Professional Documents
Culture Documents
net/publication/347978711
CITATIONS READS
5 521
4 authors:
All content following this page was uploaded by Abdelhak Bentaleb on 25 May 2021.
Abstract—Time Slotted Channel Hopping (TSCH, termed also cations, such as process automation, equipment and process
Time Synchronized Channel Hopping) is one of the medium monitoring, oil and gas industry, food and beverage products,
access control modes that is defined in IEEE 802.15.4e standard. chemical products, pharmaceutical products, and water waste
TSCH plays a vital role in the development of the Internet
of Things (IoT) applications such as smart city, smart home, treatments [1] [3] [8].
and smart factory. For reliable communications, it leverages TSCH applies multi-channel communication by exploiting
time slotted channel together with time slotted access capabil- 16 non-overlapping channels in the 2.4 GHz band [9]. It
ities. Moreover, it serves deterministic low-power mesh network achieves reliable communications thanks to channel hopping
deployed for critical applications with high reliability and low technique. Channel hopping is a very efficient technique that
latency. However, it suffers from problems that may seriously
deteriorate the system performance. As an attempt to identify the is used to rapidly switch transmitting radio signals among
scheduling technique problems, in this paper, we first presents several frequency channels, and thus, reduces multi-path fad-
an overview on existing scheduling techniques, rules, and their ing and interference issues [7]. TSCH has been adopted
challenges in TSCH-enabled IoT applications, and second, we by two essential standard technologies in wireless networks:
study some recent emerging scheduling-based proposals that ISA100.11a [10] and Wireless-HART [11], to service in-
benefit from intelligent and machine learning techniques to avoid
such scheduling problems. Therefore, increase the efficiency of dustrial applications with high throughput and efficiency.
the IoT applications. This survey inspires researchers to create 6TiSCH [12] is another interesting standard protocol by In-
a reliable TECH communications for critical IoT applications. ternet engineering task force (IETF) to serve IoT communica-
Index Terms—IEEE 802.15.4e, TSCH, Internet of Things, tions. It represents the key enabler of the further integration of
Wireless Sensor Networks, Scheduling IPv6 in industrial standards and the convergence of operational
technology with information technology. To achieve this, it
I. I NTRODUCTION combines the IEEE 802.15.4e TSCH capabilities with IPv6
The Internet of Things (IoT) is enabled by the proliferation for low-power and lossy networks (RPL) routing protocol.
of smart sensors and actuators, radio frequency identification, Therefore, it enables low-power wireless technology for the
cloud computing, and the emergence of new appropriate Industrial Internet of Things (IIoT) [12] [13]. TSCH has many
protocols and technologies that allow the communication every deployment topologies such as star topology, tree topology,
time and everywhere [1]. The IoT provides smart and seamless partial or mesh topology [3].
services to the end user without human intervention nor any Despite the growth potential of TSCH mode, the TSCH
interruption [2]. The authors in [1] define the IoT as follows: scheduling faces many problems. The latter are mainly related
”The Internet of Things is a set of heterogeneous connected to the shared link nature of TSCH scheduling, full collision
devices that collaborate with the Internet of services via the that occurs at the network boostrap, conflict links problem
communication protocols. The communication protocols are etc. This survey attempts to identify these problems and help
importantly dedicated to the IoT devices’ constraints. Mainly, readers (or implementer) in solving them, and thus, creating
this collaboration aims to offer services needed by the end a reliable TSCH communications. We also reviews some of
user. The IoT’s services are largely deployed and have the full the emerging scheduling solutions that use intelligent machine
potential to cover diverse domains.”. learning techniques for better and reliable network.
The IEEE 802.15.4e standard [3] is developed to overcome We note that in state-of-the-art there are only few published
the limitations of IEEE 802.15 such as unbounded delay and surveys that try to address scheduling issues for IoT in general
absence of channel diversity, which might be detrimental for and only fewer for TSCH. This survey differs from the other
the user experience in various applications such as video surveys in highlighting the artificial intelligence solutions in
streaming [4]–[6]. The IEEE 802.15.4e presents time slotted creating a reliable TSCH scheduling. It also highlights the
(or synchronized) channel hopping (TSCH) mode dedicated main TSCH scheduling requirements, so the researchers avoid
for wireless sensor devices [7] with tiny resources (e.g., beforehand the common problems while designing the TSCH
computation resources, low power, etc.). This mode is the most scheduling.
practical media access control (MAC) sub-layer protocol as it The remainder of the paper is organized as follows. Sec-
is well-designed to be implemented in IoT’s critical appli- tion 1 describes the TSCH mode. Section 2 outlines the
0331
Authorized licensed use limited to: National University of Singapore. Downloaded on May 25,2021 at 07:59:16 UTC from IEEE Xplore. Restrictions apply.
n0
PAN Slot Frame Size Slot Frame Size
Coordinator
Time Slots
Time Slot 3
Time Slot 3
Time Slot 0
Time Slot 1
Time Slot 2
Time Slot 0
Time Slot 1
Time Slot 2
0 1 2 3 4
n1 n2
n3 → n 1 n7 → n 5
Channels Offsets
0
n8 → n 6 n8 → n 6
1 n5 → n 2 n5 → n 2
n3 n4 n5 n6
2 n2 → n 0 n4 → n 1 n2 → n 0
ASN: 0 1 2 3 4 5 6 7
n7 n8
0332
Authorized licensed use limited to: National University of Singapore. Downloaded on May 25,2021 at 07:59:16 UTC from IEEE Xplore. Restrictions apply.
TABLE I
TSCH MAIN EQUATIONS
Equations Explanation
K: Slot frame cycle
ASN = (k × S + t) S: Slot frame size
t: Slot offset
0333
Authorized licensed use limited to: National University of Singapore. Downloaded on May 25,2021 at 07:59:16 UTC from IEEE Xplore. Restrictions apply.
according to a matching rule. The MSA comprises of a set exclusion (LME). Mutual exclusion is executed to prohibit
of cycles . During the first cycle, the non-conflicting nodes colliding nodes from sharing a common channel at the same
are marked by a deep color and the appropriate links of time. To achieve this goal, when sender-receiver nodes assign a
the selected nodes are arranged in the first time slot. Once new communication link, a receiver node notifies its neighbors
the first cycle terminates, the colored nodes are removed about the reserved cells.
from the tree and the scheduling table is updated by adding Kieu-Ha Phung et al. [29] presented reinforcement learn-
the first time slot information. During the second cycle, the ing (RL) based scheduling solution to ensure traffic-adaptive
update of the scheduling table is built based on the same schedule for every node. The mechanism solves the prob-
coloring mechanism executed on the updated tree. Therefore, lem of increasing traffic demand from the already existing
in each new cycle a new time slot is exploited. The same nodes or additional data traffic from the new joined nodes.
authors improved the initial algorithm MSA by suggesting an The proposed solution also achieves collision-free parallel
optimized scheduling algorithm (OSA). The main idea of OSA transmissions over different channels, and thus, provides high
is that at each new cycle, it first colors the non-conflicting leaf throughput and high delivery ratio. It also meets the energy
nodes to minimize the latency time of transmitting data. When efficiency requirements of nodes.
the number of cycles increases, the number of time slots in The authors in [25] proposed a Q-learning MAC protocol
the slot frame increases as well, which increases the packet (QL-MAC). QL-MAC adjusts the active period and the radio
latency. sleeping period based on the prediction of data traffic and
The authors in [13] focused on the bootstrapping protocol neighboring nodes’ transmission state. It enables the self-
that authorizes a new node to join the network. They adopt a adjustment of the duty cycle of wireless sensors networks
Bayesian Broadcast Algorithm proposed in [23] to adjust the (WSN) nodes.
probability of transmission of EB, DIO, and bootstrap frames A self-organising RL approach for scheduling the wake-up
in order to reduce the contention and stabilize slotted Aloha. cycles of nodes in a WSN is proposed in [26]. The learning
Advertisement time slot partitioning (ATP) is proposed process authorizes nodes to compete for the radio channel
in [22] to increase the EB transmissions without increasing to desynchronize so that collisions and radio interference are
advertisement cells and decreasing the network bandwidth reduced. The wake-up schedules of forwarding nodes (that
resources for network’s communication. The key purpose of construct the path to the final destination) need to communi-
ATP technique is to reduce the EB packet’s size, and also, cate for increasing the network throughput. In order to avoid
the considerable amount of unexploited time (e.g., frame radio interference and packet losses, neighboring nodes are
acknowledgement) by omitting the advertisement slot. Since desynchronised.
the EB size is reduced, the packet transmission time (denoted Orchestra is a node-based scheduling mechanism proposed
by macTsMaxTx) in the advertisement cells is replaced by the in [28]. The scheduling table is built based on a the random-
maximum transmission time of an EB (denoted by macEBTx). ization of a hash function. This technique is keen on assigning
ATP scheme increases the EB transmissions as it divides each a unique cell for reception or transmission when the size of
time slot into sub-slots; a sub-slot is a compressed time slot the slot frame is larger than the number of deployed nodes. It
version that allows the transmission of only one EB. defines three types of slot frame: broadcast-, BE-, and unicast-
A full collision phenomenon can be generated from EB slot frames. In Orchestra, channel offset zero is assigned for
transmitted by neighbors of a node. This type of collisions EB slot frame, channel offset one is arranged for broadcast
between EBs can seriously affect the energy consumption of slot frame, and channel offset two is exploited by unicast slot
nodes and network’s performance. The proposed EB schedul- frame.
ing methods in the literature are based on randomness, the Autonomous link-based cell scheduling algorithm (ALICE),
authors in [9] have shown that creating the EB transmission designed for RPL routing, is proposed in [27]. It uses multi-
schedule based on randomness may lead to a probability ple channels simultaneously without additional overhead. It
(denoted by P) of full collisions (i.e., P(full collision in a exploits traffic direction operations, routing, and slot frame to
single cell) + P(full collision in multiple cells)). To solve this prevent downstream and upstream from altering each other.
problem, the authors proposed a collision-free advertisement ALICE scheme shows an enhancement in terms of end-to-end
scheduling (CFAS). Each advertiser autonomously performs latency, RPL parent changes, radio duty-cycle, and reliability
EB scheduling without negotiating with its neighbors. On compared to the Orchestra.
one hand, CFAS completely eliminates collisions either when Table II classifies and summarize the discussed scheduling
nodes are fixed or mobile. On the other hand, when the techniques according to methods applied for building EB and
number of advertisers increases, this may lead to the increase performing scheduling process.
of advertisement cells in the slot frame. This last problem is Table III summarizes the advantages and drawbacks of the
solved by integrating the ATP technique to the CFAS. discussed techniques.
The authors in [24] improved the distributed scheduling
algorithms to create efficient TSCH schedules along RPL IV. C ONCLUSION AND F UTURE W ORK
routes. The proposed scheme limits the allocation of identical TSCH exploits time slot channel operation capability with
cells to colliding nodes. The idea is based on local mutual time slotted medium access. The time slotted channel access
0334
Authorized licensed use limited to: National University of Singapore. Downloaded on May 25,2021 at 07:59:16 UTC from IEEE Xplore. Restrictions apply.
TABLE II
S CHEDULING TECHNIQUES IN TSCH. RL: REINFORCEMENT LEARNING ALGORITHMS , MA: MATCHING ALGORITHMS , CA: COLORING ALGORITHMS ,
BN: BAYESIAN NETWORKS , OIA: OTHER INTELLIGENT ALGORITHMS , C/D: C ENTRALIZED /D ECENTRALIZED MAC PROTOCOL , F: HIGHLY FLEXIBLE TO
TOPOLOGY CHANGES , SD: SENSED DATA TRAFFIC , EB: E NHANCED B EACON .
TABLE III
A DVANTAGES AND DRAWBACKS OF SCHEDULING TECHNIQUES IN TSCH
Kieu-Ha Phung et al. [29] Provides high throughput and high delivery ratio
Meets the energy efficiency requirements of nodes
0335
Authorized licensed use limited to: National University of Singapore. Downloaded on May 25,2021 at 07:59:16 UTC from IEEE Xplore. Restrictions apply.
[7] S. Hammoudi, S. Harous, and Z. Aliouat, “External interference free sensor networks: A complete design and performance evaluation,” Ad
channel access strategy dedicated to tsch,” in 2018 IEEE International Hoc Networks, vol. 26, pp. 88–102, 2015.
Conference on Electro/Information Technology (EIT), pp. 0350–0355,
IEEE, 2018.
[8] I. L. BRIEF, “Internet of things,” 2019.
[9] A. Karalis, D. Zorbas, and C. Douligeris, “Collision-free advertisement
scheduling for ieee 802.15. 4-tsch networks,” Sensors, vol. 19, no. 8,
p. 1789, 2019.
[10] ANSI/ISA, “Ansi/isa-100.11a-2011 wireless systems for industrial au-
tomation: Process control and related applications.,” 2011.
[11] IEC, “Industrial communication networks wireless communication net-
work and communication profiles wirelesshart.,” 2010.
[12] X. Vilajosana, T. Watteyne, T. Chang, M. Vučinić, S. Duquennoy, and
P. Thubert, “Ietf 6tisch: A tutorial,” IEEE Communications Surveys &
Tutorials, 2019.
[13] M. Vučinić, T. Watteyne, and X. Vilajosana, “Broadcasting strategies
in 6tisch networks,” Internet Technology Letters, vol. 1, no. 1, p. e15,
2018.
[14] R. Teles Hermeto, A. Gallais, and F. Theoleyre, “On the (over)-reactions
and the stability of a 6tisch network in an indoor environment,” in
Proceedings of the 21st ACM International Conference on Modeling,
Analysis and Simulation of Wireless and Mobile Systems, pp. 83–90,
2018.
[15] S. Hammoudi, Z. Aliouat, and S. Harous, “Enhanced time-slotted
channel hopping,” Transactions on Emerging Telecommunications Tech-
nologies, p. e3638, 2018.
[16] D. De Guglielmo, S. Brienza, and G. Anastasi, “Ieee 802.15. 4e: A
survey,” Computer Communications, vol. 88, pp. 1–24, 2016.
[17] N. T. Javan, M. Sabaei, and V. Hakami, “Ieee 802.15. 4. e tsch-based
scheduling for throughput optimization: A combinatorial multi-armed
bandit approach,” IEEE Sensors Journal, vol. 20, no. 1, pp. 525–537,
2019.
[18] S. Hammoudi, S. Harous, Z. Aliouat, and L. Louail, “Time slotted
channel hopping with collision avoidance,” International Journal of Ad
Hoc and Ubiquitous Computing, vol. 29, no. 1-2, pp. 85–102, 2018.
[19] K. Shi, L. Zhang, Z. Qi, K. Tong, and H. Chen, “Transmission schedul-
ing of periodic real-time traffic in ieee 802.15. 4e tsch-based industrial
mesh networks,” Wireless Communications and Mobile Computing,
vol. 2019, 2019.
[20] M. Meng, Z. Yujun, Z. Dadong, and C. Fan, “Scheduling for data trans-
mission in multi-hop ieee 802.15. 4e tsch networks,” Mobile Networks
and Applications, vol. 23, no. 1, pp. 119–125, 2018.
[21] J.-H. Kwon, E.-J. Kim, J. Park, Y. Lim, Y.-S. Kim, and D. Kim, “Impact
of slotframe length on end-to-end delay in ieee 802.15. 4 tsch network,”
in 2019 IEEE International Conference on Consumer Electronics-Asia
(ICCE-Asia), pp. 111–112, IEEE, 2019.
[22] A. Karalis, “Atp: A fast joining technique for ieee802. 15. 4-tsch
networks,” in 2018 IEEE 19th International Symposium on” A World of
Wireless, Mobile and Multimedia Networks”(WoWMoM), pp. 588–599,
IEEE, 2018.
[23] R. Rivest, “Network control by bayesian broadcast,” IEEE Transactions
on Information Theory, vol. 33, no. 3, pp. 323–328, 1987.
[24] A. J. Fahs, R. Bertolini, O. Alphand, F. Rousseau, K. Altisen, and
S. Devismes, “Collision prevention in distributed 6tisch networks,” in
2017 IEEE 13th International Conference on Wireless and Mobile
Computing, Networking and Communications (WiMob), pp. 1–6, IEEE,
2017.
[25] C. Savaglio, P. Pace, G. Aloi, A. Liotta, and G. Fortino, “Lightweight
reinforcement learning for energy efficient communications in wireless
sensor networks,” IEEE Access, vol. 7, pp. 29355–29364, 2019.
[26] M. Mihaylov, Y.-A. Le Borgne, K. Tuyls, and A. Nowé, “Decentralised
reinforcement learning for energy-efficient scheduling in wireless sen-
sor networks,” International Journal of Communication Networks and
Distributed Systems, vol. 9, no. 3-4, pp. 207–224, 2012.
[27] S. Kim, H.-S. Kim, and C. Kim, “Alice: autonomous link-based cell
scheduling for tsch,” in Proceedings of the 18th International Conference
on Information Processing in Sensor Networks, pp. 121–132, 2019.
[28] S. Duquennoy, B. Al Nahas, O. Landsiedel, and T. Watteyne, “Orchestra:
Robust mesh networks through autonomously scheduled tsch,” in Pro-
ceedings of the 13th ACM conference on embedded networked sensor
systems, pp. 337–350, 2015.
[29] K.-H. Phung, B. Lemmens, M. Goossens, A. Nowe, L. Tran, and
K. Steenhaut, “Schedule-based multi-channel communication in wireless
0336
Authorized licensed use limited to: National University of Singapore. Downloaded on May 25,2021 at 07:59:16 UTC from IEEE Xplore. Restrictions apply.
View publication stats