diff --git "a/AdAyT4oBgHgl3EQfRvcW/content/tmp_files/load_file.txt" "b/AdAyT4oBgHgl3EQfRvcW/content/tmp_files/load_file.txt" new file mode 100644--- /dev/null +++ "b/AdAyT4oBgHgl3EQfRvcW/content/tmp_files/load_file.txt" @@ -0,0 +1,830 @@ +filepath=/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf,len=829 +page_content='CONSIP: Consistency Protocol for Hopping Function Exchange and Black listing in TSCH Stefano Scanzio, Federico Bitondo, Gianluca Cena, and Adriano Valenzano National Research Council of Italy (CNR–IEIIT), Corso Duca degli Abruzzi 24, I-10129 Torino, Italy Email: stefano.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='scanzio@ieiit.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='cnr.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='it, federico.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='bitondo@gmail.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='com, gianluca.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='cena@ieiit.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='cnr.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='it, adriano.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='valenzano@ieiit.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='cnr.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='it Abstract—The use of white and black listing techniques in Wireless Sensor Networks (WSN), and in particular those which are based on the Time Slotted Channel Hopping (TSCH) op- erating mode of IEEE 802.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='15.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='4, permits to improve reliability and latency by performing transmissions on the best channels.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' Techniques that operate on a per-link basis are deemed quite effective, but proper operation requires that the two end points involved in the communication agree on the channels to be used for transmission.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' On the contrary, communication in the network can be prevented, eventually leading, in the worst cases, to the disconnection of part of the nodes.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' This paper presents CONSIP, a technique aimed to ensure strict consistency in the information exchanged between the nodes and used to drive communication, by preventing a priori the aforementioned problem from occurring.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' Results show a slight increase in energy consumption, due to the use of a backup cell, whereas communication latency does not worsen.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' The effectiveness of CONSIP was assessed by means of an experimental campaign, and the only drawback we found is that the backup cell, which is required to be reserved per link, may limit the number of nodes in dense networks.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' I.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' INTRODUCTION The recent evolution of factories can be viewed as a sort of new, pacific futurism movement1, in which characteristics such as speed, simultaneity, dynamism, and innovation play a relevant role in next-generation industrial networks and plants.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' On the one hand, the Industry 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='0 [1], [2] revolution (and beyond) is an example of this transition, where communication networks are becoming more and more heterogeneous in terms of the employed technologies [3] and wireless extensions are playing an increasingly important role for enabling the afore- mentioned characteristics.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' On the other hand, the (Industrial) Internet of Things (IoT/IIoT) paradigm [4], [5], [6] enables autonomous communication between network devices, and is boosting the need of wireless technologies with more specific features, able to meet increasingly demanding requirements.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' In this direction, the set of technologies collectively known with the term Wireless Sensor (and Actuator) Networks (WSN/WSAN) is extensively used to collect data and, some- times, to perform actuations in distributed systems, where devices are typically battery-powered and the amount of data to be exchanged is quite small.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' Among the available solutions, the Deterministic and Synchronous Multichannel Extension (DSME) and the Time Slotted Channel Hopping (TSCH) 1Futurism was a social and artistic movement, which originated in Italy in the early 20th century.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' operating modes of the IEEE 802.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='15.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='4 standard [7] show interesting features and are becoming quite popular.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' In both modes, the transmissions of packets in a data stream, as well as the retransmissions of the same packet, are carried out auto- matically at the MAC layer on different frequencies/channels, which consequently makes the quality of the communication link, as seen by network nodes, more stable.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' This work focuses on TSCH, and in particular it is related to those techniques, known as black listing and white listing, that are aimed at increasing the quality of communication, by removing the worst channels or by selecting the best channels, respectively.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' For example, if a network node is given the ability to select the best channels to perform its transmissions, it will consequently experience improvements in terms of reliability, latency, and power consumption.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' To this end, many black and white listing algorithms were proposed in the scientific literature, and their typical operations can be subdivided into three basic steps: 1) evaluation: inferring how each channel will likely be- have in the near future, typically using statistics col- lected from the recent past;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' 2) selection: deciding whether, where, and how to use these channels, that is, planning a selection strategy;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' 3) propagation: delivering the channel selection strategy to the involved nodes in a consistent way.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' The main content of this paper is related to the last point.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' In particular, it is about ensuring that, at any given time, the sender and receiver nodes on a link use the same channel for communicating.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' In fact, if this property was not guaranteed, communication within the network could be prevented, possi- bly with severe consequences, which typically consist in the disconnection, sometimes permanent, of one or more nodes.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' To this extent we proposed the CONSIP protocol, which ensures to the involved nodes a reliable exchange of the information about the channels to be used in future transmissions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' It grounds on the idea to leave two disjoint communications links open during this exchange, which virtually operate in parallel, the former based on the old information about channels and the second using the new one.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' Only when both nodes are certain that they have agreed to use the new information, the previous communication based on the old channel selection is deactivated.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' An extensive experimental campaign based on simulation has been carried out, in order to evaluate the This is the author’s version of an article that has been published in this journal.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' Changes were made to this version by the publisher prior to publication.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' The final version of record is available at https://doi.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='org/10.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='1109/WFCS53837.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='2022.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='9779192 Copyright (c) 2022 IEEE.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' Personal use is permitted.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' For any other purposes, permission must be obtained from the IEEE by emailing pubs-permissions@ieee.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='org.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' arXiv:2301.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='00070v1 [cs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='NI] 30 Dec 2022 CONSIP functionality from the point of view of a number of statistical indicators, and in particular power consumption, which is a very important performance metric for this kind of networks.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' In the following, the concepts behind white and black listing are analyzed and described together in Section II, with an extensive analysis of the state of the art.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' The CONSIP protocol is firstly presented intuitively, and then formally, in Section III.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' Section IV describes the simulator and the parameters we used in the simulation, including the energy model, while results are reported in Section V, which precedes Section VI that draws some concluding remarks.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' II.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' BLACK AND WHITE LISTING The channel hopping technique enables nodes in a wireless network to periodically change the transmission frequency of links in order to mitigate the effects of disturbance and interference on the quality of communication.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' The ideas be- hind channel hopping were proposed more than one decade ago [8], and currently they are adopted in several network technologies like WirelessHART [9], Bluetooth [10], and TSCH.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' In particular, time in TSCH is divided in timeslots of equal length [11], [12], while channel hopping [8] selects the effective transmission channel through a pseudo-random function ν shared between the transmitter and the receiver.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' In this protocol, traffic is scheduled by reserving timeslots, to permit nodes to be switched off when no data exchange is scheduled for them, consequently saving energy.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' A scheduled transmission is identified by a pair of values, the slot offset (o) and the channel offset (c), which iden- tify a position in a matrix of dimension Nslots × Nch.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' The schedule repeats over time with period Nslots slots.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' Typically Nslots = 101, and the slot duration is equal to 20 ms.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' As a consequence, the repetition period of the slotframe (i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=', of the matrix) is 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='02 s.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' Each slot is identified by a (practically) unique and strictly increasing unsigned integer number x, which is known as the Absolute Slot Number (ASN).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' In every slot up to Nch transmissions can be performed at the same time on distinct links, each one related to a different channel offset c ∈ {1, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='..' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=', Nch}.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' The shared hopping function ν returns the physical channel ch used for the actual transmission, and can be expressed as ch = ν(x, c) ≜ H((x + c) mod Nch), (1) where H(i) is the so called hopping sequence.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' Given an integer value i ∈ {0, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='..' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=', Nch − 1}, H(i) basically returns the element in position i of an array of dimension Nch, which encodes the physical channel.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' If protocol parameters are set in such a way that two subsequent transmissions of the same data frame are not spaced by a multiple of Nch (as typically happens in real networks), then they will take place on different physical channels.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' The hopping sequence H(i) is usually chosen so that subsequent transmissions take place on channels that are spaced wide enough.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' In this way, retries of the same packet are unlikely to suffer repeatedly from the effect of the same source of interference [13].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' For instance, in the 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='4 GHz band a single Wi-Fi channel can span over multiple IEEE 802.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='15.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='4 channels that use the O-QPSK PHY.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' Channel hopping has the effect of “flattening” network performance, since all channels are used independently of their quality.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' In other words, the quality of a link experienced by communicating nodes is about the same as what is found by averaging the quality of channels.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' As a consequence, reliability and other performance indicators are less dependent on the quality of any single channel, making communication much more stable.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' Two reasonable and intuitive solutions to enhance perfor- mance are black listing [14] and white listing [15].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' In the for- mer, channels with the worst performance are excluded, while in the latter only those channels with the better performance are exploited.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' Both solutions are based on the idea that some channels can be removed from (or selected for) the hopping sequence in order to maximize the chances that transmission attempts succeed.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' Over the past years, a variety of black and white listing techniques have been proposed in the scientific literature.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' A relevant aspect for creating a taxonomy of such techniques is the metric they use to identify a channel as bad or good.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' Methods based on the Received Signal Strength Indicator (RSSI) have been shown to be less accurate than those based on the Packed Delivery Ratio (PDR) [16].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' Less conventional techniques like ETSCH rely on energy detection in idle periods [17], while other solutions make use of fuzzy logic [18].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' It is also possible to use machine learning techniques to predict the evolution of a wireless channel, in terms of the frame delivery probability, given its recent past [19].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' Channel quality estimation is only one of the aspects to which attention has to be paid in the definition of above techniques.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' Many works recognise that link-based (local) listing, in which the set of good/bad channels is selected based on the single link, is better than global listing [20].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' The superiority of link-based approaches is reasonable, since mesh networks are distributed in space, and the characteristics of the wireless spectrum may vary noticeably even in the case of small movements of the nodes [21].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' Actually, a node that requires to communicate with more than one neighbor needs to maintain a different ν function for each neighbor.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' Selecting the correct functions can be done transparently, by using the information related to the configured (non-shared) cells in the slotframe matrix.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' An important limitation of link-based techniques is that they cannot be directly used for multicast/broadcast traffic.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' Black/white listing techniques also differ on the way chan- nel selection is shared among nodes.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' In particular, every time a technique requires a modification of the function ν (and/or the hopping sequence H(i)) used by a pair of nodes, both the transmitter NTX and the receiver NRX must agree on it.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' In the case of inconsistency between the functions νTX and νRX used in NTX and NRX, respectively (i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=', when νTX ̸= νRX), communication between the two nodes is prevented because it is no longer guaranteed that the channel they use for transmission and reception in any given slot coincide.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' This �� �� �� �� �� �� �� �� �� ��� ��� �� 1j �� 2j �� �� 3i 4i 4j 5i 5j �� 6i ��� 7i 7j �� ��� 8i 8j ��� 9i 9j �� 10j ��� 11i 11j ℱ�� ����� = � ,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' �� ����� = � ,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' − ℱ�� � ACK frame ����� = � ,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' �� ����� = � ,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' − ����� = � ,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' �� ����� = � ,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' �� 2i ����� = � ,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' �� ����� = � ,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' − 1i ℱ ℱ �� Lost frame ����� = � ,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' �� ����� = � ,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' − 3j ℱ �� ℱ��� �� ����� = � ,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' �� ����� = � ,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' ��� 6j ℱ��� ℱ��� �� ����� = � ,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' ��� ����� = � ,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' − ℱ ��� ��� ����� = � ,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' ��� ����� = � ,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' − 10i ℱ�� Data frame with new hopping function �� ℱ data frame ��� ��� Double listening Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' Example of application of the CONSIP protocol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' circumstance shall be absolutely avoided, because it could lead to the disconnection of a portion of the network.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' The ways to distribute ν to the end points of the link, and in particular to do so consistently, avoiding the possibility that νTX ̸= νRX for even just a single cell, are the main goals of this work.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' Some scientific papers treated this problem in a completely different way and with some assumptions [20], [22], for example not considering the chance that acknowl- edgement (ACK) frames could be lost.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' This simple assumption proved to be mostly untrue on real traffic logs we acquired on OpenMote B devices equipped with the OpenWSN (version REL-1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='24.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='0) operating system.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' In fact, our measurements showed that the loss probability for ACK frames in our experimental testbed is not negligible at all, and amounts to about 8% in benign environmental conditions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' In the same conditions, the loss probability for data frames was 12.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='6%2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' Instead, the main idea in [23] is to leave the hopping function unmodified, but to lower the usage of cells associated with bad quality channels, which are exploited with a certain probability lower than one.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' Doing so prevents any problems due to inconsistency between the views of NTX and NRX, but at the same time limits the achievable performance.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' In fact, while this technique is suitable for reducing power consumption, it also causes an increase of latency.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' III.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' CONSISTENCY PROTOCOL Communication between a sender node NTX and a receiver node NRX in the slot characterized by ASN equal to x is only possible if both nodes agree on the frequency (physical chan- nel) to be used to send and receive data on air, respectively.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' In the case the hopping functions ν on the two sides of a link were unaligned, the network would quickly lose connectivity of some nodes, which become unreachable.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' The process of exchanging a hopping function between the end points of a link starts when NTX generates a new νn and finishes when νn is effectively in use, at which point the cells referring to the previous hopping function νo are switched off in both NTX and NRX.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' In the following, this process will be denoted, for brevity, with the term ν-exchange.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' Instead, 2The experimental data on which such values were computed are included in the file default-101-16-15days.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='dat, which is downloadable from https://dx.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='doi.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='org/10.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='21227/fg62-bp39.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' CONSIP is the protocol we are proposing in this work to enable a ν-exchange to be performed in a consistent way.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' The main idea behind CONSIP is to have, for any cell Ccurr reserved for the communication between NTX and NRX, a backup cell Cback that is used only for the time strictly needed to perform a ν-exchange.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' After that, the cell Cback becomes Ccurr, i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=', the two cells reverse their role by means of a swap() operation.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' These two cells are scheduled in distinct slot offsets in the slotframe matrix.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' As a consequence, CONSIP does not require any modification to the hardware of nodes.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' In particular, it can be implemented in conventional de- vices provided with a single communication interface/antenna.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' Although there are no other constraints on the position of Cback within the slotframe, a reasonable choice is to interleave Ccurr and Cback cells so that they are evenly spaced, e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='g.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=', when Nslots = 101 they could be located at slot offset i and (i+50) mod 101.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' Both Ccurr and Cback are identified by a 2-tuple, composed of a slot offset and a hopping function.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' Let i and j be the slot offsets assigned to the two above cells, respectively.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' Then, Ccurr = (i, νo) means that the current cell in use Ccurr is assigned to slot offset i and that hopping function νo is used for transmission.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' Instead, Cback = (j, −) means that Cback is assigned to slot offset j and it cannot be used because it is not currently mapped to any hopping function.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' Simple example about protocol operation In Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' 1, an example of the CONSIP operation is sketched.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' In slot 1i (i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=', slot i in slotframe 1) a frame Fνn x is sent to perform a ν-exchange.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' This frame is just a conventional data frame Fx that also contains the new hopping function νn estimated by NTX.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' The hopping function used to determine the physical channel for every slot, on either the transmitter (upper diagram) or the receiver side (lower diagram), is specified inside the box representing the slot itself.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' In the example, the first frame is lost but the retransmission of Fνn x in cell 2i correctly arrives to destination.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' For NRX, starting from slot 2j the cell Cback = (j, νn) is activated, and the node enters the double listening state in which it listens on both cells Ccurr and Cback, using for them the hopping functions νo and νn, respectively.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' Since the frame Fνn x sent in cell 2i is confirmed by the related ACK frame Ax, NTX starts using exclusively the new hopping function νn.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' In particular, it performs a swap between the two cells by means of the swap() function, after �� �� ���� ����� ⋀ �� �� �� ����� ����(�����, �����) ����� = ⋅ , !' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' ����� = ⋅ , − ����� = # , $ ����� = % , − ����� = # , $ ����� = % , − �� ������ ����� ����� = ⋅ , !' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=" double listening steady �� �� �� ����� ����� = ⋅ , − �� �� �� �&'�( ����(�����, �����) ����� = ⋅ , − �� ����) �� ����� ����� = ⋅ , !" metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=") �� ����) �� �&'�( ����(�����, �����) ����� = ⋅ , !" metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=') steady Transmitter Node *�� Receiver Node *�� {1} {1} {2} {3} {4} {7} {6} {5} Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' State machines of NTX and NRX.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' which Ccurr = (j, νn) and Cback = (i, −), i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=', the backup cell is deactivated.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' On NRX, the double listening state persists until it receives a frame (typically in Cback, but sometimes in Ccurr) whose channel is selected using the new hopping function νn.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' Only in this case, NRX can be sure that also NTX has switched to νn, and is consequently using Cback as current transmission channel.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' At this point NRX sets Ccurr = (j, νn) and Cback = (i, −).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' In the example of Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' 1 this happens in slot 3j, which becomes the current channel.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' In the new ν-exchange with hopping function νn2 in slot 6j, the Ax frame used to confirm Fν2n x is lost.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' In this case, node NTX continues to transmit in Ccurr = (j, νn), and only when Fν2n x is followed by the correct reception of Ax, which happens in slot 8j, node NTX can start transmitting using the new hopping sequence.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' It is worth remarking that, the double listening period in which NRX is active on both cells with both the old and new hopping sequences is mandatory because, after the reception of Fνn2 x using νn, from the NRX viewpoint it is not possible to know if NTX will use νn or νn2 for the next transmission.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' In fact, if the acknowledgement frame Ax related to Fνn2 x is correctly received by NTX, it can safely assume that NRX received the new hopping function νn2 and hence it can start using it as the current cell Ccurr = (i, νn2), otherwise it must assume that νn2 was not received.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' This mismatch of viewpoints between NTX and NRX may occur in any communications network, and it is accentuated in wireless networks where the probability of losses is not negligible at all.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' Only when the frame Fx is actually received in the cell related to the new hopping function νn2 (in slot 10i in the example), node NRX can start using Ccurr = (i, νn2) as the current cell, and it can disable the backup cell Cback = (j, −).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' Protocol description through FSMs To better formalize the CONSIP protocol, two finite state machines (FSMs) are presented in Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' 2 for NTX and NRX.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' In particular, both FSMs start from the steady initial states with Ccurr = (i, νo) and Cback = (j, −) (see the arc labeled {1} in the figure).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' These initial steady states represent the normal operating condition of TSCH, in which only one cell is active and there are no ongoing updates of ν.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' Regarding arc {2} of the NTX FSM, each time a frame delivering a new hopping function Fνn x is acknowledged in Ccurr, the node NTX can set the cell Ccurr to νn.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' For doing so, the node swaps the two cells (i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=', it invokes swap(Ccurr, Cback)), and then it sets the hopping function νn in the current cell and disables the hopping function, and consequently the ability to transmit, in the backup cell.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' This is performed by means of the two operations Ccurr = (·, νn) and Cback = (·, −), where the symbol “·” means that the slot offset is not changed.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' Regarding the FSM of NRX, it consists of two states.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' Each time a frame containing a new hopping function νn is received in Ccurr, the backup cell is activated and the FSM enters the double listening state through arc {3}, in which NRX receives on both cells, consequently increasing its power consumption.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' The arc labelled {4} either corresponds to the NTX’s intention to change on the fly the previously transferred hopping function νn with a new hopping function νn′ or, more typically, it is due to a retransmission of the previous frames for which the related ACK did not arrive to destination.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' In the latter case νn′ = νn.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' The arrival of a frame in the backup cell, as for arc {5}, confirms to NRX that the transmitter is correctly using the new hopping function.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' As a consequence, the receiving node can start using the backup cell as current cell, by invoking swap(Ccurr, Cback), after which it can disable the backup cell Cback = (·, −).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' A frame Fνn′ x delivering a new hopping function νn′ that is received in the backup channel, as depicted for arc {6}, has simultaneously two consequences.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' The first is to confirm to NRX that NTX is using the new hopping function νn, and the second to communicate that NTX wants to perform a new ν-exchange using νn′.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' For this reason the use of the swap() function is required.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' Finally, arc {7} accounts for the unlikely case that NTX decides to abort the ν-exchange, and it continues transmitting normal frames in Ccurr.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' For instance, this may happen if the sender node detects that the quality of channels has changed and the current hopping function νo is again the best one.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' IV.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' EXPERIMENTAL SETUP A discrete event simulator named TSCH-predictor, which was developed within the SimPy framework, was used to evaluate the effectiveness of CONSIP.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' Differently from other more common simulators such as TSCH-Sim [24] and 6TiSCH [25], TSCH-predictor has the advantage to be noticeably simpler, and consequently it permits to easily implement and evaluate new algorithms and techniques based on TSCH.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' TSCH-predictor was profitably used in other research works like [26], [27], and more information about its features can be found in [27].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' The main settings used in all the experimental campaigns were selected as follows: Nslots = 101, slot duration 20 ms, Nch = 16, frame loss probability ϵf = 12.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='6%, and ACK loss probability ϵa = 8.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='0%.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' In the experiments, both proba- bilities ϵf and ϵa were left constant over time.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' This is not a big limitation, as the sensitivity of CONSIP with respect to channel errors is not the main focus of this work.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' However, such analysis may be of interest, and is left as future work.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' As specified, these two values were derived from a real experimental testbed deployed in our lab.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' Finally, the duration of each experiment was set to 10 years, which ensures for results good statistical significance.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' The size of each packet sent in the simulation is Ltot = Lheader +Lpayload +LIE, where Lheader = 29 B is the overall size of both the PHY and MAC headers, Lpayload = 30 B refers to the payload (we chose a relatively small size for it, as happens in typical industrial networks and WSANs), and LIE concerns the information element (IE).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' In particular, in this work the IE is used to encode and transfer ν.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' The IE, whose size is LIE = LIEh + LIEp, is a specific configurable attribute that the IEEE 802.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='15.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='4 standards permits to attach to a frame, and consists of an IE header LIEh = 2 B and an IE payload LIEp that is a configuration parameter and must have enough room to store ν.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' In the following, the value LIEp was fixed to 16 B unless explicitly stated.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' The exact way the ν function is encoded depends on the specific implementation of the black/white listing technique, and is outside the scope of this work.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' In this new version of the simulator we exploited the energy model described in [28].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' In particular, the energy to transmit a data frame is Etx = Etx0 + etx · Ltot, and the energy to receive a data frame is Erx = Erx0 + erx · Ltot, where Etx0 = 7 µJ, etx = 2 µJ/B, Erx0 = 65 µJ, and erx = 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='3 µJ/B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' Instead, the energy to transmit an ACK frame (whose size is 33 B) is EACK tx = 106 µJ, the energy to receive it is EACK rx = 79 µJ, and the energy spent for idle listening, when the receiver switches its interface on without receiving any data, is Elisten = 138 µJ.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' V.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' RESULTS The effectiveness of CONSIP was assessed through an extensive experimental campaign aimed at analyzing it from the point of view of two relevant key performance indicators, namely, power consumption and ν-exchange latency.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' There is no need to analyze it also from the point of view of reliability, because in CONSIP every packet is guaranteed the same number of retries (upon errors) as the unmodified TSCH.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' Power consumption The first set of experiments is targeted at analyzing the amount of energy used by CONSIP when a ν-exchange is performed cyclically with a period equal to Tupdate.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' Several values are chosen for this parameter, in the range from some minutes to a few hours.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' Two separate periods were set for the traffic flow between NTX and NRX, that is, Tapp = 30 s and Tapp = 5 s.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' The former value mimics a reasonable generation period for sensors located in leaf nodes.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' Instead, the latter value (i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=', Tapp = 5 s) models the links between nodes near the root, in which the aggregation of the traffic generated from the lower layers of the topology increases the amount of cells that are actually used for transmission.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' Selecting periodic transmission patterns does not limit in any way the validity of the proposed method.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' Table I compares network behavior for different values of Tupdate (and Tapp) with respect to the case when CONSIP is disabled.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' Comparison with conventional TSCH operation (i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=', when CONSIP is disabled) is quite relevant, because it permits to statistically detect possible drawbacks of this method.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' We did not find in the scientific literature any methods similar to CONSIP to perform a meaningful comparison.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' Starting from Tupdate and Tapp, the number of samples for each channel that can be exploited to compute νn is #ν = Tupdate·60 Tapp·16 (the update time is expressed in minutes).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' This value just provides an indication about the amount of new information that can be exploited, on average, by a black/white listing algorithm to compute νn.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' However, it is not related to the way this computation is actually performed, and not even to the quality of the channel.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' More important, it is not relevant to CONSIP.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' The value of #ν is reported in the related column of the table.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' When Tapp = 30 s, in order to have at least one sample per channel on every update of the hopping function (that is, #ν ≥ 1) the update period Tupdate must be set to a value greater than 8 min.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' Regarding NTX, all the energy related to communication is spent for data transmission.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' The reason why P NTX tx/tot is inversely proportional to Tupdate is that, every time a ν- exchange is triggered, the size of the packet to be transmitted is increased by LIE bytes.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' Regarding power consumption on NRX, there is a sensible increase in the energy P NRX listen that is wasted because of idle listening.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' This is due to the fact that when NRX is in the double listening state, it enables its receiving interface in both cell Ccurr and Cback, but one of the two cells remains unused because the sender node NTX transmits only in one cell, either Ccurr or Cback.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' In particular, the growth in both the total power consumption Ptot and the power consumption on NRX that is observed when CONSIP is employed mostly depends on the increase of Plisten, i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=', to the higher amount of idle listening because of the aforementioned double listening.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' Analyzing the case Tapp = 30 s, when #ν ≃ 1 a new νn can be obtained exploiting, on average, about one additional sample for each channel.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' This can be likely considered a worst condition from the point of view of energy, and the relative increase of the total power consumption (Ptot) is equal to +5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='80 %, which is a reasonable value for many application contexts.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' When the ν-exchange is performed at a slower pace (i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=', every Tupdate = 30 min and 60 min, which means #ν = 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='75 and #ν = 7.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='5) the relative increase in TABLE I POWER CONSUMPTION AND LATENCY VS.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' DIFFERENT EXCHANGE PERIODS OF ν.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' Power consumption Latency Listing Tupdate #ν P NTX tx/tot P NRX rx P NRX listen P NRX tot Ptot µd σd dp99 dp99.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='9 dmax [min] [µW] [µW] [µW] [%] [s] Disabled 8.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='622 9.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='823 62.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='596 72.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='419 81.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='041 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='311 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='006 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='900 7.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='200 9.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='460 Enabled Tapp = 30 s 7.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='5 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='94 8.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='711 9.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='880 67.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='151 77.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='031 85.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='742 +5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='80% 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='311 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='006 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='900 7.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='200 9.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='480 15 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='88 8.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='667 9.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='851 64.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='873 74.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='725 83.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='391 +2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='90% 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='311 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='006 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='900 7.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='200 9.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='460 30 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='75 8.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='645 9.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='837 63.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='735 73.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='572 82.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='216 +1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='45% 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='311 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='006 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='900 7.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='200 9.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='440 60 7.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='5 8.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='633 9.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='830 63.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='166 72.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='995 81.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='629 +0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='73% 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='311 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='006 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='900 7.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='220 9.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='480 120 15 8.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='628 9.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='826 62.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='881 72.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='707 81.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='335 +0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='36% 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='311 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='006 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='900 7.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='200 9.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='460 240 30 8.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='625 9.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='824 62.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='739 72.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='563 81.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='188 +0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='18% 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='311 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='006 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='900 7.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='220 9.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='480 Disabled 51.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='732 58.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='932 33.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='995 92.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='927 144.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='659 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='384 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='091 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='340 7.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='880 21.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='660 Enabled Tapp = 5 s 7.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='5 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='63 51.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='820 58.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='990 34.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='748 93.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='737 145.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='557 +0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='621% 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='383 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='090 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='340 7.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='880 20.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='640 15 11.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='25 51.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='776 58.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='961 34.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='371 93.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='332 145.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='108 +0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='311% 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='383 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='091 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='340 7.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='880 21.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='660 30 22.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='5 51.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='754 58.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='946 34.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='183 93.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='130 144.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='883 +0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='155% 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='384 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='091 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='360 7.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='880 21.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='660 60 45 51.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='743 58.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='939 34.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='089 93.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='028 144.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='771 +0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='078% 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='384 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='091 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='340 7.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='880 20.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='640 120 90 51.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='737 58.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='936 34.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='042 92.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='978 144.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='715 +0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='039% 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='384 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='091 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='340 7.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='880 21.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='660 240 180 51.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='734 58.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='934 34.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='019 92.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='952 144.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='687 +0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='019% 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='384 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='091 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='360 7.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='880 21.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='660 terms of total power consumption is almost negligible and equal to +1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='45 % and +0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='73 %, respectively.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' This confirms that the main drawback of CONSIP is not the additional energy consumption, but the need to allocate twice as much the number of cells for each link if compared with a scheduling strategy without CONSIP.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' The results with Tapp = 5 s, in which case the maximum relative increase in the total power consumption is only +0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='621 %, further corroborate this conclusion.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' However, this limitation is typically problematic only for a small subset of network topologies, characterized by a larger number of nodes and a high density.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' The last set of columns in Table I reports some performance indicators related to latency.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' They show that the influence of CONSIP on latency is irrelevant.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' The only statistical indices that are not the same for all the experimental conditions are percentiles (dp99.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='9 for Tapp = 30 s, and dp99 for Tapp = 5 s) and the maximum value (dmax), but they are anyway very similar.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' This behaviour is somehow expected, since high-order percentiles and the maximum converge to their real values much more slowly than other statistical indices such as the mean value and lower-order percentiles.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' TABLE II POWER CONSUMPTION WITH Tapp = 30 s AND T update = 30 min VS.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' DIFFERENT SIZES OF ν.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' LIEp P NTX tx/tot P NRX rx P NRX listen P NRX tot Ptot [B] [µW] [µW] [µW] [%] 16 8.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='645 9.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='837 63.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='735 73.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='572 82.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='216 +1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='450% 14 8.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='642 9.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='835 63.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='735 73.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='570 82.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='212 +1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='445% 12 8.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='639 9.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='833 63.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='735 73.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='568 82.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='207 +1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='439% 10 8.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='636 9.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='832 63.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='735 73.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='567 82.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='203 +1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='433% 8 8.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='633 9.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='830 63.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='735 73.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='565 82.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='198 +1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='428% Table II shows the results of another experimental campaign aimed at analyzing the effect on power consumption of the size LIEp of the encoding of ν.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' The values Tapp = 30 s and Tupdate = 30 min are representative of typical operating conditions, and therefore they have been left unmodified.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' As highlighted in the rightmost columns of the result table, the relative increase of Ptot ranges from +1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='428 % (when LIEp = 8 B) to +1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='450 % (when LIEp = 16 B), which means that advanced optimizations on the way ν is encoded, that lead to a further reduction of LIEp, only lead to insignificant improvements from the point of view of energy consumption.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' However, its reduction is important because it permits to increase the room available for the payload in the frame.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' An additional experimental campaign was carried out, again with Tapp = 30 s and Tupdate = 30 min, to analyze the effect of the placement of the two cells, Ccurr and Cback.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' Two cases were considered, where the cells were equally spaced (in the slot offsets 1 and 51, respectively) and contiguous (in the slot offsets 1 and 2, respectively).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' As expected, we verified that these is no influence on power consumption, and the influence on latency was irrelevant.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' For instance, the average latency was the same in the two cases, while standard deviation passes from σd = 1005.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='81 ms in the case of equally spaced cells to σd = 1006.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='07 ms in the case of contiguous cells.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' Update latency Another important performance indicator is the time to complete a ν-exchange.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' In fact, at the end of the whole process, when NRX returns in the steady state, only one of the two cells is effectively used to transmit, and from that point on the system behaves as standard TSCH, with the only exception that Cback remains reserved for future exchanges, although not in use.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' Referring to Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' 3, to analyze timings four points in time were identified, in correspondence to the main events that �� �� �� �� �� �� �� 1j �� 2j �� �� 3i �� 4i 4j 5i 5j �� ℱ�� 2i 1i ℱ �� 3j ℱ �� ��� ��� �� ℱ�� t ��� ��� ��� �� Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' Main temporal events involved in a ν-exchange in CONSIP.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' make up a ν-exchange.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' Timestamps on these specific events are acquired with the resolution of the ASN (one slot time), which in this experimental campaign corresponds to 20 ms.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' In particular, they are: 1) tUR (update request) is the time when a ν-exchange is started.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' 2) tDL (double listening) represents the time when a new hopping function νn is received by NRX.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' At this time the receiver enters the double listening state, in which it hears from both cells Ccurr and Cback.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' 3) tSW (swap) is the time when NTX starts transmitting using the new hopping function νn.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' 4) tE (end) is the time when NRX starts receiving only using the new hopping function νn, consequently exit- ing the double listening state.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' This ends the whole ν- exchange process.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' Starting from these four timestamps, we analyzed three main kinds of latency, namely: dSW = tSW − tUR (swap latency) is the time elapsing from the beginning of a ν-exchange to the time when the new hopping function νn is actually used to transmit data from NTX to NRX.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' dDL = tE − tDL (double listening latency) is the time interval for which NRX remains in the double listening state.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' This interval is characterized by a higher amount of energy consumption.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' dtot = tE − tUR (total latency) is the time needed to complete the whole ν-exchange process, starting from the request and up to the update of the hopping function.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' A further experiment was carried out where Tapp = 30 s and Tupdate = 30 min.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' The main statistic indicators we obtained for the above latencies are reported in Table III.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' Regarding the swap latency dSW, its average is 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='491 s.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' This value can be explained by analyzing the plot of the Probability Density Function (PDF) in Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' The plot shows a step function, and TABLE III LATENCY RELATED TO A ν-EXCHANGE IN CONSIP.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' Latency µd σd dmin dp99 dp99.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='9 dmax [s] dSW = tSW − tUR 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='491 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='256 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='0 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='880 9.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='080 14.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='100 dDL = tE − tDL 30.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='005 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='511 19.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='180 33.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='340 35.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='360 41.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='420 dtot = tE − tUR 31.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='294 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='009 30.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='000 34.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='900 37.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='200 41.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='660 0 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='1 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='2 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='3 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='4 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='5 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='6 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='7 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='8 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='9 1 0 2 4 6 8 10 dSW [s] PDF CDF Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' PDF and CDF of dSW.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' the width of each step is equal to 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='02 s, which corresponds to the slotframe duration.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' Within each step, latency is uniformly distributed because periods at the application layer (Tupdate = 30 min) and at the MAC layer (that is, the repetition period of a cell in the slotframe, equal to 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='02 s) are prime numbers and the two processes can be treated as they were independent.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' The first (and higher) step is related to the frames that arrived to NRX after exactly one transmission attempt, the second step refers to frames transmitted twice, and so on.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' The same plot also reports the Cumulative Distribution Function (CDF) of the swap latency dSW, which can be used to determine the expected number of ν-exchange that experienced a swap latency smaller than a given value.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' For the same quantity dSW, the maximum latency is dmax = 14.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='100 s, which refers to a frame that was transmitted 7 times (i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=', ⌈ dmax 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='02 ⌉) before reaching the destination.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' Regarding the double listening latency dDL, its average value is about 30 s, which is equal to Tapp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' This is unsur- prising, because only when a frame is transmitted in Cback (see arc {5} of the NRX state machine in Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' 2), the new hopping function νn is definitely activated, and the double listening phase ends.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' Since packets are generated cyclically with period Tapp = 30 s, excluding retransmissions, this frame typically arrives 30 s after the frame containing νn.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' This is one of the drawbacks of CONSIP: in other words, the dDL interval, in which a considerable amount of energy is wasted due to idle listening because both cells are active, depends on the link usage.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' However, in those links that experience higher traffic, that typically correspond to the levels in the tree network topology closest to the root node, where black listing techniques are more important to reduce the overall number of retransmissions, the interval between two successive packets is usually shorter than in the links close to the leaf nodes.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' An important property is that, at least two frames are need to perform the whole ν-exchange.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' This is confirmed by the minimum value reported in the row of the table that refers to the total latency dtot.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' VI.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' CONCLUSIONS In the context of black/white listing techniques, a crucial point is how to spread the information about the channels to be used for the transmission between nodes.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' When the hopping sequence is defined on a per-link basis, only the two end points are involved.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' In the case of inconsistency, communication in the network can be prevented, with possible definitive disconnections of subsets of nodes.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' The CONSIP technique was proposed to counteract this problem by means of a backup cell.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' Each time a modification is triggered about the channels to be used for transmission over the link connecting two nodes, for a limited period of time both cells are exploited for communication.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' Doing so guarantees that the information seen by the two involved nodes is always updated in a coherent way, irrespective of the number of trans- mission errors that affected either data or acknowledgement frames.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' The experimental analysis of CONSIP, performed by means of a simulator that was configured with data derived from a real setup, highlights its effectiveness.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' In particular, CONSIP does not affect communication latency, and has a small impact on energy consumption.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' Its main drawback is the need to reserve a backup cell per link, which can limit the number of nodes in dense networks.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' Future works include improvements related to the CONSIP technique, which are aimed for instance to reduce energy consumption further, or to lower the number of backup cells that need to be reserved by the protocol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' Future directions include the usage of CONSIP in the implementation of a black/white listing technique.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' REFERENCES [1] T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' Zheng, M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' Ardolino, A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' Bacchetti, and M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' Perona, “The applications of Industry 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='0 technologies in manufacturing context: a systematic literature review,” International Journal of Production Research, vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' 59, no.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' 6, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' 1922–1954, 2021.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' [2] H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' Ca˜nas, J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' Mula, M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' D´ıaz-Madro˜nero, and F.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' Campuzano-Bolar´ın, “Implementing Industry 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='0 principles,” Computers and Industrial En- gineering, vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' 158, p.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' 107379, 2021.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' [3] S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' Scanzio, L.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' Wisniewski, and P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' Gaj, “Heterogeneous and dependable networks in industry – A survey,” Computers in Industry, vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' 125, p.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' 103388, 2021.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' [4] P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' K.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' Malik, R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' Sharma, R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' Singh, A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' Gehlot, S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' Satapathy, W.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' Alnumay, D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' Pelusi, U.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' Ghosh, and J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' Nayak, “Industrial Internet of Things and its Applications in Industry 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='0: State of The Art,” Computer Communications, vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' 166, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' 125–139, 2021.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' [5] W.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' Mao, Z.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' Zhao, Z.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' Chang, G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' Min, and W.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' Gao, “Energy-Efficient Industrial Internet of Things: Overview and Open Issues,” IEEE Trans.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' Ind.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' Informat.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=', vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' 17, no.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' 11, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' 7225–7237, 2021.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' [6] E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' Sisinni, A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' Saifullah, S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' Han, U.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' Jennehag, and M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' Gidlund, “In- dustrial Internet of Things: Challenges, Opportunities, and Directions,” IEEE Trans.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' Ind.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' Informat.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=', vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' 14, no.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' 11, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' 4724–4734, 2018.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' [7] “IEEE Standard for Low-Rate Wireless Networks,” IEEE Std 802.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='15.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='4- 2020 (Revision of IEEE Std 802.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='15.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='4-2015), pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' 1–800, 2020.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' [8] T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' Watteyne, A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' Mehta, and K.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' Pister, “Reliability through Frequency Diversity: Why Channel Hopping Makes Sense,” in Proceedings of the 6th ACM Symposium on Performance Evaluation of Wireless Ad Hoc, Sensor, and Ubiquitous Networks, ser.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' PE-WASUN ’09.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' Association for Computing Machinery, 2009, p.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' 116–123.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' [9] G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' Chen, X.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' Cao, and J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' Jin, “Joint Scheduling and Channel Allocation for Kalman Filtering Over Multihop WirelessHART Networks,” IEEE Trans.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' Ind.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' Informat.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=', vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' 17, no.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' 5, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' 3555–3565, 2021.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' [10] R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' Rond´on, A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' Mahmood, S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' Grimaldi, and M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' Gidlund, “Understanding the Performance of Bluetooth Mesh: Reliability, Delay, and Scalability Analysis,” IEEE Internet of Things J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=', vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' 7, no.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' 3, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' 2089–2101, 2020.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' [11] G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' Cena, C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' Demartini, M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' Ghazi Vakili, S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' Scanzio, A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' Valen- zano, and C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' Zunino, “Evaluating and Modeling IEEE 802.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='15.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='4 TSCH Resilience against Wi-Fi Interference in New-Generation Highly- Dependable Wireless Sensor Networks,” Ad Hoc Networks, vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' 106, p.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' 102199, 2020.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' [12] S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' Scanzio, M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' Vakili, G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' Cena, C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' Demartini, B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' Montrucchio, A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' Valenzano, and C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' Zunino, “Wireless Sensor Networks and TSCH: A Compromise Between Reliability, Power Consumption, and Latency,” IEEE Access, vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' 8, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' 167 042–167 058, 2020.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' [13] S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' Zoppi, H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' G¨ursu, M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' Vilgelm, and W.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' Kellerer, “Reliable hopping sequence design for highly interfered wireless sensor networks,” in 2017 IEEE International Symposium on Local and Metropolitan Area Networks (LANMAN), 2017, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' 1–7.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' [14] V.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' Kotsiou, G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' Z.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' Papadopoulos, D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' Zorbas, P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' Chatzimisios, Theoleyre, and Fabrice, “Blacklisting-Based Channel Hopping Approaches in Low- Power and Lossy Networks,” IEEE Communications Magazine, vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' 57, no.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' 2, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' 48–53, 2019.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' [15] V.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' Kotsiou, G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' Z.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' Papadopoulos, P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' Chatzimisios, and F.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' Theoleyre, “Whitelisting Without Collisions for Centralized Scheduling in Wireless Industrial Networks,” IEEE Internet of Things J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=', vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' 6, no.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' 3, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' 5713– 5721, 2019.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' [16] V.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' Kotsiou, G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' Z.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' Papadopoulos, P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' Chatzimisios, and F.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' Tholeyre, “Is local blacklisting relevant in slow channel hopping low-power wireless networks?”' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' in 2017 IEEE International Conference on Communications (ICC), 2017, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' 1–6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' [17] R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' Tavakoli, M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' Nabi, T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' Basten, and K.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' Goossens, “Enhanced Time- Slotted Channel Hopping in WSNs Using Non-intrusive Channel- Quality Estimation,” in 2015 IEEE 12th International Conference on Mobile Ad Hoc and Sensor Systems, 2015, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' 217–225.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' [18] D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' Queiroz, R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' Gomes, I.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' Fonseca, M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' Alencar, and C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' Benavente- Peces, “Channel assignment in TSCH-based wireless sensor networks using fuzzy logic,” Journal of Ambient Intelligence and Humanized Computing, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' 1–20, 1 2021.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' [19] S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' Scanzio, F.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' Xia, G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' Cena, and A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' Valenzano, “Predicting Wi-Fi link quality through artificial neural networks,” Internet Technology Letters, p.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' e326.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' [20] V.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' Kotsiou, G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' Z.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' Papadopoulos, P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' Chatzimisios, and F.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' Theoleyre, “LABeL: Link-Based Adaptive BLacklisting Technique for 6TiSCH Wireless Industrial Networks,” in Proceedings of the 20th ACM Inter- national Conference on Modelling, Analysis and Simulation of Wireless and Mobile Systems, ser.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' MSWiM ’17.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' Association for Computing Machinery, 2017, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' 25–33.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' [21] T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' Watteyne, S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' Lanzisera, A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' Mehta, and K.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' Pister, “Mitigating Multipath Fading through Channel Hopping in Wireless Sensor Net- works,” in 2010 IEEE International Conference on Communications (ICC), 2010, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' 1–5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' [22] P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' Gomes, T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' Watteyne, and B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' Krishnamachari, “MABO-TSCH: Multihop and blacklist-based optimized time synchronized channel hopping,” Transactions on Emerging Telecommunications Technologies, vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' 29, no.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' 7, p.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' e3223, 2018, e3223 ett.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content='3223.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' [23] G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' Cena, S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' Scanzio, and A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' Valenzano, “Ultra-Low Power Wireless Sensor Networks Based on Time Slotted Channel Hopping with Proba- bilistic Blacklisting,” Electronics, vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' 11, no.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' 3, 2022.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' [24] A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' Elsts, “TSCH-Sim: Scaling Up Simulations of TSCH and 6TiSCH Networks,” Sensors, vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' 20, no.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' 19, 2020.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' [25] E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' Municio, G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' Daneels, M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' Vuˇcini´c, S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' Latr´e, J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' Famaey, Y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' Tanaka, K.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' Brun, K.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' Muraoka, X.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' Vilajosana, and T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' Watteyne, “Simulat- ing 6TiSCH networks,” Transactions on Emerging Telecommunications Technologies, vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' 30, no.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' 3, p.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' e3494, 2019.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' [26] S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' Scanzio, G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' Cena, A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' Valenzano, and C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' Zunino, “Energy Saving in TSCH Networks by Means of Proactive Reduction of Idle Listening,” in Ad-Hoc, Mobile, and Wireless Networks, L.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' Grieco, G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' Boggia, G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' Piro, Y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' Jararweh, and C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' Campolo, Eds.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' Cham: Springer Interna- tional Publishing, 2020, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' 131–144.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' [27] S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' Scanzio, G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' Cena, L.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' Seno, and A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' Valenzano, “Robustness and optimization of pril techniques for energy saving in tsch networks,” in 26th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA), 2021, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' 1–8.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' [28] G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' Cena, S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' Scanzio, and A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' Valenzano, “Enabling Listening Suspension in the Time Slotted Channel Hopping Protocol,” in 17th IEEE Interna- tional Conference on Factory Communication Systems (WFCS), 2021, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'} +page_content=' 19–26.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/AdAyT4oBgHgl3EQfRvcW/content/2301.00070v1.pdf'}