共查询到19条相似文献,搜索用时 78 毫秒
1.
对现有拓扑控制算法在水声ad hoc网络的应用背景下存在的问题进行了详细分析,并在此基础上提出了一种基于能量和时间效率的拓扑控制算法。该算法通过综合考虑节点能量消耗、通信延时、信号衰减等多种因素,构造了一跳链路传输代价指数,并根据这一指数来控制网络的拓扑结构。仿真分析表明,该算法在平均节点度、端到端延时和能量效率方面都有较好的性能。 相似文献
2.
介绍一种用邻居节点的时隙偏差值来计算时隙调整量,从而修正节点的本地参考时隙基准的时隙互同步算法,给出了在信号传播时延情况下时隙偏差的计算方法,证明互同步算法的收敛性,最后给出不同场景下的仿真结果,并对其性能进行分析。该算法由每个节点并行协同计算,实验证明收敛速度快,平均每个节点的计算量小,非常适合于移动自组网的终端终节点运行。 相似文献
3.
针对节点时钟频率不一致而引起时隙漂移的情况,分析分布式时隙同步算法的性能。通过把一个时隙周期内的累积时钟偏差等效为时隙相位偏差,建立干扰模型,证明了采用分布式平均的时隙互同步算法可以避免节点时隙偏移量随时间的累积,并将节点之间的最大时隙偏差控制在一定范围内。最后,用计算机仿真和实物测试验证了分布式时隙同步算法可以保证节点之间的同步。 相似文献
4.
5.
6.
协同路由技术通过节点间相互中继转发数据,可以有效地提高网络的性能。提出了一种无线Ad hoc网络中的机会性加权协同路由算法,加权的量度分别是中继的剩余能量和节点间的信道状态信息,同时给出了协同路由模型及策略, 并基于NS 2进行了仿真。相对非协同的目的序列距离矢量路由协议,比较了机会性加权算法与最佳信道状态以及最大剩余能量算法的性能差异。结果表明,该算法获得了以上两种算法服务质量(递交率和网络寿命)之间的折衷,并且通过调整加权因子,可以权衡两个量度的比重以满足不同网络性能的需要。 相似文献
7.
一种无线传感器网络分布式加权容错检测算法 总被引:5,自引:0,他引:5
针对无线传感器网络的容错事件区域检测问题,提出一种分布式加权容错检测算法。考虑"邻域的邻域"的容错范围,首先利用邻域节点与其周围节点的信息交换,对邻域节点的状态值进行估计,然后采用加权容错方法对邻域节点的估计状态值进行加权综合,完成对中心节点的错误检测。仿真结果表明,该算法在传感器网络初始错误率达到20%的情况下,仍能够检测和纠正90%以上的错误。相比其他算法,该算法具有较高的错误检测精度,极大改善了事件发生区域边界节点的纠错问题,且算法运行时整个网络所消耗的能量适中。 相似文献
8.
9.
网络交通分布式模拟乐观同步算法研究 总被引:1,自引:0,他引:1
基于分布式网络环境,运用并行模拟领域的最新研究成果,对路网交通流分面式并行模拟中如何实现处理内部的时钟同步问题进行深入研究,提了了定时段扫描的乐观同步算法,以确保模拟中事件逻辑关系的一致性。最后以含9个节点的路网为例,运用该同步算法进行模拟应用,对路网串行、并行模拟的效率和效益进行了对比分析,从根本上体现了路网颁式模拟研究的意义。 相似文献
10.
建立以成本为主要偏好连接决定因素的加权网络演化模型,来深入理解交通运输网络背后的驱动力量.模型考虑交通运输业中的规模经济效应和拥挤效应,统一在成本函数之中.模型假设新点偏好连接成本小的点,连接后各边权重会发生变化,成本小的边流量增加可能性较大.根据航空业实际的成本函数进行数值模拟,模拟结果展示了服从截尾幂律分布的点度分布,非线性的点强度和点度关系,和先负后正的度相关性,能够较好地解释航空网络实证研究结果. 相似文献
11.
Modern battlefield doctrine is based on mobility, flexibility, and rapid response to changing situations. As is well known, mobile ad hoc network systems are among the best utilities for battlefield activity. Although much research has been done on secure routing, security issues have largely been ignored in applying mobile ad hoc network theory to computer technology. An ad hoc network is usually assumed to be homogeneous, which is an irrational assumption for armies. It is clear that soldiers, commanders, and commanders-in-chief should have different security levels and computation powers as they have access to asymmetric resources. Imitating basic military rank levels in battlefield situations, how multilevel security can be introduced into ad hoc networks is indicated, thereby controlling restricted classified information flows among nodes that have different security levels. 相似文献
12.
Sun Baolin~ & Li Layuan~ . School of Computer Science Technology Wuhan Univ. of Technology Wuhan P. R. China . Dept. of Mathematics Physics Wuhan Univ. of Science Engineering Wuhan P. R. China 《系统工程与电子技术(英文版)》2006,17(3):692-698
1 .INTRODUCTIONMobile ad hoc networks ( MANET) , also calledthe infrastructureless mobile network or self-or-ganized network,consists of a collection of mobilenodes sharing a wireless channel without any cen-tralized control or established communication back-bone .ad hoc networks have no fixed routers ;allnodes are capable of movement and can be connect-ed dynamically in an arbitrary manner . Usually ,these nodes act as both end systems and routers atthe same ti me . Nodes of these netwo… 相似文献
13.
Distributed intrusion detection for mobile ad hoc networks 总被引:2,自引:1,他引:1
Mobile ad hoc networking(MANET)has become an exciting and important technology in recent years,because of the rapid proliferation of wireless devices.Mobile ad hoc networks is highly vulnerable to attacks due to the open medium,dynamically changing network topology,cooperative algorithms,and lack of centralized monitoring and management point.The traditional way of protecting networks with firewalls and encryption software is no longer sufficient and effective for those features.A distributed intrusion detection approach based on timed automata is given.A cluster-based detection scheme is presented,where periodically a node is elected as the monitor node for a cluster.These monitor nodes can not only make local intrusion detection decisions,but also cooperatively take part in global intrusion detection.And then the timed automata is constructed by the way of manually abstracting the correct behaviours of the node according to the routing protocol of dynamic source routing(DSR).The monitor nodes can verify the behaviour of every nodes by timed automata,and validly detect real-time attacks without signatures of intrusion or trained data.Compared with the architecture where each node is its own IDS agent,the approach is much more efficient while maintaining the same level of effectiveness.Finally,the intrusion detection method is evaluated through simulation experiments. 相似文献
14.
传统的基于自相关的和基于互相关的定时同步算法具有相关峰的旁瓣较宽或对载波频率偏移(carrier frequency offset, CFO)敏感的问题,均无法满足无线自组织通信系统对快速准确的定时同步的需求。针对这一问题,提出了一种新的基于改进互相关的定时同步算法,通过将一个长的相关器拆分为两个较短子相关器的乘积,使度量函数的主峰更加尖锐、次峰更低,理论分析了算法的抗频偏性和计算复杂度。对所提算法和传统互相关算法的蒙特卡罗仿真结果表明,在复杂度相当的前提下,所提算法在检测准确率上具有1.1 dB的性能增益,且对频偏的鲁棒性较好。 相似文献
15.
For wireless ad hoc networks simulation, node's mobility pattern and traffic pattern are two key elements. A new simulation model is presented based on the virtual reality collision detection algorithm in obstacle environment, and the model uses the path planning method to avoid obstacles and to compute the node's moving path. Obstacles also affect node's signal propagation. Considering these factors, this study implements the mobility model for wireless ad hoc networks. Simulation results show that the model has a significant impact on the performance of protocols. 相似文献
16.
Due to their characteristics of dynamic topology, wireless channels and limited resources, mobile ad hoc networks are particularly vulnerable to a denial of service (DoS) attacks launched by intruders. The effects of flooding attacks in network simulation 2 (NS2) and measured performance parameters are investigated, including packet loss ratio, average delay, throughput and average number of hops under different numbers of attack nodes, flooding frequency, network bandwidth and network size. Simulation results show that with the increase of the flooding frequency and the number of attack nodes, network performance sharply drops. But when the frequency of flooding attacks or the number of attack nodes is greater than a certain value, performance degradation tends to a stable value. 相似文献
17.
Zhang Xuanping Qin Zheng & Li Xin Dept. of Computer Science Xi’an Jiaotong Univ. Xi’an P. R. China 《系统工程与电子技术(英文版)》2006,17(4):927-930, 937
1. INTRODUCTION Mobile ad hoc networks are wireless multi-hop networks where mobile nodes are self-organized, have highly dynamic topology, limited bandwidth and no support of fixed infrastructure[1]. These characteristics often cause ad hoc networks to be viewed as quite different from traditional networks. Routing a packet from a source to a destination in an ad hoc network is a challenging problem. The main source of the challenge comes from the fact that there are no base stations in … 相似文献
18.
广播是移动自组织网络(mobile ad hoc network, MANET)传递信息和建立路由的重要操作。为解决广播过程中的链路冗余和广播风暴问题,提出一种基于贪婪蚁群算法(greedy ant colony algorithm, GACA)的广播策略。首先,结合路由节点的数据包总传输距离、链路数目和链路质量建立目标函数。然后,通过GACA达到目标函数的最小值并规划出最优信息广播路由。最后,转发节点根据路径要求转发信息。仿真实验表明,该策略能够合理地利用网络资源、减少信息冗余以及避免广播风暴的发生。 相似文献
19.
设计了基于多跳位置估计的无线光移动自组织网络拓扑重构方法,该方法不依赖定位系统,如全球定位系统(global positioning system, GPS)等,也不需要无线电通信辅助,仅采用自由空间光(free space optical, FSO)对网络中其他节点进行方向和距离估计,位置估计信息通过多跳方式传递,用于建立重构链路,增加节点连通度,提高网络性能。该方法分析了多跳节点间的位置不确定区域,并提出了覆盖不确定区域的光波束分配算法用于新的FSO链路建立。仿真表明,在节点规模小于20的自组织网络中,光束发散角大小与距离估计误差决定相对定位精度,并影响重构网络节点端到端性能,通过减小发散角并提高光检测灵敏度,该方法的性能接近基于GPS定位的重构方法。 相似文献