Congestion Control Techniques in WSNs: A Review
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2019, Vol 10, Issue 4
Abstract
Congestion control has a great importance in wireless sensor network (WSN), where efficient application of congestion control mechanisms can prolong the network lifetime. Thus, proper examination is needed to improve more refine way to address the congestion occurrence and resolution. While designing congestion control techniques, the maximum output can be achieved by efficient utilization of required resources within WSN. From last few years several approaches have been brought in, that consist of routing protocols which provide support with congestion control, congestion prevention, and reliable data routing. In old schemes the topology reset and extent traffic drop take place because sink node executes the congestion avoidance. Therefore, node level congestion avoidance, detection, congestion preventing, and resolution mechanisms have been proposed during past few years. Our paper provides a brief overview and performance comparison of centralized and distributed congestion control algorithms in WSN.
Authors and Affiliations
Babar Nawaz, Khalid Mahmood, Jahangir Khan, Mahmood ul Hassan, Ansar Munir Shah, Muhammad Kashif Saeed
Suitable Personality Traits for Learning Programming Subjects: A Rough-Fuzzy Model
Programming is a cognitive activity which requires logical reasoning to code for abstract presentation. This study aims to find out the personality traits of students who maintain the effective grades in learning program...
Ameliorate Threshold Distributed Energy Efficient Clustering Algorithm for Heterogeneous Wireless Sensor Networks
Ameliorating the lifetime in heterogeneous wireless sensor network is an important task because the sensor nodes are limited in the resource energy. The best way to improve a WSN lifetime is the clustering based algorith...
Detection and Prevention of SQL Injection Attack by Dynamic Analyzer and Testing Model
With the emergence and popularity of web application, threats related to web applications has increased to large extent. Among many other web applications threats Structured Query Language Injection Attack (SQLIA) is the...
RTS/CTS Framework Paradigm and WLAN Qos Provisioning Methods
Wireless local area network (WLAN) communications performance design and management have evolved a lot to be where they are today. They went through some technology’s amendments and innovations. But, some performance too...
Application of Relevance Vector Machines in Real Time Intrusion Detection
In the recent years, there has been a growing interest in the development of change detection techniques for the analysis of Intrusion Detection. This interest stems from the wide range of applications in which change de...