1997
DOI: 10.1109/90.650140
|View full text |Cite
|
Sign up to set email alerts
|

Time-spread multiple-access (TSMA) protocols for multihop mobile radio networks

Abstract: This paper introduces a novel technique called protocol threading, yielding a deterministic protocol that gives a guaranteed upper bound on the transmission delay of each packet at every node in a multihop mobile network. By eliminating the maximum degree constraint, the new method improves upon existing time-spread multiple-access (TSMA)-type protocols while preserving the advantages of the deterministic operation and topology transparency. In this paper we introduce the protocol threading solution, derive th… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
60
0

Year Published

2002
2002
2013
2013

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 86 publications
(60 citation statements)
references
References 12 publications
0
60
0
Order By: Relevance
“…Because of its proof-ofconcept nature, ARS/CF is a single-hop MAC protocol, and assumes a fully connected network topology. This paper extends the results presented in [1] by (1) considering multihop extension, (2) proposing and analyzing a multi-channel extension to ARS/CF to improve the scalability of the scheme, (3) providing more accurate throughput formulas for the single-hop case, with simulation validation, and (4) providing simulation results to gain better insight into the performance of basic ARS/CF variants.…”
Section: Introductionmentioning
confidence: 95%
See 2 more Smart Citations
“…Because of its proof-ofconcept nature, ARS/CF is a single-hop MAC protocol, and assumes a fully connected network topology. This paper extends the results presented in [1] by (1) considering multihop extension, (2) proposing and analyzing a multi-channel extension to ARS/CF to improve the scalability of the scheme, (3) providing more accurate throughput formulas for the single-hop case, with simulation validation, and (4) providing simulation results to gain better insight into the performance of basic ARS/CF variants.…”
Section: Introductionmentioning
confidence: 95%
“…The topologyindependent scheduling algorithms in [2] exploits the algebraic structures generated by unique node identifiers to derive schedules that guarantee at least one successful transmission within a frame. Similarly, [3] uses a different algebraic structure to maximize the minimum throughput within the network in a topology-independent way.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Section 3 presents a neighbor protocol for acquiring twohop neighbor information and handling network dynamics. The protocol utilizes a similar approach to that of TSMA [3] using repetitive message transmissions. However, the neighbor protocol differs from TSMA in that it transmits short neighbor update messages using a random access scheme without acknowledgments, instead of transmitting regular data packets based on fixed codes with acknowledgments as in TSMA [12].…”
Section: Performing Organization Name(s) and Address(es)mentioning
confidence: 99%
“…A number of topology-transparent scheduling methods have been proposed [3] [10] [12] to provide conflict-free channel access that is independent of the radio connectivity around any given node. The basic idea of the topologytransparent scheduling approach is for a node to transmit in a number of time slots in each time frame.…”
Section: Introductionmentioning
confidence: 99%