Traffic Modelling for Mobile Ad-hoc Networks Simulation

被引:1
|
作者
Gajewski, Piotr [1 ]
Lopatka, Jerzy [1 ]
Lubkowski, Piotr [1 ]
机构
[1] Mil Univ Technol, Fac Elect, Warsaw, Poland
关键词
MANET; Dynamic Spectrum Management; Cognitive Radio; services; telecommunication traffic; computer modeling; simulations;
D O I
10.1109/SPSYMPO51155.2020.9593720
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
This paper is devoted to develop new traffic engine that can be used in High Quality simulator of MANET with cognitive nodes for special applications. This network incudes different categories of nodes, according to their roles in communication and control system hierarchy. Each category of nodes is characterized by its traffic profile, described by intensity of use of specific services. The overall traffic generated by the node is a combination of traffics related to specific services, and their statistical parameters are coming from real exercises.
引用
收藏
页码:70 / 75
页数:6
相关论文
共 50 条
  • [21] Defense against injecting traffic attacks in wireless mobile ad-hoc networks
    Yu, Wei
    Liu, K. J. Ray
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2007, 2 (02) : 227 - 239
  • [22] Reservation CSMA/CA for multimedia traffic over mobile ad-hoc networks
    Joe, I
    Batsell, SG
    ICC 2000: IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, CONFERENCE RECORD, VOLS 1-3: GLOBAL CONVERGENCE THROUGH COMMUNICATIONS, 2000, : 1714 - 1718
  • [23] Traffic-Aware Hybrid Routing Algorithm for Mobile Ad-hoc Networks
    Lee, Jae-Ho
    Moon, Shinjung
    Eom, Doo-Seop
    2012 8TH INTERNATIONAL CONFERENCE ON COMPUTING AND NETWORKING TECHNOLOGY (ICCNT, INC, ICCIS AND ICMIC), 2012, : 219 - 224
  • [24] Prefix routing in mobile ad-hoc networks
    Chen, X
    Wu, J
    Jia, XD
    PARALLEL AND DISTRIBUTED COMPUTING SYSTEMS, 2002, : 66 - 71
  • [25] Security In Multicast Mobile Ad-Hoc Networks
    Shanthi, N.
    Ganesan, L.
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2008, 8 (07): : 326 - 330
  • [26] Cluster maintenance in mobile ad-hoc networks
    Wang, L
    Olariu, S
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2005, 8 (2-3): : 111 - 118
  • [27] On trust establishment in mobile ad-hoc networks
    Eschenauer, L
    Gligor, VD
    Baras, J
    SECURITY PROTOCOLS, 2004, 2845 : 47 - 62
  • [28] Connectivity Service for Mobile Ad-Hoc Networks
    Cornejo, Alejandro
    Lynch, Nancy
    SASOW 2008: SECOND IEEE INTERNATIONAL CONFERENCE ON SELF-ADAPTIVE AND SELF-ORGANIZING SYSTEMS WORKSHOPS, PROCEEDINGS, 2008, : 292 - 297
  • [29] Reliability Evaluation of Mobile Ad-hoc Networks
    Choudhary, Anil
    Roy, O. P.
    Tuithung, T.
    INTERNATIONAL JOURNAL OF FUTURE GENERATION COMMUNICATION AND NETWORKING, 2015, 8 (05): : 207 - 220
  • [30] Network forensics on mobile ad-hoc networks
    Otaka, Akira
    Takagi, Tsuyoshi
    Takahashi, Osamu
    KNOWLEDGE-BASED INTELLIGENT INFORMATION AND ENGINEERING SYSTEMS, PT 3, PROCEEDINGS, 2008, 5179 : 175 - 182