无线传感器网络流分析与流控制技术研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
随着物联网技术的兴起和发展,无线传感器网络在节点数量、用户数量以及新的应用方式上将呈现爆炸式增长的态势。在无线传感器网络即将进入大规模应用的趋势之下,物联网网关与核心网将面临无线传感器网络海量数据的冲击,对无线传感器网络进行具有前瞻性的流分析与流控制基础理论研究能够优化网络资源、提高网络性能对海量数据的适应性。论文研究先从流分析技术角度验证分析了网络流特性与自相似网络流造成的影响,然后从流控制技术角度提出了基于资源调度的解决方案。论文的主要创新点如下:
     1)建立了无线传感器网络流的自相似特性分析体系,提出了无线传感器网络自相似特性产生的原因:根据无线传感器网络流特性的发展趋势,结合Internet和通信网网络流特性分析研究方法,对流到达时间间隔的分布特性进行了拟合分析,并验证了网络流量在多尺度下的突发特性;采用V-T法和R/S分析法分别对流到达时间间隔和网络流量的自相似特性进行了认定;在总结分析现有网络自相似特性产生自相似原因的基础上,指出了无线传感器网络流表现出自相似特性的根本原因是流到达时间间隔的重尾分布。
     2)提出了周期工作模式下无线传感器网络流到达时间间隔模型以及基于流到达时间间隔的流量合成方法,指出了无线传感器网络自相似流量对网关性能的影响:在充分考虑了无线传感器网络自相似特性的基础上,结合无线传感器网络周期工作模式特征,首先提出了一种新的流到达时间间隔模型——基于IAT-H的累加组合模型,该模型首先根据IAT-H参数估计产生两个聚类,然后通过累加组合方式建立流到达时间间隔模型,模型产生的仿真数据与真实数据具有相近的期望、方差和自相似特性,仿真数据的分布与真实数据的分布吻合度高;然后基于流到达时间间隔IAT-H的累加组合模型提出了ATBH流量合成方法,得到了无线传感器网络不同工作模式下不同数据类型的网络流量,并分析了其对网络自相似特性的影响;最后研究了基于ATBH方法流量输入条件下,无线传感器网络流量对网关性能的影响,指出在大缓存节能工作模式下的网关其缓存数据量的自相似特性比输入流量的自相似特性更加明显,因此网关系统极易崩溃。
     3)为解决无线传感器网络自相似流量的突发与不稳定问题,从协调节点内部资源的角度出发,采用跨层资源优化方法实现对无线传感器网络的流控制,提出一种基于网络效用与寿命的跨层资源优化算法:综合物理层功率控制、MAC层接入控制、传输层流量控制模型,以网络效用和寿命最大为优化目标,建立了以拥塞代价与能量代价为基础的网络协同优化机制,采用垂直分解理论实现优化目标的逐层分解,推导出基于节点的功耗、链路接入概率和速率的更新公式,实现了分布式的优化解决方案,仿真结果表明各指标能够在较短时间内收敛。
     4)为解决无线传感器网络自相似流量的突发与不稳定问题,从协调网络内部节点资源的角度出发,采用动态路由方法实现对无线传感器网络的流控制,提出一种基于稳定性路由的负载均衡算法:建立了适用于有限内存、可变路由条件的网络单服务排队模型,提出了基于李雅普诺夫稳定的LSR路由算法,和以LSR算法为核心的分簇路由策略和算法的分布式实现方式,仿真结果表明该路由机制解决了无线传感器网络的稳定性问题,消除了自相似流量的突发性,网络节点流量能在较短时间收敛,同时也实现了网络节点的负载均衡。
As the rise and development of the Internet of things technology, the new applications and the number of nodes and users are going to emerge to grow explosively. The internet of things gateway and core network are coming into face the impact of the mass data under the trend that the applications of wireless sensor network come into large scale. It is predictive and very significant to focus on the fundamental research of traffic analysis and traffic control of the wireless sensor networks in order to optimize the network resources and enhance the network performance under the mass data. We have analyzed the traffic characteristics and studied the effect of the self-similar traffic from the perspectives of traffic analysis, and then raised resource scheduling solutions from the perspectives of traffic control. The main innovation ideas as follows:
     1) According to the trend of the wireless sensor networks traffic characteristics and the network traffic characteristics analysis methods of internet and communications network, the distribution characteristics of the inter-arrival time are fitted and analyzed, and then the burst characteristic is verified in the multi-scale time dimensionality; The self-similar characteristics of the inter-arrival time and network traffic are verified by V-T method and R/S analysis; It is revealed that the root cause of the wireless sensor networks self-similarity is heavy-tailed distributions of the inter-arrival time based on the summary and analysis of the reasons of the network self-similar characteristics currently.
     2) The accumulative combination model based on IAT-H modeling inter-arrival time in wireless sensor networks with cycle work mode is proposed according to the influence of traffic characteristics, whose simulation data have similar mean, variance and the self-similar characteristics compared with the real data; Then ATBH method based on accumulative combination IAT-H model is proposed for traffic synthesis, the network traffic with different work mode and data type are obtained used to analyze the network self-similarity; Finally the influence of the gateway performance caused by wireless sensor networks traffic is researched under the traffic input obtained using ATBH method, we find that the gateway self-similarity is more obvious than the input traffic with the big buffer and energy conservation mode.
     3) In order to solve the self-similar traffic problem by allocating the resources inside a node, a traffic control method based on cross-layer resource optimization is researched:The cross-layer algorithm of resource optimization based on network utility and network lifetime is proposed; The energy control in physical layer, access control in MAC layer and traffic control in transfer layer are considered together to represent the optimization problem, and the vertical decomposing is used by introducing congestion price and energy price to update the energy, link access probability and rate; The series of resolution is distributed, and simulation results prove. the convergence of the resolution which achieve the stability of the network traffic.
     4) In order to solve the self-similar traffic problem by allocating the resources among the nodes of the networks, a traffic control method based on dynamic multi-path routing is researched:A queuing model is firstly established particularly under the condition of finite buffers and dynamic routing for WSN; A routing algorithm (LSR) which is designed to throughput stability for WSN by using Lyapunov methodology is proposed; Based on this, a clustering distributed routing strategy which can balance the load of the nodes in their cluster is proposed by using LSR way; Finally, the simulation results show that this series of routing mechanism can effectively implement the load balance and the traffic stability of WSN.
引文
[1]Su, Weilian and Mak, Wai Yen. Sensor network architecture for multi-media traffic. Military Communications Conference,2008. MILCOM 2008. IEEE.2008, 10.1109/MILCOM.2008.4753124, pp.1-6.
    [2]Demirkol, I., et al. Wireless sensor networks for intrusion detection:packet traffic modeling. Communications Letters, IEEE.2,2006, Vol.10, pp.22-24.
    [3]程光、龚俭.互联网流测量.南京:东南大学出版社,2008.
    [4]Amer, P.D. and Cassel, L.N. Management of sampled real-time network measurements. Proceedings 14th Conference on Local Computer Networks.1989, 10.1109/LCN.1989.65244, pp.62-68.
    [5]Drobisz, J. and Christensen, K.J. Adaptive sampling methods to determine network traffic statistics including the Hurst parameter. LCN'98. Proceedings., 23rd Annual Conference on Local Computer Networks,1998.1998, 10.1109/LCN.1998.727664, pp.238-247
    [6]C.LaboviztF.Jahnian,S.Johnson,R.Malan,S.Harris,J.Wan,m.Agrawal,A.Klink.The Internet Performance and Analysis Project. http://www.mmerit.edu/ipma/docs/team.html.1997
    [7]RIPE Network Coordination Centre. Test Traffic Project Homepage. http://www.ripe.net/test-traffic/index.html.
    [8]V.Paxson,Jamshid Mahdavi,Andrew Adams,Matt Mathis. An Architecture for Large-Scale Internet Measurement. IEEE Communications.8,1998, Vol.36, pp. 48-54.
    [9]Groschwitz, N.K. and Polyzos, G.C. A time series model of long-term NSFNET backbone traffic. SUPERCOMM/ICC '94, Conference Record,'Serving Humanity Through Communications.'IEEE International Conference on Communications,1994. Vol.3,10.1109/ICC.1994.368876, pp.1400-1404.
    [10]Liu, Z. et al. Time series models for internet traffic. Communication Networks and Services Research Conference,2005. Proceedings of the 3rd Annual.2005,10.1109/CNSR.2005.41, pp.99-104.
    [11]Balter,A.Downey, M.Harchol. Exploiting process lifetime distributions for dynamic load balancing. In Proceedings of the 1996 ACM Sigmetrics Conference on Measurement and Modeling of Computer Sytems.1996.
    [12]陈云龙、叶梧、冯穗力.现代网络业务流的几个基本定律.华南理工大学学报(自然科学版).5,2007年,卷35.
    [13]Tang, Shensheng. An analytical traffic flow model for cluster-based wireless sensor networks.2006 1st International Symposium on Wireless Pervasive Computing.2006.2006,10.1109/ISWPC.2006.1613563.
    [14]Salvador, P., Nogueira, A. and Valadas, R. Markovian Models for Medical Signals on Wireless. IEEE International Conference on Communications Workshops,2009. ICC Workshops 2009.2009,10.1109/ICCW.2009.5208090.
    [15]Messier, G.G. and Finvers, I.G. Traffic Models for Medical Wireless Sensor Networks. Communications Letters, IEEE.1,2007, Vol.11, 10.1109/LCOMM.2007.061291,pp.13-15.
    [16]LelandW E, TaqquM S.WillingerW, et al. On the selfsimilar nature of Ethernet traffic (extended version). IEEE/ACM Transactions on Networking.1, 1994, Vol.2.
    [17]McEachen, J.C. and Beng, Wang Wei. Characterization of Traffic in Wireless Sensor Networks.2007. ICON 2007.15th IEEE International Conference on Networks.2007.2007,10.1109/ICON.2007.4444126, pp.437-442
    [18]Poonvasin, S. and Pathommanit, N. Supporting heterogeneous traffic in wireless sensor networks. Wireless Pervasive Computing,2006 1st International Symposium.2006,10.1109/ISWPC.2006.1613562.
    [19]Zhao, Zhiwei, et al. A Traffic Queue-aware MAC Protocol for Wireless Sensor Networks.2007. CHINACOM '07. Second International Conference on Communications and Networking in China.2007, 10.1109/CHINACOM.2007.4469515, pp.841-844.
    [20]Sun, Yan, Ma, Huadong and Liu, Liang. Traffic Scheduling based on Queue Model with Priority for Audio/Video Sensor Networks. Pervasive Computing and Applications,2007. ICPCA 2007.2nd International Conference.2007, 10.1109/ICPCA.2007.4365535, pp.709-714
    [21]Blaszczyszyn, B. and Radunovic, B. M/D/1/1 loss system with interference and applications to transmit-only sensor networks. Ad Hoc and Wireless Networks and Workshops,2007. WiOpt 2007.5th International Symposium on Modeling and Optimization in Mobile.2007,10.1109/WIOPT.2007.4480073, pp. 1-6.
    [22]吕军.自相似网络流量的处理和分析.清华大学学报(自然科学版).7,2008年,卷48.
    [23]Pan, Yantao. Traffic Scheduling to Prolong the Lifetime of Sensor Networks. Web Intelligence and Intelligent Agent Technology Workshops,2006. WI-IAT 2006 Workshops.2006 IEEE/WIC/ACM International Conference.2006, 10.1109/WI-IATW.2006.136, pp.231-234.
    [24]Chen, Quanjun, Kanhere, S.S. and Hassan, M. Analysis of per-node traffic load in multi-hop wireless sensor networks. IEEE Transactions on Wireless Communications.2,2009, Vol.8,10.1109/TWC.2009.080008, pp.958-967.
    [25]Noori, M. and Ardakani, M. Characterizing the traffic distribution in linear wireless sensor networks. Communications Letters, IEEE.8,2008, Vol.12, 10.1109/LCOMM.2008.080488, pp.554-556.
    [26]Aalsalem, M.Y., et al. Providing QoS guarantees to multiple classes of traffic in wireless sensor networks. Computer Systems and Applications,2008. AICCSA 2008. IEEE/ACS International Conference.2008, 10.1109/AICCSA.2008.4493537, pp.216-222.
    [27]Onat, I. and Miri, A. A real-time node-based traffic anomaly detection algorithm for wireless sensor networks. Systems Communications,2005. Proceedings.2005,10.1109/ICW.2005.16, pp.422-427.
    [28]Yun Wang, Xiaodong Wang,Bin Xie. Intrusion Detection in Homogeneous and Heterogeneous Wireless Sensor Networks. IEEE TRANSACTIONS ON MOBILE COMPUTING.6,2008, Vol.7. IEEE TRANSACTIONS ON MOBILE COMPUTING.6,2008, Vol.7.
    [1]D. Anick, D. Mitra and MM Sondhi, Stochastic theory of a data-hand.ling system with multiple sources, Bell Sys. Tech. J.61 (1982).
    [2]Jain, R.; Routhier, S.;, Packet Trains--Measurements and a New Model for Computer Network Traffic, Selected Areas in Communications, IEEE Journal on, vol.4, no.6, pp.986-995, Sep 1986
    [3]Heffes, H.; Lucantoni, D.;, A Markov Modulated Characterization of Packetized Voice and Data Traffic and Related Statistical Multiplexer Performance, Selected Areas in Communications, IEEE Journal on, vol.4, no.6, pp.856-868, Sep 1986
    [4]Model sand techniques for Performance evaluation of computer and communication system
    [5]Pawl ita, Peter, Two Decades of Data Traffic Measurements:A Survey of Published Results, Experiences and Applicability, ITC12 Torino, June 1988
    [6]Traffic Performance modeling for Packet communications:whence Where and whether
    [7]LelandW E, TaqquM S,WillingerW, et al. On the selfsimilar nature of Ethernet traffic (extended version). IEEE/ACM Transactions on Networking.1,1994, Vol. 2.
    [8]程光、龚俭.互联网流测量.南京:东南大学出版社,2008.
    [9]Amer, P.D. and Cassel, L.N. Management of sampled real-time network measurements. Proceedings 14th Conference on Local Computer Networks.1989, 10.1109/LCN.1989.65244, pp.62-68.
    [10]Drobisz, J. and Christensen, K.J. Adaptive sampling methods to determine network traffic statistics including the Hurst parameter. LCN '98. Proceedings., 23rd Annual Conference on Local Computer Networks,1998.1998, 10.1109/LCN.1998.727664, pp.238-247.
    [11]C.LaboviztF.Jahnian,S.Johnson,R.Malan,S.Harris,J.Wan,m.Agrawal,A.Klink.The Internet Performance and Analysis Project. http://www.mmerit.edu/ipma/docs/team.html.1997.
    [12]RIPE Network Coordination Centre. Test Traffic Project Homepage. http://www.ripe.net/test-traffic/index.html.
    [13]V.Paxson,Jamshid Mahdavi,Andrew Adams,Matt Mathis. An Architecture for Large-Scale Internet Measurement. IEEE Communications.8,1998, Vol.36, pp. 48-54.
    [14]Groschwitz, N.K. and Polyzos, G.C. A time series model of long-term NSFNET backbone traffic. SUPERCOMM/ICC '94, Conference Record,'Serving Humanity Through Communications.'IEEE International Conference on Communications,1994. Vol.3,10.1109/ICC.1994.368876, pp.1400-1404.
    [15]Liu, Z. et al. Time series models for internet traffic. Communication Networks and Services Research Conference,2005. Proceedings of the 3rd Annual.2005, 10.1109/CNSR.2005.41,pp.99-104.
    [16]Balter,A.Downey, M.Harchol. Exploiting process lifetime distributions for dynamic load balancing. In Proceedings of the 1996 ACM Sigmetrics Conference on Measurement and Modeling of Computer Sytems.1996.
    [17]陈云龙、叶梧、冯穗力.现代网络业务流的几个基本定律.华南理工大学学报(自然科学版).5,2007年,卷35.
    [18]Tang, Shensheng. An analytical traffic flow model for cluster-based wireless sensor networks.20061st International Symposium on Wireless Pervasive Computing.2006.2006,10.1109/ISWPC.2006.1613563.
    [19]Salvador, P., Nogueira, A. and Valadas, R. Markovian Models for Medical Signals on Wireless. IEEE International Conference on Communications Workshops, 2009. ICC Workshops 2009.2009,10.1109/ICCW.2009.5208090.
    [20]Messier, G.G. and Finvers, I.G. Traffic Models for Medical Wireless Sensor Networks. Communications Letters, IEEE.1,2007, Vol.11, 10.1109/LCOMM.2007.061291,pp.13-15.
    [21]Demirkol, I., et al. Wireless sensor networks for intrusion detection:packet traffic modeling. Communications Letters, IEEE.2,2006, Vol.10, pp.22-24.
    [22]LelandW E, TaqquM S,WillingerW, et al. On the selfsimilar nature of Ethernet traffic (extended version). IEEE/ACM Transactions on Networking.1,1994, Vol. 2.
    [23]Su, Weilian and Mak, Wai Yen. Sensor network architecture for multi-media traffic. Military Communications Conference,2008. MILCOM 2008. IEEE.2008, 10.1109/MILCOM.2008.4753124, pp.1-6.
    [24]McEachen, J.C. and Beng, Wang Wei. Characterization of Traffic in Wireless Sensor Networks.2007. ICON 2007.15th IEEE International Conference on Networks.2007.2007,10.1109/ICON.2007.4444126, pp.437-442.
    [25]Poonvasin, S. and Pathommanit, N. Supporting heterogeneous traffic in wireless sensor networks. Wireless Pervasive Computing,2006 1st International Symposium.2006,10.1109/ISWPC.2006.1613562.
    [26]Sun, Yan, Ma, Huadong and Liu, Liang. Traffic Scheduling based on Queue Model with Priority for Audio/Video Sensor Networks. Pervasive Computing and Applications,2007. ICPCA 2007.2nd International Conference.2007, 10.1109/ICPCA.2007.4365535. pp.709-714.
    [27]Blaszczyszyn, B. and Radunovic, B. M/D/1/1 loss system with interference and applications to transmit-only sensor networks. Ad Hoc and Wireless Networks and Workshops,2007. WiOpt 2007.5th International Symposium on Modeling and Optimization in Mobile.2007,10.1109/WIOPT.2007.4480073, pp.1-6.
    [28]吕军.自相似网络流量的处理和分析.清华大学学报(自然科学版).7,2008年, 卷48.
    [29]Chen, Quanjun, Kanhere, S.S. and Hassan, M. Analysis of per-node traffic load in multi-hop wireless sensor networks. IEEE Transactions on Wireless Communications.2,2009, Vol.8,10.1109/TWC.2009.080008, pp.958-967.
    [30]Noori, M. and Ardakani, M. Characterizing the traffic distribution in linear wireless sensor networks. Communications Letters, IEEE.8,2008, Vol.12, 10.1109/LCOMM.2008.080488, pp.554-556.
    [31]B. Mandelbrot and J. Van Ness. Fractional Brownian Motions, Fractional Noises and Applications. SIAM Review,1968,10(4):422-437
    [32]Tsybakov, B.; Georganas, N.D.;, Self-similar processes in communications networks, Information Theory, IEEE Transactions on, vol.44, no.5, pp.1713-1725, Sep 1998
    [33]M. Taqqu S, W. Willinger, S. Robert. Proof of a Fundamental Result in Self-similar Traffic Modeling.ACM Computer Communication Review,1997,27(2):5-23
    [34]Tsybakov, B.; Georganas, N.D.;, Self-similar processes in communications networks, Information Theory, IEEE Transactions on, vol.44, no.5, pp.1713-1725, Sep 1998
    [35]Bates, S.; McLaughlin, S.; Testing the Gaussian assumption for self-similar teletraffic models, Higher-Order Statistics,1997. Proceedings of the IEEE Signal Processing Workshop on, vol., no., pp.444-447,21-23 Jul 1997
    [36]Willinger, W.; Taqqu, M.S.; Sherman, R.; Wilson, D.V.;, Self-similarity through high-variability:statistical analysis of Ethernet LAN traffic at the source level, Networking, IEEE/ACM Transactions on, vol.5, no.1, pp.71-86, Feb 1997
    [37]M. Parulekat, A. M. Makowski. Input Process:A Versatile Class of Models for network Traffic. Institute for Systems Research,1996
    [38]Paxson, V.; Floyd, S.;, Wide area traffic:the failure of Poisson modeling. Networking, IEEE/ACM Transactions on, vol.3, no.3, pp.226-244, Jun 1995
    [39]Willinger, W.; Taqqu, M.S.; Sherman, R.; Wilson, D.V.;, Self-similarity through high-variability:statistical analysis of Ethernet LAN traffic at the source level, Networking, IEEE/ACM Transactions on, vol.5, no.1, pp.71-86, Feb 1997
    [40]Beran, J.; Sherman, R.; Taqqu, M.S.; Willinger, W.;, Long-range dependence in variable-bit-rate video traffic, Communications, IEEE Transactions on, vol.43, no.234, pp.1566-1579, Feb/Mar/Apr 1995
    [41]M.W.Garrett and W.Willinger, Analysis, modeling and generation of self-similar VBR video traffic, In Proc.ACM SIGCOMM'94, pp.269-280, London, U.K. 1994.
    [1]D. Anick, D. Mitra and MM Sondhi, Stochastic theory of a data-handling system with multiple sources, Bell Sys. Tech. J.61 (1982).
    [2]Jain, R.; Routhier, S.;, Packet Trains--Measurements and a New Model for Computer Network Traffic, Selected Areas in Communications, IEEE Journal on, vol.4, no.6, pp.986-995, Sep 1986
    [3]Heffes, H.; Lucantoni, D.;, A Markov Modulated Characterization of Packetized Voice and Data Traffic and Related Statistical Multiplexer Performance. Selected Areas in Communications, IEEE Journal on, vol.4, no.6, pp.856-868, Sep 1986
    [4]Model sand techniques for Performance evaluation of computer and communication system
    [5]Pawl ita, Peter, Two Decades of Data Traffic Measurements:A Survey of Published Results, Experiences and Applicability, ITC12 Torino, June 1988
    [6]Traffic Performance modeling for Packet communications:whence Where and whether
    [7]Tang, Shensheng. An analytical traffic flow model for cluster-based wireless sensor networks.2006 1st International Symposium on Wireless Pervasive Computing.2006.2006,10.1109/ISWPC.2006.1613563.
    [8]Salvador, P., Nogueira, A. and Valadas, R. Markovian Models for Medical Signals on Wireless. IEEE International Conference on Communications Workshops, 2009. ICC Workshops 2009.2009,10.1109/ICCW.2009.5208090.
    [9]Messier, G.G. and Finvers, I.G. Traffic Models for Medical Wireless Sensor Networks. Communications Letters, IEEE.1,2007, Vol.11, 10.1109/LCOMM.2007.061291,pp.13-15.
    [10]Demirkol, I., et al. Wireless sensor networks for intrusion detection:packet traffic modeling. Communications Letters, IEEE.2,2006, Vol.10, pp.22-24.
    [11]LelandW E, TaqquM S, WillingerW, et al. On the self similar nature of Ethernet traffic (extended version). IEEE/ACM Transactions on Networking.1,1994, Vol. 2.
    [12]Su, Weilian and Mak, Wai Yen. Sensor network architecture for multi-media traffic. Military Communications Conference,2008. MILCOM 2008. IEEE.2008, 10.1109/MILCOM.2008.4753124,pp.1-6.
    [13]McEachen, J.C. and Beng, Wang Wei. Characterization of Traffic in Wireless Sensor Networks.2007. ICON 2007.15th IEEE International Conference on Networks.2007.2007,10.1109/ICON.2007.4444126, pp.437-442.
    [14]Liu, Z. et al. Time series models for internet traffic. Communication Networks and Services Research Conference,2005. Proceedings of the 3rd Annual.2005, 10.1109/CNSR.2005.41, pp.99-104.
    [15]Chen Yunlong, YeWu, Feng Huili. Several Essential Laws Required by Modern Network Traffic. Journal of South China University of Technology (Natural Science Edition). M ay 2007. Vol.35, No.5.
    [16]Su, Weilian and Mak. Wai Yen. Sensor network architecture for multi-media traffic. Military Communications Conference,2008. MILCOM 2008. IEEE.2008, 10.1109/MILCOM.2008.4753124,pp.1-6.
    [17]Barakar C, Thiran P, Iannaccone G. Modeling Internet Backlone Traffic at the Flow Level. IEEE Transactions on Signal Processing.2003,51 (8):1-12.
    [18]Feldmann A. Characteristics of TCP Connection Arrivals. In:Self-Similar Network Traffic and Performance Evaluation, K.Park, W.Willinger, eds. Wiley-Interscience Publication, New York,2000.
    [19]Nuzman C, Saniee I, Sweldens W, A compound model for TCP connection arrivals for LAN and WAN applications [J]. Computer Networds,2002,40:319-337.
    [20]Demirkol, I., et al. Wireless sensor networks for intrusion detection:packet traffic modeling. Communications Letters, IEEE.2,2006, Vol.10, pp.22-24.
    [21]McEachen, J.C. and Beng, Wang Wei. Characterization of Traffic in Wireless Sensor Networks.2007. ICON 2007.15th IEEE Inter-national Conference on Networks.2007.2007,10.1109/ICON.2007.4444126, pp.437-442.
    [22]WEI Jinwu, Researches on Fractal-based Network Traffic Modeling and Queuing Performance, Institute of Information Engineering PLA Information Engineering University Doctor's paper,2006.
    [23]U.K.Sarkar, S.Ramakrishnan, D.Sarkar. Modeling full-length video using Markov-modulated gamma-based framework IEEE/ACM Trans. On Networking, vol.11,2003.
    [24]Pan, Yantao. Traffic Scheduling to Prolong the Lifetime of Sensor Networks. Web Intelligence and Intelligent Agent Technology Workshops,2006. WI-IAT 2006 Workshops.2006 IEEE/WIC/ACM International Conference.2006, 10.1109/WI-IATW.2006.136, pp.231-234.
    [25]Chen, Quanjun, Kanhere, S.S. and Hassan, M. Analysis of per-node traffic load in multi-hop wireless sensor networks. IEEE Transactions on Wireless Communications.2,2009, Vol.8,10.1109/TWC.2009.080008, pp.958-967.
    [26]Noori, M. and Ardakani, M. Characterizing the traffic distribution in linear wireless sensor networks. Communications Letters, IEEE.8,2008, Vol.12, 10.1109/LCOMM.2008.080488, pp.554-556.
    [27]Amer, P.D. and Cassel, L.N. Management of sampled real-time network measurements. Proceedings 14th Conference on Local Computer Networks.1989, 10.1109/LCN.1989.65244. pp.62-68.
    [28]Aalsalem, M.Y., et al. Providing QoS guarantees to multiple classes of traffic in wireless sensor networks. Computer Systems and Applications,2008. AICCSA 2008. IEEE/ACS International Conference.2008. 10.1109/AICCSA.2008.4493537, pp.216-222.
    [29]Groschwitz, N.K. and Polyzos, G.C. A time series model of long-term NSFNET backbone traffic. SUPERCOMM/ICC '94, Conference Record.'Serving Humanity Through Communications.'IEEE International Conference on Communications,1994. Vol.3,10.1109/ICC.1994.368876, pp.1400-1404.
    [30]Onat, I. and Miri, A. A real-time node-based traffic anomaly detection algorithm for wireless sensor networks. Systems Communications,2005. Proceedings.2005, 10.1109/ICW.2005.16, pp.422-427.
    [31]McEachen, J.C. and Beng, Wang Wei. Characterization of Traffic in Wireless Sensor Networks.2007. ICON 2007.15th IEEE International Conference on Networks.2007.2007,10.1109/ICON.2007.4444126, pp.437-442.
    [32]许都,李乐民.网络中业务流的自相似性与线性AR1模型,电子学报,1999,27(3):6-10.
    [33]魏进武,基于分形的网络流量建模及排队性能研究,信息工程大学博士论文,2006.
    [34]Liu, Z. et al. Time series models for internet traffic. Communication Networks and Services Research Conference,2005. Proceedings of the 3rd Annual.2005, 10.1109/CNSR.2005.41, pp.99-104.
    [35]陈云龙、叶梧、冯穗力.现代网络业务流的几个基本定律.华南理工大学学报(自然科学版).5,2007年,卷35.
    [36]吴援明,网络中自相似业务流的特性及其影响研究,电子科技大学博士论文,2008.
    [1]杨靖,熊伟丽等.用于无线传感器网络的高能效数据收集算法.2011,41(6):1720-1725
    [2]Wang Yali; Liu Yuanan; Wu Fan; Tang Bihua, Load balance in wireless sensor network through stability routing[J]. Journal of Information and Computational Science, vol.8, no.6, pp.903-910, June 2011
    [3]Shakkottai, S.; Rappaport, T.S.; Karlsson, P.C.;, "Cross-layer design for wireless networks," Communications Magazine, IEEE, vol.41, no.10, pp.74-80, Oct 2003
    [4]Der Schaar, M.; Sai Shankar N;, Cross-layer wireless multimedia transmission: challenges, principles, and new paradigms, Wireless Communications, IEEE vol.12, no.4, pp.50-58, Aug.2005
    [5]张海霞;袁东风;马艳波;,《无线通信跨层设计——从原理到应用》,人民邮电出版社,2010
    [6]Qingwen Liu; Shengli Zhou; Giannakis, G.B.;, Cross-Layer combining of adaptive Modulation and coding with truncated ARQ over wireless links, Wireless Communications, IEEE Transactions on, vol.3, no.5, pp.1746-1755, Sept.2004
    [7]Mung Chiang; Low, S.H.; Calderbank, A.R.; Doyle, J.C.;, Layering as Optimization Decomposition:A Mathematical Theory of Network Architectures, Proceedings of the IEEE. vol.95, no.1. pp.255-312, Jan.2007
    [8]Karnik, A.; Kumar. A.;, Performance of TCP congestion control with explicit rate feedback, Networking, IEEE/ACM Transactions on, vol.13, no.1. pp.108-120. Feb.2005
    [9]Eun-Chan Park; Dong-Young Kim; Hwangnam Kim; Chong-Ho Choi;, A Cross-Layer Approach for Per-Station Fairness in TCP over WLANs, Mobile Computing, IEEE Transactions on, vol.7, no.7, pp.898-911, July 2008
    [10]Su Kyoung Lee; Lae Young Kim;, Drop policy to enhance TCP performance in OBS networks, Communications Letters, IEEE, vol.10, no.4, pp.299-301, Apr 2006
    [11]Yuci Gou; Pearce, D.A.J.; Mitchell, P.D.;, A receiver-based vertical handover mechanism for TCP congestion control, Wireless Communications, IEEE Transactions on, vol.5, no.10, pp.2824-2833, Oct.2006
    [12]Katto, J.; Ogura, K.; Akae, Y.; Fujikawa, T.; Kaneko, K.; Su Zhou;, Simple Model Analysis and Performance Tuning of Hybrid TCP Congestion Control, Global Telecommunications Conference,2008. IEEE GLOBECOM 2008. IEEE vol., no., pp.1-6, Nov.30 2008-Dec.4 2008
    [13]Shevtekar, A.; Karunakar Anantharam; Ansari, N.;, Low rate TCP denial-of-service attack detection at edge routers, Communications Letters, IEEE, vol.9, no.4, pp.363-365, April 2005
    [14]Israr, N.;, Cross Layer Scheduling Scheme for Dense Wireless Sensor Networks, Intelligent Systems, Modeling and Simulation (ISMS),2010 International Conference on, vol., no., pp.334-338,27-29 Jan.2010
    [15]Madan, R.; Cui, S.; Lal, S.; Goldsmith, A.;, Cross-Layer Design for Lifetime Maximization in Interference-Limited Wireless Sensor Networks, Wireless Communications, IEEE Transactions on, vol.5, no.11, pp.3142-3152, November 2006
    [16]Chun-Chia Chen; Shroff, N.B.; Duan-Shin Lee; Distributed Power Minimization for Data Aggregation in Wireless Sensor Networks, Global Telecommunications Conference.2008. IEEE GLOBECOM 2008. IEEE, vol., no., pp.1-5, Nov.30 2008-Dec.4 2008
    [17]Quanquan Liang; Dongfeng Yuan; Yong Wang; Ruiliua Zhang;, A Distributed Virtual MIMO Scheme Using Cross Layer Design for Wireless Sensor Networks, Cross Layer Design,2007. IWCLD '07. International Workshop on, vol., no., pp.33-36.20-21 Sept.2007
    [18]Karimifar, S.; Cavers, J.K., On Maximizing the Received Data Volume in a Wireless Sensor Network, Vehicular Technology Conference,2008. VTC Spring 2008. IEEE, vol., no., pp.208-212,11-14 May 2008
    [19]Song, Yang; Fang, Yuguang; Distributed Rate Control and Power Control in Resource-constrained Wireless Sensor Networks, Military Communications Conference,2007. MILCOM 2007. IEEE, vol., no., pp.1-6,29-31 Oct.2007
    [20]Gang Lu; Krishnamachari, B., Energy efficient joint scheduling and power control for wireless sensor networks, Sensor and Ad Hoc Communications and Networks,2005. IEEE SECON 2005.2005 Second Annual IEEE Communications Society Conference on, vol., no., pp.362-373,26-29 Sept., 2005
    [21]Srivastava, R.; Koksal, C.E., Energy optimal transmission scheduling in wireless sensor networks. Wireless Communications, IEEE Transactions on, vol.9, no.5, pp.1550-1560, May 2010.
    [22]Hou, Y.T.; Shi, Y.; Pan, J.; Midkiff, S.F.;, Maximizing the Lifetime of Wireless Sensor Networks through Optimal Single-Session Flow Routing. Mobile Computing, IEEE Transactions on, vol.5, no.9, pp.1255-1266, Sept.2006.
    [23]Hui Wang; Yuhang Yang; Maode Ma; Jianhua He; Xiaomin Wang;, Network lifetime maximization with cross-layer design in wireless sensor networks. Wireless Communications, IEEE Transactions on, vol.7, no.10, pp.3759-3768, October 2008.
    [24]Weiqiang Xu; Jiming Chen; Yan Zhang:Yang Xiao; Youxian Sun;, Optimal Rate Routing in Wireless Sensor Networks with Guaranteed Lifetime. Global Telecommunications Conference,2008. IEEE GLOBECOM 2008. IEEE, vol., no., pp.1-5, Nov.30 2008-Dec.4 2008.
    [25]Khodaian, A.; Khalaj. B.H.;. Energy and Utility Optimization in Wireless Networks with Random Access. Communications,2007. ICC '07. IEEE International Conference on, vol., no., pp.3799-3804.24-28 June 2007.
    [26]Jun Luo; Iyer, A.; Rosenberg, C.;, Throughput-Lifetime Trade-Offs in Multihop Wireless Networks under an SINR-Based Interference Model. Mobile Computing, IEEE Transactions on, vol.10, no.3, pp.419-433. March 2011.
    [27]Heinzelman, W.B.; Chandrakasan, A.P.; Balakrishnan, H., An application-specific protocol architecture for wireless micro sensor networks. Wireless Communications, IEEE Transactions on, vol.1, no.4, pp.660-670, Oct 2002.
    [28]D.P. Bertsekas, Nonlinear Programming. Athena Scientific,1999. J.W. Lee, M. Chiang, and R. A. Calderbank, Optimal MAC design based on utility maximization:Reverse and forward engineering. Proc, IEEE INFOCOM,2006.
    [1]Esa Hyytia, On traffic load distribution and load balancing in dense wireless multihop networks. EURASIP Journal on Wireless Communications and Networking. vol.2007, no.1, pp.21-21, January 2007
    [2]Zawodniok, M.; Jagannathan, S.;, Predictive Congestion Control Protocol for Wireless Sensor Networks, Wireless Communications, IEEE Transactions on, vol.6, no.11, pp.3955-3963, November 2007
    [3]Chonggang Wang; Sohraby, K.; Bo Li; Daneshmand, M.; Yueming Hu;, A survey of transport protocols for wireless sensor networks, Network, IEEE, vol.20, no.3, pp.34-40, May-June 2006
    [4]Iyer, Y.G.; Gandham, S.; Venkatesan, S.;, STCP:a generic transport layer protocol for wireless sensor networks, Computer Communications and Networks, 2005. ICCCN 2005. Proceedings.14th International Conference on, vol., no., pp. 449.454,17-19 Oct.2005
    [5]Hyytia, E.; Virtamo, J.;, On load balancing in a dense wireless multihop network, Next Generation Internet Design and Engineering,2006. NGI '06.2006 2nd Conference on, vol., no., pp.8 pp.-79,0-00
    [6]Chen, S.; Yang, N.;, Congestion Avoidance Based on Lightweight Buffer Management in Sensor Networks, Parallel and Distributed Systems. IEEE Transactions on, vol.17, no.9, pp.934-946, Sept.2006
    [7]Wang. C.;Li, B.; Sohraby, K.; Daneshmand, M.; Hu. Y.;, Upstream congestion control in wireless sensor networks through cross-layer optimization. Selected Areas in Communications. IEEE Journal on, vol.25, no.4. pp.786-795, May 2007
    [8]S. Rangwala, R. Gummadi, R. Govindah. K. Psounis. Interferenceaware fair rate control in wireless sensor networks, C. Proc. ACM SIGCOMM,2006,36:63-74.
    [9]O.B Akan, I.F.Akyildiz. Event-to-sink reliable transport in wireless sensor networks, J. IEEE/ACM Transactions on Networking,2005,13(5):177-188.
    [10]B. Hull, K. Jamieson, H. Balakrishnan. Mitigating congestion in wireless sensor networks, C. Proc. ACM SenSys,2004,134-147.
    [11]P.H. Hsiao, A. Hwang, H. T. Kung, D. Vlah. Load-balancing routing for wireless access networks, C. Proc. IEEE INFOCOM,2001,2:986-985.
    [12]孙利民,李建中,陈渝,朱红松, 《无线传感器网络》,清华大学出版社,2005
    [13]L. Tassiulas, A. Ephremides. Stability Properties of Constrained Queuing Systems and Scheduling Policies for Maximum Throughput in Multihop Radio Networks, J. IEEE Trans. Automatic Control,1992,37(12):1936-1948.
    [14]Georgiadis, L.; Tassiulas, L.;, Optimal overload response in sensor networks, Information Theory, IEEE Transactions on, vol.52, no.6, pp.2684-2696, June 2006
    [15]L. Tassiulas. Linear Complexity Algorithms for Maximum Throughput in Radio Networks and Input Queued Switches, C. IEEE INFOCOM'98,1998,2:533-539.
    [16]Giaccone, P.; Leonardi, E.; Shah, D.;, Throughput Region of Finite-Buffered Networks, Parallel and Distributed Systems, IEEE Transactions on, vol.18, no.2, pp.251-263, Feb.2007
    [17]何凌,((TCP/IP网络拥塞控制若干问题的研究》,东北大学博士论文,2008
    [18]Le, L. B.; Modiano, E.; Shroff, N. B.;, Optimal Control of Wireless Networks With Finite Buffers, Networking, IEEE/ACM Transactions on, vol.PP, no.99, pp.1,0
    [19]廖晓听,《稳定性的理论、方法和应用》(第二版),华中科技大学出版社2009
    [20]M. Ajmone Marsan, A. Bianco, P. Giaccone, E. Leonardi, F. Neri. Packet-Mode Scheduling in Input-Queued Cell-Based Switch, J. IEEE/ACM Trans. Networking,2002.10(5):666-678.
    [21]N. Mckeown, A. Mekkittikul, V. Anantharam, J. Walrand. Achieving 100% Throughput in an Input-Quedued Switch, J.IEEE Trans. Comm.,1999, 47(8):1260-1272.
    [22]K. Ross, N. Bambos. Local Search Scheduling Algorithms for Maximal Throughput in Packet Switches, C. Proc. IEEE INFOCOM'04,2004, 2:1158-1169.
    [23]J.G. Dai, W. Lin. Maximum Pressure Policies in Stochastic Processing Networks, J. Operations Research,2005,53:197-218.
    [24]Long Bao Le, Modiano, E., Shroff, N.B. Optimal Control of Wireless Networks with Finite Buffers, J. IEEE INFOCOM'10,2010,1:9.
    [25]P.R. Kumar, S.P. Meyn. Stability of Queueing Networks and Scheduling Policies, J. IEEE Trans. Automatic Control,1995,40(2):251-260.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700