• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Tao Zijin, Gong Zhenghu, and Lu Zexin. Two New Push-Pull Balanced Data Dissemination Algorithms for Large-Scale Wireless Sensor Networks[J]. Journal of Computer Research and Development, 2008, 45(7): 1115-1125.
Citation: Tao Zijin, Gong Zhenghu, and Lu Zexin. Two New Push-Pull Balanced Data Dissemination Algorithms for Large-Scale Wireless Sensor Networks[J]. Journal of Computer Research and Development, 2008, 45(7): 1115-1125.

Two New Push-Pull Balanced Data Dissemination Algorithms for Large-Scale Wireless Sensor Networks

More Information
  • Published Date: July 14, 2008
  • How to get a lower communication cost and a better balance between the push and pull of the event data are the common goals of the various data dissemination algorithms in wireless sensor networks (WSNs). On this basis, the load of the system hotspot should be further decreased and the number of the event data replicas should be reduced. In this paper, two well-known typical structured and unstructured data dissemination algorithms (DCS and CN) are analyzed and their advantages and shortcomings are figured out. At the same time, by combining the push-pull strategies of the two algorithms, two new data dissemination algorithms are proposed based on the hybrid structured and unstructured data push-pull strategies for the ALL-type queries in the different application situation in WSNs. The two new algorithms are Hybrid-Dcs-Cn1(HDC1) and Hybrid-Dcs-Cn2(HDC2). The theoretical analyses and simulations show that they resolve the problems of the high load of the hotspot and the large number of the event data replicas and the low performance of the query on the premise that ensures the balance between the push and pull. The total system communication cost of the two new algorithms are close to or better than the existing algorithms, so the two algorithms are more appropriate for the WSNs, especially when there are a large volume of data to be dealt with, and they are two energy-efficient data dissemination algorithms.
  • Related Articles

    [1]Wu Haibo, Liu Hui, Sun Yi, Li Jun. A Concurrent Conflict Transaction Optimization Method for Consortium Blockchain Hyperledger Fabric[J]. Journal of Computer Research and Development, 2024, 61(8): 2110-2126. DOI: 10.7544/issn1000-1239.202220644
    [2]Yang Bo, Guo Haoran, Feng Junhui, Li Ge, Jin Zhi. A Rule Conflict Detection Approach for Intelligent System of Internet of Things[J]. Journal of Computer Research and Development, 2023, 60(3): 592-605. DOI: 10.7544/issn1000-1239.202110941
    [3]Huang Xiaohui, Li Dong, Shi Hailong, Cui Li. EasiRCC: A Method of Rule-Matching and Conflict Resolution for Smart Home[J]. Journal of Computer Research and Development, 2017, 54(12): 2711-2720. DOI: 10.7544/issn1000-1239.2017.20160646
    [4]Wang Yongji, Wu Jingzheng, Ding Liping, Zeng Haitao. Detecion Approach for Covert Channel Based on Concurrency Conflict Interval Time[J]. Journal of Computer Research and Development, 2011, 48(8): 1542-1553.
    [5]Zhou Hang, Huang Zhiqiu, Hu Jun, Zhu Yi. Real-Time System Resource Conflict Checking Based on Time Petri Nets[J]. Journal of Computer Research and Development, 2009, 46(9): 1578-1585.
    [6]Li Lin and Lu Xianliang. An Algorithm for Detecting Filters Conflicts Based on the Intersection of Bit Vectors[J]. Journal of Computer Research and Development, 2008, 45(2): 237-245.
    [7]Li Xiangjun, Meng Luoming, and Jiao Li. Problems in Results of Policy Conflict Resolutions and Detection and Resolution Methods in Network Management Systems[J]. Journal of Computer Research and Development, 2006, 43(7): 1297-1303.
    [8]Yang Wu, Yun Xiaochun, Li Jianhua. An Efficient Approach to Intrusion Detection Based on Boosting Rule Learning[J]. Journal of Computer Research and Development, 2006, 43(7): 1252-1259.
    [9]Mao Tianlu, Wang Zhaoqi, Xia Shihong. An Algorithm for Collision Detection and Response Between Human Body Model and Cloth in 3D Garment Simulation[J]. Journal of Computer Research and Development, 2006, 43(2): 356-361.
    [10]Yao Jian, Mao Bing, and Xie Li. A DAG-Based Security Policy Conflicts Detection Method[J]. Journal of Computer Research and Development, 2005, 42(7): 1108-1114.

Catalog

    Article views (896) PDF downloads (584) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return