基于自相似理论802.11业务量特性的数学模型分析
Analyses on Mathematical Model of Traffic Characteristics of IEEES02. 11WLAN Based on Serf-similarity Theory
摘要
探讨了种用自相似理论建立802.11业务量特性的数学模型,给出并验证了丢包率PLR与分配给该无线链路的带宽间的函数关系。
Same kind of mathematical models of IEEE802. llWLAN based on Self-similarity theory are analyzed. Then it validates the function relationship between PLR and Bandwidth that assigned to this wireless link.
出处
《株洲工学院学报》
2006年第6期75-77,共3页
Journal of Zhuzhou Institute of Technology
基金
湖南省教育厅基金资助项目(04C592)
参考文献8
-
1Marwan M Krunz,Jeong Geun Kim.Fluid Analysis of Delay and Packet Discard Performance for QoS Support in WirelessNetworks[J].IEEE Journal On Selected Areas In Communications,1999,7(3):329-343.
-
2Jeong Geun Kim,Marwan Krunz.Delay analysis of selective repeat ARQ for transporting Markovian sources over a wirelesschannel[J].IEEE Trans.on Vehicular Technology,2000,49(5):1968-1981.
-
3Jeong Geun Kim,Marwan Krunz.Bandwidth allocation in wireless networks with guaranteed packet loss performance[J].IEEE/ACM Transactions on Networking,2000,8(3):337-349.
-
4Leland W,Taqqu M,Willinger W,et al.On the self-similar nature of Ethernet traffic (extended version)[J].IEEE/ACMTrans.Networking,1994,2(1):1-15.
-
5Paxson V,Floyd S.Wide-area traffic:the failure of Poisson modeling[C]//ACM SIGCOMM'94.London:Morgan Kaufmaun Publisher,1994:257-268.
-
6Willinger W,Taqqu M S,Sherman R,et al.Self-similarity through high-variability:statistical analysis of EthernetLAN traffic at the source level[J].IEEE/ACM Trans.Networking,1997,5(3):71-86.
-
7Michael Jiang,Ljiljana Trajkovic.Impact of Self-similarity On Wireless Data Network Performance[C]// ACM SIGCOMM Helsinki.Finland:Rbeft E.Baensch,2001:477-481.
-
8William Stallings.High-Speed Networks TCP/IP and ATM Design Principles[M].The McGraw-Hill Companies:Prentice-Hall Inc,1998.
-
1赵磊,王丽侠,徐家品.无线传感器网络传输错误统计的测距算法[J].无线电通信技术,2008,34(1):29-31.
-
2袁定莲,冯径,沈晔,张涛.基于自相似的气象数据分类识别方法[J].计算机应用,2015,35(A02):93-97. 被引量:3
-
3刘海泉,罗钧旻,杨盛泉.航天器遥测数据的自相似研究[J].西安工业大学学报,2013,33(3):193-197. 被引量:2
-
4杨立才,沈君,鲍淑娣,魏守水.基于PLR-DTW的ECG身份识别方法[J].生物医学工程学杂志,2013,30(5):976-981. 被引量:2
-
5王峰,蒋凌云,盘仰珂,王汝传.网络自相似指数求解及应用[J].计算机技术与发展,2011,21(5):36-39. 被引量:1
-
6邓虹.变点在软件可靠性分析中的应用论证[J].计算机工程与科学,2007,29(2):116-118.
-
7傅雷扬,王汝传,王海艳,任勋益.R/S方法求解网络流量自相似参数的实现与应用[J].南京航空航天大学学报,2007,39(3):358-362. 被引量:10
-
8刘爱玲,郁梅,蒋刚毅,邵枫,彭宗举.立体视频右视点图像宏块丢失错误隐藏算法[J].光电子.激光,2013,24(8):1576-1583. 被引量:1
-
9赵建秀,王洪国,邵增珍,张岳,丁艳辉.一种基于信息熵的时间序列分段线性表示方法[J].计算机应用研究,2013,30(8):2391-2394. 被引量:13
-
10王志明,谭显胜,袁哲明,伍朝华.自调用支持向量回归和偏最小二乘优化支持向量机参数[J].小型微型计算机系统,2010,31(9):1815-1819. 被引量:3