2017 13th International Conference on Distributed Computing in Sensor Systems (DCOSS) 2017
DOI: 10.1109/dcoss.2017.29
|View full text |Cite
|
Sign up to set email alerts
|

TSCH and 6TiSCH for Contiki: Challenges, Design and Evaluation

Abstract: Abstract-Synchronized communication has recently emerged as a prime option for low-power critical applications. Solutions such as Glossy or Time Slotted Channel Hopping (TSCH) have demonstrated end-to-end reliability upwards of 99.99%. In this context, the IETF Working Group 6TiSCH is currently standardizing the mechanisms to use TSCH in low-power IPv6 scenarios. This paper identifies a number of challenges when it comes to implementing the 6TiSCH stack. It shows how these challenges can be addressed with prac… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
74
0
5

Year Published

2017
2017
2021
2021

Publication Types

Select...
4
2
2

Relationship

4
4

Authors

Journals

citations
Cited by 89 publications
(82 citation statements)
references
References 21 publications
(26 reference statements)
0
74
0
5
Order By: Relevance
“…The proposed ACS methods are compared with a baseline, unmodified Contiki implementation of TSCH [9] (Fig. 5).…”
Section: B Simulationmentioning
confidence: 99%
“…The proposed ACS methods are compared with a baseline, unmodified Contiki implementation of TSCH [9] (Fig. 5).…”
Section: B Simulationmentioning
confidence: 99%
“…The Contiki implementation of the IPv6-over-TSCH stack [6] is known to provide high end-to-end packet delivery rate (PDR): 99.99 % and more, even in challenging conditions [7]. Nevertheless, in our first testbed experiments in the SPHERE house [1], a little-interfered environment we only received 99.9 % PDR, i.e., had a ten times higher proportion of dropped packets.…”
Section: Reliabilitymentioning
confidence: 99%
“…Project requirements mandate that all the raw data is collected, leading to a high datarate in the IEEE 802.15.4 network: up to tens of packets per second. At the MAC layer, we use Contiki implementation [6] of the IEEE 802.15.4-2015 TSCH protocol to efficiently manage the medium access, avoid packet collisions, and synchronize time (R4). As compared to CSMA-based low-power IoT MAC protocols, TSCH provides high reliability (R6) and predictability (R7) through scheduled operation and channelhopping [7], exploiting frequency diversity to fight external interference and multipath fading.…”
Section: System Overviewmentioning
confidence: 99%
“…To avoid partitioning of the network, synchronization is always done from upstream to downstream; in particular, each downstream node marks one or more nodes as its time sources. Note that using multiple upstream nodes when they are available (e.g., in dense networks) could help to increase the synchronization quality by averaging out the errors; however, in practice, the existing TSCH open-source implementations (OpenWSN [6] and Contiki [10]) allow to have just a single upstream node as the time source.…”
Section: A Background On Tschmentioning
confidence: 99%
“…The implementation builds on the Contiki TSCH code [10], and on the highaccuracy energy-efficient adaptive synchronization for TSCH for CC2650 described by Elsts et al in [11].…”
Section: Introductionmentioning
confidence: 99%