scispace - formally typeset
Search or ask a question
Proceedings ArticleDOI

GeoCast—geographic addressing and routing

26 Sep 1997-pp 66-76
TL;DR: This paper proposes and evaluates a Touting and addressing method to integrate geographic coordinates into the Internet Protocol to enable the creation of location dependent services.
About: This article is published in ACM/IEEE International Conference on Mobile Computing and Networking.The article was published on 1997-09-26 and is currently open access. It has received 371 citations till now. The article focuses on the topics: Geocast & Routing (electronic design automation).

Summary (4 min read)

1 Introduction

  • Below, the authors list some of the possible new services and functionalities: l Geographic messaging: sending a message selectively only to specific subareas defined by latitude and longitude.
  • Under the DARPA experiment, the authors have implemented a prototype of the geographic routing system described in [5] and are in the process of evaluating it.
  • Section 2 talks about some background and related work.
  • Section 3 discusses the addressing model used for geographic routing.

4 Routing Geographically

  • In their Internet Engineering Task Force (IETF) Request For Comments (RFC) [5] , the authors detailed three methods for achieving geographically-routed messages: a geographically-aware router solution, a multicast solution, and a Domain Name Service (DNS) solution.
  • The geographically-aware router solution uses the polygonal geographic destination information in the geographic message header directly for routing.
  • Geographic routing is implemented in the Application layer in a manner similar to the way multicast routing was first implemented.
  • These routers would use IP tunnels to transport data packets through areas which do not support geographic routing.

4.1.1 GeoRouter

  • The current prototype GeoRouter has the following capabilities: 1. Basic multi-hop geographic routing.
  • Automatic detection of multiple network interfaces, type of network interface (whether wired or wireless), other GeoRouters, and base station GeoNode programs.
  • Ability to tunnel through areas that do not (yet) provide geographic routing.
  • See section 4.2 for an overview of the geographic routing algorithm.

4.1.2 GeoNode

  • Each subnet and each wireless cell will have at most one GeoNode.
  • Message lifetimes are necessary because the receivers of geographic messages may be mobile and may possibly arrive at the message destination just after the geographic message first arrives.
  • Since, most likely, there will be several geographic messages residing in a GeoNode at one time, the multicasting of the various messages will be scheduled.
  • The scheduling algorithm will take into account the size of the message, the priority of the message, and the speed of the subnet's transport medium.
  • Clients wishing to receive geographic messages would then tune in to the appropriate multicast group to receive them.

4.1.3 GeoHost

  • This daemon is located on all computer hosts which are capable of receiving and sending geographic messages.
  • Its role is to notify all client processes about the availability of geographic messages, the host computer's current geographic location, and the address of the local GeoNode.

4.2.1 Sending Geographic Messages

  • In order to send a geographic message, the programmer would use the Geographic Library routine SendToGeo.
  • The function will, first, contact the local GeoHost Daemon and query it for the IP address of the local GeoNode.
  • It will then send the message directly to the GeoNode, which, in turn, will simply forward the message to the local GeoRouter.

Figure 2: Geometric Routing Example

  • To do this, the router determines if the destination polygon and the router's service area polygon intersect' [S] each other.
  • First, if the polygons only partially intersect, then the router only services part of the target area.
  • Those that do will be sent the geographic message.
  • The College Ave. router, in turn, forwards the message to the two GeoNodes which control the target area.
  • The router keeps a cache of the latest geographic message packets and their destinations.

4.2.3 Receiving Geographic Messages

  • Once a geographic message has been sent to a GeoNode from a geographic router, the receive pr* cess can begin.
  • Periodically, the GeoNode will multicast the list of available messages on a well-known group address.
  • Also, the GeoNode will periodically multicast the message on its assigned multicast group.
  • The GeoHost daemons will receive the list of available messages from the GeoNode and determine if the host computer is located inside any of the messages' destination polygons.
  • When a client process executes a RecvFrom-Geo call from the Geographic Library, the function will join the appropriate multicast address and receive the geographic message itself.

Individual

  • Cache items are really a three-tuple <message id, list of next hops, time-stamp>.
  • The message id, which is copied from the geographic message packet header, is used as the key into the hash table.
  • It would be better (though more complicated and computationally expensive) to use the actual destination polygon itself as the key into the cache because this would allow the cache to be used to full advantage.
  • How to do this, though, is not obvious and future experiments will deal with this matter.
  • Finally, the time-stamp indicates the age of the cache item.

5.2.2 Calculating a Router's Service Area

  • A router's service area is, theoretically, the union of the service areas of its child nodes.
  • Such a union may produce a polygon which has internal "holes" and which may have sections which are concave.
  • Many algorithms which perform polygon intersection, however, require simple polygons which are convex.
  • Therefore, instead of calculating the union of the child node areas, the convex hdl W~IS calculated instead.
  • For circles, geometry was used to find ten equidistant points on the circle's perimeter.

5.2.3 List of Child and Parent Nodes

  • The Routing Table has separate lists of child nodes and parent nodes.
  • The main reason for this division is the different treatment accorded to each.
  • Both lists are maintained as unsorted doubly-lied lists.
  • Each element on the list of child nodes contains all of the information about the child node and this router's connection to it.
  • Each element of the parent lit only needs to know the status of the corresponding node and how to get information to it.

5.3 How Intersection is Performed

  • When the authors want to discover if a router services the destination area for a geographic message, they have to perform a polygon intersection test between the message's destination polygon and the router's service area polygon.
  • If the test is positive, the router would then need to perform the same test with each child node's service area.
  • Given a large number of child nodes, calculating polygon intersection for each child node would be computationally burdensome and may degrade the router's efficiency.
  • First, the bounding rectangles are compared to see if they intersect each other.
  • If the test does succeed, however, then the underlying polygons are tested for intersection.

6 Experimental Results

  • The purpose of these experiments is to evaluate the efficacy of the geographic routing system.
  • In order to do this, a prototype system was created using C++ which runs on either Linux 2.0 (Slackware 3.1) or Sun's Solaris 2.5.
  • When running the experiments, the hardware and software setup shown in Figure 5 was used.
  • Correspondingly, the GeoNode for the subnet, Ethernet #2, and the GeoHost software for host C both executed on host C. The GeoNode for Ethernet #2 believes that its service area is a circular region centered at the coordinates (-70.00 degrees longitude, 60.00 degrees latitude) with a radius of one degree.
  • The router would record the time of the arrival of the first packet and the departure of the hundredth packet.

6.1 Comparison of the Routing Time for Differing Destination Shape rypes

  • A hundred separate messages of each type were sent to the area centered at (-60 longitude, 60 latitude) with the circle having a radius of .5 degrees and the polygon having three vertices equidistant from each other and each being .5 degrees from the center.
  • The routing times for each shape type were averaged together.
  • The table shows that routing to a circle destina- tion is nine times more expensive than routing to a point.

6.3 Comparison of the Effect on Routing Time of Changing the Number of Vertices in the Destination and the Routing Table Node Polygons

  • During the ilrst experiment, the message with a polygonal destination used a polygon with just three vertices.
  • Now the authors will discover what is the affect of using polygons with increasing numbers of vertices.
  • Also, when increasing the number of ver- tices, the authors attempted to determine if there is a difference in effect between changing the geographic message's destination polygons or changing the routing table entry polygons which represent the GeoNode service areas.

6.4 Test of the Effect of Increasing Routing Table Size on the Time to Route

  • The purpose of this experiment is to determine what effect does increasing routing table size have on the time to route a geographic packet.
  • Furthermore, the authors want to compare the different effects that a large routing table has on packets bound for small geographic regions, which would intersect with a small number of routing table entries, and packets bound for large regions.
  • For reasons which are explained below, each new routing table entry's service area polygon is constructed as a copy of either GeoNode #l's polygon or GeoNode #2's polygon.
  • Each new message will intersect with one more routing table entry than the previous message.
  • The resulting routing times arc shown in Figure 8 as the data points named "multicell-intersection-Lout.".

Work -Geo-Multicasting

  • Whiie geocasting is an important service, it is more likely that the authors will multicast rather than broadcast into the geographical areas.
  • The authors will be interested in reaching all motorists on a specific highway, or all police cars, rather than reaching everybody.
  • This will be accomplished by geographically directed multicast.
  • The hierarchy of GeoRouters can be used also to maintain information about multicast group memberships.
  • Other solutions are also possible, based on a concept of area codes analogous to the ones used in telephony today.

Conclusions .

  • The geographic messaging project introduces location as a 'Yirst class citizen" both in message addressing and routing.
  • First of all, the router's cache significantly reduces the routing time for all but the first packet.
  • The cost of routing messages with polygons that intersect a large number of routing table entries greatly outweighs the cost of routing messages with small polygons which intersect only a small number of routing table entries.
  • The cost of the former is 250 microseconds per vertex.

Did you find this useful? Give us your feedback

Content maybe subject to copyright    Report

GeoCast - Geographic Addressing and Routing *
Julio C. Navas and Tomasz Imielinski
{navas,imielins}@cs.rutgers.edu
Computer Science Department
Rutgers, The State University
Piscataway, NJ 08855
Abstract
In the near future GPS will be widely used, thus al-
lowing a broad variety of location dependent services
such as direction giving, navigation, etc. In this pa-
per we propose and evaluate a Touting and address-
ing method to integrate geographic coordinates into
the Internet Protocol to enable the creation of lo-
cation dependent services. The main challenge is
to integrate the concept of physical location into the
current design of the Internet which relies on logical
addressing.
1 Introduction
In the near future Global Positioning System (GPS)
cards will be deployed in each car and possibly in
every user terminal. User’s location will become in-
formation that is as common as the date is today;
getting input from GPS, when outdoors, and other
location providing devices, when indoors. Availabil-
ity of location information will have a broad impact
on the application level as well as on network level
software.
Below, we list some of the possible new services
and functionalities:
l Geographic messaging: sending a message se-
lectively only to specific subareas defined by
latitude and longitude. For example, sending
*This research work was supported in psrt by DARPA
under contract numbcrDAAH04-95-l-0596, NSF grant num-
bers CCR 95-09620, IRE 95-09816 and Sponsors of X’IN-
LAB.
Permission to make dk$aUhard copies of all or part of this material for
personal or classroom use is granted without fee provided that the copies
are not made or distributed for profit or comme&al advantage, the &py-
right notice, the title ofthe publication and its date amear. and notice is
g&n that copyright is by &mission of the ACM, Ik. To- copy otherwise,
to republish, to post on servers or to redistribute to lists, requires specific
permission and/or fee
MOBICOM 97 Budapest Hungary
Copyright 1997 ACM 0-89791-988~2/97/9..$3.50
an emergency message to everyone who is cur-
rently in a specific area, such as a building,
train station, or a highway.
l Geographic Advertising and Geographic Ser-
vices: Advertising and providing a given ser-
vice only to clients who are within a certain
geographic range from the server (which may
be mobileitself); such as everyone within a mile
from the server.
l “Who is around” service: finding out who is
currently present in a specific geographic area
defined by an arbitrary polygon.
To support such applications, location should be-
come a first class citizen, starting from the IP level
and proceeding all the way to the application layer.
Routing protocols for geographic messages need to
be developed. Furthermore, the geographic desti-
nation for a message should not be confined to a
single point, but should be able to be specified as
any arbitrary polygon.
The Geographic Messaging Project researched
possible system designs for accomplishing geo-
graphic messaging. Three designs were looked at:
a Domain Name System approach, a multicast ap
preach, and a geographic routing approach. The de-
tails of these approaches are specified in RFC 2009
PI-
This is a DARPA sponsored Integrated Technol-
ogy Demonstration (ITD) which is being led by
Rutgers DataMan Lab within the GloMo (Global
Mobile) program. Under the DARPA experiment,
we have implemented a prototype of the geographic
routing system described in [5] and are in the pro-
cess of evaluating it. The immediate plans call for
the deployment of an experimental national net-
work capable of routing geographic messages with
nodes at Rutgers DataMan Lab, CECOM in Fort
Monmouth (U.S. Army), University of California
at Santa Cruz, and Bolt, Beranek, and Neumann
66

-- -:
_ I-
L-.---.
I
(BBN). The geographic routing system implemen-
tation will soon be made available to the DARPA
GLOMO participants.
The main objective of this paper is to report the
efficacy of the geographic routing approach. Section
2 talks about some background and related work.
Section 3 discusses the addressing model used for
geographic routing. Section 4 gives an overview of
the geographic routing system. Section 5 discusses
some implementationissues of the router itself. Sec-
tion 6 describes the experiments conducted and an-
alyzes the results. Section 7 talks about one future
research direction for geographic routing. Finally,
Section 8 draws some conclusions.
2 Background and Related
Work
Linking an IP Address with a geographical location
has been of interest for quite some time already.
The recent redesign of the Internet Protocol (IP) [2]
and the advent of the Global Positioning System [9]
gave a new stimulus for this work.
The first attempt to design a system that actually
routes packets according to their geographic desti-
nation and the work that is closest to ours is Carte-
sian Routing by Gregory G. Finn [4].
In the proposed redesign of the IP protocol
[2], IP Address Type Space was specifically allo-
cated for geographic addresses [3] [7]. These pro-
posed IPv6 geographical addresses are an abstract
geographically-nested hierarchy with no relation or
connection to any underlying coordinate system.
In [3] and [7] the sender of a “geographic mes-
sage” would be unicasting messages only to such
hosts which have geographic addresses. The meth-
ods in this paper attempt to provide the more gen-
eral ability of sending a message to all recipients
within a geographical area, regardless of whether
the hosts have geographical addresses or not.
Xerox’s PARC lab pioneered early work on loca-
tion dependent services [S].
3 Addressing Model
Two-dimensional GPS positioning offers latitude
and longitude information as a two dimensional vec-
tor, < latitude, longitude >, where longitude ranges
from -180 (west) to 180 (east), and latitude ranges
from -90 (south) to 90 (north).
Thus < 40.48640, -74.44513 > is an exam-
ple of the GPS coordinates for the town of New
67
Brunswick, New Jersey, U.S.A.
Assuming the use of single precision floating-
point numbers, four bytes of addressing space are
necessary to store latitude and four bytes are also
sufllcient to store longitude. Thus a total of eight
bytes are necessary to address the whole surface of
earth with precision down to 0.1 mile!
In the future, once we have more experience using
GPS receivers and are able to determine the optimal
number of significant digits necessary for geographic
routing, we will most likely switch to fixed-point
integers because of their greater efficiency.
3.1 Using a Geographic Destination
Address
A geographic destination address would be repre-
sented by some closed polygon such as:
0 point
l circle( center point, radius )
0 polygon( point(l), paint(2), . . . , point(n-1),
point(n), point(l))
where each vertex of the polygon is represented
using geographic coordinates. This notation would
be used to send a message to anyone within the
specified geographical area defined by the closed
polygon.
For example, if we were to send a message to city
hall in Fresno, California, we could send it by speci-
fying the geographic limits of the city hall as a series
of connected lines that form a closed polygon sur-
rounding it. Therefore the address of the city hall
in Fresno could look lie: polygon([36.80,-119.801,
[36,85,-119.761, . . . ).
4 Routing Geographically
In our Internet Engineering Task Force (IETF) Re-
quest For Comments (RFC) [5], we detailed three
methods for achieving geographically-routed mes-
sages: a geographically-aware router solution, a
multicast solution, and a Domain Name Service
(DNS) solution. At this point in time, we decided
to implement and evaluate the geographically-aware
router solution and not the multicast solution be-
cause of the multiplicity of proposed multicast pro-
tocols. It is not clear which multicast proposal will
become dominant in the future. Furthermore, it
is not clear whether the future dominant multicast
protocol would be able to handle peculiarities of mo-
bile computing such as mobile routers. As such, the
- ~- ---.-
/.

geographically-aware router solution best lent itself
to future research endeavors in geographic routing
because we would have full control of the routers
themselves.
The geographically-aware router solution uses the
polygonal geographic destination information in the
geographic message header directly for routing. Ge-
ographic routing is implemented in the Applica-
tion layer in a manner similar to the way multi-
cast routing was first implemented. That is, a vir-
tual network which uses geographic addresses for
routing will be overlayed onto the current IP inter-
network. We would accomplish this by implement-
ing our own routers which are geographically-aware.
These routers would use IP tunnels to transport
data packets through areas which do not support
geographic routing.
4.1
The Components of the Geo-
graphic Routing Method
GeoRouter
client pmccsx
Figure 1: All of the Components of the Geographic
Routing System
The system is composed of three main com-
ponents: the GeoHosts, GeoNodes, and the
GeoRouters. See figure 1.
4.1.1
GeoRouter
Geographic Routers (GeoRouter) are in charge of
moving a geographic message from a sender to a
receiver. The current prototype GeoRouter has the
following capabilities:
1. Basic multi-hop geographic routing.
2. Automatic detection of multiple network inter-
faces, type of network interface (whether wired
or wireless), other GeoRouters, and base sta-
tion GeoNode programs.
3. Automatic configuration of routing tables
based on detected information. Assumes a flat
network.
4. Manually configurable to do hierarchical net-
work routing.
5. Ability to tunnel through areas that do not
(yet) provide geographic routing.
See section 4.2 for an overview of the geographic
routing algorithm.
4.1.2 GeoNode
A GeoNode is an entry/exit point for the routing
system. The main function of the GeoNode is to
store incoming geographic messages for the dura-
tion of their lifetime and to periodically multicast
them on all of the subnets or wireless cells to which
it is attached. Each subnet and each wireless cell
will have at most one GeoNode. The lifetime of a
geographic message is specified by the sender of the
message. Message lifetimes are necessary because
the receivers of geographic messages may be mobile
and may possibly arrive at the message destination
just after the geographic message first arrives.
Since, most likely, there will be several geographic
messages residing in a GeoNode at one time, the
multicasting of the various messages will be sched-
uled. The scheduling algorithm will take into ac-
count the size of the message, the priority of the
message, and the speed of the subnet’s transport
medium. Clients wishing to receive geographic mes-
sages would then tune in to the appropriate multi-
cast group to receive them.
4.1.3 GeoHost
This daemon is located on all computer hosts which
are capable of receiving and sending geographic
messages.
Its role is to notify all client processes
about the availability of geographic messages, the
host computer’s current geographic location, and
the address of the local GeoNode.
4.2 Routing Overview
Sending a geographic message involves three steps:
sending the message, shuttling the message between
routers, and receiving the message.
68

4.2.1
Sending Geographic Messages
In order to send a geographic message, the pro-
grammer would use the Geographic Library rou-
tine SendToGeo(). The function will, first, con-
tact the local GeoHost Daemon and query it for
the IP address of the local GeoNode. It will then
send the message directly to the GeoNode, which,
in turn, will simply forward the message to the local
GeoRouter.
4.2.2
Router Actions
Figure 2: Geometric Routing Example
Once the datagram arrives at a GeoRouter, it
must first determine if it services any part of the
area of the destination polygon. To do this, the
router determines if the destination polygon and
the router’s service area polygon intersect’ [S] each
other. If not, then the router simply sends the mes-
sage to its parent router.
However, if the polygons intersect each another,
then the router does service the area described by
the intersection polygon. First, if the polygons only
partially intersect, then the router only services part
of the target area.
Therefore, it sends a copy of
the message to it’s parent router for further routing
beyond its own reach. The router now tests each
child node’s service area to see if it intersects the
destination polygon. Those that do will be sent the
geographic message.
In Figure 2, a user on Busch Campus wishes to
send a message to the destination polygon on the
College Ave. Campus. Upon sending the message,
it is passed to the Busch Campus router. By using
polygon intersection, the router determines that it
‘Detectingpo1ygonintersection takes O(n) time.
does not service the target area, so it forwards the
message to its parent, the county router. Using the
same algorithm, the county router decides that its
child node, the College Ave. router services the des-
tination area and forwards the message to it. The
College Ave. router, in turn, forwards the message
to the two GeoNodes which control the target area.
These two GeoNodes then deliver the message to all
of the users in the target area.
The router keeps a cache of the latest geographic
message packets and their destinations. When a
router receives a geographic message packet, it will
use the incoming packet’s Message Id as a key into
the cache. If this is not the first packet to arrive for
this destination and if the timer on the cache entry
has not yet expired, then the cache will return a list
of all of the next hop addresses to which copies of
the packet must be sent.
4.2.3 Receiving Geographic Messages
Once a geographic message has been sent to a
GeoNode from a geographic router, the receive pr*
cess can begin. The GeoNode will store the message
locally, assign a multicast group to it, and append
it to the list of available messages. Periodically, the
GeoNode will multicast the list of available mes-
sages on a well-known group address. Also, the
GeoNode will periodically multicast the message on
its assigned multicast group. The GeoHost daemons
will receive the list of available messages from the
GeoNode and determine if the host computer is lo-
cated inside any of the messages’ destination poly-
gons. When a client process executes a RecvFrom-
Geo() call from the Geographic Library, the func-
tion will join the appropriate multicast address and
receive the geographic message itself.
5 Router Implementation
5.1 Format of a Geographic Message
Header
A geographic message header has the following
format and order:
Message ID
(9 bytes)
Port Number (2 bytes)
Lifetime
Flags
[; ;:eq
Area Type
(1 byt::)
followed by one of the following according to the
Area Type:
69

-.,i=j’
, ,- _
0 Type = 1 (Point)
Latitude (8 bytes)
Longitude (8 bytes)
0 Type = 2 (Circle)
Latitude (8 bytes)
Longitude (8 bytes)
Radius
(8 W-1
0 Type = 3 (Polygon)
Number of Points
(2 bytes)
Latitude[i]
(8 bytes)
Longitude[i]
(8 bytes)
Followed by the message data body of arbitrary
length and content. Note that the Message ID is of
the form:
Host Computer IP Address (4 bytes)
Process ID
(4 bytes)
Message Sequence Number (1 byte)
For example, if the geographic destination is de-
scribed by a point, the header would look like figure
3.
Word #l
Me&e ID
6
i (Host Compute Aamwal ---- - __------- z
__-__-_-___--_-_ :- _----_------ --I
2
__-._---
3
Lifetime
4
i Lifetime i
Flags
8
i Y Cwrdinatf of the Point
i
9
I
I
Figure 3: Geographic Routing Packet Header for a
Point Destination
5.2 How the Routing Table is Imple-
mented
The routing table, which is the heart of the geo-
graphic router, is comprised of three main areas:
70
a cache, a polygon describing the router’s service
area, and lists of child and parent nodes.
5.2.1 Cache
In order to allow for rapid access to the individual
cache items while, at the same time, not wasting
memory space by preallocating a set hash table size,
the router’s cache is implemented as a dynamic hash
table with chaining.
Individual cache items are really a three-tuple
<message id, list of next hops, time-stamp>.
The message id, which is copied from the geo-
graphic message packet header, is used as the key
into the hash table. The message id is being used
because it can be stored in a relatively small space of
fixed width. As such, comparisons between message
ids can be done quickly and in a straight-forward
manner. However, it would be better (though more
complicated and computationally expensive) to use
the actual destination polygon itself as the key into
the cache because this would allow the cache to be
used to full advantage. How to do this, though, is
not obvious and future experiments will deal with
this matter.
The list of next hops is a list of those child or
parent nodes to which this router should forward a
copy of the packet to.
Finally, the time-stamp indicates the age of the
cache item. The time-stamp is updated every time
that the cache item is used. The cache is period-
ically checked for stale cache items. Stale cache
items are those items whose time-stamp is older
than some threshold. For the purposes of these
experiments, the maximum age of a cache item is
thirty seconds and the cache is checked every fifteen
seconds for stale items.
5.2.2 Calculating a Router’s Service Area
A router’s service area is, theoretically, the union of
the service areas of its child nodes. However, such
a union may produce a polygon which has internal
“holes” and which may have sections which are con-
cave. Many algorithms which perform polygon in-
tersection, however, require simple polygons which
are convex. Therefore, instead of calculating the
union of the child node areas, the convex hdl W~IS
calculated instead. In order to calculate the convex
hull, all of the polygonal and circular descriptions
of the child node areas were first converted into a
list of points. For circles, geometry was used to find
ten equidistant points on the circle’s perimeter.

Citations
More filters
Proceedings ArticleDOI
25 Oct 1998
TL;DR: An approach to utilize location information (for instance, obtained using the global positioning system) to improve performance of routing protocols for ad hoc networks is suggested.
Abstract: A mobile ad hoc network consists of wireless hosts that may move often. Movement of hosts results in a change in routes, requiring some mechanism for determining new routes. Several routing protocols have already been proposed for ad hoc networks. This report suggests an approach to utilize location information (for instance, obtained using the global positioning system) to improve performance of routing protocols for ad hoc networks.

2,854 citations


Cites methods from "GeoCast—geographic addressing and r..."

  • ...A routing and addressing method to integrate the concept of physical location (geographic coordinates), into the current design of the Internet, has been investigated in [13, 20]....

    [...]

Proceedings ArticleDOI
14 Sep 2003
TL;DR: In this paper, the authors present APIT, a novel localization algorithm that is range-free, which performs best when an irregular radio pattern and random node placement are considered, and low communication overhead is desired.
Abstract: Wireless Sensor Networks have been proposed for a multitude of location-dependent applications. For such systems, the cost and limitations of the hardware on sensing nodes prevent the use of range-based localization schemes that depend on absolute point-to-point distance estimates. Because coarse accuracy is sufficient for most sensor network applications, solutions in range-free localization are being pursued as a cost-effective alternative to more expensive range-based approaches. In this paper, we present APIT, a novel localization algorithm that is range-free. We show that our APIT scheme performs best when an irregular radio pattern and random node placement are considered, and low communication overhead is desired. We compare our work via extensive simulation, with three state-of-the-art range-free localization schemes to identify the preferable system configurations of each. In addition, we study the effect of location error on routing and tracking performance. We show that routing performance and tracking accuracy are not significantly affected by localization error when the error is less than 0.4 times the communication radio radius.

2,461 citations

Proceedings ArticleDOI
09 Jul 2003
TL;DR: This paper proposes a method for all nodes to determine their orientation and position in an ad-hoc network where only a fraction of the nodes have positioning capabilities, under the assumption that each node has the AOA capability.
Abstract: Position information of individual nodes is useful in implementing functions such as routing and querying in ad-hoc networks. Deriving position information by using the capability of the nodes to measure time of arrival (TOA), time difference of arrival (TDOA), angle of arrival (AOA) and signal strength have been used to localize nodes relative to a frame of reference. The nodes in an ad-hoc network can have multiple capabilities and exploiting one or more of the capabilities can improve the quality of positioning. In this paper, we show how AOA capability of the nodes can be used to derive position information. We propose a method for all nodes to determine their orientation and position in an ad-hoc network where only a fraction of the nodes have positioning capabilities, under the assumption that each node has the AOA capability.

2,285 citations

Proceedings ArticleDOI
01 Dec 2001
TL;DR: This work is proposing APS - a distributed, hop by hop positioning algorithm, that works as an extension of both distance vector routing and GPS positioning in order to provide approximate location for all nodes in a network where only a limited fraction of nodes have self location capability.
Abstract: Many ad hoc network protocols and applications assume the knowledge of geographic location of nodes. The absolute location of each networked node is an assumed fact by most sensor networks which can then present the sensed information on a geographical map. Finding location without the aid of GPS in each node of an ad hoc network is important in cases where GPS is either not accessible, or not practical to use due to power, form factor or line of sight conditions. Location would also enable routing in sufficiently isotropic large networks, without the use of large routing tables. We are proposing APS - a distributed, hop by hop positioning algorithm, that works as an extension of both distance vector routing and GPS positioning in order to provide approximate location for all nodes in a network where only a limited fraction of nodes have self location capability.

1,887 citations

Journal ArticleDOI
TL;DR: An overview of ad hoc routing protocols that make forwarding decisions based on the geographical position of a packet's destination and previously proposed location services are discussed in addition to position-based packet forwarding strategies.
Abstract: We present an overview of ad hoc routing protocols that make forwarding decisions based on the geographical position of a packet's destination. Other than the destination's position, each node need know only its own position and the position of its one-hop neighbors in order to forward packets. Since it is not necessary to maintain explicit routes, position-based routing does scale well even if the network is highly dynamic. This is a major advantage in a mobile ad hoc network where the topology may change frequently. The main prerequisite for position-based routing is that a sender can obtain the current position of the destination. Therefore, previously proposed location services are discussed in addition to position-based packet forwarding strategies. We provide a qualitative comparison of the approaches in both areas and investigate opportunities for future research.

1,722 citations

References
More filters
Proceedings Article
01 Jan 1993
TL;DR: This architecture gives users primary control over their location information, at the cost of making more expensive certain queries, such as those wherein location and identity closely interact.
Abstract: To take full advantage of the promise of ubiquitous computing requires the use of location information, yet people should have control over who may know their whereabouts. We present an architecture that achieves these goals for an interesting set of applications. Personal information is managed by User Agents, and a partially decentralized Location Query Service is used to facilitate location-based operations. This architecture gives users primary control over their location information, at the cost of making more expensive certain queries, such as those wherein location and identity closely interact. We also discuss various extensions to our architecture that offer users additional trade-offs between privacy and efficiency. Finally, we report some measurements of the unextended system in operation, focusing on how well the system is actually able to track people. Our system uses two kinds of location information, which turn out to provide partial and complementary coverage.

273 citations

01 Nov 1996
TL;DR: This memo defines an Experimental Protocol for the Internet community and uses several specific IP addresses and domain names in the discussion as concrete examples to aid in understanding the concepts.
Abstract: This document describes a possible experiment with geographic addresses. It uses several specific IP addresses and domain names in the discussion as concrete examples to aid in understanding the concepts. This memo defines an Experimental Protocol for the Internet community.

135 citations


"GeoCast—geographic addressing and r..." refers methods in this paper

  • ...[5] T. Imielinski and J. Navas, GPS-Based Ad-dressing and Routing, RFC 2009, ComputerScience, Rutgers University, March 1996....

    [...]

  • ...[2] Deering, S., and R. Hinden, Internet Proto-col, Version 6, Speci cation, RFC 1883, XeroxPARC, Ipsilon Networks, December 1995....

    [...]

  • ...[7] Rekhter, Y., and T. Li, An Architecture forIPv6 Unicast Address Allocation, RFC 1887,Cisco Systems, December 1995....

    [...]

  • ...[3] Deering, S., and Hinden, R., Editors, IP Ver-sion 6 Addressing Architecture, RFC 1884, Ip-silon Networks, Xerox PARC, December 1995....

    [...]

  • ...Under the DARPA experiment, we have implemented a prototype of the geographic routing system described in [5] and are in the process of evaluating it....

    [...]

Journal ArticleDOI
TL;DR: An algorithm is presented that computes the intersection of two convex polygons in linear time, fundamentally different from the only known linear algorithms for this problem, due to Shamos and to Hoey.

133 citations


"GeoCast—geographic addressing and r..." refers background in this paper

  • ...To do this, the router determines if the destination polygon and the router's service area polygon intersect1 [6] each other....

    [...]

Proceedings ArticleDOI
Mike Spreitzer1, Marvin M. Theimer1
01 Dec 1993
TL;DR: This architecture gives users primary control over their location information, at the cost of making more expensive certain queries, such as those wherein location and identity closely interact.
Abstract: To take full advantage of the promise of ubiquitous computing requires the use of location information, yet people should have control over who may know their whereabouts. We present an architecture that achieves these goals for an interesting set of applications. Personal information is managed by User Agents, and a partially decentralized Location Query Service is used to facilitate location-based operations. This architecture gives users primary control over their location information, at the cost of making more expensive certain queries, such as those wherein location and identity closely interact. We also discuss various extensions to our architecture that offer users additional trade-offs between privacy and efficiency. Finally, we report some measurements of the unextended system in operation, focusing on how well the system is actually able to track people. Our system uses two kinds of location information, which turn out to provide partial and complementary coverage.

87 citations

01 Dec 1995
TL;DR: This document provides an architecture for allocating IPv6 unicast addresses in the Internet and does not go into the details of an addressing plan.
Abstract: This document provides an architecture for allocating IPv6 [1] unicast addresses in the Internet. The overall IPv6 addressing architecture is defined in [2]. This document does not go into the details of an addressing plan.

35 citations

Frequently Asked Questions (1)
Q1. What have the authors contributed in "Geocast - geographic addressing and routing *" ?

In this paper the authors propose and evaluate a Touting and addressing method to integrate geographic coordinates into the Internet Protocol to enable the creation of location dependent services.