Abstract
Emerging Industry 4.0 applications require ever-increasing amounts of data and new sources of information to more accurately characterize the different processes of a production line. Industrial Internet of Things (IIoT) technologies, and in particular Wireless Sensor Networks (WSNs), allow a large amount of data to be digitized at a low energy cost, thanks to their easy scalability and the creation of meshed networks to cover larger areas. In industry, data acquisition systems must meet certain reliability and robustness requirements, since other systems such as predictive maintenance or the digital twin, which represents a virtual mapping of the system with which to interact without the need to alter the actual installation, may depend on it. Thanks to the IEEE 802.15.4e standard and the use of Time-Slotted Channel Hopping (TSCH) as the medium access mechanism and IPv6 Routing Protocol for Low-Power and Lossy Networks (RPL) as the routing protocol, it is possible to deploy WSNs with high reliability, autonomy, and minimal need for re-configuration. One of the drawbacks of this communication architecture is the low efficiency of its deployment process, during which it may take a long time to synchronize and connect all the devices in a network. This paper proposes an analytical model to characterize the process for the creation of downstream routes in RPL, whose transmission of multi-hop messages can present complications in scenarios with a multitude of interfering nodes and resource allocation based on minimal IPv6 over the TSCH mode of IEEE 802.15.4e (6TiSCH). This type of multi-hop message exchange has a different behaviour than the multicast control messages exchanged during the synchronization phase and the formation of upstream routes, since the number of interfering nodes changes in each retransmission.
Highlights
Introduction and Related WorkWe are currently in a transition stage, in which the digitization of production processes is becoming more widespread, with large areas of new technologies such as Big Data, Machine Learning or Artificial Intelligence depending on it
The Time-Slotted Channel Hopping (TSCH) mechanism proposed in the IEEE 802.15.4e standard [1] has positioned itself as one of the benchmarks for Wireless Sensor Networks (WSNs) deployment in industry, since its deterministic behaviour and the use of frequency hopping techniques are designed to work in the type of scenario where there is a high probability of interference
One of the weaknesses of these systems based on TSCH and RPL is the network formation process, which can be extensive in terms of time without a correct configuration of the parameters involved in the process
Summary
We are currently in a transition stage, in which the digitization of production processes is becoming more widespread, with large areas of new technologies such as Big Data, Machine Learning or Artificial Intelligence depending on it. This paper proposes an analytical model to characterize the time it takes to perform the downstream routes formation in RPL, considering the number of interfering nodes in each hop Using this model, it is possible to analyse the impact on the network formation time, due to different protocol parameters and physical configurations of the WSN, such as the number of interfering nodes that cause collisions to the RPL traffic. It is possible to analyse the impact on the network formation time, due to different protocol parameters and physical configurations of the WSN, such as the number of interfering nodes that cause collisions to the RPL traffic This multi hop message exchange covers the formation of downstream routes in RPL, and in combination with the published results of [12], including TSCH synchronization and upstream routes formation, the entire network formation process is temporally characterized.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.