• Keine Ergebnisse gefunden

Limitations and Future Work

Im Dokument Universität Stuttgart (Seite 105-111)

CHAPTER 7. PROTOCOL IMPLEMENTATION 69

9.2. Limitations and Future Work

After the summary of this thesis, this section discusses limitations of the current pro-tocol implementation and possible future work.

The first limitation of this thesis is that the protocol is implemented only partially, e.g., the transport component does not implement the implicit ACK mechanism and the discovery does not implement the extended search patterns. Further implemen-tation limiimplemen-tations are covered in Chapter 7. First, this limitations are founded in the complexity of the different protocol aspects, as described in the design space. Second, this is due to the fact that the transport mechanism is not the focus of this thesis. How-ever, a more advanced transport mechanism can improve the overall performance and energy efficiency of PACLD. Therefore, a higher flexibility of the data rate and a more robust behavior at high route lengths are a topic for future work.

A limitation of the caching mechanism, implemented in this protocol, is the low flexi-bility of the caching policy to select an object for removal. This restriction is based in PACLD’s behavior to evict objects of approximately the same size as the new object.

Having only a maximum of 20 objects in the cache and given a high variety of differ-ent object sizes, on average, the caching policy can choose only between two objects to evict. Eviction of multiple small objects in order to free memory for one large object is not considered in the current implementation.

The performance of the protocol, in case of high request frequency and poor distribution of the requested object, is limited by the character of the base station as a bottleneck.

These conditions mainly are expected after deployment of the sensor network when all caches are empty. However, most request models are expected to be handled well by the protocol. Nevertheless, future work may research optimizations of concurrent requests which interfere and, therefore, may result in mutual blocking.

CHAPTER 9. CONCLUSION 97

One possible extension of PACLD can be a cluster-based request mechanism, where only the cluster-head requests an object and, afterwards, uses a broadcast-based dis-semination protocol to cheaply propagate the object to all member nodes of its cluster.

The concept of source caches, storage of information where sources can be found, can by investigated in future work, in order to decrease search costs of the discovery mech-anism while, at the same time, increasing the success probability. Information about the location of objects within the network can be stored for this improved discovery.

Thereby, this information base can be built reactively by storing information of past discoveries. However, this information base can also be built proactively by advertise-ments. Different scopes can be investigated. First, only neighborhood information can be maintained. Second, information about larger parts of the network, up to the com-plete network, can be maintained at each node. Another aspect to research is the effect of a reduced number of nodes which maintain a source cache. Moreover, this concept can be studied with additional system assumptions, like for example, geographic loca-tion informaloca-tion.

Another subject for future work is the concept of inter-cache communication. This thesis already proposed a simple mechanism to prevent cache clustering, i.e., neigh-boring nodes which cache the same data object. However, more sophisticated mecha-nisms can be researched in order to achieve a better distribution of object copies in the network and in order to serve as a tool for the source cache mechanism as presented above. First, different network structures can be investigated as a base for this com-munication, e.g., communication along the edges of trees is well researched in sensor networks. Second, the restriction to implicit communication, where only information is drawn from overhearing the network traffic, can be compared to explicit communi-cation, where a special inter-cache communication protocol is developed. As a result of the cache communication, replication of objects can be initiated, and the caching deci-sion can be decided.

In addition to the topics for future work presented above, the protocol behavior can be studied and optimized under different system conditions. Despite the limitations of the prototype implementation, PACLD provides a mechanism to supply nodes in a sensor network efficiently with a high number of large data objects.

APPENDIX A. TOPOLOGY I

Table A.1: Node coordinates for topology with 100 nodes

Bibliography II

[5] Sustainable bridges. http://www.sustainablebridges.net, April 2007.

[6] I. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci. A survey on sensor networks.

InIEEE Commun. Mag. 40 (8) (2002), pages 102–114, 2002.

[7] Hyokyung Bahn, Sam H. Noh, Sang Lyul Min, and Kern Koh. Using full reference history for efficient document replacement in web caches. In USENIX Symposium on Internet Technologies and Systems, 1999.

[8] David Braginsky and Deborah Estrin. Rumor routing algorthim for sensor networks. In WSNA ’02: Proceedings of the 1st ACM international workshop on Wireless sensor networks and applications, pages 22–31, New York, NY, USA, 2002. ACM Press.

[9] Nicholas Chang and Mingyan Liu. Revisiting the ttl-based controlled flooding search:

optimality and randomization. InMobiCom ’04: Proceedings of the 10th annual interna-tional conference on Mobile computing and networking, pages 85–99, New York, NY, USA, 2004. ACM Press.

[10] Zhao Cheng and Wendi B. Heinzelman. Searching strategy for multi-target discovery in wireless networks. In4th Workshop on Applications and Services in Wireless Networks, ASWN 2004, 2004.

[11] Ian Clarke, Oskar Sandberg, Brandon Wiley, and Theodore W. Hong. Freenet: A dis-tributed anonymous information storage and retrieval system. Lecture Notes in Computer Science, 2009, 2001.

[12] C. T. Ee, S. Ratnasamy, and S. Shenker. Practical Data-Centric Storage. InProceedings of the 3rd USENIX Symposium on Networked Systems Design and Implementation (NSDI), San Jose, CA, USA, 2006.

[13] Q Gao, K J Blow, D J Holding, I Marshall, and X H Peng. Radio Range Adjustment for Energy Efficient Wireless Sensor Networks. 2005. To be published in Ad-Hoc Networks.

[14] David Gay, Philip Levis, Robert v. von Behren, Matt Welsh, Eric Brewer, and David Culler.

The nesC language: A holistic approach to networked embedded systems. InPLDI ’03:

Proceedings of the ACM SIGPLAN 2003 conference on Programming language design and implementation, volume 38, pages 1–11, New York, NY, USA, May 2003. ACM Press.

[15] J. Hassan and S. Jha. Optimising expanding ring search for multi–hop wireless net-works. In Global Telecommunications Conference, 2004. GLOBECOM ’04. IEEE, pages

Bibliography III

[16] Jason Hill, Robert Szewczyk, Alec Woo, Seth Hollar, David E. Culler, and Kristofer S. J.

Pister. System architecture directions for networked sensors. InArchitectural Support for Programming Languages and Operating Systems, pages 93–104, 2000.

[17] Jonathan W. Hui and David Culler. The dynamic behavior of a data dissemination protocol for network programming at scale. InSenSys ’04: Proceedings of the 2nd international conference on Embedded networked sensor systems, pages 81–94, New York, NY, USA, 2004. ACM Press.

[18] P. Juang, H. Oki, Y. Wang, M. Martonosi, L. Peh, and D. Rubenstein. Energy-efficient computing for wildlife tracking: Design tradeoffs and early experiences with ZebraNet. In ASPLOS, San Jose, CA, oct 2002.

[19] B. W. Kernighan and D. M. Ritchie.The C Programming Language. Prentice Hall, second edition, 1988.

[20] P. Krishnan, Danny Raz, and Yuval Shavitt. The cache location problem. IEEE/ACM Transactions on Networking, 8(5):568–582, 2000.

[21] Sandeep S. Kulkarni and Limin Wang. Mnp: Multihop network reprogramming service for sensor networks. InICDCS 2005: Proceedings of 25th IEEE International Conference on Distributed Computing Systems, Michigan State University, 2005.

[22] Andreas Lachenmann, Pedro José Marrón, Matthias Gauger, Daniel Minder, Olga Saukh, and Kurt Rothermel. Removing the Memory Limitations of Sensor Networks with Flash-Based Virtual Memory. InProceedings of the European Conference on Computer Systems (EuroSys 2007), 2007.

[23] O. Landsiedel, K. Wehrle, and S. Götz. Accurate prediction of power consumption in sensor networks. InProceedings of The Second IEEE Workshop on Embedded Networked Sensors (EmNetS-II), 2005.

[24] Philip Levis and David Culler. The firecracker protocol. InEW11: Proceedings of the 11th workshop on ACM SIGOPS European workshop: beyond the PC, page 3, New York, NY, USA, 2004. ACM Press.

[25] T. Liu and M. Martonosi. Impala: A middleware system for managing autonomic, parallel sensor systems. In ACM SIGPLAN Symp. Principles and Practice of Parallel Program-ming, 2003.

[26] P. Lorenzetti, L. Rizzo, and L. Vicisano. Replacement policies for a proxy cache.

IEEE/ACM Transactions on Networking, 8:158–170, 2000.

[27] D. Malan, T. Fulford-Jones, M. Wesh, and S. Moulton. Codeblue: An ad hoc sensor network infrastructure for emergency medical care. InMobiSys 2004 Workshop on Applications of Mobile Embedded Systems, 2004.

[28] Pedro José Marrón, Daniel Minder, Andreas Lachenmann, and Kurt Rothermel. Tiny-Cubus: An adaptive cross–layer framework for sensor networks. it - Information Technol-ogy, 47(2):87–97, 2005.

[29] Nimrod Megiddo and D. S. Modha. Arc: A self-tuning, low overhead replacement cache. In Proc. 2nd USENIX Conference on File and Storage Technologies (FAST 03), San Franciso, CA, 2003.

[30] Sze-Yao Ni, Yu-Chee Tseng, Yuh-Shyan Chen, and Jang-Ping Sheu. The broadcast storm problem in a mobile ad hoc network. In MobiCom ’99: Proceedings of the 5th annual ACM/IEEE international conference on Mobile computing and networking, pages 151–

162, New York, NY, USA, 1999. ACM Press.

Bibliography IV

[31] Clyde E. Nishimura and Dennis M. Conlon. IUSS Dual Use: Monitoring whales and earthquakes using SOSUS. Marine Technology Society Journal, 27(4):13–21, oct 1994.

[32] L. A. Phillips. Aqueduct: Robust and efficient code propagation in heterogeneous wireless sensor networks. Master’s thesis, University of Colorado at Boulder, 2005.

[33] Joseph Polastre, Robert Szewczyk, and David Culler. Telos: enabling ultra–low power wireless research. InIPSN ’05: Proceedings of the 4th international symposium on Infor-mation processing in sensor networks, page 48, Piscataway, NJ, USA, 2005. IEEE Press.

[34] S. Ratnasamy, B. Karp, L. Yin, F. Yu, D. Estrin, R. Govindan, and S. Shenker. GHT: A geo-graphic hash table for data-centric storage in sensornets. InProceedings of the First ACM International Workshop on Wireless Sensor Networks and Applications (WSNA), Atlanta, Georgia, USA, 2002.

[35] D. Reichardt, M. Miglietta, L. Moretti, P. Morsink, and W. Schulz. Cartalk 2000: safe and comfortable driving based upon inter–vehicle–communication. In Intelligent Vehicle Symposium, 2002. IEEE, pages 545–550 vol.2, 2002.

[36] Ganesh Santhanakrishnan, Ahmed Amer, and Panos K. Chrysanthis. Towards universal mobile caching. June 2005.

[37] Peter Scheuermann, Junho Shim, and Radek Vingralek. A case for delay-conscious caching of web documents. In Selected papers from the sixth international conference on World Wide Web, pages 997–1005, Essex, UK, 1997. Elsevier Science Publishers Ltd.

[38] Bo Sheng, Qun Li, and Weizhen Mao. Data storage placement in sensor networks. In MobiHoc ’06: Proceedings of the seventh ACM international symposium on Mobile ad hoc networking and computing, pages 344–355, New York, NY, USA, 2006. ACM Press.

[39] Anmol Sheth, Brian Shucker, and Richard Han. VLM2: A Very Lightweight Mobile Mul-ticast System for Wireless Sensor Networks. InProceedings of IEEE Wireless Communi-cations and Networking Conference (WCNC) 2003.

[40] Thanos Stathopoulos, John Heidemann, and Deborah Estrin. A remote code update mech-anism for wireless sensor networks. Technical Report CENS-TR-30, University of Califor-nia, Los Angeles, Center for Embedded Networked Computing, November 2003.

[41] Andrew S. Tanenbaum. Computer Networks. Prentice Hall, fourth edition, 2003.

[42] Bin Tang, Himanshu Gupta, and Samir Das. Benefit–based data caching in ad hoc net-works. InProceedings of the 2006 14th IEEE International Conference on Network Proto-cols ICNP ’06, 2006.

[43] Ben L. Titzer, Daniel K. Lee, and Jens Palsberg. Avrora: scalable sensor network simu-lation with precise timing. InIPSN ’05: Proceedings of the 4th international symposium on Information processing in sensor networks, page 67, Piscataway, NJ, USA, 2005. IEEE Press.

[44] Gilman Tolle, Joseph Polastre, Robert Szewczyk, David Culler, Neil Turner, Kevin Tu, Stephen Burgess, Todd Dawson, Phil Buonadonna, David Gay, and Wei Hong. A macro-scope in the redwoods. InSenSys ’05: Proceedings of the 3rd international conference on Embedded networked sensor systems, pages 51–63, New York, NY, USA, 2005. ACM Press.

[45] Stephen Williams, Marc Abrams, Charles R. Standridge, Ghaleb Abdulla, and Edward A.

Fox. Removal policies in network caches for World-Wide Web documents. InProcedings of the ACM SIGCOMM ’96 Conference, Stanford University, CA, USA, 1996.

[46] Yang Yu, Loren J. Rittle, Vartika Bhandari, and Jason B. LeBrun. Supporting concurrent applications in wireless sensor networks. InProceedings of the 4th international confer-ence on Embedded networked sensor systems, Boulder, Colorado, USA, 2006.

Bibliography V

Statement

I ensure that I have created this document on my own and only used those external sources listed in the bibliography.

Stuttgart,

Harald Weinschrott

Im Dokument Universität Stuttgart (Seite 105-111)