18.02.2014 Views

wireless ad hoc networking

wireless ad hoc networking

wireless ad hoc networking

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Communication Protocols 41<br />

Destination<br />

(X D ,Y D )<br />

Flooding<br />

region<br />

Source<br />

(X S , Y S )<br />

Figure 2.8<br />

Sector shape of the flooding region in DREAM.<br />

methods to determine a route: greedy forwarding when it is possible;<br />

and perimeter forwarding (also referred to face routing) when<br />

greedy forwarding fails. In GPSR, packets carry the source and<br />

destination locations. In the normal greedy mode, the forwarder<br />

selects the neighbor which is geometrically closest to the destination<br />

as the next hop. Accordingly, the destination is greedily approached<br />

hop by hop until it is reached. It is possible for an intermediate node<br />

to encounter voids where all its direct neighbors are farther from the<br />

destination than itself. Then the packet is transferred to the perimeter<br />

mode to route beyond the void. GPSR applies the right-hand<br />

rule to traverse a void (as shown in Figure 2.9). A perimeter-mode<br />

packet is marked with the location of the node from which the<br />

packet enters the perimeter mode. It can go further than the current<br />

forwarding node to traverse the perimeter of a void. The right-hand<br />

rule is followed until the packet arrives at a node that is closer<br />

to the destination than the node that makes the packet enter the<br />

perimeter mode. Perimeter forwarding is also referred to as face<br />

routing.<br />

Geographical and Energy Aware Routing (GEAR) 40 is motivated to<br />

solve the problem of void in geography-based routing, inspired by<br />

the tr<strong>ad</strong>itional distance-vector algorithms. The basic idea is that, for<br />

each transmitted packet, the forwarder will build a learned cost H<br />

as the estimated transmission cost to the destination. The learned<br />

cost H has an initial value and is <strong>ad</strong>justed <strong>ad</strong>aptively in communications.<br />

Finally it reaches the optimal value which can reflect the<br />

real cost of transmissions to a particular destination. The detailed<br />

protocol is as follows. Given the destination location, the H of a

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!