2013 IEEE International Conference on Communication, Networks and Satellite (COMNETSAT) 2013
DOI: 10.1109/comnetsat.2013.6870858
|View full text |Cite
|
Sign up to set email alerts
|

Beacon-enabled IEEE 802.15.4 wireless sensor network performance

Abstract: One application considered for IEEE 802.15.4 standard Low Rate-Wireless Personal Area Network (LR-WPAN) is wireless sensor network and control application that is centered on the performance of IEEE 802.15.4 standard for star and cluster topology. This study conduct performance comparison of beacon-enabled mode on star and cluster topology IEEE 802.15.4 standard by analyzing the result of throughput, delay, and energy consumption in order to get the maximum result to apply the appropriate topology model as nee… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(5 citation statements)
references
References 2 publications
0
5
0
Order By: Relevance
“…The (1), so that the next time a source knows the destination, it directly retrieves the destination"s IP address [24]. Nodejoin and leave operations always take only log n steps as opposed to log²n in Chord [25].…”
Section: Resultsmentioning
confidence: 99%
See 2 more Smart Citations
“…The (1), so that the next time a source knows the destination, it directly retrieves the destination"s IP address [24]. Nodejoin and leave operations always take only log n steps as opposed to log²n in Chord [25].…”
Section: Resultsmentioning
confidence: 99%
“…Initiator uses a broadcast scheme to release an action message as in (1) including a monotonously increasing nonce, a random round seed, and an action time. M act = nonce, seed, time, { nonce || seed || time } key -1 initiator (1) On receiving this action message, every observer constructs a claiming message for each of its neighbor and sends the message with a key as in (2) which is the hash of the concatenation of seed sent along with action message and the examinee ID. Examinee is the neighbor of the observer for which the claiming message is constructed and the observer becomes the examiner.…”
Section: Protocol Details 41 Generation Of Action Message and Keymentioning
confidence: 99%
See 1 more Smart Citation
“…In general, the nodes of a sensor network are characterized by the limitation in power, memory and processing resources, consequently, the use of protocols that guarantee communication between the nodes of the network, optimize performance and save the most energy while providing scalability. 3 Wireless sensor networks performance is closely linked to that of the protocol routing, because routes can change dynamically over time. The energy restraint imposed by these networks nodes is not taken into account in the traditional approaches so that they consume a substantial amount of energy by intensive messagerial exchange.…”
Section: Introductionmentioning
confidence: 99%
“…IEEE 802.15.4 networks operate in the 2.4 Ghz frequency range -from 2400 to 2483.5 Mhz, and with a transmission rate of 250 kbps. Other frequency ranges are allowed by the protocol, with variation in the number of communication channels and transmission speed 8 . The IEEE 802.15.4 protocol implements physical layers and Medium Access Control (MAC), leaving the network and upper layers free for implementation according to use.…”
Section: Introductionmentioning
confidence: 99%