scispace - formally typeset
Open AccessProceedings ArticleDOI

The dynamic behavior of a data dissemination protocol for network programming at scale

Reads0
Chats0
TLDR
It appears very hard to significantly improve upon the rate obtained by Deluge and it is argued that the rates obtained for dissemination are inherently lower than that for single path propagation.
Abstract
To support network programming, we present Deluge, a reliable data dissemination protocol for propagating large data objects from one or more source nodes to many other nodes over a multihop, wireless sensor network. Deluge builds from prior work in density-aware, epidemic maintenance protocols. Using both a real-world deployment and simulation, we show that Deluge can reliably disseminate data to all nodes and characterize its overall performance. On Mica2-dot nodes, Deluge can push nearly 90 bytes/second, one-ninth the maximum transmission rate of the radio supported under TinyOS. Control messages are limited to 18% of all transmissions. At scale, the protocol exposes interesting propagation dynamics only hinted at by previous dissemination work. A simple model is also derived which describes the limits of data propagation in wireless networks. Finally, we argue that the rates obtained for dissemination are inherently lower than that for single path propagation. It appears very hard to significantly improve upon the rate obtained by Deluge and we identify establishing a tight lower bound as an open problem.

read more

Content maybe subject to copyright    Report

Citations
More filters
Proceedings ArticleDOI

An Efficient Code Distribution Protocol for OTAP in WSNs

TL;DR: Simulation results demonstrate that PDM can improve the efficiency of OTAP in WSNs, and make the energy consumption in network not only lower but more balanced.
Book ChapterDOI

S-SurF: An Enhanced Secure Bulk Data Dissemination in Wireless Sensor Networks

TL;DR: An enhanced protocol entitled Secure Survival of the Fittest (S-SurF) based on SurF is proposed, which incorporates a time-reliability model to predict the minimum completion time and hence seizes the most opportune moment to transit between flooding and negotiation schemes.
Proceedings ArticleDOI

Operating system support for dynamic code loading in sensor networks

TL;DR: The Arena operating system is a special-purpose embedded operating system that has the potential to overcome problems faced by sensor network operating systems and is based on a strict separation of mechanism and policy.
Journal Article

An Online Reprogrammable Operating System for Wireless Sensor Networks

TL;DR: The hot-swapping capability in SOS that allows a module to be upgraded on the fly is designed and implemented and the first-fit flash memory allocation scheme in SOS is replaced by a technique that relies on erase counters to evenly distribute memory traffic around the flash memory.
Journal ArticleDOI

Scalable Incremental Network Programming for Multihop Wireless Sensors

TL;DR: A network programming mechanism that can flexibly and quickly re-task a large multi-hop network of wireless sensor nodes that allows each sensor node to be incrementally reprogrammed with heterogeneous images of native program code using Rsync block comparison algorithm, point-to-point routing with the BLIP IPv6 stack, and image volume management with Deluge2.
References
More filters
Proceedings ArticleDOI

The broadcast storm problem in a mobile ad hoc network

TL;DR: This paper proposes several schemes to reduce redundant rebroadcasts and differentiate timing of rebroadcast to alleviate the broadcast storm problem, which is identified by showing how serious it is through analyses and simulations.
Proceedings ArticleDOI

TOSSIM: accurate and scalable simulation of entire TinyOS applications

TL;DR: TOSSIM, a simulator for TinyOS wireless sensor networks can capture network behavior at a high fidelity while scaling to thousands of nodes, by using a probabilistic bit error model for the network.
Proceedings ArticleDOI

Epidemic algorithms for replicated database maintenance

TL;DR: This paper descrikrs several randomized algorit, hms for dist,rihut.ing updates and driving t,he replicas toward consist,c>nc,y.
Journal ArticleDOI

The broadcast storm problem in a mobile ad hoc network

TL;DR: This paper proposes several schemes to reduce redundant rebroadcasts and differentiate timing of rebroadcast to alleviate the broadcast storm problem, which is identified by showing how serious it is through analyses and simulations.
Proceedings ArticleDOI

Maté: a tiny virtual machine for sensor networks

TL;DR: Maté's concise, high-level program representation simplifies programming and allows large networks to be frequently reprogrammed in an energy-efficient manner; in addition, its safe execution environment suggests a use of virtual machines to provide the user/kernel boundary on motes that have no hardware protection mechanisms.
Related Papers (5)
Frequently Asked Questions (19)
Q1. What are the contributions in "The dynamic behavior of a data dissemination protocol for network programming at scale" ?

To support network programming, the authors present Deluge, a reliable data dissemination protocol for propagating large data objects from one or more source nodes to many other nodes over a multihop, wireless sensor network. Using both a real-world deployment and simulation, the authors show that Deluge can reliably disseminate data to all nodes and characterize its overall performance. 

Because the cost of end-to-end repair is exponential with the path length, both protocols emphasize hop-by-hop error recovery where loss detection and recovery is limited to a small number of hops (ideally one). 

By opening up sockets to each node from a desktop computer, the authors timestamp each UART message with precision on the order of milliseconds and track the propagation of each page. 

spatial multiplexing limits a node’s broadcast rate to no greater than onethird the maximum rate due to the single-channel, broadcast medium. 

One might suggest that starting the propagation in the centermight help to eliminate the behavior of following the edge and also decrease the propagation time by about half. 

The authors experimented with suppressing the transmission of data packets if k redundant data packets were overheard while in TX, where lower values of k represented more aggressive suppression. 

One cause is Deluge’s depth-first tendency, where propagation of a single page along good links is not blocked by delays caused by poor links. 

By doubling τr, the propagation rate along the diagonal improves by about 2.7 times while the propagation rate along the edge remains nearly identical, leading to an improvement in overall propagation performance. 

Even though placing the source at the center effectively reduces the the diameter by about half, Deluge is unable to take advantage of the quick edges since nodes in the center experience a greater number of collisions. 

The expected time required to transmit just the data packets isE[Ttx] = E[NtPkt] · TtPkt ·N, (2)where TtPkt is the transmission time for a single packet. 

The only trigger that causes R to request data from S is the receipt of an advertisement stating the availability of a needed page. 

the rate of requests from R will decrease with the decreasing advertisement rate in the steady state since S will not know that R is not up-to-date. 

The main advantage with simulating at the bit-level is that the transmission and reception of bits govern the actions of each layer, rather than modeling each layer with its own set of parameters. 

the authors used TOSSIM to evaluate and investigate the behavior of Deluge with network sizes on the order of hundreds of nodes and tens of hops. 

For the linear case, the simulations show that Deluge takesabout 40 seconds to disseminate each page to 152 nodes across 15 hops. 

Because requests are unicast to the node that most recently advertised, it is unlikely for many senders in a region to begin transmitting data. 

With this topology, the propagation behaves as expected: the propagation progresses at a fairly constant rate in a nice wavefront pattern from corner to corner. 

This structured approach should improve the propagation time for a single page, but inhibits the use of pipelining since it is more difficult to minimize interference between transfers of different pages. 

Using the transmission count information on advertisements, the authors plot a histogram of the average advertisement rate for each node by dividing the count by the completion time.