2021
DOI: 10.1155/2021/5554563
|View full text |Cite
|
Sign up to set email alerts
|

Design and Analysis of Cooperative Broadcast Scheme Based on Reliability in Mesh Network

Abstract: In order to ensure reliable data transmission of sender, the tree-based network is extended to Mesh network by collaborative technology, and the SW-HBH-CARQ broadcast scheme is introduced for the first time. Then, in order to solve the problems of broadcast storm and energy saving, SW-HBH-oiCARQ, SW-HBH-ieCARQ, and SW-HBH-oieCARQ are further proposed. Then, the four broadcasting schemes are analyzed quantitatively, and the performance indicators such as system energy consumption and time delay are obtained. Fi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2022
2022
2022
2022

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 31 publications
0
1
0
Order By: Relevance
“…Especially in the field of network security, the emergence of automatic protocol reverse technology has brought dawn to network analysis. By studying network protocols, Dou et al took reverse engineering as the entry point of protocol analysis, from the perspective of traffic syntax analysis and instruction timing analysis as protocol reverse analysis, but due to the wide research area, the research depth of the protocol is insufficient [11]. In the paper, Iwendi et al proposed a reverse protocol analysis technology based on network traffic.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Especially in the field of network security, the emergence of automatic protocol reverse technology has brought dawn to network analysis. By studying network protocols, Dou et al took reverse engineering as the entry point of protocol analysis, from the perspective of traffic syntax analysis and instruction timing analysis as protocol reverse analysis, but due to the wide research area, the research depth of the protocol is insufficient [11]. In the paper, Iwendi et al proposed a reverse protocol analysis technology based on network traffic.…”
Section: Literature Reviewmentioning
confidence: 99%