Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/1062689.1062724acmconferencesArticle/Chapter ViewAbstractPublication PagesmobihocConference Proceedingsconference-collections
Article

Reliable bursty convergecast in wireless sensor networks

Published: 25 May 2005 Publication History

Abstract

We address the challenges of bursty convergecast in multi-hop wireless sensor networks, where a large burst of packets from different locations needs to be transported reliably and in real-time to a base station. Via experiments on a 49 MICA2 mote sensor network using a realistic traffic trace, we determine the primary issues in bursty convergecast, and accordingly design a protocol, RBC (for Reliable Bursty Convergecast), to address these issues: To improve channel utilization and to reduce ack-loss, we design a window-less block acknowledgment scheme that guarantees continuous packet forwarding and replicates the acknowledgment for a packet; to alleviate retransmission-incurred channel contention, we introduce differentiated contention control. Moreover, we design mechanisms to handle varying ack-delay and to reduce delay in timer-based re-transmissions. We evaluate RBC, again via experiments, and show that compared to a commonly used implicit-ack scheme, RBC doubles packet delivery ratio and reduces end-to-end delay by an order of magnitude, as a result of which RBC achieves a close-to-optimal goodput.

References

[1]
Crossbow technology inc., http://www.xbow.com.
[2]
Exscal. http://www.cse.ohio-state.edu/exscal.
[3]
Wireless embedded systems. http://webs.cs.berkeley.edu.
[4]
A Lites event traffic trace. http://www.cse.ohio-state.edu/~zhangho/publications/Lites-trace.txt, 2003.
[5]
A. Arora and et al. A Line in the Sand: A wireless sensor network for target detection, classification, and tracking. Computer Networks (Elsevier), 46(5), 2004.
[6]
G. Brown, M. Gouda, and R. Miller. Block acknowledgment: Redesigning the window protocol. In ACM SIGCOMM, pages 128--134, 1989.
[7]
Y.-R. Choi, M. G. Gouda, H. Zhang, and A. Arora. Routing on a Logical Grid in Sensor Networks. Technical Report TR04-49, Department of Computer Sciences, The University of Texas at Austin (http://www.cse.ohio-state.edu/~zhangho/publications/lgr.pdf), 2004.
[8]
C. T. Ee and R. Bajcsy. Congestion control and fairness for many-to-one routing in sensor networks. In ACM SenSys, pages 134--147, 2004.
[9]
B. Hull, K. Jamieson, and H. Balakrishnan. Mitigating congestion in wireless sensor networks. In ACM SenSys, pages 134--147, 2004.
[10]
V. Jacobson. Congestion avoidance and control. In ACM SIGCOMM, pages 314--329, 1988.
[11]
J. Li, C. Blake, D. D. Couto, H. Lee, and R. Morris. Capacity of ad hoc wireless networks. In ACM MobiCom, pages 61--69, 2001.
[12]
M. Maroti. The directed flood routing framework. In Technical report, Vanderbilt University, ISIS-04-502, 2004.
[13]
J. Polatre, J. Hill, and D. Culler. Versatile low power media access for wireless sensor networks. In ACM SenSys, 2004.
[14]
Y. Sankarasubramaniam, O. Akan, and I. Akyildiz. ESRT: Event-to-sink reliable transport in wireless sensor networks. In ACM MobiHoc, pages 177--188, 2003.
[15]
P. Sinha, N. Venkitaraman, R. Sivakumar, and V. Bharghavan. WTCP: a reliable transport protocol for wireless wide-area networks. In ACM MobiCom, pages 231--241, 1999.
[16]
F. Stann and J. Heidemann. RMST: Reliable data transport in sensor networks. In IEEE SNPA, pages 102--112, 2003.
[17]
K. Sundaresan, V. Anantharaman, H. Hsieh, and R. Sivakumar. ATP: A reliable transport protocol for ad-hoc networks. In ACM MobiHoc, pages 64--75, 2003.
[18]
C. Wan, A. Campbell, and L. Krishnamurthy. PSFQ: A reliable transport protocol for wireless sensor networks. In ACM WSNA, pages 1--11, 2002.
[19]
C. Wan, S. Eisenman, and A. Campbell. CODA: Congestion detection and avoidance in sensor networks. In ACM SenSys, pages 266--279, 2003.
[20]
A. Woo, T. Tong, and D. Culler. Taming the underlying challenges of reliable multi-hop routing in sensor networks. In ACM SenSys, pages 14--27, 2003.
[21]
W. Ye, J. Heidemann, and D. Estrin. An energy-efficient MAC protocol for wireless sensor networks. In IEEE InfoCom, pages 1567--1576, 2002.
[22]
L. Zhang. Why TCP timers don't work well. In ACM SIGCOMM, pages 397--405, 1986.
[23]
J. Zhao and R. Govindan. Understanding packet delivery performance in dense wireless sensor networks. In ACM SenSys, pages 1--13, 2003.Crossbow technology inc., http://www.xbow.com.

Cited By

View all
  • (2020)Performant TCP for low-power wireless networksProceedings of the 17th Usenix Conference on Networked Systems Design and Implementation10.5555/3388242.3388307(911-932)Online publication date: 25-Feb-2020
  • (2018)Characterizing Data Deliverability of Greedy Routing in Wireless Sensor NetworksIEEE Transactions on Mobile Computing10.1109/TMC.2017.273700517:3(543-559)Online publication date: 1-Mar-2018
  • (2018)Scalable and Adaptive Polling Protocol for ConcurrentWireless Sensor Data Flows2018 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops)10.1109/PERCOMW.2018.8480129(409-414)Online publication date: Mar-2018
  • Show More Cited By

Index Terms

  1. Reliable bursty convergecast in wireless sensor networks

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    MobiHoc '05: Proceedings of the 6th ACM international symposium on Mobile ad hoc networking and computing
    May 2005
    470 pages
    ISBN:1595930043
    DOI:10.1145/1062689
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 25 May 2005

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. bursty convergecast
    2. contention control
    3. error control
    4. reliable and real-time transport
    5. wireless sensor network

    Qualifiers

    • Article

    Conference

    MobiHoc05
    Sponsor:

    Acceptance Rates

    Overall Acceptance Rate 296 of 1,843 submissions, 16%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)15
    • Downloads (Last 6 weeks)1
    Reflects downloads up to 30 Aug 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2020)Performant TCP for low-power wireless networksProceedings of the 17th Usenix Conference on Networked Systems Design and Implementation10.5555/3388242.3388307(911-932)Online publication date: 25-Feb-2020
    • (2018)Characterizing Data Deliverability of Greedy Routing in Wireless Sensor NetworksIEEE Transactions on Mobile Computing10.1109/TMC.2017.273700517:3(543-559)Online publication date: 1-Mar-2018
    • (2018)Scalable and Adaptive Polling Protocol for ConcurrentWireless Sensor Data Flows2018 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops)10.1109/PERCOMW.2018.8480129(409-414)Online publication date: Mar-2018
    • (2018)Simulation of Wireless Networks Based on Artificial Intelligence Approaches2018 Global Smart Industry Conference (GloSIC)10.1109/GloSIC.2018.8570063(1-6)Online publication date: Nov-2018
    • (2017)A correlation-based coverage-aware and energy-balanced probabilistic flooding algorithmInternational Journal of Sensor Networks10.1504/IJSNET.2017.08789325:4(207-217)Online publication date: 1-Jan-2017
    • (2016)Reliability Evaluation Methods for Resilient Wireless Sensor NetworksMobile Computing and Wireless Networks10.4018/978-1-4666-8751-6.ch057(1306-1331)Online publication date: 2016
    • (2016)Rapid Low-Cost Virtual Human Bootstrapping via the CrowdACM Transactions on Intelligent Systems and Technology10.1145/28973667:4(1-20)Online publication date: 21-Mar-2016
    • (2016)Leveraging Human Computations to Improve Schematization of Spatial Relations from ImageryACM Transactions on Intelligent Systems and Technology10.1145/28730657:4(1-21)Online publication date: 31-Mar-2016
    • (2016)CITY FEEDACM Transactions on Intelligent Systems and Technology10.1145/28730647:4(1-25)Online publication date: 31-Mar-2016
    • (2016)A Game-Theory Approach for Effective Crowdsource-Based Relevance AssessmentACM Transactions on Intelligent Systems and Technology10.1145/28730637:4(1-25)Online publication date: 31-Mar-2016
    • Show More Cited By

    View Options

    Get Access

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media