首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
Among the many multipath routing protocols, the AOMDV is widely used in highly dynamic ad hoc networks because of its generic feature. Since the communicating nodes in AOMDV are prone to link failures and route breaks due to the selection of multiple routes between any source and destination pair based on minimal hop count which does not ensure end-to-end reliable data transmission. To overcome such problems, we propose a novel node disjoint multipath routing protocol called End-to-End Link Reliable Energy Efficient Multipath Routing (E2E-LREEMR) protocol by extending AOMDV. The E2E-LREEMR finds multiple link reliable energy efficient paths between any source and destination pair for data transmission using two metrics such as Path-Link Quality Estimator and Path-Node Energy Estimator. We evaluate the performance of E2E-LREEMR protocol using NS 2.34 with varying network flows under random way-point mobility model and compare it with AOMDV routing protocol in terms of Quality of Service metrics. When there is a hike in network flows, the E2E-LREEMR reduces 30.43 % of average end-to-end delay, 29.44 % of routing overhead, 32.65 % of packet loss ratio, 18.79 % of normalized routing overhead and 12.87 % of energy consumption. It also increases rather 10.26 % of packet delivery ratio and 6.96 % of throughput than AOMDV routing protocol.  相似文献   

2.
Delay Tolerant Networks (DTNs) provide message delivery services to users via intermittently connected nodes. In DTNs, routing is one of the most challenging issues since end-to-end connectivity between nodes may not be available most of the time. Although many routing protocols for DTNs have been proposed, they do not achieve satisfactory performance, since they exploit only some of the network characteristics. In this paper, we present a new DTN routing protocol, called the Link Contact Duration-based Routing Protocol (LCD). Like existing protocols, LCD uses the disconnect duration of a link between two nodes to find the routing path with the shortest end-to-end delay. In addition, LCD uses the contact duration of a link and the number of buffered messages to deliver as many messages as possible in a short time. Our simulation results show that LCD has better performance than existing DTN routing protocols.  相似文献   

3.
In Delay Tolerant Networks (DTNs), mobile nodes exploit encounter chances to transmit data via the established opportunistic link between encounter nodes. The transmission capacity between two encounter nodes is constrained by the duration of opportunistic links. How to transmit data efficiently is one of the fundamental and most important issues in DTNs. Recently, Random Linear Network Coding (RLNC) is proposed as a promising approach to improve data transmission efficiency in DTNs. To facilitate the development of deployment of RLNC based routing protocols, it is imperative to quantify the performance gain brought by RLNC in a rigorous and systematic way. In this paper, we develop an analytical model to evaluate the data transmission performance of RLNC based epidemic routing in DTNs. In the model, we consider that multiple unicast communication sessions compete for limited \capacity. Numerical results validate the effectiveness of our analytical model and demonstrate the significant performance improvement for data transmission in DTNs brought by RLNC. Our work of this paper provides a general tool for performance evaluation and useful guidelines for designing RLNC based routing protocols in DTNs. Copyright © 2015 John Wiley & Sons, Ltd.  相似文献   

4.
Query processing systems in wireless sensor networks usually support tasks such as data acquisition, data aggregation, and event‐based query. The performances of query processing with these tasks are greatly varied according to different routing protocols. Most existing data query systems usually use one routing protocol to deal with all kinds of queries. This work demonstrates that proper selection of routing protocols can improve the performance of query processing. We propose a dynamic routing layer that makes protocol selection on the basis of query tasks and can automatically switch between different routing protocols. Simulation results show that dynamic routing scheme is more energy efficient than single routing protocol. Copyright © 2012 John Wiley & Sons, Ltd.  相似文献   

5.
MORA routing and capacity building in disruption-tolerant networks   总被引:1,自引:0,他引:1  
Brendan  Oliver  Brian Neil   《Ad hoc Networks》2008,6(4):600-620
Disruption-tolerant networks (DTNs) differ from other types of networks in that capacity is created by the movements of network participants. This implies that understanding and influencing the participants’ motions can have a significant impact on network performance. In this paper, we introduce the routing protocol MORA, which learns structure in the movement patterns of network participants and uses it to enable informed message passing. We also propose the introduction of autonomous agents as additional participants in DTNs. These agents adapt their movements in response to variations in network capacity and demand. We use multi-objective control methods from robotics to generate motions capable of optimizing multiple network performance metrics simultaneously. We present experimental evidence that these strategies, individually and in conjunction, result in significant performance improvements in DTNs.  相似文献   

6.
Routing in delay tolerant networks (DTNs) is challenging due to their unique characteristics of intermittent node connectivity. Different protocols (single-, multi-copy, erasure-coding-based etc.) utilizing store-carry-and-forward paradigm have been proposed to achieve routing of messages in such environments by opportunistic message exchanges between nodes that are in the communication range of each other. The sparsity and distributed nature of these networks together with the lack of stable connectivity between source destination pairs make these networks vulnerable to malicious nodes which might attempt to learn the content of the messages being routed between the nodes. In this paper, we study DTNs in which malicious nodes are present, to which we refer to as compromised DTNs. We discuss and analyze the effects of presence of malicious nodes on routing of messages in compromised DTNs. We propose a two period routing approach which aims at achieving the desired delivery ratio by a given delivery deadline in presence of malicious nodes. Our simulation results with both random networks and real DTN traces show that, with proper parameter setting, the proposed method can achieve delivery ratios which surpass those reached by other algorithms by a given delivery deadline.  相似文献   

7.
Because of the wide range of applications, many geographic routing protocols have been proposed in three‐dimensional (3D) wireless sensor networks. However, all the methods require assistance from a global positioning system (GPS), which is not always available. In this paper, we propose a method of constructing an axis‐based virtual coordinate assignment in 3D wireless sensor networks (ABVCap_3D) that requires no GPS assistance. We also propose a routing protocol based on ABVCap_3D, which guarantees packet delivery in 3D networks. Using simulations, we evaluate the performance of ABVCap_3D routing and other well‐known routing protocols, such as greedy‐random‐greedy routing, greedy‐hull‐greedy routing, and the routing based on axis‐based virtual coordinate assignment in 2D wireless sensor networks (ABVCap routing). Simulations show that ABVCap_3D routing requires significantly relative lower cost for guaranteeing packet delivery in comparison with ABVCap routing. Simulations also demonstrate that ABVCap_3D routing ensures a moderate ratio for routing path length to the shortest (ideal) path length. Copyright © 2012 John Wiley & Sons, Ltd.  相似文献   

8.
With their proliferation and increasing capabilities, mobile devices with local wireless interfaces can be organized into delay‐tolerant networks (DTNs) that exploit communication opportunities arising out of the movement of their users. As the mobile devices are usually carried by people, these DTNs can also be viewed as social networks. Unfortunately, most existing routing algorithms for DTNs rely on relatively simple mobility models that rarely consider these social network characteristics, and therefore, the mobility models in these algorithms cannot accurately describe users’ real mobility traces. In this paper, we propose two predict and spread (PreS) message routing algorithms for DTNs. We employ an adapted Markov chain to model a node's mobility pattern and capture its social characteristics. A comparison with state‐of‐the‐art algorithms demonstrates that PreS can yield better performance in terms of delivery ratio and delivery latency, and it can provide a comparable performance with the epidemic routing algorithm with lower resource consumption. Copyright © 2013 John Wiley & Sons, Ltd.  相似文献   

9.
In delay/disruption tolerant networks (DTNs), content distribution is performed leveraging on the transient and dynamic contacts between moving users. Such a best effort mechanism is prone to unbounded downloading delays and bad user experience. To cope with these occurences, this paper introduces a novel mechanism to improve content distribution in DTNs. The proposed mechanism is based on the delay tolerant transport protocol and aims at controlling the diversity in the coded information transmission without increasing the use of network resources or including any feedback messages. In order to validate the proposed mechanism, different scenarios have been evaluated using known DTNs routing protocols. The results show significant gains achieved in terms of delivery ratio in all evaluated scenarios, confirming the efficiency and effectiveness of our protocol independently of the lower layer protocols in use.  相似文献   

10.
Recently, wireless networks have become one of the major development trends in computer network technology. Because there is no more need of the wired transmission medium, applications have thus diversified. One such growing field of wireless networks is the mobile ad‐hoc network (MANET). A MANET consists of mobile hosts (such as portable laptops, vehicles, etc.), and no fixed infrastructure is required. MANETs provide ease of self‐configuration and can extend coverage at a low cost. Numerous applications have therefore been proposed under this network environment for daily life use. Because MANETs nodes are capable of moving, MANET network topology changes frequently. Thus, the traditional routing protocols fail to fit such an environment. In this paper, we propose an efficient routing protocol for MANETs, which integrates the mathematical model of profit optimization (the Kelly formula) from the field of economics to cope with the routing problem caused by node mobility. Some numerical simulations have been conducted to evaluate the performance of the proposed method using the network simulator NS‐2. The results show that our proposed method outperforms conventional routing protocols in packet delivery ratio comparisons; and the average end‐to‐end delays are within a tolerable range. Copyright © 2013 John Wiley & Sons, Ltd.  相似文献   

11.
Rosa  Panayiotis  Christos   《Ad hoc Networks》2007,5(1):87-99
Multipath routing in ad hoc networks increases the resiliency against security attacks of collaborating malicious nodes, by maximizing the number of nodes that an adversary must compromise in order to take control of the communication. In this paper, we identify several attacks that render multipath routing protocols vulnerable to collaborating malicious nodes. We propose an on-demand multipath routing protocol, the secure multipath routing protocol (SecMR), and we analyze its security properties. Finally, through simulations, we evaluate the performance of the SecMR protocol in comparison with existing secure multipath routing protocols.  相似文献   

12.
This paper introduces a collision avoidance slot allocation scheme for Time Division Multiple Access (TDMA) based Medium Access Control (MAC) in multi-cluster wireless sensor networks. TDMA MAC protocols have built-in active-sleep duty cycle that can be leveraged for limiting idle listening. Also, they can overcome the overhearing problem, thus have better energy efficiency. Enabling concurrent intra-cluster communications using a single radio channel is a key issue in TDMA MAC protocols. Using orthogonal frequency channels or different Code Division Multiple Access codes for different adjacent clusters can solve the problem at the expense of cost. In this paper, we propose a new distributed slot allocation protocol called  Coordinated   Time   Slot   Allocation (CTSA) that can reduce collisions significantly using a single radio channel. We use simulations to study the effects of different system parameters on the performance of our proposed protocol. Simulation results show that applying CTSA over clustering protocols can significantly reduce collisions. It also shows fast convergence for our proposed CTSA protocol. In this paper we apply our CTSA scheme to the Low Energy Adaptive Clustering Hierarchy protocol which forms the basis for many cluster based routing protocols. CTSA is also compared with the SRSA algorithm proposed by Wu and Biswas (Wirel Netw 13(5):691–703, 2007) by means of simulation.  相似文献   

13.
With respect to the inherent advantages of multipath routing, nowadays multipath routing is known as an efficient mechanism to provide even network resource utilization and efficient data transmission in different networks. In this context, several multipath routing protocols have been developed over the past years. However, due to the time-varying characteristics of low-power wireless communications and broadcast nature of radio channel, performance benefits of traffic distribution over multiple paths in wireless sensor networks are less obvious. Motivated by the drawbacks of the existing multipath routing protocols, this paper presents an Interference-Minimized MultiPath Routing protocol (IM2PR) which aims to discover a sufficient number of minimum interfering paths with high data transmission quality between each event area and sink node in order to provide efficient event data packet forwarding in event-driven wireless sensor networks. Extensive performance evaluations show that IM2PR presents improvements over the Micro Sensor Multipath Routing Protocol and Energy-Efficient data Routing Protocol as follows: 50 and 70 % in term of packet reception ratio at the sink, 44 and 80 % in term of goodput, 33 and 40 % in term of packet delivery latency, 40 and 57 % in term of energy consumption, 50 and 60 % in term of packet delivery overhead.  相似文献   

14.
Multimedia and real-time applications require bandwidth guarantees, which can be achieved by resource reservation. However, bandwidth reservation in ad-hoc networks is a very challenging task due to the instability of radio channels, node mobility and lack of coordination between mobile nodes. Most proposed reservation protocols focus on point-to-point reservations, and only a few work has been done to propose an efficient end-to-end reservation scheme. In this paper, we propose a reservation scheme called End-to-end reservation scheme for voice and data traffic support (EERV). The basic component of our protocol is a handshake mechanism which has the role to establish point-to-point reservations, and to ensure consistency of reservations between neighbor nodes. Both data and voice sources are allowed to establish reservations with priority given to voice sources. This reservation scheme is extended to support the reservation and release of resources along a path in cooperation with the routing layer. Our reservation scheme is based on DSR, a well-known reactive routing protocol. Mobility of nodes and node failure cause frequent reservation breakages resulting in significant performance degradation. In order to resolve this issue we propose a reservation loss detection and reservation recovery mechanisms. We achieved intensive simulations to evaluate the performance of our protocol. Simulation results show the effectiveness of this protocol.  相似文献   

15.
Traditional single-channel MAC protocols for wireless ad hoc and sensor networks favor energy-efficiency over throughput. More recent multi-channel MAC protocols display higher throughput but less energy efficiency. In this article we propose NAMAC, a negotiator-based multi-channel MAC protocol in which specially designated nodes called negotiators maintain the sleeping and communication schedules of nodes within their communication ranges in static wireless ad hoc and sensor networks. Negotiators facilitate the assignation of channels and coordination of communications windows, thus allowing individual nodes to sleep and save energy. We formally define the problem of finding the optimal set of negotiators (i.e., minimizing the number of selected negotiators while maximizing the coverage of the negotiators) and prove that the problem is NP-Complete. Accordingly, we propose a greedy negotiator-election algorithm as part of NAMAC. In addition, we prove the correctness of NAMAC through a rigorous model checking and analyze various characteristics of NAMAC—the throughput of NAMAC, impact of negotiators on network capacity, and storage and computational overhead. Simulation results show that NAMAC, at high network loads, consumes 36 % less energy while providing 25 % more throughput than comparable state-of-art multi-channel MAC protocols for ad hoc networks. Additionally, we propose a lightweight version of NAMAC and show that it outperforms (55 % higher throughput with 36 % less energy) state-of-art MAC protocols for wireless sensor networks.  相似文献   

16.
Disruption tolerant network (DTN) is characterized by frequent partitions and intermittent connectivity. Power management issue in such networks is challenging. Existing power management schemes for wireless networks cannot be directly applied to DTNs because they assume the networks are well-connected. Since the network connectivity opportunities are rare, any power management scheme deployed in DTNs should not worsen the existing network connectivity. In this paper, we design a power management scheme called context-aware power management scheme (CAPM) for DTNs. Our CAPM scheme has an adaptive on period feature that allows it to achieve high delivery ratio and low delivery latency when used with Prophet, a recently proposed DTN routing scheme. Via simulations, we evaluate the performance of the CAPM scheme when used with the Prophet routing scheme in different scenarios e.g. different traffic load, node speeds and sleep patterns. Our evaluation results indicate that the CAPM scheme is very promising in providing energy saving (as high as 80%) without degrading much the data delivery performance.  相似文献   

17.
We propose and analyze a class of integrated social and quality of service (QoS) trust-based routing protocols in mobile ad-hoc delay tolerant networks. The underlying idea is to incorporate trust evaluation in the routing protocol, considering not only QoS trust properties but also social trust properties to evaluate other nodes encountered. We prove that our protocol is resilient against bad-mouthing, good-mouthing and whitewashing attacks performed by malicious nodes. By utilizing a stochastic Petri net model describing a delay tolerant network consisting of heterogeneous mobile nodes with vastly different social and networking behaviors, we analyze the performance characteristics of trust-based routing protocols in terms of message delivery ratio, message delay, and message overhead against connectivity-based, epidemic and PROPHET routing protocols. The results indicate that our trust-based routing protocols outperform PROPHET and can approach the ideal performance obtainable by epidemic routing in delivery ratio and message delay, without incurring high message overhead. Further, integrated social and QoS trust-based protocols can effectively trade off message delay for a significant gain in message delivery ratio and message overhead over traditional connectivity-based routing protocols.  相似文献   

18.
Delay Tolerant Networks (DTNs) provide a communications infrastructure for environments lacking continuous connectivity. Such networks rely on the mobility of nodes and the resulting opportunistic connections to carry messages from source to destination. Unfortunately, exchanging packets with an arbitrary intermediary node makes privacy difficult to achieve in these systems as any adversary can easily act as an intermediary and determine the sender and receiver of a message. In this paper, we present ARDEN, an anonymous communication mechanism for DTNs based on a modified onion routing architecture. Instead of selecting specific nodes through which messages must pass as is traditionally done in onion routing, ARDEN uses Attribute-Based Encryption (ABE) to specify and manage groups that may decrypt and forward messages. Through simulation, we show that this approach not only increases throughput and reduces end-to-end latency over traditional onion routing techniques, but also adds minimal overhead when compared to DTN routing protocols that do not provide anonymity guarantees. Through this, we show that ARDEN is an effective solution for anonymous communication in intermittently connected networks such as DTNs.  相似文献   

19.
Traffic engineering aims to distribute traffic so as to "optimize" some performance criterion. This optimal distribution of traffic depends on both the routing protocol and the forwarding mechanisms in use in the network. In IP networks running the OSPF or IS-IS protocols, routing is over shortest paths, and forwarding mechanisms distribute traffic "uniformly" over equal cost shortest paths. These constraints often make achieving an optimal distribution of traffic impossible. In this paper, we propose and evaluate an approach that can realize near optimal traffic distribution without changes to routing protocols and forwarding mechanisms. In addition, we explore the tradeoff that exists between performance and the configuration overhead that our solution requires. The paper's contributions are in formulating and evaluating an approach to traffic engineering in IP networks that achieves near-optimal performance while preserving the existing infrastructure.  相似文献   

20.
To efficiently support tetherless applications in ad hoc wireless mobile computing networks, a judicious ad hoc routing protocol is needed. Much research has been done on designing ad hoc routing protocols and some well-known protocols are also being implemented in practical situations. However; one major imperfection in existing protocols is that the time-varying nature of the wireless channels among the mobile-terminals is ignored; let alone exploited. This could be a severe design drawback because the varying channel quality can lead to very poor overall route quality in turn, resulting in low data throughput. Indeed, better performance could be achieved if a routing protocol dynamically changes the routes according to the channel conditions. In this paper, we first propose two channel adaptive routing protocols which work by using an adaptive channel coding and modulation scheme that allows a mobile terminal to dynamically adjust the data throughput via changing the amount of error protection incorporated. We then present a qualitative and quantitative comparison of the two classes of ad hoc routing protocols. Extensive simulation results indicate that channel adaptive ad hoc routing protocols are more efficient in that shorter delays and higher rates are achieved, at the expense of a higher overhead in route set-up and maintenance.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号