期刊文献+
共找到858篇文章
< 1 2 43 >
每页显示 20 50 100
A Localization Algorithm Using a Mobile Anchor Node Based on Region Determination in Underwater Wireless Sensor Networks 被引量:8
1
作者 XU Tingting WANG Jingjing +2 位作者 SHI Wei WANG Jianfeng CHEN Zhe 《Journal of Ocean University of China》 SCIE CAS CSCD 2019年第2期394-402,共9页
At present, most underwater positioning algorithms improve the positioning accuracy by increasing the number of anchor nodes which resulting in the increasing energy consumption. To solve this problem, the paper propo... At present, most underwater positioning algorithms improve the positioning accuracy by increasing the number of anchor nodes which resulting in the increasing energy consumption. To solve this problem, the paper proposes a localization algorithm assisted by mobile anchor node and based on region determination(LMRD), which not only improves the positioning accuracy of nodes positioning but also reduces the energy consumption. This algorithm is divided into two stages: region determination stage and location positioning stage. In the region determination stage, the target region is divided into several sub-regions by the region division strategy with the smallest overlap rate which can reduce the number of virtual anchor nodes and lock the target node to a sub-region, and then through the planning of mobile nodes to optimize the travel path, reduce the moving distance, and reduce system energy consumption. In the location positioning stage, the target node location can be calculated using the HILBERT path planning and trilateration. The simulation results show that the proposed algorithm can improve the positioning accuracy when the energy consumption is reduced. 展开更多
关键词 UWSN mobile ANCHOR nodeS energy CONSUMPTION REGION determination LOCALIZATION algorithm
下载PDF
基于Node.js,Socket.io和jQuery Mobile的周界入侵检测报警控制系统设计 被引量:2
2
作者 尹延宁 刘太君 叶焱 《数据通信》 2015年第6期42-45,共4页
为解决当前周界入侵检测报警控制系统同底层硬件耦合紧密,硬件控制器功能单一,智能化不足的问题,提出了一种基于云架构和物联网的整体设计方案。依托于云架构,以安卓系统作为硬件控制器,利用web服务器Node.js结合即时通信技术Socket.io... 为解决当前周界入侵检测报警控制系统同底层硬件耦合紧密,硬件控制器功能单一,智能化不足的问题,提出了一种基于云架构和物联网的整体设计方案。依托于云架构,以安卓系统作为硬件控制器,利用web服务器Node.js结合即时通信技术Socket.io实现报警信息的即时推送,通过No SQL数据库Mongo DB进行相关数据储存,前端采用j Query Moble框架实现控制与显示功能。详细阐述了系统的架构、功能和设计方案,为建设新型周界入侵检测报警控制和显示系统提供了新的思路与方向。 展开更多
关键词 node.js Socket.io J QUERY mobile 周界入侵
下载PDF
Node deployment strategy optimization for wireless sensor network with mobile base station 被引量:7
3
作者 龙军 桂卫华 《Journal of Central South University》 SCIE EI CAS 2012年第2期453-458,共6页
The optimization of network performance in a movement-assisted data gathering scheme was studied by analyzing the energy consumption of wireless sensor network with node uniform distribution. A theoretically analytica... The optimization of network performance in a movement-assisted data gathering scheme was studied by analyzing the energy consumption of wireless sensor network with node uniform distribution. A theoretically analytical method for avoiding energy hole was proposed. It is proved that if the densities of sensor nodes working at the same time are alternate between dormancy and work with non-uniform node distribution. The efficiency of network can increase by several times and the residual energy of network is nearly zero when the network lifetime ends. 展开更多
关键词 wireless sensor network mobile base station network optimization energy consumption balancing density ratio of sensor node network lifetime
下载PDF
Grid-Based Localization Mechanism with Mobile Reference Node in Wireless Sensor Networks 被引量:1
4
作者 Kuo-Feng Huang Po-Ju Chen Emery Jou 《Journal of Electronic Science and Technology》 CAS 2014年第3期283-287,共5页
Wireless sensor networks (WSNs) are based on monitoring or managing the sensing area by using the location information with sensor nodes. Most sensor nodes require hardware support or receive packets with location i... Wireless sensor networks (WSNs) are based on monitoring or managing the sensing area by using the location information with sensor nodes. Most sensor nodes require hardware support or receive packets with location information to estimate their locations, which needs lots of time or costs. In this paper we proposed a localization mechanism using a mobile reference node (MRN) and trilateration in WSNs to reduce the energy consumption and location error. The simulation results demonstrate that the proposed mechanism can obtain more unknown nodes locations by the mobile reference node moving scheme and will decreases the energy consumption and average ocation error. 展开更多
关键词 LOCALIZATION mobile sensor node received signal strength indicator wireless sensor networks
下载PDF
Path Planning for Mobile Anchor Node in Localization Based on Ad-Hoc Localization Algorithm 被引量:1
5
作者 蒲石 祁荣宾 +1 位作者 靳文浩 钱锋 《Journal of Donghua University(English Edition)》 EI CAS 2014年第2期212-216,共5页
For mobile anchor node static path planning cannot accord the actual distribution of node for dynamic adjustment. We take advantage of the high localization accuracy and low computational complexity of ad-hoc localiza... For mobile anchor node static path planning cannot accord the actual distribution of node for dynamic adjustment. We take advantage of the high localization accuracy and low computational complexity of ad-hoc localization system( AHLos)algorithm. This article introduces mobile anchor nodes instead of the traditional fixed anchor nodes to improve the algorithm. The result shows that, through introduce the mobile anchor node, the information of initial anchor nodes can be configured more flexible.Meanwhile,with the use of the approximate location and the transition path,the distance and energy consumption of the mobile anchor node is greatly reduced. 展开更多
关键词 mobile anchor node path planning ad-hoc localization system(AHLos) approximate location transition path
下载PDF
Intelligent Multilevel Node Authentication in Mobile Computing Using Clone Node
6
作者 Neha Malhotra Manju Bala 《Computers, Materials & Continua》 SCIE EI 2022年第3期5269-5284,共16页
Nodes in a mobile computing system are vulnerable to clone attacks due to their mobility.In such attacks,an adversary accesses a few network nodes,generates replication,then inserts this replication into the network,p... Nodes in a mobile computing system are vulnerable to clone attacks due to their mobility.In such attacks,an adversary accesses a few network nodes,generates replication,then inserts this replication into the network,potentially resulting in numerous internal network attacks.Most existing techniques use a central base station,which introduces several difficulties into the system due to the network’s reliance on a single point,while other ways generate more overhead while jeopardising network lifetime.In this research,an intelligent double hashing-based clone node identification scheme was used,which reduces communication and memory costs while performing the clone detection procedure.The approach works in two stages:in the first,the network is deployed using an intelligent double hashing procedure to avoid any network collisions and then in the second,the clone node identification procedure searches for any clone node in the network.This first phase verifies the node prior to network deployment,and then,whenever a node wants to interact,it executes the second level of authentication.End-to-end delay,which is bound to increase owing to the injection of clone nodes,and packet loss,which is reduced by the double hashing technique,were used to evaluate the performance of the aforementioned approach. 展开更多
关键词 node authentication clone node mobile computing double hashing fault tolerance
下载PDF
MPLPK:A mobile path localization protocol based on key nodes
7
作者 王佳昊 Bao Honglai +2 位作者 Yang Xiaoming Wang Ruijin Qin Zhiguang 《High Technology Letters》 EI CAS 2015年第2期127-131,共5页
To alleviate the localization error introduced by irregular sensor network deployment, a new mo bile path localization based on key nodes (MPLPK) protocol is proposed. It can recognize all con cave/convex nodes in t... To alleviate the localization error introduced by irregular sensor network deployment, a new mo bile path localization based on key nodes (MPLPK) protocol is proposed. It can recognize all con cave/convex nodes in the network as fixed anchor nodes, and simplify the following localization process based on these key nodes. The MPLPK protocol is composed of three steps. After all key nodes are found in the network, a mobile node applying improved minimum spanning tree (MST) algorithm is introduced to traverse and locate them. By taking the concave/convex nodes as anchors, the complexity of the irregular network can be degraded. And the simulation results demonstrate that MPEPK has 20% to 40% accuracy improvements than connectivity-based and anchor-free three-di- mensional localization (CATL) and approximate convex decomposition based localization (ACDL). 展开更多
关键词 CONCAVE convex node mobile anchor node sensor network LOCALIZATION
下载PDF
(EERSM): Energy-Efficient Multi-Hop Routing Technique in Wireless Sensor Networks Based on Combination between Stationary and Mobile Nodes
8
作者 Fawaz Alassery 《Journal of Computer and Communications》 2019年第4期31-52,共22页
In Wireless Sensor Network (WSNs), sensor nodes collect data and send them to a Base Station (BS) for further processing. One of the most issues in WSNs that researchers have proposed a hundred of technique to solve i... In Wireless Sensor Network (WSNs), sensor nodes collect data and send them to a Base Station (BS) for further processing. One of the most issues in WSNs that researchers have proposed a hundred of technique to solve its impact is the energy constraint since sensor nodes have small battery, small memory and less data processing with low computational capabilities. However, many researches efforts have focused on how to prolong the battery lifetime of sensor nodes by proposing different routing, MAC, localization, data aggregation, topology construction techniques. In this paper, we will focus on routing techniques which aim to prolonging the network lifetime. Hence, we propose an Energy-Efficient Routing technique in WSNs based on Stationary and Mobile nodes (EERSM). Sensing filed is divided into intersected circles which contain Mobile Nodes (MN). The proposed data aggregation technique via the circular topology will eliminate the redundant data to be sent to the Base Station (BS). MN in each circle will rout packets for their source nodes, and move to the intersected area where another MN is waiting (sleep mode) to receive the transmitted packet, and then the packet will be delivered to the next intersected area until the packet is arrived to the BS. Our proposed EERSM technique is simulated using MATLAB and compared with conventional multi-hop techniques under different network models and scenarios. In the simulation, we will show how the proposed EERSM technique overcomes many routing protocols in terms of the number of hops counted when sending packets from a source node to the destination (i.e. BS), the average residual energy, number of sent packets to the BS, and the number of a live sensor nodes verse the simulation rounds. 展开更多
关键词 Energy Efficiency in WSNS Data AGGREGATION of WSNS mobile nodeS in WSNS MULTI-HOP Routing in WSNS Power Efficient Techniques
下载PDF
Energy-Efficient Mobile Data Collection Adopting Node Cooperation in an Underwater Acoustic Sensor Network
9
作者 Yougan Chen Xiaoting Jin Xiaomei Xu 《China Communications》 SCIE CSCD 2017年第6期32-42,共11页
This paper considers an underwater acoustic sensor network with one mobile surface node to collect data from multiple underwater nodes,where the mobile destination requests retransmission from each underwater node ind... This paper considers an underwater acoustic sensor network with one mobile surface node to collect data from multiple underwater nodes,where the mobile destination requests retransmission from each underwater node individually employing traditional automatic-repeat-request(ARQ) protocol.We propose a practical node cooperation(NC) protocol to enhance the collection efficiency,utilizing the fact that underwater nodes can overhear the transmission of others.To reduce the source level of underwater nodes,the underwater data collection area is divided into several sub-zones,and in each sub-zone,the mobile surface node adopting the NC protocol could switch adaptively between selective relay cooperation(SRC) and dynamic network coded cooperation(DNC) .The difference of SRC and DNC lies in whether or not the selected relay node combines the local data and the data overheard from undecoded node(s) to form network coded packets in the retransmission phase.The NC protocol could also be applied across the sub-zones due to the wiretap property.In addition,we investigate the effects of different mobile collection paths,collection area division and cooperative zone design for energy saving.The numerical results showthat the proposed NC protocol can effectively save energy compared with the traditional ARQ scheme. 展开更多
关键词 underwater acoustic sensor networks mobile data collection node cooperation cooperative communications energy efficiency
下载PDF
Cognitive Radio Sensor Node Empowered Mobile Phone for Explosive Trace Detection
10
作者 Swagata Roy Chatterjee Mohuya Chakraborty Jayanta Chakraborty 《International Journal of Communications, Network and System Sciences》 2011年第1期33-41,共9页
Usefulness of sensor network applications in human life is increasing day by day and the concept of wireless connection promises new application areas. Sensor network can be very beneficial in saving human life from t... Usefulness of sensor network applications in human life is increasing day by day and the concept of wireless connection promises new application areas. Sensor network can be very beneficial in saving human life from terrorist attacks causing explosion in certain areas leading to casualties. But realization of the sensor network application in explosive detection requires high scalability of the sensor network and fast transmission of the information through real time monitoring and control. In this paper a novel mechanism for explosive trace detection in any populated area by the use of mobile telephony has been described. The aim is to create a system that will assure common men, local population and above all the nation a secured environment, without disturbing their freedom of movement. It would further help the police in detection of explosives more quickly, isolation of suicide bombers, remediation of explosives manufacturing sites, and forensic and criminal investigation. To achieve this, the paper has projected an idea that can combine the strength of the mobile phones, the polymer sensor and existing cellular network. The idea is to design and embed a tiny cog-nitive radio sensor node into the mobile phone that adapts to the changing environment by analyzing the RF surroundings and adjusting the spectrum use appropriately. The system would be capable of detecting explo-sives within a defined territory. It would communicate the location of the detected explosives to the respec-tive service provider, which in turn would inform the law and enforcement agency or Police. 展开更多
关键词 Cognitive RADIO SENSOR node SENSOR Network EXPLOSIVE Vapor SENSOR Software-Defined RADIO EXPLOSIVE TRACE Detection mobile PHONE
下载PDF
Mobile Fog Computing by Using SDN/NFV on 5G Edge Nodes
11
作者 G.R.Sreekanth S.Ahmed Najat Ahmed +3 位作者 Marko Sarac Ivana Strumberger Nebojsa Bacanin Miodrag Zivkovic 《Computer Systems Science & Engineering》 SCIE EI 2022年第5期751-765,共15页
Abstract:Fog computing provides quality of service for cloud infrastructure.As the data computation intensifies,edge computing becomes difficult.Therefore,mobile fog computing is used for reducing traffic and the time... Abstract:Fog computing provides quality of service for cloud infrastructure.As the data computation intensifies,edge computing becomes difficult.Therefore,mobile fog computing is used for reducing traffic and the time for data computation in the network.In previous studies,software-defined networking(SDN)and network functions virtualization(NFV)were used separately in edge computing.Current industrial and academic research is tackling to integrate SDN and NFV in different environments to address the challenges in performance,reliability,and scalability.SDN/NFV is still in development.The traditional Internet of things(IoT)data analysis system is only based on a linear and time-variant system that needs an IoT data system with a high-precision model.This paper proposes a combined architecture of SDN and NFV on an edge node server for IoT devices to reduce the computational complexity in cloud-based fog computing.SDN provides a generalization structure of the forwarding plane,which is separated from the control plane.Meanwhile,NFV concentrates on virtualization by combining the forwarding model with virtual network functions(VNFs)as a single or chain of VNFs,which leads to interoperability and consistency.The orchestrator layer in the proposed software-defined NFV is responsible for handling real-time tasks by using an edge node server through the SDN controller via four actions:task creation,modification,operation,and completion.Our proposed architecture is simulated on the EstiNet simulator,and total time delay,reliability,and satisfaction are used as evaluation parameters.The simulation results are compared with the results of existing architectures,such as software-defined unified virtual monitoring function and ASTP,to analyze the performance of the proposed architecture.The analysis results indicate that our proposed architecture achieves better performance in terms of total time delay(1800 s for 200 IoT devices),reliability(90%),and satisfaction(90%). 展开更多
关键词 mobile fog computing edge computing edge node IoT softwaredefined networking network functions virtualization orchestrator
下载PDF
A Comprehensive Analysis of Quality of Service (QoS) in ZigBee Network through Mobile and Fixed Node
12
作者 Nazrul Islam Md. Iqbal Hossain Anisur Rahman 《Journal of Computer and Communications》 2022年第3期86-99,共14页
The standard specification of IEEE 802.15.4 is called ZigBee Propocol. ZigBee protocol required security, low data transfer rate, power efficient network. In addition, the ZigBee mobility function makes the ZigBee net... The standard specification of IEEE 802.15.4 is called ZigBee Propocol. ZigBee protocol required security, low data transfer rate, power efficient network. In addition, the ZigBee mobility function makes the ZigBee network more interactive and multi-purpose. The ZigBee mobile node has a significant effect on network parameters, namely MAC delay, end-to-end delay, MAC throughput and network load. However, a particular significant ZigBee node affects network data traffic and reduces the strength of the Quality of Service (QoS). The key issues are to analyze the QoS in order to increase overall performance of the network. The study proposes a ZigBee network with the mobile node and fixed node based on a variety of MAC layer settings. The Riverbed Network Simulator (Academic Modeler Release 17.5) is used for configuring and simulating the ZigBee network in a variety of conditions. The simulation results show that ZigBee with a fixed node performs better than the ZigBee mobile node. The ZigBee network with fixed node produces a lower network load and a high ratio of successfully transmitted data. The analysis of this study allows the ZigBee network to be better designed. 展开更多
关键词 WAPNs ZIGBEE IOT QOS mobile node
下载PDF
Heuristic Expanding Disconnected Graph:A Rapid Path Planning Method for Mobile Robots
13
作者 Yong Tao Lian Duan +3 位作者 He Gao Yufan Zhang Yian Song Tianmiao Wang 《Chinese Journal of Mechanical Engineering》 SCIE EI CAS CSCD 2024年第2期68-82,共15页
Existing mobile robots mostly use graph search algorithms for path planning,which suffer from relatively low planning efficiency owing to high redundancy and large computational complexity.Due to the limitations of th... Existing mobile robots mostly use graph search algorithms for path planning,which suffer from relatively low planning efficiency owing to high redundancy and large computational complexity.Due to the limitations of the neighborhood search strategy,the robots could hardly obtain the most optimal global path.A global path planning algorithm,denoted as EDG*,is proposed by expanding nodes using a well-designed expanding disconnected graph operator(EDG)in this paper.Firstly,all obstacles are marked and their corners are located through the map pre-processing.Then,the EDG operator is designed to find points in non-obstruction areas to complete the rapid expansion of disconnected nodes.Finally,the EDG*heuristic iterative algorithm is proposed.It selects the candidate node through a specific valuation function and realizes the node expansion while avoiding collision with a minimum offset.Path planning experiments were conducted in a typical indoor environment and on the public dataset CSM.The result shows that the proposed EDG*reduced the planning time by more than 90%and total length of paths reduced by more than 4.6%.Compared to A*,Dijkstra and JPS,EDG*does not show an exponential explosion effect in map size.The EDG*showed better performance in terms of path smoothness,and collision avoidance.This shows that the EDG*algorithm proposed in this paper can improve the efficiency of path planning and enhance path quality. 展开更多
关键词 Global path planning mobile robot Expanding disconnected graph Edge node OFFSET
下载PDF
基于Node.js中间层Web开发的研究与实现——以微信图书借阅平台为例 被引量:7
14
作者 仇晶 黄岩 柴瑜晗 《河北工业科技》 CAS 2017年第2期118-124,共7页
针对Web研发领域一直面临前后端耦合问题,在充分分析传统的互联网前后端Web软件开发的基础上,提出了引入Node.js作为中间层来解除前、后端之间耦合关系的新解决方案。设计了新的架构模式指导Web软件开发,从而达到提高开发效率、提升代... 针对Web研发领域一直面临前后端耦合问题,在充分分析传统的互联网前后端Web软件开发的基础上,提出了引入Node.js作为中间层来解除前、后端之间耦合关系的新解决方案。设计了新的架构模式指导Web软件开发,从而达到提高开发效率、提升代码灵活性、明确开发人员工作职责等目的。基于此研究,真实开发了一个基于微信的图书借阅平台,并以此作为可行性检验的依据,该图书借阅平台使用微信作为前端执行环境,提供图书借阅、图书归还、图书入库、图书浏览功能。系统采用B/S架构,Node.js中间层和后端程序在服务器中运行,用户关注微信公众号后,可以通过微信聊天窗口接收服务器端讯息,也可以通过公众号菜单导航到前端界面,完成图书借阅分享操作,交互方式高效简洁。 展开更多
关键词 计算机网络 Web开发方法 耦合与解耦 node.js 中间层 移动终端
下载PDF
MobileIP的无线/有线网络通信模拟分析 被引量:1
15
作者 周书民 汤彬 孙亚民 《计算机工程》 EI CAS CSCD 北大核心 2006年第12期107-108,111,共3页
采用NS对MobileIP在无线网络和有线网络之间的通信过程进行模拟分析。建立了含有5个有线结点、2个基站和1个移动结点的拓扑结构,对移动结点的通信路径和过程进行了模拟和分析。在模拟中,可以通过修改参数,如TCP的数据包大小、网络队列... 采用NS对MobileIP在无线网络和有线网络之间的通信过程进行模拟分析。建立了含有5个有线结点、2个基站和1个移动结点的拓扑结构,对移动结点的通信路径和过程进行了模拟和分析。在模拟中,可以通过修改参数,如TCP的数据包大小、网络队列的类型选择,来获得不同网络方案的对比资料。通过模拟反过来也能为系统的布置、配置提供很好的参考。 展开更多
关键词 mobileIP NS 移动结点 家乡代理 外部代理
下载PDF
MobileIP切换的实验研究
16
作者 何晓英 张轶博 雷振明 《高技术通讯》 EI CAS CSCD 2002年第11期12-16,共5页
首先简要介绍了MobileIP及其切换原理 ,然后通过具体实验分析了MobileIP切换对传输层协议 (TCP和UDP)造成的影响。实验主要测试了切换对TCP造成的影响 ,并由此类推出对UDP的影响。最后讨论了可行的改进措施 ,重点讨论了如何减少MobileI... 首先简要介绍了MobileIP及其切换原理 ,然后通过具体实验分析了MobileIP切换对传输层协议 (TCP和UDP)造成的影响。实验主要测试了切换对TCP造成的影响 ,并由此类推出对UDP的影响。最后讨论了可行的改进措施 ,重点讨论了如何减少MobileIP切换时的分组丢失和时延。 展开更多
关键词 实验研究 mobile IP TCP UDP 移动节点 家乡代理 外地代理 切换原理 Internet 移动计算 移动通信
下载PDF
一种基于VMN的移动IP快速切换方法
17
作者 石东海 赵磊 唐朝京 《国防科技大学学报》 EI CAS CSCD 北大核心 2006年第5期35-41,共7页
为了满足用户对移动IP服务的安全性、低时延方面的要求,弥补现有移动IPv4协议中切换方案的不足,在移动IP/AAA模型的基础上,提出了一种基于VMN(虚拟移动节点)的移动IP快速切换方法。该方法增强了移动IP联合AAA的基本模型,并在MA(移动代理... 为了满足用户对移动IP服务的安全性、低时延方面的要求,弥补现有移动IPv4协议中切换方案的不足,在移动IP/AAA模型的基础上,提出了一种基于VMN(虚拟移动节点)的移动IP快速切换方法。该方法增强了移动IP联合AAA的基本模型,并在MA(移动代理)上构建了一种新的数据结构;通过在NFA和OFA之间建立一个新的双向隧道,将VMN中的数据报文进行快速转移,在没有数据报文丢失的情况下,实现了快速低时延的切换;通过分发新的临时安全关联以及认证票据,有效地提高了移动IP在注册和切换过程中的安全,同时有效地降低了AAAH和AAAF之间的网络负载;通过对该方法进行安全性分析和仿真试验表明,我们提交的方法是安全有效的。 展开更多
关键词 虚拟移动节点 移动IP 认证票据 低时延切换
下载PDF
IPSec在Mobile-IP中的应用
18
作者 陈勇康 王循 张卫 《上海理工大学学报》 CAS 北大核心 2002年第1期83-86,共4页
主要论述了IPSec在Mobile-IP中的应用,先分析了Mobile-IP的安全弱点,随后从移动结点的注册请求、隧道通信数据的保密性、数据完整性校验等角度给出了基于IPSec的解决方案.
关键词 IPSEC mobile-IP 认证 宿主代理 移动结点 外部代理
下载PDF
基于Mobile IP的WLAN/GPRS融合网络
19
作者 解觯 徐国鑫 张平 《世界电信》 2003年第8期38-41,共4页
首先比较了WLAN和GPRS两种技术的特点;接着提出了一种基于Mobile IP的支持WLAN/GPRS网络无缝漫游的融合方案,它利用WLAN网络与GPRS网络在技术上的互补性,可快速为用户提供支持无缝漫游的数据业务。此方案基于如下基本思想:尽量不对GPRS... 首先比较了WLAN和GPRS两种技术的特点;接着提出了一种基于Mobile IP的支持WLAN/GPRS网络无缝漫游的融合方案,它利用WLAN网络与GPRS网络在技术上的互补性,可快速为用户提供支持无缝漫游的数据业务。此方案基于如下基本思想:尽量不对GPRS网络做任何修改,而主要通过对WLAN网络结构进行调整来实现两者的融合。在描述此方案的主要工作流程时,包括以下方面的内容:移动接点接入/附着、WLAN和GPRS的漫游,GPRS到WLAN的漫游、WLAN网络可用性的判断、计费等。 展开更多
关键词 WLAN GPRS mobile IP 网络融合 无缝漫游 移动接点
下载PDF
一种基于MN移动特征的MAP选取算法 被引量:2
20
作者 朱小丽 刘小甜 《计算机工程》 CAS CSCD 北大核心 2008年第21期78-80,共3页
在分级移动IPv6(HMIPv6)中,MAP选取的不合理往往会造成移动节点(MN)通信服务延时增加和MAP负载过于集中。该文综合考虑了MN的移动速度、移动轨迹等因素,提出一种新的基于MN移动特征的MAP选择算法。仿真结果表明,该算法能够根据MN的运动... 在分级移动IPv6(HMIPv6)中,MAP选取的不合理往往会造成移动节点(MN)通信服务延时增加和MAP负载过于集中。该文综合考虑了MN的移动速度、移动轨迹等因素,提出一种新的基于MN移动特征的MAP选择算法。仿真结果表明,该算法能够根据MN的运动特征和网络当前拓扑结构特点来选取移动代理MAP,有效地降低了MN的服务延时,更合理地利用了HMIPv6网络中的MAP资源。 展开更多
关键词 延时 移动节点 轨迹
下载PDF
上一页 1 2 43 下一页 到第
使用帮助 返回顶部