首页 | 官方网站   微博 | 高级检索  
     

Dk-hop: 一个有向k跳无线干扰模型
引用本文:徐朝农,黄长喜,胡存钢,刘勇.Dk-hop: 一个有向k跳无线干扰模型[J].自动化学报,2012,38(6):1042-1050.
作者姓名:徐朝农  黄长喜  胡存钢  刘勇
作者单位:1.中国石油大学(北京) 北京 102249;
基金项目:国家自然科学基金(61003307,61173132);国家科技重大专项(2010ZX03006-002,2010ZX03006-007);中国科学院计算机系统结构重点实验室开放课题(ICT-ARCH200901);中国互联网络信息中心互联网基础技术开放实验室开放课题(2012-N03)资助~~
摘    要:无线链路调度算法的性能直接受无线干扰模型准确性的影响. 尽管由于其简单性而被广泛采用, k跳干扰模型并不能准确建模真实的无线干扰特性, 从而导致链路调度算法的理论性能与实际性能之间存在很大差异. 本文考虑无线传输方向性因素对干扰的影响, 提出了Dk-hop无线干扰模型. 该模型有效排除了k跳隐藏链路, 从而更准确地对无线干扰进行了建模.理论分析表明, 当k值不超过IR+1时(IR为载波感知距离和传输距离之比), Dk-hop比k跳干扰模型更为准确, 且仍然保持了k跳干扰模型的简单性. 为与真实的无线干扰保持接近, k的合理取值范围应为IR-2, IR+1].

关 键 词:无线干扰    链路调度    干扰模型    隐藏终端    暴露终端
收稿时间:2010-12-21
修稿时间:2012-2-24

Dk-hop: A Directed k-hop Wireless Interference Model
XU Chao-Nong,HUANG Chang-Xi,HU Cun-Gang,LIU Yong.Dk-hop: A Directed k-hop Wireless Interference Model[J].Acta Automatica Sinica,2012,38(6):1042-1050.
Authors:XU Chao-Nong  HUANG Chang-Xi  HU Cun-Gang  LIU Yong
Affiliation:1.China University of Petroleum (Beijing), Beijing 102249;2.State Key Laboratory of Computer Architecture, Institute of Computing Technology, Chinese Academy of Sciences, Beijing 100190;3.Hefei University of Technology, Hefei 230009;4.Naval Academy of Armament, Beijing 100161
Abstract:The performance of link scheduling algorithm is greatly influenced by the accuracy of wireless interference model. Despite its simplicity and popularity, the k-hop interference model can not model real interference accurately, which results in the great gap between theoretic and realistic performances of the link scheduling algorithm. Motivated by the fact that wireless interference has great relationship with transmission direction, this paper proposes the Dk-hop interference model. Excluding the k-hop hidden link, Dk-hop excludes the k-hop hidden link and is more realistic than the k-hop interference model, with its simplicity still being kept. Theoretical analysis reveals that Dk-hop is closer to reality than the k-hop interference model if k is no greater than IR+1, where IR is the ratio of carrier sensing range to transmission range. Furthermore, to keep close with the realistic wireless interference, valid range of the value of k for Dk-hop is deduced as IR-2, IR+1].
Keywords:Wireless interference  link scheduling  interference model  hidden terminal  exposed terminal
本文献已被 CNKI 等数据库收录!
点击此处可从《自动化学报》浏览原始摘要信息
点击此处可从《自动化学报》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号