Good afternoon everyone.

Slides:



Advertisements
Similar presentations
Design of a reliable communication system for grid-style traffic light networks Junghoon Lee Dept. of Computer science and statistics Jeju National University.
Advertisements

Mobility Increase the Capacity of Ad-hoc Wireless Network Matthias Gossglauser / David Tse Infocom 2001.
1 S4: Small State and Small Stretch Routing for Large Wireless Sensor Networks Yun Mao 2, Feng Wang 1, Lili Qiu 1, Simon S. Lam 1, Jonathan M. Smith 2.
Design Guidelines for Maximizing Lifetime and Avoiding Energy Holes in Sensor Networks with Uniform Distribution and Uniform Reporting Stephan Olariu Department.
1 Greedy Forwarding in Dynamic Scale-Free Networks Embedded in Hyperbolic Metric Spaces Dmitri Krioukov CAIDA/UCSD Joint work with F. Papadopoulos, M.
A Presentation by: Noman Shahreyar
Bidding Protocols for Deploying Mobile Sensors Reporter: Po-Chung Shih Computer Science and Information Engineering Department Fu-Jen Catholic University.
CS710 IEEE Transactions on vehicular technology 2005 A Distributed Algorithm for the Dead End Problem of Location Based Routing in Sensor Networks Le Zou,
Tufts Wireless Laboratory Tufts University School Of Engineering Energy-Efficient Structuralized Clustering for Sensor-based Cyber Physical Systems Jierui.
Geometry of large networks (computer science perspective) Dmitri Krioukov (CAIDA/UCSD) AIM, November 2011.
Phero-Trail: A Bio-inspired Location Service for Mobile Underwater Sensor Networks Luiz F. Vieira, Uichin Lee, Mario Gerla UCLA.
Volcano Routing Scheme Routing in a Highly Dynamic Environment Yashar Ganjali Stanford University Joint work with: Nick McKeown SECON 2005, Santa Clara,
Jie Gao Joint work with Amitabh Basu*, Joseph Mitchell, Girishkumar Stony Brook Distributed Localization using Noisy Distance and Angle Information.
An Implementation Framework for Trajectory-Based Routing in Ad Hoc Networks Murat Yuksel, Ritesh Pradhan, Shivkumar Kalyanaraman Electrical, Computer,
Reducing Congestion Effects in Wireless Networks by Multipath Routing Presented by Dian Zhang Lucian Popa, Costin Raiciu, University of California, Berkeley.
Yashar Ganjali, and Abtin Keshavarzian Presented by: Isaac Keslassy Computer Systems Laboratory Department of Electrical Engineering Stanford University.
1 Distributed Navigation Algorithms for Sensor Networks Chiranjeeb Buragohain, Divyakant Agrawal, Subhash Suri Dept. of Computer Science, University of.
Efficient Hop ID based Routing for Sparse Ad Hoc Networks Yao Zhao 1, Bo Li 2, Qian Zhang 2, Yan Chen 1, Wenwu Zhu 3 1 Lab for Internet & Security Technology,
Yashar Ganjali Joint work with: Abtin Keshavarzian June 4, 2003 Single-Path vs. Multi-Path Routing in Ad Hoc Networks.
Dept. of Computer Science Distributed Computing Group Asymptotically Optimal Mobile Ad-Hoc Routing Fabian Kuhn Roger Wattenhofer Aaron Zollinger.
1 Efficient Placement and Dispatch of Sensors in a Wireless Sensor Network Prof. Yu-Chee Tseng Department of Computer Science National Chiao-Tung University.
Adaptive Self-Configuring Sensor Network Topologies ns-2 simulation & performance analysis Zhenghua Fu Ben Greenstein Petros Zerfos.
On Self Adaptive Routing in Dynamic Environments -- A probabilistic routing scheme Haiyong Xie, Lili Qiu, Yang Richard Yang and Yin Yale, MR and.
1 Algorithms for Bandwidth Efficient Multicast Routing in Multi-channel Multi-radio Wireless Mesh Networks Hoang Lan Nguyen and Uyen Trang Nguyen Presenter:
Fundamental Lower Bound for Node Buffer Size in Intermittently Connected Wireless Networks Yuanzhong Xu, Xinbing Wang Shanghai Jiao Tong University, China.
Hongyu Gong, Lutian Zhao, Kainan Wang, Weijie Wu, Xinbing Wang
Energy Efficient Routing and Self-Configuring Networks Stephen B. Wicker Bart Selman Terrence L. Fine Carla Gomes Bhaskar KrishnamachariDepartment of CS.
A Simple and Effective Cross Layer Networking System for Mobile Ad Hoc Networks Wing Ho Yuen, Heung-no Lee and Timothy Andersen.
2008/2/191 Customizing a Geographical Routing Protocol for Wireless Sensor Networks Proceedings of the th International Conference on Information.
Introduction Research in wireless sensor network (WSN) is receiving lot of attention from the academia, as well as from industries, because of the enormous.
A novel gossip-based sensing coverage algorithm for dense wireless sensor networks Vinh Tran-Quang a, Takumi Miyoshi a,b a Graduate School of Engineering,
College of Engineering Non-uniform Grid- based Coordinated Routing Priyanka Kadiyala Major Advisor: Dr. Robert Akl Department of Computer Science and Engineering.
Scalable Data Aggregation for Dynamic Events in Sensor Networks Kai-Wei Fan Kai-Wei Fan, Sha Liu, and Prasun.
Improving Capacity and Flexibility of Wireless Mesh Networks by Interface Switching Yunxia Feng, Minglu Li and Min-You Wu Presented by: Yunxia Feng Dept.
1 Oblivious Routing in Wireless networks Costas Busch Rensselaer Polytechnic Institute Joint work with: Malik Magdon-Ismail and Jing Xi.
Efficient Deployment Algorithms for Prolonging Network Lifetime and Ensuring Coverage in Wireless Sensor Networks Yong-hwan Kim Korea.
On Energy-Efficient Trap Coverage in Wireless Sensor Networks Junkun Li, Jiming Chen, Shibo He, Tian He, Yu Gu, Youxian Sun Zhejiang University, China.
1 A Bidding Protocol for Deploying Mobile Sensors GuilingWang, Guohong Cao, and Tom LaPorta Department of Computer Science & Engineering The Pennsylvania.
ENERGY-EFFICIENT FORWARDING STRATEGIES FOR GEOGRAPHIC ROUTING in LOSSY WIRELESS SENSOR NETWORKS Presented by Prasad D. Karnik.
Small-Scale and Large-Scale Routing in Vehicular Ad Hoc Networks Wenjing Wang 1, Fei Xie 2 and Mainak Chatterjee 1 1 School of Electrical Engineering and.
Mobile Agent Migration Problem Yingyue Xu. Energy efficiency requirement of sensor networks Mobile agent computing paradigm Data fusion, distributed processing.
Secure and Energy-Efficient Disjoint Multi-Path Routing for WSNs Presented by Zhongming Zheng.
A Dead-End Free Topology Maintenance Protocol for Geographic Forwarding in Wireless Sensor Networks IEEE Transactions on Computers, vol. 60, no. 11, November.
S& EDG: Scalable and Efficient Data Gathering Routing Protocol for Underwater Wireless Sensor Networks 1 Prepared by: Naveed Ilyas MS(EE), CIIT, Islamabad,
Retrieval-Guaranteed Location-Aware Information Brokerage Scheme in 3D Wireless Ad Hoc Networks.
Tufts Wireless Laboratory School Of Engineering Tufts University Paper Review “An Energy Efficient Multipath Routing Protocol for Wireless Sensor Networks”,
Ching-Ju Lin Institute of Networking and Multimedia NTU
An Energy-Efficient Geographic Routing with Location Errors in Wireless Sensor Networks Julien Champ and Clement Saad I-SPAN 2008, Sydney (The international.
Po-Yu Chen, Zan-Feng Kao, Wen-Tsuen Chen, Chi-Han Lin Department of Computer Science National Tsing Hua University IEEE ICPP 2011 A Distributed Flow-Based.
SHORT: Self-Healing and Optimizing Routing Techniques for Mobile Ad Hoc Networks Presenter: Sheng-Shih Wang October 30, 2003 Chao Gui and Prasant Mohapatra.
On Optimal Geographic Routing in Wireless Networks with Holes and Non-Uniform Traffic Sundar Subramanian, Sanjay Shakkottai and Piyush Gupta INFOCOM 2007.
A Load-Balanced Guiding Navigation Protocol in Wireless Sensor Networks Wen-Tsuen Chen Department of Computer Science National Tsing Hua University Po-Yu.
FERMA: An Efficient Geocasting Protocol for Wireless Sensor Networks with Multiple Target Regions Young-Mi Song, Sung-Hee Lee and Young- Bae Ko Ajou University.
Load Balanced Link Reversal Routing in Mobile Wireless Ad Hoc Networks Nabhendra Bisnik, Alhussein Abouzeid ECSE Department RPI Costas Busch CSCI Department.
SenSys 2003 Differentiated Surveillance for Sensor Networks Ting Yan Tian He John A. Stankovic Department of Computer Science, University of Virginia November.
Incremental Run-time Application Mapping for Heterogeneous Network on Chip 2012 IEEE 14th International Conference on High Performance Computing and Communications.
Younghwan Yoo† and Dharma P. Agrawal‡ † School of Computer Science and Engineering, Pusan National University, Busan, KOREA ‡ OBR Center for Distributed.
On Mobile Sink Node for Target Tracking in Wireless Sensor Networks Thanh Hai Trinh and Hee Yong Youn Pervasive Computing and Communications Workshops(PerComW'07)
Peter Pham and Sylvie Perreau, IEEE 2002 Mobile and Wireless Communications Network Multi-Path Routing Protocol with Load Balancing Policy in Mobile Ad.
Efficient Placement and Dispatch of Sensors in a Wireless Sensor Network You-Chiun Wang, Chun-Chi Hu, and Yu-Chee Tseng IEEE Transactions on Mobile Computing.
Efficient Geographic Routing in Multihop Wireless Networks Seungjoon Lee*, Bobby Bhattacharjee*, and Suman Banerjee** *Department of Computer Science University.
ProgessFace: An Algorithm to Improve Routing Efficiency of GPSR-like Routing Protocols in Wireless Ad Hoc Networks Chia-Hung Lin, Shiao-An Yuan, Shih-Wei.
Distributed Localization Using a Moving Beacon in Wireless Sensor Networks IEEE Transactions on Parallel and Distributed System, Vol. 19, No. 5, May 2008.
VADD: Vehicle-Assisted Data Delivery in Vehicular Ad Hoc Networks Zhao, J.; Cao, G. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 鄭宇辰
An Efficient Real-Time Routing with Presence of Concave Voids in Wireless Sensor Networks Mohamed Aissani Abdelhamid Mellouk, Nadjib Badache, and Brahim.
Prof. Yu-Chee Tseng Department of Computer Science
Confluent vs. Splittable Flows
Virtual Domain and Coordinate Routing in Wireless Sensor Networks
Surviving Holes and Barriers in Geographic Data Reporting for
Totally Disjoint Multipath Routing in Multihop Wireless Networks Sonia Waharte and Raoef Boutaba Presented by: Anthony Calce.
Presentation transcript:

Load Balanced Routing with Constant Stretch for Wireless Sensor Network with Holes Good afternoon everyone. My present today is about a load balanced routing with constant stretch for wireless sensor network with holes Nguyen Phi Le, Nguyen Duc Trong and Nguyen Khanh Van Ha Noi University of science and technology

Agenda Background Related works Problem statement and goals Proposed scheme Strategy to choose the forbidding area Hole bypassing routing protocol Performance evaluation Conclusion and future work This is the agenda. Firstly, I introduce the background of our research and the related works, And then, describe our routing protocol and evaluate the performance of it. Finally, I conclude my presentation and introduce our future work

Agenda Background Related works Problem statement and goals Strategy to choose the forbidding area Our proposed routing scheme Performance evaluation Conclusion and future work This is the agenda. Firstly, I introduce the background of our research and the related works, And then, describe our routing protocol and evaluate the performance of it. Finally, I conclude my presentation and introduce our future work

Background Geographic routing Uses location information of the nodes Each node knows the location of the neighbors and the destination Achieves near optimal path with network without holes

Background Geographic routing with holes Hole diffusion problem As you know, geographic routing is a popular approach and used widely in sensor network as it is very simple and scalable. For networks without of the holes, geographic routing can achieve a near optimal routing path. But for networks with holes, geographic routing faces some critical problems. One of that is the hole diffusion problem. like this. What you see in the slide is a network with a hole in the center. When the source and the destination stay in two side of the hole, the packet tends to be routed along the node on the hole boundary like this. Thus, the boundary nodes are imposed a more traffic than the others and the energy of these node will run out quickly and become dead nodes. And then, the hole is enlarged like this.

Background Geographic routing with holes Hole diffusion problem Routing path enlargement problem Another problem is routing path enlargement. As the nodes don’t know about the presence of the hole in advance and the packet is route a long the boundary of the hole. The routing path tends to be enlarged. For example, As you can see in the slide, the red line is the routing path. This path is longer than this optimal path.

Background Common approach Constructing a forbidding area around the hole Nodes know the hole in advance Routing the packet along optimal path outside the forbidding area So , To cope with these two problem of the geographic routing with hole, a common approach is to build a forbidding area around the hole, Disseminate information of this forbidding area to the node in the network, so, they can know about the hole in advance. When a source node which has knowledge of the hole want to send a packet, it can calculate the optimal path bypassing the forbidding area And the packet is routed along this optimal path.

Agenda Background Related works Problem statement and goals Strategy to choose the forbidding area Our proposed routing scheme Performance evaluation Conclusion and future work This is the agenda. Firstly, I introduce the background of our research and the related works, And then, describe our routing protocol and evaluate the performance of it. Finally, I conclude my presentation and introduce our future work

Related works Target the hole diffusion problem Virtual hexagon [H.Choo, ICOIN’11] Virtual Circle [F.Yu, JCN 2009] The forbidding area is very simple The dissemination cost is small Virtual ellipse [Y.Tian, ICC’08] There are several related works have been done on this area. In the slide are three researches which target the problem of hole diffusion. In these ones, The author create a forbidding area with very simple shape, like a hexagon, a circle, a ellipse. The pros of these approaches is the information describe the forbidding area is very simple and thus the cost to dissemination infromation of the forbidding area is small. These approaches somehow solves the problem of hole diffusion but

Related works Hole diffusion problem has not been solved thoroughly Static forbidding area Traffic is concentrated around the forbidding area Routing path is enlarged in some cases It can not solve that problem thoroughly Because, the forbidding area is static, Thus, instead of the hole boundary, the traffic is imposed on the boundary of the forbidding area. Another problem is that, For some kind of network, the difference between the hole and the forbidding area is very large, and this difference cause the enlargment of the routing path as you can see in the slide

Data congestion on the boundary of the convex hull Related works Target the routing path enlargement problem S D GOAL [Transaction on parallel and distributed computing, 2011] Visibility graph [G.Tan, infocom 2009] Constant stretch Here is another work, where author proposed a hole bypassing routing protocol with a constant stretch. In this work, the convex hull of the hole is used as the forbidding area. And the packet is routed along the vertices of the convex hull. With this protocol, the routing path can achieved a constant stretch, But, the data congestion is occurred on the boundary of the convex hull Hole BUT Convex hull Data congestion on the boundary of the convex hull

Agenda Background Related works Problem statement and goals Strategy to choose the forbidding area Our proposed routing scheme Performance evaluation Conclusion and future work This is the agenda. Firstly, I introduce the background of our research and the related works, And then, describe our routing protocol and evaluate the performance of it. Finally, I conclude my presentation and introduce our future work

Problem statement Hole diffusion problem has not been solved thoroughly Static forbidding area Traffic is concentrated around the forbidding area None of the existing schemes solves both of the two problems So, As you can see, The problem of the existing researches are that: First, the hole diffusion problem has not been solvef throughly And , non of the ….

Goal Finding the optimal forbidding area Constant stretch Load balancing Small dissemination cost Propose a hole bypassing routing scheme which Has a constant stretch Solves the problem of hole diffusion thoroughly So, We have two goals in this research. First, as there are many shape like circle, ellipse, hexagon, convex hull has been chosen to be the forbidding area, We want to find, what is the optimal forbidding area. And then, using that optimal forbirding area, we proposa a hole ….

Agenda Background Related works Problem statement and goals Strategy to choose the forbidding area Our proposed routing scheme Performance evaluation Conclusion and future work This is the agenda. Firstly, I introduce the background of our research and the related works, And then, describe our routing protocol and evaluate the performance of it. Finally, I conclude my presentation and introduce our future work

Theoretical model Considering networks with only one hole Modeling the geographic S-D routing path as the Euclidean line between S and D Real geographic routing path Euclidean routing path Firstly, we will describe our theoretical model. In this research, we consider networks which contain only one hole And we assume that, the network is dense of sensors everywhere apart from the considered hole, Then with this assumption, we can model the shortest routing path from S to D as the shortest euclidean line between S and D. For example, This is the hole, the black line is the real routing path , we approximate this routing path by the euclidean path, which is represented by this red line.

Theoretical model Euclidean stretch of the forbidding area to the hole And, now is the definition of the euclidean stretch of a forbidding area to the hole. Assume this is a hole, and it is covered by this forbidding area. For this pair of S and D, This is the shortest euclidean routing path bypassing the hole and this is the euclidean routing path which bypassed the forbidding area. Then the stretch of the forbidding area to the hole is the ratio of the length of the euclidean path bypassing the forbidding area to the length of the shortest euclidean routing path bypassing the hole. Hole 𝐸𝑢𝑐𝑙𝑖𝑑𝑒𝑎𝑛 𝑠𝑡𝑟𝑒𝑡𝑐ℎ= max ∀(𝑆,𝐷) 𝑆 𝐴 𝑖 …𝐴 𝑗 𝑆 𝐻 𝑙 … 𝐻 𝑘 Forbidding area Shortest Euclidean routing path bypassing the hole Euclidean routing path bypassing the forbidding area

Strategy to choose the forbidding area Constant stretch Load balancing Small dissemination cost

Strategy to choose the forbidding area The shortest Euclidean path bypassing a polygon broken line through the vertices of the convex hull Now we will see what is the optimal forbidding area. Firstly, we will find what kind of the forbidding area can achieve the best routing path stretch. We found that, for an arbitrary polygon, then the shortest euclidean path bypasing the polygon is the broken line through the vertices of the convex hull of that polygon. Please look at the slide. This is a polygon And this is the convex hull of the polygon. Then, for any pair of source and destination which stay on opposite sides of the polygon, The shortest euclidean path from source and destination is the broken line which connect the source, destination, and the vertices of the convex hull. Convex hull of polygon P: a convex polygon which covers P and its vertices are the vertices of P

Strategy to choose the forbidding area The shortest Euclidean path bypassing a polygon broken line through the vertices of the convex hull Is the convex hull the best forbidding area ??? The Euclidean stretch of the convex hull to the hole is 1 Now we will see what is the optimal forbidding area. Firstly, we will find what kind of the forbidding area can achieve the best routing path stretch. We found that, for an arbitrary polygon, then the shortest euclidean path bypasing the polygon is the broken line through the vertices of the convex hull of that polygon. Please look at the slide. This is a polygon And this is the convex hull of the polygon. Then, for any pair of source and destination which stay on opposite sides of the polygon, The shortest euclidean path from source and destination is the broken line which connect the source, destination, and the vertices of the convex hull.

Strategy to choose the forbidding area The shortest Euclidean path bypassing a polygon broken line through the vertices of the convex hull The number of the vertices of the convex hull maybe very large The dissemination cost is large too The reason is that, the verties number of the convex hull maybe very large and dissemination the information of convex hull to the node in the network may consume a great network resource.

Strategy to choose the forbidding area The forbidding area should be a convex polygon Hole bypassing routing path Although the convex hull is not the optimal forbidding area, it is clear that, the optimal forbidding area should be a convex polygon, not a concave polygon. Like this And the routing path which bypass the forbidding are should be the path along the broken line connecting Hole Forbidding area

Strategy to choose the forbidding area If P is a n-gon with equal angles such that P covers the hole and each edge of P contains at least one vertex of the hole, then Euclidean stretch of P to the hole is upper bounded by 1 sin (𝑛−2)𝜋 2𝑛 We choose the octagon with the equal angles as the forbidding area The Euclidean stretch does not exceed 1 sin 3𝜋 8 We found another fact that, … Ok, so the conclusion is that: The forbidding area should be an octagon with all angles is the same, With this kind of forbidding area, we need only 8 vertices to represent it and we can assure that the E-stretch does not exceed ….

Strategy to choose the forbidding area Constant stretch Load balance Small dissemination cost Traffic concentration around the boundary of the forbidding area Hole Forbidding area

Strategy to choose the forbidding area The Euclidean stretch depends on Perimeter of the forbidding area Distance between the source and the destination The larger the distance, the smaller the Euclidean stretch The Euclidean stretch does not depends on The position of the forbidding area Dynamic forbidding area The size and the position are packet specific Fortunately, We found that, The e-stretch of a forbidding area to the hole depends only on its perimeter and the distance of the source and the destination. And, with the same forbiding area , the source-destination with further distance will achieve a smaller stretch. So, we decide to chose a dynamic forbidding area, which has the size and the position specified by each packet. Like this, If the soure and destination near to each other, then they will use a small forbidding area, And if the source and destination far from each other, they will use a big forbidding area

Agenda Background Related works Problem statement and goals Strategy to choose the forbidding area Our proposed routing scheme Performance evaluation Conclusion and future work This is the agenda. Firstly, I introduce the background of our research and the related works, And then, describe our routing protocol and evaluate the performance of it. Finally, I conclude my presentation and introduce our future work

Proposed protocol detail Initial network setup Hole bypassing protocol Now, I will describe our routing protocol in detail Our protocol consists of two phases: initial network setup and routing protocol

Proposed protocol detail Initial network setup Identifying hole boundary Determining core polygon Disseminating information of core polygon to a restricted area Hole bypassing protocol 1. Identifying hole boundary 2. Determining core polygon 3. Disseminating core polygon 4. Hole bypassing protocol

Initial network setup Core polygon construction Here is the way to construc the core polygon. Firstly, we construct 1. Construct a rectangle circumscribing the hole 2. Construct another rectangle circumscribing the hole with edge directions of angle of 3𝜋 4 to the first

Initial network setup Core polygon construction 3. The intersections of the two rectangles form the core polygon

Initial network setup Core polygon information dissemination Region 1 Region 2 Dissemination area is restricted by predefined threshold δ 𝑃 𝐶 𝑙(𝑁) 0.3 𝛽(𝑁) +1 + 1 𝛽(𝑁) ≤ 1 sin 3𝜋 8 +𝛿 pC: perimeter of the core polygon; l(N): distance from N to the core polygon ; β(N): view limit from N to the core polygon

Proposed protocol detail Initial network setup Identifying hole boundary Determining core polygon Disseminating information of core polygon to a restricted area Hole bypassing protocol 1. Identifying hole boundary 2. Determining core polygon 3. Disseminating core polygon 4. Hole bypassing protocol

Hole bypassing protocol The packet is initiated in region 2 Region 1 Region 2

Hole bypassing protocol The packet is initiated in region 1 (or arrived at a node in region 1) Region 1 I Region 2 Determines the forbidding area (A-polygon): Image of the core polygon through a homothetic transformation The center is chosen randomly The scale factor 𝜉> 1 is computed based on source-destination distance

Hole bypassing protocol The packet is initiated in region 1 (or arrived at a node in region 1) Region 1 I Region 2 Random selection of I ↓ Forbidding area is different per packet Scale factor is computed based on the source-destination distance ↓ Constant stretch of routing path

Hole bypassing protocol The packet is initiated in region 1 (or arrived at a node in region 1) Region 1 I Region 2 Determines shortest Euclidean path which bypasses the A-polygon Virtual anchors: vertices of A-polygon Routes the packet to the virtual anchors

Agenda Background Related works Problem statement and goals Strategy to choose the forbidding area Our proposed routing scheme Performance evaluation Conclusion and future work This is the agenda. Firstly, I introduce the background of our research and the related works, And then, describe our routing protocol and evaluate the performance of it. Finally, I conclude my presentation and introduce our future work

Performance evaluation Theoretical analysis Proves the constant Euclidean stretch of the proposed protocol Simulation Compares performance with existing protocols

Theoretical analysis Constant stretch Euclidean stretch does not exceed to 1 sin⁡( 3𝜋 8 ) +𝛿 (~1.09+δ) ( 𝛿: predefined parameter) 𝑆 𝐴 𝑖 …𝐴 𝑗 𝑆 𝐻 𝑙 … 𝐻 𝑘 < 1 sin⁡( 3𝜋 8 ) +𝛿

Simulation Benchmarks Evaluation metrics Virtual Circle [F.Yu, transaction on communication and network 2009] Virtual hexagon [H.Choo, ICOIN’11] Convex hull [Transaction on parallel and distributed computing, 2011] Evaluation metrics Stretch in hop-count The ratio between the hop-count of the routing path using routing protocol and the optimal routing path. Energy consumption of individual sensor nodes Energy overhead The extra energy caused by the initial network setup phase in our protocol.

Simulation Simulation scenario Simulator :NS2 Network area: 1000m x 1000m Sensor nodes: 1500 Number of the hole: 1 Number of the vertices of the hole: 52 Simulation time: 500s Number of source-destination pair: 100 pairs Packet transmission frequency: 1packet/1s (Victor Shnayder et al., Simulating the power consumption of large scale sensor network applications, SenSys’04 )

Simulation Simulation result Stretch Smaller than “virtual hexagon”, “virtual circle” Greater than “Goal” but the difference is not much Less than 1.2 (with δ=1) Does not increase when decreasing the distance between source- destination

Simulation Simulation result Energy consumption of individual sensor nodes “Goal” is the worst The proposed scheme is the most balanced compared to the existing protocols GOAL Proposed scheme(𝛿=1) Virtual hexagon Virtual circle

Simulation Simulation result Energy overhead Decreases with the increasing of the stretch Just accounts for only 0.095% of the entire energy even in the worst case

Agenda Background Related works Problem statement and goals Strategy to choose the forbidding area Our proposed routing scheme Performance evaluation Conclusion and future work This is the agenda. Firstly, I introduce the background of our research and the related works, And then, describe our routing protocol and evaluate the performance of it. Finally, I conclude my presentation and introduce our future work

Conclusion and future work We proposed a routing protocol to bypass the hole Solves the problem of hole diffusion Ensures a constant stretch Euclidean stretch <1.09+𝛿 , theoretically Proposed scheme outperforms existing protocols by simulation Hop-count stretch <1.2 (with 𝛿=1) Future work Consider the network with multiple holes Compare performance of our protocol with non-geographic routing protocols

Thank you for your attention !