期刊文献+

基于空间位置和场景的Ad Hoc路由协议 被引量:1

Ad Hoc Routing Protocol Based on the spatial Location and Scene
下载PDF
导出
摘要 在移动Ad Hoc网络中,基于拓扑的路由易发生链路断开,基于地理位置的路由易产生拓扑洞,这都会大大降质路由算法的性能,甚至会出现路由失败的问题.为此文中提出了基于空间位置和场景的Ad Hoc路由协议.该协议算法采用构建空间模型,将场景知识引入路由过程的方法,通过在路由前规避拓扑洞来改善和提高路由性能.仿真结果表明在网络连通度适当的条件下,新的路由协议算法可行和有效的. In the mobile Ad Hoc network, the link which governed by the routing protocol based on topology disconnected easily, and topology holes easily happened in the link which governed by the routing protocol based on gecgraphical location. These two type routing protocol significantly degrade the performance of routing algorithm, even lead to routing failure problems. In this paper, the routing protocol based on spatial location and scenes has been presented. Through constructing spatial model which introduce the scenes knowledge in routing process and bypassing the topology holes before routing, the routing performance are improved. The simulation results show that the new routing protocol can effectively improve the performance of routing in the proper conditions of network connectivity.
出处 《微电子学与计算机》 CSCD 北大核心 2010年第2期163-166,共4页 Microelectronics & Computer
基金 浙江省自然科学基金(Y1080734)
关键词 空间位置 拓扑洞 AD Hoe路由协议 SSR协议 spatial location Topology hole Ad Hoc muting protocol SSR protocol
  • 相关文献

参考文献4

  • 1张国庆,慕德俊,许钟,杨卫莉.一种高效的按需路由协议安全性改进方法[J].微电子学与计算机,2008,25(5):138-142. 被引量:1
  • 2Perkins C E, Royer E M. Ad- hoe on demand distance vector muting[ C] // Proceedings of 2nd IEEE Workshop on Mobile Computing Systems and Applications. New Orleans: IEEE Computer Society, 1999:90- 100.
  • 3Karp B, Kung H T. Greedy perimeter stateless muting for wireless networks[ C] //Proceedings of ACM- IEEE Mobi- Com'00. USA:Boston, MA: ACM/IEEE, 2000,243- 254.
  • 4Jing Tian, Han L, Rothermel K, et al. Spatially aware packet muting for mobile Ad Hoc intervehicle radio networks[C]//Proceedings of the IEE 6th Intl Conf. Shanghai: Intelligent Transportation Systems, IEEE, 2003:12 - 15.

二级参考文献7

  • 1蒋毅,史浩山.一种新的移动Ad hoc网络的安全路由策略[J].微电子学与计算机,2005,22(4):30-32. 被引量:4
  • 2苗建松,丁炜.移动自组网椭圆曲线门限签名加密算法安全性分析[J].微电子学与计算机,2006,23(11):96-98. 被引量:2
  • 3Perkins C E, Royer E M. Ad-Hoc on demand distance vector muting[ C] // Proceedings of the 2nd IEEE Workshop on Mobile Computing Systems and Applications (WMCSA). New Orleans, LA-IEEE, 1999:90- 100.
  • 4Johnson D B, AMahz D. Dynamic source muting in Ad Hoe wireless networks[ M]. New York: Kluwer Academic Publishers, 1996:153 - 181.
  • 5Manel G Z. Secure Ad hoc on - demand distance vector (SAODV) routing[EB/OL]. [2007- 01 - 12]. http://IETF draft-guerrero- manet-saodv-02. txt, 2004.
  • 6Xu Shidi, Mu Yi, Susilo W. Embedded and ubiquitous computing[ M]. Germany: Springer publishing LNCS, 2005(3823) :854 - 863.
  • 7QualNet simulation tools [EB/OL]. E2007- 01 - 12]. http://www.scalable-networks. com.

同被引文献6

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部