Page 1. UNIVERSITY OF CALIFORNIA SANTA CRUZ ANALYTICAL MODELING OF MEDIUM ACCESS CONTROL PROTOCOLS ...
DTIC Science & Technology
Page 1. Modelling of Medium Access Control (MAC) Protocols for Mobile Ad-hoc Networks ... Page 3. Modelling of Medium Access Control (MAC) ...
... Accession Number : ADA242078. Title : Internetworking with Internet Protocol (IP) and Transmission Control Protocol (TCP) within the Military. ...
... Accession Number : ADD807988. Title : Simulation of Multiple Access Protocols for Real-Time Control. Descriptive Note : Journal article,. ...
... Accession Number : ADA436154. Title : Modelling of Medium Access Control (MAC) Protocols for Mobile Ad-Hoc Networks. ...
... Accession Number : ADA355771. Title : A Protocol for Building a Network Access Controller (NAC) for "IP over ATM". Descriptive ...
... Accession Number : ADA393295. Title : The RATS Control Protocol (RCP). Descriptive Note : Technical note. Corporate ...
Page 1. Medium-Access Control Protocols for Heterogeneous Mobile Ad Hoc Networks with Directional Antennas Dan Noneaker ...
extensive lunar colonization occurs. IV. Protocol Technologies. J. Transport Control Protocol/Internet Protocol. (TCP/IP). The Transport Control Protocol (TCP) ...
NASA Website
Page 1. A Real-time Wireless Sensor Media Access Control (MAC) Protocol ... A Real-time Wireless Sensor Media Access Control (MAC) Protocol ...
... Accession Number : ADA386602. Title : Transmission Control Protocol (TCP) Over Asynchronous Transfer Mode (ATM): A Simulation Study. ...
f-MAC: A Deterministic Media Access Control Protocol Without Time Synchronization Utz Roedig, Andre network transmit messages through a shared medium. Thus, a Media Access Control (MAC) protocol is neces a deterministic MAC protocol which can give ...
E-print Network
Access control programs (ACPs) permit controlled delegation of access rights to untrusted computer hosts. Existing delegation protocols for distributed systems provide a way for a client to transfer its access rights to an intermediary, but provide only l...
National Technical Information Service (NTIS)
... Accession Number : ADA154033. Title : LAN (Local Area Network) Interoperability Study of Protocols Needed for Distributed Command and Control. ...
... Accession Number : ADA272578. Title : Environmental Compliance Assessment Protocol-Centers for Disease Control and Prevention (ECAP-CDC). ...
ATM based passive optical networks can provide broadband services as defined by the international telecommunication union. The medium access control protocol is of great importance to the access scheme as it controls the flow of traffic in the access network. This paper ...
NASA Astrophysics Data System (ADS)
... objective of Gothic, a group access control architecture developed at the Georgia Institute of Technology [JuA02]. There ...
... that are available in the Microsoft Windows 2000 ... SYSTEMS MANAGEMENT, COMMUNICATIONS PROTOCOLS, COMPUTER ACCESS CONTROL ...
... confronted with difficult or impossible obstacles sometimes associated with wired networks such as routing cables and spontaneous ad hoc LANs. ...
This paper deals with the influence of the medium access control (MAC) protocol in the performance of the communication channels used in the SCADA systems (Supervisory Control and Data Acquisition). Three types of MAC protocols are presented and analyzed: Polling, CSMA/CD (Carrier Sense ...
Energy Citations Database
This letter proposes a dynamic bandwidth allocation algorithm for access networks based PON (Passive Optical Network). It considers the mixture of transport layer protocols when responding to traffic congestion at the SNI (Service Node Interface). Simulations on a mixture of TCP (Transmission Control Protocol), and ...
This thesis focuses on the medium access control (MAC) layer. Many MAC protocols for wireless networks proposed or implemented to date are based on collision-avoidance handshakes between sender and receiver. The key objective of collision-avoidance handsh...
This paper surveys and describes some of the existing media access control and data link layer technologies for possible application in lunar surface communications and the advanced wideband Direct Sequence Code Division Multiple Access (DSCDMA) conceptua...
The HORNET (hybrid optoelectronic ring network) architecture is a packet-over-WDM ring network that utilizes fast-tunable packet transmitters and wavelength routing to enable it to scale cost-effectively to ultrahigh capacities. Here we present the design of a novel control-channel-based media-access-control (MAC) protocol, which is ...
Improvements in networking allow for increasingly complex collaboration environments with regard to session scale, range of shared tasks, and distance between remote parties. Floor control protocols add an access discipline to such environments that allow...
Object access is a tool that is feasible for interoperability of telescope operations. Different subsystems need to be accessed in a standardized way. Simple Object Access Protocol, SOAP, provides the core of this approach. Web Services is the wider context of this peer-to-peer protocol. A ...
We describe a new class of directory coherence protocols called delta coherence protocols that use network guarantees to support a new and highly concurrent approach to maintain a consistent shared memory. Delta coherence protocols are more concurrent than other coherence protocols in that they allow processes to ...
DOE Information Bridge
This paper addresses the design of distributed cognitive medium access control (MAC) protocols for opportunistic spectrum access (OSA) under an energy constraint on the secondary users. The objective is to maximize the expected number of information bits ...
The paper describes and analyzes a novel Media Access Control (MAC) protocol named Distributed-Control Polling (DCP), which has been designed to bring together the most interesting features of distributed-control MAC protocols and centralized token-passin...
automobile emergency application of German car company Electronic signature architecture of German insurance protocol for German Telekom Analysis of SAP access control configurations for German bank Telematic
... ACC also produces a Multi-Channel Direct Memory Access (MDMA) controller for the LSI-II. The MDMA allows the attachment ...
... 5-3 Table 5-1 XQ/CP: MDMA RCSR (Receive Control and Status Register ..... ... QBUS, the use of a Multichannel Direct Memory Access (MDMA) ...
... ACC also produces a Multi-Channel Direct Memory Access (MDMA) controller for the LSI-11. The MDMA allows the attachment ...
... of Electrical and Electronics Engineers (IEEE) 802.11 Standard Medium Access Control Protocol for Wireless Local Area Networks (LANS) on a ...
... extend the energy-efficiency of an existing protocol. ... topology and placement of nodes plays a critical role in energy-efficiency [DKK03]. Additional ...
249, ESN-1350, The ECS LANs shall provide physical devices and the corresponding medium access control (MAC) protocol compatible with ISO and ANSI standards ...
� 2009 Gaylord et al; licensee BioMed Central Ltd. This is an Open Access article distributed under the terms of the Creative Commons Attribution License
A communication protocol that provides link-level and media access control (MAC) level functions for wireless (e.g., ad-hoc) networks and is robust to mobility or other dynamics, and for scaling to dense networks. In a mobile or otherwise dynamic network,...
... Accession Number : ADA123208. Title : Internet Protocol. DARPA Internet Program Protocol Specification. Corporate Author ...
... Accession Number : ADA123207. Title : Internet Protocol. DARPA Internet Program Protocol Specification. Corporate Author ...
... Accession Number : ADA123202. Title : Internet Protocol, DARPA Internet Program Protocol Specification. Corporate Author ...
In this paper, two wireless broadband access and accounting schemes were introduced. There are some differences in the client and the access router module between them. In one scheme, Secure Shell (SSH) protocol is used in the access system. The SSH server makes the authentication based on private key cryptography. ...
Analyzing MAC Protocols for Low Data-Rate Applications KOEN LANGENDOEN Delft University a whole range of spe- cialized Medium Access Control (MAC) protocols. They differ in how performance with each outperforming the canonical S-MAC protocol, but with different simulators, hardware platforms
Computer systems being incorporated into mature support networks are facing a substantial protocol-implementation effort in granting controlled access to their resources and in obtaining access to network-supplied resources. This protocol-implementation effort can be significantly reduced by ...
A hybrid multiple access protocol (HYMAP) was proposed by Rios and Georganas (1985), combining the best features of CSMA/CD and of a conflict-free protocol. Control is transferred from one protocol to the other according to state information sensed on the channel. The performance of HYMAP was ...
COLLABORATION Group coordination mechanisms, such as floor control, support fair access to shared and maintain a sep- arate logical control geometry for group coordina- tion purposes. Furthermore The core operational parameters of a floor-control protocol are s a session identifier, s a ...
In this paper, we propose a tamper resistant prescription RFID access control protocol for different authorized readers. Not only the authentication mechanism but also the access right authorization mechanism is designed in our scheme. Only the specific doctor, usually the patient's doctor, can ...
PubMed
The implementation of communication protocols on silicon integrated circuits for access control is considered. The field of application is the European PROMETHEUS (Program for European Traffic with Highest Efficiency and Unprecedented Safety) project. The design of communication circuits for network access ...
IEEE Standard 802.4--1984 defines a local area network protocol based on the concept of token-passing for controlling access to a broadcast medium. A performance analysis of such a network using simulation techniques has been conducted. Performance is cha...
member- ship, failure detection, attack detection, group access control, and secure intermemberC3 GACP: Group Access Control Protocol GACP GACP GACPGACP SICP SICP SICP SICP Group SICP Figure 1 of this middleware is a group communication service that comprises of six network ...
Task Delegation Based Access Control Models for Workflow Systems Khaled Gaaloul1 and Fran is that of task delegation. Task delegation is a mechanism that supports organisational flexibility, and ensures. Moreover, we present a fine grained access control protocol to support delegation based on ...
system, a group authorization and access control mechanism, and a group key agreement protocol to provide implementation are dis- cussed. Keywords: security, group communication, group autho- rization and access control partitions and voluntary member- ship changes. ...
In open environments such as peer-to-peer (P2P) systems, the decision to collaborate with multiple users � e.g., by granting access to a resource � is hard to achieve in practice due to extreme decentralization and the lack of trusted third parties. The literature contains a plethora of applications in which a scalable solution for distributed access ...
Abstract- This paper describes a medium access control protocol for wireless sensor networks designed for broadcast communication. The RI-MAC (Random Interference Medium Access Control) protocol uses random slot assignment in each MAC frame, along with knowledge of ...
Although biometrics can be an useful component for access control, the security they procure is often overestimated, as if they were a magic tool whose simple use will automatically prevent each and every type of attack. Biometrics are not secure unless they are embedded in a strong cryptographic protocol, whose design pays special ...
We study the effect of routing protocols on the performance of media access control (MAC) protocols in wireless radio networks. Three well known MAC protocols: 802.11, CSMA, and MACA are considered. Similarly three recently proposed routing protocols: AODV, DSR and LAR ...
This dissertation deals with new approaches to concurrency control that improve system throughput, and discusses some performance issues in data base systems. Firstly, the concurrency control problem is introduced, and some well-known solutions illustrated. The disadvantages of standard approaches to the problem are stated and some newer techniques ...
Floor control allows users of networked multimedia applications to remotely share resources like cursors, data views, video and audio channels, or entire applications without access conflicts. Floors are mutually exclusive permissions, granted dynamically...
This is an Open Access article distributed under the terms of the Creative Commons Attribution License
Performance Enhancement of IEEE 802.11b WLANs Using Cooperative MAC Protocol Jin-Seong Kim and Tae a new cooperative Medium Access Control (MAC) protocol to rem- edy the performance anomaly and to improve transmission opportunities for low rate stations. We show that the proposed cooperative MAC
Modeling and simulation of the GPRS protocol Renju Narayanan rsn@cs.sfu.ca Communication Networks/medium access control protocol Simulation results Conclusions and future work #12;11/29/2005 GPRS model 3/29/2005 GPRS model 20 Simulation: configuration of attributes #12;11/29/2005 GPRS model 21 Simulation results
... Accession Number : ADA186646. Title : Cirrus: An Automated Protocol Analysis Tool. ... Abstract : Cirrus is a tool for protocol analysis. ...
This article describes Arizona State University's solution to security risk inherent in general access systems such as TCP/IP (Transmission Control Protocol/INTERNET Protocol). Advantages and disadvantages of various options are compared, and the process of selecting a log-on authentication approach involving ...
ERIC Educational Resources Information Center
An ad hoc network is a dynamic network formed on demand by a group of nodes without the aid of any pre-existing network infrastructure. An efficient and effective medium access control (MAC) protocol which regulates nodes access to the shared channel(s) i...
C-MAC: Model-driven Concurrent Medium Access Control for Wireless Sensor Networks Mo Sha1; Guoliang-- This paper presents C-MAC, a new MAC protocol designed to achieve high-throughput bulk communication for data- intensive sensing applications. C-MAC exploits concurrent wireless channel access based on empirical ...
�efficiency of the access control decision mechanism. The protocols to support the (cascaded) delegation of access rightsMan Project. Management domains provide the means of partitioning management responsibility by grouping domains, secure channel establishment between remote objects, access ...