期刊文献+

一种基于接收节点控制的无线传感器网络媒体访问控制协议 被引量:5

A Receiver-Initiated MAC Protocol for Wireless Sensor Networks
下载PDF
导出
摘要 为了提高无线传感器网络数据包传输效率,提出一种基于时间同步、接收节点控制的无线传感器网络媒体访问控制协议。该协议在保持节点低功耗工作的前提下,使父节点在一个操作周期内,通过多次邀请机制和迸发传输机制,能够与多子节点进行数据包的多次传输。该多次邀请机制,使父节点具备了在单个操作周期内,从多个子节点接收数据包的能力,本质上减少了子节点之间的竞争、提高了信道利用率,增强了父节点对数据包传输的控制力。迸发传输机制,使得父节点可以在一次通讯中连续接收多个数据包,进一步提高了信道的利用率。仿真结果表明:当网络载荷强度增大时,该协议使网络中的节点能够充分利用信道,显著提高了网络中数据包的传输效率,随着网络载荷增加,使网络吞吐量增大近50%。 In order to improve the transmission efficiency of nodes in wireless sensor networks,this paper proposes a synchronous receive-initiated medium access control protocol ( SRI-MAC ) . While maintaining low energy consumption of nodes in the network,a parent-node in a local communication cluster invites more than one child-node to send multiple packets over an operation period by using multiple-invitation mechanism and burst-transmission mechanism. The multiple-invitation mechanism makes the parent-node able to receive packets from multiple child-nodes in an operation period. It intrinsically reduces the competition among child-nodes,enhances the channel utilization and strengthens the control of the parent-node for packet transmission. The burst-transmission mechanism allows the parent-node can continuously receive multiple packets in a communication which also enhances the channel utilization. Simulation results show that, when the traffic load becomes heavier, the method proposed in SRI-MAC enables the node to make full use of the channel and dramatically improves the transmission efficiency. SRI-MAC improves the throughput by 50%.
作者 钱丽丽 刘昊
出处 《传感技术学报》 CAS CSCD 北大核心 2014年第2期241-246,共6页 Chinese Journal of Sensors and Actuators
基金 江苏省自然科学基金项目(BK2011018)
关键词 无线传感器网络 多次邀请 迸发传输 信道利用率 wireless sensor network multi-invitation burst-transmission channel utilization
  • 相关文献

参考文献16

  • 1Yick J, Mukherjee B, Ghosal D. Wireless Sensor Network Survey [ J ]. Computer Networks,2008,52 ( 12 ) :2292-2330.
  • 2Potdar V,Sharif A, Chang E. Wireless Sensor Networks: A Survey [ C ]//Advanced Information Networking and Applications Workshops, Bradford, England, 2009 : 636 -641.
  • 3Polastre J, Hill J, Culler D. Versatile Low Power Media Access for Wireless Sensor Networks [ C ]//Proc of 2nd ACM Conference on Embedded Networked Sensor Systems, Nov. 2004.
  • 4Buettner M, Yee G V, Anderson E,et ol. X-Mac:A Short Preamble Mac Protocol for Duty-Cycled Wireless Sensor Networks [ C ]// SenSys06: Proceedings of the 4th international conference on Embedded networked sensor systems. New York,2006:307-320.
  • 5Sun Y, Gurewitz O, Johnson D B. RSRI-MAC : A Receiver-Initiated Asynchronous Duty Cycle Mac Protocol for Dynamic Traffic Loads in Wireless Sensor Networks [ C ]//SenSys08 : Proceedings of the 6th International Conference on Embedded Networked Sensor Systems,2008 : 1 - ld.
  • 6Tang L, Sun Y, Gurewitz O, et al. Pw-Mac: An Energy-Efficient Predictive-Wakeup Mac Protocol for Wireless Sensor Networks [ C ]//2011Proceedings IEEE Infocom,2011 : 1305-1313.
  • 7Wei Ye, Heidemann J, Estrin D. Medium Access Control with Coordinated Adaptive Sleeping for Wireless Sensor Networks [ J ]. Wireless Communications and Mobile Computing Conference ( IWCMC ) ,2004:493-506.
  • 8Du S,Saha A K,Johnson D B. Rmac:A Routing-Enhanced Duty- Cycle Mac Protocol for Wireless Sensor Networks [ C ]//Infocom 2007. 26th IEEE International Conference on Computer Communications. IEEE ,2007 : 1478-1486.
  • 9Yu F, Wu T, Biswas S. Toward in-Band Self-Organization in Energy-Efficient Mac Protocols for Sensor Networks [ J ]. IEEE Transactions on Mobile Computing,2008,7 (2) : 156-170.
  • 10Liu S, Fan K, Sinha P. CMAC : An Energy-Efficient MAC Layer Protocol Using Convergent Packet Forwarding for Wireless Sensor Networks [ J ]. ACM Transactions on Sensor Networks,2009,5 (4) : 1-34.

同被引文献42

  • 1Singh K,PanduranganC,BanerjeeA.Lattce based forward-secure identity based encryption scheme with shorter ciphertext[J].Journal of Internet Services and Information Security,2013,3(1/2):5-19.
  • 2Liu Y.Mining frequent patterns from univariate uncertain data[J].Data and Knowledge Engineering,2012,71 (1):47-68.
  • 3Wang L,Feng L,Wu M.AT-Mine:An Efficient Algorithm of Frequent Itemset Mining on Uncertain Dataset[J].Journal of Computers,2013,8(6):1417-1426.
  • 4Nedelcu S,Werner M,Land M,et al.GPU implementation of the bond fluctuation model[J].Journal of Computational Physics,2012,231:2811-2824.
  • 5Li Hong,Qian Chang-ji,Luo Meng-bo.Conformational properties of a polymer tethered to an interacting flat surface[J].Polymer J,2010,42:383-385.
  • 6Zhang Lei, Wang Huahui, Li Tongtong. Anti-Jamming Message- Driven Frequency Hopping: Part I-System Design [J]. IEEE Transactions on Wireless Communications, 2013,2 ( 1 ) : 70-79.
  • 7Manjula P, Sharmila S. Anti-jammming Broadcast Communication Using Uncoordinated Frequency Hopping [J]. International Jour- nal of Application or Innovation inEngineering & Management, 2013,2(6) :28-36.
  • 8Wang Yongbin, Liu Hongbo, Liu Qintao, et al. Project Design of A Shortwave Narrowband Difference Frequency Hopping System [C]. Proceedings of the IEEE 3rd International Conference on Consumer Electronic, Communications and Networks 2013, Xian-ning, China, 2013:454-456.
  • 9Sha M, Haehmann G, Lu C. Real-world Empirical Studies on Multi-channel Reliability and Spectrum Usage for Home-area Sen- sor Networks[J]. IEEE Transactions on Network and Service Man- agement, 2013,10( 1 ) : 56-69.
  • 10Nicolas C, Marot M. Dynamic Link Adaptiou Based on Coexis- tence-fingerprint Detection for WSN [C]. Ad Hoc Networking Workshop. Ayia Napa, Cyprus, 2012 : 90-97.

引证文献5

二级引证文献11

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部