This work is licensed under http://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
1. Introduction
Industrial wireless sensor networks (IWSNs) have been emerging as a new means of communication for social infrastructure applications like Advanced Metering Infrastructure (AMI), Distribution Automation, Optimized Factory, Predictive Maintenance, Building Automation, and so on. These applications basically gather information from remote devices, that is, sensors, check device status or circumstance, and control devices, that is, actuators, based on the gathered information. For remote monitoring devices, the main purpose is periodic collection of device status or sensor data. At the same time, industrial applications also require on-demand communication for data collection and operation of devices by a remote control server, within specific end-to-end deadlines. For instance, an AMI system requires a deadline of 20–60 seconds when a remote control server requests on-demand meter reading. Although such request/reply type of communication is unpredictable, IWSNs must guarantee a maximum communication delay for both periodic and unpredictable packets.
Wireless networks using legacy Media Access Control (MAC) protocols based on Carrier Sense Multiple Access/Collision Avoidance (CSMA/CA), such as WiFi or Zigbee [1], sometimes drop packets because of interference from other wireless networks. To increase the reliability of wireless networks for industrial applications such as remote monitoring devices, several protocols, such as Wireless HART [2], ISA100.11a standard [3], and IEEE802.15.4e [4], have been developed and standardized.
These standards use Time Division Multiple Access (TDMA) and multiple channel hopping technologies for their MAC protocols. Both WirelessHART and ISA100.11a for industrial applications support a centralized network management architecture in which all nodes in an IWSN are time-synchronized and assigned communication timings for periodic data gathering by a central network manager. It decreases both interference within the IWSN and interference from other wireless networks using the same channels, thus increasing the rate of successful communication.
However, high success rate of packet transmission of periodic communication alone is not sufficient for industrial applications. Assume that an on-demand downward packet from a root node to a sensor and upward packets from sensors to the root node are generated on the same path in a multihop TDMA-based wireless network. They compete for a channel and an opportunity of packet transmission and thus some packets will have to wait until the next transmission opportunity. This may cause quite large accumulated end-to-end delay, making it difficult to guarantee a maximum delay to applications. To mitigate delay, one of solutions is to assign transmission timings to all nodes for unpredictable communication. However, because of unpredictability, such assignment is very likely to be redundant and as a result precious network bandwidth will be considerably wasted.
To guarantee a deadline for such unpredictable packets, we propose a priority-based dynamic multichannel transmission scheme. Our scheme prioritizes packets in accordance with application requirements. Packet transmission is scheduled in a slotted manner, but detailed slot allocation as in usual TDMA-based protocols is not performed. More specifically, a root node only determines both when it transmits on-demand request packets for remote control and when nodes transmit data packets for periodic monitoring. On the other hand, packet forwarding is not scheduled at all. In a slot, which we call SlotFrame, priority CSMA/CA-like packet transmission is performed at each node. Our scheme operates over a MAC layer and does not rely on any specific MAC protocol. We discuss compatibility with ISA100.11a in Section 6.2.
We consider one type of packets for periodic communication and three types of packets for unpredictable communication. We first define three priorities of packets depending on their type and then assign one dedicated channel to each priority. The highest priority is given to unpredictable and on-demand packets that a root node sends to a node for control or information retrieval, that is, downward packets. Upward reply packets are also given the highest priority, because request/response communication for device control requires a very short end-to-end delay. The second priority is given to periodic packets used for regular data collection. Network control packets are then set to the lowest priority. In our proposal, a root node can thus transmit the highest-priority packets at any time but still control the transmission timing through centralized administrative control, as in ISA100.11a. More specifically, a node replies to a request packet at the time specified by the root node.
On the other hand, each node decides the time of forwarding a packet by autonomous decentralized radio channel control. A node scans three communication channels in descending order of priority and dynamically decides which channel to use. For example, when a node having a reply packet finds that a request packet is to be sent by a neighbor, it defers transmission of the packet for a certain duration of time to avoid collision among downward and upward packets over the high-priority channel. If there is no transmission of high-priority packets in the vicinity, a node can transmit a periodic data packet using another channel for the middle priority. Only when there is no packet transmission on either high or middle priority channel, a node can transmit a network control packet. This mechanism ensures that the highest-priority packets are preferentially transferred without unexpected delay.
The contribution of this paper is proposing a priority-based multichannel transmission scheme that determines when and what packets should be transmitted on which channel. Through simulation, we validate our proposal for two industrial applications: AMI and industrial process monitoring and control. We also theoretically estimate the lower bounds of available bandwidth for middle- and low-priority packet transmission. Moreover, TDMA-based protocols like ISA100.11a typically have a scheduler for allocating network resources such as time slots to all nodes. This scheduling process is often complicated and the scheduler has to deliver the information to all nodes whenever a new node joins the network or a network topology changes. In contrast, since our scheme only determines when to generate and transmit a packet at a root node for remote control and at nodes for periodic monitoring, it does not need to adjust a schedule as far as the maximum number of hops and the number of nodes do not change. We discuss this advantage in more detail in Section 6.3.
The rest of the paper is structured as follows. We first describe requirements and challenges in Section 2, and Section 3 presents an overview of related work. In Section 4, we propose the priority-based transmission scheme. Then, we evaluate the communication delay for highest-priority packets and available bandwidth for other packets in Section 5. In Section 6, we discuss compatibility with ISA100.11a and overhead incurred in implementing our proposal before discussing our conclusions and future work in Section 7.
2. Requirements and Challenges
2.1. System Requirements from Industrial Applications
Table 1 lists a summary of industrial applications and system requirements for IWSN [5–9]. AMI, mentioned in Section 1, has been intensively deployed in Japan since the Great East Japan Earthquake in 2011. Industrial manufacturing companies have recently faced a need to increase productivity and optimize factories. To achieve this, IWSN systems require a variety of data and means of field data collection, like sensor data from factories and buildings, smart meters, and so on. To collect such large data, standard Internet of things (IoT) wireless technologies have provided large, dense wireless networks that contain several hundred nodes and form at most 8–16 multihop networks. However, collection of periodic data with high success in communication is necessary [7, 8].
Table 1
Application and system requirements.
920-MHz band | 2.4-GHz band | |
Applications | (i) AMI |
(i) Optimized factory |
|
||
Application processing | (i) Remote monitoring |
(i) Remote monitoring |
|
||
Communication type | (i) Publish/subscribe |
(i) Publish/subscribe |
|
||
Remote monitoring cycle | 30 min |
1–5 min |
|
||
Maximum delay for remote operation | 20–60 sec |
5–20 sec |
|
||
Number of nodes in wireless network | 1–500 nodes | 1–500 nodes |
|
||
Packet length | 500–600 B | 90 B |
|
||
Communication speed | 50–100 kbps | 250 kbps |
|
||
Protocols | (i) IEEE802.15.4g/e |
(i) ISA100.11a |
Moreover, unpredictable and on-demand communication occurs in an IWSN. For example, eco-friendly systems such as distribution automation and demand response systems have been deployed in order to use energy efficiently. These systems request communication of contingency packets from a remote server to an end device in an unpredictable way. Industrial applications such as industrial process control [5] also require controlling devices remotely with a maximum delay of several seconds. Figure 1 shows an example of a target system configuration for the application of monitoring and controlling a building.
[figure omitted; refer to PDF]
2.2. Challenge
The packet error rate (PER) is normally one of the most important parameters for evaluating reliability of a wireless network. In addition, guaranteed deadlines should be considered for IWSNs, because industrial applications require real time processing. Several wireless protocols have been already standardized and developed for industrial applications, including WirelessHART and ISA100.11a. To decrease the PER for collecting periodic data from sensors in dense and lossy wireless networks, these standards use TDMA-based MAC protocols. Such protocols overcome the problem of packet collisions in the network. In fact, the data collection ratio for WirelessHART reaches more than 99%, because SmartMesh WirelessHART devices basically perform retransmission twice at most [10]. This performance seems sufficiently high for remote monitoring purposes.
On the other hand, when an unpredictable on-demand packet has to be sent to or from a node, the packet either consumes assigned bandwidth or waits several seconds until the next assigned bandwidth becomes available. This can cause random latency, which further depends on TDMA scheduling, retransmission timing, and wireless radio conditions. Most WSNs do not support real time communication [11] and it is difficult for even TDMA-based MAC protocols such as IEEE802.15.4e to support real time communication for large scale networks like AMI [12].
As described below in Section 3, when we use normal ISA100.11a for both remote monitoring and remote control of devices, it does not guarantee the latency of on-demand and multihop communication at any time, although it can transfer a higher-priority packet by applying the priority CSMA/CA scheme among single-hop neighbors. If such on-demand communication can be expected, then a system manager with an optimized scheduler may enable ISA100.11a to allocate communication timing for all nodes in order to transfer a higher-priority packet within a certain delay and with due consideration to maintain a high data collection ratio. Whenever the network topology is changed, because of the instability of the radio environment, however, the schedule must be updated, so this is an unrealistic solution.
As another solution to the problem, we could use multiple ISA100.11a network functions on different network interfaces, that is, one ISA100.11a function for remote monitoring and another for remote control, for example. In this case, each function would concentrate on scheduling transmission of a single application packet with a high end-to-end path success probability. Unfortunately, this approach faces the same problem that a system manager must deliver an optimized schedule to all nodes whenever the network topology is changed. Moreover, each node would have to control multiple ISA100.11a network functions precisely, but the standard does not describe how an application can manage multiple ISA100.11a networks.
Therefore, our challenges in this paper are to mitigate unexpected latency for unpredictable and high-priority IWSN communications and to show how to meet system requirements for high end-to-end success probability of periodic communication.
3. Related Work
In wireless sensor networks, MAC is a key technology that determines channel access delay and utilization. MAC protocols are roughly classified into three types: contention-based, contention-free, and hybrid.
First, contention-based schemes (using CSMA/CA) such as IEEE802.15.4 determine transmission timing by checking existence of carrier signals, that is, carrier sense. When a network is large or dense, the PER is normally high and as such CSMA/CA-based MAC protocols cannot guarantee latency [13–15].
Second, contention-free MAC protocols using TDMA implement scheduled communication with a centralized coordinator, such as a network manager. In TDMA-based MAC protocols, a node transmits and forwards a packet to a neighbor according to an allocated time slot schedule. When packet transmission fails, a node should wait until the next assigned time slot to resend the packet. Therefore, the end-to-end delay depends on the whole schedule and its cycle length called superframe. To reduce latency in industrial networks, Saputra and Shin proposed a scheduling scheme for ISA100.11a superframes [16]. This scheme specifies how to build a superframe to guarantee the delay for periodic upward packets from sensors to a root node and how to check the schedulability of a superframe.
Finally, IWSNs often adopt hybrid schemes [2, 3, 17, 18]. While the hybrid standard schemes such as ISA100.11a and WirelessHART use a TDMA-based MAC protocol, they also provide periodic data communication at low PER. At the same time, these schemes adopt a CSMA/CA-based MAC protocol for unpredictable transmission requirements, such as network control packets, alert information, on-demand requests, and retransmission of data packets.
During a CSMA/CA period in a hybrid scheme, ISA100.11a nodes can use a priority CSMA/CA scheme, as shown in Figure 2. Waiting time proceeding to transmission of a high-priority packet is shorter than that of a low-priority packet as shown in Figure 2, where transmitter 1 has a high-priority packet and transmitter 2 has a low-priority one. Because of difference in waiting time, transmitter 2 can detect transmission of a high-priority packet during its CCA (Clear Channel Assessment) and stop the transmission attempt. This scheme enables priority control within single-hop communication and decreases the probability of collision among transmission of packets of different priority [19]. We also use this priority CSMA/CA-like scheme in our approach.
[figure omitted; refer to PDF]
4. Priority-Based Transmission Scheme with Dynamic Channel Shift
In this section, we provide assumptions and terminologies at first. Then, we present an outline of our priority-based transmission scheme with dynamic channel shift. We also give detailed algorithms for priority-based channel selection and the transmission and reception mechanisms.
4.1. Assumptions
Industrial Applications Features. As noted above, our target applications are AMI, Distribution Automation, Optimized Factory, and so on. These typical industrial applications normally collect field data and store them at a remote server like cloud. Industrial applications often involve real time communication to react or respond to user queries within a predetermined deadline in order to perform timely control and avoid failures. Since most of existing WSNs cannot satisfy the requirement, we propose a scheme to provide real time communication over a large scale IWSN.
MAC Protocols. Recently, many new industrial wireless systems have been deployed. Most of them use TDMA-based protocols such as ISA100.11a, wirelessHART, and IEEE802.15.4e/g based protocols in order to avoid interference among internal nodes and keep communication success probability high. Those protocols provide multihop and time-synchronized networks that consist of a central manager and other nodes that are synchronized with the central manager. We assume that our targeted network is also multihop and time-synchronized, but our proposal operates over a MAC layer to decide what channel to use and when to transmit packets and does not rely on any specific MAC protocols.
Network Topology and Its Condition. Similarly to other TDMA-based WSN protocols, we also assume a tree topology whose root is a central manager. Our proposal does not specify any routing protocols as far as a stable tree-based routing topology is established and maintained for a large scale WSN. In simulation experiments, we consider a network of 500 nodes with 8 hops for 920 MHz and 16 hops for 2.4 GHz at maximum.
Priority Level of Packets. In an IWSN, multiple applications would simultaneously operate such as periodic data gathering and remote control. In addition, networking functions such as routing and time synchronization are also running. Among them, remote control is the most crucial and must be given the highest priority to guarantee real time communication. Furthermore, its responses from nodes to a root node should have the higher priority than those packets belonging to periodic data gathering. Although frequent loss of control packets affects stability and reliability of a WSN, a best-effort service is enough. We evaluate the lower bound of available bandwidth for lower priority packets in Section 6. Details of prioritization will be given in the next subsection.
Multiple Communication Channels. TDMA-based MAC protocols for IWSNs have channel hopping functions to enable coexistence of multiple networks in the same area and dynamic bandwidth allocation. In this paper, we assume that three channels are available to use.
4.2. Terminologies
We define our terminologies as follows.
4.2.1. Frame Composition
First, we define three types of frames over a MAC protocol.
The first type is the SlotFrame, which consists of two timeslots as shown in Figure 3. Both ISA100.11a and IEEE802.15.4e technologies divide time into timeslots of configurable length, with typical durations ranging from 10 to 14 ms. These technologies do not, however, support MAC layer retransmission within a timeslot. The SlotFrame enables transmission of a packet within the 1st timeslot and retransmission within the 2nd timeslot.
[figure omitted; refer to PDF]
The second type is the ComFrame, which consists of SlotFrames, as shown in Figure 4. The number of SlotFrames in a ComFrame is calculated as the maximum hop count in a multihop wireless network plus
[figure omitted; refer to PDF]
The final frame type is the AppFrame, which consists of ComFrames on multiple channels, as shown in Figure 5. The number of ComFrames in an AppFrame is a system parameter that depends on the application requirements.
[figure omitted; refer to PDF]
4.2.2. Priority Level and Communication Channels
As mentioned above, we define
4.3. Outline
We give an outline of how our scheme simultaneously fulfills several requirements of industrial wireless communications: a guaranteed deadline for on-demand communication, data collection at low PER, and communication of network control packets among neighbors.
In our scenario, there are three kinds of packets. The first kind is unpredictable packets for on-demand control. The second is periodic packets generated by sensors for periodic data collection. The third is network control packets that build multihop routes from sensors to a root node and exchange time information for synchronization among nodes.
We first rank packets according to industrial application requirements. To provide a guaranteed deadline, we define an on-demand downward packet from a root node to a sensor to have the highest priority (
In addition, our priority-based dynamic multichannel transmission scheme uses three communication channels. The
4.4. Example of Priority-Based Dynamic Multichannel Transmission Mechanism
We next provide an example of how to ensure preferential communication of a downward packet from a root node to an end device (
[figure omitted; refer to PDF]
[figure omitted; refer to PDF]In addition, our scheme uses a dynamic channel shift mechanism to communicate information about other priority levels, as shown in Figure 8. As noted above in Section 4.1, our proposal uses three communication channels and nodes share the number of channels and the order of scanning channels as well as packet priority. All nodes choose Ch
Table 2
An example of SlotFrame usage in a ComFrame.
1st SF | 2nd SF | 3rd SF | 4th SF | 5th SF | 6th SF | 7th SF | |
Root |
Ch1 (
|
Ch3 | Ch2 ( |
Ch3 | Ch3 | Ch1 ( |
Ch3 |
Node 1 | Ch1 ( |
Ch1 ( |
Ch3 | Ch3 | Ch1 ( |
Ch1 ( |
Ch3 |
Node 2 | Ch1 ( |
Ch1 ( |
Ch1 ( |
Ch3 | Ch1 ( |
Ch3 | Ch3 |
Node 3 |
Ch1 (
|
Ch3 | Ch1 ( |
Ch1 ( |
Ch3 | Ch3 | Ch3 |
Node 4 | Ch1 | Ch3 | Ch3 | Ch1 ( |
Ch3 | Ch3 | Ch3 |
Node 5 | Ch1 | Ch2 ( |
Ch2 ( |
Ch3 | Ch3 | Ch3 | Ch3 |
Node 6 | Ch2 ( |
Ch2 ( |
Ch3 | Ch3 | Ch3 | Ch3 | Ch3 |
Node 7 |
Ch2 (
|
Ch3 | Ch3 | Ch3 | Ch3 | Ch3 | Ch3 |
4.5. Detailed Mechanism
4.5.1. Transmission Policy
Every node transmits a packet according to its SlotFrame usage policy and ComFrame usage policy.
4.5.2. SlotFrame Usage Policy
All nodes select a communication channel for each SlotFrame by a dynamic multichannel transmission mechanism. Then, nodes transmit
4.5.3. ComFrame Usage Policy
A root node uses the 1st or 2nd SlotFrame to transmit an
Since the length of ComFrame is large enough for a packet sent by a node at any hop distance to reach a root node, ComFrame assignment can be maintained and fixed as far as the maximum hop count does not increase.
4.5.4. Retransmission Policy
The length of a time slot in a TDMA scheme like ISA100.11a is just long enough for a MAC frame of maximum size and its acknowledgement (ACK). Normally, TDMA schemes do not permit any retries in a time slot. For lossy networks, however, link quality (i.e., the communication success ratio) is significantly improved by permitting a node to send a retry packet, as shown in Figure 9. In our proposal, transmission of a retry packet is permitted for every one hop communication of
[figure omitted; refer to PDF]
Figure 10 shows a comparison of successful path transmission probabilities among the following four retransmission policies: the first policy does not support retry for either link communication or end-to-end communication; the second one supports link retry but not end-to-end retry; the third one supports end-to-end retry but not link retry; and the fourth policy supports both link and end-to-end retry. The figure shows that both retry types are effective even if the retry is only attempted once.
[figure omitted; refer to PDF]
4.5.5. Packet Forwarding Policy
As described above for the SlotFrame usage policy, our proposed scheme does not allocate the intermediate SlotFrames of all ComFrames. For example, only the 3 bold SlotFrames are allocated in advance in Table 2. Every node basically seeks to forward a packet received at a previous SlotFrame with a dynamic channel shift for the transmitting process rule when it does not detect any higher-priority packets.
4.5.6. Reception Process with Dynamic Channel Shift
A root node transmits an
[figure omitted; refer to PDF]
4.5.7. Transmission Process with Dynamic Channel Shift
For transmission all nodes must check for packet existence over channels in order of priority until reaching the usage channel, as in the reception process with dynamic channel shift. The transmission process works as follows by packet priority level:
4.5.8. Forwarding Process with Dynamic Channel Shift
All nodes must check for packet existence, as in the transmission process with dynamic channel shift. The forwarding process works as follows by packet priority level:
5. Simulation Evaluation
5.1. Simulation Settings
To evaluate the performance impact of our priority-based dynamic multichannel transmission scheme, we performed a set of simulations with 501 nodes placed statically and randomly in a square field. A root node was placed at the lower left-hand corner of the field, and a routing protocol for low-power and lossy networks (LLNs) [20] was applied to create routes from all nodes to the root node with a shortest-path metric. Figure 13 shows an example of the resulting network topology. This served to simulate our target system, like that shown in Figure 1. The network topology was fixed during a simulation, and a total of
Table 3
Simulation conditions.
Item | Notation | Value |
Value |
Number of nodes |
|
500 nodes | 500 nodes |
|
|
500 B | 127 B |
|
|
100 B | 40 B |
Communication speed |
|
100 kbps | 250 kbps |
Data collection cycle |
|
30 min | 5 sec |
Max hop count |
|
|
16 hops |
Average hop count |
|
30 hops | 8 hops |
Link PER with retry | Per | 0–10% | 0–9% |
Times lot length |
|
100 ms | 10 ms |
Wait time for channel shift |
|
5 ms | 1 ms |
The network is subject to three traffic packets: request/response type traffic from a root node as unpredictable packets, sensor-to-root traffic as periodic packets, and network control traffic that exchanges information among neighbors. In our proposal, transmission of
In this paper, we evaluate the worst case performance. More specifically, we define an AppFrame accommodating three traffic classes as shown Figure 12. An AppFrame consists of three blocks. The first block is used for a root node to send requests (
[figure omitted; refer to PDF]
[figure omitted; refer to PDF]5.2. Simulation Results
5.2.1. End-to-End Delay of High-Priority Packets (
All packets are transmitted by ComFrame. At a time when an application queues an
Figure 14 shows end-to-end delay comparison. We conducted field experiments to obtain delay samples of WirelessHART. In the experiments, a root node of WirelessHART received
[figure omitted; refer to PDF]
5.2.2. Success Rate of High-Priority Packets
Figure 15 shows the simulation results for the success rate of high-priority packets. The root node received the highest-priority packets (
[figure omitted; refer to PDF]
5.2.3. Available Bandwidth for
Figure 16 shows the simulation results for the ratio of the available
[figure omitted; refer to PDF]
6. Discussion
6.1. Lower Bound of Available Bandwidth for
As we show above, almost all
The length of Block 3 is calculated by
Table 4
Communication patterns for
Number | Appearance pattern | Required # of ComFrames | |||
|
|
|
|
||
|
Pass | Pass | — | — | 1.0 |
|
Pass | Fail | Pass | Pass | 2.0 |
|
Pass | Fail | Pass | Fail | 2.0 |
|
Pass | Fail | Fail | — | 1.5 |
|
Fail | — | Pass | Pass | 1.5 |
|
Fail | — | Pass | Fail | 1.5 |
|
Fail | — | Fail | — | 1.0 |
Table 5
Expected number of ComFrames for
Index |
1 | 2 | 3 | 4 | 5 | 6 | 7 |
E2Esuccess prob. | 1.0 | 0.99 | 0.98 | 0.97 | 0.96 | 0.95 | 0.94 |
|
1.0 | 1.014 | 1.029 | 1.043 | 1.057 | 1.070 | 1.083 |
On the other hand,
6.2. Compatibility with ISA100.11a Standard
Figure 17 shows how to adapt our proposal to the ISA100.11a standard protocol. Basically, our proposal is a technology between the network and data link layers, so that it does not directly affect processing in those layers. We do have to specify the operation mode and adjust some parameters of the data link layer to compose our own frames. We use priority CAMSA/CA, select slow-hopping mode as the channel hopping pattern, and bundle time slots defined by ISA100.11a to compose SlotFrame, ComFrame, and AppFrame logically. Our scheme decides what channel (Ch
[figure omitted; refer to PDF]
6.3. Strengths and Weaknesses of Our Proposal
Our proposal is very lightweight and much simpler than usual TDMA-based protocols like ISA100.11a. They typically have a scheduler for allocating time slots to meet application requirements. The network manager has to determine and deliver the schedule to all nodes whenever a new node joins the network or the network topology changes. It consumes considerable bandwidth and causes extra delay especially in a lossy and unstable network. Our proposal defines a ComFrame whose length is fixed during network operation. The length depends on maximum multihop count that is one of predetermined system parameters. In a ComFrame, there are at most two high primal packets (an
On the other hand, as described above in Section 6.2, our proposal requires more hardware resources than a normal ISA100.11a, when our scheme operates over ISA100.11a. Our proposal needs at least three channels to avoid collisions among different priority packets. Then a node should have three physical interfaces each of which runs full functions of ISA100.11a or have virtual communication interfaces that operate independently over a physical interface to meet our requirements. In either case, hardware cost for a node becomes more expensive than a normal of ISA100.11a. It may hinder deployment of our proposal, but IWSN should be designed to meet real time requirement to guarantee interaction within a predetermined deadline.
7. Conclusions and Future Work
This paper introduced a priority-based dynamic multichannel transmission scheme for IWSNs. Our algorithm enables transmission of packets of different priority level in the same period without collisions. The highest-priority packets for remote control can be delivered within a guaranteed deadline through a hybrid control scheme that combines centralized control by a root node and autonomous decentralized radio channel shift by nonroot nodes. At the same time, lower priority packets belonging to periodic data gathering and control can receive the satisfactory quality of service, where the collection ratio of periodic data packets is higher than 45% and the lower bound of bandwidth available to control packets is larger than 36% at the worst case scenario.
In this paper, we do not address dynamic adaptation of our scheme to handle dynamic or unexpected changes in application and system requirements. For example, composition of AppFrame must be predetermined at the deployment phase under assumptions on system configurations, but it should be dynamically regulated to fit to actual traffic demand. In a case of an unstable network, control packets would be transmitted more frequently. Therefore, we need to organize an AppFrame to spare more bandwidth for
Conflicts of Interest
The authors declare that there are no conflicts of interest regarding the publication of this paper.
[1] Z. Alliance, "Zigbee," . 2017, http://www.zigbee.org
[2] FieldComm Group, "Hart communication," . 2015, https://fieldcommgroup.org
[3] ISA, "Isa100, wireless systems for automation," . 2017, http://isa100wci.org
[4] Institute of Electrical and Electronics Engineers (IEEE), "IEEE Standard for Local and metropolitan area networks-Part 15.4: Low-Rate Wireless Personal Area Networks (LR-WPANs) Amendment 1: MAC sublayer IEEE Std," . 802. 15.4e-2012, 2012
[5] G. Kalani, Industrial Process Control: Advances And Applications, 2002.
[6] D. J. Olsen, N. Matson, M. D. Sohn, "Grid integration of aggregated demand response," Part 1: Load Availability Profiles and Constraints for the Western Interconnection, vol. no. LBNL-6417E,DOI: 10.2172/1165113, 2013.
[7] TEPCO, "Basic concept for smart meter specification based on rfc," . 2012
[8] D. F. Ramírez, S. Céspedes, "Routing in neighborhood area networks: a survey in the context of ami communications," Journal of Network and Computer Applications, vol. 55, pp. 68-80, DOI: 10.1016/j.jnca.2015.04.011, 2015.
[9] DLMS, "Dlms user association: Cosem identification system and interface classes," . 2010
[10] Lineartechnology, "Smartmesh wirelesshart application notes," . 2016, http://cds.linear.com/docs/en/application-note/SmartMesh_WirelessHART_Application_Notes.pdf
[11] Y. Li, C. S. Chen, Y. Song, Z. Wang, "Real-time qos support in wireless sensor networks: a survey," IFAC Proceedings Volumes, vol. 40 no. 22, pp. 373-380, DOI: 10.3182/20071107-3-FR-3907.00052, 2007.
[12] H. Kurunathan, R. Severino, A. Koubaa, E. Tovar, "Worst-case bound analysis for the time-critical MAC behaviors of IEEE 802.15.4e," Proceedings of the 2017 IEEE 13th International Workshop on Factory Communication Systems (WFCS),DOI: 10.1109/WFCS.2017.7991967, .
[13] D. Vassis, G. Kormentzas, "Throughput analysis for IEEE 802.11 ad hoc networks under the hidden terminal problem," Proceedings of the 2006 3rd IEEE Consumer Communications and Networking Conference, CCNC 2006, pp. 1273-1276, DOI: 10.1109/CCNC.2006.1593243, .
[14] G. Bianchi, "Performance analysis of the IEEE 802.11 distributed coordination function," IEEE Journal on Selected Areas in Communications, vol. 18 no. 3, pp. 535-547, DOI: 10.1109/49.840210, 2000.
[15] B. Shrestha, E. Hossain, K. W. Choi, "Distributed and centralized hybrid CSMA/CA-TDMA schemes for single-hop wireless networks," IEEE Transactions on Wireless Communications, vol. 13 no. 7, pp. 4050-4065, DOI: 10.1109/TWC.2014.2327102, 2014.
[16] O. D. Saputra, S. Y. Shin, "Real-time based Superframe for ISA100.11a in Wireless Industrial Network," Journal of Communication and Computer, vol. 12 no. 1, pp. 28-32, DOI: 10.17265/1548-7709/2015.01.005, 2015.
[17] I. Rhee, A. Warrier, M. Aia, "Z-MAC: a hybrid MAC for wireless sensor networks," IEEE/ACM Transactions on Networking, vol. 16 no. 3, pp. 511-524, DOI: 10.1109/TNET.2007.900704, 2008.
[18] R. Costa, P. Portugal, F. Vasques, R. Moraes, "A TDMA-based mechanism for real-time communication in IEEE 802.11e networks," Proceedings of the 15th IEEE International Conference on Emerging Technologies and Factory Automation, ETFA 2010,DOI: 10.1109/ETFA.2010.5641340, .
[19] N. Q. Dinh, D.-S. Kim, "Performance evaluation of priority CSMA-CA mechanism on ISA100.11a wireless network," Computer Standards and Interfaces, vol. 34 no. 1, pp. 117-123, DOI: 10.1016/j.csi.2011.06.001, 2012.
[20] J. Yi, T. Clausen, Y. Igarashi, "Evaluation of routing protocol for low power and Lossy Networks: LOADng and RPL," Proceedings of the 2013 IEEE Conference on Wireless Sensor, ICWISE 2013, pp. 19-24, DOI: 10.1109/ICWISE.2013.6728773, .
You have requested "on-the-fly" machine translation of selected content from our databases. This functionality is provided solely for your convenience and is in no way intended to replace human translation. Show full disclaimer
Neither ProQuest nor its licensors make any representations or warranties with respect to the translations. The translations are automatically generated "AS IS" and "AS AVAILABLE" and are not retained in our systems. PROQUEST AND ITS LICENSORS SPECIFICALLY DISCLAIM ANY AND ALL EXPRESS OR IMPLIED WARRANTIES, INCLUDING WITHOUT LIMITATION, ANY WARRANTIES FOR AVAILABILITY, ACCURACY, TIMELINESS, COMPLETENESS, NON-INFRINGMENT, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Your use of the translations is subject to all use restrictions contained in your Electronic Products License Agreement and by using the translation functionality you agree to forgo any and all claims against ProQuest or its licensors for your use of the translation functionality and any output derived there from. Hide full disclaimer
Copyright © 2017 Yuichi Igarashi et al. This work is licensed under http://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
Abstract
Industrial wireless sensor network (IWSN) applications are required to provide precise measurement functions as feedback for controlling devices. Current industrial wireless communication protocols, such as ISA100.11a and wirelessHART, have difficulty, however, in guaranteeing latency for unpredictable on-demand communications. In this paper, a priority-based dynamic multichannel transmission scheme is proposed for IWSNs. In the proposed scheme, a root node controls the transmission timing of high-priority packets, while other nodes autonomously decide what channel to use and when to transmit packets to a neighbor. Simulation results show that real time control is possible where a response delay from transmission of a request to reception of a reply at a root node is within 1,140 ms at per-link communication success probability with a retry of higher than 93%.
You have requested "on-the-fly" machine translation of selected content from our databases. This functionality is provided solely for your convenience and is in no way intended to replace human translation. Show full disclaimer
Neither ProQuest nor its licensors make any representations or warranties with respect to the translations. The translations are automatically generated "AS IS" and "AS AVAILABLE" and are not retained in our systems. PROQUEST AND ITS LICENSORS SPECIFICALLY DISCLAIM ANY AND ALL EXPRESS OR IMPLIED WARRANTIES, INCLUDING WITHOUT LIMITATION, ANY WARRANTIES FOR AVAILABILITY, ACCURACY, TIMELINESS, COMPLETENESS, NON-INFRINGMENT, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Your use of the translations is subject to all use restrictions contained in your Electronic Products License Agreement and by using the translation functionality you agree to forgo any and all claims against ProQuest or its licensors for your use of the translation functionality and any output derived there from. Hide full disclaimer