1. Introduction
Energy efficiency is a mandatory requirement in the scope of Wireless Sensor Networks (WSNs), since these kind of networks are usually composed of battery-powered devices, whose batteries are not always easily replaceable [1,2]. For instance, one can mention either the lack of natural and economic resources or the harsh environments where many of such WSNs are placed as impairments for battery replacement [3]. Thus, it becomes of fundamental importance to spend efforts towards reducing the network energy consumption, extending its lifetime as much as possible [2].
The power consumption of massive Internet of Things (IoT) hardware is mainly attributed to the Microcontroller Unit (MCU) and to the transmitter/receiver chains. Many of the existing low-power radio transceivers typically operate with ~30 when in the listening mode, with a slight consumption increase when transmitting. However, regardless of the operating mode, the transceiver-related consumption turns out to be much higher than the MCU consumption [4]. Moreover, the software implementation is usually optimized to keep the MCU sleeping when it is not required. However, low-power radios require energy-concerned Medium Access Control (MAC) protocols. Traditional MAC protocols, such as Carrier Sense Multiple Access (CSMA), require uninterrupted channel sensing and are consequently not suitable for energy-constrained devices, being capable of completely draining the devices’ battery in a matter of days if not associated with Radio Duty Cycling (RDC) mechanisms [5].
The Time Slotted Channel Hopping (TSCH) scheme [6] reduces consumption by applying a time-scheduling approach that allows the nodes to awake only when necessary. However, it requires a certain level of synchronization between the nodes in order to avoid communication outages, since it is critical to guarantee that the packets arrive at the receiver when not in sleep mode. One alternative to mitigate imperfect synchronization-related issues is by adopting a guard time. Moreover, synchronization deteriorates over time due to clock drift, such that there is a need to periodically resynchronize the nodes [7]. Different approaches are adopted in synchronized MAC protocols to address the synchronization problem, such as increasing the Enhanced Beacon (EB) rate [8] or setting a larger guard time for the receiver [9]. Nevertheless, such approaches require either more message exchange or a higher RDC, thus increasing the energy consumption.
In [10] it was shown that the idle listening during the guard time is responsible for most of the overall energy consumption. In [11,12,13], the authors performed empirical optimizations on the guard time in order to maximize the energy efficiency in both single-hop and multi-hop TSCH Network, by adapting the guard time at each node according to its distance to the sink and a target packet delivery ratio. However, the authors rely on very small values for the EB Interval (), which has the drawback of increasing the network traffic and being less energy efficient.
In [8,14], the authors propose a new beacon advertising approach for a fast synchronization. More specifically, although the scheme in [8] achieves faster joining times, the energy consumption is compromised in the initial deployment stage. Later, the same authors present in [14] a scheme that dynamically modifies the transmission period of the Enhanced Beacons, which can be properly adapted to reduce the power consumption and improve connection time and connection success rate. In [15], the existence of collisions between EBs is taken into account, and a novel autonomous EB scheduling method that eliminates collisions is proposed.
In [16] the authors propose an approach where the node proceeds with the re-synchronization by considering multiple routing parents from the IPv6 Routing Protocol for Low Power and Lossy Networks (RPL) as time source. The results suggest that, with two time sources, the network is able to maintain synchronization with smaller guard times, since the maximum synchronization error is contained. However, the authors consider very small values for the EB Interval (), which, as previously discussed, is not efficient in terms of network traffic and energy consumption.
In [9], the authors proposed the so-called Guard Beacon (GB) method, aiming at reducing the guard time and consequently increase the energy efficiency of the synchronization process. In each synchronization round, a node sequentially sends several beacons, increasing the probability that at least one of them will be successfully received by the node to be synchronized. In a TSCH-based network, nodes send Enhanced Beacons in a periodic fashion [6], which are special TSCH packets that contain all the necessary information for a node to join the network and establish communication to the other nodes. Synchronism between nodes is then maintained by means of periodical EBs exchange to calibrate their clocks. Thus, employing the Guard Beacon strategy could lead to energy savings on a TSCH network, since the probability that at least one of the beacons is received is higher, which enables synchronism maintenance even with smaller guard times.
An Operating System (OS) designed for constrained IoT devices has some requirements in terms of Random Access Memory (RAM) and Read Only Memory (ROM) consumption, multitasking, strict power management and real time behavior [17]. Several operating systems have been developed to comply with WSNs requirements, such as TinyOS [18], RIOT [19], OpenWSN [20], Zephyr [21], Contiki [17] and many others. Recent works have evaluated the energy consumption of a TSCH-based network on different hardware platforms and operating systems [10,22,23]. An analytical energy consumption model for the OpenWSN TSCH implementation was derived in [23], being supported by experimental results. Based on [22], an improved model with a more up-to-date set of time slots and states was proposed, also adopting more recent hardware and firmware, and whose output accurately matches the experimental results.
Contiki is a very popular OS within the community, since it has a low memory footprint, implements several standards, has a good hardware support and is backed by both industry and academia, with more than 2000 forks, almost 500 watchers and 3000 stars on its official GitHub repository [24] (Codebase:
We resort to the Guard Beacon strategy aiming at reducing the guard time of a TSCH-based network. Our results indicate that the standard Contiki’s TSCH implementation [24] power consumption is up to 13.05% higher than when our scheme is implemented;
We perform a set of measurements on the Contiki’s TSCH timing, which allows us to provide a more updated set of time slots and states then the ones from [22], also including the Guard Beacon strategy. The model accuracy is verified by comparing the analytical results to the ones obtained from the Contiki’s Powertrace and Energest tools, which presents a close match regardless of the guard time length or the packet sizes.
The rest of this work is organized as follows. Section 2 presents the IEEE 802.15.4.e standard and its operating principles. The proposed energy consumption model is presented in Section 3. Section 4 presents and discusses some analytical and experimental results for a Texas Instruments CC2650 Launchpad hardware platform. Finally, Section 5 concludes the paper.
2. Time Slotted Channel Hopping—TSCH
The Time Slotted Channel Hopping scheme is introduced in the IEEE 802.15.4e standard, aiming at increasing reliability and robustness [6]. In a TSCH-based network as the one illustrated in Figure 1, each transmitter–receiver pair is assigned with a fixed-size timeslot, in a Time-Division Multiple Access (TDMA) fashion that follows a predefined schedule. Moreover, there are independent channels available for communication, where the channel index f assigned to establish a connection is pseudo-randomly determined as
(1)
where is a parameter that allows different channels to be used at the same timeslot for different slotframes, ASN stands for the absolute slot number (i.e., the total number of elapsed timeslots since the network establishment), is the number of available channels, is the modulo operation and is a lookup table that contains a predefined sequence of channels.A sensor node is then able to join a TSCH network after successfully receiving an Enhanced Beacon frame containing the following set of information: (i) the timeslot duration; (ii) the number of timeslots in a slotframe; (iii) synchronization-related data; (iv) the channel hopping sequence [6]. Each TSCH timeslot can be of six different types; namely [23]:
Figure 2 illustrates the unicast communication process by illustrating the
In the aforementioned transaction, the receiver initially waits the time period
The transmitter node, in turn, initially expends
Usually, due to interference and consumption concerns, sensor nodes in WSNs operate under low duty-cycle policies, typically lower than [23,26]. Thus, one could expect the devices to frequently be either in the
3. Energy Consumption Model
The availability of an analytical energy consumption model is an important feature that can guide network designers to properly define and adjust the network parameters, subjected to the application requirements. In a practical WSN implementation, however, although the energy consumption is fundamentally dependent on the MCU and the radio consumptions, the overall consumption model varies depending on the platform in use. In this sense, even though recent works have modeled the energy consumption of a TSCH-based network [22,23], their proposed models are valid to the OpenWSN OS only, not accurately estimating the consumption of a Contiki OS TSCH implementation running on a CC2650 hardware platform, as will be seen in the results presented in Section 4.
It becomes then important to evaluate the energy consumption of a Contiki OS-based TSCH network, since it is widely adopted in the WSNs scope [5,24].
3.1. Energy Consumption of a CC2650 Running Contiki OS
Contiki OS has a TSCH and 6TiSCH implementation [5], a full low-power IP networking (6LoWPAN, RPL, CoAP and MQTT) and tools for software-based energy estimation, namely Energest and Powertrace [25]. Energest tracks the time the hardware components become active, such as radio or MCU, and Powertrace is responsible for reporting those values. Upon having knowledge about the power consumption of each component, one can then estimate the overall device energy consumption.
Aiming at obtaining an analytical model for the power consumption, one needs to assess the timing of each hardware component for every of slot. We then develop a General Purpose Input/Output (GPIO) state logic inside the TSCH DEBUG Macros from the Contiki TSCH implementation, which can be tracked by connecting a logic analyzer to the CC2650 (see Figure 3).
The set of all the possible logic states is shown in Table 1. Note that each has an associated number, which is equivalent to the binary number represented by the output pins.
We also define the set of slot types as , such that the average power consumption for a given is calculated as
(2)
where is the set of consumption modes, represents the total time of a TSCH time slot and corresponds to the energy consumed for a given and slot , being calculated as(3)
where V is the input voltage, is the current drawn at each and is the time spent at each for a given and pair. Note that a given does not necessarily have all the states from neither necessarily operates under all the modes from . In this situation, is set to zero.Considering that represents the type whose t-th time slot has been assigned to, one can calculate the average power consumption for each as
(4)
where Q is the total number of time slots.Figure 4 illustrates the procedure adopted to measure the timing properties of a given , in this particular case a
The average measured values for all the possible combinations of (,,) are presented in Table 2 and Table 3, always for . The sets of states within each is presented in Table 4, sorted in chronological order of occurrence.
It is worth mentioning that such values are significantly different from the values obtained in previous works. Such a difference is depicted in Figure 5, which compares the values measured in this work to the standard timeslot model defined by the IEEE 802.15.4e amendment, as previously shown in Figure 2. For instance, the event
As mentioned in Section 1, the nodes need to send (
3.2. The Guard Beacon Strategy
Aiming at reducing the Guard Time without compromising the synchronization, the so-called Guard Beacon scheme was proposed [9]. This strategy consists of sending a burst of several beacons instead of just a single beacon. The optimal number of beacons is shown to be [9]
(5)
where the nearest integer rounding function, , is the beacon interval, is the estimated deviation of clock drift rate, is the estimated deviation of message delivery delay, is the estimated deviation of clock offset, is the power consumption for idle listening, is the beacon duration and is the power consumption for data transmission.The sending time of the nth beacon, with , is given by [9]
(6)
where corresponds to the inverse error function.According to [9], the GB strategy can reduce the synchronization power consumption by ~40%. This motivates us to implement such a strategy over the TSCH beaconing system [27]. Since the beacons required by GB do not carry any additional payload, our implementation considers the use of only two bytes per beacon: one to identify the frame as a beacon and the second one to carry the beacon number.
However, due to setup-related issues, in our implementation the number of adopted beacons is fixed and equal to 3 GBs (Even though the time spent to send one byte is 32 , the radio API only returns from a transmission after ~500 . Since the standard Guard Time for a 15 timeslot is 1800 , the number of beacons is then upper limited to 3 GBs). Although this number does not necessarily represent the optimal number of GB from (5), we will show in Section 4 that it provides significant energy savings when compared to the Single Beacon strategy.
Another particularity of our proposal is to anticipate the transmission of the first GB, in order to increase the probability that at least one out of the three GBs is received by all the (multiple) nodes of the network. The idea behind this proposal comes from fact that the clock drifts of a dense network may occur in opposite directions (i.e., ppm for a node and ppm for another node with respect to the network clock source, for instance). Figure 6 illustrates the GB implementation.
Similarly to Section 3.1, we compute the timing for each within a for the types belonging to the GB-based set of types . The results are also presented in Table 2 and Table 3. Thus, the global average power consumption of a TSCH Network with the Guard Beacon strategy can be calculated with the sum of (4) for every and every . It is worth mentioning that, if a platform different from the CC2650 running the Contiki OS is considered, the only adaptation needed is a new measurement campaign, in order to obtain the values from Table 2 and Table 3 for the new hardware.
Additionally, in Figure 7 and Figure 8, a comparison between the standard timeslot model defined by the IEEE 802.15.4e and the measured timing is shown for
Regarding the scalability of our proposal, the effect of increasing the number of nodes can be neglected for the following reasons: (i) the frequency of Enhanced Beacons is the same for our scheme and the standard TSCH implementation. The difference is that instead of sending one EB we send three GBs on the same timeslot. Thus, our scheme is as scalable as the standard TSCH implementation; (ii) despite an increase in the network traffic, the energy consumption model would not be affected by increasing the number of nodes. Note that the energy consumption model takes into account the number of received and transmitted frames, such that it remains valid regardless the number of nodes.
After closely investigating the outcomes of the entire set of modes and slot types, we realize that an analytical model based solely on the IEEE 802.15.4e standard does not encompass some unexpected behaviors, such as:
In a
TxData orTxDataRxAck slot, the radio was supposed to enter in a sleep mode after finishing the packet transmission; however, it remains active for approximately an additional period of ;Although there is no incoming Ack in a
TxData slot, the receiver remains active for about ;Upon receiving a packet, the receiver unnecessarily remains active for extra ~ in a
RxData slot, regardless of the size of the received packet;The CPU remains active after the end of the timeslot for approximately in the
TxDataRxAck timeslot and about forRxDataTxAck .
Thus, incorporating such odd behaviors into our energy consumption model plays an important role towards improving its accuracy, as we show in Section 4.
4. Performance Evaluation
This section presents some analytical and experimental results obtained from a 2-node Contiki TSCH Network using Texas Instruments CC2650 Launchpads. The simulation parameters are given in Table 5.
The two-node network generates a log with information regarding the TSCH operation, which gives us information about the total number of timeslots, and the number of slots of each , which can be used to calculate the analytical global average power consumption from (4). The log also contains the Contiki’s Powertrace and Energest tools’ data, so that one can calculate the numerical global average power consumption. In what follows, two different scenarios are evaluated: the first one without the GB strategy while varying the EB period (); the second one with the Guard Beacon strategy with the same range of EB Periods.
The global average power consumptions for the two aforementioned scenarios while considering different EB transmission periods and the minimum achievable guard times are shown in Figure 9. As expected, it can be seen that the GB strategy improves the energy efficiency for all the EB transmission periods, since it can operate at lower guard times when compared to the standard Contiki’s TSCH implementation. On the right axis, the amount of extra power spent by the standard TSCH implementation is shown. For instance, when s and the GB strategy is not in use, more power is needed.
Figure 10 shows the detailed average power consumption of for . The consumptions for the are barely visible in this scale, so that we opt for omitting their legend. As one could expect from inspecting Figure 9 for , the lowest possible power consumption occurs for the GB enabled scenario, with a Guard Time of 1000 . For a GB disabled scenario the most energy efficient scenario for the same occurs at , while consuming % more power than when the GB technique is in use. It can be seen that for the same guard times, both strategies have roughly the same CPU, Rx and overall power consumption. Again, the key factor that improves the energy efficiency is the lower guard times achieved by the GB enabled scenario.
The same analysis is shown in Figure 11, for , where the standard TSCH implementation consumes % more energy than the GB enabled scenario. Moreover, as seen in Figure 9 for , with the GB technique the system can operate with a 400 guard time, which results in an average power consumption of less than 1 , the most energy efficient among all the analyzed scenarios.
Now, aiming at evaluating the accuracy of our analytical energy consumption model, we compare it with practical results. In Figure 12 we present the detailed average power consumption of for without the GB strategy implemented. It can be seen that there is a good match; however, the calculated overall power consumption is lower than the results obtained from the Contiki Powertrace tool. The same analysis is done in Figure 13, now with the GB technique in use. Again we see a good match, but with lower power consumption values obtained from the analytical equations.
In order to investigate the differences from Figure 12 and Figure 13, the analytical and practical results of every for are presented in Figure 14, for both Guard Beacon-enabled and disabled scenarios. We can draw some conclusions:
Corroborating the results from Figure 10 and Figure 11, the power consumptions of each for GB On and Off scenarios are almost the same;
When the Guard Beacon strategy is implemented, energy savings can be achieved by considerably reducing the guard time;
The difference between experimental and analytical values is mainly due to the CPU power consumption, since the analytical model does not encompass the CPU states outside the TSCH code.
Finally, in order to illustrate the energy savings, in Figure 15 we plot the lifetime of a TSCH-based CC2650 Launchpad platform, powered by a 3000 3 battery, for both GB enabled and GB disabled strategies. The same guard time interval is considered. It can be seen that, to the left of the dashed vertical line, only the GB enabled nodes can operate. Thus, the GB strategy can improve the lifetime by , which means that a node would operate up to 48 days more when compared to a TSCH node that does not employs the GB scheme.
5. Conclusions
In this work we proposed a guard time reduction for the Contiki OS TSCH implementation by employing the Guard Beacon strategy. Additionally, an analytical model for the nodes’ power consumption was derived. We compared the results obtained from the analytical equations and from the Contiki Powertrace tool, which supported the proposed model. Although the equations cannot predict the CPU power consumption outside the TSCH code, it was shown that the model has great accuracy for all the analyzed scenarios. The GB strategy improved the TSCH energy efficiency, since the power consumptions of each for GB On and Off scenarios are almost the same, but a guard time reduction up to is provided, so that without the strategy the nodes would consume up to more power. In terms of battery lifetime, the Guard Beacon approach provided a 48 days extension when considering a 3000 3 battery, or improvement on the lifetime.
As future work, the impact of the Guard Beacon strategy on the TSCH rendezvous process can be assessed, aiming at reducing the network joining time, which could lead to important energy savings. Additionally, the Guard Beacon strategy could be added to the schemes proposed in [8,14], increasing the energy efficiency even further. Moreover, multi-hop TSCH networks could benefit both from the schemes proposed in [11,13] and the Guard Beacon strategy, so that even lower guard times could be achieved, as well as lower EB sending rates.
Author Contributions
Investigation, M.A.S.; Writing—review & editing, O.K.R., G.L.M. and J.L.R. All authors have read and agreed to the published version of the manuscript.
Funding
This research was partially funded by National Council for Scientific and Technological Development (CNPq, Brazil) grant number 305052/2017-9.
Conflicts of Interest
The authors declare no conflict of interest.
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Figures and Tables
Figure 1. Network topology and established links (a) and TSCH Network Operation example (b). The 1st timeslot is dedicated to broadcast data: A → ALL, while on the following timeslots only unicast transmissions/receptions are performed. The slotframe contains 7 timeslots and 3 cycles are shown. The frequency is obtained from (1).
Figure 2. Timeslot template for a TxDataRxAck ↔ RxDataTxAck transaction. (Adapted from [6]).
Figure 5. A RxDataTxAck for Tslot=15 ms. The timing of each mode within a state can now be computed and a comparison between the standard timeslot model defined by the IEEE 802.15.4e and the measured timing is shown.
Figure 6. GB Strategy Transmission detailed. The 1st GB is sent prior to TsTxOffset by a Guard Beacon Time (GBT) amount of time. The receiver has an increased probability of receiving one of the GBs even when PGT is small. The estimated drift is calculated as the difference between the Expected Rx Time (ERx) and the Rx Start Time (RxS) so that the receiver can synchronize itself.
Figure 7. A TxGB slot for Tslot=15 ms. As in Figure 5, the timing of each mode within a state is computed and a comparison between the standard IEEE 802.15.4e timeslot model and the measured timing is shown.
Figure 8. A RxGB for Tslot=15 ms. As in Figure 5 and Figure 7, the timing of each mode within a state is computed and a comparison between the standard IEEE 802.15.4e timeslot model and the measured timing is shown.
Figure 9. Average power consumption as a function of the EB transmission periods for the GB-disabled and GB-enabled scenarios, while considering the minimum achievable guard times. The right axis shows the amount of extra power spent by the standard TSCH implementation.
Figure 10. Detailed average power consumption for GB disabled (a) and GB enabled scenarios (b) for TS=120 s.
Figure 11. Detailed average power consumption for GB disabled (a) and GB enabled scenarios (b) for TS=60 s.
Figure 12. Experimental (a) and calculated (b) average power consumption for a GB disabled and TS=60 s scenario.
Figure 13. Experimental (a) and calculated (b) average power consumption for a GB enabled and TS=60 s scenario.
Figure 14. Experimental (a) and calculated (b) detailed average power consumption comparison between GB enabled and GB disabled scenarios, for TS=60 s
Figure 15. Estimated Lifetime comparison for the CC2650 Launchpad when considering both GB enabled and GB disabled scenarios and a 3000 mAh 3 V battery.
Set : Debug Logic States.
Number | Number | ||
---|---|---|---|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Average active times in for reception slots.
|
|
|
|
||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
CPU | Tx | Rx | CPU | Tx | Rx | CPU | Tx | Rx | CPU | Tx | Rx | ||
|
0 | PGT | 0 | PGT | 0 | PGT | 0 | PGT | |||||
|
PGT | 0 | PGT | PGT | 0 | PGT | 0 | PGT | 0 | PGT | |||
|
- | - | - | - | - | - | - | - | - | 0 | |||
|
- | - | - | - | - | - | - | - | - | 0 | 0 | ||
|
0 | 0 | 0 | - | - | - | |||||||
|
0 | 0 | 0 | - | - | - | |||||||
|
0 | 0 | - | - | - | ||||||||
|
- | - | - | - | - | - | - | - | - | ||||
|
0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | |||||
|
0 | 0 | 0 | 0 | 29 | 0 | 0 | 0 | 0 | ||||
|
0 | 0 | 0 | 0 | |||||||||
|
0 | 6 | 0 | 6 | 6 | 0 | 6 | 6 | 0 | 6 | |||
|
0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 |
Average active times in for transmission slots.
|
|
|
||||||||
---|---|---|---|---|---|---|---|---|---|---|
CPU | Tx | Rx | CPU | Tx | Rx | CPU | Tx | Rx | ||
|
||||||||||
|
0 | 0 | 0 | |||||||
|
0 | - | - | - | - | - | - | |||
|
0 | - | - | - | - | - | - | |||
|
0 | - | - | - | - | - | - | |||
|
0 | - | - | - | - | - | - | |||
|
0 | 0 | 0 | 0 | 0 | 0 | ||||
|
0 | 0 | 0 | 0 | 0 | 0 | ||||
|
32 | 0 | 0 | 26 | 0 | 0 | 26 | 0 | 0 | |
|
0 | 0 | 0 | |||||||
|
0 | 0 | 0 | |||||||
|
0 | 0 | 0 | 0 | 0 | 0 |
Sets of states within each .
Set of States | |
---|---|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Simulation Parameters (Radio CC2650 and CPU ARM® Cortex®-M3).
Parameter | Value | Parameter | Value |
---|---|---|---|
Number of Nodes | 2 | 3 | |
Slotframe length | 7 | [4] | 9.1 |
15 | [4] | 6.1 | |
[4] | 2.93 | [4] | 1 |
[4] | 1 |
You have requested "on-the-fly" machine translation of selected content from our databases. This functionality is provided solely for your convenience and is in no way intended to replace human translation. Show full disclaimer
Neither ProQuest nor its licensors make any representations or warranties with respect to the translations. The translations are automatically generated "AS IS" and "AS AVAILABLE" and are not retained in our systems. PROQUEST AND ITS LICENSORS SPECIFICALLY DISCLAIM ANY AND ALL EXPRESS OR IMPLIED WARRANTIES, INCLUDING WITHOUT LIMITATION, ANY WARRANTIES FOR AVAILABILITY, ACCURACY, TIMELINESS, COMPLETENESS, NON-INFRINGMENT, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Your use of the translations is subject to all use restrictions contained in your Electronic Products License Agreement and by using the translation functionality you agree to forgo any and all claims against ProQuest or its licensors for your use of the translation functionality and any output derived there from. Hide full disclaimer
© 2020 by the authors.
Abstract
The IEEE 802.15.4-2015 standard defines a number of Medium Access Control (MAC) layer protocols for low power wireless communications, which are desirable for energy-constrained Internet of Things (IoT) devices. Originally defined in the IEEE 802.15.4e amendment, the Time Slotted Channel Hopping (TSCH) has recently been attracting attention from the research community due to its reduced contention (time scheduling) and robustness against fading (channel hopping). However, it requires a certain level of synchronization between the nodes, which can increase the energy consumption. In this work, we implement the Guard Beacon (GB) strategy, aiming at reducing the guard time usually implemented to compensate for imperfect synchronization. Moreover, besides presenting a realistic energy consumption model for a Contiki Operating System-based TSCH network, we show through analytical and practical results that, without the proposed scheme, the power consumption can be more than 13% higher.
You have requested "on-the-fly" machine translation of selected content from our databases. This functionality is provided solely for your convenience and is in no way intended to replace human translation. Show full disclaimer
Neither ProQuest nor its licensors make any representations or warranties with respect to the translations. The translations are automatically generated "AS IS" and "AS AVAILABLE" and are not retained in our systems. PROQUEST AND ITS LICENSORS SPECIFICALLY DISCLAIM ANY AND ALL EXPRESS OR IMPLIED WARRANTIES, INCLUDING WITHOUT LIMITATION, ANY WARRANTIES FOR AVAILABILITY, ACCURACY, TIMELINESS, COMPLETENESS, NON-INFRINGMENT, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Your use of the translations is subject to all use restrictions contained in your Electronic Products License Agreement and by using the translation functionality you agree to forgo any and all claims against ProQuest or its licensors for your use of the translation functionality and any output derived there from. Hide full disclaimer
Details




1 PPGSE, Universidade Tecnológica Federal do Paraná (UTFPR), Curitiba, PR 80230-901, Brazil;
2 CPGEI, Universidade Tecnológica Federal do Paraná (UTFPR), Curitiba, PR 80230-901, Brazil;