• No results found

Medium-access Control (MAC)

Multihop Medium Access Control for WSNs: An Energy Analysis Model

Multihop Medium Access Control for WSNs: An Energy Analysis Model

... the MAC protocols’ single-hop and multihop energy consumption curves ...without medium access ...that medium access control consumes al- most 2 orders of magnitude more energy ...

18

Simulation Based Evaluation of Highway Road Scenario between DSRC/802 11p MAC Protocol and STDMA for Vehicle to Vehicle Communication

Simulation Based Evaluation of Highway Road Scenario between DSRC/802 11p MAC Protocol and STDMA for Vehicle to Vehicle Communication

... the medium access control ...the MAC by introducing different quality of service (QoS) classes for data traffic with different priorities ...The MAC layer in a traffic safety ...

17

A Survey on Real Time MAC Protocols in Wireless Sensor Networks

A Survey on Real Time MAC Protocols in Wireless Sensor Networks

... real-time medium access control protocols have been proposed for wireless sensor networks in the literature because waiting time to share medium on each node is one of main source for ...

9

Distributed medium access control with conditionally altruistic users

Distributed medium access control with conditionally altruistic users

... consider medium access control of local area networks (LANs) under limited-information conditions as befits a distributed ...multiple access (CSMA)-like random-access framework in the ...

12

Opportunistic Transmission Scheduling Using Medium Access Control Protocol

Opportunistic Transmission Scheduling Using Medium Access Control Protocol

... circumstances, Medium Access Control (MAC) protocols designed for terrestrial packet radio networks cannot be directly used because the propagation delay of acoustic signals is much greater ...

8

ARA MAC: A Qualifying Approach to improving Attack Resiliency and Adaptability in Medium Access Control Protocol for WLAN 802 11

ARA MAC: A Qualifying Approach to improving Attack Resiliency and Adaptability in Medium Access Control Protocol for WLAN 802 11

... about Medium Access Control (MAC) [15] sub layer of the OSI reference model, it provides different kind of services that suits to very different kinds of ...

10

Real Time Data Communication Medium access control (RC- MAC) Protocol for Wireless Sensor Networks (WSNs)

Real Time Data Communication Medium access control (RC- MAC) Protocol for Wireless Sensor Networks (WSNs)

... congestion control scheme, we have change the scheme and apply this scheme for medium access layer and proposed a new protocols state ...congestion control will take a part of the ...

5

A Study on Medium Access Control Protocols in Wireless Mesh Networks

A Study on Medium Access Control Protocols in Wireless Mesh Networks

... the MAC layer so that different wireless radios such as IEEE ...in MAC are focused on capacity, throughput, or ...of MAC protocols with multiple QoS metrics such as delay, packet loss ratios, and ...

7

Adaptive Resource Allocation for Wireless Body Sensor Networks

Adaptive Resource Allocation for Wireless Body Sensor Networks

... static, medium to large-scale and multi-hop networks with very few mobile nodes [144, ...and Medium Access Control (MAC) layers ...

234

Performance evaluation of the SCP MAC: A medium access control protocol 
		for WSN

Performance evaluation of the SCP MAC: A medium access control protocol for WSN

... SCP- MAC with Qualnet® and presents specific details of the models implemented in this simulation ...SCP- MAC can perform well in light traffic applications, with scalar sensors that tolerate delays, such ...

5

Evaluation of MAC in vehicular networks

Evaluation of MAC in vehicular networks

... Vehicular Ad hoc Network (VANET), a subclass of Mobile Ad hoc Network (MANET), is an important one for the intelligent transportation system (ITS).VANET, used to provide communication among vehicles and between vehicles ...

7

Enhancing Cloud Security through Access Control Models: A Survey

Enhancing Cloud Security through Access Control Models: A Survey

... different access control models like DAC, MAC, RBAC, ABAC, ABE, KP-ABE, CP- ABE, HABE, and HASBE with their characteristics, advantages and ...basic access control models from which ...

5

Lower Layer Parameters of WBAN in CASTALIA

Lower Layer Parameters of WBAN in CASTALIA

... In this sector let’s give attention to ZigbeeMAC (precisely IEEE 802.15.4 MAC). Now let’s execute this testing how ZigbeeMAC act upon when its Guaranteed Time Slot (GTS) utility is rolled on or off, also when ...

5

A MAC Scheme with QoS Guarantee for MANETs

A MAC Scheme with QoS Guarantee for MANETs

... distributed access to the wireless medium for QoS stations (QSTAs) using 8 different user priorities ...the MAC layer, each data packet re- ceived from the higher layer is assigned a specific user ...

5

Analysis of DAC MAC RBAC Access Control based Models for Security

Analysis of DAC MAC RBAC Access Control based Models for Security

... Role-based access control (RBAC), this policy is very simple to ...which access is controlled depending on the roles that the users have in a ...to control the access to computer or ...

8

f MAC: A Deterministic Media Access Control Protocol Without Time Synchronization

f MAC: A Deterministic Media Access Control Protocol Without Time Synchronization

... used, compute the time when the event was detected. This is possible as f-MAC provides a deterministic message delay. In this case no time synchronization among the nodes or additional protocol steps are ...

16

A hybrid based MAC protocol for underwater 
		acoustic sensor networks

A hybrid based MAC protocol for underwater acoustic sensor networks

... The underwater sensors differ from terrestrial sensors by means of cost, and communication methods. Since underwater has its unique characteristics, sensor devices are prudently built to prevent saltwater corrosion. The ...

8

An Efficient Collision Free Protocol for VANET

An Efficient Collision Free Protocol for VANET

... channel access delays, Ethernet became common in the industrial communication scene where many real-time systems are ...with MAC can be solved by using more network devices, such as switches and routers, ...

5

Medium Access Control with Token Approach in Wireless Sensor Network

Medium Access Control with Token Approach in Wireless Sensor Network

... Wireless sensor network (WSN) is designed based on application specific. Different application poses different quality of service (QoS) requirement. The applications in WSN that send periodic data for monitoring such as ...

7

Improving Performance of 802.11 MAC by Optimizing DCF in Mobile ad-hoc Network

Improving Performance of 802.11 MAC by Optimizing DCF in Mobile ad-hoc Network

... and access procedures of DCF ...the medium access techniques of all these technologies and suggest a common MAC protocol for them which improves efficiency and increases throughput, at the ...

5

Show all 10000 documents...

Related subjects