SlideShare ist ein Scribd-Unternehmen logo
1 von 4
Downloaden Sie, um offline zu lesen
ACEEE Int. J. on Network Security, Vol. 01, No. 03, Dec 2010




    The Effect of Network Topology on Geographic
     Routing Performance in Localized Networks
                                               Alok Kumar, and Shirshu Varma
                                  Indian Institute of information Technology, Allahabad, India
                                            Email: {alokkumar, shirshu}@iiita.ac.in

Abstract—In this paper, we examine the role network                      considered to continue making move toward the destination
topology play in the geographic routing decision and its                 [8]. In this case, the fluctuation in the forwarding mode i.e.
performance. Much of the work carried out on geographic                  greedy and supplement mode, could cause much delay and
routing in current decade to navigate data in localized                  degrade overall performance. Usually, geometric routing
networks. In ideal environment, it has been verified to provide
significant performance improvement over stringently
                                                                         utilizes GPS (Global Positioning System) location
address-centric routing approaches. Geographic routing                   information or other localization techniques [5] to decide
protocol’s great benefit is its dependence only on information           the locations of the nodes. Due to its simple forwarding
of the forwarding node’s immediate neighbors. The global                 mechanism, geographic routing almost perfectly finds the
view required is negligible and reliant on the density of nodes          route in dense networks where the possibility of finding a
in the localized network, not the network size or number of              forwarding node is comparatively high. However,
destination nodes in the network. Our work is distinguished              geographic routing experiences degraded performance in
from most previous studies of geographic routing in this we              sparse networks where the possibility of finding route is
consider the degree of on intermediate nodes in a path chosen            comparatively low [4]. Since network topology described
by routing decision process, not just the network density. We
examine several geographic properties including the
                                                                         with node degree in WSNs but in case of geographic
possibility of deciding specific geographic path along a specific        routing, specific path select by it is more significant than
topology and effect of degree of a node in a path. Our analysis          entire topology of the network. To define geographic
shows that routing performance depends on the network                    routing path, we characterize it with an attribute, path
topology, and tends to be better when path traverse from                 degree. It is define as the ratio of the summation of degree
medium node degree path.                                                 of intermediate nodes to the number of intermediate nodes
Index Terms—Routing, network protocols, performance                      present between the source-destination of the route. The
analysis, wireless sensor networks                                       path degree reflects the possibilities to choose different
                                                                         route per intermediate node.
                      I. INTRODUCTION                                       In this paper, we present analysis of topological
                                                                         properties on a simplified, abstract model of geographic
   Localized distributed Wireless sensor networks (WSNs)                 routing interconnectivity and circuitousness of the route
are increasingly becoming vital to the development of                    determined by it. Our results indicate that the higher path
smart environments. These networks play a crucial role in                degree route is an important contributor to circuitous
modern day systems, as they aid in the mechanization of                  routing. Our study of circuitousness of geographic routing
transport systems, architectural constructions, industrial               routes provides some insight into the routing decisions
processes, as well as in home appliances [1].                            based on geometric structures. Although circuitousness
   Geographic routing has been introduced in localized                   may not forever relate to routing performance, it can often
networks i.e. network in which nodes aware about own                     be a view of a routing problem with geometric structure
location, and mostly applicable in wireless ad hoc and                   that deserves more careful examination.
sensor networks. Geographical routing [2], [3], [4] has                     The structure of rest paper as follows. In Section 2, we
been popular in current decade for localized networks with               present a geographic routing network model and describe
advantage that the nodes are not necessary to maintain                   the modified greedy-compass routing scheme which we
storage for finding route, and can make simple forwarding                used for analytical study. In Section 3, we provide the
decisions for traffic based on the locations of its                      reasoning of topological changes in localized WSNs that
neighboring nodes without much of communication                          affect the geographic routing performance. Section 4
overhead. Because geographic routing does not need a                     provide in depth analysis of circuitousness of routes and
route management procedure, it carries minimum                           provide understanding of relation between path degree and
communication and computing overhead compared to other                   distance. We also find the correlation between delay and
off-line routing schemes such as proactive, reactive, and                location of nodes in a network. Lastly, we conclude our
hybrid routing protocols. In general, geographic routing                 simulation analysis work.
forwards a packet in greedily manner wherever possible.
Each packet is moved with the location of its destination                                     II. BACKGROUND
and assumes that all nodes know their own locations in the
network space. A node forwards a packet to it’s a neighbor               A. Connectivity and Topology Dynamics
that is geographically nearest to the destination node. Local
                                                                            In this Section, we provide the reasoning for the
minimum may exist where packet forwarding node is
                                                                         topology changes due to connectivity properties and
nearer to the destination than its neighbors. In such cases,
greedy approach fails and a supplement strategy must be

© 2010 ACEEE                                                        53
DOI: 01.IJNS.01.03.257
ACEEE Int. J. on Network Security, Vol. 01, No. 03, Dec 2010



                                                                              vertices V = {v1 , v 2 ,..., v n } and edges E = {e1 , e 2 ,..., e n }
                                                                              that illustrate the network topology by way of a graph
                                                                              G (V , E ) . In the case of ranges associated with a certain
                                                                              edge, therefore we assigning a weight based on distance, to
                                                                              every edge e = (v p , vq ) connecting the vertices v p and v q .
                                                                              We consider location of nodes in the traditional way,
                                                                              position are usually viewed as three-dimensional
                                                                              coordinates ( x, y, z ) in a Cartesian reference coordinate
                                                                              space. Of course, many other transformations to other
 Figure 1. Different radio link models for Node’s neighborhood:
                                                                              coordinate systems (e.g. polar coordinates) are equivalent,
(a) perfect unit disk connectivity, (b) switched links (irregularity),        but the Cartesian system will be considered here. In a
  (c) unreliable links how the caption is centered in the column.             three-dimensional system, the Euclidean distance between
                                                                              two point v p and v q in our space is defined by:

                                                                              dist (vp , vq ) = (xp − xq ) + (yp − yq ) + (z p − zq ) .
   protocol-level properties of WSNs. We broadly classify                                                 2            2             2
the reasons of changes in the topology in following                              G
                                                                                                                                                  If

                                                                               dist (v p , v q ) ≤ R than node v p and v q communicate
categories:
B. Irregular radio range:                                                     directly and consider as neighbor of each other. We also
    Connectivity is an important feature for WSNs to                          modeled some WSNs constraints like low energy that is a
provide the nodes with the competence of communicating                        major reason of topological changes. Each node in the
with one or many sinks. In most of the literature, radio                      network has own batteries as energy source. Each sensor
links are considered as ideal, that is, without transmission                  node can have three different states; active, sleep, and dead.
errors. To maintain this assumption, the reception threshold                  Our main focus active and sleep states because these states
should be sufficiently high to assurance that radio links                     affect the topology of the network and fluctuate the
have a small transmission error possibility. As an effect, all                connection between nodes. We assume that all nodes know
unreliable links are dismissed in this scenario. This                         own location by some localization algorithms [4] or GPS
approach is sub-optimal concerning power consumption for                      device. This assumption is realistic in a sensor network due
the reason that unreliable links should allow to decrease                     to its application nature, nodes need to be know their own
either the transmission energy or the number of active                        locations when reporting sensed data; the packets are
sensor nodes.                                                                 generally sent back to a known sink position, or to a
                                                                              position specified in a broadcast query message, generally
C. Sensor node state:
                                                                              destination of maximum packets in the localized sensor
     The routing path failure may happen during packet                        network. We also modeled some WSNs constraints like
transmission because of node dying out (no battery),                          low energy that is a major reason of topological changes.
collision, node busy, node sleep mode, or other accidents.                    Each node in the network has own batteries as energy
In general, sensor nodes are static; although may be some                     source.
sensor nodes are mobile according to the application’s
nature. Even if of all nodes are static, the network topology                 B. Geographic Routing
changes over time, because nodes usually perform                                 The communication overhead to gather routing
functioning in duty-cycle, with sleeping and awake phase                      information is considered one of the main serious scaling
to reduce consumption of energy. Thus, the network                            limitations of our major communication technologies
topology formed by active sensors changes as they                             including wireless ad hoc and sensor networks. In Jon
transform their state over time period.                                       Kleinberg model [9], each node resides in a coordinate
                                                                              space, in addition of being part of the global network
               III. GEOGRAPHIC ROUTING MODEL                                  topology. Within this coordinate space each node has
                                                                              abstract information about the destination to navigate
  In this section, we discuss the details of our localized                    information into a network. This abstract information also
network model and the prominent aspects of geographic                         views in geometric routing system. The geometrical
routing schemes. We also provide a geographic routing                         properties of the wireless sensor networks permit
scheme related to the discussion in this paper. This is a                     navigation of information with the help of some geometric
node-disjoint multipath geographic routing scheme.                            structures and local network topology information. In
A. Localized Network Model                                                    geometric routing protocol, the decision on to which node
   We use a location-aware model for network in which                         to route a packet is based only on: (a) Own location
finite number of nodes are placed in a finite dimensional                     information, (b) Destination node location that mention in
terrain and all nodes have identical radio transceiver and                    the header of the packet. This includes the source-
communicate within a range R . For the geometric                              destination information of the packet, and (c) The local
abstractions to be used, assume the network, a set of                         topology knowledge information collected by the node
                                                                              from one-hop neighbors of the node.


© 2010 ACEEE                                                             54
DOI: 01.IJNS.01.03.257
ACEEE Int. J. on Network Security, Vol. 01, No. 03, Dec 2010



   This subsection summarizes some localized geometric
routing protocols presented in the networking and
computational geometry literature.
   Compass Routing: Let d be the destination node.
Current node u finds the next relay node v such that the              Figure 2. Geographic path for calculation of path degree.              .
angle ∠vud is the smallest among all neighbors of u in a
given topology [12].                                                       IV.METHODOLOGY AND SIMULATION RESULTS
   Greedy Routing: Let d be the destination node. Current              The aim of this simulation work is to study the effect of
node u finds the next relay node v such that the distance           path degree on geographic routing performance. This study
 vd is the smallest among all neighbors of u in a given             is focused on the results based on the gathered network
topology [7].                                                       path data using a simulated network environment. We are
   Greedy-Compass Routing: Current node u first finds               investigating the dynamic properties of sensor network
                                                                    (e.g., how routes change over time due dead mode or sleep
the neighbors v1 and v 2 such that v1 forms the smallest            mode by some energy saving scheme), so we only trace a
counterclockwise angle ∠duv1 and v 2 forms the smallest             single snapshot of the localized network path between a
                                                                    specific pair of nodes. Geographic routing makes decision
clockwise angle ∠duv2 among all neighbors of u with the
                                                                    of next forwarding node on basis of local topology at
segment ud . The packet is forwarded to the node of                 particular time (online nature); therefore it is not probable
{ v1 , v 2 } with minimum distance to d [10].                       that several of the routes in collected data are dead paths at
   In any real-time network phenomena, a node requires              the time of our measurement.
some metrics to navigate the information. These metrics                Since network topology characterize with average node
can be measured by either using knowledge of entire                 degree in the network but in case of geographic routing,
network or using local knowledge of particular node. For            specific path select by it, is more significant than entire
our study, we consider a geographic routing protocol, i.e.          network topology. To evaluate topology impact on
geographic node-disjoint path routing protocol (GNPR) [6].          performance, we characterize the geographic route with
This protocol is multipath in nature and it uses two                path degree. It is define as the ratio of the summation of
attributes for routing decision, i.e. direction and distance        degree of intermediate nodes to the number of intermediate
simultaneous. These attributes used in compass and greedy           nodes present between the source-destination of the route.
routing, respectively.                                              The path degree reflects the possibilities to choose different
   Given three location information; own, neighbors and             route per intermediate node. We characterize a metric,
                                                                    distance fraction for analysis of the network topology. It is
destination, the node can find two nodes v1 and v 2 with            a fraction of the Euclidian distance of a route to the
smallest angle ∠duv1 and ∠duv2 and route greedily by                geographic distance between the source-destination pair of
choosing either v1 or v 2 , which is nearest in means of            the route. The distance fraction reflects the degree to which
                                                                    the network route between two sensor nodes deviates from
Euclidian distance, to the destination in the coordinate            the straight geographic route between the nodes. A fraction
space. When the procedure fail to determine route while             of one would demonstrate a perfect match while a large
void condition arise, it revert back to previous hop node           fraction would show a circuitous route.
and start route discovery with other next better option and
summarized node where void condition occur for further
path discovery. After discover sufficient node disjoint
paths, it optimizes the path with some parameter like
minimum path length or minimum end-to-end delay. The
procedure of one iteration of GNPR is:
GNPR (source_location, neighbor_list, destination_location)
0. Begin at source node s and start to explore the path
   (path_identifier) to destination t.
1. CR: Select two nodes (u, v) that minimize the angle
   ∠sut and ∠svt .
2. GR: Proceed to the neighbor in (u, v) that closest to t.
3. If no neighbor is available other than previous hop node
                                                                       Figure 3. CDF of distance fraction to different path degree routes.
   w at node x:
   a. Revert back to node w and summarized node x as
      block node.
   b. Select next greedy-compass choice rather than x.
4. Repeat step 1-3 till path s to t discover.




© 2010 ACEEE                                                   55
DOI: 01.IJNS.01.03.257
ACEEE Int. J. on Network Security, Vol. 01, No. 03, Dec 2010



                                                                                           ACKNOWLEDGMENT
                                                                        The authors gratefully acknowledge the infrastructural
                                                                      and financial support from Indian Institute of information
                                                                      Technology, Allahabad, India.

                                                                                               REFERENCES
                                                                      [1] I. Akyildiz, ”Wireless Sensor Networks: A Survey,”
                                                                           Computer Networks, vol. 38, no. 4, pp. 393-422, March
                                                                           2002.
                                                                      [2] B. Karp and H. T. Kung, ”GPSR: Greedy Perimeter Stateless
                                                                           Routing for Wireless Networks,” in MobiCom ’00:
     Figure 4. CDF of minimum end-to-end RTT to different path             Proceedings of the 6th annual international conference on
                          degree routes.
                                                                           Mobile computing and networking. New York, NY, USA:
                                                                           ACM, 2000, pp. 243-254.
   Using GNPR protocol, we find out all node disjoint                 [3] F. Kuhn, R. Wattenhofer, Y. Zhang, and A. Zollinger,
paths for every source to destination. These node-disjoint                 ”Geometric adhoc routing: of theory and practice,” in
paths classified by the path degree. This difference between               PODC ’03: Proceedings of the twenty-second annual
the three groups of source nodes is imitated in the                        symposium on Principles of distributed computing. New
cumulative distribution function of the distance fraction for              York, NY, USA: ACM, 2003, pp. 63-72.
the three cases of path degree selection. As shown in Fig. 1,         [4] B. Leong, B. Liskov, and R. Morris, ”Geographic routing
the distance fraction tends to be the smallest for routes that             without planarization,” in NSDI ’06: Proceedings 3rd
                                                                           Symposium on Networked Systems Design and
have higher path degree and the largest for routes that have               Implementation, San Jose, CA, May 2006.
medium path degree because of path degree route with 5 to             [5] Madhulika, A. Kumar, and S. Varma, ”Iterative and
10 has less concavity.                                                     Distributed Rangefree Localization Algorithm for Wireless
   Finally, we analyze the correlation between path degree                 Sensor Networks”. in IMPACT ’09: Proceedings
and the end-to-end delay along a route. Though path degree                 International Conference on Multimedia, Signal Processing
by itself cannot present any information about several                     and Communication Technologies, Aligarh, India, March
performance characteristics like congestion along a path,                  2009.
bandwidth, the linearized distance of a route does impose a           [6] A. Kumar, and S. Varma, ”Geographic Node-Disjoint Path
minimum delay along a route. Fig. 2 illustrates the                        Routing for Wireless Sensor Networks,” IEEE Sensors
                                                                           Journal, vol. 10, no. 6, pp. 1138-1139, June, 2010.
relationship of the minimum RTT along a route to the path             [7] P. Bose, P. Morin, I. Stojmenovic’, and J. Urrutia, ”Routing
degree of a route and the geographic distance between the                  with guaranteed delivery in ad hoc wireless networks,” in
end-nodes. We make two vital observations. First, at small                 Wireless Networks, vol. 7, 1999, pp. 48-55.
values of the path degree there exists correlation between            [8] D. Chen and P. K. Varshney, ”A survey of void handling
the delay and path degree for a large fraction of end-nodes                techniques for geographic routing in wireless networks,”
especially for small values of path degree. Second,                        Communications Surveys and Tutorials, IEEE, vol. 9, no. 1,
linearized distance along a route does impose a minimum                    pp. 50-67, 2007.
end-to-end RTT that is an important performance metric                [9] J. M. Kleinberg, ”Navigation in a small world,” Nature, vol.
for real-time latency sensitive applications.                              406, no. 6798, August 2000.
                                                                      [10] P. Morin, ”Online Routing in Geometric Graphs”. PhD
                                                                           thesis, Carleton University School of Computer Science,
                        CONCLUSIONS                                        2001.
   In this paper, we have discussed a simulation study for            [11] S. M. Ross, ”Introduction to Probability and Statistics for
                                                                           Engineers and Scientists,” Second Edition, 2nd ed.,
examining the impact of network connectivity and
                                                                           Academic Press, January 2000.
topology on geographic routing performance. Under this,               [12] E. Kranakis, H. Singh, and J. Urrutia, ”Compass routing on
the effect of the geographic locations and network topology                geometric networks,” in Proc. 11 th Canadian Conference on
of end-nodes on the circuitousness of route is studied. The                Computational Geometry, Vancouver, August 1999, pp. 51-
results provide the understanding of circuitousness of                     54.
routes discovered by geographic node- disjoint path routing
protocol in simulated network with different path degree.
Finally, we find the correlation between the minimum end-
to-end delay and the path degree along their route.




© 2010 ACEEE                                                     56
DOI: 01.IJNS.01.03.257

Weitere ähnliche Inhalte

Was ist angesagt?

Mobile ad hoc networks – dangling issues of optimal path strategy
Mobile ad hoc networks – dangling issues of optimal path strategyMobile ad hoc networks – dangling issues of optimal path strategy
Mobile ad hoc networks – dangling issues of optimal path strategyAlexander Decker
 
Improvement at Network Planning using Heuristic Algorithm to Minimize Cost of...
Improvement at Network Planning using Heuristic Algorithm to Minimize Cost of...Improvement at Network Planning using Heuristic Algorithm to Minimize Cost of...
Improvement at Network Planning using Heuristic Algorithm to Minimize Cost of...Yayah Zakaria
 
A Review on Geographical Location Based Energy Efficient Direction Restricted...
A Review on Geographical Location Based Energy Efficient Direction Restricted...A Review on Geographical Location Based Energy Efficient Direction Restricted...
A Review on Geographical Location Based Energy Efficient Direction Restricted...IJRES Journal
 
Stable and Reliable Route Identification Scheme for Efficient DSR Route Cache...
Stable and Reliable Route Identification Scheme for Efficient DSR Route Cache...Stable and Reliable Route Identification Scheme for Efficient DSR Route Cache...
Stable and Reliable Route Identification Scheme for Efficient DSR Route Cache...IJASCSE
 
Topology Design of Extended Torus and Ring for Low Latency Network-on-Chip Ar...
Topology Design of Extended Torus and Ring for Low Latency Network-on-Chip Ar...Topology Design of Extended Torus and Ring for Low Latency Network-on-Chip Ar...
Topology Design of Extended Torus and Ring for Low Latency Network-on-Chip Ar...TELKOMNIKA JOURNAL
 
PERFORMANCE ANALYSIS OF BROADCASTING IN MOBILE AD HOC NETWORKS USING CLUSTER ...
PERFORMANCE ANALYSIS OF BROADCASTING IN MOBILE AD HOC NETWORKS USING CLUSTER ...PERFORMANCE ANALYSIS OF BROADCASTING IN MOBILE AD HOC NETWORKS USING CLUSTER ...
PERFORMANCE ANALYSIS OF BROADCASTING IN MOBILE AD HOC NETWORKS USING CLUSTER ...ijasuc
 
ENERGY EFFICIENT MULTICAST ROUTING IN MANET
ENERGY EFFICIENT MULTICAST ROUTING IN MANET ENERGY EFFICIENT MULTICAST ROUTING IN MANET
ENERGY EFFICIENT MULTICAST ROUTING IN MANET ijac journal
 
AN EFFICIENT ROUTING PROTOCOL FOR DELAY TOLERANT NETWORKS (DTNs)
AN EFFICIENT ROUTING PROTOCOL FOR DELAY TOLERANT NETWORKS (DTNs)AN EFFICIENT ROUTING PROTOCOL FOR DELAY TOLERANT NETWORKS (DTNs)
AN EFFICIENT ROUTING PROTOCOL FOR DELAY TOLERANT NETWORKS (DTNs)cscpconf
 
Stability routing in fso manets
Stability routing in fso manetsStability routing in fso manets
Stability routing in fso manetseSAT Journals
 
Routing in Opportunistic Networks
Routing in Opportunistic NetworksRouting in Opportunistic Networks
Routing in Opportunistic NetworksAuwal Amshi
 

Was ist angesagt? (18)

Mobile ad hoc networks – dangling issues of optimal path strategy
Mobile ad hoc networks – dangling issues of optimal path strategyMobile ad hoc networks – dangling issues of optimal path strategy
Mobile ad hoc networks – dangling issues of optimal path strategy
 
Improvement at Network Planning using Heuristic Algorithm to Minimize Cost of...
Improvement at Network Planning using Heuristic Algorithm to Minimize Cost of...Improvement at Network Planning using Heuristic Algorithm to Minimize Cost of...
Improvement at Network Planning using Heuristic Algorithm to Minimize Cost of...
 
A Review on Geographical Location Based Energy Efficient Direction Restricted...
A Review on Geographical Location Based Energy Efficient Direction Restricted...A Review on Geographical Location Based Energy Efficient Direction Restricted...
A Review on Geographical Location Based Energy Efficient Direction Restricted...
 
Ax24329333
Ax24329333Ax24329333
Ax24329333
 
Geographic routing in
Geographic routing inGeographic routing in
Geographic routing in
 
94
9494
94
 
10.1.1.61.7321
10.1.1.61.732110.1.1.61.7321
10.1.1.61.7321
 
Stable and Reliable Route Identification Scheme for Efficient DSR Route Cache...
Stable and Reliable Route Identification Scheme for Efficient DSR Route Cache...Stable and Reliable Route Identification Scheme for Efficient DSR Route Cache...
Stable and Reliable Route Identification Scheme for Efficient DSR Route Cache...
 
Topology Design of Extended Torus and Ring for Low Latency Network-on-Chip Ar...
Topology Design of Extended Torus and Ring for Low Latency Network-on-Chip Ar...Topology Design of Extended Torus and Ring for Low Latency Network-on-Chip Ar...
Topology Design of Extended Torus and Ring for Low Latency Network-on-Chip Ar...
 
PERFORMANCE ANALYSIS OF BROADCASTING IN MOBILE AD HOC NETWORKS USING CLUSTER ...
PERFORMANCE ANALYSIS OF BROADCASTING IN MOBILE AD HOC NETWORKS USING CLUSTER ...PERFORMANCE ANALYSIS OF BROADCASTING IN MOBILE AD HOC NETWORKS USING CLUSTER ...
PERFORMANCE ANALYSIS OF BROADCASTING IN MOBILE AD HOC NETWORKS USING CLUSTER ...
 
ENERGY EFFICIENT MULTICAST ROUTING IN MANET
ENERGY EFFICIENT MULTICAST ROUTING IN MANET ENERGY EFFICIENT MULTICAST ROUTING IN MANET
ENERGY EFFICIENT MULTICAST ROUTING IN MANET
 
Be31390392
Be31390392Be31390392
Be31390392
 
AN EFFICIENT ROUTING PROTOCOL FOR DELAY TOLERANT NETWORKS (DTNs)
AN EFFICIENT ROUTING PROTOCOL FOR DELAY TOLERANT NETWORKS (DTNs)AN EFFICIENT ROUTING PROTOCOL FOR DELAY TOLERANT NETWORKS (DTNs)
AN EFFICIENT ROUTING PROTOCOL FOR DELAY TOLERANT NETWORKS (DTNs)
 
Stability routing in fso manets
Stability routing in fso manetsStability routing in fso manets
Stability routing in fso manets
 
Deepwalk vs Node2vec
Deepwalk vs Node2vecDeepwalk vs Node2vec
Deepwalk vs Node2vec
 
59
5959
59
 
Ly2520762079
Ly2520762079Ly2520762079
Ly2520762079
 
Routing in Opportunistic Networks
Routing in Opportunistic NetworksRouting in Opportunistic Networks
Routing in Opportunistic Networks
 

Andere mochten auch

A New Method to Stop Spam Emails in Sender Side
A New Method to Stop Spam Emails in Sender SideA New Method to Stop Spam Emails in Sender Side
A New Method to Stop Spam Emails in Sender SideIDES Editor
 
An RSS Based Localization Algorithm in Cellular Networks
An RSS Based Localization Algorithm in Cellular NetworksAn RSS Based Localization Algorithm in Cellular Networks
An RSS Based Localization Algorithm in Cellular NetworksIDES Editor
 
Despeckling of Ultrasound Imaging using Median Regularized Coupled Pde
Despeckling of Ultrasound Imaging using Median Regularized Coupled PdeDespeckling of Ultrasound Imaging using Median Regularized Coupled Pde
Despeckling of Ultrasound Imaging using Median Regularized Coupled PdeIDES Editor
 
Comparison of Normal and Ventricular Tachyarrhythmic Electrocardiograms using...
Comparison of Normal and Ventricular Tachyarrhythmic Electrocardiograms using...Comparison of Normal and Ventricular Tachyarrhythmic Electrocardiograms using...
Comparison of Normal and Ventricular Tachyarrhythmic Electrocardiograms using...IDES Editor
 
Intuition – Based Teaching Mathematics for Engineers
Intuition – Based Teaching Mathematics for EngineersIntuition – Based Teaching Mathematics for Engineers
Intuition – Based Teaching Mathematics for EngineersIDES Editor
 
A New Approach to Improve the Efficiency of Distributed Scheduling in IEEE 80...
A New Approach to Improve the Efficiency of Distributed Scheduling in IEEE 80...A New Approach to Improve the Efficiency of Distributed Scheduling in IEEE 80...
A New Approach to Improve the Efficiency of Distributed Scheduling in IEEE 80...IDES Editor
 
AGPM: An Authenticated Secure Group Communication Protocol for MANETs
AGPM: An Authenticated Secure Group Communication Protocol for MANETsAGPM: An Authenticated Secure Group Communication Protocol for MANETs
AGPM: An Authenticated Secure Group Communication Protocol for MANETsIDES Editor
 
Performance Improvement Technique in Column-Store
Performance Improvement Technique in Column-StorePerformance Improvement Technique in Column-Store
Performance Improvement Technique in Column-StoreIDES Editor
 

Andere mochten auch (8)

A New Method to Stop Spam Emails in Sender Side
A New Method to Stop Spam Emails in Sender SideA New Method to Stop Spam Emails in Sender Side
A New Method to Stop Spam Emails in Sender Side
 
An RSS Based Localization Algorithm in Cellular Networks
An RSS Based Localization Algorithm in Cellular NetworksAn RSS Based Localization Algorithm in Cellular Networks
An RSS Based Localization Algorithm in Cellular Networks
 
Despeckling of Ultrasound Imaging using Median Regularized Coupled Pde
Despeckling of Ultrasound Imaging using Median Regularized Coupled PdeDespeckling of Ultrasound Imaging using Median Regularized Coupled Pde
Despeckling of Ultrasound Imaging using Median Regularized Coupled Pde
 
Comparison of Normal and Ventricular Tachyarrhythmic Electrocardiograms using...
Comparison of Normal and Ventricular Tachyarrhythmic Electrocardiograms using...Comparison of Normal and Ventricular Tachyarrhythmic Electrocardiograms using...
Comparison of Normal and Ventricular Tachyarrhythmic Electrocardiograms using...
 
Intuition – Based Teaching Mathematics for Engineers
Intuition – Based Teaching Mathematics for EngineersIntuition – Based Teaching Mathematics for Engineers
Intuition – Based Teaching Mathematics for Engineers
 
A New Approach to Improve the Efficiency of Distributed Scheduling in IEEE 80...
A New Approach to Improve the Efficiency of Distributed Scheduling in IEEE 80...A New Approach to Improve the Efficiency of Distributed Scheduling in IEEE 80...
A New Approach to Improve the Efficiency of Distributed Scheduling in IEEE 80...
 
AGPM: An Authenticated Secure Group Communication Protocol for MANETs
AGPM: An Authenticated Secure Group Communication Protocol for MANETsAGPM: An Authenticated Secure Group Communication Protocol for MANETs
AGPM: An Authenticated Secure Group Communication Protocol for MANETs
 
Performance Improvement Technique in Column-Store
Performance Improvement Technique in Column-StorePerformance Improvement Technique in Column-Store
Performance Improvement Technique in Column-Store
 

Ähnlich wie The Effect of Network Topology on Geographic Routing Performance in Localized Networks

International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
Virtual Position based Olsr Protocol for Wireless Sensor Networks
Virtual Position based Olsr Protocol for Wireless Sensor NetworksVirtual Position based Olsr Protocol for Wireless Sensor Networks
Virtual Position based Olsr Protocol for Wireless Sensor Networksijcnes
 
Analysis of Latency and Throughput of 2D Torus Topology using Modified XY Rou...
Analysis of Latency and Throughput of 2D Torus Topology using Modified XY Rou...Analysis of Latency and Throughput of 2D Torus Topology using Modified XY Rou...
Analysis of Latency and Throughput of 2D Torus Topology using Modified XY Rou...IDES Editor
 
Design Test-bed for assessing load utilising using Multicast Forwarding Appro...
Design Test-bed for assessing load utilising using Multicast Forwarding Appro...Design Test-bed for assessing load utilising using Multicast Forwarding Appro...
Design Test-bed for assessing load utilising using Multicast Forwarding Appro...IOSR Journals
 
Iaetsd improving the location of nodes in wireless ad
Iaetsd improving the location of nodes in wireless adIaetsd improving the location of nodes in wireless ad
Iaetsd improving the location of nodes in wireless adIaetsd Iaetsd
 
Network size variation of geographical aided routing protocols in MANET
Network size variation of geographical aided routing protocols in MANETNetwork size variation of geographical aided routing protocols in MANET
Network size variation of geographical aided routing protocols in MANETnooriasukmaningtyas
 
Geographic routing protocol_in_wireless_sensor_networks
Geographic routing protocol_in_wireless_sensor_networksGeographic routing protocol_in_wireless_sensor_networks
Geographic routing protocol_in_wireless_sensor_networksGr Patel
 
A Neighbor Coverage-Based Probabilistic Rebroadcast for Reducing Routing Ove...
A Neighbor Coverage-Based Probabilistic Rebroadcast for  Reducing Routing Ove...A Neighbor Coverage-Based Probabilistic Rebroadcast for  Reducing Routing Ove...
A Neighbor Coverage-Based Probabilistic Rebroadcast for Reducing Routing Ove...IJMER
 
Forwarding and Routing The role of the network layer is thus dec.docx
Forwarding and Routing The role of the network layer is thus dec.docxForwarding and Routing The role of the network layer is thus dec.docx
Forwarding and Routing The role of the network layer is thus dec.docxbudbarber38650
 
Power Aware Geocast Based Geocast Region Tracking Using Mobile Node in Wirele...
Power Aware Geocast Based Geocast Region Tracking Using Mobile Node in Wirele...Power Aware Geocast Based Geocast Region Tracking Using Mobile Node in Wirele...
Power Aware Geocast Based Geocast Region Tracking Using Mobile Node in Wirele...inventionjournals
 
LOAD BALANCING AND PROVIDING SECURITY USING RSA IN WIRELESS SENSOR NETWORKS
LOAD BALANCING AND PROVIDING SECURITY USING RSA IN WIRELESS SENSOR NETWORKSLOAD BALANCING AND PROVIDING SECURITY USING RSA IN WIRELESS SENSOR NETWORKS
LOAD BALANCING AND PROVIDING SECURITY USING RSA IN WIRELESS SENSOR NETWORKSIJARIIT
 
ROUTING IN OPTICAL MESH NETWORKS-A QOS PERSPECTIVE
ROUTING IN OPTICAL MESH NETWORKS-A QOS PERSPECTIVEROUTING IN OPTICAL MESH NETWORKS-A QOS PERSPECTIVE
ROUTING IN OPTICAL MESH NETWORKS-A QOS PERSPECTIVEijasuc
 
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)irjes
 
ROUTING IN OPTICAL MESH NETWORKS-A QOS PERSPECTIVE
ROUTING IN OPTICAL MESH NETWORKS-A QOS PERSPECTIVEROUTING IN OPTICAL MESH NETWORKS-A QOS PERSPECTIVE
ROUTING IN OPTICAL MESH NETWORKS-A QOS PERSPECTIVEijasuc
 
Iaetsd a survey on geographic routing relay selection in
Iaetsd a survey on geographic routing relay selection inIaetsd a survey on geographic routing relay selection in
Iaetsd a survey on geographic routing relay selection inIaetsd Iaetsd
 
Comparative analysis on Void Node Removal Routing algorithms for Underwater W...
Comparative analysis on Void Node Removal Routing algorithms for Underwater W...Comparative analysis on Void Node Removal Routing algorithms for Underwater W...
Comparative analysis on Void Node Removal Routing algorithms for Underwater W...Editor IJCATR
 

Ähnlich wie The Effect of Network Topology on Geographic Routing Performance in Localized Networks (20)

International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Virtual Position based Olsr Protocol for Wireless Sensor Networks
Virtual Position based Olsr Protocol for Wireless Sensor NetworksVirtual Position based Olsr Protocol for Wireless Sensor Networks
Virtual Position based Olsr Protocol for Wireless Sensor Networks
 
Analysis of Latency and Throughput of 2D Torus Topology using Modified XY Rou...
Analysis of Latency and Throughput of 2D Torus Topology using Modified XY Rou...Analysis of Latency and Throughput of 2D Torus Topology using Modified XY Rou...
Analysis of Latency and Throughput of 2D Torus Topology using Modified XY Rou...
 
Design Test-bed for assessing load utilising using Multicast Forwarding Appro...
Design Test-bed for assessing load utilising using Multicast Forwarding Appro...Design Test-bed for assessing load utilising using Multicast Forwarding Appro...
Design Test-bed for assessing load utilising using Multicast Forwarding Appro...
 
Iaetsd improving the location of nodes in wireless ad
Iaetsd improving the location of nodes in wireless adIaetsd improving the location of nodes in wireless ad
Iaetsd improving the location of nodes in wireless ad
 
Network size variation of geographical aided routing protocols in MANET
Network size variation of geographical aided routing protocols in MANETNetwork size variation of geographical aided routing protocols in MANET
Network size variation of geographical aided routing protocols in MANET
 
Geographic routing protocol_in_wireless_sensor_networks
Geographic routing protocol_in_wireless_sensor_networksGeographic routing protocol_in_wireless_sensor_networks
Geographic routing protocol_in_wireless_sensor_networks
 
A Neighbor Coverage-Based Probabilistic Rebroadcast for Reducing Routing Ove...
A Neighbor Coverage-Based Probabilistic Rebroadcast for  Reducing Routing Ove...A Neighbor Coverage-Based Probabilistic Rebroadcast for  Reducing Routing Ove...
A Neighbor Coverage-Based Probabilistic Rebroadcast for Reducing Routing Ove...
 
Forwarding and Routing The role of the network layer is thus dec.docx
Forwarding and Routing The role of the network layer is thus dec.docxForwarding and Routing The role of the network layer is thus dec.docx
Forwarding and Routing The role of the network layer is thus dec.docx
 
Power Aware Geocast Based Geocast Region Tracking Using Mobile Node in Wirele...
Power Aware Geocast Based Geocast Region Tracking Using Mobile Node in Wirele...Power Aware Geocast Based Geocast Region Tracking Using Mobile Node in Wirele...
Power Aware Geocast Based Geocast Region Tracking Using Mobile Node in Wirele...
 
LOAD BALANCING AND PROVIDING SECURITY USING RSA IN WIRELESS SENSOR NETWORKS
LOAD BALANCING AND PROVIDING SECURITY USING RSA IN WIRELESS SENSOR NETWORKSLOAD BALANCING AND PROVIDING SECURITY USING RSA IN WIRELESS SENSOR NETWORKS
LOAD BALANCING AND PROVIDING SECURITY USING RSA IN WIRELESS SENSOR NETWORKS
 
Deepwalk vs Node2vec
Deepwalk vs Node2vecDeepwalk vs Node2vec
Deepwalk vs Node2vec
 
ROUTING IN OPTICAL MESH NETWORKS-A QOS PERSPECTIVE
ROUTING IN OPTICAL MESH NETWORKS-A QOS PERSPECTIVEROUTING IN OPTICAL MESH NETWORKS-A QOS PERSPECTIVE
ROUTING IN OPTICAL MESH NETWORKS-A QOS PERSPECTIVE
 
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)
 
ROUTING IN OPTICAL MESH NETWORKS-A QOS PERSPECTIVE
ROUTING IN OPTICAL MESH NETWORKS-A QOS PERSPECTIVEROUTING IN OPTICAL MESH NETWORKS-A QOS PERSPECTIVE
ROUTING IN OPTICAL MESH NETWORKS-A QOS PERSPECTIVE
 
Iaetsd a survey on geographic routing relay selection in
Iaetsd a survey on geographic routing relay selection inIaetsd a survey on geographic routing relay selection in
Iaetsd a survey on geographic routing relay selection in
 
Deepwalk vs Node2vec
Deepwalk vs Node2vecDeepwalk vs Node2vec
Deepwalk vs Node2vec
 
A02100108
A02100108A02100108
A02100108
 
Comparative analysis on Void Node Removal Routing algorithms for Underwater W...
Comparative analysis on Void Node Removal Routing algorithms for Underwater W...Comparative analysis on Void Node Removal Routing algorithms for Underwater W...
Comparative analysis on Void Node Removal Routing algorithms for Underwater W...
 

Mehr von IDES Editor

Power System State Estimation - A Review
Power System State Estimation - A ReviewPower System State Estimation - A Review
Power System State Estimation - A ReviewIDES Editor
 
Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...IDES Editor
 
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...IDES Editor
 
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...IDES Editor
 
Line Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFCLine Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFCIDES Editor
 
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...IDES Editor
 
Assessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric ModelingAssessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric ModelingIDES Editor
 
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...IDES Editor
 
Selfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive ThresholdsSelfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive ThresholdsIDES Editor
 
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...IDES Editor
 
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...IDES Editor
 
Cloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability FrameworkCloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability FrameworkIDES Editor
 
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP BotnetGenetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP BotnetIDES Editor
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyIDES Editor
 
Low Energy Routing for WSN’s
Low Energy Routing for WSN’sLow Energy Routing for WSN’s
Low Energy Routing for WSN’sIDES Editor
 
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...IDES Editor
 
Rotman Lens Performance Analysis
Rotman Lens Performance AnalysisRotman Lens Performance Analysis
Rotman Lens Performance AnalysisIDES Editor
 
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral ImagesBand Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral ImagesIDES Editor
 
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...IDES Editor
 
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...IDES Editor
 

Mehr von IDES Editor (20)

Power System State Estimation - A Review
Power System State Estimation - A ReviewPower System State Estimation - A Review
Power System State Estimation - A Review
 
Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...
 
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
 
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
 
Line Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFCLine Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFC
 
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
 
Assessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric ModelingAssessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric Modeling
 
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
 
Selfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive ThresholdsSelfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive Thresholds
 
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
 
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
 
Cloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability FrameworkCloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability Framework
 
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP BotnetGenetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through Steganography
 
Low Energy Routing for WSN’s
Low Energy Routing for WSN’sLow Energy Routing for WSN’s
Low Energy Routing for WSN’s
 
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
 
Rotman Lens Performance Analysis
Rotman Lens Performance AnalysisRotman Lens Performance Analysis
Rotman Lens Performance Analysis
 
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral ImagesBand Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
 
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
 
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
 

Kürzlich hochgeladen

Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdfChristopherTHyatt
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 

Kürzlich hochgeladen (20)

Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 

The Effect of Network Topology on Geographic Routing Performance in Localized Networks

  • 1. ACEEE Int. J. on Network Security, Vol. 01, No. 03, Dec 2010 The Effect of Network Topology on Geographic Routing Performance in Localized Networks Alok Kumar, and Shirshu Varma Indian Institute of information Technology, Allahabad, India Email: {alokkumar, shirshu}@iiita.ac.in Abstract—In this paper, we examine the role network considered to continue making move toward the destination topology play in the geographic routing decision and its [8]. In this case, the fluctuation in the forwarding mode i.e. performance. Much of the work carried out on geographic greedy and supplement mode, could cause much delay and routing in current decade to navigate data in localized degrade overall performance. Usually, geometric routing networks. In ideal environment, it has been verified to provide significant performance improvement over stringently utilizes GPS (Global Positioning System) location address-centric routing approaches. Geographic routing information or other localization techniques [5] to decide protocol’s great benefit is its dependence only on information the locations of the nodes. Due to its simple forwarding of the forwarding node’s immediate neighbors. The global mechanism, geographic routing almost perfectly finds the view required is negligible and reliant on the density of nodes route in dense networks where the possibility of finding a in the localized network, not the network size or number of forwarding node is comparatively high. However, destination nodes in the network. Our work is distinguished geographic routing experiences degraded performance in from most previous studies of geographic routing in this we sparse networks where the possibility of finding route is consider the degree of on intermediate nodes in a path chosen comparatively low [4]. Since network topology described by routing decision process, not just the network density. We examine several geographic properties including the with node degree in WSNs but in case of geographic possibility of deciding specific geographic path along a specific routing, specific path select by it is more significant than topology and effect of degree of a node in a path. Our analysis entire topology of the network. To define geographic shows that routing performance depends on the network routing path, we characterize it with an attribute, path topology, and tends to be better when path traverse from degree. It is define as the ratio of the summation of degree medium node degree path. of intermediate nodes to the number of intermediate nodes Index Terms—Routing, network protocols, performance present between the source-destination of the route. The analysis, wireless sensor networks path degree reflects the possibilities to choose different route per intermediate node. I. INTRODUCTION In this paper, we present analysis of topological properties on a simplified, abstract model of geographic Localized distributed Wireless sensor networks (WSNs) routing interconnectivity and circuitousness of the route are increasingly becoming vital to the development of determined by it. Our results indicate that the higher path smart environments. These networks play a crucial role in degree route is an important contributor to circuitous modern day systems, as they aid in the mechanization of routing. Our study of circuitousness of geographic routing transport systems, architectural constructions, industrial routes provides some insight into the routing decisions processes, as well as in home appliances [1]. based on geometric structures. Although circuitousness Geographic routing has been introduced in localized may not forever relate to routing performance, it can often networks i.e. network in which nodes aware about own be a view of a routing problem with geometric structure location, and mostly applicable in wireless ad hoc and that deserves more careful examination. sensor networks. Geographical routing [2], [3], [4] has The structure of rest paper as follows. In Section 2, we been popular in current decade for localized networks with present a geographic routing network model and describe advantage that the nodes are not necessary to maintain the modified greedy-compass routing scheme which we storage for finding route, and can make simple forwarding used for analytical study. In Section 3, we provide the decisions for traffic based on the locations of its reasoning of topological changes in localized WSNs that neighboring nodes without much of communication affect the geographic routing performance. Section 4 overhead. Because geographic routing does not need a provide in depth analysis of circuitousness of routes and route management procedure, it carries minimum provide understanding of relation between path degree and communication and computing overhead compared to other distance. We also find the correlation between delay and off-line routing schemes such as proactive, reactive, and location of nodes in a network. Lastly, we conclude our hybrid routing protocols. In general, geographic routing simulation analysis work. forwards a packet in greedily manner wherever possible. Each packet is moved with the location of its destination II. BACKGROUND and assumes that all nodes know their own locations in the network space. A node forwards a packet to it’s a neighbor A. Connectivity and Topology Dynamics that is geographically nearest to the destination node. Local In this Section, we provide the reasoning for the minimum may exist where packet forwarding node is topology changes due to connectivity properties and nearer to the destination than its neighbors. In such cases, greedy approach fails and a supplement strategy must be © 2010 ACEEE 53 DOI: 01.IJNS.01.03.257
  • 2. ACEEE Int. J. on Network Security, Vol. 01, No. 03, Dec 2010 vertices V = {v1 , v 2 ,..., v n } and edges E = {e1 , e 2 ,..., e n } that illustrate the network topology by way of a graph G (V , E ) . In the case of ranges associated with a certain edge, therefore we assigning a weight based on distance, to every edge e = (v p , vq ) connecting the vertices v p and v q . We consider location of nodes in the traditional way, position are usually viewed as three-dimensional coordinates ( x, y, z ) in a Cartesian reference coordinate space. Of course, many other transformations to other Figure 1. Different radio link models for Node’s neighborhood: coordinate systems (e.g. polar coordinates) are equivalent, (a) perfect unit disk connectivity, (b) switched links (irregularity), but the Cartesian system will be considered here. In a (c) unreliable links how the caption is centered in the column. three-dimensional system, the Euclidean distance between two point v p and v q in our space is defined by: dist (vp , vq ) = (xp − xq ) + (yp − yq ) + (z p − zq ) . protocol-level properties of WSNs. We broadly classify 2 2 2 the reasons of changes in the topology in following G If dist (v p , v q ) ≤ R than node v p and v q communicate categories: B. Irregular radio range: directly and consider as neighbor of each other. We also Connectivity is an important feature for WSNs to modeled some WSNs constraints like low energy that is a provide the nodes with the competence of communicating major reason of topological changes. Each node in the with one or many sinks. In most of the literature, radio network has own batteries as energy source. Each sensor links are considered as ideal, that is, without transmission node can have three different states; active, sleep, and dead. errors. To maintain this assumption, the reception threshold Our main focus active and sleep states because these states should be sufficiently high to assurance that radio links affect the topology of the network and fluctuate the have a small transmission error possibility. As an effect, all connection between nodes. We assume that all nodes know unreliable links are dismissed in this scenario. This own location by some localization algorithms [4] or GPS approach is sub-optimal concerning power consumption for device. This assumption is realistic in a sensor network due the reason that unreliable links should allow to decrease to its application nature, nodes need to be know their own either the transmission energy or the number of active locations when reporting sensed data; the packets are sensor nodes. generally sent back to a known sink position, or to a position specified in a broadcast query message, generally C. Sensor node state: destination of maximum packets in the localized sensor The routing path failure may happen during packet network. We also modeled some WSNs constraints like transmission because of node dying out (no battery), low energy that is a major reason of topological changes. collision, node busy, node sleep mode, or other accidents. Each node in the network has own batteries as energy In general, sensor nodes are static; although may be some source. sensor nodes are mobile according to the application’s nature. Even if of all nodes are static, the network topology B. Geographic Routing changes over time, because nodes usually perform The communication overhead to gather routing functioning in duty-cycle, with sleeping and awake phase information is considered one of the main serious scaling to reduce consumption of energy. Thus, the network limitations of our major communication technologies topology formed by active sensors changes as they including wireless ad hoc and sensor networks. In Jon transform their state over time period. Kleinberg model [9], each node resides in a coordinate space, in addition of being part of the global network III. GEOGRAPHIC ROUTING MODEL topology. Within this coordinate space each node has abstract information about the destination to navigate In this section, we discuss the details of our localized information into a network. This abstract information also network model and the prominent aspects of geographic views in geometric routing system. The geometrical routing schemes. We also provide a geographic routing properties of the wireless sensor networks permit scheme related to the discussion in this paper. This is a navigation of information with the help of some geometric node-disjoint multipath geographic routing scheme. structures and local network topology information. In A. Localized Network Model geometric routing protocol, the decision on to which node We use a location-aware model for network in which to route a packet is based only on: (a) Own location finite number of nodes are placed in a finite dimensional information, (b) Destination node location that mention in terrain and all nodes have identical radio transceiver and the header of the packet. This includes the source- communicate within a range R . For the geometric destination information of the packet, and (c) The local abstractions to be used, assume the network, a set of topology knowledge information collected by the node from one-hop neighbors of the node. © 2010 ACEEE 54 DOI: 01.IJNS.01.03.257
  • 3. ACEEE Int. J. on Network Security, Vol. 01, No. 03, Dec 2010 This subsection summarizes some localized geometric routing protocols presented in the networking and computational geometry literature. Compass Routing: Let d be the destination node. Current node u finds the next relay node v such that the Figure 2. Geographic path for calculation of path degree. . angle ∠vud is the smallest among all neighbors of u in a given topology [12]. IV.METHODOLOGY AND SIMULATION RESULTS Greedy Routing: Let d be the destination node. Current The aim of this simulation work is to study the effect of node u finds the next relay node v such that the distance path degree on geographic routing performance. This study vd is the smallest among all neighbors of u in a given is focused on the results based on the gathered network topology [7]. path data using a simulated network environment. We are Greedy-Compass Routing: Current node u first finds investigating the dynamic properties of sensor network (e.g., how routes change over time due dead mode or sleep the neighbors v1 and v 2 such that v1 forms the smallest mode by some energy saving scheme), so we only trace a counterclockwise angle ∠duv1 and v 2 forms the smallest single snapshot of the localized network path between a specific pair of nodes. Geographic routing makes decision clockwise angle ∠duv2 among all neighbors of u with the of next forwarding node on basis of local topology at segment ud . The packet is forwarded to the node of particular time (online nature); therefore it is not probable { v1 , v 2 } with minimum distance to d [10]. that several of the routes in collected data are dead paths at In any real-time network phenomena, a node requires the time of our measurement. some metrics to navigate the information. These metrics Since network topology characterize with average node can be measured by either using knowledge of entire degree in the network but in case of geographic routing, network or using local knowledge of particular node. For specific path select by it, is more significant than entire our study, we consider a geographic routing protocol, i.e. network topology. To evaluate topology impact on geographic node-disjoint path routing protocol (GNPR) [6]. performance, we characterize the geographic route with This protocol is multipath in nature and it uses two path degree. It is define as the ratio of the summation of attributes for routing decision, i.e. direction and distance degree of intermediate nodes to the number of intermediate simultaneous. These attributes used in compass and greedy nodes present between the source-destination of the route. routing, respectively. The path degree reflects the possibilities to choose different Given three location information; own, neighbors and route per intermediate node. We characterize a metric, distance fraction for analysis of the network topology. It is destination, the node can find two nodes v1 and v 2 with a fraction of the Euclidian distance of a route to the smallest angle ∠duv1 and ∠duv2 and route greedily by geographic distance between the source-destination pair of choosing either v1 or v 2 , which is nearest in means of the route. The distance fraction reflects the degree to which the network route between two sensor nodes deviates from Euclidian distance, to the destination in the coordinate the straight geographic route between the nodes. A fraction space. When the procedure fail to determine route while of one would demonstrate a perfect match while a large void condition arise, it revert back to previous hop node fraction would show a circuitous route. and start route discovery with other next better option and summarized node where void condition occur for further path discovery. After discover sufficient node disjoint paths, it optimizes the path with some parameter like minimum path length or minimum end-to-end delay. The procedure of one iteration of GNPR is: GNPR (source_location, neighbor_list, destination_location) 0. Begin at source node s and start to explore the path (path_identifier) to destination t. 1. CR: Select two nodes (u, v) that minimize the angle ∠sut and ∠svt . 2. GR: Proceed to the neighbor in (u, v) that closest to t. 3. If no neighbor is available other than previous hop node Figure 3. CDF of distance fraction to different path degree routes. w at node x: a. Revert back to node w and summarized node x as block node. b. Select next greedy-compass choice rather than x. 4. Repeat step 1-3 till path s to t discover. © 2010 ACEEE 55 DOI: 01.IJNS.01.03.257
  • 4. ACEEE Int. J. on Network Security, Vol. 01, No. 03, Dec 2010 ACKNOWLEDGMENT The authors gratefully acknowledge the infrastructural and financial support from Indian Institute of information Technology, Allahabad, India. REFERENCES [1] I. Akyildiz, ”Wireless Sensor Networks: A Survey,” Computer Networks, vol. 38, no. 4, pp. 393-422, March 2002. [2] B. Karp and H. T. Kung, ”GPSR: Greedy Perimeter Stateless Routing for Wireless Networks,” in MobiCom ’00: Figure 4. CDF of minimum end-to-end RTT to different path Proceedings of the 6th annual international conference on degree routes. Mobile computing and networking. New York, NY, USA: ACM, 2000, pp. 243-254. Using GNPR protocol, we find out all node disjoint [3] F. Kuhn, R. Wattenhofer, Y. Zhang, and A. Zollinger, paths for every source to destination. These node-disjoint ”Geometric adhoc routing: of theory and practice,” in paths classified by the path degree. This difference between PODC ’03: Proceedings of the twenty-second annual the three groups of source nodes is imitated in the symposium on Principles of distributed computing. New cumulative distribution function of the distance fraction for York, NY, USA: ACM, 2003, pp. 63-72. the three cases of path degree selection. As shown in Fig. 1, [4] B. Leong, B. Liskov, and R. Morris, ”Geographic routing the distance fraction tends to be the smallest for routes that without planarization,” in NSDI ’06: Proceedings 3rd Symposium on Networked Systems Design and have higher path degree and the largest for routes that have Implementation, San Jose, CA, May 2006. medium path degree because of path degree route with 5 to [5] Madhulika, A. Kumar, and S. Varma, ”Iterative and 10 has less concavity. Distributed Rangefree Localization Algorithm for Wireless Finally, we analyze the correlation between path degree Sensor Networks”. in IMPACT ’09: Proceedings and the end-to-end delay along a route. Though path degree International Conference on Multimedia, Signal Processing by itself cannot present any information about several and Communication Technologies, Aligarh, India, March performance characteristics like congestion along a path, 2009. bandwidth, the linearized distance of a route does impose a [6] A. Kumar, and S. Varma, ”Geographic Node-Disjoint Path minimum delay along a route. Fig. 2 illustrates the Routing for Wireless Sensor Networks,” IEEE Sensors Journal, vol. 10, no. 6, pp. 1138-1139, June, 2010. relationship of the minimum RTT along a route to the path [7] P. Bose, P. Morin, I. Stojmenovic’, and J. Urrutia, ”Routing degree of a route and the geographic distance between the with guaranteed delivery in ad hoc wireless networks,” in end-nodes. We make two vital observations. First, at small Wireless Networks, vol. 7, 1999, pp. 48-55. values of the path degree there exists correlation between [8] D. Chen and P. K. Varshney, ”A survey of void handling the delay and path degree for a large fraction of end-nodes techniques for geographic routing in wireless networks,” especially for small values of path degree. Second, Communications Surveys and Tutorials, IEEE, vol. 9, no. 1, linearized distance along a route does impose a minimum pp. 50-67, 2007. end-to-end RTT that is an important performance metric [9] J. M. Kleinberg, ”Navigation in a small world,” Nature, vol. for real-time latency sensitive applications. 406, no. 6798, August 2000. [10] P. Morin, ”Online Routing in Geometric Graphs”. PhD thesis, Carleton University School of Computer Science, CONCLUSIONS 2001. In this paper, we have discussed a simulation study for [11] S. M. Ross, ”Introduction to Probability and Statistics for Engineers and Scientists,” Second Edition, 2nd ed., examining the impact of network connectivity and Academic Press, January 2000. topology on geographic routing performance. Under this, [12] E. Kranakis, H. Singh, and J. Urrutia, ”Compass routing on the effect of the geographic locations and network topology geometric networks,” in Proc. 11 th Canadian Conference on of end-nodes on the circuitousness of route is studied. The Computational Geometry, Vancouver, August 1999, pp. 51- results provide the understanding of circuitousness of 54. routes discovered by geographic node- disjoint path routing protocol in simulated network with different path degree. Finally, we find the correlation between the minimum end- to-end delay and the path degree along their route. © 2010 ACEEE 56 DOI: 01.IJNS.01.03.257