2009 5th International Conference on Wireless Communications, Networking and Mobile Computing 2009
DOI: 10.1109/wicom.2009.5304082
|View full text |Cite
|
Sign up to set email alerts
|

A Survey of Addressing Algorithms for Wireless Sensor Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
7
0

Year Published

2012
2012
2020
2020

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 20 publications
(7 citation statements)
references
References 37 publications
0
7
0
Order By: Relevance
“…Applying the distance formula for finding the every node distance value with the help of sensors, nodes coordinate as showing in Figure 5, for example, distance between Z (coordinator) and T node. Z= (5,4) T=(2, 4) Similarly, the value of all remaining distance is also calculated, which is also shown in Figure 4, that is, d2=2, d3=1, d4=2, d5=2, d6=1, d7=2, d8=4, d9=5, d10=4, d11=5, d12=1, and d13=2, using sensor nodes coordinate and distance measurement formula we able to measure the distance between each node in a WSN area.…”
Section: Casementioning
confidence: 96%
See 1 more Smart Citation
“…Applying the distance formula for finding the every node distance value with the help of sensors, nodes coordinate as showing in Figure 5, for example, distance between Z (coordinator) and T node. Z= (5,4) T=(2, 4) Similarly, the value of all remaining distance is also calculated, which is also shown in Figure 4, that is, d2=2, d3=1, d4=2, d5=2, d6=1, d7=2, d8=4, d9=5, d10=4, d11=5, d12=1, and d13=2, using sensor nodes coordinate and distance measurement formula we able to measure the distance between each node in a WSN area.…”
Section: Casementioning
confidence: 96%
“…[2,3] Especially, it must apply a network joining technique that is able to link every node in a big scale WSN with reduced power consumption. [4] Many of network joining techniques have been suggested to support trusty connection in internet applications (e.g., dynamic host configuration protocol and duplicate address detection). [5][6][7] Even so, because of the broadcast storm issue, may not be applied this technique and the energy may become not efficient and this will be wasted it, [8] appropriate protocols must be applied to solve the problem of rejoining isolated nodes with conserving energy.…”
mentioning
confidence: 99%
“…In literature, several solutions for IP address autoconfiguration have been proposed. The authors in [15] classify these solutions in three major groups: stateful, stateless and hybrid. In stateful address auto-configuration approaches, all nodes consult a logically centralized node or a set of distributed agents to obtain a valid IP address.…”
Section: Related Workmentioning
confidence: 99%
“…Each sensor has a predefined unique hardware ID address that is usually used as MAC address. A sensor network may use the hardware identifier for both MAC and network address or extract the network address from the MAC address [28], a choice that depends on the application and the sensor network interface. Here the address is a 48-bit IEEE MAC which is used for most IEEE 802 network technologies, including Ethernet, Bluetooth and WiFi.…”
Section: Broadcast Messagesmentioning
confidence: 99%