多跳无线网络机会路由研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
多跳无线网络(Multi-hop wireless networks),如移动自组网(Mobile Ad hoc network, MANET),无线传感器网络(Wireless Sensor Network, WSN),无线Mesh网络(wireless mesh network, WMN),在监测,通信,控制等方面有着广泛的应用前景。在多跳无线网络中由于网络节点的移动性、链路的不稳定性、无线传输的不可靠性,导致寻找高效的路由算法存在很大的挑战。传统的路由策略在传输数据之前必须寻找一条有效的传输路径,再传输数据。由于网络中节点的移动,环境的影响,节点自身的故障等,导致传输路径寿命很短,严重降低了传输的效率。机会路由(Opportunistic Routing, OR)则无须寻找一条完整的传输路径,每通过一跳传输,数据包就越“接近”目标节点,每一跳的传输通过无线传输的广播性来提高传输的成功率。机会路由有效地提高了传输稳定性,非常适合于多跳高丢包率的无线网络。针对机会路由本文主要进行了如下的研究工作:
     提出了一种自组织的节点间断性故障监测方法。基于分段连续监测的思想,本文采用累计信任度来判断节点间断性故障的监测方法SCMCT(Self-configurable Monitoring by Cumulative Trust)。在单次监测中利用信息熵记录节点响应频率,通过信息熵的共享,基于伪空间距离联合诊断节点的间断性。试验结果对比表明,此单次监测方法比已有方法效率明显的提高。为提高节点高速运动时监测的准确性,通过分段连续监测,把单次监测结果作为分类器,计算节点的累计信任度,通过累计信任度衡量节点的间断性。试验仿真表明此方法显著了当节点高速运动时的监测准确性。
     提出了在多信道多跳无线网络中的机会路由策略MC-OR。首先分析了多跳无线网络中信道冲突的严重性和信道分配的复杂性,给出了一种新颖的基于网络节点路径负载的启发式多信道分配算法,极大地减少了网络的信道冲突。然后分析了考虑信道冲突时,链路的有效带宽,提出了基于EOTT指标的转发候选集的选择策略,并证明了EOTT满足最优化原则。
     结合背压式调度在高负载网络上的优势和机会路由传输质量上的特性,兼顾优势路径和负载平衡,提出了基于背压式调度的机会路由策略(BPS-OR)。在背压式调度中,利用EODB来描述网络节点与下一跳节点的期望积压差。在机会路由中,设计了EODT指标描述数据包传输到目地节点的期望延迟时间,并证明了EODT指标满足最优化原则,给出了基于EODT的转发候选集产生算法。仿真实验表明,在网络负载轻时,BPS-OR相比DiffQ吞吐量提高了28%,在网络负载较重时,吞吐量提高了52%,能够保证在不同的网络负载上传输效率的稳定。
Multihop wireless networks, such as mobile ad hoc networks (MANETs), wireless sensor networks (WSNs), and wireless mesh networks (WMNs), have broad application prospects in monitoring, communication, control, etc. Routing in multi-hop wireless networks presents a great challenge mainly due to the following facts:the mobility of network node, the instability of network link, and the unreliability of wireless transmission. The traditional routing strategy must look for an effective transmission path, and then transfer data. Because of the network of mobile nodes, environmental impacts, the node own failures, and so on, the life span of transmission path is very short, and they seriously reduce the transmission efficiency. On the contrary, opportunistic routing (OR) is not need to find a complete transmission path. Data packets are closer the destination node by each hop transmission through, and the broadcast nature of wireless transmission to improve the success rate of transmission in each hop transmission through. Opportunistic routing effectively improve the transmission route stability, is very suitable for multihop packet loss wireless networks. In this paper, the main research work about Opportunistic routing is carried out as follows:
     Firstly, this paper proposes an approach which uses cumulative trust to measure intermittent failure (SCMCT) in MANET. In the one-time monitoring, the information entropy is used for taking down the intermittent of nodes response, and a new distributed monitoring scheme with several collaborative detection methods based on pseudo-space distance is defined in this paper. The simulation result shows this approach is much better than the old. In order to improve on the veracity of detection when nodes with high mobility, by the series of subsection monitoring, the monitoring results are seen as classifiers, and the intermittent failure is measured by the cumulative trust. The simulation result shows this approach is wonderful when nodes with high mobility.
     Secondly, we first present a new routing strategy that generalizes opportunistic routing in multi-channel multi-hop wireless networks. Firstly, after analyzing the seriousness of channel interference and the complexity of channel assignment in Multi-hop Wireless Networks, the novel heuristic channel assignment approach based on the load of network nodes is proposed, which greatly reduces the channel interference of networks. Secondly, we analyze the effective bandwidth of link, in considering the channel Interference, propose the strategy for selecting forwarding candidates set based on EOTT, and prove that EOTT meets the optimization principle.
     Thirdly, Considering the factors of both advantage path and load balance, this paper takes advantage of back-pressure scheduling in the high-load network and makes use of characteristics of Qos in opportunistic routing transmission, and proposes an opportunistic routing strategy(BPS-OR), which based on back-pressure scheduling. In this strategy, EODB is used to describe the expected differential backlog between current node and the next. In opportunistic routing, EODT is designed to depict the expected delay of transmitting the packet to the destination and it is proved that EODT meets the optimization principle, and then the algorithm of forming forwarding candidates set is given out. Experimental results also show that BPS-OR's throughput is 28% higher than DiffQ in low-load network, and the gains rise to 52% in high-load network, which potentially improves the stabilization of transmission efficiency of the wireless networks.
引文
[1]C. E. Perkins and P. Bhagwat. Highly dynamic Destination-Sequenced Distance-Vector routing (DSDV) for mobile computers[C]. In Proc. ACM SIGCOMM Conference(SIGCOMM'94), pages 234~244, August 1993.
    [2]Chan, T. and Gerla, M. Global state routing:a new routing scheme for ad hoc wireless networks[C], IEEE Int'l Conf. on Communications (ICC), Atlanta, GA, USA 1998.
    [3]S. Murthy, J.J. Garcia-Luna-Aceves, An Efficient Routing Protocol for Wireless Networks, Mobile Networks and Applications, Vol.1 (1996),183-197.
    [4]T. Clausen, P. Jacquet, Optimized Link State Routing Protocol (OLSR), , IETF RFC 3626, October 2003.
    [5]Perkins CE, Royer EM. Ad-Hoc on-demand distance vector routing. In:Kristine, K, ed. IEEE Work-Shop on Mobile Computing Systems and Applications (WMCSA).1999.90~100.
    [6]D.B. Johnson, D.A. Maltz, Dynamic Source Routing in Ad Hoc Wireless Networks, in:Mobile Computing, Editors:T. Imielinski and H.F. Korth (Kluwer Academic Publishers,1996), Ch.5,153~181.
    [7]V.D. Park, M. Scott Corson, A Highly Adaptive Distributed Routing Algorithm for Mobile Wireless Networks, Proceedings of IEEE INFOCOM'97, Kobe, Japan (April 1997),1405-1413.
    [8]R. C. Shah, S. Wietholter, J. Rabaey and A. Wolisz. When does opportunistic routing make sense? In IEEE PerSens, Mar 2005.
    [9]S. Biswas and R. Morris. Opportunistic routing in multi-hop wireless networks. In SIGCOMM,2005.
    [10]Arici, T. Altunbasak, Y. Adaptive sensing for environment monitoring using wireless sensor networks. The IEEE Wireless Communications and Networking Conference(WCNC),2004, Volume:4, On page(s):2347~2352 Vol.4
    [11]Alan Mainwaring, David Culler, Joseph Polastre, Robert Szewczyk, John Anderson. Wireless sensor networks for habitat monitoring. the 1st ACM international workshop on Wireless sensor networks and applications, Atlanta, Georgia, USA,2002. Pages:88~97
    [12]Flooding Warning Technologies. http://www.altersystems.org.
    [13]K.A. Delin, S.P. Jackson. The Sensor Web:a new instrument concept, in: Proceedings of SPIE's Symposium on Integrated Optics, San Jose, CA, USA, January 2001.
    [14]S. Meyer and A. Rakotonirainy, A Survey of research on context-aware homes, Australasian Information Security Workshop Conference on ACSW Frontiers (2003).
    [15]Sean M. Brennan, Angela M. Mielke, David C. Torney, Arthur B. MacCabe, Radiation Detection with Distributed Sensor Networks, Computer, v.37 n.8, p.57-59, August 2004
    [16]The Cricket Indoor Location System. http://cricket.csail.mit.edu
    [17]R. J. Fontana, E. Richley, and J. Barney, Commercialization of an Ultra Wideband Precision Asset Location System. In Proceedings of IEEE Conference on Ultra Wideband Systems and Technologies, Nov.2003.
    [18]Loren Schwiebert, Sandeep K.S. Gupta, Jennifer Weinmann, Research challenges in wireless networks of biomedical sensors, Proceedings of the 7th annual international conference on Mobile computing and networking, p.151-165, July 2001, Rome, Italy.
    [19]IETF MANET (Mobile Ad-Hoc Networks) Working Groupmanet-charter.html>.
    [20]G Pei, M. Gerla and T.-W. Chen. Fisheye State Routing in Mobile Ad Hoc Networks. In Proceedings of the 2000 ICDCS Workshops, Taipei, Taiwan, Apr. 2000, pp. DT1~D78.
    [21]Wei Kuang Lai, Sheng-Yu Hsiao, Yuh-Chung Lin. Adaptive backup routing for ad-hoc networks. Computer Communications,2007,2(30):453-464.
    [22]Pei Tingrui, Zeng Wenli, Zhang Zhaoxiao, Peng Tao. An Improved Hierarchical AODV Routing Protocol for Hybrid Wireless Mesh Network. In Proceedings of the 2009 International Conference on Networks Security, Wireless Communications and Trusted Computing (NSWCTC 2009), Apr.2009, Wuhan, China.
    [23]Omar Al-Jarrah, Omar Megdadi. Enhanced AODV routing protocol for Bluetooth scatternet. Computers and Electrical Engineering,2009,1(35):197~208.
    [24]A. Patwardhan, J. Parker, M. Iorga, A. Joshi, T. Karygiannis, Y. Yesha. Threshold-based intrusion detection in ad hoc networks and secure AODV. Ad Hoc Networks,2008,4(6):578~599.
    [25]Omid Abedi, Reza Berangi, M. Abdollahi Azgomi. Improving Route Stability and Overhead on AODV Routing Protocol and Make it Usable for VANET. Proceedings of the 2009 29th IEEE International Conference on Distributed Computing Systems Workshops (ICDCSW 2009), June 22~26,2009 Montreal, Quebec, Canada.
    [26]Zeng K, Lou W, Zhai H. On end-to-end throughput of opportunistic routing in multirate and multihop wireless networks. In IEEE INFOCOM 2008.
    [27]Rahul C. Shah, Sven Wieth olter, Adam Wolisz, Jan M. Rabaey. Modeling and analysis of opportunistic routing in low traffic scenarios. In WiOpt 2005.
    [28]Mingming Lu, Jie Wu. Opportunistic Routing Algebra and its Applications. In IEEE INFOCOM 2009.
    [29]K. Zeng, W. Lou, J. Yang, and D. R. Brown, "On throughput efficiency of geographic opportunistic routing in multihop wireless networks", in QShine'07, Vancouver, British Columbia, Canada, August 2007.
    [30]Rafael Laufer, Leonard Kleinrock. Multirate Anypath Routing in Wireless Mesh Networks. In IEEE INFOCOM 2009.
    [31]P. Gupta and P. R. Kumar, "The capacity of wireless networks," IEEE Trans. Inform. Theory, vol.46, pp.388-404, Mar.2000.
    [32]S. Chachulski, M. Jennings, S. Katti, and D. Katabi. Trading structure for randomness in wireless opportunistic routing. In Proceedings of ACM SIGCOMM 2007, Kyoto, Japan, Aug.
    [33]Fahad R. Dogar, Amar Phanishayee, Himabindu Pucha, Olatunji Ruwase, David G. Andersen. Ditto - A System for Opportunistic Caching in Multi-hop Wireless Networks, In Mobicom 2008.
    [34]Mathias Kurth, Anatolij Zubow and Jens-Peter Redlich, Cooperative Opportunistic Routing using Transmit Diversity in Wireless Mesh Networks, In IEEE INFOCOM 2008.
    [35]M. Dohler, "Virtual antenna arrays," Ph.D. dissertation, King's College London, 2003.
    [36]A. Scaglione, D. L. Goeckel, and J. N. Laneman, "Cooperative communications in mobile ad hoc networks," IEEE Signal Process. Mag., vol.23, no.5, pp.18~29, 2006.
    [37]G Jakllari, S. V. Krishnamurthy, M. Faloutsos, P. V. Krishnamurthy, and O. Ercetin. A cross-layer framework for exploiting virtual MISO links in mobile ad hoc networks. IEEE Trans. Mobile Comput, vol.6, pp.579~594,2007.
    [38]Mei-Hsuan Lu, Peter Steenkiste, Tsuhan Chen. Design. Implementation and Evaluation of an Efficient Opportunistic Retransmission Protocol. In Mobicom 2009.
    [39]Fan Wu, Tingting Chen, Sheng Zhong,Li Erran Li, Yang Richard Yang. Incentive-Compatible Opportunistic Routing for Wireless Networks, In Mobicom 2008.
    [40]Shuo Guo, Yu Gu, Bo Jiang and Tian He, Opportunistic Flooding in Low-Duty-Cycle Wireless Sensor Networks with Unreliable Links. In Mobicom 2009.
    [41]Y. Gu and T. He. Data Forwarding in Extremely Low Duty-Cycle Sensor Networks with Unreliable Communication Links. In SenSys 2007.
    [42]G Lu, N. Sadagopan, B. Krishnamachari, and A. Goel. Delay Efficient Sleep Scheduling in Wireless Sensor Networks. In IEEE INFOCOM 2005.
    [43]J. Zhu, S. Chen, B. Bensaou, and K.-L. Hung. Tradeoff between lifetime and Rate allocation in Wireless Sensor Networks:A Cross Layer Approach. In IEEE INFOCOM 2007.
    [44]Dubois-Ferriere H, Grossglauser M, Vetterli M (2007) Least-cost opportunistic routing. Technical Report LCAVREPORT-2007-001, School of Computer and Communication Sciences, EPFL.
    [45]Remi Badonnel, Radu State, Olivier Festor. Self-configurable fault monitoring in ad-hoc networks[J], Ad Hoc Networks 6 (2008) 458~473
    [46]T. Cover, J. Thomas, Elements of Information Theory [M]. John Wiley and sons, 1991.
    [47]C.E. Shannon. A mathematical theory of communication [J]. The Bell System Technical Journal 27 (1948) 379~423.
    [48]刘军,郭伟,肖百龙,黄飞.移动自组网基于路径维持概率的按需路由协议[J],软件学报,Vol.18,No.3,March 2007,pp.693~701
    [49]Y. Han, R. J. La, and A. M. Makowski. Distribution of path durations in mobile ad-hoc networks—Palm's theorem at work [C]. Proceedings of the 16th ITC Specialist Seminar on Performance Evaluation of Wireless and Mobile Systems, Antwerp,Belgium, August-September 2004.
    [50]R. D'Souza, S. Ramanathan, D.T. Land. Measuring Performance of Ad-hoc Networks using Timescales for Information Flow [C]. Proc. of IEEE International Conference on Computer Communications (INFOCOM'03), San Francisco,CA, USA,2003.
    [51]Dempster A P. Upper and lower probabilities induced by a multivalued mapping [J]. Annals of Mathematical Statistics.1967,38(2):325~339.
    [52]Dempster A P. A generalization of bayesian inference [J]. Journal of the Royal Statistical Society. Series B 1968,30:205~247.
    [53]Shafer G. A mathematical theory of evidence [M]. Princeton, New Jersey: princeton university Press,1976.
    [54]NS-2 network simulator,.
    [55]W. Chen, N. Jain, S. Singh, ANMP. Ad-hoc network management protocol [J]. IEEE Journal on Selected Areas in Communications (JSAC),1999.8(17): 1506~1531.
    [56]Gupta, P., and Kumar, P. R. The capacity of wireless networks [J]. IEEE Transactions on Information Theory 46,2 (Mar.2000).
    [57]IEEE 802.11 Working Group, Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications,1997.
    [58]IEEE 802.11a Working Group, Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications - Amendment 1:High-speed Physical Layer in the 5 GHz band,1999.
    [59]K. Jain, J. Padhye, V. Padmanabhan, and L.Qiu. The impact of interference on multi-hop wireless network performance. In MOBICOM,2003.
    [60]Wei Cheng, Xiuzhen Cheng, Taieb Znati, Xicheng Lu, Zexin Lu, The Complexity of Channel Scheduling in Multi-Radio Multi-Channel Wireless Networks. In IEEE INFOCOM 2009.
    [61]M. Burkhart, P. von Rickenbach, R. Wattenhofer, A. Zollinger, Does topology control reduce interference, Proceedings of ACM MobiHoc'2004, pp.9-19.
    [62]Y. Liu, E. Knightly;.Opportunistic Fair Scheduling over Multiple Wireless Channels.; Proc. of IEEE INFOCOM 03.
    [63]J. So, N. Vaidya;.Multi-Channel MAC for Ad Hoc Networks:Handling Multi-Channel Hidden Terminals Using A Single Transceiver.; Proc. of MobiHOC 2004.
    [64]A. Nasipuri, S. Das;.A Multichannel CSMA MAC Protocol for Mobile Multihop Networks.; Proc. of IEEE WCNC'99.
    [65]A. Raniwala, K. Gopalan, T. Chiueh, Centralized channel assignment and routing algorithms for multi-channel wireless mesh networks, ACM Mobile Computing and Communications Review (MC2R), Vol.8(2004), pp.50~65.
    [66]A. Raniwala, T. Chiueh, Architecture.and algorithms for an IEEE 802.11-based multi-channel wireless mesh network, Proceedings of IEEE INFOCOM'2005.
    [67]J. Tang, G Xue, W. Zhang, Interference-aware topology control and QoS routing in multi-channel wireless mesh networks, in:Proceedings of ACM MOBIHOC, 2005, pp.68~77.
    [68]P. Kyasanur, N. H. Vaidya, Routing and interface assignment in multi-channel multi-interface wireless networks, Proceedings of WCNC'2005.
    [69]D. S. J. De Couto, D. Aguayo, J. Bicket, and R. Morris. A high-throughput path metric for multi-hop wireless routing. In Mobicom 2003.
    [70]R. Draves, J. Padhye, and B. Zill, "Routing in Multi-Radio, Multi-Hop Wireless Mesh Networks," in Proceedings of the ACM MobiCom'04 Conference, Philadelphia, PA, USA, Sep.2004, pp.114~128.
    [71]J. Bicket, D. Aguayo, S. Biswas, and R. Morris. Architecture and evaluation of an unplanned 802.11b mesh network. In MOBICOM,2005.
    [72]L. Tassiulas and A. Ephremides. Stability properties of constrained queueing systems and scheduling for maximum throughput in multihop radio networks. IEEE Transactions on Automatic Control,1992,12(37):1936-1949,
    [73]L. Ying, S. Shakkottai, and A. Reddy, On Combining Shortest-Path and Back-Pressure Routing Over Multihop Wireless Networks, In Proc. IEEE Infocom, Rio de Janeiro, Brazil,2009.
    [74]B. Radunovic, C. Gkantsidis, D. Gunawardena, and P. Key. Horizon:Balancing TCP over multiple paths in wireless mesh network. In Mobicom' 2008.
    [75]Ajit Warrier, Sankararaman Janakiraman, Sangtae Ha and Injong Rhee, "DiffQ: Practical Differential Backlog Congestion Control for Wireless Networks", in Proc. IEEE Infocom, Rio de Janeiro, Brazil,2009.
    [76]L. Georgiadis, M. Neely, and L. Tassiulas. Resource allocation and cross-layer control in wireless networks. Foundations and Trends in Networking, 2006,1(1):1~144.
    [77]ANSI/IEEE.802.11e:Wireless LAN medium access control (MAC) and physical layer (PHY) specifications, Amendment 8:Medium access control (MAC) enhancements for quality of service (QoS). IEEE Std 802.11e-2005, Nov.2005.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700