• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Intelligent Greedy Perimeter Stateless Routing Scheme for Unmanned Aerial Vehicles

    2023-01-11 03:14:56BAIGMohsinAyubZHANGYihong張義紅YEXiaoxian葉曉嫻SULTANAUmbrinAKBARSunilaLIShuaiAHMADSohail阿門德

    BAIG Mohsin Ayub(貝 歌), ZHANG Yihong(張義紅), 2*, YE Xiaoxian(葉曉嫻), SULTANA Umbrin(彩 虹), AKBAR Sunila(海 榮), LI Shuai (李 帥), AHMAD Sohail (阿門德)

    1 College of Information Science and Technology, Donghua University, Shanghai 201620, China2 Engineering Research Center of Digitized Textile & Fashion Technology, Ministry of Education, Donghua University, Shanghai 201620, China3 School of Art and Design, Shanghai University of Engineering Science, Shanghai 201620, China4 Department of Electrical Engineering, NED University of Engineering and Technology, Karachi 75270, Pakistan

    Abstract: The dynamic behavior, rapid mobility, abrupt changes in network topology, and numerous other flying constraints in unmanned aerial vehicle (UAV) networks make the design of a routing protocol a challenging task. The data routing for communication between UAVs faces numerous challenges, such as low link quality, data loss, and routing path failure. This work proposes greedy perimeter stateless routing (GPSR) based design and implementation of a new adaptive communication routing protocol technique for UAVs, allowing multiple UAVs to communicate more effectively with each other in a group. Close imitation of the real environment is accomplished by considering UAVs’ three-dimensional (3D) mobility in the simulations. The performance of the proposed intelligent greedy perimeter stateless routing (IGPSR) scheme has been evaluated based on end-to-end (E2E) delay, network throughput, and data loss ratio. The adapted scheme displayed on average 40% better results. The scenario has been implemented holistically on the network simulator software NS-3.

    Key words: flying ad-hoc network (FANET); vehicular ad-hoc network (VANET); unmanned aerial vehicle (UAV); greedy perimeter stateless routing (GPSR); intelligent greedy perimeter stateless routing (IGPSR)

    Introduction

    Recent developments in small-sized unmanned aerial vehicles (UAVs) or drones have enabled them to be used in versatile applications ranging from the civilian domain to the defense sector. The UAV technology has provided noticeable benefits in rescue operations, real-time monitoring, exploring undiscovered places, traffic monitoring, security, and events coverage. Moreover, they are beneficial at remote sites where humans cannot directly access[1]. Furthermore, the UAVs are quite essential in natural disasters (earthquakes, floods, heavy rainfall, and windstorm), as they can be used as an ad-hoc network to restore the broken communication network in disastrous regions and help connect the affected communication network with the nearest cellular infrastructure[2-3]. It has been found that the potential of multiple UAVs’ network is much more than that of a single UAV[4]. Besides, remarkable modern applications of UAVs[5-8]have increased their importance more than ever, making them an essential need of contemporary societies. A group of UAVs can perform the given task rather efficaciously and competently than a single UAV[9-12]. To achieve a given operation successfully in a group, a robust communication routing protocol is utmost important. It allows multiple UAVs to connect wirelessly and enables them to communicate and share information back and forth during the flight. More than one UAV (where each UAV represents a node) is connected without following any fixed infrastructure in space, which is known as a flying ad-hoc network (FANET). In FANET, each node is self-configured and self-managed. The nodes can communicate with each other directly or by multiple hops. To send information from the source node to the destination node, nodes along the way act as routers and assist data in arriving at the destination node by following multiple hops[13]. Therefore, nodes’ availability is crucial for efficiently transferring data packets.

    Unlike the vehicular ad-hoc network (VANET), the movement of nodes is two-dimensional (x,y), and FANET movement of nodes is three-dimensional (3D) (x,y,z).Moreover, the movement of UAV nodes in the air is highly dynamic and it is faster than the mobile ad-hoc network (MANET)[14-16]. Due to these constraints, designing a robust communication routing protocol for UAVs becomes a challenging job for scientists and researchers[17]. Many attempts have been made in the past in which protocols designed for VANETs are directly suggested for FANET without considering the 3D movement of nodes in FANET[18-19]. In this work, we proposed an adaptive intelligent greedy perimeter stateless routing (IGPSR) model based on a greedy perimeter stateless routing(GPSR) protocol. The suggested adaptive approach aims to improve the communication of mobile UAVs and create a robust UAV network. The new approach brings changes in the existing GPSR strategy. For instance, the classical GPSR method only uses a right-hand data forwarding scheme in the recovery mode, whereas the prescribed IGPSR technique considers the dual-mode data-carrying scheme. The other change includes the introduction of a new data routing table named an intelligent table (IT), which works along with the existing nearby inventory table (NIT).

    By working in collaboration, ITs and NITs maintain the data record of the source and destination pairs and do not allow data packets to get trapped between multiple nodes. Moreover, they help the nodes to find optimized paths for the data packets to be transmitted to the destination nodes following relatively fewer hops. These alterations give intelligence to each node operating in the network that subsequently reduce end-to-end (E2E) delay and data loss ratio and increase network throughput.

    The biggest advantage of GPSR is that nodes store the least amount of information and can quickly respond to changes in topology. This work proposes a routing protocol that stores detailed information. However, results show that, even though the nodes in the IGPSR technique store more information than those in the GPSR, the adaptive IGPSR technique has produced much better results compared to the classical GPSR protocol while both approaches are compared on metrics: E2E delay, network throughput, and data loss ratio.

    1 Related Research Work

    The UAVs have been continuously investigated in the past several years, countless pieces of research and surveys have been conducted, and different routing protocols have been suggested so far. Sangetal.[20]discussed routing protocols that emerged in recent years for UAVs and compared them with each other in detail. Bekmezcietal.[21]tried to create an infrastructure less communication among multiple UAVs with the help of satellites. Another prominent research has been carried out to create an effective routing protocol for UAVs. In this work, after getting inspired by bees’ movements, Leonov[22]suggested a nature-inspired routing algorithm for UAVs in which nodes followed the ditto movements like bees. Another similar kind of study had been done[23], where de Rango et al.[23]suggested a light way bio-inspired coordination routing protocol for UAVs. However, this protocol was especially recommended for agriculturally based applications where sudden climate change could be an important issue for the farmers.

    Sangetal.[24]presented an energy-efficient opportunistic routing protocol based on trajectory prediction (EORB-TP) for UAVs. In this work, the possibility of future time moving speed of a node has been analyzed, and limited energy and buffer of nodes have been taken into account in the simulations. Another related effort has been put recently into designing a UAV routing strategy with the name, future network topology-aware routing (FNTAR) protocol[25]. In this attempt with the aid of a ground positioning system (GPS), the future position of the UAV nodes has been utilized to select the best path for the data packet to arrive at the destination node faster. Moreover, data loss problems caused by unstable link quality and dynamic network topology have also been resolved. Furthermore, Bahlouletal.[26]proposed a flocking-based demand routing protocol called Boids of Reynolds ad-hoc on-demand distance vector (BR-AODV) for UAVs. To transmit data to the next node and to maintain routing path and connectivity, Boids and Reynolds method[26]has been used. In addition, for proactive drones, automatic discovery of ground base station has been presented. Likewise, another scheme based on an ad-hoc on-demand vector has been proposed. Tanetal.[27]presented a simpler and more secure routing protocol algorithm for UAVs called improved security ad-hoc on-demand distance vector (ISAODV). By means of simulations, it has been proved that the newly introduced method can perform better compared to the former method security ad-hoc on-demand distance vector (SAODV).

    On the flip side, quite a few studies and comparisons have been carried out in which routing protocols ad-hoc on-demand distance vector (AODV), destination-sequenced distance-vector (DSDV), dynamic source routing (DSR), dynamic source routing (OLSR), ad-hoc on-demand multipath distance vector (AOMDV), and hybrid wireless mesh protocol (HWMP) designed for the mobile ad-hoc network have been directly suggested for UAVs without taking into account the 3D movement of nodes[19, 28-29]. The UAV network topology changes rapidly, which is directly proportional to the quality of E2E delay, network throughput, and data loss ratio[30]. Therefore, an optimal mobility model is inevitable in order to analyze the network behavior realistically. The presented IGPSR model is compiled with the 3D Gauss Markov mobility model, and designed to imitate the 3D movement of nodes in a 3D rectangular space.

    GPSR is a position-based routing protocol, and sends a packet from the source node to the destination node. It selects the nearest node in terms of distance and transfers the packet to the destinations by the following multiple hops. In a network, every node also acts as a router and assists its neighbors to transmit data to the destination[31]. In the GPSR network, every single node is equipped with a GPS[32].

    The GPS is designed to find the location of objects on earth. Hence is not appropriate for finding the position or location of objects in space. However, the continuous development in the field of tracking and positioning of space objects has made it possible to locate the exact position or location of moving objects in space. In this case, each UAV has a built-in relative positioning system[33], which helps every node to locate and determine its position in space. The location information is shared by beacons from the medium access control (MAC) layer. Each node with the help of a beacon algorithm broadcasts hello packets (which contains node IDs and their coordinates’ information) at a regular interval of time, to help their neighbors keep their routing tables up to date[34].

    Principally, the GPSR protocol routing technique uses dual-mode data-carrying strategies: greedy forwarding strategy and perimeter forwarding strategy or recovery mode. Coordinate information related to the position of each node is assumed to be acquired through the medium of localization or positioning systems (GPS/RPS). After assessing the beacon messages, the actual node checks the status of the mode in which the last data packet is received. If it is greedy forward, the actual node will begin seeking the nearest node to pass on the data packet which should be closer to the destination node than the actual node itself. If the existing node does not get feedback from the nearby node, it will reckon as if the communication link is broken and will remove all records from its routing table. These unique settings are called local minimum state when the actual node does not find any better suitable node in its neighborhood. At this stage, GPSR has to change its strategy from greedy forward to perimeter forward. In this approach, every radio node follows the right-hand strategy and conveys the data packet to the next closest right-hand node.

    As shown in Fig.1, each node is aware of the positions of surrounding nodes with the help of beacon messages. Presupposing the network is operating in the greedy mode, nodeS(source node) is an actual node in this situation and it transmits the data packet to the destination nodeD. Carrying out this task, nodeSwill seek for a nearer node which should be closer to nodeD, then nodeSitself (communication range of nodeSis shown with the help of green circle in Fig.1). In this case, it will select nodeAas it is closer to nodeDthan nodeS. By following the greedy forwarding strategy, nodeSwill transmit the data packet to nodeA. Since nodeDis out of the communication range of nodeA(communication range of nodeAis shown with the help of red circle in Fig.1). At this moment, the network is in the local minimum state. Consequently, according to the algorithm, the network will change its strategy from greedy forwarding mode to perimeter forwarding mode. It will start following the right-hand strategy and thereby nodeAwill transmit the data packet to the right-hand nodeB. With the same forwarding mode, nodeBwill transfer the data packet to nodeC. At this point, the network will return to greedy mode because the distance between nodeCand nodeDis less than that between nodeAand nodeD(distance from nodeDto nodesAandCis shown with the help of a black circle in Fig.1). NodeCusing greedy forwarding will forward the data packet to nodeF, and then nodeFwill transmit the data packet to destination nodeD.

    Fig.1 Basic working of GPSR communication protocol

    2 Issues with GPSR

    The packet transporting in GPSR routing technique depends on nodes positions. Because of the dynamic nature of nodes, they keep changing their positions in different circumstances, and the data packet can trap in a loop formed by the group of nodes. If the data packets trap between a group of nodes, the data packets will take much more hops to arrive at the destination node. Additionally, when the classical GPSR data routing technique encounters the local minimum state, the algorithm changes its data forwarding strategy from greedy forwarding strategy to perimeter forwarding strategy. At that moment, the classical algorithm only follows the right-hand strategy and does not consider the left-hand strategy.

    When the algorithm runs into the local minimum state, the situation is considered to understand the effect of overlooking the left-hand strategy on the network’s robustness.

    If the classical GPSR algorithm follows both the left-hand and the right-hand strategies, then the local minimum node not only finds the right-hand node or the left-hand node to transfer the data packet, but also selects the shortest possible path leading to the destination node, which can be achieved by selecting the right-hand or the left-hand node, depending on the given situation. As a result, the data packet could arrive at the destination node by following a comparatively lesser number of hops. Subsequently, it would mainly improve the whole network operation and increase its robustness. However, the traditional GPSR technique does not take into account the left-hand strategy which stagnates the network’s end results.

    In fact, these data trapping or one-handed data forwarding contingencies can end up losing data on the way. Nonetheless, the classical GPSR routing protocol does not take into account the obstacles between the nodes which not only atrophy communication among the mobile nodes, but also extremely affect the strength and sturdiness of the utter system.

    These all types of fortuitous events increase the E2E delay, the data loss ratio, and decrease the average network throughput. Consequently, not only do these factors affect the vigor of the network, but also deteriorate the overall performance of the network.

    As shown in Fig.2, actual nodeS(source node) sends the data packets to nodeD. NodeDis inaccessible from nodeSbecause it is out of the communication range of nodeS(range of nodeSis shown with the help of the green circle in Fig.2). As a result, nodeScannot send data packets directly to nodeD(the destination node in this case). Assume that the network is operating in the greedy forwarding mode at the moment. NodeBis a closer node to the destination nodeDthan nodeSitself. Therefore, nodeSforwards data packets to nodeB.In the given scenario, nodeBis the closest node to the destination nodeDthan any other node in the surrounding (distance of the nodeDfrom the other nodes is shown with the help of the black circle in Fig.2). However, the nodeDis out of the communication range of nodeB(the range of nodeBis shown with the help of the red circle in Fig.2). Therefore, nodeBin this case is in local minimum state. Consequently, the algorithm changes the data forwarding strategy from greedy forwarding strategy to perimeter forwarding strategy. Subsequently, nodeBacquires the right-hand method and forwards the data packet to the closest right-hand nodeC.NodeCcan deliver the data packet to destination nodeDby following the path {C-F-A-D}. The nodes are mobile in nature, so they can change their positions. It is supposed that the data packet is transferred from one node to another, and nodeFchanges its position and gets a new positionF′ (shown in Fig.2). Now nodeCby following the right-hand rule would transfer the data packet to nodeF′ as it is the best possible option at the moment. Next, nodeF′ would forward the data packet to nodeBagain. As a result, the data packet will get trapped in a loop formed by the nodes {B-C-F′}. Eventually, the data packets would make many more extra hops arrive from the source nodeSto the destination nodeD.

    Fig.2 Issues with GPSR communication protocol

    3 Proposed Methodology

    To resolve the serious issues connected with the former GPSR routing protocol highlighted in the previous section, an adaptive scheme IGPSR has been proposed in the following section.

    The objective of this new approach is to boost the working performance of the existing GPSR protocol. The network enhancements are achieved by introducing an additional data table named IT which is an extension of the default data table called NIT. The new table IT works in correlation with NIT and helps the algorithm record information connected with the node’s positions and data packets relatively well, and each node can make the decisions intelligently in different given circumstances. Furthermore, unlike the traditional GPSR routing technique, when the network encounters a local minimum state, the IGPSR uses both left-hand and right-hand data forwarding schemes. These newly developed changes help the network overcome the problems and issues faced with the former classical GPSR routing protocol, and enhance the entire network’s performance in terms of metrics: E2E delay, network throughput, and data loss ratio significantly. The following section discusses NIT and IT.

    3.1 NIT

    Mobile nodes periodically send out and receive a hello packet from the single-hop neighbors. The purpose of NIT is to store and maintain neighboring nodes’ information in its inventory table which includes location information (x,y,z) of the nearby nodes, internet protocol (IP) address (node identification), and the timestamp of the last received hello packet. NIT is updateable and can be overwritten by the new entry over the last entry.

    3.2 IT

    IT works in correlation with NIT. This table comprises various information including IP address of neighboring nodes, vectors of IP addresses of destinations, and data forwarding strategy (Fs) which can be greedy forward (Gf), right-hand forward (Rhf), or left-hand forward (Lhf), and destination IP address (D). Since IT is an extension of NIT, both tables work in cooperation. IT refreshes its data with every new hello packet received from each neighbor. This feature allows the algorithm to work in synchronization with the current model.

    In the proposed technique, when a network operates in greedy forwarding mode, the IT helps nodes select the best neighboring node to transfer data packets by verifying two conditions. Firstly, the data forwarding node verifies, and if it has not received a data packet from the data receiving node operating in the recovery mode for the same destination node, its IP address does not exist in the IT of the forwarding node. Secondly, the same data packet has not been sent to the receiving node for the same destination.

    If the first condition is false, the forwarding node would not consider receiving nodes unless the IT of the forwarding node does not get refreshed. And if the second condition is false, then the forwarding node will search for another suitable neighbor. If the forwarding node does not find any reasonable neighboring node in its vicinity, then the local minimum state occurs. The purposed IGPSR protocol also enters into the perimeter mode just like the GPSR protocol. However, it follows a two-way data forwarding strategy unlike classical GPSR which only follows the one-way strategy. Nonetheless, in IGPSR, while the network operates in perimeter or recovery mode, the receiver node discards the data packet if it has already received the same data packet for the same destination unless the IT of the receiver gets refreshed. This ability reduces the packet duplication possibility and the network overhead load and hence, increases the network’s efficiency.

    The IT is designed to help actual nodes find an efficient path to transmit the data packet to the destination, and enable data packets to arrive at their destinations using a lesser number of hops. Furthermore, it also helps data packets avoid the local minimum state, and improves network efficacy remarkably.

    The proposed algorithm IGPSR for UAVs works as follows.Rrepresents a recipient node, andCis the set of closest single-hop nodes {C1,C2, …,Cn}. Data forwarding strategy is represented byFs, andIrepresents a unique packet identity for every single source-destination pair. Variablercontains the distance from nodeCnto the destination nodeD, anddis the data packet forDas shown in Fig.3.

    Fig.3 Representation of mobile nodes and parameters

    For data packets identification, identification field of IP version 4 (IPv4) is used, because it can generate 232unique number of combinations. These combinations help identify each pair of source and destination respectively. The working principle of the proposed algorithm is explained with the help of flow diagrams. Figure 4 represents the procedure while a node receives a packet. Figure 5 represents the procedure while a node forwards a packet.

    Fig.4 Packet receiving flow diagram of proposed IGPSR algorithm

    Fig.5 Packet forwarding flow diagram of proposed IGPSR algorithm

    3.3 Greedy and perimeter forwarding with IGPSR

    As shown in Fig.6, there are two source-destination pairs: nodesAandF; nodesGandF. Consider the network follows GPSR protocol and nodeA, from the first pair, deliver packetd1to nodeF. Using greedy forwarding strategy, nodeAfollows the path {A,B,C,D,F}. When the data packetd1arrives at nodeF, the packet faces the local minimum. At this moment, the network would change the data forwarding strategy to perimeter forwarding strategy. Now, by following the right-hand rule, the nodeFwill forward the data packetd1to nodeE, and the data packet will follow through this strategy from nodeF{F,E,D,C,B,A,G,H,I,J,K,M} until nodeM. At nodeM, the data forwarding strategy returns to greedy forwarding mode as nodeMis nearer to the destination nodePand nodeF(distance from nodePto nodesFandMis shown with the black circle in Fig.6). Finally, by following the path {M,N,P}, the data packetd1arrives at the destination nodeP. It means that data packetd1following GPSR routing strategy needs to make 17 hops to arrive from nodeAto nodeP. Data transferring path is represented by curved solid and dotted arrows in Fig.6.

    In the GPSR technique, due to its simplicity, the data packet always follows the same path to deliver a packet between the same source and destination pair. On the other hand, the suggested algorithm IGPSR with the help of extension table IT not only enables the data packet to follow different paths while traveling between the same source and destination pair but also saves data packets from the local minimum state. For instance, in a given situation, when the data packetd1arrives at nodeF, in the proposed technique, the network also changes strategy to perimeter forwarding strategy and nodeFtransfers packetd1to nodesDandEby following left-hand and right-hand data forwarding modes. NodeD, in this case, will discard the packetd1received from nodeE, since it has already received the data packetd1from nodeFfor the same destination nodeP. Next, by following a similar step, like GPSR technique, the data packetd1arrives at the destination nodeP. The data packetd1following IGPSR routing strategy will also have to make 17 hops to arrive from nodeAto nodeP. However, when source nodeAsends the second packetd2to the same destination nodeP. In order to transfer datad2, nodeAwill not select neighborB, nodeAhas received data packetd1from nodeBwhile nodeBis being operated in a recovery mode and nodeAstill has this entry in its IT. This means the first condition of IGPSR does not verify. Thereby, to transfer data packetd2from source nodeAto nodeP, using IGPSR algorithm, the data packetd2will travel through from nodes {A,G,H,I,J,K,M,N,P} and make only 8 hops to arrive at the destination, which is, a significant reduction in hops.

    The flexibility of the proposed algorithm lies in the fact that the actual node can skip a node only if the same source and destination node pair are involved in communication. This means that nodeAtransfers data packets to nodeP, and the second source and destination pair (nodesGandF) can easily transfer the data packet from the source nodeGto the destination nodeFwithout skipping nodeB{G,B,C,D,F}, since this time destination node for the packet is different. The data transferring path is represented by solid blue arrows in Fig.6. Within the set time duration, nodeAwill refresh its NIT, which will help IT erase old entries from the table, and NIT will start receiving hello packets from the neighbors.

    Nonetheless, the standard GPSR approach in recovery mode only employs a right-hand data forwarding strategy, and many scenarios may be imagined in which the data packet either makes a significantly higher number of hops or fails to be safely transmitted to the destinations. Whereas IGPSR, by using left-hand and right-hand date forwarding strategies in recovery mode, can help data packets to be successfully transported to the destinations in the same situations much more effectively. The performance of the proposed IGPSR technique is evaluated in the following section.

    4 Simulation Results and Discussion

    The proposed algorithm is simulated in an open-source network simulator NS-3, specially designed for the executions of mobile ad-hoc networks. To keep it simple, the node velocity is considered to be constant as 25 km/h. The simulation was performed in an area of 100 m3and the duration between hello packets was kept at 1 s. The packet size for the data packet was set to 1 024 bytes and the simulation duration was 180 s. Mac layer protocol 802.11p dedicated to wireless access in vehicular environment (WAVE) has been used. To depict the realistic 3D nodes’ movement, 3D Gauss Markov mobility model is implied in this experiment. Because of its fast data transmission, user datagram protocol (UDP) is used to transfer data to the destination. The time delay between two data packets is set to 1/10 s. NIT refresh rate is 1 time every 3 s. An omnidirectional antenna with a transmission range of 275 m is set during the simulation. By varying the number of source and destination pairs from 8 to 32 and UAVs from 30 to 110, the network performance of the former GPSR has been compared with that of the prescribed IGPSR technique. To get the precise result, 30 simulations have been executed on each given situation. E2E delay, network throughput, and data loss ratio have been considered as performance matrices. To store neighboring nodes’ information, GPSR’s node uses 16 bytes of space. However, the IGPSR’s node uses 24 bytes of space for each neighbor node because of its additional table. Table 1 shows the parameters used in simulation in summarized form.

    Table 1 Parameter list

    4.1 E2E delay analysis

    Figure 7 shows the performance comparison of GPSR and IGPSR, and there are 8 source and destination pairs considered in an experiment. On the one hand, E2E delay of GPSR is higher than that of IGPSR under any circumstances. On the other hand, the performance of both networks improves as the number of UAVs increases from 30 to 110, and it is completely apparent that the more router nodes accessible, the faster the data packets arrive at the target node. Whereas in Fig.8, 32 source and destination pairs are considered in the experiment, the IGPSR has produced out-class results. There are two reasons. Firstly, the IGPSR transfers consecutive packets to the same source and destination pair by following a fewer number of hops. Secondly, it discards the repeated packets, and thus the congestion on the network reduces. As a result, the delay decreases.

    Fig.7 Average E2E delay with 8 source and destination pairs and varying numbers of UAVs on x-axis

    Fig.8 Average E2E delay with 32 source and destination pairs and varying numbers of UAVs on x-axis

    4.2 Network throughput analysis

    Figure 9 depicts a behavior of comparison between IGPSR and GPSR data routing protocols. There were 8 source and destination pairs in a network, and there were 30 UAVs available. The proposed technique IGPSR produced good results and as the availability of nodes increased, it showed even better throughput compared to GPSR. On the flip side, in Fig.10, when the source and destination pairs increased from 8 to 32, the proposed technique displayed much better throughput. For instance, in Fig.10, with 90 available UAVs in an experiment, the GPSR protocol showed better output, and this could be justified by the fact that, GPSR had less congestion network than IGPSR especially in recovery mode, and GPSR just had to forward the data packet to the right-hand node. Whereas the proposed technique utilizesRhfandLhf. However, in IGPSR with the help of IT and NIT, a node can discard duplicated packets thereby reducing network congestion.

    Fig.9 Average network throughput with 8 source and destination pairs and varying numbers of UAVs on x-axis

    Fig.10 Average network throughput with 32 source and destination pairs and varying numbers of UAVs on x-axis

    4.3 Data loss ratio analysis

    Figure 11 displays the contrast of IGPSR and GPSR routing protocols. When there were 8 source and destination pairs used in the experiment, at the time of 30 available UAV nodes, both techniques exhibited the same results. Nonetheless as the number of UAVs increased, there was a continuous reduction in data loss in both methods and it made sense, since the number of nodes increased. Consequently, more nodes were available to act as a router to help data packets arrive at destinations conveniently. In Fig.12, when there were 32 source and destination pairs involved in observation, the prescribed method produced remarkable results. The data loss ratio reduced drastically and predictably as the availability of nodes increased from 30 onwards in both strategies. However, the given solution produced significantly superior results. The IGPSR approach with the help of IT and NIT, prevented packets from reaching a dead end and allowed data packets to arrive at the target node successfully in most situations. Whereas GPSR might remain unsuccessful in these circumstances.

    Fig.11 Average packet ratio with 8 source and destination pairs and varying numbers of UAVs on x-axis

    Fig.12 Average packet ratio with 32 source and destination pairs and varying numbers of UAVs on x-axis

    5 Conclusions

    Dynamic, unpredictable 3D movement of nodes, highly changeable network topology, and several other flying constraints make the design of a UAV routing protocol a challenging task. In this paper, a new adaptive algorithm IGPSR routing protocol has been designed and implemented for UAVs. Compared to the former GPSR technique, the presented IGPSR technique, when assessed on the metrics of the E2E delay, the average network throughput, and the data loss ratio, has produced on average 40% better results. Additionally, in the past many attempts have been made to design an effective routing protocol. However, in many investigations, scholars overlooked the importance of 3D mobility of UAVs in their works. In this paper, in order to achieve more truthful results, the 3D Gauss Markov mobility model has been considered in simulations.

    In the future work, we would analyze the effectiveness of the network in presence of different source and destination node pairs. Furthermore, we would compare the suggested IGPSR algorithm with some other existing routing algorithms. Lastly, we would investigate the behavior of the network in the presence of obstacles.

    黄色a级毛片大全视频| 一夜夜www| 在线天堂中文资源库| 久久亚洲精品不卡| 久久欧美精品欧美久久欧美| 国产精品亚洲一级av第二区| 欧美 亚洲 国产 日韩一| 久久热在线av| 久久久久精品国产欧美久久久| 中文字幕人妻熟女乱码| 欧美成人性av电影在线观看| 日韩欧美免费精品| 91成年电影在线观看| 亚洲精品粉嫩美女一区| 精品乱码久久久久久99久播| 亚洲自拍偷在线| 婷婷精品国产亚洲av在线| 国产午夜福利久久久久久| 一二三四在线观看免费中文在| 中文字幕高清在线视频| 日本在线视频免费播放| 成人亚洲精品av一区二区| 久久久国产成人精品二区| 国产精品美女特级片免费视频播放器 | 黄频高清免费视频| 欧美激情极品国产一区二区三区| 18禁国产床啪视频网站| 日韩欧美一区视频在线观看| 日本五十路高清| www.自偷自拍.com| 免费在线观看影片大全网站| 女同久久另类99精品国产91| 国产精品99久久99久久久不卡| 精品福利观看| 黄色成人免费大全| 成人国产综合亚洲| 国产精品98久久久久久宅男小说| 9191精品国产免费久久| 午夜日韩欧美国产| 色综合婷婷激情| 91在线观看av| 91九色精品人成在线观看| 亚洲,欧美精品.| 好男人电影高清在线观看| 精品一区二区三区视频在线观看免费| 黑人巨大精品欧美一区二区mp4| 亚洲色图av天堂| 欧美国产精品va在线观看不卡| 天天一区二区日本电影三级 | 人人妻人人爽人人添夜夜欢视频| 欧美激情高清一区二区三区| 国产真人三级小视频在线观看| 免费少妇av软件| 亚洲国产毛片av蜜桃av| 村上凉子中文字幕在线| 亚洲 欧美 日韩 在线 免费| 亚洲中文字幕日韩| 动漫黄色视频在线观看| 亚洲成人免费电影在线观看| 亚洲电影在线观看av| 身体一侧抽搐| 午夜福利高清视频| 97碰自拍视频| 97碰自拍视频| 亚洲美女黄片视频| 亚洲欧美日韩无卡精品| 村上凉子中文字幕在线| 欧美av亚洲av综合av国产av| 免费看a级黄色片| 精品人妻1区二区| 亚洲成人精品中文字幕电影| 最好的美女福利视频网| 韩国精品一区二区三区| av天堂在线播放| 国产精品影院久久| av天堂在线播放| 亚洲国产精品999在线| 91成人精品电影| 国产精品久久久av美女十八| 在线观看一区二区三区| 一区福利在线观看| 久久狼人影院| 午夜a级毛片| 久久精品国产清高在天天线| 亚洲成人国产一区在线观看| 亚洲男人天堂网一区| 亚洲精品美女久久久久99蜜臀| 国产黄a三级三级三级人| 久久久久久国产a免费观看| 亚洲人成77777在线视频| 午夜福利免费观看在线| 大陆偷拍与自拍| 国产精品精品国产色婷婷| 香蕉丝袜av| 狠狠狠狠99中文字幕| 母亲3免费完整高清在线观看| 亚洲黑人精品在线| 国产精品野战在线观看| 亚洲av片天天在线观看| 美国免费a级毛片| 91九色精品人成在线观看| 欧美激情久久久久久爽电影 | 中文字幕人妻丝袜一区二区| 美女高潮喷水抽搐中文字幕| 日韩三级视频一区二区三区| 国产一区二区三区在线臀色熟女| 男女之事视频高清在线观看| av超薄肉色丝袜交足视频| 久久精品成人免费网站| 久久久久国内视频| 国产色视频综合| 国产欧美日韩综合在线一区二区| 亚洲免费av在线视频| 欧美日韩亚洲国产一区二区在线观看| 黄色丝袜av网址大全| 精品一区二区三区av网在线观看| 亚洲色图综合在线观看| 9191精品国产免费久久| 欧美国产精品va在线观看不卡| 国产精品99久久99久久久不卡| 亚洲三区欧美一区| 久久久久久人人人人人| 日本五十路高清| 午夜福利欧美成人| 色综合亚洲欧美另类图片| 十八禁网站免费在线| 午夜福利免费观看在线| 国产又爽黄色视频| 国产亚洲精品第一综合不卡| 亚洲中文字幕日韩| 日本五十路高清| av在线播放免费不卡| 国产91精品成人一区二区三区| 国产午夜精品久久久久久| 久久久精品欧美日韩精品| 久久人妻福利社区极品人妻图片| 男女下面插进去视频免费观看| 成人手机av| 精品国产一区二区久久| 精品欧美一区二区三区在线| 在线播放国产精品三级| 黄色a级毛片大全视频| 黑人操中国人逼视频| 亚洲精品一卡2卡三卡4卡5卡| 亚洲一区二区三区色噜噜| 久久欧美精品欧美久久欧美| 亚洲国产看品久久| 在线免费观看的www视频| 国产黄a三级三级三级人| 日本免费a在线| 久久九九热精品免费| 成人国语在线视频| 中文字幕最新亚洲高清| 亚洲 欧美一区二区三区| 午夜福利影视在线免费观看| 欧美日韩精品网址| 久久久久久免费高清国产稀缺| 精品人妻1区二区| 久久天堂一区二区三区四区| 久久久精品欧美日韩精品| 视频在线观看一区二区三区| 99香蕉大伊视频| 国产精品亚洲av一区麻豆| 法律面前人人平等表现在哪些方面| 9色porny在线观看| 搡老熟女国产l中国老女人| av免费在线观看网站| 久久久久久免费高清国产稀缺| 亚洲少妇的诱惑av| 国产免费av片在线观看野外av| 日韩三级视频一区二区三区| 国产成人精品无人区| 波多野结衣一区麻豆| 久久久久国产一级毛片高清牌| 天堂影院成人在线观看| 丝袜美足系列| 又紧又爽又黄一区二区| 免费看a级黄色片| 18禁国产床啪视频网站| 亚洲九九香蕉| 欧美乱妇无乱码| 精品午夜福利视频在线观看一区| 亚洲情色 制服丝袜| 两性午夜刺激爽爽歪歪视频在线观看 | 纯流量卡能插随身wifi吗| 女人高潮潮喷娇喘18禁视频| 一区福利在线观看| 亚洲中文av在线| 亚洲国产欧美一区二区综合| 亚洲人成电影观看| 桃色一区二区三区在线观看| 日韩欧美在线二视频| 麻豆一二三区av精品| 美女国产高潮福利片在线看| 老汉色∧v一级毛片| 丁香欧美五月| 美女高潮到喷水免费观看| 高清黄色对白视频在线免费看| 欧美日韩福利视频一区二区| 亚洲精品国产一区二区精华液| 男男h啪啪无遮挡| 在线观看免费视频日本深夜| 久久人人97超碰香蕉20202| 亚洲成人国产一区在线观看| 不卡av一区二区三区| 午夜视频精品福利| 国产不卡一卡二| 变态另类丝袜制服| 一级片免费观看大全| 在线观看日韩欧美| 高清在线国产一区| 亚洲av成人一区二区三| 国产亚洲av高清不卡| 国产亚洲精品第一综合不卡| 国产精品二区激情视频| cao死你这个sao货| 三级毛片av免费| 国产精品 欧美亚洲| 超碰成人久久| 一区二区三区高清视频在线| 少妇被粗大的猛进出69影院| 欧美日韩亚洲综合一区二区三区_| 亚洲精品美女久久av网站| 性色av乱码一区二区三区2| 国产av又大| 日本三级黄在线观看| 精品久久久精品久久久| 丝袜在线中文字幕| 亚洲精品久久成人aⅴ小说| 日韩视频一区二区在线观看| 亚洲精品久久国产高清桃花| 亚洲免费av在线视频| 免费在线观看日本一区| 女性被躁到高潮视频| 人人妻,人人澡人人爽秒播| 精品乱码久久久久久99久播| 欧美成人性av电影在线观看| 黄色片一级片一级黄色片| 国产av一区在线观看免费| 成人永久免费在线观看视频| 成人av一区二区三区在线看| 少妇被粗大的猛进出69影院| 51午夜福利影视在线观看| 精品国产一区二区久久| 黄片播放在线免费| 欧美成人午夜精品| 欧美日本亚洲视频在线播放| 国产一区二区三区综合在线观看| 啪啪无遮挡十八禁网站| 精品久久蜜臀av无| 亚洲av片天天在线观看| 丝袜在线中文字幕| 国产一卡二卡三卡精品| а√天堂www在线а√下载| 久久久久久亚洲精品国产蜜桃av| 淫妇啪啪啪对白视频| 女同久久另类99精品国产91| 午夜福利一区二区在线看| 久久精品国产亚洲av高清一级| 日本一区二区免费在线视频| 欧美久久黑人一区二区| 黄色成人免费大全| 巨乳人妻的诱惑在线观看| 黄色视频,在线免费观看| 一进一出抽搐动态| 中文字幕久久专区| 黑人巨大精品欧美一区二区mp4| 日韩精品免费视频一区二区三区| 黑丝袜美女国产一区| 非洲黑人性xxxx精品又粗又长| 精品久久久久久久久久免费视频| 免费无遮挡裸体视频| 涩涩av久久男人的天堂| 亚洲av电影在线进入| 免费在线观看黄色视频的| 亚洲天堂国产精品一区在线| 手机成人av网站| 成人三级黄色视频| 国产精品精品国产色婷婷| 操出白浆在线播放| 啦啦啦观看免费观看视频高清 | 欧美激情高清一区二区三区| 国产成人一区二区三区免费视频网站| 免费在线观看日本一区| 黄网站色视频无遮挡免费观看| 国产蜜桃级精品一区二区三区| 亚洲国产欧美一区二区综合| 欧美一级毛片孕妇| 亚洲一区二区三区不卡视频| 午夜免费成人在线视频| 国产午夜精品久久久久久| 亚洲色图 男人天堂 中文字幕| 制服人妻中文乱码| 国产亚洲av高清不卡| 免费在线观看完整版高清| 欧美成人一区二区免费高清观看 | www.精华液| 少妇熟女aⅴ在线视频| 国产xxxxx性猛交| 亚洲一码二码三码区别大吗| 91麻豆av在线| 精品国产国语对白av| 神马国产精品三级电影在线观看 | 亚洲 欧美一区二区三区| 黄色 视频免费看| 黄片小视频在线播放| www.www免费av| 久久国产精品人妻蜜桃| 亚洲中文字幕日韩| 欧美老熟妇乱子伦牲交| 禁无遮挡网站| 黄片播放在线免费| 激情视频va一区二区三区| 亚洲av美国av| 波多野结衣一区麻豆| 窝窝影院91人妻| 日本免费一区二区三区高清不卡 | 国产激情久久老熟女| 日韩精品中文字幕看吧| 国产又色又爽无遮挡免费看| 欧美在线一区亚洲| 欧美黑人精品巨大| 满18在线观看网站| 精品久久久久久成人av| 久久久久国产精品人妻aⅴ院| 久久国产精品男人的天堂亚洲| 久久久久久久精品吃奶| 美女扒开内裤让男人捅视频| 一二三四在线观看免费中文在| 欧美午夜高清在线| 黄片大片在线免费观看| 精品国产乱子伦一区二区三区| 成人av一区二区三区在线看| 精品久久久久久久毛片微露脸| 可以免费在线观看a视频的电影网站| 国产亚洲精品一区二区www| 亚洲欧美日韩无卡精品| 国产成人精品无人区| 国产精品永久免费网站| 黄网站色视频无遮挡免费观看| 在线免费观看的www视频| 国产欧美日韩一区二区精品| 国产1区2区3区精品| 午夜免费成人在线视频| 黄频高清免费视频| 美女扒开内裤让男人捅视频| 久热爱精品视频在线9| 精品乱码久久久久久99久播| 久久香蕉激情| 热re99久久国产66热| 国产野战对白在线观看| 久久中文字幕一级| 精品久久蜜臀av无| 欧美性长视频在线观看| 男人舔女人下体高潮全视频| 久久精品成人免费网站| 我的亚洲天堂| 欧美+亚洲+日韩+国产| 黄色视频,在线免费观看| 中文字幕色久视频| 午夜激情av网站| 精品国产美女av久久久久小说| 给我免费播放毛片高清在线观看| 日韩大尺度精品在线看网址 | 亚洲一码二码三码区别大吗| 日本三级黄在线观看| 999久久久精品免费观看国产| 露出奶头的视频| 99久久综合精品五月天人人| 老司机在亚洲福利影院| 岛国视频午夜一区免费看| 在线观看日韩欧美| 亚洲国产日韩欧美精品在线观看 | 欧美黄色淫秽网站| 激情在线观看视频在线高清| 久久精品国产清高在天天线| 免费在线观看黄色视频的| 美国免费a级毛片| 中文字幕人成人乱码亚洲影| 又大又爽又粗| 免费观看精品视频网站| 国产男靠女视频免费网站| 久久精品国产亚洲av高清一级| 国产人伦9x9x在线观看| ponron亚洲| 天天添夜夜摸| 亚洲avbb在线观看| 又紧又爽又黄一区二区| 女性生殖器流出的白浆| 久久精品国产99精品国产亚洲性色 | 精品一区二区三区av网在线观看| 12—13女人毛片做爰片一| 日韩视频一区二区在线观看| √禁漫天堂资源中文www| 黄色 视频免费看| 国产成人精品在线电影| 国产亚洲欧美精品永久| 色哟哟哟哟哟哟| 91av网站免费观看| 亚洲天堂国产精品一区在线| 国产欧美日韩一区二区三区在线| 叶爱在线成人免费视频播放| 午夜久久久在线观看| 欧美亚洲日本最大视频资源| 91成年电影在线观看| 成人亚洲精品av一区二区| 精品一区二区三区视频在线观看免费| 国产av精品麻豆| 正在播放国产对白刺激| 日韩精品青青久久久久久| 最近最新中文字幕大全免费视频| 制服人妻中文乱码| 大型黄色视频在线免费观看| 69av精品久久久久久| 亚洲 欧美一区二区三区| 国产精品久久久久久精品电影 | 久久久久久大精品| 老司机午夜福利在线观看视频| 精品少妇一区二区三区视频日本电影| 亚洲精品粉嫩美女一区| 国产麻豆69| 色婷婷久久久亚洲欧美| 一进一出好大好爽视频| 日韩有码中文字幕| 免费无遮挡裸体视频| 国产三级黄色录像| 亚洲国产中文字幕在线视频| 999久久久国产精品视频| 一夜夜www| 人人澡人人妻人| 无遮挡黄片免费观看| 亚洲人成电影观看| 国产成人精品久久二区二区免费| 中文字幕人成人乱码亚洲影| 国产精品秋霞免费鲁丝片| 夜夜夜夜夜久久久久| 国产激情欧美一区二区| 国产真人三级小视频在线观看| 波多野结衣一区麻豆| 欧美不卡视频在线免费观看 | 中文字幕久久专区| 久久国产乱子伦精品免费另类| 黄片大片在线免费观看| 超碰成人久久| 一二三四社区在线视频社区8| 精品日产1卡2卡| 12—13女人毛片做爰片一| 日本五十路高清| 国产亚洲精品久久久久5区| 中文字幕最新亚洲高清| 村上凉子中文字幕在线| 成年人黄色毛片网站| 在线十欧美十亚洲十日本专区| 免费高清视频大片| 校园春色视频在线观看| 国产精品综合久久久久久久免费 | 精品一区二区三区四区五区乱码| 国产视频一区二区在线看| 国产一区二区三区在线臀色熟女| 国产亚洲欧美精品永久| 波多野结衣高清无吗| 久久久久国内视频| 一本综合久久免费| 国产一区二区三区综合在线观看| www.精华液| 亚洲伊人色综图| 青草久久国产| 成人国产综合亚洲| 国产精品爽爽va在线观看网站 | 久久精品91无色码中文字幕| 久久精品国产综合久久久| 欧美激情 高清一区二区三区| 中出人妻视频一区二区| 欧美日韩黄片免| 亚洲精品中文字幕一二三四区| 丁香六月欧美| 两个人免费观看高清视频| 国内精品久久久久久久电影| 久久精品91蜜桃| 一夜夜www| 波多野结衣巨乳人妻| 国产高清激情床上av| 亚洲欧美激情综合另类| 一区二区三区激情视频| 欧美日韩乱码在线| 久久国产亚洲av麻豆专区| 欧美午夜高清在线| 老司机午夜福利在线观看视频| 日韩欧美国产一区二区入口| 亚洲一码二码三码区别大吗| 亚洲av片天天在线观看| 免费在线观看完整版高清| 欧美日韩亚洲国产一区二区在线观看| 伊人久久大香线蕉亚洲五| 国产色视频综合| 亚洲一区中文字幕在线| 亚洲av电影在线进入| 久久影院123| 亚洲精品久久成人aⅴ小说| 日韩一卡2卡3卡4卡2021年| 国产一区二区三区视频了| 久久久久久久久久久久大奶| 成人永久免费在线观看视频| 欧美激情极品国产一区二区三区| 级片在线观看| 美女免费视频网站| 国产精品秋霞免费鲁丝片| 精品一区二区三区视频在线观看免费| 69av精品久久久久久| 黑人操中国人逼视频| 亚洲精品国产精品久久久不卡| 亚洲第一电影网av| 美女免费视频网站| 99久久精品国产亚洲精品| 悠悠久久av| 在线观看午夜福利视频| 又黄又爽又免费观看的视频| 精品久久久久久久毛片微露脸| 窝窝影院91人妻| 在线免费观看的www视频| 午夜久久久在线观看| 日韩成人在线观看一区二区三区| 一进一出抽搐动态| 99久久久亚洲精品蜜臀av| 十八禁人妻一区二区| 激情在线观看视频在线高清| 久久精品国产亚洲av高清一级| 精品久久久精品久久久| 国产成人精品在线电影| 啦啦啦韩国在线观看视频| 国产一卡二卡三卡精品| 丰满人妻熟妇乱又伦精品不卡| 精品久久久久久,| bbb黄色大片| 亚洲国产欧美日韩在线播放| 18美女黄网站色大片免费观看| 欧美国产精品va在线观看不卡| 国产成人精品在线电影| 国产成人免费无遮挡视频| www.999成人在线观看| 国产片内射在线| 午夜福利一区二区在线看| 国产激情久久老熟女| 搡老岳熟女国产| 欧美色欧美亚洲另类二区 | 国产色视频综合| netflix在线观看网站| 色综合站精品国产| 亚洲在线自拍视频| 欧美黑人欧美精品刺激| 久久人妻av系列| 国产精品免费一区二区三区在线| 亚洲第一电影网av| 国产欧美日韩一区二区三| 久久午夜综合久久蜜桃| 久久精品aⅴ一区二区三区四区| 亚洲avbb在线观看| 国产xxxxx性猛交| 亚洲成国产人片在线观看| 在线视频色国产色| 亚洲一区高清亚洲精品| 国产精品久久久av美女十八| 国产97色在线日韩免费| 韩国精品一区二区三区| 国产极品粉嫩免费观看在线| 国产高清视频在线播放一区| 国产av又大| 每晚都被弄得嗷嗷叫到高潮| 精品欧美国产一区二区三| 亚洲一区二区三区色噜噜| 麻豆国产av国片精品| 999精品在线视频| 欧美色视频一区免费| 免费在线观看影片大全网站| 午夜精品在线福利| 丝袜在线中文字幕| 99在线视频只有这里精品首页| 亚洲中文字幕日韩| 91国产中文字幕| 欧美日韩黄片免| 亚洲一卡2卡3卡4卡5卡精品中文| 麻豆久久精品国产亚洲av| 午夜精品久久久久久毛片777| 少妇粗大呻吟视频| 一级作爱视频免费观看| 男人舔女人的私密视频| 国产精品秋霞免费鲁丝片| 国产野战对白在线观看| 久久精品国产99精品国产亚洲性色 | 高清在线国产一区| 国产蜜桃级精品一区二区三区| 欧美色欧美亚洲另类二区 | 国产高清有码在线观看视频 | 美女免费视频网站| 色av中文字幕| 一区二区日韩欧美中文字幕| 国产av一区在线观看免费| 久久中文看片网| 精品久久久久久久久久免费视频| 欧美黄色片欧美黄色片| xxx96com| 99在线人妻在线中文字幕| 9191精品国产免费久久| 久久人妻熟女aⅴ| 老司机在亚洲福利影院| 色精品久久人妻99蜜桃| 一区二区三区激情视频| 69精品国产乱码久久久| 欧美+亚洲+日韩+国产| 国产97色在线日韩免费| 巨乳人妻的诱惑在线观看| 亚洲avbb在线观看| 精品国产美女av久久久久小说| 亚洲情色 制服丝袜| 在线天堂中文资源库|