期刊文献+

Ad hoc网络拓扑发现算法综述 被引量:4

The review on topology farming technology in Ad-hoc networks
下载PDF
导出
摘要 Ad hoc是一种无线自组织多跳网络。采用无中心的分布式控制,无线节点或终端相互合作而成,独立于固定的基础设施。各节点平等、无中心,动态拓扑。网络拓扑对网络规划、仿真、管理都有非常重要的意义。针对Ad hoc拓扑结构频繁、快速变化的特点,本文主要提出了N种移动自组网络拓扑发现的算法,并基于笔者的实践提供了一个简单的算法实现,该算法主要针对同一个管理机构下的I P网络的拓扑自动发现,更复杂的拓扑发现算法可在此基础上进一步扩展。 The Ad hoc network is a kind of special multi-hop mobile wireless network£-which has the extensively applied situation. And the network topology discovery is a technology that research for network structure by collecting network transmission data, which is important in network management and network security evaluation. In this paper, basic ideals and methodology for network topological discovery are introduced, and we find many factors which have influence on the algorithms performance. There are three topology discovery algorithms proposed be debated.
作者 张宇 田英明
出处 《自动化与仪器仪表》 2009年第1期8-9,15,共3页 Automation & Instrumentation
基金 国家863数字化仪表课题 项目号为2006AA040302
关键词 无线自组织网络 网络拓扑 拓扑发现算法 Ad hoc networks Network topology Topology discovery algorithms
  • 相关文献

参考文献6

二级参考文献14

  • 1Perkins C E, Royer E M. Ad hoc on-demand distance vector muting[A]. IEEE Workshop on Mobile Computing System and Applications [ C ]. New Orleans: IEEE Computer Society, 1999.90 - 100. 被引量:1
  • 2Kivinen T, Kojo M. IP security protocol[R]. Cambridge: The Intemet Engineering Task Force, 1998. 被引量:1
  • 3Johnson D, Maitz D. DSR : the dynamic murce routing protocol for multi-hop wireless ad hoc networks [ M ]. Redwood :Addison-Wesley, 2001. 139- 172. 被引量:1
  • 4Sanzgiri K, Dahill B. A secure muting protocol for ad hoc networks[ A]. Proceedings of 2002 IEEE International Conference on Network Protocols [ C ]. Paris : IEEE Computer Society, 2002.78 - 90. 被引量:1
  • 5Papadimitratos P, Haas J. Secure muting for mobile ad hoc networks [ J ]. Mobile Computing and Communications Review, 2002,1(2):1-2. 被引量:1
  • 6Chun Y H, Johnson D B. SEAD: secure efficient distance vector muting for mobile wireless ad hoc networks [ A ]. Proceeding.s of the 4th IEEE Workshop on Mobile Computing Systems & Applications (WMCSA 2002)[C]. NY:Calicoon, 2002.3 - 13. 被引量:1
  • 7Herzberg A. Access control meets public key infrastructure [ A]. Proceedings of the 2000 IEEE Symposium on Securityand Privacy[C]. Berkeley: IEEE Computer Society, 2000.2-14. 被引量:1
  • 8Ch Y, Feigenbaum J. Referee: trust management for web applications[J ]. Word Wide Web Journal, 1997, 29 ( 1 ) :127- 139. 被引量:1
  • 9Josang A. A logic uncertain probabilities[J ]. International Journal of Uncertainty, Fuzziness and Knowledge, 2001,9(3) :279 - 311. 被引量:1
  • 10Moor R, Drakas N. The network simulator[ EB/OL ]. http://www. isi. edu/nsnam/ns/, 2003 - 4 - 20. 被引量:1

共引文献10

同被引文献20

引证文献4

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部