Journal of Computer Applications ›› 2014, Vol. 34 ›› Issue (9): 2468-2471.DOI: 10.11772/j.issn.1001-9081.2014.09.2468
• Network and communications • Previous Articles Next Articles
LI Xiangli,JING Ruixia,HE Yihan
Received:
2014-04-04
Revised:
2014-06-01
Online:
2014-09-30
Published:
2014-09-01
Contact:
JING Ruixia
李向丽,荆瑞霞,何一涵
通讯作者:
荆瑞霞
作者简介:
基金资助:
河南省教育厅科技研究重点项目
CLC Number:
LI Xiangli JING Ruixia HE Yihan. Optimized AODV routing protocol to avoid route breaks[J]. Journal of Computer Applications, 2014, 34(9): 2468-2471.
李向丽 荆瑞霞 何一涵. 避免路由断裂的优化AODV路由协议[J]. 计算机应用, 2014, 34(9): 2468-2471.
Add to citation manager EndNote|Ris|BibTeX
URL: https://www.joca.cn/EN/10.11772/j.issn.1001-9081.2014.09.2468
[1]CHLAMTAC I, CONTI M, LIU J. Mobile Ad Hoc networking: imperatives and challenges [J]. Ad Hoc Networks, 2003, 1(1): 13-64.
[2]PERKINS C, BELDING-ROYER E, DAS S. RFC3561, Ad Hoc On-demand Distance Vector (AODV) Routing [S]. Geneva: IETF, 2003.
[3]SRINIVASAN P, KAMALAKKANNAN P. Enhancing route maintenance in RSEA-AODV for mobile Ad Hoc networks [C]// ISCO2013: Proceedings of the 7th International Conference on Intelligent Systems and Control. Piscataway: IEEE, 2013: 464-469.
[4]XIA H, JIA Z, ZHANG Z. A link stability prediction-based multicast routing protocol in mobile Ad Hoc networks [J]. Chinese Journal of Computers, 2013, 36(5): 926-936. (夏辉,贾智平,张志勇. 移动Ad Hoc网络中基于链路稳定性预测的组播路由协议[J].计算机学报,2013, 36(5): 926-936.)
[5]KUPPUSAMY P, THIRUNAVUKKARASU K, KALAAVATHI B. A study and comparison of OLSR, AODV and TORA routing protocols in Ad Hoc networks [C]// ICECT2011: Proceedings of the 3rd International Conference on Electronics Computer Technology. Piscataway: IEEE, 2011: 143-147.
[6]WANG Y, ZHOU Y, YU Y, et al.AD-AODV: A improved routing protocol based on network mobility and route hops [C]// WiCOM2012: Proceedings of the 2012 8th International Conference on Wireless Communications, Networking and Mobile Computing. Piscataway: IEEE, 2012: 1-4.
[7]DU Q, ZHU J, ZHANG E. Optimized AODV routing protocol based on reverse route search in leisure time and route learning [J]. Journal on Communications, 2011, 32(8): 64-71. (杜青松,朱江,张尔扬. 基于闲时逆寻和路由学习机制的优化AODV路由协议[J].通信学报,2011, 32(8): 64-71.)
[8]XIAO B, GUO W, LIU J, et al.Research on local route repair algorithm in mobile Ad Hoc networks [J]. Journal of Computer Research and Development, 2007, 44(8): 1383-1389. (肖百龙,郭伟,刘军,等. 移动自组网路由局部修复算法的研究[J].计算机研究与发展,2007, 44(8): 1383-1389.)
[9]YANG R, LI Z. A stability routing protocols base on reverse AODV [C]// ICCSNT2011: Proceedings of 2011 International Conference on Computer Science and Network Technology. Piscataway: IEEE, 2011: 2419-2423.
[10]XU W, CHAO A. Improvement of AODV routing protocol in Ad Hoc networks [J]. Computer Applications and Software, 2013, 30(3): 225-228. (徐文涛,晁爱农. 一种移动Ad Hoc网AODV路由协议的改进方法[J].计算机应用与软件,2013,30(3):225-228.)
[11]RAPPAPORT T S. Wireless communications: principles and practice [M]. Upper Saddle River: Prentice Hall PTR, 1996.
[12]LI S, LI X, FENG Q. An improved AODV local repair algorithm based on delay constraint [C]// ICSP2012: Proceedings of 2012 IEEE 11th International Conference on Signal Processing. Piscataway: IEEE, 2012: 2212-2216.
[13]The network simulator — NS-2 [EB/OL]. [2014-02-17]. http://www.isi.edu/nsnam/ns/. |
[1] | ZONG Xuejun, HAN Bing, WANG Guogang, NING Bowei, HE Kan, LIAN Lian. TDRFuzzer: fuzzy testing method for industrial control protocols based on adaptive dynamic interval strategy [J]. Journal of Computer Applications, 0, (): 0-0. |
[2] | Ming ZHANG, Le FU, Haifeng WANG. Relay control model for concurrent data flow in edge computing [J]. Journal of Computer Applications, 2024, 44(12): 3876-3883. |
[3] | . Survey of DNS tunneling detection technology research [J]. Journal of Computer Applications, 0, (): 0-0. |
[4] | . Large scale IoT binary component identification based on named entity recognition [J]. Journal of Computer Applications, 0, (): 0-0. |
[5] | Yixi LIU, Jun HE, Bo WU, Bingtong LIU, Ziyu LI. Survey of software security testing techniques in DevSecOps [J]. Journal of Computer Applications, 2024, 44(11): 3470-3478. |
[6] | Chuanlin PANG, Rui TANG, Ruizhi ZHANG, Chuan LIU, Jia LIU, Shibo YUE. Distributed power allocation algorithm based on graph convolutional network for D2D communication systems [J]. Journal of Computer Applications, 2024, 44(9): 2855-2862. |
[7] | Jiepo FANG, Chongben TAO. Hybrid internet of vehicles intrusion detection system for zero-day attacks [J]. Journal of Computer Applications, 2024, 44(9): 2763-2769. |
[8] | ZHANG Yiming, CAO Tengfei. Federated Learning Optimization Algorithm based on Local Drift and Diversity Computing Power [J]. Journal of Computer Applications, 0, (): 0-0. |
[9] | Hang XU, Zhi YANG, Xingyuan CHEN, Bing HAN, Xuehui DU. Coverage-guided fuzzing based on adaptive sensitive region mutation [J]. Journal of Computer Applications, 2024, 44(8): 2528-2535. |
[10] | Hong CHEN, Bing QI, Haibo JIN, Cong WU, Li’ang ZHANG. Class-imbalanced traffic abnormal detection based on 1D-CNN and BiGRU [J]. Journal of Computer Applications, 2024, 44(8): 2493-2499. |
[11] |
GENG Haijun, DONG Yun, HU Zhiguo, CHI Haotian, YANG Jing, YIN Xia.
Encrypted traffic classification method based on Attention-1DCNN-CE#br#
#br#
[J]. Journal of Computer Applications, 0, (): 0-0.
|
[12] | . Summary of network intrusion detection systems based on deep learning [J]. Journal of Computer Applications, 0, (): 0-0. |
[13] | CHEN Ruilong, HU Tao, BU Youjun, YI Peng, HU Xianjun, QIAO Wei. Stacking ensemble adversarial defense method for encrypted malicious traffic detection model [J]. Journal of Computer Applications, 0, (): 0-0. |
[14] | Zhongdai WU, Dezhi HAN, Haibao JIANG, Cheng FENG, Bing HAN, Chongqing CHEN. Review of marine ship communication cybersecurity [J]. Journal of Computer Applications, 2024, 44(7): 2123-2136. |
[15] | Zihao YAO, Yuanming LI, Ziqiang MA, Yang LI, Lianggen WEI. Multi-object cache side-channel attack detection model based on machine learning [J]. Journal of Computer Applications, 2024, 44(6): 1862-1871. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||