2008
DOI: 10.1109/tmc.2007.70707
|View full text |Cite
|
Sign up to set email alerts
|

GARUDA: Achieving Effective Reliability for Downstream Communication in Wireless Sensor Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
38
0

Year Published

2010
2010
2020
2020

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 68 publications
(38 citation statements)
references
References 21 publications
0
38
0
Order By: Relevance
“…In this paper the most frequently referenced protocols, pump slowly, fetch quickly (PSFQ) [4], reliable multi-segment transport (RMST) [5], GARUDA 1 [6], congestion detection and avoid (CODA) [7], and reliable bursty convergecast (RBC) [8] are reviewed in order to design an appropriate ARQ scheme for WSNs.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…In this paper the most frequently referenced protocols, pump slowly, fetch quickly (PSFQ) [4], reliable multi-segment transport (RMST) [5], GARUDA 1 [6], congestion detection and avoid (CODA) [7], and reliable bursty convergecast (RBC) [8] are reviewed in order to design an appropriate ARQ scheme for WSNs.…”
Section: Related Workmentioning
confidence: 99%
“…PSFQ is an appropriate protocol for non-real-time software download applications [4], and RMST and GARUDA are suitable protocol for non-real-time query driven services [5,6]. In other words, PSFQ and RMST are advantageous to support highly reliable services, but they are not suitable for real-time applications.…”
Section: Related Workmentioning
confidence: 99%
“…the nodes near the sink), will require huge cache memory space. The [2], [7], [8], and [9] are the most well-known transport protocols that use hop-by-hop scheme. Given the limited memory in sensor nodes, packets may only need to be cached at selected nodes [6].…”
Section: Introduction and Related Workmentioning
confidence: 99%
“…These applications require the reliable delivery of high-priority events to sinks, reliable control and management of the sensor network structure, and the capacity for remote programming/retasking of sensor nodes in a controlled, reliable, robust, and scalable manner [1]. Importantly, all of these applications necessitate that all data are to be transmitted without loss within their respective WSNs.…”
Section: Introductionmentioning
confidence: 99%
“…These protocols are mainly designed (1) to confirm data transfer and lost data recovery by requesting an acknowledgement (ACK) message (called "direct ACK" denoted as ACK dir ) or notifying the sender of failure with a negative acknowledgement (NACK) message [1][2][3][4], (2) to increase data transfer success rates by delivering via multiple paths [5][6][7], and (3) to avoid data collision by using eventbased approaches or collision detection approaches [8,9]. To achieve lossless reliable data transfer, these data transmission protocols commonly select feedback message or recovery factors such as ACK, NACK, hop-by-hop recovery, end-to-end recovery, or the number of packet duplications.…”
Section: Introductionmentioning
confidence: 99%