Comparison of typical access networks with AMOOFDM based access networks
نویسندگان
چکیده
منابع مشابه
The Role of Regulatory in Price Control and Spectrum Allocation to Competing Wireless Access Networks
With the rapid growth of wireless access networks, various providers offer their services using different technologies such as Wi-Fi, Wimax, 3G, 4G and so on. These networks compete for the scarce wireless spectrum. The spectrum is considered to be a scarce resource moderated by the spectrum allocation regulatory (“regulatory” for short) which is the governance body aiming to maximize the socia...
متن کاملRule-Based Access Control for Social Networks
Web-based social networks (WBSNs) are online communities where participants can establish relationships and share resources across the Web with other users. In recent years, several WBSNs have been adopting Semantic Web technologies, such as FOAF, for representing users’ data and relationships, making it possible to enforce information interchange across multiple WBSNs. Despite its advantages i...
متن کاملGrid-Based Multichannel Access in Vehicular Networks
In vehicular networks, vehicles exchange messages with each other as well as infrastructure to prevent accidents or enhance driver’s and passenger’s experience. In this paper, we propose a grid-based multichannel access scheme to enhance the performance of a vehicular network. To determine the feasibility of our scheme, we obtained preliminary results using the OPNET simulation tool. Keywords— ...
متن کاملContention Based Access Misbehavior in WLAN Networks
The focus of this thesis lies in investigating possible abuse of the standardized medium access protocol 802.11a within Wireless Local Area Networks (WLAN). By modifying the Contention Window (CW), a network can capture more traffic in expense of its rivals. The competing network scenarios are modeled by the use of Game Theory, applying simple and repeated form games. We argue that by modifying...
متن کاملPath-Based Access Control for Enterprise Networks
Enterprise networks are ubiquitious and increasingly complex. The mechanisms for defining security policies in these networks have not kept up with the advancements in networking technology. In most cases, system administrators define policies on a per-application basis, and subsequently, these policies do not interact. For example, there is no mechanism that allows a web server to communicate ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IOP Conference Series: Materials Science and Engineering
سال: 2019
ISSN: 1757-899X
DOI: 10.1088/1757-899x/675/1/012033