The document is a presentation on implementing node localization for wireless sensor networks. It discusses wireless sensor networks and their applications. It then covers issues related to wireless sensor networks, including localization. Localization aims to estimate the position of sensor nodes that are randomly deployed. The presentation reviews several papers on localization systems and algorithms. It discusses approaches like using beacon nodes, distance estimation techniques, and localization algorithms that involve trilateration, triangulation or Voronoi diagrams. The conclusion covers challenges in localization and potential areas of future work.
Dokumen tersebut membahas tentang proses kuantisasi yang mengubah sinyal kontinu menjadi diskrit dengan mengubah nilai sinyal menjadi nilai terbatas. Proses ini menghasilkan kesalahan kuantisasi yang tergantung pada step kuantisasi. Semakin kecil step kuantisasi akan semakin menurunkan kesalahan namun membutuhkan lebih banyak bit penyimpanan.
Makalah ini membahas tentang qashash al-qur'an atau kisah-kisah yang terdapat dalam Al-Qur'an. Secara terminologi, qashash al-Qur'an adalah kisah-kisah di dalam Al-Qur'an yang menceritakan keadaan umat-umat terdahulu dan nabi-nabi mereka serta peristiwa-peristiwa masa lampau, sekarang dan masa depan. Kisah-kisah al-Qur'an dibagi menj
Kisah-kisah dalam Al-Quran membahas berbagai topik seperti kisah para nabi, peristiwa masa lalu, dan kejadian masa depan. Tujuannya adalah untuk memberikan petunjuk kepada umat manusia dan membuktikan kebenaran agama Islam. Kisah-kisah tersebut bersifat nonfiksi dan menggambarkan peristiwa sejarah yang sesungguhnya terjadi.
This document provides an overview of call routing in GSM networks. It discusses key components like the Home Location Register (HLR) and Visitor Location Register (VLR) that store subscriber data. It then describes different call routing scenarios like mobile originated calls, mobile terminated calls, and roaming calls. It explains the signaling process and interactions between network elements like the mobile station, base station, MSC, HLR, and other switches. Finally, it briefly discusses the handover process to transfer calls between base stations when a mobile changes location.
Genesis Today interview questions and answersjuliali546
This document provides advice and tips for answering common interview questions for a position at Genesis Today. It discusses how to answer questions about weaknesses, knowledge of the company, reasons for interest in the company and position, salary requirements, and questions to ask the interviewer. The document emphasizes researching the company beforehand, linking experiences to the role, portraying enthusiasm and passion, and asking about the company rather than personal topics like salary. It also includes links to additional interview preparation materials and tips.
This document discusses two early digital codes: Baudot code and ASCII code. [1] Baudot code used 5 bits to represent 32 characters and was used in telegraph systems in the late 1800s. [2] ASCII code uses 7 bits to represent 128 characters and became widely used for data representation and transmission within computer networks. [3] Both codes allowed data to be represented digitally to facilitate transmission and processing, though ASCII provided more possible characters and became the more common standard.
Ringkasan dokumen tersebut adalah:
1. Dokumen tersebut membahas perkembangan Islam pada masa modern, khususnya pada masa pembaruan.
2. Pada masa pembaruan, Islam mampu menjadi pemimpin peradaban melalui perkembangan di bidang ajaran, ilmu pengetahuan, dan kebudayaan.
3. Perkembangan pemikiran Islam pada masa modern memiliki pengaruh besar terhadap perkembangan Islam di Indonesia, antara lain melalui m
Kisah-kisah dalam Al-Quran (Qashash Al-Quran) memberikan informasi tentang para nabi, rasul, malaikat, jin, manusia dan binatang dalam berbagai masa lampau, kini dan akan datang. Terdapat tiga jenis Qashash berdasarkan waktu dan materi serta empat jenis pelakunya. Qashash bertujuan membenarkan wahyu, memenuhi kebenaran nabi, dan menunjukkan kesatuan agama. Kisah yang sama diung
The document discusses the discrete Fourier transform (DFT) and its relationship to the discrete-time Fourier transform (DTFT) and discrete Fourier series (DFS). It begins by introducing the DTFT as a theoretical tool to evaluate frequency responses, but notes it cannot be directly computed. The DFT solves this issue by sampling the frequency spectrum. It then discusses how the DFS represents periodic discrete-time signals using complex exponentials, unlike the continuous-time Fourier series. The key properties of the DFS such as linearity, time-shifting, duality, and periodic convolution are also covered. Finally, it discusses how the continuous-time Fourier transform (CTFT) of periodic signals relates to the DFS through Poisson's sum
The document discusses handoff in cellular networks. It begins by explaining that handoff is required when a mobile moves between coverage areas of different cells during a call. The main points are:
1) The MSC must identify a new BS to handle the call and seamlessly transfer control to it, assigning the call new forward and reverse channels.
2) Important performance metrics for handoff include it being seamless to the user, minimizing unnecessary handoffs, low probability of blocking new calls in the new cell, and handing off to a channel with good signal quality.
3) Handoff involves initiation when a need is identified, reserving resources in the new cell, executing the actual handoff, and free
This document discusses digital communication systems and provides an overview of several key topics:
- It introduces line coding techniques and their properties.
- It describes the basic digital communication block diagram and advantages of digital transmission.
- It discusses intersymbol interference, equalization techniques like zero-forcing equalization, and eye patterns.
- It provides information on topics like noise immunity, regenerative repeaters, and pulse shaping to eliminate intersymbol interference.
Module 3 Part B - computer networks module 2 pptanushaj46
The document discusses several key issues in network layer design including store-and-forward packet switching, services provided to the transport layer, implementation of connectionless and connection-oriented services, and comparison of virtual-circuit and datagram networks. It also covers routing algorithms such as shortest path, flooding, distance vector, link state, and hierarchical routing.
The document discusses various layers and concepts in computer networks and internetworking. It covers the network layer and its responsibilities in delivering packets from source to destination. It then discusses services provided by the network layer to the transport layer, including connection-oriented and connectionless services. Various routing algorithms and concepts are covered such as distance vector routing, link state routing, hierarchical routing, flooding, shortest path algorithms, broadcast routing, and multicast routing.
The network layer is responsible for routing packets from source to destination using a routing algorithm. The routing algorithm must deal with issues of correctness, stability, fairness, and optimality. The network layer also handles congestion when more packets enter an area than can be processed. When connecting different network technologies, the same problems are present but are worse as packets may travel through many different networks with different formats and technologies.
1) Computer networks allow communication and sharing of resources between computer systems and devices through communication channels. There are several types of networks including LANs, WANs, and MANs.
2) For communication between systems, both must agree on a protocol which sets rules for data transmission. The two main protocol stacks are OSI and TCP/IP.
3) The network layer is responsible for delivering packets from source to destination. It uses services from the data link layer and provides services to the transport layer. Common network layer protocols are IP (Internet Protocol) for connectionless service and MPLS for connection-oriented service.
Routing algorithms in computer networks determine the best path for data transfer between nodes. There are two main types - non-adaptive algorithms which use static routes regardless of network conditions, and adaptive algorithms which can change routes dynamically based on conditions. Examples of routing algorithms include flooding, which broadcasts to all nodes, and link state routing which uses Dijkstra's algorithm to calculate the most efficient paths based on information shared between nodes.
The network layer is responsible for packet routing between different networks. It determines the best path for packet transmission and places the source and destination IP addresses in packet headers. Common routing algorithms include shortest path routing, flooding, distance vector routing, and link state routing. Shortest path routing finds the lowest cost path using algorithms like Dijkstra's. Flooding transmits packets to all neighbors, creating duplicates. Distance vector and link state routing adapt to network changes by exchanging routing information between routers.
The document discusses network layer design issues and protocols. It covers store-and-forward packet switching, the functions of the network layer including routing and congestion control. It then describes the implementation of connectionless and connection-oriented services, comparing virtual circuits and datagrams. Various routing algorithms are also summarized, such as shortest path, flooding, distance vector, and link state routing.
A routing table can be either static or dynamic. A dynamic table is updated automatically when there is a change on the internet. A routing protocol lets routers inform each other of changes. Distance vector routing uses hop counts as the metric and each router maintains a table of minimum distances. Link state routing uses flooding to disseminate link state packets and each router builds a shortest path tree to calculate routes.
This document provides an overview of call routing in GSM networks. It discusses key components like the Home Location Register (HLR) and Visitor Location Register (VLR) that store subscriber data. It then describes different call routing scenarios like mobile originated calls, mobile terminated calls, and roaming calls. It explains the signaling process and interactions between network elements like the mobile station, base station, MSC, HLR, and other switches. Finally, it briefly discusses the handover process to transfer calls between base stations when a mobile changes location.
Genesis Today interview questions and answersjuliali546
This document provides advice and tips for answering common interview questions for a position at Genesis Today. It discusses how to answer questions about weaknesses, knowledge of the company, reasons for interest in the company and position, salary requirements, and questions to ask the interviewer. The document emphasizes researching the company beforehand, linking experiences to the role, portraying enthusiasm and passion, and asking about the company rather than personal topics like salary. It also includes links to additional interview preparation materials and tips.
This document discusses two early digital codes: Baudot code and ASCII code. [1] Baudot code used 5 bits to represent 32 characters and was used in telegraph systems in the late 1800s. [2] ASCII code uses 7 bits to represent 128 characters and became widely used for data representation and transmission within computer networks. [3] Both codes allowed data to be represented digitally to facilitate transmission and processing, though ASCII provided more possible characters and became the more common standard.
Ringkasan dokumen tersebut adalah:
1. Dokumen tersebut membahas perkembangan Islam pada masa modern, khususnya pada masa pembaruan.
2. Pada masa pembaruan, Islam mampu menjadi pemimpin peradaban melalui perkembangan di bidang ajaran, ilmu pengetahuan, dan kebudayaan.
3. Perkembangan pemikiran Islam pada masa modern memiliki pengaruh besar terhadap perkembangan Islam di Indonesia, antara lain melalui m
Kisah-kisah dalam Al-Quran (Qashash Al-Quran) memberikan informasi tentang para nabi, rasul, malaikat, jin, manusia dan binatang dalam berbagai masa lampau, kini dan akan datang. Terdapat tiga jenis Qashash berdasarkan waktu dan materi serta empat jenis pelakunya. Qashash bertujuan membenarkan wahyu, memenuhi kebenaran nabi, dan menunjukkan kesatuan agama. Kisah yang sama diung
The document discusses the discrete Fourier transform (DFT) and its relationship to the discrete-time Fourier transform (DTFT) and discrete Fourier series (DFS). It begins by introducing the DTFT as a theoretical tool to evaluate frequency responses, but notes it cannot be directly computed. The DFT solves this issue by sampling the frequency spectrum. It then discusses how the DFS represents periodic discrete-time signals using complex exponentials, unlike the continuous-time Fourier series. The key properties of the DFS such as linearity, time-shifting, duality, and periodic convolution are also covered. Finally, it discusses how the continuous-time Fourier transform (CTFT) of periodic signals relates to the DFS through Poisson's sum
The document discusses handoff in cellular networks. It begins by explaining that handoff is required when a mobile moves between coverage areas of different cells during a call. The main points are:
1) The MSC must identify a new BS to handle the call and seamlessly transfer control to it, assigning the call new forward and reverse channels.
2) Important performance metrics for handoff include it being seamless to the user, minimizing unnecessary handoffs, low probability of blocking new calls in the new cell, and handing off to a channel with good signal quality.
3) Handoff involves initiation when a need is identified, reserving resources in the new cell, executing the actual handoff, and free
This document discusses digital communication systems and provides an overview of several key topics:
- It introduces line coding techniques and their properties.
- It describes the basic digital communication block diagram and advantages of digital transmission.
- It discusses intersymbol interference, equalization techniques like zero-forcing equalization, and eye patterns.
- It provides information on topics like noise immunity, regenerative repeaters, and pulse shaping to eliminate intersymbol interference.
Module 3 Part B - computer networks module 2 pptanushaj46
The document discusses several key issues in network layer design including store-and-forward packet switching, services provided to the transport layer, implementation of connectionless and connection-oriented services, and comparison of virtual-circuit and datagram networks. It also covers routing algorithms such as shortest path, flooding, distance vector, link state, and hierarchical routing.
The document discusses various layers and concepts in computer networks and internetworking. It covers the network layer and its responsibilities in delivering packets from source to destination. It then discusses services provided by the network layer to the transport layer, including connection-oriented and connectionless services. Various routing algorithms and concepts are covered such as distance vector routing, link state routing, hierarchical routing, flooding, shortest path algorithms, broadcast routing, and multicast routing.
The network layer is responsible for routing packets from source to destination using a routing algorithm. The routing algorithm must deal with issues of correctness, stability, fairness, and optimality. The network layer also handles congestion when more packets enter an area than can be processed. When connecting different network technologies, the same problems are present but are worse as packets may travel through many different networks with different formats and technologies.
1) Computer networks allow communication and sharing of resources between computer systems and devices through communication channels. There are several types of networks including LANs, WANs, and MANs.
2) For communication between systems, both must agree on a protocol which sets rules for data transmission. The two main protocol stacks are OSI and TCP/IP.
3) The network layer is responsible for delivering packets from source to destination. It uses services from the data link layer and provides services to the transport layer. Common network layer protocols are IP (Internet Protocol) for connectionless service and MPLS for connection-oriented service.
Routing algorithms in computer networks determine the best path for data transfer between nodes. There are two main types - non-adaptive algorithms which use static routes regardless of network conditions, and adaptive algorithms which can change routes dynamically based on conditions. Examples of routing algorithms include flooding, which broadcasts to all nodes, and link state routing which uses Dijkstra's algorithm to calculate the most efficient paths based on information shared between nodes.
The network layer is responsible for packet routing between different networks. It determines the best path for packet transmission and places the source and destination IP addresses in packet headers. Common routing algorithms include shortest path routing, flooding, distance vector routing, and link state routing. Shortest path routing finds the lowest cost path using algorithms like Dijkstra's. Flooding transmits packets to all neighbors, creating duplicates. Distance vector and link state routing adapt to network changes by exchanging routing information between routers.
The document discusses network layer design issues and protocols. It covers store-and-forward packet switching, the functions of the network layer including routing and congestion control. It then describes the implementation of connectionless and connection-oriented services, comparing virtual circuits and datagrams. Various routing algorithms are also summarized, such as shortest path, flooding, distance vector, and link state routing.
A routing table can be either static or dynamic. A dynamic table is updated automatically when there is a change on the internet. A routing protocol lets routers inform each other of changes. Distance vector routing uses hop counts as the metric and each router maintains a table of minimum distances. Link state routing uses flooding to disseminate link state packets and each router builds a shortest path tree to calculate routes.
1) Computer networks allow computers to communicate and share resources by connecting them through communication channels. There are several types of networks including LANs, WANs, and MANs.
2) For communication between computers on a network, both sides must agree on protocols which are sets of rules that govern data transmission. The two main protocol stacks are OSI and TCP/IP.
3) The network layer is responsible for delivering packets from source to destination by choosing appropriate paths through routers. It provides connectionless and connection-oriented services to the transport layer above it.
The network layer is responsible for end-to-end packet transmission across multiple hops between source and destination machines. It uses routing algorithms to decide the optimal path for packet forwarding. Common routing algorithms include distance vector routing where each router shares its routing table with neighbors, and link state routing where each router floods information about connected links to other routers which then compute the shortest paths. Hierarchical routing reduces routing table sizes by grouping routers into regions. Broadcast and multicast routing are used to transmit packets from one source to multiple destinations.
Solving QoS multicast routing problem using ACO algorithmAbdullaziz Tagawy
The document discusses using an ant colony optimization (ACO) algorithm to solve the quality of service (QoS) constrained multicast routing problem. The ACO algorithm is inspired by how real ants find the shortest path to food sources. In the algorithm, artificial ants probabilistically construct multicast trees and update pheromone values on the paths/edges to gradually converge on high quality solutions. The document provides details of the ACO algorithm and gives an example of applying it to find the shortest path between a source and destination node to demonstrate how it works.
The document discusses network layer concepts including network layer design issues, routing algorithms, and protocols. It provides 3 key points:
1) The network layer is responsible for delivering packets between endpoints over multiple links using store-and-forward packet switching. It implements both connectionless and connection-oriented services for the transport layer.
2) Common routing algorithms discussed include shortest path algorithms like Dijkstra's algorithm, flooding, and distance vector routing. Flooding broadcasts all packets while distance vector uses the Bellman-Ford equation to iteratively calculate the shortest paths.
3) Protocols discussed include IPv4, IPv6, ARP, RARP, DHCP, and ICMP. Connectionless transmission uses datagrams while connection
What are the only force you have become too much of work and all I can be done by my name Vishnu namaste I have to do you have to do you have to do you have to do you have to.
This document summarizes a research paper that proposes using swarm intelligence algorithms to develop a compact routing mechanism for multipath networks. It aims to decrease the size of routing lists at each node by dividing traffic across multiple paths instead of using a single path. The document provides background on routing techniques and swarm intelligence. It then describes how the proposed method uses a particle swarm optimization algorithm to find the shortest path between nodes and minimize the size of routing tables by updating particle positions and velocities in an iterative process. The goal is to design effective and scalable routing algorithms for large networks inspired by collective behaviors in natural systems.
Network routing algorithms aim to optimize two key performance measures: throughput (quantity of service) and average packet delay (quality of service). Adaptive routing algorithms dynamically change routes based on current network conditions, while nonadaptive algorithms use static routes. Common routing algorithms include shortest path routing, distance vector routing, link state routing, and flooding. Challenges include balancing optimality, fairness, and preventing problems like congestion.
The document discusses routing algorithms used in computer networks. It describes how routing algorithms determine the path that packets take from source to destination. Dynamic routing algorithms adapt to changing network conditions by updating routing tables. Common dynamic algorithms include distance vector routing and link state routing. The document also covers challenges like routing in hierarchical networks, broadcast routing, multicast routing, and routing for mobile and ad-hoc networks.
The document discusses distance vector routing, which is a type of dynamic routing. In distance vector routing, each router maintains a routing table showing the minimum distance to every other router in the network and the next hop to reach each destination. The routers periodically broadcast their routing tables to each other so that the tables can be updated to reflect the shortest paths. An example shows a network of five routers and their routing tables, with each table listing the shortest distance and next hop to reach every other router. Distance vector routing finds the least-cost route between any two routers by choosing the route with the minimum distance.
Welcome to the May 2025 edition of WIPAC Monthly celebrating the 14th anniversary of the WIPAC Group and WIPAC monthly.
In this edition along with the usual news from around the industry we have three great articles for your contemplation
Firstly from Michael Dooley we have a feature article about ammonia ion selective electrodes and their online applications
Secondly we have an article from myself which highlights the increasing amount of wastewater monitoring and asks "what is the overall" strategy or are we installing monitoring for the sake of monitoring
Lastly we have an article on data as a service for resilient utility operations and how it can be used effectively.
This research presents the optimization techniques for reinforced concrete waffle slab design because the EC2 code cannot provide an efficient and optimum design. Waffle slab is mostly used where there is necessity to avoid column interfering the spaces or for a slab with large span or as an aesthetic purpose. Design optimization has been carried out here with MATLAB, using genetic algorithm. The objective function include the overall cost of reinforcement, concrete and formwork while the variables comprise of the depth of the rib including the topping thickness, rib width, and ribs spacing. The optimization constraints are the minimum and maximum areas of steel, flexural moment capacity, shear capacity and the geometry. The optimized cost and slab dimensions are obtained through genetic algorithm in MATLAB. The optimum steel ratio is 2.2% with minimum slab dimensions. The outcomes indicate that the design of reinforced concrete waffle slabs can be effectively carried out using the optimization process of genetic algorithm.
David Boutry - Specializes In AWS, Microservices And Python.pdfDavid Boutry
With over eight years of experience, David Boutry specializes in AWS, microservices, and Python. As a Senior Software Engineer in New York, he spearheaded initiatives that reduced data processing times by 40%. His prior work in Seattle focused on optimizing e-commerce platforms, leading to a 25% sales increase. David is committed to mentoring junior developers and supporting nonprofit organizations through coding workshops and software development.
Design of Variable Depth Single-Span Post.pdfKamel Farid
Hunched Single Span Bridge: -
(HSSBs) have maximum depth at ends and minimum depth at midspan.
Used for long-span river crossings or highway overpasses when:
Aesthetically pleasing shape is required or
Vertical clearance needs to be maximized
The use of huge quantity of natural fine aggregate (NFA) and cement in civil construction work which have given rise to various ecological problems. The industrial waste like Blast furnace slag (GGBFS), fly ash, metakaolin, silica fume can be used as partly replacement for cement and manufactured sand obtained from crusher, was partly used as fine aggregate. In this work, MATLAB software model is developed using neural network toolbox to predict the flexural strength of concrete made by using pozzolanic materials and partly replacing natural fine aggregate (NFA) by Manufactured sand (MS). Flexural strength was experimentally calculated by casting beams specimens and results obtained from experiment were used to develop the artificial neural network (ANN) model. Total 131 results values were used to modeling formation and from that 30% data record was used for testing purpose and 70% data record was used for training purpose. 25 input materials properties were used to find the 28 days flexural strength of concrete obtained from partly replacing cement with pozzolans and partly replacing natural fine aggregate (NFA) by manufactured sand (MS). The results obtained from ANN model provides very strong accuracy to predict flexural strength of concrete obtained from partly replacing cement with pozzolans and natural fine aggregate (NFA) by manufactured sand.
Empowering Electric Vehicle Charging Infrastructure with Renewable Energy Int...AI Publications
The escalating energy crisis, heightened environmental awareness and the impacts of climate change have driven global efforts to reduce carbon emissions. A key strategy in this transition is the adoption of green energy technologies particularly for charging electric vehicles (EVs). According to the U.S. Department of Energy, EVs utilize approximately 60% of their input energy during operation, twice the efficiency of conventional fossil fuel vehicles. However, the environmental benefits of EVs are heavily dependent on the source of electricity used for charging. This study examines the potential of renewable energy (RE) as a sustainable alternative for electric vehicle (EV) charging by analyzing several critical dimensions. It explores the current RE sources used in EV infrastructure, highlighting global adoption trends, their advantages, limitations, and the leading nations in this transition. It also evaluates supporting technologies such as energy storage systems, charging technologies, power electronics, and smart grid integration that facilitate RE adoption. The study reviews RE-enabled smart charging strategies implemented across the industry to meet growing global EV energy demands. Finally, it discusses key challenges and prospects associated with grid integration, infrastructure upgrades, standardization, maintenance, cybersecurity, and the optimization of energy resources. This review aims to serve as a foundational reference for stakeholders and researchers seeking to advance the sustainable development of RE based EV charging systems.
Construction Materials (Paints) in Civil EngineeringLavish Kashyap
This file will provide you information about various types of Paints in Civil Engineering field under Construction Materials.
It will be very useful for all Civil Engineering students who wants to search about various Construction Materials used in Civil Engineering field.
Paint is a vital construction material used for protecting surfaces and enhancing the aesthetic appeal of buildings and structures. It consists of several components, including pigments (for color), binders (to hold the pigment together), solvents or thinners (to adjust viscosity), and additives (to improve properties like durability and drying time).
Paint is one of the material used in Civil Engineering field. It is especially used in final stages of construction project.
Paint plays a dual role in construction: it protects building materials and contributes to the overall appearance and ambiance of a space.
Jacob Murphy Australia - Excels In Optimizing Software ApplicationsJacob Murphy Australia
In the world of technology, Jacob Murphy Australia stands out as a Junior Software Engineer with a passion for innovation. Holding a Bachelor of Science in Computer Science from Columbia University, Jacob's forte lies in software engineering and object-oriented programming. As a Freelance Software Engineer, he excels in optimizing software applications to deliver exceptional user experiences and operational efficiency. Jacob thrives in collaborative environments, actively engaging in design and code reviews to ensure top-notch solutions. With a diverse skill set encompassing Java, C++, Python, and Agile methodologies, Jacob is poised to be a valuable asset to any software development team.
COMPUTER NETWORKS CHAPTER 3 NETWORK LAYER NOTES CSE 3RD year sem 1
1. CS503PC: COMPUTER NETWORKS
UNIT - III
Network Layer: Design issues, Routing algorithms: shortest path routing,
Flooding, Hierarchical routing, Broadcast, Multicast, distance vector routing,
Congestion Control Algorithms, Quality of Service, Internetworking, The
Network layer in the internet.
1
2. UNIT - III
The Network Layer
Routing Algorithms, Congestion Control Algorithms, QoS
3. Network Layer Design Issues
• Store-and-forward packet switching
• Services provided to transport layer
• Implementation of connectionless service
• Implementation of connection-oriented service
• Comparison of virtual-circuit and datagram networks
5. Services Provided to the Transport Layer
1. Services independent of router technology.
2. Transport layer shielded from number, type, topology of routers.
3. Network addresses available to transport layer use uniform
numbering plan
– even across LANs and WANs
6. Implementation of Connectionless Service
Routing within a datagram network
ISP’s equipment
A’s table (initially) A’s table (later) C’s Table E’s Table
9. Routing Algorithms
• Routing is a process of transferring the packets from source m/c to destination machine, while
routing algorithms (RA) are s/w responsible for deciding which outgoing line an incoming
packet should be transmitted on.
• The purpose of RA is to decide which route is to be followed by a packet on the basis of
following parameters:
• Availability of channels (paths/links/routes)
• Link transmission delay
• Traffic intensity, and
• Capacity (bandwidth) of the link
10. Routing Algorithms
• On the basis of nature of information used in the algorithm, Routing Algorithms are categorized into
two classes:
• Non-Adaptive: These do not base their routing decisions on the measurements/estimates
of current traffic or topology, instead the choice of route to get from node ‘I’ to node ‘j’ is
computed in advance or off-line, and hence also called as ‘Static Routing’ or ‘Pre-
determined Routing’.
• Adaptive: It attempts to change their routing decisions to reflect changes in topology and
the current traffic.
•
•
•
• On the basis of scope of information used in the algorithm, Routing Algorithms are classified into
three types:
Centralized Routing: The global algorithm uses information collected from the entire
subnet in an attempt to make optimal decision.
Isolated Routing: The local algorithm runs separately on each IMP(Interface Message
Processor) and uses information only available there e.g., queue length.
DistributedRouting: These use information availablelocally as well as information
available at their neighbors.
11. Routing Algorithms
Properties of the R.A.
Simplicity: The algorithm should not use very complex features.
Correctness: The algorithm should clearly say about the start and end of the route searching.
Robustness: The algorithms should either be capable of correcting smaller mistakes or displaying
message to the user to correct errors (Detection and Corrections)
Stability: In the event of failure of one or few IMPs, the total system should not be crashed or down.
Fairness: Nothing should be ambiguous, everything should be stated clearly and the algorithms should
not lead to congestion.
Optimality: The algorithms should ensure to minimize the mean packet delay time as well as maximize
the total throughput of the network (maximum number if message transmission with minimum delay).
12. Routing Algorithms
• Optimality principle
• Shortest path algorithm
• Flooding
• Distance vector routing
• Link state routing
• Routing in ad hoc networks
• Broadcast routing
• Multicast routing
• Anycast routing
• Routing for mobile hosts
• Routing in ad hoc networks
13. The Optimality Principle
• If Path from A to B is Optimal then, If any Router exist between A & B i.e C
then path from A to C and C to B will be Optimal
A
B
A
B
C
Optimal Path
Optimal Path Optimal Path
14. The Optimality Principle
(a) A network. (b) A sink tree for router B.
• The goal of routing algorithms is to discover and use the sink trees for all routers.
15. Shortest Path Algorithm (1)
This algorithm finds the shortest path between any two given nodes on the basis
of any of the following (metrics/functions):
• Number of hops
• Distance
• Avg. traffic
In general, the labels of the arcs can be function of distance, bandwidth, average traffic,
communication cost, mean queuing delay or transmission delay. Many algorithms may be designed
using these parameters.
One such algorithms is designed by Dijkstra (1959) to determine the shortest path between two
nodes.
• Communication cost
• bandwidth
• Geographicaldistance
• Mean queuing delay, etc.,.
16. Shortest Path Algorithm (1)
Steps of Dijkstra’s SPA algorithm to determine the shortest path between two nodes:
1. Initially, no path is known. So all the nodes are labeled as at an infinite distance from source
node.
2. As the algorithm proceeds, the labels of the nodes changes accordingly reflecting a better path
from the given source to the given sink.
3. Start from a node, and examine all adjacent node(s) to it. If the sum of labels of nodes and
distance from working node to the node being examined is less than the label on that node, then
we have a shortest path, and the node is re-labeled. In a similar fashion, all the adjacent nodes to
the working node are inspected and the tentative labels are changed. If possible the entire
graph is searched for tentatively labeled nodes with the smallest value, the node is made the
permanent node. With the progress of the algorithm, all permanent nodes are encircled, so the
shortest path could be reconstructed.
17. Shortest Path Algorithm (1)
The first five steps used in computing the shortest path from A to
D. The arrows indicate the working node
L(B) = min(∞, 0+2)= 2
L(G) = min(∞, 0+6)= 6
L(C) = min(∞, 2+7)=9
L(E) = min(∞, 2+2)= 4
L(F) = min(∞, 4+2)= 6
L(G) = min(∞, 4+1)= 5
18. Shortest Path Algorithm (2)
. . .
Dijkstra’s algorithm to compute the shortest path through a graph.
19. Shortest Path Algorithm (3)
. . .
Dijkstra’s algorithm to compute the shortest path through a graph.
. . .
20. Shortest Path Algorithm (4)
. . .
Dijkstra’s algorithm to compute the shortest path through a graph.
21. Shortest Path Algorithm
Disadvantages:
• Total traffic is routed via the calculated single
path, which may lead to congestion.
• Sometimes, there exists some more paths that
are equally good, but packets can’t be routed
through these paths to reduce congestion.
Solution:
To overcome these problems, a new algorithm
called Multipath Algorithm, was designed by
Evan (1975).
22. Other Routing Algorithms
a) Baran’s Hot Potato Algorithm (1964): Isolated routing, also called as Shortest
Queue Algorithm. As soon as a node receives a packet, it tries to get rid of it by
putting/forwarding it to the line having shortest queue.
b) Flooding: Each incoming packet is forwarded to every outgoing line, thereby
ensuring shortest path and shortest transmission delay. But, operative for very
low traffic condition.
c) Centralized Routing using RCC: All IMPs in the network periodically sends
information to Routing Control Centre (RCC), regarding their queue length,
delay offered, list of
neighbors that are up, etc. Based on these
information, RCC computes the routing table
global
and
distributes to all IMPs. It was used in TYMNET in 1971.
23. (a) A network.
(b) Input from A, I, H, K, and the new routing table for J.
Distance Vector Routing
26. 1. The Count-to-Infinity Problems
2. Delay metric was queue length, it did not take line bandwidth into account,
when choosing routes. Initially all the lines were 50 kbps, and hence no
problem, but later some were upgraded to 230 kbps, and others to 1.544 Mbps.
27. Link State Routing (IS-IS, OSPF)
1. Discover neighbors, learn network addresses (Hello).
2. Set/Measure distance/cost metric to each neighbor (Echo).
3. Construct packet telling all it has learned.
4. Send packet to, receive packets from other routers (trickiest
part, flooding(to check flooding, packet seq. no. and age are
used)).
5. Compute shortest path to every other router (Dijkstra’s
Algorithm).
34. Broadcast Routing
Reverse path forwarding. (a) A network. (b) A sink tree.
(c) The tree built by reverse path forwarding.
35. Multicast Routing (1)
(a) A network. (b) A spanning tree for the leftmost router. (c) A
multicast tree for group 1. (d) A multicast tree for group 2.
40. Routing in Ad Hoc Networks
(a) Range of A’s broadcast.
(b) After B and D receive it.
(c) After C, F, and G receive it.
(d) After E, H, and I receive it.
The shaded nodes are
new recipients. The
dashed lines show
possible reverse routes.
The solid lines show the
discovered route.
41. Congestion Control Algorithms (1)
• Approaches to congestion control
• Traffic-aware routing
• Admission control
• Traffic throttling
• Load shedding
42. Congestion Control Algorithms (2)
When too much traffic is offered, congestion sets in and
performance degrades sharply.