Temporally-Ordered Routing Algorithm - Essay Example

Only on StudentShare

Extract of sample
Temporally-Ordered Routing Algorithm

The protocol's reaction is structured as a temporally-ordered sequence of diffusing computations; each computation consisting of a sequence of directed link reversals. The protocol is highly adaptive, efficient and scalable; being best-suited for use in large, dense, mobile networks. In these networks, the protocol's reaction to link failures typically involves only a localized "single pass" of the distributed algorithm. This capability is unique among protocols which are stable in the face of network partitions, and results in the protocol's high degree of adaptivity . This desirable behavior is achieved through the novel use of a "physical or logical clock" to establish the "temporal order" of topological change events which is used to structure (or order) the algorithm's reaction to topological changes. (Park and Corson, 1997, p.1)
The basic, underlying algorithm is neither distance-vector nor link-state; it is a member of a class referred to as link-reversal algorithms. The protocol builds a loop-free, multipath routing structure that is used as the basis for forwarding traffic to a given destination. The protocol can simultaneously support both source-initiated, on-demand routing for some destinations and destination-initiated, proactive routing for other destinations. (Lundberg, 2002)
Routing optimality (i.e. determination of the shortest path) is less important for the TORA algorithm. ...Show more


The Temporally-Ordered Routing Algorithm (TORA) is an algorithm for routing data across Wireless Mesh Networks or Mobile ad-hoc networks (MANET). It was developed by Vincent Park at the University of Maryland, College Park and the Naval Research Laboratory…
Author : efriesen
Save Your Time for More Important Things
Let us write or edit the essay on your topic
"Temporally-Ordered Routing Algorithm"
with a personal 20% discount.
Grab the best paper

Related Essays

Echo cancellation and applications
Their scope lies in the full duplex data transmission over wire to wire circuits. Echo is observed in telecommunications. Certain filter structures are used including FIR, IIR, lattice structure, frequency domain structure, memory type structure, among which FIR is of most use.
7 pages (1750 words) Essay
Young Generation And Dependence On Technology.
Young generation and dependence on technology. In this 21st century, the advancement of technology is at a very high rate. Moreover, individuals all around the world strive to keep up with technology’s high rate of advancement. This is so since through technology different activities such as communication and technical processes can be done effectively and efficiently.
3 pages (750 words) Essay
Mobile IP
Popular transport protocols, such as TCP (Allman et al., 1999), keep track of their internal session state between the communicating endpoints by using the IP address of the two endpoints and their port numbers. On the other hand, IP addresses are also used to find a route between the endpoints.
8 pages (2000 words) Essay
Mobility Management
The proposed scheme reduces the amount of signaling traffic, allows increasing number of users without creating a bottleneck. It supports high scalability and improves network performance. 1 A routing zone is defined for each node in a network and includes the nodes whose distance in hops is at most some predefined maximal number, which is referred to here as the zone radius.
4 pages (1000 words) Essay
Embedded Web Server
The commonly using Protocol is the Transmission Control Protocol (TCP) which is a high quality data transferring system. This system assures connection between two partners and is capable to provide a guaranteed safeguarded communication system. The main intension of this essay is to make the user fully aware with the Web Server.
14 pages (3500 words) Essay
Congestion control
A TCP sender estimates congestion in a network depending on the number of duplicate ACKs. If it receives three duplicate ACKs, it considers the network as congested and loss of that particular segment of which the receiver TCP is sending ACKs. So for the resending of lost segment the sender TCP waits for a total of four ACKs from receiver.
2 pages (500 words) Essay
Engineering Science
However, we can approximate the frequency of resonance from the chart by finding the median frequency of the peak current values for each value of R. The measured values from the table were all within range and close to the calculated value. The discrepancies arise from the accuracy of the components, resolution of the testing equipment, and the limitations of the test setup.
8 pages (2000 words) Research Paper
Advanced Routing Protocols
The power & speed of Internet have achieved this level because of the routing protocols that have ensured smooth & reliable performance irrespective of the number of nodes getting added continuously. The routing protocols can propagate millions of network changes across the globe within a small timeframe to every routing device connected to the Internet.
22 pages (5500 words) Essay
Mobile Computing
The later sections will deal with a survey on the computers present in the vehicles and their user interfaces. The advances in mobile computing and communication technology have made it possible today to equip each and every vehicle with equipment that has high computing and communication capability.
10 pages (2500 words) Essay
Hash Algorithm and Secure Hash Algorithm
The fingerprints are called hash sums, hash values, hash codes or simply hashes. (Note that hashes can also mean the hash functions.) Hash sums are commonly used as indices into hash tables or hash files. Cryptographic hash functions are used for various purposes in information security applications.""1
12 pages (3000 words) Essay
Find out how much would it cost
to get a custom paper written by a pro under your requirements!
Win a special DISCOUNT!
Put in your e-mail and click the button with your lucky finger
Your email