{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T12:10:50Z","timestamp":1763467850512,"version":"3.41.0"},"reference-count":25,"publisher":"Association for Computing Machinery (ACM)","issue":"7","license":[{"start":{"date-parts":[[2008,7,1]],"date-time":"2008-07-01T00:00:00Z","timestamp":1214870400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Commun. ACM"],"published-print":{"date-parts":[[2008,7]]},"abstract":"<jats:p>The wireless sensor network community approached networking abstractions as an open question, allowing answers to emerge with time and experience. The Trickle algorithm has become a basic mechanism used in numerous protocols and systems. Trickle brings nodes to eventual consistency quickly and efficiently while remaining remarkably robust to variations in network density, topology, and dynamics. Instead of flooding a network with packets, Trickle uses a \"polite gossip\" policy to control send rates so each node hears just enough packets to stay consistent. This simple mechanism enables Trickle to scale to 1000-fold changes in network density, reach consistency in seconds, and require only a few bytes of state yet impose a maintenance cost of a few sends an hour. Originally designed for disseminating new code, experience has shown Trickle to have much broader applicability, including route maintenance and neighbor discovery. This paper provides an overview of the research challenges wireless sensor networks face, describes the Trickle algorithm, and outlines several ways it is used today.<\/jats:p>","DOI":"10.1145\/1364782.1364804","type":"journal-article","created":{"date-parts":[[2008,6,24]],"date-time":"2008-06-24T12:48:51Z","timestamp":1214311731000},"page":"99-106","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":49,"title":["The emergence of a networking primitive in wireless sensor networks"],"prefix":"10.1145","volume":"51","author":[{"given":"Philip","family":"Levis","sequence":"first","affiliation":[{"name":"Stanford University, Stanford, CA"}]},{"given":"Eric","family":"Brewer","sequence":"additional","affiliation":[{"name":"U.C. Berkeley, Berkeley, CA"}]},{"given":"David","family":"Culler","sequence":"additional","affiliation":[{"name":"U.C. Berkeley, Berkeley, CA"}]},{"given":"David","family":"Gay","sequence":"additional","affiliation":[{"name":"U.C. Berkeley, Berkeley, CA"}]},{"given":"Samuel","family":"Madden","sequence":"additional","affiliation":[{"name":"MIT CSAIL, Cambridge, MA"}]},{"given":"Neil","family":"Patel","sequence":"additional","affiliation":[{"name":"Stanford University, Stanford, CA"}]},{"given":"Joe","family":"Polastre","sequence":"additional","affiliation":[{"name":"Sentilla Corporation, Redwood City, CA"}]},{"given":"Scott","family":"Shenker","sequence":"additional","affiliation":[{"name":"U.C. Berkeley, Berkeley, CA"}]},{"given":"Robert","family":"Szewczyk","sequence":"additional","affiliation":[{"name":"Sentilla Corporation, Redwood City, CA"}]},{"given":"Alec","family":"Woo","sequence":"additional","affiliation":[{"name":"Arch Rock Corporation, San Francisco, CA"}]}],"member":"320","published-online":{"date-parts":[[2008,7]]},"reference":[{"key":"e_1_2_1_1_1","unstructured":"Arch Rock Corporation. An IPv6 Network Stack for Wireless Sensor Networks. http:\/\/www.archrock.com.  Arch Rock Corporation. An IPv6 Network Stack for Wireless Sensor Networks. http:\/\/www.archrock.com."},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/938985.939000"},{"key":"e_1_2_1_3_1","unstructured":"Crossbow Inc. Mote in Network Programming User Reference. http:\/\/webs.cs.berkeley.edu\/tos\/tinyos-1.x\/doc\/Xnp.pdf.  Crossbow Inc. Mote in Network Programming User Reference. http:\/\/webs.cs.berkeley.edu\/tos\/tinyos-1.x\/doc\/Xnp.pdf."},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/41840.41841"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/217382.217470"},{"key":"e_1_2_1_6_1","volume-title":"Proceedings of the Sixth Workshop on Hot Topics in Networks (HotNets VI)","author":"Fonseca R.","year":"2007","unstructured":"Fonseca , R. , Gnawali , O. , Jamieson , K. , and Levis , P . Four bit wireless link estimation . Proceedings of the Sixth Workshop on Hot Topics in Networks (HotNets VI) , 2007 . Fonseca, R., Gnawali, O., Jamieson, K., and Levis, P. Four bit wireless link estimation. Proceedings of the Sixth Workshop on Hot Topics in Networks (HotNets VI), 2007."},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1182807.1182823"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/378993.379006"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1031495.1031506"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/345910.345920"},{"key":"e_1_2_1_11_1","volume-title":"Proceedings of the Second USENIX\/ACM Symposium on Network Systems Design and Implementation (NSDI)","author":"Levis P.","year":"2005","unstructured":"Levis , P. , Gay , D. , and Culler , D . Active sensor networks . Proceedings of the Second USENIX\/ACM Symposium on Network Systems Design and Implementation (NSDI) , 2005 . Levis, P., Gay, D., and Culler, D. Active sensor networks. Proceedings of the Second USENIX\/ACM Symposium on Network Systems Design and Implementation (NSDI), 2005."},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/958491.958506"},{"key":"e_1_2_1_13_1","volume-title":"Proceedings of the First USENIX\/ACM Symposium on Network Systems Design and Implementation (NSDI)","author":"Levis P.","year":"2004","unstructured":"Levis , P. , Patel , N. , Culler , D. , and Shenker , S . Trickle: a self-regulating algorithm for code maintenance and propagation in wireless sensor networks . Proceedings of the First USENIX\/ACM Symposium on Network Systems Design and Implementation (NSDI) , 2004 . Levis, P., Patel, N., Culler, D., and Shenker, S. Trickle: a self-regulating algorithm for code maintenance and propagation in wireless sensor networks. Proceedings of the First USENIX\/ACM Symposium on Network Systems Design and Implementation (NSDI), 2004."},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/IPSN.2008.17"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1061318.1061322"},{"key":"e_1_2_1_16_1","volume-title":"Proceedings of the Fourth USENIX Symposium on Networked Systems Design and Implementation (NSDI)","author":"Mao Y.","year":"2007","unstructured":"Mao , Y. , Wang , F. , Qiu , L. , Lam , S. , and Smith , J . S4: small state and small stretch routing protocol for large wireless sensor networks . Proceedings of the Fourth USENIX Symposium on Networked Systems Design and Implementation (NSDI) , 2007 . Mao, Y., Wang, F., Qiu, L., Lam, S., and Smith, J. S4: small state and small stretch routing protocol for large wireless sensor networks. Proceedings of the Fourth USENIX Symposium on Networked Systems Design and Implementation (NSDI), 2007."},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/313451.313525"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1322263.1322293"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1159913.1159922"},{"key":"e_1_2_1_20_1","unstructured":"Sun Microsystems Laboratories. Project Sun SPOT: Small Programmable Object Technology. http:\/\/www.sunspotworld.com\/.  Sun Microsystems Laboratories. Project Sun SPOT: Small Programmable Object Technology. http:\/\/www.sunspotworld.com\/."},{"key":"e_1_2_1_21_1","unstructured":"TinyOS Network Protocol Working Group. TEP 123: The Collection Tree Protocol. http:\/\/www.tinyos.net\/\/tinyos-2.x\/doc\/txt\/tep123.txt 2007.  TinyOS Network Protocol Working Group. TEP 123: The Collection Tree Protocol. http:\/\/www.tinyos.net\/\/tinyos-2.x\/doc\/txt\/tep123.txt 2007."},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/EWSN.2005.1462004"},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1031495.1031538"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/958491.958494"},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1322263.1322282"}],"container-title":["Communications of the ACM"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1364782.1364804","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1364782.1364804","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T13:57:39Z","timestamp":1750255059000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1364782.1364804"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,7]]},"references-count":25,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2008,7]]}},"alternative-id":["10.1145\/1364782.1364804"],"URL":"https:\/\/doi.org\/10.1145\/1364782.1364804","relation":{},"ISSN":["0001-0782","1557-7317"],"issn-type":[{"type":"print","value":"0001-0782"},{"type":"electronic","value":"1557-7317"}],"subject":[],"published":{"date-parts":[[2008,7]]},"assertion":[{"value":"2008-07-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}