• No results found

contention based access mechanism

An Approach for Improving Performance of Back off Algorithm

An Approach for Improving Performance of Back off Algorithm

... any contention-based medium access control (MAC) protocol is the mechanism to measure and resolve simultaneous contention because of dynamic topology IEEE ...for Contention ...

5

Uplink Contention Based SCMA for 5G Radio Access

Uplink Contention Based SCMA for 5G Radio Access

... multiple access (SCMA) is introduced in [3] as a new multiple access ...non-orthogonal access mode allowing overloading of the system with a large number of SCMA layers to enable massive ...a ...

6

An Energy Efficient: Media Access Control Layer Protocols Based on Contention and Channel Polling in Wireless Sensor Network (WSN)

An Energy Efficient: Media Access Control Layer Protocols Based on Contention and Channel Polling in Wireless Sensor Network (WSN)

... in contention based MAC protocols, CSMA/CA (Carrier Sense Multiple Access with Collision Avoidance) a mechanism is used which is RTS(request to send) and CTS(clear to send)/DATA handshake for ...

8

Partial Contention Free Random access Protocol for M2M communications in LTE Networks

Partial Contention Free Random access Protocol for M2M communications in LTE Networks

... is based on transmitting the data of M2M devices either in RACH message 1 (preamble) or in message 3 (terminal identification message) ...data. Access Class Barring (ACB) which is based on defining ...

7

An Adaptive Slot Reservation Frame for Efficient Contention Access in VeMAC-VANET

An Adaptive Slot Reservation Frame for Efficient Contention Access in VeMAC-VANET

... The contention-based reservation mechanism in FPRP and showed that slots are not fully utilized because nodes can only contend for one slot in an information ...improved contention ...

8

A dynamic adjustable contention period mechanism and adaptive backoff process to improve the performance for multichannel mesh deterministic access in wireless mesh LAN

A dynamic adjustable contention period mechanism and adaptive backoff process to improve the performance for multichannel mesh deterministic access in wireless mesh LAN

... mesh access (SMA) mechanism based on MDA, while SMA has better anti-interference ability than ...to access its own MDA opportunity ...handshaking mechanism to reduce hidden node ...

13

Performance of Random Contention PRMA: A Protocol for Fixed Wireless Access

Performance of Random Contention PRMA: A Protocol for Fixed Wireless Access

... during access contention, [5] proposed a minis- lotted PRMA ...is based on assigning a pair of dedicated control minislots in the call set-up phase for each terminal, the contention ...

7

A REVIEW ON A MAC PROTOCOL  FOR UNDERWATER  A COUSTIC NETWORK

A REVIEW ON A MAC PROTOCOL FOR UNDERWATER A COUSTIC NETWORK

... Contention based MAC protocols in terrestrial network is ALOH slotted ALOHA, CSMA/CA (Carrier Sense Multiple Access wit Collision Avoidance), and IEEE ...for contention-free mode because this ...

10

Access Point-Coordinated Contention Resolution for Channel Access in Wireless LANs

Access Point-Coordinated Contention Resolution for Channel Access in Wireless LANs

... channel access to wireless stations (STAs) through the Carrier Sense Multiple Access/ Collision avoidance (CSMA/CA) ...is contention-based and results in high competition over the shared ...

56

Investigation on IEEE 802  16m Networks under Developed Error Model

Investigation on IEEE 802 16m Networks under Developed Error Model

... the contention window up to maximum contention window on collision and the backoff window is set to minimum contention window on ...TBEB based contention resolution, the MS’s transmit ...

5

Bayes Timeslot Utilization for Efficient Contention Access in VeMAC-VANET

Bayes Timeslot Utilization for Efficient Contention Access in VeMAC-VANET

... The contention-based reservation mechanism in FPRP and showed that slots are not fully utilized because nodes can only contend for one slot in an information ...improved contention ...

5

A cross layer approach in support of 
		real time data over wireless sensor networks

A cross layer approach in support of real time data over wireless sensor networks

... a contention-based medium access control mechanism, and a network layer forwarding mechanism working together to achieve high transmission reliability and low energy consumption, ...

10

Model updating mechanism of concept drift detection in data stream based on classifier pool

Model updating mechanism of concept drift detection in data stream based on classifier pool

... In many real problems, concepts often change over time and the system may not be able to possibly store all the data. Often, these changes make the model, which is built on old data, unable to adapt to the new data, and ...

7

Scalable authorization in role-based access control using negative permissions and remote authorization

Scalable authorization in role-based access control using negative permissions and remote authorization

... contract based, to access its new project ...to access new proposal ...constraints mechanism with each access permission ...support access control constraints at a single ...

78

A Survey on Access Control in the Age of IoT

A Survey on Access Control in the Age of IoT

... Access Control) [36], RBAC (Role-Based Access Control) is also a policy mechanism which are based 240. on the role of users in the system and the permissions given to them [37][r] ...

12

A Cross Layer Solution to Address TCP Intra-flow Performance Degradation in Multihop Ad hoc Networks

A Cross Layer Solution to Address TCP Intra-flow Performance Degradation in Multihop Ad hoc Networks

... The authors in [8] showed that due to the spatial reuse and transmission interference property of the IEEE 802.11 MAC layer protocol in a chain topology, a sensible choice is to set TCP congestion window to 1 4 h, where ...

12

The mechanism of dividend distribution and management equity ratio interaction based on wireless network mode

The mechanism of dividend distribution and management equity ratio interaction based on wireless network mode

... Within the listed companies, there is no effective mainten- ance of the rights and interests of small and medium inves- tors, and even some companies are still trying to avoid the legal rights and interests of legal ...

9

An Introduction to HIPAA and how it relates to docstar

An Introduction to HIPAA and how it relates to docstar

... • Internal Audit – The standard suggests companies audit logins, file accesses, security incidents, etc. docSTAR has mechanisms for auditing all types of document access. In docSTAR, the auditing capabilities were ...

7

A Location based Secure Access Control Mechanism for Geospatial Data

A Location based Secure Access Control Mechanism for Geospatial Data

... To access GIS data users from all areas register themselves on the database with some specific ...UserID based on the identity attribute, it decides their ...authorization mechanism used in this ...

5

Access Control Based Privacy Protection Mechanism In Knowledge Extraction

Access Control Based Privacy Protection Mechanism In Knowledge Extraction

... “Privacy is a state in which one is not observed or disturbed by other people” Privacy protection policy is an approach to isolate the sensitive information from unauthorized access. To balance the competing goals ...

6

Show all 10000 documents...

Related subjects