研究生: |
陳品安 Chen, Pin-An |
---|---|
論文名稱: |
無線隨意網路上以迴歸補救方式運行的無信標繞徑 Beaconless routing with regressive recovery in wireless Ad Hoc Networks |
指導教授: |
蔡榮宗
Tsai, Jung-Tsung |
學位類別: |
碩士 Master |
系所名稱: |
資訊工程學系 Department of Computer Science and Information Engineering |
論文出版年: | 2019 |
畢業學年度: | 107 |
語文別: | 中文 |
論文頁數: | 48 |
中文關鍵詞: | 無信標地理路由協定 、無線隨意網路 、單位圓假設 、協調式旋轉掃描 、封包到達率 |
英文關鍵詞: | Beaconless routing, wireless Ad Hoc network, unit disk assumption, cooperation rotational sweep, packet arrival ratio |
DOI URL: | http://doi.org/10.6345/NTNU201900756 |
論文種類: | 學術論文 |
相關次數: | 點閱:95 下載:9 |
分享至: |
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報 |
在無線隨意網路中,Beaconless geographic routing(BLR)能讓節點不必知道他們鄰居點座標位置下執行greedy forwarding,節點依靠RTS/CTS機制讓鄰居點從RTS封包有足夠的資訊執行MAC contention,最先回應CTS封包的鄰居點視為下個中繼點。如果當節點已無法從鄰居點得到回應時,表示當下封包所在節點離目的節點是最近的,greedy forwarding失敗後換成補救方法rotation sweep algorithm,鄰居點依幾何圖形(如Reuleaux triangle)運作機制決定MAC conten-tion競爭回傳時間,確保封包正確的繞徑路線和減少所傳的節點數。著名的BLR研究成果都假設在節點具有相同的傳輸範圍,這在真實網路中是不可能成立的,以致於先前可信任的方法難以實際應用。
在真實網路中,節點間連接是不完美的,我們修改greedy forwarding流程,在MAC conten-tion的設計納入距離和角度因素,在補救方法方面,主要將cooperation rotational sweep 網路第三層繞徑方式調整到MAC和Routing的跨層運作方式,目的是利用cooperation rotational sweep犧牲封包標頭的空間來記錄歷史節點的位置資訊,讓各個鄰居點能利用歷史節點來解決傳送過程中存在的隱藏節點問題。
將所提出的方法模擬實驗結果呈現封包抵達率、路徑延展和CTS封包碰撞次數都會隨著封包標頭所記錄的歷史節點個數成正向成長。
Beaconless geographic routing(BLR) allows nodes to perform greedy forwarding without the knowledge of the neighborhood in wireless Ad Hoc network. The node relies on the RTS/CTS mechanism to offer neigh-bors enough information from the RTS packet to implement MAC contention. The neighbor node that first successfully responds with a CTS packet is chosen as the next relay. If the node doesn’t get a CTS response from neighbors, it is implicitly located locally closest to the destination node. Rotation sweep algorithm is then applied after the greedy forwarding fails. Neighbors rely on a sweep of curve with some geometry (such as Reuleaux triangle) to decide the response time of sending a CTS response in MAC contention. Recovery approach adjusts the routing path of sending a packet so as to improve routing success rate. The well-known BLR research assumes that all node have the same transmission range. The assumption is not true in reality, and therefore their methods are difficult to apply practically.
In this work, the range of connection between nodes is not fixed. We modify the greedy forwarding pro-cess to include the variables of distance and angle into the design of MAC contention latency. For recovery mode operation, we adopt the technique of cooperative rotational sweep scheme for use in the cross-layer operation involving MAC contention and routing decision here. This is essentially at the cost of packet head-er overhead to record the positions of historical visited nodes, so that each neighbor can solve the hidden node problem existing in a network topology.
Simulation results show that the packet arrival ratio, path sketch and CTS packet collisions increase with the number of historical nodes memorized in packet header.
[1] M. Mauve, J. Widmer, and H. Hartenstein, “A survey on position-based routing in mobile ad hoc net-works,” IEEE Networks, pp. 30–39, Nov./Dec. 2001.
[2] S. Yu, B. Zhang, C. Li, and H. Mouftah, “Routing protocols for wireless sensor networks with mobile sinks: A survey,” IEEE Commun. Mag., vol. 52, no. 7, pp. 150–157, Jul. 2014..
[3] J.A. Sanchez, P.M. Ruiz, and R. Marin-Perez, “Beacon-Less Geographic Routing Made Practical: Chal-lenges, Design Guidelines, and Protocols,” IEEE Comm. Magazine, vol. 47, no. 8, pp. 85- 91, Aug. 2009.
[4] S. Rührup, H. Kalosha, A. Nayak, and I. Stojmenović, “Message-efficient beaconless georouting with guaranteed delivery in wireless sensor, ad hoc, and actuator networks,” IEEE/ACM Trans. Netw., vol. 18, no. 1, pp. 95- 108, Feb. 2010.
[5] M. Heissenbüttel, T. Braun, T. Bernoulli, and M. Wälchli, “BLR: Beacon-less routing algorithm for mo-bile ad-hoc networks,” Computer Communications, vol. 27, no. 11, pp. 1076–1086, Jul. 2004.
[6] M. Heissenbüttel, T. Braun, A novel position-based and beacon-less routing algorithm for mobile ad-hoc networks, in: Proceedings of ASWN ’03, Bern, Switzerland, July 2003, pp. 197–210.
[7] B. Karp and H. T. Kung, “GPSR: Greedy perimeter stateless routing for wireless networks,” in Proc. IEEE/ACM Mobicom, Boston, MA, Aug. 2000, pp. 243–254
[8] J. A. Sanchez, R. Marin-Perez, and P. M. Ruiz, “BOSS: Beacon-Less On-Demand Strategy for Geo-graphic Routing in Wireless Sensor Networks,” Proc. 4th IEEE Int’l. Conf. Mobile Ad Hoc and Sensor Sys., Oct. 2007, pp. 1–10.
[9] S. Rührup and I. Stojmenović, “Optimizing communication overhead while reducing path length in bea-conless georouting with guaranteed delivery for wireless sensor networks,” IEEE Tran. Comput., vol. 62, no. 12, pp. 2440-2453, Dec. 2013.
[10] S. Rührup and I. Stojmenović, “Contention-Based Georouting with Guaranteed Delivery, Minimal Communication Overhead, and Shorter Paths in Wireless Sensor Networks,” Proc. 24th Int’l Parallel and Distributed Processing Symp. (IPDPS ’10), Apr. 2010.
[11] A. Mostefaoui, M. Melkemi, and A. Boukerche, “Localized routing approach to bypass holes in wire-less sensor networks,” IEEE Tran. Comput., vol. 63, no. 12, pp. 3053-3065, Dec. 2014.
[12] H. Kalosha, A. Nayak, S. Rührup, and I. Stojmenović, “Select-and Protest-Based Beaconless Georout-ing with Guaranteed Delivery in Wireless Sensor Networks,” Proc. IEEE INFOCOM, pp. 346-350, 2008..
[13] J.-T. Tsai and Y.-H. Han. "Cooperative rotational sweep schemes for geographic routing.", in Proc. IEEE Int. Conf. Commun. (ICC), 2016, Kuala Lumpur, Malaysia, May 2016.
[14] J.-T. Tsai, ”Transmission rate scheduling and stopping time for time-sensitive multicast stream traffic in cellular networks,” IEEE Trans. Wireless Commun., vol. 13, no. 4, pp. 1754–1765, April 2014.
[15] I. Stojmenovic, “Position-based routing in ad hoc networks”, IEEE Communications Magazine, pp.128- 134, July 2002.
[16] M. Zorzi, “A New Contention-Based MAC Protocol for Geographic Forwarding in Ad Hoc and Sen-sor Networks,” Proc. IEEE Int’l Conf. Comm. (ICC), pp. 3481-3485, 2004.
[17] P. Bose et al., “Routing with Guaranteed Delivery in Ad Hoc Wireless Networks,” Proc. 3rd ACM Int’l. Wksp. Discrete Algorithms and Methods for Mobile Comp. and Commun., 1999, pp. 48–55
[18] Y. Zhu, X. Tian, J. Zheng, "Performance analysis of the binary exponential backoff algorithm for IEEE 802.11 based mobile ad hoc networks",2011 IEEE Int. Conf. Commun., 2011.
[19] Z. Jiang, J. Ma, W. Lou, J. Wu, "An information model for geographic greedy forwarding in wireless ad-hoc sensor networks", Proc. IEEE INFOCOM, pp. 825-833, 2008.
[20] S. De, "On Hop Count and Euclidean Distance in Greedy Forwarding in Wireless Ad Hoc Net-works",IEEE Commun. Lett., vol. 9, no. 11, pp. 1000-1002, Nov. 2005.
[21] M. Zorzi, R. R. Rao, "Geographic Random Forwarding (GeRaF) for Ad Hoc and Sensor Networks: Multihop Performance",IEEE Trans. Mobile Comp., vol. 2, no. 4, pp. 337-348, Oct.–Dec. 2003.
[22] W.-J. Liu, K.-T. Feng, "Greedy Routing with Anti-Void Traversal for Wireless Sensor Networks",IEEE Trans. Mobile Computing, vol. 8, no. 7, pp. 910-922, July 2009.
[23] J.-T. Tsai and Y.-H. Han. "A Cooperative Rotational Sweep Schemes to Bypass Network Holes in Wireless Geographic Routing."