نتایج جستجو برای: access protocol

تعداد نتایج: 557979  

Journal: :The Journal of Korea Institute of Information, Electronics, and Communication Technology 2016

2003
Paulo S. Pagliusi Chris J. Mitchell

Currently there are no Internet access authentication protocols available that support both symmetric and asymmetric cryptographic techniques, can be carried over arbitrary access networks, and are flexible enough to be re-used in all the likely future ubiquitous mobility access contexts. This article proposes the PANA/IKEv2 authentication protocol for heterogeneous network access as a step tow...

Quantum dialogue is a type of quantum communication in which users can simultaneously send messages to each other. The earliest instances of quantum dialogue protocols faced security problems such as information leakage and were vulnerable to intercept and resend attacks. Therefore, several protocols have been presented that try to solve these defects. Despite these improvements, the quantum di...

Journal: :IJHPCN 2007
Jing Liu Jiandong Li

Based on effective contention access and perfect scheduling transmission, an enhanced multiple access protocol – UPMA++ protocol – is proposed. It allocates the resource dynamically according to the actual traffic requirement and does not require the synchronisation in the whole network. This protocol adjusts the length of contention access period and polling period effectively to resolve the c...

Journal: :IJCNS 2009
Meghan Gunn Simon G. M. Koo

One of the major constraints in wireless sensor networks (WSNs) is power consumption. In recent years, a lot of efforts have been put into the design of medium access control (MAC) protocols for WSN, in order to reduce energy consumption and enhance the network’s lifetime. In this paper, we surveyed some MAC protocols for WSN and compared their design tradeoffs. The goal is to provide a foundat...

2015
Hyeong-Kyu Lee MinGyu Lee Tae-Jin Lee

In energy harvesting IoT networks, an energy queue state of an IoT device will change dynamically and the number of IoT devices that transmit data to the IoT AP will vary in a frame. So we need a MAC protocol to adjust the frame length taking the amount of energy of IoT devices into consideration. Since the existing Framed slotted ALOHA (F-ALOHA) Medium Access Control (MAC) protocol utilizes th...

2003
Dimitra Vali Sarantis Paskalis Alexandros Kaloxylos Lazaros Merakos

The mobility management issue in IP access networks can be dealt with from various perspectives. A possible approach includes the use of the Session Initiation Protocol (SIP) and its associate entities for mobility signaling. Following this approach, existing SIP functionality in a network can be reused for mobility management purposes, providing efficient utilization of resources. In this pape...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید