首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
Data gathering is a major function of many applications in wireless sensor networks. The most important issue in designing a data gathering algorithm is how to save energy of sensor nodes while meeting the requirements of special applications or users. Wireless sensor networks are characterized by centralized data gathering, multi-hop communication and many to one traffic pattern. These three characteristics can lead to severe packet collision, network congestion and packet loss, and even result in hot-spots of energy consumption thus causing premature death of sensor nodes and entire network. In this paper, we propose a load balance data gathering algorithm that classifies sensor nodes into different layers according to their distance to sink node and furthermore, divides the sense zone into several clusters. Routing trees are established between sensor node and sink depending on the energy metric and communication cost. For saving energy consumption, the target of data aggregation scheme is adopted as well. Analysis and simulation results show that the algorithm we proposed provides more uniform energy consumption among sensor nodes and can prolong the lifetime of sensor networks.  相似文献   

2.
This paper proposes a power efficient multipath video packet scheduling scheme for minimum video distortion transmission (optimised Video QoS) over wireless multimedia sensor networks. The transmission of video packets over multiple paths in a wireless sensor network improves the aggregate data rate of the network and minimizes the traffic load handled by each node. However, due to the lossy behavior of the wireless channel the aggregate transmission rate cannot always support the requested video source data rate. In such cases a packet scheduling algorithm is applied that can selectively drop combinations of video packets prior to transmission to adapt the source requirements to the channel capacity. The scheduling algorithm selects the less important video packets to drop using a recursive distortion prediction model. This model predicts accurately the resulting video distortion in case of isolated errors, burst of errors and errors separated by a lag. Two scheduling algorithms are proposed in this paper. The Baseline scheme is a simplified scheduler that can only decide upon which packet can be dropped prior to transmission based on the packet’s impact on the video distortion. This algorithm is compared against the Power aware packet scheduling that is an extension of the Baseline capable of estimating the power that will be consumed by each node in every available path depending on its traffic load, during the transmission. The proposed Power aware packet scheduling is able to identify the available paths connecting the video source to the receiver and schedule the packet transmission among the selected paths according to the perceived video QoS (Peak Signal to Noise Ratio—PSNR) and the energy efficiency of the participating wireless video sensor nodes, by dropping packets if necessary based on the distortion prediction model. The simulation results indicate that the proposed Power aware video packet scheduling can achieve energy efficiency in the wireless multimedia sensor network by minimizing the power dissipation across all nodes, while the perceived video quality is kept to very high levels even at extreme network conditions (many sensor nodes dropped due to power consumption and high background noise in the channel).  相似文献   

3.
In order to establish a route supporting multi-constrained quality of service(QoS), increase network throughput and reduce network energy consumption, an improved ant colony-based multi-constrained QoS energy-saving routing algorithm(IAMQER) is proposed. The ant colony algorithm, as one of the available heuristic algorithms, is used to find the optimal route from source node to destination node. The proposed IAMQER algorithm, which is based on the analysis of local node information such as node queue length, node forwarding number of data packets and node residual energy, balances the relationship between the network throughput and the energy consumption, thus improving the performance of network in multi-constrained QoS routing. Simulation results show that this IAMQER algorithm can find the QoS route that reduce average energy consumption and improves network packet delivery ratio under the end-to-end delay and packet loss ratio constraints.  相似文献   

4.
This paper proposes novel routing and topology control algorithms for industrial wireless sensor networks (IWSNs) based on the ISA100.11a standard. The proposed algorithms not only reduces energy consumption at the node level but also reduces packet latency at the network level. Using the residual energy and packet reception rate of neighbor nodes, the source node can estimate the highest election weight. Hence, packets are conveyed by a multi-hop forwarding scheme from source nodes to the sink by the optimal path. Furthermore, energy consumption and network latency are minimized using integer linear programming. Simulation results show that the proposed algorithms are fully effective in terms of energy conservation and network latency for IWSNs.  相似文献   

5.
Wireless Sensor Networks are often used for monitoring and control applications where sensor nodes collect data and send it to the sink. Direct transmission of data packets to the sink from nodes in the network causes increased communication costs in terms of energy, network lifetime and bandwidth utilization. In this context, this paper proposes Two Tier Cluster-based Data Aggregation (TTCDA) algorithm for the randomly distributed nodes in the network to minimize computation and communication cost. The TTCDA effectively considers the packet and data aggregation using additive and divisible aggregation functions at cluster head and sink. The aggregation functions are applied according to spatial and temporal correlation of packets and data generated by each node. It also prevents transmission of redundant data by improving energy consumption and bandwidth utilization as compared with state-of-the-art solution. The performance of the algorithm is validated using examples and simulations. Also, it is seen that packet aggregation in TTCDA is better for the bandwidth utilization as it reduces average energy consumption by 3.13 % as compared to data aggregation.  相似文献   

6.
The mobile ad hoc network (MANET) is communication network of a mobile node without any prior infrastructure of communication. The network does not have any static support; it dynamically creates the network as per requirement by using available mobile nodes. This network has a challenging security problem. The security issue mainly contains a denial of service attacks like packet drop attack, black-hole attack, gray-hole attack, etc. The mobile ad-hoc network is an open environment so the working is based on mutual trust between mobile nodes. The MANETs are vulnerable to packet drop attack in which packets travel through the different node. The network while communicating, the node drops the packet, but it is not attracting the neighboring nodes to drop the packets. This proposed algorithm works with existing routing protocol. The concept of trusted list is used for secure communication path. The trusted list along with trust values show how many times node was participated in the communication. It differentiates between altruism and selfishness in MANET with the help of energy level of mobile components. The trust and energy models are used for security and for the differentiation between altruism and selfishness respectively.  相似文献   

7.
Voice over IP (VoIP) is a promising low‐cost voice communication over the wireless IP network. To provide satisfactory VoIP services, the Quality of Service (QoS) of the wireless network should be guaranteed. This paper proposes a VoIP performance measurement freeware called NCTU VoIP Testing Tool (NCTU‐VT). We compare NCTU‐VT with two commercial tools SmartVoIPQoS and IxChariot in terms of packet loss, latency, and Mean Opinion Score (MOS) of the VoIP sessions in Wi‐Fi network. Our study indicates that these three tools can accurately measure VoIP performance in Wi‐Fi environment. Copyright © 2010 John Wiley & Sons, Ltd.  相似文献   

8.
In this paper, we investigate the reduction in the total energy consumption of wireless sensor networks using multi-hop data aggregation by constructing energy-efficient data aggregation trees. We propose an adaptive and distributed routing algorithm for correlated data gathering and exploit the data correlation between nodes using a game theoretic framework. Routes are chosen to minimize the total energy expended by the network using best response dynamics to local data. The cost function that is used for the proposed routing algorithm takes into account energy, interference and in-network data aggregation. The iterative algorithm is shown to converge in a finite number of steps. Simulations results show that multi-hop data aggregation can significantly reduce the total energy consumption in the network.  相似文献   

9.
We propose an opportunistic routing protocol for wireless sensor networks designed to work on top of an asynchronous duty-cycled MAC. Opportunistic routing can be very effective when used with asynchronous duty-cycled MAC because expected waiting time of senders—when they stay on active mode and transmit packet streams—is significantly reduced. If there are multiple sources, energy consumption can be reduced further through in-network aggregation. The idea proposed in this paper is to temporarily increase duty cycle ratio of nodes holding packets, in order to increase chance of in-network aggregation and thus reduce energy consumption and extend network lifetime. In the proposed protocol called opportunistic routing with in-network aggregation (ORIA), whenever a node generates a packet or receives a packet to forward, it waits for a certain amount of time before transmitting the packet. Meanwhile, the node increases its duty cycle ratio, hoping that it receives packets from other nodes and aggregate them into a single packet. Simulation results show that ORIA saves considerable amount of energy compared to general opportunistic routing protocols, as well as tree-based protocols.  相似文献   

10.
Efficient utilization of network resources is a key goal for emerging broadband wireless access systems (BWAS). This is a complex goal to achieve due to the heterogeneous service nature and diverse quality of service (QoS) requirements of various applications that BWAS support. Packet scheduling is an important activity that affects BWAS QoS outcomes. This paper proposes a novel packet scheduling mechanism that improves QoS in mobile wireless networks which exploit IP as a transport technology for data transfer between BWAS base stations and mobile users at the radio transmission layer. In order to improve BWAS QoS the new packet algorithm makes changes at both the IP and the radio layers. The new packet scheduling algorithm exploits handoff priority scheduling principles and takes into account buffer occupancy and channel conditions. The packet scheduling mechanism also incorporates the concept of fairness. Performance results were obtained by computer simulation and compared to the well known algorithms. Results show that by exploiting the new packet scheduling algorithm, the transport system is able to provide a low handoff packet drop rate, low packet forwarding rate, low packet delay and ensure fairness amongst the users of different services.  相似文献   

11.
Perceptive admission control for wireless network quality of service   总被引:1,自引:0,他引:1  
Ian D.  Elizabeth M.  Joseph P.   《Ad hoc Networks》2007,5(7):1129-1148
As wireless networks become more widely used, there is a growing need to support advanced services, such as multimedia streaming and voice over IP. Traditional approaches to guarantee quality of service (QoS) work well only with predictable channel and network access. In wireless mobile networks, where conditions dynamically change as nodes move about the network, a stateless, high level approach is required. Since shared wireless resources are easily over-utilized, the load in the network must be controlled so that an acceptable QoS for real-time applications can be maintained. If minimum real-time requirements are not met, these unusable packets waste scarce bandwidth and hinder other traffic, compounding the problem. To enable high QoS for all admitted traffic, we propose the Perceptive Admission Control (PAC) protocol. PAC monitors the wireless channel and dynamically adapts admission control decisions to enable high network utilization while preventing congestion. Through discussion, simulations and testbed experiments, we demonstrate that PAC ensures low packet loss and delay for all admitted flows.  相似文献   

12.
In recent years, energy consumption and data gathering is a foremost concern in many applications of wireless sensor networks (WSNs). The major issue in WSNs is effective utilization of the resource as energy and bandwidth with a large gathering of data from the monitoring and control applications. This paper proposes novel Bandwidth Efficient Cluster based Packet Aggregation algorithm for heterogeneous WSNs. It combines the idea of variable packet generation rate of each node with random data. The nodes are randomly distributed with different energy level and are equal in numbers. It uses the perfectly compressible aggregation function at cluster head based on the correlation of packets and data generated by each node. Compare to state-of-the-art solutions, the algorithm shows 4.43 % energy savings with reduced packet delivery ratio (62.62 %) at the sink. It shows better bandwidth utilization in packet aggregation than data aggregation.  相似文献   

13.
Clustering of nodes is often used in wireless sensor networks to achieve data aggregation and reduce the number of nodes transmitting the data to the sink. This paper proposes a novel dual head static clustering algorithm (DHSCA) to equalise energy consumption by the sensor nodes and increase the wireless sensor network lifetime. Nodes are divided into static clusters based on their location to avoid the overhead of cluster re-formation in dynamic clustering. Two nodes in each cluster, selected on the basis of the their residual energy and their distance from the sink and other nodes in the cluster, are designated as cluster heads, one for data aggregation and the other for data transmission. This reduces energy consumption during intra-cluster and inter-cluster communication. A multi-hop technique avoiding the hot-spot problem is used to transmit the data to the sink. Experiments to observe the energy consumption patterns of the nodes and the fraction of packets successfully delivered using the DHSCA suggest improvements in energy consumption equalisation, which, in turn, enhances the lifetime of the network. The algorithm is shown to outperform all the other static clustering algorithms, while being comparable with the performance of the best dynamic algorithm.  相似文献   

14.
In an ad-hoc network, mobile stations communicate with each other using multi-hop wireless links. There is no stationary infrastructure such as base stations. Each node in the network also acts as a router, forwarding data packets for other nodes. In this architecture, mobile stations have a multi-hop path, via other mobile stations acting as intermediaries or relays, to indirectly forward packets from source to destination. Adjusting the transmitted power is extremely important in ad-hoc networks due to at least the following reasons. The transmitted power of the radio terminals determines the network topology. The network topology in turn has considerable impact on the throughput (fraction of packets, sent by a source, and successfully received at the receiver) performance of the network. The need for power efficiency must be balanced against the lifetime of each individual node and the overall life of the network. Power control problem can be classified in one of three categories. The first class comprises of strategies to find an optimal transmitted power to control the connectivity properties of the network. The second class of approaches could be called power aware routing. Most schemes use some shortest path algorithm with a power based metric, rather than a hop count based metric. The third class of approaches aim at modifying the mac layer. We use distributed power control algorithms initially proposed for cellular networks. We establish a classification of power control algorithms for wireless ad-hoc networks. We evaluate these algorithms in anIeee 802.11b multi-hop wireless ad-hoc LAN environment. Results show the advantage of power control in maximizing signal-to-interference ratio and minimizing transmitted power.  相似文献   

15.
邹赛  汪文勇  唐勇  张骏 《通信学报》2013,34(Z1):36-275
在异构无线传感器网络模型下,针对采集节点发送数据能量消耗过高及路由时分组丢失率过大等情况,对数据汇聚节点的位置优化及路由进行了研究,提出了移动汇聚节点位置优化路由算法(MLOYIH)。先根据蚁群算法的原理对移动节点与静态节点进行分组,再在组内寻找适合的位置放置汇聚节点,最后根据供电情况,选择合适的跳算进行路由。经过仿真实验与性能分析表明,MLOYIH算法与传统算法比较,能量消耗降低到64%,分组丢失率不高于3%。  相似文献   

16.
This paper provides a novel design concept for advanced mobile multi interface terminals with radio network aggregation capability and enhanced quality of service (QoS) provisioning for multimedia services (voice, video and data) in heterogeneous wireless and mobile networks. A new module is established which provides the best QoS and lowest cost for any given multimedia service by using simultaneously all available wireless and mobile access networks for a given traffic flow. This novel adaptive QoS module with adaptive QoS routing algorithm is called advanced QoS routing algorithm (AQoSRA), which is defined independently from any existing and future radio access technology. The performance of our proposal is evaluated using simulations and analysis with multi-interface mobile stations with AQoSRA within, carrying multimedia traffic in heterogeneous mobile and wireless environment with coexistence of multiple Radio Access Technologies, such as 3G, 4G as well as future 5G radio access networks. The analysis of the proposed framework for radio networks aggregation in advanced mobile terminals has shown overall better performances regarding the achievable throughput and multimedia access probability in heterogeneous wireless and mobile environment.  相似文献   

17.
Distributed Priority Scheduling and Medium Access in Ad Hoc Networks   总被引:4,自引:0,他引:4  
Providing Quality-of-Service in random access multi-hop wireless networks requires support from both medium access and packet scheduling algorithms. However, due to the distributed nature of ad hoc networks, nodes may not be able to determine the next packet that would be transmitted in a (hypothetical) centralized and ideal dynamic priority scheduler. In this paper, we develop two mechanisms for QoS communication in multi-hop wireless networks. First, we devise distributed priority scheduling, a technique that piggybacks the priority tag of a node's head-of-line packet onto handshake and data packets; e.g., RTS/DATA packets in IEEE 802.11. By monitoring transmitted packets, each node maintains a scheduling table which is used to assess the node's priority level relative to other nodes. We then incorporate this scheduling table into existing IEEE 802.11 priority backoff schemes to approximate the idealized schedule. Second, we observe that congestion, link errors, and the random nature of medium access prohibit an exact realization of the ideal schedule. Consequently, we devise a scheduling scheme termed multi-hop coordination so that downstream nodes can increase a packet's relative priority to make up for excessive delays incurred upstream. We next develop a simple analytical model to quantitatively explore these two mechanisms. In the former case, we study the impact of the probability of overhearing another packet's priority index on the scheme's ability to achieve the ideal schedule. In the latter case, we explore the role of multi-hop coordination in increasing the probability that a packet satisfies its end-to-end QoS target. Finally, we perform a set of ns-2 simulations to study the scheme's performance under more realistic conditions.  相似文献   

18.
移动自组网是由一组带有无线收发装置的移动节点组成的一个多跳的临时性的自治系统。随着无线通信中多媒体业务的增加,在移动自组网中提供QoS(Quality of Sevice服务质量)保障具有越来越重要的意义,而QoS路由技术则是其中的核心技术和热点问题。文章指出移动自组网QoS路由的困难,对移动自组网典型QoS路由协议进行了详细的分析与比较,并对几种较新的移动自组网QoS路由协议进行了介绍,末了对移动自组网QoS路由协议的发展进行了展望。  相似文献   

19.
徐骥  朱艺华  田贤忠  池凯凯 《电子学报》2016,44(8):1799-1805
无线传感器网络中节点大多采用电池供电,让节点以低能耗将采集的数据传递到信宿,对无线传感器网络有效运行极为重要.该文提出了能量有效的可靠机会路由EROR(Energy-efficient Reliable Opportunistic Routing),它利用结合节点剩余能量和链路上收发双方的总能耗的转发代价,选择转发节点集合(简称“转发集”)、主转发节点和协助转发节点,让节点调节发射功率并利用随机线性编码把数据包分片编码发送到转发集,进而以多跳方式把数据可靠低能耗地传递到信宿.仿真结果表明:在网络生存时间和能耗方面,EROR比已有路由策略CodePower更优.  相似文献   

20.
In a mobile ad hoc network (MANET), the nodes act both as traffic sources and as relays that forward packets from other nodes along multi-hop routes to the destination. Such networks are suited to situations in which a wireless infrastructure is unavailable, infeasible, or prohibitively expensive. However, the lack of a secure, trusted infrastructure in such networks make secure and reliable packet delivery very challenging. A given node acting as a relay may exhibit Byzantine behavior with respect to packet forwarding, i.e., arbitrary, deviant behavior, which disrupts packet transmission in the network. For example, a Byzantine node may arbitrarily choose to drop or misroute a certain percentage of the packets that are passed to it for forwarding to the next hop. In earlier work, we proposed a trust establishment framework, called Hermes, which enables a given node to determine the “trustworthiness” of other nodes with respect to reliable packet delivery by combining first-hand trust information obtained independently of other nodes and second-hand trust information obtained via recommendations from other nodes. A deficiency of the Hermes scheme is that a node can fail to detect certain types of Byzantine behavior, such as packet misforwarding directed at a particular source node. In this paper, we propose new mechanisms to make Hermes robust to Byzantine behavior and introduce a punishment policy that discourages selfish node behavior. We present simulation results that demonstrate the effectiveness of the proposed scheme in a variety of scenarios involving Byzantine nodes that are malicious both with respect to packet forwarding and trust propagation.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号