• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Li Zhigang, Xiao Nong, and Chu Fuyong. A Bouncing-Track Based Data Storage and Discovery Scheme in Large-Scale Sensor Networks[J]. Journal of Computer Research and Development, 2010, 47(11): 1911-1918.
Citation: Li Zhigang, Xiao Nong, and Chu Fuyong. A Bouncing-Track Based Data Storage and Discovery Scheme in Large-Scale Sensor Networks[J]. Journal of Computer Research and Development, 2010, 47(11): 1911-1918.

A Bouncing-Track Based Data Storage and Discovery Scheme in Large-Scale Sensor Networks

More Information
  • Published Date: November 14, 2010
  • In a large scale wireless sensor network, all nodes comprise a peer-to-peer network in the case that the sink node does not exist. Any node has probability to become a data consumer node or data producer node. Sensor network is a kind of Ad-hoc network, meanwhile the energy and computation of an individual sensor node is limited, so complicated protocol design cannot be supported. How to make every random generated consumer node and producer node discover each other and search the useful data is a big research challenge in sensor networks. In this paper we propose a bouncing track based data storage and discovery scheme to solve this problem. It is a data-centric storage approach, which needs the consumer nodes and producer nodes to disseminate their queries or data along their relevant bouncing track. This scheme need not an individual node to keep global information of the whole network. Each node determines how to forward their data only using local information and a predefined reflection angle value. In theory, any two bouncing tracks intersect with each other, which guarantees successful data retrieval. This scheme can also satisfy hop distance bounded search cost when a consumer queries data. It can also guarantee data load balance.
  • Related Articles

    [1]Lang Xuancong, Li Chunsheng, Liu Yong, Wang Mei. Regret Bounds for Online Pairwise Learning with Non-Convex Loss Functions Using Stability Analysis[J]. Journal of Computer Research and Development, 2023, 60(12): 2806-2813. DOI: 10.7544/issn1000-1239.202220221
    [2]Ma Haiyan, Liang Yongquan, Ji Shujuan, Li Da. A Trust-Distrust Based Reputation Attacks Defending Strategy and Its Stability Analysis[J]. Journal of Computer Research and Development, 2018, 55(12): 2685-2702. DOI: 10.7544/issn1000-1239.2018.20170587
    [3]Wei Shanshan, Xie Wei, He Zhiqiang. Digital Video Stabilization Techniques: A Survey[J]. Journal of Computer Research and Development, 2017, 54(9): 2044-2058. DOI: 10.7544/issn1000-1239.2017.20160078
    [4]Lin Fei, Sun Yong, Ding Hong, Ren Yizhi. Self Stabilizing Distributed Transactional Memory Model and Algorithms[J]. Journal of Computer Research and Development, 2014, 51(9): 2046-2057. DOI: 10.7544/issn1000-1239.2014.20130058
    [5]Huo Lin, Li Deshun, and Tan Yinglu. Algorithms of Spanning Tree Based on the Stability Probability and Contribution Link of Nodes for Application Layer Multicast[J]. Journal of Computer Research and Development, 2012, 49(12): 2559-2567.
    [6]Wang Bo, Huang Jiuming, Jia Yan, and Yang Shuqiang. Research on a Common Feature Selection Method for Multiple Supervised Models[J]. Journal of Computer Research and Development, 2010, 47(9): 1548-1557.
    [7]Zhang Zhong and Li Chuandong. Asymptotical Stability Analysis for Recurrent Neural Networks with Time-Varying Delays[J]. Journal of Computer Research and Development, 2007, 44(6): 973-979.
    [8]Wu Zhendong and Li Shanping. A Topology Control Algorithm Based on Link Reliability and Multi-Path for Sensor Networks[J]. Journal of Computer Research and Development, 2007, 44(2): 216-222.
    [9]Wang Sichun, Zhang Taishan, Yin Zhiyun, Zhang Chuwen. Stability Analysis of Multiobjective Decision Functions Based on GP 【removal】[J]. Journal of Computer Research and Development, 2005, 42(8): 1318-1323.
    [10]Yang Hongyong, Kong Xiangxin, Zhang Fuzeng. Stability of an AQM Control Algorithm with Communication Delays[J]. Journal of Computer Research and Development, 2005, 42(7): 1123-1127.

Catalog

    Article views (602) PDF downloads (522) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return