Geographic routing using hyperbolic space
R Kleinberg - IEEE INFOCOM 2007-26th IEEE International …, 2007 - ieeexplore.ieee.org
IEEE INFOCOM 2007-26th IEEE International Conference on Computer …, 2007•ieeexplore.ieee.org
We propose a scalable and reliable point-to-point routing algorithm for ad hoc wireless
networks and sensor-nets. Our algorithm assigns to each node of the network a virtual
coordinate in the hyperbolic plane, and performs greedy geographic routing with respect to
these virtual coordinates. Unlike other proposed greedy routing algorithms based on virtual
coordinates, our embedding guarantees that the greedy algorithm is always successful in
finding a route to the destination, if such a route exists. We describe a distributed algorithm …
networks and sensor-nets. Our algorithm assigns to each node of the network a virtual
coordinate in the hyperbolic plane, and performs greedy geographic routing with respect to
these virtual coordinates. Unlike other proposed greedy routing algorithms based on virtual
coordinates, our embedding guarantees that the greedy algorithm is always successful in
finding a route to the destination, if such a route exists. We describe a distributed algorithm …
We propose a scalable and reliable point-to-point routing algorithm for ad hoc wireless networks and sensor-nets. Our algorithm assigns to each node of the network a virtual coordinate in the hyperbolic plane, and performs greedy geographic routing with respect to these virtual coordinates. Unlike other proposed greedy routing algorithms based on virtual coordinates, our embedding guarantees that the greedy algorithm is always successful in finding a route to the destination, if such a route exists. We describe a distributed algorithm for computing each node's virtual coordinates in the hyperbolic plane, and for greedily routing packets to a destination point in the hyperbolic plane. (This destination may be the address of another node of the network, or it may be an address associated to a piece of content in a Distributed Hash Table. In the latter case we prove that the greedy routing strategy makes a consistent choice of the node responsible for the address, irrespective of the source address of the request.) We evaluate the resulting algorithm in terms of both path stretch and node congestion.
ieeexplore.ieee.org
以上显示的是最相近的搜索结果。 查看全部搜索结果