فهرست:
1- فصل اول: مقدمه.............................................................................................................................................. 10
1-1 پیشگفتار..................................................................................................................................................... 10
1-2 مشخصات شبکه های نظامی................................................................................................................. 11
1-3 کارکرد شبکه های اقتضایی در سیستم های نظامی.................................................... 12
1-4 ساختار پایان نامه............................................................................................................................ 13
2- فصل دوم: شبکه های اقتضایی متحرک........................................................................................... 14
2-1 مقدمه............................................................................................................................................................... 14
2-2 تعریف شبکههای اقتضایی............................................................................................................... 15
2-3 تاریخچه شبکههای اقتضایی........................................................................................................ 17
2-4 ساختار لایهها در شبکههای اقتضایی.................................................................................. 20
2-5 انواع شبکه های اقتضایی بی سیم........................................................................................... 23
2-5-1 شبکه بی سیم مش...................................................................................................................... 23
2-5-2 شبکه حسگر هوشمند:............................................................................................................. 24
2-5-3 شبکه های اقتضایی متحرک............................................................................................. 25
2-6 کاربرد شبکه های اقتضایی بی سیم........................................................................................ 25
2-7 شبکه های بی سیم اقتضایی نظامی........................................................................................... 29
2-8 شبکه های اقتضایی ناهمگن.............................................................................................................. 30
2-9 ویژگیهای یا چالشهای شبکههای اقتضایی :........................................................................................................ 32
2-10 مسیریابی، بزرگترین چالش شبکههای اقتضایی :.................................................................................................... 34
2-10-1 چالشهای مسیریابی در شبکههای اقتضایی بی سیم :.......................... 35
2-11 نرم افزار شبیه ساز NS2................................................................................................................... 35
3- فصل سوم: الگوریتم های مسیریابی در شبکه های اقتضایی بی سیم همگن...... 38
3-1 مقدمه............................................................................................................................................................... 38
3-2 ویژگی های پروتکل های مسیریابی شبکه های بی سیم اقتضایی................... 39
3-3 تقسیم بندی پروتکل های مسیریابی شبکه های اقتضایی بی سیم............... 40
3-3-1 پروتکل های مسیریابی یکسان نگر................................................................... 41
3-3-2 پروتکل های مسیریابی سلسله مراتبی......................................................... 44
3-3-3 پروتکل های مسیریابی متکی بر موقعیت جغرافیایی..................... 44
3-3-4 پروتکل های مسیریابی ترکیبی.......................................................................... 45
3-4 بررسی دقیق تر پروتکل های مسیریابی برای ساختار مسطح.......................... 47
3-4-1 پروتکل مسیریابی DSDV................................................................................................... 47
3-4-2 پروتکل مسیریابی AODV.................................................................................................. 48
3-4-3 پروتکل DSR.................................................................................................................................... 49
3-4-4 پروتکل OLSR.................................................................................................................................. 50
3-5 بررسی دقیق تر پروتکل های مسیریابی سلسله مراتبی..................................... 51
3-5-1 پروتکل ZRP.................................................................................................................................... 52
3-5-2 پروتکل LANMAR........................................................................................................................... 52
4- فصل چهارم: پروتکل های مسیریابی در شبکه های ناهمگن......................................... 54
4-1 مقدمه............................................................................................................................................................... 54
4-2 شبکههای ناهمگن................................................................................................................................................... 54
4-3 گسترش روزافزون شبکه های ناهمگن..................................................................................................................... 55
4-4 ساختار سلسله مراتبی در شبکه های ناهمگن.......................................................................................................... 58
4-5 پروتکل های مسیریابی در شبکه های ناهمگن......................................................................................................... 61
4-5-1 روش HGRP :........................................................................................................................................ 62
4-5-2 مسیریابی یابی سلسله مراتبی مبتنی بر ناحیه.............................. 65
4-5-3 روش مسیریابی HOLSR :........................................................................................................ 67
4-5-4 روش مسیریابی HCB :............................................................................................................. 71
4-5-5 روش HAODV........................................................................................................................................ 73
4-5-6 روش HRTT :......................................................................................................................................... 75
4-5-7 ساختار زیرساخت متحرک................................................................................................. 78
4-5-8 پروتکل پیشنهادی HDSDV :.............................................................................................. 85
4-5-9 روش HAODV :..................................................................................................................................... 92
5- فصل پنجم: شبیه سازی................................................................................................................................ 93
5-1 مقدمه............................................................................................................................................................... 93
5-2 نرم افزار های شبیه ساز شبکه.................................................................................................. 93
5-3 ساختار شبیه ساز NS2 :........................................................................................................................ 96
5-4 معیارهای ارزیابی عملکرد پروتکل مسیریابی....................................................... 99
5-5 نتایج شبیه سازی................................................................................................................................ 100
5-5-1 بررسی پروتکل پیشنهادی در حل مشکل مقیاس پذیری..................... 100
5-5-2 بررسی اثر تعداد خوشه ها........................................................................................ 104
6- فصل هفتم: نتیجه گیری و پیشنهادات..................................................................................... 107
6-1 نتیجه گیری.............................................................................................................................................. 107
6-2 پیشنهادات :............................................................................................................................................. 108
7- فهرست اختصارات......................................................................................................................................... 108
8- فهرست منابع........................................................................................................................................................... 109
منبع:
[1] O. Tronarp, "Quality of Service in Tactical Ad Hoc Networks by Priority Queuing."
[2] B. C. Kim, J. S. Lee, Y. Bang, J. K. Lee, H. S. Lee, and J. S. Ma, "Design of IPv6 Tactical Network based on Commercial Technologies: Architecture, Routing, and Mobility Management," in Advanced Communication Technology, 2008. ICACT 2008. 10th International Conference on, 2008, pp. 708-713.
[3] J. Y. Choi and Y.-B. Ko, "Multi-path routing with load-aware metric for tactical ad hoc networks," in Information and Communication Technology Convergence (ICTC), 2010 International Conference on, 2010, pp. 370-375.
[4] B. Kim, K. Kim, H.-l. Koo, B.-h. Roh, Y.-S. Kim, and J.-S. Jin, "Tactical network design and simulator with wireless mesh network-based backbone architecture," in Applications and Technology Conference (LISAT), 2010 Long Island Systems, 2010, pp. 1-5.
[5] S. R. Raju, K. Runkana, and J. Mungara, "ZRP versus AODV and DSR: A Comprehensive Study on ZRP Performance on MANETs," in Computational Intelligence and Communication Networks (CICN), 2010 International Conference on, 2010, pp. 194-199.
[6] H. Chen, X. Zhang, D. Zhang, and Z. Fu, "Multi-agent collaboration based trust routing scheme for military ad hoc network," in Open-Source Software for Scientific Computation (OSSC), 2011 International Workshop on, 2011, pp. 37-42.
[7] M. X. Cheng and D. Li, Advances in wireless ad hoc and sensor networks: Springer, 2008.
[8] C. K. Toh, "Ad hoc mobile wireless networks: protocols and systems," 2001.
[9] R. Jurdak, Wireless ad hoc and sensor networks: A cross-layer design perspective: Springer Science+ Business Media, 2007.
[10] R. Ramanathan and J. Redi, "A brief overview of ad hoc networks: challenges and directions," IEEE communications Magazine, vol. 40, pp. 20-22, 2002.
[11] "http://en.wikipedia.org/wiki/Packet_radio."
[12] C. E. Perkins and P. Bhagwat, "Highly dynamic destination-sequenced distance-vector routing (DSDV) for mobile computers," in ACM SIGCOMM Computer Communication Review, 1994, pp. 234-244.
[13] D. Johnsort, "Routing in ad hoc networks of mobile hosts," in Mobile Computing Systems and Applications, 1994. WMCSA 1994. First Workshop on, 1994, pp. 158-163.
[14] A. S. Tanenbaum, Computer networks vol. 4: Prentice-Hall Englewood Cliffs (NY), 1989.
[15] I. C. S. L. M. S. Committee, "Wireless LAN medium access control (MAC) and physical layer (PHY) specifications," ed: IEEE Std, 1997.
[16] A. U. Bhobe and P. L. Perini, "An overview of smart antenna technology for wireless communication," in Aerospace Conference, 2001, IEEE Proceedings., 2001, pp. 2/875-2/883 vol. 2.
[17] G. Lin, G. Noubir, and R. Rajaraman, "Mobility models for ad hoc network simulation," in INFOCOM 2004. Twenty-third AnnualJoint Conference of the IEEE Computer and Communications Societies, 2004.
[18] S. Basagni, M. Conti, S. Giordano, and I. Stojmenovic, Mobile ad hoc networking: Wiley. com, 2004.
[19] S. K. Sarkar, T. Basavaraju, and C. Puttamadappa, Ad hoc mobile wireless networks: principles, protocols and applications: CRC Press, 2007.
[20] P. Mohapatra and S. Krishnamurthy, AD HOC NETWORKS: technologies and protocols: Springer, 2005.
[21] P. Kuosmanen, "Choosing routing protocol for military ad hoc networks based on network structure and dynamics," Master's Thesis, Helsinki University of Technology, 2002.
[22] K. Chandrashekar, R. Morera, A. McAuley, and J. Baras, "Domain based hierarchical routing for large heterogeneous MANETs," in Military Communications Conference, 2005. MILCOM 2005. IEEE, 2005, pp. 1284-1290.
[23] K. Xu and M. Gerla, "A heterogeneous routing protocol based on a new stable clustering scheme," in MILCOM 2002. Proceedings, 2002, pp. 838-843.
[24] Y. Xia, C. K. Yeo, and B. S. Lee, "Hierarchical cluster based routing for highly mobile heterogeneous MANET," in Network and Service Security, 2009. N2S'09. International Conference on, 2009, pp. 1-6.
[25] S. Chakrabarti and A. Mishra, "Quality of service in mobile ad hoc networks," in The handbook of ad hoc wireless networks, 2003, pp. 41-69.
[26] H. A. Amri, M. Abolhasan, and T. Wysocki, "Scalability of MANET routing protocols for heterogeneous and homogenous networks," Computers & Electrical Engineering, vol. 36, pp. 752-765, 2010.
[27] "http://en.wikipedia.org/wiki/Ns_(simulator)."
[28] T. Issariyakul and E. Hossain, An introduction to network simulator NS2: Springer, 2012.
[29] K. Fall and K. Varadhan, "The ns Manual (formerly ns Notes and Documentation)," The VINT project, vol. 47, 2005.
[30] T. Larsson and N. Hedman, "Routing protocols in wireless ad-hoc networks-a simulation study," Stockholm: Luleå University of Technology. Master Thesis, 1998.
[31] Y.-B. Ko, V. Shankarkumar, and N. H. Vaidya, "Medium access control protocols using directional antennas in ad hoc networks," in INFOCOM 2000. Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies. Proceedings. IEEE, 2000, pp. 13-21.
[32] M. Ilyas, The handbook of ad hoc wireless networks vol. 29: CRC press, 2010.
[33] J. Mingliang, "A Cluster-based Routing Protocol for Mobile Ad hoc Networks," National Univerisity of Singapore Singapore1999.
[34] R. Beraldi and R. Baldoni, "Unicast routing techniques for mobile ad hoc networks," Handbook of Ad Hoc Networks, CRC Press, New York, 2003.
[35] V. N. Talooki and K. Ziarati, "Performance comparison of routing protocols for mobile ad hoc networks," in Communications, 2006. APCC'06. Asia-Pacific Conference on, 2006, pp. 1-5.
[36] T. Clausen, P. Jacquet, C. Adjih, A. Laouiti, P. Minet, P. Muhlethaler, et al., "Optimized link state routing protocol (OLSR)," 2003.
[37] T.-C. Huang, C.-K. Liao, and C.-R. Dow, "Zone-based hierarchical routing in two-tier backbone ad hoc networks," in Networks, 2004.(ICON 2004). Proceedings. 12th IEEE International Conference on, 2004, pp. 650-654.
[38] K. Xu, X. Hong, and M. Gerla, "An ad hoc network with mobile backbones," in Communications, 2002. ICC 2002. IEEE International Conference on, 2002, pp. 3138-3143.
[39] G. Pei, M. Gerla, and X. Hong, "LANMAR: landmark routing for large scale wireless ad hoc networks with group mobility," in Proceedings of the 1st ACM international symposium on Mobile ad hoc networking & computing, 2000, pp. 11-18.
[40] Y. Shen, Q. Pei, N. Xi, J. Ma, Q. Xu, and H. Yin, "HGRP: hybrid grid routing protocol for heterogeneous hierarchical wireless networks," in Intelligent Networking and Collaborative Systems (INCoS), 2011 Third International Conference on, 2011, pp. 320-327.
[41] C. E. Perkins, E. M. Royer, S. R. Das, and M. K. Marina, "Performance comparison of two on-demand routing protocols for ad hoc networks," Personal Communications, IEEE, vol. 8, pp. 16-28, 2001.
[42] M. Gerla and J. T.-C. Tsai, "Multicluster, mobile, multimedia radio network," Wireless networks, vol. 1, pp. 255-265, 1995.
[43] A. D. Amis, R. Prakash, T. H. Vuong, and D. T. Huynh, "Max-min d-cluster formation in wireless ad hoc networks," in INFOCOM 2000. Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies. Proceedings. IEEE, 2000, pp. 32-41.
[44] G. Chen, F. Garcia Nocetti, J. S. Gonzalez, and I. Stojmenovic, "Connectivity based k-hop clustering in wireless networks," in System Sciences, 2002. HICSS. Proceedings of the 35th Annual Hawaii International Conference on, 2002, pp. 2450-2459.
[45] F. Li, S. Zhang, X. Wang, X. Xue, and H. Shen, "Vote-based clustering algorithm in mobile ad hoc networks," in Information Networking. Networking Technologies for Broadband and Mobile Networks, ed: Springer, 2004, pp. 13-23.
[46] T. Ohta, S. Inoue, and Y. Kakuda, "An adaptive multihop clustering scheme for highly mobile ad hoc networks," in Autonomous Decentralized Systems, 2003. ISADS 2003. The Sixth International Symposium on, 2003, pp. 293-300.
[47] I. I. Er and W. K. G. Seah, "Mobility-based d-hop clustering algorithm for mobile ad hoc networks," in Wireless Communications and Networking Conference, 2004. WCNC. 2004 IEEE, 2004, pp. 2359-2364.
[48] P. Basu, N. Khan, and T. D. Little, "A mobility based metric for clustering in mobile ad hoc networks," in Distributed Computing Systems Workshop, 2001 International Conference on, 2001, pp. 413-418.
[49] A. B. McDonald and T. F. Znati, "A mobility-based framework for adaptive clustering in wireless ad hoc networks," Selected Areas in Communications, IEEE Journal on, vol. 17, pp. 1466-1487, 1999.
[50] C. R. Lin and M. Gerla, "Adaptive clustering for mobile wireless networks," Selected Areas in Communications, IEEE Journal on, vol. 15, pp. 1265-1275, 1997.
[51] C.-C. Chiang, H.-K. Wu, W. Liu, and M. Gerla, "Routing in clustered multihop, mobile wireless networks with fading channel," in proceedings of IEEE SICON, 1997, pp. 197-211.
[52] J. Yu and P. H. Chong, "3hbac (3-hop between adjacent clusterheads): a novel non-overlapping clustering algorithm for mobile ad hoc networks," in Communications, Computers and signal Processing, 2003. PACRIM. 2003 IEEE Pacific Rim Conference on, 2003, pp. 318-321.
[53] T. J. Kwon and M. Gerla, "Efficient flooding with passive clustering (PC) in ad hoc networks," ACM SIGCOMM Computer Communication Review, vol. 32, pp. 44-56, 2002.
[54] A. D. Amis and R. Prakash, "Load-balancing clusters in wireless ad hoc networks," in Application-Specific Systems and Software Engineering Technology, 2000. Proceedings. 3rd IEEE Symposium on, 2000, pp. 25-32.
[55] J. Wu, F. Dai, M. Gao, and I. Stojmenovic, "On calculating power-aware connected dominating sets for efficient routing in ad hoc wireless networks," Communications and Networks, Journal of, vol. 4, pp. 59-70, 2002.
[56] J.-h. Ryu, S. Song, and D.-H. Cho, "New clustering schemes for energy conservationin two-tiered mobile ad hoc networks," Vehicular Technology, IEEE Transactions on, vol. 51, pp. 1661-1668, 2002.
[57] M. Chatterjee, S. K. Das, and D. Turgut, "An on-demand weighted clustering algorithm (WCA) for ad hoc networks," in Global Telecommunications Conference, 2000. GLOBECOM'00. IEEE, 2000, pp. 1697-1701.
[58] Y.-X. Wang and F. S. Bao, "An entropy-based weighted clustering algorithm and its optimization for ad hoc networks," in Wireless and Mobile Computing, Networking and Communications, 2007. WiMOB 2007. Third IEEE International Conference on, 2007, pp. 56-56.
[59] F. Djemili Tolba, D. Magoni, and P. Lorenz, "Connectivity, energy and mobility driven clustering algorithm for mobile ad hoc networks," in Global Telecommunications Conference, 2007. GLOBECOM'07. IEEE, 2007, pp. 2786-2790.
[60] S. K. Dhurandher and G. Singh, "Weight based adaptive clustering in wireless ad hoc networks," in Personal Wireless Communications, 2005. ICPWC 2005. 2005 IEEE International Conference on, 2005, pp. 95-100.
[61] R. Morera, A. McAuley, and L. Wong, "Robust router reconfiguration in large dynamic networks," in Military Communications Conference, 2003. MILCOM'03. 2003 IEEE, 2003, pp. 1343-1347.
[62] Y. Ge, L. Lamont, and L. Villasenor, "Hierarchical OLSR-a scalable proactive routing protocol for heterogeneous ad hoc networks," in Wireless And Mobile Computing, Networking And Communications, 2005.(WiMob'2005), IEEE International Conference on, 2005, pp. 17-23.
[63] H. Safa, H. Artail, M. Karam, H. Ollaic, and R. Abdallah, "HAODV: a New routing protocol to support interoperability in heterogeneous MANET," in Computer Systems and Applications, 2007. AICCSA'07. IEEE/ACS International Conference on, 2007, pp. 893-900.
[64] X. Zhong, S. Mei, Y. Wang, and J. Wang, "Stable enhancement for AODV routing protocol," in Personal, Indoor and Mobile Radio Communications, 2003. PIMRC 2003. 14th IEEE Proceedings on, 2003, pp. 201-205.
[65] J. Xu and H. Wang, "Zone Routing with Backbone for Tactical Network," in Wireless Communications, Networking and Mobile Computing, 2008. WiCOM'08. 4th International Conference on, 2008, pp. 1-4.
[66] M. Gerla, X. Hong, and G. Pei, "Landmark routing for large ad hoc wireless networks," in Global Telecommunications Conference, 2000. GLOBECOM'00. IEEE, 2000, pp. 1702-1706.
[67] X. Zeng, R. Bagrodia, and M. Gerla, "GloMoSim: a library for parallel simulation of large-scale wireless networks," in Parallel and Distributed Simulation, 1998. PADS 98. Proceedings. Twelfth Workshop on, 1998, pp. 154-161.
[68] E. Altman and T. Jimenez, "NS Simulator for beginners," Synthesis Lectures on Communication Networks, vol. 5, pp. 1-184, 2012.