Routing Strategy of Complex Networks Based on Topology Information

来源 :2015中国计算机网络安全年会 | 被引量 : 0次 | 上传用户:tiger_0003
下载到本地 , 更方便阅读
声明 : 本文档内容版权归属内容提供方 , 如果您对本文有版权争议 , 可与客服联系进行内容授权或下架
论文部分内容阅读
  A routing strategy using nodes effective path and dynamic information weight distribution was proposed,which based on the improved efficient path routing strategy in complex network.The strategys weight factor was optimized by the new strategy,and it was compared with the shortest path routing strategy with the traditional routing strategy and the strategy in the view of nodes efficient path.Simulation results show that the proposed strategy can effectively improve the network throughput without increase average data packet transmission delay.Considering the insufficient of local routing strategies in global performance and the community division technology in complex network,a kind of local visibility routing strategy according to the thought of community division was presented.On the condition of community division of the BGLL condensation algorithm,the topology structure information of neighbor nodes and all the community nodes were only stored in the each nodes routing list in the new strategy.When node transaction in community,global routing strategy was adopted and when between communities,minimum load strategy will be used.The simulation results indicate that in the different connection density networks,the performance of the new strategy achieves the best when community divisions degree of modularization is the highest.Contrasted to other local routing strategy,the optimized strategy holds incomparable superiority on Throughput,Transmission delay and the Packet Loss.
其他文献
  快速发展的云计算存在严重的滥用风险,给整个网络空间带来了巨大的安全威胁。本文首先深入分析了云上存在的滥用现象及其原因;然后,针对频发的滥用云进行分布式拒绝服务(D
会议
  The ways to ensure data security in wireless sensor networks are getting more and more attention from people.This paper proposes a scheme,RWS(Random Waterma
会议
  传输控制协议(Transmission Control Protocol,TCP)同步报文(SYN)洪泛(flooding)攻击是最常见的分布式拒绝服务(Distributed Denial of Service,DDoS)攻击方式之一,其主
会议
计算了考虑变速器轴系和壳体柔性耦合影响下的内部齿轮轴系的响应.以齿轮承载均匀性和齿轮副载荷传递最小化为原则,研究了齿轮参数的改变对齿轮啮合、接触以及变速箱振动噪声
  随着互联网的发展,网络上的攻击行为越来越多,这其中SQL 注入攻击占很大的比例。传统的检测主要在客户端或服务端完成,检测准确率低。本文设计了LFC(Length-Frequency-Chara
本文在分析发动机和路面激励传递路径的基础上,对车内噪声传递函数及副车架的隔振性能进行分析.针对某一款车出现的轰鸣声问题,分析了副车架刚度及副车架衬套刚度对其隔振性
石斛属(Dendrobium)为兰科第二大属,全球分布1600多个种,我国有74个种及2个变种。我国石斛植物中近40种可作药用,其中铁皮石斛(DendrobiumoffinaleKimura et Migo)更是誉为“上
同站请求伪造(SSRF)是指攻击者将攻击载体植入目标网站页面后,仿冒用户向该网站的服务器端发起敏感操作请求的一种攻击方式.同站请求伪造能够成功的关键在于服务器端无法区分
本文通过试验手段提出怠速空调开启工况车内噪声源分离的一种新方法.依据该方法有效的分离发动机、冷却风扇、暖通系统与压缩机噪声源,以此分析各个噪声源对车内噪声贡献量与
本文利用尚未见报道的3-对甲基苯基-5-(2-磺酸基苯基偶氮)若丹宁和3-对甲基苯基-5-(4-甲基-2-磺酸基苯基偶氮)若丹宁试剂,建立了共振瑞利散射和二级散射技术测定脱氧核糖核酸