(3.210.184.142) 您好!臺灣時間:2021/05/12 04:05
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果

詳目顯示:::

我願授權國圖
: 
twitterline
研究生:林峻廷
研究生(外文):Chun-Ting Lin
論文名稱:在隨意網路下尋找穩定能量路徑之協定
論文名稱(外文):A Stable-Path Routing Protocol Based on Energy-Aware for Mobile Ad Hoc Network
指導教授:涂世雄涂世雄引用關係
指導教授(外文):Shih-Hsiung Twu
學位類別:碩士
校院名稱:中原大學
系所名稱:電機工程研究所
學門:工程學門
學類:電資工程學類
論文種類:學術論文
論文出版年:2009
畢業學年度:97
語文別:英文
論文頁數:46
中文關鍵詞:能量協定隨意網路
外文關鍵詞:protocolad hocenergy-aware
相關次數:
  • 被引用被引用:0
  • 點閱點閱:53
  • 評分評分:系統版面圖檔系統版面圖檔系統版面圖檔系統版面圖檔系統版面圖檔
  • 下載下載:0
  • 收藏至我的研究室書目清單書目收藏:0
  在本篇論文中我們提出ㄧ個新的路由協定去解決無線隨意網路在能源不足時使用上所面臨的問題,並且改善了傳統的的路由協定中所會遭遇節點能量不穩定造成斷線的問題。
  首先,我們提出一個穩定路線的路由協定,因為節點的能量是受限制的,所以我們將透過封包過濾的方式選擇ㄧ條是當的路徑,因此中間節點將會選擇最佳的封包來廣播,即可找到ㄧ條是當距離且穩定的最佳路線,除此之外有效的調整封包的倒到數計次器,可以防止氾濫的現象發生。再來我們提出ㄧ個能量為考量的路徑修補技術,當目標節點在傳輸時離開原來的地方,這將會導致線路的中斷,所以我們使用一個能量為考量的路徑修補技術來找到ㄧ條穩定的路徑,並且可以減少路徑重新搜尋的時間。最後我們將和一些現有的路由協定做些表現比較。
  在本篇論文中,我們主要的貢獻有下列幾點:
(1) 在我們的協定中,可以尋找一個電量穩定且距離適當的路線,以提升傳輸的穩定度。
(2) 透過節點過濾封包的方式,選擇性的廣播封包,減少封包的發送量,降低線路的負載。除此之外有效的調整封包倒數計次器,可以防止氾濫的現象發生。
(3) 我們以能量為考量修補路徑的方式,減少了路徑重新搜尋的時間,並且得到穩定的路線。
  最後,我相信傳輸的過程會變得更穩定,並且我們的研究結果顯示對未來行動隨意網路在路由協定上,將會有很大的幫助。
  In this thesis we propose a new energy-aware routing protocol to solve low energy problem in Mobile Ad-Hoc Network (MANET). It also can improve undesirable phenomena in traditional MANET routing protocols, such as disconnected and instability problems caused by low energy.
  At first, we propose a stable-path routing protocol. Because of energy of the node is limited, we will select an appropriate path via packet screening method. So that intermediate node will select the best packet to broadcast. Hence a stable path with appropriate distance will be found. In addition, the packet of countdown times will be effetely adjusted to prevent the flooding phenomena in transmission. Second, we propose an energy-aware routing repair technology. When the destination node left the original place, it will lead to break up of the transmission path. At this time, we use an energy-aware routing repair technology which can find a stable route to reduce re-search time of path. Finally, the performance comparison of our proposal with some existent routing protocols will be given.
  The contributions of our research are as follows:
(1) In our protocol, we find a stable energy path with appropriate distance to improve the stability phenomena in transmission.
(2) Through the packet screening method, the amount of packets and the load of paths will be reduced. In addition, the flooding phenomenon will be prevented via the effective adjusted of countdown time of packets, too.
(3) We propose an energy-aware repair routing technology to find a stable route to reduce the re-searching time.
  Finally, we trust the transmission will be more stable via our proposed method. The results of our research in thesis shows that it will be much helpful to future research in the routing protocols of MANET.
Contents
Chinese Abstract.......................................................................................................I
Abstract....................................................................................................................II
Acknowledge...........................................................................................................IV
Contents....................................................................................................................V
List of Figures.........................................................................................................VII
List of Tables.........................................................................................................VIII
Chapter1 Introduction................................................................................................1
1.1Motivation and Purpose........................................................................................1
1.2 The Proposed Scheme.........................................................................................4
1.3 Organization of This Thesis...................................................................................5
Chapter2 Background and Related Works.................................................................6
2.1 Background of Mobile Ad Hoc Network.............................................................6
2.2 Routing Protocols of Mobile Ad Hoc Network Overview.....................................8
2.2.1 Dynamic Source Routing...................................................................................9
2.2.2 Ad Hoc On-demand Distance Vector Routing..................................................13
2.3 The problems of Mobile Ad Hoc Network..........................................................15
Chatper3 A proposed Stable-Path Routing Protocol for Mobile Ad Hoc Network.....19
3.1 Routing Design....................................................................................................19
3.2 Routing Repair....................................................................................................29
3.3 The Performance of Our Routing Protocol...........................................................31
Chapter4 Conclusions and Future Research...............................................................33
References................................................................................................................34


List of Figures
Figure 1.1 Framework of MANET in battle field..........................................................1
Figure 2.1 As A wants to transfer the packet to C........................................................7
Figure 2.2a Node C can be moved at random..............................................................7
Figure 2.2b Node E replaces node C, becomes one of the routes.................................8
Figure 2.3 Route establishments in DSR.....................................................................12
Figure 2.4 Route establishments in AODV.................................................................14
Figure 2.5 The low energy problem............................................................................16
Figure 2.6 Hidden Terminal problem..........................................................................17
Figure 2.7 Exposed Terminal problem........................................................................18
Figure 3.1 An alterative path to replace past path.......................................................20
Figure 3.2 The format of RREQ.................................................................................21
Figure 3.3 The process of broadcast the RREQ.........................................................22
Figure 3.4 The format of Route Reply Packet.............................................................22
Figure 3.5 The process of broadcast the RREP..........................................................23
Figure 3.6 The process of packet screening method....................................................26
Figure 3.7 The path selection diagram.........................................................................27
Figure 3.8 The Node D transmit RREP to node S.......................................................28
Figure 3.9 The process of route repair........................................................................30
Figure 3.10 The process of RREP transmission...........................................................30

List of Tables
Table 3.1 Received packets of node C.......................................................................28
Table 3.2 A comparison sheet....................................................................................32
[1] C. E. Perkins, “Ad Hoc Networks”, Addison-Wesley, March 2001.
[2] U. Varshney, “Recent Advances in Wired Networking”, Computer, Vol. 33, Issue: 4, Page(s): 107-109, April 2000.
[3] J. Kong, Luo, K. Xu, D.L. Gu, M. Gerla, and S. Lu., “Adaptive Security for Multi-level Ad-Hoc Networks,” WCMC, vol.2, Page(s):533-547, 2002.
[4] E. M. Royer; C. K. Toh, “A review of current routing protocols for ad hoc mobile wireless networks”, Personal Communications, IEEE see also IEEE Wireless Communications, Volume 6, Issue 2, Page(s):46 – 55, April 1999.
[5] L. Abusalah, A.Khokhar, M. Guizani, “A Survey of Secure Mobile Ad Hoc Routing Protocols”, IEEE COMMUNICATIONS SURVEYS & TUTORIALS,, VOL. 10, NO. 4, Fourth Quarter 2008.
[6] C. E. Perkins, E. M. Royer, “Ad-hoc On-Demand Distance Vector Routing,” Proc. 2nd IEEE Wksp. Mobile Comp. Sys. And Apps, Page(s):90-100, Feb. 1999.
[7] S. Adibi, G. B. Agnew, “Multilayer flavoured dynamic source routing in mobile ad-hoc networks”, Communications, IET, Volume 2, Issue 5, Page(s):690 – 707, May 2008.
[8] C. W. Jin; S. Tekinay, “An Efficient Table Driven Routing Algorithm for Wireless Ad Hoc Networks”, Vehicular Technology Conference, Volume 4, Page(s):2604 – 2608, Oct. 2001.
[9] D. Maltz et al., “The Effects of On-demand Behavior in Routing Protocols
for Multihop Wireless Ad Hoc Networks,” IEEE JSAC, vol. 17, no. 8, Aug. 1999.
[10] R. S. Chang, W. Y. Chen, Y. F. Wen, “Hybrid Wireless Network Protocols”, Vehicular Technology, IEEE Transactions on, Volume 52, Issue 4, Page(s):1099 – 1109, July 2003.
[11] Z. Lidong, Z.J. Haas, “Securing ad hoc networks”, Network, IEEE, Volume 13,Issue 6, Page(s):24 - 30 , Nov. 1999.
[12] Y.C. Hu, A. Perrig, D. B. Johnson, “Ariadne : a secure on-demand routing protocol for ad hoc networks,” MobiCom 2002, Sep 2002.
[13] S. Marti, T. Giuli, K. Lai, and M. Baker, “Mitigating routing misbehavior in mobile ad hoc networks”, MobiCom 2000, Boston, MA, Aug 2000.
[14] W. Lou, Y. Fang, “A survey of wireless security in mobile ad hoc networks: challenges and available solutions”, book chapter in Ad Hoc Wireless Networking, Kluwer, May 2003.
[15] R. D. Joshi, P. P. Rege, “Distributed energy efficient routing in ad hoc networks”, Wireless Communication and Sensor Networks, 2008. WCSN 2008. Fourth International Conference, Page(s):16 – 21, Dec. 2008.
[16] G. V. S. Raju, G. Hernandez, Q. Zou, ” Quality of service routing in ad hoc networks”, Wireless Communications and Networking Conference, 2000. WCNC. 2000 IEEE, Volume 1, Page(s):263 – 265, Sept. 2000.
[17] E. M. Royer, “A Review of Current Routing Protocols for Ad Hoc Mobile Wireless Networks”, IEEE Personal Communications, Page(s):44 – 55,
April 1999.
[18] J. Raju, J. J. Grace-Luna-Aceves, “A Comparison of On-Demand and Table Driven Routing for Ad-Hoc Wireless Networks”, Communications, 2000. ICC 2000. IEEE, Volume 3, Page(s):1702 - 1706, June 2000.
[19] X. Zou, B. Ramamurthy, S. Magliveras, “Routing Techniques in Wireless Ad Hoc Networks – Classification and Comparision”, Nebraska Research Initiative(NRI)-Mobile Communication Research Project, January 2002.
[20] G. R. Hiertz, , S. Max, Z. Yunpeng, T. Junge, D Denteneer , “IEEE 802.11s MAC Fundamentals”, Mobile Adhoc and Sensor Systems, 2007. MASS 2007. IEEE , Page(s):1 – 8, Oct. 2007.
[21] J. P. O Grady, A. McDonald, “State of the Art: Ad Hoc Networking”, Adaptive Wireless Systems Group Cork Institute of Technology, State of Art Surveys: Release 2, May 2003.
[22] C. E. Perkins and P. Bhageat, “Highly Dynamic Destination- Sequenced Distance-Vector Routing for Mobile Computers”, Computer Communication, Oct. 1994.
[23] J. Moy, “OSPF version 2,” RFC 2328, Apr 1998.
[24] P.Jacquet, P. Muhlethaler, A. Qayyum, “Optimized Link State Routing Protocol,” Internet Draft, draft-ietg-manet-olsr-00.txt, November 1998.
[25] A. A. Pirzada, C. McDonald, “Trusted route discovery with TORA
protocol”, Communication Networks and Services Research, Page(s):121 – 130, May 2004.
[26] Z. J. Haas, M. R. Pearlman, “The Performance of Query Control Schemes for the Zone Routing Protocol”, ACM/IEEE Trans. Networking, Page(s):427-438, 2001.
[27] D. B. Johnson, “Routing in Ad Hoc Networks of Mobile Hosts”, Proc. IEEE Wksp. Mobile Computing Systems and Applications, Dec. 1994.
[28] L. Abusalah, A. Khokhar, M. Guizani, “A Survey of Secure Mobile Ad
Hoc Routing Protocols”, IEEE COMMUNICATIONS SURVEYS & TUTORIALS, VOL. 10, Fourth Quarter 2008.
[29] C. C. Lo, C. Y. Kuo, Y. H. Huang, K. C. Lin, Y. P. Chu, “A Study on Hidden Receiver Problem in Mobile Ad Hoc Networks”, Wireless and Mobile Communications, 2008. ICWMC '08. The Fourth International Conference, Page(s):49 – 54, Aug. 2008.
[30] P. Karn, “MACA—A new channel access method for packet radio”, ARRL/CRRL Amateur Radio 9th Computer Networking, Page(s): 134–140, 1990.
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top
無相關期刊
 
系統版面圖檔 系統版面圖檔