期刊文献+

战术Ad hoc网业务量突发特性下的退避算法研究 被引量:2

Study of backoff algorithm about burst traffic character of tactical Ad hoc network
下载PDF
导出
摘要 战术Ad hoc网是一种以突发数据业务为主的分组无线网络,业务流实际上具有着一种自相似特性,与以往研究中所使用的泊松业务模型区别很大。自相似业务突发产生成批到达,使得节点缓存队列更加拥塞,排队时延增长。在研究多路重尾ON/OFF源生成自相似业务的基础上,通过对各源的突发情况进行定量分析,提出了一种适用于自相似业务的退避算法。该算法为节点引入适当的竞争系数,使得对于信道的访问可以根据当前网络的突发状态合理分派。实验在OPNET下进行,通过调整网络节点数和突发程度,仿真得到各项统计结果。不论网络时延还是吞吐量,改进后的协议都具有较好的性能。这对战术Ad hoc网络的协议设计、资源的优化配置具有参考价值。 Tactical Ad hoc network traffic possesses self-similar character.It is very different from traditional Poisson model.Self-similar traffic is burstingly generated and arrives in batches.It causes buffer array of nodes more crowded and time delay of queuing to rise.To this issue,study based on assembling of multiple ON/OFF sources to simulate self-similar traffic input raises a MAC backoff algorithm which is suitable for self-similar flow through quantificational analysis of bursting situation of each sources.This algorithm introduces appropriate competition coefficient and makes appropriate nodes assignments to channel access in accordance with current bursting status.Experiments carried on OPNET obtain each graph of network performance through analogue simulation of different number of terminals and different burst degree of traffic flow.The results show the improved protocol has better performance in time delay and throughputs.The research has great significance for protocol designing of Ad hoc network,improvement of the network performance and optimization of the resources configuration.
出处 《计算机工程与应用》 CSCD 北大核心 2011年第26期120-123,共4页 Computer Engineering and Applications
基金 水下信息处理与控制国家重点实验室基金(No.9140C2305041001)
关键词 自相似 Ad HOC网 退避算法 流量突发 self-similar Ad hoc backoff algorithm burst of traffic flow
  • 相关文献

参考文献8

  • 1Paxson V,Floyd S.Wide area traffic:the failure of Poisson modeling[J].IEEE/ACM Trans on Networking, 1995,3 (3) : 226-244. 被引量:1
  • 2蒋洪伟,陆鑫.一种估计WLAN竞争站点数的方法[J].计算机工程,2010,36(3):103-105. 被引量:3
  • 3Bharghavan V.MACAW. a media access protocol for wireless LANs[C]//Proceedings of ACM SIGCOMM,1994:212-225. 被引量:1
  • 4Fan Jing.Performance analysis of an adaptive backoff scheme for Ad Hoc networks[C]//Proceedings of the Computer and Information Technology Conference, 2008 : 624-629. 被引量:1
  • 5吴援明,宁正容,梁恩志.网络自相似业务模型进展[J].通信学报,2004,25(3):97-104. 被引量:32
  • 6Wang Qinghua.Source traffic modeling in wireless sensor networks for target traeking[C]//Proceedings of the 5th ACM Sym- posium on Performance Evaluation of Wireless Ad Hoc,Sensor, and Ubiquitous Networks, 2008: 96-100. 被引量:1
  • 7Lu Ying.A self-similar traffic generation method and application in the simulation of mobile ad-hoe network[C]//CCCM 2009, 2009. 被引量:1
  • 8Bianchi G.Performance analysis of the IEEE 802.11 distributed coordination ftmction[J].IEEE Journal on Selected Areas in Communications, 2000,18(3 ) : 535-547. 被引量:1

二级参考文献7

  • 1WORNELL G W.A Karhun-Loéve-like expansion for 1/f process[J].IEEE Transactions on Information Theory,1990,36(4):859-861. 被引量:1
  • 2Bianchi G. Performance Analysis of the IEEE802.11 Distributed Coordination Function[J]. IEEE Journal on Selected Area in Communications, 2000, 18(3): 535-547. 被引量:1
  • 3Bianchi G, Fratta L, Oliveri M. Performance Analysis of IEEE 802.11 CSMA/CA Medium Access Control Protocol[C]//Proc. of the IEEE PIMRC'96. [S. l.]: IEEE Press, 1996:407-411. 被引量:1
  • 4Kai Caihong, Chen Yuzhong, Yu Nenghai. Performance Analysis of DCF Under Two Access Mechnisms in IEEE802.11 a WLAN[C]//Proc. of the 2nd International Conference on Mobile Technology, Applications and Systems. [S.l.]: IEEE Press, 2005: 1-7. 被引量:1
  • 5Raptis P, Vistas V, Banchs A, e al. Delay Distribution Analysis of IEEE802.11 with Variable Packet Length[C]//Proc. of Vehicular Technology Conference. [S. l.]: IEEE Press, 2007: 830-839. 被引量:1
  • 6吴泽民,俞正德,郑少仁.一种经验型的自相似流生成方法[J].西安交通大学学报,2001,35(8):876-878. 被引量:1
  • 7林正汉,黄爱苹,仇佩亮.IEEE802.11 WLAN中的竞争站点数测量[J].电路与系统学报,2003,8(5):37-42. 被引量:2

共引文献32

同被引文献15

  • 1陈敏,韦岗.IEEE802.11无线局域网OPNET建模与性能测试[J].计算机工程,2004,30(21):14-16. 被引量:29
  • 2张连明.网络业务流自相似传播特性研究[J].计算机工程与应用,2007,43(19):141-144. 被引量:1
  • 3LAN Sommerville.软件工程[M1.北京:机械工业出版社,2003. 被引量:1
  • 4PAXSON V, FLOYD So Wide Area Traffic: the Failure of Poisson Modeling[C]//IEEE/ACM Transactions on Networking, 1995,3(3) : 226. 被引量:1
  • 5William Stallings. High-speed Networks: TCP/IP and ATM Design Principles[M]. Prentice Hall: Inc NewJersey, USA, 1998. 被引量:1
  • 6Qinghua Wang. Source Traffc Modeling in Wireless Sensor Networks for Target Tracking[C]//Proceed- ings of the 5th ACM symposium on Performance E- valuation of Wireless ad Hoc, Sensor, and Ubiquitous Networks. October, New York, USA: ACM, 2008: 96. 被引量:1
  • 7LU Ying. A Self-Similar Traffic Generation Method and Application in the Simulation of Mobile Ad-hoc Network. Computing, Communication, Control, and Management 2009 [C]//Sanya, China: IEEE, 2009,8 (4):229. 被引量:1
  • 8ET Technologies, Inc[EB/OL]. [2002-03-19] [2012- 03-15]. http://www, opnet, corn. 被引量:1
  • 9CHANG Xin-jie. Network Simulations with OPNET [C]//Proceedings of the . 31st. Conference on Winter Simulation(CLA. 99), Phoenix, USA, 1999: 307. 被引量:1
  • 10Paxson V, Floyd S. Wide Area traffic : the Failureof Poisson Modeling [ C ] // IEEE/ACMTransactions on Networking* 1995.3(3) :226-244. 被引量:1

引证文献2

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部