Computer Science ›› 2016, Vol. 43 ›› Issue (10): 43-46.doi: 10.11896/j.issn.1002-137X.2016.10.007

Previous Articles     Next Articles

Design of Multi-hop Routing Protocol in WSN Based on Sun SPOT

LI Yang, ZHAO Yun-long, SONG Hong-tao and YAO Nian-min   

  • Online:2018-12-01 Published:2018-12-01

Abstract: The multi-hop routing protocol is one of the key technologies in wireless sensor networks.The conventional multi-hop transmission protocols generate some problems in the actual application of wireless sensor networks,such as undue complexity of the deployment process.To solve these problems,we proposed a flexible and practical multi-hop routing protocol called SCMP (Sink Controlling Multi-hop Protocol),which is based on the sink nodes controlling.Sink nodes control sensor nodes by sending command packets to the whole topology,collect the routing information of each node to form the global route,and then control the data transmission of each node on the basis of the global information.We evaluated the SCMP by deploying it on the Sun SPOT platform.The results indicate that the new scheme is more flexible and practical,and has better system performance.

Key words: Wireless sensor networks,Multi-hops transmission,Sink nodes,Sun SPOT

[1] Dang D N M,Hong C S.A SINR-based transmission power control for MAC protocol in wireless ad hoc networks [C]∥Communications and Electronics (ICCE).2012:103-107
[2] Mobile Ad-hoc Networks (MANET)-Documents .[2012-5-22].http://datatracker.ietf.org/wg/manet
[3] Alturki R,Mehmood R.Multimedia Ad Hoc Networks:Per-formance Analysis,Computer Modeling and Simulation [C]∥Second UKSIM European Symposium(EMS’08).2008:561-566
[4] Manjunath M,Manjaiah D H.Spatial DSDV (S-DSDV) routing algorithm for mobile ad hoc network [C]∥2014 International Conference Contemporary Computing and Informatics (IC3I).2014:625-629
[5] Gambhir S, Fatima N.Op-LEACH: An Optimized LEACHMethod for Busty Traffic in WSNs [C]∥2014 Fourth International Conference Advanced Computing & Communication Technologies (ACCT).2014:222-229
[6] Nikodem J,Klempous R,Nikodem M,et al.Multi-hop and Di-rected Routing Based on Neighborhood Cooperation in WSN [C]∥Intelligent Engineering Systems (INES).2011:221-227
[7] Takahashi T,Asaka T.Autonomous Load Balancing by Mul-tipath Routing in Wireless Mesh Networks [C]∥2014 Second International Symposium Computing and Networking (CANDAR).2014:292-295
[8] Arebi P A.New Method for Restoration Broken Links in Wireless Ad-Hoc Networks by Estimation Energy Consumption [C]∥Computational Intelligence,Communication Systems and Networks (CICSN).2012:377-381
[9] Bian Qing,Zhang Yan,Zhao Yan-juan.Research on ClusteringRouting Algorithms in Wireless Sensor Networks [J].Computer Knowledge & Technology,2010(2):1110-1113
[10] SunSPOTWorld .[2012-5-22].http://www.sunspot-world.com
[11] Couto D S J,Aguayo D,Bicket J,et al.A High-Throughput Path Metric for Multi-Hop Wireless Routing [J].Wireless Networks,2003,1(4):419-434
[12] Amin R,Ashrafch S,Akhtar M B,et al.Analyzing performance of ad hoc network mobility models in a peer-to-peer network application over mobile ad hoc network [C]∥2010 International Conference Electronics and Information Engineering (ICEIE).2010,2:344-348

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
[1] LEI Li-hui and WANG Jing. Parallelization of LTL Model Checking Based on Possibility Measure[J]. Computer Science, 2018, 45(4): 71 -75, 88 .
[2] ZHANG Jia-nan and XIAO Ming-yu. Approximation Algorithm for Weighted Mixed Domination Problem[J]. Computer Science, 2018, 45(4): 83 -88 .
[3] WU Jian-hui, HUANG Zhong-xiang, LI Wu, WU Jian-hui, PENG Xin and ZHANG Sheng. Robustness Optimization of Sequence Decision in Urban Road Construction[J]. Computer Science, 2018, 45(4): 89 -93 .
[4] LIU Qin. Study on Data Quality Based on Constraint in Computer Forensics[J]. Computer Science, 2018, 45(4): 169 -172 .
[5] ZHONG Fei and YANG Bin. License Plate Detection Based on Principal Component Analysis Network[J]. Computer Science, 2018, 45(3): 268 -273 .
[6] ZHOU Yan-ping and YE Qiao-lin. L1-norm Distance Based Least Squares Twin Support Vector Machine[J]. Computer Science, 2018, 45(4): 100 -105, 130 .
[7] WANG Zhen-wu, LV Xiao-hua and HAN Xiao-hui. Survey of Terrain LOD Technology Based on Quadtree Segmentation[J]. Computer Science, 2018, 45(4): 34 -45 .
[8] WANG Shuai, LIU Juan, BI Yao-yao, CHEN Zhe, ZHENG Qun-hua and DUAN Hui-fang. Automatic Recognition of Breast Gland Based on Two-step Clustering and Random Forest[J]. Computer Science, 2018, 45(3): 247 -252 .
[9] YANG Yu-qi, ZHANG Guo-an and JIN Xi-long. Dual-cluster-head Routing Protocol Based on Vehicle Density in VANETs[J]. Computer Science, 2018, 45(4): 126 -130 .
[10] QU Zhong and ZHAO Cong-mei. Anti-occlusion Adaptive-scale Object Tracking Algorithm[J]. Computer Science, 2018, 45(4): 296 -300 .