23.03.2017 Views

wilamowski-b-m-irwin-j-d-industrial-communication-systems-2011

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

7-6 Industrial Communication Systems<br />

in this category comprise core extraction distributed ad hoc routing (CEDAR) protocol [SSB99] and<br />

zone-based hierarchical link state (ZHLS) routing protocol.<br />

7.2.2.2 Flat and Hierarchical Routing Protocols<br />

Hierarchical routing protocols arrange nodes in the form of clusters or trees where every cluster has a cluster<br />

head. Cluster heads may also aggregate data from cluster nodes to reduce the number of packet transmissions<br />

and hence conserve energy [CPF05] or may provide gateway to external networks. Advantages<br />

of hierarchical routing protocols include scalability and efficient <strong>communication</strong> [AK04]. AODV, DSDV,<br />

and DSR are examples of flat routing protocols, while CGSR is an example of hierarchical routing scheme.<br />

7.2.2.3 Position- and Nonposition-Based Routing Protocols<br />

It is experimentally verified that reactive and proactive routing protocols, including AODV, DSDV, and DSR<br />

that do not use location information in routing decisions, face scalability issues as opposed to location-based<br />

routing strategies [S02]. Location-based routing depends upon the physical position of the nodes in the network<br />

to take routing decisions [MWH01]. To get location/position information, the node may use a lowpower<br />

global positioning system (GPS) if the nodes are outdoor or may rely on relative positioning techniques<br />

based on the signal strength or manual registration process. Several position-based routing schemes [SL01]<br />

have already been presented by the research community. Position-based routing algorithms are classified into<br />

greedy and restricted directional flooding. In greedy approaches, the distance toward the sink node is either<br />

maximized or minimized depending upon forwarding strategy, while in directional flooding, the data are<br />

always flooded toward the nodes which are in the direction of the destination node. Greedy perimeter stateless<br />

routing (GPSR) [KK00] and geographic distance routing (GEDIR) [SL01] are examples of position-based<br />

routing protocols working on the principle of greedy forwarding approach.<br />

7.2.3 MAC Layer<br />

MAC schemes are used to define policy for accessing the shared medium in ad hoc networks. Limited<br />

spectrum, multiple access, node mobility, error-prone environment, and characteristics of wireless<br />

medium like noise, fading, and interference compel to design MAC schemes customized for wireless<br />

environments. The MAC schemes for ad hoc networks can be classified into contention-free and contention-based<br />

protocols. Contention-free protocols work better in infrastructure-driven networks with<br />

a master node controlling the medium access. Contention-based protocols work in a decentralized fashion<br />

and can be divided into random access and controlled access (scheduling- and reservation-based)<br />

protocols. The performance of such protocols is deteriorated by hidden and exposed terminal problems<br />

and requires special attention.<br />

Let us assume that node-1 is sending data to node-2, as shown in Figure 7.3. Furthermore, assume<br />

that node-3 is also about to send data to node-2. As node-3 is out of the transmission range of node-1,<br />

Range of 1 Range of 2 Range of 3<br />

1 2 3 4<br />

FIGURE 7.3<br />

Hidden and exposed terminal problem.<br />

© <strong>2011</strong> by Taylor and Francis Group, LLC

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!