期刊文献+

基于分片重传链路感知机制的移动WSN网络数据传输算法 被引量:18

Data transmission algorithms for mobile WSN networks based on piecewise retransmit link awareness mechanism
下载PDF
导出
摘要 为解决移动无线传感网络(WSN)在传输数据时存在的链路抖动严重,数据带宽传输能力不足等问题,提出了一种基于分片重传链路感知机制的移动WSN网络数据传输算法。首先,针对移动WSN网络在传输过程中存在的因链路抖动而导致数据频繁重传的不足,将待传输的数据报文分割为裁决指针(adjudication pointer,AP)及数据片(data sheet,DS),接收节点根据数据分组报文中的AP进行准确性判断,发送节点当仅当AP出现错误时进行数据重传,提高了节点对数据报文准确性控制能力。随后,针对单纯依赖重传输方式存在的适应性不足问题,发送节点将数据报文中数据分片进行再分割,形成裁决指针-数据流,再根据链路抖动情况,按照数据块的AP状态差异分别进行整体传输及分片传输,以降低网络链路拥塞现象。仿真实验表明,与已有的移动WSN网络数据带宽传输方法相比,算法具有更低的链路抖动率和拥塞发生频率,以及更高的数据传输带宽。 In order to solve the problems of severe link jitter and insufficient bandwidth transmission capability during the transmitting data in mobile WSN network, a data transmission algorithm based on piecewise retransmit link awareness mechanism is proposed. Firstly, in view of the shortcomings of frequent data retransmissions due to link jitter in mobile WSN network, the data message to be transmitted is divided into two parts, adjudication pointer(AP) and data sheet(DS). The receiving node judges the accuracy of AP according to the data packet message, and the sending node only makes mistakes when AP appears. The data retransmit improves the accuracy control ability of the data message and the bandwidth transmission capability of the network. Subsequently, aiming at the problem of insufficient adaptability of relying solely on retransmitting mode, the sending node divides the data in the data message into pieces and then divides them into decision pointer-data slice data streams. According to the link jitter, the whole transmission and fragmentation transmission are carried out in the way of data blocks, which reduces the redundancy of network transmission data and improves the frequent data retransmitting caused by data error. The simulation results show that, compared with existing data bandwidth transmission methods in mobile WSN networks, the proposed algorithm has lower link jitter rate and congestion frequency, and higher data transmission bandwidth.
作者 袁明兰 龙颖 李林 Yuan Minglan;Long Ying;Li Lin(Chongqing Business Vocational College,Chongqing 401331,China;Chongqing Vocational College of Applied Technology,Chongqing 401520,China;College of computer science,University of Electronic Science and Technology of China,Chengdu 610054,China)
出处 《电子测量与仪器学报》 CSCD 北大核心 2019年第12期50-57,共8页 Journal of Electronic Measurement and Instrumentation
基金 国家自然科学基金面上项目(61273235) 重庆市自然科学基金(CSTC2014jcyj A40047) 重庆市教委科学技术研究项目(KJ1751484)资助。
关键词 移动无线传感网络 链路匹配 数据重传 数据流分割 裁决指针 mobile wireless sensor network link matching data retransmit data stream segmentation adjudication pointer
  • 相关文献

参考文献7

二级参考文献34

  • 1Zhu D, Guo J, Cho C, et al. Wireless mobile sensor network for the system identification of a space frame bridge E J ]. IEEE,/ASME Transactions on Mechatronics, 2012,17 ( 3 ) : 499 - 507.
  • 2Ehsan S,Bradford K,Brugger M,et al. Design and analysis of delay-tolerant sensor networks for monitoring and track- ing free-roaming animals E J ~. IEEE Transactions on Wire- less Communications ,2012,11 ( 3 ) : 1220 - 1227.
  • 3Rasheed A, Mahapatra R N. The three-tier security scheme in wireless sensor networks with mobile sinks [ J ]. IEEE Transactions on Parallel and Distributed Systems,2012,23 (5) :958 - 965.
  • 4Agrawal D P, Xie B. Encyclopedia on Ad Hoc and Ubiqui- tous Computing:Theory and Design of Wireless Ad Hoc, Sensor, and Mesh Networks I M 1. World Scientific Publish- ing Co Inc,2009.
  • 5Song Y, Jiang G P. Model and dynamic behavior of mal- ware propagation over wireless sensor networksE A]. Com- plex Sciences I M ]. Berlin Heidelberg: Springer, 2009.487 - 502.
  • 6Khouzani M H R, Sarkar S. Maximum damage battery de- pletion attack in mobile sensor networksE J]. IEEE Transac- tions on Automatic Control ,201 l, 56 (10) :2358 - 2368.
  • 7Karyotis V. Markov random fields for malware propaga- tion : the case of chain networks I J ]. IEEE Communications Letters ,2010,14(9) : 875 - 877.
  • 8Song Y, Jiang G P. Modeling malware propagation in wire- less sensor networks using cellular automata ~ A ]. 2008 In- ternational Conference on Neural Networks and Signal Pro- cessing I C ~. IEEE,2008. 623 - 627.
  • 9C Zou, W Gong, D Towsley. Worm propagation modeling and analysis under dynamic quarantine defense E A ]. Pro- ceedings of the 2003 ACM Workshop on Rapid Malcode I C]. USA:ACM,2003.51 - 60.
  • 10Yao Y,Feng X, Yang W, et al. Analysis of a delayed In- temet worm propagation model with impulsive quarantine strategyl J]. Mathematical Problems in Engineering ,2014, (1) :759 -765.

共引文献89

同被引文献189

引证文献18

二级引证文献35

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部