Trickle: Code Propagation and Maintenance Neil Patel UC Berkeley David Culler UC Berkeley Scott Shenker UC Berkeley ICSI Philip Levis UC Berkeley.

Slides:



Advertisements
Similar presentations
1 S4: Small State and Small Stretch Routing for Large Wireless Sensor Networks Yun Mao 2, Feng Wang 1, Lili Qiu 1, Simon S. Lam 1, Jonathan M. Smith 2.
Advertisements

Min Song 1, Yanxiao Zhao 1, Jun Wang 1, E. K. Park 2 1 Old Dominion University, USA 2 University of Missouri at Kansas City, USA IEEE ICC 2009 A High Throughput.
A Distributed Security Framework for Heterogeneous Wireless Sensor Networks Presented by Drew Wichmann Paper by Himali Saxena, Chunyu Ai, Marco Valero,
Routing Protocols for Sensor Networks Presented by Siva Desaraju Computer Science WMU Negotiation-based protocols for Disseminating Information in Wireless.
S-MAC Sensor Medium Access Control Protocol An Energy Efficient MAC protocol for Wireless Sensor Networks.
Rumor Routing Algorithm For sensor Networks David Braginsky, Computer Science Department, UCLA Presented By: Yaohua Zhu CS691 Spring 2003.
Rumor Routing in Sensor Networks David Braginsky and Deborah Estrin Presented By Tu Tran 1.
Packet Leashes: Defense Against Wormhole Attacks Authors: Yih-Chun Hu (CMU), Adrian Perrig (CMU), David Johnson (Rice)
Broadcasting Protocol for an Amorphous Computer Lukáš Petrů MFF UK, Prague Jiří Wiedermann ICS AS CR.
Monday, June 01, 2015 ARRIVE: Algorithm for Robust Routing in Volatile Environments 1 NEST Retreat, Lake Tahoe, June
Investigating Mac Power Consumption in Wireless Sensor Network
Incremental Network Programming for Wireless Sensors NEST Retreat June 3 rd, 2004 Jaein Jeong UC Berkeley, EECS Introduction Background – Mechanisms of.
June 2008 WEI short course - L9 trickle 1 Wireless Embedded InterNet working Foundations of Ubiquitous Sensor Networks - Trickle - Polite Reliable Responsive.
Dissemination protocols for large sensor networks Fan Ye, Haiyun Luo, Songwu Lu and Lixia Zhang Department of Computer Science UCLA Chien Kang Wu.
Incremental Network Programming for Wireless Sensors IEEE SECON 2004 Jaein Jeong and David Culler UC Berkeley, EECS.
E-ODMRP: Enhanced ODMRP with Motion Adaptive Refresh Soon Y. Oh, Joon-Sang Park, Mario Gerla Computer Science Dept. UCLA.
1 Deluge: Data Dissemination for Network Programming at Scale Jonathan Hui UC Berkeley NEST Retreat June 3, 2004.
UC Berkeley, EECS Congestion Control and Fairness for Many-to-One Routing in Sensor Networks Background  sensor motes route data back to base.
Maté: A Tiny Virtual Machine for Sensor Networks Philip Levis and David Culler Presented by: Michele Romano.
Scalable and Distributed GPS free Positioning for Sensor Networks Rajagopal Iyengar and Biplab Sikdar Department of ECSE, Rensselaer Polytechnic Institute.
Beacon Vector Routing: Scalable Point-to-Point Routing in Wireless Sensornets.
A Transmission Control Scheme for Media Access in Sensor Networks Alec Woo, David Culler (University of California, Berkeley) Special thanks to Wei Ye.
TOSSIM: Visualizing the Real World Philip Levis, Nelson Lee, Dennis Chi and David Culler UC Berkeley NEST Retreat, January 2003.
Dynamic Clustering for Acoustic Target Tracking in Wireless Sensor Network Wei-Peng Chen, Jennifer C. Hou, Lui Sha Presented by Ray Lam Oct 23, 2004.
Empirical Analysis of Transmission Power Control Algorithms for Wireless Sensor Networks CENTS Retreat – May 26, 2005 Jaein Jeong (1), David Culler (1),
UC Berkeley, EECS Congestion Control and Fairness for Many-to-One Routing in Sensor Networks Cheng Tien Ee.
A Highly Adaptive Distributed Routing Algorithm for Mobile Wireless Networks Research Paper By V. D. Park and M. S. Corson.
Topic 1: Sensor Networks (Long Lecture) Jorge J. Gómez.
Dynamic Clustering for Acoustic Target Tracking in Wireless Sensor Network Wei-Peng Chen, Jennifer C. Hou, Lui Sha.
TinyOS By Morgan Leider CS 411 with Mike Rowe with Mike Rowe.
Localization With Mobile Anchor Points in Wireless Sensor Networks
Korea Advanced Institute of Science and Technology Active Sensor Networks(Mate) (Published by Philip Levis, David Gay, and David Culler in NSDI 2005) 11/11/09.
TRICKLE: A Self-Regulating Algorithm for Code Propagation and Maintenance in Wireless Sensor Networks Philip Levis, Neil Patel, Scott Shenker and David.
Salah A. Aly,Moustafa Youssef, Hager S. Darwish,Mahmoud Zidan Distributed Flooding-based Storage Algorithms for Large-Scale Wireless Sensor Networks Communications,
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
A Remote Code Update Mechanism for Wireless Sensor Networks Thanos Stathopoulos, John Heidemann and Deborah Estrin CEG 790 Presentation By: Trevor Smith.
Communication Paradigm for Sensor Networks Sensor Networks Sensor Networks Directed Diffusion Directed Diffusion SPIN SPIN Ishan Banerjee
REED: Robust, Efficient Filtering and Event Detection in Sensor Networks Daniel Abadi, Samuel Madden, Wolfgang Lindner MIT United States VLDB 2005.
1 REED: Robust, Efficient Filtering and Event Detection in Sensor Networks Daniel Abadi, Samuel Madden, Wolfgang Lindner MIT United States VLDB 2005.
Energy and Latency Control in Low Duty Cycle MAC Protocols Yuan Li, Wei Ye, John Heidemann Information Sciences Institute, University of Southern California.
Data Collection and Dissemination. Learning Objectives Understand Trickle – an data dissemination protocol for WSNs Understand data collection protocols.
Efficient Energy Management Protocol for Target Tracking Sensor Networks X. Du, F. Lin Department of Computer Science North Dakota State University Fargo,
A Reservation-based TDMA Protocol Using Directional Antennas (RTDMA-DA) For Wireless Mesh Networks Amitabha Das and Tingliang Zhu, Nanyang Technological.
Computer Science 1 TinySeRSync: Secure and Resilient Time Synchronization in Wireless Sensor Networks Speaker: Sangwon Hyun Acknowledgement: Slides were.
Network Coding Data Collecting Mechanism based on Prioritized Degree Distribution in Wireless Sensor Network Wei Zhang, Xianghua Xu, Qinchao Zhang, Jian.
1 Reprogramming/Re-tasking in Wireless Sensor Networks Part of slides are from Jonathon Hui, David A. Olsen and Jaein Jeong.
Presenter - Bob Kinicki Internet of Things Fall 2015
a/b/g Networks Routing Herbert Rubens Slides taken from UIUC Wireless Networking Group.
Reliable Multi-hop Firmware Upload Protocol for mica2 motes. CSE 534 Advanced Networks Dmitri Lusnikov Fall 2004.
An Energy-Efficient MAC Protocol for Wireless Sensor Networks Speaker: hsiwei Wei Ye, John Heidemann and Deborah Estrin. IEEE INFOCOM 2002 Page
1 Presented by Jing Sun Computer Science and Engineering Department University of Conneticut.
MCEEC: MULTI-HOP CENTRALIZED ENERGY EFFICIENT CLUSTERING ROUTING PROTOCOL FOR WSNS N. Javaid, M. Aslam, K. Djouani, Z. A. Khan, T. A. Alghamdi.
Cross-Layer Scheduling for Power Efficiency in Wireless Sensor Networks Mihail L. Sichitiu Department of Electrical and Computer Engineering North Carolina.
A Few Random IoT Thoughts PEDS Seminar PEDS Seminar November 23, 2015 November 23, 2015.
1 UFlood: High-Throughput Wireless Flooding Jayashree Subramanian Collaborators: Robert Morris, Ramakrishna Gummadi, and Hari Balakrishnan.
CS541 Advanced Networking 1 Contention-based MAC Protocol for Wireless Sensor Networks Neil Tang 4/20/2009.
RBP: Robust Broadcast Propagation in Wireless Networks Fred Stann, John Heidemann, Rajesh Shroff, Muhammad Zaki Murtaza USC/ISI In SenSys 2006.
TreeCast: A Stateless Addressing and Routing Architecture for Sensor Networks Santashil PalChaudhuri, Shu Du, Ami K. Saha, and David B. Johnson Department.
Exploring the Energy-Latency Trade-off for Broadcasts in Energy-Saving Sensor Networks Matthew J. Miller, Cigdem Sengul, Indranil Gupta Department of Computer.
On Mobile Sink Node for Target Tracking in Wireless Sensor Networks Thanh Hai Trinh and Hee Yong Youn Pervasive Computing and Communications Workshops(PerComW'07)
Mobile Networks and Applications (January 2007) Presented by J.H. Su ( 蘇至浩 ) 2016/3/21 OPLab, IM, NTU 1 Joint Design of Routing and Medium Access Control.
Scalable and Distributed GPS free positioning for Sensor Networks Rajagopal Iyengear and Biplab Sikdar IEEE International Conference on Communications.
MAC Protocols for Sensor Networks
MAC Protocols for Sensor Networks
Data Collection and Dissemination
Introduction to Wireless Sensor Networks
Trickle: Code Propagation and Maintenance
Dynamic Routing and OSPF
Data Collection and Dissemination
Investigating Mac Power Consumption in Wireless Sensor Network
Presentation transcript:

Trickle: Code Propagation and Maintenance Neil Patel UC Berkeley David Culler UC Berkeley Scott Shenker UC Berkeley ICSI Philip Levis UC Berkeley

NEST Retreat, Jan Retasking a Sensor Net Long lifetimes require retasking Spectrum of retasking mechanisms –Binary images (MOAP, XnP, Deluge) –High-level virtual programs (Maté, TinyDB) –Parameter setting (Attribute, Global) Install on every node –Packet loss and transient disconnection –Periodically check that everyone has the right code (advertise) –TinyDB tuples embed query ID

NEST Retreat, Jan Propagating Can Be Costly, Binaries: 10-60KB Virtual programs: B Parameters: 8-30B To every node in a large, multihop network…

NEST Retreat, Jan Knowing When Is Costlier Periodically checking that everyone has the right code (advertisements) can cost more than the code itself. 64KB of data: ~1 packet/minute for a day 400B of data: ~1 packet/hour for a day 20B: one packet!

NEST Retreat, Jan Problem Statement The first step is to detect when nodes need updates (continuous process) When there is no new code –Maintenance cost should approach zero When there is new code –Propagation should be rapid

NEST Retreat, Jan Relation to Deluge, SPIN, etc. When do you advertise code? How do you suppress control messages? Not a dissemination protocol

NEST Retreat, Jan Solution: Trickle Simple, “polite gossip” algorithm “Every once in a while, broadcast what code you have, unless you’ve heard some other nodes broadcast the same thing.” Behavior (simulation and deployment): –Scalability: thousand-fold density changes –Maintenance: a few sends per hour –Propagation: less than a minute

NEST Retreat, Jan Outline Introduction Trickle algorithm Maintenance Propagation Conclusion

NEST Retreat, Jan Trickle Assumptions Wireless broadcast medium Concise, comparable metadata –Given A and B, know which has newer code

NEST Retreat, Jan Idea: Communication As long as each mote communicates with one other, needed updates will be detected –In a single cell, one transmission will detect all needed updates Communication is reception or transmission Maintain a communication rate: (receptions + transmissions) <= k

NEST Retreat, Jan Trickle Algorithm Time interval of length  Redundancy constant k (e.g., 1, 2) Pick a time t from [0,  ] Maintain a counter c, initialized to zero At time t, broadcast code metadata if c < k Increment c when you hear identical metadata to your own At end of , pick a new t

NEST Retreat, Jan Example Trickle Execution time  2 3 transmissionsuppressed transmissionreception 1 k=1 c 0 0 0

NEST Retreat, Jan Example Trickle Execution t 1a time  2 3 transmissionsuppressed transmissionreception 1 k=1 c 0 0 0

NEST Retreat, Jan Example Trickle Execution t 1a time  2 3 transmissionsuppressed transmissionreception 1 k=1 c 0 1 0

NEST Retreat, Jan Example Trickle Execution t 1a time  t 3a 2 3 transmissionsuppressed transmissionreception 1 k=1 c 0 1 0

NEST Retreat, Jan Example Trickle Execution t 1a time  t 3a 2 3 transmissionsuppressed transmissionreception 1 k=1 c 0 2 0

NEST Retreat, Jan Example Trickle Execution t 1a time t 2a  t 3a 2 3 transmissionsuppressed transmissionreception 1 k=1 c 0 2 0

NEST Retreat, Jan Example Trickle Execution t 1a time t 2a  t 3a 2 3 transmissionsuppressed transmissionreception 1 k=1 c 0 0 0

NEST Retreat, Jan Example Trickle Execution t 1a time t 2a t 2b  t 3a 2 3 transmissionsuppressed transmissionreception 1 k=1 c 1 0 1

NEST Retreat, Jan Example Trickle Execution t 1a time t 2a t 2b  t 3a t 3b 2 3 transmissionsuppressed transmissionreception 1 k=1 c 1 0 1

NEST Retreat, Jan Example Trickle Execution t 1a t 1b time t 2a t 2b  t 3a t 3b 2 3 transmissionsuppressed transmissionreception 1 k=1 c 1 0 1

NEST Retreat, Jan Outline Problem statement Trickle algorithm Maintenance Propagation Conclusion

NEST Retreat, Jan Maintenance Minimize maintenance cost (transmissions) when there is no new code –Keep as close to k as possible Start with three assumptions, relax each –Lossless network –Perfect synchronization –Single-hop

NEST Retreat, Jan Ideal Case k transmissions per interval First k nodes to transmit suppress all others Independent of density

NEST Retreat, Jan Loss

NEST Retreat, Jan Logarithmic Behavior of Loss Transmission increase is due to the probability that one node has not heard n transmissions Example: 10% loss –1 in 10 nodes will not hear one transmission –1 in 100 nodes will not hear two transmissions –1 in 1000 nodes will not hear three, etc. Fundamental bound to maintaining per- interval communication

NEST Retreat, Jan Synchronization

NEST Retreat, Jan Short Listen Effect Some nodes don’t listen much (pick small t values) For example, B transmits three times: A B C D Time  transmissionsuppressed transmissionreception

NEST Retreat, Jan Solution Add a listening period: pick t from [0.5 ,  ] Listen-only period

NEST Retreat, Jan Effect of Listen Period

NEST Retreat, Jan Multi-Cell Case TOSSIM simulation –No synchronization, loss from empirical model –Nodes uniformly distributed in 50’x50’ area Logarithmic scaling holds

NEST Retreat, Jan Empirical Validation Redundancy: Maté VM implementation (transmissions + receptions) intervals - k

NEST Retreat, Jan Outline Problem statement Trickle algorithm Maintenance Propagation Conclusion

NEST Retreat, Jan Choosing Intervals Large interval: low cost, slow to discover Small interval: high cost, quick to discover When there’s new gossip, talk more When there’s nothing new, talk less

NEST Retreat, Jan Speeding Propagation Adjust  :  l,  h When  expires, double  up to  h When you hear newer metadata, set  to  l When you hear newer code, set  to  l When you hear older metadata, send an update

NEST Retreat, Jan Rate Change Illustration hh ll 2l2l hh hh Hear Newer Metadata 2 Time

NEST Retreat, Jan Simulated Propagation k=1,  l =1 second,  h =1 minute

NEST Retreat, Jan Empirical Propagation Deployed 19 nodes in office setting Instrumented nodes for accurate time measurements Introduce new code, log installation times k=1,  l =1 second,  h =1 minute 40 test runs

NEST Retreat, Jan Network Layout

NEST Retreat, Jan Empirical Results

NEST Retreat, Jan Changing  h to 20 minutes k=1

NEST Retreat, Jan Conclusions Trickle efficiency scales logarithmically with density Can obtain rapid propagation with low maintenance –At most 3 sends/hour, propagates in 30 seconds Uses beyond code propagation –Changes to data such as routing tables –E.g., predicates can scope distance Further examination of  l,  h and k needed

NEST Retreat, Jan Questions Tech report available in back

NEST Retreat, Jan Sensor Network Behavior

NEST Retreat, Jan Multi-cell Case, Simulated

NEST Retreat, Jan

NEST Retreat, Jan

NEST Retreat, Jan