期刊文献+

基于NS的Ad hoc网络路由协议仿真研究 被引量:7

Simulation Research of Ad hoc Routing Protocols Based on NS
下载PDF
导出
摘要 运用NS2网络仿真模拟软件对Ad hoc移动自组网络三种典型路由协议DSDV、DSR、AODV在不同网络拓扑复杂度环境下进行仿真模拟,提取部分仿真数据进行分析,从数据包发送率、端到端延时、路由开销三个方面综合比较Ad hoc网络三种典型路由协议的优缺点;引入NS2节点能量模型,分析仿真过程中节点能量变化。仿真结果表明,随着网络拓扑复杂性的增加,AODV路由协议较其它两种路由协议更具可行性与有效性。 Analyzes and compares three tipical routing protocols: DSDV,DSR and AODV for Ad hoc network,and then simulates the results with NS2 in different net topology complexity,and shows the performances of them in recv/send rate of node,end-toend delay and routing overhead by analyzing part of simulation data.Finally,analyzes the change about energy of nodes in simulation by energy model in NS2.The simulation results that the on-demand protocol AODV provides better feasibility and effectivity when the net topology becomes complex.
出处 《计算机技术与发展》 2010年第1期63-66,共4页 Computer Technology and Development
基金 国家自然科学基金(96012003)
关键词 ADHOC网络 NS仿真 能量模型 Ad hoc network NS simulation energy model
  • 相关文献

参考文献10

  • 1Royer E M. A Review of Current Routing Protocols for Ad Ho e Mobile Wireless Networks[J ]. IEEE Personal Communication, 1999,4(2) :46 - 55. 被引量:1
  • 2郑少仁等著..Ad Hoc网络技术[M].北京:人民邮电出版社,2005:277.
  • 3Perkins C E, Bhagwat P. Highly Dynamic Destination - Sequenced Distance- Vector Routing (DSDV) for Mobile Computers[ J ]. ACM SIGCOMM, 1994,24 (4) : 234 - 244. 被引量:1
  • 4Johnson D B, Maltz D A. Dynamic Source Routing in Ad Hoc wireless networks[ M] // Mobile Computing. Norwell: Kluwer Academic Publishers, 1996:153 - 181. 被引量:1
  • 5Perkins C E, Royer E M, Das S R. Ad hoc on- demand distanee vector (AODV) Routing [ EB/OL ]. 2003. http:// www. ietf. org/rfc/rfc3561. 被引量:1
  • 6徐雷鸣等编著..NS与网络模拟[M].北京:科学技术文献出版社,2003:195.
  • 7马健丽.移动Ad hoc网络的NS仿真[J].计算机工程,2005,31(B07):176-177. 被引量:4
  • 8吴平,孙磊,徐开勇,苏伟.基于NS-2的Ad Hoc网络分布式CA仿真[J].计算机工程,2008,34(16):147-149. 被引量:1
  • 9许书君..基于NS-2的移动自组网中路由协议的研究与优化[D].暨南大学,2006:
  • 10Fall K,Varaclhan K. The NS Manual[N]. [s. l. ] ,UC Berkeley Press, 2007. 被引量:1

二级参考文献12

  • 1The VINT Project.The NS Manual.2002. 被引量:1
  • 2Joseph P,Macker M,Scott C.Mobile Ad-hoc Networking and IETF(1).Mobile Computing and Communication Review,1998,2(1):9-14. 被引量:1
  • 3Joseph P,Macker M,Scott C.Mobile Ad-hoc Networking and IETF(2).Mobile Computing and Communication Review,1998,2(2):9-12. 被引量:1
  • 4Joseph P,Macker M,Scott C.Mobile Ad-hoc Networking and IETF(3).Mobile Computing and Communication Review,1998,2(3):7-9. 被引量:1
  • 5Joseph P,Macker M,Scott C.Mobile Ad-hoc networking and IETF(4).Mobile Computing and Communication Review,1998,2(4):9-13. 被引量:1
  • 6Shamir A. How to Share a Secret[J]. Communication of the ACM, 1979, 22(11): 612-613. 被引量:1
  • 7Haas J. Securing Ad Hoc Networks[J].IEEE Networks, 1999, 13(6): 24-30. 被引量:1
  • 8Zerfos P. Providing Robust and Ubiquitous Security Support for Mobile Ad-Hoc Networks[C]//Proceedings of ICNP'01. [S. l.]: IEEE Press, 2001. 被引量:1
  • 9Seung Y, Kravets R. Moca: Mobile Certificate Authority for Wireledd Ad Hoc Networks[C]//Proc. of the 2nd Annual PKI Research Workshop Program. Gaithersburg, Maryland, USA: [s. n.], 2003. 被引量:1
  • 10Zerfos P. Ubiquitous and Robust Access Control for Mobile Ad Hoc Networks[J]. IEEE/ACM Transactions on Networking, 2004, 12(6): 1049-1063. 被引量:1

共引文献3

同被引文献50

引证文献7

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部