CN105072031B - A kind of delay-disruption tolerant network method for routing based on link transmission ability - Google Patents

A kind of delay-disruption tolerant network method for routing based on link transmission ability Download PDF

Info

Publication number
CN105072031B
CN105072031B CN201510471199.0A CN201510471199A CN105072031B CN 105072031 B CN105072031 B CN 105072031B CN 201510471199 A CN201510471199 A CN 201510471199A CN 105072031 B CN105072031 B CN 105072031B
Authority
CN
China
Prior art keywords
message
capacity
node
forwarding
link
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201510471199.0A
Other languages
Chinese (zh)
Other versions
CN105072031A (en
Inventor
白跃彬
刘健
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Kaixi Beijing Information Technology Co ltd
Original Assignee
Beihang University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beihang University filed Critical Beihang University
Priority to CN201510471199.0A priority Critical patent/CN105072031B/en
Publication of CN105072031A publication Critical patent/CN105072031A/en
Application granted granted Critical
Publication of CN105072031B publication Critical patent/CN105072031B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/12Shortest path evaluation
    • H04L45/125Shortest path evaluation based on throughput or bandwidth
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/12Shortest path evaluation
    • H04L45/127Shortest path evaluation based on intermediate node capabilities

Abstract

A kind of DTN network route methods based on link transmission ability.To improve message-submission rate as target, using link transmission capacity calculation and message priority as core methed, solves message routing issue in DTN networks.The concept of " virtual link " is defined to represent the inter-node link in DTN networks, defines capacity to represent the transmittability of virtual link, and the computational methods of design capacity, memory mechanism, propagation update method.On capacity definition basis, the forwarding capacity of message is defined, and designs the loss priority of message and the forwarding priority of (message, node) two tuples.When message carries out robin, according to (message, node) two tuple priority, the two tuple new type of messages forwarding that priority is high is selected.Into during row buffer application, the discarding of message is selected according to the loss priority of message, and the message for selecting loss priority high is abandoned.By rational message selection mechanism, so as to improve the delivery rate of message in DTN networks.

Description

A kind of delay-disruption tolerant network method for routing based on link transmission ability
Technical field
The present invention relates to disappearing for delay-disruption tolerant network (Delay-and Disrupted-Tolerant Network, DTN) Routing field is ceased, more particularly to a kind of DTN internet message method for routing based on link transmission ability.
Background technology
Different from traditional network, DTN networks are usually operated in constrained environment.Which dictates that DTN networks have tradition Many characteristics that network does not have, including:Intermittent connection, high latency, chance transmission etc..Traditional routing method can not all fit For this network environment, it is therefore desirable to re-start research and design to the routing algorithm in DTN networks.
Up to the present, many DTN network route methods have been proposed in researcher, can be with according to routing strategy It is divided into following three classes:
(1) method for routing based on contact probability:
Method for routing based on contact probability, according to the contact historical information between node, two nodes of prediction it is following certain The probability contacted again in one time.Node forwards messages to those contact target nodes when carrying out message forwarding The big node of likelihood ratio oneself, so as to improve the probability that message is forwarded to destination node.Has method for routing based on probability Including:Prophet Router, MaxProp Router and Delegation Router etc.
(2) method for routing based on node relationships
Method for routing based on node relationships according to motion model, contact model between node etc., predicts the pass between node System, is then forwarded according to the relationship between node.Mobile social networking is mainly used at present, by the society for predicting node Attribute and social relationships forward the messages to the node in close relations with destination node, and mesh is forwarded to so as to reach raising message Tag splice treats your probability.The existing method for routing based on node relationships includes:Social Feature-based Multi-path Routing and An OptimalProbabilistic Forwarding Protocol etc..
(3) method for routing based on node density
Method for routing based on node density, according to the density of local nodes in DTN networks, by the higher section of local density Then the repeating process of message is converted into cluster two parts between cluster by point regional organization into a cluster.Such method for routing, one As by choosing a Leader node for each cluster, be responsible for forwarding of the message in cluster between cluster.There is message progress in cluster During forwarding, Leader nodes are first forwarded messages to, forwarding is then responsible for by Leader nodes.The existing road based on node density Included by method:CAMR, EIMD etc..
Any of the above method for routing has its advantage and applicable scene, but in DTN networks, they are not perfect Method for routing.Moreover, these method for routing are all the selections being route from the angle of node, link in network is not accounted for To the directive function of routing, the utilization to the network information is not very sufficient.It is abstracted in the link between DTN nodes After definition, the network information can be more fully utilized, so as to improve the efficiency of network routing.
Invention content
The present invention is to improve internet message delivery rate as target, using link transmission ability and message prioritization as core concept, Solve the message routing issue in DTN networks.It specifically includes:
1. in order to describe the transmission link in DTN networks, it is proposed that the concept of " virtual link ".To the general of link " capacity " Thought is defined, come the transmittability for representing and distinguishing virtual link.Define computational methods, storage mode and the propagation of capacity With update method.
2. define concept, storage mode and the storage organization of message forwarding capacity.Define message loss priority and Forwarding priority, and herein the routing forwarding strategy based on link transmission ability is devised on basis.
Compared with prior art, innovation of the invention is:With the preferential of DTN network link transmissions ability and message Grade is core concept, improves DTN internet message delivery rates.It is embodied in:
On the one hand 1. the definition of virtual link embodies in DTN networks the spy of " Route Selection i.e. next-hop node selects " Property, another aspect also embodies the transmission link asymmetry of DTN networks.Virtual chain in DTN networks has been distinguished in the definition of capacity Link transmission ability in road and non-DTN networks reflects in DTN networks transmittability end to end.
2. the definition of forwarding capacity embodies the current delivery status of message, the message defined on basis herein abandons excellent First grade is embodied in the possibility being dropped into message when row buffer application.The forwarding priority of message considers to establish more In the case of a link, the selection of message and link how is carried out.On the basis defined in message priority, the forwarding of routing Decision process is then converted into the process of message and link selection.
Description of the drawings
Fig. 1 virtual links and capacity description
Fig. 2 memory configurations
Fig. 3 forwarding capacity data structures
Specific embodiment
Refering to Fig. 1.Fig. 1 describes the DTN networks for including two virtual links.In DTN networks, the forwarding of message is root Decision is carried out according to next-hop node, the transmittability of next-hop node to destination node is higher, also means that message more It may or faster be transmitted to destination node.Source node is only concerned about how soon can next-hop node or forward the messages to target How node forwards the messages to destination node without concern for next-hop node, thus can by source node, next-hop node and The path of destination node these three nodes composition is regarded as one " virtual link ", and source node is according to the biography of this " virtual link " Movement Capabilities select next-hop node.
Consider the virtual link of node A (source node), node B (next-hop node) and node C (destination node) compositions.Figure Between interior joint using dotted line connect, be due to the connection between node be not it is lasting, dotted line connect represent two nodes with Before established connection or in the future will establish connection.This is also why to be referred to as link " virtual ", i.e. DTN networks In there is no continuous link, link is sudden and of short duration.In addition, there are a piece of for the connection between node B and node D " cloud ", this is because source node is indifferent to how next-hop node forwards the messages to destination node, it is only necessary to which knowing can incite somebody to action Message is forwarded to destination node.
In the present invention virtual link, source node A, next-hop node B, target are represented using vl (A, B, C) Node is C.The presence of virtual link is conditional, and is defined first below up to node and the Node Concepts that can go directly:
● up to node:If nodes X can forward the messages to node Y, then node Y is the reachable node of nodes X.It can Definition up to node is asymmetrical.Even node Y is the reachable node of nodes X, do not illustrate nodes X be also node Y can Up to node.
● can go directly node:If nodes X can be in direct contact with node Y, then node Y is going directly for nodes X Node.The definition of node of can going directly is symmetrical.It is, if node Y is the node that goes directly of nodes X, then nodes X is also The node that goes directly of node Y.Intuitively understand, be both that nodes X is directly connect with node Y after nodes X is met with node Y It touches and node Y is in direct contact with nodes X.In addition, if node Y is the node that goes directly of nodes X, then node Y must be The reachable node of nodes X.Not vice versa.
Later, we can introduce necessary and sufficient condition existing for virtual link, i.e.,:Virtual link vl (A, B, C) is existing to be filled Want condition be node B be node A go directly node and node C be node B reachable node.Thus necessary and sufficient condition can be known Road, the existence of virtual link is also asymmetrical.When virtual link vl (A, B, C) there are when, we do not know vl (C, B, A) it whether there is.Additionally, there are a kind of special virtual link, i.e. vl (A, B, B).Vl (A, B, B) represents one only by two The virtual link of a node composition, when message is forwarded on this virtual link, source node directly forwards the messages to mesh Mark node.Identical from the requirement of different virtual links for the existence of vl (A, B, B), node B must be going directly for node A Node, and obviously node B is the reachable node of oneself.
In order to carry out the forwarding of message according to " virtual link ", need to be defined the transmittability of virtual link. The transmittability for defining " virtual link " is " capacity ".The capacity definition of nodes X to node Y is:It can be from section in unit interval Point X is transmitted to the data volume of node Y, is represented with C (X, Y).From the definition of capacity as can be seen that capacity is oriented, that is, The capacity of nodes X to node Y from the capacity of node Y to nodes X are different, i.e. C (X, Y) ≠ C (Y, X), this meets DTN networks The asymmetry of transmittability.If representing network with graph structure, then cable network is exactly a non-directed graph, and DTN networks are then a digraphs.The capacity of virtual link vl (A, B, C) is represented using C (A, B, C), by virtual link not Symmetry understands C (A, B, C) ≠ C (C, B, A) (assuming that vl (A, B, C) and vl (C, B, A) exists).
In order to calculate the computational methods of export capacity, the situation of single virtual link is considered first.Node A to node D is deposited At one " virtual link " --- vl (A, B, D).Consider node A need forward 1 byte message arrive node D, then node A need Node B is forwarded messages to, node D is then forwarded to by node B again.According to the definition of capacity it is found that node A is forwarded to section It is the time required to point BNode B is forwarded the time required to this message to node DSo node A forwards 1 byte to disappear It is that the capacity so as to obtain " virtual link " vl (A, B, D) is the time required to breath to node C:
The situation of two virtual links is considered again, is then generalized to the situation of arbitrary finite item " virtual link ".Still Consider that node A needs to transmit the message of 1 byte, then the time that node D is transmitted to by " virtual link " vl (A, B, D) isThe time that node D is transmitted to by " virtual link " vl (A, C, D) isBut node A is to node B and section The capacity of point C is different, i.e. C (A, B, B) and C (A, C, C) is different.In practical application scene, node is more likely to The larger path of selection capacity is forwarded, therefore can useWithIt is secondary represent vl (A, B, D) and vl (A, B, D) weights, then node A transmission 1 byte to node D average time be:
So as to which the capacity for obtaining egress A to node D is:
It is generalized to ordinary circumstance, it is assumed that nodes X can reach node Y by the n nodes that can go directly, wherein i-th can be straight Up to node ZiThat is represented, then nodes X to the capacity between node Y is:
Refering to Fig. 2.Fig. 2 describes the storage organization of capacity, including two table structures:Capacities chart (Node Capacity Table, NCT) and virtual link capacities chart (Virtual Link Capacity Table, VLCT).The Y in node capacity tablei Represent the destination node of this record, C (X, Yi) source node X is represented to destination node YiCapacity.In virtual link capacities chart In, ZiRepresent this record destination node, be nodes X the node that can go directly, C (X, Zi, Zi) represent link vl (X, Zi, Zi) capacity, btiRepresent the settling time of record.There is no any record in table when initial, when encountering a node, save thus Point establishes record.Therefore, ntiAlso it represents nodes X and meets node Z for the first timeiTime.totaliIt represents up to the present, node X can be to node ZiThe data volume that can be transmitted.Here it can transmit, not be to represent nodes X to node ZiThe data volume transmitted, But node Z can be transferred to by being in direct contact by representing nodes XiData volume.For example, nodes X and node ZiBetween the transmission that connects Rate is v, link time t, then this time link can transmitted data amount be v × t.
When nodes X just adds in network, nodes X knows nothing network.Therefore, the node capacity of nodes X It is sky when table is initial.Over time, nodes X constantly meets other nodes, then collecting network information uses this A little information are come to instruct possible message forwarding in the future (may be the message that oneself is created, it is also possible to the forwarding of other nodes be helped to disappear Breath).The capacity information of other nodes and itself capacity information is updated in process, that is, collection network of node collecting network information Process.
When two nodes, --- by taking nodes X and node Y as an example --- when meeting, they need to exchange its respective appearance Measure the information of information, i.e. node capacity table, then each self refresh own node capacities chart.It is noted herein that work as nodes X After node Y switching node capacities charts, nodes X update NCTX, then the NCT that node Y is receivedXIt is out-of-date just to become.But At this time need not exchange capacity again because its newer only increases the update after node Y.Therefore, the friendship of node capacity table It changes when only occur in link and establish.After nodes X has exchanged node capacity table with node Y, nodes X needs to update itself Node capacity table, but its update is not related to entire node capacity table, pertains only to the reachable node of all node Y.
When meeting in addition to node, when disconnection is connected between node, it is also desirable to capacity is recalculated, but The capacity calculated at this time pertains only to the node disconnected.After nodes X and node Y are disconnected, nodes X needs to weigh first It is new to calculate C (X, Y, Y), C (X, Y) is then recalculated again.The former calculation is as follows:
Wherein, ct represents current time, and sp represents the transmission rate of this time link, and duration represents holding for this time connection The continuous time.In addition, it is also desirable to which refreshing is timed to node capacity table.It is, each a period of time is to node capacity table Refreshed, so as to reduce the property delayed of node capacity table.The method for refreshing of node capacity table is fairly simple, and calculation formula is such as Under:
In order to be ranked up to message and the forwarding of guide message, we define turning for message on the basis of capacity Send out capacity (relay capacity, rc).The forwarding capacity of one message be defined as " counted from this message creation time, this Message has been forwarded to the data volume of destination node ".Certainly, we can not possibly accurately obtain the forwarding capacity of message, therefore this In forwarding capacity be an estimated value, be to be determined by the forwarding situation of message.
Refering to Fig. 3.Fig. 3 message forwarding capacity stores data structure --- MessageInfo (MI).The MI of message is by three It is grouped as, including:The current forwarding capacity of message (rc), capacity acceleration (acceleration) and message forwarding capacity are nearest A renewal time (ut).When message establishing, one MI of message establishing thus, and by the forwarding capacity of this message and Capacity acceleration is initialized as 0, and the last update time of this message forwarding capacity is set as current time.Once message into Forwarding is gone, it is necessary to the capacity acceleration of message be recalculated, computational methods are as follows:
MIm.acceleration=MIm.accleration+C (Y, desm)
The capacity acceleration of message m is increased to the capacity between node Y to m destination nodes.And the forwarding capacity of message is It is calculated by the capacity acceleration of message, computational methods are as follows:
MIm.rc=MIm.rc+MIm.acceleration*(ct-MIm.ut)
Wherein, ct represents current time.Intuitively understand, that is, the forwarding capacity of message was increased from last time and is updated To the increased capacity of current time.
On the basis of message forwarding capacity, the priority of message can be defined, including:Loss priority and forwarding are excellent First grade.Loss priority is defined when node messages buffering area is full, it should which message be selected to be abandoned.Message Loss priority is directly determined that a message forwarding capacity is bigger by the forwarding capacity of message, then illustrates that message has been transmitted Data volume to destination node is more.Therefore, when buffering area is full, it should preferentially abandon this message.Use pmRepresent message m Loss priority, computational methods are:
pm=1/MIm.rc
The p of one messagemIt is worth smaller, it is higher to represent its priority, also with regard to this message more it is possible that being dropped.
The forwarding priority of message is determined when connection is established, it should preferentially forward which message.In DTN networks In, a node may establish multiple connections in synchronization with multiple nodes.Therefore, when message is forwarded, not only Consider message, also to consider to connect.That is, repeating process is not only the process of selection message and selects connection Process.In order to solve this problem, the priority of (message, node) two tuples is defined, then according to the excellent of this two tuple First grade selects the message to be transmitted to a specific node.We use pT (m, Y)Represent two tuples (m, Y) priority, Computational methods are as follows:
That is two tuples (m, Y) determine by the capacity of node Y to message m destination node divided by the capacity acceleration of message, directly Understand in sight and m is namely forwarded to the increased capacity acceleration ratios of node Y.The p of two tuplesT (m, Y)Value is bigger, then preferential choosing This two tuple is selected to be forwarded.In addition, work as MIm.acceleration when being 0, pT (m, Y)It is set as C (Y, desm)。
On the basis of message priority, the forwarding strategy of message can be defined, is included the following steps:
(1) MI of all message in buffering area is calculated.
(2) two all tuples (message, connection) are established.
(3) priority of all two tuples is calculated, and according to priority size sorts.
(4) if there is more message can be transmitted, two tuples (m, Y) for selecting and removing highest priority are transmitted. Otherwise, 7 are gone to.
(5) it attempts message m being forwarded to node Y, if node Y received messages, start this transmission;Otherwise, 4 are gone to.
(6) when message m is transmitted, MI is updatedmAnd by MImNode Y is sent to, goes to 4.It is led if being disconnected with node Y Transmission is caused, then directly goes to 4.
(7) no message is transmitted, and waits for new connection or new message.
If step 5 describes, when message m is transmitted to node Y, node Y needs to decide whether received message m.Section Point Y decides whether to receive this message according to many factors.Node Y is first determining first oneself not to transmit message, then It needs to be determined that there is no this message in buffering area.When the condition of front all meets, next node Y is just only needed to receive This message does last preparation --- application space.If node Y has enough free spaces to store message m, then then connects By this message.Otherwise node Y needs to decide whether to carry out message discarding, so as to which vacating space stores message m.When having When sufficient space carrys out received message m, then receive this message;Otherwise refusal receives this message.

Claims (1)

1. a kind of DTN network route methods based on link transmission ability, portraying and counting including DTN network link transmission abilities Calculate, message forwarding capacity portray and calculate and based on virtual capacity message forwarding and abandon effectiveness calculate, it is characterised in that:
First, " virtual link capacity " is designed to portray DTN network multi-hops path one-way transmission ability end to end, is jumped based on one The capacity of tie link calculates " the virtual link capacity " of multi-hop link;Next, by design " forwarding capacity " and " capacity adds Speed " portrays the total quantity size that message is forwarded;Third, message based " forwarding capacity ", " capacity acceleration " and The forwarding of " virtual link capacity " design message and discarding effectiveness of the present node to destination node;After the completion of above-mentioned steps, section Point forwards and abandons message based on forwarding effectiveness and discarding effectiveness, completes route messages forwarding;
" virtual link capacity " calculating of multihop path comprises the following steps:
1) for any one paths P (X, Y), P (X, Z are calculated firsti) virtual link capacity, wherein ZiOne for X jumps neighbour It occupies, calculation formula is:Capacity refreshes formula: Wherein Ct is current time, btiFor the last link (X, Zi) the connection time started, totaliTo arrive btiTotal data until time Transmission quantity, sp are the transmission rate of this link, and duration represents the duration of this time connection;
2) if nodes X has a n hop neighbor Zi, then the virtual link calculation of capacity formula of path P (X, Y) be:
Wherein C (X, Zi,Zi), C (Zi, Y) and it is path P (X, Zi) and path P (Zi, Y) virtual link capacity, ZiA jump for X Neighbours;
According to virtual link capacity, calculate the current forwarding capacity (rc) of message, capacity acceleration (acceleration) and disappear Forwarding capacity recent renewal time (ut) is ceased to portray the data volume MI that message has been forwarded to destination nodem, message Current forwarding capacity calculation formula is as follows:
MIm.rc=MIm.rc+MIm.acceleration*(ct-MIm.ut)
Wherein MIm.rc it is the forwarding capacity of message m, MIm.acceleration it is that (initial value is for the capacity acceleration of message m 0), MIm.ut it is message forwarding capacity recent renewal time, ct is current time;
Message current capacities acceleration formula is as follows:
MIm.acceleration=MIm.acceleration+C(Y,desm)
Wherein C (Y, desm) for the node Y where message m and message destination node desmBetween virtual link capacity;
On the basis of virtual link capacity and message forwarding capacity, message m is in the discarding effectiveness p of place node YmCalculating Formula is as follows:
pm=1/MIm.rc
Wherein MIm.rc it is forwarding capacity of the message m on node Y;
Message m is in the forwarding effectiveness p of place node Yt(m,Y)Calculation formula it is as follows:
Wherein MIm.acceleration it is capacity acceleration of the message m on node Y, C (Y, desm) the node Y where message m To message destination node desmVirtual link capacity.
CN201510471199.0A 2015-08-04 2015-08-04 A kind of delay-disruption tolerant network method for routing based on link transmission ability Expired - Fee Related CN105072031B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510471199.0A CN105072031B (en) 2015-08-04 2015-08-04 A kind of delay-disruption tolerant network method for routing based on link transmission ability

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510471199.0A CN105072031B (en) 2015-08-04 2015-08-04 A kind of delay-disruption tolerant network method for routing based on link transmission ability

Publications (2)

Publication Number Publication Date
CN105072031A CN105072031A (en) 2015-11-18
CN105072031B true CN105072031B (en) 2018-07-06

Family

ID=54501317

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510471199.0A Expired - Fee Related CN105072031B (en) 2015-08-04 2015-08-04 A kind of delay-disruption tolerant network method for routing based on link transmission ability

Country Status (1)

Country Link
CN (1) CN105072031B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105681203B (en) * 2016-01-14 2018-07-20 北京交通大学 A kind of countermeasure that the connection of space delay tolerant network is surprisingly failed
CN114257527B (en) * 2021-11-01 2024-02-02 北京思特奇信息技术股份有限公司 Network bearing capacity estimation method

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102780637A (en) * 2012-08-14 2012-11-14 虞万荣 Routing method for data transmission in space delay/disruption tolerant network
WO2012160417A1 (en) * 2011-05-25 2012-11-29 Nokia Corporation Method and apparatus for facilitating disaster communications
CN102882778A (en) * 2012-10-25 2013-01-16 西安电子科技大学 DTN (Delay Tolerant Network) network routing method with limited node buffering

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2012160417A1 (en) * 2011-05-25 2012-11-29 Nokia Corporation Method and apparatus for facilitating disaster communications
CN102780637A (en) * 2012-08-14 2012-11-14 虞万荣 Routing method for data transmission in space delay/disruption tolerant network
CN102882778A (en) * 2012-10-25 2013-01-16 西安电子科技大学 DTN (Delay Tolerant Network) network routing method with limited node buffering

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
COMSP: Correlated Contact and Message Scheduling Policy in DTN;Zhenxi Sun,et al.;《2013 IEEE International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computin》;20131115;正文第3-4节,图1-3 *
Data Dissemination in Delay and Disruption Tolerant Networks Based on Content Classification;Yazhou Jiao,et al.;《 Mobile Ad-hoc and Sensor Networks, 2009. MSN "09. 5th International Conference on》;20091216;全文 *

Also Published As

Publication number Publication date
CN105072031A (en) 2015-11-18

Similar Documents

Publication Publication Date Title
Prodhan et al. TTL based routing in opportunistic networks
CN106789648B (en) Software defined network route decision method based on content storage and Network status
Shen et al. Routing protocols in delay tolerant networks: A comparative survey
Radenkovic et al. Congestion aware forwarding in delay tolerant and social opportunistic networks
Grundy et al. Promoting congestion control in opportunistic networks
Liu et al. Improvement of AODV routing protocol with QoS support in wireless mesh networks
CN102571571A (en) Multilayer effective routing method applied to delay tolerant network (DTN)
CA2441579A1 (en) Multi-path dynamic routing algorithm
CN107294852B (en) Network routing method using topology dispersed short path set
Mehto et al. Comparing delay tolerant network routing protocols for optimizing L-copies in spray and wait routing for minimum delay
CN105072031B (en) A kind of delay-disruption tolerant network method for routing based on link transmission ability
Yamunadevi et al. Efficient comparison of multipath routing protocols in WSN
CN104270324B (en) A kind of jamming control method suitable for tethered satellite network
CN104469874A (en) Message forwarding method of opportunistic network based on probability centrality
WO2005079001A1 (en) Network architecture
Devarajan et al. An enhanced cluster gateway switch routing protocol (ECGSR) for congestion control using AODV algorithm in MANET
Ma Coupling degree seeking based routing strategy for delay tolerant networks
Qin et al. A cross-layer QoS design with energy and traffic balance aware for different types of traffic in MANETs
Kumar et al. ACO based QoS aware routing for wireless sensor networks with heterogeneous nodes
Srivastava et al. Implementation of Ant Colony Optimization Algorithm for Load Balancing Routing in MANET Network
Wei et al. A routing optimization method based on ACA for FANETs
CN105072046A (en) Delay tolerant network congestion prevention method based on data concurrence and forwarding by token control node
CN104954284B (en) A kind of delay-tolerant network congestion-preventing approach towards probability routing
Divyashree et al. Performance Analysis and Enhancement of QoS Parameters for Real-Time Applications in MANETs-Comparative Study
Balamurugan et al. Designing Novel Routing Algorithms for Wireless Mobile Ad-Hoc Networks to Improve Their Enactment

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20210420

Address after: 100160, No. 4, building 12, No. 128, South Fourth Ring Road, Fengtai District, Beijing, China (1515-1516)

Patentee after: Kaixi (Beijing) Information Technology Co.,Ltd.

Address before: 100191 Haidian District, Xueyuan Road, No. 37,

Patentee before: BEIHANG University

TR01 Transfer of patent right
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20180706

Termination date: 20210804

CF01 Termination of patent right due to non-payment of annual fee