نتایج جستجو برای: access protocol
تعداد نتایج: 557979 فیلتر نتایج به سال:
This paper introduces Human Energy Harvesting Medium Access Control (MAC) protocol (HEHBMAC), a hybrid polling MAC suitable for Wireless Body Area Networks (WBANs) powered by human energy harvesting. The proposed protocol combines two different medium access methods, namely polling (IDpolling) and probabilistic contention (PC) access, to adapt its operation to the different energy and state (ac...
The future broadband wireless asynchronous transfer mode (ATM) networks must provide seamless extension of multimedia services from the wireline ATM networks. This requires an efficient wireless access protocol to fulfill varying Quality-of-Service (QoS) requirements for multimedia applications. In this paper, we propose a multiple access protocol using centralized and distributed channel acces...
Basic Internet access is considered a human right, however geographical, technological and socio-economic reasons set barriers to universal Internet access. To address this challenge, we have proposed an access method based on message ferrying that enables free delay-tolerant Internet access to all, and developed Connectivity plAn Routing PrOtOcOL (CARPOOL), a reference routing protocol for the...
Many security protocols have the aim of authenticating one agent acting as initiator to another agent acting as responder and vice versa. Sometimes, the authentication fails because of executing several parallel sessions of a protocol, and because an agent may play both the initiator and responder role in parallel sessions. We take advantage of the notion of transition systems to specify authen...
This document describes the Diameter protocol application used for Authentication, Authorization and Accounting (AAA) services in the Network Access Server (NAS) environment. This application specification, when combined with the Diameter Base protocol, Transport Profile, and Extensible Authentication Protocol specifications, satisfies typical network access services requirements. Initial deplo...
The Cognitive Radio (CR) is a recent technology that aims at increasing the spectrum utilization under the current static spectrum management. With appropriate CR MAC protocols, the unlicensed users, also called secondary users (SUs), are able to access the unused portion of spectrum in an opportunistic way. These protocols should also provide a coordinated access between the SUs and protect th...
Emergency services, and automated vehicle platoons are frequently used examples of the need for real-time ad hoc communication, which demand that communication be time bounded overall. The medium access control protocol regulates access to the medium. Time division protocols give deterministic, time bounded delivery of messages. TDMA, time division multiple access forms the basis of the time bo...
Mobile ad hoc networks (MANET) are constructed by mobile nodes without access point. Since MANET has certain constraints, including power shortages, an unstable wireless environment and node mobility, more power-efficient and reliable routing protocols are needed. The OLSR protocol is an optimization of the classical link state algorithm. OLSR introduces an interesting concept, the multipoint r...
This document defines Remote Authentication Dial In User Service (RADIUS) support for the Extensible Authentication Protocol (EAP), an authentication framework which supports multiple authentication mechanisms. In the proposed scheme, the Network Access Server (NAS) forwards EAP packets to and from the RADIUS server, encapsulated within EAP-Message attributes. This has the advantage of allowing...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید