“…[11], [15], [27], [32], [44]. Another data scheduling strategy that has recently begun to receive some research attention is the so-called communication protocol whose main idea is to only grant the "selected" data the permission to occupy the communication channel, thereby effectively preventing the undesired data collisions [1]. In general, the commonly deployed communication protocols include the Round-Robin protocol (RRP) [25], [36], [38], [41], [43], the Try-Once-Discard protocol [17] and the random access protocol [48].…”