亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來(lái)到蟲(chóng)蟲(chóng)下載站! | ?? 資源下載 ?? 資源專輯 ?? 關(guān)于我們
? 蟲(chóng)蟲(chóng)下載站

?? draft-ietf-manet-dsr-10.txt

?? 無(wú)線自組織網(wǎng)絡(luò)協(xié)議
?? TXT
?? 第 1 頁(yè) / 共 5 頁(yè)
字號(hào):
3. DSR Protocol Overview   This section provides an overview of the operation of the DSR   protocol.  The basic version of DSR uses explicit "source routing",   in which each data packet sent carries in its header the complete,   ordered list of nodes through which the packet will pass.  This use   of explicit source routing allows the sender to select and control   the routes used for its own packets, supports the use of multiple   routes to any destination (for example, for load balancing), and   allows a simple guarantee that the routes used are loop-free; by   including this source route in the header of each data packet, other   nodes forwarding or overhearing any of these packets can also easily   cache this routing information for future use.  Section 3.1 describes   this basic operation of Route Discovery, Section 3.2 describes basic   Route Maintenance, and Sections 3.3 and 3.4 describe additional   features of these two parts of DSR's operation.  Section 3.5 then   describes an optional, compatible extension to DSR, known as "flow   state", that allows the routing of most packets without an explicit   source route header in the packet, while still preserves the   fundamental properties of DSR's operation.3.1. Basic DSR Route Discovery   When some source node originates a new packet addressed to some   destination node, the source node places in the header of the packet   a "source route" giving the sequence of hops that the packet is to   follow on its way to the destination.  Normally, the sender will   obtain a suitable source route by searching its "Route Cache" of   routes previously learned; if no route is found in its cache, it will   initiate the Route Discovery protocol to dynamically find a new route   to this destination node.  In this case, we call the source node   the "initiator" and the destination node the "target" of the Route   Discovery.   For example, suppose a node A is attempting to discover a route to   node E.  The Route Discovery initiated by node A in this example   would proceed as follows:            ^    "A"    ^   "A,B"   ^  "A,B,C"  ^ "A,B,C,D"            |   id=2    |   id=2    |   id=2    |   id=2         +-----+     +-----+     +-----+     +-----+     +-----+         |  A  |---->|  B  |---->|  C  |---->|  D  |---->|  E  |         +-----+     +-----+     +-----+     +-----+     +-----+            |           |           |           |            v           v           v           v   To initiate the Route Discovery, node A transmits a "Route   Request" as a single local broadcast packet, which is received by   (approximately) all nodes currently within wireless transmissionJohnson, et al             Expires 19 January 2005              [Page 6]INTERNET-DRAFT     The Dynamic Source Routing Protocol      19 July 2004   range of A, including node B in this example.  Each Route Request   identifies the initiator and target of the Route Discovery, and   also contains a unique request identification (2, in this example),   determined by the initiator of the Request.  Each Route Request also   contains a record listing the address of each intermediate node   through which this particular copy of the Route Request has been   forwarded.  This route record is initialized to an empty list by the   initiator of the Route Discovery.  In this example, the route record   initially lists only node A.   When another node receives this Route Request (such as node B in this   example), if it is the target of the Route Discovery, it returns   a "Route Reply" to the initiator of the Route Discovery, giving   a copy of the accumulated route record from the Route Request;   when the initiator receives this Route Reply, it caches this route   in its Route Cache for use in sending subsequent packets to this   destination.   Otherwise, if this node receiving the Route Request has recently seen   another Route Request message from this initiator bearing this same   request identification and target address, or if this node's own   address is already listed in the route record in the Route Request,   this node discards the Request.  (A node considers a Request recently   seen if it still has information about that Request in its Route   Request Table, which is described in Section 4.3.)  Otherwise, this   node appends its own address to the route record in the Route Request   and propagates it by transmitting it as a local broadcast packet   (with the same request identification).  In this example, node B   broadcast the Route Request, which is received by node C; nodes C   and D each also, in turn, broadcast the Request, resulting in a copy   of the Request being received by node E.   In returning the Route Reply to the initiator of the Route Discovery,   such as in this example, node E replying back to node A, node E will   typically examine its own Route Cache for a route back to A, and if   found, will use it for the source route for delivery of the packet   containing the Route Reply.  Otherwise, E SHOULD perform its own   Route Discovery for target node A, but to avoid possible infinite   recursion of Route Discoveries, it MUST piggyback this Route Reply   on the packet containing its own Route Request for A.  It is also   possible to piggyback other small data packets, such as a TCP SYN   packet [33], on a Route Request using this same mechanism.   Node E could instead simply reverse the sequence of hops in the route   record that it is trying to send in the Route Reply, and use this as   the source route on the packet carrying the Route Reply itself.  For   MAC protocols such as IEEE 802.11 that require a bidirectional frame   exchange as part of the MAC protocol [13], the discovered source   route MUST be reversed in this way to return the Route Reply since it   tests the discovered route to ensure it is bidirectional before theJohnson, et al             Expires 19 January 2005              [Page 7]INTERNET-DRAFT     The Dynamic Source Routing Protocol      19 July 2004   Route Discovery initiator begins using the route; this route reversal   also avoids the overhead of a possible second Route Discovery.   When initiating a Route Discovery, the sending node saves a copy of   the original packet (that triggered the Discovery) in a local buffer   called the "Send Buffer".  The Send Buffer contains a copy of each   packet that cannot be transmitted by this node because it does not   yet have a source route to the packet's destination.  Each packet in   the Send Buffer is logically associated with the time that it was   placed into the Send Buffer and is discarded after residing in the   Send Buffer for some timeout period SendBufferTimeout; if necessary   for preventing the Send Buffer from overflowing, a FIFO or other   replacement strategy MAY also be used to evict packets even before   they expire.   While a packet remains in the Send Buffer, the node SHOULD   occasionally initiate a new Route Discovery for the packet's   destination address.  However, the node MUST limit the rate at which   such new Route Discoveries for the same address are initiated (as   described in Section 4.3), since it is possible that the destination   node is not currently reachable.  In particular, due to the limited   wireless transmission range and the movement of the nodes in the   network, the network may at times become partitioned, meaning that   there is currently no sequence of nodes through which a packet could   be forwarded to reach the destination.  Depending on the movement   pattern and the density of nodes in the network, such network   partitions may be rare or may be common.   If a new Route Discovery was initiated for each packet sent by a   node in such a partitioned network, a large number of unproductive   Route Request packets would be propagated throughout the subset   of the ad hoc network reachable from this node.  In order to   reduce the overhead from such Route Discoveries, a node SHOULD use   an exponential back-off algorithm to limit the rate at which it   initiates new Route Discoveries for the same target, doubling the   timeout between each successive Discovery initiated for the same   target.  If the node attempts to send additional data packets to this   same destination node more frequently than this limit, the subsequent   packets SHOULD be buffered in the Send Buffer until a Route Reply is   received giving a route to this destination, but the node MUST NOT   initiate a new Route Discovery until the minimum allowable interval   between new Route Discoveries for this target has been reached.  This   limitation on the maximum rate of Route Discoveries for the same   target is similar to the mechanism required by Internet nodes to   limit the rate at which ARP Requests are sent for any single target   IP address [3].Johnson, et al             Expires 19 January 2005              [Page 8]INTERNET-DRAFT     The Dynamic Source Routing Protocol      19 July 20043.2. Basic DSR Route Maintenance   When originating or forwarding a packet using a source route, each   node transmitting the packet is responsible for confirming that data   can flow over the link from that node to the next hop.  For example,   in the situation shown below, node A has originated a packet for   node E using a source route through intermediate nodes B, C, and D:         +-----+     +-----+     +-----+     +-----+     +-----+         |  A  |---->|  B  |---->|  C  |-->? |  D  |     |  E  |         +-----+     +-----+     +-----+     +-----+     +-----+   In this case, node A is responsible for the link from A to B, node B   is responsible for the link from B to C, node C is responsible for   the link from C to D, node D is responsible for the link from D to E.   An acknowledgement can provide confirmation that a link is capable of   carrying data, and in wireless networks, acknowledgements are often   provided at no cost, either as an existing standard part of the MAC   protocol in use (such as the link-layer acknowledgement frame defined   by IEEE 802.11 [13]), or by a "passive acknowledgement" [18] (in   which, for example, B confirms receipt at C by overhearing C transmit   the packet when forwarding it on to D).   If a built-in acknowledgement mechanism is not available, the   node transmitting the packet can explicitly request a DSR-specific   software acknowledgement be returned by the next node along the   route; this software acknowledgement will normally be transmitted   directly to the sending node, but if the link between these two nodes   is unidirectional (Section 4.6), this software acknowledgement could   travel over a different, multi-hop path.   After an acknowledgement has been received from some neighbor, a node   MAY choose to not require acknowledgements from that neighbor for a   brief period of time, unless the network interface connecting a node   to that neighbor always receives an acknowledgement in response to   unicast traffic.   When a software acknowledgement is used, the acknowledgement   request SHOULD be retransmitted up to a maximum number of times.   A retransmission of the acknowledgement request can be sent as a   separate packet, piggybacked on a retransmission of the original   data packet, or piggybacked on any packet with the same next-hop   destination that does not also contain a software acknowledgement.   After the acknowledgement request has been retransmitted the maximum   number of times, if no acknowledgement has been received, then the   sender treats the link to this next-hop destination as currently   "broken".  It SHOULD remove this link from its Route Cache and   SHOULD return a "Route Error" to each node that has sent a packetJohnson, et al             Expires 19 January 2005              [Page 9]INTERNET-DRAFT     The Dynamic Source Routing Protocol      19 July 2004   routed over that link since an acknowledgement was last received.   For example, in the situation shown above, if C does not receive   an acknowledgement from D after some number of requests, it would   return a Route Error to A, as well as any other node that may have   used the link from C to D since C last received an acknowledgement   from D. Node A then removes this broken link from its cache; any   retransmission of the original packet can be performed by upper   layer protocols such as TCP, if necessary.  For sending such a   retransmission or other packets to this same destination E, if A has   in its Route Cache another route to E (for example, from additional   Route Replies from its earlier Route Discovery, or from having   overheard sufficient routing information from other packets), it   can send the packet using the new route immediately.  Otherwise, it   SHOULD perform a new Route Discovery for this target (subject to the   back-off described in Section 3.1).Johnson, et al             Expires 19 January 2005             [Page 10]INTERNET-DRAFT     The Dynamic Source Routing Protocol      19 July 2004

?? 快捷鍵說(shuō)明

復(fù)制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號(hào) Ctrl + =
減小字號(hào) Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
91社区在线播放| 色天使色偷偷av一区二区| 欧美一区二区人人喊爽| 亚洲五月六月丁香激情| 色综合网色综合| 亚洲免费在线视频| 91在线视频免费91| 国产精品嫩草影院av蜜臀| 国产成人av一区二区三区在线 | 日产国产高清一区二区三区| 欧美亚洲丝袜传媒另类| 亚洲一区在线观看免费观看电影高清| av不卡免费在线观看| 国产精品美女久久久久久久久| 风间由美一区二区av101| 国产三级精品视频| 成人在线视频一区二区| 国产精品日日摸夜夜摸av| jlzzjlzz欧美大全| 亚洲另类春色国产| 欧美日韩日日摸| 日韩国产一区二| 精品国产髙清在线看国产毛片| 久久99精品久久久久久久久久久久 | 91在线国产福利| 亚洲精品国产成人久久av盗摄| 欧洲中文字幕精品| 欧美日韩在线不卡| 日韩精品免费视频人成| 91精品国产综合久久福利| 久久99热这里只有精品| 国产视频911| 色综合网色综合| 首页国产欧美久久| 欧美精品一区视频| 成人黄色大片在线观看| 一级日本不卡的影视| 欧美人妇做爰xxxⅹ性高电影| 蜜桃视频在线观看一区二区| 国产亚洲一区二区三区| 91在线porny国产在线看| 亚洲二区在线视频| 欧美tickling挠脚心丨vk| 粉嫩嫩av羞羞动漫久久久| 一区二区三区在线影院| 91精品国产综合久久精品app| 国产一区二区美女| 亚洲欧美福利一区二区| 欧美一区二区视频网站| 国产成人av网站| 亚洲精品免费一二三区| 69p69国产精品| 国产不卡视频在线观看| 亚洲国产一区二区a毛片| 欧美va日韩va| 色爱区综合激月婷婷| 麻豆一区二区99久久久久| 国产精品久久毛片av大全日韩| 精品婷婷伊人一区三区三| 激情另类小说区图片区视频区| 亚洲欧洲美洲综合色网| 欧美一区二区三区视频| 成人午夜私人影院| 日韩高清电影一区| 成人黄色电影在线| 人人精品人人爱| 成人免费在线播放视频| 91精品午夜视频| 99九九99九九九视频精品| 日本亚洲最大的色成网站www| 国产精品―色哟哟| 91精品国产91久久久久久最新毛片| 成人一二三区视频| 免费精品99久久国产综合精品| 国产精品高潮呻吟| 欧美成人高清电影在线| 色呦呦网站一区| 国产乱人伦偷精品视频不卡| 亚洲成av人影院| 国产精品久久久久一区二区三区共| 91精品国产综合久久精品| 91丨九色porny丨蝌蚪| 韩日av一区二区| 性做久久久久久免费观看 | 欧美一区二区三区在线电影| av网站免费线看精品| 美女在线视频一区| 亚洲小说欧美激情另类| 中文字幕av资源一区| 欧美电影免费观看高清完整版在线观看 | 欧美浪妇xxxx高跟鞋交| av网站免费线看精品| 国产在线观看免费一区| 亚洲aaa精品| 91国产免费看| 懂色av噜噜一区二区三区av| 久久99久久久欧美国产| 亚洲网友自拍偷拍| 中文字幕一区二区三区不卡在线| 精品国产精品网麻豆系列| 在线播放国产精品二区一二区四区 | 成年人午夜久久久| 国产最新精品免费| 美女视频免费一区| 天天爽夜夜爽夜夜爽精品视频| 自拍偷自拍亚洲精品播放| 国产亚洲一区二区在线观看| 精品国产一区二区三区久久久蜜月 | 制服丝袜在线91| 欧美天堂亚洲电影院在线播放| 波多野结衣视频一区| 国产成人免费视频网站| 国内精品第一页| 久久精品噜噜噜成人av农村| 日日摸夜夜添夜夜添国产精品 | 国产欧美一区二区精品性色| 精品理论电影在线观看| 日韩视频一区在线观看| 欧美精品第1页| 欧美乱妇一区二区三区不卡视频| 91福利在线看| 91久久国产综合久久| 91丨九色丨蝌蚪丨老版| 97久久久精品综合88久久| 成人va在线观看| 成人黄色一级视频| 99久久精品免费精品国产| jlzzjlzz国产精品久久| 成人动漫中文字幕| 99久久精品99国产精品| 91原创在线视频| 色乱码一区二区三区88| 91黄视频在线观看| 在线观看日韩毛片| 欧美日韩国产在线观看| 欧美精品免费视频| 91精品黄色片免费大全| 日韩一区二区三区四区| 精品精品国产高清a毛片牛牛| 久久综合色天天久久综合图片| 久久色在线观看| 欧美国产日产图区| 亚洲色图一区二区| 亚洲综合一区在线| 丝袜美腿亚洲综合| 免费精品视频在线| 国产精品亚洲午夜一区二区三区| 国产超碰在线一区| 91香蕉视频黄| 欧美日韩一区二区三区视频 | 欧美精品九九99久久| 日韩一区二区三区电影在线观看| 欧美岛国在线观看| 欧美国产精品中文字幕| 日韩一区中文字幕| 亚洲成在人线在线播放| 蜜桃精品视频在线观看| 国产精品综合av一区二区国产馆| 成人免费毛片嘿嘿连载视频| 色噜噜久久综合| 欧美一区二区私人影院日本| 久久精品一区四区| 亚洲日本丝袜连裤袜办公室| 五月天一区二区| 国产在线不卡一区| 91片黄在线观看| 777午夜精品免费视频| 久久久久久亚洲综合| 亚洲免费视频中文字幕| 日韩成人av影视| 处破女av一区二区| 欧美色倩网站大全免费| 26uuu亚洲婷婷狠狠天堂| 亚洲欧洲性图库| 日本欧美加勒比视频| 国产99一区视频免费| 在线观看av一区二区| 337p日本欧洲亚洲大胆精品| 亚洲色图20p| 美女一区二区久久| 91蜜桃视频在线| 日韩欧美精品三级| 亚洲色图视频网| 久久精品国产久精国产| 91天堂素人约啪| 日韩欧美国产综合| 亚洲天堂网中文字| 麻豆一区二区三| 色婷婷久久一区二区三区麻豆| 欧美tickling网站挠脚心| 亚洲欧美激情在线| 韩国午夜理伦三级不卡影院| 色国产综合视频| 国产亚洲综合av| 日韩在线卡一卡二| av影院午夜一区| 精品国产免费久久| 亚洲国产中文字幕在线视频综合| 国产精品一区二区在线播放| 欧美日韩一区二区三区四区|