2010 IEEE International Conference on Communications Workshops 2010
DOI: 10.1109/iccw.2010.5503911
|View full text |Cite
|
Sign up to set email alerts
|

Urgency-Based MAC Protocol for Wireless Sensor Body Area Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
36
0
1

Year Published

2010
2010
2018
2018

Publication Types

Select...
8
1

Relationship

1
8

Authors

Journals

citations
Cited by 59 publications
(37 citation statements)
references
References 6 publications
0
36
0
1
Order By: Relevance
“…If an abrupt change in peak interval detected then it is compared with second predefined threshold value T2, if value exceeds T2 then synchronization recovery scheme is activated. [2] is a priority driven MAC protocol targeted for medical applications. It is based on IEEE 802.15.4a standard.…”
Section: Featuresmentioning
confidence: 99%
“…If an abrupt change in peak interval detected then it is compared with second predefined threshold value T2, if value exceeds T2 then synchronization recovery scheme is activated. [2] is a priority driven MAC protocol targeted for medical applications. It is based on IEEE 802.15.4a standard.…”
Section: Featuresmentioning
confidence: 99%
“…Recently, the Medium Access Control (MAC) sublayer has been extensively studied to evaluate the performance of the WPANs standard MAC protocols through mathematical analysis and simulation as well as proposing and evaluating a new approaches to enhance and enrich these standards [1,4,[10][11][12] In this paper we conduct a comprehensive review for the proposed WPAN network architecture and its MAC protocols. Also, for providing a collective document for the state-of-the-art in wireless personal area networks, a comprehensive literature review of the performance evaluation and protocol enhancement for the proposed WPANs' MAC protocols is given.…”
Section: Introductionmentioning
confidence: 99%
“…At the beginning of data transfer, each node allocates a timeslot whereas a node can transmit critical and non-critical data. Therefore, 'G' is the total number of packets which are ready for transmission at the initial time slot as described as G = x=X x=1 n=r x n=0 C n x [53]. Where 'x' is the traffic index, 'n' is the retransmission of the lost traffic and its range is from 1, 2, 3 to r x .…”
Section: Csma/ca With Aloha Based Mac Protocolsmentioning
confidence: 99%
“…An Urgency-based MAC (U-MAC) protocol [53] is used to assign priority-based slots to the critical data as compared to non-critical data. The Slotted Aloha channel access method is used with the support of an enabled-beacon control.…”
Section: Csma/ca With Aloha Based Mac Protocolsmentioning
confidence: 99%