Geographic Routing in Simulation: GPSR

Similar documents
Challenges in Geographic Routing: Sparse Networks, Obstacles, and Traffic Provisioning

Geographic and Diversity Routing in Mesh Networks

Routing in Sensor Networks

Geographic Routing Without Location Information. AP, Sylvia, Ion, Scott and Christos

GPSR: Greedy Perimeter Stateless Routing for Wireless Networks

Simulations of the quadrilateral-based localization

A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols. Broch et al Presented by Brian Card

Geographical routing 1

End-to-end path: route

CS551 Ad-hoc Routing

R2D2: Rendezvous Regions for Data Discovery Karim Seada 1, Ahmed Helmy 2

Networking Sensors, I

(General article) Position Based Routing Technique: Greedy Perimeter Stateless Routing for Wireless Networks

Geometric Spanners for Routing in Mobile Networks

AN AD HOC network consists of a collection of mobile

Wireless Mesh Networks

15-441: Computer Networking. Lecture 24: Ad-Hoc Wireless Networks

Arvind Krishnamurthy Fall 2003

A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols

Table of Contents. 1. Introduction. 2. Geographic Routing. 2.1 Routing Mechanisms. 2.2 Destination Location. 2.3 Location Inaccuracy. 3.

Lecture 13: Routing in multihop wireless networks. Mythili Vutukuru CS 653 Spring 2014 March 3, Monday

Dynamic Source Routing in ad hoc wireless networks

Data-Centric Query in Sensor Networks

SMITE: A Stochastic Compressive Data Collection. Sensor Networks

Poonam kori et al. / International Journal on Computer Science and Engineering (IJCSE)

An efficient implementation of the greedy forwarding strategy

Data-Centric Storage in Sensornets with GHT, a Geographic Hash Table

DYNAMIC DATA ROUTING IN MANET USING POSITION BASED OPPORTUNISTIC ROUTING PROTOCOL

Inter-Domain Routing: BGP

Optimized Greedy Perimeter Stateless Routing

Location Awareness in Ad Hoc Wireless Mobile Neworks

Mobility and Density Aware AODV Protocol Extension for Mobile Adhoc Networks-MADA-AODV

A Location-based Directional Route Discovery (LDRD) Protocol in Mobile Ad-hoc Networks

BGR: Blind Geographic Routing for Sensor Networks

CHAPTER 5 MULTICAST GEOGRAPHY BASED ROUTING IN AD HOC NETWORKS

Mobile Advanced Networks. Position-based routing geometric, geographic, location-based. Navid Nikaein Mobile Communication Department

Energy-Efficient Forwarding Strategies for Geographic Routing in Lossy Wireless Sensor Networks

Approximately Uniform Random Sampling in Sensor Networks

Ad hoc and Sensor Networks Topology control

LECTURE 9. Ad hoc Networks and Routing

Information Brokerage

EFFICIENT DATA TRANSMISSION AND SECURE COMMUNICATION IN VANETS USING NODE-PRIORITY AND CERTIFICATE REVOCATION MECHANISM

Analysis of GPS and Zone Based Vehicular Routing on Urban City Roads

Networking Sensors, II

CHAPTER 2 WIRELESS SENSOR NETWORKS AND NEED OF TOPOLOGY CONTROL

Geographic rendezvous-based architectures for emergency data dissemination

An Energy-aware Greedy Perimeter Stateless Routing Protocol for Mobile Ad hoc Networks

GHT: A Geographic Hash Table for Data-Centric Storage

Performance of Various Routing Protocols in Mobile Ad Hoc Networks-A Survey

ROUTING ALGORITHMS Part 2: Data centric and hierarchical protocols

Data Communication. Guaranteed Delivery Based on Memorization

Efficient and Robust Geocasting Protocols for Sensor Networks

DYNAMIC SEARCH TECHNIQUE USED FOR IMPROVING PASSIVE SOURCE ROUTING PROTOCOL IN MANET

AODV-PA: AODV with Path Accumulation

Efficient On-Demand Routing for Mobile Ad-Hoc Wireless Access Networks

A Survey on Geographic Routing Protocols for Mobile Ad hoc Networks

Simulation & Performance Analysis of Mobile Ad-Hoc Network Routing Protocol

Performance Comparison of Scalable Location Services for Geographic Ad Hoc Routing

Chapter 7 TOPOLOGY CONTROL

A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols

Data gathering using mobile agents for reducing traffic in dense mobile wireless sensor networks

Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures

Lecture 6: Vehicular Computing and Networking. Cristian Borcea Department of Computer Science NJIT

Geographic Adaptive Fidelity and Geographic Energy Aware Routing in Ad Hoc Routing

Ad hoc and Sensor Networks Chapter 10: Topology control

GLIDER: Gradient Landmark-Based Distributed Routing for Sensor Networks. Stanford University. HP Labs

Qos Parameters Estimation in MANET Using Position Based Opportunistic Routing Protocol

Motivation and Basics Flat networks Hierarchy by dominating sets Hierarchy by clustering Adaptive node activity. Topology Control

Wireless and Mobile Networks Reading: Sections 2.8 and 4.2.5

Ad Hoc Routing Protocols and Issues

Outline. Wireless Ad Hoc & Sensor Networks (Wireless Sensor Networks III) Localisation and Positioning. Localisation and Positioning properties

Modeling and analyzing the correctness of geographic face routing under realistic conditions

Dynamic Source Routing in Ad Hoc Wireless Networks

Performance Comparison of MANETs Routing Protocols for Dense and Sparse Topology

More wireless: Sensor networks and TCP on mobile hosts

Content. 1. Introduction. 2. The Ad-hoc On-Demand Distance Vector Algorithm. 3. Simulation and Results. 4. Future Work. 5.

On Delivery Guarantees of Face and Combined Greedy-Face Routing in Ad Hoc and Sensor Networks

Announcements. CMPE 257: Wireless and Mobile Networking. Today. Location Management. Project status update 2. Graded exams. Hw 4 (?) Project report.

We noticed that the trouble is due to face routing. Can we ignore the real coordinates and use virtual coordinates for routing?

Location-aware In-Network Monitoring in Wireless Sensor Networks

Routing in Ad Hoc Wireless Networks PROF. MICHAEL TSAI / DR. KATE LIN 2014/05/14

DSR: The Dynamic Source Routing Protocol for Multi-Hop Wireless Ad Hoc Networks

Broadcasting Techniques for Mobile Ad Hoc Networks

Energy-Efficient Communication Protocol for Wireless Micro-sensor Networks

PROJECT REPORT VIRTUAL COORDINATE GENERATOR AND ROUTING SIMULATION TOOL FOR WIRELESS SENSOR NETWORKS IN 2 AND 3-DIMENSIONAL NETWORK SPACE

M-Geocast: Robust and Energy-Efficient Geometric Routing for Mobile Sensor Networks

Routing on Overlay Graphs in Mobile Ad Hoc Networks

Mitigating Routing Misbehavior in Mobile Ad Hoc Networks

3. Evaluation of Selected Tree and Mesh based Routing Protocols

Geo-Routing. Chapter 2. Ad Hoc and Sensor Networks Roger Wattenhofer

CS 229 Final Report: Location Based Adaptive Routing Protocol(LBAR) using Reinforcement Learning

Performance Evaluation of Routing Protocols for MAC Layer Models

Efficient Peer-to-Peer Information Sharing over Mobile Ad Hoc Networks

Information Brokerage

The CMU Monarch Project s Wireless and Mobility Extensions to ns

Routing. Geo-Routing. Thanks to Stefan Schmid for slides

Outline. Motivation. Traditional Database Systems. A Distributed Indexing Scheme for Multi-dimensional Range Queries in Sensor Networks

Link Estimation and Tree Routing

Performance Metrics of MANET in Multi-Hop Wireless Ad-Hoc Network Routing Protocols

J. A. Drew Hamilton, Jr., Ph.D. Director, Information Assurance Laboratory and Associate Professor Computer Science & Software Engineering

Transcription:

Geographic Routing in Simulation: GPSR Brad Karp UCL Computer Science CS M038/GZ06 23 rd January 2013

Context: Ad hoc Routing Early 90s: availability of off-the-shelf wireless network cards and laptops 1994: first papers on Destination-Sequenced Distance Vector (DSDV) routing and Dynamic Source Routing (DSR) spark tremendous interest in routing on mobile wireless (ad hoc) networks 1998: Broch et al. s comparison of leading ad hoc routing protocol proposals in ns-2 simulator in MobiCom [2000: GPSR in MobiCom] 2000: Estrin et al. s Directed Diffusion in MobiCom sparks interest in wireless sensor networks 2

Context: Ad hoc Routing Early 90s: availability of off-the-shelf wireless network cards and laptops Reasons 1994: first to papers work on Destination-Sequenced a research problem: Distance Intellectual Vector rigor, (DSDV) technical routing difficulty and Dynamic Source Routing (DSR) spark tremendous interest in routing Practicality: on mobile solve wireless a relevant (ad problem hoc) networks 1998: whose Broch solution et al. s will comparison find use of leading ad Extremes hoc routing of one protocol or the proposals other tend in ns-2 to lead simulator success in MobiCom (e.g., Fermat proof; Napster) Solutions [2000: GPSR to problems in MobiCom] that capture both aspects often 2000: are Estrin the et most al. s important Directed results Diffusion in Examine MobiCom motivation sparks interest of in research wireless carefully! sensor networks 3

Original Motivation (2000): Mobile Sensornets 4

Original Motivation (2000): Rooftop Networks Potentially lower-cost alternative to cellular architecture (no backhaul to every base station) 5

Motivation (2010+): Sensornets Many sensors, widely dispersed Sensor: radio, transducer(s), CPU, storage, battery Multiple wireless hops, forwarding sensorto-sensor to a base station What communication primitives will thousand- or million-node sensornets need? 6

Scalability in Sensor Networks Resource constraints drive metrics State per node: minimize Energy consumed: minimize Bandwidth consumed: minimize System scale in nodes: maximize Operation success rate: maximize 7

Outline Motivation Context Algorithm Greedy forwarding Graph planarization Perimeter forwarding Evaluation in simulation Footnotes Open questions Foibles of simulation 8

The Routing Problem Each router has unique ID Packets stamped with destination node ID Router must choose next hop for received packet Routers communicate to accumulate state for use in forwarding decisions Routes change with topology Evaluation metrics: Routing protocol message cost Data delivery success rate Route length (hops) Per-router state D S 9

The Routing Problem Each router has unique ID Packets stamped with destination node ID Router must choose next hop for received packet Routers communicate to accumulate state for use in forwarding decisions Routes change with topology Evaluation metrics: Routing protocol message cost Data delivery success rate Route length (hops) Per-router state D? S 10

The Routing Problem Each router has unique ID Packets stamped with destination node ID Router must choose next hop for received packet Routers communicate to accumulate state for use in forwarding decisions Routes change with topology Evaluation metrics: Routing protocol message cost Data delivery success rate Route length (hops) Per-router state D S 11

The Routing Problem Each router has unique ID Packets stamped with destination node ID Router must choose next hop for received packet Routers communicate to accumulate state for use in forwarding decisions Routes change with topology Evaluation metrics: Routing protocol message cost Data delivery success rate Route length (hops) Per-router state D? S 12

The Routing Problem Each router has unique ID Packets stamped with destination node ID Router must choose next hop for received packet Routers communicate to accumulate state for use in forwarding decisions Routes change with topology Evaluation metrics: Routing protocol message cost Data delivery success rate Route length (hops) Per-router state D S 13

Why Are Topologies Dynamic? Node failure Battery depletion Hardware malfunction Physical damage (harsh environment) Link failure Changing RF interference sources Mobile obstacles change multi-path fading Node mobility In-range neighbor set constantly changing Extreme case for routing scalability Not commonly envisioned for sensor networks 14

Routing: Past Approaches, Scaling Wired, Intra-domain Internet routing: Link-state and Distance-vector: shortest paths in hops LS: push full topology map to all routers, O(L) state DV: push distances across network diameter, O(N) state Each link change must be communicated to all routers, or loops/disconnection result [Zaumen, Garcia-Luna, 91] Dynamic Source Routing (DSR), ad hoc routing: Flood queries on-demand to learn source routes Cache replies 15

Scaling Routing (cont d) Dominant factors in cost of DV, LS, DSR: rate of change of topology (bandwidth) number of routers in routing domain (b/w, state) Scaling strategies: Hierarchy: at AS boundaries (BGP) or on finer scale (OSPF) Goal: reduce number of routers in routing domain Assumption: address aggregation Caching: store source routes overheard (DSR) Goal: limit propagation of future queries Assumption: source route remains fixed while cached 16

Scaling Routing (cont d) Dominant factors in cost of DV, LS, DSR: rate of change of topology (bandwidth) number of routers in routing domain (b/w, state) Today: Scaling Internet strategies: routing scales because of IP prefix aggregation; not easily applicable in sensornets Hierarchy: at AS boundaries (BGP) or on finer scale (OSPF) Goal: reduce number of routers in routing domain Assumption: address aggregation Can we achieve per-node state independent of N? Can we reduce bandwidth spent communicating topology changes? Caching: store source routes overheard (DSR) Goal: limit propagation of future queries Assumption: source route remains fixed while cached 17

Greedy Perimeter Stateless Routing (GPSR) Central idea: Machines can know their geographic locations. Route using geography. Packet destination field: location of destination Nodes all know own positions, e.g., by GPS (outdoors) by surveyed position (for non-mobile nodes) by short-range localization (indoors, [AT&T Camb, 1997], [Priyantha et al., 2000]) &c. Assume an efficient node location registration/ lookup system (e.g., GLS [Li et al., 2000]) to support host-centric addressing 18

Assumptions Bi-directional radio links (unidirectional links may be blacklisted) Network nodes placed roughly in a plane Radio propagation in free space; distance from transmitter determines signal strength at receiver Fixed, uniform radio transmitter power 19

Greedy Forwarding Nodes learn immediate neighbors positions from beaconing/piggybacking on data packets Locally optimal, greedy next hop choice: Neighbor geographically nearest destination x y D 20

Greedy Forwarding Nodes learn immediate neighbors positions from beaconing/piggybacking on data packets Neighbor Locally optimal, must be greedy strictly next closer hop choice: to avoid loops Neighbor geographically nearest destination x y D 21

In Praise of Geography Self-describing As node density increases, shortest path tends toward Euclidean straight line between source and destination Node s state concerns only one-hop neighbors: Low per-node state: O(density) Low routing protocol overhead: state pushed only one hop 22

Greedy Forwarding Failure Greedy forwarding not always possible! Consider: D v z w y x 23

Greedy Forwarding Failure Greedy forwarding not always possible! Consider: D v z void w y x 24

Greedy Forwarding Failure Greedy forwarding not always possible! Consider: D v z How can we circumnavigate voids? based only on one-hop neighborhood? void w y x 25

Node Density and Voids 26

Node Density and Voids Voids more prevalent in sparser topologies 27

Void Traversal: The Right-hand Rule Well-known graph traversal: right-hand rule Requires only neighbors positions y z x 28

Void Traversal: The Right-hand Rule Well-known graph traversal: right-hand rule Requires only neighbors positions y z x 29

Void Traversal: The Right-hand Rule Well-known graph traversal: right-hand rule Requires only neighbors positions y z x 30

Void Traversal: The Right-hand Rule Well-known graph traversal: right-hand rule Requires only neighbors positions y z x 31

Void Traversal: The Right-hand Rule Well-known graph traversal: right-hand rule Requires only neighbors positions y z x 32

Void Traversal: The Right-hand Rule Well-known graph traversal: right-hand rule Requires only neighbors positions y z x 33

Planar vs. Non-planar Graphs On graphs with edges that cross (non-planar graphs), right-hand rule may not tour enclosed face boundary 34

Planar vs. Non-planar Graphs On graphs with edges that cross (non-planar graphs), right-hand rule may not tour enclosed face boundary 35

Planar vs. Non-planar Graphs On graphs with edges that cross (non-planar graphs), right-hand rule may not tour enclosed face boundary 36

Planar vs. Non-planar Graphs On graphs with edges that cross (non-planar graphs), right-hand rule may not tour enclosed face boundary 37

Planar vs. Non-planar Graphs On graphs with edges that cross (non-planar graphs), right-hand rule may not tour enclosed face boundary 38

Planar vs. Non-planar Graphs On graphs with edges that cross (non-planar graphs), right-hand rule may not tour enclosed face boundary 39

Planar vs. Non-planar Graphs On graphs with edges that cross (non-planar graphs), right-hand rule may not tour enclosed face boundary 40

Planar vs. Non-planar Graphs On graphs with edges that cross (non-planar graphs), right-hand rule may not tour enclosed face boundary 41

Planar vs. Non-planar Graphs On graphs with edges that cross (non-planar graphs), right-hand rule may not tour enclosed face boundary 42

Planar vs. Non-planar Graphs On graphs with edges that cross (non-planar graphs), right-hand rule may not tour enclosed face boundary 43

Planar vs. Non-planar Graphs On graphs with edges that cross (non-planar graphs), right-hand rule may not tour enclosed face boundary 44

Planar vs. Non-planar Graphs On graphs with edges that cross (non-planar graphs), right-hand rule may not tour enclosed face boundary How to remove crossing edges without partitioning graph? And using only single-hop neighbors positions? 45

Planarized Graphs Relative Neighborhood Graph (RNG) [Toussaint, 80] and Gabriel Graph (GG) [Gabriel, 69]: long-known planar graphs Assume edge exists between any pair of nodes separated by less than threshold distance (i.e., nominal radio range) RNG and GG can be constructed from only neighbors positions, and can be shown not to partition network! u? v u? v RNG GG 46

Planarized Graphs Relative Neighborhood Graph (RNG) [Toussaint, 80] and Gabriel Graph (GG) [Gabriel, 69]: long-known planar graphs Assume edge exists between any pair of nodes separated by less than threshold distance (i.e., nominal radio range) RNG and GG can be constructed from only neighbors positions, and can be shown not to partition network! u w? v u? v RNG GG 47

Planarized Graphs Relative Neighborhood Graph (RNG) [Toussaint, 80] and Gabriel Graph (GG) [Gabriel, 69]: long-known planar graphs Assume edge exists between any pair of nodes separated by less than threshold distance (i.e., nominal radio range) RNG and GG can be constructed from only neighbors positions, and can be shown not to partition network! u w v u? v RNG GG 48

Planarized Graphs Relative Neighborhood Graph (RNG) [Toussaint, 80] and Gabriel Graph (GG) [Gabriel, 69]: long-known planar graphs Assume edge exists between any pair of nodes separated by less than threshold distance (i.e., nominal radio range) RNG and GG can be constructed from only neighbors positions, and can be shown not to partition network! u w v u w? v RNG GG 49

Planarized Graphs Relative Neighborhood Graph (RNG) [Toussaint, 80] and Gabriel Graph (GG) [Gabriel, 69]: long-known planar graphs Assume edge exists between any pair of nodes separated by less than threshold distance (i.e., nominal radio range) RNG and GG can be constructed from only neighbors positions, and can be shown not to partition network! u w v u w v RNG GG 50

Planarized Graphs Relative Neighborhood Graph (RNG) [Toussaint, 80] and Gabriel Graph (GG) [Gabriel, 69]: long-known planar graphs Assume edge exists between any pair of nodes separated by less than threshold distance (i.e., nominal radio range) RNG and GG can be constructed from only neighbors positions, and can be shown not to partition network! Euclidean MST (so connected) RNG GG u w w v u v Delaunay Triangulation (so planar) RNG GG 51

Planarized Graphs: Example 200 nodes, placed uniformly at random on 2000-by-2000-meter region; 250-meter radio range Full Graph GG Subgraph RNG Subgraph 52

Full Greedy Perimeter Stateless Routing All packets begin in greedy mode Greedy mode uses full graph Upon greedy failure, node marks its location in packet, marks packet in perimeter mode Perimeter mode packets follow simple planar graph traversal: Forward along successively closer faces by right-hand rule, until reaching destination Packets return to greedy mode upon reaching node closer to destination than perimeter mode entry point 53

Perimeter Mode Forwarding Example D x Traverse face closer to D along xd by right-hand rule, until crossing xd Repeat with next-closer face, &c. 54

Perimeter Mode Forwarding Example D x Traverse face closer to D along xd by right-hand rule, until crossing xd Repeat with next-closer face, &c. 55

Perimeter Mode Forwarding Example D x Traverse face closer to D along xd by right-hand rule, until crossing xd Repeat with next-closer face, &c. 56

Perimeter Mode Forwarding Example D x Traverse face closer to D along xd by right-hand rule, until crossing xd Repeat with next-closer face, &c. 57

Perimeter Mode Forwarding Example D x Traverse face closer to D along xd by right-hand rule, until crossing xd Repeat with next-closer face, &c. 58

Perimeter Mode Forwarding Example D x Traverse face closer to D along xd by right-hand rule, until crossing xd Repeat with next-closer face, &c. 59

Perimeter Mode Forwarding Example D x Traverse face closer to D along xd by right-hand rule, until crossing xd Repeat with next-closer face, &c. 60

Perimeter Mode Forwarding Example D x Traverse face closer to D along xd by right-hand rule, until crossing xd Repeat with next-closer face, &c. 61

Perimeter Mode Forwarding Example D x Traverse face closer to D along xd by right-hand rule, until crossing xd Repeat with next-closer face, &c. 62

Perimeter Mode Forwarding Example D x Traverse face closer to D along xd by right-hand rule, until crossing xd Repeat with next-closer face, &c. 63

Perimeter Mode Forwarding Example D x Traverse face closer to D along xd by right-hand rule, until crossing xd Repeat with next-closer face, &c. 64

Perimeter Mode Forwarding Example D x Traverse face closer to D along xd by right-hand rule, until crossing xd Repeat with next-closer face, &c. 65

Protocol Tricks for Dynamic Networks Use of MAC-layer failure feedback: As in DSR [Broch, Johnson, 98], interpret retransmit failure reports from 802.11 MAC as indication neighbor gone out-of-range Interface queue traversal and packet purging: Upon MAC retransmit failure for a neighbor, remove packets to that neighbor from IFQ to avoid head-of-line blocking of 802.11 transmitter during retries Promiscuous network interface: Reduce beacon load and keep positions stored in neighbor tables current by tagging all packets with forwarding node s position Planarization triggers: Re-planarize upon acquisition of new neighbor and every loss of former neighbor, to keep planarization up-to-date as topology changes 66

Outline Motivation Context Algorithm Greedy forwarding Graph planarization Perimeter forwarding Evaluation in simulation Footnotes Open questions Foibles of simulation 67

Evaluation: Simulations ns-2 with wireless extensions [Broch et al., 98]; full 802.11 MAC, free space physical propagation Topologies: Nodes Region Density 50 1500 m x 300 m 1 node / 9000 m 2 200 3000 m x 600 m 1 node / 9000 m 2 50 1340 m x 1340 m 1 node / 35912 m 2 30 2-Kbps CBR flows; 64-byte data packets Random Waypoint Mobility in [1, 20 m/s]; Pause Time [0, 30, 60, 120s]; 1.5s GPSR beacons 68

Packet Delivery Success Rate (50, 200; Dense) 69

Routing Protocol Overhead (50, 200; Dense) 70

Path Length (50; Dense) 71

Path Length (200; Dense) 72

Path Length (200; Dense) Why does DSR find shorter paths more of the time when mobility rate increases? 73

State Size (200; Dense) 74

State Size (200; Dense) How would you expect GPSR s state size to change the number of nodes in the network increases? Why does DSR hold state for more nodes than there are in the network? 75

Critical Thinking Based on the results thus far (indeed, all results in the paper), what do we know about the performance of GPSR s perimeter mode? Would you expect it to be more or less reliable than greedy mode? Would you expect use of perimeter mode to affect path length? 76

Critical Thinking Based on the results thus far (indeed, all results in the paper), what do we know performance about the performance of perimeter mode! of GPSR s perimeter mode? Evaluation in paper reveals nearly nothing about Why doesn t it? Would you expect it to be more or less reliable than greedy mode? Would you expect use of perimeter mode to affect path length? 77

Packet Delivery Success Rate (50; Sparse) 78

Routing Protocol Overhead (50; Sparse) 79

Path Length (50; Sparse) 80

Outline Motivation Context Algorithm Greedy forwarding Graph planarization Perimeter forwarding Evaluation in simulation Footnotes Open questions Foibles of simulation 81

Open Questions How to route geographically in 3D? Greedy mode? Perimeter mode? More in CLDP paper (next) Effect of radio-opaque obstacles? More in CLDP paper (next) Effect of position errors? More in CLDP paper (next) J Better planar graphs than GG, RNG? See [Guibas et al., 2001] Name-to-location database, built atop geo routing? See [GLS, Li et al., MobiCom 2000] 82

Foibles of Simulation Greedy mode works more often as nodes move more rapidly?! Why? (Hint: when does greedy forwarding work best?) 83

Recap: Scalability via Geography with GPSR Key scalability properties: Small state per router: O(D), not O(N) or O(L) as for shortest-path routing, where D = density (neighbors), N = total nodes, L = total links Low routing protocol overhead: each node merely single-hop broadcasts own position periodically Approximates shortest paths on dense networks Delivers more packets successfully on dynamic topologies than shortest-paths routing protocols 84