МЕТОД ПОБУДОВИ ПРОТОКОЛУ МАРШРУТИЗАЦІЇ ОПТИМАЛЬНОГО ЗА КРИТЕРІЄМ МАКСИМІЗАЦІЇ ЧАСУ ЖИТТЯ БСС
Анотація
Method of optimal routing protocol creation by
lifetime maximization in sensor-based system
Traffic parameters analysis allows to control memory buffer of sensor element and prevent extra energy consumption. Traffic model is based on self-similarity model.
Посилання
On the self-similar nature of Ethernet traffic (extended version ) / Will E.Leland Murad S. Taqqu, Walter Willinger, Daniel V. Wilson // IEEE/ACM Trans. Netw.- 1994.- Vol.2, no.1.-P. 1-15.
Тихонов В.И., Миронов М.А. Марковские процессы.- М.: «Сов.радио», 1977.- 488 с.
On the self-similar nature of Ethernet traffic (extended version ) / Will E.Leland Murad S. Taqqu, Walter Willinger, Daniel V. Wilson // IEEE/ACM Trans. Netw.- 1994.- Vol.2, no.1.-P. 1-15.
Johnson D., Maltz D. Dynamic source routing in ad hoc wireless networks // Mobile computing / Ed. by T. Imielinski, H. Korth. 1996. Vol. 353. P. 153-181.
Aslam J., Li Q., Rus D. Three power-aware routing algorithms for sensor networks // Wireless communications and mobile computing. 2003. Vol. 3, no.2.
##submission.downloads##
Як цитувати
Номер
Розділ
Ліцензія
Авторське право (c) 2017 І. В. Алєксєєва, П. С. Уланов
Ця робота ліцензується відповідно до Creative Commons Attribution 4.0 International License.
Authors who submit to this conference agree to the following terms:a) Authors retain copyright over their work, while allowing the conference to place this unpublished work under a Creative Commons Attribution License, which allows others to freely access, use, and share the work, with an acknowledgement of the work's authorship and its initial presentation at this conference.
b) Authors are able to waive the terms of the CC license and enter into separate, additional contractual arrangements for the non-exclusive distribution and subsequent publication of this work (e.g., publish a revised version in a journal, post it to an institutional repository or publish it in a book), with an acknowledgement of its initial presentation at this conference.
c) In addition, authors are encouraged to post and share their work online (e.g., in institutional repositories or on their website) at any point before and after the conference.