نتایج جستجو برای: access protocol

تعداد نتایج: 557979  

1999
Constantine Coutras Peng-Jun Wan

The growing interest in wireless systems and networks has led to the first Wireless LAN (WLAN) protocols. The Medium Access Control (MAC) layer protocols of such protocol suites are of key importance. The Radio Equipment and Systems (RES) Technical Committee of the European Telecommunications Standards Institute has proposed the High PErformance Radio LAN (HIPERLAN) protocol suite. In this pape...

2008
S. Greco Polito H. Schulzrinne

Roaming services allow users that have a contract with a voice service provider to use access resources owned by other providers known as internet access providers. This draft proposes a tokenbased Authentication, Authorization, Accounting (AAA) and billing model for roaming users supporting the Session Initiation Protocol (SIP). It also introduces a protocol solution for the proposed model tha...

Journal: :RFC 2000
Ellen Stokes Debbie Byrne Bob Blakley Prasanta Behera

Access Control Requirements for LDAP Status of this Memo This memo provides information for the Internet community. It does not specify an Internet standard of any kind. Distribution of this memo is unlimited. Abstract This document describes the fundamental requirements of an access control list (ACL) model for the Lightweight Directory Application Protocol (LDAP) directory service. It is inte...

2000
Constantine Coutras Peng-Jun Wan Ophir Frieder

The growing interest in wireless systems and networks has led to the first Wireless LAN (WLAN) protocols. The Medium Access Control (MAC) layer protocols of such protocol suites are of key importance. The Radio Equipment and Systems (RES) Technical Committee of the European Telecommunications Standards Institute has proposed the High PElfonnance Radio LAN (HIPERLAN) protocol suite. In this pape...

2002
Jae Yoon Park Seung Yeob Nam Dan Keun Sung Jemin Chung

This paper presents a comparative evaluation of a modified version (A-Protocol) of the Distributed-Queueing Request Update Multiple Access (DQRUMA)/Multi-Code Code Division Multiple Access (MC-CDMA) protocol and an enhanced version (P-Protocol) of the DQRUMA/MC-CDMA protocol with a lattice pool for request accesses (LPRA) scheme in a packet-based voice traffic environment. Analytical results ag...

2004
L.F.W. van Hoesel

In this paper, we present an energy-efficient medium access protocol designed for wireless sensor networks. Although the protocol uses TDMA to give nodes in the WSN the opportunity to communicate collision-free, the network is self-organizing in terms of time slot assignment and synchronization. The main goal of the medium access protocol is to minimize overhead of the physical layer. The proto...

2005
P. Calhoun G. Zorn

This document describes the Diameter protocol application used for Authentication, Authorization, and Accounting (AAA) services in the Network Access Server (NAS) environment. When combined with the Diameter Base protocol, Transport Profile, and Extensible Authentication Protocol specifications, this application specification satisfies typical network access services requirements. Initial deplo...

2007
Lin Wu Pramod K. Varshney

Busy tone multiple access protocols have been used in multihop networks to reduce the effect of the hidden terminal problem. Due to complexity, the performance of these protocols for large networks has not been analyzed. In this paper, using a Markov chain model and an approximation, we are able to analyze and evaluate the throughput performance of the non-persistent CSMA protocol, the conserva...

1998
Ljubica Blazevic Eric Gauthier

We propose a protocol that controls the members of a multicast group that send periodically status reports to all members. The protocol, called Multicast Access Protocol (MAP), limits the number of concurrent multicast reports as the group size becomes large. MAP is a decentralised protocol that provides an access control mechanism to an IP multicast group. The protocol supports members joining...

2002
Chuan Heng Foh

The challenge of designing an efficient Medium Access Control (MAC) protocol and analyzing it has been an important research topic for over 30 years. This thesis focuses on the performance analysis and enhancement of MAC protocols, particularly the random access protocols. Performance of the two widely known random access MAC protocols – the IEEE 802.3 MAC protocol that employs the Carrier Sens...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید