• No results found

MAC level access protocol

An Efficient Collision Free Protocol for VANET

An Efficient Collision Free Protocol for VANET

... its MAC access, despite that it does not support real-time ...channel access delays when using CSMA could be to use a self-organized time division multiple access (STDMA), a decentralized, yet ...

5

A MAC protocol with an improved connectivity for cognitive radio networks

A MAC protocol with an improved connectivity for cognitive radio networks

... Cognitive radio (CR) is considered as an intelligent technology and an important part of the next fifth generation wireless systems. It promises a great utilization of the radio spectrum, and it enables more subscribers ...

9

A Survey: MAC Layer Protocol for Wireless Sensor Networks

A Survey: MAC Layer Protocol for Wireless Sensor Networks

... 211 In pursuit of low computational cost requirements of wireless CDMA sensor networks, there has been limited effort to investigate source and modulation schemes, particular signature waveforms, designing simple ...

9

Improvisation of MAC Protocol for Wireless Sensor Network

Improvisation of MAC Protocol for Wireless Sensor Network

... This paper propose a novel channel access scheme, IMAC, which exploits the application specific characteristics of sensor networks to meet their power, energy efficiency and delay. The basic assumption of IMAC is ...

6

Performance evaluation of the SCP MAC: A medium access control protocol 
		for WSN

Performance evaluation of the SCP MAC: A medium access control protocol for WSN

... As expected, for intervals between the generation of small packets, the delay experienced is not only greater, but also has greater variability. This is due to the fact that at a higher frequency of traffic generation, ...

5

Bit Level Synchronized MAC Protocol for Multireader RFID Networks

Bit Level Synchronized MAC Protocol for Multireader RFID Networks

... the protocol is the use of the same frame size by all readers when ...BLSync protocol are sequentially sent by one reader after another, each reader first acknowledges tags in its range before it is the ...

15

A Joint Beamforming based SDMA Protocol for IEEE 802.11n Downlink

A Joint Beamforming based SDMA Protocol for IEEE 802.11n Downlink

... wireless access in the past few years, and will achieve sustained and rapid growth with the acceleration of 4G ...media access control (MAC) ...basic MAC protocol, distributed ...

5

Performance Evaluation of Priority based Contention MAC in Mobile Ad Hoc Networks

Performance Evaluation of Priority based Contention MAC in Mobile Ad Hoc Networks

... based MAC (Medium Access Protocol) to support quality of service in MANET (Mobile Ad hoc Networks) ...adequately. MAC is the base layer, which is required to catch up the system performance ...

5

A Survey on Real Time MAC Protocols in Wireless Sensor Networks

A Survey on Real Time MAC Protocols in Wireless Sensor Networks

... real-time MAC protocol for wireless sensor ...this protocol proposes a tree structure that the packets could flow continuously from leaf-level nodes to the top-level ...contention ...

9

Energy-Efficient Secure Key Distribution System in Hierarchical Wireless Sensor Networks

Energy-Efficient Secure Key Distribution System in Hierarchical Wireless Sensor Networks

... media access control (MAC) protocols are ...of MAC protocol are not enough to protect the WSNs from Denial-of-Sleep attack in MAC ...the MAC protocol in argue against the ...

8

Power Adaptive, Spatial Distributed MAC (PowSD-MAC):A Long Distance Media Access Protocol for Air-to-Air (A2A) Communication

Power Adaptive, Spatial Distributed MAC (PowSD-MAC):A Long Distance Media Access Protocol for Air-to-Air (A2A) Communication

... POWer) level at which the network is ...power level selected for the node is the smallest power level whose routing table has the same number of entries as that of the routing table at the maximum ...

74

Reliable Energy Aware MAC Protocol for Wireless Body Bio Sensor Networks

Reliable Energy Aware MAC Protocol for Wireless Body Bio Sensor Networks

... Medium Access Control (REA-MAC) protocol for Wireless Body Bio-Sensor Networks ...This protocol employs Time Division Multiple Access (TDMA) approach for channel access with ...

5

A Study of Vanet Security Issues and Protocols

A Study of Vanet Security Issues and Protocols

... This paper provided a brief idea about vehicular ad hoc network ,various attacks on it and security requirements for vanet. It also analyzed and compared various vanet security related protocols. All the protocols ...

5

Efficient Energy Consumption in MANET by AODV ERR

Efficient Energy Consumption in MANET by AODV ERR

... The sequence numbers helps to avoid cycles in a route. When the intermediate node receives a RREQ message and if its routing table comprises of routing information to the destination then it responds with a RREP message. ...

8

Ornamental Medium Access Control Protocol (Orn-MAC) for Wireless Sensor Network
                 

Ornamental Medium Access Control Protocol (Orn-MAC) for Wireless Sensor Network  

... As per the Table 2 and Figure 1 it can be seen that throughput has been increases because of using the relay concept. Better alternative paths have been obtainable using relay nodes and relay paths. Number of nodes has ...

6

f MAC: A Deterministic Media Access Control Protocol Without Time Synchronization

f MAC: A Deterministic Media Access Control Protocol Without Time Synchronization

... medium access. However, f-MAC differs from the cited contention based approaches because it is able to prevent message losses due to collisions with 100% ...

16

Energy-Efficient Forest Fire Prediction Model based on Two-Stage Adaptive Duty-Cycled Hybrid X-MAC Protocol

Energy-Efficient Forest Fire Prediction Model based on Two-Stage Adaptive Duty-Cycled Hybrid X-MAC Protocol

... Synchronous and asynchronous medium access control (MAC) protocols have been proposed to reduce energy consumption, e.g. such as idle energy [3][4], which operates on the basis of a duty cycle. Traffic ...

13

chapter10_trusted_systems.pdf

chapter10_trusted_systems.pdf

... an object of greater or equal security level (MAC 2) an object of greater or equal security level (MAC 2) ds-property: a user may grant another access based on ds-property: a user may g[r] ...

41

Adaptation of SMAC Protocol with Adaptive Listening for Wireless Sensor Networks

Adaptation of SMAC Protocol with Adaptive Listening for Wireless Sensor Networks

... The sender receives acknowledgment for each fragment as receiver sends acknowledgment. If sender does not receive the acknowledgement correspond to fragment then it needs to be retransmitted. Using one RTS and CTS ...

6

A Multichannel MAC Protocol for IoT-enabled Cognitive Radio Ad Hoc Networks

A Multichannel MAC Protocol for IoT-enabled Cognitive Radio Ad Hoc Networks

... Multiple Access (TDMA) schemes, as a method to optimize resource utilization, each node is assigned a time slot to avoid collisions caused by ...Multiple Access” (D-PRMA) scheme, in which higher ...

11

Show all 10000 documents...

Related subjects