Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/1322263.1322271acmconferencesArticle/Chapter ViewAbstractPublication PagessensysConference Proceedingsconference-collections
Article

Visibility: a new metric for protocol design

Published: 06 November 2007 Publication History

Abstract

This paper proposes a new sensornet protocol design goal: visibility. Visibility into behaviors at the network level will simplify debugging and ease the development process. We argue that increasing visibility is the responsibility of the network protocols themselves, and not solely the responsibility of existing debugging tools. We describe a quantitative visibility metric to evaluate and compare protocols, where visibility is defined as the energy cost of diagnosing the cause of a behavior in a protocol. The design and evaluation of Pull Collection Protocol, a novel multi-hop collection protocol, is an example of how to design for visibility without sacrificing throughput or node-level fairness. We also describe our optimizations for an existing protocol, Deluge, to increase its visibility and efficiency.

References

[1]
A. Arora, P. Dutta, S. Bapat, V. Kulathumani, H. Zhang, V. Naik, V. Mittal, H. Cao, M. Demirbas, M. Gouda, Y. Choi, T. Herman, S. Kulkarni, U. Arumugam, M. Nesterenko, A. Vora, and M. Miyashita. A line in the sand: A wireless sensor network for target detection. Computer Networks (Elsevier), 46, 2004.
[2]
R. Beckwith, D. Teibel, and P. Bowen. Unwired wine: Sensor networks in vineyards. In Proceedings of IEEE Sensors, 2004.
[3]
P. Buonadonna, D. Gay, J. Hellerstein, W. Hong, and S. Madden. Task: Sensor network in a box. In Proceedings of the Second European Workshop on Wireless Sensor Networks (EWSN), 2005.
[4]
B. M. Cantrill, M. W. Shapiro, and A. H. Leventhal. Dynamic instrumentation of production systems. In Proceedings of the 6th Symposium on Operating Systems Design and Implementation, 2004.
[5]
J. Considine, F. Li, G. Kollios, and J. Byers. Approximate aggregation techniques for sensor databases. In Proceedings of the 20th International Conference on Data Engineering, 2004.
[6]
L. Girod, T. Stathopoulos, N. Ramanathan, J. Elson, D. Estrin, E. Osterweil, and T. Schoellhammer. A system for simulation, emulation, and deployment of heterogeneous sensor networks. In Proceedings of the Second ACM Conference On Embedded Networked Sensor Systems (SenSys), 2004.
[7]
T. He, S. Krishnamurthy, L. Luo, T. Yan, L. Gu, R. Stoleru, G. Zhou, Q. Cao, P. Vicaire, J. A. Stankovic, T. F. Abdelzaher, J. Hui, and B. Krogh. Vigilnet: An integrated sensor network system for energy-efficient surveillance. ACM Transactions on Sensor Networks (TOSN), 2006.
[8]
J. Hill, R. Szewczyk, A. Woo, S. Hollar, D. E. Culler, and K. S. J. Pister. System Architecture Directions for Networked Sensors. In Architectural Support for Programming Languages and Operating Systems, pages 93--104, 2000. TinyOS is available at http://webs.cs.berkeley.edu.
[9]
J. W. Hui and D. Culler. The dynamic behavior of a data dissemination protocol for network programming at scale. In Proceedings of the Second International Conferences on Embedded Network Sensor Systems (SenSys), 2004.
[10]
R. Jain, D. Chiu, and W. Hawe. A quantitative measure of fairness and discrimination for resource allocation in shared computer systems. Technical Report TR-301, DEC Research, September 1984.
[11]
P. Kimelman. personal communication, 2006.
[12]
L. Krishnamurthy, R. Adler, P. Buonadonna, J. Chhabra, M. Flanigan, N. Kushalnagar, L. Nachman, and M. Tarvis. Design and deployment of industrial sensor networks: Experiences from a semiconductor plant and the north sea. In Proceedings of the Third ACM Conference On Embedded Networked Sensor Systems (SenSys), 2005.
[13]
K. Langendoen, A. Baggio, and O. Visser. Murphy loves potatoes: Experiences from a pilot sensor network deployment in precision agriculture. In the Fourteenth Int. Workshop on Parallel and Distributed Real-Time Systems (WPDRTS), 2006.
[14]
P. Levis, N. Patel, D. Culler, and S. Shenker. Trickle: A self-regulating algorithm for code maintenance and propagation in wireless sensor networks. In First USENIX/ACM Symposium on Network Systems Design and Implementation (NSDI), 2004.
[15]
S. Nath, P. B. Gibbons, S. Seshan, and Z. R. Anderson. Synopsis diffusion for robust aggregation in sensor networks. In Proceedings of the Second ACM Conference On Embedded Networked Sensor Systems (SenSys), 2004.
[16]
J. R. Quinlan. C4.5: Programs for Machine Learning. Morgan Kaufmann Publishers Inc., San Francisco, CA, USA, 1993.
[17]
N. Ramanathan, K. Chang, R. Kapur, L. Girod, E. Kohler, and D. Estrin. Sympathy for the sensor network debugger. In Proceedings of the Third ACM Conference On Embedded Networked Sensor Systems (SenSys), 2005.
[18]
S. Rangwala, R. Gummadi, R. Govindan, and K. Psounis. Interference-aware fair rate control in wireless sensor networks. In Proceedings of the ACM SIGCOMM, 2006.
[19]
T. Schmid, H. Dubois-Ferriere, and M. Vetterli. Sensorscope: Experiences with a wireless building monitoring sensor network. In Proceedings of the Workshop on Real-World Wireless Sensor Networks (REALWSN), 2005.
[20]
R. Szewczyk, J. Polastre, A. Mainwaring, and D. Culler. An analysis of a large scale habitat monitoring application. In Proceedings of the Second ACM Conference on Embedded Networked Sensor Systems (SenSys 2004), 2004.
[21]
G. Tolle and D. Culler. Design of an application-cooperative management system for wireless sensor networks, 2005.
[22]
V. Turau, C. Renner, M. Venzke, S. Waschik, C. Weyer, and M. Witt. The heathland experiment: Results and experiences. In Proceedings of the Workshop on Real-World Wireless Sensor Networks (REALWSN), 2005.
[23]
T. van Dam and K. Langendoen. An adaptive energy-efficient mac protocol for wireless sensor networks. In Proceedings of the First ACM Conference on Embedded Networked Sensor Systems, Los Angeles, CA, Nov. 2003.
[24]
G. Werner-Allen, K. Lorincz, J. Johnson, J. Leess, and M. Welsh. Monitoring volcanic eruptions with a wireless sensor network. In Proceedings of the Second European Workshop on Wireless Sensor Networks (EWSN), 2005.
[25]
G. Werner-Allen, P. Swieskowski, and M. Welsh. Motelab: A wireless sensor network testbed. In Proceedigns of the 4th International Symposium on Information Processing in Sensor Networks, 2005.
[26]
K. Whitehouse, G. Tolle, J. Taneja, C. Sharp, S. Kim, J. Jeong, J. Hui, P. Dutta, and D. Culler. Marionette: Using rpc for interactive development and debugging of wireless embedded networks. In Proceedings of the Fifth International Conference on Information Processing in Sensor Networks: Special Track on Sensor Platform, Tools, and Design Methods for Network Embedded Systems (IPSN/SPOTS), 2006.
[27]
A. Woo and T. Tong. Tinyos mintroute collection protocol. tinyos-1.x/lib/MintRoute.

Cited By

View all
  • (2022)Introspecting network behavior with mixed realityProceedings of the 28th Annual International Conference on Mobile Computing And Networking10.1145/3495243.3558251(826-828)Online publication date: 14-Oct-2022
  • (2017)Wireless-Transparent SensingProceedings of the 2017 International Conference on Embedded Wireless Systems and Networks10.5555/3108009.3108019(66-77)Online publication date: 20-Feb-2017
  • (2015)Toward Stable Network Performance in Wireless Sensor Networks: A Multilevel PerspectiveACM Transactions on Sensor Networks10.1145/270027211:3(1-26)Online publication date: 17-Feb-2015
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
SenSys '07: Proceedings of the 5th international conference on Embedded networked sensor systems
November 2007
455 pages
ISBN:9781595937636
DOI:10.1145/1322263
  • General Chair:
  • Sanjay Jha
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 06 November 2007

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. metrics
  2. sensor networks
  3. visibility

Qualifiers

  • Article

Conference

Acceptance Rates

SenSys '07 Paper Acceptance Rate 25 of 149 submissions, 17%;
Overall Acceptance Rate 198 of 990 submissions, 20%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)5
  • Downloads (Last 6 weeks)1
Reflects downloads up to 27 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2022)Introspecting network behavior with mixed realityProceedings of the 28th Annual International Conference on Mobile Computing And Networking10.1145/3495243.3558251(826-828)Online publication date: 14-Oct-2022
  • (2017)Wireless-Transparent SensingProceedings of the 2017 International Conference on Embedded Wireless Systems and Networks10.5555/3108009.3108019(66-77)Online publication date: 20-Feb-2017
  • (2015)Toward Stable Network Performance in Wireless Sensor Networks: A Multilevel PerspectiveACM Transactions on Sensor Networks10.1145/270027211:3(1-26)Online publication date: 17-Feb-2015
  • (2014)Failure detection in wireless sensor networksACM Transactions on Sensor Networks10.1145/253052610:2(1-29)Online publication date: 31-Jan-2014
  • (2014)Self-Diagnosis for Detecting System Failures in Large-Scale Wireless Sensor NetworksIEEE Transactions on Wireless Communications10.1109/TWC.2014.233665313:10(5535-5545)Online publication date: Oct-2014
  • (2014)Efficient and Flexible Sensornet CheckpointingProceedings of the 11th European Conference on Wireless Sensor Networks - Volume 835410.1007/978-3-319-04651-8_4(50-65)Online publication date: 17-Feb-2014
  • (2014)IFInternational Journal of Communication Systems10.1002/dac.270327:4(592-605)Online publication date: 1-Apr-2014
  • (2013)Connectivity and energy usage in low-power wireless: An experimental study2013 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops)10.1109/PerComW.2013.6529564(590-595)Online publication date: Mar-2013
  • (2013)MORIF: A MAC protocol for full-duplex transmissions in wireless star networks2013 International Conference on Anti-Counterfeiting, Security and Identification (ASID)10.1109/ICASID.2013.6825280(1-4)Online publication date: Oct-2013
  • (2012)Experiences from a decade of TinyOS developmentProceedings of the 10th USENIX conference on Operating Systems Design and Implementation10.5555/2387880.2387901(207-220)Online publication date: 8-Oct-2012
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media