Collection tree protocol

Omprakash Gnawali, Rodrigo Fonseca, Kyle Jamieson, David Moss, Philip Levis

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1016 Scopus citations

Abstract

This paper presents and evaluates two principles for wireless routing protocols. The first is datapath validation: data traffic quickly discovers and fixes routing inconsistencies. The second is adaptive beaconing: extending the Trickle algorithm to routing control traffic reduces route repair latency and sends fewer beacons. We evaluate datapath validation and adaptive beaconing in CTP Noe, a sensor network tree collection protocol. We use 12 different testbeds ranging in size from 20 - 310 nodes, comprising seven platforms, and six different link layers, on both interference-free and interference-prone channels. In all cases, CTP Noe delivers > 90% of packets. Many experiments achieve 99.9%. Compared to standard beaconing, CTP Noe sends 73% fewer beacons while reducing topology repair latency by 99.8%. Finally, when using low-power link layers, CTP Noe has duty cycles of 3% while supporting aggregate loads of 30 packets/minute.

Original languageEnglish (US)
Title of host publicationProceedings of the 7th ACM Conference on Embedded Networked Sensor Systems, SenSys 2009
Pages1-14
Number of pages14
DOIs
StatePublished - 2009
Event7th ACM Conference on Embedded Networked Sensor Systems, SenSys 2009 - Berkeley, CA, United States
Duration: Nov 4 2009Nov 6 2009

Publication series

NameProceedings of the 7th ACM Conference on Embedded Networked Sensor Systems, SenSys 2009

Other

Other7th ACM Conference on Embedded Networked Sensor Systems, SenSys 2009
CountryUnited States
CityBerkeley, CA
Period11/4/0911/6/09

All Science Journal Classification (ASJC) codes

  • Computer Networks and Communications
  • Control and Systems Engineering
  • Electrical and Electronic Engineering

Keywords

  • CTP
  • Collection
  • Routing
  • Sensor network

Fingerprint Dive into the research topics of 'Collection tree protocol'. Together they form a unique fingerprint.

Cite this