Cited 8 time in
Evaluation of the Effects of a Grouping Algorithm on IEEE 802.15.4 Networks with Hidden Nodes
| DC Field | Value | Language |
|---|---|---|
| dc.contributor.author | Um, Jin-Yeong | - |
| dc.contributor.author | Ahn, Jong-Suk | - |
| dc.contributor.author | Lee, Kang-Woo | - |
| dc.date.accessioned | 2024-08-08T01:02:31Z | - |
| dc.date.available | 2024-08-08T01:02:31Z | - |
| dc.date.issued | 2014-02 | - |
| dc.identifier.issn | 1229-2370 | - |
| dc.identifier.issn | 1976-5541 | - |
| dc.identifier.uri | https://scholarworks.dongguk.edu/handle/sw.dongguk/15115 | - |
| dc.description.abstract | This paper proposes hidden-node aware grouping (HAG) algorithm to enhance the performance of institute of electrical and electronics engineers (IEEE) 802.15.4 networks when they undergo either severe collisions or frequent interferences by hidden nodes. According to the degree of measured collisions and interferences, HAG algorithm dynamically transforms IEEE 802.15.4 protocol between a contention algorithm and a contention-limited one. As a way to reduce the degree of contentions, it organizes nodes into some number of groups and assigns each group an exclusive per-group time slot during which only its member nodes compete to grab the channel. To eliminate harmful disruptions by hidden nodes, especially, it identifies hidden nodes by analyzing the received signal powers that each node reports and then places them into distinct groups. For load balancing, finally it flexibly adapts each per-group time according to the periodic average collision rate of each group. This paper also extends a conventional Markov chain model of IEEE 802.15.4 by including the deferment technique and a traffic source to more accurately evaluate the throughput of HAG algorithm under both saturated and unsaturated environments. This mathematical model and corresponding simulations predict with 6% discrepancy that HAG algorithm can improve the performance of the legacy IEEE 802.15.4 protocol, for example, even by 95% in a network that contains two hidden nodes, resulting in creation of three groups. | - |
| dc.format.extent | 11 | - |
| dc.language | 영어 | - |
| dc.language.iso | ENG | - |
| dc.publisher | KOREAN INST COMMUNICATIONS SCIENCES (K I C S) | - |
| dc.title | Evaluation of the Effects of a Grouping Algorithm on IEEE 802.15.4 Networks with Hidden Nodes | - |
| dc.type | Article | - |
| dc.publisher.location | 대한민국 | - |
| dc.identifier.doi | 10.1109/JCN.2014.000011 | - |
| dc.identifier.scopusid | 2-s2.0-84897848466 | - |
| dc.identifier.wosid | 000337725600009 | - |
| dc.identifier.bibliographicCitation | JOURNAL OF COMMUNICATIONS AND NETWORKS, v.16, no.1, pp 81 - 91 | - |
| dc.citation.title | JOURNAL OF COMMUNICATIONS AND NETWORKS | - |
| dc.citation.volume | 16 | - |
| dc.citation.number | 1 | - |
| dc.citation.startPage | 81 | - |
| dc.citation.endPage | 91 | - |
| dc.type.docType | Article | - |
| dc.identifier.kciid | ART001849324 | - |
| dc.description.isOpenAccess | N | - |
| dc.description.journalRegisteredClass | sci | - |
| dc.description.journalRegisteredClass | scie | - |
| dc.description.journalRegisteredClass | scopus | - |
| dc.description.journalRegisteredClass | kci | - |
| dc.relation.journalResearchArea | Computer Science | - |
| dc.relation.journalResearchArea | Telecommunications | - |
| dc.relation.journalWebOfScienceCategory | Computer Science, Information Systems | - |
| dc.relation.journalWebOfScienceCategory | Telecommunications | - |
| dc.subject.keywordAuthor | Analytical models | - |
| dc.subject.keywordAuthor | grouping algorithms | - |
| dc.subject.keywordAuthor | hidden nodes (HN) | - |
| dc.subject.keywordAuthor | IEEE 802.15.4 | - |
| dc.subject.keywordAuthor | sensor networks | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
30, Pildong-ro 1-gil, Jung-gu, Seoul, 04620, Republic of Korea+82-2-2260-3114
Copyright(c) 2023 DONGGUK UNIVERSITY. ALL RIGHTS RESERVED.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.
