-
1
Design and analysis of medium access control protocols in WDM optical networks
Published 2008Get full text
Thesis -
2
A survey and projection on medium access control protocols for wireless sensor networks
Published 2013“…Recent advances in wireless communications and sensor technologies have enabled the development of low-cost wireless sensor networks (WSNs) for a wide range of applications. Medium access control (MAC) protocols play a crucial role in WSNs by enabling the sharing of scarce wireless bandwidth efficiently and fairly. …”
Get full text
Get full text
Journal Article -
3
Development of MAC Protocol for Ethernet Passive Optical Network
Published 2008“…In this study, a Media Access Control (MAC) protocol for EPON is investigated which is called the Interleaved Polling with Adaptive Cycle Time (IPACT).…”
Get full text
Thesis -
4
Performance study on QoS service in wireless networks
Published 2008“…In this thesis, the media access control (MAC) protocol defined in the Wireless ATM Networks Demonstrator (WAND) syytem is presented, which is developed within the project Magic WAND.…”
Get full text
Thesis -
5
Design and performance study of MAC protocols in bluetooth systems
Published 2008“…Study the performance of medium access control protocols and design one to serve real time traffic in Bluetooth wireless networks. …”
Get full text
Thesis -
6
Performance study on MAC protocols for wireless networks
Published 2008“…MAC (Medium Access Control) protocols define rules for orderly access to the shared medium and play a crucial role in the efficient and fair sharing of scarce wireless bandwidth. …”
Get full text
Thesis -
7
Next generation optical access network
Published 2008“…Using a novel multiple access control scheme in the upstream of Ether-net passive optical networks (EPONs) to provide differentiated service to both low-demand and high-demand customers according to the ser-vice level agreement (SLA).…”
Get full text
Research Report -
8
Cross-layer resource scheduling scheme in WiMAX mesh networks
Published 2013“…The proposed scheme operates at medium access control (MAC) layer and physical (PHY) layer. At MAC layer, a hierarchical bandwidth allocation algorithm is designed to enhance concurrent transmissions and thus the network throughput. …”
Get full text
Get full text
Get full text
Journal Article -
9
FKR : an efficient authentication scheme for IEEE 802.11ah networks
Published 2022“…Although the performance of the Media Access Control (MAC) layer has been improved, the security functionality, especially for the authentication, is inherited from the legacy version. …”
Get full text
Journal Article -
10
A novel energy efficient key distribution scheme for mobile WiMAX networks
Published 2017“…In Mobile WiMAX, a Base Station (BS) delivers security keys to Mobile Stations (MSs) through a key distribution scheme to guarantee security and access control. The MSs need to perform ciphering operations to access the keys upon rekeying process. …”
Get full text
Article