2018 IEEE 13th International Scientific and Technical Conference on Computer Sciences and Information Technologies (CSIT) 2018
DOI: 10.1109/stc-csit.2018.8526649
|View full text |Cite
|
Sign up to set email alerts
|

The Mesh Technology for Improving of End Nodes Updating for Lorawan Network

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
2
0
1

Year Published

2020
2020
2021
2021

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 4 publications
0
2
0
1
Order By: Relevance
“…It is possible to consider multi-hop communications among the gateways, IoT devices, or both to increase the coverage area [124]. For instance, the multi-hop communications between IoT devices can be seen as a D2D communications alternative to deal with coverage issues [125,126]. Moreover, D2D communications enable new applications and services with major stringent requirements not currently achieved by traditional LoRaWAN architectures [125].…”
Section: Summary and Open Issuesmentioning
confidence: 99%
“…It is possible to consider multi-hop communications among the gateways, IoT devices, or both to increase the coverage area [124]. For instance, the multi-hop communications between IoT devices can be seen as a D2D communications alternative to deal with coverage issues [125,126]. Moreover, D2D communications enable new applications and services with major stringent requirements not currently achieved by traditional LoRaWAN architectures [125].…”
Section: Summary and Open Issuesmentioning
confidence: 99%
“…Також важливим є забезпечення стабільної та тривалої роботи мобільних пристроїв для використання сучасних засобів комунікації. На сьогодні все частіше у одного сімейного лікаря виникає необхідність проведення індивідуальних, а іноді і декількох індивідуальних або групових консультацій одночасно, у форматі відеоконференції чи за допомогою спеціалізованих застосунків, що використовують хмари з шифруванням потоків даних [3].…”
Section: аналіз останніх досліджень і публікаційunclassified
“…1 [4]. By setting these parameters, they are discussed in the source [6]. The limitation that increases with the use of this technology is called the Duty cycle.…”
Section: Lorawan and Lora Modulationmentioning
confidence: 99%