310 likes | 441 Views
An Information Model for Geographic Greedy Forwarding in Wireless Ad-Hoc Sensor Networks. Zhen Jiang Computer Science Department West Chester University. Jie Wu Department of Computer Sci. & Eng. Florida Atlantic University. Junchao Ma, Wei Lou Department of Computing
E N D
An Information Model for Geographic Greedy Forwarding in Wireless Ad-Hoc Sensor Networks Zhen Jiang Computer Science Department West Chester University Jie Wu Department of Computer Sci. & Eng. Florida Atlantic University Junchao Ma, Wei Lou Department of Computing The Hong Kong Polytechnic University Infocom 2008
Outline • Introductions • Related works • Safety Model For LGF Routing • Safety -Information-Based LGF Routing (SLFG) • Experimental Results • Conclusions
Introductions • Geographic greedy forwarding routing is the most promising routing scheme in Wireless Ad-hoc Sensor Networks. • An important challenge often faced in geographic greedy forwarding in WASNs is the “local minimum phenomenon (Dead end)”.
Introductions • To mitigate the local minimum issue, GFG,GPSR and GOAFR are currently the most popular methods. • However, without enough shape information of the holes, such a routing may use a long detour path in the perimeter routing.
Introductions – goal • In this paper, the authors propose a simple and efficient method to achieve a shorter path.
Related works - Geographic greedy forwarding (GF) Destination Source B. Karp and H. Kung, “GPSR: Greedy perimeter stateless routing for wireless sensor networks,” Proc. of the 6th Annual ACM/IEEE International Conference on Mobile Computing and Networking (ACM/IEEE MOBICOM’00), August 2000, pp. 243-254.
Related works - Limited geographic greedyforwarding (LGF) Quadrant II (Northwest) Quadrant I (Northeast) Destination Quadrant III (Southwest) Quadrant IV (Southeast) Source
Related works - BOUNDHOLE Destination Boundary Source Q. Fang, J. Gao, and L. Guibas, “Locating and bypassing routing holesin sensor networks,” Proc. of the 23rd Annual Joint Conference of theIEEE Computer and Communications Societies (IEEE INFOCOM’04),2004, pp. 2458-2468.
Safety Model For LGF Routing -assumption • Each node has its location information. • Sources are aware of the location of the destination. • All sensor has the same communication range • Each node has four forwardingzone. • The system is rounded based
Safety -Information-Based LGF Routing (SLGF) Destination Unsafe Area Unsafe Node Source Safe Node
Safety Model For LGF Routing –compare with BOUNDHOLE • BOUNDHOLE needs boundaries to encircled the hole and there are many unnecessarynodes in a boundary. • A boundary may be concave ,but the shape of the unsafe are has been optimized to a rectangle in a local view of each unsafe node. • Each unsafe node only stores the location of the opposite corner of rectangle • Safety model don’t need to calculate to identify the boundary.
Safety Model For LGF Routing u1(NE,NW,SW,SE) Quadrant I (NorthEast) Quadrant II (NorthWest) u1 Quadrant III (SouthWest) Quadrant IV (SouthEast)
Safety Model For LGF Routing • At the beginning, all forwarding regions are labeled as safe. u1(s,s,s,s) u2(s,s,s,s) u2 u4 u3(s,s,s,s) u4(s,s,s,s) u3 u1
Safety Model For LGF Routing • Each node starts labeling process u1(s,s,s,s) u1(u,s,s,s) u2(u,s,s,s) u2(s,s,s,s) u2 u4 u3(s,s,s,s) u3(u,s,s,s) u4(s,s,s,s) u4(u,s,s,s) u3 u1 u5(s,s,s,s)
Safety Model For LGF Routing • Each unsafe node would estimated its unsafe area. u1 u2 Unsafe Area
Safety Model For LGF Routing Proof in contrapositive form If a greedy forwarding pathexists, we can find anunsafe node ujthat its successor uj+1is safe. Destination uj+1 uj Source Unsafe Node
Safety -Information-Based LGF Routing (SLGF) Destination Unsafe Node Source Safe Node
Safety -Information-Based LGF Routing (SLGF) -Source or destination inside unsafe area • The SLGF scheme will ignore unsafe node to avoid local minimum. Destination ? Destination ? Source Source
Safety -Information-Based LGF Routing – destination inside unsafe area D is inside the area. Forward the packet and discard safety information. Check if D is inside its unsafe area Destination Source
Safety -Information-Based LGF Routing -source inside unsafe area • The quickest way to leave such an unsafe area is to route in the opposite direction to d Destination Source
Experimental Results • Simulator: built in c++ • Field : 200m x 200m • Uniform deployment (IA) (Hole is very small) • Random deployment (FA) (Hole is larger than Uniform) • The transmission radius of a node is 20m • Number of nodes 400 to 800 in incensement of 50
Experimental Results - construction process under different information models Boundary of BOUNDHOLE Boundary of Safety Model for type I Both BOUNDHOLE & Safety Model
Conclusions • This paper is the first attempt to find the balance of the tradeoff • between routing adaptivity and information model cost while pursuing better routing performance in WASNs. • The authors proposed • a easy and quick construction model