亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? draft-ietf-manet-dsr-10.txt

?? DSR-UU is a DSR implementation that runs in Linux and in the ns-2 network simulator. DSR-UU imple
?? TXT
?? 第 1 頁 / 共 5 頁
字號:
3. DSR Protocol Overview   This section provides an overview of the operation of the DSR   protocol.  The basic version of DSR uses explicit "source routing",   in which each data packet sent carries in its header the complete,   ordered list of nodes through which the packet will pass.  This use   of explicit source routing allows the sender to select and control   the routes used for its own packets, supports the use of multiple   routes to any destination (for example, for load balancing), and   allows a simple guarantee that the routes used are loop-free; by   including this source route in the header of each data packet, other   nodes forwarding or overhearing any of these packets can also easily   cache this routing information for future use.  Section 3.1 describes   this basic operation of Route Discovery, Section 3.2 describes basic   Route Maintenance, and Sections 3.3 and 3.4 describe additional   features of these two parts of DSR's operation.  Section 3.5 then   describes an optional, compatible extension to DSR, known as "flow   state", that allows the routing of most packets without an explicit   source route header in the packet, while still preserves the   fundamental properties of DSR's operation.3.1. Basic DSR Route Discovery   When some source node originates a new packet addressed to some   destination node, the source node places in the header of the packet   a "source route" giving the sequence of hops that the packet is to   follow on its way to the destination.  Normally, the sender will   obtain a suitable source route by searching its "Route Cache" of   routes previously learned; if no route is found in its cache, it will   initiate the Route Discovery protocol to dynamically find a new route   to this destination node.  In this case, we call the source node   the "initiator" and the destination node the "target" of the Route   Discovery.   For example, suppose a node A is attempting to discover a route to   node E.  The Route Discovery initiated by node A in this example   would proceed as follows:            ^    "A"    ^   "A,B"   ^  "A,B,C"  ^ "A,B,C,D"            |   id=2    |   id=2    |   id=2    |   id=2         +-----+     +-----+     +-----+     +-----+     +-----+         |  A  |---->|  B  |---->|  C  |---->|  D  |---->|  E  |         +-----+     +-----+     +-----+     +-----+     +-----+            |           |           |           |            v           v           v           v   To initiate the Route Discovery, node A transmits a "Route   Request" as a single local broadcast packet, which is received by   (approximately) all nodes currently within wireless transmissionJohnson, et al             Expires 19 January 2005              [Page 6]INTERNET-DRAFT     The Dynamic Source Routing Protocol      19 July 2004   range of A, including node B in this example.  Each Route Request   identifies the initiator and target of the Route Discovery, and   also contains a unique request identification (2, in this example),   determined by the initiator of the Request.  Each Route Request also   contains a record listing the address of each intermediate node   through which this particular copy of the Route Request has been   forwarded.  This route record is initialized to an empty list by the   initiator of the Route Discovery.  In this example, the route record   initially lists only node A.   When another node receives this Route Request (such as node B in this   example), if it is the target of the Route Discovery, it returns   a "Route Reply" to the initiator of the Route Discovery, giving   a copy of the accumulated route record from the Route Request;   when the initiator receives this Route Reply, it caches this route   in its Route Cache for use in sending subsequent packets to this   destination.   Otherwise, if this node receiving the Route Request has recently seen   another Route Request message from this initiator bearing this same   request identification and target address, or if this node's own   address is already listed in the route record in the Route Request,   this node discards the Request.  (A node considers a Request recently   seen if it still has information about that Request in its Route   Request Table, which is described in Section 4.3.)  Otherwise, this   node appends its own address to the route record in the Route Request   and propagates it by transmitting it as a local broadcast packet   (with the same request identification).  In this example, node B   broadcast the Route Request, which is received by node C; nodes C   and D each also, in turn, broadcast the Request, resulting in a copy   of the Request being received by node E.   In returning the Route Reply to the initiator of the Route Discovery,   such as in this example, node E replying back to node A, node E will   typically examine its own Route Cache for a route back to A, and if   found, will use it for the source route for delivery of the packet   containing the Route Reply.  Otherwise, E SHOULD perform its own   Route Discovery for target node A, but to avoid possible infinite   recursion of Route Discoveries, it MUST piggyback this Route Reply   on the packet containing its own Route Request for A.  It is also   possible to piggyback other small data packets, such as a TCP SYN   packet [33], on a Route Request using this same mechanism.   Node E could instead simply reverse the sequence of hops in the route   record that it is trying to send in the Route Reply, and use this as   the source route on the packet carrying the Route Reply itself.  For   MAC protocols such as IEEE 802.11 that require a bidirectional frame   exchange as part of the MAC protocol [13], the discovered source   route MUST be reversed in this way to return the Route Reply since it   tests the discovered route to ensure it is bidirectional before theJohnson, et al             Expires 19 January 2005              [Page 7]INTERNET-DRAFT     The Dynamic Source Routing Protocol      19 July 2004   Route Discovery initiator begins using the route; this route reversal   also avoids the overhead of a possible second Route Discovery.   When initiating a Route Discovery, the sending node saves a copy of   the original packet (that triggered the Discovery) in a local buffer   called the "Send Buffer".  The Send Buffer contains a copy of each   packet that cannot be transmitted by this node because it does not   yet have a source route to the packet's destination.  Each packet in   the Send Buffer is logically associated with the time that it was   placed into the Send Buffer and is discarded after residing in the   Send Buffer for some timeout period SendBufferTimeout; if necessary   for preventing the Send Buffer from overflowing, a FIFO or other   replacement strategy MAY also be used to evict packets even before   they expire.   While a packet remains in the Send Buffer, the node SHOULD   occasionally initiate a new Route Discovery for the packet's   destination address.  However, the node MUST limit the rate at which   such new Route Discoveries for the same address are initiated (as   described in Section 4.3), since it is possible that the destination   node is not currently reachable.  In particular, due to the limited   wireless transmission range and the movement of the nodes in the   network, the network may at times become partitioned, meaning that   there is currently no sequence of nodes through which a packet could   be forwarded to reach the destination.  Depending on the movement   pattern and the density of nodes in the network, such network   partitions may be rare or may be common.   If a new Route Discovery was initiated for each packet sent by a   node in such a partitioned network, a large number of unproductive   Route Request packets would be propagated throughout the subset   of the ad hoc network reachable from this node.  In order to   reduce the overhead from such Route Discoveries, a node SHOULD use   an exponential back-off algorithm to limit the rate at which it   initiates new Route Discoveries for the same target, doubling the   timeout between each successive Discovery initiated for the same   target.  If the node attempts to send additional data packets to this   same destination node more frequently than this limit, the subsequent   packets SHOULD be buffered in the Send Buffer until a Route Reply is   received giving a route to this destination, but the node MUST NOT   initiate a new Route Discovery until the minimum allowable interval   between new Route Discoveries for this target has been reached.  This   limitation on the maximum rate of Route Discoveries for the same   target is similar to the mechanism required by Internet nodes to   limit the rate at which ARP Requests are sent for any single target   IP address [3].Johnson, et al             Expires 19 January 2005              [Page 8]INTERNET-DRAFT     The Dynamic Source Routing Protocol      19 July 20043.2. Basic DSR Route Maintenance   When originating or forwarding a packet using a source route, each   node transmitting the packet is responsible for confirming that data   can flow over the link from that node to the next hop.  For example,   in the situation shown below, node A has originated a packet for   node E using a source route through intermediate nodes B, C, and D:         +-----+     +-----+     +-----+     +-----+     +-----+         |  A  |---->|  B  |---->|  C  |-->? |  D  |     |  E  |         +-----+     +-----+     +-----+     +-----+     +-----+   In this case, node A is responsible for the link from A to B, node B   is responsible for the link from B to C, node C is responsible for   the link from C to D, node D is responsible for the link from D to E.   An acknowledgement can provide confirmation that a link is capable of   carrying data, and in wireless networks, acknowledgements are often   provided at no cost, either as an existing standard part of the MAC   protocol in use (such as the link-layer acknowledgement frame defined   by IEEE 802.11 [13]), or by a "passive acknowledgement" [18] (in   which, for example, B confirms receipt at C by overhearing C transmit   the packet when forwarding it on to D).   If a built-in acknowledgement mechanism is not available, the   node transmitting the packet can explicitly request a DSR-specific   software acknowledgement be returned by the next node along the   route; this software acknowledgement will normally be transmitted   directly to the sending node, but if the link between these two nodes   is unidirectional (Section 4.6), this software acknowledgement could   travel over a different, multi-hop path.   After an acknowledgement has been received from some neighbor, a node   MAY choose to not require acknowledgements from that neighbor for a   brief period of time, unless the network interface connecting a node   to that neighbor always receives an acknowledgement in response to   unicast traffic.   When a software acknowledgement is used, the acknowledgement   request SHOULD be retransmitted up to a maximum number of times.   A retransmission of the acknowledgement request can be sent as a   separate packet, piggybacked on a retransmission of the original   data packet, or piggybacked on any packet with the same next-hop   destination that does not also contain a software acknowledgement.   After the acknowledgement request has been retransmitted the maximum   number of times, if no acknowledgement has been received, then the   sender treats the link to this next-hop destination as currently   "broken".  It SHOULD remove this link from its Route Cache and   SHOULD return a "Route Error" to each node that has sent a packetJohnson, et al             Expires 19 January 2005              [Page 9]INTERNET-DRAFT     The Dynamic Source Routing Protocol      19 July 2004   routed over that link since an acknowledgement was last received.   For example, in the situation shown above, if C does not receive   an acknowledgement from D after some number of requests, it would   return a Route Error to A, as well as any other node that may have   used the link from C to D since C last received an acknowledgement   from D. Node A then removes this broken link from its cache; any   retransmission of the original packet can be performed by upper   layer protocols such as TCP, if necessary.  For sending such a   retransmission or other packets to this same destination E, if A has   in its Route Cache another route to E (for example, from additional   Route Replies from its earlier Route Discovery, or from having   overheard sufficient routing information from other packets), it   can send the packet using the new route immediately.  Otherwise, it   SHOULD perform a new Route Discovery for this target (subject to the   back-off described in Section 3.1).Johnson, et al             Expires 19 January 2005             [Page 10]INTERNET-DRAFT     The Dynamic Source Routing Protocol      19 July 2004

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
成人免费小视频| 欧美精品日韩精品| 国产日韩欧美高清| 国产69精品久久99不卡| 日本一区二区三区免费乱视频| 国产一区二区精品久久91| 国产日韩欧美精品在线| 9久草视频在线视频精品| 亚洲免费观看视频| 欧美色综合天天久久综合精品| 日日摸夜夜添夜夜添精品视频| 亚洲欧美日韩在线播放| 一本大道久久a久久精二百| 午夜视频在线观看一区| 久久综合色天天久久综合图片| 国产99久久久国产精品潘金网站| 最新日韩av在线| 欧美疯狂做受xxxx富婆| 国产91丝袜在线观看| 一个色妞综合视频在线观看| 欧美一级二级三级乱码| 国产69精品久久777的优势| 亚洲午夜免费福利视频| 久久久美女艺术照精彩视频福利播放| 波多野结衣一区二区三区| 亚洲成人一区在线| 欧美经典一区二区| 欧美色综合影院| 国产精品一区二区久久精品爱涩| 亚洲另类一区二区| 精品成a人在线观看| 波多野结衣视频一区| 久久精品国产精品亚洲精品| 中文字幕亚洲欧美在线不卡| 91精品国产综合久久小美女| va亚洲va日韩不卡在线观看| 日韩电影在线观看电影| 国产精品成人免费精品自在线观看| 欧美日韩电影一区| a4yy欧美一区二区三区| 精品亚洲成av人在线观看| 一区二区不卡在线播放| 国产精品美女久久久久久久久久久| 欧美裸体bbwbbwbbw| 91丨九色丨尤物| 国产传媒一区在线| 免费观看在线综合| 亚洲午夜久久久久久久久电影院 | 五月综合激情日本mⅴ| 久久久精品免费免费| 9191久久久久久久久久久| www.亚洲免费av| 国产酒店精品激情| 蜜臀av性久久久久av蜜臀妖精| 一区二区日韩av| 国产精品久久久久久妇女6080| 日韩三级免费观看| 91.com视频| 欧美视频一区二区三区在线观看| 成人白浆超碰人人人人| 国产一区在线观看视频| 蜜桃视频一区二区三区| 丝袜美腿亚洲一区| 午夜精品一区二区三区免费视频 | 精品视频一区二区三区免费| 99久久精品免费| 福利视频网站一区二区三区| 国产在线精品免费| 久久精品二区亚洲w码| 日韩精品一二三| 日韩高清中文字幕一区| 日韩激情在线观看| 日日摸夜夜添夜夜添亚洲女人| 亚洲福利视频一区二区| 亚洲电影在线免费观看| 亚洲午夜国产一区99re久久| 亚洲午夜电影在线观看| 婷婷丁香久久五月婷婷| 日韩精品视频网站| 看电影不卡的网站| 欧美日韩国产大片| 欧美吞精做爰啪啪高潮| 欧美日韩视频第一区| 欧美日韩一区二区三区四区| 欧美性受xxxx黑人xyx| 欧美三级中文字| 7777精品伊人久久久大香线蕉经典版下载 | 欧美在线一区二区| 欧美三级在线看| 欧美一级欧美三级| 欧美v亚洲v综合ⅴ国产v| 久久新电视剧免费观看| 国产欧美日韩不卡免费| 中文字幕在线不卡一区 | 91香蕉国产在线观看软件| 色偷偷88欧美精品久久久| 欧美专区日韩专区| 欧美精品xxxxbbbb| 精品国产一区二区三区忘忧草| 久久精品视频一区二区三区| 中文字幕欧美国产| 一级女性全黄久久生活片免费| 爽好多水快深点欧美视频| 蜜臀久久久久久久| 成人精品免费网站| 欧美剧情电影在线观看完整版免费励志电影 | 麻豆国产精品视频| 国产69精品一区二区亚洲孕妇| 91啪亚洲精品| 欧美成人精品1314www| 国产精品盗摄一区二区三区| 亚洲午夜激情av| 国产精品综合一区二区| 欧洲日韩一区二区三区| 日韩精品一区二区三区在线观看 | 精品久久久久久最新网址| 国产精品蜜臀av| 石原莉奈在线亚洲三区| 国产成人99久久亚洲综合精品| 欧美在线观看视频一区二区| 精品卡一卡二卡三卡四在线| 亚洲欧美日韩综合aⅴ视频| 91免费国产在线| 欧美一区二区三区视频在线观看 | 一区二区三区日韩在线观看| 蜜桃av噜噜一区| 色www精品视频在线观看| 精品av综合导航| 亚洲国产中文字幕| 成人黄色软件下载| 日韩三级.com| 亚洲一区二区三区中文字幕 | 久久99精品久久只有精品| 99国产精品久久久久| 欧美不卡在线视频| 亚洲一区二区三区爽爽爽爽爽 | 中文字幕在线不卡一区二区三区| 日韩1区2区3区| 91麻豆免费在线观看| 国产亚洲精品bt天堂精选| 丝袜亚洲精品中文字幕一区| 色婷婷av久久久久久久| 中文字幕精品一区二区三区精品| 日本人妖一区二区| 欧美曰成人黄网| 亚洲男人的天堂在线观看| 国产成人在线观看| 欧美精品一区二区三区蜜臀| 日韩高清一区在线| 欧美日韩一区二区三区在线| 亚洲精品成人精品456| jlzzjlzz亚洲日本少妇| 欧美国产禁国产网站cc| 激情综合色播激情啊| 日韩亚洲欧美一区| 日本在线播放一区二区三区| 欧美人成免费网站| 亚洲大片精品永久免费| 欧美日韩在线直播| 亚洲午夜国产一区99re久久| 欧洲一区在线观看| 亚洲综合成人网| 欧美日韩综合在线| 亚洲国产精品久久不卡毛片| 欧美伊人久久大香线蕉综合69| 亚洲欧美日韩综合aⅴ视频| 一本久久综合亚洲鲁鲁五月天| 亚洲欧美国产三级| 91麻豆免费在线观看| 亚洲一区在线免费观看| 欧美亚洲综合在线| 水野朝阳av一区二区三区| 欧美一区二区成人| 加勒比av一区二区| 欧美激情在线一区二区| gogogo免费视频观看亚洲一| 综合av第一页| 欧美四级电影网| 美女视频黄a大片欧美| 久久免费看少妇高潮| 粉嫩蜜臀av国产精品网站| 亚洲欧洲国产日韩| 欧美性色黄大片| 奇米色一区二区三区四区| 337p粉嫩大胆色噜噜噜噜亚洲| 国产一区二三区| 亚洲色图欧洲色图| 欧美无砖专区一中文字| 久久成人免费电影| 国产欧美日韩在线| 在线观看一区二区精品视频| 日日摸夜夜添夜夜添精品视频 | 国产精品视频线看| 色婷婷久久久久swag精品| 日韩不卡免费视频| 日本一区二区成人在线| 欧美亚洲综合网| 激情五月播播久久久精品| 亚洲欧洲日产国产综合网| 欧美剧情片在线观看|