Abstract
As for the next generation of Internet, the Internet of things impacts people’s lives profoundly, its application will be more broadly. There are many kinds of things network terminal, network topological structure is complex, the reset of network resource will drive the topological structure, changes, which have an important impact on network performance. By using the Simulative method, we study the relationship between the changes of topological structure and network performance before the network resource reset, which can improve the project of resource replacement, furthermore, improve the network performance.






Similar content being viewed by others
References
Chen K, Zhou Y, He J (2009) A localization scheme for underwater wireless sensor networks [J]. IJAST 9–16
Gao HD, Guo YJ, Cui JQ, Hao HG, Shi H (2012) A communication protocol of RFID Systems in internet of things [J]. IJSIA 91–102
Hui X, Wang C, Liu W, Chen H (2012) NETCONF-based Integrated Management for Internet of Things using RESTful Web Services [J]. IJFGCN 5(3):73–82
Islam S, Rahman SA (2011) Anomaly intrusion detection system in wireless sensor networks: security threats and existing approaches [J]. IJAST 1–8
Janevski T, Petrov I (2011) Cross-layer analysis of transport control protocols over IEEE 802.11 wireless networks [J]. IJAST 1–18
Jun L, Changbiao X, Keping L (2002) Ns-based network simulation discussion [J]. Comp Appl Res (3 Issue):54–57
Lee S, Latchman HA, Park B (2010) Efficient handover scheme of proxy mobile IPv6 in wireless local area networks [J]. IJMUE 1–18
Leiming X, Bo P, Yao Z (2008) NS and network simulation [J]. The People’s Post & Telecommunication Press, The 4th Issue
Salami O, Bagula A, Chan HA (2010) Evaluation of interference in inter-working multi-hop wireless networks [J]. IJSIA 4(4):17–32
Sharma K, Ghose MK, Kumar D, Singh RPK, Pandey VK (2010) A comparative study of various security approaches used in wireless sensor networks [J]. IJAST 31–44
Song L, Fuqiang L, Lin M (2012) Opportunities and Challenges of the Internet of Things [J]. Comp Safety 59–60
Wei D, Xinggang W (2009) Application of network simulation in the assessment on network performance indices [J]. Comp Eng Appl No. 18th Issue
Ye J, Xiaojun M, Jun F (2008) Realization and simulative. Research on the multi-path route selection mechanism in simulator [J].Comp Appl 64–66
Yuhua Y, Peining L, Jiwei L, Hansheng C (2011) NS-2 Analysis on Simulative Technology [J]. Comp Eng No. 31 Volume: The 15th Issue
Author information
Authors and Affiliations
Corresponding author
Additional information
Supported by Heilongjiang Nature Science Fund(F201034).
Rights and permissions
About this article
Cite this article
Hu, W., Cheng, T. Simulative research on the function of internet of things basing on the changing of topological structure. Multimed Tools Appl 74, 8445–8454 (2015). https://doi.org/10.1007/s11042-013-1615-5
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-013-1615-5