首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
The design of a medium access control scheme for a single-hop, wavelength-division-multiplexing-(WDM) multichannel local lightwave network poses two major difficulties: relatively large transmitter/receiver tuning overhead and large ratio of propagation delay to packet transmission time. Most schemes proposed so far have ignored the tuning overhead, and they can only schedule fixed-length packet transmissions. To overcome these two difficulties, the authors propose several scheduling algorithms which can reduce the negative impact of tuning overhead and schedule variable-length messages. A separate channel (control channel) is employed for transmission of control packets, and a distributed scheduling algorithm is invoked at each node every time it receives a control packet. By allowing the length of messages to be variable, a long message can be scheduled with a single control packet transmission, instead of fragmenting it into many fixed-length packets, thereby significantly reducing the overhead of control packet transmissions and improving the overall system performance. Three novel scheduling algorithms are proposed, varying in the amount of global information and processing time they need. Two approximate analytical models are formulated to study the effect of tuning time and the effect of having a limited number of data channels. Extensive simulations are conducted. Average message delays are compared for all of the algorithms  相似文献   

2.
无线传感器网络中具有撤销功能的自愈组密钥管理方案   总被引:1,自引:0,他引:1  
李林春  李建华  潘军 《通信学报》2009,30(12):12-17
在有限域F_q上构造基于秘密共享的广播多项式,提出一种具有节点撤销功能的组密钥更新方案.同时,基于单向散列密钥链建立组密钥序列,采用组密钥预先更新机制,容忍密钥更新消息的丢失,实现自愈.分析表明,在节点俘获攻击高发的环境中,方案在计算开销和通信开销方面具有更好的性能.  相似文献   

3.
Information-centric network (ICN) has become a basic research topic with regard to the future architecture of the Internet. Storage and routing data is an important feature of ICN, as it improves network performance and content distribution. One of the challenges in this type of network is the routing problem. The objective of this paper is to propose a routing algorithm in the named data network. Owing to the impressive results presented by the enhanced heuristic methods, tabu search has been selected to develop the proposed algorithm. This work has been carried out in five major steps, Creating the initial solution, The mechanisms of generating a neighborhood, Evaluating the neighbor solutions and selecting the appropriate responses, Updating the answer and the tabu list, Controlling the algorithm termination conditions. The proposed protocol has been implemented in the simulator NS3. Important measures such as the packet delivery ratio, satisfied the interest packets ratio, the average number of interest packets, end-to-end delay, route creation delay, transmission delay, loss rate, and control message overhead have been studied. These show the quality of the proposed protocol. To evaluate the performance of the proposed algorithm, the results of the algorithm were compared with OSPFN and OSPF, which are the most well-known algorithms. The results of this assessment of throughput, control message overhead, packet delivery ratio, and end-to-end delay show that the proposed algorithm has the ability to provide appropriate solutions comparable to these algorithms.  相似文献   

4.
An advanced MAP transmission scheme for improving Media Access Control(MAC) overhead in the IEEE 802.16e systems is proposed. In the IEEE 802.16e system, when a Base Station(BS) broadcasts a MAP message, which is a control message about scheduling information, it applies a robust Modulation and Coding Scheme(MCS) level and allocates a large amount of radio resources, which induce a huge MAP overhead. Our proposed scheme utilizes piggybacked MAP IEs, in which control messages are concatenated with data packets and transmitted with the MCS level applied to data transmission. Due to the fact that the rate at which data is transmitted is generally higher than the rate at which broadcasting messages are transmitted, the proposed scheme can increase average data rate of a MAP transmission and consequently reduce the amount of resources allocated to the MAP transmission. Numerical analysis and simulations are presented to show that the MAP overhead is critical to system performance and can be improved by the proposed scheme.  相似文献   

5.
Delay tolerant networks are a class of ad hoc networks that enable data delivery even in the absence of end‐to‐end connectivity between nodes, which is the basic assumption for routing in ad hoc networks. Nodes in these networks work on store‐carry and forward paradigm. In addition, such networks make use of message replication as a strategy to increase the possibility of messages reaching their destination. As contact opportunities are usually of short duration, it is important to prioritize scheduling of messages. Message replication may also lead to buffer congestion. Hence, buffer management is an important issue that greatly affects the performance of routing protocols in delay tolerant networks. In this paper, Spray and Wait routing protocol, which is a popular controlled replication‐based protocol for delay tolerant networks, has been enhanced using a new fuzzy‐based buffer management strategy Enhanced Fuzzy Spray and Wait Routing, with the aim to achieve increased delivery ratio and reduced overhead ratio. It aggregates three important message properties namely number of replicas of a message, its size, and remaining time‐to‐live, using fuzzy logic to determine the message priority, which denotes its importance with respect to other messages stored in a node's buffer. It then intelligently selects messages to schedule when a contact opportunity occurs. Because determination of number of replicas of a message in the network is a difficult task, a new method for estimation of the same has been proposed. Simulation results show improved performance of enhanced fuzzy spray and wait routing in terms of delivery ratio and resource consumption. Copyright © 2014 John Wiley & Sons, Ltd.  相似文献   

6.
Efficient management of wireless channels is critical for the performance of cellular systems. Resource planning represents the allocations of system channels into cells. Accordingly, channel assignment strategies respond for using the allocated channels of cells to provide communication services in cells. However, a cellular system that experiences the varying of traffic distributions and the mobile service stations (MSSs) failing to provide communication services or recovered from failures will lessen the utilization of channels to provide communication services. In this paper, we present a distributed fault-tolerant resource planning scheme that can adaptively allocate channels to cells according to above variations in cellular systems. When the MSS of a cell fails to provide communications, its allocated channels can be reallocated to other non-failed MSSs. Our scheme has the advantages of low message overhead and low time delay. Moreover, freedom from deadlock is ensured. Simulation results, which are observed from reducing the overall average call blocking probability and the message overhead with and without applying our resource planning scheme to various channel assignment strategies, demonstrate that our algorithm is very efficient.  相似文献   

7.
Existing cooperative caching algorithms for mobile ad hoc networks face serious challenges due to message overhead and scalability issues. To solve these issues, we propose an adaptive virtual backbone based cooperative caching that uses a connective dominating set (CDS) to find the desired location of cached data. Message overhead in cooperative caching is mainly due to cache lookup process used for cooperative caching. The idea in this scheme is to reduce the number of nodes involved in cache look up process, by constructing a virtual backbone adaptive to the dynamic topology in mobile ad hoc networks. The proposed algorithm is decentralized and the nodes in the CDS perform data dissemination and discovery. Simulation results show that the message overhead created by the proposed cooperative caching technique is very less compared to other approaches. Moreover, due to the CDS based cache discovery we applied in this work, the proposed cooperative caching has the potential to increase the cache hit ratio and reduce average delay.  相似文献   

8.
The locator identifier separation protocol (LISP) has been made as an identifier-locator separation scheme for scalable Internet routing. However, the LISP was originally designed for fixed network environment, rather than for mobile network environment. In particular, the existing LISP mobility control schemes use a centralized map server to process all the control traffics, and thus they are intrinsically subject to some limitations in mobile environment, such as large overhead of mapping control traffics at central map server and degradation of handover performance. To overcome these problems, we propose a distributed mobility control scheme in LISP networks. In the proposed scheme, we assume that a mobile host has a hierarchical endpoint identifier which contains the information of its home network domain. Each domain has a distributed map server (DMS) for distributed mapping management of Endpoint Identifiers (EIDs) and Locators (LOCs). For roaming support, each DMS maintains a home EID register and a visiting EID register which are used to keep the EID-LOC mappings for mobile hosts in the distributed manner. For performance analysis, we compare the control traffic overhead (CTO) at map servers, the signaling delay required for EID-LOC mapping management, and the handover delay for the existing and proposed schemes. From numerical results, it is shown that the proposed distributed scheme can give better performance than the existing centralized schemes in terms of CTO, total signaling delay for EID-LOC mapping management, and handover delay.  相似文献   

9.
A protocol for a multiuser packet radio communication channel is proposed. The basic functions of this protocol are determined by a modified stack-type limited sensing collision resolution algorithm. The protocol is a hybrid of a pure random-access scheme and a reservation scheme. A message consists of a number of packets that are capable of revealing the current activity of the channel. The performance of the system is investigated in terms of throughput and average message delay and analytical results are provided  相似文献   

10.
A number of checkpointing and message logging algorithms have been proposed to support fault tolerance of mobile computing systems. However, little attention has been paid to the optimistic message logging scheme. Optimistic logging has a lower failure-free operation cost compared to other logging schemes. It also has a lower failure recovery cost compared to the checkpointing schemes. This paper presents an efficient scheme to implement optimistic logging for the mobile computing environment. In the proposed scheme, the task of logging is assigned to the mobile support station so that volatile logging can be utilized. In addition, to reduce the message overhead, the mobile support station takes care of dependency tracking and the potential dependency between mobile hosts is inferred from the dependency between mobile support stations. The performance of the proposed scheme is evaluated by an extensive simulation study. The results show that the proposed scheme requires a small failure-free overhead and the cost of unnecessary rollback caused by the imprecise dependency is adjustable by properly selecting the logging frequency.  相似文献   

11.
该文提出了一种基于概率复制的数据传输策略PRD(Probability Replication Delivery scheme)用于空间中间断连通的延迟容忍移动传感器网络(DTMSN)数据传输。PRD由选择复制策略和队列管理组成,前者根据节点将消息传递给汇聚点的可能性,选择下一跳进行复制传输;队列管理则利用引入传输概率及复制数的消息生存时间决定队列中消息丢弃原则。仿真分析表明,与现有的几种数据传输策略相比,PRD能以较低的数据复制数及传输延迟获得较高的数据传输成功率。  相似文献   

12.
We propose and analyze a class of integrated social and quality of service (QoS) trust-based routing protocols in mobile ad-hoc delay tolerant networks. The underlying idea is to incorporate trust evaluation in the routing protocol, considering not only QoS trust properties but also social trust properties to evaluate other nodes encountered. We prove that our protocol is resilient against bad-mouthing, good-mouthing and whitewashing attacks performed by malicious nodes. By utilizing a stochastic Petri net model describing a delay tolerant network consisting of heterogeneous mobile nodes with vastly different social and networking behaviors, we analyze the performance characteristics of trust-based routing protocols in terms of message delivery ratio, message delay, and message overhead against connectivity-based, epidemic and PROPHET routing protocols. The results indicate that our trust-based routing protocols outperform PROPHET and can approach the ideal performance obtainable by epidemic routing in delivery ratio and message delay, without incurring high message overhead. Further, integrated social and QoS trust-based protocols can effectively trade off message delay for a significant gain in message delivery ratio and message overhead over traditional connectivity-based routing protocols.  相似文献   

13.
设计了一种适用于卫星网络的传输控制协议TPSN。该协议使用异步跳到跳确认,快速恢复成段丢失数据,并采用基于检测窗口的端到端选择性否定应答(SNACK)机制,减少协议控制信息,保证数据可靠传输。在跳到跳可靠性保证机制基础上传输网络负载,实现在避免网络拥塞条件下高效利用网络带宽资源,并保证具有不同端到端往返时延的异种数据流之间的公平性。仿真结果表明TPSN能够在长延迟、误码率高、链路频繁切换的卫星网络中保证高效的带宽利用、可靠的数据传输以及各数据流之间的公平。  相似文献   

14.
Opportunistic networks (OppNets) are composed of wireless nodes opportunistically communicating with each other. These networks are designed to operate in a challenging environment characterized by high delay, intermittent connectivity, and no guarantee of fixed path between the sender and the destination nodes. One of the most vital issues in designing and maintaining practical networks over a time period is the security of the messages flowing in OppNets. This paper proposes a new method called message trust‐based secure multipath routing protocol (MT‐SMRP) for opportunistic networks. Various routing protocols such as ProPHet, Epidemic, and HiBOp, to name a few, have been proposed for OppNets, but none of these have applied a secure multipath routing technique. The proposed MT‐SMRP scheme relays the message to the destination through the disjoint paths, each applying a soft‐encryption technique to prevent message fabrication attacks. Simulations are conducted using the Haggle Infocom'06 real mobility data traces, showing that when time‐to‐live is varied, (1) the proposed MT‐SMRP scheme outperforms D‐MUST by 18.10%, 7.55%, 3.275%, respectively, in terms of delivery probability, messages dropped, and average latency; (2) it also outperforms SHBPR by 21.30%, 7.44%, and 4.85%, respectively, in terms of delivery probability, messages dropped, and average latency. Under similar performance metrics, the performance of MT‐SMRP is also shown to be better than that of D‐MUST and SHBPR when the buffer size (respondents. the message generation interval) is varied.  相似文献   

15.
In delay tolerant vehicular networks, gossip is an efficient forwarding scheme, which significantly reduces the message transmission overhead while maintaining a relatively high transmission rate in the high mobility vehicular environment. This mechanism requires vehicles as the network nodes to forward messages according to the system-defined gossip probability in a cooperative and selfless way among all the vehicles in the system. However, in the real word vehicular networks, most of the vehicular nodes exhibit selfish and non-collaboration behaviors to reduce the gossip probability in order to save their own energy and other limited resources in the vehicular nodes. In this paper, we study how node selfishness influences the performance of energy-constrained gossip forwarding based vehicular networks. We consider two typical forms of selfishness in the realistic vehicular networks: individual selfishness and social selfishness, and study the networking performance by focusing on the average message transmission delay and mean transmission cost. First, we model the message transmission process with selfish behaviors in the gossip forwarding based delay tolerant vehicular networks using a continuous time Markov chain. Based on this useful model, we derive closed-form formulae for average message transmission delay and mean transmission cost. Then, we give extensive numerical results to analyze the impact of selfishness on system performance of the vehicular networks. The results show that gossip forwarding in delay tolerant vehicular networks is robust to selfish behaviors since even when they increase the message transmission delay, there is a gain on the message transmission cost.  相似文献   

16.
Relatively large transceiver tuning overhead is one major difficulty when designing a medium access control scheme for a single-hop passive-star coupled WDM optical network. To overcome this difficulty, we propose two algorithms, namely continuous channel scheduling (CCS) and continuous channel-minimum scheduling latency (CC-MSL), to reduce the negative impact of tuning overhead as much as possible. Extensive simulations have been conducted. And the simulation results show that significant improvement in average delay can be achieved by our new algorithms.  相似文献   

17.
为解决软件定义无人机自组网路由维护存在的控制开销和数据包延迟偏大的问题,基于现有的OpenFlow协议提出了一种高效自适应的软件定义无人机自组网路由维护机制( Efficient and Adaptive Software-defined Unmanned Aerial Vehicle Ad Hoc Network R...  相似文献   

18.
This paper describes a feasibility study of the adaptive mobile access protocol (AMAP) for MSAT-X, a proposed experimental mobile satellite communication network. The mobiles are dispersed over a wide geographical area and the channel data rate is limited due to the size and cost limitations of mobile antennas. AMAP is a reservation based multiple-access scheme. The available bandwidth is divided into subchannels, which are divided into reservation and message channels. The ALOHA multiple-access scheme is employed in the reservation channels, while the message channels are demand assigned. AMAP adaptively reallocates the reservation and message channels to optimize system performance. It has been shown that if messages are generated at a rate of one message per hour, AMAP can support approximately 2000 active users per 2400 bit/s channel with an average delay of 1.4 s.  相似文献   

19.
This paper describes a feasibility study of the adaptive mobile access protocol (AMAP) for MSAT-X, a proposed experimental mobile satellite communication network. The mobiles are dispersed over a wide geographical area and the channel data rate is limited due to the size and cost limitations of mobile antennas. AMAP is a reservation based multiple-access scheme. The available bandwidth is divided into subchannels, which are divided into reservation and message channels. The ALOHA multiple-access scheme is employed in the reservation channels, while the message channels are demand assigned. AMAP adaptively reallocates the reservation and message channels to optimize system performance. It has been shown that if messages are generated at a rate of one message per hour, AMAP can support approximately 2000 active users per 2400 bit/s channel with an average delay of 1.4 s.  相似文献   

20.

Secure and efficient group communication among mobile nodes is one of the significant aspects in mobile ad hoc networks (MANETs). The group key management (GKM) is a well established cryptographic technique to authorise and to maintain group key in a multicast communication, through secured channels. In a secure group communication, a one-time session key is required to be shared between the participants by using distributed group key agreement (GKA) schemes. Due to the resource constraints of ad hoc networks, the security protocols should be communication efficient with less overhead as possible. The GKM solutions from various researches lacks in considering the mobility features of ad hoc networks. In this paper, we propose a hexagonal clustered one round distributed group key agreement scheme with trust (HT-DGKA) in a public key infrastructure based MANET environment. The proposed HT-DGKA scheme guarantees an access control with key authentication and secrecy. The performance of HT-DGKA is evaluated by simulation analysis in terms of key agreement time and overhead for different number of nodes. Simulation results reveal that the proposed scheme guarantees better performance to secure mobile ad hoc network. It is demonstrated that the proposed scheme possesses a maximum of 2250 ms of key agreement time for the higher node velocity of 25 m/s and lower key agreement overhead. Also, the HT-DGKA scheme outperforms the existing schemes in terms of successful message rate, packet delivery ratio, level of security, computation complexity, number of round, number of exponentiations and number of message sent and received that contribute to the network performance.

  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号