计算机工程与应用 ›› 2011, Vol. 47 ›› Issue (26): 120-123.

• 网络、通信、安全 • 上一篇    下一篇

战术Ad hoc网业务量突发特性下的退避算法研究

卢 颖1,2,康凤举1,钟联炯2,高武奇2   

  1. 1.西北工业大学 航海工程学院,西安 710072
    2.西安工业大学 计算机科学与工程学院,西安 710032
  • 收稿日期:1900-01-01 修回日期:1900-01-01 出版日期:2011-09-11 发布日期:2011-09-11

Study of backoff algorithm about burst traffic character of tactical Ad hoc network

LU Ying1,2,KANG Fengju1,ZHONG Lianjiong2,GAO Wuqi2   

  1. 1.College of Marine Engineering,Northwestern Polytechnical University,Xi’an 710072,China
    2.College of Computer Science and Engineering,Xi’an Technological University,Xi’an 710032,China
  • Received:1900-01-01 Revised:1900-01-01 Online:2011-09-11 Published:2011-09-11

摘要: 战术Ad hoc网是一种以突发数据业务为主的分组无线网络,业务流实际上具有着一种自相似特性,与以往研究中所使用的泊松业务模型区别很大。自相似业务突发产生成批到达,使得节点缓存队列更加拥塞,排队时延增长。在研究多路重尾ON/OFF源生成自相似业务的基础上,通过对各源的突发情况进行定量分析,提出了一种适用于自相似业务的退避算法。该算法为节点引入适当的竞争系数,使得对于信道的访问可以根据当前网络的突发状态合理分派。实验在OPNET下进行,通过调整网络节点数和突发程度,仿真得到各项统计结果。不论网络时延还是吞吐量,改进后的协议都具有较好的性能。这对战术Ad hoc网络的协议设计、资源的优化配置具有参考价值。

关键词: 自相似, Ad hoc网, 退避算法, 流量突发

Abstract: Tactical Ad hoc network traffic possesses self-similar character.It is very different from traditional Poisson model.Self-similar traffic is burstingly generated and arrives in batches.It causes buffer array of nodes more crowded and time delay of queuing to rise.To this issue,study based on assembling of multiple ON/OFF sources to simulate self-similar traffic input raises a MAC backoff algorithm which is suitable for self-similar flow through quantificational analysis of bursting situation of each sources.This algorithm introduces appropriate competition coefficient and makes appropriate nodes assignments to channel access in accordance with current bursting status.Experiments carried on OPNET obtain each graph of network performance through analogue simulation of different number of terminals and different burst degree of traffic flow.The results show the improved protocol has better performance in time delay and throughputs.The research has great significance for protocol designing of Ad hoc network,improvement of the network performance and optimization of the resources configuration.

Key words: self-similar, Ad hoc, backoff algorithm, burst of traffic flow