Font Size: a A A

Ad Hoc Network Routing Protocols And Certification Study

Posted on:2009-01-24Degree:MasterType:Thesis
Country:ChinaCandidate:Q XiaoFull Text:PDF
GTID:2208360248452390Subject:Communication and Information System
Abstract/Summary:PDF Full Text Request
Ad Hoc network is a special kind of wireless mobile communications network, all nodes are equal in ad hoc network which has a characteristic of no central control node and strong survivability.Nodes in the network is not only for ordinary mobile terminal function, but also the ability to transmit messages. When the source node is not within the scope of direct communication, it can transmit message through intermediate nodes. Sometimes the communication between nodes may have to go through a number of intermediate nodes in order to transmit that message to the destination node, this is the most fundamental difference between Ad Hoc networks and other mobile communication networks . Ad Hoc network nodes through layered network protocols and distributed algorithm for mutual coordination and network's self-organized and operation. Therefore, it is called multi-hop wireless network, self-organized networks, or no fixed infrastructure network.In this paper, we introduce the basic concepts,characteristics of Ad Hoc network, as well as comparisons with other networks, and then focused on the Ad Hoc network routing technology, including table-driven and demand-drive routing protocols,mainly analyse the working principle of several routing protocols, which are DSDV, OLSR, DSR, AODV protocols. At the same time, introduced the concept of network simulation, analyse and compare several network simulation software; then expounded the NS2 wireless mobile model and the process of designing simulation program under NS2, researched the Ad Hoc Network performance of the various routing protocols under simulation platform NS2; Finally, we reseaeched the the authentication technologies in Ad Hoc network, on the basis of analysizing existing research results on it, we proposed two new authentication scheme.The end of this paper are the summary, and the next step work presented.
Keywords/Search Tags:Ad Hoc network, table-driven routing protocol, On-demand driven routing protocol, authentication, NS-2
PDF Full Text Request
Related items