2006 3rd International Conference on Broadband Communications, Networks and Systems 2006
DOI: 10.1109/broadnets.2006.4374404
|View full text |Cite
|
Sign up to set email alerts
|

A MAC Layer Protocol for Priority-based Reliable Multicast in Wireless Ad Hoc Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2007
2007
2016
2016

Publication Types

Select...
3
3
1

Relationship

1
6

Authors

Journals

citations
Cited by 8 publications
(4 citation statements)
references
References 26 publications
0
4
0
Order By: Relevance
“…By avoiding collisions during the DATA phase and eliminating the hidden-terminal problem, Robcast provides a useful building block for applications with reliability requirements. Simulations show that Robcast's overhead is small and has the least total packet loss among BEMA [12], BSMA [34], BMMM [31], and CSMA/CA [1].…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…By avoiding collisions during the DATA phase and eliminating the hidden-terminal problem, Robcast provides a useful building block for applications with reliability requirements. Simulations show that Robcast's overhead is small and has the least total packet loss among BEMA [12], BSMA [34], BMMM [31], and CSMA/CA [1].…”
Section: Discussionmentioning
confidence: 99%
“…However, resource limitations of WSNs make the implementation of a separate radio/frequency difficult to achieve. Recently, Busy Elimination Multiple Access (BEMA) protocol [12] adopted BTMA for WSNs by using time synchronized rounds across all nodes (similar to the rounds in Robcast) to allocate a control channel in the time domain instead of in the frequency domain. The disadvantages of BEMA compared to Robcast are its need for finer-grain RCD for performing busy elimination, its vulnerability to certain obstacle arrangements, and its high energy consumption due to the large number of nodes transmitting busy packets in the control phase.…”
Section: Related Workmentioning
confidence: 99%
“…that is evaluated at two different point, v i and i respectively. Moreover, since i is stochastically dominated by v i , equation (15) holds.…”
Section: Convergence Within a Neighborhoodmentioning
confidence: 99%
“…The proposed algorithm does not consider collision-detection mechanisms that are based on signal processing or hardware support, as in [15]. Rather, it employs a variation on a well-known strategy for eventually avoiding concurrent transmissions among neighbors.…”
Section: Introductionmentioning
confidence: 99%