Epidemic Algorithms by David Kjerrumgaard Introduction A new class of networked systems is emerging that involve very large numbers of small, low-powered,

Slides:



Advertisements
Similar presentations
Energy-Efficient Computing for Wildlife Tracking: Design Tradeoffs and Early Experiences with ZebraNet Presented by Eric Arnaud Makita
Advertisements

Maximum Battery Life Routing to Support Ubiquitous Mobile Computing in Wireless Ad Hoc Networks By C. K. Toh.
Presented By- Sayandeep Mitra TH SEMESTER Sensor Networks(CS 704D) Assignment.
A Transmission Control Scheme for Media Access in Sensor Networks Lee, dooyoung AN lab A.Woo, D.E. Culler Mobicom’01.
Network Layer Routing Issues (I). Infrastructure vs. multi-hop Infrastructure networks: Infrastructure networks: ◦ One or several Access-Points (AP) connected.
CSLI 5350G - Pervasive and Mobile Computing Week 3 - Paper Presentation “RPB-MD: Providing robust message dissemination for vehicular ad hoc networks”
Improving TCP Performance over Mobile Ad Hoc Networks by Exploiting Cross- Layer Information Awareness Xin Yu Department Of Computer Science New York University,
PERFORMANCE MEASUREMENTS OF WIRELESS SENSOR NETWORKS Gizem ERDOĞAN.
A Novel Cluster-based Routing Protocol with Extending Lifetime for Wireless Sensor Networks Slides by Alex Papadimitriou.
Monday, June 01, 2015 ARRIVE: Algorithm for Robust Routing in Volatile Environments 1 NEST Retreat, Lake Tahoe, June
1 Complexity of Network Synchronization Raeda Naamnieh.
An Analysis of the Optimum Node Density for Ad hoc Mobile Networks Elizabeth M. Royer, P. Michael Melliar-Smith and Louise E. Moser Presented by Aki Happonen.
Dynamic Tuning of the IEEE Protocol to Achieve a Theoretical Throughput Limit Frederico Calì, Marco Conti, and Enrico Gregori IEEE/ACM TRANSACTIONS.
Radio Propagation Spring 07 CS 527 – Lecture 3. Overview Motivation Block diagram of a radio Signal Propagation  Large scale path loss  Small scale.
PEDS September 18, 2006 Power Efficient System for Sensor Networks1 S. Coleri, A. Puri and P. Varaiya UC Berkeley Eighth IEEE International Symposium on.
KUASAR An efficient and light-weight protocol for routing and data dissemination in ad hoc wireless sensor networks David Andrews Aditya Mandapaka Joe.
More routing protocols Alec Woo June 18 th, 2002.
Network Dynamics Deepak Ganesan, Alec Woo, Bhaskar Krishnamachari.
He Huang Introduction:The Flooding Time Synchronization Protocol.
Self-Management in Chaotic Wireless Deployments A. Akella, G. Judd, S. Seshan, P. Steenkiste Presentation by: Zhichun Li.
NCKU CSIE CIAL1 Principles and Protocols for Power Control in Wireless Ad Hoc Networks Authors: Vikas Kawadia and P. R. Kumar Publisher: IEEE JOURNAL ON.
TCP over ad hoc networks Ad Hoc Networks will have to be interfaced with the Internet. As such backward compatibility is a big issue. One might expect.
Taming the Underlying Challenges of Reliable Multihop Routing in Sensor Networks.
Online Data Gathering for Maximizing Network Lifetime in Sensor Networks IEEE transactions on Mobile Computing Weifa Liang, YuZhen Liu.
Milano, 4-5 Ottobre 2004 IS-MANET The Virtual Routing Protocol for Ad Hoc Networks ISTI – CNR S. Chessa.
Adaptive Self-Configuring Sensor Network Topologies ns-2 simulation & performance analysis Zhenghua Fu Ben Greenstein Petros Zerfos.
1 Internet Networking Spring 2006 Tutorial 3 Ad-hoc networks TBRPF (based on IETF tutorials on TBRPF)
A Cross Layer Approach for Power Heterogeneous Ad hoc Networks Vasudev Shah and Srikanth Krishnamurthy ICDCS 2005.
Beacon Vector Routing: Scalable Point-to-Point Routing in Wireless Sensornets.
A Transmission Control Scheme for Media Access in Sensor Networks Alec Woo, David Culler (University of California, Berkeley) Special thanks to Wei Ye.
8/7/2015 Mobile Ad hoc Networks COE 549 Routing Protocols II Tarek Sheltami KFUPM CCSE COE 1.
1 Algorithms for Bandwidth Efficient Multicast Routing in Multi-channel Multi-radio Wireless Mesh Networks Hoang Lan Nguyen and Uyen Trang Nguyen Presenter:
Ad Hoc Wireless Routing COS 461: Computer Networks
The Zone Routing Protocol (ZRP)
RTS/CTS-Induced Congestion in Ad Hoc Wireless LANs Saikat Ray, Jeffrey B. Carruthers, and David Starobinski Department of Electrical and Computer Engineering.
Wireless Sensor Networks COE 499 Energy Aware Routing
Switching breaks up large collision domains into smaller ones Collision domain is a network segment with two or more devices sharing the same Introduction.
MARCH : A Medium Access Control Protocol For Multihop Wireless Ad Hoc Networks 성 백 동
Copyright: S.Krishnamurthy, UCR Power Controlled Medium Access Control in Wireless Networks – The story continues.
1/30 Energy-Efficient Forwarding Strategies for Geographic Routing in Lossy Wireless Sensor Networks Wireless and Sensor Network Seminar Dec 01, 2004.
Link Estimation, CTP and MultiHopLQI. Learning Objectives Understand the motivation of link estimation protocols – the time varying nature of a wireless.
ENERGY-EFFICIENT FORWARDING STRATEGIES FOR GEOGRAPHIC ROUTING in LOSSY WIRELESS SENSOR NETWORKS Presented by Prasad D. Karnik.
Demand Based Bandwidth Assignment MAC Protocol for Wireless LANs K.Murugan, B.Dushyanth, E.Gunasekaran S.Arivuthokai, RS.Bhuvaneswaran, S.Shanmugavel.
A Novel Multicast Routing Protocol for Mobile Ad Hoc Networks Zeyad M. Alfawaer, GuiWei Hua, and Noraziah Ahmed American Journal of Applied Sciences 4:
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 3 v3.0 Module 4 Switching Concepts.
REED: Robust, Efficient Filtering and Event Detection in Sensor Networks Daniel Abadi, Samuel Madden, Wolfgang Lindner MIT United States VLDB 2005.
1 REED: Robust, Efficient Filtering and Event Detection in Sensor Networks Daniel Abadi, Samuel Madden, Wolfgang Lindner MIT United States VLDB 2005.
REECH ME: Regional Energy Efficient Cluster Heads based on Maximum Energy Routing Protocol Prepared by: Arslan Haider. 1.
Probabilistic Coverage in Wireless Sensor Networks Authors : Nadeem Ahmed, Salil S. Kanhere, Sanjay Jha Presenter : Hyeon, Seung-Il.
SRL: A Bidirectional Abstraction for Unidirectional Ad Hoc Networks. Venugopalan Ramasubramanian Ranveer Chandra Daniel Mosse.
SenProbe: Path Capacity Estimation in Wireless Sensor Networks Tony Sun, Ling-Jyh Chen, Guang Yang M. Y. Sanadidi, Mario Gerla.
A Scalable Routing Protocol for Ad Hoc Networks Eric Arnaud Id:
An Empirical Study of Epidemic Algorithms in Large Scale Multihop Wireless Networks Authored by Deepak Ganesan, Bhaskar Krishnamachari, Alec Woo, David.
Tufts Wireless Laboratory School Of Engineering Tufts University Paper Review “An Energy Efficient Multipath Routing Protocol for Wireless Sensor Networks”,
a/b/g Networks Routing Herbert Rubens Slides taken from UIUC Wireless Networking Group.
Anish Arora Ohio State University Mikhail Nesterenko Kent State University Local Tolerance to Unbounded Byzantine Faults.
Ad Hoc On-Demand Distance Vector Routing (AODV) ietf
1 Ethernet CSE 3213 Fall February Introduction Rapid changes in technology designs Broader use of LANs New schemes for high-speed LANs High-speed.
1 Low Latency Multimedia Broadcast in Multi-Rate Wireless Meshes Chun Tung Chou, Archan Misra Proc. 1st IEEE Workshop on Wireless Mesh Networks (WIMESH),
On Mobile Sink Node for Target Tracking in Wireless Sensor Networks Thanh Hai Trinh and Hee Yong Youn Pervasive Computing and Communications Workshops(PerComW'07)
KAIS T Location-Aided Flooding: An Energy-Efficient Data Dissemination Protocol for Wireless Sensor Networks Harshavardhan Sabbineni and Krishnendu Chakrabarty.
Performance Comparison of Ad Hoc Network Routing Protocols Presented by Venkata Suresh Tamminiedi Computer Science Department Georgia State University.
VADD: Vehicle-Assisted Data Delivery in Vehicular Ad Hoc Networks Zhao, J.; Cao, G. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 鄭宇辰
MAC Protocols for Sensor Networks
MAC Protocols for Sensor Networks
Introduction to Wireless Sensor Networks
Wireless Sensor Network Architectures
High Throughput Route Selection in Multi-Rate Ad Hoc Wireless Networks
Protocols.
Protocols.
Presentation transcript:

Epidemic Algorithms by David Kjerrumgaard

Introduction A new class of networked systems is emerging that involve very large numbers of small, low-powered, wireless devices.A new class of networked systems is emerging that involve very large numbers of small, low-powered, wireless devices. The sheer number of devices involved in such networks as well as the resource constraints of the nodes in terms of energy, storage, and processing necessitate the development of extremely simple algorithms for discovery, routing, multicast, and aggregation.The sheer number of devices involved in such networks as well as the resource constraints of the nodes in terms of energy, storage, and processing necessitate the development of extremely simple algorithms for discovery, routing, multicast, and aggregation.

While these algorithms are easy to build, they often exhibit complex and unexpected behavior when they are utilized in real world scenarios; making them difficult to simulate accurately.While these algorithms are easy to build, they often exhibit complex and unexpected behavior when they are utilized in real world scenarios; making them difficult to simulate accurately. In their paper, Ganesan et. al., provide a wealth of detailed empirical data from a network involving over 150 such nodes.In their paper, Ganesan et. al., provide a wealth of detailed empirical data from a network involving over 150 such nodes. This data is intended to serve as the basis for algorithm design in the wireless space.This data is intended to serve as the basis for algorithm design in the wireless space.

Instrumentation in the experiment focused on various levels of the protocol stack in an effort to isolate the various factors influencing the global behavior of the system.Instrumentation in the experiment focused on various levels of the protocol stack in an effort to isolate the various factors influencing the global behavior of the system. At the Physical / Link Layer, they measuredAt the Physical / Link Layer, they measured –Packet Loss –Effective Communication Range –Link Asymmetry At the MAC Layer, they capturedAt the MAC Layer, they captured –Contentions –Collisions –Latency

At the Network / Application Layer the structure of the trees constructed was analyzed.At the Network / Application Layer the structure of the trees constructed was analyzed.

Epidemic Algorithms Refers to network protocols that allow rapid dissemination of information from a source through purely local interactions.Refers to network protocols that allow rapid dissemination of information from a source through purely local interactions. Messages initiated from the source are rebroadcast by neighboring nodes, extending outward hop by hop until the entire network is reached.Messages initiated from the source are rebroadcast by neighboring nodes, extending outward hop by hop until the entire network is reached.

The following logic depicts the schema for message handling in a generalized epidemic protocol:The following logic depicts the schema for message handling in a generalized epidemic protocol: Let S be local state of node and R a random number. If message M i, is received for the first time, then Take local action based on M i : S  f 1 (M i,S). Compose message M i ’ = f 2 (M i,S). Make Boolean retransmit decision D = f 3 (S,R). if D is true, then Transmit M i ’ to all neighbors. Flooding, in which the nodes always retransmit the message upon reception is the simplest example of an epidemic algorithm.Flooding, in which the nodes always retransmit the message upon reception is the simplest example of an epidemic algorithm.

More sophisticated forms of flooding algorithms exist, including probabilistic, counter-based, distance-based, and cluster-based techniques that seek to minimize the amount of redundant packet transmissions.More sophisticated forms of flooding algorithms exist, including probabilistic, counter-based, distance-based, and cluster-based techniques that seek to minimize the amount of redundant packet transmissions. This study employed a simple retransmit flooding protocol, which under ideal conditions would ripple outward uniformly from the the source.This study employed a simple retransmit flooding protocol, which under ideal conditions would ripple outward uniformly from the the source. When a node first receives the message, it immediately rebroadcasts once, and squelches further retransmissions.When a node first receives the message, it immediately rebroadcasts once, and squelches further retransmissions.

Message Flooding

Flooding Anomalies Several indications of non-uniform flood propagation were observed during this study including:Several indications of non-uniform flood propagation were observed during this study including: Backward Links: Links formed between nodes that extend backward geographically toward the source.Backward Links: Links formed between nodes that extend backward geographically toward the source. Stragglers: Nodes that missed the message entirely even though neighboring nodes did receive the message.Stragglers: Nodes that missed the message entirely even though neighboring nodes did receive the message. Long Links: Links that were formed when the message was received over a larger distance, usually exceeding many hops.Long Links: Links that were formed when the message was received over a larger distance, usually exceeding many hops. Clustering: Most nodes in the tree had few decedents, while a few nodes had many.Clustering: Most nodes in the tree had few decedents, while a few nodes had many.

Backward Link Long Link StragglerClustering

Related Work Prior experimental studies in this area have tended to focus on routing in wireless Ad Hoc networks without addressing scaling due to a lack of infrastructure.Prior experimental studies in this area have tended to focus on routing in wireless Ad Hoc networks without addressing scaling due to a lack of infrastructure. These studies were comprised of fewer than a dozen nodes and therefore did not address issues of scale.These studies were comprised of fewer than a dozen nodes and therefore did not address issues of scale.

The other tool used in analyzing the behavior of routing protocols in large-scale multi-hop wireless networks is simulation.The other tool used in analyzing the behavior of routing protocols in large-scale multi-hop wireless networks is simulation. The results of such studies were discounted due in large part to the difficulty in simulating physical a link layer characteristics in a accurate fashion.The results of such studies were discounted due in large part to the difficulty in simulating physical a link layer characteristics in a accurate fashion. Ultimately, a protocol’s performance must be validated in the real world.Ultimately, a protocol’s performance must be validated in the real world.

Experimental Platform The study employed over 175 identically configured Rene motes equipped with: –4 MHz Amtel processor –8 Kb of programming memory –512B of data memory –916 MHz single-channel, low-power radio –10 Kbps of raw bandwidth –Uniform antenna length & orientation (both unspecified) –TinyOS as the runtime system –Fresh AA batteries

Each node uses a variation of the Carrier Sense Multiple Access (CSMA) protocol with a random backoff duration between 6ms and 100ms During the backoff period, the radio is powered off in order to conserve energy, effectively blocking all communication during this time. The MAC protocol keeps trying to deliver packets until a clear channel is found. (No dropped packets)

Testing Methodology  Two separate sets of experiments were conducted for this study. The first set focused on the characteristics of links among all nodes in a large test bed, while the second set focused on the dynamics of the flooding.

Experiment # 1  169 nodes were arranged in a 13x13 grid on an open parking structure, with a grid spacing of 2 feet.  The goal of this experiment was to map the connectivity characteristics between all nodes at 16 different radio transmit power settings between 60  W and 72  W.

 The base station periodically issued commands to all nodes to control the experiment, this ensured that only one node would transmit at a time thereby eliminating the possibility of collisions.  The receiving nodes transmitted in sequence in response to the commands sent by the base station.  At each power setting, each node was instructed to transmit 20 packets, 100 ms apart. Thus, a total of 54,000 ( 16 x 20 x 169 ) messages were sent during the four hour test.

 Upon receipt of a message, the following information was extracted from the packet and logged in the receiver’s data memory:  Transmitter ID ( 1 – 169 )  Sequence number of the message ( )  Transmit power setting ( 60 – 72 )

Analysis of Experiment # 1  The analysis from the first set of experimental data focused on the physical and link layers.  The goals of the analysis were:  Explore packet loss statistics over distance.  Attempt to quantitatively define and measure the effective communication radius at each transmit power setting in a real-world scenario.  Establish a definition of what constitutes a bi- directional link and an asymmetric link, and measure the effects of each link type on communication.

Packet Loss Statistics  For this study, packets that fail to pass CRC checking are considered lost.  During the analysis they discovered that the distribution of packet loss over distance was non- uniform. This observation is in stark contrast to the uniform, simple binary relation on distance used in large-scale simulation studies, which model signal propagation using the function 1/r  where  > 2.  The expected packet loss distribution:

The observed packet loss distribution

Radio Range  Often described in terms of signal strength, however from an algorithmic standpoint, successful communication is what matters.  During the analysis they discovered that the decay of packet loss with respect to distance does not experience the polynomial falloff expected based on the signal propagation function 1/r  where  > 2. This was especially true at larger transmit power settings.

 During the analysis they discovered that the throughput never reached 100%, even at short distances from the transmitter. They attributed this phenomenon to two factors:  Increased fading rate due to deployment on the ground.  Insufficient signal processing and forward error correction due to the limited computational and energy resources available on this computing platform.

Measuring the Connectivity Radius  Conceptually, the connectivity radius is thought of in terms of a circular cell. This approach simplifies algorithm analysis and allows a geometric approach.  We have already seen that this conceptualization does not fit the empirical data collected from this study. However, packet loss does decrease monotonically with distance.

 The definition of connectivity radius is typically based on a packet loss threshold, which, in turn, is based on the ratio of “good links” to “bad links”  Good Links: Those communication links in which we can use forward error correction (FEC) and other techniques to improve the raw packet throughput to adequate levels. The packet reception probability of such a link is typically above 65%.  Bad Links : Those communication links in which we the use of forward error correction (FEC) and other techniques cannot be employed to boost the throughput to acceptable levels. The packet reception probability of such a link is typically below 25%.

 Given the previous definitions, we can define the connectivity radius of a node N to be the radius R of the smallest circle that encompasses 75% of the nodes having a good link with N. During the analysis they observed a linear variation of the connectivity radius with the transmit power setting on the moteDuring the analysis they observed a linear variation of the connectivity radius with the transmit power setting on the mote.

Measure the Effects of Asymmetric and Bi-directional Links on Communication  Asymmetric Links: Those communication links that are “good” in one direction and “bad” in the other.  Bi-directional Links: Those communication links that are “good” in both directions.

 While asymmetric links arise relatively infrequently in spare wireless networks, they are very common within a field of low-power wireless nodes. The distribution of asymmetric links over the entire test network is shown below.The distribution of asymmetric links over the entire test network is shown below.

 The analysis of the data collected during the first experiment reveals that for the range of transmit power settings studied, approximately 5-15% of all links are asymmetric with the percentage increasing inversely with the power setting.  At short distances from the transmitter, a negligible percentage of links are asymmetric, but this percentage grows significantly with increasing distance, especially at lower power settings.  The distribution of bi-directional and asymmetric links over distance is shown below:

Experiment # 2  156 nodes were arranged in a 13x12 grid on an open parking structure, with a grid spacing of 2 feet.  The base station was placed in the middle of the base of the grid and initiated flooding periodically, with each period lasting long enough to allow the flood to settle down.  Each receiving node rebroadcast the message immediately upon receipt of the flood message and then squelches all further broadcasts.

 Eight different transmit power settings were studied and 10 non-overlapping floods were issued at each of these settings.  Upon receipt of a message, the following information was extracted from the packet and logged in the receiver’s data memory:  Transmitter ID ( 1 – 156 ), which was used to reconstruct the propagation tree.  Two locally generated timestamps, each with a granularity of 16  s.  The first timestamp recorded the total amount of time that a message was stored on a node before being retransmitted.  The second timestamp recorded the interval for which the node was in backoff mode.

Analysis of Experiment # 2  The analysis from the second set of experimental data focused on the MAC and application layers.  The goals of the analysis were:  Capture different aspects of the message propagation including; maximum backoff interval, reception latency, settling time, useless broadcasts, and collisions.  Analyze the routing tree construction of the epidemic algorithm.

Medium Access Layer Analysis  Maximum Backoff Interval  A metric that captures the contention level within an interference cell, is the maximum backoff interval, which reflects the time till contention subsides in each cell.  The distribution of backoff intervals in the network indicates the extent of contention that each node perceives in the channel.  As transmit power increases, contention grows as a result of interference cell growth. As contention increases, nodes are forced to backoff for increasingly longer intervals as shown below:As contention increases, nodes are forced to backoff for increasingly longer intervals as shown below:

 During the analysis they observed that the transmit power setting and the 95% backoff interval threshold were directly proportional to one another.  Insert Table 3 here

Reception Latency  Defined to be the total amount of time required by nodes in the network to receive an epidemic broadcast packet.  As expected, for higher transmit power settings the reception latency decreased proportionally with the network diameter. An interesting observation is that a significant fraction of the total propagation time was taken to reach the last few nodes in each plot.An interesting observation is that a significant fraction of the total propagation time was taken to reach the last few nodes in each plot.  The following figure shows the relationship between the reception latency and the network diameter, which refers to the maximum number of hops from the source to any node in the network.

Settling Time  Defined to be the time taken for delivery of a single packet flood throughout the entire network, and is equivalent to the reception latency plus the maximum backoff interval.  The settling time is bounded as shown below: Max( MaxBackoffInterval, Reception Latency)  Settling Time  MaxBackoffInterval + Reception Latency

 At low transmit power settings, the settling time is closer to the reception latency than the maximum backoff interval. This suggests that the flood propagation delay has a more significant impact than the time taken for broadcasts to subside within the interference cells.  As the transmit power is increased, the settling time moves closer to the maximum backoff interval, suggesting that contention within each interference cell becomes the dominate factor. The relationship between settling time and reception latency is shown in the following diagrams.The relationship between settling time and reception latency is shown in the following diagrams.

Useless Broadcasts  Defined to be the percentage of rebroadcasts that deliver a message only to nodes that have already received one. Typical causes for such broadcasts include:  All neighbors have already received the message  The rebroadcast suffers packet loss or collision  Analysis of the experimental data revealed that at higher transmit power settings, nodes in the network keep retransmitting the message long after 95% of the nodes already received it.  Conversely, the lowest transmit power setting examined had only a 60% useless broadcast rate.

Collisions  During the analysis they observed that for all power settings, the time required for all nodes to receive the flood is nearly identical.  At very high transmit power, the last 5% of the nodes take as much time to receive their packets as the first 95%. This phenomenon can be attributed to stragglers and backward links.  In broadcast-style epidemic transmission, a packet does not have an intended recipient, so CSMA without RTS/CTS is used. However, we are able to combine the global ordering the packet transmissions and link layer estimates of the communication cell to infer the impact of collisions.  The following charts show the relation between the number of colliding transmitters, stragglers, and backward links.

 Timestamps generated at the MAC level were used to estimate the number of colliding nodes. Using the connectivity radius established in the first experiment allowed them to detect intersecting communication cells for each set of colliding transmitters.  This provides an estimate for the number of nodes that should receive the packet, but do not as a result of collisions.  Collisions result in the creation of stragglers, which miss the propagation in the early stage of the flood and eventually form backward links from a later reception.  At higher transmit power settings, communication cells grow, resulting in a larger number of stragglers, and consequently backward links.

Network and Application Layer Analysis  The reverse routing tree was constructed from the information collected at the Network layer during the experiment. Analysis of the reverse routing tree has greater relevance in the majority of algorithms developed for this computing platform, such as:  Data gathering applications  Reactive mobile ad hoc routing algorithms with caching  Multicast algorithms

 Link Layer analysis has shown that long links have a greater potential for asymmetry and therefore are less appropriate for use as the reverse path to draw data back to the source.  Similarly, backward links in the tree are sub-optimal since data flows away from the base station rather than towards it on the reverse path.  The following figure depicts the various factors affecting tree structures

 The parent selection mechanism has a large role in influencing the tree structure. In fact, the opportunistic, earliest-first parent selection mechanism used in this study resulted in highly clustered trees, with most nodes being leaves and only a small number of parent nodes, each with a large number of children.  Large clusters were observed across all eight of the transmit power settings being studied and this behavior was exacerbated by the presence of long links for the following reason;  Nodes at the end of long links have a greater probability of seeing less interference and typically have many neighbors who have not received the flood packet.  Consequently, these nodes retransmit the packet faster due to an absence of any backoff interval, and reach more uncovered nodes, resulting in the highly clustered behavior observed in the study.

Key Observations & Recommendations  Much of the literature has assumed a circular disc model for the cell regions. The data gathered in this study implies that a probabilistic view of modeling is a more realistic approach.  The fact that asymmetry manifests itself more on long links is significant to many ad-hoc routing protocols that use shortest reverse hop-count as a method for setting up routing paths. These protocols naturally select links that are long in nature, thereby increasing the probability of selecting a poor reverse end-to-end route.  The empirical data from this study suggests that asymmetric links are indeed likely to be significant in large scale, multihop networks and robust protocol must deal appropriately with asymmetric links through mechanisms such as filtering.

 Reducing the transmission power in an epidemic broadcast reduces the number of useless broadcasts. Therefore, energy can be conserved by reducing the transmit power setting.  Rebroadcasts that are transmitted after a large backoff delay relative to the elapsed time are likely to be useless. Therefore, dropping these rebroadcasts if tight estimates of the reception latency are available to nodes can save energy.  In order to maximize throughput, it is useful to pipeline transmissions from the base-station, such that two successive transmissions are separated by the amount of time it takes to propagate two transmission cells.  Settling time gives a lower bound on achievable multicast throughput, of 1 / Settling time.

Implications on Algorithm Design  Simple protocols with very few states can exhibit unanticipated global complexity due to their interaction with the complex physical world.  Algorithm designs should use a probabilistic abstraction to model connectivity  Asymmetry is to be expected, and certain protocol choices may exacerbate this effect. Robustness to asymmetry is a crucial part of protocol design in these systems.