共查询到19条相似文献,搜索用时 93 毫秒
1.
2.
3.
为了提高多射频多信道Ad Hoc网络容量,降低网络间无线干扰,提出从跨层优化综合考虑信道与功率联合分配问题,将信道与功率分配问题转化为混合整数非线性规划模型,针对模型设计两阶段子问题求解迭代算法。算法在第一阶段采用启发式算法分配信道,在第二阶段采用分布式算法进行功率分配。仿真实验结果表明,信道与功率联合分配相对于固定信道下功率分配具有更好的效果,联合优化两阶段迭代算法可有效提高网络整体效用,同时降低节点间相互干扰。 相似文献
4.
Ad Hoc网络是一种多跳的自组织网络,网络是由移动的节点组成。Ad Hoc网络的许多应用都依赖层次结构的支持,簇结构是Ad Hoc网络中应用最为广泛的层次结构,而这种层次结构的形成和维护依赖于某种分簇算法。提出了移动节点的平均连接度和能量状态的计算方法,并在此基础上提出了一种新的基于权值的分簇算法(NWBCA),通过对算法进行分析和仿真测试,证明了该算法的有效性。 相似文献
5.
6.
Ad Hoc网络可扩展性仿真分析 总被引:1,自引:0,他引:1
影响Ad Hoc网络可扩展性的因素很多,本文在特定移动模型和路由算法的前提下,提出了一个仿真模型,并利用GlomoSim仿真工具对不同结点数组成的平面结构网络逐跳时延和包丢失率进行了仿真,得出了AODV路由协议的可扩展性优于DSR协议的结论,并根据仿真结果推断出网络的规模不可能过大。 相似文献
7.
一种无线局域网节能协议研究 总被引:1,自引:0,他引:1
提出了一种基于802.11DCF的分布式报文驱动节能协议802.11PS协议,通过使结点在既不能发送又无需接收时进入睡眠状态来节省其能量消耗。采用近似方法分析了协议在全互连网络中的节能性能,并通过仿真验证了近似分析的合理性。结果表明,在没有接入点的无线局域网环境中,当网络负荷较高时,802.11PS协议能够有效降低网络结点无线网卡总功耗(最多可节能70%以上),并且其时延和吞吐率性能仍与802.11DCF协议大体相当。协议无需全网同步,也可用于多跳ad hoc网络。 相似文献
8.
基于Petri网模型的Ad Hoc网络可生存性分析 总被引:1,自引:0,他引:1
基于Ad Hoc网络动态拓扑结构难以用模型精确描述的特性,建立了可以表示网络中任意两个结点之间动态数据传输关系的Petri网模型,通过计算两个结点连通的概率和在规定时间内成功传输给定长度数据的概率,对网络的可生存性进行了研究,同时举例分析了结点传输范围和平均邻居结点数目两个网络因素对可生存性的影响。实验结果可以指导用户对网络可生存性进行度量,或根据实际的可生存性需求,调整相应的网络参数。 相似文献
9.
10.
网络节点的不断运动造成AdHoc网络拓扑的动态性.描述和量化动态性是设计、仿真以及测量Ad Hoc网络的基础.首先推导出Ad Hoc网络的链路持续时间分布和拓扑持续时间分布的计算公式,并进行了仿真验证.然后提出利用TTL值感知拓扑变化的方法,并研究了此方法的感知率.最后基于以上结果,提出将网络断层扫描技术应用于Ad Hoc网络时,在测量时间内网络拓扑不发生变化的概率计算公式,并在Ad Hoc网络步行速度场景下给出了仿真结果.研究结果为Ad Hoc网络动态性和端到端测量技术研究提供基础. 相似文献
11.
Reliable adaptive multicast protocol in wireless Ad hoc networks 总被引:1,自引:0,他引:1
Sun Baolin & Li Layuan . School of Computer Science Technology Wuhan Univ. of Technology Wuhan P. R. China . Dept. of Mathematics Physics Wuhan Inst. of Science Technology Wuhan P. R. China 《系统工程与电子技术(英文版)》2006,17(1):187-192
1.INTRODUCTIONA wireless ad hoc networkis a multi-hop wireless net-workformed by a collection of mobile nodes withoutthe intervention of fixed infrastructure.Because awireless ad hoc networkis infrastructureless and self-organized,it is used to provide i mpromptu communi-cationfacilities in harsh environments.Typical appli-cation areas of wireless ad hoc networkinclude battle-fields,emergency search,rescue sites and data acqui-sitionin remote areas.A wireless ad-hoc network isalso useful … 相似文献
12.
Sun Baolin~ & Li Layuan~ . School of Computer Science Technology Wuhan Univ. of Techno logy Wuhan . P. R. China . Dept. of Mathematics Physics Wuhan Univ. of Science Engineering Wuhan . P. R. China 《系统工程与电子技术(英文版)》2006,17(2):417-422
1 .INTRODUCTIONA mobile ad hoc network ( MANET) is a multi-hopwireless network formed by a collection of mobilenodes without the intervention of fixedinfrastructure.Because an Ad hoc network is infrastructure-less andself-organized,it is used to provide i mpromptu com-munication facilities in harsh environments . Typicalapplication areas of mobile ad hoc networkinclude bat-tlefields ,emergency search,rescue sites and data ac-quisitionin remote areas . A mobile Ad hoc networkisalso usef… 相似文献
13.
广播是移动自组织网络(mobile ad hoc network, MANET)传递信息和建立路由的重要操作。为解决广播过程中的链路冗余和广播风暴问题,提出一种基于贪婪蚁群算法(greedy ant colony algorithm, GACA)的广播策略。首先,结合路由节点的数据包总传输距离、链路数目和链路质量建立目标函数。然后,通过GACA达到目标函数的最小值并规划出最优信息广播路由。最后,转发节点根据路径要求转发信息。仿真实验表明,该策略能够合理地利用网络资源、减少信息冗余以及避免广播风暴的发生。 相似文献
14.
Distributed intrusion detection for mobile ad hoc networks 总被引:2,自引:1,他引:1
Mobile ad hoc networking(MANET)has become an exciting and important technology in recent years,because of the rapid proliferation of wireless devices.Mobile ad hoc networks is highly vulnerable to attacks due to the open medium,dynamically changing network topology,cooperative algorithms,and lack of centralized monitoring and management point.The traditional way of protecting networks with firewalls and encryption software is no longer sufficient and effective for those features.A distributed intrusion detection approach based on timed automata is given.A cluster-based detection scheme is presented,where periodically a node is elected as the monitor node for a cluster.These monitor nodes can not only make local intrusion detection decisions,but also cooperatively take part in global intrusion detection.And then the timed automata is constructed by the way of manually abstracting the correct behaviours of the node according to the routing protocol of dynamic source routing(DSR).The monitor nodes can verify the behaviour of every nodes by timed automata,and validly detect real-time attacks without signatures of intrusion or trained data.Compared with the architecture where each node is its own IDS agent,the approach is much more efficient while maintaining the same level of effectiveness.Finally,the intrusion detection method is evaluated through simulation experiments. 相似文献
15.
Mobile ad hoc networking (MANET) has become an exciting and important technology in recent years, because of the rapid proliferation of wireless devices. Mobile ad hoc networks is highly vulnerable to attacks due to the open medium, dynamically changing network topology, cooperative algorithms, and lack of centralized monitoring and management point. The traditional way of protecting networks with firewalls and encryption software is no longer sufficient and effective for those features. A distributed intrusion detection approach based on timed automata is given. A cluster-based detection scheme is presented, where periodically a node is elected as the monitor node for a cluster. These monitor nodes can not only make local intrusion detection decisions, but also cooperatively take part in global intrusion detection. And then the timed automata is constructed by the way of manually abstracting the correct behaviours of the node according to the routing protocol of dynamic source routing (DSR). The monitor nodes can verify the behaviour of every nodes by timed automata, and validly detect real-time attacks without signatures of intrusion or trained data. Compared with the architecture where each node is its own IDS agent, the approach is much more efficient while maintaining the same level of effectiveness. Finally, the intrusion detection method is evaluated through simulation experiments. 相似文献
16.
Due to their characteristics of dynamic topology, wireless channels and limited resources, mobile ad hoc networks are particularly vulnerable to a denial of service (DoS) attacks launched by intruders. The effects of flooding attacks in network simulation 2 (NS2) and measured performance parameters are investigated, including packet loss ratio, average delay, throughput and average number of hops under different numbers of attack nodes, flooding frequency, network bandwidth and network size. Simulation results show that with the increase of the flooding frequency and the number of attack nodes, network performance sharply drops. But when the frequency of flooding attacks or the number of attack nodes is greater than a certain value, performance degradation tends to a stable value. 相似文献
17.
分层分布式Ad Hoc网络拓扑模型的研究 总被引:7,自引:1,他引:7
以战术互联网络应用环境为背景,对分层分布式Ad Hoe网络拓扑仿真模型进行了研究,提出了“分层分阶段拓扑生成算法”,拓扑仿真结果与实际网络拓扑特点相吻合。利用仿真平台Glomosim,将不同网络拓扑连接情况的组网性能参数相比较,发现分层分布式Ad Hoe网络拓扑对系统组网效率影响较大。 相似文献
18.
Modern battlefield doctrine is based on mobility, flexibility, and rapid response to changing situations. As is well known, mobile ad hoc network systems are among the best utilities for battlefield activity. Although much research has been done on secure routing, security issues have largely been ignored in applying mobile ad hoc network theory to computer technology. An ad hoc network is usually assumed to be homogeneous, which is an irrational assumption for armies. It is clear that soldiers, commanders, and commanders-in-chief should have different security levels and computation powers as they have access to asymmetric resources. Imitating basic military rank levels in battlefield situations, how multilevel security can be introduced into ad hoc networks is indicated, thereby controlling restricted classified information flows among nodes that have different security levels. 相似文献