2017 11th IEEE International Conference on Anti-Counterfeiting, Security, and Identification (ASID) 2017
DOI: 10.1109/icasid.2017.8285760
|View full text |Cite
|
Sign up to set email alerts
|

A dynamic slot assignment algorithm of TDMA for the distribution class protocol using node neighborhood information

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 12 publications
(5 citation statements)
references
References 7 publications
0
5
0
Order By: Relevance
“…Under the same guarantee conditions, we can see that the end-to-end delay of the algorithm in this paper is shorter than that of the other two algorithms, with better performance. HY-Mac algorithm has a faster growth in the early stage, and PD-Mac has a smoother growth, but the effect is lower than that of the algorithm in this paper, The result of the picture [5] shows that when the network is stable, the throughput of the algorithm in this paper is 150% higher than that of the PD-Mac and 124% higher than that of the HY-Mac.…”
Section: Comparison With Other Methodsmentioning
confidence: 62%
See 1 more Smart Citation
“…Under the same guarantee conditions, we can see that the end-to-end delay of the algorithm in this paper is shorter than that of the other two algorithms, with better performance. HY-Mac algorithm has a faster growth in the early stage, and PD-Mac has a smoother growth, but the effect is lower than that of the algorithm in this paper, The result of the picture [5] shows that when the network is stable, the throughput of the algorithm in this paper is 150% higher than that of the PD-Mac and 124% higher than that of the HY-Mac.…”
Section: Comparison With Other Methodsmentioning
confidence: 62%
“…Compared with the first type of protocol, TDMA protocol has higher stability. When the number of nodes is large and the topology changes, its performance is far better than that of competitive protocols [5] .…”
Section: Introductionmentioning
confidence: 99%
“…Due to the limited transmission range of wireless signals, information time slots can be multiplexed in space. Nodes can apply to occupy multiple information time slots according to their information transmission requirements 10 .…”
Section: (2) Preliminary Allocation Phasementioning
confidence: 99%
“…Wireless Communications and Mobile Computing processing time required for channel access. Literature [35] proposed a dynamic access protocol, which establishes a channel access table for nodes within two hops by monitoring the control messages broadcasted periodically by neighboring nodes in the control period. Literature [36] proposed G-schedule using the independent characteristics of multiple channels, which can improve channel utilization while avoiding intercell interference.…”
Section: Related Workmentioning
confidence: 99%