首页 | 官方网站   微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 62 毫秒
1.
刘涛  刘渊b 《计算机应用研究》2010,27(12):4705-4707
无线自组织网络(Ad hoc)在MAC层中使用IEEE 802.11 DCF的接入机制来解决节点传输竞争问题,为了解决高负载环境下的网络拥塞状况问题,在退避算法中加入了动态阈值和岭型函数来降低数据传输的冲突概率并利用NS2对改进的退避算法进行网络仿真。仿真结果表明,相对于传统的退避算法,在负载较重的网络中改进后的退避算法大概能够提高网络性能20%左右,优化后网络的时延、吞吐量和公平性均得到明显改善。  相似文献   

2.
基于无线信道的冲突分解算法仿真研究   总被引:1,自引:0,他引:1  
目前,无线局域网(WLAN)中的媒体接入控制层(MAC)广泛采用基于IEEE802.11的二进制指数回退算法(BEB)的DCF协议.当WLAN中的节点数目迅速增加时,该协议存在系统吞吐量会急剧降低,网络性能变差的缺点.详细分析了无线局域网中IEEE 802.11MAC层的二进制退避协议,指出原协议在进行冲突处理上的不足,并结合树型分解算法(TSA)和快速分解算法(FCR),提出一种改进的树型冲突分解算法(ITSA).并用MATLAB仿真了CSMA/CA协议和ITSA算法.分析和仿真结果证明,与IEEE 802.11等协议采用的二进制指数退避算法相比,该算法能较大的提高系统吞吐量.  相似文献   

3.
随着车载无线通信需求的增加,车载自组织网络(VANET)将成为现代智能交通系统的一个重要组成部分。对VANET中多信道MAC层协议进行了研究,提出了一种提升网络公平性的退避算法。车辆通过比较自身已成功发送的业务量与平均业务量的大小,确定不同的退避方案,一定程度上实现网络中车辆的接入公平。考虑到该退避算法在提升公平性的同时,牺牲了一定的网络吞吐量,服务信道不饱和,进一步提出根据车辆密度调整服务预约时期长度的算法,提高服务信道的利用率,增大网络的吞吐量。仿真结果表明,提出的退避算法公平性指数相比于二进制退避算法,提升了约2.3倍,而相比于倍数增线性减退避算法,提升了约2.05倍,网络的吞吐量提高了约16%。  相似文献   

4.
本文针对ZigBee网络中的MAC层核心算法CSMA/CA不能区分业务优先级和在高网络负荷中性能较差的问题,提出了根据网络负荷设置竞争窗口的方法来确定网络中不同业务的优先级;同时,根据网络负荷来自适应调整算法中的退避指数,进一步优化网络性能.对网络模型进行了数学建模和分析,并且利用NS2软件建立仿真场景进行了网络仿真,仿真结果表明改进后的算法以较小的时延代价提高了网络吞吐量,并降低了丢包率,从而使网络整体性能得到优化.  相似文献   

5.
针对现有的主要退避算法,通过一维马尔可夫链分析了指数退避算法、线性退避算法和多项式退避算法以及各自对应的有最大重传次数限制的退避算法在饱和Ad hoc网络中的吞吐量性能,为无线Ad hoc网络的MAC机制的性能优化提供了理论依据。分析表明,对重传次数进行限制会减小吞吐量,同时导致丢包率的增加。三种退避算法中,多项式退避算法的吞吐量最大,而冲突概率最小,指数退避算法的吞吐量和冲突概率在三种退避算法中均居于中间;此外,吞吐量随着竞争节点的个数增加而减小,其中线性退避算法减小的速度最快,指数退避算法次之。  相似文献   

6.
李健  王建新 《计算机工程》2008,34(1):122-124
针对无线多跳网络环境,改进了IEEE 802.11 DCF的二进制指数退避算法,提出一种基于源节点和转发节点区分机制的退避算法。该算法能根据网络冲突状况,自适应地调节退避窗口,更适合多跳网络中流量分布不均的特点。仿真结果表明,该种区分退避机制能同时适应于低速和高速的网络环境,与BEB和AASC两种退避算法相比,在提高网络的吞吐量的同时,也提高了流间的公平性,表现出了更好的网络性能。  相似文献   

7.
本文针对MAC层中由于采用二进制指数退避算法而存在的小尺度时间上的不公平性现象和网络资源浪费的现象,改进了基于协作MAC系统的冲突分解算法.  相似文献   

8.
无线自组织网络退避算法综述   总被引:6,自引:0,他引:6  
黎宁  韩露 《计算机应用》2005,25(6):1244-1247
介绍了退避机制在无线自组织网络中的作用,指出了IEEE802. 11标准中使用的二进制指数退避算法存在的不足。对当前已提出的多种典型退避算法进行了分类介绍,对各类算法的特点及相关问题进行了讨论。最后阐明了无线自组织网络退避算法研究的发展趋势。  相似文献   

9.
S-MAC协议通过周期性睡眠侦听机制来减少无线传感器网络中节点能量的消耗,但是其在随机退避过程中使用固定竞争窗口,使其在节点碰撞的避免、节点间公平性以及吞吐率上有所欠缺。针对S-MAC的以上不足,基于二进制指数退避算法(BEB)提出自适应指数随机退避算法(AD-BEB)。AD-BEB算法引入了信道竞争能力参数和网络拥挤参数,根据这两个参数对竞争窗口进行调整,并且窗口的调整经过两个阶段来完成。仿真结果表明,AD-BEB算法能够有效地减少节点的碰撞次数,增加网络的吞吐率和节点的公平性。  相似文献   

10.
一种基于自适应退避窗口的S-MAC协议改进算法研究   总被引:1,自引:0,他引:1  
在分析S-MAC协议的工作过程以及退避算法的基础上,针对二进制指数退避机制的缺点进行了改进。通过当前退避窗口值和信道忙计数器来反映当前信道的拥塞状况,使节点自适应地调节退避窗口的大小以减少再次碰撞。仿真结果表明,改进后的S-MAC在高速网络环境中提高了网络的吞吐率,并且减少了能量损耗,表现出更好的网络性能。  相似文献   

11.
《计算机科学》2007,34(4):148-148
Recent years have seen rapid advances in various grid-related technologies, middleware, and applications. The GCC conference has become one of the largest scientific events worldwide in grid and cooperative computing. The 6th international conference on grid and cooperative computing (GCC2007) Sponsored by China Computer Federation (CCF),Institute of Computing Technology, Chinese Academy of Sciences (ICT) and Xinjiang University ,and in Cooperation with IEEE Computer Soceity ,is to be held from August 16 to 18, 2007 in Urumchi, Xinjiang, China.  相似文献   

12.
为了设计一种具有低成本、低功耗、易操作、功能强且可靠性高的煤矿井下安全分站,针对煤矿安全生产实际,文章提出了采用MCS-51系列单片机为核心、具有CAN总线通信接口的煤矿井下安全监控分站的设计方案;首先给出煤矿井下安全监控分站的整体构架设计,然后着重阐述模拟量输入信号处理系统的设计过程,最后说明单片机最小系统及其键盘、显示、报警、通信等各个组成部分的设计;为验证设计方案的可行性与有效性,使用Proteus软件对设计内容进行仿真验证,设计的煤矿井下安全监控分站具有瓦斯、温度等模拟量参数超标报警功能和电机开停、风门开闭等开关量指示功能;仿真结果表明:设计的煤矿井下安全监控分站具有一定的实际应用价值.  相似文献   

13.
本文分析了法律数据库的结构和特点,介绍了采用面向对象设计方法和超文本数据库技术开发和实现法律信息库系统将作为重要网络资源之一为不同用户进行法律咨询服务。  相似文献   

14.
In modern service-oriented architectures, database access is done by a special type of services, the so-called data access services (DAS). Though, particularly in data-intensive applications, using and developing DAS are very common today, the link between the DAS and their implementation, e.g. a layer of data access objects (DAOs) encapsulating the database queries, still is not sufficiently elaborated, yet. As a result, as the number of DAS grows, finding the desired DAS for reuse and/or associated documentation can become an impossible task. In this paper we focus on bridging this gap between the DAS and their implementation by presenting a view-based, model-driven data access architecture (VMDA) managing models of the DAS, DAOs and database queries in a queryable manner. Our models support tailored views of different stakeholders and are scalable with all types of DAS implementations. In this paper we show that our view-based and model driven architecture approach can enhance software development productivity and maintainability by improving DAS documentation. Moreover, our VMDA opens a wide range of applications such as evaluating DAS usage for DAS performance optimization. Furthermore, we provide tool support and illustrate the applicability of our VMDA in a large-scale case study. Finally, we quantitatively prove that our approach performs with acceptable response times.  相似文献   

15.
16.
17.
正SCIENCE CHINA Information Sciences(Sci China Inf Sci),cosponsored by the Chinese Academy of Sciences and the National Natural Science Foundation of China,and published by Science China Press,is committed to publishing highquality,original results of both basic and applied research in all areas of information sciences,including computer science and technology;systems science,control science and engineering(published in Issues with odd numbers);information and communication engineering;electronic science and technology(published in Issues with even numbers).Sci China Inf Sci is published monthly in both print and electronic forms.It is indexed by Academic OneFile,Astrophysics Data System(ADS),CSA,Cabells,Current Contents/Engineering,Computing and Technology,DBLP,Digital Mathematics Registry,Earthquake Engineering Abstracts,Engineering Index,Engineered Materials Abstracts,Gale,Google,INSPEC,Journal Citation Reports/Science Edition,Mathematical Reviews,OCLC,ProQuest,SCOPUS,Science Citation Index Expanded,Summon by Serial Solutions,VINITI,Zentralblatt MATH.  相似文献   

18.
正Erratum to:J Zhejiang Univ-Sci C(ComputElectron)2014 15(7):551-563doi:10.1631/jzus.C1300320The original version of this article unfortunately contained mistakes.Algorithm 6 should be as follows:Algorithm 6 FGKFCM-F clustering Input:(1)X={x_1,x_2,…,x_N},,x_iR~d,i=1,2,…,N,the dataset;(2)C,1C≤N,the number of clusters;(3)ε0,the stopping criterion;  相似文献   

19.
20.
《Information & Management》2016,53(6):787-802
Discrepant technological events or situations that entail a problem, a misunderstanding or a difficulty with the Information Technology (IT) being employed, are common in the workplace, and can lead to frustration and avoidance behaviors. Little is known, however, about how individuals cope with these events. This paper examines these events by using a multi-method pragmatic approach informed by coping theory. The results of two studies – a critical incident study and an experiment – serve to build and test, respectively, a theoretical model that posits that individuals use a variety of strategies when dealing with these events: they experience negative emotions, make external attributions, and adopt engagement coping strategies directed at solving the event, eventually switching to a disengagement coping strategy when they feel they have no control over the situation. Furthermore, users’ efforts may result in ‘accidental’ learning as they try to overcome the discrepant IT events through engagement coping. The paper ends with a discussion of the results in light of existing literature, future opportunities for research, and implications for practice.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号