Skip to main content
Log in

Simulative research on the function of internet of things basing on the changing of topological structure

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

    We’re sorry, something doesn't seem to be working properly.

    Please try refreshing the page. If that doesn't work, please contact support so we can address the problem.

Abstract

As for the next generation of Internet, the Internet of things impacts people’s lives profoundly, its application will be more broadly. There are many kinds of things network terminal, network topological structure is complex, the reset of network resource will drive the topological structure, changes, which have an important impact on network performance. By using the Simulative method, we study the relationship between the changes of topological structure and network performance before the network resource reset, which can improve the project of resource replacement, furthermore, improve the network performance.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

References

  1. Chen K, Zhou Y, He J (2009) A localization scheme for underwater wireless sensor networks [J]. IJAST 9–16

  2. Gao HD, Guo YJ, Cui JQ, Hao HG, Shi H (2012) A communication protocol of RFID Systems in internet of things [J]. IJSIA 91–102

  3. Hui X, Wang C, Liu W, Chen H (2012) NETCONF-based Integrated Management for Internet of Things using RESTful Web Services [J]. IJFGCN 5(3):73–82

    Google Scholar 

  4. Islam S, Rahman SA (2011) Anomaly intrusion detection system in wireless sensor networks: security threats and existing approaches [J]. IJAST 1–8

  5. Janevski T, Petrov I (2011) Cross-layer analysis of transport control protocols over IEEE 802.11 wireless networks [J]. IJAST 1–18

  6. Jun L, Changbiao X, Keping L (2002) Ns-based network simulation discussion [J]. Comp Appl Res (3 Issue):54–57

  7. Lee S, Latchman HA, Park B (2010) Efficient handover scheme of proxy mobile IPv6 in wireless local area networks [J]. IJMUE 1–18

  8. Leiming X, Bo P, Yao Z (2008) NS and network simulation [J]. The People’s Post & Telecommunication Press, The 4th Issue

  9. Salami O, Bagula A, Chan HA (2010) Evaluation of interference in inter-working multi-hop wireless networks [J]. IJSIA 4(4):17–32

    Google Scholar 

  10. Sharma K, Ghose MK, Kumar D, Singh RPK, Pandey VK (2010) A comparative study of various security approaches used in wireless sensor networks [J]. IJAST 31–44

  11. Song L, Fuqiang L, Lin M (2012) Opportunities and Challenges of the Internet of Things [J]. Comp Safety 59–60

  12. Wei D, Xinggang W (2009) Application of network simulation in the assessment on network performance indices [J]. Comp Eng Appl No. 18th Issue

  13. Ye J, Xiaojun M, Jun F (2008) Realization and simulative. Research on the multi-path route selection mechanism in simulator [J].Comp Appl 64–66

  14. Yuhua Y, Peining L, Jiwei L, Hansheng C (2011) NS-2 Analysis on Simulative Technology [J]. Comp Eng No. 31 Volume: The 15th Issue

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Wen Hu.

Additional information

Supported by Heilongjiang Nature Science Fund(F201034).

Rights and permissions

Reprints and permissions

About this article

Cite this article

Hu, W., Cheng, T. Simulative research on the function of internet of things basing on the changing of topological structure. Multimed Tools Appl 74, 8445–8454 (2015). https://doi.org/10.1007/s11042-013-1615-5

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-013-1615-5

Keywords

Navigation