International Conference on Circuits, Communication, Control and Computing 2014
DOI: 10.1109/cimca.2014.7057793
|View full text |Cite
|
Sign up to set email alerts
|

A pre-emptive multiple queue based congestion control for different traffic classes in WSN

Abstract: Abstract-Traffic in wireless sensor networks (WSN) exhibits a many-to-one pattern in which multiple source nodes send sensing data to a single sink node. Since bandwidth, processor and memory are highly constrained in WSN, packet loss is common when a great deal of traffic rushes to sink. The system must provide differentiated service to individual traffic classes. In this paper, a pre-emptive multiple queue based congestion control mechanism is proposed. To detect congestion and to provide QoS for high priori… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
3
2
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(3 citation statements)
references
References 16 publications
(12 reference statements)
0
3
0
Order By: Relevance
“…The exponential shape parameter q, variation coefficient ρ denoting inter-arrival with service times and Hurst exponent H denoting access rate change are essential for efficacy of the model. A pre-emptive multiple queue [20] using congestion removal mechanism for handling high traffic condition is proposed. This technique outperforms the traditional DropTail method in terms of throughput, packet drop and energy consumption.…”
Section: Related Workmentioning
confidence: 99%
“…The exponential shape parameter q, variation coefficient ρ denoting inter-arrival with service times and Hurst exponent H denoting access rate change are essential for efficacy of the model. A pre-emptive multiple queue [20] using congestion removal mechanism for handling high traffic condition is proposed. This technique outperforms the traditional DropTail method in terms of throughput, packet drop and energy consumption.…”
Section: Related Workmentioning
confidence: 99%
“…This protocol focuses on a staggered wakeup scheduling mechanism, which makes the data stream flow to the sink node in a given path. However, this protocol has the following defects: (1) It will lead to serious data accumulation, and even overflow around hot spots; (2) Because the protocol is not a fair data transmission strategy [11], it would cause the data entering the cache of the hot spots earlier keep a more front place in the send queue and the data from the node far from the hot spots in the rear of the send queue [12]; (3) In DMAC, there is competition between the nodes at the same layer, which can result in great difference in data delay between nodes in each layer, loss of data, and poor network reliability [13].…”
Section: Introductionmentioning
confidence: 99%
“…Some examples of their application in real systems (two transmitter communication networks with Dynamic Bandwidth Allocation, service facility with front and back room operations) can be found in [ 28], [1] respectively. The behavior of various systems, including communication and computer systems, as well as production and manufacturing procedures, can be represented and analyzed through queuing network models to evaluate their performance [11,12,13], [29,30]. System performance analysis usually includes the queue length distribution and various performance indicators such as response time, throughput and utilization [2], [6,7], [10].…”
Section: Introductionmentioning
confidence: 99%