共查询到19条相似文献,搜索用时 93 毫秒
1.
2.
3.
《现代电子技术》2017,(20)
由于移动自组织网络MANETs中节点的快速移动,使得维持源节点与目的节点间的通信路径成为一项挑战性工作。节点的高速移动导致通信链路频繁断裂。为此,提出基于节点移动度的虚连接的路由(MDVRP)。虚路由为一条动态的逻辑路由,其由一系列的特定地理区域构成。每个区域内的节点依据自己的移动度设置转发数据包的定时器,移动度越小,具有优先转发数据包权。MDVRP通过虚路由策略,在源节点与目的节点间建立了多条传输路通,每个节点能独立选取下一跳转发节点,并利用节点移动度,择优选取转发数据包下一跳节点,从而提高链路的稳定性。仿真结果表明,提出的路由协议在端到端传输时延、路由开销以及数据包传输率性能均得到提高。 相似文献
4.
5.
6.
定位技术的快速发展使得获取位置信息的成本越来越低,此外利用位置信息可以有效降低路由开销,因此,基于位置信息的路由算法逐渐成为自组织网络路由算法的热点。在对现有基于位置信息的路由算法进行分析的基础上,对单播路由算法中贪婪转发算法及空洞处理算法进行研究,并对基于位置信息的多播路由算法及地理区域路由算法作了简要概述。 相似文献
7.
8.
Ad Hoc网络是一个多跳的无基础设施网络,本文在分析Ad Hoc网络自身特点的基础上,引入了一种多组播业务并存的K重组播网络,这种网络相对传统的组播网络具有节省系统开销,降低能量消耗的优点.文中对K重组播网络中的节点连接度的不同变化情况进行了理论上的详细研究,并在此基础上设计了一种适用于K重组播网络的负载均衡路由算法.仿真结果表明该路由算法拥塞控制性能良好,并能显著提高组播业务的稳定性.本文提出的这种K重组播网络能够广泛的应用于许多实际通信场合. 相似文献
9.
提出一种基于车载机会网络的EER(高效感染路由)算法,通过在Request控制分组中引入消息送达信息,并按照分组生成时间将待发送的数据分组进行排序,有效提高了算法性能。最后,通过OPNET仿真软件进行网络仿真,验证所提算法的有效性和可靠性。 相似文献
10.
ODMRP组播路由协议适用于带宽窄、移动性强和节点分散的移动自组织网络(Mobile AdHoc Network,MANET)。为了进一步提高该协议的性能,设计了一种改进方案,首次提出"备用转发节点"的概念,将其应用于原协议中,以降低网络的负载。理论分析表明,改进方案通过控制备用转发节点能动态的控制路由数量,进而控制转发分组节点数据,从而降低网络负载。所以,该改进方案有效地提高了ODMRP协议的性能,使之更加适用于大规模的MANET网络。 相似文献
11.
12.
Network coding is a powerful coding technique that has been proved to be very effective in achieving the maximum multicast capacity. It is especially suited for new emerging networks such as ad-hoc and sensor networks. In this work, we investigate the multicast routing problem based on network coding and put forward a practical algorithm to obtain the maximum flow multicast routes in ad-hoc networks. The "conflict phenomenon" that occurs in undirected graphs will also be discussed. Given the developed routing algorithm, we will present the condition for a node to be an encoding node along with a corresponding capacity allocation scheme. We will also analyze the statistical characteristics of encoding nodes and maximum flow in ad-hoc networks based on random graph theory. 相似文献
13.
Sungwook Kim 《Wireless Personal Communications》2012,66(4):739-749
In the wireless ad-hoc network management, Quality of Service (QoS) is an important issue. Along with the QoS ensuring, another desirable property is the network reliability. In data communications, multi-path routing strategy can cope with the problem of traffic overloads while balancing the network resource consumption. In this paper, we propose a new multipath routing algorithm for QoS-sensitive multimedia services. Based on the ant colony optimization technique, the proposed algorithm can establish effective multi-paths to enhance the network reliability. According to the load balancing strategy, data packets are adaptively distributed through the established paths while maintaining an acceptable level of QoS requirement. The most important feature of the proposed approach is its adaptability to current traffic conditions. Simulation results indicate the superior performance of the proposed algorithm, while other schemes cannot offer such an attractive performance balance. 相似文献
14.
Multicasting is an essential service for ad-hoc wireless networks. In a multicasting environment with multiple senders, receivers
or meeting members, traditional multicast routing protocols must pay great overhead for multiple multicast sessions. This
work presents a scalable and reliable multicasting protocol for ad-hoc wireless networks. A virtual backbone is used as a
shared structure for multiple sessions. A clustering scheme is used to reduce the routing path length. A novel scheme is developed
to effectively multicast packets using forwarding gates. Furthermore, a lost packet recovery scheme is developed for reliable
packet transmission. This scheme can be used to improve the reliability of traditional non-acknowledged multicasting approach.
Experiments were conducted to evaluate the proposed multicasting scheme and the results demonstrate that our scheme outperforms
other schemes in terms of packet delivery ratio, packet delivery time, control overhead, multicast efficiency, and cost effect.
Furthermore, our approach is stable for networks with high mobility and the lost packet recovery scheme is cost-effective.
Chyi-Ren Dow was born in 1962. He received the B.S. and M.S. degrees in information engineering from National Chiao Tung University, Taiwan,
in 1984 and 1988, respectively, and the M.S. and Ph.D. degrees in computer science from the University of Pittsburgh, USA,
in 1992 and 1994, respectively. Currently, he is a Professor in the Department of Information Engineering, Feng Chia University,
Taiwan. His research interests include mobile computing, ad-hoc wireless networks, agent techniques, fault tolerance, and
learning technology.
Jyh-Horng Lin was born in 1975. He received the B.S. and M.S. degrees in information engineering from Feng Chia University, Taiwan, in
1998 and 2000, respectively. He is currently a candidate for the Ph.D. degree in the Department of Information Engineering,
Feng Chia University, Taichung, Taiwan. His research interests include mobile computing and ad-hoc wireless networks.
Kun-Tai Chen was born in 1978. He received the B.S. and M.S. degrees in information engineering from Feng Chia University, Taiwan, in
2000 and 2002, respectively. He is currently an engineer in the VIA technologies, Inc. Hsinchu branch, Taiwan. His research
interests include mobile computing, ad-hoc wireless networks and video decoding.
Sheng-Chang Chen was born in 1979. He received his B.S. degree and M.S. degree in information engineering from Feng Chia University, Taiwan,
in 2001 and 2002. He is currently a Ph.D. degree in information engineering from Feng Chia University, Taiwan. His research
interests include mobile computing, ad-hoc wireless network and fault tolerance technique.
Shiow-Fen Hwang was born in 1963. She received her B.S., M.S. and Ph.D. degrees in Applied Mathematics from National Chiao Tung University,
Taiwan, in 1985, 1987 and 1991, respectively. Currently, she is an Associate Professor in the Department of Information Engineering,
Feng Chia University, Taiwan. Her research interests include interconnection networks, mobile computing, and computer algorithms. 相似文献
15.
Energy conservation is a critical issue in wireless multihop ad-hoc networks, which have nodes powered by batteries only.
One major metric for energy conservation is to route a communication session along the routes that require the lowest total
energy consumption. To do this, we introduce in this paper a new concept called Virtual Relay. Based on this new concept, we present a constraint formulation for the minimum-energy multicast routing problem in terms
of mixed integer linear programming. Experiment results show that in a typical multihop ad-hoc network with 50 nodes, the
optimal solutions can always be solved in a timely manner, and it also provides a way to evaluate the realistic performance
of different heuristic algorithms.
Song Guo received the B.S. degree in computer science from Huazhong University of Science and Technology, Wuhan, China, in 1995 and
the M.S. degree in electrical and computer engineering from Beijing University of Posts and Telecommunications, Beijing, China,
in 1998. Since 2001 he has been a Ph.D. student in the School of Information Technology and Engineering at University of Ottawa,
Canada. His main research interests lie in mobile ad-hoc routing protocols and algorithms, power-aware design and optimization
for ad-hoc wireless networks, and performance evaluation.
Oliver Yang is a Professor in the School of Information Technology and Engineering at University of Ottawa, Ontario, Canada. Dr. Yang
received his Ph.D. degree in Electrical Engineering from the University of Waterloo, Ont., Canada in 1988. He has worked for
Northern Telecom Canada Ltd. and has done various consulting. His research interests are in modeling, analysis and performance
evaluation of computer communication networks, their protocols, services and interconnection architectures. The CCNR Lab under
his leadership has been working on various projects in the traffic control, traffic characterization, switch architecture
and traffic engineering issues in both wireless and photonic networks. This has been reported in more than 200 technical papers.
Dr. Yang is also interested in queuing theory, simulations, computational algorithms and their applications such as reliability
and traffic analysis. Dr. Yang is currently the editor of IEEE Communication Magazine. 相似文献
16.
Ad hoc网络两种按需路由协议性能分析 总被引:1,自引:0,他引:1
Ad hoc网络是一种无需依赖于事先布设的基础设施,而仅依靠网络内部节点之间的协作,就能够完成节点间通信的网络。比较了Ad hoc网络两种主流的按需路由协议:动态源路由协议,自组网按需距离矢量路由协议。使用基于ns-2的仿真模型进行仿真,并通过分组交付率、平均端到端时延、标准化路由负荷、对两种按需路由协议进行评估。实验结果表明即使DSR和AODV协议都是按需路由协议,但它们采取的路由机制的不同,导致它们的性能表现的巨大差异。 相似文献
17.
In Mobile Ad-hoc Networks (MA-NETs), routing protocols directly affect various indices of network Quality of Service (QoS), so they play an important role in network performance. To address the drawbacks associated with traditional routing protocols in MANETs, such as poor anti-fading perfor-mance and slow convergence rate, for basic Dynamic Source Routing (DSR), we propose a new routing model based on Grover’s sear-ching algorithm. With this new routing model, each node maintains a node vector function, and all the nodes can obtain a node probability vector using Grover’s algorithm, and then select an optimal routing according to node probability. Simulation results show that compared with DSR, this new routing protocol can effectively extend the network lifetime, as well as reduce the network delay and the number of routing hops. It can also significantly improve the anti-jamming capa-bility of the network. 相似文献
18.
In the node compromise attack, the adversary physically captures nodes and extracts the cryptographic keys from the memories, which destroys the security, reliability and confidentiality of the networks. Due to the dynamical network topology, designing an efficient node compromise attack algorithm is challenging, because it is difficult to model the attack or to enhance the attacking efficiency. In this paper, a general algorithm for modeling the node compromise attack in VANET is proposed, which promotes the attacking efficiency by destroying the network backbone. The backbone is constructed using the connected dominating set of the network, which has relevant to the intermeeting time between the vehicles. Then two attacking algorithms are proposed based on the general model, which destroy the network in a centralized and distributed version while maximizing the destructiveness. Simulations are conducted to show the advantages of our scheme. Simulation results reveal that our scheme enhances the attacking efficiency in different mobility models and different applications, which is suitable for modeling the node compromise attack in VANET. At last, discussions are presented to the illustrate the influences of the characteristics to the attacking efficiency with respect to vehicle speed, communication range and key sharing probability. 相似文献
19.
Sheng-Chang Chen Chyi-Ren Dow Ren-Di Wang Yi-Hsung Li Shiow-Fen Hwang 《Wireless Personal Communications》2009,48(3):441-462
Multicasting is an essential service for mobile ad-hoc networks. A major challenge for multicasting in mobile ad-hoc networks
(MANETs) is the unstable forwarding path. This work presents a reliable multicasting protocol for mobile ad-hoc networks.
A virtual backbone is used as a shared structure for multiple sessions. A lost packet recovery scheme is developed for reliable
packet transmission, called the Recovery Point (RP) scheme. The RP scheme maintains the data packets received from the source
for recovering lost packets for its downstream RPs. In addition, we combine the Forward Error Correction (FEC) technology
with our RP scheme to enhance the reliability of our RP scheme. A mergence scheme for RP is also proposed to avoid excessive
control overhead. Our RP and FEC based scheme can be used to improve the reliability and efficiency of the traditional non-acknowledged
multicasting approach. Experiments were conducted to evaluate the proposed multicasting scheme. The results demonstrate that
our scheme outperforms other schemes in terms of packet delivery ratio and multicast efficiency. Furthermore, the simulation
results also demonstrate that our approach is stable in networks with high mobility.
相似文献
Shiow-Fen HwangEmail: |