Error control strategies for transmit-only sensor networks: A case study

Rachel Cardell-Oliver, A. Willig, C. Huebner, T. Buehring, A.E. Monsalve Ballester

    Research output: Chapter in Book/Conference paperConference paper

    3 Citations (Scopus)

    Abstract

    Wireless sensor networks using transmit-only sensor nodes are a promising new approach for applications such as environmental monitoring because they can provide high network scalability and long life-time at low cost. But achieving reliable data delivery in a transmit-only network is a challenging problem because there is no feedback channel for reporting lost or damaged packets. Taking a systems approach, this paper identifies three specific error control strategies that are applicable in this design space. The strategies are drawn from the areas of temporal diversity, spatial diversity and coding-based methods. An empirical investigation of these strategies is performed using two case study deployments in indoor and outdoor settings, running from two weeks to several months. In both case studies data replication in successive packets and receiver diversity performed best. In most cases, but not all, coding-based methods offered a poor balance between overhead and efficiency.
    Original languageEnglish
    Title of host publicationProceedings of the 2012 18th IEEE International Conference on Networks
    Place of PublicationUSA
    PublisherIEEE, Institute of Electrical and Electronics Engineers
    Pages453-458
    Volume1
    ISBN (Electronic)9781467345231
    ISBN (Print)9781467345217
    DOIs
    Publication statusPublished - 2012
    Event18th IEEE International Conference on Networks - Singapore, Singapore
    Duration: 12 Dec 201214 Dec 2012
    Conference number: 18

    Conference

    Conference18th IEEE International Conference on Networks
    Abbreviated titleICON 2012
    CountrySingapore
    CitySingapore
    Period12/12/1214/12/12

    Fingerprint Dive into the research topics of 'Error control strategies for transmit-only sensor networks: A case study'. Together they form a unique fingerprint.

    Cite this