2008 IEEE Asia-Pacific Services Computing Conference 2008
DOI: 10.1109/apscc.2008.162
|View full text |Cite
|
Sign up to set email alerts
|

Adaptive Collision Avoidance through Implicit Acknowledgments in WSNs

Abstract: The large number of nodes, typical of many sensor network deployments, and the well-known hidden terminal problem make collision avoidance an essential goal for the actual employment of WSN technology. Collision avoidance is traditionally dealt with at the MAC Layer and plenty of different solutions have been proposed, which however have encountered limited diffusion because of their incompatibility with commonly available devices.In this paper we propose an approach to collision avoidance which is designed to… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2013
2013
2015
2015

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 11 publications
0
2
0
Order By: Relevance
“…Contention based Protocol are less compounded than the Schedule based protocols and also they can be completely distributed thus endangering more scalability [17]. CSMA/CA is used by the nodes to access the medium with no masterslave relationships but all nodes compete to gain access to the channel.…”
Section: Fig 4: Csma/ca Channel Access Mechanismsmentioning
confidence: 99%
“…Contention based Protocol are less compounded than the Schedule based protocols and also they can be completely distributed thus endangering more scalability [17]. CSMA/CA is used by the nodes to access the medium with no masterslave relationships but all nodes compete to gain access to the channel.…”
Section: Fig 4: Csma/ca Channel Access Mechanismsmentioning
confidence: 99%
“…RA protocols are less compounded than the CA protocols and also they can be completely distributed thus endangering more scalability [51]. CSMA/CA is used by the nodes to access the medium with no master-slave relationships but all nodes compete to gain access to the channel.…”
Section: Random Access (Ra) Protocolmentioning
confidence: 99%