Composite service provision in mobile ad hoc networks encounters great challenges and its success rate is not satisfactory because the nodes' locations are dynamic and the nodes maybe unavailable at any time.Compo...Composite service provision in mobile ad hoc networks encounters great challenges and its success rate is not satisfactory because the nodes' locations are dynamic and the nodes maybe unavailable at any time.Composite service is built through the service composition.In mobile ad hoc networks,the factors influencing the success rate of service composition are mainly the number of nodes and the time spent for the composition.The node's failure probability is proportional to the length of time the node exist in the networks.In order to improve the success rate of service composition,we take several measures.First,we split the service requirement into several segments and cluster the nodes,so that the nodes' waiting time for service composition can be reduced.Second,we propose a new node model of "one node contains multiple services" in mobile ad hoc networks.Using this type of nodes model,the number of nodes required for service composition can be reduced.These means can increase the success rate of service composition.展开更多
In wireless sensor networks,node localization is a fundamental middleware service.In this paper,a robust and accurate localization algorithm is proposed,which uses a novel iterative clustering model to obtain the most...In wireless sensor networks,node localization is a fundamental middleware service.In this paper,a robust and accurate localization algorithm is proposed,which uses a novel iterative clustering model to obtain the most representative intersection points between every two circles and use them to estimate the position of unknown nodes.Simulation results demonstrate that the proposed algorithm outperforms other localization schemes (such as Min-Max,etc.) in accuracy,scalability and gross error tolerance.展开更多
The growth and evolution of the knowledge network in supply chain can be characterized by dynamic growth clustering and non-homogeneous degree distribution.The networks with the above characteristics are also known as...The growth and evolution of the knowledge network in supply chain can be characterized by dynamic growth clustering and non-homogeneous degree distribution.The networks with the above characteristics are also known as scale-free networks.In this paper,the knowledge network model in supply chain is established,in which the preferential attachment mechanism based on the node strength is adopted to simulate the growth and evolution of the network.The nodes in the network have a certain preference in the choice of a knowledge partner.On the basis of the network model,the robustness of the three network models based on different preferential attachment strategies is investigated.The robustness is also referred to as tolerances when the nodes are subjected to random destruction and malicious damage.The simulation results of this study show that the improved network has higher connectivity and stability.展开更多
To deploy sensor nodes over the area of interest,a scheme,named node scattering manipulation,was proposed.It adopted the following method:during node scattering,the initial states of every node,including the velocity ...To deploy sensor nodes over the area of interest,a scheme,named node scattering manipulation,was proposed.It adopted the following method:during node scattering,the initial states of every node,including the velocity and direction,were manipulated so that it would land in a region with a certain probability;every sensor was relocated in order to improve the coverage and connectivity.Simultaneously,to easily analyze the process of scattering sensors,a trajectory model was also proposed.Integrating node scattering manipulation with trajectory model,the node deployment in wireless sensor network was thoroughly renovated,that is,this scheme can scatter sensors.In practice,the scheme was operable compared with the previous achievements.The simulation results demonstrate the superiority and feasibility of the scheme,and also show that the energy consumption for sensors relocation is reduced.展开更多
In order to reduce the maintenance cost of structured Peer-to-Peer (P2P),Clone Node Protocol (CNP) based on user behavior is proposed.CNP considers the regularity of user behavior and uses the method of clone node.A B...In order to reduce the maintenance cost of structured Peer-to-Peer (P2P),Clone Node Protocol (CNP) based on user behavior is proposed.CNP considers the regularity of user behavior and uses the method of clone node.A Bidirectional Clone Node Chord model (BCNChord) based on CNP protocol is designed and realized.In BCNChord,Anticlockwise Searching Algorithm,Difference Push Synchronize Algorithm and Optimal Maintenance Algorithm are put forward to increase the performances.In experiments,according to the frequency of nodes,the maintenance cost of BCNChord can be 3.5%~32.5% lower than that of Chord.In the network of 212 nodes,the logic path hop is steady at 6,which is much more prior to 12 of Chord and 10 of CNChord.Theoretical analysis and experimental results show that BCNChord can effectively reduce the maintenance cost of its structure and simultaneously improve the query efficiency up to (1/4)O(logN).BCNChord is more suitable for highly dynamic environment and higher real-time system.展开更多
Community structure is an important characteristic in real complex network.It is a network consists ofgroups of nodes within which links are dense but among which links are sparse.In this paper, the evolving network i...Community structure is an important characteristic in real complex network.It is a network consists ofgroups of nodes within which links are dense but among which links are sparse.In this paper, the evolving network includenode, link and community growth and we apply the community size preferential attachment and strength preferentialattachment to a growing weighted network model and utilize weight assigning mechanism from BBV model.Theresulting network reflects the intrinsic community structure with generalized power-law distributions of nodes'degreesand strengths.展开更多
To deal with hidden nodes in ad hoc network, we take throughput as the metric to evaluate the performance of network. Firstly, we modeled the MAC layer of ad hoc network based on 802.11 DCF without the existence of hi...To deal with hidden nodes in ad hoc network, we take throughput as the metric to evaluate the performance of network. Firstly, we modeled the MAC layer of ad hoc network based on 802.11 DCF without the existence of hidden nodes. By means of the proposed model, we evaluated the throughput performance of DCF in multi-hop wireless networks. Secondly, we performed simulations to validate this model. The outcome of comparison is that there exists much difference in throughput between the model and the simulation. For reducing this difference, we modified the model by involving hidden nodes under the condition that the AODV route protocol was chosen, and analytically analyzed the influence of hidden nodes on theoretical throughput. At last, we validated the accuracy of this model by comparing the analytical results with simulation results.展开更多
This paper addresses the available capacity and robust connectivity of time division duplex based wireless mesh networks (TDD-based WMNs). A stochastic model is presented for TDD-based WMNs. Considering the paramete...This paper addresses the available capacity and robust connectivity of time division duplex based wireless mesh networks (TDD-based WMNs). A stochastic model is presented for TDD-based WMNs. Considering the parameters that affect the network performance like ratio of control slots number to data slots number, collision probability, node density and average hopcounts, the availa- ble capacity for each node is inferred. Meanwhile, the order of transmission range for robust connec- tivity of large scale WMNs is derived. With the stochastic model and inferred available capacity per node, the performance of TDD-based WMNs using IEEE 802.16 standard is analyzed under various conditions. Simulation results indicate that the available capacity of IEEE 802.16-based TDD-based WMNs and the theoretical result have the same increasing and decreasing trend as the node density increases. Simulation results also illustrate the optimal value of the ratio of control slots number to data slots number that maximizes the available capacity.展开更多
In the paper, we concentrate on the infl uence of heterogeneity on the performance of forwarding algorithms under opportunistic networks. Therefore, we first describe two different heterogeneous network models, and ca...In the paper, we concentrate on the infl uence of heterogeneity on the performance of forwarding algorithms under opportunistic networks. Therefore, we first describe two different heterogeneous network models, and capture the heterogeneity which concern mobile nodes' contact dynamics under the individual models and the spatial models. Then we investigate inter-contact time is not fully follow exponential distribution and compare the performance of the delivery delay between direct forwarding protocol and three-hop forwarding protocol under three network models. We illustrate the performance of message delivery delay under the spray and wait protocol and prophet protocol from simulation results. Our simulation results show that the heterogeneity should be considered for the performance of forwarding protocols.展开更多
An evolution model of KAD Dynamic Model Network(KDMN) is proposed to study the reason of hot node and simulate the process of network evolution based on node behavior from a holistic perspective.First,some symbols and...An evolution model of KAD Dynamic Model Network(KDMN) is proposed to study the reason of hot node and simulate the process of network evolution based on node behavior from a holistic perspective.First,some symbols and meanings are introduced to describe nodes relationship and network states at a time step.Second,some evolution rules for network are formulated when node behaviors of join,exit,routing table update,data retrieval and content index distribution happen with different contextual scene in KAD network.In addition,a lightweight simulator is designed to implement the KDMN model.Moreover,an example of how to use the simulator to simulate the network changes in order to observe the result is described in detail.Finally,the KDMN is applied to analyze the reason for the formation of hot nodes in the BT and eMule network in the experiment.The different evolution principles of local priority,global priority and hybrid random are adopted based on the provision of network protocol of BT and eMule.The result of this experiment demonstrates that there are some hot nodes exist in the KAD network.However,the principle of hybrid random can effectively alleviate the phenomenon that a node is widely linked with others compared with global and local priority.展开更多
The trustworthiness and security of routing in the existing Peer-to-Peer (P2P) networks can not be ensured because of the diversity of the strategies of P2P nodes. This paper firstly uses game theory to establish game...The trustworthiness and security of routing in the existing Peer-to-Peer (P2P) networks can not be ensured because of the diversity of the strategies of P2P nodes. This paper firstly uses game theory to establish game model of the strategies and profits of various types of routing nodes. Then,two incentive mechanisms for the corresponding stages of P2P trustworthy routing are proposed,namely trust associated mechanism and trust compensated mechanism. Simulation results show that the incentive mechanisms proposed in this paper will encourage cooperation actions of good nodes and restrain malicious actions of bad nodes,which ensure the trustworthiness of routing consequently.展开更多
Nodes play different roles or have different functions in many natural and social networks.In this paper,a simple model with different types of nodes and deterministic selective linking rule is proposed.The structural...Nodes play different roles or have different functions in many natural and social networks.In this paper,a simple model with different types of nodes and deterministic selective linking rule is proposed.The structural properties by theoretical predictions are investigated that the given model exhibits a power-law distribution.展开更多
基金ACKNOWLEDGEMENT This research is supported by the National Grand Fundamental Research 973 Program of China under Grant No. 2011CB302506, 2012CB315802 National Key Technology Research and Development Program of China (Grant No. 2012BAH94F02)+3 种基金 National High-tech R&D Program of China (863 Program) under Grant No. 2013AA102301 National Natural Science Foundation of China under Grant No. 61132001, 61171102) Program for New Century Excellent Talents in University (Grant No. NCET-11-0592) Project of New Generation Broad band Wireless Networks under Grant No. 2011ZX03002-002-01. The technology development and experiment of innovative networks architecture (CNGI-12- 03-007).
文摘Composite service provision in mobile ad hoc networks encounters great challenges and its success rate is not satisfactory because the nodes' locations are dynamic and the nodes maybe unavailable at any time.Composite service is built through the service composition.In mobile ad hoc networks,the factors influencing the success rate of service composition are mainly the number of nodes and the time spent for the composition.The node's failure probability is proportional to the length of time the node exist in the networks.In order to improve the success rate of service composition,we take several measures.First,we split the service requirement into several segments and cluster the nodes,so that the nodes' waiting time for service composition can be reduced.Second,we propose a new node model of "one node contains multiple services" in mobile ad hoc networks.Using this type of nodes model,the number of nodes required for service composition can be reduced.These means can increase the success rate of service composition.
基金supported in part by the Key Program of National Natural Science Foundation of China(Grant No.60873244,60973110,61003307)the Beijing Municipal Natural Science Foundation(Grant No.4102059)
文摘In wireless sensor networks,node localization is a fundamental middleware service.In this paper,a robust and accurate localization algorithm is proposed,which uses a novel iterative clustering model to obtain the most representative intersection points between every two circles and use them to estimate the position of unknown nodes.Simulation results demonstrate that the proposed algorithm outperforms other localization schemes (such as Min-Max,etc.) in accuracy,scalability and gross error tolerance.
基金Supported by the National Natural Science Foundation of China(No.71172169)
文摘The growth and evolution of the knowledge network in supply chain can be characterized by dynamic growth clustering and non-homogeneous degree distribution.The networks with the above characteristics are also known as scale-free networks.In this paper,the knowledge network model in supply chain is established,in which the preferential attachment mechanism based on the node strength is adopted to simulate the growth and evolution of the network.The nodes in the network have a certain preference in the choice of a knowledge partner.On the basis of the network model,the robustness of the three network models based on different preferential attachment strategies is investigated.The robustness is also referred to as tolerances when the nodes are subjected to random destruction and malicious damage.The simulation results of this study show that the improved network has higher connectivity and stability.
基金Project(2007AA01Z224) supported by National High-Tech Research and Development Program of China
文摘To deploy sensor nodes over the area of interest,a scheme,named node scattering manipulation,was proposed.It adopted the following method:during node scattering,the initial states of every node,including the velocity and direction,were manipulated so that it would land in a region with a certain probability;every sensor was relocated in order to improve the coverage and connectivity.Simultaneously,to easily analyze the process of scattering sensors,a trajectory model was also proposed.Integrating node scattering manipulation with trajectory model,the node deployment in wireless sensor network was thoroughly renovated,that is,this scheme can scatter sensors.In practice,the scheme was operable compared with the previous achievements.The simulation results demonstrate the superiority and feasibility of the scheme,and also show that the energy consumption for sensors relocation is reduced.
基金supported by the National Natural Science Foundation of China under Grant No.61100205Science and Technology Project of Beijing Municipal Education Commission under Grant No.KM201110016006Doctor Start-up Foundation of BUCEA under Grant No.101002508
文摘In order to reduce the maintenance cost of structured Peer-to-Peer (P2P),Clone Node Protocol (CNP) based on user behavior is proposed.CNP considers the regularity of user behavior and uses the method of clone node.A Bidirectional Clone Node Chord model (BCNChord) based on CNP protocol is designed and realized.In BCNChord,Anticlockwise Searching Algorithm,Difference Push Synchronize Algorithm and Optimal Maintenance Algorithm are put forward to increase the performances.In experiments,according to the frequency of nodes,the maintenance cost of BCNChord can be 3.5%~32.5% lower than that of Chord.In the network of 212 nodes,the logic path hop is steady at 6,which is much more prior to 12 of Chord and 10 of CNChord.Theoretical analysis and experimental results show that BCNChord can effectively reduce the maintenance cost of its structure and simultaneously improve the query efficiency up to (1/4)O(logN).BCNChord is more suitable for highly dynamic environment and higher real-time system.
基金Supported by the National Nature Science Foundation of China under Grant No.10832006PuJiang Project of Shanghai under Grant No.09PJ1405000+1 种基金Key Disciplines of Shanghai Municipality (S30104)Research Grant of Shanghai University under Grant No.SHUCX092014
文摘Community structure is an important characteristic in real complex network.It is a network consists ofgroups of nodes within which links are dense but among which links are sparse.In this paper, the evolving network includenode, link and community growth and we apply the community size preferential attachment and strength preferentialattachment to a growing weighted network model and utilize weight assigning mechanism from BBV model.Theresulting network reflects the intrinsic community structure with generalized power-law distributions of nodes'degreesand strengths.
文摘To deal with hidden nodes in ad hoc network, we take throughput as the metric to evaluate the performance of network. Firstly, we modeled the MAC layer of ad hoc network based on 802.11 DCF without the existence of hidden nodes. By means of the proposed model, we evaluated the throughput performance of DCF in multi-hop wireless networks. Secondly, we performed simulations to validate this model. The outcome of comparison is that there exists much difference in throughput between the model and the simulation. For reducing this difference, we modified the model by involving hidden nodes under the condition that the AODV route protocol was chosen, and analytically analyzed the influence of hidden nodes on theoretical throughput. At last, we validated the accuracy of this model by comparing the analytical results with simulation results.
基金Supported by the National Natural Science Foundation of China ( No. 60674009, 60830001 ).
文摘This paper addresses the available capacity and robust connectivity of time division duplex based wireless mesh networks (TDD-based WMNs). A stochastic model is presented for TDD-based WMNs. Considering the parameters that affect the network performance like ratio of control slots number to data slots number, collision probability, node density and average hopcounts, the availa- ble capacity for each node is inferred. Meanwhile, the order of transmission range for robust connec- tivity of large scale WMNs is derived. With the stochastic model and inferred available capacity per node, the performance of TDD-based WMNs using IEEE 802.16 standard is analyzed under various conditions. Simulation results indicate that the available capacity of IEEE 802.16-based TDD-based WMNs and the theoretical result have the same increasing and decreasing trend as the node density increases. Simulation results also illustrate the optimal value of the ratio of control slots number to data slots number that maximizes the available capacity.
基金supported by the National Natural Science Foundation of China under Grant No.61171097
文摘In the paper, we concentrate on the infl uence of heterogeneity on the performance of forwarding algorithms under opportunistic networks. Therefore, we first describe two different heterogeneous network models, and capture the heterogeneity which concern mobile nodes' contact dynamics under the individual models and the spatial models. Then we investigate inter-contact time is not fully follow exponential distribution and compare the performance of the delivery delay between direct forwarding protocol and three-hop forwarding protocol under three network models. We illustrate the performance of message delivery delay under the spray and wait protocol and prophet protocol from simulation results. Our simulation results show that the heterogeneity should be considered for the performance of forwarding protocols.
文摘An evolution model of KAD Dynamic Model Network(KDMN) is proposed to study the reason of hot node and simulate the process of network evolution based on node behavior from a holistic perspective.First,some symbols and meanings are introduced to describe nodes relationship and network states at a time step.Second,some evolution rules for network are formulated when node behaviors of join,exit,routing table update,data retrieval and content index distribution happen with different contextual scene in KAD network.In addition,a lightweight simulator is designed to implement the KDMN model.Moreover,an example of how to use the simulator to simulate the network changes in order to observe the result is described in detail.Finally,the KDMN is applied to analyze the reason for the formation of hot nodes in the BT and eMule network in the experiment.The different evolution principles of local priority,global priority and hybrid random are adopted based on the provision of network protocol of BT and eMule.The result of this experiment demonstrates that there are some hot nodes exist in the KAD network.However,the principle of hybrid random can effectively alleviate the phenomenon that a node is widely linked with others compared with global and local priority.
基金Supported by the Hi-Tech R&D Program (863) of China (2006AA01Z232)the Research Innovation Program for Graduate Student in Jiangsu Province (CX07B-11OZ)
文摘The trustworthiness and security of routing in the existing Peer-to-Peer (P2P) networks can not be ensured because of the diversity of the strategies of P2P nodes. This paper firstly uses game theory to establish game model of the strategies and profits of various types of routing nodes. Then,two incentive mechanisms for the corresponding stages of P2P trustworthy routing are proposed,namely trust associated mechanism and trust compensated mechanism. Simulation results show that the incentive mechanisms proposed in this paper will encourage cooperation actions of good nodes and restrain malicious actions of bad nodes,which ensure the trustworthiness of routing consequently.
文摘Nodes play different roles or have different functions in many natural and social networks.In this paper,a simple model with different types of nodes and deterministic selective linking rule is proposed.The structural properties by theoretical predictions are investigated that the given model exhibits a power-law distribution.