M. Lavassani, Filip Barac, M. Gidlund, Tingting Zhang
{"title":"Handling event-triggered traffic of safety and closed-loop control systems in WSANs","authors":"M. Lavassani, Filip Barac, M. Gidlund, Tingting Zhang","doi":"10.1109/INDIN.2016.7819237","DOIUrl":null,"url":null,"abstract":"This work investigates various methods to expand the deployment of Wireless Sensor-Actuator Networks (WSANs) to mission critical applications. We address the neglected open issues of hard deadline and deterministic delivery for event-triggered traffic in safety and closed-loop regulatory systems. DeMAC algorithm is proposed by utilizing TDMA-based subslots in emergency access periods, group acknowledgement, alternative packet structure, and relay node. The proposed algorithm displayed promising results in comparison with contention-based methods, in improving delivery rate of critical data within the deadline, and lowering the worst-case delay.","PeriodicalId":421680,"journal":{"name":"2016 IEEE 14th International Conference on Industrial Informatics (INDIN)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 IEEE 14th International Conference on Industrial Informatics (INDIN)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/INDIN.2016.7819237","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
This work investigates various methods to expand the deployment of Wireless Sensor-Actuator Networks (WSANs) to mission critical applications. We address the neglected open issues of hard deadline and deterministic delivery for event-triggered traffic in safety and closed-loop regulatory systems. DeMAC algorithm is proposed by utilizing TDMA-based subslots in emergency access periods, group acknowledgement, alternative packet structure, and relay node. The proposed algorithm displayed promising results in comparison with contention-based methods, in improving delivery rate of critical data within the deadline, and lowering the worst-case delay.