Tan Wei, Sha Xue-jun, Xu Yu-bin . Routing Algorithm Based on Self-similar Traffic in Mobile Ad hoc Network[J]. Journal of Electronics & Information Technology, 2008, 30(6): 1475-1479. doi: 10.3724/SP.J.1146.2006.01830
Citation:
Tan Wei, Sha Xue-jun, Xu Yu-bin . Routing Algorithm Based on Self-similar Traffic in Mobile Ad hoc Network[J]. Journal of Electronics & Information Technology, 2008, 30(6): 1475-1479. doi: 10.3724/SP.J.1146.2006.01830
Tan Wei, Sha Xue-jun, Xu Yu-bin . Routing Algorithm Based on Self-similar Traffic in Mobile Ad hoc Network[J]. Journal of Electronics & Information Technology, 2008, 30(6): 1475-1479. doi: 10.3724/SP.J.1146.2006.01830
Citation:
Tan Wei, Sha Xue-jun, Xu Yu-bin . Routing Algorithm Based on Self-similar Traffic in Mobile Ad hoc Network[J]. Journal of Electronics & Information Technology, 2008, 30(6): 1475-1479. doi: 10.3724/SP.J.1146.2006.01830
This paper analyses routing and queuing performance for self-similar traffic in mobile Ad hoc network which is ubiquity but neglected. A Multi-path Backup Optimized Power (MBOP) algorithm is presented based on network programming model, which exerts multi-path backup routing and optimizes the total transmission power. This algorithm is suitable for structure-changed mobile Ad Hoc network. The simulation result shows that the new algorithm can increase the throughput of network and improve delay.
Leland W E. On the self-similar nature of ethernet traffic[J].IEEE ACM Trans. Networking.1994, 2(1):1-15[2]Paxson V and Floyd F. Wide area traffic: the failure ofpoisson modeling[J].IEEE Trans. on Networking.1995, 3(3):226-244[3]Jiang M and Nikolic M. Impact of the self-similarity onwireless data network performance communications. 2001IEEE International Conference on Communications, Helsinki,Finland, ICC 2001, Vol.2: 477-481.[4]Yin Shouyi and Lin Xiaokang.Traffic self-similarity in mobileAd hoc networks. 2005 IEEE International Conference onWireless and Optical Communications Networks, Dubai UAE,WOCN2005: 285-289.[5]Liang Qilian. Ad hoc wireless network traffic-self-similarityand forecasting[J].IEEE Communications Letters.2002, 6(7):297-299[6]Giovanardi A and Mazzini G. Impact of chaotic self-similarand Poisson traffics on WLAN token passing protocols. 2000IEEE International Symposium on Circuits and Systems,Geneva, Switzerland, ISCAS 2000: 383-386.[7]Kulkarni S S. Statistically multiplexed adaptive operation ofAd hoc networks with self-similar traffic. WirelessCommunications and Systems, 1999: 19.1-19.5.[8]Bergamo P, Maniezzo D, Giovanardi A, Mazzini G, and ZorziM. Distributed power control for power-ware energy-efficientrouting in Ad hoc networks. European Wireless Conference2002, Florence, Italy, EW2002: 237-243.[9]Doshi S, BhandareS T, and X Brown. An on-demandminimum energy routing protocol for a wireless Ad hocnetwork[J].Mobile Computing and Communications Review.2002, 6(2):50-66[10]徐玉滨,谭巍. 宽带多径备份路由优化功率算法的研究. 通信学报,2005, 26(11): 76-81.Xu Yubin and Tan Wei. A Multi-path Backup OptimizedPower Algorithm for wideband networks. CommunicationLetters, 2005, 26(11): 76-81.