期刊文献+
共找到5篇文章
< 1 >
每页显示 20 50 100
Contention-Based Beaconless Real-Time Routing Protocol for Wireless Sensor Networks
1
作者 Chao Huang Guoli Wang 《Wireless Sensor Network》 2010年第7期528-537,共10页
This paper presents a novel real-time routing protocol, called CBRR, with less energy consumption for wireless sensor networks (WSNs). End-to-End real-time requirements are fulfilled with speed or delay constraint at ... This paper presents a novel real-time routing protocol, called CBRR, with less energy consumption for wireless sensor networks (WSNs). End-to-End real-time requirements are fulfilled with speed or delay constraint at each hop through integrating the contention and neighbor table mechanisms. More precisely, CBRR maintains a neighbor table via the contention mechanism being dependent on wireless broadcast instead of beacons. Comprehensive simulations show that CBRR can not only achieve higher performance in static networks, but also work well for dynamic networks. 展开更多
关键词 Wireless Sensor Network REAL-TIME Routing Protocol contention-based Scheme Beaconless
在线阅读 下载PDF
Multi-Sensor Estimation for Unreliable Wireless Networks with Contention-Based Protocols 被引量:1
2
作者 Shou-Wan Gao Peng-Peng Chen +1 位作者 Xu Yang Qiang Niu 《Journal of Computer Science & Technology》 SCIE EI CSCD 2018年第5期1072-1085,共14页
The state estimation plays an irreplaceable role in many real applications since it lays the foundation for decision-making and control. This paper studies the multi-sensor estimation problem for a contention-based un... The state estimation plays an irreplaceable role in many real applications since it lays the foundation for decision-making and control. This paper studies the multi-sensor estimation problem for a contention-based unreliable wireless network. At each time step, no more than one sensor can communicate with the base station due to the potential contention and collision. In addition, data packets may be lost during transmission since wireless channels are unreliable. A novel packet arrival model is proposed which simultaneously takes into account the above two issues. Two scenarios of wireless sensor networks (WSNs) are considered: the sensors transmit the raw measurements directly and the sensors send the local estimation instead. Based on the obtained packet arrival model, necessary and sufficient stability conditions of the estimation at the base station side are provided for both network scenarios. In particular, all offered stability conditions are expressed by simple inequalities in terms of the packet arrival rates and the spectral radius of the system matrix. Their relationships with existing related results are also discussed. Finally, the proposed results are demonstrated by simulation examples and an environment monitoring prototype system. 展开更多
关键词 wireless sensor network packet loss state estimation contention-based protocol
原文传递
Resource allocation for D2D-assisted haptic communications
3
作者 Yan Wu Chao Yue +1 位作者 Yang Yang Liang Ao 《Digital Communications and Networks》 SCIE CSCD 2024年第1期63-74,共12页
Haptic communications is recognized as a promising enabler of extensive services by enabling real-time haptic control and feedback in remote environments,e.g.,teleoperation and autonomous driving.Considering the stric... Haptic communications is recognized as a promising enabler of extensive services by enabling real-time haptic control and feedback in remote environments,e.g.,teleoperation and autonomous driving.Considering the strict transmission requirements on reliability and latency,Device-to-Device(D2D)communications is introduced to assist haptic communications.In particular,the teleoperators with poor channel quality are assisted by auxiliaries,and each auxiliary and its corresponding teleoperator constitute a D2D pair.However,the haptic interaction and the scarcity of radio resources pose severe challenges to the resource allocation,especially facing the sporadic packet arrivals.First,the contentionbased access scheme is applied to achieve low-latency transmission,where the resource scheduling latency is omitted and users can directly access available resources.In this context,we derive the reliability index of D2D pairs under the contention-based access scheme,i.e.,closed-loop packet error probability.Then,the reliability performance is guaranteed by bidirectional power control,which aims to minimize the sum packet error probability of all D2D pairs.Potential game theory is introduced to solve the problem with low complexity.Accordingly,a distributed power control algorithm based on synchronous log-linear learning is proposed to converge to the optimal Nash Equilibrium.Experimental results demonstrate the superiority of the proposed learning algorithm. 展开更多
关键词 Haptic communications D2D Power control contention-based access Potential game
在线阅读 下载PDF
Neighbor-Aware Multiple Access Protocol for 5G m MTC Applications 被引量:2
4
作者 Yang Yang Guannan Song +2 位作者 Wuxiong Zhang Xiaohu Ge Chengxiang Wang 《China Communications》 SCIE CSCD 2016年第S2期80-88,共9页
In order to support massive Machine Type Communication(mMTC) applications in future Fifth Generation(5G) systems,a key technical challenge is to design a highly effective multiple access protocol for massive connectio... In order to support massive Machine Type Communication(mMTC) applications in future Fifth Generation(5G) systems,a key technical challenge is to design a highly effective multiple access protocol for massive connection requests and huge traffic load from all kinds of smart devices,e.g.bike,watch,phone,ring,glasses,shoes,etc..To solve this hard problem in distributed scenarios with massive competing devices,this paper proposes and evaluates a Neighbor-Aware Multiple Access(NAMA) protocol,which is scalable and adaptive to different connectivity size and traffic load.By exploiting acknowledgement signals broadcasted from the neighboring devices with successful packet transmissions,NAMA is able to turn itself from a contention-based random access protocol to become a contention-free deterministic access protocol with particular transmission schedules for all neighboring devices after a short transition period.The performance of NAMA is fully evaluated from random state to deterministic state through extensive computer simulations under different network sizes and Contention Window(CW)settings.Compared with traditional IEEE802.11 Distributed Coordination Function(DCF),for a crowded network with 50 devices,NAMA can greatly improve system throughput and energy efficiency by more than 110%and210%,respectively,while reducing average access delay by 53%in the deterministic state. 展开更多
关键词 neighbor-aware multiple access contention-based random access contention-free deterministic access ACK signal 802.11 DCF
在线阅读 下载PDF
Two-Tier Hierarchical Cluster Based Topology in Wireless Sensor Networks for Contention Based Protocol Suite
5
作者 Arif Sari 《International Journal of Communications, Network and System Sciences》 2015年第3期29-42,共14页
The 802.15.4 Wireless Sensor Networks (WSN) becomes more economical, feasible and sustainable for new generation communication environment, however their limited resource constraints such as limited power capacity mak... The 802.15.4 Wireless Sensor Networks (WSN) becomes more economical, feasible and sustainable for new generation communication environment, however their limited resource constraints such as limited power capacity make them difficult to detect and defend themselves against variety of attacks. The radio interference attacks that generate for WSN at the Physical Layer cannot be defeated through conventional security mechanisms proposed for 802.15.4 standards. The first section introduces the deployment model of two-tier hierarchical cluster topology architecture and investigates different jamming techniques proposed for WSN by creating specific classification of different types of jamming attacks. The following sections expose the mitigation techniques and possible built-in mechanisms to mitigate the link layer jamming attacks on proposed two-tier hierarchical clustered WSN topology. The two-tier hierarchical cluster based topology is investigated based on contention based protocol suite through OPNET simulation scenarios. 展开更多
关键词 802.15.4 WSN Communication Hierarchical CLUSTER TOPOLOGY Simulation Security Jamming ATTACK contention-based Protocols
在线阅读 下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部