7-6 Industrial Communication Systems
in.this.category.comprise.core.extraction.distributed.ad.hoc.routing.(CEDAR).protocol.[SSB99].and.
zone-based.hierarchical.link.state.(ZHLS).routing.protocol.
7.2.2.2
Flat and Hierarchical routing Protocols
Hierarchical
.routing.protocols.arrange.nodes.in.the.form.of.clusters.or.trees.where.every.cluster.has.a.clus-
ter
.head..Cluster.heads.may.also.aggregate.data.from.cluster.nodes.to.reduce.the.number.of.packet.trans-
missions
.and.hence.conserve.energy.[CPF05].or.may.provide.gateway.to.external.networks..Advantages.
of.hierarchical.routing.protocols.include.scalability.and.ecient.communication.[AK04]..AODV,.DSDV,.
and.DSR.are.examples.of.at.routing.protocols,.while.CGSR.is.an.example.of.hierarchical.routing.scheme.
7.2.2.3
Position- and Nonposition-Based routing Protocols
It
.is.experimentally.veried.that.reactive.and.proactive.routing.protocols,.including.AODV,.DSDV,.and.DSR.
that.do.not.use.location.information.in.routing.decisions,.face.scalability.issues.as.opposed.to.location-based.
routing.strategies.[S02]..Location-based.routing.depends.upon.the.physical.position.of.the.nodes.in.the.net-
work
.to.take.routing.decisions.[MWH01]..To.get.location/position.information,.the.node.may.use.a.low-
power
.global.positioning.system.(GPS).if.the.nodes.are.outdoor.or.may.rely.on.relative.positioning.techniques.
based.on.the.signal.strength.or.manual.registration.process..Several.position-based.routing.schemes.[SL01].
have.already.been.presented.by.the.research.community..Position-based.routing.algorithms.are.classied.into.
greedy.and.restricted.directional.ooding..In.greedy.approaches,.the.distance.toward.the.sink.node.is.either.
maximized.or.minimized.depending.upon.forwarding.strategy,.while.in.directional.ooding,.the.data.are.
always.ooded.toward.the.nodes.which.are.in.the.direction.of.the.destination.node..Greedy.perimeter.state-
less
.routing.(GPSR).[KK00].and.geographic.distance.routing.(GEDIR).[SL01].are.examples.of.position-based.
routing.protocols.working.on.the.principle.of.greedy.forwarding.approach.
7.2.3 MaC Layer
MAC.schemes.are.used.to.dene.policy.for.accessing.the.shared.medium.in.ad.hoc.networks..Limited.
spectrum,. multiple.access,. node.mobility,. error-prone. environment,. and. characteristics. of. wireless.
medium.like.noise,.fading,.and.interference.compel.to.design.MAC.schemes.customized.for.wireless.
environments..e.MAC.schemes.for.ad.hoc.networks.can.be.classied.into.contention-free.and.con-
tention-based
.protocols..Contention-free.protocols.work.better.in.infrastructure-driven.networks.with.
a.master.node.controlling.the.medium.access..Contention-based.protocols.work.in.a.decentralized.fash-
ion
.and.can.be.divided.into.random.access.and.controlled.access.(scheduling-.and.reservation-based).
protocols..e.performance.of.such.protocols.is.deteriorated.by.hidden.and.exposed.terminal.problems.
and.requires.special.attention.
Let
.us.assume.that.node-1.is.sending.data.to.node-2,.as.shown.in.Figure.7.3..Furthermore,.assume.
that.node-3.is.also.about.to.send.data.to.node-2..As.node-3.is.out.of.the.transmission.range.of.node-1,.
Range of 1 Range of 2 Range of 3
1 2 3 4
FIGURE 7.3 Hidden.and.exposed.terminal.problem.
© 2011 by Taylor and Francis Group, LLC