Geographic routing

Geographic routing (also called georouting[1] or position-based routing) is a routing principle that relies on geographic position information. It is mainly proposed for wireless networks and based on the idea that the source sends a message to the geographic location of the destination instead of using the network address. In the area of packet radio networks, the idea of using position information for routing was first proposed in the 1980s[2] for interconnection networks.[3] Geographic routing requires that each node can determine its own location and that the source is aware of the location of the destination. With this information, a message can be routed to the destination without knowledge of the network topology or a prior route discovery.

Approaches

There are various approaches, such as single-path, multi-path and flooding-based strategies (see[4] for a survey). Most single-path strategies rely on two techniques: greedy forwarding and face routing. Greedy forwarding tries to bring the message closer to the destination in each step using only local information. Thus, each node forwards the message to the neighbor that is most suitable from a local point of view. The most suitable neighbor can be the one who minimizes the distance to the destination in each step (Greedy). Alternatively, one can consider another notion of progress, namely the projected distance on the source-destination-line (MFR, NFP), or the minimum angle between neighbor and destination (Compass Routing). Not all of these strategies are loop-free, i.e. a message can circulate among nodes in a certain constellation. It is known that the basic greedy strategy and MFR are loop free, while NFP and Compass Routing are not.[5]

Greedy forwarding variants: The source node (S) has different choices to find a relay node for further forwarding a message to the destination (D). A = Nearest with Forwarding Progress (NFP), B = Most Forwarding progress within Radius (MFR), C = Compass Routing, E = Greedy
Face routing: A message is routed along the interior of the faces of the communication graph, with face changes at the edges crossing the S-D-line (red). The final routing path is shown in blue.

Greedy forwarding can lead into a dead end, where there is no neighbor closer to the destination. Then, face routing helps to recover from that situation and find a path to another node, where greedy forwarding can be resumed. A recovery strategy such as face routing is necessary to assure that a message can be delivered to the destination. The combination of greedy forwarding and face routing was first proposed in 1999 under the name GFG (Greedy-Face-Greedy).[6] It guarantees delivery in the so-called unit disk graph network model. Various variants, which were proposed later [7] , also for non-unit disk graphs, are based on the principles of GFG .[1]

Face routing depends on a planar subgraph in general; however distributed planarization is difficult for real wireless sensor networks and does not scale well to 3D environments. [8]

Greedy embedding

Although originally developed as a routing scheme that uses the physical positions of each node, geographic routing algorithms have also been applied to networks in which each node is associated with a point in a virtual space, unrelated to its physical position. The process of finding a set of virtual positions for the nodes of a network such that geographic routing using these positions is guaranteed to succeed is called greedy embedding.[9]

gollark: Brute-force all possible combinations of vowels.
gollark: Guess randomly based on your school name?
gollark: It doesn't HAVE to be saved anywhere.
gollark: Personally, at least, I don't really care about consistency, and the individual UIs I use look/function nicely.
gollark: The great thing about self-hosting is that I get to break everything *myself*.

See also

  • List of ad-hoc routing protocols
  • Backpressure Routing

References

  1. Ruehrup, Stefan (2009). Liu; Chu; Leung (eds.). Theory and Practice of Geographic Routing (PDF). Ad Hoc and Sensor Wireless Networks: Architectures, Algorithms and Protocols. Bentham Science.
  2. Takagi, H.; Kleinrock, L. (March 1984). "Optimal transmission ranges for randomly distributed packet radio terminals". IEEE Transactions on Communications. 32 (3): 246–257. CiteSeerX 10.1.1.64.9747. doi:10.1109/TCOM.1984.1096061.
  3. Finn, Gregory G. (March 1987). "Routing and Addressing Problems in Large Metropolitan-Scale Internetworks" (PDF). University of Southern California, ISI/RR-87-180. Cite journal requires |journal= (help)
  4. Stojmenovic, Ivan (2002). "Position based routing in ad hoc networks". IEEE Communications Magazine. 40 (7): 128–134. CiteSeerX 10.1.1.6.6012. doi:10.1109/MCOM.2002.1018018.
  5. Stojmenovic, Ivan; Lin, Xu (2001). "Loop-free hybrid single-path/flooding routing algorithms with guaranteed delivery for wireless networks". IEEE Transactions on Parallel and Distributed Systems. 12 (10): 1023–1032. CiteSeerX 10.1.1.67.7527. doi:10.1109/71.963415.
  6. Bose, P.; Morin, P.; Stojmenovic, I.; Urrutia, J. (1999). "Routing with guaranteed delivery in ad hoc wireless networks". Proc. of the 3rd international workshop on discrete algorithms and methods for mobile computing and communications (DIALM '99). pp. 48–55. doi:10.1145/313239.313282.
  7. Djenouri, Djamel; Balasingham, Ilangko (2011). "Traffic-Differentiation-Based Modular QoS Localized Routing for Wireless Sensor Networks". IEEE Transactions on Mobile Computing. 10 (6): 797–809. doi:10.1109/TMC.2010.212.
  8. Kim, Y; Ramesh Govindan; Karp, Brad.; Scott Shenker (2005). "On the Pitfalls of Geographic Face Routing". Proceedings of the 2005 Joint Workshop on Foundations of Mobile Computing. pp. 34–43. doi:10.1145/1080810.1080818.
  9. Rao, Ananth; Ratnasamy, Sylvia; Papadimitriou, Christos H.; Shenker, Scott; Stoica, Ion (2003), "Geographic routing without location information", Proc. 9th ACM Mobile Computing and Networking (MobiCom), pp. 96–108.
This article is issued from Wikipedia. The text is licensed under Creative Commons - Attribution - Sharealike. Additional terms may apply for the media files.