期刊文献+

面向流水线型模式的MANET嵌入式可靠性分析研究

Embedded Reliability Modeling of Assembly-line Production Oriented MANET
在线阅读 下载PDF
导出
摘要 随着大型离散制造业的竞争日益激烈,提高生产效率变得越来越重要。实施MES(Manufacturing ExecutionSystem)是提高竞争力的一个比较好的解决方案,而网络通信畅通是实施MES的关键基础。针对大型离散制造业车间的行业特点和实际环境,引入了移动自组织网络(MANET,Mobile Ad hoc Network)作为通信的网络。由于MA-NET是不依赖固定基础设施、无中心控制、动态拓扑的动态无线通讯网络,研究基于实际环境的MANET的可靠性对于网络的部署和调整就显得非常有现实意义。基于实际制造业车间环境,给出了面向作业型制造业生产模式的MANAET可靠性分析模型(ERMWT,Embedded Reliability Model on Working Table)。 Since the market competition of manufacturing becomes intense, improving the productive efficient is of importance. Manufacturing Execution System(MES) is considered to be good solution, but the communication network is basic of MES. With the serious environment of the shop in manufacturing, MANET(mobile ad hoc network) is introduced into our scheme. MANET is a kind of dynamic wireless communication network that does not rely on a fixed infrastructure and is lack of any centralized control. Based on a deep analysis of the application and real work environment, this paper proposed a ERMWT(Embedded Reliability Model on Working Table)for a work table production oriented MANET.
出处 《计算机科学》 CSCD 北大核心 2013年第06A期374-376,386,共4页 Computer Science
基金 国家自然科学基金(61073168)资助
关键词 MANET 可靠性 制造业 嵌入式 MANET,Reliability,Production, Embedded
  • 相关文献

参考文献12

  • 1Bai F, Sadagopan N, Krishnamachari B, et al. Modelling Path Duration Distributions in MANETS and Their Impact on Reac- tive Routing Protocols[J]. IEEE J. on Selected Areas in Com- munications, 2004,22 ( 7 ) : 1357-1373.
  • 2Colbourn C H. The combinatorics of network reliability[M]. New York: Oxford University Press, 1987.
  • 3Fratta L,Montanari U G. A Boolean algebra method for compu- ting terminal reliability in a communication network[J]. IEEE Trans Circuit Theory, 1973,20 (3) : 203-11.
  • 4Fratta L,Montanari U G. A recursive method based on case a- nalysis for computing Network terminal reliability [J]. IEEE Trans Commun, 1978,26(8).
  • 5ElFotoh H A, Iyengar S S, Chakrabarty K. Computing reliability and message delay for cooperative wireless distributed sensor networks subject to random failures[J]. IEEE Transactions on Reliability, 2005,54(1) : 145-155.
  • 6Cook J L, Ramirez-Marquez J E. Two-terminal reliability analy-ses for a mobile ad hoc wireless network[J]. Reliability Engi neering & System Safety, 2007,92(6) : 821-829.
  • 7Ramirez-Marqueza J E, Roeeob C M. All-terminal network relia- bility optimization via probabilistic solution diseovery[J]. Relia- bility Engineering and System Safety, 2008,93: 1689-1697.
  • 8Dimitar T, Sonja F, Bekim C, et al. Link reliability analysis in ad hoe networks [C]//XII Telekomunikacioni forum TELFOR 2004. Beograd, Sava Centar, 2004:23-25.
  • 9赵志峰,赵曦滨,陈丹宁.多维MANET可靠性建模研究[J].计算机科学,2011,38(5):60-63. 被引量:4
  • 10You Zhi-yang, Zhao Xi-bin, Zhao Zhi-feng, et al. Reliability Modeling of Assembly-line Production Oriented MANET[C]// International Conference on Computer Application and System Modeling. 2010.

二级参考文献13

  • 1Bai F, Sadagopan N, Krishnamachari B, et al. Modelling Path Duration Distributions in MANETS and Their Impact on Reac tive Routing Protocols[J]. IEEE J. on Selected Areas in Corn munications, 2004,22(7): 1357-1373.
  • 2Camp T, Boleng J, Davies V. A Survey of Mobility Models for Ad Hoc Network Research[J].Wireless Communication & Mo bile Computing(WCMC),Special issue on Mobile Ad Hoc Net working: Research, Trends and Applications, 2002,2 (5) : 483 502.
  • 3Kong J. GVG-RP: A Net-centric Negligibility-based Security Model for Self-organizing Networks[R]. 2006/140. IACR Cryptology ePrint Archive, April 2006.
  • 4Djenouri D, Khelladi L, Badache N. A survey of security issues in mobile ad hoc and sensor networks[J]. IEEE Communications Surveys & Tutorials, 2005,7 (4) : 2-28.
  • 5Groenevelt R, Nain P, Koole G. The Message Delay in Mobile Ad Hoc Networks[C]//Proc. PERFORMANCE. Oct. 2005.
  • 6Aad I, Hubaux J P, Knightly E W. Denial of Service Resilience in Ad Hoc Networks[C]//Proc. of MobiCom. 2004:202-215.
  • 7Zhou T, Choudhury R R, Ning P, et al. Privacy-Preserving Detection of Sybil Attacks in Vehicular Ad Hoc Networks[C]// Proc. of International Conference on MobiQuitous. 2007 : 1-8.
  • 8Ramaswamy S, Fu H, Sreekantaradhya M, et al. Prevention of Cooperative Black Hole Attack in Wireless Ad Hoc Networks [C]//Proc. of ICWN. 2003.
  • 9Hu Y C, Perrig A, Johnson D B. Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols[C]//ACM Workshop, Wireless Security WiSe 2003,San Diego, CA, USA, Sept. 2003.
  • 10Jiang S, Hez D, Raoz J. A Prediction-based Link Availability Estimation for Mobile Ad Hoc Networks[C]//Proc. of IEEE InfoCom. 2001.

共引文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部