• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Sun Limin, Li Bo, Zhou Xinyun. A Survey of Congestion Control Technology for Wireless Sensor Networks[J]. Journal of Computer Research and Development, 2008, 45(1): 63-72.
Citation: Sun Limin, Li Bo, Zhou Xinyun. A Survey of Congestion Control Technology for Wireless Sensor Networks[J]. Journal of Computer Research and Development, 2008, 45(1): 63-72.

A Survey of Congestion Control Technology for Wireless Sensor Networks

More Information
  • Published Date: January 14, 2008
  • In wireless sensor networks (WSNs), the many-to-one communication mode, mutual interference of wireless links, dynamic changes of network topology and the memory-restrained characteristic of node, all make network more vulnerable to congestion. Since network congestion may deteriorate the transmitting performance and network lifetime, congestion control has become one of the most important technologies to decrease such impact and guarantee the network quality of service (QoS). Because the energy supply, computational power and wireless communication capabilities of sensor nodes are all limited and the network scale is always very large, higher requirements are imposed on the congestion control technology and researches on congestion avoidance and congestion release are more challengeable. This paper is a survey of congestion control technology for wireless sensor networks. In this paper, the main characteristics of wireless sensor networks, and causes and damages of network congestion are presented, and then three kinds of congestion detection strategies based on data buffer length, wireless channel sampling and data transmitting rate, and two kinds of congestion avoidance mechanisms based on data rate allocation and buffer announcement are introduced. The classical congestion release algorithms based on rate control, flow schedule and transport schedule are analyzed, and finally the development trend and future prospect of congestion control technology for wireless sensor networks are presented.
  • Related Articles

    [1]Shi Leyi, Zhu Hongqiang, Liu Yihao, Liu Jia. Intrusion Detection of Industrial Control System Based on Correlation Information Entropy and CNN-BiLSTM[J]. Journal of Computer Research and Development, 2019, 56(11): 2330-2338. DOI: 10.7544/issn1000-1239.2019.20190376
    [2]Yao Sheng, Xu Feng, Zhao Peng, Ji Xia. Intuitionistic Fuzzy Entropy Feature Selection Algorithm Based on Adaptive Neighborhood Space Rough Set Model[J]. Journal of Computer Research and Development, 2018, 55(4): 802-814. DOI: 10.7544/issn1000-1239.2018.20160919
    [3]Dong Hongbin, Teng Xuyang, Yang Xue. Feature Selection Based on the Measurement of Correlation Information Entropy[J]. Journal of Computer Research and Development, 2016, 53(8): 1684-1695. DOI: 10.7544/issn1000-1239.2016.20160172
    [4]Tang Chenghua, Liu Pengcheng, Tang Shensheng, Xie Yi. Anomaly Intrusion Behavior Detection Based on Fuzzy Clustering and Features Selection[J]. Journal of Computer Research and Development, 2015, 52(3): 718-728. DOI: 10.7544/issn1000-1239.2015.20130601
    [5]Zhang Fengbin and Wang Tianbo. Real Value Negative Selection Algorithm with the n-Dimensional Chaotic Map[J]. Journal of Computer Research and Development, 2013, 50(7): 1387-1398.
    [6]Zhang Zhenhai, Li Shining, Li Zhigang, and Chen Hao. Multi-Label Feature Selection Algorithm Based on Information Entropy[J]. Journal of Computer Research and Development, 2013, 50(6): 1177-1184.
    [7]Zheng Liming, Zou Peng, Han Weihong, Li Aiping, Jia Yan. Traffic Anomaly Detection Using Multi-Dimensional Entropy Classification in Backbone Network[J]. Journal of Computer Research and Development, 2012, 49(9): 1972-1981.
    [8]Zhang Xiang, Deng Zhaohong, Wang Shitong, Choi Kupsze. Maximum Entropy Relief Feature Weighting[J]. Journal of Computer Research and Development, 2011, 48(6): 1038-1048.
    [9]Chen Shitao, Chen Guolong, Guo Wenzhong, and Liu Yanhua. Feature Selection of the Intrusion Detection Data Based on Particle Swarm Optimization and Neighborhood Reduction[J]. Journal of Computer Research and Development, 2010, 47(7): 1261-1267.
    [10]Hou Jian, Peng Jiayin, Zhang Yuzhuo, Zhang Chengyi. A Reverse Triple I Algorithm for Fuzzy Reasoning Based on Maximum Fuzzy Entropy Principle[J]. Journal of Computer Research and Development, 2006, 43(7): 1180-1185.

Catalog

    Article views (712) PDF downloads (960) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return