The case for a network protocol isolation layer

Jung Il Choi, Maria A. Kazandjieva, Mayank Jain, Philip Levis

Research output: Chapter in Book/Report/Conference proceedingConference contribution

23 Scopus citations


Network protocols are typically designed and tested individually. In practice, however, applications use multiple protocols concurrently. This discrepancy can lead to failures from unanticipated interactions between protocols. In this paper, we argue that sensor network communication stacks should have an isolation layer, whose purpose is to make each protocol's perception of the wireless channel independent of what other protocols are running. We identify two key mechanisms the isolation layer must provide: shared collision avoidance and fair channel allocation. We present an example design of an isolation layer that builds on the existing algorithms of grant-to-send and fair queueing. However, the complexities of wireless make these mechanisms insufficient by themselves. We therefore propose two new mechanisms that address these limitations: channel decay and fair cancellation. Incorporating these new mechanisms reduces the increase in end-to-end delivery cost associated with concurrently operating two protocols by more than 60%. The isolation layer improves median protocol fairness from 0.52 to 0.96 in Jain's fairness index. Together, these results show that using an isolation layer makes protocols more efficient and robust. Copyright 2009 ACM.
Original languageEnglish (US)
Title of host publicationProceedings of the 7th ACM Conference on Embedded Networked Sensor Systems - SenSys '09
PublisherAssociation for Computing Machinery (ACM)
Number of pages14
ISBN (Print)9781605585192
StatePublished - 2009
Externally publishedYes

Bibliographical note

KAUST Repository Item: Exported on 2020-10-01
Acknowledgements: This work was supported by generous gifts from Intel Research,DoCoMo Capital, Foundation Capital, the NationalScience Foundation under grants #0615308 and #0846014,the King Abdullah University of Science and Technology(KAUST), Microsoft Research, scholarships from the SamsungScholarship Foundation and a Stanford Terman Fellowship.We would like to thank those who maintain Mirage andMoteLab for providing valuable community testbeds. Finally,we would like to thank the reviewers for their commentsand our shepherd, John Heidemann, for his help inimproving our paper.
This publication acknowledges KAUST support, but has no KAUST affiliated authors.


Dive into the research topics of 'The case for a network protocol isolation layer'. Together they form a unique fingerprint.

Cite this