2017
DOI: 10.1016/j.adhoc.2017.06.001
|View full text |Cite
|
Sign up to set email alerts
|

Location based transmission using a neighbour aware with optimized EIFS MAC for ad hoc networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
4
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
4

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(4 citation statements)
references
References 31 publications
0
4
0
Order By: Relevance
“…TDMA can be applied with centralized and distributed hill climbing and centralized annealing with connection distance and connection probability (Yaman et al , 2023). 802.11 uses a fixed back-off value, whereas LBT uses variable back-off value and thereby reduces interference and increases battery life (Marchang et al , 2017). 802.11 plays a major role in time-sensitive applications like voice and video streaming based on their quality of service.…”
Section: Survey Of Various Optimization Techniques In Macmentioning
confidence: 99%
“…TDMA can be applied with centralized and distributed hill climbing and centralized annealing with connection distance and connection probability (Yaman et al , 2023). 802.11 uses a fixed back-off value, whereas LBT uses variable back-off value and thereby reduces interference and increases battery life (Marchang et al , 2017). 802.11 plays a major role in time-sensitive applications like voice and video streaming based on their quality of service.…”
Section: Survey Of Various Optimization Techniques In Macmentioning
confidence: 99%
“…In addition, the transmission power is dynamically adjusted by considering neighbour's signal strength to avoid hidden node situations. In both [3] and [4] , the backoff mechanism based on the number of active neighbours was introduced, but the analysis of the energy consumption during the backoff periods was not highlighted, so this paper extends the study and incorporates the study of the amount of energy utilization during such deferring sessions.…”
Section: Introductionmentioning
confidence: 99%
“…However, location information is not readily available, so such an approach is invalidated if nodes are not provided with location information or if nodes cannot acquire location information. The work of [3] is extended in [4] by tuning the transmission power based on the activity of its neighbours and developed a technique to defer channel access dynamically based on the length of the busy state of the shared channel to avoid hidden node issue and ensure a fairer channel access. However, the study of [4] was developed only for a single hop environment by assuming that the location information was provided during initial node deployment and the study did not consider multi-hop communication with node mobility.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation