A Survey on Congestion Control at Transport Layer in Wireless Sensor Network
|
|
- Caroline Davidson
- 6 years ago
- Views:
Transcription
1 OPEN TRANSACTIONS ON WIRELESS COMMUNICATIONS Volume 1, Number 1, December 2014 OPEN TRANSACTIONS ON WIRELESS COMMUNICATIONS A Survey on Congestion Control at Transport Layer in Wireless Sensor Network Prakul Singhal*, Anamika Yadav Department of Electrical Engineering, NIT Raipur, C.G. (India) *Corresponding author: prakul 2008@yahoo.co.in Abstract: Congestion control in a wireless sensor network is a vital issue in the present scenario. In this paper, a comprehensive survey on congestion control schemes at transport layer in a wireless sensor network is presented. At transport layer, the protocols are based on two approaches viz. Reliability and congestion control. Various protocols in each category have been discussed. Thorough survey on various congestion control schemes has been done. Latest research work including artificial intelligence based techniques e.g. fuzzy logic as well as neural network adaptive based congestion control scheme have been included. Keywords: Wireless Sensor Network; Congestion Control Protocols; Reliability Protocols; Buffer Occupancy; Rate Adjustment 1. INTRODUCTION Wireless sensor networks (WSN) are the collection of hundreds or thousands of sensor nodes distributed randomly in a geographical area. Each sensor node has the ability to sense, communicate and compute. They have processor, memory, transceiver and sensors with limited battery life. WSN are used to monitor events in a region where humans are incapable to monitor. It cooperatively monitors different conditions, like sound, temperature, vibration, pressure and motion etc within a region. The data collected from the region are sent to the sink nodes that connect the sensor network with one or more users as shown in Figure 1. The main characteristics of a WSN are mobile nodes, tolerant node failures, scalability to large scale of deployment, nodes heterogeneity and low power consumption. It can be used in many applications such as habitat monitoring, health care security surveillance, target tracking, military application and etc. However, there are some problems that need to be overcome, for example, reliability data delivery and congestion control. These problems are controlled through the help of protocols. Some protocols provide only reliability [1 3], some provide only congestion control [2] and some others provide both reliability and congestion control [2]. 17
2 OPEN TRANSACTIONS ON WIRELESS COMMUNICATIONS Figure 1. Wireless Sensor Networks 2. TRANSRORT PROTOCOLS There are two major functions in the transport protocol of WSNs i.e. reliability and congestion control. Reliable data delivery means packet should reach the destination in multi-hop WSN; if not then proper mechanism is applied to recover the lost packet. Congestion occurs when there is many to one type scenario or if packet service time is more as compared to packet arrival time. This creates a situation of traffic which exceeds the network capacity. Due to congestion in a WSN, congested nodes initiate to drop data packets or the delay of the packets due to large and filled queue. Dropping of packets cause wastage of energy and also affect reliability. The reliability and congestion control can be done by hop-by-hop or by end-to-end approach. 2.1 Protocol for Reliability Reliability means accurate delivery of data packet from source to destination. It can be either Upstream or Downstream Reliability. In Upstream reliability, data packets move from source to sink node whereas in downstream reliability it moves from sink to source node. If data packet moves in both directions then it is known as Bidirectional reliability. Reliability protocols are classified into two general classes namely (1) packet-based and (2) event-based. In packet-based reliability, lost packets are detected at sink or any intermediate nodes. And for achieving reliability, retransmission of lost packet is carried out. Whereas, in event-based approach the reliability achieved at sink node is signaled back to source, which is done by the help of end-to-end source rate adjustment. Various protocols for achieving reliability are: ERTP: Energy-efficient Transport Protocol (ERTP) [4] is used for data streaming applications, where sensor monitoring are send through many sensor nodes to sink nodes i.e. base station.
3 A Survey on Congestion Control at Transport Layer in Wireless Sensor Network It is a packet-based reliability protocol which applies statistical metric aiming to deliver more number of packets to sink as compared to the defined threshold. It reduces energy dissipation by using end-to-end approach which dynamically controls the reliability at each hop. It controls the maximum number of retransmissions dynamically at each sensor node. For recovery, it uses Stop-and-Wait Hop-by-Hop Implicit Acknowledgment (iack). The sink node explicitly sends the acknowledgment signal to the source node, if the signal does not reach within a particular time then source node retransmits the unacknowledged packet. 2. PSFQ: Pump Slowly Fetch Quickly (PSFQ) [5] is a protocol used specially in downstream multicast dynamic code update. It can also be used for unicast communication. In this, data is reconstructed over each node. It is a hop by hop protocol, thus having no guaranty of end to end reliability in some scenarios. It has three functions: message transferring (pump operation), relay-initiated error recovery (fetch operation), and selective status reporting (report operation). It uses localized recovery process among immediate neighbors for achieving loose delay bound. As it is downstream protocol so it strictly manages and control reliability in reverse direction i.e. from sink to source node. Therefore, useful resources are wasted if we use it for forward direction. 3. RMST: The Reliable Multi-Segment Transport (RMST) [6] is a Selective NACK-based for directed diffusion. It provides guaranteed delivery, fragmentation and assembly to the required applications. It detects loss of packet at sink node from where a unicast message is send towards source node for notifying the missing packet. RMST divides the data transport from source to sink into Routing and Message Loss Detection (MLD). For achieving reliability, it uses hop-by-hop approach which sends a timer driven NACK for the missing packet to the previous node. It reduces end-to-end retransmission by storing unacknowledged packet in their caches. Automatic Repeat request (ARQ) is used to retransmit lost packet. The receivers detect the lost packet and send NACK for recovering it. 4. RBC: Reliable Bursty Convergecast (RBC) [7] forwards the data packet continuously using a window-less block acknowledgement scheme which copies the acknowledgement. It uses a large memory of sensors, so sensor nodes require large memory for using RBC protocol. In RBC, hop-by-hop approach with differentiated contention control is used. This ensures that packets will be retransmitted a few number of times. This works well in single event converge cast whereas in continuous event converge cast, it can generate fresh packet continuously till event repeats itself. 5. Garuda: GARUDA [8] is a reliable downstream protocol which achieves reliability from sink to source. It uses a two-stage NACK recovery process by dividing each node as a core member or non-core members. Wait-for-First-Packet (WFP) pulse is used for creating first packet delivery which generates core infrastructure. The first packet delivery calculates the number of hop from the sink to the particular node. The nodes which come under the path of hop count become the core member. By the election process, core nodes are created within the network, which should connect with at least one upstream core node. For overcoming under utilization scenario, it uses out-of-order strategy. During non-core recovery phase, non-core nodes request retransmission from the core nodes. After that, it listens to all retransmission from its core node and sends their retransmission request. 6. DTC: Distributed TCP Caching (DTC) [9] is an enhanced version of TCP. It compresses the header and provides caches at few selected intermediate nodes which help in improving transmission capacity. It leaves end point of communication unchanged as it is fully compatible with TCP. It uses the AIMD algorithm for adjusting transmission window and hop-by-hop loss recovery scheme 19
4 OPEN TRANSACTIONS ON WIRELESS COMMUNICATIONS Table 1. Summary of reliable protocols Protocols Reliability Direction Reliability level Recovery approach Notification ERTP [4] Upstream Packet based Hop-by-hop ACK, iack PSFQ [5] Downstream Packet based Hop-by-hop NACK RMST [6] Upstream Packet based Hop-by-hop, End-to-end NACK RBC [7] Upstream Packet based Hop-by-hop iack, NACK GARUDA [8] Downstream Packet and destination based Two stage loss recovery NACK DTC [9] Upstream Packet based Hop-by-hop ACK DTSN [10] Upstream Packet based End-to-end ACK, NACK IPSFQ [11] Downstream Packet based Hop-by-hop NACK EEHRTP [12] Upstream Packet based End-to-end Hierarchical iack [13] Upstream Packet based Hop-by-hop iack for lost packets which can be received from intermediate node caches. Those segments which are not acknowledged at link layer, are saved into the cache of intermediate node in next hop, and retransmitted when transmission time is out. 7. DTSN: Distributed Transport for Sensor Network (DTSN) [10] is an energy-efficient hop-by-hop reliable transport protocol supporting both full and differentiated reliability and employs selective repeat ARQ to improve energy efficiency. In order to reduce the overhead of packet in DTSN, the loss recovery process is controlled by the source node. It sends Explicit Acknowledgment Request (EAR) from receiver to sender which can be either ACK or NACK according to retransmission interval. The receiver node finds the lost packet by the help of missing sequence number and makes a list of lost packets keeping it until source node sends an EAR to it. 8. IPSFQ: Improved Pump Slowly Fetch Quickly (IPSFQ) [11] is an improved version of PSFQ [5] protocol. This protocol removes the short coming of PSFQ that are in-sequence forwarding of data packets, pump and repairing operations. By improving these short coming IPSFQ performs better in terms of error tolerance and average latency. 9. EEHRTP: Energy Efficient Hierarchical Reliable Transport Protocol (EEHRTP) [12] increases the network lifetime by controlling redundant data transmission. It achieves end-to-end reliability using hierarchical implicit acknowledgment. It uses Stop-and-Wait Hop-by-Hop implicitly acknowledgement for loss recovery and timeout scheme for packet retransmission. The packet loss rate and packet delivery rate show that it is better than ERTP [4] in terms of energy conserving. 10. In [13] author proposed a reliable data transfer protocol which uses cross layer optimization. This protocol is an energy-efficient hop-by-hop reliable protocol, which retransmit the packet if timeout happen before reaching to sink node. Hop-by-hop reliability is done by using four state conditions. The summary of various reliable protocols stated above is given in Table 1 below. 2.2 Protocols for congestion control 20 Congestion occurs in WSN due to many-to-one nature of traffic. When such an event occurs, many sensor nodes sense it and send packets toward one or more sinks. Congestion may also occur due to limited wireless bandwidth of sensor network. It can be either node-level congestion or link-level congestion as shown in Figure 2. Both of them lead to wastage of the energy of the nodes. Congestion occurring
5 A Survey on Congestion Control at Transport Layer in Wireless Sensor Network Figure 2. Node level and link level congestion in WSN is different from that occurring in the wired networks. That s why existing protocols such as TCP are not capable to handle congestion in WSN. The congestion pattern is different for upstream, downstream and bidirectional data flow. Congestion causes overall degradation of channel quality as well as packet delivery ratio, it also causes buffer to overflow and increased delays which lead to reduction in throughput. Thus, congestion control is vital for avoiding congestion in the network, which can improve network performance. Generally, congestion control algorithms in WSNs employ two techniques for controlling and avoiding the congestion viz. traffic control and resource control. The traffic control protocols use traffic control method to adjust the rate of the source node for controlling congestion in the network. On the other hand, resource control algorithms employ redundant nodes, which are not in the initial path from source to sink, so that data can flow properly within the network. Congestion control mechanisms [14] are composed of three components: congestion detection, congestion notification and reporting rate adjustments Congestion detection Congestion detection is the process of detecting the presence as well as the location of congestion in the network. Different parameters are considered for detecting the congestion by different protocols. Some protocols use only Buffer Occupancy; some others use Packet Rate or Packet Service Time versus Packet Inter-Arrival Time and some protocols consider the combination of above parameters Congestion Notification In congestion notification, congestion information is passed by congested node either to the intermediate node or to the source node or to sink node or to all other nodes after detecting congestion. The congestion information can be sent explicitly or implicitly according to the protocol. Some protocols notify the congestion by setting Congestion Notification (CN) bit in packet header. 21
6 OPEN TRANSACTIONS ON WIRELESS COMMUNICATIONS Congestion Avoidance Congestion can be avoided by simply stopping sending packets into the network, by reducing its sending rate, or if all the intermediate nodes decrease their sending flow rate to their immediate neighbours. Congestion avoidance uses three different types of techniques: Rate Adjustment, Traffic Redirection and Polite Gossip Policy. Different protocols for congestion control are given in the following subsections: 1. CODA: Congestion Detection and Avoidance (CODA) [15] detects congestion by monitoring buffer occupancy as well as wireless channel load. It is both hop-by-hop and end-to-end according to the situation. The packets are dropped by the preceding node of congested node for controlling the congestion. It works similarly to TCP during packet loss, adjusting the traffic by using additive increase multiplicative decrease (AIMD) technique. CODA designs both open and closed-loop rate adjustment. Congestion is notified by the help of broadcasting the message to all nodes. In dynamic scenarios, fairness is achieved by using dynamic weight adaptation algorithm. 2. FUSION: Fusion [16] detects congestion by considering the queue length. The congested node sets a CN (congestion notification) bit in the header of each outgoing packet. After CN bit is set, the entire neighbouring node stop sending packet to the congested node which helps in clearing the queue packets in the buffer of congested node. It uses prioritized MAC algorithm and traffic rate adjustment of source nodes. It has been found that it gets good throughput as well as fairness even at high load. 3. CCF: Congestion Control and Fairness (CCF) routing scheme [17] detects congestion by finding packet service time from which it calculates current service rate. If service rate is more as compared to arrival rate of each intermediate node then there is congestion in that intermediate sensor node. It controls congestion by using hop-by-hop approach which calculates exact rate adjustment by the help of current service time and number of child nodes. As the rate adjustment depends on packet service time only, it may lead to low utilization when some sensor nodes have limited traffic or there is a significant packet error rate. 4. PCCP: Priority-based congestion control protocol (PCCP) [18, 19] detects congestion level by the help of congestion degree and node priority index, in which congestion degree is calculated by using packet inter arrival time along with packet service time. It applies hop-by-hop approach with cross layer optimization. It reduces the buffer occupancy which helps in reducing packet loss and improves energy-efficiency. It also gets high link utilization with low packet delay. 5. SENTCP: Congestion is detected by SENTCP [20] using average local packet service time and inter arrival time for calculating congestion degree. It is an open-loop hop-by-hop congestion control protocol. In SENTCP, a feedback containing local congestion degree with buffer length is send to previous node by each intermediate sensor node to adjust traffic rate. 6. ART: ART [21] controls congestion by selecting subset of sensor nodes known as essential node which covers whole area of network. These essential nodes sense the network state in energy efficient way. It is end-to-end type upstream congestion control protocol in which only essential nodes are considered for the transfer of reliable information in upstream and downstream TRICKLE: Trickle [22] uses Polite Gossip technique for controlling traffic. In this protocol, a summary of data is broadcasted by each node after regular interval of time and politely suppress its own data information. Information is suppressed if same information is received more number of
7 A Survey on Congestion Control at Transport Layer in Wireless Sensor Network times as compared to threshold by the neighboring nodes. On the other hand, if nodes hear some new information than it broadcasts this information repeatedly with shorter interval of time, so that new information is broadcasted in the system quickly. 8. SIPHON: Siphon [23] also infers congestion by the help of queue length of intermediate nodes, as well as traffic redirection but it uses traffic redirection in place of rate adjustment technique for handling congestion. It uses the same mechanism of CODA with additional features for controlling the congestion in the secondary network having virtual sinks only. Virtual station is used to send message to all nodes for indicating that sending rate is high indicating congestion. A message containing signature byte is broadcasted by virtual sink to the secondary network on receiving some notification from base station. This message notifies the secondary network that something is not correct. 9. RCRT: Rate controlled reliable transport protocol (RCRT) [24] detects congestion by the help of base station which explicitly sends request to sensor nodes for missing packets. It provides end-to-end reliability with NACK based loss recovery scheme. The base station notifies the nodes when system enters in congestion state and repairing time is greater than a round-trip time. Base station itself decides how much traffic rate is adjusted to control the congestion by using AIMD scheme. 10. STCP: Sensor Transmission Control Protocol (STCP) [25] is a transport layer protocol in which most of the functionality is implemented at the sink node or base station. It is reliable and scalable protocol which uses multi-purpose sensor nodes but it does not provide any explicit mechanism for congestion control as well as in terms of delay ACK/NACK, it may not be feasible for reliability purpose. 11. IDCCP: Improved Datagram Congestion Control Protocol IDCCP [26] is used to control congestion in wireless multimedia network. It uses Congestion Control Identifier (CCID) for controlling purpose. An optional ACK is used in it for achieving reliability in the system. Different rate adjustment levels are used in different state. During normal State and congestion state, if there is no packet loss, the rate is adjusted according to basertt/avgrtt. If there is packet loss during congestion state, then traffic rate is halved. When system is in error state, rate is adjusted according to the variable β ranging from 0.5 to 1. In Failure State, a special packet known as probe is send for monitoring the system. 12. MCCP: Multi-event congestion control protocol (MCCP) [27] detects congestion by the help of two parameters: buffer size and packet delivery time between two sensor nodes. It uses a TDMA schedule for assigning the rate to the nodes. For scheduling purpose, it requires time synchronization, which increases complexity and overhead in the network. 13. CONSEQ: Control of Sensor Queues (CONSEQ) [28] uses a metrics for estimating congestion in the network. It uses load balancing technique during low congestion. Congestion is controlled by each node locally in their neighbourhood. This reduces congestion which improves delay as well as energy consumption in the network. It uses fuzzy control theory for dynamically rate adaption using effective queue length. As it detects congestion by the help of locally detecting technique, it responds to congestion quickly with lesser overhead. 14. FCCTF: Fairness Congestion Control for a distrustful WSN using Fuzzy logic (FCCTF) [29] control congestion by isolating malicious node. It uses dynamic threshold trust value (TTV) to block or unblock the malicious node using fuzzy logic. It performs differently in different circumstances 23
8 OPEN TRANSACTIONS ON WIRELESS COMMUNICATIONS according to number of lost packets. When number of packets is lost, it increases TTV value so that more number of nodes is detected as malicious node. Malicious nodes do not take part in the network. When there is no packet lost then it reduces the TTV value as well as releases some malicious nodes so that they can take part in the network. As number of nodes increases, more packets start flowing within the network. 15. FBACC: The Fuzzy Based Adaptive Congestion Control (FBACC) [30] is proposed which uses buffer occupancy, participants and traffic rate. FBACC provides a fuzzy logic based congestion estimation, smart way to drop packet in case of congestion up to acceptable quality level and most importantly, it regulates traffic rate. It improves performance of network over other protocols which are presently available. Performance of FBACC is evaluated and compared with existing schemes e.g. Event-to-Sink Reliable Transport (ESRT) and Fuzzy Logic Based Congestion Estimation (FLCE) in terms of congestion detection, packet loss and energy. FBACC detects the network congestion more precisely and uniformly and also adapts to current traffic rate with respect to product of previous participants with previous traffic rate to reduce the packet loss. Finally, FBACC saves energy of retransmission because packet loss is minimal due to traffic adaption. 16. PHSA: Probability based Hop Selection Approach (PHSA) [31] controls congestion by controlling the resources of the network. This protocol finds the path cost between node and each sink node by exchanging information and sending and receiving data steps. Computed cost is exchanged between nodes which help in electing the node for next hop. Thus, resources are adjusted for controlling the congestion. This protocol also gives efficient power consumption with high packet delivery ratio. 17. HTAP: Hierarchical Tree Alternative Path Algorithm (HTAP) [32] controls congestion by dynamically switching to alternate path on the basis of local information. Local information contains congestion level of their neighbouring nodes by the help of adaptive method. Adaptive method infers the congestion level by the help of buffer occupancy with duration. In this protocol, each node is only connected to those nodes which are in upstream direction i.e. from source to sink node. 18. SUIT: Sensor fuzzy-based image transport (SUIT) [33] is a fuzzy based congestion control protocol. It sends maximum number of frame to sink node with lower quality during congestion state. This protocol uses cross layer technique to interact with different layers. It uses three indicators to detect congestion that are ratio of incoming to outgoing packets, number of active neighbour and buffer occupancy of the parent node. It applies fuzzy on the indicators and if congestion is detected than it adjust the rate to control congestion. 19. NNBCD: Neural Network Based Congestion Detection protocol (NNBCD) [34] trains the neural network by the help of three parameters i.e. buffer occupancy, number of participant and traffic rate for detecting congestion in the congested WSN. These parameters are extracted from NAM trace file by using AWK script. This protocol is able to detect congestion accurately and efficiently. Further this technique can be utilized for controlling the congestion by adapting the traffic rate. The summary of various congestion protocols stated above is given in Table 2 below. 3. FUTURE WORKS 24 The protocols discussed above have been effective in improving reliability and controlling congestion in transport layer of WSN. Some reliable protocols used hop-by-hop or end-to-end recovery approach and some of them used both approaches. Reliable protocol can be upstream or downstream. And in congestion
9 A Survey on Congestion Control at Transport Layer in Wireless Sensor Network Table 2. Summary of Congestion protocols Congestion Protocols Detection Notification Control technique CODA [15] Buffer occupancy, channel load Explicitly AIMD FUSION [16] Queue length Implicitly Stop and start CCF [17] Packet service time Implicitly Exact rate PCCP [18, 19] Congestion degree, packet inter arrival and service time Implicitly Exact rate SENTCP [20] average local packet service time, inter arrival time Explicitly Rate adjustment ART [21] Service time Implicitly Rate adjustment TRICKLE [22] - - Polite gossip SIPHON [23] Queue length - Traffic redirection RCRT [24] Packet loss, recovery dynamics Explicitly AIMD-like STCP [25] Queue length Implicitly AIMD-like IDCCP [26] - Explicitly Rate adjustment MCCP [27] Buffer size, packet delivery ratio - Rate adjustment CONSEQ [28] Effective and virtual queue length - Rate adjustment FCCTF [29] Buffer overflowing, forwarding rate vs receiving rate - Malicious nodes adaption FBACC [30] Participants, buffer occupancy and traffic rate Explicitly Rate adjustment PHSA [31] Queue drop, local cost Explicitly Resource adjustment HTAP [32] Buffer occupancy, duration - Alternate path SUIT [33] Number of active neighbour, buffer occupancy Rate adaption - and incoming to outgoing packet ratio and quality adaption NNBCD [34] Buffer occupancy, participants and traffic rate - - control protocols detect congestion by the help of certain parameters such as buffer occupancy, channel load, traffic rate, packet loss, participants etc. They control the congestion by using various adjustment techniques such as traffic rate adjustment, traffic redirection, polite gossip, resource adjustment etc. However the protocol discussed above can be further improved by applying various methods: 1. Computational intelligence [35] is an untouched field till now, only fuzzy application of computational intelligence is used in few paper but other technique like neural network, genetic algorithm, reinforcement learning etc. are also appropriate for improving QoS of WSN at transport layer. 2. Currently all protocol start congestion mitigation method after detecting of congestion state but a better protocol can be developed which mitigate the congestion before happing of congestion. So it can saves lot of energy and increase throughput with better resource utilization. 3. Existing protocols either adapt traffic or redirect traffic flow not both. Hybrid protocol can be developed which can use both traffic rate adaption with traffic redirection. This can be performed by using cross layer approach, as they can interact with different layer by escaping virtually strict boundaries between layers. 4. CONCLUSION In this paper, a survey of various protocols used for congestion control (CC) in Wireless Sensor Networks is presented. Different types of protocols which are commonly used for congestion detection and control in WSN and also some other protocols which have been recently proposed are discussed in detail. Fairness Congestion Control protocol for a distrustful WSN using Fuzzy logic (FCCTF) is found to be an effective protocol as it uses dynamic threshold value to control congestion. As can be seen from 25
10 OPEN TRANSACTIONS ON WIRELESS COMMUNICATIONS Table 2, FCCTF considers both packet drop using buffer overflow and traffic rate by using forwarding rate vs receiving rate. It uses one of the Artificial Intelligence techniques: Fuzzy logic for estimating the dynamic threshold value by considering the input parameters, which helps in controlling the congestion with better utilization of channel. It performs differently in different circumstances according to number of lost packets. The Fuzzy Based Adaptive Congestion Control (FBACC) has proved to be very effective protocol for wireless multimedia sensor network, as it maintains the network in medium congestion level by using number of participant along with buffer occupancy and traffic rate. FBACC provides a fuzzy logic based congestion estimation, smart way to drop packet in case of congestion up to acceptable quality level and most importantly it regulate traffic rate. FBACC saves energy of retransmission because packet loss is minimal due to traffic adaption. Thus, it can be concluded that till date many effective protocols have been proposed to detect and control congestion in transport layer for WSN. Nevertheless, there is still scope for developing more effective protocols using artificial intelligence, cross layer technique etc. References [1] F. Yunus, N.-S. Ismail, S. H. Ariffin, A. Shahidan, N. Fisal, and S. K. Syed-Yusof, Proposed Transport Protocol for Reliable Data Transfer in Wireless Sensor Network (WSN), in Modeling, Simulation and Applied Optimization (ICMSAO), th International Conference on, pp. 1 7, IEEE, [2] S. Sridevi and M. Usha, Taxonomy of Transport Protocols for Wireless Sensor Networks, in Recent Trends in Information Technology (ICRTIT), 2011 International Conference on, pp , IEEE, [3] D. N. Wategaonkar and V. S. Deshpande, Characterization of Reliability in WSN, in Information and Communication Technologies (WICT), 2012 World Congress on, pp , IEEE, [4] T. Le, W. Hu, P. Corke, and S. Jha, ERTP: Energy-efficient and Reliable Transport Protocol for data streaming in Wireless Sensor Networks, Computer Communications, vol. 32, no. 7, pp , [5] C.-Y. Wan, A. T. Campbell, and L. Krishnamurthy, PSFQ: a reliable transport protocol for wireless sensor networks, in Proceedings of the 1st ACM international workshop on Wireless sensor networks and applications, pp. 1 11, ACM, [6] F. Stann and J. Heidemann, RMST: Reliable Data Transport in Sensor Networks, in Sensor Network Protocols and Applications, Proceedings of the First IEEE IEEE International Workshop on, pp , IEEE, [7] H. Zhang, A. Arora, Y.-r. Choi, and M. G. Gouda, Reliable bursty convergecast in wireless sensor networks, vol. 30, pp , Elsevier, [8] R. Sivakumar and I. F. Akyildiz, GARUDA: Achieving Effective Reliability for Downstream Communication in Wireless Sensor Networks, IEEE Transactions on Mobile Computing, vol. 7, no. 2, pp , [9] A. Dunkels, J. Alonso, T. Voigt, and H. Ritter, Distributed TCP Caching for Wireless Sensor Networks, SICS Research Report, [10] B. Marchi, A. Grilo, and M. Nunes, Dtsn: Distributed transport for sensor networks, pp , [11] C. K. Rupani and T. C. Aseri, An improved transport layer protocol for wireless sensor networks, Computer Communications, vol. 34, no. 6, pp ,
11 A Survey on Congestion Control at Transport Layer in Wireless Sensor Network [12] P. Mohanty and M. R. Kabat, Energy Efficient Hierarchical Reliable Transport Protocol in Wireless Sensor Networks, Global Journal on Technology, vol. 3, pp [13] F. Yunus, N.-S. Ismail, S. H. Ariffin, A. Shahidan, N. Fisal, and S. K. Syed-Yusof, Proposed Transport Protocol for Reliable Data Transfer in Wireless Sensor Network (WSN), in Modeling, Simulation and Applied Optimization (ICMSAO), th International Conference on, pp. 1 7, IEEE, [14] B. Sharma and T. Aseri, A Comparative Analysis of Reliable and Congestion-Aware Transport Layer Protocols for Wireless Sensor Networks, ISRN Sensor Networks, [15] C.-Y. Wan, S. B. Eisenman, and A. T. Campbell, CODA: congestion detection and avoidance in sensor networks, pp , [16] L. A. Freitas, A. R. Coimbra, V. Sacramento, S. Rosseto, and F. M. Costa, A Data Fusion Protocol in Wireless Sensor Networks for Controlled Environment, in INFOCOM Workshops 2009, IEEE, pp. 1 2, IEEE, [17] C. T. Ee and R. Bajcsy, Congestion control and fairness for many-to-one routing in sensor networks, in Proceedings of the 2nd international conference on Embedded networked sensor systems, pp , ACM, [18] C. Wang, K. Sohraby, V. Lawrence, B. Li, and Y. Hu, Priority-based Congestion Control in Wireless Sensor Networks, in Sensor Networks, Ubiquitous, and Trustworthy Computing, IEEE International Conference on, vol. 1, pp , IEEE, [19] D. Patil and S. N. Dhage, Priority-based Congestion Control Protocol (PCCP) for controlling upstream congestion in Wireless Sensor Network, in Communication, Information & Computing Technology (ICCICT), 2012 International Conference on, pp. 1 6, IEEE, [20] C. Wang, K. Sohraby, and B. Li, SenTCP: A hop-by-hop congestion control protocol for wireless sensor networks, in IEEE INFOCOM, pp , [21] N. Tezcan and W. Wang, ART: an asymmetric and reliable transport mechanism for wireless sensor networks, International Journal of Sensor Networks, vol. 2, no. 3-4, pp , [22] P. A. Levis, N. Patel, D. Culler, and S. Shenker, Trickle: A self-regulating algorithm for code propagation and maintenance in wireless sensor networks. Computer Science Division, University of California, [23] C.-Y. Wan, S. B. Eisenman, A. T. Campbell, and J. Crowcroft, Siphon: Overload traffic management using multi-radio virtual sinks in sensor networks, in Proceedings of the 3rd international conference on Embedded networked sensor systems, pp , ACM, [24] J. Paek and R. Govindan, Rcrt: Rate-controlled reliable transport for wireless sensor networks, in Proceedings of the 5th international conference on Embedded networked sensor systems, pp , ACM, [25] Y. G. Iyer, S. Gandham, and S. Venkatesan, STCP: A Generic Transport Layer Protocol for Wireless Sensor Networks, in Computer Communications and Networks, ICCCN Proceedings. 14th International Conference on, pp , IEEE, [26] L. Yong-Min, J. Xin-Hua, N. Xiao-Hong, and L. Wu-Yi, STCP: A Generic Transport Layer Protocol for Wireless Sensor Networks, in Proceedings of the 2009 Eigth IEEE/ACIS International Conference on Computer and Information Science, pp , IEEE Computer Society, [27] H. Faisal B, C. Yalcin, S. Ghalib A, et al., A multievent congestion control protocol for wireless sensor networks, EURASIP Journal on Wireless Communications and Networking, vol. 2008, [28] C. Basaran, K.-D. Kang, and M. H. Suzer, Hop-by- Hop Congestion Control and Load Balancing in Wireless Sensor Networks, in Local Computer Networks (LCN), 2010 IEEE 35th Conference on, pp , IEEE, [29] M. Zarei, A. M. Rahmani, R. Farazkish, and S. Zahirnia, FCCTF: Fairness Congestion Control for 27
12 OPEN TRANSACTIONS ON WIRELESS COMMUNICATIONS a distrustful wireless sensor network using Fuzzy logic, in Hybrid Intelligent Systems (HIS), th International Conference on, pp. 1 6, IEEE, [30] S. Jaiswal and A. Yadav, Fuzzy based adaptive congestion control in wireless sensor networks, in Contemporary Computing (IC3), 2013 Sixth International Conference on, pp , IEEE, [31] N. Farzaneh and M. H. Yaghmaee, Probability based hop selection approach for resource control in Wireless Sensor Network, in Telecommunications (IST), 2012 Sixth International Symposium on, pp , IEEE, [32] C. Sergiou, Performance-aware congestion control in wireless sensor networks using resource control, in World of Wireless, Mobile and Multimedia Networks (WoWMoM), 2013 IEEE 14th International Symposium and Workshops on a, pp. 1 2, IEEE, [33] C. Sonmez, O. D. Incel, S. Isik, M. Y. Donmez, and C. Ersoy, Fuzzy-based congestion control for wireless multimedia sensor networks, EURASIP Journal on Wireless Communications and Networking, vol. 2014, no. 1, pp. 1 17, [34] P. Singhal and A. Yadav, Neural network based congestion detection, IEEE International Conference of Convergence and Technology (I2CT), Pune, p. 72, [35] R. V. Kulkarni, A. Forster, and G. K. Venayagamoorthy, Computational intelligence in wireless sensor networks: A survey, Communications Surveys & Tutorials, IEEE, vol. 13, no. 1, pp ,
International Journal of Computer Science Trends and Technology (IJCST) Volume 3 Issue 2, Mar-Apr 2015
RESEARCH ARTICLE Mitigating Congestion in High Speed Wireless Multimedia Sensor Networks Using Energy Efficient Grid Based D 3 Technique Mantoj Kaur, Malti Rani Punjab Institute of Technology, Kapurthala,
More informationComparison of Technical Features of Transport Protocols For Wireless Sensor Networks
ISSN: 2354-2373 Comparison of Technical Features of Transport Protocols For Wireless Sensor Networks By Raheleh Hashemzehi Reza ormandipour Research Article Comparison of Technical Features of Transport
More informationINTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK REVIEW ON CONGESTION CONTROL IN WIRELESS SENSOR NETWORK MR. HARSHAL D. WANKHADE,
More informationA Proposed Paper on Joint Priority Based Approach for Scheduling and Congestion Control in Multipath Multi-hop WSN
A Proposed Paper on Joint Priority Based Approach for Scheduling and Congestion Control in Multipath Multi-hop WSN Sweta A.Kahurke M.Tech(IV) Wireless communication & Computing G.H.Raisoni College Of Engineering
More informationWireless Sensor Network (WSN): A Reliable Data Transfer Using Spaced Hop by Hop Transport
International Journal of Engineering Science Invention ISSN (Online): 2319 6734, ISSN (Print): 2319 6726 Volume 2 Issue 5 ǁ May. 2013 ǁ PP.26-30 Wireless Sensor Network (WSN): A Reliable Data Transfer
More informationWorld Journal of Engineering Research and Technology WJERT
wjert, 2018, Vol. 4, Issue 4, 527-537. Original Article ISSN 2454-695X Mukhtiar et al. WJERT www.wjert.org SJIF Impact Factor: 5.218 RPD: RELIABLE PACKETS DELIVERY CONGESTION CONTROL SCHEME IN WIRELESS
More informationReliable Transport with Memory Consideration in Wireless Sensor Networks
Reliable Transport with Memory Consideration in Wireless Sensor Networks Hongchao Zhou 1, Xiaohong Guan 1,2, Chengjie Wu 1 1 Department of Automation and TNLIST Lab, Tsinghua University, Beijing, China.
More informationReliable Data Collection in Wireless Sensor Networks
Reliable Data Collection in Wireless Sensor Networks Pramod A. Dharmadhikari PG Student M B E Society s College of Engineering, Ambajogai Maharashtra, India B. M. Patil Professor M B E Society s College
More informationCongestion in Wireless Sensor Networks and Various Techniques for Mitigating Congestion - A Review
Congestion in Wireless Sensor Networks and Various Techniques for Mitigating Congestion - A Review V. Vijayaraja, Department of Computer Science Engineering Jaya Engineering College, Chennai, India vvijay1975@gmail.com
More informationPresentation and Analysis of Congestion Control Methods in Wireless Sensor Networks
Presentation and Analysis of Congestion Control Methods in Wireless Sensor Networks University of Cyprus Department of Computer Science Charalambos Sergiou Networks Research Laboratory Department of Computer
More informationAd hoc and Sensor Networks Chapter 13a: Protocols for dependable data transport
Ad hoc and Sensor Networks Chapter 13a: Protocols for dependable data transport Holger Karl Computer Networks Group Universität Paderborn Overview Dependability requirements Delivering single packets Delivering
More informationEarly View. Priority based Congestion Control Mechanism in Multipath Wireless Sensor Network
Priority based Control Mechanism in Multipath Wireless Sensor Network Md. Ahsanul Hoque α, Nazrul Islam σ, Sajjad Waheed ρ & Abu Sayed Siddique Ѡ Abstract- Wireless Sensor Network (WSN) is a network composed
More informationCongestion Detection Approaches In Wireless Sensor Networks: -A Comparative Study
International Journal of Engineering Research and Development e-issn: 2278-067X, p-issn: 2278-800X, www.ijerd.com Volume 12, Issue 3 (March 2016), PP.59-63 Congestion Detection Approaches In Wireless Sensor
More informationTRANSPORT LAYER PROTOCOL FOR URGENT DATA TRANSMISSION IN WSN
TRANSPORT LAYER PROTOCOL FOR URGENT DATA TRANSMISSION IN WSN AshwiniD.Karanjawane 1, Atul W. Rohankar 2, S. D. Mali 3, A. A. Agarkar 4 1, 3 Department of E&TC, Sinhgad College of Engineering, Maharashtra,
More informationAN EFFICIENT MAC PROTOCOL FOR SUPPORTING QOS IN WIRELESS SENSOR NETWORKS
AN EFFICIENT MAC PROTOCOL FOR SUPPORTING QOS IN WIRELESS SENSOR NETWORKS YINGHUI QIU School of Electrical and Electronic Engineering, North China Electric Power University, Beijing, 102206, China ABSTRACT
More informationTRANSPORT PROTOCOLS & CONGESTION CONTROL IN WIRELESS SENSOR NETWORKS
TRANSPORT PROTOCOLS & CONGESTION CONTROL IN WIRELESS SENSOR NETWORKS C. Pham http://www.univ-pau.fr/~cpham University of Pau, France Visiting Professor at UTS (Prof. D. Hoang) TRANSPORT PROTOCOLS AND CC
More informationWSN Routing Protocols
WSN Routing Protocols 1 Routing Challenges and Design Issues in WSNs 2 Overview The design of routing protocols in WSNs is influenced by many challenging factors. These factors must be overcome before
More informationClass Based Congestion Control method for Wireless Sensor Networks
1 Class Based Congestion Control method for Wireless Sensor Networks Abbas Ali Rezaee Ph.D Student, CE Department, Science and Research Branch,Islamic Azad University (IAU), Tehran, Iran. aa.rezaee@srbiau.ac.ir
More informationQoS Challenges and QoS-Aware MAC Protocols in Wireless Sensor Networks
QoS Challenges and QoS-Aware MAC Protocols in Wireless Sensor Networks S. Shiney Lillia PG Student, Department of Computer Science and Engineering, National Institute of Technology Puducherry, Puducherry,
More informationTree Based Energy and Congestion Aware Routing Protocol for Wireless Sensor Networks
Wireless Sensor Network, 21, February, 161-167 doi:1.4236/wsn.21.2221 Published Online February 21 (http://www.scirp.org/journal/wsn/). Tree Based Energy and Congestion Aware Routing Protocol for Wireless
More informationRCRT:Rate-Controlled Reliable Transport Protocol for Wireless Sensor Networks
RCRT:Rate-Controlled Reliable Transport Protocol for Wireless Sensor Networks JEONGYEUP PAEK, RAMESH GOVINDAN University of Southern California 1 Applications that require the transport of high-rate data
More informationTo address these challenges, extensive research has been conducted and have introduced six key areas of streaming video, namely: video compression,
Design of an Application Layer Congestion Control for Reducing network load and Receiver based Buffering Technique for packet synchronization in Video Streaming over the Internet Protocol Mushfeq-Us-Saleheen
More informationSecurity Analysis of Reliable Transport Layer Protocols for Wireless Sensor Networks
Security Analysis of Reliable Transport Layer Protocols for Wireless Sensor Networks Levente Buttyán and László Csik Laboratory of Cryptography and Systems Security (CrySyS) Department of Telecommunications
More informationPerformance of UMTS Radio Link Control
Performance of UMTS Radio Link Control Qinqing Zhang, Hsuan-Jung Su Bell Laboratories, Lucent Technologies Holmdel, NJ 77 Abstract- The Radio Link Control (RLC) protocol in Universal Mobile Telecommunication
More informationA FUZZY APPROACH TO DETECT AND CONTROL CONGESTION IN WIRELESS SENSOR NETWORKS
A FUZZY APPROACH TO DETECT AND CONTROL CONGESTION IN WIRELESS SENSOR NETWORKS Abstract Rekha Chakravarthi Research Scholar, SathyabamaUniversity,Jeppiaar Nagar, Chennai,600119,India rekha_2705@yahoocoin
More informationNew Active Caching Method to Guarantee Desired Communication Reliability in Wireless Sensor Networks
J. Basic. Appl. Sci. Res., 2(5)4880-4885, 2012 2012, TextRoad Publication ISSN 2090-4304 Journal of Basic and Applied Scientific Research www.textroad.com New Active Caching Method to Guarantee Desired
More informationChapter 5 Ad Hoc Wireless Network. Jang Ping Sheu
Chapter 5 Ad Hoc Wireless Network Jang Ping Sheu Introduction Ad Hoc Network is a multi-hop relaying network ALOHAnet developed in 1970 Ethernet developed in 1980 In 1994, Bluetooth proposed by Ericsson
More informationAn overview: Medium Access Control and Transport protocol for Wireless Sensor Networks
An overview: Medium Access Control and Transport protocol for Wireless Sensor Networks Carlene E-A Campbell, Ibrar A Shah, Kok-Keong Loo carlnjam@gmail.com, ibrarali.shah@yahoo.com, Jonathan.loo75@gmail.com
More informationCongestion Control using Active agent in Wireless Sensor Network
I J C International Journal of lectrical, lectronics ISSN No. (Online): 2277-2626 and Computer ngineering 4(1): 120-124(2015) Congestion Control using Active agent in Wireless Sensor Network Sheetal Meshram*,
More informationTime Synchronization in Wireless Sensor Networks: CCTS
Time Synchronization in Wireless Sensor Networks: CCTS 1 Nerin Thomas, 2 Smita C Thomas 1, 2 M.G University, Mount Zion College of Engineering, Pathanamthitta, India Abstract: A time synchronization algorithm
More informationImpact of IEEE MAC Packet Size on Performance of Wireless Sensor Networks
IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735.Volume 10, Issue 3, Ver. IV (May - Jun.2015), PP 06-11 www.iosrjournals.org Impact of IEEE 802.11
More informationROUTING ALGORITHMS Part 1: Data centric and hierarchical protocols
ROUTING ALGORITHMS Part 1: Data centric and hierarchical protocols 1 Why can t we use conventional routing algorithms here?? A sensor node does not have an identity (address) Content based and data centric
More informationUnit 2 Packet Switching Networks - II
Unit 2 Packet Switching Networks - II Dijkstra Algorithm: Finding shortest path Algorithm for finding shortest paths N: set of nodes for which shortest path already found Initialization: (Start with source
More informationMobile Agent Driven Time Synchronized Energy Efficient WSN
Mobile Agent Driven Time Synchronized Energy Efficient WSN Sharanu 1, Padmapriya Patil 2 1 M.Tech, Department of Electronics and Communication Engineering, Poojya Doddappa Appa College of Engineering,
More informationRouting protocols in WSN
Routing protocols in WSN 1.1 WSN Routing Scheme Data collected by sensor nodes in a WSN is typically propagated toward a base station (gateway) that links the WSN with other networks where the data can
More informationA Survey on Traffic Aware Congestion Control Techniques in Wireless Sensor Network
A Survey on Traffic Aware Congestion Control Techniques in Wireless Sensor Network Monali Panchal 1, Vijay Reshamwala 2 P.G. Student, Dept. of Computer Engineering, C.G.P.I.T, Uka Tarasadia University,
More informationCROSS LAYER PROTOCOL (APTEEN) USING WSN FOR REAL TIME APPLICATION
CROSS LAYER PROTOCOL (APTEEN) USING WSN FOR REAL TIME APPLICATION V. A. Dahifale 1, N. Y. Siddiqui 2 PG Student, College of Engineering Kopargaon, Maharashtra, India 1 Assistant Professor, College of Engineering
More informationA Study on Traffic Aware Routing Protocol for Wireless Sensor Networks
A Study on Traffic Aware Routing Protocol for Wireless Sensor Networks Gopi.T 1, Santhi.B 2 School of computing, SASTRA University Tirumalaisamudram, Thanjavur, Tamilnadu, India. 1 gopi_fgh@yahoo.co.in
More informationCross Layer Transport Layer Approach for Multihop Wireless Sensor Network
International Journal of Scientific and Research Publications, Volume 3, Issue 1, January 2013 1 Cross Layer Transport Layer Approach for Multihop Wireless Sensor Network Vaishali Rajput *, Tanaji Khadtare
More informationA Technical Study of Transport Layer Protocols for Wireless Sensor Network
A Technical Study of Transport Layer Protocols for Wireless Sensor Network Monika Sharma PEC University of Technology Chandigarh, India Bhisham Sharma PEC University of Technology Chandigarh, India Trilok
More informationUNIT IV -- TRANSPORT LAYER
UNIT IV -- TRANSPORT LAYER TABLE OF CONTENTS 4.1. Transport layer. 02 4.2. Reliable delivery service. 03 4.3. Congestion control. 05 4.4. Connection establishment.. 07 4.5. Flow control 09 4.6. Transmission
More informationCSMA based Medium Access Control for Wireless Sensor Network
CSMA based Medium Access Control for Wireless Sensor Network H. Hoang, Halmstad University Abstract Wireless sensor networks bring many challenges on implementation of Medium Access Control protocols because
More informationCHAPTER 3 EFFECTIVE ADMISSION CONTROL MECHANISM IN WIRELESS MESH NETWORKS
28 CHAPTER 3 EFFECTIVE ADMISSION CONTROL MECHANISM IN WIRELESS MESH NETWORKS Introduction Measurement-based scheme, that constantly monitors the network, will incorporate the current network state in the
More informationWSN NETWORK ARCHITECTURES AND PROTOCOL STACK
WSN NETWORK ARCHITECTURES AND PROTOCOL STACK Sensing is a technique used to gather information about a physical object or process, including the occurrence of events (i.e., changes in state such as a drop
More informationDelay Constrained ARQ Mechanism for MPEG Media Transport Protocol Based Video Streaming over Internet
Delay Constrained ARQ Mechanism for MPEG Media Transport Protocol Based Video Streaming over Internet Hong-rae Lee, Tae-jun Jung, Kwang-deok Seo Division of Computer and Telecommunications Engineering
More informationII. Principles of Computer Communications Network and Transport Layer
II. Principles of Computer Communications Network and Transport Layer A. Internet Protocol (IP) IPv4 Header An IP datagram consists of a header part and a text part. The header has a 20-byte fixed part
More informationMinimization of Collision in Energy Constrained Wireless Sensor Network
Wireless Sensor Network, 2009, 1, 350-357 doi:10.4236/wsn.2009.14043 Published Online November 2009 (http://www.scirp.org/journal/wsn). Minimization of Collision in Energy Constrained Wireless Sensor Network
More informationCC-SCTP: Chunk Checksum of SCTP for Enhancement of Throughput in Wireless Network Environments
CC-SCTP: Chunk Checksum of SCTP for Enhancement of Throughput in Wireless Network Environments Stream Control Transmission Protocol (SCTP) uses the 32-bit checksum in the common header, by which a corrupted
More informationA Survey of Transport Layer Protocols for Wireless Sensor Networks
A Survey of Transport Layer Protocols for Wireless Sensor Networks Saima Zafar Department of Electrical Engineering National University of Computer and Emerging Sciences, FAST-NU Block B Faisal Town Lahore
More informationAnalysis of Cluster based Routing Algorithms in Wireless Sensor Networks using NS2 simulator
Analysis of Cluster based Routing Algorithms in Wireless Sensor Networks using NS2 simulator Ashika R. Naik Department of Electronics & Tele-communication, Goa College of Engineering (India) ABSTRACT Wireless
More informationFig. 2: Architecture of sensor node
Volume 4, Issue 11, November 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com To Reduce
More informationAnalysis of Black-Hole Attack in MANET using AODV Routing Protocol
Analysis of Black-Hole Attack in MANET using Routing Protocol Ms Neha Choudhary Electronics and Communication Truba College of Engineering, Indore India Dr Sudhir Agrawal Electronics and Communication
More informationEnergy-Efficient Routing Protocol in Event-Driven Wireless Sensor Networks
Energy-Efficient Routing Protocol in Event-Driven Wireless Sensor Networks Yan Sun, Haiqin Liu, and Min Sik Kim School of Electrical Engineering and Computer Science Washington State University Pullman,
More informationReliable Event Detection and Congestion Avoidance in Wireless Sensor Networks
Reliable Event Detection and Congestion Avoidance in Wireless Sensor Networks Md. Mamun-Or-Rashid, Muhammad Mahbub Alam, Md. Abdur Razzaque, and Choong Seon Hong * Networking Lab, Department of Computer
More informationStudy on Wireless Sensor Networks Challenges and Routing Protocols
International Research Journal of Applied and Basic Sciences 2013 Available online at www.irjabs.com ISSN 2251-838X / Vol, 5 (7): 824-828 Science Explorer Publications Study on Wireless Sensor Networks
More informationTransport layer issues
Transport layer issues Dmitrij Lagutin, dlagutin@cc.hut.fi T-79.5401 Special Course in Mobility Management: Ad hoc networks, 28.3.2007 Contents Issues in designing a transport layer protocol for ad hoc
More informationImpact of Black Hole and Sink Hole Attacks on Routing Protocols for WSN
Impact of Black Hole and Sink Hole Attacks on Routing Protocols for WSN Padmalaya Nayak V. Bhavani B. Lavanya ABSTRACT With the drastic growth of Internet and VLSI design, applications of WSNs are increasing
More informationA PERFORMANCE EVALUATION OF YMAC A MEDIUM ACCESS PROTOCOL FOR WSN
A PERFORMANCE EVALUATION OF YMAC A MEDIUM ACCESS PROTOCOL FOR WSN Albeiro Cortés Cabezas and José de Jesús Salgado Patrón Department of Electronic Engineering, Surcolombiana University, Neiva, Colombia
More informationSurvey on Reliability Control Using CLR Method with Tour Planning Mechanism in WSN
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 5, May 2015, pg.854
More informationPerformance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s
Performance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s M. Nagaratna Assistant Professor Dept. of CSE JNTUH, Hyderabad, India V. Kamakshi Prasad Prof & Additional Cont. of. Examinations
More informationHop-to-Hop Reliability in IP-based Wireless Sensor Networks - a Cross-Layer Approach
Hop-to-Hop Reliability in IP-based Wireless Sensor Networks - a Cross-Layer Approach Gerald Wagenknecht, Markus Anwander, and Torsten Braun Institute of Computer Science and Applied Mathematics University
More informationMulti-metrics based Congestion Control protocol in Wireless Sensor Network
e-issn 2455 1392 Volume 2 Issue 5, May 2016 pp. 536 543 Scientific Journal Impact Factor : 3.468 http://www.ijcter.com Multi-metrics based Congestion Control protocol in Wireless Sensor Network Sushma
More informationDelay Performance of Multi-hop Wireless Sensor Networks With Mobile Sinks
Delay Performance of Multi-hop Wireless Sensor Networks With Mobile Sinks Aswathy M.V & Sreekantha Kumar V.P CSE Dept, Anna University, KCG College of Technology, Karappakkam,Chennai E-mail : aswathy.mv1@gmail.com,
More informationSubject: Adhoc Networks
ISSUES IN AD HOC WIRELESS NETWORKS The major issues that affect the design, deployment, & performance of an ad hoc wireless network system are: Medium Access Scheme. Transport Layer Protocol. Routing.
More informationDesigning Path Assured Data Transfer Protocol for Wireless Sensor Network
Designing Path Assured Data Transfer Protocol for Wireless Sensor Network Ashwini D.Karanjawane 1, Atul W. Rohankar 2, S. D. Mali 1, A. A. Agarkar 2 1 Department of E&TC, Sinhgad College of Engineering,Pune,
More informationToward a Reliable Data Transport Architecture for Optical Burst-Switched Networks
Toward a Reliable Data Transport Architecture for Optical Burst-Switched Networks Dr. Vinod Vokkarane Assistant Professor, Computer and Information Science Co-Director, Advanced Computer Networks Lab University
More informationImplementation of an Adaptive MAC Protocol in WSN using Network Simulator-2
Implementation of an Adaptive MAC Protocol in WSN using Network Simulator-2 1 Suresh, 2 C.B.Vinutha, 3 Dr.M.Z Kurian 1 4 th Sem, M.Tech (Digital Electronics), SSIT, Tumkur 2 Lecturer, Dept.of E&C, SSIT,
More informationEnd-to-End Mechanisms for QoS Support in Wireless Networks
End-to-End Mechanisms for QoS Support in Wireless Networks R VS Torsten Braun joint work with Matthias Scheidegger, Marco Studer, Ruy de Oliveira Computer Networks and Distributed Systems Institute of
More informationEnergy Efficient Data Gathering For Throughput Maximization with Multicast Protocol In Wireless Sensor Networks
Energy Efficient Data Gathering For Throughput Maximization with Multicast Protocol In Wireless Sensor Networks S. Gokilarani 1, P. B. Pankajavalli 2 1 Research Scholar, Kongu Arts and Science College,
More informationDynamic Deferred Acknowledgment Mechanism for Improving the Performance of TCP in Multi-Hop Wireless Networks
Dynamic Deferred Acknowledgment Mechanism for Improving the Performance of TCP in Multi-Hop Wireless Networks Dodda Sunitha Dr.A.Nagaraju Dr. G.Narsimha Assistant Professor of IT Dept. Central University
More informationIntra and Inter Cluster Synchronization Scheme for Cluster Based Sensor Network
Intra and Inter Cluster Synchronization Scheme for Cluster Based Sensor Network V. Shunmuga Sundari 1, N. Mymoon Zuviria 2 1 Student, 2 Asisstant Professor, Computer Science and Engineering, National College
More informationA UGC Recommended Journal Page 73
Congestion control in Wireless Sensor Network based on prediction modeling with HMM N. Thrimoorthy 1, Dr.T. Anuradha 2 1 Assistant Professor, New Horizon College of Engineering, Bangalore, India. 2 Associate
More informationReservation Packet Medium Access Control for Wireless Sensor Networks
Reservation Packet Medium Access Control for Wireless Sensor Networks Hengguang Li and Paul D Mitchell Abstract - This paper introduces the Reservation Packet Medium Access Control (RP-MAC) protocol for
More informationCS321: Computer Networks Congestion Control in TCP
CS321: Computer Networks Congestion Control in TCP Dr. Manas Khatua Assistant Professor Dept. of CSE IIT Jodhpur E-mail: manaskhatua@iitj.ac.in Causes and Cost of Congestion Scenario-1: Two Senders, a
More informationCongestion Control in Wireless Sensor Networks: A survey
RESEARCH ARTICLE OPEN ACCESS Congestion Control in Wireless Sensor Networks: A survey Samita Indurkar *, N. P. Kulkarni ** *(Department of information Technology, Pune University,Pune-41) ** (Department
More informationComputer Networks 53 (2009) Contents lists available at ScienceDirect. Computer Networks. journal homepage:
Computer Networks 53 (2009) 1879 1902 Contents lists available at ScienceDirect Computer Networks journal homepage: www.elsevier.com/locate/comnet An energy-efficient, transport-controlled MAC protocol
More informationCongestion Control Technique with Safety Transmission of Messages in Vehicular Ad Hoc Network
Congestion Control Technique with Safety Transmission of Messages in Vehicular Ad Hoc Network Bhagyashri P. Deshpande 1, Dr.A.S.Alvi 2 1 M.E(CSE) PRMIT&R, Badnera, Amravati 2 Professor,Dept. of CSE PRMIT&R,Badnera,
More informationSIMPLE MODEL FOR TRANSMISSION CONTROL PROTOCOL (TCP) Irma Aslanishvili, Tariel Khvedelidze
80 SIMPLE MODEL FOR TRANSMISSION CONTROL PROTOCOL (TCP) Irma Aslanishvili, Tariel Khvedelidze Abstract: Ad hoc Networks are complex distributed systems that consist of wireless mobile or static nodes that
More informationIJREAT International Journal of Research in Engineering & Advanced Technology, Volume 1, Issue 2, April-May, 2013 ISSN:
Fast Data Collection with Reduced Interference and Increased Life Time in Wireless Sensor Networks Jayachandran.J 1 and Ramalakshmi.R 2 1 M.Tech Network Engineering, Kalasalingam University, Krishnan koil.
More informationPriority Based Congestion Detection and Avoidance in Wireless Sensor Networks
Journal of Computer Science, 9 (3): 350-357, 2013 ISSN 1549-3636 2013 Jayakumari and Senthilkumar, This open access article is distributed under a Creative Commons Attribution (CC-BY) 3.0 license doi:10.3844/jcssp.2013.350.357
More informationcs/ee 143 Communication Networks
cs/ee 143 Communication Networks Chapter 4 Transport Text: Walrand & Parakh, 2010 Steven Low CMS, EE, Caltech Recap: Internet overview Some basic mechanisms n Packet switching n Addressing n Routing o
More informationRandomization. Randomization used in many protocols We ll study examples:
Randomization Randomization used in many protocols We ll study examples: Ethernet multiple access protocol Router (de)synchronization Switch scheduling 1 Ethernet Single shared broadcast channel 2+ simultaneous
More informationRandomization used in many protocols We ll study examples: Ethernet multiple access protocol Router (de)synchronization Switch scheduling
Randomization Randomization used in many protocols We ll study examples: Ethernet multiple access protocol Router (de)synchronization Switch scheduling 1 Ethernet Single shared broadcast channel 2+ simultaneous
More informationChapter 7 CONCLUSION
97 Chapter 7 CONCLUSION 7.1. Introduction A Mobile Ad-hoc Network (MANET) could be considered as network of mobile nodes which communicate with each other without any fixed infrastructure. The nodes in
More informationTransmission Control Protocol. ITS 413 Internet Technologies and Applications
Transmission Control Protocol ITS 413 Internet Technologies and Applications Contents Overview of TCP (Review) TCP and Congestion Control The Causes of Congestion Approaches to Congestion Control TCP Congestion
More informationMEASURING PERFORMANCE OF VARIANTS OF TCP CONGESTION CONTROL PROTOCOLS
MEASURING PERFORMANCE OF VARIANTS OF TCP CONGESTION CONTROL PROTOCOLS Harjinder Kaur CSE, GZSCCET, Dabwali Road, Bathinda, Punjab, India, sidhuharryab@gmail.com Gurpreet Singh Abstract CSE, GZSCCET, Dabwali
More informationCMPE 257: Wireless and Mobile Networking
CMPE 257: Wireless and Mobile Networking Katia Obraczka Computer Engineering UCSC Baskin Engineering Lecture 10 CMPE 257 Spring'15 1 Student Presentations Schedule May 21: Sam and Anuj May 26: Larissa
More informationALL ABOUT DATA AGGREGATION IN WIRELESS SENSOR NETWORKS
e-issn 2455 1392 Volume 1 Issue 1, November 2015 pp. 1-7 http://www.ijcter.com ALL ABOUT DATA AGGREGATION IN WIRELESS SENSOR NETWORKS Komal Shah 1, Heena Sheth 2 1,2 M. S. University, Baroda Abstract--
More informationIntelligent Transportation Systems. Medium Access Control. Prof. Dr. Thomas Strang
Intelligent Transportation Systems Medium Access Control Prof. Dr. Thomas Strang Recap: Wireless Interconnections Networking types + Scalability + Range Delay Individuality Broadcast o Scalability o Range
More informationComparison of TDMA based Routing Protocols for Wireless Sensor Networks-A Survey
Comparison of TDMA based Routing Protocols for Wireless Sensor Networks-A Survey S. Rajesh, Dr. A.N. Jayanthi, J.Mala, K.Senthamarai Sri Ramakrishna Institute of Technology, Coimbatore ABSTRACT One of
More informationChapter 24 Congestion Control and Quality of Service 24.1
Chapter 24 Congestion Control and Quality of Service 24.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 24-1 DATA TRAFFIC The main focus of congestion control
More informationMulticasting in ad hoc networks: Energy efficient
Multicasting in ad hoc networks: Energy efficient Blerta Bishaj Helsinki University of Technology 1. Introduction...2 2. Sources of power consumption... 3 3. Directional antennas... 3 4. TCP... 3 5. Energy-efficient
More informationCongestion in Data Networks. Congestion in Data Networks
Congestion in Data Networks CS420/520 Axel Krings 1 Congestion in Data Networks What is Congestion? Congestion occurs when the number of packets being transmitted through the network approaches the packet
More informationCollaborative Transport Control Protocol for Sensor Networks
Collaborative Transport Control Protocol for Sensor Networks Eugenia Giancoli CEFET/MG - Brasil eugenia@gta.ufrj.br Filippe Jabour CEFET/MG - Brasil jabour@gta.ufrj.br Aloysio Pedroza Brasil aloysio@gta.ufrj.br
More informationCongestion Control in Mobile Ad-Hoc Networks
Congestion Control in Mobile Ad-Hoc Networks 1 Sandeep Rana, 2 Varun Pundir, 3 Ram Sewak Singh, 4 Deepak Yadav 1, 2, 3, 4 Shanti Institute of Technology, Meerut Email: sandeepmietcs@gmail.com Email: varunpundir@hotmail.com
More informationRouting over Low Power and Lossy Networks
outing over Low Power and Lossy Networks Analysis and possible enhancements of the IETF PL routing protocol Enzo Mingozzi Associate Professor @ University of Pisa e.mingozzi@iet.unipi.it outing over LLNs
More informationManaging Caching Performance and Differentiated Services
CHAPTER 10 Managing Caching Performance and Differentiated Services This chapter explains how to configure TCP stack parameters for increased performance ant throughput and how to configure Type of Service
More informationStudy and Comparison of Mesh and Tree- Based Multicast Routing Protocols for MANETs
Study and Comparison of Mesh and Tree- Based Multicast Routing Protocols for MANETs Rajneesh Gujral Associate Proffesor (CSE Deptt.) Maharishi Markandeshwar University, Mullana, Ambala Sanjeev Rana Associate
More informationLecture 8 Wireless Sensor Networks: Overview
Lecture 8 Wireless Sensor Networks: Overview Reading: Wireless Sensor Networks, in Ad Hoc Wireless Networks: Architectures and Protocols, Chapter 12, sections 12.1-12.2. I. Akyildiz, W. Su, Y. Sankarasubramaniam
More information3. Evaluation of Selected Tree and Mesh based Routing Protocols
33 3. Evaluation of Selected Tree and Mesh based Routing Protocols 3.1 Introduction Construction of best possible multicast trees and maintaining the group connections in sequence is challenging even in
More information