2015
DOI: 10.1109/tie.2014.2362891
|View full text |Cite
|
Sign up to set email alerts
|

When Scavengers Meet Industrial Wireless

Abstract: Recent standardization efforts on Industrial low power wireless communication technologies clearly bet for the Time Slotted Channel Hopping (TSCH) medium access control layer as it proved to achieve 99.999% reliability while ensuring deterministic behavior. Standards such as WirelessHART, ISA100.11a and IEEE802.15.4e rooted at the TSCH MAC layer, are used to connect millions of Industrial devices today enabling the emergence of the Industrial Internet paradigm. At that point and due to the ultra-low energy pro… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
23
0

Year Published

2016
2016
2019
2019

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 30 publications
(23 citation statements)
references
References 20 publications
0
23
0
Order By: Relevance
“…Some realistic models for power consumption in wireless sensor network devices are presented in [36,37]. These works focus on obtaining realistic models that split the overall consumption into different sources.…”
Section: Energy Model Validation and Discussionmentioning
confidence: 99%
“…Some realistic models for power consumption in wireless sensor network devices are presented in [36,37]. These works focus on obtaining realistic models that split the overall consumption into different sources.…”
Section: Energy Model Validation and Discussionmentioning
confidence: 99%
“…The transmissions are added to graph G one by one (lines 5-17). For each link in φ k , if the type of the link is L1, there are two transmissions (the initial transmission and the first retransmissions) on that link, and two corresponding vertices {v a , v a+1 } are added into vertex set V (lines [7][8]. If the type of the link is L2, there is one transmission (the second retransmission) passing through the link, and only one vertex {v a } is added (lines 14-15).…”
Section: B Establishing the Releasing Sequence Graphmentioning
confidence: 99%
“…Otherwise, the deadline will be missed. Therefore, its prime priority is set to the highest value (lines [6][7][8]. V is the set of vertices that have been released but not scheduled.…”
Section: Our Heuristic Algorithm: Extended Rate-monotonic (E-rm)mentioning
confidence: 99%
See 1 more Smart Citation
“…In order to obtain the deterministic services for industrial automations [12], TSCH protocol is introduced as part of IEEE802.15.4e standard [10]. It uses frequency hopping method, in which different transmission frequencies are chosen at different times by the nodes of WSN.…”
Section: Introductionmentioning
confidence: 99%