SlideShare une entreprise Scribd logo
1  sur  18
Routing Protocol
Evaluation
David Holmer
dholmer@jhu.edu
Mobility Models
Random Waypoint Mobility
 Two parameters
 Pause Time (Pt)
 Max Speed (Vmax)
 Each node starts at a
random location
 Executes loop
 Pause for Pt seconds
 Select a random
destination (waypoint)
 Move to that destination
at a random speed
(0,Vmax)
 Repeat upon arrival
Random Waypoint Properties
 Advantages
 Easy to implement
 Allows heterogeneous speeds and temporarily
stationary nodes
 Disadvantages
 Non-uniform node distribution (tend towards
center)
 Un-stable instantaneous mobility (tends
towards zero and oscillates)
Random Waypoint Properties (cont)
Random Waypoint Properties (cont)
Modified Random Waypoint
 Narrow the random
speed range
 (.1 Vmax, .9 Vmax)
instead of ( 0, Vmax )
 Pre-simulation
mobility
 Mobility properties
stabilize before routing
and data commences
 Doesn’t fix non-uniform
node distribution
Other Mobility Models
 Billiard Model
 Node selects a random direction, speed, and time
 Moves in that direction at that speed for that time and then
repeats (may have pause time as well)
 Bounces off simulation boundary like a “billiard ball”
 Maintains uniform node distribution, and uniform average
speed (due to time selection)
 Group mobility patterns
 Node mobility is sum of group mobility and individual mobility
 Used by clustering based routing protocols (well suited for
certain applications like the military)
 Trace based mobility patterns
 Record real life people/vehicle/etc. motion patterns
 Requires location hardware such as GPS
 Difficult to try variations or change “parameters”
Routing Performance
Metrics
Routing Protocol Evaluation Metrics
 Four most common metrics
 Delivery Ratio
 Latency
 Path Length Optimality
 Control Overhead
Delivery Ratio
 Number of packets successfully received by the
destination / number sent by the source
 Evaluated by setting up a number of “test” flows
in the network
 Commonly a number of constant bit rate (CBR) flows
with a specified number of packets per second
 Uses UDP so every dropped packet results in a reduction
of the delivery ratio (no end-to-end retransmissions)
 Congestion Sensitive
 A large enough test load will result in reduced delivery
ratio for ANY protocol due to congestion
 Mobility Sensitive
 If the routing protocol does not respond quickly to
topology change, then packets sent on links that no
longer exist will be lost
Delivery Ratio Examples
Delivery Ratio vs. Test Load Delivery Ratio vs. Mobility
Latency
 The time between the creation of a packet and its
delivery to the destination
 Usually measured using the same setup as
delivery ratio
 Congestion sensitive
 Latency will drastically increase as the congestion limit is
reached (due to waiting in large buffers)
 Retransmission sensitive
 Protocols that locally recover packets will achieve higher
delivery ratio but will increase latency
 On-demand sensitive
 Protocols that setup routes after data is sent will have
higher latency on the initial packets of a flow
Latency Example
Path Length Optimality
 The difference between the length of the path
used for sending packets in the protocol and the
length of the best possible path
 Measurement
 Protocol path length observed for each packet using test
flows
 Best possible path computed offline using same mobility
pattern
 Measure of protocol’s ability to track good routes
 Extra hops from non-optimal routes will result in
increased congestion and medium utilization
Path Length Optimality Example
Control Overhead
 Number/size of routing control packets
sent by the protocol
 Calculated using counters while simulating
with test flows
 Sometimes expressed as a ratio of control
to data
 Indication of how efficiently a routing
protocol operates
 High control overhead may adversely affect
delivery ratio and latency under higher loads
Control Overhead Example

Contenu connexe

Similaire à Routing evaluation

Switching - data communication
Switching - data communicationSwitching - data communication
Switching - data communicationRubaya Mim
 
NetworkAlgorithms.ppt
NetworkAlgorithms.pptNetworkAlgorithms.ppt
NetworkAlgorithms.ppt21121A0594
 
introAdhocRoutingRoutingRoutingRouting-new.ppt
introAdhocRoutingRoutingRoutingRouting-new.pptintroAdhocRoutingRoutingRoutingRouting-new.ppt
introAdhocRoutingRoutingRoutingRouting-new.pptDEEPAK948083
 
Unit-3-Part-1 [Autosaved].ppt
Unit-3-Part-1 [Autosaved].pptUnit-3-Part-1 [Autosaved].ppt
Unit-3-Part-1 [Autosaved].pptRamya Nellutla
 
Data communication basics
Data communication basicsData communication basics
Data communication basicsDon Bosco BSIT
 
Data communication basics
Data communication basicsData communication basics
Data communication basicsDon Bosco BSIT
 
QOD routing protocols : phase 1 ppt
QOD routing  protocols : phase 1 pptQOD routing  protocols : phase 1 ppt
QOD routing protocols : phase 1 pptAAKASH S
 
Lecture 2 review of network technologies
Lecture 2 review of network technologiesLecture 2 review of network technologies
Lecture 2 review of network technologiesBatzaya Dashdondog
 
Distance Vector Routing
Distance Vector RoutingDistance Vector Routing
Distance Vector RoutingShouvikDhali
 
Bahg back bone-assisted hop greedy routing for vanet’s city environments
Bahg back bone-assisted hop greedy routing for vanet’s city environmentsBahg back bone-assisted hop greedy routing for vanet’s city environments
Bahg back bone-assisted hop greedy routing for vanet’s city environmentsJPINFOTECH JAYAPRAKASH
 
Polynomial time algorithms for multirate anypath
Polynomial time algorithms for multirate anypathPolynomial time algorithms for multirate anypath
Polynomial time algorithms for multirate anypathIMPULSE_TECHNOLOGY
 
Network Topologies
Network TopologiesNetwork Topologies
Network TopologiesJason Hando
 
Bahg back bone-assisted hop greedy routing for vanet’s city environments
Bahg back bone-assisted hop greedy routing for vanet’s city environmentsBahg back bone-assisted hop greedy routing for vanet’s city environments
Bahg back bone-assisted hop greedy routing for vanet’s city environmentsJPINFOTECH JAYAPRAKASH
 

Similaire à Routing evaluation (20)

Switching - data communication
Switching - data communicationSwitching - data communication
Switching - data communication
 
NetworkAlgorithms.ppt
NetworkAlgorithms.pptNetworkAlgorithms.ppt
NetworkAlgorithms.ppt
 
introAdhocRoutingRoutingRoutingRouting-new.ppt
introAdhocRoutingRoutingRoutingRouting-new.pptintroAdhocRoutingRoutingRoutingRouting-new.ppt
introAdhocRoutingRoutingRoutingRouting-new.ppt
 
HIGH SPEED NETWORKS
HIGH SPEED NETWORKSHIGH SPEED NETWORKS
HIGH SPEED NETWORKS
 
Unit-3-Part-1 [Autosaved].ppt
Unit-3-Part-1 [Autosaved].pptUnit-3-Part-1 [Autosaved].ppt
Unit-3-Part-1 [Autosaved].ppt
 
Data communication basics
Data communication basicsData communication basics
Data communication basics
 
Data communication basics
Data communication basicsData communication basics
Data communication basics
 
QOD routing protocols : phase 1 ppt
QOD routing  protocols : phase 1 pptQOD routing  protocols : phase 1 ppt
QOD routing protocols : phase 1 ppt
 
Lecture 2 review of network technologies
Lecture 2 review of network technologiesLecture 2 review of network technologies
Lecture 2 review of network technologies
 
P01754110117
P01754110117P01754110117
P01754110117
 
Distance Vector Routing
Distance Vector RoutingDistance Vector Routing
Distance Vector Routing
 
22 circuits
22 circuits22 circuits
22 circuits
 
Adhoc (1)
Adhoc (1)Adhoc (1)
Adhoc (1)
 
Manet
ManetManet
Manet
 
Bahg back bone-assisted hop greedy routing for vanet’s city environments
Bahg back bone-assisted hop greedy routing for vanet’s city environmentsBahg back bone-assisted hop greedy routing for vanet’s city environments
Bahg back bone-assisted hop greedy routing for vanet’s city environments
 
Polynomial time algorithms for multirate anypath
Polynomial time algorithms for multirate anypathPolynomial time algorithms for multirate anypath
Polynomial time algorithms for multirate anypath
 
Network Layer
Network LayerNetwork Layer
Network Layer
 
Network Topologies
Network TopologiesNetwork Topologies
Network Topologies
 
Bahg back bone-assisted hop greedy routing for vanet’s city environments
Bahg back bone-assisted hop greedy routing for vanet’s city environmentsBahg back bone-assisted hop greedy routing for vanet’s city environments
Bahg back bone-assisted hop greedy routing for vanet’s city environments
 
11 routing
11 routing11 routing
11 routing
 

Dernier

What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 

Dernier (20)

What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 

Routing evaluation

  • 3. Random Waypoint Mobility  Two parameters  Pause Time (Pt)  Max Speed (Vmax)  Each node starts at a random location  Executes loop  Pause for Pt seconds  Select a random destination (waypoint)  Move to that destination at a random speed (0,Vmax)  Repeat upon arrival
  • 4. Random Waypoint Properties  Advantages  Easy to implement  Allows heterogeneous speeds and temporarily stationary nodes  Disadvantages  Non-uniform node distribution (tend towards center)  Un-stable instantaneous mobility (tends towards zero and oscillates)
  • 7. Modified Random Waypoint  Narrow the random speed range  (.1 Vmax, .9 Vmax) instead of ( 0, Vmax )  Pre-simulation mobility  Mobility properties stabilize before routing and data commences  Doesn’t fix non-uniform node distribution
  • 8. Other Mobility Models  Billiard Model  Node selects a random direction, speed, and time  Moves in that direction at that speed for that time and then repeats (may have pause time as well)  Bounces off simulation boundary like a “billiard ball”  Maintains uniform node distribution, and uniform average speed (due to time selection)  Group mobility patterns  Node mobility is sum of group mobility and individual mobility  Used by clustering based routing protocols (well suited for certain applications like the military)  Trace based mobility patterns  Record real life people/vehicle/etc. motion patterns  Requires location hardware such as GPS  Difficult to try variations or change “parameters”
  • 10. Routing Protocol Evaluation Metrics  Four most common metrics  Delivery Ratio  Latency  Path Length Optimality  Control Overhead
  • 11. Delivery Ratio  Number of packets successfully received by the destination / number sent by the source  Evaluated by setting up a number of “test” flows in the network  Commonly a number of constant bit rate (CBR) flows with a specified number of packets per second  Uses UDP so every dropped packet results in a reduction of the delivery ratio (no end-to-end retransmissions)  Congestion Sensitive  A large enough test load will result in reduced delivery ratio for ANY protocol due to congestion  Mobility Sensitive  If the routing protocol does not respond quickly to topology change, then packets sent on links that no longer exist will be lost
  • 12. Delivery Ratio Examples Delivery Ratio vs. Test Load Delivery Ratio vs. Mobility
  • 13. Latency  The time between the creation of a packet and its delivery to the destination  Usually measured using the same setup as delivery ratio  Congestion sensitive  Latency will drastically increase as the congestion limit is reached (due to waiting in large buffers)  Retransmission sensitive  Protocols that locally recover packets will achieve higher delivery ratio but will increase latency  On-demand sensitive  Protocols that setup routes after data is sent will have higher latency on the initial packets of a flow
  • 15. Path Length Optimality  The difference between the length of the path used for sending packets in the protocol and the length of the best possible path  Measurement  Protocol path length observed for each packet using test flows  Best possible path computed offline using same mobility pattern  Measure of protocol’s ability to track good routes  Extra hops from non-optimal routes will result in increased congestion and medium utilization
  • 17. Control Overhead  Number/size of routing control packets sent by the protocol  Calculated using counters while simulating with test flows  Sometimes expressed as a ratio of control to data  Indication of how efficiently a routing protocol operates  High control overhead may adversely affect delivery ratio and latency under higher loads