Description: A d hoc 移动网络是一种完全由移动主机构成的网络. 网络拓扑易变, 带宽、能源有限是ad hoc 移动网络
的主要特点. 针对这些特点, 目前设计的ad hoc 路由协议大多采用按需查找方式. 该文介绍了这方面研究的最新进
展, 对几种典型的按需路由协议进行了说明、分析和综合比较. 文中分析了目前协议存在的一些问题并提出了相应的改进方法. 最后指出了下一步研究方向.-d hoc mobile network is a fully mobile host of a network. Network topology variable bandwidth, energy is limited ad hoc mobile networks, the main features. These characteristics, the current ad hoc design of the routing protocol used mostly to search on-demand approach. The paper introduced the the latest research progress on several typical on-demand routing protocols for the description, analysis and compared. the text analysis of the current agreement of some problems and the corresponding enhancement. Finally, the next direction. Platform: |
Size: 196608 |
Author:吴佳泽 |
Hits:
Description: 本程序为tcl程序,用于以ns2模拟ad hoc network.
本程序实作50个 nodes 在1000 * 1000公尺内随意移动的ad hoc network.
-the procedures for Philips procedures, NS2 used to mock ad hoc network. this program is for 50 nodes in 1000* 1,000 meters free mobile ad hoc network. Platform: |
Size: 3072 |
Author:黎智 |
Hits:
Description: 文在描述入侵检测技术的相关内容基础上,将移动代理技术引入入侵监测系统,针对成簇ad hoc网络提出了一种基于移动代理的入侵监测系统结构-described in the text intrusion detection technology on the basis of relevant content to mobile agent technology into Intrusion Detection System Clustered against ad hoc network of a mobile agent-based Intrusion Detection System Platform: |
Size: 100352 |
Author:joe |
Hits:
Description: 一篇关于移动ad hoc网络协议设计的国外博士论文,希望对大家有所帮助-An article on mobile ad hoc network protocol design foreign doctoral dissertation, I hope all of you to help Platform: |
Size: 5145600 |
Author:陈斌 |
Hits:
Description: 假设在一个ad hoc网络中,移动节点的发射功率PTx总是恒定的。要发送数据的移动节点总是先监听信道,测量接收到的信号功率X,其中X= I + N, I为接收到的干扰,N是噪声。移动节点只有在X<INThre时,才可以发射。式中,INThre为背景噪声门限。
在仿真中,我们规定每个移动节点的发射功率是常数,PTx = 1W;接收节点接收机的灵敏度Smin = -80 dBm;信号质量 min = 2 dB;系统的背景噪声门限INThre = 1.2e-10。
-Assuming in an ad hoc network, mobile node s transmission power is always constant PTX. To send data to the mobile node always monitor channel, measuring the received signal power X, which X = I+ N, I was received interference, N is the noise. Mobile node only when X <INThre when it is fired. Where, INThre threshold for background noise. In the simulation, we require that each mobile node s transmission power is constant, PTx = 1W receiver node receiver sensitivity Smin =-80 dBm signal quality Platform: |
Size: 7168 |
Author:飞 |
Hits:
Description: 根据有无固定基础设施,无线局域网又可分为BSS (Basic Service Set)和IBSS (Independent Basic Service Set)。我们要研究的ad hoc网络属于后者。假设在一个ad hoc网络中,移动节点的发射功率PTx总是恒定的。要发送数据的移动节点总是先监听信道,测量接收到的信号功率X,其中X= I + N, I为接收到的干扰,N是噪声。移动节点只有在X<INThre时,才可以发射。式中,INThre为背景噪声门限。
在仿真中,我们规定每个移动节点的发射功率是常数,PTx = 1W;接收节点接收机的灵敏度Smin = -80 dBm;信号质量 min = 2 dB;系统的背景噪声门限INThre = 1.2e-10。
-According to the availability of fixed infrastructure, wireless local area network can be divided into BSS (Basic Service Set) and IBSS (Independent Basic Service Set). We have to study the ad hoc network belong to the latter. Assuming in an ad hoc network, mobile node s transmission power is always constant PTX. To send data to the mobile node always monitor channel, measuring the received signal power X, which X = I+ N, I was received interference, N is the noise. Mobile node only when X <INThre when it is fired. Where, INThre threshold for background noise. In the simulation, we require that each mobile node s transmission power is constant, PTx = 1W receiver node receiver sensitivity Smin =-80 dBm signal quality Platform: |
Size: 7168 |
Author:何炳钦 |
Hits:
Description: 移动自组织网AODV协议的优化设计与仿真测试-Mobile Ad Hoc Network Optimization AODV protocol design and simulation test Platform: |
Size: 485376 |
Author:huayanchun |
Hits:
Description: Host Identity Protocol on Linux is an implemetation of the Host Identity Protocol (HIP) and the related architecture. HIP is a proposal to change the TCP/IP stack to securely support mobility and multi-homing. Additionally, it provides for enhanced security and privacy and advanced network concepts, such as moving networks and mobile ad hoc networks. HIP is "cool", which means that as a mobile VPN solution, when your network interfaces go up or down, there is no need to re-establish a secure tunnel. Platform: |
Size: 2965504 |
Author:nihao |
Hits:
Description: 该代码用来实现一个基本移动自组网的仿真,各个节点随机移动,通过相互交换数据观察最后运行结果,代码简洁,避免了一些大型仿真软件的复杂使用过程。-The code used to achieve a basic mobile ad hoc network simulation, each node random movement, through mutual exchange of data to observe the final results, the code is simple and avoids some of the complexity of large-scale simulation software use. Platform: |
Size: 32768 |
Author: |
Hits:
Description: 动态源路由协议(Dynamic Source Routing, DSR)源码。DSR是在移动自组网(MANET)中使用的一种路由协议。-Dynamic Source Routing protocol (Dynamic Source Routing, DSR) source. DSR are in mobile ad hoc network (MANET) to use a routing protocol. Platform: |
Size: 86016 |
Author:王磊 |
Hits:
Description: In the next generation of wireless communication systems, there will be a need for the rapid
deployment of independent mobile users. Significant examples include establishing survivable, efficient,
dynamic communication for emergency operations, disaster relief efforts, and military networks. Such
network scenarios cannot rely on centralized and organized connectivity, and can be conceived as
applications of mobile ad hoc networks. A MANET is an autonomous collection of mobile users that
communicate over relatively bandwidth constrained wireless links. Since the nodes are mobile, the
network topology may change rapidly and unpredictably over time. The network is decentralized, where
all network activity including discovering the Platform: |
Size: 119808 |
Author:Andre |
Hits:
Description: This dissertation contributes a jam-resistant communications protocol for use in
mobile ad-hoc network (MANET). Specic focus is given to the network layer rout-
g of packets within a MANET. A MANET is a self-organizing multi-hop wireless
twork that is comprised of many mobile hosts communicating wirelessly. As a result
their mobility and dependence on wireless communications, network layer routing
especially prone to errors. An algorithm has been developed using the concept concurrent codes to allow for jam-resistant wireless communications without a pre-
shared secret. The algorithm allows for the recovery of messages even in the presence
of signicant noise. Experimental results show that a cross-layer protocol designed
to take advantage of this property allows for more eective communications in noisy
environments such as disaster sites where current network protocols experience signif-
icant packet loss rates. Ultimately, this research presents a communications protocol Platform: |
Size: 6118400 |
Author:venkata |
Hits:
Description: BonnMotion是一个可以用来创建和分析移动场景的Java软件。它由德国波恩大学 (University of Bonn) Computer Science IV学院的通信系统研究小组开发出来的,现被广泛用作研究移动ad hoc网络特性的工具。
BonnMotion创建的场景可以输出给网络仿真软件ns-2和 GlomoSim/QualNet使用。-BonnMotion is a Java software which creates and analyses mobility scenarios. It is developed within the Communication Systems group at the Institute of Computer Science IV of the University of Bonn, Germany, where it serves as a tool for the investigation of mobile ad hoc network characteristics. The scenarios can also be exported for the network simulator ns-2 and GlomoSim/QualNet. Several mobility models are supported, namely Platform: |
Size: 315392 |
Author:林寒 |
Hits:
Description: opnet modeler中对移动ad hoc网络DSR路由协议的仿真-opnet modeler in mobile ad hoc network routing protocol of the simulation DSR Platform: |
Size: 284672 |
Author:赵硕平 |
Hits:
Description: TCl Script for simulating mobile ad hoc network using greedy perimeter stateless routing and application is VoIP with no background traffic Platform: |
Size: 4096 |
Author:as-sundais |
Hits:
Description: TCl Script for simulating mobile ad hoc network using greedy perimeter stateless routing and application is VoIP with background traffic Platform: |
Size: 4096 |
Author:as-sundais |
Hits: