首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
Teletraffic analysis and mobility modeling of PCS networks   总被引:1,自引:0,他引:1  
Channel holding time is of primary importance in teletraffic analysis of PCS networks. This quantity depends on user's mobility which can be characterized by the cell residence time. We show that when the cell residence time is not exponentially distributed, the channel holding time is not exponentially distributed either, a fact also confirmed by available field data. In order to capture the essence of PCS network behaviour, including the characterization of channel holding time, a correct mobility model is therefore necessary. The new model must be good enough to fit field data, while at the same time resulting in a tractable queueing system. We propose a new mobility model, called the hyper-Erlang distribution model, which is consistent with these requirements. Under the new realistic operational assumption of this model, in which the cell residence time is generally distributed, we derive analytical results for the channel holding time distribution, which are readily applicable to the hyper-Erlang distribution models. Using the derived analytical results we demonstrate how the distribution of the cell residence time affects the channel holding time distribution. The results presented in this paper can provide guidelines for field data processing in PCS network design and performance evaluation  相似文献   

2.
无线网络中的移动模型   总被引:2,自引:0,他引:2  
移动ad hoc网络(MANET)是指不依赖于固定设备,而由一组无线节点通过自组织而形成的网络.移动性是MANET最主要的特性之一,对网络的性能产生极大的影响.该文主要介绍了MANET中常见的移动模型,并简要分析了他们的主要特点和适用环境.  相似文献   

3.
In the node compromise attack, the adversary physically captures nodes and extracts the cryptographic keys from the memories, which destroys the security, reliability and confidentiality of the networks. Due to the dynamical network topology, designing an efficient node compromise attack algorithm is challenging, because it is difficult to model the attack or to enhance the attacking efficiency. In this paper, a general algorithm for modeling the node compromise attack in VANET is proposed, which promotes the attacking efficiency by destroying the network backbone. The backbone is constructed using the connected dominating set of the network, which has relevant to the intermeeting time between the vehicles. Then two attacking algorithms are proposed based on the general model, which destroy the network in a centralized and distributed version while maximizing the destructiveness. Simulations are conducted to show the advantages of our scheme. Simulation results reveal that our scheme enhances the attacking efficiency in different mobility models and different applications, which is suitable for modeling the node compromise attack in VANET. At last, discussions are presented to the illustrate the influences of the characteristics to the attacking efficiency with respect to vehicle speed, communication range and key sharing probability.  相似文献   

4.
We develop a detailed approach to study how mobility impacts the performance of reactive mobile ad hoc network routing protocols. In particular, we examine how the statistics of path durations including probability density functions vary with the parameters such as the mobility model, relative speed, number of hops, and radio range. We find that at low speeds, certain mobility models may induce multimodal distributions that reflect the characteristics of the spatial map, mobility constraints and the communicating traffic pattern. However, this paper suggests that at moderate and high velocities the exponential distribution with appropriate parameterizations is a good approximation of the path duration distribution for a range of mobility models. Analytically, we show that the reciprocal of the average path duration has a strong linear relationship with the throughput and overhead of dynamic source routing (DSR), which is also confirmed by simulation results. In addition, we show how the mathematical expression obtained for the path duration distribution can also be used to prove that the nonpropagating cache hit ratio in DSR is independent of velocity for the freeway mobility model. These two case studies illustrate how various aspects of protocol performance can be analyzed with respect to a number of significant parameters including the statistics of link and path durations.  相似文献   

5.
Modeling techniques for large-scale PCS networks   总被引:4,自引:0,他引:4  
There has been rapid growth in the demand for mobile communications that has led to intensive research and development of complex PCS (personal communication services) networks. Capacity planning and performance modeling are necessary to maintain a high quality of service to the PCS subscriber while minimizing costs. Effective and practical performance models for large-scale PCS networks are available. Two new performance models are presented in this article which can be solved using analytical techniques. The first is the so-called portable population model, based on the flow equivalent assumption (the rate of portables into a cell equals the rate of portables out of the cell). The model provides the steady-state portable population distribution in a cell that is independent of the portable residual time distribution, which can be used by simulations to reduce the necessary execution time by reaching the steady state more rapidly. Additionally, this model can be used to study the blocking probability of a low (portable) mobility PCS network and the performance of portable deregistration strategies. The second model is the so-called portable movement model which can be used to study location tracking and handoff algorithms. The model assumes that the arriving calls to a portable form a Poisson process, and portable residual times have a general distribution. This model can be used to study location-tracking algorithms and handoff algorithms. It is shown that under some assumptions, the analytic techniques are consistent with the simulation model  相似文献   

6.
This work builds on the LIME (Linda in mobile environment) tuple space framework to implement a system that offers clustering and routing capabilities for mobile ad hoc network (MANET) environments, and provide an agent-like architecture for running distributed and collaborative applications on mobile devices. This paper describes the components that were added to the LIME system, which were necessary to implement engagement and disengagement of hosts into and out of spaces, and illustrates the developed engagement mechanism and routing protocol with the aid of example scenarios. The paper then discusses the system performance obtained from implementing its functions using the ns-2 network simulation software. The obtained results indicate that the system works reasonably well under different conditions (host transmission range, host mobility, and density of hosts in the network). For instance, the time for a host to join a space is well under one second in sparse spaces and goes up to only two seconds in moderately dense spaces). Moreover, the system offers routing performance that is moderately better than that of ZRP, both in terms of route discovery delay and generated traffic.  相似文献   

7.
Fan  Narayanan  Ahmed   《Ad hoc Networks》2003,1(4):383-403
A Mobile Ad hoc Network (MANET) is a collection of wireless mobile nodes forming a temporary network without using any existing infrastructure. Since not many MANETs are currently deployed, research in this area is mostly simulation based. Random Waypoint is the commonly used mobility model in these simulations. Random Waypoint is a simple model that may be applicable to some scenarios. However, we believe that it is not sufficient to capture some important mobility characteristics of scenarios in which MANETs may be deployed. Our framework aims to evaluate the impact of different mobility models on the performance of MANET routing protocols. We propose various protocol independent metrics to capture interesting mobility characteristics, including spatial and temporal dependence and geographic restrictions. In addition, a rich set of parameterized mobility models is introduced including Random Waypoint, Group Mobility, Freeway and Manhattan models. Based on these models several ‘test-suite’ scenarios are chosen carefully to span the metric space. We demonstrate the utility of our test-suite by evaluating various MANET routing protocols, including DSR, AODV and DSDV. Our results show that the protocol performance may vary drastically across mobility models and performance rankings of protocols may vary with the mobility models used. This effect can be explained by the interaction of the mobility characteristics with the connectivity graph properties. Finally, we attempt to decompose the reactive routing protocols into mechanistic “building blocks” to gain a deeper insight into the performance variations across protocols in the face of mobility.  相似文献   

8.
A mobile ad hoc network is a collection of wireless mobile nodes creating a network without using any existing infrastructure. Much research has been carried out to find out an optimal routing protocol for the successful transmission of data in this network. The main hindrance is the mobility of the network. If the mobility pattern of the network can be predicted, it will help in improving the QoS of the network. This paper discusses a novel approach to mobility prediction using movement history and existing concepts of genetic algorithms, to improve the MANET routing algorithms. The proposed lightweight genetic algorithm performs outlier removal on the basis of heuristics and parent selection using the weighted roulette wheel algorithm. After performing the genetic operations a node to node adjacency matrix is obtained from which the predicted direction of each node is calculated using force directed graphs and vector calculations. The technique proposes a new approach to mobility prediction which does not depend on probabilistic methods and which is completely based on genetic algorithms.  相似文献   

9.
Recently, wireless networks have become one of the major development trends in computer network technology. Because there is no more need of the wired transmission medium, applications have thus diversified. One such growing field of wireless networks is the mobile ad‐hoc network (MANET). A MANET consists of mobile hosts (such as portable laptops, vehicles, etc.), and no fixed infrastructure is required. MANETs provide ease of self‐configuration and can extend coverage at a low cost. Numerous applications have therefore been proposed under this network environment for daily life use. Because MANETs nodes are capable of moving, MANET network topology changes frequently. Thus, the traditional routing protocols fail to fit such an environment. In this paper, we propose an efficient routing protocol for MANETs, which integrates the mathematical model of profit optimization (the Kelly formula) from the field of economics to cope with the routing problem caused by node mobility. Some numerical simulations have been conducted to evaluate the performance of the proposed method using the network simulator NS‐2. The results show that our proposed method outperforms conventional routing protocols in packet delivery ratio comparisons; and the average end‐to‐end delays are within a tolerable range. Copyright © 2013 John Wiley & Sons, Ltd.  相似文献   

10.
An opportunistic network (OPPNET) consists of diverse mobile nodes with various mobility patterns. Numerous mobility patterns and the resource constraints of mobile nodes lead to network partitioning that result in system performance degradation including low data accessibility. In a traditional mobile ad hoc network (MANET) which is similar to an OPPNET, replica allocation schemes have been proposed to increase data accessibility. Although the schemes are efficient in a MANET, they may not be directly applicable to an OPPNET because the schemes are based on a grouping of mobile nodes. It is very difficult to build groups based on network topology in an OPPNET because a node in an OPPNET does not keep its network topology information. In this paper, we propose a novel replica allocation scheme for an opportunistic network called the Snooping-based Fully Distributed replica allocation scheme. The proposed scheme allocates replicas in a fully distributed manner without grouping to reduce the communication cost, and fetches allocated replicas utilizing a novel candidate list concept to achieve high data accessibility. In the proposed scheme, a node can fetch replicas opportunistically based on the candidate list. Consequently, the proposed replica allocation scheme achieves high data accessibility while reducing the communication cost significantly. Extensive simulation results demonstrate that the proposed scheme reduces the communication cost and improves data accessibility over traditional schemes.  相似文献   

11.
Multi-cell mobility model and performance analysis for wireless cellular networks are presented. The mobility model plays an important role in characterizing different mobility-related parameters such as handoff call arrival rate, blocking or dropping probability, and channel holding time. We present a novel tractable multi-cell mobility model for wireless cellular networks under the general assumptions that the cell dwell times induced by mobiles’ mobility and call holding times are modeled by using a general distribution instead of exponential distribution. We propose a novel generalized closed-form matrix formula to support the multi-cell mobility model and call holding time with general distributions. This allows us to develop a fixed point algorithm to compute loss probabilities, and handoff call arrival rate under the given assumptions. In order to reduce computational complexity of the fixed point algorithm, the channel holding time of each cell is down-modeled into an exponentially distributed one for purposes of simplification, since the service time is insensitive in computing loss probabilities of each cell due to Erlang insensitivity. The accuracy of the multi-cell analytic mobility model is supported by the comparison of the simulation results and the analytic ones.  相似文献   

12.
文章充分结合SDN集中管控、MANET分布灵活和IoT智能感知的优势,采用SDN+MANET+IoT的思路实现异构网络融合组网,满足智能巡检的需求。利用可编程性高的树莓派智能小车作为IoT硬件平台,并在此基础上搭建分布式MANET网络,实现智能小车集群的自组织组网。同时,为实现智能巡检和相互协作,将OVS交换机移植到树莓派平台,利用扩展的OpenFlow协议,对分布式智能小车集群实施基于SDN技术的集中管控,统一管理集群的物理感知能力、移动监控能力和数据转发能力,进而搭建SMIoT。  相似文献   

13.
Frequent changes in network topologies caused by mobility in mobile ad hoc networks (MANETs) impose great challenges to designing routing schemes for such networks. Various routing schemes each aiming at particular type of MANET (e.g., flat or clustered MANETs) with different mobility degrees (e.g., low, medium, and high mobility) have been proposed in the literature. However, since a mobile node should not be limited to operate in a particular MANET assumed by a routing scheme, an important issue is how to enable a mobile node to achieve routing performance as high as possible when it roams across different types of MANETs. To handle this issue, a quantity that can predict the link status for a time period in the future with the consideration of mobility is required. In this paper, we discuss such a quantity and investigate how well this quantity can be used by the link caching scheme in the dynamic source routing protocol to provide the adaptability to variable topologies caused by mobility through computer simulation in NS-2.  相似文献   

14.
A Mobile Ad hoc NETwork (MANET) is a group of mobile nodes that form a multihop wireless network. The topology of the network can change randomly due to unpredictable mobility of nodes and propagation characteristics. Previously, it was assumed that the nodes in the network were assigned IP addresses a priori. This may not be feasible as nodes can enter and leave the network dynamically. A dynamic IP address assignment protocol like DHCP requires centralized servers that may not be present in MANETs. Hence, we propose a distributed protocol for dynamic IP address assignment to nodes in MANETs. The proposed solution guarantees unique IP address assignment under a variety of network conditions including message losses, network partitioning and merging. Simulation results show that the protocol incurs low latency and communication overhead for an IP address assignment.  相似文献   

15.

Worldwide Interoperability for Microwave Access (Wimax) is power station through which mobile network, commonly known as A Mobile Ad-hoc Network (MANET) is used by the people. A MANET can be described as an infrastructure-less and self-configure network with autonomous nodes. Participated nodes in MANETs move through the network constantly causing frequent topology changes. Designing suitable routing protocols to handle the dynamic topology changes in MANETs can enhance the performance of the network. In this regard, this paper proposes four algorithms for the routing problem in MANETs. First, we propose a new method called Classical Logic-based Routing Algorithm for the routing problem in MANETs. Second is a routing algorithm named Fuzzy Logic-based Routing Algorithm (FLRA). Third, a Reinforcement Learning-based Routing Algorithm is proposed to construct optimal paths in MANETs. Finally, a fuzzy logic-based method is accompanied with reinforcement learning to mitigate existing problems in FLRA. This algorithm is called Reinforcement Learning and Fuzzy Logic-based (RLFLRA) Routing Algorithm. Our proposed approaches can be deployed in dynamic environments and take four important fuzzy variables such as available bandwidth, residual energy, mobility speed, and hop-count into consideration. Simulation results depict that learning process has a great impact on network performance and RLFLRA outperforms other proposed algorithms in terms of throughput, route discovery time, packet delivery ratio, network access delay, and hop-count.

  相似文献   

16.
分析了几种常见分簇算法,在此基础上提出了一种新的基于移动代理的分簇策略。对策略的原理、步骤到仿真结果进行了详细分析。实验结果表明,新算法较常见分簇算法更能够延长网络寿命。  相似文献   

17.
三维移动Ad hoc网络链路动态性研究   总被引:1,自引:0,他引:1  
3维移动Ad hoc网络(3-D MANET)是一种网络场景分布于3维空间的移动Ad hoc网络。链路动态性分析是研究3-D MANET的一项基础性工作,其结论可作为网络协议设计的基础。该文基于CV(Constant Velocity)移动模型,从概率模型的角度推导出了链路寿命期望和分布的数学表达式,并通过仿真实验进行了验证,表明了理论计算结果的正确性。结论对3-D MANET的研究和应用具有一定的参考价值。  相似文献   

18.
In order to understand the message dissemination performance in delay-tolerant networks, much analysis work has been proposed in literature. However, existing work shares a common simplification that the pairwise inter-meeting time between any two mobile nodes is exponentially distributed. Not mention the fact that such assumption is only an approximation, it cannot be applied by network planners to directly control the mobile nodes for any network optimization, e.g., energy efficiency. It is quite significant to study the relationship between the network performance with the parameters that can be adjusted directly to tackle the limitations of current exponential distribution assumption based analysis. Therefore, in this paper, we are motivated to jointly consider the transmission range and messages residence time to stochastically analyze deadline-constrained message delivery ratio utilizing a controlled epidemic routing. The message propagation is considered as an age-structure process and described by a susceptible–infectious–recovered model, which is then analyzed using delay differential equations. Since both the transmission range and the message residence time are related to the mobile nodes’ energy consumption, we further apply our analysis framework to investigate the tradeoff between the energy consumption and the achievable message delivery ratio. The correctness and accuracy of our analysis are validated by extensive simulations.  相似文献   

19.
移动Adhoc网络中传输流时,通常受到节点的移动性引起的路由中断影响。当传输实时数据流时,必须提供具有鲁棒性的路由。提出了基于鲁棒吞吐量的路由选择方法进行路由选择,可以极大地提高MANET网络系统的吞吐量速率。按需鲁棒路由算法(distributedon-demand routing and flow admission,DRFA)方案选择性的发现路由,保证准备传输的流或文件不中断(包括不重新选择路由)的传输。  相似文献   

20.
Dynamic Task-Based Anycasting in Mobile Ad Hoc Networks   总被引:2,自引:0,他引:2  
Mobile ad hoc networks (MANETs) have received significant attention in the recent past owing to the proliferation in the numbers of tetherless portable devices, and rapid growth in popularity of wireless networking. Most of the MANET research community has remained focused on developing lower layer mechanisms such as channel access and routing for making MANETs operational. However, little focus has been applied on higher layer issues, such as application modeling in dynamic MANET environments. In this paper, we present a novel distributed application framework based on task graphs that enables a large class of resource discovery based applications on MANETs. A distributed application is represented as a complex task comprised of smaller sub-tasks that need to be performed on different classes of computing devices with specialized roles. Execution of a particular task on a MANET involves several logical patterns of data flow between classes of such specialized devices. These data flow patterns induce dependencies between the different classes of devices that need to cooperate to execute the application. Such dependencies yield a task graph (TG) representation of the application.We focus on the problem of executing distributed tasks on a MANET by means of dynamic selection of specific devices that are needed to complete the tasks. In this paper, we present simple and efficient algorithms for dynamic discovery and selection (instantiation) of suitable devices in a MANET from among a number of them providing the same functionality. This is carried out with respect to the proposed task graph representation of the application, and we call this process Dynamic Task-Based Anycasting. Our algorithm periodically monitors the logical associations between the selected devices, and in the event of a disruption in the application owing to failures in any component in the network, it adapts to the situation and dynamically rediscovers the affected parts of the task graph, if possible. We propose metrics for evaluating the performance of these algorithms and report simulation results for a variety of application scenarios differing in complexity, traffic, and device mobility patterns. From our simulation studies, we observed that our protocol was able to instantiate and re-instantiate TG nodes quickly and yielded high effective throughput at low to medium degrees of mobility and not much below 70% effective throughput for high mobility scenarios.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号