期刊文献+
共找到1,051篇文章
< 1 2 53 >
每页显示 20 50 100
Modeling and Simulation of P-Aloha,CSMA /CA and MACAW Protocols for Underwater Acoustic Channel 被引量:1
1
作者 DAO Van-phuong 左加阔 +3 位作者 赵力 NGUYEN Dang-nam 邹采荣 孙剑 《Journal of Donghua University(English Edition)》 EI CAS 2015年第1期35-40,共6页
Medium access control( MAC) protocol of underwater acoustic communication network is a key technology for underwater acoustic networks( UANs). Most of the MAC protocols for wireless terrestrial communication networks ... Medium access control( MAC) protocol of underwater acoustic communication network is a key technology for underwater acoustic networks( UANs). Most of the MAC protocols for wireless terrestrial communication networks have been designed with negligible propagation delay. If it is deployed directly in an underwater environment,the UANs will perform inefficiently. In this paper,the characteristics of underwater acoustic channel are modeled and simulated by using the OPNET simulation tool,which are the speed of sound, propagation loss, and four sources for ambient noise: the turbulence,shipping,wind driven waves and thermal noise. The performance of pure Aloha( P-Aloha),carrier sense multiple access with collision avoidance( CSMA / CA) and multiple access collision avoidance for wireless local area network( MACAW) protocols in underwater acoustic channel environment are evaluated. The different performance of protocols in underwater environment is compared in the simulation. 展开更多
关键词 underwater acoustic channel OPNET simulation medium access control(MAC) protocol pure Aloha(P-Aloha) protocol carrier sense multiple access with collision avoidance(CSMA /CA) protocol multiple access collision avoidance for wireless local area network(MACAW) protocol
下载PDF
Integration of naval distributed tactical training simulation system based on advanced message queuing protocol 被引量:2
2
作者 柳玉 Wen Jiayan Ji Daqin 《High Technology Letters》 EI CAS 2016年第4期385-394,共10页
Aiming at the problems of unreliable data transmission,poor steadiness,nonsupport of complex data types,direct couple between data transmission and exchange,a high-level method based on advanced message queuing protoc... Aiming at the problems of unreliable data transmission,poor steadiness,nonsupport of complex data types,direct couple between data transmission and exchange,a high-level method based on advanced message queuing protocol( AMQP) is proposed to integrate naval distributed tactical training simulation system after serious consideration with current information exchange features of military combat system. Transferring layer in traditional user datagram protocol is implemented by publishing and subscribing scheme of message middleware. By creating message model to standardize message structure,integration architecture is formulated to resolve potential information security risks from inconsistent data type and express data transmission. Meanwhile,a communication model is put forward based on AMQP,which is in the center position of the whole transmission framework and responsible for reliably transferring battlefield data among subsystems. Experiments show that the method can accurately post amounts of data to the subscriber without error and loss,and can get excellent real-time performance of data exchange. 展开更多
关键词 tactical simulation message middleware advanced message queuing protocol(AMQP) software architecture distributed interactive simulation
下载PDF
Hardware-in-loop Simulation(HLS) of Homing Anti-tank Missile 被引量:1
3
作者 宋建梅 张天桥 《Journal of Beijing Institute of Technology》 EI CAS 1996年第1期49-54,共6页
The simulation techniques of hardware-in-loop simulation(HLS) of homing antitank missile based on the personal computer (PC) are discussed. The PC and MCS-96 chip controller employ A/D and D/A boards (with photoelectr... The simulation techniques of hardware-in-loop simulation(HLS) of homing antitank missile based on the personal computer (PC) are discussed. The PC and MCS-96 chip controller employ A/D and D/A boards (with photoelectricity isolation) to transfer measur ment and control information about homing head, gyro and rudder and utilize the digital hand shaking board to build correct communication communication protocol. In order to satisfy the real-time requirement of HLS, this paper first simplifies the aerodynamic data file reasonably, then builds a PC software with C language. The program of the controller part is made with PL/M language. The simulation of HLS based on PC is done with the same sampling period of 10ms as that of YH-F1 and the experiment results are identical to those of digital simulation of the homing anti-tank guided missile. 展开更多
关键词 HARDWARE-IN-LOOP simulation communication protocol aerodynamic data
下载PDF
Mathematical Model Validation of Search Protocols in MP2P Networks 被引量:1
4
作者 Ajay Arunachalam Vinayakumar Ravi +2 位作者 Moez Krichen Roobaea Alroobaea Saeed Rubaiee 《Computers, Materials & Continua》 SCIE EI 2021年第8期1807-1829,共23页
Broadcasting is a basic technique in Mobile ad-hoc network(MANET),and it refers to sending a packet from one node to every other node within the transmission range.Flooding is a type of broadcast where the received pa... Broadcasting is a basic technique in Mobile ad-hoc network(MANET),and it refers to sending a packet from one node to every other node within the transmission range.Flooding is a type of broadcast where the received packet is retransmitted once by every node.The naive flooding technique,floods the network with query messages,while the random walk technique operates by contacting the subsets of every node’s neighbors at each step,thereby restricting the search space.One of the key challenges in an ad-hoc network is the resource or content discovery problem which is about locating the queried resource.Many earlier works have mainly focused on the simulation-based analysis of flooding,and its variants under a wired network.Although,there have been some empirical studies in peer-to-peer(P2P)networks,the analytical results are still lacking,especially in the context of P2P systems running over MANET.In this paper,we describe how P2P resource discovery protocols perform badly over MANETs.To address the limitations,we propose a new protocol named ABRW(Address Broadcast Random Walk),which is a lightweight search approach,designed considering the underlay topology aimed to better suit the unstructured architecture.We provide the mathematical model,measuring the performance of our proposed search scheme with different widely popular benchmarked search techniques.Further,we also derive three relevant search performance metrics,i.e.,mean no.of steps needed to find a resource,the probability of finding a resource,and the mean no.of message overhead.We validated the analytical expressions through simulations.The simulation results closely matched with our analyticalmodel,justifying our findings.Our proposed search algorithm under such highly dynamic self-evolving networks performed better,as it reduced the search latency,decreased the overall message overhead,and still equally had a good success rate. 展开更多
关键词 Search protocols random walk MANET P2P networks P2P MANET mathematical model peer-to-peer wireless ad hoc network FLOODING mobile P2P UNSTRUCTURED P2P NS-2 network simulator
下载PDF
Hardware in Loop Simulation for Emergency Communication Mobile Ad Hoc Network
5
作者 杨杰 安建平 刘珩 《Journal of Beijing Institute of Technology》 EI CAS 2007年第4期476-480,共5页
For the research of mobile Ad hoc network (MANET), hardware in the loop simulation (HILS) is introduced to improve simulation fidelity. The architectures and frameworks of HILS system are discussed. Based on HILS and ... For the research of mobile Ad hoc network (MANET), hardware in the loop simulation (HILS) is introduced to improve simulation fidelity. The architectures and frameworks of HILS system are discussed. Based on HILS and QualNet network simulator, two kinds of simulation frameworks for MANET multicast emergency communication network are proposed. By running simulation under this configuration and doing experiments with on-demand multicast routing protocol (ODMRP), unicast and multicast functions of this protocol are tested. Research results indicate that HILS method can effectively reduce the difficulty of system modeling and improve precision of simulation, and can further accelerate transition from design to system deployment. 展开更多
关键词 hardware-in-the-loop simulation mobile Ad hoc network multicast routing protocol
下载PDF
Design of Out-of-Band Protocols to Transmit UHDTV Contents in the CATV Network
6
作者 Sunsik Roh 《International Journal of Communications, Network and System Sciences》 2012年第5期253-262,共10页
The goal of an UHDTV is to broadcast digital video contents which is 16 times the pixel resolution of HDTV. As the resolution is increased, the UHDTV requires a transmission technology to support very high data transf... The goal of an UHDTV is to broadcast digital video contents which is 16 times the pixel resolution of HDTV. As the resolution is increased, the UHDTV requires a transmission technology to support very high data transfer rate. In this paper, we propose two out-of-band protocols to transmit UHDTV contents in a CATV network: an OOB-based protocol and a DSG-based protocol. The former may be a short term solution which is well suitable for a traditional CATV network and the letter may be a long term solution which is adoptable for a CATV network equipped with DOCSIS functionalities. In order to transfer 200 Mbps UHDTV contents, proposed protocols use a channel bonding mechanism which combines several QAM channels. We propose CATV network architectures to support an UHDTV service with a channel bonding mechanism, and design the format of messages to share the information of bonded channels between a headend and a STB. We develop an OPNET simulator and ascertain successful transmission of UHDTV contents. 展开更多
关键词 UHDTV (Ultra High DEFINITION TV) CATV Networks Control protocol Network simulation protocol DESIGN
下载PDF
Adaptive Thermal Comfort in Brazilian Schools by Building Performance Simulation (BPS)
7
作者 Caio Frederico e Silva Adriano Felipe Oliveira Lopes +1 位作者 Thiago Montenegro Góes Cláudia Naves David Amorim 《Journal of Civil Engineering and Architecture》 2020年第3期174-178,共5页
Building performance simulation (BPS) is a crucial tool towards the design of projects better adapted its climatic context. In this sense, the objective of this research is to evaluate a method of thermal comfort anal... Building performance simulation (BPS) is a crucial tool towards the design of projects better adapted its climatic context. In this sense, the objective of this research is to evaluate a method of thermal comfort analysis of schools in three Brazilian cities using BPS. The methodological procedures involved a literature review, in which the simulation tool and analysis method were chosen. Following simulations with the software DesignBuilder were performed using as study case a standard school typology designed by the General Coordination of Educational Infrastructure (CODIN/FNDE). This article evaluates its percentage occupied comfort hours in 3 reference cities: Cuiabá-MT, Brasília-DF, and Curitiba-PR. The results show respectively, for the cities of Curitiba, Brasília and Cuiabá, percentages of comfort hours of 76%, 70%, and 23%. The research states that the project must have different strategies for different climates. Finally, this article recommends this method should be applied to other cities and buildings. 展开更多
关键词 BUILDING performance simulation THERMAL COMFORT standard design protocol schools.
下载PDF
Simulation of a Mathematical Model Minimizing Energy Consumption in SDN Type Networks
8
作者 Lagasane Kra Bi Tra Gooré +1 位作者 Manlandon Koffi Olivier Asseu 《Engineering(科研)》 2018年第11期805-813,共9页
Several works by the authors have shown that energy consumption in communication networks does not only depend on the traffic load but on all connected equipment in the network. We have contributed a new mathematical ... Several works by the authors have shown that energy consumption in communication networks does not only depend on the traffic load but on all connected equipment in the network. We have contributed a new mathematical model and a new energy saving strategy with Software Defined Network (SDN) technology [1]. Our Model solution is based on the Modified SPRING Protocol (MSP). In this paper, we simulated our work and compared it to that of the authors [2] and [3]. The OMNET++ simulator was used for our work. Thus, the results of the simulations gave a delay that tends to zero, a packet loss of the order of 10% and a constant jitter of 4% better than the previous authors. 展开更多
关键词 SPRING protocol simulATOR OMNET++ GRAPH MATHEMATICAL Model
下载PDF
Real Time Vehicular Traffic Simulation for Black Hole Attack in the Greater Detroit Area
9
作者 Abdulaziz Alshammari Mohamed A Zohdy +1 位作者 Debatosh Debnath George Corser 《Journal of Information Security》 2020年第1期71-80,共10页
Vehicular Ad-hoc Networks (VANETs) technology has recently emerged, and gaining significant attention from the research because it is promising technologies related to Intelligent Transportation System (ITSs) and smar... Vehicular Ad-hoc Networks (VANETs) technology has recently emerged, and gaining significant attention from the research because it is promising technologies related to Intelligent Transportation System (ITSs) and smart cities. Wireless vehicular communication is employed to improve traffic safety and to reduce traffic congestion. Each vehicle in the ad-hoc network achieves as a smart mobile node categorized by high mobility and forming of dynamic networks. As a result of the movement of vehicles in a continuous way, VANETs are vulnerable to many security threats so it requisites capable and secure communication. Unfortunately, Ad hoc networks are liable to varied attacks like Block Hole attacks and Grey Hole attacks, Denial of service attacks, etc. Among the most known attacks are the Black Hole attacks while the malicious vehicle is able to intercept the data and drops it without forwarding it to the cars. The main goal of our simulation is to analyze the performance impact of black hole attack in real time vehicular traffic in the Greater Detroit Area using NS-2 and SUMO (Simulation of Urban). The simulation will be with AODV protocol. 展开更多
关键词 Black Hole Attacks Vehicular Ad HOC Networks AODV protocol simulation SUMO GREATER DETROIT Area
下载PDF
Experimental investigation on degradation mechanism of membrane electrode assembly at different humidity under automotive protocol
10
作者 Jiajun Wang Wenbin Yang +2 位作者 Jiangtao Geng Zhigang Shao Wei Song 《Chinese Journal of Chemical Engineering》 SCIE EI CAS CSCD 2023年第4期70-79,共10页
Humidity can affect the attenuation of MEA(membrane electrode assembly), however, the relationship between humidity and MEA decays is complex and ambiguous in realistic application. Herein, we design a simulating auto... Humidity can affect the attenuation of MEA(membrane electrode assembly), however, the relationship between humidity and MEA decays is complex and ambiguous in realistic application. Herein, we design a simulating automotive protocol, performed on five single fuel cells under RH(relative humidity) 100%,RH 80%, RH 64%, and RH 40%, RH 10%, respectively, to study the relationship of MEA decays and humidity and suggest optimized humidity range to extend the durability. With the electrochemical impedance spectroscopy, cyclic voltammetry, X-ray fluorescence, X-ray diffraction, transmission electron microscope, X-ray photoelectron spectroscopy, the four degradation mechanisms about catalyst layer, including Pt dissolution, Pt coarsening, carbon corrosion and ionomer degradation, are observed. Pt coarsening and carbon corrosion are accelerated by higher water content at high humidity. Ionomer degradation and Pt dissolution are enhanced in low humidity. With the linear sweep voltammetry, ion chromatography,nuclear magnetic resonance, tensile test and scan electron microscope, chemical and mechanical degradation in proton exchange membrane are all observed in these five fuels. Chemical degradation, characterized by membrane thinning and more fluoride loss, occurred markedly in RH 10%. Mechanical degradation, characterized by the non-uniformity thickness and bad mechanical properties, is more pronounced in RH 100%, RH 80%, RH 64%. These two degradations are in a moderate level in RH 40%. The research suggests that the RH range from 64% to 40% is conductive to mitigate the degradation of MEAs operated in automotive applications. 展开更多
关键词 Fuel cell simulating automotive protocol Relative humidity Degradation MEMBRANE
下载PDF
列车控制监视系统的Simulink实时仿真 被引量:2
11
作者 田丰 孙新亚 慕春棣 《微计算机信息》 2010年第22期124-126,共3页
列车控制监视系统(TCMS)的设计和构建是我国研制自主知识产权的高速列车中的一项关键技术。本文通过深入分析,基于Simulink构建了一套列车控制监视系统的实时仿真环境,具有设计图形化、代码生成自动化、支持半实物仿真的特点。利用Simul... 列车控制监视系统(TCMS)的设计和构建是我国研制自主知识产权的高速列车中的一项关键技术。本文通过深入分析,基于Simulink构建了一套列车控制监视系统的实时仿真环境,具有设计图形化、代码生成自动化、支持半实物仿真的特点。利用Simulink提供的UDP模块,实现了仿真过程中各子系统间的实时通信,解决了数据抖动和数据压缩的问题,从而使得基于Simulink的实时仿真方案能够在实际系统的研发过程中得以应用。 展开更多
关键词 列车控制监视系统(TCMS) simulINK 实时仿真 用户数据报协议(UDP)
下载PDF
Dynamic Routing Protocol for Computer Networkswith Clustering Topology 被引量:2
12
作者 Li, Layuan Li, Chunlin 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 1999年第1期44-53,共10页
This paper presents a hierarchical dynamic routing protocol (HDRP) based on the discrete dynamic programming principle. The proposed protocol can adapt to the dynamic and large computer networks (DLCN) with clustering... This paper presents a hierarchical dynamic routing protocol (HDRP) based on the discrete dynamic programming principle. The proposed protocol can adapt to the dynamic and large computer networks (DLCN) with clustering topology. The procedures for realizing routing update and decision are presented in this paper. The proof of correctness and complexity analysis of the protocol are also made. The performance measures of the HDRP including throughput and average message delay are evaluated by using of simulation. The study shows that the HDRP provides a new available approach to the routing decision for DLCN or high speed networks with clustering topology. 展开更多
关键词 Computational complexity Computer simulation Dynamic programming Network protocols TOPOLOGY
下载PDF
Demand Priority Protocol Simulation and Evaluation 被引量:1
13
作者 詹永照 宋顺林 谢立 《Journal of Computer Science & Technology》 SCIE EI CSCD 1999年第6期599-605,共7页
A new network protocol (Demand Priority Protocol) environmentcan provide more satisfying service for different urgent transmission requests. Inthis paper, in order to provide guidance for the selection of environment ... A new network protocol (Demand Priority Protocol) environmentcan provide more satisfying service for different urgent transmission requests. Inthis paper, in order to provide guidance for the selection of environment of multimedia data transmission in Computer Supported Cooperative Work better, an objectoriented protocol specification language based on C++ is used to design a virtualenvironment of multiworkstation of computer cooperative work and to simulate execution of demand priority network protocol and then the performances of varioustransmission requests are analyzed. Finally, an evaluation of the demand priorityLAN is given. 展开更多
关键词 MULTIMEDIA demand priority MAC protocol simulation performance evaluation
原文传递
Simulator Coupled with Distributed Co-Simulation Protocol for Automated Driving Tests 被引量:1
14
作者 Max-Arno Meyer Lina Sauter +2 位作者 Christian Granrath Hassen Hadj-Amor Jakob Andert 《Automotive Innovation》 EI CSCD 2021年第4期373-389,共17页
To meet the challenges in software testing for automated vehicles,such as increasing system complexity and an infinite number of operating scenarios,new simulation methods must be developed.Closed-loop simulations for... To meet the challenges in software testing for automated vehicles,such as increasing system complexity and an infinite number of operating scenarios,new simulation methods must be developed.Closed-loop simulations for automated driving(AD)require highly complex simulation models for multiple controlled vehicles with their perception systems as well as their surrounding context.For the realization of such models,different simulation domains must be coupled with co-simulation.However,widely supported model integration standards such as functional mock-up interface(FMI)lack native support for distributed platforms,which is a key feature for AD due to the computational intensity and platform exclusivity of certain models.The newer FMI companion standard distributed co-simulation protocol(DCP)introduces platform coupling but must still be used in conjunction with AD co-simulations.As part of an assessment framework for AD,this paper presents a DCP compliant implementation of an interoperable interface between a 3D environment and vehicle simulator and a co-simulation platform.A universal Python wrapper is implemented and connected to the simulator to allow its control as a DCP slave.A C-code-based interface enables the co-simulation platform to act as a DCP master and to realize cross-platform data exchange and time synchronization of the environment simulation with other integrated models.A model-in-the-loop use case is performed with the traffic simulator CARLA running on a Linux machine connected to the co-simulation master xMOD on a Windows computer via DCP.Several virtual vehicles are successfully controlled by cooperative adaptive cruise controllers executed outside of CARLA.The standard compliance of the implementation is verified by exemplary connection to prototypic DCP solutions from 3rd party vendors.This exemplary application demonstrates the benefits of DCP compliant tool coupling for AD simulation with increased tool interoperability,reuse potential,and performance. 展开更多
关键词 Distributed co-simulation protocol CO-simulation Automated driving Traffic simulation Tool coupling
原文传递
Near-term quantum computing techniques: Variational quantum algorithms, error mitigation, circuit compilation, benchmarking and classical simulation 被引量:1
15
作者 He-Liang Huang Xiao-Yue Xu +5 位作者 Chu Guo Guojing Tian Shi-Jie Wei Xiaoming Sun Wan-Su Bao Gui-Lu Long 《Science China(Physics,Mechanics & Astronomy)》 SCIE EI CAS CSCD 2023年第5期23-72,共50页
Quantum computing is a game-changing technology for global academia,research centers and industries including computational science,mathematics,finance,pharmaceutical,materials science,chemistry and cryptography.Altho... Quantum computing is a game-changing technology for global academia,research centers and industries including computational science,mathematics,finance,pharmaceutical,materials science,chemistry and cryptography.Although it has seen a major boost in the last decade,we are still a long way from reaching the maturity of a full-fledged quantum computer.That said,we will be in the noisy-intermediate scale quantum(NISQ)era for a long time,working on dozens or even thousands of qubits quantum computing systems.An outstanding challenge,then,is to come up with an application that can reliably carry out a nontrivial task of interest on the near-term quantum devices with non-negligible quantum noise.To address this challenge,several near-term quantum computing techniques,including variational quantum algorithms,error mitigation,quantum circuit compilation and benchmarking protocols,have been proposed to characterize and mitigate errors,and to implement algorithms with a certain resistance to noise,so as to enhance the capabilities of near-term quantum devices and explore the boundaries of their ability to realize useful applications.Besides,the development of near-term quantum devices is inseparable from the efficient classical sim-ulation,which plays a vital role in quantum algorithm design and verification,error-tolerant verification and other applications.This review will provide a thorough introduction of these near-term quantum computing techniques,report on their progress,and finally discuss the future prospect of these techniques,which we hope will motivate researchers to undertake additional studies in this field. 展开更多
关键词 quantum computing noisy-intermediate scale quantum variational quantum algorithms error mitigation circuit com-pilation benchmarking protocols classical simulation
原文传递
An Improved AOMDV Routing Protocol for Airspace Communication Network
16
作者 Xi Zhang Tao Zhang 《International Journal of Communications, Network and System Sciences》 2017年第8期157-166,共10页
The airspace communication network based on spacecraft has a wide range of applications in regional information enhancement and emergency communication. In this paper, a routing algorithm for congestion degree detecti... The airspace communication network based on spacecraft has a wide range of applications in regional information enhancement and emergency communication. In this paper, a routing algorithm for congestion degree detection of multipath routing (CD_AOMDV) is proposed. The method of combining the whole congestion degree detection and local congestion degree detection before service initiation is adopted. Timely and accurate judgment of the congestion degree reduced the loss rate of the hot nodes, so the average packet loss rate reduced. Simulation results show that compared with the traditional AOMDV protocol, the CD_AOMDV proposed in this paper has reduced the packet loss and improved delay performance, which is more suitable for the airspace communication network. 展开更多
关键词 Airspace Communication Network AOMDV ROUTING protocol NODES MOBILITY SNS simulation Platform
下载PDF
Two-Tier Hierarchical Cluster Based Topology in Wireless Sensor Networks for Contention Based Protocol Suite
17
作者 Arif Sari 《International Journal of Communications, Network and System Sciences》 2015年第3期29-42,共14页
The 802.15.4 Wireless Sensor Networks (WSN) becomes more economical, feasible and sustainable for new generation communication environment, however their limited resource constraints such as limited power capacity mak... The 802.15.4 Wireless Sensor Networks (WSN) becomes more economical, feasible and sustainable for new generation communication environment, however their limited resource constraints such as limited power capacity make them difficult to detect and defend themselves against variety of attacks. The radio interference attacks that generate for WSN at the Physical Layer cannot be defeated through conventional security mechanisms proposed for 802.15.4 standards. The first section introduces the deployment model of two-tier hierarchical cluster topology architecture and investigates different jamming techniques proposed for WSN by creating specific classification of different types of jamming attacks. The following sections expose the mitigation techniques and possible built-in mechanisms to mitigate the link layer jamming attacks on proposed two-tier hierarchical clustered WSN topology. The two-tier hierarchical cluster based topology is investigated based on contention based protocol suite through OPNET simulation scenarios. 展开更多
关键词 802.15.4 WSN Communication Hierarchical CLUSTER TOPOLOGY simulation Security Jamming ATTACK Contention-Based protocols
下载PDF
Effect of Transmission Range on Ad Hoc on Demand Distance Vector Routing Protocol
18
作者 Mohammad Izharul Hasan Ansari Surendra Pal Singh Mohammad Najmud Doja 《Journal of Computer and Communications》 2016年第2期34-46,共13页
The necessary background as well as the details of simulation was presented to simulate and evaluate the performance of the ad hoc on-demand distance vector routing protocol in mobile ad hoc network with the help of t... The necessary background as well as the details of simulation was presented to simulate and evaluate the performance of the ad hoc on-demand distance vector routing protocol in mobile ad hoc network with the help of the network simulator NS2 using the common transmission range to deliver the data packets at the destination node. The number of participating nodes played an important role to predict the conditions for the best performance of the protocol with respect to throughput, delay, packet delivery ratio, drop packets, consumed and residual energy of the network. Further, the efforts can be put to control the transmission range dynamically and overheads for reducing the energy consumption in the network and improving its lifetime of the nodes and the lifespan of the network. 展开更多
关键词 MANET Routing protocol Network simulator Transmission Range THROUGHPUT Delay Packet Delivery Ratio Energy Consumption Efficiency and Lifetime
下载PDF
一种基于轻量级虚拟化的网络仿真方法
19
作者 郭亮 《现代计算机》 2024年第5期116-120,共5页
针对高校传统实验环境不能满足网络实验教学需求的问题,提出了一种将轻量级虚拟化技术与Linux路由模块相结合以完善计算机网络科学研究和实验教学的仿真方法。通过将Linux的网络空间隔离功能与Mininet可编程特性和FRRrouting路由功能相... 针对高校传统实验环境不能满足网络实验教学需求的问题,提出了一种将轻量级虚拟化技术与Linux路由模块相结合以完善计算机网络科学研究和实验教学的仿真方法。通过将Linux的网络空间隔离功能与Mininet可编程特性和FRRrouting路由功能相结合,设计并验证了一种轻量级、高保真、易编程且易上手的计算机网络仿真方法,能够广泛支持计算机网络相关的研究与教学。 展开更多
关键词 网络仿真 轻量级虚拟化 路由协议 Mininet FRRouting
下载PDF
区块链网络综述 被引量:2
20
作者 司冰茹 肖江 +2 位作者 刘存扬 戴小海 金海 《软件学报》 EI CSCD 北大核心 2024年第2期773-799,共27页
区块链是典型的分布式系统,底层网络的性能和安全性至关重要.区块链网络的本质是P2P网络,然而在安全模型、传输协议和性能指标等方面与传统P2P网络存在明显差异.首先,针对区块链网络的传输流程进行全面、深入地分析,阐明区块链网络所面... 区块链是典型的分布式系统,底层网络的性能和安全性至关重要.区块链网络的本质是P2P网络,然而在安全模型、传输协议和性能指标等方面与传统P2P网络存在明显差异.首先,针对区块链网络的传输流程进行全面、深入地分析,阐明区块链网络所面临的瓶颈挑战.其次,针对区块链网络拓扑结构和传输协议的最新研究工作,从节点异构性、编码方案、广播算法和中继网络等方面系统性地分类梳理,并归纳总结跨链网络实现和网络仿真工具.最后,探讨区块链网络的未来研究趋势. 展开更多
关键词 区块链 拓扑结构 传输协议 跨链网络 仿真工具
下载PDF
上一页 1 2 53 下一页 到第
使用帮助 返回顶部