Characterizing topological bottlenecks for data delivery in CTP using simulation-based stress testing with natural selection

Routing protocols for ad-hoc networks, e.g., the Collection Tree Protocol (CTP), are designed with simple node-local behaviour, but are deployed on testbeds with uncontrollable physical topology; exhaustively verifying the protocol on all possible topologies at design time is not tractable. We obtain topological insights on CTP performance, to answer the question: Which topological patterns cause CTP data routing to fail? We stress-test CTP with a quantitative testing method which searches for topologies using evolutionary algorithms combined with protocol simulation. The method iteratively generates new test topologies, such that the execution of the protocol over these topologies shows increasingly worse data-delivery ratios (DDR). We obtain a large set of example topologies of different network sizes up to 50 nodes, network densities, data rates, table sizes, and radio-frequency noise models, which, although connected, trigger a data delivery of nearly zero. We summarize these topologies into three types of topological problems, the root cause of which is the presence of certain asymmetric links and cycles, combined with a certain size of the routing table. We verify causality, i.e., show that randomly generated topologies having these particular features do cause low DDR in CTP. This testing methodology, while computationally intensive, is sound, fully automated and has better coverage over the corner cases of protocol behaviour than testing a protocol over manually crafted or random topologies.

[1]  Jonathan W. Hui,et al.  T 2 : A Second Generation OS For Embedded Sensor Networks , 2005 .

[2]  Xingming Sun,et al.  ECTP: An Enhanced Data Collection Protocol based on CTP , 2013 .

[3]  Yunhao Liu,et al.  Does Wireless Sensor Network Scale? A Measurement Study on GreenOrbs , 2011, IEEE Transactions on Parallel and Distributed Systems.

[4]  Giovanni Squillero,et al.  GA-based performance analysis of network protocols , 1997, Proceedings Ninth IEEE International Conference on Tools with Artificial Intelligence.

[5]  Matt Welsh,et al.  Fidelity and yield in a volcano monitoring sensor network , 2006, OSDI '06.

[6]  HyungJune Lee,et al.  Improving Wireless Simulation Through Noise Modeling , 2007, 2007 6th International Symposium on Information Processing in Sensor Networks.

[7]  Doina Bucur,et al.  The tradeoffs between data delivery ratio and energy costs in wireless sensor networks: a multi-objectiveevolutionary framework for protocol analysis , 2014, GECCO.

[8]  Sanjay Jha,et al.  Overcoming radio link asymmetry in wireless sensor networks , 2008, 2008 IEEE 19th International Symposium on Personal, Indoor and Mobile Radio Communications.

[9]  A. Bennett The Origin of Species by means of Natural Selection; or the Preservation of Favoured Races in the Struggle for Life , 1872, Nature.

[10]  Ravi Prakash,et al.  Unidirectional links prove costly in wireless ad hoc networks , 1999, DIALM '99.

[11]  David E. Culler,et al.  TOSSIM: accurate and scalable simulation of entire TinyOS applications , 2003, SenSys '03.

[12]  Dimitri P. Bertsekas,et al.  Data Networks , 1986 .

[13]  Yi Qian,et al.  Time-Varying Performance Analysis of Multihop Wireless Networks With CBR Traffic , 2014, IEEE Transactions on Vehicular Technology.

[14]  David E. Culler,et al.  Taming the underlying challenges of reliable multihop routing in sensor networks , 2003, SenSys '03.

[15]  Ramesh Govindan,et al.  Understanding packet delivery performance in dense wireless sensor networks , 2003, SenSys '03.

[16]  Philip Levis,et al.  CTP: An efficient, robust, and reliable collection tree protocol for wireless sensor networks , 2013, ACM Trans. Sens. Networks.

[17]  Leonidas J. Guibas,et al.  The Impact of Network Topology on Collection Performance , 2011, EWSN.

[18]  Yunhao Liu,et al.  BOND: Exploring Hidden Bottleneck Nodes in Large-Scale Wireless Sensor Networks , 2014, 2014 IEEE 34th International Conference on Distributed Computing Systems.

[19]  Doina Bucur,et al.  The impact of topology on energy consumption for collection tree protocols: An experimental assessment through evolutionary computation , 2014, Appl. Soft Comput..

[20]  D. Mosse,et al.  BRA: A Bidirectional Routing Abstraction for Asymmetric Mobile Ad Hoc Networks , 2008, IEEE/ACM Transactions on Networking.

[21]  C. Darwin The Origin of Species by Means of Natural Selection, Or, The Preservation of Favoured Races in the Struggle for Life , 2019 .

[22]  Mohammad Reza Mousavi,et al.  Mechanized Extraction of Topology Anti-patterns in Wireless Networks , 2012, IFM.

[23]  C. Darwin On the Origin of Species by Means of Natural Selection: Or, The Preservation of Favoured Races in the Struggle for Life , 2019 .

[24]  Koen Langendoen,et al.  Apples, Oranges, and Testbeds , 2006, 2006 IEEE International Conference on Mobile Ad Hoc and Sensor Systems.

[25]  Dimitri P. Bertsekas,et al.  Data Networks: Second Edition , 1992 .

[26]  Giovanni Squillero,et al.  Evolutionary Optimization: the µGP toolkit , 2011 .

[27]  Koen Langendoen,et al.  Murphy loves potatoes: experiences from a pilot sensor network deployment in precision agriculture , 2006, Proceedings 20th IEEE International Parallel & Distributed Processing Symposium.

[28]  Iain Bate,et al.  Searching for the minimum failures that can cause a hazard in a wireless sensor network , 2013, GECCO '13.

[29]  Ahmed Helmy,et al.  Modeling and test generation for worst-case performance evaluation of MAC protocols for wireless ad hoc networks , 2009, 2009 IEEE International Symposium on Modeling, Analysis & Simulation of Computer and Telecommunication Systems.