CN112188582B - Reliable routing method for lattice network based on physical perception information - Google Patents
Reliable routing method for lattice network based on physical perception information Download PDFInfo
- Publication number
- CN112188582B CN112188582B CN202010928200.9A CN202010928200A CN112188582B CN 112188582 B CN112188582 B CN 112188582B CN 202010928200 A CN202010928200 A CN 202010928200A CN 112188582 B CN112188582 B CN 112188582B
- Authority
- CN
- China
- Prior art keywords
- node
- boundary
- obstacle
- data
- packet
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 51
- 230000008447 perception Effects 0.000 title claims abstract description 12
- 230000005540 biological transmission Effects 0.000 claims abstract description 15
- 238000011084 recovery Methods 0.000 claims abstract description 11
- 230000004888 barrier function Effects 0.000 claims abstract 11
- 239000011159 matrix material Substances 0.000 claims abstract 2
- 230000002159 abnormal effect Effects 0.000 claims description 8
- 102100029469 WD repeat and HMG-box DNA-binding protein 1 Human genes 0.000 claims 1
- 101710097421 WD repeat and HMG-box DNA-binding protein 1 Proteins 0.000 claims 1
- 238000010586 diagram Methods 0.000 description 4
- 238000004891 communication Methods 0.000 description 3
- 238000001514 detection method Methods 0.000 description 3
- 230000006855 networking Effects 0.000 description 2
- 235000008694 Humulus lupulus Nutrition 0.000 description 1
- 238000013459 approach Methods 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000007812 deficiency Effects 0.000 description 1
- 238000011160 research Methods 0.000 description 1
- 238000012552 review Methods 0.000 description 1
- 230000008054 signal transmission Effects 0.000 description 1
- 230000003068 static effect Effects 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W40/00—Communication routing or communication path finding
- H04W40/02—Communication route or path selection, e.g. power-based or shortest path routing
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W40/00—Communication routing or communication path finding
- H04W40/02—Communication route or path selection, e.g. power-based or shortest path routing
- H04W40/12—Communication route or path selection, e.g. power-based or shortest path routing based on transmission quality or channel quality
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W40/00—Communication routing or communication path finding
- H04W40/24—Connectivity information management, e.g. connectivity discovery or connectivity update
- H04W40/248—Connectivity information update
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
Description
技术领域technical field
本发明涉及一种基于物理感知信息的点阵网络可靠路由方法。The invention relates to a reliable routing method of a lattice network based on physical perception information.
背景技术Background technique
障碍物是影响无线传输质量的重要因素。当可移动障碍物遮挡无线信号传输路径时,可能导致部分节点无法正常与其他节点通信,从而导致突发的路由空洞。目前路由协议主要可分为基于拓扑的,如文献[1]O.Gnawali,R.Fonseca,K.Jamieson,M.Kazandjieva,D.Moss,and P.Levis,“Ctp:An efficient,robust,and reliable collection treeprotocol for wireless sensor networks,”ACM Transactions on Sensor Networks,vol.10,no.1,pp.1–49,2013(O.Gnawali,R.Fonseca,K.Jamieson,M.Kazandjieva,D.Moss,和P.Levis,“Ctp:一种高效、健壮和可靠的无线传感器网络收集树协议,”ACM传感器网络汇刊,第10卷,第1期,第1页到第49页,2013),的和基于地理位置的,如文献[2]B.Karp andH.T.Kung,“Gpsr:greedy perimeter stateless routing for wireless networks,”inProceedings of the 6th annual international conference on Mobile computingand networking(MobiCom),2000,p.243–254(B.Karp和H.T.Kung,“无线网络中的贪心边缘无状态路由,”第六届移动计算和网络国际年会会议记录(MobiCom),2000,第243页到第254页)。基于拓扑的方法大多要求节点维护一个动态的全局传输开销(如到达汇聚节点的跳数、传输次数等),并选择开销最低的路径。基于地理位置的方法则依赖于节点的地理位置,选择距离汇聚节点最近的节点进行转发。如文献[3]A.Mostefaoui,M.Melkemi,andA.Boukerche,“Localized routing approach to bypass holes in wireless sensornetworks,”IEEE Transactions on Computers,vol.63,no.12,pp.3053–3065,2014(A.Mostefaoui,M.Melkemi,和A.Boukerche,“无线传感器网络中本地化绕洞路由方法,”IEEE计算机汇刊,第63卷,第12期,第3053页到第3065页,2014)所述,基于地理位置的方法会遇到“局部最小化”问题,即所有邻居节点距离汇聚节点的距离都比自身更大。该问题仅在路由空洞(空洞内部没有节点)的边缘才会发生。基于地理位置的路由协议一般通过左手和/或右手法则绕过空洞,如文献[4]H.Huang,H.Yin,G.Min,J.Zhang,Y.Wu,and X.Zhang,“Energy-aware dual-path geographic routing to bypass routing holes inwireless sensor networks,”IEEE Transactions on Mobile Computing,vol.17,no.6,pp.1339–1352,2018(H.Huang,H.Yin,G.Min,J.Zhang,Y.Wu,和X.Zhang,“无线传感器网络中能量感知双路绕洞地理路由,”IEEE移动计算汇刊,第17卷,第6期,第1339页到1352页,2018)。然而,现有基于地址位置的路由协议大多假设该空洞是静态的,对于动态出现的空洞缺乏有效的快速检测和恢复手段。而基于拓扑的路由协议往往采用链路质量估计器对通信质量进行动态采样,如文献[5]N.Baccour,A.L.Mottola,M.A.H.Youssef,C.A.Boano,and M.Alves,“Radio link quality estimation in wirelesssensor networks:A survey,”ACM Transactions on Sensor Networks,vol.8,no.4,pp.1–33,2012(N.Baccour,A.L.Mottola,M.A.H.Youssef,C.A.Boano,和M.Alves,“无线传感器网络中无线链路质量估计研究综述,”ACM传感器网络汇刊,第8卷,第4期,第1页到第33页,2012)。所存在的问题主要包括:(1)现有方法大多依赖于对历史数据包发送情况统计估计链路质量,对突发路由空洞检测的延迟很大;(2)基于拓扑的方法需要节点间交换链路质量估计结果计算全局传输开销,进一步加大了路由空洞恢复的延迟。文献[6]M.Xia,B.Liu,Y.H.Hu,K.Chi,X.Wang,and J.Liu,“Pace:Physical-assistedchannel estimation,”IEEE Transactions on Wireless Communications,vol.19,no.6,pp.3769–3781,2020(M.Xia,B.Liu,Y.H.Hu,K.Chi,X.Wang,和J.Liu,“Pace:物理辅助信道估计,”IEEE无线通讯汇刊,第19卷,第6期,第3769页到3781页,2020)提出了一种使用传感器物理感知信息进行链路质量估计的方法,较好的解决了现有链路质量估计器难以对突然出现的障碍物引起的链路质量变化进行实时估计的问题。然而,该方法无法解决问题(2),当移动障碍物导致突发路由空洞时,无法完全避免数据传输失败。Obstacles are an important factor affecting the quality of wireless transmission. When movable obstacles block the wireless signal transmission path, some nodes may not be able to communicate with other nodes normally, resulting in sudden routing holes. At present, routing protocols can be mainly divided into topology-based, such as literature [1] O.Gnawali, R.Fonseca, K.Jamieson, M.Kazandjieva, D.Moss, and P.Levis, "Ctp: An efficient, robust, and reliable collection treeprotocol for wireless sensor networks,"ACM Transactions on Sensor Networks,vol.10,no.1,pp.1–49,2013(O.Gnawali,R.Fonseca,K.Jamieson,M.Kazandjieva,D.Moss , and P. Levis, "Ctp: An Efficient, Robust, and Reliable Collection Tree Protocol for Wireless Sensor Networks," ACM Transactions on Sensor Networks, Vol. 10, No. 1, pp. 1 to 49, 2013), and location-based, as in [2] B.Karp and H.T.Kung, "Gpsr: greedy perimeter stateless routing for wireless networks," in Proceedings of the 6th annual international conference on Mobile computing and networking (MobiCom), 2000, p.243–254 (B.Karp and HTKung, "Greedy Edge Stateless Routing in Wireless Networks," Proceedings of the 6th International Annual Conference on Mobile Computing and Networking (MobiCom), 2000, pp. 243 to 254) . Most of the topology-based methods require nodes to maintain a dynamic global transmission cost (such as the number of hops to the sink node, the number of transmissions, etc.), and select the path with the lowest cost. The method based on geographic location relies on the geographic location of the node, and selects the node closest to the sink node for forwarding. For example [3] A. Mostefaoui, M. Melkemi, and A. Boukerche, "Localized routing approach to bypass holes in wireless sensor networks," IEEE Transactions on Computers, vol.63, no.12, pp.3053–3065, 2014 ( A. Mostefaoui, M. Melkemi, and A. Boukerche, "Localized Hole Routing Method in Wireless Sensor Networks," IEEE Transactions on Computing, Vol. 63, No. 12, pp. 3053-3065, 2014) As mentioned above, geographic location-based methods suffer from a "local minimization" problem, that is, all neighbor nodes are farther away from the sink node than themselves. The problem only occurs at the edges of routing holes (no nodes inside the holes). Geographical location-based routing protocols generally bypass holes through left-hand and/or right-hand rules, as described in [4] H.Huang, H.Yin, G.Min, J.Zhang, Y.Wu, and X.Zhang, "Energy -aware dual-path geographic routing to bypass routing holes inwireless sensor networks,”IEEE Transactions on Mobile Computing,vol.17,no.6,pp.1339–1352,2018(H.Huang,H.Yin,G.Min, J. Zhang, Y. Wu, and X. Zhang, "Energy-aware dual-path geo-routing around holes in wireless sensor networks," IEEE Transactions on Mobile Computing, Vol. 17, No. 6, pp. 1339 to 1352, 2018 ). However, most of the existing address-location-based routing protocols assume that the hole is static, and lack effective and fast detection and recovery methods for dynamically occurring holes. However, topology-based routing protocols often use link quality estimators to dynamically sample communication quality, such as literature [5] N.Baccour, A. L.Mottola, MA H. Youssef, CABoano, and M. Alves, “Radio link quality estimation in wireless sensor networks: A survey,” ACM Transactions on Sensor Networks, vol. 8, no. 4, pp. 1–33, 2012 (N. Baccour, A. L.Mottola, MA H. Youssef, CABoano, and M. Alves, "Review of Research on Wireless Link Quality Estimation in Wireless Sensor Networks," ACM Transactions on Sensor Networks, Vol. 8, No. 4, pp. 1-33, 2012). The existing problems mainly include: (1) Most of the existing methods rely on the statistical estimation of the link quality of the historical data packet transmission, and the delay of the burst routing hole detection is very large; (2) The topology-based methods require exchanges between nodes. The link quality estimation result calculates the global transmission cost, which further increases the delay of route hole recovery. Reference [6] M.Xia, B.Liu, YHHu, K.Chi, X.Wang, and J.Liu, "Pace: Physical-assisted channel estimation," IEEE Transactions on Wireless Communications, vol.19, no.6, pp.3769–3781, 2020 (M. Xia, B. Liu, YHHu, K. Chi, X. Wang, and J. Liu, "Pace: Physically Aided Channel Estimation," IEEE Transactions on Wireless Communications, Vol. 19, Issue 6, pages 3769 to 3781, 2020) proposed a method for link quality estimation using sensor physical perception information, which better solves the problem that existing link quality estimators are difficult to cause by sudden obstacles. The problem of real-time estimation of changes in link quality. However, this method cannot solve the problem (2), which cannot completely avoid the failure of data transmission when a moving obstacle causes a sudden routing hole.
发明内容SUMMARY OF THE INVENTION
为了克服已有技术的不足,本发明提供了一种基于物理感知信息的点阵网络可靠路由方法。该方法利用传感器障碍物检测信息,主动推断障碍物的位置和方向,并快速建立眼障碍物边界绕行的路由路径。从而有效避免突然出现障碍物导致的数据传输失败。In order to overcome the deficiencies of the prior art, the present invention provides a reliable routing method for a lattice network based on physical perception information. The method utilizes the sensor obstacle detection information to actively infer the location and direction of the obstacle, and quickly establish a routing path around the boundary of the eye obstacle. This effectively avoids data transmission failures caused by sudden obstacles.
本发明解决其技术问题所采用的技术方案包括:The technical scheme adopted by the present invention to solve its technical problems includes:
一种基于物理感知信息的点阵网络可靠路由方法,利用传感器数据使数据包转发沿障碍物边缘绕行,避免障碍物造成的数据传输失败,所述方法包括以下步骤:A reliable routing method for a lattice network based on physical perception information, using sensor data to forward data packets to detour along the edge of obstacles to avoid data transmission failures caused by obstacles, the method includes the following steps:
(1)节点标识(1) Node ID
根据传感器数据,将数据传输节点分为外部、内部和边界节点三类;对于外部节点,其传感器无法检测到障碍物;对于内部节点,其传感器检测到障碍物覆盖于其上方;对于边界节点,其传感器检测到障碍物位于节点侧面;According to the sensor data, the data transmission nodes are divided into three categories: external, internal and boundary nodes; for external nodes, their sensors cannot detect obstacles; for internal nodes, their sensors detect obstacles covering above them; for boundary nodes, Its sensor detects that the obstacle is on the side of the node;
(2)路由恢复(2) Route recovery
当边界节点收到来自于外部节点的数据包时,利用传感器数据判断障碍物是否位于本节点与汇聚节点之间,如是则设置自身为入口节点,并重新规划路径,通过在边界节点间转发数据,使数据包沿障碍物边缘绕行;在绕行过程中,如某个边界节点通过传感器数据判断该障碍物不再位于本节点与汇聚节点之间,设置自身为出口节点,结束绕行。When the border node receives the data packet from the external node, it uses the sensor data to judge whether the obstacle is located between the node and the sink node. If so, it sets itself as the entry node, and re-plans the path. , so that the data packet detours along the edge of the obstacle; in the detour process, if a boundary node judges that the obstacle is no longer located between the node and the sink node through sensor data, it sets itself as the exit node and ends the detour.
进一步,所述步骤(2)中,路由恢复中边界节点利用传感器数据判断障碍物是否位于本节点与汇聚节点之间的过程如下:Further, in the step (2), the process that the boundary node uses sensor data to determine whether the obstacle is located between the node and the sink node in the route recovery is as follows:
对于节点vi,通过下式计算角度其中表示该节点传感器检测到的障碍物与自身方位关系,0≤θ<2π,表示该节点与汇聚节点vsink间相对位置关系:For node v i , the angle is calculated by in Represents the relationship between the obstacle detected by the sensor of this node and its own orientation, 0≤θ<2π, Indicates the relative positional relationship between the node and sink node v sink :
如则障碍物位于该节点与汇聚节点之间,否则障碍物位于该节点与汇聚节点同侧。like Then the obstacle is located between the node and the sink node, otherwise the obstacle is located on the same side of the node and the sink node.
更进一步,所述步骤(2)中,路由恢复中采用以下方法优化数据包绕行,过程为:Further, in the described step (2), the following methods are adopted to optimize the detour of the data packet in the route recovery, and the process is:
(2.1)最佳绕行方向选择(2.1) Selection of the best detour direction
每当节点新设置自身为出口节点并判断自身面向障碍物四角时,同时向顺时针和逆时针两个方向发送控制包,该控制包通过在边界节点间转发,沿障碍物边缘绕行,直至到达另一个出口节点;所经过的所有边界节点通过控制包计算最佳绕行方向,从而优化从入口节点进入的数据包绕行代价;Whenever the node newly sets itself as the exit node and judges that it faces the four corners of the obstacle, it sends control packets in both clockwise and counterclockwise directions. Reach another exit node; all boundary nodes passed through calculate the optimal detour direction through the control packet, thereby optimizing the detour cost of the data packet entering from the entry node;
(2.2)边界控制(2.2) Boundary control
针对数据包沿障碍物边缘绕行过程中两类异常情况:一、越过障碍物四边转发至内部节点;二、越过障碍物四角转发至外部节点,通过边界节点主动捕获异常转发数据包并进行绕路转发的方式,解决数据包丢失问题。There are two types of abnormal situations in the process of data packets detouring along the edge of the obstacle: first, forwarding across the four sides of the obstacle to the internal node; second, forwarding across the four corners of the obstacle to the external node, and actively capturing the abnormal forwarding data packet through the border node and detouring The way of forwarding is used to solve the problem of packet loss.
优选的,所述步骤(2.1)中,边界节点沿障碍物边缘转发数据包与控制包的步骤如下:Preferably, in the step (2.1), the step of the border node forwarding the data packet and the control packet along the edge of the obstacle is as follows:
首先,传感节点通过下式根据θ和数据包或控制包中记录的绕行方向dd计算下一跳节点相对自身的方向θnext;First, the sensing node calculates the direction θ next of the next hop node relative to itself according to the following formula according to θ and the detour direction dd recorded in the data packet or control packet;
然后,根据θnext,在邻居节点相对位置表中寻找θnext方向上相距自身最远的边界节点作为转发目标节点,并向该目标节点转发数据或控制包。Then, according to θ next , find the border node farthest from itself in the direction of θ next in the relative position table of neighbor nodes as the forwarding target node, and forward data or control packets to the target node.
优选的,所述步骤(2.1)中,边界节点通过控制包计算最佳的绕行方向best_dd的过程如下:Preferably, in the step (2.1), the process that the boundary node calculates the best detour direction best_dd through the control packet is as follows:
出口节点发送控制包中包含一个初始值为0的cost字段;如边界节点接收到控制包,且该控制包的转发目标为自身或转发路径经过自身,则将数据包中cost字段保存的值与源节点相对自身的距离进行累加,得到该控制包源方向的绕行代价new_cost;此时,若本节点尚未获得最佳绕行方向best_dd或当前最佳绕行代价best_cost大于new_cost,则利用new_cost更新best_cost,并将该控制包源方向作为best_dd;The control packet sent by the egress node contains a cost field with an initial value of 0; if the border node receives the control packet, and the forwarding destination of the control packet is itself or the forwarding path passes through itself, the value stored in the cost field in the data packet is equal to that of the control packet. The distance of the source node relative to itself is accumulated to obtain the detour cost new_cost of the source direction of the control packet; at this time, if the node has not obtained the best detour direction best_dd or the current best detour cost best_cost is greater than new_cost, use new_cost to update best_cost, and use the source direction of the control packet as best_dd;
如果边界节点收到的控制包的目的节点就是自身,则将new_cost记录入控制包的cost字段中,并继续转发控制包。If the destination node of the control packet received by the border node is itself, record new_cost in the cost field of the control packet, and continue to forward the control packet.
优选的,所述步骤(2.1)中,入口节点对于数据包中转发方向dd的控制过程如下:Preferably, in the step (2.1), the control process of the ingress node for the forwarding direction dd in the data packet is as follows:
若best_dd非空,如best_dd为顺时针方向,数据包dd设为1,如best_dd为逆时针方向,则数据包dd设为-1,沿障碍物边缘的最佳方向转发;若best_dd为空,则生成两个数据包副本,其dd字段分别填入1和-1,沿障碍物边缘两个方向同时转发。If best_dd is not empty, such as best_dd is clockwise, the data packet dd is set to 1, such as best_dd is counterclockwise, then the data packet dd is set to -1, and forwarded along the best direction of the edge of the obstacle; if best_dd is empty, Then, two copies of the data packet are generated, and the dd field is filled with 1 and -1 respectively, and forwarded in both directions along the edge of the obstacle.
更优选的,所述步骤(2.2)中,边界节点判断数据包越过障碍物四边转发至内部节点的过程如下:More preferably, in the step (2.2), the process of the border node judging that the data packet is forwarded to the internal node over the four sides of the obstacle is as follows:
边界节点vi在捕获到数据包时,通过下式:When the border node v i captures the data packet, it passes the following formula:
计算向量(d,θj),其中d为节点间距离,并通过该边界节点指向数据包源节点vs的向量和该边界节点指向数据包目的节点vd的向量利用下式:Calculate the vector (d, θ j ), where d is the distance between nodes, and point to the vector of packet source node v s through this boundary node and the vector of the boundary node pointing to the packet destination node v d Use the following formula:
计算x1、x2、x3是否均小于0;如是则判断数据包越过障碍物四边转发至内部节点。Calculate whether x 1 , x 2 , and x 3 are all less than 0; if so, judge that the data packet is forwarded to the internal node across the four sides of the obstacle.
所述步骤(2.2)中,边界节点判断数据包越过障碍物四角转发至外部节点的过程如下:In the step (2.2), the process that the border node judges that the data packet is forwarded to the external node across the four corners of the obstacle is as follows:
边界节点vi在捕获到数据包时,通过该边界节点指向数据包源节点vs的向量和该边界节点节点指向数据包目的节点vd的向量利用下式:When the border node v i captures the data packet, it points to the vector of the source node v s of the data packet through the border node and the vector of the border node node pointing to the packet destination node v d Use the following formula:
判断x4是否为0;如是则判断数据包越过障碍物四角转发至外部节点。Determine whether x 4 is 0; if so, determine that the data packet is forwarded to the external node across the four corners of the obstacle.
本发明的有益效果主要表现在:利用传感器返回的实时物理感知信息,快速恢复受障碍物影响而失效的路由路径,从而避免数据传输失败。The beneficial effects of the present invention are mainly manifested in: using the real-time physical perception information returned by the sensor to quickly restore the invalid routing path affected by obstacles, thereby avoiding data transmission failure.
附图说明Description of drawings
图1是节点标识示意图。Figure 1 is a schematic diagram of node identification.
图2是路由恢复示意图。FIG. 2 is a schematic diagram of route restoration.
图3是第一类异常现象示意图。Figure 3 is a schematic diagram of the first type of abnormal phenomenon.
图4是第二类异常现象示意图。Figure 4 is a schematic diagram of the second type of abnormal phenomenon.
具体实施方式Detailed ways
下面结合附图对本发明作进一步描述。The present invention will be further described below in conjunction with the accompanying drawings.
参照图1~图4,一种基于物理感知信息的点阵网络可靠路由方法,利用传感器数据使数据包转发沿障碍物边缘绕行,避免障碍物造成的数据传输失败,所述方法包括以下步骤:Referring to Figures 1 to 4, a reliable routing method for a lattice network based on physical perception information, using sensor data to forward data packets around the edge of obstacles to avoid data transmission failure caused by obstacles, the method includes the following steps :
(1)节点标识(1) Node ID
如图1所示,根据传感器数据,将数据传输节点分为外部、内部和边界节点三类;对于外部节点,其传感器无法检测到障碍物;对于内部节点,其传感器检测到障碍物覆盖于其上方;对于边界节点,其传感器检测到障碍物位于节点侧面;As shown in Figure 1, according to the sensor data, the data transmission nodes are divided into three categories: external, internal and boundary nodes; for external nodes, their sensors cannot detect obstacles; for internal nodes, their sensors detect obstacles covering their Above; for boundary nodes, whose sensors detect obstacles on the side of the node;
(2)路由恢复(2) Route recovery
如图2所示,当边界节点收到来自于外部节点的数据包时,利用传感器数据判断障碍物是否位于本节点与汇聚节点之间,如是则设置自身为入口节点,并重新规划路径,通过在边界节点间转发数据,使数据包沿障碍物边缘绕行;在绕行过程中,如某个边界节点通过传感器数据判断该障碍物不再位于本节点与汇聚节点之间,设置自身为出口节点,结束绕行。As shown in Figure 2, when the border node receives the data packet from the external node, it uses the sensor data to determine whether the obstacle is located between the node and the sink node. If so, it sets itself as the entry node, and re-plans the path. Forward data between border nodes to make data packets detour along the edge of the obstacle; during the detour process, if a border node judges that the obstacle is no longer located between its own node and the sink node through sensor data, it sets itself as the exit node, end the detour.
进一步,所述步骤(2)中,路由恢复中边界节点利用传感器数据判断障碍物是否位于本节点与汇聚节点之间的过程如下:Further, in the step (2), the process that the boundary node uses sensor data to determine whether the obstacle is located between the node and the sink node in the route recovery is as follows:
对于节点vi,通过下式计算角度其中表示该节点传感器检测到的障碍物与自身方位关系,表示该节点与汇聚节点vsink间相对位置关系:For node v i , the angle is calculated by in Represents the relationship between the obstacle detected by the node sensor and its own orientation, Indicates the relative positional relationship between the node and sink node v sink :
如则障碍物位于该节点与汇聚节点之间,否则障碍物位于该节点与汇聚节点同侧。like Then the obstacle is located between the node and the sink node, otherwise the obstacle is located on the same side of the node and the sink node.
更进一步,所述步骤(2)中,路由恢复中采用以下方法优化数据包绕行,过程如下:Further, in the described step (2), the following methods are adopted in the route recovery to optimize the detour of the data packet, and the process is as follows:
(2.1)最佳绕行方向选择(2.1) Selection of the best detour direction
每当节点新设置自身为出口节点并判断自身面向障碍物四角时,同时向顺时针和逆时针两个方向发送控制包,该控制包通过在边界节点间转发,沿障碍物边缘绕行,直至到达另一个出口节点;所经过的所有边界节点通过控制包计算最佳绕行方向,从而优化从入口节点进入的数据包绕行代价;Whenever the node newly sets itself as the exit node and judges that it faces the four corners of the obstacle, it sends control packets in both clockwise and counterclockwise directions. Reach another exit node; all boundary nodes passed through calculate the optimal detour direction through the control packet, thereby optimizing the detour cost of the data packet entering from the entry node;
其中,边界节点沿障碍物边缘转发数据包与控制包的过程如下:Among them, the process of the border node forwarding data packets and control packets along the edge of the obstacle is as follows:
首先,传感节点通过下式根据θ和数据包或控制包中记录的绕行方向dd计算下一跳节点相对自身的方向θnext;First, the sensing node calculates the direction θ next of the next hop node relative to itself according to the following formula according to θ and the detour direction dd recorded in the data packet or control packet;
然后,根据θnext,在邻居节点相对位置表中寻找θnext方向上相距自身最远的边界节点作为转发目标节点,并向该目标节点转发数据或控制包;Then, according to θ next , find the boundary node farthest from itself in the direction of θ next in the relative position table of neighbor nodes as the forwarding target node, and forward data or control packets to the target node;
边界节点通过控制包计算最佳的绕行方向best_dd的过程如下:The process for the boundary node to calculate the best detour direction best_dd through the control packet is as follows:
出口节点发送控制包中包含一个初始值为0的cost字段;如边界节点接收到控制包,且该控制包的转发目标为自身或转发路径经过自身,则将数据包中cost字段保存的值与源节点相对自身的距离进行累加,得到该控制包源方向的绕行代价new_cost;此时,若本节点尚未获得最佳绕行方向best_dd或当前最佳绕行代价best_cost大于new_cost,则利用new_cost更新best_cost,并将该控制包源方向作为best_dd;The control packet sent by the egress node contains a cost field with an initial value of 0; if the border node receives the control packet, and the forwarding destination of the control packet is itself or the forwarding path passes through itself, the value stored in the cost field in the data packet is equal to that of the control packet. The distance of the source node relative to itself is accumulated to obtain the detour cost new_cost of the source direction of the control packet; at this time, if the node has not obtained the best detour direction best_dd or the current best detour cost best_cost is greater than new_cost, use new_cost to update best_cost, and use the source direction of the control packet as best_dd;
如果边界节点收到的控制包的目的节点就是自身,则将new_cost记录入控制包的cost字段中,并继续转发控制包;If the destination node of the control packet received by the border node is itself, record new_cost in the cost field of the control packet, and continue to forward the control packet;
入口节点对于数据包中转发方向dd的控制过程如下:The control process of the ingress node for the forwarding direction dd in the data packet is as follows:
若best_dd非空,如best_dd为顺时针方向,数据包dd设为1,如best_dd为逆时针方向,则数据包dd设为-1,沿障碍物边缘的最佳方向转发;若best_dd为空,则生成两个数据包副本,其dd字段分别填入1和-1,沿障碍物边缘两个方向同时转发;If best_dd is not empty, such as best_dd is clockwise, the data packet dd is set to 1, such as best_dd is counterclockwise, then the data packet dd is set to -1, and forwarded along the best direction of the edge of the obstacle; if best_dd is empty, Then two copies of the data packet are generated, and the dd field is filled with 1 and -1 respectively, and forwarded in both directions along the edge of the obstacle;
(2.2)边界控制(2.2) Boundary control
针对数据包沿障碍物边缘绕行过程中两类异常情况:一、越过障碍物四边转发至内部节点;二、越过障碍物四角转发至外部节点,通过边界节点主动捕获异常转发数据包并进行绕路转发的方式,解决数据包丢失问题;There are two types of abnormal situations in the process of data packets detouring along the edge of the obstacle: first, forwarding across the four sides of the obstacle to the internal node; second, forwarding across the four corners of the obstacle to the external node, and actively capturing the abnormal forwarding data packet through the border node and detouring The way of forwarding is used to solve the problem of packet loss;
其中,如图3所示,边界节点判断数据包越过障碍物四边转发至内部节点的过程如下:Among them, as shown in Figure 3, the process of the border node judging that the data packet has passed the four sides of the obstacle and forwarded to the internal node is as follows:
边界节点vi在捕获到数据包时,通过下式:When the border node v i captures the data packet, it passes the following formula:
计算向量(d,θj),其中d为节点间距离,并通过该边界节点指向数据包源节点vs的向量和该边界节点指向数据包目的节点vd的向量利用下式:Calculate the vector (d, θ j ), where d is the distance between nodes, and point to the vector of packet source node v s through this boundary node and the vector of the boundary node pointing to the packet destination node v d Use the following formula:
计算x1、x2、x3是否均小于0;如是则判断数据包越过障碍物四边转发至内部节点;Calculate whether x 1 , x 2 , and x 3 are all less than 0; if so, judge that the data packet is forwarded to the internal node across the four sides of the obstacle;
如图4所示,边界节点判断数据包越过障碍物四角转发至外部节点的过程如下:As shown in Figure 4, the process of the border node judging that the data packet is forwarded to the external node across the four corners of the obstacle is as follows:
边界节点vi在捕获到数据包时,通过该边界节点指向数据包源节点vs的向量和该边界节点节点指向数据包目的节点vd的向量利用下式:When the border node v i captures the data packet, it points to the vector of the source node v s of the data packet through the border node and the vector of the border node node pointing to the packet destination node v d Use the following formula:
判断x4是否为0;如是则判断数据包越过障碍物四角转发至外部节点。Determine whether x 4 is 0; if so, determine that the data packet is forwarded to the external node across the four corners of the obstacle.
Claims (3)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010928200.9A CN112188582B (en) | 2020-09-07 | 2020-09-07 | Reliable routing method for lattice network based on physical perception information |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010928200.9A CN112188582B (en) | 2020-09-07 | 2020-09-07 | Reliable routing method for lattice network based on physical perception information |
Publications (2)
Publication Number | Publication Date |
---|---|
CN112188582A CN112188582A (en) | 2021-01-05 |
CN112188582B true CN112188582B (en) | 2022-07-26 |
Family
ID=73924860
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010928200.9A Active CN112188582B (en) | 2020-09-07 | 2020-09-07 | Reliable routing method for lattice network based on physical perception information |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN112188582B (en) |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101272344A (en) * | 2008-04-25 | 2008-09-24 | 北京航空航天大学 | A Routing Method Based on Fuzzy Location Information for Mobile Sensor Networks |
CN102088753A (en) * | 2011-03-28 | 2011-06-08 | 中国科学院上海微系统与信息技术研究所 | Alternate hole routing method of Internet of Things (IOT) for guaranteeing service quality |
CN102752721A (en) * | 2012-06-28 | 2012-10-24 | 上海交通大学 | Route recovery method suitable for interference environment of wireless sensor network |
CN110740487A (en) * | 2019-09-17 | 2020-01-31 | 天津大学 | energy-efficient obstacle-avoiding underwater routing method |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7164667B2 (en) * | 2002-06-28 | 2007-01-16 | Belair Networks Inc. | Integrated wireless distribution and mesh backhaul networks |
-
2020
- 2020-09-07 CN CN202010928200.9A patent/CN112188582B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101272344A (en) * | 2008-04-25 | 2008-09-24 | 北京航空航天大学 | A Routing Method Based on Fuzzy Location Information for Mobile Sensor Networks |
CN102088753A (en) * | 2011-03-28 | 2011-06-08 | 中国科学院上海微系统与信息技术研究所 | Alternate hole routing method of Internet of Things (IOT) for guaranteeing service quality |
CN102752721A (en) * | 2012-06-28 | 2012-10-24 | 上海交通大学 | Route recovery method suitable for interference environment of wireless sensor network |
CN110740487A (en) * | 2019-09-17 | 2020-01-31 | 天津大学 | energy-efficient obstacle-avoiding underwater routing method |
Non-Patent Citations (3)
Title |
---|
Mobile-Agent的空洞避免路由算法;杨云等;《计算机科学与探索》;20120915(第09期);全文 * |
一种可绕过障碍物的网格路由算法;赵远东等;《通信技术》;20091210(第12期);全文 * |
无线传感器网络中一种躲避障碍物的地理路由算法;李金宝等;《黑龙江大学工程学报》;20101125(第04期);全文 * |
Also Published As
Publication number | Publication date |
---|---|
CN112188582A (en) | 2021-01-05 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Xiao et al. | Reliable anchor-based sensor localization in irregular areas | |
US9853854B1 (en) | Node-protection and path attribute collection with remote loop free alternates | |
TWI427972B (en) | Network device with creating path data and method thereof | |
US20130028070A1 (en) | Method and apparatus for resilient routing of control traffic in a split-architecture system | |
AU2017218928B2 (en) | Path probing using an edge completion ratio | |
CN102769845B (en) | Wormhole detecting method based on specific triple-jump channel path in wireless sensor network | |
AU2017225045B2 (en) | Identification of traceroute nodes and associated devices | |
Zheng et al. | Optimal recovery from large-scale failures in IP networks | |
JPWO2015045466A1 (en) | COMMUNICATION CONTROL DEVICE, COMMUNICATION CONTROL SYSTEM, COMMUNICATION CONTROL METHOD, AND COMMUNICATION CONTROL PROGRAM | |
CN102932255B (en) | Method and device for selecting tunnel path | |
CN112188582B (en) | Reliable routing method for lattice network based on physical perception information | |
CN113347088A (en) | Improved wireless self-organizing network multilink routing method | |
CN113708953B (en) | Underwater acoustic sensor network anti-damage method based on node importance balance | |
KR100776327B1 (en) | Dynamic Load Balancing Routing Method in Wireless Networks | |
CN106230717A (en) | Route obtaining method in group system and device | |
CN105208620B (en) | A kind of industrial wireless sensor network route constructing method towards transmitting interference | |
KR101503076B1 (en) | A hole bypassing method in a location-based routing technique and a sensor node | |
Huc et al. | Early obstacle detection and avoidance for all to all traffic pattern in wireless sensor networks | |
CN116319512B (en) | Intra-domain route protection method based on node reverse order relation | |
Hsu et al. | Reliable greedy forwarding in obstacle-aware wireless sensor networks | |
Choi et al. | Design and performance analysis of a proxy-based indirect routing scheme in ad hoc wireless networks | |
Popa et al. | Reducing congestion effects by multipath routing in wireless networks | |
Song | Cross layer design in wireless sensor networks | |
CN118118404A (en) | A multi-mode collaborative perception network routing intelligent self-healing method and application | |
CN117880170A (en) | Importance determining method, device and equipment for key boundary nodes of routing topology |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |