期刊文献+

带有社会关系感知的机会网络组播路由机制 被引量:3

Social relation-aware multicast routing mechanism for opportunistic networks
原文传递
导出
摘要 为提高组播通信中数据传输的可靠性,提出了一种带有社会关系感知的组播路由机制,源节点采用喷泉码对原始数据进行编码,并结合相遇节点与会话目标节点的关系类型以及相遇历史信息选择合适的中继节点转发编码数据;同时,对接收到的编码数据进行冗余检测,以减少不必要的编码数据转发.数值结果表明:所提出的机制能够以较低的网络开销实现较高的数据投递,提高了网络资源利用率. The characteristic of strong dynamicity makes multicast packet transmission process unstable in opportunistic networks.In order to improve the reliability of packet transmission in multicast communication,a social relation-aware multicast routing mechanism was proposed.The original packets were encoded by source node with fountain codes,and the relationship of the meet node and the session destination node with the historical information was combined to select the appropriate relay node to transmit the encoded packet.Besides,redundancy of the received encoded packet was detected to reduce unnecessary encoded packet forwarding.Numerical results show that the proposed mechanism can achieve high delivery ratio with low network overhead and optimize the utilization of network resources.
出处 《华中科技大学学报(自然科学版)》 EI CAS CSCD 北大核心 2016年第7期127-132,共6页 Journal of Huazhong University of Science and Technology(Natural Science Edition)
基金 国家自然科学基金资助项目(61371097) 重庆市自然科学重点基金资助项目(CSTC2013JJB40001 CSTC2013JJB40006 CSTC2014JCYJA40039) 重庆市青年科技人才培养计划资助项目(CSTC2014KJRC-QNRC40001) 重庆市教委基金资助项目(KJ1400402)
关键词 机会网络 组播路由 喷泉码 编码数据 网络开销 opportunistic networks multicast routing fountain codes encoded packet network overhead
  • 相关文献

参考文献15

  • 1Conti M, Giordano S. Mobile Ad Hoc networking: milestones, challenges, and new research directions [J].IEEE Communications Magazine, 2014, 52 (1) : 85-96.
  • 2Mota V F S, Cunha F D, Macedo D F, et al. Protocols, mobility models and tools in opportunistic networks., a survey [J ]. Computer Communications, 2014, 48(4): 5-19.
  • 3Khabbaz M J, Assi C M, Fawaz W F. Disruptiontolerant networking: a comprehensive survey on recent developments and persisting challenges [J]. IEEE Communications Surveys and Tutorials, 2012, 14(2): 607-640.
  • 4Santiago J, Casaca A, Pereira P R. Multicast in delay tolerant networks using probabilities and mobility information[J]. Ad Hoe and Sensor Wireless Net- works, 2009, 7(1/2): 51-68.
  • 5Lindgren A, Doria A, Schelen O. Probabilistic routing in intermittently connected networks[J]. ACM Sigmobile Mobile Computing and Communications Review, 2003, 7(3) : 19-20.
  • 6Gao W, Li Q, Zhao B, et al. Social-aware multicast in disruption-tolerant networks [J].IEEE/ACM Trans on Networking, 2012, 20(5): 1553-1566.
  • 7Lo S C, Luo N W, Gao J S, et al. Quota-based multicast routing in delay-tolerant networks[J]. Wireless Personal Communications, 2014, 74(4): 1329-1344.
  • 8Jiang G, Chen J, Shen Y. Delivery ratio-and buffered time-constrained: muhieasting for delay tolerant networks[J]. Journal of Network and Computer Applications, 2014, 44: 92-105.
  • 9MacKay D J C. Fountain codes[J]. IEE Proceedings-Communications, 2005, 152(6):1062-1068.
  • 10Zhu Z L, Liu S, Zhang J W, et al. Performance analysis of LT codes with different degree distribution [C]//Proc of 5th International Workshop on Chaos- Fractals Theories and Applications. Dalian: IEEE, 2012: 142-146.

二级参考文献35

  • 1EAGLE N, PENTLAND A. Reality mining: sensing compLex social systems[J]. Personal Ubiquitous Computing,2006,10(4):255-268.
  • 2Community resource for archiving wireless data at dartmouth [EB/OL]. (2010- 03). http://crawdad. cs. dartmouth, edu/.
  • 3Diot. Haggle project[ DB/OL]. (2004). http ://www. haggleproject. org.
  • 4CHOFFNES D R, BUSTAMANTE F E. An integrated mobility and traffic model for vehicular wireless networks [ C ]//Proc of the 2nd ACM International Workshop on Vehicular Ad hoc Networks. New York : ACM Press ,2005.
  • 5JOHNSON D B, MALTZ D A. Dynamic source routing in Ad hoc wireless networks[M]. [ S. l. ] :Kluwer Academic Press, 1996.
  • 6Le BOUDEC J Y L, VOJNOVIC M. Perfect simulation and stationarity of a class of mobility models [ C ]//Proc of the 24th anual Joint Conference on IEEE Computer and Communications Socitices. 2005 : 2743- 2754.
  • 7KURKOWSKI S, CAMP T, MUSHELL N, et al. A visualization and analysis tool for NS-2 wireless simulations [ C ]//Proc of the 13th IEEE International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems. 2005:503-506.
  • 8JANERT P K. Gnuplot in action-understanding data with graphs [M]. [S. l. ]: Manning Press,2009.
  • 9KERANEN A, OTT J, KXRKKAINEN T. The ONE simulator for DTN protocol evaluation [ C ]//Proc of the 2nd International Conference on Simulation Tools and Techniques. 2009.
  • 10TKK/COMNET. Project page of the ONE simulator [ EB/OL ]. (2008). http://www. netlab, tkk. fi/tutkimus/dtn/theone.

共引文献39

同被引文献20

引证文献3

二级引证文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部