Failsafe End-to-End Protocols in Computer Networks with Changing Topology

نویسندگان

  • Israel Cidon
  • Raphael Rom
چکیده

E ND-TO-END communication is clearly the object of any communication network. Naturally, therefore, end-to-end protocols have been the subject of research for a long time. While many protocols achieve their goals by using timeouts [l] , [2]. Finn, in an original paper [3], demonstrated the existence of end-to-end protocols without making use of timeouts. Essentially, a failsafe end-to-end protocol is one that should deliver, all packets in the correct order and without duplication. In addition, flow control‘and error recovery must also be addressed. In his paper, Finn presented a ptotocol which properly handlCd .ordering and duplication avoidance in a network,in which a resynch procedure operates. In this paper, we extend that protocol, to. accommodate windows, i.e:, allow mores than one packet to be in transit between source. and destination nodes, allow to control the flow, and hadale erroneous packets. All this is done while using bounded counters. The paper is structured in the ,following way. We first introduce a model for a network with changing topology,, the concept of resynch procedures, and the assumptions .underlying the operation of end-to-edd protocols. These are based on previous work [4], [3]. A windowed end-to-end protocol is then presented and its correctness proven. The use of windows for flow, control is also included, as is the special case of circuit-based networks.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Energy Efficient Routing in Mobile Ad Hoc Networks by Using Honey Bee Mating Optimization

Mobile Ad hoc networks (MANETs) are composed of mobile stations communicating through wireless links, without any fixed backbone support. In these networks, limited power energy supply, and frequent topology changes caused by node mobility, makes their routing a challenging problem. TORA is one of the routing protocols that successfully copes with the nodes’ mobility side effects, but it do...

متن کامل

Energy Efficient Routing in Mobile Ad Hoc Networks by Using Honey Bee Mating Optimization

Mobile Ad hoc networks (MANETs) are composed of mobile stations communicating through wireless links, without any fixed backbone support. In these networks, limited power energy supply, and frequent topology changes caused by node mobility, makes their routing a challenging problem. TORA is one of the routing protocols that successfully copes with the nodes’ mobility side effects, but it do...

متن کامل

Routing Improvement for Vehicular Ad Hoc Networks (VANETs) Using Nature Inspired Algorithms

are a subset of MANETs in which vehicles are considered as network clients. These networks have been created to communicate between vehicles and traffic control on the roads. have similar features to MANETs and their main special property is the high-speed node mobility which makes a quick change of the network. The rapid change of network topology is a major challenge in routing. One of the we...

متن کامل

Modeling of VANET Technology & Ad-Hoc Routing Protocols Based on High Performance Random Waypoint Models

Today, one of the new technologies in the modern era is Vehicular Ad-hoc Network which has takenenormous attention in the recent years. Because of rapid topology changing and frequent disconnectionmakes it difficult to design an efficient routing protocol for routing data between vehicles, called V2V orvehicle to vehicle communication and vehicle to roadside infrastructure, called V2I. Designin...

متن کامل

A Hierarchy Topology Design Using a Hybrid Evolutionary Algorithm in Wireless Sensor Networks

Wireless sensor network a powerful network contains many wireless sensors with limited power resource, data processing, and transmission abilities. Wireless sensor capabilities including computational capacity, radio power, and memory capabilities are much limited. Moreover, to design a hierarchy topology, in addition to energy optimization, find an optimum clusters number and best location of ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • IEEE Trans. Communications

دوره 35  شماره 

صفحات  -

تاریخ انتشار 1987