13.07.2015 Views

Page 2 Lecture Notes in Computer Science 2865 Edited by G. Goos ...

Page 2 Lecture Notes in Computer Science 2865 Edited by G. Goos ...

Page 2 Lecture Notes in Computer Science 2865 Edited by G. Goos ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

288 L. Hughes, K. Shumon, and Y. ZhangLocationDirection and LocationDeterm<strong>in</strong>ationLocationLocation andDirectionPKT Location PKT Transmission PKT Antenna PKTVerificationArea CreationSelectionFig. 1. CARP data flow diagram.2 CARPAll Cartesian Ad hoc Rout<strong>in</strong>g Protocols attempt to restrict transmission to thosenodes that lie between the source and the dest<strong>in</strong>ation. First, a directional antennais used to create a bound<strong>in</strong>g box with a horizontal beamwidth of 90 ◦ . Next, theprotocol is used to limit the number of forward<strong>in</strong>g nodes <strong>in</strong> the bound<strong>in</strong>g box <strong>by</strong>creat<strong>in</strong>g a transmission area. The source and dest<strong>in</strong>ation nodes are at oppositeends of the transmission area; each node with<strong>in</strong> the transmission area is referredto as an <strong>in</strong>termediate node. Acurrent node is a node that is forward<strong>in</strong>g a packet.Fig. 1 shows the CARP subsystems. When a source node is to transmita packet, it uses the Transmission Area Creation subsystem to determ<strong>in</strong>e thetransmission area. Antenna Selection is then employed to select the antennafac<strong>in</strong>g the dest<strong>in</strong>ation. The Location Verification subsystem of each <strong>in</strong>termediatenode determ<strong>in</strong>es whether the node is with<strong>in</strong> the transmission area; if it is, thesteps used <strong>by</strong> the source node are repeated. This process cont<strong>in</strong>ues until thepacket reaches the dest<strong>in</strong>ation 1 .In addition to its payload, a CARP packet consists of the source address,the dest<strong>in</strong>ation address, and transmission area <strong>in</strong>formation. At a m<strong>in</strong>imum, thetransmission area <strong>in</strong>formation is the address of the current node (x c ,y c ).3 Transmission Area with Limit<strong>in</strong>g AngleIf the transmission area has the same shape as the bound<strong>in</strong>g box, unnecessarytransmissions may occur especially <strong>in</strong> dense network. To reduce the number ofpotential <strong>in</strong>termediate nodes <strong>in</strong> the transmission area, the follow<strong>in</strong>g protocolattempts to restrict the size of the area <strong>by</strong> employ<strong>in</strong>g a limit<strong>in</strong>g angle.The limit<strong>in</strong>g angle, φ, def<strong>in</strong>es the shape of the transmission area betweenthe current node, C, and the dest<strong>in</strong>ation node, D, as shown <strong>in</strong> Fig. 2. Each<strong>in</strong>termediate node forms an angle φ i with the current node and the dest<strong>in</strong>ationnode.1 S<strong>in</strong>ce the dest<strong>in</strong>ation may move dur<strong>in</strong>g a transmission, a circular expected zone iscreated [7]. Unless otherwise <strong>in</strong>dicated, the expected zone and its related calculationsare beyond the scope of this paper.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!