ImageVerifierCode 换一换
格式:DOC , 页数:12 ,大小:128KB ,
资源ID:1709171      下载积分:12 文钱
快捷下载
登录下载
邮箱/手机:
温馨提示:
快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。 如填写123,账号就是123,密码也是123。
特别说明:
请自助下载,系统不会自动发送文件的哦; 如果您已付费,想二次下载,请登录后访问:我的下载记录
支付方式: 支付宝    微信支付   
验证码:   换一换

加入VIP,省得不是一点点
 

温馨提示:由于个人手机设置不同,如果发现不能下载,请复制以下地址【https://www.wenke99.com/d-1709171.html】到电脑端继续下载(重复下载不扣费)。

已注册用户请登录:
账号:
密码:
验证码:   换一换
  忘记密码?
三方登录: QQ登录   微博登录 

下载须知

1: 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。
2: 试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。
3: 文件的所有权益归上传用户所有。
4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
5. 本站仅提供交流平台,并不能对任何下载内容负责。
6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

版权提示 | 免责声明

本文(Design and implementation of wireless sensor network data transfer protocol.doc)为本站会员(gs****r)主动上传,文客久久仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知文客久久(发送邮件至hr@wenke99.com或直接QQ联系客服),我们立即给予删除!

Design and implementation of wireless sensor network data transfer protocol.doc

1、1Design and implementation of wireless sensor network data transfer protocolAbstract: This paper discussed the problem of wireless sensor network data transmission protocols, and combined with the characteristics of WSN and the actual needs, the design and implementation of a data transmission prior

2、ity queue and priority transmission scheme of ACK, provide an end-to-end transmission for the important information, and achieve the timely, reliable transmission of control information. Keywords: WSN ; Reliable transmission; Priority queue;Data transfer protocol 1 Introductions wireless sensor netw

3、orks (WSN) as a new information acquisition and processing mode, to build a bridge of information space and physical space, which are widely used in national defense, national security, environmental monitoring, traffic management, health care, manufacturing, anti-terrorism disaster other fields. WS

4、N is essentially a special kind of self-organization network, with the following characteristics: 1) network 2size, high node density; 2) node energy, computing and storage capacity strictly limited; 3) the nodes prone to failure , network topology changes frequently; 4) node has no unified identity

5、; 5) the general location of the node deployment does not change on the one hand, relying on battery-powered sensor nodes and usually work in unattended environments, very difficult to replenish their energy Therefore, energy optimization throughout all levels to communicate, work patterns, task coo

6、rdination, data management, etc.; the other hand, wireless sensor networks are designed for specific applications, different applications have different expectations of quality of service requirements, network design should first consider the quality of service applications. Meanwhile, the sensing d

7、ata collected by the sensor node have a strong correlation, this correlation may exist such that the data redundancy in the time and space, reduce this redundant design of wireless sensor networks become considered a priority. Articles designed and implemented a practical and reliable data transfer

8、protocol, to achieve the priority transmission intelligent building energy wireless sensor network information to ensure the stability of energy-saving systems, reliable and 3efficient operation. 2 Routing protocol for Wireless Sensor Networks 2.1 LEACH low-energy adaptive clustering hierarchy (LEAC

9、H) is a kind of adaptive clustering routing algorithm, the algorithm put forward a model 4 low power continuous operation. The LEACH protocol can be divided into 2 stages, namely initial stage and completed stage. In order to minimize energy consumption, ready phase lasts longer than the initializat

10、ion phase length. The sum of the initialization phase and ready phase duration is called a wheel in the initialization phase, the LEACH protocol randomly select a sensor node as a cluster head nodes, random to ensure that the cost of high energy consumption data transmission between cluster head and

11、 base station evenly spread to all sensor nodes. Method for selecting specific for, a value between a sensor node randomly selects 01, if the selected value is less than a threshold T (n) , then the nodes become cluster head nodes. T (n) value according to formula (1) calculation: Wherein, N: the to

12、tal number of sensor nodes in the network; k: in the first round of the network nodes in the class; r: number of rounds has been completed; G: In the remaining N/kr wheel does not 4become a sensor head node class consisting of a collection of nodes. After the class header node is selected, once clus

13、ter head node is selected, will take the initiative to broadcast to all nodes in the network, according to the strength of the received broadcast signal nodes choose their classes to join and send a message to inform the appropriate poly class header. After class formation, cluster head distribution

14、 channel using time division multiplexing approach to the right to use the class node. In the ready stage, cluster head start accepting data collected within the class of each node, then using data fusion and data compression technologies converge, will integrate the data transmission to the base st

15、ation or sink node. Ready phase lasts for some time, the duty cycle of the network into the next round, re-select the cluster head. 2.2 SPIN Sensor Protocol for Information via Negotiation (SPIN) is a data-centric communication adaptive routing protocol. SPIN protocol goals is through negotiation sy

16、stem and resource use adaptive mechanisms between nodes , the explosion of information exists to solve the classic problem of overlap and diffusion method , the sensor nodes transmit data to consult 5each other before sending the description of sensor data attributes, instead of transmitting all the

17、 data ( such as images ) to conserve energy. SPIN has three packet types , namely ADV, RED and DATA. ADV new data for broadcasting , when a node has data to share when it is available ADV packet (including metadata ) outside broadcasting ; REQ to request data , when a node wishes to receive the DATA

18、 packet , the packet transmission REQ ; DATA contains attach metadata header (Meta-Data Header) packet capture sensor data . DATA before sending a packet , a sensor node first outside broadcast ADV packet ; If a neighbor node after receiving ADV willingness to receive the DATA packet , the node send

19、s a REQ to the packet , then the node again neighbor node sends dATA packets. Similarly proceed , DATA packets can be transmitted to a remote sink node or base station. 2. 3 Directed Diffusion Directed Diffusion is a data-centric routing protocol, sink node sends its flags to all sensor nodes, i.e.,

20、 by assigning different values ?to indicate different task attribute descriptors, each sensor node after receiving the flag stored in the respective buffer. Each entry contains a 6time stamp flag field and several gradient domain, ie the ability to minimize costs and adaptive principles to guide the

21、 direction of data proliferation. When a flag is spread throughout the network, from the source node (ie, Hobbies sensor nodes in your area) to the gradient between the sink node is set up, shown in Figure 1. 3 Design and implementation of a reliable transport Send data: if the data needs to be sent

22、, first put it into the send queue queuing polling, then its assembly header, and then send them via MAC layer processing. Removed from the queue after sending data to its next hop node receives ACK returned, thus completing the first transmission of the packet. Receive data: When a node receives a

23、pass up the underlying data, according to the type of packet processing functions into different, if a node receives a packet is a common Data package, the data in the receive queue, and then handed over to the appropriate with layers for processing, depending on the choice of local processing or fo

24、rwarding destination. Retransmission of the data: In the conventional IEEE 802.15.4 protocol, the transmission data packet to the next 7hop of the next hop needs to reply ACK, ACK is not received when the timeout data retransmission is performed, the maximum number is 3.if 3 retransmissions fail, di

25、scarded packets. Thus, the conventional transmission protocol packet is not classified, considering only a single transmission queue. In addition, the node hop provides up to three times the retransmission can not be guaranteed accurate transmission of critical information packet. Therefore, the nee

26、d to improve the agreement, the priority of the packet classification, use the priority queue management thinking, while providing end-to-critical information package guarantees to meet the application requirements of wireless sensor networks building energy systems for data transmission. 3.1 Priori

27、ty queue transmission According to the three kinds of data type, the data is divided into three priority, High Priority (HP) , MiddlePriority (MP) , Low Priority (LP). Each node has high, low, three priority FIFO queue, denoted as HP, MP, LP, and with same length buffer, each queue according to the

28、distribution of different importance to different weights. When a packet arrives, first should be filtered through a packet classifier, are prioritized according to the different types, 8and then was added to different queue tail. Priority from the column as shown in figure 2. For any priority queue

29、, when the queue length L exceeds a threshold of THR, not immediately start the congestion indication bit C, but with probability P position, then the network is congested or slight congestion; when the threshold L exceeds the set of thr, show that the network has serious congestion, as soon as poss

30、ible in order to ease congestion, packets are discarded strategy must be. Queue scheduling to access the channel, from high to low priority order of priority scheduling, ensure the high priority data. At the same time in order to protect high priority information transmission channel, the informatio

31、n given high priority access channel, priority, the information transmission with fewer backoff delay. 3.2 Priority ACK mechanism In the IEEE 802.15.4 standard, each of the MAC data frame will require the recipient replies to ACK frame, ACK frame transmission of will in the network cause energy wast

32、e. Therefore, the need for IEEE 802.15.4MAC protocol ACK mechanism to improve. When the network is stable, the common data periodic is composed of a wireless sensor network to the outside world 9report, this information is often a certain redundancy. For example, the wireless sensor network in an ho

33、ur or even a longer period of time temperature data collection, indoor light intensity data, a small amount of packet loss not have a great impact on the whole system. At the same time, in the absence of such interference, wireless link state good, general data transmission success rate is very high

34、, does not need each dive has a ACK confirmation reply. Therefore, to confirm the data packet using the following strategy: (1) low priority packets: no ACK verification; (2): priority packets hop by hop ACK confirmation; (3) a high priority packet: hop by hop ACK confirmation and end-to-end ACK con

35、firmation. For the high priority packets, if confirmed information from the destination is not received in a certain period of time, then start retransmission mechanism. 4 The actual test design and test environment Node uses ATmega128 as a processor, RF chip adopts CC2420 chip, power supply module

36、using 9 V DC voltage power supply or battery powered directly by 3.3V. Verification system as shown in figure 3. The circular nodes (such as 7011) is a common node, triangle nodes (such as 1951) as relay nodes, a node 10(8919) for the gateway node. The common node in the collection of each room temp

37、erature and humidity, light intensity sensing information, through a relay node in a multi hop way to send data to the gateway node, protocol conversion gateway node transmits data to the server and stored in a local database. On the server side, the user can send the user management end of the grap

38、hical interface command, sent through the network joint point for ordinary nodes, can change the ordinary node configuration, access node information and other functions. Send the test data packets as shown in Figure 4, the top 4 is the adapter, converted to binary for the top 16, including No.12 an

39、d No.13 indicate priority packet. HP=“11“, MP = “01“, LP= “00“, corresponding to the chart is “18“, “08“, “00“. Figure 5 is results of the packet loss rate test, the use of end acknowledgment mechanism can ensure reliable transmission of high priority data; while allowing the packet loss priority and low priority data is lower than the conventional data transmission protocol; when hops 6, due to the complexity of the actual application environment, network performance is not stable, increase the packet loss rate of data transmission significantly. Therefore, the proposed

Copyright © 2018-2021 Wenke99.com All rights reserved

工信部备案号浙ICP备20026746号-2  

公安局备案号:浙公网安备33038302330469号

本站为C2C交文档易平台,即用户上传的文档直接卖给下载用户,本站只是网络服务中间平台,所有原创文档下载所得归上传人所有,若您发现上传作品侵犯了您的权利,请立刻联系网站客服并提供证据,平台将在3个工作日内予以改正。