AU2020103213A4 - AIPB- Routing Protocol Verification: Ad Hoc Routing Protocol Intelligent Verification Process Based on Beagle Bone Black kit - Google Patents

AIPB- Routing Protocol Verification: Ad Hoc Routing Protocol Intelligent Verification Process Based on Beagle Bone Black kit Download PDF

Info

Publication number
AU2020103213A4
AU2020103213A4 AU2020103213A AU2020103213A AU2020103213A4 AU 2020103213 A4 AU2020103213 A4 AU 2020103213A4 AU 2020103213 A AU2020103213 A AU 2020103213A AU 2020103213 A AU2020103213 A AU 2020103213A AU 2020103213 A4 AU2020103213 A4 AU 2020103213A4
Authority
AU
Australia
Prior art keywords
network
routing
node
hoc
routing protocol
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Ceased
Application number
AU2020103213A
Inventor
Ambuj Kumar Agarwal
Bhavya Alankar
Rani Astya
Danish Ather
Vinodani Katiyar
Harleen Kaur
Nitish Pathak
Nitin Rakesh
Neelam Sharma
Ravi Shankar Shukla
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Agarwal Ambuj Kumar Dr
Alankar Bhavya Dr
Astya Rani Ms
Katiyar Vinodani Dr
Kaur Harleen Dr
Pathak Nitish Dr
Rakesh Nitin Dr
Shukla Ravi Shankar Dr
Ather Danish Dr
Original Assignee
Agarwal Ambuj Kumar Dr
Alankar Bhavya Dr
Astya Rani Ms
Katiyar Vinodani Dr
Kaur Harleen Dr
Pathak Nitish Dr
Rakesh Nitin Dr
Shukla Ravi Shankar Dr
Ather Danish Dr
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Agarwal Ambuj Kumar Dr, Alankar Bhavya Dr, Astya Rani Ms, Katiyar Vinodani Dr, Kaur Harleen Dr, Pathak Nitish Dr, Rakesh Nitin Dr, Shukla Ravi Shankar Dr, Ather Danish Dr filed Critical Agarwal Ambuj Kumar Dr
Priority to AU2020103213A priority Critical patent/AU2020103213A4/en
Application granted granted Critical
Publication of AU2020103213A4 publication Critical patent/AU2020103213A4/en
Ceased legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W40/00Communication routing or communication path finding
    • H04W40/24Connectivity information management, e.g. connectivity discovery or connectivity update
    • H04W40/28Connectivity information management, e.g. connectivity discovery or connectivity update for reactive routing
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F30/00Computer-aided design [CAD]
    • G06F30/20Design optimisation, verification or simulation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W84/00Network topologies
    • H04W84/18Self-organising networks, e.g. ad-hoc networks or sensor networks

Abstract

Our Invention" AIPB- Routing Protocol Verification "is a kind of Ad Hoc Routing Protocol verification methods based on Beagle Bone Black, comprise the following steps The system kernel that step 1 removes useless modular assembly is transplanted in the Beagle Bone Black systems of each device node. The invention also the Routing Protocol for needing to verify is transplanted in system by step 2, and configuring external network interface card parameter enables the normal transcribing data of node Step 3 is out of doors on the spot in scene, open multiple equipment node operation Routing Protocol, configuration work pattern is Ad Hoc. The AIPB- Routing Protocol Verification is a external sensor of simultaneity factor collects signal, the software that customization is opened on a node is found destination host and forwarded in a network, destination host end by customize software observation end to end transmission delay, data packet loss Step 4 starts all devices node and tested, and draws the result. The invention also the device node can be taken in scene on the spot using technical solution of the present invention, further the authenticity and reliability of lifting experimental data, the networking mode of simple and fast causes this system to have good application prospect. The invention also relates to an Ad Hoc network construction method based on an OMAP 3530Mini development board which realizes the Ad Hoc network by using the OMAP 3530Mini development board as a hardware platform and using a wireless local area network card as hardware support. The invention also is a method comprises the following steps of: manufacturing an embedded kernel suitable for the OMAP 3530Mini development board in the development environment of Ubuntu, adding necessary function in the kernel to adapt the requirement of the Ad Hoc network, manufacturing a simple root file system to finish the basic function of the file system, compiling the driver of the wireless local area network card in an intersecting way so that the driver can be successfully operated on the development board, driving the wireless local area network card to operate, compiling a wireless configuration tool in an intersecting way to perform network configuration on the wireless local area network card, transplanting an AODV (Ad Hoc On-demand Distance Vector) routing protocol so that a node in the network can perform multi-hop communication so as to finally construct the Ad Hoc network, performing point-to-point communication test and multi-hop test on the constructed network, and performing tests of functions for word communication, voice communication, ftp file transmission and the like. The invention also is a simulator simulates routing system protocols to build routing tables corresponding to a modeled network, and a comparator compares the routing tables in the actual network to these simulator-created routing tables. Because the modeled system represents a fault-free version of the actual system, and assuming that the modeled routing system protocols are representative of the algorithms used in the actual routers, these simulator-produced routing tables will represent the 'ideal' routing tables that should be present in the routers of the actual network. The invention also is a by querying each router in the actual network for its routing table and comparing each routing table to the corresponding simulator-produced routing table, any differences from the 'ideal' can be identified. 29 FIG. 6: IS THE TABLES OF EQUIPMENT NODE STRUCTURE SCHEMATIC DIAGRAM OF COMPOSITION SYSTEM, Receive RREQTHL: Thesbold Hop Limit Detect Event .r..d..,,,d, eoad-at o.c...~a y-<- THL Unicaste1 NoaCheck and Check CRQF Forwdrde CROF by ftann It desnaden Find specifed (PSC) Itselff No CROF entry Is athe re NoaT an appropite Randont dery Forward RREQ by entryTy e aiasdang toward specified PSC Y es there Yesy appropriate C Send RREP RRE UncasRREQ fleadin e eac NO tere pea No Send RJERR a) Route Discovery Process RREQ tothle samm Indicates It is not -a-t PSC any more Wait unt REP b Handling Route Request recedving Packet FIG. 7: IS FLOW CHART OF THE PRESENT INVENTION.

Description

FIG. 6: IS THE TABLES OF EQUIPMENT NODE STRUCTURE SCHEMATIC DIAGRAM OF COMPOSITION SYSTEM,
Receive RREQTHL: Thesbold Hop Limit Detect Event .r..d..,,,d, o.c...~a eoad-at y-
<- THL and Unicaste1 NoaCheck Forwdrde CROF Check CRQF by ftann It desnaden Find specifed (PSC) Itselff No CROF entry Isathe re NoaT an appropite Randont dery Forward RREQ by entryTy e aiasdang toward specified PSC Yes there Yesy appropriateC Send RREP RRE UncasRREQ fleadin e eac NO
tere pea No Send RJERR a) Route Discovery Process RREQ tothle samm Indicates It is not -a-t PSC any more
unt REP Waitrecedving b Handling Route Request Packet
FIG. 7: IS FLOW CHART OF THE PRESENT INVENTION.
AIPB- Routing Protocol Verification: Ad Hoc Routing Protocol Intelligent Verification Process Based on Beagle Bone Black kit
FIELD OF THE INVENTION
The invention "AIPB- Routing Protocol Verification" is related to Ad Hoc Routing Protocol Intelligent Verification Process Based on Beagle Bone Black kit and also a kind of Ad-Hoc based on Beagle Bone-Black Routing Protocol verification method. The invention belongs to the implementation method of Ad Hoc network in the wireless communication technology field, be specifically related to how on specific hardware platform OMAP353OMini development board, to realize the building method of wireless self organization network.
BACKGROUND OF THE INVENTION
Under the overall situation that global mobile network communication technology high speed develops, an important branch in its field is used as --- Mobile Ad-Hoc networks become the focus of industry specialist's scholar's research already. Mobile Ad-Hoc networks are that one kind has specific use Network structure.
Compared with conventional communication networks, Ad-Hoc networks do not have strict control centre, in ad hoc networks all knots Point function phase is same, is the network of a complete peer-to-peer. Node coordinates respective behavior by agreement and special algorithm upon actuation, A separate network is organized themselves under the support of not any network equipment rapidly. The simple and quick advantage of networking causes Ad- Hoc network is all widely used in fields such as sensor network, military communication, urgency communication services.
Due to the changeable characteristic of Ad-Hoc Network Mobility's so that the design optimization of Routing Protocol is always research emphasis. But At this stage in the Improvement to Routing Protocol, researcher's majority still rests on the theoretical and PC ends software emulation stage, Again because in real wireless communication scene, characteristics of radio channels is influenced by many-sided condition, to Routing Protocol only The performance of Routing Protocol cannot be gone out by actual response comprehensively by carrying out the software emulation at PC ends, while also there is following shortcoming :
1 ) Software emulation is carried out to the performance of Routing Protocol at PC ends, actual environment can be ignored Such as geographical environment, other signals The interference that source, weather conditions or other uncertainties work Routing Protocol, therefore, obtained data cannot be really and accurately anti- Mirror the performance of Routing Protocol.
2 ) The checking data of only one-sided software emulation so that not enough, experimental data is more unilateral for the convincingness of data, Comprehensive, accurate detailed data cannot be obtained.
3 ) The universality of simulation software is not high, not high to different protocol compatibilities. Use more complicated so that soft The study threshold and learning cost of part are too high.
Mobile Ad Hoc network is made up of one group of wireless mobile node, is a kind of existing fixed communication infrastructure that do not need to rely on, and can launch the network system used rapidly, is entity, the self-organizing without any the center, the network of self-healing; Each network node cooperates mutually, by Radio Link communicate, the sharing of exchange message, realization information and service; Can enter dynamically, optionally, continually and deviated from network between the network node, and usually not need prior early warning or notice, and cannot destroy the communication of other node in the network.
Ad Hoc network has following characteristics: 1, self-organization. Ad Hoc network can be at any time, make up Anywhere. Node in this network can be followed a kind of self organizing principle mutually in phase, the topology information of automatic detection network, automatically select transmission route, still can adjust its topological structure rapidly to keep necessary communication capacity even when network generation dynamic change or some node are badly damaged.2, dynamic topology. The user can be so that speed and any direction move in network arbitrarily in the Ad Hoc network, add the influence of the variation of wireless base station apparatus transmitted power, the phase mutual interference between wireless channel and orographic factor etc., the network topology structure that forms by wireless channel between node all can change at any time, and the mode of this variation and speed all are to be difficult to prediction.3, the link capacity of bandwidth constraints and variation.4, multi-hop communication. Because the signal spread scope of transceiver is limited, multi-hop communication is supported in Ad Hoc network requirement. But this communication mode has also brought problems such as concealed terminal, exposed terminal.5, distributed control.6, node energy is limited.7, the one-way of channel.8, limited fail safe.9, energy constraint.
Routers are used in networks to forward messages from one node to another in the network until the message reaches its intended destination. Routers use "forwarding tables", or "routing tables" to facilitate the determination of the appropriate node to forward each message. For ease of reference, the term 'router' is used herein to refer to any device or system that is used to forward messages based on an address associated with the communication, including communication switches and the like. In like manner, the terms 'forwarding table' or 'routing table' are used herein to refer to any directives or indices that the router uses to select a communication path for each message or group of messages, regardless of whether these directives or indices are in the form of a table, and include, for example, virtual routing tables, forwarding information bases (FIBs), and so on.
PRIOR ART SEARCH
CN101426221A*2008-12-122009-05-06 Mobile Ad Hoc network simulation system oriented to survivability. CN101790174A *2010-01-192010-07-28 Ad Hoc network Construction method based on OMAP 353OMini development board. CN103813428A *2014-03-112014-05-21 Cognitive Ad Hoc network simulation platform. CN104581807A *2014-12-192015-04-29 Routing protocol networking performance verification device for wireless sensor network. US20160294691A1 *2015-03-312016-10-06Ca, Inc. Routing policy impact simulation CN101335671A*2008-07-292008-12-31 Wireless self-organizing network, internet embedded interconnecting terminal and application method. CN101453794A*2008-11-212009-06-10 Mobile Ad Hoc network terminal based on 802.11b/g and implementation method thereof. US5923659A *1996-09-201999-07-13Bell Atlantic Network Services, Inc. Telecommunications network. US20020150094A1 *2000-10-272002-10-17Matthew Cheng Hierarchical level-based internet protocol multicasting. US6611499B1*1999-03-182003-08-26At&T Corp. Method for measuring the availability of router-based connectionless networks. US20040025018A1*2002-01-232004-02-05Haas Sigmund Secure end-to-end communication in mobile ad hoc networks. US20050102423A1*1995-06-232005-05-12Pelavin Richard N. Analyzing an access control list for a router to identify a subsumption relation between elements in the list US20050169186A1*2004-01-302005-08-04Microsoft Corporation What-if analysis for network diagnostics. US7688743B2*2005-07-292010-03-300pnet Technologies, Inc. Tracing routing differences.
OBJECTIVES OF THE INVENTION
1) The objective of the invention is to a kind of Ad Hoc Routing Protocol verification methods based on Beagle Bone Black, comprise the following steps The system kernel that step 1 removes useless modular assembly is transplanted in the Beagle Bone Black systems of each device node. The invention also the Routing Protocol for needing to verify is transplanted in system by step 2, and configuring external network interface card parameter enables the normal transcribing data of node Step 3 is out of doors on the spot in scene, open multiple equipment node operation Routing Protocol, configuration work pattern is Ad Hoc. 2) The other objective of the invention is to a external sensor of simultaneity factor collects signal, the software that customization is opened on a node is found destination host and forwarded in a network, destination host end by customize software observation end to end transmission delay, data packet loss Step 4 starts all devices node and tested, and draws the result. 3) The other objective of the invention is to a scene on the spot using technical solution of the present invention, further the authenticity and reliability of lifting experimental data, the networking mode of simple and fast causes this system to have good application prospect. The invention also relates to an Ad Hoc network construction method based on an OMAP 353OMini development board which realizes the Ad Hoc network by using the OMAP 353OMini development board as a hardware platform and using a wireless local area network card as hardware support. 4) The other objective of the invention is to a method comprises the following steps of: manufacturing an embedded kernel suitable for the OMAP 353OMini development board in the development environment of Ubuntu, adding necessary function in the kernel to adapt the requirement of the Ad Hoc network, manufacturing a simple root file system to finish the basic function of the file system, compiling the driver of the wireless local area network card in an intersecting way so that the driver can be successfully operated on the development board, driving the wireless local area network card to operate, compiling a wireless configuration tool in an intersecting way to perform network configuration on the wireless local area network card. 5) The other objective of the invention is to a AODV (Ad Hoc On-demand Distance Vector) routing protocol so that a node in the network can perform multi-hop communication so as to finally construct the Ad Hoc network, performing point-to point communication test and multi-hop test on the constructed network, and performing tests of functions for word communication, voice communication, ftp file transmission and the like. 6) The other objective of the invention is to a simulator simulating routing system protocols to build routing tables corresponding to a modeled network, and a comparator compares the routing tables in the actual network to these simulator created routing tables. Because the modeled system represents a fault-free version of the actual system, and assuming that the modeled routing system protocols are representative of the algorithms used in the actual routers, these simulator produced routing tables will represent the 'ideal' routing tables that should be present in the routers of the actual network.
SUMMARY OF THE INVENTION
In view of the shortcomings of the prior art, present invention solves the technical problem that being how to solve only to carry out PC ends to Routing Protocol Software emulation cannot go out the performance issue of Routing Protocol by actual response comprehensively. In order to solve the above technical problems, the technical scheme that provides of the present invention is a kind of based on Beagle Bone-Black Ad-Hoc Routing Protocol verification methods, comprise the following steps :
Step 1 is compiled to the software systems kernel of device node on PC and removes modular assembly useless in kernel Cutting compiling is carried out to kernel, by the Beagle Bone-Black systems of compiled Kernel Porting to device node, treated just After the (Souse) Linux OS for often starting Beagle Bone-Black, the corresponding LCD of installation, which drives and restarted, lights display screen.
The Ad-Hoc Routing Protocols for needing to verify are transplanted in system and run by step 2, while by external wireless network card Insert Beagle Bone-Black systems USB jack, configuration wireless network card parameter enable node normally transcribing data, entirely The system initialization work of equipment single node is just completed ;
On the spot in scene, while opening multiple equipment node, Routing Protocol is run on multiple hardware nodes out of doors for step 3, And device node mode of operation is configured for Ad-Hoc, observed after a period of time, being ordered after treating network stabilization by ping-x The routing behavior of respective nodes External environmental signals are collected using the external sensor of system simultaneously, in corresponding slave node The Message Sender softwares customized by opening upper strata find destination host and by the external environment of collection in a network automatically Signal is forwarded, and just can accurately be reached at destination host end by opening the experimental data for the Test software records write The performance indications of network routing protocol such as transmission delay, the packet loss of data end to end, its detailed process are as follows:
1) i.e.by the data acquisition device sensor needed for experiment, the USB interface extended by network equipment node connects Enter in system, sensor driver is copied in linux system, change corresponding configuration file Make orders are performed, .ko files can be generated under identical file folder, operation support orders are compiled into kernel Pass through the upper strata test software write The data of sensor collection are extracted, when catalogue file folder is lower generates corresponding data file, just illustrate that sensor and data are adopted Collect software normal work ;
2) because this method is already present in kernel using wireless network card Relink RT3070 driving, therefore volume is not needed Outer programming apparatus driving On the USB interface that wireless network card insertion system is extended, ipconfig orders are run in systems, just It can be seen that network interface card mode of operation and situation The IP address of each device node is set, worked by ping-x order detection network interface cards It is whether normal, so far wireless network card be provided with, it is working properly ;
3) Routing Protocol is transplanted in system, Ad-Hoc network routing protocol (this method of progress protocol verification will be needed by copying In be adv. Routing Protocols), change config configuration files, by make orders be compiled generate aodv.ko files ; When setting After wireless network card normal work on slave node, the mode of operation for setting network interface card is adhoc patterns, runs .ko AIPB Routing Protocol Verification: Ad Hoc Routing Protocol Intelligent Verification Process Based on Beagle Bone Black kit.
Filastin output Information in, when real world devices node is working properly, it can be found that surrounding neighbours node and being added in routing table, illustrate
Ad- Hoc Routing Protocols are working properly. Step 4 starts all devices node and tested, and draws the result, its detailed process is as follows :
Start all devices node, by ins mod kaodv. ko orders loading Ad-Hoc Routing Protocol Modules, by/ Add runs Routing Protocol It can be found that each node has all closely found its corresponding neighbor node in output information, simultaneously will Neighbor node is added in routing table, illustrates that whole equipment node is working properly ;
The identification protocol method of use has two kinds : Method one By ping-x order, x be the corresponding IP address of each node, can quickly know network end-to-end delay, Packet loss etc. ; Method two By the upper application software Message Sender softwares of customization, the sensing letter that sensor is gathered in real time is collected Number, send a signal to the destination node drafted in advance Data waveform integrality is checked at destination node, aspect just can be surveyed Show the performance of agreement ;
So far the checking work to Ad-Hocl Routing Protocols is completed. The beneficial effect obtained using technical scheme :
1st, in the case where resting on theoretical research and software emulation conventional routing protocols, the hardware system of design can be simple more Easily the Routing Protocol transplanting of design optimization is got on, it is small, low in energy consumption with system bulk, researcher can be facilitated to set The standby performance for taking in actual scene the Routing Protocol for verifying institute's Improvement to.
2nd, whole hardware system node carries a processor that 1GHz has been reached based on ARM Cortex-A8 dominant frequency, 512MB DDR3 internal memories, and abundant extensive interface cause performance very excellent. Data-handling capacity is entirely capable of reaching and wanted Ask.
3rd, system overall volume only has size as mobile phone, can more conform to mobility and the polytope of MANET, just in take equipment in actual scene to research.
In by all application and service that mobile device, network connect and corresponding data, services provides, that need most service undoubtedly is the mobile subscriber. Now, the connection between most wireless devices all is service provider or the private network by fixation means. When this network that infrastructure arranged provided service for wireless device, setting up necessary infrastructure needed time and huge expense. And, connecting and cannot obtain at the needed network of some geographical position user, it is a kind of challenge really that network connection and network service are provided in these cases.
The alternative method of service has appeared providing recently. These methods mainly concentrate on the mobile device that allows in transmission range and realize connecting by automatic configuration, set up flexibly and effective mobile Ad Hoc network. In this way, not only can intercom mutually between the mobile node, but also the service that can come receiving internet, make the service extension of internet to there not being an area of infrastructure by the gateway node of internet. Along with the sustainable development of wireless network, these abilities that move Ad Hoc network will become more and more important, be used to support that the research and development of this network technology will and academically be dropped into greatly in industry.
Along with computer and development of Communication Technique data communication network and computer communication network just enter into industry, commerce, education and scientific research field with more and more faster speed, enter into daily life, profound influence and changing people's work and life style. In actual life, extensively exist, have the mobile radio communication of fixed base stations now widely to be used in the world, as networks such as existing GSM and CDMA.But above mentioned these networks are only applicable to the zone of existing backbone network, for the zone or the ruined zone of backbone network that originally do not have backbone network, for example on the immense unbounded vast ocean in sea, in the desert in the uncultivated human world, and the city of being damaged by earthquake or other disaster, special place such as battlefield, above-mentioned mobile communications network just cannot satisfy the demands. At some in emergency circumstances, need to set up temporarily, apace a kind of new mobile communications network, so that the transmission of the information of realization. In order to satisfy this demand, as the another kind of special shape of mobile communication, wireless mobile Ad Hoc network has also just arisen at the historic moment.
Introduce domestic and international present Research below about Ad Hoc network:
1, IETF(The? Internet?Engineering?Task?Force)
IETF is made up of network designer, operator, researcher all over the world, and the main development Internet that is responsible for guarantees the normal operation of international Internet. IETF had set up a special mobile Ad Hoc network work group MANET WG (Mobile Ad Hoc Network Work Group) in 1997, be responsible for research and development AdHoc network specially and formulate corresponding standard, and many algorithms have been carried out a large amount of emulation and evaluation work.
2, WAM?Lab(The?Wireless?Adaptive?Mobility?Laboratory)
By Mario professor Gerla of Univ California-Los Angeles USA leader, subsidized by government and enterprise, emphasis is studied Routing Protocol, multicast protocol, multihop network QoS, channel access protocol, blueteeth network and the Ad Hoc network simulation etc. of Ad Hoc.The laboratory has been adopted PARSEC (Parallel Simulation Environment forComplex systems) language development and has been had an open Ad Hoc network simulation test platform, be used for various agreement is carried out emulation relatively, platform can provide open Programming, to adapt to researcher's needs. Based on the exploitation simulation test platform, this laboratory has also been carried out the emulation assessment to some crucial wireless network protocols and has been compared.
3, MOMENT?Lab(The?Mobility?Management?and?Networking?Lab)
The MOMENT laboratory is led by Elizabeth professor Belding-Royer of University of California at Santa Barbara. Ad Hoc experimental evaluation platform UCSB Wireless Mesh Network Test bed (the University of California, Santa Barbara Mesh Test bed) has been set up in the laboratory, and this experimental evaluation platform is made of 25 nodes. The physical layer of node and MAC layer adopt the standard of 802.11b, and evenly distribute in five floors. Platform is mainly used to the performance of agreement and system is assessed, and is used in particular for can expanding Study on Technology such as Routing Protocol, active block management, multi-medium data transmission and QoS assurance to multihop network. In addition, this laboratory is also moved modeling to Ad Hoc and is studied, and has proposed the Ad Hoc mobility model based on barrier.
4, American National Standard and technical research institute's wireless communication technology group
This technology groups have been set up Ad Hoc network articles group, is responsible for by analysis, software emulation and simulation hardware the performance of route protocol of Ad Hoc, the self-organization and the sub-clustering of network being assessed and being studied, and particularly some new agreements and algorithm is assessed. Assessment mainly utilizes Qual Net and OPNET to carry out, and has now utilized OPNET to set up DSR (Dynamic Source Routing) protocol model and AODV (Ad Hoc On-demand Distance Vector) protocol model.
, Massachusetts, a.s.a.p. Polytechnics
PDOS (parallel and distributed operating system) disposes experimental network in the school Ad Hoc Routing Protocol is studied, build together and found two experimental networks, one is based upon in this group building, form by 29 nodes, one is based upon Univ Cambridge uk postgraduate apartment, has constituted Ad Hoc roof network by 50 nodes.
6, Sweden
In APE (Ad Hoc Protocol Evaluation) the experiment porch plan that Uppsala university sets up, also Ad Hoc network simulation and assessment a large amount of R & D works has been launched by Ericsson's patronage. The main target of this project is that the exploitation network design is simple rapidly, the user is easy to use, move the Evaluation Platform of Ad Hoc network-specific emulation efficiently, and utilizes emulation platform that the Routing Protocol of wireless Ad Hoc is carried out emulation assessment and relatively.
7, China
To the later stage nineties 20th century, domestic also have some universities and research institution to begin to pay close attention to Ad Hoc network, and launched some research's. Nearly 2 years, increasing university added the research ranks to Ad Hoc, and wherein relatively more outstanding is Polytechnics of PLA, Tsing-Hua University. Tsing Hua University sets up one Bel's communication joint laboratory of Tsing-Hua University in May, 2000 and Bell Laboratory cooperation, mainly Ad Hoc and other mobile networks is launched research. From top research background as can be seen, begin so far, the theoretical research of Ad Hoc is accounted for critical role, but the Ad Hoc network of the reality of building but and few from the research of Ad Hoc.
The objective of the invention is to use this hardware platform of OMAP353Mini development board to build the method for the Ad Hoc network of a reality, and can use this network to realize application level function.
For achieving the above object, the technical solution used in the present invention is:
1) hardware platform builds
Adopt the OMAP3530-Mini development board to build the Ad Hoc network platform, wireless network card is installed on this OMAP3530-Mini development board is finished building of hardware platform;
2) the Linux embedded system builds
At first, prepare a SD card, the linux terminal under the Ubuntu8.04 development environment is created FAT32 and two sub regions of EXT3 to the SD card;
Secondly, adopt Busybox to make root file system: the process to the Busy box compiling adopts cross compile, the catalogue of depositing root file system is also set up in the title and the path of the cross-compiler of the Makefile file of modification Busybox the inside, under the subdirectory of root file system catalogue promptly/add the library file corresponding under the lib catalogue with embedded Linux kernel, under/dev, manually add console, null, the zero block device, interpolation/invited catalogue below/etc catalogue, and then below/invited catalogue, add the rcS script file, below/etc, add passed, the group file is put into the root file system after completing below the SD card EXT3 sub region of OMAP3530-Mini development board;
Once more, configuration Linux Kernel, utility command: make menuconfig, under Networking--- > option, select support to 802.11 agreements, selection and 802.11 agreements are complementary in the linux kernel config option Generic IEEE 802.11 Networking Stack and IEEE 802.11 WEP encryption (802.1x), at Device Drivers--
> Network device support---> Wireless LAN (non-hamradio)---> selection Wireless LAN drivers (non-hamradio) &amp; Wireless Extensions option, in addition for supporting the AODV agreement, select IP NetfilerConfiguation-- userspace queueing via NETLINK at networking options---> netfilter Configuration, carrying out the make order compiles, generate kernel file image file ulmage with make ulmage then, carry out the module file in the make modules generation kernel, carry out make modules install the module file that generates is put in the development environment file system/the lib/modules file below, then the image file umage that configuration is finished puts into below the FAT32 subregion of the SD card that creates subregion in advance of OMAP3530-Mini development board, and the content below the general/lib/modules file copies under the lib catalogue of root file system; In development board, start image file umage, observe file system and whether can normally start;
3) transplanting of wireless network card driving
When transplanting the driver of wireless network card, download the driver that obtains wireless network card under the Linux environment earlier, the driver of wireless network card is put among the Linux Kernel/the driver/net/wireless catalogue under, Makefile file under the modification/driver/net/wireless catalogue and Config file, the support that adding drives wireless network card, the Makefile that revises WLAN Device Driver in addition promptly revises the title and the path of cross-compiler, be specially the statement CROSS=/opt/codesourcery/arm-none-linux-gnueabi/arm-2007q 3/bin/arm-none-linux-gnueabi-below adding, / opt/codesourcery/arm-none-linux gnueabi/arm-2007q3/bin is the catalogue that cross-compiler is placed, revising CC and LD is: CC=$ (CROSS) gcc, LD=$ (CROSS) d, and revise the linux kernel file mated, be LINUXSRC=/home/davinci/ICETEKWork/softwvare/2.6_kemel, home/davinci/ICETEKWork/projects/2.6_keme is that the kernel of embedded Linux kemel is deposited the path, recompilate Linux Kemel, in this process simultaneously the driver to wireless network card compile, the compiling back generates the driver module file under the catalogue of WLAN Device Driver, again this driver module file is put into the root file system specific directory, root directory /proc under newly built/proc/net/wireless catalogue, the .bin file and the network interface card driving parameters data file of the driver that generates copied under newly built/proc/net/wirelesscatalogue;
Under embedded system, carry out the depmod-ae order earlier, carry out the driver that modprobe rt73 order loads wireless network card then;
4) installation of radio management instrument
Wireless Tools for Linux at first is installed on PC, and the employing editing machine is opened the compiling management document Makefile among the Wireless Tools for Linux, changes compiler and quotes the path:
CROSS=/opt/codesourcery/arm-none-linux-gnueabi/arm-2007q 3/bin/arm-none-linux gnueabi-, / opt/codesourcery/arm-none-linux-gnueabi/arm-2007q3/bin is the catalogue that cross-compiler is placed, to compile the CC among the management document Makefile then, AR, the RANLIB front all adds $ (CROSS), in Makefile, change the installation directory that PREFIX=/home/ICETEKWork/projects/wireless tools has promptly changed the radio management instrument, make this radio management instrument be installed to appointment /the home/ICETEKWork/projects/wirelesstools catalogue under, use make that Wireless Tools is compiled the radio management instrument that generates, make install installs the radio management instrument file that the compiling back generates, file copy all under the general/home/ICETEKWork/projects/wirelesstools/sbin catalogue are in the sbin of the root file system of making, and all library files copy under the lib catalogue in the root file system under the/home/ICETEKWork/projects/wirelesstools/lib catalogue;
) transplanting of AODV Routing Protocol
When carrying out the transplanting of AODV Routing Protocol, download earlier and obtain the AODV Routing Protocol, Makefile file under the modification root and the Makefile file under the lnx catalogue, change the compiler path, be CROSS=/opt/codesourcery/arm-none-linux-gnueabi/arm-2007q 3/bin/arm-none-linux gnueabi-, ARM-CC=$ (CROSS) gcc, ARMLD=$ (CROSS) d, revise the parameter in the embedded kernel source code path of pointing to, be KERNELDIR=/home/davinci/ICETEKWork/projects/2.6_kernel, home/davinci/ICETEKWork/projects/2.6_kerne is that the kernel of embedded Linux kernel is deposited the path, use the make order that the AODV Routing Protocol is compiled, after finishing, compiling can under the root of AODV Routing Protocol, generate executable file aodvd, under the lnx catalogue, generate loadable module file kaodv.ko, with the executable file aodvd that generates and loadable module kaodv.ko document copying under the catalogue of the root file system that has generated;
6) configuration node
After embedded system image file ulmage starts, at first load wireless network card, in embedded system, carry out depmod-ae, carry out the driver that modprobe rt73 loads wireless network card then, after wireless network card drives successfully, use the radio configuration instrument that node is carried out the configuration of IP, essid and network schemer, be specially:
ifconfig? rausbO?xxx.xxx.xxx.xxx?up
iwconfig? rausbO?essid?XXX?mode?ad-hoc
Wherein xxx.xxx.xxx.xxx is IP, and XXX is the essid name, then loads the AODV Routing Protocol, at first enters under the catalogue of depositing the AODV Routing Protocol order below carrying out then:
insmod?kaodv.ko ./aodvd
Such node just configuration is finished, and other node of being made up of the OMAP353Mini development board is similarly disposed, and difference is the IPthatsets otherwise is same;
After each node all is configured, Ad Hoc network has been tested, ordered the break make and the performance of test network with ping.
The Ad Hoc network that uses this hardware platform to build can carry out point-to point communication, and multi-hop communication can carry out text communication, voice communication and ftp file transmission service. And characteristics with self organization of Ad Hoc network, it does not need the support of existing fixed communication infrastructure, can launch the network system used rapidly, be the network of a self-organizing, self-healing, each network node cooperates mutually, by Radio Link communicate, the sharing of exchange message, realization information and service; Can enter dynamically, optionally, continually and deviated from network between the network node, and usually not need prior early warning or notice, and cannot destroy the communication of other node in the network. The hardware platform ratio that adopts among the present invention in addition is easier to obtain, and the hardware platform volume is little, be convenient to carry out when using chip in the OMAP3530 development board to develop integrated, commercialization easily.
BRIEF DESCRIPTION OF THE DIAGRAM
FIG. 1: is an example network and associated routing tables.
FIG. 2: is the example network of FIG. 1 and associated routing tables after a change to the network.
FIG. 3: is an example block diagram of a routing table validation system.
FIG. 4: is an example flow diagram of a protocol simulation system.
Fig. 5: is present system structural model figure ;
Fig. 6: is the tables of equipment node structure schematic diagram of composition system,
Fig. 7: is flow chart of the present invention.
Fig. 8: is the embedded sectional drawing of building successfully;
Fig. 9: is successful sectional drawing for WLAN Device Driver loads, Test scene schematic diagram when Fig. 10 is multi-hop;
Fig. 10: is the logical sectional drawing of 10.0.0.6ping 10.0.0.1;
DESCRIPTION OF THE INVENTION
FIG. 1: is an example network, and an example set of forwarding tables 101A-101E corresponding to the routers A-E of this network. In this example, circles are used to indicate routers, and squares are used to indicate destination sub-networks. As illustrated in FIG. 1, each entry in each router's forwarding table includes a prefix 110, a source protocol 120, a next hop 130, and a metric 140. The prefix 110 is the network address corresponding to a range of destination addresses. The source protocol 120 is the communication protocol for use of this entry in the forwarding table. The next hop 130 identifies the router to which the message will be transmitted if this entry is used. The metric 140 identifies the "cost" associated with transmitting the message to the destination if this entry is used.
In the example forwarding table, symbols A-H are used to indicate the addresses of the routers, and W-Z are used to indicate the sub-network prefix addresses. In an actual forwarding table, actual addresses, such as an IP address, would appear. Also in actual tables, ranges of addresses are used in lieu of individual prefixes 110, and, optionally, a default ("def") or "last resort" entry 111 may be used to identify a next-hop for prefixes that are not explicitly included in the forwarding table. In like manner, the symbol P is used in the example forwarding tables to indicate a protocol, although the actual protocol, such as "OSPF" or "BGP" would appear in an actual forwarding table. Other information may also appear in a forwarding table.
In the example of FIG. 1, the links between routers include a figure/metric that represents the example cost of communicating a message unit between the routers. For example, to send a message unit between routers A and B, the cost is "1", whereas to send a message between routers A and F, the cost is "2". Also in this example, the cost of communications between a sub-network and its supporting router is assumed to be zero.
Typically, each router broadcasts its forwarding table to each other router in the network. If the network is large, network 'areas' may be defined to limit the 'flooding' of this information throughout the network, and/or other hierarchical structures may be used. The receiving router selectively updates its forwarding table based on the entries of each of the received other forwarding tables. The cost of using each route in a neighbor's forwarding table is determined from the neighbor's metric entry 140, plus the cost of reaching that neighbor. Based on these metrics, and perhaps other criteria, depending upon the particular protocol, each router determines a preferred next-hop for each address and/or each range of addresses, including the 'last resort' next-hop.
Once a network is established, all of the forwarding tables achieve a 'steady state', or 'converged' condition, wherein each router includes a preferred next-hop entry for each destination address. For example, based on the link cost/metrics illustrated in FIG. 1, a message at router F with a destination address having a prefix W has a total cost/metric of "3" 141, based on an F-A link cost of "2" plus an A-C link cost of 1. To achieve this cost/metric of "3", the message should be routed from node F to preferred next-hop "A" 131. This steady state does not change unless and until a change occurs in the network. Such changes may be intentional or unintentional, where unintentional changes include mistaken or unintentional reconfigurations of routing parameters, undetected component or link failures, and so on.
Conventional routing protocols are purposely designed to be robust, and provide for dynamic updating of the routing tables when faults occur. Often, a network's performance degrades gradually over time, to the point that the performance becomes unacceptable; but, because of the fault-masking provided by dynamic routing protocols, the cause(s) of the problem may not be readily apparent. It is an objective of this invention to provide a method and system for identifying potential causes of degradations in network system performance. It is a further objective of this invention to provide a method and system for identifying intentional and unintentional changes to routing table entries.
These objectives and others are achieved by providing a simulator that simulates routing system protocols to build routing tables corresponding to a modeled network, and comparing the routing tables in the actual network to these simulator-created routing tables. Because the modeled system represents a fault-free version of the actual system, and assuming that the modeled routing system protocols are representative of the algorithms used in the actual routers, these simulator-produced routing tables will represent the 'ideal' routing tables that should be present in the routers of the actual network. By querying each router in the actual network for its routing table and comparing each routing table to the corresponding simulator-produced routing table, any differences from the 'ideal' can be identified.
FIG. 2: is a change to the example network diagram of FIG. 1, wherein the link between nodes A and F is severed. Such a failure may be caused by a hardware failure, a media failure, a mis-configuration of equipment, and so on, at one or both of the nodes A, F. In a conventional network with dynamic routing protocols, the routers A-H will automatically reroute messages around the problem. Although this automatic rerouting is desirable from a network performance viewpoint, the fact that the link between A and F is not performing as intended is not immediately apparent. Although the network may include special-purpose network monitoring equipment to independently test each link, such equipment can add substantial costs and overhead complexities to the operation of the network. This invention is premised on the observation that failures that occur within networks often result in the automatic rerouting of messages around such failures, and that such rerouting is often reflected in the routing tables of the routers affected by these failures.
A comparison of the routing tables 201A-H corresponding to the network of FIG. 2 with the routing tables 101A-H corresponding to the network of FIG. 1 reveals differences at routers A and F. In table 101A, messages with destination addresses of Y are routed from node A to node F; in table 201A, because the link A-F is severed, messages with destination addresses of Y are routed from node A to node B. Similarly, in table 101F, messages with destination addresses of W are routed from node F to node A, while in table 201F, messages with destination addresses of W are routed from node F to node F's default node D.
Thus, in the example of FIGS. 1 and 2, by comparing "before" and "after" sets of routing tables, differences in the routing tables of nodes A and F are identified, which would lead a network manager to suspect that a problem may have developed in the link between nodes A and F. Often, however, a "before" set of routing tables is not available; or, if a "before" set is available, there is no assurance that the "before" set is representative of a fault-free configuration of the network.
Simulation is a tool that is commonly used to assess the expected performance of a network, typically before the network is implemented, or to assess the expected performance of a change to an existing network, also typically before the change is implemented. Generally, the performance of the network is evaluated by simulating the generation of traffic and determining timing parameters related to the processing and propagation of the traffic through the network, based on models of the components of the network and their interconnection. The models of routers used within the simulation of a network preferably include the ability to emulate the algorithms used within actual routers to implement one or more routing protocols to achieve convergence to a state corresponding to the steady state condition of the modeled network. This state is generally considered an 'internal state' which is required to effectively model the network, but rarely reported to a user of the simulator. In accordance with this invention, recognizing that a simulated model of a network generally represents a fault-free, or 'ideal', configuration of the network, the state of the routing tables within the simulation of the network is provided for comparison with a given steady state condition of the routers in the actual network being modeled.
FIG. 3 illustrates an example block diagram of a system that facilitates the comparison of routing tables 330 of an actual network 310 to routing tables 335 of a modeled 'ideal' network 315. Other techniques may be used to identify changes, including automated processes that periodically updates the modeled network. A query system 320 is configured to interrogate routers within the network 310 to determine the entries in their routing tables. Any of a variety of techniques may be used to perform this query. All or some of the routers may be interrogated, depending upon the purpose of the comparison. For example, if a suspected problem is determined to be isolated to a given region of the network, only routers in that area need be queried. Finding the routers in a network can be accomplished by tracing through all identified 'next-hops' routers until each next-hop router has been visited/queried at least once. Depending upon the particular router manufacturer, and/or the particular routing protocol, different routers may respond differently to a routing table query; in a preferred embodiment, the query system 320 is configured to convert the information received from each router into a standardized routing table 330 that facilitates comparisons.
A protocol simulator 325 is configured to simulate a model 315 of the actual network 310 to determine a set of steady state routing tables corresponding to the modeled network 315. The protocol simulator 325 may be a component of a larger network simulation system, or it may be a custom designed simulator that is configured to model a network of routers. In either embodiment, the simulator 325 includes models of routers that execute the same algorithms as used in the actual routers running each type of routing protocol.
FIG. 4: is an example flow diagram of a model of an example routing protocol, corresponding to a simplified OSPF (Open Shortest Path First) routing protocol. One of ordinary skill in the art will recognize that this model is presented for descriptive purposes only, the actual routing protocol algorithms being somewhat more complex. The Internet Society maintains a collection of standards that provide the details for each of the protocols commonly used in most networks.
At 410, the router receives a routing table update from another router, which may contain one or more route/link-state updates. Initially, each simulated router includes either a default routing table as provided by the manufacturer, or a routing table corresponding to a defined explicit routing table, and this initial table is broadcast from each router to each other router, or to a subset of other routers, depending upon the particular routing protocol. For example, in the OSPF protocol, each router initially 'floods' the network, or a select network area, with its routing table, and any subsequent changes to its routing table; in the RIP protocol, each router communicates its routing table only to its immediate neighbor, and does so periodically.
The loop 420-460 processes each route update. The update will identify the destination address prefix and the metric associated with communicating a packet to this prefix via the router that communicated the update. At 430, the metric for reaching this prefix is updated to include the metric associated with reaching the router that sent the update, and, at 440, this metric is compared to the metric associated with reaching this prefix that is stored in the router's current routing table. If, at 440, the routing table's current entry includes a metric that is at least as good as that provided by communicating via the router sending the update, no changes are made, and the next routing update is processed, via the loop 430-460. If, at 440, the routing table entry is poorer than the determined metric, the prior entry at the routing table is deleted, and a new entry is created to identify the destination prefix, the protocol, the router sending the update as the 'next-hop', and the determined metric associated with using this next-hop to arrive at the destination prefix. The routing table entry is not replaced, however, if the user has explicitly specified a route for the given destination prefix, corresponding, for example, to an intended configuration or reconfiguration of a router in the actual network.
After all of the routing table updates have been processed, the resultant routing table changes are transmitted from this router to each of the other routers in the network or network area, at 470. As these changes are received at other routers, those routers execute the updating process of FIG. 4 for these received routing table updates. As the network routers achieve a steady-state condition, the number of times the process of FIG. 4 results in changes to a router's routing table decreases. Eventually, the network converges to a steady-state condition, wherein each router's routing table includes the best next hop for each destination prefix, and no changes are broadcast at 470.
Returning to the flow of FIG. 3, after the routers in the modeled network converge to a steady state condition, the protocol simulator 325 outputs the resultant routing tables 335, preferably in the same format as the routing tables 330, to facilitate a comparison of these tables 330, 335. As noted above, assuming that the protocol simulator 325 accurately models the algorithms used in the actual routers, these simulated routing tables 335 correspond to the routing tables that would be produced in an ideal, fault-free network.
A comparison module 350 compares the actual routing tables 330 to the simulated routing tables 335, and identifies the differences 360 between these tables 330, 335. As applied, for example, to the networks of FIGS. 1 and 2, the simulation of the fault-free network of FIG. 1 would produce the routing tables 101A-H of FIG. 1, whereas the actual network would produce the routing tables 201A-H of FIG. 2 if the fault on the link A-F were present. The comparison 350 would result in an identification of differences in routing tables (101A, 201A) and (101F, 201F), thereby alerting a network manager of a problem that is affecting nodes A and F.
The comparison module 350 may be configured to selectively determine logical equivalences among routing tables, as well as literal equivalences. For example, depending upon the particular sequence of updating each routing table, particularly in the presence of equal-cost alternative routes, the organization of each routing table with regard to destination prefixes may vary. In a preferred embodiment, a user is provided the option of configuring the comparison module 350 to ignore metric differences and only report differences in the routing tables that result in a different next-hop for the same destination prefix, or configuring the comparison module 350 to ignore next-hop differences and only report differences in the routing tables that result in a different metric for the same destination prefix, or configuring the comparison module 350 to only report differences in the routing tables that result in both a different metric and a different next-hop, and so on.
Note that although the invention is particularly well suited for detecting routing table differences between the actual network and an "ideal" network, such as a simulated network, one of ordinary skill in the art will recognize that the techniques disclosed herein are not limited to such a comparison. The comparison may, for example, be performed between copies of the routing tables obtained from the actual network at different times, or two copies of the routing tables obtained from two different simulations of the network. In like manner, the techniques disclosed herein can be used to facilitate the development and de-bug of newly developed models of routers or routing protocols. That is, if a new routing protocol is being modeled for use in a simulator or other automation tool, the operation of the model may be compared to the actual operation of a known-good router, or network of known-good routers, to verify that the model accurately reflects the algorithms used in the actual devices.
The foregoing merely illustrates the principles of the invention. It will thus be appreciated that those skilled in the art will be able to devise various arrangements which, although not explicitly described or shown herein, embody the principles of the invention and are thus within the spirit and scope of the following claims.
In interpreting these claims, it should be understood that:
a) the word "comprising" does not exclude the presence of other elements or acts than those listed in a given claim; b) the word "a" or "an" preceding an element does not exclude the presence of a plurality of such elements; c) any reference signs in the claims do not limit their scope; d) several "means" may be represented by the same item or hardware or software implemented structure or function; e) each of the disclosed elements may be comprised of hardware portions (e.g., including discrete and integrated electronic circuitry), software portions (e.g., computer programming), and any combination thereof; f hardware portions may be comprised of one or both of analog and digital portions; g) any of the disclosed devices or portions thereof may be combined together or separated into further portions unless specifically stated otherwise; h) no specific sequence of acts is intended to be required unless specifically indicated; and i) the term "plurality of' an element includes two or more of the claimed element, and does not imply any particular range of number of elements; that is, a plurality of elements can be as few as two elements.
Fig. 5: shows present system structural model, Ad-Hoc Routing for On-Demand Protocol in MANET checking system structure model such as Fig. 1 Shown, whole network is made up of a number of device node and sensor, and Ad-Hoc routes are run on these device nodes Agreement just can rapidly networking carry out performance of route protocol experimental verification. There is no any wired in whole cordless communication network The support of infrastructure device, all device nodes are made up of the main frame of single movement, all single nodes status in a network Equality, each node possesses the function of receiving data and routing forwarding, and network possesses multi-hop, non-stop layer, distributed feature, Whole presence of the communication network independent of any one node. Going offline for any node is made all without the communication function to network Into influence, network self-organizing and can rebuild routing table and enter row data communication rapidly.
Fig. 6: shows device node structural representation, and the Ad-Hoc network routing protocols that are directed to designed by the present invention verify system System is exactly that the self-organizing network being made up of the identical device node of multiple functions is constituted. Each device node is divided into several masters Want part : BeagleBone-Black hardware systems, carry ARM Cortex-A8 1GHz processor, in 512MB DDR3 Deposit and enable system efficient high-speed processing data business. Relink RT3070 carry out data transmit-receive, the network interface card as wireless network card Integrated MAC/BBP and 2.4G RF one chips, it fully complies with IEEE 802.11n drafts 4.0 and the b of IEEE 802.11/ G standards, can provide highly reliable, low cost, feature-rich wireless connection.3.5 cun of LCD displays, facilitate the fortune of display system Row state and parameter. And one block of external mobile power supply of outfit is powered for node, while so that device node possesses good movement Property.
Fig. 7: shows verification method of the present invention, comprises the following steps :
Step 1 is compiled to the software systems kernel of device node on PC and removes modular assembly useless in kernel Cutting compiling is carried out to kernel, by the Beagle Bone-Black systems of compiled Kernel Porting to device node, treated just After the (SuSE) Linux OS for often starting Beagle Bone-Black, the corresponding LCD of installation, which drives and restarted, lights display screen ;
The Ad-Hoc Routing Protocols for needing to verify are transplanted in system and run by step 2, while external wireless network card is inserted The USB jack of Beagle Bone Black systems, configuration wireless network card parameter enable node normally transcribing data, whole equipment The system initialization work of single node is just completed ;
On the spot in scene, while opening multiple equipment node, Routing Protocol is run on multiple hardware nodes out of doors for step 3, And device node mode of operation is configured for Ad-Hoc, observed after a period of time, being ordered after treating network stabilization by ping-x The routing behavior of respective nodes External environmental signals are collected using the external sensor of system simultaneously, in corresponding slave node The Message Sender softwares customized by opening upper strata find destination host and by the external environment of collection in a network automatically Signal is forwarded, and just can accurately be reached at destination host end by opening the experimental data for the Test software records write The performance indications of network routing protocol such as transmission delay, the packet loss of data end to end, its detailed process are as follows :
1) i.e. by the data acquisition device sensor needed for experiment, the USB interface extended by network equipment node connects Enter in system, sensor driver is copied in linux system, change corresponding configuration file Make orders are performed, .ko files can be generated under identical file folder, operation support orders are compiled into kernel Pass through the upper strata test software write The data of sensor collection are extracted, when catalogue file folder is lower generates corresponding data file, just illustrate that sensor and data are adopted Collect software normal work ;
2) because this method is already present in kernel using wireless network card Ralink RT3070 driving, therefore volume is not needed Outer programming apparatus driving On the USB interface that wireless network card insertion system is extended, ifconfig orders are run in systems, just It can be seen that network interface card mode of operation and situation The IP address of each device node is set, worked by ping-x order detection network interface cards It is whether normal, so far wireless network card be provided with, it is working properly ;
3) Routing Protocol is transplanted in system, Ad-Hoc network routing protocol (this method of progress protocol verification will be needed by copying In be aodv Routing Protocols), change config configuration files, by make orders be compiled generate aodv.ko files ; When setting After wireless network card normal work on slave node, the mode of operation for setting network interface card is adhoc patterns, runs .ko files ; In output Information in, when real world devices node is working properly, it can be found that surrounding neighbours node and being added in routing table, illustrate Ad- Hoc Routing Protocols are working properly ;
Step 4 starts all devices node and tested, and draws the result, its detailed process is as follows :
Start all devices node, by insmod kaodv. ko orders loading Ad-Hoc Routing Protocol Modules, by/ Aodvd runs Routing Protocol It can be found that each node has all closely found its corresponding neighbor node in output information, simultaneously will Neighbor node is added in routing table, illustrates that whole equipment node is working properly ;
The identifications protocol method of use has two kinds
Method one by ping-x order, x be the corresponding IP address of each node, can quickly know network end-to-end delay, Data packet loss rate etc. ;
Method two by the upper application software Message Sender softwares of customization, the environment letter that sensor is gathered in real time is collected Number, send a signal to the destination node drafted in advance Data waveform integrality is checked at destination node, just can be from side Reflect the performance of agreement.
So far the checking work to Ad-Hocl Routing Protocols is completed.
Compared with prior art, device node can be taken in scene on the spot and simulated using technical solution of the present invention, one will be entered The authenticity and reliability of step lifting experimental data, the networking mode of simple and fast cause this system to have before application well Scape.
The present invention is described in detail above in association with accompanying drawing, but the invention is not restricted to described embodiment. It is right For those skilled in the art, without departing from the principles and spirit of the present invention, these embodiments are carried out each Change, modification, replacement and modification are planted to still fall within the scope of the present invention.
Ad Hoc network is a kind of of computer network, computer network is meant many computers with standalone feature and external equipment thereof that the geographical position is different, couple together by communication line, in network operating system, the management of the network management software and network communication protocol and coordination realize the computer system that resource-sharing and information are transmitted down. Because Ad Hoc network is a kind of of computer network, so Ad Hoc network also must be followed the design standard and the standard of computer network.
What adopt usually is five layer architectures of the advantage of comprehensive OSI and TCP/IP, and these five layers are respectively: application layer, transport layer, network layer, data link layer and physical layer. Physical layer, data link layer, network layer are the most basic three-layer architectures, and we just can carry out simple data communication under the support of these bottom three layer protocols. For physical layer and data link layer I employed be IEEE 802.11b/g agreement, employed hardware is wireless network card. Because according to the IEEE802.11 agreement, wireless LAN card is divided into MAC layer and physical layer, and between has also defined a media interviews control-physics (MAC-PHY) sublayer (Sublayers). The MAC layer provides the interface between main frame and the physical layer, and the management external memory storage, and it is corresponding with the NIC unit of wireless network card hardware. The reception and the emission of physical layer specific implementation radio signal, it is corresponding with the spread spectrum communication machine in the wireless network card hardware. Physical layer provides idle-channel evaluation information to the MAC layer, so that whether decision can send signal, realize the CCSMA/CA agreement of wireless network by the control of MAC layer, and the packing that data are mainly realized in the MAC-PHY sublayer with unpack, necessary control information is placed on the front of packet.
For network layer, carry out the exploitation of Routing Protocol, because what be built into is Ad Hoc network, what I used is Ad Hoc Routing Protocol, dynamic source routing protocol (Dynamic Source Routing Protocol is typically arranged in the Ad Hoc Routing Protocol, DSR), destination sequenced distance route vector operation DSDV (Destination Sequenced Distance Vector), the Distance Vector Routing Algorithm AODV of Ad Hoc network (Ad Hoc onDemand Distmce Vector Routing).Here I employed be the AODV Routing Protocol.
The selection of hardware:
Use is based on the DSP development board ICETEK-0MAP3530-MINI of the OMAP3530 chip of TI production, mainly be to use the ARM kernel of double-nuclear DSP the inside, the management role of performance ARM, build an embedded system, in this embedded system, drive wireless network card work, finish the function of physical layer data link layer. Wireless network card is then selected the WN321G+ of TP-LINK, and the chip of this wireless network card is the RT73 of Relink company, supports IEEE 802.11b/g communication protocol.
2) the Linux embedded system builds
At first, prepare a SD card, the linux terminal under the Ubuntu8.04 development environment is created FAT32 and two sub regions of EXT3 to the SD card;
Secondly, adopt Busybox to make root file system: the process to the Busybox compiling adopts cross compile, the catalogue of depositing root file system is also set up in the title and the path of the cross-compiler of the Makefile file of modification Busybox the inside, under the subdirectory of root file system catalogue promptly/add the library file corresponding under the lib catalogue with embedded Linux kernel, under/dev, manually add console, null, the zero block device, interpolation/init.d catalogue below/etc catalogue, and then below/init.d catalogue, add the rcS script file, below/etc, add passed, the group file is put into the root file system after completing below the SD card EXT3 subregion of OMAP3530-Mini development board;
Once more, configuration Linux Kernel, utility command: make menuconfig, under Networking--- > option, select support to 802.11 agreements, selection and 802.11 agreements are complementary in the linux kernel config option Generic IEEE 802.11 Networking Stack and IEEE 802.11 WEP encryption (802.1x), at Device Drivers-- > Network device support---> Wireless LAN (non-hamradio)---> selection Wireless LAN drivers (non-hamradio) &amp; Wireless Extensions option, in addition for supporting the AODV agreement, select IP NetfilerConfiguation--> userspace queueing via NETLINK at networking options--->netfilter Configuration, carrying out the make order compiles, generate kernel file image file ulmage with make ulmage then, carry out the module file in the make modules generation kernel, carry out make modulesinstall the module file that generates is put in the development environment file system/the lib/modules file below, then the image file umage that configuration is finished puts into below the FAT32 subregion of the SD card that creates subregion in advance of OMAP3530-Mini development board, and the content below the general/lib/modules file copies under the lib catalogue of root file system; In development board, start image file umage, observe file system and whether can normally start;
The sectional drawing that embedded system successfully starts is seen accompanying drawing 1.
3) transplanting of wireless network card driving
When transplanting the driver of wireless network card, download the driver that obtains wireless network card under the Linux environment earlier. The driver of wireless network card is put among the Linux Kernel/the driver/net/wireless catalogue under, Makefile file under the modification/driver/net/wireless catalogue and Kconfig file add the support that wireless network card is driven. Revise the Makefile of WLAN Device
Driver in addition, mainly be the title and the path of revising cross-compiler, be specially the statement CROSS=/opt/codesourcery/art-none-linux-gnueabi/arm-2007q 3/bin/arm-none-linux-gnueabi-below adding, / opt/codesourcery/arm-none-linux gnueabi/arm-2007q3/bin is the catalogue that cross-compiler is placed, revising CC and LD is: CC=$ (CROSS) gcc, LD=$ (CROSS) d, and revise the linux kernel file mated, be LINUXSRC=/home/davinci/ICETEKWork/soffware/2.6_kernel ,/home/davinci/ICETEKWork/projects/2.6_kerne is that the kernel of embedded Linux kernel is deposited the path. Recompilate Linux Kernel, in this process simultaneously the driver to wireless network card compile. The compiling back can generate the driver module file under the catalogue of WLAN Device Driver, again this driver module file is put into the root file system specific directory, root directory /proc under newly built/proc/net/wireless catalogue, the .bin file and the network interface card driving parameters data file of the driver that generates copied under newly built/proc/net/wirelesscatalogue;
Under embedded system, carry out the depmod-ae order earlier, carry out the driver that modprobe rt73 order loads wireless network card then. Wireless network card loads successful sectional drawing and sees accompanying drawing 2.
4) installation of radio management instrument
Wireless Tools for Linux at first is installed on PC, and the employing editing machine is opened the compiling management document Makefile among the Wireless Tools for Linux, changes compiler and quotes the path:
CROSS=/opt/codesourcery/arm-none-linux-gnueabi/arm-2007q 3/bin/arm-none-linux gnueabi-, / opt/codesourcery/arm-none-linux-gnueabi/arm-2007q3/bin is the catalogue that cross-compiler is placed, to compile the CC among the management document Makefile then, AR, the RANLIB front all adds $ (CROSS), in Makefile, change the installation directory that PREFIX=/home/ICETEKWork/projects/wirelesstools has promptly changed the radio management instrument, make this radio management instrument be installed to appointment /the home/ICETEKWork/projects/wirelesstools catalogue under, use make that Wireless Tools is compiled the radio management instrument that generates, make install installs the radio management instrument file that the compiling back generates, file copy all under the general/home/ICETEKWork/projects/wirelesstools/sbin catalogue are in the sbin of the root file system of making, and all library files copy under the lib catalogue in the root file system under the/home/ICETEKWork/projects/wirelesstools/lib catalogue;
) transplanting of AODV Routing Protocol
When carrying out the transplanting of AODV Routing Protocol, download earlier and obtain the AODV Routing Protocol. Makefile file under the modification root and the Makefile file under the lnx catalogue, change the compiler path, be CROSS=/opt/codesourcery/arm-none-linux-gnueabi/arm-2007q 3/bin/arm-none-linux gnueabi-, ARM_CC=$ (CROSS) gcc, ARMLD=$ (CROSS) d, revise the parameter in the embedded kernel source code path of pointing to, be
KERNELDIR=/home/davinci/ICETEKWork/projects/2.6_kernel, /home/davinci/ICETEKWork/projects/2.6_kerne is that the kernel of embedded Linux kernel is deposited the path. Use the make order that the AODV Routing Protocol is compiled, can under the root of AODV Routing Protocol, generate executable file aodvd after compiling is finished, under the lnx catalogue, generate loadable module file kaodv.ko. With the executable file aodvd that generates and loadable module kaodv.ko document copying under the catalogue of the root file system that has generated;
6) configuration node
After embedded system image file ulmage starts, at first load wireless network card, in embedded system, carry out depmod-ae, carry out the driver that modprobe rt73 loads wireless network card then, after wireless network card drives successfully, use the radio configuration instrument that node is carried out the configuration of IP, essid and network schemer, be specially:
ifconfig? rausbO? xxx.xxx.xxx.xxx?up
iwconfig? rausbO?essid?XXX?mode?ad-hoc
Wherein xxx.xxx.xxx.xxx is IP, can oneself set, and XXX is the essid name, also can oneself set.Then to load the AODV Routing Protocol, at first enter under the catalogue of depositing the AODV Routing Protocol, the order below carrying out then:
insmod? Kaodv.ko./aodvd
Such node just configuration is finished, and other node of being made up of the OMAP353Mini development board is similarly disposed, and difference is the IP that sets otherwise is same.
After each node all is configured, can test, order the break-make and the performance of test network with ping Ad Hoc network.
The function of the network of 7) building:
The Ad Hoc network of building can carry out point-to-point communication, multi-point, literal session, voice communication and ftp file transmitting function.
A, point-to-point communication
This mainly be by between the adjacent node mutually ping lead to and prove.
B, multi-hop communication
Non-conterminous node can lead to by ping by the forwarding of intermediate node, and can realize the function of some application layer aspects.
The test scene schematic diagram of multi-hop communication is seen accompanying drawing 3.
PC1 among the figure and PC2 lay respectively in two laboratories at two ends in a very long corridor, OMAP353OMini development board 1 and OMAP353OMini development board 2 are positioned at the centre in corridor, the pattern of network is made as Ad Hoc, be respectively four node configuration IP, use the ipconfig order, the IP of PC1 is: 10.0.0.1, the IP of OMAP353OMini development board 1 is: 10.0.0.3, the IP of OMAP353Mini development board 1 is: 10.0.0.5, the IP of PC2 is: 10.0.0.6, use the iwconfig order that the essid of each node all is made as IBM, make it to be in the same network segment, network schemer all is made as Ad Hoc.
Use the ping order, PC2 (10.0.0.6) ping PC1 (10.0.0.1) is logical, and this illustrates network-in-dialing. See accompanying drawing 4. Accompanying drawing 5 is the routing table of PC1 (IP is 10.0.0.1), can see that IP is the neighbor node of the node of 10.0.0.3 for this node on scheming, and the neighbor node from this node to it does not need the forwarding through intermediate node, can lead directly to. And need be through the forwarding of intermediate node to its non-neighbor node, to IP is that the node of 10.0.0.5 need be through the forwarding of 10.0.0.3, and the jumping figure of route is 2, and also needs to pass through the forwarding of 10.0.0.3 to 10.0.0.6, the jumping figure of route is 3, and these illustrate that this network is multihop network really.
Accompanying drawing 6 is the routing table of OMAP353OMini development board 1 (IP is 10.0.0.3), this node is an intermediate node, from this routing table as can be seen IP be the neighbor node of the node of the node of 10.0.0.1 (PC1) and 10.0.0.5 (MAP353Mini development board 2) for its. This node need be jumped route through 2 to PC2.
C, literal session, voice communication
Can carry out literal session, voice communication by means of Gnome Meeting software.
Carry out the surface chart of literal session and see accompanying drawing 7.
D, ftp file transmission
In the Ad Hoc network of building, use a basic point as ftp server, the another one node can carry out the ftp file transmission as ftp client. The severce vsffpd start order of using makes up ftp server. Using get to order at ftp client can be from file in download on the ftp server that has built.
Accompanying drawing 8 is the process of opening ftp server at PC2 (10.0.0.6) end, use be severce vsftpdstart order, open the FTP service after, ftp client can be downloaded the content of this node storage from this node.

Claims (4)

WE CLAIM
1) Our Invention" AIPB- Routing Protocol Verification "is a kind of Ad Hoc Routing Protocol verification methods based on Beagle Bone Black, comprise the following steps The system kernel that step 1 removes useless modular assembly is transplanted in the Beagle Bone Black systems of each device node. The invention also the Routing Protocol for needing to verify is transplanted in system by step 2, and configuring external network interface card parameter enables the normal transcribing data of node Step 3 is out of doors on the spot in scene, open multiple equipment node operation Routing Protocol, configuration work pattern is Ad Hoc. The AIPB- Routing Protocol Verification is a external sensor of simultaneity factor collects signal, the software that customization is opened on a node is found destination host and forwarded in a network, destination host end by customize software observation end to end transmission delay, data packet loss Step 4 starts all devices node and tested, and draws the result. The invention also the device node can be taken in scene on the spot using technical solution of the present invention, further the authenticity and reliability of lifting experimental data, the networking mode of simple and fast causes this system to have good application prospect. The invention also relates to an Ad Hoc network construction method based on an OMAP 353OMini development board which realizes the Ad Hoc network by using the OMAP 353OMini development board as a hardware platform and using a wireless local area network card as hardware support. The invention also is a method comprises the following steps of: manufacturing an embedded kernel suitable for the OMAP 353OMini development board in the development environment of Ubuntu, adding necessary function in the kernel to adapt the requirement of the Ad Hoc network, manufacturing a simple root file system to finish the basic function of the file system, compiling the driver of the wireless local area network card in an intersecting way so that the driver can be successfully operated on the development board, driving the wireless local area network card to operate, compiling a wireless configuration tool in an intersecting way to perform network configuration on the wireless local area network card, transplanting an AODV (Ad Hoc On-demand Distance Vector) routing protocol so that a node in the network can perform multi-hop communication so as to finally construct the Ad Hoc network, performing point-to-point communication test and multi-hop test on the constructed network, and performing tests of functions for word communication, voice communication, ftp file transmission and the like. The invention also is a simulator simulates routing system protocols to build routing tables corresponding to a modeled network, and a comparator compares the routing tables in the actual network to these simulator-created routing tables. Because the modeled system represents a fault-free version of the actual system, and assuming that the modeled routing system protocols are representative of the algorithms used in the actual routers, these simulator-produced routing tables will represent the 'ideal' routing tables that should be present in the routers of the actual network. The invention also is a by querying each router in the actual network for its routing table and comparing each routing table to the corresponding simulator-produced routing table, any differences from the 'ideal' can be identified.
2) According to claims# The invention is to a kind of Ad Hoc Routing Protocol verification methods based on Beagle Bone Black, comprise the following steps The system kernel that step 1 removes useless modular assembly is transplanted in the Beagle Bone Black systems of each device node. The invention also the Routing Protocol for needing to verify is transplanted in system by step 2, and configuring external network interface card parameter enables the normal transcribing data of node Step 3 is out of doors on the spot in scene, open multiple equipment node operation Routing Protocol, configuration work pattern is Ad Hoc.
3) According to claim,2# The invention is to a external sensor of simultaneity factor collects signal, the software that customization is opened on a node is found destination host and forwarded in a network, destination host end by customize software observation end to end transmission delay, data packet loss Step 4 starts all devices node and tested, and draws the result.
4) According to claiml,2,3# The invention is to a scene on the spot using technical solution of the present invention, further the authenticity and reliability of lifting experimental data, the networking mode of simple and fast causes this system to have good application prospect. The invention also relates to an Ad Hoc network construction method based on an OMAP 353OMini development board which realizes the Ad Hoc network by using the OMAP 353OMini development board as a hardware platform and using a wireless local area network card as hardware support. ) According to claiml,2,3# The invention is to a method comprises the following steps of: manufacturing an embedded kernel suitable for the OMAP 353Mini development board in the development environment of Ubuntu, adding necessary function in the kernel to adapt the requirement of the Ad Hoc network, manufacturing a simple root file system to finish the basic function of the file system, compiling the driver of the wireless local area network card in an intersecting way so that the driver can be successfully operated on the development board, driving the wireless local area network card to operate, compiling a wireless configuration tool in an intersecting way to perform network configuration on the wireless local area network card. 6) According to claim1,2,4# The invention is to a AODV (Ad Hoc On-demand Distance Vector) routing protocol so that a node in the network can perform multi-hop communication so as to finally construct the Ad Hoc network, performing point-to point communication test and multi-hop test on the constructed network, and performing tests of functions for word communication, voice communication, ftp file transmission and the like. 7) According to claiml,2,3,5# The invention is to a simulator simulating routing system protocols to build routing tables corresponding to a modeled network, and a comparator compares the routing tables in the actual network to these simulator-created routing tables. Because the modeled system represents a fault free version of the actual system, and assuming that the modeled routing system protocols are representative of the algorithms used in the actual routers, these simulator-produced routing tables will represent the 'ideal' routing tables that should be present in the routers of the actual network.
FIG. 1: IS AN EXAMPLE NETWORK AND ASSOCIATED ROUTING TABLES.
FIG. 2: IS THE EXAMPLE NETWORK OF FIG. 1 AND ASSOCIATED ROUTING TABLES AFTER A CHANGE TO THE NETWORK.
FIG. 3: IS AN EXAMPLE BLOCK DIAGRAM OF A ROUTING TABLE VALIDATION SYSTEM.
FIG. 4: IS AN EXAMPLE FLOW DIAGRAM OF A PROTOCOL SIMULATION SYSTEM.
FIG. 5: IS PRESENT SYSTEM STRUCTURAL MODEL FIGURE;
FIG. 6: IS THE TABLES OF EQUIPMENT NODE STRUCTURE SCHEMATIC DIAGRAM OF COMPOSITION SYSTEM,
FIG. 7: IS FLOW CHART OF THE PRESENT INVENTION.
FIG. 8: IS THE EMBEDDED SECTIONAL DRAWING OF BUILDING SUCCESSFULLY;
FIG. 9: IS SUCCESSFUL SECTIONAL DRAWING FOR WLAN DEVICE DRIVER LOADS;
FIG. 10: IS THE LOGICAL SECTIONAL DRAWING OF 10.0.0.6PING 10.0.0.1;
AU2020103213A 2020-11-04 2020-11-04 AIPB- Routing Protocol Verification: Ad Hoc Routing Protocol Intelligent Verification Process Based on Beagle Bone Black kit Ceased AU2020103213A4 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
AU2020103213A AU2020103213A4 (en) 2020-11-04 2020-11-04 AIPB- Routing Protocol Verification: Ad Hoc Routing Protocol Intelligent Verification Process Based on Beagle Bone Black kit

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
AU2020103213A AU2020103213A4 (en) 2020-11-04 2020-11-04 AIPB- Routing Protocol Verification: Ad Hoc Routing Protocol Intelligent Verification Process Based on Beagle Bone Black kit

Publications (1)

Publication Number Publication Date
AU2020103213A4 true AU2020103213A4 (en) 2021-01-14

Family

ID=74103474

Family Applications (1)

Application Number Title Priority Date Filing Date
AU2020103213A Ceased AU2020103213A4 (en) 2020-11-04 2020-11-04 AIPB- Routing Protocol Verification: Ad Hoc Routing Protocol Intelligent Verification Process Based on Beagle Bone Black kit

Country Status (1)

Country Link
AU (1) AU2020103213A4 (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114650251A (en) * 2022-03-18 2022-06-21 北京百度网讯科技有限公司 Routing table construction method, device, equipment and medium
CN115665785A (en) * 2022-11-21 2023-01-31 保定飞凌嵌入式技术有限公司 LINUX board card-based wireless network card self-management application program module and method
CN116450206A (en) * 2023-06-14 2023-07-18 飞腾信息技术有限公司 Software system construction method, device, equipment and computer readable storage medium

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114650251A (en) * 2022-03-18 2022-06-21 北京百度网讯科技有限公司 Routing table construction method, device, equipment and medium
CN114650251B (en) * 2022-03-18 2024-02-20 北京百度网讯科技有限公司 Routing table construction method, device, equipment and medium
CN115665785A (en) * 2022-11-21 2023-01-31 保定飞凌嵌入式技术有限公司 LINUX board card-based wireless network card self-management application program module and method
CN115665785B (en) * 2022-11-21 2023-04-07 保定飞凌嵌入式技术有限公司 LINUX board card-based wireless network card self-management application program module and method
CN116450206A (en) * 2023-06-14 2023-07-18 飞腾信息技术有限公司 Software system construction method, device, equipment and computer readable storage medium
CN116450206B (en) * 2023-06-14 2023-09-01 飞腾信息技术有限公司 Software system construction method, device, equipment and computer readable storage medium

Similar Documents

Publication Publication Date Title
AU2020103213A4 (en) AIPB- Routing Protocol Verification: Ad Hoc Routing Protocol Intelligent Verification Process Based on Beagle Bone Black kit
CN101790174B (en) Ad Hoc network Construction method based on OMAP 3530Mini development board
CN101945043B (en) Topology discovery system of next generation Internet based on IPv6 (Internet Protocol Version 6) and realizing method thereof
RU2369976C2 (en) Routing in self-organising peer-to-peer network
CN102143007A (en) Distribution-based hierarchical network topology discovery method
Rajput et al. Comparison of ad-hoc reactive routing protocols using opnet modeler
Lloret et al. GBP-WAHSN: a group-based protocol for large wireless ad hoc and sensor networks
Sohrabi et al. Methods for scalable self-assembly of ad hoc wireless sensor networks
Ilbeigi et al. An infrastructure-less emergency communication system: a blockchain-based framework
Ding et al. Design and implementation of programmable nodes in software defined sensor networks
Ding et al. Overlays on wireless mesh networks: Implementation and cross-layer searching
Neumann Cooperation in open, decentralized, and heterogeneous computer networks
Chang et al. Simulate and compare routing protocols for smart green systems
Chen et al. Network planning for mobile multi‐hop relay networks
Lundgren Implementation and real-world evaluation of routing protocols for wireless ad hoc networks
Paquereau et al. Simulation of wireless multi-* networks in ns-2
Rao et al. Power and Trust based Routing for MANET using RRRP Algorithm
Caleffi et al. On reliability of dynamic addressing routing protocols in mobile ad hoc networks
Ben-Asher et al. Ad-hoc routing using virtual coordinates based on rooted trees
Borgia et al. MobileMAN: integration and experimentation of legacy mobile multihop ad hoc networks
Xiao et al. QoS routing protocol for ad hoc networks with mobile backbones
Wang et al. Topology mining of sensor networks for smart home environments
da Silva Simulation of algorithms for mobile ad-hoc networks
Radoi Performance evaluation of routing protocols in lossy links for smart building networks
Verma Improvement in Quality of Service of MANET Routing through Convergence of Mobile Software Agent

Legal Events

Date Code Title Description
FGI Letters patent sealed or granted (innovation patent)
MK22 Patent ceased section 143a(d), or expired - non payment of renewal fee or expiry