2005
DOI: 10.1002/0470094559
|View full text |Cite
|
Sign up to set email alerts
|

Topology Control in Wireless Ad Hoc and Sensor Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

1
40
0

Year Published

2007
2007
2015
2015

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 297 publications
(41 citation statements)
references
References 0 publications
1
40
0
Order By: Relevance
“…In medium access control layer various protocols such as CDMA, TDMA, and Z-Mac is designed for conflict free protocol. Among these TDMA is one of the efficient distributed protocols for data transmission [6].…”
Section: International Journal Of Computer Applications (0975 -8887) mentioning
confidence: 99%
See 1 more Smart Citation
“…In medium access control layer various protocols such as CDMA, TDMA, and Z-Mac is designed for conflict free protocol. Among these TDMA is one of the efficient distributed protocols for data transmission [6].…”
Section: International Journal Of Computer Applications (0975 -8887) mentioning
confidence: 99%
“…Node activity makes node turn on when it is needed and makes off when it is not need. Similarly link is active when it is needed otherwise off [6].…”
Section: Introductionmentioning
confidence: 99%
“…Topology control [13][14][15] has been well-studied for 2D wireless ad hoc and sensor networks in the past decade [16][17][18][19][20][21][22][23][24][25][26]. Topology control methods allow each sensor node to locally adjust its transmission range and select certain neighbors for communication, while maintaining a structure that can support energy efficient routing and improve the overall network performance.…”
Section: Introductionmentioning
confidence: 99%
“…Joining and leaving of nodes occurs dynamically, particularly when dealing with mobility in ad-hoc networks. Potential applications of such networks can be found in traffic scenarios, environmental observations, ubiquitous Internet access, and in search and rescue scenarios as described in detail in [2].…”
Section: Introductionmentioning
confidence: 99%