Results 81 to 90 of about 6,711 (206)

On physically secure and stable slotted ALOHA system [PDF]

open access: yes2009 47th Annual Allerton Conference on Communication, Control, and Computing (Allerton), 2009
In this paper, we consider the standard discrete-time slotted ALOHA with a finite number of terminals with infinite size buffers. In our study, we jointly consider the stability of this system together with the physical layer security. We conduct our studies on both dominant and original systems, where in a dominant system each terminal always has a ...
Sarıkaya, Yunus, Erçetin, Özgür
openaire   +3 more sources

LoRaSync: Energy efficient synchronization for scalable LoRaWAN

open access: yesTransactions on Emerging Telecommunications Technologies, Volume 35, Issue 2, February 2024.
LoRaSync is an energy‐efficient synchronization mechanism designed to support the implementation of slotted medium access control protocols for LoRa networks. Its robust design is based on real clock drift measurements, and a synchronization beacon skipping strategy is used in order to save power on the end‐devices Abstract Low‐power wide‐area networks
Laurent Chasserat   +2 more
wiley   +1 more source

Guided-Aloha for Secondary Access With Spectrum Prediction

open access: yesIEEE Access
The demand for spectrum access continues to grow exponentially and dynamic spectrum access (DSA) is a candidate to alleviate issues with spectrum scarcity by adapting spectrum resources in real-time.
Sithamparanathan Kandeepan   +5 more
doaj   +1 more source

Modeling Slotted Aloha as a Stochastic Game with Random Discrete Power Selection Algorithms

open access: yesJournal of Computer Systems, Networks, and Communications, 2009
We consider the uplink case of a cellular system where 𝑚 bufferless mobiles transmit over a common channel to a base station, using the slotted aloha medium access protocol.
Rachid El-Azouzi   +3 more
doaj   +1 more source

Handshake mechanism selection in MANETs with directional antennas: A new evaluation view

open access: yesElectronics Letters, Volume 60, Issue 4, February 2024.
This letter theoretically derives the upper and lower bounds of neighbour discovery time of the network for both 1‐way and 2‐way. In order to better select the appropriate handshaking mechanism, a new evaluation parameter, the expected time for a node to complete mutual discovery with its neighbours, is proposed, which is shown to be approximately ...
Huiyuan Xu   +4 more
wiley   +1 more source

A decentralized scheduling algorithm for time synchronized channel hopping

open access: yesEAI Endorsed Transactions on Mobile Communications and Applications, 2011
Time Synchronized Channel Hopping (TSCH) is an existing Medium Access Control scheme which enables robust communication through channel hopping and high data rates through synchronization.
Andrew Tinka   +3 more
doaj   +1 more source

Network Coding Tree Algorithm for Multiple Access System

open access: yes, 2015
Network coding is famous for significantly improving the throughput of networks. The successful decoding of the network coded data relies on some side information of the original data.
Chen, Chen   +3 more
core   +1 more source

On the optimal configuration of framed slotted ALOHA [PDF]

open access: yesEURASIP Journal on Wireless Communications and Networking, 2016
The primary task of RFID readers is to identify multiple objects as quickly and reliably as possible with minimal power consumption and computation. One issue addressed in this study is the manner in which RFID systems adopting the framed slotted ALOHA (FSA) protocol should be configured so that the minimum identification delay can be achieved with a ...
openaire   +1 more source

Dissecting wireless body area networks routing protocols: Classification, comparative analysis, and research challenges

open access: yesInternational Journal of Communication Systems, Volume 37, Issue 1, 10 January 2024.
WBANs are applied in E‐Healthcare systems, extract the physiological parameters through the implanted (in‐body) and/or wearable(on‐body) sensors applied to the human body, and route them to the remote server in a systematized and well‐grounded manner.
Bhawna Narwal   +5 more
wiley   +1 more source

Energy Efficient Uplink MAC Protocol for M2M Devices

open access: yesIEEE Access, 2019
To enable connectivity between a massive number of devices on the Internet of Things (IoT) paradigm, machine-to-machine (M2M) communication is implied. The key feature of emerging and ad hoc networks, such as M2M communication, is a low-complexity medium
Anum Ali   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy