2018
DOI: 10.1007/s11235-018-0434-4
|Get access via publisher |Cite
|
Sign up to set email alerts

A survey of hybrid MAC protocols for machine-to-machine communications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
6
0

Year Published

2018
2018
2025
2025

Publication Types

Select...
6
2

Relationship

1
7

Authors

Journals

citations
Cited by 11 publications
(6 citation statements)
references
References 87 publications
0
6
0
Order By: Relevance
“…In (26), depending on the type of beamforming technique used, P(γ d ≥ γ th ) is calculated by ( 6) and ( 7) with K s = U gb − 1. This problem is one-dimensional so it can be solved by hill-climbing method or exhaustive search.…”
Section: Appendix Optimal Algorithmmentioning
confidence: 99%
See 1 more Smart Citation
“…In (26), depending on the type of beamforming technique used, P(γ d ≥ γ th ) is calculated by ( 6) and ( 7) with K s = U gb − 1. This problem is one-dimensional so it can be solved by hill-climbing method or exhaustive search.…”
Section: Appendix Optimal Algorithmmentioning
confidence: 99%
“…There has been a research interest for hybrid access schemes [25], [26], combining grant-based and random access schemes to alleviate the number of collisions in the random access schemes and consequently improve the network throughput. In [27], [28], each device wishing to transmit has to contend for channel access by sending a request message, and only successful ones are allocated time slots while the BS utilizes a distributed queuing algorithms to resolve collisions.…”
mentioning
confidence: 99%
“…Other solutions include the hybrid random access protocols which combine two different techniques to achieve an efficient performance for RACH. Several hybrid protocols have been investigated and compared based on different combination schemes and performance metrics [8]. This work focuses on a specific hybrid random access method in which a congestion control technique is combined with a collision resolution technique.…”
Section: Related Workmentioning
confidence: 99%
“…For example, TDMA requires strict clock synchronization to avoid communication failures due to interference among devices [ 11 ]. This feature causes additional power consumption since it requires the regular transmission and detection of a clock signal [ 12 ]. In turn, FDMA is poorly suited for operation with low-cost IoT devices, as they require complex circuitry to communicate and switch between different radio channels.…”
Section: Introductionmentioning
confidence: 99%