Improving the performance of trickle-based data dissemination in low-power networks

M. Stolikj, T.M.M. Meyfroyt, P.J.L. Cuijpers, J.J. Lukkien

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

16 Citations (Scopus)

Abstract

Trickle is a polite gossip algorithm for managing communication traffic. It is of particular interest in low-power wireless networks for reducing the amount of control traffic, as in routing protocols (RPL), or reducing network congestion, as in multicast protocols (MPL). Trickle is used at the network or application level, and relies on up-to-date information on the activity of neighbors. This makes it vulnerable to interference from the media access control layer, which we explore in this paper. We present several scenarios how the MAC layer in low-power radios violates Trickle timing. As a case study, we analyze the impact of CSMA/CA with ContikiMAC on Trickle’s performance. Additionally, we propose a solution called Cleansing that resolves these issues.
Original languageEnglish
Title of host publicationWireless Sensor Networks
Subtitle of host publicationth European Conference, EWSN 2015, Porto, Portugal, February 9-11, 2015. Proceedings
EditorsT. Addelzaher, N. Pereira, E. Tovar
Place of PublicationDordrecht
PublisherSpringer
Pages186-201
Number of pages16
ISBN (Electronic)978-3-319-15582-1
ISBN (Print)978-3-319-15581-4
DOIs
Publication statusPublished - 2015
Event12th European Conference on Wireless Sensor Networks (EWSN 2015) - Porto, Portugal
Duration: 9 Feb 201511 Feb 2015
Conference number: 12
https://www.cister.isep.ipp.pt/ewsn2015/

Publication series

NameLecture Notes in Computer Science
Volume8965
ISSN (Print)0302-9743

Conference

Conference12th European Conference on Wireless Sensor Networks (EWSN 2015)
Abbreviated titleEWSN 2015
Country/TerritoryPortugal
CityPorto
Period9/02/1511/02/15
Other

Internet address

Fingerprint

Dive into the research topics of 'Improving the performance of trickle-based data dissemination in low-power networks'. Together they form a unique fingerprint.

Cite this