期刊文献+

移动自组网络拓扑发现算法综述

The Review on Topology Farming Technology in Ad-hoc Networks
下载PDF
导出
摘要 移动自组网络(Ad hoc)是一种特殊的无固定控制中心、不需要基础设施的无线多跳网络。该网络没有中心控制点,网络中的节点地位平等,自我管理、自我组织,通过互相转发报文来进行网络通信。网络拓扑是网络状态的重要模型,它给出了大量的网络中活动节点及其相互连接关系的图示形式。网络拓扑结构是网络管理功能的基本组成部分之一。无线自组网络拓扑可以提供许多网络管理功能:无线自组网络的布置,设置网络操作参数,监视网络的状态,预测网络的可能出现的状态,设计和升级无线自组网络。本文主要提出了四种移动自组网络拓扑发现的算法。 Mobile Ad hoc network is a special multi-hop wireless network without centralized administration and infrastructure.Ad hoc network has no center control point,and the importance of every nodes in the network is equal.The network is self-managed,self-organized,and the packets are delivered in the network by mutual transfer.Network topology is an important model of network state.It gives the diagram of a large quantity of active nodes and their links in the networks.Network topology is one of the basic functions of network management.The topology of wireless ad hoc networks can accomplish many administration works,such as configuration of wireless ad hoc networks,setting the operation parameters of networks,monitoring the network status,predicting the network status,designing and updating the wireless ad hoc networks.There are four topology discovery algorithms proposed in this paper.
作者 陈一飞
出处 《安徽建筑工业学院学报(自然科学版)》 2008年第1期60-64,共5页 Journal of Anhui Institute of Architecture(Natural Science)
关键词 移动自组织网络 网络拓扑 拓扑发现算法 Ad hoc networks network topology topology discovery algorithms
  • 相关文献

参考文献7

二级参考文献15

  • 1卢胜,苏浓,王桂泽.营养保健型佳蔬——荠菜[J].中国食物与营养,2004,10(7):53-54. 被引量:11
  • 2刘翀,杨洋.生物类黄酮提取研究进展[J].中外食品,2004(10):48-49. 被引量:32
  • 3Perkins C E, Royer E M. Ad hoc on-demand distance vector muting[A]. IEEE Workshop on Mobile Computing System and Applications [ C ]. New Orleans: IEEE Computer Society, 1999.90 - 100. 被引量:1
  • 4Kivinen T, Kojo M. IP security protocol[R]. Cambridge: The Intemet Engineering Task Force, 1998. 被引量:1
  • 5Johnson D, Maitz D. DSR : the dynamic murce routing protocol for multi-hop wireless ad hoc networks [ M ]. Redwood :Addison-Wesley, 2001. 139- 172. 被引量:1
  • 6Sanzgiri K, Dahill B. A secure muting protocol for ad hoc networks[ A]. Proceedings of 2002 IEEE International Conference on Network Protocols [ C ]. Paris : IEEE Computer Society, 2002.78 - 90. 被引量:1
  • 7Papadimitratos P, Haas J. Secure muting for mobile ad hoc networks [ J ]. Mobile Computing and Communications Review, 2002,1(2):1-2. 被引量:1
  • 8Chun Y H, Johnson D B. SEAD: secure efficient distance vector muting for mobile wireless ad hoc networks [ A ]. Proceeding.s of the 4th IEEE Workshop on Mobile Computing Systems & Applications (WMCSA 2002)[C]. NY:Calicoon, 2002.3 - 13. 被引量:1
  • 9Herzberg A. Access control meets public key infrastructure [ A]. Proceedings of the 2000 IEEE Symposium on Securityand Privacy[C]. Berkeley: IEEE Computer Society, 2000.2-14. 被引量:1
  • 10Ch Y, Feigenbaum J. Referee: trust management for web applications[J ]. Word Wide Web Journal, 1997, 29 ( 1 ) :127- 139. 被引量:1

共引文献134

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部