• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Liu Anfeng, Xu Juan, Chen Zhigang. A TDMA Scheduling Algorithm to Balance Energy Consumption in WSNs[J]. Journal of Computer Research and Development, 2010, 47(2): 245-254.
Citation: Liu Anfeng, Xu Juan, Chen Zhigang. A TDMA Scheduling Algorithm to Balance Energy Consumption in WSNs[J]. Journal of Computer Research and Development, 2010, 47(2): 245-254.

A TDMA Scheduling Algorithm to Balance Energy Consumption in WSNs

More Information
  • Published Date: February 14, 2010
  • Sensor nodes in wireless sensor networks are constrained by battery power. And the sensor nodes sense a specific phenomenon in the environment and route the sensed data to a relatively small number of central data processing nodes, called sinks. So there exists imbalance in energy consumption in essence. In this paper, the authors are not only interested in determining a TDMA schedule that minimizes the total time required to complete the convergecast, but also consider a TDMA scheduling algorithm can which balance load to prolong network lifetime. They consider a simple version of the problem in which every node generates exactly one packet, and the node has multi-transmission power levels which can vary according to its transmission distance. The formula of energy consumption are analyzed for the general k-hop network in theory according to the typical network parameters. It is proved that there exits a best k that makes the network lifetime the longest. A TDMA scheduling algorithm is proposed for general k-hop network, and the upper bound of time slot required in general k-hop network is given as follows. Based on the analysis, the entire network scheduling strategy can be obtained for general k-hop network. Theoretical analysis and numerical simulation results confirm the accuracy and effectiveness of the algorithms.
  • Related Articles

    [1]Wu Jinjin, Liu Quan, Chen Song, Yan Yan. Averaged Weighted Double Deep Q-Network[J]. Journal of Computer Research and Development, 2020, 57(3): 576-589. DOI: 10.7544/issn1000-1239.2020.20190159
    [2]Zhu Fei, Wu Wen, Liu Quan, Fu Yuchen. A Deep Q-Network Method Based on Upper Confidence Bound Experience Sampling[J]. Journal of Computer Research and Development, 2018, 55(8): 1694-1705. DOI: 10.7544/issn1000-1239.2018.20180148
    [3]Yang Yatao, Zhang Yaze, Li Zichen, Zhang Fengjuan, Liu Boya. RAKA: New Authenticated Key Agreement Protocol Based on Ring-LWE[J]. Journal of Computer Research and Development, 2017, 54(10): 2187-2192. DOI: 10.7544/issn1000-1239.2017.20170477
    [4]Chen Junyu, Zhou Gang, Nan Yu, Zeng Qi. Semi-Supervised Local Expansion Method for Overlapping Community Detection[J]. Journal of Computer Research and Development, 2016, 53(6): 1376-1388. DOI: 10.7544/issn1000-1239.2016.20148339
    [5]He Xianmang, Chen Yindong, Li Dong, Hao Yanni. Study on Semi-Homogenous Algorithm Based on Ring Generalization[J]. Journal of Computer Research and Development, 2015, 52(10): 2382-2394. DOI: 10.7544/issn1000-1239.2015.20150494
    [6]Yang Shilai, Yang Yahui, Shen Qingni, and Huang Haizhen. A Method of Intrusion Detection Based on Semi-Supervised GHSOM[J]. Journal of Computer Research and Development, 2013, 50(11): 2375-2382.
    [7]Li Yufeng, Huang Shengjun, and Zhou Zhihua. Regularized Semi-Supervised Multi-Label Learning[J]. Journal of Computer Research and Development, 2012, 49(6): 1272-1278.
    [8]Liu Tao, He Yanxiang, Xiong Qi. A Q-Learning Based Real-Time Mitigating Mechanism against LDoS Attack and Its Modeling and Simulation with CPN[J]. Journal of Computer Research and Development, 2011, 48(3): 432-439.
    [9]Chen Shaozhen, Wang Wenqiang, Peng Shujuan. Efficient AttributeBased Ring Signature Schemes[J]. Journal of Computer Research and Development, 2010, 47(12).
    [10]Yang Jian, Wang Jue, Zhong Ning. Laplacian Semi-Supervised Regression on a Manifold[J]. Journal of Computer Research and Development, 2007, 44(7): 1121-1127.

Catalog

    Article views (919) PDF downloads (539) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return