Вы находитесь на странице: 1из 6

A Scalable Routing Protocol for Ad Hoc Networks

Huaizhi Li Mukesh Singhal


Department of Computer Science Department of Computer Science
University of Kentucky University of Kentucky
Lexington, KY 40506 Lexington, KY 40506
Email: hli3@cs.uky.edu Email: singhal@cs.uky.edu

Abstract— Ad hoc networks, which do not rely on any infras- network routing messages are still kept exchanging. Thus these
tructure such as access points or base station, can be deployed protocols can not scale well with increasing of network size.
rapidly and inexpensively even in situations with geographical or Reactive routing protocols, such as AODV [3], DSR [4] and
time constraints. So ad hoc networks have attractive applications
in both military and disaster situations and also in commercial TORA [5], exchange routing information only to establish
uses like sensor networks or conferencing. In ad hoc networks, routes between nodes that have data traffic. So the overhead
each node acts both as a router and as a host. The topology is lower than proactive routing protocols. Yet in large net-
of an ad hoc network may change dynamically, which makes it work and high mobility situation, path is long and link may
difficult to design an efficient routing protocol. Nowadays, more frequently break, so overhead may be high. Hybrid routing
and more wireless devices are used, which can form large ad
hoc networks. It is important to design scalable routing protocol protocol, like ZRP [6] is combination of proactive and reactive
for ad hoc networks. In this paper we present Anchor Based routing approachs.
Rouing Protocol (ABRP), a scalable routing protocol for ad
hoc networks. It is a hybrid rouitng protocol, which combines In contrast to table based routing protocols, geographic
table based routing strategy with geographic routing strategy. routing protocols [7]–[10] utilize location information to route
Simulation results shows that it is efficent and scale well to large packets. They do not exchange routing message to establish
network. routes. We classify these routing protocols as non-table based
I. I NTRODUCTION routing protocols. When a node has data packets to be trans-
mitted to another node, forwarding desion is made based on
An ad hoc network is a set of wireless mobile nodes
the position of the destination and the position of the neighors
that form a dynamic autonomous network without the inter-
of the forwarding node. Thus position based routing protocol is
vention of centralized access points or base stations. Unlike
stateless routing protocol. It is scalable and has low overhead.
traditional wireless networks, ad hoc networks require no
But to determine the physical position, each node must be
fixed network infrastructure and can be deployed as multi-
equipped with GPS [11] or use other type of positioning
hop packet networks rapidly and with relatively low expense.
service [12]–[14].
Thus such networks can be very useful in scenarios where
natural condition or time restraints makes it impossible to have With the rapid development of wireless technology, more
infrastructure pre-deployed. Examples of applications could be and more wireless devices enter people’s daily life. This
battlefields, emergency services, conference rooms, or even increases the need of deployment of ad hoc network with large
home and office devices. number of node. Thus the scalability of an ad hoc routing
Mobile nodes in an ad hoc network have limited radio protocol becomes an important issue. Lee et al. [15] studied
transmission range. Nodes that are unable to communicate the scalability of AODV. Cluster based routing protocols, such
directly with each other require intermediate nodes to forward as [16] attempt to increase the scalability of routing protocols
packets for them. Each node acts both as a router and as a in ad hoc networks. Yet the overhead to maintain the cluster
host. The function of a routing protocol in ad hoc network is structure is still too high.
to establish routes between different nodes. Much research
In this paper, we present the Anchor Based Routing Proto-
work has been done on routing in ad hoc network. Here
col(ABRP), a scalable routing protocol for ad hoc networks.
we classify the existing ad hoc routing protocols as table
ABRP combines table based routing strategy with geographic
based routing protocol and non-table based routing protocol.
routing strategy. Simulation result shows that comparing with
The table based routing protocols can be categorized as
AODV, ABRP scales well to large network, has low overhead
proactive routing protocol, reactive routing protocol and hybrid
and resonable end-to-end delay.
routing protocol. Proactive routing protocol, like DSDV [1]
and TBRPF [2], periodically exchange routing information in The rest of the paper is organized as follows. In Section II,
the whole network so that routes between different nodes are we present our Anchor Based Routing Protocol. Section III
dynamically maintained. Therefore proactive routing protocols describes the simulation environment and presents the simula-
have low latency and the routes are reliable. Yet they have tion results. Related work is presented in Section IV. Section V
high overhead since even if there is no data traffic in the offers concluding remarks and points out future directions.

0-7803-8887-9/05/$20.00 (c)2005 IEEE


II. T HE ROUTING P ROTOCOL of the route request. If its ID is in the list, it becomes a
In this section we describe our routing protocol. The pro- bridge node to this neighbor cell for the source node and
tocol consisits of three parts: a location based clustering pro- generates a route reply message, INTER RREP:{bridge addr,
tocol, an intra-cell routing protocol, and an inter-cell routing cell ID, seqn}, in which bridge addr is the address of this
protocol, which will be introduced respectively. Each node in node; cell ID is the ID of this neighbor cell which is equal
the network maintains two kinds of routing tables: inter-cell to the bridge node’s cell ID; seqn is sequence number to
routing table and intra-cell routing table. prevent looping. The INTER RREP is sent back to the source
node. If a node’s cell ID is the same as the source ID, the
A. Location Based Clustering Protocol node is an intermediate node. It looks at its routing table
The purpose of this clustering protocol is to divide the to see if it has valid paths to the neighbor cells listed in
network region into many cells. In our protocol, we assume the INTER RREQ. If it does, it generates an INTER RREP
that several physical locations in the network are known. For and unicasts the reply back to the souce node along the
example, in a campus region, the location of some buildings is reverse path. An intermediate node may have paths to different
known. Each location is called an anchor. An anchor becomes neighbor cells, so the reply generated by an intermediate node
center of a cell. Each anchor has coordinates. We also assume contains a list of valid paths, each of which is described
that there is always a node close to each location, e.g., within a by (bridge addr, cell ID, seqn). When an intermediate node
certain range, like 20 meters. This is a reasonable assumption, receives the INTER RREP, it creates forward route entries for
since any computer in a building can have this role. This node the neighbor cells contained in the route reply and adds the
is called agent of that anchor. Each anchor is assigned an ID, route entries to its inter-cell routing table. If an intermediate
like, 1, 2, and 3. Each node in the network knows the ID and node has valid paths to all the neighbor cells in the ID list
coordinates of all the anchors. It can be thought as each node of the INTER RREQ message, it discards the INTER RREQ,
having a map of anchors. The agent of each anchor period- since all the requested routes have been found. Otherwise
ically broadcasts an ANCHOR-ANNOUNCEMENT message it rebroadcasts the INTER RREQ. Before rebroadcasting, it
to announce the ID of its anchor. The TTL (time to live) of trims the ID list of the INTER RREQ: removes the cell IDs
the ANCHOR-ANNOUNCEMENT message is 1 or 2 hops. that it has paths to. So the rebroadcast INTER RREQ only
When a node receives the ANCHOR-ANNOUNCEMENT contains the cell IDs that the intermediate node does not
message, it joins that cell and uses that anchor’s ID as its have paths to. With this approach, we can reduce overhead.
cell ID. It is possible that a node may receive two ANCHOR- Eventually the source can receive the INTER RREP. And
ANNOUNCEMENT messages from two different agents. In routes to neighbor cells have been established. It is likely that
this case, it picks a smaller ID. With this approach, the network an INTER RREQ reachs several different nodes in a neighbor
is naturally divided into different cells. The radius of each cell cell. All these nodes become bridge nodes for the source node.
is 1 or 2 hops. After a node obtains a cell ID, it also knows A node sends out an INTER RREQ to a particular neighbor
the neighbor cells of its own cell, since it knows the location cell only when all the paths to that neighbor cell are invalid.
of all the anchors. To ensure that all the cells can cover the It can be seen that an INTER RREQ can only reach one hop
whole network, i.e., there are no blind zones in the network, beyond the boundary of the cell of the source node. So our
a sufficient number of anchors should be used. inter-cell routing protocol has low overhead.

B. Inter-cell Routing Protocol C. Intra-cell Routing Protocol


The purpose of inter-cell routing protocol is to let each node Intra-cell routing protocol is for routing within the same
dynamically maintain multiple paths to its neighbor cells. The cell. It is an on demand routing protocol. The intra-cell routing
protocol has a flavor of proactive routing. The inter-cell routing table entries are tuples in the form of (destination, sequence
table entries are tuples in the form of (cell ID, bridge node number, next hop, distance).
ID, sequence number, next hop, distance). When a node has a data packet destined to another
The Location Based Clustering Protocol ensures that each node within the same cell and it does not have a valid
node has a cell ID. Each node also knows its neighbor route, it generates a intra-cell route request message, IN-
cells. To discover paths to its neighbor cells, a node broad- TRA RREQ:{source, source ID, destination, sequence num-
casts a route request message, INTER-RREQ:{source addr, ber}, and broadcasts it. When a node receives the IN-
source ID, seqn, ID list}, in which source addr is the address TRA RREQ, it first checks if its cell ID is same as the
of the source node; source ID is the cell ID of the source source ID in the INTRA RREQ. If not, it implies that the
node; seqn is seqence number; and ID list is a list of ID of INTRA RREQ is from other cell (Nodes at the boundary
neighbor cells. When a node receives the INTER-RREQ, it of a cell may receive INTRA RREQ from neighbor cell).
first looks at the message to see if it is a new request from It simply discards the INTRA RREQ. Otherwise, it creates
that source node. If not, the node siliently discards the route a reverse route entry for the source node and adds it to its
request. For a new route request, the node first creates a reverse intra-cell routing table. Then it checks if it is the required
route entry for the source node and adds the entry to its intra- destination node. If so, it generates an intra-cell route reply,
cell routing table. Then the node looks at the ID list field INTRA RREP:{destination, source, sequence number} and
TABLE I
unicasts it to the source node. If it is not the destination node,
S IMULATION FIELD CONFIGURATION
it may have a valid route to the destination. In this case it also
generates an INTRA RREP packet and unicasts the reply to Number of nodes Field size(m × m) Simulation time(second)
the source. If it does not have a valid route to the destination, 200 1730m × 2000m 900
it rebroadcasts the INTRA RREQ. 1000 8660m × 2000m 900

When an intermediate node receives the INTRA RREP, it


genarates a forward route entry for the destination node and
adds the entry to its intra-cell routing table. It then forwards the III. P ERFORMANCE A NALYSIS
INTRA RREP to the source. After the source node receives A. Simulation Environment
the INTRA RREP, it can use the route to send data packet. It We evaluated the performance of ABRP by comparing
can be seen that the propagation of intra-cell routing messages ABRP with Ad-hoc On-Demand Distance Vector (AODV)
is confined within each cell. Routing protocol [3]. We implemented ABRP using ns2 sim-
Note that our inter-cell routing protocol(section II-B) not ulator [17] and the wireless extensions developed by CMU.
only discovers multiple routes to the neighbor cells of a In the experiments, the MAC layer is the IEEE 802.11 MAC
source node, it also naturally lets other nodes that receive the protocol with Distributed Coordination Function (DCF) [18],
INTER RREQ establish a intra-cell route to the source node. which uses Request-to-send (RTS) and Clear-to-send (CTS)
control frames for unicast packet. The Carrier Sense Multiple
D. Data Packet Routing Access/Collision Avoidance (CSMA/CA) is the access frame.
The characteristics of radio model is similar to Lucent’s
We now explain how a data packet is transmitted from a WaveLAN [19], which is a shared-media radio with 2Mb/sec
source node to a destination node. We assume that a source transmission rate and a normal radio range of 250 meters.
node knows the cell ID of the destination node. This can be
done by a location service, which is a necessary component B. Traffic and Mobility Patterns
in geographic routing protocols. Our protocol’s requirement is In this simulation, we used two field configurations as
easier to meet since we only need the destination’s cell ID, shown in Table I. We varied the field size to keep the
not its exact location. When the source node has a data packet node density approximately constant. It is more reasonable to
to be sent, it first checks the destination’s cell ID to see if they investigate the scalability of a routing protocol by increasing
are in the same cell. If so, the source node utilizes intra-cell the field size than increasing the node density [15]. We used
routing protocol to transmit the packet. If not, the source node 40 source-destination pairs in all simulations. The source and
calculates the distance between the anchors of its neighbor destination nodes are randomly selected. Traffic sources are
cells and the anchor of the destination node. The neighbor CBR (constant bit-rate). Each source sends data packets of
cell that has the shortest distance is the next cell that the data 512 bytes at the rate of four packets per second. The same
packet will be forwarded to. The inter-cell routing protocol traffic load is used in all simulations to make the simulation
has established a route or multiple routes to the next cell. The results more comparable. The random way point model [20]
source node picks the shortest one, adds the destination’s cell was used as the mobility model. We assume that a destination
ID in the header of the data packet and forwards the packet to node does not change its cell ID. So during a simulation, a
its bridge node in the next cell. When the bridge node receives destination node moves randomly in its cell without leaving
the data packet, it processes the data packet with the same it. In our future work, we will develop a cell ID management
procedure, i.e., comparing its cell ID with the destination’s protocol, which traces the cell ID of each node. With this
cell ID and using either the intra-cell routing protocol or the protocol, the above assumption can be released. The maximum
inter-cell routing protocol to forward the data packet. Finally, moving speed is 10 m/s and the minimum speed is 1 m/s. We
the data packet reaches a bridge node of the destination’s cell. varied pause time to change mobility rate. The pause time
The bridge node delivers the packet to the destination using was 0, 100, 200, 400, 600 and 900 simulated seconds. For
the intra-cell routing protocol. each data point, five simulation runs were executed. The final
If the source and the destination are in different cells, the result is the average of these runs. Identical traffic and mobility
path between them consists of two kinds of nodes: (1) bridge scenarios are used for both the routing protocols. For AODV,
nodes, (2) intermediate nodes between two bridge nodes. At we used the original code in the ns2 package. For ABRP, the
each intermediate cell between the source and the destination, TTL of ANCHOR-ANNOUNCEMENT message was 2 hops.
the bridge node picks the next cell to forward the packet. It is
possible that the bridge node does not have a valid route to the C. Results and Discussion
neighbor cell with the shortest distance; it can use the neighbor 1) Packet Delivery Ratio: Packet delivery ratio is the num-
cell with the second shortest distance as the next cell. At an ber of data packets received at the destinations to the number
intermediate node, if the route picked by the bridge node is of data packets generated by the CBR sources. Figures 1 and 2
down, the intermediate node can use other valid routes to the show the variation of packet delivery ratio under different
same next cell. These measures improve the robustness of our pause time. With the increase of pause time, mobility is lower,
routing protocol. routes are less likely to be broken, and so packet delivery
1 16
AODV AODV
ABRP ABRP
0.98
14
0.96

0.94
12

Normalized overhead
Packet delivery ratio

0.92

0.9 10

0.88
8
0.86

0.84
6
0.82

0.8 4
0 100 200 300 400 500 600 700 800 900 0 100 200 300 400 500 600 700 800 900
Pause time(second) Pause time(second)

Fig. 1. Packet delivery ratio. Number of nodes: 200. Fig. 3. Normalized routing overhead. Number of nodes: 200.

1
AODV
2) Routing Overhead: We use normalized routing overhead
0.95
ABRP
to measure the efficiency of a routing protocol. The nor-
malized routing overhead is the number of routing messages
0.9
transmitted in the network for each data packet received at
the destination. The routing messages includes all the control
Packet delivery ratio

0.85

0.8
messages to establish route, such as route requests and route
replies. For ABRP, the routing messages also include control
0.75
packets to set up cells. For a routing packet transmitted over
0.7 multiple hops, each hop is considered as one transmission.
0.65
Figures 3 and 4 show the results. When pause time increases,
the routing overhead goes down, since mobility is lower and
0.6
0 100 200 300 400 500 600 700 800 900 less routes are broken. It can be seen that ABRP outperforms
Pause time(second)
AODV in all the scenarios. Especially for large networks, like
1000 nodes situations, ABRP has 10-40 percent less overhead
Fig. 2. Packet delivery ratio. Number of nodes: 1000.
than AODV. It can be explained as follows. In AODV, a node
discovers a route when it has a packet to be sent and does not
have the route. For ABRP, the intra-cell routing protocol is also
ratio goes up. From the two figures, it can be seen that ABRP an on-demand routing protocol and route discovery is confined
has better packet delivery ratio than AODV. This is especially within each cell. For the inter-cell routing protocol, each node
obvious for large networks. For AODV, the network size has maintains routes to all its neighbor cells. Generally, a node has
significant influence. For 200 nodes situation (Fig. 1), the multiple routes to each neighbor cell. A new round of route
packet delivery is about 81-94 percent. But when the network discovery is needed only when all the routes to a neighbor
size increases to 1000 nodes (Fig. 2), the packet delivery ratio cell are broken, which can reduce overhead. As discussed in
decreases to 62-75 percent. For ABRP, the packet delivery rate Section II-B, an inter-cell route request naturally establishes an
is about 82-98.3 percent for 200 nodes network. It decreases to intra-cell routing route to the source node. In general, the intra-
74-95 percent when the network size goes up to 1000 nodes. cell routing protocol is not necessary to be executed. In large
This is explained as follows. In ABRP, each node maintains network, the average path length is longer, so for AODV, route
routes to its neighbor cells for inter-cell routing protocol, and rediscovery happens more frequently than in small network,
reactively discovers routes to other nodes within the same since longer path is more likely to be broken. This increases
cell for intra-cell routing protocol. So the length of a route overhead. But for ABRP, each node only maintains inter-cell
is no longer than the diameter of a cell plus one hop, even routing routes to its neighbor cells and establishes intra-cell
if the size of the network increases. Although the length of a routing routes within its cell, so the size of network has little
path between a source and a destination is longer in a larger impact on the routing activity of a node. For small network,
network, the average length of routes of a nodes routing table the average path length is shorter, so the overhead difference
in ABRP does not change much. So it is less likely that a between ABRP and AODV is smaller than in large network.
route is broken than in AODV. For small network, this effect 3) End-to-end Delay: We calculated this metric as an av-
is not very obvious, since the length of a path between a source erage over all received data packets. It consists of all possible
and a destination is relatively short. For large network, it is delays, such as buffering at routing layer, queuing at interface
significant. queue, and retransmission at MAC layer. It should be pointed
200 0.45
AODV AODV
ABRP ABRP
180

0.4
160

End-to-end delay(second)
140
Normalized overhead

0.35
120

100
0.3
80

60
0.25

40

20 0.2
0 100 200 300 400 500 600 700 800 900 0 100 200 300 400 500 600 700 800 900
Pause time(second) Pause time(second)

Fig. 4. Normalized routing overhead. Number of nodes: 1000. Fig. 6. End-to-end delay. Number of nodes: 1000.

0.4
AODV
ABRP
each group, a node is elected as landmark. Within each group,
0.35
a proactive routing scheme, Fisheye State Routing (FSR) [23],
is used to establish routes between nodes in the same subnet.
A distance vector routing scheme is used to disseminate the
End-to-end delay(second)

0.3

routes to the landmarks of all the subnets. So each node in


0.25 the network maintains two kinds of routes: one to its nearby
destinations and one to the landmarks of all the subnets. Thus
0.2
a node can directly send packet to other nodes within same
0.15
subnet. If the destination node is in a different logical subnet,
the source node transmits the packet towards the landmark of
0.1 the destination’s logical subnet. When the packet reaches the
0 100 200 300 400 500 600 700 800 900
Pause time(second) destination’s subnet, it can be routed to the destination directly,
not necessarily through the landmark node.
Fig. 5. End-to-end delay. Number of nodes: 200. Morris et al. [24] proposed a location proxy scheme. They
assume that some nodes in the network know their location and
other nodes do not know it. The location unknown node picks
out that this metric is in favor of lower delivery rate protocols a nearby location-aware node as its proxy. A modified DSDV
since the value is only calculated over received data packets, routing protocol is used to establish routes between location
which in general go through shorter path and has less delay. proxies and location unaware nodes and their proxies. A packet
From figures 5 and 6, it can be seen that ABRP has less delay destined to a location-unaware node is first forwarded towards
than AODV. Even in 1000 nodes situation, in which AODV that node’s proxy and then delivered with the modified DSDV
has low packet delivery rate, ABRP outperforms AODV. For routing protocol after the packet arrives at the proxy.
AODV, if a link is broken, either the upstream node of the
V. C ONCLUSION AND F UTURE W ORK
link does local route repair or the source node does route
rediscovery. Either case causes delay. For ABRP, each node In this paper, we presented ABRP, a scalable routing pro-
in general maintains multiple routes to a neighbor cell, if tocol for mobile ad hoc networks. ABRP is a hybrid routing
one route is down, it still has backups. If all the routes to protocol, which combines the advantages of table based rout-
the neighbor cell with the shortest distance to the destination ing approach and geographic routing approach, while avoid
node’s cell are invalid, the node can try the neighbor cell the burden—GPS support.
with the second shortest distance to the destination node’s cell. We have evaluated and analyzed the performance of ABRP
Although these backup routes are not the shortest, the incurred with ns2 simulator. The node density is maintained constant
delay is less than the delay caused by route rediscovery. to better evaluate the scalability of the protocol. Simulation
results show that when compared with AODV, ABRP has
IV. R ELATED W ORK higher packet delivery ratio, lower overhead and low end-
Landmark Ad Hoc Routing Protocol (LANMAR) [21], [22] to-end delay. Especially for large network, ABRP achieves
is a proactive routing protocol. It is designed for ad hoc 25 percent higher packet delivery rate than AODV, with 20
networks that have coordinated group mobility. Each motion percent lower overhead. This denotes that ABRP has better
group naturally forms a logical subnet and is identified by a scalability than AODV.
groupID. Each node in the network has a unique identifier, In this paper we assume that the source node knows the cell
<groupID, nodeID>, where nodeID is the node’s address. In ID of the destination node and the destination node does not
change its cell ID during the simulation. In our future work, we [17] K. Fall and K. Varadhan, “ns notes and documentation,” available from
will design a cell ID management protocol, which traces the http://www.isi.edu/nsnam/ns/, 2003.
[18] “IEEE Wireless LAN Medium Access Control (MAC) and Physical
cell ID of each node. With this protocol the above assumption Layer (PHY) Specifications,” IEEE Std. 802.11-1997, 1997.
can be removed. The source node obtains the cell ID of the [19] B. Tuch, “Development of waveLAN, an ISM band wireless LAN,”
destination node from the cell ID management protocol and AT&T Technical Journal, vol. 72, no. 4, pp. 27–37, July-Aug. 1993.
[20] J. B. et al., “A performance comparison of multihop wireless ad hoc
put it in to the header of a data packet. When the data packet network routing protocols,” in Proc. IEEE/ACM MOBICOM98, October
reaches a bridge node in the destination nodes cell, the bridge 1998, pp. 85–97.
node checks if the destination node is still in the cell. If not, [21] G. Pei, M. Gerla, and X. Hong, “Lanmar: landmark routing for large
scale wireless ad hoc networks with group mobility,” in MobiHoc ’00:
the bridge node obtains the new cell ID of the destination Proceedings of the 1st ACM international symposium on Mobile ad hoc
node from the cell ID management protocol and forwards the networking & computing, 2000, pp. 11–18.
packet to the new cell. [22] M. Gerla, X. Hong, and G. Pei, “Landmark routing for large ad hoc
wireless networks,” in Proceeding of the IEEE GLOBECOM 2000, San
Francisco, CA, November 2000.
ACKNOWLEDGMENT [23] G. Pei, M. Gerla, and T.-W. Chen, “Fisheye state routing: A routing
This research was partially supported by NSF Grants IIS- scheme for ad hoc wireless networks,” in Proceedings of ICC 2000,
New Orleans, LA, June 2000.
0242384 and IIS-0324836. [24] D. S. J. D. Couto and R. Morris, “Location proxies and intermediate
node forwarding for practical geographic forwarding,” MIT Laboratory
R EFERENCES for Computer Science, Tech. Rep. MIT-LCS-TR-824, June 2001.
[1] C. E. Perkins and P. Bhagwat, “Highly dynamic destination-sequenced
distance-vector routing (dsdv) for mobile computers,” in SIGCOMM
’94: Proceedings of the conference on Communications architectures,
protocols and applications, 1994, pp. 234–244.
[2] R. Ogier, F. Templin, and M. Lewis, “Topology dissemination based on
reverse-path forwarding (TBRPF),” Internet Request for Comments RFC
3684, February 2004.
[3] C. E. Perkins and E. Royer, “Ad-hoc on-demand distance vector routing,”
in Proc. of the 2nd IEEE Workshop on Mobile Computing Systems and
Applications, February 1999, pp. 90–100.
[4] D. Johnson and D. Maltz, “Dynamic source routing in ad hoc wireless
networks,” Mobile Computing, vol. 353, pp. 153–181, 1996.
[5] V. Park and M. Corson, “A highly adaptive distributed routing algorithm
for mobile wireless networks,” in Proc. of INFOCOM’97, 1997.
[6] Z. J. Haas, “A new routing protocol for the reconfigurable wireless
network,” in Proceeding of 1997 IEEE 6th International Conference
on Universal Personal Communications Record: Bridging the Way to
the 21st Century (ICUPC97), October 1997, pp. 562–566.
[7] B. Karp and H. T. Kung, “GPSR: Greedy perimeter stateless routing
for wireless networks,” in Proceedings of the 6th Annual International
Conference on Mobile Computing and Networking (MOBICOM-00). N.
Y.: ACM Press, Aug. 6–11 2000, pp. 243–254.
[8] S. Basagni, I. Chlamtac, V. R. Syrotiuk, and B. A. Woodward, “A
distance routing effect algorithm for mobility (dream),” in MobiCom
’98: Proceedings of the 4th annual ACM/IEEE international conference
on Mobile computing and networking, 1998, pp. 76–84.
[9] Y.-B. Ko and N. H. Vaidya, “Location-Aided Routing (LAR) in mobile
ad hoc networks,” ACM/Baltzer Wireless Networks (WINET) Journal,
vol. 6, Issue: 4, pp. 307–321, 2000.
[10] L. Blazevic, S. Giordano, and J. Y. L. Boudec, “Self Organized Ter-
minode Routing,” Journal of Cluster Computing, vol. 5, Issue: 2, April
2002.
[11] E. D. Kaplan, Understanding GPS-Principles and Applications. Boston:
Artech House Publisher, 1996.
[12] M. Mauve, J. Widmer, and H. Hartenstein, “A survey on position-based
routing in mobile Ad Hoc Networks,” IEEE Network, vol. 15, Issue: 6,
pp. 30–39, November/December 2001.
[13] J. Li, J. Jannotti, D. S. J. D. Couto, D. R. Karger, and R. Morris, “A
scalable location service for geographic ad hoc routing,” in MobiCom
’00: Proceedings of the 6th annual international conference on Mobile
computing and networking, 2000, pp. 120–130.
[14] Z. J. Haas and B. Liang, “Ad hoc mobility management with uniform
quorum systems,” IEEE/ACM Trans. On Networking, vol. 7, Issue: 2,
pp. 228–240, April 1999.
[15] S.-J. Lee, E. M. Belding-Royer, and C. E. Perkins, “Scalability study
of the ad hoc on-demand distance vector routing protocol,” Interna-
tional Journal of Network Management, vol. 13, Issue: 2, pp. 97–114,
March/April 2003.
[16] C.-C. Chiang, H. k Wu, W. Liu, and M. Gerla, “Routing in clustered
multihop, mobile wireless networks with fading channel,” in Proceedings
of the IEEE Singapore International Conference on Networks (SICON),
Singapore, April 1997.

Вам также может понравиться