期刊文献+

无线网络中TCP/NC协议性能分析与仿真验证 被引量:1

Performance Analysis and Simulation Verification of TCP / NC Protocol in Wireless Network
下载PDF
导出
摘要 为改进传统传输控制协议(TCP)在无线网络中的性能,运用Matlab对TCP Reno,TCP Vegas和基于网络编码的TCP/NC吞吐率分析模型进行数值求解,分析3个模型在不同网络环境下应达到的理论值,验证TCP/NC模型在理论上能否提高其吞吐率。基于NS-2对3种吞吐率模型进行仿真,结果表明,TCP/NC及其分析模型可有效改进TCP协议。 In order to improve the traditional Transmission Control Protocol( TCP) performance in wireless networks, this paper solves throughput rate model of three TCP protocols,TCP Reno,TCP Vegas and TCP/NC based on network coding through Matlab,and analyzes the theoretical value of the three models in different networks,and verifies whether TCP/NC model can improve its throughput rate. The three models are simulated through NS-2,and simulation results show the effectiveness of TCP/NC protocol and its analysis model.
出处 《计算机工程》 CAS CSCD 北大核心 2015年第6期71-75,共5页 Computer Engineering
基金 天津市软件产业发展基金资助项目"公交车辆嵌入式3G视频监控系统"(2011E6-0009)
关键词 网络编码 TCP/NC协议 吞吐率模型 协议性能 影响因子 network coding TCP/NC protocol throughput model protocol performance impact factors
  • 相关文献

参考文献16

  • 1Hanbali A A,Altman E,Nain P.A Survey of TCP over Ad Hoc Networks[J].IEEE Communications Surveys&Tutorials,2005,7(3):22-36.
  • 2Ahlswede R,Cai N,Li S Y R,et al.Network Information Flow[J].IEEE Transactions on Information Theory,2000,7(4):1204-1216.
  • 3Yeung R,Li S Y,Cai N,et al.Theory of Network Coding Foundations and Trends[M].[S.1.]:Now Publishers,2006:241-381.
  • 4蒲保兴,杨路明,王伟平.线性网络编码的导出与扩展[J].软件学报,2011,22(3):558-571. 被引量:10
  • 5郝琨,金志刚.一种最小化编码节点的网络编码优化算法[J].电子与信息学报,2011,33(2):260-265. 被引量:17
  • 6俞立峰,杨琼,于娟,沈才樑.防窃听攻击的安全网络编码[J].计算机应用研究,2012,29(3):813-818. 被引量:10
  • 7Fragouli C,Le Boudec J Y,Widmer J.Network Coding:An Instant Primer[J].ACM SIGCOMM Computer Communication Review,2006,36(1):63-68.
  • 8Sundararajan J K,Shah D,Medard M,et al.Network Coding Meets TCP[C]//Proceedings of IEEE INFOCOM’09.Washington D.C.,USA:IEEE Press,2009:280-288.
  • 9Sundararajan J K,Jakubczak S,Medard M,et al.Interfacing Network Coding with TCP:An Implementation[C]//Proceedings of IEEE INFOCOM’10.Washington D.C.,USA:IEEE Press,2010:320-331.
  • 10Sundararajan J K,Kim M,M′edard M,et al.Modeling Network Conded TCP Throughput:A Simple Model and Its Validation[C]//Proceedings of ICST/ACM Valurtools.New York,USA:ACM Press,2011:235-243.

二级参考文献80

  • 1罗明星,杨义先,王励成,钮心忻.抗窃听的安全网络编码[J].中国科学:信息科学,2010,40(2):371-380. 被引量:10
  • 2Yeung R W, Li S-Y R, and Cai N, et al.. Network Coding Theory [M]. Hanover: NOW Publishers Inc, 2006: 12-18.
  • 3Ahlswede R, Cai N, Li S-Y R, and Yeung R W. Network information flow[J]. IEEE Transactions on Information Theory, 2000, 46(4): 1204-1216.
  • 4Kim M, Lima L, Zhao F, Barros J, and Medard M, et al.. On counteracting Byzantine attacks in network coded peer-to-peer networks[J]. IEEE Journal on Selected Areas in Communications: Special Issue on Mission- Critical Infrastructure, 2010, 28(5): 692-702.
  • 5Fragouli C and Soljanin E. Information flow decomposition for network coding [J]. IEEE Transactions on Information Theory, 2006, 52(3): 829-848.
  • 6Langberg M, Sprintson A, and Bruck J. The encoding complexity of network coding[J]. IEEE Transactions on Information Theory, 2006, 52(6): 2386-2397.
  • 7Bhattad K, Ratnakar N, and Koetter R. Minimal network coding for multicast[C]. IEEE International Symposium on Information Theory. Melbourne Australia: IEEE Communication Society, 2005: 1730-1734.
  • 8Kim M, Medard M, and O'Reilly V. Evolutionary approaches to minimizing network coding resources[C]. Proc. of the IEEE INFOCOM 2007. Anchorage, 2007:1991 1999.
  • 9M Kim, Medard M, and O'Reilly U-M. An evolutionary approach to inter-session network coding[C]. Proc. of the IEEE INFOCOM 2009. Rio de Janeiro, 2009: 450-458.
  • 10Koetter R and Medard M. An algebraic approach to network coding[J]. IEEE/ A CM Transactions on Networking, 2003, 11(5): 782-795.

共引文献31

同被引文献15

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部