• Aucun résultat trouvé

MAC protocols

Splitting algorithm for DMT optimal cooperative MAC protocols in wireless mesh networks

Splitting algorithm for DMT optimal cooperative MAC protocols in wireless mesh networks

... Fig. 1. Cooperation scenario with three relay terminals. different space–time codes (STCs), the overhead induced by the allocation of STCs to relay terminals is not taken into account in the DMT computation [2]. ...

10

TDMA-based MAC Protocols for Vehicular Ad Hoc Networks: A Survey, Qualitative Analysis and Open Research Issues

TDMA-based MAC Protocols for Vehicular Ad Hoc Networks: A Survey, Qualitative Analysis and Open Research Issues

... the MAC in a vehicular network is a challenging task due to the high speed of the nodes, the frequent changes in topology, the lack of an infrastructure, and various QoS ...control protocols have been ...

37

A Generic Framework for Modeling MAC Protocols in Wireless Sensor Networks

A Generic Framework for Modeling MAC Protocols in Wireless Sensor Networks

... the MAC layer to reduce unnecessary data ...of MAC protocols in the context of low data- rate WSNs regarding various network parameters such as the network density and the ...each MAC, making ...

14

Adaptive Hybrid MAC Protocols for UAV-Assisted Mobile  Sensor Networks

Adaptive Hybrid MAC Protocols for UAV-Assisted Mobile Sensor Networks

... novel MAC protocols for an unmanned aerial vehicle (UAV) aided mobile wireless sensor ...based MAC schemes combing CSMA/CA with physical parameters based ...scheduling MAC to an beacon-based ...

5

Adaptive Hybrid MAC Protocols for UAV-Assisted Mobile  Sensor Networks

Adaptive Hybrid MAC Protocols for UAV-Assisted Mobile Sensor Networks

... novel MAC protocols for an unmanned aerial vehicle (UAV) aided mobile wireless sensor ...based MAC schemes combing CSMA/CA with physical parameters based ...scheduling MAC to an beacon-based ...

6

Analysis of MAC protocols for Underwater Acoustic Data Networks

Analysis of MAC protocols for Underwater Acoustic Data Networks

... C. Media Access Protocol In this section, we present some currently proposed MAC protocols for underwater acoustic data networks. 1) Adapted MACA to underwater acoustic networks: In [4][8], the authors ...

6

On-Demand Cooperation MAC Protocols with Optimal Diversity-Multiplexing Tradeoff

On-Demand Cooperation MAC Protocols with Optimal Diversity-Multiplexing Tradeoff

... tive MAC protocols rely on the exchange of modified Request-to-Send (RTS) and Clear-to-Send (CTS) signa- ling frames [13], [15], ...cooperative protocols, the study of which is left for future ...

7

Technical Report: Energy Evaluation of Preamble Sampling MAC Protocols for Wireless Sensor Networks

Technical Report: Energy Evaluation of Preamble Sampling MAC Protocols for Wireless Sensor Networks

... The method periodically adapts local organization of channel access depending on network dynamics such as the number of active users and the instantaneous traffic load. In LA-MAC, nodes periodically alternate long ...

27

Technical Report: Energy Evaluation of Preamble Sampling MAC Protocols for Wireless Sensor Networks

Technical Report: Energy Evaluation of Preamble Sampling MAC Protocols for Wireless Sensor Networks

... The method periodically adapts local organization of channel access depending on network dynamics such as the number of active users and the instantaneous traffic load. In LA-MAC, nodes periodically alternate long ...

31

CROMA: An Enhanced Slotted MAC Protocol for MANETs

CROMA: An Enhanced Slotted MAC Protocol for MANETs

... based MAC protocols can provide a very good utilization of the shared radio resources, especially at high input loads, in synchronized mobile ad hoc networks ...

37

Réseaux de capteurs sans fil linéaires : Etude comparative entre un protocole MAC basé sur des jetons circulants et un protocole MAC basé sur la contention

Réseaux de capteurs sans fil linéaires : Etude comparative entre un protocole MAC basé sur des jetons circulants et un protocole MAC basé sur la contention

... Suitable MAC protocols for LSN must take into account the linearity in order to ensure reliability and optimize parameters such as the end-to-end delay, the delivery ratio, the throughput, ...Based ...

10

RIC-MAC: a MAC Protocol for Low-Power Cooperative Wireless Sensor Networks

RIC-MAC: a MAC Protocol for Low-Power Cooperative Wireless Sensor Networks

... real MAC protocols, ...complex MAC protocol of the cooperative relay system with many packet transmissions for establishing the rendez-vous between nodes, obviously gets into trouble for high traffic ...

7

SLACK-MAC: Adaptive MAC Protocol for Low Duty-Cycle Wireless Sensor Networks

SLACK-MAC: Adaptive MAC Protocol for Low Duty-Cycle Wireless Sensor Networks

... Fig. 6. Duty-cycle (which is an approximation of the consumed energy) as a function of the traffic generation period, for a duty-cycle of 1%, and for several protocols. to determine the next activation times, ...

13

The Abstract MAC Layer

The Abstract MAC Layer

... are fixed (e.g., the network is static) and undirected. (In Section 8, we describe recent research efforts to define abstract MAC layer definitions for a variety of physical layer assumptions. We refer the reader ...

32

Counting with Population Protocols

Counting with Population Protocols

... IV. R ELATED W ORK The population protocol model was formalized by Angluin et al. [2]. Since then, there has been a lot of work on population protocols, and among them the closest to our work compute majority, ...

9

MAC-BC duality with linear-feedback schemes

MAC-BC duality with linear-feedback schemes

... Gaussian MAC and BC with perfect feedback [2], [3], [4], [5], [6], [7], [8], [9] are linear-feedback ...Gaussian MAC [2], [3] linear- feedback schemes even achieve the entire capacity ...

6

Listen! Listen! LIsten! : Jackson Mac low's phonopoetics

Listen! Listen! LIsten! : Jackson Mac low's phonopoetics

... though Mac Low calls the work “Syllable ...in Mac Low’s work in that they are his first poems organized by what John Cage called “chance ...Cage, Mac Low began to explore ways in which he could ...

19

Towards Secure TMIS Protocols

Towards Secure TMIS Protocols

... (TMIS) protocols aim at authenticating a patient in a telecare context, and permitting information exchange between the patient and a distant server through a ...

9

Counting with Population Protocols

Counting with Population Protocols

... IV. R ELATED W ORK The population protocol model was formalized by Angluin et al. [2]. Since then, there has been a lot of work on population protocols, and among them the closest to our work are related to the ...

9

Mic-Mac

Mic-Mac

... Le problème du passage du niveau d’analyse microéconomique (l’individu, l’entreprise etc.) au niveau d’analyse macroéconomique (la société, la nation) ne va pas de soi et se [r] ...

5

Show all 424 documents...

Sujets connexes