• No results found

timed token MAC protocol

An optimal synchronous bandwidth allocation scheme for guaranteeing synchronous message deadlines with the timed-token MAC protocol

An optimal synchronous bandwidth allocation scheme for guaranteeing synchronous message deadlines with the timed-token MAC protocol

... Let Xi be the minimum amount of time available for node i to transmit its synchronous messages during period P,, i.e., in a time interval t, t+ Pi, then for a message set with deadlines [r] ...

14

Download
			
			
				Download PDF

Download Download PDF

... The MAC protocols for such MLANs must provide not only bounded mes- sage transmission time, as required by the hard and soft real-time tasks, but also high throughput, as de- manded by non real-time tasks that ...

12

Cycle-time properties of the timed token medium access control protocol

Cycle-time properties of the timed token medium access control protocol

... The timed token medium access control (MAC) protocol [1], [2] is suitable for real-time applications due to its special timing property of bounded token rotation ...this protocol ...

7

MAC Protocol For Wireless Cognitive Network

MAC Protocol For Wireless Cognitive Network

... existing MAC protocol does not provide ‘smart’ protocol for user since it does not have the feedback element to improve the quality of network ...

24

An Energy-Efficient Slotted MAC for the Real-time Applications in Industrial Wireless Sensor Networks

An Energy-Efficient Slotted MAC for the Real-time Applications in Industrial Wireless Sensor Networks

... We propose an optimized slot scheduling protocol that improves the energy efficiency of data transmission over industrial WSNs. In our approach, one big slot is allocated for all nodes at each tree level and ...

7

Universally  Composable  Secure  Computation  with  Corrupted  Tokens

Universally Composable Secure Computation with Corrupted Tokens

... final protocol can be executed on polynomially many inputs, where the polynomial is not apriori known to the correlated randomness generator, we must be able to produce “different” randomness for any input on ...

40

MAC protocol for underwater acoustic sensor network based on belied state space

MAC protocol for underwater acoustic sensor network based on belied state space

... The MAC protocols for the resource competition are mainly divided into handshake protocol, channel reser- vation protocol, and the corresponding improved proto- ...handshake MAC protocols ...

8

Timed Petri Net Modeling of AODV Protocol

Timed Petri Net Modeling of AODV Protocol

... Because protocol design is not yet an exact science, designers should take advantage of those tools which may aid them in validating the operation of their ...a protocol in each of these ...the ...

6

LZW Based Power Control with Distribution Uncertainty in COG MAC

LZW Based Power Control with Distribution Uncertainty in COG MAC

... ABSTRACT: Energy efficiency has been the main factor behind the design of communication protocols for battery- powered wireless sensor networks (WSNs). The energy efficiency and the performance of the protocol ...

8

Efficient MAC Protocol for MANET

Efficient MAC Protocol for MANET

... multi-channel MAC protocol that utilizes multiple channels to improve through-put in wireless ...multi-channel MAC protocols require multiple transceivers for each ...enables MAC to exploit ...

9

Energy Efficient MAC Protocol for Directional...

Energy Efficient MAC Protocol for Directional...

... is MAC. The MAC layer provide mechanism that address and control channel ...the MAC is referred to as a media access controller. MAC layer is responsible for Generating and managing beacons, ...

6

History-based MAC Protocol for Low Duty-Cycle Wireless Sensor Networks: the SLACK-MAC Protocol

History-based MAC Protocol for Low Duty-Cycle Wireless Sensor Networks: the SLACK-MAC Protocol

... (MAC) protocol for such WSNs with very low duty-cycles of 1% and ...our protocol with other protocols from the ...our protocol achieves better performance than other protocols from the ...

10

An Analysis of Emotional Maturity of Adolescent students in relation to Parent-Child Interaction of Fazilka District (Punjab)

An Analysis of Emotional Maturity of Adolescent students in relation to Parent-Child Interaction of Fazilka District (Punjab)

... IEEE 802.15.4 MAC protocol: The IEEE 802.15.4 Working Group for the drafting of a Personal Area Network Standard (WBAN) in September 2016 is approved by the Institute of Electrical and Electronic Engineers ...

6

An Efficient Collision Free Protocol for VANET

An Efficient Collision Free Protocol for VANET

... proposed protocol has the lowest packet loss rate, especially for a high AO, due to its capability to deal with the merging collision ...DTMAC protocol shows approximately ...

5

History-based MAC Protocol for Low Duty-Cycle Wireless Sensor Networks: the SLACK-MAC Protocol

History-based MAC Protocol for Low Duty-Cycle Wireless Sensor Networks: the SLACK-MAC Protocol

... In PW-MAC [8], each node wakes up according to a pseudo-random schedule, rather than according to a fixed schedule. Each node stores the parameters of the pseudo- random generators of its neighbors (which are ...

10

Effects of Medium Access Control on the Capacity of Mobile Ad Hoc Networks

Effects of Medium Access Control on the Capacity of Mobile Ad Hoc Networks

... We can divide the multiple handshakes between a sender and a receiver into two basic categories, i.e., sender-initiated and receiver-initiated. Both the two-way DATA/ACK and four-way RTS/CTS/DATA/ACK handshake of the ...

113

1652 0 stop ieee pdf

1652 0 stop ieee pdf

... The program was first run on a simple process tree, shown in Figure 3, that contained 6 unique processes and contained no forms of IPC. Table I shows the average number of seconds per request from our tests. The first ...

7

Energy Efficient Token Based MAC Protocol for Wireless Sensor Networks

Energy Efficient Token Based MAC Protocol for Wireless Sensor Networks

... the token, its parent ...acquire token from the sink, the request messages will be staged in an FCFS (first come first serve) ...the token to pass through the respective child nodes to the desired ...

7

Energy-Efficient Forest Fire Prediction Model based on Two-Stage Adaptive Duty-Cycled Hybrid X-MAC Protocol

Energy-Efficient Forest Fire Prediction Model based on Two-Stage Adaptive Duty-Cycled Hybrid X-MAC Protocol

... Synchronous and asynchronous medium access control (MAC) protocols have been proposed to reduce energy consumption, e.g. such as idle energy [3][4], which operates on the basis of a duty cycle. Traffic increases ...

13

Feedback based real-time MAC (RT-MAC) protocol for data packet streaming in wireless sensor networks

Feedback based real-time MAC (RT-MAC) protocol for data packet streaming in wireless sensor networks

... Feedback based real-time MAC (RT-MAC) protocol for data packet Feedback based real-time MAC (RT-MAC) protocol for data packet streaming in wireless sensor networks.. streaming in wirel[r] ...

156

Show all 10000 documents...

Related subjects