scispace - formally typeset
Search or ask a question

Showing papers on "Geographic routing published in 2005"


Proceedings ArticleDOI
22 Aug 2005
TL;DR: A new routing scheme, called Spray and Wait, that "sprays" a number of copies into the network, and then "waits" till one of these nodes meets the destination, which outperforms all existing schemes with respect to both average message delivery delay and number of transmissions per message delivered.
Abstract: Intermittently connected mobile networks are sparse wireless networks where most of the time there does not exist a complete path from the source to the destination. These networks fall into the general category of Delay Tolerant Networks. There are many real networks that follow this paradigm, for example, wildlife tracking sensor networks, military networks, inter-planetary networks, etc. In this context, conventional routing schemes would fail.To deal with such networks researchers have suggested to use flooding-based routing schemes. While flooding-based schemes have a high probability of delivery, they waste a lot of energy and suffer from severe contention, which can significantly degrade their performance. Furthermore, proposed efforts to significantly reduce the overhead of flooding-based schemes have often be plagued by large delays. With this in mind, we introduce a new routing scheme, called Spray and Wait, that "sprays" a number of copies into the network, and then "waits" till one of these nodes meets the destination.Using theory and simulations we show that Spray and Wait outperforms all existing schemes with respect to both average message delivery delay and number of transmissions per message delivered; its overall performance is close to the optimal scheme. Furthermore, it is highly scalable retaining good performance under a large range of scenarios, unlike other schemes. Finally, it is simple to implement and to optimize in order to achieve given performance goals in practice.

2,712 citations


Book
27 May 2005
TL;DR: This book discusses the design principles for wireless sensor networks, and the many faces of forwarding and routing, and some of the approaches to combining hierarchical topologies and power control used in these networks.
Abstract: Preface. List of Abbreviations. A guide to the book. 1. Introduction. 1.1 The vision of Ambient Intelligence. 1.2 Application examples. 1.3 Types of applications. 1.4 Challenges for WSNs. 1.5 Why are sensor networks different? 1.6 Enabling technologies. PART I: ARCHITECTURES. 2. Single node architecture. 2.1 Hardware components. 2.2 Energy consumption of sensor nodes. 2.3 Operating systems and execution environments. 2.4 Some examples of sensor nodes. 2.5 Conclusion. 3. Network architecture. 3.1 Sensor network scenarios. 3.2 Optimization goals & figures of merit. 3.3 Design principles for WSNs. 3.4 Service interfaces of WSNs. 3.5 Gateway concepts. 3.6 Conclusion. PART II: COMMUNICATION PROTOCOLS. 4. Physical Layer. 4.1 Introduction. 4.2 Wireless channel and communication fundamentals. 4.3 Physical layer & transceiver design considerations in WSNs. 4.4 Further reading. 5. MAC Protocols 133 5.1 Fundamentals of (wireless) MAC protocols. 5.2 Low duty cycle protocols and wakeup concepts. 5.3 Contention-based protocols. 5.4 Schedule-based protocols. 5.5 The IEEE 802.15.4 MAC protocol. 5.6 How about IEEE 802.11 and Bluetooth? 5.7 Further reading. 5.8 Conclusion. 6. Link Layer Protocols. 6.1 Fundamentals: Tasks and requirements. 6.2 Error control. 6.3 Framing. 6.4 Link management. 6.5 Summary. 7. Naming and Addressing. 7.1 Fundamentals. 7.2 Address and name management in wireless sensor networks. 7.3 Assignment of MAC addresses. 7.4 Distributed assignment of locally unique addresses. 7.5 Content-based and geographic addressing. 7.6 Summary. 8. Time Synchronization. 8.1 Introduction to the time synchronization problem. 8.2 Protocols based on sender/receiver synchronization. 8.3 Protocols based on receiver/receiver synchronization. 8.4 Further reading. 9. Localization and Positioning. 9.1 Properties of positioning. 9.2 Possible approaches. 9.3 Mathematical basics for the lateration problem. 9.4 Single-hop localization. 9.5 Positioning in multi-hop environments. 9.6 Impact of anchor placement. 9.7 Further reading. 9.8 Conclusion. 10. Topology control 295 10.1 Motivation and basic ideas. 10.2 Flat network topologies. 10.3 Hierarchical networks by dominating sets. 10.4 Hierarchical networks by clustering. 10.5 Combining hierarchical topologies and power control. 10.6 Adaptive node activity. 10.7 Conclusions. 11. Routing protocols. 11.1 The many faces of forwarding and routing. 11.2 Gossiping and agent-based unicast forwarding. 11.3 Energy-efficient unicast. 11.4 Broadcast and multicast. 11.5 Geographic routing. 11.6 Mobile nodes. 11.7 Conclusions. 12. Data-centric and content-based networking 395. 12.1 Introduction. 12.2 Data-centric routing. 12.3 Data aggregation. 12.4 Data-centric storage. 12.5 Conclusions. 13. Transport Layer and Quality of Service. 13.1 The transport layer and QoS in wireless sensor networks. 13.2 Coverage and deployment. 13.3 Reliable data transport. 13.5 Block delivery. 13.6 Congestion control and rate control. 14. Advanced application support. 14.1 Advanced in-network processing. 14.2 Security. 14.3 Application-specific support. Bibliography. Index.

1,894 citations


Proceedings ArticleDOI
13 Mar 2005
TL;DR: This paper suggests that the base station be mobile; in this way, the nodes located close to it change over time and the obtained improvement in terms of network lifetime is in the order of 500%.
Abstract: Although many energy efficient/conserving routing protocols have been proposed for wireless sensor networks, the concentration of data traffic towards a small number of base stations remains a major threat to the network lifetime. The main reason is that the sensor nodes located near a base station have to relay data for a large part of the network and thus deplete their batteries very quickly. The solution we propose in this paper suggests that the base station be mobile; in this way, the nodes located close to it change over time. Data collection protocols can then be optimized by taking both base station mobility and multi-hop routing into account. We first study the former, and conclude that the best mobility strategy consists in following the periphery of the network (we assume that the sensors are deployed within a circle). We then consider jointly mobility and routing algorithms in this case, and show that a better routing strategy uses a combination of round routes and short paths. We provide a detailed analytical model for each of our statements, and corroborate it with simulation results. We show that the obtained improvement in terms of network lifetime is in the order of 500%.

937 citations


Journal ArticleDOI
TL;DR: A richer model relating geography and social-network friendship is introduced, in which the probability of befriending a particular person is inversely proportional to the number of closer people.
Abstract: We live in a “small world,” where two arbitrary people are likely connected by a short chain of intermediate friends. With scant information about a target individual, people can successively forward a message along such a chain. Experimental studies have verified this property in real social networks, and theoretical models have been advanced to explain it. However, existing theoretical models have not been shown to capture behavior in real-world social networks. Here, we introduce a richer model relating geography and social-network friendship, in which the probability of befriending a particular person is inversely proportional to the number of closer people. In a large social network, we show that one-third of the friendships are independent of geography and the remainder exhibit the proposed relationship. Further, we prove analytically that short chains can be discovered in every network exhibiting the relationship.

886 citations


Journal ArticleDOI
TL;DR: This short paper shows how position-based routing can be aplied to a city scenario without assuming that nodes have access to a static street map and without using source routing.
Abstract: Position-based routing, as it is used by protocols like Greedy Perimeter Stateless Routing (GPSR) [5], is very well suited for highly dynamic environments such as inter-vehicle communication on highways. However, it has been discussed that radio obstacles [4], as they are found in urban areas, have a significant negative impact on the performance of position-based routing. In prior work [6] we presented a position-based approach which alleviates this problem and is able to find robust routes within city environments. It is related to the idea of position-based source routing as proposed in [1] for terminode routing. The algorithm needs global knowledge of the city topology as it is provided by a static street map. Given this information the sender determines the junctions that have to be traversed by the packet using the Dijkstra shortest path algorithm. Forwarding between junctions is then done in a position-based fashion. In this short paper we show how position-based routing can be aplied to a city scenario without assuming that nodes have access to a static street map and without using source routing.

767 citations


Proceedings ArticleDOI
25 May 2005
TL;DR: This paper formally defines and presents an effective heuristic for the minimum INterference Survivable Topology Control (INSTC) problem which seeks a channel assignment for the given network such that the induced network topology is interference-minimum among all K-connected topologies.
Abstract: The throughput of wireless networks can be significantly improved by multi-channel communications compared with single-channel communications since the use of multiple channels can reduce interference influence. In this paper, we study interference-aware topology control and QoS routing in IEEE 802.11-based multi-channel wireless mesh networks with dynamic traffic. Channel assignment and routing are two basic issues in such networks. Different channel assignments can lead to different network topologies. We present a novel definition of co-channel interference. Based on this concept, we formally define and present an effective heuristic for the minimum INterference Survivable Topology Control (INSTC) problem which seeks a channel assignment for the given network such that the induced network topology is interference-minimum among all K-connected topologies. We then formulate the Bandwidth-Aware Routing (BAR) problem for a given network topology, which seeks routes for QoS connection requests with bandwidth requirements. We present a polynomial time optimal algorithm to solve the BAR problem under the assumption that traffic demands are splittable. For the non-splittable case, we present a maximum bottleneck capacity path routing heuristic. Simulation results show that compared with the simple common channel assignment and shortest path routing approach, our scheme improves the system performance by 57% on average in terms of connection blocking ratio.

546 citations


Proceedings ArticleDOI
06 Jun 2005
TL;DR: This paper provides a formal model for the source-location privacy problem in sensor networks and examines the privacy characteristics of different sensor routing protocols, and devised new techniques to enhance source- location privacy that augment these routing protocols.
Abstract: One of the most notable challenges threatening the successful deployment of sensor systems is privacy. Although many privacy-related issues can be addressed by security mechanisms, one sensor network privacy issue that cannot be adequately addressed by network security is source-location privacy. Adversaries may use RF localization techniques to perform hop-by-hop traceback to the source sensor's location. This paper provides a formal model for the source-location privacy problem in sensor networks and examines the privacy characteristics of different sensor routing protocols. We examine two popular classes of routing protocols: the class of flooding protocols, and the class of routing protocols involving only a single path from the source to the sink. While investigating the privacy performance of routing protocols, we considered the tradeoffs between location-privacy and energy consumption. We found that most of the current protocols cannot provide efficient source-location privacy while maintaining desirable system performance. In order to provide efficient and private sensor communications, we devised new techniques to enhance source-location privacy that augment these routing protocols. One of our strategies, a technique we have called phantom routing, has proven flexible and capable of protecting the source's location, while not incurring a noticeable increase in energy overhead. Further, we examined the effect of source mobility on location privacy. We showed that, even with the natural privacy amplification resulting from source mobility, our phantom routing techniques yield improved source-location privacy relative to other routing methods

531 citations


Proceedings ArticleDOI
02 May 2005
TL;DR: Cross-Link Detection Protocol (CLDP) as discussed by the authors enables provably correct geographic routing on arbitrary connectivity graphs, which is not only correct but practical: it incurs low overhead, exhibits low path stretch, always succeeds in real, static wireless networks, and converges quickly after topology changes.
Abstract: Geographic routing has been widely hailed as the most promising approach to generally scalable wireless routing. However, the correctness of all currently proposed geographic routing algorithms relies on idealized assumptions about radios and their resulting connectivity graphs. We use testbed measurements to show that these idealized assumptions are grossly violated by real radios, and that these violations cause persistent failures in geographic routing, even on static topologies. Having identified this problem, we then fix it by proposing the Cross-Link Detection Protocol (CLDP), which enables provably correct geographic routing on arbitrary connectivity graphs. We confirm in simulation and further testbed measurements that CLDP is not only correct but practical: it incurs low overhead, exhibits low path stretch, always succeeds in real, static wireless networks, and converges quickly after topology changes.

375 citations


Proceedings ArticleDOI
25 May 2005
TL;DR: The results show that NADV outperforms current schemes in many aspects: for example, in high noise environments with frequent packet losses, the use of NADV leads to 81% higher delivery ratio and when compared to centralized routing under certain settings, geographic routing using NADV finds paths whose cost is close to the optimum.
Abstract: We propose a new link metric called normalized advance (NADV) for geographic routing in multihop wireless networks. NADV selects neighbors with the optimal trade-off between proximity and link cost. Coupled with the local next hop decision in geographic routing, NADV enables an adaptive and efficient cost-aware routing strategy. Depending on the objective or message priority, applications can use the NADV framework to minimize various types of link cost.We present efficient methods for link cost estimation and perform detailed simulations in diverse scenarios. Our results show that NADV outperforms current schemes in many aspects: for example, in high noise environments with frequent packet losses, the use of NADV leads to 81% higher delivery ratio. When compared to centralized routing under certain settings, geographic routing using NADV finds paths whose cost is close to the optimum.

328 citations


Proceedings ArticleDOI
22 Aug 2005
TL;DR: A metric that estimates the average waiting time for each potential next hop is designed, which provides performance similar to that of schemes that have global knowledge of the network topology, yet without requiring that knowledge.
Abstract: Delay-tolerant networks (DTNs) have the potential to connect devices and areas of the world that are under-served by current networks. A critical challenge for DTNs is determining routes through the network without ever having an end-to-end connection, or even knowing which "routers" will be connected at any given time. Prior approaches have focused either on epidemic message replication or on knowledge of the connectivity schedule. The epidemic approach of replicating messages to all nodes is expensive and does not appear to scale well with increasing load. It can, however, operate without any prior network configuration. The alternatives, by requiring a priori connectivity knowledge, appear infeasible for a self-configuring network.In this paper we present a practical routing protocol that only uses observed information about the network. We designed a metric that estimates how long a message will have to wait before it can be transferred to the next hop. The topology is distributed using a link-state routing protocol, where the link-state packets are "flooded" using epidemic routing. The routing is recomputed when connections are established. Messages are exchanged if the topology suggests that a connected node is "closer" than the current node.We demonstrate through simulation that our protocol provides performance similar to that of schemes that have global knowledge of the network topology, yet without requiring that knowledge. Further, it requires a significantly smaller quantity of buffer, suggesting that our approach will scale with the number of messages in the network, where replication approaches may not.

327 citations


Journal ArticleDOI
01 Apr 2005
TL;DR: Stable, scalable load-sharing across paths, based on end-to-end measurements, can be achieved on the same rapid time- scale as rate control, namely the time-scale of round-trip times.
Abstract: Dynamic multi-path routing has the potential to improve the reliability and performance of a communication network, but carries a risk. Routing needs to respond quickly to achieve the potential benefits, but not so quickly that the network is destabilized. This paper studies how rapidly routing can respond, without compromising stability.We present a sufficient condition for the local stability of end-to-end algorithms for joint routing and rate control. The network model considered allows an arbitrary interconnection of sources and resources, and heterogeneous propagation delays. The sufficient condition we present is decentralized: the responsiveness of each route is restricted by the round-trip time of that route alone, and not by the round-trip times of other routes. Our results suggest that stable, scalable load-sharing across paths, based on end-to-end measurements, can be achieved on the same rapid time-scale as rate control, namely the time-scale of round-trip times.

Proceedings ArticleDOI
22 Aug 2005
TL;DR: This paper explores a new point in this design space that aims to strike a better balance between the extensibility and robustness of a routing infrastructure, and proposes a declarative routing system to express routing protocols using a database query language.
Abstract: The Internet's core routing infrastructure, while arguably robust and efficient, has proven to be difficult to evolve to accommodate the needs of new applications. Prior research on this problem has included new hard-coded routing protocols on the one hand, and fully extensible Active Networks on the other. In this paper, we explore a new point in this design space that aims to strike a better balance between the extensibility and robustness of a routing infrastructure. The basic idea of our solution, which we call declarative routing, is to express routing protocols using a database query language. We show that our query language is a natural fit for routing, and can express a variety of well-known routing protocols in a compact and clean fashion. We discuss the security of our proposal in terms of its computational expressive power and language design. Via simulation, and deployment on PlanetLab, we demonstrate that our system imposes no fundamental limits relative to traditional protocols, is amenable to query optimizations, and can sustain long-lived routes under network churn and congestion.

Proceedings ArticleDOI
13 Mar 2005
TL;DR: The virtual coordinate assignment protocol (VCap) is introduced which defines a virtual coordinate system based on hop distances which is simple and have very little requirements in terms of communication and memory overheads.
Abstract: In this paper we consider the problem of constructing a coordinate system in a sensor network where location information is not available. To this purpose we introduce the virtual coordinate assignment protocol (VCap) which defines a virtual coordinate system based on hop distances. As compared to other approaches, VCap is simple and have very little requirements in terms of communication and memory overheads. We compare by simulations the performances of greedy routing using our virtual coordinate system with the one using the physical coordinates. Results show that the virtual coordinate system can be used to efficiently support geographic routing.

Proceedings ArticleDOI
Qing Fang1, Jie Gao1, Leonidas J. Guibas1, V. de Silva1, Li Zhang2 
13 Mar 2005
TL;DR: This work develops a protocol which in a preprocessing phase discovers the global topology of the sensor field and partitions the nodes into routable tiles - regions where the node placement is sufficiently dense and regular that local greedy methods can work well.
Abstract: We present gradient landmark-based distributed routing (GLIDER), a novel naming/addressing scheme and associated routing algorithm, for a network of wireless communicating nodes We assume that the nodes are fixed (though their geographic locations are not necessarily known), and that each node can communicate wirelessly with some of its geographic neighbors - a common scenario in sensor networks We develop a protocol which in a preprocessing phase discovers the global topology of the sensor field and, as a byproduct, partitions the nodes into routable tiles - regions where the node placement is sufficiently dense and regular that local greedy methods can work well Such global topology includes not just connectivity but also higher order topological features, such as the presence of holes We address each node by the name of the tile containing it and a set of local coordinates derived from connectivity graph distances between the node and certain landmark nodes associated with its own and neighboring tiles We use the tile adjacency graph for global route planning and the local coordinates for realizing actual inter- and intra-tile routes We show that efficient load-balanced global routing can be implemented quite simply using such a scheme

Journal ArticleDOI
TL;DR: In larger networks that are not uniformly populated with nodes, terminode routing outperforms, existing location-based or MANET routing protocols, and in smaller networks; the performance is comparable to MANet routing protocols.
Abstract: Using location information to help routing is often proposed as a means to achieve scalability in large mobile ad hoc networks. However, location-based routing is difficult when there are holes in the network topology and nodes are mobile or frequently disconnected to save battery. Terminode routing, presented here, addresses these issues. It uses a combination of location-based routing (terminode remote routing, TRR), used when the destination is far, and link state-routing (terminode local routing, TLR), used when the destination is close. TRR uses anchored paths, a list of geographic points (not nodes) used as loose source routing information. Anchored paths are discovered and managed by sources, using one of two low overhead protocols: friend assisted path discovery and geographical map-based path discovery. Our simulation results show that terminode routing performs well in networks of various sizes. In smaller networks; the performance is comparable to MANET routing protocols. In larger networks that are not uniformly populated with nodes, terminode routing outperforms, existing location-based or MANET routing protocols.

Proceedings ArticleDOI
13 Mar 2005
TL;DR: This study demonstrates that when practical MANET sizes are considered, robustness to mobility and the constant factors matter more than the asymptotic costs of location service protocols.
Abstract: Geographic routing protocols allow stateless routing in mobile ad hoc networks (MANETs) by taking advantage of the location information of mobile nodes and thus are highly scalable. A central challenge in geographic routing protocols is the design of scalable distributed location services that track mobile node locations. A number of location services have been proposed, but little is known about the relative performance of these location services. In this paper, we perform a detailed performance comparison of three rendezvous-based location services that cover a range of design choices: a quorum-based protocol (XYLS) which disseminates each node's location to O(/spl radic/N) nodes, a hierarchical protocol (GLS) which disseminates each node's location to O(logN) nodes, and a geographic hashing based protocol (GHLS) which disseminates each node's location to O(1) nodes. We present a quantitative model of protocol overheads for predicting the performance tradeoffs of the protocols for static networks. We then analyze the performance impact of mobility on these location services. Finally, we compare the performance of routing protocols equipped with the three location services with two topology-based routing protocols, AODV and DSR, for a wide range of network sizes. Our study demonstrates that when practical MANET sizes are considered, robustness to mobility and the constant factors matter more than the asymptotic costs of location service protocols. In particular, while GLS scales better asymptotically, GHLS is far simpler, transmits fewer control packets, and delivers more data packets than GLS when used with geographic routing in MANETs of sizes considered practical today and in the near future. Similarly, although XYLS scales worse asymptotically than GLS, it transmits fewer control packets and delivers more data packets than GLS in large mobile networks.

Proceedings ArticleDOI
22 Aug 2005
TL;DR: New semantic models for DTN multicast are proposed and several multicast routing algorithms with different routing strategies are developed, and a framework to evaluate these algorithms in DTNs is presented.
Abstract: Delay tolerant networks (DTNs) are a class of emerging networks that experience frequent and long-duration partitions. These networks have a variety of applications in situations such as crisis environments and deep-space communication. In this paper, we study the problem of multicasting in DTNs. Multicast supports the distribution of data to a group of users, a service needed for many potential DTN applications. While multicasting in the Internet and mobile ad hoc networks has been studied extensively, due to the unique characteristic of frequent partitioning in DTNs, multicasting in DTNs is a considerably different and challenging problem. It not only requires new definitions of multicast semantics but also brings new issues to the design of routing algorithms. In this paper, we propose new semantic models for DTN multicast and develop several multicast routing algorithms with different routing strategies. We present a framework to evaluate these algorithms in DTNs. To the best of our knowledge, this is the first study of multicasting in DTNs. Our objectives are to understand how routing performance is affected by the availability of knowledge about network topology and group membership and to guide the design of DTN routing protocols. Using ns simulations, we find that efficient multicast routing for DTNs can be constructed using only partial knowledge. In addition, accurate topology information is generally more important in routing than up-to-date membership information. We also find that routing algorithms that forward data along multiple paths achieve better delivery ratios, especially when available knowledge is limited.

Journal ArticleDOI
TL;DR: It is shown by simulation that the RDG outperforms previously proposed routing graphs in the context of the Greedy perimeter stateless routing (GPSR) protocol, and theoretical bounds on the quality of paths discovered using GPSR are investigated.
Abstract: We propose a new routing graph, the restricted Delaunay graph (RDG), for mobile ad hoc networks. Combined with a node clustering algorithm, the RDG can be used as an underlying graph for geographic routing protocols. This graph has the following attractive properties: 1) it is planar; 2) between any two graph nodes there exists a path whose length, whether measured in terms of topological or Euclidean distance, is only a constant times the minimum length possible; and 3) the graph can be maintained efficiently in a distributed manner when the nodes move around. Furthermore, each node only needs constant time to make routing decisions. We show by simulation that the RDG outperforms previously proposed routing graphs in the context of the Greedy perimeter stateless routing (GPSR) protocol. Finally, we investigate theoretical bounds on the quality of paths discovered using GPSR.

Journal ArticleDOI
TL;DR: 18 reasons why short-hop routing is not as beneficial as it seems to be are listed and experimental evidence is provided to support this claim.
Abstract: For multihop wireless networks, a fundamental question is whether it is advantageous to route over many short hops (short-hop routing) or over a smaller number of longer hops (long-hop routing). Short-hop routing has gained a lot of support, and its proponents mainly produce two arguments: reduced energy consumption and higher signal-to-interference ratios. Both arguments stem from a simplified analysis based on crude channel models that neglects delay, end-to-end reliability, bias power consumption, the impact of channel coding, mobility, and routing overhead. In this article we shed more light on these issues by listing 18 reasons why short-hop routing is not as beneficial as it seems to be. We also provide experimental evidence to support this claim. The conclusion is that for many networks, long-hop routing is in every aspect a very competitive strategy.

Patent
19 May 2005
TL;DR: In this article, the authors propose a method for routing data packets from a source to a destination in a wireless communication network comprising a plurality of nodes, wherein each node is in uplink-downlink association with at least one neighboring node, and each node comprises a registration table identifying all downlink nodes that are associated with the node.
Abstract: A method for routing data packets from a source to a destination in a wireless communication network comprising a plurality of nodes, wherein each node is in uplink-downlink association with at least one neighboring node, and wherein each node comprises a registration table identifying all downlink nodes that are associated with the node, the method comprising: sending an Open Stream message from a source node which specifies a destination node; and receiving the Open Stream message at the uplink node of the source node, wherein the uplink node relays the Open Stream message to the destination node if the destination node is registered in the registration table of the uplink node.

Proceedings ArticleDOI
13 Mar 2005
TL;DR: This paper designs the first framework for two dimensional network localization with an efficient component to correctly determine which nodes in a network are localizable and which are not, and conducts comprehensive evaluations of network localizability.
Abstract: Knowing the positions of the nodes in a network is essential to many next generation pervasive and sensor network functionalities. Although many network localization systems have recently been proposed and evaluated, there has been no systematic study of partially localizable networks, i.e., networks in which there exist nodes whose positions cannot be uniquely determined. There is no existing study which correctly identifies precisely which nodes in a network are uniquely localizable and which are not. This absence of a sufficient uniqueness condition permits the computation of erroneous positions that may in turn lead applications to produce flawed results. In this paper, in addition to demonstrating the relevance of networks that may not be fully localizable, we design the first framework for two dimensional network localization with an efficient component to correctly determine which nodes are localizable and which are not. Implementing this system, we conduct comprehensive evaluations of network localizability, providing guidelines for both network design and deployment. Furthermore, we study an integration of traditional geographic routing with geographic routing over virtual coordinates in the partially localizable network setting. We show that this novel cross-layer integration yields good performance, and argue that such optimizations will be likely be necessary to ensure acceptable application performance in partially localizable networks.

Journal ArticleDOI
TL;DR: It turns out that routing over fewer but longer hops may even outperform nearest-neighbor routing, in particular for high end-to-end delivery probabilities.
Abstract: This paper addresses the routing problem for large wireless networks of randomly distributed nodes with Rayleigh fading channels. First, we establish that the distances between neighboring nodes in a Poisson point process follow a generalized Rayleigh distribution. Based on this result, it is then shown that, given an end-to-end packet delivery probability (as a quality of service requirement), the energy benefits of routing over many short hops are significantly smaller than for deterministic network models that are based on the geometric disk abstraction. If the permissible delay for short-hop routing and long-hop routing is the same, it turns out that routing over fewer but longer hops may even outperform nearest-neighbor routing, in particular for high end-to-end delivery probabilities.

Proceedings ArticleDOI
Stefan Funke1
02 Sep 2005
TL;DR: In this paper, the authors proposed a hole detection algorithm based purely on the topology of the communication graph, i.e., the only information available is which nodes can communicate with each other.
Abstract: The identification of holes in a wireless sensor network is of primary interest since the breakdown of sensor nodes in a larger area often indicates one of the special events to be monitored by the network in the first place (e.g. outbreak of a fire, destruction by an earthquakes etc.). This task of identifying holes is especially challenging since typical wireless sensor networks consist of lightweight, low-capability nodes that are unaware of their geographic location.But there is also a secondary interest in detecting holes in a network: recently routing schemes have been proposed that do not assume knowledge of the geographic location of the network nodes but rather perform routing decisions based on the topology of the communication graph. Holes are salient features of the topology of a communication graph.In the first part of this paper we propose a simple distributed procedure to identify nodes near the boundary of the sensor field as well as near hole boundaries. Our hole detection algorithm is based purely on the topology of the communication graph, i.e. the only information available is which nodes can communicate with each other. In the second part of this paper we illustrate the secondary interest of our hole detection procedure using several examples.

Journal ArticleDOI
TL;DR: This article presents guidelines on how to design network layer protocols when the unit disk graph (UDG) model is replaced by a more realistic physical layer model, and discusses that gaining neighbor knowledge information with "hello" packets is not a trivial protocol.
Abstract: We present guidelines on how to design network layer protocols when the unit disk graph (UDG) model is replaced by a more realistic physical layer model. Instead of merely using the transmission radius in the UDG model, physical, MAC, and network layers share the information about a bit and/or packet reception probability as a function of distance between nodes. We assume that all nodes use the same transmission power for sending messages, and that a packet is received when all its bits are correctly received. The MAC layer reacts to this probabilistic reception information by adjusting the number of acknowledgments and/or retransmissions. We observe that an optimal route discovery protocol cannot be based on a single retransmission by each node, because such a search may fail to reach the destination or find the optimal path. Next, we discuss that gaining neighbor knowledge information with "hello" packets is not a trivial protocol. We describe localized position-based routing protocols that aim to minimize the expected hop count (in case of hop-by-hop acknowledgments and fixed bit rate) or maximize the probability of delivery (when acknowledgments are not sent). We propose a guideline for the design of greedy position-based routing protocols with known destination locations. The node currently holding the message forwards it to a neighbor (closer to the destination than itself) that minimizes the ratio of cost over progress, where the cost measure depends on the assumptions and metrics used, while the progress measures the difference in distances to the destination. We consider two basic medium access layer approaches, with fixed and variable packet lengths. This article serves as a preliminary contribution toward the development of network layer protocols that match the assumptions and criteria already used in simulators and ultimately in real equipment.

Proceedings ArticleDOI
02 Sep 2005
TL;DR: This work investigates to what extent flooding and routing is possible if the graph is allowed to change unpredictably at each time step, and looks at algorithmic constraints such as limited storage, no knowledge of an upper bound on the number of nodes, and no usage of identifiers.
Abstract: We investigate to what extent flooding and routing is possible if the graph is allowed to change unpredictably at each time step. We study what minimal requirements are necessary so that a node may correctly flood or route a message in a network whose links may change arbitrarily at any given point, subject to the condition that the underlying graph is connected. We look at algorithmic constraints such as limited storage, no knowledge of an upper bound on the number of nodes, and no usage of identifiers. We look at flooding as well as routing to some existing specified destination and give algorithms.

Journal ArticleDOI
TL;DR: An open source routing solver, C-BGP, is presented that eases the investigation of changes in the routing or topology of large networks and illustrates how to build a model of an ISP on a real transit network and apply the model on two "what-if" scenarios.
Abstract: Today, the complexity of ISPs' networks make it difficult to investigate the implications of internal or external changes on the distribution of traffic across their network. In this article we explain the complexity of building models of large ISPs' networks. We describe the various aspects important to understanding the routing inside an AS. We present an open source routing solver, C-BGP, that eases the investigation of changes in the routing or topology of large networks. We illustrate how to build a model of an ISP on a real transit network and apply the model on two "what-if" scenarios. The first scenario studies the impact of chances in the Internet connectivity of a transit network. The second investigates the impact of failures in its internal topology.

Proceedings ArticleDOI
06 Nov 2005
TL;DR: This paper presents a protocol, path vector exchange (PVEX), that maintains local face information at each node efficiently, and a new geographic routing algorithm, greedy path vector face routing (GPVFR), that achieves better routing performance in terms of both path stretch and hop stretch than existing geographic routing algorithms by exploiting availableLocal face information.
Abstract: Existing geographic routing algorithms depend on the planarization of the network connectivity graph for correctness, and the planarization process gives rise to a well-defined notion of "faces". In this paper, we demonstrate that we can improve routing performance by storing a small amount of local face information at each node. We present a protocol, path vector exchange (PVEX), that maintains local face information at each node efficiently, and a new geographic routing algorithm, greedy path vector face routing (GPVFR), that achieves better routing performance in terms of both path stretch and hop stretch than existing geographic routing algorithms by exploiting available local face information. Our simulations demonstrate that GPVFR/PVEX achieves significantly reduced path and hop stretch than greedy perimeter stateless routing (GPSR) and somewhat better performance than greedy other adaptive face routing (GOAFR+) over a wide range of network topologies. The cost of this improved performance is a small amount of additional storage, and the bandwidth required for our algorithm is comparable to GPSR and GOAFR+ in quasi-static networks.

Proceedings ArticleDOI
02 Sep 2005
TL;DR: This paper discusses the design space, the semantics, and three reasonable approaches for abiding geocast in an ad hoc network, and compares the proposed protocols with a probabilistic network load and delivery success ratio analysis.
Abstract: Abiding geocast is a time stable geocast delivered to all nodes that are inside a destination region within a certain period of time. Services like position--based advertising, position--based publish--and--subscribe, and many other location--based services profit from abiding geocast. For vehicular ad hoc networks, abiding geocast allows realization of information and safety applications like virtual warning signs. Similar to real traffic or warning signs, they are attached to a certain geographical position or area. When a vehicle enters such an area, the virtual warning sign is displayed for the driver.This paper discusses the design space, the semantics, and three reasonable approaches for abiding geocast in an ad hoc network. The first one is a server solution to store the messages. The second approach stores the messages at an elected node inside the geocast destination region that temporarily acts as a server. The last one complements the exchange of neighbor information necessary for many unicast routing protocols with abiding geocast information.We compare the proposed protocols with a probabilistic network load and delivery success ratio analysis. The results show that the approaches with local message storage cause less network load. However, we also observed that in some cases the delivery success ratio of the approaches with local message storage is lower.

Patent
23 Jun 2005
TL;DR: In this paper, the authors present a system for routing 911 or other emergency calls from VoIP terminal equipment, wherein the terminal includes GPS or other means to obtain geographic location information for the current location when a 911 call is initiated, and the terminal including the location information in a call setup request message to the service provider.
Abstract: Systems and methods are presented for routing 911 or other emergency calls from VoIP terminal equipment, wherein the terminal includes GPS or other means to obtain geographic location information for the current location when a 911 call is initiated, and the terminal includes the geographic location information in a call setup request message to the service provider. Routing logic receives the set request and uses the geographic information to search one or more databases to identify the proper emergency service center to which the call is routed, and also the street address corresponding to the caller's current location. The emergency call is then routed to the selected service center, where the call may be delivered with the street address or the street address information is updated in an ALI database of the 911 system by the routing logic before or during call delivery to ensure the emergency service operator or dispatcher knows where to direct emergency services.

Proceedings ArticleDOI
13 Mar 2005
TL;DR: A query routing protocol that allows low bandwidth consumption during query forwarding using a low cost mechanism to create and maintain information about nearby objects and a novel data structure called an exponentially decaying bloom filter (EDBF) that encodes such probabilistic routing tables in a highly compressed manner.
Abstract: Searching for content in peer-to-peer networks is an interesting and challenging problem. Queries in Gnutella-like unstructured systems that use flooding or random walk to search must visit O(n) nodes in a network of size n, thus consuming significant amounts of bandwidth. In this paper, we propose a query routing protocol that allows low bandwidth consumption during query forwarding using a low cost mechanism to create and maintain information about nearby objects. To achieve this, our protocol maintains a lightweight probabilistic routing table at each node that suggests the location of each object in the network. Following the corresponding routing table entries, a query can reach the destination in a small number of hops with high probability. However, maintaining routing tables in a large and highly dynamic network requires non-traditional mechanisms. We design a novel data structure called an exponentially decaying bloom filter (EDBF) that encodes such probabilistic routing tables in a highly compressed manner, and allows for efficient aggregation and propagation. The search primitives provided by our system can be used to search for single keys or multiple keywords with equal ease. Analytical modeling of our design predicts significant improvements in search efficiency, verified through extensive simulations in which we observed an order of magnitude reduction in query path length over previous proposals.