CN109617812A - A kind of RPL method for routing, device and network topology based on greed insertion - Google Patents

A kind of RPL method for routing, device and network topology based on greed insertion Download PDF

Info

Publication number
CN109617812A
CN109617812A CN201910083664.1A CN201910083664A CN109617812A CN 109617812 A CN109617812 A CN 109617812A CN 201910083664 A CN201910083664 A CN 201910083664A CN 109617812 A CN109617812 A CN 109617812A
Authority
CN
China
Prior art keywords
node
coordinate
routing
neighbor
neighbor node
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910083664.1A
Other languages
Chinese (zh)
Other versions
CN109617812B (en
Inventor
孙彦斌
田志宏
李默涵
苏申
崔翔
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangzhou University
Original Assignee
Guangzhou University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangzhou University filed Critical Guangzhou University
Priority to CN201910083664.1A priority Critical patent/CN109617812B/en
Publication of CN109617812A publication Critical patent/CN109617812A/en
Application granted granted Critical
Publication of CN109617812B publication Critical patent/CN109617812B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/02Topology update or discovery
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/12Shortest path evaluation
    • H04L45/122Shortest path evaluation by minimising distances, e.g. by selecting a route with minimum of number of hops
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/20Hop count for routing purposes, e.g. TTL
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/48Routing tree calculation

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention discloses a kind of RPL method for routing, device and network topology based on greed insertion, method includes the following steps: for each node c in network topology: obtaining data packet to be transmitted;Wherein, the IPv6 extended head of the data packet preserves the coordinate C of destination node dd;The extended head is parsed, the coordinate C of the destination node d is therefrom extractedd;The coordinate C of neighbor node i is successively obtained from the routing table of itselfi;Wherein, for each node, routing table is stored with the coordinate of its neighbor node;According to the coordinate C of node c itselfcWith the coordinate C of destination node ddDistance d (Cc,Cd) and each neighbor node i coordinate CiTo the coordinate C of destination node ddDistance d (Ci,Cd), get the neighbor node i nearest away from the destination node d;And the data packet is transmitted to the nearest neighbor node i.Implement the present invention, the efficiency and scalability of routing can be improved.

Description

A kind of RPL method for routing, device and network topology based on greed insertion
Technical field
The present invention relates to network technique field, more particularly to a kind of RPL method for routing based on greed insertion, device and Network topology.
Background technique
RPL (IPv6Routing Protocol for Low-Power and Lossy Networks) works at IP layers, It is ROLL (Routing over Low-power and Lossy Network) working group exclusively for 6LoWPAN (IPv6- Based LowPowerWireless PersonalAreaNetworks) agreement and design a kind of standardized Routing Protocol, fit For low-power consumption, easily loss, the storage and processing limited network environment of ability.6LoWPAN agreement is located at link layer protocol Between IEEE802.15.4 and network layer IPv6, the data conversion between link layer and network layer protocol is completed, wireless biography is realized Sensor network interconnects with next generation network IPv6's.RPL agreement has been lost for low-power consumption, data in 6LoWPAN The problem of the standard solution that proposes, though be widely used in wireless personal area network, Internet of Things at present still in the draft stage The multiple fields such as net.
RPL is a kind of distance vector routing protocol, belongs to reactiver outing.Network topology is divided into multiple RPL examples It (Instance), may include one or more DODAG (Destination-Oriented in each RPL example DirectedAcyclic Graph), each RPL example and DODAG have an ID, and the two uniquely indicates a DODAG. RPL routing is using DODAG as the basic unit of routing.DODAG is a directed acyclic using objective function as measurement building Figure, root node is usually border routing, referred to as LBR (LLN Border Router).The each non-root node of DODAG is at least There is the directed edge for being directed toward its father node, there is likely to be a plurality of directed edges for some nodes, are respectively directed on multiple DODAG Node, but only select one of them as father node when routing.Substantially DODAG can regard a kind of tree as in routing and open up It flutters.
RPL supports three kinds of modes to communicate:
Multipoint-to-point: the communication of all nodes in LLN network in a device network a to central node;
It is point-to-multipoint: all node communications of the central node to a device network in LLN network;
Point-to-point: the communication of network node to node.
For the communication for realizing three kinds of modes, routed and two kinds of routing modes of downstream routing using uplink.By being based on Three kinds of control messages (DIS, DIO, DAO) of ICMPv6 realize DODAG construction and Route establishment.
Detailed process is as follows:
Uplink routing is established automatically in DODAG building.Firstly, root node passes through DIO (DODAG Information Object) message broadcasts the information of DODAG, includes root node Rank in DIO.Secondly, the neighbor node of root node receives DIO Afterwards, it according to objective function (OF, Objective Function), calculates the Rank of oneself and decides whether that the DODAG is added.Again Secondary, if neighbor node, which determines, is added the DODAG, there are two kinds of situations:, will be to it if (1) neighbor node is non-leaf nodes Neighbor node continues to broadcast DIO message;(2) if neighbor node is leaf node, DIO message is not broadcasted.Finally, receiving DIO The neighbor node of message repeats above step, until all nodes for receiving DIO message are leaf node.By walking above Suddenly, each node establishes the path for arriving root node naturally, supports the communication of multipoint-to-point.
Downstream routing needs special building.Node, which determines, to be added after DODAG, and sending first to its father node includes its road By DAO (DODAG Destination Advertisement Object) message of the information such as prefix, prefix validity period.Father's section After point receives DAO message, according to the difference of storage mode, point three kinds of situation discussion: (1) memory module, father node save the road By information, and DAO message is continued to issue its father node, until root node, ancestral's node each in this way saves a arrive should The routing iinformation of node;(2) non-memory mode, father node do not save routing iinformation, are transmitted to root node, root node directly up After receiving DAO message, it is saved in a paths of the node.(3) memory module is mixed, this mode is the knot of first two mode It closes, on from the node to root node path, not all node all has storage capacity, and therefore, only selected section node stores Routing information, segmentation are routed using source.By above step, each node can find one directly or by root node and arrive it The path of descendant node.According to different situations, downstream routing is realized a little by way of forwarded hop-by-hop, source routing or both mixing To multi-point.
Uplink routing and downstream routing combine common support point to point link.Under non-memory mode, pass through root section between node Point establishes connection;Under memory module, connection is established by public ancestral's node between node.
To optimize RPL routing plan, a variety of improved methods are successively proposed.For point to point link, pressure is stored to mitigate Router efficiency is improved, P2P-RPL proposes Proactive routing scheme, and node does not preselect storage routing iinformation, but on-demand in origin node Destination node is found by the way of similar DODAG building, destination node returning response data packet simultaneously records the path. GeoRank proposes a kind of improvement project routed based on GPS coordinate, GPS coordinate is used for greedy routing, to improve road By efficiency and scalability.To support point-to-multipoint broadcast communication, MPL sends number by water flooding in a multicast domain Time delay and propagation efficiency are adjusted according to message and control message, and by trickle algorithm (TrickleAlgorithm).
Existing RPL Routing Protocol and its improvement project are primarily present three aspect disadvantages:
(1) router efficiency is low
DODAG is the core of RPL routing, and data packet is forwarded along DODAG.Since DODAG is substantially a kind of tree, Leading to routed path is the path on setting, and is far longer than the shortest route path of entire topology.Especially under non-memory mode, Only root node saves downstream routing information, and all point to point links are required through root node, and router efficiency is further disliked Change.
(2) routing scalability is insufficient
RPL scalability is mainly reflected in routing table scale.Although compared to its average road of traditional distance vector routing protocol It is substantially reduced by table scale, but part of nodes still needs to save a large amount of routing iinformations.For non-memory mode, root node need to be saved in The source-routed information of all nodes, i.e., whole routing information;For memory module, the institute of subtree where upper layer node need to save it There is the routing iinformation of node;For mixed mode, all nodes of subtree where upper layer node saves it in the form that source routes Routing iinformation.
(3) improved method is not perfect
RPL improved method multi-pass crosses the promotion for sacrificing performance on the one hand to exchange on the other hand performance for.Although P2P-RPL It improves router efficiency, reduces routing storage, but pathfinding process is itself is a time-consuming process, while interim DODAG Building may cause great deal of nodes participation, generates mass communication data packet, on the one hand consumes node energy, on the other hand produce New expansible problem.GeoRank lacks specific implementation using GPS coordinate and greed routing, and routing table scale is effectively dropped It is low, but not can guarantee 100% routing success rate, GPS coordinate lacks useful effect under the environment such as building, mountainous region.MPL is increased Broadcast is supported, improves router efficiency, but the selection of Trickle algorithm parameter improper will directly affect propagation delay and node energy Consumption.
The main reason for leading to disadvantages mentioned above includes two aspects: (1) RPL routing is routed based on DODAG, and DODAG is being routed Shi Benzhi is a kind of tree topology, and data packet is only forwarded along tree, and the side in non-DODAG topology is difficult in routing It is used, causes router efficiency low;(2) RPL, which is routed, belongs to distance vector routing protocol, each in distance vector routing protocol Node is all saved in the routing iinformation of other nodes, although RPL tree topology has contained the routing iinformation of uplink routing, For downstream routing, upper layer node still needs to save the routing iinformation of all lower level nodes, causes to route scalability deficiency.
Summary of the invention
In view of this, it is an object of the invention to a kind of RPL method for routing, device and nets based on greed insertion of proposition Network topology, can improve the efficiency and scalability of routing.
The embodiment of the invention provides a kind of RPL method for routing based on greed insertion, include the following steps:
For each node c in network topology:
Obtain data packet to be transmitted;Wherein, the IPv6 extended head of the data packet preserves the coordinate of destination node d Cd
The extended head is parsed, the coordinate C of the destination node d is therefrom extractedd
The coordinate C of neighbor node i is successively obtained from the routing table of itselfi;Wherein, for each node, routing table It is stored with the coordinate of its neighbor node;
According to the distance d (C of node c to destination node dc,Cd) and each neighbor node i to destination node d distance d (Ci,Cd), get the nearest neighbor node i of the destination node d;And
The data packet is transmitted to the nearest neighbor node i.
Preferably, further includes:
Network topology is embedded into metric space by greed insertion, to distribute measurement for each node in network topology Coordinate in space;Wherein, after topological greed is embedded into metric space, the routing table of each node only saves its neighbor node Coordinate.
It is that each node distributes a Bit String, section by prefix trees preferably for each node in network topology The coordinate of point is the level ratio that the Bit String of all nodes is constructed according to hierarchical relationship on from root node to the node path Spy's string.
Preferably, the routing table of each node obtains in the following way:
Repeat the steps of each node until in traverses network topology:
Present node is after the coordinate for getting itself, the message packet for being DIO to its neighbor node transmission types;Its In, the initial coordinate of root node is by root node itself original allocation;The message packet includes Flags field;Wherein, Lin Jujie After point receives the message packet of the present node, judge whether to select present node for father node;If neighbor node does not select Selecting the present node is father node, then is proceeded as follows according to the Flags field of the message packet: if Flags field It is 0, illustrates that the coordinate of the present node does not change, then with no treatment, and directly returns to the DIO- of first state ACK message informs that the present node has been received by message packet;If Flags field is 1, illustrate the present node coordinate hair Variation has been given birth to, then has returned to the DIO-ACK message of the second state, has requested the present node to send updated coordinate, and save To the routing table of itself;If neighbor node selects the present node for father node, the DIO-ACK for responding the third state disappears Breath;
If the present node receives the DIO-ACK message of the first state of neighbor node transmission, with no treatment; If receiving the DIO-ACK message of the second state of neighbor node transmission, the coordinate of itself is encapsulated into DEM, and Flag is set After being set to 0, DEM is returned into neighbor node;If receiving the DIO-ACK message of the third state of neighbor node transmission, root It is embedded in scheme according to prefix, generates a Bit String for neighbor node, and the coordinate of node itself is encapsulated into DEM together with Bit String Message, Flag is set as 1, and DEM message is returned to the neighbor node;Wherein, the neighbor node receives DEM message, Check the Flag field of DEM message;Wherein, if Flag is 0, directly node coordinate is saved or is updated in routing table;If Flag is 1, then the coordinate of neighbor node oneself is obtained according to node coordinate, Bit String.
Preferably, the distance d (C according to node c to destination node dc,Cd) and each neighbor node i to target section Distance d (the C of point di,Cd), it gets the nearest neighbor node i of the destination node d and specifically includes:
Calculate separately the coordinate C of present node ccTo the coordinate C of destination node ddDistance d (Cc,Cd) and neighbours' section The coordinate C of point iiTo the coordinate C of destination node ddDistance d (Ci,Cd), and calculate the difference D of the twoi=d (Cc,Cd)-d(Ci, Cd);
All neighbor node i of the present node c are traversed, difference corresponding with each neighbor node i is obtained;
Using the corresponding neighbor node i of maximum difference as the next-hop node of present node c.
Preferably, the structure of the extended head includes following field: next header fields, extended head length, source Node coordinate, source coordinate mask, destination node coordinate, coordinates of targets mask;
The extended head then is being parsed, destination node C is extracted described indCoordinate before, further includes:
Whether the type for checking next header fields of extended head is predefined type.
Preferably, the first state is expressed as 0x00, and second state is expressed as 0x01, and the third state indicates For 0x02.
Preferably, the neighbor node judges whether to select the present node for father node according to preassigned;It is described Preassigned is determined by objective function, DAG attribute and local customized strategy.
The embodiment of the invention also provides a kind of RPL route devices based on greed insertion, comprising:
Data packet acquiring unit, for obtaining data packet to be transmitted;Wherein, the IPv6 extended head of the data packet is protected There is the coordinate C of destination node dd
Resolution unit therefrom extracts the coordinate C of the destination node d for parsing the extended headd
Neighbor node acquiring unit, for successively obtaining the coordinate C of neighbor node i from the routing table of itselfi;Wherein, For each node, routing table is stored with the coordinate of its neighbor node;
Nearest-neighbors node acquiring unit, for the distance d (C according to node c to destination node dc,Cd) and each neighbour Occupy node i to destination node d distance d (Ci,Cd), get the nearest neighbor node i of the destination node d;And
Data packet transmission unit, for the data packet to be transmitted to the nearest neighbor node i.
The embodiment of the invention also provides a kind of network topologies, including multiple nodes, wherein each node includes memory And processor, computer program and routing table are stored in the memory, and the computer program can be by the place It manages device to execute, to realize such as the above-mentioned RPL method for routing based on greed insertion.
The present invention is based on greed insertions and greed routing to optimize RPL routing, and greedy telescopiny and RPL are routed DODAG construction process natural fusion, fusion cost are low;Meanwhile it based on IPv6 Protocol Design and realizing RPL greed and is routed through Journey, the routing table of each node need to only save neighbor node coordinate, can make full use of non-tree side in greedy routing procedure, ensure that Routing scalability and efficiency are effectively promoted.
Detailed description of the invention
In order to illustrate more clearly of technical solution of the present invention, attached drawing needed in embodiment will be made below Simply introduce, it should be apparent that, the accompanying drawings in the following description is only some embodiments of the present invention, general for this field For logical technical staff, without creative efforts, it is also possible to obtain other drawings based on these drawings.
Fig. 1 is a kind of flow diagram for the RPL method for routing based on greed insertion that first embodiment of the invention provides.
Fig. 2 is another process signal for the RPL method for routing based on greed insertion that first embodiment of the invention provides Figure.
Fig. 3 is the data structure diagram that DEM controls message.
Fig. 4 is the flow diagram of DODAG building and greed insertion.
Fig. 5 is the flow diagram for the RPL route device based on greed insertion that second embodiment of the invention provides.
Fig. 6 is the network topology schematic diagram that second embodiment of the invention provides.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete Site preparation description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on Embodiment in the present invention, it is obtained by those of ordinary skill in the art without making creative efforts every other Embodiment shall fall within the protection scope of the present invention.
Fig. 1 and Fig. 2 is please referred to, first embodiment of the invention provides a kind of RPL method for routing based on greed insertion, packet Include following steps:
For each node c in network topology:
S101 obtains data packet to be transmitted;Wherein, the IPv6 extended head of the data packet preserves destination node d Coordinate Cd
Specifically, in the present embodiment, if the present node c is source node, the data packet can be uploaded by user It generates and is generated by source node by certain operation.If the present node c is not source node, in general, the data packet is By upper hop node-node transmission.
In the present embodiment, according to the message format of IPv6 agreement it is found that next head (Next can be passed through Header) field increases the extended head information of IPv6.Therefore, the present embodiment increases next head of a scheduled type Field (such as 0x8f) saves source node and destination node coordinate by IPv6 extended head.The field packet that extension header structure includes It includes: next header fields (8bits), extended head length (8bits), source node coordinate (32bits can also be changed to elongated), Source coordinate mask (32bits), destination node coordinate (32bits), coordinates of targets mask (32bits).
It should be noted that in above-described embodiment, the digit of each field can be arranged and without being limited thereto according to actual needs.
In the present embodiment, the node c first checks next header fields type after receiving the data packet, If type is predefined type (such as 0x8f), S102 is entered step, otherwise, is handled according to other Routing Protocols.
S102, parses the extended head, therefrom extracts the coordinate C of the destination node dd
S103 successively obtains the coordinate C of neighbor node i from the routing table of itselfi;Wherein, for each node, road The coordinate of its neighbor node is stored with by table.
In the present embodiment, the coordinate for first generating each node is needed first.The present embodiment is opened up network by greed insertion It flutters and is embedded into metric space, to distribute a coordinate in metric space for each node in network topology.Topological greed is embedding Enter to after metric space, each node only needs the coordinate for saving neighbor node as route table items.When routing, present node according to Coordinate distance avidly selects the next-hop node nearest away from destination node, this process of repetition can find the node that achieves the goal Greedy path.Greed insertion property can guarantee when data packet reaches any non-destination node, can find the next of greed Hop node.Therefore, the routing plan based on greed insertion can guarantee 100% routing success rate, be effectively reduced routing table scale, Greedy path also ensures high usage route simultaneously.
Specifically, the process of greed insertion can be divided into two steps: (1) proposing spanning tree from topology;(2) spanning tree is coveted The heart is embedded into metric space.Wherein, (1) step is similar with RPL routing construction DODAG process, therefore, can construct with DODAG Journey blends.(2) step this programme is using prefix trees as metric space, using prefix insertion as specific greedy insertion side The coordinate frame of method, prefix insertion is clear, and length is expansible, and having document proves that in the case where power law is 2~3 topologys, coordinate is long Degree is O (log2(n)) bit, and experiment effect is much better than theoretical value.
Wherein, when carrying out prefix insertion, a Bit String is distributed for each node, the coordinate of node is from root node The level Bit String that the Bit String of all nodes is constructed according to hierarchical relationship on to the node path.Such as from root node to a certain The Bit String of node is respectively 0,01,110, then the node coordinate is/0/01/110.If while there are weight, before Bit String In addition side right value, such as/(2) 0/ (1) 01/ (3) 110.The prefix insertion of spanning tree is considered as based on before spanning tree building Sew the process of tree, only needs primary top-down tree traversal can be completed, therefore, the process of greed insertion can also be dissolved into naturally In DODAG building.
It should be noted that the configuration mode of Bit String can configure according to actual needs, the present invention is not specifically limited.
In the present embodiment, DODAG building and greed insertion control message by RPL and realize.It is one that RPL, which controls message, The infomational message for the ICMPv6 that kind Type value is 155 distinguishes different types of control message, specific control message by Code field It is stored in Base field.Since spanning tree extraction of the invention and telescopiny are blended with DODAG building process, because This, the present invention deletes unnecessary DAO and DAO-ACK message, improves DIO message, and propose two kinds of new message types DIO-ACK,DEM(DODAG EMbedding),DCD(DODAG CoorDinate).Wherein, DIO message has used reserved field Flags indicates situation of change when node coordinate and preceding primary transmission DIO.0 indicates that the node coordinate does not change, and 1 indicates node Coordinate changes.When each node sends first DIO message to another node, initial Flags is set as 1.
DIO-ACK message is the response message of DIO message, continues to use DAO-ACK message format.DIO-ACK type of message Type continues to use the original value 155 of RPL, and message code Code is set as 0x04.DIO-ACK with DAO-ACK message Base field Structure is similar, but the DIO-ACK message is without including NODE PREFIX information.Meanwhile the meaning of the two Status field is different, The Status field of DIO-ACK includes three types:
0x00 expression has received DIO message, but with no treatment;
0x01 expression has received DIO message, waits DEM message to be received, information needed for generating node coordinate with acquisition;
0x02 expression has received DIO message, DEM message to be received is waited, to obtain neighbor coordinate.
DEM returns to the message of different content according to the type of message of DIO-ACK.The Code field of DEM message is arranged to 0x05.The specific structure is shown in FIG. 3 for the Base field of DEM.Wherein, RPLInstanceID, VersionNumber, DODAGID It is identical as existing RPL control message effect.Flag length is 2 bits, can be discussed in two kinds of situation: when DIO-ACK message status When for 0x02, DEM message Flag is that 00, Bitstring field is meaningless, that is, is returned only to coordinate;When DIO-ACK message status is When 0x01, DEM message Flag is that 01, Bitstring field is significant, and Coordinate is node coordinate of giving out a contract for a project, and Mask is to sit Mask is marked, for dividing the hierarchical structure of coordinate.
As shown in figure 4, Fig. 4 shows the process of DODAG building and greed insertion.Wherein,
1, for each present node c, in the coordinate C for obtaining itselfcIt afterwards, is DIO's to neighbor node i transmission types DIO message.For root node, the coordinate of itself need to be initialized.
After 2. neighbor node i receives the DIO message of present node c, judged whether to replace father node according to certain standard, Specific standards can be determined by objective function, DAG attribute and local customized some strategies;
If 3-1. neighbor node i selection is changed without father node, according to the Flags field of DIO message, there are two types of selections:
If a. Flags field is 0, illustrates that the coordinate of present node c does not change, then with no treatment, directly return The state of returning is the DIO-ACK message of 0x00, informs that present node c has been received by DIO message;
If b. Flags field is 1, illustrate that the coordinate of present node c has sent variation, then returns to the DIO- that state is 0x01 ACK message, request other side sends updated coordinate, and saves the coordinate C of neighbor node iiAs route table items.
If 3-2. neighbor node i selects replacement, present node c is father node, responds the DIO-ACK that state is 0x02 and disappears Breath;
If 4-1.a. present node c receives the DIO-ACK message of the 0x00 state of neighbor node i transmission, any place is not made Reason;
If b. root node receives the DIO-ACK message of the 0x01 state of neighbours' transmission, coordinate is encapsulated into DEM message, Flag is set as 0, and DEM message is returned to neighbor node.
4-2. present node c receives the DIO-ACK message of the 0x02 state of neighbor node i transmission, then is mentioned according to front And prefix be embedded in scheme, generate a Bit String for neighbor node i, the Bit String of the Bit String and other neighbor nodes i are not Together, and by the coordinate C of present node ccIt is encapsulated into DEM message together with Bit String, Flag is set as 1, and DEM message is returned to Neighbor node i.
5. neighbor node i receives DEM message, the Flag information of DEM message is checked, handle in two kinds of situation: if a. Flag It is 0, then directly by the coordinate C of present node ccIt saves or updates in routing table;If b. Flag is 1, according to present node c's Coordinate Cc, Bit String and side right value (if any) obtain the coordinate C of node oneselfi
In the present embodiment, after the node in whole network topology is carried out above-mentioned steps, it can realize DODAG structure It builds and greed is embedded in, so that each node obtains the coordinate of itself and is stored with the coordinate of its neighbor node.
S104, according to the distance d (C of node c to destination node dc,Cd) and each neighbor node i to destination node d's Distance d (Ci,Cd), get the nearest neighbor node i of the destination node d.
Specifically:
Firstly, calculating separately the coordinate C of present node c respectivelycTo the coordinate C of destination node ddDistance d (Cc,Cd), with And the coordinate C of neighbor node iiTo the coordinate C of destination node ddDistance d (Ci,Cd), and calculate the difference D of the twoi=d (Cc, Cd)-d(Ci,Cd)。
Then, all neighbor node i of the present node c are traversed, difference corresponding with each neighbor node i is obtained.
Finally, using the corresponding neighbor node i of maximum difference as the next-hop node of present node c.
It will be apparent that difference maximum illustrates that neighbor node i distance objective node d is nearest, therefore as next Hop node can improve the efficiency of routing.
In addition, it should be noted that, if the present node c judges that destination node d, can be direct in its routing table Using destination node d as next-hop node.
The data packet is transmitted to the nearest neighbor node by S105.
The present embodiment has the following beneficial effects:
1. prefix insertion is selected to be used for RPL routing optimality, improves existing RPL control message format and function, design are new RPL control message, realize greed insertion and DODAG construction process natural fusion, fusion cost it is small, communication complexity with DODAG maintains an equal level;
2. realizing the RPL greed routing based on coordinate on IPv6 protocol basis, each node need to only save local routing Information, and make full use of tree while and when non-tree routed, greed routing success rate 100%, at the same ensure that routing efficiently and It is expansible.
Referring to Fig. 5, second embodiment of the invention additionally provides a kind of RPL route device based on greed insertion, comprising:
Data packet acquiring unit 210 is used for data packet acquiring unit, for obtaining data packet to be transmitted;Wherein, described The IPv6 extended head of data packet preserves the coordinate C of destination node dd
Resolution unit 220 therefrom extracts the coordinate C of the destination node d for parsing the extended headd
Neighbor node acquiring unit 230, for successively obtaining the coordinate C of neighbor node i from the routing table of itselfi;Its In, for each node, routing table is stored with the coordinate of its neighbor node;
Nearest-neighbors node acquiring unit 240, for the distance d (C according to node c to destination node dc,Cd) and it is each Distance d (the C of neighbor node i to destination node di,Cd), get the nearest neighbor node i of the destination node d;And
Data packet transmission unit 250, for the data packet to be transmitted to the nearest neighbor node i.
Referring to Fig. 6, third embodiment of the invention additionally provides a kind of network topology, including multiple nodes, wherein each Node includes memory and processor, and computer program and routing table, the computer journey are stored in the memory Sequence can be executed by the processor, to realize such as the above-mentioned RPL method for routing based on greed insertion.
Wherein, as shown in fig. 6, by executing the above-mentioned RPL method for routing based on greed insertion, it can be achieved that from node A To the greed routing of node B.
Wherein, illustratively, the computer program can be divided into one or more units, one or more A unit is stored in the memory, and is executed by the processor, to complete the present invention.One or more of units It can be the series of computation machine program instruction section that can complete specific function, the instruction segment is for describing the computer program Implementation procedure in node.
The node may include, but are not limited to processor, memory.It will be understood by those skilled in the art that the signal Figure is only the example of node, and the not restriction of structure paired node may include than illustrating more or fewer components or group Close certain components or different components, for example, the node can also include input-output equipment, it is network access equipment, total Line etc..
Alleged processor can be central processing unit (Central Processing Unit, CPU), can also be it His general processor, digital signal processor (Digital Signal Processor, DSP), specific integrated circuit (Application Specific Integrated Circuit, ASIC), ready-made programmable gate array (Field- Programmable GateArray, FPGA) either other programmable logic device, discrete gate or transistor logic, Discrete hardware components etc..General processor can be microprocessor or the processor is also possible to any conventional processor Deng the control centre of the node utilizes the various pieces of various interfaces and the entire node of connection.
The memory can be used for storing the computer program and/or module, and the processor is by operation or executes Computer program in the memory and/or module are stored, and calls the data being stored in memory, described in realization The various functions of node.The memory can mainly include storing program area and storage data area, wherein storing program area can deposit Application program (such as sound-playing function, image player function etc.) needed for storing up operating system, at least one function etc.;Storage Data field, which can be stored, uses created data (such as audio data, phone directory etc.) etc. according to mobile phone.In addition, memory can It can also include nonvolatile memory, such as hard disk, memory, plug-in type hard disk, intelligence to include high-speed random access memory Energy storage card (SmartMedia Card, SMC), secure digital (Secure Digital, SD) card, flash card (Flash Card), at least one disk memory, flush memory device or other volatile solid-state parts.
Wherein, if the unit that the node integrates is realized in the form of SFU software functional unit and as independent product pin It sells or in use, can store in a computer readable storage medium.Based on this understanding, the present invention realizes above-mentioned All or part of the process in embodiment method can also instruct relevant hardware to complete by computer program, described Computer program can be stored in a computer readable storage medium, which, can be real when being executed by processor The step of existing above-mentioned each embodiment of the method.Wherein, the computer program includes computer program code, the computer journey Sequence code can be source code form, object identification code form, executable file or certain intermediate forms etc..It is described computer-readable Medium may include: any entity or device, recording medium, USB flash disk, mobile hard that can carry the computer program code Disk, magnetic disk, CD, computer storage, read-only memory (ROM, Read-Only Memory), random access memory (RAM, Random Access Memory), electric carrier signal, telecommunication signal and software distribution medium etc..It needs to illustrate It is that the content that the computer-readable medium includes can be fitted according to the requirement made laws in jurisdiction with patent practice When increase and decrease, such as in certain jurisdictions, according to legislation and patent practice, computer-readable medium does not include electric carrier wave letter Number and telecommunication signal.
It should be noted that the apparatus embodiments described above are merely exemplary, wherein described be used as separation unit The unit of explanation may or may not be physically separated, and component shown as a unit can be or can also be with It is not physical unit, it can it is in one place, or may be distributed over multiple network units.It can be according to actual It needs that some or all of the modules therein is selected to achieve the purpose of the solution of this embodiment.In addition, device provided by the invention In embodiment attached drawing, the connection relationship between module indicate between them have communication connection, specifically can be implemented as one or A plurality of communication bus or signal wire.Those of ordinary skill in the art are without creative efforts, it can understand And implement.
The above is a preferred embodiment of the present invention, it is noted that for those skilled in the art For, various improvements and modifications may be made without departing from the principle of the present invention, these improvements and modifications are also considered as Protection scope of the present invention.

Claims (10)

1. a kind of RPL method for routing based on greed insertion, which comprises the steps of:
For each node c in network topology:
Obtain data packet to be transmitted;Wherein, the IPv6 extended head of the data packet preserves the coordinate C of destination node dd
The extended head is parsed, the coordinate C of the destination node d is therefrom extractedd
The coordinate C of neighbor node i is successively obtained from the routing table of itselfi;Wherein, for each node, routing table is stored with The coordinate of its neighbor node;
According to the distance d (C of node c to destination node dc,Cd) and each neighbor node i to destination node d distance d (Ci, Cd), get the nearest neighbor node i of the destination node d;And
The data packet is transmitted to the nearest neighbor node i.
2. the RPL method for routing according to claim 1 based on greed insertion, which is characterized in that further include:
Network topology is embedded into metric space by greed insertion, to distribute metric space for each node in network topology In coordinate;Wherein, after topological greed is embedded into metric space, the routing table of each node only saves the seat of its neighbor node Mark.
3. the RPL method for routing according to claim 2 based on greed insertion, which is characterized in that in network topology Each node, be that each node distributes a Bit String by prefix trees, the coordinate of node is from root node to the node The level Bit String that the Bit String of all nodes is constructed according to hierarchical relationship on path.
4. the RPL method for routing according to claim 3 based on greed insertion, which is characterized in that the routing of each node Table obtains in the following way:
Repeat the steps of each node until in traverses network topology:
Present node is after the coordinate for getting itself, the message packet for being DIO to its neighbor node transmission types;Wherein, root The initial coordinate of node is by root node itself original allocation;The message packet includes Flags field;Wherein, neighbor node connects After the message packet for receiving the present node, judge whether to select present node for father node;If neighbor node does not select institute Stating present node is father node, then is proceeded as follows according to the Flags field of the message packet: if Flags field is 0, Illustrate that the coordinate of the present node does not change, then with no treatment, and the DIO-ACK for directly returning to first state disappears Breath, informs that the present node has been received by message packet;If Flags field is 1, illustrate that the present node coordinate is become Change, then return to the DIO-ACK message of the second state, requests the present node to send updated coordinate, and save to itself Routing table;If neighbor node selects the present node for father node, the DIO-ACK message of the third state is responded;
If the present node receives the DIO-ACK message of the first state of neighbor node transmission, with no treatment;If connecing The DIO-ACK message for receiving the second state of neighbor node transmission, then be encapsulated into DEM for the coordinate of itself, and Flag is set as 0 Afterwards, DEM is returned into neighbor node;If the DIO-ACK message of the third state of neighbor node transmission is received, according to prefix Insertion scheme generates a Bit String for neighbor node, and the coordinate of node itself is encapsulated into DEM message together with Bit String, Flag is set as 1, and DEM message is returned to the neighbor node;Wherein, the neighbor node receives DEM message, checks The Flag field of DEM message;Wherein, if Flag is 0, directly node coordinate is saved or is updated in routing table;If Flag is 1, then the coordinate of neighbor node oneself is obtained or updated according to node coordinate, Bit String.
5. each module RPL method for routing described in claim 1 based on greed insertion, which is characterized in that described according to node c To the distance d (C of destination node dc,Cd) and each neighbor node i to destination node d distance d (Ci,Cd), it gets described Destination node d nearest neighbor node i is specifically included:
Calculate separately the coordinate C of present node ccTo the coordinate C of destination node ddDistance d (Cc,Cd) and neighbor node i Coordinate CiTo the coordinate C of destination node ddDistance d (Ci,Cd), and calculate the difference D of the twoi=d (Cc,Cd)-d(Ci,Cd);
All neighbor node i of the present node c are traversed, difference corresponding with each neighbor node i is obtained;
Using the corresponding neighbor node i of maximum difference as the next-hop node of present node c.
6. the RPL method for routing according to claim 1 based on greed insertion, which is characterized in that the extended head Structure includes following field: next header fields, extended head length, source node coordinate, source coordinate mask, destination node seat Mark, coordinates of targets mask;
The extended head then is being parsed, before the coordinate that destination node d is extracted described in, further includes:
Whether the type for checking next header fields of extended head is predefined type.
7. the RPL method for routing according to claim 4 based on greed insertion, which is characterized in that the first state table It is shown as 0x00, second state is expressed as 0x01, and the third state is expressed as 0x02.
8. the RPL method for routing according to claim 4 based on greed insertion, which is characterized in that the neighbor node root Judge whether to select the present node for father node according to preassigned;The preassigned by objective function, DAG attribute and Local customized strategy determines.
9. a kind of RPL route device based on greed insertion characterized by comprising
Data packet acquiring unit, for obtaining data packet to be transmitted;Wherein, the IPv6 extended head of the data packet is preserved The coordinate C of destination node dd
Resolution unit therefrom extracts the coordinate C of the destination node d for parsing the extended headd
Neighbor node acquiring unit, for successively obtaining the coordinate C of neighbor node i from the routing table of itselfi;Wherein, for every A node, routing table are stored with the coordinate of its neighbor node;
Nearest-neighbors node acquiring unit, for the distance d (C according to node c to destination node dc,Cd) and each neighbours section Distance d (the C of point i to destination node di,Cd), get the nearest neighbor node i of the destination node d;And
Data packet transmission unit, for the data packet to be transmitted to the nearest neighbor node i.
10. a kind of network topology, which is characterized in that including multiple nodes, wherein each node includes memory and processing Device is stored with computer program and routing table in the memory, and the computer program can be executed by the processor, To realize the RPL method for routing based on greed insertion as described in claim 1 to 8 any one.
CN201910083664.1A 2019-01-29 2019-01-29 Greedy embedding-based RPL routing method and device and network topology Active CN109617812B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910083664.1A CN109617812B (en) 2019-01-29 2019-01-29 Greedy embedding-based RPL routing method and device and network topology

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910083664.1A CN109617812B (en) 2019-01-29 2019-01-29 Greedy embedding-based RPL routing method and device and network topology

Publications (2)

Publication Number Publication Date
CN109617812A true CN109617812A (en) 2019-04-12
CN109617812B CN109617812B (en) 2021-04-23

Family

ID=66020939

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910083664.1A Active CN109617812B (en) 2019-01-29 2019-01-29 Greedy embedding-based RPL routing method and device and network topology

Country Status (1)

Country Link
CN (1) CN109617812B (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111654445A (en) * 2020-07-10 2020-09-11 清华大学 Data packet transmission method, information processing method, node device and medium
CN112153670A (en) * 2019-06-28 2020-12-29 北方工业大学 Energy-saving data aggregation method for wireless sensor network
CN116016336A (en) * 2022-12-30 2023-04-25 郑州中科集成电路与系统应用研究院 HRPL-based high-efficiency inter-node communication method
CN116501691A (en) * 2023-06-27 2023-07-28 北京燧原智能科技有限公司 Automatic layout method and device of interconnection system, electronic equipment and storage medium

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130215942A1 (en) * 2012-02-22 2013-08-22 Cisco Technology, Inc. Application-aware dynamic bit-level error protection for modulation-based communication
CN103619045A (en) * 2013-11-21 2014-03-05 中国科学院信息工程研究所 Route establishing method and system of low-consumption lossy network
US20150319084A1 (en) * 2012-09-28 2015-11-05 Cisco Technology, Inc. Routing messages in a computer network using deterministic and probalistic source routes
CN107612743A (en) * 2017-10-11 2018-01-19 深圳天珑无线科技有限公司 Network topology information acquisition method and method for repairing route
CN108768736A (en) * 2018-06-05 2018-11-06 中国人民解放军国防科技大学 Optimization method of hybrid service function chain embedding cost
CN108965128A (en) * 2018-07-11 2018-12-07 常州工程职业技术学院 A kind of DODAG building optimization algorithm based on RPL agreement

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130215942A1 (en) * 2012-02-22 2013-08-22 Cisco Technology, Inc. Application-aware dynamic bit-level error protection for modulation-based communication
US20150319084A1 (en) * 2012-09-28 2015-11-05 Cisco Technology, Inc. Routing messages in a computer network using deterministic and probalistic source routes
CN103619045A (en) * 2013-11-21 2014-03-05 中国科学院信息工程研究所 Route establishing method and system of low-consumption lossy network
CN107612743A (en) * 2017-10-11 2018-01-19 深圳天珑无线科技有限公司 Network topology information acquisition method and method for repairing route
CN108768736A (en) * 2018-06-05 2018-11-06 中国人民解放军国防科技大学 Optimization method of hybrid service function chain embedding cost
CN108965128A (en) * 2018-07-11 2018-12-07 常州工程职业技术学院 A kind of DODAG building optimization algorithm based on RPL agreement

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
YANBIN SUN,ET. AL: ""Greedy Embedding Strategy for Dynamic Graphs Based on Spanning Tree"", 《ICCCS 2018:CLOUD COMPUTING AND SECURITY》 *
孙彦斌,等: ""基于贪心嵌入的几何路由可扩展问题研究"", 《智能计算机与应用》 *
孙彦斌: ""面向ICN的可扩展名字路由机理研究"", 《中国博士学位论文全文数据库信息科技辑》 *

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112153670A (en) * 2019-06-28 2020-12-29 北方工业大学 Energy-saving data aggregation method for wireless sensor network
CN112153670B (en) * 2019-06-28 2023-05-05 北方工业大学 Energy-saving data aggregation method for wireless sensor network
CN111654445A (en) * 2020-07-10 2020-09-11 清华大学 Data packet transmission method, information processing method, node device and medium
CN116016336A (en) * 2022-12-30 2023-04-25 郑州中科集成电路与系统应用研究院 HRPL-based high-efficiency inter-node communication method
CN116016336B (en) * 2022-12-30 2024-04-23 郑州中科集成电路与系统应用研究院 HRPL-based efficient inter-node communication method
CN116501691A (en) * 2023-06-27 2023-07-28 北京燧原智能科技有限公司 Automatic layout method and device of interconnection system, electronic equipment and storage medium
CN116501691B (en) * 2023-06-27 2023-09-22 北京燧原智能科技有限公司 Automatic layout method and device of interconnection system, electronic equipment and storage medium

Also Published As

Publication number Publication date
CN109617812B (en) 2021-04-23

Similar Documents

Publication Publication Date Title
CN109617812A (en) A kind of RPL method for routing, device and network topology based on greed insertion
CN1327667C (en) Multicast route in AD-HOC network
Misra et al. An ant swarm-inspired energy-aware routing protocol for wireless ad-hoc networks
CN108112049A (en) A kind of wireless sensor network efficiency optimization cluster-dividing method based on gam algorithm
CN105246117B (en) A kind of implementation method of the energy-saving routing protocol suitable for mobile wireless Sensor Network
CN103986661B (en) A kind of multicast route method for supporting network code
CN108696438A (en) The retransmission method and device of BIER messages
CN107579758A (en) A kind of two-way alternate communication method based on G3 PLC
Jia et al. A BUS‐aided RSU access scheme based on SDN and evolutionary game in the Internet of Vehicle
CN106941447A (en) Free space optical network routing method based on Ants model
Cao et al. uCast: Unified connectionless multicast for energy efficient content distribution in sensor networks
Sutariya et al. A survey of ant colony based routing algorithms for manet
Upadhyay et al. Comparison and performance analysis of reactive type DSR, AODV and proactive type DSDV routing protocol for wireless mobile ad-hoc network, using NS-2 simulator
CN107181775A (en) Route selection method and routing arrangement in content center network
Zheng et al. Up-and-down routing through nested core-periphery hierarchy in mobile opportunistic social networks
CN101237412B (en) Packet delivery and route selection method
Qadir et al. Localized minimum-latency broadcasting in multi-radio multi-rate wireless mesh networks
Al Sharah et al. Trade-off between Energy Consumption and Transmission Rate in Mobile Ad-Hoc Network
Ilyas et al. A survey on the fundamental and advanced mobile ad hoc network routing protocols
Johnson QoS improvement in MANET using self organized balanced optimization
Garcia-Luna-Aceves et al. A new approach to on-demand loop-free routing in networks using sequence numbers
Shi et al. A Shapley value-based forwarding strategy in Information-Centric Networking
Brandl et al. An efficient source initiated on-demand data forwarding scheme for wireless sensor networks
Samyal et al. Comparision of MOFO drop policy with new efficient buffer management policy
Brandl et al. A simple pheromone based on-demand routing protocol for wireless sensor networks

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant