Fisheye State Routing: A Routing Scheme For Ad Hoc Wireless Networks
Fisheye State Routing: A Routing Scheme For Ad Hoc Wireless Networks
Fisheye State Routing: A Routing Scheme For Ad Hoc Wireless Networks
Abstract - This paper presents a novel routing protocol for wireless ad flooding to disseminate the update information, excessive con-
hoc networks - Fisheye State Routing (FSR). FSR introduces the notion trol overhead may be generated, especially when high mobility
of multi-level fisheye scope to reduce routing update overhead in large net-
works. Nodes exchange link state entries with their neighbors wirh a fre- triggers frequent updates.
quency which depends on distance to destination. From link state entrier:,
nodes construct the topology map of the entire network and compute opti- The most recent addition to the family are the on demand
mal routes. Simulation experiments show that FSR D a simple, eficient an(d routing schemes (e.g., AODV [18], DSR [8] etc). In these “re-
scalable routing solution in a mobile, ad hoc environment.
active” protocols a node discovers a route in an “on demand”
fashion, namely, it computes a route only when needed. Small
I. INTRODUCTION AND RELATED WORK QueryReply packets are used to discover (possible more than)
one route to a given destination. However, since a route has to
Ad hoc wireless networks are self-organizing, self- be entirely discovered prior to the actual data packet transmis-
configuring and instantly deployable in response to applica- sion, the initial search latency may degrade the performance
tion needs without a fixed infrastructure existence. Therefore:, of interactive applications (e.g., distributed database queries).
ad hoc networks are very attractive for tactical communica- Moreover, it is impossible to know in advance the quality of
tion in military and law enforcement. They are also expected the path (e.g., bandwidth, delay etc) prior to call setup. Such a
to play an important role in civilian forums such as conven- priori knowledge (which can be easily obtained from proactive
tion centers, conferences, and electronic classrooms. Mobility, schemes) is very desirable in multimedia applications, since it
potentially very large number of mobile nodes, and limited re- enables more effective call acceptance control.
sources (e.g., bandwidth and power) make routing in ad hoc
networks extremely challenging. The routing protocols for ad In general, on demand routing performs extremely well (low
hoc wireless networks have to adapt quickly to the frequent and traffic and storage O M ) in large networks with light traffic (di-
unpredictable changes of topology and must be parsimonious rected to a few destinations) and with low mobility. As mobil-
of communications and processing resources. ity increases, the precomputed route may break down, requir-
ing multiple route discoveries on the way to destination. Route
Existing wireless routing schemes can be classified into two caching becomes ineffective in high mobility. Since flooding
categories according to their design philosophy: (a) proactive is used for query dissemination and route maintenance, on de-
(i.e., distance vector or link state based); and (b) on demand. mand routing tends to become inefficient when traffic load is
Proactive schemes compute routes in the background, indepen- high. As discussed in [6], routing load will grow as the traffic
dent of traffic demands. Historically, the first type of routing load increases for on-demand routing protocols. In the case of
scheme used in early packet radio networks such as the PRNET 100 nodes and 40 sources with uniform traffic pattern, the re-
was the distance vector type [9]. The distance vector approach sults in [6] show that both DSR and AODV will generate more
is simple but suffers from slow convergence and tendency of routing overhead than actual throughput. Similar findings are
creating routing loops. Convergence and looping problemis also reported in [ 121.
were later resolved by the Link State (LS) approach, which
is widely used in wired nets (e.g., Internet [16] or ATM [l]). A recent proposal which combines on demand routing and
In Link State, global network topology information is main- conventional routing is Zone Routing Protocol (ZRP) [lo]. For
tained in all routers by the periodic flooding of link state up- routing operations inside a local zone, an arbitrary proactive
dates by each node. Any link change triggers an immediate routing scheme (e.g., distance vector) can be applied. For in-
update. As a result, the time required for a router to converge terzone routing, on demand routing is used. The advantage of
to the new topology is much less than in the distance vector zone routing is its scalability, as “global” routing table over-
approach. Due to global topology knowledge, preventing rout- head is limited by zone size. Yet, the benefits of global routing
ing loop is also easier. Unfortunately, as Link State relies on are preserved within each zone. However, for the interzone
routing, the on-demand solution poses the usual problems of
This work was supported in part by NSF under contract ANI-9814675. in connection latency and high routing load for dense traffic pat-
part by DARPA under contract DAAB07-97-CD321 and in part by Intel. terns.
70
0-7803-6283-7/00/$10.00 0 2000 IEEE
With the availability of GPS [ 131 technology, any of the pre- In routing, the fisheye approach translates to maintaining accu-
vious routing protocols can be assisted by GPS location in- rate distance and path quality information about the immediate
formation. For example, LAR [ 151 is an on demand protocol neighborhood of a node, with progressively less detail as the
similar to DSR but it restricts control packet flooding by using distance increases.
location information. DREAM [3] is a location based proac-
tive scheme. Each node in the network periodically exchanges FSR is functionally similar to LS Routing in that it maintains
control packets to inform all the other nodes of its location. a topology map at each node. The key difference is the way in
Each control packet is assigned a life time based on the geo- which routing information is disseminated. In LS, link state
graphical distance from the sender. DREAM sends short lived packets are generated and flooded into the network whenever a
packet more frequently than long lived packets due to the so node detects a topology change. In FSR, link state packets are
called distance effect,i.e., the farther two nodes separate, the not flooded. Instead, nodes maintain a link state table based on
slower they seem to be moving with respect to each other. The the up-to-date information received from neighboring nodes,
data packet is broadcast to the nodes in the direction of the des- and periodically exchange it with their local neighbors only
tination using only location information stored at the sender. (no flooding). Through this exchange process, the table entries
with larger sequence numbers replace the ones with smaller se-
In this paper, we introduce a novel “proactive” routing quence numbers. The FSR periodic table exchange resembles
scheme called Fisheye State Routing protocol. It is a link state the vector exchange in Distributed Bellman-Ford (DBF) (or
based routing protocol which is adapted to the wireless ad hoc more precisely, DSDV [ 171) where the distances are updated
environment. The rest of the paper is organized as follows. In according to the time stamp or sequence number assigned by
section 11, we describe the Fisheye State Routing (FSR). Sec- the node originating the update. However, in FSR link states
tion I11 presents the performance results and we conclude our rather than distance vectors are propagated. Moreover, like in
paper in section IV. LS, a full topology map is kept at each node and shortest paths
are computed using this map.
11. FISHEYE STATE ROUTING (FSR)
In a wireless environment, a radio link between mobile
A. Network Model and Data Structures nodes may experience frequent disconnects and reconnects.
The LS protocol releases a link state update for each such
Each node has a unique identifier. Nodes move around and change, which floods the network and causes excessive over-
change speed and direction independently. An undirected link head. FSR avoids this problem by using periodic, instead of
(i,j ) connecting two nodes i and j is formed when the distance event driven, exchange of the topology map, greatly reducing
between i and j become less than or equal to the transmission the control message overhead.
range R. For each node i, one list and three tables are main-
tained. They are: a neighbor list Ai, a topology table TTi, a When network size grows large, the update message could
next hop table NEXTi and a distance table Di. Ai is defined consume considerable amount of bandwidth, which depends
as a set of nodes that are adjacent to node i. Each destination j on the update period. In order to reduce the size of update
has an entry in table TTi which contains two parts: TTi.LS(j) messages without seriously affecting routing accuracy, FSR
and TTi.SEQ(j).TTi.LS(j)denotes the link state informa- uses the fisheye technique. Fig. 1 illustrates the application
tion reported by node j. TTi.SEQ(j)denotes the time stamp of fisheye in a mobile, wireless network. The circles with dif-
indicating the time node j has generated this link state informa- ferent shades of grey define the fisheye scopes with respect to
tion. Similar, for every destination j, N E X T i ( j ) denotes the the center node (node 11). The scope is defined as the set of
next hop to forward packets destined to j on the shortest path, nodes that can be reached within a given number of hops. In
while D i ( j )denotes the distances of the shortest path from i to our case, three scopes are shown for 1 , 2 and > 2 hops respec-
j . Additionally, one or more link weight functions may be de- tively. Nodes are color coded as black, grey and white accord-
fined and used to compute the shortest path based on a specific ingly. The number of levels and the radius of each scope will
metric, possibly with constraints. For instance, a bandwidth depend on the size of the network.
function can be used to support QoS routing. In this paper, we
limit ourselves to min hop paths, thus the link weight is 1. The reduction of routing update overhead is obtained by
using different exchange periods for different entries in routing
B. The Fisheye State Routing (FSR) Protocol table. More precisely, entries corresponding to nodes within
the smaller scope are propagated to the neighbors with the
FSR is an implicit hierarchical routing protocol. It uses the highest frequency. Referring to Fig. 2, entries in bold are
“fisheye” technique proposed by Kleinrock and Stevens [ 141, exchanged most frequently. The rest of the entries are sent
where the technique was used to reduce the size of informa- out at a lower frequency. As a result, a considerable fraction
tion required to represent graphical data. The eye of a fish of link state entries are suppressed in a typical update, thus
captures with high detail the pixels near the focal point. The reducing the message size. This strategy produces timely
detail decreases as the distance from the focal point increases. updates from near stations, but creates large latencies from
71
proaches its destination, it finds increasingly accurate routing
instructions as it enters sectors with a higher refresh rate.
-
A. Simulation Environment
The random waypoint model [4], [8] was used in the simula-
tion runs. In this model, a node selects a destination randomly
40{1)
1:{0,2,3)
2:{5,1,4)
3:{1,4)
4:(5.2,3)
5:(2.4)
\ -._
within the roaming area and moves towards that destination at
a speed uniformally distributed between 0 &sec and 20 &sec.
Once the node reaches the destination, it selects another desti-
nation randomly and moves towards it after a predefined pause
time. Aforementioned behavior is repeated for the duration of
the simulation. The traffic is UDP sessions between random
node pairs. The number of source-destination pairs is varied in
the experiments to change the offered load in the network. The
\
\
. / interanival time of the data packets on each source/destination
connection is 2.5 seconds to model an interactive environment.
The size of data payload is 5 12 bytes. The load in the network
is increased by increasing the number of connections. We used
Fig. 2. Message reduction using fisheye 10, 50, 300 and 500 communication pairs in our simulation
experiments.
The FSR concept originates from Global State Routing B. Simulation Results
(GSR) [5]. GSR can be viewed as a special case of FSR, in
which there is only one fisheye scope level. As a result, the en-. The first experiment (Fig. 3) reports how routing overhead is
tire topology table is exchanged among neighbors. Clearly, this reduced when number of fisheye scopes is increased. For 100
consumes a considerable amount of bandwidth when network: nodes, we reduce more than 80% of routing overhead by using
size becomes large. Through updating link state information 3 scopes instead of just one scope (where all routing table en-
with different frequencies depending on the scope distance., tries are being updated very frequently). Also note that there is
FSR scales well to large network size and keeps overhead low not much reduction of overhead if the number of scopes is be-
without compromising route computation accuracy when the: yond 3. This is because most of the nodes are within 3 scopes
destination is near. By retaining a routing entry for each desti- for an area of 1000 x 1000 with 150 radio range. Thus, adding
nation, FSR avoids the extra work of “finding” the destination more levels than 3 only affects very few nodes. On the other
(as in on-demand routing) and thus maintains low single packet hand, having multiple scopes decreases the routing accuracy
transmission latency. As mobility increases, routes to remote: and might degrade the network performance. Fig. 4 shows
destinations become less accurate. However, when a packet ap- that the routing inaccuracies do result in a lower throughput
72
between one scope and two scopes. However, the throughput
is relatively insensitive to the number of scopes when number
l o o 5 ' I I
AODV pairs 10 -
I ,
DSRpairs 10 - - - I C - -
FSR pairs 10 ..... a.....
-
of scopes is greater than 2. This is because in a mobility envi- 80 -i!
ronment, a change on a link far away from the source does not 3
P k..,
necessarily cause a change in the routing table at the source. .? 60 - '...'..., -
B
Moreover, as a packet approaches its destination, the route be- e:
comes more precise.
2e+06
-
#of Scopes = 1 --.+--
# o f S c o p e s = 2 .....a.....
#of Scopes = 3 ---*--
# o f scopes = 5
AODVpain50
DSR pairs 50 - - - E- -
FSR pairs 50 -.El--
<00
500000
80 ,- -I
0
10 20 30 40 50 60 70 80 90 100
Number of Nodes
I I I
50Nodes
75Nodes
100Nodes
- I
--*--
---E--
100
0 100 200 300 400 500 600 700 800 900
I
Pause Time (secs)
I I I I I I I
AODVpairs300 ----C
DSR pairs 300 ---*--
FSR pairs 300 .....El.....
80 - -
.sa - -
8YJ 300
00 60
<
200
100
1 2 3 4 5
Number of Scopes
73
load of on demand schemes is much higher than that of FSR. solution to the challenge of maintaining accurate routes in ad
hoc networks.
References
The ATM Forum, “Private Network-Network Interface Specification
v1.0,” 1996.
h
600 - R. Bagrodia, R. Meyer, M. Takai, Y. Chen, X. Zeng, J. Martin, and H.Y.
500 Song, “PARSEC A Parallel Simulation Environment for Complex Sys-
tems,” IEEE Computer, vol. 31, no. 10, Oct. 1998, pp.77-85.
$
v
74