Academic literature on the topic 'Control de acceso al medio (MAC)'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Control de acceso al medio (MAC).'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Control de acceso al medio (MAC)"

1

Guevara, Judy, Luis Fernando Pedraza Martínez, and César Augusto Hernández Suárez. "Evaluación de los protocolos MAC IEEE 802.11 y MMAC-CR en una red manet." Revista Tecnura 18 (December 1, 2014): 125. http://dx.doi.org/10.14483/udistrital.jour.tecnura.2014.se1.a10.

Full text
Abstract:
Este artículo presenta un análisis comparativo entre los mecanismos de control de acceso al medio IEEE 802.11 y MMAC-CR (Multichannel MAC protocol for Cognitive Radio) en redes MANET (Mobile Ad Hoc Networks). El estándar IEEE 802.11 permite el uso de múltiples canales disponibles en la capa física, pero su protocolo MAC está diseñado para un solo canal. Sin embargo, un protocolo MAC de un solo canal no trabaja bien en un entorno multicanal debido al problema del terminal oculto. La metodología del artículo se basa en la descripción de los protocolos de control de acceso al medio, la simulación
APA, Harvard, Vancouver, ISO, and other styles
2

Guevara, Judy C., Luis Fernando Pedraza, and Cesar Augusto Hernández Suárez. "Evolución del protocolo MAC multicanal para redes de radio cognitiva." Revista Tecnura 17, no. 36 (2013): 129. http://dx.doi.org/10.14483/udistrital.jour.tecnura.2013.2.a10.

Full text
Abstract:
Este artículo presenta la evolución del protoco­lo MMAC-CR (Multichannel MAC protocol for Cognitive Radio). Para ello, se analizan las venta­jas que presenta y se estudian aquellas funciones de la radio cognitiva en las cuales el control de acceso al medio tiene una alta influencia, como la movilidad espectral, la detección de canal, la asignación de recursos y el acceso al espectro. También se describen las variaciones del proto­colo MMAC-CR de acuerdo con el mecanismo de negociación y reserva que cada una de ellas implementa.
APA, Harvard, Vancouver, ISO, and other styles
3

Gualdrón González, Óscar, and Ricardo Andrés Díaz Suárez. "Análisis de desempeño del IEEE802.11 para la conectividad de zonas rurales de Colombia." ITECKNE 9, no. 2 (2012): 7–21. http://dx.doi.org/10.15332/iteckne.v9i2.2753.

Full text
Abstract:
Dentro de este artículo se presenta las características de desempeño del estándar IEEE802.11 en enlaces punto a punto de largo alcance sobre emplazamientos rurales en Colombia. Para explicar este desempeño primero se realiza una descripción detallada del comportamiento de la capa física y MAC en el despliegue de redes de largo alcance, esto se realiza mediante análisis de la regulación existente para la máxima potencia isotrópica radiada equivalente en la banda ISM, las pérdidas por propagación, el nivel de recepción de los radios Wi-Fi comerciales, la tasa de error de frame y considerando com
APA, Harvard, Vancouver, ISO, and other styles
4

Christopher U, EBELOGU, AMUJO Oluyemi E, ADELAIYE Oluwasegun I, and FAKI Ageebee S. "Media Access Control (MAC) Protocols: An Overview." International Journal of Advances in Scientific Research and Engineering 5, no. 8 (2019): 142–49. http://dx.doi.org/10.31695/ijasre.2019.33462.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

EBELOGU, Christopher U. "Media Access Control (MAC) Protocols: An Overview." International Journal of Advances in Scientific Research and Engineering (ijasre) 5, no. 8 (2019): 142–49. https://doi.org/10.31695/IJASRE.2019.33462.

Full text
Abstract:
<em>Information Technology has grown rapidly leading to challenges with communicating information with nodes at remote locations. There are many communication media, </em><em>and certain varieties of wired links such as coaxial cables, where multiple nodes can all be linked to hear each other&#39;s transmissions either properly, correctly or with some non-zero probability. Generally, there are two rudimentary ways of sharing such stations or media, which can be the time-sharing, and frequency sharing. This paper tackles the rudimentary question of how such one common communication channel also
APA, Harvard, Vancouver, ISO, and other styles
6

Radicelli García, Ciro Diego, and Narcis Cardona-Marcet. "Parámetros configurables de capa física y MAC de un nuevo estándar de TDT con canal de retorno inalámbrico para proporcionar conectividad a Internet en zonas rurales de Latinoamérica." DYNA 83, no. 198 (2016): 16. http://dx.doi.org/10.15446/dyna.v83n197.52242.

Full text
Abstract:
Este artículo propone una guía para la configuración de los parámetros de capa física y MAC de un nuevo estándar de televisión digital terrestre (TDT) de segunda generación con canal de retorno inalámbrico denominado DVB-RCT2, particularizando en la capa física; (i) los modos de transmisión, (ii) las estructuras de ráfagas (BS1, BS2, BS3), y (iii) los esquemas de acceso al medio (MAS) para diferentes tamaños de FFT; y en la capa MAC (i) los modos de acceso, considerando un ancho de banda de 6 MHz. Para obtener los datos de esta investigación se ha emulado las condiciones del canal RCT2 en un l
APA, Harvard, Vancouver, ISO, and other styles
7

Radicelli García, Ciro Diego, and Narcis Cardona-Marcet. "Parámetros configurables de capa física y MAC de un nuevo estándar de TDT con canal de retorno inalámbrico para proporcionar conectividad a Internet en zonas rurales de Latinoamérica." DYNA 83, no. 198 (2016): 16–26. http://dx.doi.org/10.15446/dyna.v83n198.52242.

Full text
Abstract:
Este artículo propone una guía para la configuración de los parámetros de capa física y MAC de un nuevo estándar de televisión digital terrestre (TDT) de segunda generación con canal de retorno inalámbrico denominado DVB-RCT2, particularizando en la capa física; (i) los modos de transmisión, (ii) las estructuras de ráfagas (BS1, BS2, BS3), y (iii) los esquemas de acceso al medio (MAS) para diferentes tamaños de FFT; y en la capa MAC (i) los modos de acceso, considerando un ancho de banda de 6 MHz. Para obtener los datos de esta investigación se ha emulado las condiciones del canal RCT2 en un l
APA, Harvard, Vancouver, ISO, and other styles
8

Li, Zhe Tao, Tingrui Pei, and Shu Yang. "Media Access Control Protocols in Multimedia Wireless Sensor Networks: A Survey." Advanced Materials Research 216 (March 2011): 768–72. http://dx.doi.org/10.4028/www.scientific.net/amr.216.768.

Full text
Abstract:
Multimedia wireless sensor networks (MWSN) have outstanding ability of acquiring and processing information. Media access control is a research hotspot in MWSN. Many MAC protocols with different objectives for wireless sensor networks have been proposed by researchers, however, few of them suit for MWSN. This article presented an overview of characteristics and challenges of MAC in MWSN. We firstly overviewed of the research effort; then we compared different protocols; finally we point out some possible directions of future research on MAC layer design.
APA, Harvard, Vancouver, ISO, and other styles
9

Zou, Zhe Guang, Xiao Mei Xu, Yi Tao, and Zhao Tong Zhu. "Joint Design of Ranging and Media Access Control in Underwater Acoustic Networks." Advanced Materials Research 546-547 (July 2012): 1261–69. http://dx.doi.org/10.4028/www.scientific.net/amr.546-547.1261.

Full text
Abstract:
Due to the unique characteristics of underwater acoustic channels, most wireless protocols need necessary modifications before being applied to underwater acoustic networks. In order to match underwater environment better and achieve higher performance, underwater acoustic networks are calling for cross-layer design with integrated functions implementing. This paper discusses about how to integrate the ranging technique and media access control (MAC) together. Ranging plays a key role in forming a network topology. However, the independent ranging process in an underwater acoustic network requ
APA, Harvard, Vancouver, ISO, and other styles
10

Guleria, Kalpna, Sushil Kumar, and Anil Kumar Verma. "Energy Efficient Synchronous Media Access Control for Wireless Sensor Networks." Journal of Computational and Theoretical Nanoscience 17, no. 6 (2020): 2523–30. http://dx.doi.org/10.1166/jctn.2020.8925.

Full text
Abstract:
The technological advancements have brought a revolution in the field of communication, especially in the area of wireless communication. It has made the deployment of WSNs possible which comprise of a large number of low-power and low-cost sensor nodes to perform the task of sensing, processing, and communication. WSNs set stringent requirements for network lifetime, resource constraint, application specific behavior and they are highly dynamic in nature. The one factor which affects the most is the network lifetime and it requires the energy efficient operation to be performed. This article
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Control de acceso al medio (MAC)"

1

Kalfas, Georgios. "Medium-transparent MAC protocols for converged optical wireless networks." Doctoral thesis, Universitat Politècnica de Catalunya, 2017. http://hdl.handle.net/10803/406358.

Full text
Abstract:
In order to address the explosive demand for high-capacity and omnipresent wireless access, modern cell-based wireless networks are slowly adopting two major solution roadmaps. The first is the employment of small-cell formations in order to increase the overall spectral efficiency, whereas the second is the employment of higher frequency bands, such as the mm-wave 60GHz band, that offers vast amounts of bandwidth. Depending on the specific application, the above solutions inevitably require the installation and operational management of large amounts of Base Stations (BSs) or Access Points (A
APA, Harvard, Vancouver, ISO, and other styles
2

Sanabria-Russo, Luis. "Collision-free WLANs: from concepts to working protocols." Doctoral thesis, Universitat Pompeu Fabra, 2016. http://hdl.handle.net/10803/397802.

Full text
Abstract:
Using a deterministic backoff after successful transmissions as a distributed contention mechanism for access to the channel can draw benefits from scheduled operation, like the elimination of simultaneous transmissions, and Quality of Service (QoS). Carrier Sense Multiple Access with Enhanced Collision Avoidance (CSMA/ECA) is a compatible protocol that implements such technique, outperforming the current Medium Access Control (MAC) protocol in WiFi. This work describes several extensions to CSMA/ECA that allows it to support many more contenders in a collision-free schedule in very diverse sc
APA, Harvard, Vancouver, ISO, and other styles
3

Chia, Daniel Kim Boon. "Simulation of physical and media access control (MAC) for resilient and scalable wireless sensor networks." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2006. http://library.nps.navy.mil/uhtbin/hyperion/06Mar%5FChia.pdf.

Full text
Abstract:
Thesis (M.S. in Electrical Engineering)--Naval Postgraduate School, March 2006.<br>Thesis Advisor(s): Tri T. Ha, Weilian Su. "March 2006." Includes bibliographical references (p. 83-90). Also available online.
APA, Harvard, Vancouver, ISO, and other styles
4

Portillo, Jiménez Canek. "Modelado y evaluación de prestaciones de redes de sensores inalámbricos heterogéneos con ciclo de trabajo síncrono." Doctoral thesis, Universitat Politècnica de València, 2021. http://hdl.handle.net/10251/171275.

Full text
Abstract:
[ES] Las redes de sensores inalámbricas (WSN) han experimentado un resurgimiento debido al desarrollo de la Internet de las Cosas (IoT). Una de las características de las aplicaciones de la IoT es la necesidad de hacer uso de dispositivos sensores y actuadores. En aplicaciones como automatización de edificios, de gestión energética, industriales o de salud, los nodos sensores que componen la WSN, transmiten información a un colector central o sink. La información es posteriormente procesada, analizada y utilizada para propósitos específicos. En cada una de estas aplicaciones, los dispositivos
APA, Harvard, Vancouver, ISO, and other styles
5

Torres, Norambuena Boris Antonio. "Diseño de un protocolo MAC con una multiplexión temporal eficiente para redes inalámbricas locales energéticamente autosustentables equipados con dispositivos captadores de energía." Tesis, Universidad de Chile, 2016. http://repositorio.uchile.cl/handle/2250/143669.

Full text
Abstract:
Magíster en Ciencias de la Ingeniería, Mención Eléctrica. Ingeniero Civil Eléctrico<br>En la actualidad existe un crecimiento acelerado en el número de dispositivos que utilizan la red para comunicarse, sumado a que la de manda por velocidades de transmisión más altas ha aumentado. Conjuntamente con este requerimiento, existe una exigencia tácita: dispositivos más autónomos, es decir, dispositivos que tengan baterías lo suficientemente eficiente para no tener que cargarlos frecuentemente. Esto ha creado la necesidad de contar con protocolos que utilicen eficientemente el ancho de banda dispon
APA, Harvard, Vancouver, ISO, and other styles
6

Matte, Célestin. "Wi-Fi tracking : Fingerprinting attacks and counter-measures." Thesis, Lyon, 2017. http://www.theses.fr/2017LYSEI114/document.

Full text
Abstract:
Le récent développement des appareils portatifs possédant une interface Wi-Fi (smartphones, tablettes et « wearables ») s'accompagne d'une menace sur la vie privée de leurs utilisateurs, et sur la société toute entière. Ces appareils émettent en continu des signaux pouvant être capturés par un attaquant passif, à l'aide de matériel peu coûteux et de connaissances basiques. Ces signaux contiennent un identifiant unique appelé l'adresse MAC. Pour faire face à cette menace, les acteurs du secteur déploient actuellement une contre-mesure sur les appareils récents: le changement aléatoire de l'adre
APA, Harvard, Vancouver, ISO, and other styles
7

Ammar, Ibrahim A. M. "Design and analysis of energy-efficient media access control protocols in wireless sensor networks. Design and analysis of MAC layer protocols using low duty cycle technique to improve energy efficient and enhance communication performance in wireless sensor networks." Thesis, University of Bradford, 2014. http://hdl.handle.net/10454/7268.

Full text
Abstract:
Wireless sensor network (WSN) technology has gained significant importance due to its potential support for a wide range of applications. Most of the WSN applications consist of a large numbers of distributed nodes that work together to achieve common objects. Running a large number of nodes requires an efficient mechanism to bring them all together in order to form a multi-hop wireless network that can accomplish some specific tasks. Even with recent developments made in WSN technology, numbers of important challenges still stand as vulnerabilities for WSNs, including energy waste sources, sy
APA, Harvard, Vancouver, ISO, and other styles
8

Ammar, Ibrahim Ammer Musbah. "Design and analysis of energy-efficient media access control protocols in wireless sensor networks : design and analysis of MAC layer protocols using low duty cycle technique to improve energy efficient and enhance communication performance in wireless sensor networks." Thesis, University of Bradford, 2014. http://hdl.handle.net/10454/7268.

Full text
Abstract:
Wireless sensor network (WSN) technology has gained significant importance due to its potential support for a wide range of applications. Most of the WSN applications consist of a large numbers of distributed nodes that work together to achieve common objects. Running a large number of nodes requires an efficient mechanism to bring them all together in order to form a multi-hop wireless network that can accomplish some specific tasks. Even with recent developments made in WSN technology, numbers of important challenges still stand as vulnerabilities for WSNs, including energy waste sources, sy
APA, Harvard, Vancouver, ISO, and other styles
9

Muhammad, Murtala. "Enhancing the energy efficiency of ultra wideband (UWB) based media access control (MAC) protocols in mobile ad-hoc networks (MANETs) through the use of steerable directional antenna." Thesis, University of Salford, 2018. http://usir.salford.ac.uk/46756/.

Full text
Abstract:
Energy efficiency contributes to the survival of nodes in Mobile Ad Hoc Networks (MANETs). The use of directional antennas can conserve energy due to the increased gain and directed transmission towards specific point in space. Directional antennas also resolve many issues associated with interference from different points within the network. Despite the vast body of work in this area, research on the way directional antennas access the wireless medium specific to Ultra-WideBand (UWB) systems have not gained wide attention. The aim of this research is to design, implement and test an improved
APA, Harvard, Vancouver, ISO, and other styles
10

Junior, Renato Ferreira Fernandes. "Protocolo assíncrono de acesso ao meio iniciado pelo receptor para redes de sensores sem fio." Universidade de São Paulo, 2018. http://www.teses.usp.br/teses/disponiveis/18/18153/tde-13122018-161212/.

Full text
Abstract:
A internet das coisas é considerada um novo sistema de comunicação que promete otimizar e melhorar diferentes áreas de aplicação com base em módulos sensores e objetos unicamente interligados através da internet. Em aplicações de redes de sensores sem fio em larga escala, as redes possuem características peculiares, como grande quantidade de módulos sensores de baixa potência, consumo limitado e perdas de comunicação intermitentes. Estas redes precisam operar com protocolos escaláveis e eficientes em termos de consumo de energia. Desta forma, esta tese propõe um protocolo multicanal assíncrono
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Control de acceso al medio (MAC)"

1

Institute, American National Standards. IEEE standards for local and metropolitan area networks: Media access control (MAC) bridges. Institute of Electrical and Electronics Engineers, 1991.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

IEEE Computer Society. Technical Committee on Computer Communications., ed. Information technology--telecommunications and information exchange between systems--local area networks--media access control (MAC) bridges. Institute of Electrical and Electronics Engineers, 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

IEEE Computer Society. LAN/MAN Standards Committee., ed. Supplement to Information technology--telecommunications and information exchange between systems--local area networks--media access control (MAC) bridges: Managed objects for MAC bridges. Institute of Electrical and Electronics Engineers, 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

IEEE Computer Society. LAN/MAN Standards Committee., ed. Supplement to Information technology--telecommunications and information exhange between systems--local area networks--media access control (MAC) bridges: Managed objects for MAC bridges. Institute of Electrical and Electronics Engineers, 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

IEEE Computer Society. LAN/MAN Standards Committee., International Organization for Standardization, and International Electrotechnical Commission, eds. Information technology--: Telecommunications and information exhange between systems-- : local and metropolitan area networks-- : common specifications-- : part 3: media access control (MAC) bridges. Institute of Electrical and Electronics Engineers, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

IEEE Computer Society. LAN/MAN Standards Committee., International Electrotechnical Commission, International Organization for Standardization, Institute of Electrical and Electronics Engineers., and IEEE Standards Board, eds. Information technology -- telecommunications and information exchange between systems -- local and metropolitan area networks -- common specifications--: Part 5: remote media access control (MAC) bridging. Institute of Electrical and Electronics Engineers, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

IEEE Computer Society. LAN MAN Standards Committee., International Electrotechnical Commission, International Organization for Standardization, Institute of Electrical and Electronics Engineers., and IEEE Standards Board, eds. Information technology-- telecommunications and information exchange between systems-- local and metropolitan area networks-- common specifications-- : part 5: remote media access control (MAC) bridging. Institute of Electrical and Electronics Engineers, 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

IEEE Computer Society. Technical Committee on Computer Communications. IEEE standards for local and metropolitan area networks: Recommended practice for media access control (MAC) bridging of ethernet V2.0 in IEEE 802 local area networks. Institute of Electrical and Electronics Engineers, 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Institute Of Electrical and Electronics Engineers. IEEE standards for local and metropolitan area networks: Supplement to media access control (MAC) bridges : IEEE standard 802.6 distributed queue dual bus (DQDB) subnetwork of a MAN. Institute of Electrical and Electronics Engineers, 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

IEEE Computer Society. LAN/MAN Standards Committee., Institute of Electrical and Electronics Engineers., and IEEE Standards Board, eds. Information technology--: Telecommunications and information exchange between systems-- local and metropolitan area networks-- technical reports and guidelines-- Part 5: media access control (MAC) bridging of ethernet V2.0 in local area networks. Institute of Electrical and Electronics Engineers, 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Control de acceso al medio (MAC)"

1

Roedig, Utz, Andre Barroso, and Cormac J. Sreenan. "f-MAC: A Deterministic Media Access Control Protocol Without Time Synchronization." In Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11669463_21.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Leone, Pierre, Marina Papatriantafilou, Elad M. Schiller, and Gongxi Zhu. "Chameleon-MAC: Adaptive and Self-⋆ Algorithms for Media Access Control in Mobile Ad Hoc Networks." In Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-16023-3_37.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Samal, Tushar Kanta, Manas Ranjan Kabat, and Prasant Kumar Dash. "Media Access Control Protocols for Healthcare Sensor Networks." In Advances in Wireless Technologies and Telecommunication. IGI Global, 2017. http://dx.doi.org/10.4018/978-1-5225-0501-3.ch014.

Full text
Abstract:
The advancement of information and communication technology directly influences the life style of human being by making their life easier, sophisticated in many circumstances. The healthcare sensor network is one of the emerging areas of research for both computer science and health professionals. The Quality of Service (QoS) requirement of the traffic in emergency situation is one of the key challenges in this network. The Medium Access Control (MAC) layer plays vital role for reliable and on time delivery in the healthcare sensor networks. The healthcare system provides remote monitoring, real-time identification and control information which helps in identifying the unusual patterns and making more precise information about the situation. In this chapter, we present the issues and challenges of supporting sensor networks for healthcare applications. Then we present an extensive survey of MAC protocols developed to address the major challenges and improve the capacity of healthcare system in WSN.
APA, Harvard, Vancouver, ISO, and other styles
4

Liu, Mei, and Ciding Su. "A Hop-by-Hop Congestion-Aware MAC Protocol." In Advances in Transdisciplinary Engineering. IOS Press, 2024. http://dx.doi.org/10.3233/atde240105.

Full text
Abstract:
Congestion in wireless networks may result in packet drops or delay delivery of important information staying in the cache. CA-OSMA (Opportunistic packet Scheduling and Media Access Control with congestion aware) protocol proposed in this paper, first introduce a new metric to qualify the congestion level, which takes buffer occupancy, packet loss and excessive MAC contention together into account. Then, a new protocol taking advantages of multi-user diversity is proposed to migrate congestion and further improve the fairness of channel access. Compared with end-to-end TCP congestion control, the total delay decreases and the reliability raises in this hop-by-hop control. It benefits more for the networks with severe loads especially the backlogged network.
APA, Harvard, Vancouver, ISO, and other styles
5

Imam, Md Abdullah Yusuf. "Discovering the Functions of Media Access Control (MAC) Address over the Wired Public IP Network." In Research Updates in Mathematics and Computer Science Vol. 7. B P International, 2024. http://dx.doi.org/10.9734/bpi/rumcs/v7/8550e.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Sotelo-Garrido Mario, Nakano-Miyatake Mariko, Sanchez-Perez Gabriel, Cedillo-Hernamdez Manuel, and Perez-Meana Hector. "Software Protection Against Illegal Copy Using Software Watermarking." In Frontiers in Artificial Intelligence and Applications. IOS Press, 2017. https://doi.org/10.3233/978-1-61499-800-6-503.

Full text
Abstract:
In this paper, we propose software protection algorithm against illegal copy by unauthorized persons using software watermarking. In the proposed scheme, the software license information, related to the media access control (MAC) address and software product-key, is embedded into the software logotype image as a watermark sequence. At the first stage of the software execution, the watermark sequence is extracted from the logotype and compared with the current MAC address of the hardware devise. If the extracted MAC address differs from the hardware's MAC address, then the software displays a warning message related to the invalid license and finalizes its execution, otherwise the software continues its normal operation. The performance of the proposed scheme is analyzed from the difficulty of software piracy and reverse engineering points of view, and the evaluation results show the effectiveness of the proposed algorithm.
APA, Harvard, Vancouver, ISO, and other styles
7

Ahmad, Awais, Anand Paul, Sohail Jabbar, and Seungmin Rho. "Energy Efficient Congestion Control in Wireless Sensor Networks." In Sensor Technology. IGI Global, 2020. http://dx.doi.org/10.4018/978-1-7998-2454-1.ch037.

Full text
Abstract:
Avoiding from congestion and provision of reliable communication characterising the low energy consumption and high data rate is one of the momentous challenges at Media Access Control (MAC) layer. This become more difficult to achieve when there is energy constraint mixed with mobility of nodes. Same issue is addressed in this underlying paper. Here we have proposed a Time-Sharing Energy Efficient Congestion Control (TSEEC) technique for Mobile Wireless Sensor Networks. Time Division Multiple Access Protocol (TDMA) and Statistical Time Division Multiple Access Protocol (STDMA) are major constituents of this technique. These helps in conserving the energy by controlling the sleeping, waking up and listening states of sensor nodes. Load Based Allocation and Time Allocation Leister techniques further helps in conserving the network energy minimizing the network congestion. First mentioned technique is designed on the basis of STDMA Protocol and uses the sensor node information to dynamically assign the time slots while later said technique is does the job of mobility management of sensor node. This Time Allocation Leister techniques further comprises of Extricated Time Allocation (ETA), Shift Back Time Allocation (SBTA), and eScaped Time Allocation (STA) sub techniques for managing the joing and leaving of nodes to cluster and redundant\absence of data for communication respectively. To control the movement of mobile sensor nodes, we have also introduced mobility pattern as part of TSEEC that helps in making the protocol adaptive to traffic environment and to mobility as well. A comparitive analysis of proposed mechanism with SMAC is performed in NS2 along with mathematical anslysis by considering energy consumption, and packet deliver ratio as performance evaluation parameters. The results for the former outperforms to that of later. Moreover, comparative analysis of the proposed TSEEC with other MAC protocols is also presented.
APA, Harvard, Vancouver, ISO, and other styles
8

Bokor, László. "Novel Results on MBMS Service Provisioning in UMTS/WLAN Heterogeneous Architectures." In Networking and Telecommunications. IGI Global, 2010. http://dx.doi.org/10.4018/978-1-60566-986-1.ch113.

Full text
Abstract:
The support of broadcasting and multicasting as an efficient L3-based service poses rigorous requirements to the next generation mobile communication architectures. When IP multicasting has been seriously considered in mobile systems, soon has emerged the proposal of Multimedia Broadcast Multicast Service (MBMS) for 3G networks and beyond. However, with the spreading of versatile heterogeneous wireless systems, like the cooperation of European 3G (UMTS) and Wireless Local Area Network (WLAN), the problem of wireless IP datacasting arises in more complicated ways. In order to extend MBMS for UMTS/WLAN heterogeneous architectures we approach a novel framework along with a suitable and efficient WLAN MAC (Media Access Control) extension. In this work we also evaluate the performance of our proposal using a discrete event simulation environment called OMNeT++.
APA, Harvard, Vancouver, ISO, and other styles
9

Shahin, Md, Sanjida Akter, Prome Debnath, and A. K. M. Mostafa Zaman. "Disaster Resilient Rescue of Coastal Community on Cyclone Warning." In Natural Hazards - Impacts, Adjustments and Resilience [Working Title]. IntechOpen, 2020. http://dx.doi.org/10.5772/intechopen.94315.

Full text
Abstract:
Bangladesh is in the front line of battlefield of disasters due to geographical location and global warming faced over 200 natural disasters in past 40 years and most of the disasters were cyclones. People need to be evacuated and rescued before a cyclone landfall. In current practice, multipurpose cyclone shelter (MPCS) provides short-term safety for the disaster victims in Bangladesh, where people are rescued after disasters which cannot ensure survival of lives. This study aims to develop a method for efficient evacuation and rescue to reduce death tolls in the events of disasters. This study used Wi-Fi scanner and smartphones to detect people. An inbuilt index that includes name, address, mobile number, photo, service set identifier (SSID), and media access control (MAC) of smartphone was developed for 90 registered participants. In this controlled experiment, few new participants turned on hotspot in every five minutes. A new index of people with MAC/SSID was developed in MPCS simulating an emergency. Missing people were detected by comparing inbuilt index and new index, and ordered them self-evacuation. This method captured 100% evacuees. Most importantly, the proposed method will reduce death tools because the people are rescued earlier to a disaster hits a specific area.
APA, Harvard, Vancouver, ISO, and other styles
10

Pandey, Rajiv, Shahnaz Fatima, Shubham Asthana, and Ayush Kumar Rathore. "Integrating IOT-Commodity Cameras Through LoRaWAN." In Handbook of Research on the Internet of Things Applications in Robotics and Automation. IGI Global, 2020. http://dx.doi.org/10.4018/978-1-5225-9574-8.ch009.

Full text
Abstract:
IoT devices and their applications are supporting humankind in almost all domains. This chapter explores LoRaWAN and proposes to integrate the commodity cameras installed at the security points of most of the gates to residential areas. LoRaWAN is a media access control (MAC) protocol for wide area networks and it has been opted for its functional and architectural scalability. The intelligent inputs are transferred from the commodity cameras to the data concentrators (DC), on edge-based computing, the DC can transfer this input to fog, cloud, remote servers for machine learning integrations. This chapter demonstrates the basic architectural framework of the said implementation. However, the detailed implementation and prototype is beyond the scope of this chapter. The chapter has however demonstrated the architecture. The features of the commodity cameras have been listed that can serve as the feed to the concentrators that shall enable alarm generations at the local and remote policing sites.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Control de acceso al medio (MAC)"

1

Ben-Shimol, Yehuda, and Yoav Ben-Yehezkel. "LOad based Contention resOlution Media Access Control (LOCO-MAC) Protocol." In 2006 3rd International Conference on Broadband Communications, Networks and Systems. IEEE, 2006. http://dx.doi.org/10.1109/broadnets.2006.4374399.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Cardona, Jaiber, and José Gabriel Hoyos Gutiérrez. "Plataforma remota para prácticas del área de control." In Nuevas realidades para la educación en ingeniería: currículo, tecnología, medio ambiente y desarrollo. Asociación Colombiana de Facultades de Ingeniería - ACOFI, 2022. http://dx.doi.org/10.26507/paper.2434.

Full text
Abstract:
En los cursos de automatización y control el componente práctico es de suma importancia, ya que permite a los estudiantes probar las metodologías vistas en los espacios académicos y enfrentarse a los inconvenientes al pasar de una simulación a una implementación. Si bien existe un espacio semanal destinado a esta implementación real, usualmente de 2 horas, el número de equipos disponibles y los procesos que deben llevarse a cabo no permiten que dicho tiempo sea suficiente para lograr los resultados de aprendizaje. Se requiere entonces de un trabajo extra clase, por parte de los estudiantes, qu
APA, Harvard, Vancouver, ISO, and other styles
3

Kebkal, Oleksiy, Maxim Komar, Konstantin Kebkal, and Rudolf Bannasch. "D-MAC: Media access control architecture for underwater acoustic sensor networks." In OCEANS 2011 - SPAIN. IEEE, 2011. http://dx.doi.org/10.1109/oceans-spain.2011.6003586.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Kebkal, Oleksiy, Maxim Komar, and Konstantin Kebkal. "D-MAC: Hybrid Media Access Control for Underwater Acoustic Sensor Networks." In 2010 International Conference On Communications Workshops. IEEE, 2010. http://dx.doi.org/10.1109/iccw.2010.5503951.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Yamamoto, Yuuki, Ryo Hamamoto, Hiroyasu Obata, Chisa Takano, and Kenji Ishida. "Control method to guarantee throughput based on media access control method SP-MAC over WLAN." In 2016 13th IEEE Annual Consumer Communications & Networking Conference (CCNC). IEEE, 2016. http://dx.doi.org/10.1109/ccnc.2016.7444857.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Gupta, A., A. A. Waoo, P. S. Patheja, and S. Sharma. "Drop Rate Minimization Using MIB under Media Access Control (MAC) Layer in MANET." In 2013 Third International Conference on Advanced Computing & Communication Technologies (ACCT 2013). IEEE, 2013. http://dx.doi.org/10.1109/acct.2013.65.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Hsien, Yi-Yu, Jiunn-Ru Lai, and His-Lu Chao. "An active helper searching mechanism for directional cooperative media access control (MAC) protocols." In 2013 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA). IEEE, 2013. http://dx.doi.org/10.1109/apsipa.2013.6694189.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Kaur, Harminder, and Sharvan Kumar Pahuja. "MAC Protocols for Wireless Body Sensor Network." In International Conference on Women Researchers in Electronics and Computing. AIJR Publisher, 2021. http://dx.doi.org/10.21467/proceedings.114.33.

Full text
Abstract:
Wireless Body Area Networks, also known as the Wireless Body Sensor Networks, provides the monitoring of the health parameters in remote areas and where the medical facility is not available. Wireless Body Sensor Networks contains the body or placement of the sensors on body for measuring the medical and non-medical parameters. These networks share the wireless medium for the transmission of the data from one place to another. So the design of Medium Access Control is a challenging task for the WBSNs due to wireless media for less energy consumption and mobility. Various MAC protocols are desi
APA, Harvard, Vancouver, ISO, and other styles
9

Zhu, Shibing, and Jianmei Dai. "Survey of Media Access Control (MAC) and Routing Technologies of WiFi-MESH wireless Network." In 2016 International Conference on Computer and Information Technology Applications. Atlantis Press, 2016. http://dx.doi.org/10.2991/iccita-16.2016.14.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Ando, Ryoma, Ryo Hamamoto, Hiroyasu Obata, Chisa Takano, and Kenji Ishida. "An Adaptive Control Parameter Setting Method for Priority Control Based on Media Access Control SP-MAC over WLAN." In 2015 Third International Symposium on Computing and Networking (CANDAR). IEEE, 2015. http://dx.doi.org/10.1109/candar.2015.82.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Control de acceso al medio (MAC)"

1

Sivabalan, S., S. Boutros, H. Shah, S. Aldrin, and M. Venkatesan. Media Access Control (MAC) Address Withdrawal over Static Pseudowire. RFC Editor, 2016. http://dx.doi.org/10.17487/rfc7769.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Andersdotter, A. State of Affairs for Randomized and Changing Media Access Control (MAC) Addresses. RFC Editor, 2025. https://doi.org/10.17487/rfc9724.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Okamoto, O., M. Maruyama, and T. Sajima. Forwarding Media Access Control (MAC) Frames over Multiple Access Protocol over Synchronous Optical Network/Synchronous Digital Hierarchy (MAPOS). RFC Editor, 2002. http://dx.doi.org/10.17487/rfc3422.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Trejos Motato, José Alfredo, Darío García Ruiz, Diego Andrés Beltrán Parra, and Juan Camilo Chaves. Análisis de rendimiento, vulnerabilidades y prevención de fallas de seguridad en la información de la ETITC. Escuela Tecnológica Instituto Técnico Central, 2015. http://dx.doi.org/10.55411/2023.43.

Full text
Abstract:
Una definición acertada de seguridad informática es: "conjunto de normas, procedimientos y herramientas, que tienen como objetivo garantizar la disponibilidad, integridad, confidencialidad y buen uso de la información que reside en un sistema de información". Y, es que no podemos ser ajenos a que cada dia más y más personas mal intencionadas intentan tener acceso a los datos de nuestros computadores. Lo cual puede ocasionar en la mayoría de los casos, graves problemas; trayendo como consecuencia : la pérdida de datos. Es un hecho frecuente y ocasiona muchos trastornos, sobre todo si no estamos
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!