共查询到20条相似文献,搜索用时 15 毫秒
1.
Ad Hoc网络是一种多跳的自组织网络,网络是由移动的节点组成。Ad Hoc网络的许多应用都依赖层次结构的支持,簇结构是Ad Hoc网络中应用最为广泛的层次结构,而这种层次结构的形成和维护依赖于某种分簇算法。提出了移动节点的平均连接度和能量状态的计算方法,并在此基础上提出了一种新的基于权值的分簇算法(NWBCA),通过对算法进行分析和仿真测试,证明了该算法的有效性。 相似文献
2.
3.
分层分布式Ad Hoc网络拓扑模型的研究 总被引:7,自引:1,他引:7
以战术互联网络应用环境为背景,对分层分布式Ad Hoe网络拓扑仿真模型进行了研究,提出了“分层分阶段拓扑生成算法”,拓扑仿真结果与实际网络拓扑特点相吻合。利用仿真平台Glomosim,将不同网络拓扑连接情况的组网性能参数相比较,发现分层分布式Ad Hoe网络拓扑对系统组网效率影响较大。 相似文献
4.
5.
Sun Baolin~ & Li Layuan~ . School of Computer Science Technology Wuhan Univ. of Techno logy Wuhan . P. R. China . Dept. of Mathematics Physics Wuhan Univ. of Science Engineering Wuhan . P. R. China 《系统工程与电子技术(英文版)》2006,17(2):417-422
1 .INTRODUCTIONA mobile ad hoc network ( MANET) is a multi-hopwireless network formed by a collection of mobilenodes without the intervention of fixedinfrastructure.Because an Ad hoc network is infrastructure-less andself-organized,it is used to provide i mpromptu com-munication facilities in harsh environments . Typicalapplication areas of mobile ad hoc networkinclude bat-tlefields ,emergency search,rescue sites and data ac-quisitionin remote areas . A mobile Ad hoc networkisalso usef… 相似文献
6.
7.
8.
一种Ad Hoc网络信道接入退避算法及仿真分析 总被引:3,自引:1,他引:3
移动自组网络的应用环境以及其在商业上的潜在应用要求它支持QoS,高效合理的MAC协议对于保障Ad Hoc网络QoS具有重要的意义。在分析现有典型MAC协议及退避算法的基础上,提出了一种支特动态服务区分兼顾公平性的退避算法——服务区分动态退避(SDDB)算法。分析和仿真结果证明,与IEEE802.11等协议采用的退避算法相比,该算法在信道公平性和提供服务区分方面有较好的改善,并且在信道的吞吐量和提供服务区分、改善信道接入公平性之间能达到较好的折衷。 相似文献
9.
10.
Modern battlefield doctrine is based on mobility, flexibility, and rapid response to changing situations. As is well known, mobile ad hoc network systems are among the best utilities for battlefield activity. Although much research has been done on secure routing, security issues have largely been ignored in applying mobile ad hoc network theory to computer technology. An ad hoc network is usually assumed to be homogeneous, which is an irrational assumption for armies. It is clear that soldiers, commanders, and commanders-in-chief should have different security levels and computation powers as they have access to asymmetric resources. Imitating basic military rank levels in battlefield situations, how multilevel security can be introduced into ad hoc networks is indicated, thereby controlling restricted classified information flows among nodes that have different security levels. 相似文献
11.
The solution of distributed mutual exclusion is difficult in Ad hoc networks owing to dynamic topologies and mobility. Based on the analysis of the properties of Ad hoc networks and the disadvantages of the traditional algorithms, an improved Ad hoc system model was given and a novel algorithm was presented as AHDME (Ad Hoc Distributed Mutual Exclusion); it was based on the token-asking algorithms. It utilized broadcast to search for the token and to decrease the message complexity of multi-hop Ad hoc networks. Lamport's timestamp was improved to ensure the time sequence and to prevent nodes from starvation. When compared to traditional algorithms, AHDME does not require the fixed size of request queues and the global system information, which adapts itself to the frequent arrival/departures and the limited computing capability of nodes in Ad hoc networks. Performance analysis and simulation results show that the AHDME algorithm has low message complexity, small space complexity, and short response delay. 相似文献
12.
Reliable adaptive multicast protocol in wireless Ad hoc networks 总被引:1,自引:0,他引:1
Sun Baolin & Li Layuan . School of Computer Science Technology Wuhan Univ. of Technology Wuhan P. R. China . Dept. of Mathematics Physics Wuhan Inst. of Science Technology Wuhan P. R. China 《系统工程与电子技术(英文版)》2006,17(1):187-192
1.INTRODUCTIONA wireless ad hoc networkis a multi-hop wireless net-workformed by a collection of mobile nodes withoutthe intervention of fixed infrastructure.Because awireless ad hoc networkis infrastructureless and self-organized,it is used to provide i mpromptu communi-cationfacilities in harsh environments.Typical appli-cation areas of wireless ad hoc networkinclude battle-fields,emergency search,rescue sites and data acqui-sitionin remote areas.A wireless ad-hoc network isalso useful … 相似文献
13.
Mobile ad hoc networking (MANET) has become an exciting and important technology in recent years, because of the rapid proliferation of wireless devices. Mobile ad hoc networks is highly vulnerable to attacks due to the open medium, dynamically changing network topology, cooperative algorithms, and lack of centralized monitoring and management point. The traditional way of protecting networks with firewalls and encryption software is no longer sufficient and effective for those features. A distributed intrusion detection approach based on timed automata is given. A cluster-based detection scheme is presented, where periodically a node is elected as the monitor node for a cluster. These monitor nodes can not only make local intrusion detection decisions, but also cooperatively take part in global intrusion detection. And then the timed automata is constructed by the way of manually abstracting the correct behaviours of the node according to the routing protocol of dynamic source routing (DSR). The monitor nodes can verify the behaviour of every nodes by timed automata, and validly detect real-time attacks without signatures of intrusion or trained data. Compared with the architecture where each node is its own IDS agent, the approach is much more efficient while maintaining the same level of effectiveness. Finally, the intrusion detection method is evaluated through simulation experiments. 相似文献
14.
Distributed intrusion detection for mobile ad hoc networks 总被引:2,自引:1,他引:1
Mobile ad hoc networking(MANET)has become an exciting and important technology in recent years,because of the rapid proliferation of wireless devices.Mobile ad hoc networks is highly vulnerable to attacks due to the open medium,dynamically changing network topology,cooperative algorithms,and lack of centralized monitoring and management point.The traditional way of protecting networks with firewalls and encryption software is no longer sufficient and effective for those features.A distributed intrusion detection approach based on timed automata is given.A cluster-based detection scheme is presented,where periodically a node is elected as the monitor node for a cluster.These monitor nodes can not only make local intrusion detection decisions,but also cooperatively take part in global intrusion detection.And then the timed automata is constructed by the way of manually abstracting the correct behaviours of the node according to the routing protocol of dynamic source routing(DSR).The monitor nodes can verify the behaviour of every nodes by timed automata,and validly detect real-time attacks without signatures of intrusion or trained data.Compared with the architecture where each node is its own IDS agent,the approach is much more efficient while maintaining the same level of effectiveness.Finally,the intrusion detection method is evaluated through simulation experiments. 相似文献
15.
一种无线局域网节能协议研究 总被引:1,自引:0,他引:1
提出了一种基于802.11DCF的分布式报文驱动节能协议802.11PS协议,通过使结点在既不能发送又无需接收时进入睡眠状态来节省其能量消耗。采用近似方法分析了协议在全互连网络中的节能性能,并通过仿真验证了近似分析的合理性。结果表明,在没有接入点的无线局域网环境中,当网络负荷较高时,802.11PS协议能够有效降低网络结点无线网卡总功耗(最多可节能70%以上),并且其时延和吞吐率性能仍与802.11DCF协议大体相当。协议无需全网同步,也可用于多跳ad hoc网络。 相似文献
16.
为了降低现有ad hoc网络分布式时隙同步算法复杂度,基于研究多个体系统行为特征的Vicsek模型,提出一种采用平均加权的分布式时隙同步算法。各节点通过计算自身及其邻节点时隙起始时刻的算术平均调整时隙位置,最终达到所有节点时隙位置的统一,实现全网同步。对算法在不同网络连接下的收敛性进行逐一分析,并对网络节点随机分布时的算法收敛性进行仿真,结果表明,算法适用于各种连通性网络且收敛速度较快。 相似文献
17.
无线传感器网络的一个重要设计目标是网络可靠性,无线传感器网络条件受限,节点能源有限,布置环境恶劣,使得研究无线传感器网络的节点重要性和抗毁性变得至关重要.节点的剩余能量会对网络生存时间产生影响,同样节点在拓扑结构中的位置也会对网络各个指标产生影响.通过研究节点的剩余能量和节点在拓扑结构中的贡献,综合这两种因素,提出了计算节点重要性和网络抗毁性的方法.仿真结果及对比表明该方法效果较好,且算法并不复杂. 相似文献
18.
基于拓扑维护的自适应多信道OLSR路由协议 总被引:1,自引:0,他引:1
OLSR是一种应用于无线移动Ad hoc网络的基于链路状态机制的先应式路由协议。在OLSR中,网络拓扑的动态变化会使节点掌握的拓扑信息失效,从而导致路由表项不全,影响路由性能。针对上述问题,提出了一种基于拓扑维护的自适应多信道路由协议MOLSR-TM,该协议把拓扑维护状况感知和自适应算法引入OLSR,以调整HELLO控制消息的发送频率和邻居记录表、拓扑记录表的刷新频率。性能分析和仿真结果表明,MOLSR-TM能改善节点的拓扑维护状况,增强动态拓扑适应能力,提高数据成功率、端到端时延和网络吞吐率等性能。 相似文献
19.
Due to their characteristics of dynamic topology, wireless channels and limited resources, mobile ad hoc networks are particularly vulnerable to a denial of service (DoS) attacks launched by intruders. The effects of flooding attacks in network simulation 2 (NS2) and measured performance parameters are investigated, including packet loss ratio, average delay, throughput and average number of hops under different numbers of attack nodes, flooding frequency, network bandwidth and network size. Simulation results show that with the increase of the flooding frequency and the number of attack nodes, network performance sharply drops. But when the frequency of flooding attacks or the number of attack nodes is greater than a certain value, performance degradation tends to a stable value. 相似文献
20.
TDMA体制下的移动自组织网时隙同步方法 总被引:1,自引:0,他引:1
在TDMA体制下的移动网状自组织网络中,为了解决网络时隙同步问题,提出了一种不依赖GPS授时的网络时隙互同步算法。各节点通过计算相邻节点的时隙偏差,通过加权计算并调整本节点的时隙位置,使网内各节点的时隙起始都调整到同一位置上,达到时隙的互同步。通过仿真和实验,分析并验证了移动自组织网络时隙互同步的收敛性能和抗干扰性能。 相似文献