2009 IEEE 34th Conference on Local Computer Networks 2009
DOI: 10.1109/lcn.2009.5355177
|View full text |Cite
|
Sign up to set email alerts
|

Backbone MAC for energy-constrained wireless sensor networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2009
2009
2016
2016

Publication Types

Select...
2
2
1

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 20 publications
0
2
0
Order By: Relevance
“…[13][14][15] Power saving, being the most significant key performance indicator (KPI) in these networks has attracted a lot of researchers toward it. A lot of research is done in literature to reduce the energy consumption in the medium access control (MAC) protocols as in Walchli et al 16 and multicast routing in Xiangli et al, 17 Cao et al, 18 and Wu and Candan. 19 Unicast and broadcast routing methods are compared in Li et al, 20 Jurdak et al, 21 and Dehwah et al, 22 while the anycast routing is studied in Gupta et al 23 In Hu et al, 24 the anycast routing protocol had been proposed for ad hoc WSNs according to which packets were passed out to the closest-sink node.…”
Section: Literature Reviewmentioning
confidence: 99%
“…[13][14][15] Power saving, being the most significant key performance indicator (KPI) in these networks has attracted a lot of researchers toward it. A lot of research is done in literature to reduce the energy consumption in the medium access control (MAC) protocols as in Walchli et al 16 and multicast routing in Xiangli et al, 17 Cao et al, 18 and Wu and Candan. 19 Unicast and broadcast routing methods are compared in Li et al, 20 Jurdak et al, 21 and Dehwah et al, 22 while the anycast routing is studied in Gupta et al 23 In Hu et al, 24 the anycast routing protocol had been proposed for ad hoc WSNs according to which packets were passed out to the closest-sink node.…”
Section: Literature Reviewmentioning
confidence: 99%
“…All network nodes wake up randomly within the first 30 simulation seconds, and begin immediately to synchronize. T-MAC enhanced with LACAS has been used as MAC protocol for a topology control algorithm [13]. Because LACAS has been implemented using a cross-layer approach, we evaluate the performance of LACAS in a larger context.…”
Section: Discussionmentioning
confidence: 99%