首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
为了解决当前移动无线传感网数据传输中存在的同步寻址困难以及节点间功率交互难以均衡化的问题,提出了一种新的移动无线传感网数据传输算法。首先,采取广播机制实现同步控制分组传输,降低同步流量对寻址过程造成的压力;随后使用区域节点流量阀控制机制,且通过侦听方式记录并获取sink节点—区域节点链路间的数据流量,进一步采取流量—链路均衡方式促进流量均衡化;最后,通过基于轮数—sink 链路周期抖动筛选方式确认受限带宽,减少带宽受限导致的传输故障。仿真实验表明,与BLT-NB2R算法、NLSC算法和HT2C算法相比,所提出的算法可改善数据传输带宽,降低数据分组丢失频率,能够较好地满足实践需求。  相似文献   

2.
In order to better solve the contradiction between precision of localization and the number of anchor nodes in wireless sensor network,a mobile anchor node localization technology based on connectivity was proposed.First,the coverage characteristic of the network nodes was analyzed,and a critical value was found between the mobile step and the anchor node communication radius,mobile anchor nodes' coverage characteristic would change when near this critical value.Second,a mobile anchor node followed a planning path to form a positioning area seamless coverage was used.Finally,when there was no need for high-precision technology,node position would been estimated according with the connectivity of the network and the receiving information of the node.The simulation results show that the proposed algorithm can realize coarse-grained localization,and paths perform complete localization.  相似文献   

3.
Wireless ad hoc networks are growing important because of their mobility, versatility, and ability to work with fewer infrastructures. The mobile ad hoc network is an autonomous system consisting of mobile nodes connected with wireless links. Establishing a path between two nodes is a complex task in wireless networks. It is still more complex in the wireless mobile ad hoc network because every node is no longer as an end node and an intermediate node. In this paper, it focuses on design of connectionless routing protocol for the wireless ad hoc networks based on the mobile agent concept. The proposed model tries to discover the best path taking into consideration some concerns like bandwidth, reliability, and congestion of the link. The proposed model has been simulated and tested under various wireless ad hoc network environments with the help of a different number of nodes. The results demonstrate that the proposed model is more feasible for providing reliable paths between the source and destination with the minimum control message packets over the network. It has delivered more number of packets to the destination over the network. Copyright © 2012 John Wiley & Sons, Ltd.  相似文献   

4.
In wireless sensor networks, sensor nodes are usually fixed to their locations after deployment. However, an attacker who compromises a subset of the nodes does not need to abide by the same limitation. If the attacker moves his compromised nodes to multiple locations in the network, such as by employing simple robotic platforms or moving the nodes by hand, he can evade schemes that attempt to use location to find the source of attacks. In performing DDoS and false data injection attacks, he takes advantage of diversifying the attack paths with mobile malicious nodes to prevent network-level defenses. For attacks that disrupt or undermine network protocols like routing and clustering, moving the misbehaving nodes prevents them from being easily identified and blocked. Thus, mobile malicious node attacks are very dangerous and need to be detected as soon as possible to minimize the damage they can cause. In this paper, we are the first to identify the problem of mobile malicious node attacks, and we describe the limitations of various naive measures that might be used to stop them. To overcome these limitations, we propose a scheme for distributed detection of mobile malicious node attacks in static sensor networks. The key idea of this scheme is to apply sequential hypothesis testing to discover nodes that are silent for unusually many time periods—such nodes are likely to be moving—and block them from communicating. By performing all detection and blocking locally, we keep energy consumption overhead to a minimum and keep the cost of false positives low. Through analysis and simulation, we show that our proposed scheme achieves fast, effective, and robust mobile malicious node detection capability with reasonable overhead.  相似文献   

5.
In this paper, we consider the following problem in the wireless ad hoc network: Given a set of paths between source and destination, how to divide the data flow among the paths and how to control the transmission rates, times, and powers of the individual links in order to maximize the operation time of the worst network node. If all nodes are of equal importance, the operation time of the worst node is also the lifetime of the network. By solving the problem, our aim is to investigate how the network lifetime is affected by link conditions such as the maximum transmission power of a node and the peak data rate of a link. For the purpose, we start from a system model that incorporates the carrier to interference ratio (CIR) into a variable data rate of a link. With this, we can develop an iterative algorithm for the lifetime maximization, which resembles to the distributed power control in cellular systems. Numerical examples on the iterative algorithm are included to illustrate the network lifetime as a function of the maximum transmission power and the peak data rate.  相似文献   

6.
Without considering current residual resources of the medium, nodes in mobile ad hoc networks (MANETs) admit the data flow arbitrarily, and the quality of service (QoS) of the data flows deteriorates. To release the contending on the resources induced by the overloaded flows, the admission control mechanism can effectively keep the balance between injected data flows and network capacity, and it is viewed as the most important technology in MANET. A novel distributed residual resources aware admission control mechanism is proposed in this paper, where the residual resources and the service rate are studied thoroughly. Considering the medium utilization, frame retransmission and backoff procedure, the passive method is applied to predict the residual resources, and the binomial distribution is utilized to model the medium status; moreover, based on the cooperation between the source node and intermediate nodes, the path meeting the resource demand is probed across the network, and the flows are rejected while the residual resources cannot meet its demand. Results show that the network load can be constrained by our proposed admission control mechanism, and the QoS of the data flows can be guaranteed effectively.  相似文献   

7.
Efficient on-demand routing for mobile ad hoc wireless access networks   总被引:2,自引:0,他引:2  
In this paper, we consider a mobile ad hoc wireless access network in which mobile nodes can access the Internet via one or more stationary gateway nodes. Mobile nodes outside the transmission range of the gateway can continue to communicate with the gateway via their neighboring nodes over multihop paths. On-demand routing schemes are appealing because of their low routing overhead in bandwidth restricted mobile ad hoc networks, however, their routing control overhead increases exponentially with node density in a given geographic area. To control the overhead of on-demand routing without sacrificing performance, we present a novel extension of the ad hoc on-demand distance vector (AODV) routing protocol, called LB-AODV, which incorporates the concept of load-balancing (LB). Simulation results show that as traffic increases, our proposed LB-AODV routing protocol has a significantly higher packet delivery fraction, a lower end-to-end delay and a reduced routing overhead when compared with both AODV and gossip-based routing protocols.  相似文献   

8.
Mobile ad-hoc network has limited battery power. Power consumption control is the main issue in mobile ad-hoc network. Node battery power is a precious resource that should be used in order to avoid the early termination of nodes. Energy management model and power consumption control flow chart is proposed to control power consumption by reducing data transmit time in mobile ad-hoc network. Simulation model has been used to analysis the energy consumption of a node. This has been achieved by estimating the time spent in transmission of data by node. The proposed model has been simulated using OMNET \(++\) simulator. Simulation results show significant energy savings after applying the proposed model and flow chart.  相似文献   

9.
In order to address the multi-commodity flow problem for traffic scheduling in software-defined networking,a method based on segment routing was proposed.The proposed method pre-computed sets of candidate paths and attributes of these paths for all source-target nodes,and set the requirements of attributes of candidate paths that should be met combined with various demands and constraints of flows,then generated sets of candidate paths for flows.In the proposed scheme,multi-commodity flow model in software-defined networking was simplified based on sets of candidate paths for flows,the difficulty of solving was reduced,the centralized control by the controller and the autonomous control by nodes were supported,the scalability of controller was improved.In addition,how to meet the energy-saving needs of the network was proposed,i.e.,reducing the number of links that could participate in flow forwarding.The performance evaluation results indicate that the proposed method can meet various demands and constraints of flows,improve network performance,and reduce the computational load of solving the problem of traffic scheduling.  相似文献   

10.
胡钢  高浩  徐翔  许丽鹏 《电子学报》2000,48(12):2402-2408
复杂网络中节点重要性辨识对分析网络结构和功能具有重要作用.为了辨识节点重要性,分析节点自身和关联节点的作用,本文构建了一种基于重要度传输矩阵的节点重要性辨识模型.首先,基于关联节点与节点之间的最优路径长度、最优路径数目和信息传播率定义了节点间的传输能力.其次,依据度值和传输能力构建重要度传输矩阵,综合节点局部重要性和全局属性指标评价节点的重要性.最后,对"ARPA"网络和四个真实网络进行破坏性仿真分析,结果本文方法表明对网络造成更大的破坏,证明了该方法的有效性和可靠性.  相似文献   

11.
This paper proposes a backup path management method for time division multiple access (TDMA) based client wireless mesh networks (WMNs). In a TDMA based client WMN, as links/nodes fail or as nodes perform handover and as flows enter and leave the network, the paths between various nodes change as well as the bandwidth available along these paths. In these networks, to support the quality of service requirements of flows, backup paths with the required bandwidth need to be established dynamically. Some methods are proposed in the literature to establish backup paths which handle link/node failures and node handover in ad hoc networks, but none of these methods can provide backup paths with the required bandwidth dynamically. To address that issue, the present paper proposes a backup path management method which is adaptive to both topological changes and traffic changes in a network. Each node along the current path between a source and a destination finds backup paths with the required bandwidth in order to handle failure of the link to its downstream node and its own failure or handover. Nodes use two-hop neighborhood information and slots status information of two-hop neighbors to establish backup paths. We prove that the number of backup paths available when a node N searches for backup paths to handle its own failure are more than the number of backup paths available when some other node searches for the backup paths for the failure of node N. Performance of the proposed method is compared with the performance of a naive path management (NPM) method in which always the source establishes backup paths whenever a link/node fails or a node performs handover, and also with the performance of a backup path management method proposed in the literature. The proposed method significantly outperforms the NPM method and the method selected from the literature. For example, when the speed of the mobile nodes is 50 m/s, the packet delivery ratio with the proposed method is 63 % more than the NPM method and 35 % more than the method selected from the literature.  相似文献   

12.
Nodes in a mobile ad hoc network are often vulnerable to failures. The failures could be either due to fading effects, battery drainage, or as a result of compromised nodes that do not participate in network operations. Intermittent node failures can disrupt routing functionalities. As such, it is important to provide redundancy in terms of providing multiple node-disjoint paths from a source to a destination. In line with this objective, we first propose a modified version of the widely studied ad hoc on-demand distance vector routing protocol to facilitate the discovery of multiple node-disjoint paths from a source to a destination. We find that very few of such paths can be found. Furthermore, as distances between sources and destinations increase, bottlenecks inevitably occur and thus, the possibility of finding multiple paths is considerably reduced. We conclude that it is necessary to place what we call reliable nodes (in terms of both being robust to failure and being secure) in the network to support efficient routing operations. We propose a deployment strategy that determines the positions and the trajectories of these reliable nodes such that we can achieve a framework for reliably routing information. We define a notion of a reliable path which is made up of multiple segments, each of which either entirely consists of reliable nodes, or contains a preset number of multiple paths between the end points of the segment. We show that the probability of establishing a reliable path between a random source and destination pair increases tremendously even with a small number of reliable nodes when we use our algorithm to appropriately position these reliable nodes.  相似文献   

13.

A mobile ad hoc network (MANET) is a collection of wireless mobile nodes that can communicate without a central controller or fixed infrastructure. Due to node mobility, designing a routing protocol to provide an efficient and suitable method to route the data with less energy consumption, packet drop and to prolong the network lifetime has become a challenging issue in MANETs. In MANETs, reducing energy consumption and packet loss involves congestion control and load balancing techniques. Thus, this paper introduces an efficient routing technique called the multipath load balancing technique for congestion control (MLBCC) in MANETs to efficiently balance the load among multiple paths by reducing the congestion. MLBCC introduces a congestion control mechanism and a load balancing mechanism during the data transmission process. The congestion control mechanism detects the congestion by using an arrival rate and an outgoing rate at a particular time interval T. The load balancing mechanism selects a gateway node by using the link cost and the path cost to efficiently distribute the load by selecting the most desirable paths. For an efficient flow of distribution, a node availability degree standard deviation parameter is introduced. Simulation results of MLBCC show the performance improvements in terms of the control overhead, packet delivery ratio, average delay and packet drop ratio in comparison with Fibonacci sequence multipath load balancing, stable backbone-based multipath routing protocol and ad hoc on demand multipath distance vector routing. In addition, the results show that MLBCC efficiently balances the load of the nodes in the network.

  相似文献   

14.
如今移动传感器网络在各个领域已起到重要作用。目前,移动传感器网络在军事、民用、科研等领域的应用价值都很高。而数据收集问题一直是这方面科研中必须被突破的难题。组移动模型是移动传感网络中的一个重要的移动模型,在本领域内都起到重要作用,然而有关移动传感器网络组模型的数据收集算法却屈指可数。提出了一种组移动模型中基于模型特点的数据收集分簇算法——MCBC算法。该算法根据节点的速度和角度之间的关系确定两节点是否同组,再从中选择簇头,有效地利用了组移动模型中节点的移动特征。仿真结果表明,在组移动模型中,该算法能取得较好的性能。  相似文献   

15.
The characteristics of TCP and UDP lead to different network transmission behaviours. TCP is responsive to network congestion whereas UDP is not. This paper proposes two mechanisms that operate at the source node to regulate TCP and UDP flows and provide a differential service for them. One is the congestion‐control mechanism, which uses congestion signal detected by TCP flows to regulate the flows at the source node. Another is the time‐slot mechanism, which assigns different number of time slots to flows to control their flow transmission. Based on the priority of each flow, different bandwidth proportions are allocated for each flow and differential services are provided. Simulation results show some insights of these two mechanisms. Moreover, we summarize the factors that may impact the performance of these two mechanisms. Copyright © 2001 John Wiley & Sons, Ltd.  相似文献   

16.
A random access protocol with multi-packet reception (MPR) capability for infrastructure-less wireless autonomic networks is introduced and analyzed. In these networks mobile nodes may communicate with each other directly without a central entity (base station), where each mobile node either will be in a transmitting mode or in a receiving mode or in an idle mode. The throughput per node and the packet retransmission probability depend exclusively on the MPR capability and the ratio of the transmission probability and the receiving probability of each mobile node. For a given ratio of the transmission probability and the receiving probability of each mobile node, throughput-delay performance increases with the increase of MPR capability. In the proposed infrastructure-less networks, mobile nodes can control the network traffic very precisely by controlling the three parameters. These three parameters are transmission probability, receiving probability and idle mode probability of each mobile node. Since each mobile node can control the network traffic very precisely to obtain the maximum throughput, the network is autonomic, i.e., self-optimizing. The optimum transmission probability of each mobile node to obtain the maximum throughput is evaluated. The throughput utility increases with the increase of MPR capability. On the other hand, the cost per mobile node also increases with the increase of MPR capability. Therefore the MPR capability should be optimized to provide reasonable trade-off between the throughput per node and the cost per mobile node. The results of this study may be used for a system design of an infrastructure-less contention-based multiple access schemes with MPR capability.  相似文献   

17.
目前,大多数的拓扑控制算法采用的能耗模型不符合实际,仅仅只考虑了发送能耗,忽略了不同接收能耗对底层拓扑结构的影响。其次,通过构建最小能耗拓扑子图的拓扑控制算法并不能最大化网络生存期。基于真实的能耗模型主要研究异构传感器网络的拓扑控制问题,提出了一种适用于异构传感器网络生存期可延长的可调节结构(ALPH)来控制网络拓扑。理论和仿真实验表明:通过ALPH构造的拓扑图保持了网络的连通性和双向性;在不同的射频模块下,ALPH以最小能耗保留了任意节点对之间的最大生存期路径;ALPH可以依据不同电路能耗参数P R0进行调整,使得所生成的拓扑图在DRNG与MaxPower之间调节变化,并且允许节点有不同的路径损耗指数;基于网络设备的真实参数值,与先前的拓扑结构DRNG、DGG、EYG和MaxPower相比,ALPH可以有效地延长网络生存期。  相似文献   

18.

In Wireless Sensor Network (WSN), securable data transmission is one of the most challenges. During the transmission between the source and a destination node, routing information of the particular path may be misbehaved by the particular nodes which are known as wormhole nodes/attackers. The paths which include the wormhole nodes are known as wormhole attacked paths. For improving security in WSN, these wormhole attacked paths should be identified. To achieve this, wormhole attack detection method and optimal or secure path selection are presented in this paper. Initially, ‘K’ paths or multiple paths are generated between source and destination using Ad-hoc On demand Multipath Distance Vector (AOMDV) routing protocol. Then, the source node identifies the wormhole attacked path by verifying the Detection Packet (DP) and Feedback Packet (FP) from the destination. After detecting the wormhole attacked paths, the source node selects the optimal path among the attacker free paths using Particle Swarm Optimization (PSO) algorithm. Simulation results show that the performance of the proposed approach improves energy efficiency and network lifetime of the network.

  相似文献   

19.
Robust position-based routing for wireless ad hoc networks   总被引:1,自引:0,他引:1  
We consider a wireless ad hoc network composed of a set of wireless nodes distributed in a two dimensional plane. Several routing protocols based on the positions of the mobile hosts have been proposed in the literature. A typical assumption in these protocols is that all wireless nodes have uniform transmission regions modeled by unit disk centered at each wireless node. However, all these protocols are likely to fail if the transmission ranges of the mobile hosts vary due to natural or man-made obstacles or weather conditions. These protocols may fail because either some connections that are used by routing protocols do not exist, which effectively results in disconnecting the network, or the use of some connections causes livelocks. In this paper, we describe a robust routing protocol that tolerates up to roughly 40% of variation in the transmission ranges of the mobile hosts. More precisely, our protocol guarantees message delivery in a connected ad hoc network whenever the ratio of the maximum transmission range to the minimum transmission range is at most .  相似文献   

20.
为了有效地解决偏远地理区域通信网络存在的网络拥塞严重、数据成功传输率低、数据冗余率高以及网络整体性能不佳等问题,通过考虑网络节点运动区域性特点,基于蚁群优化机制,设计出一种新型的容延容断网络 (DTN) 拥塞控制路由优化算法。该算法结合蚁群优化机制中的信息素因子,在同一对源、目的网络节点之间进行多次数据信息传输操作。在数据信息传输方向上,获取各个网络节点的中转跳数平均值,评估各个网络节点的中转价值;参考蚁群优化机制中的启发值因子,将网络节点的中转价值与剩余存储容量相关联,构成网络节点作为中转节点的评定参数,选取评定参数最大的网络节点完成其中转任务。实验表明:该算法有效控制了网络拥塞,提高了数据成功传输率,降低了数据信息冗余率,使网络整体性能得到进一步优化。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号