{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,13]],"date-time":"2025-06-13T01:10:01Z","timestamp":1749777001295,"version":"3.41.0"},"reference-count":27,"publisher":"Engineering and Technology Publishing","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["JCM"],"published-print":{"date-parts":[[2016]]},"DOI":"10.12720\/jcm.11.8.710-725","type":"journal-article","created":{"date-parts":[[2016,12,2]],"date-time":"2016-12-02T08:37:45Z","timestamp":1480667865000},"source":"Crossref","is-referenced-by-count":2,"title":["P-TDMA-SYS: A TDMA System over Commodity 802.11 Hardware for Mobile Ad-Hoc Networks"],"prefix":"10.12720","author":[{"name":"School of Computer and Information, Hefei University of Technology, Hefei, 230009, China","sequence":"first","affiliation":[]},{"given":"Zechen","family":"Lin","sequence":"first","affiliation":[]},{"given":"Zhizhong","family":"Ding","sequence":"additional","affiliation":[]},{"given":"Qingxin","family":"Hu","sequence":"additional","affiliation":[]},{"given":"Shuai","family":"Tao","sequence":"additional","affiliation":[]}],"member":"4977","published-online":{"date-parts":[[2016]]},"reference":[{"doi-asserted-by":"crossref","unstructured":"[1] S. Xu and T. Saadawi, \"Revealing the problems with 802.11 medium access control protocol in multi-hop wireless ad hoc networks,\" Computer Networks, vol. 38, pp. 531-548, 2002.","key":"ref0","DOI":"10.1016\/S1389-1286(01)00273-0"},{"doi-asserted-by":"crossref","unstructured":"[2] Y. R. Kondareddy and P. Agrawal, \"Synchronized MAC protocol for multi-hop cognitive radio networks,\" in Proc. IEEE ICC, 2008, pp. 3198-3202.","key":"ref1","DOI":"10.1109\/ICC.2008.602"},{"doi-asserted-by":"crossref","unstructured":"[3] C. Perkins, E. Belding-Royer, and S. Das, \"Ad hoc on-demand distance vector (AODV) routing,\" No. RFC 3561. 2070-1721, 2003.","key":"ref2","DOI":"10.17487\/rfc3561"},{"doi-asserted-by":"crossref","unstructured":"[4] E. Jung and N. H. Vaidya, \"A power control MAC protocol for ad hoc networks,\" in Proc. 8th ACM International Conference on Mobile Computing and Networking, 2002, pp. 36-47.","key":"ref3","DOI":"10.1145\/570645.570651"},{"unstructured":"[5] S. Wu, C. Lin, Y. Tseng, and J. Sheu, \"A new multi-channel MAC protocol with on-demand channel assignment for multi-hop mobile ad hoc networks,\" in Proc. I-SPAN, 2000, pp. 232-237.","key":"ref4"},{"unstructured":"[6] R. I. M. Series, \"Technical characteristics for an automatic identification system using time division multiple access in the VHF maritime mobile frequency band,\" I. T. Union, Ed., 2014.","key":"ref5"},{"doi-asserted-by":"crossref","unstructured":"[7] V. Gabale, B. Raman, K. Chebrolu, and P. Kulkarni, \"Lit mac: Addressing the challenges of effective voice communication in a low cost, low power wireless mesh network,\" in Proc. 1st ACM Symposium on Computing for Development, 2010, p. 5.","key":"ref6","DOI":"10.1145\/1926180.1926187"},{"doi-asserted-by":"crossref","unstructured":"[8] P. Djukic and P. Mohapatra, \"Soft-TDMAC: A software TDMA-based MAC over commodity 802.11 hardware,\" in Proc. IEEE INFOCOM, 2009, pp. 1836-1844.","key":"ref7","DOI":"10.1109\/INFCOM.2009.5062104"},{"doi-asserted-by":"crossref","unstructured":"[9] A. Sharma and E. M. Belding, \"FreeMAC: Framework for multi-channel mac development on 802.11 hardware,\" in Proc. ACM Workshop on Programmable Routers for Extensible Services of Tomorrow, 2008, pp. 69-74.","key":"ref8","DOI":"10.1145\/1397718.1397734"},{"unstructured":"[10] R. K. Patra, S. Nedevschi, S. Surana, A. Sheth, L. Subramanian, and E. A. Brewer, \"WiLDNet: Design and implementation of high performance WiFi based long distance networks,\" in Proc. NSDI, 2007, p. 1.","key":"ref9"},{"unstructured":"[11] S. Leffler. (Sep 2015). Madwifi-project.org-Trac. [Online]. Available: http:\/\/madwifi-project.org\/","key":"ref10"},{"unstructured":"[12] P. Persistent, \"Environmental medicine, Part 4: Pesticides--biologically persistent and ubiquitous toxins,\" Alternative Medicine Review, vol. 5, pp. 432-447, 2000.","key":"ref11"},{"doi-asserted-by":"crossref","unstructured":"[13] D. Mills, \"Simple network time protocol (SNTP) version 4 for IPv4,\" Ipv6 and OSI, RFC2030, 1996.","key":"ref12","DOI":"10.17487\/rfc2030"},{"doi-asserted-by":"crossref","unstructured":"[14] S. Jung, K. Kini, and H. Kang, \"A bit-rate\/bandwidth scalable speech coder based on ITU-T G. 723.1 standard,\" in Proc. IEEE ICASSP, 2004, pp. I-285-8.","key":"ref13","DOI":"10.1109\/ICASSP.2004.1325978"},{"unstructured":"[15] I. Draft, \"recommendation and final draft international standard of joint video specification (ITU-T Rec. H. 264| ISO\/IEC 14496-10 AVC),\" Joint Video Team (JVT) of ISO\/IEC MPEG and ITU-T VCEG, JVTG050, vol. 33, 2003.","key":"ref14"},{"doi-asserted-by":"crossref","unstructured":"[16] M. Vanhoef and F. Piessens, \"Advanced Wi-Fi attacks using commodity hardware,\" in Proc. 30th Annu. Conf. Computer Security Applications, 2014, pp. 256-265.","key":"ref15","DOI":"10.1145\/2664243.2664260"},{"unstructured":"[17] H. Wu, S. Cheng, Y. Peng, K. Long, and J. Ma, \"IEEE 802.11 distributed coordination function (DCF): Analysis and enhancement,\" in Proc. IEEE ICC, 2002, pp. 605-609.","key":"ref16"},{"doi-asserted-by":"crossref","unstructured":"[18] S. Mangold, S. Choi, G. R. Hiertz, O. Klein, and B. Walke, \"Analysis of IEEE 802.11 e for QoS support in wireless LANs,\" IEEE Wireless Communications, vol. 10, pp. 40-50, 2003.","key":"ref17","DOI":"10.1109\/MWC.2003.1265851"},{"unstructured":"[19] AODV-UU Linux Implementation. (Mar. 2016). [Online]. Available: https:\/\/sourceforge.net\/projects\/aodvuu\/","key":"ref18"},{"unstructured":"[20] Netfilter Architecture. (Oct. 2015). [Online]. Available: http:\/\/www. netfilter.org\/documentation\/HOWTO\/netfilter-hacking-HOWTO-3.html","key":"ref19"},{"unstructured":"[21] Iptables Description and Target. (Oct. 2015). [Online]. Available: http:\/\/ipset.netfilter.org\/iptables.man.html","key":"ref20"},{"unstructured":"[22] Computer System Time. (Dec. 2015). [Online]. Available: https:\/\/ en.wikipedia.org\/wiki\/System_time","key":"ref21"},{"unstructured":"[23] iPerf. (Nov. 2015). [Online]. Available: https:\/\/iperf.fr\/","key":"ref22"},{"unstructured":"[24] Stack Overflow: Reliability of Linux kernel add_timer at resolution of one jiffy? (Dec. 2015). [Online]. Available: http:\/\/stackoverflow.com\/questions\/16920238\/reliability-of-linux-kernel-add-timer-at-resolution-of-one-jiffy\/17055867#17055867","key":"ref23"},{"doi-asserted-by":"crossref","unstructured":"[25] G. Anastasi, E. Borgia, M. Conti, and E. Gregori, \"IEEE 802.11 ad hoc networks: performance measurements,\" in Proc. 23rd International Conference on Distributed Computing Systems Workshops, 2003, pp. 758-763.","key":"ref24","DOI":"10.1109\/ICDCSW.2003.1203643"},{"unstructured":"[26] Linux Wireless: Mac80211. (Dec. 2015). [Online]. Available: https:\/\/ wireless.wiki.kernel.org\/en\/developers\/documentation\/mac80211","key":"ref25"},{"doi-asserted-by":"crossref","unstructured":"[27] S. Ha, I. Rhee, and L. Xu, \"CUBIC: A new TCP-friendly high-speed TCP variant,\" ACM SIGOPS Operating Systems Review, vol. 42, pp. 64-74, 2008.","key":"ref26","DOI":"10.1145\/1400097.1400105"}],"container-title":["Journal of Communications"],"original-title":[],"link":[{"URL":"http:\/\/www.jocm.us\/uploadfile\/2016\/0826\/20160826041445652.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,13]],"date-time":"2025-06-13T00:57:10Z","timestamp":1749776230000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.jocm.us\/index.php?m=content&c=index&a=show&catid=165&id=1011"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"references-count":27,"URL":"https:\/\/doi.org\/10.12720\/jcm.11.8.710-725","relation":{},"ISSN":["2374-4367"],"issn-type":[{"type":"print","value":"2374-4367"}],"subject":[],"published":{"date-parts":[[2016]]}}}