期刊文献+
共找到5篇文章
< 1 >
每页显示 20 50 100
Redundancy Elimination in GPRS network 被引量:3
1
作者 QIU Qin-long ZHANG Dong-mei +1 位作者 MA Jian ZHANG Da-jiang 《Journal of Zhejiang University-Science A(Applied Physics & Engineering)》 SCIE EI CAS CSCD 2006年第4期477-482,共6页
The mechanisms of TCP’s retransmission and reset will result in redundant packets. These redundant packets are often sent unnecessarily to the user over a slow last-hop link delaying useful traffic. This is a problem... The mechanisms of TCP’s retransmission and reset will result in redundant packets. These redundant packets are often sent unnecessarily to the user over a slow last-hop link delaying useful traffic. This is a problem for wide-area wireless links, such as General Packet Radio Service (GPRS), because unnecessary transmissions waste already limited radio bandwidth, battery power at the mobile terminal and incurs monetary cost due to charging by data volume. The paper first describes a GPRS model, then discusses how to eliminate the redundant packets in GPRS network and presents the simulation results in Network Simulation 2 (NS 2). The more traffic is, the more the network can benefit. In heavy traffic, it can even get more than 30% improvement in throughput. Average delay and loss percent are also lowered. 展开更多
关键词 GPRS TCP Redundancy Elimination network Simulation 2 (NS 2)
在线阅读 下载PDF
A new algorithm for wireless sensor network based on NS-2 被引量:2
2
作者 焦国太 孟庆丰 《Journal of Measurement Science and Instrumentation》 CAS 2013年第3期272-275,共4页
Considering wireless sensor network characteristics,this paper uses network simulator,version2(NS-2)algorithm to improve Ad hoc on-demand distance vector(AODV)routing algorithm,so that it can be applied to wireless se... Considering wireless sensor network characteristics,this paper uses network simulator,version2(NS-2)algorithm to improve Ad hoc on-demand distance vector(AODV)routing algorithm,so that it can be applied to wireless sensor networks.After studying AODV routing protocol,a new algorithm called Must is brought up.This paper introduces the background and algorithm theory of Must,and discusses the details about how to implement Must algorithm.At last,using network simulator(NS-2),the performance of Must is evaluated and compared with that of AODV.Simulation results show that the network using Must algorithm has perfect performance. 展开更多
关键词 wireless sensor networks routing protocol network simulator version 2 (NS-2) Must algorithmCLC number:TN926 Document code:AArticle ID:1674-8042(2013)03-0272-04
在线阅读 下载PDF
移动自组网的IP地址自动配置技术研究 被引量:6
3
作者 陈爱国 张曦煌 《计算机工程与应用》 CSCD 北大核心 2007年第35期146-149,共4页
列举了一些现有的移动自组网的IP地址自动配置方案,并对其优劣进行了分析,从而总结出解决该技术需要重点考虑的问题,在此基础上提出了一种二段式的解决方案,最后通过仿真分析了其性能。
关键词 移动自组网 自动配置 IP地址 冲突地址检测 NS2
在线阅读 下载PDF
一种星地一体的高速星载标签交换机流量控制机制的设计与仿真 被引量:4
4
作者 于倩 乔庐峰 陈庆华 《电子学报》 EI CAS CSCD 北大核心 2017年第7期1653-1659,共7页
为了优化大容量星载交换机的设计,提出了一种星载标签交换技术体制,针对该体制建立了星地一体化卫星网络的队列模型和流量控制机制,根据星载交换机存储资源使用状态调整地面网络设备队列调度权重,降低星载交换机存储资源使用量和丢包率... 为了优化大容量星载交换机的设计,提出了一种星载标签交换技术体制,针对该体制建立了星地一体化卫星网络的队列模型和流量控制机制,根据星载交换机存储资源使用状态调整地面网络设备队列调度权重,降低星载交换机存储资源使用量和丢包率.使用NS2软件仿真分析了长延迟条件下星上缓存队列阈值、星上缓存区容量、地面设备队列调度权重之间的关系.为星载标签交换机和星地一体化网络的设计提供了参考依据. 展开更多
关键词 星载交换机 流量控制 基于类的队列调度 网络仿真
在线阅读 下载PDF
Game Theoretic Simulation on the Mimicry Honeypot
5
作者 SHI Leyi ZHAO Junnan +3 位作者 JIANG Lanlan XING Wenjuan GONG Jian LIU Xin 《Wuhan University Journal of Natural Sciences》 CAS CSCD 2016年第1期69-74,共6页
A mimicry honeypot framework based on game theory is presented in our work, which can calculate the equilibrium strategy of the deceptive game using non-cooperative incomplete dynamic game theory, and make decisions f... A mimicry honeypot framework based on game theory is presented in our work, which can calculate the equilibrium strategy of the deceptive game using non-cooperative incomplete dynamic game theory, and make decisions for the mimicry framework to deploy the simple service, the honeypot and the fake honeypot. A mimicry prototype is implemented using NS2 platform, and simulation experiments are launched to validate the decision-making result and the deceptive performance of the mimicry honeypot. The empirical study shows that the mimicry honeypot framework based on game theory can be able to influence the equilibrium strategy results by dynamically changing the deployment vector of the mimicry system. It validates that the mimicry honeypot framework has better flexibility, activeness and fraudulence than the traditional honeypot. 展开更多
关键词 HONEYPOT mimicry honeypot game theory EQUILIBRIUM network Simulator 2 (NS2)
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部