Sensor Network Routing: Romit Roy Choudhury and Pradeep Kyasanur
Sensor Network Routing: Romit Roy Choudhury and Pradeep Kyasanur
S E
F
B
C
D
A G
H
SSR
Table-driven Routing Protocols
Each node maintains a routing table
Contains routes to all nodes in the network
C B 2 C-588
D B 3 D-312
A
B C D
S E
F
B
C
D
A G
H
S E
F
B
C
D
A G
H
S E
F
B
C
D
A G
H
S E
F
B
C
D
A G
H
S E
F
B
C
D
A G
H
S E
F
B
C
D
A G
H
S E
F
B
C
D
A G
H
S E
F
B
C
D
A G
H
S E
F
B
C
D
A G
H
A B F
C E G
A B F
C E G
A B F
C E G Represents a
link that was
reversed recently
A B F
C E G Represents a
link that was
reversed recently
A B F
C E G Represents a
link that was
reversed recently
A B F
C E G Represents a
link that was
reversed recently
A B F
C E G
C E
F
B
J HOLE
D
S A G
I
H
Problem with GPSR Approach
Maintaining perimeter graph expensive,
especially in sensor networks
Identifying holes (and boundary around
holes) useful for routing around them
Also useful for path migration, information
storage
Node where packets get stuck (due to a
hole) define the boundary around holes
Definitions
Weak stuck node P P is the closest node
to node Q (among Ps neighbors), and Q
is out of range of P
Q is called black node
J
P
Q
H
Definitions
Strong stuck node P P is closest node to
point Q, and Q is out of range of P
Collection of Qs is called black region
P
Q
Black Region
H
Proposed Algorithms
TENT rule enables detection of strongly
stuck nodes
P
O
H
Proposed Algorithms
BOUNDHOLE- identifies the boundary of a
hole
Start with a stuck node, and sweep
counter-clockwise
Move from stuck node to stuck node till the
originating node is reached, completing
loop
Discussion
Identifying holes useful for many
applications