期刊文献+
共找到350篇文章
< 1 2 18 >
每页显示 20 50 100
Real-Time Prediction of Urban Traffic Problems Based on Artificial Intelligence-Enhanced Mobile Ad Hoc Networks(MANETS)
1
作者 Ahmed Alhussen Arshiya S.Ansari 《Computers, Materials & Continua》 SCIE EI 2024年第5期1903-1923,共21页
Traffic in today’s cities is a serious problem that increases travel times,negatively affects the environment,and drains financial resources.This study presents an Artificial Intelligence(AI)augmentedMobile Ad Hoc Ne... Traffic in today’s cities is a serious problem that increases travel times,negatively affects the environment,and drains financial resources.This study presents an Artificial Intelligence(AI)augmentedMobile Ad Hoc Networks(MANETs)based real-time prediction paradigm for urban traffic challenges.MANETs are wireless networks that are based on mobile devices and may self-organize.The distributed nature of MANETs and the power of AI approaches are leveraged in this framework to provide reliable and timely traffic congestion forecasts.This study suggests a unique Chaotic Spatial Fuzzy Polynomial Neural Network(CSFPNN)technique to assess real-time data acquired from various sources within theMANETs.The framework uses the proposed approach to learn from the data and create predictionmodels to detect possible traffic problems and their severity in real time.Real-time traffic prediction allows for proactive actions like resource allocation,dynamic route advice,and traffic signal optimization to reduce congestion.The framework supports effective decision-making,decreases travel time,lowers fuel use,and enhances overall urban mobility by giving timely information to pedestrians,drivers,and urban planners.Extensive simulations and real-world datasets are used to test the proposed framework’s prediction accuracy,responsiveness,and scalability.Experimental results show that the suggested framework successfully anticipates urban traffic issues in real-time,enables proactive traffic management,and aids in creating smarter,more sustainable cities. 展开更多
关键词 mobile adhocnetworks(manet) urban traffic prediction artificial intelligence(AI) traffic congestion chaotic spatial fuzzy polynomial neural network(CSFPNN)
在线阅读 下载PDF
Multi-agent cooperative intrusion response in mobile adhoc networks 被引量:6
2
作者 Yi Ping Zou Futai +1 位作者 Jiang Xinghao Li Jianhua 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2007年第4期785-794,共10页
The nature of adhoc networks makes them vulnerable to security attacks. Many security technologies such as intrusion prevention and intrusion detection are passive in response to intrusions in that their countermea- s... The nature of adhoc networks makes them vulnerable to security attacks. Many security technologies such as intrusion prevention and intrusion detection are passive in response to intrusions in that their countermea- sures are only to protect the networks, and there is no automated network-wide counteraction against detected intrusions, the architecture of cooperation intrusion response based multi-agent is propose. The architecture is composed of mobile agents. Monitor agent resides on every node and monitors its neighbor nodes. Decision agent collects information from monitor nodes and detects an intrusion by security policies. When an intruder is found in the architecture, the block agents will get to the neighbor nodes of the intruder and form the mobile firewall to isolate the intruder. In the end, we evaluate it by simulation. 展开更多
关键词 computer networks SECURITY mobile agent mobile adhoc networks intrusion detection intrusion response
在线阅读 下载PDF
Anonymous multipath routing protocol based on secret sharing in mobile ad hoc networks 被引量:2
3
作者 Siguang Chen Meng Wu 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2011年第3期519-527,共9页
Because the intrinsic characteristics of mobile ad hoc networks(MANETs) cause several vulnerabilities,anonymous routing protocols attract much more attention in secure mobile ad hoc networks for the purposes of secu... Because the intrinsic characteristics of mobile ad hoc networks(MANETs) cause several vulnerabilities,anonymous routing protocols attract much more attention in secure mobile ad hoc networks for the purposes of security and privacy concerns.Until recently,lots of anonymous routing protocols have been proposed.However,most of them are single path or use one path at a time,and the multipath schemes can not thwart both the passive attacks and active attacks simultaneously.Thus an anonymous multipath routing protocol based on secret sharing is proposed.The protocol provides identity anonymity,location anonymity,data and traffic anonymity by employing cryptograph technology and secret sharing in MANET communication process.Meanwhile,a hash function is introduced to detect active attacks in the data transmission process.The protocol can effectively thwart various passive attacks and reduce the successful probability of active attacks(such as interception and physical destroy attacks).Simulation results show that the proposed scheme provides a reasonably good level of network security and performance. 展开更多
关键词 multipath routing secret sharing CRYPTOGRAPHY ANONYMITY SECURITY mobile ad hoc network(manet).
在线阅读 下载PDF
Survivability modeling and analysis on 3D mobile ad-hoc networks 被引量:2
4
作者 彭三城 王国军 +1 位作者 胡忠望 陈建平 《Journal of Central South University》 SCIE EI CAS 2011年第4期1144-1152,共9页
Most existing work on survivability in mobile ad-hoc networks(MANETs) focuses on two dimensional(2D) networks.However,many real applications run in three dimensional(3D) networks,e.g.,climate and ocean monitoring,and ... Most existing work on survivability in mobile ad-hoc networks(MANETs) focuses on two dimensional(2D) networks.However,many real applications run in three dimensional(3D) networks,e.g.,climate and ocean monitoring,and air defense systems.The impact on network survivability due to node behaviors was presented,and a quantitative analysis method on survivability was developed in 3D MANETs by modeling node behaviors and analyzing 3D network connectivity.Node behaviors were modeled by using a semi-Markov process.The node minimum degree of 3D MANETs was discussed.An effective approach to derive the survivability of k-connected networks was proposed through analyzing the connectivity of 3D MANETs caused by node misbehaviors,based on the model of node isolation.The quantitative analysis of node misbehaviors on the survivability in 3D MANETs is obtained through mathematical description,and the effectiveness and rationality of the proposed approach are verified through numerical analysis.The analytical results show that the effect from black and gray attack on network survivability is much severer than other misbehaviors. 展开更多
关键词 mobile ad-hoc networks manets) SURVIVABILITY node behaviors semi-Markov process network connectivity
在线阅读 下载PDF
Analytical Comparison of Resource Search Algorithms in Non-DHT Mobile Peer-to-Peer Networks 被引量:1
5
作者 Ajay Arunachalam Vinayakumar Ravi +2 位作者 Moez Krichen Roobaea Alroobaea Jehad Saad Alqurni 《Computers, Materials & Continua》 SCIE EI 2021年第7期983-1001,共19页
One of the key challenges in ad-hoc networks is the resource discovery problem.How efciently&quickly the queried resource/object can be resolved in such a highly dynamic self-evolving network is the underlying que... One of the key challenges in ad-hoc networks is the resource discovery problem.How efciently&quickly the queried resource/object can be resolved in such a highly dynamic self-evolving network is the underlying question?Broadcasting is a basic technique in the Mobile Ad-hoc Networks(MANETs),and it refers to sending a packet from one node to every other node within the transmission range.Flooding is a type of broadcast where the received packet is retransmitted once by every node.The naive ooding technique oods the network with query messages,while the random walk scheme operates by contacting subsets of each node’s neighbors at every step,thereby restricting the search space.Many earlier works have mainly focused on the simulation-based analysis of ooding technique,and its variants,in a wired network scenario.Although,there have been some empirical studies in peer-to-peer(P2P)networks,the analytical results are still lacking,especially in the context of mobile P2P networks.In this article,we mathematically model different widely used existing search techniques,and compare with the proposed improved random walk method,a simple lightweight approach suitable for the non-DHT architecture.We provide analytical expressions to measure the performance of the different ooding-based search techniques,and our proposed technique.We analytically derive 3 relevant key performance measures,i.e.,the avg.number of steps needed to nd a resource,the probability of locating a resource,and the avg.number of messages generated during the entire search process. 展开更多
关键词 Mathematical model manet P2P networks P2P manet UNSTRUCTURED search algorithms Peer-to-Peer AD-HOC ooding random walk resource discovery content discovery mobile peer-to-peer broadcast PEER
在线阅读 下载PDF
Signcryption-Based Key Management for MANETs Applications in Mobile Commerce
6
作者 LI Jingfeng ZHU Yuefei ZHANG Yajuan PAN Heng 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1621-1624,共4页
Mobile commerce uses wireless device and wireless link to result in the transfer of values in exchange of information, services or goods. Wireless mobile ad hoc networks (MANETs) will bring a revolution to the busin... Mobile commerce uses wireless device and wireless link to result in the transfer of values in exchange of information, services or goods. Wireless mobile ad hoc networks (MANETs) will bring a revolution to the business model of mobile commerce if such networks are used as the underlying network technology for mobile commerce. Mobile commerce will remain in a niche market until the security issue is properly addressed. Hence, security is also very important for MANET applications in mobile commerce. Robust key management is one of the most crucial technologies for security of MANETs. In this paper, a new solution for key management is proposed using identity-based (ID-based) signcryption and threshold secret sharing. It enables flexible and efficient key management while respecting the constraints of MANETs. In our solution, each mobile host uses its globally unique identity as its public key. It greatly decreases the computation and storage costs of mobile hosts, as well as communication cost for system key management. 展开更多
关键词 manets mobile ad hoe networks SIGNCRYPTION threshold eryptography mobile commerce
在线阅读 下载PDF
A Novel Multi-Level Trust Algorithm for Mobile Ad Hoc Networks
7
作者 YU Genjian ZHENG Baoyu 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1789-1792,共4页
Firstly, a multilevel trust algorithm for MANET (mobile ad hoe networks) is presented in this paper and the trust level is defined as a three-tuple type in this multilevel trust algorithm. The paper introduces the m... Firstly, a multilevel trust algorithm for MANET (mobile ad hoe networks) is presented in this paper and the trust level is defined as a three-tuple type in this multilevel trust algorithm. The paper introduces the multilevel trust into MANET, thereby controlling restricted classified information flows among nodes that have different trust levels. Secondly, the infrastructure of MANET that suit to our multi-level trust is presented, Some conclusions are given at lastly. 展开更多
关键词 manetmobile ad hoe networks MULTILEVEL trust algorithm
在线阅读 下载PDF
Recovery from Wormhole Attack in Mobile Ad Hoc Network (MANET)
8
作者 季晓君 田畅 张毓森 《Journal of Shanghai Jiaotong university(Science)》 EI 2006年第2期188-191,196,共5页
Wormhole attack is a serious threat against MANET (mobile ad hoc network) and its routing protocols. A new approach—tunnel key node identification (TKNI) was proposed. Based on tunnel-key-node identification and prio... Wormhole attack is a serious threat against MANET (mobile ad hoc network) and its routing protocols. A new approach—tunnel key node identification (TKNI) was proposed. Based on tunnel-key-node identification and priority-based route discovery, TKNI can rapidly rebuild the communications that have been blocked by wormhole attack. Compared to previous approaches, the proposed approach aims at both static and dynamic topology environment, involves addressing visible and invisible wormhole attack modes, requires no extra hardware, has a low overhead, and can be easily applied to MANET. 展开更多
关键词 mobile ad hoc network manet SECURITY wormhole attack RECOVERY
在线阅读 下载PDF
Security: A Core Issue in Mobile <i>Ad hoc</i>Networks
9
作者 Asif Shabbir Fayyaz Khalid +2 位作者 Syed Muqsit Shaheed Jalil Abbas M. Zia-Ul-Haq 《Journal of Computer and Communications》 2015年第12期41-66,共26页
Computation is spanning from PC to Mobile devices. The Mobile Ad hoc Networks (MANETs) are optimal choice to accommodate this growing trend but there is a problem, security is the core issue. MANETs rely on wireless l... Computation is spanning from PC to Mobile devices. The Mobile Ad hoc Networks (MANETs) are optimal choice to accommodate this growing trend but there is a problem, security is the core issue. MANETs rely on wireless links for communication. Wireless networks are considered more exposed to security attacks as compared to wired networks, especially;MANETs are the soft target due to vulnerable in nature. Lack of infrastructure, open peer to peer connectivity, shared wireless medium, dynamic topology and scalability are the key characteristics of MANETs which make them ideal for security attacks. In this paper, we shall discuss in detail, what does security mean, why MANETs are more susceptible to security attacks than wired networks, taxonomy of network attacks and layer wise analysis of network attacks. Finally, we shall propose solutions to meet the security challenges, according to our framed security criteria. 展开更多
关键词 mobile Devices Optimal Choice manet SECURITY WIRELESS NETWORK Taxonomy Intrusion Detection NETWORK SECURITY Threats Layer Wise NETWORK Vulnerabilities of WIRELESS SECURITY Criteria
在线阅读 下载PDF
A LOOP-BASED APPROACH IN CLUSTERING AND ROUTING IN MOBILE AD HOC NETWORKS
10
作者 Li Yanping Wang Xin +1 位作者 Xue Xiangyang C. K. Toh 《Journal of Electronics(China)》 2006年第5期650-655,共6页
Although clustering is a convenient framework to enable traffic control and service support in Mobile Ad hoc NETworks (MANETs), it is seldom adopted in practice due to the additional traffic overhead it leads to for... Although clustering is a convenient framework to enable traffic control and service support in Mobile Ad hoc NETworks (MANETs), it is seldom adopted in practice due to the additional traffic overhead it leads to for the resource limited ad hoc network. In order to address this problem, we proposed a loop-based approach to combine clustering and routing. By employing loop topologies, topology information is disseminated with a loop instead of a single node, which provides better robustness, and the nature of a loop that there are two paths between each pair of nodes within a loop composed of setup procedure, regular procedure and emergent route recovering. suggests smart route recovery strategy. Our approach is recovery procedure to achieve clustering, routing and 展开更多
关键词 mobile Ad hoc NETwork manet CLUSTERING ROUTING Loop-based
在线阅读 下载PDF
面向港口堆场MANET的便携高精度信道测量与建模
11
作者 梁家耀 张广驰 +3 位作者 水宜水 崔苗 李芳 熊富 《广东工业大学学报》 CAS 2024年第6期115-124,共10页
移动自组织网络(Mobile Ad-hoc Network, MANET)依赖小型通信节点间的信道信息,然而传统的大型信道测量设备难以搭建于MANET小型节点上,同时港口堆场节点间的无线信道呈现较强的时空变化特性,因此在该场景下进行信道测量与建模存在设备... 移动自组织网络(Mobile Ad-hoc Network, MANET)依赖小型通信节点间的信道信息,然而传统的大型信道测量设备难以搭建于MANET小型节点上,同时港口堆场节点间的无线信道呈现较强的时空变化特性,因此在该场景下进行信道测量与建模存在设备便携性与信道模型精确性的双重挑战。针对面向MANET的测量设备小型化问题,本文研究基于通用软件无线电外设(Universal Software Radio Peripheral,USRP)的便携高精度信道测量方法,测量分析港口堆场内金属结构体对大尺度、小尺度参数的影响;针对场景复杂度高导致射线追踪信道模型精确性不足的问题,创新地提出基于信道测量数据的最优参数搜索方法,通过识别影响射线追踪精度的关键仿真参数并搜索最优值,对信道模型进行迭代校准。结果表明本文提出的建模方法在堆场MANET场景下,由金属结构体引起的多径效应导致平均功率时延谱在多个区间内出现明显聚集现象,适合采用双斜率模型对路径损耗进行拟合。本文提出的最优参数搜索方法显著提高路径损耗和均方根时延扩展仿真值与测量值的吻合度,提升了信道模型的准确性和普适性。 展开更多
关键词 信道测量 信道建模 多径信道 通用软件无线电外设 射线追踪 移动自组织网络
在线阅读 下载PDF
MANET中TCP改进研究综述 被引量:34
12
作者 冯彦君 孙利民 +1 位作者 钱华林 宋成 《软件学报》 EI CSCD 北大核心 2005年第3期434-444,共11页
传统TCP(transmission control protocol)本是为有线网络设计,它假设包丢失全是由网络拥塞引起,这个假设不能适应于MANET (mobile ad hoc network),因为MANET 中除了拥塞丢包以外,还存在由于较高比特误码率、路由故障等因素引起的丢包现... 传统TCP(transmission control protocol)本是为有线网络设计,它假设包丢失全是由网络拥塞引起,这个假设不能适应于MANET (mobile ad hoc network),因为MANET 中除了拥塞丢包以外,还存在由于较高比特误码率、路由故障等因素引起的丢包现象.当出现非拥塞因素丢包时,传统 TCP 将错误地触发拥塞控制,从而引起TCP 性能低下.任何改进机制都可以分为发现问题和解决问题两个阶段.首先概括了 MANET 中影响 TCP 性能的若干问题;然后针对发现问题和解决问题两个阶段,详细地对每一阶段中存在的各种可行方法进行了分类、分析和比较;最后指出了 MANET 中 TCP 性能优化的研究方向. 展开更多
关键词 manet(mobile AD HOC network) TCP(transmission control protocol) 性能 包丢失
在线阅读 下载PDF
MANET节点移动模型仿真研究 被引量:12
13
作者 石丛军 任清华 +1 位作者 郑博 刘芸江 《计算机工程》 CAS CSCD 北大核心 2009年第14期101-103,共3页
移动自组网(MANET)节点移动特性对网络拓扑结构有重要影响,在合理的节点移动模型下对网络性能的评估才真实可靠。通过对网络仿真软件NS2进行拓展,实现个体、群体和具有地域限制的节点移动模型,提出物理链路和路由协议2个层面的评估准则... 移动自组网(MANET)节点移动特性对网络拓扑结构有重要影响,在合理的节点移动模型下对网络性能的评估才真实可靠。通过对网络仿真软件NS2进行拓展,实现个体、群体和具有地域限制的节点移动模型,提出物理链路和路由协议2个层面的评估准则,给出不同类节点模型对路由协议性能的影响程度。对研究和评估MANET的路由协议有重要的参考价值。 展开更多
关键词 移动自组网 节点移动模型 路由协议 网络仿真
在线阅读 下载PDF
基于相对移动性预测的k跳AdHoc网络分簇算法 被引量:11
14
作者 孟洛明 江彦馥 +3 位作者 刘彦君 苏汉 徐思雅 亓峰 《电子与信息学报》 EI CSCD 北大核心 2018年第12期2954-2961,共8页
针对网络节点随机移动造成的AdHoc网络分簇结构变化和路由失效问题,该文提出一种基于相对移动性预测的k跳分簇算法,分析和预测网络节点运动状态,自适应地调整分簇结构,提高簇结构稳定性。首先,使用多普勒频移计算节点间相对移动速度,预... 针对网络节点随机移动造成的AdHoc网络分簇结构变化和路由失效问题,该文提出一种基于相对移动性预测的k跳分簇算法,分析和预测网络节点运动状态,自适应地调整分簇结构,提高簇结构稳定性。首先,使用多普勒频移计算节点间相对移动速度,预测节点移动性,得到节点间链路保持时间。然后,在簇形成阶段,采用面向节点稳定性的MAX-MIN启发式算法,根据节点的平均链路保持时间对簇首进行选择。进而,在簇保持阶段,提出一种基于节点运动状态的网络自适应调整算法,一方面调整节点信息数据发送周期以平衡数据开销和精确度,另一方面通过预测节点间链路通断情况调整分簇结构,以减少链路失效时的链路重建时间,提高网络运行质量。仿真实验表明,所提算法可以有效延长簇首持续时间,提高簇结构在动态环境下的稳定性。 展开更多
关键词 adhoc网络 分簇 移动性预测 多普勒频移 MAX—MIN算法
在线阅读 下载PDF
基于图论的MANET入侵检测方法 被引量:8
15
作者 张冰涛 王小鹏 +3 位作者 王履程 张忠林 李延林 刘虎 《电子与信息学报》 EI CSCD 北大核心 2018年第6期1446-1452,共7页
移动Ad hoc网络(MANET)易遭受各种安全威胁,入侵检测是其安全运行的有效保障,已有方法主要关注特征选择以及特征权重,而忽略特征间潜在关联性,针对此问题该文提出基于图论的MANET入侵检测方法。首先通过对典型攻击行为分析,合理选择9种... 移动Ad hoc网络(MANET)易遭受各种安全威胁,入侵检测是其安全运行的有效保障,已有方法主要关注特征选择以及特征权重,而忽略特征间潜在关联性,针对此问题该文提出基于图论的MANET入侵检测方法。首先通过对典型攻击行为分析,合理选择9种特征作为节点,依据欧式距离确定节点间的边以构建结构图。其次发掘节点(即特征)间关联性,综合考虑节点邻居规模属性和节点邻居之间的紧密程度属性,利用图论所对应的统计特性度分布和聚集系数具体实现两属性。最后对比实验结果证明此方法与传统方法相比平均检测率和误检率分别提高10.15%、降低1.8%。 展开更多
关键词 入侵检测 移动AD HOC网络 图论 特征关联性
在线阅读 下载PDF
无线时间敏感网络技术综述
16
作者 乔萱 李宗辉 +3 位作者 刘强 艾渤 万海 邓仰东 《软件学报》 北大核心 2025年第1期184-202,共19页
由IEEE 802.1任务组开发的时间敏感网络标准可以用来构建高可靠、低延迟、低抖动的以太网,将时间敏感网络扩展到无线领域也是目前许多工作的研究重点.与传统的有线通信相比,无线的时间敏感网络不仅可以实现高可靠和低时延通信,还具有更... 由IEEE 802.1任务组开发的时间敏感网络标准可以用来构建高可靠、低延迟、低抖动的以太网,将时间敏感网络扩展到无线领域也是目前许多工作的研究重点.与传统的有线通信相比,无线的时间敏感网络不仅可以实现高可靠和低时延通信,还具有更高的灵活性、更强的移动性以及更低的布线和维护成本等优点.因此,在面对未来无人驾驶、协作机器人、远程医疗控制等新兴应用时,无线时间敏感网络被认为是一种十分有前景的技术.无线网络一般可以分为基于基础设施的无线网络和无基础设施的无线网络,而后者基于移动性还可以分为两类:移动自组织网络和无线传感网络,因此主要从这3种网络类型出发,对其应用场景、相关技术、路由协议以及高可靠低时延传输进行了调研与综述. 展开更多
关键词 时间敏感网络 5G 移动自组织网络 无线传感网络
在线阅读 下载PDF
MANET自组织按需认证模型的研究 被引量:2
17
作者 沈明玉 杨伟杰 陈娟 《计算机工程与应用》 CSCD 北大核心 2010年第19期91-93,131,共4页
构建安全可信的MANET必须考虑到其自身的特性。目前关于MANET的安全认证研究大多是利用中心认证服务器为用户颁发证书,较少考虑到MANET自身的自组织特点,很难完成网络的快速部署。结合MANET的特性,提出一种自组织按需式认证方案。该方... 构建安全可信的MANET必须考虑到其自身的特性。目前关于MANET的安全认证研究大多是利用中心认证服务器为用户颁发证书,较少考虑到MANET自身的自组织特点,很难完成网络的快速部署。结合MANET的特性,提出一种自组织按需式认证方案。该方案不需要中心认证服务器,充分利用节点自身功能,在完成身份认证的同时具有良好的伸缩性。 展开更多
关键词 无线移动adhoc网络 安全认证 自组织 按需式
在线阅读 下载PDF
MANET网络中一种基于灰色区域的移动预测路由协议及多径备份路由扩展 被引量:7
18
作者 周文佳 陈旿 +2 位作者 肖迪 张鹏飞 慕德俊 《西北工业大学学报》 EI CAS CSCD 北大核心 2012年第5期739-745,共7页
MANET网络中拓扑结构频繁变化的特点,经常导致网络存在通信路径不稳定,通信质量较差的情况。文章提出一种基于灰色区域的移动预测路由协议LP-OLSR,该协议能够适应网络拓扑结构的快速变化,结合节点灰色区域范围,预测链路未来时刻的连接状... MANET网络中拓扑结构频繁变化的特点,经常导致网络存在通信路径不稳定,通信质量较差的情况。文章提出一种基于灰色区域的移动预测路由协议LP-OLSR,该协议能够适应网络拓扑结构的快速变化,结合节点灰色区域范围,预测链路未来时刻的连接状态,在链路失效前重新计算路由,减少因为链路中断产生的时延。并且结合多径技术扩展至LP-OLSR-M协议,通过多径路由算法寻找一条备份路径,在当前链路即将失效前切换至备份路径,进一步保证了数据的稳定传输。仿真结果表明,新协议的QoS指标较OLSR协议相比有了明显改善,有效提高了MANET网络的通信质量。 展开更多
关键词 路由算法 路由协议 网络协议 网络路由 卡尔曼滤波 计算机仿真 manet网络 移动预测 灰色区域 多径路由
在线阅读 下载PDF
基于NS-2的MANET路由协议仿真及性能评估 被引量:4
19
作者 牛秋娜 王美琴 +1 位作者 王英龙 徐永道 《计算机应用研究》 CSCD 北大核心 2006年第9期240-242,246,共4页
简单介绍MANET(Mobile Ad hoc Network)路由协议后,提出定量评估MANET路由协议性能的六个基本指标。基于网络仿真器NS-2阐述了评估和测试路由协议性能的仿真模型及数据结果的分析方法,并给出仿真实例及其分析。结果表明,模型仿真结果接... 简单介绍MANET(Mobile Ad hoc Network)路由协议后,提出定量评估MANET路由协议性能的六个基本指标。基于网络仿真器NS-2阐述了评估和测试路由协议性能的仿真模型及数据结果的分析方法,并给出仿真实例及其分析。结果表明,模型仿真结果接近理论分析和实际情况,该性能评估方法有较强的实用性和通用性。 展开更多
关键词 移动AD hoc网络(manet) 网络仿真器NS-2 性能评估 仿真模型
在线阅读 下载PDF
MANET中TCP Vegas拥塞控制的端到端改进方法 被引量:5
20
作者 王宇亮 郑昌文 章洋 《计算机工程与应用》 CSCD 北大核心 2007年第15期105-107,127,共4页
TCP Vegas通过往返时间的最小值baseRTT来进行拥塞控制,因此获取准确baseRTT的值至关重要。在MANET中,不断变化的网络拓扑会导致baseRTT的测量出现严重偏差,从而降低了吞吐量,而TCP Vegas在拥塞避免阶段发生路由变化但没有引起丢包或失... TCP Vegas通过往返时间的最小值baseRTT来进行拥塞控制,因此获取准确baseRTT的值至关重要。在MANET中,不断变化的网络拓扑会导致baseRTT的测量出现严重偏差,从而降低了吞吐量,而TCP Vegas在拥塞避免阶段发生路由变化但没有引起丢包或失序现象时,已有的端到端启发式方案很难进行识别。采用回落探测方法识别路由变化,进而调节往返时间的最小值以改善TCP Vegas拥塞控制算法在MANET中的性能。 展开更多
关键词 无线自组网 TCP VEGAS 端到端算法
在线阅读 下载PDF
上一页 1 2 18 下一页 到第
使用帮助 返回顶部