首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到19条相似文献,搜索用时 93 毫秒
1.
无线Ad Hoc网中,公平分配资源和最大化利用资源本质上是冲突的,这对资源分配算法的设计带来了挑战.在系统地分析Ad Hoc网络的信息流竞争特点的基础上,引入价格作为资源分配的度量指标,通过路由发现时的价格查询以及路由响应时的价格反馈,消除分布式预测带来的不一致性,构建了一种新的基于价格的无线Ad Hoc网络资源分配算法,对资源分配进行了仿真实验.仿真结果表明:改进的资源分配算法具有良好的收敛性,与现有的资源分配算法相比提高了资源利用率.  相似文献   

2.
兰明蛟  彭来献  田畅  胡明 《系统仿真学报》2008,20(5):1178-1182,1191
为了克服现有模拟器可扩展性差或只能模拟某一层协议的缺点,设计并开发了战术Ad Hoc网络模拟器,提供无线分组网模拟环境,模拟实际无线分组网信道数据传输特性,为Ad Hoc网络上层协议或算法提供一个不涉及具体无线组网协议、可扩展性好的调试平台,并测试了该模拟器的功能和性能,结果表明该模拟器功能正确、模拟精度高。  相似文献   

3.
为了提高多射频多信道Ad Hoc网络容量,降低网络间无线干扰,提出从跨层优化综合考虑信道与功率联合分配问题,将信道与功率分配问题转化为混合整数非线性规划模型,针对模型设计两阶段子问题求解迭代算法。算法在第一阶段采用启发式算法分配信道,在第二阶段采用分布式算法进行功率分配。仿真实验结果表明,信道与功率联合分配相对于固定信道下功率分配具有更好的效果,联合优化两阶段迭代算法可有效提高网络整体效用,同时降低节点间相互干扰。  相似文献   

4.
Ad Hoc网络是一种多跳的自组织网络,网络是由移动的节点组成。Ad Hoc网络的许多应用都依赖层次结构的支持,簇结构是Ad Hoc网络中应用最为广泛的层次结构,而这种层次结构的形成和维护依赖于某种分簇算法。提出了移动节点的平均连接度和能量状态的计算方法,并在此基础上提出了一种新的基于权值的分簇算法(NWBCA),通过对算法进行分析和仿真测试,证明了该算法的有效性。  相似文献   

5.
将Ad Hoc网络理论与卫星通信系统相结合,提出了基于Ad Hoc网络的卫星通信系统模型。并根据此模型,利用OPNET软件构建了系统仿真框架并进行仿真.同时对时延和吞吐率进行了分析,从而得出基于Ad Hoc网络的卫星通信系统所具有的利弊。  相似文献   

6.
Ad Hoc网络可扩展性仿真分析   总被引:1,自引:0,他引:1  
影响Ad Hoc网络可扩展性的因素很多,本文在特定移动模型和路由算法的前提下,提出了一个仿真模型,并利用GlomoSim仿真工具对不同结点数组成的平面结构网络逐跳时延和包丢失率进行了仿真,得出了AODV路由协议的可扩展性优于DSR协议的结论,并根据仿真结果推断出网络的规模不可能过大。  相似文献   

7.
一种无线局域网节能协议研究   总被引:1,自引:0,他引:1  
黎宁  徐艳  谢胜利 《系统仿真学报》2004,16(12):2831-2836
提出了一种基于802.11DCF的分布式报文驱动节能协议802.11PS协议,通过使结点在既不能发送又无需接收时进入睡眠状态来节省其能量消耗。采用近似方法分析了协议在全互连网络中的节能性能,并通过仿真验证了近似分析的合理性。结果表明,在没有接入点的无线局域网环境中,当网络负荷较高时,802.11PS协议能够有效降低网络结点无线网卡总功耗(最多可节能70%以上),并且其时延和吞吐率性能仍与802.11DCF协议大体相当。协议无需全网同步,也可用于多跳ad hoc网络。  相似文献   

8.
基于Petri网模型的Ad Hoc网络可生存性分析   总被引:1,自引:0,他引:1  
基于Ad Hoc网络动态拓扑结构难以用模型精确描述的特性,建立了可以表示网络中任意两个结点之间动态数据传输关系的Petri网模型,通过计算两个结点连通的概率和在规定时间内成功传输给定长度数据的概率,对网络的可生存性进行了研究,同时举例分析了结点传输范围和平均邻居结点数目两个网络因素对可生存性的影响。实验结果可以指导用户对网络可生存性进行度量,或根据实际的可生存性需求,调整相应的网络参数。  相似文献   

9.
无线网卡能耗建模及在GloMoSim中的实现   总被引:13,自引:4,他引:9  
黎宁  王小伟  郑少仁 《系统仿真学报》2003,15(5):696-699,712
参照笔记本电脑无线网卡各工作模式下功率消耗实测结果,建立了ad hoc网络结点无线网卡能耗模型,并介绍了如何在GloMoSim仿真环境中进行实现。此模型可广泛用于ad hoc网络无线结点能量消耗的研究中。运用新模型对IEEE 802.11节能模式的仿真表明:在流数目较多网络负荷较大时802.11节能模式并不能有效节省结点能耗,协议还需进一步改进。  相似文献   

10.
网络节点的不断运动造成AdHoc网络拓扑的动态性.描述和量化动态性是设计、仿真以及测量Ad Hoc网络的基础.首先推导出Ad Hoc网络的链路持续时间分布和拓扑持续时间分布的计算公式,并进行了仿真验证.然后提出利用TTL值感知拓扑变化的方法,并研究了此方法的感知率.最后基于以上结果,提出将网络断层扫描技术应用于Ad Hoc网络时,在测量时间内网络拓扑不发生变化的概率计算公式,并在Ad Hoc网络步行速度场景下给出了仿真结果.研究结果为Ad Hoc网络动态性和端到端测量技术研究提供基础.  相似文献   

11.
Reliable adaptive multicast protocol in wireless Ad hoc networks   总被引:1,自引:0,他引:1  
1.INTRODUCTIONA wireless ad hoc networkis a multi-hop wireless net-workformed by a collection of mobile nodes withoutthe intervention of fixed infrastructure.Because awireless ad hoc networkis infrastructureless and self-organized,it is used to provide i mpromptu communi-cationfacilities in harsh environments.Typical appli-cation areas of wireless ad hoc networkinclude battle-fields,emergency search,rescue sites and data acqui-sitionin remote areas.A wireless ad-hoc network isalso useful …  相似文献   

12.
1 .INTRODUCTIONA mobile ad hoc network ( MANET) is a multi-hopwireless network formed by a collection of mobilenodes without the intervention of fixedinfrastructure.Because an Ad hoc network is infrastructure-less andself-organized,it is used to provide i mpromptu com-munication facilities in harsh environments . Typicalapplication areas of mobile ad hoc networkinclude bat-tlefields ,emergency search,rescue sites and data ac-quisitionin remote areas . A mobile Ad hoc networkisalso usef…  相似文献   

13.
广播是移动自组织网络(mobile ad hoc network, MANET)传递信息和建立路由的重要操作。为解决广播过程中的链路冗余和广播风暴问题,提出一种基于贪婪蚁群算法(greedy ant colony algorithm, GACA)的广播策略。首先,结合路由节点的数据包总传输距离、链路数目和链路质量建立目标函数。然后,通过GACA达到目标函数的最小值并规划出最优信息广播路由。最后,转发节点根据路径要求转发信息。仿真实验表明,该策略能够合理地利用网络资源、减少信息冗余以及避免广播风暴的发生。  相似文献   

14.
Distributed intrusion detection for mobile ad hoc networks   总被引:2,自引:1,他引:1  
Mobile ad hoc networking(MANET)has become an exciting and important technology in recent years,because of the rapid proliferation of wireless devices.Mobile ad hoc networks is highly vulnerable to attacks due to the open medium,dynamically changing network topology,cooperative algorithms,and lack of centralized monitoring and management point.The traditional way of protecting networks with firewalls and encryption software is no longer sufficient and effective for those features.A distributed intrusion detection approach based on timed automata is given.A cluster-based detection scheme is presented,where periodically a node is elected as the monitor node for a cluster.These monitor nodes can not only make local intrusion detection decisions,but also cooperatively take part in global intrusion detection.And then the timed automata is constructed by the way of manually abstracting the correct behaviours of the node according to the routing protocol of dynamic source routing(DSR).The monitor nodes can verify the behaviour of every nodes by timed automata,and validly detect real-time attacks without signatures of intrusion or trained data.Compared with the architecture where each node is its own IDS agent,the approach is much more efficient while maintaining the same level of effectiveness.Finally,the intrusion detection method is evaluated through simulation experiments.  相似文献   

15.
Mobile ad hoc networking (MANET) has become an exciting and important technology in recent years, because of the rapid proliferation of wireless devices. Mobile ad hoc networks is highly vulnerable to attacks due to the open medium, dynamically changing network topology, cooperative algorithms, and lack of centralized monitoring and management point. The traditional way of protecting networks with firewalls and encryption software is no longer sufficient and effective for those features. A distributed intrusion detection approach based on timed automata is given. A cluster-based detection scheme is presented, where periodically a node is elected as the monitor node for a cluster. These monitor nodes can not only make local intrusion detection decisions, but also cooperatively take part in global intrusion detection. And then the timed automata is constructed by the way of manually abstracting the correct behaviours of the node according to the routing protocol of dynamic source routing (DSR). The monitor nodes can verify the behaviour of every nodes by timed automata, and validly detect real-time attacks without signatures of intrusion or trained data. Compared with the architecture where each node is its own IDS agent, the approach is much more efficient while maintaining the same level of effectiveness. Finally, the intrusion detection method is evaluated through simulation experiments.  相似文献   

16.
Due to their characteristics of dynamic topology, wireless channels and limited resources, mobile ad hoc networks are particularly vulnerable to a denial of service (DoS) attacks launched by intruders. The effects of flooding attacks in network simulation 2 (NS2) and measured performance parameters are investigated, including packet loss ratio, average delay, throughput and average number of hops under different numbers of attack nodes, flooding frequency, network bandwidth and network size. Simulation results show that with the increase of the flooding frequency and the number of attack nodes, network performance sharply drops. But when the frequency of flooding attacks or the number of attack nodes is greater than a certain value, performance degradation tends to a stable value.  相似文献   

17.
分层分布式Ad Hoc网络拓扑模型的研究   总被引:7,自引:1,他引:7  
杨盘龙  田畅 《系统仿真学报》2005,17(6):1405-1407
以战术互联网络应用环境为背景,对分层分布式Ad Hoe网络拓扑仿真模型进行了研究,提出了“分层分阶段拓扑生成算法”,拓扑仿真结果与实际网络拓扑特点相吻合。利用仿真平台Glomosim,将不同网络拓扑连接情况的组网性能参数相比较,发现分层分布式Ad Hoe网络拓扑对系统组网效率影响较大。  相似文献   

18.
Modern battlefield doctrine is based on mobility, flexibility, and rapid response to changing situations. As is well known, mobile ad hoc network systems are among the best utilities for battlefield activity. Although much research has been done on secure routing, security issues have largely been ignored in applying mobile ad hoc network theory to computer technology. An ad hoc network is usually assumed to be homogeneous, which is an irrational assumption for armies. It is clear that soldiers, commanders, and commanders-in-chief should have different security levels and computation powers as they have access to asymmetric resources. Imitating basic military rank levels in battlefield situations, how multilevel security can be introduced into ad hoc networks is indicated, thereby controlling restricted classified information flows among nodes that have different security levels.  相似文献   

19.
目前无线ad hoc网络发展的目标是支持多媒体数据的传输,基于ad hoc网络的视频流传输有着巨大的应用前景。但是无线传输介质的不稳定特性决定了其支持视频流传输存在较大的挑战。在分析蓝牙技术特点的基础上,对蓝牙无线ad hoc网络视频流传输进行建模。设计基于所提模型的网络视频流传输模拟实验架构。在不同码率和不同路径长度的模拟环境下测试解码视频流的质量,研究分析蓝牙视频流传输性能。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号