• No results found

Media Access Protocol

Simulation evaluation of TMAC: A media 
		access protocol for WSN

Simulation evaluation of TMAC: A media access protocol for WSN

... control protocol access to the medium for sensor networks (WSN) based on ...TMAC protocol based on the specifications of the authors; second, a detailed performance analysis of the protocol ...

6

Power Adaptive, Spatial Distributed MAC (PowSD-MAC):A Long Distance Media Access Protocol for Air-to-Air (A2A) Communication

Power Adaptive, Spatial Distributed MAC (PowSD-MAC):A Long Distance Media Access Protocol for Air-to-Air (A2A) Communication

... MAC protocol, suitable for A2A ...MAC protocol suitable for the proposed black-box replication ...The protocol performance is evaluated and compared with tuned-up versions of IEEE ...

74

Energy Consumption Analysis of Direction Multimedia Access Control Protocol for Short Distance Communication using Optical Medium

Energy Consumption Analysis of Direction Multimedia Access Control Protocol for Short Distance Communication using Optical Medium

... D-MAC protocol is analysed in terms of energy consumption by sensor network, network burst rate, probability of successful transmission and window ...direction media access protocol is ...

7

Protocol for a systematic review of the effects of schools and school environment interventions on health: evidence mapping and syntheses

Protocol for a systematic review of the effects of schools and school environment interventions on health: evidence mapping and syntheses

... Protocol for a systematic review of the effects of schools and school environment interventions on health evidence mapping and syntheses STUDY PROTOCOL Open Access Protocol for a systematic review of[.] ...

7

Failover Cluster Nodes and ISCSI Storage Area Network on Virtualization Windows Server 2016

Failover Cluster Nodes and ISCSI Storage Area Network on Virtualization Windows Server 2016

... storage media based on the internet protocol as a link between storage servers and other servers and clients or ...storage media such as hard disk drive (HDD) or Solid State Drive (SSD) with an ...

8

A Survey Paper on Wireless Access Protocol

A Survey Paper on Wireless Access Protocol

... The Internet model makes it possible for a client to reach services on a large number of origin servers, each addressed by a unique Uniform Resource Locator (URL). The content stored on the servers is of various formats, ...

8

Novel Efficient and Secure Protocol Design for Opportunistic Networks

Novel Efficient and Secure Protocol Design for Opportunistic Networks

... routing protocol, known as JOKER, is ...routing protocol, showing its superiority in supporting a hard service like video- streaming in terms of QoE, whereas achieving an influence debilitating reduction in ...

9

61   Hack Into Your Friends Computer [ PUNISHER ] pdf

61 Hack Into Your Friends Computer [ PUNISHER ] pdf

... The next step was to obtain a password. The owners of the terminal to which the hacker had access did not know their ID; they had no need to know it because it was programmed into the terminal and sent ...

75

Performance Analysis of Proactive, Reactive and Hybrid MANET Routing Protocols on IEEE 802  11 Standard

Performance Analysis of Proactive, Reactive and Hybrid MANET Routing Protocols on IEEE 802 11 Standard

... Razan Al-Ani [2] simulated and evaluated the AODV, OLSR, GRP, TORA and DSR routing protocols to analysis the performance on basis of Throughput, Delay, and Network load. They created a network which consists of mobile ...

8

Benefit Sharing Under the Legal Regime of Indian Biodiversity System: A Critical Analysis

Benefit Sharing Under the Legal Regime of Indian Biodiversity System: A Critical Analysis

... Agreement for access to genetic resources and its commercial usage was admitted & signed between NBA and M/s. Britto Seafood Exports Pvt. Ltd. on 9th July, 2010. The company’s main trade is to produce & ...

10

Protocol for evaluation of the continuum of primary care in the case of a miscarriage in the emergency room: a mixed method study

Protocol for evaluation of the continuum of primary care in the case of a miscarriage in the emergency room: a mixed method study

... Protocol for evaluation of the continuum of primary care in the case of a miscarriage in the emergency room a mixed method study STUDY PROTOCOL Open Access Protocol for evaluation of the continuum of[.] ...

7

Partial Contention Free Random access Protocol for M2M communications in LTE Networks

Partial Contention Free Random access Protocol for M2M communications in LTE Networks

... The main operation of the proposed DQAL protocol is based on the distributed collision resolution queue. All the MDs have two counters (RQ and pRQ), where RQ is the number of collisions waiting in the queue. The ...

7

Decentralized Access Control Using LDAP (Lightweight Directory Access Protocol)

Decentralized Access Control Using LDAP (Lightweight Directory Access Protocol)

... important. Access to web applications which is connected to LAN or single host will attract other parties who have no access to the network and ...to access the application is ...can access ...

5

MCAP: Multiple Client Access Protocol

MCAP: Multiple Client Access Protocol

... or ACCESS POINT. The access point or end point available in this protocol for plug-in the different number of clients and it can for easy communicate with ...this protocol endpoint or port are ...

5

Attribute Based Access to Scalable Media

Attribute Based Access to Scalable Media

... fine-grained access control policies and dynamic cluster membership by victimization CP-ABE ...fine-grained access management supported ABE they are KP-ABE and ...the access policy is involved in the ...

7

Media Access Control Protocol for Mobile Sensor Network- Modelling Using OMNeT++ -MiXiM Network Simulator.

Media Access Control Protocol for Mobile Sensor Network- Modelling Using OMNeT++ -MiXiM Network Simulator.

... The conservation of energy and computation resources are the additional dimensions added to be included in protocol stack. The limited processing power, memory and battery life of the nodes introduces many ...

6

Programmed Aim based Secure Administration Creation through a Multilayer SDN Orchestration

Programmed Aim based Secure Administration Creation through a Multilayer SDN Orchestration

... Network encryption is a key component in the cyber security environment and is responsible for ensuring that communication between two trusted endpoints cannot be intercepted by malicious attackers. Network encryption is ...

6

Evaluation of Performance Enhancement in VANET using OFDM

Evaluation of Performance Enhancement in VANET using OFDM

... MAC protocol for multihop ad hoc wireless networks known as ...a protocol that exploits the case that neighbors overhear control messages, therefore it does not resort to network prediction, unlike most ...

8

Energy Efficient MAC Protocol for Directional...

Energy Efficient MAC Protocol for Directional...

... OSI model has seven layers structure for computing networks. The second layer of OSI model is data link layer. The main function of data link layer is to transfer the data to neighbor network nodes. The data link layer ...

6

f MAC: A Deterministic Media Access Control Protocol Without Time Synchronization

f MAC: A Deterministic Media Access Control Protocol Without Time Synchronization

... F-MAC shares with the contention based approach the lack of coordination between contending nodes for shared medium access. However, f-MAC differs from the cited contention based approaches because it is able to ...

16

Show all 10000 documents...

Related subjects