期刊文献+
共找到374篇文章
< 1 2 19 >
每页显示 20 50 100
The Network Architecture and Protocols for Distributed Virtual Environment
1
作者 杨永高 潘启敬 《Journal of Modern Transportation》 1998年第2期9-22,共14页
In this paper, the properties of distributed virtual environment (DVE) and the requirements on computer networks is briefly reviewed. A multicast protocol, called sender initiated grouping multicast protocol for DVE... In this paper, the properties of distributed virtual environment (DVE) and the requirements on computer networks is briefly reviewed. A multicast protocol, called sender initiated grouping multicast protocol for DVE (SIGMP), is proposed. This new multicast protocol is based on a novel concept, multicast group (MG), which divides all participants in a DVE system into groups, among which there is a multicast group trustee (MGT) node to manage the group. The protocol provides unreliable/reliable, totally ordered and multiple to multiple multicast transmission service for DVE systems without sacrificing the communication efficiency heavily. At the same time, reliable unicast and one to multiple multicast transmission services are also supported. The performance analysis of the new protocols is also presented. Based on SIGMP, a simple demonstration of DVE system is designed and implemented. This demo system is running on several SGI workstations connected by a FDDI and Ethernet network. 展开更多
关键词 distributed virtual environments computer networks protocols MULTICAST
下载PDF
Quantum key distribution series network protocol with M-classical Bobs 被引量:3
2
作者 张现周 公伟贵 +2 位作者 谭勇刚 任振忠 郭笑天 《Chinese Physics B》 SCIE EI CAS CSCD 2009年第6期2143-2148,共6页
Secure key distribution among classical parties is impossible both between two parties and in a network. In this paper, we present a quantum key distribution (QKD) protocol to distribute secure key bits among one qu... Secure key distribution among classical parties is impossible both between two parties and in a network. In this paper, we present a quantum key distribution (QKD) protocol to distribute secure key bits among one quantum party and numerous classical parties who have no quantum capacity. We prove that our protocol is completely robust, i.e., any eavesdropping attack should be detected with nonzero probability. Our calculations show that our protocol may be secure against Eve's symmetrically individual attack. 展开更多
关键词 quantum key distribution symmetrical attack network protocol
下载PDF
Distributed In-Time Multiple Coverage Holes Healing Protocol
3
作者 Lin-Na Wei Zhi-Guang Qin 《Journal of Electronic Science and Technology》 CAS 2012年第2期185-191,共7页
Coverage holes often appear in wireless sensor networks due to sensor failure or the inheritance of sensor's random distribution. In the hybrid model, mobile sensors in the network are acquired to heal coverage holes... Coverage holes often appear in wireless sensor networks due to sensor failure or the inheritance of sensor's random distribution. In the hybrid model, mobile sensors in the network are acquired to heal coverage holes by their mobifity. When multiple coverage holes appear in the sensor network and each of them has a time requirement (in which the coverage hole has to be healed), conflicts for the requests of the same mobile sensor may arise. A distributed multiple mobile sensor schedufing protocol (DMS) is proposed in this paper to solve this problem by finding mobile sensors in the time response zone defined by the time requirement of each coverage hole. Simulation results show that DMS can well schedule the mobile sensors to move to multiple coverage holes within the time requirement. 展开更多
关键词 Coverage bole distributed protocol mobile sensor dispatch sensor network time limited.
下载PDF
Quantum Key Distribution Network Based on Differential Phase Shift 被引量:5
4
作者 王婉莹 王川 +1 位作者 文凯 龙桂鲁 《Chinese Physics Letters》 SCIE CAS CSCD 2007年第6期1463-1466,共4页
Using a series of quantum correlated photon pairs, we propose a theoretical scheme for any-to-any multi-user quantum key distribution network based on differential phase shift. The differential phase shift and the dif... Using a series of quantum correlated photon pairs, we propose a theoretical scheme for any-to-any multi-user quantum key distribution network based on differential phase shift. The differential phase shift and the different detection time slots ensure the security of our scheme against eavesdropping. We discuss the security under the intercept-resend attack and the source replacement attack. 展开更多
关键词 SECURE DIRECT COMMUNICATION distributION protocol OPTICAL networkS BELLTHEOREM CRYPTOGRAPHY ENTANGLEMENT STATES
下载PDF
Principles of Network Security Protocols Based on Dynamic Address Space Randomization 被引量:1
5
作者 Vladimir Krylov Kirill Kravtsov 《通讯和计算机(中英文版)》 2016年第2期77-89,共13页
关键词 网络安全协议 地址空间 随机化 网络安全解决方案 原理 软件解决方案 网络节点 网络地址
下载PDF
Adaptive Multi-Cost Routing Protocol to Enhance Lifetime for Wireless Body Area Network
6
作者 Muhammad Mateen Yaqoob Waqar Khurshid +4 位作者 Leo Liu Syed Zulqarnain Arif Imran Ali Khan Osman Khalid Raheel Nawaz 《Computers, Materials & Continua》 SCIE EI 2022年第7期1089-1103,共15页
Wireless Body Area Network(WBAN)technologies are emerging with extensive applications in several domains.Health is a fascinating domain of WBAN for smart monitoring of a patient’s condition.An important factor to con... Wireless Body Area Network(WBAN)technologies are emerging with extensive applications in several domains.Health is a fascinating domain of WBAN for smart monitoring of a patient’s condition.An important factor to consider in WBAN is a node’s lifetime.Improving the lifetime of nodes is critical to address many issues,such as utility and reliability.Existing routing protocols have addressed the energy conservation problem but considered only a few parameters,thus affecting their performance.Moreover,most of the existing schemes did not consider traffic prioritization which is critical in WBANs.In this paper,an adaptive multi-cost routing protocol is proposed with a multi-objective cost function considering minimum distance from sink,temperature of sensor nodes,priority of sensed data,and maximum residual energy on sensor nodes.The performance of the proposed protocol is compared with the existing schemes for the parameters:network lifetime,stability period,throughput,energy consumption,and path loss.It is evident from the obtained results that the proposed protocol improves network lifetime and stability period by 30%and 15%,respectively,as well as outperforms the existing protocols in terms of throughput,energy consumption,and path loss. 展开更多
关键词 Multi-cost routing protocol network lifetime wireless body area network adaptive routing residual energy CLUSTERING poisson distribution
下载PDF
Fast and scalable routing protocols for data center networks
7
作者 Mihailo Vesovic Aleksandra Smiljanic Dusan Kostic 《Digital Communications and Networks》 SCIE CSCD 2023年第6期1340-1350,共11页
Data center networks may comprise tens or hundreds of thousands of nodes,and,naturally,suffer from frequent software and hardware failures as well as link congestions.Packets are routed along the shortest paths with s... Data center networks may comprise tens or hundreds of thousands of nodes,and,naturally,suffer from frequent software and hardware failures as well as link congestions.Packets are routed along the shortest paths with sufficient resources to facilitate efficient network utilization and minimize delays.In such dynamic networks,links frequently fail or get congested,making the recalculation of the shortest paths a computationally intensive problem.Various routing protocols were proposed to overcome this problem by focusing on network utilization rather than speed.Surprisingly,the design of fast shortest-path algorithms for data centers was largely neglected,though they are universal components of routing protocols.Moreover,parallelization techniques were mostly deployed for random network topologies,and not for regular topologies that are often found in data centers.The aim of this paper is to improve scalability and reduce the time required for the shortest-path calculation in data center networks by parallelization on general-purpose hardware.We propose a novel algorithm that parallelizes edge relaxations as a faster and more scalable solution for popular data center topologies. 展开更多
关键词 Routing protocols Data center networks Parallel algorithms distributed algorithms Algorithm design and analysis Shortest-path problem SCALABILITY
下载PDF
802.11 Mesh network中WBDMR分布式路由协议的研究
8
作者 刘伟 吴宇红 《电子科技》 2006年第3期39-42,47,共5页
提出了一种适用于中等规模的802.11Meshnetwork网络的无线分布式路由协议(WBDMR)。该协议借鉴了基于Ad-Hoc的ADOV协议并进行了改造,实现了不同BSS(基本服务集)间无线客户端通过无线中继相互通信。利用节点间交换链路损耗信息实现了动态... 提出了一种适用于中等规模的802.11Meshnetwork网络的无线分布式路由协议(WBDMR)。该协议借鉴了基于Ad-Hoc的ADOV协议并进行了改造,实现了不同BSS(基本服务集)间无线客户端通过无线中继相互通信。利用节点间交换链路损耗信息实现了动态负载平衡、有效地抑制了冗余路由信息的传播、消除了路由环路、建立了备份路由。仿真结果表明,WBDMR协议具有较好的路由特性和时延特性。 展开更多
关键词 网中网 分布式路由协议 有线接入点
下载PDF
一种基于DNP3协议的IFAR攻击检测算法 被引量:1
9
作者 李彤馨 王勇 +2 位作者 邹春明 田英杰 周宇昊 《微型电脑应用》 2022年第11期1-5,共5页
分布式网络协议(DNP3)是现代监控和数据采集网络协议之一,是主设备和从设备之间进行通信的双向协议。为了提高可靠性,DNP3在其应用层中包含了传输功能。因为DNP3并未考虑安全机制,所以它很容易遭受到攻击。基于DNP3的通信系统,文章搭建... 分布式网络协议(DNP3)是现代监控和数据采集网络协议之一,是主设备和从设备之间进行通信的双向协议。为了提高可靠性,DNP3在其应用层中包含了传输功能。因为DNP3并未考虑安全机制,所以它很容易遭受到攻击。基于DNP3的通信系统,文章搭建了Pfsense防火墙,并结合Snort进行攻击检测,采用孤立森林与关联规则算法(IFAR),将数据分为异常与非异常,并将异常数据处理为强规则,扩充入侵检测系统。测试结果表明,该算法能有效检测异常攻击,检测率可达到93.35%。 展开更多
关键词 分布式网络协议 网络攻击 防火墙 关联规则
下载PDF
DNP3.0规约在发电厂监控系统中的应用 被引量:1
10
作者 常学科 白兴海 《宁夏电力》 2013年第4期49-52,共4页
针对传统远动规约在目前电厂、变电站等大型数据采集与监控系统中,遥控规约存在响应速度慢,报文丢失等诸多问题,在电厂监控系统中采用了分布式网络规约DNP3.0,以满足大型监控系统的技术要求。应用结果表明:DNP3.0规约的应用层设置以及... 针对传统远动规约在目前电厂、变电站等大型数据采集与监控系统中,遥控规约存在响应速度慢,报文丢失等诸多问题,在电厂监控系统中采用了分布式网络规约DNP3.0,以满足大型监控系统的技术要求。应用结果表明:DNP3.0规约的应用层设置以及灵活的数据处理机制可为大型数据采集与监控提供经济、灵活、可靠的解决方案。 展开更多
关键词 规约 dnp 监控系统
下载PDF
acSB:Anti-Collision Selective-Based Broadcast Protocol in CRAdHocs
11
作者 Yueyue Li Zhong Huang +1 位作者 Yugang Ma Guangjun Wen 《Computers, Materials & Continua》 SCIE EI 2018年第7期35-46,共12页
As a fundamental operation in ad hoc networks,broadcast could achieve efficient message propagations.Particularl y in the cognitive radio ad hoc network where unlicensed users have different sets of available channels... As a fundamental operation in ad hoc networks,broadcast could achieve efficient message propagations.Particularl y in the cognitive radio ad hoc network where unlicensed users have different sets of available channels,broadcasts are carried out on multiple channels.Accordingly,channel selection and collision avoidance are challenging issues to balance the efficiency against the reliability of broadcasting.In this paper,an anticollision selective broadcast protocol,called acSB,is proposed.A channel selection algorithm based on limited neighbor information is considered to maximize success rates of transmissions once the sender and receiver have the same channel.Moreover,an anticollision scheme is adopted to avoid simultaneous rebroadcasts.Consequently,the proposed broadcast acSB outperforms other approaches in terms of smaller transmission delay,higher message reach rate and fewer broadcast collisions evaluated by simulations under different scenarios. 展开更多
关键词 Broadcast protocol selective protocol collision avoidance distributed data dissemination cognitive radio ad hoc network
下载PDF
Unweighted Voting Method to Detect Sinkhole Attack in RPL-Based Internet of Things Networks
12
作者 Shadi Al-Sarawi Mohammed Anbar +2 位作者 Basim Ahmad Alabsi Mohammad Adnan Aladaileh Shaza Dawood Ahmed Rihan 《Computers, Materials & Continua》 SCIE EI 2023年第10期491-515,共25页
The Internet of Things(IoT)consists of interconnected smart devices communicating and collecting data.The Routing Protocol for Low-Power and Lossy Networks(RPL)is the standard protocol for Internet Protocol Version 6(... The Internet of Things(IoT)consists of interconnected smart devices communicating and collecting data.The Routing Protocol for Low-Power and Lossy Networks(RPL)is the standard protocol for Internet Protocol Version 6(IPv6)in the IoT.However,RPL is vulnerable to various attacks,including the sinkhole attack,which disrupts the network by manipulating routing information.This paper proposes the Unweighted Voting Method(UVM)for sinkhole node identification,utilizing three key behavioral indicators:DODAG Information Object(DIO)Transaction Frequency,Rank Harmony,and Power Consumption.These indicators have been carefully selected based on their contribution to sinkhole attack detection and other relevant features used in previous research.The UVM method employs an unweighted voting mechanism,where each voter or rule holds equal weight in detecting the presence of a sinkhole attack based on the proposed indicators.The effectiveness of the UVM method is evaluated using the COOJA simulator and compared with existing approaches.Notably,the proposed approach fulfills power consumption requirements for constrained nodes without increasing consumption due to the deployment design.In terms of detection accuracy,simulation results demonstrate a high detection rate ranging from 90%to 100%,with a low false-positive rate of 0%to 0.2%.Consequently,the proposed approach surpasses Ensemble Learning Intrusion Detection Systems by leveraging three indicators and three supporting rules. 展开更多
关键词 Internet of Things IPv6 over low power wireless personal area networks Routing protocol for Low-Power and Lossy networks Internet protocol Version 6 distributed denial of service wireless sensor networks
下载PDF
Practical Timing Synchronization for Network Dynamics in Large Machine-to-Machine Networks
13
作者 Lei Gu Shih-Chun Lin 《China Communications》 SCIE CSCD 2016年第10期160-168,共9页
Efficient multi-machine cooperation and network dynamics still remain open that jeopardize great applications in largescale machine-to-machine(M2M) networks. Among all possible machine cooperation controls, to synchro... Efficient multi-machine cooperation and network dynamics still remain open that jeopardize great applications in largescale machine-to-machine(M2M) networks. Among all possible machine cooperation controls, to synchronize tremendous machines in a timing-efficient brings one of the greatest challenge and serves as the foundation for any other network control policies. In this paper, we propose a linear-time synchronization protocol in large M2M networks. Specifically, a closed-form of synchronization rate is provided by developing the statistical bounds of the second smallest eigenvalue of the graph Laplacian matrix. These bounds enable the efficient control of network dynamics, facilitating the timing synchronization in networks. Through a practical study in Metropolis, simulation results confirm our theoretical analysis and provide effective selection of wireless technologies, including Zigbee, Wi-Fi, and cellular systems, with respect to the deployed density of machines. Therefore, this paper successfully demonstrates a practical timing synchronization, to make a breakthrough of network dynamic control in real-world machine systems, such as Internet of Things. 展开更多
关键词 timing synchronization network dynamics graph Laplacian matrix distributed protocol internet of things(IoTs) machine-to-machine(M2M) communications
下载PDF
IMPLEMENTING SECURITY FOR ACTIVE NETWORKS IN INTERNET
14
作者 Tang Yin Wang Weiran (College of Electronic Engineering, UEST of China, Chengdu 610054) 《Journal of Electronics(China)》 2003年第4期305-308,共4页
Active networks is primarily a Defense Advanced Research Projects Agency(DARPA)-funded project focusing on the research of mechanisms, applications, and operating systems to develop a reconfigurable network infrastruc... Active networks is primarily a Defense Advanced Research Projects Agency(DARPA)-funded project focusing on the research of mechanisms, applications, and operating systems to develop a reconfigurable network infrastructure. This letter proposes an Secure Active Tracing System (SATS) to implementing security for active networking in Internet. Unlike currently existing schemes, SATS reduces the computational overloads by executing the filtering operation on selected packet streams only when needed. 展开更多
关键词 Active networks SECURITY distributed Denial of Service (DDoS) Active network Backbone(ABone) Active network Transport System(ANTS) Active Signaling protocol (ASP)
下载PDF
A Dedicated MAC Protocol Package for Real-Time Ocean Current Field Estimation Using Distributed Underwater Acoustic Sensor Networks
15
作者 Hao Chen Huifang Chen +1 位作者 Lei Xie Kuang Wang 《Journal of Communications and Information Networks》 CSCD 2019年第3期71-79,共9页
Distributed underwater acoustic sensor networks(UASNs)are envisioned in real-time ocean current velocity estimation.However,UASNs at present are still dominated by post-processing partially due to the complexity of on... Distributed underwater acoustic sensor networks(UASNs)are envisioned in real-time ocean current velocity estimation.However,UASNs at present are still dominated by post-processing partially due to the complexity of on-line detection for travel times and lack of dedicated medium access control(MAC)protocols.In this study,we propose a dedicated MAC protocol package for real-time ocean current velocity estimation using distributed UASNs.First,we introduce the process and requirements of ocean current velocity estimation.Then,we present a series of spatial reuse time division multiple access(TDMA)protocols for each phase of real-time ocean current field estimation using distributed UASNs,followed by numerical analysis.We divide UASNs into two categories according to their computing ability:feature-complete and feature-incomplete systems.The feature-complete systems that have abundant computing ability carry out the presented MAC protocol package in three phases,whereas the feature-incomplete ones do not have enough computing ability and the presented MAC protocol package is reduced to two phases plus an additional downloading phase.Numerical analysis shows that feature-complete systems using mini-slot TDMA have the best real-time performance,in comparison with feature-incomplete systems and other feature-complete counterparts.Feature-incomplete systems are more energy-saving than feature-complete ones,owing to the absence of in-network data exchange. 展开更多
关键词 distributed underwater acoustic sensor networks ocean current dedicated medium access control protocol package spatial reuse time division multiple access REAL-TIME
原文传递
基于D2D通信和虚拟MIMO的飞行器集群网络传输方案设计
16
作者 刘志峰 张雪 +4 位作者 栗苹 张继豪 李思琪 王卫东 龚鹏 《兵工学报》 EI CAS CSCD 北大核心 2024年第4期1141-1147,共7页
在无中心飞行器集群网络中,非直通条件节点间不同的中继路径可能导致较大路径损耗落差,为有限资源前提下网络传输能力的提升带来困难。参考5G移动通信中的终端直通(Device to Device,D2D)技术与中继通信中的虚拟多输入多输出(Multiple-I... 在无中心飞行器集群网络中,非直通条件节点间不同的中继路径可能导致较大路径损耗落差,为有限资源前提下网络传输能力的提升带来困难。参考5G移动通信中的终端直通(Device to Device,D2D)技术与中继通信中的虚拟多输入多输出(Multiple-Input Multiple-Output,MIMO)技术,提出一套D2D通信与虚拟MIMO技术结合的无中心飞行器集群网络传输方案。重点研究在正交资源模式下,将不同的协作传输协议与空时编码进行组合,在信噪比、误比特率、接入概率等方面对通信性能的影响。仿真结果表明:D2D通信与虚拟MIMO技术结合的传输方案在不增加资源的前提下,对集群网络的通信性能有明显提升,且引入分布式空时编码可进一步优化误比特率性能,但3种传输协议在不同传输质量评价方向的改善有所不同。 展开更多
关键词 飞行器集群网络 终端直通通信 虚拟多输入多输出 协作传输协议 空时编码
下载PDF
船舶无线网络的节点数据采集方法
17
作者 刘华 《舰船科学技术》 北大核心 2024年第11期169-172,共4页
为准确实现对船舶运行状态的实时监控和数据分析,及时发现潜在的问题和风险,设计船舶无线网络的节点数据采集方法。该方法以分布式追踪系统Zipkin为基础,设计无线网络节点数据采集技术框架,在该技术框架内,用户通过连接分布式追踪系统Zi... 为准确实现对船舶运行状态的实时监控和数据分析,及时发现潜在的问题和风险,设计船舶无线网络的节点数据采集方法。该方法以分布式追踪系统Zipkin为基础,设计无线网络节点数据采集技术框架,在该技术框架内,用户通过连接分布式追踪系统Zipkin,使用分布式追踪系统Zipkin内的传感器对船舶无线网络节点进行追踪后,对分布式追踪系统Zipkin内的传感器节点和船舶无线网络节点布局进行优化处理,再通过节点数据采集控制器从优化后的船舶无线网络节点内采集数据,同时通过Socket通信协议对节点数据进行缓存后,发送到服务器端,服务器端启动处理线程和同步线程,以广播的方式将采集到的船舶无线网络节点数据发送给用户,实现船舶无线网络的节点数据采集。实验表明,该方法具备较强的传感器节点和无线网络节点布局优化能力,可有效采集船舶无线网络节点上的信号和数据,应用性能较强。 展开更多
关键词 无线网络 点数据采集 分布式追踪系统 控制器 Socket通信协议
下载PDF
多域跨协议量子网络的域间密钥业务按需提供策略
18
作者 陈越 刘长杰 +7 位作者 郑伊佳 曹原 郭明轩 朱佳莉 周星宇 郁小松 赵永利 王琴 《物理学报》 SCIE EI CAS CSCD 北大核心 2024年第17期33-45,共13页
现有的城域量子网络大多基于单一的量子密钥分发协议实现,将不同协议实现的城域量子网络进行互联是大规模量子网络的发展趋势,但其域间密钥业务提供仍存在成功率低、密钥供需不适配等问题.针对以上问题,本文面向多域跨协议量子网络提出... 现有的城域量子网络大多基于单一的量子密钥分发协议实现,将不同协议实现的城域量子网络进行互联是大规模量子网络的发展趋势,但其域间密钥业务提供仍存在成功率低、密钥供需不适配等问题.针对以上问题,本文面向多域跨协议量子网络提出了两种域间密钥业务按需提供策略,分别是基于BB84(Bennett-Brassard-1984)旁路优先的按需提供策略和基于测量设备无关(measurement-device-independent,MDI)旁路优先的按需提供策略.同时,设计了内嵌两种策略的域间密钥业务按需提供算法.仿真结果表明,所提策略能够在双域和三域量子网络中高效完成域间密钥业务的按需提供.相比传统策略,两种按需提供策略可将多域量子网络的密钥供需均衡度提高1个数量级以上,MDI旁路优先策略在低密钥率需求下可将域间密钥业务请求成功率提升30%.此外,所提策略可在一定程度上降低域间密钥业务提供的成本,提高现实安全水平. 展开更多
关键词 多域量子网络 量子密钥分发 跨协议 密钥业务提供
下载PDF
基于VISIO组件的配电网监测系统设计与实现
19
作者 高元隆 吴成明 张磊 《东北电力技术》 2024年第2期18-22,共5页
针对中低压配电网监测技术无法实现对各类电网运行信息的有效共享以及可视化效果差等问题,设计出一个能够将配电网多种运行数据集成实现信息共享并直观显示配电网架构的实时数据监测系统。基于.NET平台结合VISIO开发技术以下位机设备端... 针对中低压配电网监测技术无法实现对各类电网运行信息的有效共享以及可视化效果差等问题,设计出一个能够将配电网多种运行数据集成实现信息共享并直观显示配电网架构的实时数据监测系统。基于.NET平台结合VISIO开发技术以下位机设备端作为远程测量设备设计配电网实时数据的监测系统,其中主机端与下位机设备端采用C/S架构以及Modbus协议进行通信。该系统具有配电网设备数据监测、VISIO组件主界面数据显示、数据存储、数据管理等功能。测试运行结果表明,该系统可以较好地实现远程监测与控制,对于提升中低压配电网的分析和管理水平具有一定参考价值。 展开更多
关键词 .NET平台 配电网监测 VISIO组件 MODBUS协议 数据访问
下载PDF
Distributed channel assignment combined with routing over multi-radio multi-channel wireless mesh networks 被引量:3
20
作者 YUAN Fei-fei LI Xu +3 位作者 LIU Kai-ming LIU Yuan-an DU Xiao SHI Xin-rong 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2012年第4期6-13,共8页
In order to realize the reduction of equipment cost and the demand of higher capacity, wireless mesh network (WMN) router devices usually have several interfaces and work on multi-channels. Jointing channel allocati... In order to realize the reduction of equipment cost and the demand of higher capacity, wireless mesh network (WMN) router devices usually have several interfaces and work on multi-channels. Jointing channel allocation, interface assignment and routing can efficiently improve the network capacity. This paper presents an efficient channel assignment scheme combined with the multi-radio link quality source routing (MR-LQSR) protocol, which is called channel assignment with MR-LQSR (CA-LQSR). In this scheme, a physical interference model is established: calculated transmission time (CTT) is proposed as the metric of channel assignment, which can reflect the real network environment and channel interference best, and enhanced weighted cumulative expected transmission time (EWCETT) is proposed as the routing metric, which preserves load balancing and bandwidth of links. Meantime, the expression of EWCETT contains the value of CTT, thus the total cost time of channel assignment and routing can be reduced. Simulation results show that our method has advantage of higher throughput, lower end-to-end time delay, and less network cost over some other existing methods. 展开更多
关键词 wireless mesh networks distributed channel assignment routing protocol MR-LQSR CA-LQSR
原文传递
上一页 1 2 19 下一页 到第
使用帮助 返回顶部