Rules of Designing Routing Metrics for Greedy, Face, and Combined Greedy-Face Routing
#1

Rules of Designing Routing Metrics for Greedy,
Face, and Combined Greedy-Face Routing


Yujun Li, Yaling Yang, and Xianliang Lu




Abstract—


Different geographic routing protocols have different requirements on routing metric designs to ensure proper operation.
Combining a wrong type of routing metrics with a geographic routing protocol may produce unexpected results, such as geographic
routing loops and unreachable nodes. In this paper, we propose a novel routing algebra system to investigate the compatibilities
between routing metrics and three geographic routing protocols including greedy, face, and combined greedy-face routing. Five
important algebraic properties, respectively, named odd symmetry, transitivity, strict order, source independence, and local minimum
freeness, are defined in this algebra system. Based on these algebraic properties, the necessary and sufficient conditions for loop-free,
delivery-guaranteed, and consistent routing are derived when greedy, face, and combined greedy-face routing serve as packet
forwarding schemes or as path discovery algorithms, respectively. Our work provides essential criteria for evaluating and designing
geographic routing protocols

for more ::-0>

http://doi.ieeecomputersociety10.1109/TMC.2009.171

http://ieeexplore.ieeeiel5/5061887/50618...er=5061907
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: face detection lbp matlab, source code for greedy helper discovery protocol, routing bit for slotcar track, face wash market size in india, face recognition technology seminarproject ppt, touch football rules, rules for lds seminary,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
Brick Face Recognition using the Techniques Base on Principal Component Analysis (PCA) computer science crazy 3 2,968 04-03-2013, 01:21 PM
Last Post: Guest
  FACE RECOGNITION USING NEURAL NETWORKS (Download Seminar Report) Computer Science Clay 70 32,015 01-02-2013, 09:28 PM
Last Post: Guest
  FACE RECOGNITION TECHNOLOGY A SEMINAR REPORT Computer Science Clay 25 35,370 14-01-2013, 01:07 PM
Last Post: seminar details
  SEMINAR REPORT on Adaptive Routing in Adhoc Networks Computer Science Clay 2 4,936 02-01-2013, 10:25 AM
Last Post: seminar details
  AN EXTENDED ZONE ROUTING PROTOCOL FOR SERVICE DISCOVERY IN MOBILE AD HOC NETWORKS seminar presentation 1 9,320 24-12-2012, 12:47 PM
Last Post: seminar details
  Enhanced QoS Multicast Routing Protocol nit_cal 1 5,711 20-12-2012, 10:31 AM
Last Post: seminar details
  IP MULTICAST ROUTING project report helper 2 5,905 20-12-2012, 10:31 AM
Last Post: seminar details
  A survey of usage of Data Mining and Data Warehousing in Academic Institution and Lib seminar class 1 2,124 29-11-2012, 12:56 PM
Last Post: seminar details
  Distributed Cache Updating for the Dynamic Source Routing Protocol seminar class 3 2,286 17-11-2012, 01:26 PM
Last Post: seminar details
  A SURVEY OF QoS ROUTING PROTOCOLS FOR MOBILE AD HOC NETWORKS project report helper 1 1,993 07-11-2012, 12:42 PM
Last Post: seminar details

Forum Jump: