首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
Service discovery can be greatly enhanced in terms of efficiency, both regarding service discoverability and energy consumption, by piggybacking service information into routing messages. Thus, service discovery does not generate additional messages and a node requesting a service, in addition to discovering that service, it is simultaneously informed of the route to the service provider. We extended the Zone Routing Protocol in order to encapsulate service information in its routing messages. Our extended protocol, E‐ZRP, may be seen as a representative of routing layer protocols providing service discovery functionality. Simulations demonstrate the superiority of this routing layer‐based service discovery scheme over that of a similar, but application layer based service discovery scheme. In order to have a thorough evaluation of our approach we introduced a new metric, called Service Availability Duration (SAD), which characterizes the ‘quality’ of discovered services and experimentally examines the implications of network density and node mobility on the availability of services discovered with E‐ZRP, as a typical representative of routing layer based service discovery protocols. Copyright © 2008 John Wiley & Sons, Ltd.  相似文献   

2.
Location-based routing protocols are stateless since they rely on position information in forwarding decisions. However, their efficiency depends on performance of location services which provide the position information of the desired destination node. Several location service schemes have been proposed, but the most promising among them, hierarchical hashing-based protocols, rely on intuitive design in the published solutions. In this paper, we provide full analysis of the efficiency of routing in hierarchical hashing-based protocols as a function of the placement of the routers. Based on the theoretical analysis of the gain and costs of the query and reply routing, we propose a novel location service protocol that optimizes the distance traveled by the location update and query packets and, thus, reduces the overall energy cost. These gains are further increased in the second presented protocol by the optimal location of servers that we established through analysis of geometrical relationships between nodes and location servers. Simulation results demonstrate that the proposed protocols achieve around 30–35% energy efficiency while improving or maintaining the query success rate in comparison to the previously proposed algorithms.  相似文献   

3.
Mobile ad hoc network (MANET) is a group of mobile nodes which communicates with each other without any supporting infrastructure. Routing in MANET is extremely challenging because of MANETs dynamic features, its limited bandwidth and power energy. Nature-inspired algorithms (swarm intelligence) such as ant colony optimization (ACO) algorithms have shown to be a good technique for developing routing algorithms for MANETs. Swarm intelligence is a computational intelligence technique that involves collective behavior of autonomous agents that locally interact with each other in a distributed environment to solve a given problem in the hope of finding a global solution to the problem. In this paper, we propose a hybrid routing algorithm for MANETs based on ACO and zone routing framework of bordercasting. The algorithm, HOPNET, based on ants hopping from one zone to the next, consists of the local proactive route discovery within a node’s neighborhood and reactive communication between the neighborhoods. The algorithm has features extracted from ZRP and DSR protocols and is simulated on GlomoSim and is compared to AODV routing protocol. The algorithm is also compared to the well known hybrid routing algorithm, AntHocNet, which is not based on zone routing framework. Results indicate that HOPNET is highly scalable for large networks compared to AntHocNet. The results also indicate that the selection of the zone radius has considerable impact on the delivery packet ratio and HOPNET performs significantly better than AntHocNet for high and low mobility. The algorithm has been compared to random way point model and random drunken model and the results show the efficiency and inefficiency of bordercasting. Finally, HOPNET is compared to ZRP and the strength of nature-inspired algorithm is shown.  相似文献   

4.
Service discovery is indispensable to ad hoc networking where establishing a stand-alone and self-configurable communication environment is the main objective. In this paper, we first discuss possible service discovery architectures along with the required network support for their implementation in mobile ad hoc networks. We then propose a distributed service discovery architecture that relies on a virtual backbone for locating and registering available services within a dynamic network topology. Our proposal consists of two independent components: (i) formation of a virtual backbone and (ii) distribution of service registrations, requests, and replies. The first component creates a mesh structure from a subset of a given network graph that includes the nodes acting as service brokers and also a subset of paths (which we refer to as virtual links) connecting them. Service broker nodes (SBNs) constitute a dominating set, i.e. all the nodes in the network are either in this set or only one-hop away from at least one member of the set. The second component establishes sub-trees rooted at service requesting nodes and registering servers for efficient dissemination of the service discovery control messages. Extensive simulation results are provided for comparison of performance measures, i.e. latency, success rate, and control message overhead, when different architectures and network support mechanisms are utilized in service discovery.  相似文献   

5.
Mobile adhoc network is dynamic in nature and it operates completely in an infrastructure-less environment. It discovers the way routes dynamically to reach the destination. Securing a dynamic way route, which is not known before establishing communication, is always a challenge in the mobile ad hoc network. Most of the existing secure routing protocols target to evade specific type of attacks or malicious behaviour of the nodes or networks. We propose a novel secure way routing protocol for securing the dynamic way routes in MANET. It provides a unique session key for each route to secure the data communication. Moreover, it authenticates the data packets using asymmetric cryptography and secures the routing field message using two-way asymmetric cryptography. The proposal is implemented and tested for assessing the protocol’s performance. We have also compared the protocol with the other secure routing protocols for evaluating its performance.  相似文献   

6.
The conservative nature of the 802.11 channel access scheme has instigated extensive research whose goal is to improve the spatial reuse and/or energy consumption of a mobile ad hoc network. Transmission power control (TPC) was shown to be effective in achieving this goal. Despite their demonstrated performance gains, previously proposed power-controlled channel access protocols often incur extra hardware cost (e.g., require multiple transceivers). Furthermore, they do not fully exploit the potential of power control due to the heuristic nature of power allocation. In this paper, we propose a distributed, single-channel MAC protocol (GMAC) that is inspired by game theory. In GMAC, each transmitter computes a utility function that maximizes the link’s achievable throughput. The utility function includes a pricing factor that accounts for energy consumption. GMAC allows multiple potential transmitters to contend through an admission phase that enables them to determine the transmission powers that achieve the Nash equilibrium (NE). Simulation results indicate that GMAC significantly improves the network throughput over the 802.11 scheme and over another single-channel power-controlled MAC protocol (POWMAC). These gains are achieved at no extra energy cost. Our results also indicate that GMAC performs best under high node densities and large data packet sizes.  相似文献   

7.
In hybrid ad hoc networks, mobile nodes can communicate not only with each other in a self-organizing manner, but also with nodes on wired networks for extensive information retrieval and dissemination. In this article we consider efficient routing operations between any two nodes in an ad hoc network that is linked to wired networks by an access point. To build routes with low routing overhead efficiently, we develop a new routing scheme of region-based routing (RBR), which utilizes hop counts between mobile nodes and the access point to localize a route discovery within a limited topological region. Limiting the region of route discovery results in fewer routing messages and therefore reduces routing overhead. Simulation results show that the RBR scheme greatly reduces routing overhead while preserving a high rate of success for route discovery to the destination  相似文献   

8.
OLSR performance measurement in a military mobile ad hoc network   总被引:2,自引:0,他引:2  
Wireless ad hoc networks are autonomous, self-configurating and adaptive. Thus, such networks are excellent candidates for military tactical networks, where their ability to be operational rapidly and without any centralized entity is essential. As radio coverage is usually limited, multihop routing is often needed; this is achieved by an ad hoc routing protocol supporting nodes mobility. In this paper, we present performance measurements of the Optimized Link State Routing (OLSR) routing protocol, having the status of IETF RFC. The measurements are performed at CELAR site on a platform representative of military scenarios in urban areas. This platform consists of ten routers, eight PDAs and laptops using a IEEE 802.11b radio interface and implementing OLSR v7. Some nodes are mobile within vehicles. The emphasis of the measurements is on the performance of the network (route repair, network convergence speed, user traffic performance) in presence of this mobility.  相似文献   

9.
移动自组织网络中基于优化分簇的混合路由协议   总被引:2,自引:0,他引:2  
牛晓光  崔莉  黄长城 《通信学报》2010,31(10):58-67
针对移动自组织网络中分簇路由协议的特点,对不同尺寸簇的稳定性、维护开销等特性进行了分析,设计了保证网络性能最优的优化分簇策略,并在此基础上首次提出了基于优化分簇的混合分层路由协议(HOCR).仿真实验结果表明,该协议明显提高了路径寻径效率和网络的健壮性,减少了网络维护开销,并且实现简单,特别适用于移动性较强、网络负荷较重的大规模移动自组网.  相似文献   

10.
This paper presents an efficient route recovery approach for a collaborative mobile ad hoc network (MANET). In the collaborative MANET, the movement of a node can be controlled by other nodes. Based on the property of the controllable movement, each active node (each node on a route) can be protected by its neighboring nodes. When the movement of an active node causes a link breakage on a route, its neighboring nodes compete with each other to move to the original location of the moving active node. Using the movements of neighboring nodes, the proposed approach can achieve route recovery without pre‐establishing or dynamically finding backup routes. The proposed approach also has much less recovery overhead than previous approaches because of the local recovery. Finally, we perform extensive simulations to compare the proposed approach with previous approaches. The simulation results show that the proposed approach has better recovery performance under dense and sparse MANET architectures. Copyright © 2010 John Wiley & Sons, Ltd.  相似文献   

11.
The paper proposes a dynamic and hierarchical IPv6 address configuration scheme for a mobile ad hoc network (MANET). The scheme proposes the hierarchical architecture and combines the distributed and centralized address configuration approaches. In the architecture, a central node assigns IPv6 addresses for cluster heads that are distributed around a MANET, and distributed cluster heads assign IPv6 addresses for cluster members. The generation algorithm of a cluster is proposed, and it uses the number of potential cluster members as a measurement unit and minimizes the number of cluster heads. Therefore, the address configuration cost for cluster heads is reduced. A central node/cluster head uses the unicast communication mode to achieve the real‐time address recovery in order to ensure that it has enough address resources for assignment. The paper also proposes the low‐cost MANET merging/partitioning algorithm that guarantees that no address collision happens during the MANET merging/partitioning process. This paper analyzes the performance parameters of the proposed scheme, including the address configuration cost, the address configuration delay, and the number of MANET merging. The analytical results show that the proposed scheme effectively reduces the address configuration cost, shortens the address configuration delay, and decreases the number of MANET merging. Copyright © 2013 John Wiley & Sons, Ltd.  相似文献   

12.
While most previous studies on mobile ad hoc networks (MANETs) rely on the assumption that nodes are randomly distributed in the network coverage area, this assumption is unlikely to hold, as nodes tend to be cluttered around hot spots like the site of an accident or disaster. We refer to this as a clustered layout. Intuitively, a MANET with the clustered layout may suffer from serious performance degradation due to the excessive collisions in congested hot spots and space underutilization of sparse areas. In this paper, we propose a power-controlled network protocol, called the power-stepped protocol (PSP), that maximizes the spatial utilization of limited channel bandwidth. Using a number of discrete power levels available for the underlying wireless network hardware, PSP finds the appropriate power level for each node in a distributed and a coordinated manner without causing any serious problem at the medium access control and network routing layers. A unique feature of this approach is the use the chosen radio power for both data and control packets, and thus, it requires neither any special mechanism (e.g., a separate control channel) nor frequent power adjustments. Our extensive ns-2-based simulation results have shown the proposed PSP provides excellent performance in terms of packet delivery ratio and delay, as well as the network capacity.  相似文献   

13.
Due to the salient characteristics such as the time-varying and error-prone wireless links, the dynamic and limited bandwidth, the time-varying traffic pattern and user locations, and the energy constraints, it is a challenging task to efficiently support heterogeneous traffic with different quality of service (CoS) requirements in multihop mobile ad hoc networks. In the last few years, many channel-dependent mechanisms are proposed to address this issue based on the cross-layer design philosophy. However, a lot of problems remain before more efficient solutions are found. One of the problems is how to alleviate the conflict between throughput and fairness for different prioritized traffic, especially how to avoid the bandwidth starvation problem for low-priority traffic when the high-priority traffic load is very high. In this paper, we propose a novel scheme named Courtesy Piggybacking to address this problem. With the recognition of interlayer coupling, our Courtesy Piggybacking scheme exploits the channel dynamics and stochastic traffic features to alleviate the conflict. The basic idea is to let the high-priority traffic help the low-priority traffic by sharing unused residual bandwidth with courtesy. Another noteworthy feature of the proposed scheme is its implementation simplicity: The scheme is easy to implement and is applicable in networks using either reservation-based or contention-based MAC protocols.  相似文献   

14.
Wireless ad-hoc networks are infrastructureless networks that comprise wireless mobile nodes able to communicate each other outside wireless transmission range. Due to frequent network topology changes in one hand and the limited underlying bandwidth in the other hand, routing becomes a challenging task. In this paper we present a novel routing algorithm devoted for mobile ad hoc networks. It entails both reactive and proactive components. More precisely, the algorithm is based on ant general behavior, but differs from the classic ant methods inspired from Ant-Colony-Optimization algorithm [1]. We do not use, during the reactive phase, a broadcasting technique that exponentially increases the routing overhead, but we introduce a new reactive route discovery technique that considerably reduces the communication overhead. In the simulation results, we show that our protocol can outperform both Ad hoc On-demand Distance Vector (AODV) protocol [2], one of the most important current state-of-the-art algorithms, and AntHocNet protocol [5], one of the most important ant-based routing algorithms, in terms of end-to-end delay, packet delivery ratio and the communication overhead.  相似文献   

15.
Understanding network traffic behaviour is crucial for managing and securing computer networks. One important technique is to mine frequent patterns or association rules from analysed traffic data. On the one hand, association rule mining usually generates a huge number of patterns and rules, many of them meaningless or user‐unwanted; on the other hand, association rule mining can miss some necessary knowledge if it does not consider the hierarchy relationships in the network traffic data. Aiming to address such issues, this paper proposes a hybrid association rule mining method for characterizing network traffic behaviour. Rather than frequent patterns, the proposed method generates non‐similar closed frequent patterns from network traffic data, which can significantly reduce the number of patterns. This method also proposes to derive new attributes from the original data to discover novel knowledge according to hierarchy relationships in network traffic data and user interests. Experiments performed on real network traffic data show that the proposed method is promising and can be used in real applications. Copyright © 2013 John Wiley & Sons, Ltd.  相似文献   

16.
为了有效区分移动自组网中由于网络拥塞、路由切换和链路错误引起的丢包,通过模糊计算的综合评判模型,在发送端综合端到端往返延时、短期的吞吐量以及乱序数据包3个网络观测参数进行判断。仿真结果表明智能丢包区分算法对丢包原因的判断取得了较好的效果。基于该智能丢包区分算法的TCP改进方案TCP-Fuzzy,能够根据判断出的丢包原因采取恰当的拥塞控制策略,在各种不同的网络环境下都有较好的性能表现。  相似文献   

17.
肖阳  白磊  王仙 《通信学报》2015,36(Z1):203-214
从如何有效检测移动ad hoc网络路由入侵行为、如何准确地响应并将恶意路由节点移除网络,提供可信路由环境的角度进行分析,提出了一种基于朋友机制的轻量级移动ad hoc网络入侵检测模型,并以典型的黑洞攻击为例,通过OPNET网络建模仿真及实验分析,验证了该模型的可行性和有效性。  相似文献   

18.
张绍英 《电讯技术》2019,59(7):792-797
引入数字多波束技术可以使移动自组织网络的信道容量得到有效提升,然而,时间、频率、空间、用户、功率等多维度资源域的统一调度与跨层联合优化使得信道接入机制的分析与设计变得更加复杂。为此,结合多波束的特性,将波束宽度限制、收发限制、通道限制、功率限制等多种约束条件抽象图论问题,并建立分析模型。基于分析模型,进一步提出了MB-MAC(Multi-beam Medium Access Control)信道接入机制,结合物理层的预编码技术,建立定向链路的队列模型,度量用户的满意度(Quality of Experience,QoE),设计了适用于自组织网络中多用户并发并收的信道接入机制,兼顾了网络容量和用户满意度。仿真结果表明,MB-MAC机制能在保证各个用户满意度的情况下,有效提升网络吞吐率。  相似文献   

19.
Ling  Hao  Yang  Siqian 《Wireless Networks》2019,25(7):4247-4258
Wireless Networks - Neighbor discovery is the cornerstone of the mobile social applications over mobile ad hoc networks. Most current neighbor discovery protocols adopt a carefully designed...  相似文献   

20.
ATCP: TCP for mobile ad hoc networks   总被引:23,自引:0,他引:23  
Transport connections set up in wireless ad hoc networks are plagued by problems such as high bit error rates, frequent route changes, and partitions. If we run the transmission control protocol (TCP) over such connections, the throughput of the connection is observed to be extremely poor because TCP treats lost or delayed acknowledgments as congestion. We present an approach where we implement a thin layer between Internet protocol and standard TCP that corrects these problems and maintains high end-to-end TCP throughput. We have implemented our protocol in FreeBSD, and we present results from extensive experimentation done in an ad hoc network. We show that our solution improves the TCP's throughput by a factor of 2-3  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号