Geographical routing 1
|
|
- Archibald Flynn
- 5 years ago
- Views:
Transcription
1 Geographical routing 1
2 Routing in ad hoc networks Obtain route information between pairs of nodes wishing to communicate. Proactive protocols: maintain routing tables at each node that is updated as changes in the network topology are detected. Heavy overhead with high network dynamics (caused by link/node failures or node movement). Not practical for ad hoc networks. 2
3 Routing in ad hoc networks Reactive protocols: routes are constructed on demand. No global routing table is maintained. Due to the high rate of topology changes, reactive protocols are more appropriate for ad hoc networks. Ad hoc on demand distance vector routing (AODV) Dynamic source routing (DSR) However, both depend on flooding for route discovery. 3
4 Geographical routing Data-centric routing: routing is frequently based on a nodes attributes and sensed data, rather than on pre- assigned network address. Geographical routing uses a node s location to discover path to that route. 4
5 Geographical routing Assumptions: Nodes know their geographical location Nodes know their 1-hop neighbors Routing destinations are specified geographically (a location, or a geographical region) Each packet can hold a small amount (O(1)) of routing information. The connectivity graph is modeled as a unit disk graph. 5
6 Geographical routing The source node knows The location of the destination node; The location of itself and its 1-hop neighbors. Geographical forwarding: send the packet to the 1-hop neighbor that makes most progress towards the destination. No flooding is involved. Many ways to measure progress. The one closestto the destination in Euclidean distance. The one with smallest angletowards the destination: compass routing. 6
7 Greedy progress 7
8 Compass routing may get in loops Compass routing may get in a loop. Send packets to the neighbor with smallest angle towards the destination 8
9 Geographical routing may get stuck Geographical routing may stuck at a node whose neighbors are all further away from the destination than itself. t t s s? Send packets to the neighbor closest to the destination 9
10 How to get around local minima? Use a planar subgraph: a straight line graph with no crossing edges. It subdivides the plane into connected regions called faces. 10
11 Face Routing Keep left hand on the wall, walk until hit the straight line connecting source to destination. Then switch to the next face. s t 11
12 Face Routing Properties All necessary information is stored in the message Source and destination positions The node when it enters face routing mode. The first edge on the current face. Completely local: Knowledge about direct neighbors positions is sufficient Faces are implicit. Only local neighbor ordering around each node is needed. Right Hand Rule 12
13 What if the destination is disconnected? Face routing will get back to where it enters the perimeter mode. Failed no way to the destination. Guaranteed delivery of a message if there is a path. 13
14 Face routing needs a planar graph. Compute a planar subgraph of the unit disk graph. Preserves connectivity. Distributed computation. 14
15 Relative Neighborhood Graph and Gabriel Graph Relative Neighborhood Graph (RNG)contains an edge uv if the lune is empty of other points. Gabriel Graph (GG)contains an edge uv if the disk with uv as diameter is empty of other points. Both can be constructed in a distributed way. 15
16 An example of UDG 200 nodes randomly deployed in a meters region. Radio range =250meters 16
17 An example of GG and RNG GG RNG 17
18 Overview of geographical routing Routing with geographical location information. Greedy forwarding. If stuck, do face routing on a planar sub-graph. 18
19 Bad news: Lower bound of localized routing Any deterministic or randomized localized routing algorithm takes a path of length Ω(k 2 ), if the optimal path has length k. The adversary decides where the chain wt is. Since we store no information on nodes, in the worst case we have to visit about Ω(k) chains and pay a cost of Ω(k 2 ). t s 19
20 Good news: greedy forwarding is optimal If greedy routing gets to the destination, then the path length is at most O(k 2 ), if the optimal path has length k. uv is at most k. On the greedy path, every other node is not visible, so they are of distance at least 1 away. By a packing lemma, there are at most O(k 2 ) nodes inside a disk of radius k. How is face routing? How is greedy + face routing? 20
21 Performance of face routing 21
22 Performance of face routing What if we choose the wrong side? 22
23 Adaptive face routing Suppose the shortest path on the planar graph is bounded by L hops. Bound the search area by an ellipsoid {x xs + xt L} never walk outside the ellipsoid. Follow one direction, if we hit the ellipsoid; turn back. If we find a better intersection p of the face with line st, change to the face containing pt. In the worst case, visit every node inside the ellipsoid: O(L 2 ) by the bounded density property (through clustering). ss t 23
24 Adaptive face routing How to guess the upper bound L? Start from a small value say st ; if we fail to find a path, then we double L and re-run adaptive face routing. By the time we succeed, L is at most twice the shortest path length k. The number of phases is O(log k). Total cost = O( Σ i (k/2 i ) 2 )=O(k 2 ). asymptotically optimal. s t 24
25 A simple worst-case optimal routing alg It s easy to get a worst-case O(k 2 ) bound. Do adaptive restricted flooding. Start with a small threshold t. Flood all the nodes within distance t from the source. If the destination is not reached, double the radius and retry. On a network with bounded density, the total cost is O(k 2 ) if the shortest path has length k. Not quite efficient for most good cases. 25
26 Fall back to greedy When a node visits a node closer to the destination than that at which it enters the face routing mode, it returns to greedy mode. Other fall-back schemes are proposed. E.g., GOAFR+ considers falling back to greedy mode when considering a face change and when there are sufficient nodes closer to the destination than the local minimum. 26
27 Beyond point-to-point routing Multicast to a geographical region. Use geographical forwarding to reach the destination region. Restricted flooding inside the region. Routing on a curve. Follow a parametric curve <x(t), y(t)>. Greedily select the nodes near the curve. 27
Simulations of the quadrilateral-based localization
Simulations of the quadrilateral-based localization Cluster success rate v.s. node degree. Each plot represents a simulation run. 9/15/05 Jie Gao CSE590-fall05 1 Random deployment Poisson distribution
More informationGeo-Routing. Chapter 2. Ad Hoc and Sensor Networks Roger Wattenhofer
Geo-Routing Chapter 2 Ad Hoc and Sensor Networks Roger Wattenhofer 2/1 Application of the Week: Mesh Networking (Roofnet) Sharing Internet access Cheaper for everybody Several gateways fault-tolerance
More informationGeometric Routing: Of Theory and Practice
Geometric Routing: Of Theory and Practice PODC 03 F. Kuhn, R. Wattenhofer, Y. Zhang, A. Zollinger [KWZ 02] [KWZ 03] [KK 00] Asymptotically Optimal Geometric Mobile Ad-Hoc Routing Worst-Case Optimal and
More informationData Communication. Guaranteed Delivery Based on Memorization
Data Communication Guaranteed Delivery Based on Memorization Motivation Many greedy routing schemes perform well in dense networks Greedy routing has a small communication overhead Desirable to run Greedy
More informationRouting. Geo-Routing. Thanks to Stefan Schmid for slides
Routing Geo-Routing Thanks to Stefan Schmid for slides 1 Overview Classic routing overview Geo-routing Greedy geo-routing Euclidean and Planar graphs Face Routing Greedy and Face Routing 2 Shortest path
More informationNetworking Sensors, I
Networking Sensors, I Sensing Networking Leonidas Guibas Stanford University Computation CS428 Networking Sensors Networking is a crucial capability for sensor networks -- networking allows: Placement
More informationChallenges in Geographic Routing: Sparse Networks, Obstacles, and Traffic Provisioning
Challenges in Geographic Routing: Sparse Networks, Obstacles, and Traffic Provisioning Brad Karp Berkeley, CA bkarp@icsi.berkeley.edu DIMACS Pervasive Networking Workshop 2 May, 2 Motivating Examples Vast
More informationMobile Advanced Networks. Position-based routing geometric, geographic, location-based. Navid Nikaein Mobile Communication Department
Mobile Advanced Networks Position-based routing geometric, geographic, location-based Navid Nikaein Mobile Communication Department Navid Nikaein 2010 1 Reminder In topology-based routing, each node has
More informationTheory and Practice of Geographic Routing
Theory and Practice of Geographic Routing Stefan Rührup Department of Computer Science University of Freiburg, Germany February 2009 Abstract Geographic routing algorithms use position information for
More informationGeographic Routing in Simulation: GPSR
Geographic Routing in Simulation: GPSR Brad Karp UCL Computer Science CS M038/GZ06 23 rd January 2013 Context: Ad hoc Routing Early 90s: availability of off-the-shelf wireless network cards and laptops
More informationA Survey on Geographic Routing Protocols for Mobile Ad hoc Networks
A Survey on Geographic Routing Protocols for Mobile Ad hoc Networks Atekeh Maghsoudlou, Marc St-Hilaire, and Thomas Kunz Department of Systems and Computer Engineering Carleton University, Ottawa, ON,
More informationRouting in Sensor Networks
Routing in Sensor Networks Routing in Sensor Networks Large scale sensor networks will be deployed, and require richer inter-node communication In-network storage (DCS, GHT, DIM, DIFS) In-network processing
More informationChapter 7 TOPOLOGY CONTROL
Chapter 7 TOPOLOGY CONTROL Distributed Computing Group Mobile Computing Winter 2005 / 2006 Overview Topology Control Gabriel Graph et al. XTC Interference SINR & Scheduling Complexity Distributed Computing
More informationGeometric Ad-Hoc Routing: Of Theory and Practice. Fabian Kuhn Roger Wattenhofer Yan Zhang Aaron Zollinger
Geometric Ad-Hoc Routing: Of Theory and Practice Fabian Kuhn Roger Wattenhofer Yan Zhang Aaron Zollinger Geometric Routing s??? t s PODC 2003 2 Greedy Routing Each node forwards message to best neighbor
More informationGeometric Spanners for Routing in Mobile Networks
1 Geometric Spanners for Routing in Mobile Networks Jie Gao, Leonidas J Guibas, John Hershberger, Li Zhang, An Zhu Abstract We propose a new routing graph, the Restricted Delaunay Graph (RDG), for mobile
More informationAN AD HOC network consists of a collection of mobile
174 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 23, NO. 1, JANUARY 2005 Geometric Spanners for Routing in Mobile Networks Jie Gao, Member, IEEE, Leonidas J. Guibas, John Hershberger, Li Zhang,
More informationOn Delivery Guarantees of Face and Combined Greedy-Face Routing in Ad Hoc and Sensor Networks
On Delivery Guarantees of Face and Combined Greedy-Face Routing in Ad Hoc and Sensor Networks ABSTRACT Hannes Frey IMADA, University of Southern Denmark DK-5230 Odense M, Denmark frey@imada.sdu.dk It was
More informationChapter 6 DOMINATING SETS
Chapter 6 DOMINATING SETS Distributed Computing Group Mobile Computing Summer 2003 Overview Motivation Dominating Set Connected Dominating Set The Greedy Algorithm The Tree Growing Algorithm The Marking
More informationChapter 8 DOMINATING SETS
Chapter 8 DOMINATING SETS Distributed Computing Group Mobile Computing Summer 2004 Overview Motivation Dominating Set Connected Dominating Set The Greedy Algorithm The Tree Growing Algorithm The Marking
More informationChapter 8 DOMINATING SETS
Distributed Computing Group Chapter 8 DOMINATING SETS Mobile Computing Summer 2004 Overview Motivation Dominating Set Connected Dominating Set The Greedy Algorithm The Tree Growing Algorithm The Marking
More informationBGR: Blind Geographic Routing for Sensor Networks
BGR: Blind Geographic Routing for Sensor Networks Matthias Witt 1 and Volker Turau 1 1 Department of Telematics, Hamburg University of Technology, Hamburg, Germany {matthias.witt,turau}@tuhh.de Abstract
More informationLecture 6: Vehicular Computing and Networking. Cristian Borcea Department of Computer Science NJIT
Lecture 6: Vehicular Computing and Networking Cristian Borcea Department of Computer Science NJIT GPS & navigation system On-Board Diagnostic (OBD) systems DVD player Satellite communication 2 Internet
More informationAd hoc and Sensor Networks Topology control
Ad hoc and Sensor Networks Topology control Goals of this chapter Networks can be too dense too many nodes in close (radio) vicinity This chapter looks at methods to deal with such networks by Reducing/controlling
More informationBeaconless Position Based Routing with Guaranteed Delivery for Wireless Ad-Hoc and Sensor Networks
Beaconless Position Based Routing with Guaranteed Delivery for Wireless Ad-Hoc and Sensor Networks Mohit Chawla 1, Nishith Goel 2, Kalai Kalaichelvan 3, Amiya Nayak 4, and Ivan Stojmenovic 4 1 IIT Guwahati,
More informationAsymptotically Optimal Geometric Mobile Ad-Hoc Routing
Asymptotically Optimal Geometric Mobile Ad-Hoc Routing Fabian Kuhn Department of Computer Science ETH Zurich 8092 Zurich, Switzerland kuhn@inf.ethz.ch Roger Wattenhofer Department of Computer Science ETH
More informationCompasses, Faces, and Butterflies: Route Discovery in Ad-Hoc Networks
Evangelos Kranakis, School of Computer Science, Carleton University, Ottawa 1 Compasses, Faces, and Butterflies: Route Discovery in Ad-Hoc Networks By Evangelos Kranakis School of Computer Science Carleton
More informationFace Routing with Guaranteed Message Delivery in Wireless Ad-hoc Networks. Xiaoyang Guan
Face Routing with Guaranteed Message Delivery in Wireless Ad-hoc Networks by Xiaoyang Guan A thesis submitted in conformity with the requirements for the degree of Doctor of Philosophy Graduate Department
More informationLifetime Comparison on Location Base Routing in Wireless Sensor Networks
Lifetime Comparison on Location Base Routing in Wireless Sensor Networks Hadi Asharioun, Hassan Asadollahi, Abdul Samad Ismail, and Sureswaran Ramadass Abstract Lifetime of a sensor network is defined
More informationVoid Traversal for Guaranteed Delivery in Geometric Routing
Void Traversal for Guaranteed Delivery in Geometric Routing Mikhail Nesterenko and Adnan Vora Computer Science Department Kent State University Kent, OH, 44242 mikhail@cs.kent.edu, avora@cs.kent.edu arxiv:0803.3632v
More informationGeographic Routing without Planarization
Geographic Routing without Planarization Ben Leong, Barbara Liskov, and Robert Morris MIT Computer Science and Artificial Intelligence Laboratory {benleong, liskov, rtm}@csail.mit.edu Abstract We present
More informationContent. 1. Introduction. 2. The Ad-hoc On-Demand Distance Vector Algorithm. 3. Simulation and Results. 4. Future Work. 5.
Rahem Abri Content 1. Introduction 2. The Ad-hoc On-Demand Distance Vector Algorithm Path Discovery Reverse Path Setup Forward Path Setup Route Table Management Path Management Local Connectivity Management
More informationSurvey on Position-Based Routing 1
Survey on Position-Based Routing 1 Filipe Araújo and Luís Rodrigues Universidade de Lisboa {filipius,ler}@di.fc.ul.pt Abstract In this paper we review position-based routing for wireless ad hoc and for
More informationAd hoc and Sensor Networks Chapter 10: Topology control
Ad hoc and Sensor Networks Chapter 10: Topology control Holger Karl Computer Networks Group Universität Paderborn Goals of this chapter Networks can be too dense too many nodes in close (radio) vicinity
More informationUnicast Routing in Mobile Ad Hoc Networks. Dr. Ashikur Rahman CSE 6811: Wireless Ad hoc Networks
Unicast Routing in Mobile Ad Hoc Networks 1 Routing problem 2 Responsibility of a routing protocol Determining an optimal way to find optimal routes Determining a feasible path to a destination based on
More informationNetworking Sensors, II
Networking Sensors, II Sensing Networking Leonidas Guibas Stanford University Computation CS321 ZG Book, Ch. 3 1 Class Administration Paper presentation preferences due today, by class time Project info
More informationarxiv: v2 [cs.dc] 28 Feb 2018
Competitive Routing in Hybrid Communication Networks Daniel Jung 1, Christina Kolb 2, Christian Scheideler 3, and Jannik Sundermeier 4 arxiv:1710.09280v2 [cs.dc] 28 Feb 2018 1 Heinz Nixdorf Institute &
More informationTable of Contents. 1. Introduction. 2. Geographic Routing. 2.1 Routing Mechanisms. 2.2 Destination Location. 2.3 Location Inaccuracy. 3.
Geographic Protocols in Sensor Networks Karim Seada, Ahmed Helmy Electrical Engineering Department, University of Southern California {seada, helmy}@usc.edu Table of Contents 1. Introduction 2. Geographic
More informationRouting. Chapter 11. Ad Hoc and Sensor Networks Roger Wattenhofer 11/1
Routing Chapter 11 Ad Hoc and Sensor Networks Roger Wattenhofer 11/1 Application of the Week: Games / Art Uncountable possibilities, below, e.g., a beer coaster that can interact with other coasters [sentilla]
More informationWe noticed that the trouble is due to face routing. Can we ignore the real coordinates and use virtual coordinates for routing?
Geographical routing in practice We noticed that the trouble is due to face routing. Is greedy routing robust to localization noise? Can we ignore the real coordinates and use virtual coordinates for routing?
More informationOn Greedy Geographic Routing Algorithms in Sensing-Covered Networks
On Greedy Geographic Routing Algorithms in Sensing-Covered Networks Guoliang Xing; Chenyang Lu; Robert Pless Department of Computer Science and Engineering Washington University in St. Louis St. Louis,
More informationFractional Cascading in Wireless. Jie Gao Computer Science Department Stony Brook University
Fractional Cascading in Wireless Sensor Networks Jie Gao Computer Science Department Stony Brook University 1 Sensor Networks Large number of small devices for environment monitoring 2 My recent work Lightweight,
More informationCHAPTER 5 MULTICAST GEOGRAPHY BASED ROUTING IN AD HOC NETWORKS
89 CHAPTER 5 MULTICAST GEOGRAPHY BASED ROUTING IN AD HOC NETWORKS 5.1 INTRODUCTION Efficient routing in MANET is a tough task due to their highly dynamic network topology, bandwidth controlled links and
More informationGeographic and Diversity Routing in Mesh Networks
Geographic and Diversity Routing in Mesh Networks COS 463: Wireless Networks Lecture 7 Kyle Jamieson [Parts adapted from B. Karp, S. Biswas, S. Katti] Course Contents 1. Wireless From the Transport Layer
More informationLocation Awareness in Ad Hoc Wireless Mobile Neworks
Location Awareness in Ad Hoc Wireless Mobile Neworks Lijuan Ai Wenyu Wang Yi Zhou 11/14/2001 Mobile Computing, Fall 2001 1 PART I INTRODUCTION TO MANET & LOCATION-AWARE COMPONENTS 11/14/2001 Mobile Computing,
More informationMobile Ad-hoc and Sensor Networks Lesson 04 Mobile Ad-hoc Network (MANET) Routing Algorithms Part 1
Mobile Ad-hoc and Sensor Networks Lesson 04 Mobile Ad-hoc Network (MANET) Routing Algorithms Part 1 Oxford University Press 2007. All rights reserved. 1 Ad-hoc networks deployment For routing, target detection,
More informationDraft Notes 1 : Scaling in Ad hoc Routing Protocols
Draft Notes 1 : Scaling in Ad hoc Routing Protocols Timothy X Brown University of Colorado April 2, 2008 2 Introduction What is the best network wireless network routing protocol? This question is a function
More informationWorst-Case Optimal and Average-Case Efficient Geometric Ad-Hoc Routing
Worst-Case Optimal and Average-Case Efficient Geometric Ad-Hoc Routing Fabian Kuhn, Roger Wattenhofer, Aaron Zollinger Department of Computer Science ETH Zurich 892 Zurich, Switzerland {kuhn, wattenhofer,
More informationPerformance Comparison of Scalable Location Services for Geographic Ad Hoc Routing
Performance Comparison of Scalable Location Services for Geographic Ad Hoc Routing Saumitra M. Das, Himabindu Pucha and Y. Charlie Hu School of Electrical and Computer Engineering Purdue University West
More informationAnalysis of GPS and Zone Based Vehicular Routing on Urban City Roads
Analysis of GPS and Zone Based Vehicular Routing on Urban City Roads Aye Zarchi Minn 1, May Zin Oo 2, Mazliza Othman 3 1,2 Department of Information Technology, Mandalay Technological University, Myanmar
More informationAn Enhanced Algorithm to Find Dominating Set Nodes in Ad Hoc Wireless Networks
Georgia State University ScholarWorks @ Georgia State University Computer Science Theses Department of Computer Science 12-4-2006 An Enhanced Algorithm to Find Dominating Set Nodes in Ad Hoc Wireless Networks
More informationMidpoint Routing algorithms for Delaunay Triangulations
Midpoint Routing algorithms for Delaunay Triangulations Weisheng Si and Albert Y. Zomaya Centre for Distributed and High Performance Computing School of Information Technologies Prologue The practical
More informationData-Centric Query in Sensor Networks
Data-Centric Query in Sensor Networks Jie Gao Computer Science Department Stony Brook University 10/27/05 Jie Gao, CSE590-fall05 1 Papers Chalermek Intanagonwiwat, Ramesh Govindan and Deborah Estrin, Directed
More informationRouting on Overlay Graphs in Mobile Ad Hoc Networks
Routing on Overlay Graphs in Mobile Ad Hoc Networks Sumesh J. Philip Department of Computer Science Western Illinois University Macomb IL 61455 Email: sj-philip@wiu.edu Joy Ghosh, Hung Q. Ngo, Chunming
More informationStateless Multicasting in Mobile Ad Hoc Networks
Stateless Multicasting in Mobile Ad Hoc Networks Xiaojing Xiang, Member, IEEE, Xin Wang, Member, IEEE, and Yuanyuan Yang, Fellow, IEEE Abstract There are increasing interest and big challenge in designing
More informationQuiz 5 Answers. CS 441 Spring 2017
Quiz 5 Answers CS 441 Spring 2017 1. How does Flooding differ from the route discovery phase used in other reactive routing protocols such as DSR and AODV? [2] Flooding involves broadcasting of data packet
More informationAn efficient implementation of the greedy forwarding strategy
An efficient implementation of the greedy forwarding strategy Hannes Stratil Embedded Computing Systems Group E182/2 Technische Universität Wien Treitlstraße 3 A-1040 Vienna Email: hannes@ecs.tuwien.ac.at
More informationReferences. Forwarding. Introduction...
References Routing Protocols H. Karl and A. Willing. Protocols and Architectures for Wireless Sensor Networks. John Wiley & Sons, 005. (Chapter 11) K. Sohraby, D. Minoli, and T. Znati. Wireless Sensor
More informationChapter 11 Chapter 6
Routing Protocols References H. Karl and A. Willing. Protocols and Architectures for Wireless Sensor Networks. John Wiley & Sons, 2005. (Chapter 11) K. Sohraby, D. Minoli, and T. Znati. Wireless Sensor
More informationGeographic Routing Without Location Information. AP, Sylvia, Ion, Scott and Christos
Geographic Routing Without Location Information AP, Sylvia, Ion, Scott and Christos Routing in Wireless Networks Distance vector DSDV On-demand DSR, TORA, AODV Discovers and caches routes on demand Geographic
More informationRouting. Chapter 12. Ad Hoc and Sensor Networks Roger Wattenhofer
Routing Chapter 12 12/1 Application of the Week: Games / Art Uncountable possibilities, below, e.g., a beer coaster that can interact with other coasters [sentilla] 12/2 Rating Area maturity First steps
More informationNetworks: A Deterministic Approach with Constant Overhead
Trace-Routing in 3D Wireless Sensor Networks: A Deterministic Approach with Constant Overhead Su Xia, Hongyi Wu, and Miao Jin! School of Computing and Informatics! University of Louisiana at Lafayette
More informationLECTURE 9. Ad hoc Networks and Routing
1 LECTURE 9 Ad hoc Networks and Routing Ad hoc Networks 2 Ad Hoc Networks consist of peer to peer communicating nodes (possibly mobile) no infrastructure. Topology of the network changes dynamically links
More informationRouting protocols in WSN
Routing protocols in WSN 1.1 WSN Routing Scheme Data collected by sensor nodes in a WSN is typically propagated toward a base station (gateway) that links the WSN with other networks where the data can
More information15-441: Computer Networking. Lecture 24: Ad-Hoc Wireless Networks
15-441: Computer Networking Lecture 24: Ad-Hoc Wireless Networks Scenarios and Roadmap Point to point wireless networks (last lecture) Example: your laptop to CMU wireless Challenges: Poor and variable
More informationSurvey on Location Based Routing Protocols in MANET
Survey on Location Based Routing Protocols in MANET Vivek Nikam, Prof. G.T. Chavan Sinhgad College of engineering, University of Pune Abstract- Due to the infrastructure less and dynamic nature of mobile
More informationLocating and Bypassing Holes in Sensor Networks
Locating and Bypassing Holes in Sensor Networks Qing Fang Jie Gao Leonidas J. Guibas April 8, 2005 Abstract In real sensor network deployments, spatial distributions of sensors are usually far from being
More informationAd hoc and Sensor Networks Chapter 11: Routing Protocols. Holger Karl
Ad hoc and Sensor Networks Chapter 11: Routing Protocols Holger Karl Goals of this Chapter In any network of diameter > 1, the routing & forwarding problem appears We will discuss mechanisms for constructing
More informationGiven a graph, find an embedding s.t. greedy routing works
Given a graph, find an embedding s.t. greedy routing works Greedy embedding of a graph 99 Greedy embedding Given a graph G, find an embedding of the vertices in R d, s.t. for each pair of nodes s, t, there
More informationDelay Tolerant Networks
Delay Tolerant Networks DEPARTMENT OF INFORMATICS & TELECOMMUNICATIONS NATIONAL AND KAPODISTRIAN UNIVERSITY OF ATHENS What is different? S A wireless network that is very sparse and partitioned disconnected
More informationMotivation and Basics Flat networks Hierarchy by dominating sets Hierarchy by clustering Adaptive node activity. Topology Control
Topology Control Andreas Wolf (0325330) 17.01.2007 1 Motivation and Basics 2 Flat networks 3 Hierarchy by dominating sets 4 Hierarchy by clustering 5 Adaptive node activity Options for topology control
More informationOn the Scalability of Hierarchical Ad Hoc Wireless Networks
On the Scalability of Hierarchical Ad Hoc Wireless Networks Suli Zhao and Dipankar Raychaudhuri Fall 2006 IAB 11/15/2006 Outline Motivation Ad hoc wireless network architecture Three-tier hierarchical
More informationEnergy-Efficient Forwarding Strategies for Geographic Routing in Lossy Wireless Sensor Networks
Energy-Efficient Forwarding Strategies for Geographic Routing in Lossy Wireless Sensor Networks K. Seada, M.Zuniga, A. Helmy and B. Krishnamachari Department of Electrical Engineering University of Southern
More informationWireless Internet Routing. Learning from Deployments Link Metrics
Wireless Internet Routing Learning from Deployments Link Metrics 1 Learning From Deployments Early worked focused traditional routing issues o Control plane: topology management, neighbor discovery o Data
More informationTopology Control in Wireless Networks 4/24/06
Topology Control in Wireless Networks 4/4/06 1 Topology control Choose the transmission power of the nodes so as to satisfy some properties Connectivity Minimize power consumption, etc. Last class Percolation:
More informationGEOGRAPHIC routing (also known as location-based or
IEEE/ACM TRANSACTIONS ON NETWORKING, VOL., NO., Geographic Routing in d-dimensional Spaces with Guaranteed Delivery and Low Stretch Simon S. Lam, Fellow, IEEE, and Chen Qian, Student Member, IEEE Abstract
More informationEfficient and Robust Geocasting Protocols for Sensor Networks
Efficient and Robust Geocasting Protocols for Sensor Networks Karim Seada, Ahmed Helmy Electrical Engineering Department, University of Southern California {seada, helmy}@usc.edu Abstract- Geocasting is
More informationRouting and Security in Mobile Ad Hoc Networks
University of Kentucky UKnowledge Theses and Dissertations--Computer Science Computer Science 2016 Routing and Security in Mobile Ad Hoc Networks Baban A. Mahmood University of Kentucky, baban@netlab.uky.edu
More informationLocating and Bypassing Holes in Sensor Networks
Mobile Networks and Applications 11, 187 200, 2006 C 2006 Springer Science + Business Media, LLC. Manufactured in The Netherlands. DOI: 10.1007/s11036-006-4471-y Locating and Bypassing Holes in Sensor
More informationDoes Topology Control Reduce Interference? Martin Burkhart Pascal von Rickenbach Roger Wattenhofer Aaron Zollinger
Does Topology Control Reduce Interference? Martin Burkhart Pascal von Rickenbach Roger Wattenhofer Aaron Zollinger Overview What is Topology Control? Context related work Explicit interference model Interference
More informationAlgorithms for A Connected Dominating Set in Wireless Networks
Algorithms for A Connected Dominating Set in Wireless Networks Thesis submitted in Partial Fulfillment of the Requirements for the Award of the Degree of Master of Technology In Computer Science and Engineering
More informationGPSR: Greedy Perimeter Stateless Routing for Wireless Networks
GPSR: Greedy Perimeter Stateless Routing for Wireless Networks Brad Karp Harvard University / ACIRI karp@eecs.harvard.edu H. T. Kung Harvard University htk@eecs.harvard.edu ABSTRACT We present Greedy Perimeter
More informationInvestigation on OLSR Routing Protocol Efficiency
Investigation on OLSR Routing Protocol Efficiency JIRI HOSEK 1, KAROL MOLNAR 2 Department of Telecommunications Faculty of Electrical Engineering and Communication, Brno University of Technology Purkynova
More informationAanchal Walia #1, Pushparaj Pal *2
An Implemented approach of VANET using Location Information based Technique for safe city and vehicle Aanchal Walia #1, Pushparaj Pal *2 #1. M.Tech Scholor,ECE,Krukshetra University, *2. A.P.ECE Department,
More informationGeographic Routing in d-dimensional Spaces with Guaranteed Delivery and Low Stretch
Geographic Routing in d-dimensional Spaces with Guaranteed Delivery and Low Stretch Simon S. Lam and Chen Qian Department of Computer Science The University of Texas at Austin {lam, cqian}@cs.utexas.edu
More informationModeling and analyzing the correctness of geographic face routing under realistic conditions
Ad Hoc Networks 5 (2007) 855 87 www.elsevier.com/locate/adhoc Modeling and analyzing the correctness of geographic face routing under realistic conditions Karim eada a, *, Ahmed Helmy b, Ramesh Govindan
More informationCMSC 425: Lecture 9 Geometric Data Structures for Games: Geometric Graphs Thursday, Feb 21, 2013
CMSC 425: Lecture 9 Geometric Data Structures for Games: Geometric Graphs Thursday, Feb 21, 2013 Reading: Today s materials is presented in part in Computational Geometry: Algorithms and Applications (3rd
More informationReliable Mobicast via Face-Aware Routing
Washington University in St. Louis Washington University Open Scholarship All Computer Science and Engineering Research Computer Science and Engineering Report Number: WUCSE-2003-49 2003-07-02 Reliable
More informationR2D2: Rendezvous Regions for Data Discovery Karim Seada 1, Ahmed Helmy 2
R2D2: Rendezvous Regions for Data Discovery Karim Seada 1, Ahmed Helmy 2 1 Nokia Research Center, Palo Alto 2 Computer and Information Science and Engineering Department, University of Florida, Gainesville
More informationOutline. Wireless Ad Hoc & Sensor Networks (Wireless Sensor Networks III) Localisation and Positioning. Localisation and Positioning properties
Wireless Ad Hoc & Sensor Networks (Wireless Sensor Networks III) Outline Localisation and Positioning Topology Control Routing Summary WS 2009/2010 Prof. Dr. Dieter Hogrefe/Prof. Dr. Xiaoming Fu Dr. Omar
More informationSecure routing in ad hoc and sensor networks
Security and Cooperation in Wireless Networks Secure routing in ad hoc and sensor networks routing in ad hoc networks; attacks on routing; countermeasures and secured routing protocols; routing security
More informationConnectivity Service for Mobile Ad-Hoc Networks
Connectivity Service for Mobile Ad-Hoc Networks Alejandro Cornejo and Nancy Lynch MIT Computer Science and Artificial Intelligence Laboratory {acornejo,lynch}@csail.mit.edu Abstract We present a distributed
More informationA Survey of Vehicular Ad hoc Networks Routing Protocols
International Journal of Innovation and Applied Studies ISSN 2028-9324 Vol. 3 No. 3 July 2013, pp. 829-846 2013 Innovative Space of Scientific Research Journals http://www.issr-journals.org/ijias/ A Survey
More informationChapter 4 Routing in Wireless Sensor Networks
Chapter 4 Routing in Wireless Sensor Networks Hannes Frey, Stefan Rührup, and Ivan Stojmenović Abstract Wireless sensor networks are formed by small sensor nodes communicating over wireless links without
More informationGLIDER: Gradient Landmark-Based Distributed Routing for Sensor Networks
GLIDER: Gradient Landmark-Based Distributed Routing for Sensor Networks Qing Fang Jie Gao Leonidas J. Guibas Vin de Silva Li Zhang Department of Electrical Engineering, Stanford University. jqfang@stanford.edu
More informationKapitel 5: Mobile Ad Hoc Networks. Characteristics. Applications of Ad Hoc Networks. Wireless Communication. Wireless communication networks types
Kapitel 5: Mobile Ad Hoc Networks Mobilkommunikation 2 WS 08/09 Wireless Communication Wireless communication networks types Infrastructure-based networks Infrastructureless networks Ad hoc networks Prof.
More informationGIAN Course on Distributed Network Algorithms. Spanning Tree Constructions
GIAN Course on Distributed Network Algorithms Spanning Tree Constructions Stefan Schmid @ T-Labs, 2011 Spanning Trees Attactive infrastructure : sparse subgraph ( loop-free backbone ) connecting all nodes.
More informationSorting Based Data Centric Storage
Sorting Based Data Centric Storage Fenghui Zhang, Anxiao(Andrew) Jiang, and Jianer Chen Dept. of Computer Science, Texas A&M Univ. College Station, TX 77843. {fhzhang, ajiang, chen}@cs.tamu.edu. Abstract
More informationClustering Color/Intensity. Group together pixels of similar color/intensity.
Clustering Color/Intensity Group together pixels of similar color/intensity. Agglomerative Clustering Cluster = connected pixels with similar color. Optimal decomposition may be hard. For example, find
More informationExploration of Path Space using Sensor Network Geometry
Exploration of Path Space using Sensor Network Geometry Ruirui Jiang, Xiaomeng Ban Computer Science Stony Brook University {jiang,xban}@cs.sunysb.edu Mayank Goswami Applied Math & Statistics Stony Brook
More informationDistributed Systems. Ad hoc and sensor networks. Rik Sarkar. University of Edinburgh Fall 2018
Distributed Systems Ad hoc and sensor networks Rik Sarkar University of Edinburgh Fall 2018 Mobile and Ubiquitous compueng Devices (computers) are carried by people (mobile) Laptops, phones, watches They
More information