计算机应用 ›› 2014, Vol. 34 ›› Issue (9): 2476-2481.DOI: 10.11772/j.issn.1001-9081.2014.09.2476
戴晨曲,李建波,由磊,徐吉兴
收稿日期:
2014-02-10
修回日期:
2014-03-18
发布日期:
2014-09-30
出版日期:
2014-09-01
通讯作者:
李建波
作者简介:
基金资助:
青岛市科技计划基础研究项目;山东省自然科学基金资助项目;山东省教育厅项目
DAI Chenqu,LI Jianbo,YOU Lei,XU Jixing
Received:
2014-02-10
Revised:
2014-03-18
Online:
2014-09-30
Published:
2014-09-01
Contact:
LI Jianbo
Supported by:
Foundation Research Project of Qingdao Science and Technology Plan
摘要:
针对容延/容断网络(DTN)网络的时延高、割裂频繁,以及节点缓存和能量受限等网络特性,为提高容延网络的传输率,同时降低网络开销和网络时延,提出了一种基于节点相似性的容延网络路由算法(RABNS)。该算法利用历史相遇信息预测节点未来相遇概率,并且把历史相遇的节点录入为集合,利用集合的交集运算来评估一对相遇节点的相似性,并以此为判定条件控制网络中的副本数量。在模拟器The ONE上采用RandomWaypoint运动模型进行仿真,其中RABNS在消息投递率方面优于PROPHET,网络负载约为PROPHET的50%,较大程度上提高了网络资源利用率;平均时延稍高于Epidemic但低于PROPHET,节点缓存空间大小对算法的平均跳数影响不大,且RABNS的平均跳数约为PROPHET的一半。仿真结果表明,RABNS能有效地限制消息洪泛,获取更高的消息投递率、更低的网络开销和数据时延,因此尤其适用于节点存储空间有限的DTN环境和具有群居特性的社交容延网络中。
中图分类号:
戴晨曲 李建波 由磊 徐吉兴. 基于节点相似性的容延/容断网络路由算法[J]. 计算机应用, 2014, 34(9): 2476-2481.
DAI Chenqu LI Jianbo YOU Lei XU Jixing. Routing algorithm based on node similarity in delay/disruption tolerant networks[J]. Journal of Computer Applications, 2014, 34(9): 2476-2481.
[1]FALL K. A delay-tolerant network architecture for challenged Internets [C]// Proceedings of the 2003 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication. New York: ACM, 2003: 27-34.
[2]ZHANG L, ZHOU X, WANG J, et al.Routing protocols for delay and disruption tolerant networks [J]. Journal of Software, 2010, 21(10): 2554-2572. (张龙,周贤伟,王建萍,等. 容迟与容断网络中的路由协议[J]. 软件学报, 2010, 21(10):2554-2572.)
[3]AKKAYA K, YOUNIS M. A survey on routing protocols for wireless sensor networks [J]. Ad Hoc Networks, 2005, 3(3):325-349.
[4]WU H, FUJIMOTO R, GUENSLER R, et al.MDDV: a mobility-centric data dissemination algorithm for vehicular networks [C]// VANET '04: Proceedings of the 1st ACM International Workshop on Vehicular Ad Hoc Networks. New York: ACM, 2004: 47-56.
[5]PEREIRA P R, CASACA A, RODRIGUES J J P C, et al.From delay-tolerant networks to vehicular delay-tolerant networks [J]. IEEE Communications Surveys & Tutorials, 2012, 14(4):1166-1182.
[6]SOARES V, RODRIGUES J, FARAHMAND F. GeoSpray: a geographic routing protocol for vehicular delay-tolerant networks [J]. Information Fusion, 2011, 15:102-113.
[7]GUO Z, WANG B, CUI J. Generic prediction assisted single-copy routing in underwater delay tolerant sensor networks [J]. Ad Hoc Networks, 2013, 11(3):1136-1149.
[8]DEMMER M, FALL K. DTLSR: Delay tolerant routing for developing regions [C]// Proceedings of the 2007 Workshop on Networked Systems for Developing Regions. New York: ACM, 2007: No.5.
[9]JAIN S, FALL K, PATRA R. Routing in a delay tolerant networks [C]// Proceedings of the 2004 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications. New York: ACM, 2004:145-158.
[10]AHMED S, KANHERE S. A Bayesian routing framework for delay tolerant networks [C]// WCNC 2010: Proceedings of the 2010 IEEE Wireless Communications and Networking Conference. Piscataway: IEEE, 2010:1-6
[11]GUO Z, WANG B, CUI J. Prediction assisted single-copy routing in underwater delay tolerant networks [C]// GLOBECOM 2010: Proceedings of the Global Telecommunications Conference. Piscataway: IEEE, 2010: 1-6
[12]SPYROPOULOS T, PSOUNIS K, RAGHAVENDRA C S. Spray and wait: an efficient routing scheme for intermittently connected mobile networks [C]// WDTN '05: Proceedings of the 2005 ACM SIGCOMM Workshop on Delay-Tolerant Networking. New York: ACM, 2005: 252-259.
[13]LINDGREN A, DORIA A, SCHELEN O. Probabilistic routing in intermittently connected networks [J]. ACM SIGMOBILE Mobile Computing and Communications Review, 2003, 7(3):19-20.
[14]JAIN S, DEMMER M, PATRA R, et al.Using redundancy to cope with failures in a delay tolerant networks [C]// Proceedings of the 2005 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications. New York: ACM, 2005:109-120.
[15]WANG Y, JAIN S, MARTONOSI M, et al.Erasure-coding based routing for opportunistic networks [C]// Proceedings of the 2005 ACM SIGCOMM Workshop on Delay-Tolerant Networking. New York: ACM, 2005:229-236.
[16]WIDMER J, BOUDEC J. Network coding for efficient communication in extreme networks [C]// Proceedings of the 2005 ACM SIGCOMM Workshop on Delay-Tolerant Networking. New York: ACM, 2005:284-291.
[17]LIU C, WU J. On Multicopy opportunistic forwarding protocols in nondeterministic delay tolerant networks [J]. IEEE Transactions on Parallel and Distributed Systems, 2012, 23(6):1121-1128
[18]ZHU Y, XU B, SHI X, et al.A survey of social-based routing in delay tolerant networks: positive and negative social effects [J]. IEEE Communications Surveys & Tutorials, 2013, 15(1):387 - 401
[19]VAHDAT A, BECKER D. Epidemic routing for partially connected Ad Hoc networks, CS-2000-06 [R]. Durham: Duke University, Department of Computer Science, 2000.
[20]KERANEN A, OTT J, KARKKAINEN T. The ONE simulator for DTN protocol evaluation [C]// Proceedings of the 2nd International Conference on Simulation Tools and Techniques. New York: ACM, 2009: No.55. |
[1] | 宗学军 韩冰 王国刚 宁博伟 何戡 连莲. TDRFuzzer:基于自适应动态区间策略的工业控制协议模糊测试方法[J]. 《计算机应用》唯一官方网站, 0, (): 0-0. |
[2] | 张明, 付乐, 王海峰. 面向边缘计算的并发数据流接转控制模型[J]. 《计算机应用》唯一官方网站, 2024, 44(12): 3876-3883. |
[3] | 郑智强 王锐棋 范子静 何发镁 姚叶鹏 汪秋云 姜政伟. DNS隧道检测技术研究综述[J]. 《计算机应用》唯一官方网站, 0, (): 0-0. |
[4] | 张立孝 马垚 杨玉丽 于丹 陈永乐. 基于命名实体识别的大规模物联网二进制组件识别[J]. 《计算机应用》唯一官方网站, 0, (): 0-0. |
[5] | 刘羿希, 何俊, 吴波, 刘丙童, 李子玉. DevSecOps中软件安全性测试技术综述[J]. 《计算机应用》唯一官方网站, 2024, 44(11): 3470-3478. |
[6] | 庞川林, 唐睿, 张睿智, 刘川, 刘佳, 岳士博. D2D通信系统中基于图卷积网络的分布式功率控制算法[J]. 《计算机应用》唯一官方网站, 2024, 44(9): 2855-2862. |
[7] | 方介泼, 陶重犇. 应对零日攻击的混合车联网入侵检测系统[J]. 《计算机应用》唯一官方网站, 2024, 44(9): 2763-2769. |
[8] | 张一鸣 曹腾飞. 基于本地漂移和多样性算力的联邦学习优化算法[J]. 《计算机应用》唯一官方网站, 0, (): 0-0. |
[9] | 徐航, 杨智, 陈性元, 韩冰, 杜学绘. 基于自适应敏感区域变异的覆盖引导模糊测试[J]. 《计算机应用》唯一官方网站, 2024, 44(8): 2528-2535. |
[10] | 陈虹, 齐兵, 金海波, 武聪, 张立昂. 融合1D-CNN与BiGRU的类不平衡流量异常检测[J]. 《计算机应用》唯一官方网站, 2024, 44(8): 2493-2499. |
[11] | 耿海军 董赟 胡治国 池浩田 杨静 尹霞. 基于Attention-1DCNN-CE的加密流量分类方法[J]. 《计算机应用》唯一官方网站, 0, (): 0-0. |
[12] | 邓淼磊 阚雨培 孙川川 徐海航 樊少珺 周鑫. 基于深度学习的网络入侵检测系统综述[J]. 《计算机应用》唯一官方网站, 0, (): 0-0. |
[13] | 陈瑞龙 胡涛 卜佑军 伊鹏 胡先君 乔伟. 面向加密恶意流量检测模型的堆叠集成对抗防御方法[J]. 《计算机应用》唯一官方网站, 0, (): 0-0. |
[14] | 吴中岱, 韩德志, 蒋海豹, 冯程, 韩冰, 陈重庆. 海洋船舶通信网络安全综述[J]. 《计算机应用》唯一官方网站, 2024, 44(7): 2123-2136. |
[15] | 姚梓豪, 栗远明, 马自强, 李扬, 魏良根. 基于机器学习的多目标缓存侧信道攻击检测模型[J]. 《计算机应用》唯一官方网站, 2024, 44(6): 1862-1871. |
阅读次数 | ||||||
全文 |
|
|||||
摘要 |
|
|||||