Table of Contents Author Guidelines Submit a Manuscript
Mathematical Problems in Engineering
Volume 2014 (2014), Article ID 539793, 11 pages
http://dx.doi.org/10.1155/2014/539793
Research Article

Research on Routing Algorithm Based on Limitation Arrangement Principle in Mathematics

1College of Information Science and Engineering, Northeastern University, Shenyang, Liaoning 110819, China
2Key Laboratory of Networked Control System, The Chinese Academy of Sciences, Shenyang, Liaoning 110016, China

Received 13 July 2014; Revised 15 September 2014; Accepted 15 September 2014; Published 30 October 2014

Academic Editor: Dan Simon

Copyright © 2014 Jianhui Lv et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Abstract

Since the research on information consistency of the whole network under OSPF protocol has been insufficient in recent years, an algorithm based on limitation arrangement principle for routing decision is proposed and it is a permutation and combination problem in mathematical area. The most fundamental function of this algorithm is to accomplish the information consistency of the whole network at a relatively fast speed. Firstly, limitation arrangement principle algorithm is proposed and proved. Secondly, LAP routing algorithm in single link network and LAP routing algorithm in single link network with multiloops are designed. Finally, simulation experiments are worked by VC6.0 and NS2, which proves that LAPSN algorithm and LAPSNM algorithm can solve the problem of information consistency of the whole network under OSPF protocol and LAPSNM algorithm is superior to Dijkstra algorithm.

1. Introduction

With the rapid development of social economic, the computer network develops rapidly. The relationship between the current Internet and our life is more and more close. Meanwhile, network resource and the amount of information are consistently increasing, which leads to the emergence of many problems including the following: the computer network loads onerously, the switch speed of information slows down, and the communication quality becomes poor [1]. Therefore, it should not be ignored to design an efficient, stable, and flexible routing algorithm to solve the problems. In recent years, the routing algorithm has been a hotspot, and research on routing algorithm mainly includes three different directions as follows: (1) a new network environment is proposed, and a routing algorithm is studied under it, for example, Ad Hoc, NoC, WSN, IoT, and DNT [26]; (2) a hybrid routing algorithm is designed based on two or more mature algorithms, which is usually heuristic or intelligent (e.g., artificial intelligence and biological intelligence); (3) the traditional research mode is converted and a new routing algorithm is designed, which is the theoretical innovation [711].

Routing algorithm is a special computation method, and its purpose is to realize routing function. The traditional routing algorithms include static/dynamic, host intelligently/routing intelligently, domain/outside, and link state/distance vector [1215]. In short, routing algorithm should be fast in convergence speed, simple and easily understood, stable, strong, and flexible. In fact, it is of no significance to only do research on routing algorithm. The routing algorithm should be used to some routing protocols. The routing protocol can collect data of network in current state, for this reason, and then find the optimal path [16]. RIP and OSPF [17, 18] are two typical internal gateway protocols. RIP protocol fails to cope with a large amount of nodes in network, so OSPF protocol has been a common protocol in recent years. OSPF protocol was proposed in 1989 and it aims at accomplishing the information consistency of the whole network as soon as possible [19]. In OSPF protocol, Dijkstra algorithm [20] is always used to accomplish the information consistency of the whole network under OSPF protocol and it is also approved by domestic and foreign experts and scholars.

Information consistency is defined as follows: any one routing node can know the information of the other routing nodes. For example, there are 4 nodes in network; they are A, B, C, and D. If A owns the information “”, B owns the information “@@”, C owns the information “##”, and D owns the information “$$”, then they all own “”, “@@”, “##”, and “$$” after accomplishing the information consistency. Of course, it is very important to keep information consistency of the whole network. Three reasons are listed as follows. (1) OSPF protocol focuses on whether the link state is synchronous or not. The information of all routing nodes must keep consistency; namely, any routing node can know the network topology at any time. (2) In recent years, Internet technology has developed rapidly; plenty of science and technology information resources are stored in Internet. These resources can be browsed online and shared smoothly by keeping the information consistency of the whole network. (3) The other routing nodes can be regarded as the copies to exchange information with each other when one or more routing nodes go wrong. In this way, the integrity of the network information can be guaranteed. But, it is a pity that the research on information consistency of the whole network under OSPF protocol has been insufficient for 25 years and people only focus on how to detect the information consistency [2123]. In terms of the study of information consistency, Dijkstra algorithm has been selected as the unique algorithm so far (i.e., no other algorithms). Generally, Dijkstra algorithm focuses on the cost of link, and plenty of time is spent to compare all cost of link when the shortest path is found. Does it have a kind of new method that can avoid the trouble to achieve the same purpose as Dijkstra algorithm? In this paper, we will study the information consistency of the whole network under OSPF protocol.

Given the above consideration, LAP routing algorithms including LAPSN algorithm and LAPSNM algorithm are proposed to solve the problem of the information consistency of the whole network under OSPF protocol. The LAP routing algorithms are inspired by LAP algorithm that is a permutation and combination problem in mathematical area. Meanwhile, LAP algorithm is a new algorithm and it is proposed and proved based on another limitation arrangement problem. Three strategies are used to design LAP routing algorithms, including the depth traversal method, off nodes method, and added loops method. The static experiments on VC6.0 and the dynamic experiments on NS2 are performed for two designed LAP routing algorithms. The former results reveal that routing algorithm in this paper is feasible and effective. The latter results demonstrate that the routing algorithm can accomplish the information consistency of the whole network and LAPSNM algorithm is superior to Dijkstra algorithm and LAPSN algorithm.

The paper is organized as follows. Section 2 proposes the limitation arrangement principle algorithm and gives the optimal limitation arrangement. The limitation arrangement principle algorithm is applied to OSPF protocol and to solve the problem of information consistency, two routing algorithms including LAPSN algorithm and LAPSNM algorithm are designed in Section 3. Experimental results based on two routing algorithms are reported in Section 4. Finally, Section 5 concludes this paper.

2. Description of LAP Algorithm

To discuss this paper, the notations are introduced in Notations section.

2.1. LAP Algorithm
2.1.1. Another Limitation Arrangement Problem

Limitation arrangement principle (LAP) is a permutation and combination problem in mathematical area, and it is a new mathematical problem inspired by another limitation arrangement (ALA) problem. ALA problem can be described in Definition 1.

Definition 1. Given a positive integer and a set , elements in set are arranged; if are not included in an arrangement, then the arrangement is an another limitation arrangement. Let represent the number of ALA, and is shown in Theorem 2.

Theorem 2. Consider , and then

2.1.2. LAP Problem

Definition 3. Given a positive integer and a set , elements in set are arranged; if and are not included in an arrangement, then the arrangement is a limitation arrangement (LA). Suppose is named as model 1 and is named as model 2. Let represent the number of LA, and is shown in Theorem 4.

Theorem 4. Consider where is shown in

Proof. (1) Consider :(a), the arrangement of set is , and 1 model 1 and 1 model 2;(b), the arrangements of set are and , and among them, 12 model 1 and 21 model 2;(c), the arrangements of set are , , , , , and , and among them, the front three arrangements belong to model 1, and the others belong to model 2.
Consequently, when , 2 or 3, all arrangements are not LAs. In short, .
(2) Consider . The style of is similar to that of by Theorem 2, so is just to be proved in Theorem 4. On this condition, the method of abstract generalizations is adopted to prove . Let ; then , , and can be got as follows:
To compare and analyze , , and , when , we generalize . Consider
The trend is extended to arbitrary ; the formula (3) can be got.
To sum up (1) and (2), Theorem 4 is proved.

2.2. Optimal LA Algorithm

In LAs, there must be a LA that is the optimal limitation arrangement (OLA). OLA can be described in Definition 5.

Definition 5. Suppose , given two LA events: and . The corresponding LAs are and . The corresponding mathematical expectations are and , and we have the following formula:

If , then the event of the lesser mathematical expectation is OLA; otherwise, or can be regarded as OLA.

According to Definition 5, we give Theorem 6.

Theorem 6. Consider , and then

Proof. (1) Consider , there are two LAs, they are and , and their mathematical expectations are 6, so they can be regarded as OLA.
(2) Consider , suppose LA is , and it is denoted by event . can be shown in
We have two constraint conditions as follows:
Formula (10) is substituted into formula (8); we have the following two formulas: (a)For formula (11), if is minimum, then . Formula (9) is taken into account, , and then . In a similar way, is .(b)For formula (12), if is minimum, then . Similarly, formula (9) is taken into account; is .
In short, when , OLA is .
(3) Consider . Its proof method is similar to that of .
To sum up (1), (2), and (3), Theorem 6 is proved.

3. LAP Routing Algorithm Design

3.1. Basic Points

OSPF protocol pays attention to the information consistency of the whole network, namely, whether the link state is synchronous or not in computer network. Let , and these elements in set are different from each other. These routers in network are converted into different numbers, and they can be regarded as the elements in set . Suppose nodes are arranged in a single link network, and then only these adjacent nodes can exchange information at the initial moment. Right after this, the nodes are moved repeatedly by some methods, and information consistency of nodes can be accomplished at some point. The process can be regarded as LAP transform, and the method can be named as LAP. In fact, LAP algorithm can be used for computer network and to keep the information consistency of the whole network under OSPF protocol, which is inspired by the following three basic points: the existence of network path, the construction of adjacent routers, and the existence of network loops.

3.1.1. Network Path

Only when network connection is available, the information can be transmitted fluently. We have Theorem 7.

Theorem 7. Suppose network connection is available; a path can be found from node to node .

Proof. Suppose all nodes are included into set , and the computer network can be decomposed into single link structures. They are denoted by , the corresponding sets of nodes are denoted by , and these connection nodes between each single link are denoted by (e.g., the connection node between and is ). We have the following formula:
Let node be in single link and node in single link ; then and . If , then node and node are in the same single link. It is obvious that a path can be found from node to node . If , any , then a path can also be found from node to node by these connection nodes . Similarly, a path can also be found from node to node when . To sum up, Theorem 7 is proved.

3.1.2. Adjacent Routers

At the initial moment, node is adjacent to node and node , and node can get the information of node and node indirectly (i.e., node can exchange information with node and node without any hop). Right after this, nodes should be rearranged by running the limitation arrangement after nodes are moved. In short, node should not be adjacent to node and node at the next limitation arrangement moment. It should be adjacent to other routing nodes except node , node , and node , which is named the maximization construction on adjacent routers. For example, there are four routing nodes in single link network; they are , , , and in turn. At the initial moment, node can get the information of node and node indirectly. At the next limitation arrangement moment, node should be adjacent to node . And then, the arrangement may be not . All processes need LAP algorithm to realize the maximization construction on adjacent routers, which aims at improving the speed of information consistency of the whole network (e.g., node should be adjacent to other routing nodes. Otherwise, the solution is still the local optimal solution).

3.1.3. Network Loops

The single link network is an ideal network topology, and there are a lot of loops in the actual network topology. At the initial moment, if one routing node is adjacent to many routing nodes, then it can accomplish information consistency with the other routing nodes faster. When these loops in network are so adequate that the network topology becomes an undirected complete graph, it is the best state that information consistency of the whole network can be accomplished at the fastest speed. So, the study of adding multiloops to single link network is necessary (See Section 3).

3.2. LAP Routing Algorithm in Single Link Network
3.2.1. Symmetric 0/1 Table

In this paper, we use symmetric 0/1 table to mark the results of information exchange. In terms of node and node , if node and node have accomplished the information exchange, then the corresponding element value is 1; otherwise, it is 0. Any element of the symmetric 0/1 table is denoted by and shown in the following formula:

In terms of routers, the state of information exchange after the initial moment is shown in Table 1.

tab1
Table 1: Information exchange table after initialization for routers.

In Table 1, at the initial moment, all routing nodes are converted into different numbers and arranged for . Any routing node knows its own information; hence . And because adjacent routing nodes can exchange information indirectly,  . At the next limitation arrangement moment, if a routing node can obtain the new information of other routing nodes, then the element is changed to 1 from 0. If all the elements in Table 1 are 1, then routing nodes have accomplished the information consistency in single link network. Here, it must be noted that OLA should be considered as the first LA in LAP routing algorithm because the corresponding mathematical expectation is the least, which saves time at the next limitation arrangement moment.

Suppose there are five routers in single link network. At the initial moment, the arrangement is ; the status of information exchange can be seen from Table 2(a). The arrangement is at the first limitation arrangement moment (i.e., OLA). The symmetric 0/1 table should be modified; then , , , and are changed to 1 from 0. The status of information exchange can be seen from Table 2(b). After OLA, and are still 0; the next limitation arrangement should ensure that routing node 1 and routing node 4 or/and routing node 5 are adjacent. The arrangement is at the second limitation arrangement moment, and is changed to 1 from 0. The status of information exchange can be seen from Table 2(c). At the third limitation arrangement moment, the arrangement is . is changed to 1 from 0, and the status of information exchange can be seen from Table 2(d). In Table 2(d), all elements are 1; in other words, the five routers have accomplished the information consistency.

tab2
Table 2: Changing process of information exchange for five routers.
3.2.2. Depth Traversal Method

After initialization and OLA, one node is selected randomly as the head node, and then does depth traversal for the network topology. The concrete method is described in Hypothesis 1.

Hypothesis 1. When the next routing node needs to be researched, the next routing node number should be the routing node number which accomplishes the information consistency with the other routing nodes at the slowest speed. Namely, it is the routing node number that the number of 0 in one row or column in symmetric 0/1 table is the greatest and the used routing node number in former cannot be regarded as the next routing node number. If the number of 0 in two or more rows is equal, then the minimal routing node number should be regarded as the next routing node number.
Suppose there are eight routers in single link network; the routing node number 1 is regarded as the head node, and the changing process of LA is shown in column 2 in Table 3.
As can be seen from column 2 in Table 3, the information consistency of eight routers can be accomplished by six times LAs, and the total number of coped routing nodes is 48.

tab3
Table 3: Changing process of LA in single link network for eight routers.
3.2.3. Off Nodes Method

It is a phenomenon: at some moment, one or more routing nodes have accomplished the information consistency with the other routers in advance. If these routing nodes are still coped in the following LAs, then a lot of time will be spent because a lot of information is exchanged repeatedly. Given the above statement, we have Hypothesis 2.

Hypothesis 2. If one or more routing nodes have accomplished the information consistency with the other routing nodes in advance, then they should not be coped in the following LAs.
Suppose there are eight routers in single link network. In this way, the changing process of LA is shown in column 3 in Table 3.
It needs the same LA numbers (i.e., six times LAs) to accomplish the information consistency of eight routers under Hypotheses 1 and 2 as can be seen from Table 3. However, it needs to cope with 48 routing nodes (See column 2) under Hypothesis 1 because every time LA needs to cope with 8 routing nodes. And it needs to cope with 34 routing nodes (See column 3) under Hypothesis 2 because routing nodes 2, 3, and 4 are off at the forth LA, routing node 5 is off at the fifth LA, and routing node 6 is off at the sixth LA. In other words, the total number of coped routing nodes decreases obviously under Hypothesis 2, which proves that, in comparison with Hypothesis 1, Hypothesis 2 is better. Additionally, an example of five routers in single link network (see Table 2 for details). After the first limitation arrangement moment, routing nodes 2 and 3 have accomplished the information consistency with the other routing nodes (i.e., all elements of column 2 and 3 are 1). So they should not be coped in the following LAs; namely, routing nodes 2 and 3 are off (see Table 2(b) for details).

3.2.4. LAPSN Algorithm Description

After analysis of LAP algorithm and its related theorems, depth traversal method, and off nodes method, the routing algorithm based on limitation arrangement principle in single link network (LAPSN) is described in Algorithm 1.

Algorithm 1: LAPSN.

Step  1. routing nodes in single link network are converted into different numbers.

Step  2. The OLA is got by Theorem 6. The current state of information exchange is marked by symmetric 0/1 table.

Step  3. The th LA is run, and routing nodes are coped. The number of off routing nodes is checked, right after this; suppose it is ; the th LA is run and routing nodes are coped. Otherwise, the th LA is run and routing nodes are coped.

Step  4. Check the current LA. If the number of routing nodes is 2, then convert to Step 5; otherwise, convert to Step 3.

Step  5. Check the symmetric 0/1 table. If all elements in symmetric 0/1 table are 1, then end algorithm 1; otherwise, convert to Step 2.

3.3. LAP Routing Algorithm in Single Link Network with Multiloops
3.3.1. Added Loops Model

The complex networks can be got by adding multiloops to single link network. In reality, the single link network with multiloops is the complex networks. The added loops model is shown in Figure 1.

539793.fig.001
Figure 1: The model of single link network with multiloops.

The dashed line in Figure 1 represents that the link between two routing nodes cannot be added. At the initial moment, the adjacent routing nodes are connected, so the link between routing node and routing node or routing node cannot be added. The link between routing node and routing node or routing node cannot be added because there is a link between them in OLA. For the same reason, the link between routing node 2 and routing node cannot be added.

Theorem 8. Suppose links can be added to single link network; the kinds of added links are , where is shown in formula (15). In this paper, we maintain that the number of links added is equivalent to that of loops added. Consider

Proof. (1) Proof of formula  (15) is as follows.
The total number of links in an undirected complete graph is . At the initial moment, the number of links in single link network is . At OLA moment, the number of links is . We have formula (16), and it is equivalent to formula (15). Consider
(2) Proof of is as follows.
Give three variables , , and , is shown in the following formula:
Let and ; formula (17) can be converted to the following formula:
According to permutation and combination principle, it has kinds to add 1-loops (i.e., only one loop) to single link network and kinds to add 2-loops to single link network. Similarly, it has kinds to add -loops to single link network. To summarize, the kinds of added links in single link network are . We know that it is equivalent to when both sides of formula (18) are subtracted by 1.
To sum up (1) and (2), Theorem 8 is proved.

In order to study the network model of added loops, given is an added loops method and it is shown in Hypothesis 3.

Hypothesis 3. Begin to add loops to single link network from the head node, and then add loops to single link network from the next node. The sequence by which links are added is .

3.3.2. LAPSNM Algorithm Description

Limitation arrangement principle in single link network with multiloops (LAPSNM) is described in Algorithm 2.

Algorithm 2: LAPSNM.

Step  1. routing nodes in single link network are converted into different numbers.

Step  2. The OLA is got by Theorem 6. The current state of information exchange is marked by symmetric 0/1 table. The total number of coped routing nodes is recorded, and it is .

Step  3. Add links to single link network, and then run LAPSN algorithm. If the current number of added links is less than , then run Step 3 repeatedly; otherwise, convert to Step 4.

Step  4. Update . If , then convert to Step 5; otherwise, convert to Step 3.

Step  5. Update symmetric 0/1 table. If all elements in symmetric 0/1 table are 1, then end Algorithm 2; otherwise, convert to Step 3.

4. Simulation Results

In this Section, we will give two kinds of simulation experiments, one is to test the performance of LAPSN algorithm (i.e., optimization results under Hypothesis 2) and LAPSNM algorithm (i.e., optimization results by adding links to single link network), and the other one is to be compared with Dijkstra algorithm on information consistency delays of the whole network. The test environment is set up on a personal computer with Intel Q8400, 2.66 GHZ CPU, 4 G RAM, and running on Windows 7. In addition, two different simulators (i.e., VC6.0 and NS2) are selected to test LAPSN algorithm and LAPSNM algorithm, which is necessary and reasonable. Three reasons are listed as follows. Firstly, VC6.0 adopts C++ code; the results often are ideal because they are without considering bandwidth, delays, cache, and so forth. However, it can be used to test enormous routing nodes. NS2 is a network simulator, and it adopts VC++ code and OTCL script. The results often are considerably realistic. However, it usually is applied to test relatively fewer routing nodes. Secondly, the combination of two experiments of different styles can further prove the rationality of algorithms, which ensures that the structure of this paper is rigorous and the algorithms can be more easily accepted by other authors. Finally, VC tests Hypotheses 1 and 2 and the method of added links, which is microcosmic. NS2 tests delays of algorithms, which is macroscopic.

4.1. Static Experiments

LAPSN algorithm and LAPSNM algorithm are implemented in VC6.0.

4.1.1. LAPSN Algorithm Experiment

There are 5–400 routing nodes in single link network and the step size is one. The LA numbers and code running time under Hypothesis 1 are shown in Figure 2.

539793.fig.002
Figure 2: LA numbers and code running time under Hypothesis 1.

The line that comes from LA numbers changes smoothly and stably and the curve that comes from the code running time also changes smoothly and stably, which proves that Hypothesis 1 has impact on LAPSN algorithm stably. Additionally, the number of LA is 0 at the beginning because the limitation arrangement is generated when the number of routing nodes in single link network is greater than 4, which can be seen from (2) on condition where . In summary, Hypothesis 1 has a good adaptability for LAPSN algorithm.

In order to prove the performance of Hypothesis 2, we do two kinds of experiments. One is given 75–115 routing nodes in single link network and the step size is five, and the other one is given 40–400 routing nodes in single link network and the step size is forty. The experimental results are shown in Figures 3 and 4.

539793.fig.003
Figure 3: The relationship between LA numbers and the number of coped routing nodes in a LA where with step size of 5 in single link network.
539793.fig.004
Figure 4: The relationship between LA numbers and the number of coped routing nodes in a LA where with step size of 40 in single link network.

Suppose routing nodes in single link network are . The number of coped routing nodes in a LA begins to decrease when LA numbers are about because some routing nodes begin to be off at this moment, which can be proved by Hypothesis 2. By analysis of Figures 3 and 4, we know that the change of the relationship between LA numbers and the number of coped routing nodes in a LA is very stable by 21 polygonal lines. The concrete performance is denoted by , that is, the difference between 1 and the ratio of the total number of coped routing nodes under Hypothesis 2 and the total number of coped routing nodes without Hypothesis 2 and shown in Table 4.

tab4
Table 4: Performance table of LAPSN algorithm under Hypothesis 1 and Hypothesis 2.

We know that the performance is in by Figures 3 and 4 because the number of coped routing nodes in a LA begins to decrease when LA numbers are about . As can be seen from Table 4, with the increase of routing nodes in single link network, the performance on LAPSN algorithm under Hypothesis 2 improves correspondingly and they are in . In addition, the total number of coped routing nodes under Hypothesis 2 is less than that of Hypothesis 1. The results prove that Hypothesis 2 has a good optimization performance on LAPSN algorithm.

4.1.2. LAPSNM Algorithm Experiment

The experimental examples are the same as Section 4.1.1. We study the relationship between the number of added links and the total number of coped routing nodes. LAPSNM algorithm is run, and we have Figures 5 and 6.

539793.fig.005
Figure 5: The relationship between the number of added links and where with step size of 5 under Hypothesis 3.
539793.fig.006
Figure 6: The relationship between the number of added links and where with step size of 40 under Hypothesis 3.

In general, with the increase of the number of added links, the total number of routing nodes which are coped decreases. When the number of added links reaches , the information consistency of whole network is accomplished (i.e., it can be seen from (15)), because the complex network is an undirected complete graph and all routing nodes can exchange information with each other at the same time (i.e., the total number of coped routing nodes is which is seen from (7)). In short, LAPSNM algorithm is superior to LAPSN algorithm.

4.2. Dynamic Experiments

LAPSN algorithm and LAPSNM algorithm are implemented in NS2. Because Dijkstra algorithm is only used to accomplish the information consistency of the whole network under OSPF protocol at present, they are compared with Dijkstra algorithm in this section.

4.2.1. LAPSN Algorithm Test

Simulation parameters are as follows: packet size is 256 MB, link capacity is 1 Mbit/s, buffer queue type is Droptail, link type is Duplex-link, and buffer queue size is 1 GB. Routing nodes are 11–20 in single link network, the corresponding network delays are 11–20 ms, and movement delays of routing node are 1 ms. The information consistency delays of whole network are shown in Figure 7.

539793.fig.007
Figure 7: The relationship between routing nodes in single link network and information consistency delays.

In Figure 7, the information consistency delays of LAPSN algorithm are greater than that of Dijkstra algorithm. With the increase of routing nodes in single link network, the delays difference is greater and greater. Generally, LAPSN algorithm can solve the problem of information consistency of the whole network under OSPF protocol. But it is inferior to Dijkstra algorithm.

4.2.2. LAPSNM Algorithm Test

Simulation parameters are as follows: routing nodes are 20 in single link network, the corresponding network delays are 20 ms, buffer queue size is 5 GB, and the other simulation parameters are the same as Section 4.2.1. We add 5, 10, 25, and 100 loops to single link network. The changing process of accumulation delays is shown in Figure 8, and the information consistency delays of whole network are shown in Table 5.

tab5
Table 5: The comparison table of information consistency delays/ms.
539793.fig.008
Figure 8: The changing process of information consistency delays in single link network with 5, 10, 25, and 100 loops.

As can be seen from Figure 8 and Table 5, the more added loops to the single link network, the less obviously the information consistency delays of the whole network. Therefore, we conclude that LAPSNM algorithm also can solve the problem of information consistency of the whole network under OSPF protocol and it is superior to LAPSN algorithm and Dijkstra algorithm.

5. Conclusions

In this paper, we give three definitions including ALA, LA, and OLA. Four theorems are proved including LAs, OLA, network path, and added loops. Three hypotheses are proposed including depth traversal method, off nodes method, and added loops method. In order to do further research on information consistency of the whole network under OSPF protocol, two LAP routing algorithms are designed. In Static Experiments section, the results reveal that LAPSN algorithm and LAPSNM algorithm have a good performance. In the Dynamic Experiments section, the results prove that LAPSN algorithm and LAPSNM algorithm can solve the problem of information consistency of the whole network under OSPF protocol and the performance of LAPSNM is superior to that of LAPSN algorithm and Dijkstra algorithm. In the next steps, we will study the stability of LAPSN algorithm and LAPSNM algorithm and propose a new algorithm for the complex networks.

Notations

LAP:Limitation arrangement principle
ALA:Another limitation arrangement
OLA:Optimal limitation arrangement
:The number of ALA
:The number of LA
:LA event, LA:
:The mathematical expectation of
:The number of routing nodes in network
:The set of all routing nodes
:Routing node
:Subsingle link structure
:Connection node between two subsingle links
:The number of off routing nodes
:The number of added links
:The total number of coped routing nodes with multiloops
:Optimization efficiency.

Appendix

The source code of LAPSN algorithm can be found at http://lvjianhui.lingw.net/article-6246686-1.html and that of LAPSNM algorithm can be found at http://lvjianhui.lingw.net/article-6246646-1.html.

Conflict of Interests

The authors declare that there is no conflict of interests regarding the publication of this paper.

Acknowledgments

This work is supported by the National Science Foundation for Distinguished Young Scholars of China under Grant nos. 61225012 and 71325002, the Specialized Research Fund of the Doctoral Program of Higher Education for the Priority Development Areas under Grant no. 20120042130003, and the Fundamental Research Funds for the Central Universities under Grant nos. N110204003 and N120104001.

References

  1. A. S. Tanenbaum, Computer Networks, Tsinghua University Press, Beijing, China, 5th edition, 2012.
  2. S. M. Senouci and G. Pujolle, “Minimization of energy consumption in ad hoc networks,” Annales des Telecommunications, vol. 60, no. 3-4, pp. 500–518, 2005. View at Google Scholar · View at Scopus
  3. U. Saravanakumar and R. Rangarajan, “Energy and throughput analysis of multicast routing algorithm for 2D mesh network on chip,” Procedia Engineering, vol. 30, no. 2, pp. 144–151, 2012. View at Google Scholar
  4. L. Wei and W. Lele, “Ant colony optimization routing algorithm based on WSN,” ICIC Express Letters, Part B: Applications, vol. 4, no. 3, pp. 541–547, 2013. View at Google Scholar · View at Scopus
  5. H.-D. Ma, “Internet of things: objectives and scientific challenges,” Journal of Computer Science and Technology, vol. 26, no. 6, pp. 919–924, 2011. View at Publisher · View at Google Scholar · View at Scopus
  6. D. Rothfus, C. Dunning, and X. Chen, “Social-similarity-based routing algorithm in delay tolerant networks,” in Proceedings of the IEEE International Conference on Communications (ICC '13), pp. 1862–1866, IEEE, Budapest, Hungary, June 2013. View at Publisher · View at Google Scholar · View at Scopus
  7. Y. Adulyasak, J.-F. Cordeau, and R. Jans, “Formulations and branch-and-cut algorithms for multivehicle production and inventory routing problems,” INFORMS Journal on Computing, vol. 26, no. 1, pp. 103–120, 2014. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  8. A. Castagnetti, A. Pegatoquet, T. N. Le, and M. Auguin, “A joint duty-cycle and transmission power management for energy harvesting WSN,” IEEE Transactions on Industrial Informatics, vol. 10, no. 2, pp. 928–936, 2014. View at Publisher · View at Google Scholar · View at Scopus
  9. H.-D. Ma, “Internet of things: objectives and scientific challenges,” Journal of Computer Science & Technology, vol. 26, no. 6, pp. 919–924, 2011. View at Publisher · View at Google Scholar · View at Scopus
  10. D. Rothfus, C. Dunning, and X. Chen, “Social-similarity-based routing algorithm in Delay Tolerant Networks,” in Proceedings of the IEEE International Conference on Communications (ICC '13), pp. 1862–1866, Budapest, Hungary, June 2013. View at Publisher · View at Google Scholar · View at Scopus
  11. K. Murota and A. Shioura, “Dijkstra's algorithm and L-concave function maximization,” Mathematical Programming, vol. 145, no. 1-2, pp. 163–177, 2014. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  12. Á. Rubio-Largo and M. A. Vega-Rodríguez, “Applying MOEAs to solve the static routing and wavelength assignment problem in optical WDM networks,” Engineering Applications of Artificial Intelligence, vol. 26, no. 5-6, pp. 1602–1619, 2013. View at Publisher · View at Google Scholar · View at Scopus
  13. B. Nancharaiah and B. Chandra Mohan, “The performance of a hybrid routing intelligent algorithm in a mobile ad hoc network,” Computers & Electrical Engineering, vol. 40, no. 4, pp. 1255–1264, 2014. View at Publisher · View at Google Scholar · View at Scopus
  14. J. Jiang, W. Li, J. Luo, and J. Tan, “A network accountability based verification mechanism for detecting inter-domain routing path inconsistency,” Journal of Network and Computer Applications, vol. 36, no. 6, pp. 1671–1683, 2013. View at Publisher · View at Google Scholar · View at Scopus
  15. G. Cervera, M. Barbeau, J. Garcia-Alfaro, and E. Kranakis, “A multipath routing strategy to prevent flooding disruption attacks in link state routing protocols for MANETs,” Journal of Network and Computer Applications, vol. 36, no. 2, pp. 744–755, 2013. View at Publisher · View at Google Scholar · View at Scopus
  16. G.-X. Kok, C.-O. Chow, Y.-H. Xu, and H. Ishii, “EAOMDV-MIMC: a multipath routing protocol for multi-interface multi-channel mobile ad-hoc networks,” Wireless Personal Communications, vol. 73, no. 3, pp. 477–504, 2013. View at Publisher · View at Google Scholar · View at Scopus
  17. F. Kevin, “Chuck vest RIP,” Issues in Science and Technology, vol. 30, no. 2, pp. 19–20, 2014. View at Google Scholar
  18. L. Shi and J. H. Lv, “Routing decision algorithm based on limit arrangement,” Application Research of Computers, vol. 31, no. 1, pp. 257–260, 2014. View at Google Scholar
  19. E. C. G. Wille and M. M. Tenório, “Considering packet loss probability in fault-tolerant OSPF routing,” IEEE Latin America Transactions, vol. 12, no. 2, pp. 248–255, 2014. View at Publisher · View at Google Scholar · View at Scopus
  20. K. Murota and A. Shioura, “Dijkstra's algorithm and L-concave function maximization,” Mathematical Programming, vol. 145, no. 1-2, pp. 163–177, 2014. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  21. S. Peeta and A. Paz, “Behavior-consistent within-day traffic routing under information provision,” in Proceedings of the IEEE Intelligent Transportation Systems Conference (ITSC '06), pp. 212–217, Toronto, Canada, September 2006. View at Publisher · View at Google Scholar · View at Scopus
  22. A. Paz and S. Peeta, “Fuzzy control model optimization for behavior-consistent traffic routing under information provision,” IEEE Transactions on Intelligent Transportation Systems, vol. 9, no. 1, pp. 27–37, 2008. View at Publisher · View at Google Scholar · View at Scopus
  23. A. Paz and S. Peeta, “Behavior-consistent real-time traffic routing under information provision,” Transportation Research Part C: Emerging Technologies, vol. 17, no. 6, pp. 642–661, 2009. View at Publisher · View at Google Scholar · View at Scopus