用户名: 密码: 验证码:
无人飞行器Ad Hoc网络关键技术及仿真研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
无人飞行器Ad Hoc网络的部署不需要预先建立基础设施,不囿于以控制基站为中心的星形网络结构,多跳转发的通信模式突破了飞行器只能工作于基站通信范围内的局限,从而扩宽了网络覆盖范围,具备改变战场通信模式的潜力。针对当前无人飞行器Ad Hoc网络研究应用中面临的任务繁杂、可控性和适应性差等难题,本文采用将通信与控制领域相结合的系统分析与设计研究方法,分别从基于容错的拓扑控制、基于延迟容忍网络的路由协议和基于仿真的分析优化等方面对无人飞行器Ad Hoc网络相关技术进行了深入研究,提出了相应的策略和方法,主要研究内容概括如下:
     一、论文首先对无人飞行器Ad Hoc网络相关技术及应用的国内外研究现状进行了概述,分析比较了不同方法的优缺点,提出了将通信网络性能与飞行器可控移动性两个不同领域的概念技术相结合的系统分析与设计研究思路,以期在运动控制效率和网络性能之间取得最佳折衷。
     二、顶点2连通是网络容错的基本属性和要求,当网络中无人飞行器节点(以下简称节点)完全可控时,研究了利用节点移动实现容错的问题。在链状构形网络中,提出了一种简单有效的分布式节点移动控制算法,节点仅需利用邻居节点的局部信息进行决策,通信开销小,资源消耗少。在平面构形网络中,将网络容错问题转化为最短移动距离的顶点2连通图强化问题,提出了一种两阶段的集中式节点移动控制算法。第一阶段中,节点不移动,通过在网络通信拓扑图中直接添加强化边来获取顶点2连通。寻找最小成本的强化边组合是NP完全问题,基于文化基因算法框架,设计了符合问题特点的全局进化策略、局部优化方法和考虑节点移动约束的强化边成本设定,计算得到了近似最优的最小成本强化边组合。第二阶段中,通过节点移动来实现这些强化边,提出了基于一致性原理的控制算法,在满足网络连通的约束条件下,移动强化边连通的节点及其关联节点,改变拓扑结构,实现网络容错。
     三、当网络中部分节点可控时,研究了引入辅助中继节点实现容错的问题。在平面构形网络中,将寻求最少数量中继节点及其位置的约束优化问题转化为瓶颈Steiner最小树问题,参考“Steinerized”范式,以连通分割节点所需中继节点的数量为强化边成本,提出了基于网络通信拓扑完全图中最小成本2连通子图的算法框架。研究了求解最小成本2连通子图的多项式时间近似算法和随机搜索算法,当采用近似算法时,整个算法有固定近似比,而随机搜索算法可进一步提高整个算法的平均性能。当中继节点的位置不局限于强化边上时,在算法得到的优化解中搜索可合并的中继节点组合,并用少量节点替代,可进一步减少所需中继节点数量,提高算法性能。
     四、当网络处于间隙性连通或分割状态,且节点完全不可控时,研究了基于延迟容忍网络的“储存—携带—转发”路由模式进行信息传输的问题。结合基于冗余机制的并行性和基于效用机制的选择性两者的优势,利用少量的消息副本和网络信息,提出了一种冗余与效用混合机制的路由协议。将最优停止理论应用于基于节点效用的消息副本分发决策过程,在消息副本的分发速度和消息副本携带节点的效用平均值之间取得折衷;将消息副本总数控制策略与消息副本分发策略相结合,可减少网络资源消耗,提高算法的可扩展性,实现了传输延迟、传输成功率和资源消耗等网络性能之间的最佳平衡。
     五、针对目前在网络协议算法的分析测试方面存在的难点,研究了数学分析和实验测试方法的优势与不足,采用了基于数字仿真进行网络性能分析测试的方法,结合现有软件工具,设计实现了基于分布交互仿真的无人飞行器Ad Hoc网络仿真系统,为拓扑控制算法和路由协议的分析测试提供软件实验环境。仿真系统采用高层体系结构,实现软件资源、仿真组件的有效重用和互联互操作。针对基于仿真优化的复杂系统分析设计过程中仿真模型精度与优化过程运行效率之间的矛盾,研究了仿真元模型在仿真优化中的应用,最后以网络性能优化为例,对本文的模型算法和仿真系统进行了实例验证。
The deployment of the UAVs Ad Hoc networks does not need any establishedsupporting infrastructure, the network architecture isn’t limited to the star-structure withcontrol base station as the center. Moreover, the multi-hop message delivery mode breaksthe constraint on which the UAV can only work within the communication range of centralbase station. Consequently, the UAVs Ad Hoc networks, whose coverage is enlarged, hasthe potential to revolutionize the battle field communication. Currently the study of UAVsAd Hoc networks is encumbered by the difficulties such as tedious and poor controllability,bad adaptability etc. Based on the joint analysis and design of communication and controlsystems, this dissertation studies some technologies of the UAVs Ad Hoc networksincluding the fault-tolerant topology control, the routing protocol of delay-tolerant network,and the simulation-based analysis and optimization. The main contents of this dissertationcan be summarized as follows:
     (1) Firstly, the state of the art of the UAVs Ad Hoc networks is surveyed and theadvantages and disadvantages of different methods are compared. In order to get the besttrade-off between the effectiveness of the movement control and the network performance,the joint analysis and design strategy is proposed which combines the communicationnetwork performance with the controlling mobility.
     (2) Vertex-biconnectivity is basic feature of fault-tolerant networks. When the nodesin the network are controllable, the mobility-based control method is investigated to realizefault-tolerant networks. For the chain-formation network, a simple and effective movementalgorithm which requires only the local information of the neighbor nodes is proposed toreduce the spending of communication and the consume of resource. For the flat-formationnetwork, the fault-tolerant problem is converted to the mobility-based min-total-distancevertex-biconnectivity augmentation problem for graph, a two-phase centralized movementcontrol algorithm is proposed. In the first phase, the nodes are immovable, thevertex-biconnectivity of a given communication topology graph is achieved by addingedges which join the different vertexes. The search of the min-cost set of edges is aNP-hard problem. In the memetic algorithm frame, the problem specific globalevolutionary strategy, the local improvement procedure and the cost define ofaugmentation edge considering node movement constraint are developed to find thecheapest possible set of additional edges which makes the graph vertex-biconnected. In thesecond phase, with the augmentation edges as heuristic, the vertexes which the edgesconnected move towards each other to establish edges. The related nodes also move as thefollowers with the leader-follower movement control algorithm based on the consensusalgorithm. After nodes moved, the changed network becomes vertex-biconnected so thefault tolerant configuration is achieved.
     (3) When only part of the nodes in the network is controllable, the relay nodeplacement method is investigated to realize fault-tolerant networks. For the flat-formationnetwork, the minimum relay nodes placement problem is converted to the minimumbottleneck Steiner tree problem. Following the Steinerized research pattern, an algorithmframe based on the min-cost spanning subgraph of a complete graph is proposed. Tworelay node placement algorithms are investigated, the first one is a polynomial timeapproximation algorithm, and the second one is a random algorithm which can improve theresult on average. When the node placement locations are not limited to the straight linebetween the vertexes, an improvement method can be used to search the relay nodes setswhich can be replaced with much less nodes in the final resolution, so the number of relaynode is reduced and the performance of algorithm is improved.
     (4) When the network experiences frequent and long duration partition, and the nodesare uncontrollable, the information transmission based on the delay tolerant networks’“store-carry-forward” routing pattern is investigated. Combining with the parallel action ofthe redundancy-based routing and the selectivity of the utility-based routing, a hybridrouting is proposed in which the requirement of network knowledge and the duplication ofmessage are small. The optimal stop theory is used to decide whether to copy the messageto the neighbors in contacted, so the balance between the delivery speed of the messageduplication and the average utility of the message duplication carrier is achieved. Thehybrid routing combined the message duplication delivery strategy and the duplicationnumber control strategy, so the usage of network is small, and the extendibility is improved,and the best tradeoff among several performances of network is achieved, such as thedelivery delay, the delivery success rate, and the usage of network.
     (5) To deal with the difficulties in analysis, validation and test of the algorithms andprotocols, the mathematical analysis and the experimental test are investigated, the digitalsimulation is used to analysis and test the performance of network. The UAVs Ad Hocnetworks simulation system is developed based on distributed interactive simulation. Thesimulation system is based on the High Level Architecture, so the reusability of thesoftware resources and the interoperability of the simulation module are realized. Toaddress the dilemma between the accuracy of simulation-model and runtime efficiencywhich take place in the simulation-based optimization of the analysis and designprocedures of complex system, the metamodel-based optimization is investigated. Aninstance in optimization of the network performance is implemented to evaluate thesimulation system and the algorithm in the dissertation.
引文
[1] office of the Secretary of Defense. Unmanned Aircraft Systems Roadmap2005-2030[R].2005.
    [2] Pinkney F, Hampel D, Dipierro S. UAV communications payloaddevelopment[C]//MILCOM'97. Monterey,1997:403-407.
    [3] Banks B A. The UAV-LMDS system[D].2000.
    [4] Tozer T, Graee D, Thompson J. UAVs and HAPS-potential convegence formilitary communications[C]//IEE Colloquium on Military Satellite Communications.London,2000.
    [5] Dovis F, Sellone F. Increasing the capacity of existing terrestrail outdoor radiomobile systems by means of UAV-HIALE platforms[C]//Vehicular TechnologyConference. Tokyo,2000:2365-2369.
    [6] Tozer T C, Graee D. High-altitude platforms for wireless communications[J].Electronics and Communication Engineering Journal.2001,13(2):127-137.
    [7]周逊.基于Ad Hoc的无人机网络及其路由协议研究[D].西南交通大学博士学位论文.2007.
    [8] RFC2501,Mobile Ad Hoc Networking (MANET)[S].
    [9] Charles E. Perkins. Ad Hoc Networking[M].Londong: Addison-Wesley.2001.
    [10]陈林星,曾曦,曹毅.移动Ad Hoc网络-自组织分组无线网络技术[M].北京:电子工业出版社.2006.
    [11] Timothy X Brown, Brain Argrow, Cory Dixon, Sheetalkumar Doshi. Ad HocUAV Ground Network(AUGNet)[C]//AIAA3rd "Unmanned Unlimited" TechnicalConference, Workshop and Exhibit. Chicago, lllinois,2004.
    [12] Daniel Lihui Gu, Guangyu Pei, Henry Ly, Mario Gerla. UAV AidedIntelligent Routing for Ad-Hoc Wireless Network in Single-area Theater[C]//WirelessCommunications and Networking Conference.2000:1220-1225.
    [13] Daniel Lihui Gu, Guangyu Pei, Henry Ly, Mario Gerla. Hierarchical routingfor multi-layer ad hoc wireless networks with UAVs[C]//IEEE Milcom. Los Angeles,2000:310-314.
    [14] Michael Le, Joon-Sang Park, Mario Gerla. UAV assisted disruption tolerantrouting[C]//Milcom. Washington USA,2006:1-5.
    [15] Samad T, Bay J, Godbole D. Network-centric systems for military operationsin urban terrain: the role of UAVs[C]//IEEE. Minneapolis,2007:92-107.
    [16]张学,陆桑璐,陈贵海,陈道蓄.无线传感器网络的拓扑控制[J].软件学报.2007,18(4):943-954.
    [17] Poduri S, Pattem S, Krishnamachari B, Sukhatme G. A unifying frameworkfor tunable topology control in sensor networks[R].2005:1-15.
    [18] Paolo Santi. Topology Control in Wireless Ad Hoc and SensorNetworks[M].John Wiley&Sons Ltd.2005.
    [19]田野.无线Ad Hoc网络拓扑控制技术研究[D].西安:西安电子科技大学博士学位论文.2008.
    [20] Lefteris M. Kirousis, Evangelos Kranakis, Danny Krizanc, Andrzej Pelc.Power consumption in packet radio networks[J]. Theoretical Computer Science.2000,243(1-2):289-305.
    [21] Andrea E. F. Clementi, Paolo Penna, Riccardo Silvestri. On the powerassignment problem in radio network[J]. Mobile Networks and Applications.2004,9(2):125-140.
    [22] Thomas H. Cormen, Charles E. Leiserson, Ronald L. Rivest, Clifford Stein.Introduction to Algortihms(Second Edition)[M].The MIT Press.2001.
    [23] Ram Ramanathan, Regina Rosales-Hain. Topology control of multihopwireless networks using transmit power adjustment[C]//IEEE INFOCOM. Tel-Aviv, Israel,2000:404-413.
    [24] ERROL L. Lloyd, RUI LIU, MADHAV V. MARATHE, RAMRAMANATHAN. Algorithmic Aspects of Topology Control Problems for Ad HocNetworks[J]. Mobile Networks and Applications.2005,10(1-2):19-34.
    [25] Li L, Joseph Y. Halpern, Paramvir Bahl, Yi-Min Wang. A cone-baseddistributed topology control algorithm for wireless multi-hop networks[J].2005,13(1):232-243.
    [26] Mohsen Bahramgiri, MohammadTaghi Hajiaghayi, Vahab S. Mirrokni.Fault-tolerant and3-dimensional distributed topology control algorithms in wirelessmultihop networks[C]//IEEE International Conference on Computer Communications andNetworks(ICCCN02).2002:392-397.
    [27] Ning Li, Jennifer C. Hou. Topology control in heterogeneous wirelessnetworks: problems and solutions[C]//IEEE INFOCOM. New York,2004:232-243.
    [28] Roger Wattenhofer, Aaron Zollinger. XTC: a practical topology controlalgorithm for ad-hoc networks[C]//Int'1Parallel and Distributed Processing Symp. NewMexico,2004:216-223.
    [29] Gruia Calinescu, Peng-Jun Wan. Range assignment for biconnectivity andk-edge connectivity in wireless ad hoc networks[J]. Mobile Networks and Applications.2006,11(2):121-128.
    [30] Xiuzhen Cheng, Ding-Zhu Du, Lusheng Wang, Baogang Xu. Relay sensorplacement in wirelss sensor networks[J]. Wireless Networks.2008,14(3):347-355.
    [31] Guo-Hui Lin, Guoliang Xue. Steiner tree problem with minimum number ofsteiner points and bounded edge-length[J]. Information Processing Letters.1999,69(2):53-57.
    [32] Donghui Chen, Ding-Zhu Du, Xiao-Dong Hu, Guo-Hui Lin. Approximationsfor steiner trees with minimum number of steiner points[J]. Journal of TheoreticalComputer Science.2001,262(1-2):83-99.
    [33] Errol L. Lloyd, Guoliang Xue. Relay node placement in wireless sensornetworks[J]. IEEE Transactions on Computers.2007,56(1):134-138.
    [34] Jonathan L. Bredin, Erik D. Demaine, MohammadTaghi Hajiaghayi, DanielaRus. Deploying sensor networks with guaranteed capacity and fault tolerance[C]//The6thACM International Symposium on Mobile Ad Hoc Networking and Computing(MobiHoc'05). Urbana-Champaign, Illinois,2005.
    [35] Abhishek Kashyap, Samir Khuller, Mark Shayman. Relay placement forhigher order connectivity in wireless sensor networks[C]//IEEE INFOCOM.2006.
    [36] Weiyi Zhang, Guoliang Xue, Satyajayant Misra. Fault-tolerant relay nodeplacement in wireless sensor networks: problems and algorithms[C]//Infocom'07.2007.
    [37] Satyajayant Misra, Seung Don Hong, Guoliang Xue, Jian Tang. Constrainedrelay node placement in wireless sensor networks to meet connectivity and survivabilityrequirements[C]//IEEE INFOCOM. Phoenix, AZ,2008:281-285.
    [38] Bin Hao, Jian Tang, Guoliang Xue. Fault-tolerant relay node placement inwireless sensor networks: formulation and approximation[C]//IEEE Workshop on HighPerformance Switching and Routing (HPSR'04). Phoenix, Arizona,2004:246-250.
    [39] Jian Tang, Bin Hao, Arunabha Sen. Relay node placement in large scalewireless sensor networks[J]. Computer Communications, special issue on Wireless SensorNetworks.2006,29:490-501.
    [40] Hai Liu, Peng-Jun Wan, Xiaohua Jia. Fault-tolerant relay node placement inwireless sensor networks[C]//International Computing and Combinatorics Conference(COCOON).2005.
    [41] Anand Srinivas, Gil Zussman, Eytan Modiano. Mobile backbone networksconstruction and maintenance[C]//MobiHoc'06. Florence, Italy,2006:166-177.
    [42] Xiaofeng Han, Xiang Cao, Errol L. Lloyd, Chien-Chung Shen. Fault-tolerantrelay nodes placement in heterogeneous wireless sensor networks[C]//The26thIEEE/ACM Joint Conference on Computers and Communications (INFOCOM'07).Anchorage AK,2007.
    [43] Y.T. Hou, Y. Shi, H.D. Sherali. On energy provisoning and relay nodeplacement for wireless sensor networks[J]. IEEE Transactions on WirelessCommunications.2005,4(5):2579-2590.
    [44] Xu K., Q. Wang. Optimal wireless sensor networks(wsns) deployment:minimum cost with lifetime constraint[C]//The IEEE International Conference on Wirelessand Mobile Computing, Networking and Communications(WiMob'05). Montreal, Canada,2005.
    [45] Quanhong Wang, Glen Takahara, Hossam Hassaneim, Kenan Xu. On relaynode placement and locally optimal traffic allocation in heterogeneous wireless sensornetworks[C]//The IEEE Conference on Local Computer Networks30th Anniversary,LCN'05.2005.
    [46] Quanhong Wang, Kenan Xu, Hossam Hassanein, Glen Takahara. Minimumcost guaranteed lifetime design for heterogeneous wireless sensor networks(WSNs)[C]//The24th IEEE International Performance, Computing, and CommunicationsConference (IPCCC'05). Phoenix, Arizona,2005.
    [47] Quanhong Wang, Kenan Xu, Glen Takahara, Hossam Hassanien. Locallyoptimal relay node placement in heterogeneous wireless sensor networks[C]//The48thIEEE Global Telecommunication Conference. St. Louis, Missouri,2005.
    [48] Reza Olfati-Saber, J. Alex Fax, Richard M. Murray. Consensus andcooperation in networked multi-agent systems[J].2007,95(1):215-233.
    [49] Minghui Zhu, Sonia Martínez. Discrete-time dynamic average consensus[J].Automatica(S0005-1098).2010,46(2):322-329.
    [50] Reza Olfati-Saber, Richard M. Murray. Consensus problems in networks ofagents with switching topology and time-delays[J]. IEEE Transactions on AutomaticControl.2004,49(9):1520-1533.
    [51] Tove Gustavi, Dimos V. Dimarogonas, Magnus Egerstedt, Xiaoming Hu.Sufficient conditions for connectivity maintenance and rendezvous in leader-followernetworks[J]. Automatica(S0005-1098).2010,46(1):133-139.
    [52] Sonia Martinez, Francesco Bullo, Jorge Cortes, Emilio Frazzoli. Onsynchronous robotic networks-Part II:Time complexity of rendezvous and deploymentalgorithms[J]. IEEE Transactions on Automatic Control.2007.
    [53] Anruag Ganguli, Jorge Cortes, Francesco Bullo. Multirobot rendezvous withvisibility sensors in nonconvex environments[J]. IEEE Transactions on Robotics.2006.
    [54] Feng Xiao, Long Wang, Jie Chen, Yanping Gao. Finite-time formationcontrol for multi-agent systems[J]. Automatica(S0005-1098).2009,45(11):2605-2611.
    [55] Wei Ren, Nathan Sorensen. Distributed coordination architecture formulti-robot formation control[J]. Robotics and Autonomous Systems.2008,56(2008):324-333.
    [56] D.D. Siljak. Dynamic graphs[J]. Nonlinear Analysis: Hybrid Systems.2008,2(2008):544–567.
    [57] Mehran Mesbahi. On state-dependent dynamic graphs and their controllabilityproperties[J]. IEEE Transactions on Automatic Control.2005,50(3):387-392.
    [58] Yoonsoo Kim, Mehran Mesbahi. On maximizing the second smallesteigenvalue of a state-dependent graph laplacian[J]. IEEE Transactions on AutomaticControl.2006,51(1):116-120.
    [59] Maria Carmela De Gennaro, Ali Jadbabaie. Decentralized control ofconnectivity for multi-agent systems[C]//The45th IEEE Conference on Decision andControl. Seville, Spain,2006:6388-6393.
    [60] Chris Godsil, Gordon Royle. Algebraic Graph Theory[M].Springer.2001.
    [61] Michael Schuresko, Jorge Cortes. Distributed motion constraints for algebraicconnectivity of robotic networks[C]//The47th IEEE Conference on Decision and Control.Cancun, Mexico,2008.
    [62] Prithwish Basu, Jason Redi. Movement control algorithms for realization offault tolerant ad hoc robot networks[J]. IEEE Network.2004,18(4):36-44.
    [63] Prithwish Basu, Jason Redi. Movement control algorithms for realization offault tolerant ad hoc robot networks[R]. BBN Technologies,2002.
    [64] Shantanu Das, Hai Liu, Ajith Kamath, Amiya Nayak. Localized movementcontrol for fault tolerance of mobile robot networks[C]//L. Orozco-Barbosa, T. Olivares, R.Casado, A. Bermudez(eds.). IFIP International Federation for Information Processing.Boston,2007:1-12.
    [65] Shantanu Das, Hai Liu, Amiya Nayak, Ivan Stojmenovic. A localizedalgorithm for bi-connectivity of connected mobile robots[J]. Telecommunication Systems.2009,40(3-4):129-140.
    [66] Hai Liu, Xiaowen Chu, Yiu-Wing Leung, Rui Du. Simple movement controlalgorithm for bi-connectivity in robotic sensor networks[J]. IEEE Journal on SelectedAreas in Communications.2010,28(7):994-1005.
    [67] Marco Conti, Silvia Giordano. Multihop ad hoc networking: The reality[J].Communications.2007,45(4):88-95.
    [68] Wenrui Zhao, Mostafa Ammar, Ellen Zegura. A message ferrying approachfor data delivery in sparse mobile ad hoc networks[C]//MobiHoc2004. Roppongi, Japan,2004:187-198.
    [69] Philippe Jacquet, Bernard Mans. Routing in intermittently connectednetworks: Age rumours in connected components[C]//The5th Annual IEEE Int'l Conf onPervasive Computing and Communications Workshops.2007:53-58.
    [70] Luciana Pelusi, Andrea Passarella, Marco Conti. Opportunistic networking:data forwarding in disconnected mobile ad hoc networks[J]. IEEE Communications.2006.
    [71] Kevin Fall. A delay-tolerant network architecture for challengedinternets[C]//ACM SIGCOMM'03.2003.
    [72]熊永平,孙利民,牛建伟,刘燕.机会网络[J].软件学报.2009,20(1):124-137.
    [73] http://www.dtnrg.org/.
    [74] http://www.jpl.nasa.gov/index.cfm.
    [75] Philo Juang, Hidekazu Oki, Yong Wang, Margaret Martonosi.Energy-efficient computing for wildlife tracking: design tradeoffs and early experienceswith ZebraNet[C]//ASPLOS'02.2002.
    [76] T. Small, Z. Hass. The Shared Wireless Infostation Model-A New Ad HocNetworking Paradigm(or Where there is a Whale, there is a Way)[C]//MobiHoc2003.2003.
    [77] P. Hui, A. Chaintreau, J. Scott, R. Gass. Pocket switched networks and humanmobility in conference environments[C]//ACM SIGCOMM Workshop on Delay-TolerantNetworking.2005:244-251.
    [78] Bert Hull, Vladimir Bychkovsky, Yang Zhang, Kevin Chen. CarTel: Adistributed mobile sensor computing system[C]//The4th Int'l Conf. on EmbeddedNetworked Sensor Systems. Boulder,2006:125-138.
    [79] Alex Pentland, Richard Fletcher, Amir Hasson. DakNet: RethinkingConnectivity in Developing Nations[J]. IEEE Computer.2004,(1):4-9.
    [80] Avri Doria, Maria Uden, Durga Prasad Pandey. Providing connectivity to theSaami nomadic community[C]//The2nd Int'l Conf. on Open collaborative Design forSustainable Innovation. Bangalore,2002.
    [81] Brewer E. Tier project. http://tier.cs.berkeley.edu/wiki/Home.2006.
    [82] Sushant Jain, Kevin Fall, Rabin Patra. Routing in a delay tolerantnetwork[C]//ACM SIGCOMM'04. Portland, Oregon, USA,2004.
    [83] Evan P.C. Jones, Paul A.S. ward. Routing strategies for delay-tolerantnetworks[J]. Computer Communication Review.2008.
    [84] Jian Shen, Sangman Moh, Ilyong Chung. Routing protocols in delay tolerantnetworks: a comparative survey[C]//The23rd International Technical Conference onCircuits/Systems, Computers and Commnications(ITC-CSCC2008).2008.
    [85] M. Grossglauser, D. N. C. Tse. Mobility Increases the Capacity of Ad HocWireless Networks[J]. Transactions on Networking.2002,10:477.
    [86] Rahul C.Shah, Sumit Roy, Sushant Jain, Waylon Brunette. Datamules:Modelling and analysis of a three-tier architecture for sparse sensor networks[J]. ElsevierAd Hoc Networks Journal.2003,(1):215-233.
    [87] D. Nain, N. Petigara, H. Balakrishnan. Integrated routing and storage formessaging applications in mobile ad hoc networks[J]. Mobile Networks and Applications.2004,9:595-604.
    [88] Amin Vahdat, David Becker. Epidemic routing for partially-connected ad hocnetworks[R]. Duke University,2000.
    [89] T. Small, Z. J. Haas. Resource and performance tradeoffs in delay-tolerantwireless networks[C]//ACM SIGCOMM Workshop on Delay-Tolerant Networking.2005:260-267.
    [90] A. Demers, D. Greene, C. Houser, W. Irish. Epidemic algorithms forreplicated database maintenance[J]. SIGOPS Operating Systems Review.1988,22:8-32.
    [91] Brendan Burns, Oliver Brock, Brian Neil Levine. MV routing and capacitybuilding in disruption tolerant networks[C]//IEEE INFOCOM. EMCI, Makati, Philippines,2005:398-408.
    [92] J. Burgess, B. Gallagher, D. Jensen, B. N. Levine. Maxprop: routing forvehicle-based disruption-tolerant networking[C]//IEEE INFOCOM.2006.
    [93] J. A. Davis, A. H. Fagg, B. N. Levine. Wearable computers as packettransport mechanisms in highly-partitioned ad-hoc networks[C]//International Symposiumon Wearable Computing.2001:141-148.
    [94] Anders Lindgren, Avri Doria, Olov Schelen. Probabilistic Routing inIntermittently Connected Networks[J]. ACM SIGMOBILE Mobile Computing andCommunications Review.2003,7(3):19-20.
    [95] K. Tan, Q. Zhang, W. Zhu. Shortest path routing in partially connected ad hocnetworks[C]//Global Telecommunications Conference.2003:1038-1042.
    [96] K. A. Harras, K. C. Almeroth, E. M. Belding-Royer. Delay tolerant mobilenetworks(DTMNs): controlled flooding schemes in sparse mobile networks[C]//IFIP-TC6Networking.2005:1180-1192.
    [97] K. A. Harras, K. C. Almeroth. Transport layer issues in delay tolerant mobilenetworks[C]//IFIP-TC6.2006.
    [98] Ram Ramanatha, Richard Hansen, Prithwish Basu, Regina Rosales-Hain.Prioritized Epidemic Routing for Opportunistic Networks[C]//ACM MobiOpp'07. SanJuan, Puerto Rico, USA,2007.
    [99] M. Mauve, A. Widmer, H. Hartenstein. A survey on position-based routing inmobile ad hoc networks[J]. IEEE Network.2001,15(6):30-39.
    [100] T. S. Eugene Ng, Hui Zhang. Predicting internet network distance withcoordinates-based approaches[C]//IEEE INFOCOM.2002:170-179.
    [101] Bard Karp, H. T. Kung. GPSR: greedy perimeter stateless routing for wirelessnetworks[C]//ACM Mobicom.2000:243-254.
    [102] J. Leguay, T. Friedman, V. Conan. Evaluating mobility pattern space routingfor DTNs[C]//IEEE INFOCOM.2006.
    [103] J. Lebrun, C.-N. Chuah, D. Ghosal, M. Zhang. Knowledge-basedopportunistic forwarding in vehicular wireless ad hoc networks[C]//IEEE VehicularTechnology Conference.2005:2289-2293.
    [104] R. D. Poor (2000). Gradient routing in ad hoc networks (MIT MediaLaboratory).
    [105] Thrasyvoulos Spyropoulos, Konstantinos Psounis, Cauligi S. Raghavendra.Single-copy routing in intermittently connected mobile networks[C]//Sensor and Ad HocCommunications and Networks.2004:235-244.
    [106] Thrasyvoulos Spyropoulos, Konstantions Psounis, Cauligi Raghavendra.Efficient Routing in Intermittently Connected Mobile Networks: The Single-Copy Case[J].IEEE/ACM Transactions on Networking.2008,16(1):63-76.
    [107] Qun Li, Daniela Rus. Sending messages to mobile users in disconnectedad-hoc wireless networks[C]//Mobile Computing and Networking.2000:44-55.
    [108] Evan P.C.Jones, Lily Li, Paul A.S.Ward. Practical routing in delay-tolerantnetworks[C]//ACM SIGCOMM'05. Philadelphia, PA, USA,2005.
    [109] The Dartmouth Wireless Trace Archive. http://crawdad.cs.dartmouth.edu/.
    [110] R. Handorean, C. Gill, G.-C. Roman. Accommodating transient connectivityin ad hoc and mobile settings[J]. Lecture Notes in Computer Science.2004,3001:305-322.
    [111] Wenrui Zhao, Mostafa Ammar. Message ferrying: Proactive routing inhighly-partitioned wireless ad hoc networks[C]//the9th IEEE international Workshop onFuture Trends of Distributed Computing Systems.2003.
    [112] Wenrui Zhao, Mostafa Ammar. Controlling the mobility of multiple datatransport ferries in a delay-tolerant network[C]//IEEE INFOCOM.2005.
    [113] A. Somasundara, A. Ramamoorthy, M. Srivastava. Mobile elementscheduling for efficient data collection in wireless sensor networks with dynamicdeadlines[C]//25th IEEE International Real Time Systems Symposium.2004.
    [114] Aman Kansal, Arun Somasundara, David Jea, Mani Srivastava. Intelligentfluid infrastructure for embedded networking[C]//Second International Conference onMobile Systems, Applications and Services.2004.
    [115] Jun Luo, Jean-Pierre Hubaux. Joint mobility and routing for lifetimeelongation in wireless sensor networks[C]//IEEE INFOCOM.2005.
    [116] Y. Gu, D. Bozdag, E. Ekici, F. Ozguner. Partitioning based mobile elementscheduling in wireless sensor networks[C]//2005.
    [117] Pradipta De, Ashish Raniwala, Srikant Sharma, Tzi-cker Chiueh. Designconsiderations for a multihop wireless network testbed[J]. IEEE Communications.2005:102-109.
    [118] David A. Maltz, Josh Broch, David B. Johnson. Experiences designing andbuilding a muti-hop wireless ad-hoc network testbed[R].1999.
    [119] Henrik Lundgren, David Lundberg, Johan Nielsen, Erik Nordstrom. Alarge-scale testbed for reproducible ad hoc protocol evaluations[C]//WCNC.2002.
    [120] B. A. Chambers. The grid roofnet: A rooftop ad hoc wireless network[D].MITMaster Thesis.2002.
    [121] J. Kaba, D. Raichle. Testbed on a desktop: Strategies and techniques tosupport multihop MANET routing protocol development[C]//MobiHoc.2001.
    [122] Sagar Sanghani, Timothy X Brown, Shweta Bhandare, Sheetalkumar Doshi.EWANT: The emulated wireless ad hoc network testbed[C]//WCNC.2003.
    [123] G. Judd, P. Steenkiste. Repeatable and realistic wireless experimentationthrough physical emulation[C]//HotNets.2003.
    [124] Stuart Kurkowski, Tracy Camp, Michael Coagrosso. MANET simulationstudies: The incredibles[J]. Mobile computing and Communications Review.2006,9(4):50-61.
    [125] The network simulator.ns-2. http://www.isi.edu/nsnam/ns.
    [126] Srinivasan Keshav. REAL: A network simulator[R]. Berkeley: University ofCalifornia,1988.
    [127] Xiang Zeng, Rajive Bagrodia, Mario Gerla. Glomosim: A library for parallelsimulation of large-scale wireless networks[C]//Workshop on Parallel and DistributedSimulation.1998:154-161.
    [128] Desbrandes F, S. Bertolotti, L. Dunand. Opnet2.4: An environment forcommunication network modeling and simulation[C]//European Simulation Symposium.1993.
    [129] S. Imre, Cs. Keszei, D. Hollos, P. Barta. Simulation environment for ad-hocnetworks in omnet++[C]//IST Mobile Summit2001.2001:135-140.
    [130]赵小刚.想定环境中无人机Ad Hoc网络仿真研究和实现[D].大连理工大学Master学位论文.2007.
    [131]吴迪,赵小刚,朱凤仙.想定环境中无人机Ad Hoc网络仿真研究和实现[J].系统仿真学报.2008,20(23):6409-6428.
    [132]吴迪,何兆祥,赵小刚,殷福亮.想定环境中对战术互联网性能评估方法的研究及实现[J].兵工学报.2008,29(9).
    [133]陈旿,孙凯将,张力,肖鑫.无人机自组网系统设计与实现[J].西北工业大学学报.2009,27(6):854-858.
    [134] Reinhard Diestel. Graph Theory[M].Springer.2005.
    [135] C. L. Monma, D. F. Shallcross. Methods of designing communicationnetworks with certain two-connected survivability constraints[J]. Operations ResearchLetters.1989,37:531-541.
    [136] Sandor Kersting, Gunther R. Raidl, Ivana Ljubic. A memetic algorithm forvertex-bicoonectivity augementation[R].2002:102-111.
    [137] Vinchenzo Auletta, Yefim Dinitz, Zeev Nutov, D. Parente. A2-approximation algorithm for finding an optimum3-vertex-connected spanningsubgraph[J].2006.
    [138] Xiang-Yang Li, Peng-Jun Wan, Yu Wang, Chih-Wei Yi. Fault tolerantdeployment and topology control in wireless networks[C]//IEEE/ACM MobiHoc.Annapolis, Maryland, USA.,2003:117-128.
    [139]吴彤.自组织方法论研究[M].北京:清华大学出版社.
    [140] A. Ghasemi, S. Nader-Esfahani. Exact probability of connectivity inone-dimensional ad hoc wireless networks[J]. IEEE Communications Letters.2006,10:251-253.
    [141] Chuan Heng Foh, Bu Sung Lee. A closed form network connectivity formulafor one-dimensional MANETs[C]//IEEE International Conference on Communications.Paris,2004:3739-3742.
    [142] Chuan Heng Foh, Genping LIu, Bu Sung Lee, Boon-Chong Seet. Networkconnectivity of one-diemensional MANETs with random waypoint movement[J]. IEEECommunications Letters.2005,9:31-33.
    [143] Miroslaw Dynia, Jaroslaw Kutylowski, Pawel Lorek, Friedhelm Meyer aufder Heide. Maintaining communication between an explorer and a base station[C]//IFIPConference on Biologically Inspired Cooperative Computing.2006:137-146.
    [144] Ivana Ljubic, Gunther R. Raidl. A memetic algorithm for minimum-costvertex-biconnectivity augmentation of graphs[J]. Journal of Heuristics.2003,9(5):401-427.
    [145] G. Tan, S.A. Jarvis, A.-M. Kermarrec. Connectivity-guaranteed andobstacle-adaptive deployment schemes for mobile sensor networks[C]//The28thInternational Conference on Distributed Computing Systems(ICDCS'08).2008:428-437.
    [146] K. P. Eswaran, R. E. Tarjan. Augmentation problems[J]. SIAM Journal onComputing(S0097-5397).1976,5(4):653-665.
    [147] Gary Chartrand, Ping Zhang. Introduction to Graph Theory[M].TheMcGraw-Hill Companies, Inc.2005.
    [148] Ivana Ljubic, Gunther R. Raidl, Jozef Kratica. A hybrid GA for theedge-biconnectivity augmentation problem[C]//The6th International Conference onParallel Problem Solving from Nature.2000.
    [149] Ion I. Mandoiu, Alexander Z. Zelikovsky. A note on the MST heuristic forbounded edge-length Steiner trees with minimum number of Steiner points[J]. InformationProcessing Letters.2000,75(4):165-167.
    [150] H.J. Promel, A. Steger. A new approximation algorithm for the steiner treeproblem with performance ratio5/3[J]. Journal of Algorithmica.2000,36:89-101.
    [151] J. Pan, Y.T. Hou, L. Cai, Y. Shi. Topology control for wireless sensornetworks[C]//MobiCom'03.2003:166-177.
    [152] Gaurav Gupta, Mohamed Younis. Fault tolerant clustering of wireless sensornetworks[C]//WCNC'03.2003:1579-1584.
    [153] D.S. Hochbaum, W. Maass. Approximation schemes for covering andpacking problems in image processing and VLSI[J]. Journal of the ACM.1985,32:130-136.
    [154] Xiuzhen Cheng, Ding-Zhu Du, Lusheng Wang, Baogang Xu. Relay sensorplacement in wireless sensor networks[C]//ACM Winet.2004.
    [155] Samir Khuller, Balaji Raghavachari. Implroved approximation algorithms foruniform connectivtiy problems[J]. Journal of Algorithms.1996,21(2):434-450.
    [156] A. Frank, E. Tardos. An application of submodular flows[J]. Linear Algebraand its Applications.1989,114/115:320-348.
    [157] Shashidhar Merugu, Mostafa Ammar, Ellen Zegura. Routing in space andtime in networks with predictable mobility[R]. Georgia Institute of Technology,2004.
    [158] L. R. Ford, D. R. Fulkerson. Constructing maximal dynamic flows from staticflows[J]. Operations Research.1958,6(3):419-433.
    [159] Afonso Ferreira. Building a reference combinatorial model for MANETs[J].IEEE Network.2004,18(5):24-29.
    [160] Sandeep Bhadra, Afonso Ferreira. Complexity of connected components inevolving graphs and the computation of multicast trees in dynamicnetworks[C]//Adhoc-Now'03.2003:259-270.
    [161] Francesco De Pellegrini, Daniele Miorandi, Iacopo Carreras, Imrich Chlamtac.A Graph-Based Model for Disconnected Ad Hoc Networks[C]//INFOCOM2007.26thIEEE International Conference on Computer Communications. Anchorage, AK,2007:373-381.
    [162] Iacopo Carreras, Daniele Miorandi, Imrich Chlamtac. A framework foropportunistic forwarding in disconnected networks[C]//Mobiquitous. Palo Alto, USA,2006:17-21.
    [163] B. Bollobas. Random Graphs[M].Cambridge: Cambridge Univ. Press.2001.
    [164] Vijay Erramilli, A. Chintreau, Mark Crovella, C. Diot. Diversity offorwarding paths in pocket switched networks[C]//ACM/SIGCOMM IMC.2007:161-174.
    [165] Vijay Erramilli, Mark Crovella, Augustin Chaintreau, Christophe Diot.Delegation Forwarding[C]//MobiHoc.2008.
    [166] H. Dubois-Ferriere, M. Grossglauser, M. Vetterli. Age matters: efficient routediscovery in mobile ad hoc networks using encounter ages[C]//ACM MobiHoc'03.2003:257-266.
    [167] Thrasyvoulos Spyropoulos, Konstantions Psounis, Cauligi S. Raghavendra.Spray and Focus: Efficient Mobility-Assisted Routing for Heterogeneous and CorrelatedMobility[C]//IEEE PerCom Workshop on Intermittently Connected Mobile Ad HocNetworks.2007.
    [168] E. M. Daly, M. Haahr. Social network analysis for routing in disconnecteddelay-tolerant MANETs[C]//ACM MobiHoc'07.2007:32-40.
    [169] A. Balasubramanian, B. N. Levine, A. Venkataramani. DTN Routing as aresource allocation problem[C]//ACM SIGCOMM.2007.
    [170] M. Grossglauser, M. Vetterli. Locating nodes with ease: last encouter routingin ad hoc networks through mobility diffusion[C]//IEEE INFOCOM.2003.
    [171] U. Acer, S. Kalyanaraman, A. Abouzeid. Weak state routing for large scaledynamic networks[C]//ACM MobiCom.2007.
    [172] Thrasyvoulos Spyropoulos, Konstantions Psounis, Cauligi Raghavendra.Efficient Routing in Intermittently Connected Mobile Networks: The Multiple-CopyCase[J]. IEEE/ACM Transactions on Networking.2008,16(1):77-90.
    [173] Bence Pasztor, Mirco Musolesi, Cecilia Mascolo. Opportunistic mobilesensor data collection with SCAR[C]//The4th Int'l Conf. on Embedded Networked SensorSystems. Boulder,2006:343-344.
    [174] Andrei Z. Broder, Adam Kirsch, Ravi Kumar, Michael Mitzenmacher. TheHiring Problem and Lake Wobegon Strategies[C]//ACM-SIAM SODA08.2008.
    [175] Thrasyvoulos Spyropoulos, Konstantinos Psounis, Cauligi S. Raghavendra.Spray and wait: an efficient routing scheme for intermittently connected mobilenetworks[C]//ACM SIGCOMM Workshop on Delay-Tolerant Networking. Philadephia,2005.
    [176] D. Aldous, J. Fill. Reversible Markov Chains and random walks on graphs, pp.http://statwww.berkeley.edu/users/aldous/RWG/book.html.
    [177] TKK/Comnet. Project page of the ONE simulator.http://www.netlab.tkk.fi/tutkimus/dtn/theone.2008.
    [178] Ari Ker nen, J rg Ott, Teemu K rkk inen. The ONE simulator for DTNprotocol evaluation[C]//Simutools '09: Proceedings of the2nd International Conference onSimulation Tools and Techniques. Rome, Italy,2009.
    [179] G. Gray Wang, S. Shan. Review of metamodeling techniques in support ofengineering design optimization[J]. Transactions of the ASME.2007,129:370-380.
    [180] Robert W. Blanning. Construction and implementation of metamodels[J].Simulation.1975,24(6):177-184.
    [181] Jack P.C. Kleijnen. A comment on Blanning's metamodel for sensitivityanalysis: the regression metamodel in simulation[J]. Interfaces.1975,5(3):21-23.
    [182] Russell R. Barton. Handbooks in operations research and managementscience: simulation[M].Elsevier.2006.
    [183] Russell R. Barton. Simulation optimization using metamodels[C]//The2009Winter Simulation Conference.2009:230-238.
    [184] Bing Wu, Ling Chen, Zhiwei Hu, Wen Qiong Zhang. A relevance vectorregression based metamodeling approach for complex system analysis[C]//2008AsiaSimulation Conference-7th International Conference on System Simulation and ScientificComputing, ICSC2008, October10,2008-October12,2008. Beijing, China,2008:612-619.
    [185] M. Meckesheimer, A. J. Booker, R. R. Barton, T. W. Simpson.Computationally inexpensive metamodel assessment strategies[J]. AIAA Journal.2002,40(10):2053-2060.
    [186] Anoop Mullur, Achille Messac. Metamodeling using extended radial basisfunctions: a comparative approach[J]. Engineering with Computers.2006,21(3).
    [187] N. Alexandrov, et al. A trust region framework for managing the use ofapproximation models in optimization[J]. Structure Optimization.1998,15:16-23.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700