2017 32nd Youth Academic Annual Conference of Chinese Association of Automation (YAC) 2017
DOI: 10.1109/yac.2017.7967559
|View full text |Cite
|
Sign up to set email alerts
|

Modeling the throughput of IEEE 802.15.4 based wireless networks under interference

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 13 publications
0
3
0
Order By: Relevance
“…On the other hand, in 802. 15 [10][11] is the reason for some other industrial wireless protocols also so understanding it can be extremely valuable to a security consu ltant [12]. The standard IEEE 802.…”
Section: Related Workmentioning
confidence: 99%
“…On the other hand, in 802. 15 [10][11] is the reason for some other industrial wireless protocols also so understanding it can be extremely valuable to a security consu ltant [12]. The standard IEEE 802.…”
Section: Related Workmentioning
confidence: 99%
“…IEEE 802. 15.4 has been the desired topic for various researchers, many have studied this network under various different test beds using various different tools to study its behavior [2][3][4][5][6][7][8][9][10][11][12][13][14][15][16][17][18][19][20]. Many researchers have tried to custom code the pipeline stage model files to fit the requirements of theirs [2 -4].…”
Section: Introductionmentioning
confidence: 99%
“…Researchers have modelled the throughput in IEEE 802. 15.4 under effects of interference as well [7]. Some have compared the QoS of the IEEE 802.…”
Section: Introductionmentioning
confidence: 99%