期刊文献+

基于存储阈值的蛇形时隙数据存储算法 被引量:8

Snake-like Slot Time Data Storage Algorithm Based on Storage Threshold
下载PDF
导出
摘要 当无线传感监测网中事件分布不均匀时,使用以数据为中心的存储算法会出现热点现象。为此,引入存储阈值与时间优先级,选择存储节点时考虑节点剩余存储空间,提出一种新的蛇形时隙数据存储算法。根据事件优先级确定事件存储位置到查询节点网格的距离,减少数据存储和查询过程中的能量消耗。通过定义节点存储阈值确定是否进入下一轮时隙分配。当网格内节点都达到存储阈值时,将数据存储于其他同一优先级的邻居网格内。当同一优先级的所有网格内节点都达到某一存储阈值时,重新分配工作时隙,以解决节点能量分布不均的问题。仿真结果表明,该算法在节点剩余能量和网络生命周期方面性能均优于基于事件优先级的蛇形时隙存储算法。 When events distribute nonuniformly in the wireless sensor monitoring network, hot spots will appear in data- centric storage algorithms. Aiming at this problem,this paper introduces storage thresholds and event priorities,considers nodes' remaining memory when selecting storage nodes, and proposes a new snake-like slot time data storage algorithm. It determines the distance from event storage location to query node grid according to the event priority,to reduce node' s energy consumption in process of data storage and query. Defining a node storage threshold,nodes reaching the threshold are no longer involved in the next round of time slot allocation. When all nodes in a grid reach the storage threshold, it stores data into neighbor grids with the same priority level. When all nodes in all grids of the same priority reach one storage threshold,it reallocates work slot, which effectively reduces the nonuniform distribution. Simulation results show that the proposed algorithm has better performance than the Snake-like Slot Time Power-saving Data Stroage Algorithm based on Event Priority(P-SLPS) in residual energy of nodes and the network life cycle.
出处 《计算机工程》 CAS CSCD 北大核心 2016年第12期32-38,共7页 Computer Engineering
基金 国家自然科学基金(61372011)
关键词 无线传感器网络 事件类型 数据存储 存储阈值 事件优先级 Wireless Sensor Network(WSN) event type data storage storage threshold event priority
  • 相关文献

参考文献5

二级参考文献28

  • 1韩鸿泉,朱红松,孟军.无线传感器网络技术[J].计算机系统应用,2005,14(2):38-41. 被引量:29
  • 2郭龙江,李建中,李贵林.无线传感器网络环境下时-空查询处理方法[J].软件学报,2006,17(4):794-805. 被引量:29
  • 3Yao Yong, Gehrke J. The Cougar Approach to In-network Query Processing in Sensor Networks[J]. SIGMOD Record, 2002, 31(3): 9-18. 被引量:1
  • 4Madden S R, Franklin M J. Fjording the Stream, An Architecture for Queries over Streaming Sensor Data[C]//Proceedings of the ICDE Conference. Los Alamitos, USA: [s. n.], 2002. 被引量:1
  • 5Ratnasamy S, Karp B, Yin Li, et al. GHT: A Geographic Hash Table for Data-centric Storage in Sensornets[C]//Proc. of the 1st ACM Intemational Workshop on Wireless Sensor Networks and Applications. Atlanta, Georgia, USA: ACM Press, 2002. 被引量:1
  • 6S. Yi, P. Naldurg, R. Kravets. Security-aware ad hoc muting for wireless networks[C]. Proc. of 2001 ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2001, pp. 299- 302. 被引量:1
  • 7Edoardo Biagioni and Galen Sasaki. Wireless sensor placement for reliable and ef_cient data collection.In Proceedings of the Hawaiii Intemational Conference on Systems Sciences, January 2003. 被引量:1
  • 8Swades De. Chunming Qiao, Hongyi Wu. Meshed multipath routing with selective forwarding:an efficient strategy in wireless sensor networks[ M]. 被引量:1
  • 9Ning Xu. A Survey of Sensor Network Applications. 被引量:1
  • 10Perrig, R. Szewczyk, V. Wen, D. Culler, J.D. Tygar. SPINS: security protocols for sensor networks[J]. Wireless Networks 8 (2002) 521 - 534. 被引量:1

共引文献38

同被引文献63

引证文献8

二级引证文献55

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部