TWI351855B - A routing method with back-path-affirmed dynamic s - Google Patents

A routing method with back-path-affirmed dynamic s Download PDF

Info

Publication number
TWI351855B
TWI351855B TW96147998A TW96147998A TWI351855B TW I351855 B TWI351855 B TW I351855B TW 96147998 A TW96147998 A TW 96147998A TW 96147998 A TW96147998 A TW 96147998A TW I351855 B TWI351855 B TW I351855B
Authority
TW
Taiwan
Prior art keywords
path
node
packet
rreq
nodes
Prior art date
Application number
TW96147998A
Other languages
Chinese (zh)
Other versions
TW200926690A (en
Inventor
Sheau Ru Tong
Jen Hung Liao
Original Assignee
Univ Nat Pingtung Sci & Tech
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Univ Nat Pingtung Sci & Tech filed Critical Univ Nat Pingtung Sci & Tech
Priority to TW96147998A priority Critical patent/TWI351855B/en
Publication of TW200926690A publication Critical patent/TW200926690A/en
Application granted granted Critical
Publication of TWI351855B publication Critical patent/TWI351855B/en

Links

Landscapes

  • Mobile Radio Communication Systems (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Description

1351855 r si *. 九、發明說明: … 【發明所屬之技術領域】 ' ’ 本發明係關於一種反向路徑確認動態來源繞送方法 特別是關於利用一雙向連結偵測確認二節點(無線設備 )之間疋否存在著雙向路徑,以建立一無線網路之連線路 徑的方法。 【先前技術】 籲 ,無基礎式架構網路(MANET)係為由數個無線裝置 ,形成的網路…般而言’該無基礎式架構網路之繞送路 徑選擇方式大致可區分為以下數種繞送協定: < 1、主動式繞送協定(Proactive routing protoc〇i): ,稱為繞送表導向(table-driven),例如DSDV或CGSR 等協定,其原理為在無基礎式架構網路的每個節點之間, 透過疋期互相父換資訊來建立該繞送表,當需要傳送資料 時,係參照該繞送表選擇適當之路徑傳送資料。其優點是 • 資料傳送速度較快,但缺點則是容易耗費電力、必須浪費 憶體空間以儲存該繞送表、以及容易造成網路上充斥著 父換路後資料的控制訊息(control overhead ),進而導致 消耗過多的頻寬。 2、反應式繞送協定(ReaCtiVer〇utingpr〇t〇c〇l):又1351855 r si *. Nine, invention description: ... [Technical field of invention] ' ' The present invention relates to a reverse path confirmation dynamic source routing method, in particular to the use of a two-way connection detection to confirm two nodes (wireless devices) There is a two-way path between them to establish a connection path for the wireless network. [Prior Art] Calling, the infrastructure-free network (MANET) is a network formed by several wireless devices. In general, the routing path selection of the non-based infrastructure network can be roughly divided into the following. Several kinds of routing protocols: < 1. Proactive routing protocol (Proactive routing protoc〇i): called table-driven, such as DSDV or CGSR, the principle is that there is no basic Each node of the architecture network establishes the routing table through mutual exchange of information between the parents, and when the data needs to be transmitted, the appropriate routing is selected by referring to the routing table. The advantages are: • The data transfer speed is faster, but the disadvantage is that it is easy to consume power, it is necessary to waste the memory space to store the routing table, and the control overhead that is easy to cause the network to be filled with the data after the parent switch. This in turn leads to excessive bandwidth consumption. 2. Reactive routing agreement (ReaCtiVer〇utingpr〇t〇c〇l): again

- 稱為需求導向(〇n-demand ),例如 AODV、DSR、LMR 或ABRP等協定’其原理為當無基礎式架構網路之某一節 二而要傳輸 > 料時,方行提出要求,進而與欲接收資料之 μ 3建立路役。其優點是節省電力且不會造成網路充斥過 一 5 一 多的控制訊息’缺點則是若該無基礎式架構網路内傳輸資 料之頻率太高時,仍容易因過於頻繁的尋找路徑動作,而 損耗相關節點的電力。 3、混合式繞送協定(Hybrid routing protocol):係 採用主動式繞送協定(proactive routing protocol)及反應 式繞送協定(Reactive routing protocol)等前述二種協定 之混合方式。結合該二者之特性,可進一步將無基礎式架 構網路分為區域内(local area)與區域外,區域内係採用 主動式繞送協定,區域外則採用反應式繞送協定。 ^ 前述無基礎式架構網路(MANET)中任二節點(無 線設備)之間的溝通、訊息交換、資料傳送或接收等動作 ,皆必須依靠該節點(node)之發射功率(transmissi〇n power)及天線接收靈敏度(receive sensitivity)來決定二 節點彼此之間是否能互相交換訊息。另外,不同廠牌夂無 線設備的傳輸能力及天線接收靈敏度亦不盡相同,使得節 點與節點之間仍存在著「非對稱性傳輸能力」之關係。因 此由數個不同廢牌之無線設備所建立的無基礎式架構網 路,係可能會造成節點與節點之間產生單向路徑的情形, 對於般無基礎式架構網路必須依靠節點與節點之間互相 溝通以^資訊的需求條件下,無疑會產生重大的影響。 更詳。之切參閱第1圖所示,「非對稱性傳輸能力 」·將,致二節點之間僅能產生單―方向的傳輸路徑,例如 .固定式基地σ 11通常具有較高之傳輸能力,而筆記型 電腦12、個人行動數位助理13 (PDA)及行動電話14之 π之間向二此:從基地台η到筆記型電腦 大於行動數位助理ΰ 12也_輸能力 生生單向路獲之現象。整體:!話:兩者之間亦會產 所產生之單向路徑,係 。^非對稱性傳輪能力」 件,方可# ^成目㈣需透過雙向路徑條 範之2m線軌財(如職敗丨1所規 〈U S-RTS封包、被回應或㈣咖 勺 端節f僅能傳送而無法接收回應訊息二 ea 1’4是出現另—端節點僅能接 =㈣(Dumb)狀態,導致建立錯誤路徑之結果,進 而對網路運作效率產生相當大的影響。 =再以目讀為普遍使用之二種f知無線網路繞送方 又限於非對稱性傳輸能力」之無線設備所造成的 早向路㈣形,將可能產生的諸多問題為例提出說明: 1 AODV (Ad Hoc On Demand Destination Vector) DV疋_一種需求導向(〇n_demand)的繞送協定其 包含RREQ、RREP、RRER等三種封包,該繞送協定主 要係當一來源端節點需要通訊時,才尋找可用路徑以利資 料之傳送。當該來源端節點欲傳送資料時,首先會在該來 源^^郎點所屬之繞送路徑表(routing table)檢查是否有 到達一目的端節點的路徑資訊,具有該路徑資訊時,係直 接依據該繞送路徑表傳送相關資料,不具有該路徑資訊時 ’則啟動路徑尋找(Route Discovery)機制。此時,該來 源端卽點係以、;巳溢廣播(n〇〇ding )方式向鄰近節點發出 ^上一 j封包_田其他節點收_1^0封包時,會記 向路抑-之路^於其所屬之繞送路徑表,以便建立-雙 的端二:檢查,點所屬之繞送路徑表是否有到達該目 ,若有目I路徑資訊’若無再將該封包轉播出去 右有則回應RREP封白 節點收到該赃〇二予該來源端節點,直至該目的端 包$ 〜 Q封匕後,利用反向路徑送回RREP封 節點,當該來源端節點與目的端節點之間的 到該咖Ρ封包時,即可建立到達該目的端節點 表尸訊’直至該來源端節點收到該RREP封包後,係 不役已成功建立,進而可開始傳送資料。 二士 f外,A〇DV是利用節點間相互發送hell。mess'age /來做路彳工維護’各節點彼此之間會定期廣播heii〇 3嘴給鄰近節點,藉由鄰近節點是否回應訊息,以判 2先,所建立之職是否中斷。·:若未收到回應訊息 、,糸代表與該節關連線路徑可能已中斷,此時,係以 該RRER封包來通知其它節關_巾斷必縣新建立 新的路徑,進而達到維護路徑之目的。 如第2圖所示,—無基礎式架構網路係包含有一來 源端節點21 (S)、-第一中間節點22 (A)、一第二中間 節點23(B)、一第三中間節‘點24(c)及一目的端節二 25(D)。當該來源端節點21啟動路徑尋找(R_ Discovery)機制要求建立路徑時,可依照前述a〇dv繞 送協定之演算法找到該目的端節點25。當該目的端節點 25接收各地所傳來之RREQ封包時,假設該目的端節點 1351855 V *1 25所獲得的路徑分別為「S—C-^D」、「J§— - 「s—B—c—D」等三個路徑’依據aodv最== . Sh〇編path)演算法,該目的端節點25將會選擇跳^ (Hop Count)最少的路徑傳送該_ρ封包因此「 ♦S」即為回傳該丽封包至該來源端節點 ^ 要路徑。然而,假設該第三中間節點24之傳輸能力 到達該來源端節點21時,將造成該來源端節點21及 三中間節點24之間存在著單向路獲。因此,該第三^ • 節點24絲法正確的將該舰Ρ封包送達至該來 點21,該來源端節點21也因為無法接收來自該第三節= 24所回覆之rrep封包,而直接判定為連線路徑中斷···, 並重新啟動路徑尋找(R〇ute Disc〇very)機制。惟事實上 如「S—A—C_D」仍為可用的雙向路徑,但因為不是最 豆路徑而不被選用。整體而言,當網路之「非對稱性傳輪 能力」情形嚴重時,諸如此類的情形亦有可能增多,導^ 該來源端節點21不斷的重新啟動路徑尋找(R〇ute Discovery)機制,使得大量控制封包在網路中流藏,進 而造成廣播風暴,並影響到正常封包的傳送,故嚴重影響 網路效能。 ' 2、DSR (Dynamic Source Routing) : DSR 同樣是_ 種需求導向(on-demand)的繞送協定,係當來源端節點 需要通訊時才尋找可用路徑以利資料的傳送,且同樣包含 RREQ ' RREP與rrer等三種封包。DSR與前述a〇Dv 不同處在於不採用繞送路徑表(routing table)做為路徑 —9 — 據而疋另行採用路徑快取(route cache)記錄 2路k。當該來源端節點欲傳送資料至另—個節點時, ^源端節點係先自路徑快取(咖e eaehe)尋找是否有 =該目,節闕路师訊,若有難接利用該路徑傳 /賢^若無則啟動路徑尋找(Route Discovery)機制, 以 廣,(—―)方式向鄰近節點發出該^^封 =’其他即點收到該咖卩封包時,可先行確認自己是 处為該目的端節點,若是_傳該廳p封包至該來源端 ▲即點’若不是則從路徑快取(route cache)尋找有無到達 遠目的端節點的路徑’如具有該路徑資訊時,係將到達 目的端節點的路徑資訊加人該RRHP封包且_至該來源 端節點,如不具有該路㈣訊時,則加上該節點本身之^ 」徑資訊至該RREQ封包,再將封包㈣濫廣播方 式轉播出去。由於該RREQ封包之路徑資訊係記錄在路 徑快取(nmte cache)中,因此每個節點所記錄之路徑皆 是從該來源端節點到該節點本身的完整路徑資訊,直至該 目的端節點收到該RREQ封包後,再依據該、舰^封^ 内的路徑資訊反向送回該RREP封包至該來源端節點 表示路徑已成功建立,進而可開始傳送資料。 另外,DSR在維護路徑時,每—個節點都要偵測本 身與下-個節點的路徑是否中斷,當節點在傳送資料仏下 /個節點後,即㈣下-個節點^有轉送封包的動^ 梦無則直接判斷自己與下-個節點的路徑可能已經中斷, 進而發出該RRER封包給該㈣端節點,並將路徑快取( 1351855 route cache)的相關資訊刪除,前述判斷連線狀態之方式 係屬於被動式確認(Passive Acknowledgement)。 如第3圖所示,一無基礎式架構網路同樣包含有一 來源端節點21 (S)、一第一節點22 (A)、一第二節點23- called demand-oriented (〇n-demand), such as AODV, DSR, LMR or ABRP. The principle is that when there is no section 2 of the infrastructure network to transmit > Then establish a road with μ 3 to receive the data. The advantage is that it saves power and does not cause the network to be flooded with more than one control message. The disadvantage is that if the frequency of data transmission in the infrastructure without the infrastructure is too high, it is still easy to find the path action too frequently. While depleting the power of the relevant node. 3. Hybrid routing protocol: A hybrid method of the above two protocols, such as a proactive routing protocol and a reactive routing protocol. Combined with the characteristics of the two, the non-basic architecture network can be further divided into local area and area, the active routing agreement is adopted in the area, and the reactive routing agreement is adopted outside the area. ^ The communication, message exchange, data transmission or reception between any two nodes (wireless devices) in the aforementioned basic network (MANET) must rely on the transmit power of the node (transmissi〇n power) And the receiving sensitivity of the antenna to determine whether the two nodes can exchange messages with each other. In addition, the transmission capacity and antenna receiving sensitivity of different brands of wireless devices are also different, so that there is still a relationship of "asymmetric transmission capability" between nodes and nodes. Therefore, a non-basic architecture network established by a number of different wireless devices with different cards may cause a one-way path between nodes and nodes. For a basic infrastructure network, nodes and nodes must be relied upon. Under the conditions of communication with each other, there will undoubtedly be a major impact. More detailed. Referring to Figure 1, "Asymmetric Transmission Capability" will result in only a single-direction transmission path between the two nodes. For example, the fixed base σ 11 usually has a higher transmission capacity. The notebook computer 12, the personal action digital assistant 13 (PDA) and the mobile phone 14 π are two in between: from the base station η to the notebook computer is larger than the action digital assistant ΰ 12 also _ loss ability to generate a one-way road phenomenon . Overall:! Word: The one-way path between the two will also be produced. ^Asymmetric wheel capacity", can be #^成目(4) need to pass the two-way path to the 2m line of wealth (if the job is defeated by 1) U S-RTS packet, responded or (four) coffee spoon end section f can only transmit and can not receive the response message. ea 1'4 is the result of another - terminal node can only connect = (four) (Dumb) state, resulting in the establishment of the wrong path, which has a considerable impact on the efficiency of the network operation. The omnidirectional (four) shape caused by the wireless devices that are commonly used by the wireless network, which is commonly used, is limited to the asymmetric transmission capability, and the following problems are exemplified: 1 AODV (Ad Hoc On Demand Destination Vector) DV疋_ A demand-oriented (〇n_demand) routing protocol that includes three packets, RREQ, RREP, and RRER. The routing protocol is mainly when a source node needs communication. Finding the available path to facilitate the transmission of the data. When the source node wants to transmit the data, it first checks whether there is a path information reaching the destination end node in the routing table to which the source ^^ Lang point belongs. Have the road In the case of the path information, the related data is directly transmitted according to the routing path table. If the path information is not available, the Route Discovery mechanism is started. At this time, the source end point is 、; 〇〇 ding ) method to send a j packet to the neighboring node _ other nodes in the field receive the _1 ^ 0 packet, will be recorded to the road - the road ^ in its own routing path table, in order to establish - double end 2: Check if the routing path table to which the point belongs has reached the destination. If there is a destination I path information, if the packet is not broadcasted to the right, then the RREP packet is received and the source is received. The node is sent back to the RREP sealing node by using the reverse path until the destination end package is $~Q, and when the source end node and the destination end node arrive at the curry packet, the node can be established to reach the destination end. The node table corpse 'until the source node receives the RREP packet, the system is successfully established, and then the data can be transmitted. In addition to the second sf, the A 〇 DV uses the nodes to send hell to each other. mess'age / To do the road maintenance, the nodes will meet each other. The period broadcasts the mouth of the heii〇3 to the neighboring node, and whether the neighboring node responds to the message to determine whether the established position is interrupted. If the response message is not received, the representative of the link to the section may have been Interrupted, at this time, the RRER packet is used to notify other festivals. The new path is established in the county, and the maintenance path is established. As shown in Fig. 2, the basic infrastructure network includes one. The source end node 21 (S), the first intermediate node 22 (A), the second intermediate node 23 (B), a third intermediate section 'point 24 (c), and a destination end section two 25 (D). When the source end node 21 initiates a path finding (R_Discovery) mechanism to establish a path, the destination end node 25 can be found in accordance with the aforementioned algorithm for the a〇dv routing protocol. When the destination end node 25 receives the RREQ packet sent from various places, it is assumed that the path obtained by the destination end node 1351855 V *1 25 is "S-C-^D" and "J§--" s-B -c-D" and other three paths 'according to the aodv most == . Sh〇 path) algorithm, the destination end node 25 will select the path with the lowest (Hop Count) to transmit the _ρ packet, thus "♦S That is to return the RB to the source node ^ to the path. However, assuming that the transmission capability of the third intermediate node 24 reaches the source end node 21, there will be a one-way acquisition between the source end node 21 and the three intermediate nodes 24. Therefore, the third node 24 correctly sends the ship's packet to the point 21, and the source node 21 also directly determines that the rrep packet from the third section = 24 cannot be received. Interrupt the connection path, and restart the path search (R〇ute Disc〇very) mechanism. In fact, such as "S-A-C_D" is still a two-way path available, but it is not used because it is not the most bean path. On the whole, when the "asymmetric transmission capability" of the network is serious, such a situation may also increase, and the source node 21 continuously restarts the path finding function (R〇ute Discovery) mechanism, so that A large number of control packets are logged in the network, which causes broadcast storms and affects the transmission of normal packets, thus seriously affecting network performance. 2, DSR (Dynamic Source Routing): DSR is also a kind of on-demand routing agreement, when the source node needs communication, it can find the available path to facilitate the transmission of data, and also contains RREQ ' Three kinds of packets, RREP and rrr. The DSR differs from the aforementioned a〇Dv in that it does not use a routing table as a path—9—and instead uses a route cache to record two paths k. When the source node wants to transmit data to another node, the source node first learns from the path cache (cae e ehehe) to find out if there is = the target, the festival road teacher, if it is difficult to use the path to pass / 贤^ If no, then the Route Discovery mechanism is issued to the neighboring node in a wide, (-) manner. ^^ The other point is that when the cookie packet is received, it can be confirmed first. For the destination end node, if it is _ the office p package to the source ▲ point 'if not, then from the route cache (route cache) to find the path to the end destination node if there is information about the path Adding the path information to the destination end node to the RRHP packet and _ to the source end node, if there is no such path (four), adding the path information of the node itself to the RREQ packet, and then encapsulating the packet (4) Broadcast by over-broadcasting. Since the path information of the RREQ packet is recorded in the path cache (nmte cache), the path recorded by each node is the complete path information from the source end node to the node itself until the destination end node receives After the RREQ packet is encapsulated, the RREP packet is sent back to the source end node according to the path information in the ship, and the path is successfully established, so that the data can be transmitted. In addition, when the DSR maintains the path, each node must detect whether the path of itself and the next node is interrupted. When the node transmits the data/nodes, that is, (4) the next node has a forwarding packet. If there is no dream, it is directly judged that the path between the user and the next node may have been interrupted, and then the RRER packet is sent to the (four) end node, and the related information of the path cache (1351855 route cache) is deleted, and the foregoing connection status is judged. The method is a passive acknowledgement (Passive Acknowledgement). As shown in FIG. 3, a basic infrastructure network also includes a source node 21 (S), a first node 22 (A), and a second node 23.

(B)、一第三節點24 (C)及一目的端節點25 (D)。當 該來源端節點21需要傳送資料時,會從路徑快取(r〇ute cache)找出是否有可到達該目的端節點25的路徑資訊, 若無則採氾濫廣播(flooding)方式發出該rreq封包尋 找路徑,例如:獲得的路徑係為「S—C—D」。另外,假(B), a third node 24 (C) and a destination end node 25 (D). When the source end node 21 needs to transmit data, it will find out from the path cache (r〇ute cache) whether there is path information that can reach the destination end node 25. If not, the flooding mode is used to issue the rreq. The packet looks for a path, for example, the obtained path is "S-C-D". In addition, false

設該第三節點24之傳輸能力無法到達該來源端節點21時 」可再由該目的端節點25以氾濫廣播(fl〇〇ding)方式尋 找可用路徑,例如:獲得的路徑係以「D—c—A_^s路 徑做為回應路徑。因此,DSR可以建立出二條非對稱性 的路徑,允許資料封包之送出路徑與回應路徑不同。然而 ’當該來源端節點21及目的端節點25各自執行路㈣找 (R_ Discovery)機制’以建立非對稱的二條路徑盆 雖可解決前述AODV之單向路徑問題,惟該來源 21及目的端節點25各自執行氾濫廣播,亦相 路產生廣播風暴(Broadcast Storm)等問題。 網 綜上所述,前述A0DV與DSR在星 輸能力」的網路環境下,皆會受到單向路增= AODV容易因選擇最短路徑而造成路=日1中 雖允許使用二條單向之非對稱路#,㈣=誤’咖 性傳輸能力」程度嚴重時,健會造成路彳^ ^對稱 —11 — 1351855 ,進而嚴重影響網路效能 【發明内容】 且亦產生路徑維護上的困難。 本發蚊主要目的雜供-種反向路财認動態來 源繞送方法,其係藉由事先制二節點間是否存在 徑,以改善習知無線網路繞送方法(A〇Dv與D心路 徑建立成本過高之缺點,使得本㈣具有提升路 = 率及降低網路控制訊息等功效。 政 本發明之另-目的係提供—種反向路When the transmission capability of the third node 24 cannot reach the source end node 21, the destination end node 25 can further search for an available path by flooding, for example, the obtained path is "D- The c-A_^s path is used as the response path. Therefore, the DSR can establish two asymmetric paths, which allow the data packet to be sent out differently from the response path. However, when the source node 21 and the destination node 25 perform respectively The road (4) finds the (R_Discovery) mechanism to establish an asymmetric two-path basin. Although the unidirectional path problem of the aforementioned AODV can be solved, the source 21 and the destination end node 25 each perform a flood broadcast, and a broadcast storm is generated in the same way (Broadcast) Storm) and other issues. In the network, the above A0DV and DSR in the network environment of the "star power" will be subject to one-way increase = AODV is easy to choose because of the shortest path. Two one-way asymmetric roads #, (4) = wrong 'coffee transmission capacity' is serious, the health will cause the road ^ ^ symmetry - 11 - 1351855, which will seriously affect the network performance [invention] It also creates difficulties in path maintenance. The main purpose of the present invention is to improve the conventional wireless network routing method (A〇Dv and D heart) by pre-determining whether there is a path between two nodes. The shortcomings of the path establishment cost are too high, so that the (4) has the functions of improving the road rate and reducing the network control information. The other purpose of the invention is to provide a reverse path.

源繞送方法’其係藉由—回應路徑各節點之間雔二拉 徑’以便_路財斷情形,使得本發明具有提升ς徑J 護便利性之功效。The source routing method 'by responding to the two-way path between the nodes of the path in order to make the invention have the effect of improving the convenience of the path.

;根據本發明之反向路徑確認動態來源繞送方法,其 係藉由-來源端節點發出一臓Q封包以供至少一中間 節點接收;並_雙向祕_確認财Μ點與發出該 RREQ封包之節點是否存在一雙向路徑,且配合將該 封包進行轉播,直至找丨_目的端節點;最後苒依 據該RREQ _包找出—送出路徑及—回應路徑,以一無 線網路之路徑建立作業。 ,·- 7 【實施方式】 為讓本發明之上述及其他目的、特徵及優點能更明 顯易懂’下文特舉本發明之較佳實施例’並配合所附圖式 ’作洋細說明如下: δ青參照4圖所示’本發明反向路徑確認動態來源繞 送方法係用以建立一無基礎式架構網路的連線路徑其步 —12 — 驟包含一路徑要求步驟S1、一封包轉播步驟S2及一路徑 7立步驟S3。本發明主要係於該封包轉播步驟S2中透過 「雙向連結偵測」偵測二節點(無線設備)是否存在著雙 路k ’以便於一無線網路建立一送出路徑 Path)及一回應路徑(back path),進而可供進行相關資 料之進行無線傳輸作業。The reverse path acknowledgement dynamic source routing method according to the present invention, wherein the source node sends a 臓Q packet for at least one intermediate node to receive; and the _ two-way secret _ confirms the financial point and issues the RREQ packet Whether there is a bidirectional path in the node, and cooperates to relay the packet until the destination node is found; finally, according to the RREQ_packet, the path is sent out and the response path is used to establish a path of the wireless network. . The above and other objects, features and advantages of the present invention will become more <RTIgt; : δ青 Refer to FIG. 4 'The reverse path confirmation dynamic source routing method of the present invention is used to establish a connection path without a basic architecture network. Step 12 - Step 1 includes a path requirement step S1, a packet The relaying step S2 and the path 7 are step S3. The present invention mainly detects whether the two nodes (wireless devices) have two paths k ' to facilitate a wireless network to establish a sending path Path) and a response path through the "two-way link detection" in the packet forwarding step S2. Back path), which can be used for wireless transmission of related data.

本發明反向路徑確認動態來源繞送方法,玍要係藉 由事先判斷一無基礎式架構網路(MANET)之任二個節 點(無線設備)之間是否存在著雙向路徑(bi directi〇nal 麵)’以作為後續傳輸路徑建立之重要依I該判斷二 ,即點之肢否存在雙向路徑的方式稱為「雙向連結侧 〜d—al path test ’ BL咖)」。該雙向連結偵測主 ,:'將二個節點(ni、nj)之傳輸功率分別以丁1、乃表示 =靈敏度分別以Si、Sj表示,二個節點(ni、nj)之The reverse path confirmation dynamic source routing method of the present invention is based on judging whether there is a bidirectional path between two nodes (wireless devices) of a non-basic architecture network (MANET) (bi directi〇nal) The method of 'being as the follow-up transmission path is determined according to I. The second method is that the method of "two-way connection side ~ d-al path test 'BL coffee". The two-way connection detects the main,: 'The transmission power of the two nodes (ni, nj) is represented by D1, respectively, and the sensitivity is represented by Si and Sj, respectively, and the two nodes (ni, nj)

衰減(path loss)則以pl&lt;i,表示另假設二 之路徑衰減相等(即Pl&lt;i,卜网,i&gt;)。藉此, ):此U列二個條件,即可表示該二個節點(η )彼此之間存在著雙向路徑 •⑴ (2) 更詳言之 屮/娜-當一節點(Ilj)收到另-節點⑷ 出的RREQ封包後,即代 技菸在名,a 口點(叫)至節點(η』 路徑存在,當欲進一步判斷 」 路徑是否存在時。如第5 (nj)至卽點(ni 如第5圖所示’可於直接該RR! ~ 13 — 1351855 包另外加入一傳輪功率攔位(Tpower)、一接收靈敏度欄 ·-. 位(Rsense)及—聯繫值欄位(Ulink),以便判斷二個節 點(11丨、rij)之間疋否存在著雙向路徑(bidirectional path )。又’該RREQ封包除上述本發明額外加入之三個欄位 外,其同樣包含有如封包型式(pktType)、跳躍數(Hop ‘ Count)、路徑(Path)、…等基本欄位(該基本欄位内 . 容為習知無線通訊標準設定於此不再贅述)。當節點(卬 )發出一 RREQ封包時’可同時將該節點(ni)之傳輸功 φ 率(乃)及接收靈敏度(Si)填入該傳輸功率欄位(The path loss is pl &lt; i, indicating that the path attenuation of the second hypothesis is equal (ie, Pl &lt; i, 卜, i &gt;). By this, ): This U column two conditions, it can be said that the two nodes (η) have a two-way path between each other. (1) (2) More specifically 屮 / Na - when a node (Ilj) received After the RREQ packet from the node (4), the token is in the name, the a-point (call) to the node (n) path exists, when it is desired to further judge whether the path exists, such as the 5th (nj) to the defect (ni as shown in Figure 5 can be added directly to the RR! ~ 13 - 1351855 package with a transfer power block (Tpower), a receiver sensitivity bar ·-. (Rsense) and - contact value field ( Ulink), in order to determine whether there is a bidirectional path between the two nodes (11丨, rij). In addition, the RREQ packet contains the same three fields as the above-mentioned additional fields of the present invention. Basic fields such as pktType, Hop 'Count, Path, ... (the basic field is inside. When sending a RREQ packet, 'the transmission rate of the node (ni) can be simultaneously (received) and the receiving is sensitive. (Si) filling the power transmission field (

Tpower)及接收靈敏度攔位(Rsense),當節點(nj)收 到該RREQ封包時,係配合測量該rreq封包之訊號強 度(Rj),並同時取得該節點(ni)之傳輸功率(Ti)及接 收靈敏度(Si)。此時,如第6圖所示,再計算該節點(ni )至節點(η】)的路徑衰減(pi&lt;i,j&gt; = Ti_Rj),假設二 個即點(玛、η〗)之間的路徑衰減相等(即pl&lt;i,j&gt;==pl&lt;j ,P),若Tj —pl&lt;j,i&gt;2Si時,則代表、、節點(nj)至節 Φ 點(Ili )的路徑存在,亦即二個節點(ni、Hj )之間係每 在著雙向路徑。另外,該聯繫值欄位(ulink)係用以記 錄該二個節點(ni、nj)是否存在著雙向路徑,例如:當 設定為0時,係代表二個節點(rii'iij)之間的路徑為雙 向路徑;當設定為1時,係代表二個節點(ni、nj)之間 的路彳[為單向路徑(unidirectional path) » 5青再參照第4圖所示,本發明較佳實施例之路徑妻 求步驟S1係事先藉由一來源端節點發出一 RRgQ封包, —14 — 1351855 ' 1. 以要求建立路徑,並配合於該RREQ封包之傳輸功率欄 *· 位(TP〇wer)及接收靈敏度攔位(Rsense)分別填入★玄來 … 源端節點之傳輸功率及接收靈敏度,以及將該聯繫值^位 (Ulink)預設為符合雙向路徑之條件(例如設定為〇)。 其中該RREQ封包可由鄰近該來源端節點之至少一中間 ‘ 節點所接收,以便該中間節點可配合進行後續封包轉播步 * 驟S2,進而尋找出一目的端節點。 &gt;請參閱第4及7圖所示,係為本發明較佳實施例之 • 封包轉播步驟S2的工作流程圖,其係事先由一中間節點 收到來自其他節點(如該來源端節點或其他中間節點等) 所發出之RREQ封包(S11);次確認該中間節點是否即 為該目的端節點(S12 );當該中間節點係為該目的端節點 時’係直接選擇一回應路徑(back path) (S13);或者當 » -· . 該中間節點非為該目的端節點時,係利用前述「雙向連結 偵測(bi- directional path test,BL test)」,以確認該中間 鲁 節點與發出該RREQ封包之節點是否存在一雙向路徑(Tpower) and receiving sensitivity interception (Rsense), when the node (nj) receives the RREQ packet, it cooperates to measure the signal strength (Rj) of the rreq packet, and simultaneously obtains the transmission power (Ti) of the node (ni). And receiving sensitivity (Si). At this time, as shown in Fig. 6, the path attenuation of the node (ni) to the node (η) is calculated (pi&lt;i, j&gt; = Ti_Rj), assuming two points (ma, η) The path attenuation is equal (ie pl &lt; i, j &gt; == pl &lt; j , P), if Tj — pl &lt; j, i &gt; 2Si, then represents the path of the node (nj) to the node Φ point (Ili ) Existence, that is, between two nodes (ni, Hj) is in a bidirectional path. In addition, the contact value field (ulink) is used to record whether the two nodes (ni, nj) have a bidirectional path, for example, when set to 0, the system represents between two nodes (rii'iij). The path is a bidirectional path; when set to 1, it represents the path between two nodes (ni, nj) [unidirectional path] (5) and then refers to FIG. 4, which is preferred by the present invention. In the path of the embodiment, the step S1 is to issue an RRgQ packet by a source node in advance, -14 - 1351855 ' 1. to establish a path and cooperate with the transmission power column of the RREQ packet * bit (TP〇wer And the receiving sensitivity block (Rsense) respectively fill in the transmission power and receiving sensitivity of the source node, and preset the contact value (Ulink) to meet the condition of the bidirectional path (for example, set to 〇) . The RREQ packet may be received by at least one intermediate node adjacent to the source end node, so that the intermediate node can cooperate with the subsequent packet forwarding step S2 to find a destination end node. &gt; Referring to Figures 4 and 7, a flow chart of the packet forwarding step S2 of the preferred embodiment of the present invention is received from an intermediate node in advance by an intermediate node (e.g., the source node or The other intermediate node, etc.) sends the RREQ packet (S11); the secondary node confirms whether the intermediate node is the destination end node (S12); when the intermediate node is the destination end node, the system directly selects a response path (back) Path) (S13); or when the intermediate node is not the end node of the destination, the aforementioned "bi-directional path test (BL test)" is used to confirm the intermediate node and Whether there is a bidirectional path for the node that issued the RREQ packet (

Sl4);當不存在有雙向路徑時’係將該RREQ封包放入 一暫存串列(pending list),且該RREQ封包中之聯繫值 攔位(Ulink)係設定為符合單向路徑條件(例如設定為i ' )(S15);當存在有雙向路徑時,該中間節點係直接將窣 - 封包進行轉播(rebroadcast),並於該RREQ封包 同樣填入該中間節點之傳輸功率及接收靈敏度,且不會更 動該聯繫值攔位(Ulink)之内容(S16);又,該中間節 點亦會檢查該暫存串列(pending list) (S17);再配合尋 —15 — 找出疋否有^保留來自其他節點的封包( ;若於該暫存串賴_合條件之RREQ聽時,兮中 間節點係自該暫存串列取出該_Q封包並同時進^ 播(rebroadcast) (S19)。藉此,3 Ώ ^ 订轉 ^巧稭此,該RREQ封包即可 各中間節點依前述各步驟進行轉播動作,以找出該目的= 節點。 % 請再參照第4圖所示,本發明較佳實施例之路 立步驟S3 ’係於該目的端節點枚到該雖Q封包後 參照該RREQ #包之相關内容,以建立一送出路 forwarding path)及一回應路 # (backpath),該送出 係為該來㈣節點至該目的端節點之路徑,該回應路徑^ 為該目的端節點至該來源端節點之路徑。其中該送出 之建立條件’係選擇—個跳躍數(Ηϋρ c_t)最少^ 徑做為該送出路徑’並將該送出路經之相關資訊放入— _EP封包;又,該喊雜之建立條件,航 「跳躍數(Hop c〇unt)最少」及「聯繫值攔位(υι: ° 符合雙向路徑條件(例如設定為〇)」等。} 位(Ulink)符合雙向路徑條件時,必定有—路徑可1 至該來源端節點,使得該職p封包可依贱回應路徑祐月 傳送至該來源—,藉此完成該網路之路徑建立作I 請參閱第8圖所示,前述該回應路徑之建立條. 可包含「回應路徑之節點必須涵蓋送出路徑之所有矿愛另 ,以利於進行相關維護作業。當送出路徑之所有節黑ϋ —C—F—D)皆包含於回應路徑之所屬節點 c—B-A—S),且該回應路徑之連線皆為雙向路徑,當該 =出路#相應路㈣生路徑帽情形時,可立即被= 節點發現,並將路徑中斷資訊傳送至該來源端節點⑻。 例如:假設網路因該節點(F)離開而造成路徑中斷時, 雖然節點(c)受到單向路徑影響無法得知節點(e)已 經離開之事實,但仍可藉由符合雙向路録件之節點 )得知路徑中斷之事實,並將該路徑中斷之訊息回傳至該 來源端節點⑻。此時’該來源端節點(s)可快速的= 建中斷的路徑,故提供路徑維護之便利性。 、 請參照第9圖所示’係以本發明應用於建立—無義 礎式架構網路之連線路㈣例提出說明,該無基礎式^ 網路係包含-來源端節點31⑴、一第一中間節點&amp; 、一第二中間節點33⑻及-目的端節點3:(d) : 請配合參閱第1G ®所示,當該麵端節點31⑻發出 一 RREQ封包時,假設該第一中間節點32 (A)及第二 間節點33⑻可分別收到該來源端節點31所發^ RREQ封包(RREQO),且該第—中間節點32 (a)及 第二中間節點33 (B)亦確認非為該目的端節點% 後,係啟動雙向連結偵測,以判斷該第一中間節點32 )及第二中間節點33⑻與該來源端節點31⑻彼此 之間是否存在雙向雜。假設經由彳貞測結果得知該第— 間節點32⑷與該來源端節點31⑻存在有雙向路和 ,而該暫存㈣(pending list)目前亦無任科前所^ 之RREQ封包時,該舰Q封包之聯繫值搁位(υι_ 1351855 則不做任何更動(例如設定為Sl4); when there is no bidirectional path, the RREQ packet is placed into a pending list, and the contact value (Ulink) in the RREQ packet is set to conform to the one-way path condition ( For example, it is set to i ' ) (S15); when there is a bidirectional path, the intermediate node directly rebroadcasts the 窣-packet, and the RREQ packet also fills in the transmission power and receiving sensitivity of the intermediate node. And the content of the contact value (Ulink) is not changed (S16); in addition, the intermediate node also checks the pending list (S17); and then cooperates with -15 to find out if there is any ^Retain packets from other nodes (; if the RREQ listens to the temporary _ _ condition, the 兮 intermediate node takes the _Q packet from the temporary storage and simultaneously broadcasts (rebroadcast) (S19) By this, 3 Ώ ^ can be customized, the RREQ packet can be relayed by each intermediate node according to the foregoing steps to find the destination = node. % Please refer to FIG. 4 again, the present invention The step S3 of the preferred embodiment is attached to the destination node to the Q. After the packet, refer to the related content of the RREQ #package to establish a forwarding path and a backpath, and the sending is the path of the (4) node to the destination end node, and the response path ^ is the The path from the destination end node to the source end node. The establishment condition of the sending is 'selecting the number of hops (Ηϋρ c_t) at least ^ as the sending path' and putting the relevant information of the sending path into the _EP packet; and, the setting condition of the shouting, Navigation "Hop c〇unt" is the least" and "Contact value block (υι: ° meets the bidirectional path condition (for example, set to 〇)".} When the Ulink conforms to the bidirectional path condition, there must be a path. 1 to the source end node, so that the job p packet can be transmitted to the source according to the response path, thereby completing the path establishment of the network. Please refer to FIG. 8 for the foregoing response path. Create a bar. It may include "the node of the response path must cover all the mines of the delivery path to facilitate the related maintenance operations. When all the blackouts of the delivery path - C-F-D" are included in the node to which the response path belongs c-BA—S), and the connection path of the response path is a bidirectional path. When the =out way# corresponding road (four) raw path cap situation, it can be immediately found by the = node, and the path interruption information is transmitted to the source end. Node (8). For example: Assuming that the network is interrupted due to the node (F) leaving, although the node (c) is affected by the one-way path and cannot know the fact that the node (e) has left, it can still be used by the node that conforms to the two-way recording. Knowing the fact that the path is interrupted, and transmitting the message of the path interruption to the source node (8). At this time, the source node (s) can quickly establish the interrupt path, thus providing the convenience of path maintenance. Please refer to FIG. 9 for the description of the method for applying the invention to establish a network of unsense infrastructure networks. The non-basic network includes a source node 31(1) and a The first intermediate node &amp; a second intermediate node 33 (8) and the destination node 3: (d): Please refer to the description of the 1G®, when the polygon node 31 (8) issues an RREQ packet, the first intermediate is assumed The node 32 (A) and the second node 33 (8) can respectively receive the RREQ packet (RREQO) sent by the source node 31, and the first intermediate node 32 (a) and the second intermediate node 33 (B) also confirm After the % node of the destination is not used, the system initiates two-way link detection to determine Whether the first intermediate node 32) and the second intermediate node 33(8) and the source end node 31(8) are bidirectionally miscellaneous with each other. It is assumed that the inter-node 32(4) and the source end node 31(8) are bidirectionally determined by the result of the measurement. Road and, and the pending list (four) (pending list) is currently not in the RREQ package before the branch, the ship Q package contact value is placed (υι_ 1351855 does not make any changes (for example, set to

另外假》又經由偵測結果得知該第二中間節點幻 )與該來源端節點31 (S)不存在雙向路徑‘,則將該 RREQ封包巾之磐值齡(Ulink)設為〗(代表單向路 徑)’且該第二中間節點33 (B)亦在該路徑(Path)攔 代表為雙向路徑),且 徑(Path)欄位加入本 (EQ&lt;2&gt; )進行轉播( .位加入本身位址,並將該rrEq封包加又 該暫存串列(pending list)。又,當該第二中間節點μ ( B)亦收到由該第一中間節點32 (A)先前所轉播之該 RREQ封包(RREQ&lt;2&gt;),且經由雙向連結偵測結果得知 該第一中間郎點33 ( B )與該第一中間節點32 ( A )存在 有雙向路徑時,亦不須更動該聯繫值欄位(Ulink)之值 (依然设疋為0 )’並同樣在該路控(Path )搁位加入本身 位址,該RREQ封包内容係為如第9圖所示之RREQ&lt;4&gt; • 。藉此,該第二中間節點33 (B)除將該RREQ封包( RREQ&lt;4&gt; )進行轉播外,同時亦尋找該暫存串列( pending list)是否有先前保留來自其他節點之RREQ封包 ,進而可找到先前所保留之RREQ封包(RREQ&lt;3&gt;)。因 此,該第二中間節點33 (B)係同時轉播該二個RREQ封 包(RREQ&lt;3&gt;、RREQ&lt;4&gt;)。最後該目的端節點34 (D) 可收到二個來自不同路徑的RREQ封包(、、 RREQ&lt;4&gt;) 〇 —18 — 請參閱第10及u圖所示,當該目的端節點34 (D) 收到該二個RREQ封包(RREQ&lt;3&gt;、RREQ&lt;4&gt;)後,該 目的端節點34 (D)亦在該路徑(PaUi)欄位加入本身位 址,故該目的端節點34 (D)所收集到之RReq封包内容 ,係為如第9圖所示之RREQ&lt;5&gt;、RREQ&lt;6&gt;。藉此,可 參照該二個RREQ封包(RREQ&lt;5&gt;、RREQ&lt;6&gt;),以、弯 出符合「具有最少跳躍數(hop count)」條件的路徑做為 送出路徑(forwarding path),例如:獲得的路徑係為「s —B—D」,並將該送出路徑存放於一 rrep封包中。 ,再選出符合「具有最少跳躍數(hop coUnt) » Γ 」聯 值欄位(Ulink)設定為〇 (雙向路徑)」條件的路徑做 回應路徑(back path)。例如:獲得的路徑係為「〇 … A—S」’以便透過該回應路徑將該封包〜 源端節點31 (S),該來源端節點31 (S)則泉考^回該來 封包之内容,進而透過該送出路經將資料傳送至5 mep 卽點(D )。再者,前述回應路徑之選擇亦可S 「的^ 應路徑之節點須涵蓋該送出路徑上所有 〇入「該回In addition, the false detection "the second intermediate node illusion" and the source end node 31 (S) do not have a bidirectional path ', then the RREQ packet towel age value (Ulink) is set to 〖 (representative The unidirectional path) 'and the second intermediate node 33 (B) is also represented as a bidirectional path in the path (Path), and the Path field is added to the present (EQ&lt;2&gt;) for rebroadcasting. The own address, and the rrEq packet is added to the pending list. Also, when the second intermediate node μ (B) is also received by the first intermediate node 32 (A) The RREQ packet (RREQ &lt; 2 &gt;), and if the first intermediate point 33 ( B ) and the first intermediate node 32 ( A ) have a bidirectional path through the bidirectional connection detection result, the RREQ packet does not need to be changed. The value of the value field (Ulink) is still set to 0 (and is also set to 0)' and the same address is added to the path of the path, the RREQ packet content is RREQ&lt;4&gt; as shown in Fig. 9. In this way, the second intermediate node 33 (B) not only broadcasts the RREQ packet (RREQ &lt; 4 &gt; ), but also searches for the temporary string. Whether the pending list has previously reserved RREQ packets from other nodes, and thus the previously reserved RREQ packets (RREQ &lt;3&gt;) can be found. Therefore, the second intermediate node 33 (B) simultaneously broadcasts the two RREQs. Packet (RREQ &lt;3&gt;, RREQ &lt;4&gt;). Finally, the destination end node 34 (D) can receive two RREQ packets from different paths (,, RREQ &lt; 4 &gt;) 〇 - 18 - see 10th and As shown in the figure u, after the destination end node 34 (D) receives the two RREQ packets (RREQ &lt; 3 &gt;, RREQ &lt; 4 &gt;), the destination end node 34 (D) is also in the path (PaUi) column. The bit is added to its own address, so the content of the RReq packet collected by the destination end node 34 (D) is RREQ &lt;5&gt;, RREQ &lt;6&gt; as shown in Fig. 9. The RREQ packet (RREQ&lt;5&gt;, RREQ&lt;6&gt;) is used as a forwarding path for the path that meets the condition of "the least hop count". For example, the obtained path is "s -B-D", and the delivery path is stored in a rrep packet. The number of hops (hop coUnt) »Γ" with the Value column (Ulink) is set to square (two-way path) "conditions do respond path path (back path). For example, the obtained path is "〇...A-S"' to pass the packet to the source node 31(S) through the response path, and the source node 31(S) checks the contents of the packet. And then the data is transmitted to the 5 mep point (D) through the delivery path. Furthermore, the selection of the aforementioned response path may also be "the node of the path of the response" shall cover all the intrusions on the outgoing path.

如:該回應路徑「D—B—A—s」係涵蓋該」1條件’例 —B—D」,以利於進行後續維護作業。 ° ‘、路徑「S 如上所述,相較於習知無線網路繞送方 容易受到無__「非對難傳輪能力」aodv) 無線網路繞送方法(臟)在無法使用該适二: 以及另一習知 需等待相㈣點間彼此具有雙向路徑時,響’而必 徑建立,故具有路賊域本增加^缺點;可_完成路 做為回 應路似傳魏咖p封㈣ 啟動路徑尋找機制,以獲得 用= 亥目的端節點 有路徑建立時間大幅提 ①維::回應路徑,而具 發!係於具有「非對稱性傳輪二:的==點。本 在尋找路徑的過程π ^網路城中’仍可 徑’以做為後續該RREQ封包進行轉播 ===: 丹言 出路η ΓΓ躍數(hop count)之路徑做為送 出路仏仏出路徑可允許有單向路經之存在 t 路徑之各節點必須均為雙向路徑,以利於該RREP =勺心 回傳與路徑維護。另外,雖 二^ 匕之 路_可能包含有單向 輸效率。又4躍i(hopc°unt)較少而具有較佳之傳 ί當該回應路徑之節點涵蓋該送出路徑之所有 Ρ.,占時,更可利用該回應路徑各節點之間皆為雙向路徑 特性來進行、轉作t ’故在路徑雉護上亦更有效率。整體 而言,本發明大致可整理出如下所述之諸多優點: 丄、該回應路徑之所有節點皆為雙向路徑,故透過 該回應路彳i傳賴RREP封包時,該來源端節點將有更大 的機會收到該RREp封包。 2 &quot;T供選擇符合最少跳躍數(hop count)條件的 路徑作為送出路徑及回應路徑,以提供較佳的傳輸效率。 3、當該回應路徑之節點涵蓋該送出路徑之所有節 點時,由於該回應路徑之各節點均為雙向路徑,因此可以 較快速的得知是否具有路徑中斷之情形,以便重新建立路 1351855 徑。 , 4、藉由有條件的傳送該RRgQ封包,在「非射稱 . 性傳輪能力」的網路環境中,可更為快速的建立路徑及滅 夕控制訊息(controlling overhead )。 雖然本發明已利用上述較佳實施例揭示,然其龙非 用以限定本發明,任何熟習此技藝者在不脫離本發明之精 神和範圍之内,相對上述實施例進行各種更動與修改仍屬 本發明所保護之技術範嘴,因此本發明之保護範圍當視後 • 附之申請專利範圍所界定者為準。For example, the response path "D-B-A-s" covers the "1 condition" example - B-D" to facilitate subsequent maintenance operations. ° ', path "S As mentioned above, compared to the conventional wireless network around the party is vulnerable to no __ "non-difficult to carry the ability" aodv) wireless network routing method (dirty) can not be used Two: And another customary need to wait for the phase (four) points to have a two-way path between each other, the sound must be established, so it has the disadvantage of adding a road thief domain; can be completed in response to the road like Wei Wei (4) Start the path-finding mechanism to obtain a path-building time with ==Hai end node to significantly increase the 1-dimensional:: response path, and the fading! is based on the "========================================================= The path process π ^ network city 'can still be' as the subsequent RREQ packet broadcast ===: Dan Yan way out η hop count (hop count) path as the send way out path can be allowed The unidirectional path exists in the t path. Each node must be a bidirectional path to facilitate the RREP = key back and path maintenance. In addition, although the road _ may contain unidirectional transmission efficiency. i (hopc°unt) is less and has better pass. When the node of the response path covers the send All the paths of the path, which take up time, can be made by using the bidirectional path characteristic between the nodes of the response path, and it is also more efficient in the path protection. Therefore, the present invention is generally more efficient. The following advantages are summarized: 丄, all nodes of the response path are bidirectional paths, so when the response path passes through the RREP packet, the source node will have a greater chance of receiving the RREp packet. 2 &quot;T selects the path that meets the minimum hop count condition as the outgoing path and the response path to provide better transmission efficiency. 3. When the node of the response path covers all nodes of the outgoing path, Since each node of the response path is a bidirectional path, it is relatively quick to know whether there is a path interruption, so as to re-establish the path 1351855. 4. By conditionally transmitting the RRgQ packet, in the "non-shot" In the network environment of “sexual transmission capability”, the path and the controlling overhead can be established more quickly. While the present invention has been disclosed in its preferred embodiments, it is intended to be understood that the invention is not limited by the scope of the present invention. The technical scope of the present invention is protected by the scope of the invention, which is defined by the scope of the patent application.

21 1351855 * ·. 【圖式簡單說明】 . 第1圖:習知具有非對稱性傳輸能力之無線網路的示 意圖。 ' 第2圖:習知無線網路繞送方法(AODV)之路徑建 立示意圖。 第3圖:習知無線網路繞送方法(DSR)之路徑建立 示意圖。 第4圖:本發明反向路徑確認動態來源繞送方法的步 | 驟方塊示意圖。 第5圖:本發明反向路徑確認動態來源繞送方法所發 送之封包攔位架構示意圖。 第6圖:本發明反向路徑確認動態來源繞送方法所應 屹 — 一— 用之雙向連結偵測成立條件之示意圖。 第7圖:本發明反向路徑確認動態來源繞送方法步驟 S2之詳細步驟流程圖。 第8圖:本發明反向路徑確認動態來源繞送方法於進 參 行路徑維護之示意圖。 第9圖:本發明反向路徑確認動態來源繞送方法應用 於無線網路之路徑建立示意圖。 第10圖:本發明反向路徑確認動態來源繞送方法所使 用之各種封包示意圖。 * 第11圖:本發明反向路徑確認動態來源繞送方法建立 送出路徑及回應路徑之示意圖。 —22 — 1351855 【主要元件符號說明】 11 基地台 12 筆記型電腦 13 個人行動數位助理 14 行動電話 21 來源端節點 22 第一中間節點 23 第二中間節點 24 第三中間節點 25 目的端節點 31 來源端節點 32 第一中間節點 33 第二中間節點 34 目的端節點21 1351855 * ·. [Simple description of the diagram] Figure 1: Schematic of a wireless network with asymmetric transmission capabilities. Figure 2: Schematic diagram of the path of the conventional wireless network routing method (AODV). Figure 3: Schematic diagram of the path establishment of the conventional wireless network routing method (DSR). Figure 4: Schematic diagram of the step of the reverse path confirmation dynamic source routing method of the present invention. Figure 5 is a schematic diagram of a packet interception architecture sent by the reverse path confirmation dynamic source routing method of the present invention. Figure 6: The reverse path confirmation dynamic source routing method of the present invention should be 屹 - one - a schematic diagram of the conditions for establishing the two-way connection detection. Figure 7 is a flow chart showing the detailed steps of the step S2 of the reverse path confirmation dynamic source routing method of the present invention. Fig. 8 is a schematic diagram showing the path maintenance of the reverse path confirmation dynamic source routing method of the present invention. Figure 9 is a schematic diagram of the path establishment of the wireless path in the reverse path confirmation dynamic source routing method of the present invention. Figure 10: Schematic diagram of various packets used in the reverse path confirmation dynamic source routing method of the present invention. * Figure 11: The reverse path confirmation dynamic source routing method of the present invention establishes a schematic diagram of the sending path and the response path. —22 — 1351855 [Main component symbol description] 11 Base station 12 Notebook computer 13 Personal action digital assistant 14 Mobile phone 21 Source node 22 First intermediate node 23 Second intermediate node 24 Third intermediate node 25 Destination end node 31 Source End node 32 first intermediate node 33 second intermediate node 34 destination end node

—23 —-twenty three -

Claims (1)

⑶ i855 申請專利範圍 :種反向路徑確認動態來源繞送方法,其步驟包含 藉由-來源端節點發出一咖Q封包以供至少二 =接收’該RREQ封包係填人料源端節點之傳輸 功=及接«敏度,以及設定—聯繫值襴位符合雙向 路^空, ==是否為一目的端節點’該中間節點為 該目的端即點時,直接選擇一回應路徑,該中 非為該目的端節點時,利用雙向連結_該中=點 與發出該RREQ封包之節點是否存在雙向路徑; 當不存在雙__,將該rrEq封包放人_暫存串 列,該RREQ封包之聯繫值欄位設定為符合單向辭 ’當存在雙向路徑時,該RREQ封包之聯繫 木 做更動’並加人該中間㈣之傳輸功率及接收靈敏度 ,以供轉制RREQ封包,另於該暫存㈣尋找先= 保留來自其他節點之RREQ封包並同時進行轉播;及 該目的端節點收到該RKEQ封包後,參照該臟Q封 包選擇符合跳躍數最少之路徑做為—送出路徑,該送 出路徑係放人-RREp封包,另_符合跳躍數最少 及聯繫值攔位符合雙向路祕件的路徑做為—回應路 徑’以供該RREP封包依循該回應路徑傳送至該來源 端卽點,進而完成路徑建立作業。 .. 依申。月專利範圍第1項所述之反向路徑確認動態來源 繞送方法’其中該回應路徑之建立條件另包含回應路 ~ 24—— 2 徑之節點必須涵蓋送出路徑之所有節點,以進行維護 作業。 、依申請專利範圍第1或2項所述之反向路徑確認動態 來源繞送方法,其中該雙向連結偵測係將二個節點之 傳輸功率分別以丁丨、η表示,接收靈敏度分別以Si、 Sj表示,二個節點之間的路徑衰減以pi&lt;i,j&gt;表示’ 假設二個節點之路徑衰減相等(即pl&lt;i,j&gt; = pl&lt;j ’卜 ),如同時滿足Ti — pUuskSj及二個條 件’係表示該二個節點彼此之間存在著雙向路徑。 、依申請專利範圍第1或2項所述之反向路徑確認動$ •J·· 來源繞送方法,其中該RREQ封包之聯繫值欄位設定 為〇時,係符合雙向路徑條件。 依申。月^利範圍第1或2項所述之反向路徑確認動態 陆送方法’其中該封包之聯繫值欄位設定 為1時,係符合單向路徑條件。(3) i855 patent application scope: a reverse path confirmation dynamic source routing method, the step comprising: sending a coffee Q packet by the source node for at least two = receiving 'the transmission of the RREQ packet filling source node Work = and connect the sensitivity, and the setting - the contact value is in accordance with the two-way path, == whether it is a destination end node. When the intermediate node is the destination end, a response path is directly selected. For the destination end node, use the bidirectional connection_the == point and the node that issued the RREQ packet to have a bidirectional path; when there is no double __, the rrEq packet is placed in the temporary storage sequence, and the RREQ packet is The contact value field is set to conform to the one-way word. When there is a two-way path, the RREQ packet is linked to the wood to change the transmission power and receiving sensitivity of the intermediate (4) for conversion of the RREQ packet, and the temporary storage. (4) Finding first = Retaining RREQ packets from other nodes and simultaneously transmitting them; and after receiving the RKEQ packet, the destination end node selects the path with the least number of hops by referring to the dirty Q packet as a delivery path The outgoing path is a release-RREp packet, and the path that matches the minimum number of hops and the contact value is in accordance with the two-way path is used as a response path for the RREP packet to be transmitted to the source according to the response path. Click to complete the path creation job. .. Yishen. The reverse path confirmation dynamic source routing method described in item 1 of the monthly patent range, wherein the response path establishment condition further includes a response path. The node of the path must cover all nodes of the delivery path for maintenance work. . The dynamic source routing method is confirmed according to the reverse path described in Item 1 or 2 of the patent application scope, wherein the bidirectional connection detection system transmits the transmission powers of the two nodes as D, η and η, respectively, and the receiving sensitivity is respectively determined by Si. Sj indicates that the path attenuation between the two nodes is represented by pi &lt; i, j &gt; ' Assume that the path attenuation of the two nodes is equal (ie, pl &lt; i, j &gt; = pl &lt; j 'b), if Ti is simultaneously satisfied The pUuskSj and the two conditions ' indicate that the two nodes have a bidirectional path between each other. According to the reverse path described in item 1 or 2 of the patent application scope, the source bypass method is confirmed, wherein when the contact value field of the RREQ packet is set to 〇, the bidirectional path condition is met. Yi Shen. The reverse path confirmation dynamic land-sending method described in item 1 or 2 of the monthly profit range, in which the contact value field of the packet is set to 1, conforms to the one-way path condition.
TW96147998A 2007-12-14 2007-12-14 A routing method with back-path-affirmed dynamic s TWI351855B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
TW96147998A TWI351855B (en) 2007-12-14 2007-12-14 A routing method with back-path-affirmed dynamic s

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
TW96147998A TWI351855B (en) 2007-12-14 2007-12-14 A routing method with back-path-affirmed dynamic s

Publications (2)

Publication Number Publication Date
TW200926690A TW200926690A (en) 2009-06-16
TWI351855B true TWI351855B (en) 2011-11-01

Family

ID=44729768

Family Applications (1)

Application Number Title Priority Date Filing Date
TW96147998A TWI351855B (en) 2007-12-14 2007-12-14 A routing method with back-path-affirmed dynamic s

Country Status (1)

Country Link
TW (1) TWI351855B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9485040B2 (en) * 2013-08-05 2016-11-01 Litepoint Corporation Method for testing sensitivity of a data packet signal transceiver

Also Published As

Publication number Publication date
TW200926690A (en) 2009-06-16

Similar Documents

Publication Publication Date Title
EP1898574B1 (en) Method and system for loop-free ad-hoc routing
WO2012010043A1 (en) Mobile terminal and method for processing communication between mobile terminal and gateway
Mast et al. Channel contention‐based routing protocol for wireless ad hoc networks
Basarkod et al. Mobility and QoS aware anycast routing in Mobile ad hoc Networks
Iqbal et al. Adaptive Cross‐Layer Multipath Routing Protocol for Mobile Ad Hoc Networks
WO2013042209A1 (en) Data transfer method and node device employing same
JP4605428B2 (en) COMMUNICATION SYSTEM, COMMUNICATION TERMINAL DEVICE, COMMUNICATION METHOD, AND PROGRAM
Almutairi et al. A new black hole detection scheme for VANETs
JP3562421B2 (en) Wireless packet relay route construction method
Kiran et al. Stable and energy-efficient next-hop router selection (SE-NRS) for wireless body area networks
TWI351855B (en) A routing method with back-path-affirmed dynamic s
Jain et al. Performance analysis of proposed local link repair schemes for ad hoc on demand distance vector
Le et al. Turning heterogeneity into an advantage in wireless ad-hoc network routing
CN104735712B (en) A kind of maintaining method of Ad Hoc networks route
JP4913208B2 (en) Address resolution method
JP2005204213A (en) Call arrival control method for mobile communication terminal, mobile communication terminal, and call arrival control system for same
Gelenbe et al. A power-aware routing algorithm
Panda et al. Prevention of Black hole Attack in AODV protocols for Mobile Ad Hoc Network by Key Authentication.
Sethi et al. CRESQ: providing QoS and security in ad hoc networks
Botkar et al. An enhanced intrusion detection system using adaptive acknowledgment based algorithm
Zhou et al. CIVIC: An power-and context-aware routing protocol for wireless sensor networks
Jain et al. A review of improvement in TCP congestion control using route failure detection in MANET
KR20060003401A (en) Cross-layer protocol design method for energy-efficient routing in power-controlled multihop wireless networks
CN110418392B (en) Network routing method and system based on inter-node distance stability
Zhang et al. A Novel Road Topology-aware Routing in VANETs

Legal Events

Date Code Title Description
MM4A Annulment or lapse of patent due to non-payment of fees