SlideShare a Scribd company logo
TRANSPORT CONTROL PROTOCOLS
FOR WIRELESS SENSOR Networks
7.1
TRADITIONAL TRANSPORT CONTROL PROTOCOLS
The transport layer provides end-to-end segment transportation,



where,


Messages are segmented into a chain of segments at the source and



They are reassembled back into the original message at the destination
nodes.

The transport layer does not concern itself with the underlying protocol



structures for delivery and/or with the mechanisms used to deliver
the segments to the destination nodes.

2

]Rushin $hah

February 27, 2014
7.1
TRADITIONAL TRANSPORT CONTROL PROTOCOLS
Examples of transport protocols are:



ด Transport Control Protocol (TCP),
ด User Datagram Protocol (UDP),
ด Sequenced Packet Exchange Protocol (SPX), and

ด NWLink (Microsoft’s approach to implementing IPX/SPX).

Classification of TCP:



Connection-Oriented & Connectionless

3

]Rushin $hah

February 27, 2014
7.1
TRADITIONAL TRANSPORT CONTROL PROTOCOLS
Phases of Connection-Oriented Protocol operation:

Connection establishment:





The sender issues a request message to establish a connection
between itself and the destination.



If the destination node is available and there is a path between source
and the destination, a connection will be established.



This connection is a logical link connecting the sender and the
receiver.

4

]Rushin $hah

February 27, 2014
7.1
TRADITIONAL TRANSPORT CONTROL PROTOCOLS
Phases of Connection-Oriented Protocol operation:
Data transmission:





After a connection has been established, data transmission
commences between the sender and the receiver.



During the information exchange, the rate at which either side is
transmitting may be adjusted.



This adjustment depends on the possible congestion (or lack thereof)
in the network.



Since data may be lost in the process of transmission, the transport

protocol may support packet loss detection & loss recovery
mechanisms.
5

]Rushin $hah

February 27, 2014
7.1
TRADITIONAL TRANSPORT CONTROL PROTOCOLS
Phases of Connection-Oriented Protocol operation:

Disconnect:





After completion of data exchange between the source and the
destination, the connection is torn down.



In some cases, unexpected events such as the receiver becoming
unavailable in the midst of data exchange may also lead to
connection breakdown.

6

]Rushin $hah

February 27, 2014
7.1
TRADITIONAL TRANSPORT CONTROL PROTOCOLS
Connectionless Protocol:


It is very simple and its operation consists of only one phase.



In essence, there is no need to request establishment of a connection
between the sender and the receiver.



‘When the source has information to send, it forwards it to the
destination without the need for connection establishment.’

7

]Rushin $hah

February 27, 2014
7.1
TRADITIONAL TRANSPORT CONTROL PROTOCOLS
Another Classification of TP:
¥

Transport protocols can also be classified as elastic or non-elastic.

¥

TCP is an elastic protocol and UDP is a non-elastic protocol.

¥

Elasticity in a protocol means that the data transmission rate can be
adjusted by the sender.

¥

Non-elasticity implies that the transmission rate cannot be
adjusted.

8

]Rushin $hah

February 27, 2014
7.1
TRADITIONAL TRANSPORT CONTROL PROTOCOLS
Depending on the application, the transport protocol may or not support
the following Features:
ζ
ζ

Flow and Congestion control

ζ

Loss Recovery

ζ

9

Orderly transmission

Quality of Service

]Rushin $hah

February 27, 2014
7.1
TRADITIONAL TRANSPORT CONTROL PROTOCOLS


Orderly transmission:


Within a communications network multiple paths may exist between a
given source and destination.



As a result, packets sent in a certain order by the source may not be
received in the same order at the destination.



For most applications, packets must be reordered at the destination to
represent the same order as at the source.



The transport protocol can provide the reordering.



The common approach is for the protocol to include a field, containing a
sequential number of the segments transmitted.

10

]Rushin $hah

February 27, 2014
7.1
TRADITIONAL TRANSPORT CONTROL PROTOCOLS


Flow and Congestion control:


Hosts at each end of a particular connection can be diverse with
different characteristics, such as capacity of communication and
computation.



If the sender transmits segments with a higher rate than the receiver is
able to handle and process, the buffers at the receiver may overflow and
congestion occurs.



Transport layers provide flow and congestion control service to

coordinate the suitable transmission rate between senders and receivers.


The key in the process of congestion control is proper detection of
congestion and notification of the sender about the congestion state.

11

]Rushin $hah

February 27, 2014
7.1
TRADITIONAL TRANSPORT CONTROL PROTOCOLS


Loss recovery:


Network congestion can lead to data loss due to limited resources at
sensor nodes.



The link layer may not provide loss recovery functions in all
circumstances.



Therefore, the transport protocol’s support for loss recovery is a very
helpful feature.



An obvious approach to loss recovery is retransmission after detection of

loss.

12

]Rushin $hah

February 27, 2014
7.1
TRADITIONAL TRANSPORT CONTROL PROTOCOLS


Quality of service:


For real-time applications such as video on demand (VOD) and
net meeting, which are real-time and delay-critical with a required
bandwidth, the transport layer should provide high throughput
within the constraints of allocated bandwidth.



The transport protocol can incorporate QoS considerations into flow
and congestion control.

13

]Rushin $hah

February 27, 2014
7.1.4
Feasibility of Using TCP or UDP for WSNs
Following are the problems that make either TCP or UDP unsuitable for
implementation in WSNs:


TCP is a connection-oriented protocol.
However, in WSNs, the number of sensed data for event-based
applications is usually very small.
The three-way handshake process required for TCP is a large overhead
for such a small volume of data.



TCP uses end-to-end ACK and retransmission when necessary.
This will result in much lower throughput and longer transmission time
when RTT is long, as is the case in most WSNs.
14

]Rushin $hah

February 27, 2014
7.1.4
Feasibility of Using TCP or UDP for WSNs


In TCP, segment loss can potentially trigger window-based flow and
congestion control.
This will reduce the transmission rate unnecessarily when, in fact,
packet loss may have occurred as a result of link error and there may
be no congestion.
This behaviour will lead to low throughput, especially under multiple
wireless hops, which are prevalent in WSNs.

15

]Rushin $hah

February 27, 2014
7.1.4
Feasibility of Using TCP or UDP for WSNs


TCP uses an end-to-end process for congestion control.

Generally, this results in longer response to congestion, and in turn, will
result in a large amount of segment loss.
The segment loss, in turn, results in energy waste in the
retransmission.
Furthermore, a long response time to congestion results in low
throughput and utilization of wireless channels.

16

]Rushin $hah

February 27, 2014
7.1.4
Feasibility of Using TCP or UDP for WSNs


Sensor nodes may be within a different hop count and RTT from the
sink.
The TCP operates unfairly in such environments.
The sensor nodes near the sink may receive more opportunities to
transmit (which results in them depleting their energy sooner).
This may also result in a disconnect between more distant nodes and
the sink.

17

]Rushin $hah

February 27, 2014
7.1.4
Feasibility of Using TCP or UDP for WSNs
As a connectionless transport control protocol, UDP is also not suitable
for WSNs. Here are some reasons:


Because of the lack of flow and congestion control mechanisms in UDP,
datagram loss can result in congestion.
From this point of view, UDP is also not energy efficient for WSNs.



UDP contains no ACK mechanism; therefore, the lost datagrams can be
recovered only by lower or upper layers, including the application layer.

18

]Rushin $hah

February 27, 2014
7.2
TRANSPORT PROTOCOL DESIGN ISSUES


WSNs should be designed with an eye to energy conservation,
congestion control, reliability in data dissemination, security and
management.



Congestion control may involve only the transport layer, but energy
conservation may be related to the physical, data link, network, and
perhaps all other high layers.



Generally, transport control protocols’ design include two main
functions: Congestion Control and Loss Recovery.

19

]Rushin $hah

February 27, 2014
7.2
TRANSPORT PROTOCOL DESIGN ISSUES
The design of transport protocols for WSNs should consider the
following factors:

1 Perform congestion control and reliable delivery of data.
-Since most data are from the sensor nodes to the sink, congestion
might occur around the sink. WSNs need a mechanism for packet loss

recovery, such as ACK and selective ACK used in TCP.
-It may be more effective to use a hop-by-hop approach for
congestion control and loss recovery since it may reduce packet loss
and therefore conserve energy.
-The hop-by-hop mechanism can also lower the buffer requirement at
the intermediate nodes.
20

]Rushin $hah

February 27, 2014
7.2
TRANSPORT PROTOCOL DESIGN ISSUES
2 Transport protocols for wireless sensor networks should simplify the
initial connection establishment process or use a connectionless
protocol to speed up the connection process, improve throughput and
lower transmission delay.
3 Transport protocols for WSNs should avoid packet loss as much as
possible since loss translates to energy waste.
To avoid packet loss, the transport protocol should use an
Active Congestion Control (ACC) at the cost of slightly lower link
utilization.

21

]Rushin $hah

February 27, 2014
7.2
TRANSPORT PROTOCOL DESIGN ISSUES
4 The transport control protocols should guarantee fairness for a variety
of sensor nodes.
5 If possible, a transport protocol should be designed with cross-layer
optimization in mind.
For example, if a routing algorithm informs the transport protocol of
route failure, the protocol will be able to deduce that packet loss is not
from congestion but from route failure.

22

]Rushin $hah

February 27, 2014
7.3
EXAMPLES OF EXISTING TCPs


The examples of TCPs can be grouped in one of the four group:
҉ Upstream

Congestion Control,(CODA, RMST)

҉ Downstream
҉ Upstream

Reliability Guarantee, (ESRT)

҉ Downstream

23

Congestion Control,

Reliability Guarantee.(PSFQ, GARUDA)

]Rushin $hah

February 27, 2014
7.3.1
Congestion Detection and Avoidance


CODA is an upstream congestion control technique that consists of
three elements:



Open-loop hop-by-hop backpressure, and




Congestion detection,

Closed-loop end-to-end multisource regulation.

CODA attempts to detect congestion by monitoring current buffer
occupancy and wireless channel load.



If buffer occupancy or wireless channel load exceeds a threshold, it
implies that congestion has occurred.

24

]Rushin $hah

February 27, 2014
7.3.1
Congestion Detection and Avoidance


The node that has detected congestion will then notify its upstream
neighbor to reduce its rate, using an open-loop hop-by-hop
backpressure.



The upstream neighbor nodes trigger reduction of their output rate
using methods such as AIMD.



Finally, CODA regulates a multisource rate through a closed-loop endto-end approach, as follows:

25

]Rushin $hah

February 27, 2014
7.3.1
Congestion Detection and Avoidance
When a sensor node exceeds its theoretical rate, it sets a ‘‘regulation’’

I.

bit in the ‘‘event’’ packet;
II.

If the event packet received by the sink has a ‘‘regulation’’ bit set, the
sink sends an ACK message to the sensor nodes and informs them to
reduce their rate; and

III.

If the congestion is cleared, the sink will send an immediate ACK
control message to the sensor nodes, informing them that they can
increase their rate.

26

]Rushin $hah

February 27, 2014
7.3.1
Congestion Detection and Avoidance


Disadvantage:


Its unidirectional control, only from the sensors to the sink;



There is no reliability consideration;



The response time of its closed-loop multisource control increases
under heavy congestion since the ACK issued from the sink will
probably be lost.

27

]Rushin $hah

February 27, 2014
7.3.2
Event-to-Sink Reliable Transport


It provides reliability and congestion control, belongs to the upstream
reliability guarantee group.



It periodically computes a reliability figure (γ), representing the rate of
packets received successfully in a given time interval.



ESRT then deduces the required sensor reporting frequency (f ) from the
reliability figure (γ) using an expression such as f = G(γ).



Finally, ESRT informs all sensors of the values of ( f ) through an assumed
channel with high power.



ESRT uses an end-to-end approach to guarantee a desired reliability figure
through adjusting the sensors’ reporting frequency.
28

]Rushin $hah

February 27, 2014
7.3.2
Event-to-Sink Reliable Transport


A DVA N TA G E


It provides overall reliability for the application.



The additional benefit of ESRT is energy conservation through
control of reporting frequency.



Disadvantages
 It

advertises the same reporting frequency to all sensors considers

mainly reliability and energy conservation as performance measures.

29

]Rushin $hah

February 27, 2014
30

]Rushin $hah

February 27, 2014
7.3.3
Reliable Multi-Segment Transport


RMST guarantees successful transmission of packets in the upstream
direction.



Intermediate nodes cache each packet to enable hop-by-hop recovery,
or they operate in non cache mode, where only end hosts cache the
transmitted packets for end-to-end recovery.



RMST supports both cache & non cache modes.



Furthermore, RMST uses selective NACK and timer-driven mechanisms
for loss detection and notification.

31

]Rushin $hah

February 27, 2014
7.3.3
Reliable Multi-segment Transport


In the cache mode, lost packets are recovered hop by hop through the
intermediate sensor nodes.



If an intermediate node fails to locate the lost packet, or if the
intermediate node works in non cache mode, it will forward the NACK
upstream toward the source node.



RMTS is designed to run above directed diffusion, which is a routing
protocol, in order to provide guaranteed reliability for applications.



Disadvantage:


Lack of Congestion Control,



Energy Efficiency, and



Application-level Reliability.

32

]Rushin $hah

February 27, 2014
7.3.4
Pump Slowly, Fetch Quickly


PSFQ distributes data from sink to sensors by pacing data at a relatively
slow speed.



It allowing sensor nodes that experience data loss to recover any
missing segments from immediate neighbors.



This approach belongs to the group downstream reliability guarantee.



The motivation is to achieve loose delay bounds while minimizing loss
recovery by localizing data recovery among immediate neighbors.



PSFQ consists of three operations: pump, fetch, and report

33

]Rushin $hah

February 27, 2014
7.3.4
Pump Slowly, Fetch Quickly


Wo r k i n g :



Sink broadcasts a packet to its neighbors every T time units until all the
data fragments have been sent out.



Once a sequence number gap is detected, the sensor node goes into
fetch mode and issues a NACK in the reverse path to recover the missing
fragment.



The NACK is not relayed by the neighbor nodes unless the number of times
that the NACK is sent, exceeds a predefined threshold.



Finally, the sink can ask sensors to provide it with the data delivery status
information through a simple and scalable hop-by-hop report mechanism.

34

]Rushin $hah

February 27, 2014
7.3.4
Pump Slowly, Fetch Quickly


Disadvantages:


It can not detect packet loss for single packet transmission;



It uses a slow pump, which results in a large delay; and



hop-by-hop recovery with cache necessitates larger buffer sizes.

35

]Rushin $hah

February 27, 2014
7.3.5
GARUDA


GARUDA is in the downstream reliability group.



It is based on a two-tier node architecture; nodes with 3i hops from the
sink are selected as core sensor nodes (i is an integer).



The remaining nodes (noncore) are called second-tier nodes.



Each noncore sensor node chooses a nearby core node as its core node
for lost packet recovery.



GARUDA uses a NACK message for loss detection and notification.



Loss recovery is performed in two categories:


Loss recovery among core sensor nodes, and



Loss recovery between noncore sensor nodes and their core node.

36

]Rushin $hah

February 27, 2014
7.3.5
GARUDA


Therefore, retransmission to recover lost packets looks like a
hybrid scheme between pure hop by hop and end to end.



GARUDA designs a repeated wait for first packet (WFP) pulse
transmission to guarantee the success of single or first packet delivery.



Furthermore, pulse transmission is used to compute the hop number
and to select core sensor nodes in order to establish a two-tier node
architecture.



Disadvantages:


Lack of reliability in the upstream direction and



lack of congestion control.

37

]Rushin $hah

February 27, 2014
7.3.6
Ad Hoc Transport Protocol


ATP works based on a receiver- and network-assisted end-to-end
feedback control algorithm.



It uses selective ACKs (SACKs) for packet loss recovery.



In ATP, intermediate network nodes compute the sum of exponentially
distributed packet queuing and transmission delay, called D.
D = PQ + TD



The required end-to-end rate is set as the inverse of D.



The values of D are computed over all packets that traverse a given

sensor node, and if it exceeds the value that is piggybacked in each
outgoing packet, it updates the field before forwarding the packet.
38

]Rushin $hah

February 27, 2014
7.3.6
Ad Hoc Transport Protocol


The receiver calculates the required end-to-end rate (inverse of D) and
feeds it back to the sender.



Thus, the sender can intelligently adjust its sending rate according to
the value received from the receiver.



To guarantee reliability, ATP uses selective ACKs (SACKs) as an end-toend mechanism for loss detection.



ATP decouples congestion control from reliability and as a result,
achieves better fairness and higher throughput than TCP.



However, energy issues are not considered for this design, which raises
the question of optimality of ATP for an end-to-end control scheme
39

]Rushin $hah

February 27, 2014
7.3.7
Problems with Transport Control Protocols


The major functions of transport protocols for wireless sensors
networks that should be considered carefully in the design of these
protocols are:


Congestion Control,



Reliability Guarantee, and



Energy Conservation.

40

]Rushin $hah

February 27, 2014
7.3.7
Problems with Transport Control Protocols


All previous protocols


Provide either congestion or reliability in either upstream or
downstream (not both). –-)1(



Only control congestion either end-to-end or hop-by-hop. –-)2(



Provide either packet- or application-level reliability (if reliability is
provided at all). –-)3(



None of the existing transport protocols implement cross-layer
optimization. –-)4(

41

]Rushin $hah

February 27, 2014
7.4
PERFORMANCE OF TCPs


The

measure

used

for

congestion

comparison

is

Energy

Consumption, which is calculated for end-to-end and hop-by-hop
cases.


The other measure is Loss Performance, which is based on cache and
non cache approaches.

42

]Rushin $hah

February 27, 2014
7.4.1
Congestion


Two general approaches to congestion control are:

〩

end-to-end approach: It is the source node’s responsibility to detect
congestion in either the receiver-assisted mode (ACK-based loss
detection) or the network-assisted mode (using explicit congestion

notification).
Therefore, rate adjustments occur only at the source node.
〩

hop-by-hop approach: Intermediate nodes detect congestion and notify

the originating link node. Hop-by-hop control can potentially eliminate
congestion faster than the end-to-end approach, and can reduce packet
loss and energy consumption in sensor nodes.
43

]Rushin $hah

February 27, 2014
7.4.1
Congestion


A simple model is provided here to help understand the impact of
congestion control on energy efficiency. The following assumptions are
made:
¶

There are h > 1 hops between sources and sink nodes, and each hop
introduces a delay d. The link capacity is C.

¶

Congestion occurs uniformly in the network. The frequency of
congestion occurrence is f , which is dependent on network topology,
traffic characteristics, and buffer size.

¶

When the total rate of source transmission exceeds C(1+a), congestion
will be detected.

¶
44

e is the average energy consumed to send or receive a packet on each
link.

]Rushin $hah

February 27, 2014
7.4.2
Packet Loss Recovery


Generally, two methods are available for this purpose:



Non cache recovery is an end-to-end ARQ (automatic repeat request)
similar to the traditional TCP.
however, retransmissions may occur in h hops, and therefore more
total energy is required.



Cache-based recovery uses a hop-by-hop approach and relies on
caching at the intermediate nodes, with retransmissions between two
neighbouring nodes.

45

]Rushin $hah

February 27, 2014
7.4.2
Packet Loss Recovery


The cache point is defined as the node that copies transmitted packets
locally for a certain time period.



The loss point is defined as the node at which packets are dropped due
to congestion.



Let’s define the retransmission path length (lp)as the number of hops
from the caching node to the node where loss occurs.



Therefore, in the non cache case, (lp) = h1, where h1 is the number of
hops from the loss point to the source node.



In the cache case, lp can be 1 if lost packets are found in neighbouring
nodes.
46

]Rushin $hah

February 27, 2014
7.4.2
Packet Loss Recovery


In cache-based recovery, each packet is stored at every intermediate
node that it visits until its neighbouring node receives the packet
successfully, or when a timeout occurs (whichever is sooner).
In this case it is likely that lp is very close to 1.




Another option is to distribute caching so that packet copies are
scattered among intermediated nodes.



Each packet is stored in only one or several intermediate nodes.



Distributed caching might have a longer lp than regular caching (but
still smaller than in the non cache case) and requires less buffer space
than regular caching.
47

]Rushin $hah

February 27, 2014
7.5
CONCLUSION
When designing transport control protocols for wireless sensor networks,



one should consider carefully such issues as:


Protocol effectiveness and the efficiency of congestion control mechanisms.
Effective mechanisms avoid packet loss as much as possible while
providing high throughput.



Reliability in the transport layer, whether loss recovery is required at the
transport layer & which mechanism is effective and energy efficient.
Preferably, any such mechanisms should have low buffering requirements.



Fairness among sensor nodes within different distances from the sink.



Utilization of some type of cross-layer optimization to improve
performance.

48

]Rushin $hah

February 27, 2014
49

]Rushin $hah

February 27, 2014

More Related Content

What's hot

Data aggregation in wireless sensor network , 11751 d5811
Data aggregation in wireless sensor network , 11751 d5811Data aggregation in wireless sensor network , 11751 d5811
Data aggregation in wireless sensor network , 11751 d5811praveen369
 
Wsn unit-1-ppt
Wsn unit-1-pptWsn unit-1-ppt
Wsn unit-1-pptSwathi Ch
 
Design Issues In Adhoc Wireless MAC Protocol
Design Issues In Adhoc Wireless MAC ProtocolDesign Issues In Adhoc Wireless MAC Protocol
Design Issues In Adhoc Wireless MAC ProtocolDushhyant Kumar
 
Unit 4 ec8702 - ad hoc and wireless sensor networks unit -4 mr.darwin nesaku...
Unit  4 ec8702 - ad hoc and wireless sensor networks unit -4 mr.darwin nesaku...Unit  4 ec8702 - ad hoc and wireless sensor networks unit -4 mr.darwin nesaku...
Unit 4 ec8702 - ad hoc and wireless sensor networks unit -4 mr.darwin nesaku...Darwin Nesakumar
 
Destination Sequenced Distance Vector Routing (DSDV)
Destination Sequenced Distance Vector Routing (DSDV)Destination Sequenced Distance Vector Routing (DSDV)
Destination Sequenced Distance Vector Routing (DSDV)ArunChokkalingam
 
Adhoc wireless networks and its issues
Adhoc wireless networks and its issuesAdhoc wireless networks and its issues
Adhoc wireless networks and its issuesMenaga Selvaraj
 
Geographic Routing in WSN
Geographic Routing in WSNGeographic Routing in WSN
Geographic Routing in WSNMahbubur Rahman
 
Energy consumption of wsn
Energy consumption of wsnEnergy consumption of wsn
Energy consumption of wsnDeepaDasarathan
 
Security of ad hoc networks
Security of ad hoc networksSecurity of ad hoc networks
Security of ad hoc networksJayesh Rane
 
Routing protocols for ad hoc wireless networks
Routing protocols for ad hoc wireless networks Routing protocols for ad hoc wireless networks
Routing protocols for ad hoc wireless networks Divya Tiwari
 
SPINS: Security Protocols for Sensor Networks
SPINS: Security Protocols for Sensor NetworksSPINS: Security Protocols for Sensor Networks
SPINS: Security Protocols for Sensor NetworksAbhijeet Awade
 
WSN-Routing Protocols Energy Efficient Routing
WSN-Routing Protocols Energy Efficient RoutingWSN-Routing Protocols Energy Efficient Routing
WSN-Routing Protocols Energy Efficient RoutingArunChokkalingam
 
Issues in routing protocol
Issues in routing protocolIssues in routing protocol
Issues in routing protocolPradeep Kumar TS
 
Localization in WSN
Localization in WSNLocalization in WSN
Localization in WSNYara Ali
 
Protocols for wireless sensor networks
Protocols for wireless sensor networks Protocols for wireless sensor networks
Protocols for wireless sensor networks DEBABRATASINGH3
 
WSN-IEEE 802.15.4 -MAC Protocol
WSN-IEEE 802.15.4 -MAC ProtocolWSN-IEEE 802.15.4 -MAC Protocol
WSN-IEEE 802.15.4 -MAC ProtocolArunChokkalingam
 

What's hot (20)

Wsn 08
Wsn 08Wsn 08
Wsn 08
 
Data aggregation in wireless sensor network , 11751 d5811
Data aggregation in wireless sensor network , 11751 d5811Data aggregation in wireless sensor network , 11751 d5811
Data aggregation in wireless sensor network , 11751 d5811
 
Unit 33-routing protocols for wsn
Unit 33-routing protocols for wsnUnit 33-routing protocols for wsn
Unit 33-routing protocols for wsn
 
Wsn unit-1-ppt
Wsn unit-1-pptWsn unit-1-ppt
Wsn unit-1-ppt
 
Design Issues In Adhoc Wireless MAC Protocol
Design Issues In Adhoc Wireless MAC ProtocolDesign Issues In Adhoc Wireless MAC Protocol
Design Issues In Adhoc Wireless MAC Protocol
 
Unit 4 ec8702 - ad hoc and wireless sensor networks unit -4 mr.darwin nesaku...
Unit  4 ec8702 - ad hoc and wireless sensor networks unit -4 mr.darwin nesaku...Unit  4 ec8702 - ad hoc and wireless sensor networks unit -4 mr.darwin nesaku...
Unit 4 ec8702 - ad hoc and wireless sensor networks unit -4 mr.darwin nesaku...
 
Destination Sequenced Distance Vector Routing (DSDV)
Destination Sequenced Distance Vector Routing (DSDV)Destination Sequenced Distance Vector Routing (DSDV)
Destination Sequenced Distance Vector Routing (DSDV)
 
Adhoc wireless networks and its issues
Adhoc wireless networks and its issuesAdhoc wireless networks and its issues
Adhoc wireless networks and its issues
 
Geographic Routing in WSN
Geographic Routing in WSNGeographic Routing in WSN
Geographic Routing in WSN
 
Energy consumption of wsn
Energy consumption of wsnEnergy consumption of wsn
Energy consumption of wsn
 
Security of ad hoc networks
Security of ad hoc networksSecurity of ad hoc networks
Security of ad hoc networks
 
Routing protocols for ad hoc wireless networks
Routing protocols for ad hoc wireless networks Routing protocols for ad hoc wireless networks
Routing protocols for ad hoc wireless networks
 
SPINS: Security Protocols for Sensor Networks
SPINS: Security Protocols for Sensor NetworksSPINS: Security Protocols for Sensor Networks
SPINS: Security Protocols for Sensor Networks
 
WSN-Routing Protocols Energy Efficient Routing
WSN-Routing Protocols Energy Efficient RoutingWSN-Routing Protocols Energy Efficient Routing
WSN-Routing Protocols Energy Efficient Routing
 
Global state routing
Global state routingGlobal state routing
Global state routing
 
Issues in routing protocol
Issues in routing protocolIssues in routing protocol
Issues in routing protocol
 
Localization in WSN
Localization in WSNLocalization in WSN
Localization in WSN
 
Protocols for wireless sensor networks
Protocols for wireless sensor networks Protocols for wireless sensor networks
Protocols for wireless sensor networks
 
Leach protocol
Leach protocolLeach protocol
Leach protocol
 
WSN-IEEE 802.15.4 -MAC Protocol
WSN-IEEE 802.15.4 -MAC ProtocolWSN-IEEE 802.15.4 -MAC Protocol
WSN-IEEE 802.15.4 -MAC Protocol
 

Similar to Transport control protocols for Wireless sensor networks

Recital Study of Various Congestion Control Protocols in wireless network
Recital Study of Various Congestion Control Protocols in wireless networkRecital Study of Various Congestion Control Protocols in wireless network
Recital Study of Various Congestion Control Protocols in wireless networkiosrjce
 
IRJET-A Survey on congestion control with TCP network
IRJET-A Survey on congestion control with TCP networkIRJET-A Survey on congestion control with TCP network
IRJET-A Survey on congestion control with TCP networkIRJET Journal
 
Congestion Prediction and Adaptive Rate Adjustment Technique for Wireless Sen...
Congestion Prediction and Adaptive Rate Adjustment Technique for Wireless Sen...Congestion Prediction and Adaptive Rate Adjustment Technique for Wireless Sen...
Congestion Prediction and Adaptive Rate Adjustment Technique for Wireless Sen...IJORCS
 
Unit vi and vii vtu
Unit vi and vii vtuUnit vi and vii vtu
Unit vi and vii vtuchempa
 
Ephemeral Performance of Choke
Ephemeral Performance of ChokeEphemeral Performance of Choke
Ephemeral Performance of Chokepaperpublications3
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
A Case Study on Ip Based Cdma Ran by Controlling Router
A Case Study on Ip Based Cdma Ran by Controlling RouterA Case Study on Ip Based Cdma Ran by Controlling Router
A Case Study on Ip Based Cdma Ran by Controlling RouterIJERA Editor
 
A novel algorithm for tcp timeout
A novel algorithm for tcp timeoutA novel algorithm for tcp timeout
A novel algorithm for tcp timeoutIJCNCJournal
 
A survey on congestion control mechanisms
A survey on congestion control mechanismsA survey on congestion control mechanisms
A survey on congestion control mechanismseSAT Publishing House
 
Token Based Packet Loss Control Mechanism for Networks
Token Based Packet Loss Control Mechanism for NetworksToken Based Packet Loss Control Mechanism for Networks
Token Based Packet Loss Control Mechanism for NetworksIJMER
 
Iisrt arunkumar b (networks)
Iisrt arunkumar b (networks)Iisrt arunkumar b (networks)
Iisrt arunkumar b (networks)IISRT
 
IMPROVED QUALITY OF SERVICE PROTOCOL FOR REAL TIME TRAFFIC IN MANET
IMPROVED QUALITY OF SERVICE PROTOCOL FOR REAL TIME TRAFFIC IN MANETIMPROVED QUALITY OF SERVICE PROTOCOL FOR REAL TIME TRAFFIC IN MANET
IMPROVED QUALITY OF SERVICE PROTOCOL FOR REAL TIME TRAFFIC IN MANETIJCNCJournal
 
CONGESTION AWARE LINK COST ROUTING FOR MANETS
CONGESTION AWARE LINK COST ROUTING FOR MANETSCONGESTION AWARE LINK COST ROUTING FOR MANETS
CONGESTION AWARE LINK COST ROUTING FOR MANETSIJCNCJournal
 
Performance Evaluation of TCP with Adaptive Pacing and LRED in Multihop Wirel...
Performance Evaluation of TCP with Adaptive Pacing and LRED in Multihop Wirel...Performance Evaluation of TCP with Adaptive Pacing and LRED in Multihop Wirel...
Performance Evaluation of TCP with Adaptive Pacing and LRED in Multihop Wirel...ijwmn
 

Similar to Transport control protocols for Wireless sensor networks (20)

Recital Study of Various Congestion Control Protocols in wireless network
Recital Study of Various Congestion Control Protocols in wireless networkRecital Study of Various Congestion Control Protocols in wireless network
Recital Study of Various Congestion Control Protocols in wireless network
 
U01725129138
U01725129138U01725129138
U01725129138
 
IRJET-A Survey on congestion control with TCP network
IRJET-A Survey on congestion control with TCP networkIRJET-A Survey on congestion control with TCP network
IRJET-A Survey on congestion control with TCP network
 
Congestion Prediction and Adaptive Rate Adjustment Technique for Wireless Sen...
Congestion Prediction and Adaptive Rate Adjustment Technique for Wireless Sen...Congestion Prediction and Adaptive Rate Adjustment Technique for Wireless Sen...
Congestion Prediction and Adaptive Rate Adjustment Technique for Wireless Sen...
 
Unit vi and vii vtu
Unit vi and vii vtuUnit vi and vii vtu
Unit vi and vii vtu
 
Ephemeral Performance of Choke
Ephemeral Performance of ChokeEphemeral Performance of Choke
Ephemeral Performance of Choke
 
Bg4101335337
Bg4101335337Bg4101335337
Bg4101335337
 
Transport layer
Transport layer Transport layer
Transport layer
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
A Case Study on Ip Based Cdma Ran by Controlling Router
A Case Study on Ip Based Cdma Ran by Controlling RouterA Case Study on Ip Based Cdma Ran by Controlling Router
A Case Study on Ip Based Cdma Ran by Controlling Router
 
P2885 jung
P2885 jungP2885 jung
P2885 jung
 
A novel algorithm for tcp timeout
A novel algorithm for tcp timeoutA novel algorithm for tcp timeout
A novel algorithm for tcp timeout
 
A survey on congestion control mechanisms
A survey on congestion control mechanismsA survey on congestion control mechanisms
A survey on congestion control mechanisms
 
Token Based Packet Loss Control Mechanism for Networks
Token Based Packet Loss Control Mechanism for NetworksToken Based Packet Loss Control Mechanism for Networks
Token Based Packet Loss Control Mechanism for Networks
 
[IJCT-V3I3P5] Authors: Alok Kumar Dwivedi, Gouri Shankar Prajapati
[IJCT-V3I3P5] Authors: Alok Kumar Dwivedi, Gouri Shankar Prajapati[IJCT-V3I3P5] Authors: Alok Kumar Dwivedi, Gouri Shankar Prajapati
[IJCT-V3I3P5] Authors: Alok Kumar Dwivedi, Gouri Shankar Prajapati
 
Iisrt arunkumar b (networks)
Iisrt arunkumar b (networks)Iisrt arunkumar b (networks)
Iisrt arunkumar b (networks)
 
IMPROVED QUALITY OF SERVICE PROTOCOL FOR REAL TIME TRAFFIC IN MANET
IMPROVED QUALITY OF SERVICE PROTOCOL FOR REAL TIME TRAFFIC IN MANETIMPROVED QUALITY OF SERVICE PROTOCOL FOR REAL TIME TRAFFIC IN MANET
IMPROVED QUALITY OF SERVICE PROTOCOL FOR REAL TIME TRAFFIC IN MANET
 
CONGESTION AWARE LINK COST ROUTING FOR MANETS
CONGESTION AWARE LINK COST ROUTING FOR MANETSCONGESTION AWARE LINK COST ROUTING FOR MANETS
CONGESTION AWARE LINK COST ROUTING FOR MANETS
 
Performance Evaluation of TCP with Adaptive Pacing and LRED in Multihop Wirel...
Performance Evaluation of TCP with Adaptive Pacing and LRED in Multihop Wirel...Performance Evaluation of TCP with Adaptive Pacing and LRED in Multihop Wirel...
Performance Evaluation of TCP with Adaptive Pacing and LRED in Multihop Wirel...
 
Congestion control mechanism using network border protocol
Congestion control mechanism using network border protocolCongestion control mechanism using network border protocol
Congestion control mechanism using network border protocol
 

More from Rushin Shah

COLEA : A MATLAB Tool for Speech Analysis
COLEA : A MATLAB Tool for Speech AnalysisCOLEA : A MATLAB Tool for Speech Analysis
COLEA : A MATLAB Tool for Speech AnalysisRushin Shah
 
Marker Controlled Segmentation Technique for Medical application
Marker Controlled Segmentation Technique for Medical applicationMarker Controlled Segmentation Technique for Medical application
Marker Controlled Segmentation Technique for Medical applicationRushin Shah
 
Image feature extraction
Image feature extractionImage feature extraction
Image feature extractionRushin Shah
 
Visual pattern recognition
Visual pattern recognitionVisual pattern recognition
Visual pattern recognitionRushin Shah
 
Control aspects in Wireless sensor networks
Control aspects in Wireless sensor networks Control aspects in Wireless sensor networks
Control aspects in Wireless sensor networks Rushin Shah
 
Localization & management of sensor networks
Localization & management of sensor networksLocalization & management of sensor networks
Localization & management of sensor networksRushin Shah
 
Wireless sensors networks protocols part 2
Wireless sensors networks protocols part 2Wireless sensors networks protocols part 2
Wireless sensors networks protocols part 2Rushin Shah
 
Wireless sensors networks protocols
Wireless sensors networks protocolsWireless sensors networks protocols
Wireless sensors networks protocolsRushin Shah
 
Basics of Wireless sensor networks
Basics of Wireless sensor networksBasics of Wireless sensor networks
Basics of Wireless sensor networksRushin Shah
 
6. security in wireless sensor netwoks
6. security in wireless sensor netwoks6. security in wireless sensor netwoks
6. security in wireless sensor netwoksRushin Shah
 

More from Rushin Shah (10)

COLEA : A MATLAB Tool for Speech Analysis
COLEA : A MATLAB Tool for Speech AnalysisCOLEA : A MATLAB Tool for Speech Analysis
COLEA : A MATLAB Tool for Speech Analysis
 
Marker Controlled Segmentation Technique for Medical application
Marker Controlled Segmentation Technique for Medical applicationMarker Controlled Segmentation Technique for Medical application
Marker Controlled Segmentation Technique for Medical application
 
Image feature extraction
Image feature extractionImage feature extraction
Image feature extraction
 
Visual pattern recognition
Visual pattern recognitionVisual pattern recognition
Visual pattern recognition
 
Control aspects in Wireless sensor networks
Control aspects in Wireless sensor networks Control aspects in Wireless sensor networks
Control aspects in Wireless sensor networks
 
Localization & management of sensor networks
Localization & management of sensor networksLocalization & management of sensor networks
Localization & management of sensor networks
 
Wireless sensors networks protocols part 2
Wireless sensors networks protocols part 2Wireless sensors networks protocols part 2
Wireless sensors networks protocols part 2
 
Wireless sensors networks protocols
Wireless sensors networks protocolsWireless sensors networks protocols
Wireless sensors networks protocols
 
Basics of Wireless sensor networks
Basics of Wireless sensor networksBasics of Wireless sensor networks
Basics of Wireless sensor networks
 
6. security in wireless sensor netwoks
6. security in wireless sensor netwoks6. security in wireless sensor netwoks
6. security in wireless sensor netwoks
 

Recently uploaded

Jose-Rizal-and-Philippine-Nationalism-National-Symbol-2.pptx
Jose-Rizal-and-Philippine-Nationalism-National-Symbol-2.pptxJose-Rizal-and-Philippine-Nationalism-National-Symbol-2.pptx
Jose-Rizal-and-Philippine-Nationalism-National-Symbol-2.pptxricssacare
 
2024_Student Session 2_ Set Plan Preparation.pptx
2024_Student Session 2_ Set Plan Preparation.pptx2024_Student Session 2_ Set Plan Preparation.pptx
2024_Student Session 2_ Set Plan Preparation.pptxmansk2
 
The Benefits and Challenges of Open Educational Resources
The Benefits and Challenges of Open Educational ResourcesThe Benefits and Challenges of Open Educational Resources
The Benefits and Challenges of Open Educational Resourcesaileywriter
 
Gyanartha SciBizTech Quiz slideshare.pptx
Gyanartha SciBizTech Quiz slideshare.pptxGyanartha SciBizTech Quiz slideshare.pptx
Gyanartha SciBizTech Quiz slideshare.pptxShibin Azad
 
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...Nguyen Thanh Tu Collection
 
Basic Civil Engg Notes_Chapter-6_Environment Pollution & Engineering
Basic Civil Engg Notes_Chapter-6_Environment Pollution & EngineeringBasic Civil Engg Notes_Chapter-6_Environment Pollution & Engineering
Basic Civil Engg Notes_Chapter-6_Environment Pollution & EngineeringDenish Jangid
 
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxStudents, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxEduSkills OECD
 
Sectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdfSectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdfVivekanand Anglo Vedic Academy
 
INU_CAPSTONEDESIGN_비밀번호486_업로드용 발표자료.pdf
INU_CAPSTONEDESIGN_비밀번호486_업로드용 발표자료.pdfINU_CAPSTONEDESIGN_비밀번호486_업로드용 발표자료.pdf
INU_CAPSTONEDESIGN_비밀번호486_업로드용 발표자료.pdfbu07226
 
UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...
UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...
UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...Sayali Powar
 
Fish and Chips - have they had their chips
Fish and Chips - have they had their chipsFish and Chips - have they had their chips
Fish and Chips - have they had their chipsGeoBlogs
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxPavel ( NSTU)
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfTamralipta Mahavidyalaya
 
Benefits and Challenges of Using Open Educational Resources
Benefits and Challenges of Using Open Educational ResourcesBenefits and Challenges of Using Open Educational Resources
Benefits and Challenges of Using Open Educational Resourcesdimpy50
 
How to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS ModuleHow to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS ModuleCeline George
 
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptxMARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptxbennyroshan06
 
Application of Matrices in real life. Presentation on application of matrices
Application of Matrices in real life. Presentation on application of matricesApplication of Matrices in real life. Presentation on application of matrices
Application of Matrices in real life. Presentation on application of matricesRased Khan
 
Matatag-Curriculum and the 21st Century Skills Presentation.pptx
Matatag-Curriculum and the 21st Century Skills Presentation.pptxMatatag-Curriculum and the 21st Century Skills Presentation.pptx
Matatag-Curriculum and the 21st Century Skills Presentation.pptxJenilouCasareno
 
How to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERPHow to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERPCeline George
 
NLC-2024-Orientation-for-RO-SDO (1).pptx
NLC-2024-Orientation-for-RO-SDO (1).pptxNLC-2024-Orientation-for-RO-SDO (1).pptx
NLC-2024-Orientation-for-RO-SDO (1).pptxssuserbdd3e8
 

Recently uploaded (20)

Jose-Rizal-and-Philippine-Nationalism-National-Symbol-2.pptx
Jose-Rizal-and-Philippine-Nationalism-National-Symbol-2.pptxJose-Rizal-and-Philippine-Nationalism-National-Symbol-2.pptx
Jose-Rizal-and-Philippine-Nationalism-National-Symbol-2.pptx
 
2024_Student Session 2_ Set Plan Preparation.pptx
2024_Student Session 2_ Set Plan Preparation.pptx2024_Student Session 2_ Set Plan Preparation.pptx
2024_Student Session 2_ Set Plan Preparation.pptx
 
The Benefits and Challenges of Open Educational Resources
The Benefits and Challenges of Open Educational ResourcesThe Benefits and Challenges of Open Educational Resources
The Benefits and Challenges of Open Educational Resources
 
Gyanartha SciBizTech Quiz slideshare.pptx
Gyanartha SciBizTech Quiz slideshare.pptxGyanartha SciBizTech Quiz slideshare.pptx
Gyanartha SciBizTech Quiz slideshare.pptx
 
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
 
Basic Civil Engg Notes_Chapter-6_Environment Pollution & Engineering
Basic Civil Engg Notes_Chapter-6_Environment Pollution & EngineeringBasic Civil Engg Notes_Chapter-6_Environment Pollution & Engineering
Basic Civil Engg Notes_Chapter-6_Environment Pollution & Engineering
 
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxStudents, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
 
Sectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdfSectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdf
 
INU_CAPSTONEDESIGN_비밀번호486_업로드용 발표자료.pdf
INU_CAPSTONEDESIGN_비밀번호486_업로드용 발표자료.pdfINU_CAPSTONEDESIGN_비밀번호486_업로드용 발표자료.pdf
INU_CAPSTONEDESIGN_비밀번호486_업로드용 발표자료.pdf
 
UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...
UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...
UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...
 
Fish and Chips - have they had their chips
Fish and Chips - have they had their chipsFish and Chips - have they had their chips
Fish and Chips - have they had their chips
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
Benefits and Challenges of Using Open Educational Resources
Benefits and Challenges of Using Open Educational ResourcesBenefits and Challenges of Using Open Educational Resources
Benefits and Challenges of Using Open Educational Resources
 
How to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS ModuleHow to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS Module
 
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptxMARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
 
Application of Matrices in real life. Presentation on application of matrices
Application of Matrices in real life. Presentation on application of matricesApplication of Matrices in real life. Presentation on application of matrices
Application of Matrices in real life. Presentation on application of matrices
 
Matatag-Curriculum and the 21st Century Skills Presentation.pptx
Matatag-Curriculum and the 21st Century Skills Presentation.pptxMatatag-Curriculum and the 21st Century Skills Presentation.pptx
Matatag-Curriculum and the 21st Century Skills Presentation.pptx
 
How to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERPHow to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERP
 
NLC-2024-Orientation-for-RO-SDO (1).pptx
NLC-2024-Orientation-for-RO-SDO (1).pptxNLC-2024-Orientation-for-RO-SDO (1).pptx
NLC-2024-Orientation-for-RO-SDO (1).pptx
 

Transport control protocols for Wireless sensor networks

  • 1. TRANSPORT CONTROL PROTOCOLS FOR WIRELESS SENSOR Networks
  • 2. 7.1 TRADITIONAL TRANSPORT CONTROL PROTOCOLS The transport layer provides end-to-end segment transportation,  where,  Messages are segmented into a chain of segments at the source and  They are reassembled back into the original message at the destination nodes. The transport layer does not concern itself with the underlying protocol  structures for delivery and/or with the mechanisms used to deliver the segments to the destination nodes. 2 ]Rushin $hah February 27, 2014
  • 3. 7.1 TRADITIONAL TRANSPORT CONTROL PROTOCOLS Examples of transport protocols are:  ด Transport Control Protocol (TCP), ด User Datagram Protocol (UDP), ด Sequenced Packet Exchange Protocol (SPX), and ด NWLink (Microsoft’s approach to implementing IPX/SPX). Classification of TCP:  Connection-Oriented & Connectionless 3 ]Rushin $hah February 27, 2014
  • 4. 7.1 TRADITIONAL TRANSPORT CONTROL PROTOCOLS Phases of Connection-Oriented Protocol operation: Connection establishment:   The sender issues a request message to establish a connection between itself and the destination.  If the destination node is available and there is a path between source and the destination, a connection will be established.  This connection is a logical link connecting the sender and the receiver. 4 ]Rushin $hah February 27, 2014
  • 5. 7.1 TRADITIONAL TRANSPORT CONTROL PROTOCOLS Phases of Connection-Oriented Protocol operation: Data transmission:   After a connection has been established, data transmission commences between the sender and the receiver.  During the information exchange, the rate at which either side is transmitting may be adjusted.  This adjustment depends on the possible congestion (or lack thereof) in the network.  Since data may be lost in the process of transmission, the transport protocol may support packet loss detection & loss recovery mechanisms. 5 ]Rushin $hah February 27, 2014
  • 6. 7.1 TRADITIONAL TRANSPORT CONTROL PROTOCOLS Phases of Connection-Oriented Protocol operation: Disconnect:   After completion of data exchange between the source and the destination, the connection is torn down.  In some cases, unexpected events such as the receiver becoming unavailable in the midst of data exchange may also lead to connection breakdown. 6 ]Rushin $hah February 27, 2014
  • 7. 7.1 TRADITIONAL TRANSPORT CONTROL PROTOCOLS Connectionless Protocol:  It is very simple and its operation consists of only one phase.  In essence, there is no need to request establishment of a connection between the sender and the receiver.  ‘When the source has information to send, it forwards it to the destination without the need for connection establishment.’ 7 ]Rushin $hah February 27, 2014
  • 8. 7.1 TRADITIONAL TRANSPORT CONTROL PROTOCOLS Another Classification of TP: ¥ Transport protocols can also be classified as elastic or non-elastic. ¥ TCP is an elastic protocol and UDP is a non-elastic protocol. ¥ Elasticity in a protocol means that the data transmission rate can be adjusted by the sender. ¥ Non-elasticity implies that the transmission rate cannot be adjusted. 8 ]Rushin $hah February 27, 2014
  • 9. 7.1 TRADITIONAL TRANSPORT CONTROL PROTOCOLS Depending on the application, the transport protocol may or not support the following Features: ζ ζ Flow and Congestion control ζ Loss Recovery ζ 9 Orderly transmission Quality of Service ]Rushin $hah February 27, 2014
  • 10. 7.1 TRADITIONAL TRANSPORT CONTROL PROTOCOLS  Orderly transmission:  Within a communications network multiple paths may exist between a given source and destination.  As a result, packets sent in a certain order by the source may not be received in the same order at the destination.  For most applications, packets must be reordered at the destination to represent the same order as at the source.  The transport protocol can provide the reordering.  The common approach is for the protocol to include a field, containing a sequential number of the segments transmitted. 10 ]Rushin $hah February 27, 2014
  • 11. 7.1 TRADITIONAL TRANSPORT CONTROL PROTOCOLS  Flow and Congestion control:  Hosts at each end of a particular connection can be diverse with different characteristics, such as capacity of communication and computation.  If the sender transmits segments with a higher rate than the receiver is able to handle and process, the buffers at the receiver may overflow and congestion occurs.  Transport layers provide flow and congestion control service to coordinate the suitable transmission rate between senders and receivers.  The key in the process of congestion control is proper detection of congestion and notification of the sender about the congestion state. 11 ]Rushin $hah February 27, 2014
  • 12. 7.1 TRADITIONAL TRANSPORT CONTROL PROTOCOLS  Loss recovery:  Network congestion can lead to data loss due to limited resources at sensor nodes.  The link layer may not provide loss recovery functions in all circumstances.  Therefore, the transport protocol’s support for loss recovery is a very helpful feature.  An obvious approach to loss recovery is retransmission after detection of loss. 12 ]Rushin $hah February 27, 2014
  • 13. 7.1 TRADITIONAL TRANSPORT CONTROL PROTOCOLS  Quality of service:  For real-time applications such as video on demand (VOD) and net meeting, which are real-time and delay-critical with a required bandwidth, the transport layer should provide high throughput within the constraints of allocated bandwidth.  The transport protocol can incorporate QoS considerations into flow and congestion control. 13 ]Rushin $hah February 27, 2014
  • 14. 7.1.4 Feasibility of Using TCP or UDP for WSNs Following are the problems that make either TCP or UDP unsuitable for implementation in WSNs:  TCP is a connection-oriented protocol. However, in WSNs, the number of sensed data for event-based applications is usually very small. The three-way handshake process required for TCP is a large overhead for such a small volume of data.  TCP uses end-to-end ACK and retransmission when necessary. This will result in much lower throughput and longer transmission time when RTT is long, as is the case in most WSNs. 14 ]Rushin $hah February 27, 2014
  • 15. 7.1.4 Feasibility of Using TCP or UDP for WSNs  In TCP, segment loss can potentially trigger window-based flow and congestion control. This will reduce the transmission rate unnecessarily when, in fact, packet loss may have occurred as a result of link error and there may be no congestion. This behaviour will lead to low throughput, especially under multiple wireless hops, which are prevalent in WSNs. 15 ]Rushin $hah February 27, 2014
  • 16. 7.1.4 Feasibility of Using TCP or UDP for WSNs  TCP uses an end-to-end process for congestion control. Generally, this results in longer response to congestion, and in turn, will result in a large amount of segment loss. The segment loss, in turn, results in energy waste in the retransmission. Furthermore, a long response time to congestion results in low throughput and utilization of wireless channels. 16 ]Rushin $hah February 27, 2014
  • 17. 7.1.4 Feasibility of Using TCP or UDP for WSNs  Sensor nodes may be within a different hop count and RTT from the sink. The TCP operates unfairly in such environments. The sensor nodes near the sink may receive more opportunities to transmit (which results in them depleting their energy sooner). This may also result in a disconnect between more distant nodes and the sink. 17 ]Rushin $hah February 27, 2014
  • 18. 7.1.4 Feasibility of Using TCP or UDP for WSNs As a connectionless transport control protocol, UDP is also not suitable for WSNs. Here are some reasons:  Because of the lack of flow and congestion control mechanisms in UDP, datagram loss can result in congestion. From this point of view, UDP is also not energy efficient for WSNs.  UDP contains no ACK mechanism; therefore, the lost datagrams can be recovered only by lower or upper layers, including the application layer. 18 ]Rushin $hah February 27, 2014
  • 19. 7.2 TRANSPORT PROTOCOL DESIGN ISSUES  WSNs should be designed with an eye to energy conservation, congestion control, reliability in data dissemination, security and management.  Congestion control may involve only the transport layer, but energy conservation may be related to the physical, data link, network, and perhaps all other high layers.  Generally, transport control protocols’ design include two main functions: Congestion Control and Loss Recovery. 19 ]Rushin $hah February 27, 2014
  • 20. 7.2 TRANSPORT PROTOCOL DESIGN ISSUES The design of transport protocols for WSNs should consider the following factors: 1 Perform congestion control and reliable delivery of data. -Since most data are from the sensor nodes to the sink, congestion might occur around the sink. WSNs need a mechanism for packet loss recovery, such as ACK and selective ACK used in TCP. -It may be more effective to use a hop-by-hop approach for congestion control and loss recovery since it may reduce packet loss and therefore conserve energy. -The hop-by-hop mechanism can also lower the buffer requirement at the intermediate nodes. 20 ]Rushin $hah February 27, 2014
  • 21. 7.2 TRANSPORT PROTOCOL DESIGN ISSUES 2 Transport protocols for wireless sensor networks should simplify the initial connection establishment process or use a connectionless protocol to speed up the connection process, improve throughput and lower transmission delay. 3 Transport protocols for WSNs should avoid packet loss as much as possible since loss translates to energy waste. To avoid packet loss, the transport protocol should use an Active Congestion Control (ACC) at the cost of slightly lower link utilization. 21 ]Rushin $hah February 27, 2014
  • 22. 7.2 TRANSPORT PROTOCOL DESIGN ISSUES 4 The transport control protocols should guarantee fairness for a variety of sensor nodes. 5 If possible, a transport protocol should be designed with cross-layer optimization in mind. For example, if a routing algorithm informs the transport protocol of route failure, the protocol will be able to deduce that packet loss is not from congestion but from route failure. 22 ]Rushin $hah February 27, 2014
  • 23. 7.3 EXAMPLES OF EXISTING TCPs  The examples of TCPs can be grouped in one of the four group: ҉ Upstream Congestion Control,(CODA, RMST) ҉ Downstream ҉ Upstream Reliability Guarantee, (ESRT) ҉ Downstream 23 Congestion Control, Reliability Guarantee.(PSFQ, GARUDA) ]Rushin $hah February 27, 2014
  • 24. 7.3.1 Congestion Detection and Avoidance  CODA is an upstream congestion control technique that consists of three elements:   Open-loop hop-by-hop backpressure, and   Congestion detection, Closed-loop end-to-end multisource regulation. CODA attempts to detect congestion by monitoring current buffer occupancy and wireless channel load.  If buffer occupancy or wireless channel load exceeds a threshold, it implies that congestion has occurred. 24 ]Rushin $hah February 27, 2014
  • 25. 7.3.1 Congestion Detection and Avoidance  The node that has detected congestion will then notify its upstream neighbor to reduce its rate, using an open-loop hop-by-hop backpressure.  The upstream neighbor nodes trigger reduction of their output rate using methods such as AIMD.  Finally, CODA regulates a multisource rate through a closed-loop endto-end approach, as follows: 25 ]Rushin $hah February 27, 2014
  • 26. 7.3.1 Congestion Detection and Avoidance When a sensor node exceeds its theoretical rate, it sets a ‘‘regulation’’ I. bit in the ‘‘event’’ packet; II. If the event packet received by the sink has a ‘‘regulation’’ bit set, the sink sends an ACK message to the sensor nodes and informs them to reduce their rate; and III. If the congestion is cleared, the sink will send an immediate ACK control message to the sensor nodes, informing them that they can increase their rate. 26 ]Rushin $hah February 27, 2014
  • 27. 7.3.1 Congestion Detection and Avoidance  Disadvantage:  Its unidirectional control, only from the sensors to the sink;  There is no reliability consideration;  The response time of its closed-loop multisource control increases under heavy congestion since the ACK issued from the sink will probably be lost. 27 ]Rushin $hah February 27, 2014
  • 28. 7.3.2 Event-to-Sink Reliable Transport  It provides reliability and congestion control, belongs to the upstream reliability guarantee group.  It periodically computes a reliability figure (γ), representing the rate of packets received successfully in a given time interval.  ESRT then deduces the required sensor reporting frequency (f ) from the reliability figure (γ) using an expression such as f = G(γ).  Finally, ESRT informs all sensors of the values of ( f ) through an assumed channel with high power.  ESRT uses an end-to-end approach to guarantee a desired reliability figure through adjusting the sensors’ reporting frequency. 28 ]Rushin $hah February 27, 2014
  • 29. 7.3.2 Event-to-Sink Reliable Transport  A DVA N TA G E  It provides overall reliability for the application.  The additional benefit of ESRT is energy conservation through control of reporting frequency.  Disadvantages  It advertises the same reporting frequency to all sensors considers mainly reliability and energy conservation as performance measures. 29 ]Rushin $hah February 27, 2014
  • 31. 7.3.3 Reliable Multi-Segment Transport  RMST guarantees successful transmission of packets in the upstream direction.  Intermediate nodes cache each packet to enable hop-by-hop recovery, or they operate in non cache mode, where only end hosts cache the transmitted packets for end-to-end recovery.  RMST supports both cache & non cache modes.  Furthermore, RMST uses selective NACK and timer-driven mechanisms for loss detection and notification. 31 ]Rushin $hah February 27, 2014
  • 32. 7.3.3 Reliable Multi-segment Transport  In the cache mode, lost packets are recovered hop by hop through the intermediate sensor nodes.  If an intermediate node fails to locate the lost packet, or if the intermediate node works in non cache mode, it will forward the NACK upstream toward the source node.  RMTS is designed to run above directed diffusion, which is a routing protocol, in order to provide guaranteed reliability for applications.  Disadvantage:  Lack of Congestion Control,  Energy Efficiency, and  Application-level Reliability. 32 ]Rushin $hah February 27, 2014
  • 33. 7.3.4 Pump Slowly, Fetch Quickly  PSFQ distributes data from sink to sensors by pacing data at a relatively slow speed.  It allowing sensor nodes that experience data loss to recover any missing segments from immediate neighbors.  This approach belongs to the group downstream reliability guarantee.  The motivation is to achieve loose delay bounds while minimizing loss recovery by localizing data recovery among immediate neighbors.  PSFQ consists of three operations: pump, fetch, and report 33 ]Rushin $hah February 27, 2014
  • 34. 7.3.4 Pump Slowly, Fetch Quickly  Wo r k i n g :  Sink broadcasts a packet to its neighbors every T time units until all the data fragments have been sent out.  Once a sequence number gap is detected, the sensor node goes into fetch mode and issues a NACK in the reverse path to recover the missing fragment.  The NACK is not relayed by the neighbor nodes unless the number of times that the NACK is sent, exceeds a predefined threshold.  Finally, the sink can ask sensors to provide it with the data delivery status information through a simple and scalable hop-by-hop report mechanism. 34 ]Rushin $hah February 27, 2014
  • 35. 7.3.4 Pump Slowly, Fetch Quickly  Disadvantages:  It can not detect packet loss for single packet transmission;  It uses a slow pump, which results in a large delay; and  hop-by-hop recovery with cache necessitates larger buffer sizes. 35 ]Rushin $hah February 27, 2014
  • 36. 7.3.5 GARUDA  GARUDA is in the downstream reliability group.  It is based on a two-tier node architecture; nodes with 3i hops from the sink are selected as core sensor nodes (i is an integer).  The remaining nodes (noncore) are called second-tier nodes.  Each noncore sensor node chooses a nearby core node as its core node for lost packet recovery.  GARUDA uses a NACK message for loss detection and notification.  Loss recovery is performed in two categories:  Loss recovery among core sensor nodes, and  Loss recovery between noncore sensor nodes and their core node. 36 ]Rushin $hah February 27, 2014
  • 37. 7.3.5 GARUDA  Therefore, retransmission to recover lost packets looks like a hybrid scheme between pure hop by hop and end to end.  GARUDA designs a repeated wait for first packet (WFP) pulse transmission to guarantee the success of single or first packet delivery.  Furthermore, pulse transmission is used to compute the hop number and to select core sensor nodes in order to establish a two-tier node architecture.  Disadvantages:  Lack of reliability in the upstream direction and  lack of congestion control. 37 ]Rushin $hah February 27, 2014
  • 38. 7.3.6 Ad Hoc Transport Protocol  ATP works based on a receiver- and network-assisted end-to-end feedback control algorithm.  It uses selective ACKs (SACKs) for packet loss recovery.  In ATP, intermediate network nodes compute the sum of exponentially distributed packet queuing and transmission delay, called D. D = PQ + TD  The required end-to-end rate is set as the inverse of D.  The values of D are computed over all packets that traverse a given sensor node, and if it exceeds the value that is piggybacked in each outgoing packet, it updates the field before forwarding the packet. 38 ]Rushin $hah February 27, 2014
  • 39. 7.3.6 Ad Hoc Transport Protocol  The receiver calculates the required end-to-end rate (inverse of D) and feeds it back to the sender.  Thus, the sender can intelligently adjust its sending rate according to the value received from the receiver.  To guarantee reliability, ATP uses selective ACKs (SACKs) as an end-toend mechanism for loss detection.  ATP decouples congestion control from reliability and as a result, achieves better fairness and higher throughput than TCP.  However, energy issues are not considered for this design, which raises the question of optimality of ATP for an end-to-end control scheme 39 ]Rushin $hah February 27, 2014
  • 40. 7.3.7 Problems with Transport Control Protocols  The major functions of transport protocols for wireless sensors networks that should be considered carefully in the design of these protocols are:  Congestion Control,  Reliability Guarantee, and  Energy Conservation. 40 ]Rushin $hah February 27, 2014
  • 41. 7.3.7 Problems with Transport Control Protocols  All previous protocols  Provide either congestion or reliability in either upstream or downstream (not both). –-)1(  Only control congestion either end-to-end or hop-by-hop. –-)2(  Provide either packet- or application-level reliability (if reliability is provided at all). –-)3(  None of the existing transport protocols implement cross-layer optimization. –-)4( 41 ]Rushin $hah February 27, 2014
  • 42. 7.4 PERFORMANCE OF TCPs  The measure used for congestion comparison is Energy Consumption, which is calculated for end-to-end and hop-by-hop cases.  The other measure is Loss Performance, which is based on cache and non cache approaches. 42 ]Rushin $hah February 27, 2014
  • 43. 7.4.1 Congestion  Two general approaches to congestion control are: 〩 end-to-end approach: It is the source node’s responsibility to detect congestion in either the receiver-assisted mode (ACK-based loss detection) or the network-assisted mode (using explicit congestion notification). Therefore, rate adjustments occur only at the source node. 〩 hop-by-hop approach: Intermediate nodes detect congestion and notify the originating link node. Hop-by-hop control can potentially eliminate congestion faster than the end-to-end approach, and can reduce packet loss and energy consumption in sensor nodes. 43 ]Rushin $hah February 27, 2014
  • 44. 7.4.1 Congestion  A simple model is provided here to help understand the impact of congestion control on energy efficiency. The following assumptions are made: ¶ There are h > 1 hops between sources and sink nodes, and each hop introduces a delay d. The link capacity is C. ¶ Congestion occurs uniformly in the network. The frequency of congestion occurrence is f , which is dependent on network topology, traffic characteristics, and buffer size. ¶ When the total rate of source transmission exceeds C(1+a), congestion will be detected. ¶ 44 e is the average energy consumed to send or receive a packet on each link. ]Rushin $hah February 27, 2014
  • 45. 7.4.2 Packet Loss Recovery  Generally, two methods are available for this purpose:  Non cache recovery is an end-to-end ARQ (automatic repeat request) similar to the traditional TCP. however, retransmissions may occur in h hops, and therefore more total energy is required.  Cache-based recovery uses a hop-by-hop approach and relies on caching at the intermediate nodes, with retransmissions between two neighbouring nodes. 45 ]Rushin $hah February 27, 2014
  • 46. 7.4.2 Packet Loss Recovery  The cache point is defined as the node that copies transmitted packets locally for a certain time period.  The loss point is defined as the node at which packets are dropped due to congestion.  Let’s define the retransmission path length (lp)as the number of hops from the caching node to the node where loss occurs.  Therefore, in the non cache case, (lp) = h1, where h1 is the number of hops from the loss point to the source node.  In the cache case, lp can be 1 if lost packets are found in neighbouring nodes. 46 ]Rushin $hah February 27, 2014
  • 47. 7.4.2 Packet Loss Recovery  In cache-based recovery, each packet is stored at every intermediate node that it visits until its neighbouring node receives the packet successfully, or when a timeout occurs (whichever is sooner). In this case it is likely that lp is very close to 1.   Another option is to distribute caching so that packet copies are scattered among intermediated nodes.  Each packet is stored in only one or several intermediate nodes.  Distributed caching might have a longer lp than regular caching (but still smaller than in the non cache case) and requires less buffer space than regular caching. 47 ]Rushin $hah February 27, 2014
  • 48. 7.5 CONCLUSION When designing transport control protocols for wireless sensor networks,  one should consider carefully such issues as:  Protocol effectiveness and the efficiency of congestion control mechanisms. Effective mechanisms avoid packet loss as much as possible while providing high throughput.  Reliability in the transport layer, whether loss recovery is required at the transport layer & which mechanism is effective and energy efficient. Preferably, any such mechanisms should have low buffering requirements.  Fairness among sensor nodes within different distances from the sink.  Utilization of some type of cross-layer optimization to improve performance. 48 ]Rushin $hah February 27, 2014