Welcome![Sign In][Sign Up]
Location:
Search - route discovery

Search list

[Graph RecognizeAODV_AOMDV

Description: AODV和AOMDV路由协议性能仿真与分析::使用NS一2仿真软件,选取分组投递率、端到端的平均时延、归一化的路由开销和路由发现频率4个指标对AODV和AOMDV 路由协议进行了性能仿真,通过改变业务源连接数目、节点的暂停时间分析比较这些参数对2个协议性能的影响,研究结果表明了AOMDV 多径协议的优越性。并提出了对AOMDV协议的改进。-AODV and AOMDV Routing Protocol Performance Simulation and Analysis:: Using NS-2 simulation software, select the packet delivery rate, the average end-to-end delay, normalized routing overhead and route discovery frequency of four indicators of AODV and AOMDV routing protocol performance simulation carried out by changing the number of operations to connect the source, node pause time analysis and comparison of these two parameters on the performance of the agreement, research results show that the multipath AOMDV the superiority of the agreement. And made improvements on AOMDV agreement.
Platform: | Size: 158720 | Author: king | Hits:

[Internet-Networkdsr-uu-0.2

Description: DSR-UU is a DSR implementation that runs in Linux and in the ns-2 network simulator. DSR-UU implements most of the basic DSR features specified in the DSR draft (version 10). One big exception is flow extensions. DSR-UU does NOT use ARP, so do not be surprised if you do not see ARP traffic. DSR-UU instead uses its own neighbor table that sets up the MAC-to-IP translation during route discovery.
Platform: | Size: 245760 | Author: aurora yang | Hits:

[Communicationdiffusion

Description: 一种基于omnet++的路由发现算法,希望对初学者有帮助-Based on omnet++ The route discovery algorithm, and they hope to help beginners
Platform: | Size: 2048 | Author: wf | Hits:

[Program docease

Description: efficeint route discovery....... with source code
Platform: | Size: 958464 | Author: pradeep | Hits:

[Internet-Networkdsr-module

Description: 本文件实现定时器到期的处理,如到达路由发现最大时间,hello定时器到期,路由条目存在时间到期等等。-This document is due to achieve the processing timer, such as route discovery to reach the maximum time, hello timer expires, the routing entries expire so there is time.
Platform: | Size: 4096 | Author: 小小 | Hits:

[Industry researchRoutingSecurity

Description: propose a new routing technique called Security-Aware ad hoc Routing (SAR) that incorporates security attributes as parameters into ad hoc route discovery. SAR enables the use of security as a negotiable metric to improve the relevance of the routes discovered by ad hoc routing protocols. We develop a two-tier classification of routing protocol security metrics, and propose a framework to measure and enforce security attributes on ad hoc routing paths. Our framework enables applications to adapt their behavior according to the level of protection available on communicating nodes in an ad hoc network.
Platform: | Size: 53248 | Author: zipzap | Hits:

[Otherrfc5015.txt

Description: This document discusses Bidirectional PIM (BIDIR-PIM), a variant of PIM Sparse-Mode that builds bidirectional shared trees connecting multicast sources and receivers. Bidirectional trees are built using a fail-safe Designated Forwarder (DF) election mechanism operating on each link of a multicast topology. With the assistance of the DF, multicast data is natively forwarded from sources to the Rendezvous- Point (RP) and hence along the shared tree to receivers without requiring source-specific state. The DF election takes place at RP discovery time and provides the route to the RP, thus eliminating the requirement for data-driven protocol events.
Platform: | Size: 43008 | Author: lie | Hits:

[matlabpath_discovery

Description: 自己编写的利用matlab实现无线自组织网AODV仿真的算法源码。 为由50个节点构成的网络。在50m×50m大小的区域内,随机的产生50个节点。由用户指定源节点和目的节点,程序负责给出从源节点到目的节点的最小路径和此路径的跳数。各个节点之间设定为只要在自己直接通信范围内的其它节点,均一跳可达。-Write your own realization of the use of matlab simulation of wireless self-organizing network algorithms AODV source. The grounds of a network of 50 nodes. Size of 50m × 50m in area, randomly generated 50 nodes. By the user to specify the source node and destination node, the program responsible for the given node from the source node to the destination path and this path is the minimum number of hops. Set between each node to communicate directly as long as within the scope of their other nodes, all jump up.
Platform: | Size: 1024 | Author: shan5217 | Hits:

[JSP/JavaOn-the-Security-of-Route-Discovery-in-MANETs

Description: thish code for to finding the packet lost.In the sending data from source to destination,important thing is routing..all the problems are solved here programetically
Platform: | Size: 642048 | Author: lrp | Hits:

[Program docijns-2007-v5-n2-p158-166

Description: Mobile Ad hoc NETwork (MANET) comprises of nodes, which are free to move randomly, yet cooperate to forward packets between source and destination over a multi-hop wireless network. Due to absence of any fi xed node, each node acts as a router, providing routing capability for the MANET. Various protocols for discovery of routes be- tween any two MANET nodes have been designed. These protocols are broadly categorized as on-demand proto- cols and table driven protocols. Dynamic Source Routing (DSR) and Ad-hoc On-Demand Distance Vector (AODV) are the two most matured on-demand routing protocols, while Optimized Link State Routing Protocol (OLSR) and Topology Dissemination Based on Reverse-Path For- warding (TBRPF) are the two most matured table driven routing protocols. This paper proposes enhancements in DSR to provide secured route discovery and improved
Platform: | Size: 176128 | Author: payal | Hits:

[Internet-Networkkey.tcl

Description: Bluetooth (BT) is presently the primary wireless technology for short range Personal Area Networks (PAN). Piconet is the basic unit of networking in BT that contains one master and from one to seven active salve devices. Piconets can be interconnected to form a Scatternet. Scatternet formation and routing are the important areas on which considerable research has been done so far. Security is another important issue for BT scatternets. BT specification provides security measures for Piconets but secure communication in a scatternet is an open problem. In our research we specifically consider routing security in BT scatternets. We describe a number of routing threats and then present an authenticated routing scheme which is based on Zone Routing Protocol. We evaluate the scheme through simulation and show that it effectively secures the route discovery process in BT scatternets.
Platform: | Size: 2048 | Author: varinder | Hits:

[Industry researchOPNET-of-the-router-capability

Description: 本文在阐述网络发展的现状和趋势的基础上,着重分析了两种内 部网关路由选择协议砒P和OSPF协议的实现机制和性能特点。对P 协议是基于距离矢量算法的。OSPF协议是基于链路状态算法的。本 文的工作重点是对上述两种协议分别从类型,封装,路径特征,邻居 发现和支持,路由选择数据的分发,对变化的响应,路由表计算,健 壮性/可靠性以及安全性等方面进行了对比分析,并对它们存在的安 全漏洞进行了初步的分析说明。根据以上的分析,通过On忸T软件, 本文设计了一个10km×10km规模大小的网络仿真模型,配置了相应 的流量和IP地址,并选取了路由协议网络收敛性,协议开销,网络 延时以及链路修复四个仿真性能参数进行仿真,最后通过对仿真结果 的分析得出以下结论:对P协议适合于网络规模较小、拓扑结构比较 简单、性能要求不严格和易用性要求较高的环境,而OSPF则适合于 网络规模大、拓扑结构复杂和性能要求高的环境,因此要根据网络特 点合理的选择路由协议。-This paper described the status and trends of network development on the basis of analyzes of two Ministry gateway routing select the protocol arsenic P and OSPF protocol implementation mechanism and performance characteristics. P The protocol is based on the distance vector algorithm. The OSPF protocol is based on link-state algorithms. This The text s focus is on these two agreements, respectively, from the type of package, the path characteristics, neighbors Discovery and route choice of data distribution, changes in response, the routing table calculation, and health Zhuang/reliability, and security aspects of a comparative analysis, and they are safety The full loopholes in the preliminary analysis shows. According to the above analysis, On to blush T software Designed a 10km x 10km scale the size of the network simulation model, configuration, corresponding Traffic and IP address, and select the routing protocol convergence, protocol overhead, network Delay and link repa
Platform: | Size: 9182208 | Author: | Hits:

[Software EngineeringZigbee-Wireless

Description: 详细描述了什么是zigbee协议栈,该协议栈的网络层功能,详细讲解了设备发现、路由发现等知识-A detailed description of what zigbee protocol stack and the network layer of the protocol stack, explain in detail the device discovery route discovery knowledge
Platform: | Size: 5079040 | Author: 王鑫 | Hits:

[Internet-Networkliblogger

Description: 日志记录模块+基于组播的设备发现,可以在多路由网络中使用-Log module+ multicast based device discovery, can be used in multi route network
Platform: | Size: 429056 | Author: songaiping | Hits:

[Program docAODV

Description: (AODV creates and uses two phases (1) Discovery of route and (2) Maintenance of route. Protocol uses Request (RREQ)of route, Reply (RREP) of route, Discovery of route and Error of route (RERR) control message in Maintenance of route .The beginning node initiates a connection to ending node, first it checks in the existing route table, as to whether a fresh route to that destination is available or not
Platform: | Size: 423936 | Author: sonia | Hits:

[OtherLoad-balanced-Route-Discovery-for-WSN

Description: Load-balanced Route Discovery for WSN
Platform: | Size: 414720 | Author: Mike | Hits:

CodeBus www.codebus.net