期刊文献+

NS2错误模型的改进 被引量:2

Improved error model of NS2
下载PDF
导出
摘要 分析了随机变量对NS2错误模型的影响,解释了当随机变量的分布的参数发生变化时,错误模型的丢失率偏离预期值这一现象的原因,并在此基础上通过对NS2错误模型的修正,使得rate_与分布参数的变化无关。最后对修正过的NS2错误模型进行了仿真,仿真结果表明,该修正是有效的、可行的。 The impact of random variable on the error model of NS2 is analysed, and the reason that the loss ratio of error model deviates the pre-specified rate_ when the arguments of distributions changed is explained, and the code of NS2 is modified to make the rate_ has not relevant to these changing. Finally, the revised model is simulated and the results show it is effective and solvable.
出处 《计算机工程与设计》 CSCD 北大核心 2007年第3期569-571,共3页 Computer Engineering and Design
基金 国家自然科学基金项目(60172035 90304018)
关键词 NS2 错误模型 随机变量 均匀分布 指数分布 network simulation-2 error model random variable uniform distribution exponential distribution
  • 相关文献

参考文献8

  • 1Kevin Fall,Kannan Varadhan.The network simulator-ns-2[EB/OL].2005.http://www.isi.edu/nsnam/ns/index.html.
  • 2Lee Sung-Ju,Hsu Julian,Hayashida Russell,et al.Selecting a routing strategy for your Ad Hoc networks[J].Computer Communications,2003,26(7):723-733.
  • 3Qi Biao,He Jian-hua,Yang Zong-kai.Simulation of wireless Ad Hoc routing protocols and its evaluation[J].Huazhong Univ of Sci and Tec (Nature Science Edition),2004,32(8):66-69.
  • 4Li Layuan,Li Chunlin.A QoS-guaranteed multicast routing protocol[J].Computer Communications,2004,27(1):59-69.
  • 5Li Layuan,Li Chunlin.A QoS multicast routing protocol for dynamic group topology[J].Information Science,2004,169(2):113-130.
  • 6Li Layuan,Li Chunlin.A distributed QoS-Aware multicast routing protocol[C].Heidelberg,Germany:Acta Informatica,SpringVerlag,2003.211-233.
  • 7Samir R Das,Charles E Perkins,Elizabeth M Royer.Performance comparison of two on-demand routing protocols for Ad Hoc networks[C].Tel Aviv,Israel:Proceedings of the IEEE Conference on Computer Communications,2000.3-12.
  • 8Kevin Fall,Kannan Varadhan.ns2 manual[EB/OL].2005.http://www.isi.edu/nsnam/ns/doc/ns_doc.pdf.

同被引文献13

  • 1CHEE-YEE CHONG, KUMAR SP. Sensor Networks: Evolution,Opportunities,and Challenges[C].Proceeding of the IEEE,2008,91 (8): 1247- 1256.
  • 2Karlof C, Wagner D. Secure routing in wireless sensor networks: Attacks and countermeasures[ C ]//Proceedings of the 1st IEEE International Workshop on Sensor Network Protocol sand Applications, 2003: 113 - 127.
  • 3Marc Greis.NS Tutorials[EB/OL].http://www.isi.edu/nsnam/ns/tutorial/.
  • 4尤曾录.战术互联网[M].北京:解放军出版社,2010.
  • 5SATRIA M,KOMMINENI J. Quantifying the severity ofblackhole attack in wireless mobile adhoc networks[C]//Second International Symposium(SSCC). Berlin Heidelberg:Springer-Verlag,2014,467:57-67.
  • 6GUNHEE L,WONIL K,KANGSEOK K,et al. An approachto mitigate DoS a ttack based on routing misbehavior inwireless ad hoc networks[J].Peer-to-Peer Networking andApplications,2013(8):684-693.
  • 7MOHANAPRIYA M,KRISHNAMURTHI I. Trust basedDSR routing protocol for mitigating cooperative black holeattacks in ad hoc networks[J].Arabian Journal for Scienceand Engineering,2013,39(3):1825-1833.
  • 8NOUBIR G. On connectivity in ad hoc networks under jammingusing directional antennas and mobility[C]// InternationalConference on Wired/Wireless Internet Communications.LNCS 2957,Berlin,Heidelberg: Springer-Verlag,2004.521-532.
  • 9XU S G,SAADAWI T. Dose IEEE 802.11 MAC protocolwork well in multihop wireless ad hoc networks [J]. IEEECommunications Magazine,2001,39(6):130-137.
  • 10PAUL S. Communications networks for the Force XXI digitizedbattlefield [J]. Mobile Networks and Applications,1999(4):139-155.

引证文献2

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部