Ad Hoc网络拥塞检测与控制的研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
随着无线通信技术的发展和便携设备的不断普及,人们对于低成本、易用的无线网络需求日益增长。而Ad Hoc网络以其优越的自组织特性被认为是最理想的未来移动网络候选构架之一。Ad Hoc网络是一种由若干无线数据传输设备临时组成的、不需要固定通信设施支持的无中心网络。网络节点既是通信终端,又可作为路由器,为其它节点转发数据。Ad Hoc网络节点可以自行组织成网,实现分布式管理。Ad Hoc网络在野外作战、抢险救灾、临时会议、无线家庭网络等军用和民用通信领域都得到广泛的应用。Ad Hoc网络的研究热点主要包括:路由协议、MAC协议、拥塞控制、跨层设计、安全性、QoS保证技术、功率控制与管理、传输层协议等。
     拥塞问题是制约Ad Hoc网络性能的一个重要因素。Ad Hoc网络节点既有收发任务,还要为其他节点转发数据。有些节点会成为多个数据流的交汇点,因此有很多数据包需要此点排队处理。但如果这种情况持续发生,当缓存耗尽节点就会丢弃数据包,在这些节点上极可能产生拥塞的情况。拥塞会导致整个网络性能的恶化,造成网络的吞吐量降低、丢包率增大、时延增大和开销增加等等。本文针对Ad Hoc网络的拥塞问题,在充分分析和论证各种用于解决拥塞问题的方法基础上,对以下几个方面进行了深入研究:
     第一,Ad Hoc网络节点的拥塞检测方法。针对Ad Hoc网络拥塞的特点,本文提出了一种基于拥塞趋势度的Ad Hoc网络拥塞检测方法。拥塞趋势度将缓存队列长度和MAC层输入、输出速率相结合,表示了节点缓存到达满载的速率。该方法不仅可以测量节点拥塞程度,还可以反映节点拥塞的变化趋势。为进一步采取适当的拥塞缓解措施,解决网络拥塞问题提供了准确可靠的信息。
     第二,Ad Hoc网络拥塞缓解路由协议。针对传统Ad Hoc网络路由协议通常以跳数最少作为路由查找的标准,往往忽略了网络拥塞对Ad Hoc网络性能的影响,本文提出了一种基于节点传输势能的Ad Hoc网络拥塞缓解路由协议AH-RBP(Ad Hoc Routing Based on Potential)。AH-RBP协议是一种多路径的Ad Hoc网络协议,通过对节点拥塞情况的检测,给网络中节点赋予适当的传输势能,根据节点的传输势能使数据包沿着拥塞程度较低且路径较短的路由来传输,这样可以使路由绕过拥塞节点,缓解拥塞对网络性能的影响,提高Ad Hoc网络吞吐量、降低丢包率。
     第三,Ad Hoc网络速率自适应MAC协议。速率自适应MAC协议可以提高信道利用率。但当拥塞发生时,在信道质量较好的链路上以较高速率发送大量数据,会使拥塞进一步恶化。因此,本文提出一种基于拥塞检测的Ad Hoc网络速率自适应MAC协议ARCD(Auto Rate based on Congestion Detection)。ARCD协议根据信道质量选择适当的传输速率,并根据节点的拥塞情况和信道质量来选择一次接入信道后连续发包的数量。ARCD协议可以在信道质量好,节点拥塞程度较低的时候以较高速率连续传输较多的数据包;在信道质量不好,节点拥塞程度较高时,以较低速率发送较少的数据包。ARCD协议可以提高信道资源的利用率,降低由于信道竞争所带来的控制开销,缓解节点拥塞程度,从而提高网络性能。
With the development of wireless communication technology and the prevalence of portable devices, the demands of wireless networks with low cost and easy deployment characters keep increasing. Ad Hoc network is thought to be one of the most competitive candidates for the next generation mobile networks, because of its the characteristic of self-organization. Ad Hoc network is a network formed without any central administration which consists of mobile nodes that use a wireless interface to send packet data. The nodes in Ad Hoc networks can serve as routers and hosts, and forward packets for the other nodes. Nodes in Ad Hoc networks can self-organize and realize distributed management. They are widely used in military and civil communication fields such as urgent search, temporary conference and wireless home network.The research hotpots of Ad Hoc networks include: routing protocol, MAC protocol, congestion control, cross layer design, security of network, QoS guarantee, power control and management, transport layer protocol, and so on.
     Congestion is one of the most important restrictions of Ad Hoc networks. Nodes transmit and receive packets for theirselves and forward packets for others, some of them may become the junctions of several flows, and these nodes are very likely to be congested. Many packets may be accumulated at congested nodes and discarded finally. Congestion may lead to long delay, high overhead and low throughput in wireless Ad Hoc networks. According to analyses of congestion control methods, this paper researches on several aspects about congestion problem in Ad Hoc networks as follows.
     Firstly, congestion detection method for Ad Hoc networks. According to the characteristics of congestion in Ad Hoc networks, a congestion detection method for Ad Hoc networks, based on Congestion Trend Degree, is proposed. This method combines queue occupancy with input rate and output rate in MAC layer, and it indicates the rate at which the queue goes to full. This method can measure congestion level accurately and timely, and what’s more it can predict the congestion tendency, it can provide accurate information for congestion control methods.
     Secondely, routing protocol for mitigating congestion in Ad Hoc networks. Routing protocols designed for Ad Hoc networks usually take the shortest path as the routing metric, and always neglect the influence caused by congestion in Ad Hoc networks. A routing protocol for mitigating congestion in Ad Hoc networks is presented in this thesis, called AH-RBP(Ad Hoc Routing Based on Potential). AH-RBP is a multipath routing protocol. The nodes are assigned transmission potential values by congestion detection, and packets route along the shorter path with lower congestion level based on the transmission potential. AH-RBP can mitigate the congestion influence, improve the throughput and packet delivery ratio.
     Thirdly, Auto rate MAC protocol. Auto rate MAC protocols can improve the channel utilization. However, When congestion occurs, if nodes transmit too much packets at a high rate in a good channel, congestion levels will badly increase. an auto rate MAC protocol for Ad Hoc networks based on congestion detection, called ARCD(Auto Rate based on Congestion Detection) is proposed. ARCD protocol selects transmission rate according to the channel condition, and determines the number of back-to-back packet according to the channel condition and congestion detection. Nodes transmit more back-to-back packets at higher rate when the channel is good and congestion level is low, and transmit less back-to-back packets at lower rate when the channel is bad and congestion level is high. ARCD protocol can improve the channel utilization, decrease the control overhead for channel contention, and mitigate congestion level.
引文
[1]郑少仁,王海涛,赵志峰. Ad Hoc网络技术[M].北京:人民邮电出版社, 2005: 1-6, 69-70.
    [2] Frodigh M, Johansson P, Larsson P. Wireless Ad Hoc Networking-the Art of Networking without a Network[J]. Ericsson Review, 2000(4): 248-263.
    [3] Leiner B M, Nielson D L, Tobagi F A. Issues in Packet Radio Network Design[J]. Proceedings of the IEEE, 1987, 75(1): 6-20.
    [4] Leiner B M, Ruther R J, Sastry A R. Goals and Challenges of the DARPA GloMo Program[J]. IEEE Personal Communications, 1996, 3(6): 34-43.
    [5] Jubin J, Tornow J D. The DARPA Packet Radio Network Protocols[J]. Proceedings of the IEEE, 1987, 75(1): 21-32.
    [6]郑相全.无线自组网技术实用教程[M].北京:清华大学出版社, 2004: 3-6, 12-13.
    [7] Perkins C E, Bhagwat P. Highly Dynamic Destination-Sequenced Distance-Vector Routing (DSDV) for Mobile Computers[J]. ACM SIGCOMM Computer Communication Review, 1994, 24(4): 234-244.
    [8] Johnson D B. Routing in Ad Hoc Networks of Mobile Hosts[C]. Proceedings of the 1994 Workshop on Mobile Computing Systems and Applications. USA: IEEE Computer Society, 1994: 158-163.
    [9] Ruppe R, Griswald S, Walsh P, et al. Near Term Digital Radio (NTDR) System[C]. Proceedings of MILCOM '97 USA: IEEE Press, 1997: 1282-1287.
    [10] IEEE Std 802.11-1997 Information Technology-Telecommunications and Information Exchange between Systems-Local and Metropolitan Area Networks-Specific Requirements-Part 11: Wireless Lan Medium Access Control (MAC) and Physical Layer (PHY) Specifications[S], USA: IEEE Computer Society, 1997.
    [11]王金龙,王呈贵,吴启晖. Ad Hoc移动无线网络[M].北京:国防工业出版社, 2004: 2-4.
    [12] Yun J, Kim J, Kim Y. A Three-Phase Ad Hoc Network Formation Protocolfor Bluetooth Systems[C]. Proceedings of the 5th International Symposium on Wireless Personal Multimedia Communications. USA: IEEE Press, 2002: 213-217.
    [13]郭强,郭忠文,董新利.蓝牙自组织网性能研究与构建[J].计算机应用研究, 2006, 5: 216-218.
    [14] Maseng T, Landry R, Young K. Military Communications[J]. IEEE Communications Magazine, 2009, 47(10): 36-38.
    [15] Kant L, Young K, Younis O, et al. Network Science Based Approaches to Design and Analyze MANETs for Military Applications[J]. IEEE Communications Magazine, 2008, 46(11): 55-61.
    [16] Burbank J L, Chimento P F, Haberman B K, et al. Key Challenges of Military Tactical Networking and the Elusive Promise of MANET Technology[J]. IEEE Communications Magazine, 2006, 44(11): 39-45.
    [17] Li N, Guo Y, Dong C, et al. Diamond Group Mobility Model for Ad Hoc Network in Military[C]. Proceedings of the 9th International Conference on Signal Processing. USA: IEEE Press, 2008: 2754-2756.
    [18] Green D B, Reddy R. A System for Calibrating and Validating Military Ad-Hoc Network Models[C]. Proceedings of 2005 IEEE Military Communications Conference. USA: IEEE Press, 2005: 2538-2543.
    [19] Kim J C, Kim D Y, Jung S M, et al. Implementation and Performance Evaluation of Mobile Ad Hoc Network for Emergency Telemedicine System in Disaster Areas[C]. Proceedings of 2009 Annual International Conference of the IEEE on Engineering in Medicine and Biology Society. USA: IEEE Press, 2009: 1663-1666.
    [20] Fang H, Tao Y, He Z, et al. Developing Test System of Ad Hoc Network for Emergency Communications[C]. Proceedings of 2009 WRI World Congress on Computer Science and Information Engineering. USA: IEEE Computer Society, 2009: 5-9.
    [21] Lien Y N, Jang H C, Tsai T C. A MANET Based Emergency Communication and Information System for Catastrophic Natural Disasters[C]. Proceedings of the 29th IEEE International Conference on Distributed Computing Systems Workshops. USA: IEEE Computer Society, 2009: 412-417.
    [22] Fortier S C, Volk J H. Defining Requirements for Ad Hoc Coalition SystemsDuring Disasters[C]. Proceedings of 2006 IEEE International Conference on Computational Cybernetics. USA: IEEE Computer Society, 2006: 1-6.
    [23] Yuen W H, Schulzrinne H. Localization for Intermittently Connected Ad Hoc Networks[C]. Proceedings of Pervasive Computing and Communications Workshops. USA: IEEE Computer Society, 2007: 86-96.
    [24] Giordano S, Rosenberg C. Ad Hoc and Sensor Networks[J]. IEEE Communications Magazine, 2005, 43(7): 108.
    [25] Katz M, Shamai. S. Transmitting to Colocated Users in Wireless Ad Hoc and Sensor Networks[J]. IEEE Transactions on Information Theory, 2005, 51(10): 3540-3563.
    [26] Sreenan C J, Roedig U, Brown J, et al. Performance Control in Wireless Sensor Networks[C]. Proceedings of the 6th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks Workshop. USA: IEEE Communications Society, 2009: 1-3.
    [27] Munivel E, Ajit G M. Efficient Public Key Infrastructure Implementation in Wireless Sensor Networks[C]. Proceedings of 2010 International Conference on Wireless Communication and Sensor Computing. USA: IEEE Computer Society, 2010: 1-6.
    [28] Cho J J, Ding Y, Chen Y, et al. Robust Calibration for Localization in Clustered Wireless Sensor Networks[J]. IEEE Transactions on Automation Science and Engineering, 2009, 7(1): 81-95.
    [29] Liu H, Zhang B, Mouftah H, et al. Opportunistic Routing for Wireless Ad Hoc and Sensor Networks: Present and Future Directions[J]. IEEE Communications Magazine, 2009, 47(12): 103-109.
    [30] Jonvik T E, Engelstad P, Van Tanh D. Ad-Hoc Formation of Bluetooth Piconet and IP Allocation in PAN[C]. Proceedings of the 5th International Symposium on Wireless Personal Multimedia Communications. USA: IEEE Computer Society, 2002: 489-493.
    [31] Kuijpers G, Nielsen T T, Prasad R. Optimizing Neighbor Discovery for Ad Hoc Networks Based on the Bluetooth PAN Profile[C]. Proceedings of the 5th International Symposium on Wireless Personal Multimedia Communications. USA: IEEE Press, 2002: 203-207.
    [32] Shin S, Fathi H, Kobara K, et al. A Secure Group CommunicationFramework in Private Personal Area Networks(P-PANs)[J]. Wireless and Mobile Communications, 2007: 59.
    [33] Noshadi H, Giordano E, Hagopian H, et al. Remote Medical Monitoring through Vehicular Ad Hoc Network[C]. Proceedings of IEEE 68th Vehicular Technology Conference. USA: IEEE Press, 2008: 1-5.
    [34] Lim H J, Jung S J, Lee J H, et al. Ad-Hoc Protocol Performance Analysis Based on Emergency Medical Data[C]. Proceedings of The 9th International Conference on Advanced Communication Technology. USA: IEEE Press, 2007: 52-56.
    [35] Jung S J, Lee J H, Chung T M. The Effective Group Key Agreement Protocol for Ad-Hoc Networks for Medical Emergency Environments[C]. Proceedings of International Joint Conference SICE-ICASE. 2006: 1127-1130.
    [36] Inoue S, Shozaki K, Kakuda Y. An Automobile Control Method for Alleviation of Traffic Congestions Using Inter-Vehicle Ad Hoc Communication in Lattice-Like Roads[C]. Proceedings of 2007 IEEE GlobeCom Workshops. 2007: 1-6.
    [37] Vaqar S A, Basir O. Traffic Pattern Detection in a Partially Deployed Vehicular Ad Hoc Network of Vehicles[J]. IEEE Wireless Communications, 2009, 16(6): 40-46.
    [38] Yang Y, Lei W. Modeling and Analysis of a Stable Direction-Based Routing Protocol in Vehicle Mobile Ad Hoc Networks[C]. Proceedings of the 5th International Conference on Wireless Communications, Networking and Mobile Computing. USA: IEEE Press, 2009: 1-7.
    [39] Johnson E E, Zibin T, Balakrishnan M, et al. Routing in HF Ad-Hoc WANs[C]. Proceedings of 2004 IEEE Military Communications Conference. USA: IEEE Press, 2004: 1040-1046.
    [40] Kurose J F, Ross K W. Computer Network: A Top-Down Approach[M]. USA: Addison Wesley, 2007: 394-409.
    [41] Moy J. RFC 2178: OSPF Version 2[EB/OL]. (1997-7)[2010-5-18]. http://www3.ietf.org/rfc/rfc2178.txt.
    [42] Malkin G. RFC 1723: RIP Version 2[EB/OL]. (1994-11)[2010-5-16]. https://www3.ietf.org/rfc/rfc1723.txt.
    [43] Akkaya K, Younis M. A Survey on Routing Protocols for Wireless Sensor Networks[J]. Ad Hoc Networks, 2005, 3(3): 325-349.
    [44] Al-Karaki J, Kamal A. Routing Techniques in Wireless Sensor Networks: A Survey[J]. IEEE Wireless Communications, 2004, 11(6): 6-28.
    [45]蔡一兵.无线自组网MAC及路由技术研究[D].北京:中国科学院计算技术研究所博士学位论文, 2006: 23-24.
    [46] Royer E M, Chai-Keong T. A Review of Current Routing Protocols for Ad Hoc Mobile Wireless Networks[J]. IEEE Personal Communications, 1999, 6(2): 46-55.
    [47] Murthy S, Garcia-Luna-Aceves J J. An Efficient Routing Protocol for Wireless Networks[J]. Mobile Networks and Applications, 1996, 1(2): 183-197.
    [48] Chiang C C. Routing in Clustered Multihop Mobile Wireless Networks with Fading Channel[C]. Proceedings of IEEE SICON'97. USA: IEEE Press, 1997: 197-211.
    [49] Perkins C, Belding-Royer E, Da S. Ad Hoc on-Demand Distance Vector (AODV) Routing[EB/OL]. (2003-2-17) [2010-5-16]. http://tools.ietf.org/id/draft-ietf-manet-aodv-13.txt.
    [50] Johnson D B, Maltz D A, Hu Y C. The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks (DSR)[EB/OL]. (2004-07-19)[2010-5-16]. http://tools.ietf.org/id/draft-ietf-manet-dsr-10.txt.
    [51] Park V D, Corson M S. A Highly Adaptive Distributed Routing Algorithm for Mobile Wireless Networks[C]. Proceedings of the 6th Annual Joint Conference of the IEEE Computer and Communications Societies. USA: IEEE Computer Society, 1997: 1405-1413.
    [52] Haas Z, Pearlman M, Samar P. The Zone Routing Protocol (ZRP) for Ad Hoc Networks[EB/OL]. (2002-8-7) [2010-5-16]. http://tools.ietf.org/id/draft-ietf-manet-zone-zrp-04.txt.
    [53] Sinha P, Sivakumar R, Bharghavan V. CEDAR: A Core-Extraction Distributed Ad Hoc Routing Algorithm[J]. IEEE Journal on Selected Areas in Communications, 1999, 17: 1454-1465.
    [54] Marina M K, Das S R. On-Demand Multipath Distance Vector Routing in Ad Hoc Networks[C]. Proceedings of the 9th International Conference onNetwork Protocols USA: IEEE Press, 2001: 14-23.
    [55]孙宝林.无线移动Ad Hoc网络的路由技术研究[J].武汉科技学院学报, 2003, 16(4): 36-37.
    [56]张文柱,李建东,王炫.多跳分布式无线网络中不同路由协议的性能[J].西安电子科技大学学报, 2003, 30(4): 458-462.
    [57] Kumar S, Raghavan V S, Deng J. Medium Access Control Protocols for Ad Hoc Wireless Networks: A Survey[J]. Ad Hoc Networks, 2006, 4(3): 326-358.
    [58]虞万荣.无线自组网MAC协议关键技术研究[D].长沙:国防科学技术大学博士学位论文, 2006: 10-11.
    [59] Chockalingam A, Zorzi M. Energy Efficiency of Media Access Protocols for Mobile Data Networks[J]. IEEE Transactions on Communications, 1998, 46(11): 1418-1421.
    [60] Goldsmith A J, Wicker S B. Design Challenges for Energy-Constrained Ad Hoc Wireless Networks[J]. IEEE Wireless Communications, 2002, 9(4): 8-27.
    [61] Jung E S, Vaidya N H. An Energy Efficient MAC Protocol for Wireless LANs[C]. Proceedings of INFOCOM 2002. USA: IEEE Press, 2002: 1756-1764.
    [62] Fang Z, Bensaou B, Wang Y. Performance Evaluation of a Fair Backoff Algorithm for IEEE 802.11 DFWMAC[C]. Proceedings of the 3rd ACM International Symposium on Mobile Ad Hoc Networking. USA: ACM, 2002: 48-57.
    [63] Hung L L, Chang C Y, Chen C C, et al. JTEF: Joint Throughput Enhancement and Fairness MAC Protocol for Vehicular Ad Hoc Networks[C]. Proceedings of the 6th International Wireless Communications and Mobile Computing Conference. USA: ACM, 2010: 1-5.
    [64]李蓥.无线自组织网MAC层协议关键技术的研究[D].上海:上海交通大学博士学位论文, 2007: 6-8.
    [65] Sing S, Raghavendra C S. PAMAS—Power Aware Multi-Access Protocol with Signaling for Ad Hoc Networks[J]. ACM SIGCOMM Computer Communication Review, 1998, 28(3): 5-26.
    [66] Karn P. MACA-a New Channel Access Method for Packet Radio[C].Proceedings of ARRL/CRRL Amateur Radio 9th Computer Networking Conference. 1990: 134-140.
    [67] Zhu C, Corson M S. A Five-Phase Reservation Protocol (FPRP) for Mobile Ad Hoc Networks[J]. Wireless Networks, 2001, 7(4): 371-384.
    [68] Ergen M, Lee D, Sengupta R, et al. WTRP-Wireless Token Ring Protocol[J]. IEEE Transactions on Vehicular Technology, 2004, 53(6): 1863-1881.
    [69] Bharghavan V, Demers A, Shenker S, et al. MACAW: A Media Access Protocol for Wireless LANs[J]. ACM SIGCOMM Computer Communication Review, 1994, 24(4): 212-225.
    [70] Haas Z J, Jing D. Dual Busy Tone Multiple Access (DBTMA)-a Multiple Access Control Scheme for Ad Hoc Networks[J]. IEEE Transactions on Communications, 2002, 50(6): 975-985.
    [71] Hung W C, Law K L, Leon-Garcia A. A Dynamic Multi-Channel MAC for Ad-Hoc LAN[C]. The 21st Biennial Symposium on Communications. 2002: 31-35.
    [72] Kamerman A, Monteban L. WaveLAN II: A High-Performance Wireless LAN for the Unlicensed Band[J]. Bell Labs Technical Journal, 1997, 2(3): 118 -133.
    [73] Holland G, Vaidya N, Bah P. A Rate-Adaptive MAC Protocol for Multi-Hop Wireless Networks[C]. Proceedings of the 7th Annual International Conference on Mobile Computing and Networking. USA: ACM, 2001: 236-251.
    [74] Sadeghi B, Kanodia V, Sabharwal A, et al. Opportunistic Media Access for Multirate Ad Hoc Networks[C]. Proceedings of the 8th Annual International Conference on Mobile Computing and Networking. USA: ACM, 2002: 24-35.
    [75] Zimmermann H. OSI Reference Model -- the ISO Model of Architecture for Open Systems Interconnection[J]. IEEE Transactions on Communications, 1980, 28(4): 425-432.
    [76] Conti M, Crowcroft J, Maselli G, et al. A Modular Cross-Layer Architecture for Ad Hoc Networks[M]. Handbook on Theoretical and Algorithmic Aspects of Sensor, Ad Hoc Wireless and Peer-to-Peer Networks. USA: CRC Press LLC, 2004: 5-16.
    [77] Srivastava V, Motani M. Cross-Layer Design: A Survey and the Road Ahead[J]. IEEE Communications Magazine, 2005, 43(12): 112-119.
    [78] Larzon L A, Bodin U, Schelen O. Hints and Notifications for Wireless Links[C]. Proceedings of 2002 IEEE Wireless Communications and Networking Conference. USA: IEEE Computer Society, 2002: 635-641.
    [79] ElBatt T, Ephremides A. Joint Scheduling and Power Control for Wireless Ad Hoc Networks[J]. IEEE Transactions on Wireless Communications, 2004, 3(1): 74-85.
    [80] Lang T, Naware V, Venkitasubramaniam P. Signal Processing in Random Access[J]. IEEE Signal Processing Magazine, 2004, 21(5): 29-39.
    [81] Liu Q, Zhou S, Giannakis G B. Cross-Layer Combining of Adaptive Modulation and Coding with Truncated ARQ over Wireless Links[J]. IEEE Transactions on Wireless Communications, 2004, 3(5): 1746-1755.
    [82] Qi W, Abu-Rgheff M A. Cross-Layer Signalling for Next-Generation Wireless Systems[C]. Proceedings of 2003 IEEE Wireless Communications and Networking. IEEE Computer Society, 2003: 1084-1089.
    [83] Conti M, Maselli G, Turi G, et al. Cross-Layering in Mobile Ad Hoc Network Design[J]. Computer, 2004, 37(2): 48-51.
    [84] Braden R, Faber T, Handley M. From Protocol Stack to Protocol Heap-Role-Based Architecture[J]. ACM SIGCOMM Computer Communication Review, 2003, 33(1): 17-22.
    [85] Wan C Y, Eisenman S B, Campbell A T. CODA: Congestion Detection and Avoidance in Sensor Networks[C]. Proceedings of the 1st International Conference on Embedded Networked Sensor Systems. USA: ACM, 2003: 266-279.
    [86]孙利民,李波,周新运.无线传感器网络的拥塞控制技术[J].计算机研究与发展, 2008, 45(1): 63-72.
    [87] Panos Gevros, Crowcroft J, Kirstein P, et al. Congestion Control Mechanisms and the Best Effort Service Model[J]. IEEE Network, 2001: 16-26.
    [88] Jain R, Ramakrishnan K K, Dah-ming C. Congestion Avoidance in Computer Networks with a Connectionless Network Layer[R]. Innovations in Internetworking, Artech House, 1988:1-21.
    [89] Liu W, Wu M, Peng J, et al. The Improved ECN Congestion Control in Ad Hoc Network and Simulation Test[C]. Proceedings of 2009 International Conference on Electronic Commerce and Business Intelligence. USA: IEEE Computer Society, 2009: 143-146.
    [90] Jacobson V, Karels M J. Congestion Avoidance and Control[C]. Proceedings of ACM SIGCOMM '88. USA: ACM, 1988: 314-329.
    [91] Floyd S, Fall K. Promoting the Use of End-to-End Congestion Control in the Internet[J]. IEEE/ACM Transactions on Networking, 1999, 7(8): 458-472.
    [92] Tran D A, Raghavendra H. Congestion Adaptive Routing in Mobile Ad Hoc Networks[J]. IEEE Transactions on Parallel and Distributed Systems, 2006, 17(11): 1294-1305.
    [93]张东辉,王庆辉,魏立峰. Ad Hoc无线网络中的拥塞控制研究[J].仪器仪表学报, 2005, 26(8): 486-487.
    [94] Bhuiyan M M, Jaseemuddin M. Congestion-Aware Ad Hoc Overlay Network[C]. Proceedings of IEEE 64th Vehicular Technology Conference. USA: IEEE Press, 2006: 1-5.
    [95] Network Simulator V2[EB/OL]. http://www.isi.edu/nsnam/ns.
    [96]刘拥民,蒋新华,年晓红.无线网络拥塞控制最新研究进展[J].计算机工程与应用, 2007, 43(24): 24-28.
    [97] L.Peterson L, Davie B S. Computer Networks: A Systems Approach[M]. Morgan Kaufmann Publishers, 2007: 456-469.
    [98] Jain R. Congestion Control in Computer Networks: Issues and Trends[J]. IEEE Network Magazine, 1990, 4(3): 24-30.
    [99]徐昌彪,鲜永菊.计算机网络中的拥塞控制与流量控制[M].北京:人民邮电出版社, 2007: 15-16, 32-38, 70-82.
    [100] Nagle J. On Packet Switches with Infinite Storage[J]. IEEE Transactions on Communications, 1987, 35(4): 435-438.
    [101] Forouzan B A. Data Communication and Networking[M]. USA: McGraw-Hill, 2003: 765-767.
    [102] Tanenbaum A S. Computer Networks[M]. USA: Prentice Hall, 2003: 176-182.
    [103]王秀利.网络拥塞控制及拒绝服务攻击防范[M].北京:北京邮电大学出版社, 2009: 18-34.
    [104]章淼,吴建平,林闯.互联网端到端拥塞控制研究综述[J].软件学报, 2002, 13(3): 354-363.
    [105] Allman M, Paxson V, Stevens W. RFC 2581: TCP Congestion Control[EB/OL]. (1999-4)[2010-5-18]. http://www.ietf.org/rfc/rfc2581.txt.
    [106] Stevens W. RFC 2001: TCP Slow Start, Congestion Avoidance, Fast Retransmit, and Fast Recovery Algorithms[EB/OL]. (1997-1)[2010-5-18]. http://www.ietf.org/rfc/rfc2001.txt.
    [107] Floyd S, Henderson T. RFC 2582: The Newreno Modification to Tcp's Fast Recovery Algorithm[EB/OL]. (1999-4) [2010-5-18]. http://www.ietf.org/rfc/rfc2582.txt.
    [108] Mathis M, Mahdavi J, Floyd S, et al. RFC 2018: TCP Selective Acknowledgment Options[EB/OL]. (1996-10) [2010-5-18]. http://www.ietf.org/rfc/rfc2018.txt.
    [109] Brakmo L S, Peterson L L. TCP Vegas: End to End Congestion Avoidance on a Global Internet[J]. IEEE Journal on Selected Areas in Communications, 1995, 13(8): 1465-1480.
    [110] Gerla M, Tang K, Bagrodia R. TCP Performance in Wireless Multi-Hop Networks[C]. Proceedings of the 2nd IEEE Workshop on Mobile Computing Systems and Applications. USA: IEEE Computer Society, 1999: 41-50.
    [111] Xu S, Saadawi T. Does the IEEE 802.11 MAC Protocol Work Well in Multihop Wireless Ad Hoc Networks?[J]. IEEE Communications Magazine, 2001, 39(6): 130-137.
    [112] Fu Z, Meng X, Lu S. How Bad TCP Can Perform in Mobile Ad Hoc Networks[C]. Proceedings of 7th International Symposium on Computers and Communications. USA: IEEE Computer Society, 2002: 298-303.
    [113] Fu Z, Zerfos P, Luo H, et al. The Impact of Multihop Wireless Channel on TCP Throughput and Loss[C]. Proceedings of the 22nd Annual Joint Conference of the IEEE Computer and Communications. USA: IEEE Computer Society, 2003: 1744-1753.
    [114] Oliveira R d, Braun T. TCP in Wireless Mobile Ad Hoc Networks[R]. Institute of Computer Science and Applied Mathematics, University of Berne, 2002:1-23.
    [115] Scheuermann B, Lochert C, Mauve M. Implicit Hop-by-Hop CongestionControl in Wireless Multihop Networks[J]. Ad Hoc Networks, 2008, 6(2): 260-286.
    [116] Lakshman T V, Neidhardt A, Ott T J. The Drop from Front Strategy in TCP and in TCP over ATM[C]. Proceedings of the 15th Annual Joint Conference of the IEEE Computer Societies. Networking the Next Generation. USA: IEEE Computer Society, 1996: 1242-1250.
    [117] Hollot C V, Misra V, Towsley D, et al. Analysis and Design of Controllers for AQM Routers Supporting TCP Flows[J]. IEEE Transactions on Automatic Control, 2002, 47(6): 945-959.
    [118] Floyd S, Jacobson V. Random Early Detection Gateways for Congestion Avoidance[J]. IEEE/ACM Transactions on Networking, 1993, 1(4): 397-413.
    [119] Braden B, Clark D, Crowcroft J, et al. RFC 2309: Recommendations on Queue Management and Congestion Avoidance in the Internet[EB/OL]. (1998-4)[2010-5-18]. http://www.ietf.org/rfc/rfc2309.txt.
    [120] Hashem E S. Analysis of Random Drop for Gateway Congestion Control[R]. Laboratory for Computer Science, MIT, 1989:3-7.
    [121] Athuraliya S, Low S H, Li V H, et al. REM: Active Queue Management [J]. IEEE Network, 2001, 15(3): 48-53.
    [122] Athuraliya S, Low S H. Optimization Flow Control, II: Implementation[R]. Melbourne University, 2000:6-10.
    [123] Hollot C V, Misra V, Towsley D, et al. On Designing Improved Controllers for AQM Routers Supporting TCP Flows[C]. Proceedings of 20th Annual Joint Conference of the IEEE Computer and Communications Societies. USA: IEEE Computer Society, 2001: 1726-1734.
    [124] Hollot C V, Misra V, Towsley D, et al. A Control Theoretic Analysis of RED[C]. Proceedings of 20th Annual Joint Conference of the IEEE Computer and Communications Societies. USA: IEEE Computer Society, 2001: 1510-1519.
    [125]陈亮,张宏,胡为民. Ad Hoc网络主动队列管理分析[J].南通大学学报(自然科学版), 2008, 7(1): 21-25.
    [126] Mbarushimana C, Ali S. Congestion Avoidance Routing Protocol for QoS-Aware MANETs[C]. Proceedings of 2008 International Wireless Communications and Mobile Computing Conference. USA: IEEE Press,2008: 129-134.
    [127]欧阳志鹏,沈富可. Ad Hoc网络基于路由协议的拥塞控制[J].计算机工程与设计, 2006, 27(16): 3102-3104.
    [128] Razzaque M A, Hong C S. Congestion Detection and Control Algorithms for Multipath Data Forwarding in Sensor Networks[C]. Proceedings of the 11th International Conference on Advanced Communication Technology. USA: IEEE Press, 2009: 651-653.
    [129] Karenos K, Kalogeraki V, Krishnamurthy S V. Cluster-Based Congestion Control for Supporting Multiple Classes of Traffic in Sensor Networks[C]. Proceedings of the Second IEEE Workshop on Embedded Networked Sensors. USA: IEEE Computer Society, 2005: 107-114.
    [130] Jaewon K, Yanyong Z, Nath B. Accurate and Energy-Efficient Congestion Level Measurement in Ad Hoc Networks[C]. Proceedings of 2005 IEEE Wireless Communications and Networking Conference. USA: IEEE Press, 2005: 2258-2263.
    [131] Yang N, Sankar R, Lee J. Improving Ad Hoc Network Performance Using Cross-Layer Information[C]. Proceedings of 2005 IEEE International Conference on Communications. USA: IEEE Press, 2005: 2764-2768.
    [132] Hu Y, Johnson D B. Exploiting Congestion Information in Network and Higher Layer Protocols in Multihop Wireless Ad Hoc Networks[C]. Proceedings of the 24th International Conference on Distributed Computing Systems. USA: IEEE Computer Society, 2004: 301-310.
    [133] Sankarasubramaniam Y, Akan ? B, Akyildiz I F. ESRT: Event-to-Sink Reliable Transport in Wireless Sensor Networks[C]. Proceedings of the 4th ACM International Symposium on Mobile Ad Hoc Networking and Computing. USA: ACM, 2003: 177-188.
    [134] Wang C, Sohraby K, Li B. SenTCP: A Hop-by-Hop Congestion Control Protocol for Wireless Sensor Network[C]. Proceedings of the 24th IEEE Conference on Computer Communications. USA: IEEE Computer Society, 2005
    [135] Wang C, Li B, Sohraby K, et al. Upstream Congestion Control in Wireless Sensor Networks through Cross-Layer Optimization[J]. IEEE Journal on Selected Areas in Communications, 2007, 25(4): 786-795.
    [136] Chen X, Jones H M, Jayalath A D S. Congestion-Aware Routing Protocol for Mobile Ad Hoc Networks[C]. Proceedings of IEEE 66th Vehicular Technology Conference. USA: IEEE Press, 2007: 21-25.
    [137]王庆辉,潘学松,王光兴.基于带宽估计的Ad Hoc网络拥塞控制机制[J].通信学报, 2006, 27(4): 42-48.
    [138] Lee K C, Lee U, Gerla M. Survey of Routing Protocols in Vehicular Ad Hoc Networks[M]. Advances in Vehicular Ad-Hoc Networks: Developments and Challenges. IGI Global, 2010: 149-170.
    [139]庄春梅,陆建德,王源.移动自组网络路由协议及互操作[J].计算机应用与软件, 2010, 27(4): 235-238.
    [140] Park V, Corson S. Temporally-Ordered Routing Algorithm (TORA) Version 1 Functional Specification[EB/OL]. (2001-7-20) [2010-5-16]. http://tools.ietf.org/id/draft-ietf-manet-tora-spec-04.txt.
    [141] Murad A M, Al-Mahadeen B, Murad N M. Adding Quality of Service Extensions to the Associativity Based Routing Protocol for Mobile Ad Hoc Networks[C]. Proceedings of the 2008 IEEE Asia-Pacific Services Computing Conference. USA: IEEE Computer Society, 2008: 631-637.
    [142] Lemmon C J, Musumeci P. Boundary Mapping and Boundary-State Routing (BSR) in Ad Hoc Networks[J]. IEEE Transactions on Mobile Computing, 2008, 7(1): 127-139.
    [143] Corson M S, Ephremides A. A Distributed Routing Algorithm for Mobile Wireless Networks[J]. ACM Wireless Networks, 1995, 1(1): 61-81.
    [144] Clausen T, Jacquet P. RFC 3626: Optimized Link State Routing Protocol (OLSR)[EB/OL]. (2003-10)[2010-5-18]. http://www.ietf.org/rfc/rfc3626.txt.
    [145] Ogier R, Lewis M, Templin F. RFC 3684: Topology Dissemination Based on Reverse-Path Forwarding (TBRPF)[EB/OL]. (2004-2) [2010-5-18]. http://www.ietf.org/rfc/rfc3684.txt.
    [146] Schollmeier R, Gruber I, Finkenzeller M. Routing in Mobile Ad-Hoc and Peer-to-Peer Networks a Comparison[M]. Web Engineering and Peer-to-Peer Computing. Berlin: Springer, 2010: 172-187.
    [147] Couto D S J D, Aguayo D, Chambers B A, et al. Performance of Multihop Wireless Networks: Shortest Path Is Not Enough[J]. SIGCOMM Computing Communication, 2003, 33(1): 83-88.
    [148] Yang N, Sankar R. Effects of Cross-Layer Processing on Wireless Ad Hoc Network Performance[C]. IEEE International Conference on Wireless And Mobile Computing, Networking And Communications. 2005: 284-290.
    [149] Kim Y D, Lee S H, Lee D H. DCAR: Dynamic Congestion Aware Routing Protocol in Mobile Ad Hoc Networks[C]. Proceedings of the 1st International Conference on Ubiquitous Convergence Technology. Berlin: Springer-Verlag, 2006: 130-139.
    [150] Lu Y, Wang W, Bhargava B. Study of Distance Vector Routing Protocols for Mobile Ad Hoc Networks[C]. Proceedings of the First IEEE International Conference on Pervasive Computing and Communications. USA: IEEE Computer Society, 2005: 187-194.
    [151] Ferreira A, Goldman A, Monteiro J. Performance Evaluation of Routing Protocols for MANETs with Known Connectivity Patterns Using Evolving Graphs[J]. Wireless Networks, 2010, 16(3): 627-640.
    [152] Panichpapiboon S, Ferrari G, Tonguz O K. Connectivity of Ad Hoc Wireless Networks: An Alternative to Graph-Theoretic Approaches[J]. Wireless Networks, 2010, 16(3): 793-811.
    [153] Basu A, Lin A, Ramanathan S. Routing Using Potentials: A Dynamic Traffic-Aware Routing Algorithm[C]. Proceedings of the 2003 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication. USA: ACM, 2003: 37-48.
    [154]叶芝慧.无线个域网应用环境下速率自适应算法的研究[J].通信学报, 2004, 25(4): 160-167.
    [155]方旭明.下一代无线因特网技术:无线MESH网络[M].北京:人民邮电出版社, 2006: 69-70.
    [156]夏海轮,陈国东,郭昕.无线Ad Hoc网络速率自适应MAC协议研究[J].现代电信科技, 2007(2): 51-55.
    [157] Li Z, Das A, Gupta A K, et al. Full Auto Rate MAC Protocol for Wireless Ad Hoc Networks[J]. IEE Proceedings-Communications, 2005, 152(3): 311-319.
    [158] Rappaport. T S. Wireless Communications: Principles and Practice[M]. USA: Prentice Hall, 1999: 165-167.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700