首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 62 毫秒
1.
很多系统在以太网通讯中使用UDP报文进行网络数据的传输,为了完成对这些系统的仿真驱动,通常需要在一台PC机用单网卡或多网卡实现基于UDP协议的信息流仿真。在缺少目标系统的某些节点时,该PC机模拟相关节点的UDP报文的发送、接收,驱动目标系统的运行;当目标系统全系统运行时,该PC机监听以太网上的UDP报文,为目标系统的事后分析记录数据。本文论述了在Windows NT系列平台在通过Windows Socket及特殊的NDIS中间驱动实现UDP信息流的技术。  相似文献   

2.
为解决星际网络场景下的数据传输问题,提出了一种星际容延迟网络路由协议:利用节点的历史连接信息来预测该节点与其各个邻居节点的连接恢复时间;当两个位于同一个域的节点互相连接时,交换彼此的连接时间预测表,并据此决定是否需要使用对方作为中继节点;深空节点的存储资源常常受限,在进行路由选择时将节点的存储区消耗情况也纳入决策。使用NS2进行地-火通信场景仿真,使用一种改进的泛洪路由和一种仅选择网关节点作为下一跳选择的路由策略作对比。仿真结果表明相比其他两种协议,提高了14%的投递成功率并减少了50%的平均传输延迟,并更有效的利用了节点存储资源。  相似文献   

3.
北斗卫星导航系统( Beidou Satellite Navigation System,BDS)只能传输字节受限的短报文,对于长报文需要通过分包和多次重传改善报文传输的成功率,这样会造成系统平台数据发送延误和网络拥塞。提出一种基于数据冗余的数据分包传输机制,该传输机制以数据包为处理对象,采用异或运算得到冗余包,编码简单,编码解码速度快。通过Matlab仿真,证明基于冗余编码机制比无冗余编码单次发送机制的数据接收成功率高15%以上,两次发送对多包的数据接收成功率有较大提高。  相似文献   

4.
针对WSN,文中设计了一种基于S-MAC协议的协同MAC协议(SC-MAC)。该协议通过协同通信技术的应用来解决原有协议的直传链路通信质量不理想的问题。在该协议中,选定的一个中继节点和目的节点同时侦听源节点的发送信号,当中继节点收到目的节点的NACK信号时,进行协同传输,否则继续对数据传输的侦听。数值分析和仿真实验表明,使用SC-MAC协议情况下,节点的平均功率、比特数据能耗、平均时延和抗拥塞等性能比使用S-MAC协议时都有很好的提升。  相似文献   

5.
为了从能量均衡角度出发解决无线传感器网络生命周期延长问题,从而延长整个物联网生命周期,针对无线传感器网络节点遭遇"路由空洞"的时候出现路由中断和生命周期缩短现象,分析能量消耗原理,构建最优跳数模型和能量均衡协议,并提出采用能量均衡的思路减少节点能量消耗。实验仿真发现,应用能量均衡协议使无线传感器网络节点能量分布更加均匀,节点能量消耗时间明显变长,而个别节点能量消耗速度明显大于其他节点的情况得以减少,达到延长无线传感器网络生命周期的目的。仿真结果验证了该方法的可行性。  相似文献   

6.
提出一种编码感知的机会路由算法——CAR.它利用机会传输增加编码机会,并通过引入一系列参数衡量"机会"好坏,创造性地解决了交叉数据流下机会路由转发节点的选取问题,解决了流间网络编码和机会路由算法结合时数据包上下跳节点"已知"与"未知"的矛盾.CAR算法能够最大化每次编码传输中原始数据包的个数,仿真表明,它能够显著提高可靠传输协议以及整个网络的传输性能.通过机会传输实现多用户分集,可显著增加流间网络编码机会,引入的转发延时也可增加流间网络编码机会.  相似文献   

7.
GAF协议是一种基于地理信息的无线传感器网络路由协议,由于采用多跳传输,将导致热区的产生。提出了一种优化邻居表算法,可以有效辨识GAF虚拟网格内的节点密度,从而选择密度大的网格通行,以均衡热区能耗,延长网络寿命。仿真结果验证了该算法的可行性。  相似文献   

8.
流间网络编码机制需要借助通知报文来确定编码机会,现有的机制一般采用"τ间隔通知机制",但对通知间隔τ的选取及其导致的开销并未进行分析。通过分析"τ间隔通知机制"所产生的通信开销及其对编码机会和吞吐量的影响,提出一种自适应通知报文发送机制。在自适应通知报文发送机制中,无线节点根据局部网络的流量自适应地确定发送间隔,且通知报文仅携带最近2个通知间隔侦听到的数据包信息,在保证编码机会的情况下降低通知报文中携带的信息量和通知报文的发送频度,从而降低附加开销和冲突。网络模拟器仿真实验结果表明:自适应通知报文发送机制能有效地减少通知报文发送的额外带宽开销,取得比采用"τ间隔通知机制"的流间编码机制更高的吞吐量。  相似文献   

9.
为了满足对移动目标实现精确打击而提出的对时敏信息可靠传输的要求,提出一种基于多信道优先级统计的MAC协议(MCPS-MAC)。MCPS-MAC协议将不同优先级业务发送的门限阈值与反应信道忙闲状态的信道占用统计值作为判定数据包是否能够发送的条件,从而极大减少信道冲突,降低数据发送的时延,有效缓和了网络的流量激增导致网络超载的问题,并且保证通信网络中优先级较高的数据包仍然能够成功地发送。仿真结果表明,随着网络节点增多和业务量的增大,Link-16数据链延时急剧增大,导致严重的丢包率,而与之相比较,MCPS-MAC协议的端到端延时恒定在3 ms~4 ms内,能够满足高业务量网络的要求,并保障数据包一次发送的成功率不低于95%。  相似文献   

10.
基于资源预留策略提出一种多级光互连仲裁机制,通过将网络分级实现快速、高效的仲裁。多优先级数据缓存队列的传输节点设计,提供了不同类型流量的差异化传输;通过预约式两级仲裁机制,实现网络的完全公平与100%的高吞吐率。设计并对快速仲裁通道进行了合理布局,极大地缩短了仲裁延迟。仿真结果表明:采用基于资源预留的分级仲裁策略,在多种流量模式下所有节点均获得公平的服务。与Feather Weight相比,分级仲裁策略吞吐率提高17%;与2-pass相比,仲裁延迟减少15%,同时,功耗减少5%。  相似文献   

11.
12.
Reviews     
Douglas S. Derrer, We Are All the Target: A Handbook of Terrorism Avoidance and Hostage Survival. Annapolis, MD: US Naval Institute Press, 1992. Pp. x+135, notes, index. $14.95. ISBN 01–55750–150–5

Ian Knight, Zulu: Isandlwana and Rorke's Drift, 22–23 January 1879. London: Windrow & Greene, 1992. Pp.136, 150 illus., incl 8 colour plates, maps, biblio. £35. ISBN 1–872004–23–7

Ian Knight, By the Orders of the Great White Queen: Campaigning in Zululand through the Eyes of the British Soldiers, 1879. London: Greenhill Books and Novato: Presidio Press, 1992. Pp. 272, 17 illus., 1 map. £18.95. ISBN 1–85367–122–3

Manfried Rauchensteiner and Erwin A. Schmidl (eds.), Formen des Krieges: vom Mittelalter zum ‘Low‐intensity’ Conflict’. Graz : Verlag Styria, 1991. Pp.208. DM35. ISBN 3–22–12139–7

Harold J. Kearsley, Maritime Power and the Twenty‐First Century. Dartmouth: Dartmouth Publishing Company, Limited, 1992. Pp.xv + 203, 13 diagrams, index. £32.50. ISBN 1–85521–288–9  相似文献   

13.
The US Army has two approaches to counterinsurgency operations in Afghanistan. One is hard, or combat-focused, and the other is soft, or development-focused. This study examines two US Army task forces deployed to Panjwai District, Afghanistan from 2012 to 2013. CTF 4-9 and 1-38 offer a meaningful comparison because they pursued these contrasting approaches among the same population and against the same enemy at the same time and place. The study compares each unit’s approach and finds that neither approach was successful absent the other. The article concludes by recommending further research into combining the approaches at the operational level.  相似文献   

14.
根据chirp信号在模糊域的特点,本文提出了线性核时频表示方法。这种方法在提高分辨率、消除交叉项以及抑制噪声等方面都具有较高的性能。理论分析和实验结果都证实了这种方法的有效性  相似文献   

15.
The surprising ‘Arab Spring’ raises the question as to what would enable national intelligence to provide high quality warnings prior to the eruption of popular revolutions. This article uses new sources of evidence to trace and explain Israel's success in comparison to US failure at correctly estimating the course of the Iranian Revolution in 1977–79. In explaining this variance, the article shows that it was mainly the result of the intimate acquaintance of Israel's representatives in Iran with the local language, history and culture, as well as the ability to communicate with locals – tools which the Americans completely lacked.  相似文献   

16.
继续教育作为终身教育的重要组成部分和基本形式,对教师的发展成长意义重大。继续教育工作开展十多年来,取得了一定的成绩,但还存在不少问题,如学习动机较为被动,管理认识不到位,教学内容陈旧空泛,教学方法呆板机械等。随着课程改革的不断深入,继续教育必须采取相应的改进措施,树立以人为本,服务至上的观点,教学内容的前瞻性与实用性并重,教学人员进行整合,教学方法灵活多样,评价考核规范科学等,以此激活受训教师内在的学习动机,更大程度地提高继续教育培训的实际效果。  相似文献   

17.
目前市场上的网络监控技术一般用昂贵的硬件设备来支撑,投资较大。在深入研究微软的DirectX9.0的基础上,提出如何用DirectShow软件技术和普通的数字摄像头来实现网络视频的监控和实现技术,内容涉及通信协议、视频的编码与解码技术、视频的编码格式和COM组件编程技术等,最终的实验结果令人满意,且费用低廉,技术可靠,为在高速局域网内构建视频监控系统提供有效的技术支持。  相似文献   

18.
In 1796 a 13-year-old boy playing on wasteland behind his father’s house in Ribchester, Lancashire discovered an assemblage of over 30 Roman artefacts, including a decorated brass helmet. Although partially corroded the Ribchester helmet is a fine example of a first-century AD cavalry sports helmet. This article considers how the interpretation of the helmet has evolved since its discovery. The multi-faceted iconography of the helmet with its mural crown diadem is that of an elite soldier and is paralleled in other examples of cavalry sports helmets of the Ribchester type. The long-neglected imagery on the helmet bowl is reinterpreted and seen not as a haphazard collection of randomly placed combatants but as a highly structured, symmetrical composition specifically designed to be viewed from different directions.  相似文献   

19.
Recent events demonstrate the complex and adaptive approach employed by Russia to reassert influence in Europe. The changing face of Russia’s strategy commenced in 2007 when it launched a crippling cyber-attack against Estonia. This was followed by a large Russian conventional attack against Georgia in 2008, occupying two large areas of the nation. 2014 witnessed the Russian annexation of Crimea where in just a week, Russia seized control of Crimea “without firing a shot.” The annexation of Crimea was rapidly followed by a Russian inspired and led subversive war in eastern Ukraine. The common thread among these diverse Russian operations is its use of ambiguity to confound and confuse decision makers in the West.  相似文献   

20.
This article provides an in-depth examination and analysis of the 2006–2009 Tuareg rebellion in Mali and Niger. It identifies the underlying reasons behind the rebellion, explores contrasting counter-insurgency (COIN) strategies employed by the two governments, and presents some lessons learned. While both COIN approaches ultimately produced similar peace settlements, the article argues that the Malian strategy of reconciliation combined with the selective use of force was far more effective than the Nigerien iron fist approach at limiting the size and scope of the insurgency and producing a more sustainable peace. It concludes by looking at the role of external actors, particularly the United States, and how the failure to internationalize the conflict was actually more beneficial to the local COIN effort, as well as to the longer strategic interests of the United States in the region.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号