Wait a second!
More handpicked essays just for you.
More handpicked essays just for you.
An introduction essay on network topologies
Explain network topology essay
Network topologies analyses
Don’t take our word for it - see why 10 million students trust us with their essay needs.
As the Fig 1 showing, the node which generates the packet is the source node. There are many sensor nodes in a 3-D interest area. The packet is delivered among these sensor nodes and finally try to reach one sink node. Sink nodes are deployed on the water surface. In the figure, it is a multiple-sink topology. Multiple sinks equipped both radio-frequency and acoustic modems are fixed on the water surface.The packet is assumed delivered successfully if it reaches any one of the sink nodes because sink nodes use radio-frequency channel to communicate with each other which is several orders of magnitudes faster than acoustic channel.
The routing protocols for wireless sensor networks and underwater wireless sensor networks can be roughly
…show more content…
The location of each node and structure of the network are mostly fixed. There are many routing protocols proposed for land-based networks like Directed Diffusion and TTDD. It requires periodically updates if it is adapted to dynamic topology, which is not energy efficient. For example, GPSR is typical geographic-based routing protocol for land-based sensor networks.
- Routing protocols for high dynamic topology: the topology of the network is highly dynamic underwater because nodes move passively with water currents. These routing protocols are designed for sensor networks with dynamic topology like UWSNs.
The routing protocols for UWSNs can be categorized into two classes according to the preconditions they assume:
- Geographic-based routing protocols: the protocol require the full-dimensional location information as the precondition. There are some popular protocols like Vector-Based Forwarding (VBF)[2] protocol. (section 3)
- Localization-free routing protocols: the protocol does not require the full-dimensional location information, all it need is the depth information of each node. The most popular routing protocol in this class is Depth-Based Routing (DBR) [1] protocol. (section 4)
The routing protocols for UWSNs can be categorized into two classes according to the number of the sinks,which is the destination and the final
When using routers, you need many routers in order to route the information to the correct location, as one router will not be able to manage this task. Explain how the routing schemes handle this problem.
The Border Gateway Protocol (BGP) is responsible for communication between different Autonomous Systems (AS). The Internet is comprised of a large number of Autonomous Systems (AS) and exchanging routing information between two or more AS is achieved using BGP. Inter-domain routing in the Internet is carried out majorly by one protocol – Border Gateway Protocol (BGP). BGP is a distance-vector protocol and uses TCP as its underlying mechanism.
Enhanced Interior Gateway Routing Protocol is modified in such a way that it lessens the router’s workload and the amount of data that is to be transmitted between the routers. Other than i...
In a DTN, a node is an entity with a bundle layer. A node may be a host, router, or gateway (or some combination) acting as a source, destination, or forwarder of bundles:
Johnson, D., Maltz, D. (1996). Dynamic Source Routing in Ad-hoc Wireless network. Print ISBN: 0 79239697 0
... in Wireless Sensor Networks: Current proposal and Future Development, IEEE Xplore, Hong Kong, Oct- 2007.
Open Shortest Path First (OSPF) is a link-state routing protocol which uses link state routing algorithm for Internet Protocol (IP) networks.Using OSPF, th convergence of a network can be done in very few seconds, loop-free paths can be guaranteed and better load-sharing on external links can be achievd. Every change in the topology of the network is identified within seconds using OSPF and it instantaneously computes the “shortest path tree” for every route using “Dijkstra's algorithm” . For that reason, OSPF requires a router which have a more powerful processor and more memory than any other routing protocols which leads to more elect...
A mesh topology typically refers to a Wide Area Network where there are multiple paths connecting multiple sites. A router is used to search multiple paths and determine the best path for the data. Routes are determined by least cost, time of day and performance. A three or four site mesh network is relatively easy to create, whereas it is impractical to set up a mesh network of 100 sites or nodes. Mesh networks are used in Wide Area Networks (WANs) where reliability is important and the number of sites being connected together is fairly small.
In order for information to pass fro one information system to another information system outside its local area it must be routed. In the below table is an illustration of a the route a data packet takes between my computer and the Web Server for Macon State College.
...eed, then the node rediscovers the mesh and stable route. A forwarding node is always present in the network therefore the packet delivery ratio of proposed is high.
We consider a wireless sensor network with N = 100 nodes distributed randomly in 100m X 100m field. A gateway node is deployed in the centre of the sensing field. The BS is located far away from the sensing field. Both gateway node and BS are stationary after deployment. We consider packet size of 4000 bits. We compare our protocol with LEACH protocol. To assess performance of our protocol with LEACH, we ignore the effects caused by signal collision and interference in the wireless channel. Table 1 shows the radio parameters used in our
Compared to radio waves used in terrestrial sensor networks, which would have very high attenuation underwater, acoustic waves has better propagation characteristics in water, making it the preferred method for underwater communications. Hence acoustic channel is used as a link for communication in underwater sensor...
... device that originated a RARP request receives a RARP reply, it copies its IP address into its memory cache, where it will reside for as long as the session lasts. · routers, like every other device on the network, send and receive data on the network, and build ARP tables that map IP addresses to MAC addresses · if the source resides on a network that has a different network number than the desired destination, and if the source does not know the MAC address of the destination, it will have to use the router as a default gateway for its data to reach the destination · routed protocols direct user traffic, whereas routing protocols work between routers to maintain path tables · network discovery for distance-vector routing involves exchange of routing tables The next chapter discusses the functions of the transport layer.
The Global Positioning System consists of three sections, 1.satellites which are orbiting the planet, 2.there are numerous control/monitoring centers here on the ground, and 3. gps receivers which are used by their owners. The satellites send down signals from orbit, which are received by GPS receivers on the ground in the air or on the water, the GPS receiver then converts this information into a location longitude, latitude and altitude along with time.
When a Mobile Host receives new routing information (usually in an incremental packet as just described), that information is compared to the information already available from previous routing information packets. Any route with a more recent sequence number is used. The metrics for routes chosen from the newly received broadcast information are each incremented by one hop. Newly recorded routes are scheduled for immediate advertisement to the current Mobile Host’s neighbours [5,40,41,42].