skip to main content
10.1145/1031495.1031506acmconferencesArticle/Chapter ViewAbstractPublication PagessensysConference Proceedingsconference-collections
Article

The dynamic behavior of a data dissemination protocol for network programming at scale

Published: 03 November 2004 Publication History
  • Get Citation Alerts
  • Abstract

    To support network programming, we present Deluge, a reliable data dissemination protocol for propagating large data objects from one or more source nodes to many other nodes over a multihop, wireless sensor network. Deluge builds from prior work in density-aware, epidemic maintenance protocols. Using both a real-world deployment and simulation, we show that Deluge can reliably disseminate data to all nodes and characterize its overall performance. On Mica2-dot nodes, Deluge can push nearly 90 bytes/second, one-ninth the maximum transmission rate of the radio supported under TinyOS. Control messages are limited to 18% of all transmissions. At scale, the protocol exposes interesting propagation dynamics only hinted at by previous dissemination work. A simple model is also derived which describes the limits of data propagation in wireless networks. Finally, we argue that the rates obtained for dissemination are inherently lower than that for single path propagation. It appears very hard to significantly improve upon the rate obtained by Deluge and we identify establishing a tight lower bound as an open problem.

    References

    [1]
    A. Demers, D. Greene, C. Hauser, W. Irish, and J. Larson. Epidemic algorithms for replicated database maintenance. In Proceedings of the Sixth Annual ACM Symposium on Principles of Distributed Computing, pages 1--12. ACM Press, 1987.
    [2]
    D. Ganesan, B. Krishnamachari, A. Woo, D. Culler, D. Estrin, and S. Wicker. Complex behavior at scale: An experimental study of low-power wireless sensor networks. Technical Report UCLA/CSD-TR 02-0013, UCLA, 2002.
    [3]
    J. Jeong, S. Kim, and A. Broad. Network Reprogramming. University of California at Berkeley, Berkeley, CA, USA, August 2003.
    [4]
    S. K. Kasera, G. Hjálmtýsson, D. F. Towsley, and J. F. Kurose. Scalable reliable multicast using multiple multicast channels. IEEE / ACM Transactions on Networking, 8(3):294--310, 2000.
    [5]
    J. Kulik, W. R. Heinzelman, and H. Balakrishnan. Negotiation-based protocols for disseminating information in wireless sensor networks. Wireless Networks, 8(2-3):169--185, 2002.
    [6]
    P. Levis and D. Culler. Maté: a tiny virtual machine for sensor networks. In 10th International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS-X), pages 85--95. ACM Press, 2002.
    [7]
    P. Levis, N. Lee, M. Welsh, and D. Culler. TOSSIM: Accurate and scalable simulation of entire tinyos applications. In Proceedings of the First ACM Conference on Embedded Networked Sensor Systems (SenSys 2003). ACM Press, November 2003.
    [8]
    P. Levis, N. Patel, S. Shenker, and D. Culler. Trickle: A self-regulating algorithm for code propagation and maintenance in wireless sensor networks. Technical report, University of California at Berkeley, 2004.
    [9]
    S.-Y. Ni, Y.-C. Tseng, Y.-S. Chen, and J.-P. Sheu. The broadcast storm problem in a mobile ad hoc network. In Proceedings of the Fifth Annual ACM/IEEE International Conference on Mobile Computing and Networking, pages 151--162. ACM Press, 1999.
    [10]
    F. Stann and J. Heidemann. RMST: Reliable data transport in sensor networks. In Proceedings of the First International Workshop on Sensor Net Protocols and Applications, pages 102--112, Anchorage, Alaska, USA, April 2003. IEEE.
    [11]
    T. Stathopoulos, J. Heidemann, and D. Estrin. A remote code update mechanism for wireless sensor networks. Technical report, UCLA, Los Angeles, CA, USA, 2003.
    [12]
    R. Szewczyk, J. Polastre, A. Mainwaring, and D. Culler. Lessons from a sensor network expedition. In Proceedings of the First European Workshop on Sensor Networks (EWSN), Berlin, Germany, Jan. 2004.
    [13]
    University of California, Berkeley. Smote testbed. http://smote.cs.berkeley.edu/.
    [14]
    University of California, Berkeley. Mica2-dot schematics.
    [15]
    http://webs.cs.berkeley.edu/tos/hardware/design/ORCAD_FILES/MICA2/6310-%0306-01ACLEAN.pdf, March 2003.
    [16]
    University of California, Berkeley. Tinyos. http://www.tinyos.net/, 2004.
    [17]
    C.-Y. Wan, A. T. Campbell, and L. Krishnamurthy. PSFQ: A reliable transport protocol for wireless sensor networks. In Proceedings of the 1st ACM International Workshop on Wireless Sensor Networks and Applications, pages 1--11. ACM Press, 2002.

    Cited By

    View all
    • (2024)FLoRa+: Energy-efficient, Reliable, Beamforming-assisted, and Secure Over-the-air Firmware Update in LoRa NetworksACM Transactions on Sensor Networks10.1145/364154820:3(1-28)Online publication date: 22-Jan-2024
    • (2024)DSME-FOTA: Firmware over-the-air update framework for IEEE 802.15.4 DSME MAC to enable large-scale multi-hop industrial IoT networksInternet of Things10.1016/j.iot.2024.101239(101239)Online publication date: May-2024
    • (2024)An energy efficient Swan Intelligent based Clustering Technique (SICT) with fuzzy based secure routing protocol in IoTPeer-to-Peer Networking and Applications10.1007/s12083-024-01670-6Online publication date: 4-Apr-2024
    • Show More Cited By

    Index Terms

    1. The dynamic behavior of a data dissemination protocol for network programming at scale

          Recommendations

          Comments

          Information & Contributors

          Information

          Published In

          cover image ACM Conferences
          SenSys '04: Proceedings of the 2nd international conference on Embedded networked sensor systems
          November 2004
          338 pages
          ISBN:1581138792
          DOI:10.1145/1031495
          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Sponsors

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          Published: 03 November 2004

          Permissions

          Request permissions for this article.

          Check for updates

          Author Tags

          1. dissemination protocols
          2. network programming
          3. wireless networks
          4. wireless sensor networks

          Qualifiers

          • Article

          Conference

          Acceptance Rates

          Overall Acceptance Rate 174 of 867 submissions, 20%

          Contributors

          Other Metrics

          Bibliometrics & Citations

          Bibliometrics

          Article Metrics

          • Downloads (Last 12 months)18
          • Downloads (Last 6 weeks)2

          Other Metrics

          Citations

          Cited By

          View all
          • (2024)FLoRa+: Energy-efficient, Reliable, Beamforming-assisted, and Secure Over-the-air Firmware Update in LoRa NetworksACM Transactions on Sensor Networks10.1145/364154820:3(1-28)Online publication date: 22-Jan-2024
          • (2024)DSME-FOTA: Firmware over-the-air update framework for IEEE 802.15.4 DSME MAC to enable large-scale multi-hop industrial IoT networksInternet of Things10.1016/j.iot.2024.101239(101239)Online publication date: May-2024
          • (2024)An energy efficient Swan Intelligent based Clustering Technique (SICT) with fuzzy based secure routing protocol in IoTPeer-to-Peer Networking and Applications10.1007/s12083-024-01670-6Online publication date: 4-Apr-2024
          • (2024)A computation offloading strategy for multi-access edge computing based on DQUIC protocolThe Journal of Supercomputing10.1007/s11227-024-06176-9Online publication date: 14-May-2024
          • (2023)COFlood: Concurrent Opportunistic Flooding in Asynchronous Duty Cycle NetworksACM Transactions on Sensor Networks10.1145/357016319:3(1-21)Online publication date: 1-Mar-2023
          • (2023)PARIOT: Anti-repackaging for IoT firmware integrityJournal of Network and Computer Applications10.1016/j.jnca.2023.103699217(103699)Online publication date: Aug-2023
          • (2023)Testbeds for WSNsConcepts, Applications, Experimentation and Analysis of Wireless Sensor Networks10.1007/978-3-031-20709-9_7(415-545)Online publication date: 14-Feb-2023
          • (2022)RoSymProceedings of the 4th Workshop on CPS & IoT Security and Privacy10.1145/3560826.3563381(35-46)Online publication date: 7-Nov-2022
          • (2022)SFIOT: Software-Defined Function for the IoT2022 IEEE 23rd International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM)10.1109/WoWMoM54355.2022.00018(20-30)Online publication date: Jun-2022
          • (2022)An Analytical Model of Page Dissemination for Efficient Big Data Transmission of C-ITSIEEE Transactions on Intelligent Transportation Systems10.1109/TITS.2021.313455723:9(16524-16533)Online publication date: Sep-2022
          • Show More Cited By

          View Options

          Get Access

          Login options

          View options

          PDF

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader

          Media

          Figures

          Other

          Tables

          Share

          Share

          Share this Publication link

          Share on social media