透過您的圖書館登入
IP:18.119.105.239
  • 學位論文

應用於行動式隨意網路之抗自私節點繞徑機制之研究

A Study of Selfish Node Resistant Routing Scheme in Mobile Ad-Hoc Networks

指導教授 : 張元翔
若您是本文的作者,可授權文章由華藝線上圖書館中協助推廣。

摘要


大部分用於行動式隨意網路上的路由協定,例如 DSR 或 AODV,會假設節點是可以信任的,且未考慮路徑上的自私節點可能會答應轉送封包,但實際上卻沒有轉送。因此,就算採用如 TCP 這種較可靠的傳輸協定,整體網路的封包到達率還是會受到影響。本論文提出一個新的機制來降低行動式隨意網路中封包遺失的影響。本機制主要針對自私節點丟棄的封包,進行其他節點重複轉送的動作,以利提升整體封包到達率。本機制採用 NS-2 軟體進行模擬,並在正常及不正常情形下,評估並比較其與 AODV 的研究結果。當網路中有40% 的自私節點,本機制仍可達到約 80% 的封包到達率及 70% 的節省封包比例。總結而言,本論文提供的機制可有效維持行動式隨意網路之封包到達率。

並列摘要


Most of the routing protocols in Mobile Ad-Hoc Networks, such as DSR or AODV, assume that nodes are trustworthy and do not consider that intermediate nodes along a routing path may promise to forward packets but in fact fail to do so. Therefore, the throughput of the whole network could be affected even when a reliable protocol such as the TCP is used. In this paper, we propose a novel scheme to mitigate the influence of the packet dropping in a reasonably dense MANET. Our scheme is designed to restore dropped packets resulted from selfish nodes in the network, leading to improve the overall packet delivery rate. Our scheme was simulated using the NS-2 software and its performance was evaluated and compared with the AODV under normal and abnormal scenarios. In a network with up to 40% selfish nodes, our scheme was still able to achieve 80% in packet delivery rate and 70% in dropped packets saving rate. In conclusion, our proposed scheme is relatively reliable with the capability to retain packet delivery in MANET.

參考文獻


1. E. Perkins and E. M. Royer, "Ad-hoc on-demand distance vector routing," in Proceedings of the IEEE workshop on Mobile Computing Systems and Applications (WMCSA '99), Feb. 1999, pp. 90-100.
2. D. B. Johnson and D. A. Maltz, "Dynamic Source Routing in Ad Hoc Wireless Networks," in Mobile Computing. vol. 353, T. Imielinski and H. Korth, Eds.: Kluwer Academic Publishers, 1996.
7. F. M. Anjum, "TCP Algorithms and Multiple Paths: Considerations for the Future of the Internet " in Information Systems Frontiers, Springer Netherlands ed. vol. 6, March 2004, pp. 91-104.
8. V. Srinivasan, P. Nuggehalli, C. F. Chiasserini, and R. R. Rao, "Cooperation in wireless ad hoc networks," in IEEE INFORCOM '03 San Francisco, California, USA, April 2003.
12. B. Sonja and B. Jean-Yves Le, "Performance analysis of the CONFIDANT protocol," in Proceedings of the 3rd ACM international symposium on Mobile ad hoc networking & computing Lausanne, Switzerland: ACM Press, 2002.

延伸閱讀