移动Ad hoc网络动态源路由协议DSR及其测试床研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
在无线通信技术与计算机网络迅猛发展的背景下,移动Ad hoc网络以其移动自组、多跳通信等特性引起了人们的广泛关注。移动Ad hoc网络(Mobile Ad hoc Network,MANET)是由一系列具有移动无线收发能力的节点组成的自治网络系统,具备自行组网、多跳通信等特殊能力。尽管存在拓扑变换频繁、无线信道不稳、链路带宽受限以及计算存储资源紧张等特点,但是由于MANET网络不依赖于任何固定基础设施即能正常工作,具有良好的移动性、自组性和抗毁性,且相对传统有线网络部署便利、成本低廉,在军事战场、灾难救援以及民生、商业等领域具有广阔的应用前景,由此成为近年来的研究热点。
     事实上,针对MANET网络的研究内容广泛而丰富,从网络体系结构到信道接入、网络路由,从多层网络分簇算法到贯穿所有层次的安全保障、服务质量以及节能机制等领域均有涉及。毫无疑问,在这其中,MANET路由协议的地位举足轻重,是支撑MANET网络的重要基石,而动态源路由协议DSR便是其中的优异代表。
     DSR是一种采用按需路由策略的反应式MANET路由协议,具有简洁高效的主要特点。本文对该协议RFC进行了细致研究和分析,探讨了DSR协议的性能优化途径与安全扩展策略。随后,在深入学习基于OPNET平台的MANET协议管理框架与DSR进程模型基础上,着重探讨了构建DSR协议真实环境测试床的相关问题,分析确定了在Windows操作系统中有效嵌入DSR协议栈的基本策略,并详尽阐述了DSR协议栈的数据结构设计与核心流程实现。最后,通过真实环境中的测试,对所创建的DSR协议栈进行了实验室内的初步验证,证明了协议栈的有效设计与实现,初步完成了DSR真实环境测试床的构建工作,为后续真实环境中的Ad hoc网络研究打下了基础。
Under the background of rapid development for both wireless communication technology and computer networks, Mobile Ad hoc Network - MANET, attracts people’s extensive attention. MANET is actually an autonomous system composed of serial nodes which can communicate with each other through multi-hops in mobile wireless environment. MANET has some inherent characters like frequently changed topology, limited link layer bandwidth and constrained resources for computation and storage. But since it can be working without any infrastructure, it is supposed to play a big role in lots of environments such as military battle and emergency assistance.
     Researches on MANET are actually extensive and comprehensive, and during all of these, MANET routing protocol is obviously the most important one, because efficient packets delivery need efficient routing protocol first. One of the typical representations in various MANET routing protocols is just Dynamic Routing Protocol– DSR, which is always treated as a simple but highly efficient reactive MANET routing protocol. Based on the study of related RFC, DSR performance optimization and security expanding were discussed. And then, based on a deep study and research on DSR virtual model supplied by OPNET and its uniform MANET manger architecture, we kept focus on DSR test-bed in real-world environment. Strategies about embedding DSR into Windows NDIS architecture were discussed first. And then, a detailed analysis for PASSTHRU, the classical NDIS intermediate driver example, was given. Based on the work all above, we pre-analyzed several key problems about creating the real-world DSR protocol stack, and proposed concrete designs of this protocol stack’s data structures and basic process flows. In the end, experimental results in laboratory environment proved stack’s availability.
引文
[1] IEEE 802.11 working group. Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications (Revision of IEEE Std 802.11-1999) [EB/OL]. (2007-08) [2009-03-02]. http://standards.ieee.org/getieee802/download/802.11-2007.pdf
    [2] J. Jubin and J.D. Tornow. The DARPA packet radio network protocols. Proceedings of the IEEE, 1987,75(1):21-32.
    [3] David A.Beyer. Accomplishments of the DARPA Survivable Adaptive Networks SURAN Program. Proceedings of the IEEE MILCOM Conference, 1990.
    [4] Barry M. Leiner, Robert Ruth, Ambatipudi R. Sastry. Goals and Challenges of the DARPA GloMo Program. IEEE Personal Communications, 1996, 3(6).
    [5] IETF MANET Working Group. Mobile Ad-hoc Networks (MANET) [EB/OL]. (2008-08-21) [2009-1-20]. http://www.ietf.org/html.charters/manet-charter.html
    [6] C. Perkins, E. Belding-Royer, S. Das. Ad hoc On-Demand Distance Vector (AODV) Routing [EB/OL]. (2003-07)[2009-03-02]. http://www.ietf.org/rfc/rfc3561.txt.
    [7] T. Clausen, P. Jacquet. Optimized Link State Routing Protocol (OLSR) [EB/OL]. (2003-10) [2009-03-02]. http://www.ietf.org/rfc/rfc3626.txt.
    [8] D. Johnson, Y. Hu, D. Maltz. The Dynamic Source Routing Protocol (DSR) for Mobile Ad Hoc Networks for IPv4 [EB/OL]. (2007-02)[2009-03-02].http://www.ietf.org/rfc/rfc4728.txt
    [9] Perkins C. E, Bhagwat. P. Highly dynamic Destination Sequenced Distance-vector routing(DSDV ) for mobile computers. In Proceedings ofthe SIGCOMM’94 Conference on Communications Architectures,Protocols and Applications August 1994,234~244.
    [10] R. Ogier, F. Templin, M. Lewis. Topology Dissemination Based on Reverse-Path Forwarding (TBRPF) [EB/OL]. (2004-02)[2009-03-02]. http://www.ietf.org/rfc/rfc3684.txt.
    [11] V. Park and S. Corson, Temporally-Ordered Routing Algorithm (TORA) [EB/OL]. (2001-07-20)[2009-03-02]. http://tools.ietf.org/html/draft-ietf-manet-tora-spec-04.
    [12]王亮,朱秋萍,马丽霞. Ad hoc网络DSR路由协议的优化[J].武汉大学学报(理学版), 2005, 51(3):361-364
    [13] Fu Z, Zerfos P, Luo H, Lu S, Zhang L, Gerla M. The Impact of multihop wireless channel on TCP throughput and loss. In: Bauer F, Puigjaner R, eds. Proc. of the 22nd Annual Joint Conf .of the IEEE Computer and Communications Societies (INFOCOM 03). San Francisco: IEEE Press, 2003: 1733-1753.
    [14]邱飞岳,傅升红. Ad hoc无线网中DSR协议缓存优化的研究[J].浙江工业大学学报. 2006, 34(6):656-659
    [15]吴东亚,侯紫峰,侯朝桢.移动自组网DSR协议路径缓存策略优化[J].计算机工程与应用. 2004,第9期: 158-160
    [16] Mohamad Y. Alsaadi, Yi Qian. Ant-DSR: Cache Maintenance Based Routing Protocol for Mobile Ad-Hoc Networks[C] Proceedings of Third Advanced International Conference on Telecommunications, 2007:4215256
    [17] Garrido, Jose Ayub Gonzalez. A Linkcache Invalidation Mechanism for Dynamic Source Routing (DSR) in AD HOC Networks [C] Proceedings of 18th Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, 2007:4394286
    [18] Xin Yu, Distributed cache updating for the dynamic source routing protocol[J]. IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 5, NO. 6, JUNE 2006.
    [19] Md. Golam Kaosar, Ashraf S. Hasan Mahmoud, Tarek R. Sheltami. Performance improvement of dynamic source routing protocol the mobility effect of nodes in cache management[C]. Wireless and Optical Communications Networks, 2006 IFIP International Conference on Volume , Issue , 0-0 0 Page(s):5 pp. - 5
    [20] Mohamed Aissani, Messaoud Fenouche, Hadi Sadour, and Abdelhamid Mellouk. Ant-DSR -- Cache Maintenance Based Routing Protocol for Mobile Ad-Hoc Networks [C]. Telecommunications, 2007. AICT 2007. The Third Advanced International Conference on page(s): 35-35
    [21] Culpepper B J, Tseng H C. Sinkhole Intrusion Indicators in DSR MANETs [C]. Proceedings of BroadNets '04. 2004. 681-688.
    [22] Hu Y C, Perrig A, and Johnson D B. Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols [C]. Proceedings of ACM Wireless Security 2003. ACM Press, 2003. 30-40.
    [23] Hu Y C, Perrig A, and Johnson D B. Packet leashes: A defense against wormhole attacks [C]. Wire-less networks Proceedings of the Twenty-Second Annual Joint Conference of the IEEE Computer and Communications Societies. 2003. 1976-1986,
    [24] Aad I, Hubaux J P, Knightly E W. Denial of Service Resilience in Ad Hoc Networks [C]. Proceedings of ACM MobiCom. 2004. 202-215.
    [25] Patroklos G A, Donal O. Secure routing for mobile ad hoc networks [C]. IEEECommunications Surveys & Tutorials, Third Quarter 2005.
    [26] Awerbuch B, Holmer D, Nita-Rotaru C, Rubens H, Mitigating byzantine attacks in ad hoc wireless networks [EB/OL], http://wireless.cs.jhu.edu/publications/Awerbuch-Mitigating Byzantine-TechReport1-March2004.pdf, March 2004.
    [27] Papadimitratos P, Haas Z. Secure routing for mobile Ad hoc networks [C]. SCS Communication Networks and Distributed Systems(CNDS 2002). 2002. 27-31.
    [28] Marshall J. An Analysis of the Secure Routing Protocol for Mobile ad hoc Network Route Discovery: Using Intuitive Reasoning and Formal Verification to Identify Flaws[D]. Florida: Florida State University, 2003.
    [29] Jihye K, Gene T. SRDP: Securing Route Discovery in DSR[C]. The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services, 2005.
    [30] Hu Y C, Perrig A, and Johnson D B. Ariadne: a secure on-demand routing protocol for Ad hoc networks[C]. Proceedings of the ACM Conference on Mobile Computing and Networking (Mobicom). 2002. 12-23.
    [31] Jihye K, Gene T. SRDP: Securing Route Discovery in DSR[C]. The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services, 2005.
    [32] Deng H, Mukherjee A, Agrawal D P. Threshold and identity-based key management and authentication for wireless Ad Hoc networks[C]. Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC’2004). Los Alamitos: IEEE Computer Society Press, 2004: 107-111.
    [33] www.opnet.com.
    [34] MICROSOFT. NDIS Drivers (NDIS 5.1) [EB/OL]. [2008-05-10]. http://msdn.microsoft.com /en-us/library/ms797339.aspx.
    [35]李光成,张连芳,舒炎泰等.动态源路由协议DSR在Linux下的实现[J].计算机工程与应用. 2003,第22期: 173-177
    [36]刘焕敏. Linux平台AdHoc网络按需路由协议实现技术研究: [硕士学位论文].长沙:国防科技大学, 2005.
    [37]谢世欢. Linux系统上AODV路由协议的实现: [硕士学位论文].成都:电子科技大学, 2004.
    [38]赵东. MAODV多播路由协议在Linux系统下的实现: [硕士学位论文].成都:电子科技大学, 2004.
    [39]李光成,张连芳,舒炎泰等.动态源路由协议DSR在Linux下的实现[J].计算机工程与应用. 2003,第22期: 173-177.
    [40]龚月荣,林晓明.移动自组网反应式路由协议在Linux中的实现[J].计算机工程, 2004,第7期: 98-100.
    [41]陈曦,张霞,梁兴强.移动自组网测试平台设计研究[J].计算机工程与应用,2004,(12):136-138, 152.
    [42]梁兴强,张霞,陈曦.基于NDIS的自组织网测试床设计与实现[J].计算机应用研究, 2004,(7):122-124.
    [43]周经宇,周玲玲,徐国治.移动Adhoc网络AODV路由协议在WindowsCE.NET上的实现[J].计算机工程与应用, 2006,(5): 131-134.
    [44] MICROSOFT. Windows 2000 and Later Network Architecture and the OSI Model (NDIS 5.1) [EB/OL].[2008-06-12].http://msdn.microsoft.com/en-us/library/ms797342.aspx.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700