Upload Code
loading-left
loading loading loading
loading-right

Loading

Profile
No self-introduction
codes (1)
AODV working source code
4.0
AODV is an on-demand routing protocol. It selects the shortest path from the number of paths. It includes three phases: RREQ routing request, RREP routing reply and rrer error message routing. The storage node will broadcast its ID to the neighbor to use the Hello message. You can check the source code in the NS2 folder aodv.cc And AODV. H for more information about this topic. AODV includes four tables, namely, AODV neighbor table, AODV precursor list, AODV broadcast ID table and AODV routing table. Neighbor table is used to store the ID of the neighbor of any node. This is the class that depicts the adjacent table, which has a common andprotected member. There is only one member function 'AODV' in the public member_ Neighbor 'is actually a constructor, which initializes the variable' NB '_ Addr 'when creating a class instance. It is composed of two unprotected member variables 1) NB_ Addr and 2) NB_ expire。 These two variables are in the store's neighbor table. The second is the neighbor address, and the second is the expiration time based on. These tables or classes are all nodes in the topology running AODV protocol. Precursorlist maintains the ID of the RREQ source and RREQ destination while giving reply to the source. It periodically removes the entry. Broadcastidclass is source address (nsaddr)_ t src),Currentnode'Id (u_ int32_ T ID) and make it expiration time. When AODV protocol source starts RREQ packet, it will brocast has another RQ - & gt; RQ in natural and RREQ packet_ bcast_ The ID field represents the current RREQ broadcast ID value. Therefore, each node of the while forwarding RREQ packet maintains this table, so the calledbroadcastid table handles the broadcast request packet. Like all reactive power protocols in AODV, the philosophy is that only topology information is propagated by node on demand. When a node wants to communicate with a host without routing, it will generate a re that will be submerged in a limited way to other nodes
jassica
2016-08-23
0
1
No more~