首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到19条相似文献,搜索用时 93 毫秒
1.
随着移动通信网络技术的发展,应急通信中的移动基站类型、业务内容、应用场景也发生了很大变化,传统应急通信基站的回传手段已难以满足新业务的性能需求。文章将介绍无线Mesh自组网技术及其特点,结合测试分析和实际应用,提出基于无线Mesh自组网的无线回传方案。  相似文献   

2.
基于多波束切换的移动自组网系统在未来通信中具有广阔的应用前景,邻居发现是基于多波束切换的移动自组网系统的关键技术之一。现有基于多波束切换的移动自组网邻居发现算法在波束交叠情况下无法选择最优通信波束,为了解决基于多波束切换的移动自组网邻居发现过程中的最优通信波束选择问题,提出一种改进算法,在邻居发现过程中增加接收信号质量评估机制,增强网络的稳定性,提高网络吞吐量,并通过仿真验证了在波束交叠的情况下系统的累计平均接收电平优于传统方法。  相似文献   

3.
航空自组网的现状与发展   总被引:6,自引:0,他引:6  
近年来,随着移动Ad Hoc网络研究与应用的不断深入,许多研究机构和学者正在将其应用于航空通信中,产生了崭新的研究领域——航空自组网。本文概述了航空自组网的基本概念、主要特点及应用场合,介绍了在这一领域比较活跃的研究机构以及其主要工作,分析了航空自组网的关键技术,并展望了未来的发展方向。  相似文献   

4.
范青刚  叶雪梅  蔡艳宁  朱云杰 《电子科技》2013,26(11):176-178,181
随着网络的发展,移动自组网已成为当前研究的热点,文中介绍了移动自组网与现有通信系统在路由上的区别,重点探讨了移动自组网DSDV、AODV、DSR等几类典型的路由协议,以及MANET路由协议今后的主要研究方向。  相似文献   

5.
基于NS2的航空白组网节点移动模型仿真研究   总被引:1,自引:1,他引:0  
黎方正 《通信技术》2009,42(1):186-188
航空自组网是MANET-s在航空通信中的应用。对三种节点移动模型在航空自组网中的应用进行了仿真研究。利用NS2仿真平台,添加了随机走动移动模型和随机方向移动模型,建立了AANET的网络模型.编写了仿真场景,对三种节点移动模型在AANET中的性能进行了仿真分析。结果表明随机路点移动模型的性能最优,随机走动移动模型其次,随机方向移动模型最差。研究结果对航空自组网的研究和应用具有一定的参考价值。  相似文献   

6.
在现代通信技术快速发展的背景下,应急语音通信作为应对突发自然灾害的重要手段,近年来得到了广泛重视。结合应急通信的实战需求,探讨了新一代窄带自组网通信技术的在应急通信领域的创新应用。根据我国实际情况提出了现有窄带应急通信的问题和需求,然后介绍并分析了窄带自组网的原理和特点,其具有通信覆盖面积广、抗毁性强、维护简单以及成本低等优势,极好地满足了目前偏远地区窄带应急语音通信的需要。最后,结合实际案例阐述了窄带自组网作为应急语音通信网的应用优势,初步证明了该应用的可行性。  相似文献   

7.
蔡丽丽  魏平俊  高辉 《通信技术》2008,41(4):149-151
移动自组网是由一组带有无线收发装置的移动终端组成的自治通信系统.煤矿井下移动自组网可应用于矿井的监控管理系统、数据采集系统或者应急通信系统.移动自组网的路由方案主要包括表驱动(Proactive)和按需驱动(Reactive)两种,AODV是一种代表性的按需驱动算法.文中介绍了利用辅助路径基于AODV的一种矿井移动自组网的路由恢复算法,给出了辅助路由算法的性能测评方案.  相似文献   

8.
无线自组网具有无中心、自配置和快速组网等显著特点,非常适合用于应急通信保障。首先,介绍了当前国内应急通信的现状和存在的问题。然后,概述了以Ad Hoc网络、无线传感网和无线mesh网络为代表的无线自组网的显著特点和技术优势,并举例说明了无线自组网在应急通信保障中的几种具体应用。最后,展望了应急通信网络今后的发展方向。  相似文献   

9.
谢振 《移动信息》2023,45(8):34-36
山地森林区域灾害存在现场环境复杂、地面公网被摧毁或无法覆盖的问题,文中根据应急通信实战需求,提出了一种便携式窄带无线自组网应急通信系统。该系统利用了“LTE+DMR”的融合方式,使不同网络、不同制式的通信系统相融合,实现了与不同终端设备、通信方式的互通互联与统一管理。经案例测试证明,该窄带无线自组网技术在应急语音通信网络中具有可行性,满足了山林区域环境下的应急通信需求。  相似文献   

10.
一种基于自组织网络技术的同线通信系统   总被引:1,自引:0,他引:1  
本文针对当前通信电话通信系统存在的问题,提出了借鉴无线Ad hoc网概念构建同线多跳自组网的思路和基本方案.讨论了新网络形态下用户多址接入.网络时隙同步和网络拓扑更新等问题.并在OPNET仿真平台下建模.对同线多跳自组网的网络性能进行了仿真验证.  相似文献   

11.
Dijiang  Deep 《Ad hoc Networks》2008,6(4):560-577
In this paper, we present a secure group key management scheme for hierarchical mobile ad hoc networks. Our approach aims to improve both scalability and survivability of group key management for large-scale wireless ad hoc networks. To achieve our goal, we propose the following approaches: (1) a multi-level security model, which follows a modified Bell-La Padula security model that is suitable in a hierarchical mobile ad hoc networking environment, and (2) a decentralized group key management infrastructure to achieve such a multi-level security model. Our approaches reduce the key management overhead and improve resilience to any single point failure problem. In addition, we have developed a roaming protocol that is able to provide secure group communication involving group members from different groups without requiring new keys; an advantage of this protocol is that it is able to provide continuous group communication even when the group manager fails.  相似文献   

12.
面向高动态移动自组织网络的生物启发分簇算法   总被引:2,自引:0,他引:2       下载免费PDF全文
于云龙  茹乐  方堃  贾旭峰 《电子学报》2018,46(4):918-929
分簇可以有效地提高大规模移动自组织网络的性能.但高动态的移动自组织网络具有节点移动性强、网络拓扑变化快的特点,应用传统的分簇算法会造成网络性能迅速下降,频繁的簇拓扑更新造成了簇结构的不稳定和控制开销的增加.为了解决传统分簇算法无法适应高动态的大规模移动自组织网络的问题,提出了一种基于生物启发的移动感知分簇算法,该算法对多头绒泡菌的觅食模型进行了改进,使其适用于移动自组织网络领域.由于该算法与节点的移动特性进行了结合,所以该算法可以有效地在高动态移动自组织网络中进行簇的建立与维护.实验结果表明,相较于其他传统分簇算法,本文算法提高了平均链路连接保持时间和平均簇首保持时间,使得簇结构更加稳定,提高了对高动态、大规模移动自组织网络的适应能力.  相似文献   

13.
A mobile ad hoc network does not require fixed infrastructure to construct connections among nodes. Due to the particular characteristics of mobile ad hoc networks, most existing secure protocols in wired networks do not meet the security requirements for mobile ad hoc networks. Most secure protocols in mobile ad hoc networks, such as secure routing, key agreement and secure group communication protocols, assume that all nodes must have pre‐shared a secret, or pre‐obtained public‐key certificates before joining the network. However, this assumption has a practical weakness for some emergency applications, because some nodes without pre‐obtained certificates will be unable to join the network. In this paper, a heterogeneous‐network aided public‐key management scheme for mobile ad hoc networks is proposed to remedy this weakness. Several heterogeneous networks (such as satellite, unmanned aerial vehicle, or cellular networks) provide wider service areas and ubiquitous connectivity. We adopt these wide‐covered heterogeneous networks to design a secure certificate distribution scheme that allows a mobile node without a pre‐obtained certificate to instantly get a certificate using the communication channel constructed by these wide‐covered heterogeneous networks. Therefore, this scheme enhances the security infrastructure of public key management for mobile ad hoc networks. Copyright © 2006 John Wiley & Sons, Ltd.  相似文献   

14.
The basic philosophy of personal communication services is to provide user‐to‐user, location independent communication services. The emerging group communication wireless applications, such as multipoint data dissemination and multiparty conferencing tools have made the design and development of efficient multicast techniques in mobile ad‐hoc networking environments a necessity and not just a desire. Multicast protocols in mobile ad‐hoc networks have been an area of active research for the past couple of years. This paper summarizes the activities and recent advances in this work‐in‐progress area by identifying the main issues and challenges that multicast protocols are facing in mobile ad‐hoc networking environments, and by surveying several existing multicasting protocols. This article presents a classification of the current multicast protocols, discusses the functionality of the individual existing protocols, and provides a qualitative comparison of their characteristics according to several distinct features and performance parameters. Furthermore, since many of the additional issues and constraints associated with the mobile ad‐hoc networks are due, to a large extent, to the attribute of user mobility, we also present an overview of research and development efforts in the area of group mobility modeling in mobile ad‐hoc networks. Copyright © 2001 John Wiley & Sons, Ltd.  相似文献   

15.
Wireless Personal Communications - Using ad hoc information amid of adaptable terminals, mobile ad hoc networks (MANETs) are absolute of any kind of communication infrastructure even though the...  相似文献   

16.
Wireless Personal Communications - Reliable communication in ad hoc networks necessitates mobile nodes to synchronize among themselves for cooperation. The cooperation in ad hoc networks...  相似文献   

17.
The cellular network with ad hoc communication has been foreseen in the next-generation mobile communication system. For such a network, a distance-based (DB) location management scheme cooperated with the ad hoc assistance node (DBCAN) is proposed in this paper. Allowing a mobile terminal to pass its mobility information to the ad hoc assistance node (AAN) with appropriate location updating, DBCAN can effectively reduce the paging cost and limit the paging delay. Moreover, DBCAN includes a method to determine whether AANs should be utilized or not to make cost effective. Our simulation results show that DBCAN can effectively reach cost reduction and still get performance improvement even if the probability to successfully deliver mobility information to AANs falls to the median level.  相似文献   

18.
Wireless mesh networks (WMNs) have a proven record in providing viable solutions for some of the fundamental issues in wireless networks such as capacity and range limitations. WMN infrastructure includes clusters of mobile ad‐hoc networks connected through a fixed backbone of mesh routers. The mesh network can be constrained severely because of various reasons, which could result in performance degradation such as a drop in throughput or long delays. Solutions to this problem often focus on multipath or multichannel extensions to the existing ad‐hoc routing protocols. In this paper, we propose a novel solution by introducing an alternative path to the mesh backbone that traverses the mobile ad‐hoc networks part of the WMN. The new routing solution allows the mobile nodes (MNs) to establish direct communication among peers without going through the backbone. The proposed alternative ad‐hoc path is used only when the mesh backbone is severely constrained. We also propose, for the first time in WMNs, using MNs with two interfaces, one used in the mesh backbone communication and the other engaged in the ad‐hoc network. A scheme is presented for making the MN aware of link quality measures by providing throughput values to the ad‐hoc on‐demand distance vector protocol. We use piggybacking on route reply messages in ad‐hoc on‐demand distance vector to avoid incurring additional costs. We implemented our solution in an OPNET simulator and evaluated its performance under a variety of conditions. Simulation results show that the alternative ad‐hoc path provides higher throughput and lower delays. Delay analysis show that the throughput improvement does not impose additional costs. Copyright © 2012 John Wiley & Sons, Ltd.  相似文献   

19.
Secure routing in mobile wireless ad hoc networks   总被引:3,自引:0,他引:3  
We discuss several well known contemporary protocols aimed at securing routing in mobile wireless ad hoc networks. We analyze each of these protocols against requirements of ad hoc routing and in some cases identify fallibilities and make recommendations to overcome these problems so as to improve the overall efficacy of these protocols in securing ad hoc routing, without adding any significant computational or communication overhead.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号