簡易檢索 / 詳目顯示

研究生: 陳品安
Chen, Pin-An
論文名稱: 無線隨意網路上以迴歸補救方式運行的無信標繞徑
Beaconless routing with regressive recovery in wireless Ad Hoc Networks
指導教授: 蔡榮宗
Tsai, Jung-Tsung
學位類別: 碩士
Master
系所名稱: 資訊工程學系
Department of Computer Science and Information Engineering
論文出版年: 2019
畢業學年度: 107
語文別: 中文
論文頁數: 48
中文關鍵詞: 無信標地理路由協定無線隨意網路單位圓假設協調式旋轉掃描封包到達率
英文關鍵詞: Beaconless routing, wireless Ad Hoc network, unit disk assumption, cooperation rotational sweep, packet arrival ratio
DOI URL: http://doi.org/10.6345/NTNU201900756
論文種類: 學術論文
相關次數: 點閱:51下載:9
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報
  • 在無線隨意網路中,Beaconless geographic routing(BLR)能讓節點不必知道他們鄰居點座標位置下執行greedy forwarding,節點依靠RTS/CTS機制讓鄰居點從RTS封包有足夠的資訊執行MAC contention,最先回應CTS封包的鄰居點視為下個中繼點。如果當節點已無法從鄰居點得到回應時,表示當下封包所在節點離目的節點是最近的,greedy forwarding失敗後換成補救方法rotation sweep algorithm,鄰居點依幾何圖形(如Reuleaux triangle)運作機制決定MAC conten-tion競爭回傳時間,確保封包正確的繞徑路線和減少所傳的節點數。著名的BLR研究成果都假設在節點具有相同的傳輸範圍,這在真實網路中是不可能成立的,以致於先前可信任的方法難以實際應用。
    在真實網路中,節點間連接是不完美的,我們修改greedy forwarding流程,在MAC conten-tion的設計納入距離和角度因素,在補救方法方面,主要將cooperation rotational sweep 網路第三層繞徑方式調整到MAC和Routing的跨層運作方式,目的是利用cooperation rotational sweep犧牲封包標頭的空間來記錄歷史節點的位置資訊,讓各個鄰居點能利用歷史節點來解決傳送過程中存在的隱藏節點問題。
    將所提出的方法模擬實驗結果呈現封包抵達率、路徑延展和CTS封包碰撞次數都會隨著封包標頭所記錄的歷史節點個數成正向成長。

    Beaconless geographic routing(BLR) allows nodes to perform greedy forwarding without the knowledge of the neighborhood in wireless Ad Hoc network. The node relies on the RTS/CTS mechanism to offer neigh-bors enough information from the RTS packet to implement MAC contention. The neighbor node that first successfully responds with a CTS packet is chosen as the next relay. If the node doesn’t get a CTS response from neighbors, it is implicitly located locally closest to the destination node. Rotation sweep algorithm is then applied after the greedy forwarding fails. Neighbors rely on a sweep of curve with some geometry (such as Reuleaux triangle) to decide the response time of sending a CTS response in MAC contention. Recovery approach adjusts the routing path of sending a packet so as to improve routing success rate. The well-known BLR research assumes that all node have the same transmission range. The assumption is not true in reality, and therefore their methods are difficult to apply practically.
    In this work, the range of connection between nodes is not fixed. We modify the greedy forwarding pro-cess to include the variables of distance and angle into the design of MAC contention latency. For recovery mode operation, we adopt the technique of cooperative rotational sweep scheme for use in the cross-layer operation involving MAC contention and routing decision here. This is essentially at the cost of packet head-er overhead to record the positions of historical visited nodes, so that each neighbor can solve the hidden node problem existing in a network topology.
    Simulation results show that the packet arrival ratio, path sketch and CTS packet collisions increase with the number of historical nodes memorized in packet header.

    摘要 i Abstract iii 致謝 vi 目錄 vii 附表目錄 viii 附圖目錄 ix 第一章 緒論 1 1.1 研究背景 1 1.2 研究動機 2 1.3 論文架構 6 第二章 相關研究 8 2.1 Rotation sweep algorithm 8 2.2 Cooperative rotational sweep algorithm 9 第三章 Regressive recovery 路由協定 12 3.1 系統模型 12 3.2 BLR with Regressive recovery路由協定 13 3.2.1 Greedy mode 14 3.2.2 Recovery mode 21 第四章 模擬實驗與討論 31 4.1 Regressive recovery的模擬方法 31 4.2 Regressive recovery的模擬結果與討論 35 第五章 結論及未來研究方向 44 參考文獻 46

    [1] M. Mauve, J. Widmer, and H. Hartenstein, “A survey on position-based routing in mobile ad hoc net-works,” IEEE Networks, pp. 30–39, Nov./Dec. 2001.

    [2] S. Yu, B. Zhang, C. Li, and H. Mouftah, “Routing protocols for wireless sensor networks with mobile sinks: A survey,” IEEE Commun. Mag., vol. 52, no. 7, pp. 150–157, Jul. 2014..

    [3] J.A. Sanchez, P.M. Ruiz, and R. Marin-Perez, “Beacon-Less Geographic Routing Made Practical: Chal-lenges, Design Guidelines, and Protocols,” IEEE Comm. Magazine, vol. 47, no. 8, pp. 85- 91, Aug. 2009.

    [4] S. Rührup, H. Kalosha, A. Nayak, and I. Stojmenović, “Message-efficient beaconless georouting with guaranteed delivery in wireless sensor, ad hoc, and actuator networks,” IEEE/ACM Trans. Netw., vol. 18, no. 1, pp. 95- 108, Feb. 2010.

    [5] M. Heissenbüttel, T. Braun, T. Bernoulli, and M. Wälchli, “BLR: Beacon-less routing algorithm for mo-bile ad-hoc networks,” Computer Communications, vol. 27, no. 11, pp. 1076–1086, Jul. 2004.

    [6] M. Heissenbüttel, T. Braun, A novel position-based and beacon-less routing algorithm for mobile ad-hoc networks, in: Proceedings of ASWN ’03, Bern, Switzerland, July 2003, pp. 197–210.

    [7] B. Karp and H. T. Kung, “GPSR: Greedy perimeter stateless routing for wireless networks,” in Proc. IEEE/ACM Mobicom, Boston, MA, Aug. 2000, pp. 243–254

    [8] J. A. Sanchez, R. Marin-Perez, and P. M. Ruiz, “BOSS: Beacon-Less On-Demand Strategy for Geo-graphic Routing in Wireless Sensor Networks,” Proc. 4th IEEE Int’l. Conf. Mobile Ad Hoc and Sensor Sys., Oct. 2007, pp. 1–10.

    [9] S. Rührup and I. Stojmenović, “Optimizing communication overhead while reducing path length in bea-conless georouting with guaranteed delivery for wireless sensor networks,” IEEE Tran. Comput., vol. 62, no. 12, pp. 2440-2453, Dec. 2013.

    [10] S. Rührup and I. Stojmenović, “Contention-Based Georouting with Guaranteed Delivery, Minimal Communication Overhead, and Shorter Paths in Wireless Sensor Networks,” Proc. 24th Int’l Parallel and Distributed Processing Symp. (IPDPS ’10), Apr. 2010.

    [11] A. Mostefaoui, M. Melkemi, and A. Boukerche, “Localized routing approach to bypass holes in wire-less sensor networks,” IEEE Tran. Comput., vol. 63, no. 12, pp. 3053-3065, Dec. 2014.

    [12] H. Kalosha, A. Nayak, S. Rührup, and I. Stojmenović, “Select-and Protest-Based Beaconless Georout-ing with Guaranteed Delivery in Wireless Sensor Networks,” Proc. IEEE INFOCOM, pp. 346-350, 2008..

    [13] J.-T. Tsai and Y.-H. Han. "Cooperative rotational sweep schemes for geographic routing.", in Proc. IEEE Int. Conf. Commun. (ICC), 2016, Kuala Lumpur, Malaysia, May 2016.

    [14] J.-T. Tsai, ”Transmission rate scheduling and stopping time for time-sensitive multicast stream traffic in cellular networks,” IEEE Trans. Wireless Commun., vol. 13, no. 4, pp. 1754–1765, April 2014.

    [15] I. Stojmenovic, “Position-based routing in ad hoc networks”, IEEE Communications Magazine, pp.128- 134, July 2002.

    [16] M. Zorzi, “A New Contention-Based MAC Protocol for Geographic Forwarding in Ad Hoc and Sen-sor Networks,” Proc. IEEE Int’l Conf. Comm. (ICC), pp. 3481-3485, 2004.

    [17] P. Bose et al., “Routing with Guaranteed Delivery in Ad Hoc Wireless Networks,” Proc. 3rd ACM Int’l. Wksp. Discrete Algorithms and Methods for Mobile Comp. and Commun., 1999, pp. 48–55

    [18] Y. Zhu, X. Tian, J. Zheng, "Performance analysis of the binary exponential backoff algorithm for IEEE 802.11 based mobile ad hoc networks",2011 IEEE Int. Conf. Commun., 2011.

    [19] Z. Jiang, J. Ma, W. Lou, J. Wu, "An information model for geographic greedy forwarding in wireless ad-hoc sensor networks", Proc. IEEE INFOCOM, pp. 825-833, 2008.

    [20] S. De, "On Hop Count and Euclidean Distance in Greedy Forwarding in Wireless Ad Hoc Net-works",IEEE Commun. Lett., vol. 9, no. 11, pp. 1000-1002, Nov. 2005.

    [21] M. Zorzi, R. R. Rao, "Geographic Random Forwarding (GeRaF) for Ad Hoc and Sensor Networks: Multihop Performance",IEEE Trans. Mobile Comp., vol. 2, no. 4, pp. 337-348, Oct.–Dec. 2003.

    [22] W.-J. Liu, K.-T. Feng, "Greedy Routing with Anti-Void Traversal for Wireless Sensor Networks",IEEE Trans. Mobile Computing, vol. 8, no. 7, pp. 910-922, July 2009.

    [23] J.-T. Tsai and Y.-H. Han. "A Cooperative Rotational Sweep Schemes to Bypass Network Holes in Wireless Geographic Routing."

    下載圖示
    QR CODE