首页 | 官方网站   微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 156 毫秒
1.
认知无线电网络中,主用户和认知用户的行为均会给认知节点间的频谱分配带来重大影响。在考虑认知用户间相互干扰时,提出了认知用户可用信道的潜在竞争节点数这一概念。在此基础上,将主用户对认知用户的影响考虑进去,定义了信道稳定度并将其作为衡量频谱质量的一个新的度量衡,以及给出了最稳定信道分配算法。性能评估的结果表明,最稳定信道分配算法可以有效的降低端到端平均时延以及显著的提高端到端吞吐量。  相似文献   

2.
认知无线网络按需协同感知和信道分配   总被引:1,自引:0,他引:1  
李保罡  刘元安  刘凯明 《通信学报》2011,32(11):103-109
结合路由发现和维护过程中控制消息的广播特性,提出将频谱协同感知和信道分配的交互信息部分融入路由控制消息的方法。认知用户的信息交互随按需路由发现过程而启动,并在路由沿线建立协同感知节点簇,利用路由维护消息对该节点簇进行维护。同时以认知网络容量最大化为目标,提出将频谱协同感知和信道分配联合设计。仿真分析表明,减少了认知用户的信息交互开销,缓解了认知无线网络中控制信道的瓶颈影响,对空闲频谱进行了高效再利用。  相似文献   

3.
利用多个信道接口来改善ad hoc网络信道容量。即一个信道周期性的广播节点状态信息分组来维护全网所有节点的状态信息,而另一个信道利用此信息采用最短路径搜寻算法来获得到目的节点的路由并完成数据传输。这样充分结合了表驱动路由方法和按需式路由方法的优点。另外,信息维护与数据分组分别在两个信道内同时进行,避免了信息维护对数据分组传输的影响,提高了网络性能。  相似文献   

4.
基于提前分配路径的低时延片上路由器结构   总被引:1,自引:0,他引:1  
该文针对片上网络提出一种基于提前分配路径的低时延片上路由器结构(PAPR).新路由器采用提前路由计算和提前分配路径来缩短路由器流水线深度.提前路由计算为虚信道提前分配提供了可靠保障,即使在虚信道路径提前分配失败的情况下,也不影响分组在网络中的传输时延.该文提出基于缓存状态的仲裁算法BSTS(Buffer Status)综合考虑当前节点缓存信息和下游节点缓存信息,不但降低了分组等待时延,而且降低了缓存空闲的概率.仿真结果表明,新路由器能明显改善网络的时延和吞吐性能,相比采用滑动迭代轮询仲裁iSLIP(iterative Round-Robin Matching with SLIP(Serial Line Interface Protocal))算法的经典虚信道路由器,网络平均端到端时延降低了24.5%,吞吐率提高了27.5%;与采用轮询迭代RRM(Round-Robin Matching)算法的经典虚信道路由器相比,平均端到端时延降低了39.2%,吞吐率提高了47.2%.路由器硬件开销和平均功耗分别增加仅为8.9%,5.9%.  相似文献   

5.
由于认知网络中信道具有动态时变特性,路由选择和信道分配成为认知Ad-Hoc网络亟待解决的问题。为此提出一种基于信道信息的改进路由算法,结合节点的信道共用度和最小条数作为路由度量,通过选取较稳定的节点,增强链路的稳定性。仿真结果表明,对于信道变化波动较大的环境,改进的路由算法具有很好的路径稳定性和链路修复能力。  相似文献   

6.
无线Mesh网络集中式信道分配算法设计   总被引:1,自引:0,他引:1  
以集中式无线Mesh网络(WMN)为基础,分析和研究了传统多信道分配算法,并在此基础上提出了以节点优先级和分组为特点的多接口多信道分配算法(Channel Assignment based on Rank of Node and Link group,CAR-NL),该算法结合节点分级和链路负载预期评估机制,通过节点链路分组按级分配信道。通过仿真实验表明,该算法能有效提高无线Mesh网络多业务流并发执行时系统整体吞吐量,并实现较低的丢包率。  相似文献   

7.
针对认知无线电网络中传统路由可靠性较低的问题,提出了一种改进的可靠信道路由算法(Improved reliable channel routing,IRCR)。算法根据认知无线电网络频谱的动态性,利用相邻节点间信道利用率,选择可靠邻节点,并根据可靠邻节点建立可靠路由。仿真结果表明,与传统频谱感知按需路由协议(spectrumaware on-demand routing protocol,SORP)相比,IRCR具有较高的数据包投递率和较低平均时延。  相似文献   

8.
针对认知Mesh网络中NSAR路由算法在当网络中存在多个使用相同授权频带的主用户的时候仍然存在主用户暴露终端和隐蔽终端的问题,提出了一种基于暴露终端和隐蔽终端的路由发现算法-REH(Routing based on Exposed nodes and Hidden nodes)。该算法在路由发现的过程中通过在计算信道优先次序表的时候引入主用户曾占用信道次数信息来避免以上场景所出现的暴露终端和隐蔽终端问题,从而提高了数据包传送的成功率和平均吞吐量。理论分析和仿真结果表明,与NSAR算法相比,REH在数据包传送成功率和平均吞吐量方面的性能整体更优。  相似文献   

9.
针对如何在保护主用户的同时最大化有效吞吐量的子信道分配问题,考虑由于主用户的重新到来而造成的主次用户碰撞,给出一种基于子信道碰撞概率约束的子信道分配算法。算法通过约束子信道碰撞概率来保护主用户,依据碰撞概率约束估计各子信道可容忍最大传输时长,随后认知用户根据请求业务时长选择合适的子信道接入。仿真结果表明,与不考虑子信道碰撞概率约束的算法相比,该分配算法很好地保护了主用户,且在信道条件较好时,能取得更好的有效吞吐量性能。  相似文献   

10.
在社区机会网络中由于网络资源的限制,节点的缓存、能量、带宽等属性会严重影响网络的性能。现有的社区机会网络路由算法往往只根据节点的中心性级别来进行副本的分配,而并没有充分考虑上述属性的影响。针对这一问题,本文提出一种结合节点属性与中心性的路由算法WRACS。该路由算法既考虑了影响节点传输能力的各种属性,又结合了节点的活跃程度。最后通过ONE仿真分析可知,该算法在信息投递率,平均延时和平均缓存时间等性能指标上都体现出良好的性能。  相似文献   

11.
In order to establish a route supporting multi-constrained quality of service(QoS), increase network throughput and reduce network energy consumption, an improved ant colony-based multi-constrained QoS energy-saving routing algorithm(IAMQER) is proposed. The ant colony algorithm, as one of the available heuristic algorithms, is used to find the optimal route from source node to destination node. The proposed IAMQER algorithm, which is based on the analysis of local node information such as node queue length, node forwarding number of data packets and node residual energy, balances the relationship between the network throughput and the energy consumption, thus improving the performance of network in multi-constrained QoS routing. Simulation results show that this IAMQER algorithm can find the QoS route that reduce average energy consumption and improves network packet delivery ratio under the end-to-end delay and packet loss ratio constraints.  相似文献   

12.
Dynamic source routing (DSR) is a robust protocol commonly applied to multi‐hop wireless mobile ad hoc networks (MANETs). In this paper, an algorithm is proposed for modifying the basic DSR protocol to enhance its performance by reducing the number of redundant route reply packets (RREPs). In the modified DSR (MDSR), for a source destination pair, the destination responds to the first received route request packet (RREQ) with an RREP, and the subsequently received RREQs, bearing the same request ID, are responded to only if the hop count is less than that of all the previously received RREQs. The performance of MDSR has been compared with that of the basic DSR for different network densities and for different mobility of nodes. Simulation results show that MDSR gives fewer control packets, less latency and a higher packet delivery ratio than DSR. Copyright © 2007 John Wiley & Sons, Ltd.  相似文献   

13.
Xia  Maojin  Wang  Qingshan  Wang  Qi  Cao  Cheng  Wang  Lifang  Guo  Hao 《Wireless Personal Communications》2017,96(4):5687-5704

Delay tolerant networks can not maintain end-to-end connectivity. Thus the routing is one of the critical issues. As we known, the two-level community model including the small community and the big community is proposed for the first time. In the same small community, any two member nodes are friends with each other. And in the same big community which is constructed of some small communities, any two communities have some pairs of friend nodes between them. Based on this model, a two-level community-based routing (TLCR) algorithm is presented in delay tolerant networks. In TLCR, according to the location of packet holder including inside the small community of destination node, inside of the big community and outside of the small community of destination node, and outside of the big community of destination node, the different packet forwarding strategies are investigated. The number of relay nodes selected by a packet holder is decreasing with the holder’s location from inside of the small community of destination node to outside of the big community of destination node. The probability of the source node successfully delivers the packet to the destination node and the copies number corresponding with the above three locations are analyzed, respectively. The simulation results show that TLCR not only improves the delivery ratio but also greatly reduces the resource cost.

  相似文献   

14.
Greedy and contention-based forwarding schemes were proposed for mobile ad hoc networks (MANETs) to perform data routing hop-by-hop, without prior discovery of the end-to-end route to the destination. Accordingly, the neighboring node that satisfies specific criteria is selected as the next forwarder of the packet. Both schemes require the nodes participating in the selection process to be within the area that confronts the location of the destination. Therefore, the lifetime of links for such schemes is not only dependent on the transmission range, but also on the location parameters (position, speed and direction) of the sending node and the neighboring node as well as the destination. In this paper, we propose a new link lifetime prediction method for greedy and contention-based routing which can also be utilized as a new stability metric. The evaluation of the proposed method is conducted by the use of stability-based greedy routing algorithm, which selects the next hop node having the highest link stability.  相似文献   

15.
In this paper, we use fuzzy Petri nets (FPNs) to propose a secure routing protocol in mobile ad hoc network. The proposed method is based on secure ad hoc on‐demand distance vector (SAODV), which is named FPN‐SAODV. In FPN‐SAODV routing protocol, for each packet delivery or firing each transition, a type of bidirectional node‐to‐node fuzzy security verification is conducted that can be carried out with five security threshold levels. This inference uses four fuzzy variables that have been selected to well represent the malicious behaviors of some public attacks in mobile ad hoc network. Furthermore, a through route security verification has been used for selecting the most secure route among each candidate path through source node to destination. Both of these verifications utilize FPN inherent features for their operation. For evaluation purpose, we used the metrics such as packet delivery ratio, end‐to‐end delay, average security level of the nodes, and percentage of true/false detector nodes. These metrics have been used for investigating the inner operation of FPN‐SAODV as determining the proper level of security threshold level in node‐to‐node security verification module. Also, these are used for comparison of FPN‐SAODV performance versus the original AODV. Copyright © 2015 John Wiley & Sons, Ltd.  相似文献   

16.
Privacy is needed in ad hoc networks. An ad hoc on-demand position-based private routing algorithm, called AO2P, is proposed for communication anonymity. Only the position of the destination is exposed in the network for route discovery. To discover routes with the limited routing information, a receiver contention scheme is designed for determining the next hop. Pseudo identifiers are used for data packet delivery after a route is established. Real identities (IDs) for the source nodes, the destination nodes, and the forwarding nodes in the end-to-end connections are kept private. Anonymity for a destination relies on the difficulty of matching a geographic position to a real node ID. This can be enforced by the use of secure position service systems. Node mobility enhances destination anonymity by making the match of a node ID with a position momentary. To further improve destination privacy, R-AO2P is proposed. In this protocol, the position of a reference point, instead of the position of the destination, is used for route discovery. Analytical models are developed for evaluating the delay in route discovery and the probability of route discovery failure. A simulator based on ns-2 is developed for evaluating network throughput. Analysis and simulation results show that, while AO2P preserves communication privacy in ad hoc networks, its routing performance is comparable with other position-based routing algorithms.  相似文献   

17.
This paper shows how to optimize the routing decisions in a nondeterministic routing algorithm called convergence routing in which routes may change depending on the traffic conditions. The routing algorithm guarantees a loss-free delivery of data packets from bursty sources, and a deterministic bound on the route length in arbitrary topology networks. The routing decisions are based on assigning routing priorities to the links such that a packet is forwarded to the highest priority link which is not blocked. Routing priorities are assigned using a local-greedy metric which minimizes the distance (number of hops) to the destination. This work shows that routing decisions using a local-greedy metric are not optimal, and the performance of the algorithm can be improved substantially by using new measures. Thus, various look-ahead metrics which take into account the potential gain on the other switching nodes toward the destination of a packet are suggested. The contributions of this work are: (1) a new analytical model to capture the behavior of a switching node; (2) an iterative optimization technique to set routing priorities according to various look-ahead measures; and (3) heuristics to ensure the stability of the routing priorities. The optimization objective is to maximize the throughput by minimizing the maximum total flow carried on a link in the network under static traffic model. The performance is studied computationally on various networks and traffic matrices. It is shown that up to a 50% performance increase can be obtained by optimizing the routing priorities  相似文献   

18.
We consider the problem of localized energy aware routing in mobile ad hoc networks. In localized routing algorithms, each node forwards a message based on the position of itself, its neighbors and the destination. The objective of energy aware routing algorithms is to minimize the total power for routing a message from source to destination or to maximize the total number of routing tasks that a node can perform before its battery power depletes. In this paper we propose new localized energy aware routing algorithms called OLEAR. The algorithms have very high packet delivery rate with low packet forwarding and battery power consumption. In addition, they ensure good energy distribution among the nodes. Finally, packets reach the destination using smaller number of hops. All these properties make our algorithm suitable for routing in any energy constrained environment. We compare the performance of our algorithms with other existing energy and non‐energy aware localized algorithms. Simulation experiments show that our algorithms present comparable energy consumption and distribution to other energy aware algorithms and better packet delivery rate. Copyright © 2006 John Wiley & Sons, Ltd.  相似文献   

19.

In this paper, we propose an interference aware expanding region search algorithm to locate a destination in mobile ad hoc networks. In the proposed approach, signal to interference plus noise ration (SINR) is used in place of TTL field of a route request packet. The source node initializes the search query with a threshold value of SINR. Each relay node forwards the packet if its SINR satisfies the threshold criteria provided by the source node in RREQ packet. As a result, the low SINR nodes are removed in route discovery phase prior to the establishment of routes. The simulation results show that proposed algorithm provides significant improvement in performance of reactive routing protocol in terms of reduced routing overhead, reduced energy consumption, and increased network throughput.

  相似文献   

20.
李昕  李喆 《电子学报》2010,38(4):870-0874
 寻找可用网关是MANET接入Internet过程中产生开销最大的一个环节。为了有效控制接入过程中的路由开销,根据蚂蚁寻径与移动节点寻找网关的相似性,提出了一种基于网关信息素更新的接入网络开销控制算法。该算法模仿蚁群算法中信息素更新方式,运用路由应答报文中携带的信息对网关信息素进行更新。节点在寻路时根据路径上的信息素浓度、链路带宽和时延等参数计算转发概率并进行转发。通过运用NS2.29对该算法进行仿真,结果表明该算法虽然平均端到端时延略有增加,但是有效地减少了归一化路由开销,并提高了分组投递率,验证了算法的有效性。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号