• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Peng Kang, Zhao Ze, Chen Haiming, Li Dong, Shi Hailong, Cui Li. EasiARS: Dynamic WiFi Link Access and Adaptive Networking Based on Multi-Mode Communication in Wireless Sensor Networks[J]. Journal of Computer Research and Development, 2015, 52(12): 2736-2749. DOI: 10.7544/issn1000-1239.2015.20140667
Citation: Peng Kang, Zhao Ze, Chen Haiming, Li Dong, Shi Hailong, Cui Li. EasiARS: Dynamic WiFi Link Access and Adaptive Networking Based on Multi-Mode Communication in Wireless Sensor Networks[J]. Journal of Computer Research and Development, 2015, 52(12): 2736-2749. DOI: 10.7544/issn1000-1239.2015.20140667

EasiARS: Dynamic WiFi Link Access and Adaptive Networking Based on Multi-Mode Communication in Wireless Sensor Networks

More Information
  • Published Date: November 30, 2015
  • In some wireless sensor networks(WSNs) applications, gateway nodes use WiFi to access upper layer network. However, due to the instability of wireless link quality, it has a lot of work to find a stable and reliable gateway disposition by using fixed gateways in traditional WSNs structure. In this paper, we propose a novel method for dynamic WiFi link access and adaptive networking called EasiARS, which is applicable to the scenarios where WiFi link quality is instable and all devices including gateways and nodes are energy constrained. EasiARS is based on WiFi and ZigBee multi-mode communication. It contains a low-overhead real-time WiFi coverage detection method, a roles switching method and a clustering and neworking method in WiFi coverage area. EasiARS makes it feasible to rapidly deploy WSNs systems in dynamic WiFi link environment. While system is working, nodes adjust their roles and transmission strategy according to the WiFi link quality, which ensures WSNs upload data stably and balance the energy consumption in WiFi coverage area. Experiments verify that, EasiARS achieves the purpose that nodes can switch to suitable roles and transmit stably in dynamic WiFi link environment. Compared with single fixed gateway method, EasiARS leads to a reduction up to 90% in packet loss rate under different WiFi link quality, and an improvement of 67% in network lifetime compared with fixed multi-gateway method, meanwhile reduces the burden of WiFi link quality testing and evaluation before deployment.
  • Related Articles

    [1]Xiong Xin, Tan Xin, Zhang Yuan. Kernel Refcount Bug Detection Based on the Consistency of Error Path Behavior[J]. Journal of Computer Research and Development, 2023, 60(7): 1489-1500. DOI: 10.7544/issn1000-1239.202220768
    [2]Zhao Xiaolei, Chen Zhaoyun, Shi Yang, Wen Mei, Zhang Chunyuan. Kernel Code Automatic Generation Framework on FT-Matrix[J]. Journal of Computer Research and Development, 2023, 60(6): 1232-1245. DOI: 10.7544/issn1000-1239.202330058
    [3]Hou Pengpeng, Zhang Heng, Wu Yanjun, Yu Jiageng, Tai Yang, Miao Yuxia. Kernel Configuration Infographic Based on Multi-Label and Its Application[J]. Journal of Computer Research and Development, 2021, 58(3): 651-667. DOI: 10.7544/issn1000-1239.2021.20200186
    [4]Yang Hongzhang, Yang Yahui, Tu Yaofeng, Sun Guangyu, Wu Zhonghai. Proactive Fault Tolerance Based on “Collection—Prediction—Migration—Feedback” Mechanism[J]. Journal of Computer Research and Development, 2020, 57(2): 306-317. DOI: 10.7544/issn1000-1239.2020.20190549
    [5]Zhang Liancheng, Wei Qiang, Tang Xiucun, Fang Jiabao. Path and Port Address Hopping Based SDN Proactive Defense Technology[J]. Journal of Computer Research and Development, 2017, 54(12): 2761-2771. DOI: 10.7544/issn1000-1239.2017.20160461
    [6]Yang Bo, Feng Dengguo, Qin Yu, Zhang Qianying, Xi Li, Zheng Changwen. Research on Direct Anonymous Attestation Scheme Based on Trusted Mobile Platform[J]. Journal of Computer Research and Development, 2014, 51(7): 1436-1445.
    [7]Tan Liang, Meng Weiming, Zhou Mingtian. An Improved Direct Anonymous Attestation Scheme[J]. Journal of Computer Research and Development, 2014, 51(2): 334-343.
    [8]Wang Yong, Fang Juan, Ren Xingtian, and Lin Li. Formal Verification of TCG Remote Attestation Protocols Based on Process Algebra[J]. Journal of Computer Research and Development, 2013, 50(2): 325-331.
    [9]Wang Qi'an and Chen Bing. Intrusion Detection System Using CVM Algorithm with Extensive Kernel Methods[J]. Journal of Computer Research and Development, 2012, 49(5): 974-982.
    [10]Huang Wei, Zhan Jianfeng, Fan Jianpin. DCFT-Kernel: A Fault-Tolerant Cluster Middleware Based on Group Service[J]. Journal of Computer Research and Development, 2005, 42(6): 993-999.

Catalog

    Article views (1135) PDF downloads (500) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return