• No results found

[PDF] Top 20 Opportunistic Transmission Scheduling Using Medium Access Control Protocol

Has 10000 "Opportunistic Transmission Scheduling Using Medium Access Control Protocol" found on our website. Below are the top 20 most common "Opportunistic Transmission Scheduling Using Medium Access Control Protocol".

Opportunistic Transmission Scheduling Using Medium Access Control Protocol

Opportunistic Transmission Scheduling Using Medium Access Control Protocol

... aware Opportunistic Transmission Scheduling (DOTS) algorithm designed for underwater mobile sensor ...by using local ...expected transmission schedules by passively overhearing packet ... See full document

8

Control of A Platoon of Vehicles in Vanets using Communication Scheduling Protocol

Control of A Platoon of Vehicles in Vanets using Communication Scheduling Protocol

... communication scheduling works based on assigned priority ...The scheduling function generates binary sequences to each vehicle in order to guarantee the medium access free from ...successful ... See full document

5

Distributed Opportunistic Scheduling: A Control Theoretic Approach

Distributed Opportunistic Scheduling: A Control Theoretic Approach

... the transmission rate thresholds, we perform a joint optimization of both the thresholds and the access ...on control theory, that drives the system to the optimal point of operation ... See full document

9

Medium Access Control Protocol for Wireless Sensor Network – a Survey

Medium Access Control Protocol for Wireless Sensor Network – a Survey

... is Medium Access Control (MAC). MAC protocol tries to avoid collisions from interfering nodes, which is considered as one of the main function of these ...802.11MAC protocol for ... See full document

5

Dynamic Message Transmission Scheduling Using Can Protocol

Dynamic Message Transmission Scheduling Using Can Protocol

... field control devices connection bus which is capable of effective supporting the serial communication of the real time as well as distributed ...CAN protocol is built to operate in the Medium ... See full document

6

Modified OLSR (MOLSR) Protocol for improving optimal route selection with Dynamic MPR selection in Mobile Adhoc Network

Modified OLSR (MOLSR) Protocol for improving optimal route selection with Dynamic MPR selection in Mobile Adhoc Network

... proactive protocol called OLSR (Optimize Link State Routing Protocol), where the routes are always maintained by interchanging control overhead, namely HELLO and TC (Topology Control) ...the ... See full document

7

Improving Optimal Route Selection and Load Balancing with Dynamic MPR Selection through modified TC and HELLO Message using OLSR Protocol in Mobile Adhoc Network Prof. Amit Mishra, Sourabh Yadav

Improving Optimal Route Selection and Load Balancing with Dynamic MPR Selection through modified TC and HELLO Message using OLSR Protocol in Mobile Adhoc Network Prof. Amit Mishra, Sourabh Yadav

... routing protocol, which consists of two main protocols: proactive and reactive routing ...proactive protocol called OLSR (Optimize Link State Routing Protocol), where the routes are always maintained ... See full document

6

Cycle-time properties of the timed token medium access control protocol

Cycle-time properties of the timed token medium access control protocol

... 4. According to Lemma 1, the time elapsed in any ðn þ 1Þ successive visits ending with an early visit is bounded by T T RT plus the synchronous bandwidth used and the amount of overheads incurred in this early visit. For ... See full document

7

Performance evaluation of the SCP MAC: A medium access control protocol 
		for WSN

Performance evaluation of the SCP MAC: A medium access control protocol for WSN

... SCP-MAC uses the LPL (Low Power Listening) technique to mitigate the problem of idle listening and save energy. This strategy consists of transmitting a preamble in front of each package to notify the need for ... See full document

5

A cross layer approach in support of 
		real time data over wireless sensor networks

A cross layer approach in support of real time data over wireless sensor networks

... LERM protocol consists of a cross-layer design that involves physical layer information, a contention-based medium access control mechanism, and a network layer forwarding mechanism working ... See full document

10

Ornamental Medium Access Control Protocol (Orn-MAC) for Wireless Sensor Network
                 

Ornamental Medium Access Control Protocol (Orn-MAC) for Wireless Sensor Network  

... We consider a large amount of nodes within the 1000×1000 and 1500×1500 m2 for different test scenarios. The transmission range of user is 100 m. The sensing range of users is 30 m and an initial energy of nodes is ... See full document

6

A performance evaluation of YMAC a medium 
		access protocol for WSN

A performance evaluation of YMAC a medium access protocol for WSN

... YMAC protocol, a medium access control protocol for sensor networks (WSN) that uses multiple frequency channels for data ...YMAC protocol based on the specifications of the ... See full document

5

Energy Consumption Analysis of Direction Multimedia Access Control Protocol for Short Distance Communication using Optical Medium

Energy Consumption Analysis of Direction Multimedia Access Control Protocol for Short Distance Communication using Optical Medium

... empowering control of sensor action from base station to ...and control, machine wellbeing observing, ecological identification, and living space ... See full document

7

Medium Access Control Protocol for Wireless Sensor Networks in Harsh Environments with Directional Antennas

Medium Access Control Protocol for Wireless Sensor Networks in Harsh Environments with Directional Antennas

... systems using carrier sensing multiple access (CSMA) protocols can be improved by the use of directional antennas, due to the possibility of spatial ...CSMA protocol with directional antenna ... See full document

6

Modeling the Throughput of 1-persistent CSMA in Underwater Networks

Modeling the Throughput of 1-persistent CSMA in Underwater Networks

... Multiple Access (CSMA) is a Medium Access Control (MAC) protocol based on random access with channel sensing prior to each ...CSMA-based access protocol by ... See full document

6

Wireless Remote Control Utilizing XBee For Mobile Robot Application

Wireless Remote Control Utilizing XBee For Mobile Robot Application

... the transmission medium is through Bluetooth ...discovery protocol lets devices automatically find and start interacting with each ...exposes access and data to unauthorized users, leaving ... See full document

24

A hybrid based MAC protocol for underwater 
		acoustic sensor networks

A hybrid based MAC protocol for underwater acoustic sensor networks

... substantial Medium Access Control (MAC) protocol for underwater sensor ...of using sensor technologies in deep ...MAC protocol for time-critical ...based protocol which ... See full document

8

Acknowledgment Time Delay Approach to Optimize TCP Performance in Hybrid Networked Systems

Acknowledgment Time Delay Approach to Optimize TCP Performance in Hybrid Networked Systems

... Jimenez and Altman have promoted the use of delayed ACK techniques (DelAck) [27] [30], to improve the performance of TCP in multihop wireless ad-hoc networks. DelAck is a receiver-side solution, which reduce channel ... See full document

7

An energy aware protocol for cyclic monitoring wireless sensor networks

An energy aware protocol for cyclic monitoring wireless sensor networks

... Time synchronisation is crucial in a schedule based protocol as the nodes have to agree upon and follow the predefined schedule. A reference node is thus required. Clock drift occurs when different local clocks ... See full document

10

Development Medium Access Control Using Resource Manager

Development Medium Access Control Using Resource Manager

... It is the class of remote Ad hoc system. Ease, low power, low many-sided quality and strength are the essential gimmicks of Bluetooth. It takes a shot at Radio reappearance. Bluetooth communication extent is sorted as ... See full document

6

Show all 10000 documents...