2011
DOI: 10.5121/ijcnc.2011.3517
|View full text |Cite
|
Sign up to set email alerts
|

Performance Analysis of IEEE 802.15.4/Zigbee Standard Under Real Time Constraints

Abstract: ABSTRACT

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
25
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 27 publications
(25 citation statements)
references
References 18 publications
(12 reference statements)
0
25
0
Order By: Relevance
“…This also leads us to simplifying the calculation of Equation (8), allowing one to know the delay impact (Tm k,i ) of the unslotted CSMA/CA algorithm, taking into account their maximum values of parameters that produce the worst-case transmission message between task k,i and, therefore, Tm k,i = Tm wc , where Tm wc is the worst-case transit delay for all messages sent from task k to task i. Various researches have described how to calculate the effective and actual data rates of an IEEE 802.15.4 wireless network, permitting the calculation of the transmission time between neighbors, giving a very rough estimate for Tm wc [33][34][35], which is approximated to Tm wc = 385.308 ms between two neighboring nodes that employ the WiSe mote [38] for wireless microcontrollers, allowing us to reduce the calculation for each flow of the control loop to:…”
Section: Worst-case End-to-end Delay Flow Control Signals Analysismentioning
confidence: 99%
See 2 more Smart Citations
“…This also leads us to simplifying the calculation of Equation (8), allowing one to know the delay impact (Tm k,i ) of the unslotted CSMA/CA algorithm, taking into account their maximum values of parameters that produce the worst-case transmission message between task k,i and, therefore, Tm k,i = Tm wc , where Tm wc is the worst-case transit delay for all messages sent from task k to task i. Various researches have described how to calculate the effective and actual data rates of an IEEE 802.15.4 wireless network, permitting the calculation of the transmission time between neighbors, giving a very rough estimate for Tm wc [33][34][35], which is approximated to Tm wc = 385.308 ms between two neighboring nodes that employ the WiSe mote [38] for wireless microcontrollers, allowing us to reduce the calculation for each flow of the control loop to:…”
Section: Worst-case End-to-end Delay Flow Control Signals Analysismentioning
confidence: 99%
“…The slotted CSMA/CA backoff algorithm is based on mainly two variables that correspond to: BE , which is the current backoff exponent, and NB , which is used to count the number of backoffs. The detailed algorithm can be seen in many works [31][32][33][34][35][36][37]. In our previous work, we performed an analysis of schedulability with strict real-time constraints and the synchronous mode of the 802.15.4 protocol [13,20].…”
Section: Worst-case End-to-end Delay Flow Control Signals Analysismentioning
confidence: 99%
See 1 more Smart Citation
“…Beaconing is another feature implemented through this layer. Finally, the MAC sub-layer can be exploited by higher layers to achieve secure communication [12].…”
Section: Medium Access Control Sub-layermentioning
confidence: 99%
“…Its capabilities and structure are those typically associated to such network layers, including routing. The entity of data is created and processed by network layer data units from the payload of the application layer and performs routing according to the topology which is used [12].…”
Section: Network Layermentioning
confidence: 99%