نتایج جستجو برای: access protocol

تعداد نتایج: 557979  

Journal: :Telecommunication Systems 2015
Ernesto Ibarra Angelos Antonopoulos Elli Kartsakli Christos V. Verikoukis

This paper introduces Human Energy Harvesting Medium Access Control (MAC) protocol (HEHBMAC), a hybrid polling MAC suitable for Wireless Body Area Networks (WBANs) powered by human energy harvesting. The proposed protocol combines two different medium access methods, namely polling (IDpolling) and probabilistic contention (PC) access, to adapt its operation to the different energy and state (ac...

2017
Hong Liu Lars Dittmann Ulrik Gliese Per Danielsen

The future broadband wireless asynchronous transfer mode (ATM) networks must provide seamless extension of multimedia services from the wireline ATM networks. This requires an efficient wireless access protocol to fulfill varying Quality-of-Service (QoS) requirements for multimedia applications. In this paper, we propose a multiple access protocol using centralized and distributed channel acces...

2014
Ioannis Komnios Vassilis Tsaoussidis

Basic Internet access is considered a human right, however geographical, technological and socio-economic reasons set barriers to universal Internet access. To address this challenge, we have proposed an access method based on message ferrying that enables free delay-tolerant Internet access to all, and developed Connectivity plAn Routing PrOtOcOL (CARPOOL), a reference routing protocol for the...

Many security protocols have the aim of authenticating one agent acting as initiator to another agent acting as responder and vice versa. Sometimes, the authentication fails because of executing several parallel sessions of a protocol, and because an agent may play both the initiator and responder role in parallel sessions. We take advantage of the notion of transition systems to specify authen...

2004
Pat R. Calhoun Glen Zorn David Spence David Mitton

This document describes the Diameter protocol application used for Authentication, Authorization and Accounting (AAA) services in the Network Access Server (NAS) environment. This application specification, when combined with the Diameter Base protocol, Transport Profile, and Extensible Authentication Protocol specifications, satisfies typical network access services requirements. Initial deplo...

2010
Sonia Fourati Soumaya Hamouda Sami Tabbane

The Cognitive Radio (CR) is a recent technology that aims at increasing the spectrum utilization under the current static spectrum management. With appropriate CR MAC protocols, the unlicensed users, also called secondary users (SUs), are able to access the unused portion of spectrum in an opportunistic way. These protocols should also provide a coordinated access between the SUs and protect th...

2004
Mark Gleeson

Emergency services, and automated vehicle platoons are frequently used examples of the need for real-time ad hoc communication, which demand that communication be time bounded overall. The medium access control protocol regulates access to the medium. Time division protocols give deterministic, time bounded delivery of messages. TDMA, time division multiple access forms the basis of the time bo...

Mobile ad hoc networks (MANET) are constructed by mobile nodes without access point. Since MANET has certain constraints, including power shortages, an unstable wireless environment and node mobility, more power-efficient and reliable routing protocols are needed. The OLSR protocol is an optimization of the classical link state algorithm. OLSR introduces an interesting concept, the multipoint r...

Journal: :RFC 2003
Bernard Aboba Pat R. Calhoun

This document defines Remote Authentication Dial In User Service (RADIUS) support for the Extensible Authentication Protocol (EAP), an authentication framework which supports multiple authentication mechanisms. In the proposed scheme, the Network Access Server (NAS) forwards EAP packets to and from the RADIUS server, encapsulated within EAP-Message attributes. This has the advantage of allowing...

Journal: :Journal of information and communication convergence engineering 2010

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید