• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Li Lian, Jiang Wentao, Sun Limin, Fan Xiaozhong. A Receiver-Based Cross-Iayer Forwarding Protocol for Mobile Sensor Networks[J]. Journal of Computer Research and Development, 2009, 46(1): 120-128.
Citation: Li Lian, Jiang Wentao, Sun Limin, Fan Xiaozhong. A Receiver-Based Cross-Iayer Forwarding Protocol for Mobile Sensor Networks[J]. Journal of Computer Research and Development, 2009, 46(1): 120-128.

A Receiver-Based Cross-Iayer Forwarding Protocol for Mobile Sensor Networks

More Information
  • Published Date: January 14, 2009
  • As nodes can move randomly in mobile sensor networks, the network topology changes frequently. Generally, there is no stable communication path between source node and sink node, even in a short interval. Thus the data forwarding protocol encounters great challenges in mobile sensor networks. Receiver based routing protocols do not require to establish an overall routing from source node to sink node, but allow the neighbor nodes of the sender to contend for the forwarding right under certain rules, and only the contention winner has the opportunity to forward data. Existing receiver based routing protocols can be applied to mobile sensor networks, but they still suffer to some disadvantages in the fields of forwarding priority calculation, data collision, multicast suppression and routing void bypass. Taking into account the characteristics of mobile sensor networks, a receiver based cross-layer forwarding protocol (RCF) is proposed in this paper. The RCF protocol optimizes the forwarding priority calculation and utilizes a self-adaptive mechanism for forwarding right contention. Also, it deals with the data collision and multicast suppression better through the dual-channel communication model, and puts forward an efficient routing void bypass mechanism. The simulation results show that RCF performs well in terms of communication consumption, forwarding delay and reliability.
  • Related Articles

    [1]Geng Haijun, Meng Zhuo, Yao Shanshan, Yang Jing, Chi Haotian, Yin Xia. An Intra-Domain Routing Protection Algorithm Based on Forwarding Graph[J]. Journal of Computer Research and Development, 2024, 61(2): 529-538. DOI: 10.7544/issn1000-1239.202220914
    [2]Lin Xiao, Ji Shuo, Yue Shengnan, Sun Weiqiang, Hu Weisheng. Node-Constraint Store-and-Forward Scheduling Method for Inter-Datacenter Networks[J]. Journal of Computer Research and Development, 2021, 58(2): 319-337. DOI: 10.7544/issn1000-1239.2021.20200384
    [3]Lin Hui, Ma Jianfeng, Xu Li. A Secure Routing Protocol for MWNs Based on Cross-Layer Dynamic Reputation Mechanism[J]. Journal of Computer Research and Development, 2014, 51(7): 1486-1496.
    [4]Yuan Bo, Dai Yi, Wang Binqiang. A Low-Power FIS Mechanism and Energy Analysis for Green Router[J]. Journal of Computer Research and Development, 2014, 51(5): 984-996.
    [5]Hu Qiaolin, Sun Yipin, and Su Jinshu. BAR-BGP: Achieving High Reliability Interdomain Routing Through Backup AS-Address Advertisement and Recovery Forwarding[J]. Journal of Computer Research and Development, 2011, 48(12): 2242-2252.
    [6]Fu Bin, Li Renfa, Liu Caiping, and Xiao Xiongren. A Congestion Aware Routing Protocol Based on Network Coding in Wireless Sensor Networks[J]. Journal of Computer Research and Development, 2011, 48(6): 991-999.
    [7]Tang Mingdong, Zhang Guoqing, Yang Jing. Graph Embedding-Based Scalable Routing in Large Networks[J]. Journal of Computer Research and Development, 2010, 47(7): 1225-1233.
    [8]Zhang Hengyang, Fan Weihong, Wang Ling, and Zhou Dongxiang. Real-Time and Reliable Greedy Geographical Routing for Mobile Wireless Sensor Networks[J]. Journal of Computer Research and Development, 2009, 46(5): 713-722.
    [9]Liu Anfeng, Wu Xianyou, and Chen Zhigang. An Energy-Hole Avoidance Routing Algorithm for WSN Based on PSO[J]. Journal of Computer Research and Development, 2009, 46(4): 575-582.
    [10]Huang Qingyuan, Zeng Yingzhi, and Su Jinshu. ASR: An Adaptive Secure Routing Protocol in MANET[J]. Journal of Computer Research and Development, 2008, 45(12): 2087-2094.

Catalog

    Article views (723) PDF downloads (651) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return