نتایج جستجو برای: tsch

تعداد نتایج: 101  

Journal: :Journal of Signal Processing Systems 2021

IEEE Std 802.15.4-2015 Time Slotted Channel Hopping (TSCH) is the de facto Medium Access Control (MAC) mechanism for industrial applications. It renders communications more resilient to interference by spreading them over time (time-slotted) and frequency (channel-hopping) domains. The 6TiSCH architecture bases itself on this new MAC layer enable high reliability communication in Wireless Senso...

Journal: :CoRR 2017
Simon Duquennoy Joakim Eriksson Thiemo Voigt

After a decade of research in low-power data collection, reaching arbitrary nodes has received comparatively little attention. The leading protocol for low-power IPv6 routing, RPL, is no exception, as it is often studied in multipoint-to-point scenarios. As a result, downward routing (from root to node) is still notoriously difficult, holding back the emergence of Internet of Things application...

Journal: :J. Network and Computer Applications 2017
Georgios Exarchakos Ilker Oztelcan Dimitris Sarakiotis Antonio Liotta

Industrial IoT applications require highly dependable monitoring and actuation capabilities of remote interoperable low power devices. Time scheduling with channel hopping has been a well attested mechanism to address these requirements in volatile environments. Yet, scheduling algorithms to date are not adaptive enough to changes in deployed applications and their environments. plexi is a rest...

Journal: :IEEE Access 2023

The Constrained Application Protocol (CoAP) is a RESTful protocol standardized by the IETF and widely used for IoT applications. CoAP includes default congestion control algorithm to ensure efficient operation under high traffic conditions. Other algorithms have been proposed evaluated in literature, including very popular CoCoA algorithm. All these assume that underlying wireless communication...

2017
Mahmoud Talebi Jan Friso Groote Conrad Dandelski

Correct and efficient initialization of wireless sensor networks can be challenging in the face of many uncertainties present in ad hoc wireless networks. In this paper we examine an implementation for the formation of a cluster-tree topology in a network which operates on top of the TSCHMAC operation mode of the IEEE 802.15.4 standard, and investigate it using formal methods. We show how both ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید