{"id":"https://openalex.org/W2786888648","doi":"https://doi.org/10.1109/pimrc.2017.8292201","title":"Token bucket based traffic shaping and monitoring for WLAN-based control systems","display_name":"Token bucket based traffic shaping and monitoring for WLAN-based control systems","publication_year":2017,"publication_date":"2017-10-01","ids":{"openalex":"https://openalex.org/W2786888648","doi":"https://doi.org/10.1109/pimrc.2017.8292201","mag":"2786888648"},"language":"en","primary_location":{"id":"doi:10.1109/pimrc.2017.8292201","is_oa":false,"landing_page_url":"https://doi.org/10.1109/pimrc.2017.8292201","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 IEEE 28th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5069112008","display_name":"Kiran Mathews","orcid":null},"institutions":[{"id":"https://openalex.org/I153267046","display_name":"University of Kaiserslautern","ror":"https://ror.org/04zrf7b53","country_code":"DE","type":"education","lineage":["https://openalex.org/I153267046"]}],"countries":["DE"],"is_corresponding":true,"raw_author_name":"Kiran Mathews","raw_affiliation_strings":["Networked Systems Group, University of Kaiserslautern, Germany"],"affiliations":[{"raw_affiliation_string":"Networked Systems Group, University of Kaiserslautern, Germany","institution_ids":["https://openalex.org/I153267046"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5110273113","display_name":"Christopher L. Kramer","orcid":null},"institutions":[{"id":"https://openalex.org/I153267046","display_name":"University of Kaiserslautern","ror":"https://ror.org/04zrf7b53","country_code":"DE","type":"education","lineage":["https://openalex.org/I153267046"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Christopher Kramer","raw_affiliation_strings":["Networked Systems Group, University of Kaiserslautern, Germany"],"affiliations":[{"raw_affiliation_string":"Networked Systems Group, University of Kaiserslautern, Germany","institution_ids":["https://openalex.org/I153267046"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5072346732","display_name":"Reinhard Gotzhein","orcid":null},"institutions":[{"id":"https://openalex.org/I153267046","display_name":"University of Kaiserslautern","ror":"https://ror.org/04zrf7b53","country_code":"DE","type":"education","lineage":["https://openalex.org/I153267046"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Reinhard Gotzhein","raw_affiliation_strings":["Networked Systems Group, University of Kaiserslautern, Germany"],"affiliations":[{"raw_affiliation_string":"Networked Systems Group, University of Kaiserslautern, Germany","institution_ids":["https://openalex.org/I153267046"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5069112008"],"corresponding_institution_ids":["https://openalex.org/I153267046"],"apc_list":null,"apc_paid":null,"fwci":0.7167,"has_fulltext":false,"cited_by_count":10,"citation_normalized_percentile":{"value":0.74299403,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"7"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11409","display_name":"Advanced Wireless Network Optimization","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11409","display_name":"Advanced Wireless Network Optimization","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11158","display_name":"Wireless Networks and Protocols","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10246","display_name":"Mobile Ad Hoc Networks","score":0.9976999759674072,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7995573282241821},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.6962514519691467},{"id":"https://openalex.org/keywords/token-bucket","display_name":"Token bucket","score":0.6678831577301025},{"id":"https://openalex.org/keywords/frame","display_name":"Frame (networking)","score":0.6001940965652466},{"id":"https://openalex.org/keywords/security-token","display_name":"Security token","score":0.5906631946563721},{"id":"https://openalex.org/keywords/token-passing","display_name":"Token passing","score":0.5413655042648315},{"id":"https://openalex.org/keywords/bandwidth","display_name":"Bandwidth (computing)","score":0.4981575012207031},{"id":"https://openalex.org/keywords/leaky-bucket","display_name":"Leaky bucket","score":0.4701191186904907},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.4681086242198944},{"id":"https://openalex.org/keywords/latency","display_name":"Latency (audio)","score":0.45509621500968933},{"id":"https://openalex.org/keywords/automation","display_name":"Automation","score":0.4432007670402527},{"id":"https://openalex.org/keywords/traffic-shaping","display_name":"Traffic shaping","score":0.42974787950515747},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.42449167370796204},{"id":"https://openalex.org/keywords/bandwidth-allocation","display_name":"Bandwidth allocation","score":0.4195736348628998},{"id":"https://openalex.org/keywords/network-traffic-control","display_name":"Network traffic control","score":0.33774662017822266},{"id":"https://openalex.org/keywords/quality-of-service","display_name":"Quality of service","score":0.19554337859153748},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.17865872383117676},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.1672516167163849},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.16289955377578735}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7995573282241821},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.6962514519691467},{"id":"https://openalex.org/C135135165","wikidata":"https://www.wikidata.org/wiki/Q386456","display_name":"Token bucket","level":3,"score":0.6678831577301025},{"id":"https://openalex.org/C126042441","wikidata":"https://www.wikidata.org/wiki/Q1324888","display_name":"Frame (networking)","level":2,"score":0.6001940965652466},{"id":"https://openalex.org/C48145219","wikidata":"https://www.wikidata.org/wiki/Q1335365","display_name":"Security token","level":2,"score":0.5906631946563721},{"id":"https://openalex.org/C115067241","wikidata":"https://www.wikidata.org/wiki/Q1639854","display_name":"Token passing","level":3,"score":0.5413655042648315},{"id":"https://openalex.org/C2776257435","wikidata":"https://www.wikidata.org/wiki/Q1576430","display_name":"Bandwidth (computing)","level":2,"score":0.4981575012207031},{"id":"https://openalex.org/C164916973","wikidata":"https://www.wikidata.org/wiki/Q1378386","display_name":"Leaky bucket","level":3,"score":0.4701191186904907},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.4681086242198944},{"id":"https://openalex.org/C82876162","wikidata":"https://www.wikidata.org/wiki/Q17096504","display_name":"Latency (audio)","level":2,"score":0.45509621500968933},{"id":"https://openalex.org/C115901376","wikidata":"https://www.wikidata.org/wiki/Q184199","display_name":"Automation","level":2,"score":0.4432007670402527},{"id":"https://openalex.org/C46451311","wikidata":"https://www.wikidata.org/wiki/Q262550","display_name":"Traffic shaping","level":4,"score":0.42974787950515747},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.42449167370796204},{"id":"https://openalex.org/C200157131","wikidata":"https://www.wikidata.org/wiki/Q4854763","display_name":"Bandwidth allocation","level":3,"score":0.4195736348628998},{"id":"https://openalex.org/C201100257","wikidata":"https://www.wikidata.org/wiki/Q393287","display_name":"Network traffic control","level":3,"score":0.33774662017822266},{"id":"https://openalex.org/C5119721","wikidata":"https://www.wikidata.org/wiki/Q220501","display_name":"Quality of service","level":2,"score":0.19554337859153748},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.17865872383117676},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.1672516167163849},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.16289955377578735},{"id":"https://openalex.org/C78519656","wikidata":"https://www.wikidata.org/wiki/Q101333","display_name":"Mechanical engineering","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/pimrc.2017.8292201","is_oa":false,"landing_page_url":"https://doi.org/10.1109/pimrc.2017.8292201","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 IEEE 28th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","score":0.5899999737739563,"id":"https://metadata.un.org/sdg/9"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":12,"referenced_works":["https://openalex.org/W2051912371","https://openalex.org/W2053639795","https://openalex.org/W2058537777","https://openalex.org/W2102482985","https://openalex.org/W2104569697","https://openalex.org/W2110656373","https://openalex.org/W2116072286","https://openalex.org/W2169831918","https://openalex.org/W2205522386","https://openalex.org/W4236195637","https://openalex.org/W6680548798","https://openalex.org/W6684753904"],"related_works":["https://openalex.org/W2104399028","https://openalex.org/W2656764575","https://openalex.org/W3053061680","https://openalex.org/W2913939664","https://openalex.org/W3155762062","https://openalex.org/W3023358735","https://openalex.org/W1491889041","https://openalex.org/W4288018299","https://openalex.org/W2108877488","https://openalex.org/W2366262540"],"abstract_inverted_index":{"In":[0,45,76],"industrial":[1],"automation,":[2],"there":[3],"is":[4,34,90],"strong":[5],"interest":[6],"in":[7,16,70],"using":[8],"wireless":[9],"technologies":[10],"to":[11,18,72,99,121],"run":[12],"production":[13],"environments,":[14],"and":[15,42,64,80,116],"particular":[17],"build":[19],"networked":[20],"control":[21,29],"systems.":[22],"To":[23],"operate":[24],"such":[25],"networks":[26],"effectively,":[27],"sufficient":[28],"over":[30],"the":[31,60,93],"communication":[32],"system":[33],"needed,":[35],"regarding,":[36],"e.g.,":[37],"bandwidth":[38,87],"usage,":[39],"frame":[40,43],"latency,":[41],"loss.":[44],"this":[46],"paper,":[47],"we":[48,78],"present":[49],"an":[50,65],"approach":[51,66],"for":[52,67],"traffic":[53,68],"shaping":[54],"that":[55],"applies":[56],"a":[57,82,110],"variant":[58],"of":[59,95],"token":[61],"bucket":[62],"algorithm,":[63],"monitoring":[69],"order":[71],"determine":[73],"network":[74,101],"overload.":[75],"particular,":[77],"introduce":[79],"apply":[81],"metric":[83],"called":[84],"unusable":[85,96],"wasted":[86,97],"ratio,":[88],"which":[89],"derived":[91],"from":[92],"number":[94],"tokens":[98],"detect":[100],"overload":[102],"locally.":[103],"We":[104],"have":[105,117],"implemented":[106],"both":[107],"approaches":[108],"on":[109],"commercial":[111],"platform":[112],"with":[113],"WLAN":[114],"adapters,":[115],"conducted":[118],"real":[119],"experiments":[120],"assess":[122],"their":[123],"performance.":[124]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":2},{"year":2019,"cited_by_count":2},{"year":2018,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
