scispace - formally typeset
Search or ask a question
Journal ArticleDOI

Recent and Emerging Topics in Wireless Industrial Communications: A Selection

20 May 2008-IEEE Transactions on Industrial Informatics (IEEE)-Vol. 4, Iss: 2, pp 102-124
TL;DR: This paper discusses a selection of promising and interesting research areas in the design of protocols and systems for wireless industrial communications that have either emerged as hot topics in the industrial communications community in the last few years, or which could be worthwhile research Topics in the next few years.
Abstract: In this paper we discuss a selection of promising and interesting research areas in the design of protocols and systems for wireless industrial communications. We have selected topics that have either emerged as hot topics in the industrial communications community in the last few years (like wireless sensor networks), or which could be worthwhile research topics in the next few years (for example cooperative diversity techniques for error control, cognitive radio/opportunistic spectrum access for mitigation of external interferences).

Summary (6 min read)

Introduction

  • Sensor networks support much lower data rates and much smaller transmit powers.
  • For the sake of completeness the authors have also included a brief discussion of an existing commercial systems for wireless industrial communications: the WISA system from ABB.
  • The authors also aim to point out interesting research questions.

II. OVERVIEW ON RESEARCH AREAS FOR WIRELESS INDUSTRIAL NETWORKING

  • The MAC layer is a key functionality for industrial communication systems, since it directly impacts the timeliness of packets, also known as MAC protocol design.
  • Recent approaches to error control are addressed in more detail in Section IX.
  • Routing and transport protocols: especially in multihop networks like wireless sensor networks (soft) real-time guarantees have to be provided over multiple hops.
  • One example reference is [14], in which mobility and handovers are considered for hybrid wired/wireless PROFIBUS systems.

A. Quality of Service Measures for Wireless Industrial Networks

  • Industrial networks are in general designed to carry traffic that is dominated by exchanges of sensor readings and actuator commands between sensors/actuators on the one hand and (often centralized) controllers on the other hand [2], [17], [18].
  • Another one is the capacity-vs-outage-probability measure [22], denoting the transmission rates (and therefore the delay) so that the probability of not achieving this rate is below a pre-specified threshold.
  • In the producer--consumer model (for example adopted in WorldFIP [26], [27]) communication is based on unacknowledged broadcasts of data identifiers (by the ), to which the station possessing the identified data item (the producer) responds by broadcasting its current value.
  • Here the most important performance measures are related to the degree by which all the consumers are able to simultaneously capture the data and to maintain consistent buffer states—this is referred to as spatial consistency.
  • 1Technically, these measures are defined for stationary and frequency-flat block fading channels.

B. Security

  • Today’s automation networks tend to be more and more integrated with other networks, for example to allow cost-effective remote monitoring and maintenance of machine plants.
  • The authors describe both of them briefly but start with a reminder of the basic distributed coordination function (DCF) upon which both access schemes are built.
  • In the following, during each idle slot the counter is decremented by one and if it reaches zero, the station starts to transmit.
  • The authors are now in the position to briefly explain the difference between the classical DCF and the EDCF.
  • The HC receives reservation requests for TXOPs, grants or rejects these requests (admission control) and is responsible for actually scheduling the TXOPs for all attached stations.

B. Research Issues

  • Assuming that HCCA implementations will not become widely available during the next few years (PCF implementations actually never did), it makes sense to concentrate on improvements of the DCF and the EDCF.
  • One very interesting and relevant problem is the deterministic priority enforcement on the wireless channel.
  • This approach cannot be directly implemented with commercial wireless transceivers, since it requires full-duplex operation of the transceiver.
  • When a recessive station receives a signal, it has lost contention and gives up.
  • All these approaches share some problems and therefore need additional research: .

IV. WIRELESS SENSOR NETWORK TECHNOLOGY

  • In this section the authors review the fundamentals of wireless sensor network technology and their potential for industrial applications.
  • Wireless sensor networks (WSNs) [30], [55]–[60] consist of a large number of small, energy- and resource-constrained sensor nodes.
  • Some nodes might also be attached to actuators, in this case sensor networks are sometimes referred to as wireless sensor- and actuator networks (WSAN).
  • This can help to detect upcoming machine failures and to trigger a preventive maintenance cycle before an often more costly repair is needed.

A. Architecture

  • Sensor network architectures have a lot in common with the architecture of ad hoc networks, but there are also some important differences.
  • All stations potentially run different applications and communicate with each other in a peer-to-peer fashion.
  • In sensor networks all nodes cooperate to fulfill a common task.
  • The sink nodes can configure and control the operation of the sensor nodes, they provide the interface to human users and they can serve as gateways to other networks.
  • This requires that the geographical position of sensors (either absolute or with respect to some coordinate system) or their logical position (“room FT 131”) is known and that in addition the sensors are time-synchronized with each other.

B. Energy Efficiency

  • In most cases sensor nodes use batteries for energy supply.
  • As a result of finite node lifetime, energy-efficiency can be considered as the single most important design goal for sensor network hardware, algorithms, protocols and applications [81].
  • This reduces the amount of bits to be transmitted and thus saves transceiver energy [82], [83], on the other hand the aggregated data is more important and needs better (more energy-consuming) protection through error-control mechanisms [84].
  • For several transceiver designs, receiving requires approximately the same energy as transmitting.
  • To let individual sensor nodes sleep, redundant nodes must be present that can take over their duties, for example to ensure that the network is still connected and environmental stimuli are properly observed.

C. Scalability

  • The need for redundancy increases the number of nodes in a sensor networks.
  • Scalability issues also motivate the need for topology control in sensor networks [55, Chap. 10], [90].
  • The IEEE 802.15.4 standard describes physical layers and MAC layers for low-energy and low-rate wireless sensor networks and wireless personal area networks (WPAN).
  • A coordinator buffers downlink packets and the protocol is arranged so that the devices have to explicitly retrieve those packets from the coordinator.
  • In the remaining slots of the active period (called contention access period, CAP) the nodes compete for the medium using a slotted CSMA-scheme.

B. ZigBee Standard

  • The ZigBee standard was prepared by an industry consortium, the ZigBee alliance.
  • For networks with peer-to-peer communication another routing scheme is used.
  • ZigBee provides an application support sub-layer (APS) on top of the network layer.
  • Similar to the upcoming version of ZigBee, ISA-SP100.11a will adopt a frequency-hopping scheme in the 16 frequency channels offered by IEEE 802.15.4 in the 2.4-GHz ISM band.
  • On the other hand, different meshs can be interconnected via a backbone, and routing support for inter-mesh communications is available.

VI. REAL-TIME AND RELIABILITY IN MULTIHOP WSNS

  • With wireless sensor networks, however, reliability has some further important aspects:.
  • There is still the overhead required to coordinate the redundant nodes.

A. Single-Packet Delivery

  • For the case of single-packet delivery most of the available literature focuses on stochastic guarantees and accordingly the most important performance measure in terms of reliability is the probability of packet delivery at the sink.
  • This approach saves the acknowledgement packet but is only useful if the data packets are themselves small, since it is less probable that can successfully overhear a long data packet than to overhear a short acknowledgement packet.
  • With routing in place, several options exist to improve the reliability.
  • When the forwarders do not themselves create multiple offspring packets, then the initial number of paths must be carefully chosen by the source sensor to balance out the probability that at least one copy reaches the sink versus the network resources used.
  • When receiving a packet, a forwarder makes a new choice on the required speed according to the elapsed time (as compared to deadline) and his own distance to the destination.

B. Block Delivery

  • The available protocol designs aim to ensure that blocks of packets are completely received by the sink.
  • As compared to single-packet delivery there are further options.
  • When caching is used in the network, NACKs do not need to travel the whole path back to the source sensor.
  • Directed diffusion can be regarded as a publish/subscribe mechanism [28] in which the sink subscribes to data which it specifies not by giving the addresses of the sensors producing the data, but by directly describing the data it wants in terms of attributes.
  • If has not transmitted all missing fragments, it propagates the NACK further towards the source (those fragments which could serve are removed from the NACK), otherwise the NACK is suppressed.

C. Research Issues

  • Multihop protocols for wireless sensor networks are a vast research area and many groups are active here.
  • Therefore, the authors narrow down the discussion to a topic which they believe is especially interesting for the industrial community.
  • For this kind of networks some interesting research questions could be: Design of scalable tree protocols that do not rely on individual sensor nodes to fill positions in the tree but that allows several nodes to share this burden while ensuring that enough nodes are awake and the required service can be performed (for example [5]).
  • Design of mobility management schemes of trees which account for the movement of whole subtrees with the corresponding sudden changes in the load situation of old and new subtree attachment points.
  • It can be expected that these relationships depend crucially on interactions of the routing and forwarding protocol with lower-layer protocols like MAC protocols and link-layer error control.

VII. WISA WIRELESS INDUSTRIAL COMMUNICATION SYSTEMS

  • The wireless interface for sensors and actuators (WISA) system, described in [80], was developed by ABB and is now commercially available.
  • The envisaged wireless devices provide input/output points towards the underlying manufacturing process, and the BS is expected to be connected to a central controller.
  • Uplink and downlink traffic are in WISA separated by frequency-division duplex (FDD), i.e., uplink and downlink traffic can be transmitted truly in parallel over different frequency bands.
  • A superframe is again subdivided into 30 slots, each slot can accommodate a packet of 64 bit length (including physical layer preamble, checksum and control fields).
  • The hopping pattern aims to maintain a frequency separation between subsequent jumps that exceeds the coherence bandwidth (found to be a few tens of MHz) and the bandwidth of static IEEE 802.11 networks of 22 MHz.

VIII. SOME FUTURE OPPORTUNITIES FOR SYSTEM AND PROTOCOL DESIGN

  • In Sections IX–XII the authors turn their attention to some theoretical and technological developments that have so far not been so massively considered in the industrial community, but which in their opinion really should.
  • They all address, in the one form or the other, the core problem of wireless industrial networking: providing the required levels of timeliness and reliability despite the unfriendly error properties of the wireless channel.

IX. COMBATING CHANNEL FADING WITH SPATIAL/COOPERATIVE DIVERSITY TECHNIQUES

  • In realistic environments the wireless channel suffers from phenomena like path loss and shadowing, multipath propagation and thermal noise [132]–[134].
  • On the digital level, these phenomena can lead to bit errors or even to the total loss of packets due to a receivers failure to acquire carrier or symbol synchronization [135].
  • The precise error characteristics depend on the specific wireless technology, the carrier frequency, the distance and propagation environment between transmitter and receiver, and other factors.
  • Measurements of the error characteristics in industrial environments have been presented in a number of studies and for different types of wireless technologies: Bluetooth [136], IEEE 802.11b [135], IEEE 802.11a [31] or IEEE.

A. Fundamentals of Spatial Diversity and Cooperative Diversity

  • In spatial diversity schemes independent realizations of a transmitted signal are obtained from multiple antennas placed at geographically sufficiently separated locations.
  • It is a fundamental result [145] that there are tradeoffs between these two gains—for an increased diversity gain there has to be a sacrifice in multiplexing gain.
  • In the multiuser case further nodes are involved in a transmission between a transmitter and receiver—this is also often referred to as cooperative diversity [150], [151].
  • The receive array members can try to arrange their forwarding activities so that their waveforms combine coherently at the receiver (i.e., they arrive all with the same phase) and an improved signal-to-noise ratio is achieved.
  • This, however, requires precise knowledge of the propagation environment as well as extremely precise time synchronization, which is practically impossible to achieve and maintain in face of mobility.

B. Concept of Relaying

  • All involved nodes can be single-antenna nodes.
  • The relay nodes possibly receive the senders packet and can for example unconditionally forward their observations to the receiver node, or they could assist the sender with performing retransmissions when the receiver has not received the packet.
  • In the last years, there have also been significant activities towards practical integration of relaying into wireless protocols, see for example [158].
  • In [159]–[161] different proposals for industrial settings have been discussed.

C. Research Issues for Relaying

  • It is shown in [160] and [161] that relaying schemes can give appreciable benefits for industrial communication systems by showing that the success probability (as defined in Section II-A) can be significantly increased on fading channels as compared to classical error control schemes.
  • When relaying is integrated into an ARQ protocol (stated differently: when the activity of the relayers depends on feedback from the destination), then all relayers need a consistent view on the destination feedback.
  • A second important research issue are rules and heuristics for network planning and deployment that give hints for good positions of relayers.
  • It is intuitively clear that a relayer is most helpful when placed right between source and destination, and that it is harmful when it is even farther away from the destination than the source node.

X. QUALITY OF SERVICE PROVISIONING AND ANALYSIS

  • It should also be mentioned that in the industrial communications community the formalism of network calculus [176]–[178] has also been used for a priori analyses of worst-case timings, for example in industrial switched-Ethernet networks [179].
  • In many industrial settings wireless channels, even when their characteristics have been precisely modeled from measurements, will change over time, and the network needs to adapt its resource usage to those changes.
  • Another, more immediate solution would be to use other unlicensed frequency bands, like the 5-GHz ISM bands, which are currently less crowded.

XII. ULTRA-WIDEBAND (UWB) TECHNOLOGIES

  • Ultra-wideband (UWB) technologies [191]–[195] provide another answer to the problem of interference, more specifically: of narrowband interference.
  • Due to the large bandwidth, UWB is robust against narrowband interferences from licensed bands, and theoretically very high data rates are achievable over short distances.
  • The standard specifies that the ALOHA medium access control protocol24 is used together with the UWB PHY.
  • In the multiband approach the available spectrum is subdivided into subbands, for example of 500-MHz width.

XIII. CONCLUSIONS

  • One source of this research is the adoption of new communication 23As a side note, the usage of pulses also allows very precise distance measurements between communicating nodes.
  • This can be very attractive for industrial applications.
  • 24In ALOHA, a newly arriving packet is transmitted instantly without performing any carrier-sense operations.
  • Technologies like wireless sensor networks or UWB technologies, another source is to identify promising approaches from the wireless communications and networking community like cooperative diversity schemes or, not mentioned in the paper, network coding [198], [199].

Did you find this useful? Give us your feedback

Content maybe subject to copyright    Report

102 IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, VOL. 4, NO. 2, MAY 2008
Recent and Emerging Topics in Wireless
Industrial Communications: A Selection
Andreas Willig, Member, IEEE
Invited Paper
Abstract—In this paper we discuss a selection of promising and
interesting research areas in the design of protocols and systems
for wireless industrial communications. We have selected topics
that have either emerged as hot topics in the industrial commu-
nications community in the last few years (like wireless sensor net-
works), or which could be worthwhile research topics in the next
few years (for example cooperative diversity techniques for error
control, cognitive radio/opportunistic spectrum access for mitiga-
tion of external interferences).
Index Terms—Cognitive radio, IEEE 802154, industrial-QoS,
spatial and cooperative diversity, ultra-wideband, wireless sensor
networks, ZigBee.
I. INTRODUCTION
F
OR most people the significance of wireless technologies
comes from its ability to provide services like voice/video
transmission or Internet access at places without cabled net-
working infrastructure or while being on the move. Wireless
technologies have also been identified as a very attractive op-
tion for industrial and factory automation, distributed control
systems, automotive systems and other kinds of networked em-
bedded systems [1], [2], with mobility, reduced cabling and in-
stallation costs, reduced danger of breaking cables, and less
hassle with connectors being important benefits. Some poten-
tially interesting classes of industrial applications are closed-
loop control involving mobile subsystems, coordination among
mobile robots or autonomous vehicles, health monitoring of
machines, tracking of parts and many more. An important char-
acteristic in these application areas is that (wireless) data com-
munications must satisfy tight real-time and reliability require-
ments at the same time, otherwise loss of time and money or
even physical damage can result. To achieve this goal, on the one
hand certain functionalities that are specific for wireless com-
munications (like mobility management, quick handovers) must
be considered, and on the other hand the unfriendly error prop-
erties of the wireless channel significantly challenge real-time
and reliability. Consequently, significant research is needed to
adapt existing wireless technologies and protocols to industrial
settings, or, when this is not sufficient, to develop new ones. This
research has been done with significant intensity for more than
Manuscript received February 19, 2008; revised March 14, 2008. Paper no.
TII-07-12-0198. R1.
The author is with the Telecommunication Networks Group (TKN), Technical
University of Berlin, Berlin, Germany (e-mail: awillig@ieee.org).
Color versions of one or more of the figures in this paper are available online
at http://ieeexplore.ieee.org.
Digital Object Identifier 10.1109/TII.2008.923194
one decade now, and in [1] a selective review and tutorial on re-
search issues and approaches has been given.
This paper is a followup to [1]. Our main goal is to discuss
a selection of promising and interesting research areas that
received no or only limited coverage in [1] and in the industrial
communications community. We start with a brief overview on
the quality of service (QoS) features that have been added to the
ubiquitous IEEE 802.11 wireless LAN standard (and resulting
in IEEE 802.11e) and which are also interesting for use in
industrial scenarios. Following this, the paper covers wireless
sensor networks. Wireless sensor networks have recently re-
ceived increased attention in the industrial communications
community. They differ considerably from wireless LANs.
Sensor networks support much lower data rates and much
smaller transmit powers. More fundamental to the design of
sensor networks, however, is that sensor nodes have a severely
limited energy budget and consequently energy-efficiency is
the single most important figure of merit. One consequence of
this is that sensor nodes should spend most of their time in a
sleep state in which they are not able to transmit or receive data.
These properties do not favor the adoption of sensor networks
in tight control loops. Instead, they are mostly considered for
less time-critical monitoring tasks like for example monitoring
machine health or leakage monitoring. We provide an introduc-
tion to important concepts of sensor networking and discuss
a number (by far not all) of protocol design issues that are
relevant for industrial applications.
In the second main part of this paper we discuss approaches
that we believe can have a significant impact on the future de-
sign of wireless industrial communication protocols. In partic-
ular, we introduce recent techniques to mitigate channel fading
and external interferences (two of the main reasons for the bad
quality of the wireless channel!) that are currently hot topics in
the wireless communications community and from which the
industrial networking community can significantly benefit. For
the sake of completeness we have also included a brief discus-
sion of an existing commercial systems for wireless industrial
communications: the WISA system from ABB.
We had to make choices on what to include in the paper. In
terms of protocols we have mostly favored topics related to the
lower layers of the industrial protocol stack (i.e., the MAC and
the link-layer with its error control functionality) and their prop-
erties in terms of real-time and reliability. In terms of technolo-
gies we selected topics that have received only limited or no
coverage at all in [1]. For example, we have included WSN tech-
nologies and IEEE 802.11e, but we have mostly left out Blue-
tooth or plain IEEE 802.11 technologies. We have furthermore
1551-3203/$25.00 © 2008 IEEE

WILLIG: RECENT AND EMERGING TOPICS IN WIRELESS INDUSTRIAL COMMUNICATIONS: A SELECTION 103
favored a tutorial-style exposition discussing fundamental is-
sues and solution approaches over the detailed discussion and
comparison of specic solutions from the literature. To help the
reader to delve further into these solutions and approaches, we
provide a fair number of references. We also aim to point out
interesting research questions.
The paper is structured as follows: in Section II we provide
a broad overview on the general research areas that need to be
addressed for wireless industrial networking. Since the focus of
the remaining paper is mostly on real-time and reliability prop-
erties, we also discuss appropriate performance measures. Fol-
lowing this, in Section III we describe the QoS enhancements
to the IEEE 802.11 standard and point to an interesting research
issue. In Section IV we begin our discussion of wireless sensor
networks by explaining their fundamentals. In Section V we
present the IEEE 802.15.4, ZigBee and ISA SP-100 standards
for wireless sensor networking, since these can be expected to
have signicant impact in the industrial eld. In Section VI we
briey look at the vast problem of providing real-time and relia-
bility in multihop wireless sensor networks. The rst part of the
paper concludes with Section VII, in which the existing wireless
industrial communication systems WISA is briey reviewed.
In the second part we discuss more general research issues
and selected topics from the eld of wireless communications
that are probably relevant for wireless industrial communica-
tion systems as well: spatial/cooperative diversity techniques in
Section IX, the general issue of industrial QoS provisioning and
analysis in Section X, the usage of cognitive radio techniques for
mitigating external interferences in Section XI and the adoption
of ultra-wideband technologies in Section XII. The paper ends
with our conclusions in Section XIII.
II. O
VERVIEW ON RESEARCH
AREAS FOR WIRELESS
INDUSTRIAL NETWORKING
To properly design networks and protocols for wireless indus-
trial networking, several issues have to be addressed, including
the following ones:
Providing the required QoS in terms of reliability and
real-time to applications: design of protocols and of
wireless channel resource allocation schemes (frequen-
cies, transmit power, rate [as determined by modulation
and coding scheme], time budgets), as well as analysis
schemes that evaluate achievable QoS over wireless fading
channels. The relevant industrial-QoS measures are dis-
cussed in more depth in Section II-A.
Engineering and network planning: a comprehensive set
of methodologies and tools for network planning, dimen-
sioning and conguration, as well as run-time fault and per-
formance monitoring needs to be developed. This is tightly
coupled to resource allocation. Some references for net-
work planning in the industrial context are [3] and [4], a
platform-based protocol framework allowing to adjust pa-
rameters according to pre-specied QoS levels is presented
in [5].
MAC protocol design: the MAC layer is a key functionality
for (wireless) industrial communication systems, since it
directly impacts the timeliness of packets. The goal is to
nd deterministic protocols that can support packet prior-
ities or which allow ne-grained channel scheduling. We
discuss in Section III-B briey the specic issue of pri-
ority enforcement on wireless channels, a technique that is
needed to implement CAN-like protocols and to leverage
existing work on schedulability analyses for CAN.
Error-control schemes: error-control schemes directly im-
pact the achievable reliability. Recent approaches to error
control are addressed in more detail in Section IX.
Routing and transport protocols: especially in multihop
networks like wireless sensor networks (soft) real-time
guarantees have to be provided over multiple hops. This
will be discussed in more detail in Section VI.
Application-layer protocols: application support protocols
and the applications themselves must be designed with ex-
plicit consideration of the wireless channel properties in
mind. One example is the research area of networked con-
trol systems (see [6] and [7]). An alternative view of appli-
cation-layer protocols is taken for example in [8], where
the authors argue that on top of commercial wireless hard-
ware like IEEE 802.11 WLAN it is the application layer
that must ensure appropriate real-time and reliability prop-
erties through specically designed protocols.
Hybrid wired/wireless systems: in many applications it is
benecial to adjoin wireless stations to existing wired net-
works and therefore to create
hybrid networks. This has in
general been discussed in [1] and [9], whereas specic net-
works and protocols have for example been considered in
[10][13].
Mobility support and handovers under real-time and reli-
ability constraints. The design of suitable schemes, espe-
cially for hybrid systems, depends on the underlying MAC
protocols. One example reference is [14], in which mo-
bility and handovers are considered for hybrid wired/wire-
less PROFIBUS systems.
Security and privacy: Security in general and wireless se-
curity in particular are vast research topics [15], security
aspects for industrial networks are discussed in [16]. A
brief account on some issues is provided in Section II-B.
Energy consumption and energy-efcient design: To fully
achieve the benets of wireless communications, no ca-
bling at all should be used, and this includes also the energy
supply. This issue is discussed in more detail in Section IV.
Scalability: in a factory plant both the number of wire-
less networks as well as the number of wireless nodes per
network might become large. This is especially true for
wireless sensor networks which must be signicantly over-
provisioned in order to give individual nodes enough op-
portunity to enter a low-energy sleep state while ensuring
that the overall network has still enough awake nodes to
achieve its task.
In the remainder of this section we discuss relevant quality of
service measures for wireless industrial networks, followed by
a brief account of security issues.
A. Quality of Service Measures for Wireless Industrial
Networks
Industrial networks are in general designed to carry trafc
that is dominated by exchanges of sensor readings and actu-
ator commands between sensors/actuators on the one hand and
(often centralized) controllers on the other hand [2], [17], [18].
Important characteristics of industrial trafc are the presence of

104 IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, VOL. 4, NO. 2, MAY 2008
deadlines, high reliability requirements and the predominance
of short packets [19]. For these exchanges two different interac-
tion patterns have emerged: the master/slave model and the pro-
ducer-(distributor)-consumer model, and for these patterns dif-
ferent QoS parameters are important. Since the wireless channel
is random and time-varying, the classical deterministic perfor-
mance measures like for example the worst-case transmission
times should be replaced by probabilistic measures.
In the master/slave model (for example adopted in the
PROFIBUS [20], [21]) information is exchanged between
controller and sensors/actuators by using a unicast commu-
nication mechanism. In this setting the key aspect of service
quality is to enable transmission of periodic or sporadic mes-
sages within pre-specied
deadlines and in a reliable fashion.
Reliability is especially important for critical alarm mes-
sages. There are different performance measures that jointly
account for real-time and reliability. Such measures can be
dened on different timescales: in terms of long-term averages
or on much shorter timescales. One measure belonging to
the rst category is the success probability,dened as the
long-term probability that a message can be successfully (i.e.,
acknowledged) transmitted within its deadline. Another one
is the capacity-vs-outage-probability measure [22], denoting
the transmission rates (and therefore the delay) so that the
probability of not achieving this rate is below a pre-specied
threshold. A third measure is the delay-limited capacity,itis
dened as the capacity-vs-outage probability measure for a
pre-specied outage probability of zero (see also the discussion
in [23]).
1
For short timescales formulations based on the notion
of
-rm deadlines [24], [25] can be used, in which at
most
out of any consecutive packets are allowed to be lost,
otherwise a deadline violation occurs.
In the producer-(distributor)-consumer model (for example
adopted in WorldFIP [26], [27]) communication is based on
unacknowledged broadcasts of data identiers (by the distrib-
utor), to which the station possessing the identied data item
(the producer) responds by broadcasting its current value. All
nodes interested in this data (the consumers) copy the received
value into an internal link-layer buffer for later delivery to the
higher layers. This can be regarded as an instance of a pub-
lish/subscribe interaction pattern [28]. Here the most important
performance measures are related to the degree by which all the
consumers are able to simultaneously capture the data and to
maintain consistent buffer statesthis is referred to as spatial
consistency.
2
Such a consistency requirement can be captured
by the agreement probability, i.e., the probability that all con-
sumers have reached agreement within a certain, pre-specied
time window.
1
Technically, these measures are dened for stationary and frequency-at
block fading channels. In a block fading channel, the packet duration is smaller
than the channel coherence time, i.e., the time during which the channel does
not change its characteristics (appreciably). The term frequency-at refers to a
situation in which all the involved frequencies of a transmitted signal have the
same attenuation level. For industrial networks with predominant small packet
sizes a block fading channel is a reasonable assumption, and when the transmis-
sion rates are reasonably small then the channel is also frequency-at.
2
A similar consistency requirement is called relative temporal consistency:
Many control applications require that the relevant sensors sample the environ-
ment nearly simultaneously in a pre-specied time window. In some industrial
communication systems this is achieved by using explicit triggering signals,
broadcast by the central controller. Again, the degree to which all the relevant
sensors receive the trigger packet is important.
Those previously dened performance measures represent
the prime performance metrics for wireless industrial com-
munication systemswe refer to them as industrial-QoS.A
range of secondary metrics can be devised that measure the
efciency of protocol mechanisms attempting to improve the
primary performance measures. Examples of such secondary
metrics are the protocol or memory overhead, computational
overheads, additional interference created, and others.
B. Security
Todays automation networks tend to be more and more inte-
grated with other networks, for example to allow cost-effective
remote monitoring and maintenance of machine plants. There
are many techniques to protect a network against attackers from
outside, for example rewalls [15]. But when the network uses
wireless transmission, an attacker that is close enough to the
network can eavesdrop, it can insert malicious packets, or it can
simply jam the wireless medium and distort any other transmis-
sion, this way challenging reliable and timely transmission.
Encryption can be used to prevent eavesdropping. To prevent
insertion of malicious packets, mechanisms for ensuring au-
thentication (who sent this message?) and message integrity
(is this the message originally sent?) are needed [15], [29] to
create mutual trust relationships between wireless stations. Such
mechanisms are often implemented using shared secrets and
public key cryptography, calling in turn for proper key distri-
bution schemes. To avoid replay attacks proper sequence num-
bers/session keys have to be used. Some challenges for imple-
menting security mechanisms in wireless industrial networks
and wireless sensor networks are the following [30, Sec. 1.2]:
Ensuring authentication and message integrity for each
message requires message integrity check (MIC) elds in
each message. To be effective, this eld should have a rea-
sonable minimal length, for example 16 bytes. However,
since in most eldbus systems the maximum allowable
frame size is small (and many packets have only a few
bytes anyway), the MIC elds account for signicant
fraction of overhead.
Key distribution schemes introduce signicant protocol
and administrative overhead.
In the case of hybrid systems, one has to take into account
that often the legacy eldbus protocols running in the wired
stations do not have any security mechanisms.
III. IEEE 802.11E
The IEEE 802.11 family of wireless LAN (WLAN) standards
is certainly predominant in the realm of WLAN technologies,
and it has also been considered extensively in the context of
wireless industrial communications, see for example [31][38].
In this paper we focus on aspects of the current standard that
have gained increased importance since publication of [1] and
which at the same time are especially interesting for industrial
applications, namely the QoS support that is now part of the
2007 version of the standard [39] and which was formerly spec-
ied in a separate amendment [40].
3
We therefore give a brief
3
The 2007 version of the standard supersedes the 1999 version and its 2003
reafrmation, and includes also previous amendments to the IEEE 802.11 stan-
dard like IEEE 802.11a (an OFDM physical layer for the 5.2-GHz ISM band),
IEEE 802.11b (11 Mb/s physical layer for the 2.4-GHz band), IEEE 802.11g (a
high-rate physical layer for the 2.4-GHz ISM band, including 54 Mb/s OFDM),
IEEE 802.11i (security enhancements) and IEEE 802.11e (quality of service).

WILLIG: RECENT AND EMERGING TOPICS IN WIRELESS INDUSTRIAL COMMUNICATIONS: A SELECTION 105
introduction into the new QoS mechanisms and point to some
research issues.
A. IEEE 802.11E Quality-of-Service Support
The QoS functions are available in infrastructure IEEE
802.11 networks. They consist of a hybrid coordination func-
tion (HCF) that operates on top of a (modied) distributed
coordination function (DCF) as it is known from the orig-
inal IEEE 802.11 standard. For some parts of the hybrid
coordination function a centralized control entity called hy-
brid coordinator (HC) is required which is co-located with
an access point. Amongst other functionalities, the HC can
perform admission control. More precisely, the stations in a
QoS-enabled IEEE 802.11 network (henceforth simply referred
to as network) can send a request to the HC asking him to
schedule transmit opportunities (TXOP). A TXOP is a con-
tiguous window of time which a station can use exclusively
(i.e., without having to expect parallel transmissions from other
network members) to transmit one or more frames including
MAC layer acknowledgements to any station in the network. It
is possible that a station requests the HC to grant these TXOPs
periodically (for example for voice or video data streams) and
upon receiving such a request the HC has to decide whether the
new ow can be admitted without breaking guarantees for the
already present ows. The precise admission control algorithm
is not prescribed by the standard but left to the implementers.
The standard provides two different access schemes for pro-
viding QoS support: the enhanced distributed coordination ac-
cess (EDCA) and the hybrid coordination function controlled
channel access (HCCA). We describe both of them brieybut
start with a reminder of the basic distributed coordination func-
tion (DCF) upon which both access schemes are built. Many
details are left out, for example the RTS/CTS scheme.
1) DCF and EDCF: The (E)DCF belongs to the class
of carrier-sense multiple access with collision-avoidance
(CSMA-CA) protocols. It relies on the physical carrier-sense
function of the underlying physical layer, which indicates the
presence or absence of signals or ongoing transmissions on
the wireless medium. In addition, a station performs a virtual
carrier-sense operation. In this operation, the station maintains
a special variable called network allocation vector (NAV).
Most of the packets in IEEE 802.11 contain a duration eld,
which denotes the remaining time that is needed until the
ongoing transaction (for example data plus acknowledge) is
nished. Whenever a station receives a packet, it updates its
NAV variable with the packets duration eld in order to prevent
own transmissions during the remaining transaction time. In
summary, a carrier-sense operation indicates an idle channel
only if the NAV is zero and the physical carrier-sense does not
indicate any transmission activity.
For the following description please refer also to Fig. 1. When
a new packet shall be transmitted, the station performs a carrier-
sense operation. When the medium is idle for a certain amount
of time called inter-frame space, the station starts to transmit.
The packet at hand is associated with one of four pre-dened
access classes and the inter-frame space that the station de-
pends on this access class. For the
-class the inter-frame space
Fig. 1. Timing of the IEEE 802.11 DCF.
is called . These values can be congured, but
are required to be distinct.
When the medium is busy, the station enters the backoff mode.
It station rst waits until the medium is idle for a time of at least
distributed inter-frame space (DIFS). At this time the backoff
slots start. If the station was not in backoff mode before, it draws
a random number out of the current contention window and sets
a counter with this number. In the following, during each idle
slot the counter is decremented by one and if it reaches zero, the
station starts to transmit. If the carrier-sense mechanism indi-
cates a busy medium, the process of decrementing the backoff
counter is suspended, and it is resumed later on once the medium
becomes idle again.
The contention window size is dynamic. It is initialized with
a pre-congured value
. Whenever a packet transmis-
sion is not successful, the contention window size is doubled,
until a maximum value
is reached. This is useful when
transmission failures are interpreted as resulting from channel
collisions, since an increase in contention window size leads to
increased average backoff times and therefore to a reduction of
the pressure on the channel.
We are now in the position to briey explain the difference
between the classical DCF and the EDCF. In the DCF there
are no access classes and all stations use the DIFS instead of
the
inter-frame spaces. Furthermore, all stations use the
same values for
and . This means that all sta-
tions have the same chance to access the channel. In the EDCF
for each access class
separate values of , and
can be congured at the access points, which then dis-
tributes these values to all stations in its beacons. By choosing
proper values for these parameters it is possible to ensure with
high probability that a packet of a better access class wins over
a contender having a packet of lower access classes. In other
words: it is possible to achieve stochastic prioritization or ser-
vice differentiation. A further difference between the DCF and
the EDCF is the following: in the DCF winning contention ac-
quires the right to transmit one packet. In the EDCF the winner
receives a TXOP which, as explained above, may encompass
several packets. The maximum duration of a TXOP is a pre-con-
gured value. However, only packets belonging to the access
class for which the TXOP was won are allowed to be transmitted
during a TXOP.
A number of performance analyses (e.g., regarding
throughput) of the DCF and EDCF are available in the lit-
erature [34], [41][45]. These studies conrm also that the
EDCA mechanism is indeed capable of achieving stochastic
prioritization.

106 IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, VOL. 4, NO. 2, MAY 2008
2) HCCA: In the HCCA a central entity, the HC, is respon-
sible for coordinating access to the medium. The HC receives
reservation requests for TXOPs, grants or rejects these requests
(admission control) and is responsible for actually scheduling
the TXOPs for all attached stations. The channel is, however,
not all the time under full control of the HC. Instead, scheduled
TXOPs alternate with phases in which stations contend for the
medium using the EDCF. The reservation requests can either be
sent as separate packets (using the EDCF) or they can be piggy-
backed onto data packets that are sent during a scheduled TXOP.
To gain control over the channel the HC uses also the basic
DCF mechanism, but the medium has only to be idle for PIFS
time (which is smaller than DIFS and all the
values)
and after that time the HC starts with its transmissions. Speci-
cally, to start a TXOP the HC sends a poll packet to the owner of
the TXOP and the owner then uses the TXOP to transmit one or
multiple packets according to the results of a local scheduling
policy (which, however, typically prefers better access classes
over lower ones). The admission control policy and the sched-
uling policies applied in the HC and the stations are not specied
in the standard.
The HCCA is rather complex as there are rich interactions
with other features of the IEEE 802.11 protocol like for example
the rate adaptation feature of some of the physical layers. It is
similarly complex as the point coordination function of the orig-
inal IEEE 802.11 standard, which is still present in the 2007 ver-
sion and which can be operated jointly with the HCCA. The au-
thor is not aware of any existing implementation of the HCCA.
One weakness of the HCCA that prevents it from achieving
perfectly periodic services is that at the scheduled time of
TXOPs the medium might still be busy from a previous TXOP
obtained by the EDCF mechanism and the HC has to wait a
random time until the packet end before he gains access to
the medium. A key research issue in the HCCA is the design
of appropriate admission control scheduling policies, which
has for example been done in [46][48]. Its usage in industrial
scenarios has been considered in [33] and [49].
B. Research Issues
Assuming that HCCA implementations will not become
widely available during the next few years (PCF implemen-
tations actually never did), it makes sense to concentrate on
improvements of the DCF and the EDCF.
One very interesting and relevant problem is the determin-
istic priority enforcement on the wireless channel. The problem
is dened as follows: given two devices
and which have
packets ready for transmission at the same time and whose trans-
mission ranges overlap, it should be deterministically ensured
that
s packet can be transmitted before s when s packet
has a higher priority and
s receiver is in the overlap area of
s and s ranges. In other words: s less important packet
should not block
s transmission. In a probabilistic variant of
priority enforcement the protocol must make it more probable
that
wins than that wins. This probabilistic variant is indeed
implemented by the EDCF, supporting four different priorities.
Some industrial and automotive communication systems like
for example CAN [50] employ a MAC layer technique in which
to each packet a priority value is assigned and these priorities are
then used to resolve contention among different stations. When
the priority enforcement is deterministic, a proper assignment
of priorities to packets allows to perform deterministic schedu-
lability analyses [51], [52].
In the CAN protocol, a bitwise priority-arbitration technique
is used for collision resolution: a contending station awaits the
end of an ongoing transmission (if any) and then enters con-
tention phase. The contention phase is driven by the priority
of the packets ready in the contenders and proceeds bit-by-bit.
A contender transmits the value of the current priority bit and
simultaneously receives feedback from the channel (which is
guaranteed to have a well-dened level and can be converted
back into a bit). When the own transmitted bit and the bit read
back from the channel differ, the station has lost contention and
defers, otherwise the station proceeds with the next bit.
This approach cannot be directly implemented with commer-
cial wireless transceivers, since it requires full-duplex operation
of the transceiver. Wireless transceivers are in general half-du-
plex: they are not able to transmit and receive simultaneously
on the same channel because their own signals would drown all
signals from other stations. Because of this fact, most wireless
transceivers share some circuitry between transmit and receive
path, which naturally prevents that they work in parallel.
Therefore, alternative mechanisms are needed to enforce
packet priorities on the channel. There are several options for
(almost) deterministic priority enforcement in fully meshed
networks. By the rules of (persistent) CSMA protocols, a
contention cycle starts at the end of a previous packet. One
possibility is to let contending nodes send jamming signals
of length according to the priority of their current packet.
Afterwards, a node switches to receive mode and performs a
carrier-sense operation to check whether any other contender
emits a longer jamming signal. If so, the listening station defers
and the other station has won the contention. This approach,
while having been used in the HIPERLAN-I standard [53], is
unfortunately not implementable with commercial IEEE 802.11
transceivers as these do not offer the generation of jamming
signals. A complementary and more practical approach is to
let nodes listen on the channel for a time proportional to their
packets priority (the more important the packet, the shorter a
stations listens for other stations and the earlier the station starts
to transmit its packet). In both cases, the maximum length of
bursts/listening periods is linear in the number of priorities that
can be supported. In the wireless dominance protocol (WiDom)
approach presented in [54] a bitwise priority arbitration scheme
is mimicked by providing one time slot for each priority bit,
i.e.,
slots for priority bits. During such a timeslot a station
having a dominant bit transmits, while stations with recessive
bits receive. When a recessive station receives a signal, it has
lost contention and gives up. With this approach, the number of
priorities that can be distinguished is
, while the duration of
the contention resolution period is linear in
.
However, all these approaches share some problems and
therefore need additional research:
The above discussed deterministic schemes all rely on car-
rier-sensing and are thus vulnerable to external interfer-
encesany unwanted signal that is detected by the car-
rier-sense algorithm leads to deferral of transmissions and
higher probabilities of deadline misses.
They do not work in hidden-terminal situations, i.e., in
settings where two stations having packets of different

Citations
More filters
Journal Article
TL;DR: In this article, Stann et al. present RMST (Reliable Multi-Segment Transport), a new transport layer for Directed Diffusion, which provides guaranteed delivery and fragmentation/reassembly for applications that require them.
Abstract: Appearing in 1st IEEE International Workshop on Sensor Net Protocols and Applications (SNPA). Anchorage, Alaska, USA. May 11, 2003. RMST: Reliable Data Transport in Sensor Networks Fred Stann, John Heidemann Abstract – Reliable data transport in wireless sensor networks is a multifaceted problem influenced by the physical, MAC, network, and transport layers. Because sensor networks are subject to strict resource constraints and are deployed by single organizations, they encourage revisiting traditional layering and are less bound by standardized placement of services such as reliability. This paper presents analysis and experiments resulting in specific recommendations for implementing reliable data transport in sensor nets. To explore reliability at the transport layer, we present RMST (Reliable Multi- Segment Transport), a new transport layer for Directed Diffusion. RMST provides guaranteed delivery and fragmentation/reassembly for applications that require them. RMST is a selective NACK-based protocol that can be configured for in-network caching and repair. Second, these energy constraints, plus relatively low wireless bandwidths, make in-network processing both feasible and desirable [3]. Third, because nodes in sensor networks are usually collaborating towards a common task, rather than representing independent users, optimization of the shared network focuses on throughput rather than fairness. Finally, because sensor networks are often deployed by a single organization with inexpensive hardware, there is less need for interoperability with existing standards. For all of these reasons, sensor networks provide an environment that encourages rethinking the structure of traditional communications protocols. The main contribution is an evaluation of the placement of reliability for data transport at different levels of the protocol stack. We consider implementing reliability in the MAC, transport layer, application, and combinations of these. We conclude that reliability is important at the MAC layer and the transport layer. MAC-level reliability is important not just to provide hop-by-hop error recovery for the transport layer, but also because it is needed for route discovery and maintenance. (This conclusion differs from previous studies in reliability for sensor nets that did not simulate routing. [4]) Second, we have developed RMST (Reliable Multi-Segment Transport), a new transport layer, in order to understand the role of in- network processing for reliable data transfer. RMST benefits from diffusion routing, adding minimal additional control traffic. RMST guarantees delivery, even when multiple hops exhibit very high error rates. 1 Introduction Wireless sensor networks provide an economical, fully distributed, sensing and computing solution for environments where conventional networks are impractical. This paper explores the design decisions related to providing reliable data transport in sensor nets. The reliable data transport problem in sensor nets is multi-faceted. The emphasis on energy conservation in sensor nets implies that poor paths should not be artificially bolstered via mechanisms such as MAC layer ARQ during route discovery and path selection [1]. Path maintenance, on the other hand, benefits from well- engineered recovery either at the MAC layer or the transport layer, or both. Recovery should not be costly however, since many applications in sensor nets are impervious to occasional packet loss, relying on the regular delivery of coarse-grained event descriptions. Other applications require loss detection and repair. These aspects of reliable data transport include the provision of guaranteed delivery and fragmentation/ reassembly of data entities larger than the network MTU. Sensor networks have different constraints than traditional wired nets. First, energy constraints are paramount in sensor networks since nodes can often not be recharged, so any wasted energy shortens their useful lifetime [2]. This work was supported by DARPA under grant DABT63-99-1-0011 as part of the SCAADS project, and was also made possible in part due to support from Intel Corporation and Xerox Corporation. Fred Stann and John Heidemann are with USC/Information Sciences Institute, 4676 Admiralty Way, Marina Del Rey, CA, USA E-mail: fstann@usc.edu, johnh@isi.edu. 2 Architectural Choices There are a number of key areas to consider when engineering reliability for sensor nets. Many current sensor networks exhibit high loss rates compared to wired networks (2% to 30% to immediate neighbors)[1,5,6]. While error detection and correction at the physical layer are important, approaches at the MAC layer and higher adapt well to the very wide range of loss rates seen in sensor networks and are the focus of this paper. MAC layer protocols can ameliorate PHY layer unreliability, and transport layers can guarantee delivery. An important question for this paper is the trade off between implementation of reliability at the MAC layer (i.e. hop to hop) vs. the Transport layer, which has traditionally been concerned with end-to-end reliability. Because sensor net applications are distributed, we also considered implementing reliability at the application layer. Our goal is to minimize the cost of repair in terms of transmission.

650 citations

Journal ArticleDOI
TL;DR: The purpose of this paper is to serve as an introduction to industrial control networks, aimed specifically at those who have had minimal exposure to the field, but have some familiarity with conventional computer networks.
Abstract: An industrial control network is a system of interconnected equipment used to monitor and control physical equipment in industrial environments. These networks differ quite significantly from traditional enterprise networks due to the specific requirements of their operation. Despite the functional differences between industrial and enterprise networks, a growing integration between the two has been observed. The technology in use in industrial networks is also beginning to display a greater reliance on Ethernet and web standards, especially at higher levels of the network architecture. This has resulted in a situation where engineers involved in the design and maintenance of control networks must be familiar with both traditional enterprise concerns, such as network security, as well as traditional industrial concerns such as determinism and response time. This paper highlights some of the differences between enterprise and industrial networks, presents a brief history of industrial networking, gives a high level explanation of some operations specific to industrial networks, provides an overview of the popular protocols in use and describes current research topics. The purpose of this paper is to serve as an introduction to industrial control networks, aimed specifically at those who have had minimal exposure to the field, but have some familiarity with conventional computer networks.

457 citations

Journal ArticleDOI
TL;DR: This paper surveys over one hundred IoT smart solutions in the marketplace and examines them closely in order to identify the technologies used, functionalities, and applications, and suggests a number of potentially significant research directions.
Abstract: The Internet of Things (IoT) is a dynamic global information network consisting of Internet-connected objects, such as Radio frequency identifications, sensors, actuators, as well as other instruments and smart appliances that are becoming an integral component of the future Internet. Over the last decade, we have seen a large number of the IoT solutions developed by start-ups, small and medium enterprises, large corporations, academic research institutes (such as universities), and private and public research organizations making their way into the market. In this paper, we survey over one hundred IoT smart solutions in the marketplace and examine them closely in order to identify the technologies used, functionalities, and applications. Based on the application domain, we classify and discuss these solutions under five different categories: 1) smart wearable; 2) smart home; 3) smart city; 4) smart environment; and 5) smart enterprise. This survey is intended to serve as a guideline and a conceptual framework for future research in the IoT and to motivate and inspire further developments. It also provides a systematic exploration of existing research and suggests a number of potentially significant research directions.

388 citations


Cites background from "Recent and Emerging Topics in Wirel..."

  • ...Designing protocols and systems for wireless industrial communications will have a significant impact on the successful adoption of the IoT [155]....

    [...]

Journal ArticleDOI
TL;DR: In this article, the authors present a survey of IoT smart solutions in the marketplace and examine them closely in order to identify the technologies used, functionalities, and applications, and identify the trends, opportunities and open challenges in the industry-based IoT solutions.
Abstract: The Internet of Things (IoT) is a dynamic global information network consisting of internet-connected objects, such as Radio-frequency identification (RFIDs), sensors, actuators, as well as other instruments and smart appliances that are becoming an integral component of the future internet. Over the last decade, we have seen a large number of the IoT solutions developed by start-ups, small and medium enterprises, large corporations, academic research institutes (such as universities), and private and public research organisations making their way into the market. In this paper, we survey over one hundred IoT smart solutions in the marketplace and examine them closely in order to identify the technologies used, functionalities, and applications. More importantly, we identify the trends, opportunities and open challenges in the industry-based the IoT solutions. Based on the application domain, we classify and discuss these solutions under five different categories: smart wearable, smart home, smart, city, smart environment, and smart enterprise. This survey is intended to serve as a guideline and conceptual framework for future research in the IoT and to motivate and inspire further developments. It also provides a systematic exploration of existing research and suggests a number of potentially significant research directions.

382 citations

Proceedings ArticleDOI
26 Jul 2011
TL;DR: The major issues that need to be addressed are safety, security and availability before industrial wireless sensor networks will be adopted in full scale in process automation.
Abstract: A growing trend in the automation industry is to use wireless technologies to reduce cable cost, deployment time, unlocking of stranded information in previously deployed devices, and enabling wireless control applications. Despite a huge research effort in the area of wireless sensor networks (WSNs), there are several issues that have not been addressed properly such that WSNs can be adopted properly in the process automation domain. This article presents the major requirements for typical applications in process automation and we also aim to outline the research direction for industrial wireless sensor networks (IWSNs) in industrial automation. The major issues that need to be addressed are safety, security and availability before industrial wireless sensor networks will be adopted in full scale in process automation.

345 citations


Cites background or methods from "Recent and Emerging Topics in Wirel..."

  • ...Both WirelessHART and ISA 100.11a adopt the complete IEEE 802.15.4 PHY layer, but they propose a new MAC layer which combines TDMA and channel hopping to control access to the network....

    [...]

  • ...In the commercial IEEE 802.15.4 based IWSN today, FEC has been omitted mainly due power consumption of decoding operation....

    [...]

References
More filters
Book
01 Jan 1991
TL;DR: The author examines the role of entropy, inequality, and randomness in the design of codes and the construction of codes in the rapidly changing environment.
Abstract: Preface to the Second Edition. Preface to the First Edition. Acknowledgments for the Second Edition. Acknowledgments for the First Edition. 1. Introduction and Preview. 1.1 Preview of the Book. 2. Entropy, Relative Entropy, and Mutual Information. 2.1 Entropy. 2.2 Joint Entropy and Conditional Entropy. 2.3 Relative Entropy and Mutual Information. 2.4 Relationship Between Entropy and Mutual Information. 2.5 Chain Rules for Entropy, Relative Entropy, and Mutual Information. 2.6 Jensen's Inequality and Its Consequences. 2.7 Log Sum Inequality and Its Applications. 2.8 Data-Processing Inequality. 2.9 Sufficient Statistics. 2.10 Fano's Inequality. Summary. Problems. Historical Notes. 3. Asymptotic Equipartition Property. 3.1 Asymptotic Equipartition Property Theorem. 3.2 Consequences of the AEP: Data Compression. 3.3 High-Probability Sets and the Typical Set. Summary. Problems. Historical Notes. 4. Entropy Rates of a Stochastic Process. 4.1 Markov Chains. 4.2 Entropy Rate. 4.3 Example: Entropy Rate of a Random Walk on a Weighted Graph. 4.4 Second Law of Thermodynamics. 4.5 Functions of Markov Chains. Summary. Problems. Historical Notes. 5. Data Compression. 5.1 Examples of Codes. 5.2 Kraft Inequality. 5.3 Optimal Codes. 5.4 Bounds on the Optimal Code Length. 5.5 Kraft Inequality for Uniquely Decodable Codes. 5.6 Huffman Codes. 5.7 Some Comments on Huffman Codes. 5.8 Optimality of Huffman Codes. 5.9 Shannon-Fano-Elias Coding. 5.10 Competitive Optimality of the Shannon Code. 5.11 Generation of Discrete Distributions from Fair Coins. Summary. Problems. Historical Notes. 6. Gambling and Data Compression. 6.1 The Horse Race. 6.2 Gambling and Side Information. 6.3 Dependent Horse Races and Entropy Rate. 6.4 The Entropy of English. 6.5 Data Compression and Gambling. 6.6 Gambling Estimate of the Entropy of English. Summary. Problems. Historical Notes. 7. Channel Capacity. 7.1 Examples of Channel Capacity. 7.2 Symmetric Channels. 7.3 Properties of Channel Capacity. 7.4 Preview of the Channel Coding Theorem. 7.5 Definitions. 7.6 Jointly Typical Sequences. 7.7 Channel Coding Theorem. 7.8 Zero-Error Codes. 7.9 Fano's Inequality and the Converse to the Coding Theorem. 7.10 Equality in the Converse to the Channel Coding Theorem. 7.11 Hamming Codes. 7.12 Feedback Capacity. 7.13 Source-Channel Separation Theorem. Summary. Problems. Historical Notes. 8. Differential Entropy. 8.1 Definitions. 8.2 AEP for Continuous Random Variables. 8.3 Relation of Differential Entropy to Discrete Entropy. 8.4 Joint and Conditional Differential Entropy. 8.5 Relative Entropy and Mutual Information. 8.6 Properties of Differential Entropy, Relative Entropy, and Mutual Information. Summary. Problems. Historical Notes. 9. Gaussian Channel. 9.1 Gaussian Channel: Definitions. 9.2 Converse to the Coding Theorem for Gaussian Channels. 9.3 Bandlimited Channels. 9.4 Parallel Gaussian Channels. 9.5 Channels with Colored Gaussian Noise. 9.6 Gaussian Channels with Feedback. Summary. Problems. Historical Notes. 10. Rate Distortion Theory. 10.1 Quantization. 10.2 Definitions. 10.3 Calculation of the Rate Distortion Function. 10.4 Converse to the Rate Distortion Theorem. 10.5 Achievability of the Rate Distortion Function. 10.6 Strongly Typical Sequences and Rate Distortion. 10.7 Characterization of the Rate Distortion Function. 10.8 Computation of Channel Capacity and the Rate Distortion Function. Summary. Problems. Historical Notes. 11. Information Theory and Statistics. 11.1 Method of Types. 11.2 Law of Large Numbers. 11.3 Universal Source Coding. 11.4 Large Deviation Theory. 11.5 Examples of Sanov's Theorem. 11.6 Conditional Limit Theorem. 11.7 Hypothesis Testing. 11.8 Chernoff-Stein Lemma. 11.9 Chernoff Information. 11.10 Fisher Information and the Cram-er-Rao Inequality. Summary. Problems. Historical Notes. 12. Maximum Entropy. 12.1 Maximum Entropy Distributions. 12.2 Examples. 12.3 Anomalous Maximum Entropy Problem. 12.4 Spectrum Estimation. 12.5 Entropy Rates of a Gaussian Process. 12.6 Burg's Maximum Entropy Theorem. Summary. Problems. Historical Notes. 13. Universal Source Coding. 13.1 Universal Codes and Channel Capacity. 13.2 Universal Coding for Binary Sequences. 13.3 Arithmetic Coding. 13.4 Lempel-Ziv Coding. 13.5 Optimality of Lempel-Ziv Algorithms. Compression. Summary. Problems. Historical Notes. 14. Kolmogorov Complexity. 14.1 Models of Computation. 14.2 Kolmogorov Complexity: Definitions and Examples. 14.3 Kolmogorov Complexity and Entropy. 14.4 Kolmogorov Complexity of Integers. 14.5 Algorithmically Random and Incompressible Sequences. 14.6 Universal Probability. 14.7 Kolmogorov complexity. 14.9 Universal Gambling. 14.10 Occam's Razor. 14.11 Kolmogorov Complexity and Universal Probability. 14.12 Kolmogorov Sufficient Statistic. 14.13 Minimum Description Length Principle. Summary. Problems. Historical Notes. 15. Network Information Theory. 15.1 Gaussian Multiple-User Channels. 15.2 Jointly Typical Sequences. 15.3 Multiple-Access Channel. 15.4 Encoding of Correlated Sources. 15.5 Duality Between Slepian-Wolf Encoding and Multiple-Access Channels. 15.6 Broadcast Channel. 15.7 Relay Channel. 15.8 Source Coding with Side Information. 15.9 Rate Distortion with Side Information. 15.10 General Multiterminal Networks. Summary. Problems. Historical Notes. 16. Information Theory and Portfolio Theory. 16.1 The Stock Market: Some Definitions. 16.2 Kuhn-Tucker Characterization of the Log-Optimal Portfolio. 16.3 Asymptotic Optimality of the Log-Optimal Portfolio. 16.4 Side Information and the Growth Rate. 16.5 Investment in Stationary Markets. 16.6 Competitive Optimality of the Log-Optimal Portfolio. 16.7 Universal Portfolios. 16.8 Shannon-McMillan-Breiman Theorem (General AEP). Summary. Problems. Historical Notes. 17. Inequalities in Information Theory. 17.1 Basic Inequalities of Information Theory. 17.2 Differential Entropy. 17.3 Bounds on Entropy and Relative Entropy. 17.4 Inequalities for Types. 17.5 Combinatorial Bounds on Entropy. 17.6 Entropy Rates of Subsets. 17.7 Entropy and Fisher Information. 17.8 Entropy Power Inequality and Brunn-Minkowski Inequality. 17.9 Inequalities for Determinants. 17.10 Inequalities for Ratios of Determinants. Summary. Problems. Historical Notes. Bibliography. List of Symbols. Index.

45,034 citations

Journal ArticleDOI
TL;DR: The concept of sensor networks which has been made viable by the convergence of micro-electro-mechanical systems technology, wireless communications and digital electronics is described.

17,936 citations


"Recent and Emerging Topics in Wirel..." refers background in this paper

  • ...Wireless sensor networks (WSN) [55], [56], [30], [57], [58], [59], [60] consist of a large number of small, energy- and resource-constrained sensor nodes....

    [...]

Book
15 Jan 1996
TL;DR: WireWireless Communications: Principles and Practice, Second Edition is the definitive modern text for wireless communications technology and system design as discussed by the authors, which covers the fundamental issues impacting all wireless networks and reviews virtually every important new wireless standard and technological development, offering especially comprehensive coverage of the 3G systems and wireless local area networks (WLANs).
Abstract: From the Publisher: The indispensable guide to wireless communications—now fully revised and updated! Wireless Communications: Principles and Practice, Second Edition is the definitive modern text for wireless communications technology and system design. Building on his classic first edition, Theodore S. Rappaport covers the fundamental issues impacting all wireless networks and reviews virtually every important new wireless standard and technological development, offering especially comprehensive coverage of the 3G systems and wireless local area networks (WLANs) that will transform communications in the coming years. Rappaport illustrates each key concept with practical examples, thoroughly explained and solved step by step. Coverage includes: An overview of key wireless technologies: voice, data, cordless, paging, fixed and mobile broadband wireless systems, and beyond Wireless system design fundamentals: channel assignment, handoffs, trunking efficiency, interference, frequency reuse, capacity planning, large-scale fading, and more Path loss, small-scale fading, multipath, reflection, diffraction, scattering, shadowing, spatial-temporal channel modeling, and microcell/indoor propagation Modulation, equalization, diversity, channel coding, and speech coding New wireless LAN technologies: IEEE 802.11a/b, HIPERLAN, BRAN, and other alternatives New 3G air interface standards, including W-CDMA, cdma2000, GPRS, UMTS, and EDGE Bluetooth wearable computers, fixed wireless and Local Multipoint Distribution Service (LMDS), and other advanced technologies Updated glossary of abbreviations and acronyms, and a thorolist of references Dozens of new examples and end-of-chapter problems Whether you're a communications/network professional, manager, researcher, or student, Wireless Communications: Principles and Practice, Second Edition gives you an in-depth understanding of the state of the art in wireless technology—today's and tomorrow's.

17,102 citations

Journal ArticleDOI
TL;DR: Using distributed antennas, this work develops and analyzes low-complexity cooperative diversity protocols that combat fading induced by multipath propagation in wireless networks and develops performance characterizations in terms of outage events and associated outage probabilities, which measure robustness of the transmissions to fading.
Abstract: We develop and analyze low-complexity cooperative diversity protocols that combat fading induced by multipath propagation in wireless networks. The underlying techniques exploit space diversity available through cooperating terminals' relaying signals for one another. We outline several strategies employed by the cooperating radios, including fixed relaying schemes such as amplify-and-forward and decode-and-forward, selection relaying schemes that adapt based upon channel measurements between the cooperating terminals, and incremental relaying schemes that adapt based upon limited feedback from the destination terminal. We develop performance characterizations in terms of outage events and associated outage probabilities, which measure robustness of the transmissions to fading, focusing on the high signal-to-noise ratio (SNR) regime. Except for fixed decode-and-forward, all of our cooperative diversity protocols are efficient in the sense that they achieve full diversity (i.e., second-order diversity in the case of two terminals), and, moreover, are close to optimum (within 1.5 dB) in certain regimes. Thus, using distributed antennas, we can provide the powerful benefits of space diversity without need for physical arrays, though at a loss of spectral efficiency due to half-duplex operation and possibly at the cost of additional receive hardware. Applicable to any wireless setting, including cellular or ad hoc networks-wherever space constraints preclude the use of physical arrays-the performance characterizations reveal that large power or energy savings result from the use of these protocols.

12,761 citations

Journal ArticleDOI
Simon Haykin1
TL;DR: Following the discussion of interference temperature as a new metric for the quantification and management of interference, the paper addresses three fundamental cognitive tasks: radio-scene analysis, channel-state estimation and predictive modeling, and the emergent behavior of cognitive radio.
Abstract: Cognitive radio is viewed as a novel approach for improving the utilization of a precious natural resource: the radio electromagnetic spectrum. The cognitive radio, built on a software-defined radio, is defined as an intelligent wireless communication system that is aware of its environment and uses the methodology of understanding-by-building to learn from the environment and adapt to statistical variations in the input stimuli, with two primary objectives in mind: /spl middot/ highly reliable communication whenever and wherever needed; /spl middot/ efficient utilization of the radio spectrum. Following the discussion of interference temperature as a new metric for the quantification and management of interference, the paper addresses three fundamental cognitive tasks. 1) Radio-scene analysis. 2) Channel-state estimation and predictive modeling. 3) Transmit-power control and dynamic spectrum management. This work also discusses the emergent behavior of cognitive radio.

12,172 citations


"Recent and Emerging Topics in Wirel..." refers background in this paper

  • ...The motivation behind this idea comes from two observations: 1) electromagnetic spectrum is a scarce resource and license-free spectrum is crowded; and 2) if a spectrum analyzer is placed at a certain location, one will notice that many exclusively allocated bands are used only intermittently—there are spectrum holes whichs position depends on time and location [186]....

    [...]

Trending Questions (1)
What are some of the hot research topics in wireless communications?

Some of the hot research topics in wireless communications include wireless sensor networks, cooperative diversity techniques, and cognitive radio/opportunistic spectrum access.