• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Intelligent Greedy Perimeter Stateless Routing Scheme for Unmanned Aerial Vehicles

    2023-01-11 03:14:56BAIGMohsinAyubZHANGYihong張義紅YEXiaoxian葉曉嫻SULTANAUmbrinAKBARSunilaLIShuaiAHMADSohail阿門德

    BAIG Mohsin Ayub(貝 歌), ZHANG Yihong(張義紅), 2*, YE Xiaoxian(葉曉嫻), SULTANA Umbrin(彩 虹), AKBAR Sunila(海 榮), LI Shuai (李 帥), AHMAD Sohail (阿門德)

    1 College of Information Science and Technology, Donghua University, Shanghai 201620, China2 Engineering Research Center of Digitized Textile & Fashion Technology, Ministry of Education, Donghua University, Shanghai 201620, China3 School of Art and Design, Shanghai University of Engineering Science, Shanghai 201620, China4 Department of Electrical Engineering, NED University of Engineering and Technology, Karachi 75270, Pakistan

    Abstract: The dynamic behavior, rapid mobility, abrupt changes in network topology, and numerous other flying constraints in unmanned aerial vehicle (UAV) networks make the design of a routing protocol a challenging task. The data routing for communication between UAVs faces numerous challenges, such as low link quality, data loss, and routing path failure. This work proposes greedy perimeter stateless routing (GPSR) based design and implementation of a new adaptive communication routing protocol technique for UAVs, allowing multiple UAVs to communicate more effectively with each other in a group. Close imitation of the real environment is accomplished by considering UAVs’ three-dimensional (3D) mobility in the simulations. The performance of the proposed intelligent greedy perimeter stateless routing (IGPSR) scheme has been evaluated based on end-to-end (E2E) delay, network throughput, and data loss ratio. The adapted scheme displayed on average 40% better results. The scenario has been implemented holistically on the network simulator software NS-3.

    Key words: flying ad-hoc network (FANET); vehicular ad-hoc network (VANET); unmanned aerial vehicle (UAV); greedy perimeter stateless routing (GPSR); intelligent greedy perimeter stateless routing (IGPSR)

    Introduction

    Recent developments in small-sized unmanned aerial vehicles (UAVs) or drones have enabled them to be used in versatile applications ranging from the civilian domain to the defense sector. The UAV technology has provided noticeable benefits in rescue operations, real-time monitoring, exploring undiscovered places, traffic monitoring, security, and events coverage. Moreover, they are beneficial at remote sites where humans cannot directly access[1]. Furthermore, the UAVs are quite essential in natural disasters (earthquakes, floods, heavy rainfall, and windstorm), as they can be used as an ad-hoc network to restore the broken communication network in disastrous regions and help connect the affected communication network with the nearest cellular infrastructure[2-3]. It has been found that the potential of multiple UAVs’ network is much more than that of a single UAV[4]. Besides, remarkable modern applications of UAVs[5-8]have increased their importance more than ever, making them an essential need of contemporary societies. A group of UAVs can perform the given task rather efficaciously and competently than a single UAV[9-12]. To achieve a given operation successfully in a group, a robust communication routing protocol is utmost important. It allows multiple UAVs to connect wirelessly and enables them to communicate and share information back and forth during the flight. More than one UAV (where each UAV represents a node) is connected without following any fixed infrastructure in space, which is known as a flying ad-hoc network (FANET). In FANET, each node is self-configured and self-managed. The nodes can communicate with each other directly or by multiple hops. To send information from the source node to the destination node, nodes along the way act as routers and assist data in arriving at the destination node by following multiple hops[13]. Therefore, nodes’ availability is crucial for efficiently transferring data packets.

    Unlike the vehicular ad-hoc network (VANET), the movement of nodes is two-dimensional (x,y), and FANET movement of nodes is three-dimensional (3D) (x,y,z).Moreover, the movement of UAV nodes in the air is highly dynamic and it is faster than the mobile ad-hoc network (MANET)[14-16]. Due to these constraints, designing a robust communication routing protocol for UAVs becomes a challenging job for scientists and researchers[17]. Many attempts have been made in the past in which protocols designed for VANETs are directly suggested for FANET without considering the 3D movement of nodes in FANET[18-19]. In this work, we proposed an adaptive intelligent greedy perimeter stateless routing (IGPSR) model based on a greedy perimeter stateless routing(GPSR) protocol. The suggested adaptive approach aims to improve the communication of mobile UAVs and create a robust UAV network. The new approach brings changes in the existing GPSR strategy. For instance, the classical GPSR method only uses a right-hand data forwarding scheme in the recovery mode, whereas the prescribed IGPSR technique considers the dual-mode data-carrying scheme. The other change includes the introduction of a new data routing table named an intelligent table (IT), which works along with the existing nearby inventory table (NIT).

    By working in collaboration, ITs and NITs maintain the data record of the source and destination pairs and do not allow data packets to get trapped between multiple nodes. Moreover, they help the nodes to find optimized paths for the data packets to be transmitted to the destination nodes following relatively fewer hops. These alterations give intelligence to each node operating in the network that subsequently reduce end-to-end (E2E) delay and data loss ratio and increase network throughput.

    The biggest advantage of GPSR is that nodes store the least amount of information and can quickly respond to changes in topology. This work proposes a routing protocol that stores detailed information. However, results show that, even though the nodes in the IGPSR technique store more information than those in the GPSR, the adaptive IGPSR technique has produced much better results compared to the classical GPSR protocol while both approaches are compared on metrics: E2E delay, network throughput, and data loss ratio.

    1 Related Research Work

    The UAVs have been continuously investigated in the past several years, countless pieces of research and surveys have been conducted, and different routing protocols have been suggested so far. Sangetal.[20]discussed routing protocols that emerged in recent years for UAVs and compared them with each other in detail. Bekmezcietal.[21]tried to create an infrastructure less communication among multiple UAVs with the help of satellites. Another prominent research has been carried out to create an effective routing protocol for UAVs. In this work, after getting inspired by bees’ movements, Leonov[22]suggested a nature-inspired routing algorithm for UAVs in which nodes followed the ditto movements like bees. Another similar kind of study had been done[23], where de Rango et al.[23]suggested a light way bio-inspired coordination routing protocol for UAVs. However, this protocol was especially recommended for agriculturally based applications where sudden climate change could be an important issue for the farmers.

    Sangetal.[24]presented an energy-efficient opportunistic routing protocol based on trajectory prediction (EORB-TP) for UAVs. In this work, the possibility of future time moving speed of a node has been analyzed, and limited energy and buffer of nodes have been taken into account in the simulations. Another related effort has been put recently into designing a UAV routing strategy with the name, future network topology-aware routing (FNTAR) protocol[25]. In this attempt with the aid of a ground positioning system (GPS), the future position of the UAV nodes has been utilized to select the best path for the data packet to arrive at the destination node faster. Moreover, data loss problems caused by unstable link quality and dynamic network topology have also been resolved. Furthermore, Bahlouletal.[26]proposed a flocking-based demand routing protocol called Boids of Reynolds ad-hoc on-demand distance vector (BR-AODV) for UAVs. To transmit data to the next node and to maintain routing path and connectivity, Boids and Reynolds method[26]has been used. In addition, for proactive drones, automatic discovery of ground base station has been presented. Likewise, another scheme based on an ad-hoc on-demand vector has been proposed. Tanetal.[27]presented a simpler and more secure routing protocol algorithm for UAVs called improved security ad-hoc on-demand distance vector (ISAODV). By means of simulations, it has been proved that the newly introduced method can perform better compared to the former method security ad-hoc on-demand distance vector (SAODV).

    On the flip side, quite a few studies and comparisons have been carried out in which routing protocols ad-hoc on-demand distance vector (AODV), destination-sequenced distance-vector (DSDV), dynamic source routing (DSR), dynamic source routing (OLSR), ad-hoc on-demand multipath distance vector (AOMDV), and hybrid wireless mesh protocol (HWMP) designed for the mobile ad-hoc network have been directly suggested for UAVs without taking into account the 3D movement of nodes[19, 28-29]. The UAV network topology changes rapidly, which is directly proportional to the quality of E2E delay, network throughput, and data loss ratio[30]. Therefore, an optimal mobility model is inevitable in order to analyze the network behavior realistically. The presented IGPSR model is compiled with the 3D Gauss Markov mobility model, and designed to imitate the 3D movement of nodes in a 3D rectangular space.

    GPSR is a position-based routing protocol, and sends a packet from the source node to the destination node. It selects the nearest node in terms of distance and transfers the packet to the destinations by the following multiple hops. In a network, every node also acts as a router and assists its neighbors to transmit data to the destination[31]. In the GPSR network, every single node is equipped with a GPS[32].

    The GPS is designed to find the location of objects on earth. Hence is not appropriate for finding the position or location of objects in space. However, the continuous development in the field of tracking and positioning of space objects has made it possible to locate the exact position or location of moving objects in space. In this case, each UAV has a built-in relative positioning system[33], which helps every node to locate and determine its position in space. The location information is shared by beacons from the medium access control (MAC) layer. Each node with the help of a beacon algorithm broadcasts hello packets (which contains node IDs and their coordinates’ information) at a regular interval of time, to help their neighbors keep their routing tables up to date[34].

    Principally, the GPSR protocol routing technique uses dual-mode data-carrying strategies: greedy forwarding strategy and perimeter forwarding strategy or recovery mode. Coordinate information related to the position of each node is assumed to be acquired through the medium of localization or positioning systems (GPS/RPS). After assessing the beacon messages, the actual node checks the status of the mode in which the last data packet is received. If it is greedy forward, the actual node will begin seeking the nearest node to pass on the data packet which should be closer to the destination node than the actual node itself. If the existing node does not get feedback from the nearby node, it will reckon as if the communication link is broken and will remove all records from its routing table. These unique settings are called local minimum state when the actual node does not find any better suitable node in its neighborhood. At this stage, GPSR has to change its strategy from greedy forward to perimeter forward. In this approach, every radio node follows the right-hand strategy and conveys the data packet to the next closest right-hand node.

    As shown in Fig.1, each node is aware of the positions of surrounding nodes with the help of beacon messages. Presupposing the network is operating in the greedy mode, nodeS(source node) is an actual node in this situation and it transmits the data packet to the destination nodeD. Carrying out this task, nodeSwill seek for a nearer node which should be closer to nodeD, then nodeSitself (communication range of nodeSis shown with the help of green circle in Fig.1). In this case, it will select nodeAas it is closer to nodeDthan nodeS. By following the greedy forwarding strategy, nodeSwill transmit the data packet to nodeA. Since nodeDis out of the communication range of nodeA(communication range of nodeAis shown with the help of red circle in Fig.1). At this moment, the network is in the local minimum state. Consequently, according to the algorithm, the network will change its strategy from greedy forwarding mode to perimeter forwarding mode. It will start following the right-hand strategy and thereby nodeAwill transmit the data packet to the right-hand nodeB. With the same forwarding mode, nodeBwill transfer the data packet to nodeC. At this point, the network will return to greedy mode because the distance between nodeCand nodeDis less than that between nodeAand nodeD(distance from nodeDto nodesAandCis shown with the help of a black circle in Fig.1). NodeCusing greedy forwarding will forward the data packet to nodeF, and then nodeFwill transmit the data packet to destination nodeD.

    Fig.1 Basic working of GPSR communication protocol

    2 Issues with GPSR

    The packet transporting in GPSR routing technique depends on nodes positions. Because of the dynamic nature of nodes, they keep changing their positions in different circumstances, and the data packet can trap in a loop formed by the group of nodes. If the data packets trap between a group of nodes, the data packets will take much more hops to arrive at the destination node. Additionally, when the classical GPSR data routing technique encounters the local minimum state, the algorithm changes its data forwarding strategy from greedy forwarding strategy to perimeter forwarding strategy. At that moment, the classical algorithm only follows the right-hand strategy and does not consider the left-hand strategy.

    When the algorithm runs into the local minimum state, the situation is considered to understand the effect of overlooking the left-hand strategy on the network’s robustness.

    If the classical GPSR algorithm follows both the left-hand and the right-hand strategies, then the local minimum node not only finds the right-hand node or the left-hand node to transfer the data packet, but also selects the shortest possible path leading to the destination node, which can be achieved by selecting the right-hand or the left-hand node, depending on the given situation. As a result, the data packet could arrive at the destination node by following a comparatively lesser number of hops. Subsequently, it would mainly improve the whole network operation and increase its robustness. However, the traditional GPSR technique does not take into account the left-hand strategy which stagnates the network’s end results.

    In fact, these data trapping or one-handed data forwarding contingencies can end up losing data on the way. Nonetheless, the classical GPSR routing protocol does not take into account the obstacles between the nodes which not only atrophy communication among the mobile nodes, but also extremely affect the strength and sturdiness of the utter system.

    These all types of fortuitous events increase the E2E delay, the data loss ratio, and decrease the average network throughput. Consequently, not only do these factors affect the vigor of the network, but also deteriorate the overall performance of the network.

    As shown in Fig.2, actual nodeS(source node) sends the data packets to nodeD. NodeDis inaccessible from nodeSbecause it is out of the communication range of nodeS(range of nodeSis shown with the help of the green circle in Fig.2). As a result, nodeScannot send data packets directly to nodeD(the destination node in this case). Assume that the network is operating in the greedy forwarding mode at the moment. NodeBis a closer node to the destination nodeDthan nodeSitself. Therefore, nodeSforwards data packets to nodeB.In the given scenario, nodeBis the closest node to the destination nodeDthan any other node in the surrounding (distance of the nodeDfrom the other nodes is shown with the help of the black circle in Fig.2). However, the nodeDis out of the communication range of nodeB(the range of nodeBis shown with the help of the red circle in Fig.2). Therefore, nodeBin this case is in local minimum state. Consequently, the algorithm changes the data forwarding strategy from greedy forwarding strategy to perimeter forwarding strategy. Subsequently, nodeBacquires the right-hand method and forwards the data packet to the closest right-hand nodeC.NodeCcan deliver the data packet to destination nodeDby following the path {C-F-A-D}. The nodes are mobile in nature, so they can change their positions. It is supposed that the data packet is transferred from one node to another, and nodeFchanges its position and gets a new positionF′ (shown in Fig.2). Now nodeCby following the right-hand rule would transfer the data packet to nodeF′ as it is the best possible option at the moment. Next, nodeF′ would forward the data packet to nodeBagain. As a result, the data packet will get trapped in a loop formed by the nodes {B-C-F′}. Eventually, the data packets would make many more extra hops arrive from the source nodeSto the destination nodeD.

    Fig.2 Issues with GPSR communication protocol

    3 Proposed Methodology

    To resolve the serious issues connected with the former GPSR routing protocol highlighted in the previous section, an adaptive scheme IGPSR has been proposed in the following section.

    The objective of this new approach is to boost the working performance of the existing GPSR protocol. The network enhancements are achieved by introducing an additional data table named IT which is an extension of the default data table called NIT. The new table IT works in correlation with NIT and helps the algorithm record information connected with the node’s positions and data packets relatively well, and each node can make the decisions intelligently in different given circumstances. Furthermore, unlike the traditional GPSR routing technique, when the network encounters a local minimum state, the IGPSR uses both left-hand and right-hand data forwarding schemes. These newly developed changes help the network overcome the problems and issues faced with the former classical GPSR routing protocol, and enhance the entire network’s performance in terms of metrics: E2E delay, network throughput, and data loss ratio significantly. The following section discusses NIT and IT.

    3.1 NIT

    Mobile nodes periodically send out and receive a hello packet from the single-hop neighbors. The purpose of NIT is to store and maintain neighboring nodes’ information in its inventory table which includes location information (x,y,z) of the nearby nodes, internet protocol (IP) address (node identification), and the timestamp of the last received hello packet. NIT is updateable and can be overwritten by the new entry over the last entry.

    3.2 IT

    IT works in correlation with NIT. This table comprises various information including IP address of neighboring nodes, vectors of IP addresses of destinations, and data forwarding strategy (Fs) which can be greedy forward (Gf), right-hand forward (Rhf), or left-hand forward (Lhf), and destination IP address (D). Since IT is an extension of NIT, both tables work in cooperation. IT refreshes its data with every new hello packet received from each neighbor. This feature allows the algorithm to work in synchronization with the current model.

    In the proposed technique, when a network operates in greedy forwarding mode, the IT helps nodes select the best neighboring node to transfer data packets by verifying two conditions. Firstly, the data forwarding node verifies, and if it has not received a data packet from the data receiving node operating in the recovery mode for the same destination node, its IP address does not exist in the IT of the forwarding node. Secondly, the same data packet has not been sent to the receiving node for the same destination.

    If the first condition is false, the forwarding node would not consider receiving nodes unless the IT of the forwarding node does not get refreshed. And if the second condition is false, then the forwarding node will search for another suitable neighbor. If the forwarding node does not find any reasonable neighboring node in its vicinity, then the local minimum state occurs. The purposed IGPSR protocol also enters into the perimeter mode just like the GPSR protocol. However, it follows a two-way data forwarding strategy unlike classical GPSR which only follows the one-way strategy. Nonetheless, in IGPSR, while the network operates in perimeter or recovery mode, the receiver node discards the data packet if it has already received the same data packet for the same destination unless the IT of the receiver gets refreshed. This ability reduces the packet duplication possibility and the network overhead load and hence, increases the network’s efficiency.

    The IT is designed to help actual nodes find an efficient path to transmit the data packet to the destination, and enable data packets to arrive at their destinations using a lesser number of hops. Furthermore, it also helps data packets avoid the local minimum state, and improves network efficacy remarkably.

    The proposed algorithm IGPSR for UAVs works as follows.Rrepresents a recipient node, andCis the set of closest single-hop nodes {C1,C2, …,Cn}. Data forwarding strategy is represented byFs, andIrepresents a unique packet identity for every single source-destination pair. Variablercontains the distance from nodeCnto the destination nodeD, anddis the data packet forDas shown in Fig.3.

    Fig.3 Representation of mobile nodes and parameters

    For data packets identification, identification field of IP version 4 (IPv4) is used, because it can generate 232unique number of combinations. These combinations help identify each pair of source and destination respectively. The working principle of the proposed algorithm is explained with the help of flow diagrams. Figure 4 represents the procedure while a node receives a packet. Figure 5 represents the procedure while a node forwards a packet.

    Fig.4 Packet receiving flow diagram of proposed IGPSR algorithm

    Fig.5 Packet forwarding flow diagram of proposed IGPSR algorithm

    3.3 Greedy and perimeter forwarding with IGPSR

    As shown in Fig.6, there are two source-destination pairs: nodesAandF; nodesGandF. Consider the network follows GPSR protocol and nodeA, from the first pair, deliver packetd1to nodeF. Using greedy forwarding strategy, nodeAfollows the path {A,B,C,D,F}. When the data packetd1arrives at nodeF, the packet faces the local minimum. At this moment, the network would change the data forwarding strategy to perimeter forwarding strategy. Now, by following the right-hand rule, the nodeFwill forward the data packetd1to nodeE, and the data packet will follow through this strategy from nodeF{F,E,D,C,B,A,G,H,I,J,K,M} until nodeM. At nodeM, the data forwarding strategy returns to greedy forwarding mode as nodeMis nearer to the destination nodePand nodeF(distance from nodePto nodesFandMis shown with the black circle in Fig.6). Finally, by following the path {M,N,P}, the data packetd1arrives at the destination nodeP. It means that data packetd1following GPSR routing strategy needs to make 17 hops to arrive from nodeAto nodeP. Data transferring path is represented by curved solid and dotted arrows in Fig.6.

    In the GPSR technique, due to its simplicity, the data packet always follows the same path to deliver a packet between the same source and destination pair. On the other hand, the suggested algorithm IGPSR with the help of extension table IT not only enables the data packet to follow different paths while traveling between the same source and destination pair but also saves data packets from the local minimum state. For instance, in a given situation, when the data packetd1arrives at nodeF, in the proposed technique, the network also changes strategy to perimeter forwarding strategy and nodeFtransfers packetd1to nodesDandEby following left-hand and right-hand data forwarding modes. NodeD, in this case, will discard the packetd1received from nodeE, since it has already received the data packetd1from nodeFfor the same destination nodeP. Next, by following a similar step, like GPSR technique, the data packetd1arrives at the destination nodeP. The data packetd1following IGPSR routing strategy will also have to make 17 hops to arrive from nodeAto nodeP. However, when source nodeAsends the second packetd2to the same destination nodeP. In order to transfer datad2, nodeAwill not select neighborB, nodeAhas received data packetd1from nodeBwhile nodeBis being operated in a recovery mode and nodeAstill has this entry in its IT. This means the first condition of IGPSR does not verify. Thereby, to transfer data packetd2from source nodeAto nodeP, using IGPSR algorithm, the data packetd2will travel through from nodes {A,G,H,I,J,K,M,N,P} and make only 8 hops to arrive at the destination, which is, a significant reduction in hops.

    The flexibility of the proposed algorithm lies in the fact that the actual node can skip a node only if the same source and destination node pair are involved in communication. This means that nodeAtransfers data packets to nodeP, and the second source and destination pair (nodesGandF) can easily transfer the data packet from the source nodeGto the destination nodeFwithout skipping nodeB{G,B,C,D,F}, since this time destination node for the packet is different. The data transferring path is represented by solid blue arrows in Fig.6. Within the set time duration, nodeAwill refresh its NIT, which will help IT erase old entries from the table, and NIT will start receiving hello packets from the neighbors.

    Nonetheless, the standard GPSR approach in recovery mode only employs a right-hand data forwarding strategy, and many scenarios may be imagined in which the data packet either makes a significantly higher number of hops or fails to be safely transmitted to the destinations. Whereas IGPSR, by using left-hand and right-hand date forwarding strategies in recovery mode, can help data packets to be successfully transported to the destinations in the same situations much more effectively. The performance of the proposed IGPSR technique is evaluated in the following section.

    4 Simulation Results and Discussion

    The proposed algorithm is simulated in an open-source network simulator NS-3, specially designed for the executions of mobile ad-hoc networks. To keep it simple, the node velocity is considered to be constant as 25 km/h. The simulation was performed in an area of 100 m3and the duration between hello packets was kept at 1 s. The packet size for the data packet was set to 1 024 bytes and the simulation duration was 180 s. Mac layer protocol 802.11p dedicated to wireless access in vehicular environment (WAVE) has been used. To depict the realistic 3D nodes’ movement, 3D Gauss Markov mobility model is implied in this experiment. Because of its fast data transmission, user datagram protocol (UDP) is used to transfer data to the destination. The time delay between two data packets is set to 1/10 s. NIT refresh rate is 1 time every 3 s. An omnidirectional antenna with a transmission range of 275 m is set during the simulation. By varying the number of source and destination pairs from 8 to 32 and UAVs from 30 to 110, the network performance of the former GPSR has been compared with that of the prescribed IGPSR technique. To get the precise result, 30 simulations have been executed on each given situation. E2E delay, network throughput, and data loss ratio have been considered as performance matrices. To store neighboring nodes’ information, GPSR’s node uses 16 bytes of space. However, the IGPSR’s node uses 24 bytes of space for each neighbor node because of its additional table. Table 1 shows the parameters used in simulation in summarized form.

    Table 1 Parameter list

    4.1 E2E delay analysis

    Figure 7 shows the performance comparison of GPSR and IGPSR, and there are 8 source and destination pairs considered in an experiment. On the one hand, E2E delay of GPSR is higher than that of IGPSR under any circumstances. On the other hand, the performance of both networks improves as the number of UAVs increases from 30 to 110, and it is completely apparent that the more router nodes accessible, the faster the data packets arrive at the target node. Whereas in Fig.8, 32 source and destination pairs are considered in the experiment, the IGPSR has produced out-class results. There are two reasons. Firstly, the IGPSR transfers consecutive packets to the same source and destination pair by following a fewer number of hops. Secondly, it discards the repeated packets, and thus the congestion on the network reduces. As a result, the delay decreases.

    Fig.7 Average E2E delay with 8 source and destination pairs and varying numbers of UAVs on x-axis

    Fig.8 Average E2E delay with 32 source and destination pairs and varying numbers of UAVs on x-axis

    4.2 Network throughput analysis

    Figure 9 depicts a behavior of comparison between IGPSR and GPSR data routing protocols. There were 8 source and destination pairs in a network, and there were 30 UAVs available. The proposed technique IGPSR produced good results and as the availability of nodes increased, it showed even better throughput compared to GPSR. On the flip side, in Fig.10, when the source and destination pairs increased from 8 to 32, the proposed technique displayed much better throughput. For instance, in Fig.10, with 90 available UAVs in an experiment, the GPSR protocol showed better output, and this could be justified by the fact that, GPSR had less congestion network than IGPSR especially in recovery mode, and GPSR just had to forward the data packet to the right-hand node. Whereas the proposed technique utilizesRhfandLhf. However, in IGPSR with the help of IT and NIT, a node can discard duplicated packets thereby reducing network congestion.

    Fig.9 Average network throughput with 8 source and destination pairs and varying numbers of UAVs on x-axis

    Fig.10 Average network throughput with 32 source and destination pairs and varying numbers of UAVs on x-axis

    4.3 Data loss ratio analysis

    Figure 11 displays the contrast of IGPSR and GPSR routing protocols. When there were 8 source and destination pairs used in the experiment, at the time of 30 available UAV nodes, both techniques exhibited the same results. Nonetheless as the number of UAVs increased, there was a continuous reduction in data loss in both methods and it made sense, since the number of nodes increased. Consequently, more nodes were available to act as a router to help data packets arrive at destinations conveniently. In Fig.12, when there were 32 source and destination pairs involved in observation, the prescribed method produced remarkable results. The data loss ratio reduced drastically and predictably as the availability of nodes increased from 30 onwards in both strategies. However, the given solution produced significantly superior results. The IGPSR approach with the help of IT and NIT, prevented packets from reaching a dead end and allowed data packets to arrive at the target node successfully in most situations. Whereas GPSR might remain unsuccessful in these circumstances.

    Fig.11 Average packet ratio with 8 source and destination pairs and varying numbers of UAVs on x-axis

    Fig.12 Average packet ratio with 32 source and destination pairs and varying numbers of UAVs on x-axis

    5 Conclusions

    Dynamic, unpredictable 3D movement of nodes, highly changeable network topology, and several other flying constraints make the design of a UAV routing protocol a challenging task. In this paper, a new adaptive algorithm IGPSR routing protocol has been designed and implemented for UAVs. Compared to the former GPSR technique, the presented IGPSR technique, when assessed on the metrics of the E2E delay, the average network throughput, and the data loss ratio, has produced on average 40% better results. Additionally, in the past many attempts have been made to design an effective routing protocol. However, in many investigations, scholars overlooked the importance of 3D mobility of UAVs in their works. In this paper, in order to achieve more truthful results, the 3D Gauss Markov mobility model has been considered in simulations.

    In the future work, we would analyze the effectiveness of the network in presence of different source and destination node pairs. Furthermore, we would compare the suggested IGPSR algorithm with some other existing routing algorithms. Lastly, we would investigate the behavior of the network in the presence of obstacles.

    国产极品天堂在线| 久久99热6这里只有精品| 国产亚洲一区二区精品| 免费黄网站久久成人精品| 欧美97在线视频| 在线精品无人区一区二区三| 亚洲av日韩在线播放| 精品久久久久久久久亚洲| 亚州av有码| 亚洲av电影在线观看一区二区三区| 狂野欧美激情性xxxx在线观看| 国产av国产精品国产| 欧美xxxx性猛交bbbb| 成人二区视频| 国产av一区二区精品久久| 五月开心婷婷网| 美女大奶头黄色视频| 爱豆传媒免费全集在线观看| 色婷婷久久久亚洲欧美| 一级爰片在线观看| 欧美三级亚洲精品| 国产男人的电影天堂91| 精品卡一卡二卡四卡免费| 晚上一个人看的免费电影| 91精品一卡2卡3卡4卡| 永久免费av网站大全| 一级毛片 在线播放| 日日摸夜夜添夜夜爱| 国产无遮挡羞羞视频在线观看| 秋霞伦理黄片| 亚洲精品视频女| 大片电影免费在线观看免费| 九色亚洲精品在线播放| 精品久久久噜噜| 精品酒店卫生间| 国产一区二区三区av在线| 欧美少妇被猛烈插入视频| 99久国产av精品国产电影| 乱人伦中国视频| www.av在线官网国产| 亚洲精品日韩av片在线观看| 亚洲av电影在线观看一区二区三区| 丝袜脚勾引网站| 亚洲第一av免费看| 久久免费观看电影| 成人18禁高潮啪啪吃奶动态图 | 午夜免费男女啪啪视频观看| 久久免费观看电影| 青青草视频在线视频观看| a级毛色黄片| 国产午夜精品一二区理论片| 母亲3免费完整高清在线观看 | 99re6热这里在线精品视频| 日韩av在线免费看完整版不卡| 日韩中文字幕视频在线看片| 曰老女人黄片| 国产又色又爽无遮挡免| 制服诱惑二区| av国产精品久久久久影院| 另类精品久久| 伦理电影大哥的女人| av播播在线观看一区| 成人18禁高潮啪啪吃奶动态图 | 国产av精品麻豆| 久久精品国产自在天天线| 亚洲情色 制服丝袜| 少妇人妻精品综合一区二区| 午夜免费男女啪啪视频观看| 国产黄色免费在线视频| xxxhd国产人妻xxx| 丝瓜视频免费看黄片| 日韩熟女老妇一区二区性免费视频| av免费观看日本| 久久99热这里只频精品6学生| 国产乱来视频区| 国产不卡av网站在线观看| 婷婷色麻豆天堂久久| 一本—道久久a久久精品蜜桃钙片| 婷婷色麻豆天堂久久| 日韩一区二区三区影片| 亚洲不卡免费看| 成年av动漫网址| 建设人人有责人人尽责人人享有的| 又大又黄又爽视频免费| 纵有疾风起免费观看全集完整版| 人妻夜夜爽99麻豆av| 久久精品国产自在天天线| 亚洲国产精品专区欧美| 免费久久久久久久精品成人欧美视频 | 久久99精品国语久久久| 成人国产av品久久久| 国产av精品麻豆| 国产成人精品久久久久久| 日韩一本色道免费dvd| 亚洲av欧美aⅴ国产| 国产免费现黄频在线看| 日本-黄色视频高清免费观看| 久久精品国产亚洲av涩爱| 国产免费现黄频在线看| 2022亚洲国产成人精品| 欧美少妇被猛烈插入视频| 日本欧美国产在线视频| 欧美3d第一页| 午夜视频国产福利| 99精国产麻豆久久婷婷| 美女主播在线视频| 日本猛色少妇xxxxx猛交久久| 天美传媒精品一区二区| 好男人视频免费观看在线| 成年人午夜在线观看视频| 中文乱码字字幕精品一区二区三区| 国产成人免费无遮挡视频| 国产亚洲欧美精品永久| 啦啦啦中文免费视频观看日本| 丝袜美足系列| 日韩亚洲欧美综合| 51国产日韩欧美| 国产老妇伦熟女老妇高清| 国产视频内射| 免费黄网站久久成人精品| 一个人免费看片子| 亚洲精品一二三| 色94色欧美一区二区| freevideosex欧美| 成人国语在线视频| 天堂8中文在线网| 亚洲高清免费不卡视频| 韩国av在线不卡| 国产日韩欧美在线精品| 伊人亚洲综合成人网| 中文字幕最新亚洲高清| 中文字幕制服av| 久久国产精品大桥未久av| 97超视频在线观看视频| 久久久久国产精品人妻一区二区| 高清视频免费观看一区二区| 少妇人妻久久综合中文| 亚洲五月色婷婷综合| 欧美激情国产日韩精品一区| 日本wwww免费看| 夜夜骑夜夜射夜夜干| 国产免费又黄又爽又色| 如日韩欧美国产精品一区二区三区 | 嫩草影院入口| 日韩电影二区| 日韩伦理黄色片| 一级毛片我不卡| 亚洲欧美色中文字幕在线| 久久免费观看电影| 丝袜美足系列| 国产成人午夜福利电影在线观看| 看非洲黑人一级黄片| 成人无遮挡网站| 精品亚洲成国产av| 久久热精品热| 日韩成人av中文字幕在线观看| 久久久久久久国产电影| 母亲3免费完整高清在线观看 | av.在线天堂| 中文精品一卡2卡3卡4更新| 狂野欧美激情性bbbbbb| 免费大片黄手机在线观看| 亚洲av成人精品一二三区| 美女cb高潮喷水在线观看| 老女人水多毛片| 寂寞人妻少妇视频99o| 国产亚洲最大av| 国产精品久久久久久久久免| 欧美日韩综合久久久久久| 一边亲一边摸免费视频| 久久久久久久大尺度免费视频| 国产成人精品在线电影| 搡老乐熟女国产| 亚洲国产成人一精品久久久| 精品人妻偷拍中文字幕| 久久精品久久精品一区二区三区| 久久精品国产鲁丝片午夜精品| 夜夜看夜夜爽夜夜摸| 一级毛片电影观看| av黄色大香蕉| 男女啪啪激烈高潮av片| 成人18禁高潮啪啪吃奶动态图 | 亚洲一区二区三区欧美精品| 最后的刺客免费高清国语| 国产色婷婷99| 日本与韩国留学比较| av在线播放精品| 国产亚洲av片在线观看秒播厂| 九九在线视频观看精品| 国产片内射在线| 精品99又大又爽又粗少妇毛片| 人体艺术视频欧美日本| 国产成人av激情在线播放 | 日韩一本色道免费dvd| 天堂8中文在线网| 久久精品国产a三级三级三级| 国产精品一区二区三区四区免费观看| 亚洲av福利一区| 亚洲av综合色区一区| 国产高清不卡午夜福利| 一级a做视频免费观看| 香蕉精品网在线| 久久国产精品大桥未久av| 欧美另类一区| 乱码一卡2卡4卡精品| 成年美女黄网站色视频大全免费 | 国产av一区二区精品久久| 久久精品国产自在天天线| 丰满少妇做爰视频| 久久久欧美国产精品| 成人国产麻豆网| 99久国产av精品国产电影| 久久久久久久久久成人| 亚洲国产av新网站| 久久久久精品性色| 欧美激情 高清一区二区三区| 精品国产乱码久久久久久小说| 国语对白做爰xxxⅹ性视频网站| 大又大粗又爽又黄少妇毛片口| 2022亚洲国产成人精品| 女性被躁到高潮视频| 欧美日本中文国产一区发布| 日韩av免费高清视频| 欧美成人精品欧美一级黄| 你懂的网址亚洲精品在线观看| 国产片内射在线| 日日啪夜夜爽| 91国产中文字幕| 我要看黄色一级片免费的| 麻豆成人av视频| 黑人高潮一二区| 国产精品久久久久久精品古装| 亚洲成色77777| 日韩中文字幕视频在线看片| 婷婷色av中文字幕| 男女边摸边吃奶| 精品国产国语对白av| 国产精品不卡视频一区二区| 久久久久久久久大av| 最近的中文字幕免费完整| 性高湖久久久久久久久免费观看| 午夜久久久在线观看| 九九爱精品视频在线观看| 国产免费一级a男人的天堂| 欧美性感艳星| 中文字幕免费在线视频6| 亚洲中文av在线| 午夜久久久在线观看| 精品99又大又爽又粗少妇毛片| 久久精品国产鲁丝片午夜精品| 人成视频在线观看免费观看| av国产久精品久网站免费入址| h视频一区二区三区| 亚洲精品日韩av片在线观看| 九色亚洲精品在线播放| 日韩,欧美,国产一区二区三区| 七月丁香在线播放| 亚洲人成网站在线播| 满18在线观看网站| 能在线免费看毛片的网站| 亚洲性久久影院| 我的女老师完整版在线观看| 亚洲av综合色区一区| 交换朋友夫妻互换小说| av电影中文网址| 国产午夜精品一二区理论片| 一边亲一边摸免费视频| 久久久久久久亚洲中文字幕| 婷婷色综合大香蕉| 免费黄色在线免费观看| 国产免费一级a男人的天堂| 最近中文字幕高清免费大全6| 亚洲av成人精品一区久久| 国产国语露脸激情在线看| 51国产日韩欧美| 黑丝袜美女国产一区| 亚洲情色 制服丝袜| 大又大粗又爽又黄少妇毛片口| 3wmmmm亚洲av在线观看| 欧美日韩av久久| 最近中文字幕2019免费版| 在线观看美女被高潮喷水网站| 一级爰片在线观看| 亚洲一级一片aⅴ在线观看| 欧美亚洲日本最大视频资源| 久久99蜜桃精品久久| 免费日韩欧美在线观看| 美女脱内裤让男人舔精品视频| 美女xxoo啪啪120秒动态图| 亚洲欧美色中文字幕在线| 国产极品粉嫩免费观看在线 | 熟女电影av网| 91精品伊人久久大香线蕉| 80岁老熟妇乱子伦牲交| 各种免费的搞黄视频| 亚洲美女搞黄在线观看| 日本午夜av视频| 少妇 在线观看| 亚洲欧美一区二区三区黑人 | 桃花免费在线播放| 久久久精品区二区三区| 只有这里有精品99| 免费黄色在线免费观看| 亚洲激情五月婷婷啪啪| 狂野欧美白嫩少妇大欣赏| 中文字幕人妻丝袜制服| 夜夜骑夜夜射夜夜干| 成人亚洲精品一区在线观看| 高清不卡的av网站| 91精品三级在线观看| 国产视频首页在线观看| 人妻 亚洲 视频| 久久久久视频综合| 丝袜喷水一区| 中国三级夫妇交换| av在线app专区| 精品久久久久久久久亚洲| 国产乱来视频区| 精品人妻偷拍中文字幕| 日韩亚洲欧美综合| 插逼视频在线观看| 亚洲综合精品二区| 国产高清不卡午夜福利| 少妇猛男粗大的猛烈进出视频| 亚洲精华国产精华液的使用体验| 日韩av免费高清视频| 国产高清三级在线| 色婷婷av一区二区三区视频| 国产深夜福利视频在线观看| 最新中文字幕久久久久| 亚洲国产欧美日韩在线播放| 亚洲精品日韩av片在线观看| 日本黄色片子视频| 日韩人妻高清精品专区| 美女国产高潮福利片在线看| 国产成人精品久久久久久| 一本久久精品| 你懂的网址亚洲精品在线观看| 亚洲精品av麻豆狂野| 91精品三级在线观看| 青春草亚洲视频在线观看| 99久久精品一区二区三区| 国产成人91sexporn| 久久久久久人妻| 男人操女人黄网站| a级毛色黄片| 这个男人来自地球电影免费观看 | 国产免费福利视频在线观看| 女性被躁到高潮视频| 欧美日韩一区二区视频在线观看视频在线| 王馨瑶露胸无遮挡在线观看| 国产精品一区二区在线观看99| 99九九线精品视频在线观看视频| 国产精品人妻久久久久久| 精品午夜福利在线看| 国产乱人偷精品视频| 亚洲怡红院男人天堂| 蜜桃久久精品国产亚洲av| 少妇丰满av| 成人二区视频| 欧美日韩在线观看h| 99热6这里只有精品| 一级,二级,三级黄色视频| 国产 精品1| 纵有疾风起免费观看全集完整版| 老司机影院成人| 亚洲欧美一区二区三区黑人 | 久久ye,这里只有精品| h视频一区二区三区| 国产男女内射视频| 久热这里只有精品99| 国产男女内射视频| 热99久久久久精品小说推荐| 丰满迷人的少妇在线观看| 亚洲精华国产精华液的使用体验| 亚洲精品国产色婷婷电影| 两个人免费观看高清视频| 精品久久国产蜜桃| 成年女人在线观看亚洲视频| 黑人猛操日本美女一级片| 欧美变态另类bdsm刘玥| 制服人妻中文乱码| 亚洲,欧美,日韩| 精品一区在线观看国产| 久久av网站| 18禁在线播放成人免费| 蜜桃在线观看..| 亚洲欧洲日产国产| 国产不卡av网站在线观看| 久久久久人妻精品一区果冻| 久久精品国产亚洲av涩爱| 日本爱情动作片www.在线观看| 国产不卡av网站在线观看| 中国国产av一级| 国产成人一区二区在线| 免费大片18禁| 亚洲性久久影院| 久久午夜综合久久蜜桃| 十八禁网站网址无遮挡| 精品少妇内射三级| 欧美三级亚洲精品| 水蜜桃什么品种好| 久久99蜜桃精品久久| 亚洲精品中文字幕在线视频| 国产欧美日韩综合在线一区二区| 九九爱精品视频在线观看| 精品国产乱码久久久久久小说| 丝袜在线中文字幕| 日韩精品有码人妻一区| 免费黄网站久久成人精品| 精品久久久久久久久亚洲| 熟妇人妻不卡中文字幕| 一本色道久久久久久精品综合| 97在线人人人人妻| 又粗又硬又长又爽又黄的视频| 国产日韩欧美在线精品| a级毛片免费高清观看在线播放| 在线观看免费视频网站a站| 亚洲欧洲日产国产| 高清视频免费观看一区二区| 91久久精品国产一区二区成人| 人妻制服诱惑在线中文字幕| 美女福利国产在线| 99精国产麻豆久久婷婷| 美女国产高潮福利片在线看| 国产极品天堂在线| 中文字幕亚洲精品专区| 久久久久久伊人网av| 国产日韩欧美亚洲二区| 自拍欧美九色日韩亚洲蝌蚪91| 成年美女黄网站色视频大全免费 | 国产黄色免费在线视频| 久热久热在线精品观看| 国产极品粉嫩免费观看在线 | 欧美亚洲 丝袜 人妻 在线| 超碰97精品在线观看| 最新中文字幕久久久久| 十八禁高潮呻吟视频| 爱豆传媒免费全集在线观看| 久久久精品免费免费高清| 久久午夜综合久久蜜桃| av有码第一页| 大香蕉97超碰在线| 日韩av在线免费看完整版不卡| 国产精品三级大全| 久久久a久久爽久久v久久| 中国三级夫妇交换| 少妇被粗大的猛进出69影院 | 中国国产av一级| 一个人看视频在线观看www免费| 黄色怎么调成土黄色| 看免费成人av毛片| 久久午夜福利片| 国产熟女欧美一区二区| 国内精品宾馆在线| 纵有疾风起免费观看全集完整版| 简卡轻食公司| 亚洲激情五月婷婷啪啪| 女的被弄到高潮叫床怎么办| 一级毛片 在线播放| 精品一品国产午夜福利视频| 色视频在线一区二区三区| 大香蕉久久网| 美女cb高潮喷水在线观看| 三级国产精品欧美在线观看| 日韩 亚洲 欧美在线| 亚洲精品视频女| 欧美 日韩 精品 国产| 九九久久精品国产亚洲av麻豆| videos熟女内射| 久久久国产一区二区| 亚洲国产精品999| 男男h啪啪无遮挡| 你懂的网址亚洲精品在线观看| 老司机影院成人| 国产精品国产三级专区第一集| 亚洲成人一二三区av| 国产一区二区在线观看av| 亚洲第一av免费看| 9色porny在线观看| 国产免费现黄频在线看| 亚洲欧美中文字幕日韩二区| 街头女战士在线观看网站| 九九爱精品视频在线观看| 一级毛片 在线播放| 一区二区日韩欧美中文字幕 | 免费大片18禁| 久久久久久久久久久免费av| 成年人午夜在线观看视频| 国产精品偷伦视频观看了| 在线亚洲精品国产二区图片欧美 | 久久婷婷青草| 久久青草综合色| 熟女电影av网| 久久精品国产亚洲网站| 成人黄色视频免费在线看| 亚洲国产精品国产精品| 精品午夜福利在线看| h视频一区二区三区| 久久影院123| 十八禁网站网址无遮挡| 午夜91福利影院| 精品熟女少妇av免费看| 国产 精品1| 黄片无遮挡物在线观看| 丝瓜视频免费看黄片| 女人精品久久久久毛片| 日韩精品免费视频一区二区三区 | 亚洲国产av新网站| 日本欧美视频一区| 亚洲精品国产色婷婷电影| 国产探花极品一区二区| av卡一久久| 精品国产一区二区三区久久久樱花| 亚洲欧美清纯卡通| 久久热精品热| 香蕉精品网在线| 成人国产av品久久久| 日本黄色片子视频| 大香蕉久久成人网| 高清毛片免费看| 国产精品人妻久久久影院| 黄色欧美视频在线观看| 丰满乱子伦码专区| 色5月婷婷丁香| 日本av手机在线免费观看| 国产白丝娇喘喷水9色精品| 欧美日韩国产mv在线观看视频| 大陆偷拍与自拍| 热99国产精品久久久久久7| a级毛片在线看网站| 成人二区视频| 国产永久视频网站| 国产片特级美女逼逼视频| 中文字幕人妻丝袜制服| 久久午夜福利片| 欧美激情极品国产一区二区三区 | 寂寞人妻少妇视频99o| 九色成人免费人妻av| 如日韩欧美国产精品一区二区三区 | 在线观看免费视频网站a站| 免费不卡的大黄色大毛片视频在线观看| 亚洲国产成人一精品久久久| 亚洲av中文av极速乱| 欧美精品亚洲一区二区| 欧美精品人与动牲交sv欧美| 日韩 亚洲 欧美在线| 免费高清在线观看日韩| 中文字幕av电影在线播放| 黄色配什么色好看| √禁漫天堂资源中文www| 国产亚洲精品第一综合不卡 | 女的被弄到高潮叫床怎么办| 国产精品国产三级专区第一集| 曰老女人黄片| 亚洲国产精品一区二区三区在线| 久久ye,这里只有精品| 又黄又爽又刺激的免费视频.| 国产精品秋霞免费鲁丝片| 久久久久久人妻| av福利片在线| 九色亚洲精品在线播放| 亚洲av日韩在线播放| 美女cb高潮喷水在线观看| 国产午夜精品一二区理论片| 精品一区在线观看国产| 少妇的逼水好多| 只有这里有精品99| 秋霞在线观看毛片| 久久久久久久久久久久大奶| 中文字幕精品免费在线观看视频 | 天堂俺去俺来也www色官网| 一级,二级,三级黄色视频| 亚洲欧美一区二区三区国产| 日韩av在线免费看完整版不卡| 亚洲综合精品二区| 99视频精品全部免费 在线| av一本久久久久| av视频免费观看在线观看| 男女国产视频网站| 亚洲无线观看免费| 久久久久久伊人网av| 美女视频免费永久观看网站| 观看av在线不卡| 如何舔出高潮| 国产成人精品无人区| 男人爽女人下面视频在线观看| 国产免费现黄频在线看| 免费观看性生交大片5| 国产男女超爽视频在线观看| 王馨瑶露胸无遮挡在线观看| 欧美日韩综合久久久久久| 下体分泌物呈黄色| 欧美日韩视频精品一区| 日本91视频免费播放| 免费av中文字幕在线| 精品99又大又爽又粗少妇毛片| 欧美精品人与动牲交sv欧美| 下体分泌物呈黄色| 男女边摸边吃奶| 欧美日韩亚洲高清精品| 99久久中文字幕三级久久日本| 亚洲av综合色区一区| 久久久久精品久久久久真实原创| 女性被躁到高潮视频| 亚洲激情五月婷婷啪啪| 国产精品蜜桃在线观看| 精品久久久久久久久亚洲| 久久久国产欧美日韩av| 国产精品国产三级国产av玫瑰| av不卡在线播放| 高清黄色对白视频在线免费看| 一区二区三区免费毛片| 80岁老熟妇乱子伦牲交| 国产精品三级大全|