期刊文献+

多源多中继无线网络中基于随机线性网络编码的调度方案 被引量:6

Scheduling Scheme for Multi-source Multi-relay Wireless Network Based on Random Linear Network Coding
下载PDF
导出
摘要 现有多中继无线网络中传输调度方案主要针对单信源且转发链路状态相同的情况,多采用顺序转发的调度方式,传输效率较低。针对此问题,该文提出一种基于随机线性网络编码的优先级调度方案。该方案在不同的传输阶段,利用信息包接收状态或编码向量之间的线性关系生成反馈信息,计算中继节点的有效信息包数。在转发链路状态不同的情况下,综合考虑各中继节点的有效信息与链路传输可靠性,确定优先级,从而完成调度。该方案实现了多中继对多信源信息的协同转发,在转发链路状态差异较大时,能自适应地选择最优转发节点和路径,提高信息包的传输成功率。仿真结果表明,相比传统基于单信源或顺序调度的方案,该方案能有效提高网络吞吐量,减少重传次数。 Current scheduling schemes in multi-relay wireless network mainly focuse on single source wireless network with the same link status. Furthermore, the sequential-forward scheduling scheme is used usually, and the transmission efficiency is comparatively low. To solve this problem, a priority scheduling scheme based on random linear network coding is proposed. In different transmission stages, the feedback information is generated according to the packets accepting state or the linear relation among the encoding vectors. The number of the effective packets of the corresponding relay node is calculated. In the condition of different link status, the effective information of each relay node and the link transmission reliability is taken into consideration comprehensively to generate the priority index and complete scheduling. This scheme can realize cooperation transmission in multi-relays for multi-sources information. When the link status difference is obvious, the optimal forwarding node and the path can be adaptively chosen to improve the information transmission efficiency. According to the simulation results, this scheme can effectively improve network throughput and reduce the number of retransmission compared with the traditional scheduling schemes for single source wireless network.
出处 《电子与信息学报》 EI CSCD 北大核心 2017年第3期532-538,共7页 Journal of Electronics & Information Technology
基金 国家高技术研究发展计划(2015AA01A705) 国家自然科学基金(61571375)~~
关键词 无线网络 随机线性网络编码 调度 多源多中继 Wireless network Random linear network coding Scheduling Multiple-source multiple-relay
  • 相关文献

参考文献2

二级参考文献27

  • 1Shin Seungwon and Gu Guofei. Conficker and beyond: alarge-scale empirical study[C]. Proceedings of 2010 AnnualComputer Security Applications Conference (ACSAC’10),Austin, Texas, USA, 2010: 151-160.
  • 2Chia Yuan-cho, Juan Caballero, Grier C, et al.. Insights fromthe inside: a view of botnet management from infiltration[C].Proceedings of the USENIX Workshop on Large-ScaleExploits and Emergent Threats (LEET), San Jose, CA, USA,2010: 1-8.
  • 3Yen T F and Reiter M K. Are your hosts trading or plotting?telling P2P file-sharing and bots apart[C]. IEEE 30thInternational Conference on Distributed Computing Systems(ICDCS), Genoa, Italy, 2010: 241-252.
  • 4Wang Ping, Sparks S, and Zou C. An advanced hybridpeer-to-peer botnet[J]. IEEE Transactions on Dependableand Secure Computing, 2010, 7(2): 113-127.
  • 5Lemos R. Bot software looks to improve peer-age[OL].http:// www.securityfocus.com/ news/11390, 2006.
  • 6Holz T, Steiner M, Dahl F, et al.. Measurements andmitigation of peer-to-peer-based botnets: a case study onstorm worm[C]. Proceedings of the First USENIX Workshopon Large-Scale Exploits and Emergent Threats (LEET’08),San Francisco, CA, USA, 2008: 88-96.
  • 7Wang Ying, Jin Zhi-gang, and Zhang Wei. Analysis of botnetattack and defense technology[C]. Computer Science andService System (CSSS), Pairs, France, 2011: 3021-3023.
  • 8Baecher P, Koetter M, Holz T, et al.. The nepenthes platform:an efficient approach to collect malware[C]. Proceedings ofInternational Symposium on Recent Advances in IntrusionDetection (RAID’06), Hamburg, September 2006, Vol. 4219:165-184.
  • 9Rajab M, Zarfoss J, Monrose F, et al.. A multi-facetedapproach to understanding the botnet phenomenon[C].Proceedings of ACM SIGCOMM/USENIX InternetMeasurement Conference (IMC’06), Brazil, October 2006:41-52.
  • 10Barford P and Yegneswaran V. An inside look at botnets[C].Special Workshop on Malware Detection, Advances inInformation Security, Berlin, Germany, 2006: 171-191.

共引文献17

同被引文献34

引证文献6

二级引证文献15

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部