期刊文献+

无线传感器网络接纳控制方法研究

The Study of Connection Admission Control Method in Wireless Sensor Network
下载PDF
导出
摘要 为了解决无线传感器网络汇聚节点存在的溢出问题,提出了一种新的接纳控制方法(Connection Admission Control based on Wavelet Transform,CACWT).该方法首先结合小波变换降低业务流的突发特性,并且推导了有效带宽边界和溢出概率边界.同时,利用NS2进行仿真实验,深入分析了有效带宽、缓冲区、溢出概率以及链路容量之间的关系.与传统的其他方法相比较,CACWT具有较好的适应性. In order to solve the overflow of aggregation node in wireless sensor network,a novel connection admission control method(Connection Admission Control based on Wavelet Transform,CACWT)is proposed.In this method,the burst characteristic is reduced by wavelet transform at first,and the border of effective bandwidth and overflow probability are derivation.Then,a simulation with NS2 was conducted to research on the relationship among effective bandwidth,buffer,overflow probability and link capacity.Compared to other tradition algorithms,the result shows CACWT has good suitability.
出处 《微电子学与计算机》 CSCD 北大核心 2014年第12期57-60,66,共5页 Microelectronics & Computer
基金 江西省高等学校教学改革研究省级课题(JXJG-12-25-6)
关键词 无线传感器网络 接纳控制 小波 有效带宽 溢出 wireless sensor network connection admission control wavelet effective bandwidth overflow
  • 相关文献

参考文献3

二级参考文献41

  • 1SHENKER S, PARTRIDGE C, GUERIN R. Specification of guaranteed quality of service[C]//RFC 2212, 1997.9.
  • 2RAMAKRISHNAN K, FLOYD S. A Proposal to add explicit congestion notification (ECN) to IP[C]//RFC 2481, 1999.1.
  • 3FLOYD S. Comments on measurement based admission control for controlled load service[C]//Lawrenee Berkeley Labo ratory,July,1996.
  • 4JAMIN S, DANZIGP, SHENKERS, etal. Ameasurement based admission control algorithm for integrated services packet networks[J]. IEEE/ACM Transactions on Networking, 1997, 5(1):56-70.
  • 5BRESLAU L, JAMIN S, SHENKER S. Comment on the performance of measurement-based admission control algorithms [C]//Proeedings of IEEE Infocom, 2000 : 1233- 1242.
  • 6JAMIN S, SHENKER S. Measurement-based admission control algorithm for controlled-load service: a structural examination[C]//University of Michigan, Ann Arbor, MI, Report CSE TR-333 97, 1997.
  • 7GUO L,CROVELLA M, MATTA I. How does TCP generate pseudo self-similarity? [C]//Proceedings of MASCOTS, Cincinnati, OH, 2001.8.
  • 8SIKDAR B,VASTOLA K S. The effect of TCP on the self- similarity of network traffic [C]// Proceedings of the 35th Conference on Information Sciences and Systems, Baltimore, MD, 2001.3.
  • 9VERES A, KENESI Z, MOLNAR S et al. On the propagation of long-rang dependence in the Internet[C]//Proceedings of Acm Sigcomm, Stockholm, Sweden, 2000(9):243-254.
  • 10RYU B. Fractal traffic models for internet simulation[C]// IEEE Symposium on Computers and Communications(ISCC), 2000:200-206.

共引文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部