2017
DOI: 10.4018/ijwnbt.2017010102
|View full text |Cite
|
Sign up to set email alerts
|

A Study on Channel Sharing for Congestion Control in WSN MAC Protocols

Abstract: Congestion control in Wireless Sensor Networks (WSNs) has been an area of interest for researchers for ensuring timely delivery of data. A number of Multi-channel MAC protocols have been proposed which guarantee parallel and collision free transmissions. This article proposes to evaluate an existing congestion control scheme that was developed for multi-channel WSN MAC protocols dealing with traffic of different priorities. The existing scheme proposed prioritized channel sharing mechanism for nodes based on t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2020
2020
2020
2020

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 20 publications
0
1
0
Order By: Relevance
“…Nevertheless, one of the main challenges to these types of networks is increasing the quality of service and node longevity in the network, which is due to the limited resources of wireless sensor nodes [2]. Several factors cause energy loss in network nodes, which include collision frames, retransmitting from source, crosstalk, queue delay, hidden terminal, over emitting, idle-listening and control overhead of designed protocols [3]. Most of the aforementioned factors can be managed and controlled at the Medium Access Control (MAC) sub-layer [4].…”
Section: Introductionmentioning
confidence: 99%
“…Nevertheless, one of the main challenges to these types of networks is increasing the quality of service and node longevity in the network, which is due to the limited resources of wireless sensor nodes [2]. Several factors cause energy loss in network nodes, which include collision frames, retransmitting from source, crosstalk, queue delay, hidden terminal, over emitting, idle-listening and control overhead of designed protocols [3]. Most of the aforementioned factors can be managed and controlled at the Medium Access Control (MAC) sub-layer [4].…”
Section: Introductionmentioning
confidence: 99%