2,240 research outputs found

    Whisper: Fast Flooding for Low-Power Wireless Networks

    Full text link
    This paper presents Whisper, a fast and reliable protocol to flood small amounts of data into a multi-hop network. Whisper relies on three main cornerstones. First, it embeds the message to be flooded into a signaling packet that is composed of multiple packlets. A packlet is a portion of the message payload that mimics the structure of an actual packet. A node must intercept only one of the packlets to know that there is an ongoing transmission. Second, Whisper exploits the structure of the signaling packet to reduce idle listening and, thus, to reduce the radio-on time of the nodes. Third, it relies on synchronous transmissions to quickly flood the signaling packet through the network. Our evaluation on the Flocklab testbed shows that Whisper achieves comparable reliability but significantly lower radio-on time than Glossy -- a state-of-the-art flooding algorithm. Specifically, Whisper can disseminate data in FlockLab twice as fast as Glossy with no loss in reliability. Further, Whisper spends 30% less time in channel sampling compared to Glossy when no data traffic must be disseminated

    Improving the efficiency of nondeterministic indepemndent and-parallel systems

    Get PDF
    We present the design and implementation of the and-parallel component of ACE. ACE is a computational model for the full Prolog language that simultaneously exploits both or-parallelism and independent and-parallelism. A high performance implementation of the ACE model has been realized and its performance reported in this paper. We discuss how some of the standard problems which appear when implementing and-parallel systems are solved in ACE. We then propose a number of optimizations aimed at reducing the overheads and the increased memory consumption which occur in such systems when using previously proposed solutions. Finally, we present results from an implementation of ACE which includes the optimizations proposed. The results show that ACE exploits and-parallelism with high efficiency and high speedups. Furthermore, they also show that the proposed optimizations, which are applicable to many other and-parallel systems, significantly decrease memory consumption and increase speedups and absolute performance both in forwards execution and during backtracking

    Penniless propagation in join trees

    Get PDF

    Epidemic Dissemination in Ad Hoc Networks

    Get PDF
    Peer-to-Peer (P2P) and ad hoc networks have many points in common: both represent a decentralized self-organizing network structure. However few existing P2P algorithms are specifically designed to operate efficiently over ad hoc networks. And few ad hoc networks are designed to benefit from P2P infrastructures. We have worked on an epidemic dissemination protocol to maintain soft-state in a decentralized, peer-to-peer fashion, in ad hoc networks. This protocol is an enhancement of Passive Distributed Indexing (PDI) method proposed by Lindemann and Waldhorst. PDI is a method for distributing information in a P2P structure which is particularly suited to ad hoc networks, and does not involve an overlay topology. It makes use of broadcast messages to spread information via passive epidemic dissemination. We have enhanced PDI in order to reduce the number of broadcast messages when the search for an item may span several hops. Three enhancements are proposed: 1) Lazy query propagation to delay the propagation of query messages such that local responses can inhibit unnecessary search. 2) Quench waves to stop an already initiated query propagation when still possible. A decision algorithm determines whether to start a quench wave or not based solely on local information. 3) The use of Multi-Point Relay (MPR) or similar protocol and algorithm, to reduce redundant broadcast messages. This talk will present the current state of this research, and discuss several open aspects with the purpose of stimulating debate. The talk will also include an overview of related work such as epidemic models from biology, other epidemic protocols for P2P overlays and MANETs, including gossip (active) and promiscuous (passive) dissemination modes. Such protocols could be used for many different purposes, roughly any task requiring distributed soft-state maintenance in the ad hoc network, including DNS and identifier mappings, network monitoring and configuration, and so on. During the talk we will also exploit the possibility of using the protocol to disseminate service information for on-demand service deployment, and further, to assist in self-composing protocol structures
    • …
    corecore