首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 0 毫秒
1.
针对采用Epidemic机制的机会网络路由算法在数据分组传送阶段存在通信冗余的问题,提出了一种基于网络编码的高效路由算法--NCBER(network-coding-based epidemic routing)。NCBER在传送数据分组的过程中使用主动异或网络编码和多播,并取消了 Request(请求)控制分组,从而减少数据分组的转发次数和控制分组数量,降低网络开销,缩短分组传输时延。理论分析和仿真结果表明,NCBER 算法在网络开销和数据分组端到端时延性能方面优于经典的Epidemic路由算法及其改进算法MRRMR(message redundancy removal of multi-copy routing),并且使数据传送成功率保持在100%。  相似文献   

2.
首先引入机会网络的概念以及相应的基础理论知识,包括机会网络的体系结构、通信模式及一些经典的路由协议,然后主要介绍了网络编码的基本概念和原理,重点描述了线性网络编码方法及基于此的高效路由协议,最后对机会网络基于编码路由协议未来发展前景进行了展望。  相似文献   

3.
在AdHoc网络技术的工程实现中,路由协议的选择以及硬件无线通信系统设计是要解决的两个关键环节。本文针对节点之间无等级结构的AdHoc网络,基于一种泛搜索路由协议进行AdHoc网络系统设计和实现。硬件通信设备采用单片机C8051F920控制无线数传模块的方案进行设计,按照搜索路由协议对单片机编写程序,继而组建AdHoc网络系统。通过对网络测试所得的数据结果进行分析,表明该路由协议能适应网路拓扑结构变化,准确地找到一条适合传输的路由,所设计通信系统满足AdHoc网络的基本特征。  相似文献   

4.
利用多个信道接口来改善ad hoc网络信道容量。即一个信道周期性的广播节点状态信息分组来维护全网所有节点的状态信息,而另一个信道利用此信息采用最短路径搜寻算法来获得到目的节点的路由并完成数据传输。这样充分结合了表驱动路由方法和按需式路由方法的优点。另外,信息维护与数据分组分别在两个信道内同时进行,避免了信息维护对数据分组传输的影响,提高了网络性能。  相似文献   

5.
Mesh‐based multicast routing protocols for mobile ad hoc networks (MANETs) build multiple paths from senders to receivers to deliver packets even in the presence of links breaking. This redundancy results in high reliability/robustness but may significantly increase packet overhead. This paper proposes a mesh‐based multicast protocol, called centered protocol for unified multicasting through announcements (CPUMA), that achieves comparable reliability as existing mesh‐based multicast protocols, however, with significantly much less data overhead. In CPUMA, a distributed core‐selection and maintenance algorithm is used to find the source‐centric center of a shared mesh. We leverage data packets to center the core of each multicast group shared mesh instead of using GPS or any pre‐assignment of cores to groups (the case of existing protocols). The proposed centering scheme allows reducing data packet overhead and creating forwarding paths toward the nearest mesh member instead of the core to reduce latency. We show, via simulations, that CPUMA outperforms existing multicast protocols in terms of data packet overhead, and latency while maintaining a constant or better packet delivery ratio, at the cost of a small increase in control overhead in a few scenarios. Copyright © 2010 John Wiley & Sons, Ltd.  相似文献   

6.
ad hoc网络中一种基于信任模型的机会路由算法   总被引:2,自引:0,他引:2  
王博  陈训逊 《通信学报》2013,34(9):92-104
由于ad hoc网络具有缺乏足够的物理保护、拓扑结构动态变化、采用分布式协作、节点的带宽和计算能力有限等特点,导致传统的路由安全机制不再适合ad hoc网络路由协议的设计。最近当前研究热点之一的机会路由能够在链路不可靠的情况下充分利用无线广播和空间多样性的特性提高网络的吞吐量。因此,考虑在机会路由中引入信任相似性概念设计信任机会路由,建立了基于节点信任度和最小成本的信任机会转发模型,提出了最小成本的机会路由算法MCOR,并对算法进行了理论上的分析和证明。最后采用仿真实验对该算法进行验证,又与经典机会路由协议ExOR以及其他经典的信任路由协议TAODV和Watchdog-DSR进行性能对比。仿真结果表明,MCOR算法能够防范恶意节点的攻击,在吞吐量、端到端时延、期望转发次数(ETX)和成本开销等方面都比其他3种协议表现出性能上的优势。  相似文献   

7.
Ad hoc网络中基于数据流的QoS路由协议   总被引:6,自引:1,他引:6  
刘占军  赵为粮  李云  隆克平 《通信学报》2004,25(12):125-130
已有ad hoc网络中的QoS路由都是基于目的地址的选路并预留资源,当源节点针对同一个目的节点先后建立两个或者多个实时业务流的时候,将导致几个数据流争用资源,使得几个流的QoS都无法得到保证。针对这个问题,文章提出了基于流的QoS路由机制,并且进行了仿真分析,仿真结果表明这种机制能够解决这个问题,使QoS得到保证。  相似文献   

8.
The nodes in a wireless ad hoc network act as routers in a self‐configuring network without infrastructure. An application running on the nodes in the ad hoc network may require that intermediate nodes act as routers, receiving and forwarding data packets to other nodes to overcome the limitations of noise, router congestion and limited transmission power. In existing routing protocols, the ‘self‐configuring’ aspects of network construction have generally been limited to the construction of routes that minimize the number of intermediate nodes on a route while ignoring the effects that the resulting traffic has on the overall communication capacity of the network. This paper presents a context‐aware routing metric that factors the effects of environmental noise and router congestion into a single time‐based metric, and further presents a new cross‐layer routing protocol, called Warp‐5 (Wireless Adaptive Routing Protocol, Version 5), that uses the new metric to make better routing decisions in heterogeneous network systems. Simulation results for Warp‐5 are presented and compared to the existing, well‐known AODV (Ad hoc On‐Demand Distance Vector) routing protocol and the reinforcement‐learning based routing protocol, Q‐routing. The results show Warp‐5 to be superior to shortest path routing protocols and Q‐routing for preventing router congestion and packet loss due to noise. Copyright © 2011 John Wiley & Sons, Ltd.  相似文献   

9.
研究ad hoc网络中无线链路存在邻近链路干扰及隐藏终端和暴露终端问题,提出新的带宽预留模型及带宽保证路由协议(BGRP),旨在按需探测符合带宽需要的路由路径并预留可靠的带宽资源。理论分析证明,BGRP探测的路由路径能满足带宽需要,而且预留的带宽资源准确有效。仿真结果表明,就有效带宽而言,BGRP较INSIGNIA和BGSR算法有效,而且消息复杂性较小,具有良好的网络扩展性。  相似文献   

10.
董超  钱睿  陈贵海  王海 《通信学报》2011,(10):92-98
编码机会对流间网络编码协议的性能具有重要影响,包括AODV在内的大多数距离向量路由协议仅知道针对某个目的节点的一跳邻居信息,无法有效地发现编码机会。针对该问题,从节点需要掌握的网络拓扑信息这一角度,提出了编码机会有效发现的条件并从充分性与必要性两方面进行了分析,然后基于AODV路由协议进行了实现,同时利用真实的网络实验与网络仿真对所提条件进行了验证。实验与仿真结果表明,所提条件是正确的,可以有效地提高无线自组织网络的性能。  相似文献   

11.
Vehicular ad‐hoc networks have several roles in alert messages dissemination between vehicles in danger, the most important role is to provide helpful information for drivers (eg, road traffic state). But, some performance improvements are frequently needed in terms of routing. Hence, several clustering approaches have been proposed to optimize the network services. These approaches are based on increasing data delivery, reducing data congestion, and dividing the traffic into clusters. However, a stable clustering algorithm is always required in order to ensure the data dissemination in a dense, mobile, or a large‐scale environment. Therefore, in this paper, we have proposed a stable routing protocol based on the fuzzy logic system, which can deliver alert messages with minimum delay and improve the stability of clusters structure by generating only a small number of clusters in the network. In this work, the fuzzy logic system has been used to create the clusters and select a cluster head for each cluster. We have used the network simulator (NS2) to generate the results. As a result, we could reduce the cluster head changes and increase the cluster member lifetime compared with recent approaches.  相似文献   

12.
车载自组织网中基于蚁群算法的延迟感知路由协议   总被引:1,自引:0,他引:1  
吴敏  章国安  蔡蓉 《电讯技术》2016,56(10):1086-1092
针对城市道路环境下车载自组织网( VANETs)中通信性能下降以及数据传输失败的问题,提出了一种基于蚁群算法的延迟感知路由( ACDR)协议。首先,建立双向车道的数学延迟模型;然后,根据提出的端点十字路口( EI)的概念,ACDR利用蚁群优化( ACO)寻找最佳路线,其中前向蚂蚁根据本地路段延迟以及当前十字路口与目的节点的端点十字路口之间的全局时延来选择路径,后向蚂蚁则负责在返回路径时更新信息素,同时,相邻十字路口之间利用贪婪转发算法进行数据包的传递。最后仿真比较了ACDR协议与连通性感知路由( CAR)协议的性能,结果表明提出的ACDR协议的数据包的传输延迟小,丢包率低,通信性能好。  相似文献   

13.
针对无线传感器网络节点能量受限制的特点,提出基于网络编码的多径路由策略.该策略在数据传输过程当中通过增加跨层协作机制,减少对单个数据包的依赖,降低数据包重传次数,使得网络带宽得到优化,同时数据在传输路径中进行随机编码使得数据包安全传输.分析表明,该策略可以保证数据传输的有效性和安全性.  相似文献   

14.
Min  Srikanth V.  Michalis   《Ad hoc Networks》2006,4(2):283-300
Application layer multicasting has emerged as an appealing alternative to network layer multicasting in wireline networks. Here, we examine the suitability of application layer multicast in ad hoc networks. To this effect, we propose a flexible receiver-driven overlay multicast protocol which we call Application Layer Multicast Algorithm (ALMA). ALMA constructs an overlay multicast tree in a dynamic, decentralized and incremental way. First, ALMA is receiver-driven: the member nodes find their connections according to their needs. Second, it is flexible, and thus, it can satisfy the performance goals and the needs of a wide range of applications. Third, it is highly adaptive: it reconfigures the tree in response to mobility or congestion. In addition, our protocol has the advantages of an application layer protocol: (a) simplicity of deployment, (b) independence from lower layer protocols, and (c) capability of exploiting features such as reliability and security that may be provided by the lower layers. Through extensive simulations, we show that ALMA performs favorably against the currently best application layer and network layer protocols. In more detail, we find that ALMA performs significantly better than ODMRP, a network layer, for small group sizes. We conclude that the application layer approach and ALMA seem very promising for ad hoc multicasting.  相似文献   

15.
耿志 《电讯技术》2023,(1):113-119
随着科技进步,我国在应急通信系统建设上也正高速发展,当前应急通信网络对多媒体业务有着迫切需求,对网络带宽要求更高。而当网络存在多种不同业务时,传统通用的路由协议不再适用,它们大多以最小跳数为路由度量或者是某个单一度量,未能考虑不同业务的服务质量(Quality of Service, QoS)需求,因而无法同时兼顾不同业务流的传输要求。提出了一种应急通信中业务感知的宽带自组网路由策略,对不同类型业务在路由和转发优先级上进行区分。经多次仿真验证,该策略能使网络在满足应急语音业务QoS需求的同时,也能兼顾承载的视频、数据等其他业务的性能。  相似文献   

16.
The performance of wireless networks is limited by multiple access interference (MAI) in the traditional communication approach where the interfered signals of the concurrent transmissions are treated as noise. In this paper, we treat the interfered signals from a new perspective on the basis of additive electromagnetic (EM) waves and propose a network coding based interference cancelation (NCIC) scheme. In the proposed scheme, adjacent nodes can transmit simultaneously with careful scheduling; therefore, network performance will not be limited by the MAI. Additionally we design a space segmentation method for general wireless ad hoc networks, which organizes network into clusters with regular shapes (e.g., square and hexagon) to reduce the number of relay nodes. The segmentation method works with the scheduling scheme and can help achieve better scalability and reduced complexity. We derive accurate analytic models for the probability of connectivity between two adjacent cluster heads which is important for successful information relay. We proved that with the proposed NCIC scheme, the transmission efficiency can be improved by at least 50% for general wireless networks as compared to the traditional interference avoidance schemes. Numeric results also show the space segmentation is feasible and effective. Finally we propose and discuss a method to implement the NCIC scheme in a practical orthogonal frequency division multiplexing (OFDM) communications networks. Copyright © 2009 John Wiley & Sons, Ltd.  相似文献   

17.
针对移动adhoc网络终端能量资源受限对全网路由的影响,提出一种具有终端节点能量感知的路由协议(EARP,energy-awareroutingprotocol).该协议能够根据单个节点能量的使用情况以及全路径的能量消耗情况选择不同的传输路径,在路径断裂时,增加本地维护策略,有效减少了由此引起的发包重传情况,提高了路由效率.通过节点能级的设定,防止链路传输过程中由于能量耗尽而导致的路由断裂情况.经过NS2仿真实验与其他相关路由协议进行比较,结果表明在相同的实验环境下,该路由协议能够有效均衡负载,保护低能量节点,延长网络生存时间  相似文献   

18.
In order to effectively identify the multiple types of DNS covert channels,the implementation of different sorts of DNS covert channel software was studied,and a detection based on the improved convolutional neural network was proposed.The experimental results,grounded upon the campus network traffic,show that the detection can identify twenty-two kinds of data interaction modes of DNS covert channels and is able to identify the unknown DNS covert channel traffic.The proposed method outperforms the existing methods.  相似文献   

19.
提出一种新的基于网络编码的负载均衡路由量度CRM-LB(coding-aware routing metric with load balancing),CRM-LB在CRM(coding-aware routing metric)的基础上增加了对路径p上所有节点通信密集程度与网络拥塞程度的考虑。进一步提出了基于CRM-LB的无线mesh网络多播路由CLR(coding and load-balancing routing)。该协议可以增加网络编码机会,同时考虑到网络中的负载均衡。通过性能分析和仿真实验表明,该协议在提高多播吞吐量的前提下,不仅能更好地支持网络编码,而且网络负载基本均衡。  相似文献   

20.
In large and dense mobile ad hoc networks, position-based routing protocols can offer significant performance improvement over topology-based routing protocols by using location information to make forwarding decisions. However, there are several potential security issues for the development of position-based routing protocols. In this paper, we propose a secure geographic forwarding (SGF) mechanism, which provides source authentication, neighbor authentication, and message integrity by using both the shared key and the TIK protocol. By combining SGF with the Grid Location Service (GLS), we propose a Secure Grid Location Service (SGLS) where any receiver can verify the correctness of location messages. We also propose a Local Reputation System (LRS) aiming at detecting and isolating both compromised and selfish users. We present the performance analysis of both SGLS and LRS, and compare them with the original GLS. Simulation results show that SGLS can operate efficiently by using effective cryptographic mechanisms. Results also show that LRS effectively detects and isolates message dropping attackers from the network.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号