-
On the Scalability and Message Count of Trickle-based Broadcasting Schemes
Authors:
Thomas M. M. Meyfroyt,
Sem C. Borst,
Onno J. Boxma,
Dee Denteneer
Abstract:
As the use of wireless sensor networks increases, the need for efficient and reliable broadcasting algorithms grows. Ideally, a broadcasting algorithm should have the ability to quickly disseminate data, while kee** the number of transmissions low. In this paper, we analyze the popular Trickle algorithm, which has been proposed as a suitable communication protocol for code maintenance and propag…
▽ More
As the use of wireless sensor networks increases, the need for efficient and reliable broadcasting algorithms grows. Ideally, a broadcasting algorithm should have the ability to quickly disseminate data, while kee** the number of transmissions low. In this paper, we analyze the popular Trickle algorithm, which has been proposed as a suitable communication protocol for code maintenance and propagation in wireless sensor networks. We show that the broadcasting process of a network using Trickle can be modeled by a Markov chain and that this chain falls under a class of Markov chains, closely related to residual lifetime distributions. It is then shown that this class of Markov chains admits a stationary distribution of a special form. These results are used to analyze the Trickle algorithm and its message count. Our results prove conjectures made in the literature concerning the effect of a listen-only period. Besides providing a mathematical analysis of the algorithm, we propose a generalized version of Trickle, with an additional parameter defining the length of a listen-only period.
△ Less
Submitted 29 September, 2015;
originally announced September 2015.
-
A Data Propagation Model for Wireless Gossi**
Authors:
Thomas M. M. Meyfroyt,
Sem C. Borst,
Onno J. Boxma,
Dee Denteneer
Abstract:
Wireless sensor networks require communication protocols for efficiently propagating data in a distributed fashion. The Trickle algorithm is a popular protocol serving as the basis for many of the current standard communication protocols. In this paper we develop a mathematical model describing how Trickle propagates new data across a network consisting of nodes placed on a line. The model is anal…
▽ More
Wireless sensor networks require communication protocols for efficiently propagating data in a distributed fashion. The Trickle algorithm is a popular protocol serving as the basis for many of the current standard communication protocols. In this paper we develop a mathematical model describing how Trickle propagates new data across a network consisting of nodes placed on a line. The model is analyzed and asymptotic results on the hop count and end-to-end delay distributions in terms of the Trickle parameters and network density are given. Additionally, we show that by only a small modification of the Trickle algorithm the expected end-to-end delay can be greatly decreased. Lastly, we demonstrate how one can derive the exact hop count and end-to-end delay distributions for small network sizes.
△ Less
Submitted 4 November, 2014; v1 submitted 23 July, 2014;
originally announced July 2014.
-
Data Dissemination Performance in Large-Scale Sensor Networks
Authors:
Thomas M. M. Meyfroyt,
Sem C. Borst,
Onno J. Boxma,
Dee Denteneer
Abstract:
As the use of wireless sensor networks increases, the need for (energy-)efficient and reliable broadcasting algorithms grows. Ideally, a broadcasting algorithm should have the ability to quickly disseminate data, while kee** the number of transmissions low. In this paper we develop a model describing the message count in large-scale wireless sensor networks. We focus our attention on the popular…
▽ More
As the use of wireless sensor networks increases, the need for (energy-)efficient and reliable broadcasting algorithms grows. Ideally, a broadcasting algorithm should have the ability to quickly disseminate data, while kee** the number of transmissions low. In this paper we develop a model describing the message count in large-scale wireless sensor networks. We focus our attention on the popular Trickle algorithm, which has been proposed as a suitable communication protocol for code maintenance and propagation in wireless sensor networks. Besides providing a mathematical analysis of the algorithm, we propose a generalized version of Trickle, with an additional parameter defining the length of a listen-only period. This generalization proves to be useful for optimizing the design and usage of the algorithm. For single-cell networks we show how the message count increases with the size of the network and how this depends on the Trickle parameters. Furthermore, we derive distributions of inter-broadcasting times and investigate their asymptotic behavior. Our results prove conjectures made in the literature concerning the effect of a listen-only period. Additionally, we develop an approximation for the expected number of transmissions in multi-cell networks. All results are validated by simulations.
△ Less
Submitted 22 July, 2014;
originally announced July 2014.
-
Packet Skip** and Network Coding for Delay-Sensitive Network Communication
Authors:
Marc Aoun,
Paul Beekhuizen,
Antonios Argyriou,
Dee Denteneer,
Peter van der Stok
Abstract:
We provide an analytical study of the impact of packet skip** and opportunistic network coding on the timely communication of messages through a single network element. In a first step, we consider a single-server queueing system with Poisson arrivals, exponential service times, and a single buffer position. Packets arriving at a network node have a fixed deadline before which they should reach…
▽ More
We provide an analytical study of the impact of packet skip** and opportunistic network coding on the timely communication of messages through a single network element. In a first step, we consider a single-server queueing system with Poisson arrivals, exponential service times, and a single buffer position. Packets arriving at a network node have a fixed deadline before which they should reach the destination. To preserve server capacity, we introduce a thresholding policy, based on remaining time until deadline expiration, to decide whether to serve a packet or skip its service. The obtained goodput improvement of the system is derived, as well as the operating conditions under which thresholding can enhance performance. Subsequently, we focus our analysis on a system that supports network coding instead of thresholding. We characterize the impact of network coding at a router node on the delivery of packets associated with deadlines. We model the router node as a queueing system where packets arrive from two independent Poisson flows and undergo opportunistic coding operations. We obtain an exact expression for the goodput of the system and study the achievable gain. Finally, we provide an analytical model that considers both network coding and packet skip**, capturing their joint performance. A comparative analysis between the aforementioned approaches is provided.
△ Less
Submitted 20 January, 2013; v1 submitted 6 January, 2012;
originally announced January 2012.
-
Spatial fairness in linear wireless multi-access networks
Authors:
P. M. van de Ven,
J. S. H. van Leeuwaarden,
D. Denteneer,
A. J. E. M. Janssen
Abstract:
Multi-access networks may exhibit severe unfairness in throughput. Recent studies show that this unfairness is due to local differences in the neighborhood structure: Nodes with less neighbors receive better access. We study the unfairness in saturated linear networks, and adapt the multi-access CSMA protocol to remove the unfairness completely, by choosing the activation rates of nodes appropriat…
▽ More
Multi-access networks may exhibit severe unfairness in throughput. Recent studies show that this unfairness is due to local differences in the neighborhood structure: Nodes with less neighbors receive better access. We study the unfairness in saturated linear networks, and adapt the multi-access CSMA protocol to remove the unfairness completely, by choosing the activation rates of nodes appropriately as a function of the number of neighbors. We then investigate the consequences of this choice of activation rates on the network-average saturated throughput, and we show that these rates perform well in a non-saturated setting.
△ Less
Submitted 7 April, 2010;
originally announced April 2010.
-
Dynamics & Stochastics: Festschrift in honor of M. S. Keane
Authors:
Dee Denteneer,
Frank den Hollander,
Evgeny Verbitskiy
Abstract:
The present volume is a Festschrift for Mike Keane, on the occasion of his 65th birthday on January 2, 2005. It contains 29 contributions by Mike's closest colleagues and friends, covering a broad range of topics in Dynamics and Stochastics. To celebrate Mike's scientific achievements, a conference entitled ``Dynamical Systems, Probability Theory and Statistical Mechanics'' was organized in Eind…
▽ More
The present volume is a Festschrift for Mike Keane, on the occasion of his 65th birthday on January 2, 2005. It contains 29 contributions by Mike's closest colleagues and friends, covering a broad range of topics in Dynamics and Stochastics. To celebrate Mike's scientific achievements, a conference entitled ``Dynamical Systems, Probability Theory and Statistical Mechanics'' was organized in Eindhoven, The Netherlands, during the week of January 3--7, 2005. This conference was hosted jointly by EURANDOM and by Philips Research. It drew over 80 participants from 5 continents, which is a sign of the warm affection and high esteem for Mike felt by the international mathematics community.
△ Less
Submitted 12 August, 2006; v1 submitted 11 August, 2006;
originally announced August 2006.
-
Entropy of a bit-shift channel
Authors:
Stan Baggen,
Vladimir Balakirsky,
Dee Denteneer,
Sebastian Egner,
Henk Hollmann,
Ludo Tolhuizen,
Evgeny Verbitskiy
Abstract:
We consider a simple transformation (coding) of an iid source called a bit-shift channel. This simple transformation occurs naturally in magnetic or optical data storage. The resulting process is not Markov of any order. We discuss methods of computing the entropy of the transformed process, and study some of its properties.
We consider a simple transformation (coding) of an iid source called a bit-shift channel. This simple transformation occurs naturally in magnetic or optical data storage. The resulting process is not Markov of any order. We discuss methods of computing the entropy of the transformed process, and study some of its properties.
△ Less
Submitted 10 August, 2006;
originally announced August 2006.