首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 140 毫秒
1.
随着移动Ad Hoc网络的应用日趋广泛,如何有效节省移动节点的能量,提高网络生存时间成为了难题.针对现有的节能协议和机制很少考虑链路误码率的问题,分析了在端到端重传机制和逐跳重传机制下的理想能耗,定义了新的链路代价函数.仿真结果表明使用该机制的路由协议具有较好性能,在数据传输可靠性和能耗之间达到有效的平衡.  相似文献   

2.
移动Ad Hoc网络(MANET)是由移动节点组成的一个多跳的临时自治性网络,没有预先部署的网络基础设施,主要应用于需要临时、快速组网的场合.在Ad Hoc网络中,节点的随机移动性给网络协议的化设计带来了一定挑战.Ad Hoc网络的吞吐量很大程度上取决于路由协议算法.由于Ad Hoc网络的特殊性,其路由协议的设计与传统的具有固定基础设施的网络有很大不同.首先介绍了Ad hoc网络的特点,重点分析了几种常用的Ad Hoc网络路由协议,并对一些典型的路由协议进行了性能比较,最后得出结论.  相似文献   

3.
连通度是Ad Hoc网络的根本属性.保持网络的连通性对于提高网络的吞吐量至关重要.目前的研究主要以概率论方法为理论基础,讨论节点的发射半径在什么范围内,保持Ad Hoc网络的k连通.文中对Ad Hoc网络连通度目前的研究进展进行了综述,在引入能量模型的基础上,对Ad Hoc网络的连通度进行了仿真,并基于仿真结果,提出了Ad Hoc网络保持连通的临界传输范围,最后对将来的研究方向进行了展望.  相似文献   

4.
Ad Hoc网络是一种自创造、自组织和自管理的网络,开发良好的路由协议是建立Ad Hoc网络的首要问题.AODV协议是Ad Hoc网络中最具代表性的按需路由协议之一.文中详细分析了AODV的局部修复机制,并在此基础上,讨论了两种典型的改进思想.提出了一种优化算法OPTAORTI,该算法通过对局部修复机制的改进在保证相对少的增加路由开销的同时降低路由延迟.模拟结果表明该算法的路由延迟低于原协议及两个改进算法.  相似文献   

5.
基于能量约束的Ad Hoc网络路由协议仿真与评价   总被引:1,自引:1,他引:0  
基于节点能量的约束,以能量消耗程度、节点终止情况和连通性为指标,Ad Hoc网络4种典型的路由协议在不同的运动场景下进行了比较系统的仿真研究,得出了与相关文献不尽一致的结论.基于仿真结果,认为基于能耗研究Ad Hoc网络路由协议应以节点能耗的平衡性来考虑问题,而不仅仅只以能耗量的多少来衡量协议性能的优劣。  相似文献   

6.
作为移动Ad Hoc网络具体应用之一的车载Ad Hoc网络具有许多自身特征,如车辆节点处于十字路口时存在许多等待绿灯的静止节点以及通行速度相对缓慢的通行节点。在考虑了上述特征之后,提出了一种适用于车载Ad Hoc网络的新的位置服务设计方案,该设计方案将位置服务与基于位置的路由协议如无状态路由协议GPSR进行融合。在城市场景下的仿真结果表明:通过与GLS和HLS相比,ILSV获得相当高的查询成功率并具有较优的可缩放性。  相似文献   

7.
Ad hoc网络中基于组播路由协议MAODV的改进   总被引:1,自引:0,他引:1  
Ad hoc网络是由一组带有无线收发装置的移动终端组成的一个多跳的临时性自治系统.MAODV协议是MANET环境下的一种按需组播路由协议.提出了一种基于链路失效预测机制的MAODV协议的改进协议.采用该协议,时延略有增加,但分组投递率极大提高了,在整体上提高了网络的性能.通过仿真实验验证了协议的改进效果.  相似文献   

8.
移动Ad Hoc网络中AODV路由协议的改进及仿真   总被引:1,自引:1,他引:1  
对现有AODV的协议进行改进,使其满足一定的延时约束,并对延时进行预测,建立延时参考模型,给出了正确性验证及复杂性分析,并在NS2平台下对该改进后的协议进行了仿真实验和分析.仿真结果表明,改进的AODV路由协议有效地增加了Ad Hoc网络的吞吐率,降低了延时,从而有效地提高了网络性能,并对下一步改进工作也作简单介绍.  相似文献   

9.
Ad Hoc网络基于蚁群的按需路由算法研究   总被引:2,自引:0,他引:2  
目前已有一些研究将蚁群优化算法应用于Ad Hoc网络,文中在分析已有成果的基础上提出了一种新的按需路由算法,该算法综合了蚁群优化和AODV及DSR协议的思想,在源和目的之间建立起多路径路由,有效地提高了网络传输性能.模拟结果显示,该算法能较好地适应MANET动态变化的拓扑环境,在性能上优于一些相关的算法.  相似文献   

10.
基于可写入RFID技术和移动Ad Hoc网络的交通信息系统,利用可写入RFID技术对车辆和道路进行全面的数据采集,并通过移动Ad Hoc网络与交通控制中心进行信息交换。在对信息进行分析处理后,交通控制中心发送控制信息经移动Ad Hoc网络对交通控制设备和车辆进行实时管理,实现对交通的智能化控制。  相似文献   

11.
IntroductionWireless ad hoc networks are gaining increas-ing popularity in recent years because of their easeof deployment. No wired base station or infras-tructure is supported,and each hostcommunicatesone anothervia packetradios. In ad hoc networks,routing protocols are challenged with establishingand maintaining multihop routes in the face of mo-bility,bandwidth limitation and power con-straints. In ad hoc networks,each node( host)acts as a router since routes are mostly multihop.Nodes in …  相似文献   

12.
移动Ad Hoe网络是由一组无线移动主机组成的一个没有任何基础设施或集中管理设备的临时网络.针对网络拓扑易变以及带宽、能源有限等移动Ad Hoe网络的主要特点.在介绍一种能量消耗模型的基础上,提出了一种路由算法,由于该算法是一个NP完全同题,因此给出了一个解决该问题的近似算法,在经典的路由协议AODV基础上进行了仿真实验.实验结果表明新的协议EA-AODV在总能量消耗和网络生存时间方面表现出了很好的性能.  相似文献   

13.
移动Ad Hoc网络的自身特点,使它比有线网络更容易遭受攻击。文章首先分析了威胁移动Ad Hoc网络安全的典型攻击,主要讨论了移动Ad Hoc网络的安全路由技术和入侵检测技术两种安全技术,对一些典型安全方案进行了论述与比较。  相似文献   

14.
The deep understanding on sand and sand dunes scale can be useful to reveal the formation mechanism of the sandstorm for early sandstorm forecast. The current sandstorm observation methods are mainly based on conventional meteorological station and satellites remote sensing, which are difficult to acquire sand scale information. A wireless sensing network is implemented in the hinterland of desert, which includes ad hoc network, sensor, global positioning system (GPS) and system integration technology. The wireless network is a three-layer architecture and daisy chain topology network, which consists of control station, master robots and slave robots. Every three robots including one master robot and its two slave robots forms an ad hoc network. Master robots directly communicate with radio base station. Information will be sent to remote information center. Data sensing system including different kinds of sensors and desert robots is developed. A desert robot is designed and implemented as unmanned probing movable nodes and sensors’ carrier. A new optical fiber sensor is exploited to measure vibration of sand in particular. The whole system, which is delivered to the testing field in hinterland of desert (25 km far from base station), has been proved efficient for data acquisition.  相似文献   

15.
The deep understanding on sand and sand dunes scale can be useful to reveal the formation mechanism of the sandstorm for early sandstorm forecast. The current sandstorm observation methods are mainly based on conventional meteorological station and satellites remote sensing, which are difficult to acquire sand scale information. A wireless sensing network is implemented in the hinterland of desert, which includes ad hoc network,sensor, global positioning system(GPS) and system integration technology. The wireless network is a three-layer architecture and daisy chain topology network, which consists of control station, master robots and slave robots.Every three robots including one master robot and its two slave robots forms an ad hoc network. Master robots directly communicate with radio base station. Information will be sent to remote information center. Data sensing system including different kinds of sensors and desert robots is developed. A desert robot is designed and implemented as unmanned probing movable nodes and sensors' carrier. A new optical fiber sensor is exploited to measure vibration of sand in particular. The whole system, which is delivered to the testing field in hinterland of desert(25 km far from base station), has been proved efficient for data acquisition.  相似文献   

16.
Introduction Mobileadhocnetwork(MANET)isaself-organizing,multi-hopwirelessnetwork.Commu-nicationsinadhocnetworkdonotrequireexis-tenceofacentralbasestationorafixednetwork infrastructure.Self-organizingandinfrastruc-turelessnessmakeadhocnetworkeasytobeap-pliedtothoseemergencyenvironmentswherethere isnotbasestationsoraccesspoints.However,on theotherhand,theyalsoopenthenetworktovari-oussecurityattacks.Amongthoseattacksthat havebeendiscoveredsofarinMANET,worm-hole[1]isoneofthemostseriousattack…  相似文献   

17.
In an ad hoc network, it is usually difficult to optimize the assignment of network routing resources using a single type of routing protocol due to the differences in network scale, node moving mode and node distribution. Therefore, it is desirable to have nodes run multiple routing protocols simultaneously so that more than one protocols can be chosen to work jointly. For this purpose,a multiple routing platform for Ad hoc networks is proposed on a higher level of current routing protocols. In order to ensure the security of the platform, a security mechanism and its formal analysis by BAN logic is given. The simulation results of the network performance demonstrate that the proposed multi-routing platform is practicable in some complex applications.  相似文献   

18.
Introduction Mobile ad hoc networks (MANETs) are newinfrastructureless networks without the usual rout-ing infrastructure like fixed routers and routingbackbones. A mobile ad hoc network is a multi-hop temporary self-organizing system compromisedof a group of mobile nodes with radios. MANETshave some special characteristics: self organizing,dynamic topology, limited bandwidth, resourceconstraint nodes, multi-hop routing, vulnerable tosecurity attacks etc. Recently, MANET has beenone of t…  相似文献   

19.
This paper describes two identity-based broadcast encryption(IBBE) schemes for mobile ad hoc networks.The first scheme proposed achieves sub-linear size cipertexts and the second scheme achieves O(1)-size ciphertexts.Furthermore, when the public keys are transmitted, the two schemes have short transmissions and achieve O(1) user storage cost, which are important for a mobile ad hoc network.Finally, the proposed schemes are provable security under the decision generalized bilinear Di?-Hellman(GBDH) assumption in the random oracles model.  相似文献   

20.
Mobile ad hoc networks are often deployed in environments where the nodes of the networks are unattended and have little or no physical protection against tampering. The nodes of mobile ad hoc networks are thus susceptible to compromise. The networks are particularly vulnerable to denial of service (DoS) attacks launched through compromised nodes or intruders. In this paper, we investigated the effects of flooding attacks in network simulation 2 (NS-2) and measured the packet delivery ratio and packet delay under different flooding frequencies and different numbers of attack nodes. Simulation results show that with the increase the flooding frequencies and the numbers of attack nodes, network performance drops. But when the frequency of flooding attacks is greater than a value, the performance decrease gets smooth. Meanwhile the packet delay firstly increases and then declines to a value of stability at the end.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号