Computer Science ›› 2019, Vol. 46 ›› Issue (11A): 363-368.

• Network & Communication • Previous Articles     Next Articles

New Method of Multi-path Reliable Transmission Based on Redundancy Strategy

ZHANG Ting, ZHANG De-gan, CUI Yu-ya, CHEN Lu, GE Hui   

  1. (Key Laboratory of Computer Vision and System Ministry of Education,Tianjin University of Technology,Tianjin 300384,China);
    (Tianjin Key Lab of Intelligent Computing & Novel Software Technology,Tianjin University of Technology,Tianjin 300384,China)
  • Online:2019-11-10 Published:2019-11-20

Abstract: In a wireless sensor network (WSN) with dense distribution,the data transmission process will generate a large number of conflicts,which will result in loss of transmission data and increase of transmission delay.The multi-path data transmission method can effectively reduce data loss and large transmission delay caused by collisions.The new method of redundant concurrent braided multi-path reliable transmission (RCB-MRT) was proposed in this paper.The method adopts the redundancy strategy.Firstly,it clusters the WSN,then sends the sensing data to the cluster nodes,and divides data packets that sensor nodes need to be transmitted into several sub-packages,and then forwards to the sink nodes in multi-path mode with concurrent weaving by intermediate nodes.After compared with the existing multi-path transmission methods,the experimental results show that the proposed multi-path reliable transmission method can effectively reduce data packet loss rate,reduce transmission delay and increase network lifetime,which is very useful for the application of reliable data transmission of WSN.

Key words: Concurrent weaving, Multi-path, Redundancy, Reliable transmission, WSN

CLC Number: 

  • TP393
[1]ATTIAH A,AMJAD M F,CHATTERJEE M.An evolutionary routing game for energy balance in Wireless Sensor Networks[J].Computer Networks,2018,138(19):31-43.
[2]LIU S.Dynamic Analysis For The Average Shortest PathLength of Mobile Ad Hoc Networks under Random Failure Scenarios[J].IEEE Access,2019,1.
[3]XIE K,WANG L L,WANG X.Low cost and high accuracy data gathering in WSNs with matrix completion[J].IEEE Trans.Mob.Computing,2018,17(7):1595-1608.
[4]SAGINBEKOV S.Many-to-many data aggregation scheduling in wireless sensor networks with two sinks[J].Computer Networks,2017,123(1):184-199.
[5]OLUWATOSIN A A,RAJA A J M.Impact of the energy-based and location-based LEACH secondary cluster aggregation on WSN lifetime[J].Wireless Networks,2018,24(5):1379-1402.
[6]TANG L,SUN Y,GUREWITZ O.PW-MAC:An energy-effi-cient predictive-wakeup MAC protocol for wireless sensor networks[J].Proceedings-IEEE INFOCOM,2011,34(17):1305- 1313.
[7]KRISHNA C R M,VISSA M.Energy efficient cluster basedrouting protocol for wireless sensor networks[J].International Conference on Control,Instrumentation,Communication and Computational Technologies.IEEE,2016,71(7):603-607.
[8]TANG Y M.Novel Reliable Routing Method for Engineering of Internet of Vehicles Based on Graph Theory[J].Engineering Computations,2019,36(1):226-247.
[9]TIAN Y,OU Y,KARIMI H R.Distributed multitarget probabilistic coverage control algorithm for wireless sensor networks[J].Mathematical Problems in Engineering,2014,2014(5):1-8.
[10]LIU S.Novel Dynamic Source Routing Protocol (DSR) Based on Genetic Algorithm-Bacterial Foraging Optimization (GA-BFO) [J].International Journal of Communication Systems,2018,31(18):1-20.
[11]SHILPA R,NEELESH B M.Energy harvesting WSNs for accurately estimating the maximum sensor reading:Trade-Offs and Optimal Design[J].IEEE Trans.Wireless Communications,2015,14(8):4562-4573.
[12]ANTONI M,ALEJANDRO C V,MARC B.Data aggregation and principal component analysis in WSNs[J].IEEE Trans Wireless Communications,2016,15(6):3908-3919.
[13]ZHOU Z B,DU C,SHU L.An energy-balanced heuristic for mobile sink scheduling in hybrid WSNs.IEEE Trans[J].Industrial Informatics,2016,12(1):28-40.
[14]BRUNO F M,MANUEL R.Energy-efficient node selection in application-driven WSN[J].Wireless Networks,2017,23(3):889-918.
[15]HU Y,NIU Y G.An energy-efficient overlapping clusteringprotocol in WSNs[J].Wireless Networks,2018,24(5):1775-1791.
[16]QIU C X,SHEN H Y,CHEN G.An energy-efficient and distributed cooperation mechanism for k-coverage hole detection and healing in WSNs[J].IEEE Trans.Mob.Computing,2018,17(6):1247-1259.
[17]MAHMOOD M A,SEAH W K G,WELCH I.Reliability inwireless sensor networks:A survey and challenges ahead[J].ComputerNetworks,2015,2015(79):166-187.
[18]CHEN C.New Method of Energy Efficient Subcarrier Allocation Based on Evolutionary Game Theory[J].Mobile Networks and Applications,2018,9.
[19]ZHANG T.Novel Self-Adaptive Routing Service Algorithm for Application of VANET[J].Applied Intelligence,2018,11.
[20]GAO J X.Novel Approach of Distributed & Adaptive TrustMetrics for MANET[J].Wireless Networks,2019,1.DOI:10.1007/s11276-019-01955-2.
[21]ZHANG D G,ZHANG T.Novel Optimized Link State Routing Protocol Based on Quantum Genetic Strategy for Mobile Lear-ning[J].Journal of Network and Computer Applications,2018,2018(122):37-49.
[22]ZHANG D G,GE H,ZHANG T.New Multi-hop Clustering Algorithm for Vehicular Ad Hoc Networks[J].IEEE Transactions on Intelligent Transportation Systems,2019,20(4):1517-1530.
[23]BARATI A,MOVAGHAR A,SABAEI M.RDTP:reliable data transport protocol in wireless sensor networks[J].Telecommunication Systems,2016,62(3):611-623.
[24]ROSSET,VALÉRIO,PAULO M A.Enhancing the reliabilityon data delivery and energy efficiency by combining swarm intelligence and community detection in large-scale WSNs[J].Expert Systems with Applications,2017(78):89-102.
[25]ZHANG T.A Kind of Effective Data Aggregating MethodBased on Compressive Sensing for Wireless Sensor Network[J].EURASIP Journal on Wireless Communications and Networking,2018,2018(159):1-15.
[26]KUMAR A,VERTICALE G.Fault Recovery in Time-Synchronized Mission Critical ZigBee-Based Wireless Sensor Networks[J].International Journal of Wireless Information Networks,2017,24(3):268-277.
[27]ZHANG D G,LI G.An energy-balanced routing method based on forward-aware factor for Wireless Sensor Network[J].IEEE Transactions on Industrial Informatics,2014,10(1):766-773.
[28]ZHOU S,TANG Y M.A low duty cycle efficient MAC protocol based on self-adaption and predictive strategy[J].Mobile Networks and Applications,2018,23(4):828-839.
[29]MORELL A,VILA A C,BARCELO M.Data Aggregation and Principal Component Analysis in WSNs[J].IEEE Trans.Wireless Communications,2016,15(6):3908-3919.
[30]ZHANG D G.A Novel Approach to Mapped Correlation of ID for RFID Anti-collision[J].IEEE Transactions on Services Computing,2014,7(4):741-748.
[31]LIU S,ZHANG T.Novel Unequal Clustering Routing Protocol Considering Energy Balancing Based on Network Partition & Distance for Mobile Education[J].Journal of Network and Computer Applications,2017,88(15):1-9.
[1] LIN Li-xiang, LIU Xu-dong, LIU Shao-teng, XU Yue-dong. Survey on the Application of Forward Error Correction Coding in Network Transmission Protocols [J]. Computer Science, 2022, 49(2): 292-303.
[2] XIE Chen-qi, ZHANG Bao-wen, YI Ping. Survey on Artificial Intelligence Model Watermarking [J]. Computer Science, 2021, 48(7): 9-16.
[3] HONG Chang-jian, GAO Yang, ZHANG Fan, ZHANG Lei. Reliable Transmission Strategy for Underwater Wireless Sensor Networks [J]. Computer Science, 2021, 48(6A): 410-413.
[4] HAN Lei, HU Jian-peng. Deduplication Algorithm of Abstract Syntax Tree in GCC Based on Trie Tree of Keywords [J]. Computer Science, 2020, 47(9): 47-51.
[5] ZHANG Jie, LIANG Jun-bin, JIANG Chan. Research Progress on Key Technologies of Data Storage Based on Wireless Sensor Networks inWide-Area Complex Fluid Systems [J]. Computer Science, 2020, 47(5): 242-249.
[6] WANG Rui-jie, LI Jun-huai, WANG Kan, WANG Huai-jun, SHANG Xun-chao, TU Peng-jia. Feature Selection Method for Behavior Recognition Based on Improved Feature Subset Discrimination [J]. Computer Science, 2020, 47(11A): 204-208.
[7] Cheng-biao,DING Hong-wei,DONG Fa-zhi,YANG Zhi-jun, BAO Li-yong. Low-delay and Low-power WSN Clustering Algorithm Based on LEACH XIONG [J]. Computer Science, 2020, 47(1): 258-264.
[8] LIU Meng-jun, SHA Tao, LI Dan, LIU Shu-bo. Reliable Security Lock Key Updating Scheme over Narrow Band Internet of Things [J]. Computer Science, 2019, 46(4): 137-143.
[9] WANG Jun, ZHU Zhi-wei, LIU Jun-jie. Detection and Defense Method for Blackhole Attacks in Wireless Sensor Networks [J]. Computer Science, 2019, 46(2): 102-108.
[10] WANG Wei, YANG Ben-chao, LI Guang-song, SI Xue-ming. Security Analysis of Heterogeneous Redundant Systems [J]. Computer Science, 2018, 45(9): 183-186.
[11] CHEN Fu-cai, LI Si-hao, ZHANG Jian-peng, HUANG Rui-yang. Multi-label Feature Selection Algorithm Based on Improved Label Correlation [J]. Computer Science, 2018, 45(6): 228-234.
[12] WU Wei-nan, LIU Jian-ming. Dynamic Retransmission Algorithm inLow-power Wireless Sensor Networks [J]. Computer Science, 2018, 45(6): 96-99.
[13] QU Zhi-guo, TAN Xian-si, LI Zhi-huai, WANG Hong and LIN Qiang. Adaptive Moving Wide Line Detection Algorithm [J]. Computer Science, 2018, 45(3): 277-282.
[14] NI Ying-bo, CHEN Yuan-yan, YE Juan, WANG Ming. Improvement of DV-Hop Algorithm Based on Multiple Communication Radii and Cosine Theorem [J]. Computer Science, 2018, 45(11A): 320-324.
[15] GE Bin, DAI Chen, JI Jie-qu and WU Bo. Grouping-based Wireless Sensor Network Multi-rounds Clustering Routing Algorithm [J]. Computer Science, 2017, 44(Z6): 305-308.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!