2006
DOI: 10.1109/tii.2006.875506
|View full text |Cite
|
Sign up to set email alerts
|

Automated Modeling and Analysis of CSMA-Type Access Schemes for Building Automation Networks

Abstract: During the design of large technical systems, the use of analytic and simulative models to test and dimension the system before implementation is of practical importance for an efficient and reliable design process. However, setting up the necessary models is time-consuming and therefore often too expensive in practice. Usually most information for modeling is already available in the design tool used to develop such extensive systems and only needs to be extracted for automatic model building. This paper pres… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
19
0

Year Published

2006
2006
2016
2016

Publication Types

Select...
6
1
1

Relationship

1
7

Authors

Journals

citations
Cited by 25 publications
(19 citation statements)
references
References 21 publications
0
19
0
Order By: Relevance
“…The used bitrate of a channel accumulates from the bitrate of the messages passing the channel. The performance analysis assumes that theses messages are created by the connections between two datapoints on different devices [12]. Each passing connection adds its mean bitrate to the channel mean bitrate (2) Equations (2) and (3) explain why the overload fault of a channel can be traced back to the connections using it.…”
Section: B Utilization Requirements (Overload)mentioning
confidence: 99%
See 1 more Smart Citation
“…The used bitrate of a channel accumulates from the bitrate of the messages passing the channel. The performance analysis assumes that theses messages are created by the connections between two datapoints on different devices [12]. Each passing connection adds its mean bitrate to the channel mean bitrate (2) Equations (2) and (3) explain why the overload fault of a channel can be traced back to the connections using it.…”
Section: B Utilization Requirements (Overload)mentioning
confidence: 99%
“…The suite combines an automated modeling approach with fast performance analysis methods and permits an efficient use by neither requiring special knowledge nor interrupting the design process significantly [12]. The automated modeling approach [13] creates a system and traffic model from the uniform LNS design database [14] used by most LON design tools.…”
Section: Introductionmentioning
confidence: 99%
“…Computation of the remaining values is similar to (7) and (9) such that (17) and see (18) at the bottom of the page, where . To compute the final values, the probability of active non-priority types has to be computed.…”
Section: Analysis Of Competitive Medium Accessmentioning
confidence: 99%
“…Based on the analytical model for a single channel presented in [5], a class of queueing networks and the corresponding analysis algorithms have been developed [4]. Models are generated automatically using the available information in a design database plus a small amount of additional information [18], [19]. Furthermore, a method to analyze single channels with priorities has been proposed in [3].…”
Section: Introductionmentioning
confidence: 99%
“…In this way, network utility is significantly reduced while still retaining satisfactory control performance. This thresholdbased control technique, which is also called send-on-delta or Manuscript deadband sampling in the literature, has been investigated in such areas as building automation networks [4], [5], wireless sensor networks [6], and automotive engineering [7]. Since the aforementioned data transmission strategy has attracted much interest in the literature, it is meaningful to study the system dynamics under this scheme.…”
Section: Introductionmentioning
confidence: 99%