吉林大学学报(工学版) ›› 2012, Vol. 42 ›› Issue (增刊1): 285-289.

Previous Articles     Next Articles

Packet sending algorithm based on bundle protocol in DTN networks

WANG Kun, YU Yue, ZHANG Yu-hua, GUO Huang, WANG Lin-lin   

  1. Key Laboratory of Broadband Wireless Communication and Sensor Network Technology of Ministry of Education, Nanjing University of Posts and Telecommunications, Nanjing 210003, China
  • Received:2012-05-01 Online:2012-09-01 Published:2012-09-01

Abstract: Bundle and block were introduced into DTN transmission protocol,which shred data into bits to deal with frequent interruption in DTN network. Bundle and LTP protocol in DTN transmission layer were put forward,and the impact of block size on transmission efficiency was investigated when network enviornment probably vary dramatically in a short time. Finally we put forward a Bundle sending algorithm that dynamically changes its strategy in DTN network to achieve the best transmission efficiency and system performance. Simulation results show that selecting proper size of data block can increase the transmission effectiveness.

Key words: computer application, DTN, Bundle, block, transmission effectiveness

CLC Number: 

  • TP393
[1] Wu Yan-wei. Dealing with selfishness and moral hazard in noncooperative wireless networks[J]. Mobile Computing,2010,3(9): 420-434.

[2] Johannes Gbel,Anthony Krzesinski,Michel Mandjes.Incentive-based control of ad hoc networks: a performance study[J]. Computer Networks,2009(53): 2427-2443.

[3] Jocelyne Elias,Fabio Martignon,Konstantin Avrachenkov,et al. A game theoretic analysis of network design with socially-aware users[J]. Computer Networks,2011(55):106-118.

[4] Jain S,Fall K,Patra R. Routing in a delay tolerant network[C]//Proceedings of SIGCOMM,Portland,OR,2004:145-158.

[5] Ma Richard T B,Lee Sam C M,Lui John C S,et al. Incentive and service differentiation in P2P networks: a game theoretic approach[J]. IEEE/ACM Transactions On Networking,2006,5(14):978-991.

[6] Alex McMahon,Stephen Farrell. Delay-and disruption-tolerant networking[J]. IEEE Computer Society,2009(9):82-87.

[7] Bezirgiannidis N. Packet size and DTN transport service: evaluation on a DTN testbed[C]//Proceedings of International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT),2010: 1198-1205.

[8] Fida M. DTN-RSim: an event-based routing simulator for DTN[C]//International Conference on Computer Networks and Information Technology (ICCNIT),2011: 99-104.
[1] LIU Fu,ZONG Yu-xuan,KANG Bing,ZHANG Yi-meng,LIN Cai-xia,ZHAO Hong-wei. Dorsal hand vein recognition system based on optimized texture features [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(6): 1844-1850.
[2] WANG Li-min,LIU Yang,SUN Ming-hui,LI Mei-hui. Ensemble of unrestricted K-dependence Bayesian classifiers based on Markov blanket [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(6): 1851-1858.
[3] JIN Shun-fu,WANG Bao-shuai,HAO Shan-shan,JIA Xiao-guang,HUO Zhan-qiang. Synchronous sleeping based energy saving strategy of reservation virtual machines in cloud data centers and its performance research [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(6): 1859-1866.
[4] ZHAO Dong,SUN Ming-yu,ZHU Jin-long,YU Fan-hua,LIU Guang-jie,CHEN Hui-ling. Improved moth-flame optimization method based on combination of particle swarm optimization and simplex method [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(6): 1867-1872.
[5] LIU En-ze,WU Wen-fu. Agricultural surface multiple feature decision fusion disease judgment algorithm based on machine vision [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(6): 1873-1878.
[6] OUYANG Dan-tong, FAN Qi. Clause-level context-aware open information extraction [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(5): 1563-1570.
[7] LIU Fu, LAN Xu-teng, HOU Tao, KANG Bing, LIU Yun, LIN Cai-xia. Metagenomic clustering method based on k-mer frequency optimization [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(5): 1593-1599.
[8] GUI Chun, HUANG Wang-xing. Network clustering method based on improved label propagation algorithm [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(5): 1600-1605.
[9] LIU Yuan-ning, LIU Shuai, ZHU Xiao-dong, CHEN Yi-hao, ZHENG Shao-ge, SHEN Chun-zhuang. LOG operator and adaptive optimization Gabor filtering for iris recognition [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(5): 1606-1613.
[10] CHE Xiang-jiu, WANG Li, GUO Xiao-xin. Improved boundary detection based on multi-scale cues fusion [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(5): 1621-1628.
[11] ZHAO Hong-wei, LIU Yu-qi, DONG Li-yan, WANG Yu, LIU Pei. Dynamic route optimization algorithm based on hybrid in ITS [J]. 吉林大学学报(工学版), 2018, 48(4): 1214-1223.
[12] HUANG Hui, FENG Xi-an, WEI Yan, XU Chi, CHEN Hui-ling. An intelligent system based on enhanced kernel extreme learning machine for choosing the second major [J]. 吉林大学学报(工学版), 2018, 48(4): 1224-1230.
[13] FU Wen-bo, ZHANG Jie, CHEN Yong-le. Network topology discovery algorithm against routing spoofing attack in Internet of things [J]. 吉林大学学报(工学版), 2018, 48(4): 1231-1236.
[14] CAO Jie, SU Zhe, LI Xiao-xu. Image annotation method based on Corr-LDA model [J]. 吉林大学学报(工学版), 2018, 48(4): 1237-1243.
[15] HOU Yong-hong, WANG Li-wei, XING Jia-ming. HTTP-based dynamic adaptive streaming video transmission algorithm [J]. 吉林大学学报(工学版), 2018, 48(4): 1244-1253.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!