2020
DOI: 10.1109/tmc.2019.2907956
|View full text |Cite
|
Sign up to set email alerts
|

Label Coloring Based Beaconing Schedule in Duty-Cycled Multihop Wireless Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 13 publications
(2 citation statements)
references
References 30 publications
0
2
0
Order By: Relevance
“…Otherwise, the VNFs implementation cost of node v must be taken into account. Let cap(v) denote the computing resources of the server node v ∈ V M to hold VNFs, B e represent the bandwidth resources of each link e ∈ E, and c e denote the usage costs of one unit of bandwidth at each edge e ∈ E. When data is transmitted on a link, the traffic delivery cost and transmission delay will be incurred on the link e ∈ E. In G, there is an SDN controller in charge of managing the allocation of resources for each admitted unicast request, and the above properties of each switch can be obtained by the controller by the methods as in [26], [27]. Fig.…”
Section: A Network Modelmentioning
confidence: 99%
“…Otherwise, the VNFs implementation cost of node v must be taken into account. Let cap(v) denote the computing resources of the server node v ∈ V M to hold VNFs, B e represent the bandwidth resources of each link e ∈ E, and c e denote the usage costs of one unit of bandwidth at each edge e ∈ E. When data is transmitted on a link, the traffic delivery cost and transmission delay will be incurred on the link e ∈ E. In G, there is an SDN controller in charge of managing the allocation of resources for each admitted unicast request, and the above properties of each switch can be obtained by the controller by the methods as in [26], [27]. Fig.…”
Section: A Network Modelmentioning
confidence: 99%
“…We assume in this work that each node can obtain its own location information by GPS [25] or localization schemes [26,27]. By periodically exchanging beacon messages [28,29], every node can determine its one-hop neighbor nodes, and obtain their locations and data relay speeds. When a source detects an event, it generates data with the desired time deadline T setdeadline of the event.…”
Section: Network Modelmentioning
confidence: 99%