首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
Atomic commit protocols for distributed transactions in mobile ad-hoc networks have to consider message delays and network failures. We consider ad-hoc network scenarios, in which participants hold embedded databases and offer services to other participants. Services that are composed of several other services can access and manipulate data of physically different databases. In such a scenario, distributed transaction processing can be used to guarantee atomicity and serializability throughout all databases. However, with problems like message loss, node failure, and network partitioning, mobile environments make it hard to get estimations on the duration of a simple message exchange. In this article, we focus on the problem of setting up reasonable time-outs when guaranteeing atomicity for transaction processing within mobile ad-hoc networks, and we show the effect of setting up “wrong” time-outs on the transaction throughput and blocking time. Our solution, which does not depend on time-outs, shows a better performance in unreliable networks and remarkably reduces the amount of blocking.  相似文献   

2.
A general protocol for atomic broadcast in networks is presented. The protocol tolerates loss, duplication, reordering, delay of messages, and network partitioning in an arbitrary network of fail-stop sites (i.e. no Byzantine site behavior is tolerated). The protocol is based on majority-concensus decisions to commit on unique ordering of received broadcast messages. Under normal operating conditions, the protocol requires three phases to complete and approximately 4N/V messages where N is the number of sites. This overhead is distributed among the messages of which the delivery decision is made and the heavier the broadcast message traffic, the lower the overhead per broadcast message becomes. Under abnormal operating conditions, a decentralized termination protocol (also presented) is invoked. A performance analysis of this protocol is presented, showing that this protocol commits with high probability under realistic operating conditions without invoking termination protocol if N is sufficiently large. The protocol retains its efficiency in wide-area networks where broadcast communication media are unavailable  相似文献   

3.
ABSTRACT

A mobile ad-hoc network (MANET) is an autonomous system of mobile nodes connected by wireless links in which nodes cooperate by forwarding packets for each other thereby enabling communication beyond direct wireless transmission range. Example applications include battlefield communication, disaster recovery operations, and mobile conferencing. The dynamic nature of ad-hoc networks makes them more vulnerable to security attacks compared with fixed networks. Providing security in mobile ad-hoc networks has been a major issue in recent years. Most of the secure routing protocols proposed by researchers need a centralized authority or a trusted third party to provide authentication. This destroys the self-organizing nature of ad-hoc networks. Black Hole attack is one of the routing attacks that occur in MANETs. In this attack, a malicious node uses the routing protocol to advertise itself as having the shortest path to the node whose packets it wants to intercept. In this article, we propose an enhanced certificate based authentication mechanism, where nodes authenticate each other by issuing certificates to neighboring nodes and generating public key without the need of any online centralized authority. The proposed scheme uses Multicast Ad-hoc On Demand Distance Vector Routing (MAODV) protocol as a support for certification. The effectiveness of our mechanism is illustrated by simulations conducted using network simulator ns-2.  相似文献   

4.
A formal model for atomic commit protocols for a distributed database system is introduced. The model is used to prove existence results about resilient protocols for site failures that do not partition the network and then for partitioned networks. For site failures, a pessimistic recovery technique, called independent recovery, is introduced and the class of failures for which resilient protocols exist is identified. For partitioned networks, two cases are studied: the pessimistic case in which messages are lost, and the optimistic case in which no messages are lost. In all cases, fundamental limitations on the resiliency of protocols are derived.  相似文献   

5.
为提高间歇性连接移动网络的消息发送效率,提出一种基于移动自组网OLSR协议的自适应路由协议ARPBO。ARPBO在网络连通时通过OLSR协议快速转发消息;在网络中断时对OLSR协议进行扩展,从消息发送节点的局部连通网络中有效选择下一跳节点,然后通过延迟容忍网络的"存储-携带-转发"机制转发消息。实验结果表明,该路由协议能够在网络存在间歇性连接时获得较高的传递成功率和较低的传递时延。  相似文献   

6.
A mobile Ad-Hoc networks (MANETs) is a continuously self-configuring, infrastructure-less network of wireless mobile devices. In which multicast is one of the efficient way of communication. Currently, several research have been conducted to design multicast routing protocols for wireless mobile ad-hoc networks (MANETs). Multicasting is a technique that allow to send the same message to a group of destinations simultaneously. However, it faces several challenges against its implementation in ad-hoc network due to its dynamic nature, lack of bandwidth, short battery lifetime of the mobile devices. The multicast routing protocol MAODV have several constraints as mentioned above. Hence to address these constraints a reliable neighbour nodes selection scheme has been integrated over MAODV. This paper attempt a Quality of Service (QoS) based multicast routing protocol using reliable neighbour nodes selection scheme (QMRPRNS) for same. The simulation has been conducted to compare the performance of the proposed scheme against some existing multicast routing protocols which shows significant improvement over EMAODV and MAODV.  相似文献   

7.
Routing for wireless sensor networks based on gradient is a simple, reliable solution resulting in low information costs for the network package, as well as for the node itself. It is used for convergent traffic, where sensor nodes send messages to the sink node. Due to message transmission failures inherent to wireless sensor networks, researches in this area agree that point-to-point message confirmation in these networks is essential. This work proposes solutions for gradient-based routing using a confirmation mechanism for different neighbors, where four protocol variations are evaluated for sensor networks applications in order to monitor and control electrical variables. Results demonstrate that the protocol based on the longest distance has a satisfactory package delivery rate in severe conditions specified to the application. Furthermore, results show in which situations each routing protocol variation better suits the target application.  相似文献   

8.
移动实时提交协议的恢复处理与通信分析   总被引:2,自引:0,他引:2  
三层实时提交协议(3LRTC)是为支持事务移动性、断接性、实时性及功能替代性等设计的一种移动实时提交协议,该协议能保证移动分布式实时事务放松原子性和结构正确性。该文在分析移动实时事务各参与者提交状态变化的基础上,讨论了3LRTC在发生场地故障和断接时的恢复处理方式,以保证故障发生后数据库能恢复到一个正确的状态。该文还对3LRTC的通信代价进行了分析与比较,结果表明,三层提交结构能减少移动实时事务的通信消息数。  相似文献   

9.
Understanding nodes mobility is of fundamental importance for data delivery in opportunistic and intermittently connected networks referred to as Delay Tolerant Networks (DTNs). The analysis of such mobility patterns and the understanding of how mobile nodes interact play a critical role when designing new routing protocols for DTNs. The Cultural Greedy Ant (CGrAnt) protocol is a hybrid Swarm Intelligence-based approach designed to address the routing problem in such dynamic and complex environment. CGrAnt is based on: (1) Cultural Algorithms (CA) and Ant Colony Optimization (ACO) and (2) operational metrics that characterize the opportunistic social connectivity between wireless users. The most promising message forwarders are selected via a greedy transition rule based mainly on local information captured from the DTN environment. Whenever global information is available, it can also be used to support decisions. We compare the performance of CGrAnt with Epidemic, PROPHET, and dLife protocols in two different mobility scenarios under varying networking parameters. Results obtained by the ONE simulator show that CGrAnt achieves a higher message delivery and lower message redundancy than the three protocols in both scenarios. The only exception is in one of the scenarios, when messages have a time to live lower than 900 min, where CGrAnt delivers a bit less messages than dLife, although with a lower message redundancy.  相似文献   

10.
移动Ad Hoc网络的可靠多播路由协议   总被引:2,自引:0,他引:2  
孙宝林  李腊元  徐巍 《计算机应用》2004,24(10):43-45,49
在移动Ad Hoc网络环境中,分组的重传和路由的重构比有线网络更频繁。在网络多播树变化的情况下提供高的分组传输率是移动Ad Hoc网络多播路由的主要难题。文中提出了一种基于协议转接概念的移动Ad Hoc网络的可靠多播路由协议(RMRP),该协议较好地减少了移动Ad Hoc网络中大量的路由重构和数据分组的重传。仿真实验显示RMRP具有较高的传输率和较低的端到端分组延迟。  相似文献   

11.
Delay-tolerant Networking (DTN) can enable ad-hoc communication within (sparse) mobile user communities and multi-hop Internet access where IP-based end-to-end communication would fail. DTN message forwarding in ad-hoc networks may lead to message replication and messages remaining stored on several nodes for some time. We leverage these characteristics and provide application support in intermediate nodes: we enable them to understand the resources contained in forwarded and locally stored DTN messages to perform application-specific processing. Based upon this, we create an opportunistic distributed storage for cooperative content caching and retrieval using the nodes’ buffers.  相似文献   

12.
Routing protocols for Mobile ad hoc networks (MANETs) have been studied extensively in the past decade. Routing protocols for MANETs can be broadly classified as reactive (on-demand), proactive, hybrid and position-based. Reactive routing protocols are attractive because a route between a source and a destination is established only when it is needed. Such protocols, unlike proactive protocols, do not have high overhead for route maintenance and are especially suitable for networks in which not all nodes communicate frequently. One problem with existing reactive routing protocols is the propagation of redundant route request messages during route discovery. In this paper, we present a low-overhead reactive routing protocol which reduces propagation of redundant route request messages. We also compare its performance with the well-known reactive routing protocol AODV.  相似文献   

13.
The two phase commit is an important protocol in distributed database systems. Much of the existing literature on the protocol is restricted to discussing and analyzing the protocol (and its variants) in the absence of failures. Very little, especially in quantitative terms, has been written about its performance in the presence of site failures. In this study, we use a simulation testbed of a distributed database system to quantify the differences in the performances of four widely known variants of the 2PC protocols (the generic 2PC, presumed commit, presumed abort, and early prepare). Our study covers both the no-failure case and the case of site failures. We present a number of interesting results based on our experiments. One is that the performance of these protocols is highly dependent on the message-processing latency at the transaction coordinator site. Another is that the presumed abort protocol does not necessarily yield better performance in the presence of site failures.  相似文献   

14.
使用发布订阅中间件支持移动计算   总被引:2,自引:0,他引:2  
提出了一个扩展发布订阅中间件以支持移动计算的新协议.该协议针对移动计算的需求,由老的事件代理暂存客户移动期间到达的消息,客户在连接到新的事件代理后,消息被自动有序发送给客户,保证了移动透明性.此外协议采用同步算法和消息合并操作防止了消息丢失和重复.移动客户可以在不同的地域与不同的事件代理节点连接和可靠接收消息.实验表明谈协议完全满足移动应用的要求,保证了应用的透明性、消息完整性和有序性.  相似文献   

15.
Designing secure protocols over ad-hoc networks has proved to be a very challenging task, due to various features of such networks, such as partial connectivity, node mobility, and resource constraints. Furthermore, their lack of physical infrastructures deprives their users of even basic network functions such as message routing, for which nodes are themselves responsible.In this paper we consider a very basic network function, node discovery, in ad-hoc networks, where a node with limited network information would like to establish a session with a given number of other nodes in the network (of which the node may not be aware about). We formally define correctness, security and efficiency properties of node discovery protocols, and investigate the problem of designing such protocols under appropriate network topology assumptions. Here, the security of these protocols is against Byzantine adversaries that can corrupt up to a limited number of nodes in the network and make them arbitrarily deviate from their protocol. After presenting some secure node discovery protocols, we show their application to secure service architectures in ad-hoc networks.  相似文献   

16.
In this paper we propose a new protocol for reliable multicast in a multihop mobile radio network. The protocol is reliable, i.e., it guarantees message delivery to all multicast nodes even when the topology of the network changes during multicasting. The proposed protocol uses a core-based shared tree. The multicast tree may get fragmented due to node movements. The notion of a forwarding region is introduced which is used to glue together fragments of multicast trees. The gluing process involves flooding the forwarding region of only those nodes that witness topology change due to node mobility. Delivery of multicast messages to mobile nodes is expedited through (i) pushing the message by witness nodes in their forwarding regions and (ii) pulling messages by a mobile node during (re)joining process. Hence, the protocol conserves network bandwidth by using a combination of the push–pull approach and by restricting flooding only to the essential parts of the network that are affected by topology change.  We develop a theoretical model to compute the probability of packet loss (as a function of the mobility rate) for our proposed scheme compared to the the core-based tree protocol (CBT); we also evaluate the effectiveness of forwarding regions as compared to traditional flooding. Our analysis shows that the proposed scheme significantly outperforms CBT.  相似文献   

17.
Recent research in the emerging field of cognitive radio (CR) has mainly focussed on spectrum sensing and sharing, that allow an opportunistic use of the vacant portions of the licensed frequency bands by the CR users. Efficiently leveraging this node level channel information in order to provide timely end-to-end delivery over the network is a key concern for CR based routing protocols. In addition, the primary users (PUs) of the licensed band affect the channels to varying extents, depending on the proportion of the transmission power that gets leaked into the adjacent channels. This also affects the geographical region, in which, the channel is rendered unusable for the CR users. In this paper, a geographic forwarding based SpEctrum Aware Routing protocol for Cognitive ad-Hoc networks (SEARCH), is proposed that (i) jointly undertakes path and channel selection to avoid regions of PU activity during route formation, (ii) adapts to the newly discovered and lost spectrum opportunity during route operation, and (iii) considers various cases of node mobility in a distributed environment by predictive Kalman filtering. Specifically, the optimal paths found by geographic forwarding on each channel are combined at the destination with an aim to minimize the hop count. By binding the route to regions found free of PU activity, rather than particular CR users, the effect of the PU activity is mitigated. To the best of our knowledge, SEARCH takes the first steps towards a completely decentralized, CR routing protocol for mobile ad-hoc networks and our approach is thoroughly evaluated through analytical formulations and simulation study.  相似文献   

18.
Routing protocols in delay tolerant networks usually utilize multiple message copies to guarantee the message delivery, in order to overcome unpredictable node mobility and easily-interrupted connections. A store-carry-and-forward paradigm was also proposed to further improve the message delivery. However, excessive message copies lead to the shortage of buffer and bandwidth. The spray and wait routing protocol has been proposed to reduce the network overload caused by the buffer and transmission of unrestricted message copies. However, when a node’s buffer is quite constrained, there still exist congestion problems. In this paper, we propose a message scheduling and drop strategy on spray and wait routing protocol (SDSRP). To improve the delivery ratio, first of all, SDSRP calculates the priority of each message by evaluating the impact of both replicating and dropping a message copy on delivery ratio. Subsequently, scheduling and drop decisions are made according to the priority. In order to further increase delivery ratio, we propose an improved message scheduling and drop strategy on spray and wait routing protocol (ISDSRP) through enhancing the accuracy of estimating parameters. Finally, we conduct extensive simulations based on synthetic and real traces in ONE. The results show that compared with other buffer management strategies, ISDSRP and SDSRP achieve higher delivery ratio, similar average hopcounts, and lower overhead ratio.  相似文献   

19.
一种Ad Hoc网络中安全的网格路由协议   总被引:1,自引:0,他引:1  
陈晶  崔国华  杨木祥  粟栗 《计算机学报》2006,29(9):1648-1656
在大而密集的移动Ad Hoc网络环境下,基于位置的路由协议使用位置信息进行报文的转发,在性能方面明显优于基于拓扑图的路由协议.现在虽然研究Ad Hoc中安全路由协议的文章很多,但是却很少有人考虑到基于位置的路由协议的安全性.该文在网格定位服务(Grid Location Service,GLS)的基础上,提出了安全的网格路由协议(Secure Grid Routing Protocol,SGRP).SGRP补充了TESLA方案,添加了新节点加入网络的认证过程,以适应Ad Hoc网络高移动性和高灵活性的特点,从而可以有效地抵御外部节点的攻击.为了清晰表述SGRP处理报文的流程,文章使用形式语言自动机进行描述,并对其中关键的认证过程做了形式化分析.SGRP还提出了一种信誉系统,使得节点可以通过综合的信誉信息,限制内部背叛节点的恶意行为.最后的仿真结果显示,当有中断攻击节点存在的情况下,SGRP有效地孤立了攻击节点,性能上优于GLS.  相似文献   

20.
袁勇  邹力鹍 《计算机工程》2011,37(9):124-126,129
为提高多播协议的可扩展性,提出一个基于分群的高效多播路由协议(ECMRP)。采用改进的基于权重的分群算法对移动自组网中的移动节点进行分层管理,并应用软状态方法在群首间建立多播树,减小当网络拓扑结构动态变化时重构、维护多播树结构的控制开销。仿真实验结果表明,该算法在路由开销和分组投递率上均优于多播按需距离矢量和按需多播路由协议,更适合于高动态、大规模的自组网。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号