期刊文献+

基于冲突避免的DSR协议研究 被引量:3

Research of DSR protocol based on conflict avoidance
下载PDF
导出
摘要 基于自适应移动多跳AdHoc网络,针对其DSR协议的路由缓存机制,分析不足之处,探索对现有的路由缓存机制的优化方法。提出了缓存路由有效期的概念,为网络中节点的路由表添加一个用于反馈的"缓存路由跳数"参数,节点选择此参数值最小者的路由信息。仿真实验表明,经过改进的缓存机制有效地避免了响应冲突问题,实现了路由的最短优化,在平均传输延迟、分组投递率、吞吐量性能方面都有提高。 Based on the adaptive mobile multi-hop Ad Hoc network,we analyses its inadequacies and explore a new optimized method of the existing route cache mechanism of the DSR protocol.In this article,we propose the concept of validity period of caching route,add a 'cache routing hop' parameter to routing of every node in order to feedback.Nodes select routing information of the smallest one.Simulation results show that the improved caching mechanism avoid response conflict efficiently,realize the opti- mization of shortest route.Performance of the averaze delay.packet delivery ratio and routin~ overhead have been imuroved.
出处 《微型机与应用》 2013年第16期48-50,53,共4页 Microcomputer & Its Applications
基金 国家自然科学基金资助项目(60902044)
关键词 DSR 路由缓存 缓存路由有效期 跳数 NS2 DSR routing cache validity period of caching route the number of hops NS2
  • 相关文献

参考文献7

  • 1庄春梅,王利利,陆建德.DSR协议的路由缓存策略[J].计算机工程,2010,36(2):100-101. 被引量:6
  • 2AYUB J,GARRIDO G,MARANDIN D.A linkcache invalidation mechanism for dynamic source routing(DSR) in Ad Hoc networks[J].IEEE Journal on Selected Areas in Communications,2007(7):1144-1148.
  • 3Chen Jiaxu,Tang Yazhe,Fu Dian,et al.On the improving strategies upon the route cache of DSR in MANETs[C].International Conference on Ubiquitous Intelligence and Computing,Xi'an,2010:26-29.
  • 4TAMILARASI M,PALANIVELU T G.An efficient Hop count based adaptive route cache timeout(HART) mechanism for on-demand routing in MANETs[J].IETETechnical Review,2007(6):68-73.
  • 5Zhou Nianjun,Wu Huaming,ABOUZEID A A.The impact of traffic patterns on the overhead of reactive routing protocols[J].IEEE Journal on Selected Areas in Communications,2005(3):547-560.
  • 6李学桥,赵磊,贾小爱,徐本福.DSR协议cache管理策略的优化[J].通信技术,2009,42(4):85-87. 被引量:1
  • 7FU Z,ZERFOS P,LUO H,et al.The impact of multi hop wireless channel on TCP throughput and loss[C].Proceedings of the 22nd Annual Joint Conference of the IEEE Computer and Communications Societies,San Francisco,2003:1744-1753.

二级参考文献6

  • 1Maltz D A, Broch J, Jetcheva J, et al. The effects of on demand behavior in routing protocols for multihop wirless ad hoc networks[J]. IEEE Journal on Selected Areas in Communications 17(8)(August 1999) 1439-1453.
  • 2Wen-jing Lou, Yu-guang Fang. Predictive Caching Straregy for On-Demand Routing Protocols in Wireless Ad Hoe Networks. Wireless Networks, Kluwer Academic Publishers. Manufactured in The Netherlands. 2002 .671-679.
  • 3Johnson D, Hu Y, Maltz D. The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks for IPv4[S]. [2008-04-19]. http:// www.ietf.org/rfc/rfc4728.txt.
  • 4Perkins C, Belding-Royer E, Das S. Ad Hoc on Demand Distance Vector Routing[S]. [2008-04-19]. http://www.ietf.org/rfc/rfc3561. txt.
  • 5于宏毅.无线移动自组织网[M].北京:人民邮电出版社,2006:354.
  • 6张安定,吕振肃,孙凯.基于OPNET的Ad hoc路由协议比较与分析[J].通信技术,2007,40(12):184-186. 被引量:6

共引文献5

同被引文献25

  • 1陈林星,曾曦,曹毅.移动Ad hoc网络:自组织分组无线网络技术[M].2版.北京:电子工业出版社,2012.
  • 2PAUL N R, TRIPATHY L, MISHRA P K.Analysis and improvement of DSDV protocol[J].International Journal of Computer Science Issues,2011,2(8):408-410.
  • 3VANAPARTHI R, PRAGATI G.Routing protocols to enhance security in MANETS[J].Global Journal of Computer Science and Technology,2011,11(13):22-26.
  • 4PATEL T, SHYAMALA RANI C, PATEL H.Performance evaluation of DSR protocol under DoS attack[J].International Journal of Electronics and Computer Science Engineering,2012,1(2):9-14.
  • 5MANIKANDAN S P, MANIMEGALAI R.Survey on mobile Ad hoc network attacks and mitigation using routing protocols[J].American Journal of Applied Sciences,2012,9(11):1796-1801.
  • 6MARIMUTHU M, KRISHNAMURTHI I.Enhanced OLSR for defense against DoS attack in Ad hoc networks[J].Journal of Communications and Networks,2013,15(1):31-37.
  • 7AHMED S, NIRKHI S M.A fuzzy rule based forensic analysis of DDoS attack in MANET[J].International Journal of Advanced Computer Sciences and Applications,2013,4(6):38-44.
  • 8MELLO M P, VIEIRA C A O, RUDORFF B F T, et al.STARS:a new method for multitemporal remote sensing[J].IEEE Trans on Geoscience and Remote Sensing,2013,51(4):1897-1913.
  • 9AASHIMA G, KUMAR P.Analysis of different security attacks in MANETs on protocol stack:a review[J].International Journal of Engineering and Advanced Technology,2012,1(5):56-61.
  • 10BOLLA J V, VATSAVAYI V K, MURTHY J V R.Anonymity and security in mobile Ad hoc networks[C]//Proc of the 8th International Conference on Distributed Computing and Internet Technology.2012:71-82.

引证文献3

二级引证文献15

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部