Greedy Geographic Routing is Good Enough in Sensing Covered Networks

نویسندگان

  • Guoliang Xing
  • Chenyang Lu
  • Robert Pless
  • Qingfeng Huang
چکیده

This paper presents a theoretical analysis of greedy geographic routing protocols on a common class of wireless sensor networks that must provide sensing coverage over a geographic area. Contrary to well known results on random networks, we prove that the Greedy Geographic Forwarding and our new greedy protocol always succeed in any sensing covered network when the communication range is at least twice the sensing range. Furthermore, we derive the analytic upper bound for the network dilation of sensing covered networks and quantify its relationship with the ratio between communication range and sensing range. Simulations show that, when the ratio between communication range and sensing range reaches 4.5, the studied greedy routing protocols can find network paths whose hop count on a sensing covered network approaches 1.5 times that of an ideal network. These results provide several important insights into the design of sensor networks. Simple greedy geographic routing protocols are “good enough” in this class of wireless sensor networks, and more sophisticated routing protocols designed to handle routing voids are not necessary. In addition, redundant sensors can be turned off without significant loss in communication performance as long as the remaining active nodes maintain sensing coverage. This result provides a theoretical justification of sensing coverage control protocols that conserve energy through sleep schedules.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Routing Hole Handling Techniques for Wireless Sensor Networks: A Review

A Wireless Sensor Network consists of several tiny devices which have the capability to sense and compute the environmental phenomenon. These sensor nodes are deployed in remote areas without any physical protections. A Wireless Sensor Network can have various types of anomalies due to some random deployment of nodes, obstruction and physical destructions. These anomalies can diminish the sensi...

متن کامل

Energy Efficiency and Reliability in Underwater Wireless Sensor Networks Using Cuckoo Optimizer Algorithm

Energy efficiency and reliability are widely understood to be one of the dominant considerations for Underwater Wireless Sensor Networks (UWSNs). In this paper, in order to maintain energy efficiency and reliability in a UWSN, Cuckoo Optimization Algorithm (COA) is adopted that is a combination of three techniques of geo-routing, multi-path routing, and Duty-Cycle mechanism. In the proposed alg...

متن کامل

New techniques for geographic routing

As wireless sensor networks continue to grow in size, we are faced with the prospect of emerging wireless networks with hundreds or thousands of nodes. Geographic routing algorithms are a promising alternative to tradition ad hoc routing algorithms in this new domain for point-to-point routing, but deployments of such algorithms are currently uncommon because of some practical difficulties. Thi...

متن کامل

Weak Greedy Routing over Graph Embedding for Wireless Sensor Networks

In this paper we classify the greedy routing in sensor networks into two categories, strong greedy routing and weak greedy routing. Most existing work mainly focuses on weak greedy routing over geographic location network or strong greedy routing over greedy embedding network. It is a difficult job and needs much cost to obtain geographic location or greedy embedding of the network. We propose ...

متن کامل

Alternatives to Face Routing for Localized Nodes in Wireless Sensor Networks

Geographic routing protocols for wireless sensor networks are considered. While a combination of greedy and face routing is a solution with a good performance well documented in the open literature, it requires the procedure of network graph planarization which is difficult to implement in real wireless networks. In this document, the possibilities of substituting face routing are analysed. It ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2004