skip to main content
10.1145/1133572.1133589acmconferencesArticle/Chapter ViewAbstractPublication PagesewConference Proceedingsconference-collections
Article

The firecracker protocol

Published:19 September 2004Publication History

ABSTRACT

We propose the Firecracker protocol for data dissemination in wireless sensor networks. Firecracker uses a combination of routing and broadcasts to rapidly deliver a piece of data to every node in a network. To start dissemination, the data source sends data to distant points in the network. Once the data reaches its destinations, broadcast-based dissemination begins along the paths, like a string of firecrackers.By using an initial routing phase, Firecracker can disseminate at a faster rate than scalable broadcasts while sending fewer packets. The selection of points to route to has a large effect on performance, indicating possible requirements for any-to-any routing protocols in wireless sensor networks.

References

  1. J. Hill and D. E. Culler. Mica: a wireless platform for deeply embedded networks. IEEE Micro, 22(6):12--24, nov/dec 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. J. W. Hui and D. Culler. The dynamic behavior of a data dissemination protocol for network programming at scale. In Proceedings of the Second ACM Conference on Embedded Networked Sensor Systems, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. C. Intanagonwiwat, R. Govindan, and D. Estrin. Directed diffusion: a scalable and robust communication paradigm for sensor networks. In Proceedings of the International Conference on Mobile Computing and Networking, Aug. 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. J. Jannotti, D. K. Gifford, K. L. Johnson, M. F. Kaashoek, and J. W. O'Toole, Jr. Overcast: Reliable multicasting with an overlay network. In Proceedings of the 4th Operating Systems Design and Implementation (OSDI 2000), pages 197--212. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. B. Karp and H. T. Kung. GPSR: greedy perimeter stateless routing for wireless networks. In International Conference on Mobile Computing and Networking (MobiCom 2000), pages 243--254, Boston, MA, USA, 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. P. Levis and D. Culler. Maté: a tiny virtual machine for sensor networks. In Proceedings of the ACM Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS X), Oct. 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. P. Levis, N. Patel, D. Culler, and S. Shenker. Trickle: A self-regulating algorithm for code maintenance and propagation in wireless sensor networks. In First USENIX/ACM Symposium on Network Systems Design and Implementation (NSDI 2004). Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. A. Mainwaring, J. Polastre, R. Szewczyk, D. Culler, and J. Anderson. Wireless Sensor Networks for Habitat Monitoring. In Proceedings of the ACM International Workshop on Wireless Sensor Networks and Applications, Sept. 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. J. Newsome and D. Song. Gem: graph embedding for routing and data-centric storage in sensor networks without geographic information. In Proceedings of the first international conference on Embedded networked sensor systems, pages 76--88. ACM Press, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. S.-Y. Ni, Y.-C. Tseng, Y.-S. Chen, and J.-P. Sheu. The broadcast storm problem in a mobile ad hoc network. In Proceedings of the fifth annual ACM/IEEE international conference on Mobile computing and networking, pages 151--162. ACM Press, 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. S. Ratnasamy, B. Karp, L. Yin, F. Yu, D. Estrin, R. Govindan, and S. Shenker. GHT: a geographic hash table for data-centric storage. In Proceedings of the first ACM international workshop on Wireless sensor networks and applications, pages 78--87. ACM Press, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. T. Stathopoulos, J. Heidemann, and D. Estrin. A remote code update mechanism for wireless sensor networks. Technical Report CENS Technical Report 30, 2003.Google ScholarGoogle ScholarCross RefCross Ref
  13. A. Woo, T. Tong, and D. Culler. Taming the underlying challenges of reliable multihop routing in sensor networks. In Proceedings of the first international conference on Embedded networked sensor systems, pages 14--27. ACM Press, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  1. The firecracker protocol

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Conferences
          EW 11: Proceedings of the 11th workshop on ACM SIGOPS European workshop
          September 2004
          214 pages
          ISBN:9781450378079
          DOI:10.1145/1133572

          Copyright © 2004 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 19 September 2004

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • Article

          Acceptance Rates

          EW 11 Paper Acceptance Rate37of37submissions,100%Overall Acceptance Rate37of37submissions,100%

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader