interfering packets. In a recent work [10], Backcast serves as the
basis for A-MAC, a receiver-initiated link layer protocol. More-
over, interference has been exploited to increase the throughput of
wireless networks (e.g., through analog network coding [16]).
Flash [21] uses concurrent transmissions for rapid flooding in
sensor networks. Flash relies exclusively on capture effects, which
considerably reduces the chances of correct packet reception when
many nodes transmit concurrently [21]. Glossy also benefits from
capture effects but primarily exploits constructive interference. This
enables Glossy to flood packets with high reliability at any node
density, as demonstrated by our testbed experiments in Sec. 7.2.
Glossy and Flash do not require nodes to maintain information
about the network topology. By contrast, in the Robust Broadcast
Protocol (RBP) [29] and the Collective Flooding (CF) [38] nodes
need to continuously collect information about their local neigh-
Trickle [19] and its variants provide data dissemination: nodes
continuously send advertisements to detect new data and ensure
complete network coverage. Typically, dissemination protocols are
optimized for reliability and data consistency, not for latency or
energy. Glossy floods packets fast without additional control traffic,
while sacrificing less than 0.01 % in flooding reliability.
Flooding is a basic communication primitive for time synchro-
nization in sensor networks. For example, the Flooding Time Syn-
chronization Protocol (FTSP) [22] uses periodic flooding of time-
stamped messages and achieves a per-hop synchronization error in
the microsecond range. Lenzen et al. show that optimal synchro-
nization necessitates fast network flooding [18]. Their PulseSync
protocol achieves a higher accuracy than FTSP and a flooding la-
tency below one second. Glossy provides even higher accuracy by
flooding packets within a few milliseconds and employing the Vir-
tual High-resolution Time (VHT) approach by Schmid et al. [27].
The high accuracy and low energy of VHT are also due to the use
of a custom external high-speed crystal [27]. Glossy could enable
further improvements in synchronization accuracy by combining it
with such crystals.
9. CONCLUSIONS
This paper is motivated by real-world sensor network systems
that rely on fast network flooding and accurate time synchroniza-
tion. We observe that such systems would significantly benefit from
a service that integrates both functionalities in an efficient man-
ner. This paper thus proposes Glossy, a novel flooding architecture
for wireless sensor networks that uses interference to its advantage.
By making simultaneous transmissions of the same packet interfere
constructively, Glossy enables receivers to decode a packet even in
the absence of capture effects. We have analyzed the robustness
of our techniques in achieving constructive interference based on
a mixture of stochastic and worst-case models. We have evalu-
ated our implementation of Glossy using experiments under con-
trolled settings and on three wireless sensor testbeds. The results
demonstrate that Glossy provides accurate time synchronization
along with fast and highly reliable flooding at ultra-low duty cycles,
showing no noticeable dependency on node density in the scenar-
ios considered. The source code of Glossy is publicly available at
http://www.tik.ee.ethz.ch/~ferrarif/sw/glossy.
Acknowledgments. The authors thank Matthias Keller, Luca Mot-
tola, and Thiemo Voigt for their feedback on early versions of this
paper, and the anonymous reviewers for their helpful comments.
This work was supported by Nano-Tera and the National Compe-
tence Center in Research on Mobile Information and Communi-
cation Systems (NCCR-MICS), a center supported by the Swiss
National Science Foundation under grant number 5005-67322.
10. REFERENCES
[1] The Contiki operating system. http://www.sics.se/contiki/.
[2] B. C. Arnold, N. Balakrishnan, and H. N. Nagaraja. A First Course in Order
Statistics. SIAM, 2008.
[3] Atmel. AT86RF230 datasheet, 2009.
[4] G. Barrenetxea, F. Ingelrest, G. Schaefer, M. Vetterli, O. Couach, and
M. Parlange. SensorScope: Out-of-the-box environmental monitoring. In
ACM/IEEE IPSN, 2008.
[5] J. Choi, M. Kazandjieva, M. Jain, and P. Levis. The case for a network protocol
isolation layer. In ACM SenSys, 2009.
[6] J. Chuang. The effects of time delay spread on portable radio communications
channels with digital modulation. IEEE J. Sel. Areas Commun., 5(5), 1987.
[7] D. Davis and S. Gronemeyer. Performance of slotted ALOHA random access
with delay capture and randomized time of arrival. IEEE Trans. Commun.,
28(5), 1980.
[8] A. Dutta, D. Saha, D. Grunwald, and D. Sicker. SMACK – a SMart
ACKnowledgment scheme for broadcast messages in wireless networks. In
ACM SIGCOMM, 2009.
[9] P. Dutta and D. Culler. Practical asynchronous neighbor discovery and
rendezvous for mobile sensing applications. In ACM SenSys, 2008.
[10] P. Dutta, S. Dawson-Haggerty, Y. Chen, C. M. Liang, and A. Terzis. Design and
evaluation of a versatile and efficient receiver-initiated link layer for low-power
wireless. In ACM SenSys, 2010.
[11] P. Dutta, R. Mus
˘
aloiu-E., I. Stoica, and A. Terzis. Wireless ACK collisions not
considered harmful. In ACM HotNets, 2008.
[12] A. Ephremides and T. Truong. Scheduling broadcasts in multihop radio
networks. IEEE Trans. Commun., 38(4), 1990.
[13] R. Flury and R. Wattenhofer. Slotted programming for sensor networks. In
ACM/IEEE IPSN, 2010.
[14] V. Handziski, A. Köpke, A. Willig, and A. Wolisz. TWIST: A scalable and
reconfigurable testbed for wireless indoor experiments with sensor networks. In
ACM REALMAN, 2006.
[15] IEEE. std. 802.15.4-2003, 2003.
[16] S. Katti, S. Gollakota, and D. Katabi. Embracing wireless interference: analog
network coding. In ACM SIGCOMM, 2007.
[17] K. Leentvaar and J. Flint. The capture effect in FM receivers. IEEE Trans.
Commun., 24(5), 1976.
[18] C. Lenzen, P. Sommer, and R. Wattenhofer. Optimal clock synchronization in
networks. In ACM SenSys, 2009.
[19] P. Levis, N. Patel, D. Culler, and S. Shenker. Trickle: A self-regulating
algorithm for code propagation and maintenance in wireless sensor networks. In
USENIX NSDI, 2004.
[20] D. Li, K. Wong, Y. Hu, and A. Sayeed. Detection, classification, and tracking of
targets. IEEE Signal Process. Mag., 19(2), 2002.
[21] J. Lu and K. Whitehouse. Flash flooding: Exploiting the capture effect for rapid
flooding in wireless sensor networks. In IEEE INFOCOM, 2009.
[22] M. Maróti, B. Kusy, G. Simon, and A. Lédeczi. The flooding time
synchronization protocol. In ACM SenSys, 2004.
[23] S. Ni, Y. Tseng, Y. Chen, and J. Sheu. The broadcast storm problem in a mobile
ad hoc network. In ACM/IEEE MobiCom, 1999.
[24] M. Rossi et al. SYNAPSE: A network reprogramming protocol for wireless
sensor networks using fountain codes. In IEEE SECON, 2008.
[25] Y. Sankarasubramaniam, I. Akyildiz, and S. McLaughlin. Energy efficiency
[26] T. Schmid. Time in Wireless Embedded Systems. PhD thesis, UCLA, 2009.
[27] T. Schmid, P. Dutta, and M. Srivastava. High-resolution, low-power time
synchronization an oxymoron no more. In ACM/IEEE IPSN, 2010.
[28] B. Sirkeci-Mergen, A. Scaglione, and G. Mergen. Asymptotic analysis of
multistage cooperative broadcast in wireless networks. IEEE Trans. Inf. Theory,
52(6), 2006.
[29] F. Stann, J. Heidemann, R. Shroff, and M. Murtaza. RBP: Robust broadcast
propagation in wireless networks. In ACM SenSys, 2006.
[30] A. Swami, Q. Zhao, and Y. Hong. Wireless Sensor Networks: Signal Processing
and Communications. Wiley, 2007.
[31] Texas Instruments. CC2420 datasheet, 2007.
[32] Texas Instruments. MSP430F1611 datasheet, 2009.
[33] G. Werner-Allen, K. Lorincz, J. Johnson, J. Lees, and M. Welsh. Fidelity and
yield in a volcano monitoring sensor network. In USENIX OSDI, 2006.
[34] G. Werner-Allen, P. Swieskowski, and M. Welsh. MoteLab: A wireless sensor
network testbed. In ACM/IEEE IPSN, 2005.
[35] B. Williams and T. Camp. Comparison of broadcasting techniques for mobile
ad hoc networks. In ACM MobiHoc, 2002.
[36] S. Yoshida and F. Ikegami. A comparison of multipath distortion characteristics
among digital modulation techniques. IEEE Trans. Veh. Technol., 34(3), 1985.
[37] J. Zhao and R. Govindan. Understanding packet delivery performance in dense
wireless sensor networks. In ACM SenSys, 2003.
[38] T. Zhu, Z. Zhong, T. He, and Z.-L. Zhang. Exploring link correlation for
efficient flooding in wireless sensor networks. In USENIX NSDI, 2010.