2019
DOI: 10.3390/electronics8060715
|View full text |Cite
|
Sign up to set email alerts
|

A Bidirectional Polling MAC Mechanism for IoT

Abstract: The Point Coordination Function (PCF)-based access control mechanism in IEEE 802.11 allows an access point to schedule stations in order to avoid hidden nodes and collisions. However, nearly all existing performance analysis models focus on the single-directional communication scenario, and these polling mechanisms consume a significant amount of energy resources. This study proposes a hybrid service bidirectional polling access control mechanism for transmission between an AP and N stations. To improve energy… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2020
2020
2021
2021

Publication Types

Select...
2

Relationship

1
1

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 22 publications
0
2
0
Order By: Relevance
“…According to the report of information, the AP selects the node to schedule the link to avoid conflicts and improve network throughput. In literature, 17 a two‐way polling access control mechanism for hybrid services for AP and station is proposed, based on the IEEE 802.11 Point Coordination Function mechanism. The reserve full‐duplex MAC protocol represented by Janus converges node information and maintains the uplink and downlink scheduling sequence through the AP, and the node establishes a full‐duplex link under the control of the AP 18…”
Section: Related Workmentioning
confidence: 99%
“…According to the report of information, the AP selects the node to schedule the link to avoid conflicts and improve network throughput. In literature, 17 a two‐way polling access control mechanism for hybrid services for AP and station is proposed, based on the IEEE 802.11 Point Coordination Function mechanism. The reserve full‐duplex MAC protocol represented by Janus converges node information and maintains the uplink and downlink scheduling sequence through the AP, and the node establishes a full‐duplex link under the control of the AP 18…”
Section: Related Workmentioning
confidence: 99%
“…This third research line looks at network security that ensures the integrity, availability, and performance of an organization through the protection of IT assets against cyber threats. Thereby, it is a key component of network optimization, to prevent attacks and increase the productivity of companies [128,129]. Cluster 4 (yellow color) associates 17% of the main keywords and is headed by "Wireless Telecommunication Systems" (occurrences: 40, link: 185, total link strength: 450).…”
Section: Keyword Analysismentioning
confidence: 99%