期刊文献+

基于Ad Hoc网络的卫星通信系统建模与仿真 被引量:2

Modeling and Simulation of Satellite Communication System Based on Ad Hoc Network
下载PDF
导出
摘要 将AdHoc网络理论与卫星通信系统相结合,提出了基于AdHoc网络的卫星通信系统模型。并根据此模型,利用OPNET软件构建了系统仿真框架并进行仿真.同时对时延和吞吐率进行了分析,从而得出基于AdHoc网络的卫星通信系统所具有的利弊。 Combining theory of Ad Hoc network with satellite communication system, the model of satellite communication system based on the Ad Hoc Network is introduced. According to this model, the system simulating frame was designed in OPNET to simulate the model. Meantime, the delay and throughput were analyzed, and then the advantage and disadvantage of the model were concluded.
出处 《系统仿真学报》 EI CAS CSCD 北大核心 2005年第8期1851-1854,共4页 Journal of System Simulation
关键词 AD HOC网络 OPNET 仿真框架 ad hoc network opnet simulation framework cluster
  • 相关文献

参考文献3

  • 1Kaixin Xu. An Ad Hoc Network with Mobile Backbones [C]. Computer Science Department at UCLA. 2002.
  • 2M Gerla, X Hong, G Pei. Landmark Routing for Large Ad Hoc Wireless Networks [C]. In Proceeding of IEEE GLOBECOM 2000, San Francisco, CA, Nov. 2000.
  • 3David B. Johnson. Routing in Ad Hoc Networks of Mobile Hosts [C]. Proceeding of the IEEE Workshop on Mobile Computing Systems and Applications, December 1994.

同被引文献25

  • 1王学慧,杨菲,黄柯棣.并行分布仿真中负载平衡的调度算法研究[J].系统仿真学报,2005,17(8):2018-2021. 被引量:4
  • 2刘军,李喆.空间网络路由协议研究[J].系统仿真学报,2007,19(1):221-225. 被引量:2
  • 3CCSDS. Security Threats Against Space Missions [R]. Washington, USA: CCSDS, 2006: 350.1-G-1.
  • 4A Roy-Chowdhury, J S Baras, M Hadjitheodosiou, et al. Security Issues in Hybrid Networks with a Satellite Component [J]. IEEE Wireless Communications (S1536-1284), 2005, 12(6): 50-61.
  • 5H S Cruickshank A Security System for Satellite Networks [C]//Fifth International Conference on Satellite Systems for Mobile Communications and Navigation, London, UK. USA: IEE, 1996: 187-190.
  • 6Tanya Vladimirova, Roohi Banu, Martin N Sweeting. On-Board Security Services in Small Satellites [C]// MAPLD International Conference. Washington, USA: NASA Office of Logic Design, 2005.
  • 7J Kohl, C Neuman. The Kerberos Network Authentication Service (V5), RFC 1510, 1993. [EB/OL]. (1993) [2009]. http ://www.iet f.org/r fc/rfc 1510.txt.
  • 8V Le, S M Matyas, D B Johnson, J D Wilkins. A Public Key Extension to the Common Cryptographic Architecture [J]. IBM System Journal (S0018-8670), 1993, 32(3): 461-485.
  • 9B C Neuman, S G Stubblebine. A Note on the Use of Timestamps as Nonces [J]. ACM Operating Systems Reviews (S0163-5980), 1993, 27(2): 10-14.
  • 10Philippe Janson, Gene Tsudik. Secure and Minimal Protocols for Authenticated Key Distribution [J]. Computer Communications (S0140-3664), 1995, 18(9): 645-653.

引证文献2

二级引证文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部