نتایج جستجو برای: media access control
تعداد نتایج: 1852182 فیلتر نتایج به سال:
This draft describes a protocol (RTP) suitable for the transport of real-time data, such as audio, video or simulation data. The data transport is enhanced by a control protocol designed to provide minimal control and identification functionality. A reverse control protocol provides mechanisms for monitoring quality of service and other content-specific requests. This protocol is intended for e...
In this study, we introduce a new media access control (MAC) protocol that adaptively changes time division multiple access (TDMA) frame size and slot duration in order to upgrade performance of underwater sensor networks. Throughput of underwater sensor networks is very low compared to a radio frequency (RF) network; the reason is a very long propagation delay and a very low bit rate. To solve...
With the continuing growth in network technology, the exchange of digital images and audio as well as text has become very common regardless of whether the digital content is used for commercial purpose or not. Since such digital content is easily duplicated and re-distributed, protecting copyrights and privacy is an important issue. For the protection of digital content, access control based o...
Many multicast applications, such as audio/video streaming, file sharing or emergency reporting, are becoming quite common in wireless mobile environment, through the widespread deployment of 802.11-based wireless networks. However, despite the growing interest in the above applications, the current IEEE 802.11 standard does not offer any medium access control (MAC) layer support to the efficie...
Access control models have traditionally included mandatory access control (or lattice-based access control) and discretionary access control. Subsequently, role-based access control has been introduced, along with claims that its mechanisms are general enough to simulate the traditional methods. In this paper we provide systematic constructions for various common forms of both of the tradition...
Institutional collaborative systems focus on providing the fast, and secure connections to students, teaching and non-teaching staff members. Access control is more important in these types of systems because different kind of users access the system on different levels. So a proper architecture must be there for these kinds of systems, for providing an efficient and secure system. As lot of wo...
The traditional manual way of thesis management is increasingly satisfying the demand of thesis guidance and administrative management in the information age. To improve the traditional manual undergraduate thesis writing, guidance and administrative management process in Southwest University of China, a Role-based access control (RBAC) Workflow model for thesis management is developed. In the ...
Delegation in access control takes place in the presence of an access control model, when a user is unable to perform their administratively assigned permissions. In this paper, we discuss the meanings of the word “delegation” found in the literature, focusing on its use in access control. In the context of a rolebased access control model, we survey many possible ways in which delegation can b...
The fundamental challenge in streaming media over the Internet is to transfer the highest possible quality, adhere to the media play out time constraint, and efficiently and fairly share the available bandwidth with TCP, UDP, and other traffic types. This work introduces the Streaming Media Congestion Control protocol (SMCC), a new adaptive media streaming congestion management protocol in whic...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید