2011 7th International Conference on Wireless Communications, Networking and Mobile Computing 2011
DOI: 10.1109/wicom.2011.6040332
|View full text |Cite
|
Sign up to set email alerts
|

Power-Aware and Void-Avoidant Routing Protocol for Reliable Industrial Wireless Sensor Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2013
2013
2021
2021

Publication Types

Select...
4
1

Relationship

2
3

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 10 publications
0
3
0
Order By: Relevance
“…† The collision probability of a packet transmitted by each station is independent from the number of retransmissions already suffered (accurate for fairly large number of competing nodes [3]). † Owing to the industrial applications, the PL is assumed to be 32 bytes (the typical value for monitoring/control applications [1,19,[21][22][23][24][25][26][33][34][35][36]). † The basic access mechanism of the DCF is used.…”
Section: Assumptionsmentioning
confidence: 99%
“…† The collision probability of a packet transmitted by each station is independent from the number of retransmissions already suffered (accurate for fairly large number of competing nodes [3]). † Owing to the industrial applications, the PL is assumed to be 32 bytes (the typical value for monitoring/control applications [1,19,[21][22][23][24][25][26][33][34][35][36]). † The basic access mechanism of the DCF is used.…”
Section: Assumptionsmentioning
confidence: 99%
“…Here are some simplifying assumptions used in this paper, which are mostly common among the literature: All nodes always have a packet waiting to be transmitted (saturation traffic condition, similar to ). It somehow represents the worst‐case scenario, from the system performance point of view. The collision probability of a packet transmitted by each station is constant and independent, regardless of the number of retransmission already suffered (accurate for fairly large number of competing nodes ). Because of the industrial applications, the PL is assumed to be 32 bytes (the typical value for monitoring/control applications ). The basic access mechanism of the DCF is used. Because of the small size of the PL in industrial applications, the four‐way request to send/clear to send (RTS/CTS) mechanism is not practical .…”
Section: Markov Chain Model and Packet Delay Analysismentioning
confidence: 99%
“…The most important reason for some inconsistencies between the models and SIM results relies on the simplifying assumptions in the DCF DTMC model. Our extension to this work includes modeling the reliability–delay tradeoff in IEEE 802.11‐based industrial wireless networks , using more realistic channel models including multipath fading, extending the proposed model to the enhanced distributed channel access mechanism, and a complementary work to develop a reliable routing protocol for industrial use . Studying the performance of industrial networks using other MAC mechanisms defined in the latest version of the IEEE 802.11 standard , such as PCF, hybrid coordination function, and mesh coordination function, and modifying them to work better with the industrial applications, similar to the DPCF mechanism can be considered as important future pieces of work.…”
Section: Conclusion and Future Pieces Of Workmentioning
confidence: 99%