skip to main content
article

Growth codes: maximizing sensor network data persistence

Published:11 August 2006Publication History
Skip Abstract Section

Abstract

Sensor networks are especially useful in catastrophic or emergency scenarios such as floods, fires, terrorist attacks or earthquakes where human participation may be too dangerous. However, such disaster scenarios pose an interesting design challenge since the sensor nodes used to collect and communicate data may themselves fail suddenly and unpredictably, resulting in the loss of valuable data. Furthermore, because these networks are often expected to be deployed in response to a disaster, or because of sudden configuration changes due to failure, these networks are often expected to operate in a "zero-configuration" paradigm, where data collection and transmission must be initiated immediately, before the nodes have a chance to assess the current network topology. In this paper, we design and analyze techniques to increase "persistence" of sensed data, so that data is more likely to reach a data sink, even as network nodes fail. This is done by replicating data compactly at neighboring nodes using novel "Growth Codes" that increase in efficiency as data accumulates at the sink. We show that Growth Codes preserve more data in the presence of node failures than previously proposed erasure resilient techniques.

References

  1. Crossbow micaz motes.Google ScholarGoogle Scholar
  2. TinyOS Homepage.Google ScholarGoogle Scholar
  3. S. Katti, D. Katabi, W. Hu, H. Rahul and M. Medard. The Importance of Being Opportunistic: Practical Network Coding For Wireless Environments. In Allerton Annual Conference on Communication, Control and Computing, 2005.Google ScholarGoogle Scholar
  4. A. Albanese, J. Blömer, J. Edmonds, M. Luby, M. Sudan. Priority Encoding Transmission. In IEEE Transactions on Information Theory, volume 42, 1996. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. A. G. Dimakis, V. Prabhakaran and K. Ramchandran. Ubiquitous Acess to Distributed Data in Large-Scale Sensor Networks through Decentralized Erasure Codes. In Information Processing in Sensor Networks, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. A. Kamra, J. Feldman, V. Misra and D. Rubenstein. Data Persistence for Zero-Configuration Sensor Networks. In Technical Report, Department of Computer Science, Columbia University, Feb. 2006.Google ScholarGoogle Scholar
  7. A. Manjeshwar and D.P. Agrawal. Teen: A Routing Protocol for Enhanced Efficiency in Wireless Sensor Networks. In Parallel and Distributed Processing Symposium, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. A. Scaglione and S. D. Servetto. On the interdependence of routing and data compression in multi-hop sensor networks. In ACM Conference on Mobile Computing and Networking, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. C. Gkantsidis and P. Rodriguez. Network Coding for Large Scale Content Distribution. In Proceedings of INFOCOM, 2005.Google ScholarGoogle ScholarCross RefCross Ref
  10. C. Intanagonwiwat, R. Govindan and D. Estrin. Directed diffusion: a scalable and robust communication paradigm for sensor networks. In ACM Conference on Mobile Computing and Networking, 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. C. Y. Wan, S. B. Eisenman, A. T. Campbell, J. Crowcroft. Siphon: Overload Traffic Management using Multi-Radio Virtual Sinks. In ACM Conference on Embedded Networked Sensor Systems, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. D. Marco, D. Neuhoff. Reliability vs. Efficiency in Distributed Source Coding for Field-Gathering. In Information Processing in Sensor Networks, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. I. F. Akyildiz, M. C. Vuran, O. B. Akan. On Exploiting Spatial and Temporal Correlation in Wireless Sensor Networks. In Proceedings of WiOpt 2004: Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks, pages 71--80, Mar. 2004.Google ScholarGoogle Scholar
  14. J. Byers, J. Considine, M. Mitzenmacher and S. Rost. Informed Content Delivery Across Adaptive Overlay Networks. In Proceedings of SIGCOMM, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. J. Considine. Generating good degree distributions for sparse parity check codes using oracles. In Technical Report, BUCS-TR 2001-019, Boston University, 2001.Google ScholarGoogle Scholar
  16. J. W. Byers, M. Luby, M. Mitzenmacher, A. Rege. A Digital Fountain Approach to Reliable Distribution of Bulk Data. In Proceedings of SIGCOMM, 1998. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Lin and Costello. Error Control Coding: Fundamentals and Applications. 1983.Google ScholarGoogle Scholar
  18. M. Luby. LT Codes. In Symposium on Foundations of Computer Science, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. M. Li, D. Ganesan and P. Shenoy. PRESTO: Feedback-Driven Data Management in Sensor Networks. In ACM/USENIX Symposium on Networked Systems Design and Implementation, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. M. Luby, M. Mitzenmacher, M. A. Shokrollahi and D. Spielman. Efficient Erasure Correcting Codes. In IEEE Transactions on Information Theory, volume 47, pages 569--584, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. M. O. Rabin. Efficient Dispersal of Information for Security, Load Balancing and Fault Tolerance. In Journal of the ACM, volume 36, pages 335--348, 1989. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. M. Perillo, Z. Ignjatovic and W. Heinzelman. An Energy Conservation Method for Wireless Sensor Networks Employing a Blue Noise Spatial Sampling Technique. In Information Processing in Sensor Networks, pages 116--123, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. M. Sartipi and F. Fekri. Source and Channel Coding in Wireless Sensor Networks using LDPC Codes. In EEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, 2004.Google ScholarGoogle ScholarCross RefCross Ref
  24. N. Cai, S. Y. R. Li and R. W. Yeung. Linear Network Coding. In IEEE Transactions on Information Theory, volume 49, pages 371--381, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. P. Desnoyers, D. Ganesan and P. Shenoy. TSAR: A Two Tier Storage Architecture Using Interval Skip Graphs. In ACM Conference on Embedded Networked Sensor Systems, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. P. J. M. Havinga, G. J. M. Smit and M. Bos. Energy Efficient Adaptive Wireless Network Design. In The Fifth Symposium on Computers and Communications, 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. R. Ahlswede, N. Cai, S. Y. R. Li and R. W. Yeung. Network Information Flow. In IEEE Transactions on Information Theory, volume 46, pages 1004--1016, 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. R. Chandra, C. Fetzer and K. Hogstedt. A Mesh-based Robust Topology Discovery Algorithm for Hybrid Wireless Networks. In Proceedings of AD-HOC Networks and Wireless, Sept. 2002.Google ScholarGoogle Scholar
  29. R. Koetter and M. Medard. An Algebraic Approach to Network Coding. In ACM/IEEE Transactions on Networking, volume 11, pages 782--795, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. R. Motwani and P. Raghavan. Randomized Algorithms. Cambridge International Series on Parallel Computation. Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. S. Acedanski, S. Deb, M. Medard and R. Koetter. How Good is Random Linear Coding Based Distributed Networked Storage. In Workshop on Network Coding, Theory and Applications, 2005.Google ScholarGoogle Scholar
  32. S. Pattem, B. Krishnamachari and R. Govindan. The Impact of Spatial Correlation on Routing with Compression in Wireless Sensor Networks. In Information Processing in Sensor Networks, pages 28--35, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. S. S. Pradhan, J. Kusuma and K. Ramchandran. Distributed compression in a dense microsensor network. In IEEE Signal Processing Magazine, volume 19, pages 51--60, Mar. 2002.Google ScholarGoogle Scholar
  34. T. Arici, B. Gedik, Y. Altunbasak and L. Liu. PINCO: a Pipelined In-Network COmpression Scheme for Data Collection in Wireless Sensor Networks. In International Conference on Computer Communications and Networks, 2003.Google ScholarGoogle ScholarCross RefCross Ref
  35. T. Ho, M. Médard, M. Effros and D. Karger. On Randomized Network Coding. In Allerton Annual Conference on Communication, Control and Computing, Oct. 2003.Google ScholarGoogle Scholar
  36. W. Heinzelman, A. Chandrakasan and H. Balakrishnan. Energy-Efficient Communication Protocols for Wireless Microsensor Networks. In Hawaii International Conference on Systems Sciences, 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Growth codes: maximizing sensor network data persistence

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in

      Full Access

      • Published in

        cover image ACM SIGCOMM Computer Communication Review
        ACM SIGCOMM Computer Communication Review  Volume 36, Issue 4
        Proceedings of the 2006 conference on Applications, technologies, architectures, and protocols for computer communications
        October 2006
        445 pages
        ISSN:0146-4833
        DOI:10.1145/1151659
        Issue’s Table of Contents
        • cover image ACM Conferences
          SIGCOMM '06: Proceedings of the 2006 conference on Applications, technologies, architectures, and protocols for computer communications
          September 2006
          458 pages
          ISBN:1595933085
          DOI:10.1145/1159913

        Copyright © 2006 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 11 August 2006

        Check for updates

        Qualifiers

        • article

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader