• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Wang Li, Zhang Suwei, Li Zhansheng, Song Linjian. A Multi-Path Routing Protocol Based on Divide and Conquer Strategy in Ad Hoc Network[J]. Journal of Computer Research and Development, 2008, 45(1).
Citation: Wang Li, Zhang Suwei, Li Zhansheng, Song Linjian. A Multi-Path Routing Protocol Based on Divide and Conquer Strategy in Ad Hoc Network[J]. Journal of Computer Research and Development, 2008, 45(1).

A Multi-Path Routing Protocol Based on Divide and Conquer Strategy in Ad Hoc Network

More Information
  • Published Date: January 14, 2008
  • Routing in MANETs can be accomplished through either single path or multiple paths. Multipath routing may be used for various other reasons such as load-balancing, congestion avoidance, lower frequency of route inquiries and to achieve a lower overall routing overhead and better fault-tolerance. However, multipath routing shows degraded performance with increased distance between the source node and the destination node. Following a policy of divide and rule, a node-balanced scheme is proposed to solve this problem. In the proposed scheme, first the unipath routing protocol is used to find the best routing path from the source node to the destination node; then the routing path is divided into several segments and every segment is traded with the multipath routing policy. As every segment has the best performance, the performance of the whole network is improved accordingly. Furthermore how the moderate node is chosen to replace the failed node between the two adjacent segments is also discussed. Simulation results show that the new scheme not only significantly improves the performance of the network , but also can find more number of routing paths when increasing the distance between the source nodes and the destination nodes. The new scheme is also very easy to implement.
  • Related Articles

    [1]Zhao Shengnan, Jiang Han, Wei Xiaochao, Ke Junming, Zhao Minghao. An Efficient Single Server-Aided k-out-of-n Oblivious Transfer Protocol[J]. Journal of Computer Research and Development, 2017, 54(10): 2215-2223. DOI: 10.7544/issn1000-1239.2017.20170463
    [2]Zhang Hongbin, Ji Donghong, Yin Lan, Ren Yafeng, Niu Zhengyu. Caption Generation from Product Image Based on Tag Refinement and Syntactic Tree[J]. Journal of Computer Research and Development, 2016, 53(11): 2542-2555. DOI: 10.7544/issn1000-1239.2016.20150906
    [3]Chen Tieming, Yang Yimin, Chen Bo. Maldetect: An Android Malware Detection System Based on Abstraction of Dalvik Instructions[J]. Journal of Computer Research and Development, 2016, 53(10): 2299-2306. DOI: 10.7544/issn1000-1239.2016.20160348
    [4]Liu Duo, Dai Yiqi. Construction of Transformation Matrix with a Given Period Modulo N[J]. Journal of Computer Research and Development, 2012, 49(5): 925-931.
    [5]Hu Kai, Wang Zhe, Jiang Shu, and Yin Baolin. A Performance Model of k-Ary n-Cube Under Communication Locality[J]. Journal of Computer Research and Development, 2011, 48(11): 2083-2093.
    [6]Sun Decai, Sun Xingming, Zhang Wei, and Liu Yuling. A Filter Algorithm for Approximate String Matching Based on Match-Region Features[J]. Journal of Computer Research and Development, 2010, 47(4): 663-670.
    [7]Chen Huahong, Luo Xiaonan, Ling Ruotian, Ma Jianping. A Mesh Simplification Algorithm Based on n-Edges-Mesh Collapse[J]. Journal of Computer Research and Development, 2008, 45(6).
    [8]Zhang Yuejie, Xu Zhiting, and Xue Xiangyang. Fusion of Multiple Features for Chinese Named Entity Recognition Based on Maximum Entropy Model[J]. Journal of Computer Research and Development, 2008, 45(6).
    [9]Xia Luning and Jing Jiwu. An Administrative Model for Role-Based Access Control Using Hierarchical Namespace[J]. Journal of Computer Research and Development, 2007, 44(12): 2020-2027.
    [10]Tang Huanling, Sun Jiantao, Lu Yuchang. A Weight Adjustment Technique with Feature Weight Function Named TEF-WA in Text Categorization[J]. Journal of Computer Research and Development, 2005, 42(1): 47-53.

Catalog

    Article views (447) PDF downloads (368) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return