2013
DOI: 10.7763/ijcce.2013.v2.261
|View full text |Cite
|
Sign up to set email alerts
|

Analysis of the Contention Access Period (CAP) Model for the IEEE 802.15.7 Visible Light Communication

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2015
2015
2021
2021

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(7 citation statements)
references
References 6 publications
0
7
0
Order By: Relevance
“… Multiply the M(x) with x 1  Divide the x 16 . M(x) modulo 2 with the polynomial generator G16(x), to obtain the reminder polynomial, R(x) = rox 15 + r1 x 14 + … + r14x + r15  CRC field is filled with the coefficients from the reminder polynomial, R(x)…”
Section: Cyclic Redundant Check (Crc)mentioning
confidence: 99%
“… Multiply the M(x) with x 1  Divide the x 16 . M(x) modulo 2 with the polynomial generator G16(x), to obtain the reminder polynomial, R(x) = rox 15 + r1 x 14 + … + r14x + r15  CRC field is filled with the coefficients from the reminder polynomial, R(x)…”
Section: Cyclic Redundant Check (Crc)mentioning
confidence: 99%
“…All contention-based transactions must be completed before the CFP begins. Therefore, the CFP always appears at the end of the superframe immediately following the contention access period [15]. The superframe is bounded by beacons sent by the coordinator.…”
Section: Ieee 802157 Macmentioning
confidence: 99%
“…A comprehensive PHY performance evaluation of the IEEE 802.15.7 is presented in [9], and there are several studies focusing on modulation [10,11] and resource allocation [12]. IEEE 802.15.7 MAC layer performance was not explored in depth except some sporadic works [13][14][15][16][17]. In [13], the performance of beacon-enabled mode of 802.15.7 in terms of throughput and delay is studied through computer simulations.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…The ACK is expected by the sender node to be received before a fixed maximum time of macAckWaitDuration. If the ACK is not correctly received after this time, then a collision is declared [6].…”
Section: Figure 1 Flowchart Of Random Access Modesmentioning
confidence: 99%