Trickle: Code Propagation and Maintenance

Slides:



Advertisements
Similar presentations
Distributed Assignment of Encoded MAC Addresses in Sensor Networks By Curt Schcurgers Gautam Kulkarni Mani Srivastava Presented By Charuka Silva.
Advertisements

1 S4: Small State and Small Stretch Routing for Large Wireless Sensor Networks Yun Mao 2, Feng Wang 1, Lili Qiu 1, Simon S. Lam 1, Jonathan M. Smith 2.
Min Song 1, Yanxiao Zhao 1, Jun Wang 1, E. K. Park 2 1 Old Dominion University, USA 2 University of Missouri at Kansas City, USA IEEE ICC 2009 A High Throughput.
A Distributed Security Framework for Heterogeneous Wireless Sensor Networks Presented by Drew Wichmann Paper by Himali Saxena, Chunyu Ai, Marco Valero,
Trickle: Code Propagation and Maintenance Neil Patel UC Berkeley David Culler UC Berkeley Scott Shenker UC Berkeley ICSI Philip Levis UC Berkeley.
Introduction to Wireless Sensor Networks
Sensor Network 教育部資通訊科技人才培育先導型計畫. 1.Introduction General Purpose  A wireless sensor network (WSN) is a wireless network using sensors to cooperatively.
Routing Protocols for Sensor Networks Presented by Siva Desaraju Computer Science WMU Negotiation-based protocols for Disseminating Information in Wireless.
S-MAC Sensor Medium Access Control Protocol An Energy Efficient MAC protocol for Wireless Sensor Networks.
Rumor Routing Algorithm For sensor Networks David Braginsky, Computer Science Department, UCLA Presented By: Yaohua Zhu CS691 Spring 2003.
Rumor Routing in Sensor Networks David Braginsky and Deborah Estrin Presented By Tu Tran 1.
Packet Leashes: Defense Against Wormhole Attacks Authors: Yih-Chun Hu (CMU), Adrian Perrig (CMU), David Johnson (Rice)
Leveraging IP for Sensor Network Deployment Simon Duquennoy, Niklas Wirstrom, Nicolas Tsiftes, Adam Dunkels Swedish Institute of Computer Science Presenter.
Incremental Network Programming for Wireless Sensors NEST Retreat June 3 rd, 2004 Jaein Jeong UC Berkeley, EECS Introduction Background – Mechanisms of.
Dissemination protocols for large sensor networks Fan Ye, Haiyun Luo, Songwu Lu and Lixia Zhang Department of Computer Science UCLA Chien Kang Wu.
Incremental Network Programming for Wireless Sensors IEEE SECON 2004 Jaein Jeong and David Culler UC Berkeley, EECS.
1 Deluge: Data Dissemination for Network Programming at Scale Jonathan Hui UC Berkeley NEST Retreat June 3, 2004.
Maté: A Tiny Virtual Machine for Sensor Networks Philip Levis and David Culler Presented by: Michele Romano.
Beacon Vector Routing: Scalable Point-to-Point Routing in Wireless Sensornets.
TOSSIM: Visualizing the Real World Philip Levis, Nelson Lee, Dennis Chi and David Culler UC Berkeley NEST Retreat, January 2003.
Dynamic Clustering for Acoustic Target Tracking in Wireless Sensor Network Wei-Peng Chen, Jennifer C. Hou, Lui Sha Presented by Ray Lam Oct 23, 2004.
Empirical Analysis of Transmission Power Control Algorithms for Wireless Sensor Networks CENTS Retreat – May 26, 2005 Jaein Jeong (1), David Culler (1),
UC Berkeley, EECS Congestion Control and Fairness for Many-to-One Routing in Sensor Networks Cheng Tien Ee.
Topic 1: Sensor Networks (Long Lecture) Jorge J. Gómez.
Dynamic Clustering for Acoustic Target Tracking in Wireless Sensor Network Wei-Peng Chen, Jennifer C. Hou, Lui Sha.
TinyOS By Morgan Leider CS 411 with Mike Rowe with Mike Rowe.
Korea Advanced Institute of Science and Technology Active Sensor Networks(Mate) (Published by Philip Levis, David Gay, and David Culler in NSDI 2005) 11/11/09.
TRICKLE: A Self-Regulating Algorithm for Code Propagation and Maintenance in Wireless Sensor Networks Philip Levis, Neil Patel, Scott Shenker and David.
Authors: Yih-Chun Hu, Adrian Perrig, David B. Johnson
Salah A. Aly,Moustafa Youssef, Hager S. Darwish,Mahmoud Zidan Distributed Flooding-based Storage Algorithms for Large-Scale Wireless Sensor Networks Communications,
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
A Remote Code Update Mechanism for Wireless Sensor Networks Thanos Stathopoulos, John Heidemann and Deborah Estrin CEG 790 Presentation By: Trevor Smith.
Communication Paradigm for Sensor Networks Sensor Networks Sensor Networks Directed Diffusion Directed Diffusion SPIN SPIN Ishan Banerjee
REED: Robust, Efficient Filtering and Event Detection in Sensor Networks Daniel Abadi, Samuel Madden, Wolfgang Lindner MIT United States VLDB 2005.
1 REED: Robust, Efficient Filtering and Event Detection in Sensor Networks Daniel Abadi, Samuel Madden, Wolfgang Lindner MIT United States VLDB 2005.
Energy and Latency Control in Low Duty Cycle MAC Protocols Yuan Li, Wei Ye, John Heidemann Information Sciences Institute, University of Southern California.
Data Collection and Dissemination. Learning Objectives Understand Trickle – an data dissemination protocol for WSNs Understand data collection protocols.
Efficient Energy Management Protocol for Target Tracking Sensor Networks X. Du, F. Lin Department of Computer Science North Dakota State University Fargo,
Network Coding Data Collecting Mechanism based on Prioritized Degree Distribution in Wireless Sensor Network Wei Zhang, Xianghua Xu, Qinchao Zhang, Jian.
1 Reprogramming/Re-tasking in Wireless Sensor Networks Part of slides are from Jonathon Hui, David A. Olsen and Jaein Jeong.
Presenter - Bob Kinicki Internet of Things Fall 2015
Reliable Multi-hop Firmware Upload Protocol for mica2 motes. CSE 534 Advanced Networks Dmitri Lusnikov Fall 2004.
An Energy-Efficient MAC Protocol for Wireless Sensor Networks Speaker: hsiwei Wei Ye, John Heidemann and Deborah Estrin. IEEE INFOCOM 2002 Page
1 Presented by Jing Sun Computer Science and Engineering Department University of Conneticut.
A Few Random IoT Thoughts PEDS Seminar PEDS Seminar November 23, 2015 November 23, 2015.
CS541 Advanced Networking 1 Contention-based MAC Protocol for Wireless Sensor Networks Neil Tang 4/20/2009.
RBP: Robust Broadcast Propagation in Wireless Networks Fred Stann, John Heidemann, Rajesh Shroff, Muhammad Zaki Murtaza USC/ISI In SenSys 2006.
TreeCast: A Stateless Addressing and Routing Architecture for Sensor Networks Santashil PalChaudhuri, Shu Du, Ami K. Saha, and David B. Johnson Department.
REED : Robust, Efficient Filtering and Event Detection in Sensor Network Daniel J. Abadi, Samuel Madden, Wolfgang Lindner Proceedings of the 31st VLDB.
On Mobile Sink Node for Target Tracking in Wireless Sensor Networks Thanh Hai Trinh and Hee Yong Youn Pervasive Computing and Communications Workshops(PerComW'07)
SPIN: Sensor Protocols for Information via Negotiation
MAC Protocols for Sensor Networks
A Cluster-based Routing Protocol for Mobile Ad hoc Networks
2010 IEEE Global Telecommunications Conference (GLOBECOM 2010)
Introduction to Wireless Sensor Networks
Packet Leashes: Defense Against Wormhole Attacks
Chapter 25: Advanced Data Types and New Applications
Data Collection and Dissemination
Energy-Efficient Communication Protocol for Wireless Microsensor Networks by Wendi Rabiner Heinzelman, Anantha Chandrakasan, and Hari Balakrishnan Presented.
Distributed Energy Efficient Clustering (DEEC) Routing Protocol
Introduction to Wireless Sensor Networks
Net 435: Wireless sensor network (WSN)
Networks and Communication Systems Department
Dynamic Routing and OSPF
Data Collection and Dissemination
Investigating Mac Power Consumption in Wireless Sensor Network
REED : Robust, Efficient Filtering and Event Detection
Protocols.
Adaptive Topology Control for Ad-hoc Sensor Networks
Protocols.
Presentation transcript:

Trickle: Code Propagation and Maintenance Philip Levis UC Berkeley Neil Patel UC Berkeley David Culler UC Berkeley Scott Shenker UC Berkeley ICSI

Retasking a Sensor Net Long lifetimes require retasking Spectrum of retasking mechanisms Binary images (MOAP, XnP, Deluge) High-level virtual programs (Maté, TinyDB) Parameter setting (Attribute, Global) Install on every node Packet loss and transient disconnection Periodically check that everyone has the right code (advertise) TinyDB tuples embed query ID NEST Retreat, Jan 2004

Propagating Can Be Costly, Binaries: 10-60KB Virtual programs: 20-400B Parameters: 8-30B To every node in a large, multihop network… NEST Retreat, Jan 2004

Knowing When Is Costlier Periodically checking that everyone has the right code (advertisements) can cost more than the code itself. 64KB of data: ~1 packet/minute for a day 400B of data: ~1 packet/hour for a day 20B: one packet! NEST Retreat, Jan 2004

Problem Statement The first step is to detect when nodes need updates (continuous process) When there is no new code Maintenance cost should approach zero When there is new code Propagation should be rapid The long lifetimes of these systems mean that users need a way to reprogram them. However, motes are hard to reach, hard to find and numerous. We therefore need to be able to transmit new code into a deployment over a network. However, the lifetime requirements of these systems enforce strict energy budgets. Although we want new code to propagate rapidly into a network, the cost of maintaining a consistent code image must be very low. The loss observed in these networks means that simply propagating code once is insufficient. Transient loss that temporarily disconnects a network should not prevent the network from reprogramming when it reconnects. NEST Retreat, Jan 2004

Relation to Deluge, SPIN, etc. When do you advertise code? How do you suppress control messages? Not a dissemination protocol NEST Retreat, Jan 2004

Solution: Trickle Simple, “polite gossip” algorithm “Every once in a while, broadcast what code you have, unless you’ve heard some other nodes broadcast the same thing.” Behavior (simulation and deployment): Scalability: thousand-fold density changes Maintenance: a few sends per hour Propagation: less than a minute NEST Retreat, Jan 2004

Outline Introduction Trickle algorithm Maintenance Propagation Conclusion NEST Retreat, Jan 2004

Trickle Assumptions Wireless broadcast medium Concise, comparable metadata Given A and B, know which has newer code NEST Retreat, Jan 2004

Idea: Communication As long as each mote communicates with one other, needed updates will be detected In a single cell, one transmission will detect all needed updates Communication is reception or transmission Maintain a communication rate: (receptions + transmissions) <= k NEST Retreat, Jan 2004

Trickle Algorithm Time interval of length t Redundancy constant k (e.g., 1, 2) Pick a time t from [0, t] Maintain a counter c, initialized to zero At time t, broadcast code metadata if c < k Increment c when you hear identical metadata to your own At end of t, pick a new t NEST Retreat, Jan 2004

Example Trickle Execution 1 2 3 t time transmission suppressed transmission reception NEST Retreat, Jan 2004

Example Trickle Execution 1 t1a 2 3 t time transmission suppressed transmission reception NEST Retreat, Jan 2004

Example Trickle Execution 1 t1a 2 1 3 t time transmission suppressed transmission reception NEST Retreat, Jan 2004

Example Trickle Execution 1 t1a 2 1 3 t3a t time transmission suppressed transmission reception NEST Retreat, Jan 2004

Example Trickle Execution 1 t1a 2 2 3 t3a t time transmission suppressed transmission reception NEST Retreat, Jan 2004

Example Trickle Execution 1 t1a 2 2 t2a 3 t3a t time transmission suppressed transmission reception NEST Retreat, Jan 2004

Example Trickle Execution 1 t1a 2 t2a 3 t3a t time transmission suppressed transmission reception NEST Retreat, Jan 2004

Example Trickle Execution 1 1 t1a 2 t2a t2b 3 1 t3a t time transmission suppressed transmission reception NEST Retreat, Jan 2004

Example Trickle Execution 1 1 t1a 2 t2a t2b 3 1 t3a t3b t time transmission suppressed transmission reception NEST Retreat, Jan 2004

Example Trickle Execution 1 1 t1a t1b 2 t2a t2b 3 1 t3a t3b t time transmission suppressed transmission reception NEST Retreat, Jan 2004

Outline Problem statement Trickle algorithm Maintenance Propagation Conclusion NEST Retreat, Jan 2004

Maintenance Minimize maintenance cost (transmissions) when there is no new code Keep as close to k as possible Start with three assumptions, relax each Lossless network Perfect synchronization Single-hop NEST Retreat, Jan 2004

Ideal Case k transmissions per interval First k nodes to transmit suppress all others Independent of density NEST Retreat, Jan 2004

Loss NEST Retreat, Jan 2004

Logarithmic Behavior of Loss Transmission increase is due to the probability that one node has not heard n transmissions Example: 10% loss 1 in 10 nodes will not hear one transmission 1 in 100 nodes will not hear two transmissions 1 in 1000 nodes will not hear three, etc. Fundamental bound to maintaining per-interval communication NEST Retreat, Jan 2004

Synchronization NEST Retreat, Jan 2004

Short Listen Effect Some nodes don’t listen much (pick small t values) For example, B transmits three times: t A B C D Time transmission suppressed transmission reception NEST Retreat, Jan 2004

Solution Add a listening period: pick t from [0.5t, t] Listen-only period NEST Retreat, Jan 2004

Effect of Listen Period NEST Retreat, Jan 2004

Multi-Cell Case TOSSIM simulation Logarithmic scaling holds No synchronization, loss from empirical model Nodes uniformly distributed in 50’x50’ area Logarithmic scaling holds NEST Retreat, Jan 2004

Empirical Validation Redundancy: Maté VM implementation (transmissions + receptions) Redundancy: Maté VM implementation - k intervals NEST Retreat, Jan 2004

Outline Problem statement Trickle algorithm Maintenance Propagation Conclusion NEST Retreat, Jan 2004

Choosing Intervals Large interval: low cost, slow to discover Small interval: high cost, quick to discover When there’s new gossip, talk more When there’s nothing new, talk less NEST Retreat, Jan 2004

Speeding Propagation Adjust t: tl, th When t expires, double t up to th When you hear newer metadata, set t to tl When you hear newer code, set t to tl When you hear older metadata, send an update NEST Retreat, Jan 2004

Rate Change Illustration Hear Newer Metadata 2tl th tl th th 2 Time NEST Retreat, Jan 2004

Simulated Propagation k=1, tl=1 second, th=1 minute NEST Retreat, Jan 2004

Empirical Propagation Deployed 19 nodes in office setting Instrumented nodes for accurate time measurements Introduce new code, log installation times k=1, tl=1 second, th=1 minute 40 test runs NEST Retreat, Jan 2004

Network Layout NEST Retreat, Jan 2004

Empirical Results NEST Retreat, Jan 2004

Changing th to 20 minutes k=1 NEST Retreat, Jan 2004

Conclusions Trickle efficiency scales logarithmically with density Can obtain rapid propagation with low maintenance At most 3 sends/hour, propagates in 30 seconds Uses beyond code propagation Changes to data such as routing tables E.g., predicates can scope distance Further examination of tl, th and k needed NEST Retreat, Jan 2004

Questions Tech report available in back NEST Retreat, Jan 2004

NEST Retreat, Jan 2004

NEST Retreat, Jan 2004

NEST Retreat, Jan 2004