DMCA
Recent and Emerging Topics in Wireless Industrial Communications: A Selection (2007)
Citations: | 96 - 1 self |
Citations
3230 | Ad-hoc on-demand distance vector routing,” in Mobile Computing Systems and Applications
- Perkins, Royer
- 1999
(Show Context)
Citation Context ...nal routing scheme can be used in parallel to tree routing. This additional routing protocol leverages mesh networks and is based on the ad hoc on-demand distance vector (AODV) routing protocol [95], =-=[96]-=-. AODV is a reactive routing protocol, i.e., routes are only computed when they are needed the first time (“on demand”). This is in contrast to proactive or table-driven routing protocols, in which al... |
1385 | TAG: A tiny aggregation service for ad-hoc sensor networks
- Madden, Franklin, et al.
- 2002
(Show Context)
Citation Context ...rom multiple sensor packets into one single packet and transmit only the resulting packet to the remote sink. This reduces the amount of bits to be transmitted and thus saves transceiver energy [82], =-=[83]-=-, on the other hand the aggregated data is more important and needs better (more energy-consuming) protection through error-control mechanisms [84]. Aggregation is in turn a key example for data-centr... |
769 | Fine-grained network time synchronization using reference broadcasts - Elson, Girod, et al. - 2002 |
624 | Next century challenges: mobile networking for “Smart Dust
- Kahn, Katz, et al.
- 1999
(Show Context)
Citation Context ...mputational capabilities, the nodes can communicate wirelessly and perform collaborative signal processing tasks. A driving vision for sensor networks can be identified in the concept of ”smart dust” =-=[62]-=-: sensor nodes shall become so small and so cheap that they can be embedded almost everywhere and could make our environment intelligent. With wireless sensor networks it is possible to collect much m... |
409 |
Information theoretic considerations for cellular mobile radio
- Ozarow, Shamai
- 1994
(Show Context)
Citation Context ...ss probability, defined as the long-term probability that a message can be successfully (i.e., acknowledged) transmitted within its deadline. Another one is the capacity-vs-outage-probability measure =-=[22]-=-, denoting the transmission rates (and therefore the delay) so that the probability of not achieving this rate is below a pre-specified threshold. A third measure is the delay-limited capacity, it is ... |
400 | The impact of data aggregation in wireless sensor networks.
- Krishnamachari, Estrin, et al.
- 2002
(Show Context)
Citation Context ...ings from multiple sensor packets into one single packet and transmit only the resulting packet to the remote sink. This reduces the amount of bits to be transmitted and thus saves transceiver energy =-=[82]-=-, [83], on the other hand the aggregated data is more important and needs better (more energy-consuming) protection through error-control mechanisms [84]. Aggregation is in turn a key example for data... |
392 | GHT: a geographic hash table for data-centric storage,”
- Ratnasamy, Karp, et al.
- 2002
(Show Context)
Citation Context ...sors and sink nodes. It occurs only rarely that a sensor node communicates with a sensor node more than a few hops away (a notable example are distributed or geographic hash tables in sensor networks =-=[68]-=-). Sensor readings are often only meaningful when location and time of observation are known, too. This requires that the geographical position of sensors (either absolute or with respect to some coor... |
373 | ESRT: Event-to-Sink Reliable Transport in Wireless Sensor Networks - Sankarasubramaniam, Akan, et al. - 2003 |
316 |
I.H.: Wireless sensor and actor networks: Research challenges
- Akyildiz, Kasimoglu
- 2004
(Show Context)
Citation Context ... SENSOR NETWORK TECHNOLOGY In this section we review the fundamentals of wireless sensor network technology and their potential for industrial applications. Wireless sensor networks (WSNs) [30], [55]–=-=[60]-=- consist of a large number of small, energy- and resource-constrained sensor nodes.4 An individual sensor node is composed of sensor circuitry (for example temperature or humidity), a microcontroller,... |
302 | Distributed localization in wireless sensor networks: a quantitative comparison
- Langendoen, Reijers
- 2003
(Show Context)
Citation Context ...respect to some coordinate system) or their logical position (“room FT 131”) is known and that in addition the sensors are time-synchronized with each other. The design of both localization protocols =-=[69]-=-, [70] and time synchronization protocols [71]–[74] is challenged by the lack of GPS receivers for reasons of costs, form factor and energy consumption of such devices. Often, only a small fraction of... |
302 | Topology control in wireless ad hoc and sensor networks
- Santi
- 2005
(Show Context)
Citation Context ...ent, the problem is not as pronounced as it would be for the periodic transmissions from the sensors. Scalability issues also motivate the need for topology control in sensor networks [55, Chap. 10], =-=[90]-=-. The underlying problem is that in densely deployed networks with several thousands of nodes where each node might have many one-hop neighbors, any routing algorithm would have to consider a very lar... |
300 | Design challenges for energy-constrained ad hoc wireless networks”, - Goldsmith, Wicker - 2002 |
252 |
RMST: Reliable Data Transport in Sensor Networks
- Stann, Heidemann
- 2003
(Show Context)
Citation Context ...e sensor network to facilitate network re-programming [114]–[116], whereas others are concerned with the reverse direction, i.e., reliable delivery of environmental data from the sensors to the sinks =-=[117]-=-–[119]. The available protocols can be classified according to different criteria (compare [55, Chap. 13]): • size of the items to be delivered: individual packets, larger but finite blocks of data, o... |
250 | Communication over fading channels with delay constraints
- Berry, Gallager
- 2002
(Show Context)
Citation Context ...cified threshold. A third measure is the delay-limited capacity, it is defined as the capacity-vs-outage probability measure for a pre-specified outage probability of zero (see also the discussion in =-=[23]-=-).1For short timescales formulations based on the notion of -firm deadlines [24], [25] can be used, in which at most out of any consecutive packets are allowed to be lost, otherwise a deadline violati... |
178 | A dynamic priority assignment technique for streams with (m,k)-firm deadlines.
- Hamdaoui, Ramanathan
- 1995
(Show Context)
Citation Context ...s the capacity-vs-outage probability measure for a pre-specified outage probability of zero (see also the discussion in [23]).1For short timescales formulations based on the notion of -firm deadlines =-=[24]-=-, [25] can be used, in which at most out of any consecutive packets are allowed to be lost, otherwise a deadline violation occurs. In the producer-(distributor)-consumer model (for example adopted in ... |
153 |
A cautionary perspective on cross-layer design,”
- Kawadia, Kumar
- 2005
(Show Context)
Citation Context ...] instead of relying on traditional protocol layering principles, but cross-layer design is also more challenging because of the larger potential for unwanted interactions between protocol components =-=[89]-=-. C. Scalability The need for redundancy increases the number of nodes in a sensor networks. When large areas have to be observed, the number of required nodes can be in the range of thousands or even... |
140 | MMSPEED: multipath Multi-SPEED protocol for QoS guarantee of reliability and. Timeliness in wireless sensor networks
- Felemban, Lee, et al.
- 2006
(Show Context)
Citation Context ...or network to facilitate network re-programming [114]–[116], whereas others are concerned with the reverse direction, i.e., reliable delivery of environmental data from the sensors to the sinks [117]–=-=[119]-=-. The available protocols can be classified according to different criteria (compare [55, Chap. 13]): • size of the items to be delivered: individual packets, larger but finite blocks of data, or infi... |
118 | A study of the coverage of large-scale sensor networks,”
- Liu, Towsley
- 2004
(Show Context)
Citation Context ... supposed to detect? Are there enough sensors of the right modalities present? Is the area of interest sufficiently covered by sensor nodes? This is the subject of the coverage and deployment problem =-=[110]-=-. The sensors are cheap and their readings can thus be noisy, giving rise to the information accuracy problem. addresses the reliable delivery of large blocks of program code from a sink node to all n... |
104 | Infrastructure tradeoffs for sensor networks,”
- Tilak, Abu-Ghazaleh, et al.
- 2002
(Show Context)
Citation Context ...y are not only harmed by channel errors, but many of the problems that are well-known from the Internet are present as well. Two notable examples are problems related to congestion in sensor networks =-=[113]-=- and subsequent packet losses, or problems related to queueing delays. A key theme in wireless sensor networks is to jointly design protocols and application to just fulfill the mission of the sensor ... |
87 | Lightweight time synchronization for sensor networks,” in - Greunen, Rabaey - 2003 |
85 | A scalable approach for reliable downstream data delivery in wireless sensor networks
- Park, Vedantham, et al.
- 2004
(Show Context)
Citation Context ...ved at all. The first problem can be circumvented by adding a field indicating the total number of fragments to each fragment, the latter problem must be solved by other means. For example, in GARUDA =-=[115]-=- high-powered energy signals are used to indicate the presence of a block. A NACK can be regarded as a retransmission request in a selective-repeat-type ARQ protocol. When any successor node on the fo... |
72 | TSync : A Lightweight Bidirectional Time Synchronization Service for Wireless Sensor Networks,
- Dai, Han
- 2004
(Show Context)
Citation Context ...gical position (“room FT 131”) is known and that in addition the sensors are time-synchronized with each other. The design of both localization protocols [69], [70] and time synchronization protocols =-=[71]-=-–[74] is challenged by the lack of GPS receivers for reasons of costs, form factor and energy consumption of such devices. Often, only a small fraction of the nodes will be equipped with GPS receivers... |
62 | Control and communication challenges in networked real-time systems
- Baillieul, Antsaklis
(Show Context)
Citation Context ...-end real-time and reliability14 in multihop wireless sensor networks, which are key properties when sensor networks shall be used in, for example, distributed control applications [60], [67], [111], =-=[112]-=-. In multihop sensor networks timeliness and reliability are not only harmed by channel errors, but many of the problems that are well-known from the Internet are present as well. Two notable examples... |
56 | Intelligent light control using sensor networks - Singhvi, Krause, et al. - 2005 |
56 |
Power sources for wireless sensor networks
- Roundy, Steingart, et al.
- 2004
(Show Context)
Citation Context ...ency In most cases sensor nodes use batteries for energy supply. Batteries have a finite lifetime, although it is sometimes possible to prolong this lifetime by combining energy-harvesting techniques =-=[75]-=- (in which secondary batteries are recharged by extracting energy from the environment, for example from vibrations or heat gradients) with proper node-level power-management strategies [76], [77], or... |
56 | Reliable transfer on wireless sensor networks,”
- Kim, Fonseca, et al.
- 2004
(Show Context)
Citation Context ...he link-layer), end-to-end (transport-layer) or in a combined fashion. Some studies have shown that link-layer acknowledgements and link-layer retransmissions should definitely be used [55, Chap. 13],=-=[120]-=-, since relying only on end-to-end acknowledgements has significant drawbacks: 1) without per-hop link-layer retransmissions the probability that the packet reaches the sink is much lower, and therefo... |
55 |
Energy-centric enabling technologies for wireless sensor networks,”
- Min, Bhardwaj, et al.
- 2002
(Show Context)
Citation Context ... the wakeup process (it might for example be necessary to fully re-initialize the sleeping device) there can also be significant energy costs associated with it, since the wakeup costs time and power =-=[86]-=-, [87]. Therefore, the rate of alternation between sleep and awake states should be properly controlled as well. Since the radiated power of an individual sensor node is often small, the communication... |
43 | Time-Diffusion Synchronization Protocol for Sensor Networks." - Su, Akyildiz - 2002 |
43 | A framework for energy-scalable communication in high-density wireless networks,”
- Min, Chandrasakan
- 2002
(Show Context)
Citation Context ...akeup process (it might for example be necessary to fully re-initialize the sleeping device) there can also be significant energy costs associated with it, since the wakeup costs time and power [86], =-=[87]-=-. Therefore, the rate of alternation between sleep and awake states should be properly controlled as well. Since the radiated power of an individual sensor node is often small, the communication range... |
42 | A comprehensive simulations study of slotted CSMA/CA for IEEE 802.15.4 wireless sensor networks,
- Koubaa, Alves, et al.
- 2006
(Show Context)
Citation Context ...E 802.15.4 in Industrial Environments A first key research issue pertains to the performance of IEEE 802.15.4. Although a number performance assessments have already been conducted (some examples are =-=[100]-=-–[102]), to the best of our knowledge there are not many publications available (one example is [103]) that study the achievable industrial-QoS performance as defined in Section II-A of these protocol... |
38 | An Analysis of - Cmelik, Kong, et al. - 1991 |
38 | Bluetooth strengths and weaknesses for industrial applications,” - Baker - 2006 |
38 |
Performance study of ieee 802.15.4 using measurements and simulations
- Petrova, Riihijarvi, et al.
- 2006
(Show Context)
Citation Context ...15.4 in Industrial Environments A first key research issue pertains to the performance of IEEE 802.15.4. Although a number performance assessments have already been conducted (some examples are [100]–=-=[102]-=-), to the best of our knowledge there are not many publications available (one example is [103]) that study the achievable industrial-QoS performance as defined in Section II-A of these protocols in i... |
33 | The emergence of industrial control networks for manufacturing control, diagnostics, and safety data. - Moyne, Tilbury - 2007 |
27 | A Framework for Optimal Battery Management for Wireless Nodes”,
- Sarkar, Adamoun
- 2003
(Show Context)
Citation Context ...ode-level power-management strategies [76], [77], or by using battery management schemes in which the time pattern of drawing energy is carefully chosen to exploit battery self-recharge effects [78], =-=[79]-=-. A further option are mechanisms for wireless power transmission, like for example the magnetic-field-induced power supply available for the WISA wireless fieldbus system [80]. As a result of finite ... |
26 |
On the Use of Wireless Networks at Low Level of Factory Automation Systems.
- Pellegrini, Miorandi, et al.
- 2006
(Show Context)
Citation Context ...of the wireless channel properties in mind. One example is the research area of networked control systems (see [6] and [7]). An alternative view of application-layer protocols is taken for example in =-=[8]-=-, where the authors argue that on top of commercial wireless hardware like IEEE 802.11 WLAN it is the application layer that must ensure appropriate real-time and reliability properties through specif... |
26 | Integrating reliability and timing analysis of CAN-based systems,”
- Hansson, Nolte, et al.
- 2002
(Show Context)
Citation Context ...resolve contention among different stations. When the priority enforcement is deterministic, a proper assignment of priorities to packets allows to perform deterministic schedulability analyses [51], =-=[52]-=-. In the CAN protocol, a bitwise priority-arbitration technique is used for collision resolution: a contending station awaits the end of an ongoing transmission (if any) and then enters contention pha... |
26 | Is TCP energy efficient - Zorzi, Rao - 1999 |
25 | Real-Time Communications over Hybrid Wired/Wireless PROFIBUS-Based Networks",
- Alves
- 2003
(Show Context)
Citation Context ...ions to existing wired networks and therefore to create hybrid networks. This has in general been discussed in [1] and [9], whereas specific networks and protocols have for example been considered in =-=[10]-=-–[13]. • Mobility support and handovers under real-time and reliability constraints. The design of suitable schemes, especially for hybrid systems, depends on the underlying MAC protocols. One example... |
25 | WiDom: A dominance protocol for wireless medium access
- Pereira, Andersson, et al.
(Show Context)
Citation Context ...ts packet). In both cases, the maximum length of bursts/listening periods is linear in the number of priorities that can be supported. In the wireless dominance protocol (WiDom) approach presented in =-=[54]-=- a bitwise priority arbitration scheme is mimicked by providing one time slot for each priority bit, i.e., slots for priority bits. During such a timeslot a station having a dominant bit transmits, wh... |
25 |
The emergence of ZigBee in building automation and industrial control Computing and Control Engineering
- Egan
- 2005
(Show Context)
Citation Context ...ATIONS: A SELECTION 111 device(s). Using a centralized binding table eases the maintenance of bindings. Some general considerations about ZigBee in industrial applications can be found for example in =-=[97]-=-–[99]. The upcoming version of ZigBee8 adopts a frequency-hopping scheme: a ZigBee network can switch to another channel if too much interference is perceived on the present one. C. ISA SP-100 The Ins... |
24 |
Channel characterization and link quality assessment of ieee 802.15.4-compliant radio for factory environments,” Industrial Informatics,
- Tang, Wang, et al.
- 2007
(Show Context)
Citation Context ...ack. To facilitate the design of error control mechanisms, a better understanding of the error characteristics of IEEE 802.15.4-compliant transceivers in industrial environments will be useful [108], =-=[109]-=-. • The management of GTS slots is limited: a GTS slot is allocated to one device in every superframe, there is no means to allocate a slot to two or more devices in an alternating fashion, nor is the... |
23 | Feedback-based control for providing real-time services with the 802.11e MAC.
- Boggia, Camarda, et al.
- 2007
(Show Context)
Citation Context ...time until the packet end before he gains access to the medium. A key research issue in the HCCA is the design of appropriate admission control scheduling policies, which has for example been done in =-=[46]-=-–[48]. Its usage in industrial scenarios has been considered in [33] and [49]. B. Research Issues Assuming that HCCA implementations will not become widely available during the next few years (PCF imp... |
23 | Analysing Real-Time Communications - Tindell, Hanssmon, et al. - 1994 |
21 | A time division beacon scheduling mechanism for IEEE 802.15.4/ZigBee cluster-tree wireless sensor networks
- Koubâa, Cunha, et al.
- 2007
(Show Context)
Citation Context ... allocation scheme, it should be ensured that the active periods of ZigBee coordinators/routers in mutual range do not overlap at any time. Specific allocation schemes have been discussed in [105]and =-=[106]-=-, while the issue of GTS slot collisions is investigated in [107]. Some further problems with the IEEE 802.15.4 standard are as follows: • The data exchange is not very efficient. First, there is no p... |
21 | Pump-slowly, fetchquickly (PSFQ): a reliable transport protocol for sensor networks, - Wan, Campbell, et al. - 2005 |
20 | Improving the IEEE 802.15.4 slotted CSMA/CA MAC for time-critical events in wireless sensor networks.
- Koubaa, Alves, et al.
- 2006
(Show Context)
Citation Context ...n the past few years. A first deficiency is the inability of the IEEE 802.15.4 MAC protocol to deterministically enforce priorities on the channel, see the discussion in Section III-B. The authors of =-=[104]-=- have suggested a scheme for stochastic priority enforcement that modifies certain parameters of the IEEE 802.15.4 CSMA-MAC protocol. In particular, the length of the prolonged carrier-sensing period ... |
19 | Raghavendra, “Performance evaluation of the IEEE 802.15.4 MAC for low-rate low power wireless networks - Lu, Krishnamachari, et al. - 2004 |
18 |
Wireless Sensor Networks for Industrial Environments, In:
- Low, Win, et al.
- 2005
(Show Context)
Citation Context ...data than was possible before, from places which are hazardous or otherwise inaccessible for wired technologies. Wireless sensor networks can be used in many ways in industrial and factory automation =-=[63]-=-, automotive applications have also been considered [64]. An important class of applications is monitoring of equipment and machinery health, using for example vibration, heat or thermal sensors. This... |
16 | System Level Design for Clustered Wireless Sensor Networks
- Bonivento, Fischione, et al.
- 2007
(Show Context)
Citation Context ...Some references for network planning in the industrial context are [3] and [4], a platform-based protocol framework allowing to adjust parameters according to pre-specified QoS levels is presented in =-=[5]-=-. • MAC protocol design: the MAC layer is a key functionality for (wireless) industrial communication systems, since it directly impacts the timeliness of packets. The goal is to find deterministic pr... |
15 | Integration of mobile vehicles for automated material handling using Profibus and - Lee, Lee, et al. - 2002 |
15 | Overload management in sensor-actuator networks used for spatially-distributed control systems
- Lemmon, Ling, et al.
- 2003
(Show Context)
Citation Context ...re the timeliness requirements are not extremely hard, but reliability is an important issue. There are also activities to use wireless sensor networks in distributed and process control applications =-=[65]-=-–[67]. A. Architecture Sensor network architectures have a lot in common with the architecture of ad hoc networks, but there are also some important differences. In general ad hoc networks there are n... |
15 | Typhoon: A Reliable Data Dissemination Protocol for Wireless Sensor Networks.
- Liang, Musaloiu-E, et al.
- 2008
(Show Context)
Citation Context ...ise to the information accuracy problem. addresses the reliable delivery of large blocks of program code from a sink node to all nodes in the sensor network to facilitate network re-programming [114]–=-=[116]-=-, whereas others are concerned with the reverse direction, i.e., reliable delivery of environmental data from the sensors to the sinks [117]–[119]. The available protocols can be classified according ... |
12 | Wireless sensor networks: A survey,”Comput. - Akyildiz, Cayirci - 2002 |
12 | Dynamic power management in wireless sensor networks: An application-driven approach
- Passos, Jr, et al.
- 2005
(Show Context)
Citation Context ...echniques [75] (in which secondary batteries are recharged by extracting energy from the environment, for example from vibrations or heat gradients) with proper node-level power-management strategies =-=[76]-=-, [77], or by using battery management schemes in which the time pattern of drawing energy is carefully chosen to exploit battery self-recharge effects [78], [79]. A further option are mechanisms for ... |
12 | Collision-free beacon scheduling mechanisms for IEEE 802.15.4/ ZigBee cluster-tree wireless sensor networks
- Koubaa, Alves, et al.
(Show Context)
Citation Context ... specific allocation scheme, it should be ensured that the active periods of ZigBee coordinators/routers in mutual range do not overlap at any time. Specific allocation schemes have been discussed in =-=[105]-=-and [106], while the issue of GTS slot collisions is investigated in [107]. Some further problems with the IEEE 802.15.4 standard are as follows: • The data exchange is not very efficient. First, ther... |
11 | On the integration of fieldbus traffic within - Cavalieri, Panno - 1997 |
9 | Randhawa Saturation throughput analysis of - Robinson, S |
7 |
A Jumping-Genes Paradigm for Optimizing Factory WLAN Network,
- Chan, Man, et al.
- 2007
(Show Context)
Citation Context ...uration, as well as run-time fault and performance monitoring needs to be developed. This is tightly coupled to resource allocation. Some references for network planning in the industrial context are =-=[3]-=- and [4], a platform-based protocol framework allowing to adjust parameters according to pre-specified QoS levels is presented in [5]. • MAC protocol design: the MAC layer is a key functionality for (... |
7 |
VTP-CSMA: A Virtual Token Passing Approach for Real-Time Communication
- Moraes, Vasques, et al.
- 2007
(Show Context)
Citation Context ...LAN (WLAN) standards is certainly predominant in the realm of WLAN technologies, and it has also been considered extensively in the context of wireless industrial communications, see for example [31]–=-=[38]-=-. In this paper we focus on aspects of the current standard that have gained increased importance since publication of [1] and which at the same time are especially interesting for industrial applicat... |
7 | Unplugged But Connected - Design and Implementation of a Truly Wireless RealTime Sensor/Actuator Interface - Scheible, Dzung, et al. - 2007 |
6 | Hybrid wired/wireless implementations of Profibus DP: a feasibility study based on Ethernet - Miorandi, Vitturi - 2004 |
6 |
Throughput analysis of
- Ferre, Doufexi, et al.
- 2004
(Show Context)
Citation Context ...s class for which the TXOP was won are allowed to be transmitted during a TXOP. A number of performance analyses (e.g., regarding throughput) of the DCF and EDCF are available in the literature [34], =-=[41]-=-–[45]. These studies confirm also that the EDCA mechanism is indeed capable of achieving stochastic prioritization. 106 IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, VOL. 4, NO. 2, MAY 2008 2) HCCA: In... |
5 |
Interconnection of Wireline and Wireless Fieldbusses
- Decotignie
(Show Context)
Citation Context ...d/wireless systems: in many applications it is beneficial to adjoin wireless stations to existing wired networks and therefore to create hybrid networks. This has in general been discussed in [1] and =-=[9]-=-, whereas specific networks and protocols have for example been considered in [10]–[13]. • Mobility support and handovers under real-time and reliability constraints. The design of suitable schemes, e... |
5 | Performance analysis of producer/consumer protocols over ieee802.11 wireless links - Miorandi, Vitturi - 2004 |
5 | Impact of frame size, number of stations and mobility on the throughput performance of - Pavon, N - 2004 |
5 |
BACnet over ZigBee, A new approach to wireless datalink channel for BACnet
- Park, Chon, et al.
- 2007
(Show Context)
Citation Context ...S: A SELECTION 111 device(s). Using a centralized binding table eases the maintenance of bindings. Some general considerations about ZigBee in industrial applications can be found for example in [97]–=-=[99]-=-. The upcoming version of ZigBee8 adopts a frequency-hopping scheme: a ZigBee network can switch to another channel if too much interference is perceived on the present one. C. ISA SP-100 The Instrume... |
4 | analysis and modeling of real-time source data traffic in factory communication systems
- Jasperneite, Neumann, et al.
(Show Context)
Citation Context ...stics of industrial traffic are the presence of 104 IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, VOL. 4, NO. 2, MAY 2008 deadlines, high reliability requirements and the predominance of short packets =-=[19]-=-. For these exchanges two different interaction patterns have emerged: the master/slave model and the producer-(distributor)-consumer model, and for these patterns different QoS parameters are importa... |
4 |
Security and fraud detection in mobile and wireless networks
- Boukerche
- 2002
(Show Context)
Citation Context ...sdropping. To prevent insertion of malicious packets, mechanisms for ensuring authentication (“who sent this message?”) and message integrity (“is this the message originally sent?”) are needed [15], =-=[29]-=- to create mutual trust relationships between wireless stations. Such mechanisms are often implemented using shared secrets and public key cryptography, calling in turn for proper key distribution sch... |
4 | Building Industrial Communication Systems based on - Krommenacker, Lecuire - 2005 |
4 |
Performance Investigation of IEEE 802.11e EDCA under non-saturation condition based on the M/G/1/K model
- Xiang, Yu-Ming, et al.
- 2007
(Show Context)
Citation Context ...ss for which the TXOP was won are allowed to be transmitted during a TXOP. A number of performance analyses (e.g., regarding throughput) of the DCF and EDCF are available in the literature [34], [41]–=-=[45]-=-. These studies confirm also that the EDCA mechanism is indeed capable of achieving stochastic prioritization. 106 IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, VOL. 4, NO. 2, MAY 2008 2) HCCA: In the ... |
4 | Using energy where it counts: Protecting important messages in the link layer
- Kopke, Karl, et al.
- 2005
(Show Context)
Citation Context ... transmitted and thus saves transceiver energy [82], [83], on the other hand the aggregated data is more important and needs better (more energy-consuming) protection through error-control mechanisms =-=[84]-=-. Aggregation is in turn a key example for data-centric design: not only the application but also the protocols know the data that is transported, and this data can influence protocol decisions. Due t... |
4 |
S.: Performance measurements of CSMA/CAbased wireless sensor networks for industrial applications
- Bertocco, Gamba, et al.
- 2007
(Show Context)
Citation Context ...802.15.4. Although a number performance assessments have already been conducted (some examples are [100]–[102]), to the best of our knowledge there are not many publications available (one example is =-=[103]-=-) that study the achievable industrial-QoS performance as defined in Section II-A of these protocols in industrial environments. The IEEE 802.15.4 MAC scheme has some deficiencies that specifically ha... |
4 | Radio Channel Quality - Sexton, Mahony, et al. - 2005 |
3 | Planning Available WLAN - Ivanov, Nett, et al. - 2007 |
3 | Issue: Technology of Networked Control Systems, ser - Special |
3 | Hybrid wired/wireless profibus architectures: performance study based on simulation models - Sousa, Ferreira |
3 | Queuing Analysis of 802.11e HCCA with Variable Bit Rate Traffic - Rashid, Hossain, et al. |
2 |
Special issue on networked control systems
- authors
- 2004
(Show Context)
Citation Context ...t protocols and the applications themselves must be designed with explicit consideration of the wireless channel properties in mind. One example is the research area of networked control systems (see =-=[6]-=- and [7]). An alternative view of application-layer protocols is taken for example in [8], where the authors argue that on top of commercial wireless hardware like IEEE 802.11 WLAN it is the applicati... |
2 |
Real-time communications over wired/wireless PROFIBUS networks supporting inter-cell mobility
- Tovar, Alves
- 2007
(Show Context)
Citation Context ...ity support and handovers under real-time and reliability constraints. The design of suitable schemes, especially for hybrid systems, depends on the underlying MAC protocols. One example reference is =-=[14]-=-, in which mobility and handovers are considered for hybrid wired/wireless PROFIBUS systems. • Security and privacy: Security in general and wireless security in particular are vast research topics [1... |
2 | A methodology for the Analysis - Brevi, Mazzocchi, et al. |
2 | Potential of the HCCA scheme defined - Karanam, Trsek, et al. |
2 | Wireless Sensor Networks - Karl, Willig, et al. - 2004 |
2 |
Rewins: A distributed multi-RF sensor control network for industrial automation
- Ramamurthy, Lal, et al.
- 2005
(Show Context)
Citation Context ...ardous or otherwise inaccessible for wired technologies. Wireless sensor networks can be used in many ways in industrial and factory automation [63], automotive applications have also been considered =-=[64]-=-. An important class of applications is monitoring of equipment and machinery health, using for example vibration, heat or thermal sensors. This can help to detect upcoming machine failures and to tri... |
2 | An Analysis of Error Inducing - Savvides, Garber, et al. - 2005 |
2 | Cross-Layer Design: A Survey and - Srivastava, Motani - 2005 |
2 |
Never Mind the Standard: Here is the Tinyos 802.15.4
- Flora, Bonnet
(Show Context)
Citation Context ...ard [92] adds further physical layers) and correcting a number of MAC-layer issues. There are now different implementations of the standard available, both commercial6 and open-source implementations =-=[93]-=-. It covers the physical layer and the MAC layer of a low-rate wireless sensor network. The target applications of IEEE 802.15.4 are sensor networks, building automation, connecting devices to compute... |
2 | Beacon Synchronization for GTS Collision Avoidance - Francomme, Mercier, et al. - 2007 |
1 | Engineering PROFIBUS networks with heterogeneous transmission media
- Alves, Tovar
- 2006
(Show Context)
Citation Context ...to existing wired networks and therefore to create hybrid networks. This has in general been discussed in [1] and [9], whereas specific networks and protocols have for example been considered in [10]–=-=[13]-=-. • Mobility support and handovers under real-time and reliability constraints. The design of suitable schemes, especially for hybrid systems, depends on the underlying MAC protocols. One example refe... |
1 | Schäfer,SecurityinFixedandWirelessNetworks–AnIntroduction toSecuringDataCommunications - unknown authors - 2003 |
1 | Security for - Dzung, Naedele, et al. - 2005 |
1 | Ed.,TheIndustrialCommunication Technology Handbook. Boca - Zurawski - 2005 |
1 | Technique de l’Electricité - GeneralPurposeFieldCommunicationSystem, WorldFIP, et al. - 1996 |
1 | Profibus – open solutions for the world of automation,” inTheIndustrialInformationTechnology - Jecht, Stripf, et al. - 2005 |
1 | The worldfip fieldbus,” inTheIndustrialInformation TechnologyHandbook - Thomesse - 2005 |
1 |
Simulation study of IEEE 802.11e wireless LAN—Enhancements for real time applications
- Koscielnik
- 2006
(Show Context)
Citation Context ... access class for which the TXOP was won are allowed to be transmitted during a TXOP. A number of performance analyses (e.g., regarding throughput) of the DCF and EDCF are available in the literature =-=[34]-=-, [41]–[45]. These studies confirm also that the EDCA mechanism is indeed capable of achieving stochastic prioritization. 106 IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, VOL. 4, NO. 2, MAY 2008 2) HC... |
1 | Scheduler Design for Guaranteed QoS - “HCCA - 2007 |
1 | A Simulation Case Study of the new - Trsek, Jasperneite, et al. - 2006 |
1 | Specification and Analysis - Bogliolo, Benini, et al. - 2004 |
1 | IETF Network Working Group, “Ad hoc on-demand distance vector (aodv) routing,” RFC 3561 (experimental RFC - Perkins, Belding-Royer, et al. - 2003 |