Abstract
As the use of wireless sensor networks increases, the need for efficient and reliable broadcasting algorithms grows. Ideally, a broadcasting algorithm should have the ability to quickly disseminate data, while keeping the number of transmissions low. In this paper, we analyze the popular Trickle algorithm, which has been proposed as a suitable communication protocol for code maintenance and propagation in wireless sensor networks. We show that the broadcasting process of a network using Trickle can be modeled by a Markov chain and that this chain falls under a class of Markov chains, closely related to residual lifetime distributions. It is then shown that this class of Markov chains admits a stationary distribution of a special form. These results are used to analyze the Trickle algorithm and its message count. Our results prove conjectures made in the literature concerning the effect of a listen-only period. Besides providing a mathematical analysis of the algorithm, we propose a generalized version of Trickle, with an additional parameter defining the length of a listen-only period.
Similar content being viewed by others
1 Introduction
Wireless sensor networks (WSNs) have become more and more popular in the last few years and have many applications [1]. These networks consist of compact, inexpensive sensor units that can communicate with each other by wireless transmissions. They require efficient and reliable communication protocols that can quickly propagate new information, while keeping the number of transmissions low, in order to conserve energy and maximize the lifetime of the network. Several data dissemination protocols have been proposed in recent years for this purpose [3, 6, 13, 25].
In [13], the Trickle algorithm has been proposed in order to effectively and efficiently distribute and maintain code in wireless sensor networks. Trickle relies on a “polite gossip” policy to quickly propagate updates across a network of nodes. It uses a counter method to reduce the number of redundant transmissions in a network and to prevent a broadcast storm [17]. This makes Trickle also a very energy-efficient and popular method of maintaining a sensor network. The algorithm has been standardized by the IETF as the mechanism that regulates the transmission of the control messages used to create the network graph in the IPv6 Routing Protocol for Low power and Lossy Networks (RPL) [24]. Additionally, it is used in the Multicast Protocol for Low power and Lossy Networks (MPL), which provides IPv6 multicast forwarding in constrained networks and is currently being standardized [10]. Since the algorithm has such a broad applicability, the definition of Trickle has been documented in its own IETF RFC 6206 [12].
Because of the popularity of the algorithm, it is crucial to gain insight into how the various Trickle parameters influence network performance measures, such as energy consumption, available bandwidth, and latency. It is clear that such insights are crucial for optimizing the performance of wireless sensor networks. However, there are only a few results in that regard, most of them obtained via simulation studies [4, 13, 14].
Some analytical results are obtained in [2, 11, 14, 15]. First, in [14], qualitative results are provided for the scalability of the Trickle algorithm, but a complete analysis is not given. More specifically, the authors of [14] state that in a lossless single-cell network without a listen-only period, the expected number of messages per time interval scales as \({{\mathcal {O}}}(\sqrt{n})\). Here \(n\) is the number of nodes in the network and, adopting the terminology of [14], single-cell means that all the nodes in the network are within communication range from each other. Supposedly, introducing a listen-only period bounds the expected number of transmissions by a constant. The analysis in our paper confirms these claims and provides more explicit results. Secondly, in [11], a model is developed for estimating the message count of the Trickle algorithm in a multi-cell network, assuming a uniformly random spatial distribution of the nodes in the network. However, the influence of specific Trickle parameters on the message count is not explicitly addressed. Lastly, in [2, 15], analytical models are developed for the time it takes the Trickle algorithm to update a network. To the best of the authors’ knowledge, no other analytical models for the performance of the Trickle algorithm have been published yet.
The goal of this paper is to develop and analyze stochastic models describing the Trickle algorithm and gain insight in how the Trickle parameters influence inter-transmission times and the message count. These insights could help optimize the energy-efficiency of the algorithm and consequently the lifetime of wireless sensor networks. Furthermore, knowing how the inter-transmission times depend on the various parameters could help prevent hidden-node problems in a network and optimize the capacity of wireless sensor networks. Additionally, our models are relevant for the analysis of communication protocols that build upon Trickle, such as RPL [24], MPL [10], CTP [8] and Deluge [9], and could give insight into their performance.
As key contributions of this paper, we first propose a generalized version of the Trickle algorithm by introducing a new parameter \(\eta \), defining the length of a listen-only period. This addition proves to be useful for optimizing the design and usage of the algorithm. Furthermore, we derive the distribution of an inter-transmission time and the joint distribution of consecutive inter-transmission times for large-scale single-cell networks. We show how they depend on the Trickle parameters and investigate their asymptotic behavior. Additionally, we show that in a single-cell network without a listen-only period, the expected number of transmissions per time interval is unbounded and grows as \(\sqrt{2n} \varGamma \left[ \frac{k+1}{2}\right] /\varGamma \left[ \frac{k}{2}\right] \), where \(k\) is called the redundancy constant and \(n\) the number of nodes as before. When a listen-only period of \(\eta >0\) is introduced, the message count is bounded by \(k/\eta \) from above. We then use the results from the single-cell analysis to develop an approximation for the transmission count in multi-cell networks. All our results are compared and validated with simulation results and prove to be accurate, even for networks consisting of relatively few nodes.
Lastly, as an additional contribution of a more theoretical nature, we analyze a general class of Markov chains, closely related to residual lifetime distributions and provide the general stationary distribution for this class of chains. Compared with [16], which the present paper is based on, this contribution is the most important addition.
1.1 Organization of the paper
The remainder of this paper is organized as follows. In Sect. 2, we give a detailed description of the Trickle algorithm. Furthermore, we introduce a new parameter defining the length of a listen-only period and discuss its relevance. Then, in Sect. 3, we first briefly list the main results, before presenting the details of the model and its analysis. In Sect. 4, we develop a mathematical model describing the behavior of the Trickle algorithm in large-scale single-cell networks. This is followed by an analysis of a special class of Markov chains in Sect. 5 and we use the results from this analysis to analyze our original model in Sect. 6. In Sect. 7, we then validate our findings with simulations. In Sect. 8, we use the results from Sect. 6 to approximate the message count in multi-cell networks and we again compare our approximations with simulation results. In Sect. 9, we make some concluding remarks.
2 The Trickle algorithm
The Trickle algorithm has two main goals. First, whenever a new update enters the network, it must be propagated quickly throughout the network. Secondly, when there is no new update in the network, communication overhead has to be kept to a minimum.
The Trickle algorithm achieves this by using a “polite gossip” policy. Nodes divide time into intervals of varying length. During each interval, a node will broadcast its current information if it has heard fewer than, say, \(k\) other nodes transmit the same information during that interval, in order to check if its information is up to date. If it has recently heard at least \(k\) other nodes transmit the same information it currently has, it will stay quiet, assuming there is no new information to be received. Additionally, it will increase the length of its intervals, decreasing its broadcasting rate. Whenever a node receives an update or hears outdated information, it will reduce the length of its intervals, increasing its broadcasting rate, in order to quickly update nodes that have outdated information. This way inconsistencies are detected and resolved quickly, while keeping the number of transmissions low.
2.1 Algorithm description
We now describe the Trickle algorithm in its most general form (see also [13]). The algorithm has four parameters:
-
A threshold value \(k\), called the redundancy constant.
-
The maximum interval length \(\tau _h\).
-
The minimum interval length \(\tau _l\).
-
The listen-only parameter \(\eta \), defining the length of a listen-only period.
Furthermore, each node in the network has its own timer and keeps track of three variables:
-
The current interval length \(\tau \).
-
A counter \(c\), counting the number of messages heard during an interval.
-
A broadcasting time \(\theta \) during the current interval.
The behavior of each node is described by the following set of rules:
-
1.
At the start of a new interval, a node resets its timer and counter \(c\) and sets \(\theta \) to a value in \([\eta \tau ,\tau ]\) uniformly at random.
-
2.
When a node hears a message that is consistent with the information it has, it increments \(c\) by 1.
-
3.
When a node’s timer hits time \(\theta \), the node broadcasts its message if \(c<k\).
-
4.
When a node’s timer hits time \(\tau \), it doubles its interval length \(\tau \) up to \(\tau _h\) and starts a new interval.
-
5.
When a node hears a message that is inconsistent with its own information, then if \(\tau >\tau _l\) it sets \(\tau \) to \(\tau _l\) and starts a new interval, otherwise it does nothing.
In Fig. 1, an example is depicted of a network consisting of three nodes using the Trickle algorithm with \(k=1\) and \(\tau =\tau _h\) for all nodes. During the first interval, node 3 is the first node that attempts to broadcast and consequently it is successful. The broadcasts of nodes 1 and 2 during that interval are then suppressed. During the second interval, the broadcast of node 2 suppresses the other broadcasts.
Note that in the example in Fig. 1, the intervals of the three nodes are synchronized. However, in general, the times at which nodes start their intervals need not be synchronized. In a synchronized network, all the nodes start their intervals at the same time, while in an unsynchronized network, this is not necessarily the case. In practice, networks will generally not be synchronized, since synchronization requires additional communication and consequently imposes energy overhead. Furthermore, as nodes get updated and start new intervals, they automatically lose synchronicity.
2.2 The listen-only parameter \(\eta \)
Note that the parameter \(\eta \) is not introduced in the description of the Trickle algorithm in [12] and [13]. We have added this parameter ourselves, so we can analyze a more general version of the Trickle algorithm. The authors of [13] propose always using a listen-only period of half an interval, i.e., \(\eta =\frac{1}{2}\), because of the so-called short-listen problem, which is discussed in the same paper. When no listen-only period is used, i.e., \(\eta =0\), sometimes nodes will broadcast soon after the beginning of their interval, listening for only a short time, before anyone else has a chance to speak up. If we have a perfectly synchronized network, this does not give a problem, because the first \(k\) transmissions will simply suppress all the other broadcasts during that interval. However, in an unsynchronized network, if a node has a short listening period, it might broadcast just before another node starts its interval and that node possibly also has a short listening period. This possibly leads to a lot of redundant messages and is referred to as the short-listen problem.
In [13], it is claimed that not having a listen-only period and \(k=1\) makes the number of messages per time interval scale as \({{\mathcal {O}}}(\sqrt{n})\), due to the short-listen problem. When a listen-only period of \(\tau /2\) is used, the expected number of messages per interval is supposedly bounded by 2, resolving the short-listen problem and improving scalability.
However, introducing a listen-only period also has its disadvantages. Firstly, when a listen-only period of \(\tau /2\) is used, newly updated nodes will always have to wait for a period of at least \(\tau _l/2\) before attempting to propagate the received update. Consequently, in an \(m\)-hop network, the end-to-end delay is at least \(m\frac{\tau _l}{2}\). Hence, a listen-only period greatly affects the speed at which the Trickle algorithm can propagate updates. To prevent this, it has been proposed in [15] to dynamically adjust \(\eta \), based on how new the current information of a node is, greatly increasing propagation speed.
Secondly, introducing a listen-only period has a negative effect on the load distribution. This is illustrated by Fig. 2, where node 2’s broadcasting intervals completely overlap with node 1’s listen-only periods and vice versa. Consequently, one node will always transmit and suppress the other node’s transmissions, depending on which node first starts broadcasting. The probability of having an uneven load distribution increases as \(\eta \) increases.
For these reasons, one might want to consider using a listen-only period of different lengths, which raises the question of what length is optimal. Therefore, we have added the parameter \(\eta \), which allows us to investigate the effect of using a listen-only period of general length on the message count.
3 Main results for single-cell networks
In this section, we first briefly list the main results concerning the message count and scalability of the Trickle algorithm in single-cell networks. In the following sections, we will then discuss the analytical model and its analysis leading to these results.
We consider a steady-state regime, where all nodes are up to date and their interval lengths have settled to \(\tau =\tau _h\) and without loss of generality, we will assume that \(\tau _h=1\). In this steady-state regime, as dictated by the Trickle algorithm, nodes still need to repeat the information they have, in order to be able to detect possible inconsistencies within the network. However, if no new information enters the network for a long period of time, all communication during this time is essentially redundant; hence, message count is the critical performance measure. When new information enters the network, nodes should quickly disseminate it and return to this steady-state regime.
We denote by \(N^{(k,n)}\) the number of transmissions during an interval of length \(\tau _h\) for a given threshold value \(k\) in a single-cell network consisting of \(n\) nodes. Additionally, let us denote an inter-transmission time for a given value of \(k\) and cell-size \(n\) by \(T^{(k,n)}\). Whenever we write \(a(n)\sim b(n)+c\), where \(c\) is a constant, this means \(a(n)-c\) is approximately equal to \(b(n)\) as \(n\) grows large. More formally
First we look at the case \(k=1\). We show that the cumulative distribution function of \(T^{(1,n)}\) for large \(n\) behaves as
This lets us deduce that
We conclude that \({{\mathbb {E}}}[N^{(1,n)}]\sim \sqrt{\frac{2n}{\pi }}\), when \(\eta =0\). This proves the claim from [13] that when no listen-only period is used, \({{\mathbb {E}}}[N^{(1,n)}]={{\mathcal {O}}}(\sqrt{n})\), and shows that the pre-factor is \(\sqrt{\frac{2}{\pi }}\). Furthermore, when \(\eta >0\), Trickle scales well and \({{\mathbb {E}}}[N^{(1,n)}]\uparrow \frac{1}{\eta }\), with a convergence rate of \(\sqrt{n}\), proving another claim from [13].
For the case \(k\ge 2\), we first derive the density function for the distribution of \(k-1\) consecutive inter-broadcasting times. We then use this result to deduce that the density function of the distribution of \(T^{(k,n)}\) for large \(n\) behaves as
Here
and
Additionally, we find for the \(j\)th moment of \(T^{(k,n)}\):
Hence, for \(\eta =0\), \({{\mathbb {E}}}[N^{(k,n)}]\sim \sqrt{2n}\varGamma \left[ \frac{k+1}{2}\right] /\varGamma \left[ \frac{k}{2}\right] \), which is again \({{\mathcal {O}}}(\sqrt{n})\). Moreover, when \(\eta >0\), \({{\mathbb {E}}}[N^{(k,n)}]\uparrow \frac{k}{\eta }\), as \(n \rightarrow \infty \), with a convergence rate of \(\sqrt{n}\).
We then use these results to derive the asymptotic distributions of inter-broadcasting times. When \(\eta >0\) and \(k\ge 2\), we show that
and
For the case \(\eta =0\), we show that the density function \(f^{(k)}(t)\) of the limiting distribution of \(\sqrt{\frac{n}{2}}T^{(k,n)}\) as \(n\rightarrow \infty \) satisfies
where
Lastly we show that
4 Modeling the broadcasting process
In this section, we develop a mathematical model describing the Trickle broadcasting process, which allows us to analyze the message count in single-cell networks. Suppose we have a single-cell network consisting of \(n\) nodes which are all perfect receivers and transmitters. Furthermore, we assume that all nodes are up to date and \(\tau =\tau _h=1\) for all nodes. Lastly, we assume that the interval skew of the nodes is uniformly distributed, meaning each node has one interval starting at some time in the interval \([0,1)\) uniformly at random.
In order to analyze the message count, we treat the process of nodes attempting to broadcast as a Poisson process with rate \(n\). This assumption is motivated by the following lemma, which shows that the properly scaled process of nodes attempting to broadcast behaves as a Poisson process with rate \(1\) as \(n\) grows large.
Lemma 1
Let \(N_n\) be the point process of times that nodes attempt to broadcast in a single cell consisting of \(n\) nodes with \(\eta \in [0,1]\). Then if we dilate the timescale by a factor \(n\), the process \(N_n\) converges weakly to a Poisson process with rate 1 as \(n\) grows large.
Proof
See Appendix.\(\square \)
Let us denote the PDF and CDF of an inter-transmission time \(T_P^{(k,n)}\) for this process with Poisson broadcasting attempts by \(f^{(k,n)}(t)\) and \(F^{(k,n)}(t)\), respectively. Recall that by \(T^{(k,n)}\) we denote an inter-transmission time for a given value of \(k\) and cell-size \(n\) for the original Trickle broadcasting process, which is not Poisson. We will use the fact that the distribution function of \(T_P^{(k,n)}\) will tend to provide an accurate approximation for that of \(T^{(k,n)}\) for large \(n\) (because of Lemma 1), but the derivation of explicit error bounds or limit theorems is outside the scope of the present paper. It is important to keep in mind that we are analyzing the Poisson broadcasting process, and all results for \(T^{(k,n)}\) (and \(N^{(k,n)}\)) are only true asymptotically, for \(n\rightarrow \infty \).
4.1 \(k=1\)
We first consider the case \(k=1\). Suppose at time \(0\), a broadcast occurs. Now assume at time \(t\), a node ends its listening period and attempts to broadcast. In order for the node’s transmission not to be suppressed, it must have started its listening period after time 0. If it started listening before this time, it would have heard the transmission at time \(0\) and its broadcast would have been suppressed. This means that the node’s broadcast will be successful if its corresponding timer was smaller than \(t\). Since broadcasting times are picked uniformly in \([\eta ,1]\), this probability is 0 if \(t<\eta \) and \(\frac{t-\eta }{1-\eta }\) otherwise. Hence, if we define \(\lambda (t)\) to be the instantaneous rate at which successful broadcasts occur, we can write
It is well known that the hazard rate \(\lambda (t)=\frac{f^{(1,n)}(t)}{1-F^{(1,n)}(t)}\) uniquely determines \(F^{(1,n)}(t)={{\mathbb {P}}}[T_P^{(1,n)}\le t]\) (see [7], Theorem 2.1):
Hence, \(\sqrt{\frac{n}{1-\eta }}(T_P^{(1,n)}-\eta )\) is a Rayleigh distributed random variable with scale parameter \(\sigma =1\). Therefore,
We conclude
Hence, for the case \(\eta =0\), we find \({{\mathbb {E}}}[N^{(1,n)}]\sim \sqrt{\frac{2n}{\pi }}\). This proves the claim from [13] that \({{\mathbb {E}}}[N^{(1,n)}]={{\mathcal {O}}}(\sqrt{n})\) when no listen-only period is used. For \(\eta >0\), we get from (14) that
This implies \({{\mathbb {E}}}[N^{(1,n)}]\uparrow \frac{1}{\eta }\) from below, proving the claim that introducing a listen-only period bounds the number of transmissions per interval by a constant.
4.2 \(k\ge 2\)
We now look at \(k\ge 2\), starting by examining the case \(k=2\). We can apply similar reasoning as we did for the case \(k=1\). Suppose again that at time \(0\) a broadcast occurs and let \(-T_{-1}\) be the time of the last broadcast before time \(0\). Now similarly to before, a broadcasting attempt at time \(t\) will be successful if the corresponding node started its listening interval after time \(-T_{-1}\). Hence, the instantaneous rate at which successful broadcasts occur conditioned on \(T_{-1}=\nu \) is given by
Hence,
This tells us that for \(k=2\), the sequence of consecutive inter-transmission times \(\varvec{T_P^{(2,n)}}=\{T_{P,i}^{(2,n)}\}_{i=0}^\infty \) forms a Markov chain with transition probabilities as in (17).
For the general case \(k\ge 2\), the same reasoning applies. Suppose again that at time \(0\), a broadcast occurs and let \(-T_{-(k-1)}\) be the time of the \((k-1)\hbox {th}\) broadcast before time 0. Then a broadcasting attempt at time \(t\) will be successful if the corresponding node started its listening interval after time \(-T_{-(k-1)}\). Hence, the instantaneous rate at which broadcasts occur conditioned on \(T_{-(k-1)}=\nu \) is again given by Eq. (16). Thus, in general, the sequence \(\varvec{T_P^{(k,n)}}=\left\{ \left( T^{(k,n)}_{P,i},\ldots , T^{(k,n)}_{P,i+k-2}\right) \right\} _{i=0}^\infty \) forms a Markov chain. Moreover, as we will show in the next section, this Markov chain is a specific case of a class of Markov chains closely related to residual lifetime distributions.
5 Markov chains of residual lifetimes
In order to analyze the Markov chain \(\varvec{T_P^{(k,n)}}\) and determine its steady-state distribution, it will help us to first study a more general class of Markov chains. The most important result of this section is the following theorem.
Theorem 1
Let \(Y\) be a continuous random variable with support \((a,b)\) for some \(a\ge 0\) and \(b>0\) and where we allow \(b=\infty \). Denote by \(F(y)\) the cumulative distribution function of \(Y\). Let \(\varvec{X}=\{X_i\}_{i=1}^\infty \) be an \(m\)-dependent sequence with probability transition function of the following specific form:
Then, if \({{\mathbb {E}}}[Y^{m}]<\infty \),
Remark 1
The distribution function in Eq. (19) can be interpreted as the stationary distribution of the \(m\)th iterated overshoot of a renewal process with inter-renewal distribution \(F(\cdot )\): see [23]. That is, the residual of the residual of the residual\(\ldots \) of \(Y\) iterated \(m\) times.
In preparation for the proof of Theorem 1, we shall first study the sequence \(\varvec{X_{m}}=\{(X_i, \ldots , X_{i+m-1})\}_{i=1}^\infty \). Define \(\bar{F}(y)=1-F(y)\) and let \(\varLambda (y) = -\log [\bar{F}(y)]\) be the cumulative hazard function of \(Y\). Note that we can write \(F(y)=1-e^{-\varLambda (y)}\). Clearly, \(\varvec{X_{m}}\) constitutes a Markov chain with state space \({{\mathcal {X}}}=\{x\in {{\mathbb {R}}}^m: \sum _{j=1}^mx_j\le b \text { and } x_i\ge 0 \text { for } 1\le i\le m\}\) and Markov transition function \(P\) as in (18). That is
We show the following
Theorem 2
An invariant measure of the chain \(\varvec{X_m}\) is given by
where \(C_m\) is a constant.
Proof
\(\square \)
If \({{\mathbb {E}}}[Y^m]<\infty \), then (21) can be normalized with a constant \(C_m\) that satisfies
where we have used the following lemma:
Lemma 2
Let \(m\in {{\mathbb {N}}}\) and \(G(x)\) be a positive real-valued integrable function. Assume that \(\int _0^\infty x^m G(x)\text {d}x < \infty \), then
Proof
By writing \(x=\sum _{i=1}^{m+1}x_i\) and a change of variables, we can write
The inner \(m\)-tuple integral is equal to the volume of the \(m\)-dimensional simplex given by \(\{(x_1,\cdots ,x_m)\, \vert \,\sum _{i=1}^{m}x_i\le x\text { and }x_i\ge 0\text { for }1\le i \le m\}\), which is known to be \(x^m/m!\) [19]. Applying this result completes the proof.\(\square \)
Remark 2
In general, the steady-state joint cumulative distribution function of \(\varvec{X_m}\) cannot be written as neatly as its density (21). However, one can show through induction that its multivariate Laplace transform is given by
where \({{\mathcal {L}}}_Y(s)=\int _0^\infty e^{-s y}\text { d}F(y)\) is the Laplace-Stieltjes transform of \(Y\).
In Theorem 2, we have established that the chain \(\varvec{X_m}\) has an invariant measure \(\pi \) as given in (21). We now proceed to show that the density function of \(\varvec{X_m}\) also converges to \(\pi \) as in (21) with normalization constant as given in (22) for any starting vector \(x \in {{\mathcal {X}}}\), if \({{\mathbb {E}}}[Y^m]<\infty \).
Given the existence of a strictly positive finite invariant measure \(\pi \), inspection of Theorem 4 in [18] shows that if the chain \(\varvec{X_m}\) is aperiodic and \(\phi \)-irreducible, then the distribution of \(\varvec{X_m}\) will converge to the distribution associated with the invariant measure given in (21).
It follows easily from the fact that \(Y\) has support \((a,b)\) for some \(a\ge 0\) and \(b>0\) that \(\varvec{X_m}\) is aperiodic. Furthermore, \(\phi \)-irreducibility of the chain (i.e., having positive probability of reaching every set \(A\) with \(\phi (A)> 0\) from every state \(x\in {{\mathcal {X}}}\), for some nonzero measure \(\phi (\cdot )\)) is also easy to verify. We can take \(\phi (A)=\mu _L(A\cap {{\mathcal {X}}})\), where \(\mu _L(\cdot )\) denotes the Lebesgue measure on \({{\mathbb {R}}}^{m}\). Starting from any \(x\in {{\mathcal {X}}}\), the chain is able to move to the set \(\{x\in {{\mathbb {R}}}^m: \min (x_1, \ldots , x_m) \ge a\}\) within \(m\) steps, and from there it can reach any other set in \({{\mathcal {X}}}\) within \(m\) steps. Hence, under the conditions of Theorem 1, \(\varvec{X_m}\) is aperiodic and \(\phi \)-irreducible.
Now, with the stationary density function of \(\varvec{X_m}\), we can also determine the associated steady-state density of the process \(\varvec{\varSigma }=\left\{ \sum _{j=0}^{m-1}X_{i+j}\right\} _{i=1}^\infty \), which we will denote by \(\pi _\varSigma \). Using (21), we find
We are now in a position to prove Theorem 1.
Proof of Theorem 1
We already derived that under the conditions of Theorem 1, the density of \(\varvec{X_m}\) will converge to the normalized version of the expression given in Eq. (21). Consequently, the density of \(\varvec{\varSigma }\) will converge to (24). Therefore, we can write the limiting stationary distribution of \(\varvec{X}\) as
Hence, we have proven Theorem 1.\(\square \)
Lastly, we use (19) to derive the moments of the stationary distribution of \(\varvec{X}\). For all \(j\in {{\mathbb {N}}}\) such that \({{\mathbb {E}}}[Y^{m+j}]<\infty \),
where we have used the following lemma:
Lemma 3
Let \(m\in {{\mathbb {N}}}\) and \(G(x)\) be a positive real-valued integrable function. Assume that \(\int _0^\infty x^{m+j+1} G(x)\text {d}x < \infty \), then
Proof
Write \(z=x+y\), then
The last equality follows from a known identity involving the reciprocal of binomial coefficients (see [21], Corollary 2.2). \(\square \)
We will now use the results from this section to analyze the Markov chain \(\varvec{T_P^{(k,n)}}\) from Sect. 4.
6 Inter-transmission time distributions and message count
We return to the model from Section 4. We already deduced that the sequence \(\varvec{T_P^{(k,n)}}=\left\{ \left( T^{(k,n)}_{P,i}, \ldots T^{(k,n)}_{P,i+k-2}\right) \right\} _{i=0}^\infty \) forms a Markov chain. Moreover, we showed that for \(k\ge 2\),
with \(\lambda (t\,\vert \,\nu )\) as in (16). Since \(T_{-(k-1)}\) is actually the sum of the previous \(k-1\) inter-broadcasting times, we find that (27) is of the form as in (18) with \(m=k-1\). Further examination then gives that for this case \(Y\sim T_P^{1,n}\) and \(F(t)\) is given by (12). Now, since all the moments of \(T_P^{1,n}\) are finite and \(T_P^{1,n}\) has support \((\eta ,\infty )\), Theorem 1 applies, and we can apply all the results from the previous Sect. to \(\varvec{T_P^{(k,n)}}\).
Recall that by \(f^{(k,n)}(t)\) and \(F^{(k,n)}(t)\), we denote the steady-state PDF and CDF of a transmission time \(T_P^{(k,n)}\), respectively. Additionally, let us denote the steady-state joint probability density function of \(k-1\) consecutive inter-transmission times by \(\tilde{f}^{(k,n)}(t_1, \ldots , t_{k-1})\) and let \(f_\varSigma ^{(k,n)}(s)\) be the steady-state probability density function of the sequence \(\varvec{\varSigma ^{(k,n)}}=\{\sum _{j=0}^{k-2}T^{(k,n)}_{P,i+j}\} _{i=0}^\infty \).
It then follows directly from (21) that
Here the normalization constant \(C_{(k,n)}\) satisfies
Alternatively, by a change of variables and splitting the integral, we can write (29) in terms of a finite sum as
which more clearly reveals the role of some of the parameters.
There are two important observations we can make regarding the constant \(C_{(k,n)}\). First, for \(\eta =0\), (29) reduces to \(C_{(k,n)}=(2n)^{\frac{k-1}{2}}\varGamma [k/2]/\sqrt{\pi }\). Secondly, for \(\eta >0\), we have that \(C_{(k,n)} \downarrow \frac{(k-1)!}{\eta ^{k-1}}\) as \(n\) grows large.
Let us now look at the sequence \(\varvec{\varSigma ^{(k,n)}}\), i.e., the sequence of the sum of \(k-1\) consecutive inter-transmissions times. Equation (24) immediately gives its steady-state probability density function:
Finally, Eq. (19) gives
and equivalently,
Substitution of Eq. (16) reduces the right-hand side of (32) for \(t<\eta \) to
and for \(t\ge \eta \), the right-hand side reduces to
Lastly, we focus our attention on the moments of an inter-transmission time \(T^{(k,n)}\). Applying (26), we find for the first moment of \(T^{(k,n)}\)
For the case \(\eta =0\), this implies
which is again \({{\mathcal {O}}}(\sqrt{n})\), as was conjectured in [13].
When a listen-only period is used, i.e., \(\eta >0\),
implying that \({{\mathbb {E}}}[N^{(k,n)}]\uparrow \frac{k}{\eta }\) from below as \(n\rightarrow \infty \). This implies that for \(\eta >0\), the expected number of messages per interval is bounded by a constant and shows that Trickle scales well.
Again using (26), we obtain the following expression for the \(j\hbox {th}\) moment of an inter-transmission time
For the special case \(\eta =0\), this reduces to
For the case \(\eta >0\), we deduce
6.1 Limiting distributions
The previous analysis allows us to determine the limiting distributions of \(T^{(k,n)}\) as \(n\) and \(k\) grow large. We distinguish between two cases.
Case 1: \({\eta }>0\).
First, Eq. (40) implies that for \(\eta >0\) and \(k\ge 2\),
since all moments converge to the moments of the Beta distribution. For the density function of \(T_P^{(k,n)}\) (and hence also that of \(T^{(k,n)}\)), this implies that as \(n\rightarrow \infty \),
Furthermore, since \(k\text {Beta}(1,k)\xrightarrow {d}\text {Exp}(1)\) for \(k\rightarrow \infty \),
We can relate this result to Equation (28). We know that the sum of \(k\) consecutive inter-transmission times converges to \(\eta \) as \(n\rightarrow \infty \). Equation (28) then tells us that if we look at an interval of length \(\eta \), \(k-1\) broadcasting times are distributed uniformly in this interval, when \(n \rightarrow \infty \). Therefore, if we scale time by a factor \(k\), we will see a Poisson process with intensity 1, as \(k\rightarrow \infty \), and expect to see exponential inter-broadcasting times, which is in agreement with (43).
Case 2: \({\eta }=0\).
For the case \(\eta =0\), we can write the density function \(f^{(k)}(t)\) of the limiting distribution of \(\sqrt{\frac{n}{2}}T^{(k,n)}\) for \(k\ge 2\) after scaling Equation (34) as
Alternatively, performing integration by parts gives
Combining (44) and (45), we find after some rewriting
Direct computation gives
and
All other distribution functions then follow from Equation (46). Additionally, from Equation (39), we have
Using the fact that
we find
This finally implies that
since all moments converge to the moments of the exponential distribution.
The last result can be related to Lemma 1. If we look at the special case \(k=n\), we know all broadcasting attempts will be successful. Hence, the process of nodes broadcasting will be the same as the process of nodes attempting to broadcast, from which we know it converges to a Poisson process with rate 1, as \(n\rightarrow \infty \), if we scale time by a factor \(n\), because of Lemma 1. Furthermore, (49) also tells us that for this case, if we scale time by a factor \(n\), we expect to see exponential inter-transmission times with rate 1. So these results are in good agreement with each other.
6.2 Discussion of results
We briefly discuss the implications of our results. First, Equation (36) gives us insight into the effects of the short-listen problem. We found that without a listen-only period, the number of transmissions per time unit scales as \({{\mathcal {O}}}(\sqrt{n})\), due to the short-listen problem. However, by introducing a listen-only period, the expected number of transmissions per interval is bounded by \(k/\eta \): see (37). Hence, having \(\eta =\frac{1}{2}\) as suggested in [13] reduces the number of redundant transmissions and resolves the short-listen problem.
However, one could also consider using lower values of \(\eta \). For example, one could consider setting \(\eta =\frac{1}{4}\). We know this roughly doubles the expected number of redundant transmissions, but it could also double the propagation speed. Indeed, whenever a node gets updated, it only has to wait for a period of at least \(\tau _l/4\) before propagating the update, as opposed to a period of \(\tau _l/2\). Hence, the choice of \(\eta \) involves a trade-off. Lowering \(\eta \) increases not only the propagation speed, but also the number of transmissions. In order to get a full understanding of this trade-off, more knowledge is needed on the propagation speed of the algorithm. Combined with results from this paper, this knowledge could provide guidelines for how to optimally set the Trickle parameters and the length of the listen-only period.
Second, Eqs. (12), (31), (42), (43), (46), and (49) provide insight in the distributions of inter-transmission times. In our derivations, we have assumed that transmissions are instantaneous. However, in reality, transmissions take some time, although this time is generally short compared to the interval length \(\tau _h\). Using the inter-transmission time distributions, one can estimate the probability that transmissions would overlap in time and hence interfere. Potentially, one can use this knowledge to optimize the medium access protocol and the capacity of the wireless network. Therefore, the impact of having non-instantaneous transmissions on the performance of Trickle is an interesting topic for future research.
7 Simulation results
The model we have developed assumes that the process of nodes attempting to broadcast is Poisson with rate \(n\). Lemma 1 shows that this is true as \(n\) grows large. We now investigate how well this assumption holds in networks with only a few nodes. In order to do so, we compare our analytic results for the message count and the distribution of inter-transmissions times with simulations done in Mathematica. We simulate a lossless single-cell network using the Trickle algorithm, where transmissions occur instantaneously.
In Fig. 3, we compare simulation results for the case \(\eta =0\) with the analytic results from Eq. (36). For each combination of \(k\) and \(n\), we simulate a network consisting of \(n\) nodes using the Trickle algorithm and average over \(10^3\) runs of 100 virtual time units. Each run, we use a different interval skew chosen uniformly at random for each of the nodes. We see that the simulation results and the analytic results coincide very well, even for small cell-sizes, and that the analytic results provide a conservative estimate for the mean number of transmissions per interval.
In Fig. 4, we compare simulation results for the case \(\eta =0\), \(k=1\), and \(n=50\) with the analytic results from Eq. (12). We show a histogram of the observed inter-transmission times obtained from \(10^3\) runs of 100 virtual time units and the probability density function from (12). We see a very good match between the analytic result and simulations, even though we consider a network consisting of only 50 nodes.
In Fig. 5, we compare (32) with simulations for the case \(\eta =0\), \(k=3\), and \(n=50\). Again, both results are in good agreement with each other, despite the relatively small size of the network. Note, also, that the asymptotically exponential behavior from (49) can already be seen in the density plot.
In Fig. 6, we compare simulation results for the case \(\eta =\frac{1}{2}\) with analytic results from Eq. (37). Here, also, we find that the analysis gives an accurate estimate for the mean number of transmissions in small networks. From our analysis, we also know that \({{\mathbb {E}}}[N^{(k,n)}]\) should converge to \(2k\) as \(n\) grows large. From the graph, we see that this convergence is quite slow.
In Figs. 7 and 8, we compare simulation results for \(k=1\) and \(k=3\), respectively, with the analytic results from Eqs. (12) and (32), where \(\eta =\frac{1}{2}\) and \(n=50\). Like before, we see a very good match between the analytic results and simulations. Note, that the asymptotic behavior from (41) can already be recognized in the density plot of Fig. 8.
Additionally, we have simulated more realistic network settings in the OMNeT++ simulation tool. As mentioned in Sect. 6.2, in reality, transmissions do not occur instantaneously but take some time \(M\); hence, collisions can occur. To investigate the effect of not having instantaneous and possibly colliding transmissions, we have simulated the same scenarios as we did with Mathematica and compared the results. The simulator incorporates IEEE standard 802.15.4.
We find that the OMNeT++ and Mathematica simulations produce nearly indistinguishable results, which is not surprising. Since \(\tau _h\) tends to be very large compared to a transmission length \(M\), the probability of nodes trying to broadcast simultaneously tends to be very small. Furthermore, since we are dealing with a single-cell network, the CSMA/CA protocol prevents all collisions in the OMNeT++ simulations. Therefore, both simulators provide nearly the same results. Since the Mathematica simulations are computationally less demanding and much more easily reproducible, we have omitted the OMNeT++ simulation data.
8 Multi-cell network
Suppose now that we have a network consisting of \(n^2\) nodes placed on a square grid, where not all nodes are able to directly communicate with each other. Instead, each node has a fixed transmission range \(R\), which means that when a node sends a message, only nodes within a distance \(R\) of the broadcaster receive the message. While a fully-fledged analysis of multi-cell networks is beyond the scope of the present paper, we now briefly examine how the results for the single-cell scenario obtained in Sect. 6 can be leveraged to derive a useful approximation. We denote by \(N_{MC}^{(k,n,R)}\) the number of transmissions during an interval of length \(\tau _h\) for a given threshold value \(k\) in a cell consisting of \(n\times n\) nodes with broadcasting range \(R\). Hence, we are interested in determining the behavior of \({{\mathbb {E}}}\left[ N_{MC}^{(k,n,R)}\right] \).
8.1 Approximation
We will use the analytical results from Sect. 6 to develop an approximation for the expected number of transmissions per interval in multi-cell networks. Let us denote by \(S(R)\) the number of nodes a single broadcasting node having a broadcasting range of \(R\) can reach, i.e., the size of a single broadcasting-cell. Heuristically, we can reason as follows. We have an \(n\times n\) grid consisting of approximately \(n^2/S(R)\) distinct non-overlapping broadcasting-cells. Assuming each cell behaves independently of the others, we can approximate the expected number of transmissions per interval in the multi-cell case as follows:
Using the fact that \(S(R)\sim \pi R^2\) and Eqs. (36) and (37), we can get more insight into the behavior of our approximation. For \(\eta =0\), we have that as \(R\) grows large:
Similarly, when a listen-only period is used, i.e., \(\eta >0\), we have that as \(R\) grows large:
Consequently, we see how the short-listen problem potentially plays a role in multi-cell networks.
8.2 Simulations
We compare the approximation with simulations in order to evaluate its accuracy. We do so by plotting the ratio
In Mathematica, we simulate a network consisting of \(50\times 50\) nodes placed on a grid for several values of \(k\) and \(R\). For each combination of \(k\) and \(R\), we simulate a lossless multi-cell network for 100 virtual time units. Each run, we use a different randomly chosen interval skew for the nodes. We use toroidal distance in order to cope with edge effects.
In Fig. 9, we show a plot of (51) for the case \(\eta =0\). We see that the estimate given in Eq. (50) tends to slightly underestimate the number of transmissions per interval. However, the approximation is accurate within a factor 1.2. Furthermore, as \(k\) increases, the approximation becomes more accurate. We also note that for fixed \(k\), the accuracy remains fairly constant as \(R\) grows.
Finally, let us consider the effect of a listen-only period. In Fig. 10, we show a plot of (51) for the case \(\eta =\frac{1}{2}\). We see again that the estimate given in Eq. (50) tends to underestimate the number of transmissions per interval, more than for the case \(\eta =0\). The error slowly increases with the transmission range \(R\). However, as \(k\) increases, the approximation becomes more accurate.
Remark 3
In [11], a method is presented for estimating the message count in synchronized networks. It is shown that this method also gives an accurate approximation for unsynchronized networks with \(\eta =\frac{1}{2}\). However, the method is not suitable for smaller values of \(\eta \) and assumes a uniformly random spatial distribution of the nodes. Hence, if one is interested in listen-only periods of different length or regular network topologies, our approximation is preferable.
Remark 4
Given the way we derived our approximation, one can conclude that its performance strongly depends on the fact that we are considering a network which is very homogeneous in terms of node density. For networks that are more heterogeneous in terms of node density, one cannot easily decide what value to take for \(S(R)\); hence, approximating the message count becomes difficult. Moreover, as shown in [22], Trickle’s performance strongly depends on the network topology, which makes approximating the message count an even more difficult task.
9 Conclusion
In this paper, we presented a generalized version of the Trickle algorithm with a new parameter \(\eta \), which allows us to set the length of a listen-only period. This parameter can greatly increase the speed at which the algorithm can propagate updates, while still controlling the number of transmissions. Furthermore, we have shown that this parameter influences how the transmission load is distributed among nodes in a network. We then presented a mathematical model describing how the message count and inter-transmission times of the Trickle algorithm depend on its various parameters.
We showed that the broadcasting process in a single-cell network can be modeled as a Markov chain and that this chain falls under a special class of Markov chains, closely related to residual lifetimes. This class of Markov chains was then analyzed and its stationary distribution derived. For our model, these results lead to the distribution function of inter-transmission times and the joint distribution of consecutive inter-transmission times. We showed how they depend on the redundancy constant \(k\), the network-size \(n\), and the length of a listen-only period \(\eta \). We also investigated their asymptotic behavior as \(n\) and \(k\) go to infinity. These distributions give insight in the energy-efficiency of Trickle and the probability that nodes try to broadcast simultaneously. These insights contribute to optimizing the design and usage of the Trickle algorithm.
Specifically, we showed that in a network without a listen-only period, the expected number of transmissions grows as \({{\mathcal {O}}}(\sqrt{n})\), proving a conjecture from [13], and we identified that the pre-factor is \(\sqrt{2}\varGamma \left[ \frac{k+1}{2}\right] /\varGamma \left[ \frac{k}{2}\right] \). Additionally, we showed that, when a listen-only period is used, the number of transmissions per interval is bounded from above by \(\frac{k}{\eta }\), proving a second conjecture from [13] on the scalability of Trickle.
We have also performed a simulation study in Mathematica and the OMNeT++ simulation tool. We compared our analytic results, which hold for very large networks with instantaneous transmissions, with simulation results of small and more realistic wireless networks. We found a very good match between the analytic results and the simulations.
Additionally, we used the results from the single-cell analysis to get an approximation for the message count in multi-cell networks. These results were also compared to simulation results from Mathematica and the OMNeT++ simulation tool. The approximation proved to be fairly accurate, in particular, for small values of \(\eta \). A more comprehensive investigation of multi-cell networks and the influence of network topology on Trickle’s performance would be interesting topics for further research.
Finally, we note that the speed at which the Trickle algorithm can disseminate updates is discussed in [15]. Combined with results from this paper, this could provide insight in how to optimally set the Trickle parameters and the length of the listen-only period. Additionally, the impact of non-instantaneous broadcasts, interference, and combining Trickle with CSMA/CA on the performance of the Trickle algorithm is discussed in [20].
References
Akyildiz, I.F., Su, W., Sankarasubramaniam, Y., Cayirci, E.: Wireless sensor networks: a survey. Comput. Netw. 38(4), 393–422 (2002)
Becker, M., Kuladinithi, K., Görg, C.: Modelling and simulating the Trickle algorithm. In: Proceedings of the 3rd International Conference on Mobile Networks and Management, Monami ’11, pp. 135–144. Springer (2011)
Busnel, Y., Bertier, M., Fleury, E., Kermarrec, A.M.: GCP: Gossip-based code propagation for large-scale mobile wireless sensor networks. In: Proceedings of the 1st International Conference on Autonomic Computing and Communication Systems, Autonomics ’07, pp. 11:1–11:5 (2007)
Clausen, T., de Verdiere, A., Yi, J.: Performance analysis of Trickle as a flooding mechanism. In: Proceedings of the 15th IEEE Conference on Communication Technology, ICCT ’14, pp. 565–572 (2013)
Daley, D.J., Vere-Jones, D.: An Introduction to the Theory of Point Processes Vol. II. Probability and its Applications, vol. II. Springer, New York (2008)
Dong, W., Liu, Y., Wu, X., Gu, L., Chen, C.: Elon: enabling efficient and long-term reprogramming for wireless sensor networks. In: Proceedings of the ACM SIGMETRICS International Conference on Measurement and Modeling of Computer Systems, SIGMETRICS ’10, pp. 49–60 (2010)
Finkelstein, M.: Failure Rate Modelling for Reliability and Risk. Reliability Engineering. Springer, London (2008)
Gnawali, O., Fonseca, R., Jamieson, K., Kazandjieva, M., Moss, D., Levis, P.: CTP: An efficient, robust, and reliable collection tree protocol for wireless sensor networks. ACM Trans. Sens. Netw. 10(3) (2013)
Hui, J.W., Culler, D.: The dynamic behavior of a data dissemination protocol for network programming at scale. In: Proceedings of the 2nd International Conference on Embedded Networked Sensor Systems, SenSys ’04, pp. 81–94 (2004)
Hui, J., Kelsey, R.: Multicast Protocol for Low power and Lossy Networks (MPL). IETF, Internet-Draft http://tools.ietf.org/html/draft-ietf-roll-trickle-mcast-09 (2014)
Kermajani, H., Gomez, C., Arshad, M.H.: Modeling the message count of the Trickle algorithm in a steady-state, static wireless sensor network. IEEE Commun. Lett. 16(12), 1960–1963 (2012)
Levis, P., Clausen, T., Hui, J., Gnawali, O., Ko, J.: The Trickle algorithm. Internet RFC 6206, http://tools.ietf.org/html/rfc6206 (2011)
Levis, P., Patel, N., Culler, D., Shenker, S.: Trickle: A self-regulating algorithm for code propagation and maintenance in wireless sensor networks. In: Proceedings of the First USENIX/ACM Symposium on Networked Systems Design and Implementation, NSDI ’04, pp. 15–28 (2004)
Levis, P., Brewer, E., Culler, D., Gay, D., Madden, S., Patel, N., Polastre, J., Shenker, S., Szewczyk, R., Woo, A.: The emergence of a networking primitive in wireless sensor networks. Commun. ACM 51(7), 99–106 (2008)
Meyfroyt, T.M.M., Borst, S.C., Boxma, O.J., Denteneer, D.: A data propagation model for wireless gossiping. Perform. Eval. 85–86, 19–32 (2015)
Meyfroyt, T.M.M., Borst, S.C., Boxma, O.J., Denteneer, D.: Data dissemination performance in large-scale sensor networks. SIGMETRICS Perform. Eval. Rev. 42(1), 395–406 (2014)
Ni, S.Y., Tseng, Y.C., Chen, Y.S., Sheu, J.P.: The broadcast storm problem in a mobile ad hoc network. In: Proceedings of the 5th Annual ACM/IEEE International Conference on Mobile Computing and Networking, MobiCom ’99, pp. 151–162 (1999)
Roberts, G.O., Rosenthal, J.S.: General state space Markov chains and MCMC algorithms. Probability Surveys [electronic only] 1, 20–71 (2004). http://arxiv.org/pdf/math/0404033.pdf
Stein, P.: A note on the volume of a simplex. Am. Math. Monthly 73(3), 299–301 (1966)
Stolikj, M., Meyfroyt, T.M.M., Cuijpers, P.J.L., Lukkien, J.J.: Improving the performance of Trickle-based data dissemination in low-power networks. In: Wireless Sensor Networks, Lecture Notes in Computer Science, vol. 8965, pp. 186–201. Springer (2015)
Sury, B., Wang, T., Zhao, F.Z.: Identities involving reciprocals of binomial coefficients. J. Integer Seq. 7(2) (2004)
Vallati, C., Mingozzi, E.: Trickle-F: Fair broadcast suppression to improve energy-efficient route formation with the RPL routing protocol. In: Proceedings of the 3rd IFIP Conference on Sustainable Internet and ICT for Sustainability, SustainIT ’13, pp. 1–9 (2013)
van Beek, P., Braat, J.: The limits of sequences of iterated overshoot distribution functions. Stoch. Process. Appl. 1(4), 307–316 (1973)
Winter, T., Thubert, P., Brandt, A., Hui, J., Kelsey, R., Levis, P., Pister, K., Struik, R., Vasseur, J., Alexander, R.: RPL: IPv6 routing protocol for low-power and lossy networks. Internet RFC 6550, http://tools.ietf.org/html/rfc6550 (2012)
Yu, Y., Rittle, L.J., Bhandari, V., Lebrun, J.B.: Supporting concurrent applications in wireless sensor networks. In: Proceedings of the 4th International Conference on Embedded Networked Sensor Systems, SenSys ’06, pp. 139–152 (2006)
Acknowledgments
The authors would like to thank Guido Janssen for useful discussions regarding the integral equations presented in this paper. Additionally, they are grateful to Marc Aoun for his contributions to the performed OMNeT++ simulations. The research of the third author was done in the framework of the IAP BESTCOM program, funded by the Belgian government.
Author information
Authors and Affiliations
Corresponding author
Appendix: Proof of Lemma 1
Appendix: Proof of Lemma 1
In order to prove Lemma 1, we will use the following theorem (see [5], Proposition 11.2.VI).
Theorem 3
Let \(M\) be a simple stationary point process on \(X={{\mathbb {R}}}\) with finite intensity \(\lambda \), and let \(M_n\) denote the point process obtained by superposing \(n\) independent replicates of \(M\) and dilating the scale of \(X\) by a factor \(n\). Then as \(n\rightarrow \infty \), \(M_n\) converges weakly to a Poisson process with parameter measure \(\lambda \mu _L(\cdot )\), where \(\mu _L(\cdot )\) denotes the Lebesgue measure on \({{\mathbb {R}}}\).
Let \(N\) be the process of an arbitrary node’s broadcasting moments. Then evidently the superposition of \(n\) of these processes \(N_n\) gives us the process of broadcasting attempts by all the nodes in our cell. Hence, if we show that \(N\) is a simple stationary point process with finite intensity \(\lambda =1\), we can apply Theorem 3, resulting in Lemma 1.
Let \(\{B_i\}\), with \(i\in {{\mathbb {Z}}}\), be the sequence of broadcasting times for an arbitrary node defining our process \(N\). Then if we denote by \(S\) the interval skew and assume it is uniform, i.e., \(S\sim U[0,1]\), we can write
Here \(T_i\) represents the timer of the corresponding node in the \(i\)th interval; thus, \(T_i\sim U[\eta ,1]\). It is easy to see that \(N\) is a simple point process with intensity \(\lambda =1\).
It remains to show stationarity. Let \(N^s\) be the point process resulting from applying a shift operator to the process \(N\). That is, if \(\{B^s_i\}\), with \(i\in {{\mathbb {Z}}}\), is the sequence of events for the shifted process \(N^s\), we have
We show that \(\{B_i\}\) and \(\{B_i^s\}\), with \(i\in {{\mathbb {Z}}}\), have the same distribution, which means that the processes \(N\) and \(N^s\) coincide in distribution, implying stationarity. We first write
Now note that \(\left( S+s-\lfloor S+s\rfloor \right) \sim U[0,1] \sim S\). Furthermore, since the \(T_i\) are independent and identically distributed, \((i+\lfloor S+s\rfloor +T_i) \sim \left( i+\lfloor S+s\rfloor +T_{i+\lfloor S+s\rfloor }\right) \). Moreover, \(\left\{ i+\lfloor S+s\rfloor +T_{i+\lfloor S+s\rfloor }\right\} _{i\in {{\mathbb {Z}}}}\sim \{i+T_{i}\}_{i\in {{\mathbb {Z}}}}\). This allows us to conclude
Rights and permissions
Open Access This article is distributed under the terms of the Creative Commons Attribution License which permits any use, distribution, and reproduction in any medium, provided the original author(s) and the source are credited.
About this article
Cite this article
Meyfroyt, T.M.M., Borst, S.C., Boxma, O.J. et al. On the scalability and message count of Trickle-based broadcasting schemes. Queueing Syst 81, 203–230 (2015). https://doi.org/10.1007/s11134-015-9438-x
Received:
Revised:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11134-015-9438-x