Unlock instant, AI-driven research and patent intelligence for your innovation.

WSN multi-path hole bypassing method

A multi-path and path technology, applied in transmission systems, wireless communications, energy reduction and other directions, can solve the problems of blind hole avoidance, unsolved, easy to form routing holes, etc., and achieve the effect of avoiding the expansion of holes

Inactive Publication Date: 2019-07-05
陶建林
View PDF0 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

With the continuous advancement of wireless sensor network technology and requirements, scholars have proposed many effective routing protocols to meet the needs of different application scenarios, and have achieved good results. Energy consumption and energy consumption load balancing, but the Multipoint-to-Point communication mechanism in the sensor network makes the sensor nodes in the network closer to the Sink, the faster the energy consumption, it is easy to form routing holes, and it may also be due to node deployment problems There are natural routing holes
[0004] At present, although a large number of studies have considered the problem of "holes" in the network, unreasonable designs may easily lead to high energy consumption in data detour transmission or expansion of "holes". For example: 1) Some people proposed the TENT rule and the BOUNDHOLE algorithm, The TENT criterion is used to identify the "stuck points" encountered when using the greedy forwarding algorithm in the network topology, and the BOUNDHOLE algorithm is used to determine the minimum boundary of the routing hole, but it does not solve how to complete the hole bypass in the case of load balancing
2) In part, a Greedy Perimeter Stateless Routing (Greedy Perimeter Stateless Routing) algorithm is proposed. This strategy combines greedy forwarding and edge forwarding algorithms on a planar graph. Data packets are routed using the greedy forwarding protocol in the initial state. When encountering When routing holes (local minimum phenomenon), the right-hand rule is used to bypass holes counterclockwise, but this method will cause blind hole avoidance and triangular routing problems
3) Based on the GPSR algorithm, the triangular routing phenomenon and blind hole avoidance phenomenon in the GPSR algorithm are solved. Tang Guoming et al. proposed a method based on perceiving hole boundary node information, mapping it to a virtual coordinate system, and then defining the shape of the hole according to the coordinate distribution. The EMGR algorithm adopts the segmented greedy routing transmission mode to forward around the hole, but these methods do not take into account the energy balance of nodes on the path around the hole, which will lead to the phenomenon of hole diffusion
However, a large number of studies mentioned above lack the consideration of energy balance in the process of hole bypassing.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • WSN multi-path hole bypassing method
  • WSN multi-path hole bypassing method
  • WSN multi-path hole bypassing method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0030] A WSN multi-path hole bypass method provided by the present invention,

[0031] Specifically include the following steps:

[0032] S1. Evenly deploy the sensor nodes in a rectangular area whose length and width are both R;

[0033] S2. Then use the convex hull to model the shape of the routing hole. The specific steps are as follows:

[0034] ① if figure 1 As shown, first complete the detection of path hole edge nodes, and then define a minimum convex hull that can cover the hole area. When a node in the WSN needs to send data, the network forwards the data packet according to the geographical location greedy forwarding strategy to achieve Destination point D;

[0035]②When the data arrives at a node that cannot find the next hop data forwarding, that is, the "stuck point", use the node V ini (1) represents the first stuck point, at this time the node V ini (1) The hole edge detection data packet will be sent clockwise and counterclockwise to the edge closest to th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a WSN multi-path hole bypassing method. The method specifically comprises the following steps that S1, evenly deploying sensor nodes in a rectangular area with the length and the width being R; s2, modeling the shape of the routing hole by using a convex hull; s3, defining the length of a path and determining the number of paths needing to be constructed; s4, judging whether the data arrives or not; finally completing of path selection. After a node Vint (K) calculates a path load reduction effect, the node Vint (K) sends a convex hull information data packet to a Vcw (k) and a Vccw (k), the two nodes send the path anticlockwise and clockwise to establish a data packet to a nearest convex hull vertex, and so on, and a greedy boundary stateless routing algorithm is used in the forwarding process. According to the method, firstly, the convex hull is constructed to effectively avoid the hole, and then the energy load balance is realized by constructing a pluralityof paths, so that the expansion of the hole is avoided.

Description

technical field [0001] The invention relates to the technical field of wireless communication networks, in particular to a WSN multipath hole bypass method. Background technique [0002] WSN is the abbreviation of wireless sensor network. The Chinese name is: wireless sensor network. It is composed of many sensor nodes and forms a multi-hop self-organizing network through wireless communication. However, in the process of data collection and transmission of sensor nodes, the burden of some nodes is too heavy, which may easily lead to the early exhaustion of node energy and the occurrence of network holes. [0003] Routing algorithm has always been one of the important research topics in wireless sensor networks. With the continuous advancement of wireless sensor network technology and requirements, scholars have proposed many effective routing protocols to meet the needs of different application scenarios, and have achieved good results. Energy consumption and energy consu...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04W40/10H04W40/20H04L12/703H04L12/709H04W40/22H04L45/243H04L45/28
CPCH04W40/10H04W40/20H04L45/24H04L45/28H04W40/22Y02D30/70
Inventor 陶建林
Owner 陶建林