Skip to main content

How to Ruin Sensor Network Performance Using Duplicate Suppression

  • Conference paper
  • First Online:
  • 568 Accesses

Abstract

Duplicate suppression is an essential part of most of today’s routing protocols for wireless sensor networks as well as for other wireless networks. It is necessary to reduce network load and to refrain from falsifying data on the application layer. However, most routing protocol descriptions do not include a description of the duplicate suppression that should be used. In many cases, duplicate suppression is not even mentioned anymore.

In this paper we describe common mistakes during implementation and usage of duplicate suppression. We also show an example where seemingly correct use of duplicate suppression lead to a decline in delivery ratio of more than 13 percent.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   34.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   44.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Gnawali, O., Fonseca, R., Jamieson, K., Moss, D., Levis, P.: Collection tree protocol. In: Proceedings of the 7th ACM Conference on Embedded Networked Sensor Systems, SenSys 2009, pp. 1–14. ACM, New York (2009)

    Google Scholar 

  2. Karnapke, R., Lohs, S., Lagemann, A., Nolte, J.: Simulation of unidirectional links in wireless sensor networks. In: 7th International ICST Conference on Simulation Tools and Techniques, Lisbon, Portugal, pp. 118–125 (2014)

    Google Scholar 

  3. Levis, P.A., Patel, N., Culler, D., Shenker, S.: Trickle: A self regulating algorithm for code propagation and maintenance in wireless sensor networks. Computer Science Division, University of California (2003)

    Google Scholar 

  4. Lohs, S., Karnapke, R., Nolte, J.: Link stability in a wireless sensor network – an experimental study. In: Martins, F., Lopes, L., Paulino, H. (eds.) S-CUBE 2012. LNICST, vol. 102, pp. 146–161. Springer, Heidelberg (2012)

    Google Scholar 

  5. Perkins, C., Belding-Royer, E., Das, S.: Ad hoc on-demand distance vector (aodv) routing (2003). http://www.ietf.org/rfc/rfc3561.txt

  6. Perkins, C.E., Royer, E.M.: Ad hoc on-demand distance vector routing. In: Proceedings of the 2nd IEEE Workshop on Mobile Computing Systems and Applications, New Orleans, LA, pp. 90–100, Feb 1999

    Google Scholar 

  7. Varga, A.: The omnet++ discrete event simulation system. In: Proceedings of the European Simulation Multiconference (ESM 2001), Prague, Czech Republic, p. 185, June 2001

    Google Scholar 

  8. Yu, Y., Govindan, R., Estrin, D.: Geographical and energy aware routing: A recursive data dissemination protocol for wireless sensor networks. Technical report (2001)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Reinhardt Karnapke .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Cite this paper

Karnapke, R., Lohs, S., Nolte, J. (2015). How to Ruin Sensor Network Performance Using Duplicate Suppression. In: Kanjo, E., Trossen, D. (eds) Sensor Systems and Software. S-CUBE 2014. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 143. Springer, Cham. https://doi.org/10.1007/978-3-319-17136-4_3

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-17136-4_3

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-17135-7

  • Online ISBN: 978-3-319-17136-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics