופ 1 אליו – זה מה שבעצם רואים בטבלה. הטבלה של כל node מחזיקה את כל הטופולוגיה. ( LST הוא טבלת הטופולוגיה)
  10. סימולציה מן המאמר – מראה שה- overhead אם יש רק סקופ 1 – link state רגיל. ככל שמס' ה- nodes גדלים , מקטינים את ה- accuracy מעט אך יורד ה- overhead – בעצם בציור רואים שככל שמגדילים את ה- scopes (בהינתן אותו מספר' nodes ) – התקורה הכוללת במערכת הולכת וקטנה, כמובן על חשבון accuracy .
  11. LINK STATE = טופולוגית הרשת גודל טבלת ה- route – לא scalable מבחינת הסטורג' (כי הוא מכיר את כל ה- nodes ושומר אותם. כאשר יש המון nodes מדובר לשמור את כל הקשרים וכל ה- nodes - הרבה storage )