Advanced Search
Volume 30 Issue 6
Dec.  2010
Turn off MathJax
Article Contents
Tan Wei, Sha Xue-jun, Xu Yu-bin . Routing Algorithm Based on Self-similar Traffic in Mobile Ad hoc Network[J]. Journal of Electronics & Information Technology, 2008, 30(6): 1475-1479. doi: 10.3724/SP.J.1146.2006.01830
Citation: Tan Wei, Sha Xue-jun, Xu Yu-bin . Routing Algorithm Based on Self-similar Traffic in Mobile Ad hoc Network[J]. Journal of Electronics & Information Technology, 2008, 30(6): 1475-1479. doi: 10.3724/SP.J.1146.2006.01830

Routing Algorithm Based on Self-similar Traffic in Mobile Ad hoc Network

doi: 10.3724/SP.J.1146.2006.01830
  • Received Date: 2006-11-20
  • Rev Recd Date: 2007-05-23
  • Publish Date: 2008-06-19
  • This paper analyses routing and queuing performance for self-similar traffic in mobile Ad hoc network which is ubiquity but neglected. A Multi-path Backup Optimized Power (MBOP) algorithm is presented based on network programming model, which exerts multi-path backup routing and optimizes the total transmission power. This algorithm is suitable for structure-changed mobile Ad Hoc network. The simulation result shows that the new algorithm can increase the throughput of network and improve delay.
  • loading
  • Leland W E. On the self-similar nature of ethernet traffic[J].IEEE ACM Trans. Networking.1994, 2(1):1-15[2]Paxson V and Floyd F. Wide area traffic: the failure ofpoisson modeling[J].IEEE Trans. on Networking.1995, 3(3):226-244[3]Jiang M and Nikolic M. Impact of the self-similarity onwireless data network performance communications. 2001IEEE International Conference on Communications, Helsinki,Finland, ICC 2001, Vol.2: 477-481.[4]Yin Shouyi and Lin Xiaokang.Traffic self-similarity in mobileAd hoc networks. 2005 IEEE International Conference onWireless and Optical Communications Networks, Dubai UAE,WOCN2005: 285-289.[5]Liang Qilian. Ad hoc wireless network traffic-self-similarityand forecasting[J].IEEE Communications Letters.2002, 6(7):297-299[6]Giovanardi A and Mazzini G. Impact of chaotic self-similarand Poisson traffics on WLAN token passing protocols. 2000IEEE International Symposium on Circuits and Systems,Geneva, Switzerland, ISCAS 2000: 383-386.[7]Kulkarni S S. Statistically multiplexed adaptive operation ofAd hoc networks with self-similar traffic. WirelessCommunications and Systems, 1999: 19.1-19.5.[8]Bergamo P, Maniezzo D, Giovanardi A, Mazzini G, and ZorziM. Distributed power control for power-ware energy-efficientrouting in Ad hoc networks. European Wireless Conference2002, Florence, Italy, EW2002: 237-243.[9]Doshi S, BhandareS T, and X Brown. An on-demandminimum energy routing protocol for a wireless Ad hocnetwork[J].Mobile Computing and Communications Review.2002, 6(2):50-66[10]徐玉滨,谭巍. 宽带多径备份路由优化功率算法的研究. 通信学报,2005, 26(11): 76-81.Xu Yubin and Tan Wei. A Multi-path Backup OptimizedPower Algorithm for wideband networks. CommunicationLetters, 2005, 26(11): 76-81.
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (3098) PDF downloads(1252) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return