2018
DOI: 10.1186/s13638-017-1012-2
|View full text |Cite
|
Sign up to set email alerts
|

A hybrid MAC protocol for optimal channel allocation in large-scale wireless powered communication networks

Abstract: This paper proposes a large-scale wireless powered communication network (WPCN), which consists of a hybrid access point (H-AP) and numerous nodes. The H-AP broadcasts energy to all nodes, and the nodes harvest the energy and then use the harvested energy to transmit information. For the large-scale WPCN, we also propose a novel hybrid multiple access protocol, termed hybrid multiple access-based dual harvest-then-transmit. The proposed protocol utilizes both time division multiple access (TDMA) and carrier-se… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
10
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(10 citation statements)
references
References 33 publications
(45 reference statements)
0
10
0
Order By: Relevance
“…It transmits uplink data at the selected RA and then goes to sleep mode for the rest of the frame. Cho et al [34] proposed a hybrid multiple access-based dual harvest-then-transmit (H-DHT) protocol for large-scale WPCNs, which uses a frame structure including the TDMA period and CSMA/CA period. In the former, the HAP allocates timeslots to each device for periodic traffic requiring transmission reliability and the latter is a duration for non-periodic traffic unconstrained from transmission reliability.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…It transmits uplink data at the selected RA and then goes to sleep mode for the rest of the frame. Cho et al [34] proposed a hybrid multiple access-based dual harvest-then-transmit (H-DHT) protocol for large-scale WPCNs, which uses a frame structure including the TDMA period and CSMA/CA period. In the former, the HAP allocates timeslots to each device for periodic traffic requiring transmission reliability and the latter is a duration for non-periodic traffic unconstrained from transmission reliability.…”
Section: Related Workmentioning
confidence: 99%
“…Furthermore, it may cause unnecessary energy consumption due to idle listening and overhearing [31]. In References [32][33][34], the authors proposed the time-division multiple access (TDMA)-based MAC protocol, in which time is divided into frames consisting of slots of the same length where the slots are allocated to individual sensor devices. Therefore, it can provide a deterministic delay for energy harvesting and data transmission and prevent collisions between sensor devices.…”
Section: Introductionmentioning
confidence: 99%
“…Cho et al, used both TDMA and CSMA/CA methods to support energy harvesting and data transmission for two types of traffic patterns: periodic and non-periodic [23]. In [23], a coordinator allocates the dedicated TDMA time slots for energy harvesting and data transmission within a superframe to sensor devices that generate periodic traffic requiring transmission reliability on-demand. In contrast, energy harvesting and data transmission for non-periodic traffic are performed in the rest of the superframe using the CSMA/CA scheme.…”
Section: Introductionmentioning
confidence: 99%
“…In contrast, energy harvesting and data transmission for non-periodic traffic are performed in the rest of the superframe using the CSMA/CA scheme. The studies in [17][18][19][20][21][22][23] commonly suffer from network performance degradation due to a lack of bandwidth resources from performing both WET and WIT operations within the same frequency band.…”
Section: Introductionmentioning
confidence: 99%
“…the number of channels is different.In the case of 802.11b / g, the available channels will overlap and interleave in frequency, resulting in only three non-overlapping channels in the service area covered by the network. As a result, users in this service area can only share the data bandwidth of these three channels.These three channels will also be interfered by other radio signal sources, because the 802.11b / gWLAN standard uses the most commonly used After a long period of research and application, it has been found that using the risk probability as the evaluation index of the system transmission channel can directly reflect the risk value of the current communication channel, thereby quickly determining the feasibility of channel information transmission.The risk probability assessment method can generally be divided into two steps, one is the identification and analysis of the risk, and the other is the calculation of the risk value.Among them, risk identification refers to identifying potential problems that may lead to cost overruns, delayed schedules, or reduced performance, and a qualitative analysis of their consequences [2].Risk assessment refers to quantifying the risks and consequences of potential problems and determining their severity.This may involve the comprehensive application of multiple models, and finally get a comprehensive impression of system risk.Risk analysis is the evaluation and estimation of risk impacts and consequences, including qualitative and quantitative analysis.By integrating the risk analysis results and quantifying them, the risk probability value of the corresponding communication channel can be obtained.However, the single risk assessment is accidental and its application value in actual work is low.In order to solve the above problems, a probability statistics method is introduced to realize the risk assessment of channel information transmission in a large-scale wireless communication system, and the statistical results of the risk probability are obtained.…”
mentioning
confidence: 99%