Proceedings of the 4th ACM Workshop on Networked Systems for Developing Regions 2010
DOI: 10.1145/1836001.1836003
|View full text |Cite
|
Sign up to set email alerts
|

JaldiMAC

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2012
2012
2021
2021

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 20 publications
(3 citation statements)
references
References 9 publications
0
3
0
Order By: Relevance
“…18, respectively. If the number of nodes is more than 16, the computing time of traversal search is too large (may reach to 10 10 seconds). So we show only the traversal results under different nodes number from 8 to 16.…”
Section: Simulation and Resultsmentioning
confidence: 99%
“…18, respectively. If the number of nodes is more than 16, the computing time of traversal search is too large (may reach to 10 10 seconds). So we show only the traversal results under different nodes number from 8 to 16.…”
Section: Simulation and Resultsmentioning
confidence: 99%
“…In the literature of WiLD networks, MAC protocols like 2P [3], WiLDNet [4], JazzyMAC [6], JaldiMAC [12], and Lit MAC [13,14] have literally changed the face of WiLD networks. Most of these protocols focus on overall network performance enhancement.…”
Section: Related Workmentioning
confidence: 99%
“…Figure 1 depicts a typical tree topology using which various important concepts involved in the proposed scheme is explained. Most of the existing MAC protocols for such networks use a token-based mechanism to establish a loose synchronization in a part of the network without any concern over the entire network synchronization [3,4,6,12]. The proposed scheme assumes tight node synchronization in the network.…”
Section: Protocol Assumptionsmentioning
confidence: 99%