US20050286464A1 - Routing method for mobile infrastructureless network - Google Patents

Routing method for mobile infrastructureless network Download PDF

Info

Publication number
US20050286464A1
US20050286464A1 US11/170,691 US17069105A US2005286464A1 US 20050286464 A1 US20050286464 A1 US 20050286464A1 US 17069105 A US17069105 A US 17069105A US 2005286464 A1 US2005286464 A1 US 2005286464A1
Authority
US
United States
Prior art keywords
nodes
node
path
routing
weights
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US11/170,691
Inventor
Tarek Saadawi
Osama Hussein
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Research Foundation of City University of New York
Original Assignee
Research Foundation of City University of New York
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Research Foundation of City University of New York filed Critical Research Foundation of City University of New York
Priority to US11/170,691 priority Critical patent/US20050286464A1/en
Publication of US20050286464A1 publication Critical patent/US20050286464A1/en
Assigned to THE RESEARCH FOUNDATION OF THE CITY UNIVERSITY OF NEW YORK reassignment THE RESEARCH FOUNDATION OF THE CITY UNIVERSITY OF NEW YORK ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: HUSSEIN, OSAMA, SAADAWI, TAREK
Abandoned legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/02Topology update or discovery
    • H04L45/08Learning-based routing, e.g. using neural networks or artificial intelligence

Definitions

  • the present invention relates to a novel routing method specifically adapted for use with ad-hoc mobile wireless networks and, more particularly, to a routing method where communications between sources and destination mobile hosts are carried out using a probability based routing algorithm.
  • MANETs Mobile Ad-hoc Networks
  • MANETs infrastructureless networks
  • Nodes in MANETs can be mobile or fixed routers and can be connected by wired or wireless links using one or more different technologies. These Nodes function as routers by discovering and maintaining routes to other Nodes in the network.
  • infrastructured networks in MANETs there is no need for centralized infrastructures, such as base stations of pre-configured routers (i.e., network elements). This distributed characteristic allows the system to be more durable and more scalable.
  • MANETs are often fast, self-built, self-configured, and adaptive to dynamic changes. MANETs are useful in a large number of applications, making them particularly useful when there is no network infrastructure or such infrastructure has been destroyed. It is clear that MANETs will play a very important role in the continued development of the computing and telecommunication market.
  • MANETs have several characteristics. These networks have highly dynamic topology. Most of the MANETs Nodes are mobile Nodes. These Nodes move rapidly and freely. Because of this mobility, the network topology changes rapidly and unpredictably. As opposed to fixed links, MANET links, which are wireless links, have limited and variable bandwidth, higher power consumption, limited energy and higher bit error rate. In addition, these links might be bi-directional or unidirectional. A large number of the Nodes in MANETs are mobile, and most of them depend on their batteries' energy, which is limited. Hence, energy conservation and fair distribution of energy usage should be taken into consideration.
  • the goal of the routing algorithm is to build routes from the sources to the destinations to be used by the data. These routes should maximize network performance.
  • the goal of the routing algorithm should be achieved, while taking into consideration the special network characteristics.
  • the routing algorithm should deal with the rapid changes in the network and it should optimize more than one parameter of the quality of service parameters (QOS) in the network, such as Node energy, link bandwidth, end to end delay, queuing delay, number of hops, links' signal to noise ratio, error rate, etc.
  • QOS quality of service parameters
  • the second group is called source initiated on demand routing algorithms (such as AODV, DSR, TORA, ABR, SSR, etc.). Most algorithms of this class depend on flooding to find the route from sources to destinations, which increase the routing overheads. See Elizabeth Royer and C-K Toh, “A Review of Current Routing Protocols for Ad-Hoc Mobile Wireless Networks”, IEEE Personal Communications Magazine, April 1999, pp. 46-55, P. Misra, “Routing Protocols for Ad Hoc Mobile Wireless Networks”, (adhoc_routing.pdf). [Online]. Available: http://www.cis.ohio-state.edu/ ⁇ jain/cis788-99/adhoc_routing/index.html, and Charles E. Perkins and Elizabeth Royer “Ad-hoc On-Demand Distance Vector Routing.”, Proceedings of the 2 nd IEEE Workshop on Mobile Computing Systems and Applications, New Orleans, La., February 1999, pp. 90-100.
  • the present invention provides a means of forwarding information in mobile ad hoc network from a source Node (S) to a destination Node (D) using at least one, and more than likely numerous, intermediate Nodes (I).
  • Nodes in the network are capable of changing their geographic position with respect to each other at any given time.
  • the present invention thus, provides a communication system with enhanced efficiency in a MANET environment which includes a means to select in real time the optimal route (path) for communication.
  • the parameters are included in forward control packets, which is then used to evaluate the relative “weights” of the I Nodes, for the purpose of selecting a Node, which would be the best next choice in the attempt to determine the best routing path.
  • a change of the weights of a particular Node are assigned using the parameters through an evaluation process and changed or modified through an updating sequence as information is learned about a particular Node. For example, if information regarding the battery life of a particular Node is determined to be low, the weight of that particular Node will be modified as being a less desirable route, and this information will be brought to and stored in Nodes via the control packets. Thus, until the weight of that Node is updated to make it again a desirable route, other more desirable Nodes will be chosen.
  • the assignment of weighted parameters permits that ability to select a “best route” choice at any given time, since the parameters in the MANET are likely to be dynamically changing. Thus, the weights change accordingly as information about Nodes is evaluated and communicated to their neighbor Nodes.
  • the message information desired to be communicated by the sender is sent from the S Node to the D Node after the best route via I Nodes is determined. In another embodiment, the message information desired to be communicated by the sender is sent from the S Node to the D Node via I Nodes simultaneously with the control packet, as the best routing path is being determined.
  • the searching for routing path is biased by randomly sending trail control packets from the D Node via I Nodes to the S Node, thereby providing allowing for the collection of and evaluation of parameter data, such that updating of the weights of Nodes in the various pathways can occur in advance.
  • the present invention overcomes the drawbacks of the previous routing algorithms by providing a probability based routing algorithm to address the MANETs routing problems and achieve good network performance.
  • a method for selecting a routing path in an ad-hoc mobile wireless network having a plurality of Nodes including multiple sources and destinations including, sending from a source at least one forward control packet via at least one I Node to one or more destinations at intervals of time, wherein said I Node is randomly selected and each of the I Nodes storing weights for each of its neighbor Nodes, evaluating each of said forward control packets at said destinations in accordance with one or more given parameters, sending from the destination backward control packets storing evaluation results which correspond to each of the forward control packets, through the same I Nodes originally traveled by the forward control packets to the source, receiving the backward control packets at the I Nodes, modifying the weights of each of said neighbor Nodes at each of the I Nodes based on the evaluation results stored in the backward control packets, receiving said backward control packets at said S Nodes, modifying the weights of each of said neighbor Nodes at the S Node based on the evaluation results stored in the
  • a method for sending data in an ad-hoc mobile wireless network having a plurality of Nodes including multiple sources and destinations including, sending from a source at least one forward control packet storing the data to be routed, via at least one I Node to one or more destinations at intervals of time, wherein said I Node is randomly selected and each of the I Nodes storing weights for each of its neighbor Nodes, evaluating each of said forward control packets at said destinations in accordance with one or more given parameters, sending from the destination backward control packets storing evaluation results which correspond to each of the forward control packets, through the same I Nodes originally traveled by the forward control packets to the source, receiving the backward control packets at the I Nodes, modifying the weights of each of said neighbor Nodes at each of the I Nodes based on the evaluation results stored in the backward control packets, receiving said backward control packets at said S Nodes, modifying the weights of each of said neighbor Nodes at the S Node
  • a method for sending data in an ad-hoc mobile wireless network having a plurality of Nodes including multiple sources and destinations including, sending from a source at least one forward control packet storing the data to be sent, via at least one I Node to one or more destinations at intervals of time, wherein said I Node is randomly selected and each of the I Nodes storing weights for each of its neighbor Nodes, evaluating each of said forward control packets at said destinations in accordance with one or more given parameters, sending from the destination backward control packets storing evaluation results which correspond to each of the forward control packets through the same I Nodes originally traveled by the forward control packets to the source, receiving the backward control packets at the I Nodes, modifying the weight of each of said neighbor Nodes at each of the I Nodes based on the evaluation results stored in the backward control packets, receiving said backward control packets at said S Nodes, and modifying the weights of each of said neighbor Nodes at the S Node based
  • a method for biasing a routing process in an ad-hoc mobile wireless network having a plurality of Nodes including multiple sources and destinations including, sending from a destination at least one trail control packet via at least one I Node at intervals of time, wherein said I Node is randomly selected and each of the I Nodes storing weights for each of its neighbor Nodes, receiving the trail control packets at the I Nodes, and modifying the weights of each of the neighbor Nodes at each of the I Nodes immediately upon receipt of the trail control packets at the I Nodes.
  • FIG. 1 is a schematic illustration of an ad-hoc mobile wireless network comprised of a plurality of Nodes which communicate with one another utilizing a probability based routing algorithm that includes a first preferred embodiment of the present invention.
  • FIG. 2 is a flow chart describing Nodes' functions in the embodiment of the present invention.
  • FIG. 3 is a flow chart describing functions of the intermediate and destination Nodes in reception of forward control packets and functions of the intermediate and source Nodes in reception of backward control packets and negative backward control packets in the embodiment of the present invention.
  • FIG. 4 is an illustration of various path links between Nodes from a source to a destination.
  • FIG. 5 shows a window mechanism of selecting the best control packet.
  • FIG. 6 shows a schematic elaboration of the function of the algorithm for mobile ad-hoc network.
  • FIG. 7 illustrates a network of Nodes finding the best path using the probability based routing algorithm.
  • FIG. 8 is a graphical representation of simulation results for various scenarios to obtain an optimal routing path.
  • FIG. 9 is a flow chart describing functions of the Source and Intermediate Nodes in reception of trail control packets.
  • a mobile ad-hoc network 10 that includes a plurality of conventional Nodes 12 labeled A, B, C, D, E, F, G, H, etc., each of which communicates over wireless channels and is free to move about arbitrarily.
  • Nodes 12 participating in such ad-hoc networks 10 may preferably be located in or on airplanes, ships, trucks, cars, perhaps even on people or very small devices, and there may be multiple hosts per router. Such devices include laptops, cell phones, PDAs and other various wireless transmitting and receiving devices.
  • Nodes 10 are equipped with wireless transmitters and receivers using antennas which may be omnidirectional (broadcast), highly-directional (point-to-point), possibly steerable, or some combination thereof.
  • antennas which may be omnidirectional (broadcast), highly-directional (point-to-point), possibly steerable, or some combination thereof.
  • a wireless connectivity in the form of a random, multihop graph or “ad-hoc” network exists between the Nodes. This ad-hoc topology may change with time as the Nodes move or adjust their transmission and reception parameters.
  • Every Node 12 in the network 10 can function as a S Node, such as, A, B, C, E, F, G . . . , which desirably transmits message information across the network 10 , a D Node, which is the intended recipient of the information, and the I Nodes, which are configurable to relay the routing information and the message information between the S Node and the D Node.
  • Routing information relates to finding a path (route) between an S Node and a D Node and message information includes the data transmitted from the S Node to a D Node, such data including voice or speech, text, image, etc.
  • the direction from the S Node to the D Node will be referred to as forward and the direction from the D Node to the S Node as backward.
  • the forward direction is to a randomly selected Node visited for the first time by an FCP.
  • the backward direction is to a Node previously visited by an FCP.
  • FIG. 2 shows a flow chart describing Nodes' functions utilizing the PBRA of the present invention.
  • an S Node In order to select a path to a D Node, an S Node generates FCPs and sends them randomly searching for this D Node at step 202 .
  • the rate of generation of the FCP is generally a function of network dynamics, data rate, time and the required ability to quickly respond to changes in the network.
  • the FCPs are sent from the S Node to the D Nodes via I Nodes.
  • Each I Node stores weights of its neighbors' Nodes. The values of weights affect the selection of the next Node to which the FCP travels.
  • the I Nodes are randomly selected using PRTs as described herein.
  • PRTs located at each Node have values calculated using the weight table and local information of the Node.
  • the local information includes energy of the Nodes, bandwidth between the Nodes, signal to noise ratio between the Nodes, predicted delay between Nodes, estimated queuing delays, error rate of the packet transmission, power consumption of the links between Nodes, and combinations thereof.
  • the FCP moves in the network searching for the D Node, it uses the I Nodes' PRTs to determine which Node to visit next, as noted in step 204 .
  • This value can represent the neighbor Node's information such as the neighbor Node's queue delay, remaining battery energy, link's signal to noise ratio, bit error rate, etc.
  • Fun( ⁇ D,I,J, ⁇ I,J ) is a function of ⁇ D,I,J (the weight value of J Node at I Node corresponding to the destination D, here we will call it the weight on link (I,J)) and ⁇ I,J (the local heuristic information for link (I,J).
  • N I is the set of all feasibly neighbor Nodes defined by the FCP's information and the routing constraints such as the guarantee of being free of loops.
  • w 1 , w 2 are the multipliers of the neighbor Node's weight and the neighbor Node's local information respectively.
  • the I Node inserts its identification “F” in the FCP and it adds and/or modifies the FCP measured information, such as values of the parameters mentioned above.
  • the FCP Every time the FCP reaches an I Node, it collects the identity information and the measured information of that I Node.
  • the measured information is the values of parameters.
  • Parameters include local information and additionally include the global information of the Nodes from S Node to D Node.
  • Parameters are predetermined characteristics or units of measures of the Nodes, which are measured to determine the weights of a Node, including the local information and global information of the Nodes from the S Node to a D Node. Parameters are measured and constantly evaluated and assigned weight values for each Node.
  • the S Node can begin to start sending sender's intended message information to the D Node by using the best route selected from the routing information received from the BCP.
  • FCPs and BCPs can be sent using a priority queue to minimize any loss or delay of network information due to congestion. Functions of each type of Node and the process will be described in more detail below.
  • the response of the Nodes 12 when receiving a FCP depends on whether this Node is a D Node, an I Node or a S Node. Both I and S Nodes respond to the FCPs in the same way, by forwarding the FCP to a next neighbor selected randomly by the PRT.
  • the flowchart in FIG. 3 a shows detailed functions of the I Nodes and the D Nodes when receiving FCPs. Beginning with step 300 , an FCP is generated and sent from the S Node to the network of Nodes. At step 301 , an FCP is received at a Node, where a determination is made, 302 , as to whether the Node is a D Node.
  • the FCP's identity and measured information is collected at the D Node as noted in step 311 .
  • each of the FCPs measured information is evaluated in accordance with one or more parameters, by comparing the measured information to a reference value of the parameters.
  • the reference value can preferably be constant or can be dynamic and dependent on the measured information received from the FCPs.
  • the FCP is destroyed and a BCP is generated at the D Node as noted at step 314 .
  • These BCPs store evaluation results corresponding to each of the FCPs.
  • the identity of the FCPs and the evaluation results of the measured information is stored in corresponding the BCPs.
  • step 316 the BCPs are sent back from the D Nodes to the S Nodes through the same I Nodes originally traveled by the FCPs to the S Node.
  • the role played by the BCP is referred to in FIG. 3 c as described below.
  • a BCP is received at a Node.
  • this Node is an S Node. If it is not an S Node, then it is an I Node and the I Node collects the evaluation results from this BCP at step 319 .
  • This evaluation result will be used to modify the weight values of the neighbor Nodes at each of the I Nodes at step 320 and hence updating the weight table entry corresponding to the FCP's destination.
  • the weights of each of the neighbor Nodes of the I Nodes are modified based on the evaluation results stored in the BCPs.
  • modified weights correspond to the destination. In other words, they reflect the route to be chosen or maintained to reach the destination.
  • the BCP will then be sent to the next Node at step 321 in the reverse path of the FCP.
  • the BCP storing evaluation results follows the reverse path of its corresponding FCP visiting the same I Nodes originally visited by the FCPs to the source.
  • steps 317 and 318 will be repeated.
  • the S Node collects the evaluation results from the BCP at step 322 and modifies the weights of its neighbor Nodes, thereby updating its weight table at step 323 .
  • the BCP will be destroyed at step 324 at the S Node.
  • the S Node when the BCP is received at the S Node, the weights of each of the neighbor Nodes of the S Nodes are modified based on the evaluation results stored in the BCPs. Based on the weights of its neighbor Nodes, the S Node selects a group of routes to the destinations via the I Nodes. Out of the group of routes, one route will preferably be an optimal route which is subject to change based on the change in the weights of the neighbor Nodes. The S Node could send data packets to the D Nodes via the selected group of routes including the optimal routing path.
  • steps 303 to 310 are performed at each of the I Nodes visited.
  • the identity information and measured information of the visited I Nodes are added to the FCPs.
  • it is determined whether a signal is received at I i.e. whether the measured information of the FCP indicates any unwanted path constraints such as link failure, time to live reached, long route, loop detected, security alert, unidirectional links, etc.
  • step 305 the I Node's PRT and the local information are used to select a neighbor Node of the I Node, and the FCP is sent at step 307 to the neighbor Node selected at step 305 .
  • Steps 302 to step 307 are reiterated until the FCP reaches the D Node.
  • a NBCP is generated.
  • Step 306 verifies that the NBCP is generated. If the NBCP features is not enabled or generated, the FCP is destroyed at step 308 . Otherwise at step 309 , immediately upon receipt of the FCP at the I Node, the identity and measured information of the FCP is collected.
  • step 310 the signal indicating the unwanted path constraint is evaluated, and a NBCP storing evaluation results of the signal corresponding to the FCPs is sent back through the same I Node originally visited by the FCPs.
  • the details of the unwanted path constraints and the evaluation results of the signal will be discussed with reference to FIG. 4 , in detail later.
  • the role played by the NBCP is referred to in FIG. 3 d as discussed below.
  • FIG. 3 d there is shown a flow chart describing the S and I Nodes' function of receiving NBCPs sent at step 310 in FIG. 3 a.
  • an NBCP is received at a Node L
  • the I Node collects the evaluation results from the NBCP at step 330 . This evaluation result will be used to modify the weight values of the neighbor Nodes at each of the I Nodes at step 331 , hence updating the weight table entry corresponding to the FCP's D Node.
  • the weights of each of the neighbor Nodes of the I Nodes are modified based on the evaluation results stored in the NBCPs.
  • modified weights correspond to the D Node. In other words, they reflect the route to be chosen or maintained to reach the D Node. Since this I Node is encountered with NBCP, reflecting one or more unwanted path constraints, the weight value on the incoming link is decreased and the values on other links are increased using the weight updating function.
  • the NBCP will then be sent to the next Node at step 332 in the reverse path of the FCP. In other words, NBCP storing evaluation results follows the reverse path of its corresponding FCP visiting the same I Nodes originally visited by the FCP to the S Node. At this point, steps 325 and 326 will be repeated.
  • the S Node collects the evaluation results from the NBCP at step 327 and modifies the weights of its neighbor Nodes, thereby updating its weight table at step 328 . Finally, the NBCP will be destroyed at step 329 at the S Node.
  • BCPs deposit either positive or negative weight values. Under normal operation, BCPs deposit positive weight values, thus increasing the weight of the routing path.
  • a NBCP as discussed above, can be sent back to the S Node (similar to the “regular” BCP) when a signal received at I Node.
  • the NBCP has the same format of the BCP, except that its evaluation result value is negative.
  • the purpose of the NBCP is to help in excluding the unwanted constraints from the routing process or by accelerating the decay of weight values based on the evaluation result of the signal. Thus, the NBCP de-emphasizes this route, such that the probability of using this route by future FCPs will decrease.
  • signals of having unwanted path constraints such as link failure, long route, time to live reached, loop detected, security alert, unidirectional links, or combinations thereof preferably are received at an I Node.
  • a NBCP is generated at the I Node.
  • the NBCP storing the evaluation results of the signal is sent through the same route originally traveled by the I Nodes.
  • the NBCPs are received at the I Nodes, and the weights of each of their neighbor Nodes are modified at each of the I Nodes based on the evaluation results stored in the NBCPs.
  • the NBCPs are received at the S Nodes, and the weights of each of its neighbor Nodes are modified. Therefore, a NBCP has the same format of a regular BCP but with a negative evaluation result. NBCPs can be useful in overcoming some problems.
  • this FCP when a FCP's number of hops reaches its time to live (TTL) or experiences a loop, or any unwanted constraint, this FCP will be destroyed at this I Node and the I Node may send an NBCP.
  • This NBCP will follow the reverse route of the FCP and will decrease the weight amount of corresponding FCP's path links. Thus, the probability of using this route by future FCPs will decrease and this unwanted route will be excluded quickly.
  • Another example is when the I Node detects link failure or link degradation, and this link had the highest probability in the probability routing table, this Node will respond to the next received FCPs by sending NBCPs. The probability of using this link will therefore decrease, and the probability of exploring new routes will increase.
  • S is the Source and D is the Destination and the rest of the Nodes are intermediate/neighbor Nodes.
  • a NBCP will be sent.
  • the update corresponding to this NBCP will decrease the weight value on the links S-A, A-B, . . . J-K, K-L, L-M. If this decrease is high, the routing path S,A,B, . . . J will be quickly eliminated and the FCPs will switch to the routing path S,O,P, . . .
  • a NBCP is generated to decrease the weight value on the links S-A, A-B, . . . J.
  • the decrease should not be high to allow some FCPs to explore other routing path in the neighborhood.
  • FCPs may find the routing path S,A,B, . . . J,L,K,D.
  • the NBCPs with their negative evaluation results help to avoid the failed links or the loops and emphasize other neighboring links.
  • the window size is variable up to a maximum of W CPs.
  • the weight amounts on the links to the neighbors will be updated using this selected evaluation result ⁇ D,best . Only the BCPs with an evaluation result greater than or equal to the last best evaluation result will be used for updating. This prevents using bad evaluation results for upgrading. If all the BCPs' evaluation results were used for updating, these unwanted results would affect the response of the system by increasing the convergence time and making incorrect and frequent switching between solutions.
  • the use of unwanted evaluation results will slow the convergence. This can be shown in the first window of FIG. 5 .
  • link l 1 is part of the best path, the use of unwanted evaluation results from BCPs received from other links will decrease the weight value of link l 1 . This will increase the time that it takes for the weight value on the link l 1 to reach its highest value.
  • the system may switch to link l 3 in the first window.
  • the updating of weight is the modification of the values of the weight table.
  • the table entry corresponding to the destination, will be updated using the BCP's evaluation result.
  • two updating techniques are briefly disclosed. First is a generalized S-ACO meta-heuristic technique and second is the periodic evaporation technique.
  • ⁇ D,I,J is the weight amount on the link between Node I and Node J corresponded to the destination D.
  • the purpose of the evaporation function is to help the system forgetting the old information faster when the evaluation result ⁇ is increasing
  • FIG. 6 shows a schematic elaboration of how the algorithm works for mobile ad-hoc networks.
  • the S Node is willing to establish communications with the D Node.
  • the S Node will start sending FCPs as illustrated in FIG. 6 b. These FCPs will move randomly in the network, searching for the D Node. A number of these FCPs will find the D Node as shown in FIG. 6 c.
  • the D Node sends BCPs on the reverse route. The weight on these routing paths' links will be increased. These routing paths will have higher weight amounts than the entire network. These routing paths may not be the best routing paths.
  • Another Node (S 2 ) wants to find the same D Node as illustrated in FIG. 6 f, it sends FCPs. These CPs move randomly in the network. If these FCPs intersect with an existing route to the destination, it will follow the weight on this routing path to reach the D Node because the amount of weight is higher in this routing path direction. The BCP will update the weight on the I Nodes.
  • the FCPs generated from Node (S 2 ) are using the information in other Nodes' PRTs.
  • connection As a connection between S Node and D Node is used more, the connection will be closer to the optimum and more stable because more routing evaluation results are discovered.
  • the majority of the FCPs are following the highest routing evaluation results. These routing evaluation results are used by data packets and should be quickly maintained. A lower number of FCPs are free to explore other routing paths and unvisited routes.
  • the FCPs are sent using the already existing information in the I Nodes' PRT. This reduces the optimization time for a new routing path to be found and optimized. If a new routing path is required, the FCPs will find a near optimum solution and the optimization will start from a point closer to the optimum.
  • the PBRA starts working as on demand, the PBRA is dependent mainly on the random movements of the FCPs to find destinations, and the main effect of the FCPs is to find routing evaluation results to the D Node.
  • the PBRA will depend mainly on the information saved in the PRTs of the Nodes. Now the FCPs' main effect is updating the PRTs.
  • this network may respond as follows: if all the I Nodes starting from a point all their batteries remaining energy are equal, the two hop routing evaluation result has the minimum number of hops and it will be used. When the Nodes' battery energy in this routing path decreases and reaches some threshold, the three-hop routing evaluation result information will be better and the CPs and the message information will use this routing path. When its Nodes' batteries decrease, the CPs and the message information will switch to the four-hop routing path. When the Nodes' batteries in the four hop routing path decrease, the CPs and the message information will switch back to the two hops Node.
  • Node energy can be fair or the Nodes can be given different priority for energy usage.
  • Important Nodes such as data base servers, units used by high rank officers can report to the FCPs a lower battery energy than its actual value. If it reports low battery energy, the evaluation result of this routing evaluation result will be low, thus making it less desirable and increasing the lifetime of the Node.
  • the identity information and measured information is added to the FCPs.
  • XI As the Node gains a better parameter, the value XI become closer to unity.
  • XI can take discrete values located between zero and one or they can be continuous.
  • the threshold between two different steps of X I values can be controlled and it affects the switching speed between evaluation results.
  • X path be the path index for the FCP's path, which is a function of all the Nodes' information along the evaluation result.
  • X path can be the multiplication of all the Nodes' indices for all the Nodes in the path.
  • X path ⁇ I ⁇ X I Note ⁇ : ⁇ ⁇ 0 ⁇ X path ⁇ 1
  • the calculation of X path can be done in a distributed way in the I Nodes of the path.
  • the evaluation result information X path can be only one field in the FCP, which will be modified as the FCP moves between I Nodes.
  • the value X path gives a good indication for the number of hops. As the number of hops increases, the multiplication of X I s decreases.
  • X path is a good measure of the overall path information. Because of that X I s and X path values is smaller than unity, the value of X path is smaller than the smallest local normalized parameter (X I ) along the path.
  • the evaluation result of the FCP from the S Node to the D Node is calculated.
  • the evaluation results of the FCPs is done by comparing their measured information to a reference.
  • This reference could change dynamically according to network changes.
  • This reference can be the best X path received in the last window W.
  • the window mechanism works as following:
  • the value of (X path,best ⁇ X path ) indicates how far the received CP measured information is from the current best measured information determined so far.
  • X path is away from the X path,best , the evaluation result will be lower.
  • the PBRA will respond better to the network changes because the X path is compared to a dynamic reference X path,best , ⁇ controls the range of the evaluation result ⁇ D , as ⁇ increases the range of the evaluation result increases. ⁇ drifts the evaluation result ⁇ D away from the high values and keeps it under unity. Applying the PBRA on the network results in the best routing path's links having the highest weight amounts in the network.
  • the amount of weight on the best path should be significantly higher than other paths. Because of that the number of FCPs available in a certain time period is limited, the difference in weight levels between the best path and other paths should not be high. This should be done to allow fair number of FCPs to explore paths other than the best path.
  • the optimization of a more stable network can allow higher number of FCPs on the best path and lower number on other paths. The best path will be maintained better and more stable. This can be achieved by making the weight on a path's link more distant another path's links and making the weight on the best path's links higher.
  • best path is achieved by selection of the parameters such as ⁇ , ⁇ which controls the evaluation results' range, and the differences between evaluation results, and the selection of the enforcement function g( ⁇ ) which controls the differences between the weight values of different paths with different evaluation results.
  • the FCPs find an alternate way by using the PRT, without the need to wait for a setup time. This new path may not be the optimal one. However, the number of FCPs using failed evaluation results are free, and the number of FCPs searching for the best routing evaluation result will increase, and the best path will be found eventually.
  • the path's links have weight amounts that are dependent on the path's evaluation results. In the case when the best path links have significantly higher weight than other links. Sending the message information packets following the highest weight amounts has some limitations.
  • the best-found path has a very high weight amount and most of the FCPs follow this path.
  • the other paths may not be visited by enough number of FCPs and the next best path may not be the optimum. A better path may exist, but it may not be found.
  • the best path fails, the message information packets will follow the highest weight path, which may lead to a loop or very long path, however the number of FCPs allowed to explore the network will be higher and the next best will be found after some time.
  • a number of the message information packets may be lost before this unfavorable path is eliminated.
  • a number of the message information packets may fluctuate between different paths until reaching the best path.
  • pre-activated technique In order to overcome these problems, an enhanced technique called pre-activated technique is proposed in a embodiment of the present invention.
  • this technique rather than sending the message information packets following the highest weight amounts, message information packets will be sent using the best found path only. With this technique, when a better path is found, this path only will be activated to be used by message information packets. So, at the D Node, when a received FCP's path evaluation result is better than the best path found, the corresponding BCP activates the reverse route to be used by the message information packets. When this BCP reaches an I Node on the reverse path, this Node will use (activate) only the incoming link of the BCP for forwarding the message information packets. The message information packets will use only the activated path, which is the best path.
  • the message information packets are not following the highest weight deposits.
  • the message information packets are following a pre-activated path. There is no need to use very high weight on the best path or to have a large difference between different evaluation results and this allows the FCPs more freedom to explore the entire network. If a pre-activated path fails, the PBRA may take time to detect this failure and to activate to the next best path. In this period, the I Node will forward the message information packets to the highest weight links. When the next best path is found, this path will be activated, and data will use this path only.
  • FIG. 7 illustrates a network of Nodes sending data using the pre-activated technique discussed above.
  • the network has twelve Nodes. Every Node's communication range is 300 m. There are may possible paths from the S Node to the D Node.
  • the marked line paths on the figure are the feasible paths by the PBRA. Many paths such as path 1-16-20-21-0 marked by “ ⁇ ” is impossible to be used and is therefore eliminated by the PBRA.
  • the path 1-20-21-0 is a part of the path 1-16-20-21-0. As X path is the multiplication of the path's X I s, then X path of the path 1-20-21-0 is always greater than X path of the path 1-16-20-21-0.
  • FIG. 8 there is shown simulation results for various scenarios to obtain optimal path.
  • FIG. 8 a shows the simulation results for scenario 1, i.e., optimizing only the number of hops while FIG. 8 b represents scenario 2 results, i.e., optimization both number of hops and the Node remaining energy.
  • Node failure is a Node in the network fails when its energy is depleted
  • network failure is the network fails when there are no paths available to deliver data to the D Node due to energy depletion.
  • FIG. 8 shows some network characteristics such as number of hops and Node remaining energy on the y-axis and the time on the x-axis.
  • FIGS. 8 a and 8 b show the number of hops on the lower graph and the remaining battery energy for the I Nodes on the upper graph. Each line in the upper graph represents one of the I Nodes.
  • the network switches to next optimum paths (3-hops) 1-20-21-0, 1-24-22-0.
  • the batteries of Nodes 20 , 21 , 24 , 22 are depleted, the network switches to the next optimum path (4-hops) 1-16-17-18-0 as seen in FIG. 7 .
  • the batteries of Nodes 16 , 17 , 18 are depleted, the network fails. So, regarding energy usage, the distribution between the Nodes that belong to the paths with lower numbers of hops, and the Nodes of higher number of hops paths is not fair.
  • the PBRA optimizes both the minimum number of hops and the battery usage. From the battery usage point of view, the PBRA distributes the selection of the optimized paths to grantee fair loading on the battery usage among all Nodes in the network.
  • the first Node's failure time is 10 minutes, which is closer to the network failure time, which is 20 minutes. The remaining battery energy is more fairly distributed.
  • the network starts by using the minimum number of hops paths. When these paths' batteries decrease to some degree, the measured information of paths with higher number of hops will be higher, and the network will switch to them. The network keeps switching between paths to fairly distribute the energy usage over the network's Nodes.
  • the first Node failure time is extended from 5 minutes to 10 minutes.
  • the energy usage is fairly distributed across most of the Nodes.
  • Most of the Node failure times are extended close to network failure time.
  • TCPs trail control packets
  • the FCPs may follow a very long path before reaching this destination. In fact, the worst case is to visit all the Nodes in the network before reaching the D Node. In addition, the first path found might be far from the best solution, and thus it may require a long time to reach the optimal path. This can be solved by using the TCPs. Referring to the flow chart of FIG. 9 , TCPs are generated at a D Node and sent to the network of neighbor Nodes at step 900 .
  • TCPs move randomly in the network modifying the routing information to favor the links which lead to the D Node. This increase is dependent on the local information of the I Nodes. After a few of these TCPs are sent in the network, the I Nodes' routing information will direct the FCPs towards this D Node.
  • the I Nodes are randomly selected.
  • TTL time to live
  • the TCP is destroyed. If not, then at step 904 , the weights of the neighbor Nodes of the visited I Nodes are modified and weight table is updated.
  • the neighbor Node of the I Node is selected using the local information at step 905 .
  • the TCP is sent or forwarded to the neighbor Node selected. Steps 901 , 902 , 904 , 905 and 906 are repeated.
  • a group of routing paths is found. These routing paths are found based on criteria of the weights of the neighbor Nodes for the corresponding I Node. The criteria may preferably be that weights are equal or greater than a value or have maximum weight. So, depending on which Nodes meet the criteria, the routing paths are identified and message information packets are sent from the S Node to the D Node based upon this selection. Preferably, an optimal routing evaluation result is also selected so message information packet can be sent upon selection of this optimal result.

Abstract

The present invention provides a method for selecting and routing data in an ad-hoc mobile wireless network having a plurality of Nodes including multiple sources and destinations. The method includes sending a forward control packet from a source to the destination via at least one intermediate Node at intervals of time, where the intermediate Node is randomly selected. Each of the intermediate Nodes store weights of the neighbor Nodes. When the forward control packets reach the destination Node, they are evaluated in accordance with one or more given parameters and send back as backward control packets storing the evaluation results. As each of the intermediate Nodes receive the backward control packets, the weights of the corresponding neighbor Nodes are modified based on the stored evaluation results. Similarly, as the backward control packets are received at the source Nodes and the weights of the corresponding neighbor Nodes are modified based on the stored evaluation results. Finally, a group of routing routes to the destination are selected based on the modified weights of the neighbor Nodes and data packets are send from the source to the destination via the intermediate Nodes upon selection of the group.

Description

    FIELD OF THE INVENTION
  • The present invention relates to a novel routing method specifically adapted for use with ad-hoc mobile wireless networks and, more particularly, to a routing method where communications between sources and destination mobile hosts are carried out using a probability based routing algorithm.
  • BACKGROUND OF THE TECHNOLOGY
  • In the last decades, the marketplace has focused on wireless networks, making wireless networks grow rapidly. Different technologies have been developed on a global as well as a local level. Most of these technologies depend on a centralized hierarchical fixed infrastructure, which limits both survivability and scalability, and is dependent on the pre-configuration of the network. In addition, the cost of this expensive infrastructure is a major consideration.
  • Recently, infrastructureless networks (known as Mobile Ad-hoc Networks (MANETs)) have been developed as a means of addressing the needs for a more flexible, durable and cost efficient network system than conventional centralized hierarchical fixed infrastructure systems offer. Nodes in MANETs can be mobile or fixed routers and can be connected by wired or wireless links using one or more different technologies. These Nodes function as routers by discovering and maintaining routes to other Nodes in the network. In contrast with infrastructured networks, in MANETs there is no need for centralized infrastructures, such as base stations of pre-configured routers (i.e., network elements). This distributed characteristic allows the system to be more durable and more scalable. MANETs are often fast, self-built, self-configured, and adaptive to dynamic changes. MANETs are useful in a large number of applications, making them particularly useful when there is no network infrastructure or such infrastructure has been destroyed. It is clear that MANETs will play a very important role in the continued development of the computing and telecommunication market.
  • MANETs have several characteristics. These networks have highly dynamic topology. Most of the MANETs Nodes are mobile Nodes. These Nodes move rapidly and freely. Because of this mobility, the network topology changes rapidly and unpredictably. As opposed to fixed links, MANET links, which are wireless links, have limited and variable bandwidth, higher power consumption, limited energy and higher bit error rate. In addition, these links might be bi-directional or unidirectional. A large number of the Nodes in MANETs are mobile, and most of them depend on their batteries' energy, which is limited. Hence, energy conservation and fair distribution of energy usage should be taken into consideration.
  • In any network, the goal of the routing algorithm is to build routes from the sources to the destinations to be used by the data. These routes should maximize network performance. To solve the routing problem in MANETs, the goal of the routing algorithm should be achieved, while taking into consideration the special network characteristics. The routing algorithm should deal with the rapid changes in the network and it should optimize more than one parameter of the quality of service parameters (QOS) in the network, such as Node energy, link bandwidth, end to end delay, queuing delay, number of hops, links' signal to noise ratio, error rate, etc.
  • Many routing algorithms have been developed for MANETs; these algorithms can be classified into two groups. The first group is called table driven routing algorithms (such as DSDV, CGSR, GSR, FSR, HSR, WRP, etc.). See Elizabeth Royer and C-K Tob. “A Review of Current Routing Protocols for Ad-Hoc Mobile Wireless Networks”, IEEE Personal Communications Magazine, April 1999, pp. 46-55, P. Misra, “Routing Protocols for Ad Hoc Mobile Wireless Networks”, (adhoc_routing.pdf). [Online]. Available: http://www.cis.ohio-state.edu/˜jain/cis788-99/adhoc_routing/index.html, and C. E. Perkins and P. Bhagwat, “Highly Dynamic Destination Sequenced Distance Vector Routing (DSDV) for Mobile Computers,” Computer Communications Review, pp. 234-244, October 1994. These algorithms need frequent updating for the routing tables, which increases the routing overheads.
  • The second group is called source initiated on demand routing algorithms (such as AODV, DSR, TORA, ABR, SSR, etc.). Most algorithms of this class depend on flooding to find the route from sources to destinations, which increase the routing overheads. See Elizabeth Royer and C-K Toh, “A Review of Current Routing Protocols for Ad-Hoc Mobile Wireless Networks”, IEEE Personal Communications Magazine, April 1999, pp. 46-55, P. Misra, “Routing Protocols for Ad Hoc Mobile Wireless Networks”, (adhoc_routing.pdf). [Online]. Available: http://www.cis.ohio-state.edu/˜jain/cis788-99/adhoc_routing/index.html, and Charles E. Perkins and Elizabeth Royer “Ad-hoc On-Demand Distance Vector Routing.”, Proceedings of the 2nd IEEE Workshop on Mobile Computing Systems and Applications, New Orleans, La., February 1999, pp. 90-100.
  • Most MANETs routing algorithms need a large number of routing packets to maintain routes from sources to destinations. This large routing overhead affects the scalability of the network. This large routing overhead affects the network performance because it uses a significant part of the wireless bandwidth and of the Node's energy. In addition, most of these algorithms are optimizing only one parameter, which is in most cases the number of hops. These algorithms maintain only limited number of routes, which affect the survivability of the network. Therefore, a need exists of a routing method which will solve the routing problems in MANETs and obtain high performance, adaptive, reliable and survivable network.
  • SUMMARY OF THE INVENTION
  • The present invention provides a means of forwarding information in mobile ad hoc network from a source Node (S) to a destination Node (D) using at least one, and more than likely numerous, intermediate Nodes (I). Nodes in the network are capable of changing their geographic position with respect to each other at any given time. Thus, there is a significant challenge to communicate with the D Node via the best routing path given the various dynamic parameters that are possible in such an environment. These parameters, including such things as Node energy, link bandwidths, predicted end to end delays, estimated queuing delays, number of hops or distances, links' signal to noise ratio and error rate, among others. The present invention thus, provides a communication system with enhanced efficiency in a MANET environment which includes a means to select in real time the optimal route (path) for communication.
  • The parameters are included in forward control packets, which is then used to evaluate the relative “weights” of the I Nodes, for the purpose of selecting a Node, which would be the best next choice in the attempt to determine the best routing path. A change of the weights of a particular Node are assigned using the parameters through an evaluation process and changed or modified through an updating sequence as information is learned about a particular Node. For example, if information regarding the battery life of a particular Node is determined to be low, the weight of that particular Node will be modified as being a less desirable route, and this information will be brought to and stored in Nodes via the control packets. Thus, until the weight of that Node is updated to make it again a desirable route, other more desirable Nodes will be chosen. The assignment of weighted parameters permits that ability to select a “best route” choice at any given time, since the parameters in the MANET are likely to be dynamically changing. Thus, the weights change accordingly as information about Nodes is evaluated and communicated to their neighbor Nodes.
  • In one embodiment, the message information desired to be communicated by the sender is sent from the S Node to the D Node after the best route via I Nodes is determined. In another embodiment, the message information desired to be communicated by the sender is sent from the S Node to the D Node via I Nodes simultaneously with the control packet, as the best routing path is being determined.
  • In yet another embodiment, the searching for routing path is biased by randomly sending trail control packets from the D Node via I Nodes to the S Node, thereby providing allowing for the collection of and evaluation of parameter data, such that updating of the weights of Nodes in the various pathways can occur in advance. The present invention overcomes the drawbacks of the previous routing algorithms by providing a probability based routing algorithm to address the MANETs routing problems and achieve good network performance.
  • In one embodiment of the present invention, there is provided a method for selecting a routing path in an ad-hoc mobile wireless network having a plurality of Nodes including multiple sources and destinations, the method including, sending from a source at least one forward control packet via at least one I Node to one or more destinations at intervals of time, wherein said I Node is randomly selected and each of the I Nodes storing weights for each of its neighbor Nodes, evaluating each of said forward control packets at said destinations in accordance with one or more given parameters, sending from the destination backward control packets storing evaluation results which correspond to each of the forward control packets, through the same I Nodes originally traveled by the forward control packets to the source, receiving the backward control packets at the I Nodes, modifying the weights of each of said neighbor Nodes at each of the I Nodes based on the evaluation results stored in the backward control packets, receiving said backward control packets at said S Nodes, modifying the weights of each of said neighbor Nodes at the S Node based on the evaluation results stored in the backward control packets, and selecting a group of routing paths to said destinations via said I Nodes based on the modified weights of said neighbor Nodes.
  • In a first alternate embodiment of the present invention, there is provided a method for sending data in an ad-hoc mobile wireless network having a plurality of Nodes including multiple sources and destinations, the method including, sending from a source at least one forward control packet storing the data to be routed, via at least one I Node to one or more destinations at intervals of time, wherein said I Node is randomly selected and each of the I Nodes storing weights for each of its neighbor Nodes, evaluating each of said forward control packets at said destinations in accordance with one or more given parameters, sending from the destination backward control packets storing evaluation results which correspond to each of the forward control packets, through the same I Nodes originally traveled by the forward control packets to the source, receiving the backward control packets at the I Nodes, modifying the weights of each of said neighbor Nodes at each of the I Nodes based on the evaluation results stored in the backward control packets, receiving said backward control packets at said S Nodes, modifying the weights of each of said neighbor Nodes at the S Node based on the evaluation results stored in the backward control packets, and sending the data to said destinations via said I Nodes based on criteria of said weights of the neighbor Nodes for said I Node.
  • In a second alternate embodiment of the present invention, there is provided a method for sending data in an ad-hoc mobile wireless network having a plurality of Nodes including multiple sources and destinations, the method including, sending from a source at least one forward control packet storing the data to be sent, via at least one I Node to one or more destinations at intervals of time, wherein said I Node is randomly selected and each of the I Nodes storing weights for each of its neighbor Nodes, evaluating each of said forward control packets at said destinations in accordance with one or more given parameters, sending from the destination backward control packets storing evaluation results which correspond to each of the forward control packets through the same I Nodes originally traveled by the forward control packets to the source, receiving the backward control packets at the I Nodes, modifying the weight of each of said neighbor Nodes at each of the I Nodes based on the evaluation results stored in the backward control packets, receiving said backward control packets at said S Nodes, and modifying the weights of each of said neighbor Nodes at the S Node based on the evaluation results stored in the backward control packets.
  • In a third alternate embodiment of the present invention, there is provided a method for biasing a routing process in an ad-hoc mobile wireless network having a plurality of Nodes including multiple sources and destinations, the method including, sending from a destination at least one trail control packet via at least one I Node at intervals of time, wherein said I Node is randomly selected and each of the I Nodes storing weights for each of its neighbor Nodes, receiving the trail control packets at the I Nodes, and modifying the weights of each of the neighbor Nodes at each of the I Nodes immediately upon receipt of the trail control packets at the I Nodes.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • FIG. 1 is a schematic illustration of an ad-hoc mobile wireless network comprised of a plurality of Nodes which communicate with one another utilizing a probability based routing algorithm that includes a first preferred embodiment of the present invention.
  • FIG. 2 is a flow chart describing Nodes' functions in the embodiment of the present invention.
  • FIG. 3 is a flow chart describing functions of the intermediate and destination Nodes in reception of forward control packets and functions of the intermediate and source Nodes in reception of backward control packets and negative backward control packets in the embodiment of the present invention.
  • FIG. 4 is an illustration of various path links between Nodes from a source to a destination.
  • FIG. 5 shows a window mechanism of selecting the best control packet.
  • FIG. 6 shows a schematic elaboration of the function of the algorithm for mobile ad-hoc network.
  • FIG. 7 illustrates a network of Nodes finding the best path using the probability based routing algorithm.
  • FIG. 8 is a graphical representation of simulation results for various scenarios to obtain an optimal routing path.
  • FIG. 9 is a flow chart describing functions of the Source and Intermediate Nodes in reception of trail control packets.
  • DETAILED DESCRIPTION OF THE TECHNOLOGY
  • For purposes of the present invention, the following definitions will apply:
    • MANET—Mobile Ad-hoc Network is a collection of Nodes, each of which communicates over wireless channels and is capable of movement, without the required intervention of a centralized access point or existing infrastructure.
    • Nodes—Mobile or fixed routers with wireless receivers or wireless transmitters, which are free to move about arbitrarily.
    • Source (S) Nodes—Any Node in the network which transmits a forward control packet.
    • Intermediate (I) Nodes—Any Node in the network which receives and relays control packets and/or message information between the source Node and a destination Node.
    • Neighbor Nodes—Nodes located adjacent to another Node without an intervening Node there between regardless of whether a link exists between the adjacent Nodes.
    • Destination (D) Nodes—Any Node located in the network which is intended to be recipient of the control packet and/or message information sent by the S Nodes.
    • Link—A unidirectional and/or bidirectional connection between any two or more Nodes.
    • Message Information—Information carrying data to be relayed from an S Node to a D Node.
    • Routing Information—Information relating to finding a path or route between an S Node and a D Node.
    • Control Packet (CP)—A packet that collects and stores routing information to be transmitted from the S Node to the D Node and optionally including and transmitting message information.
    • Forward Control Packet (FCP)—A control packet generated at an S Node moving randomly in search of the D Node.
    • Backward Control Packet (BCP)—A control packet generated at a D Node upon receipt of a FCP, traveling in the direction from a D Node to an S Node visiting the same Nodes originally visited by the corresponding FCP.
    • Negative Backward Control Packet (NBCP)—A BCP generated at any Node upon receipt of a FCP containing one or more signals indicating unwanted path constraints, traveling towards an S Node, visiting the same Nodes originally visited by the corresponding FCP.
    • Trail Control Packet (TCP)—A CP generated at a D Node, moving randomly in the network.
    • Probability Based Routing Algorithm (PBRA)—An algorithm specifically adapted for MANETs for communications between S and D Nodes via CPs using probabilistic search for the solution.
    • Local Information—Relative values or weights of neighbor Nodes in a limited environment. The local information includes, without limitation, energy of the Nodes, bandwidth between the Nodes, signal to noise ratio between the Nodes, predicted delay between Nodes, estimated queuing delays, error rate of the packet transmission, power consumption of the links between Nodes, and combinations thereof.
    • Parameters—Predetermined characteristics or units of measures of the Nodes, which are measured to determine the weights of a Node, including the local information and global information of the Nodes from the S Node to a D Node.
    • Weights—Assigned levels or values of the parameters at each Node, capable of being detected and modified.
    • Identity Information—Identification of an individual Node that distinguishes one Node from another.
    • Measured Information—Relative values of the parameters of the Nodes visited.
    • Unwanted Path Constraints—Problems detected or encountered by the FCP as it visits Node-to-Node. Constraints include, without limitation, link failure, long routes, loop detection, security alert and unidirectional links.
    • Evaluation Results—Evaluation or grading of the Measured Information carried by a FCP at the D Node.
    • Weight Table—A table having the weights corresponding to a particular Nodes' neighbor Nodes. It has an entry corresponding to each required destination. Each entry has a field for each of the neighbor.
    • Probability Routing Table (PRT)—A table created using values calculated using the weight table and the local information using the PBRA. It has an entry corresponding to each required destination. Each entry has a field for each of the neighbor Nodes.
    • Route—A path followed or to be followed by a packet.
  • Referring to FIG. 1, there is shown a portion of a mobile ad-hoc network 10, that includes a plurality of conventional Nodes 12 labeled A, B, C, D, E, F, G, H, etc., each of which communicates over wireless channels and is free to move about arbitrarily. Nodes 12 participating in such ad-hoc networks 10 may preferably be located in or on airplanes, ships, trucks, cars, perhaps even on people or very small devices, and there may be multiple hosts per router. Such devices include laptops, cell phones, PDAs and other various wireless transmitting and receiving devices. Nodes 10 are equipped with wireless transmitters and receivers using antennas which may be omnidirectional (broadcast), highly-directional (point-to-point), possibly steerable, or some combination thereof. At a given point in time, depending on the Nodes' positions and their transmitter and receiver coverage patterns, transmission power levels and co-channel interference levels, a wireless connectivity in the form of a random, multihop graph or “ad-hoc” network exists between the Nodes. This ad-hoc topology may change with time as the Nodes move or adjust their transmission and reception parameters.
  • Every Node 12 in the network 10 can function as a S Node, such as, A, B, C, E, F, G . . . , which desirably transmits message information across the network 10, a D Node, which is the intended recipient of the information, and the I Nodes, which are configurable to relay the routing information and the message information between the S Node and the D Node. Routing information relates to finding a path (route) between an S Node and a D Node and message information includes the data transmitted from the S Node to a D Node, such data including voice or speech, text, image, etc. For the sake of clarity, the direction from the S Node to the D Node will be referred to as forward and the direction from the D Node to the S Node as backward. Generally, the forward direction is to a randomly selected Node visited for the first time by an FCP. The backward direction is to a Node previously visited by an FCP.
  • FIG. 2 shows a flow chart describing Nodes' functions utilizing the PBRA of the present invention. In order to select a path to a D Node, an S Node generates FCPs and sends them randomly searching for this D Node at step 202. The rate of generation of the FCP is generally a function of network dynamics, data rate, time and the required ability to quickly respond to changes in the network. The FCPs are sent from the S Node to the D Nodes via I Nodes. Each I Node stores weights of its neighbors' Nodes. The values of weights affect the selection of the next Node to which the FCP travels. The I Nodes are randomly selected using PRTs as described herein. PRTs located at each Node have values calculated using the weight table and local information of the Node. The local information includes energy of the Nodes, bandwidth between the Nodes, signal to noise ratio between the Nodes, predicted delay between Nodes, estimated queuing delays, error rate of the packet transmission, power consumption of the links between Nodes, and combinations thereof. As the FCP moves in the network searching for the D Node, it uses the I Nodes' PRTs to determine which Node to visit next, as noted in step 204.
  • At I Node, when an FCP is received, this FCP will be forwarded to a neighbor Node. The selection of this neighbor Node is done randomly using the PRT discussed above. The values of the PRT are calculated using the weight tables and the local information. At Node I, the probability of selecting a neighbor Node J is: prob ( D , I , J ) = { Fun ( τ D , I , J , η I , J ) J N I Fun ( τ D , I , J , η I , J ) if J N I prob ( D , I , J ) = 0 if J N I
    where ηI,J is the local value of the link (I,J). This value can represent the neighbor Node's information such as the neighbor Node's queue delay, remaining battery energy, link's signal to noise ratio, bit error rate, etc.
  • Fun(τD,I,J, ηI,J) is a function of τD,I,J (the weight value of J Node at I Node corresponding to the destination D, here we will call it the weight on link (I,J)) and ηI,J (the local heuristic information for link (I,J). NI is the set of all feasibly neighbor Nodes defined by the FCP's information and the routing constraints such as the guarantee of being free of loops. We use a special case for the function Fun(τI,J, ηI,J):
    • Fun(τI,J, ηI,J)=w1 τD,I,J+W2 ηI,J
      For Destination D:
  • the probability of selecting link (I,J) will be prod ( D , I , J ) = { w 1 τ D , I , J + w 2 η I , J J N I w 1 τ D , I , J + w 2 η I , J if J N I prod ( D , I , J ) = 0 if J N I
    where w1, w2 are the multipliers of the neighbor Node's weight and the neighbor Node's local information respectively. The I Node inserts its identification “F” in the FCP and it adds and/or modifies the FCP measured information, such as values of the parameters mentioned above.
  • Every time the FCP reaches an I Node, it collects the identity information and the measured information of that I Node. The measured information is the values of parameters. Parameters include local information and additionally include the global information of the Nodes from S Node to D Node. Parameters are predetermined characteristics or units of measures of the Nodes, which are measured to determine the weights of a Node, including the local information and global information of the Nodes from the S Node to a D Node. Parameters are measured and constantly evaluated and assigned weight values for each Node. When a FCP reaches its destination, the measured information carried by this FCP, i.e., the parameters of the I Nodes it has visited, will be evaluated or graded using the following function: grade = Fun ( QOS_parameters ) = Fun ( distance from source to destination , Nodes energy , links bandwidth , end to end delay , signal to noise ration , error rate , power consumption of the lines , etc . )
    These parameters are collected from FCP measured information. The FCP will be destroyed and a BCP will be generated at the D Node at step 206. The Evaluation result of the corresponding FCP is transmitted via the BCP. The BCP goes backward from the D Node to S Node visiting the same Nodes previously visited by the corresponding FCP. As BCPs are received by the I Nodes, they modify the weights of their neighbor Nodes, based on the evaluation result carried by the BCP and accordingly update their routing tables as shown in step 208 of FIG. 2. Finally, the S Node at step 210 eventually receives the BCPs, modifies the weights of its neighbor Nodes, updates its PRT and destroys the BCP. In one embodiment of this invention, the S Node can begin to start sending sender's intended message information to the D Node by using the best route selected from the routing information received from the BCP. FCPs and BCPs can be sent using a priority queue to minimize any loss or delay of network information due to congestion. Functions of each type of Node and the process will be described in more detail below.
  • The response of the Nodes 12 when receiving a FCP depends on whether this Node is a D Node, an I Node or a S Node. Both I and S Nodes respond to the FCPs in the same way, by forwarding the FCP to a next neighbor selected randomly by the PRT. The flowchart in FIG. 3 a shows detailed functions of the I Nodes and the D Nodes when receiving FCPs. Beginning with step 300, an FCP is generated and sent from the S Node to the network of Nodes. At step 301, an FCP is received at a Node, where a determination is made, 302, as to whether the Node is a D Node.
  • If the Node is determined to be a D Node, the FCP's identity and measured information is collected at the D Node as noted in step 311. At step 312, each of the FCPs measured information is evaluated in accordance with one or more parameters, by comparing the measured information to a reference value of the parameters. The reference value can preferably be constant or can be dynamic and dependent on the measured information received from the FCPs. Then at step 313, the FCP is destroyed and a BCP is generated at the D Node as noted at step 314. These BCPs store evaluation results corresponding to each of the FCPs. At step 315, at the D Node, the identity of the FCPs and the evaluation results of the measured information is stored in corresponding the BCPs. Then at step 316, the BCPs are sent back from the D Nodes to the S Nodes through the same I Nodes originally traveled by the FCPs to the S Node. The role played by the BCP is referred to in FIG. 3 c as described below.
  • Referring to FIG. 3 c, there is shown a flow chart describing the S and I Nodes' function of receiving BCPs sent at step 316 in FIG. 3 a. Beginning at step 317, a BCP is received at a Node. At step 318, it is determined whether this Node is an S Node. If it is not an S Node, then it is an I Node and the I Node collects the evaluation results from this BCP at step 319. This evaluation result will be used to modify the weight values of the neighbor Nodes at each of the I Nodes at step 320 and hence updating the weight table entry corresponding to the FCP's destination. The weights of each of the neighbor Nodes of the I Nodes are modified based on the evaluation results stored in the BCPs. These modified weights correspond to the destination. In other words, they reflect the route to be chosen or maintained to reach the destination. The BCP will then be sent to the next Node at step 321 in the reverse path of the FCP. In other words, the BCP storing evaluation results follows the reverse path of its corresponding FCP visiting the same I Nodes originally visited by the FCPs to the source. At this point, steps 317 and 318 will be repeated. However, if it is determined that the Node is a S Node at step 318, then the S Node collects the evaluation results from the BCP at step 322 and modifies the weights of its neighbor Nodes, thereby updating its weight table at step 323. Finally, the BCP will be destroyed at step 324 at the S Node. In other words, when the BCP is received at the S Node, the weights of each of the neighbor Nodes of the S Nodes are modified based on the evaluation results stored in the BCPs. Based on the weights of its neighbor Nodes, the S Node selects a group of routes to the destinations via the I Nodes. Out of the group of routes, one route will preferably be an optimal route which is subject to change based on the change in the weights of the neighbor Nodes. The S Node could send data packets to the D Nodes via the selected group of routes including the optimal routing path.
  • Referring back to step 302 in FIG. 3 a, if the Node is determined to be not a D Node, then steps 303 to 310 are performed at each of the I Nodes visited. At step 303, the identity information and measured information of the visited I Nodes are added to the FCPs. Then at step 304, it is determined whether a signal is received at I, i.e. whether the measured information of the FCP indicates any unwanted path constraints such as link failure, time to live reached, long route, loop detected, security alert, unidirectional links, etc. If not, then at step 305, the I Node's PRT and the local information are used to select a neighbor Node of the I Node, and the FCP is sent at step 307 to the neighbor Node selected at step 305. Steps 302 to step 307 are reiterated until the FCP reaches the D Node. Referring back to step 304 in FIG. 3, if a signal is received at I indicating that unwanted path constraints were found, a NBCP is generated. Step 306 verifies that the NBCP is generated. If the NBCP features is not enabled or generated, the FCP is destroyed at step 308. Otherwise at step 309, immediately upon receipt of the FCP at the I Node, the identity and measured information of the FCP is collected. Then at step 310, the signal indicating the unwanted path constraint is evaluated, and a NBCP storing evaluation results of the signal corresponding to the FCPs is sent back through the same I Node originally visited by the FCPs. The details of the unwanted path constraints and the evaluation results of the signal will be discussed with reference to FIG. 4, in detail later. The role played by the NBCP is referred to in FIG. 3 d as discussed below.
  • Referring to FIG. 3 d, there is shown a flow chart describing the S and I Nodes' function of receiving NBCPs sent at step 310 in FIG. 3 a. Beginning at step 325, an NBCP is received at a Node L At step 326, it is determined whether this Node is an S Node. If it is not an S Node, the I Node collects the evaluation results from the NBCP at step 330. This evaluation result will be used to modify the weight values of the neighbor Nodes at each of the I Nodes at step 331, hence updating the weight table entry corresponding to the FCP's D Node. The weights of each of the neighbor Nodes of the I Nodes are modified based on the evaluation results stored in the NBCPs. These modified weights correspond to the D Node. In other words, they reflect the route to be chosen or maintained to reach the D Node. Since this I Node is encountered with NBCP, reflecting one or more unwanted path constraints, the weight value on the incoming link is decreased and the values on other links are increased using the weight updating function. The NBCP will then be sent to the next Node at step 332 in the reverse path of the FCP. In other words, NBCP storing evaluation results follows the reverse path of its corresponding FCP visiting the same I Nodes originally visited by the FCP to the S Node. At this point, steps 325 and 326 will be repeated. However, if it is determined that the Node is the S Node at step 326, then the S Node collects the evaluation results from the NBCP at step 327 and modifies the weights of its neighbor Nodes, thereby updating its weight table at step 328. Finally, the NBCP will be destroyed at step 329 at the S Node.
  • BCPs deposit either positive or negative weight values. Under normal operation, BCPs deposit positive weight values, thus increasing the weight of the routing path. A NBCP as discussed above, can be sent back to the S Node (similar to the “regular” BCP) when a signal received at I Node. The NBCP has the same format of the BCP, except that its evaluation result value is negative. The purpose of the NBCP is to help in excluding the unwanted constraints from the routing process or by accelerating the decay of weight values based on the evaluation result of the signal. Thus, the NBCP de-emphasizes this route, such that the probability of using this route by future FCPs will decrease.
  • As discussed above, signals of having unwanted path constraints such as link failure, long route, time to live reached, loop detected, security alert, unidirectional links, or combinations thereof preferably are received at an I Node. Upon receipt of such signal, it is evaluated and a NBCP is generated at the I Node. The NBCP storing the evaluation results of the signal is sent through the same route originally traveled by the I Nodes. The NBCPs are received at the I Nodes, and the weights of each of their neighbor Nodes are modified at each of the I Nodes based on the evaluation results stored in the NBCPs. Finally, the NBCPs are received at the S Nodes, and the weights of each of its neighbor Nodes are modified. Therefore, a NBCP has the same format of a regular BCP but with a negative evaluation result. NBCPs can be useful in overcoming some problems. Some of the ways in which the NBCPs can be used in is described in examples below.
  • For example, when a FCP's number of hops reaches its time to live (TTL) or experiences a loop, or any unwanted constraint, this FCP will be destroyed at this I Node and the I Node may send an NBCP. This NBCP will follow the reverse route of the FCP and will decrease the weight amount of corresponding FCP's path links. Thus, the probability of using this route by future FCPs will decrease and this unwanted route will be excluded quickly.
  • Another example is when the I Node detects link failure or link degradation, and this link had the highest probability in the probability routing table, this Node will respond to the next received FCPs by sending NBCPs. The probability of using this link will therefore decrease, and the probability of exploring new routes will increase.
  • These examples are clearly illustrated in FIG. 4. Again, S is the Source and D is the Destination and the rest of the Nodes are intermediate/neighbor Nodes. Referring to FIG. 4, if an FCP sent from an S Node searching for a D Node experiences a loop (J, K, L, J), the loop is detected at Node J, a NBCP will be sent. The update corresponding to this NBCP will decrease the weight value on the links S-A, A-B, . . . J-K, K-L, L-M. If this decrease is high, the routing path S,A,B, . . . J will be quickly eliminated and the FCPs will switch to the routing path S,O,P, . . . Y,Z,D. If the decrease is less, the weight value on the links S-A, A-B, . . . J-K, K-L, L-M will decrease gradually. However, the probability that a FCP will select the routing path S,A,B, . . . J is not yet small. And there is a chance that a FCP will follow the routing path S,A,B, . . . J,K,D or the routing path S,A,B, . . . K,L,M,D.
  • Similarly, if the link J-K fails and when an FCP reaches Node J, a NBCP is generated to decrease the weight value on the links S-A, A-B, . . . J. The decrease should not be high to allow some FCPs to explore other routing path in the neighborhood. Now FCPs may find the routing path S,A,B, . . . J,L,K,D. The NBCPs with their negative evaluation results help to avoid the failed links or the loops and emphasize other neighboring links.
  • At an I Node, many BCPs generated from the same destination are received coming from different links. Several of these BCPs have the best evaluation result and others have lower evaluation results (unwanted results). The use of these lower evaluation results in updating the weight tables may affect the performance of the system by increasing the switching rate between routes and increasing the convergence time. Since BCPs may be arriving on various links at given Node, we need to minimize the frequency of switching between links and also minimizing the memory requirements. The window mechanism works as follows.
    • For a specific D Node
      • For an I Node, for all incoming links (l1, l2, . . . lk)
        • Let ρDJ(K,n) be the Evaluation result carried by the nth received BCP coming from the neighbor Node j during window K.
        • Let ρD,best(K) be the best Evaluation result in window K.
        • Maximum Window size=W CPs.
        • If ρD,j(K+1,n)<PD,best(K)
          • Continue monitoring
          • w=w+1
          • If w=WCPs
            • Start new window (w=0)
            • set ρD,best(K+1)=ρD,j(K,n)
            • Update weights using ρD,best(K+1)
        • Else
          • Start new window (w=0)
          • set ρD,best(K+1)=ρD,J(K+1,n)
          • Update weights using ρD,best(K+1)
  • The window size is variable up to a maximum of W CPs. The weight amounts on the links to the neighbors will be updated using this selected evaluation result ρD,best. Only the BCPs with an evaluation result greater than or equal to the last best evaluation result will be used for updating. This prevents using bad evaluation results for upgrading. If all the BCPs' evaluation results were used for updating, these unwanted results would affect the response of the system by increasing the convergence time and making incorrect and frequent switching between solutions.
  • For example, as shown in FIG. 5, the I Node receiving BCPs from the D Node coming from different links l1, l2, . . . lk. The use of unwanted evaluation results will slow the convergence. This can be shown in the first window of FIG. 5. If link l1 is part of the best path, the use of unwanted evaluation results from BCPs received from other links will decrease the weight value of link l1. This will increase the time that it takes for the weight value on the link l1 to reach its highest value. In addition, there is a probability that the system will switch to solutions other than the best solution. The system may switch to link l3 in the first window.
  • Without using this window mechanism, there will be a high probability for frequent and incorrect switching between routes. In FIG. 5, during the second window lifespan, none of the evaluation results received are higher or equal to the last best evaluation results, and the link l1 is no longer a part of the best evaluation result. This allows the system to dynamically switch to the next best evaluation result link. If the system is too dynamic, the window size should be reduced to allow quick response. If we want to use all the BCPs, the window size should be equal unity.
  • Weight Updating:
  • The updating of weight is the modification of the values of the weight table. When the best BCP is received, the table entry, corresponding to the destination, will be updated using the BCP's evaluation result. In this invention, two updating techniques are briefly disclosed. First is a generalized S-ACO meta-heuristic technique and second is the periodic evaporation technique.
  • A generalized updating function for S-ACO meta-heuristic. In this function, the weight enforcement function as well as the weight evaporation function depends on the quality of the solution. Updating of the weight on the I Node's link to its neighbors will be done as follows:
  • At I Node, when best BCP is selected for updating as described above, the weight on the Node's links will be updating using the selected BCP's evaluation result ρD,i,j using the following function: τ D , I , J ( n ) = { f ( ρ Dbest ) τ D , I , J ( n - 1 ) + g ( ρ Dbest ) link with BCP carrying ρ Dbest f ( ρ Dbest ) τ D , I , J ( n - 1 ) Other links
    Where τD,I,J is the weight amount on the link between Node I and Node J corresponded to the destination D.
      • n is the number of received BCPs.
      • g(ρ) is the evaporation function
  • The purpose of the evaporation function is to help the system forgetting the old information faster when the evaluation result ρ is increasing
  • Example of such function is g(ρ)=1−p.
    • f(ρ) is the enforcement function
      The purpose of the enforcement function is to help the system increasing the amount of weight on the edges when the evaluation result ρ is increasing. Example of such function is f(ρ)=ρk. Note that: 0≦ρ≦1, 0≦f(ρ)≦1 and 0≦g(ρ)≦1
  • Let τD,I,J(0) be the initial value of the weight on link (I,J) corresponding to D Node after n updates, τ D , I , J ( n ) { ( f ( ρ Dbest ) ) n τ D , I , J ( 0 ) + g ( ρ Dbest ) I = 0 n - 1 ( f ( ρ best ) ) n link with BCP carrying ρ Dbest ( f ( ρ Dbest ) ) n τ D , I , J ( 0 ) Other links τ D , I , J ( n ) { ( f ( ρ Dbest ) ) n τ D , I , J ( 0 ) + g ( ρ Dbest ) 1 - ( f ( ρ Dbest ) ) n 1 - f ( ρ Dbest ) ) link with BCP carrying ρ Dbest ( f ( ρ Dbest ) ) n τ D , I , J ( 0 ) Other links
    where n is the number of BCPs used for updating
    As n increase, τ converge to τ D , I , J ( n ) = { min ( g ( ρ DJ ) 1 1 - f ( ρ DJ ) ) , τ max ) link with BCP carrying ρ Dbest max ( 0 , τ min ) Other links
    Where τmax is the maximum weight allowed on a link.
      • τmin is the minimum weight allowed on a link.
        Now, the links of the higher evaluation results will have higher weight values.
  • Periodic evaporation process helps the system to forget old information when some routes and links are not visited for long time. This process is described by the following equation:
    τD,I,J(t+Δt)=Vu(t))
      • where Δt is the time interval between two periodic evaporation
      •  V is the periodic evaporation function
      • Both Δt and V depend on the network dynamics.
  • FIG. 6 shows a schematic elaboration of how the algorithm works for mobile ad-hoc networks. Referring to FIG. 6-a the S Node is willing to establish communications with the D Node. The S Node will start sending FCPs as illustrated in FIG. 6 b. These FCPs will move randomly in the network, searching for the D Node. A number of these FCPs will find the D Node as shown in FIG. 6 c. The D Node sends BCPs on the reverse route. The weight on these routing paths' links will be increased. These routing paths will have higher weight amounts than the entire network. These routing paths may not be the best routing paths. Because of the probabilistic movement of the FCPs, the majority of FCPs will visit the regions around these routing paths and will find better routing paths as can be seen in FIG. 6 d. The best routing paths will have the highest weight amounts on its links as shown in FIG. 6 e.
  • If another Node (S2) wants to find the same D Node as illustrated in FIG. 6 f, it sends FCPs. These CPs move randomly in the network. If these FCPs intersect with an existing route to the destination, it will follow the weight on this routing path to reach the D Node because the amount of weight is higher in this routing path direction. The BCP will update the weight on the I Nodes. The FCPs generated from Node (S2) are using the information in other Nodes' PRTs.
  • As a connection between S Node and D Node is used more, the connection will be closer to the optimum and more stable because more routing evaluation results are discovered. The majority of the FCPs are following the highest routing evaluation results. These routing evaluation results are used by data packets and should be quickly maintained. A lower number of FCPs are free to explore other routing paths and unvisited routes. The FCPs are sent using the already existing information in the I Nodes' PRT. This reduces the optimization time for a new routing path to be found and optimized. If a new routing path is required, the FCPs will find a near optimum solution and the optimization will start from a point closer to the optimum.
  • The PBRA starts working as on demand, the PBRA is dependent mainly on the random movements of the FCPs to find destinations, and the main effect of the FCPs is to find routing evaluation results to the D Node. The more D Nodes are explored by S Nodes, the more information the Nodes' routing tables have. After some time, the PBRA will depend mainly on the information saved in the PRTs of the Nodes. Now the FCPs' main effect is updating the PRTs.
  • If only one parameter is used for optimization in the example shown in FIG. 6, it is the number of hops. The two hop routing path will be used until its Node battery is depleted. Then the PBRA will switch to the three hop routing evaluation result until its Nodes' batteries die; then the PBRA will switch to the four hop routing evaluation result. It is not fair to the minimum hop routing evaluation result in the sense of battery usage. And the battery should be used for optimization, in addition to the primary optimization parameter.
  • If the battery is considered as a parameter in the optimization, this network may respond as follows: if all the I Nodes starting from a point all their batteries remaining energy are equal, the two hop routing evaluation result has the minimum number of hops and it will be used. When the Nodes' battery energy in this routing path decreases and reaches some threshold, the three-hop routing evaluation result information will be better and the CPs and the message information will use this routing path. When its Nodes' batteries decrease, the CPs and the message information will switch to the four-hop routing path. When the Nodes' batteries in the four hop routing path decrease, the CPs and the message information will switch back to the two hops Node.
  • The usage of Node energy can be fair or the Nodes can be given different priority for energy usage. Important Nodes, such as data base servers, units used by high rank officers can report to the FCPs a lower battery energy than its actual value. If it reports low battery energy, the evaluation result of this routing evaluation result will be low, thus making it less desirable and increasing the lifetime of the Node.
  • As discussed above, the identity information and measured information is added to the FCPs. The measured information is the parameters we would like to optimize, such as quality of service parameters. We should be very careful in selecting the parameters to be collected. The more information collected about the Nodes, the more optimum the solution. However, the CPs' sizes will increase, which increases the routing overheads. These routing overheads in MANETs consume energy and part of the bandwidth and limits the scalability. A good solution for this is to calculate I Node local normalized Index XI: X I = m a m p l , m
  • Where XI is Node's I normalized index
      • ρl,m is Node's I normalized optimization parameter m (quality of service parameters such as the number of hops, delay, battery, etc.) (0<pl,m<1)
      • αm is the weight given to parameter pl,m indicating its importance in the optimization process where: m a m = 1 Note that 0 < X I < 1
  • As the Node gains a better parameter, the value XI become closer to unity. XI can take discrete values located between zero and one or they can be continuous. The threshold between two different steps of XI values can be controlled and it affects the switching speed between evaluation results.
  • Let Xpath be the path index for the FCP's path, which is a function of all the Nodes' information along the evaluation result. Xpath can be the multiplication of all the Nodes' indices for all the Nodes in the path. X path = I X I Note : 0 X path < 1
  • The calculation of Xpath can be done in a distributed way in the I Nodes of the path. In this case, The evaluation result information Xpath can be only one field in the FCP, which will be modified as the FCP moves between I Nodes. The value Xpath gives a good indication for the number of hops. As the number of hops increases, the multiplication of XIs decreases. Xpath is a good measure of the overall path information. Because of that XIs and Xpath values is smaller than unity, the value of Xpath is smaller than the smallest local normalized parameter (XI) along the path.
  • At the destination, the evaluation result of the FCP from the S Node to the D Node is calculated. The evaluation results of the FCPs is done by comparing their measured information to a reference. This reference could change dynamically according to network changes. This reference can be the best Xpath received in the last window W. The window mechanism works as following:
    • For FCPs sent from S Node:
      • When reaching the D Node, the measured information of the received FCPs will be compared to find the best received FCP measured information Xpath,best in the last window W.
      • The evaluation result of a received FCP is determined as follows: Evaluation result ρ = Function ( X path , X path , best ) ρ D = 1 α ( X Path , best - X Path ) + β α Scaling constant , β is a bias constant 0 < ρ 1
  • The value of (Xpath,best−Xpath) indicates how far the received CP measured information is from the current best measured information determined so far. When Xpath is away from the Xpath,best, the evaluation result will be lower. The PBRA will respond better to the network changes because the Xpath is compared to a dynamic reference Xpath,best, α controls the range of the evaluation result ρD, as α increases the range of the evaluation result increases. β drifts the evaluation result ρD away from the high values and keeps it under unity. Applying the PBRA on the network results in the best routing path's links having the highest weight amounts in the network.
  • In the case of highly dynamic network, the amount of weight on the best path should be significantly higher than other paths. Because of that the number of FCPs available in a certain time period is limited, the difference in weight levels between the best path and other paths should not be high. This should be done to allow fair number of FCPs to explore paths other than the best path. The optimization of a more stable network can allow higher number of FCPs on the best path and lower number on other paths. The best path will be maintained better and more stable. This can be achieved by making the weight on a path's link more distant another path's links and making the weight on the best path's links higher. In both cases, best path is achieved by selection of the parameters such as α,β which controls the evaluation results' range, and the differences between evaluation results, and the selection of the enforcement function g(ρ) which controls the differences between the weight values of different paths with different evaluation results. When the best path fails, the FCPs find an alternate way by using the PRT, without the need to wait for a setup time. This new path may not be the optimal one. However, the number of FCPs using failed evaluation results are free, and the number of FCPs searching for the best routing evaluation result will increase, and the best path will be found eventually.
  • The path's links have weight amounts that are dependent on the path's evaluation results. In the case when the best path links have significantly higher weight than other links. Sending the message information packets following the highest weight amounts has some limitations. The best-found path has a very high weight amount and most of the FCPs follow this path. The other paths may not be visited by enough number of FCPs and the next best path may not be the optimum. A better path may exist, but it may not be found. In fact, in some cases, when the best path fails, the message information packets will follow the highest weight path, which may lead to a loop or very long path, however the number of FCPs allowed to explore the network will be higher and the next best will be found after some time. A number of the message information packets may be lost before this unfavorable path is eliminated. A number of the message information packets may fluctuate between different paths until reaching the best path.
  • In order to overcome these problems, an enhanced technique called pre-activated technique is proposed in a embodiment of the present invention. In this technique, rather than sending the message information packets following the highest weight amounts, message information packets will be sent using the best found path only. With this technique, when a better path is found, this path only will be activated to be used by message information packets. So, at the D Node, when a received FCP's path evaluation result is better than the best path found, the corresponding BCP activates the reverse route to be used by the message information packets. When this BCP reaches an I Node on the reverse path, this Node will use (activate) only the incoming link of the BCP for forwarding the message information packets. The message information packets will use only the activated path, which is the best path.
  • When a better solution is found, it will be activated for the message information packets and the message information packets will switch to this better path. This technique can find a near optimal solution. In this technique, the message information packets are not following the highest weight deposits. The message information packets are following a pre-activated path. There is no need to use very high weight on the best path or to have a large difference between different evaluation results and this allows the FCPs more freedom to explore the entire network. If a pre-activated path fails, the PBRA may take time to detect this failure and to activate to the next best path. In this period, the I Node will forward the message information packets to the highest weight links. When the next best path is found, this path will be activated, and data will use this path only.
  • FIG. 7 illustrates a network of Nodes sending data using the pre-activated technique discussed above. The network has twelve Nodes. Every Node's communication range is 300 m. There are may possible paths from the S Node to the D Node. The marked line paths on the figure are the feasible paths by the PBRA. Many paths such as path 1-16-20-21-0 marked by “−” is impossible to be used and is therefore eliminated by the PBRA. The path 1-20-21-0 is a part of the path 1-16-20-21-0. As Xpath is the multiplication of the path's XIs, then Xpath of the path 1-20-21-0 is always greater than Xpath of the path 1-16-20-21-0.
  • Referring to FIG. 8, there is shown simulation results for various scenarios to obtain optimal path. FIG. 8 a shows the simulation results for scenario 1, i.e., optimizing only the number of hops while FIG. 8 b represents scenario 2 results, i.e., optimization both number of hops and the Node remaining energy. By definition, Node failure is a Node in the network fails when its energy is depleted, and network failure is the network fails when there are no paths available to deliver data to the D Node due to energy depletion.
  • At the start of the simulation, all the I Node's batteries' energy is equal to 21 W.s. The simulation is run to simulate 25 minutes. FIG. 8 shows some network characteristics such as number of hops and Node remaining energy on the y-axis and the time on the x-axis. FIGS. 8 a and 8 b show the number of hops on the lower graph and the remaining battery energy for the I Nodes on the upper graph. Each line in the upper graph represents one of the I Nodes.
  • Looking at the results of scenario 1 in FIG. 8 a, it is noted that the time till the first Node fails (due to battery depletion) is 5 minutes, while the time till the whole network fails (due to Node failures along all available paths between the S Node and the D Node) is 19 minutes. It should be apparent that optimization only the number of hops, leads to the initial utilization of Nodes along this optimized paths and thus their batteries' depletion. This effect propagates in other Nodes and eventually leading to network failure. When the network starts, this network is using the minimum number of hops (2-hops) paths, which is 1-13-0, 1-19-0, 1-23-0 as shown in FIG. 7. When the batteries of Nodes 13,19,23 of FIG. 7 are depleted, the network switches to next optimum paths (3-hops) 1-20-21-0, 1-24-22-0. When the batteries of Nodes 20,21,24,22 are depleted, the network switches to the next optimum path (4-hops) 1-16-17-18-0 as seen in FIG. 7. When the batteries of Nodes 16,17,18 are depleted, the network fails. So, regarding energy usage, the distribution between the Nodes that belong to the paths with lower numbers of hops, and the Nodes of higher number of hops paths is not fair.
  • In scenario 2 of FIG. 8 b, the PBRA optimizes both the minimum number of hops and the battery usage. From the battery usage point of view, the PBRA distributes the selection of the optimized paths to grantee fair loading on the battery usage among all Nodes in the network. In the results of scenario 2 in FIG. 8 b, it is noted that the first Node's failure time is 10 minutes, which is closer to the network failure time, which is 20 minutes. The remaining battery energy is more fairly distributed. The network starts by using the minimum number of hops paths. When these paths' batteries decrease to some degree, the measured information of paths with higher number of hops will be higher, and the network will switch to them. The network keeps switching between paths to fairly distribute the energy usage over the network's Nodes.
  • By comparing both cases, it is found that using the remaining battery lifetime in addition to the number of hops in optimization gives better performance. The first Node failure time is extended from 5 minutes to 10 minutes. The energy usage is fairly distributed across most of the Nodes. Most of the Node failure times are extended close to network failure time.
  • In another preferred embodiment of the present invention, new type of CPs called trail control packets (TCPs) are preferably used for biasing a routing process in an ad-hoc mobile network. When searching for a D Node, the FCPs may follow a very long path before reaching this destination. In fact, the worst case is to visit all the Nodes in the network before reaching the D Node. In addition, the first path found might be far from the best solution, and thus it may require a long time to reach the optimal path. This can be solved by using the TCPs. Referring to the flow chart of FIG. 9, TCPs are generated at a D Node and sent to the network of neighbor Nodes at step 900. These TCPs move randomly in the network modifying the routing information to favor the links which lead to the D Node. This increase is dependent on the local information of the I Nodes. After a few of these TCPs are sent in the network, the I Nodes' routing information will direct the FCPs towards this D Node.
  • Specifically, the I Nodes are randomly selected. When the TCPs are received at an I Node at step 901. At this visited I Node, it is checked whether the TCP reached its time to live (TTL) at step 902. If the TCP reached its TTL, then at step 903, the TCP is destroyed. If not, then at step 904, the weights of the neighbor Nodes of the visited I Nodes are modified and weight table is updated. The neighbor Node of the I Node is selected using the local information at step 905. Then at step 906, the TCP is sent or forwarded to the neighbor Node selected. Steps 901, 902, 904, 905 and 906 are repeated.
  • Moreover, based on the modified weights of the neighbor Nodes, a group of routing paths is found. These routing paths are found based on criteria of the weights of the neighbor Nodes for the corresponding I Node. The criteria may preferably be that weights are equal or greater than a value or have maximum weight. So, depending on which Nodes meet the criteria, the routing paths are identified and message information packets are sent from the S Node to the D Node based upon this selection. Preferably, an optimal routing evaluation result is also selected so message information packet can be sent upon selection of this optimal result.
  • While the invention has been described in relation to the preferred embodiments with several examples, it will be understood by those skilled in the art that various changes may be made without deviating from the spirit and scope of the invention as defined in the appended claims.

Claims (10)

1-51. (canceled)
52. A method for biasing a routing process in an ad-hoc mobile wireless network having a plurality of nodes including multiple sources and destinations, comprising:
sending from a destination at least one trail control packet via at least one intermediate node at intervals of time, wherein said intermediate node is randomly selected and each of the intermediate nodes storing weights for each of its neighbor nodes;
receiving the trail control packets at the intermediate nodes; and
modifying the weights of each of the neighbor nodes at each of the intermediate nodes immediately upon receipt of the trail control packets at the intermediate nodes.
53. The method of claim 52 further comprising:
selecting a group of routing paths to said destinations via said intermediate nodes based on the modified weights of said neighbor nodes.
54. The method of claim 53 further comprising:
sending data packets from the sources to the destinations via said intermediate nodes upon the selection of said group of routing paths.
55. The method of claim 52 further comprising:
selecting the optimal routing path to said destinations via said intermediate nodes based on the modified weight of said neighbor nodes.
56. The method of claim 55 further comprising:
sending data packets from the sources to the destinations via said intermediate nodes upon the selection of the optimal routing path.
57. The method of claim 52 further comprising:
sending the data to said destinations via said intermediate nodes based on criteria of said weights of the neighbor nodes for said intermediate node.
58. The method of claim 57 wherein said criteria comprise weights equal to or greater than a value.
59. The method of claim 57 wherein said criteria comprise maximum weight.
60. The method of claim 52 further comprising:
sending from a source at least one forward control packet storing the data to be sent, via at least one intermediate node to one or more destinations at intervals of time, wherein said intermediate node is randomly selected and each of the intermediate nodes storing weights for each of its neighbor nodes.
US11/170,691 2003-01-17 2005-06-29 Routing method for mobile infrastructureless network Abandoned US20050286464A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US11/170,691 US20050286464A1 (en) 2003-01-17 2005-06-29 Routing method for mobile infrastructureless network

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US10/346,447 US6940832B2 (en) 2003-01-17 2003-01-17 Routing method for mobile infrastructureless network
US11/170,691 US20050286464A1 (en) 2003-01-17 2005-06-29 Routing method for mobile infrastructureless network

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
US10/346,447 Continuation US6940832B2 (en) 2003-01-17 2003-01-17 Routing method for mobile infrastructureless network

Publications (1)

Publication Number Publication Date
US20050286464A1 true US20050286464A1 (en) 2005-12-29

Family

ID=32735388

Family Applications (2)

Application Number Title Priority Date Filing Date
US10/346,447 Expired - Fee Related US6940832B2 (en) 2003-01-17 2003-01-17 Routing method for mobile infrastructureless network
US11/170,691 Abandoned US20050286464A1 (en) 2003-01-17 2005-06-29 Routing method for mobile infrastructureless network

Family Applications Before (1)

Application Number Title Priority Date Filing Date
US10/346,447 Expired - Fee Related US6940832B2 (en) 2003-01-17 2003-01-17 Routing method for mobile infrastructureless network

Country Status (2)

Country Link
US (2) US6940832B2 (en)
WO (1) WO2004068870A2 (en)

Cited By (28)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050163091A1 (en) * 2003-03-25 2005-07-28 Yukiyoshi Nakasaku Communication terminal and communication method
US20050232179A1 (en) * 2003-05-08 2005-10-20 Dacosta Francis Multiple-radio mission critical wireless mesh networks
US20070038743A1 (en) * 2005-05-17 2007-02-15 Hellhake Paul R System and method for communication in a wireless mobile ad-hoc network
WO2007040901A2 (en) * 2005-09-30 2007-04-12 Meshnetworks, Inc. System and method to discover and maintain multiple routes in a wireless communication network
US20070276956A1 (en) * 2006-05-23 2007-11-29 International Business Machines Corporation Method and system for content similarity-based message routing and subscription matching
US20080002573A1 (en) * 2006-07-03 2008-01-03 Palo Alto Research Center Incorporated Congestion management in an ad-hoc network based upon a predicted information utility
US20080172491A1 (en) * 2006-10-16 2008-07-17 Marvell Semiconductor Inc Automatic ad-hoc network creation and coalescing using wps
US20090052321A1 (en) * 2007-08-20 2009-02-26 Kamath Krishna Y Taxonomy based multiple ant colony optimization approach for routing in mobile ad hoc networks
US20090310510A1 (en) * 2008-06-13 2009-12-17 International Business Machines Corporation Future forwarding zones in ad hoc networking service
US20090323519A1 (en) * 2006-06-22 2009-12-31 Harris Corporation Mobile ad-hoc network (manet) and method for implementing multiple paths for fault tolerance
US20100177703A1 (en) * 2003-05-08 2010-07-15 Dacosta Francis Persistent Mesh for Isolated Mobile and Temporal Networking
US20100211718A1 (en) * 2009-02-17 2010-08-19 Paul Gratz Method and apparatus for congestion-aware routing in a computer interconnection network
US20110128918A1 (en) * 2008-07-30 2011-06-02 Koninklijke Philips Electronics, N.V. Method for discovering high throughput routes in wireless mesh networks
US20120134298A1 (en) * 2009-08-06 2012-05-31 Huawei Technologies Co., Ltd. Method, Device and System for Establishing On-Demand Route
US8233456B1 (en) 2006-10-16 2012-07-31 Marvell International Ltd. Power save mechanisms for dynamic ad-hoc networks
US20130211706A1 (en) * 2010-08-13 2013-08-15 Wavemarket, Inc. Systems, methods, and processor readable media for traffic flow measurement
US8619623B2 (en) 2006-08-08 2013-12-31 Marvell World Trade Ltd. Ad-hoc simple configuration
US8628420B2 (en) 2007-07-03 2014-01-14 Marvell World Trade Ltd. Location aware ad-hoc gaming
US20150067530A1 (en) * 2008-02-05 2015-03-05 Sony Corporation Display generating device, display generating method, program, and wireless communication system
US9001645B2 (en) 2006-05-17 2015-04-07 Rajant Corporation System and method for packet delivery backtracking
US9161204B2 (en) 2010-03-22 2015-10-13 Location Labs, Inc. System and method for determining mobile device location
US9308455B1 (en) * 2006-10-25 2016-04-12 Marvell International Ltd. System and method for gaming in an ad-hoc network
US20160192211A1 (en) * 2014-12-24 2016-06-30 Korea Advanced Institute Of Science And Technology Cross-layer framework in wireless mesh network using bio-inspired algorithm and operation method thereof
US10103974B2 (en) * 2016-07-12 2018-10-16 National Tsing Hua University Software-defined network controller and multipath routing method
US10425340B2 (en) 2016-04-05 2019-09-24 Teridion Technologies Ltd Global optimization and load balancing in networks
CN111343266A (en) * 2020-02-24 2020-06-26 中国工商银行股份有限公司 Route decision method and device
US10785316B2 (en) 2008-11-24 2020-09-22 MeshDynamics Evolutionary wireless networks
US11368537B2 (en) 2002-10-28 2022-06-21 Dynamic Mesh Networks, Inc. High performance wireless network

Families Citing this family (156)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7697420B1 (en) * 2002-04-15 2010-04-13 Meshnetworks, Inc. System and method for leveraging network topology for enhanced security
JP4187500B2 (en) * 2002-10-25 2008-11-26 アルパイン株式会社 Message processing apparatus and system
US6940832B2 (en) * 2003-01-17 2005-09-06 The Research Foundation Of The City University Of New York Routing method for mobile infrastructureless network
US7382765B2 (en) * 2003-04-30 2008-06-03 Harris Corporation Predictive routing in a moble ad hoc network
KR100522948B1 (en) * 2003-04-30 2005-10-24 삼성전자주식회사 Method for performing packet flooding at wireless ad hoc network
US7577107B2 (en) * 2003-06-03 2009-08-18 Palo Alto Research Center Incorporated Protocol specification for message-initiated constraint-based routing
US7577108B2 (en) * 2003-06-03 2009-08-18 Palo Alto Research Center Incorporated Learning-based strategies for message-initiated constraint-based routing
US7486627B2 (en) * 2003-06-03 2009-02-03 Palo Alto Research Center Incorporated Time-aware strategy for message-initiated constraint-based routing
US7280483B2 (en) * 2003-06-05 2007-10-09 Meshnetworks, Inc. System and method to improve the network performance of a wireless communications network by finding an optimal route between a source and a destination
US7415019B2 (en) * 2003-08-22 2008-08-19 Samsung Electronics Co., Ltd. Apparatus and method for collecting active route topology information in a mobile ad hoc network
US7672307B2 (en) * 2003-08-22 2010-03-02 Samsung Electronics Co., Ltd. Apparatus and method for transparent layer 2 routing in a mobile ad hoc network
US7394826B2 (en) * 2003-09-09 2008-07-01 Harris Corporation Mobile ad hoc network (MANET) providing quality-of-service (QoS) based unicast and multicast features
CN1599487A (en) * 2003-09-19 2005-03-23 皇家飞利浦电子股份有限公司 Routing selecting method for radio communication system and mobile terminal executing the method
GB0407144D0 (en) * 2004-03-30 2004-05-05 British Telecomm Networks
US7961636B1 (en) * 2004-05-27 2011-06-14 Cisco Technology, Inc. Vectorized software packet forwarding
GB0412494D0 (en) * 2004-06-04 2004-07-07 Nokia Corp Adaptive routing
US8929228B2 (en) * 2004-07-01 2015-01-06 Honeywell International Inc. Latency controlled redundant routing
DE602004027895D1 (en) * 2004-07-02 2010-08-12 Alcatel Lucent A method of multicast data transmission in a discontinuous network
US7656901B2 (en) * 2004-08-10 2010-02-02 Meshnetworks, Inc. Software architecture and hardware abstraction layer for multi-radio routing and method for providing the same
US8098666B2 (en) 2004-08-12 2012-01-17 Stmicroelectronics, Inc. Method and system for providing a priority-based, low-collision distributed coordination function using a super-frame structure
US7327685B2 (en) * 2004-09-10 2008-02-05 Industry-Academic Cooperation Foundation, Yoosei University Apparatus for implementation of adaptive routing in packet switched networks
US9160649B2 (en) * 2004-09-27 2015-10-13 Alcatel Lucent Method for routing traffic using traffic weighting factors
JP4208816B2 (en) * 2004-10-22 2009-01-14 キヤノン株式会社 Image heating device
JP4681270B2 (en) * 2004-10-27 2011-05-11 株式会社日立製作所 Wireless communication system for vehicle control
JP4499794B2 (en) * 2004-11-03 2010-07-07 テレフオンアクチーボラゲット エル エム エリクソン(パブル) Dynamic network management
US7609641B2 (en) * 2004-11-05 2009-10-27 Meshnetworks, Inc. System and method for providing a congestion-aware routing metric for selecting a route between nodes in a multihopping communication network
US7512074B2 (en) * 2004-11-12 2009-03-31 Motorola, Inc. System and method to scout for routes in a wireless network
KR100703726B1 (en) * 2004-12-11 2007-04-05 삼성전자주식회사 Method for managing neighbor node and determining routing path in mobile ad hoc network, and network apparatus thereof
DE602004031788D1 (en) 2004-12-29 2011-04-21 Ericsson Telefon Ab L M NETWORK
US7828202B2 (en) * 2005-02-24 2010-11-09 E-Courier (Belize), Inc. System and method for controlling the transport of articles
JP2008546328A (en) * 2005-06-06 2008-12-18 モビディア インコーポレイテッド Scheduled packet delivery system and method
US7515544B2 (en) * 2005-07-14 2009-04-07 Tadaaki Chigusa Method and system for providing location-based addressing
WO2007049826A2 (en) * 2005-10-28 2007-05-03 Matsushita Electric Industrial Co., Ltd. Tunneling loop detection control apparatus
US8483616B1 (en) 2005-11-01 2013-07-09 At&T Intellectual Property Ii, L.P. Non-interference technique for spatially aware mobile ad hoc networking
US7525933B1 (en) 2005-11-30 2009-04-28 At&T Intellectual Property Ii, L.P. System and method for mobile ad hoc network
US8149801B2 (en) * 2007-08-17 2012-04-03 At&T Intellectual Property Ii, L.P. System and method for geocasting in a mobile ad hoc network
US8702506B2 (en) * 2005-11-30 2014-04-22 At&T Intellectual Property I, L.P. Geogame for mobile device
US8355410B2 (en) 2007-08-17 2013-01-15 At&T Intellectual Property I, L.P. Location-based mobile gaming application and method for implementing the same using a scalable tiered geocast protocol
US8777752B2 (en) 2005-11-30 2014-07-15 At&T Intellectual Property I, L.P. Geogame for mobile device
US7917169B1 (en) 2005-11-30 2011-03-29 At&T Intellectual Property Ii, L.P. System and method for mobile ad hoc network
US8243603B2 (en) * 2005-12-07 2012-08-14 Motorola Solutions, Inc. Method and system for improving a wireless communication route
WO2007066817A1 (en) * 2005-12-08 2007-06-14 Matsushita Electric Industrial Co., Ltd. Routing loop detection control apparatus
KR100683502B1 (en) 2005-12-08 2007-02-15 한국전자통신연구원 Mobile wireless access router for controlling separately traffic signal and control signal
ATE460818T1 (en) * 2005-12-22 2010-03-15 Trentino Sviluppo Spa NETWORK ARCHITECTURE FOR DATA COMMUNICATION
US20070156879A1 (en) * 2006-01-03 2007-07-05 Klein Steven E Considering remote end point performance to select a remote end point to use to transmit a task
KR100755706B1 (en) * 2006-01-17 2007-09-05 삼성전자주식회사 Method and apparatus for providing distributed service composition model for ad hoc networks
DE102006014910A1 (en) * 2006-03-30 2007-10-04 Siemens Ag Message path distance value determining method for use in ad hoc on demand distance vector routing process, involves determining link distance value for path link and determining path distance value from link distance value
DE102006018281B4 (en) * 2006-04-20 2017-12-28 Merten Gmbh Method for installing a radio system in a building
US7756134B2 (en) * 2006-05-02 2010-07-13 Harris Corporation Systems and methods for close queuing to support quality of service
US7894509B2 (en) 2006-05-18 2011-02-22 Harris Corporation Method and system for functional redundancy based quality of service
US20070280174A1 (en) * 2006-06-03 2007-12-06 Ngan-Cheung Pun Small Geographical Area Cell-based Dynamic Source Routing for Mobil Ad-hoc Networks
IL176331A (en) * 2006-06-15 2011-06-30 Rafael Advanced Defense Sys Ad hoc communications network employing multi-hop routing
US7990860B2 (en) * 2006-06-16 2011-08-02 Harris Corporation Method and system for rule-based sequencing for QoS
US8064464B2 (en) * 2006-06-16 2011-11-22 Harris Corporation Method and system for inbound content-based QoS
US7856012B2 (en) 2006-06-16 2010-12-21 Harris Corporation System and methods for generic data transparent rules to support quality of service
US8516153B2 (en) 2006-06-16 2013-08-20 Harris Corporation Method and system for network-independent QoS
US20070291656A1 (en) * 2006-06-16 2007-12-20 Harris Corporation Method and system for outbound content-based QoS
US7916626B2 (en) * 2006-06-19 2011-03-29 Harris Corporation Method and system for fault-tolerant quality of service
US8730981B2 (en) 2006-06-20 2014-05-20 Harris Corporation Method and system for compression based quality of service
US7769028B2 (en) * 2006-06-21 2010-08-03 Harris Corporation Systems and methods for adaptive throughput management for event-driven message-based data
US7620003B2 (en) * 2006-06-28 2009-11-17 Motorola, Inc. System and method of operation of a communication network
US8289965B2 (en) 2006-10-19 2012-10-16 Embarq Holdings Company, Llc System and method for establishing a communications session with an end-user based on the state of a network connection
US8477614B2 (en) 2006-06-30 2013-07-02 Centurylink Intellectual Property Llc System and method for routing calls if potential call paths are impaired or congested
US8000318B2 (en) 2006-06-30 2011-08-16 Embarq Holdings Company, Llc System and method for call routing based on transmission performance of a packet network
US8194643B2 (en) 2006-10-19 2012-06-05 Embarq Holdings Company, Llc System and method for monitoring the connection of an end-user to a remote network
US8717911B2 (en) 2006-06-30 2014-05-06 Centurylink Intellectual Property Llc System and method for collecting network performance information
US8488447B2 (en) 2006-06-30 2013-07-16 Centurylink Intellectual Property Llc System and method for adjusting code speed in a transmission path during call set-up due to reduced transmission performance
US9094257B2 (en) 2006-06-30 2015-07-28 Centurylink Intellectual Property Llc System and method for selecting a content delivery network
US7948909B2 (en) 2006-06-30 2011-05-24 Embarq Holdings Company, Llc System and method for resetting counters counting network performance information at network communications devices on a packet network
EP2039073A1 (en) * 2006-07-07 2009-03-25 Panasonic Corporation Apparatus for controlling tunneling loop detection
ES2302438B1 (en) * 2006-07-10 2009-05-21 Universitat Politecnica De Catalunya SYSTEM AND PROCEDURE TO ROUTE A DATA PACKAGE IN A WIRELESS NETWORK, COMPUTER SYSTEM IN A SYSTEM TO ROUTE A DATA PACKAGE IN A WIRELESS NETWORK, AND PROCEDURE TO ROUTE A DATA PACKAGE IN A COMPUTER SYSTEM.
EP1883184A1 (en) * 2006-07-28 2008-01-30 NTT DoCoMo, Inc. Method and apparatus for routing a message
US8300653B2 (en) 2006-07-31 2012-10-30 Harris Corporation Systems and methods for assured communications with quality of service
US7684332B2 (en) 2006-08-22 2010-03-23 Embarq Holdings Company, Llc System and method for adjusting the window size of a TCP packet through network elements
US8015294B2 (en) 2006-08-22 2011-09-06 Embarq Holdings Company, LP Pin-hole firewall for communicating data packets on a packet network
US8223654B2 (en) 2006-08-22 2012-07-17 Embarq Holdings Company, Llc Application-specific integrated circuit for monitoring and optimizing interlayer network performance
US8189468B2 (en) 2006-10-25 2012-05-29 Embarq Holdings, Company, LLC System and method for regulating messages between networks
US8743703B2 (en) 2006-08-22 2014-06-03 Centurylink Intellectual Property Llc System and method for tracking application resource usage
US8619600B2 (en) * 2006-08-22 2013-12-31 Centurylink Intellectual Property Llc System and method for establishing calls over a call path having best path metrics
US8228791B2 (en) 2006-08-22 2012-07-24 Embarq Holdings Company, Llc System and method for routing communications between packet networks based on intercarrier agreements
US8064391B2 (en) 2006-08-22 2011-11-22 Embarq Holdings Company, Llc System and method for monitoring and optimizing network performance to a wireless device
US9479341B2 (en) 2006-08-22 2016-10-25 Centurylink Intellectual Property Llc System and method for initiating diagnostics on a packet network node
US8144587B2 (en) 2006-08-22 2012-03-27 Embarq Holdings Company, Llc System and method for load balancing network resources using a connection admission control engine
US8576722B2 (en) 2006-08-22 2013-11-05 Centurylink Intellectual Property Llc System and method for modifying connectivity fault management packets
US8238253B2 (en) 2006-08-22 2012-08-07 Embarq Holdings Company, Llc System and method for monitoring interlayer devices and optimizing network performance
US7940735B2 (en) 2006-08-22 2011-05-10 Embarq Holdings Company, Llc System and method for selecting an access point
US8407765B2 (en) 2006-08-22 2013-03-26 Centurylink Intellectual Property Llc System and method for restricting access to network performance information tables
US8125897B2 (en) 2006-08-22 2012-02-28 Embarq Holdings Company Lp System and method for monitoring and optimizing network performance with user datagram protocol network performance information packets
US8040811B2 (en) 2006-08-22 2011-10-18 Embarq Holdings Company, Llc System and method for collecting and managing network performance information
US8307065B2 (en) 2006-08-22 2012-11-06 Centurylink Intellectual Property Llc System and method for remotely controlling network operators
US7808918B2 (en) 2006-08-22 2010-10-05 Embarq Holdings Company, Llc System and method for dynamically shaping network traffic
US8224255B2 (en) 2006-08-22 2012-07-17 Embarq Holdings Company, Llc System and method for managing radio frequency windows
US8098579B2 (en) 2006-08-22 2012-01-17 Embarq Holdings Company, LP System and method for adjusting the window size of a TCP packet through remote network elements
US8274905B2 (en) 2006-08-22 2012-09-25 Embarq Holdings Company, Llc System and method for displaying a graph representative of network performance over a time period
US8537695B2 (en) 2006-08-22 2013-09-17 Centurylink Intellectual Property Llc System and method for establishing a call being received by a trunk on a packet network
US8199653B2 (en) 2006-08-22 2012-06-12 Embarq Holdings Company, Llc System and method for communicating network performance information over a packet network
US8144586B2 (en) 2006-08-22 2012-03-27 Embarq Holdings Company, Llc System and method for controlling network bandwidth with a connection admission control engine
US8130793B2 (en) 2006-08-22 2012-03-06 Embarq Holdings Company, Llc System and method for enabling reciprocal billing for different types of communications over a packet network
US8107366B2 (en) 2006-08-22 2012-01-31 Embarq Holdings Company, LP System and method for using centralized network performance tables to manage network communications
US8531954B2 (en) 2006-08-22 2013-09-10 Centurylink Intellectual Property Llc System and method for handling reservation requests with a connection admission control engine
US7843831B2 (en) 2006-08-22 2010-11-30 Embarq Holdings Company Llc System and method for routing data on a packet network
US8223655B2 (en) 2006-08-22 2012-07-17 Embarq Holdings Company, Llc System and method for provisioning resources of a packet network based on collected network performance information
US8194555B2 (en) 2006-08-22 2012-06-05 Embarq Holdings Company, Llc System and method for using distributed network performance information tables to manage network communications
US8750158B2 (en) 2006-08-22 2014-06-10 Centurylink Intellectual Property Llc System and method for differentiated billing
US8549405B2 (en) 2006-08-22 2013-10-01 Centurylink Intellectual Property Llc System and method for displaying a graphical representation of a network to identify nodes and node segments on the network that are not operating normally
US7889660B2 (en) 2006-08-22 2011-02-15 Embarq Holdings Company, Llc System and method for synchronizing counters on an asynchronous packet communications network
US8457005B2 (en) * 2006-11-08 2013-06-04 Trellisware Technologies, Inc. Method and system for establishing cooperative routing in wireless networks
US8588126B2 (en) 2006-11-08 2013-11-19 Trellisware Technologies, Inc. Methods and apparatus for network communication via barrage relay onto an independent medium allocation
US8509140B2 (en) * 2006-11-21 2013-08-13 Honeywell International Inc. System and method for transmitting information using aircraft as transmission relays
US7849139B2 (en) 2007-05-02 2010-12-07 Ouri Wolfson Adaptive search in mobile peer-to-peer databases
KR100853998B1 (en) 2007-05-02 2008-08-25 주식회사 플레넷 Networking method for communication-fail self-recovering of power line communication
US20090303888A1 (en) * 2007-05-03 2009-12-10 Honeywell International Inc. Method and system for optimizing wireless networks through feedback and adaptation
US8111692B2 (en) 2007-05-31 2012-02-07 Embarq Holdings Company Llc System and method for modifying network traffic
US8233905B2 (en) 2007-06-15 2012-07-31 Silver Spring Networks, Inc. Load management in wireless mesh communications networks
US7729263B2 (en) * 2007-08-08 2010-06-01 Honeywell International Inc. Aircraft data link network routing
US8200270B2 (en) * 2007-08-20 2012-06-12 Honeywell International Inc. Method for adusting power at a node
US7899483B2 (en) * 2007-10-08 2011-03-01 Honeywell International Inc. Method and system for performing distributed outer loop power control in wireless communication networks
US9264126B2 (en) * 2007-10-19 2016-02-16 Honeywell International Inc. Method to establish and maintain an aircraft ad-hoc communication network
US8811265B2 (en) * 2007-10-19 2014-08-19 Honeywell International Inc. Ad-hoc secure communication networking based on formation flight technology
US8570990B2 (en) * 2007-12-04 2013-10-29 Honeywell International Inc. Travel characteristics-based ad-hoc communication network algorithm selection
US9467221B2 (en) * 2008-02-04 2016-10-11 Honeywell International Inc. Use of alternate communication networks to complement an ad-hoc mobile node to mobile node communication network
US20090252102A1 (en) * 2008-02-27 2009-10-08 Seidel Scott Y Methods and systems for a mobile, broadband, routable internet
US8107387B2 (en) * 2008-03-25 2012-01-31 Honeywell International Inc. Method to operate a wireless network having a predictable and stable performance
US20110164527A1 (en) * 2008-04-04 2011-07-07 Mishra Rajesh K Enhanced wireless ad hoc communication techniques
US20100150027A1 (en) * 2008-04-04 2010-06-17 Peter Atwal Systems and methods of planning and deploying an ad hoc mobile wireless network
MX2010010913A (en) * 2008-04-04 2010-12-21 Powerwave Cognition Inc Methods and systems for a mobile, broadband, routable internet.
US8300615B2 (en) 2008-04-04 2012-10-30 Powerwave Cognition, Inc. Synchronization of time in a mobile ad-hoc network
US8068425B2 (en) 2008-04-09 2011-11-29 Embarq Holdings Company, Llc System and method for using network performance information to determine improved measures of path states
US20090318138A1 (en) * 2008-06-20 2009-12-24 Honeywell International Inc. System and method for in-flight wireless communication
US8190147B2 (en) * 2008-06-20 2012-05-29 Honeywell International Inc. Internetworking air-to-air network and wireless network
US20110164546A1 (en) * 2008-09-04 2011-07-07 Mishra Rajesh K Vehicular mobility vector based routing
US9544922B2 (en) 2008-09-16 2017-01-10 At&T Intellectual Property I, L.P. Quality of service scheme for collision-based wireless networks
US9166906B2 (en) * 2008-12-15 2015-10-20 Intergraph Corporation Routing method in asymmetric networks
US9014008B2 (en) * 2009-08-12 2015-04-21 Empire Technology Development Llc Forward-looking probabilistic statistical routing for wireless ad-hoc networks with lossy links
US9118428B2 (en) * 2009-11-04 2015-08-25 At&T Intellectual Property I, L.P. Geographic advertising using a scalable wireless geocast protocol
WO2011114627A1 (en) * 2010-03-17 2011-09-22 日本電気株式会社 Path selecting method, information processing apparatus, network system, and path selecting program
US8712056B2 (en) 2010-06-03 2014-04-29 At&T Intellectual Property I, L.P. Secure mobile ad hoc network
US10016684B2 (en) 2010-10-28 2018-07-10 At&T Intellectual Property I, L.P. Secure geographic based gaming
US9054978B2 (en) * 2011-02-07 2015-06-09 Nec Corporation Path selection method and control server
US9319842B2 (en) 2011-06-27 2016-04-19 At&T Intellectual Property I, L.P. Mobile device configured point and shoot type weapon
US9161158B2 (en) 2011-06-27 2015-10-13 At&T Intellectual Property I, L.P. Information acquisition using a scalable wireless geocast protocol
US9495870B2 (en) 2011-10-20 2016-11-15 At&T Intellectual Property I, L.P. Vehicular communications using a scalable ad hoc geographic routing protocol
US8744419B2 (en) 2011-12-15 2014-06-03 At&T Intellectual Property, I, L.P. Media distribution via a scalable ad hoc geographic protocol
US9071451B2 (en) 2012-07-31 2015-06-30 At&T Intellectual Property I, L.P. Geocast-based situation awareness
JP5914245B2 (en) * 2012-08-10 2016-05-11 株式会社日立製作所 Load balancing method considering each node of multiple layers
US9210589B2 (en) 2012-10-09 2015-12-08 At&T Intellectual Property I, L.P. Geocast protocol for wireless sensor network
US9660745B2 (en) 2012-12-12 2017-05-23 At&T Intellectual Property I, L.P. Geocast-based file transfer
US9992021B1 (en) 2013-03-14 2018-06-05 GoTenna, Inc. System and method for private and point-to-point communication between computing devices
WO2015139026A2 (en) 2014-03-14 2015-09-17 Go Tenna Inc. System and method for digital communication between computing devices
US9510152B2 (en) 2014-04-11 2016-11-29 Location Labs, Inc. System and method for scheduling location measurements
JP6459558B2 (en) * 2015-01-27 2019-01-30 富士通株式会社 Wireless communication apparatus, wireless communication method, and wireless communication program
US10813169B2 (en) 2018-03-22 2020-10-20 GoTenna, Inc. Mesh network deployment kit
CN108990082A (en) * 2018-08-21 2018-12-11 天津理工大学 A kind of multi-path routing method predicted based on link existent time and energy consumption
CN110809305B (en) * 2019-11-11 2023-06-09 天津津航计算技术研究所 Multi-node low-overhead wireless routing method
JP2022091482A (en) * 2020-12-09 2022-06-21 株式会社東芝 Information processing device, information processing method, program, and information processing system
CN114900461A (en) * 2022-05-10 2022-08-12 国网浙江省电力有限公司信息通信分公司 Power communication network routing optimization method and device considering information physical fusion characteristics

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5416721A (en) * 1991-01-18 1995-05-16 Matsushita Electric Industrial Co., Ltd. Method of and system for automatically generating network diagrams
US5987011A (en) * 1996-08-30 1999-11-16 Chai-Keong Toh Routing method for Ad-Hoc mobile networks
US6304556B1 (en) * 1998-08-24 2001-10-16 Cornell Research Foundation, Inc. Routing and mobility management protocols for ad-hoc networks
US6338087B1 (en) * 1996-12-27 2002-01-08 Nec Corporation Method of setting up ad hoc local network, method of communicating using said network, and terminal for use with said network
US20020083194A1 (en) * 2000-11-04 2002-06-27 Bak Sang Man Routing method for traffic load distribution in packet-switched network
US20020101875A1 (en) * 2000-10-13 2002-08-01 King-Shan Lui Spanning tree alternate routing bridge protocol
US6940832B2 (en) * 2003-01-17 2005-09-06 The Research Foundation Of The City University Of New York Routing method for mobile infrastructureless network
US7280481B2 (en) * 2002-10-10 2007-10-09 Guangyi David Rong Shortest path search method “Midway”

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5412654A (en) * 1994-01-10 1995-05-02 International Business Machines Corporation Highly dynamic destination-sequenced destination vector routing for mobile computers
US6535498B1 (en) * 1999-12-06 2003-03-18 Telefonaktiebolaget Lm Ericsson (Publ) Route updating in ad-hoc networks
US6718394B2 (en) * 2002-04-29 2004-04-06 Harris Corporation Hierarchical mobile ad-hoc network and methods for performing reactive routing therein using ad-hoc on-demand distance vector routing (AODV)

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5416721A (en) * 1991-01-18 1995-05-16 Matsushita Electric Industrial Co., Ltd. Method of and system for automatically generating network diagrams
US5987011A (en) * 1996-08-30 1999-11-16 Chai-Keong Toh Routing method for Ad-Hoc mobile networks
US6338087B1 (en) * 1996-12-27 2002-01-08 Nec Corporation Method of setting up ad hoc local network, method of communicating using said network, and terminal for use with said network
US6304556B1 (en) * 1998-08-24 2001-10-16 Cornell Research Foundation, Inc. Routing and mobility management protocols for ad-hoc networks
US20020101875A1 (en) * 2000-10-13 2002-08-01 King-Shan Lui Spanning tree alternate routing bridge protocol
US20020083194A1 (en) * 2000-11-04 2002-06-27 Bak Sang Man Routing method for traffic load distribution in packet-switched network
US7280481B2 (en) * 2002-10-10 2007-10-09 Guangyi David Rong Shortest path search method “Midway”
US6940832B2 (en) * 2003-01-17 2005-09-06 The Research Foundation Of The City University Of New York Routing method for mobile infrastructureless network

Cited By (52)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11368537B2 (en) 2002-10-28 2022-06-21 Dynamic Mesh Networks, Inc. High performance wireless network
US20050163091A1 (en) * 2003-03-25 2005-07-28 Yukiyoshi Nakasaku Communication terminal and communication method
US7397771B2 (en) * 2003-03-25 2008-07-08 Fujitsu Limited Communication terminal and communication method
US20050232179A1 (en) * 2003-05-08 2005-10-20 Dacosta Francis Multiple-radio mission critical wireless mesh networks
US20100177703A1 (en) * 2003-05-08 2010-07-15 Dacosta Francis Persistent Mesh for Isolated Mobile and Temporal Networking
US8520691B2 (en) 2003-05-08 2013-08-27 Mesh Dynamics, Inc. Persistent mesh for isolated mobile and temporal networking
US20070038743A1 (en) * 2005-05-17 2007-02-15 Hellhake Paul R System and method for communication in a wireless mobile ad-hoc network
US8341289B2 (en) 2005-05-17 2012-12-25 Rajant Corporation System and method for communication in a wireless mobile ad-hoc network
US20110085530A1 (en) * 2005-05-17 2011-04-14 Hellhake Paul R System and method for communication in a wireless mobile ad-hoc network
WO2007040901A3 (en) * 2005-09-30 2007-06-07 Meshnetworks Inc System and method to discover and maintain multiple routes in a wireless communication network
WO2007040901A2 (en) * 2005-09-30 2007-04-12 Meshnetworks, Inc. System and method to discover and maintain multiple routes in a wireless communication network
US9001645B2 (en) 2006-05-17 2015-04-07 Rajant Corporation System and method for packet delivery backtracking
US20080215751A1 (en) * 2006-05-23 2008-09-04 Chitra Dorai Method and system for content similarity-based message routing and subscription matching
US7487260B2 (en) * 2006-05-23 2009-02-03 International Business Machines Corporation Method and system for content similarity-based message routing and subscription matching
WO2007139662A3 (en) * 2006-05-23 2008-08-14 Ibm Method and system for content similarity-based message routing and subscription matching
US20070276956A1 (en) * 2006-05-23 2007-11-29 International Business Machines Corporation Method and system for content similarity-based message routing and subscription matching
US7904591B2 (en) * 2006-05-23 2011-03-08 International Business Machines Corporation Method and system for content similarity-based message routing and subscription matching
US20090323519A1 (en) * 2006-06-22 2009-12-31 Harris Corporation Mobile ad-hoc network (manet) and method for implementing multiple paths for fault tolerance
US7742399B2 (en) * 2006-06-22 2010-06-22 Harris Corporation Mobile ad-hoc network (MANET) and method for implementing multiple paths for fault tolerance
US7966419B2 (en) * 2006-07-03 2011-06-21 Palo Alto Research Center Incorporated Congestion management in an ad-hoc network based upon a predicted information utility
US20080002573A1 (en) * 2006-07-03 2008-01-03 Palo Alto Research Center Incorporated Congestion management in an ad-hoc network based upon a predicted information utility
US9019866B2 (en) 2006-08-08 2015-04-28 Marvell World Trade Ltd. Ad-hoc simple configuration
US8619623B2 (en) 2006-08-08 2013-12-31 Marvell World Trade Ltd. Ad-hoc simple configuration
US9374785B1 (en) 2006-10-16 2016-06-21 Marvell International Ltd. Power save mechanisms for dynamic ad-hoc networks
US9444874B2 (en) 2006-10-16 2016-09-13 Marvell International Ltd. Automatic Ad-Hoc network creation and coalescing using WPS
US20080172491A1 (en) * 2006-10-16 2008-07-17 Marvell Semiconductor Inc Automatic ad-hoc network creation and coalescing using wps
US8732315B2 (en) 2006-10-16 2014-05-20 Marvell International Ltd. Automatic ad-hoc network creation and coalescing using WiFi protected setup
US8233456B1 (en) 2006-10-16 2012-07-31 Marvell International Ltd. Power save mechanisms for dynamic ad-hoc networks
US9308455B1 (en) * 2006-10-25 2016-04-12 Marvell International Ltd. System and method for gaming in an ad-hoc network
US8628420B2 (en) 2007-07-03 2014-01-14 Marvell World Trade Ltd. Location aware ad-hoc gaming
US7760718B2 (en) * 2007-08-20 2010-07-20 Cisco Technology, Inc. Taxonomy based multiple ant colony optimization approach for routing in mobile ad hoc networks
US20090052321A1 (en) * 2007-08-20 2009-02-26 Kamath Krishna Y Taxonomy based multiple ant colony optimization approach for routing in mobile ad hoc networks
US10602423B2 (en) 2008-02-05 2020-03-24 Sony Corporation Display generating device, display generating method, and wireless communication system
US20150067530A1 (en) * 2008-02-05 2015-03-05 Sony Corporation Display generating device, display generating method, program, and wireless communication system
US10206159B2 (en) * 2008-02-05 2019-02-12 Sony Corporation Display generating device to display multi-hop network
US8121073B2 (en) * 2008-06-13 2012-02-21 International Business Machines Corporation Future forwarding zones in a network
US20090310510A1 (en) * 2008-06-13 2009-12-17 International Business Machines Corporation Future forwarding zones in ad hoc networking service
US20110128918A1 (en) * 2008-07-30 2011-06-02 Koninklijke Philips Electronics, N.V. Method for discovering high throughput routes in wireless mesh networks
US10785316B2 (en) 2008-11-24 2020-09-22 MeshDynamics Evolutionary wireless networks
US20100211718A1 (en) * 2009-02-17 2010-08-19 Paul Gratz Method and apparatus for congestion-aware routing in a computer interconnection network
US9571399B2 (en) 2009-02-17 2017-02-14 The Board Of Regents Of The University Of Texas System Method and apparatus for congestion-aware routing in a computer interconnection network
US8694704B2 (en) 2009-02-17 2014-04-08 Board Of Regents, University Of Texas Systems Method and apparatus for congestion-aware routing in a computer interconnection network
US8285900B2 (en) * 2009-02-17 2012-10-09 The Board Of Regents Of The University Of Texas System Method and apparatus for congestion-aware routing in a computer interconnection network
US9788259B2 (en) 2009-08-06 2017-10-10 Huawei Technologies Co., Ltd. Method, device and system for establishing on-demand route
US9100907B2 (en) * 2009-08-06 2015-08-04 Huawei Technologies Co., Ltd. Method, device and system for establishing on-demand route
US20120134298A1 (en) * 2009-08-06 2012-05-31 Huawei Technologies Co., Ltd. Method, Device and System for Establishing On-Demand Route
US9161204B2 (en) 2010-03-22 2015-10-13 Location Labs, Inc. System and method for determining mobile device location
US20130211706A1 (en) * 2010-08-13 2013-08-15 Wavemarket, Inc. Systems, methods, and processor readable media for traffic flow measurement
US20160192211A1 (en) * 2014-12-24 2016-06-30 Korea Advanced Institute Of Science And Technology Cross-layer framework in wireless mesh network using bio-inspired algorithm and operation method thereof
US10425340B2 (en) 2016-04-05 2019-09-24 Teridion Technologies Ltd Global optimization and load balancing in networks
US10103974B2 (en) * 2016-07-12 2018-10-16 National Tsing Hua University Software-defined network controller and multipath routing method
CN111343266A (en) * 2020-02-24 2020-06-26 中国工商银行股份有限公司 Route decision method and device

Also Published As

Publication number Publication date
US6940832B2 (en) 2005-09-06
US20040146007A1 (en) 2004-07-29
WO2004068870A3 (en) 2004-12-09
WO2004068870A2 (en) 2004-08-12

Similar Documents

Publication Publication Date Title
US6940832B2 (en) Routing method for mobile infrastructureless network
Mueller et al. Multipath routing in mobile ad hoc networks: Issues and challenges
Jain et al. An QoS aware link defined OLSR (LD-OLSR) routing protocol for MANETs
Altayeb et al. A survey of vehicular ad hoc networks routing protocols
Tilwari et al. MCLMR: A multicriteria based multipath routing in the mobile ad hoc networks
Ge et al. Quality of service routing in ad-hoc networks using OLSR
EP1500291B1 (en) Hierarchical mobile ad-hoc network and methods for route error recovery therein
EP1499989B1 (en) Reactive routing on-demand in mobile network
EP1500287B9 (en) Wireless ad-hoc network and method for performing reactive routing therein
US7281057B2 (en) Hierarchical mobile ad-hoc network and methods for performing reactive routing therein
EP1665645B1 (en) Mobile ad hoc network (manet) providing connectivity enhancement features and related methods
US7394826B2 (en) Mobile ad hoc network (MANET) providing quality-of-service (QoS) based unicast and multicast features
JP4598000B2 (en) Cost determination in multi-hop networks
US9838943B2 (en) Method of routing for wireless ad hoc and sensor networks
Devi et al. Mobile ad hoc networks and routing protocols in IoT enabled
Attia et al. Advanced greedy hybrid bio-inspired routing protocol to improve IoV
Sun et al. Adaptive QoS routing based on prediction of local performance in ad hoc networks
Sahadevaiah et al. An empirical examination of routing protocols in mobile ad hoc networks
Al-Karaki et al. End-to-end support for statistical quality of service in heterogeneous mobile ad hoc networks
Kumar et al. Simulation based performance analysis of routing protocols using random waypoint mobility model in mobile ad hoc network
Gopi et al. Energy optimized path unaware layered routing protocol for underwater sensor networks
Chaudhari et al. Multilayered distributed routing for power efficient MANET performance
Ramakrishnan et al. Mathematical modeling of routing protocol selection for optimal performance of MANET
Musyoka et al. Mutation Based Hybrid Routing Algorithm for Mobile Ad-hoc Networks
Kumar et al. Enhance the routing QoS for multimedia streaming using two-hop information in mobile ad hoc networks

Legal Events

Date Code Title Description
AS Assignment

Owner name: THE RESEARCH FOUNDATION OF THE CITY UNIVERSITY OF

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:SAADAWI, TAREK;HUSSEIN, OSAMA;REEL/FRAME:021308/0147

Effective date: 20030428

STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION