A Survey on Congestion Control at Transport Layer in Wireless Sensor Network

Size: px
Start display at page:

Download "A Survey on Congestion Control at Transport Layer in Wireless Sensor Network"

Transcription

1 OPEN TRANSACTIONS ON WIRELESS COMMUNICATIONS Volume 1, Number 1, December 2014 OPEN TRANSACTIONS ON WIRELESS COMMUNICATIONS A Survey on Congestion Control at Transport Layer in Wireless Sensor Network Prakul Singhal*, Anamika Yadav Department of Electrical Engineering, NIT Raipur, C.G. (India) *Corresponding author: prakul 2008@yahoo.co.in Abstract: Congestion control in a wireless sensor network is a vital issue in the present scenario. In this paper, a comprehensive survey on congestion control schemes at transport layer in a wireless sensor network is presented. At transport layer, the protocols are based on two approaches viz. Reliability and congestion control. Various protocols in each category have been discussed. Thorough survey on various congestion control schemes has been done. Latest research work including artificial intelligence based techniques e.g. fuzzy logic as well as neural network adaptive based congestion control scheme have been included. Keywords: Wireless Sensor Network; Congestion Control Protocols; Reliability Protocols; Buffer Occupancy; Rate Adjustment 1. INTRODUCTION Wireless sensor networks (WSN) are the collection of hundreds or thousands of sensor nodes distributed randomly in a geographical area. Each sensor node has the ability to sense, communicate and compute. They have processor, memory, transceiver and sensors with limited battery life. WSN are used to monitor events in a region where humans are incapable to monitor. It cooperatively monitors different conditions, like sound, temperature, vibration, pressure and motion etc within a region. The data collected from the region are sent to the sink nodes that connect the sensor network with one or more users as shown in Figure 1. The main characteristics of a WSN are mobile nodes, tolerant node failures, scalability to large scale of deployment, nodes heterogeneity and low power consumption. It can be used in many applications such as habitat monitoring, health care security surveillance, target tracking, military application and etc. However, there are some problems that need to be overcome, for example, reliability data delivery and congestion control. These problems are controlled through the help of protocols. Some protocols provide only reliability [1 3], some provide only congestion control [2] and some others provide both reliability and congestion control [2]. 17

2 OPEN TRANSACTIONS ON WIRELESS COMMUNICATIONS Figure 1. Wireless Sensor Networks 2. TRANSRORT PROTOCOLS There are two major functions in the transport protocol of WSNs i.e. reliability and congestion control. Reliable data delivery means packet should reach the destination in multi-hop WSN; if not then proper mechanism is applied to recover the lost packet. Congestion occurs when there is many to one type scenario or if packet service time is more as compared to packet arrival time. This creates a situation of traffic which exceeds the network capacity. Due to congestion in a WSN, congested nodes initiate to drop data packets or the delay of the packets due to large and filled queue. Dropping of packets cause wastage of energy and also affect reliability. The reliability and congestion control can be done by hop-by-hop or by end-to-end approach. 2.1 Protocol for Reliability Reliability means accurate delivery of data packet from source to destination. It can be either Upstream or Downstream Reliability. In Upstream reliability, data packets move from source to sink node whereas in downstream reliability it moves from sink to source node. If data packet moves in both directions then it is known as Bidirectional reliability. Reliability protocols are classified into two general classes namely (1) packet-based and (2) event-based. In packet-based reliability, lost packets are detected at sink or any intermediate nodes. And for achieving reliability, retransmission of lost packet is carried out. Whereas, in event-based approach the reliability achieved at sink node is signaled back to source, which is done by the help of end-to-end source rate adjustment. Various protocols for achieving reliability are: ERTP: Energy-efficient Transport Protocol (ERTP) [4] is used for data streaming applications, where sensor monitoring are send through many sensor nodes to sink nodes i.e. base station.

3 A Survey on Congestion Control at Transport Layer in Wireless Sensor Network It is a packet-based reliability protocol which applies statistical metric aiming to deliver more number of packets to sink as compared to the defined threshold. It reduces energy dissipation by using end-to-end approach which dynamically controls the reliability at each hop. It controls the maximum number of retransmissions dynamically at each sensor node. For recovery, it uses Stop-and-Wait Hop-by-Hop Implicit Acknowledgment (iack). The sink node explicitly sends the acknowledgment signal to the source node, if the signal does not reach within a particular time then source node retransmits the unacknowledged packet. 2. PSFQ: Pump Slowly Fetch Quickly (PSFQ) [5] is a protocol used specially in downstream multicast dynamic code update. It can also be used for unicast communication. In this, data is reconstructed over each node. It is a hop by hop protocol, thus having no guaranty of end to end reliability in some scenarios. It has three functions: message transferring (pump operation), relay-initiated error recovery (fetch operation), and selective status reporting (report operation). It uses localized recovery process among immediate neighbors for achieving loose delay bound. As it is downstream protocol so it strictly manages and control reliability in reverse direction i.e. from sink to source node. Therefore, useful resources are wasted if we use it for forward direction. 3. RMST: The Reliable Multi-Segment Transport (RMST) [6] is a Selective NACK-based for directed diffusion. It provides guaranteed delivery, fragmentation and assembly to the required applications. It detects loss of packet at sink node from where a unicast message is send towards source node for notifying the missing packet. RMST divides the data transport from source to sink into Routing and Message Loss Detection (MLD). For achieving reliability, it uses hop-by-hop approach which sends a timer driven NACK for the missing packet to the previous node. It reduces end-to-end retransmission by storing unacknowledged packet in their caches. Automatic Repeat request (ARQ) is used to retransmit lost packet. The receivers detect the lost packet and send NACK for recovering it. 4. RBC: Reliable Bursty Convergecast (RBC) [7] forwards the data packet continuously using a window-less block acknowledgement scheme which copies the acknowledgement. It uses a large memory of sensors, so sensor nodes require large memory for using RBC protocol. In RBC, hop-by-hop approach with differentiated contention control is used. This ensures that packets will be retransmitted a few number of times. This works well in single event converge cast whereas in continuous event converge cast, it can generate fresh packet continuously till event repeats itself. 5. Garuda: GARUDA [8] is a reliable downstream protocol which achieves reliability from sink to source. It uses a two-stage NACK recovery process by dividing each node as a core member or non-core members. Wait-for-First-Packet (WFP) pulse is used for creating first packet delivery which generates core infrastructure. The first packet delivery calculates the number of hop from the sink to the particular node. The nodes which come under the path of hop count become the core member. By the election process, core nodes are created within the network, which should connect with at least one upstream core node. For overcoming under utilization scenario, it uses out-of-order strategy. During non-core recovery phase, non-core nodes request retransmission from the core nodes. After that, it listens to all retransmission from its core node and sends their retransmission request. 6. DTC: Distributed TCP Caching (DTC) [9] is an enhanced version of TCP. It compresses the header and provides caches at few selected intermediate nodes which help in improving transmission capacity. It leaves end point of communication unchanged as it is fully compatible with TCP. It uses the AIMD algorithm for adjusting transmission window and hop-by-hop loss recovery scheme 19

4 OPEN TRANSACTIONS ON WIRELESS COMMUNICATIONS Table 1. Summary of reliable protocols Protocols Reliability Direction Reliability level Recovery approach Notification ERTP [4] Upstream Packet based Hop-by-hop ACK, iack PSFQ [5] Downstream Packet based Hop-by-hop NACK RMST [6] Upstream Packet based Hop-by-hop, End-to-end NACK RBC [7] Upstream Packet based Hop-by-hop iack, NACK GARUDA [8] Downstream Packet and destination based Two stage loss recovery NACK DTC [9] Upstream Packet based Hop-by-hop ACK DTSN [10] Upstream Packet based End-to-end ACK, NACK IPSFQ [11] Downstream Packet based Hop-by-hop NACK EEHRTP [12] Upstream Packet based End-to-end Hierarchical iack [13] Upstream Packet based Hop-by-hop iack for lost packets which can be received from intermediate node caches. Those segments which are not acknowledged at link layer, are saved into the cache of intermediate node in next hop, and retransmitted when transmission time is out. 7. DTSN: Distributed Transport for Sensor Network (DTSN) [10] is an energy-efficient hop-by-hop reliable transport protocol supporting both full and differentiated reliability and employs selective repeat ARQ to improve energy efficiency. In order to reduce the overhead of packet in DTSN, the loss recovery process is controlled by the source node. It sends Explicit Acknowledgment Request (EAR) from receiver to sender which can be either ACK or NACK according to retransmission interval. The receiver node finds the lost packet by the help of missing sequence number and makes a list of lost packets keeping it until source node sends an EAR to it. 8. IPSFQ: Improved Pump Slowly Fetch Quickly (IPSFQ) [11] is an improved version of PSFQ [5] protocol. This protocol removes the short coming of PSFQ that are in-sequence forwarding of data packets, pump and repairing operations. By improving these short coming IPSFQ performs better in terms of error tolerance and average latency. 9. EEHRTP: Energy Efficient Hierarchical Reliable Transport Protocol (EEHRTP) [12] increases the network lifetime by controlling redundant data transmission. It achieves end-to-end reliability using hierarchical implicit acknowledgment. It uses Stop-and-Wait Hop-by-Hop implicitly acknowledgement for loss recovery and timeout scheme for packet retransmission. The packet loss rate and packet delivery rate show that it is better than ERTP [4] in terms of energy conserving. 10. In [13] author proposed a reliable data transfer protocol which uses cross layer optimization. This protocol is an energy-efficient hop-by-hop reliable protocol, which retransmit the packet if timeout happen before reaching to sink node. Hop-by-hop reliability is done by using four state conditions. The summary of various reliable protocols stated above is given in Table 1 below. 2.2 Protocols for congestion control 20 Congestion occurs in WSN due to many-to-one nature of traffic. When such an event occurs, many sensor nodes sense it and send packets toward one or more sinks. Congestion may also occur due to limited wireless bandwidth of sensor network. It can be either node-level congestion or link-level congestion as shown in Figure 2. Both of them lead to wastage of the energy of the nodes. Congestion occurring

5 A Survey on Congestion Control at Transport Layer in Wireless Sensor Network Figure 2. Node level and link level congestion in WSN is different from that occurring in the wired networks. That s why existing protocols such as TCP are not capable to handle congestion in WSN. The congestion pattern is different for upstream, downstream and bidirectional data flow. Congestion causes overall degradation of channel quality as well as packet delivery ratio, it also causes buffer to overflow and increased delays which lead to reduction in throughput. Thus, congestion control is vital for avoiding congestion in the network, which can improve network performance. Generally, congestion control algorithms in WSNs employ two techniques for controlling and avoiding the congestion viz. traffic control and resource control. The traffic control protocols use traffic control method to adjust the rate of the source node for controlling congestion in the network. On the other hand, resource control algorithms employ redundant nodes, which are not in the initial path from source to sink, so that data can flow properly within the network. Congestion control mechanisms [14] are composed of three components: congestion detection, congestion notification and reporting rate adjustments Congestion detection Congestion detection is the process of detecting the presence as well as the location of congestion in the network. Different parameters are considered for detecting the congestion by different protocols. Some protocols use only Buffer Occupancy; some others use Packet Rate or Packet Service Time versus Packet Inter-Arrival Time and some protocols consider the combination of above parameters Congestion Notification In congestion notification, congestion information is passed by congested node either to the intermediate node or to the source node or to sink node or to all other nodes after detecting congestion. The congestion information can be sent explicitly or implicitly according to the protocol. Some protocols notify the congestion by setting Congestion Notification (CN) bit in packet header. 21

6 OPEN TRANSACTIONS ON WIRELESS COMMUNICATIONS Congestion Avoidance Congestion can be avoided by simply stopping sending packets into the network, by reducing its sending rate, or if all the intermediate nodes decrease their sending flow rate to their immediate neighbours. Congestion avoidance uses three different types of techniques: Rate Adjustment, Traffic Redirection and Polite Gossip Policy. Different protocols for congestion control are given in the following subsections: 1. CODA: Congestion Detection and Avoidance (CODA) [15] detects congestion by monitoring buffer occupancy as well as wireless channel load. It is both hop-by-hop and end-to-end according to the situation. The packets are dropped by the preceding node of congested node for controlling the congestion. It works similarly to TCP during packet loss, adjusting the traffic by using additive increase multiplicative decrease (AIMD) technique. CODA designs both open and closed-loop rate adjustment. Congestion is notified by the help of broadcasting the message to all nodes. In dynamic scenarios, fairness is achieved by using dynamic weight adaptation algorithm. 2. FUSION: Fusion [16] detects congestion by considering the queue length. The congested node sets a CN (congestion notification) bit in the header of each outgoing packet. After CN bit is set, the entire neighbouring node stop sending packet to the congested node which helps in clearing the queue packets in the buffer of congested node. It uses prioritized MAC algorithm and traffic rate adjustment of source nodes. It has been found that it gets good throughput as well as fairness even at high load. 3. CCF: Congestion Control and Fairness (CCF) routing scheme [17] detects congestion by finding packet service time from which it calculates current service rate. If service rate is more as compared to arrival rate of each intermediate node then there is congestion in that intermediate sensor node. It controls congestion by using hop-by-hop approach which calculates exact rate adjustment by the help of current service time and number of child nodes. As the rate adjustment depends on packet service time only, it may lead to low utilization when some sensor nodes have limited traffic or there is a significant packet error rate. 4. PCCP: Priority-based congestion control protocol (PCCP) [18, 19] detects congestion level by the help of congestion degree and node priority index, in which congestion degree is calculated by using packet inter arrival time along with packet service time. It applies hop-by-hop approach with cross layer optimization. It reduces the buffer occupancy which helps in reducing packet loss and improves energy-efficiency. It also gets high link utilization with low packet delay. 5. SENTCP: Congestion is detected by SENTCP [20] using average local packet service time and inter arrival time for calculating congestion degree. It is an open-loop hop-by-hop congestion control protocol. In SENTCP, a feedback containing local congestion degree with buffer length is send to previous node by each intermediate sensor node to adjust traffic rate. 6. ART: ART [21] controls congestion by selecting subset of sensor nodes known as essential node which covers whole area of network. These essential nodes sense the network state in energy efficient way. It is end-to-end type upstream congestion control protocol in which only essential nodes are considered for the transfer of reliable information in upstream and downstream TRICKLE: Trickle [22] uses Polite Gossip technique for controlling traffic. In this protocol, a summary of data is broadcasted by each node after regular interval of time and politely suppress its own data information. Information is suppressed if same information is received more number of

7 A Survey on Congestion Control at Transport Layer in Wireless Sensor Network times as compared to threshold by the neighboring nodes. On the other hand, if nodes hear some new information than it broadcasts this information repeatedly with shorter interval of time, so that new information is broadcasted in the system quickly. 8. SIPHON: Siphon [23] also infers congestion by the help of queue length of intermediate nodes, as well as traffic redirection but it uses traffic redirection in place of rate adjustment technique for handling congestion. It uses the same mechanism of CODA with additional features for controlling the congestion in the secondary network having virtual sinks only. Virtual station is used to send message to all nodes for indicating that sending rate is high indicating congestion. A message containing signature byte is broadcasted by virtual sink to the secondary network on receiving some notification from base station. This message notifies the secondary network that something is not correct. 9. RCRT: Rate controlled reliable transport protocol (RCRT) [24] detects congestion by the help of base station which explicitly sends request to sensor nodes for missing packets. It provides end-to-end reliability with NACK based loss recovery scheme. The base station notifies the nodes when system enters in congestion state and repairing time is greater than a round-trip time. Base station itself decides how much traffic rate is adjusted to control the congestion by using AIMD scheme. 10. STCP: Sensor Transmission Control Protocol (STCP) [25] is a transport layer protocol in which most of the functionality is implemented at the sink node or base station. It is reliable and scalable protocol which uses multi-purpose sensor nodes but it does not provide any explicit mechanism for congestion control as well as in terms of delay ACK/NACK, it may not be feasible for reliability purpose. 11. IDCCP: Improved Datagram Congestion Control Protocol IDCCP [26] is used to control congestion in wireless multimedia network. It uses Congestion Control Identifier (CCID) for controlling purpose. An optional ACK is used in it for achieving reliability in the system. Different rate adjustment levels are used in different state. During normal State and congestion state, if there is no packet loss, the rate is adjusted according to basertt/avgrtt. If there is packet loss during congestion state, then traffic rate is halved. When system is in error state, rate is adjusted according to the variable β ranging from 0.5 to 1. In Failure State, a special packet known as probe is send for monitoring the system. 12. MCCP: Multi-event congestion control protocol (MCCP) [27] detects congestion by the help of two parameters: buffer size and packet delivery time between two sensor nodes. It uses a TDMA schedule for assigning the rate to the nodes. For scheduling purpose, it requires time synchronization, which increases complexity and overhead in the network. 13. CONSEQ: Control of Sensor Queues (CONSEQ) [28] uses a metrics for estimating congestion in the network. It uses load balancing technique during low congestion. Congestion is controlled by each node locally in their neighbourhood. This reduces congestion which improves delay as well as energy consumption in the network. It uses fuzzy control theory for dynamically rate adaption using effective queue length. As it detects congestion by the help of locally detecting technique, it responds to congestion quickly with lesser overhead. 14. FCCTF: Fairness Congestion Control for a distrustful WSN using Fuzzy logic (FCCTF) [29] control congestion by isolating malicious node. It uses dynamic threshold trust value (TTV) to block or unblock the malicious node using fuzzy logic. It performs differently in different circumstances 23

8 OPEN TRANSACTIONS ON WIRELESS COMMUNICATIONS according to number of lost packets. When number of packets is lost, it increases TTV value so that more number of nodes is detected as malicious node. Malicious nodes do not take part in the network. When there is no packet lost then it reduces the TTV value as well as releases some malicious nodes so that they can take part in the network. As number of nodes increases, more packets start flowing within the network. 15. FBACC: The Fuzzy Based Adaptive Congestion Control (FBACC) [30] is proposed which uses buffer occupancy, participants and traffic rate. FBACC provides a fuzzy logic based congestion estimation, smart way to drop packet in case of congestion up to acceptable quality level and most importantly, it regulates traffic rate. It improves performance of network over other protocols which are presently available. Performance of FBACC is evaluated and compared with existing schemes e.g. Event-to-Sink Reliable Transport (ESRT) and Fuzzy Logic Based Congestion Estimation (FLCE) in terms of congestion detection, packet loss and energy. FBACC detects the network congestion more precisely and uniformly and also adapts to current traffic rate with respect to product of previous participants with previous traffic rate to reduce the packet loss. Finally, FBACC saves energy of retransmission because packet loss is minimal due to traffic adaption. 16. PHSA: Probability based Hop Selection Approach (PHSA) [31] controls congestion by controlling the resources of the network. This protocol finds the path cost between node and each sink node by exchanging information and sending and receiving data steps. Computed cost is exchanged between nodes which help in electing the node for next hop. Thus, resources are adjusted for controlling the congestion. This protocol also gives efficient power consumption with high packet delivery ratio. 17. HTAP: Hierarchical Tree Alternative Path Algorithm (HTAP) [32] controls congestion by dynamically switching to alternate path on the basis of local information. Local information contains congestion level of their neighbouring nodes by the help of adaptive method. Adaptive method infers the congestion level by the help of buffer occupancy with duration. In this protocol, each node is only connected to those nodes which are in upstream direction i.e. from source to sink node. 18. SUIT: Sensor fuzzy-based image transport (SUIT) [33] is a fuzzy based congestion control protocol. It sends maximum number of frame to sink node with lower quality during congestion state. This protocol uses cross layer technique to interact with different layers. It uses three indicators to detect congestion that are ratio of incoming to outgoing packets, number of active neighbour and buffer occupancy of the parent node. It applies fuzzy on the indicators and if congestion is detected than it adjust the rate to control congestion. 19. NNBCD: Neural Network Based Congestion Detection protocol (NNBCD) [34] trains the neural network by the help of three parameters i.e. buffer occupancy, number of participant and traffic rate for detecting congestion in the congested WSN. These parameters are extracted from NAM trace file by using AWK script. This protocol is able to detect congestion accurately and efficiently. Further this technique can be utilized for controlling the congestion by adapting the traffic rate. The summary of various congestion protocols stated above is given in Table 2 below. 3. FUTURE WORKS 24 The protocols discussed above have been effective in improving reliability and controlling congestion in transport layer of WSN. Some reliable protocols used hop-by-hop or end-to-end recovery approach and some of them used both approaches. Reliable protocol can be upstream or downstream. And in congestion

9 A Survey on Congestion Control at Transport Layer in Wireless Sensor Network Table 2. Summary of Congestion protocols Congestion Protocols Detection Notification Control technique CODA [15] Buffer occupancy, channel load Explicitly AIMD FUSION [16] Queue length Implicitly Stop and start CCF [17] Packet service time Implicitly Exact rate PCCP [18, 19] Congestion degree, packet inter arrival and service time Implicitly Exact rate SENTCP [20] average local packet service time, inter arrival time Explicitly Rate adjustment ART [21] Service time Implicitly Rate adjustment TRICKLE [22] - - Polite gossip SIPHON [23] Queue length - Traffic redirection RCRT [24] Packet loss, recovery dynamics Explicitly AIMD-like STCP [25] Queue length Implicitly AIMD-like IDCCP [26] - Explicitly Rate adjustment MCCP [27] Buffer size, packet delivery ratio - Rate adjustment CONSEQ [28] Effective and virtual queue length - Rate adjustment FCCTF [29] Buffer overflowing, forwarding rate vs receiving rate - Malicious nodes adaption FBACC [30] Participants, buffer occupancy and traffic rate Explicitly Rate adjustment PHSA [31] Queue drop, local cost Explicitly Resource adjustment HTAP [32] Buffer occupancy, duration - Alternate path SUIT [33] Number of active neighbour, buffer occupancy Rate adaption - and incoming to outgoing packet ratio and quality adaption NNBCD [34] Buffer occupancy, participants and traffic rate - - control protocols detect congestion by the help of certain parameters such as buffer occupancy, channel load, traffic rate, packet loss, participants etc. They control the congestion by using various adjustment techniques such as traffic rate adjustment, traffic redirection, polite gossip, resource adjustment etc. However the protocol discussed above can be further improved by applying various methods: 1. Computational intelligence [35] is an untouched field till now, only fuzzy application of computational intelligence is used in few paper but other technique like neural network, genetic algorithm, reinforcement learning etc. are also appropriate for improving QoS of WSN at transport layer. 2. Currently all protocol start congestion mitigation method after detecting of congestion state but a better protocol can be developed which mitigate the congestion before happing of congestion. So it can saves lot of energy and increase throughput with better resource utilization. 3. Existing protocols either adapt traffic or redirect traffic flow not both. Hybrid protocol can be developed which can use both traffic rate adaption with traffic redirection. This can be performed by using cross layer approach, as they can interact with different layer by escaping virtually strict boundaries between layers. 4. CONCLUSION In this paper, a survey of various protocols used for congestion control (CC) in Wireless Sensor Networks is presented. Different types of protocols which are commonly used for congestion detection and control in WSN and also some other protocols which have been recently proposed are discussed in detail. Fairness Congestion Control protocol for a distrustful WSN using Fuzzy logic (FCCTF) is found to be an effective protocol as it uses dynamic threshold value to control congestion. As can be seen from 25

10 OPEN TRANSACTIONS ON WIRELESS COMMUNICATIONS Table 2, FCCTF considers both packet drop using buffer overflow and traffic rate by using forwarding rate vs receiving rate. It uses one of the Artificial Intelligence techniques: Fuzzy logic for estimating the dynamic threshold value by considering the input parameters, which helps in controlling the congestion with better utilization of channel. It performs differently in different circumstances according to number of lost packets. The Fuzzy Based Adaptive Congestion Control (FBACC) has proved to be very effective protocol for wireless multimedia sensor network, as it maintains the network in medium congestion level by using number of participant along with buffer occupancy and traffic rate. FBACC provides a fuzzy logic based congestion estimation, smart way to drop packet in case of congestion up to acceptable quality level and most importantly it regulate traffic rate. FBACC saves energy of retransmission because packet loss is minimal due to traffic adaption. Thus, it can be concluded that till date many effective protocols have been proposed to detect and control congestion in transport layer for WSN. Nevertheless, there is still scope for developing more effective protocols using artificial intelligence, cross layer technique etc. References [1] F. Yunus, N.-S. Ismail, S. H. Ariffin, A. Shahidan, N. Fisal, and S. K. Syed-Yusof, Proposed Transport Protocol for Reliable Data Transfer in Wireless Sensor Network (WSN), in Modeling, Simulation and Applied Optimization (ICMSAO), th International Conference on, pp. 1 7, IEEE, [2] S. Sridevi and M. Usha, Taxonomy of Transport Protocols for Wireless Sensor Networks, in Recent Trends in Information Technology (ICRTIT), 2011 International Conference on, pp , IEEE, [3] D. N. Wategaonkar and V. S. Deshpande, Characterization of Reliability in WSN, in Information and Communication Technologies (WICT), 2012 World Congress on, pp , IEEE, [4] T. Le, W. Hu, P. Corke, and S. Jha, ERTP: Energy-efficient and Reliable Transport Protocol for data streaming in Wireless Sensor Networks, Computer Communications, vol. 32, no. 7, pp , [5] C.-Y. Wan, A. T. Campbell, and L. Krishnamurthy, PSFQ: a reliable transport protocol for wireless sensor networks, in Proceedings of the 1st ACM international workshop on Wireless sensor networks and applications, pp. 1 11, ACM, [6] F. Stann and J. Heidemann, RMST: Reliable Data Transport in Sensor Networks, in Sensor Network Protocols and Applications, Proceedings of the First IEEE IEEE International Workshop on, pp , IEEE, [7] H. Zhang, A. Arora, Y.-r. Choi, and M. G. Gouda, Reliable bursty convergecast in wireless sensor networks, vol. 30, pp , Elsevier, [8] R. Sivakumar and I. F. Akyildiz, GARUDA: Achieving Effective Reliability for Downstream Communication in Wireless Sensor Networks, IEEE Transactions on Mobile Computing, vol. 7, no. 2, pp , [9] A. Dunkels, J. Alonso, T. Voigt, and H. Ritter, Distributed TCP Caching for Wireless Sensor Networks, SICS Research Report, [10] B. Marchi, A. Grilo, and M. Nunes, Dtsn: Distributed transport for sensor networks, pp , [11] C. K. Rupani and T. C. Aseri, An improved transport layer protocol for wireless sensor networks, Computer Communications, vol. 34, no. 6, pp ,

11 A Survey on Congestion Control at Transport Layer in Wireless Sensor Network [12] P. Mohanty and M. R. Kabat, Energy Efficient Hierarchical Reliable Transport Protocol in Wireless Sensor Networks, Global Journal on Technology, vol. 3, pp [13] F. Yunus, N.-S. Ismail, S. H. Ariffin, A. Shahidan, N. Fisal, and S. K. Syed-Yusof, Proposed Transport Protocol for Reliable Data Transfer in Wireless Sensor Network (WSN), in Modeling, Simulation and Applied Optimization (ICMSAO), th International Conference on, pp. 1 7, IEEE, [14] B. Sharma and T. Aseri, A Comparative Analysis of Reliable and Congestion-Aware Transport Layer Protocols for Wireless Sensor Networks, ISRN Sensor Networks, [15] C.-Y. Wan, S. B. Eisenman, and A. T. Campbell, CODA: congestion detection and avoidance in sensor networks, pp , [16] L. A. Freitas, A. R. Coimbra, V. Sacramento, S. Rosseto, and F. M. Costa, A Data Fusion Protocol in Wireless Sensor Networks for Controlled Environment, in INFOCOM Workshops 2009, IEEE, pp. 1 2, IEEE, [17] C. T. Ee and R. Bajcsy, Congestion control and fairness for many-to-one routing in sensor networks, in Proceedings of the 2nd international conference on Embedded networked sensor systems, pp , ACM, [18] C. Wang, K. Sohraby, V. Lawrence, B. Li, and Y. Hu, Priority-based Congestion Control in Wireless Sensor Networks, in Sensor Networks, Ubiquitous, and Trustworthy Computing, IEEE International Conference on, vol. 1, pp , IEEE, [19] D. Patil and S. N. Dhage, Priority-based Congestion Control Protocol (PCCP) for controlling upstream congestion in Wireless Sensor Network, in Communication, Information & Computing Technology (ICCICT), 2012 International Conference on, pp. 1 6, IEEE, [20] C. Wang, K. Sohraby, and B. Li, SenTCP: A hop-by-hop congestion control protocol for wireless sensor networks, in IEEE INFOCOM, pp , [21] N. Tezcan and W. Wang, ART: an asymmetric and reliable transport mechanism for wireless sensor networks, International Journal of Sensor Networks, vol. 2, no. 3-4, pp , [22] P. A. Levis, N. Patel, D. Culler, and S. Shenker, Trickle: A self-regulating algorithm for code propagation and maintenance in wireless sensor networks. Computer Science Division, University of California, [23] C.-Y. Wan, S. B. Eisenman, A. T. Campbell, and J. Crowcroft, Siphon: Overload traffic management using multi-radio virtual sinks in sensor networks, in Proceedings of the 3rd international conference on Embedded networked sensor systems, pp , ACM, [24] J. Paek and R. Govindan, Rcrt: Rate-controlled reliable transport for wireless sensor networks, in Proceedings of the 5th international conference on Embedded networked sensor systems, pp , ACM, [25] Y. G. Iyer, S. Gandham, and S. Venkatesan, STCP: A Generic Transport Layer Protocol for Wireless Sensor Networks, in Computer Communications and Networks, ICCCN Proceedings. 14th International Conference on, pp , IEEE, [26] L. Yong-Min, J. Xin-Hua, N. Xiao-Hong, and L. Wu-Yi, STCP: A Generic Transport Layer Protocol for Wireless Sensor Networks, in Proceedings of the 2009 Eigth IEEE/ACIS International Conference on Computer and Information Science, pp , IEEE Computer Society, [27] H. Faisal B, C. Yalcin, S. Ghalib A, et al., A multievent congestion control protocol for wireless sensor networks, EURASIP Journal on Wireless Communications and Networking, vol. 2008, [28] C. Basaran, K.-D. Kang, and M. H. Suzer, Hop-by- Hop Congestion Control and Load Balancing in Wireless Sensor Networks, in Local Computer Networks (LCN), 2010 IEEE 35th Conference on, pp , IEEE, [29] M. Zarei, A. M. Rahmani, R. Farazkish, and S. Zahirnia, FCCTF: Fairness Congestion Control for 27

12 OPEN TRANSACTIONS ON WIRELESS COMMUNICATIONS a distrustful wireless sensor network using Fuzzy logic, in Hybrid Intelligent Systems (HIS), th International Conference on, pp. 1 6, IEEE, [30] S. Jaiswal and A. Yadav, Fuzzy based adaptive congestion control in wireless sensor networks, in Contemporary Computing (IC3), 2013 Sixth International Conference on, pp , IEEE, [31] N. Farzaneh and M. H. Yaghmaee, Probability based hop selection approach for resource control in Wireless Sensor Network, in Telecommunications (IST), 2012 Sixth International Symposium on, pp , IEEE, [32] C. Sergiou, Performance-aware congestion control in wireless sensor networks using resource control, in World of Wireless, Mobile and Multimedia Networks (WoWMoM), 2013 IEEE 14th International Symposium and Workshops on a, pp. 1 2, IEEE, [33] C. Sonmez, O. D. Incel, S. Isik, M. Y. Donmez, and C. Ersoy, Fuzzy-based congestion control for wireless multimedia sensor networks, EURASIP Journal on Wireless Communications and Networking, vol. 2014, no. 1, pp. 1 17, [34] P. Singhal and A. Yadav, Neural network based congestion detection, IEEE International Conference of Convergence and Technology (I2CT), Pune, p. 72, [35] R. V. Kulkarni, A. Forster, and G. K. Venayagamoorthy, Computational intelligence in wireless sensor networks: A survey, Communications Surveys & Tutorials, IEEE, vol. 13, no. 1, pp ,

International Journal of Computer Science Trends and Technology (IJCST) Volume 3 Issue 2, Mar-Apr 2015

International Journal of Computer Science Trends and Technology (IJCST) Volume 3 Issue 2, Mar-Apr 2015 RESEARCH ARTICLE Mitigating Congestion in High Speed Wireless Multimedia Sensor Networks Using Energy Efficient Grid Based D 3 Technique Mantoj Kaur, Malti Rani Punjab Institute of Technology, Kapurthala,

More information

Comparison of Technical Features of Transport Protocols For Wireless Sensor Networks

Comparison of Technical Features of Transport Protocols For Wireless Sensor Networks ISSN: 2354-2373 Comparison of Technical Features of Transport Protocols For Wireless Sensor Networks By Raheleh Hashemzehi Reza ormandipour Research Article Comparison of Technical Features of Transport

More information

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK REVIEW ON CONGESTION CONTROL IN WIRELESS SENSOR NETWORK MR. HARSHAL D. WANKHADE,

More information

A Proposed Paper on Joint Priority Based Approach for Scheduling and Congestion Control in Multipath Multi-hop WSN

A Proposed Paper on Joint Priority Based Approach for Scheduling and Congestion Control in Multipath Multi-hop WSN A Proposed Paper on Joint Priority Based Approach for Scheduling and Congestion Control in Multipath Multi-hop WSN Sweta A.Kahurke M.Tech(IV) Wireless communication & Computing G.H.Raisoni College Of Engineering

More information

Wireless Sensor Network (WSN): A Reliable Data Transfer Using Spaced Hop by Hop Transport

Wireless Sensor Network (WSN): A Reliable Data Transfer Using Spaced Hop by Hop Transport International Journal of Engineering Science Invention ISSN (Online): 2319 6734, ISSN (Print): 2319 6726 Volume 2 Issue 5 ǁ May. 2013 ǁ PP.26-30 Wireless Sensor Network (WSN): A Reliable Data Transfer

More information

World Journal of Engineering Research and Technology WJERT

World Journal of Engineering Research and Technology WJERT wjert, 2018, Vol. 4, Issue 4, 527-537. Original Article ISSN 2454-695X Mukhtiar et al. WJERT www.wjert.org SJIF Impact Factor: 5.218 RPD: RELIABLE PACKETS DELIVERY CONGESTION CONTROL SCHEME IN WIRELESS

More information

Reliable Transport with Memory Consideration in Wireless Sensor Networks

Reliable Transport with Memory Consideration in Wireless Sensor Networks Reliable Transport with Memory Consideration in Wireless Sensor Networks Hongchao Zhou 1, Xiaohong Guan 1,2, Chengjie Wu 1 1 Department of Automation and TNLIST Lab, Tsinghua University, Beijing, China.

More information

Reliable Data Collection in Wireless Sensor Networks

Reliable Data Collection in Wireless Sensor Networks Reliable Data Collection in Wireless Sensor Networks Pramod A. Dharmadhikari PG Student M B E Society s College of Engineering, Ambajogai Maharashtra, India B. M. Patil Professor M B E Society s College

More information

Congestion in Wireless Sensor Networks and Various Techniques for Mitigating Congestion - A Review

Congestion in Wireless Sensor Networks and Various Techniques for Mitigating Congestion - A Review Congestion in Wireless Sensor Networks and Various Techniques for Mitigating Congestion - A Review V. Vijayaraja, Department of Computer Science Engineering Jaya Engineering College, Chennai, India vvijay1975@gmail.com

More information

Presentation and Analysis of Congestion Control Methods in Wireless Sensor Networks

Presentation and Analysis of Congestion Control Methods in Wireless Sensor Networks Presentation and Analysis of Congestion Control Methods in Wireless Sensor Networks University of Cyprus Department of Computer Science Charalambos Sergiou Networks Research Laboratory Department of Computer

More information

Ad hoc and Sensor Networks Chapter 13a: Protocols for dependable data transport

Ad hoc and Sensor Networks Chapter 13a: Protocols for dependable data transport Ad hoc and Sensor Networks Chapter 13a: Protocols for dependable data transport Holger Karl Computer Networks Group Universität Paderborn Overview Dependability requirements Delivering single packets Delivering

More information

Early View. Priority based Congestion Control Mechanism in Multipath Wireless Sensor Network

Early View. Priority based Congestion Control Mechanism in Multipath Wireless Sensor Network Priority based Control Mechanism in Multipath Wireless Sensor Network Md. Ahsanul Hoque α, Nazrul Islam σ, Sajjad Waheed ρ & Abu Sayed Siddique Ѡ Abstract- Wireless Sensor Network (WSN) is a network composed

More information

Congestion Detection Approaches In Wireless Sensor Networks: -A Comparative Study

Congestion Detection Approaches In Wireless Sensor Networks: -A Comparative Study International Journal of Engineering Research and Development e-issn: 2278-067X, p-issn: 2278-800X, www.ijerd.com Volume 12, Issue 3 (March 2016), PP.59-63 Congestion Detection Approaches In Wireless Sensor

More information

TRANSPORT LAYER PROTOCOL FOR URGENT DATA TRANSMISSION IN WSN

TRANSPORT LAYER PROTOCOL FOR URGENT DATA TRANSMISSION IN WSN TRANSPORT LAYER PROTOCOL FOR URGENT DATA TRANSMISSION IN WSN AshwiniD.Karanjawane 1, Atul W. Rohankar 2, S. D. Mali 3, A. A. Agarkar 4 1, 3 Department of E&TC, Sinhgad College of Engineering, Maharashtra,

More information

AN EFFICIENT MAC PROTOCOL FOR SUPPORTING QOS IN WIRELESS SENSOR NETWORKS

AN EFFICIENT MAC PROTOCOL FOR SUPPORTING QOS IN WIRELESS SENSOR NETWORKS AN EFFICIENT MAC PROTOCOL FOR SUPPORTING QOS IN WIRELESS SENSOR NETWORKS YINGHUI QIU School of Electrical and Electronic Engineering, North China Electric Power University, Beijing, 102206, China ABSTRACT

More information

TRANSPORT PROTOCOLS & CONGESTION CONTROL IN WIRELESS SENSOR NETWORKS

TRANSPORT PROTOCOLS & CONGESTION CONTROL IN WIRELESS SENSOR NETWORKS TRANSPORT PROTOCOLS & CONGESTION CONTROL IN WIRELESS SENSOR NETWORKS C. Pham http://www.univ-pau.fr/~cpham University of Pau, France Visiting Professor at UTS (Prof. D. Hoang) TRANSPORT PROTOCOLS AND CC

More information

WSN Routing Protocols

WSN Routing Protocols WSN Routing Protocols 1 Routing Challenges and Design Issues in WSNs 2 Overview The design of routing protocols in WSNs is influenced by many challenging factors. These factors must be overcome before

More information

Class Based Congestion Control method for Wireless Sensor Networks

Class Based Congestion Control method for Wireless Sensor Networks 1 Class Based Congestion Control method for Wireless Sensor Networks Abbas Ali Rezaee Ph.D Student, CE Department, Science and Research Branch,Islamic Azad University (IAU), Tehran, Iran. aa.rezaee@srbiau.ac.ir

More information

QoS Challenges and QoS-Aware MAC Protocols in Wireless Sensor Networks

QoS Challenges and QoS-Aware MAC Protocols in Wireless Sensor Networks QoS Challenges and QoS-Aware MAC Protocols in Wireless Sensor Networks S. Shiney Lillia PG Student, Department of Computer Science and Engineering, National Institute of Technology Puducherry, Puducherry,

More information

Tree Based Energy and Congestion Aware Routing Protocol for Wireless Sensor Networks

Tree Based Energy and Congestion Aware Routing Protocol for Wireless Sensor Networks Wireless Sensor Network, 21, February, 161-167 doi:1.4236/wsn.21.2221 Published Online February 21 (http://www.scirp.org/journal/wsn/). Tree Based Energy and Congestion Aware Routing Protocol for Wireless

More information

RCRT:Rate-Controlled Reliable Transport Protocol for Wireless Sensor Networks

RCRT:Rate-Controlled Reliable Transport Protocol for Wireless Sensor Networks RCRT:Rate-Controlled Reliable Transport Protocol for Wireless Sensor Networks JEONGYEUP PAEK, RAMESH GOVINDAN University of Southern California 1 Applications that require the transport of high-rate data

More information

To address these challenges, extensive research has been conducted and have introduced six key areas of streaming video, namely: video compression,

To address these challenges, extensive research has been conducted and have introduced six key areas of streaming video, namely: video compression, Design of an Application Layer Congestion Control for Reducing network load and Receiver based Buffering Technique for packet synchronization in Video Streaming over the Internet Protocol Mushfeq-Us-Saleheen

More information

Security Analysis of Reliable Transport Layer Protocols for Wireless Sensor Networks

Security Analysis of Reliable Transport Layer Protocols for Wireless Sensor Networks Security Analysis of Reliable Transport Layer Protocols for Wireless Sensor Networks Levente Buttyán and László Csik Laboratory of Cryptography and Systems Security (CrySyS) Department of Telecommunications

More information

Performance of UMTS Radio Link Control

Performance of UMTS Radio Link Control Performance of UMTS Radio Link Control Qinqing Zhang, Hsuan-Jung Su Bell Laboratories, Lucent Technologies Holmdel, NJ 77 Abstract- The Radio Link Control (RLC) protocol in Universal Mobile Telecommunication

More information

A FUZZY APPROACH TO DETECT AND CONTROL CONGESTION IN WIRELESS SENSOR NETWORKS

A FUZZY APPROACH TO DETECT AND CONTROL CONGESTION IN WIRELESS SENSOR NETWORKS A FUZZY APPROACH TO DETECT AND CONTROL CONGESTION IN WIRELESS SENSOR NETWORKS Abstract Rekha Chakravarthi Research Scholar, SathyabamaUniversity,Jeppiaar Nagar, Chennai,600119,India rekha_2705@yahoocoin

More information

New Active Caching Method to Guarantee Desired Communication Reliability in Wireless Sensor Networks

New Active Caching Method to Guarantee Desired Communication Reliability in Wireless Sensor Networks J. Basic. Appl. Sci. Res., 2(5)4880-4885, 2012 2012, TextRoad Publication ISSN 2090-4304 Journal of Basic and Applied Scientific Research www.textroad.com New Active Caching Method to Guarantee Desired

More information

Chapter 5 Ad Hoc Wireless Network. Jang Ping Sheu

Chapter 5 Ad Hoc Wireless Network. Jang Ping Sheu Chapter 5 Ad Hoc Wireless Network Jang Ping Sheu Introduction Ad Hoc Network is a multi-hop relaying network ALOHAnet developed in 1970 Ethernet developed in 1980 In 1994, Bluetooth proposed by Ericsson

More information

An overview: Medium Access Control and Transport protocol for Wireless Sensor Networks

An overview: Medium Access Control and Transport protocol for Wireless Sensor Networks An overview: Medium Access Control and Transport protocol for Wireless Sensor Networks Carlene E-A Campbell, Ibrar A Shah, Kok-Keong Loo carlnjam@gmail.com, ibrarali.shah@yahoo.com, Jonathan.loo75@gmail.com

More information

Congestion Control using Active agent in Wireless Sensor Network

Congestion Control using Active agent in Wireless Sensor Network I J C International Journal of lectrical, lectronics ISSN No. (Online): 2277-2626 and Computer ngineering 4(1): 120-124(2015) Congestion Control using Active agent in Wireless Sensor Network Sheetal Meshram*,

More information

Time Synchronization in Wireless Sensor Networks: CCTS

Time Synchronization in Wireless Sensor Networks: CCTS Time Synchronization in Wireless Sensor Networks: CCTS 1 Nerin Thomas, 2 Smita C Thomas 1, 2 M.G University, Mount Zion College of Engineering, Pathanamthitta, India Abstract: A time synchronization algorithm

More information

Impact of IEEE MAC Packet Size on Performance of Wireless Sensor Networks

Impact of IEEE MAC Packet Size on Performance of Wireless Sensor Networks IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735.Volume 10, Issue 3, Ver. IV (May - Jun.2015), PP 06-11 www.iosrjournals.org Impact of IEEE 802.11

More information

ROUTING ALGORITHMS Part 1: Data centric and hierarchical protocols

ROUTING ALGORITHMS Part 1: Data centric and hierarchical protocols ROUTING ALGORITHMS Part 1: Data centric and hierarchical protocols 1 Why can t we use conventional routing algorithms here?? A sensor node does not have an identity (address) Content based and data centric

More information

Unit 2 Packet Switching Networks - II

Unit 2 Packet Switching Networks - II Unit 2 Packet Switching Networks - II Dijkstra Algorithm: Finding shortest path Algorithm for finding shortest paths N: set of nodes for which shortest path already found Initialization: (Start with source

More information

Mobile Agent Driven Time Synchronized Energy Efficient WSN

Mobile Agent Driven Time Synchronized Energy Efficient WSN Mobile Agent Driven Time Synchronized Energy Efficient WSN Sharanu 1, Padmapriya Patil 2 1 M.Tech, Department of Electronics and Communication Engineering, Poojya Doddappa Appa College of Engineering,

More information

Routing protocols in WSN

Routing protocols in WSN Routing protocols in WSN 1.1 WSN Routing Scheme Data collected by sensor nodes in a WSN is typically propagated toward a base station (gateway) that links the WSN with other networks where the data can

More information

A Survey on Traffic Aware Congestion Control Techniques in Wireless Sensor Network

A Survey on Traffic Aware Congestion Control Techniques in Wireless Sensor Network A Survey on Traffic Aware Congestion Control Techniques in Wireless Sensor Network Monali Panchal 1, Vijay Reshamwala 2 P.G. Student, Dept. of Computer Engineering, C.G.P.I.T, Uka Tarasadia University,

More information

CROSS LAYER PROTOCOL (APTEEN) USING WSN FOR REAL TIME APPLICATION

CROSS LAYER PROTOCOL (APTEEN) USING WSN FOR REAL TIME APPLICATION CROSS LAYER PROTOCOL (APTEEN) USING WSN FOR REAL TIME APPLICATION V. A. Dahifale 1, N. Y. Siddiqui 2 PG Student, College of Engineering Kopargaon, Maharashtra, India 1 Assistant Professor, College of Engineering

More information

A Study on Traffic Aware Routing Protocol for Wireless Sensor Networks

A Study on Traffic Aware Routing Protocol for Wireless Sensor Networks A Study on Traffic Aware Routing Protocol for Wireless Sensor Networks Gopi.T 1, Santhi.B 2 School of computing, SASTRA University Tirumalaisamudram, Thanjavur, Tamilnadu, India. 1 gopi_fgh@yahoo.co.in

More information

Cross Layer Transport Layer Approach for Multihop Wireless Sensor Network

Cross Layer Transport Layer Approach for Multihop Wireless Sensor Network International Journal of Scientific and Research Publications, Volume 3, Issue 1, January 2013 1 Cross Layer Transport Layer Approach for Multihop Wireless Sensor Network Vaishali Rajput *, Tanaji Khadtare

More information

A Technical Study of Transport Layer Protocols for Wireless Sensor Network

A Technical Study of Transport Layer Protocols for Wireless Sensor Network A Technical Study of Transport Layer Protocols for Wireless Sensor Network Monika Sharma PEC University of Technology Chandigarh, India Bhisham Sharma PEC University of Technology Chandigarh, India Trilok

More information

UNIT IV -- TRANSPORT LAYER

UNIT IV -- TRANSPORT LAYER UNIT IV -- TRANSPORT LAYER TABLE OF CONTENTS 4.1. Transport layer. 02 4.2. Reliable delivery service. 03 4.3. Congestion control. 05 4.4. Connection establishment.. 07 4.5. Flow control 09 4.6. Transmission

More information

CSMA based Medium Access Control for Wireless Sensor Network

CSMA based Medium Access Control for Wireless Sensor Network CSMA based Medium Access Control for Wireless Sensor Network H. Hoang, Halmstad University Abstract Wireless sensor networks bring many challenges on implementation of Medium Access Control protocols because

More information

CHAPTER 3 EFFECTIVE ADMISSION CONTROL MECHANISM IN WIRELESS MESH NETWORKS

CHAPTER 3 EFFECTIVE ADMISSION CONTROL MECHANISM IN WIRELESS MESH NETWORKS 28 CHAPTER 3 EFFECTIVE ADMISSION CONTROL MECHANISM IN WIRELESS MESH NETWORKS Introduction Measurement-based scheme, that constantly monitors the network, will incorporate the current network state in the

More information

WSN NETWORK ARCHITECTURES AND PROTOCOL STACK

WSN NETWORK ARCHITECTURES AND PROTOCOL STACK WSN NETWORK ARCHITECTURES AND PROTOCOL STACK Sensing is a technique used to gather information about a physical object or process, including the occurrence of events (i.e., changes in state such as a drop

More information

Delay Constrained ARQ Mechanism for MPEG Media Transport Protocol Based Video Streaming over Internet

Delay Constrained ARQ Mechanism for MPEG Media Transport Protocol Based Video Streaming over Internet Delay Constrained ARQ Mechanism for MPEG Media Transport Protocol Based Video Streaming over Internet Hong-rae Lee, Tae-jun Jung, Kwang-deok Seo Division of Computer and Telecommunications Engineering

More information

II. Principles of Computer Communications Network and Transport Layer

II. Principles of Computer Communications Network and Transport Layer II. Principles of Computer Communications Network and Transport Layer A. Internet Protocol (IP) IPv4 Header An IP datagram consists of a header part and a text part. The header has a 20-byte fixed part

More information

Minimization of Collision in Energy Constrained Wireless Sensor Network

Minimization of Collision in Energy Constrained Wireless Sensor Network Wireless Sensor Network, 2009, 1, 350-357 doi:10.4236/wsn.2009.14043 Published Online November 2009 (http://www.scirp.org/journal/wsn). Minimization of Collision in Energy Constrained Wireless Sensor Network

More information

CC-SCTP: Chunk Checksum of SCTP for Enhancement of Throughput in Wireless Network Environments

CC-SCTP: Chunk Checksum of SCTP for Enhancement of Throughput in Wireless Network Environments CC-SCTP: Chunk Checksum of SCTP for Enhancement of Throughput in Wireless Network Environments Stream Control Transmission Protocol (SCTP) uses the 32-bit checksum in the common header, by which a corrupted

More information

A Survey of Transport Layer Protocols for Wireless Sensor Networks

A Survey of Transport Layer Protocols for Wireless Sensor Networks A Survey of Transport Layer Protocols for Wireless Sensor Networks Saima Zafar Department of Electrical Engineering National University of Computer and Emerging Sciences, FAST-NU Block B Faisal Town Lahore

More information

Analysis of Cluster based Routing Algorithms in Wireless Sensor Networks using NS2 simulator

Analysis of Cluster based Routing Algorithms in Wireless Sensor Networks using NS2 simulator Analysis of Cluster based Routing Algorithms in Wireless Sensor Networks using NS2 simulator Ashika R. Naik Department of Electronics & Tele-communication, Goa College of Engineering (India) ABSTRACT Wireless

More information

Fig. 2: Architecture of sensor node

Fig. 2: Architecture of sensor node Volume 4, Issue 11, November 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com To Reduce

More information

Analysis of Black-Hole Attack in MANET using AODV Routing Protocol

Analysis of Black-Hole Attack in MANET using AODV Routing Protocol Analysis of Black-Hole Attack in MANET using Routing Protocol Ms Neha Choudhary Electronics and Communication Truba College of Engineering, Indore India Dr Sudhir Agrawal Electronics and Communication

More information

Energy-Efficient Routing Protocol in Event-Driven Wireless Sensor Networks

Energy-Efficient Routing Protocol in Event-Driven Wireless Sensor Networks Energy-Efficient Routing Protocol in Event-Driven Wireless Sensor Networks Yan Sun, Haiqin Liu, and Min Sik Kim School of Electrical Engineering and Computer Science Washington State University Pullman,

More information

Reliable Event Detection and Congestion Avoidance in Wireless Sensor Networks

Reliable Event Detection and Congestion Avoidance in Wireless Sensor Networks Reliable Event Detection and Congestion Avoidance in Wireless Sensor Networks Md. Mamun-Or-Rashid, Muhammad Mahbub Alam, Md. Abdur Razzaque, and Choong Seon Hong * Networking Lab, Department of Computer

More information

Study on Wireless Sensor Networks Challenges and Routing Protocols

Study on Wireless Sensor Networks Challenges and Routing Protocols International Research Journal of Applied and Basic Sciences 2013 Available online at www.irjabs.com ISSN 2251-838X / Vol, 5 (7): 824-828 Science Explorer Publications Study on Wireless Sensor Networks

More information

Transport layer issues

Transport layer issues Transport layer issues Dmitrij Lagutin, dlagutin@cc.hut.fi T-79.5401 Special Course in Mobility Management: Ad hoc networks, 28.3.2007 Contents Issues in designing a transport layer protocol for ad hoc

More information

Impact of Black Hole and Sink Hole Attacks on Routing Protocols for WSN

Impact of Black Hole and Sink Hole Attacks on Routing Protocols for WSN Impact of Black Hole and Sink Hole Attacks on Routing Protocols for WSN Padmalaya Nayak V. Bhavani B. Lavanya ABSTRACT With the drastic growth of Internet and VLSI design, applications of WSNs are increasing

More information

A PERFORMANCE EVALUATION OF YMAC A MEDIUM ACCESS PROTOCOL FOR WSN

A PERFORMANCE EVALUATION OF YMAC A MEDIUM ACCESS PROTOCOL FOR WSN A PERFORMANCE EVALUATION OF YMAC A MEDIUM ACCESS PROTOCOL FOR WSN Albeiro Cortés Cabezas and José de Jesús Salgado Patrón Department of Electronic Engineering, Surcolombiana University, Neiva, Colombia

More information

Survey on Reliability Control Using CLR Method with Tour Planning Mechanism in WSN

Survey on Reliability Control Using CLR Method with Tour Planning Mechanism in WSN Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 5, May 2015, pg.854

More information

Performance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s

Performance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s Performance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s M. Nagaratna Assistant Professor Dept. of CSE JNTUH, Hyderabad, India V. Kamakshi Prasad Prof & Additional Cont. of. Examinations

More information

Hop-to-Hop Reliability in IP-based Wireless Sensor Networks - a Cross-Layer Approach

Hop-to-Hop Reliability in IP-based Wireless Sensor Networks - a Cross-Layer Approach Hop-to-Hop Reliability in IP-based Wireless Sensor Networks - a Cross-Layer Approach Gerald Wagenknecht, Markus Anwander, and Torsten Braun Institute of Computer Science and Applied Mathematics University

More information

Multi-metrics based Congestion Control protocol in Wireless Sensor Network

Multi-metrics based Congestion Control protocol in Wireless Sensor Network e-issn 2455 1392 Volume 2 Issue 5, May 2016 pp. 536 543 Scientific Journal Impact Factor : 3.468 http://www.ijcter.com Multi-metrics based Congestion Control protocol in Wireless Sensor Network Sushma

More information

Delay Performance of Multi-hop Wireless Sensor Networks With Mobile Sinks

Delay Performance of Multi-hop Wireless Sensor Networks With Mobile Sinks Delay Performance of Multi-hop Wireless Sensor Networks With Mobile Sinks Aswathy M.V & Sreekantha Kumar V.P CSE Dept, Anna University, KCG College of Technology, Karappakkam,Chennai E-mail : aswathy.mv1@gmail.com,

More information

Subject: Adhoc Networks

Subject: Adhoc Networks ISSUES IN AD HOC WIRELESS NETWORKS The major issues that affect the design, deployment, & performance of an ad hoc wireless network system are: Medium Access Scheme. Transport Layer Protocol. Routing.

More information

Designing Path Assured Data Transfer Protocol for Wireless Sensor Network

Designing Path Assured Data Transfer Protocol for Wireless Sensor Network Designing Path Assured Data Transfer Protocol for Wireless Sensor Network Ashwini D.Karanjawane 1, Atul W. Rohankar 2, S. D. Mali 1, A. A. Agarkar 2 1 Department of E&TC, Sinhgad College of Engineering,Pune,

More information

Toward a Reliable Data Transport Architecture for Optical Burst-Switched Networks

Toward a Reliable Data Transport Architecture for Optical Burst-Switched Networks Toward a Reliable Data Transport Architecture for Optical Burst-Switched Networks Dr. Vinod Vokkarane Assistant Professor, Computer and Information Science Co-Director, Advanced Computer Networks Lab University

More information

Implementation of an Adaptive MAC Protocol in WSN using Network Simulator-2

Implementation of an Adaptive MAC Protocol in WSN using Network Simulator-2 Implementation of an Adaptive MAC Protocol in WSN using Network Simulator-2 1 Suresh, 2 C.B.Vinutha, 3 Dr.M.Z Kurian 1 4 th Sem, M.Tech (Digital Electronics), SSIT, Tumkur 2 Lecturer, Dept.of E&C, SSIT,

More information

End-to-End Mechanisms for QoS Support in Wireless Networks

End-to-End Mechanisms for QoS Support in Wireless Networks End-to-End Mechanisms for QoS Support in Wireless Networks R VS Torsten Braun joint work with Matthias Scheidegger, Marco Studer, Ruy de Oliveira Computer Networks and Distributed Systems Institute of

More information

Energy Efficient Data Gathering For Throughput Maximization with Multicast Protocol In Wireless Sensor Networks

Energy Efficient Data Gathering For Throughput Maximization with Multicast Protocol In Wireless Sensor Networks Energy Efficient Data Gathering For Throughput Maximization with Multicast Protocol In Wireless Sensor Networks S. Gokilarani 1, P. B. Pankajavalli 2 1 Research Scholar, Kongu Arts and Science College,

More information

Dynamic Deferred Acknowledgment Mechanism for Improving the Performance of TCP in Multi-Hop Wireless Networks

Dynamic Deferred Acknowledgment Mechanism for Improving the Performance of TCP in Multi-Hop Wireless Networks Dynamic Deferred Acknowledgment Mechanism for Improving the Performance of TCP in Multi-Hop Wireless Networks Dodda Sunitha Dr.A.Nagaraju Dr. G.Narsimha Assistant Professor of IT Dept. Central University

More information

Intra and Inter Cluster Synchronization Scheme for Cluster Based Sensor Network

Intra and Inter Cluster Synchronization Scheme for Cluster Based Sensor Network Intra and Inter Cluster Synchronization Scheme for Cluster Based Sensor Network V. Shunmuga Sundari 1, N. Mymoon Zuviria 2 1 Student, 2 Asisstant Professor, Computer Science and Engineering, National College

More information

A UGC Recommended Journal Page 73

A UGC Recommended Journal Page 73 Congestion control in Wireless Sensor Network based on prediction modeling with HMM N. Thrimoorthy 1, Dr.T. Anuradha 2 1 Assistant Professor, New Horizon College of Engineering, Bangalore, India. 2 Associate

More information

Reservation Packet Medium Access Control for Wireless Sensor Networks

Reservation Packet Medium Access Control for Wireless Sensor Networks Reservation Packet Medium Access Control for Wireless Sensor Networks Hengguang Li and Paul D Mitchell Abstract - This paper introduces the Reservation Packet Medium Access Control (RP-MAC) protocol for

More information

CS321: Computer Networks Congestion Control in TCP

CS321: Computer Networks Congestion Control in TCP CS321: Computer Networks Congestion Control in TCP Dr. Manas Khatua Assistant Professor Dept. of CSE IIT Jodhpur E-mail: manaskhatua@iitj.ac.in Causes and Cost of Congestion Scenario-1: Two Senders, a

More information

Congestion Control in Wireless Sensor Networks: A survey

Congestion Control in Wireless Sensor Networks: A survey RESEARCH ARTICLE OPEN ACCESS Congestion Control in Wireless Sensor Networks: A survey Samita Indurkar *, N. P. Kulkarni ** *(Department of information Technology, Pune University,Pune-41) ** (Department

More information

Computer Networks 53 (2009) Contents lists available at ScienceDirect. Computer Networks. journal homepage:

Computer Networks 53 (2009) Contents lists available at ScienceDirect. Computer Networks. journal homepage: Computer Networks 53 (2009) 1879 1902 Contents lists available at ScienceDirect Computer Networks journal homepage: www.elsevier.com/locate/comnet An energy-efficient, transport-controlled MAC protocol

More information

Congestion Control Technique with Safety Transmission of Messages in Vehicular Ad Hoc Network

Congestion Control Technique with Safety Transmission of Messages in Vehicular Ad Hoc Network Congestion Control Technique with Safety Transmission of Messages in Vehicular Ad Hoc Network Bhagyashri P. Deshpande 1, Dr.A.S.Alvi 2 1 M.E(CSE) PRMIT&R, Badnera, Amravati 2 Professor,Dept. of CSE PRMIT&R,Badnera,

More information

SIMPLE MODEL FOR TRANSMISSION CONTROL PROTOCOL (TCP) Irma Aslanishvili, Tariel Khvedelidze

SIMPLE MODEL FOR TRANSMISSION CONTROL PROTOCOL (TCP) Irma Aslanishvili, Tariel Khvedelidze 80 SIMPLE MODEL FOR TRANSMISSION CONTROL PROTOCOL (TCP) Irma Aslanishvili, Tariel Khvedelidze Abstract: Ad hoc Networks are complex distributed systems that consist of wireless mobile or static nodes that

More information

IJREAT International Journal of Research in Engineering & Advanced Technology, Volume 1, Issue 2, April-May, 2013 ISSN:

IJREAT International Journal of Research in Engineering & Advanced Technology, Volume 1, Issue 2, April-May, 2013 ISSN: Fast Data Collection with Reduced Interference and Increased Life Time in Wireless Sensor Networks Jayachandran.J 1 and Ramalakshmi.R 2 1 M.Tech Network Engineering, Kalasalingam University, Krishnan koil.

More information

Priority Based Congestion Detection and Avoidance in Wireless Sensor Networks

Priority Based Congestion Detection and Avoidance in Wireless Sensor Networks Journal of Computer Science, 9 (3): 350-357, 2013 ISSN 1549-3636 2013 Jayakumari and Senthilkumar, This open access article is distributed under a Creative Commons Attribution (CC-BY) 3.0 license doi:10.3844/jcssp.2013.350.357

More information

cs/ee 143 Communication Networks

cs/ee 143 Communication Networks cs/ee 143 Communication Networks Chapter 4 Transport Text: Walrand & Parakh, 2010 Steven Low CMS, EE, Caltech Recap: Internet overview Some basic mechanisms n Packet switching n Addressing n Routing o

More information

Randomization. Randomization used in many protocols We ll study examples:

Randomization. Randomization used in many protocols We ll study examples: Randomization Randomization used in many protocols We ll study examples: Ethernet multiple access protocol Router (de)synchronization Switch scheduling 1 Ethernet Single shared broadcast channel 2+ simultaneous

More information

Randomization used in many protocols We ll study examples: Ethernet multiple access protocol Router (de)synchronization Switch scheduling

Randomization used in many protocols We ll study examples: Ethernet multiple access protocol Router (de)synchronization Switch scheduling Randomization Randomization used in many protocols We ll study examples: Ethernet multiple access protocol Router (de)synchronization Switch scheduling 1 Ethernet Single shared broadcast channel 2+ simultaneous

More information

Chapter 7 CONCLUSION

Chapter 7 CONCLUSION 97 Chapter 7 CONCLUSION 7.1. Introduction A Mobile Ad-hoc Network (MANET) could be considered as network of mobile nodes which communicate with each other without any fixed infrastructure. The nodes in

More information

Transmission Control Protocol. ITS 413 Internet Technologies and Applications

Transmission Control Protocol. ITS 413 Internet Technologies and Applications Transmission Control Protocol ITS 413 Internet Technologies and Applications Contents Overview of TCP (Review) TCP and Congestion Control The Causes of Congestion Approaches to Congestion Control TCP Congestion

More information

MEASURING PERFORMANCE OF VARIANTS OF TCP CONGESTION CONTROL PROTOCOLS

MEASURING PERFORMANCE OF VARIANTS OF TCP CONGESTION CONTROL PROTOCOLS MEASURING PERFORMANCE OF VARIANTS OF TCP CONGESTION CONTROL PROTOCOLS Harjinder Kaur CSE, GZSCCET, Dabwali Road, Bathinda, Punjab, India, sidhuharryab@gmail.com Gurpreet Singh Abstract CSE, GZSCCET, Dabwali

More information

CMPE 257: Wireless and Mobile Networking

CMPE 257: Wireless and Mobile Networking CMPE 257: Wireless and Mobile Networking Katia Obraczka Computer Engineering UCSC Baskin Engineering Lecture 10 CMPE 257 Spring'15 1 Student Presentations Schedule May 21: Sam and Anuj May 26: Larissa

More information

ALL ABOUT DATA AGGREGATION IN WIRELESS SENSOR NETWORKS

ALL ABOUT DATA AGGREGATION IN WIRELESS SENSOR NETWORKS e-issn 2455 1392 Volume 1 Issue 1, November 2015 pp. 1-7 http://www.ijcter.com ALL ABOUT DATA AGGREGATION IN WIRELESS SENSOR NETWORKS Komal Shah 1, Heena Sheth 2 1,2 M. S. University, Baroda Abstract--

More information

Intelligent Transportation Systems. Medium Access Control. Prof. Dr. Thomas Strang

Intelligent Transportation Systems. Medium Access Control. Prof. Dr. Thomas Strang Intelligent Transportation Systems Medium Access Control Prof. Dr. Thomas Strang Recap: Wireless Interconnections Networking types + Scalability + Range Delay Individuality Broadcast o Scalability o Range

More information

Comparison of TDMA based Routing Protocols for Wireless Sensor Networks-A Survey

Comparison of TDMA based Routing Protocols for Wireless Sensor Networks-A Survey Comparison of TDMA based Routing Protocols for Wireless Sensor Networks-A Survey S. Rajesh, Dr. A.N. Jayanthi, J.Mala, K.Senthamarai Sri Ramakrishna Institute of Technology, Coimbatore ABSTRACT One of

More information

Chapter 24 Congestion Control and Quality of Service 24.1

Chapter 24 Congestion Control and Quality of Service 24.1 Chapter 24 Congestion Control and Quality of Service 24.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 24-1 DATA TRAFFIC The main focus of congestion control

More information

Multicasting in ad hoc networks: Energy efficient

Multicasting in ad hoc networks: Energy efficient Multicasting in ad hoc networks: Energy efficient Blerta Bishaj Helsinki University of Technology 1. Introduction...2 2. Sources of power consumption... 3 3. Directional antennas... 3 4. TCP... 3 5. Energy-efficient

More information

Congestion in Data Networks. Congestion in Data Networks

Congestion in Data Networks. Congestion in Data Networks Congestion in Data Networks CS420/520 Axel Krings 1 Congestion in Data Networks What is Congestion? Congestion occurs when the number of packets being transmitted through the network approaches the packet

More information

Collaborative Transport Control Protocol for Sensor Networks

Collaborative Transport Control Protocol for Sensor Networks Collaborative Transport Control Protocol for Sensor Networks Eugenia Giancoli CEFET/MG - Brasil eugenia@gta.ufrj.br Filippe Jabour CEFET/MG - Brasil jabour@gta.ufrj.br Aloysio Pedroza Brasil aloysio@gta.ufrj.br

More information

Congestion Control in Mobile Ad-Hoc Networks

Congestion Control in Mobile Ad-Hoc Networks Congestion Control in Mobile Ad-Hoc Networks 1 Sandeep Rana, 2 Varun Pundir, 3 Ram Sewak Singh, 4 Deepak Yadav 1, 2, 3, 4 Shanti Institute of Technology, Meerut Email: sandeepmietcs@gmail.com Email: varunpundir@hotmail.com

More information

Routing over Low Power and Lossy Networks

Routing over Low Power and Lossy Networks outing over Low Power and Lossy Networks Analysis and possible enhancements of the IETF PL routing protocol Enzo Mingozzi Associate Professor @ University of Pisa e.mingozzi@iet.unipi.it outing over LLNs

More information

Managing Caching Performance and Differentiated Services

Managing Caching Performance and Differentiated Services CHAPTER 10 Managing Caching Performance and Differentiated Services This chapter explains how to configure TCP stack parameters for increased performance ant throughput and how to configure Type of Service

More information

Study and Comparison of Mesh and Tree- Based Multicast Routing Protocols for MANETs

Study and Comparison of Mesh and Tree- Based Multicast Routing Protocols for MANETs Study and Comparison of Mesh and Tree- Based Multicast Routing Protocols for MANETs Rajneesh Gujral Associate Proffesor (CSE Deptt.) Maharishi Markandeshwar University, Mullana, Ambala Sanjeev Rana Associate

More information

Lecture 8 Wireless Sensor Networks: Overview

Lecture 8 Wireless Sensor Networks: Overview Lecture 8 Wireless Sensor Networks: Overview Reading: Wireless Sensor Networks, in Ad Hoc Wireless Networks: Architectures and Protocols, Chapter 12, sections 12.1-12.2. I. Akyildiz, W. Su, Y. Sankarasubramaniam

More information

3. Evaluation of Selected Tree and Mesh based Routing Protocols

3. Evaluation of Selected Tree and Mesh based Routing Protocols 33 3. Evaluation of Selected Tree and Mesh based Routing Protocols 3.1 Introduction Construction of best possible multicast trees and maintaining the group connections in sequence is challenging even in

More information