[[abstract]]The medium access control (MAC) protocol defined in IEEE 802.15.4 standard is able to achieve low-power transmissions in low-rate and short-distance wireless personal area networks (WPANs). The modified CSMA/CA protocol used to minimize power consumption does not have the hidden-node protection mechanism, such as RST/CTS mechanism, for the sake of reducing the control overheads. Referring to previous research results, which proved that the probability of any two nodes in infrastructure network unheard each other is about 41%, the hidden-node problem (HNP) could result in inefficient data transmission in WPAN and quick power consumption. In this paper, we propose a simple and efficient grouping strategy to solve the IEEE 802.15.4...
International audienceIndustrials have been increasingly interested in wireless sensor and actuator ...
International audienceSensor networks, in particular those used in embedded devices like robots, imp...
This paper aims to develop several mathematical models to study medium access control (MAC) protocol...
[[abstract]]Different emerging IEEE 802.15.4 wireless personal area networks (WPANs) are one solutio...
Abstract — IEEE 802.15.4-2003 [1] was introduced to address the market need for connecting low-rate ...
Abstract — IEEE 802.15.4-2003 [1] was introduced to address the market need for connecting low-rate ...
Designed for high rate wireless personal area networks (WPANs), the IEEE 802.15.3 protocol enables p...
IEEE 802.15.4 is a standard designed for low data rate wireless personal area networks (WPANs) inten...
Abstract. The finite battery power of mobile computers represents one of the greatest limitations to...
The hidden-node problem has been shown to be a major source of Quality-of-Service (QoS) degradation...
Communication networks play a fundamental role in the response to massive catastrophes. In case of e...
Abstract: Problem statement: In universal networking environments; two or more heterogeneous communi...
Among several wireless network scenarios, the in-home environment is one of the more challenging in ...
Energy efficiency has been the driving force behind the design of communication protocols for batter...
Abstract—The strength of carrier-sense multiple access with collision avoidance (CSMA/CA) can be com...
International audienceIndustrials have been increasingly interested in wireless sensor and actuator ...
International audienceSensor networks, in particular those used in embedded devices like robots, imp...
This paper aims to develop several mathematical models to study medium access control (MAC) protocol...
[[abstract]]Different emerging IEEE 802.15.4 wireless personal area networks (WPANs) are one solutio...
Abstract — IEEE 802.15.4-2003 [1] was introduced to address the market need for connecting low-rate ...
Abstract — IEEE 802.15.4-2003 [1] was introduced to address the market need for connecting low-rate ...
Designed for high rate wireless personal area networks (WPANs), the IEEE 802.15.3 protocol enables p...
IEEE 802.15.4 is a standard designed for low data rate wireless personal area networks (WPANs) inten...
Abstract. The finite battery power of mobile computers represents one of the greatest limitations to...
The hidden-node problem has been shown to be a major source of Quality-of-Service (QoS) degradation...
Communication networks play a fundamental role in the response to massive catastrophes. In case of e...
Abstract: Problem statement: In universal networking environments; two or more heterogeneous communi...
Among several wireless network scenarios, the in-home environment is one of the more challenging in ...
Energy efficiency has been the driving force behind the design of communication protocols for batter...
Abstract—The strength of carrier-sense multiple access with collision avoidance (CSMA/CA) can be com...
International audienceIndustrials have been increasingly interested in wireless sensor and actuator ...
International audienceSensor networks, in particular those used in embedded devices like robots, imp...
This paper aims to develop several mathematical models to study medium access control (MAC) protocol...