• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
He Yuan, Zheng Xiaolong. Research on Wireless Network Co-Existence at 2.4 GHz[J]. Journal of Computer Research and Development, 2016, 53(1): 26-37. DOI: 10.7544/issn1000-1239.2016.20150654
Citation: He Yuan, Zheng Xiaolong. Research on Wireless Network Co-Existence at 2.4 GHz[J]. Journal of Computer Research and Development, 2016, 53(1): 26-37. DOI: 10.7544/issn1000-1239.2016.20150654

Research on Wireless Network Co-Existence at 2.4 GHz

More Information
  • Published Date: December 31, 2015
  • In the information era, the great diversity of application demands calls for the adoption of different wireless communication protocols. As Internet of things (IoT) has gotten dramatic development in recent years, those wireless protocols are included in a common networking framework. With IoT applications getting proliferated, we will witness the co-existence of multiple wireless protocols in the same space, especially in indoor environments. Due to the different communication standards, generally those co-existing protocols cannot directly share information with each other, leading to inevitable interference and degraded network performance. Co-existence of wireless protocols thus becomes a hot topic in both academic and industrial fields. Based on the survey of recent studies in wireless network co-existence, this article illuminates the root causes of the co-existence problem and analyzes its impacts on network designs and performance. The taxonomy of wireless network co-existence is presented, which categories the existing works into three classes: elimination of homogeneous interference, identification of heterogeneous interference, and cross-protocol communication. The potential research directions in this area are further discussed.
  • Related Articles

    [1]Zhang Xuguang, Chen Mingkai, Wei Xin. Ubiquitous Video Transmission Scheduling Supported by Computing Power Network[J]. Journal of Computer Research and Development, 2023, 60(4): 786-796. DOI: 10.7544/issn1000-1239.202330005
    [2]Xiang Chaocan, Cheng Wenhui, Zhang Zhao, Jiao Xianlong, Qu Yuben, Chen Chao, Dai Haipeng. Intelligent Edge Computing-Empowered Adaptive Urban Traffic Sensing Data Recovery[J]. Journal of Computer Research and Development, 2023, 60(3): 619-634. DOI: 10.7544/issn1000-1239.202110962
    [3]Li Yin, Chen Yong, Zhao Jingxin, Yue Xinghui, Zheng Chen, Wu Yanjun, Wu Gaofei. Survey of Ubiquitous Computing Security[J]. Journal of Computer Research and Development, 2022, 59(5): 1054-1081. DOI: 10.7544/issn1000-1239.20211248
    [4]Wang Taochun, Jin Xin, Lü Chengmei, Chen Fulong, Zhao Chuanxin. Privacy Preservation Method of Data Aggregation in Mobile Crowd Sensing[J]. Journal of Computer Research and Development, 2020, 57(11): 2337-2347. DOI: 10.7544/issn1000-1239.2020.20190579
    [5]Jing Yao, Guo Bin, Chen Huihui, Yue Chaogang, Wang Zhu, Yu Zhiwen. CrowdTracker: Object Tracking Using Mobile Crowd Sensing[J]. Journal of Computer Research and Development, 2019, 56(2): 328-337. DOI: 10.7544/issn1000-1239.2019.20170808
    [6]Liu Jingjie, Nie Lei. Bayesian Current Disaggregation: Sensing the Current Waveforms of Household Appliances Using One Sensor[J]. Journal of Computer Research and Development, 2018, 55(3): 662-672. DOI: 10.7544/issn1000-1239.2018.20150311
    [7]Lin Xin, Li Shanping, Yang Zhaohui, Xu Jian. A Reasoning-Oriented Context Replacement Algorithm in Pervasive Computing[J]. Journal of Computer Research and Development, 2009, 46(4): 549-557.
    [8]Sun Peigang, Zhao Hai, Han Guangjie, Zhang Xiyuan, Zhu Jian. Chaos Triangle Compliant Location Reference Node Selection Algorithm[J]. Journal of Computer Research and Development, 2007, 44(12): 1987-1995.
    [9]Tang Lei, Liao Yuan, Li Mingshu, Huai Xiaoyong. The Dynamic Deployment Problem and the Algorithm of Service Component for Pervasive Computing[J]. Journal of Computer Research and Development, 2007, 44(5): 815-822.
    [10]Li Rui and Li Renfa. A Survey of Context-Aware Computing and Its System Infrastructure[J]. Journal of Computer Research and Development, 2007, 44(2): 269-276.

Catalog

    Article views (1835) PDF downloads (852) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return