Suppressing redundancy in wireless sensor network traffic

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Redundancy suppression is a network traffic compression technique that, by caching recurring transmission contents at receiving nodes, avoids repeatedly sending duplicate data. Existing implementations require abundant memory both to analyze recent traffic for redundancy and to maintain the cache. Wireless sensor nodes at the same time cannot provide such resources due to hardware constraints. The diversity of protocols and traffic patterns in sensor networks furthermore makes the frequencies and proportions of redundancy in traffic unpredictable. The common practice of narrowing down search parameters based on characteristics of representative packet traces when dissecting data for redundancy thus becomes inappropriate. Such difficulties made us devise a novel protocol that conducts a probabilistic traffic analysis to identify and cache only the subset of redundant transfers that yields most traffic savings. We verified this approach to perform close enough to a solution built on exhaustive analysis and unconstrained caching to be practicable.

Original languageEnglish
Title of host publicationDistributed Computing in Sensor Systems - 6th IEEE International Conference, DCOSS 2010, Proceedings
Pages187-200
Number of pages14
DOIs
Publication statusPublished - 2010 Aug 13
Externally publishedYes
Event6th IEEE International Conference on Distributed Computing in Sensor Systems, DCOSS 2010 - Santa Barbara, CA, United States
Duration: 2010 Jun 212010 Jun 23

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume6131 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Other

Other6th IEEE International Conference on Distributed Computing in Sensor Systems, DCOSS 2010
CountryUnited States
CitySanta Barbara, CA
Period10/6/2110/6/23

ASJC Scopus subject areas

  • Theoretical Computer Science
  • Computer Science(all)

Fingerprint Dive into the research topics of 'Suppressing redundancy in wireless sensor network traffic'. Together they form a unique fingerprint.

Cite this