StudentShare solutions
Triangle menu

Temporally-Ordered Routing Algorithm - Essay Example

Nobody downloaded yet

Extract of sample
Temporally-Ordered Routing Algorithm

The protocol's reaction is structured as a temporally-ordered sequence of diffusing computations; each computation consisting of a sequence of directed link reversals. The protocol is highly adaptive, efficient and scalable; being best-suited for use in large, dense, mobile networks. In these networks, the protocol's reaction to link failures typically involves only a localized "single pass" of the distributed algorithm. This capability is unique among protocols which are stable in the face of network partitions, and results in the protocol's high degree of adaptivity . This desirable behavior is achieved through the novel use of a "physical or logical clock" to establish the "temporal order" of topological change events which is used to structure (or order) the algorithm's reaction to topological changes. (Park and Corson, 1997, p.1)
The basic, underlying algorithm is neither distance-vector nor link-state; it is a member of a class referred to as link-reversal algorithms. The protocol builds a loop-free, multipath routing structure that is used as the basis for forwarding traffic to a given destination. The protocol can simultaneously support both source-initiated, on-demand routing for some destinations and destination-initiated, proactive routing for other destinations. (Lundberg, 2002)
Routing optimality (i.e. determination of the shortest path) is less important for the TORA algorithm. Also it is assumed that it's not necessary (nor desirable) to maintain routes between every source/destination pair at all times. The overhead expended to establish a route between a given source/destination pair will be wasted if the source does not require the route prior to its invalidation due to topological changes.
The TORA protocol is designed to minimize reaction to topological changes. A key concept in its design is that it decouples the generation of potentially far-reaching control message propagation from the rate of topological changes. Such messaging is typically localized to a very small set of nodes near the change without having to resort to a dynamic, hierarchical routing solution with its attendant complexity. (Park and Corson, 1997, p.2)
The basic idea is as follows. When a node loses its last downstream link (i.e. becomes a local minimum) as a result of a link failure, the node selects a new height such that it becomes a global maximum by defining a new "reference level". By design, when a new reference level is defined, it is higher than any previously defined reference level. (Park and Corson, 1997, p.4)
Detailed Description
It is based on the ideas of the GB and LMR algorithms. It uses Query and Reply packets as in LMR but combines this with the notion of height as in the GB partial reversal algorithm. The main enhancement comes from the introduction of a time value which stores the time since a link failure.
TORA also maintains Directed Acyclic Graph (DAG) by means of an ordered quintuple associated with each node with ...Show more


The Temporally-Ordered Routing Algorithm (TORA) is an algorithm for routing data across Wireless Mesh Networks or Mobile ad-hoc networks (MANET). It was developed by Vincent Park at the University of Maryland, College Park and the Naval Research Laboratory…
Author : efriesen
Temporally-Ordered Routing Algorithm essay example
Read Text Preview
Save Your Time for More Important Things
Let us write or edit the essay on your topic
"Temporally-Ordered Routing Algorithm"
with a personal 20% discount.
Grab the best paper

Check these samples - they also fit your topic

Evaluation of Routing Protocols
In this scenario, we have a travel agency named as ECC. The company has different branches in different countries. A solution is designed to connect these offices with appropriate topology design, adequate routing protocols and bandwidth carrier that will save bandwidth cost.
8 pages (2000 words) Essay
Cisco(Routing Protocols)
ata traffic within computer networks. The application of various protocols as a framework of determining the path of data transfer demonstrates the use of static and dynamic routing protocols, which are discussed in the following section. This paper also gives a critical analysis of the RIPv2, EIGRP and OSPF in terms of their characteristics, operations, and application within computer networks.
6 pages (1500 words) Essay
Blowfish Encryption Algorithm
As information technology is now considered as the fundamental function, every organization acquires information systems for business automation. Moreover, electronic commerce has also introduced many businesses that are only virtually present. For instance, Amazon that is an online store for selling books generates revenue from the Internet.
8 pages (2000 words) Essay
Pollard Rho Algorithm
The most significant application of this algorithm is with Discrete Logarithmic Problem (DLP). It is a probabilistic algorithm which works by sequential iterations of a random quadratic function. Random coefficients are selected for a standard quadratic function which generates numbers, which are reduced modulo the composite number.
3 pages (750 words) Essay
Simulation Of Routing Protocols
A amount of routing protocols have been projected to make available multi-hop communication in wireless, ad hoc networks. Usually these protocols are assessing in terms of packet loss rates, routing significance overhead, and route. Figure 1: contrast of energy consumed for four ad hoc routing protocols by dissimilar energy models (left, black bars are with no considering energy obsessive when eavesdrop; right, gray bars include this consumption).
5 pages (1250 words) Essay
Advanced Routing Protocols
The power & speed of Internet have achieved this level because of the routing protocols that have ensured smooth & reliable performance irrespective of the number of nodes getting added continuously. The routing protocols can propagate millions of network changes across the globe within a small timeframe to every routing device connected to the Internet.
22 pages (5500 words) Essay
Hash Algorithm and Secure Hash Algorithm
The fingerprints are called hash sums, hash values, hash codes or simply hashes. (Note that hashes can also mean the hash functions.) Hash sums are commonly used as indices into hash tables or hash files. Cryptographic hash functions are used for various purposes in information security applications.""1
12 pages (3000 words) Essay
Routing Protocols Of Cisco
A routing protocol is defined as a procedure, which stipulates the mode of communication between two or more routers within a computer network. In addition, routing protocols provide rules through which routers in a network environment choose the paths to be followed between nodes through application of various routing algorithms.
6 pages (1500 words) Essay
Multicast routing in mobile networking
V is the multicast extension of Ad hoc On-Demand Distance Vector (AODV) routing protocol, and it shares many similarities and packet formats with AODV. (E.L. Madruga) With regard to throughput rate runned when the numbers of receivers are one and two, MAODV is higher than
2 pages (500 words) Essay
Routing Protocol
After recalling the previous network, the routing protocol then shares the information among the routers on the same path then to the routers across the entire network (Jaffar, 2007) Most of the widely used routing protocol includes the Enhanced interior Gateway routing
2 pages (500 words) Essay
Hire a pro to write
a paper under your requirements!
Win a special DISCOUNT!
Put in your e-mail and click the button with your lucky finger
Your email
Comments (0)
Click to create a comment