期刊文献+

基于嵌入式马氏链的无线自组织网络性能分析 被引量:1

TCP Performance Analysis in Wireless Ad Hoc Network Based on Embedded Markov Chain
下载PDF
导出
摘要 利用再生回报过程与嵌入式马尔可夫链,构造了无线自组织网络的TCP吞吐量分析模型。分析了基于IEEE 802.11的3跳网络中,标准TCP连接、具有累计确认功能的TCP连接的吞吐量。结果表明使用累计确认能显著改善无线自组织网络的TCP性能。该模型与分析方法将有助于进一步理解无线自组织网络的TCP性能与吞吐量计算。 Using renewal and reward theory and Embedded Markov Chain model, a model for TCP performance in W'treless Ad Hoe network was illustrated. The TCP throughput performance achieved by a standard and delayed acknowledge TCP connection over wireless Ad Hoe network was analyzes. The result illustrates that will have a significant throughput if using delayed acknowledgement strategy in TCP connection. The model and the way of analysis will be useful towards the understanding of more complicated scenarios of TCP performance in wireless Ad Hoe network.
作者 张美平 许力
出处 《系统仿真学报》 CAS CSCD 北大核心 2010年第1期266-270,共5页 Journal of System Simulation
基金 国家自然科学基金(60502047) 福建省教育厅基金(JA07043)
关键词 无线自组织网络 再生回报理论 马尔可夫链 TCP性能 Wireless Ad Hoe Networks Renewal and Reward Theory Markov Chain TCP Performance
  • 相关文献

参考文献6

  • 1R W Wolff. Stochastic Modeling and the Theory of Queues [M]. USA: Prentice Hall, 1989.
  • 2K Chert, Y Xue, S Shah, K Nahrstedt. Understanding Bandwidth-delay Product in Mobile Ad Hoc Networks [J]. Special issue on protocol engineering for wired and wirclcss networks, Elsevier Computcr Communications (S0140-3664), 2004, 2700): 923-934.
  • 3K Chert, Y Xue, K Nahrstedt. On Setting TCP's Congestion Window Limit in Mobile Ad Hoc Networks [C]// International Conference on Communications, 2003. USA: IEEE, 11-15 May 2003, 2: 1080- 1084.
  • 4A A Kherani, R Shorey. Throughput Analysis of TCP in Multi-Hop Wireless Networks with IEEE 802.11 MAC [C]// Wireless Communications and Networking Conference, 2004. USA: IEEE, 21-25 March 2004, 1: 237-242.
  • 5A A Kherani, R Shorey. Performance Improvement of TCP with Delayed ACKs in IEEE 802.11 Wireless LANs [C]// Wireless Communications and Networking Conference, 2004. USA: IEEE, 21-25 March 2004, 3: 1703-1708.
  • 6Network Simulator 2 (ns2) [EB/OL]. [2008-7]. http://www.isi, edu/nsnam/ns/, 2004.

同被引文献10

  • 1TAHERI S,HARTUNG S,HOGREFE D.Achieving receiver location privacy in mobile Ad Hoc networks[C]//2010 IEEE Second International Conference on Social Computing.Minneapolis,MN:IEEE,2010:800-807.
  • 2MANJULADEVI V,BHARATHI R J.Efficient anonymous geographic ad Hoc routing[C]//2014 International Conference on Electronics and Communication Systems.[S.l.]:IEEE,2014:1-6.
  • 3BUTTYAN L,HOLCZER T.Perfectly anonymous data aggregation in wireless sensor networks[C]//2010 IEEE 7th International Conference on Mobile Ad Hoc and Sensor Systems.[S.l.]:IEEE,2010:513-518.
  • 4KONG J,HONG X.Anonymous on-demand routing with untraceable routes for mobile Ad Hoc networks[C]//Proceedings of the 4 th ACM International Symposium on Mobile and Ad Hoc Networking and Computing.[S.l.]:ACM,2003:111-117.
  • 5MAKKI S K,REIHER P,MAKKI K,et al.Mobile and wireless network security and privacy[M].Germany:Springer Science&Business Media,2007.
  • 6GUO J,BAUGH J P,WANG S.A group signature based secure and privacy-preserving vehicular communication framework[C]//Mobile Networking for Vehicular Environments.[S.l.]:IEEE,2007:103-108.
  • 7杜君,李伟华,蒋卫华.一种适用于无线自组织网络的安全路由优化算法[J].传感技术学报,2010,23(3):447-452. 被引量:3
  • 8张中科,汪芸.无线自组织网络下抵抗内部节点丢弃报文攻击的安全通信模型[J].计算机学报,2010,33(10):2003-2014. 被引量:7
  • 9王颖,王星魁,彭新光,边婧.高效无线通信匿名认证密钥协商协议[J].计算机工程与设计,2014,35(12):4120-4125. 被引量:1
  • 10付帅,马建峰,李洪涛,姜奇.无线传感器网络中匿名的聚合节点选举协议[J].通信学报,2015,36(2):88-97. 被引量:4

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部