نتایج جستجو برای: medium access control mac
تعداد نتایج: 1818439 فیلتر نتایج به سال:
Medium access control is an exceedingly important aspect of the operation of any network. This is particularly true in wireless settings where the broadcast nature of the medium accentuates the need for effective medium access algorithms which provide good throughput and fairness characteristics. By far the most popular MAC techniques for wireless networks are those based on Carrier Sense Multi...
Variable environments in ad hoc networks require a joint control of physical (PHY) and medium access control (MAC) layers resources in order to optimize performance. In this paper, we propose a framework to perform such cross-layer control and optimization. The PHY layer and cross-layer engine estimate and predict the channel variations to select the users that will meet the signal-to-interfere...
The concept of wireless ATM is now being actively considered as a potential framework for nextgeneration wireless communication networks capable of supporting integrated multimedia services with different QoS requirements. Several key subsystem design issues for wired ATM and wireless networks needs to be readdressed in the scope of the wireless ATM, which has the capability to extend the stati...
The Medium Access Control (MAC) protocol of a Wireless ATM (WATM) system is a critical component as it lies between the traditional ATM layer and the RF-based physical layer whose characteristics are far from those of fibberor copper-based conventional ATM media. The constraints imposed on the MAC protocol of a WATM system lead to consider the design of a Half Duplex (HDX), point-to-multipoint,...
Cognitive radio (CR) is a promising wireless technology that provides efficient spectral usage. Medium Access Control (MAC) has an important role in several cognitive radio functions such as sensing, spectrum mobility, resource allocation and spectrum sharing. We focus on the opportunistic spectrum access (OSA) functionality of the CR network MAC layer by which the secondary users (SUs) access ...
Wireless Sensor Network (WSN) is an attractive choice for a variety of applications as no wired infrastructure is needed. Other wireless networks are not as energy constrained as WSNs, because they may be plugged into the mains supply or equipped with batteries that are rechargeable and replaceable. Among others, one of the main sources of energy depletion in WSN is communications controlled by...
We propose a simple, passive and deployable approach for fingerprinting traffic on the wired side as a solution for three critical stealth attacks in wireless networks. We focus on extracting traces of the 802.11 medium access control (MAC) protocol from the temporal arrival patterns of incoming traffic streams as seen on the wired side, to identify attacker behavior. Attacks addressed include ...
We have studied the performance of a distributed medium access control (MAC) scheme in an OFDM based powerline communication (PLC) network. Most of the existing approaches for MAC in PLC networks consider a centralized means of allocating carriers to voice and data calls. We present a distributed approach for carrier allocation where the access units choose a carrier from the set of available c...
We present in this paper a master-slave, self-organized, spontaneous, passive, and dynamic clustering algorithm embedded into the Medium Access Control (MAC) layer for Mobile Ad hoc Networks. Any mobile station gets access to the channel by executing a contention-based mechanism similar to the IEEE 802.11 Standard. However, once it seizes the channel, it establishes a temporary cluster to which...
In the last few years, the number of wireless devices has increased significantly. Today’s enterprise networks are facing challenges to manage such a large number of devices with the limited wireless resources. To increase the capacity, today’s enterprise networks use a dense deployment of Access Points (APs) [5]. In this scenario, adjacent and overlapping WiFi hotspots (AP-STA clusters, where ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید