Paper Menu >>
Journal Menu >>
|  Wireless Sensor Network, 2011, 3, 106-113  doi:10.4236/wsn.2011.33011 Published Online March 2011 (http://www.SciRP.org/journal/wsn)  Copyright © 2011 SciRes.                                                                                 WSN  Energy-Efficient and Reliable Transport Pr otocols for   Wireless Sensor Networks: State-of-Art  Ahmed Ayadi  Institut Telecom/Telecom Bretagne, Cesson-S évigné, France  E-mail: ahmed.ayadi@telecom-bretagne.eu  Received February 14, 2011; revi sed February 28, 2011; accepted March 8, 2011  Abstract  New wireless sensor network applications (e.g., military surveillance) require higher reliability than a simple  best effort service could provide. Classical reliable transport protocols like Transmission Control Protocol  (TCP) are not well suited for wireless sensor networks due to both the characteristics of the network nodes  (low computing power, strong energy constraints) and those of the main applications running on those nodes  (low data rates). Recent researches present new transport protocols for wireless sensor networks providing  various type of reliability and using new mechanisms for loss detection and recovery, and congestion control.  This paper presents a survey on reliable transport protocol for WSNs.  Keywords: Wireless Sensor Networks, Transport Protocol, Reliability, Congestion Control, Energy  Efficiency  1. Introduction  Wireless sensor networks (WSNs) [1] have important  applications such as remote environment monitoring  (temperature and humidity) and target tracking  (for mili- tary purpose).  In monitoring area, a WSN is deployed over a region  where some phenomena (e.g., floods, fires) are to be  monitored. This has been enabled by the availability of  sensors that are smaller, cheaper and intelligent. Sensors  are equipped with low-power wireless interfaces, which  are using it to communicate with each other to form a  network.  Firstly, WSN applications are not interested in relia- bility because WSNs have been considered as fault- to- lerant networks where sensor nodes collect environment  information and send it to the base station (sink). Inter- mediate nodes offer their best effort services to relay  generated packets to the base station. However, new  WSN applications like military applications (e.g., battle- field surveillance) require more and more reliability.  Moreover, in [2], the authors present a need of re-tasking  /reprogramming sensor nodes, and thus a need to send a  binary file or a script file to sensor nodes.   A transport protocol for WSNs should be reliable (or  provides different levels of reliability for each kind of  applications) and energy efficient (reduces the amount of  exchanged messages to reduce total consumed energy  and thereafter increases the network lifetime). The relia- bility requires two essential mechanisms: congestion  control (detection and avoidance), and loss detection and  recovery.  The congestion control mechanism is an essential  component for a reliable transport protocol because the  congestion leads to packet losses. Losses in WSNs are  not only due to congestion but also to bad channel errors,  collisions and interference. To distinguish between the  two types of losses, an explicit congestion no tification is  proposed. These two mechanisms can be implemented in  a distributed form (in sensor nodes) or in a centralized  form (in the based station).   In a distributed form, sensor nodes use the sequence  numbers of packets to signal packet losses. A gap in the  sequence numbers signals a loss. When a loss happens,  an intermediate node may request the retransmission of  the data from its neighbor nod es. Senso r nodes can d etect  congestion based  on the buffers overflows and then slow  down their sending rate.  However, in centralized protocol (e.g., RCRT [3]), the  base station is the only node responsible for the packet  loss detection and recovery. The base station detects also  congestion in the network using the arrival time of the  out-of-order packet s.  This paper presents a survey of reliable transport pro-  A. AYADI  Copyright © 2011 SciRes.                                                                                 WSN  107 tocols for WSNs and identifies some challenge’s re- search. The next section presents the needs of an ener- gy-efficient and reliable transport protocol for wireless  sensor networks and presents the recent proposed trans- port protocols for wireless sensor networks in the litera- ture. Section 3 evaluates and compares different proto- cols in term of reliability, congestion control and energy  efficiency. The last section concludes the paper.  2. Transport Protocol in WSNs  Transport layer ensures the reliability and the quality of  data at the sender and the receiver. Transport protocols in  WSNs should support multiple applications (industrial  process monitoring and control, machine health moni- toring, environment and habitat monitoring, health care  applications, home automation, and traffic control) and  provide variable reliability level, packet loss recovery  and congestion control mechanism. We can distinguish  between two types of data in WSNs:  1) Data sent by sensor network to the base station  (Sink),  2) Data sent by the base station to one or a subset of  sensor nodes for different purposes (control, manage- ment, re-tasking, reprogramming).  The development of a transport protocol should be  generic and independent. It should provide various relia- bility levels for different app lications. WSNs suffer from  a high loss rate. Packet loss may be due to bad radio  communication, congestion, packet collisions, full mem- ory capacity, and node mobility or fail. Thus, transport  protocol should provide two functions: reliable data  transport and congestion control. A reliable application  requires that all segments sent by a source arrive to the  destination. Missing segments that may be lost in the  WSN should be recovered by reliable schemes. Conges- tion happens when the data packets generated by sensor  nodes exceed the network capacity. When the networks  get congested, intermediate sensor nodes may drop  packets. This leads to retransmissions of the dropped  packets and thus a waste of energy that is a very impor- tant factor in wireless sensor network. In the following,  we present a summary of recent transport protocol pro- posed for WSNs.  2.1. Reliable Multi-Segment Transport  F. Stann et al. present in [4] the first transport layer with  hop-by-hop recovery scheme using caching mode as ad- ditional control traffic for Direct Diffus ion [5]. The main  goal of RMST is to minimize the cost of end-to-end re- transmissions. RMST protocol provides two transmission  modes: caching mode (with hop-by-hop recovery) and  non-caching mode (with end-to-end recovery). In  non-caching mode, only sources and sinks maintain a  cache, and only sinks set timers to detects loss.  In caching mode, RMST protocol assumes that each  sensor node has a cache memory where recently received  segments can be saved. RMST protocol reduces end-to-  end retransmissions by introducing hop-by-hop retrans- missions from caches of neighbor nodes. In link layer,  lost packets are retransmitted using Automatic Repeat  reQuest (ARQ) [6].  The RSMT receivers are responsible for detecting  losses and for trigger the recovery of the missing seg- ments through the generation of Negative Acknowledg- ments (NACKs). The RSMT receivers are not only sinks,  but also intermediate nodes. To handle losses, an RSMT  intermediate node should store data traffics and con- structs a map of received segments. When an out-of-  order segment is received, an RSMT receiver sends a  NACK requesting the retransmissions of the lost mes- sages. Firstly, the one-hop neighbors process NACKs.  Then, if one of the neighbors finds the missing segments  in cache, it suppresses the NACK message and retrans- mits the missing segments to the sink. Else, the NACK  message is relayed to the next node toward the source.  RSMT protocol provides 100% reliability even for ap- plications that do not require total reliability. Moreover,  RMST does not include real time guarantees or conges- tion control mechanisms. Require that each node has  enough memory to store all received segments is a very  strong condition difficult to be satisfied with memo- ry-constraint wireless devices.  2.2. Pump Slowly, Fetch Quickly  Pump Slowly, Fetch Quickly [2]  mechanism is proposed  for re-tasking/re-programming a group of sensors over-  the-air. PSFQ is based on slowly injecting packets into  the network “pump operation” and performing aggres- sive hop-by-hop recovery in case of packet losses “fetch  operation”. Like RSMT, PSFQ provides a hop-by-hop  error recovery mechanism in which intermediate nodes  take the responsibility of loss detectio n and recovery. To  enable a hop-by-hop loss recovery and in-sequence data  delivery, a data cache is created and maintained at inter- mediate nodes.  The PSFQ “pump operation” consists in a timely con- trolled data forwarding. In intermediate nodes, when a  packet is received in an out-of-order sequence, it is  stored. However, instead of forwarding it, the immediate  node requests retransmission of the missing segment.  The PSFQ “fetch operation” is a proactive act of re- questing a retransmission from neighboring nodes once  loss is detected at the receiving node. It corresponds to   A. AYADI  Copyright © 2011 SciRes.                                                                                 WSN  108  sending NACK for a retransmission request containing  the sequence number of the missing segment. If the up- stream neighbors do not posses the missing segment,  they forward the NACK further, until it reaches a node  having the missing segments.   However, the use of PSFQ for the forward direction  can lead to a waste of energy. Besides this, PSFQ does  not address packet losses due to congestion. PSFQ give  good performance in a chain scenario where a sensor  node has only two neighbors. Moreover, in randomly  distributed network, PSFQ could flood network in fetch  phase by NACK messages.  2.3. Event-to-Sink Reliable Transport protocol  ESRT [7] is a transport protocol that seeks to achieve  reliable event direction with minimum energy expendi- ture and congestion resolution. The main goal is to con- figure the reporting frequency rate to achieve the desired  event detection accuracy with minimum energy expend- iture. In fact, a sensor node in ESRT sends messages  with an announced reporting frequency to the base sta- tion. An ESRT base station regulates the reporting rate of  sensors in response to a congestion detected in the net- work. Congestion control mechanism is implemented in  the base station, which informs all sensor nodes using a  different technology about the new reporting frequency.  An ESRT node monitor s its local buffer level and sets  a congestion notification  bit in the packets it forwards to  base station if the buffer overflows. If the base station  receives a packet with the congestion notification bit set,  it broadcasts a control signal informing all source nodes  to slow down their common reporting frequency. The  ESRT base station must broadcast this control signal at  high energy so that all sources can hear it or use another  technology.   Such a signal has several potential drawbacks, howev- er, particularly in large sensor networks. Any on-going  event transmission would be disturbed by such high-  powered congestion signal to sour ces. In addition, ESRT  always regulates all sources regardless the congestion  region. ESRT does not retransmit lost packets.  2.4. Distributed TCP Caching  In [8], Dunk els et al. present Distributed TCP Caching, a  new scheme for TCP [9] in multi-hop wireless networks  that uses segment caching and local retransmission in  cooperation with link layer for TCP/IP-based wireless  sensor network. DTC is an extension of Snoop [10] idea  towards multi-hop sensor networks.  The authors assume that each intermediate node is  able to cache a single TCP data segment. DTC relies  mainly on timeouts to detect packet losses. Thus, each  node measures the round-trip time (RTT) to the receiver  and adapts a retransmission timeout RTT to 1.5 x RTT.  The authors propose to compute the RTT in the TCP  connection setup phase and to use RTT = 1.5 RTT as a  timeout value. The sensor nodes cache the TCP segment  that has the highest segment number seen with a certain  probability (p = 50%). An unacknowledged packet in  link layer should be locked and retransmitted after the  timeout. Locked d ata segments shou ld not be overwritten  by a TCP segment with higher sequence number. A  locked segment is removed from the cache only when a  TCP ACK that acknowledges the cashed segment is re- ceived, or when the segment times out.  DTC uses also TCP SACK option [11] to both packet  loss detecting and signaling mechanism between DTC  nodes. The TCP SACK option is used by sensor node to  inform other nodes about segments locked in their cach- es.  2.5. TCP Support for Sensor Networks  In [12], Braun et al. present TCP Support for Sensor  networks (TSS), which is a new layer between TCP and  network layer. TSS requires storing state information for  each TCP connection that contains sequence numbers,  acknowledgments numbers, and RTT.  TSS uses Implicit ACK (IACK) for loss detection: a  sensor node is assumed to listen to packet transmission  of their neighbor to detect whether the next node have  forwarded TCP segment. A node usi ng TSS always cach-  es a packet until it is sure that the successor node towards  the destination has received the segment. The retrans- missions are mainly triggered by timeouts, which re- quires careful setting of timeout values. Like DTC [8],  the retransmission timeout is set to 1.5 RTT. To avoid  congestion, a TSS node should stop forwarding its pack- ets until it knows that all earlier packets have been re- ceived and forwarded by its successor node.  The simulation results show that TSS gives more  throughput than TCP and less exchanged messages than  DTC [8]. However, hearing all neighbor node traffics is  not energy-efficient because listening power is important  as well as transmission power. In addition, a message  transmission fail of one sensor node leads to stop the  transmission of all its previous sensor nodes.  2.6. Asymmetric Reliable Transport  Asymmetric Reliable Transport [13] is an asymmetric  and reliable transport mechanism that does not address  the reliability of event notifications (sensor-to-sink) but  also the queries (sink-to-sensors), being thus a bidirec-  A. AYADI  Copyright © 2011 SciRes.                                                                                 WSN  109 tional transport protocol. ARP classifies the sensor as  essential (E) nodes and non-essential (N) nodes. The E  nodes are selected periodically to cover the entire sensi- ble terrain, based on residual energy.   Using both asymmetric acknowledgment and negative  acknowledgment provides the end-to-end reliable com- munications. To distinguish the last query message of  sequence, a Poll (P)/Final (F) bit is used.  2.7. Distributed Transport for Sensor Networks  Distributed Transport for Sensor Networks [14] is an  energy-efficient hop-by-hop reliable transport protocol  using both ACK and NACK message for delivery con- firmation. A DTSN node analyzes the sequence numbers  of received packets and detects losses by finding gaps.  Every source node  sends an Explicit Acknow ledgment  Request (EAR) every one Acknowledgment Window  (AK) to ask for an ACK or a NACK. The sink node rep- lays by an ACK message if no gap is detected or by a  NACK message containing the sequence numbers of  missing segments.    DTSN protocol is a hop-by-hop recovery protocol; all  intermediate node caches received packet in their cache.  Upon reception of an ACK message, intermediate node  deletes acknowledged segment. Otherwise (i.e. reception  of NACK message) an intermediate node checks if its  cache contains one of the missing segment.  DTSN node retransmits missing segments and updates  the NACK message. DTSN offers two types of service:  total reliability service and differentiated reliability ser- vice. The difference between the two types of service is  the probability of caching a segment in an intermediate  node. For example, in full reliability scenario, all seg- ments are cached in intermediate nodes. DTSN algorithm  does not threat congest i o n detection and control.  2.8. Wisden  Wisden [15] provides a reliable data transport from the  sensor nodes to the base station. In Wisden, nodes self-  organize themselves into a routing tree rooted at the base  station. Wisden  implements both en d-to-end and hop-b y-  hop NACK based reliability scheme. Nodes keep a small  cache of recently transmitted packets. Intermediate node  detects packet loss based on gap in the sequence numbers  in a received segment. Entries in the “missing packets”  list are piggybacked in the outgoing transmissions, and  children infer losses by overhearing this transmission.  Lost packets are often recovered hop by hop, however,  two factors necessity end-to-end recovery: the large list  of missing packet that can exceed the memory of the  sensor node and the topology changes. Limit of Wisden  is the constant value of sending rate, which should be  measured and configured based on the bandwidth and the  number of nodes.  2.9. Rate-Controlled Reliable Transport protocol  Rate-Controlled Reliab le Transport protocol [3] is a mul- tipoint-to-point reliable transport protocol for wireless  sensor networks. RCRT uses an explicit end-to-end loss  recovery and places all congestion detection, recovery  and rate adaptation schemes in the base station (Sink).  RCRT sink has three distinct logical components:  a) End-to-end retransmission   The main goal of RCRT is to achieve 100% reliability.  The RCRT sink uses NACK-based end-to-end loss re- covery to request the retransmissions of missing packets  from the source. Each source (sensor node) has a re- transmission buffer where is saved the not ack nowledged  segment. The sink node keeps a list of lost segments then  sends a NACK feedback message to the source contain- ing the sequence numbers of missing segments. Upon  receiving a NACK, the source node retransmits the re- quested segments.  b) Congestion detection  To distinguish between congestion and transmission  losses, RCRT congestion detection mechanism is based  on the length of the losses. The sink nod e maintains a list  of the out-of-order messages and computes the Time to  recover loss. If this value exceeds 2RTT, congestion  is then signaled.  c) Rate adapt ation  RCRT uses AIMD to adapt the transmission rate of  each source. Whenever the RCRT sink determines the  network is congested, it applies the rate decrease and  computes the new rate for all flows:   Increase:    1RtRtA  ,   Decrease:    1RtMt Rt ,  where A is a constant and M (t) is a function of loss rate,      2 i i pt Mt pt and    i ptis the loss rate value of the  source i at the instant t.  2.10. Interference-Aware Fair Rate Control  Interference-aware Fair Rate Control [16 ] is a distributed  rate allocation scheme that uses queue size to detect  congestion, shares congestion state through overhearing  messages and converges to fair and efficient rates for  each node. IFRC scheme consists of three components:  a) Measure of level congestion   An IFRC node uses an exponentially we ighted mov ing  average of instantaneous queue length as a measure of   A. AYADI  Copyright © 2011 SciRes.                                                                                 WSN  110  congestion   1 qqqqq avgwavgw inst .  The average packet length is updated whenever a  packet is inserted into the queue. IFRC detects incipient  congestion by using multiple thresholds   Uk where    1 12k I Uk Uk  where k is a small integ e r  and  I  is a constant increment of queue length.  b)  Congestion Sharing  In IFRC node  i includes the following information  in the header of each outgoing transmission packet: its  rate i r, current average queue length, a bit indicating  whether any child of i is congested, small state i r  among all its congested children, and l’s average queue  length. IFRC introduces two simple constraints:   Rule 1: i r can never exceed  j r, the rate of i’s  parent j.   Rule 2: Whenever a congested neighbor j of i  crosses a threshold    Uk, i sets its rate to the  lower of i r and l r.  The same rule is applied for the most congested child  l of any neighbor of i, i sets its rate to the lower of  i r and  j r where l is the most congested ch ild of i’s  neighbor.  c) Rate Adaptation  All nodes start from a fixed rate init r. IFRC imple- ments multiplicate rate increase initially. After slow start  phase, an IRFC node increases it rate i r every 1i r. If  node i is congested, then when threshold    Uk is  crosses, the node halves it current rate. The base station,  even if it does not source messages, it maintains its  “rate” h r and adapts using the same mechanism de- scribed bellow. Because the base station does not send  messages, it broadcasts a control message after the re- ception of 5m messages to share its rate h r. IFRC  presents a shared congestion control mechanism but not  reliable. Moreover, IFRC adds a lot of overhead in the  header of transport protocol stack and a significant  amount of control messages.  2.11. Energy-efficient and Reliable Transport  Protocol  ERTP [17] is an energy-efficient and reliable transport  protocol for low data streaming in WSNs. ERTP is a  hop-by-hop recovery algorithm using Implicit Acknowl- edgment. ERTP requires that each node i after sending  a packet to the next node to the sink overheads the next  forwarding. The forward of a packet by node 1i   is  considered as an implicit acknowledgment to node i.  The authors present a hop-by-hop reliability control,  which adjusts the maximum number of retransmission of  a packet in each node based on the link loss rate. They  present also an algorithm for computing the extents time  in witch node i is expected to “overhead” the forward- ing packet of node  1i  .  In the result section, authors show that the use of  ERTP algorithm for computing the RTO time is better  that Jacobson algorithm. They show also that using  ERTP gives more delivery ratio than using simple expli- cit acknowledgment. However, hearing all neighbor node  traffics is not energy-efficient because listening con- sumes energy as well as sending.  2.12. PORT  In [18], authors provide in-network dynamic rate-control  and congestion-avoidance transport scheme. PORT mi- nimizes energy consumed by avoiding high communica- tion cost. PORT minimizes energy consumption with  two schemes.  The first is based on the application-based optimiza- tion approach of sink that feedbacks the optimal report- ing rates for source nodes. These source report feedbacks  allow the sink to adjust the reporting rate of each data  source. PORT adds a price form each node. Node price is  the total number of transmission attempts made before a  successful packet is delivered from the source and the  sink. It is a metric used to evaluate the energy cost  communication. The sink adjusts the reporting rate of  each source based on the source’s node price and the  information provided about the physical phenomenon.  The second scheme is based on feedbacks from source  node to the sink to inform it about congestion and in- crease the nodes costs. The sink uses the communication  cost information to slow down the reporting rate of the  appropriate sou rce and increase the repor ting rate of oth- er sources that have lower communication cost since  reliability must be maintained.  2.13. Flush  Flush [19] is a reliable single-flow bulk transport proto- col for large diameter WSNs. However, Flush only sup- ports one data flow. Flush uses an end-to-end reliable  transport protocol to robust to node failures. Flush re- quires that the sink node sends the sequence numbers of  packets it did not receive back to the data source.  When a source node receives a NACK packet, it re- transmits the missing data. Flush proposes also a rate  allocation scheme for adapting dynamically the sending  rate of the sensor nodes. This scheme take into count the  broadcast nature of the medium and the interference be- tween nodes. The rate allocation algorithm follows two  basic rules:  1) Rule 1: A node should only transmit when its suc- cessor is free from interference.   A. AYADI  Copyright © 2011 SciRes.                                                                                 WSN  111 2) Rule 2: A node’s sending rate cannot exceed the  sending rate of its successor.  These two rules reduce contention and thus collision  in the wireless network and minimize losses due to the  queue overflo ws fo r all no des.  3. Transport Protocol Comparison  In this section, we present a comparison between the  presented protocols in Section 3. The listed protocol can  be classified in categories using some criteria. We can  distinguish between IP-based solution like DTC, TSS  and non IP-based solution like RCRT, ERTP, etc. We  can differentiate between transport protocols by the  manner it recovers losses (end to end recovery or hop by  hop recovery), the use or not have caching in interme- diate node, kind of message used to loss detection and  recovery (ACK, NACK, IACK) and the level of reliabil- ity.  3.1. IP and Not IP-Based Solutions  Table 1 presents a classification of all protocol based on  its network and transport layer. DTC and TSS are new  protocols based on IP networks. These two protocols add  caching and hop-by-hop recovery of TCP lost segments.  The use of  I P-b as ed  tr an sp or t pr o to col enables to  con ne ct   between wireless sensor network and an external net- work (e.g., Internet). Using IP solution in WSN allows  not providing a new proxy at the network border.  3.2. Reliability and Loss Recovery  Reliability is very important for some applications like  health and military applications. Other applications are  loss-tolerant and require a ratio/level of reliability. DTC,  TSS, PSFQ, RMST, RCRT provide 100% reliability for  wireless sensor network applications. However, these  protocols do not use the same mechanism for loss detec- tion and recovery. For example, ESRT, ERTP, DTSN  and SCTP provide classes of probability for the applica- tions. However, the need for reliability is not the same  for all applications but depends on the importance of the  application and even on the importance on some packets  than others.    Table 1. IP and not IP-based transport protocol.   TCP/IP Non-TCP/IP  Transport Protocol DTC, TSS RSMT, PSFQ,  ESRT, DTSN,  RCRT, ERTP,  IFRC  Loss detection and recovery methods differ from a  protocol to another. In SCTP and RCRT, the receiver use  gaps in the sequence numbers of received segments as a  signal of packet losses. The receiver asks the retransmis- sion of missing segments from the source node. This  mechanism is called an end-to-end recovery. However,  in multi-hop wireless sensor networks, end-to-end re- covery is not energy-efficient and thus new transport  protocols enable intermediate nodes to cache segments.  Loss detection and recovery mechanisms from inter- mediate nodes allow reducing the total exchanged mes- sages from the source to the receiver. We distinguish  between two kinds of intermediate nodes. The first does  not detect losses but reacts when it receives a NACK  message. Then, it retransmits the missing segment. The  second kind detects losses and requests a retransmission  from its neighbors.  Acknowledging a packet can be done explicitly by  sending an ACK message, thus if the receiver does not  receive an ACK message, it detects a loss. The explicit  acknowledging approach requires adding a lot of control  messages (ACK) to data messages and increases the  contention. Another solu tion is to relay by a NACK mes-  sage when a packet loss found.  The third mechanism proposed by TSS and ERTP is to  use implicit acknowledgment (IACK). This mechanism  requires that each node i after sending a packet the  next node to the sink overheads the next forwarding. The  forward of a packet by node i is considered as an im- plicit acknowledgment to node i.  3.3. Congestion Control  Congestion has a significant impact on the performance  of a reliable transport protocol. Some transport protocols  for wireless sensor network (like PSFQ, DTSN, ERTP)  make an assumption that congestion is not likely to be  problem in WSNs. Others assume all packet loss due to  congestion (like DTC, TSS and ESRT).  Some of the proposed solution are distributed, thus all  sensor nodes detect congestion and then share the infor- mation using a flag named congestion notification.   Thus, the based station, after receiving a message,  which the congestion notification bit is set, slow down  the transmission rate.  On the other hand, centralized solution implements  congestion detection component on the base station. Be- cause DTC and TSS are extension for TCP of wireless  sensor network, they inherit congestion detection and  avoidance mechanism from TCP. RCRT congestion de- tection scheme is based on time to recover loss. They  assume that the network is not congested as long as  end-to-end losses are recovered “quickly enough”. Thus,    A. AYADI  Copyright © 2011 SciRes.                                                                                 WSN  112  RCRT permit the sender to transmit at a light rate even if  there are occasional end-to-end losses, since those rate  can be recovered “ qui ckly”.   All other protocols are based on buffer overflows to  signal congestion. SCTP specifies two thresholds: lower t  and higher t. When the buffer reaches lower t, the conges- tion bit is set with certain probability. When the buffer  reaches higher t, the node sets the congestion notification  bit in every packet it forwards. ESRT node calculates  1kk bb b   , where k b and 1k b are the buffer size  at the end of the  k th and the   1th k internal. If the  k bbB  (where B is the buffer size) then the node  signals a congestion by setting the algorithm. IFRC uses  an exponentially weighted moving average of instanta- neous queue length as a measure of congestion   1 qqqqq avgwavgw inst . Unlike SCTP, IFRC  uses multiple thresholds   Uk  3.4. Energy Efficiency  Transport protocols should provide reliability with the  minimum number of exchanged messages. This con- straint comes from the low capacity of energy of sensor  node batteries. ESRT proposes to reduce the sending  events frequency to reduce the total consumed energy.  Others propose to use hop-by-hop recovery instead of  end-to-end recovery to reduce the retransmissions. For  example, RMST, PSFQ, Wisden, DTC and TSS reduce  the amount of exchanged messages by caching not al- ready acknowledged segments in intermediate nodes and  process a recovery once a lost is detected.  DSTN proposes to reduce the consumed energy by  using Selective Acknowledgment (ACK and NACK)  after an Acknowledgment Windows of  messages. DSTN  reduces the number of control messages, which make it  more energy-efficient than other protocols. TSS and  ERTP propose not to use explicit acknowledgment in- stead of implicit acknowledgment.  These approaches need a cross-layer mechanism be- tween the link layer and transport layer (e.g. DTC and  TSS). These mechanisms permit to reduce the transport  acknowledgments. However, some of these schemes are  difficult to be implemented in memory-constraint wire- less devices.  Finally, ART increases the lifetime of the network by  choosing node with more energy capacity to relay pack- ets from sources to the sink nodes.  All these works have tried to reduce the amount of  control messages in the WSNs and thus increase the life- time of all the networks. Table 2 summarizes the details   of all the protocols mentioned above.  4. Conclusion  In this paper, we have reviewed recent researches on  reliability and congestion control in wireless sensor net- works. We presented different methods of packet loss  detection and recovery, congestion detection and avoid- ance and energy-efficiency. We compared protocol in  term of reliability, congestion control and energy  efficiency.  Table 2. Reliable transport protocols.  Transport  Protocol Direction Type of flo ws Congestion Control Congestion  Detection End-to-End of  Hop-by-Hop Caching Acknowledging  Energy  Aware  RSMT [4] Sensor to Sink Continuous - - Hop-by-Hop  End-to-End Yes NACK/ACK No  PSFQ [2] Sensor to Sink  Sink to Sensor Event-Driven - - Hop-by-Hop Yes NACK No  ESRT [7] Sensor t o  Sin k Continuous Yes Buffer size End-to-End No - No  DTC [8] Sink to Sensor - Yes Yes Hop-by-Hop Yes ACK/SACK Yes  TSS [12] Sink to Sensor - Yes Yes Hop-by-Hop Yes IACK/  SACK Yes  ART [13] Sensor to Sink  Sink to Sensor Continuous  Event-Driven - - End-to-End No NACK/ACK No  PORT [18] Sink to Sensor Event-Driven Yes Packet loss - - - Yes  Flush [19] Sensor to Sink Continuous - No End-to-End No NACK No  DTSN [14] Sensor to Sink  - - Hop-by-Hop Yes ACK/NACK Y es  Wisden [15] Sensor to Sink Continuous - - Hop-by-Hop  End-to-End Yes ACK/NACK Yes  IFRC [16] Sensor to Sink Continuous Yes Buffer size - No - No  RCRT [3] Sensor to Sink Continuous Yes Time to recover  losses End-to-End No NACK No  ERTP [17] Sensor to Sink Continuous - - Hop-by-Hop - IACK Yes   A. AYADI  Copyright © 2011 SciRes.                                                                                 WSN  113 5. Acknowledgements  The work of Ahmed Ayadi has been funded by the Pôle  de Recherche Avancée en Communications (PraCOM).  6. References  [1] J. Yick, B. Mukherjee and D. Ghosal, “Wireless Sensor  Network: Survey,” Computer Networks, Vol. 52, No. 12,  2008, pp. 2292-2330. doi:10.1016/j.comnet.2008.04.002  [2] C. Wan, A. Campbell, and L. Krishnamurthy, “Pump-  Slowly, Fetch Quickly (PSFQ): A Reliable Transport  Protocol for Sensor Networks,” IEEE Journal on Selected  Areas in Communications, Vol. 23, No. 4, April 2005, pp.  862-872. doi:10.1109/JSAC.2005.843554  [3] J. Paek and R. Govindan, “RCRT: rate-Controlled Relia- ble Transport for Wireless Sensor Networks,” Proceed- ings of the 5th International Conference on Embedded  Networked Sensor Systems, New York, 2007, pp. 305-  319. doi:10.1145/1322263.1322293  [4] F. Stann and J. Heidemann, “RMST: Reliable Data  Transport in Sensor Networks,” Proceedings of the First  IEEE International Workshop on Sensor Network Proto- cols and Applications, May 2003, pp. 102-112.  doi:10.1109/SNPA.2003.1203361  [5] C. Intanagonwiwat, R. Govindan, D. Estrin, J. Heide- mann and F. Silva, “Directed Diffusion for Wireless  Sensor Networking,” IEEE/ACM Transactions on Net- working, Vol. 11, No. 1, 2003, pp. 2-16.  doi:10.1109/TNET.2002.808417  [6] G. Fairhurst and L. Wood, “Advice to Link Designers on  Link Automatic Repeat ReQuest (ARQ),” IETF, RFC  3366, August 2002.  [7] Y. Sankarasubramaniam, O. B. Akan and I. F. Akyildiz,  “ESRT: Event-to-Sink Reliable Transport in Wireless  Sensor Networks,” Proceedings of the 4th ACM Interna- tional Symposium on Mobile Ad Hoc Networking &  Computing, New York, 2003, pp. 177-188.  doi:10.1145/778415.778437  [8] A. Dunkels, J. Alonso and T. Voigt, “Distributed TCP  Caching for Wireless Sensor Networks,” Proceedings of  the 3rd Annual Mediterranean Ad-Hoc Networks Work- shop, 2004.  [9] J. Postel, “Transmission Control Protocol,” IETF RFC  793, September 1981.  [10] H. Balakrishnan, S. Seshan, E. Amir and R. H. Katz,  “Improving TCP/IP Performance over Wireless Net- works,” Proceedings of the 1st Annual International  Conference on Mobile Computing and Networking, New  York, 1995, pp. 2-11. doi:10.1145/215530.215544  [11] S. Floyd, J. Mahdavi, M. Mathis and M. Podolsky, “An  Extension to the Selective Acknowledgement (SACK)  Option for TCP,” RFC 2883, 2000.  [12] T. Braun, T. Voigt and A. Dunkels, “TCP Support for  Sensor Networks,” Proceedings of Fourth Annual Con- ference on Wireless on Demand Network Systems and  Services, January 2007, pp. 162-169.  doi:10.1109/WONS.2007.340494  [13] N. Tezcan and W. Wang, “ART: An Asymmetric and  Reliable Transport Mechanism for Wireless Sensor Net- works,” International Journal of Sensors Networks, Vol.  2, No. 3-4, 2007, pp. 188-200.  doi:10.1504/IJSNET.2007.013199  [14] B. Marchi, A. Grilo and M. Nunes, “DTSN: Distributed  Transport for Sensor Networks,” Proceedings of 12th  IEEE Symposium on Computers and Communications,  July 2007, pp. 165-172. doi:10.1109/ISCC.2007.4381601  [15] N. Xu, S. Rangwala, K. K. Chintalapudi, D. Ganesan, A.  Broad, R. Govindan and D. Estrin, “A Wireless Sensor  Network for Structural Monitoring,” Proceedings of the  2nd International Conference on Embedded Networked  Sensor Systems, New York, 2004, pp. 13-24.  doi:10.1145/1031495.1031498  [16] S. Rangwala, R. Gummadi, R. Govindan and K. Psounis,  “Interference Aware Fair Rate Control in Wireless Sensor  Networks,” Proceedings of the Conference on Applica- tions, Technologies, Architectures, and Protocols for  Computer Communications, New York, 2006, pp. 63-74.  [17] T. Le, W. Hu, P. Corke and S. Jha, “ERTP: Ener- gy-Efficient and Reliable Transport Protocol for Data  Streaming in Wireless Sensor Networks,” Computer  Communications, Vol. 32, No. 7-10, 2009, pp. 1154-1171.  doi:10.1016/j.comcom.2008.12.045  [18] Y. Zhou, M. Lyu, J. Liu and H. Wang, “PORT: A  Price-Oriented Reliable Transport Protocol for Wireless  Sensor Networks,” Proceedings of 16th IEEE Interna- tional Symposium on Software Reliability Engineering,  November 2005, pp. 10-126. doi:10.1109/ISSRE.2005.32  [19] S. Kim, R. Fonseca, P. Dutta, A. Tavakoli, D. Culler, P.  Levis, S. Shenker and I. Stoica, “Flush: A Reliable Bulk  Transport Protocol for Multihop Wireless Networks,”  Proceedings of the 5th International Conference on Em- bedded Networked Sensor Systems, New York, 2007, pp.  351-365. doi:10.1145/1322263.1322296 | 

