[go: up one dir, main page]

CN112188582B - Reliable routing method for lattice network based on physical perception information - Google Patents

Reliable routing method for lattice network based on physical perception information Download PDF

Info

Publication number
CN112188582B
CN112188582B CN202010928200.9A CN202010928200A CN112188582B CN 112188582 B CN112188582 B CN 112188582B CN 202010928200 A CN202010928200 A CN 202010928200A CN 112188582 B CN112188582 B CN 112188582B
Authority
CN
China
Prior art keywords
node
boundary
obstacle
data
packet
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010928200.9A
Other languages
Chinese (zh)
Other versions
CN112188582A (en
Inventor
夏明�
刘必千
金嘉权
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhejiang University of Technology ZJUT
Original Assignee
Zhejiang University of Technology ZJUT
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhejiang University of Technology ZJUT filed Critical Zhejiang University of Technology ZJUT
Priority to CN202010928200.9A priority Critical patent/CN112188582B/en
Publication of CN112188582A publication Critical patent/CN112188582A/en
Application granted granted Critical
Publication of CN112188582B publication Critical patent/CN112188582B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W40/00Communication routing or communication path finding
    • H04W40/02Communication route or path selection, e.g. power-based or shortest path routing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W40/00Communication routing or communication path finding
    • H04W40/02Communication route or path selection, e.g. power-based or shortest path routing
    • H04W40/12Communication route or path selection, e.g. power-based or shortest path routing based on transmission quality or channel quality
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W40/00Communication routing or communication path finding
    • H04W40/24Connectivity information management, e.g. connectivity discovery or connectivity update
    • H04W40/248Connectivity information update

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

A lattice network reliable routing method based on physical perception information reduces the influence of obstacles on the reliability of data transmission, and comprises the following steps: (1) node identification, namely identifying the nodes as external, internal and boundary nodes according to real-time obstacle perception information returned by the sensor; (2) and (4) recovering the route, and after the barrier is moved into the sensing dot matrix, re-planning a routing path by the boundary node according to the current barrier sensing information, so that the data packet is forwarded to bypass along the edge of the barrier until the data packet is separated from the influence range of the barrier. The invention utilizes the real-time sensor data to directly control the routing decision, greatly improves the real-time performance of the routing recovery when the barrier appears suddenly, and reduces the possibility of data loss under the interference of the barrier.

Description

基于物理感知信息的点阵网络可靠路由方法Reliable routing method for lattice network based on physical perception information

技术领域technical field

本发明涉及一种基于物理感知信息的点阵网络可靠路由方法。The invention relates to a reliable routing method of a lattice network based on physical perception information.

背景技术Background technique

障碍物是影响无线传输质量的重要因素。当可移动障碍物遮挡无线信号传输路径时,可能导致部分节点无法正常与其他节点通信,从而导致突发的路由空洞。目前路由协议主要可分为基于拓扑的,如文献[1]O.Gnawali,R.Fonseca,K.Jamieson,M.Kazandjieva,D.Moss,and P.Levis,“Ctp:An efficient,robust,and reliable collection treeprotocol for wireless sensor networks,”ACM Transactions on Sensor Networks,vol.10,no.1,pp.1–49,2013(O.Gnawali,R.Fonseca,K.Jamieson,M.Kazandjieva,D.Moss,和P.Levis,“Ctp:一种高效、健壮和可靠的无线传感器网络收集树协议,”ACM传感器网络汇刊,第10卷,第1期,第1页到第49页,2013),的和基于地理位置的,如文献[2]B.Karp andH.T.Kung,“Gpsr:greedy perimeter stateless routing for wireless networks,”inProceedings of the 6th annual international conference on Mobile computingand networking(MobiCom),2000,p.243–254(B.Karp和H.T.Kung,“无线网络中的贪心边缘无状态路由,”第六届移动计算和网络国际年会会议记录(MobiCom),2000,第243页到第254页)。基于拓扑的方法大多要求节点维护一个动态的全局传输开销(如到达汇聚节点的跳数、传输次数等),并选择开销最低的路径。基于地理位置的方法则依赖于节点的地理位置,选择距离汇聚节点最近的节点进行转发。如文献[3]A.Mostefaoui,M.Melkemi,andA.Boukerche,“Localized routing approach to bypass holes in wireless sensornetworks,”IEEE Transactions on Computers,vol.63,no.12,pp.3053–3065,2014(A.Mostefaoui,M.Melkemi,和A.Boukerche,“无线传感器网络中本地化绕洞路由方法,”IEEE计算机汇刊,第63卷,第12期,第3053页到第3065页,2014)所述,基于地理位置的方法会遇到“局部最小化”问题,即所有邻居节点距离汇聚节点的距离都比自身更大。该问题仅在路由空洞(空洞内部没有节点)的边缘才会发生。基于地理位置的路由协议一般通过左手和/或右手法则绕过空洞,如文献[4]H.Huang,H.Yin,G.Min,J.Zhang,Y.Wu,and X.Zhang,“Energy-aware dual-path geographic routing to bypass routing holes inwireless sensor networks,”IEEE Transactions on Mobile Computing,vol.17,no.6,pp.1339–1352,2018(H.Huang,H.Yin,G.Min,J.Zhang,Y.Wu,和X.Zhang,“无线传感器网络中能量感知双路绕洞地理路由,”IEEE移动计算汇刊,第17卷,第6期,第1339页到1352页,2018)。然而,现有基于地址位置的路由协议大多假设该空洞是静态的,对于动态出现的空洞缺乏有效的快速检测和恢复手段。而基于拓扑的路由协议往往采用链路质量估计器对通信质量进行动态采样,如文献[5]N.Baccour,A.

Figure GDA0003654220070000021
L.Mottola,M.A.
Figure GDA0003654220070000022
H.Youssef,C.A.Boano,and M.Alves,“Radio link quality estimation in wirelesssensor networks:A survey,”ACM Transactions on Sensor Networks,vol.8,no.4,pp.1–33,2012(N.Baccour,A.
Figure GDA0003654220070000031
L.Mottola,M.A.
Figure GDA0003654220070000032
H.Youssef,C.A.Boano,和M.Alves,“无线传感器网络中无线链路质量估计研究综述,”ACM传感器网络汇刊,第8卷,第4期,第1页到第33页,2012)。所存在的问题主要包括:(1)现有方法大多依赖于对历史数据包发送情况统计估计链路质量,对突发路由空洞检测的延迟很大;(2)基于拓扑的方法需要节点间交换链路质量估计结果计算全局传输开销,进一步加大了路由空洞恢复的延迟。文献[6]M.Xia,B.Liu,Y.H.Hu,K.Chi,X.Wang,and J.Liu,“Pace:Physical-assistedchannel estimation,”IEEE Transactions on Wireless Communications,vol.19,no.6,pp.3769–3781,2020(M.Xia,B.Liu,Y.H.Hu,K.Chi,X.Wang,和J.Liu,“Pace:物理辅助信道估计,”IEEE无线通讯汇刊,第19卷,第6期,第3769页到3781页,2020)提出了一种使用传感器物理感知信息进行链路质量估计的方法,较好的解决了现有链路质量估计器难以对突然出现的障碍物引起的链路质量变化进行实时估计的问题。然而,该方法无法解决问题(2),当移动障碍物导致突发路由空洞时,无法完全避免数据传输失败。Obstacles are an important factor affecting the quality of wireless transmission. When movable obstacles block the wireless signal transmission path, some nodes may not be able to communicate with other nodes normally, resulting in sudden routing holes. At present, routing protocols can be mainly divided into topology-based, such as literature [1] O.Gnawali, R.Fonseca, K.Jamieson, M.Kazandjieva, D.Moss, and P.Levis, "Ctp: An efficient, robust, and reliable collection treeprotocol for wireless sensor networks,"ACM Transactions on Sensor Networks,vol.10,no.1,pp.1–49,2013(O.Gnawali,R.Fonseca,K.Jamieson,M.Kazandjieva,D.Moss , and P. Levis, "Ctp: An Efficient, Robust, and Reliable Collection Tree Protocol for Wireless Sensor Networks," ACM Transactions on Sensor Networks, Vol. 10, No. 1, pp. 1 to 49, 2013), and location-based, as in [2] B.Karp and H.T.Kung, "Gpsr: greedy perimeter stateless routing for wireless networks," in Proceedings of the 6th annual international conference on Mobile computing and networking (MobiCom), 2000, p.243–254 (B.Karp and HTKung, "Greedy Edge Stateless Routing in Wireless Networks," Proceedings of the 6th International Annual Conference on Mobile Computing and Networking (MobiCom), 2000, pp. 243 to 254) . Most of the topology-based methods require nodes to maintain a dynamic global transmission cost (such as the number of hops to the sink node, the number of transmissions, etc.), and select the path with the lowest cost. The method based on geographic location relies on the geographic location of the node, and selects the node closest to the sink node for forwarding. For example [3] A. Mostefaoui, M. Melkemi, and A. Boukerche, "Localized routing approach to bypass holes in wireless sensor networks," IEEE Transactions on Computers, vol.63, no.12, pp.3053–3065, 2014 ( A. Mostefaoui, M. Melkemi, and A. Boukerche, "Localized Hole Routing Method in Wireless Sensor Networks," IEEE Transactions on Computing, Vol. 63, No. 12, pp. 3053-3065, 2014) As mentioned above, geographic location-based methods suffer from a "local minimization" problem, that is, all neighbor nodes are farther away from the sink node than themselves. The problem only occurs at the edges of routing holes (no nodes inside the holes). Geographical location-based routing protocols generally bypass holes through left-hand and/or right-hand rules, as described in [4] H.Huang, H.Yin, G.Min, J.Zhang, Y.Wu, and X.Zhang, "Energy -aware dual-path geographic routing to bypass routing holes inwireless sensor networks,”IEEE Transactions on Mobile Computing,vol.17,no.6,pp.1339–1352,2018(H.Huang,H.Yin,G.Min, J. Zhang, Y. Wu, and X. Zhang, "Energy-aware dual-path geo-routing around holes in wireless sensor networks," IEEE Transactions on Mobile Computing, Vol. 17, No. 6, pp. 1339 to 1352, 2018 ). However, most of the existing address-location-based routing protocols assume that the hole is static, and lack effective and fast detection and recovery methods for dynamically occurring holes. However, topology-based routing protocols often use link quality estimators to dynamically sample communication quality, such as literature [5] N.Baccour, A.
Figure GDA0003654220070000021
L.Mottola, MA
Figure GDA0003654220070000022
H. Youssef, CABoano, and M. Alves, “Radio link quality estimation in wireless sensor networks: A survey,” ACM Transactions on Sensor Networks, vol. 8, no. 4, pp. 1–33, 2012 (N. Baccour, A.
Figure GDA0003654220070000031
L.Mottola, MA
Figure GDA0003654220070000032
H. Youssef, CABoano, and M. Alves, "Review of Research on Wireless Link Quality Estimation in Wireless Sensor Networks," ACM Transactions on Sensor Networks, Vol. 8, No. 4, pp. 1-33, 2012). The existing problems mainly include: (1) Most of the existing methods rely on the statistical estimation of the link quality of the historical data packet transmission, and the delay of the burst routing hole detection is very large; (2) The topology-based methods require exchanges between nodes. The link quality estimation result calculates the global transmission cost, which further increases the delay of route hole recovery. Reference [6] M.Xia, B.Liu, YHHu, K.Chi, X.Wang, and J.Liu, "Pace: Physical-assisted channel estimation," IEEE Transactions on Wireless Communications, vol.19, no.6, pp.3769–3781, 2020 (M. Xia, B. Liu, YHHu, K. Chi, X. Wang, and J. Liu, "Pace: Physically Aided Channel Estimation," IEEE Transactions on Wireless Communications, Vol. 19, Issue 6, pages 3769 to 3781, 2020) proposed a method for link quality estimation using sensor physical perception information, which better solves the problem that existing link quality estimators are difficult to cause by sudden obstacles. The problem of real-time estimation of changes in link quality. However, this method cannot solve the problem (2), which cannot completely avoid the failure of data transmission when a moving obstacle causes a sudden routing hole.

发明内容SUMMARY OF THE INVENTION

为了克服已有技术的不足,本发明提供了一种基于物理感知信息的点阵网络可靠路由方法。该方法利用传感器障碍物检测信息,主动推断障碍物的位置和方向,并快速建立眼障碍物边界绕行的路由路径。从而有效避免突然出现障碍物导致的数据传输失败。In order to overcome the deficiencies of the prior art, the present invention provides a reliable routing method for a lattice network based on physical perception information. The method utilizes the sensor obstacle detection information to actively infer the location and direction of the obstacle, and quickly establish a routing path around the boundary of the eye obstacle. This effectively avoids data transmission failures caused by sudden obstacles.

本发明解决其技术问题所采用的技术方案包括:The technical scheme adopted by the present invention to solve its technical problems includes:

一种基于物理感知信息的点阵网络可靠路由方法,利用传感器数据使数据包转发沿障碍物边缘绕行,避免障碍物造成的数据传输失败,所述方法包括以下步骤:A reliable routing method for a lattice network based on physical perception information, using sensor data to forward data packets to detour along the edge of obstacles to avoid data transmission failures caused by obstacles, the method includes the following steps:

(1)节点标识(1) Node ID

根据传感器数据,将数据传输节点分为外部、内部和边界节点三类;对于外部节点,其传感器无法检测到障碍物;对于内部节点,其传感器检测到障碍物覆盖于其上方;对于边界节点,其传感器检测到障碍物位于节点侧面;According to the sensor data, the data transmission nodes are divided into three categories: external, internal and boundary nodes; for external nodes, their sensors cannot detect obstacles; for internal nodes, their sensors detect obstacles covering above them; for boundary nodes, Its sensor detects that the obstacle is on the side of the node;

(2)路由恢复(2) Route recovery

当边界节点收到来自于外部节点的数据包时,利用传感器数据判断障碍物是否位于本节点与汇聚节点之间,如是则设置自身为入口节点,并重新规划路径,通过在边界节点间转发数据,使数据包沿障碍物边缘绕行;在绕行过程中,如某个边界节点通过传感器数据判断该障碍物不再位于本节点与汇聚节点之间,设置自身为出口节点,结束绕行。When the border node receives the data packet from the external node, it uses the sensor data to judge whether the obstacle is located between the node and the sink node. If so, it sets itself as the entry node, and re-plans the path. , so that the data packet detours along the edge of the obstacle; in the detour process, if a boundary node judges that the obstacle is no longer located between the node and the sink node through sensor data, it sets itself as the exit node and ends the detour.

进一步,所述步骤(2)中,路由恢复中边界节点利用传感器数据判断障碍物是否位于本节点与汇聚节点之间的过程如下:Further, in the step (2), the process that the boundary node uses sensor data to determine whether the obstacle is located between the node and the sink node in the route recovery is as follows:

对于节点vi,通过下式计算角度

Figure GDA0003654220070000041
其中
Figure GDA0003654220070000042
表示该节点传感器检测到的障碍物与自身方位关系,0≤θ<2π,
Figure GDA0003654220070000043
表示该节点与汇聚节点vsink间相对位置关系:For node v i , the angle is calculated by
Figure GDA0003654220070000041
in
Figure GDA0003654220070000042
Represents the relationship between the obstacle detected by the sensor of this node and its own orientation, 0≤θ<2π,
Figure GDA0003654220070000043
Indicates the relative positional relationship between the node and sink node v sink :

Figure GDA0003654220070000044
Figure GDA0003654220070000044

Figure GDA0003654220070000045
则障碍物位于该节点与汇聚节点之间,否则障碍物位于该节点与汇聚节点同侧。like
Figure GDA0003654220070000045
Then the obstacle is located between the node and the sink node, otherwise the obstacle is located on the same side of the node and the sink node.

更进一步,所述步骤(2)中,路由恢复中采用以下方法优化数据包绕行,过程为:Further, in the described step (2), the following methods are adopted to optimize the detour of the data packet in the route recovery, and the process is:

(2.1)最佳绕行方向选择(2.1) Selection of the best detour direction

每当节点新设置自身为出口节点并判断自身面向障碍物四角时,同时向顺时针和逆时针两个方向发送控制包,该控制包通过在边界节点间转发,沿障碍物边缘绕行,直至到达另一个出口节点;所经过的所有边界节点通过控制包计算最佳绕行方向,从而优化从入口节点进入的数据包绕行代价;Whenever the node newly sets itself as the exit node and judges that it faces the four corners of the obstacle, it sends control packets in both clockwise and counterclockwise directions. Reach another exit node; all boundary nodes passed through calculate the optimal detour direction through the control packet, thereby optimizing the detour cost of the data packet entering from the entry node;

(2.2)边界控制(2.2) Boundary control

针对数据包沿障碍物边缘绕行过程中两类异常情况:一、越过障碍物四边转发至内部节点;二、越过障碍物四角转发至外部节点,通过边界节点主动捕获异常转发数据包并进行绕路转发的方式,解决数据包丢失问题。There are two types of abnormal situations in the process of data packets detouring along the edge of the obstacle: first, forwarding across the four sides of the obstacle to the internal node; second, forwarding across the four corners of the obstacle to the external node, and actively capturing the abnormal forwarding data packet through the border node and detouring The way of forwarding is used to solve the problem of packet loss.

优选的,所述步骤(2.1)中,边界节点沿障碍物边缘转发数据包与控制包的步骤如下:Preferably, in the step (2.1), the step of the border node forwarding the data packet and the control packet along the edge of the obstacle is as follows:

首先,传感节点通过下式根据θ和数据包或控制包中记录的绕行方向dd计算下一跳节点相对自身的方向θnextFirst, the sensing node calculates the direction θ next of the next hop node relative to itself according to the following formula according to θ and the detour direction dd recorded in the data packet or control packet;

Figure GDA0003654220070000051
Figure GDA0003654220070000051

然后,根据θnext,在邻居节点相对位置表中寻找θnext方向上相距自身最远的边界节点作为转发目标节点,并向该目标节点转发数据或控制包。Then, according to θ next , find the border node farthest from itself in the direction of θ next in the relative position table of neighbor nodes as the forwarding target node, and forward data or control packets to the target node.

优选的,所述步骤(2.1)中,边界节点通过控制包计算最佳的绕行方向best_dd的过程如下:Preferably, in the step (2.1), the process that the boundary node calculates the best detour direction best_dd through the control packet is as follows:

出口节点发送控制包中包含一个初始值为0的cost字段;如边界节点接收到控制包,且该控制包的转发目标为自身或转发路径经过自身,则将数据包中cost字段保存的值与源节点相对自身的距离进行累加,得到该控制包源方向的绕行代价new_cost;此时,若本节点尚未获得最佳绕行方向best_dd或当前最佳绕行代价best_cost大于new_cost,则利用new_cost更新best_cost,并将该控制包源方向作为best_dd;The control packet sent by the egress node contains a cost field with an initial value of 0; if the border node receives the control packet, and the forwarding destination of the control packet is itself or the forwarding path passes through itself, the value stored in the cost field in the data packet is equal to that of the control packet. The distance of the source node relative to itself is accumulated to obtain the detour cost new_cost of the source direction of the control packet; at this time, if the node has not obtained the best detour direction best_dd or the current best detour cost best_cost is greater than new_cost, use new_cost to update best_cost, and use the source direction of the control packet as best_dd;

如果边界节点收到的控制包的目的节点就是自身,则将new_cost记录入控制包的cost字段中,并继续转发控制包。If the destination node of the control packet received by the border node is itself, record new_cost in the cost field of the control packet, and continue to forward the control packet.

优选的,所述步骤(2.1)中,入口节点对于数据包中转发方向dd的控制过程如下:Preferably, in the step (2.1), the control process of the ingress node for the forwarding direction dd in the data packet is as follows:

若best_dd非空,如best_dd为顺时针方向,数据包dd设为1,如best_dd为逆时针方向,则数据包dd设为-1,沿障碍物边缘的最佳方向转发;若best_dd为空,则生成两个数据包副本,其dd字段分别填入1和-1,沿障碍物边缘两个方向同时转发。If best_dd is not empty, such as best_dd is clockwise, the data packet dd is set to 1, such as best_dd is counterclockwise, then the data packet dd is set to -1, and forwarded along the best direction of the edge of the obstacle; if best_dd is empty, Then, two copies of the data packet are generated, and the dd field is filled with 1 and -1 respectively, and forwarded in both directions along the edge of the obstacle.

更优选的,所述步骤(2.2)中,边界节点判断数据包越过障碍物四边转发至内部节点的过程如下:More preferably, in the step (2.2), the process of the border node judging that the data packet is forwarded to the internal node over the four sides of the obstacle is as follows:

边界节点vi在捕获到数据包时,通过下式:When the border node v i captures the data packet, it passes the following formula:

Figure GDA0003654220070000061
Figure GDA0003654220070000061

计算向量(d,θj),其中d为节点间距离,并通过该边界节点指向数据包源节点vs的向量

Figure GDA0003654220070000062
和该边界节点指向数据包目的节点vd的向量
Figure GDA0003654220070000071
利用下式:Calculate the vector (d, θ j ), where d is the distance between nodes, and point to the vector of packet source node v s through this boundary node
Figure GDA0003654220070000062
and the vector of the boundary node pointing to the packet destination node v d
Figure GDA0003654220070000071
Use the following formula:

Figure GDA0003654220070000072
Figure GDA0003654220070000072

Figure GDA0003654220070000073
Figure GDA0003654220070000073

Figure GDA0003654220070000074
Figure GDA0003654220070000074

计算x1、x2、x3是否均小于0;如是则判断数据包越过障碍物四边转发至内部节点。Calculate whether x 1 , x 2 , and x 3 are all less than 0; if so, judge that the data packet is forwarded to the internal node across the four sides of the obstacle.

所述步骤(2.2)中,边界节点判断数据包越过障碍物四角转发至外部节点的过程如下:In the step (2.2), the process that the border node judges that the data packet is forwarded to the external node across the four corners of the obstacle is as follows:

边界节点vi在捕获到数据包时,通过该边界节点指向数据包源节点vs的向量

Figure GDA0003654220070000075
和该边界节点节点指向数据包目的节点vd的向量
Figure GDA0003654220070000076
利用下式:When the border node v i captures the data packet, it points to the vector of the source node v s of the data packet through the border node
Figure GDA0003654220070000075
and the vector of the border node node pointing to the packet destination node v d
Figure GDA0003654220070000076
Use the following formula:

Figure GDA0003654220070000077
Figure GDA0003654220070000077

判断x4是否为0;如是则判断数据包越过障碍物四角转发至外部节点。Determine whether x 4 is 0; if so, determine that the data packet is forwarded to the external node across the four corners of the obstacle.

本发明的有益效果主要表现在:利用传感器返回的实时物理感知信息,快速恢复受障碍物影响而失效的路由路径,从而避免数据传输失败。The beneficial effects of the present invention are mainly manifested in: using the real-time physical perception information returned by the sensor to quickly restore the invalid routing path affected by obstacles, thereby avoiding data transmission failure.

附图说明Description of drawings

图1是节点标识示意图。Figure 1 is a schematic diagram of node identification.

图2是路由恢复示意图。FIG. 2 is a schematic diagram of route restoration.

图3是第一类异常现象示意图。Figure 3 is a schematic diagram of the first type of abnormal phenomenon.

图4是第二类异常现象示意图。Figure 4 is a schematic diagram of the second type of abnormal phenomenon.

具体实施方式Detailed ways

下面结合附图对本发明作进一步描述。The present invention will be further described below in conjunction with the accompanying drawings.

参照图1~图4,一种基于物理感知信息的点阵网络可靠路由方法,利用传感器数据使数据包转发沿障碍物边缘绕行,避免障碍物造成的数据传输失败,所述方法包括以下步骤:Referring to Figures 1 to 4, a reliable routing method for a lattice network based on physical perception information, using sensor data to forward data packets around the edge of obstacles to avoid data transmission failure caused by obstacles, the method includes the following steps :

(1)节点标识(1) Node ID

如图1所示,根据传感器数据,将数据传输节点分为外部、内部和边界节点三类;对于外部节点,其传感器无法检测到障碍物;对于内部节点,其传感器检测到障碍物覆盖于其上方;对于边界节点,其传感器检测到障碍物位于节点侧面;As shown in Figure 1, according to the sensor data, the data transmission nodes are divided into three categories: external, internal and boundary nodes; for external nodes, their sensors cannot detect obstacles; for internal nodes, their sensors detect obstacles covering their Above; for boundary nodes, whose sensors detect obstacles on the side of the node;

(2)路由恢复(2) Route recovery

如图2所示,当边界节点收到来自于外部节点的数据包时,利用传感器数据判断障碍物是否位于本节点与汇聚节点之间,如是则设置自身为入口节点,并重新规划路径,通过在边界节点间转发数据,使数据包沿障碍物边缘绕行;在绕行过程中,如某个边界节点通过传感器数据判断该障碍物不再位于本节点与汇聚节点之间,设置自身为出口节点,结束绕行。As shown in Figure 2, when the border node receives the data packet from the external node, it uses the sensor data to determine whether the obstacle is located between the node and the sink node. If so, it sets itself as the entry node, and re-plans the path. Forward data between border nodes to make data packets detour along the edge of the obstacle; during the detour process, if a border node judges that the obstacle is no longer located between its own node and the sink node through sensor data, it sets itself as the exit node, end the detour.

进一步,所述步骤(2)中,路由恢复中边界节点利用传感器数据判断障碍物是否位于本节点与汇聚节点之间的过程如下:Further, in the step (2), the process that the boundary node uses sensor data to determine whether the obstacle is located between the node and the sink node in the route recovery is as follows:

对于节点vi,通过下式计算角度

Figure GDA0003654220070000081
其中
Figure GDA0003654220070000082
表示该节点传感器检测到的障碍物与自身方位关系,
Figure GDA0003654220070000083
表示该节点与汇聚节点vsink间相对位置关系:For node v i , the angle is calculated by
Figure GDA0003654220070000081
in
Figure GDA0003654220070000082
Represents the relationship between the obstacle detected by the node sensor and its own orientation,
Figure GDA0003654220070000083
Indicates the relative positional relationship between the node and sink node v sink :

Figure GDA0003654220070000091
Figure GDA0003654220070000091

Figure GDA0003654220070000092
则障碍物位于该节点与汇聚节点之间,否则障碍物位于该节点与汇聚节点同侧。like
Figure GDA0003654220070000092
Then the obstacle is located between the node and the sink node, otherwise the obstacle is located on the same side of the node and the sink node.

更进一步,所述步骤(2)中,路由恢复中采用以下方法优化数据包绕行,过程如下:Further, in the described step (2), the following methods are adopted in the route recovery to optimize the detour of the data packet, and the process is as follows:

(2.1)最佳绕行方向选择(2.1) Selection of the best detour direction

每当节点新设置自身为出口节点并判断自身面向障碍物四角时,同时向顺时针和逆时针两个方向发送控制包,该控制包通过在边界节点间转发,沿障碍物边缘绕行,直至到达另一个出口节点;所经过的所有边界节点通过控制包计算最佳绕行方向,从而优化从入口节点进入的数据包绕行代价;Whenever the node newly sets itself as the exit node and judges that it faces the four corners of the obstacle, it sends control packets in both clockwise and counterclockwise directions. Reach another exit node; all boundary nodes passed through calculate the optimal detour direction through the control packet, thereby optimizing the detour cost of the data packet entering from the entry node;

其中,边界节点沿障碍物边缘转发数据包与控制包的过程如下:Among them, the process of the border node forwarding data packets and control packets along the edge of the obstacle is as follows:

首先,传感节点通过下式根据θ和数据包或控制包中记录的绕行方向dd计算下一跳节点相对自身的方向θnextFirst, the sensing node calculates the direction θ next of the next hop node relative to itself according to the following formula according to θ and the detour direction dd recorded in the data packet or control packet;

Figure GDA0003654220070000093
Figure GDA0003654220070000093

然后,根据θnext,在邻居节点相对位置表中寻找θnext方向上相距自身最远的边界节点作为转发目标节点,并向该目标节点转发数据或控制包;Then, according to θ next , find the boundary node farthest from itself in the direction of θ next in the relative position table of neighbor nodes as the forwarding target node, and forward data or control packets to the target node;

边界节点通过控制包计算最佳的绕行方向best_dd的过程如下:The process for the boundary node to calculate the best detour direction best_dd through the control packet is as follows:

出口节点发送控制包中包含一个初始值为0的cost字段;如边界节点接收到控制包,且该控制包的转发目标为自身或转发路径经过自身,则将数据包中cost字段保存的值与源节点相对自身的距离进行累加,得到该控制包源方向的绕行代价new_cost;此时,若本节点尚未获得最佳绕行方向best_dd或当前最佳绕行代价best_cost大于new_cost,则利用new_cost更新best_cost,并将该控制包源方向作为best_dd;The control packet sent by the egress node contains a cost field with an initial value of 0; if the border node receives the control packet, and the forwarding destination of the control packet is itself or the forwarding path passes through itself, the value stored in the cost field in the data packet is equal to that of the control packet. The distance of the source node relative to itself is accumulated to obtain the detour cost new_cost of the source direction of the control packet; at this time, if the node has not obtained the best detour direction best_dd or the current best detour cost best_cost is greater than new_cost, use new_cost to update best_cost, and use the source direction of the control packet as best_dd;

如果边界节点收到的控制包的目的节点就是自身,则将new_cost记录入控制包的cost字段中,并继续转发控制包;If the destination node of the control packet received by the border node is itself, record new_cost in the cost field of the control packet, and continue to forward the control packet;

入口节点对于数据包中转发方向dd的控制过程如下:The control process of the ingress node for the forwarding direction dd in the data packet is as follows:

若best_dd非空,如best_dd为顺时针方向,数据包dd设为1,如best_dd为逆时针方向,则数据包dd设为-1,沿障碍物边缘的最佳方向转发;若best_dd为空,则生成两个数据包副本,其dd字段分别填入1和-1,沿障碍物边缘两个方向同时转发;If best_dd is not empty, such as best_dd is clockwise, the data packet dd is set to 1, such as best_dd is counterclockwise, then the data packet dd is set to -1, and forwarded along the best direction of the edge of the obstacle; if best_dd is empty, Then two copies of the data packet are generated, and the dd field is filled with 1 and -1 respectively, and forwarded in both directions along the edge of the obstacle;

(2.2)边界控制(2.2) Boundary control

针对数据包沿障碍物边缘绕行过程中两类异常情况:一、越过障碍物四边转发至内部节点;二、越过障碍物四角转发至外部节点,通过边界节点主动捕获异常转发数据包并进行绕路转发的方式,解决数据包丢失问题;There are two types of abnormal situations in the process of data packets detouring along the edge of the obstacle: first, forwarding across the four sides of the obstacle to the internal node; second, forwarding across the four corners of the obstacle to the external node, and actively capturing the abnormal forwarding data packet through the border node and detouring The way of forwarding is used to solve the problem of packet loss;

其中,如图3所示,边界节点判断数据包越过障碍物四边转发至内部节点的过程如下:Among them, as shown in Figure 3, the process of the border node judging that the data packet has passed the four sides of the obstacle and forwarded to the internal node is as follows:

边界节点vi在捕获到数据包时,通过下式:When the border node v i captures the data packet, it passes the following formula:

Figure GDA0003654220070000101
Figure GDA0003654220070000101

计算向量(d,θj),其中d为节点间距离,并通过该边界节点指向数据包源节点vs的向量

Figure GDA0003654220070000102
和该边界节点指向数据包目的节点vd的向量
Figure GDA0003654220070000111
利用下式:Calculate the vector (d, θ j ), where d is the distance between nodes, and point to the vector of packet source node v s through this boundary node
Figure GDA0003654220070000102
and the vector of the boundary node pointing to the packet destination node v d
Figure GDA0003654220070000111
Use the following formula:

Figure GDA0003654220070000112
Figure GDA0003654220070000112

Figure GDA0003654220070000113
Figure GDA0003654220070000113

Figure GDA0003654220070000114
Figure GDA0003654220070000114

计算x1、x2、x3是否均小于0;如是则判断数据包越过障碍物四边转发至内部节点;Calculate whether x 1 , x 2 , and x 3 are all less than 0; if so, judge that the data packet is forwarded to the internal node across the four sides of the obstacle;

如图4所示,边界节点判断数据包越过障碍物四角转发至外部节点的过程如下:As shown in Figure 4, the process of the border node judging that the data packet is forwarded to the external node across the four corners of the obstacle is as follows:

边界节点vi在捕获到数据包时,通过该边界节点指向数据包源节点vs的向量

Figure GDA0003654220070000115
和该边界节点节点指向数据包目的节点vd的向量
Figure GDA0003654220070000116
利用下式:When the border node v i captures the data packet, it points to the vector of the source node v s of the data packet through the border node
Figure GDA0003654220070000115
and the vector of the border node node pointing to the packet destination node v d
Figure GDA0003654220070000116
Use the following formula:

Figure GDA0003654220070000117
Figure GDA0003654220070000117

判断x4是否为0;如是则判断数据包越过障碍物四角转发至外部节点。Determine whether x 4 is 0; if so, determine that the data packet is forwarded to the external node across the four corners of the obstacle.

Claims (3)

1. A dot matrix network reliable routing method based on physical perception information is characterized in that sensor data are utilized to enable data packets to be forwarded and detour along the edge of an obstacle, and data transmission failure caused by the obstacle is avoided, and the method comprises the following steps:
(1) node identification
Dividing data transmission nodes into three types of external nodes, internal nodes and boundary nodes according to sensor data; for external nodes, the sensors thereof cannot detect obstacles; for an internal node, its sensor detects an obstacle overlaid over it; for a boundary node, a sensor of the boundary node detects that an obstacle is positioned on the side of the node;
(2) route restoration
When the boundary nodes receive data packets from external nodes, judging whether the obstacles are positioned between the local nodes and the sink nodes by using sensor data, if so, setting the self as an entrance node, replanning a path, and enabling the data packets to bypass along the edges of the obstacles by forwarding data between the boundary nodes; in the bypassing process, if a certain boundary node judges that the barrier is no longer positioned between the node and the sink node through sensor data, the boundary node is set as an exit node, and the bypassing is finished;
in the step (2), the process that the boundary node judges whether the obstacle is positioned between the node and the sink node by using the sensor data in the route recovery is as follows:
for node v i Calculating the angle by the following formula
Figure FDA0003654220060000011
Wherein
Figure FDA0003654220060000012
The relationship between the obstacle detected by the node sensor and the orientation of the node sensor is shown, and theta is more than or equal to 0<2π,
Figure FDA0003654220060000013
Represents the node and the sink node v sink Relative positional relationship between:
Figure FDA0003654220060000014
such as
Figure FDA0003654220060000015
The barrier is positioned between the node and the sink node, otherwise, the barrier is positioned at the same side of the node and the sink node;
in the step (2), the following method is adopted to optimize data packet detour in the route recovery, and the process is as follows:
(2.1) selection of optimal detour direction
When a node is newly set as an exit node and judges that the node faces four corners of an obstacle, a control packet is sent to the clockwise direction and the anticlockwise direction at the same time, and the control packet is forwarded between boundary nodes and bypasses along the edge of the obstacle until the control packet reaches another exit node; all the passed boundary nodes calculate the optimal detour direction through the control packet, so that the data detour cost entering from the entrance node is optimized;
(2.2) boundary control
Aiming at two types of abnormal conditions in the process that a data packet bypasses along the edge of an obstacle: firstly, four sides of an obstacle are crossed and forwarded to an internal node; secondly, the data packets are forwarded to external nodes across four corners of an obstacle, and the problem of data packet loss is solved by means of actively capturing abnormal forwarding data packets by boundary nodes and performing detour forwarding;
in the step (2.1), the step of forwarding the data packet and the control packet by the boundary node along the edge of the obstacle is as follows:
first, the sensor node calculates the direction θ of the next-hop node relative to itself from θ and the detour direction dd recorded in the data packet or the control packet by the following equation next
Figure FDA0003654220060000021
Then according to theta next Finding theta in the neighbor node relative position table next The boundary node farthest away from the boundary node in the direction is used as a forwarding target node, and data or a control packet is forwarded to the target node;
in the step (2.2), the process that the boundary node judges that the data packet crosses four sides of the obstacle and is forwarded to the internal node is as follows:
boundary node v i When a packet is captured, the following is passed:
Figure FDA0003654220060000022
computing the vector (d, θ) j ) Where d is the distance between nodes and points to the source node v of the data packet through the boundary node s Vector of (2)
Figure FDA0003654220060000023
And the boundary node points to the destination node v of the data packet d Vector of (2)
Figure FDA0003654220060000024
Utilizing the following formula:
Figure FDA0003654220060000025
Figure FDA0003654220060000026
Figure FDA0003654220060000027
calculating x 1 、x 2 、x 3 Whether all are less than 0; if yes, judging that the data packet crosses four sides of the barrier and is forwarded to the internal node;
in the step (2.2), the process that the boundary node judges that the data packet crosses four corners of the obstacle and is forwarded to the external node is as follows:
boundary node v i When capturing the data packet, point to the source node v of the data packet through the boundary node s Vector of (2)
Figure FDA0003654220060000028
And the boundary node points to the destination node v of the data packet d Vector of (2)
Figure FDA0003654220060000029
Utilizing the following formula:
Figure FDA00036542200600000210
judgment of x 4 Whether or not it is 0; if yes, the data packet is judged to cross four corners of the barrier and is forwarded to an external node.
2. The lattice network reliable routing method based on physical perception information as claimed in claim 1, wherein in said step (2.1), the process that the border node calculates the optimal detour direction best _ dd by the control packet is as follows:
the exit node sends a control packet which comprises a cost field with an initial value of 0; if the boundary node receives the control packet and the forwarding target of the control packet is self or the forwarding path passes through self, accumulating the value stored in the cost field in the data packet and the distance of the source node relative to the self to obtain the detour cost new _ cost of the source direction of the control packet; at this time, if the node does not obtain the best detour direction best _ dd or the current best detour cost best _ cost is greater than the new _ cost, the new _ cost is used for updating the best _ cost, and the source direction of the control packet is used as the best _ dd;
and if the destination node of the control packet received by the boundary node is the boundary node, recording the new _ cost into a cost field of the control packet, and continuously forwarding the control packet.
3. The lattice network reliable routing method based on physical perception information as claimed in claim 1, wherein in the step (2.1), the control procedure of the ingress node for the forwarding direction dd in the data packet is as follows:
if best _ dd is not empty, if best _ dd is clockwise, the data packet dd is set to 1, and if best _ dd is counterclockwise, the data packet dd is set to-1 and is forwarded along the optimal direction of the obstacle edge; if best _ dd is empty, two copies of the packet are generated, and the dd fields are filled with 1 and-1, respectively, and are forwarded along two directions of the obstacle edge simultaneously.
CN202010928200.9A 2020-09-07 2020-09-07 Reliable routing method for lattice network based on physical perception information Active CN112188582B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010928200.9A CN112188582B (en) 2020-09-07 2020-09-07 Reliable routing method for lattice network based on physical perception information

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010928200.9A CN112188582B (en) 2020-09-07 2020-09-07 Reliable routing method for lattice network based on physical perception information

Publications (2)

Publication Number Publication Date
CN112188582A CN112188582A (en) 2021-01-05
CN112188582B true CN112188582B (en) 2022-07-26

Family

ID=73924860

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010928200.9A Active CN112188582B (en) 2020-09-07 2020-09-07 Reliable routing method for lattice network based on physical perception information

Country Status (1)

Country Link
CN (1) CN112188582B (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101272344A (en) * 2008-04-25 2008-09-24 北京航空航天大学 A Routing Method Based on Fuzzy Location Information for Mobile Sensor Networks
CN102088753A (en) * 2011-03-28 2011-06-08 中国科学院上海微系统与信息技术研究所 Alternate hole routing method of Internet of Things (IOT) for guaranteeing service quality
CN102752721A (en) * 2012-06-28 2012-10-24 上海交通大学 Route recovery method suitable for interference environment of wireless sensor network
CN110740487A (en) * 2019-09-17 2020-01-31 天津大学 energy-efficient obstacle-avoiding underwater routing method

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7164667B2 (en) * 2002-06-28 2007-01-16 Belair Networks Inc. Integrated wireless distribution and mesh backhaul networks

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101272344A (en) * 2008-04-25 2008-09-24 北京航空航天大学 A Routing Method Based on Fuzzy Location Information for Mobile Sensor Networks
CN102088753A (en) * 2011-03-28 2011-06-08 中国科学院上海微系统与信息技术研究所 Alternate hole routing method of Internet of Things (IOT) for guaranteeing service quality
CN102752721A (en) * 2012-06-28 2012-10-24 上海交通大学 Route recovery method suitable for interference environment of wireless sensor network
CN110740487A (en) * 2019-09-17 2020-01-31 天津大学 energy-efficient obstacle-avoiding underwater routing method

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
Mobile-Agent的空洞避免路由算法;杨云等;《计算机科学与探索》;20120915(第09期);全文 *
一种可绕过障碍物的网格路由算法;赵远东等;《通信技术》;20091210(第12期);全文 *
无线传感器网络中一种躲避障碍物的地理路由算法;李金宝等;《黑龙江大学工程学报》;20101125(第04期);全文 *

Also Published As

Publication number Publication date
CN112188582A (en) 2021-01-05

Similar Documents

Publication Publication Date Title
Xiao et al. Reliable anchor-based sensor localization in irregular areas
US9853854B1 (en) Node-protection and path attribute collection with remote loop free alternates
TWI427972B (en) Network device with creating path data and method thereof
US20130028070A1 (en) Method and apparatus for resilient routing of control traffic in a split-architecture system
AU2017218928B2 (en) Path probing using an edge completion ratio
CN102769845B (en) Wormhole detecting method based on specific triple-jump channel path in wireless sensor network
AU2017225045B2 (en) Identification of traceroute nodes and associated devices
Zheng et al. Optimal recovery from large-scale failures in IP networks
JPWO2015045466A1 (en) COMMUNICATION CONTROL DEVICE, COMMUNICATION CONTROL SYSTEM, COMMUNICATION CONTROL METHOD, AND COMMUNICATION CONTROL PROGRAM
CN102932255B (en) Method and device for selecting tunnel path
CN112188582B (en) Reliable routing method for lattice network based on physical perception information
CN113347088A (en) Improved wireless self-organizing network multilink routing method
CN113708953B (en) Underwater acoustic sensor network anti-damage method based on node importance balance
KR100776327B1 (en) Dynamic Load Balancing Routing Method in Wireless Networks
CN106230717A (en) Route obtaining method in group system and device
CN105208620B (en) A kind of industrial wireless sensor network route constructing method towards transmitting interference
KR101503076B1 (en) A hole bypassing method in a location-based routing technique and a sensor node
Huc et al. Early obstacle detection and avoidance for all to all traffic pattern in wireless sensor networks
CN116319512B (en) Intra-domain route protection method based on node reverse order relation
Hsu et al. Reliable greedy forwarding in obstacle-aware wireless sensor networks
Choi et al. Design and performance analysis of a proxy-based indirect routing scheme in ad hoc wireless networks
Popa et al. Reducing congestion effects by multipath routing in wireless networks
Song Cross layer design in wireless sensor networks
CN118118404A (en) A multi-mode collaborative perception network routing intelligent self-healing method and application
CN117880170A (en) Importance determining method, device and equipment for key boundary nodes of routing topology

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant