{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,3]],"date-time":"2025-10-03T12:47:18Z","timestamp":1759495638546,"version":"3.41.0"},"reference-count":39,"publisher":"Association for Computing Machinery (ACM)","issue":"2","license":[{"start":{"date-parts":[[2010,8,1]],"date-time":"2010-08-01T00:00:00Z","timestamp":1280620800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100001871","name":"Funda\u00e7\u00e3o para a Ci\u00eancia e a Tecnologia","doi-asserted-by":"publisher","award":["FCT UI 608"],"award-info":[{"award-number":["FCT UI 608"]}],"id":[{"id":"10.13039\/501100001871","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001823","name":"Ministry of Education, Youth and Sports","doi-asserted-by":"publisher","award":["ME10039"],"award-info":[{"award-number":["ME10039"]}],"id":[{"id":"10.13039\/501100001823","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Sen. Netw."],"published-print":{"date-parts":[[2010,8]]},"abstract":"<jats:p>Modeling the fundamental performance limits of Wireless Sensor Networks (WSNs) is of paramount importance to understand their behavior under the worst-case conditions and to make the appropriate design choices. This is particular relevant for time-sensitive WSN applications, where the timing behavior of the network protocols (message transmission must respect deadlines) impacts on the correct operation of these applications. In that direction this article contributes with a methodology based on Network Calculus, which enables quick and efficient worst-case dimensioning of static or even dynamically changing cluster-tree WSNs where the data sink can either be static or mobile. We propose closed-form recurrent expressions for computing the worst-case end-to-end delays, buffering and bandwidth requirements across any source-destination path in a cluster-tree WSN. We show how to apply our methodology to the case of IEEE 802.15.4\/ZigBee cluster-tree WSNs. Finally, we demonstrate the validity and analyze the accuracy of our methodology through a comprehensive experimental study using commercially available technology, namely TelosB motes running TinyOS.<\/jats:p>","DOI":"10.1145\/1824766.1824770","type":"journal-article","created":{"date-parts":[[2010,9,14]],"date-time":"2010-09-14T14:53:08Z","timestamp":1284475988000},"page":"1-47","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":31,"title":["Dimensioning and worst-case analysis of cluster-tree sensor networks"],"prefix":"10.1145","volume":"7","author":[{"given":"Petr","family":"Jurcik","sequence":"first","affiliation":[{"name":"CISTER-ISEP, Polytechnic Institute of Porto, Portugal and DCE-FEE, Czech Technical University in Prague"}]},{"given":"Anis","family":"Koub\u00e2a","sequence":"additional","affiliation":[{"name":"CISTER-ISEP, Polytechnic Institute of Porto, Portugal and Al-Imam Muhammad Ibn Saud University, Saudi Arabia"}]},{"given":"Ricardo","family":"Severino","sequence":"additional","affiliation":[{"name":"CISTER-ISEP, Polytechnic Institute of Porto, Portugal"}]},{"given":"M\u00e1rio","family":"Alves","sequence":"additional","affiliation":[{"name":"CISTER-ISEP, Polytechnic Institute of Porto, Portugal"}]},{"given":"Eduardo","family":"Tovar","sequence":"additional","affiliation":[{"name":"CISTER-ISEP, Polytechnic Institute of Porto, Portugal"}]}],"member":"320","published-online":{"date-parts":[[2010,9,8]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/REAL.2004.37"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2003.5341334"},{"key":"e_1_2_1_3_1","series-title":"Lecture Notes in Computer Science","volume-title":"Network Calculus: A Theory of Deterministic Queuing Systems for the Internet","author":"Boudec J. L.","year":"2004"},{"volume-title":"Proceedings of the 23rd IEEE Real-Time Systems Symposium (RTSS). IEEE Computer Society Press","author":"Caccamo M.","key":"e_1_2_1_4_1"},{"volume-title":"Proceedings of the 14th IEEE International Workshop on Quality of Service (IWQoS). IEEE Computer Society Press","author":"Chipara O.","key":"e_1_2_1_5_1"},{"key":"e_1_2_1_6_1","unstructured":"Chipcon. 2008. C2420DK development kit datasheet. http:\/\/www.ti.com.  Chipcon. 2008. C2420DK development kit datasheet. http:\/\/www.ti.com."},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1274858.1274866"},{"key":"e_1_2_1_8_1","unstructured":"Crossbow. 2008. TelosB mote datasheet. http:\/\/www.xbow.com.  Crossbow. 2008. TelosB mote datasheet. http:\/\/www.xbow.com."},{"volume-title":"Proceedings of the 4th IEEE International Conference on Mobile Ad-hoc and Sensor Systems (MASS). IEEE Computer Society Press","author":"Cunha A.","key":"e_1_2_1_9_1"},{"volume-title":"Proceedings of the 8th Portuguese Conference on Automatic Control (CONTROLO). 911--916","author":"Cunha A.","key":"e_1_2_1_10_1"},{"key":"e_1_2_1_11_1","unstructured":"Daintree Networks. 2008. Daintree sensor network analyzer (SNA). http:\/\/www.daintree.net.  Daintree Networks. 2008. Daintree sensor network analyzer (SNA). http:\/\/www.daintree.net."},{"volume-title":"Graph Theory","author":"Diestel R.","key":"e_1_2_1_12_1"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/REAL.2004.46"},{"volume-title":"Proceedings of the 46th IEEE Global Communications Conf. (GLOBECOM). IEEE Computer Society Press","author":"Gandham S.","key":"e_1_2_1_14_1"},{"volume-title":"Proceedings of the 50th IEEE Global Communications Conf. (GLOBECOM). IEEE Computer Society Press","author":"Gibson J.","key":"e_1_2_1_15_1"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2005.116"},{"key":"e_1_2_1_17_1","unstructured":"Hu Z. and Li B. 2004. Ad Hoc and Sensor Networks. Y. Xian and Y. Pan Eds. Nova Science Publishers New York. To appear.  Hu Z. and Li B. 2004. Ad Hoc and Sensor Networks. Y. Xian and Y. Pan Eds. Nova Science Publishers New York. To appear."},{"volume-title":"Part 15.4: Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications for Low-Rate Wireless Personal Area Networks (LR-WPANs)","key":"e_1_2_1_18_1"},{"key":"e_1_2_1_19_1","unstructured":"In-Stat. 2009. Automatic Meter Reading (AMR) and smart energy to be the winning application for 802.15.4\/ZigBee. http:\/\/www.instat.com\/.  In-Stat. 2009. Automatic Meter Reading (AMR) and smart energy to be the winning application for 802.15.4\/ZigBee. http:\/\/www.instat.com\/."},{"key":"e_1_2_1_20_1","unstructured":"Jurcik P. 2008. Matlab tool for the worst-case dimensioning of IEEE 802.15.4\/ZigBee cluster-tree WSNs. http:\/\/www.open-zb.net\/downloads.php.  Jurcik P. 2008. Matlab tool for the worst-case dimensioning of IEEE 802.15.4\/ZigBee cluster-tree WSNs. http:\/\/www.open-zb.net\/downloads.php."},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/RTCSA.2008.45"},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/RTSS.2006.29"},{"key":"e_1_2_1_23_1","doi-asserted-by":"crossref","unstructured":"Koubaa A. Alves M. and Tovar E. 2006b. Modeling and worst-case dimensioning of cluster-tree wireless sensor networks: proofs and computation details. Tech. rep. TR-060601 CISTER-ISEP Research Unit Porto Portugal.  Koubaa A. Alves M. and Tovar E. 2006b. Modeling and worst-case dimensioning of cluster-tree wireless sensor networks: proofs and computation details. Tech. rep. TR-060601 CISTER-ISEP Research Unit Porto Portugal.","DOI":"10.1109\/RTSS.2006.29"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11241-007-9038-x"},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/ECRTS.2007.82"},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1080\/00207540410001705211"},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2006.79"},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.peva.2005.10.003"},{"key":"e_1_2_1_29_1","unstructured":"Poe W. and Schmitt J. 2007. Minimizing the maximum delay in wireless sensor networks by intelligent sink placement. Tech. rep. 362\/07 University of Kaiserslautern Germany.  Poe W. and Schmitt J. 2007. Minimizing the maximum delay in wireless sensor networks by intelligent sink placement. Tech. rep. 362\/07 University of Kaiserslautern Germany."},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/ECRTS.2007.23"},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/1384609.1384618"},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1007\/11502593_13"},{"volume-title":"Proceedings of the 1st Workshop on Resource Allocation in Wireless NETworks (RAWNET). IEEE Computer Society Press","author":"Schmitt J.","key":"e_1_2_1_34_1"},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/RTSS.2007.5"},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2003.814620"},{"key":"e_1_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2005.386"},{"key":"e_1_2_1_38_1","unstructured":"TinyOS. 2008. TinyOS open-source OS for wireless embedded sensor networks. http:\/\/www.tinyos.net.  TinyOS. 2008. TinyOS open-source OS for wireless embedded sensor networks. http:\/\/www.tinyos.net."},{"volume-title":"Proceedings of the 12th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA). IEEE Computer Society Press","author":"Trdlicka J.","key":"e_1_2_1_39_1"},{"key":"e_1_2_1_40_1","unstructured":"ZigBee. 2005. ZigBee Specification Version 1.0. ZigBee Standards Organization.  ZigBee. 2005. ZigBee Specification Version 1.0. ZigBee Standards Organization."}],"container-title":["ACM Transactions on Sensor Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1824766.1824770","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1824766.1824770","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T11:39:53Z","timestamp":1750246793000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1824766.1824770"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,8]]},"references-count":39,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2010,8]]}},"alternative-id":["10.1145\/1824766.1824770"],"URL":"https:\/\/doi.org\/10.1145\/1824766.1824770","relation":{},"ISSN":["1550-4859","1550-4867"],"issn-type":[{"type":"print","value":"1550-4859"},{"type":"electronic","value":"1550-4867"}],"subject":[],"published":{"date-parts":[[2010,8]]},"assertion":[{"value":"2008-10-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2010-03-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2010-09-08","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}