13.07.2015 Views

Page 2 Lecture Notes in Computer Science 2865 Edited by G. Goos ...

Page 2 Lecture Notes in Computer Science 2865 Edited by G. Goos ...

Page 2 Lecture Notes in Computer Science 2865 Edited by G. Goos ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

288 L. Hughes, K. Shumon, and Y. ZhangLocationDirection and LocationDeterm<strong>in</strong>ationLocationLocation andDirectionPKT Location PKT Transmission PKT Antenna PKTVerificationArea CreationSelectionFig. 1. CARP data flow diagram.2 CARPAll Cartesian Ad hoc Rout<strong>in</strong>g Protocols attempt to restrict transmission to thosenodes that lie between the source and the dest<strong>in</strong>ation. First, a directional antennais used to create a bound<strong>in</strong>g box with a horizontal beamwidth of 90 ◦ . Next, theprotocol is used to limit the number of forward<strong>in</strong>g nodes <strong>in</strong> the bound<strong>in</strong>g box <strong>by</strong>creat<strong>in</strong>g a transmission area. The source and dest<strong>in</strong>ation nodes are at oppositeends of the transmission area; each node with<strong>in</strong> the transmission area is referredto as an <strong>in</strong>termediate node. Acurrent node is a node that is forward<strong>in</strong>g a packet.Fig. 1 shows the CARP subsystems. When a source node is to transmita packet, it uses the Transmission Area Creation subsystem to determ<strong>in</strong>e thetransmission area. Antenna Selection is then employed to select the antennafac<strong>in</strong>g the dest<strong>in</strong>ation. The Location Verification subsystem of each <strong>in</strong>termediatenode determ<strong>in</strong>es whether the node is with<strong>in</strong> the transmission area; if it is, thesteps used <strong>by</strong> the source node are repeated. This process cont<strong>in</strong>ues until thepacket reaches the dest<strong>in</strong>ation 1 .In addition to its payload, a CARP packet consists of the source address,the dest<strong>in</strong>ation address, and transmission area <strong>in</strong>formation. At a m<strong>in</strong>imum, thetransmission area <strong>in</strong>formation is the address of the current node (x c ,y c ).3 Transmission Area with Limit<strong>in</strong>g AngleIf the transmission area has the same shape as the bound<strong>in</strong>g box, unnecessarytransmissions may occur especially <strong>in</strong> dense network. To reduce the number ofpotential <strong>in</strong>termediate nodes <strong>in</strong> the transmission area, the follow<strong>in</strong>g protocolattempts to restrict the size of the area <strong>by</strong> employ<strong>in</strong>g a limit<strong>in</strong>g angle.The limit<strong>in</strong>g angle, φ, def<strong>in</strong>es the shape of the transmission area betweenthe current node, C, and the dest<strong>in</strong>ation node, D, as shown <strong>in</strong> Fig. 2. Each<strong>in</strong>termediate node forms an angle φ i with the current node and the dest<strong>in</strong>ationnode.1 S<strong>in</strong>ce the dest<strong>in</strong>ation may move dur<strong>in</strong>g a transmission, a circular expected zone iscreated [7]. Unless otherwise <strong>in</strong>dicated, the expected zone and its related calculationsare beyond the scope of this paper.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!