Geographical routing 1

Size: px
Start display at page:

Download "Geographical routing 1"

Transcription

1 Geographical routing 1

2 Routing in ad hoc networks Obtain route information between pairs of nodes wishing to communicate. Proactive protocols: maintain routing tables at each node that is updated as changes in the network topology are detected. Heavy overhead with high network dynamics (caused by link/node failures or node movement). Not practical for ad hoc networks. 2

3 Routing in ad hoc networks Reactive protocols: routes are constructed on demand. No global routing table is maintained. Due to the high rate of topology changes, reactive protocols are more appropriate for ad hoc networks. Ad hoc on demand distance vector routing (AODV) Dynamic source routing (DSR) However, both depend on flooding for route discovery. 3

4 Geographical routing Data-centric routing: routing is frequently based on a nodes attributes and sensed data, rather than on pre- assigned network address. Geographical routing uses a node s location to discover path to that route. 4

5 Geographical routing Assumptions: Nodes know their geographical location Nodes know their 1-hop neighbors Routing destinations are specified geographically (a location, or a geographical region) Each packet can hold a small amount (O(1)) of routing information. The connectivity graph is modeled as a unit disk graph. 5

6 Geographical routing The source node knows The location of the destination node; The location of itself and its 1-hop neighbors. Geographical forwarding: send the packet to the 1-hop neighbor that makes most progress towards the destination. No flooding is involved. Many ways to measure progress. The one closestto the destination in Euclidean distance. The one with smallest angletowards the destination: compass routing. 6

7 Greedy progress 7

8 Compass routing may get in loops Compass routing may get in a loop. Send packets to the neighbor with smallest angle towards the destination 8

9 Geographical routing may get stuck Geographical routing may stuck at a node whose neighbors are all further away from the destination than itself. t t s s? Send packets to the neighbor closest to the destination 9

10 How to get around local minima? Use a planar subgraph: a straight line graph with no crossing edges. It subdivides the plane into connected regions called faces. 10

11 Face Routing Keep left hand on the wall, walk until hit the straight line connecting source to destination. Then switch to the next face. s t 11

12 Face Routing Properties All necessary information is stored in the message Source and destination positions The node when it enters face routing mode. The first edge on the current face. Completely local: Knowledge about direct neighbors positions is sufficient Faces are implicit. Only local neighbor ordering around each node is needed. Right Hand Rule 12

13 What if the destination is disconnected? Face routing will get back to where it enters the perimeter mode. Failed no way to the destination. Guaranteed delivery of a message if there is a path. 13

14 Face routing needs a planar graph. Compute a planar subgraph of the unit disk graph. Preserves connectivity. Distributed computation. 14

15 Relative Neighborhood Graph and Gabriel Graph Relative Neighborhood Graph (RNG)contains an edge uv if the lune is empty of other points. Gabriel Graph (GG)contains an edge uv if the disk with uv as diameter is empty of other points. Both can be constructed in a distributed way. 15

16 An example of UDG 200 nodes randomly deployed in a meters region. Radio range =250meters 16

17 An example of GG and RNG GG RNG 17

18 Overview of geographical routing Routing with geographical location information. Greedy forwarding. If stuck, do face routing on a planar sub-graph. 18

19 Bad news: Lower bound of localized routing Any deterministic or randomized localized routing algorithm takes a path of length Ω(k 2 ), if the optimal path has length k. The adversary decides where the chain wt is. Since we store no information on nodes, in the worst case we have to visit about Ω(k) chains and pay a cost of Ω(k 2 ). t s 19

20 Good news: greedy forwarding is optimal If greedy routing gets to the destination, then the path length is at most O(k 2 ), if the optimal path has length k. uv is at most k. On the greedy path, every other node is not visible, so they are of distance at least 1 away. By a packing lemma, there are at most O(k 2 ) nodes inside a disk of radius k. How is face routing? How is greedy + face routing? 20

21 Performance of face routing 21

22 Performance of face routing What if we choose the wrong side? 22

23 Adaptive face routing Suppose the shortest path on the planar graph is bounded by L hops. Bound the search area by an ellipsoid {x xs + xt L} never walk outside the ellipsoid. Follow one direction, if we hit the ellipsoid; turn back. If we find a better intersection p of the face with line st, change to the face containing pt. In the worst case, visit every node inside the ellipsoid: O(L 2 ) by the bounded density property (through clustering). ss t 23

24 Adaptive face routing How to guess the upper bound L? Start from a small value say st ; if we fail to find a path, then we double L and re-run adaptive face routing. By the time we succeed, L is at most twice the shortest path length k. The number of phases is O(log k). Total cost = O( Σ i (k/2 i ) 2 )=O(k 2 ). asymptotically optimal. s t 24

25 A simple worst-case optimal routing alg It s easy to get a worst-case O(k 2 ) bound. Do adaptive restricted flooding. Start with a small threshold t. Flood all the nodes within distance t from the source. If the destination is not reached, double the radius and retry. On a network with bounded density, the total cost is O(k 2 ) if the shortest path has length k. Not quite efficient for most good cases. 25

26 Fall back to greedy When a node visits a node closer to the destination than that at which it enters the face routing mode, it returns to greedy mode. Other fall-back schemes are proposed. E.g., GOAFR+ considers falling back to greedy mode when considering a face change and when there are sufficient nodes closer to the destination than the local minimum. 26

27 Beyond point-to-point routing Multicast to a geographical region. Use geographical forwarding to reach the destination region. Restricted flooding inside the region. Routing on a curve. Follow a parametric curve <x(t), y(t)>. Greedily select the nodes near the curve. 27

Simulations of the quadrilateral-based localization

Simulations of the quadrilateral-based localization Simulations of the quadrilateral-based localization Cluster success rate v.s. node degree. Each plot represents a simulation run. 9/15/05 Jie Gao CSE590-fall05 1 Random deployment Poisson distribution

More information

Geo-Routing. Chapter 2. Ad Hoc and Sensor Networks Roger Wattenhofer

Geo-Routing. Chapter 2. Ad Hoc and Sensor Networks Roger Wattenhofer Geo-Routing Chapter 2 Ad Hoc and Sensor Networks Roger Wattenhofer 2/1 Application of the Week: Mesh Networking (Roofnet) Sharing Internet access Cheaper for everybody Several gateways fault-tolerance

More information

Geometric Routing: Of Theory and Practice

Geometric Routing: Of Theory and Practice Geometric Routing: Of Theory and Practice PODC 03 F. Kuhn, R. Wattenhofer, Y. Zhang, A. Zollinger [KWZ 02] [KWZ 03] [KK 00] Asymptotically Optimal Geometric Mobile Ad-Hoc Routing Worst-Case Optimal and

More information

Data Communication. Guaranteed Delivery Based on Memorization

Data Communication. Guaranteed Delivery Based on Memorization Data Communication Guaranteed Delivery Based on Memorization Motivation Many greedy routing schemes perform well in dense networks Greedy routing has a small communication overhead Desirable to run Greedy

More information

Routing. Geo-Routing. Thanks to Stefan Schmid for slides

Routing. Geo-Routing. Thanks to Stefan Schmid for slides Routing Geo-Routing Thanks to Stefan Schmid for slides 1 Overview Classic routing overview Geo-routing Greedy geo-routing Euclidean and Planar graphs Face Routing Greedy and Face Routing 2 Shortest path

More information

Networking Sensors, I

Networking Sensors, I Networking Sensors, I Sensing Networking Leonidas Guibas Stanford University Computation CS428 Networking Sensors Networking is a crucial capability for sensor networks -- networking allows: Placement

More information

Challenges in Geographic Routing: Sparse Networks, Obstacles, and Traffic Provisioning

Challenges in Geographic Routing: Sparse Networks, Obstacles, and Traffic Provisioning Challenges in Geographic Routing: Sparse Networks, Obstacles, and Traffic Provisioning Brad Karp Berkeley, CA bkarp@icsi.berkeley.edu DIMACS Pervasive Networking Workshop 2 May, 2 Motivating Examples Vast

More information

Mobile Advanced Networks. Position-based routing geometric, geographic, location-based. Navid Nikaein Mobile Communication Department

Mobile Advanced Networks. Position-based routing geometric, geographic, location-based. Navid Nikaein Mobile Communication Department Mobile Advanced Networks Position-based routing geometric, geographic, location-based Navid Nikaein Mobile Communication Department Navid Nikaein 2010 1 Reminder In topology-based routing, each node has

More information

Theory and Practice of Geographic Routing

Theory and Practice of Geographic Routing Theory and Practice of Geographic Routing Stefan Rührup Department of Computer Science University of Freiburg, Germany February 2009 Abstract Geographic routing algorithms use position information for

More information

Geographic Routing in Simulation: GPSR

Geographic Routing in Simulation: GPSR Geographic Routing in Simulation: GPSR Brad Karp UCL Computer Science CS M038/GZ06 23 rd January 2013 Context: Ad hoc Routing Early 90s: availability of off-the-shelf wireless network cards and laptops

More information

A Survey on Geographic Routing Protocols for Mobile Ad hoc Networks

A Survey on Geographic Routing Protocols for Mobile Ad hoc Networks A Survey on Geographic Routing Protocols for Mobile Ad hoc Networks Atekeh Maghsoudlou, Marc St-Hilaire, and Thomas Kunz Department of Systems and Computer Engineering Carleton University, Ottawa, ON,

More information

Routing in Sensor Networks

Routing in Sensor Networks Routing in Sensor Networks Routing in Sensor Networks Large scale sensor networks will be deployed, and require richer inter-node communication In-network storage (DCS, GHT, DIM, DIFS) In-network processing

More information

Chapter 7 TOPOLOGY CONTROL

Chapter 7 TOPOLOGY CONTROL Chapter 7 TOPOLOGY CONTROL Distributed Computing Group Mobile Computing Winter 2005 / 2006 Overview Topology Control Gabriel Graph et al. XTC Interference SINR & Scheduling Complexity Distributed Computing

More information

Geometric Ad-Hoc Routing: Of Theory and Practice. Fabian Kuhn Roger Wattenhofer Yan Zhang Aaron Zollinger

Geometric Ad-Hoc Routing: Of Theory and Practice. Fabian Kuhn Roger Wattenhofer Yan Zhang Aaron Zollinger Geometric Ad-Hoc Routing: Of Theory and Practice Fabian Kuhn Roger Wattenhofer Yan Zhang Aaron Zollinger Geometric Routing s??? t s PODC 2003 2 Greedy Routing Each node forwards message to best neighbor

More information

Geometric Spanners for Routing in Mobile Networks

Geometric Spanners for Routing in Mobile Networks 1 Geometric Spanners for Routing in Mobile Networks Jie Gao, Leonidas J Guibas, John Hershberger, Li Zhang, An Zhu Abstract We propose a new routing graph, the Restricted Delaunay Graph (RDG), for mobile

More information

AN AD HOC network consists of a collection of mobile

AN AD HOC network consists of a collection of mobile 174 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 23, NO. 1, JANUARY 2005 Geometric Spanners for Routing in Mobile Networks Jie Gao, Member, IEEE, Leonidas J. Guibas, John Hershberger, Li Zhang,

More information

On Delivery Guarantees of Face and Combined Greedy-Face Routing in Ad Hoc and Sensor Networks

On Delivery Guarantees of Face and Combined Greedy-Face Routing in Ad Hoc and Sensor Networks On Delivery Guarantees of Face and Combined Greedy-Face Routing in Ad Hoc and Sensor Networks ABSTRACT Hannes Frey IMADA, University of Southern Denmark DK-5230 Odense M, Denmark frey@imada.sdu.dk It was

More information

Chapter 6 DOMINATING SETS

Chapter 6 DOMINATING SETS Chapter 6 DOMINATING SETS Distributed Computing Group Mobile Computing Summer 2003 Overview Motivation Dominating Set Connected Dominating Set The Greedy Algorithm The Tree Growing Algorithm The Marking

More information

Chapter 8 DOMINATING SETS

Chapter 8 DOMINATING SETS Chapter 8 DOMINATING SETS Distributed Computing Group Mobile Computing Summer 2004 Overview Motivation Dominating Set Connected Dominating Set The Greedy Algorithm The Tree Growing Algorithm The Marking

More information

Chapter 8 DOMINATING SETS

Chapter 8 DOMINATING SETS Distributed Computing Group Chapter 8 DOMINATING SETS Mobile Computing Summer 2004 Overview Motivation Dominating Set Connected Dominating Set The Greedy Algorithm The Tree Growing Algorithm The Marking

More information

BGR: Blind Geographic Routing for Sensor Networks

BGR: Blind Geographic Routing for Sensor Networks BGR: Blind Geographic Routing for Sensor Networks Matthias Witt 1 and Volker Turau 1 1 Department of Telematics, Hamburg University of Technology, Hamburg, Germany {matthias.witt,turau}@tuhh.de Abstract

More information

Lecture 6: Vehicular Computing and Networking. Cristian Borcea Department of Computer Science NJIT

Lecture 6: Vehicular Computing and Networking. Cristian Borcea Department of Computer Science NJIT Lecture 6: Vehicular Computing and Networking Cristian Borcea Department of Computer Science NJIT GPS & navigation system On-Board Diagnostic (OBD) systems DVD player Satellite communication 2 Internet

More information

Ad hoc and Sensor Networks Topology control

Ad hoc and Sensor Networks Topology control Ad hoc and Sensor Networks Topology control Goals of this chapter Networks can be too dense too many nodes in close (radio) vicinity This chapter looks at methods to deal with such networks by Reducing/controlling

More information

Beaconless Position Based Routing with Guaranteed Delivery for Wireless Ad-Hoc and Sensor Networks

Beaconless Position Based Routing with Guaranteed Delivery for Wireless Ad-Hoc and Sensor Networks Beaconless Position Based Routing with Guaranteed Delivery for Wireless Ad-Hoc and Sensor Networks Mohit Chawla 1, Nishith Goel 2, Kalai Kalaichelvan 3, Amiya Nayak 4, and Ivan Stojmenovic 4 1 IIT Guwahati,

More information

Asymptotically Optimal Geometric Mobile Ad-Hoc Routing

Asymptotically Optimal Geometric Mobile Ad-Hoc Routing Asymptotically Optimal Geometric Mobile Ad-Hoc Routing Fabian Kuhn Department of Computer Science ETH Zurich 8092 Zurich, Switzerland kuhn@inf.ethz.ch Roger Wattenhofer Department of Computer Science ETH

More information

Compasses, Faces, and Butterflies: Route Discovery in Ad-Hoc Networks

Compasses, Faces, and Butterflies: Route Discovery in Ad-Hoc Networks Evangelos Kranakis, School of Computer Science, Carleton University, Ottawa 1 Compasses, Faces, and Butterflies: Route Discovery in Ad-Hoc Networks By Evangelos Kranakis School of Computer Science Carleton

More information

Face Routing with Guaranteed Message Delivery in Wireless Ad-hoc Networks. Xiaoyang Guan

Face Routing with Guaranteed Message Delivery in Wireless Ad-hoc Networks. Xiaoyang Guan Face Routing with Guaranteed Message Delivery in Wireless Ad-hoc Networks by Xiaoyang Guan A thesis submitted in conformity with the requirements for the degree of Doctor of Philosophy Graduate Department

More information

Lifetime Comparison on Location Base Routing in Wireless Sensor Networks

Lifetime Comparison on Location Base Routing in Wireless Sensor Networks Lifetime Comparison on Location Base Routing in Wireless Sensor Networks Hadi Asharioun, Hassan Asadollahi, Abdul Samad Ismail, and Sureswaran Ramadass Abstract Lifetime of a sensor network is defined

More information

Void Traversal for Guaranteed Delivery in Geometric Routing

Void Traversal for Guaranteed Delivery in Geometric Routing Void Traversal for Guaranteed Delivery in Geometric Routing Mikhail Nesterenko and Adnan Vora Computer Science Department Kent State University Kent, OH, 44242 mikhail@cs.kent.edu, avora@cs.kent.edu arxiv:0803.3632v

More information

Geographic Routing without Planarization

Geographic Routing without Planarization Geographic Routing without Planarization Ben Leong, Barbara Liskov, and Robert Morris MIT Computer Science and Artificial Intelligence Laboratory {benleong, liskov, rtm}@csail.mit.edu Abstract We present

More information

Content. 1. Introduction. 2. The Ad-hoc On-Demand Distance Vector Algorithm. 3. Simulation and Results. 4. Future Work. 5.

Content. 1. Introduction. 2. The Ad-hoc On-Demand Distance Vector Algorithm. 3. Simulation and Results. 4. Future Work. 5. Rahem Abri Content 1. Introduction 2. The Ad-hoc On-Demand Distance Vector Algorithm Path Discovery Reverse Path Setup Forward Path Setup Route Table Management Path Management Local Connectivity Management

More information

Survey on Position-Based Routing 1

Survey on Position-Based Routing 1 Survey on Position-Based Routing 1 Filipe Araújo and Luís Rodrigues Universidade de Lisboa {filipius,ler}@di.fc.ul.pt Abstract In this paper we review position-based routing for wireless ad hoc and for

More information

Ad hoc and Sensor Networks Chapter 10: Topology control

Ad hoc and Sensor Networks Chapter 10: Topology control Ad hoc and Sensor Networks Chapter 10: Topology control Holger Karl Computer Networks Group Universität Paderborn Goals of this chapter Networks can be too dense too many nodes in close (radio) vicinity

More information

Unicast Routing in Mobile Ad Hoc Networks. Dr. Ashikur Rahman CSE 6811: Wireless Ad hoc Networks

Unicast Routing in Mobile Ad Hoc Networks. Dr. Ashikur Rahman CSE 6811: Wireless Ad hoc Networks Unicast Routing in Mobile Ad Hoc Networks 1 Routing problem 2 Responsibility of a routing protocol Determining an optimal way to find optimal routes Determining a feasible path to a destination based on

More information

Networking Sensors, II

Networking Sensors, II Networking Sensors, II Sensing Networking Leonidas Guibas Stanford University Computation CS321 ZG Book, Ch. 3 1 Class Administration Paper presentation preferences due today, by class time Project info

More information

arxiv: v2 [cs.dc] 28 Feb 2018

arxiv: v2 [cs.dc] 28 Feb 2018 Competitive Routing in Hybrid Communication Networks Daniel Jung 1, Christina Kolb 2, Christian Scheideler 3, and Jannik Sundermeier 4 arxiv:1710.09280v2 [cs.dc] 28 Feb 2018 1 Heinz Nixdorf Institute &

More information

Table of Contents. 1. Introduction. 2. Geographic Routing. 2.1 Routing Mechanisms. 2.2 Destination Location. 2.3 Location Inaccuracy. 3.

Table of Contents. 1. Introduction. 2. Geographic Routing. 2.1 Routing Mechanisms. 2.2 Destination Location. 2.3 Location Inaccuracy. 3. Geographic Protocols in Sensor Networks Karim Seada, Ahmed Helmy Electrical Engineering Department, University of Southern California {seada, helmy}@usc.edu Table of Contents 1. Introduction 2. Geographic

More information

Routing. Chapter 11. Ad Hoc and Sensor Networks Roger Wattenhofer 11/1

Routing. Chapter 11. Ad Hoc and Sensor Networks Roger Wattenhofer 11/1 Routing Chapter 11 Ad Hoc and Sensor Networks Roger Wattenhofer 11/1 Application of the Week: Games / Art Uncountable possibilities, below, e.g., a beer coaster that can interact with other coasters [sentilla]

More information

We noticed that the trouble is due to face routing. Can we ignore the real coordinates and use virtual coordinates for routing?

We noticed that the trouble is due to face routing. Can we ignore the real coordinates and use virtual coordinates for routing? Geographical routing in practice We noticed that the trouble is due to face routing. Is greedy routing robust to localization noise? Can we ignore the real coordinates and use virtual coordinates for routing?

More information

On Greedy Geographic Routing Algorithms in Sensing-Covered Networks

On Greedy Geographic Routing Algorithms in Sensing-Covered Networks On Greedy Geographic Routing Algorithms in Sensing-Covered Networks Guoliang Xing; Chenyang Lu; Robert Pless Department of Computer Science and Engineering Washington University in St. Louis St. Louis,

More information

Fractional Cascading in Wireless. Jie Gao Computer Science Department Stony Brook University

Fractional Cascading in Wireless. Jie Gao Computer Science Department Stony Brook University Fractional Cascading in Wireless Sensor Networks Jie Gao Computer Science Department Stony Brook University 1 Sensor Networks Large number of small devices for environment monitoring 2 My recent work Lightweight,

More information

CHAPTER 5 MULTICAST GEOGRAPHY BASED ROUTING IN AD HOC NETWORKS

CHAPTER 5 MULTICAST GEOGRAPHY BASED ROUTING IN AD HOC NETWORKS 89 CHAPTER 5 MULTICAST GEOGRAPHY BASED ROUTING IN AD HOC NETWORKS 5.1 INTRODUCTION Efficient routing in MANET is a tough task due to their highly dynamic network topology, bandwidth controlled links and

More information

Geographic and Diversity Routing in Mesh Networks

Geographic and Diversity Routing in Mesh Networks Geographic and Diversity Routing in Mesh Networks COS 463: Wireless Networks Lecture 7 Kyle Jamieson [Parts adapted from B. Karp, S. Biswas, S. Katti] Course Contents 1. Wireless From the Transport Layer

More information

Location Awareness in Ad Hoc Wireless Mobile Neworks

Location Awareness in Ad Hoc Wireless Mobile Neworks Location Awareness in Ad Hoc Wireless Mobile Neworks Lijuan Ai Wenyu Wang Yi Zhou 11/14/2001 Mobile Computing, Fall 2001 1 PART I INTRODUCTION TO MANET & LOCATION-AWARE COMPONENTS 11/14/2001 Mobile Computing,

More information

Mobile Ad-hoc and Sensor Networks Lesson 04 Mobile Ad-hoc Network (MANET) Routing Algorithms Part 1

Mobile Ad-hoc and Sensor Networks Lesson 04 Mobile Ad-hoc Network (MANET) Routing Algorithms Part 1 Mobile Ad-hoc and Sensor Networks Lesson 04 Mobile Ad-hoc Network (MANET) Routing Algorithms Part 1 Oxford University Press 2007. All rights reserved. 1 Ad-hoc networks deployment For routing, target detection,

More information

Draft Notes 1 : Scaling in Ad hoc Routing Protocols

Draft Notes 1 : Scaling in Ad hoc Routing Protocols Draft Notes 1 : Scaling in Ad hoc Routing Protocols Timothy X Brown University of Colorado April 2, 2008 2 Introduction What is the best network wireless network routing protocol? This question is a function

More information

Worst-Case Optimal and Average-Case Efficient Geometric Ad-Hoc Routing

Worst-Case Optimal and Average-Case Efficient Geometric Ad-Hoc Routing Worst-Case Optimal and Average-Case Efficient Geometric Ad-Hoc Routing Fabian Kuhn, Roger Wattenhofer, Aaron Zollinger Department of Computer Science ETH Zurich 892 Zurich, Switzerland {kuhn, wattenhofer,

More information

Performance Comparison of Scalable Location Services for Geographic Ad Hoc Routing

Performance Comparison of Scalable Location Services for Geographic Ad Hoc Routing Performance Comparison of Scalable Location Services for Geographic Ad Hoc Routing Saumitra M. Das, Himabindu Pucha and Y. Charlie Hu School of Electrical and Computer Engineering Purdue University West

More information

Analysis of GPS and Zone Based Vehicular Routing on Urban City Roads

Analysis of GPS and Zone Based Vehicular Routing on Urban City Roads Analysis of GPS and Zone Based Vehicular Routing on Urban City Roads Aye Zarchi Minn 1, May Zin Oo 2, Mazliza Othman 3 1,2 Department of Information Technology, Mandalay Technological University, Myanmar

More information

An Enhanced Algorithm to Find Dominating Set Nodes in Ad Hoc Wireless Networks

An Enhanced Algorithm to Find Dominating Set Nodes in Ad Hoc Wireless Networks Georgia State University ScholarWorks @ Georgia State University Computer Science Theses Department of Computer Science 12-4-2006 An Enhanced Algorithm to Find Dominating Set Nodes in Ad Hoc Wireless Networks

More information

Midpoint Routing algorithms for Delaunay Triangulations

Midpoint Routing algorithms for Delaunay Triangulations Midpoint Routing algorithms for Delaunay Triangulations Weisheng Si and Albert Y. Zomaya Centre for Distributed and High Performance Computing School of Information Technologies Prologue The practical

More information

Data-Centric Query in Sensor Networks

Data-Centric Query in Sensor Networks Data-Centric Query in Sensor Networks Jie Gao Computer Science Department Stony Brook University 10/27/05 Jie Gao, CSE590-fall05 1 Papers Chalermek Intanagonwiwat, Ramesh Govindan and Deborah Estrin, Directed

More information

Routing on Overlay Graphs in Mobile Ad Hoc Networks

Routing on Overlay Graphs in Mobile Ad Hoc Networks Routing on Overlay Graphs in Mobile Ad Hoc Networks Sumesh J. Philip Department of Computer Science Western Illinois University Macomb IL 61455 Email: sj-philip@wiu.edu Joy Ghosh, Hung Q. Ngo, Chunming

More information

Stateless Multicasting in Mobile Ad Hoc Networks

Stateless Multicasting in Mobile Ad Hoc Networks Stateless Multicasting in Mobile Ad Hoc Networks Xiaojing Xiang, Member, IEEE, Xin Wang, Member, IEEE, and Yuanyuan Yang, Fellow, IEEE Abstract There are increasing interest and big challenge in designing

More information

Quiz 5 Answers. CS 441 Spring 2017

Quiz 5 Answers. CS 441 Spring 2017 Quiz 5 Answers CS 441 Spring 2017 1. How does Flooding differ from the route discovery phase used in other reactive routing protocols such as DSR and AODV? [2] Flooding involves broadcasting of data packet

More information

An efficient implementation of the greedy forwarding strategy

An efficient implementation of the greedy forwarding strategy An efficient implementation of the greedy forwarding strategy Hannes Stratil Embedded Computing Systems Group E182/2 Technische Universität Wien Treitlstraße 3 A-1040 Vienna Email: hannes@ecs.tuwien.ac.at

More information

References. Forwarding. Introduction...

References. Forwarding. Introduction... References Routing Protocols H. Karl and A. Willing. Protocols and Architectures for Wireless Sensor Networks. John Wiley & Sons, 005. (Chapter 11) K. Sohraby, D. Minoli, and T. Znati. Wireless Sensor

More information

Chapter 11 Chapter 6

Chapter 11 Chapter 6 Routing Protocols References H. Karl and A. Willing. Protocols and Architectures for Wireless Sensor Networks. John Wiley & Sons, 2005. (Chapter 11) K. Sohraby, D. Minoli, and T. Znati. Wireless Sensor

More information

Geographic Routing Without Location Information. AP, Sylvia, Ion, Scott and Christos

Geographic Routing Without Location Information. AP, Sylvia, Ion, Scott and Christos Geographic Routing Without Location Information AP, Sylvia, Ion, Scott and Christos Routing in Wireless Networks Distance vector DSDV On-demand DSR, TORA, AODV Discovers and caches routes on demand Geographic

More information

Routing. Chapter 12. Ad Hoc and Sensor Networks Roger Wattenhofer

Routing. Chapter 12. Ad Hoc and Sensor Networks Roger Wattenhofer Routing Chapter 12 12/1 Application of the Week: Games / Art Uncountable possibilities, below, e.g., a beer coaster that can interact with other coasters [sentilla] 12/2 Rating Area maturity First steps

More information

Networks: A Deterministic Approach with Constant Overhead

Networks: A Deterministic Approach with Constant Overhead Trace-Routing in 3D Wireless Sensor Networks: A Deterministic Approach with Constant Overhead Su Xia, Hongyi Wu, and Miao Jin! School of Computing and Informatics! University of Louisiana at Lafayette

More information

LECTURE 9. Ad hoc Networks and Routing

LECTURE 9. Ad hoc Networks and Routing 1 LECTURE 9 Ad hoc Networks and Routing Ad hoc Networks 2 Ad Hoc Networks consist of peer to peer communicating nodes (possibly mobile) no infrastructure. Topology of the network changes dynamically links

More information

Routing protocols in WSN

Routing protocols in WSN Routing protocols in WSN 1.1 WSN Routing Scheme Data collected by sensor nodes in a WSN is typically propagated toward a base station (gateway) that links the WSN with other networks where the data can

More information

15-441: Computer Networking. Lecture 24: Ad-Hoc Wireless Networks

15-441: Computer Networking. Lecture 24: Ad-Hoc Wireless Networks 15-441: Computer Networking Lecture 24: Ad-Hoc Wireless Networks Scenarios and Roadmap Point to point wireless networks (last lecture) Example: your laptop to CMU wireless Challenges: Poor and variable

More information

Survey on Location Based Routing Protocols in MANET

Survey on Location Based Routing Protocols in MANET Survey on Location Based Routing Protocols in MANET Vivek Nikam, Prof. G.T. Chavan Sinhgad College of engineering, University of Pune Abstract- Due to the infrastructure less and dynamic nature of mobile

More information

Locating and Bypassing Holes in Sensor Networks

Locating and Bypassing Holes in Sensor Networks Locating and Bypassing Holes in Sensor Networks Qing Fang Jie Gao Leonidas J. Guibas April 8, 2005 Abstract In real sensor network deployments, spatial distributions of sensors are usually far from being

More information

Ad hoc and Sensor Networks Chapter 11: Routing Protocols. Holger Karl

Ad hoc and Sensor Networks Chapter 11: Routing Protocols. Holger Karl Ad hoc and Sensor Networks Chapter 11: Routing Protocols Holger Karl Goals of this Chapter In any network of diameter > 1, the routing & forwarding problem appears We will discuss mechanisms for constructing

More information

Given a graph, find an embedding s.t. greedy routing works

Given a graph, find an embedding s.t. greedy routing works Given a graph, find an embedding s.t. greedy routing works Greedy embedding of a graph 99 Greedy embedding Given a graph G, find an embedding of the vertices in R d, s.t. for each pair of nodes s, t, there

More information

Delay Tolerant Networks

Delay Tolerant Networks Delay Tolerant Networks DEPARTMENT OF INFORMATICS & TELECOMMUNICATIONS NATIONAL AND KAPODISTRIAN UNIVERSITY OF ATHENS What is different? S A wireless network that is very sparse and partitioned disconnected

More information

Motivation and Basics Flat networks Hierarchy by dominating sets Hierarchy by clustering Adaptive node activity. Topology Control

Motivation and Basics Flat networks Hierarchy by dominating sets Hierarchy by clustering Adaptive node activity. Topology Control Topology Control Andreas Wolf (0325330) 17.01.2007 1 Motivation and Basics 2 Flat networks 3 Hierarchy by dominating sets 4 Hierarchy by clustering 5 Adaptive node activity Options for topology control

More information

On the Scalability of Hierarchical Ad Hoc Wireless Networks

On the Scalability of Hierarchical Ad Hoc Wireless Networks On the Scalability of Hierarchical Ad Hoc Wireless Networks Suli Zhao and Dipankar Raychaudhuri Fall 2006 IAB 11/15/2006 Outline Motivation Ad hoc wireless network architecture Three-tier hierarchical

More information

Energy-Efficient Forwarding Strategies for Geographic Routing in Lossy Wireless Sensor Networks

Energy-Efficient Forwarding Strategies for Geographic Routing in Lossy Wireless Sensor Networks Energy-Efficient Forwarding Strategies for Geographic Routing in Lossy Wireless Sensor Networks K. Seada, M.Zuniga, A. Helmy and B. Krishnamachari Department of Electrical Engineering University of Southern

More information

Wireless Internet Routing. Learning from Deployments Link Metrics

Wireless Internet Routing. Learning from Deployments Link Metrics Wireless Internet Routing Learning from Deployments Link Metrics 1 Learning From Deployments Early worked focused traditional routing issues o Control plane: topology management, neighbor discovery o Data

More information

Topology Control in Wireless Networks 4/24/06

Topology Control in Wireless Networks 4/24/06 Topology Control in Wireless Networks 4/4/06 1 Topology control Choose the transmission power of the nodes so as to satisfy some properties Connectivity Minimize power consumption, etc. Last class Percolation:

More information

GEOGRAPHIC routing (also known as location-based or

GEOGRAPHIC routing (also known as location-based or IEEE/ACM TRANSACTIONS ON NETWORKING, VOL., NO., Geographic Routing in d-dimensional Spaces with Guaranteed Delivery and Low Stretch Simon S. Lam, Fellow, IEEE, and Chen Qian, Student Member, IEEE Abstract

More information

Efficient and Robust Geocasting Protocols for Sensor Networks

Efficient and Robust Geocasting Protocols for Sensor Networks Efficient and Robust Geocasting Protocols for Sensor Networks Karim Seada, Ahmed Helmy Electrical Engineering Department, University of Southern California {seada, helmy}@usc.edu Abstract- Geocasting is

More information

Routing and Security in Mobile Ad Hoc Networks

Routing and Security in Mobile Ad Hoc Networks University of Kentucky UKnowledge Theses and Dissertations--Computer Science Computer Science 2016 Routing and Security in Mobile Ad Hoc Networks Baban A. Mahmood University of Kentucky, baban@netlab.uky.edu

More information

Locating and Bypassing Holes in Sensor Networks

Locating and Bypassing Holes in Sensor Networks Mobile Networks and Applications 11, 187 200, 2006 C 2006 Springer Science + Business Media, LLC. Manufactured in The Netherlands. DOI: 10.1007/s11036-006-4471-y Locating and Bypassing Holes in Sensor

More information

Does Topology Control Reduce Interference? Martin Burkhart Pascal von Rickenbach Roger Wattenhofer Aaron Zollinger

Does Topology Control Reduce Interference? Martin Burkhart Pascal von Rickenbach Roger Wattenhofer Aaron Zollinger Does Topology Control Reduce Interference? Martin Burkhart Pascal von Rickenbach Roger Wattenhofer Aaron Zollinger Overview What is Topology Control? Context related work Explicit interference model Interference

More information

Algorithms for A Connected Dominating Set in Wireless Networks

Algorithms for A Connected Dominating Set in Wireless Networks Algorithms for A Connected Dominating Set in Wireless Networks Thesis submitted in Partial Fulfillment of the Requirements for the Award of the Degree of Master of Technology In Computer Science and Engineering

More information

GPSR: Greedy Perimeter Stateless Routing for Wireless Networks

GPSR: Greedy Perimeter Stateless Routing for Wireless Networks GPSR: Greedy Perimeter Stateless Routing for Wireless Networks Brad Karp Harvard University / ACIRI karp@eecs.harvard.edu H. T. Kung Harvard University htk@eecs.harvard.edu ABSTRACT We present Greedy Perimeter

More information

Investigation on OLSR Routing Protocol Efficiency

Investigation on OLSR Routing Protocol Efficiency Investigation on OLSR Routing Protocol Efficiency JIRI HOSEK 1, KAROL MOLNAR 2 Department of Telecommunications Faculty of Electrical Engineering and Communication, Brno University of Technology Purkynova

More information

Aanchal Walia #1, Pushparaj Pal *2

Aanchal Walia #1, Pushparaj Pal *2 An Implemented approach of VANET using Location Information based Technique for safe city and vehicle Aanchal Walia #1, Pushparaj Pal *2 #1. M.Tech Scholor,ECE,Krukshetra University, *2. A.P.ECE Department,

More information

Geographic Routing in d-dimensional Spaces with Guaranteed Delivery and Low Stretch

Geographic Routing in d-dimensional Spaces with Guaranteed Delivery and Low Stretch Geographic Routing in d-dimensional Spaces with Guaranteed Delivery and Low Stretch Simon S. Lam and Chen Qian Department of Computer Science The University of Texas at Austin {lam, cqian}@cs.utexas.edu

More information

Modeling and analyzing the correctness of geographic face routing under realistic conditions

Modeling and analyzing the correctness of geographic face routing under realistic conditions Ad Hoc Networks 5 (2007) 855 87 www.elsevier.com/locate/adhoc Modeling and analyzing the correctness of geographic face routing under realistic conditions Karim eada a, *, Ahmed Helmy b, Ramesh Govindan

More information

CMSC 425: Lecture 9 Geometric Data Structures for Games: Geometric Graphs Thursday, Feb 21, 2013

CMSC 425: Lecture 9 Geometric Data Structures for Games: Geometric Graphs Thursday, Feb 21, 2013 CMSC 425: Lecture 9 Geometric Data Structures for Games: Geometric Graphs Thursday, Feb 21, 2013 Reading: Today s materials is presented in part in Computational Geometry: Algorithms and Applications (3rd

More information

Reliable Mobicast via Face-Aware Routing

Reliable Mobicast via Face-Aware Routing Washington University in St. Louis Washington University Open Scholarship All Computer Science and Engineering Research Computer Science and Engineering Report Number: WUCSE-2003-49 2003-07-02 Reliable

More information

R2D2: Rendezvous Regions for Data Discovery Karim Seada 1, Ahmed Helmy 2

R2D2: Rendezvous Regions for Data Discovery Karim Seada 1, Ahmed Helmy 2 R2D2: Rendezvous Regions for Data Discovery Karim Seada 1, Ahmed Helmy 2 1 Nokia Research Center, Palo Alto 2 Computer and Information Science and Engineering Department, University of Florida, Gainesville

More information

Outline. Wireless Ad Hoc & Sensor Networks (Wireless Sensor Networks III) Localisation and Positioning. Localisation and Positioning properties

Outline. Wireless Ad Hoc & Sensor Networks (Wireless Sensor Networks III) Localisation and Positioning. Localisation and Positioning properties Wireless Ad Hoc & Sensor Networks (Wireless Sensor Networks III) Outline Localisation and Positioning Topology Control Routing Summary WS 2009/2010 Prof. Dr. Dieter Hogrefe/Prof. Dr. Xiaoming Fu Dr. Omar

More information

Secure routing in ad hoc and sensor networks

Secure routing in ad hoc and sensor networks Security and Cooperation in Wireless Networks Secure routing in ad hoc and sensor networks routing in ad hoc networks; attacks on routing; countermeasures and secured routing protocols; routing security

More information

Connectivity Service for Mobile Ad-Hoc Networks

Connectivity Service for Mobile Ad-Hoc Networks Connectivity Service for Mobile Ad-Hoc Networks Alejandro Cornejo and Nancy Lynch MIT Computer Science and Artificial Intelligence Laboratory {acornejo,lynch}@csail.mit.edu Abstract We present a distributed

More information

A Survey of Vehicular Ad hoc Networks Routing Protocols

A Survey of Vehicular Ad hoc Networks Routing Protocols International Journal of Innovation and Applied Studies ISSN 2028-9324 Vol. 3 No. 3 July 2013, pp. 829-846 2013 Innovative Space of Scientific Research Journals http://www.issr-journals.org/ijias/ A Survey

More information

Chapter 4 Routing in Wireless Sensor Networks

Chapter 4 Routing in Wireless Sensor Networks Chapter 4 Routing in Wireless Sensor Networks Hannes Frey, Stefan Rührup, and Ivan Stojmenović Abstract Wireless sensor networks are formed by small sensor nodes communicating over wireless links without

More information

GLIDER: Gradient Landmark-Based Distributed Routing for Sensor Networks

GLIDER: Gradient Landmark-Based Distributed Routing for Sensor Networks GLIDER: Gradient Landmark-Based Distributed Routing for Sensor Networks Qing Fang Jie Gao Leonidas J. Guibas Vin de Silva Li Zhang Department of Electrical Engineering, Stanford University. jqfang@stanford.edu

More information

Kapitel 5: Mobile Ad Hoc Networks. Characteristics. Applications of Ad Hoc Networks. Wireless Communication. Wireless communication networks types

Kapitel 5: Mobile Ad Hoc Networks. Characteristics. Applications of Ad Hoc Networks. Wireless Communication. Wireless communication networks types Kapitel 5: Mobile Ad Hoc Networks Mobilkommunikation 2 WS 08/09 Wireless Communication Wireless communication networks types Infrastructure-based networks Infrastructureless networks Ad hoc networks Prof.

More information

GIAN Course on Distributed Network Algorithms. Spanning Tree Constructions

GIAN Course on Distributed Network Algorithms. Spanning Tree Constructions GIAN Course on Distributed Network Algorithms Spanning Tree Constructions Stefan Schmid @ T-Labs, 2011 Spanning Trees Attactive infrastructure : sparse subgraph ( loop-free backbone ) connecting all nodes.

More information

Sorting Based Data Centric Storage

Sorting Based Data Centric Storage Sorting Based Data Centric Storage Fenghui Zhang, Anxiao(Andrew) Jiang, and Jianer Chen Dept. of Computer Science, Texas A&M Univ. College Station, TX 77843. {fhzhang, ajiang, chen}@cs.tamu.edu. Abstract

More information

Clustering Color/Intensity. Group together pixels of similar color/intensity.

Clustering Color/Intensity. Group together pixels of similar color/intensity. Clustering Color/Intensity Group together pixels of similar color/intensity. Agglomerative Clustering Cluster = connected pixels with similar color. Optimal decomposition may be hard. For example, find

More information

Exploration of Path Space using Sensor Network Geometry

Exploration of Path Space using Sensor Network Geometry Exploration of Path Space using Sensor Network Geometry Ruirui Jiang, Xiaomeng Ban Computer Science Stony Brook University {jiang,xban}@cs.sunysb.edu Mayank Goswami Applied Math & Statistics Stony Brook

More information

Distributed Systems. Ad hoc and sensor networks. Rik Sarkar. University of Edinburgh Fall 2018

Distributed Systems. Ad hoc and sensor networks. Rik Sarkar. University of Edinburgh Fall 2018 Distributed Systems Ad hoc and sensor networks Rik Sarkar University of Edinburgh Fall 2018 Mobile and Ubiquitous compueng Devices (computers) are carried by people (mobile) Laptops, phones, watches They

More information