Zobrazeno 1 - 10
of 407
pro vyhledávání: '"Exposed node problem"'
Autor:
Chin-Ya Huang, Hsueh-Yi Chen, Chen-Hao Huang, Shiann-Tsong Sheu, Te-Wei Chiang, Tzu-Ling Cheng, Chen-Chi Chang
Publikováno v:
IEEE Access, Vol 9, Pp 43845-43861 (2021)
The Listen-Before-Talk (LBT) is the main procedure for Licensed Assisted Access (LAA) to accomplish fair and friendly coexistence with other operators or technologies operating over unlicensed spectrum. However, in LBT, the lack of coordination with
Externí odkaz:
https://doaj.org/article/c42872e16d214c83a1e7cf6efb0699b8
Publikováno v:
Journal of Advances in Computer Engineering and Technology, Vol 2, Iss 1, Pp 27-36 (2016)
Designing wireless sensor networks should meet appropriate parameters such as quality of service (QoS) defined by different users. The variable physical conditions of the environment, processing and transmission power limitations and limited communic
Externí odkaz:
https://doaj.org/article/a4d927df7e8040188226e4861396ebb9
Autor:
Tzu-Ling Cheng, Chen-Hao Huang, Chin-Ya Huang, Chen-Chi Chang, Hsueh-Yi Chen, Shiann-Tsong Sheu, Te-Wei Chiang
Publikováno v:
IEEE Access, Vol 9, Pp 43845-43861 (2021)
The Listen-Before-Talk (LBT) is the main procedure for Licensed Assisted Access (LAA) to accomplish fair and friendly coexistence with other operators or technologies operating over unlicensed spectrum. However, in LBT, the lack of coordination with
Autor:
Krishan Kumar, Poonam
Publikováno v:
International Journal of Scientific Research in Computer Science, Engineering and Information Technology. :120-124
Wireless networking grows rapidly because of the human desires for mobility and for freedom from tethers, i.e., from physical connections to communication networks. Recent advances in wireless technology have equipped portable computers, such as note
Publikováno v:
IET Communications. 14:4007-4013
The existence of link correlation has been empirically validated, and different exemplary works exploit the link correlation in the designing of various network protocols. In this work, the authors investigated the impact of this link correlation in
Publikováno v:
FNC/MobiSPC
An exposed node problem in a network is observed since the beginning of the decentralization of networks. Even though this problem is consistent from a long time, a little-known research is noticed to address this problem. Consequently, it is importa
Publikováno v:
2021 40th Chinese Control Conference (CCC).
In recent years, spatio-temporal uncertainty has been a great challenge in the Media Access Control (MAC) protocol design for underwater acoustic networks (UANs). In this paper, a slotted based MAC protocol for UANs is proposed, called RV-SFAMA-MA, i
Retransmission DBTMA Protocol With Fast Retransmission Strategy to Improve the Performance of MANETs
Publikováno v:
IEEE Access, Vol 7, Pp 85098-85109 (2019)
The Mobile Ad-hoc Networks (MANETs) are often visible to the exposed terminal problem and hidden terminal problem, which exist due to non-transitivity in media access control schemes. This affects the utilization of channel and throughput in media ac
Autor:
Spilios Giannoulis, Ruben Mennes, Maxim Claeys, Irfan Jabandzic, Felipe A. P. de Figueiredo, Ingrid Moerman
Publikováno v:
IEEE access
IEEE Access, Vol 9, Pp 61864-61886 (2021)
IEEE ACCESS
IEEE Access, Vol 9, Pp 61864-61886 (2021)
IEEE ACCESS
With the emergence of new technologies and standards for wireless communications and an increase in application and user requirements, the number and density of deployed wireless ad hoc networks is increasing. For deterministic ad hoc networks, Time-
Publikováno v:
PIMRC
The first wave of IEEE 802.11ax capable devices have already hit the market, aiming at enhancing the Quality of Experience (QoE) for the users in dense deployments, by enabling novel features to improve throughput and spectrum efficiency. One of thes