2019
DOI: 10.1109/jiot.2018.2884455
|View full text |Cite
|
Sign up to set email alerts
|

Network Scalability Comparison of IEEE 802.15.4 and Receiver-Assigned CDMA

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
11
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 17 publications
(12 citation statements)
references
References 18 publications
0
11
0
Order By: Relevance
“…In the MAC layer, different devices have different requirements for E2E communications according to their specific functions. Although many different MAC protocols have been proposed (e.g., CSMA-Carrier Sense Multiple Access) [115], CDMA-Code Division Multiple Access) [116], TDMA-Time Division Multiple Access) [117] and their improved versions, these methods still lack flexibility, and do not fulfill the emerging requirements of industrial applications. Generally, industrial E2E communications can be divided into two categories: periodic communications and aperiodic communications.…”
Section: B End-to-end Communicationmentioning
confidence: 99%
“…In the MAC layer, different devices have different requirements for E2E communications according to their specific functions. Although many different MAC protocols have been proposed (e.g., CSMA-Carrier Sense Multiple Access) [115], CDMA-Code Division Multiple Access) [116], TDMA-Time Division Multiple Access) [117] and their improved versions, these methods still lack flexibility, and do not fulfill the emerging requirements of industrial applications. Generally, industrial E2E communications can be divided into two categories: periodic communications and aperiodic communications.…”
Section: B End-to-end Communicationmentioning
confidence: 99%
“…In the following, we detail the procedure we used to derive the values v i,k involved in calculation of Equation (1) and shown in Figure 17. These values, as previously highlighted, have been obtained through a literature analysis on several research works [79][80][81][82][83][84][85][86][87]). In each of these papers, at least one technology and one performance metric were considered.…”
Section: Fundingmentioning
confidence: 99%
“…The values shown in Figure 17 have been obtained analyzing relevant works appeared in the literature-namely [79][80][81][82][83][84][85][86][87]-and normalizing each data in order to directly compare (through adimensional values) the communication technologies presented in the paper. In detail, each axis of the chart in Figure 17 corresponds to each of the 9 metrics.…”
mentioning
confidence: 99%
See 1 more Smart Citation
“…Enhancements for reduced-precision correlations, optimally pruned coefficients, and variable-length operations are all considered in Section III. Measurable results from hardware prototypes built on an Intel Arria 10 field-programmable gate array (FPGA) are presented in Section IV, offering simpler methods for asynchronous reception, underlay-based watermark validation [14], and receiver-assigned code-division multiple access (CDMA) operations [15] in IoT-caliber devices. Finally, conclusions can be found in Section V.…”
Section: Introductionmentioning
confidence: 99%